/freebsd/sys/contrib/libsodium/src/libsodium/crypto_generichash/blake2b/ref/ |
H A D | blake2b-load-avx2.h | 7 t1 = _mm256_unpacklo_epi64(m2, m3); \ 8 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 14 t1 = _mm256_unpackhi_epi64(m2, m3); \ 15 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 21 t1 = _mm256_unpacklo_epi64(m6, m7); \ 22 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 28 t1 = _mm256_unpackhi_epi64(m6, m7); \ 29 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ 35 t1 = _mm256_unpackhi_epi64(m4, m6); \ 36 b0 = _mm256_blend_epi32(t0, t1, 0xF0); \ [all …]
|
/freebsd/sys/contrib/libb2/ |
H A D | blake2s-load-sse41.h | 31 t1 = _mm_slli_si128(m3, 4); \ 32 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 37 t1 = _mm_blend_epi16(m1,m3,0xC0); \ 38 t2 = _mm_blend_epi16(t0, t1, 0xF0); \ 43 t1 = _mm_blend_epi16(m2, t0, 0x30); \ 44 t2 = _mm_blend_epi16(m0, t1, 0xF0); \ 49 t1 = _mm_slli_si128(m3, 4); \ 50 t2 = _mm_blend_epi16(t0, t1, 0x0C); \ 55 t1 = _mm_blend_epi16(m3,m1,0x0C); \ 56 t2 = _mm_blend_epi16(t0, t1, 0x0F); \ [all …]
|
/freebsd/crypto/openssl/crypto/seed/ |
H A D | seed.c | 450 seed_word t0, t1; in SEED_set_key() local 458 t1 = (x2 - x4 + KC0) & 0xffffffff; in SEED_set_key() 459 KEYUPDATE_TEMP(t0, t1, &ks->data[0]); in SEED_set_key() 460 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC1); in SEED_set_key() 461 KEYUPDATE_TEMP(t0, t1, &ks->data[2]); in SEED_set_key() 464 KEYSCHEDULE_UPDATE0(t0, t1, x1, x2, x3, x4, KC2); in SEED_set_key() 465 KEYUPDATE_TEMP(t0, t1, &ks->data[4]); in SEED_set_key() 466 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC3); in SEED_set_key() 467 KEYUPDATE_TEMP(t0, t1, &ks->data[6]); in SEED_set_key() 468 KEYSCHEDULE_UPDATE0(t0, t1, x1, x2, x3, x4, KC4); in SEED_set_key() [all …]
|
/freebsd/contrib/bearssl/src/symcipher/ |
H A D | aes_x86ni.c | 62 expand_step192(__m128i *t1, __m128i *t2, __m128i *t3) in expand_step192() argument 67 t4 = _mm_slli_si128(*t1, 0x4); in expand_step192() 68 *t1 = _mm_xor_si128(*t1, t4); in expand_step192() 70 *t1 = _mm_xor_si128(*t1, t4); in expand_step192() 72 *t1 = _mm_xor_si128(*t1, t4); in expand_step192() 73 *t1 = _mm_xor_si128(*t1, *t2); in expand_step192() 74 *t2 = _mm_shuffle_epi32(*t1, 0xFF); in expand_step192() 82 expand_step256_1(__m128i *t1, __m128i *t2) in expand_step256_1() argument 87 t4 = _mm_slli_si128(*t1, 0x4); in expand_step256_1() 88 *t1 = _mm_xor_si128(*t1, t4); in expand_step256_1() [all …]
|
/freebsd/crypto/openssl/crypto/sha/asm/ |
H A D | sha512-armv4.pl | 88 $t1="r10"; 113 mov $t1,$Ehi,lsr#14 117 eor $t1,$t1,$Elo,lsl#18 120 eor $t1,$t1,$Ehi,lsr#18 122 eor $t1,$t1,$Elo,lsl#14 124 eor $t1,$t1,$Elo,lsr#9 126 eor $t1,$t1,$Ehi,lsl#23 @ Sigma1(e) 129 adc $Thi,$Thi,$t1 @ T += Sigma1(e) 130 ldr $t1,[sp,#$Foff+4] @ f.hi 138 eor $t1,$t1,$t3 [all …]
|
H A D | sha1-thumb.pl | 35 $t1="r1"; 51 ldr $t1,[$t0] 57 add $t2,$t1 @ E+=X[i] 68 add $a,$t2,$t1 @ A=E+F_xx_xx(B,C,D) 75 mov $t1,$c 76 eor $t1,$d 77 and $t1,$b 78 eor $t1,$d @ F_00_19(B,C,D) 86 mov $t1,$b 87 eor $t1,$c [all …]
|
H A D | sha256-armv4.pl | 66 $len="r2"; $t1="r2"; 90 @ ldr $t1,[$inp],#4 @ $i 98 rev $t1,$t1 101 @ ldrb $t1,[$inp,#3] @ $i 105 orr $t1,$t1,$t2,lsl#8 107 orr $t1,$t1,$t0,lsl#16 112 orr $t1,$t1,$t2,lsl#24 118 add $h,$h,$t1 @ h+=X[i] 119 str $t1,[sp,#`$i%16`*4] 120 eor $t1,$f,$g [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | safestack.h.in | 37 # define SKM_DEFINE_STACK_OF_INTERNAL(t1, t2, t3) \ argument 38 STACK_OF(t1); \ 39 typedef int (*sk_##t1##_compfunc)(const t3 * const *a, const t3 *const *b); \ 40 typedef void (*sk_##t1##_freefunc)(t3 *a); \ 41 typedef t3 * (*sk_##t1##_copyfunc)(const t3 *a); \ 42 static ossl_unused ossl_inline t2 *ossl_check_##t1##_type(t2 *ptr) \ 46 …l_unused ossl_inline const OPENSSL_STACK *ossl_check_const_##t1##_sk_type(const STACK_OF(t1) *sk) \ 50 static ossl_unused ossl_inline OPENSSL_STACK *ossl_check_##t1##_sk_type(STACK_OF(t1) *sk) \ 54 …static ossl_unused ossl_inline OPENSSL_sk_compfunc ossl_check_##t1##_compfunc_type(sk_##t1##_compf… 58 …static ossl_unused ossl_inline OPENSSL_sk_copyfunc ossl_check_##t1##_copyfunc_type(sk_##t1##_copyf… [all …]
|
H A D | safestack.h | 34 # define SKM_DEFINE_STACK_OF_INTERNAL(t1, t2, t3) \ argument 35 STACK_OF(t1); \ 36 typedef int (*sk_##t1##_compfunc)(const t3 * const *a, const t3 *const *b); \ 37 typedef void (*sk_##t1##_freefunc)(t3 *a); \ 38 typedef t3 * (*sk_##t1##_copyfunc)(const t3 *a); \ 39 static ossl_unused ossl_inline t2 *ossl_check_##t1##_type(t2 *ptr) \ 43 …l_unused ossl_inline const OPENSSL_STACK *ossl_check_const_##t1##_sk_type(const STACK_OF(t1) *sk) \ 47 static ossl_unused ossl_inline OPENSSL_STACK *ossl_check_##t1##_sk_type(STACK_OF(t1) *sk) \ 51 …static ossl_unused ossl_inline OPENSSL_sk_compfunc ossl_check_##t1##_compfunc_type(sk_##t1##_compf… 55 …static ossl_unused ossl_inline OPENSSL_sk_copyfunc ossl_check_##t1##_copyfunc_type(sk_##t1##_copyf… [all …]
|
/freebsd/share/misc/ |
H A D | scsi_modes | 57 {TMF_ONLY} t1 58 {DPICZ} t1 59 {D_SENSE} t1 60 {GLTSD} t1 61 {RLEC} t1 63 {NUAR} t1 65 {DQue} t1 66 {EECA} t1 67 {RAC} t1 69 {SWP} t1 [all …]
|
/freebsd/crypto/openssl/crypto/ec/asm/ |
H A D | x25519-ppc64.pl | 49 my ($bi,$a0,$a1,$a2,$a3,$t0,$t1, $t2,$t3, 84 mulhdu $t1,$a1,$bi 98 adde @acc[2],@acc[2],$t1 99 mulld $t1,$a1,$bi 106 adde @acc[2],@acc[2],$t1 107 mulhdu $t1,$a1,$bi 119 adde $acc5,$acc5,$t1 120 mulld $t1,$acc5,$bi 128 adde $acc1,$acc1,$t1 129 mulhdu $t1,$acc5,$bi [all …]
|
H A D | ecp_nistp521-ppc64.pl | 150 my ($t1, $t2, $t3, $t4) = ("v33", "v34", "v44", "v54"); 178 xxpermdi $t1,$in1[0],$in1[1],0b00 180 vmsumudm $out[1],$t1,$t2,$vzero 183 vmsumudm $out[2],$t1,$t2,$vzero 187 vmsumudm $out[3],$t1,$t2,$vzero 193 vmsumudm $out[4],$t1,$t2,$vzero 199 vmsumudm $out[5],$t1,$t2,$vzero 204 vmsumudm $out[6],$t1,$t2,$vzero 209 vmsumudm $out[7],$t1,$t2,$vzero 214 vmsumudm $out[8],$t1,$t2,$vzero [all …]
|
H A D | ecp_nistz256-x86_64.pl | 117 my ($t0,$t1,$t2,$t3,$t4)=("%rax","%rdx","%rcx","%r12","%r13"); 144 mov $a1, $t1 156 cmovc $t1, $a1 195 mov $a1, $t1 208 cmovz $t1, $a1 216 mov $a2, $t1 219 shl \$63, $t1 222 or $t1, $a1 268 mov $a1, $t1 280 cmovc $t1, $a1 [all …]
|
H A D | ecp_nistz256-armv8.pl | 49 my ($rp,$ap,$bp,$bi,$a0,$a1,$a2,$a3,$t0,$t1,$t2,$t3,$poly1,$poly3, 229 ldp $t0,$t1,[$bp] 277 mov $t1,$acc1 302 mov $t1,$acc1 313 mov $t1,$a1 379 umulh $t1,$a1,$bi 390 adcs $acc2,$acc2,$t1 391 lsr $t1,$acc0,#32 423 sbc $t3,$acc0,$t1 426 adcs $acc1,$acc2,$t1 [all …]
|
/freebsd/crypto/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 63 $t1="r4"; 218 ldrb $t1,[$rounds,#2] @ manner... 221 orr $s0,$s0,$t1,lsl#8 224 ldrb $t1,[$rounds,#6] 228 orr $s1,$s1,$t1,lsl#8 231 ldrb $t1,[$rounds,#10] 235 orr $s2,$s2,$t1,lsl#8 238 ldrb $t1,[$rounds,#14] 242 orr $s3,$s3,$t1,lsl#8 272 mov $t1,$s0,lsr#24 @ write output in endian-neutral [all …]
|
/freebsd/crypto/openssl/crypto/bn/asm/ |
H A D | armv4-gf2m.pl | 78 ($hi,$lo,$t0,$t1, $i0,$i1 )=map("r$_",(4..9),12); 107 ldr $t1,[sp,$i1] @ tab[b >> 3 & 0x7] 110 eor $lo,$lo,$t1,lsl#3 @ stall 111 mov $hi,$t1,lsr#29 112 ldr $t1,[sp,$i1] @ tab[b >> 9 & 0x7] 120 eor $lo,$lo,$t1,lsl#9 121 eor $hi,$hi,$t1,lsr#23 122 ldr $t1,[sp,$i1] @ tab[b >> 15 & 0x7] 130 eor $lo,$lo,$t1,lsl#15 131 eor $hi,$hi,$t1,lsr#17 [all …]
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | timeval.c | 47 timevalfix(struct timeval *t1) in timevalfix() argument 49 if (t1->tv_usec < 0) { in timevalfix() 50 t1->tv_sec--; in timevalfix() 51 t1->tv_usec += 1000000; in timevalfix() 53 if (t1->tv_usec >= 1000000) { in timevalfix() 54 t1->tv_sec++; in timevalfix() 55 t1->tv_usec -= 1000000; in timevalfix() 64 timevaladd(struct timeval *t1, const struct timeval *t2) in timevaladd() argument 66 t1->tv_sec += t2->tv_sec; in timevaladd() 67 t1->tv_usec += t2->tv_usec; in timevaladd() [all …]
|
/freebsd/crypto/openssl/crypto/modes/asm/ |
H A D | ghashp8-ppc.pl | 72 my ($zero,$t0,$t1,$t2,$xC2,$H,$Hh,$Hl,$lemask)=map("v$_",(4..12)); 98 vsldoi $t1,$zero,$t0,1 # ...1 101 vor $xC2,$xC2,$t1 # 0xc2....01 102 vspltb $t1,$H,0 # most significant byte 104 vsrab $t1,$t1,$t2 # broadcast carry bit 105 vand $t1,$t1,$xC2 106 vxor $IN,$H,$t1 # twisted H 128 vsldoi $t1,$zero,$Xm,8 130 vxor $Xh,$Xh,$t1 135 vsldoi $t1,$Xl,$Xl,8 # 2nd reduction phase [all …]
|
H A D | ghashv8-armx.pl | 72 my ($t0,$t1,$t2,$xC2,$H,$Hhl,$H2)=map("q$_",(8..14)); 115 vld1.64 {$t1},[x1] @ load input H 118 vext.8 $IN,$t1,$t1,#8 120 vdup.32 $t1,${t1}[1] 123 vshr.s32 $t1,$t1,#31 @ broadcast carry bit 127 vand $t0,$t0,$t1 139 vext.8 $t1,$Xl,$Xh,#8 @ Karatsuba post-processing 141 veor $Xm,$Xm,$t1 154 vext.8 $t1,$H2,$H2,#8 @ Karatsuba pre-processing 155 veor $t1,$t1,$H2 [all …]
|
/freebsd/crypto/openssh/ |
H A D | smult_curve25519_ref.c | 191 unsigned int t1[32]; in recip() local 195 /* 4 */ square(t1,z2); in recip() 196 /* 8 */ square(t0,t1); in recip() 203 /* 2^7 - 2^2 */ square(t1,t0); in recip() 204 /* 2^8 - 2^3 */ square(t0,t1); in recip() 205 /* 2^9 - 2^4 */ square(t1,t0); in recip() 206 /* 2^10 - 2^5 */ square(t0,t1); in recip() 210 /* 2^12 - 2^2 */ square(t1,t0); in recip() 211 /* 2^20 - 2^10 */ for (i = 2;i < 10;i += 2) { square(t0,t1); square(t1,t0); } in recip() 212 /* 2^20 - 2^0 */ mult(z2_20_0,t1,z2_10_0); in recip() [all …]
|
H A D | rijndael.c | 765 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 781 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5]; in rijndaelEncrypt() 785 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; in rijndaelEncrypt() 786 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9]; in rijndaelEncrypt() 787 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; in rijndaelEncrypt() 788 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; in rijndaelEncrypt() 791 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13]; in rijndaelEncrypt() 795 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16]; in rijndaelEncrypt() 796 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17]; in rijndaelEncrypt() 797 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18]; in rijndaelEncrypt() [all …]
|
/freebsd/lib/msun/src/ |
H A D | e_hypot.c | 53 double a,b,t1,t2,y1,y2,w; in hypot() local 86 t1=0; in hypot() 87 SET_HIGH_WORD(t1,0x7fd00000); /* t1=2^1022 */ in hypot() 88 b *= t1; in hypot() 89 a *= t1; in hypot() 102 t1 = 0; in hypot() 103 SET_HIGH_WORD(t1,ha); in hypot() 104 t2 = a-t1; in hypot() 105 w = sqrt(t1*t1-(b*(-b)-t2*(a+t1))); in hypot() 111 t1 = 0; in hypot() [all …]
|
H A D | e_hypotl.c | 47 long double a=x,b=y,t1,t2,y1,y2,w; in hypotl() local 81 t1=1; in hypotl() 82 SET_HIGH_WORD(t1,ESW(MAX_EXP-2)); /* t1=2^(MAX_EXP-2) */ in hypotl() 83 b *= t1; in hypotl() 84 a *= t1; in hypotl() 97 t1 = a; in hypotl() 99 uv.e = t1; uv.bits.manl = 0; t1 = uv.e; in hypotl() 100 t2 = a-t1; in hypotl() 101 w = sqrtl(t1*t1-(b*(-b)-t2*(a+t1))); in hypotl() 108 t1 = a; in hypotl() [all …]
|
/freebsd/usr.bin/ktrace/ |
H A D | subr.c | 102 timevaladd(struct timeval *t1, struct timeval *t2) in timevaladd() argument 104 t1->tv_sec += t2->tv_sec; in timevaladd() 105 t1->tv_usec += t2->tv_usec; in timevaladd() 106 timevalfix(t1); in timevaladd() 110 timevalsub(struct timeval *t1, struct timeval *t2) in timevalsub() argument 112 t1->tv_sec -= t2->tv_sec; in timevalsub() 113 t1->tv_usec -= t2->tv_usec; in timevalsub() 114 timevalfix(t1); in timevalsub() 118 timevalfix(struct timeval *t1) in timevalfix() argument 120 if (t1->tv_usec < 0) { in timevalfix() [all …]
|
/freebsd/sys/crypto/rijndael/ |
H A D | rijndael-alg-fst.c | 862 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 878 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5]; in rijndaelEncrypt() 882 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; in rijndaelEncrypt() 883 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9]; in rijndaelEncrypt() 884 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; in rijndaelEncrypt() 885 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; in rijndaelEncrypt() 888 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13]; in rijndaelEncrypt() 892 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16]; in rijndaelEncrypt() 893 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17]; in rijndaelEncrypt() 894 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18]; in rijndaelEncrypt() [all …]
|