/openssl/crypto/bn/asm/ |
H A D | s390x.S | 165 la %r2,32(%r2) // i+=4 184 la %r2,8(%r2) // i++ 224 la %r2,64(%r2) 238 la %r2,16(%r2) 287 la %r2,32(%r2) // i+=4 295 alcgr %r2,%r2 304 la %r2,8(%r2) // i++ 332 la %r2,8(%r2) // i++ 350 la %r2,32(%r2) // i+=4 358 slbgr %r2,%r2 [all …]
|
H A D | s390x-mont.pl | 75 $rp="%r2"; # BN_ULONG *rp, 82 $bi="%r2"; # zaps rp 103 st${g} %r2,2*$SIZE_T($sp) 106 lghi %r2,0 # 275 lghi %r2,1 # signal "processed"
|
H A D | rsaz-avx2.pl | 113 my $r2="%r11"; 478 add %rax, $r2 513 add $r1, $r2 993 xor $r2, $r2 1052 add %rax,$r2 1084 add %rax,$r2 1129 add %rax,$r2 1134 add $r1, $r2 1166 add $r2,%rax 1169 mov %rax,$r2 [all …]
|
H A D | ia64.S | 183 .save ar.pfs,r2 236 .save ar.pfs,r2 295 .save ar.pfs,r2 409 .save ar.pfs,r2 477 .save ar.pfs,r2 556 .save ar.pfs,r2 627 .save ar.pfs,r2 1184 .save ar.pfs,r2 1216 .save ar.pfs,r2 1418 .save ar.pfs,r2 [all …]
|
H A D | ppc64-mont-fixed.pl | 416 my ($self, $r1, $r2, $a, $w, $c) = @_; 423 addze $r2,$c 500 my ($self, $r1, $r2, $a, $w, $c) = @_; 504 maddhdu $r2,$a,$w,$c
|
/openssl/crypto/ |
H A D | s390xcpuid.pl | 124 .long 0xb92d2042 # kmctr %r4,%r2,%r2 148 .long 0xb9294022 # kma %r2,%r4,%r2 226 la %r2,1(%r2) 233 la %r2,1(%r2) 238 la %r2,8(%r2) 259 la %r2,1(%r2) 277 lghi %r2,0 458 lhi %r2,0 466 lhi %r2,1 484 lhi %r2,0 [all …]
|
H A D | ia64cpuid.S | 34 { .mii; ld4 r2=[r32] 38 { .mii; mov ar.ccv=r2 39 add r8=r2,r33 40 mov r3=r2 };; 65 .save ar.pfs,r2 148 { .mib; and r2=7,r32 163 and r2=7,r32 } 188 .save ar.pfs,r2 222 { .mmi; mov r2=r33 250 { .mib; sub r8=r2,r33 [all …]
|
/openssl/crypto/rsa/ |
H A D | rsa_gen.c | 115 r2 = BN_CTX_get(ctx); in DEFINE_STACK_OF() 117 if (r2 == NULL) in DEFINE_STACK_OF() 122 BN_set_flags(r2, BN_FLG_CONSTTIME); in DEFINE_STACK_OF() 169 if (!BN_sub(r2, q, BN_value_one())) in DEFINE_STACK_OF() 171 if (!BN_mul(r0, r1, r2, ctx)) in DEFINE_STACK_OF() 201 if (!BN_mod(dmq1, rsa->d, r2, ctx)) in DEFINE_STACK_OF() 311 r2 = BN_CTX_get(ctx); in rsa_multiprime_keygen() 312 if (r2 == NULL) in rsa_multiprime_keygen() 464 if (!BN_rshift(r2, r1, bitse - 4)) in rsa_multiprime_keygen() 466 bitst = BN_get_word(r2); in rsa_multiprime_keygen() [all …]
|
H A D | rsa_x931g.c | 30 BIGNUM *r0 = NULL, *r1 = NULL, *r2 = NULL, *r3 = NULL; in RSA_X931_derive_ex() local 44 r2 = BN_CTX_get(ctx); in RSA_X931_derive_ex() 102 if (!BN_sub(r2, rsa->q, BN_value_one())) in RSA_X931_derive_ex() 104 if (!BN_mul(r0, r1, r2, ctx)) in RSA_X931_derive_ex() 107 if (!BN_gcd(r3, r1, r2, ctx)) in RSA_X931_derive_ex() 132 if (!BN_mod(rsa->dmq1, rsa->d, r2, ctx)) in RSA_X931_derive_ex()
|
H A D | rsa_crpt.c | 91 BIGNUM *ret = NULL, *r0, *r1, *r2; in rsa_get_public_exp() local 99 r2 = BN_CTX_get(ctx); in rsa_get_public_exp() 100 if (r2 == NULL) in rsa_get_public_exp() 105 if (!BN_sub(r2, q, BN_value_one())) in rsa_get_public_exp() 107 if (!BN_mul(r0, r1, r2, ctx)) in rsa_get_public_exp()
|
/openssl/crypto/poly1305/asm/ |
H A D | poly1305-x86_64.pl | 934 vpmuludq $T1,$H3,$H1 # h1*r2 935 vpmuludq $T0,$H3,$H3 # h0*r2 1034 vpmuludq $H2,$T3,$T0 # h2*r2 1035 vpmuludq $H1,$T3,$T1 # h1*r2 1039 vpmuludq $H0,$T3,$T3 # h0*r2 1176 vpmuludq $T2,$H4,$H1 # h2*r2 1178 vpmuludq $T1,$H4,$H0 # h1*r2 1181 vpmuludq $T0,$H4,$H4 # h0*r2 1270 vpmuludq $H2,$T4,$T1 # h2*r2 1272 vpmuludq $H1,$T4,$T0 # h1*r2 [all …]
|
H A D | poly1305-armv4.pl | 178 my ($s1,$s2,$s3)=($r1,$r2,$r3); 200 str $r2,[sp,#24] 267 add $s2,$r2,$r2,lsr#2 284 ldr $r2,[sp,#24] @ reload $r2 298 umlal r2,r3,$h1,$r2 299 umlal r0,r1,$h0,$r2 491 @ d0 = h0*r0 + h4*5*r1 + h3*5*r2 + h2*5*r3 + h1*5*r4 492 @ d1 = h1*r0 + h0*r1 + h4*5*r2 + h3*5*r3 + h2*5*r4 493 @ d2 = h2*r0 + h1*r1 + h0*r2 + h4*5*r3 + h3*5*r4 495 @ d4 = h4*r0 + h3*r1 + h2*r2 + h1*r3 + h0*r4 [all …]
|
H A D | poly1305-sparcv9.pl | 175 srl $r2,2,$s2 178 add $r2,$s2,$s2 205 umul $r2,$h0,$d2 215 umul $r2,$h1,$t0 306 set 16,$r2 388 addccc $h2,0,$r2 411 srl $h0,24,$r2 413 stb $r2,[$mac+3] 419 srl $h1,24,$r2 427 srl $h2,24,$r2 [all …]
|
/openssl/crypto/idea/ |
H A D | i_skey.c | 24 register IDEA_INT *kt, *kf, r0, r1, r2; in IDEA_set_encrypt_key() local 39 r2 = kf[1]; in IDEA_set_encrypt_key() 41 *(kt++) = ((r2 << 9) | (r1 >> 7)) & 0xffff; in IDEA_set_encrypt_key() 56 *(kt++) = ((r1 << 9) | (r2 >> 7)) & 0xffff; in IDEA_set_encrypt_key()
|
/openssl/crypto/aes/asm/ |
H A D | aes-s390x.pl | 111 $t2="%r2"; $inp="%r2"; 813 lghi %r2,-2 847 lghi %r2,0 914 lghi %r2,0 963 lghi %r2,0 1026 lghi %r2,0 1068 lghi %r2,-1 1083 ltgr %r2,%r2 1175 lghi %r2,0 1185 my $inp="%r2"; [all …]
|
/openssl/crypto/rc4/asm/ |
H A D | rc4-parisc.pl | 93 $ix="%r2"; 158 $PUSH %r2,-$SAVED_RP(%sp) ; standard prologue 237 $POP `-$FRAME-$SAVED_RP`(%sp),%r2 248 bv (%r2) 295 bv,n (%r2) 310 bv (%r2)
|
H A D | rc4-s390x.pl | 59 $key="%r2"; 174 $key="%r2"; 233 larl %r2,.Loptions
|
/openssl/crypto/bn/ |
H A D | bn_rsa_fips186_4.c | 276 const BIGNUM *r1, const BIGNUM *r2, in ossl_bn_rsa_fips186_4_derive_prime() argument 330 && (BN_mod_inverse(tmp, r1x2, r2, ctx) != NULL) in ossl_bn_rsa_fips186_4_derive_prime() 332 && (BN_mod_inverse(R, r2, r1x2, ctx) != NULL) in ossl_bn_rsa_fips186_4_derive_prime() 333 && BN_mul(R, R, r2, ctx) /* R = (r2^-1 mod 2r1) * r2 */ in ossl_bn_rsa_fips186_4_derive_prime() 337 && BN_mul(r1r2x2, r1x2, r2, ctx))) in ossl_bn_rsa_fips186_4_derive_prime()
|
/openssl/crypto/sha/asm/ |
H A D | sha1-s390x.pl | 60 $ctx="%r2"; $prefetch="%r2"; 184 lgr %r2,$inp 186 .long 0xb93e0002 # kimd %r0,%r2
|
H A D | sha512-s390x.pl | 61 $ctx="%r2"; $t2="%r2"; 256 lgr %r2,$inp 258 .long 0xb93e0002 # kimd %r0,%r2
|
H A D | sha1-parisc.pl | 66 @X=("%r1", "%r2", "%r3", "%r4", "%r5", "%r6", "%r7", "%r8", 167 $PUSH %r2,-$SAVED_RP(%sp) ; standard prologue 245 $POP `-$FRAME-$SAVED_RP`(%sp),%r2 ; standard epilogue 259 bv (%r2)
|
/openssl/crypto/aes/ |
H A D | aes_x86core.c | 698 u32 r0, r1, r2; in AES_encrypt() local 703 r2 = ((r0 & 0x7f7f7f7f) << 1) ^ in AES_encrypt() 706 t[i] = r2 ^ ROTATE(r2,24) ^ ROTATE(r0,24) ^ in AES_encrypt() 709 t[i] = r2 ^ ((r2 ^ r0) << 24) ^ ((r2 ^ r0) >> 8) ^ in AES_encrypt() 765 u32 r0, r1, r2; in AES_encrypt() local 770 r2 = ((r0 & 0x7f7f7f7f) << 1) ^ in AES_encrypt() 773 t[i] = r2 ^ ROTATE(r2,24) ^ ROTATE(r0,24) ^ in AES_encrypt() 776 t[i] = r2 ^ ((r2 ^ r0) << 24) ^ ((r2 ^ r0) >> 8) ^ in AES_encrypt()
|
/openssl/crypto/poly1305/ |
H A D | poly1305_base2_44.c | 85 u64 r0, r1, r2; in poly1305_blocks() local 93 r2 = st->r[2]; in poly1305_blocks() 116 d2 = ((u128)h0 * r2) + ((u128)h1 * r1) + ((u128)h2 * r0); in poly1305_blocks()
|
H A D | poly1305.c | 293 u32 r0, r1, r2, r3; in poly1305_blocks() local 300 r2 = st->r[2]; in poly1305_blocks() 304 s2 = r2 + (r2 >> 2); in poly1305_blocks() 331 d2 = ((u64)h0 * r2) + in poly1305_blocks() 337 ((u64)h1 * r2) + in poly1305_blocks()
|
/openssl/crypto/modes/asm/ |
H A D | ghash-parisc.pl | 78 $Tll="%r2"; 103 $PUSH %r2,-$SAVED_RP(%sp) ; standard prologue 332 $POP `-$FRAME-$SAVED_RP`(%sp),%r2 ; standard epilogue 345 bv (%r2) 356 $PUSH %r2,-$SAVED_RP(%sp) ; standard prologue 606 $POP `-$FRAME-$SAVED_RP`(%sp),%r2 ; standard epilogue 619 bv (%r2)
|