| /freebsd/sys/contrib/libsodium/src/libsodium/crypto_generichash/blake2b/ref/ |
| H A D | blake2b-load-avx2.h | 6 t0 = _mm256_unpacklo_epi64(m0, m1); \ 8 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 13 t0 = _mm256_unpackhi_epi64(m0, m1); \ 15 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 20 t0 = _mm256_unpacklo_epi64(m4, m5); \ 22 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 27 t0 = _mm256_unpackhi_epi64(m4, m5); \ 29 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 34 t0 = _mm256_unpacklo_epi64(m7, m2); \ 36 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ [all …]
|
| /freebsd/sys/contrib/libb2/ |
| H A D | blake2s-load-sse41.h | 30 t0 = _mm_blend_epi16(m1, m2, 0x0C); \ 32 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 36 t0 = _mm_shuffle_epi32(m2,_MM_SHUFFLE(0,0,2,0)); \ 38 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 42 t0 = _mm_slli_si128(m1, 4); \ 43 t1 = _mm_blend_epi16(m2, t0, 0x30); \ 48 t0 = _mm_unpackhi_epi32(m0,m1); \ 50 t2 = _mm_blend_epi16(t0, t1, 0x0C); \ 54 t0 = _mm_unpackhi_epi32(m2,m3); \ 56 t2 = _mm_blend_epi16(t0, t1, 0x0F); \ [all …]
|
| H A D | blake2s-load-xop.h | 43 t0 = _mm_perm_epi8(m1, m2, _mm_set_epi32(TOB(0),TOB(5),TOB(0),TOB(0)) ); \ 44 buf = _mm_perm_epi8(t0, m3, _mm_set_epi32(TOB(5),TOB(2),TOB(1),TOB(6)) ); 51 t0 = _mm_perm_epi8(m0, m1, _mm_set_epi32(TOB(5),TOB(0),TOB(0),TOB(1)) ); \ 52 buf = _mm_perm_epi8(t0, m2, _mm_set_epi32(TOB(3),TOB(7),TOB(1),TOB(0)) ); 59 t0 = _mm_perm_epi8(m1, m2, _mm_set_epi32(TOB(0),TOB(1),TOB(0),TOB(7)) ); \ 60 buf = _mm_perm_epi8(t0, m3, _mm_set_epi32(TOB(7),TOB(2),TOB(4),TOB(0)) ); 67 t0 = _mm_perm_epi8(m0, m1, _mm_set_epi32(TOB(0),TOB(7),TOB(3),TOB(0)) ); \ 68 buf = _mm_perm_epi8(t0, m2, _mm_set_epi32(TOB(5),TOB(2),TOB(1),TOB(6)) ); 75 t0 = _mm_perm_epi8(m0, m1, _mm_set_epi32(TOB(0),TOB(0),TOB(3),TOB(7)) ); \ 76 t0 = _mm_perm_epi8(t0, m2, _mm_set_epi32(TOB(7),TOB(2),TOB(1),TOB(0)) ); \ [all …]
|
| /freebsd/lib/libc/riscv/string/ |
| H A D | memset.S | 18 mv t0, a0 25 andi t0, a0, ~0b111 34 sb a1, 1(t0) 35 sb a1, 2(t0) 36 sb a1, 3(t0) 37 sb a1, 4(t0) 38 sb a1, 5(t0) 39 sb a1, 6(t0) 40 sb a1, 7(t0) 45 addi t0, t0, 8 [all …]
|
| /freebsd/crypto/openssl/crypto/seed/ |
| H A D | seed.c | 439 seed_word t0, t1; in SEED_set_key() local 446 t0 = (x1 + x3 - KC0) & 0xffffffff; in SEED_set_key() 448 KEYUPDATE_TEMP(t0, t1, &ks->data[0]); in SEED_set_key() 449 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC1); in SEED_set_key() 450 KEYUPDATE_TEMP(t0, t1, &ks->data[2]); in SEED_set_key() 453 KEYSCHEDULE_UPDATE0(t0, t1, x1, x2, x3, x4, KC2); in SEED_set_key() 454 KEYUPDATE_TEMP(t0, t1, &ks->data[4]); in SEED_set_key() 455 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC3); in SEED_set_key() 456 KEYUPDATE_TEMP(t0, t1, &ks->data[6]); in SEED_set_key() 457 KEYSCHEDULE_UPDATE0(t0, t1, x1, x2, x3, x4, KC4); in SEED_set_key() [all …]
|
| /freebsd/sys/riscv/riscv/ |
| H A D | locore.S | 73 lla t0, hart_lottery 75 amoadd.w t0, t1, 0(t0) 81 beqz t0, 1f 85 lla t0, boot_hart 86 sw a0, 0(t0) 162 add t0, s1, a5 163 sd t6, (t0) /* Store new PTE */ 182 add t0, s1, a5 183 sd t6, (t0) 190 li t0, (PTE_KERN | PTE_X) [all …]
|
| H A D | exception.S | 59 sd t0, (TF_T + 0 * 8)(sp) 92 add t0, sp, t1 93 sd t0, (TF_SP)(sp) 96 csrr t0, sscratch 97 sd t0, (TF_SP)(sp) 99 li t0, 0 100 csrw sscratch, t0 101 csrr t0, sepc 102 sd t0, (TF_SEPC)(sp) 103 csrr t0, sstatus [all …]
|
| /freebsd/crypto/openssl/crypto/sha/asm/ |
| H A D | sha512-armv4.pl | 87 $t0="r9"; 111 mov $t0,$Elo,lsr#14 115 eor $t0,$t0,$Ehi,lsl#18 119 eor $t0,$t0,$Elo,lsr#18 121 eor $t0,$t0,$Ehi,lsl#14 123 eor $t0,$t0,$Ehi,lsr#9 125 eor $t0,$t0,$Elo,lsl#23 127 adds $Tlo,$Tlo,$t0 128 ldr $t0,[sp,#$Foff+0] @ f.lo 136 eor $t0,$t0,$t2 [all …]
|
| H A D | sha1-mips.pl | 35 ($zero,$at,$t0,$t1,$t2)=map("\$$_",(0..2,24,25)); 103 $t0="\$25"; 116 srl $t0,@X[$i],24 # byte swap($i) 122 or @X[$i],$t0 130 xor $t0,$c,$d 132 and $t0,$b 140 xor $t0,$d 143 addu $e,$t0 146 sll $t0,$a,5 # $i 150 addu $e,$t0 [all …]
|
| H A D | sha1-thumb.pl | 34 $t0="r0"; 50 sub $t0,#4 51 ldr $t1,[$t0] 175 ldmia $t0!,{$a,$b,$c,$d,$e} @ $t0 is r0 and holds ctx 176 mov $t0,$Xi 179 mov $t1,$t0 187 cmp $Xi,$t0 191 mov $t1,$t0 199 cmp $Xi,$t0 201 cmp sp,$t0 [all …]
|
| H A D | sha1-parisc.pl | 62 $t0="%r28"; 67 "%r9", "%r10","%r11","%r12","%r13","%r14","%r15","%r16",$t0); 78 and $c,$b,$t0 82 or $t1,$t0,$t0 83 addl $t0,$e,$e 90 and $c,$b,$t0 95 or $t1,$t0,$t0 97 add $t0,$e,$e 111 xor $b,$c,$t0 115 xor $d,$t0,$t0 [all …]
|
| /freebsd/lib/libmp/tests/ |
| H A D | legacy_test.c | 34 *c42,*c43, *c44, *c45, *t0, *t1; variable 54 mp_madd(c42, c1, t0); in testsimpel() 55 testmcmp(c43, t0, "madd0"); in testsimpel() 56 mp_madd(t0, c1, t0); in testsimpel() 57 testmcmp(c44, t0, "madd1"); in testsimpel() 58 mp_msub(t0, c1, t0); in testsimpel() 59 testmcmp(c43, t0, "msub0"); in testsimpel() 60 mp_msub(t0, c1, t0); in testsimpel() 61 testmcmp(c42, t0, "msub1"); in testsimpel() 62 mp_move(c42, t0); in testsimpel() [all …]
|
| /freebsd/crypto/openssl/crypto/ec/asm/ |
| H A D | x25519-ppc64.pl | 49 my ($bi,$a0,$a1,$a2,$a3,$t0,$t1, $t2,$t3, 82 mulhdu $t0,$a0,$bi 96 addc @acc[1],@acc[1],$t0 # accumulate high parts 97 mulld $t0,$a0,$bi 104 addc @acc[1],@acc[1],$t0 # accumulate low parts 105 mulhdu $t0,$a0,$bi 117 addc $acc4,$acc4,$t0 118 mulld $t0,$acc4,$bi 126 addc $acc0,$acc0,$t0 127 mulhdu $t0,$acc4,$bi [all …]
|
| H A D | ecp_sm2p256-armv8.pl | 25 my ($t0,$t1,$t2,$t3)=map("x$_",(3..6)); 51 mov $t0,$s0 57 subs $t0,$t0,$s4 64 csel $s0,$s0,$t0,cc 98 mov $t0,$s0 104 adds $t0,$t0,$s4 111 csel $s0,$s0,$t0,eq 130 mov $t0,$s0 145 tst $t0,#1 274 mov $t0,$s0 [all …]
|
| H A D | ecp_nistz256-x86_64.pl | 119 my ($t0,$t1,$t2,$t3,$t4)=("%rax","%rdx","%rcx","%r12","%r13"); 143 mov $a0, $t0 157 cmovc $t0, $a0 193 mov $a0, $t0 207 test \$1, $t0 209 cmovz $t0, $a0 215 mov $a1, $t0 # a0:a3>>1 217 shl \$63, $t0 220 or $t0, $a0 267 mov $a0, $t0 [all …]
|
| H A D | ecp_nistz256-armv8.pl | 49 my ($rp,$ap,$bp,$bi,$a0,$a1,$a2,$a3,$t0,$t1,$t2,$t3,$poly1,$poly3, 242 ldp $t0,$t1,[$bp] 295 mov $t0,$acc0 322 mov $t0,$acc0 333 mov $t0,$a0 401 umulh $t0,$a0,$bi 413 adds $acc1,$acc1,$t0 // accumulate high parts of multiplication 414 lsl $t0,$acc0,#32 447 subs $t2,$acc0,$t0 // "*0xffff0001" 449 adds $acc0,$acc1,$t0 // +=acc[0]<<96 and omit acc[0] [all …]
|
| /freebsd/crypto/openssl/crypto/modes/asm/ |
| H A D | ghash-alpha.pl | 32 $t0="t0"; 71 sll $Zhi,60,$t0 82 xor $t0,$Zlo,$Zlo 97 sll $Zhi,60,$t0 108 xor $t0,$Zlo,$Zlo 118 sll $Zhi,60,$t0 130 xor $t0,$Zlo,$Zlo 139 sll $Zhi,60,$t0 150 xor $t0,$Zlo,$Zlo 159 sll $Zhi,60,$t0 [all …]
|
| H A D | ghashv8-armx.pl | 72 my ($t0,$t1,$t2,$xC2,$H,$Hhl,$H2)=map("q$_",(8..14)); 121 vext.8 $t0,$t2,$xC2,#8 @ t0=0xc2....01 124 vand $t2,$t2,$t0 127 vand $t0,$t0,$t1 129 veor $H,$IN,$t0 @ twisted H 133 vext.8 $t0,$H,$H,#8 @ Karatsuba pre-processing 135 veor $t0,$t0,$H 137 vpmull.p64 $Xm,$t0,$t0 156 vext.8 $Hhl,$t0,$t1,#8 @ pack Karatsuba pre-processed 169 vpmull.p64 $Xm,$t0,$t1 [all …]
|
| H A D | ghash-riscv64.pl | 148 my ($z0,$z1,$z2,$z3,$t0,$t1,$polymod) = ("t0","t1","t2","t3","t4","t5","t6"); 176 @{[clmul $t0, $x1, $y0]} 178 xor $z1, $z1, $t0 185 @{[clmul $t0, $z3, $polymod]} 187 xor $z1, $z1, $t0 189 @{[clmul $t0, $z2, $polymod]} 191 xor $x0, $z0, $t0 205 my ($z0,$z1,$z2,$z3,$t0,$t1,$polymod) = ("t0","t1","t2","t3","t4","t5","t6"); 233 @{[clmul $t0, $x1, $y0]} 235 xor $z1, $z1, $t0 [all …]
|
| /freebsd/crypto/openssl/crypto/bn/asm/ |
| H A D | armv4-gf2m.pl | 78 ($hi,$lo,$t0,$t1, $i0,$i1 )=map("r$_",(4..9),12); 109 ldr $t0,[sp,$i0] @ tab[b >> 6 & 0x7] 115 eor $lo,$lo,$t0,lsl#6 116 eor $hi,$hi,$t0,lsr#26 117 ldr $t0,[sp,$i0] @ tab[b >> 12 & 0x7] 125 eor $lo,$lo,$t0,lsl#12 126 eor $hi,$hi,$t0,lsr#20 127 ldr $t0,[sp,$i0] @ tab[b >> 18 & 0x7] 135 eor $lo,$lo,$t0,lsl#18 136 eor $hi,$hi,$t0,lsr#14 [all …]
|
| H A D | ppc64-mont.pl | 139 $t0="r24"; # temporary registers 288 extrdi $t0,$t3,16,48 292 std $t0,`$FRAME+0`($sp) 308 extrdi $t0,$a0,32,32 ; lwz $t0,4($ap) 334 extrwi $t0,$t1,16,16 338 std $t0,`$FRAME+0`($sp) ; yes, std in 32-bit build 343 mullw $t0,$t4,$n0 ; mulld tp[0]*n0 350 extrwi $t4,$t0,16,16 351 extrwi $t5,$t0,16,0 359 mr $t0,$a0 ; lwz $t0,0($ap) [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | smult_curve25519_ref.c | 190 unsigned int t0[32]; in recip() local 196 /* 8 */ square(t0,t1); in recip() 197 /* 9 */ mult(z9,t0,z); in recip() 199 /* 22 */ square(t0,z11); in recip() 200 /* 2^5 - 2^0 = 31 */ mult(z2_5_0,t0,z9); in recip() 202 /* 2^6 - 2^1 */ square(t0,z2_5_0); in recip() 203 /* 2^7 - 2^2 */ square(t1,t0); in recip() 204 /* 2^8 - 2^3 */ square(t0,t1); in recip() 205 /* 2^9 - 2^4 */ square(t1,t0); in recip() 206 /* 2^10 - 2^5 */ square(t0,t1); in recip() [all …]
|
| H A D | rijndael.c | 765 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 780 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; in rijndaelEncrypt() 785 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; in rijndaelEncrypt() 786 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9]; in rijndaelEncrypt() 787 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; in rijndaelEncrypt() 788 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; in rijndaelEncrypt() 790 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; in rijndaelEncrypt() 795 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16]; in rijndaelEncrypt() 796 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17]; in rijndaelEncrypt() 797 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18]; in rijndaelEncrypt() [all …]
|
| /freebsd/crypto/openssl/crypto/aes/asm/ |
| H A D | aesni-xts-avx512.pl | 189 my $t0 = $_[15]; 202 $code .= "vmovdqu ($key1), $t0\n"; 205 $code .= "vpxor $t0, $st[$i], $st[$i]\n"; 216 $code .= "vmovdqu 0x10($key1), $t0\n"; 219 $code .= "vaesdec $t0, $st[$i], $st[$i]\n"; 233 $code .= "vmovdqu 0x20($key1), $t0\n"; 236 $code .= "vaesdec $t0, $st[$i], $st[$i]\n"; 250 $code .= "vmovdqu 0x30($key1), $t0\n"; 253 $code .= "vaesdec $t0, $st[$i], $st[$i]\n"; 267 $code .= "vmovdqu 0x40($key1), $t0\n"; [all …]
|
| /freebsd/sys/crypto/rijndael/ |
| H A D | rijndael-alg-fst.c | 862 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 877 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; in rijndaelEncrypt() 882 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; in rijndaelEncrypt() 883 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9]; in rijndaelEncrypt() 884 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; in rijndaelEncrypt() 885 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; in rijndaelEncrypt() 887 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; in rijndaelEncrypt() 892 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16]; in rijndaelEncrypt() 893 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17]; in rijndaelEncrypt() 894 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18]; in rijndaelEncrypt() [all …]
|