| /kernel/linux/linux-6.6/net/ceph/crush/ |
| D | hash.c | 1 // SPDX-License-Identifier: GPL-2.0 9 * Robert Jenkins' function for mixing 32-bit values 11 * a, b = random bits, c = input and output 13 #define crush_hashmix(a, b, c) do { \ argument 14 a = a-b; a = a-c; a = a^(c>>13); \ 15 b = b-c; b = b-a; b = b^(a<<8); \ 16 c = c-a; c = c-b; c = c^(b>>13); \ 17 a = a-b; a = a-c; a = a^(c>>12); \ 18 b = b-c; b = b-a; b = b^(a<<16); \ 19 c = c-a; c = c-b; c = c^(b>>5); \ [all …]
|
| /kernel/linux/linux-5.10/net/ceph/crush/ |
| D | hash.c | 1 // SPDX-License-Identifier: GPL-2.0 9 * Robert Jenkins' function for mixing 32-bit values 11 * a, b = random bits, c = input and output 13 #define crush_hashmix(a, b, c) do { \ argument 14 a = a-b; a = a-c; a = a^(c>>13); \ 15 b = b-c; b = b-a; b = b^(a<<8); \ 16 c = c-a; c = c-b; c = c^(b>>13); \ 17 a = a-b; a = a-c; a = a^(c>>12); \ 18 b = b-c; b = b-a; b = b^(a<<16); \ 19 c = c-a; c = c-b; c = c^(b>>5); \ [all …]
|
| /kernel/linux/linux-6.6/net/ceph/ |
| D | ceph_hash.c | 10 #define mix(a, b, c) \ argument 12 a = a - b; a = a - c; a = a ^ (c >> 13); \ 13 b = b - c; b = b - a; b = b ^ (a << 8); \ 14 c = c - a; c = c - b; c = c ^ (b >> 13); \ 15 a = a - b; a = a - c; a = a ^ (c >> 12); \ 16 b = b - c; b = b - a; b = b ^ (a << 16); \ 17 c = c - a; c = c - b; c = c ^ (b >> 5); \ 18 a = a - b; a = a - c; a = a ^ (c >> 3); \ 19 b = b - c; b = b - a; b = b ^ (a << 10); \ 20 c = c - a; c = c - b; c = c ^ (b >> 15); \ [all …]
|
| /kernel/linux/linux-5.10/net/ceph/ |
| D | ceph_hash.c | 10 #define mix(a, b, c) \ argument 12 a = a - b; a = a - c; a = a ^ (c >> 13); \ 13 b = b - c; b = b - a; b = b ^ (a << 8); \ 14 c = c - a; c = c - b; c = c ^ (b >> 13); \ 15 a = a - b; a = a - c; a = a ^ (c >> 12); \ 16 b = b - c; b = b - a; b = b ^ (a << 16); \ 17 c = c - a; c = c - b; c = c ^ (b >> 5); \ 18 a = a - b; a = a - c; a = a ^ (c >> 3); \ 19 b = b - c; b = b - a; b = b ^ (a << 10); \ 20 c = c - a; c = c - b; c = c ^ (b >> 15); \ [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
| D | test_jhash.h | 1 // SPDX-License-Identifier: GPL-2.0 2 // Copyright (c) 2019 Facebook 9 return (word << shift) | (word >> ((-shift) & 31)); in rol32() 12 #define __jhash_mix(a, b, c) \ argument 14 a -= c; a ^= rol32(c, 4); c += b; \ 15 b -= a; b ^= rol32(a, 6); a += c; \ 16 c -= b; c ^= rol32(b, 8); b += a; \ 17 a -= c; a ^= rol32(c, 16); c += b; \ 18 b -= a; b ^= rol32(a, 19); a += c; \ 19 c -= b; c ^= rol32(b, 4); b += a; \ [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
| D | test_jhash.h | 1 // SPDX-License-Identifier: GPL-2.0 2 // Copyright (c) 2019 Facebook 9 return (word << shift) | (word >> ((-shift) & 31)); in rol32() 12 #define __jhash_mix(a, b, c) \ argument 14 a -= c; a ^= rol32(c, 4); c += b; \ 15 b -= a; b ^= rol32(a, 6); a += c; \ 16 c -= b; c ^= rol32(b, 8); b += a; \ 17 a -= c; a ^= rol32(c, 16); c += b; \ 18 b -= a; b ^= rol32(a, 19); a += c; \ 19 c -= b; c ^= rol32(b, 4); b += a; \ [all …]
|
| /kernel/linux/linux-6.6/fs/smb/common/ |
| D | cifs_md4.c | 1 // SPDX-License-Identifier: GPL-2.0 12 * Copyright (c) Andrew Tridgell 1997-1998. 14 * Copyright (c) Cryptoapi developers. 15 * Copyright (c) 2002 David S. Miller (davem@redhat.com) 16 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 32 return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); in lshift() 50 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 51 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 52 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument 56 u32 a, b, c, d; in md4_transform() local [all …]
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | jhash.h | 6 * Copyright (C) 2006. Bob Jenkins (bob_jenkins@burtleburtle.net) 12 * lookup3.c, by Bob Jenkins, May 2006, Public Domain. 14 * These are functions for producing 32-bit hashes for hash table lookup. 20 * Copyright (C) 2009-2010 Jozsef Kadlecsik (kadlec@netfilter.org) 32 #define jhash_mask(n) (jhash_size(n)-1) 34 /* __jhash_mix -- mix 3 32-bit values reversibly. */ 35 #define __jhash_mix(a, b, c) \ argument 37 a -= c; a ^= rol32(c, 4); c += b; \ 38 b -= a; b ^= rol32(a, 6); a += c; \ 39 c -= b; c ^= rol32(b, 8); b += a; \ [all …]
|
| /kernel/linux/linux-6.6/tools/include/linux/ |
| D | jhash.h | 6 * Copyright (C) 2006. Bob Jenkins (bob_jenkins@burtleburtle.net) 12 * lookup3.c, by Bob Jenkins, May 2006, Public Domain. 14 * These are functions for producing 32-bit hashes for hash table lookup. 20 * Copyright (C) 2009-2010 Jozsef Kadlecsik (kadlec@blackhole.kfki.hu) 32 #define jhash_mask(n) (jhash_size(n)-1) 34 /* __jhash_mix -- mix 3 32-bit values reversibly. */ 35 #define __jhash_mix(a, b, c) \ argument 37 a -= c; a ^= rol32(c, 4); c += b; \ 38 b -= a; b ^= rol32(a, 6); a += c; \ 39 c -= b; c ^= rol32(b, 8); b += a; \ [all …]
|
| /kernel/linux/linux-5.10/tools/include/linux/ |
| D | jhash.h | 6 * Copyright (C) 2006. Bob Jenkins (bob_jenkins@burtleburtle.net) 12 * lookup3.c, by Bob Jenkins, May 2006, Public Domain. 14 * These are functions for producing 32-bit hashes for hash table lookup. 20 * Copyright (C) 2009-2010 Jozsef Kadlecsik (kadlec@blackhole.kfki.hu) 32 #define jhash_mask(n) (jhash_size(n)-1) 34 /* __jhash_mix -- mix 3 32-bit values reversibly. */ 35 #define __jhash_mix(a, b, c) \ argument 37 a -= c; a ^= rol32(c, 4); c += b; \ 38 b -= a; b ^= rol32(a, 6); a += c; \ 39 c -= b; c ^= rol32(b, 8); b += a; \ [all …]
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | jhash.h | 6 * Copyright (C) 2006. Bob Jenkins (bob_jenkins@burtleburtle.net) 12 * lookup3.c, by Bob Jenkins, May 2006, Public Domain. 14 * These are functions for producing 32-bit hashes for hash table lookup. 20 * Copyright (C) 2009-2010 Jozsef Kadlecsik (kadlec@netfilter.org) 32 #define jhash_mask(n) (jhash_size(n)-1) 34 /* __jhash_mix -- mix 3 32-bit values reversibly. */ 35 #define __jhash_mix(a, b, c) \ argument 37 a -= c; a ^= rol32(c, 4); c += b; \ 38 b -= a; b ^= rol32(a, 6); a += c; \ 39 c -= b; c ^= rol32(b, 8); b += a; \ [all …]
|
| /kernel/linux/linux-5.10/crypto/ |
| D | md4.c | 11 * Copyright (c) Andrew Tridgell 1997-1998. 13 * Copyright (c) Cryptoapi developers. 14 * Copyright (c) 2002 David S. Miller (davem@redhat.com) 15 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 45 return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); in lshift() 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument 69 u32 a, b, c, d; in md4_transform() local 71 a = hash[0]; in md4_transform() [all …]
|
| D | md5.c | 9 * Copyright (c) Cryptoapi developers. 10 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 38 (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x) 42 u32 a, b, c, d; in md5_transform() local 44 a = hash[0]; in md5_transform() 46 c = hash[2]; in md5_transform() 49 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform() 50 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform() 51 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform() 52 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform() [all …]
|
| /kernel/linux/linux-6.6/crypto/ |
| D | md4.c | 11 * Copyright (c) Andrew Tridgell 1997-1998. 13 * Copyright (c) Cryptoapi developers. 14 * Copyright (c) 2002 David S. Miller (davem@redhat.com) 15 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 45 return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); in lshift() 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument 69 u32 a, b, c, d; in md4_transform() local 71 a = hash[0]; in md4_transform() [all …]
|
| D | md5.c | 9 * Copyright (c) Cryptoapi developers. 10 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 38 (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x) 42 u32 a, b, c, d; in md5_transform() local 44 a = hash[0]; in md5_transform() 46 c = hash[2]; in md5_transform() 49 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform() 50 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform() 51 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform() 52 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform() [all …]
|
| D | sm3.c | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * SM3 secure hash, as specified by OSCCA GM/T 0004-2012 SM3 and described 4 * at https://datatracker.ietf.org/doc/html/draft-sca-cfrg-sm3-02 6 * Copyright (C) 2017 ARM Limited or its affiliates. 7 * Copyright (C) 2017 Gilad Ben-Yossef <gilad@benyossef.com> 8 * Copyright (C) 2021 Tianjia Zhang <tianjia.zhang@linux.alibaba.com> 35 * Transform the message X which consists of 16 32-bit-words. See 36 * GM/T 004-2012 for details. 38 #define R(i, a, b, c, d, e, f, g, h, t, w1, w2) \ argument 40 ss1 = rol32((rol32((a), 12) + (e) + (t)), 7); \ [all …]
|
| /kernel/linux/linux-6.6/tools/perf/pmu-events/arch/x86/ivytown/ |
| D | uncore-power.json | 6 …a fixed 800 MHz clock. This event counts the number of pclk cycles measured while the counter was… 10 "BriefDescription": "Core 0 C State Transition Cycles", 14 …"PublicDescription": "Number of cycles spent performing core C state transitions. There is one ev… 18 "BriefDescription": "Core 10 C State Transition Cycles", 22 …"PublicDescription": "Number of cycles spent performing core C state transitions. There is one ev… 26 "BriefDescription": "Core 11 C State Transition Cycles", 30 …"PublicDescription": "Number of cycles spent performing core C state transitions. There is one ev… 34 "BriefDescription": "Core 12 C State Transition Cycles", 38 …"PublicDescription": "Number of cycles spent performing core C state transitions. There is one ev… 42 "BriefDescription": "Core 13 C State Transition Cycles", [all …]
|
| /kernel/linux/linux-6.6/Documentation/userspace-api/media/v4l/ |
| D | vidioc-g-ext-ctrls.rst | 1 .. SPDX-License-Identifier: GFDL-1.1-no-invariants-or-later 2 .. c:namespace:: V4L 13 VIDIOC_G_EXT_CTRLS - VIDIOC_S_EXT_CTRLS - VIDIOC_TRY_EXT_CTRLS - Get or set the value of several co… 18 .. c:macro:: VIDIOC_G_EXT_CTRLS 22 .. c:macro:: VIDIOC_S_EXT_CTRLS 26 .. c:macro:: VIDIOC_TRY_EXT_CTRLS 34 File descriptor returned by :c:func:`open()`. 37 Pointer to struct :c:type:`v4l2_ext_controls`. 44 :ref:`ctrl-class`) and all controls in the control array must belong 49 :c:type:`v4l2_ext_controls`, and initialize the [all …]
|
| /kernel/linux/linux-5.10/fs/ubifs/ |
| D | auth.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * Copyright (C) 2018 Pengutronix, Sascha Hauer <s.hauer@pengutronix.de> 17 #include <keys/user-type.h> 18 #include <keys/asymmetric-type.h> 23 * ubifs_node_calc_hash - calculate the hash of a UBIFS node 24 * @c: UBIFS file-system description object 25 * @node: the node to calculate a hash for 28 * Returns 0 for success or a negative error code otherwise. 30 int __ubifs_node_calc_hash(const struct ubifs_info *c, const void *node, in __ubifs_node_calc_hash() argument 35 return crypto_shash_tfm_digest(c->hash_tfm, node, le32_to_cpu(ch->len), in __ubifs_node_calc_hash() [all …]
|
| /kernel/linux/linux-6.6/fs/ubifs/ |
| D | auth.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * Copyright (C) 2018 Pengutronix, Sascha Hauer <s.hauer@pengutronix.de> 16 #include <keys/user-type.h> 17 #include <keys/asymmetric-type.h> 22 * ubifs_node_calc_hash - calculate the hash of a UBIFS node 23 * @c: UBIFS file-system description object 24 * @node: the node to calculate a hash for 27 * Returns 0 for success or a negative error code otherwise. 29 int __ubifs_node_calc_hash(const struct ubifs_info *c, const void *node, in __ubifs_node_calc_hash() argument 34 return crypto_shash_tfm_digest(c->hash_tfm, node, le32_to_cpu(ch->len), in __ubifs_node_calc_hash() [all …]
|
| /kernel/linux/linux-6.6/scripts/mod/ |
| D | sumversion.c | 23 * Copyright (c) Andrew Tridgell 1997-1998. 25 * Copyright (c) Cryptoapi developers. 26 * Copyright (c) 2002 David S. Miller (davem@redhat.com) 27 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 49 return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); in lshift() 67 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 68 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (uint32_t)0x5A827999,s)) argument 69 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (uint32_t)0x6ED9EBA1,s)) argument 74 while (words--) { in le32_to_cpu_array() 82 while (words--) { in cpu_to_le32_array() [all …]
|
| /kernel/linux/linux-5.10/lib/crypto/ |
| D | sha256.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * SHA-256, as specified in 4 * http://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf 6 * SHA-256 code by Jean-Luc Cooke <jlcooke@certainkey.com>. 8 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 9 * Copyright (c) Andrew McDonald <andrew@mcdonald.org.uk> 10 * Copyright (c) 2002 James Morris <jmorris@intercode.com.au> 11 * Copyright (c) 2014 Red Hat Inc. 43 W[I] = s1(W[I-2]) + W[I-7] + s0(W[I-15]) + W[I-16]; in BLEND_OP() 48 u32 a, b, c, d, e, f, g, h, t1, t2; in sha256_transform() local [all …]
|
| /kernel/liteos_m/testsuites/unittest/posix/src/ctype/ |
| D | isxdigit_test.c | 2 * Copyright (c) 2013-2019 Huawei Technologies Co., Ltd. All rights reserved. 3 * Copyright (c) 2020-2021 Huawei Device Co., Ltd. All rights reserved. 21 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 41 …* @tc.desc : register a test suite, this suite is used to test basic flow and interface depen… 63 LOG("+-------------------------------------------+\n"); in PosixCTypeIsxdigitTestTearDown() 69 * @tc.name : Checks whether a parameter is a hexadecimal digit 70 * @tc.desc : [C- SOFTWARE -0200] 74 int a = '0'; variable 75 int ret = isxdigit(a); 77 LOG("[DEMO] posix ctype test case 1:isxdigit(%c) ok.\n", a); [all …]
|
| /kernel/linux/linux-5.10/arch/x86/crypto/ |
| D | sha1_ssse3_asm.S | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 3 * This is a SIMD SHA-1 implementation. It requires the Intel(R) Supplemental 17 …* http://software.intel.com/en-us/articles/improving-the-performance-of-the-secure-hash-algorith… 19 * Copyright (C) 2010, Intel Corp. 61 /* we keep window of 64 w[i]+K pre-calculated values in a circular buffer */ 66 * This macro implements the SHA-1 function's body for single 64-byte block 108 * This macro implements 80 rounds of SHA-1 for one 64-byte block 113 mov (HASH_PTR), A 115 mov 8(HASH_PTR), C 127 RR F1,A,B,C,D,E,0 [all …]
|
| /kernel/linux/linux-6.6/arch/x86/crypto/ |
| D | sha1_ssse3_asm.S | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 3 * This is a SIMD SHA-1 implementation. It requires the Intel(R) Supplemental 17 …* http://software.intel.com/en-us/articles/improving-the-performance-of-the-secure-hash-algorith… 19 * Copyright (C) 2010, Intel Corp. 62 /* we keep window of 64 w[i]+K pre-calculated values in a circular buffer */ 67 * This macro implements the SHA-1 function's body for single 64-byte block 109 * This macro implements 80 rounds of SHA-1 for one 64-byte block 114 mov (HASH_PTR), A 116 mov 8(HASH_PTR), C 128 RR F1,A,B,C,D,E,0 [all …]
|