/third_party/openssl/crypto/ec/asm/ |
D | ecp_nistz256-x86.pl | 137 &lea ("esi",&DWP(0,"edi")); 160 &mov ("ebp",&DWP(0,"esi")); 162 &mov ("ebx",&DWP(4,"esi")); 165 &mov ("ecx",&DWP(8,"esi")); 170 &mov (&DWP(0,"edi"),"eax"); 172 &mov (&DWP(4,"edi"),"ebx"); 173 &mov (&DWP(8,"edi"),"ecx"); 175 &mov ("eax",&DWP(12,"esi")); 176 &mov ("ebx",&DWP(16,"esi")); 178 &mov ("ecx",&DWP(20,"esi")); [all …]
|
/third_party/openssl/crypto/sha/asm/ |
D | sha256-586.pl | 116 $Aoff=&DWP(4,"esp"); 117 $Boff=&DWP(8,"esp"); 118 $Coff=&DWP(12,"esp"); 119 $Doff=&DWP(16,"esp"); 120 $Eoff=&DWP(20,"esp"); 121 $Foff=&DWP(24,"esp"); 122 $Goff=&DWP(28,"esp"); 123 $Hoff=&DWP(32,"esp"); 124 $Xoff=&DWP(36,"esp"); 129 &mov ("esi",&DWP(4*(9+15+16-14),"esp")); [all …]
|
D | sha512-586.pl | 72 $Tlo=&DWP(0,"esp"); $Thi=&DWP(4,"esp"); 73 $Alo=&DWP(8,"esp"); $Ahi=&DWP(8+4,"esp"); 74 $Blo=&DWP(16,"esp"); $Bhi=&DWP(16+4,"esp"); 75 $Clo=&DWP(24,"esp"); $Chi=&DWP(24+4,"esp"); 76 $Dlo=&DWP(32,"esp"); $Dhi=&DWP(32+4,"esp"); 77 $Elo=&DWP(40,"esp"); $Ehi=&DWP(40+4,"esp"); 78 $Flo=&DWP(48,"esp"); $Fhi=&DWP(48+4,"esp"); 79 $Glo=&DWP(56,"esp"); $Ghi=&DWP(56+4,"esp"); 80 $Hlo=&DWP(64,"esp"); $Hhi=&DWP(64+4,"esp"); 214 &add ("eax",&DWP(8*(9+15)+0,"esp")); [all …]
|
D | sha1-586.pl | 187 &lea($tmp1,&DWP(0x5a827999,$tmp1,$e)); # tmp1+=K_00_19+xi 215 &lea($f,&DWP(0x5a827999,$f,$e));# f+=F_00_19(b,c,d)+e 232 &lea($f,&DWP(0x5a827999,$f,$e));# f+=F_00_19(b,c,d)+e 259 &lea($f,&DWP($K,$f,$e)); # f+=e+K_XX_YY 276 &lea($f,&DWP($K,$f,$e)); # f+=e+K_XX_YY 304 &lea($f,&DWP(0x8f1bbcdc,$f,$e));# f+=K_40_59+e+(b&(c^d)) 320 &lea($f,&DWP(0x8f1bbcdc,$f,$tmp1));# f+=K_40_59+e+(b&(c^d)) 340 &lea ($tmp1,&DWP(&label("K_XX_XX")."-".&label("pic_point"),$tmp1)); 342 &mov ($A,&DWP(0,$T)); 343 &mov ($D,&DWP(4,$T)); [all …]
|
D | keccak1600-mmx.pl | 197 &lea ("ebx",&DWP(8,"ebx")) if ($y == 0); 291 &lea ("ebx",&DWP(-192,"ebx")); # rewind iotas 302 &lea ("ebx",&DWP(&label("iotas")."-".&label("pic_point"),"ebx")); 304 &lea ("esi",&DWP(100,"esi")); # size optimization 305 &lea ("edi",&DWP(8*5+100,"esp")); # size optimization 323 &lea ("ebx",&DWP(&label("iotas")."-".&label("pic_point"),"ebx")); 327 &lea ("esi",&DWP(100,"esi")); # size optimization 328 &mov (&DWP(-4,"ebp"),"edx"); # save bsz 338 &lea ("eax",&DWP(8,"eax")); 340 &lea ("edi",&DWP(8,"edi")); [all …]
|
/third_party/openssl/crypto/bn/asm/ |
D | x86-mont.pl | 59 $_num=&DWP(4*0,"esp"); # stack top layout 60 $_rp=&DWP(4*1,"esp"); 61 $_ap=&DWP(4*2,"esp"); 62 $_bp=&DWP(4*3,"esp"); 63 $_np=&DWP(4*4,"esp"); 64 $_n0=&DWP(4*5,"esp"); $_n0q=&QWP(4*5,"esp"); 65 $_sp=&DWP(4*6,"esp"); 66 $_bpend=&DWP(4*7,"esp"); 78 &lea ("ebp",&DWP(-$frame,"esp","edi",4)); # future alloca($frame+4*(num+2)) 109 &lea ("esp",&DWP(0,"ebp","eax")); [all …]
|
D | via-mont.pl | 102 $mZeroPrime=&DWP(0,"esp"); # these are specified by VIA 103 $A=&DWP(4,"esp"); 104 $B=&DWP(8,"esp"); 105 $T=&DWP(12,"esp"); 106 $M=&DWP(16,"esp"); 107 $scratch=&DWP(20,"esp"); 108 $rp=&DWP(24,"esp"); # these are mine 109 $sp=&DWP(28,"esp"); 140 &mov ("esi",&DWP(0,"esi")); # *n0 142 &lea ("ecx",&DWP($pad,"","ecx",4)); # ecx becomes vector size in bytes [all …]
|
D | bn-586.pl | 48 &bt(&DWP(0,"eax"),26); 59 &movd("mm3",&DWP(0,$r,"",0)); # mm3 = r[0] 61 &movd("mm2",&DWP(0,$a,"",0)); # mm2 = a[0] 63 &movd("mm4",&DWP(4,$a,"",0)); # mm4 = a[1] 65 &movd("mm6",&DWP(8,$a,"",0)); # mm6 = a[2] 67 &movd("mm7",&DWP(12,$a,"",0)); # mm7 = a[3] 70 &movd("mm3",&DWP(4,$r,"",0)); # mm3 = r[1] 72 &movd("mm5",&DWP(8,$r,"",0)); # mm5 = r[2] 74 &movd("mm4",&DWP(12,$r,"",0)); # mm4 = r[3] 76 &movd(&DWP(0,$r,"",0),"mm1"); [all …]
|
D | x86-gf2m.pl | 69 &lea ($a2,&DWP(0,$a,$a)); 71 &lea ($a4,&DWP(0,$a2,$a2)); 72 &mov (&DWP(0*4,"esp"),0); 76 &mov (&DWP(1*4,"esp"),$a1); # a1 80 &mov (&DWP(2*4,"esp"),$a2); # a2 82 &mov (&DWP(3*4,"esp"),$a1); # a1^a2 86 &mov (&DWP(4*4,"esp"),$a4); # a4 90 &mov (&DWP(5*4,"esp"),$a1); # a1^a4 94 &mov (&DWP(6*4,"esp"),$a2); # a2^a4 96 &mov (&DWP(7*4,"esp"),$a4); # a1^a2^a4 [all …]
|
D | co-586.pl | 42 &mov("eax",&DWP(($na)*4,$a,"",0)) if $pos == 0; # load next a 46 &mov("edx",&DWP(($nb)*4,$b,"",0)) if $pos == 0; # load next b 47 &mov("edx",&DWP(($nb)*4,$b,"",0)) if $pos == 1; # load next b 51 &mov(&DWP($i*4,"eax","",0),$c0) if $pos > 0; # save r[]; 52 &mov("eax",&DWP(($na)*4,$a,"",0)) if $pos == 1; # load next a 73 &mov("eax",&DWP(($na)*4,$a,"",0)) if $pos == 0; # load next a 76 &mov("edx",&DWP(($nb)*4,$a,"",0)) if ($pos == 1) && ($na != $nb); 80 &mov(&DWP($i*4,$r,"",0),$c0) if $pos > 0; # save r[]; 81 &mov("eax",&DWP(($na)*4,$a,"",0)) if $pos == 1; # load next b 108 &mov("eax",&DWP(($na)*4,$a,"",0)) if $pos == 0; # load next a [all …]
|
/third_party/openssl/crypto/camellia/asm/ |
D | cmll-x86.pl | 64 $__ra=&DWP(0,"esp"); # return address 65 $__s0=&DWP(4,"esp"); # s0 backing store 66 $__s1=&DWP(8,"esp"); # s1 backing store 67 $__s2=&DWP(12,"esp"); # s2 backing store 68 $__s3=&DWP(16,"esp"); # s3 backing store 69 $__end=&DWP(20,"esp"); # pointer to end/start of key schedule 73 $_end=&DWP(16,"esp"); 74 $_esp=&DWP(20,"esp"); 95 &xor ($t1,&DWP($seed+$i*$scale+4,$key)); # t1^=key[1] 97 &mov ($t3,&DWP($SBOX3_3033,$Tbl,$idx,8)); # t3=SBOX3_3033[0] [all …]
|
/third_party/openssl/crypto/chacha/asm/ |
D | chacha-x86.pl | 105 &mov (&DWP(4*$cp,"esp"),$c_) if ($ai>0 && $ai<3); 107 &mov (&DWP(4*$bp,"esp"),$b_) if ($i!=0); 109 &mov ($c_,&DWP(4*$cn,"esp")) if ($ai>0 && $ai<3); 111 &mov ($d_,&DWP(4*$dn,"esp")) if ($di!=$dn); 113 &mov ($b_,&DWP(4*$bn,"esp")) if ($i<7); 114 &mov ($b_,&DWP(128,"esp")) if ($i==7); # loop counter 117 &mov (&DWP(4*$ai,"esp"),$a); 119 &mov ($a,&DWP(4*$an,"esp")); 121 &mov (&DWP(4*$di,"esp"),$d) if ($di!=$dn); 146 &test (&DWP(0,"ebp"),1<<24); # test FXSR bit [all …]
|
/third_party/openssl/crypto/perlasm/ |
D | cbc.pl | 66 &mov($in, &DWP(0,"ebx","",0));# iv[0] 67 &mov($out, &DWP(4,"ebx","",0));# iv[1] 109 &mov("eax", &DWP($data_off,"esp","",0)); # load iv[0] 110 &mov("ebx", &DWP($data_off+4,"esp","",0)); # load iv[1] 120 &mov("ecx", &DWP(0,$in,"",0)); # load first 4 bytes 121 &mov("edx", &DWP(4,$in,"",0)); # second 4 bytes 129 &mov(&DWP($data_off,"esp","",0), "eax"); # put in array for call 130 &mov(&DWP($data_off+4,"esp","",0), "ebx"); # 134 &mov("eax", &DWP($data_off,"esp","",0)); 135 &mov("ebx", &DWP($data_off+4,"esp","",0)); [all …]
|
/third_party/openssl/engines/asm/ |
D | e_padlock-x86.pl | 118 &mov ("ecx",&DWP(240,"edx")); 120 &mov ("eax",&DWP(0,"edx")); 122 &mov (&DWP(0,"edx"),"eax"); 123 &lea ("edx",&DWP(4,"edx")); 140 &lea ("eax",($::win32 or $::coff) ? &DWP(&label("padlock_saved_context")) : 141 &DWP(&label("padlock_saved_context")."-".&label("verify_pic_point"))); 145 &lea ("esp",&DWP(4,"esp")); 150 &add ("eax",&DWP(0,"esp")) if(!($::win32 or $::coff));# &padlock_saved_context 151 &bt (&DWP(4,"esp"),30); # eflags 153 &cmp ($ctx,&DWP(0,"eax")); [all …]
|
/third_party/openssl/crypto/ |
D | x86cpuid.pl | 34 &mov (&DWP(8,"esi"),"eax"); # clear extended feature flags 142 &mov (&DWP(8,"edi"),"ebx"); # save extended feature flag 159 &and (&DWP(8,"edi"),0xffffffdf); # clear AVX2 172 &bt (&DWP(0,"ecx"),4); 184 &bt (&DWP(0,"ecx"),4); 202 &sub ("eax",&DWP(0,"esp")); 203 &sbb ("edx",&DWP(4,"esp")); 227 &mov ("eax",&DWP(4,"esp")); 228 &mov ("ecx",&DWP(8,"esp")); 231 &mov ("edx",&DWP(0,"ecx")); [all …]
|
/third_party/openssl/crypto/rc4/asm/ |
D | rc4-586.pl | 89 &mov ($ty,&DWP(0,$dat,$yy,4)); 90 &mov (&DWP(0,$dat,$yy,4),$tx); 91 &mov (&DWP(0,$dat,$xx,4),$ty); 97 &mov ($tx,&DWP(0,$dat,$xx,4)); 101 &$func ($out,&DWP(0,$dat,$ty,4)); 117 &lea (@XX[1],&DWP(1,@XX[0])); 122 &mov ($ty,&DWP(0,$dat,$yy,4)); 123 &mov (&DWP(0,$dat,$yy,4),$tx); 125 &mov (&DWP(0,$dat,$XX[0],4),$ty); 128 &mov ($tx,&DWP(0,$dat,@XX[1],4)); [all …]
|
/third_party/openssl/crypto/poly1305/asm/ |
D | poly1305-x86.pl | 93 &mov (&DWP(4*0,"edi"),"eax"); # zero hash value 94 &mov (&DWP(4*1,"edi"),"eax"); 95 &mov (&DWP(4*2,"edi"),"eax"); 96 &mov (&DWP(4*3,"edi"),"eax"); 97 &mov (&DWP(4*4,"edi"),"eax"); 98 &mov (&DWP(4*5,"edi"),"eax"); # is_base2_26 108 &lea ("eax",&DWP("poly1305_blocks-".&label("pic_point"),"ebx")); 109 &lea ("edx",&DWP("poly1305_emit-".&label("pic_point"),"ebx")); 112 &mov ("ecx",&DWP(0,"edi")); 117 &lea ("eax",&DWP("_poly1305_blocks_sse2-".&label("pic_point"),"ebx")); [all …]
|
/third_party/openssl/crypto/modes/asm/ |
D | ghash-x86.pl | 158 &mov ($Zhh,&DWP(4,$Htbl,$Zll)); 159 &mov ($Zhl,&DWP(0,$Htbl,$Zll)); 160 &mov ($Zlh,&DWP(12,$Htbl,$Zll)); 161 &mov ($Zll,&DWP(8,$Htbl,$Zll)); 181 &xor ($Zhh,&DWP($off+16,"esp",$rem,4)); 190 &xor ($Zll,&DWP(8,$Htbl,$rem)); 191 &xor ($Zlh,&DWP(12,$Htbl,$rem)); 192 &xor ($Zhl,&DWP(0,$Htbl,$rem)); 193 &xor ($Zhh,&DWP(4,$Htbl,$rem)); 212 &xor ($Zhh,&DWP($off+16,"esp",$rem,4)); [all …]
|
/third_party/openssl/crypto/aes/asm/ |
D | vpaes-x86.pl | 172 &add ($const,&DWP(0,"esp")); 194 &mov ($round,&DWP(240,$key)); 206 &lea ($base,&DWP($k_mc_backward,$const)); 280 &lea ($base,&DWP($k_dsbd,$const)); 281 &mov ($round,&DWP(240,$key)); 299 &lea ($magic,&DWP($k_sr-$k_dsbd,$base,$magic)); 382 &add ($const,&DWP(0,"esp")); 388 &lea ($base,&DWP($k_ipt,$const)); 513 &lea ($base,&DWP($k_deskew,$const)); 520 &lea ($base,&DWP($k_opt,$const)); # prepare to output transform [all …]
|
D | aesni-x86.pl | 134 &lea ($key,&DWP(32,$key)); 141 &lea ($key,&DWP(16,$key)); 154 &lea ($key,&DWP(0x30,$key)); 157 &lea ($key,&DWP(0x20,$key)); 159 &lea ($key,&DWP(0x20,$key)); 198 &mov ($rounds,&DWP(240,$key)); 217 &mov ($rounds,&DWP(240,$key)); 255 &lea ($key,&DWP(32,$key,$rounds)); 287 &lea ($key,&DWP(32,$key,$rounds)); 328 &lea ($key,&DWP(32,$key,$rounds)); [all …]
|
/third_party/openssl/crypto/rc5/asm/ |
D | rc5-586.pl | 52 &mov($A,&DWP(0,$tmp4,"",0)); 53 &mov($B,&DWP(4,$tmp4,"",0)); 56 &mov($r, &DWP(0,$S,"",0)); 62 &add($A, &DWP(4+0,$S,"",0)); 63 &add($B, &DWP(4+4,$S,"",0)); 68 &mov($tmp1, &DWP(12+$i*8,$S,"",0)); 74 &mov($tmp1, &DWP(16+$i*8,$S,"",0)); 94 &mov($tmp1, &DWP($i*8+8,$S,"",0)); 100 &mov($tmp1, &DWP($i*8+4,$S,"",0)); 106 &sub($B, &DWP(4+4,$S,"",0)); [all …]
|
/third_party/openssl/crypto/whrlpool/asm/ |
D | wp-mmx.pl | 76 { if ($SCALE==2) { &lea(@_[0],&DWP(0,@_[1],@_[1])); } 77 elsif ($SCALE==8) { &lea(@_[0],&DWP(0,"",@_[1],8)); } 104 &lea ("ebx",&DWP(128,"esp")); 105 &mov (&DWP(0,"ebx"),"esi"); # save parameter block 106 &mov (&DWP(4,"ebx"),"edi"); 107 &mov (&DWP(8,"ebx"),"ebp"); 108 &mov (&DWP(16,"ebx"),"eax"); # saved stack pointer 113 &lea ($tbl,&DWP(&label("table")."-".&label("pic_point"),$tbl)); 125 &mov (&DWP(12,"ebx"),"esi"); # zero round counter 129 &mov ("eax",&DWP(0,"esp")); [all …]
|
/third_party/openssl/crypto/des/asm/ |
D | desboth.pl | 28 &mov($L,&DWP(0,"ebx","",0)); 29 &mov($R,&DWP(4,"ebx","",0)); 40 &mov(&DWP(4,"ebx","",0),$R); 42 &mov(&DWP(0,"ebx","",0),"edx"); 48 &mov(&DWP(4,"ebx","",0),$R); 50 &mov(&DWP(0,"ebx","",0),"edx"); 68 &mov($L,&DWP(0,"ebx","",0)); 69 &mov($R,&DWP(4,"ebx","",0)); 75 &mov(&DWP(0,"ebx","",0),"eax"); 76 &mov(&DWP(4,"ebx","",0),$R);
|
D | des-586.pl | 58 &lea("edx",&DWP(128,"ecx")); 96 &lea("ecx",&DWP(128,"ecx")); 146 &mov("eax",&DWP(0,$R,"",0)); 148 &mov($L,&DWP(4,$R,"",0)); 161 &mov($R,&DWP(0,"eax","",0)); 164 &mov($L,&DWP(4,"eax","",0)); 172 &lea ($trans,&DWP(&label("des_sptrans")."-".&label("pic_point"),$trans)); 191 &mov(&DWP(0,"edx","",0),"eax"); 192 &mov(&DWP(4,"edx","",0),$R); 201 &mov(&DWP(0,"eax","",0),$L); [all …]
|
/third_party/openssl/crypto/bf/asm/ |
D | bf-586.pl | 53 &mov($L,&DWP(0,$tmp2,"",0)); 54 &mov($R,&DWP(4,$tmp2,"",0)); 62 &mov($tmp2,&DWP(0,$P,"",0)); 77 &mov($tmp4,&DWP(($BF_ROUNDS+1)*4,$P,"",0)); 81 &mov($tmp2,&DWP(($BF_ROUNDS+1)*4,$P,"",0)); 95 &mov($tmp4,&DWP(0,$P,"",0)); 99 &mov(&DWP(4,$tmp1,"",0),$L); 101 &mov(&DWP(0,$tmp1,"",0),$R); 109 &mov( $tmp4, &DWP(&n2a($i*4),$P,"",0)); # for next round 123 &mov( $tmp1, &DWP(&n2a($BF_OFF+0x0000),$P,$tmp1,4)); [all …]
|