/third_party/node/deps/openssl/openssl/crypto/camellia/ |
D | camellia.c | 288 register u32 s0, s1, s2, s3; in Camellia_Ekeygen() local 292 k[2] = s2 = GETU32(rawKey + 8); in Camellia_Ekeygen() 299 k[10] = s2 = ~s0; in Camellia_Ekeygen() 302 k[10] = s2 = GETU32(rawKey + 24); in Camellia_Ekeygen() 305 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen() 309 Camellia_Feistel(s0, s1, s2, s3, SIGMA + 0); in Camellia_Ekeygen() 310 Camellia_Feistel(s2, s3, s0, s1, SIGMA + 2); in Camellia_Ekeygen() 312 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen() 313 Camellia_Feistel(s0, s1, s2, s3, SIGMA + 4); in Camellia_Ekeygen() 314 Camellia_Feistel(s2, s3, s0, s1, SIGMA + 6); in Camellia_Ekeygen() [all …]
|
/third_party/openssl/crypto/camellia/ |
D | camellia.c | 288 register u32 s0, s1, s2, s3; in Camellia_Ekeygen() local 292 k[2] = s2 = GETU32(rawKey + 8); in Camellia_Ekeygen() 299 k[10] = s2 = ~s0; in Camellia_Ekeygen() 302 k[10] = s2 = GETU32(rawKey + 24); in Camellia_Ekeygen() 305 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen() 309 Camellia_Feistel(s0, s1, s2, s3, SIGMA + 0); in Camellia_Ekeygen() 310 Camellia_Feistel(s2, s3, s0, s1, SIGMA + 2); in Camellia_Ekeygen() 312 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen() 313 Camellia_Feistel(s0, s1, s2, s3, SIGMA + 4); in Camellia_Ekeygen() 314 Camellia_Feistel(s2, s3, s0, s1, SIGMA + 6); in Camellia_Ekeygen() [all …]
|
/third_party/openssl/crypto/aes/asm/ |
D | aes-armv4.pl | 61 $s2="r2"; 229 ldrb $s2,[$rounds,#11] 235 orr $s2,$s2,$t1,lsl#8 237 orr $s2,$s2,$t2,lsl#16 239 orr $s2,$s2,$t3,lsl#24 248 ldr $s2,[$rounds,#8] 253 rev $s2,$s2 264 rev $s2,$s2 269 str $s2,[$rounds,#8] 284 mov $t1,$s2,lsr#24 [all …]
|
D | aes-s390x.pl | 119 $s2="%r10"; 275 llgf $s2,8($inp) 284 st $s2,8($out) 297 x $s2,8($key) 333 srlg $i1,$s2,`8-3` # i0 334 srlg $i2,$s2,`16-3` # i1 337 sllg $i3,$s2,`0+3` 338 srl $s2,`24-3` 339 nr $s2,$mask 351 l $s2,0($s2,$tbl) # Te0[s2>>24] [all …]
|
D | aes-ppc.pl | 88 $s2="r10"; 381 lwz $s2,8($inp) 391 rotlwi $s2,$t2,8 395 rlwimi $s2,$t2,24,0,7 399 rlwimi $s2,$t2,24,16,23 410 rotlwi $t2,$s2,8 414 rlwimi $t2,$s2,24,0,7 418 rlwimi $t2,$s2,24,16,23 428 stw $s2,8($out) 455 lbz $s2,11($inp) [all …]
|
/third_party/node/deps/openssl/openssl/crypto/aes/asm/ |
D | aes-armv4.pl | 61 $s2="r2"; 229 ldrb $s2,[$rounds,#11] 235 orr $s2,$s2,$t1,lsl#8 237 orr $s2,$s2,$t2,lsl#16 239 orr $s2,$s2,$t3,lsl#24 248 ldr $s2,[$rounds,#8] 253 rev $s2,$s2 264 rev $s2,$s2 269 str $s2,[$rounds,#8] 284 mov $t1,$s2,lsr#24 [all …]
|
D | aes-s390x.pl | 119 $s2="%r10"; 275 llgf $s2,8($inp) 284 st $s2,8($out) 297 x $s2,8($key) 333 srlg $i1,$s2,`8-3` # i0 334 srlg $i2,$s2,`16-3` # i1 337 sllg $i3,$s2,`0+3` 338 srl $s2,`24-3` 339 nr $s2,$mask 351 l $s2,0($s2,$tbl) # Te0[s2>>24] [all …]
|
D | aes-ppc.pl | 88 $s2="r10"; 381 lwz $s2,8($inp) 391 rotlwi $s2,$t2,8 395 rlwimi $s2,$t2,24,0,7 399 rlwimi $s2,$t2,24,16,23 410 rotlwi $t2,$s2,8 414 rlwimi $t2,$s2,24,0,7 418 rlwimi $t2,$s2,24,16,23 428 stw $s2,8($out) 455 lbz $s2,11($inp) [all …]
|
/third_party/skia/third_party/externals/zlib/ |
D | adler32_simd.c | 65 uint32_t s2 = adler >> 16; in adler32_simd_() local 96 __m128i v_s2 = _mm_set_epi32(0, 0, 0, s2); in adler32_simd_() 144 s2 = _mm_cvtsi128_si32(v_s2); in adler32_simd_() 153 s2 %= BASE; in adler32_simd_() 161 s2 += (s1 += *buf++); in adler32_simd_() 162 s2 += (s1 += *buf++); in adler32_simd_() 163 s2 += (s1 += *buf++); in adler32_simd_() 164 s2 += (s1 += *buf++); in adler32_simd_() 166 s2 += (s1 += *buf++); in adler32_simd_() 167 s2 += (s1 += *buf++); in adler32_simd_() [all …]
|
/third_party/node/deps/zlib/ |
D | adler32_simd.c | 65 uint32_t s2 = adler >> 16; in adler32_simd_() local 96 __m128i v_s2 = _mm_set_epi32(0, 0, 0, s2); in adler32_simd_() 144 s2 = _mm_cvtsi128_si32(v_s2); in adler32_simd_() 153 s2 %= BASE; in adler32_simd_() 161 s2 += (s1 += *buf++); in adler32_simd_() 162 s2 += (s1 += *buf++); in adler32_simd_() 163 s2 += (s1 += *buf++); in adler32_simd_() 164 s2 += (s1 += *buf++); in adler32_simd_() 166 s2 += (s1 += *buf++); in adler32_simd_() 167 s2 += (s1 += *buf++); in adler32_simd_() [all …]
|
/third_party/node/deps/v8/third_party/zlib/ |
D | adler32_simd.c | 65 uint32_t s2 = adler >> 16; in adler32_simd_() local 96 __m128i v_s2 = _mm_set_epi32(0, 0, 0, s2); in adler32_simd_() 144 s2 = _mm_cvtsi128_si32(v_s2); in adler32_simd_() 153 s2 %= BASE; in adler32_simd_() 161 s2 += (s1 += *buf++); in adler32_simd_() 162 s2 += (s1 += *buf++); in adler32_simd_() 163 s2 += (s1 += *buf++); in adler32_simd_() 164 s2 += (s1 += *buf++); in adler32_simd_() 166 s2 += (s1 += *buf++); in adler32_simd_() 167 s2 += (s1 += *buf++); in adler32_simd_() [all …]
|
/third_party/python/Tools/stringbench/ |
D | stringbench.py | 78 s2 = STR("A") 80 s2 in s1 85 s2 = STR("B") 87 s2 in s1 93 s2 = STR("AB") 95 s2 in s1 100 s2 = STR("BC") 102 s2 in s1 107 s2 = STR("BC") 109 s2 in s1 [all …]
|
/third_party/typescript/tests/baselines/reference/ |
D | assignmentCompatWithObjectMembers.js | 13 var s2: S2; variable 24 s = s2; 27 s2 = t2; 28 t2 = s2; 29 s2 = t; 30 s2 = b; 31 s2 = a2; 36 a = s2; 54 var s2: S2; variable 65 s = s2; [all …]
|
D | assignmentCompatWithObjectMembersStringNumericNames.js | 13 var s2: S2; variable 24 s = s2; // ok 27 s2 = t2; 28 t2 = s2; 29 s2 = t; 30 s2 = b; 31 s2 = a2; 36 a = s2; 54 var s2: S2; variable 65 s = s2; // ok [all …]
|
D | assignmentCompatWithObjectMembersStringNumericNames.types | 30 var s2: S2; 31 >s2 : S2 68 s = s2; // ok 69 >s = s2 : S2 71 >s2 : S2 78 s2 = t2; 79 >s2 = t2 : T2 80 >s2 : S2 83 t2 = s2; 84 >t2 = s2 : S2 [all …]
|
D | assignmentCompatWithObjectMembers.types | 28 var s2: S2; 29 >s2 : S2 64 s = s2; 65 >s = s2 : S2 67 >s2 : S2 74 s2 = t2; 75 >s2 = t2 : T2 76 >s2 : S2 79 t2 = s2; 80 >t2 = s2 : S2 [all …]
|
D | assignmentCompatWithObjectMembers4.js | 16 var s2: S2; variable 27 s = s2; // ok 30 s2 = t2; // error 31 t2 = s2; // error 32 s2 = t; // error 33 s2 = b; // error 34 s2 = a2; // ok 39 a = s2; // ok 61 var s2: S2; variable 72 s = s2; // ok [all …]
|
D | assignmentCompatWithObjectMembers4.types | 41 var s2: S2; 42 >s2 : S2 79 s = s2; // ok 80 >s = s2 : S2 82 >s2 : S2 89 s2 = t2; // error 90 >s2 = t2 : T2 91 >s2 : S2 94 t2 = s2; // error 95 >t2 = s2 : S2 [all …]
|
D | callWithSpread3.types | 2 declare const s2: [string, string]; 3 >s2 : [string, string] 46 fs2('a', ...s2); // error on ...s2 47 >fs2('a', ...s2) : void 50 >...s2 : string 51 >s2 : [string, string] 53 fs2('a', 'b', 'c', ...s2); // error on 'c' and ...s2 54 >fs2('a', 'b', 'c', ...s2) : void 59 >...s2 : string 60 >s2 : [string, string] [all …]
|
D | noImplicitSymbolToString.js | 31 let s2!: S | string; variable 32 `${s2}`; 33 s2 + ''; 34 +s2; 43 let s2!: S | symbol; variable 44 `${s2}`; 45 s2 + ''; 46 +s2; 68 var s2; 69 "".concat(s2); [all …]
|
D | noImplicitSymbolToString.types | 74 let s2!: S | string; 75 >s2 : string | S 77 `${s2}`; 78 >`${s2}` : string 79 >s2 : string | S 81 s2 + ''; 82 >s2 + '' : string 83 >s2 : string | S 86 +s2; 87 >+s2 : number [all …]
|
D | callWithSpread3.symbols | 2 declare const s2: [string, string]; 3 >s2 : Symbol(s2, Decl(callWithSpread3.ts, 0, 13)) 46 fs2('a', ...s2); // error on ...s2 48 >s2 : Symbol(s2, Decl(callWithSpread3.ts, 0, 13)) 50 fs2('a', 'b', 'c', ...s2); // error on 'c' and ...s2 52 >s2 : Symbol(s2, Decl(callWithSpread3.ts, 0, 13)) 54 fs2('a', 'b', ...s2, 'c'); // error on ...s2 and 'c' 56 >s2 : Symbol(s2, Decl(callWithSpread3.ts, 0, 13)) 58 fs2('a', 'b', 'c', ...s2, 'd'); // error on 'c', ...s2 and 'd' 60 >s2 : Symbol(s2, Decl(callWithSpread3.ts, 0, 13)) [all …]
|
/third_party/skia/tests/ |
D | StrokeTest.cpp | 92 SkStrokeRec s2(SkStrokeRec::kFill_InitStyle); in test_strokerec_equality() local 93 REPORTER_ASSERT(reporter, s1.hasEqualEffect(s2)); in test_strokerec_equality() 96 s2.setHairlineStyle(); in test_strokerec_equality() 97 REPORTER_ASSERT(reporter, !s1.hasEqualEffect(s2)); in test_strokerec_equality() 100 REPORTER_ASSERT(reporter, s1.hasEqualEffect(s2)); in test_strokerec_equality() 104 s2.setResScale(1.2f); in test_strokerec_equality() 105 REPORTER_ASSERT(reporter, s1.hasEqualEffect(s2)); in test_strokerec_equality() 107 s2.setFillStyle(); in test_strokerec_equality() 108 REPORTER_ASSERT(reporter, s1.hasEqualEffect(s2)); in test_strokerec_equality() 110 s2.setStrokeStyle(1.0f, false); in test_strokerec_equality() [all …]
|
/third_party/ltp/tools/sparse/sparse-src/validation/ |
D | designated-init.c | 6 struct s2 { struct 13 struct s2 s2; member 18 struct s2 s2; member 23 static struct s2 s2_positional = { 5, 10 }; 24 static struct s2 s2_designated = { .x = 5, .y = 10 }; 31 .s2 = { 5, 10 }, 39 .s2 = { .x = 5, .y = 10 }, 47 .s2 = { 5, 10 }, 55 .s2 = { .x = 5, .y = 10 }, 70 static struct s2 s2_array[] = { [all …]
|
/third_party/FreeBSD/sys/crypto/rijndael/ |
D | rijndael-alg-fst.c | 864 u32 s0, s1, s2, s3, t0, t1, t2, t3; in rijndaelEncrypt() local 875 s2 = GETU32(pt + 8) ^ rk[2]; in rijndaelEncrypt() 879 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; in rijndaelEncrypt() 880 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5]; in rijndaelEncrypt() 881 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6]; in rijndaelEncrypt() 882 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7]; in rijndaelEncrypt() 886 s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; in rijndaelEncrypt() 889 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; in rijndaelEncrypt() 890 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13]; in rijndaelEncrypt() 891 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[14]; in rijndaelEncrypt() [all …]
|