HomeSort by: relevance | last modified time | path
    Searched defs:y4 (Results 1 - 10 of 10) sorted by relevancy

  /src/sys/crypto/aes/arch/x86/
aes_sse2_dec.c 85 __m128i x, y0, y1, y2, y3, y4, y5, y6; local in function:inv_shift_row
92 y4 = x & _mm_set1_epi64x(0x0000FF0000000000);
98 y4 = _mm_srli_epi64(y4, 8);
101 return y0 | y1 | y2 | y3 | y4 | y5 | y6;
aes_sse2_enc.c 44 __m128i x, y0, y1, y2, y3, y4, y5, y6; local in function:shift_row
51 y4 = x & _mm_set1_epi64x(0x000000FF00000000);
57 y4 = _mm_slli_epi64(y4, 8);
60 return y0 | y1 | y2 | y3 | y4 | y5 | y6;
aes_sse2.c 58 __m128i y1, y2, y3, y4, y5, y6, y7, y8, y9; local in function:aes_sse2_bitslice_Sbox
90 y4 = y1 ^ x3;
114 t5 = y4 & x7;
168 z11 = t33 & y4;
  /src/sys/crypto/chacha/
chacha_ref.c 72 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15;
78 x4 = y4 = le32dec(k + 0);
92 CHACHA_QUARTERROUND( y0, y4, y8,y12);
99 CHACHA_QUARTERROUND( y3, y4, y9,y14);
106 le32enc(out + 16, x4 + y4);
132 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15;
157 y4 = x4;
170 CHACHA_QUARTERROUND( y0, y4, y8,y12);
177 CHACHA_QUARTERROUND( y3, y4, y9,y14);
183 le32enc(s + 16, x4 + y4);
71 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_core_ref
130 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_ref
253 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_xor_ref
376 uint32_t y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:hchacha_ref
    [all...]
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_stream/salsa20/xmm6int/
u4.h 2 __m128i y0, y1, y2, y3, y4, y5, y6, y7, y8, y9, y10, y11, y12, y13, y14, variable in typeref:typename:__m128i
105 y4 = z12;
106 y4 = _mm_add_epi32(y4, z0);
107 r4 = y4;
108 y4 = _mm_slli_epi32(y4, 7);
109 z4 = _mm_xor_si128(z4, y4);
273 y4 = z6;
274 y4 = _mm_add_epi32(y4, z7)
    [all...]
u8.h 2 __m256i y0, y1, y2, y3, y4, y5, y6, y7, y8, y9, y10, y11, y12, y13, y14, variable in typeref:typename:__m256i
105 y4 = z12;
106 y4 = _mm256_add_epi32(y4, z0);
107 r4 = y4;
108 y4 = _mm256_slli_epi32(y4, 7);
109 z4 = _mm256_xor_si256(z4, y4);
273 y4 = z6;
274 y4 = _mm256_add_epi32(y4, z7)
    [all...]
  /src/sys/crypto/chacha/arch/x86/
chacha_sse2.c 204 __m128i y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15;
236 y4 = x4;
249 CHACHA_QUARTERROUND( y0, y4, y8,y12);
256 CHACHA_QUARTERROUND( y3, y4, y9,y14);
262 y4 = _mm_add_epi32(y4, x4);
277 z1 = unpack0_epi32(y4, y5, y6, y7);
281 z5 = unpack1_epi32(y4, y5, y6, y7);
285 z9 = unpack2_epi32(y4, y5, y6, y7);
289 z13 = unpack3_epi32(y4, y5, y6, y7)
200 __m128i y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_sse2
356 __m128i y0,y1,y2,y3,y4,y5,y6,y7,y8,y9,y10,y11,y12,y13,y14,y15; local in function:chacha_stream_xor_sse2
    [all...]
  /src/sys/crypto/aes/
aes_ct.c 55 uint32_t y1, y2, y3, y4, y5, y6, y7, y8, y9; local in function:br_aes_ct_bitslice_Sbox
87 y4 = y1 ^ x3;
111 t5 = y4 & x7;
165 z11 = t33 & y4;
  /src/sys/dev/ic/
arn9003.c 2780 int icept, G, I, L, M, angle, xnonlin, y2, y4, sumy2, sumy4; local in function:ar9003_compute_predistortion
2847 sumy2 = sumy4 = y2 = y4 = 0;
2899 scale = ((y4 / SCALE_LOG) * (L + 1) -
  /src/sys/external/bsd/compiler_rt/dist/lib/msan/tests/
msan_test.cc 3904 U4 y4 = 0; local in function:TEST
3906 __msan_poison(&y4, 2);
3907 __msan_set_origin(&y4, 2, origin);
3909 __sanitizer_unaligned_store32(x + 3, y4);

Completed in 21 milliseconds