/freebsd/share/misc/ |
H A D | scsi_modes | 57 {TMF_ONLY} t1 58 {DPICZ} t1 59 {D_SENSE} t1 60 {GLTSD} t1 61 {RLEC} t1 63 {NUAR} t1 65 {DQue} t1 66 {EECA} t1 67 {RAC} t1 69 {SWP} t1 [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | safestack.h.in | 37 # define SKM_DEFINE_STACK_OF_INTERNAL(t1, t2, t3) \ argument 38 STACK_OF(t1); \ 39 typedef int (*sk_##t1##_compfunc)(const t3 * const *a, const t3 *const *b); \ 40 typedef void (*sk_##t1##_freefunc)(t3 *a); \ 41 typedef t3 * (*sk_##t1##_copyfunc)(const t3 *a); \ 42 static ossl_unused ossl_inline t2 *ossl_check_##t1##_type(t2 *ptr) \ 46 …l_unused ossl_inline const OPENSSL_STACK *ossl_check_const_##t1##_sk_type(const STACK_OF(t1) *sk) \ 50 static ossl_unused ossl_inline OPENSSL_STACK *ossl_check_##t1##_sk_type(STACK_OF(t1) *sk) \ 54 …static ossl_unused ossl_inline OPENSSL_sk_compfunc ossl_check_##t1##_compfunc_type(sk_##t1##_compf… 58 …static ossl_unused ossl_inline OPENSSL_sk_copyfunc ossl_check_##t1##_copyfunc_type(sk_##t1##_copyf… [all …]
|
H A D | safestack.h | 34 # define SKM_DEFINE_STACK_OF_INTERNAL(t1, t2, t3) \ argument 35 STACK_OF(t1); \ 36 typedef int (*sk_##t1##_compfunc)(const t3 * const *a, const t3 *const *b); \ 37 typedef void (*sk_##t1##_freefunc)(t3 *a); \ 38 typedef t3 * (*sk_##t1##_copyfunc)(const t3 *a); \ 39 static ossl_unused ossl_inline t2 *ossl_check_##t1##_type(t2 *ptr) \ 43 …l_unused ossl_inline const OPENSSL_STACK *ossl_check_const_##t1##_sk_type(const STACK_OF(t1) *sk) \ 47 static ossl_unused ossl_inline OPENSSL_STACK *ossl_check_##t1##_sk_type(STACK_OF(t1) *sk) \ 51 …static ossl_unused ossl_inline OPENSSL_sk_compfunc ossl_check_##t1##_compfunc_type(sk_##t1##_compf… 55 …static ossl_unused ossl_inline OPENSSL_sk_copyfunc ossl_check_##t1##_copyfunc_type(sk_##t1##_copyf… [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_generichash/blake2b/ref/ |
H A D | blake2b-load-avx2.h | 7 t1 = _mm256_unpacklo_epi64(m2, m3); \ 8 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 14 t1 = _mm256_unpackhi_epi64(m2, m3); \ 15 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 21 t1 = _mm256_unpacklo_epi64(m6, m7); \ 22 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 28 t1 = _mm256_unpackhi_epi64(m6, m7); \ 29 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 35 t1 = _mm256_unpackhi_epi64(m4, m6); \ 36 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ [all …]
|
/freebsd/sys/contrib/libb2/ |
H A D | blake2s-load-sse41.h | 31 t1 = _mm_slli_si128(m3, 4); \ 32 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 37 t1 = _mm_blend_epi16(m1,m3,0xC0); \ 38 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 43 t1 = _mm_blend_epi16(m2, t0, 0x30); \ 44 t2 = _mm_blend_epi16(m0, t1, 0xF0); \ 49 t1 = _mm_slli_si128(m3, 4); \ 50 t2 = _mm_blend_epi16(t0, t1, 0x0C); \ 55 t1 = _mm_blend_epi16(m3,m1,0x0C); \ 56 t2 = _mm_blend_epi16(t0, t1, 0x0F); \ [all …]
|
/freebsd/contrib/llvm-project/libcxx/include/ |
H A D | utility | 73 template <class T1, class T2> 76 typedef T1 first_type; 79 T1 first; 85 … explicit(see-below) pair(const T1& x, const T2& y); // constexpr in C++14 86 … template <class U = T1, class V = T2> explicit(see-below) pair(U&&, V&&); // constexpr in C++14 101 pair& operator=(pair&& p) noexcept(is_nothrow_move_assignable<T1>::value && 110 void swap(pair& p) noexcept(is_nothrow_swappable_v<T1> && 115 template<class T1, class T2, class U1, class U2, template<class> class TQual, template<class> class… 116 struct basic_common_reference<pair<T1, T2>, pair<U1, U2>, TQual, UQual>; // since C++23 118 template<class T1, class T2, class U1, class U2> [all …]
|
/freebsd/contrib/bearssl/src/symcipher/ |
H A D | aes_x86ni.c | 62 expand_step192(__m128i *t1, __m128i *t2, __m128i *t3) in expand_step192() argument 67 t4 = _mm_slli_si128(*t1, 0x4); in expand_step192() 68 *t1 = _mm_xor_si128(*t1, t4); in expand_step192() 70 *t1 = _mm_xor_si128(*t1, t4); in expand_step192() 72 *t1 = _mm_xor_si128(*t1, t4); in expand_step192() 73 *t1 = _mm_xor_si128(*t1, *t2); in expand_step192() 74 *t2 = _mm_shuffle_epi32(*t1, 0xFF); in expand_step192() 82 expand_step256_1(__m128i *t1, __m128i *t2) in expand_step256_1() argument 87 t4 = _mm_slli_si128(*t1, 0x4); in expand_step256_1() 88 *t1 = _mm_xor_si128(*t1, t4); in expand_step256_1() [all …]
|
/freebsd/crypto/openssl/crypto/ec/asm/ |
H A D | x25519-ppc64.pl | 49 my ($bi,$a0,$a1,$a2,$a3,$t0,$t1, $t2,$t3, 84 mulhdu $t1,$a1,$bi 98 adde @acc[2],@acc[2],$t1 99 mulld $t1,$a1,$bi 106 adde @acc[2],@acc[2],$t1 107 mulhdu $t1,$a1,$bi 119 adde $acc5,$acc5,$t1 120 mulld $t1,$acc5,$bi 128 adde $acc1,$acc1,$t1 129 mulhdu $t1,$acc5,$bi [all …]
|
H A D | ecp_nistp521-ppc64.pl | 150 my ($t1, $t2, $t3, $t4) = ("v33", "v34", "v44", "v54"); 178 xxpermdi $t1,$in1[0],$in1[1],0b00 180 vmsumudm $out[1],$t1,$t2,$vzero 183 vmsumudm $out[2],$t1,$t2,$vzero 187 vmsumudm $out[3],$t1,$t2,$vzero 193 vmsumudm $out[4],$t1,$t2,$vzero 199 vmsumudm $out[5],$t1,$t2,$vzero 204 vmsumudm $out[6],$t1,$t2,$vzero 209 vmsumudm $out[7],$t1,$t2,$vzero 214 vmsumudm $out[8],$t1,$t2,$vzero [all …]
|
/freebsd/crypto/openssl/crypto/sha/asm/ |
H A D | sha1-thumb.pl | 35 $t1="r1"; 51 ldr $t1,[$t0] 57 add $t2,$t1 @ E+=X[i] 68 add $a,$t2,$t1 @ A=E+F_xx_xx(B,C,D) 75 mov $t1,$c 76 eor $t1,$d 77 and $t1,$b 78 eor $t1,$d @ F_00_19(B,C,D) 86 mov $t1,$b 87 eor $t1,$c [all …]
|
H A D | sha512-armv4.pl | 88 $t1="r10"; 113 mov $t1,$Ehi,lsr#14 117 eor $t1,$t1,$Elo,lsl#18 120 eor $t1,$t1,$Ehi,lsr#18 122 eor $t1,$t1,$Elo,lsl#14 124 eor $t1,$t1,$Elo,lsr#9 126 eor $t1,$t1,$Ehi,lsl#23 @ Sigma1(e) 129 adc $Thi,$Thi,$t1 @ T += Sigma1(e) 130 ldr $t1,[sp,#$Foff+4] @ f.hi 138 eor $t1,$t1,$t3 [all …]
|
H A D | sha256-c64xplus.pl | 36 ($E,$Ectx,$F,$Fctx,$G,$Gctx,$H,$Hctx,$T1,$S1,$s0,$t0e,$t1e,$t2e,$X1,$X15) 137 || ADD $K,$H,$T1 ; T1 = h + K256[i] 138 ADD $X0,$T1,$T1 ; T1 += X[i]; 145 || ADD $Ch,$T1,$T1 ; T1 += Ch(e,f,g) 146 ADD $S1,$T1,$T1 ; T1 += Sigma1(e) 154 || ADD $D,$T1,$E ; e = d + T1 158 || ADD $T1,$T2,$A ; a = T1 + T2 176 || ADD $K,$H,$T1 ; T1 = h + K256[i] 177 ADD $X0,$T1,$T1 ; T1 += X[i]; 184 || ADD $Ch,$T1,$T1 ; T1 += Ch(e,f,g) [all …]
|
H A D | sha512-s390x.pl | 60 $t1="%r1"; 74 $T1="%r14"; 117 $LD $T1,`$i*$SZ`($inp) ### $i 121 $ROT $t1,$e,$Sigma1[1] 123 xgr $t0,$t1 124 $ROT $t1,$t1,`$Sigma1[2]-$Sigma1[1]` 126 $ST $T1,`$stdframe+$SZ*($i%16)`($sp) 127 xgr $t0,$t1 # Sigma1(e) 128 algr $T1,$h # T1+=h 130 lgr $t1,$a [all …]
|
H A D | sha256-armv4.pl | 66 $len="r2"; $t1="r2"; 67 $T1="r3"; $t3="r3"; 90 @ ldr $t1,[$inp],#4 @ $i 98 rev $t1,$t1 101 @ ldrb $t1,[$inp,#3] @ $i 105 orr $t1,$t1,$t2,lsl#8 107 orr $t1,$t1,$t0,lsl#16 112 orr $t1,$t1,$t2,lsl#24 118 add $h,$h,$t1 @ h+=X[i] 119 str $t1,[sp,#`$i%16`*4] [all …]
|
/freebsd/contrib/bearssl/test/ |
H A D | test_math.c | 57 const uint32_t *m, uint32_t m0i, uint32_t *t1, uint32_t *t2); 230 mpz_t p, a, b, v, t1; in test_modint() local 240 mpz_init(t1); in test_modint() 241 mpz_set_ui(t1, (unsigned long)time(NULL)); in test_modint() 242 gmp_randseed(RNG, t1); in test_modint() 297 mpz_add(t1, a, b); in test_modint() 298 mpz_mod(t1, t1, p); in test_modint() 299 check_eqz(ma, t1); in test_modint() 304 mpz_sub(t1, a, b); in test_modint() 305 mpz_mod(t1, t1, p); in test_modint() [all …]
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | timeval.c | 43 * Make `t1' consistent. 47 timevalfix(struct timeval *t1) in timevalfix() argument 49 if (t1->tv_usec < 0) { in timevalfix() 50 t1->tv_sec--; in timevalfix() 51 t1->tv_usec += 1000000; in timevalfix() 53 if (t1->tv_usec >= 1000000) { in timevalfix() 54 t1->tv_sec++; in timevalfix() 55 t1->tv_usec -= 1000000; in timevalfix() 60 * t1 += t2 64 timevaladd(struct timeval *t1, const struct timeval *t2) in timevaladd() argument [all …]
|
/freebsd/crypto/openssl/crypto/poly1305/asm/ |
H A D | poly1305-x86.pl | 392 my ($D0,$D1,$D2,$D3,$D4,$T0,$T1,$T2)=map("xmm$_",(0..7)); 430 &movdqa ($T1,$D1); 432 &pslld ($T1,2); 434 &paddd ($T1,$D1); # *5 436 &movdqa (&QWP(16*5,"esp"),$T1); 438 &movdqa ($T1,$D3); 440 &pslld ($T1,2); 442 &paddd ($T1,$D3); # *5 444 &movdqa (&QWP(16*7,"esp"),$T1); 447 &pshufd ($T1,$D0,0b01000100); [all …]
|
/freebsd/lib/msun/src/ |
H A D | e_hypotl.c | 47 long double a=x,b=y,t1,t2,y1,y2,w; in hypotl() local 81 t1=1; in hypotl() 82 SET_HIGH_WORD(t1,ESW(MAX_EXP-2)); /* t1=2^(MAX_EXP-2) */ in hypotl() 83 b *= t1; in hypotl() 84 a *= t1; in hypotl() 97 t1 = a; in hypotl() 99 uv.e = t1; uv.bits.manl = 0; t1 = uv.e; in hypotl() 100 t2 = a-t1; in hypotl() 101 w = sqrtl(t1*t1-(b*(-b)-t2*(a+t1))); in hypotl() 108 t1 = a; in hypotl() [all …]
|
H A D | e_hypot.c | 29 * t1*y1+((x-y)*(x-y)+(t1*y2+t2*y)) 30 * where t1 = 2x with lower 32 bits cleared, t2 = 2x-t1, 53 double a,b,t1,t2,y1,y2,w; in hypot() local 86 t1=0; in hypot() 87 SET_HIGH_WORD(t1,0x7fd00000); /* t1=2^1022 */ in hypot() 88 b *= t1; in hypot() 89 a *= t1; in hypot() 102 t1 = 0; in hypot() 103 SET_HIGH_WORD(t1,ha); in hypot() 104 t2 = a-t1; in hypot() [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_onetimeauth/poly1305/sse2/ |
H A D | poly1305_sse2.c | 110 uint64_t t0, t1; in poly1305_init_ext() local 123 memcpy(&t1, key + 8, 8); in poly1305_init_ext() 126 t0 |= t1 << 20; in poly1305_init_ext() 128 t1 >>= 24; in poly1305_init_ext() 129 r2 = t1 & 0x00ffffffc0f; in poly1305_init_ext() 207 xmmi T0, T1, T2, T3, T4, T5, T6, T7, T8; in poly1305_blocks() local 240 T1 = _mm_loadu_si128((const xmmi *) (const void *) &st->H.hh[4]); in poly1305_blocks() 244 H2 = _mm_shuffle_epi32(T1, _MM_SHUFFLE(1, 1, 0, 0)); in poly1305_blocks() 245 H3 = _mm_shuffle_epi32(T1, _MM_SHUFFLE(3, 3, 2, 2)); in poly1305_blocks() 254 T1 = _mm_cvtsi32_si128(st->R2[4]); in poly1305_blocks() [all …]
|
/freebsd/crypto/openssh/ |
H A D | smult_curve25519_ref.c | 191 unsigned int t1[32]; in recip() local 195 /* 4 */ square(t1,z2); in recip() 196 /* 8 */ square(t0,t1); in recip() 203 /* 2^7 - 2^2 */ square(t1,t0); in recip() 204 /* 2^8 - 2^3 */ square(t0,t1); in recip() 205 /* 2^9 - 2^4 */ square(t1,t0); in recip() 206 /* 2^10 - 2^5 */ square(t0,t1); in recip() 210 /* 2^12 - 2^2 */ square(t1,t0); in recip() 211 /* 2^20 - 2^10 */ for (i = 2;i < 10;i += 2) { square(t0,t1); square(t1,t0); } in recip() 212 /* 2^20 - 2^0 */ mult(z2_20_0,t1,z2_10_0); in recip() [all …]
|
/freebsd/crypto/openssl/crypto/sha/ |
H A D | sha256.c | 150 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2; in sha256_block_data_order() local 168 T1 = X[i] = l; in sha256_block_data_order() 169 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; in sha256_block_data_order() 174 e = d + T1; in sha256_block_data_order() 178 a = T1 + T2; in sha256_block_data_order() 187 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf]; in sha256_block_data_order() 188 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; in sha256_block_data_order() 193 e = d + T1; in sha256_block_data_order() 197 a = T1 + T2; in sha256_block_data_order() 215 T1 += h + Sigma1(e) + Ch(e,f,g) + K256[i]; \ [all …]
|
/freebsd/crypto/openssl/crypto/modes/asm/ |
H A D | ghash-x86_64.pl | 463 ($T1,$T2,$T3)=("%xmm3","%xmm4","%xmm5"); 471 pshufd \$0b01001110,$Xi,$T1 473 pxor $Xi,$T1 # 479 pshufd \$0b01001110,$Xi,$T1 480 pxor $Xi,$T1 # 486 pclmulqdq \$0x00,$HK,$T1 ####### 487 pxor $Xi,$T1 # 488 pxor $Xhi,$T1 # 490 movdqa $T1,$T2 # 491 psrldq \$8,$T1 [all …]
|
H A D | aesni-gcm-x86_64.pl | 82 ($Ii,$T1,$T2,$Hkey, 100 vpaddb $T2,$T1,$inout1 105 vpxor $rndkey,$T1,$inout0 114 vpaddb $T2,$inout5,$T1 # next counter value 119 vmovdqu $T1,($ivp) # save next counter value 130 vpclmulqdq \$0x00,$Hkey,$Z3,$T1 143 vpxor $Z1,$T1,$Z0 146 vpclmulqdq \$0x10,$Hkey,$Ii,$T1 167 vpxor $T1,$Z2,$Z2 168 vpclmulqdq \$0x00,$Z1,$Ii,$T1 [all …]
|
/freebsd/crypto/openssl/crypto/seed/ |
H A D | seed.c | 450 seed_word t0, t1; in SEED_set_key() local 458 t1 = (x2 - x4 + KC0) & 0xffffffff; in SEED_set_key() 459 KEYUPDATE_TEMP(t0, t1, &ks->data[0]); in SEED_set_key() 460 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC1); in SEED_set_key() 461 KEYUPDATE_TEMP(t0, t1, &ks->data[2]); in SEED_set_key() 464 KEYSCHEDULE_UPDATE0(t0, t1, x1, x2, x3, x4, KC2); in SEED_set_key() 465 KEYUPDATE_TEMP(t0, t1, &ks->data[4]); in SEED_set_key() 466 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC3); in SEED_set_key() 467 KEYUPDATE_TEMP(t0, t1, &ks->data[6]); in SEED_set_key() 468 KEYSCHEDULE_UPDATE0(t0, t1, x1, x2, x3, x4, KC4); in SEED_set_key() [all …]
|