/freebsd/sys/contrib/libsodium/src/libsodium/crypto_generichash/blake2b/ref/ |
H A D | blake2b-load-avx2.h | 6 t0 = _mm256_unpacklo_epi64(m0, m1); \ 8 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 13 t0 = _mm256_unpackhi_epi64(m0, m1); \ 15 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 20 t0 = _mm256_unpacklo_epi64(m4, m5); \ 22 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 27 t0 = _mm256_unpackhi_epi64(m4, m5); \ 29 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 34 t0 = _mm256_unpacklo_epi64(m7, m2); \ 36 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ [all …]
|
/freebsd/sys/contrib/libb2/ |
H A D | blake2s-load-sse41.h | 30 t0 = _mm_blend_epi16(m1, m2, 0x0C); \ 32 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 36 t0 = _mm_shuffle_epi32(m2,_MM_SHUFFLE(0,0,2,0)); \ 38 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 42 t0 = _mm_slli_si128(m1, 4); \ 43 t1 = _mm_blend_epi16(m2, t0, 0x30); \ 48 t0 = _mm_unpackhi_epi32(m0,m1); \ 50 t2 = _mm_blend_epi16(t0, t1, 0x0C); \ 54 t0 = _mm_unpackhi_epi32(m2,m3); \ 56 t2 = _mm_blend_epi16(t0, t1, 0x0F); \ [all …]
|
H A D | blake2s-load-xop.h | 43 t0 = _mm_perm_epi8(m1, m2, _mm_set_epi32(TOB(0),TOB(5),TOB(0),TOB(0)) ); \ 44 buf = _mm_perm_epi8(t0, m3, _mm_set_epi32(TOB(5),TOB(2),TOB(1),TOB(6)) ); 51 t0 = _mm_perm_epi8(m0, m1, _mm_set_epi32(TOB(5),TOB(0),TOB(0),TOB(1)) ); \ 52 buf = _mm_perm_epi8(t0, m2, _mm_set_epi32(TOB(3),TOB(7),TOB(1),TOB(0)) ); 59 t0 = _mm_perm_epi8(m1, m2, _mm_set_epi32(TOB(0),TOB(1),TOB(0),TOB(7)) ); \ 60 buf = _mm_perm_epi8(t0, m3, _mm_set_epi32(TOB(7),TOB(2),TOB(4),TOB(0)) ); 67 t0 = _mm_perm_epi8(m0, m1, _mm_set_epi32(TOB(0),TOB(7),TOB(3),TOB(0)) ); \ 68 buf = _mm_perm_epi8(t0, m2, _mm_set_epi32(TOB(5),TOB(2),TOB(1),TOB(6)) ); 75 t0 = _mm_perm_epi8(m0, m1, _mm_set_epi32(TOB(0),TOB(0),TOB(3),TOB(7)) ); \ 76 t0 = _mm_perm_epi8(t0, m2, _mm_set_epi32(TOB(7),TOB(2),TOB(1),TOB(0)) ); \ [all …]
|
/freebsd/crypto/openssl/crypto/seed/ |
H A D | seed.c | 450 seed_word t0, t1; in SEED_set_key() local 457 t0 = (x1 + x3 - KC0) & 0xffffffff; in SEED_set_key() 459 KEYUPDATE_TEMP(t0, t1, &ks->data[0]); in SEED_set_key() 460 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC1); in SEED_set_key() 461 KEYUPDATE_TEMP(t0, t1, &ks->data[2]); in SEED_set_key() 464 KEYSCHEDULE_UPDATE0(t0, t1, x1, x2, x3, x4, KC2); in SEED_set_key() 465 KEYUPDATE_TEMP(t0, t1, &ks->data[4]); in SEED_set_key() 466 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC3); in SEED_set_key() 467 KEYUPDATE_TEMP(t0, t1, &ks->data[6]); in SEED_set_key() 468 KEYSCHEDULE_UPDATE0(t0, t1, x1, x2, x3, x4, KC4); in SEED_set_key() [all …]
|
/freebsd/sys/riscv/riscv/ |
H A D | locore.S | 73 lla t0, hart_lottery 75 amoadd.w t0, t1, 0(t0) 81 beqz t0, 1f 85 lla t0, boot_hart 86 sw a0, 0(t0) 162 add t0, s1, a5 163 sd t6, (t0) /* Store new PTE */ 182 add t0, s1, a5 183 sd t6, (t0) 190 li t0, (PTE_KERN | PTE_X) [all …]
|
H A D | exception.S | 59 sd t0, (TF_T + 0 * 8)(sp) 92 add t0, sp, t1 93 sd t0, (TF_SP)(sp) 96 csrr t0, sscratch 97 sd t0, (TF_SP)(sp) 99 li t0, 0 100 csrw sscratch, t0 101 csrr t0, sepc 102 sd t0, (TF_SEPC)(sp) 103 csrr t0, sstatus [all …]
|
/freebsd/crypto/openssl/crypto/sha/asm/ |
H A D | sha512-armv4.pl | 87 $t0="r9"; 111 mov $t0,$Elo,lsr#14 115 eor $t0,$t0,$Ehi,lsl#18 119 eor $t0,$t0,$Elo,lsr#18 121 eor $t0,$t0,$Ehi,lsl#14 123 eor $t0,$t0,$Ehi,lsr#9 125 eor $t0,$t0,$Elo,lsl#23 127 adds $Tlo,$Tlo,$t0 128 ldr $t0,[sp,#$Foff+0] @ f.lo 136 eor $t0,$t0,$t2 [all …]
|
H A D | sha1-mips.pl | 35 ($zero,$at,$t0,$t1,$t2)=map("\$$_",(0..2,24,25)); 103 $t0="\$25"; 116 srl $t0,@X[$i],24 # byte swap($i) 122 or @X[$i],$t0 130 xor $t0,$c,$d 132 and $t0,$b 140 xor $t0,$d 143 addu $e,$t0 146 sll $t0,$a,5 # $i 150 addu $e,$t0 [all …]
|
H A D | sha1-thumb.pl | 34 $t0="r0"; 50 sub $t0,#4 51 ldr $t1,[$t0] 175 ldmia $t0!,{$a,$b,$c,$d,$e} @ $t0 is r0 and holds ctx 176 mov $t0,$Xi 179 mov $t1,$t0 187 cmp $Xi,$t0 191 mov $t1,$t0 199 cmp $Xi,$t0 201 cmp sp,$t0 [all …]
|
H A D | sha1-parisc.pl | 62 $t0="%r28"; 67 "%r9", "%r10","%r11","%r12","%r13","%r14","%r15","%r16",$t0); 78 and $c,$b,$t0 82 or $t1,$t0,$t0 83 addl $t0,$e,$e 90 and $c,$b,$t0 95 or $t1,$t0,$t0 97 add $t0,$e,$e 111 xor $b,$c,$t0 115 xor $d,$t0,$t0 [all …]
|
/freebsd/lib/libmp/tests/ |
H A D | legacy_test.c | 34 *c42,*c43, *c44, *c45, *t0, *t1; variable 54 mp_madd(c42, c1, t0); in testsimpel() 55 testmcmp(c43, t0, "madd0"); in testsimpel() 56 mp_madd(t0, c1, t0); in testsimpel() 57 testmcmp(c44, t0, "madd1"); in testsimpel() 58 mp_msub(t0, c1, t0); in testsimpel() 59 testmcmp(c43, t0, "msub0"); in testsimpel() 60 mp_msub(t0, c1, t0); in testsimpel() 61 testmcmp(c42, t0, "msub1"); in testsimpel() 62 mp_move(c42, t0); in testsimpel() [all …]
|
/freebsd/crypto/openssl/crypto/ec/asm/ |
H A D | x25519-ppc64.pl | 49 my ($bi,$a0,$a1,$a2,$a3,$t0,$t1, $t2,$t3, 82 mulhdu $t0,$a0,$bi 96 addc @acc[1],@acc[1],$t0 # accumulate high parts 97 mulld $t0,$a0,$bi 104 addc @acc[1],@acc[1],$t0 # accumulate low parts 105 mulhdu $t0,$a0,$bi 117 addc $acc4,$acc4,$t0 118 mulld $t0,$acc4,$bi 126 addc $acc0,$acc0,$t0 127 mulhdu $t0,$acc4,$bi [all …]
|
H A D | ecp_nistz256-x86_64.pl | 117 my ($t0,$t1,$t2,$t3,$t4)=("%rax","%rdx","%rcx","%r12","%r13"); 141 mov $a0, $t0 155 cmovc $t0, $a0 191 mov $a0, $t0 205 test \$1, $t0 207 cmovz $t0, $a0 213 mov $a1, $t0 # a0:a3>>1 215 shl \$63, $t0 218 or $t0, $a0 265 mov $a0, $t0 [all …]
|
H A D | ecp_nistz256-armv8.pl | 49 my ($rp,$ap,$bp,$bi,$a0,$a1,$a2,$a3,$t0,$t1,$t2,$t3,$poly1,$poly3, 229 ldp $t0,$t1,[$bp] 276 mov $t0,$acc0 301 mov $t0,$acc0 312 mov $t0,$a0 376 umulh $t0,$a0,$bi 388 adds $acc1,$acc1,$t0 // accumulate high parts of multiplication 389 lsl $t0,$acc0,#32 422 subs $t2,$acc0,$t0 // "*0xffff0001" 424 adds $acc0,$acc1,$t0 // +=acc[0]<<96 and omit acc[0] [all …]
|
H A D | ecp_nistz256-ppc64.pl | 46 $acc4,$acc5,$a0,$a1,$a2,$a3,$t0,$t1,$t2,$t3) = 212 ld $t0, 0($bp) 290 mr $t0,$acc0 330 mr $t0,$acc0 346 ld $t0,64($sp) 443 mulhdu $t0,$a0,$bi 455 addc $acc1,$acc1,$t0 # accumulate high parts of multiplication 456 sldi $t0,$acc0,32 490 subfc $t2,$t0,$acc0 # "*0xffff0001" 492 addc $acc0,$acc1,$t0 # +=acc[0]<<96 and omit acc[0] [all …]
|
/freebsd/crypto/openssl/crypto/modes/asm/ |
H A D | ghash-alpha.pl | 32 $t0="t0"; 71 sll $Zhi,60,$t0 82 xor $t0,$Zlo,$Zlo 97 sll $Zhi,60,$t0 108 xor $t0,$Zlo,$Zlo 118 sll $Zhi,60,$t0 130 xor $t0,$Zlo,$Zlo 139 sll $Zhi,60,$t0 150 xor $t0,$Zlo,$Zlo 159 sll $Zhi,60,$t0 [all …]
|
H A D | ghashv8-armx.pl | 72 my ($t0,$t1,$t2,$xC2,$H,$Hhl,$H2)=map("q$_",(8..14)); 121 vext.8 $t0,$t2,$xC2,#8 @ t0=0xc2....01 124 vand $t2,$t2,$t0 127 vand $t0,$t0,$t1 129 veor $H,$IN,$t0 @ twisted H 133 vext.8 $t0,$H,$H,#8 @ Karatsuba pre-processing 135 veor $t0,$t0,$H 137 vpmull.p64 $Xm,$t0,$t0 156 vext.8 $Hhl,$t0,$t1,#8 @ pack Karatsuba pre-processed 168 vpmull.p64 $Xm,$t0,$t1 [all …]
|
/freebsd/crypto/openssl/crypto/bn/asm/ |
H A D | armv4-gf2m.pl | 78 ($hi,$lo,$t0,$t1, $i0,$i1 )=map("r$_",(4..9),12); 109 ldr $t0,[sp,$i0] @ tab[b >> 6 & 0x7] 115 eor $lo,$lo,$t0,lsl#6 116 eor $hi,$hi,$t0,lsr#26 117 ldr $t0,[sp,$i0] @ tab[b >> 12 & 0x7] 125 eor $lo,$lo,$t0,lsl#12 126 eor $hi,$hi,$t0,lsr#20 127 ldr $t0,[sp,$i0] @ tab[b >> 18 & 0x7] 135 eor $lo,$lo,$t0,lsl#18 136 eor $hi,$hi,$t0,lsr#14 [all …]
|
H A D | ppc64-mont.pl | 139 $t0="r24"; # temporary registers 288 extrdi $t0,$t3,16,48 292 std $t0,`$FRAME+0`($sp) 308 extrdi $t0,$a0,32,32 ; lwz $t0,4($ap) 334 extrwi $t0,$t1,16,16 338 std $t0,`$FRAME+0`($sp) ; yes, std in 32-bit build 343 mullw $t0,$t4,$n0 ; mulld tp[0]*n0 350 extrwi $t4,$t0,16,16 351 extrwi $t5,$t0,16,0 359 mr $t0,$a0 ; lwz $t0,0($ap) [all …]
|
H A D | armv8-mont.pl | 667 my ($t0,$t1,$t2,$t3)=map("x$_",(14..17)); 761 mul $t0,$a1,$a0 // lo(a[1..7]*a[0]) (i) 765 adds $acc1,$acc1,$t0 // t[1]+lo(a[1]*a[0]) 766 mul $t0,$a5,$a0 773 adcs $acc5,$acc5,$t0 774 umulh $t0,$a2,$a0 783 adcs $acc3,$acc3,$t0 784 umulh $t0,$a6,$a0 791 adcs $acc7,$acc7,$t0 792 mul $t0,$a4,$a1 [all …]
|
/freebsd/crypto/openssh/ |
H A D | smult_curve25519_ref.c | 190 unsigned int t0[32]; in recip() local 196 /* 8 */ square(t0,t1); in recip() 197 /* 9 */ mult(z9,t0,z); in recip() 199 /* 22 */ square(t0,z11); in recip() 200 /* 2^5 - 2^0 = 31 */ mult(z2_5_0,t0,z9); in recip() 202 /* 2^6 - 2^1 */ square(t0,z2_5_0); in recip() 203 /* 2^7 - 2^2 */ square(t1,t0); in recip() 204 /* 2^8 - 2^3 */ square(t0,t1); in recip() 205 /* 2^9 - 2^4 */ square(t1,t0); in recip() 206 /* 2^10 - 2^5 */ square(t0,t1); in recip() [all …]
|
H A D | rijndael.c | 765 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 780 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; in rijndaelEncrypt() 785 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; in rijndaelEncrypt() 786 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9]; in rijndaelEncrypt() 787 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; in rijndaelEncrypt() 788 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; in rijndaelEncrypt() 790 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; in rijndaelEncrypt() 795 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16]; in rijndaelEncrypt() 796 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17]; in rijndaelEncrypt() 797 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18]; in rijndaelEncrypt() [all …]
|
/freebsd/sys/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 862 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 877 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; in rijndaelEncrypt() 882 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; in rijndaelEncrypt() 883 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9]; in rijndaelEncrypt() 884 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; in rijndaelEncrypt() 885 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; in rijndaelEncrypt() 887 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; in rijndaelEncrypt() 892 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16]; in rijndaelEncrypt() 893 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17]; in rijndaelEncrypt() 894 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18]; in rijndaelEncrypt() [all …]
|
/freebsd/crypto/openssl/crypto/aes/asm/ |
H A D | aes-parisc.pl | 65 ($t0,$t1,$t2,$t3) = ("%r5","%r6","%r7","%r8"); 105 ldi 3,$t0 107 andcm $tbl,$t0,$tbl 110 and $inp,$t0,$t0 111 sub $inp,$t0,$inp 115 comib,= 0,$t0,L\$enc_inp_aligned 118 sh3addl $t0,%r0,$t0 119 subi 32,$t0,$t0 120 mtctl $t0,%cr11 199 ldw 0($key),$t0 [all …]
|
/freebsd/sys/crypto/camellia/ |
H A D | camellia.c | 105 #define CAMELLIA_F(xl, xr, kl, kr, yl, yr, il, ir, t0, t1) \ argument 109 t0 = il >> 16; \ 115 yr = CAMELLIA_SP1110((t0 >> 8) & 0xff) \ 116 ^ CAMELLIA_SP0222(t0 & 0xff) \ 125 #define CAMELLIA_FLS(ll, lr, rl, rr, kll, klr, krl, krr, t0, t1, t2, t3) \ argument 127 t0 = kll; \ 129 t0 &= ll; \ 132 lr ^= CAMELLIA_RL1(t0); \ 141 #define CAMELLIA_ROUNDSM(xl, xr, kl, kr, yl, yr, il, ir, t0, t1) \ argument 440 uint32_t il, ir, t0, t1, w0, w1; in camellia_setup128() local [all …]
|