Home
last modified time | relevance | path

Searched +full:a +full:- +full:c (Results 1 – 25 of 1141) sorted by relevance

12345678910>>...46

/Linux-v6.1/net/ceph/crush/
Dhash.c1 // SPDX-License-Identifier: GPL-2.0
9 * Robert Jenkins' function for mixing 32-bit values
11 * a, b = random bits, c = input and output
13 #define crush_hashmix(a, b, c) do { \ argument
14 a = a-b; a = a-c; a = a^(c>>13); \
15 b = b-c; b = b-a; b = b^(a<<8); \
16 c = c-a; c = c-b; c = c^(b>>13); \
17 a = a-b; a = a-c; a = a^(c>>12); \
18 b = b-c; b = b-a; b = b^(a<<16); \
19 c = c-a; c = c-b; c = c^(b>>5); \
[all …]
/Linux-v6.1/net/ceph/
Dceph_hash.c10 #define mix(a, b, c) \ argument
12 a = a - b; a = a - c; a = a ^ (c >> 13); \
13 b = b - c; b = b - a; b = b ^ (a << 8); \
14 c = c - a; c = c - b; c = c ^ (b >> 13); \
15 a = a - b; a = a - c; a = a ^ (c >> 12); \
16 b = b - c; b = b - a; b = b ^ (a << 16); \
17 c = c - a; c = c - b; c = c ^ (b >> 5); \
18 a = a - b; a = a - c; a = a ^ (c >> 3); \
19 b = b - c; b = b - a; b = b ^ (a << 10); \
20 c = c - a; c = c - b; c = c ^ (b >> 15); \
[all …]
/Linux-v6.1/tools/testing/selftests/bpf/progs/
Dtest_jhash.h1 // SPDX-License-Identifier: GPL-2.0
2 // Copyright (c) 2019 Facebook
9 return (word << shift) | (word >> ((-shift) & 31)); in rol32()
12 #define __jhash_mix(a, b, c) \ argument
14 a -= c; a ^= rol32(c, 4); c += b; \
15 b -= a; b ^= rol32(a, 6); a += c; \
16 c -= b; c ^= rol32(b, 8); b += a; \
17 a -= c; a ^= rol32(c, 16); c += b; \
18 b -= a; b ^= rol32(a, 19); a += c; \
19 c -= b; c ^= rol32(b, 4); b += a; \
[all …]
/Linux-v6.1/fs/smbfs_common/
Dcifs_md4.c1 // SPDX-License-Identifier: GPL-2.0
12 * Copyright (c) Andrew Tridgell 1997-1998.
14 * Copyright (c) Cryptoapi developers.
15 * Copyright (c) 2002 David S. Miller (davem@redhat.com)
16 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
32 return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); in lshift()
50 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument
51 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument
52 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
56 u32 a, b, c, d; in md4_transform() local
[all …]
/Linux-v6.1/include/linux/
Djhash.h6 * Copyright (C) 2006. Bob Jenkins (bob_jenkins@burtleburtle.net)
12 * lookup3.c, by Bob Jenkins, May 2006, Public Domain.
14 * These are functions for producing 32-bit hashes for hash table lookup.
20 * Copyright (C) 2009-2010 Jozsef Kadlecsik (kadlec@netfilter.org)
32 #define jhash_mask(n) (jhash_size(n)-1)
34 /* __jhash_mix -- mix 3 32-bit values reversibly. */
35 #define __jhash_mix(a, b, c) \ argument
37 a -= c; a ^= rol32(c, 4); c += b; \
38 b -= a; b ^= rol32(a, 6); a += c; \
39 c -= b; c ^= rol32(b, 8); b += a; \
[all …]
/Linux-v6.1/tools/include/linux/
Djhash.h6 * Copyright (C) 2006. Bob Jenkins (bob_jenkins@burtleburtle.net)
12 * lookup3.c, by Bob Jenkins, May 2006, Public Domain.
14 * These are functions for producing 32-bit hashes for hash table lookup.
20 * Copyright (C) 2009-2010 Jozsef Kadlecsik (kadlec@blackhole.kfki.hu)
32 #define jhash_mask(n) (jhash_size(n)-1)
34 /* __jhash_mix -- mix 3 32-bit values reversibly. */
35 #define __jhash_mix(a, b, c) \ argument
37 a -= c; a ^= rol32(c, 4); c += b; \
38 b -= a; b ^= rol32(a, 6); a += c; \
39 c -= b; c ^= rol32(b, 8); b += a; \
[all …]
/Linux-v6.1/crypto/
Dmd4.c11 * Copyright (c) Andrew Tridgell 1997-1998.
13 * Copyright (c) Cryptoapi developers.
14 * Copyright (c) 2002 David S. Miller (davem@redhat.com)
15 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
45 return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); in lshift()
63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument
64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument
65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
69 u32 a, b, c, d; in md4_transform() local
71 a = hash[0]; in md4_transform()
[all …]
Dmd5.c9 * Copyright (c) Cryptoapi developers.
10 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
38 (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x)
42 u32 a, b, c, d; in md5_transform() local
44 a = hash[0]; in md5_transform()
46 c = hash[2]; in md5_transform()
49 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform()
50 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform()
51 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform()
52 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform()
[all …]
Dsm3.c1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * SM3 secure hash, as specified by OSCCA GM/T 0004-2012 SM3 and described
4 * at https://datatracker.ietf.org/doc/html/draft-sca-cfrg-sm3-02
6 * Copyright (C) 2017 ARM Limited or its affiliates.
7 * Copyright (C) 2017 Gilad Ben-Yossef <gilad@benyossef.com>
8 * Copyright (C) 2021 Tianjia Zhang <tianjia.zhang@linux.alibaba.com>
35 * Transform the message X which consists of 16 32-bit-words. See
36 * GM/T 004-2012 for details.
38 #define R(i, a, b, c, d, e, f, g, h, t, w1, w2) \ argument
40 ss1 = rol32((rol32((a), 12) + (e) + (t)), 7); \
[all …]
/Linux-v6.1/tools/perf/pmu-events/arch/x86/ivytown/
Duncore-power.json7a fixed 800 MHz clock. This event counts the number of pclk cycles measured while the counter was…
11 "BriefDescription": "Core 0 C State Transition Cycles",
16 …"PublicDescription": "Number of cycles spent performing core C state transitions. There is one ev…
20 "BriefDescription": "Core 10 C State Transition Cycles",
25 …"PublicDescription": "Number of cycles spent performing core C state transitions. There is one ev…
29 "BriefDescription": "Core 11 C State Transition Cycles",
34 …"PublicDescription": "Number of cycles spent performing core C state transitions. There is one ev…
38 "BriefDescription": "Core 12 C State Transition Cycles",
43 …"PublicDescription": "Number of cycles spent performing core C state transitions. There is one ev…
47 "BriefDescription": "Core 13 C State Transition Cycles",
[all …]
/Linux-v6.1/fs/ubifs/
Dauth.c1 // SPDX-License-Identifier: GPL-2.0
5 * Copyright (C) 2018 Pengutronix, Sascha Hauer <s.hauer@pengutronix.de>
16 #include <keys/user-type.h>
17 #include <keys/asymmetric-type.h>
22 * ubifs_node_calc_hash - calculate the hash of a UBIFS node
23 * @c: UBIFS file-system description object
24 * @node: the node to calculate a hash for
27 * Returns 0 for success or a negative error code otherwise.
29 int __ubifs_node_calc_hash(const struct ubifs_info *c, const void *node, in __ubifs_node_calc_hash() argument
34 return crypto_shash_tfm_digest(c->hash_tfm, node, le32_to_cpu(ch->len), in __ubifs_node_calc_hash()
[all …]
/Linux-v6.1/scripts/mod/
Dsumversion.c23 * Copyright (c) Andrew Tridgell 1997-1998.
25 * Copyright (c) Cryptoapi developers.
26 * Copyright (c) 2002 David S. Miller (davem@redhat.com)
27 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au>
49 return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); in lshift()
67 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument
68 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (uint32_t)0x5A827999,s)) argument
69 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (uint32_t)0x6ED9EBA1,s)) argument
74 while (words--) { in le32_to_cpu_array()
82 while (words--) { in cpu_to_le32_array()
[all …]
/Linux-v6.1/arch/x86/crypto/
Dsha1_ssse3_asm.S1 /* SPDX-License-Identifier: GPL-2.0-or-later */
3 * This is a SIMD SHA-1 implementation. It requires the Intel(R) Supplemental
17 …* http://software.intel.com/en-us/articles/improving-the-performance-of-the-secure-hash-algorith…
19 * Copyright (C) 2010, Intel Corp.
61 /* we keep window of 64 w[i]+K pre-calculated values in a circular buffer */
66 * This macro implements the SHA-1 function's body for single 64-byte block
108 * This macro implements 80 rounds of SHA-1 for one 64-byte block
113 mov (HASH_PTR), A
115 mov 8(HASH_PTR), C
127 RR F1,A,B,C,D,E,0
[all …]
/Linux-v6.1/Documentation/driver-api/
Dvme.rst5 -------------------
9 achieved via a call to :c:func:`vme_register_driver`.
11 A pointer to a structure of type :c:type:`struct vme_driver <vme_driver>` must
16 :c:type:`struct vme_driver <vme_driver>` should be correctly set. The '.name'
17 element is a pointer to a string holding the device driver's name.
20 with the driver. The match function should return 1 if a device should be
21 probed and 0 otherwise. This example match function (from vme_user.c) limits
24 .. code-block:: c
30 if (vdev->id.num >= USER_BUS_MAX)
35 The '.probe' element should contain a pointer to the probe routine. The
[all …]
Ddevice_link.rst8 that are borne out of a parent/child relationship within the device
13 Sometimes there is a need to represent device dependencies beyond the
18 dependencies, i.e. that one device must be bound to a driver before
21 Often these two dependency types come together, so a device depends on
27 In its standard or *managed* form, a device link combines *both* dependency
28 types: It guarantees correct suspend/resume and shutdown ordering between a
31 supplier is bound to a driver, and they're unbound before the supplier
48 :c:func:`device_add()` has been called for the supplier and
49 :c:func:`device_initialize()` has been called for the consumer.
52 remains in a consistent state: E.g. a device link cannot be added in
[all …]
/Linux-v6.1/Documentation/userspace-api/media/v4l/
Dvidioc-g-ext-ctrls.rst1 .. SPDX-License-Identifier: GFDL-1.1-no-invariants-or-later
2 .. c:namespace:: V4L
13 VIDIOC_G_EXT_CTRLS - VIDIOC_S_EXT_CTRLS - VIDIOC_TRY_EXT_CTRLS - Get or set the value of several co…
18 .. c:macro:: VIDIOC_G_EXT_CTRLS
22 .. c:macro:: VIDIOC_S_EXT_CTRLS
26 .. c:macro:: VIDIOC_TRY_EXT_CTRLS
34 File descriptor returned by :c:func:`open()`.
37 Pointer to struct :c:type:`v4l2_ext_controls`.
44 :ref:`ctrl-class`) and all controls in the control array must belong
49 :c:type:`v4l2_ext_controls`, and initialize the
[all …]
/Linux-v6.1/Documentation/driver-api/media/
Dv4l2-subdev.rst1 .. SPDX-License-Identifier: GPL-2.0
3 V4L2 sub-devices
4 ----------------
6 Many drivers need to communicate with sub-devices. These devices can do all
8 encoding or decoding. For webcams common sub-devices are sensors and camera
12 driver with a consistent interface to these sub-devices the
13 :c:type:`v4l2_subdev` struct (v4l2-subdev.h) was created.
15 Each sub-device driver must have a :c:type:`v4l2_subdev` struct. This struct
16 can be stand-alone for simple sub-devices or it might be embedded in a larger
17 struct if more state information needs to be stored. Usually there is a
[all …]
Dmc-core.rst1 .. SPDX-License-Identifier: GPL-2.0
4 ------------------------
11 on the kernel-side implementation of the media framework.
16 Discovering a device internal topology, and configuring it at runtime, is one
21 An entity is a basic media hardware building block. It can correspond to
22 a large variety of logical blocks such as physical hardware devices
23 (CMOS sensor for instance), logical hardware devices (a building block
24 in a System-on-Chip image processing pipeline), DMA channels or physical
27 A pad is a connection endpoint through which an entity can interact with
32 A link is a point-to-point oriented connection between two pads, either
[all …]
Dv4l2-device.rst1 .. SPDX-License-Identifier: GPL-2.0
4 --------------------
6 Each device instance is represented by a struct v4l2_device.
8 would embed this struct inside a larger struct.
12 :c:func:`v4l2_device_register <v4l2_device_register>`
13 (dev, :c:type:`v4l2_dev <v4l2_device>`).
15 Registration will initialize the :c:type:`v4l2_device` struct. If the
16 dev->driver_data field is ``NULL``, it will be linked to
17 :c:type:`v4l2_dev <v4l2_device>` argument.
20 dev->driver_data manually to point to the driver-specific device structure
[all …]
/Linux-v6.1/arch/sparc/crypto/
Dopcodes.h1 /* SPDX-License-Identifier: GPL-2.0 */
18 #define CRC32C(a,b,c) \ argument
19 .word (F3F(2,0x36,0x147)|RS1(a)|RS2(b)|RD(c));
30 #define AES_EROUND01(a,b,c,d) \ argument
31 .word (F3F(2, 0x19, 0)|RS1(a)|RS2(b)|RS3(c)|RD(d));
32 #define AES_EROUND23(a,b,c,d) \ argument
33 .word (F3F(2, 0x19, 1)|RS1(a)|RS2(b)|RS3(c)|RD(d));
34 #define AES_DROUND01(a,b,c,d) \ argument
35 .word (F3F(2, 0x19, 2)|RS1(a)|RS2(b)|RS3(c)|RD(d));
36 #define AES_DROUND23(a,b,c,d) \ argument
[all …]
/Linux-v6.1/lib/crypto/
Ddes.c1 // SPDX-License-Identifier: GPL-2.0-or-later
7 * Copyright (c) 2005 Dag Arne Osvik <da@osvik.no>
360 /* S-box lookup tables */
582 #define ROUND(L, R, A, B, K, d) \ argument
583 B = K[0]; A = K[1]; K += d; \
584 B ^= R; A ^= R; \
585 B &= 0x3f3f3f3f; ROR(A, 4); \
586 L ^= S8[0xff & B]; A &= 0x3f3f3f3f; \
588 L ^= S7[0xff & A]; \
589 L ^= S5[0xff & (A >> 8)]; A >>= 16; \
[all …]
/Linux-v6.1/Documentation/admin-guide/cgroup-v1/
Ddevices.rst8 Implement a cgroup to track and enforce open and mknod restrictions
9 on device files. A device cgroup associates a device access
10 whitelist with each cgroup. A whitelist entry has 4 fields.
11 'type' is a (all), c (char), or b (block). 'all' means it applies
13 either an integer or * for all. Access is a composition of r
16 The root device cgroup starts with rwm to 'all'. A child device
17 cgroup gets a copy of the parent. Administrators can then remove
18 devices from the whitelist or add new entries. A child cgroup can
19 never receive a device access which is denied by its parent.
27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow
[all …]
/Linux-v6.1/Documentation/kernel-hacking/
Dhacking.rst14 requirements for kernel code: its goal is to serve as a primer for Linux
15 kernel development for experienced C programmers. I avoid implementation
20 this document, being grossly under-qualified, but I always wanted to
21 read it, and this was the only way. I hope it will grow into a
28 At any time each of the CPUs in a system can be:
30 - not associated with any process, serving a hardware interrupt;
32 - not associated with any process, serving a softirq or tasklet;
34 - running in kernel space, associated with a process (user context);
36 - running a process in user space.
39 other, but above that is a strict hierarchy: each can only be preempted
[all …]
/Linux-v6.1/tools/testing/selftests/drivers/net/mlxsw/
Ddevlink_trap_control.sh2 # SPDX-License-Identifier: GPL-2.0
4 # Test devlink-trap control trap functionality over mlxsw. Each registered
8 # +---------------------------------+
16 # +----|----------------------------+
18 # +----|----------------------------------------------------------------------+
28 # +----|----------------------------------------------------------------------+
30 # +----|----------------------------+
38 # +---------------------------------+
96 ip -4 route add default vrf v$h1 nexthop via 192.0.2.2
97 ip -6 route add default vrf v$h1 nexthop via 2001:db8:1::2
[all …]
/Linux-v6.1/arch/microblaze/include/asm/
Dhash.h1 /* SPDX-License-Identifier: GPL-2.0 */
8 * a supported configuration.
10 * With just a barrel shifter, we can implement an efficient constant
11 * multiply using shifts and adds. GCC can find a 9-step solution, but
12 * this 6-step solution was found by Yevgen Voronenko's implementation
15 * That software is really not designed for a single multiplier this large,
17 * 6-shift, 6-add sequences for computing x * 0x61C88647. They are all
18 * c = (x << 19) + x;
19 * a = (x << 9) + c;
20 * b = (x << 23) + a;
[all …]

12345678910>>...46