/src/sys/crypto/aes/arch/x86/ |
aes_sse2_dec.c | 85 __m128i x, y0, y1, y2, y3, y4, y5, y6; local in function:inv_shift_row 92 y4 = x & _mm_set1_epi64x(0x0000FF0000000000); 98 y4 = _mm_srli_epi64(y4, 8); 101 return y0 | y1 | y2 | y3 | y4 | y5 | y6;
|
aes_sse2_enc.c | 44 __m128i x, y0, y1, y2, y3, y4, y5, y6; local in function:shift_row 51 y4 = x & _mm_set1_epi64x(0x000000FF00000000); 57 y4 = _mm_slli_epi64(y4, 8); 60 return y0 | y1 | y2 | y3 | y4 | y5 | y6;
|
aes_sse2.c | 58 __m128i y1, y2, y3, y4, y5, y6, y7, y8, y9; local in function:aes_sse2_bitslice_Sbox 90 y4 = y1 ^ x3; 114 t5 = y4 & x7; 168 z11 = t33 & y4;
|
/src/sys/crypto/chacha/ |
chacha_ref.c | 72 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; 78 x4 = y4 = le32dec(k + 0); 92 CHACHA_QUARTERROUND( y0, y4, y8,y12); 99 CHACHA_QUARTERROUND( y3, y4, y9,y14); 106 le32enc(out + 16, x4 + y4); 132 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; 157 y4 = x4; 170 CHACHA_QUARTERROUND( y0, y4, y8,y12); 177 CHACHA_QUARTERROUND( y3, y4, y9,y14); 183 le32enc(s + 16, x4 + y4); 71 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_core_ref 130 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_ref 253 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_xor_ref 376 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:hchacha_ref [all...] |
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_stream/salsa20/xmm6int/ |
u4.h | 2 __m128i y0, y1, y2, y3, y4, y5, y6, y7, y8, y9, y10, y11, y12, y13, y14, variable in typeref:typename:__m128i 105 y4 = z12; 106 y4 = _mm_add_epi32(y4, z0); 107 r4 = y4; 108 y4 = _mm_slli_epi32(y4, 7); 109 z4 = _mm_xor_si128(z4, y4); 273 y4 = z6; 274 y4 = _mm_add_epi32(y4, z7) [all...] |
u8.h | 2 __m256i y0, y1, y2, y3, y4, y5, y6, y7, y8, y9, y10, y11, y12, y13, y14, variable in typeref:typename:__m256i 105 y4 = z12; 106 y4 = _mm256_add_epi32(y4, z0); 107 r4 = y4; 108 y4 = _mm256_slli_epi32(y4, 7); 109 z4 = _mm256_xor_si256(z4, y4); 273 y4 = z6; 274 y4 = _mm256_add_epi32(y4, z7) [all...] |
/src/sys/crypto/chacha/arch/x86/ |
chacha_sse2.c | 204 __m128i y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; 236 y4 = x4; 249 CHACHA_QUARTERROUND( y0, y4, y8,y12); 256 CHACHA_QUARTERROUND( y3, y4, y9,y14); 262 y4 = _mm_add_epi32(y4, x4); 277 z1 = unpack0_epi32(y4, y5, y6, y7); 281 z5 = unpack1_epi32(y4, y5, y6, y7); 285 z9 = unpack2_epi32(y4, y5, y6, y7); 289 z13 = unpack3_epi32(y4, y5, y6, y7) 200 __m128i y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_sse2 356 __m128i y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_xor_sse2 [all...] |
/src/sys/crypto/aes/ |
aes_ct.c | 55 uint32_t y1, y2, y3, y4, y5, y6, y7, y8, y9; local in function:br_aes_ct_bitslice_Sbox 87 y4 = y1 ^ x3; 111 t5 = y4 & x7; 165 z11 = t33 & y4;
|
/src/sys/dev/ic/ |
arn9003.c | 2780 int icept, G, I, L, M, angle, xnonlin, y2, y4, sumy2, sumy4; local in function:ar9003_compute_predistortion 2847 sumy2 = sumy4 = y2 = y4 = 0; 2899 scale = ((y4 / SCALE_LOG) * (L + 1) -
|
/src/sys/external/bsd/compiler_rt/dist/lib/msan/tests/ |
msan_test.cc | 3904 U4 y4 = 0; local in function:TEST 3906 __msan_poison(&y4, 2); 3907 __msan_set_origin(&y4, 2, origin); 3909 __sanitizer_unaligned_store32(x + 3, y4);
|