HomeSort by: relevance | last modified time | path
    Searched defs:y6 (Results 1 - 8 of 8) sorted by relevancy

  /src/sys/crypto/aes/arch/x86/
aes_sse2_dec.c 85 __m128i x, y0, y1, y2, y3, y4, y5, y6; local in function:inv_shift_row
94 y6 = x & _mm_set1_epi64x(0xFFF0000000000000);
100 y6 = _mm_srli_epi64(y6, 4);
101 return y0 | y1 | y2 | y3 | y4 | y5 | y6;
aes_sse2_enc.c 44 __m128i x, y0, y1, y2, y3, y4, y5, y6; local in function:shift_row
53 y6 = x & _mm_set1_epi64x(0x0FFF000000000000);
59 y6 = _mm_slli_epi64(y6, 4);
60 return y0 | y1 | y2 | y3 | y4 | y5 | y6;
aes_sse2.c 58 __m128i y1, y2, y3, y4, y5, y6, y7, y8, y9; local in function:aes_sse2_bitslice_Sbox
98 y6 = y15 ^ x7;
112 t3 = y3 & y6;
158 z1 = t37 & y6;
  /src/sys/crypto/chacha/
chacha_ref.c 72 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15;
80 x6 = y6 = le32dec(k + 8);
94 CHACHA_QUARTERROUND( y2, y6,y10,y14);
97 CHACHA_QUARTERROUND( y1, y6,y11,y12);
108 le32enc(out + 24, x6 + y6);
132 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15;
159 y6 = x6;
172 CHACHA_QUARTERROUND( y2, y6,y10,y14);
175 CHACHA_QUARTERROUND( y1, y6,y11,y12);
185 le32enc(s + 24, x6 + y6);
71 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_core_ref
130 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_ref
253 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_xor_ref
376 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:hchacha_ref
    [all...]
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_stream/salsa20/xmm6int/
u4.h 2 __m128i y0, y1, y2, y3, y4, y5, y6, y7, y8, y9, y10, y11, y12, y13, y14, variable in typeref:typename:__m128i
201 y6 = z14;
202 y6 = _mm_add_epi32(y6, z2);
203 r6 = y6;
204 y6 = _mm_slli_epi32(y6, 13);
205 z6 = _mm_xor_si128(z6, y6);
241 y6 = z4;
242 y6 = _mm_add_epi32(y6, z5)
    [all...]
u8.h 2 __m256i y0, y1, y2, y3, y4, y5, y6, y7, y8, y9, y10, y11, y12, y13, y14, variable in typeref:typename:__m256i
201 y6 = z14;
202 y6 = _mm256_add_epi32(y6, z2);
203 r6 = y6;
204 y6 = _mm256_slli_epi32(y6, 13);
205 z6 = _mm256_xor_si256(z6, y6);
241 y6 = z4;
242 y6 = _mm256_add_epi32(y6, z5)
    [all...]
  /src/sys/crypto/chacha/arch/x86/
chacha_sse2.c 204 __m128i y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15;
238 y6 = x6;
251 CHACHA_QUARTERROUND( y2, y6,y10,y14);
254 CHACHA_QUARTERROUND( y1, y6,y11,y12);
264 y6 = _mm_add_epi32(y6, x6);
277 z1 = unpack0_epi32(y4, y5, y6, y7);
281 z5 = unpack1_epi32(y4, y5, y6, y7);
285 z9 = unpack2_epi32(y4, y5, y6, y7);
289 z13 = unpack3_epi32(y4, y5, y6, y7)
200 __m128i y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_sse2
356 __m128i y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_xor_sse2
    [all...]
  /src/sys/crypto/aes/
aes_ct.c 55 uint32_t y1, y2, y3, y4, y5, y6, y7, y8, y9; local in function:br_aes_ct_bitslice_Sbox
95 y6 = y15 ^ x7;
109 t3 = y3 & y6;
155 z1 = t37 & y6;

Completed in 109 milliseconds