Searched refs:R3 (Results 1 - 25 of 94) sorted by relevance

1234

/external/linux-tools-perf/perf-3.12.0/arch/blackfin/lib/
H A Dmemcpy.S42 R3 = R1 + R2; define
43 CC = R0 < R3; /* and dst < src+len */
49 R3 = R1 | R0; define
51 R3 = R3 & R1; define
52 CC = R3; /* low bits set on either address? */
64 R3 = B[P1++] (X); define
66 B[P0++] = R3;
75 R3 = [I1++]; define
78 [P0++] = R3;
80 R3 = [I1++]; define
88 R3 = 0x3; define
89 R3 = R2 & R3; define
[all...]
H A Dmemset.S29 R3 = R0 + R2; /* end */ define
43 P2 = R3;
54 R2 = R3; /* end point */
55 R3 = P0; /* current position */ define
56 R2 = R2 - R3; /* bytes left */
/external/openssl/crypto/md5/
H A Dmd5_dgst.c162 R3(A,B,C,D,X( 0), 6,0xf4292244L);
163 R3(D,A,B,C,X( 7),10,0x432aff97L);
164 R3(C,D,A,B,X(14),15,0xab9423a7L);
165 R3(B,C,D,A,X( 5),21,0xfc93a039L);
166 R3(A,B,C,D,X(12), 6,0x655b59c3L);
167 R3(D,A,B,C,X( 3),10,0x8f0ccc92L);
168 R3(C,D,A,B,X(10),15,0xffeff47dL);
169 R3(B,C,D,A,X( 1),21,0x85845dd1L);
170 R3(A,B,C,D,X( 8), 6,0x6fa87e4fL);
171 R3(
[all...]
H A Dmd5_locl.h127 #define R3(a,b,c,d,k,s,t) { \ macro
/external/chromium_org/third_party/webrtc/base/
H A Dsha1.cc123 // (R0+R1), R2, R3, R4 are the different operations used in SHA1.
133 #define R3(v, w, x, y, z, i) \ macro
190 R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43);
191 R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(
[all...]
/external/ppp/pppd/
H A Dsha1.c34 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
38 #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); macro
78 R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43);
79 R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(
[all...]
/external/valgrind/main/none/tests/
H A Dsha1_test.c92 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
96 #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); macro
137 R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43);
138 R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1-internal.c140 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
149 #define R3(v,w,x,y,z,i) \ macro
205 R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43);
206 R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dsha1-internal.c140 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
149 #define R3(v,w,x,y,z,i) \ macro
205 R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43);
206 R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha1-internal.c140 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
149 #define R3(v,w,x,y,z,i) \ macro
205 R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43);
206 R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/md5/asm/
H A Dmd5-586.pl25 %Ltmp1=("R0",&Np($C), "R1",&Np($C), "R2",&Np($C), "R3",&Np($D));
30 0, 7, 14, 5, 12, 3, 10, 1, 8, 15, 6, 13, 4, 11, 2, 9, # R3
141 sub R3 subroutine
145 &comment("R3 $ki");
257 &comment("R3 section");
258 &R3(-1,$A,$B,$C,$D,$X,48, 6,0xf4292244);
259 &R3( 0,$D,$A,$B,$C,$X,49,10,0x432aff97);
260 &R3( 0,$C,$D,$A,$B,$X,50,15,0xab9423a7);
261 &R3( 0,$B,$C,$D,$A,$X,51,21,0xfc93a039);
262 &R3(
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/md5/
H A Dmd5.c145 #define R3(a,b,c,d,k,s,t) { \ macro
251 R3(A, B, C, D, X(0), 6, 0xf4292244L);
252 R3(D, A, B, C, X(7), 10, 0x432aff97L);
253 R3(C, D, A, B, X(14), 15, 0xab9423a7L);
254 R3(B, C, D, A, X(5), 21, 0xfc93a039L);
255 R3(A, B, C, D, X(12), 6, 0x655b59c3L);
256 R3(D, A, B, C, X(3), 10, 0x8f0ccc92L);
257 R3(C, D, A, B, X(10), 15, 0xffeff47dL);
258 R3(B, C, D, A, X(1), 21, 0x85845dd1L);
259 R3(
[all...]
/external/openssl/crypto/md5/asm/
H A Dmd5-586.pl25 %Ltmp1=("R0",&Np($C), "R1",&Np($C), "R2",&Np($C), "R3",&Np($D));
30 0, 7, 14, 5, 12, 3, 10, 1, 8, 15, 6, 13, 4, 11, 2, 9, # R3
141 sub R3 subroutine
145 &comment("R3 $ki");
257 &comment("R3 section");
258 &R3(-1,$A,$B,$C,$D,$X,48, 6,0xf4292244);
259 &R3( 0,$D,$A,$B,$C,$X,49,10,0x432aff97);
260 &R3( 0,$C,$D,$A,$B,$X,50,15,0xab9423a7);
261 &R3( 0,$B,$C,$D,$A,$X,51,21,0xfc93a039);
262 &R3(
[all...]
/external/chromium_org/third_party/smhasher/src/
H A Dsha1.cpp106 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
110 #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); macro
144 R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43);
145 R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(e,a,b,c,d,46); R3(
[all...]
/external/qemu/distrib/ext4_utils/src/
H A Dsha1.c51 * (R0+R1), R2, R3, R4 are the different operations (rounds) used in SHA1
56 #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); macro
79 #define nR3(v,w,x,y,z,i) R3(*v,*w,*x,*y,*z,i)
171 R3(a,b,c,d,e,40); R3(e,a,b,c,d,41); R3(d,e,a,b,c,42); R3(c,d,e,a,b,43);
172 R3(b,c,d,e,a,44); R3(a,b,c,d,e,45); R3(
[all...]
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/lc3b/tests/
H A Dlc3b-mp22NC.asm15 ADD R3, R2, -3
20 STB R6, R3, 0
27 ADD R3, R2, -9
30 STB R6, R3, 0
45 AND R3, R3, 0
47 ADD R3, R3, 11
53 ADD R3, R3, R
[all...]
/external/mdnsresponder/mDNSCore/
H A DDNSDigest.c910 #define R3(a,b,c,d,k,s,t) { \ macro
1003 R3(A,B,C,D,X[ 0], 6,0xf4292244L);
1004 R3(D,A,B,C,X[ 7],10,0x432aff97L);
1005 R3(C,D,A,B,X[14],15,0xab9423a7L);
1006 R3(B,C,D,A,X[ 5],21,0xfc93a039L);
1007 R3(A,B,C,D,X[12], 6,0x655b59c3L);
1008 R3(D,A,B,C,X[ 3],10,0x8f0ccc92L);
1009 R3(C,D,A,B,X[10],15,0xffeff47dL);
1010 R3(B,C,D,A,X[ 1],21,0x85845dd1L);
1011 R3(
[all...]
/external/chromium_org/third_party/boringssl/mac-x86/crypto/md5/
H A Dmd5-586.S498 # R3 section
499 # R3 48
510 # R3 49
520 # R3 50
530 # R3 51
540 # R3 52
550 # R3 53
560 # R3 54
570 # R3 55
580 # R3 5
[all...]
/external/libhevc/decoder/arm/
H A Dihevcd_fmt_conv_420sp_to_rgba8888.s59 @* R3 pusRGB *
97 @//R3 - RGB PTR
142 SUB R10,R6,R3 @// luma offset
143 SUB R11,R7,R3
145 @SUB R12,R8,R3, LSR #1 @// v offset
146 SUB R14,R9,R3 @// rgb offset in pixels
162 MOV R6,R3, LSR #4 @// width_cnt = width / 16
434 ADD R7,R0,R3 @// luma_next = luma + width
435 ADD R8,R2,R3,LSL #2 @// rgb_next_row = rgb + width
H A Dihevcd_fmt_conv_420sp_to_420sp.s59 @* R3 pu1_dest_uv *
154 MOV R2,R3 @pu1_dest_uv
/external/llvm/lib/Target/ARM/
H A DARMCallingConv.h31 static const MCPhysReg RegList[] = { ARM::R0, ARM::R1, ARM::R2, ARM::R3 };
75 static const MCPhysReg LoRegList[] = { ARM::R1, ARM::R3 };
77 static const MCPhysReg GPRArgRegs[] = { ARM::R0, ARM::R1, ARM::R2, ARM::R3 };
82 // If we had R3 unallocated only, now we still must to waste it.
84 assert((!Reg || Reg == ARM::R3) && "Wrong GPRs usage for f64");
127 static const MCPhysReg LoRegList[] = { ARM::R1, ARM::R3 };
H A DARMBaseRegisterInfo.h41 case R0: case R1: case R2: case R3:
/external/llvm/lib/Target/Hexagon/
H A DHexagonVarargsCallingConvention.h53 Hexagon::R0, Hexagon::R1, Hexagon::R2, Hexagon::R3, Hexagon::R4,
109 Hexagon::R0, Hexagon::R1, Hexagon::R2, Hexagon::R3, Hexagon::R4,
/external/clang/test/CodeGenCXX/
H A Dvtable-layout.cpp217 struct R3 : R1, R2 { int r3; }; struct in namespace:Test4
228 // CHECK-8-NEXT: 2 | Test4::R3 *Test4::B::f()
230 // CHECK-8-NEXT: 3 | Test4::R3 *Test4::B::f()
233 // CHECK-8-NEXT: 1 | Test4::R3 *Test4::B::f()
235 virtual R3 *f();
237 R3 *B::f() { return 0; }
264 struct V3 : virtual R3 { int r3; };
289 // CHECK-11-NEXT: 2 | Test4::R3 *Test4::F::f() [pure]
291 // CHECK-11-NEXT: 4 | Test4::R3 *Test4::F::f() [pure]
295 // CHECK-11-NEXT: 2 | Test4::R3 *Test
[all...]
/external/checkpolicy/
H A Dpolicy_scan.l203 R3 { return(R3); }

Completed in 2409 milliseconds

1234