/linux-master/arch/mips/math-emu/ |
H A D | dp_rint.c | 19 int round; local 42 round = 0; 47 round = (residue >> 63) != 0; 56 if (round && (sticky || odd)) 62 if ((round || sticky) && !xs) 66 if ((round || sticky) && xs) 71 if (round || sticky)
|
H A D | sp_rint.c | 19 int round; local 42 round = 0; 48 round = (residue >> 31) != 0; 57 if (round && (sticky || odd)) 63 if ((round || sticky) && !xs) 67 if ((round || sticky) && xs) 72 if (round || sticky)
|
H A D | dp_tlong.c | 15 int round; local 58 round = 0; 67 round = (residue >> 63) != 0; 74 if (round && (sticky || odd)) 80 if ((round || sticky) && !xs) 84 if ((round || sticky) && xs) 93 if (round || sticky)
|
H A D | dp_tint.c | 15 int round; local 55 round = 0; 60 round = (residue >> 63) != 0; 69 if (round && (sticky || odd)) 75 if ((round || sticky) && !xs) 79 if ((round || sticky) && xs) 89 if (round || sticky)
|
H A D | sp_tlong.c | 15 int round; local 58 round = 0; 63 round = (residue >> 31) != 0; 70 if (round && (sticky || odd)) 76 if ((round || sticky) && !xs) 80 if ((round || sticky) && xs) 89 if (round || sticky)
|
H A D | sp_tint.c | 15 int round; local 58 round = 0; 67 round = (residue >> 31) != 0; 74 if (round && (sticky || odd)) 80 if ((round || sticky) && !xs) 84 if ((round || sticky) && xs) 93 if (round || sticky)
|
/linux-master/tools/power/cpupower/bench/ |
H A D | system.c | 130 unsigned int round; local 132 for (round = 0; round < config->rounds; round++) { 134 (config->sleep + config->sleep_step * round); 136 (config->load + config->load_step * round) + 137 (config->load + config->load_step * round * 4);
|
/linux-master/arch/arm64/crypto/ |
H A D | sm3-neon-core.S | 121 #define R(i, a, b, c, d, e, f, g, h, k, K_LOAD, round, widx, wtype, IOP, iop_param) \ 122 K_LOAD(round); \ 123 ldr t5, [sp, #(wtype##_W1_ADDR(round, widx))]; \ 127 ldr t6, [sp, #(wtype##_W1W2_ADDR(round, widx))]; \ 155 #define R1(a, b, c, d, e, f, g, h, k, K_LOAD, round, widx, wtype, IOP, iop_param) \ 156 R(1, ##a, ##b, ##c, ##d, ##e, ##f, ##g, ##h, ##k, K_LOAD, round, widx, wtype, IOP, iop_param) 158 #define R2(a, b, c, d, e, f, g, h, k, K_LOAD, round, widx, wtype, IOP, iop_param) \ 159 R(2, ##a, ##b, ##c, ##d, ##e, ##f, ##g, ##h, ##k, K_LOAD, round, widx, wtype, IOP, iop_param) 161 #define KL(round) \ 162 ldp k_even, k_odd, [RKPTR, #(4*(round))]; [all...] |
H A D | aes-cipher-core.S | 84 .macro do_crypt, round, ttab, ltab, bsz 104 0: \round w8, w9, w10, w11, w4, w5, w6, w7 105 \round w4, w5, w6, w7, w8, w9, w10, w11 108 \round w8, w9, w10, w11, w4, w5, w6, w7 110 2: \round w4, w5, w6, w7, w8, w9, w10, w11 113 \round w4, w5, w6, w7, w8, w9, w10, w11, \bsz, b
|
H A D | sm3-ce-core.S | 44 .macro round, ab, s0, t0, t1, i 62 round \ab, \s0, v11, v12, 0 63 round \ab, \s0, v12, v11, 1 64 round \ab, \s0, v11, v12, 2 65 round \ab, \s0, v12, v11, 3
|
/linux-master/arch/x86/crypto/ |
H A D | cast5-avx-x86_64-asm_64.S | 149 #define round(l, r, n, f) \ define 252 round(RL, RR, 0, 1); 253 round(RR, RL, 1, 2); 254 round(RL, RR, 2, 3); 255 round(RR, RL, 3, 1); 256 round(RL, RR, 4, 2); 257 round(RR, RL, 5, 3); 258 round(RL, RR, 6, 1); 259 round(RR, RL, 7, 2); 260 round(R [all...] |
H A D | twofish-x86_64-asm_64.S | 66 #define encrypt_round(a,b,c,d,round)\ 88 add k+round(%r11), %r9d;\ 91 add k+4+round(%r11),%r8d;\ 100 * during the round a and b are prepared for the output whitening 102 #define encrypt_last_round(a,b,c,d,round)\ 126 add k+round(%r11), %r9d;\ 129 add k+4+round(%r11),%r8d;\ 139 #define decrypt_round(a,b,c,d,round)\ 161 add k+round(%r11), %r9d;\ 163 add k+4+round( [all...] |
H A D | sm3-avx-asm_64.S | 181 #define R(i, a, b, c, d, e, f, g, h, round, widx, wtype) \ 185 leal K##round(t0, e, 1), t1; \ 188 addl wtype##_W1_ADDR(round, widx), h; \ 194 addl wtype##_W1W2_ADDR(round, widx), d; \ 215 #define R1(a, b, c, d, e, f, g, h, round, widx, wtype) \ 216 R(1, a, b, c, d, e, f, g, h, round, widx, wtype) 218 #define R2(a, b, c, d, e, f, g, h, round, widx, wtype) \ 219 R(2, a, b, c, d, e, f, g, h, round, widx, wtype) 224 #define IW_W_ADDR(round, widx, offs) \ 225 (STACK_W + ((round) / [all...] |
H A D | twofish-i586-asm_32.S | 67 #define encrypt_round(a,b,c,d,round)\ 91 add k+round(%ebp), %esi;\ 94 add k+4+round(%ebp),d ## D;\ 103 * last round has different rotations for the output preparation 105 #define encrypt_last_round(a,b,c,d,round)\ 129 add k+round(%ebp), %esi;\ 132 add k+4+round(%ebp),d ## D;\ 142 #define decrypt_round(a,b,c,d,round)\ 166 add k+round(%ebp), c ## D;\ 168 add k+4+round( [all...] |
H A D | aria-gfni-avx512-asm_64.S | 272 t0, rk, round) \ 274 vpbroadcastb ((round * 16) + 3)(rk), t0; \ 276 vpbroadcastb ((round * 16) + 2)(rk), t0; \ 278 vpbroadcastb ((round * 16) + 1)(rk), t0; \ 280 vpbroadcastb ((round * 16) + 0)(rk), t0; \ 282 vpbroadcastb ((round * 16) + 7)(rk), t0; \ 284 vpbroadcastb ((round * 16) + 6)(rk), t0; \ 286 vpbroadcastb ((round * 16) + 5)(rk), t0; \ 288 vpbroadcastb ((round * 16) + 4)(rk), t0; \ 290 vpbroadcastb ((round * 1 [all...] |
/linux-master/arch/powerpc/crypto/ |
H A D | aes-gcm-p10.S | 32 # vs0 - vs14 for round keys 49 # vs1 - vs9 - round keys 111 # vs1 - vs9 - round keys 567 # r6 - AES round keys 592 # load round key to VSR 611 vxor 15, 30, 29 # IV + round key - add round key 0 616 # load 2 more round keys (v11, v12) 623 # load 2 more round keys (v11, v12, v13, v14) 756 # last round [all...] |
/linux-master/arch/arm/crypto/ |
H A D | aes-cipher-core.S | 76 * This is the final round and we're done with all data-dependent table 102 .macro do_crypt, round, ttab, ltab, bsz 149 0: \round r8, r9, r10, r11, r4, r5, r6, r7 150 \round r4, r5, r6, r7, r8, r9, r10, r11 153 \round r8, r9, r10, r11, r4, r5, r6, r7 155 \round r4, r5, r6, r7, r8, r9, r10, r11 162 // Prefetch inverse S-box for final round; see explanation above 172 \round r4, r5, r6, r7, r8, r9, r10, r11, \bsz, b, rounds
|
/linux-master/arch/m68k/fpsp040/ |
H A D | round.S | 2 | round.sa 3.4 7/29/91 21 | round --- round result according to precision/mode 44 .global round 45 round: label 46 | If g=r=s=0 then result is exact and round is done, else set 55 swap %d1 |set up d1.w for round prec. 81 swap %d1 |set up d1 for round prec. 94 swap %d1 |set up d1 for round prec. 106 swap %d1 |set up d1 for round pre [all...] |
H A D | Makefile | 7 kernel_ex.o res_func.o round.o sacos.o sasin.o satan.o satanh.o \
|
H A D | x_unfl.S | 34 |xref round 53 bsrl unf_res |denormalize, round & store interm op 146 | ;upper word for round 161 | the user's precision for the round routine. 168 bnes unf_cont |if not, use fpcr prec in round 183 | ;d0 has guard,round sticky bit 185 | ;before it reaches the round subroutine 189 | Set up d1 for round subroutine d1 contains the PREC/MODE 197 | round subroutines. All code between these two subroutines 203 | d0{31:29} has guard, round, stick [all...] |
H A D | res_func.S | 36 |xref round 111 | The routine round is used to correctly round the input for the 178 | If bit 2 is set, round is forced to double. If it is clear, 179 | and bit 6 is set, round is forced to single. If both are clear, 180 | the round precision is found in the fpcr. If the rounding precision 181 | is double or single, round the result before the write. 203 | The move is fdmove or round precision is double. 213 clrl %d0 |clear g,r,s for round 216 bsrl round [all...] |
H A D | sint.S | 35 | sintrz, force round-to-zero mode. 65 |xref round 90 beq snzrinx |if round nearest or round zero, +/- 0 96 bsr ld_pone |if round plus inf and pos, answer is +1 101 bsr ld_mone |if round mns inf and neg, answer is -1 217 | ;used by round 221 bsr round |round the unnorm based on users
|
/linux-master/tools/cgroup/ |
H A D | iocost_coef_gen.py | 95 f'--filename={testfile} --runtime={round(duration)} ' 158 rseqiops = round(run_fio(testfile, args.duration, 'read', 161 rrandiops = round(run_fio(testfile, args.duration, 'randread', 167 wseqiops = round(run_fio(testfile, args.duration, 'write', 170 wrandiops = round(run_fio(testfile, args.duration, 'randwrite',
|
/linux-master/crypto/ |
H A D | sha3_generic.c | 20 * over 1 KB of stack if we inline the round calculation into the loop 152 int round; local 154 for (round = 0; round < KECCAK_ROUNDS; round++) { 157 st[0] ^= keccakf_rndc[round];
|
/linux-master/lib/crypto/ |
H A D | aes.c | 180 * key schedule plus a 16 bytes key which is used before the first round). 183 * for the initial combination, the second slot for the first round and so on. 227 * This involves reversing the order of the round keys, and applying 263 int round; local 281 for (round = 0;; round += 2, rkp += 8) { 287 if (round == rounds - 2) 314 int round; local 332 for (round = 0;; round [all...] |