HomeSort by: relevance | last modified time | path
    Searched refs:D4 (Results 1 - 25 of 66) sorted by relevancy

1 2 3

  /src/crypto/external/apache2/openssl/dist/crypto/poly1305/asm/
poly1305-x86.pl 392 my ($D0,$D1,$D2,$D3,$D4,$T0,$T1,$T2)=map("xmm$_",(0..7));
397 &movdqu ($D4,&QWP(4*6,"edi")); # key base 2^32
403 #&pand ($D4,&QWP(96,"ebx")); # magic mask
406 &movdqa ($D0,$D4);
407 &movdqa ($D1,$D4);
408 &movdqa ($D2,$D4);
419 &psrldq ($D4,13);
428 &movdqa (&QWP(16*4,"esp"),$D4);
439 &movdqa ($T0,$D4);
443 &paddd ($T0,$D4); # *
    [all...]
poly1305-x86_64.pl 346 my ($H0,$H1,$H2,$H3,$H4, $T0,$T1,$T2,$T3,$T4, $D0,$D1,$D2,$D3,$D4, $MASK) =
808 vmovdqu `16*3`($ctx),$D4 # preload r0^2
839 vpshufd \$0xEE,$D4,$D3 # 34xx -> 3434
840 vpshufd \$0x44,$D4,$D0 # xx12 -> 1212
843 vpshufd \$0xEE,$D1,$D4
846 vmovdqa $D4,-0x80(%r11)
853 vpshufd \$0xEE,$D0,$D4
856 vmovdqa $D4,-0x60(%r11)
863 vpshufd \$0xEE,$D2,$D4
866 vmovdqa $D4,-0x40(%r11
    [all...]
poly1305-armv4.pl 444 my ($D0,$D1,$D2,$D3,$D4, $H0,$H1,$H2,$H3,$H4) = map("q$_",(5..14));
495 @ d4 = h4*r0 + h3*r1 + h2*r2 + h1*r3 + h0*r4
501 vmull.u32 $D4,$R4,${R0}[1]
507 vmlal.u32 $D4,$R3,${R1}[1]
513 vmlal.u32 $D4,$R2,${R2}[1]
519 vmlal.u32 $D4,$R1,${R3}[1]
525 vmlal.u32 $D4,$R0,${R4}[1]
580 vadd.i64 $D4,$D4,$T0 @ h3 -> h4
585 vshrn.u64 $T0#lo,$D4,#2
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/poly1305/asm/
poly1305-x86.pl 392 my ($D0,$D1,$D2,$D3,$D4,$T0,$T1,$T2)=map("xmm$_",(0..7));
397 &movdqu ($D4,&QWP(4*6,"edi")); # key base 2^32
403 #&pand ($D4,&QWP(96,"ebx")); # magic mask
406 &movdqa ($D0,$D4);
407 &movdqa ($D1,$D4);
408 &movdqa ($D2,$D4);
419 &psrldq ($D4,13);
428 &movdqa (&QWP(16*4,"esp"),$D4);
439 &movdqa ($T0,$D4);
443 &paddd ($T0,$D4); # *
    [all...]
poly1305-x86_64.pl 344 my ($H0,$H1,$H2,$H3,$H4, $T0,$T1,$T2,$T3,$T4, $D0,$D1,$D2,$D3,$D4, $MASK) =
805 vmovdqu `16*3`($ctx),$D4 # preload r0^2
836 vpshufd \$0xEE,$D4,$D3 # 34xx -> 3434
837 vpshufd \$0x44,$D4,$D0 # xx12 -> 1212
840 vpshufd \$0xEE,$D1,$D4
843 vmovdqa $D4,-0x80(%r11)
850 vpshufd \$0xEE,$D0,$D4
853 vmovdqa $D4,-0x60(%r11)
860 vpshufd \$0xEE,$D2,$D4
863 vmovdqa $D4,-0x40(%r11
    [all...]
poly1305-armv4.pl 444 my ($D0,$D1,$D2,$D3,$D4, $H0,$H1,$H2,$H3,$H4) = map("q$_",(5..14));
495 @ d4 = h4*r0 + h3*r1 + h2*r2 + h1*r3 + h0*r4
501 vmull.u32 $D4,$R4,${R0}[1]
507 vmlal.u32 $D4,$R3,${R1}[1]
513 vmlal.u32 $D4,$R2,${R2}[1]
519 vmlal.u32 $D4,$R1,${R3}[1]
525 vmlal.u32 $D4,$R0,${R4}[1]
580 vadd.i64 $D4,$D4,$T0 @ h3 -> h4
585 vshrn.u64 $T0#lo,$D4,#2
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/poly1305/asm/
poly1305-x86.pl 393 my ($D0,$D1,$D2,$D3,$D4,$T0,$T1,$T2)=map("xmm$_",(0..7));
398 &movdqu ($D4,&QWP(4*6,"edi")); # key base 2^32
404 #&pand ($D4,&QWP(96,"ebx")); # magic mask
407 &movdqa ($D0,$D4);
408 &movdqa ($D1,$D4);
409 &movdqa ($D2,$D4);
420 &psrldq ($D4,13);
429 &movdqa (&QWP(16*4,"esp"),$D4);
440 &movdqa ($T0,$D4);
444 &paddd ($T0,$D4); # *
    [all...]
poly1305-x86_64.pl 342 my ($H0,$H1,$H2,$H3,$H4, $T0,$T1,$T2,$T3,$T4, $D0,$D1,$D2,$D3,$D4, $MASK) =
803 vmovdqu `16*3`($ctx),$D4 # preload r0^2
834 vpshufd \$0xEE,$D4,$D3 # 34xx -> 3434
835 vpshufd \$0x44,$D4,$D0 # xx12 -> 1212
838 vpshufd \$0xEE,$D1,$D4
841 vmovdqa $D4,-0x80(%r11)
848 vpshufd \$0xEE,$D0,$D4
851 vmovdqa $D4,-0x60(%r11)
858 vpshufd \$0xEE,$D2,$D4
861 vmovdqa $D4,-0x40(%r11
    [all...]
poly1305-armv4.pl 449 my ($D0,$D1,$D2,$D3,$D4, $H0,$H1,$H2,$H3,$H4) = map("q$_",(5..14));
500 @ d4 = h4*r0 + h3*r1 + h2*r2 + h1*r3 + h0*r4
506 vmull.u32 $D4,$R4,${R0}[1]
512 vmlal.u32 $D4,$R3,${R1}[1]
518 vmlal.u32 $D4,$R2,${R2}[1]
524 vmlal.u32 $D4,$R1,${R3}[1]
530 vmlal.u32 $D4,$R0,${R4}[1]
585 vadd.i64 $D4,$D4,$T0 @ h3 -> h4
590 vshrn.u64 $T0#lo,$D4,#2
    [all...]
  /src/sys/arch/m68k/include/
reg.h 72 #define D4 (4)
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_stream/chacha20/dolbeau/
u8.h 68 C4, D4) \
72 VEC8_LINE1(A4, B4, C4, D4); \
76 VEC8_LINE2(A4, B4, C4, D4); \
80 VEC8_LINE3(A4, B4, C4, D4); \
84 VEC8_LINE4(A4, B4, C4, D4)
87 B4, C4, D4) \
97 VEC8_LINE1(A4, B4, C4, D4); \
99 VEC8_LINE2(A4, B4, C4, D4); \
101 VEC8_LINE3(A4, B4, C4, D4); \
103 VEC8_LINE4(A4, B4, C4, D4)
    [all...]
  /src/sys/arch/m68k/m68k/
m68k_machdep.c 104 tf->tf_regs[D4] = 0;
linux_syscall.c 129 args[3] = frame->f_regs[D4];
204 args[3] = frame->f_regs[D4];
sig_machdep.c 208 gr[_REG_D4] = frame->f_regs[D4];
348 frame->f_regs[D4] = gr[_REG_D4];
  /src/external/bsd/pcc/dist/pcc/arch/m68k/
macdefs.h 141 #define D4 4
208 { D3, D4, D2D3, D4D5, -1}, \
209 { D4, D5, D3D4, D5D6, -1}, \
  /src/external/bsd/pcc/dist/pcc/arch/sparc64/
macdefs.h 189 #define D4 66
242 { D4, -1 }, { D4, -1 }, { D5, -1 }, { D5, -1 }, \
  /src/external/apache2/llvm/dist/llvm/lib/Target/M68k/MCTargetDesc/
M68kBaseInfo.h 217 return M68k::D4;
  /src/crypto/external/bsd/openssl.old/dist/crypto/chacha/asm/
chacha-armv8.pl 700 $A3,$B3,$C3,$D3,$A4,$B4,$C4,$D4,$A5,$B5,$C5,$D5) = map("v$_.4s",(0..23));
784 add $D4,$D0,$ONE // +4
806 my @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,0);
825 @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,1);
920 @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,0);
937 @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,1);
983 add $D4,$D4,$ONE // +4
995 add $D4,$D4,@K[3
    [all...]
  /src/external/bsd/zstd/dist/lib/decompress/
huf_decompress.c 336 U64 D4;
338 D4 = (U64)((symbol << 8) + nbBits);
340 D4 = (U64)(symbol + (nbBits << 8));
342 assert(D4 < (1U << 16));
343 D4 *= 0x0001000100010001ULL;
344 return D4;
487 U64 const D4 = HUF_DEltX1_set4(wksp->symbols[symbol + s], nbBits);
488 MEM_write64(dt + uStart, D4);
494 U64 const D4 = HUF_DEltX1_set4(wksp->symbols[symbol + s], nbBits);
495 MEM_write64(dt + uStart, D4);
    [all...]
  /src/lib/libm/ld128/
s_expl.c 174 D4 = 4.16666666666666666666666666634228324e-2L,
249 q = x * x2 * D3 + x2 * x2 * (D4 + x * (D5 + x * (D6 +
  /src/crypto/external/apache2/openssl/dist/crypto/chacha/asm/
chacha-armv8.pl 850 $A3,$B3,$C3,$D3,$A4,$B4,$C4,$D4,$A5,$B5,$C5,$D5) = map("v$_.4s",(8..31));
968 add $D4,$D0,$ONE // +4
991 my @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,0);
1010 @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,1);
1105 @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,0);
1122 @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,1);
1169 add $D4,$D4,$ONE // +4
1181 add $D4,$D4,@K[3
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/chacha/asm/
chacha-armv8.pl 810 $A3,$B3,$C3,$D3,$A4,$B4,$C4,$D4,$A5,$B5,$C5,$D5) = map("v$_.4s",(8..31));
927 add $D4,$D0,$ONE // +4
950 my @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,0);
969 @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,1);
1064 @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,0);
1081 @thread4=&NEONROUND($A4,$B4,$C4,$D4,$T4,1);
1128 add $D4,$D4,$ONE // +4
1140 add $D4,$D4,@K[3
    [all...]
  /src/external/apache2/llvm/dist/llvm/lib/Target/AArch64/
AArch64CallingConvention.cpp 33 AArch64::D3, AArch64::D4, AArch64::D5,
  /src/external/apache2/llvm/dist/llvm/lib/Target/ARM/
ARMBaseRegisterInfo.h 80 case D7: case D6: case D5: case D4:
  /src/external/apache2/llvm/dist/llvm/utils/TableGen/
X86RecognizableInstr.h 47 MAP(D4, 84) \

Completed in 93 milliseconds

1 2 3