/barrelfish-master/lib/openssl-1.0.0d/crypto/sha/asm/ |
H A D | sha512-armv4.pl | 43 $t0="r9"; 69 mov $t0,$Elo,lsr#14 71 eor $t0,$t0,$Ehi,lsl#18 73 eor $t0,$t0,$Elo,lsr#18 75 eor $t0,$t0,$Ehi,lsl#14 77 eor $t0,$t0, [all...] |
H A D | sha1-armv4-large.pl | 63 $t0="r9"; 73 ldr $t0,[$Xi,#15*4] 78 eor $t0,$t0,$t1 81 mov $t0,$t0,ror#31 83 eor $t0,$t0,$t2,ror#31 86 add $e,$e,$t0 @ E+=X[i] 87 str $t0,[ [all...] |
H A D | sha256-armv4.pl | 24 $ctx="r0"; $t0="r0"; 52 ldrb $t0,[$inp],#4 55 orr $T1,$T1,$t0,lsl#24 60 mov $t0,$e,ror#$Sigma1[0] 62 eor $t0,$t0,$e,ror#$Sigma1[1] 64 eor $t0,$t0,$e,ror#$Sigma1[2] @ Sigma1(e) 66 add $T1,$T1,$t0 74 orr $t0, [all...] |
H A D | sha1-s390x.pl | 40 $t0="%r10"; 84 lr $t0,$d 85 xr $t0,$c 87 nr $t0,$b 89 xr $t0,$d 91 alr $e,$t0 103 lr $t0,$b 105 xr $t0,$c 107 xr $t0,$d 109 alr $e,$t0 [all...] |
H A D | sha1-x86_64.pl | 55 $t0="%ebx"; 117 mov $c,$t0 120 xor $d,$t0 123 and $b,$t0 126 xor $d,$t0 128 add $t0,$f 133 mov $c,$t0 136 xor $d,$t0 139 and $b,$t0 142 xor $d,$t0 [all...] |
H A D | sha1-thumb.pl | 28 $t0="r0"; 44 sub $t0,#4 45 ldr $t1,[$t0] 169 ldmia $t0!,{$a,$b,$c,$d,$e} @ $t0 is r0 and holds ctx 170 mov $t0,$Xi 173 mov $t1,$t0 181 cmp $Xi,$t0 185 mov $t1,$t0 193 cmp $Xi,$t0 [all...] |
H A D | sha1-ppc.pl | 54 $t0 ="r15"; 79 and $t0,$c,$b 83 or $t0,$t0,$t1 84 add $f,$f,$t0 91 and $t0,$c,$b 96 or $t0,$t0,$t1 98 add $f,$f,$t0 111 xor $t0, [all...] |
H A D | sha512-s390x.pl | 29 $t0="%r0"; 90 $ROT $t0,$e,$Sigma1[0] 93 xgr $t0,$t1 97 xgr $t0,$t1 # Sigma1(e) 101 algr $T1,$t0 # T1+=Sigma1(e) 105 $ROT $t0,$a,$Sigma0[1] 108 xgr $h,$t0 111 $ROT $t0,$t0,`$Sigma0[2]-$Sigma0[1]` 112 xgr $h,$t0 # [all...] |
H A D | sha512-ppc.pl | 96 $num="r5"; # zapped by $t0 101 $t0 ="r5"; 126 and $t0,$f,$e 131 or $t0,$t0,$t1 ; Ch(e,f,g) 134 add $T,$T,$t0 139 and $t0,$a,$b 143 xor $t0,$t0,$t1 147 xor $t0, [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/des/ |
H A D | qud_cksm.c | 79 DES_LONG z0,z1,t0,t1; local 107 t0= (DES_LONG)(*(cp++)); 108 t0|=(DES_LONG)Q_B1(*(cp++)); 112 t0= (DES_LONG)(*(cp++)); 115 t0+=z0; 116 t0&=0xffffffffL; 119 z0=((((t0*t0)&0xffffffffL)+((t1*t1)&0xffffffffL)) 121 z1=((t0*((t1+NOISE)&0xffffffffL))&0xffffffffL)%0x7fffffffL;
|
H A D | ede_cbcm_enc.c | 141 register DES_LONG t0,t1; local 158 t0=tin0; 184 xor0=t0;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/seed/ |
H A D | seed.c | 199 seed_word t0, t1; local 206 t0 = (x1 + x3 - KC0) & 0xffffffff; 207 t1 = (x2 - x4 + KC0) & 0xffffffff; KEYUPDATE_TEMP(t0, t1, &ks->data[0]); 208 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC1); KEYUPDATE_TEMP(t0, t1, &ks->data[2]); 211 KEYSCHEDULE_UPDATE0(t0, t1, x1, x2, x3, x4, KC2); KEYUPDATE_TEMP(t0, t1, &ks->data[4]); 212 KEYSCHEDULE_UPDATE1(t0, t1, x1, x2, x3, x4, KC3); KEYUPDATE_TEMP(t0, t1, &ks->data[6]); 213 KEYSCHEDULE_UPDATE0(t0, t 241 seed_word t0, t1; local 284 seed_word t0, t1; local [all...] |
/barrelfish-master/lib/libc/riscv/ |
H A D | SYS.h | 42 li t0, SYS_ ## name; \ 57 bnez t0, cerror; \ 66 bnez t0, cerror; \
|
/barrelfish-master/lib/libc/riscv/gen/ |
H A D | _setjmp.S | 42 la t0, .Lmagic 43 ld t0, 0(t0) 44 sd t0, (0 * 8)(a0) 94 ld t0, 0(a0) 97 bne t0, t1, botch 100 ld t0, 8(a0) 101 mv sp, t0
|
H A D | setjmp.S | 56 la t0, .Lmagic 57 ld t0, 0(t0) 58 sd t0, (0 * 8)(a0) 122 ld t0, 0(a0) 125 bne t0, t1, botch 128 ld t0, 8(a0) 129 mv sp, t0
|
/barrelfish-master/lib/libc/riscv/sys/ |
H A D | vfork.S | 45 bnez t0, cerror
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/asm/ |
H A D | aes-sparcv9.pl | 59 $t0="%l4"; 194 ld [$key+0],$t0 198 xor $t0,$s0,$s0 202 ld [$key+16],$t0 266 xor $acc0,$t0,$t0 270 xor $acc1,$t0,$t0 273 xor $acc2,$t0,$t0 [all...] |
H A D | aes-s390x.pl | 55 $t0="%r0"; $mask="%r0"; 385 l $t0,16($key) 401 xr $s0,$t0 708 l $t0,16($key) 723 xr $s0,$t0 739 lghi $t0,0 740 clgr $inp,$t0 742 clgr $key,$t0 745 lghi $t0,128 746 clr $bits,$t0 [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/ |
H A D | aes_core.c | 785 u32 s0, s1, s2, s3, t0, t1, t2, t3; local 803 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; 808 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; 809 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9]; 810 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; 811 s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; 813 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; 818 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16]; 819 s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17]; 820 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 976 u32 s0, s1, s2, s3, t0, t1, t2, t3; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/idea/ |
H A D | idea_lcl.h | 205 t0=(x1^x3)&0xffff; \ 206 idea_mul(t0,t0,*p,ul); p++; \ 207 t1=(t0+(x2^x4))&0xffff; \ 209 t0+=t1; \ 211 x4^=t0; \ 212 ul=x2^t0; /* do the swap to x3 */ \
|
H A D | i_cbc.c | 139 register unsigned long x1,x2,x3,x4,t0,t1,ul; local 160 t0= x3+ *(p++); 166 d[0]=(t0&0xffff)|((x1&0xffff)<<16);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/bn/asm/ |
H A D | ppc64-mont.pl | 98 $t0="r16"; # temporary registers 247 extrdi $t0,$t3,16,48 251 std $t0,`$FRAME+0`($sp) 264 lwz $t0,4($ap) ; load a[j] as 32-bit word pair 280 std $t0,`$FRAME+64`($sp) 381 lwz $t0,4($ap) ; load a[j] as 32-bit word pair 389 std $t0,`$FRAME+64`($sp) 397 ld $t0,`$FRAME+0`($sp) 445 add $t0,$t0, [all...] |
H A D | mips3.s | 70 ld t0,0(a1) 82 dmultu t0,a3 93 mfhi t0 95 daddu v0,t0 141 ld t0,0(a1) 144 ld t0,0(a1) 151 dmultu t0,a3 157 mfhi t0 159 daddu v0,t0 165 ld t0, [all...] |
/barrelfish-master/usr/monitor/ |
H A D | trace_support.c | 43 uint64_t t0; member in struct:trace_measure_time_state 112 static void trace_intermon_measure_recv(struct intermon_binding *ib, coreid_t origin_core, uint64_t t0) argument 124 state->t0 = t0; 139 err = ib->tx_vtbl.trace_measure_ack(ib, MKCONT(free, state), state->origin_core, state->t0, state->t1, rdtsc()); 157 static void trace_intermon_measure_ack_recv(struct intermon_binding* ib, coreid_t origin_core, uint64_t t0, uint64_t t1, uint64_t t2) argument 161 printf("NTP result: %" PRIu64 " %" PRIu64 " %" PRIu64 " %" PRIu64 "\n", t0,t1,t2,t3); 164 int64_t offset = (((t1-t0)+(t2-t3))/2);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/camellia/asm/ |
H A D | cmll-x86_64.pl | 50 $t0="%eax";$t1="%ebx";$t2="%ecx";$t3="%edx"; 77 xor $s0,$t0 # t0^=key[0] 79 movz `&hi("$t0")`,$i0 # (t0>>8)&0xff 83 movz `&lo("$t0")`,$i0 # (t0>>0)&0xff 84 shr \$16,$t0 89 movz `&hi("$t0")`,$i0 # (t0>>2 [all...] |