/linux-master/drivers/input/joystick/iforce/ |
H A D | iforce-ff.c | 129 __u16 rsat, __u16 lsat, __s16 rk, __s16 lk, u16 db, __s16 center) 147 data[2] = (100 * rk) >> 15; /* Dangerous: the sign is extended by gcc on plateforms providing an arith shift */ 127 make_condition_modifier(struct iforce* iforce, struct resource* mod_chunk, int no_alloc, __u16 rsat, __u16 lsat, __s16 rk, __s16 lk, u16 db, __s16 center) argument
|
/linux-master/arch/arm/crypto/ |
H A D | aes-ce-core.S | 162 .macro prepare_key, rk, rounds 163 add ip, \rk, \rounds, lsl #4 164 vld1.32 {q8-q9}, [\rk] @ load first 2 round keys 169 * aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 171 * aes_ecb_decrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 227 * aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 229 * aes_cbc_decrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 290 * ce_aes_cbc_cts_encrypt(u8 out[], u8 const in[], u32 const rk[], 292 * ce_aes_cbc_cts_decrypt(u8 out[], u8 const in[], u32 const rk[], 374 * aes_ctr_encrypt(u8 out[], u8 const in[], u32 const rk[], in [all...] |
H A D | aes-ce-glue.c | 29 asmlinkage void ce_aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[], 31 asmlinkage void ce_aes_ecb_decrypt(u8 out[], u8 const in[], u32 const rk[], 34 asmlinkage void ce_aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[], 36 asmlinkage void ce_aes_cbc_decrypt(u8 out[], u8 const in[], u32 const rk[], 38 asmlinkage void ce_aes_cbc_cts_encrypt(u8 out[], u8 const in[], u32 const rk[], 40 asmlinkage void ce_aes_cbc_cts_decrypt(u8 out[], u8 const in[], u32 const rk[], 43 asmlinkage void ce_aes_ctr_encrypt(u8 out[], u8 const in[], u32 const rk[],
|
H A D | aes-cipher-core.S | 16 rk .req r0 84 ldm rk!, {t1, t2} 106 ldm rk!, {r8-r11}
|
H A D | aes-cipher-glue.c | 13 asmlinkage void __aes_arm_encrypt(u32 *rk, int rounds, const u8 *in, u8 *out); 14 asmlinkage void __aes_arm_decrypt(u32 *rk, int rounds, const u8 *in, u8 *out);
|
H A D | aes-neonbs-glue.c | 29 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds); 31 asmlinkage void aesbs_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], 33 asmlinkage void aesbs_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], 36 asmlinkage void aesbs_cbc_decrypt(u8 out[], u8 const in[], u8 const rk[], 39 asmlinkage void aesbs_ctr_encrypt(u8 out[], u8 const in[], u8 const rk[], 42 asmlinkage void aesbs_xts_encrypt(u8 out[], u8 const in[], u8 const rk[], 44 asmlinkage void aesbs_xts_decrypt(u8 out[], u8 const in[], u8 const rk[], 49 u8 rk[13 * (8 * AES_BLOCK_SIZE) + 32] __aligned(AES_BLOCK_SIZE); 72 struct crypto_aes_ctx rk; local 75 err = aes_expandkey(&rk, in_ke 88 __ecb_crypt(struct skcipher_request *req, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks)) argument 131 struct crypto_aes_ctx rk; local 337 __xts_crypt(struct skcipher_request *req, bool encrypt, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks, u8 iv[], int)) argument [all...] |
H A D | ghash-ce-core.S | 390 .macro round, rk:req, regs:vararg 392 aese.8 \r, \rk
|
H A D | ghash-ce-glue.c | 47 u32 rk[AES_MAX_KEYLENGTH_U32]; member in struct:gcm_key 396 memcpy(ctx->rk, aes_ctx.key_enc, sizeof(ctx->rk));
|
H A D | sha2-ce-core.S | 18 rk .req r3 35 vld1.32 {k\ev}, [rk, :128]! 90 adr rk, .Lsha256_rcon 91 vld1.32 {k0}, [rk, :128]!
|
/linux-master/arch/arm64/crypto/ |
H A D | aes-ce-ccm-core.S | 17 .macro load_round_keys, rk, nr, tmp 19 add \tmp, \rk, w\tmp, sxtw #4 20 ld1 {v10.4s-v13.4s}, [\rk] 73 eor v0.16b, v0.16b, v2.16b /* xor mac with pt ^ rk[last] */ 120 * u8 const rk[], u32 rounds, u8 mac[], 123 * u8 const rk[], u32 rounds, u8 mac[],
|
H A D | aes-ce-ccm-glue.c | 35 asmlinkage u32 ce_aes_mac_update(u8 const in[], u32 const rk[], int rounds, 40 u32 const rk[], u32 rounds, u8 mac[], 44 u32 const rk[], u32 rounds, u8 mac[], 101 u32 macp, u32 const rk[], u32 rounds) 109 u32 rem = ce_aes_mac_update(in, rk, rounds, blocks, mac, 100 ce_aes_ccm_auth_data(u8 mac[], u8 const in[], u32 abytes, u32 macp, u32 const rk[], u32 rounds) argument
|
H A D | aes-ce-glue.c | 27 asmlinkage void __aes_ce_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 28 asmlinkage void __aes_ce_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
|
H A D | aes-ce.S | 28 .macro load_round_keys, rk, nr, tmp 29 add \tmp, \rk, \nr, sxtw #4 31 ld1 {v17.4s-v20.4s}, [\rk] 37 /* prepare for encryption with key in rk[] */ 38 .macro enc_prepare, rounds, rk, temp 39 load_round_keys \rk, \rounds, \temp 42 /* prepare for encryption (again) but with new key in rk[] */ 43 .macro enc_switch_key, rounds, rk, temp 44 load_round_keys \rk, \rounds, \temp 47 /* prepare for decryption with key in rk[] */ [all...] |
H A D | aes-cipher-core.S | 14 rk .req x0 57 ldp \out0, \out1, [rk], #8 87 ldp w8, w9, [rk], #16 88 ldp w10, w11, [rk, #-8]
|
H A D | aes-cipher-glue.c | 12 asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 13 asmlinkage void __aes_arm64_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
|
H A D | aes-glue.c | 77 asmlinkage void aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[], 79 asmlinkage void aes_ecb_decrypt(u8 out[], u8 const in[], u32 const rk[], 82 asmlinkage void aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[], 84 asmlinkage void aes_cbc_decrypt(u8 out[], u8 const in[], u32 const rk[], 87 asmlinkage void aes_cbc_cts_encrypt(u8 out[], u8 const in[], u32 const rk[], 89 asmlinkage void aes_cbc_cts_decrypt(u8 out[], u8 const in[], u32 const rk[], 92 asmlinkage void aes_ctr_encrypt(u8 out[], u8 const in[], u32 const rk[], 95 asmlinkage void aes_xctr_encrypt(u8 out[], u8 const in[], u32 const rk[], 112 asmlinkage int aes_mac_update(u8 const in[], u32 const rk[], int rounds,
|
H A D | aes-neon.S | 98 .macro do_block, enc, in, rounds, rk, rkp, i 99 ld1 {v15.4s}, [\rk] 100 add \rkp, \rk, #16 114 .macro encrypt_block, in, rounds, rk, rkp, i 115 do_block 1, \in, \rounds, \rk, \rkp, \i 118 .macro decrypt_block, in, rounds, rk, rkp, i 119 do_block 0, \in, \rounds, \rk, \rkp, \i 205 .macro do_block_4x, enc, in0, in1, in2, in3, rounds, rk, rkp, i 206 ld1 {v15.4s}, [\rk] 207 add \rkp, \rk, #1 [all...] |
H A D | aes-neonbs-glue.c | 26 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds); 28 asmlinkage void aesbs_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], 30 asmlinkage void aesbs_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], 33 asmlinkage void aesbs_cbc_decrypt(u8 out[], u8 const in[], u8 const rk[], 36 asmlinkage void aesbs_ctr_encrypt(u8 out[], u8 const in[], u8 const rk[], 39 asmlinkage void aesbs_xts_encrypt(u8 out[], u8 const in[], u8 const rk[], 41 asmlinkage void aesbs_xts_decrypt(u8 out[], u8 const in[], u8 const rk[], 45 asmlinkage void neon_aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[], 47 asmlinkage void neon_aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[], 49 asmlinkage void neon_aes_ctr_encrypt(u8 out[], u8 const in[], u32 const rk[], 59 u8 rk[13 * (8 * AES_BLOCK_SIZE) + 32]; member in struct:aesbs_ctx 78 struct crypto_aes_ctx rk; local 94 __ecb_crypt(struct skcipher_request *req, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks)) argument 137 struct crypto_aes_ctx rk; local 255 struct crypto_aes_ctx rk; local 276 __xts_crypt(struct skcipher_request *req, bool encrypt, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks, u8 iv[])) argument [all...] |
H A D | ghash-ce-core.S | 386 .macro load_round_keys, rounds, rk, tmp 387 add \tmp, \rk, #64 388 ld1 {K0.4s-K3.4s}, [\rk] 390 add \tmp, \rk, \rounds, lsl #4 407 .macro enc_block, state, rounds, rk, tmp 408 add \tmp, \rk, #96
|
H A D | ghash-ce-glue.c | 60 u32 const rk[], int rounds, u8 tag[]); 63 u32 const rk[], int rounds, const u8 l[],
|
H A D | sm4-ce-cipher-glue.c | 18 asmlinkage void sm4_ce_do_crypt(const u32 *rk, void *out, const void *in);
|
/linux-master/arch/loongarch/include/asm/ |
H A D | inst.h | 343 unsigned int rk : 5; member in struct:reg3_format 350 unsigned int rk : 5; member in struct:reg3sa2_format 507 u32 larch_insn_gen_or(enum loongarch_gpr rd, enum loongarch_gpr rj, enum loongarch_gpr rk); 705 enum loongarch_gpr rk) \ 710 insn->reg3_format.rk = rk; \ 756 enum loongarch_gpr rk, \ 763 insn->reg3sa2_format.rk = rk; \
|
/linux-master/arch/loongarch/kernel/ |
H A D | inst.c | 270 u32 larch_insn_gen_or(enum loongarch_gpr rd, enum loongarch_gpr rj, enum loongarch_gpr rk) argument 274 emit_or(&insn, rd, rj, rk);
|
H A D | traps.c | 637 upper = regs->regs[insn.reg3_format.rk]; 644 lower = regs->regs[insn.reg3_format.rk]; 660 upper = regs->regs[insn.reg3_format.rk]; 676 lower = regs->regs[insn.reg3_format.rk];
|
/linux-master/arch/powerpc/crypto/ |
H A D | aes-gcm-p10.S | 562 # const char *rk, unsigned char iv[16], void *Xip); 571 # rounds is at offset 240 in rk
|