Home
last modified time | relevance | path

Searched refs:rol (Results 1 – 25 of 76) sorted by relevance

1234

/third_party/boringssl/win-x86/crypto/fipsmodule/
Dmd5-586.asm54 rol eax,7
64 rol edx,12
74 rol ecx,17
84 rol ebx,22
94 rol eax,7
104 rol edx,12
114 rol ecx,17
124 rol ebx,22
134 rol eax,7
144 rol edx,12
[all …]
Dsha1-586.asm119 rol ebp,5
131 rol ebp,5
143 rol ebp,5
155 rol ebp,5
167 rol ebp,5
179 rol ebp,5
191 rol ebp,5
203 rol ebp,5
215 rol ebp,5
227 rol ebp,5
[all …]
Dghash-x86.asm384 rol edx,8
390 rol edx,8
406 rol edx,8
424 rol edx,8
444 rol edx,8
463 rol edx,8
482 rol edx,8
501 rol edx,8
521 rol edx,8
540 rol edx,8
[all …]
Daes-586.asm133 rol ecx,24
151 rol edx,24
169 rol eax,24
187 rol ebx,24
1165 rol ecx,8
1171 rol eax,24
1173 rol ebx,16
1175 rol ebp,8
1208 rol edx,8
1214 rol ebx,24
[all …]
/third_party/boringssl/win-x86_64/crypto/fipsmodule/
Dmd5-x86_64.asm75 rol eax,7
84 rol edx,12
93 rol ecx,17
102 rol ebx,22
111 rol eax,7
120 rol edx,12
129 rol ecx,17
138 rol ebx,22
147 rol eax,7
156 rol edx,12
[all …]
Dsha1-x86_64.asm83 rol ecx,5
88 rol edi,30
96 rol ecx,5
101 rol esi,30
109 rol ecx,5
114 rol r13d,30
122 rol ecx,5
127 rol r12d,30
135 rol ecx,5
140 rol r11d,30
[all …]
Daes-x86_64.asm281 rol eax,24
283 rol ebx,24
318 rol ecx,24
320 rol edx,24
763 rol eax,8
765 rol ecx,8
767 rol ebx,8
770 rol edx,8
779 rol r8d,24
781 rol r11d,24
[all …]
Dghash-x86_64.asm374 rol edx,8
379 rol edx,8
395 rol edx,8
415 rol edx,8
436 rol edx,8
456 rol edx,8
476 rol edx,8
496 rol edx,8
517 rol edx,8
537 rol edx,8
[all …]
/third_party/ffmpeg/libavutil/
Dsha.c50 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro
54 #define blk(i) (block[i] = rol(block[(i)-3] ^ block[(i)-8] ^ block[(i)-14] ^ block[(i)-16], 1))
56 …0(v,w,x,y,z,i) z += (((w)&((x)^(y)))^(y)) + blk0(i) + 0x5A827999 + rol(v, 5); w = rol(w, 30);
57 …1(v,w,x,y,z,i) z += (((w)&((x)^(y)))^(y)) + blk (i) + 0x5A827999 + rol(v, 5); w = rol(w, 30);
58 …2(v,w,x,y,z,i) z += ( (w)^(x) ^(y)) + blk (i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30);
59 …3(v,w,x,y,z,i) z += ((((w)|(x))&(y))|((w)&(x))) + blk (i) + 0x8F1BBCDC + rol(v, 5); w = rol(w, 30);
60 …4(v,w,x,y,z,i) z += ( (w)^(x) ^(y)) + blk (i) + 0xCA62C1D6 + rol(v, 5); w = rol(w, 30);
80 t = rol(block[i-3] ^ block[i-8] ^ block[i-14] ^ block[i-16], 1); in sha1_transform()
82 t += e + rol(a, 5); in sha1_transform()
96 c = rol(b, 30); in sha1_transform()
[all …]
Dripemd.c88 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro
91 a = rol(a + (( b ^ c ^ d) + block[WA[n]]), ROTA[n]); \
92 e = rol(e + ((((f ^ g) & h) ^ g) + block[WB[n]] + KB[0]), ROTB[n]); \
96 a = rol(a + ((((c ^ d) & b) ^ d) + block[WA[n]] + KA[0]), ROTA[n]); \
97 e = rol(e + (((~g | f) ^ h) + block[WB[n]] + KB[1]), ROTB[n]); \
101 a = rol(a + (((~c | b) ^ d) + block[WA[n]] + KA[1]), ROTA[n]); \
102 e = rol(e + ((((g ^ h) & f) ^ h) + block[WB[n]] + KB[2]), ROTB[n]); \
106 a = rol(a + ((((b ^ c) & d) ^ c) + block[WA[n]] + KA[2]), ROTA[n]); \
107 e = rol(e + (( f ^ g ^ h) + block[WB[n]]), ROTB[n]); \
252 x = rol(x, 10); \
[all …]
/third_party/selinux/libselinux/src/
Dsha1.c43 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro
46 #define blk0(i) (block->l[i] = (rol(block->l[i],24)&0xFF00FF00) \
47 |(rol(block->l[i],8)&0x00FF00FF))
49 #define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \
53 #define R0(v,w,x,y,z,i) do { z += ((w&(x^y))^y) + blk0(i)+ 0x5A827999 + rol(v,5); w=rol(w,30);…
54 #define R1(v,w,x,y,z,i) do { z += ((w&(x^y))^y) + blk(i) + 0x5A827999 + rol(v,5); w=rol(w,30);…
55 #define R2(v,w,x,y,z,i) do { z += (w^x^y) + blk(i) + 0x6ED9EBA1 + rol(v,5); w=rol(w,30);…
56 #define R3(v,w,x,y,z,i) do { z += (((w|x)&y)|(w&x)) + blk(i) + 0x8F1BBCDC + rol(v,5); w=rol(w,30);…
57 #define R4(v,w,x,y,z,i) do { z += (w^x^y) + blk(i) + 0xCA62C1D6 + rol(v,5); w=rol(w,30);…
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dsha1-internal.c130 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro
135 #define blk0(i) (block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | \
136 (rol(block->l[i], 8) & 0x00FF00FF))
140 #define blk(i) (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ \
145 z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \
146 w = rol(w, 30);
148 z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \
149 w = rol(w, 30);
151 z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30);
153 z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dsha1-internal.c130 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro
135 #define blk0(i) (block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | \
136 (rol(block->l[i], 8) & 0x00FF00FF))
140 #define blk(i) (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ \
145 z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \
146 w = rol(w, 30);
148 z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \
149 w = rol(w, 30);
151 z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30);
153 z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \
[all …]
/third_party/ffmpeg/libavformat/
Dredspark.c29 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro
45 key = rol(key, 11); in redspark_probe()
47 key += rol(key, 3); in redspark_probe()
78 key = rol(key, 11); in redspark_read_header()
81 key += rol(key, 3); in redspark_read_header()
/third_party/boringssl/win-x86/crypto/chacha/
Dchacha-x86.asm113 rol edx,16
117 rol ebx,12
122 rol edx,8
128 rol ebx,7
131 rol edi,16
137 rol ebp,12
142 rol edi,8
148 rol ebp,7
151 rol edx,16
157 rol ebx,12
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Support/
DSHA1.cpp30 static inline uint32_t rol(uint32_t Number, int Bits) { in rol() function
37 Buf[I & 15] = rol(Buf[(I + 13) & 15] ^ Buf[(I + 8) & 15] ^ Buf[(I + 2) & 15] ^ in blk()
45 E += ((B & (C ^ D)) ^ D) + blk0(Buf, I) + 0x5A827999 + rol(A, 5); in r0()
46 B = rol(B, 30); in r0()
51 E += ((B & (C ^ D)) ^ D) + blk(Buf, I) + 0x5A827999 + rol(A, 5); in r1()
52 B = rol(B, 30); in r1()
57 E += (B ^ C ^ D) + blk(Buf, I) + 0x6ED9EBA1 + rol(A, 5); in r2()
58 B = rol(B, 30); in r2()
63 E += (((B | C) & D) | (B & C)) + blk(Buf, I) + 0x8F1BBCDC + rol(A, 5); in r3()
64 B = rol(B, 30); in r3()
[all …]
/third_party/boost/boost/beast/core/detail/
Dsha1.ipp37 rol(std::uint32_t value, std::size_t bits)
46 return rol(
57 z += ((w&(x^y))^y) + block[i] + 0x5a827999 + rol(v, 5);
58 w = rol(w, 30);
69 z += ((w&(x^y))^y) + block[i] + 0x5a827999 + rol(v, 5);
70 w = rol(w, 30);
80 z += (w^x^y) + block[i] + 0x6ed9eba1 + rol(v, 5);
81 w = rol(w, 30);
91 z += (((w|x)&y)|(w&x)) + block[i] + 0x8f1bbcdc + rol(v, 5);
92 w = rol(w, 30);
[all …]
/third_party/toybox/toys/lsb/
Dmd5sum.c168 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro
194 work += block[count] = (rol(block[count],24)&0xFF00FF00) in sha1_transform()
195 | (rol(block[count],8)&0x00FF00FF); in sha1_transform()
197 work += block[count&15] = rol(block[(count+13)&15] in sha1_transform()
199 *rot[4] += work + rol(*rot[0],5) + rconsts[i]; in sha1_transform()
200 *rot[1] = rol(*rot[1],30); in sha1_transform()
/third_party/pcre2/pcre2/src/sljit/
DsljitNativeARM_32.c1269 sljit_s32 rol; in get_imm() local
1276 rol = 8; in get_imm()
1280 rol = 0; in get_imm()
1285 rol += 4; in get_imm()
1290 rol += 2; in get_imm()
1295 rol += 1; in get_imm()
1299 return SRC2_IMM | (imm >> 24) | (rol << 8); in get_imm()
1310 sljit_s32 rol; in generate_int() local
1314 rol = 8; in generate_int()
1318 imm = (imm << rol) | (imm >> (32 - rol)); in generate_int()
[all …]
/third_party/musl/src/crypt/
Dcrypt_md5.c20 static uint32_t rol(uint32_t n, int k) { return (n << k) | (n >> (32-k)); } in rol() function
25 #define FF(a,b,c,d,w,s,t) a += F(b,c,d) + w + t; a = rol(a,s) + b
26 #define GG(a,b,c,d,w,s,t) a += G(b,c,d) + w + t; a = rol(a,s) + b
27 #define HH(a,b,c,d,w,s,t) a += H(b,c,d) + w + t; a = rol(a,s) + b
28 #define II(a,b,c,d,w,s,t) a += I(b,c,d) + w + t; a = rol(a,s) + b
/third_party/boost/boost/beast/websocket/detail/
Dmask.ipp31 rol(prepared_key& v, std::size_t n)
57 rol(key, n);
/third_party/boringssl/win-x86_64/crypto/chacha/
Dchacha-x86_64.asm129 rol r12d,16
132 rol r13d,16
135 rol r8d,12
138 rol r9d,12
141 rol r12d,8
144 rol r13d,8
147 rol r8d,7
150 rol r9d,7
157 rol r14d,16
160 rol r15d,16
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/X86/
DX86InstrShiftRotate.td460 "rol{b}\t{%cl, $dst|$dst, cl}",
463 "rol{w}\t{%cl, $dst|$dst, cl}",
466 "rol{l}\t{%cl, $dst|$dst, cl}",
469 "rol{q}\t{%cl, $dst|$dst, cl}",
474 "rol{b}\t{$src2, $dst|$dst, $src2}",
477 "rol{w}\t{$src2, $dst|$dst, $src2}",
481 "rol{l}\t{$src2, $dst|$dst, $src2}",
486 "rol{q}\t{$src2, $dst|$dst, $src2}",
491 "rol{b}\t$dst",
494 "rol{w}\t$dst",
[all …]
/third_party/boringssl/src/crypto/chacha/asm/
Dchacha-x86_64.pl163 "&rol (@x[$d0],16)",
166 "&rol (@x[$d1],16)",
170 "&rol (@x[$b0],12)",
173 "&rol (@x[$b1],12)",
177 "&rol (@x[$d0],8)",
180 "&rol (@x[$d1],8)",
184 "&rol (@x[$b0],7)",
187 "&rol (@x[$b1],7)",
196 "&rol (@x[$d2],16)",
199 "&rol (@x[$d3],16)",
[all …]
Dchacha-x86.pl91 &rol ($d,16);
97 &rol ($b,12);
103 &rol ($d,8);
110 &rol ($b,7);

1234