| /freebsd/sys/contrib/openzfs/module/icp/asm-aarch64/blake3/ |
| H A D | b3_aarch64_sse41.S | 47 .word 4 52 .word 4 82 eor v0.16b, v2.16b, v0.16b 83 eor v1.16b, v3.16b, v1.16b 95 .p2align 4 106 .byte 4 124 .byte 4 148 and v0.8b, v1.8b, v0.8b 154 uzp1 v3.4s, v6.4s, v7.4s 155 add v0.4s, v2.4s, v3.4s [all …]
|
| H A D | b3_aarch64_sse2.S | 47 .word 4 52 .word 4 82 eor v0.16b, v2.16b, v0.16b 83 eor v1.16b, v3.16b, v1.16b 95 .p2align 4 115 and v0.8b, v1.8b, v0.8b 120 uzp1 v1.4s, v0.4s, v6.4s 121 uzp2 v0.4s, v0.4s, v6.4s 122 add v2.4s, v2.4s, v1.4s 123 uzp1 v18.4s, v1.4s, v1.4s [all …]
|
| /freebsd/sys/crypto/openssl/aarch64/ |
| H A D | chacha-armv8.S | 16 .long 1,2,3,4 30 b.lo .Lshort 36 b.ne .LChaCha20_neon 202 b.lo .Ltail 243 b.hi .Loop_outer 256 .align 4 320 b.lo .Lshort 325 b.eq .Lcheck_neon 345 b .Lshort 367 b.hs .L512_or_more_neon [all …]
|
| H A D | sm4-armv8.S | 43 ld1 {v0.4s},[x0] 46 ld1 {v24.4s},[x2] 49 ld1 {v16.4s,v17.4s,v18.4s,v19.4s},[x2],64 51 rev32 v0.16b,v0.16b 53 ld1 {v20.4s,v21.4s,v22.4s,v23.4s},[x2] 54 eor v0.16b,v0.16b,v24.16b; 55 .inst 0xce70c800 //sm4ekey v0.4S,v0.4S,v16.4S 56 .inst 0xce71c801 //sm4ekey v1.4S,v0.4S,v17.4S 57 .inst 0xce72c822 //sm4ekey v2.4S,v1.4S,v18.4S 58 .inst 0xce73c843 //sm4ekey v3.4S,v2.4S,v19.4S [all …]
|
| H A D | aes-gcm-armv8_64.S | 9 .align 4 33 ld1 {v11.16b}, [x3] 34 ext v11.16b, v11.16b, v11.16b, #8 35 rev64 v11.16b, v11.16b 39 ld1 {v18.4s}, [x8], #16 //load rk0 46 ext v15.16b, v15.16b, v15.16b, #8 53 ld1 {v19.4s}, [x8], #16 //load rk1 60 …ld1 { v0.16b}, [x16] //special case vector load initial counter so we … 73 ld1 {v20.4s}, [x8], #16 //load rk2 80 ext v14.16b, v14.16b, v14.16b, #8 [all …]
|
| H A D | vpsm4_ex-armv8.S | 49 .align 4 52 ld1 {v5.4s},[x0] 61 rev32 v5.16b,v5.16b 69 eor v5.16b,v5.16b,v6.16b 73 movi v0.16b,#64 78 ldr w8,[x5],#4 86 tbl v0.16b, {v4.16b}, v26.16b 87 ushr v2.16b, v0.16b, 4 88 and v0.16b, v0.16b, v31.16b 89 tbl v0.16b, {v28.16b}, v0.16b [all …]
|
| H A D | vpsm4-armv8.S | 63 .align 4 66 ld1 {v5.4s},[x0] 69 ld1 {v16.16b,v17.16b,v18.16b,v19.16b},[x10],#64 70 ld1 {v20.16b,v21.16b,v22.16b,v23.16b},[x10],#64 71 ld1 {v24.16b,v25.16b,v26.16b,v27.16b},[x10],#64 72 ld1 {v28.16b,v29.16b,v30.16b,v31.16b},[x10] 74 rev32 v5.16b,v5.16b 82 eor v5.16b,v5.16b,v6.16b 86 movi v0.16b,#64 91 ldr w8,[x5],#4 [all …]
|
| H A D | sm3-armv8.S | 21 ld1 {v5.4s,v6.4s}, [x0] 22 rev64 v5.4s, v5.4s 23 rev64 v6.4s, v6.4s 24 ext v5.16b, v5.16b, v5.16b, #8 25 ext v6.16b, v6.16b, v6.16b, #8 32 ld1 {v0.4s,v1.4s,v2.4s,v3.4s}, [x1], #64 35 mov v18.16b, v5.16b 36 mov v19.16b, v6.16b 39 rev32 v0.16b, v0.16b 40 rev32 v1.16b, v1.16b [all …]
|
| H A D | sha256-armv8.S | 37 // on Cortex-A53 (or by 4 cycles per round). 76 b.ne .Lv8_entry 78 b.ne .Lneon_entry 89 sub sp,sp,#4*4 92 ldp w22,w23,[x0,#2*4] 93 ldp w24,w25,[x0,#4*4] 95 ldp w26,w27,[x0,#6*4] 101 ldp w3,w4,[x1],#2*4 102 ldr w19,[x30],#4 // *K++ 115 eor w19,w20,w21 // a^b, b^c in next round [all …]
|
| H A D | aes-gcm-armv8-unroll8_64.S | 9 .align 4 25 movi v31.16b, #0x0 28 ld1 { v0.16b}, [x16] //CTR block 0 34 rev32 v30.16b, v0.16b //set up reversed counter 36 add v30.4s, v30.4s, v31.4s //CTR block 0 38 rev32 v1.16b, v30.16b //CTR block 1 39 add v30.4s, v30.4s, v31.4s //CTR block 1 41 rev32 v2.16b, v30.16b //CTR block 2 42 add v30.4s, v30.4s, v31.4s //CTR block 2 44 rev32 v3.16b, v30.16b //CTR block 3 [all …]
|
| H A D | aesv8-armx.S | 25 b.eq .Lenc_key_abort 27 b.eq .Lenc_key_abort 30 b.lt .Lenc_key_abort 32 b.gt .Lenc_key_abort 34 b.ne .Lenc_key_abort 40 eor v0.16b,v0.16b,v0.16b 41 ld1 {v3.16b},[x0],#16 43 ld1 {v1.4s,v2.4s},[x3],#32 45 b.lt .Loop128 46 b.eq .L192 [all …]
|
| H A D | vpaes-armv8.S | 59 .Lk_dsbb: // decryption sbox output *B*u, *B*t 72 .Lk_dksb: // decryption key schedule: invskew x*B 106 .align 4 110 movi v17.16b, #0x0f 133 .align 4 141 and v1.16b, v7.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1 142 ushr v0.16b, v7.16b, #4 // vpsrlb $4, %xmm0, %xmm0 143 tbl v1.16b, {v20.16b}, v1.16b // vpshufb %xmm1, %xmm2, %xmm1 145 tbl v2.16b, {v21.16b}, v0.16b // vpshufb %xmm0, %xmm3, %xmm2 146 eor v0.16b, v1.16b, v16.16b // vpxor %xmm5, %xmm1, %xmm0 [all …]
|
| /freebsd/crypto/openssl/crypto/sha/asm/ |
| H A D | keccak1600-c64x.pl | 22 # B-files, with A-file holding least significant halves. This works 30 my @A = map([ $_, ($_+1), ($_+2), ($_+3), ($_+4) ], (5,10,16,21,26)); 31 $A[1][4] = 31; # B14 is reserved, A14 is used as iota[] 32 ($A[3][0],$A[4][1]) = ($A[4][1],$A[3][0]); 33 my @C = (0..4,$A[3][0],$A[4][0]); 47 $p ROTL B$src,$rot/2+1,A$dst 48 || ROTL A$src,$rot/2, B$dst 53 || ROTL B$src,$rot/2,B$dst 63 # +1--->+------+------+<- -9 below 4 slots are used by KeccakF1600_int 69 # +4--->+------+------+<- -6 [all …]
|
| /freebsd/lib/libmd/aarch64/ |
| H A D | sha1block.S | 29 b .req w4 label 61 .macro func1 a, b, c, d, e 62 and f, \c, \b 63 bic tmp, \d, \b 67 .macro func2 a, b, c, d, e 68 eor f, \b, \c 72 .macro func3 a, b, c, d, e 73 eor tmp, \b, \c 74 and f, \b, \c 79 .macro func4 a, b, c, d, e [all …]
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | animation | 13 4 string moov Apple QuickTime 15 >12 string mvhd \b movie (fast start) 16 >12 string mdra \b URL 17 >12 string cmov \b movie (fast start, compressed header) 18 >12 string rmra \b multiple URLs 19 4 string mdat Apple QuickTime movie (unoptimized) 21 4 string wide Apple QuickTime movie (unoptimized) 23 #4 string skip Apple QuickTime movie (modified) 25 #4 string free Apple QuickTime movie (modified) 27 4 string idsc Apple QuickTime image (fast start) [all …]
|
| /freebsd/crypto/openssl/crypto/sm4/asm/ |
| H A D | sm4-armv8.pl | 36 rev32 $dst.16b,$src.16b 44 sm4e $data.4s,@rks[0].4s 45 sm4e $data.4s,@rks[1].4s 46 sm4e $data.4s,@rks[2].4s 47 sm4e $data.4s,@rks[3].4s 48 sm4e $data.4s,@rks[4].4s 49 sm4e $data.4s,@rks[5].4s 50 sm4e $data.4s,@rks[6].4s 51 sm4e $data.4s,@rks[7].4s 52 rev64 $data.4S,$data.4S [all …]
|
| H A D | vpsm4_ex-armv8.pl | 32 my @data=map("v$_",(4..7)); 54 rev32 $dst.16b,$src.16b 56 mov $dst.16b,$src.16b 62 rev32 $dst.16b,$dst.16b 75 rev32 $dst.16b,$src.16b 77 mov $dst.16b,$src.16b 83 rev32 $dst.16b,$dst.16b 97 rbit $dst.16b,$src.16b 101 mov $dst.16b,$src.16b 107 rbit $dst.16b,$src.16b [all …]
|
| H A D | vpsm4-armv8.pl | 32 my @data=map("v$_",(4..7)); 51 rev32 $dst.16b,$src.16b 53 mov $dst.16b,$src.16b 59 rev32 $dst.16b,$dst.16b 72 rev32 $dst.16b,$src.16b 74 mov $dst.16b,$src.16b 80 rev32 $dst.16b,$dst.16b 94 rbit $dst.16b,$src.16b 98 mov $dst.16b,$src.16b 104 rbit $dst.16b,$src.16b [all …]
|
| /freebsd/sys/contrib/openzfs/module/icp/asm-aarch64/sha2/ |
| H A D | sha256-armv8.S | 27 .word 4 32 .word 4 72 sub sp,sp,#4*4 75 ldp w22,w23,[x0,#2*4] 76 ldp w24,w25,[x0,#4*4] 78 ldp w26,w27,[x0,#6*4] 83 ldp w3,w4,[x1],#2*4 84 ldr w19,[x30],#4 // *K++ 97 eor w19,w20,w21 // a^b, b^c in next round 103 and w28,w28,w19 // (b^c)&=(a^b) [all …]
|
| /freebsd/crypto/openssl/crypto/sha/ |
| H A D | keccak1600.c | 135 C[4] = A[0][4]; in Theta() 142 C[4] ^= A[y][4]; in Theta() 145 D[0] = ROL64(C[1], 1) ^ C[4]; in Theta() 148 D[3] = ROL64(C[4], 1) ^ C[2]; in Theta() 149 D[4] = ROL64(C[0], 1) ^ C[3]; in Theta() 156 A[y][4] ^= D[4]; in Theta() 169 A[y][4] = ROL64(A[y][4], rhotates[y][4]); in Rho() 187 A[0][4] = T[4][4]; in Pi() 190 A[1][1] = T[1][4]; in Pi() 193 A[1][4] = T[4][2]; in Pi() [all …]
|
| /freebsd/lib/libc/aarch64/string/ |
| H A D | strncmp.S | 22 b.lo .Lempty 39 b.lo .Llt16 50 cmeq v5.16b, v0.16b, #0 51 cmeq v6.16b, v1.16b, #0 53 shrn v5.8b, v5.8h, #4 54 shrn v6.8b, v6.8h, #4 63 b.eq 0f 66 tbl v0.16b, {v0.16b}, v4.16b 68 b 1f 69 .p2align 4 [all …]
|
| H A D | strcmp.S | 44 cmeq v5.16b, v0.16b, #0 45 cmeq v6.16b, v2.16b, #0 47 shrn v5.8b, v5.8h, #4 48 shrn v6.8b, v6.8h, #4 57 b.eq 0f 60 tbl v0.16b, {v0.16b}, v4.16b 62 b 1f 63 .p2align 4 68 b.eq 0f 71 tbl v4.16b, {v2.16b}, v4.16b [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/builtin/aes/ |
| H A D | kresults.expected |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all …]
|
| /freebsd/crypto/openssl/crypto/aes/asm/ |
| H A D | vpaes-armv8.pl | 113 .Lk_dsbb: // decryption sbox output *B*u, *B*t 126 .Lk_dksb: // decryption key schedule: invskew x*B 157 my ($invlo,$invhi,$iptlo,$ipthi,$sbou,$sbot) = map("v$_.16b",(18..23)); 158 my ($sb1u,$sb1t,$sb2u,$sb2t) = map("v$_.16b",(24..27)); 159 my ($sb9u,$sb9t,$sbdu,$sbdt,$sbbu,$sbbt,$sbeu,$sbet)=map("v$_.16b",(24..31)); 169 .align 4 173 movi v17.16b, #0x0f 196 .align 4 204 and v1.16b, v7.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1 205 ushr v0.16b, v7.16b, #4 // vpsrlb \$4, %xmm0, %xmm0 [all …]
|
| /freebsd/crypto/openssl/test/recipes/04-test_pem_reading_data/ |
| H A D | dsa-onecolumn.pem | 2 Proc-Type: 4,ENCRYPTED 6 B 28 b 33 4 53 b 54 b 89 4 94 B 111 b 112 B [all …]
|