/linux-4.4.14/arch/arm64/crypto/ |
D | aes-ce.S | 20 .macro load_round_keys, rounds, rk 24 ld1 {v17.16b-v18.16b}, [\rk], #32 25 1111: ld1 {v19.16b-v20.16b}, [\rk], #32 26 2222: ld1 {v21.16b-v24.16b}, [\rk], #64 27 ld1 {v25.16b-v28.16b}, [\rk], #64 28 ld1 {v29.16b-v31.16b}, [\rk] 32 .macro enc_prepare, rounds, rk, ignore 33 load_round_keys \rounds, \rk 37 .macro enc_switch_key, rounds, rk, ignore 38 load_round_keys \rounds, \rk [all …]
|
D | aes-neon.S | 85 .macro do_block, enc, in, rounds, rk, rkp, i 86 ld1 {v15.16b}, [\rk] 87 add \rkp, \rk, #16 104 .macro encrypt_block, in, rounds, rk, rkp, i 105 do_block 1, \in, \rounds, \rk, \rkp, \i 108 .macro decrypt_block, in, rounds, rk, rkp, i 109 do_block 0, \in, \rounds, \rk, \rkp, \i 231 .macro do_block_2x, enc, in0, in1 rounds, rk, rkp, i 232 ld1 {v15.16b}, [\rk] 233 add \rkp, \rk, #16 [all …]
|
D | aes-ce-ccm-glue.c | 34 u32 *macp, u32 const rk[], u32 rounds); 37 u32 const rk[], u32 rounds, u8 mac[], 41 u32 const rk[], u32 rounds, u8 mac[], 44 asmlinkage void ce_aes_ccm_final(u8 mac[], u8 const ctr[], u32 const rk[],
|
D | aes-glue.c | 57 asmlinkage void aes_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], 59 asmlinkage void aes_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], 62 asmlinkage void aes_cbc_encrypt(u8 out[], u8 const in[], u8 const rk[], 64 asmlinkage void aes_cbc_decrypt(u8 out[], u8 const in[], u8 const rk[], 67 asmlinkage void aes_ctr_encrypt(u8 out[], u8 const in[], u8 const rk[],
|
/linux-4.4.14/arch/arm/crypto/ |
D | aes-armv4.S | 479 eor r0,r0,r5 @ rk[4]=rk[0]^... 480 eor r1,r1,r0 @ rk[5]=rk[1]^rk[4] 482 eor r2,r2,r1 @ rk[6]=rk[2]^rk[5] 484 eor r3,r3,r2 @ rk[7]=rk[3]^rk[6] 543 eor r0,r0,r9 @ rk[6]=rk[0]^... 544 eor r1,r1,r0 @ rk[7]=rk[1]^rk[6] 546 eor r2,r2,r1 @ rk[8]=rk[2]^rk[7] 548 eor r3,r3,r2 @ rk[9]=rk[3]^rk[8] 557 eor r7,r7,r3 @ rk[10]=rk[4]^rk[9] 558 eor r9,r8,r7 @ rk[11]=rk[5]^rk[10] [all …]
|
D | sha2-ce-core.S | 20 rk .req r3 37 vld1.32 {k\ev}, [rk, :128]! 92 adr rk, .Lsha256_rcon 93 vld1.32 {k0}, [rk, :128]!
|
D | aesbs-glue.c | 22 struct AES_KEY rk; member 67 ctx->dec.rk = ctx->enc; in aesbs_cbc_set_key() 68 private_AES_set_decrypt_key(in_key, bits, &ctx->dec.rk); in aesbs_cbc_set_key() 79 if (private_AES_set_encrypt_key(in_key, bits, &ctx->enc.rk)) { in aesbs_ctr_set_key() 93 if (private_AES_set_encrypt_key(in_key, bits, &ctx->enc.rk)) { in aesbs_xts_set_key() 97 ctx->dec.rk = ctx->enc.rk; in aesbs_xts_set_key() 98 private_AES_set_decrypt_key(in_key, bits, &ctx->dec.rk); in aesbs_xts_set_key() 174 AES_decrypt(src, dst, &ctx->dec.rk); in aesbs_cbc_decrypt() 243 AES_encrypt(walk.iv, ks, &ctx->enc.rk); in aesbs_ctr_encrypt()
|
D | aes-ce-glue.c | 27 asmlinkage void ce_aes_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], 29 asmlinkage void ce_aes_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], 32 asmlinkage void ce_aes_cbc_encrypt(u8 out[], u8 const in[], u8 const rk[], 34 asmlinkage void ce_aes_cbc_decrypt(u8 out[], u8 const in[], u8 const rk[], 37 asmlinkage void ce_aes_ctr_encrypt(u8 out[], u8 const in[], u8 const rk[],
|
D | aes-ce-core.S | 153 .macro prepare_key, rk, rounds 154 add ip, \rk, \rounds, lsl #4 155 vld1.8 {q8-q9}, [\rk] @ load first 2 round keys
|
/linux-4.4.14/drivers/net/ethernet/stmicro/stmmac/ |
D | Makefile | 12 obj-$(CONFIG_DWMAC_ROCKCHIP) += dwmac-rk.o
|
/linux-4.4.14/Documentation/devicetree/bindings/misc/ |
D | atmel-ssc.txt | 21 - atmel,clk-from-rk-pin: bool property.
|
/linux-4.4.14/arch/arm/boot/dts/ |
D | sama5d3xmb.dtsi | 38 atmel,clk-from-rk-pin;
|
/linux-4.4.14/drivers/input/joystick/iforce/ |
D | iforce-ff.c | 148 __u16 rsat, __u16 lsat, __s16 rk, __s16 lk, u16 db, __s16 center) in make_condition_modifier() argument 166 …data[2] = (100 * rk) >> 15; /* Dangerous: the sign is extended by gcc on plateforms providing an a… in make_condition_modifier()
|
/linux-4.4.14/drivers/staging/rtl8188eu/core/ |
D | rtw_security.c | 1677 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \ 1678 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \ 1679 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \ 1680 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3]; \
|