/freebsd/crypto/openssl/crypto/poly1305/asm/ |
H A D | poly1305-x86.pl | 392 my ($D0,$D1,$D2,$D3,$D4,$T0,$T1,$T2)=map("xmm$_",(0..7)); 430 &movdqa ($T1,$D1); 432 &pslld ($T1,2); 434 &paddd ($T1,$D1); # *5 436 &movdqa (&QWP(16*5,"esp"),$T1); 438 &movdqa ($T1,$D3); 440 &pslld ($T1,2); 442 &paddd ($T1,$D3); # *5 444 &movdqa (&QWP(16*7,"esp"),$T1); 447 &pshufd ($T1,$D0,0b01000100); [all …]
|
H A D | poly1305-x86_64.pl | 344 my ($H0,$H1,$H2,$H3,$H4, $T0,$T1,$T2,$T3,$T4, $D0,$D1,$D2,$D3,$D4, $MASK) = 812 vmovdqu 16*3($inp),$T1 816 vpsrldq \$6,$T1,$T3 817 vpunpckhqdq $T1,$T0,$T4 # 4 818 vpunpcklqdq $T1,$T0,$T0 # 0:1 822 vpsrlq \$26,$T0,$T1 825 vpand $MASK,$T1,$T1 # 1 905 vpmuludq $T1,$D4,$D1 # d1 = h1*r0 920 vpmuludq $T1,$H2,$H1 # h1*r1 931 vpmuludq $T1,$H3,$H1 # h1*r2 [all …]
|
H A D | poly1305-armv4.pl | 445 my ($T0,$T1,$MASK) = map("q$_",(15,4,0)); 578 vshr.u64 $T1,$D0,#26 582 vadd.i64 $D1,$D1,$T1 @ h0 -> h1 587 vshr.u64 $T1,$D1,#26 589 vadd.i64 $D2,$D2,$T1 @ h1 -> h2 595 vshrn.u64 $T1#lo,$D2,#26 598 vadd.i32 $D3#lo,$D3#lo,$T1#lo @ h2 -> h3 603 vshr.u32 $T1#lo,$D3#lo,#26 606 vadd.i32 $D4#lo,$D4#lo,$T1#lo @ h3 -> h4 945 vshr.u64 $T1,$D0,#26 [all …]
|
H A D | poly1305-armv8.pl | 227 my ($T0,$T1,$MASK) = map("v$_",(29..31)); 705 ushr $T1.2d,$ACC0,#26 709 add $ACC1,$ACC1,$T1.2d // h0 -> h1 713 ushr $T1.2d,$ACC1,#26 716 add $ACC2,$ACC2,$T1.2d // h1 -> h2 720 shrn $T1.2s,$ACC2,#26 724 add $H3,$H3,$T1.2s // h2 -> h3 729 ushr $T1.2s,$H3,#26 733 add $H4,$H4,$T1.2s // h3 -> h4 846 ushr $T1.2d,$ACC0,#26 [all …]
|
/freebsd/crypto/openssl/crypto/modes/asm/ |
H A D | ghash-x86_64.pl | 463 ($T1,$T2,$T3)=("%xmm3","%xmm4","%xmm5"); 471 pshufd \$0b01001110,$Xi,$T1 473 pxor $Xi,$T1 # 479 pshufd \$0b01001110,$Xi,$T1 480 pxor $Xi,$T1 # 486 pclmulqdq \$0x00,$HK,$T1 ####### 487 pxor $Xi,$T1 # 488 pxor $Xhi,$T1 # 490 movdqa $T1,$T2 # 491 psrldq \$8,$T1 [all …]
|
H A D | aesni-gcm-x86_64.pl | 82 ($Ii,$T1,$T2,$Hkey, 100 vpaddb $T2,$T1,$inout1 105 vpxor $rndkey,$T1,$inout0 114 vpaddb $T2,$inout5,$T1 # next counter value 119 vmovdqu $T1,($ivp) # save next counter value 130 vpclmulqdq \$0x00,$Hkey,$Z3,$T1 143 vpxor $Z1,$T1,$Z0 146 vpclmulqdq \$0x10,$Hkey,$Ii,$T1 167 vpxor $T1,$Z2,$Z2 168 vpclmulqdq \$0x00,$Z1,$Ii,$T1 [all …]
|
H A D | ghash-x86.pl | 839 ($T1,$T2,$T3)=("xmm3","xmm4","xmm5"); 848 &pshufd ($T1,$Xi,0b01001110); 850 &pxor ($T1,$Xi); # 856 &pclmulqdq ($T1,$HK,0x00); ####### 857 &xorps ($T1,$Xi); # 858 &xorps ($T1,$Xhi); # 860 &movdqa ($T2,$T1); # 861 &psrldq ($T1,8); 863 &pxor ($Xhi,$T1); 875 &movdqa ($T1,$Xi); # [all …]
|
/freebsd/contrib/llvm-project/libcxx/include/ |
H A D | utility | 73 template <class T1, class T2> 76 typedef T1 first_type; 79 T1 first; 85 … explicit(see-below) pair(const T1& x, const T2& y); // constexpr in C++14 86 … template <class U = T1, class V = T2> explicit(see-below) pair(U&&, V&&); // constexpr in C++14 101 pair& operator=(pair&& p) noexcept(is_nothrow_move_assignable<T1>::value && 110 void swap(pair& p) noexcept(is_nothrow_swappable_v<T1> && 115 template<class T1, class T2, class U1, class U2, template<class> class TQual, template<class> class… 116 struct basic_common_reference<pair<T1, T2>, pair<U1, U2>, TQual, UQual>; // since C++23 118 template<class T1, class T2, class U1, class U2> [all …]
|
/freebsd/crypto/openssl/crypto/seed/ |
H A D | seed_local.h | 57 # define KEYSCHEDULE_UPDATE0(T0, T1, X1, X2, X3, X4, KC) \ argument 62 (T1) = ((X2) + (KC) - (X4)) & 0xffffffff 64 # define KEYSCHEDULE_UPDATE1(T0, T1, X1, X2, X3, X4, KC) \ argument 69 (T1) = ((X2) + (KC) - (X4)) & 0xffffffff 71 # define KEYUPDATE_TEMP(T0, T1, K) \ argument 73 (K)[1] = G_FUNC((T1)) 99 # define E_SEED(T0, T1, X1, X2, X3, X4, rbase) \ argument 101 (T1) = (X4) ^ (ks->data)[(rbase)+1]; \ 102 (T1) ^= (T0); \ 103 (T1) = G_FUNC((T1)); \ [all …]
|
/freebsd/crypto/openssl/crypto/sha/asm/ |
H A D | sha512-sparcv9.pl | 118 $T1="%g2"; 148 ldx [$inp+64],$T1 158 srlx $T1,$tmp32,$T1 159 or $T1,@X[7],@X[7] 165 $code.="\tadd @X[$i/2],$h,$T1\n"; 167 $code.="\tsrlx @X[$i/2],32,$T1\n\tadd $h,$T1,$T1\n"; 196 add $h,$tmp2,$T1 215 add $h,$tmp2,$T1 230 $code.="\tadd $h,$T1,$T1\n"; 250 add $tmp2,$T1,$T1 [all …]
|
H A D | sha256-c64xplus.pl | 36 ($E,$Ectx,$F,$Fctx,$G,$Gctx,$H,$Hctx,$T1,$S1,$s0,$t0e,$t1e,$t2e,$X1,$X15) 137 || ADD $K,$H,$T1 ; T1 = h + K256[i] 138 ADD $X0,$T1,$T1 ; T1 += X[i]; 145 || ADD $Ch,$T1,$T1 ; T1 += Ch(e,f,g) 146 ADD $S1,$T1,$T1 ; T1 += Sigma1(e) 154 || ADD $D,$T1,$E ; e = d + T1 158 || ADD $T1,$T2,$A ; a = T1 + T2 176 || ADD $K,$H,$T1 ; T1 = h + K256[i] 177 ADD $X0,$T1,$T1 ; T1 += X[i]; 184 || ADD $Ch,$T1,$T1 ; T1 += Ch(e,f,g) [all …]
|
H A D | sha512-s390x.pl | 74 $T1="%r14"; 117 $LD $T1,`$i*$SZ`($inp) ### $i 126 $ST $T1,`$stdframe+$SZ*($i%16)`($sp) 128 algr $T1,$h # T1+=h 131 algr $T1,$t0 # T1+=Sigma1(e) 134 $ADD $T1,`$i*$SZ`($len,$tbl) # T1+=K[i] 136 algr $T1,$t2 # T1+=Ch(e,f,g) 144 algr $h,$T1 # h+=T1 146 algr $d,$T1 # d+=T1 155 $LD $T1,`$stdframe+$SZ*(($i+1)%16)`($sp) ### $i [all …]
|
H A D | sha512-armv8.pl | 106 my ($T0,$T1,$T2)=(@X[($i-8)&15],@X[($i-9)&15],@X[($i-10)&15]); 161 ror $T1,@X[($j+1)&15],#$sigma0[0] 168 eor $T1,$T1,@X[($j+1)&15],ror#$sigma0[1] 176 eor $T1,$T1,@X[($j+1)&15],lsr#$sigma0[2] // sigma0(X[i+1]) 185 add @X[$j],@X[$j],$T1 454 my ($T0,$T1,$T2,$T3,$T4,$T5,$T6,$T7) = map("q$_",(4..7,16..19)); 486 &ushr_32 ($T1,$T0,$sigma0[2]); 496 &eor_8 ($T1,$T1,$T2); 505 &eor_8 ($T1,$T1,$T3); # sigma0(X[1..4]) 517 &add_32 (@X[0],@X[0],$T1); # X[0..3] += sigma0(X[1..4]) [all …]
|
H A D | sha256-armv4.pl | 67 $T1="r3"; $t3="r3"; 312 my ($T0,$T1,$T2,$T3,$T4,$T5)=("q8","q9","q10","q11","d24","d25"); 336 &vext_8 ($T1,@X[2],@X[3],4); # X[9..12] 343 &vadd_i32 (@X[0],@X[0],$T1); # X[0..3] += X[9..12] 346 &vshr_u32 ($T1,$T0,$sigma0[2]); 355 &veor ($T1,$T1,$T2); 364 &veor ($T1,$T1,$T3); # sigma0(X[1..4]) 373 &vadd_i32 (@X[0],@X[0],$T1); # X[0..3] += sigma0(X[1..4]) 505 vld1.32 {$T1},[$Ktbl,:128]! 518 vadd.i32 $T1,$T1,@X[1] [all …]
|
/freebsd/crypto/openssl/crypto/sha/ |
H A D | sha256.c | 150 unsigned MD32_REG_T a, b, c, d, e, f, g, h, s0, s1, T1, T2; in sha256_block_data_order() local 168 T1 = X[i] = l; in sha256_block_data_order() 169 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; in sha256_block_data_order() 174 e = d + T1; in sha256_block_data_order() 178 a = T1 + T2; in sha256_block_data_order() 187 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf]; in sha256_block_data_order() 188 T1 += h + Sigma1(e) + Ch(e, f, g) + K256[i]; in sha256_block_data_order() 193 e = d + T1; in sha256_block_data_order() 197 a = T1 + T2; in sha256_block_data_order() 215 T1 += h + Sigma1(e) + Ch(e,f,g) + K256[i]; \ [all …]
|
H A D | sha512.c | 554 SHA_LONG64 a, b, c, d, e, f, g, h, s0, s1, T1, T2; in sha512_block_data_order() local 571 T1 = X[i] = W[i]; in sha512_block_data_order() 573 T1 = X[i] = PULL64(W[i]); in sha512_block_data_order() 575 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i]; in sha512_block_data_order() 580 e = d + T1; in sha512_block_data_order() 584 a = T1 + T2; in sha512_block_data_order() 593 T1 = X[i & 0xf] += s0 + s1 + X[(i + 9) & 0xf]; in sha512_block_data_order() 594 T1 += h + Sigma1(e) + Ch(e, f, g) + K512[i]; in sha512_block_data_order() 599 e = d + T1; in sha512_block_data_order() 603 a = T1 + T2; in sha512_block_data_order() [all …]
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_onetimeauth/poly1305/sse2/ |
H A D | poly1305_sse2.c | 207 xmmi T0, T1, T2, T3, T4, T5, T6, T7, T8; in poly1305_blocks() local 240 T1 = _mm_loadu_si128((const xmmi *) (const void *) &st->H.hh[4]); in poly1305_blocks() 244 H2 = _mm_shuffle_epi32(T1, _MM_SHUFFLE(1, 1, 0, 0)); in poly1305_blocks() 245 H3 = _mm_shuffle_epi32(T1, _MM_SHUFFLE(3, 3, 2, 2)); in poly1305_blocks() 254 T1 = _mm_cvtsi32_si128(st->R2[4]); in poly1305_blocks() 257 R24 = _mm_unpacklo_epi64(T1, T3); in poly1305_blocks() 261 T1 = _mm_cvtsi32_si128(st->R[4]); in poly1305_blocks() 265 R24 = T1; in poly1305_blocks() 274 T1 = _mm_cvtsi32_si128(st->R2[4]); in poly1305_blocks() 279 R24 = _mm_shuffle_epi32(T1, _MM_SHUFFLE(0, 0, 0, 0)); in poly1305_blocks() [all …]
|
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_syscall_linux_x86_64.inc | 22 template <typename T1> 23 static uptr internal_syscall(u64 nr, T1 arg1) { 30 template <typename T1, typename T2> 31 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2) { 38 template <typename T1, typename T2, typename T3> 39 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3) { 46 template <typename T1, typename T2, typename T3, typename T4> 47 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4) { 56 template <typename T1, typename T2, typename T3, typename T4, typename T5> 57 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4, [all …]
|
/freebsd/contrib/ldns/ |
H A D | sha2.c | 332 T1 = (h) + Sigma1_256(e) + Ch((e), (f), (g)) + \ 334 (d) += T1; \ 335 (h) = T1 + Sigma0_256(a) + Maj((a), (b), (c)); \ 342 T1 = (h) + Sigma1_256(e) + Ch((e), (f), (g)) + \ 344 (d) += T1; \ 345 (h) = T1 + Sigma0_256(a) + Maj((a), (b), (c)); \ 355 T1 = (h) + Sigma1_256(e) + Ch((e), (f), (g)) + K256[j] + \ 357 (d) += T1; \ 358 (h) = T1 + Sigma0_256(a) + Maj((a), (b), (c)); \ 364 sha2_word32 T1, *W256; in ldns_sha256_Transform() local [all …]
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | sha2.c | 370 T1 = (h) + Sigma1_256((e)) + Ch((e), (f), (g)) + K256[j] + W256[j]; \ 371 (d) += T1; \ 372 (h) = T1 + Sigma0_256((a)) + Maj((a), (b), (c)); \ 381 T1 = (h) + Sigma1_256((e)) + Ch((e), (f), (g)) + K256[j] + \ 383 (d) += T1; \ 384 (h) = T1 + Sigma0_256((a)) + Maj((a), (b), (c)); \ 392 u_int32_t T1, W256[16]; in SHA256Transform() local 441 a = b = c = d = e = f = g = h = T1 = 0; in SHA256Transform() 450 u_int32_t T1, T2, W256[16]; in SHA256Transform() local 468 T1 = h + Sigma1_256(e) + Ch(e, f, g) + K256[j] + W256[j]; in SHA256Transform() [all …]
|
/freebsd/contrib/llvm-project/clang/lib/AST/ |
H A D | ASTStructuralEquivalence.cpp | 99 QualType T1, QualType T2); 804 QualType T1, QualType T2) { in IsStructurallyEquivalent() argument 805 if (T1.isNull() || T2.isNull()) in IsStructurallyEquivalent() 806 return T1.isNull() && T2.isNull(); in IsStructurallyEquivalent() 808 QualType OrigT1 = T1; in IsStructurallyEquivalent() 814 T1 = Context.FromCtx.getCanonicalType(T1); in IsStructurallyEquivalent() 818 if (T1.getQualifiers() != T2.getQualifiers()) in IsStructurallyEquivalent() 821 Type::TypeClass TC = T1->getTypeClass(); in IsStructurallyEquivalent() 823 if (T1->getTypeClass() != T2->getTypeClass()) { in IsStructurallyEquivalent() 826 if (T1->getTypeClass() == Type::FunctionProto && in IsStructurallyEquivalent() [all …]
|
/freebsd/crypto/openssl/crypto/aria/ |
H A D | aria.c | 345 #define ARIA_ADD_ROUND_KEY(RK, T0, T1, T2, T3) \ argument 348 (T1) ^= (RK)->u[1]; \ 354 #define ARIA_SBOX_LAYER1_WITH_PRE_DIFF(T0, T1, T2, T3) \ argument 361 (T1) = \ 362 S1[GET_U8_BE(T1, 0)] ^ \ 363 S2[GET_U8_BE(T1, 1)] ^ \ 364 X1[GET_U8_BE(T1, 2)] ^ \ 365 X2[GET_U8_BE(T1, 3)]; \ 379 #define ARIA_SBOX_LAYER2_WITH_PRE_DIFF(T0, T1, T2, T3) \ argument 386 (T1) = \ [all …]
|
/freebsd/contrib/googletest/googletest/test/ |
H A D | gtest_pred_impl_unittest.cc | 74 template <typename T1> 75 bool PredFunction1(T1 v1) { in PredFunction1() 86 template <typename T1> 87 bool operator()(const T1& v1) { in operator ()() 93 template <typename T1> 94 testing::AssertionResult PredFormatFunction1(const char* e1, const T1& v1) { in PredFormatFunction1() 103 template <typename T1> 104 testing::AssertionResult operator()(const char* e1, const T1& v1) const { in operator ()() 450 template <typename T1, typename T2> 451 bool PredFunction2(T1 v1, T2 v2) { in PredFunction2() [all …]
|
/freebsd/contrib/googletest/googletest/include/gtest/ |
H A D | gtest_pred_impl.h | 86 template <typename Pred, typename T1> 88 Pred pred, const T1& v1) { in AssertPred1Helper() 117 template <typename Pred, typename T1, typename T2> 119 const char* e2, Pred pred, const T1& v1, in AssertPred2Helper() 154 template <typename Pred, typename T1, typename T2, typename T3> 157 const T1& v1, const T2& v2, const T3& v3) { in AssertPred3Helper() 193 template <typename Pred, typename T1, typename T2, typename T3, typename T4> 196 const char* e4, Pred pred, const T1& v1, in AssertPred4Helper() 234 template <typename Pred, typename T1, typename T2, typename T3, typename T4, 239 const T1& v1, const T2& v2, const T3& v3, in AssertPred5Helper()
|
/freebsd/contrib/unbound/compat/ |
H A D | sha512.c | 274 sha2_word64 T1, T2, *W512 = (sha2_word64*)context->buffer; in SHA512_Transform() local 293 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j]; in SHA512_Transform() 296 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + (W512[j] = *data++); in SHA512_Transform() 302 e = d + T1; in SHA512_Transform() 306 a = T1 + T2; in SHA512_Transform() 319 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + in SHA512_Transform() 325 e = d + T1; in SHA512_Transform() 329 a = T1 + T2; in SHA512_Transform() 345 a = b = c = d = e = f = g = h = T1 = T2 = 0; in SHA512_Transform()
|