/third_party/openssl/crypto/ec/asm/ |
D | ecp_nistz256-x86.pl | 113 &mov ("esi",&wparam(1)); 114 &mov ("edi",&wparam(0)); 115 &mov ("ebp","esi"); 125 &mov ("esi",&wparam(1)); 133 &mov ("edi","esp"); 134 &mov ("ebp","esi"); 137 &mov ("ebp",&wparam(1)); 138 &mov ("edi",&wparam(0)); 146 &mov ("esi",&wparam(1)); 147 &mov ("edi",&wparam(0)); [all …]
|
/third_party/mesa3d/src/intel/tools/tests/gen7.5/ |
D | mov.asm | 1 mov(8) g114<1>D 0D { align16 1Q }; 2 mov.sat(8) g116<1>F g4<4>F { align16 1Q }; 3 mov(8) g114<1>.wF g5<4>.xF { align16 1Q }; 4 mov(8) g113<1>UD g0<4>UD { align16 WE_all 1Q }; 5 mov(4) g114<1>F g2.3<8,2,4>F { align1 WE_all 1N }; 6 mov(8) g126<1>F 0x0F /* 0F */ { align1 1Q }; 7 mov(8) g125<1>F -g9<8,8,1>D { align1 1Q }; 8 mov(16) g124<1>F 0x0F /* 0F */ { align1 1H }; 9 mov(16) g122<1>F -g15<8,8,1>D { align1 1H }; 10 mov(8) g126<1>D 1065353216D { align1 1Q }; [all …]
|
/third_party/mesa3d/src/intel/tools/tests/gen5/ |
D | mov.asm | 1 mov(8) m2<1>UD g1<8,8,1>UD { align1 nomask }; 2 mov(8) g9<1>.xyzUD 0x00000000UD { align16 }; 3 mov.sat(8) m5<1>F g4<4>F { align16 }; 4 mov(8) m4<1>F g6<4>F { align16 }; 5 mov(8) m2<1>UD g9<4>UD { align16 }; 6 mov(8) m3<1>F g4.3<0,1,0>F { align1 }; 7 mov(16) m3<1>F g4.3<0,1,0>F { align1 compr4 }; 8 mov(8) g2<1>F g2<8,8,1>UW { align1 }; 9 mov(8) g2<1>D g2<8,8,1>F { align1 }; 10 mov(8) g2<1>F g2<8,8,1>D { align1 }; [all …]
|
/third_party/openssl/crypto/camellia/asm/ |
D | cmll-x86.pl | 96 &mov ($t3,&DWP($SBOX3_3033,$Tbl,$idx,8)); # t3=SBOX3_3033[0] 101 &mov ($t2,&DWP($SBOX1_1110,$Tbl,$idx,8)); # t2=SBOX1_1110[1] 110 &mov ($t0,&DWP($frame+4*(($j+3)%4),"esp")); # prefetch "s3" 115 &mov ($t1,&DWP($frame+4*(($j+2)%4),"esp")); # prefetch "s2" 118 &mov ($idx,&DWP($seed+($i+1)*$scale,$key)); # prefetch key[i+1] 120 &mov (&DWP($frame+4*(($j+3)%4),"esp"),$t3); # s3=t3 122 &mov (&DWP($frame+4*(($j+2)%4),"esp"),$t2); # s2=t2 131 &mov ("eax",&wparam(0)); # load grandRounds 132 &mov ($idx,&wparam(1)); # load plaintext pointer 133 &mov ($key,&wparam(2)); # load key schedule pointer [all …]
|
/third_party/mesa3d/src/intel/tools/tests/gen8/ |
D | mov.asm | 1 mov(8) g123<1>UD g1<8,8,1>UD { align1 WE_all 1Q }; 2 mov(8) g124<1>F 0x40c00000F /* 6F */ { align1 1Q }; 3 mov(8) g14<1>UD 0x00000000UD { align1 1Q }; 4 mov(8) g17<1>F g12<8,8,1>F { align1 1Q }; 5 mov.sat(8) g124<1>F g8<8,8,1>F { align1 1Q }; 6 mov(8) g61<2>D g22<8,8,1>D { align1 1Q }; 7 mov(8) g21<1>D g59<8,4,2>UD { align1 1Q }; 8 mov(8) g4<1>D -1D { align1 1Q }; 9 mov.nz.f0.0(8) null<1>D g4<8,8,1>D { align1 1Q }; 10 mov(1) g2.2<1>UD 0x00000000UD { align1 WE_all 1N }; [all …]
|
/third_party/mesa3d/src/intel/tools/tests/gen6/ |
D | mov.asm | 1 mov(8) g7<1>F g4<8,8,1>D { align1 1Q }; 2 mov(8) m1<1>F g7<8,8,1>F { align1 1Q }; 3 mov(16) g7<1>F g5<8,8,1>D { align1 1H }; 4 mov(16) m1<1>F g7<8,8,1>F { align1 1H }; 5 mov(8) m2<1>D 0D { align16 1Q }; 6 mov(8) m3<1>F 0x41880000F /* 17F */ { align16 1Q }; 7 mov(8) m1<1>UD g0<4>UD { align16 WE_all 1Q }; 8 mov.sat(8) m4<1>F g4<4>F { align16 1Q }; 9 mov(8) m2<1>.wF g5<4>.xF { align16 1Q }; 10 mov(4) m2<1>F g2.3<8,2,4>F { align1 WE_all 1N }; [all …]
|
/third_party/mesa3d/src/intel/tools/tests/gen7/ |
D | mov.asm | 1 mov(8) g126<1>F g4<8,8,1>D { align1 1Q }; 2 mov(8) g124<1>F g126<8,8,1>F { align1 1Q }; 3 mov(16) g124<1>F g4<8,8,1>D { align1 1H }; 4 mov(16) g120<1>F g124<8,8,1>F { align1 1H }; 5 mov(8) g114<1>D 0D { align16 1Q }; 6 mov(8) g115<1>F 0x41880000F /* 17F */ { align16 1Q }; 7 mov(8) g113<1>UD g0<4>UD { align16 WE_all 1Q }; 8 mov.sat(8) g116<1>F g4<4>F { align16 1Q }; 9 mov(8) g114<1>.wF g5<4>.xF { align16 1Q }; 10 mov(4) g114<1>F g2.3<8,2,4>F { align1 WE_all 1N }; [all …]
|
/third_party/mesa3d/src/intel/tools/tests/gen9/ |
D | mov.asm | 1 mov(8) g123<1>UD g1<8,8,1>UD { align1 WE_all 1Q }; 2 mov(8) g124<1>F 0x40c00000F /* 6F */ { align1 1Q }; 3 mov(8) g14<1>UD 0x00000000UD { align1 1Q }; 4 mov(8) g17<1>F g12<8,8,1>F { align1 1Q }; 5 mov.sat(8) g124<1>F g8<8,8,1>F { align1 1Q }; 6 mov(8) g61<2>D g22<8,8,1>D { align1 1Q }; 7 mov(8) g21<1>D g59<8,4,2>UD { align1 1Q }; 8 mov(8) g4<1>D -1D { align1 1Q }; 9 mov.nz.f0.0(8) null<1>D g4<8,8,1>D { align1 1Q }; 10 mov(1) g2.2<1>UD 0x00000000UD { align1 WE_all 1N }; [all …]
|
/third_party/mesa3d/src/intel/tools/tests/gen4/ |
D | mov.asm | 1 mov(8) m3<1>F g16<8,8,1>F { align1 }; 2 mov(8) m7<1>F g17<8,8,1>F { align1 sechalf }; 3 mov(8) m2<1>UD g1<8,8,1>UD { align1 nomask }; 4 mov(8) g9<1>.xyzUD 0x00000000UD { align16 }; 5 mov.sat(8) m5<1>F g4<4>F { align16 }; 6 mov(8) m4<1>F g6<4>F { align16 }; 7 (+f0.0) mov(8) g8<1>F 0x0F /* 0F */ { align16 }; 8 mov(8) m2<1>UD g9<4>UD { align16 }; 9 mov(16) g6<1>D 1065353216D { align1 compr }; 10 mov.nz.f0.0(16) null<1>D g2<0,1,0>D { align1 compr }; [all …]
|
/third_party/mesa3d/src/intel/tools/tests/gen4.5/ |
D | mov.asm | 1 mov(8) m2<1>UD g1<8,8,1>UD { align1 nomask }; 2 mov(8) g9<1>.xyzUD 0x00000000UD { align16 }; 3 mov.sat(8) m5<1>F g4<4>F { align16 }; 4 mov(8) m4<1>F g6<4>F { align16 }; 5 mov(8) m2<1>UD g9<4>UD { align16 }; 6 mov(16) g6<1>D 1065353216D { align1 compr }; 7 mov.nz.f0.0(16) null<1>D g2<0,1,0>D { align1 compr }; 8 mov(16) m3<1>F 0x0F /* 0F */ { align1 compr4 }; 9 mov(16) m4<1>F g4<8,8,1>F { align1 compr4 }; 10 mov(8) m2<1>UD 0x00000000UD { align16 }; [all …]
|
/third_party/openssl/crypto/sha/asm/ |
D | sha256-586.pl | 127 &mov ($T,"ecx"); # "ecx" is preloaded 128 &mov ("esi",&DWP(4*(9+15+16-14),"esp")); 130 &mov ("edi","esi"); 150 &mov ("ecx",$E); 152 &mov ("esi",$Foff); 155 &mov ("edi",$Goff); 158 &mov ($T,&DWP(4*(9+15),"esp")) if (!$in_16_63); 159 &mov (&DWP(4*(9+15),"esp"),$T) if ($in_16_63); # save X[0] 162 &mov ($Eoff,$E); # modulo-scheduled 167 &mov ("ecx",$A); [all …]
|
/third_party/openssl/engines/asm/ |
D | e_padlock-x86.pl | 62 &mov ("ecx","eax"); 89 &mov ("eax",0xC0000000); 91 &mov ("edx","eax"); 95 &mov ("eax",1); 102 &mov ("eax",0xC0000001); 106 &mov ("eax","edx"); 116 &mov ("edx",&wparam(0)); 117 &mov ("ecx",&DWP(240,"edx")); 119 &mov ("eax",&DWP(0,"edx")); 121 &mov (&DWP(0,"edx"),"eax"); [all …]
|
/third_party/ffmpeg/tests/fate/ |
D | mov.mak | 1 FATE_MOV = fate-mov-3elist \ 2 fate-mov-3elist-1ctts \ 3 fate-mov-1elist-1ctts \ 4 fate-mov-1elist-noctts \ 5 fate-mov-elist-starts-ctts-2ndsample \ 6 fate-mov-1elist-ends-last-bframe \ 7 fate-mov-2elist-elist1-ends-bframe \ 8 fate-mov-3elist-encrypted \ 9 fate-mov-frag-encrypted \ 10 fate-mov-tenc-only-encrypted \ [all …]
|
/third_party/openssl/crypto/bn/asm/ |
D | via-mont.pl | 121 &mov ("ecx",&wparam(5)); # num 134 &mov ("edi",&wparam(0)); # rp 135 &mov ("eax",&wparam(1)); # ap 136 &mov ("ebx",&wparam(2)); # bp 137 &mov ("edx",&wparam(3)); # np 138 &mov ("esi",&wparam(4)); # n0 139 &mov ("esi",&DWP(0,"esi")); # *n0 148 &mov ($rp,"edi"); # save rp 149 &mov ($sp,"ebp"); # save esp 151 &mov ($mZeroPrime,"esi"); [all …]
|
D | x86-mont.pl | 69 &mov ("edi",&wparam(5)); # int num 84 &mov ("eax","ebp"); 104 &mov ("eax","esp"); 107 &mov ("edx","esp"); # saved stack pointer! 109 &mov ("eax",&DWP(0,"esp")); 116 &mov ("eax",&DWP(0,"esp")); 122 &mov ("eax",&DWP(0*4,"esi"));# BN_ULONG *rp 123 &mov ("ebx",&DWP(1*4,"esi"));# const BN_ULONG *ap 124 &mov ("ecx",&DWP(2*4,"esi"));# const BN_ULONG *bp 125 &mov ("ebp",&DWP(3*4,"esi"));# const BN_ULONG *np [all …]
|
D | x86-gf2m.pl | 67 &mov ($a1,$a); 71 &mov (&DWP(0*4,"esp"),0); 75 &mov (&DWP(1*4,"esp"),$a1); # a1 79 &mov (&DWP(2*4,"esp"),$a2); # a2 81 &mov (&DWP(3*4,"esp"),$a1); # a1^a2 85 &mov (&DWP(4*4,"esp"),$a4); # a4 89 &mov (&DWP(5*4,"esp"),$a1); # a1^a4 93 &mov (&DWP(6*4,"esp"),$a2); # a2^a4 94 &mov (@i[0],0x7); 95 &mov (&DWP(7*4,"esp"),$a4); # a1^a2^a4 [all …]
|
D | bn-586.pl | 50 &mov($r,&wparam(0)); 51 &mov($a,&wparam(1)); 52 &mov($c,&wparam(2)); 158 &mov($r,&wparam(0)); # 160 &mov("ecx",&wparam(2)); # 161 &mov($a,&wparam(1)); # 164 &mov($w,&wparam(3)); # 176 &mov("eax",&DWP($i,$a)); # *a 182 &mov(&DWP($i,$r),"eax"); # *r= L(t); 183 &mov($c,"edx"); # c= H(t); [all …]
|
/third_party/openssl/crypto/aes/asm/ |
D | aes-586.pl | 257 &mov ($v0,$s[3]); # copy s3 258 &mov (&DWP(4,"esp"),$s[2]); # save s2 259 &mov ($v1,$s[0]); # copy s0 260 &mov (&DWP(8,"esp"),$s[1]); # save s1 264 &mov ($s[0],&DWP(0,$te,$s[0],8)); # s0>>0 266 &mov ($s[3],&DWP(3,$te,$s[2],8)); # s0>>8 269 &mov ($s[2],&DWP(2,$te,$v1,8)); # s0>>16 270 &mov ($v1,$v0); 271 &mov ($s[1],&DWP(1,$te,$s[1],8)); # s0>>24 281 &mov ($v1,&DWP(4,"esp")); # restore s2 [all …]
|
/third_party/openssl/crypto/perlasm/ |
D | cbc.pl | 61 &mov($count, &wparam(2)); # length 64 &mov("ebx", &wparam($iv_off)); # Get iv ptr 66 &mov($in, &DWP(0,"ebx","",0));# iv[0] 67 &mov($out, &DWP(4,"ebx","",0));# iv[1] 74 &mov("ebx", "esp"); # This is the address of tin[2] 76 &mov($in, &wparam(0)); # in 77 &mov($out, &wparam(1)); # out 81 &mov("ecx", &wparam($enc_off)); # Get enc flag 86 { &mov("eax", &wparam($p3)); &push("eax"); } 93 { &mov("eax", &wparam($p2)); &push("eax"); } [all …]
|
/third_party/openssl/crypto/ |
D | x86cpuid.pl | 23 &mov ("ecx","eax"); 31 &mov ("esi",&wparam(0)); 32 &mov (&DWP(8,"esi"),"eax"); # clear extended feature flags 36 &mov ("edi","eax"); # max value for standard query level 41 &mov ("ebp","eax"); 52 &mov ("esi","eax"); 62 &mov ("eax",0x80000000); 66 &mov ("esi","eax"); 67 &mov ("eax",0x80000001); 74 &mov ("eax",0x80000008); [all …]
|
D | ia64cpuid.S | 26 { .mib; mov r8=ar.itc 38 { .mii; mov ar.ccv=r2 40 mov r3=r2 };; 68 mov r3=ar.lc 71 { .mii; mov r9=ar.bsp 72 mov r8=pr 73 mov ar.lc=96 };; 76 mov ar.ec=1 };; 82 mov f127=f0 83 mov r127=r0 } [all …]
|
/third_party/libffi/src/sh/ |
D | sysv.S | 57 mov.l r8,@-r15 59 mov.l r9,@-r15 61 mov.l r10,@-r15 63 mov.l r12,@-r15 65 mov.l r14,@-r15 69 mov r15,r14 72 mov r6,r8 73 mov r7,r9 77 mov #~7,r0 80 mov r4,r0 [all …]
|
/third_party/libunwind/tests/ |
D | ia64-test-nat-asm.S | 32 mov b6 = r3; \ 33 mov gp_save_reg = gp; \ 34 mov out0 = arg0; \ 35 mov out1 = arg1; \ 36 mov gp = r2; \ 38 mov gp = gp_save_reg 67 mov loc1 = rp 69 mov loc2 = r4 71 mov loc3 = r5 73 mov loc4 = r6 [all …]
|
/third_party/musl/src/string/i386/ |
D | memset.s | 4 mov 12(%esp),%ecx 8 mov 8(%esp),%dl 9 mov 4(%esp),%eax 13 mov %dl,%dh 15 mov %dl,(%eax) 16 mov %dl,-1(%eax,%ecx) 20 mov %dx,1(%eax) 21 mov %dx,(-1-2)(%eax,%ecx) 26 mov 8(%esp),%dl 27 mov 8(%esp),%dh [all …]
|
/third_party/openssl/crypto/des/asm/ |
D | desboth.pl | 19 &mov("ebx",&wparam(0)); 28 &mov($L,&DWP(0,"ebx","",0)); 29 &mov($R,&DWP(4,"ebx","",0)); 40 &mov(&DWP(4,"ebx","",0),$R); 41 &mov("eax",&wparam(1)); 42 &mov(&DWP(0,"ebx","",0),"edx"); 43 &mov("edi",&wparam(2)); 44 &mov("esi",&wparam(3)); 48 &mov(&DWP(4,"ebx","",0),$R); 49 &mov("esi",&wparam(1)); [all …]
|