| /src/crypto/openssl/crypto/aes/asm/ |
| H A D | aes-riscv32-zkn.pl | 193 my ($T0,$T1,$T2,$T3) = use_regs(13..16); 261 lw $T2,8($KEYP) 270 xor $Q2,$Q2,$T2 281 lw $T2,8($KEYP) 286 @{[aes32esmi4 $T2,$Q2,$Q3,$Q0,$Q1]} 297 @{[aes32esmi4 $Q0,$T0,$T1,$T2,$T3]} 298 @{[aes32esmi4 $Q1,$T1,$T2,$T3,$T0]} 299 @{[aes32esmi4 $Q2,$T2,$T3,$T0,$T1]} 300 @{[aes32esmi4 $Q3,$T3,$T0,$T1,$T2]} 311 lw $T2,8($KEYP) [all …]
|
| H A D | aes-riscv64.pl | 84 my ($T0,$T1,$T2,$T3) = use_regs(13..16); 238 ld $T2,8($KEYP) 251 xor $Q2,$Q2,$T2 267 [$T0,$T1,$T2,$T3], # Temporaries 279 [$T0,$T1,$T2,$T3], 291 [$T0,$T1,$T2,$T3], 301 [$T0,$T1,$T2,$T3], 303 [$T0,$T1,$T2,$T3], 322 xor $T2,$T2,$T6 338 xor $Q2,$T2,$T6 [all …]
|
| H A D | aes-riscv64-zkn.pl | 282 my ($T0,$T1,$T2,$T3,$T4) = use_regs(6..8,13..14); 298 @{[aes64ks1i $T2,$T1,$rnum]} 299 @{[aes64ks2 $T0,$T2,$T0]} 316 ld $T2,16($UKEY) 319 sd $T2,16($KEYP) 323 @{[aes64ks1i $T3,$T2,$rnum]} 331 @{[aes64ks2 $T2,$T1,$T2]} 341 sd $T2,16($KEYP) 355 ld $T2,16($UKEY) 359 sd $T2,16($KEYP) [all …]
|
| /src/crypto/openssl/crypto/modes/asm/ |
| H A D | ghash-x86_64.pl | 463 ($T1,$T2,$T3)=("%xmm3","%xmm4","%xmm5"); 468 if (!defined($HK)) { $HK = $T2; 472 pshufd \$0b01001110,$Hkey,$T2 474 pxor $Hkey,$T2 490 movdqa $T1,$T2 # 492 pslldq \$8,$T2 # 494 pxor $T2,$Xi # 503 movdqa $Xi,$T2 # 513 pxor $T2,$Xi 517 movdqa $Xi,$T2 [all …]
|
| H A D | aesni-gcm-x86_64.pl | 84 ($Ii,$T1,$T2,$Hkey, 98 vmovdqu 0x20($const),$T2 # borrow $T2, .Lone_msb 102 vpaddb $T2,$T1,$inout1 103 vpaddb $T2,$inout1,$inout2 104 vpaddb $T2,$inout2,$inout3 105 vpaddb $T2,$inout3,$inout4 106 vpaddb $T2,$inout4,$inout5 116 vpaddb $T2,$inout5,$T1 # next counter value 124 vmovups 0x10-0x80($key),$T2 # borrow $T2 for $rndkey 129 vaesenc $T2,$inout0,$inout0 [all …]
|
| H A D | ghash-x86.pl | 839 ($T1,$T2,$T3)=("xmm3","xmm4","xmm5"); 849 &pshufd ($T2,$Hkey,0b01001110) if (!defined($HK)); 851 &pxor ($T2,$Hkey) if (!defined($HK)); 852 $HK=$T2 if (!defined($HK)); 860 &movdqa ($T2,$T1); # 862 &pslldq ($T2,8); # 864 &pxor ($Xi,$T2); # 879 &pshufd ($T2,$T1,0b01001110); # 881 &pxor ($T2,$T1); # 883 &pclmulqdq ($T2,$T3,0x00); ####### [all …]
|
| H A D | aes-gcm-riscv64-zvkb-zvkg-zvkned.pl | 80 my ($T0, $T1, $T2, $T3) = ("t0", "t1", "t2", "t3"); 478 slli $T2, $PADDING_LEN32, 2 492 sub $INP, $INP, $T2 494 sub $OUTP, $OUTP, $T2 510 sub $T0, $XIP, $T2 625 li $T2, 12 629 beq $T0, $T2, aes_gcm_enc_blocks_192 810 li $T2, 12 814 beq $T0, $T2, aes_gcm_dec_blocks_192
|
| /src/contrib/llvm-project/libcxx/include/ |
| H A D | utility | 73 template <class T1, class T2> 77 typedef T2 second_type; 80 T2 second; 85 … explicit(see-below) pair(const T1& x, const T2& y); // constexpr in C++14 86 … template <class U = T1, class V = T2> explicit(see-below) pair(U&&, V&&); // constexpr in C++14 102 … is_nothrow_move_assignable<T2>::value); // constexpr in C++20 111 … is_nothrow_swappable_v<T2>); // constexpr in C++20 115 template<class T1, class T2, class U1, class U2, template<class> class TQual, template<class> class… 116 struct basic_common_reference<pair<T1, T2>, pair<U1, U2>, TQual, UQual>; // since C++23 118 template<class T1, class T2, class U1, class U2> [all …]
|
| H A D | memory_resource | 29 template <class T1, class T2> 31 const polymorphic_allocator<T2>& b) noexcept; 32 template <class T1, class T2> 34 const polymorphic_allocator<T2>& b) noexcept; // removed in C++20
|
| /src/crypto/openssl/crypto/poly1305/asm/ |
| H A D | poly1305-x86.pl | 392 my ($D0,$D1,$D2,$D3,$D4,$T0,$T1,$T2)=map("xmm$_",(0..7)); 393 my $MASK=$T2; # borrow and keep in mind 484 &movdqa ($T2,$T1); 487 &movdqa ($T0,$T2); 488 &pmuludq ($T2,&QWP(16*1,$base)); # r1*h1 492 &paddq ($D2,$T2); 494 &$load ($T2,2); # r2^n 497 &movdqa ($T0,$T2); 498 &pmuludq ($T2,&QWP(16*2,$base)); # r2*h2 502 &paddq ($D4,$T2); [all …]
|
| H A D | poly1305-x86_64.pl | 346 my ($H0,$H1,$H2,$H3,$H4, $T0,$T1,$T2,$T3,$T4, $D0,$D1,$D2,$D3,$D4, $MASK) = 818 vpsrldq \$6,$T0,$T2 # splat input 822 vpunpcklqdq $T3,$T2,$T3 # 2:3 827 vpsrlq \$4,$T3,$T2 830 vpand $MASK,$T2,$T2 # 2 910 vpmuludq $T2,$D4,$D2 # d3 = h2*r0 922 vpmuludq $T2,$H2,$H0 # h2*r1 929 vpmuludq $T2,$H3,$H0 # h2*r2 955 vpmuludq $T2,$H3,$H3 # h2*s3 956 vpmuludq $T2,$H4,$T2 # h2*s4 [all …]
|
| H A D | poly1305-ppc.pl | 770 my ($T0, $T1, $T2, $T3, $T4) = map("v$_",(20..24)); 1343 lvx_u $T2,$x10,$inp 1347 be?vperm $T2,$T2,$T2,$_4 1351 vpermdi $I0,$T1,$T2,0b00 # smash input to base 2^26 1353 vperm $I2,$T1,$T2,$I2perm # 0x...0e0f0001...1e1f1011 1355 vpermdi $I3,$T1,$T2,0b11 1367 vperm $T2,$T3,$T4,$I2perm # 0x...0e0f0001...1e1f1011 1371 vsrd $T2,$T2,$_4 1376 vand $T2,$T2,$mask26 1383 vmrgow $I2,$T2,$I2 [all …]
|
| /src/sys/contrib/libsodium/src/libsodium/crypto_onetimeauth/poly1305/sse2/ |
| H A D | poly1305_sse2.c | 207 xmmi T0, T1, T2, T3, T4, T5, T6, T7, T8; in poly1305_blocks() local 241 T2 = _mm_loadu_si128((const xmmi *) (const void *) &st->H.hh[8]); in poly1305_blocks() 246 H4 = _mm_shuffle_epi32(T2, _MM_SHUFFLE(1, 1, 0, 0)); in poly1305_blocks() 251 T2 = _mm_loadu_si128((const xmmi *) (const void *) &st->R[0]); in poly1305_blocks() 255 T4 = _mm_unpacklo_epi32(T0, T2); in poly1305_blocks() 256 T5 = _mm_unpackhi_epi32(T0, T2); in poly1305_blocks() 262 T2 = _mm_cvtsi32_si128(1); in poly1305_blocks() 263 T4 = _mm_unpacklo_epi32(T0, T2); in poly1305_blocks() 264 T5 = _mm_unpackhi_epi32(T0, T2); in poly1305_blocks() 318 T2 = H4; in poly1305_blocks() [all …]
|
| /src/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
| H A D | sanitizer_syscall_linux_x86_64.inc | 30 template <typename T1, typename T2> 31 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2) { 38 template <typename T1, typename T2, typename T3> 39 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3) { 46 template <typename T1, typename T2, typename T3, typename T4> 47 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4) { 56 template <typename T1, typename T2, typename T3, typename T4, typename T5> 57 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4, 68 template <typename T1, typename T2, typename T3, typename T4, typename T5, 70 static uptr internal_syscall(u64 nr, T1 arg1, T2 arg2, T3 arg3, T4 arg4,
|
| /src/contrib/llvm-project/clang/lib/AST/ |
| H A D | ASTStructuralEquivalence.cpp | 99 QualType T1, QualType T2); 804 QualType T1, QualType T2) { in IsStructurallyEquivalent() argument 805 if (T1.isNull() || T2.isNull()) in IsStructurallyEquivalent() 806 return T1.isNull() && T2.isNull(); in IsStructurallyEquivalent() 809 QualType OrigT2 = T2; in IsStructurallyEquivalent() 815 T2 = Context.ToCtx.getCanonicalType(T2); in IsStructurallyEquivalent() 818 if (T1.getQualifiers() != T2.getQualifiers()) in IsStructurallyEquivalent() 823 if (T1->getTypeClass() != T2->getTypeClass()) { in IsStructurallyEquivalent() 827 T2->getTypeClass() == Type::FunctionNoProto) in IsStructurallyEquivalent() 830 T2->getTypeClass() == Type::FunctionProto) in IsStructurallyEquivalent() [all …]
|
| /src/crypto/openssl/crypto/aria/ |
| H A D | aria.c | 338 #define ARIA_ADD_ROUND_KEY(RK, T0, T1, T2, T3) \ argument 342 (T2) ^= (RK)->u[2]; \ 347 #define ARIA_SBOX_LAYER1_WITH_PRE_DIFF(T0, T1, T2, T3) … argument 351 …(T2) = S1[GET_U8_BE(T2, 0)] ^ S2[GET_U8_BE(T2, 1)] ^ X1[GET_U8_BE(T2, 2)] ^ X2[GET_U8_BE(T2, 3)]; \ 356 #define ARIA_SBOX_LAYER2_WITH_PRE_DIFF(T0, T1, T2, T3) … argument 360 …(T2) = X1[GET_U8_BE(T2, 0)] ^ X2[GET_U8_BE(T2, 1)] ^ S1[GET_U8_BE(T2, 2)] ^ S2[GET_U8_BE(T2, 3)]; \ 365 #define ARIA_DIFF_WORD(T0, T1, T2, T3) \ argument 367 (T1) ^= (T2); \ 368 (T2) ^= (T3); \ 372 (T2) ^= (T0); \ [all …]
|
| /src/crypto/openssl/crypto/chacha/asm/ |
| H A D | chacha-riscv64-v-zbb.pl | 89 my ( $T2 ) = ( "t5" ); 377 li $T2, 0x79622d32 378 @{[vadd_vx $V2, $V2, $T2]} 379 add $STATE2, $STATE2, $T2 385 lw $T2, 8($KEY) 391 @{[vadd_vx $V6, $V6, $T2]} 392 add $STATE6, $STATE6, $T2 414 lw $T2, 24($KEY) 428 @{[vadd_vx $V10, $V10, $T2]} 429 add $STATE10, $STATE10, $T2 [all …]
|
| /src/contrib/llvm-project/clang/lib/Tooling/ASTDiff/ |
| H A D | ASTDiff.cpp | 60 SyntaxTree::Impl &T1, &T2; member in clang::diff::ASTDiff::Impl 63 Impl(SyntaxTree::Impl &T1, SyntaxTree::Impl &T2, 76 assert(&*Tree == &T2 && "Invalid tree."); in getMapped() 566 const SyntaxTree::Impl &T2, NodeId Id1, NodeId Id2) in ZhangShashaMatcher() argument 567 : DiffImpl(DiffImpl), S1(T1, Id1), S2(T2, Id2) { in ZhangShashaMatcher() 758 const Node &N2 = T2.getNode(Id2); in identical() 761 T1.getNodeValue(Id1) != T2.getNodeValue(Id2)) in identical() 770 return Options.isMatchingAllowed(T1.getNode(Id1), T2.getNode(Id2)); in isMatchingPossible() 776 NodeId P2 = T2.getNode(Id2).Parent; in haveSameParents() 783 if (std::max(T1.getNumberOfDescendants(Id1), T2.getNumberOfDescendants(Id2)) > in addOptimalMapping() [all …]
|
| /src/contrib/googletest/googletest/test/ |
| H A D | gtest_pred_impl_unittest.cc | 450 template <typename T1, typename T2> 451 bool PredFunction2(T1 v1, T2 v2) { in PredFunction2() 462 template <typename T1, typename T2> 463 bool operator()(const T1& v1, const T2& v2) { in operator ()() 469 template <typename T1, typename T2> 471 const T1& v1, const T2& v2) { in PredFormatFunction2() 481 template <typename T1, typename T2> 483 const T1& v1, const T2& v2) const { in operator ()() 833 template <typename T1, typename T2, typename T3> 834 bool PredFunction3(T1 v1, T2 v2, T3 v3) { in PredFunction3() [all …]
|
| /src/crypto/openssl/crypto/sha/asm/ |
| H A D | sha256-c64xplus.pl | 34 ($A,$Actx,$B,$Bctx,$C,$Cctx,$D,$Dctx,$T2,$S0,$s1,$t0a,$t1a,$t2a,$X9,$X14) 43 ($Maj,$Ch)=($T2,"B6"); 147 || ADD $S0,$Maj,$T2 ; T2 = Sigma0(a) + Maj(a,b,c) 158 || ADD $T1,$T2,$A ; a = T1 + T2 186 || ADD $S0,$Maj,$T2 ; T2 = Sigma0(a) + Maj(a,b,c) 201 || ADD $T1,$T2,$A ; a = T1 + T2 243 || ADD $S0,$Maj,$T2 ; T2 = Sigma0(a) + Maj(a,b,c) 256 || ADD $T1,$T2,$A ; a = T1 + T2
|
| H A D | sha512-armv8.pl | 106 my ($T0,$T1,$T2)=(@X[($i-8)&15],@X[($i-9)&15],@X[($i-10)&15]); 163 ror $T2,@X[($j+14)&15],#$sigma1[0] 175 eor $T2,$T2,@X[($j+14)&15],ror#$sigma1[1] 180 eor $T2,$T2,@X[($j+14)&15],lsr#$sigma1[2] // sigma1(X[i+14]) 187 add @X[$j],@X[$j],$T2 460 my ($T0,$T1,$T2,$T3,$T4,$T5,$T6,$T7) = map("q$_",(4..7,16..19)); 490 &ushr_32 ($T2,$T0,$sigma0[0]); 496 &sli_32 ($T2,$T0,32-$sigma0[0]); 502 &eor_8 ($T1,$T1,$T2); 660 ld1.32 {$T2},[$Ktbl], #16 [all …]
|
| /src/crypto/openssl/crypto/bn/asm/ |
| H A D | rsaz-2k-avxifma.pl | 119 my ($T0,$T0h,$T1,$T1h,$T2,$tmp) = ("$zero", "$Bi", "$Yi", map("%ymm$_", (13..15))); 214 vpsrlq \$52, $_R2, $T2 217 vpermq \$144, $T2, $T2 219 vblendpd \$1, $tmp, $T2, $T2 248 vpaddq $T2, $_R2, $_R2 256 vpcmpgtq .Lmask52x4(%rip), $_R2, $T2 261 vmovmskpd $T2, %r10d 268 vpcmpeqq .Lmask52x4(%rip), $_R2, $T2 273 vmovmskpd $T2, %edx
|
| H A D | rsaz-3k-avxifma.pl | 104 my ($T0,$T0h,$T1,$T1h,$T2,$T2h,$T3,$T3h) = ("$zero", "$Bi", "$Yi", map("%ymm$_", (11..15))); 219 vpsrlq \$52, $_R2, $T2 237 vpermq \$3, $T2, $_R0 240 vpermq \$144, $T2, $T2 242 vblendpd \$1, $_R0, $T2, $T2 277 vpaddq $T2, $_R2, $_R2 298 vpcmpgtq .Lmask52x4(%rip),${_R2},$T2 300 vmovmskpd $T2, %r12d 332 vpcmpeqq .Lmask52x4(%rip),${_R2},$T2 334 vmovmskpd $T2, %edx
|
| /src/contrib/googletest/googletest/include/gtest/ |
| H A D | gtest_pred_impl.h | 117 template <typename Pred, typename T1, typename T2> 120 const T2& v2) { in AssertPred2Helper() 154 template <typename Pred, typename T1, typename T2, typename T3> 157 const T1& v1, const T2& v2, const T3& v3) { in AssertPred3Helper() 193 template <typename Pred, typename T1, typename T2, typename T3, typename T4> 197 const T2& v2, const T3& v3, const T4& v4) { in AssertPred4Helper() 234 template <typename Pred, typename T1, typename T2, typename T3, typename T4, 239 const T1& v1, const T2& v2, const T3& v3, in AssertPred5Helper()
|
| /src/sys/cddl/boot/zfs/ |
| H A D | sha256.c | 130 uint32_t a, b, c, d, e, f, g, h, t, T1, T2, W[64]; in SHA256Transform() local 148 T2 = BIGSIGMA0_256(a) + Maj(a, b, c); in SHA256Transform() 150 d = c; c = b; b = a; a = T1 + T2; in SHA256Transform() 161 uint64_t a, b, c, d, e, f, g, h, t, T1, T2, W[80]; in SHA512Transform() local 182 T2 = BIGSIGMA0_512(a) + Maj(a, b, c); in SHA512Transform() 184 d = c; c = b; b = a; a = T1 + T2; in SHA512Transform()
|