/external/boringssl/src/crypto/modes/asm/ |
ghash-x86_64.pl | 125 $Xi="%rdi"; 236 movzb 15($Xi),$Zlo 239 &loop ($Xi); 241 mov $Zlo,8($Xi) 242 mov $Zhi,($Xi) 305 &mov ($Zlo,"8($Xi)"); 306 &mov ($Zhi,"0($Xi)"); 316 &mov ("($Xi)",$Zhi); 317 &mov ("8($Xi)","%rdx"); 352 &mov ($dat,"$j($Xi)") if (--$j%4==0) [all...] |
ghash-x86.pl | 265 &mov ($inp,&wparam(0)); # load Xi 268 &mov ($Zhh,&DWP(0,$inp)); # load Xi[16] 275 &mov (&DWP(0,"esp"),$Zhh); # copy Xi[16] on stack 298 &mov ($Zll,&wparam(0)); # load Xi 305 &mov ($Zhh,&DWP(0,$Zll)); # load Xi[16] 336 &mov ($inp,&wparam(0)); # load Xi 426 &mov ($inp,&wparam(0)); # load Xi 438 &mov ($inp,&wparam(0)); # load Xi 450 &mov ($Zhh,&wparam(0)); # load Xi 464 &mov ($Zll,&DWP(12,$Zhh)); # load Xi[16 [all...] |
aesni-gcm-x86_64.pl | 71 $Z0,$Z1,$Z2,$Z3,$Xi) = map("%xmm$_",(0..8)); 128 vpxor $Z0,$Xi,$Xi # modulo-scheduled 139 vpxor 16+8(%rsp),$Xi,$Xi # modulo-scheduled [vpxor $Z3,$Xi,$Xi] 203 vpxor 0x70+8(%rsp),$Xi,$Xi # accumulate I[0] 217 vpclmulqdq \$0x10,$Hkey,$Xi,$Z [all...] |
ghashv8-armx.pl | 45 $Xi="x0"; # argument block 131 # void gcm_gmult_v8(u64 Xi[2],const u128 Htable[16]); 133 # input: Xi - current hash value; 135 # output: Xi - next hash value Xi; 142 vld1.64 {$t1},[$Xi] @ load Xi 151 vpmull.p64 $Xl,$H,$IN @ H.lo?Xi.lo 153 vpmull2.p64 $Xh,$H,$IN @ H.hi?Xi.hi 154 vpmull.p64 $Xm,$Hhl,$t1 @ (H.lo+H.hi)?(Xi.lo+Xi.hi [all...] |
ghash-armv4.pl | 89 $Xi="r0"; # argument block 117 str $_,[$Xi,#$i] 119 str $_,[$Xi,#$i] 122 strb $_,[$Xi,#$i+3] 124 strb $Tlh,[$Xi,#$i+2] 126 strb $Thl,[$Xi,#$i+1] 127 strb $Thh,[$Xi,#$i] 179 ldrb $nhi,[$Xi,#15] 197 ldrb $nhi,[$Xi,#14] 230 ldrbpl $Tll,[$Xi,$cnt [all...] |
/external/boringssl/src/crypto/modes/ |
gcm.c | 152 static void gcm_gmult_4bit(uint64_t Xi[2], const u128 Htable[16]) { 161 nlo = ((const uint8_t *)Xi)[15]; 185 nlo = ((const uint8_t *)Xi)[cnt]; 204 Xi[0] = BSWAP8(Z.hi); 205 Xi[1] = BSWAP8(Z.lo); 207 uint8_t *p = (uint8_t *)Xi; 219 Xi[0] = Z.hi; 220 Xi[1] = Z.lo; 229 static void gcm_ghash_4bit(uint64_t Xi[2], const u128 Htable[16], const uint8_t *inp, 241 nlo = ((const uint8_t *)Xi)[15] [all...] |
internal.h | 162 } Yi, EKi, EK0, len, Xi, H; 164 /* Relative position of Xi, H and pre-computed Htable is used in some 167 void (*gmult)(uint64_t Xi[2], const u128 Htable[16]); 168 void (*ghash)(uint64_t Xi[2], const u128 Htable[16], const uint8_t *inp,
|
/external/boringssl/src/crypto/sha/asm/ |
sha1-586.pl | 169 # with xi, also note that e becomes 174 &lea($tmp1,&DWP(0x5a827999,$tmp1,$e)); # tmp1+=K_00_19+xi 190 &xor($f,&swtmp(($n+2)%16)); # f to hold Xupdate(xi,xa,xb,xc,xd) 200 &mov(&swtmp($n%16),$f); # xi=f 207 &xor($f,&swtmp(($n+2)%16)); # f to hold Xupdate(xi,xa,xb,xc,xd) 217 &mov(&swtmp($n%16),$f); # xi=f 234 &xor($f,&swtmp(($n+2)%16)); # f to hold Xupdate(xi,xa,xb,xc,xd) 242 &mov(&swtmp($n%16),$f) if($n<77);# xi=f 252 &xor($f,&swtmp(($n+2)%16)); # f to hold Xupdate(xi,xa,xb,xc,xd) 262 &mov(&swtmp($n%16),$f) if($n<77);# xi= [all...] |
sha1-armv4-large.pl | 99 $Xi="r14"; 105 ldr $t0,[$Xi,#15*4] 106 ldr $t1,[$Xi,#13*4] 107 ldr $t2,[$Xi,#7*4] 109 ldr $t3,[$Xi,#2*4] 116 str $t0,[$Xi,#-4]! 149 str $t0,[$Xi,#-4]! 208 mov $Xi,sp 219 teq $Xi,sp 238 teq $Xi,sp @ preserve carr [all...] |
sha1-x86_64.pl | 132 @xi=("%edx","%ebp","%r14d"); 145 mov `4*$i`($inp),$xi[0] 146 bswap $xi[0] 149 mov `4*$j`($inp),$xi[1] 151 mov $xi[0],`4*$i`(%rsp) 153 bswap $xi[1] 157 lea 0x5a827999($xi[0],$e),$e 164 xor `4*($j%16)`(%rsp),$xi[1] 166 mov $xi[0],`4*($i%16)`(%rsp) 168 xor `4*(($j+2)%16)`(%rsp),$xi[1 [all...] |
/external/boringssl/linux-arm/crypto/modes/ |
ghashv8-armx.S | 60 vld1.64 {q9},[r0] @ load Xi 69 .byte 0x86,0x0e,0xa8,0xf2 @ pmull q0,q12,q3 @ H.lo?Xi.lo 71 .byte 0x87,0x4e,0xa9,0xf2 @ pmull2 q2,q12,q3 @ H.hi?Xi.hi 72 .byte 0xa2,0x2e,0xaa,0xf2 @ pmull q1,q13,q9 @ (H.lo+H.hi)?(Xi.lo+Xi.hi) 93 vst1.64 {q0},[r0] @ write out Xi 102 vld1.64 {q0},[r0] @ load [rotated] Xi 122 vext.8 q0,q0,q0,#8 @ rotate Xi 136 veor q3,q3,q0 @ I[i]^=Xi 146 .byte 0x86,0x0e,0xac,0xf2 @ pmull q0,q14,q3 @ H^2.lo?Xi.l [all...] |
ghash-armv4.S | 350 vld1.64 d7,[r0]! @ load Xi 369 vld1.64 d1,[r0]! @ load Xi 386 veor q3,q0 @ inp^=Xi 529 vst1.64 d1,[r0]! @ write out Xi
|
/external/eigen/Eigen/src/Core/products/ |
SelfadjointMatrixVector.h | 131 Packet Xi = pload <Packet>(resIt); 133 Xi = pcj0.pmadd(A0i,ptmp0, pcj0.pmadd(A1i,ptmp1,Xi)); 136 pstore(resIt,Xi); resIt += PacketSize;
|
/external/boringssl/src/crypto/cipher/ |
e_aes.c | 257 const void *key, uint8_t ivec[16], uint64_t *Xi); 260 const void *key, uint8_t ivec[16], uint64_t *Xi); 262 void gcm_ghash_avx(uint64_t Xi[2], const u128 Htable[16], const uint8_t *in, 665 gctx->gcm.Yi.c, gctx->gcm.Xi.u); 693 gctx->gcm.Yi.c, gctx->gcm.Xi.u); [all...] |
/packages/apps/UnifiedEmail/src/com/google/android/mail/common/base/ |
CharEscapers.java | 278 .addEscape('\u039E', "Ξ") 302 .addEscape('\u03BE', "ξ") [all...] |
/external/fonttools/Lib/fontTools/ |
agl.py | 311 039E;Xi;GREEK CAPITAL LETTER XI 691 03BE;xi;GREEK SMALL LETTER XI
|
/external/chromium-trace/trace-viewer/tracing/third_party/d3/ |
d3.min.js | [all...] |
/cts/suite/cts/deviceTests/browserbench/assets/octane/ |
pdfjs.js | [all...] |
/external/v8/test/mjsunit/ |
unicode-test.js | 424 " * 3 ??????????? ???? (XI?III ??. ?? ?. ?.)\n" + 466 "? ?????????? ???? ? ????????? ????????? ??? ?????????? ??????????? ? ? XI ???? ?? ?. ?. ?????????? ?????????? ??????????? ????????? ?????? ? ??????, ? ????? ????? ?????????? ????????? ?????? ? ?????. ??? ????? ????????? ??????? ??????? ????????? ? ???????? ???????????? ? ???????? ???????????? ???????????????? ?????????? ??????. ????? ??????????? ???????????? ?????????? ?? ??????? ? ? ??????? ????? ?????? ? ? ??? ???? ???????????????? ??????, ?????????????? ????????? ??????, ????, ????? ? ?????? ?????????. ????? ???????????? ???????????? ???????????????? ? ???? ????? ? ?????? ??????????? ???????.\n" + 468 "? XI ???? ?? ?. ?. ??????????? ??? ???? ????????? ???????????????? ???????? ???????? ????, ??????? ?? ????? ?????????? ? ?????????? ?????????? ? ???????, ?? ?????????? ?????????? ? ??????? ???????? ??????.\n" + 470 "[???????] ??????????? ???? (XI?III ??. ?? ?. ?.)\n" + 480 "?????? ???? (XI?III ??. ?? ?. ?.) ??????? ?? ??? ?????????? ???????? ? ????????? ????, ??? ??????? ? ????????? ????????? ???? ? 770 ?? ?. ?. ??? ??????? ????????? ?????????? ?????? ?? ???????? ? ?????????????? ??????? ??????????? ? ? ???????. ????? ? ?????? ?????? ??????? ???? ?????? ?????? ?? ????????? ????????? ???????????, ??????? ?????? ????? ????? ???? ????. ???????????? ?????? ???? ???? ?????? ??????? ?????? ????????? ???????.\n" + [all...] |