/third_party/boringssl/win-x86/crypto/fipsmodule/ |
D | md5-586.asm | 54 rol eax,7 64 rol edx,12 74 rol ecx,17 84 rol ebx,22 94 rol eax,7 104 rol edx,12 114 rol ecx,17 124 rol ebx,22 134 rol eax,7 144 rol edx,12 [all …]
|
D | sha1-586.asm | 119 rol ebp,5 131 rol ebp,5 143 rol ebp,5 155 rol ebp,5 167 rol ebp,5 179 rol ebp,5 191 rol ebp,5 203 rol ebp,5 215 rol ebp,5 227 rol ebp,5 [all …]
|
D | ghash-x86.asm | 384 rol edx,8 390 rol edx,8 406 rol edx,8 424 rol edx,8 444 rol edx,8 463 rol edx,8 482 rol edx,8 501 rol edx,8 521 rol edx,8 540 rol edx,8 [all …]
|
D | aes-586.asm | 133 rol ecx,24 151 rol edx,24 169 rol eax,24 187 rol ebx,24 1165 rol ecx,8 1171 rol eax,24 1173 rol ebx,16 1175 rol ebp,8 1208 rol edx,8 1214 rol ebx,24 [all …]
|
/third_party/boringssl/win-x86_64/crypto/fipsmodule/ |
D | md5-x86_64.asm | 75 rol eax,7 84 rol edx,12 93 rol ecx,17 102 rol ebx,22 111 rol eax,7 120 rol edx,12 129 rol ecx,17 138 rol ebx,22 147 rol eax,7 156 rol edx,12 [all …]
|
D | sha1-x86_64.asm | 83 rol ecx,5 88 rol edi,30 96 rol ecx,5 101 rol esi,30 109 rol ecx,5 114 rol r13d,30 122 rol ecx,5 127 rol r12d,30 135 rol ecx,5 140 rol r11d,30 [all …]
|
D | aes-x86_64.asm | 281 rol eax,24 283 rol ebx,24 318 rol ecx,24 320 rol edx,24 763 rol eax,8 765 rol ecx,8 767 rol ebx,8 770 rol edx,8 779 rol r8d,24 781 rol r11d,24 [all …]
|
D | ghash-x86_64.asm | 374 rol edx,8 379 rol edx,8 395 rol edx,8 415 rol edx,8 436 rol edx,8 456 rol edx,8 476 rol edx,8 496 rol edx,8 517 rol edx,8 537 rol edx,8 [all …]
|
/third_party/ffmpeg/libavutil/ |
D | sha.c | 50 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 54 #define blk(i) (block[i] = rol(block[(i)-3] ^ block[(i)-8] ^ block[(i)-14] ^ block[(i)-16], 1)) 56 …0(v,w,x,y,z,i) z += (((w)&((x)^(y)))^(y)) + blk0(i) + 0x5A827999 + rol(v, 5); w = rol(w, 30); 57 …1(v,w,x,y,z,i) z += (((w)&((x)^(y)))^(y)) + blk (i) + 0x5A827999 + rol(v, 5); w = rol(w, 30); 58 …2(v,w,x,y,z,i) z += ( (w)^(x) ^(y)) + blk (i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30); 59 …3(v,w,x,y,z,i) z += ((((w)|(x))&(y))|((w)&(x))) + blk (i) + 0x8F1BBCDC + rol(v, 5); w = rol(w, 30); 60 …4(v,w,x,y,z,i) z += ( (w)^(x) ^(y)) + blk (i) + 0xCA62C1D6 + rol(v, 5); w = rol(w, 30); 80 t = rol(block[i-3] ^ block[i-8] ^ block[i-14] ^ block[i-16], 1); in sha1_transform() 82 t += e + rol(a, 5); in sha1_transform() 96 c = rol(b, 30); in sha1_transform() [all …]
|
D | ripemd.c | 88 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 91 a = rol(a + (( b ^ c ^ d) + block[WA[n]]), ROTA[n]); \ 92 e = rol(e + ((((f ^ g) & h) ^ g) + block[WB[n]] + KB[0]), ROTB[n]); \ 96 a = rol(a + ((((c ^ d) & b) ^ d) + block[WA[n]] + KA[0]), ROTA[n]); \ 97 e = rol(e + (((~g | f) ^ h) + block[WB[n]] + KB[1]), ROTB[n]); \ 101 a = rol(a + (((~c | b) ^ d) + block[WA[n]] + KA[1]), ROTA[n]); \ 102 e = rol(e + ((((g ^ h) & f) ^ h) + block[WB[n]] + KB[2]), ROTB[n]); \ 106 a = rol(a + ((((b ^ c) & d) ^ c) + block[WA[n]] + KA[2]), ROTA[n]); \ 107 e = rol(e + (( f ^ g ^ h) + block[WB[n]]), ROTB[n]); \ 252 x = rol(x, 10); \ [all …]
|
/third_party/selinux/libselinux/src/ |
D | sha1.c | 43 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 46 #define blk0(i) (block->l[i] = (rol(block->l[i],24)&0xFF00FF00) \ 47 |(rol(block->l[i],8)&0x00FF00FF)) 49 #define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ 53 #define R0(v,w,x,y,z,i) do { z += ((w&(x^y))^y) + blk0(i)+ 0x5A827999 + rol(v,5); w=rol(w,30);… 54 #define R1(v,w,x,y,z,i) do { z += ((w&(x^y))^y) + blk(i) + 0x5A827999 + rol(v,5); w=rol(w,30);… 55 #define R2(v,w,x,y,z,i) do { z += (w^x^y) + blk(i) + 0x6ED9EBA1 + rol(v,5); w=rol(w,30);… 56 #define R3(v,w,x,y,z,i) do { z += (((w|x)&y)|(w&x)) + blk(i) + 0x8F1BBCDC + rol(v,5); w=rol(w,30);… 57 #define R4(v,w,x,y,z,i) do { z += (w^x^y) + blk(i) + 0xCA62C1D6 + rol(v,5); w=rol(w,30);…
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | sha1-internal.c | 130 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 135 #define blk0(i) (block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | \ 136 (rol(block->l[i], 8) & 0x00FF00FF)) 140 #define blk(i) (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ \ 145 z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \ 146 w = rol(w, 30); 148 z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \ 149 w = rol(w, 30); 151 z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30); 153 z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \ [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | sha1-internal.c | 130 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 135 #define blk0(i) (block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | \ 136 (rol(block->l[i], 8) & 0x00FF00FF)) 140 #define blk(i) (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ \ 145 z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \ 146 w = rol(w, 30); 148 z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \ 149 w = rol(w, 30); 151 z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30); 153 z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \ [all …]
|
/third_party/ffmpeg/libavformat/ |
D | redspark.c | 29 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 45 key = rol(key, 11); in redspark_probe() 47 key += rol(key, 3); in redspark_probe() 78 key = rol(key, 11); in redspark_read_header() 81 key += rol(key, 3); in redspark_read_header()
|
/third_party/boringssl/win-x86/crypto/chacha/ |
D | chacha-x86.asm | 113 rol edx,16 117 rol ebx,12 122 rol edx,8 128 rol ebx,7 131 rol edi,16 137 rol ebp,12 142 rol edi,8 148 rol ebp,7 151 rol edx,16 157 rol ebx,12 [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Support/ |
D | SHA1.cpp | 30 static inline uint32_t rol(uint32_t Number, int Bits) { in rol() function 37 Buf[I & 15] = rol(Buf[(I + 13) & 15] ^ Buf[(I + 8) & 15] ^ Buf[(I + 2) & 15] ^ in blk() 45 E += ((B & (C ^ D)) ^ D) + blk0(Buf, I) + 0x5A827999 + rol(A, 5); in r0() 46 B = rol(B, 30); in r0() 51 E += ((B & (C ^ D)) ^ D) + blk(Buf, I) + 0x5A827999 + rol(A, 5); in r1() 52 B = rol(B, 30); in r1() 57 E += (B ^ C ^ D) + blk(Buf, I) + 0x6ED9EBA1 + rol(A, 5); in r2() 58 B = rol(B, 30); in r2() 63 E += (((B | C) & D) | (B & C)) + blk(Buf, I) + 0x8F1BBCDC + rol(A, 5); in r3() 64 B = rol(B, 30); in r3() [all …]
|
/third_party/boost/boost/beast/core/detail/ |
D | sha1.ipp | 37 rol(std::uint32_t value, std::size_t bits) 46 return rol( 57 z += ((w&(x^y))^y) + block[i] + 0x5a827999 + rol(v, 5); 58 w = rol(w, 30); 69 z += ((w&(x^y))^y) + block[i] + 0x5a827999 + rol(v, 5); 70 w = rol(w, 30); 80 z += (w^x^y) + block[i] + 0x6ed9eba1 + rol(v, 5); 81 w = rol(w, 30); 91 z += (((w|x)&y)|(w&x)) + block[i] + 0x8f1bbcdc + rol(v, 5); 92 w = rol(w, 30); [all …]
|
/third_party/toybox/toys/lsb/ |
D | md5sum.c | 168 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 194 work += block[count] = (rol(block[count],24)&0xFF00FF00) in sha1_transform() 195 | (rol(block[count],8)&0x00FF00FF); in sha1_transform() 197 work += block[count&15] = rol(block[(count+13)&15] in sha1_transform() 199 *rot[4] += work + rol(*rot[0],5) + rconsts[i]; in sha1_transform() 200 *rot[1] = rol(*rot[1],30); in sha1_transform()
|
/third_party/pcre2/pcre2/src/sljit/ |
D | sljitNativeARM_32.c | 1269 sljit_s32 rol; in get_imm() local 1276 rol = 8; in get_imm() 1280 rol = 0; in get_imm() 1285 rol += 4; in get_imm() 1290 rol += 2; in get_imm() 1295 rol += 1; in get_imm() 1299 return SRC2_IMM | (imm >> 24) | (rol << 8); in get_imm() 1310 sljit_s32 rol; in generate_int() local 1314 rol = 8; in generate_int() 1318 imm = (imm << rol) | (imm >> (32 - rol)); in generate_int() [all …]
|
/third_party/musl/src/crypt/ |
D | crypt_md5.c | 20 static uint32_t rol(uint32_t n, int k) { return (n << k) | (n >> (32-k)); } in rol() function 25 #define FF(a,b,c,d,w,s,t) a += F(b,c,d) + w + t; a = rol(a,s) + b 26 #define GG(a,b,c,d,w,s,t) a += G(b,c,d) + w + t; a = rol(a,s) + b 27 #define HH(a,b,c,d,w,s,t) a += H(b,c,d) + w + t; a = rol(a,s) + b 28 #define II(a,b,c,d,w,s,t) a += I(b,c,d) + w + t; a = rol(a,s) + b
|
/third_party/boost/boost/beast/websocket/detail/ |
D | mask.ipp | 31 rol(prepared_key& v, std::size_t n) 57 rol(key, n);
|
/third_party/boringssl/win-x86_64/crypto/chacha/ |
D | chacha-x86_64.asm | 129 rol r12d,16 132 rol r13d,16 135 rol r8d,12 138 rol r9d,12 141 rol r12d,8 144 rol r13d,8 147 rol r8d,7 150 rol r9d,7 157 rol r14d,16 160 rol r15d,16 [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/X86/ |
D | X86InstrShiftRotate.td | 460 "rol{b}\t{%cl, $dst|$dst, cl}", 463 "rol{w}\t{%cl, $dst|$dst, cl}", 466 "rol{l}\t{%cl, $dst|$dst, cl}", 469 "rol{q}\t{%cl, $dst|$dst, cl}", 474 "rol{b}\t{$src2, $dst|$dst, $src2}", 477 "rol{w}\t{$src2, $dst|$dst, $src2}", 481 "rol{l}\t{$src2, $dst|$dst, $src2}", 486 "rol{q}\t{$src2, $dst|$dst, $src2}", 491 "rol{b}\t$dst", 494 "rol{w}\t$dst", [all …]
|
/third_party/boringssl/src/crypto/chacha/asm/ |
D | chacha-x86_64.pl | 163 "&rol (@x[$d0],16)", 166 "&rol (@x[$d1],16)", 170 "&rol (@x[$b0],12)", 173 "&rol (@x[$b1],12)", 177 "&rol (@x[$d0],8)", 180 "&rol (@x[$d1],8)", 184 "&rol (@x[$b0],7)", 187 "&rol (@x[$b1],7)", 196 "&rol (@x[$d2],16)", 199 "&rol (@x[$d3],16)", [all …]
|
D | chacha-x86.pl | 91 &rol ($d,16); 97 &rol ($b,12); 103 &rol ($d,8); 110 &rol ($b,7);
|