/linux/kernel/bpf/preload/iterators/ |
H A D | iterators.lskel-little-endian.h | 27 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_map__attach() 29 if (fd > 0) in iterators_bpf__dump_bpf_map__attach() 38 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_prog__attach() 40 if (fd > 0) in iterators_bpf__dump_bpf_prog__attach() 48 int ret = 0; in iterators_bpf__attach() 50 ret = ret < 0 ? ret : iterators_bpf__dump_bpf_map__attach(skel); in iterators_bpf__attach() 51 ret = ret < 0 ? ret : iterators_bpf__dump_bpf_prog__attach(skel); in iterators_bpf__attach() 52 return ret < 0 ? ret : 0; in iterators_bpf__attach() 96 \0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ in iterators_bpf__load() 97 \0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ in iterators_bpf__load() [all …]
|
H A D | iterators.lskel-big-endian.h | 27 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_map__attach() 29 if (fd > 0) in iterators_bpf__dump_bpf_map__attach() 38 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_prog__attach() 40 if (fd > 0) in iterators_bpf__dump_bpf_prog__attach() 48 int ret = 0; in iterators_bpf__attach() 50 ret = ret < 0 ? ret : iterators_bpf__dump_bpf_map__attach(skel); in iterators_bpf__attach() 51 ret = ret < 0 ? ret : iterators_bpf__dump_bpf_prog__attach(skel); in iterators_bpf__attach() 52 return ret < 0 ? ret : 0; in iterators_bpf__attach() 93 \0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ in iterators_bpf__load() 94 \0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ in iterators_bpf__load() [all …]
|
/linux/crypto/ |
H A D | testmgr.h | 34 * @ksize: Length of @key in bytes (0 if no key) 101 * @crypt_error: When @novrfy=0, the expected error from encrypt(). When 229 "\x63\x1c\xcd\x7b\xe1\x7e\xe4\xde\xc9\xa8\x89\xa1\x74\xcb\x3c\x63" 247 "\x4E\xE0\xAA\xB1\x2D\x7B\x61\xA5\x1F\x52\x7A\x9A\x41\xF6\xC1\x68" 320 "\x9C\x84\xBA\xB7\xF9\x6C\x3A\x4F\x07\xFC\x45\xEB\x12\xE5\x7B\xFD" 326 "\x52\x41\xF4\xDA\x7B\xB7\x59\x55\xCA\xD4\x2F\x0F\x3A\xCB\xA4\x0D" 358 "\xBB\xDB\xD9\x8A\xCD\x05\xE1\xCC\x57\x7B\xF1\xF1\x1F\x11\x9D\xBA" 369 "\x56\xF4\xF3\xF8\x27\x0A\x7B\x42\x0D\x92\x70\x47\xE7\x42\x51\xA9" 373 "\xD4\xA6\xC5\x47\xDB\x20\x0E\xE5\xBD\x29\xD4\x7B\x1A\xF8\x41\x57" 378 "\x21\x79\x6D\xF9\xE9\x04\x6A\xE8\x32\xFF\xAE\xFD\x1C\x7B\x8C\x29" [all …]
|
H A D | hkdf.c | 41 * Returns 0 on success with the pseudorandom key stored in @prk, 71 * Returns 0 on success with output keying material stored in @okm, 90 for (i = 0; i < okmlen; i += hashlen) { in hkdf_expand() 122 err = 0; in hkdf_expand() 162 .prk = "\x07\x77\x09\x36\x2c\x2e\x32\xdf\x0d\xdc\x3f\x0d\xc4\x7b\xba\x63" 178 "\x70\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f" 205 .salt_size = 0, 207 .info_size = 0, 208 .prk = "\x19\xef\x24\xa3\x2c\x71\x7b\x16\x7f\x33\xa9\x1d\x6f\x64\x8b\xdf" 239 .info_size = 0, [all …]
|
/linux/drivers/gpu/drm/panel/ |
H A D | panel-samsung-s6e8aa0.c | 34 #define PANELCTL_SS_1_800 (0 << 5) 41 #define PANELCTL_CLK1_000 (0 << 3) 43 #define PANELCTL_CLK2_CON_MASK (7 << 0) 44 #define PANELCTL_CLK2_000 (0 << 0) 45 #define PANELCTL_CLK2_001 (1 << 0) 48 #define PANELCTL_INT1_000 (0 << 3) 50 #define PANELCTL_INT2_CON_MASK (7 << 0) 51 #define PANELCTL_INT2_000 (0 << 0) 52 #define PANELCTL_INT2_001 (1 << 0) 55 #define PANELCTL_BICTL_000 (0 << 3) [all …]
|
H A D | panel-samsung-s6e88a0-ams427ap24.c | 56 CANDELA_10CD, /* 0 */ 114 /* 0 */ 10, /* 10CD */ 171 { 0x03, 0x77 }, /* AOR 90.9%, 10CD */ 172 { 0x03, 0x73 }, /* AOR 90.5%, 11CD */ 173 { 0x03, 0x69 }, /* AOR 89.4%, 12CD */ 174 { 0x03, 0x65 }, /* AOR 89.0%, 13CD */ 175 { 0x03, 0x61 }, /* AOR 88.6%, 14CD */ 176 { 0x03, 0x55 }, /* AOR 87.4%, 15CD */ 177 { 0x03, 0x50 }, /* AOR 86.9%, 16CD */ 178 { 0x03, 0x45 }, /* AOR 85.8%, 17CD */ [all …]
|
/linux/drivers/gpio/ |
H A D | gpio-ts5500.c | 96 TS5500_DIO_IN_OUT(vaddr, vbitfrom + 0, caddr, cbit), \ 107 * 0x7b 0 0x7a 0 x x DIO1_0 1 0 108 * 0x7b 1 0x7a 0 x x DIO1_1 3 1 109 * 0x7b 2 0x7a 0 x x DIO1_2 5 2 110 * 0x7b 3 0x7a 0 x x DIO1_3 7 3 111 * 0x7b 4 0x7a 1 x x DIO1_4 9 4 112 * 0x7b 5 0x7a 1 x x DIO1_5 11 5 113 * 0x7b 6 0x7a 1 x x DIO1_6 13 6 114 * 0x7b 7 0x7a 1 x x DIO1_7 15 7 115 * 0x7c 0 0x7a 5 x x DIO1_8 4 8 [all …]
|
/linux/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/ |
H A D | gf100.c | 30 * The value 0xff represents an invalid storage type. 37 0x00, 0x01, 0x01, 0x01, 0x01, 0x01, 0xff, 0x01, /* 0x00 */ in gf100_mmu_kind() 38 0x01, 0x01, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, in gf100_mmu_kind() 39 0xff, 0x11, 0xff, 0xff, 0xff, 0xff, 0xff, 0x11, /* 0x10 */ in gf100_mmu_kind() 40 0x11, 0x11, 0x11, 0xff, 0xff, 0xff, 0xff, 0xff, in gf100_mmu_kind() 41 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x26, 0x27, /* 0x20 */ in gf100_mmu_kind() 42 0x28, 0x29, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, in gf100_mmu_kind() 43 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, /* 0x30 */ in gf100_mmu_kind() 44 0xff, 0xff, 0x26, 0x27, 0x28, 0x29, 0x26, 0x27, in gf100_mmu_kind() 45 0x28, 0x29, 0xff, 0xff, 0xff, 0xff, 0x46, 0xff, /* 0x40 */ in gf100_mmu_kind() [all …]
|
H A D | gm200.c | 34 0x00, 0x01, 0x01, 0x01, 0x01, 0x01, 0xff, 0x01, /* 0x00 */ in gm200_mmu_kind() 35 0x01, 0x01, 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, in gm200_mmu_kind() 36 0xff, 0x11, 0xff, 0xff, 0xff, 0xff, 0xff, 0x11, /* 0x10 */ in gm200_mmu_kind() 37 0x11, 0x11, 0x11, 0xff, 0xff, 0xff, 0xff, 0xff, in gm200_mmu_kind() 38 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x26, 0x27, /* 0x20 */ in gm200_mmu_kind() 39 0x28, 0x29, 0x2a, 0x2b, 0xff, 0xff, 0xff, 0xff, in gm200_mmu_kind() 40 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, /* 0x30 */ in gm200_mmu_kind() 41 0xff, 0xff, 0x26, 0x27, 0x28, 0x29, 0x26, 0x27, in gm200_mmu_kind() 42 0x28, 0x29, 0xff, 0xff, 0xff, 0xff, 0x46, 0xff, /* 0x40 */ in gm200_mmu_kind() 43 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, in gm200_mmu_kind() [all …]
|
/linux/drivers/net/wireless/intersil/p54/ |
H A D | p54spi_eeprom.h | 19 0x47, 0x4d, 0x55, 0xaa, /* magic */ 20 0x00, 0x00, /* pad */ 21 0x00, 0x00, /* eeprom_pda_data_wrap length */ 22 0x00, 0x00, 0x00, 0x00, /* arm opcode */ 25 0x04, 0x00, 0x01, 0x01, /* PDR_MAC_ADDRESS */ 26 0x00, 0x02, 0xee, 0xc0, 0xff, 0xee, 29 0x06, 0x00, 0x01, 0x10, /* PDR_INTERFACE_LIST */ 30 0x00, 0x00, /* role */ 31 0x0f, 0x00, /* if_id */ 32 0x85, 0x00, /* variant = Longbow RF, 2GHz */ [all …]
|
/linux/lib/crypto/ |
H A D | aesgcm.c | 42 * Returns: 0 on success, or -EINVAL if @keysize or @authsize contain values 59 return 0; in aesgcm_expandkey() 66 while (len > 0) { in aesgcm_ghash() 113 while (len > 0) { in aesgcm_crypt() 227 "\xba\x63\x7b\x39\x1a\xaf\xd2\x55"; 249 "\xba\x63\x7b\x39"; 281 "\xba\x63\x7b\x39\x1a\xaf\xd2\x55"; 313 "\xba\x63\x7b\x39\x1a\xaf\xd2\x55"; 335 "\xba\x63\x7b\x39"; 357 "\xba\x63\x7b\x39"; [all …]
|
H A D | aescfb.c | 47 while (len > 0) { in aescfb_encrypt() 75 aescfb_encrypt_block(ctx, ks[0], iv); in aescfb_decrypt() 77 for (int i = 0; len > 0; i ^= 1) { in aescfb_decrypt() 130 "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", 143 "\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", 154 "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", 179 "\xad\x2b\x41\x7b\xe6\x6c\x37\x10", 183 "\x32\x11\x3c\x63\x31\xe5\x40\x7b" 216 for (int i = 0; i < ARRAY_SIZE(aescfb_tv); i++) { in libaescfb_init() 248 return 0; in libaescfb_init()
|
H A D | chacha20poly1305-selftest.c | 31 0x49, 0x6e, 0x74, 0x65, 0x72, 0x6e, 0x65, 0x74, 32 0x2d, 0x44, 0x72, 0x61, 0x66, 0x74, 0x73, 0x20, 33 0x61, 0x72, 0x65, 0x20, 0x64, 0x72, 0x61, 0x66, 34 0x74, 0x20, 0x64, 0x6f, 0x63, 0x75, 0x6d, 0x65, 35 0x6e, 0x74, 0x73, 0x20, 0x76, 0x61, 0x6c, 0x69, 36 0x64, 0x20, 0x66, 0x6f, 0x72, 0x20, 0x61, 0x20, 37 0x6d, 0x61, 0x78, 0x69, 0x6d, 0x75, 0x6d, 0x20, 38 0x6f, 0x66, 0x20, 0x73, 0x69, 0x78, 0x20, 0x6d, 39 0x6f, 0x6e, 0x74, 0x68, 0x73, 0x20, 0x61, 0x6e, 40 0x64, 0x20, 0x6d, 0x61, 0x79, 0x20, 0x62, 0x65, [all …]
|
/linux/lib/crypto/tests/ |
H A D | poly1305-testvecs.h | 9 .data_len = 0, 11 0xe8, 0x2d, 0x67, 0x2c, 0x01, 0x48, 0xf9, 0xb7, 12 0x87, 0x85, 0x3f, 0xcf, 0x18, 0x66, 0x8c, 0xd3, 18 0xb8, 0xad, 0xca, 0x6b, 0x32, 0xba, 0x34, 0x42, 19 0x54, 0x10, 0x28, 0xf5, 0x0f, 0x7e, 0x8e, 0xe3, 25 0xb8, 0xf7, 0xf4, 0xc2, 0x85, 0x33, 0x80, 0x63, 26 0xd1, 0x45, 0xda, 0xf8, 0x7c, 0x79, 0x42, 0xd1, 32 0xf3, 0x73, 0x7b, 0x60, 0x24, 0xcc, 0x5d, 0x3e, 33 0xd1, 0x95, 0x86, 0xce, 0x89, 0x0a, 0x33, 0xba, 39 0x0a, 0x1a, 0x2d, 0x39, 0xea, 0x49, 0x8f, 0xb7, [all …]
|
H A D | sha512-testvecs.h | 9 .data_len = 0, 11 0xcf, 0x83, 0xe1, 0x35, 0x7e, 0xef, 0xb8, 0xbd, 12 0xf1, 0x54, 0x28, 0x50, 0xd6, 0x6d, 0x80, 0x07, 13 0xd6, 0x20, 0xe4, 0x05, 0x0b, 0x57, 0x15, 0xdc, 14 0x83, 0xf4, 0xa9, 0x21, 0xd3, 0x6c, 0xe9, 0xce, 15 0x47, 0xd0, 0xd1, 0x3c, 0x5d, 0x85, 0xf2, 0xb0, 16 0xff, 0x83, 0x18, 0xd2, 0x87, 0x7e, 0xec, 0x2f, 17 0x63, 0xb9, 0x31, 0xbd, 0x47, 0x41, 0x7a, 0x81, 18 0xa5, 0x38, 0x32, 0x7a, 0xf9, 0x27, 0xda, 0x3e, 24 0x12, 0xf2, 0xb6, 0xec, 0x84, 0xa0, 0x8e, 0xcf, [all …]
|
H A D | sha224-testvecs.h | 9 .data_len = 0, 11 0xd1, 0x4a, 0x02, 0x8c, 0x2a, 0x3a, 0x2b, 0xc9, 12 0x47, 0x61, 0x02, 0xbb, 0x28, 0x82, 0x34, 0xc4, 13 0x15, 0xa2, 0xb0, 0x1f, 0x82, 0x8e, 0xa6, 0x2a, 14 0xc5, 0xb3, 0xe4, 0x2f, 20 0xe3, 0x4d, 0x79, 0x17, 0x75, 0x35, 0xdc, 0xd2, 21 0x27, 0xc9, 0x9d, 0x0b, 0x90, 0x0f, 0x21, 0x5d, 22 0x95, 0xfb, 0x9c, 0x6d, 0xa8, 0xec, 0x19, 0x15, 23 0x12, 0xef, 0xf5, 0x0f, 29 0x81, 0xc7, 0x60, 0x0d, 0x6d, 0x13, 0x75, 0x70, [all …]
|
H A D | sha1-testvecs.h | 9 .data_len = 0, 11 0xda, 0x39, 0xa3, 0xee, 0x5e, 0x6b, 0x4b, 0x0d, 12 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90, 13 0xaf, 0xd8, 0x07, 0x09, 19 0x0a, 0xd0, 0x52, 0xdd, 0x9f, 0x32, 0x40, 0x55, 20 0x21, 0xe4, 0x3c, 0x6e, 0xbd, 0xc5, 0x2f, 0x5a, 21 0x02, 0x54, 0x93, 0xb2, 27 0x13, 0x83, 0x82, 0x03, 0x23, 0xff, 0x46, 0xd6, 28 0x12, 0x7f, 0xad, 0x05, 0x2b, 0xc3, 0x4a, 0x42, 29 0x49, 0x6a, 0xf8, 0x84, [all …]
|
H A D | sha384-testvecs.h | 9 .data_len = 0, 11 0x38, 0xb0, 0x60, 0xa7, 0x51, 0xac, 0x96, 0x38, 12 0x4c, 0xd9, 0x32, 0x7e, 0xb1, 0xb1, 0xe3, 0x6a, 13 0x21, 0xfd, 0xb7, 0x11, 0x14, 0xbe, 0x07, 0x43, 14 0x4c, 0x0c, 0xc7, 0xbf, 0x63, 0xf6, 0xe1, 0xda, 15 0x27, 0x4e, 0xde, 0xbf, 0xe7, 0x6f, 0x65, 0xfb, 16 0xd5, 0x1a, 0xd2, 0xf1, 0x48, 0x98, 0xb9, 0x5b, 22 0x07, 0x34, 0x9d, 0x74, 0x48, 0x76, 0xa5, 0x72, 23 0x78, 0x02, 0xb8, 0x6e, 0x21, 0x59, 0xb0, 0x75, 24 0x09, 0x68, 0x11, 0x39, 0x53, 0x61, 0xee, 0x8d, [all …]
|
H A D | sha256-testvecs.h | 9 .data_len = 0, 11 0xe3, 0xb0, 0xc4, 0x42, 0x98, 0xfc, 0x1c, 0x14, 12 0x9a, 0xfb, 0xf4, 0xc8, 0x99, 0x6f, 0xb9, 0x24, 13 0x27, 0xae, 0x41, 0xe4, 0x64, 0x9b, 0x93, 0x4c, 14 0xa4, 0x95, 0x99, 0x1b, 0x78, 0x52, 0xb8, 0x55, 20 0x45, 0xf8, 0x3d, 0x17, 0xe1, 0x0b, 0x34, 0xfc, 21 0xa0, 0x1e, 0xb8, 0xf4, 0x45, 0x4d, 0xac, 0x34, 22 0xa7, 0x77, 0xd9, 0x40, 0x4a, 0x46, 0x4e, 0x73, 23 0x2c, 0xf4, 0xab, 0xf2, 0xc0, 0xda, 0x94, 0xc4, 29 0xf9, 0xd3, 0x52, 0x2f, 0xd5, 0xe0, 0x99, 0x15, [all …]
|
/linux/drivers/media/usb/gspca/ |
H A D | topro.c | 22 0xff, 0xd8, /* jpeg */ 25 0xff, 0xdb, 0x00, 0x84, /* DQT */ 26 0, 28 0x10, 0x0b, 0x0c, 0x0e, 0x0c, 0x0a, 0x10, 0x0e, 29 0x0d, 0x0e, 0x12, 0x11, 0x10, 0x13, 0x18, 0x28, 30 0x1a, 0x18, 0x16, 0x16, 0x18, 0x31, 0x23, 0x25, 31 0x1d, 0x28, 0x3a, 0x33, 0x3d, 0x3c, 0x39, 0x33, 32 0x38, 0x37, 0x40, 0x48, 0x5c, 0x4e, 0x40, 0x44, 33 0x57, 0x45, 0x37, 0x38, 0x50, 0x6d, 0x51, 0x57, 34 0x5f, 0x62, 0x67, 0x68, 0x67, 0x3e, 0x4d, 0x71, [all …]
|
/linux/net/bluetooth/ |
H A D | selftest.c | 36 0xbd, 0x1a, 0x3c, 0xcd, 0xa6, 0xb8, 0x99, 0x58, 37 0x99, 0xb7, 0x40, 0xeb, 0x7b, 0x60, 0xff, 0x4a, 38 0x50, 0x3f, 0x10, 0xd2, 0xe3, 0xb3, 0xc9, 0x74, 39 0x38, 0x5f, 0xc5, 0xa3, 0xd4, 0xf6, 0x49, 0x3f, 42 0xfd, 0xc5, 0x7f, 0xf4, 0x49, 0xdd, 0x4f, 0x6b, 43 0xfb, 0x7c, 0x9d, 0xf1, 0xc2, 0x9a, 0xcb, 0x59, 44 0x2a, 0xe7, 0xd4, 0xee, 0xfb, 0xfc, 0x0a, 0x90, 45 0x9a, 0xbb, 0xf6, 0x32, 0x3d, 0x8b, 0x18, 0x55, 48 0xe6, 0x9d, 0x35, 0x0e, 0x48, 0x01, 0x03, 0xcc, 49 0xdb, 0xfd, 0xf4, 0xac, 0x11, 0x91, 0xf4, 0xef, [all …]
|
/linux/fs/xfs/ |
H A D | xfs_dahash_test.c | 20 0x5b, 0x85, 0x21, 0xcb, 0x09, 0x68, 0x7d, 0x30, 21 0xc7, 0x69, 0xd7, 0x30, 0x92, 0xde, 0x59, 0xe4, 22 0xc9, 0x6e, 0x8b, 0xdb, 0x98, 0x6b, 0xaa, 0x60, 23 0xa8, 0xb5, 0xbc, 0x6c, 0xa9, 0xb1, 0x5b, 0x2c, 24 0xea, 0xb4, 0x92, 0x6a, 0x3f, 0x79, 0x91, 0xe4, 25 0xe9, 0x70, 0x51, 0x8c, 0x7f, 0x95, 0x6f, 0x1a, 26 0x56, 0xa1, 0x5c, 0x27, 0x03, 0x67, 0x9f, 0x3a, 27 0xe2, 0x31, 0x11, 0x29, 0x6b, 0x98, 0xfc, 0xc4, 28 0x53, 0x24, 0xc5, 0x8b, 0xce, 0x47, 0xb2, 0xb9, 29 0x32, 0xcb, 0xc1, 0xd0, 0x03, 0x57, 0x4e, 0xd4, [all …]
|
/linux/net/sunrpc/auth_gss/ |
H A D | gss_krb5_test.c | 63 KUNIT_ASSERT_EQ(test, err, 0); in kdf_case() 68 derivedkey.data, derivedkey.len), 0, in kdf_case() 76 .head[0].iov_len = param->plaintext->len, in checksum_case() 94 KUNIT_ASSERT_EQ(test, err, 0); in checksum_case() 96 tfm = crypto_alloc_ahash(gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in checksum_case() 99 KUNIT_ASSERT_EQ(test, err, 0); in checksum_case() 101 buf.head[0].iov_base = kunit_kzalloc(test, buf.head[0].iov_len, GFP_KERNEL); in checksum_case() 102 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, buf.head[0].iov_base); in checksum_case() 103 memcpy(buf.head[0].iov_base, param->plaintext->data, buf.head[0].iov_len); in checksum_case() 110 err = gss_krb5_checksum(tfm, NULL, 0, &buf, 0, &checksum); in checksum_case() [all …]
|
/linux/net/wireless/certs/ |
H A D | wens.hex | 2 0x30, 0x82, 0x02, 0xa7, 0x30, 0x82, 0x01, 0x8f, 3 0x02, 0x14, 0x61, 0xc0, 0x38, 0x65, 0x1a, 0xab, 4 0xdc, 0xf9, 0x4b, 0xd0, 0xac, 0x7f, 0xf0, 0x6c, 5 0x72, 0x48, 0xdb, 0x18, 0xc6, 0x00, 0x30, 0x0d, 6 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 7 0x01, 0x01, 0x0b, 0x05, 0x00, 0x30, 0x0f, 0x31, 8 0x0d, 0x30, 0x0b, 0x06, 0x03, 0x55, 0x04, 0x03, 9 0x0c, 0x04, 0x77, 0x65, 0x6e, 0x73, 0x30, 0x20, 10 0x17, 0x0d, 0x32, 0x33, 0x31, 0x32, 0x30, 0x31, 11 0x30, 0x37, 0x34, 0x31, 0x31, 0x34, 0x5a, 0x18, [all …]
|
/linux/sound/ppc/ |
H A D | tumbler_volume.h | 4 /* 0 = -70 dB, 175 = 18.0 dB in 0.5 dB step */ 6 0x00000015, 0x00000016, 0x00000017, 7 0x00000019, 0x0000001a, 0x0000001c, 8 0x0000001d, 0x0000001f, 0x00000021, 9 0x00000023, 0x00000025, 0x00000027, 10 0x00000029, 0x0000002c, 0x0000002e, 11 0x00000031, 0x00000034, 0x00000037, 12 0x0000003a, 0x0000003e, 0x00000042, 13 0x00000045, 0x0000004a, 0x0000004e, 14 0x00000053, 0x00000057, 0x0000005d, [all …]
|