/crypto/fipsmodule/ec/asm/ |
A D | p256-armv8-asm.pl | 201 mov $a1,$acc1 208 mov $t1,$a1 426 mul $t1,$a1,$a1 // a[1]*a[1] 428 umulh $a1,$a1,$a1 657 mov $a1,$acc1 665 mov $acc1,$a1 710 mov $a1,$acc1 716 mov $t1,$a1 749 mov $a1,$acc1 1460 mul $t1,$a1,$a1 // a[1]*a[1] [all …]
|
A D | p256-x86_64-asm.pl | 115 xor $a1, $a1 126 mov $a1, $t1 138 cmovz $t1, $a1 2608 mov $a1, $t1 2670 sbb $a1, $t1 2700 adc $a1, $a1 2841 mov $a1, $t1 2861 shr \$1, $a1 2866 or $t1, $a1 3735 sbb $a1, $t1 [all …]
|
A D | p256_beeu-armv8-asm.pl | 126 my($a0, $a1, $a2, $a3)=map("x$_",(21..24)); 255 mov $a1, $n1 325 ${\SHIFT256($a0, $a1, $a2, $a3)} 343 sbcs $t1, $b1, $a1 351 sbcs $a1, $a1, $b1 387 orr $t0, $t0, $a1
|
/crypto/fipsmodule/bn/asm/ |
A D | armv8-mont.pl | 413 mul $t1,$a5,$a1 415 mul $t2,$a6,$a1 417 mul $t3,$a7,$a1 560 mul $t1,$a1,$n0 656 mul $acc0,$a1,$a1 658 umulh $a1,$a1,$a1 691 mul $a0,$a1,$a1 693 umulh $a1,$a1,$a1 1012 sbcs $a1,$acc1,$a1 1031 csel $a1,$acc1,$a1,lo [all …]
|
A D | bn-armv8.pl | 33 my ($a0, $a1, $b0, $b1, $num_pairs) = ("x4", "x5", "x6", "x7", "x8"); 55 ldp $a0, $a1, [$ap], #16 59 adcs $a1, $a1, $b1 60 stp $a0, $a1, [$rp], #16 94 ldp $a0, $a1, [$ap], #16 98 sbcs $a1, $a1, $b1 99 stp $a0, $a1, [$rp], #16
|
A D | x86_64-mont5.pl | 1314 mov %rax,$a1 1331 mul $a1 # a[2]*a[1] 1350 mul $a1 # a[3]*a[1] 1366 mul $a1 # a[4]*a[3] 1382 mul $a1 # a[5]*a[3] 1399 mul $a1 # a[6]*a[5] 1419 mul $a1 # a[7]*a[5] 1438 mov %rax,$a1 1460 mul $a1 # a[2]*a[1] 1483 mul $a1 # a[3]*a[1] [all …]
|
A D | x86_64-mont.pl | 799 my ($a0,$a1,$ai)=("%r14","%r15","%rbx");
|
/crypto/chacha/asm/ |
A D | chacha-armv4.pl | 106 "&add (@x[$a1],@x[$a1],@x[$b1])", 120 "&add (@x[$a1],@x[$a1],@x[$b1])", 673 vmov $a1,$a0 685 vmov $a1,$a0 753 vadd.i32 $a1,$a1,$t0 785 veor $a1,$a1,$t0 801 vst1.8 {$a1-$b1},[r14]! 989 vst1.8 {$a1-$b1},[sp] 1006 veor $a1,$a1,$t0 1012 vst1.8 {$a1-$b1},[r14]! [all …]
|
A D | chacha-x86_64.pl | 169 "&add (@x[$a1],@x[$b1])", # Q2 170 "&xor (@x[$d1],@x[$a1])", 183 "&add (@x[$a1],@x[$b1])", 184 "&xor (@x[$d1],@x[$a1])", 610 "&pxor (@x[$d1],@x[$a1])", 629 "&paddd (@x[$a1],@x[$b1])", 631 "&pxor (@x[$d1],@x[$a1])", 1184 "&vpaddd (@x[$a1],@x[$a1],@x[$b1])", # Q2 1203 "&vpaddd (@x[$a1],@x[$a1],@x[$b1])", 2029 "&vpaddd (@x[$a1],@x[$a1],@x[$b1])", # Q2 [all …]
|
A D | chacha-armv8.pl | 68 my ($a1,$b1,$c1,$d1)=map(($_&~3)+(($_+1)&3),($a0,$b0,$c0,$d0)); 69 my ($a2,$b2,$c2,$d2)=map(($_&~3)+(($_+1)&3),($a1,$b1,$c1,$d1)); 74 "&add_32 (@x[$a1],@x[$a1],@x[$b1])", 78 "&eor_32 (@x[$d1],@x[$d1],@x[$a1])", 100 "&add_32 (@x[$a1],@x[$a1],@x[$b1])", 104 "&eor_32 (@x[$d1],@x[$d1],@x[$a1])",
|
/crypto/fipsmodule/aes/ |
A D | gcm_nohw.cc.inc | 44 uint64_t a1 = a & UINT64_C(0x2222222222222220); 132 uint32_t a1 = a >> 32; 137 __m128i hi = gcm_mul32_nohw(a1, b1); 138 __m128i mid = gcm_mul32_nohw(a0 ^ a1, b0 ^ b1); 155 uint32_t a1 = a & 0x22222222; 164 uint64_t c0 = (a0 * (uint64_t)b0) ^ (a1 * (uint64_t)b3) ^ 166 uint64_t c1 = (a0 * (uint64_t)b1) ^ (a1 * (uint64_t)b0) ^ 168 uint64_t c2 = (a0 * (uint64_t)b2) ^ (a1 * (uint64_t)b1) ^ 170 uint64_t c3 = (a0 * (uint64_t)b3) ^ (a1 * (uint64_t)b2) ^ 182 uint32_t a1 = a >> 32; [all …]
|
A D | aes_nohw.cc.inc | 353 uint64_t a1 = aes_nohw_compact_word(out[1]); 358 uint32_t a1 = aes_nohw_compact_word(out[1]); 379 uint64_t a1 = in[1]; 388 uint32_t a1 = in[1]; 659 aes_word_t a1 = batch->w[1]; 766 aes_word_t a1 = batch->w[1]; 776 aes_word_t r1 = aes_nohw_rotate_rows_down(a1); 777 aes_word_t a1_r1 = aes_nohw_xor(a1, r1); 814 aes_word_t a1 = batch->w[1]; 837 // b3 = a1 ^ a6 [all …]
|
A D | aes_test.cc | 412 uint32_t a1 = aes_ref_sub_byte(in >> 8); in aes_ref_sub_word() local 415 return a0 | (a1 << 8) | (a2 << 16) | (a3 << 24); in aes_ref_sub_word()
|
/crypto/fipsmodule/sha/asm/ |
A D | sha512-x86_64.pl | 197 xor $a,$a1 210 xor $a,$a1 242 mov $a2,$a1 248 xor $a1,$a2 259 mov $a,$a1 827 mov $A,$a1 1055 mov $a1,$A 1195 mov $A,$a1 1575 xor $a1,$a1 1671 xor $a1,$a1 [all …]
|
/crypto/hrss/ |
A D | hrss_test.cc | 38 static void poly3_word_add(crypto_word_t *s1, crypto_word_t *a1, in poly3_word_add() argument 41 *s1 = t & (s2 ^ *a1); in poly3_word_add() 42 *a1 = (*a1 ^ a2) | (t ^ s2); in poly3_word_add()
|
A D | hrss.cc | 448 const crypto_word_t s1, const crypto_word_t a1, in poly3_word_mul() argument 450 *out_a = a1 & a2; in poly3_word_mul() 456 const crypto_word_t s1, const crypto_word_t a1, in poly3_word_add() argument 459 *out_s = t & (s2 ^ a1); in poly3_word_add() 460 *out_a = (a1 ^ a2) | (t ^ s2); in poly3_word_add() 465 const crypto_word_t s1, const crypto_word_t a1, in poly3_word_sub() argument 467 const crypto_word_t t = a1 ^ a2; in poly3_word_sub()
|
/crypto/bn/ |
A D | exponentiation.cc | 140 int BN_mod_exp2_mont(BIGNUM *rr, const BIGNUM *a1, const BIGNUM *p1, in BN_mod_exp2_mont() argument 158 !BN_mod_exp_mont(rr, a1, p1, m, ctx, mont) || in BN_mod_exp2_mont()
|
/crypto/curve25519/ |
A D | curve25519.cc | 1384 int64_t a1 = 2097151 & (load_4(a + 2) >> 5); in sc_muladd() local 1468 s1 = c1 + a0 * b1 + a1 * b0; in sc_muladd() 1469 s2 = c2 + a0 * b2 + a1 * b1 + a2 * b0; in sc_muladd() 1470 s3 = c3 + a0 * b3 + a1 * b2 + a2 * b1 + a3 * b0; in sc_muladd() 1471 s4 = c4 + a0 * b4 + a1 * b3 + a2 * b2 + a3 * b1 + a4 * b0; in sc_muladd() 1472 s5 = c5 + a0 * b5 + a1 * b4 + a2 * b3 + a3 * b2 + a4 * b1 + a5 * b0; in sc_muladd() 1474 s7 = c7 + a0 * b7 + a1 * b6 + a2 * b5 + a3 * b4 + a4 * b3 + a5 * b2 + in sc_muladd() 1476 s8 = c8 + a0 * b8 + a1 * b7 + a2 * b6 + a3 * b5 + a4 * b4 + a5 * b3 + in sc_muladd() 1478 s9 = c9 + a0 * b9 + a1 * b8 + a2 * b7 + a3 * b6 + a4 * b5 + a5 * b4 + in sc_muladd() 1480 s10 = c10 + a0 * b10 + a1 * b9 + a2 * b8 + a3 * b7 + a4 * b6 + a5 * b5 + in sc_muladd() [all …]
|
/crypto/cipher/asm/ |
A D | chacha20_poly1305_armv8.pl | 216 my ($a0,$a1,$a2,$a3) = $dir =~ /left/ ? ($A0,$A1,$A2,$A3) : ($A0,$A1,$A2,$A3); 223 add $a1.4s, $a1.4s, $b1.4s 229 eor $d1.16b, $d1.16b, $a1.16b 264 add $a1.4s, $a1.4s, $b0.4s 270 eor $d1.16b, $d1.16b, $a1.16b
|
/crypto/ |
A D | abi_self_test.cc | 24 static int TestFunction(int a1, int a2, int a3, int a4, int a5, int a6, int a7, in TestFunction() argument 26 test_function_ok = a1 == 1 || a2 == 2 || a3 == 3 || a4 == 4 || a5 == 5 || in TestFunction()
|
/crypto/fipsmodule/aes/asm/ |
A D | bsaes-armv7.pl | 677 my ($a0,$b0,$a1,$b1,$n,$mask,$t0,$t1)=@_; 682 veor $t1, $t1, $a1 687 veor $a1, $a1, $t1
|
/crypto/trust_token/ |
A D | voprf.cc | 294 const EC_AFFINE *a1, const EC_AFFINE *a2, in hash_to_scalar_challenge() argument 305 !cbb_serialize_point(&cbb, group, a1) || in hash_to_scalar_challenge()
|
/crypto/cipher/test/nist_cavp/ |
A D | aes_128_gcm.txt | 28436 NONCE: a1 32026 NONCE: a1 33802 NONCE: a1 36332 NONCE: a1 36384 NONCE: a1 40595 NONCE: a1 82335 NONCE: a1 83833 NONCE: a1 84806 NONCE: a1 87914 NONCE: a1 [all …]
|
A D | aes_256_gcm.txt | 22826 NONCE: a1 23098 NONCE: a1 30640 NONCE: a1 82760 NONCE: a1 86736 NONCE: a1 87156 NONCE: a1 89361 NONCE: a1 90684 NONCE: a1 91923 NONCE: a1 92952 NONCE: a1 [all …]
|