/external/chromium_org/third_party/openssl/openssl/crypto/sha/asm/ |
sha512-586.pl | 55 $K512="ebp"; 91 &paddq ("mm7",QWP(0,$K512)); # h+=K512[i] 132 &mov (&LB("edx"),&BP(0,$K512)); 134 &add ($K512,8); 188 &mov ("esi",&DWP(0,$K512)); 189 &mov ("edi",&DWP(4,$K512)); # K[i] 258 &mov (&LB("edx"),&BP(0,$K512)); # pre-fetch LSB of *K 260 &lea ($K512,&DWP(8,$K512)); # K+ [all...] |
sha512-armv4.pl | 179 .type K512,%object 181 K512: 222 .size K512,.-K512 239 sub $Ktbl,r3,#672 @ K512 543 sub $Ktbl,r3,#672 @ K512 564 sub $Ktbl,#640 @ rewind K512
|
sha512-ia64.pl | 74 $TABLE="K512"; 468 { .mib; add T1=T1,K // T1=Ch(e,f,g)+h+K512[i] 545 { .mib; add T1=T1,K // T1=Ch(e,f,g)+h+K512[i] 629 .type K512#,\@object 630 K512: data8 0x428a2f98d728ae22,0x7137449123ef65cd 670 .size K512#,$SZ*$rounds
|
sha512-armv4.S | 14 .type K512,%object 16 K512: 57 .size K512,.-K512 74 sub r14,r3,#672 @ K512 447 sub r3,r3,#672 @ K512 [all...] |
sha512-x86_64.S | 24 leaq K512(%rip),%rbp 1761 .type K512,@object 1762 K512:
|
sha512-x86_64.pl | 59 $TABLE="K512";
|
/external/openssl/crypto/sha/asm/ |
sha512-586.pl | 55 $K512="ebp"; 91 &paddq ("mm7",QWP(0,$K512)); # h+=K512[i] 132 &mov (&LB("edx"),&BP(0,$K512)); 134 &add ($K512,8); 188 &mov ("esi",&DWP(0,$K512)); 189 &mov ("edi",&DWP(4,$K512)); # K[i] 258 &mov (&LB("edx"),&BP(0,$K512)); # pre-fetch LSB of *K 260 &lea ($K512,&DWP(8,$K512)); # K+ [all...] |
sha512-armv4.pl | 179 .type K512,%object 181 K512: 222 .size K512,.-K512 239 sub $Ktbl,r3,#672 @ K512 543 sub $Ktbl,r3,#672 @ K512 564 sub $Ktbl,#640 @ rewind K512
|
sha512-ia64.pl | 74 $TABLE="K512"; 468 { .mib; add T1=T1,K // T1=Ch(e,f,g)+h+K512[i] 545 { .mib; add T1=T1,K // T1=Ch(e,f,g)+h+K512[i] 629 .type K512#,\@object 630 K512: data8 0x428a2f98d728ae22,0x7137449123ef65cd 670 .size K512#,$SZ*$rounds
|
sha512-armv8.S | 24 adr x30,K512 972 .type K512,%object 973 K512: 1015 .size K512,.-K512
|
sha512-armv4.S | 14 .type K512,%object 16 K512: 57 .size K512,.-K512 74 sub r14,r3,#672 @ K512 447 sub r3,r3,#672 @ K512 [all...] |
sha512-x86_64.S | 24 leaq K512(%rip),%rbp 1761 .type K512,@object 1762 K512:
|
sha512-x86_64.pl | 59 $TABLE="K512";
|
/external/llvm/test/CodeGen/X86/ |
2009-04-16-SpillerUnfold.ll | 10 @K512 = external constant [80 x i64], align 32 ; <[80 x i64]*> [#uses=2] 74 %49 = getelementptr [80 x i64]* @K512, i64 0, i64 0 ; <i64*> [#uses=1] 108 %78 = getelementptr [80 x i64]* @K512, i64 0, i64 0 ; <i64*> [#uses=1]
|
/external/chromium_org/third_party/openssl/openssl/crypto/sha/ |
sha512.c | 264 static const SHA_LONG64 K512[80] = { 425 T += F[7] + Sigma1(E) + Ch(E,F[5],F[6]) + K512[i]; 439 T += F[7] + Sigma1(E) + Ch(E,F[5],F[6]) + K512[i]; 474 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; 486 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; 502 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; \
|
/external/openssl/crypto/sha/ |
sha512.c | 271 static const SHA_LONG64 K512[80] = { 432 T += F[7] + Sigma1(E) + Ch(E,F[5],F[6]) + K512[i]; 446 T += F[7] + Sigma1(E) + Ch(E,F[5],F[6]) + K512[i]; 481 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; 493 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; 509 T1 += h + Sigma1(e) + Ch(e,f,g) + K512[i]; \
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
sha2.c | 259 const static sha2_word64 K512[80] = { 679 K512[j] + W512[j]; \ 689 K512[j] + (W512[j] = *data++); \ 701 T1 = (h) + Sigma1_512(e) + Ch((e), (f), (g)) + K512[j] + \ 783 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j]; 786 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + (W512[j] = *data++); 809 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + [all...] |
/external/chromium_org/crypto/third_party/nss/ |
sha512.cc | 570 /* SHA-384 and SHA-512 constants, K512. */ 571 static const PRUint64 K512[80] = { 726 h += S1(e) + Ch(e,f,g) + K512[n] + W[n]; \ 776 lo += (tm = K512[n].lo); if (lo < tm) cy++; \ 779 h.hi += cy + S1hi(e) + Chxx(e,f,g,hi) + K512[n].hi + W[n].hi; \ [all...] |