Home
last modified time | relevance | path

Searched refs:T3 (Results 1 – 25 of 51) sorted by relevance

123

/linux-6.12.1/arch/x86/crypto/
Dghash-clmulni-intel_asm.S28 #define T3 %xmm4 macro
49 pshufd $0b01001110, SHASH, T3
51 pxor SHASH, T3
55 pclmulqdq $0x00, T3, T2 # T2 = (a1 + a0) * (b1 + b0)
59 movaps T2, T3
60 pslldq $8, T3
62 pxor T3, DATA
67 movaps DATA, T3
68 psllq $1, T3
69 pxor DATA, T3
[all …]
Dnh-avx2-x86_64.S29 #define T3 %ymm11 macro
43 vpaddd \k0, T3, T0
44 vpaddd \k1, T3, T1
45 vpaddd \k2, T3, T2
46 vpaddd \k3, T3, T3
55 vpshufd $0x10, T3, T7
56 vpshufd $0x32, T3, T3
60 vpmuludq T7, T3, T3
64 vpaddq T3, PASS3_SUMS, PASS3_SUMS
86 vmovdqu (MESSAGE), T3
[all …]
Dpoly1305-x86_64-cryptogams.pl419 my ($H0,$H1,$H2,$H3,$H4, $T0,$T1,$T2,$T3,$T4, $D0,$D1,$D2,$D3,$D4, $MASK) =
891 vpsrldq \$6,$T1,$T3
894 vpunpcklqdq $T3,$T2,$T3 # 2:3
899 vpsrlq \$4,$T3,$T2
901 vpsrlq \$30,$T3,$T3
903 vpand $MASK,$T3,$T3 # 3
984 vpmuludq $T3,$D4,$D3 # d3 = h3*r0
990 vpmuludq $T3,$H2,$H1 # h3*r1
1012 vpmuludq $T3,$H4,$H4 # h3*s2
1023 vpmuludq $T3,$H3,$H1 # h3*s3
[all …]
Dnh-sse2-x86_64.S24 #define T3 %xmm11 macro
44 movdqa T1, T3
48 paddd \k3, T3
57 pshufd $0x10, T3, T7
58 pshufd $0x32, T3, T3
62 pmuludq T7, T3
66 paddq T3, PASS3_SUMS
/linux-6.12.1/arch/arm64/crypto/
Dnh-neon-core.S29 T3 .req v11
38 ld1 {T3.16b}, [MESSAGE], #16
44 add T0.4s, T3.4s, \k0\().4s
45 add T1.4s, T3.4s, \k1\().4s
46 add T2.4s, T3.4s, \k2\().4s
47 add T3.4s, T3.4s, \k3\().4s
53 mov T7.d[0], T3.d[1]
57 umlal PASS3_SUMS.2d, T3.2s, T7.2s
Dsha512-armv8.pl463 my ($T0,$T1,$T2,$T3,$T4,$T5,$T6,$T7) = map("q$_",(4..7,16..19));
487 &ext_8 ($T3,@X[2],@X[3],4); # X[9..12]
497 &add_32 (@X[0],@X[0],$T3); # X[0..3] += X[9..12]
502 &ushr_32 ($T3,$T0,$sigma0[1]);
508 &sli_32 ($T3,$T0,32-$sigma0[1]);
514 &eor_8 ($T1,$T1,$T3); # sigma0(X[1..4])
523 &ushr_32 ($T3,$T7,$sigma1[1]);
529 &sli_u32 ($T3,$T7,32-$sigma1[1]);
536 &eor_8 ($T5,$T5,$T3); # sigma1(X[14..15])
661 ld1.32 {$T3},[$Ktbl], #16
[all …]
Dsm4-ce-gcm-core.S52 r2, r3, m2, m3, T2, T3, \ argument
64 pmull T3.1q, m2.1d, T2.1d; \
76 eor T2.16b, T2.16b, T3.16b; \
80 ext T3.16b, RZERO.16b, T2.16b, #8; \
88 eor r2.16b, r2.16b, T3.16b; \
135 r2, r3, m2, m3, T2, T3, \ argument
153 pmull T3.1q, m2.1d, T2.1d; \
171 eor T2.16b, T2.16b, T3.16b; \
177 ext T3.16b, RZERO.16b, T2.16b, #8; \
189 eor r2.16b, r2.16b, T3.16b; \
/linux-6.12.1/crypto/
Danubis.c253 static const u32 T3[256] = { variable
543 inter[i] ^= T3[(kappa[j ] ) & 0xff]; in anubis_setkey()
565 T3[T4[(v ) & 0xff] & 0xff]; in anubis_setkey()
597 T3[(state[3] >> 24) ] ^ in anubis_crypt()
603 T3[(state[3] >> 16) & 0xff] ^ in anubis_crypt()
609 T3[(state[3] >> 8) & 0xff] ^ in anubis_crypt()
615 T3[(state[3] ) & 0xff] ^ in anubis_crypt()
631 (T3[(state[3] >> 24) ] & 0x000000ffU) ^ in anubis_crypt()
637 (T3[(state[3] >> 16) & 0xff] & 0x000000ffU) ^ in anubis_crypt()
643 (T3[(state[3] >> 8) & 0xff] & 0x000000ffU) ^ in anubis_crypt()
[all …]
Dkhazad.c305 static const u64 T3[256] = { variable
774 T3[(int)(K1 >> 32) & 0xff] ^ in khazad_setkey()
790 T3[(int)S[(int)(K1 >> 32) & 0xff] & 0xff] ^ in khazad_setkey()
816 T3[(int)(state >> 32) & 0xff] ^ in khazad_crypt()
827 (T3[(int)(state >> 32) & 0xff] & 0x000000ff00000000ULL) ^ in khazad_crypt()
/linux-6.12.1/arch/arm/crypto/
Dnh-neon-core.S45 T3 .req q11
52 vld1.8 {T3}, [MESSAGE]!
58 vadd.u32 T0, T3, \k0
59 vadd.u32 T1, T3, \k1
60 vadd.u32 T2, T3, \k2
61 vadd.u32 T3, T3, \k3
Dsha256-armv4.pl292 my ($T0,$T1,$T2,$T3,$T4,$T5)=("q8","q9","q10","q11","d24","d25");
332 &vshr_u32 ($T3,$T0,$sigma0[1]);
338 &vsli_32 ($T3,$T0,32-$sigma0[1]);
344 &veor ($T1,$T1,$T3); # sigma0(X[1..4])
487 vld1.32 {$T3},[$Ktbl,:128]!
502 vadd.i32 $T3,$T3,@X[3]
504 vst1.32 {$T3},[$Xfer,:128]!
Dghash-ce-core.S85 T3 .req q8
215 1: vld1.8 {T2-T3}, [r2]!
218 \enc\()_4x XL2, XM2, T2, T3
242 vrev64.8 T1, T3
243 vrev64.8 T3, T2
/linux-6.12.1/drivers/block/drbd/
Ddrbd_state.h45 #define NS3(T1, S1, T2, S2, T3, S3) \ argument
47 mask.T2 = T2##_MASK; mask.T3 = T3##_MASK; mask; }), \
49 val.T2 = (S2); val.T3 = (S3); val; })
56 #define _NS3(D, T1, S1, T2, S2, T3, S3) \ argument
58 __ns.T2 = (S2); __ns.T3 = (S3); __ns; })
/linux-6.12.1/arch/sparc/crypto/
Daes_asm.S13 #define ENCRYPT_TWO_ROUNDS_2(KEY_BASE, I0, I1, I2, I3, T0, T1, T2, T3) \ argument
17 AES_EROUND23(KEY_BASE + 2, I2, I3, T3) \
20 AES_EROUND01(KEY_BASE + 4, T2, T3, I2) \
21 AES_EROUND23(KEY_BASE + 6, T2, T3, I3)
29 #define ENCRYPT_TWO_ROUNDS_LAST_2(KEY_BASE, I0, I1, I2, I3, T0, T1, T2, T3) \ argument
33 AES_EROUND23(KEY_BASE + 2, I2, I3, T3) \
36 AES_EROUND01_L(KEY_BASE + 4, T2, T3, I2) \
37 AES_EROUND23_L(KEY_BASE + 6, T2, T3, I3)
47 #define ENCRYPT_128_2(KEY_BASE, I0, I1, I2, I3, T0, T1, T2, T3) \ argument
48 ENCRYPT_TWO_ROUNDS_2(KEY_BASE + 0, I0, I1, I2, I3, T0, T1, T2, T3) \
[all …]
/linux-6.12.1/drivers/scsi/cxgbi/cxgb3i/
DKconfig3 tristate "Chelsio T3 iSCSI support"
12 This driver supports iSCSI offload for the Chelsio T3 devices.
/linux-6.12.1/scripts/coccinelle/free/
Dput_device.cocci16 type T,T1,T2,T3;
33 | (T3)platform_get_drvdata(id)
/linux-6.12.1/arch/s390/crypto/
Dchacha-s390.S473 #define T3 %v30 macro
510 VAF D3,K3,T3 # K[3]+3
512 VAF D5,D2,T3 # K[3]+5
523 VLR T3,D3
733 VAF D3,D3,T3 # +K[3]+3
734 VLM T0,T3,0,INP,0
739 VX D0,D0,T3
741 VLM K0,T3,0,%r7,4 # re-load sigma and increments
804 VAF D2,K3,T3 # K[3]+3
834 VAF K3,D2,T3 # K[3]+=6
/linux-6.12.1/tools/perf/arch/riscv/util/
Dunwind-libdw.c50 dwarf_regs[28] = REG(T3); in libdw__arch_set_initial_registers()
/linux-6.12.1/arch/arm64/boot/dts/mediatek/
Dmt8186-corsola-tentacruel-sku262144.dts21 MATRIX_KEY(0x02, 0x02, 0) /* T3 */
Dmt8186-corsola-tentacool-sku327681.dts29 MATRIX_KEY(0x02, 0x02, 0) /* T3 */
Dmt8192-asurada-hayato-r5-sku2.dts19 MATRIX_KEY(0x02, 0x02, 0) /* T3 */
Dmt8192-asurada-spherion-r4.dts35 MATRIX_KEY(0x02, 0x02, 0) /* T3 */
/linux-6.12.1/Documentation/devicetree/bindings/rng/
Dsparc_sun_oracle_rng.txt9 …- 'SUNW,kt-rng' for Rainbow/Yosemite Falls Platform (SUN SPARC T3/T4), (UltraSPARC KT/Niagara 3 - …
/linux-6.12.1/drivers/iio/pressure/
Dbmp280.h343 s16 T3; member
365 s8 T3; member
/linux-6.12.1/arch/arm64/boot/dts/qcom/
Dsc7180-trogdor-pazquel360.dtsi35 MATRIX_KEY(0x02, 0x02, 0) /* T3 */

123