Home
last modified time | relevance | path

Searched refs:T2 (Results 1 – 25 of 197) sorted by relevance

12345678

/src/crypto/openssl/crypto/aes/asm/
H A Daes-riscv32-zkn.pl193 my ($T0,$T1,$T2,$T3) = use_regs(13..16);
261 lw $T2,8($KEYP)
270 xor $Q2,$Q2,$T2
281 lw $T2,8($KEYP)
286 @{[aes32esmi4 $T2,$Q2,$Q3,$Q0,$Q1]}
297 @{[aes32esmi4 $Q0,$T0,$T1,$T2,$T3]}
298 @{[aes32esmi4 $Q1,$T1,$T2,$T3,$T0]}
299 @{[aes32esmi4 $Q2,$T2,$T3,$T0,$T1]}
300 @{[aes32esmi4 $Q3,$T3,$T0,$T1,$T2]}
311 lw $T2,8($KEYP)
[all …]
H A Daes-riscv64.pl84 my ($T0,$T1,$T2,$T3) = use_regs(13..16);
238 ld $T2,8($KEYP)
251 xor $Q2,$Q2,$T2
267 [$T0,$T1,$T2,$T3], # Temporaries
279 [$T0,$T1,$T2,$T3],
291 [$T0,$T1,$T2,$T3],
301 [$T0,$T1,$T2,$T3],
303 [$T0,$T1,$T2,$T3],
322 xor $T2,$T2,$T6
338 xor $Q2,$T2,$T6
[all …]
H A Daes-riscv64-zkn.pl282 my ($T0,$T1,$T2,$T3,$T4) = use_regs(6..8,13..14);
298 @{[aes64ks1i $T2,$T1,$rnum]}
299 @{[aes64ks2 $T0,$T2,$T0]}
316 ld $T2,16($UKEY)
319 sd $T2,16($KEYP)
323 @{[aes64ks1i $T3,$T2,$rnum]}
331 @{[aes64ks2 $T2,$T1,$T2]}
341 sd $T2,16($KEYP)
355 ld $T2,16($UKEY)
359 sd $T2,16($KEYP)
[all …]
/src/crypto/openssl/crypto/modes/asm/
H A Dghash-x86_64.pl463 ($T1,$T2,$T3)=("%xmm3","%xmm4","%xmm5");
468 if (!defined($HK)) { $HK = $T2;
472 pshufd \$0b01001110,$Hkey,$T2
474 pxor $Hkey,$T2
490 movdqa $T1,$T2 #
492 pslldq \$8,$T2 #
494 pxor $T2,$Xi #
503 movdqa $Xi,$T2 #
513 pxor $T2,$Xi
517 movdqa $Xi,$T2
[all …]
H A Daesni-gcm-x86_64.pl84 ($Ii,$T1,$T2,$Hkey,
98 vmovdqu 0x20($const),$T2 # borrow $T2, .Lone_msb
102 vpaddb $T2,$T1,$inout1
103 vpaddb $T2,$inout1,$inout2
104 vpaddb $T2,$inout2,$inout3
105 vpaddb $T2,$inout3,$inout4
106 vpaddb $T2,$inout4,$inout5
116 vpaddb $T2,$inout5,$T1 # next counter value
124 vmovups 0x10-0x80($key),$T2 # borrow $T2 for $rndkey
129 vaesenc $T2,$inout0,$inout0
[all …]
H A Dghash-x86.pl839 ($T1,$T2,$T3)=("xmm3","xmm4","xmm5");
849 &pshufd ($T2,$Hkey,0b01001110) if (!defined($HK));
851 &pxor ($T2,$Hkey) if (!defined($HK));
852 $HK=$T2 if (!defined($HK));
860 &movdqa ($T2,$T1); #
862 &pslldq ($T2,8); #
864 &pxor ($Xi,$T2); #
879 &pshufd ($T2,$T1,0b01001110); #
881 &pxor ($T2,$T1); #
883 &pclmulqdq ($T2,$T3,0x00); #######
[all …]
H A Daes-gcm-riscv64-zvkb-zvkg-zvkned.pl80 my ($T0, $T1, $T2, $T3) = ("t0", "t1", "t2", "t3");
478 slli $T2, $PADDING_LEN32, 2
492 sub $INP, $INP, $T2
494 sub $OUTP, $OUTP, $T2
510 sub $T0, $XIP, $T2
625 li $T2, 12
629 beq $T0, $T2, aes_gcm_enc_blocks_192
810 li $T2, 12
814 beq $T0, $T2, aes_gcm_dec_blocks_192
/src/contrib/llvm-project/libcxx/include/
H A Dutility73 template <class T1, class T2>
77 typedef T2 second_type;
80 T2 second;
85 … explicit(see-below) pair(const T1& x, const T2& y); // constexpr in C++14
86 … template <class U = T1, class V = T2> explicit(see-below) pair(U&&, V&&); // constexpr in C++14
102 … is_nothrow_move_assignable<T2>::value); // constexpr in C++20
111 … is_nothrow_swappable_v<T2>); // constexpr in C++20
115 template<class T1, class T2, class U1, class U2, template<class> class TQual, template<class> class…
116 struct basic_common_reference<pair<T1, T2>, pair<U1, U2>, TQual, UQual>; // since C++23
118 template<class T1, class T2, class U1, class U2>
[all …]
H A Dmemory_resource29 template <class T1, class T2>
31 const polymorphic_allocator<T2>& b) noexcept;
32 template <class T1, class T2>
34 const polymorphic_allocator<T2>& b) noexcept; // removed in C++20
/src/crypto/openssl/crypto/poly1305/asm/
H A Dpoly1305-x86.pl392 my ($D0,$D1,$D2,$D3,$D4,$T0,$T1,$T2)=map("xmm$_",(0..7));
393 my $MASK=$T2; # borrow and keep in mind
484 &movdqa ($T2,$T1);
487 &movdqa ($T0,$T2);
488 &pmuludq ($T2,&QWP(16*1,$base)); # r1*h1
492 &paddq ($D2,$T2);
494 &$load ($T2,2); # r2^n
497 &movdqa ($T0,$T2);
498 &pmuludq ($T2,&QWP(16*2,$base)); # r2*h2
502 &paddq ($D4,$T2);
[all …]
H A Dpoly1305-x86_64.pl346 my ($H0,$H1,$H2,$H3,$H4, $T0,$T1,$T2,$T3,$T4, $D0,$D1,$D2,$D3,$D4, $MASK) =
818 vpsrldq \$6,$T0,$T2 # splat input
822 vpunpcklqdq $T3,$T2,$T3 # 2:3
827 vpsrlq \$4,$T3,$T2
830 vpand $MASK,$T2,$T2 # 2
910 vpmuludq $T2,$D4,$D2 # d3 = h2*r0
922 vpmuludq $T2,$H2,$H0 # h2*r1
929 vpmuludq $T2,$H3,$H0 # h2*r2
955 vpmuludq $T2,$H3,$H3 # h2*s3
956 vpmuludq $T2,$H4,$T2 # h2*s4
[all …]
H A Dpoly1305-ppc.pl770 my ($T0, $T1, $T2, $T3, $T4) = map("v$_",(20..24));
1343 lvx_u $T2,$x10,$inp
1347 be?vperm $T2,$T2,$T2,$_4
1351 vpermdi $I0,$T1,$T2,0b00 # smash input to base 2^26
1353 vperm $I2,$T1,$T2,$I2perm # 0x...0e0f0001...1e1f1011
1355 vpermdi $I3,$T1,$T2,0b11
1367 vperm $T2,$T3,$T4,$I2perm # 0x...0e0f0001...1e1f1011
1371 vsrd $T2,$T2,$_4
1376 vand $T2,$T2,$mask26
1383 vmrgow $I2,$T2,$I2
[all …]
/src/sys/contrib/libsodium/src/libsodium/crypto_onetimeauth/poly1305/sse2/
H A Dpoly1305_sse2.c207 xmmi T0, T1, T2, T3, T4, T5, T6, T7, T8; in poly1305_blocks() local
241 T2 = _mm_loadu_si128((const xmmi *) (const void *) &st->H.hh[8]); in poly1305_blocks()
246 H4 = _mm_shuffle_epi32(T2, _MM_SHUFFLE(1, 1, 0, 0)); in poly1305_blocks()
251 T2 = _mm_loadu_si128((const xmmi *) (const void *) &st->R[0]); in poly1305_blocks()
255 T4 = _mm_unpacklo_epi32(T0, T2); in poly1305_blocks()
256 T5 = _mm_unpackhi_epi32(T0, T2); in poly1305_blocks()
262 T2 = _mm_cvtsi32_si128(1); in poly1305_blocks()
263 T4 = _mm_unpacklo_epi32(T0, T2); in poly1305_blocks()
264 T5 = _mm_unpackhi_epi32(T0, T2); in poly1305_blocks()
318 T2 = H4; in poly1305_blocks()
[all …]
/src/contrib/llvm-project/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_syscall_linux_x86_64.inc30 template <typename T1, typename T2>
31 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2) {
38 template <typename T1, typename T2, typename T3>
39 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3) {
46 template <typename T1, typename T2, typename T3, typename T4>
47 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4) {
56 template <typename T1, typename T2, typename T3, typename T4, typename T5>
57 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4,
68 template <typename T1, typename T2, typename T3, typename T4, typename T5,
70 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4,
/src/contrib/llvm-project/clang/lib/AST/
H A DASTStructuralEquivalence.cpp99 QualType T1, QualType T2);
804 QualType T1, QualType T2) { in IsStructurallyEquivalent() argument
805 if (T1.isNull() || T2.isNull()) in IsStructurallyEquivalent()
806 return T1.isNull() && T2.isNull(); in IsStructurallyEquivalent()
809 QualType OrigT2 = T2; in IsStructurallyEquivalent()
815 T2 = Context.ToCtx.getCanonicalType(T2); in IsStructurallyEquivalent()
818 if (T1.getQualifiers() != T2.getQualifiers()) in IsStructurallyEquivalent()
823 if (T1->getTypeClass() != T2->getTypeClass()) { in IsStructurallyEquivalent()
827 T2->getTypeClass() == Type::FunctionNoProto) in IsStructurallyEquivalent()
830 T2->getTypeClass() == Type::FunctionProto) in IsStructurallyEquivalent()
[all …]
/src/crypto/openssl/crypto/aria/
H A Daria.c338 #define ARIA_ADD_ROUND_KEY(RK, T0, T1, T2, T3) \ argument
342 (T2) ^= (RK)->u[2]; \
347 #define ARIA_SBOX_LAYER1_WITH_PRE_DIFF(T0, T1, T2, T3) … argument
351 …(T2) = S1[GET_U8_BE(T2, 0)] ^ S2[GET_U8_BE(T2, 1)] ^ X1[GET_U8_BE(T2, 2)] ^ X2[GET_U8_BE(T2, 3)]; \
356 #define ARIA_SBOX_LAYER2_WITH_PRE_DIFF(T0, T1, T2, T3) … argument
360 …(T2) = X1[GET_U8_BE(T2, 0)] ^ X2[GET_U8_BE(T2, 1)] ^ S1[GET_U8_BE(T2, 2)] ^ S2[GET_U8_BE(T2, 3)]; \
365 #define ARIA_DIFF_WORD(T0, T1, T2, T3) \ argument
367 (T1) ^= (T2); \
368 (T2) ^= (T3); \
372 (T2) ^= (T0); \
[all …]
/src/crypto/openssl/crypto/chacha/asm/
H A Dchacha-riscv64-v-zbb.pl89 my ( $T2 ) = ( "t5" );
377 li $T2, 0x79622d32
378 @{[vadd_vx $V2, $V2, $T2]}
379 add $STATE2, $STATE2, $T2
385 lw $T2, 8($KEY)
391 @{[vadd_vx $V6, $V6, $T2]}
392 add $STATE6, $STATE6, $T2
414 lw $T2, 24($KEY)
428 @{[vadd_vx $V10, $V10, $T2]}
429 add $STATE10, $STATE10, $T2
[all …]
/src/contrib/llvm-project/clang/lib/Tooling/ASTDiff/
H A DASTDiff.cpp60 SyntaxTree::Impl &T1, &T2; member in clang::diff::ASTDiff::Impl
63 Impl(SyntaxTree::Impl &T1, SyntaxTree::Impl &T2,
76 assert(&*Tree == &T2 && "Invalid tree."); in getMapped()
566 const SyntaxTree::Impl &T2, NodeId Id1, NodeId Id2) in ZhangShashaMatcher() argument
567 : DiffImpl(DiffImpl), S1(T1, Id1), S2(T2, Id2) { in ZhangShashaMatcher()
758 const Node &N2 = T2.getNode(Id2); in identical()
761 T1.getNodeValue(Id1) != T2.getNodeValue(Id2)) in identical()
770 return Options.isMatchingAllowed(T1.getNode(Id1), T2.getNode(Id2)); in isMatchingPossible()
776 NodeId P2 = T2.getNode(Id2).Parent; in haveSameParents()
783 if (std::max(T1.getNumberOfDescendants(Id1), T2.getNumberOfDescendants(Id2)) > in addOptimalMapping()
[all …]
/src/contrib/googletest/googletest/test/
H A Dgtest_pred_impl_unittest.cc450 template <typename T1, typename T2>
451 bool PredFunction2(T1 v1, T2 v2) { in PredFunction2()
462 template <typename T1, typename T2>
463 bool operator()(const T1& v1, const T2& v2) { in operator ()()
469 template <typename T1, typename T2>
471 const T1& v1, const T2& v2) { in PredFormatFunction2()
481 template <typename T1, typename T2>
483 const T1& v1, const T2& v2) const { in operator ()()
833 template <typename T1, typename T2, typename T3>
834 bool PredFunction3(T1 v1, T2 v2, T3 v3) { in PredFunction3()
[all …]
/src/crypto/openssl/crypto/sha/asm/
H A Dsha256-c64xplus.pl34 ($A,$Actx,$B,$Bctx,$C,$Cctx,$D,$Dctx,$T2,$S0,$s1,$t0a,$t1a,$t2a,$X9,$X14)
43 ($Maj,$Ch)=($T2,"B6");
147 || ADD $S0,$Maj,$T2 ; T2 = Sigma0(a) + Maj(a,b,c)
158 || ADD $T1,$T2,$A ; a = T1 + T2
186 || ADD $S0,$Maj,$T2 ; T2 = Sigma0(a) + Maj(a,b,c)
201 || ADD $T1,$T2,$A ; a = T1 + T2
243 || ADD $S0,$Maj,$T2 ; T2 = Sigma0(a) + Maj(a,b,c)
256 || ADD $T1,$T2,$A ; a = T1 + T2
H A Dsha512-armv8.pl106 my ($T0,$T1,$T2)=(@X[($i-8)&15],@X[($i-9)&15],@X[($i-10)&15]);
163 ror $T2,@X[($j+14)&15],#$sigma1[0]
175 eor $T2,$T2,@X[($j+14)&15],ror#$sigma1[1]
180 eor $T2,$T2,@X[($j+14)&15],lsr#$sigma1[2] // sigma1(X[i+14])
187 add @X[$j],@X[$j],$T2
460 my ($T0,$T1,$T2,$T3,$T4,$T5,$T6,$T7) = map("q$_",(4..7,16..19));
490 &ushr_32 ($T2,$T0,$sigma0[0]);
496 &sli_32 ($T2,$T0,32-$sigma0[0]);
502 &eor_8 ($T1,$T1,$T2);
660 ld1.32 {$T2},[$Ktbl], #16
[all …]
/src/crypto/openssl/crypto/bn/asm/
H A Drsaz-2k-avxifma.pl119 my ($T0,$T0h,$T1,$T1h,$T2,$tmp) = ("$zero", "$Bi", "$Yi", map("%ymm$_", (13..15)));
214 vpsrlq \$52, $_R2, $T2
217 vpermq \$144, $T2, $T2
219 vblendpd \$1, $tmp, $T2, $T2
248 vpaddq $T2, $_R2, $_R2
256 vpcmpgtq .Lmask52x4(%rip), $_R2, $T2
261 vmovmskpd $T2, %r10d
268 vpcmpeqq .Lmask52x4(%rip), $_R2, $T2
273 vmovmskpd $T2, %edx
H A Drsaz-3k-avxifma.pl104 my ($T0,$T0h,$T1,$T1h,$T2,$T2h,$T3,$T3h) = ("$zero", "$Bi", "$Yi", map("%ymm$_", (11..15)));
219 vpsrlq \$52, $_R2, $T2
237 vpermq \$3, $T2, $_R0
240 vpermq \$144, $T2, $T2
242 vblendpd \$1, $_R0, $T2, $T2
277 vpaddq $T2, $_R2, $_R2
298 vpcmpgtq .Lmask52x4(%rip),${_R2},$T2
300 vmovmskpd $T2, %r12d
332 vpcmpeqq .Lmask52x4(%rip),${_R2},$T2
334 vmovmskpd $T2, %edx
/src/contrib/googletest/googletest/include/gtest/
H A Dgtest_pred_impl.h117 template <typename Pred, typename T1, typename T2>
120 const T2& v2) { in AssertPred2Helper()
154 template <typename Pred, typename T1, typename T2, typename T3>
157 const T1& v1, const T2& v2, const T3& v3) { in AssertPred3Helper()
193 template <typename Pred, typename T1, typename T2, typename T3, typename T4>
197 const T2& v2, const T3& v3, const T4& v4) { in AssertPred4Helper()
234 template <typename Pred, typename T1, typename T2, typename T3, typename T4,
239 const T1& v1, const T2& v2, const T3& v3, in AssertPred5Helper()
/src/sys/cddl/boot/zfs/
H A Dsha256.c130 uint32_t a, b, c, d, e, f, g, h, t, T1, T2, W[64]; in SHA256Transform() local
148 T2 = BIGSIGMA0_256(a) + Maj(a, b, c); in SHA256Transform()
150 d = c; c = b; b = a; a = T1 + T2; in SHA256Transform()
161 uint64_t a, b, c, d, e, f, g, h, t, T1, T2, W[80]; in SHA512Transform() local
182 T2 = BIGSIGMA0_512(a) + Maj(a, b, c); in SHA512Transform()
184 d = c; c = b; b = a; a = T1 + T2; in SHA512Transform()

12345678