/freebsd/contrib/llvm-project/libcxx/include/ |
H A D | utility | 73 template <class T1, class T2> 77 typedef T2 second_type; 80 T2 second; 85 … explicit(see-below) pair(const T1& x, const T2& y); // constexpr in C++14 86 … template <class U = T1, class V = T2> explicit(see-below) pair(U&&, V&&); // constexpr in C++14 102 … is_nothrow_move_assignable<T2>::value); // constexpr in C++20 111 … is_nothrow_swappable_v<T2>); // constexpr in C++20 115 template<class T1, class T2, class U1, class U2, template<class> class TQual, template<class> class… 116 struct basic_common_reference<pair<T1, T2>, pair<U1, U2>, TQual, UQual>; // since C++23 118 template<class T1, class T2, class U1, class U2> [all …]
|
/freebsd/sys/contrib/libb2/ |
H A D | blake2s-load-sse41.h | 32 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 33 buf = _mm_shuffle_epi32(t2, _MM_SHUFFLE(2,1,0,3)); 38 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 39 buf = _mm_shuffle_epi32(t2, _MM_SHUFFLE(2,3,0,1)); 44 t2 = _mm_blend_epi16(m0, t1, 0xF0); \ 45 buf = _mm_shuffle_epi32(t2, _MM_SHUFFLE(2,3,0,1)); 50 t2 = _mm_blend_epi16(t0, t1, 0x0C); \ 51 buf = _mm_shuffle_epi32(t2, _MM_SHUFFLE(2,3,0,1)); 56 t2 = _mm_blend_epi16(t0, t1, 0x0F); \ 57 buf = _mm_shuffle_epi32(t2, _MM_SHUFFLE(3,1,0,2)); [all …]
|
/freebsd/crypto/openssl/crypto/ec/asm/ |
H A D | ecp_nistp521-ppc64.pl | 150 my ($t1, $t2, $t3, $t4) = ("v33", "v34", "v44", "v54"); 179 xxpermdi $t2,$in2[1],$in2[0],0b00 180 vmsumudm $out[1],$t1,$t2,$vzero 182 xxpermdi $t2,$in2[2],$in2[1],0b00 183 vmsumudm $out[2],$t1,$t2,$vzero 186 xxpermdi $t2,$in2[3],$in2[2],0b00 187 vmsumudm $out[3],$t1,$t2,$vzero 192 xxpermdi $t2,$in2[4],$in2[3],0b00 193 vmsumudm $out[4],$t1,$t2,$vzero 198 xxpermdi $t2,$in2[5],$in2[4],0b00 [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | safestack.h.in | 37 # define SKM_DEFINE_STACK_OF_INTERNAL(t1, t2, t3) \ argument 42 static ossl_unused ossl_inline t2 *ossl_check_##t1##_type(t2 *ptr) \ 67 # define SKM_DEFINE_STACK_OF(t1, t2, t3) \ argument 76 static ossl_unused ossl_inline t2 *sk_##t1##_value(const STACK_OF(t1) *sk, int idx) \ 78 return (t2 *)OPENSSL_sk_value((const OPENSSL_STACK *)sk, idx); \ 104 static ossl_unused ossl_inline t2 *sk_##t1##_delete(STACK_OF(t1) *sk, int i) \ 106 return (t2 *)OPENSSL_sk_delete((OPENSSL_STACK *)sk, i); \ 108 static ossl_unused ossl_inline t2 *sk_##t1##_delete_ptr(STACK_OF(t1) *sk, t2 *ptr) \ 110 return (t2 *)OPENSSL_sk_delete_ptr((OPENSSL_STACK *)sk, \ 113 static ossl_unused ossl_inline int sk_##t1##_push(STACK_OF(t1) *sk, t2 *ptr) \ [all …]
|
H A D | safestack.h | 34 # define SKM_DEFINE_STACK_OF_INTERNAL(t1, t2, t3) \ argument 39 static ossl_unused ossl_inline t2 *ossl_check_##t1##_type(t2 *ptr) \ 64 # define SKM_DEFINE_STACK_OF(t1, t2, t3) \ argument 73 static ossl_unused ossl_inline t2 *sk_##t1##_value(const STACK_OF(t1) *sk, int idx) \ 75 return (t2 *)OPENSSL_sk_value((const OPENSSL_STACK *)sk, idx); \ 101 static ossl_unused ossl_inline t2 *sk_##t1##_delete(STACK_OF(t1) *sk, int i) \ 103 return (t2 *)OPENSSL_sk_delete((OPENSSL_STACK *)sk, i); \ 105 static ossl_unused ossl_inline t2 *sk_##t1##_delete_ptr(STACK_OF(t1) *sk, t2 *ptr) \ 107 return (t2 *)OPENSSL_sk_delete_ptr((OPENSSL_STACK *)sk, \ 110 static ossl_unused ossl_inline int sk_##t1##_push(STACK_OF(t1) *sk, t2 *ptr) \ [all …]
|
/freebsd/crypto/openssl/crypto/modes/asm/ |
H A D | ghashv8-armx.pl | 72 my ($t0,$t1,$t2,$xC2,$H,$Hhl,$H2)=map("q$_",(8..14)); 119 vshr.u64 $t2,$xC2,#63 121 vext.8 $t0,$t2,$xC2,#8 @ t0=0xc2....01 122 vshr.u64 $t2,$IN,#63 124 vand $t2,$t2,$t0 126 vext.8 $t2,$t2,$t2,#8 128 vorr $IN,$IN,$t2 @ H<<<=1 140 veor $t2,$Xl,$Xh 142 veor $Xm,$Xm,$t2 143 vpmull.p64 $t2,$Xl,$xC2 @ 1st phase [all …]
|
H A D | aesni-gcm-x86_64.pl | 82 ($Ii,$T1,$T2,$Hkey, 96 vmovdqu 0x20($const),$T2 # borrow $T2, .Lone_msb 100 vpaddb $T2,$T1,$inout1 101 vpaddb $T2,$inout1,$inout2 102 vpaddb $T2,$inout2,$inout3 103 vpaddb $T2,$inout3,$inout4 104 vpaddb $T2,$inout4,$inout5 114 vpaddb $T2,$inout5,$T1 # next counter value 122 vmovups 0x10-0x80($key),$T2 # borrow $T2 for $rndkey 127 vaesenc $T2,$inout0,$inout0 [all …]
|
H A D | ghash-x86_64.pl | 463 ($T1,$T2,$T3)=("%xmm3","%xmm4","%xmm5"); 468 if (!defined($HK)) { $HK = $T2; 472 pshufd \$0b01001110,$Hkey,$T2 474 pxor $Hkey,$T2 490 movdqa $T1,$T2 # 492 pslldq \$8,$T2 # 494 pxor $T2,$Xi # 503 movdqa $Xi,$T2 # 513 pxor $T2,$Xi 517 movdqa $Xi,$T2 [all …]
|
/freebsd/contrib/bc/scripts/ |
H A D | sqrt_frac_guess.bc | 53 t2 = (1/i) 56 l = length(t2$)/2 76 print "t2: ", t2, "\n" 92 t2 = (t2 >> l$) 96 t2 = (t2 >> l$) / 2 100 t2 = (t2 >> [all...] |
/freebsd/crypto/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 64 $t2="r5"; 219 ldrb $t2,[$rounds,#1] 223 orr $s0,$s0,$t2,lsl#16 226 ldrb $t2,[$rounds,#5] 230 orr $s1,$s1,$t2,lsl#16 233 ldrb $t2,[$rounds,#9] 237 orr $s2,$s2,$t2,lsl#16 240 ldrb $t2,[$rounds,#13] 243 orr $s3,$s3,$t2,lsl#16 273 mov $t2,$s0,lsr#16 @ manner... [all …]
|
/freebsd/crypto/openssl/crypto/md5/asm/ |
H A D | md5-sparcv9.pl | 43 ($t1,$t2,$t3,$saved_asi)=map("%l$_",(4..7)); 76 add $t2,$a,$a 80 sethi %hi(@K[$i+1]),$t2 82 or $t2,%lo(@K[$i+1]),$t2 84 add @X[$j],$t2,$t2 ! X[`$i+1`]+K[`$i+1`] 94 add $t2,$a,$a 96 sethi %hi(@K[$i+1]),$t2 98 or $t2,%lo(@K[$i+1]),$t2 100 add $tx,$t2,$t2 ! X[`2*$j+1`]+K[`$i+1`] 116 add $t2,$a,$a [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_onetimeauth/poly1305/sse2/ |
H A D | poly1305_sse2.c | 207 xmmi T0, T1, T2, T3, T4, T5, T6, T7, T8; in poly1305_blocks() local 241 T2 = _mm_loadu_si128((const xmmi *) (const void *) &st->H.hh[8]); in poly1305_blocks() 246 H4 = _mm_shuffle_epi32(T2, _MM_SHUFFLE(1, 1, 0, 0)); in poly1305_blocks() 251 T2 = _mm_loadu_si128((const xmmi *) (const void *) &st->R[0]); in poly1305_blocks() 255 T4 = _mm_unpacklo_epi32(T0, T2); in poly1305_blocks() 256 T5 = _mm_unpackhi_epi32(T0, T2); in poly1305_blocks() 262 T2 = _mm_cvtsi32_si128(1); in poly1305_blocks() 263 T4 = _mm_unpacklo_epi32(T0, T2); in poly1305_blocks() 264 T5 = _mm_unpackhi_epi32(T0, T2); in poly1305_blocks() 318 T2 = H4; in poly1305_blocks() [all …]
|
/freebsd/tools/regression/sockets/unix_cmsg/ |
H A D | unix_cmsg.t | 32 for t2 in \ 39 run ${n} stream "-z ${t2%% *}" STREAM "${t1} ${t2#* }" 47 for t2 in \ 52 run ${n} stream "-z ${t2%% *}" STREAM "${t1} ${t2#* }" 66 for t2 in \ 73 run ${n} dgram "-z ${t2%% *}" DGRAM "${t1} ${t2#* }" 80 for t2 in \ 85 run ${n} dgram "-z ${t2%% *}" DGRAM "${t1} ${t2#* }"
|
/freebsd/contrib/bearssl/src/symcipher/ |
H A D | aes_x86ni.c | 62 expand_step192(__m128i *t1, __m128i *t2, __m128i *t3) in expand_step192() argument 66 *t2 = _mm_shuffle_epi32(*t2, 0x55); in expand_step192() 73 *t1 = _mm_xor_si128(*t1, *t2); in expand_step192() 74 *t2 = _mm_shuffle_epi32(*t1, 0xFF); in expand_step192() 77 *t3 = _mm_xor_si128(*t3, *t2); in expand_step192() 82 expand_step256_1(__m128i *t1, __m128i *t2) in expand_step256_1() argument 86 *t2 = _mm_shuffle_epi32(*t2, 0xFF); in expand_step256_1() 93 *t1 = _mm_xor_si128(*t1, *t2); in expand_step256_1() 100 __m128i t2, t4; in expand_step256_2() local 103 t2 = _mm_shuffle_epi32(t4, 0xAA); in expand_step256_2() [all …]
|
/freebsd/crypto/openssl/crypto/sha/asm/ |
H A D | sha1-thumb.pl | 36 $t2="r2"; 53 lsl $t2,$a,#5 54 add $t2,$e 56 add $t2,$e @ E+=ROR(A,27) 57 add $t2,$t1 @ E+=X[i] 68 add $a,$t2,$t1 @ A=E+F_xx_xx(B,C,D) 140 mov $t2,sp 141 sub $t2,#16*4 @ [3] 155 cmp sp,$t2 159 sub $t2,#32*4 [all …]
|
H A D | sha1-alpha.pl | 36 $t2="ra"; 58 srl @X[$i],8,$t2 63 zapnot $t2,0x22,$t2 66 or $t0,$t2,$t0 72 and $b,$c,$t2 81 or $t2,$t3,$t2 89 addl $t2,$e,$e 95 and $b,$c,$t2 103 or $t2,$t3,$t2 109 addl $t2,$e,$e [all …]
|
H A D | sha256-armv4.pl | 77 $t2="r12"; 95 add $a,$a,$t2 @ h+=Maj(a,b,c) from the past 102 add $a,$a,$t2 @ h+=Maj(a,b,c) from the past 103 ldrb $t2,[$inp,#2] 105 orr $t1,$t1,$t2,lsl#8 106 ldrb $t2,[$inp],#4 112 orr $t1,$t1,$t2,lsl#24 117 ldr $t2,[$Ktbl],#4 @ *K256++ 123 add $h,$h,$t2 @ h+=K256[i] 128 and $t2,$t2,#0xff [all …]
|
/freebsd/crypto/openssl/crypto/bn/asm/ |
H A D | ppc-mont.pl | 358 $t0,$t1,$t2,$t3, 457 $UMULL $t2,$a2,$bi 464 adde $acc2,$acc2,$t2 467 $UMULH $t2,$a2,$bi 476 adde $acc3,$acc3,$t2 477 $UMULL $t2,$m2,$mi 494 adde $acc1,$acc2,$t2 495 $UMULH $t2,$m2,$mi 502 adde $acc2,$acc2,$t2 527 $UMULL $t2,$a2,$bi [all …]
|
H A D | ppc64-mont.pl | 141 $t2="r26"; 290 extrdi $t2,$t3,16,16 294 std $t2,`$FRAME+16`($sp) 310 lwz $t2,`12^$LITTLE_ENDIAN`($ap) ; load a[1] as 32-bit word pair 336 extrwi $t2,$t3,16,16 340 std $t2,`$FRAME+16`($sp) 345 mullw $t2,$t5,$n0 347 add $t1,$t1,$t2 361 lwz $t2,8($ap) ; load a[j..j+3] as 32-bit word pairs 379 std $t2,`$FRAME+80`($sp) [all …]
|
H A D | armv8-mont.pl | 667 my ($t0,$t1,$t2,$t3)=map("x$_",(14..17)); 763 mul $t2,$a3,$a0 769 adcs $acc3,$acc3,$t2 770 mul $t2,$a7,$a0 777 adcs $acc7,$acc7,$t2 778 umulh $t2,$a4,$a0 787 adcs $acc5,$acc5,$t2 788 mul $t2,$a2,$a1 // lo(a[2..7]*a[1]) (ii) 796 adds $acc3,$acc3,$t2 797 mul $t2,$a6,$a1 [all …]
|
/freebsd/contrib/bearssl/src/rsa/ |
H A D | rsa_i32_priv.c | 36 uint32_t *mp, *mq, *s1, *s2, *t1, *t2, *t3; in br_rsa_i32_private() local 44 * The mp, mq, s1, s2, t1 and t2 buffers are large enough to in br_rsa_i32_private() 51 t2 = tmp + 2 * U; in br_rsa_i32_private() 88 br_i32_zero(t2, mp[0]); in br_rsa_i32_private() 89 br_i32_mulacc(t2, mp, mq); in br_rsa_i32_private() 91 br_i32_encode(t2 + 2 * U, xlen, t2); in br_rsa_i32_private() 98 wn = ((unsigned char *)(t2 + 2 * U))[u]; in br_rsa_i32_private() 108 br_i32_modpow(s1, sk->dp, sk->dplen, mp, p0i, t1, t2); in br_rsa_i32_private() 115 br_i32_modpow(s2, sk->dq, sk->dqlen, mq, q0i, t1, t2); in br_rsa_i32_private() 130 br_i32_reduce(t2, s2, mp); in br_rsa_i32_private() [all …]
|
/freebsd/contrib/kyua/utils/config/ |
H A D | tree_test.cpp | 216 const config::tree t1, t2; in ATF_TEST_CASE_BODY() local 217 const config::tree combined = t1.combine(t2); in ATF_TEST_CASE_BODY() 238 config::tree t1, t2; in ATF_TEST_CASE_BODY() local 240 init_tree_for_combine_test(t2); in ATF_TEST_CASE_BODY() 246 const config::tree combined = t1.combine(t2); in ATF_TEST_CASE_BODY() 255 config::tree t1, t2; in ATF_TEST_CASE_BODY() local 257 init_tree_for_combine_test(t2); in ATF_TEST_CASE_BODY() 258 t2.set< config::int_node >("int-node", 3); in ATF_TEST_CASE_BODY() 259 t2.set< config::string_node >("string-node", "foo"); in ATF_TEST_CASE_BODY() 260 t2.set< config::int_node >("deeper.int.node", 15); in ATF_TEST_CASE_BODY() [all …]
|
/freebsd/contrib/bearssl/src/ec/ |
H A D | ec_c25519_m64.c | 102 uint64_t t0, t1, t2, t3, cc; in f255_add() local 110 t2 = (uint64_t)z; in f255_add() 127 z = (unsigned __int128)t2 + (z >> 64); in f255_add() 133 uint64_t t0, t1, t2, t3, cc; in f255_add() 138 k = _addcarry_u64(k, a[2], b[2], &t2); in f255_add() 153 k = _addcarry_u64(k, t2, 0, &d[2]); in f255_add() 174 uint64_t t0, t1, t2, t3, t4, cc; in f255_sub() local 186 t2 = (uint64_t)z; in f255_sub() 205 z = (unsigned __int128)t2 + (z >> 64); in f255_sub() 218 uint64_t t0, t1, t2, t3, t4; in f255_sub() [all …]
|
/freebsd/contrib/bearssl/src/int/ |
H A D | i15_modpow2.c | 34 uint16_t *t1, *t2, *base; in br_i15_modpow_opt() local 46 t2 = tmp + mwlen; in br_i15_modpow_opt() 70 * then t2 is set to x; otherwise, t2[0] is left untouched, and in br_i15_modpow_opt() 71 * t2[k] is set to x^k (for k >= 1). in br_i15_modpow_opt() 74 memcpy(t2, x, mlen); in br_i15_modpow_opt() 76 memcpy(t2 + mwlen, x, mlen); in br_i15_modpow_opt() 77 base = t2 + mwlen; in br_i15_modpow_opt() 128 * Window lookup: we want to set t2 to the window in br_i15_modpow_opt() 130 * the window length is 1 bit only, then t2 is in br_i15_modpow_opt() 134 br_i15_zero(t2, m[0]); in br_i15_modpow_opt() [all …]
|
H A D | i31_modpow2.c | 34 uint32_t *t1, *t2, *base; in br_i31_modpow_opt() local 46 t2 = tmp + mwlen; in br_i31_modpow_opt() 70 * then t2 is set to x; otherwise, t2[0] is left untouched, and in br_i31_modpow_opt() 71 * t2[k] is set to x^k (for k >= 1). in br_i31_modpow_opt() 74 memcpy(t2, x, mlen); in br_i31_modpow_opt() 76 memcpy(t2 + mwlen, x, mlen); in br_i31_modpow_opt() 77 base = t2 + mwlen; in br_i31_modpow_opt() 128 * Window lookup: we want to set t2 to the window in br_i31_modpow_opt() 130 * the window length is 1 bit only, then t2 is in br_i31_modpow_opt() 134 br_i31_zero(t2, m[0]); in br_i31_modpow_opt() [all …]
|