/external/openssl/crypto/bn/asm/x86/ |
H A D | div.pl | 9 &mov("edx",&wparam(0)); # 10 &mov("eax",&wparam(1)); # 11 &mov("ebx",&wparam(2)); #
|
H A D | mul_add.pl | 19 &mov($r,&wparam(0)); # 21 &mov("ecx",&wparam(2)); # 22 &mov($a,&wparam(1)); # 25 &mov($w,&wparam(3)); # 33 &mov(&swtmp(0),"ecx"); # 39 &mov("eax",&DWP($i,$a,"",0)); # *a 42 &mov($c,&DWP($i,$r,"",0)); # L(t)+= *r 46 &mov(&DWP($i,$r,"",0),"eax"); # *r= L(t); 47 &mov($c,"edx"); # c= H(t); 51 &mov("ec [all...] |
H A D | sqr.pl | 15 &mov($r,&wparam(0)); # 16 &mov($a,&wparam(1)); # 17 &mov($num,&wparam(2)); # 26 &mov("eax",&DWP($i,$a,"",0)); # *a 29 &mov(&DWP($i*2,$r,"",0),"eax"); # 30 &mov(&DWP($i*2+4,$r,"",0),"edx");# 40 &mov($num,&wparam(2)); # get num 47 &mov("eax",&DWP($i*4,$a,"",0)); # *a 50 &mov(&DWP($i*8,$r,"",0),"eax"); # 52 &mov( [all...] |
H A D | add.pl | 19 &mov($r,&wparam(0)); # get r 20 &mov($a,&wparam(1)); # get a 21 &mov($b,&wparam(2)); # get b 22 &mov($num,&wparam(3)); # get num 33 &mov($tmp1,&DWP($i*4,$a,"",0)); # *a 34 &mov($tmp2,&DWP($i*4,$b,"",0)); # *b 36 &mov($c,0); 40 &mov(&DWP($i*4,$r,"",0),$tmp1); # *r 51 &mov($num,&wparam(3)); # get num 58 &mov( [all...] |
H A D | sub.pl | 19 &mov($r,&wparam(0)); # get r 20 &mov($a,&wparam(1)); # get a 21 &mov($b,&wparam(2)); # get b 22 &mov($num,&wparam(3)); # get num 33 &mov($tmp1,&DWP($i*4,$a,"",0)); # *a 34 &mov($tmp2,&DWP($i*4,$b,"",0)); # *b 36 &mov($c,0); 40 &mov(&DWP($i*4,$r,"",0),$tmp1); # *r 51 &mov($num,&wparam(3)); # get num 58 &mov( [all...] |
H A D | mul.pl | 20 &mov($r,&wparam(0)); # 21 &mov($a,&wparam(1)); # 22 &mov($num,&wparam(2)); # 23 &mov($w,&wparam(3)); # 33 &mov("eax",&DWP($i,$a,"",0)); # *a 39 &mov(&DWP($i,$r,"",0),"eax"); # *r= L(t); 41 &mov($c,"edx"); # c= H(t); 52 &mov($num,&wparam(2)); # get num 61 &mov("eax",&DWP($i*4,$a,"",0));# *a 66 &mov( [all...] |
/external/openssl/crypto/des/asm/ |
H A D | desboth.pl | 12 &mov("ebx",&wparam(0)); 21 &mov($L,&DWP(0,"ebx","",0)); 22 &mov($R,&DWP(4,"ebx","",0)); 33 &mov(&DWP(4,"ebx","",0),$R); 34 &mov("eax",&wparam(1)); 35 &mov(&DWP(0,"ebx","",0),"edx"); 36 &mov("edi",&wparam(2)); 37 &mov("esi",&wparam(3)); 41 &mov(&DWP(4,"ebx","",0),$R); 42 &mov("es [all...] |
/external/openssl/crypto/bn/asm/ |
H A D | via-mont.pl | 112 &mov ("ecx",&wparam(5)); # num 125 &mov ("edi",&wparam(0)); # rp 126 &mov ("eax",&wparam(1)); # ap 127 &mov ("ebx",&wparam(2)); # bp 128 &mov ("edx",&wparam(3)); # np 129 &mov ("esi",&wparam(4)); # n0 130 &mov ("esi",&DWP(0,"esi")); # *n0 139 &mov ($rp,"edi"); # save rp 140 &mov ($sp,"ebp"); # save esp 142 &mov ( [all...] |
H A D | modexp512-x86_64.pl | 89 mov (+8*0)($SRC2), %rax 91 mov ($ASRC), $X[0] 94 mov $X[0], $DST 98 mov %rdx, $TMP 100 mov (+8*$i)($SRC2), %rax 102 mov (+8*$i)($ASRC), $X[$i] 110 mov %rdx, $X[0] 122 mov (+8*0)($SRC2), %rax 126 mov $X[0], $DST 130 mov [all...] |
H A D | x86_64-gf2m.pl | 50 mov \$-1,$a1 62 mov $a,$hi # $a is $lo 66 mov $i0,$t1 71 mov $i1,$t0 78 mov $a1,$a12 81 mov $a1,8(%rsp) # tab[1]=a1 82 mov $a4,$a48 83 mov $a2,16(%rsp) # tab[2]=a2 85 mov $a12,24(%rsp) # tab[3]=a1^a2 88 mov [all...] |
H A D | x86-gf2m.pl | 58 &mov ($a1,$a); 62 &mov (&DWP(0*4,"esp"),0); 66 &mov (&DWP(1*4,"esp"),$a1); # a1 70 &mov (&DWP(2*4,"esp"),$a2); # a2 72 &mov (&DWP(3*4,"esp"),$a1); # a1^a2 76 &mov (&DWP(4*4,"esp"),$a4); # a4 80 &mov (&DWP(5*4,"esp"),$a1); # a1^a4 84 &mov (&DWP(6*4,"esp"),$a2); # a2^a4 85 &mov (@i[0],0x7); 86 &mov ( [all...] |
H A D | x86-mont.pl | 60 &mov ("edi",&wparam(5)); # int num 66 &mov ("ebp","esp"); # saved stack pointer! 76 &mov ("eax","esp"); 89 &mov ("eax",&DWP(0*4,"esi"));# BN_ULONG *rp 90 &mov ("ebx",&DWP(1*4,"esi"));# const BN_ULONG *ap 91 &mov ("ecx",&DWP(2*4,"esi"));# const BN_ULONG *bp 92 &mov ("edx",&DWP(3*4,"esi"));# const BN_ULONG *np 93 &mov ("esi",&DWP(4*4,"esi"));# const BN_ULONG *n0 94 #&mov ("edi",&DWP(5*4,"esi"));# int num 96 &mov ("es [all...] |
/external/llvm/test/MC/ELF/ |
H A D | pr9292.s | 7 mov %eax,bar label
|
/external/openssl/crypto/sha/asm/ |
H A D | sha256-586.pl | 50 &mov ("ecx",$E); 53 &mov ("esi",$Foff); 56 &mov (&DWP(4*(8+15),"esp"),$T) if ($in_16_63); # save X[0] 59 &mov ("edi",$Goff); 63 &mov ($Eoff,$E); # modulo-scheduled 64 &mov ("ecx",$A); 66 &mov ($E,$Doff); # e becomes d, which is e in next iteration 68 &mov ("edi",$A); 75 &mov ("esi",$Boff); 79 &mov ("ed [all...] |
H A D | sha512-586.pl | 132 &mov (&LB("edx"),&BP(0,$K512)); 141 &mov ("ecx",$Elo); 142 &mov ("edx",$Ehi); 143 &mov ("esi","ecx"); 146 &mov ("edi","edx"); 148 &mov ("ebx","ecx"); 150 &mov ("eax","edx"); 173 &mov ("ecx",$Flo); 174 &mov ("edx",$Fhi); 175 &mov ("es [all...] |
/external/compiler-rt/lib/arm/ |
H A D | aeabi_memset.S | 17 mov r3, r1 18 mov r1, r2 19 mov r2, r3 26 mov r2, r1 27 mov r1, #0
|
/external/openssl/crypto/perlasm/ |
H A D | cbc.pl | 54 &mov($count, &wparam(2)); # length 57 &mov("ebx", &wparam($iv_off)); # Get iv ptr 59 &mov($in, &DWP(0,"ebx","",0));# iv[0] 60 &mov($out, &DWP(4,"ebx","",0));# iv[1] 67 &mov("ebx", "esp"); # This is the address of tin[2] 69 &mov($in, &wparam(0)); # in 70 &mov($out, &wparam(1)); # out 74 &mov("ecx", &wparam($enc_off)); # Get enc flag 79 { &mov("eax", &wparam($p3)); &push("eax"); } 86 { &mov("ea [all...] |
/external/openssl/crypto/ |
H A D | x86cpuid.pl | 15 &mov ("ecx","eax"); 26 &mov ("edi","eax"); # max value for standard query level 31 &mov ("ebp","eax"); 42 &mov ("esi","eax"); 52 &mov ("eax",0x80000000); 56 &mov ("esi","eax"); 57 &mov ("eax",0x80000001); 64 &mov ("eax",0x80000008); 69 &mov ("eax",1); 82 &mov ("ed [all...] |
H A D | ia64cpuid.S | 14 { .mib; mov r8=ar.itc 26 { .mii; mov ar.ccv=r2 28 mov r3=r2 };; 56 mov r3=ar.lc 59 { .mii; mov r9=ar.bsp 60 mov r8=pr 61 mov ar.lc=96 };; 64 mov ar.ec=1 };; 70 mov f127=f0 71 mov r12 [all...] |
/external/valgrind/main/exp-bbv/tests/x86/ |
H A D | rep_prefix.S | 21 mov $8192, %ecx 22 mov $buffer1, %esi # set source 25 mov $8192, %ecx 26 mov $buffer1, %esi # set source 37 mov $0xd, %al # set eax to d 41 mov $16384, %ecx 42 mov $buffer1, %edi # set destination 47 mov $16384, %ecx 48 mov $buffer1, %esi # set source 56 mov [all...] |
/external/oprofile/module/ia64/ |
H A D | IA64syscallstub.h | 26 mov r3=ip; \ 30 mov b6=r16; \ 35 mov r3=ip; \ 36 mov r15=gp; /* save kgp */ \ 37 mov r17=rp; \ 54 mov gp=r15; /* restore kgp */ \ 58 mov b6 = r14; \ 63 mov r3=ip; \ 64 mov r15=gp; /* save kgp */ \ 79 mov b [all...] |
H A D | oprofile_stubs.S | 61 mov loc0=rp 62 mov loc2=gp 64 mov out0=in0 // filename 66 mov out1=in1 // argv 67 mov out2=in2 // envp 78 mov r3 = ip 88 mov b6=r15 92 mov ar.pfs=loc1 // restore ar.pfs 97 mov gp=loc2 98 mov r [all...] |
/external/llvm/test/MC/X86/ |
H A D | intel-syntax.s | 9 mov DWORD PTR [RSP - 4], 257 11 mov DWORD PTR [RSP + 4], 258 13 mov QWORD PTR [RSP - 16], 123 15 mov BYTE PTR [RSP - 17], 97 17 mov EAX, DWORD PTR [RSP - 4] 19 mov RAX, QWORD PTR [RSP] 21 mov DWORD PTR [RSP - 4], -4 23 mov RCX, QWORD PTR [0] 25 mov EAX, DWORD PTR [RSP + 4*RAX - 24] 27 mov BYT [all...] |
H A D | intel-syntax-2.s | 6 mov DWORD PTR [RSP - 4], 257
|
/external/openssl/crypto/md5/asm/ |
H A D | md5-x86_64.pl | 22 $code .= " mov 0*4(%rsi), %r10d /* (NEXT STEP) X[0] */\n" if ($pos == -1); 23 $code .= " mov %edx, %r11d /* (NEXT STEP) z' = %edx */\n" if ($pos == -1); 29 mov $k_next*4(%rsi),%r10d /* (NEXT STEP) X[$k_next] */ 32 mov $y, %r11d /* (NEXT STEP) z' = $y */ 46 $code .= " mov 1*4(%rsi), %r10d /* (NEXT STEP) X[1] */\n" if ($pos == -1); 47 $code .= " mov %edx, %r11d /* (NEXT STEP) z' = %edx */\n" if ($pos == -1); 48 $code .= " mov %edx, %r12d /* (NEXT STEP) z' = %edx */\n" if ($pos == -1); 54 mov $k_next*4(%rsi),%r10d /* (NEXT STEP) X[$k_next] */ 56 mov $y, %r11d /* (NEXT STEP) z' = $y */ 58 mov [all...] |