| /kernel/linux/linux-6.6/Documentation/networking/ |
| D | tls-offload-layers.svg | 1 …q0.5625 -1.03125 1.03125 -1.359375q0.484375 -0.328125 1.0625 -0.328125q0.828125 0 1.6875 0.53125l-…
|
| D | tls-offload-reorder-good.svg | 1 …q0.28125 1.40625 0.953125 2.015625q0.6875 0.609375 1.65625 0.609375q1.15625 0 1.953125 -0.796875q0…
|
| D | tls-offload-reorder-bad.svg | 1 …q0.28125 1.40625 0.953125 2.015625q0.6875 0.609375 1.65625 0.609375q1.15625 0 1.953125 -0.796875q0…
|
| /kernel/linux/linux-5.10/Documentation/networking/ |
| D | tls-offload-layers.svg | 1 …q0.5625 -1.03125 1.03125 -1.359375q0.484375 -0.328125 1.0625 -0.328125q0.828125 0 1.6875 0.53125l-…
|
| D | tls-offload-reorder-bad.svg | 1 …q0.28125 1.40625 0.953125 2.015625q0.6875 0.609375 1.65625 0.609375q1.15625 0 1.953125 -0.796875q0…
|
| D | tls-offload-reorder-good.svg | 1 …q0.28125 1.40625 0.953125 2.015625q0.6875 0.609375 1.65625 0.609375q1.15625 0 1.953125 -0.796875q0…
|
| /kernel/linux/linux-5.10/arch/arm/crypto/ |
| D | aes-ce-core.S | 27 enc_round q0, \key1 28 enc_round q0, \key2 32 dec_round q0, \key1 33 dec_round q0, \key2 37 enc_round q0, \key1 38 aese.8 q0, \key2 39 veor q0, q0, \key3 43 dec_round q0, \key1 44 aesd.8 q0, \key2 45 veor q0, q0, \key3 [all …]
|
| D | chacha-neon-core.S | 59 * registers q0-q3. It performs matrix operations on four words in parallel, 73 vadd.i32 q0, q0, q1 74 veor q3, q3, q0 84 vadd.i32 q0, q0, q1 85 veor q3, q3, q0 103 vadd.i32 q0, q0, q1 104 veor q3, q3, q0 114 vadd.i32 q0, q0, q1 115 veor q3, q3, q0 147 vld1.32 {q0-q1}, [r0] [all …]
|
| D | curve25519-core.S | 25 vmov.i32 q0, #1 26 vshr.u64 q1, q0, #7 27 vshr.u64 q0, q0, #8 101 vadd.i64 q14, q5, q0 104 vadd.i64 q15, q11, q0 119 vadd.i64 q15, q7, q0 126 vadd.i64 q14, q3, q0 140 vadd.i64 q0, q9, q0 145 vshr.s64 q0, q0, #25 147 vadd.i64 q6, q10, q0 [all …]
|
| D | crct10dif-ce-core.S | 167 vld1.64 {q0-q1}, [buf]! 171 CPU_LE( vrev64.8 q0, q0 ) 200 // While >= 128 data bytes remain (not counting q0-q7), fold the 128 201 // bytes q0-q7 into them, storing the result back into q0-q7. 203 fold_32_bytes q0, q1 210 // Now fold the 112 bytes in q0-q6 into the 16 bytes in q7. 214 fold_16_bytes q0, q4 237 vld1.64 {q0}, [buf]! 238 CPU_LE( vrev64.8 q0, q0 ) 240 veor.8 q7, q7, q0 [all …]
|
| D | aes-neonbs-core.S | 454 vtst.8 q0, q7, q8 463 vmvn q0, q0 469 vst1.8 {q0-q1}, [r0, :256]! 488 veor q10, q0, q9 // xor with round0 key 490 __tbl q0, q10, q8 505 bitslice q0, q1, q2, q3, q4, q5, q6, q7, q8, q9, q10, q11 517 shift_rows q0, q1, q2, q3, q4, q5, q6, q7, q8, q9, q10, q11, q12 519 sbox q0, q1, q2, q3, q4, q5, q6, q7, q8, q9, q10, q11, q12, \ 524 mix_cols q0, q1, q4, q6, q3, q7, q2, q5, q8, q9, q10, q11, q12, \ 534 bitslice q0, q1, q4, q6, q3, q7, q2, q5, q8, q9, q10, q11 [all …]
|
| /kernel/linux/linux-6.6/arch/arm/crypto/ |
| D | aes-ce-core.S | 27 enc_round q0, \key1 28 enc_round q0, \key2 32 dec_round q0, \key1 33 dec_round q0, \key2 37 enc_round q0, \key1 38 aese.8 q0, \key2 39 veor q0, q0, \key3 43 dec_round q0, \key1 44 aesd.8 q0, \key2 45 veor q0, q0, \key3 [all …]
|
| D | chacha-neon-core.S | 60 * registers q0-q3. It performs matrix operations on four words in parallel, 74 vadd.i32 q0, q0, q1 75 veor q3, q3, q0 85 vadd.i32 q0, q0, q1 86 veor q3, q3, q0 104 vadd.i32 q0, q0, q1 105 veor q3, q3, q0 115 vadd.i32 q0, q0, q1 116 veor q3, q3, q0 148 vld1.32 {q0-q1}, [r0] [all …]
|
| D | curve25519-core.S | 25 vmov.i32 q0, #1 26 vshr.u64 q1, q0, #7 27 vshr.u64 q0, q0, #8 101 vadd.i64 q14, q5, q0 104 vadd.i64 q15, q11, q0 119 vadd.i64 q15, q7, q0 126 vadd.i64 q14, q3, q0 140 vadd.i64 q0, q9, q0 145 vshr.s64 q0, q0, #25 147 vadd.i64 q6, q10, q0 [all …]
|
| D | crct10dif-ce-core.S | 167 vld1.64 {q0-q1}, [buf]! 171 CPU_LE( vrev64.8 q0, q0 ) 200 // While >= 128 data bytes remain (not counting q0-q7), fold the 128 201 // bytes q0-q7 into them, storing the result back into q0-q7. 203 fold_32_bytes q0, q1 210 // Now fold the 112 bytes in q0-q6 into the 16 bytes in q7. 214 fold_16_bytes q0, q4 237 vld1.64 {q0}, [buf]! 238 CPU_LE( vrev64.8 q0, q0 ) 240 veor.8 q7, q7, q0 [all …]
|
| D | aes-neonbs-core.S | 454 vtst.8 q0, q7, q8 463 vmvn q0, q0 469 vst1.8 {q0-q1}, [r0, :256]! 488 veor q10, q0, q9 // xor with round0 key 490 __tbl q0, q10, q8 505 bitslice q0, q1, q2, q3, q4, q5, q6, q7, q8, q9, q10, q11 517 shift_rows q0, q1, q2, q3, q4, q5, q6, q7, q8, q9, q10, q11, q12 519 sbox q0, q1, q2, q3, q4, q5, q6, q7, q8, q9, q10, q11, q12, \ 524 mix_cols q0, q1, q4, q6, q3, q7, q2, q5, q8, q9, q10, q11, q12, \ 534 bitslice q0, q1, q4, q6, q3, q7, q2, q5, q8, q9, q10, q11 [all …]
|
| D | blake2b-neon-core.S | 64 // NEON registers q0-q7. The message block is in q8..q15 (M_0-M_15). The stack 77 vadd.u64 q0, q0, q2 85 veor q6, q6, q0 111 vadd.u64 q0, q0, q2 120 veor q6, q6, q0 259 vld1.64 {q0-q1}, [ip]! // Load h[0..3] 275 // entire state matrix in q0-q7 and the entire message block in q8-15. 315 veor q0, q0, q4 // v[0..1] ^= v[8..9] 320 veor q0, q0, q8 // v[0..1] ^= h[0..1] 324 vst1.64 {q0-q1}, [ip]! // Store new h[0..3]
|
| /kernel/linux/linux-6.6/arch/arm/include/asm/ |
| D | div64.h | 61 asm ( "umull %Q0, %R0, %Q1, %Q2\n\t" in __arch_xprod_64() 62 "mov %Q0, #0" in __arch_xprod_64() 68 asm ( "umlal %Q0, %R0, %Q1, %Q2\n\t" in __arch_xprod_64() 69 "mov %Q0, #0" in __arch_xprod_64() 74 asm ( "umull %Q0, %R0, %Q2, %Q3\n\t" in __arch_xprod_64() 75 "cmn %Q0, %Q2\n\t" in __arch_xprod_64() 77 "adc %Q0, %1, #0" in __arch_xprod_64() 84 asm ( "umlal %R0, %Q0, %R1, %Q2\n\t" in __arch_xprod_64() 85 "umlal %R0, %Q0, %Q1, %R2\n\t" in __arch_xprod_64() 87 "umlal %Q0, %R0, %R1, %R2" in __arch_xprod_64() [all …]
|
| /kernel/linux/linux-5.10/arch/arm/include/asm/ |
| D | div64.h | 81 asm ( "umull %Q0, %R0, %Q1, %Q2\n\t" in __arch_xprod_64() 82 "mov %Q0, #0" in __arch_xprod_64() 88 asm ( "umlal %Q0, %R0, %Q1, %Q2\n\t" in __arch_xprod_64() 89 "mov %Q0, #0" in __arch_xprod_64() 94 asm ( "umull %Q0, %R0, %Q2, %Q3\n\t" in __arch_xprod_64() 95 "cmn %Q0, %Q2\n\t" in __arch_xprod_64() 97 "adc %Q0, %1, #0" in __arch_xprod_64() 104 asm ( "umlal %R0, %Q0, %R1, %Q2\n\t" in __arch_xprod_64() 105 "umlal %R0, %Q0, %Q1, %R2\n\t" in __arch_xprod_64() 107 "umlal %Q0, %R0, %R1, %R2" in __arch_xprod_64() [all …]
|
| /kernel/linux/linux-6.6/arch/powerpc/math-emu/ |
| D | udivmodti4.c | 14 _FP_W_TYPE q0, q1, r0, r1; in _fp_udivmodti4() local 24 udiv_qrnnd (q0, n0, n1, n0, d0); in _fp_udivmodti4() 37 udiv_qrnnd (q0, n0, n1, n0, d0); in _fp_udivmodti4() 63 udiv_qrnnd (q0, n0, n1, n0, d0); in _fp_udivmodti4() 107 udiv_qrnnd (q0, n0, n1, n0, d0); in _fp_udivmodti4() 122 q0 = 0; in _fp_udivmodti4() 138 quotient digit q0 = 0 or 1). in _fp_udivmodti4() 146 q0 = 1; in _fp_udivmodti4() 150 q0 = 0; in _fp_udivmodti4() 171 udiv_qrnnd (q0, n1, n2, n1, d1); in _fp_udivmodti4() [all …]
|
| /kernel/linux/linux-5.10/arch/powerpc/math-emu/ |
| D | udivmodti4.c | 14 _FP_W_TYPE q0, q1, r0, r1; in _fp_udivmodti4() local 24 udiv_qrnnd (q0, n0, n1, n0, d0); in _fp_udivmodti4() 37 udiv_qrnnd (q0, n0, n1, n0, d0); in _fp_udivmodti4() 63 udiv_qrnnd (q0, n0, n1, n0, d0); in _fp_udivmodti4() 107 udiv_qrnnd (q0, n0, n1, n0, d0); in _fp_udivmodti4() 122 q0 = 0; in _fp_udivmodti4() 138 quotient digit q0 = 0 or 1). in _fp_udivmodti4() 146 q0 = 1; in _fp_udivmodti4() 150 q0 = 0; in _fp_udivmodti4() 171 udiv_qrnnd (q0, n1, n2, n1, d1); in _fp_udivmodti4() [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/arm64/fp/ |
| D | sve-ptrace-asm.S | 14 str q0, [x1] 18 str q0, [x1, #0x10] 21 str q0, [x1, #0x20] 25 str q0, [x1, #0x30] 28 str q0, [x1, #0x40]
|
| /kernel/linux/linux-5.10/crypto/ |
| D | twofish_common.c | 43 /* These two tables are the q0 and q1 permutations, exactly as described in 46 static const u8 q0[256] = { variable 96 /* These MDS tables are actually tables of MDS composed with q0 and q1, 102 * mds[0][i] = MDS (q1[i] 0 0 0)^T mds[1][i] = MDS (0 q0[i] 0 0)^T 103 * mds[2][i] = MDS (0 0 q1[i] 0)^T mds[3][i] = MDS (0 0 0 q0[i])^T 395 * S-box entries, preprocessed through q0 and q1. */ 480 * are the index numbers preprocessed through the q0 and q1 tables 484 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \ 485 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \ 492 ctx->s[0][i] = mds[0][q0[q0[(b) ^ sa] ^ se] ^ si]; \ [all …]
|
| /kernel/linux/linux-6.6/crypto/ |
| D | twofish_common.c | 43 /* These two tables are the q0 and q1 permutations, exactly as described in 46 static const u8 q0[256] = { variable 96 /* These MDS tables are actually tables of MDS composed with q0 and q1, 102 * mds[0][i] = MDS (q1[i] 0 0 0)^T mds[1][i] = MDS (0 q0[i] 0 0)^T 103 * mds[2][i] = MDS (0 0 q1[i] 0)^T mds[3][i] = MDS (0 0 0 q0[i])^T 395 * S-box entries, preprocessed through q0 and q1. */ 480 * are the index numbers preprocessed through the q0 and q1 tables 484 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \ 485 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \ 492 ctx->s[0][i] = mds[0][q0[q0[(b) ^ sa] ^ se] ^ si]; \ [all …]
|
| /kernel/liteos_a/lib/libc/musl/src/arch/arm/ |
| D | memset.S | 55 vdup.8 q0, r1 75 vmov q1, q0 76 vmov q2, q0 79 vmov q3, q0
|