| /src/sys/contrib/libb2/ |
| H A D | blake2b-load-sse41.h | 17 #define LOAD_MSG_0_1(b0, b1) \ argument 21 b1 = _mm_unpacklo_epi64(m2, m3); \ 25 #define LOAD_MSG_0_2(b0, b1) \ argument 29 b1 = _mm_unpackhi_epi64(m2, m3); \ 33 #define LOAD_MSG_0_3(b0, b1) \ argument 37 b1 = _mm_unpacklo_epi64(m6, m7); \ 41 #define LOAD_MSG_0_4(b0, b1) \ argument 45 b1 = _mm_unpackhi_epi64(m6, m7); \ 49 #define LOAD_MSG_1_1(b0, b1) \ argument 53 b1 = _mm_unpackhi_epi64(m4, m6); \ [all …]
|
| H A D | blake2b-load-sse2.h | 17 #define LOAD_MSG_0_1(b0, b1) b0 = _mm_set_epi64x(m2, m0); b1 = _mm_set_epi64x(m6, m4) argument 18 #define LOAD_MSG_0_2(b0, b1) b0 = _mm_set_epi64x(m3, m1); b1 = _mm_set_epi64x(m7, m5) argument 19 #define LOAD_MSG_0_3(b0, b1) b0 = _mm_set_epi64x(m10, m8); b1 = _mm_set_epi64x(m14, m12) argument 20 #define LOAD_MSG_0_4(b0, b1) b0 = _mm_set_epi64x(m11, m9); b1 = _mm_set_epi64x(m15, m13) argument 21 #define LOAD_MSG_1_1(b0, b1) b0 = _mm_set_epi64x(m4, m14); b1 = _mm_set_epi64x(m13, m9) argument 22 #define LOAD_MSG_1_2(b0, b1) b0 = _mm_set_epi64x(m8, m10); b1 = _mm_set_epi64x(m6, m15) argument 23 #define LOAD_MSG_1_3(b0, b1) b0 = _mm_set_epi64x(m0, m1); b1 = _mm_set_epi64x(m5, m11) argument 24 #define LOAD_MSG_1_4(b0, b1) b0 = _mm_set_epi64x(m2, m12); b1 = _mm_set_epi64x(m3, m7) argument 25 #define LOAD_MSG_2_1(b0, b1) b0 = _mm_set_epi64x(m12, m11); b1 = _mm_set_epi64x(m15, m5) argument 26 #define LOAD_MSG_2_2(b0, b1) b0 = _mm_set_epi64x(m0, m8); b1 = _mm_set_epi64x(m13, m2) argument [all …]
|
| H A D | blake2b-round.h | 47 #define G1(row1l,row2l,row3l,row4l,row1h,row2h,row3h,row4h,b0,b1) \ argument 49 row1h = _mm_add_epi64(_mm_add_epi64(row1h, b1), row2h); \ 66 #define G2(row1l,row2l,row3l,row4l,row1h,row2h,row3h,row4h,b0,b1) \ argument 68 row1h = _mm_add_epi64(_mm_add_epi64(row1h, b1), row2h); \ 148 LOAD_MSG_ ##r ##_1(b0, b1); \ 149 G1(row1l,row2l,row3l,row4l,row1h,row2h,row3h,row4h,b0,b1); \ 150 LOAD_MSG_ ##r ##_2(b0, b1); \ 151 G2(row1l,row2l,row3l,row4l,row1h,row2h,row3h,row4h,b0,b1); \ 153 LOAD_MSG_ ##r ##_3(b0, b1); \ 154 G1(row1l,row2l,row3l,row4l,row1h,row2h,row3h,row4h,b0,b1); \ [all …]
|
| /src/sys/contrib/libsodium/src/libsodium/crypto_generichash/blake2b/ref/ |
| H A D | blake2b-load-sse41.h | 19 #define LOAD_MSG_0_1(b0, b1) \ argument 22 b1 = _mm_unpacklo_epi64(m2, m3); \ 25 #define LOAD_MSG_0_2(b0, b1) \ argument 28 b1 = _mm_unpackhi_epi64(m2, m3); \ 31 #define LOAD_MSG_0_3(b0, b1) \ argument 34 b1 = _mm_unpacklo_epi64(m6, m7); \ 37 #define LOAD_MSG_0_4(b0, b1) \ argument 40 b1 = _mm_unpackhi_epi64(m6, m7); \ 43 #define LOAD_MSG_1_1(b0, b1) \ argument 46 b1 = _mm_unpackhi_epi64(m4, m6); \ [all …]
|
| H A D | blake2b-load-sse2.h | 19 #define LOAD_MSG_0_1(b0, b1) \ argument 21 b1 = _mm_set_epi64x(m6, m4) 22 #define LOAD_MSG_0_2(b0, b1) \ argument 24 b1 = _mm_set_epi64x(m7, m5) 25 #define LOAD_MSG_0_3(b0, b1) \ argument 27 b1 = _mm_set_epi64x(m14, m12) 28 #define LOAD_MSG_0_4(b0, b1) \ argument 30 b1 = _mm_set_epi64x(m15, m13) 31 #define LOAD_MSG_1_1(b0, b1) \ argument 33 b1 = _mm_set_epi64x(m13, m9) [all …]
|
| H A D | blake2b-compress-sse41.h | 21 #define G1(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1) \ argument 23 row1h = _mm_add_epi64(_mm_add_epi64(row1h, b1), row2h); \ 40 #define G2(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1) \ argument 42 row1h = _mm_add_epi64(_mm_add_epi64(row1h, b1), row2h); \ 92 LOAD_MSG_##r##_1(b0, b1); \ 93 G1(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1); \ 94 LOAD_MSG_##r##_2(b0, b1); \ 95 G2(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1); \ 97 LOAD_MSG_##r##_3(b0, b1); \ 98 G1(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1); \ [all …]
|
| H A D | blake2b-compress-ssse3.h | 21 #define G1(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1) \ argument 23 row1h = _mm_add_epi64(_mm_add_epi64(row1h, b1), row2h); \ 40 #define G2(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1) \ argument 42 row1h = _mm_add_epi64(_mm_add_epi64(row1h, b1), row2h); \ 92 LOAD_MSG_##r##_1(b0, b1); \ 93 G1(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1); \ 94 LOAD_MSG_##r##_2(b0, b1); \ 95 G2(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1); \ 97 LOAD_MSG_##r##_3(b0, b1); \ 98 G1(row1l, row2l, row3l, row4l, row1h, row2h, row3h, row4h, b0, b1); \ [all …]
|
| /src/usr.bin/mididump/ |
| H A D | mididump.c | 160 uint8_t event, chan, b1, b2; in main() local 190 b1 = read_byte(fd); in main() 192 pn = ¬es[b1 % nitems(notes)]; in main() 194 NOTE2OCTAVE(b1)); in main() 197 "/%s%d", pn->alt, NOTE2OCTAVE(b1)); in main() 202 chan, b1, buf, NOTE2FREQ(b1), b2); in main() 205 b1 = read_byte(fd); in main() 209 chan, b1, b2); in main() 212 b1 = read_byte(fd); in main() 214 if (b1 > nitems(ctls) - 1) in main() [all …]
|
| /src/contrib/gdtoa/ |
| H A D | strtoIg.c | 41 Bigint *b, *b1; local 54 b1 = Balloc(b->k); 55 Bcopy(b1, b); 63 b1 = increment(b1); 66 b1->x[0] = 0; 67 b1->x[nw1] = 1L << nb11; 76 if (b1->wds > nw 77 || (nb1 && b1->x[nw1] & 1L << nb1)) { 80 rshift(b1, 1); 83 if (b1->x[nw1] & 1L << nb11) { [all …]
|
| /src/contrib/libpcap/ |
| H A D | gencode.c | 959 merge(struct block *b0, struct block *b1) in merge() argument 968 *p = b1; in merge() 1029 gen_and(struct block *b0, struct block *b1) in gen_and() argument 1031 backpatch(b0, b1->head); in gen_and() 1033 b1->sense = !b1->sense; in gen_and() 1034 merge(b1, b0); in gen_and() 1035 b1->sense = !b1->sense; in gen_and() 1036 b1->head = b0->head; in gen_and() 1040 gen_or(struct block *b0, struct block *b1) in gen_or() argument 1043 backpatch(b0, b1->head); in gen_or() [all …]
|
| /src/crypto/krb5/src/lib/crypto/builtin/aes/ |
| H A D | aescrypt.c | 101 { uint32_t locals(b0, b1); 118 round(fwd_rnd, b1, b0, kp + 1 * N_COLS); 119 round(fwd_rnd, b0, b1, kp + 2 * N_COLS); 122 round(fwd_rnd, b1, b0, kp + 1 * N_COLS); 123 round(fwd_rnd, b0, b1, kp + 2 * N_COLS); 126 round(fwd_rnd, b1, b0, kp + 1 * N_COLS); 127 round(fwd_rnd, b0, b1, kp + 2 * N_COLS); 128 round(fwd_rnd, b1, b0, kp + 3 * N_COLS); 129 round(fwd_rnd, b0, b1, kp + 4 * N_COLS); 130 round(fwd_rnd, b1, b0, kp + 5 * N_COLS); [all …]
|
| /src/crypto/openssl/fuzz/ |
| H A D | bndiv.c | 25 static BIGNUM *b1; variable 33 b1 = BN_new(); in FuzzerInitialize() 72 OPENSSL_assert(BN_bin2bn(buf, l1, b1) == b1); in FuzzerTestOneInput() 73 BN_set_negative(b1, s1); in FuzzerTestOneInput() 83 OPENSSL_assert(BN_div(b3, b4, b1, b2, ctx)); in FuzzerTestOneInput() 84 if (BN_is_zero(b1)) in FuzzerTestOneInput() 86 else if (BN_is_negative(b1)) in FuzzerTestOneInput() 95 success = success && BN_cmp(b5, b1) == 0; in FuzzerTestOneInput() 97 BN_print_fp(stdout, b1); in FuzzerTestOneInput() 107 printf("%d %d %d %d %d %d %d\n", BN_is_negative(b1), in FuzzerTestOneInput() [all …]
|
| H A D | bignum.c | 35 BIGNUM *b1; in FuzzerTestOneInput() local 41 b1 = BN_new(); in FuzzerTestOneInput() 65 OPENSSL_assert(BN_bin2bn(buf, l1, b1) == b1); in FuzzerTestOneInput() 66 BN_set_negative(b1, s1); in FuzzerTestOneInput() 77 OPENSSL_assert(BN_mod_exp(b4, b1, b2, b3, ctx)); in FuzzerTestOneInput() 78 OPENSSL_assert(BN_mod_exp_simple(b5, b1, b2, b3, ctx)); in FuzzerTestOneInput() 82 BN_print_fp(stdout, b1); in FuzzerTestOneInput() 96 BN_free(b1); in FuzzerTestOneInput()
|
| /src/crypto/openssl/crypto/chacha/asm/ |
| H A D | chacha-c64xplus.pl | 121 my ($b0,$b1,$b2,$b3) = (4..7); 127 ADD @X[$b1],@X[$a1],@X[$a1] 150 XOR @X[$c1],@X[$b1],@X[$b1] 155 ROTL @X[$b1],12,@X[$b1] 162 || ADD @Y[$b1],@Y[$a1],@Y[$a1] 167 || ADD @X[$b1],@X[$a1],@X[$a1] 195 || XOR @Y[$c1],@Y[$b1],@Y[$b1] 201 || XOR @X[$c1],@X[$b1],@X[$b1] 209 || ROTL @Y[$b1],12,@Y[$b1] 211 ROTL @X[$b1],7,@X[$b0] ; avoided cross-path stall [all …]
|
| H A D | chacha-ia64.pl | 102 my ($a1,$b1,$c1,$d1)=map(($_&~3)+(($_+1)&3),($a0,$b0,$c0,$d0)); 103 my ($a2,$b2,$c2,$d2)=map(($_&~3)+(($_+1)&3),($a1,$b1,$c1,$d1)); 108 add @x[$a1]=@x[$a1],@x[$b1] 124 { .mii; xor @x[$b1]=@x[$b1],@x[$c1] 134 extr.u @y[1]=@x[$b1],20,12 135 dep.z @x[$b1]=@x[$b1],12,20 };; 139 { .mii; or @x[$b1]=@x[$b1],@y[1] 144 add @x[$a1]=@x[$a1],@x[$b1] };; 169 { .mmi; xor @x[$b1]=@x[$b1],@x[$c1] 173 extr.u @y[1]=@x[$b1],25,7 [all …]
|
| H A D | chacha-armv4.pl | 66 my ($a1,$b1,$c1,$d1)=map(($_&~3)+(($_+1)&3),($a0,$b0,$c0,$d0)); 67 my ($a2,$b2,$c2,$d2)=map(($_&~3)+(($_+1)&3),($a1,$b1,$c1,$d1)); 101 "&add (@x[$a1],@x[$a1],@x[$b1])", 109 "&mov (@x[$b1],@x[$b1],'ror#20')", 111 "&eor (@x[$b1],@x[$b1],$xc_,'ror#20')", 115 "&add (@x[$a1],@x[$a1],@x[$b1])", 127 "&mov (@x[$b1],@x[$b1],'ror#25')" ); 133 "&eor (@x[$b1],@x[$b1],$xc_,'ror#25')" ); 638 my ($a0,$b0,$c0,$d0,$a1,$b1,$c1,$d1,$a2,$b2,$c2,$d2,$t0,$t1,$t2,$t3) = 707 vmov $b1,$b0 [all …]
|
| /src/share/examples/sound/ |
| H A D | midi.c | 48 unsigned char raw, type, channel, b1, b2; in main() local 62 if (read(fd, &b1, sizeof(b1)) < sizeof(b1)) in main() 70 channel, b1, b2); in main() 74 channel, b1, b2); in main() 78 channel, b1, b2); in main()
|
| /src/sys/cddl/boot/zfs/ |
| H A D | fletcher.c | 32 uint64_t a0, b0, a1, b1; in fletcher_2_native() local 34 for (a0 = b0 = a1 = b1 = 0; ip < ipend; ip += 2) { in fletcher_2_native() 38 b1 += a1; in fletcher_2_native() 41 ZIO_SET_CHECKSUM(zcp, a0, a1, b0, b1); in fletcher_2_native() 50 uint64_t a0, b0, a1, b1; in fletcher_2_byteswap() local 52 for (a0 = b0 = a1 = b1 = 0; ip < ipend; ip += 2) { in fletcher_2_byteswap() 56 b1 += a1; in fletcher_2_byteswap() 59 ZIO_SET_CHECKSUM(zcp, a0, a1, b0, b1); in fletcher_2_byteswap()
|
| /src/contrib/bmake/unit-tests/ |
| H A D | depsrc-wait.mk | 19 .PHONY: x a b b1 24 b: b1 26 b1: 27 echo b1 38 three-by-three: .WAIT 3a1 3a2 3a3 .WAIT 3b1 3b2 3b3 .WAIT 3c1 3c2 3c3 .WAIT 39 3a1 3a2 3a3 3b1 3b2 3b3 3c1 3c2 3c3:
|
| /src/contrib/llvm-project/llvm/lib/Support/ |
| H A D | ConvertUTF.cpp | 451 UTF8 b1, b2, b3; in findMaximalSubpartOfIllFormedUTF8Sequence() local 472 b1 = *source; in findMaximalSubpartOfIllFormedUTF8Sequence() 474 if (b1 >= 0xC2 && b1 <= 0xDF) { in findMaximalSubpartOfIllFormedUTF8Sequence() 488 if (b1 == 0xE0) { in findMaximalSubpartOfIllFormedUTF8Sequence() 491 if (b1 >= 0xE1 && b1 <= 0xEC) { in findMaximalSubpartOfIllFormedUTF8Sequence() 494 if (b1 == 0xED) { in findMaximalSubpartOfIllFormedUTF8Sequence() 497 if (b1 >= 0xEE && b1 <= 0xEF) { in findMaximalSubpartOfIllFormedUTF8Sequence() 500 if (b1 == 0xF0) { in findMaximalSubpartOfIllFormedUTF8Sequence() 510 if (b1 >= 0xF1 && b1 <= 0xF3) { in findMaximalSubpartOfIllFormedUTF8Sequence() 520 if (b1 == 0xF4) { in findMaximalSubpartOfIllFormedUTF8Sequence() [all …]
|
| /src/crypto/openssl/test/testutil/ |
| H A D | format_output.c | 45 char b1[MAX_STRING_WIDTH + 1], b2[MAX_STRING_WIDTH + 1]; in test_fail_string_common() local 72 b1[n1 = l1 > width ? width : l1] = 0; in test_fail_string_common() 74 b1[i] = isprint((unsigned char)m1[i]) ? m1[i] : '.'; in test_fail_string_common() 96 test_printf_stderr("%4u: '%s'\n", cnt, n2 > n1 ? b2 : b1); in test_fail_string_common() 101 test_printf_stderr("%4u:- '%s'\n", cnt, b1); in test_fail_string_common() 272 char b1[MAX_STRING_WIDTH + 1], b2[MAX_STRING_WIDTH + 1]; in test_fail_bignum_common() local 319 n1 = convert_bn_memory(m1, bytes, b1, &lz1, bn1); in test_fail_bignum_common() 325 for (i = 0; b1[i] != '\0'; i++) in test_fail_bignum_common() 326 if (b1[i] == b2[i] || b1[i] == ' ' || b2[i] == ' ') { in test_fail_bignum_common() 328 diff |= b1[i] != b2[i]; in test_fail_bignum_common() [all …]
|
| /src/sys/dev/usb/ |
| H A D | usb_endian.h | 99 #define USETW2(w,b1,b0) do { \ argument 101 (w)[1] = (uint8_t)(b1); \ 104 #define USETW4(w,b3,b2,b1,b0) do { \ argument 106 (w)[1] = (uint8_t)(b1); \ 111 #define USETW8(w,b7,b6,b5,b4,b3,b2,b1,b0) do { \ argument 113 (w)[1] = (uint8_t)(b1); \
|
| /src/lib/libc/softfloat/bits32/ |
| H A D | softfloat-macros | 266 value formed by concatenating `b0' and `b1'. Addition is modulo 2^64, so 273 bits32 a0, bits32 a1, bits32 b0, bits32 b1, bits32 *z0Ptr, bits32 *z1Ptr ) 277 z1 = a1 + b1; 286 96-bit value formed by concatenating `b0', `b1', and `b2'. Addition is 298 bits32 b1, 310 z1 = a1 + b1; 324 Subtracts the 64-bit value formed by concatenating `b0' and `b1' from the 333 bits32 a0, bits32 a1, bits32 b0, bits32 b1, bits32 *z0Ptr, bits32 *z1Ptr ) 336 *z1Ptr = a1 - b1; 337 *z0Ptr = a0 - b0 - ( a1 < b1 ); [all …]
|
| /src/crypto/openssl/test/recipes/15-test_ml_kem_codecs_data/ |
| H A D | prv-768-priv.txt | 14 5d:7a:62:13:03:04:23:5c:b1:ad:48:36:b5:66:b5: 34 b1:b6:87:d2:e0:19:cf:80:36:bc:f9:bf:6e:7b:ac: 38 c0:65:2b:ff:95:b1:ba:e4:42:6d:17:73:b9:cc:2c: 41 8e:88:53:02:b1:ce:47:03:3e:df:76:0f:4e:02:9b: 71 b1:f9:71:00:10:90:87:f9:6e:4b:14:8d:2c:b3:1e: 95 e4:37:2d:c9:b1:99:cf:dc:ac:0b:01:ac:d2:8a:62: 102 28:6b:38:b1:c1:a7:84:70:ba:b9:47:51:89:34:45: 104 fc:39:80:cb:5c:76:5b:d2:bd:5f:7b:36:b1:41:0d: 112 b1:a3:a0:f6:85:74:8a:d5:75:3d:88:80:f0:01:6c: 117 d7:f8:08:57:a7:73:dd:64:b1:50:d2:66:12:ea:9a: [all …]
|
| /src/crypto/openssl/include/openssl/ |
| H A D | byteorder.h | 211 uint16_t b1 = *in++; in OPENSSL_load_u16_le() 213 *val = b0 | (b1 << 8); in OPENSSL_load_u16_le() 228 uint16_t b1 = *in++; in OPENSSL_load_u16_be() 231 *val = b0 | (b1 << 8); in OPENSSL_load_u16_be() 247 uint32_t b1 = *in++; in OPENSSL_load_u32_le() 251 *val = b0 | (b1 << 8) | (b2 << 16) | (b3 << 24); in OPENSSL_load_u32_le() 268 uint32_t b1 = *in++; in OPENSSL_load_u32_be() 271 *val = b0 | (b1 << 8) | (b2 << 16) | (b3 << 24); in OPENSSL_load_u32_be() 287 uint64_t b1 = *in++; in OPENSSL_load_u64_le() 295 *val = b0 | (b1 << 8) | (b2 << 16) | (b3 << 24) in OPENSSL_load_u64_le() [all …]
|