/openssl/crypto/ |
H A D | s390xcpuid.pl | 37 lghi %r0,0 46 lghi %r0,1 49 lghi %r0,2 59 lghi %r0,0 184 ar %r0,%r3 195 xgr %r0,%r0 219 lghi %r0,0 262 xr %r1,%r0 350 lr %r0,$fc 371 lr %r0,$fc [all …]
|
H A D | pariscid.pl | 65 xor %r0,%r0,%r1 67 xor %r0,%r0,%r19 69 xor %r0,%r0,%r20 71 xor %r0,%r0,%r21 73 xor %r0,%r0,%r22 75 xor %r0,%r0,%r23 77 xor %r0,%r0,%r24 79 xor %r0,%r0,%r25 81 xor %r0,%r0,%r26 83 xor %r0,%r0,%r29 [all …]
|
H A D | ia64cpuid.S | 91 mov r14=r0 } 94 mov r16=r0 } 97 mov r18=r0 } 100 mov r20=r0 } 103 mov r22=r0 } 106 mov r24=r0 } 109 mov r26=r0 } 112 mov r28=r0 } 115 mov r30=r0 } 225 mov r10=r0 [all …]
|
/openssl/crypto/bn/asm/ |
H A D | parisc-mont.pl | 507 sub %r0,%r0,%r0 ; clear borrow 521 subb $ti0,%r0,$hi1 544 std,ma %r0,8($tp) 669 addc %r0,%r0,$hi1 813 addc %r0,%r0,$hi1 816 addc %r0,$hi1,$hi1 840 addc %r0,%r0,$hi1 842 addc %r0,$hi1,$hi1 847 sub %r0,%r0,%r0 ; clear borrow 857 subb $ti0,%r0,$hi1 [all …]
|
H A D | s390x.S | 13 #define zero %r0 274 lg %r0,0(%r2,%r3) 276 stg %r0,0(%r2,%r1) 277 lg %r0,8(%r2,%r3) 279 stg %r0,8(%r2,%r1) 280 lg %r0,16(%r2,%r3) 283 lg %r0,24(%r2,%r3) 300 lg %r0,0(%r2,%r3) 328 lg %r0,0(%r2,%r3) 337 lg %r0,0(%r2,%r3) [all …]
|
/openssl/crypto/idea/ |
H A D | i_skey.c | 24 register IDEA_INT *kt, *kf, r0, r1, r2; in IDEA_set_encrypt_key() local 42 r0 = kf[3]; in IDEA_set_encrypt_key() 43 *(kt++) = ((r1 << 9) | (r0 >> 7)) & 0xffff; in IDEA_set_encrypt_key() 45 *(kt++) = ((r0 << 9) | (r1 >> 7)) & 0xffff; in IDEA_set_encrypt_key() 46 r0 = kf[5]; in IDEA_set_encrypt_key() 47 *(kt++) = ((r1 << 9) | (r0 >> 7)) & 0xffff; in IDEA_set_encrypt_key() 49 *(kt++) = ((r0 << 9) | (r1 >> 7)) & 0xffff; in IDEA_set_encrypt_key() 50 r0 = kf[7]; in IDEA_set_encrypt_key() 51 *(kt++) = ((r1 << 9) | (r0 >> 7)) & 0xffff; in IDEA_set_encrypt_key() 55 *(kt++) = ((r0 << 9) | (r1 >> 7)) & 0xffff; in IDEA_set_encrypt_key()
|
/openssl/crypto/poly1305/asm/ |
H A D | poly1305-s390x.pl | 81 lghi ("%r0",0); 108 srlg ("%r0","%r0",62); 110 lcgr ("%r0","%r0"); 254 sllg ("%r0","%r0",26); 268 lcgr ("%r0","%r0"); 273 ngr ($h0,"%r0"); 274 ngr ($h1,"%r0"); 280 lhi ("%r0",0); 473 lhi ("%r0",1); 906 sllg ("%r0","%r0",26); [all …]
|
H A D | poly1305-armv8.pl | 90 rev $r0,$r0 // flip bytes 93 and $r0,$r0,$s1 // &=0ffffffc0fffffff 146 mul $d0,$h0,$r0 // h0*r0 148 umulh $d1,$h0,$r0 159 mul $t0,$h1,$r0 // h1*r0 161 umulh $t1,$h1,$r0 166 mul $t1,$h2,$r0 // h2*r0 236 mul $d0,$h0,$r0 // h0*r0 237 umulh $d1,$h0,$r0 248 mul $t0,$h1,$r0 // h1*r0 [all …]
|
H A D | poly1305-mips.pl | 174 my ($h0,$h1,$h2,$r0,$r1,$s1,$d0,$d1,$d2) = 213 ld $r0,24($ctx) # load key 277 dmultu ($r0,$h0) # h0*r0 280 mflo ($d0,$r0,$h0) 281 mfhi ($d1,$r0,$h0) 297 dmultu ($r0,$h1) # h1*r0 300 mflo ($tmp0,$r0,$h1) 301 mfhi ($tmp1,$r0,$h1) 309 dmultu ($r0,$h2) # h2*r0 312 mflo ($tmp3,$r0,$h2)
|
H A D | poly1305-x86_64.pl | 113 mov $r0,%rax 118 mov $r0,%rax 136 imulq $r0,$h2 # h2*r0 365 mov $r0,$h0 378 mov $r0,$d2 621 mov $h1,$r0 625 shl \$12,$r0 628 or $r0,$h0 1553 mov $h1,$r0 1557 shl \$12,$r0 [all …]
|
H A D | poly1305-ppc.pl | 205 mulld $d0,$h0,$r0 # h0*r0 219 mulld $t0,$h1,$r0 # h1*r0 225 mulld $t1,$h2,$r0 # h2*r0 502 mullw $d0,$h0,$r0 # h0*r0 520 mullw $t2,$h1,$r0 # h1*r0 545 mullw $t0,$h2,$r0 # h2*r0 570 mullw $t2,$h3,$r0 # h3*r0 589 mullw $h4,$h4,$r0 # h4*r0 837 mulld $d0,$h0,$r0 # h0*r0 850 mulld $t0,$h1,$r0 # h1*r0 [all …]
|
H A D | poly1305-armv4.pl | 271 umull r2,r3,$h1,$r0 273 umull r0,r1,$h0,$r0 294 umlal r2,r3,$h3,$r0 295 umlal r0,r1,$h2,$r0 302 mul $h4,$r0,$h4 491 @ d0 = h0*r0 + h4*5*r1 + h3*5*r2 + h2*5*r3 + h1*5*r4 492 @ d1 = h1*r0 + h0*r1 + h4*5*r2 + h3*5*r3 + h2*5*r4 493 @ d2 = h2*r0 + h1*r1 + h0*r2 + h4*5*r3 + h3*5*r4 494 @ d3 = h3*r0 + h2*r1 + h1*r2 + h0*r3 + h4*5*r4 495 @ d4 = h4*r0 + h3*r1 + h2*r2 + h1*r3 + h0*r4 [all …]
|
/openssl/crypto/aes/asm/ |
H A D | aes-s390x.pl | 109 $t0="%r0"; $mask="%r0"; 257 clr %r0,%r1 822 lhi %r0,18 825 ar %r5,%r0 829 srlg %r0,%r0,0(%r5) 1201 lhi %r0,16 1259 lhi %r0,0 1417 lr $s2,%r0 1502 srlg %r0,%r0,0($s0) 1649 nr $s1,%r0 [all …]
|
H A D | aes-parisc.pl | 104 blr %r0,$tbl 118 sh3addl $t0,%r0,$t0 131 extru,<> $out,31,2,%r0 331 ldw 1024+0($tbl),%r0 ; prefetch te4 334 ldw 1024+32($tbl),%r0 ; prefetch te4 337 ldw 1024+64($tbl),%r0 ; prefetch te4 340 ldw 1024+96($tbl),%r0 ; prefetch te4 573 blr %r0,$tbl 587 sh3addl $t0,%r0,$t0 600 extru,<> $out,31,2,%r0 [all …]
|
/openssl/crypto/modes/asm/ |
H A D | ghash-s390x.pl | 64 $Zhi="%r0"; 112 lg %r0,S390X_KIMD+8(%r1) # load second word of kimd capabilities 114 tmhh %r0,0x4000 # check for function 65 121 lmg %r0,%r1,0($Xi) 122 stmg %r0,%r1,8($sp) 123 lmg %r0,%r1,8*16($Htbl) 124 stmg %r0,%r1,24($sp) 126 lghi %r0,S390X_GHASH # function 65 127 .long 0xb93e0004 # kimd %r0,$inp 129 lmg %r0,%r1,8($sp) [all …]
|
/openssl/crypto/poly1305/ |
H A D | poly1305_base2_44.c | 60 u64 r0, r1; in poly1305_init() local 67 r0 = U8TOU64(&key[0]) & 0x0ffffffc0fffffff; in poly1305_init() 71 st->r[0] = r0 & 0x0fffffffffff; in poly1305_init() 72 st->r[1] = ((r0 >> 44) | (r1 << 20)) & 0x0fffffffffff; in poly1305_init() 85 u64 r0, r1, r2; in poly1305_blocks() local 91 r0 = st->r[0]; in poly1305_blocks() 114 d0 = ((u128)h0 * r0) + ((u128)h1 * s2) + ((u128)h2 * s1); in poly1305_blocks() 115 d1 = ((u128)h0 * r1) + ((u128)h1 * r0) + ((u128)h2 * s2); in poly1305_blocks() 116 d2 = ((u128)h0 * r2) + ((u128)h1 * r1) + ((u128)h2 * r0); in poly1305_blocks()
|
H A D | poly1305.c | 151 u64 r0, r1; in poly1305_blocks() local 156 r0 = st->r[0]; in poly1305_blocks() 176 d0 = ((u128)h0 * r0) + in poly1305_blocks() 181 h2 = (h2 * r0); in poly1305_blocks() 293 u32 r0, r1, r2, r3; in poly1305_blocks() local 298 r0 = st->r[0]; in poly1305_blocks() 322 d0 = ((u64)h0 * r0) + in poly1305_blocks() 327 ((u64)h1 * r0) + in poly1305_blocks() 333 ((u64)h2 * r0) + in poly1305_blocks() 339 ((u64)h3 * r0) + in poly1305_blocks() [all …]
|
/openssl/crypto/rsa/ |
H A D | rsa_ossl.c | 919 || !bn_mod_add_fixed_top(r0, r0, m1, rsa->n)) in rsa_ossl_mod_exp() 1023 if (!BN_sub(r0, r0, m1)) in rsa_ossl_mod_exp() 1029 if (BN_is_negative(r0)) in rsa_ossl_mod_exp() 1030 if (!BN_add(r0, r0, rsa->p)) in rsa_ossl_mod_exp() 1057 if (BN_is_negative(r0)) in rsa_ossl_mod_exp() 1058 if (!BN_add(r0, r0, rsa->p)) in rsa_ossl_mod_exp() 1062 if (!BN_add(r0, r1, m1)) in rsa_ossl_mod_exp() 1101 if (!BN_add(r0, r0, r1)) { in rsa_ossl_mod_exp() 1117 bn_correct_top(r0); in rsa_ossl_mod_exp() 1131 bn_correct_top(r0); in rsa_ossl_mod_exp() [all …]
|
H A D | rsa_x931g.c | 30 BIGNUM *r0 = NULL, *r1 = NULL, *r2 = NULL, *r3 = NULL; in RSA_X931_derive_ex() local 42 r0 = BN_CTX_get(ctx); in RSA_X931_derive_ex() 104 if (!BN_mul(r0, r1, r2, ctx)) in RSA_X931_derive_ex() 110 if (!BN_div(r0, NULL, r0, r3, ctx)) in RSA_X931_derive_ex() 117 rsa->d = BN_mod_inverse(NULL, rsa->e, r0, ctx2); /* d */ in RSA_X931_derive_ex()
|
H A D | rsa_gen.c | 93 BIGNUM *r0 = NULL, *r1 = NULL, *r2 = NULL; in DEFINE_STACK_OF() local 113 r0 = BN_CTX_get(ctx); in DEFINE_STACK_OF() 120 BN_set_flags(r0, BN_FLG_CONSTTIME); in DEFINE_STACK_OF() 171 if (!BN_mul(r0, r1, r2, ctx)) in DEFINE_STACK_OF() 181 if (!BN_mul(r0, r0, dval, ctx)) in DEFINE_STACK_OF() 261 BIGNUM *r0 = NULL, *r1 = NULL, *r2 = NULL, *tmp, *tmp2, *prime; in rsa_multiprime_keygen() local 309 r0 = BN_CTX_get(ctx); in rsa_multiprime_keygen() 537 if (!BN_mul(r0, r1, r2, ctx)) in rsa_multiprime_keygen() 545 if (!BN_mul(r0, r0, pinfo->d, ctx)) in rsa_multiprime_keygen() 550 BN_set_flags(r0, BN_FLG_CONSTTIME); in rsa_multiprime_keygen() [all …]
|
/openssl/crypto/rc4/asm/ |
H A D | rc4-parisc.pl | 111 comclr,<> $XX[1],$YY,%r0 ; conditional 194 sh3addl $acc,%r0,$acc 262 $ST %r0,`0*$SZ`($key) 263 $ST %r0,`1*$SZ`($key) 265 copy %r0,@XX[0] 274 sub %r0,$len,%r23 ; inverse index 275 copy %r0,@XX[0] 276 copy %r0,@XX[1] 283 sub %r0,$len,%r23 ; inverse index 306 blr %r0,%r28
|
/openssl/crypto/aes/ |
H A D | aes_x86core.c | 698 u32 r0, r1, r2; in AES_encrypt() local 701 r0 = t[i]; in AES_encrypt() 707 ROTATE(r0,16) ^ ROTATE(r0,8); in AES_encrypt() 709 t[i] = r2 ^ ((r2 ^ r0) << 24) ^ ((r2 ^ r0) >> 8) ^ in AES_encrypt() 710 (r0 << 16) ^ (r0 >> 16) ^ in AES_encrypt() 711 (r0 << 8) ^ (r0 >> 24); in AES_encrypt() 768 r0 = t[i]; in AES_encrypt() 774 ROTATE(r0,16) ^ ROTATE(r0,8); in AES_encrypt() 776 t[i] = r2 ^ ((r2 ^ r0) << 24) ^ ((r2 ^ r0) >> 8) ^ in AES_encrypt() 777 (r0 << 16) ^ (r0 >> 16) ^ in AES_encrypt() [all …]
|
/openssl/crypto/sha/asm/ |
H A D | sha1-s390x.pl | 58 $K_00_39="%r0"; $K=$K_00_39; 179 lg %r0,S390X_KIMD(%r1) # check kimd capabilities 180 tmhh %r0,`0x8000>>$kimdfunc` 182 lghi %r0,$kimdfunc 186 .long 0xb93e0002 # kimd %r0,%r2 196 lgr %r0,$sp 198 st${g} %r0,0($sp)
|
H A D | keccak1600-s390x.pl | 346 lgr %r0,$sp 348 st${g} %r0,0($sp) 404 lgr %r0,$sp 434 lrvg %r0,0($inp) 436 xg %r0,0(%r1) 438 stg %r0,0(%r1) 496 lrvg %r0,0(%r1) 498 stg %r0,0($out) 514 lg %r0,0(%r1) 516 stc %r0,0($out) [all …]
|
H A D | sha512-s390x.pl | 59 $t0="%r0"; 251 lg %r0,S390X_KIMD(%r1) # check kimd capabilities 252 tmhh %r0,`0x8000>>$kimdfunc` 254 lghi %r0,$kimdfunc 258 .long 0xb93e0002 # kimd %r0,%r2 268 lgr %r0,$sp 270 st${g} %r0,0($sp)
|