/third_party/node/deps/openssl/openssl/crypto/sha/ |
H A D | sha3.c | 23 size_t bsz = SHA3_BLOCKSIZE(bitlen); in ossl_sha3_init() local 25 if (bsz <= sizeof(ctx->buf)) { in ossl_sha3_init() 27 ctx->block_size = bsz; in ossl_sha3_init() 48 size_t bsz = ctx->block_size; in ossl_sha3_update() local 55 rem = bsz - num; in ossl_sha3_update() 69 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_update() 74 if (len >= bsz) in ossl_sha3_update() 75 rem = SHA3_absorb(ctx->A, inp, len, bsz); in ossl_sha3_update() 89 size_t bsz in ossl_sha3_final() local [all...] |
/third_party/openssl/crypto/sha/ |
H A D | sha3.c | 23 size_t bsz = SHA3_BLOCKSIZE(bitlen); in ossl_sha3_init() local 25 if (bsz <= sizeof(ctx->buf)) { in ossl_sha3_init() 27 ctx->block_size = bsz; in ossl_sha3_init() 48 size_t bsz = ctx->block_size; in ossl_sha3_update() local 55 rem = bsz - num; in ossl_sha3_update() 69 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_update() 74 if (len >= bsz) in ossl_sha3_update() 75 rem = SHA3_absorb(ctx->A, inp, len, bsz); in ossl_sha3_update() 89 size_t bsz in ossl_sha3_final() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/sha/asm/ |
H A D | keccak1600-avx512.pl | 279 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 346 mov $bsz,%rax 347 sub $bsz,$len 362 lea ($inp,$bsz),$inp 385 lea ($len,$bsz),%rax # return value 396 cmp $bsz,$len 440 shr \$3,$bsz 442 mov $bsz,%rax 457 sub \$1,%rax # bsz-- 473 mov $bsz, [all...] |
H A D | keccak1600-x86_64.pl | 412 { my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 448 mov $bsz,216-100(%rsi) # save bsz 451 cmp $bsz,$len 454 shr \$3,$bsz 464 sub \$1,$bsz 472 mov 216-100(%rsi),$bsz # pull bsz 506 { my ($A_flat,$out,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 507 ($out,$len,$bsz) [all...] |
H A D | keccak1600-avx2.pl | 281 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 316 mov $bsz,%rax 317 sub $bsz,$len 335 lea ($inp,$bsz),$inp 362 lea ($len,$bsz),%rax # return value 373 shr \$3,$bsz 386 mov $bsz,%rax 415 mov $bsz,%rax
|
H A D | keccak1600-avx512vl.pl | 182 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 225 mov $bsz,%rax 226 sub $bsz,$len 244 lea ($inp,$bsz),$inp 271 lea ($len,$bsz),%rax # return value 283 shr \$3,$bsz 303 mov $bsz,%rax 332 mov $bsz,%rax
|
H A D | keccak1600-s390x.pl | 395 { my ($A_flat,$inp,$len,$bsz) = map("%r$_",(2..5)); 427 cl${g}r $len,$bsz 430 srl${g} $bsz,3 440 brct $bsz,.Lblock_absorb 445 lm${g} $inp,$bsz,$frame+3*$SIZE_T($sp) 475 { my ($A_flat,$out,$len,$bsz) = map("%r$_",(2..5)); 482 srl${g} $bsz,3 485 st${g} $bsz,5*$SIZE_T($sp) 502 brct $bsz,.Loop_squeeze # bsz [all...] |
H A D | keccak1600-armv8.pl | 381 mov $C[3],x3 // size_t bsz 399 subs $C[0],$C[2],$C[3] // len - bsz 402 str $C[0],[sp,#48] // save len - bsz 468 my ($A_flat,$out,$len,$bsz) = map("x$_",(19..22)); 483 mov $bsz,x3 502 mov x3,$bsz 695 my ($ctx,$inp,$len,$bsz) = map("x$_",(0..3)); 722 subs $len,$len,$bsz // len - bsz 733 cmp $bsz,# [all...] |
H A D | keccak1600p8-ppc.pl | 378 my ($A_jagged,$inp,$len,$bsz) = map("r$_",(3..6)); 477 $UCMP $len,$bsz ; len < bsz? 480 sub $len,$len,$bsz ; len -= bsz 481 srwi r0,$bsz,3 685 my ($A_jagged,$out,$len,$bsz) = map("r$_",(3..6)); 695 mr r10,$bsz 750 mr r10,$bsz
|
H A D | keccak1600-armv4.pl | 752 { my ($A_flat,$inp,$len,$bsz) = map("r$_",(10..12,14)); 790 mov $bsz,r3 832 subs r0,$len,$bsz 835 str r0,[sp,#480] @ save len - bsz 896 subs $bsz,$bsz,#8 935 { my ($out,$len,$A_flat,$bsz) = map("r$_", (4,5,10,12)); 947 mov $bsz,r3 1038 subs $bsz,$bsz,# [all...] |
H A D | keccak1600-ppc64.pl | 445 $PUSH r6,`$LOCALS+3*$SIZE_T`($sp) ; save bsz 483 $UCMP r4,r5 ; len < bsz? 486 sub r4,r4,r5 ; len -= bsz 571 $POP r5,`$LOCALS+3*$SIZE_T`($sp) ; restore bsz 637 my ($A_flat,$out,$len,$bsz) = map("r$_",(28..31)); 655 mr $bsz,r6 689 mr r6,$bsz
|
/third_party/openssl/crypto/sha/asm/ |
H A D | keccak1600-avx512.pl | 279 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 346 mov $bsz,%rax 347 sub $bsz,$len 362 lea ($inp,$bsz),$inp 385 lea ($len,$bsz),%rax # return value 396 cmp $bsz,$len 440 shr \$3,$bsz 442 mov $bsz,%rax 457 sub \$1,%rax # bsz-- 473 mov $bsz, [all...] |
H A D | keccak1600-x86_64.pl | 412 { my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 448 mov $bsz,216-100(%rsi) # save bsz 451 cmp $bsz,$len 454 shr \$3,$bsz 464 sub \$1,$bsz 472 mov 216-100(%rsi),$bsz # pull bsz 506 { my ($A_flat,$out,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 507 ($out,$len,$bsz) [all...] |
H A D | keccak1600-avx2.pl | 281 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 316 mov $bsz,%rax 317 sub $bsz,$len 335 lea ($inp,$bsz),$inp 362 lea ($len,$bsz),%rax # return value 373 shr \$3,$bsz 386 mov $bsz,%rax 415 mov $bsz,%rax
|
H A D | keccak1600-avx512vl.pl | 182 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 225 mov $bsz,%rax 226 sub $bsz,$len 244 lea ($inp,$bsz),$inp 271 lea ($len,$bsz),%rax # return value 283 shr \$3,$bsz 303 mov $bsz,%rax 332 mov $bsz,%rax
|
H A D | keccak1600-s390x.pl | 395 { my ($A_flat,$inp,$len,$bsz) = map("%r$_",(2..5)); 427 cl${g}r $len,$bsz 430 srl${g} $bsz,3 440 brct $bsz,.Lblock_absorb 445 lm${g} $inp,$bsz,$frame+3*$SIZE_T($sp) 475 { my ($A_flat,$out,$len,$bsz) = map("%r$_",(2..5)); 482 srl${g} $bsz,3 485 st${g} $bsz,5*$SIZE_T($sp) 502 brct $bsz,.Loop_squeeze # bsz [all...] |
H A D | keccak1600-armv8.pl | 384 mov $C[3],x3 // size_t bsz 402 subs $C[0],$C[2],$C[3] // len - bsz 405 str $C[0],[sp,#48] // save len - bsz 471 my ($A_flat,$out,$len,$bsz) = map("x$_",(19..22)); 486 mov $bsz,x3 505 mov x3,$bsz 699 my ($ctx,$inp,$len,$bsz) = map("x$_",(0..3)); 726 subs $len,$len,$bsz // len - bsz 737 cmp $bsz,# [all...] |
H A D | keccak1600p8-ppc.pl | 378 my ($A_jagged,$inp,$len,$bsz) = map("r$_",(3..6)); 477 $UCMP $len,$bsz ; len < bsz? 480 sub $len,$len,$bsz ; len -= bsz 481 srwi r0,$bsz,3 685 my ($A_jagged,$out,$len,$bsz) = map("r$_",(3..6)); 695 mr r10,$bsz 750 mr r10,$bsz
|
H A D | keccak1600-armv4.pl | 752 { my ($A_flat,$inp,$len,$bsz) = map("r$_",(10..12,14)); 790 mov $bsz,r3 832 subs r0,$len,$bsz 835 str r0,[sp,#480] @ save len - bsz 896 subs $bsz,$bsz,#8 935 { my ($out,$len,$A_flat,$bsz) = map("r$_", (4,5,10,12)); 947 mov $bsz,r3 1038 subs $bsz,$bsz,# [all...] |
H A D | keccak1600-ppc64.pl | 445 $PUSH r6,`$LOCALS+3*$SIZE_T`($sp) ; save bsz 483 $UCMP r4,r5 ; len < bsz? 486 sub r4,r4,r5 ; len -= bsz 571 $POP r5,`$LOCALS+3*$SIZE_T`($sp) ; restore bsz 637 my ($A_flat,$out,$len,$bsz) = map("r$_",(28..31)); 655 mr $bsz,r6 689 mr r6,$bsz
|
/third_party/node/deps/openssl/openssl/providers/implementations/digests/ |
H A D | sha3_prov.c | 71 const size_t bsz = ctx->block_size; in keccak_update() local 80 rem = bsz - num; in keccak_update() 92 ctx->meth.absorb(ctx, ctx->buf, bsz); in keccak_update()
|
/third_party/openssl/providers/implementations/digests/ |
H A D | sha3_prov.c | 71 const size_t bsz = ctx->block_size; in keccak_update() local 80 rem = bsz - num; in keccak_update() 92 ctx->meth.absorb(ctx, ctx->buf, bsz); in keccak_update()
|
/third_party/mesa3d/src/panfrost/bifrost/ |
H A D | bifrost_nir_algebraic.py | 51 for bsz in [8, 16, 32]: 54 ((f'b2f{fsz}', ('inot', f'a@{bsz}')), (f'b{bsz}csel', a, 0.0, 1.0)), 55 ((f'b2f{fsz}', f'a@{bsz}'), (f'b{bsz}csel', a, 1.0, 0.0)),
|
/third_party/backends/backend/ |
H A D | epsonds.h | 176 size_t bsz; /* transfer buffer size */ member
|
/third_party/mesa3d/src/gallium/tests/trivial/ |
H A D | compute.c | 453 int bsz[] = { 4, 3, 5, 1}; in test_system_values_expect() local 458 *(uint32_t *)p = tid[c] / bsz[c]; in test_system_values_expect() 461 *(uint32_t *)p = bsz[c]; in test_system_values_expect() 467 *(uint32_t *)p = tid[c] % bsz[c]; in test_system_values_expect()
|