/third_party/openssl/crypto/sha/ |
D | sha3.c | 23 size_t bsz = SHA3_BLOCKSIZE(bitlen); in ossl_sha3_init() local 25 if (bsz <= sizeof(ctx->buf)) { in ossl_sha3_init() 27 ctx->block_size = bsz; in ossl_sha3_init() 48 size_t bsz = ctx->block_size; in ossl_sha3_update() local 55 rem = bsz - num; in ossl_sha3_update() 69 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_update() 74 if (len >= bsz) in ossl_sha3_update() 75 rem = SHA3_absorb(ctx->A, inp, len, bsz); in ossl_sha3_update() 89 size_t bsz = ctx->block_size; in ossl_sha3_final() local 100 memset(ctx->buf + num, 0, bsz - num); in ossl_sha3_final() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/sha/ |
D | sha3.c | 23 size_t bsz = SHA3_BLOCKSIZE(bitlen); in ossl_sha3_init() local 25 if (bsz <= sizeof(ctx->buf)) { in ossl_sha3_init() 27 ctx->block_size = bsz; in ossl_sha3_init() 48 size_t bsz = ctx->block_size; in ossl_sha3_update() local 55 rem = bsz - num; in ossl_sha3_update() 69 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_update() 74 if (len >= bsz) in ossl_sha3_update() 75 rem = SHA3_absorb(ctx->A, inp, len, bsz); in ossl_sha3_update() 89 size_t bsz = ctx->block_size; in ossl_sha3_final() local 100 memset(ctx->buf + num, 0, bsz - num); in ossl_sha3_final() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/sha/asm/ |
D | keccak1600p8-ppc.pl | 378 my ($A_jagged,$inp,$len,$bsz) = map("r$_",(3..6)); 477 $UCMP $len,$bsz ; len < bsz? 480 sub $len,$len,$bsz ; len -= bsz 481 srwi r0,$bsz,3 685 my ($A_jagged,$out,$len,$bsz) = map("r$_",(3..6)); 695 mr r10,$bsz 750 mr r10,$bsz
|
D | keccak1600-avx512vl.pl | 182 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 225 mov $bsz,%rax 226 sub $bsz,$len 244 lea ($inp,$bsz),$inp 271 lea ($len,$bsz),%rax # return value 283 shr \$3,$bsz 303 mov $bsz,%rax 332 mov $bsz,%rax
|
D | keccak1600-avx512.pl | 279 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 346 mov $bsz,%rax 347 sub $bsz,$len 362 lea ($inp,$bsz),$inp 385 lea ($len,$bsz),%rax # return value 396 cmp $bsz,$len 440 shr \$3,$bsz 442 mov $bsz,%rax 473 mov $bsz,%rax
|
D | keccak1600-avx2.pl | 281 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 316 mov $bsz,%rax 317 sub $bsz,$len 335 lea ($inp,$bsz),$inp 362 lea ($len,$bsz),%rax # return value 373 shr \$3,$bsz 386 mov $bsz,%rax 415 mov $bsz,%rax
|
D | keccak1600-x86_64.pl | 412 { my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 448 mov $bsz,216-100(%rsi) # save bsz 451 cmp $bsz,$len 454 shr \$3,$bsz 464 sub \$1,$bsz 472 mov 216-100(%rsi),$bsz # pull bsz 506 { my ($A_flat,$out,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 507 ($out,$len,$bsz) = ("%r12","%r13","%r14"); 526 mov %rcx,$bsz 546 mov $bsz,%rcx
|
D | keccak1600-s390x.pl | 395 { my ($A_flat,$inp,$len,$bsz) = map("%r$_",(2..5)); 427 cl${g}r $len,$bsz 430 srl${g} $bsz,3 440 brct $bsz,.Lblock_absorb 445 lm${g} $inp,$bsz,$frame+3*$SIZE_T($sp) 475 { my ($A_flat,$out,$len,$bsz) = map("%r$_",(2..5)); 482 srl${g} $bsz,3 485 st${g} $bsz,5*$SIZE_T($sp) 502 brct $bsz,.Loop_squeeze # bsz-- 506 lm${g} $out,$bsz,3*$SIZE_T($sp)
|
D | keccak1600-armv8.pl | 468 my ($A_flat,$out,$len,$bsz) = map("x$_",(19..22)); 483 mov $bsz,x3 502 mov x3,$bsz 695 my ($ctx,$inp,$len,$bsz) = map("x$_",(0..3)); 722 subs $len,$len,$bsz // len - bsz 733 cmp $bsz,#8*($i+2) 767 add x0,$len,$bsz // return value 780 my ($ctx,$out,$len,$bsz) = map("x$_",(0..3)); 790 mov x10,$bsz 809 mov x10,$bsz
|
D | keccak1600-armv4.pl | 752 { my ($A_flat,$inp,$len,$bsz) = map("r$_",(10..12,14)); 790 mov $bsz,r3 832 subs r0,$len,$bsz 896 subs $bsz,$bsz,#8 935 { my ($out,$len,$A_flat,$bsz) = map("r$_", (4,5,10,12)); 947 mov $bsz,r3 1038 subs $bsz,$bsz,#8 @ bsz -= 8
|
D | keccak1600-ppc64.pl | 637 my ($A_flat,$out,$len,$bsz) = map("r$_",(28..31)); 655 mr $bsz,r6 689 mr r6,$bsz
|
/third_party/openssl/crypto/sha/asm/ |
D | keccak1600p8-ppc.pl | 378 my ($A_jagged,$inp,$len,$bsz) = map("r$_",(3..6)); 477 $UCMP $len,$bsz ; len < bsz? 480 sub $len,$len,$bsz ; len -= bsz 481 srwi r0,$bsz,3 685 my ($A_jagged,$out,$len,$bsz) = map("r$_",(3..6)); 695 mr r10,$bsz 750 mr r10,$bsz
|
D | keccak1600-avx512vl.pl | 182 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 225 mov $bsz,%rax 226 sub $bsz,$len 244 lea ($inp,$bsz),$inp 271 lea ($len,$bsz),%rax # return value 283 shr \$3,$bsz 303 mov $bsz,%rax 332 mov $bsz,%rax
|
D | keccak1600-avx512.pl | 279 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 346 mov $bsz,%rax 347 sub $bsz,$len 362 lea ($inp,$bsz),$inp 385 lea ($len,$bsz),%rax # return value 396 cmp $bsz,$len 440 shr \$3,$bsz 442 mov $bsz,%rax 473 mov $bsz,%rax
|
D | keccak1600-avx2.pl | 281 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 316 mov $bsz,%rax 317 sub $bsz,$len 335 lea ($inp,$bsz),$inp 362 lea ($len,$bsz),%rax # return value 373 shr \$3,$bsz 386 mov $bsz,%rax 415 mov $bsz,%rax
|
D | keccak1600-x86_64.pl | 412 { my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 448 mov $bsz,216-100(%rsi) # save bsz 451 cmp $bsz,$len 454 shr \$3,$bsz 464 sub \$1,$bsz 472 mov 216-100(%rsi),$bsz # pull bsz 506 { my ($A_flat,$out,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 507 ($out,$len,$bsz) = ("%r12","%r13","%r14"); 526 mov %rcx,$bsz 546 mov $bsz,%rcx
|
D | keccak1600-s390x.pl | 395 { my ($A_flat,$inp,$len,$bsz) = map("%r$_",(2..5)); 427 cl${g}r $len,$bsz 430 srl${g} $bsz,3 440 brct $bsz,.Lblock_absorb 445 lm${g} $inp,$bsz,$frame+3*$SIZE_T($sp) 475 { my ($A_flat,$out,$len,$bsz) = map("%r$_",(2..5)); 482 srl${g} $bsz,3 485 st${g} $bsz,5*$SIZE_T($sp) 502 brct $bsz,.Loop_squeeze # bsz-- 506 lm${g} $out,$bsz,3*$SIZE_T($sp)
|
D | keccak1600-armv8.pl | 468 my ($A_flat,$out,$len,$bsz) = map("x$_",(19..22)); 483 mov $bsz,x3 502 mov x3,$bsz 695 my ($ctx,$inp,$len,$bsz) = map("x$_",(0..3)); 722 subs $len,$len,$bsz // len - bsz 733 cmp $bsz,#8*($i+2) 767 add x0,$len,$bsz // return value 780 my ($ctx,$out,$len,$bsz) = map("x$_",(0..3)); 790 mov x10,$bsz 809 mov x10,$bsz
|
D | keccak1600-armv4.pl | 752 { my ($A_flat,$inp,$len,$bsz) = map("r$_",(10..12,14)); 790 mov $bsz,r3 832 subs r0,$len,$bsz 896 subs $bsz,$bsz,#8 935 { my ($out,$len,$A_flat,$bsz) = map("r$_", (4,5,10,12)); 947 mov $bsz,r3 1038 subs $bsz,$bsz,#8 @ bsz -= 8
|
D | keccak1600-ppc64.pl | 637 my ($A_flat,$out,$len,$bsz) = map("r$_",(28..31)); 655 mr $bsz,r6 689 mr r6,$bsz
|
/third_party/openssl/providers/implementations/digests/ |
D | sha3_prov.c | 71 const size_t bsz = ctx->block_size; in keccak_update() local 80 rem = bsz - num; in keccak_update() 92 ctx->meth.absorb(ctx, ctx->buf, bsz); in keccak_update()
|
/third_party/node/deps/openssl/openssl/providers/implementations/digests/ |
D | sha3_prov.c | 71 const size_t bsz = ctx->block_size; in keccak_update() local 80 rem = bsz - num; in keccak_update() 92 ctx->meth.absorb(ctx, ctx->buf, bsz); in keccak_update()
|
/third_party/mesa3d/src/panfrost/bifrost/ |
D | bifrost_nir_algebraic.py | 51 for bsz in [8, 16, 32]:
|
/third_party/mesa3d/src/gallium/tests/trivial/ |
D | compute.c | 453 int bsz[] = { 4, 3, 5, 1}; in test_system_values_expect() local 458 *(uint32_t *)p = tid[c] / bsz[c]; in test_system_values_expect() 461 *(uint32_t *)p = bsz[c]; in test_system_values_expect() 467 *(uint32_t *)p = tid[c] % bsz[c]; in test_system_values_expect()
|
/third_party/ntfs-3g/libntfs-3g/ |
D | compress.c | 1080 unsigned int bsz; in ntfs_comp_set() local 1103 bsz = NTFS_SB_SIZE; in ntfs_comp_set() 1105 bsz = insz - p; in ntfs_comp_set() 1107 sz = ntfs_compress_block(&inbuf[p],bsz,pbuf); in ntfs_comp_set()
|