/external/boringssl/win-x86/crypto/md5/ |
D | md5-586.asm | 48 rol eax,7 58 rol edx,12 68 rol ecx,17 78 rol ebx,22 88 rol eax,7 98 rol edx,12 108 rol ecx,17 118 rol ebx,22 128 rol eax,7 138 rol edx,12 [all …]
|
/external/boringssl/win-x86_64/crypto/md5/ |
D | md5-x86_64.asm | 62 rol eax,7 71 rol edx,12 80 rol ecx,17 89 rol ebx,22 98 rol eax,7 107 rol edx,12 116 rol ecx,17 125 rol ebx,22 134 rol eax,7 143 rol edx,12 [all …]
|
/external/boringssl/win-x86_64/crypto/sha/ |
D | sha1-x86_64.asm | 67 rol ecx,5 72 rol edi,30 80 rol ecx,5 85 rol esi,30 93 rol ecx,5 98 rol r13d,30 106 rol ecx,5 111 rol r12d,30 119 rol ecx,5 124 rol r11d,30 [all …]
|
/external/boringssl/win-x86/crypto/sha/ |
D | sha1-586.asm | 113 rol ebp,5 125 rol ebp,5 137 rol ebp,5 149 rol ebp,5 161 rol ebp,5 173 rol ebp,5 185 rol ebp,5 197 rol ebp,5 209 rol ebp,5 221 rol ebp,5 [all …]
|
/external/llvm/test/MC/Mips/ |
D | rotations32.s | 9 rol $4,$5 16 rol $4,$5,$6 23 rol $4,0 26 rol $4,$5,0 29 rol $4,1 34 rol $4,$5,1 39 rol $4,2 44 rol $4,$5,2
|
D | rotations64.s | 9 rol $4,$5 16 rol $4,$5,$6 23 rol $4,0 26 rol $4,$5,0 29 rol $4,1 34 rol $4,$5,1 39 rol $4,2 44 rol $4,$5,2
|
/external/selinux/libselinux/src/ |
D | sha1.c | 43 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 46 #define blk0(i) (block->l[i] = (rol(block->l[i],24)&0xFF00FF00) \ 47 |(rol(block->l[i],8)&0x00FF00FF)) 49 #define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ 53 #define R0(v,w,x,y,z,i) z += ((w&(x^y))^y) + blk0(i)+ 0x5A827999 + rol(v,5); w=rol(w,30); 54 #define R1(v,w,x,y,z,i) z += ((w&(x^y))^y) + blk(i) + 0x5A827999 + rol(v,5); w=rol(w,30); 55 #define R2(v,w,x,y,z,i) z += (w^x^y) + blk(i) + 0x6ED9EBA1 + rol(v,5); w=rol(w,30); 56 #define R3(v,w,x,y,z,i) z += (((w|x)&y)|(w&x)) + blk(i) + 0x8F1BBCDC + rol(v,5); w=rol(w,30); 57 #define R4(v,w,x,y,z,i) z += (w^x^y) + blk(i) + 0xCA62C1D6 + rol(v,5); w=rol(w,30);
|
/external/openssh/openbsd-compat/ |
D | sha1.c | 24 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 31 # define blk0(i) (block->l[i] = (rol(block->l[i],24)&0xFF00FF00) \ 32 |(rol(block->l[i],8)&0x00FF00FF)) 36 #define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ 42 #define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30); 43 #define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30); 44 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 45 #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); 46 #define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30);
|
/external/valgrind/none/tests/ |
D | sha1_test.c | 77 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 82 #define blk0(i) (block->l[i] = (rol(block->l[i],24)&0xFF00FF00) \ 83 |(rol(block->l[i],8)&0x00FF00FF)) 89 #define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ 93 #define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30); 94 #define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30); 95 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 96 #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); 97 #define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30);
|
/external/webrtc/webrtc/base/ |
D | sha1.cc | 119 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 127 #define blk0(i) (block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | \ 128 (rol(block->l[i], 8) & 0x00FF00FF)) 130 #define blk(i) (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ \ 135 z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \ 136 w = rol(w, 30); 138 z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \ 139 w = rol(w, 30); 141 z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5);\ 142 w = rol(w, 30); [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | sha1-internal.c | 130 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 135 #define blk0(i) (block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | \ 136 (rol(block->l[i], 8) & 0x00FF00FF)) 140 #define blk(i) (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ \ 145 z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \ 146 w = rol(w, 30); 148 z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \ 149 w = rol(w, 30); 151 z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30); 153 z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \ [all …]
|
/external/ppp/pppd/ |
D | sha1.c | 27 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 32 #define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ 36 #define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30); 37 #define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30); 38 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 39 #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); 40 #define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30);
|
/external/syslinux/com32/libutil/ |
D | sha1hash.c | 86 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 91 #define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ 95 #define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30); 96 #define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30); 97 #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); 98 #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); 99 #define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30);
|
/external/boringssl/win-x86/crypto/chacha/ |
D | chacha-x86.asm | 107 rol edx,16 111 rol ebx,12 116 rol edx,8 122 rol ebx,7 125 rol edi,16 131 rol ebp,12 136 rol edi,8 142 rol ebp,7 145 rol edx,16 151 rol ebx,12 [all …]
|
/external/toybox/toys/lsb/ |
D | md5sum.c | 103 #define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 160 x[1] += rol(temp, md5rot[i]); in md5_transform() 194 work += block[count] = (rol(block[count],24)&0xFF00FF00) in sha1_transform() 195 | (rol(block[count],8)&0x00FF00FF); in sha1_transform() 197 work += block[count&15] = rol(block[(count+13)&15] in sha1_transform() 199 *rot[4] += work + rol(*rot[0],5) + rconsts[i]; in sha1_transform() 200 *rot[1] = rol(*rot[1],30); in sha1_transform()
|
/external/libconstrainedcrypto/ |
D | sha.c | 36 #define rol(bits, value) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 53 W[t] = rol(1,W[t-3] ^ W[t-8] ^ W[t-14] ^ W[t-16]); in SHA1_Transform() 63 uint32_t tmp = rol(5,A) + E + W[t]; in SHA1_Transform() 76 C = rol(30,B); in SHA1_Transform()
|
/external/syslinux/core/ |
D | writehex.inc | 25 rol eax,24 31 rol eax,16 39 .loop: rol eax,4
|
/external/pcre/dist2/src/sljit/ |
D | sljitNativeARM_32.c | 1142 sljit_s32 rol; in get_imm() local 1149 rol = 8; in get_imm() 1153 rol = 0; in get_imm() 1158 rol += 4; in get_imm() 1163 rol += 2; in get_imm() 1168 rol += 1; in get_imm() 1172 return SRC2_IMM | (imm >> 24) | (rol << 8); in get_imm() 1183 sljit_s32 rol; in generate_int() local 1187 rol = 8; in generate_int() 1191 imm = (imm << rol) | (imm >> (32 - rol)); in generate_int() [all …]
|
/external/boringssl/win-x86_64/crypto/chacha/ |
D | chacha-x86_64.asm | 114 rol r12d,16 117 rol r13d,16 120 rol r8d,12 123 rol r9d,12 126 rol r12d,8 129 rol r13d,8 132 rol r8d,7 135 rol r9d,7 142 rol r14d,16 145 rol r15d,16 [all …]
|
/external/boringssl/win-x86/crypto/modes/ |
D | ghash-x86.asm | 378 rol edx,8 384 rol edx,8 400 rol edx,8 418 rol edx,8 438 rol edx,8 457 rol edx,8 476 rol edx,8 495 rol edx,8 515 rol edx,8 534 rol edx,8 [all …]
|
/external/swiftshader/third_party/LLVM/lib/Target/X86/ |
D | X86InstrShiftRotate.td | 418 "rol{b}\t{%cl, $dst|$dst, CL}", 421 "rol{w}\t{%cl, $dst|$dst, CL}", 424 "rol{l}\t{%cl, $dst|$dst, CL}", 427 "rol{q}\t{%cl, $dst|$dst, %CL}", 432 "rol{b}\t{$src2, $dst|$dst, $src2}", 435 "rol{w}\t{$src2, $dst|$dst, $src2}", 439 "rol{l}\t{$src2, $dst|$dst, $src2}", 443 "rol{q}\t{$src2, $dst|$dst, $src2}", 448 "rol{b}\t$dst", 451 "rol{w}\t$dst", [all …]
|
/external/compiler-rt/lib/tsan/rtl/ |
D | tsan_rtl_amd64.S | 191 rol $0x11, %rsi 232 rol $0x11, %rsi 280 rol $0x11, %rsi 333 rol $0x11, %rsi
|
/external/boringssl/win-x86/crypto/aes/ |
D | aes-586.asm | 127 rol ecx,24 145 rol edx,24 163 rol eax,24 181 rol ebx,24 1159 rol ecx,8 1165 rol eax,24 1167 rol ebx,16 1169 rol ebp,8 1202 rol edx,8 1208 rol ebx,24 [all …]
|
/external/boringssl/win-x86_64/crypto/aes/ |
D | aes-x86_64.asm | 273 rol eax,24 275 rol ebx,24 310 rol ecx,24 312 rol edx,24 735 rol eax,8 737 rol ecx,8 739 rol ebx,8 742 rol edx,8 751 rol r8d,24 753 rol r11d,24 [all …]
|
/external/vboot_reference/firmware/2lib/ |
D | 2sha1.c | 187 #define rol(bits, value) (((value) << (bits)) | ((value) >> (32 - (bits)))) macro 206 W[t] = rol(1,W[t-3] ^ W[t-8] ^ W[t-14] ^ W[t-16]); in sha1_transform() 216 uint32_t tmp = rol(5,A) + E + W[t]; in sha1_transform() 229 C = rol(30,B); in sha1_transform()
|