/external/openssl/crypto/ |
H A D | x86cpuid.pl | 251 &lea ("eax",&DWP(4,"esp")); 262 &lea ("ebx",&DWP(0,"eax","ecx")); 321 &lea ("edx",&DWP(1,"edx")); 330 &lea ("ecx",&DWP(-1,"ecx")); 331 &lea ("edx",&DWP(1,"edx")); 335 &lea ("ecx",&DWP(-4,"ecx")); 337 &lea ("edx",&DWP(4,"edx"));
|
/external/openssl/crypto/bn/asm/ |
H A D | x86_64-mont5.pl | 78 lea -0x28(%rsp),%rsp 85 lea 2($num),%r11 87 lea (%rsp,%r11,8),%rsp # tp=alloca(8*(num+2)) 102 lea .Lmagic_masks(%rip),%rax 104 lea 96($bp,%r11,8),$bp # pointer within 1st cache line 120 lea $STRIDE($bp),$bp 151 lea $STRIDE($bp),$bp 160 lea 1($j),$j # j++ 179 lea 1($j),$j # j++ 203 lea [all...] |
H A D | x86-mont.pl | 64 &lea ("esi",&wparam(0)); # put aside pointer to argument block 65 &lea ("edx",&wparam(1)); # load ap 69 &lea ("esp",&DWP(-$frame,"esp","edi",4)); # alloca($frame+4*(num+2)) 102 &lea ($num,&DWP(-3,"edi")); # num=num-1 to assist modulo-scheduling 167 &lea ($j,&DWP(1,$j)); 236 &lea ($j,&DWP(1,$j)); # j++ 257 &lea ($i,&DWP(1,$i)); # i++ 284 &lea ($carry,&DWP(1,$num)); 290 &lea ("eax",&DWP(4,$word,$num,4)); # &bp[num] 302 &lea ( [all...] |
H A D | x86_64-mont.pl | 86 lea 2($num),%r10 89 lea (%rsp,%r10,8),%rsp # tp=alloca(8*(num+2)) 119 lea 1($j),$j # j++ 138 lea 1($j),$j # j++ 160 lea 1($i),$i # i++ 183 lea 1($j),$j # j++ 205 lea 1($j),$j # j++ 228 lea 1($i),$i # i++ 234 lea (%rsp),$ap # borrow ap for tp 241 lea [all...] |
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/common/x86/ |
H A D | sad_sse2.asm | 35 lea rcx, [rsi+rax*8] 37 lea rcx, [rcx+rax*8] 59 lea rsi, [rsi+rax*2] 61 lea rdi, [rdi+rdx*2] 109 lea rcx, [rsi+rbx*8] 111 lea rcx, [rcx+rbx*8] 129 lea rsi, [rsi+rbx*2] 130 lea rdi, [rdi+rdx*2] 172 lea rcx, [rsi+rbx*8] 185 lea rs [all...] |
H A D | recon_mmx.asm | 40 lea rsi, [rsi+rax*2] 49 lea rdi, [rdi+rcx*2] 58 lea rsi, [rsi+rax*2] 62 lea rdi, [rdi+rcx*2] 103 lea rsi, [rsi+rax*2] 109 lea rdi, [rdi+rcx*2] 152 lea rsi, [rsi+rax*2] 164 lea rdi, [rdi+rcx*2] 176 lea rsi, [rsi+rax*2] 188 lea rd [all...] |
H A D | recon_sse2.asm | 39 lea rsi, [rsi+rax*2] 47 lea rdi, [rdi+rcx*2] 54 lea rsi, [rsi+rax*2] 62 lea rdi, [rdi+rcx*2] 69 lea rsi, [rsi+rax*2] 80 lea rdi, [rdi+rcx*2] 85 lea rsi, [rsi+rax*2] 94 lea rdi, [rdi+rcx*2] 100 lea rsi, [rsi+rax*2] 107 lea rd [all...] |
/external/libvpx/libvpx/vp8/common/x86/ |
H A D | sad_sse2.asm | 35 lea rcx, [rsi+rax*8] 37 lea rcx, [rcx+rax*8] 59 lea rsi, [rsi+rax*2] 61 lea rdi, [rdi+rdx*2] 109 lea rcx, [rsi+rbx*8] 111 lea rcx, [rcx+rbx*8] 129 lea rsi, [rsi+rbx*2] 130 lea rdi, [rdi+rdx*2] 172 lea rcx, [rsi+rbx*8] 185 lea rs [all...] |
H A D | recon_mmx.asm | 40 lea rsi, [rsi+rax*2] 49 lea rdi, [rdi+rcx*2] 58 lea rsi, [rsi+rax*2] 62 lea rdi, [rdi+rcx*2] 103 lea rsi, [rsi+rax*2] 109 lea rdi, [rdi+rcx*2] 152 lea rsi, [rsi+rax*2] 164 lea rdi, [rdi+rcx*2] 176 lea rsi, [rsi+rax*2] 188 lea rd [all...] |
H A D | recon_sse2.asm | 39 lea rsi, [rsi+rax*2] 47 lea rdi, [rdi+rcx*2] 54 lea rsi, [rsi+rax*2] 62 lea rdi, [rdi+rcx*2] 69 lea rsi, [rsi+rax*2] 80 lea rdi, [rdi+rcx*2] 85 lea rsi, [rsi+rax*2] 94 lea rdi, [rdi+rcx*2] 100 lea rsi, [rsi+rax*2] 107 lea rd [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/aes/asm/ |
H A D | bsaes-x86_64.pl | 443 lea 0x80($key),$key 808 lea .LBS0(%rip), $const # constants table 811 lea 0x10($key), $key 872 lea .LBS0(%rip), $const # constants table 875 lea 0x10($key), $key 963 lea .Lmasks(%rip), $const 965 lea 0x10($inp), $inp 975 lea 0x10($out), $out 1016 lea 0x10($inp), $inp 1034 lea [all...] |
H A D | aesni-x86.pl | 115 &lea ($key,&DWP(32,$key)); 122 &lea ($key,&DWP(16,$key)); 135 &lea ($key,&DWP(0x30,$key)); 138 &lea ($key,&DWP(0x20,$key)); 140 &lea ($key,&DWP(0x20,$key)); 231 &lea ($key,&DWP(32,$key,$rounds)); 263 &lea ($key,&DWP(32,$key,$rounds)); 304 &lea ($key,&DWP(32,$key,$rounds)); 350 &lea ($key,&DWP(32,$key,$rounds)); 433 &lea ( [all...] |
/external/openssl/crypto/aes/asm/ |
H A D | bsaes-x86_64.pl | 450 lea 0x80($key),$key 816 lea .LBS0(%rip), $const # constants table 819 lea 0x10($key), $key 880 lea .LBS0(%rip), $const # constants table 883 lea 0x10($key), $key 971 lea .Lmasks(%rip), $const 973 lea 0x10($inp), $inp 983 lea 0x10($out), $out 1024 lea 0x10($inp), $inp 1042 lea [all...] |
H A D | aesni-x86.pl | 104 &lea ($key,&DWP(32,$key)); 111 &lea ($key,&DWP(16,$key)); 124 &lea ($key,&DWP(0x30,$key)); 127 &lea ($key,&DWP(0x20,$key)); 129 &lea ($key,&DWP(0x20,$key)); 215 &lea ($key,&DWP(32,$key)); 229 &lea ($key,&DWP(32,$key)); 254 &lea ($key,&DWP(32,$key)); 270 &lea ($key,&DWP(32,$key)); 296 &lea ( [all...] |
H A D | aesni-x86_64.pl | 220 lea 32($key),$key 224 lea 32($key),$key 232 lea 16($key),$key 292 lea 32($key),$key 306 lea 32($key),$key 336 lea 32($key),$key 352 lea 32($key),$key 381 lea 32($key),$key 410 lea 32($key),$key 445 lea 3 [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/ataricommon/ |
H A D | SDL_ikbdinterrupt.S | 46 lea sp@(-16),sp 58 lea 0xfffffa00:w,a0 79 lea ikbd,a0 111 lea sp@(16),sp 130 lea 0xfffffa00:w,a0 153 lea 0xfffffc00:w,a0 183 lea sp@(-12),sp 245 lea _SDL_AtariIkbd_keyboard,a0 265 lea sp@(12),sp 278 lea s [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/bn/asm/ |
H A D | x86-mont.pl | 64 &lea ("esi",&wparam(0)); # put aside pointer to argument block 65 &lea ("edx",&wparam(1)); # load ap 69 &lea ("esp",&DWP(-$frame,"esp","edi",4)); # alloca($frame+4*(num+2)) 102 &lea ($num,&DWP(-3,"edi")); # num=num-1 to assist modulo-scheduling 167 &lea ($j,&DWP(1,$j)); 236 &lea ($j,&DWP(1,$j)); # j++ 257 &lea ($i,&DWP(1,$i)); # i++ 284 &lea ($carry,&DWP(1,$num)); 290 &lea ("eax",&DWP(4,$word,$num,4)); # &bp[num] 302 &lea ( [all...] |
H A D | x86_64-mont.pl | 120 lea 2($num),%r10 123 lea (%rsp,%r10,8),%rsp # tp=alloca(8*(num+2)) 153 lea 1($j),$j # j++ 172 lea 1($j),$j # j++ 194 lea 1($i),$i # i++ 217 lea 1($j),$j # j++ 239 lea 1($j),$j # j++ 262 lea 1($i),$i # i++ 268 lea (%rsp),$ap # borrow ap for tp 275 lea [all...] |
/external/chromium_org/third_party/libvpx/source/libvpx/vp9/common/x86/ |
H A D | vp9_high_subpixel_8t_sse2.asm | 140 lea rsi, [rsi + rax] 237 lea rax, [rax + rax] ;bytes per line 238 lea rbx, [rbx + rbx] 239 lea rdx, [rax + rax * 2] 246 lea rsi, [rsi + rax] 255 lea rdi, [rdi + rbx] 305 lea rax, [rax + rax] ;bytes per line 306 lea rbx, [rbx + rbx] 307 lea rdx, [rax + rax * 2] 314 lea rd [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/rc4/asm/ |
H A D | rc4-x86_64.pl | 157 lea 8($dat),$dat 174 lea 1($XX[0]),$XX[1] 188 lea 1($inp),$inp 192 lea 1($XX[0]),$XX[1] 220 lea 8($inp),$inp 246 lea 1($inp),$inp 255 lea ($dat,$XX[0],4),$XX[1] 275 $code.=" lea ($dat,$XX[0],4),$XX[1]\n" if ($i==15); 279 $code.=" lea 16($inp),$inp\n" if ($i==0); 306 lea 1 [all...] |
/external/openssl/crypto/rc4/asm/ |
H A D | rc4-x86_64.pl | 156 lea 8($dat),$dat 172 lea 1($XX[0]),$XX[1] 186 lea 1($inp),$inp 190 lea 1($XX[0]),$XX[1] 218 lea 8($inp),$inp 244 lea 1($inp),$inp 253 lea ($dat,$XX[0],4),$XX[1] 273 $code.=" lea ($dat,$XX[0],4),$XX[1]\n" if ($i==15); 277 $code.=" lea 16($inp),$inp\n" if ($i==0); 304 lea 1 [all...] |
/external/chromium_org/third_party/boringssl/win-x86_64/crypto/aes/ |
H A D | aesni-x86_64.asm | 12 lea r8,QWORD PTR[32+r8] 18 lea r8,QWORD PTR[16+r8] 33 lea r8,QWORD PTR[32+r8] 39 lea r8,QWORD PTR[16+r8] 54 lea rcx,QWORD PTR[32+rax*1+rcx] 83 lea rcx,QWORD PTR[32+rax*1+rcx] 113 lea rcx,QWORD PTR[32+rax*1+rcx] 147 lea rcx,QWORD PTR[32+rax*1+rcx] 182 lea rcx,QWORD PTR[32+rax*1+rcx] 222 lea rc [all...] |
/external/chromium_org/third_party/boringssl/win-x86_64/crypto/bn/ |
H A D | x86_64-mont5.asm | 37 lea rsp,QWORD PTR[((-40))+rsp] 40 lea r11,QWORD PTR[2+r9] 42 lea rsp,QWORD PTR[r11*8+rsp] 52 lea rax,QWORD PTR[$L$magic_masks] 54 lea r12,QWORD PTR[96+r11*8+r12] 70 lea r12,QWORD PTR[256+r12] 101 lea r12,QWORD PTR[256+r12] 110 lea r15,QWORD PTR[1+r15] 129 lea r15,QWORD PTR[1+r15] 153 lea r1 [all...] |
/external/compiler-rt/lib/tsan/ |
H A D | analyze_libtsan.sh | 38 lea=$(grep 'lea' $file | wc -l) 41 printf "%10s tot %3d; size %4d; rsp %d; push %d; pop %d; call %d; load %2d; store %2d; sh %3d; mov %3d; lea %3d; cmp %3d\n" \ 42 $f $tot $size $rsp $push $pop $call $load $store $sh $mov $lea $cmp;
|
/external/chromium_org/third_party/libvpx/source/libvpx/third_party/libyuv/source/ |
H A D | row_win.cc | 322 lea eax, [eax + 8] 331 lea edx, [edx + 32] 351 lea eax, [eax + 8] 360 lea edx, [edx + 32] 382 lea eax, [eax + 48] 400 lea edx, [edx + 64] 422 lea eax, [eax + 48] 440 lea edx, [edx + 64] 496 lea eax, [eax + 16] 550 lea ea [all...] |