/external/chromium_org/third_party/openssl/openssl/crypto/sha/asm/ |
sha512-586.pl | 55 $K512="ebp"; 91 &paddq ("mm7",QWP(0,$K512)); # h+=K512[i] 132 &mov (&LB("edx"),&BP(0,$K512)); 134 &add ($K512,8); 188 &mov ("esi",&DWP(0,$K512)); 189 &mov ("edi",&DWP(4,$K512)); # K[i] 258 &mov (&LB("edx"),&BP(0,$K512)); # pre-fetch LSB of *K 260 &lea ($K512,&DWP(8,$K512)); # K+ [all...] |
sha512-armv4.pl | 179 .type K512,%object 181 K512: 222 .size K512,.-K512 239 sub $Ktbl,r3,#672 @ K512 543 sub $Ktbl,r3,#672 @ K512 564 sub $Ktbl,#640 @ rewind K512
|
sha512-armv4.S | 14 .type K512,%object 16 K512: 57 .size K512,.-K512 74 sub r14,r3,#672 @ K512 447 sub r3,r3,#672 @ K512 [all...] |
sha512-x86_64.S | 24 leaq K512(%rip),%rbp 1761 .type K512,@object 1762 K512:
|
/external/openssl/crypto/sha/asm/ |
sha512-586.pl | 55 $K512="ebp"; 91 &paddq ("mm7",QWP(0,$K512)); # h+=K512[i] 132 &mov (&LB("edx"),&BP(0,$K512)); 134 &add ($K512,8); 188 &mov ("esi",&DWP(0,$K512)); 189 &mov ("edi",&DWP(4,$K512)); # K[i] 258 &mov (&LB("edx"),&BP(0,$K512)); # pre-fetch LSB of *K 260 &lea ($K512,&DWP(8,$K512)); # K+ [all...] |
sha512-armv4.pl | 179 .type K512,%object 181 K512: 222 .size K512,.-K512 239 sub $Ktbl,r3,#672 @ K512 543 sub $Ktbl,r3,#672 @ K512 564 sub $Ktbl,#640 @ rewind K512
|
sha512-armv4.S | 14 .type K512,%object 16 K512: 57 .size K512,.-K512 74 sub r14,r3,#672 @ K512 447 sub r3,r3,#672 @ K512 [all...] |
sha512-x86_64.S | 24 leaq K512(%rip),%rbp 1761 .type K512,@object 1762 K512:
|
/external/chromium_org/third_party/openssl/openssl/crypto/sha/ |
sha512.c | 264 static const SHA_LONG64 K512[80] = { 425 T += F[7] + Sigma1(E) + Ch(E,F[5],F[6]) + K512[i]; 439 T += F[7] + Sigma1(E) + Ch(E,F[5],F[6]) + K512[i]; 474 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; 486 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; 502 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; \
|
/external/openssl/crypto/sha/ |
sha512.c | 264 static const SHA_LONG64 K512[80] = { 425 T += F[7] + Sigma1(E) + Ch(E,F[5],F[6]) + K512[i]; 439 T += F[7] + Sigma1(E) + Ch(E,F[5],F[6]) + K512[i]; 474 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; 486 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; 502 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; \
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
sha2.c | 259 const static sha2_word64 K512[80] = { 679 K512[j] + W512[j]; \ 689 K512[j] + (W512[j] = *data++); \ 701 T1 = (h) + Sigma1_512(e) + Ch((e), (f), (g)) + K512[j] + \ 783 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j]; 786 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + (W512[j] = *data++); 809 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + [all...] |
/external/openssh/openbsd-compat/ |
sha2.c | 212 const static u_int64_t K512[80] = { 579 T1 = (h) + Sigma1_512((e)) + Ch((e), (f), (g)) + K512[j] + W512[j]; \ 591 T1 = (h) + Sigma1_512((e)) + Ch((e), (f), (g)) + K512[j] + \ 678 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j]; 700 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] +
|
/external/chromium/crypto/third_party/nss/ |
sha512.cc | 570 /* SHA-384 and SHA-512 constants, K512. */ 571 static const PRUint64 K512[80] = { 726 h += S1(e) + Ch(e,f,g) + K512[n] + W[n]; \ 776 lo += (tm = K512[n].lo); if (lo < tm) cy++; \ 779 h.hi += cy + S1hi(e) + Chxx(e,f,g,hi) + K512[n].hi + W[n].hi; \ [all...] |
/external/chromium_org/crypto/third_party/nss/ |
sha512.cc | 570 /* SHA-384 and SHA-512 constants, K512. */ 571 static const PRUint64 K512[80] = { 726 h += S1(e) + Ch(e,f,g) + K512[n] + W[n]; \ 776 lo += (tm = K512[n].lo); if (lo < tm) cy++; \ 779 h.hi += cy + S1hi(e) + Chxx(e,f,g,hi) + K512[n].hi + W[n].hi; \ [all...] |