/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
D | riprel2.asm | 5 mov rax,[foo] 6 mov rax,[qword 123456789abcdef0h] 7 mov rbx,[foo] 8 mov rax,[dword foo] 9 mov rbx,[dword foo] 10 mov rax,[qword foo] 11 mov rax,[rel foo] ; rel 12 mov rbx,[rel foo] ; rel 13 mov rax,[rel dword foo] ; rel 14 ;mov rax,[rel qword foo] ; illegal [all …]
|
/external/chromium_org/third_party/boringssl/win-x86_64/crypto/bn/ |
D | modexp512-x86_64.asm | 7 mov rax,QWORD PTR[rsi] 11 mov QWORD PTR[rcx],r8 12 mov rbx,rdx 14 mov rax,QWORD PTR[8+rsi] 20 mov rbx,rdx 22 mov rax,QWORD PTR[16+rsi] 28 mov rbx,rdx 30 mov rax,QWORD PTR[24+rsi] 36 mov rbx,rdx 38 mov rax,QWORD PTR[32+rsi] [all …]
|
D | rsaz-x86_64.asm | 10 mov QWORD PTR[8+rsp],rdi ;WIN64 prologue 11 mov QWORD PTR[16+rsp],rsi 12 mov rax,rsp 14 mov rdi,rcx 15 mov rsi,rdx 16 mov rdx,r8 17 mov rcx,r9 18 mov r8,QWORD PTR[40+rsp] 30 mov rbp,rdx 31 mov rdx,QWORD PTR[rsi] [all …]
|
D | x86_64-mont.asm | 10 mov QWORD PTR[8+rsp],rdi ;WIN64 prologue 11 mov QWORD PTR[16+rsp],rsi 12 mov rax,rsp 14 mov rdi,rcx 15 mov rsi,rdx 16 mov rdx,r8 17 mov rcx,r9 18 mov r8,QWORD PTR[40+rsp] 19 mov r9,QWORD PTR[48+rsp] 41 mov r9d,r9d [all …]
|
D | x86_64-mont5.asm | 10 mov QWORD PTR[8+rsp],rdi ;WIN64 prologue 11 mov QWORD PTR[16+rsp],rsi 12 mov rax,rsp 14 mov rdi,rcx 15 mov rsi,rdx 16 mov rdx,r8 17 mov rcx,r9 18 mov r8,QWORD PTR[40+rsp] 19 mov r9,QWORD PTR[48+rsp] 28 mov r9d,r9d [all …]
|
/external/openssl/crypto/sha/asm/ |
D | sha256-586.pl | 50 &mov ("ecx",$E); 53 &mov ("esi",$Foff); 56 &mov (&DWP(4*(8+15),"esp"),$T) if ($in_16_63); # save X[0] 59 &mov ("edi",$Goff); 63 &mov ($Eoff,$E); # modulo-scheduled 64 &mov ("ecx",$A); 66 &mov ($E,$Doff); # e becomes d, which is e in next iteration 68 &mov ("edi",$A); 75 &mov ("esi",$Boff); 79 &mov ("edi",$Coff); [all …]
|
D | sha512-586.pl | 132 &mov (&LB("edx"),&BP(0,$K512)); 141 &mov ("ecx",$Elo); 142 &mov ("edx",$Ehi); 143 &mov ("esi","ecx"); 146 &mov ("edi","edx"); 148 &mov ("ebx","ecx"); 150 &mov ("eax","edx"); 173 &mov ("ecx",$Flo); 174 &mov ("edx",$Fhi); 175 &mov ("esi",$Glo); [all …]
|
/external/llvm/test/MC/X86/ |
D | intel-syntax.s | 9 mov DWORD PTR [RSP - 4], 257 11 mov DWORD PTR [RSP + 4], 258 13 mov QWORD PTR [RSP - 16], 123 15 mov BYTE PTR [RSP - 17], 97 17 mov EAX, DWORD PTR [RSP - 4] 19 mov RAX, QWORD PTR [RSP] 21 mov DWORD PTR [RSP - 4], -4 23 mov RCX, QWORD PTR [0] 25 mov EAX, DWORD PTR [RSP + 4*RAX - 24] 27 mov BYTE PTR [RDX + RCX], DIL [all …]
|
/external/clang/test/CodeGen/ |
D | ms-inline-asm.c | 34 __asm mov ebx, eax in t4() 35 __asm mov ecx, ebx in t4() 42 __asm mov ebx, eax __asm mov ecx, ebx in t5() 81 { mov ebx, 0x07 } 91 mov eax, i 92 mov j, eax 105 __asm mov eax, 1 113 mov eax, i 114 mov j, eax 115 mov eax, l [all …]
|
/external/chromium_org/third_party/boringssl/src/crypto/sha/asm/ |
D | sha256-586.pl | 114 &mov ($T,"ecx"); # "ecx" is preloaded 115 &mov ("esi",&DWP(4*(9+15+16-14),"esp")); 117 &mov ("edi","esi"); 137 &mov ("ecx",$E); 139 &mov ("esi",$Foff); 142 &mov ("edi",$Goff); 145 &mov ($T,&DWP(4*(9+15),"esp")) if (!$in_16_63); 146 &mov (&DWP(4*(9+15),"esp"),$T) if ($in_16_63); # save X[0] 149 &mov ($Eoff,$E); # modulo-scheduled 154 &mov ("ecx",$A); [all …]
|
/external/openssl/crypto/bn/asm/ |
D | via-mont.pl | 112 &mov ("ecx",&wparam(5)); # num 125 &mov ("edi",&wparam(0)); # rp 126 &mov ("eax",&wparam(1)); # ap 127 &mov ("ebx",&wparam(2)); # bp 128 &mov ("edx",&wparam(3)); # np 129 &mov ("esi",&wparam(4)); # n0 130 &mov ("esi",&DWP(0,"esi")); # *n0 139 &mov ($rp,"edi"); # save rp 140 &mov ($sp,"ebp"); # save esp 142 &mov ($mZeroPrime,"esi"); [all …]
|
D | x86-mont.pl | 60 &mov ("edi",&wparam(5)); # int num 66 &mov ("ebp","esp"); # saved stack pointer! 76 &mov ("eax","esp"); 89 &mov ("eax",&DWP(0*4,"esi"));# BN_ULONG *rp 90 &mov ("ebx",&DWP(1*4,"esi"));# const BN_ULONG *ap 91 &mov ("ecx",&DWP(2*4,"esi"));# const BN_ULONG *bp 92 &mov ("edx",&DWP(3*4,"esi"));# const BN_ULONG *np 93 &mov ("esi",&DWP(4*4,"esi"));# const BN_ULONG *n0 96 &mov ("esi",&DWP(0,"esi")); # pull n0[0] 97 &mov ($_rp,"eax"); # ... save a copy of argument block [all …]
|
/external/valgrind/main/exp-bbv/tests/x86/ |
D | rep_prefix.S | 21 mov $8192, %ecx 22 mov $buffer1, %esi # set source 25 mov $8192, %ecx 26 mov $buffer1, %esi # set source 37 mov $0xd, %al # set eax to d 41 mov $16384, %ecx 42 mov $buffer1, %edi # set destination 47 mov $16384, %ecx 48 mov $buffer1, %esi # set source 56 mov $0x020d,%ax # store 0x020d [all …]
|
/external/valgrind/main/none/tests/mips64/ |
D | move_instructions.stdout.exp-BE | 1 mtc1, mov.s, mfc1 :: mem: 0x0 out: 0x0 2 dmtc1, mov.d, dmfc1 :: mem: 0x0 out: 0x0 3 mtc1, mov.s, mfc1 :: mem: 0x12bd6aa out: 0x12bd6aa 4 dmtc1, mov.d, dmfc1 :: mem: 0x12bd6aa out: 0x12bd6aa 5 mtc1, mov.s, mfc1 :: mem: 0x0 out: 0x0 6 dmtc1, mov.d, dmfc1 :: mem: 0x0 out: 0x0 7 mtc1, mov.s, mfc1 :: mem: 0x7e876382d2ab13 out: 0xffffffff82d2ab13 8 dmtc1, mov.d, dmfc1 :: mem: 0x7e876382d2ab13 out: 0x7e876382d2ab13 9 mtc1, mov.s, mfc1 :: mem: 0x9823b6e out: 0x9823b6e 10 dmtc1, mov.d, dmfc1 :: mem: 0x9823b6e out: 0x9823b6e [all …]
|
D | move_instructions.stdout.exp-LE | 1 mtc1, mov.s, mfc1 :: mem: 0x0 out: 0x0 2 dmtc1, mov.d, dmfc1 :: mem: 0x0 out: 0x0 3 mtc1, mov.s, mfc1 :: mem: 0x12bd6aa out: 0x12bd6aa 4 dmtc1, mov.d, dmfc1 :: mem: 0x12bd6aa out: 0x12bd6aa 5 mtc1, mov.s, mfc1 :: mem: 0x0 out: 0x0 6 dmtc1, mov.d, dmfc1 :: mem: 0x0 out: 0x0 7 mtc1, mov.s, mfc1 :: mem: 0x7e876382d2ab13 out: 0xffffffff82d2ab13 8 dmtc1, mov.d, dmfc1 :: mem: 0x7e876382d2ab13 out: 0x7e876382d2ab13 9 mtc1, mov.s, mfc1 :: mem: 0x9823b6e out: 0x9823b6e 10 dmtc1, mov.d, dmfc1 :: mem: 0x9823b6e out: 0x9823b6e [all …]
|
/external/chromium_org/third_party/boringssl/src/crypto/aes/asm/ |
D | aes-586.pl | 248 &mov ($v0,$s[3]); # copy s3 249 &mov (&DWP(4,"esp"),$s[2]); # save s2 250 &mov ($v1,$s[0]); # copy s0 251 &mov (&DWP(8,"esp"),$s[1]); # save s1 255 &mov ($s[0],&DWP(0,$te,$s[0],8)); # s0>>0 257 &mov ($s[3],&DWP(3,$te,$s[2],8)); # s0>>8 260 &mov ($s[2],&DWP(2,$te,$v1,8)); # s0>>16 261 &mov ($v1,$v0); 262 &mov ($s[1],&DWP(1,$te,$s[1],8)); # s0>>24 272 &mov ($v1,&DWP(4,"esp")); # restore s2 [all …]
|
/external/chromium_org/third_party/boringssl/src/crypto/perlasm/ |
D | cbc.pl | 54 &mov($count, &wparam(2)); # length 57 &mov("ebx", &wparam($iv_off)); # Get iv ptr 59 &mov($in, &DWP(0,"ebx","",0));# iv[0] 60 &mov($out, &DWP(4,"ebx","",0));# iv[1] 67 &mov("ebx", "esp"); # This is the address of tin[2] 69 &mov($in, &wparam(0)); # in 70 &mov($out, &wparam(1)); # out 74 &mov("ecx", &wparam($enc_off)); # Get enc flag 79 { &mov("eax", &wparam($p3)); &push("eax"); } 86 { &mov("eax", &wparam($p2)); &push("eax"); } [all …]
|
/external/openssl/crypto/perlasm/ |
D | cbc.pl | 54 &mov($count, &wparam(2)); # length 57 &mov("ebx", &wparam($iv_off)); # Get iv ptr 59 &mov($in, &DWP(0,"ebx","",0));# iv[0] 60 &mov($out, &DWP(4,"ebx","",0));# iv[1] 67 &mov("ebx", "esp"); # This is the address of tin[2] 69 &mov($in, &wparam(0)); # in 70 &mov($out, &wparam(1)); # out 74 &mov("ecx", &wparam($enc_off)); # Get enc flag 79 { &mov("eax", &wparam($p3)); &push("eax"); } 86 { &mov("eax", &wparam($p2)); &push("eax"); } [all …]
|
/external/openssl/crypto/aes/asm/ |
D | aes-586.pl | 247 &mov ($v0,$s[3]); # copy s3 248 &mov (&DWP(4,"esp"),$s[2]); # save s2 249 &mov ($v1,$s[0]); # copy s0 250 &mov (&DWP(8,"esp"),$s[1]); # save s1 254 &mov ($s[0],&DWP(0,$te,$s[0],8)); # s0>>0 256 &mov ($s[3],&DWP(3,$te,$s[2],8)); # s0>>8 259 &mov ($s[2],&DWP(2,$te,$v1,8)); # s0>>16 260 &mov ($v1,$v0); 261 &mov ($s[1],&DWP(1,$te,$s[1],8)); # s0>>24 271 &mov ($v1,&DWP(4,"esp")); # restore s2 [all …]
|
/external/chromium_org/third_party/tcmalloc/chromium/src/windows/ |
D | shortproc.asm | 79 mov rax, 1 86 mov rdx, 0ffff1111H 87 mov rdx, 0ffff1111H 88 mov rdx, 0ffff1111H 89 mov rdx, 0ffff1111H 90 mov rdx, 0ffff1111H 91 mov rdx, 0ffff1111H 92 mov rdx, 0ffff1111H 93 mov rdx, 0ffff1111H 94 mov rdx, 0ffff1111H [all …]
|
/external/chromium_org/third_party/tcmalloc/vendor/src/windows/ |
D | shortproc.asm | 79 mov rax, 1 86 mov rdx, 0ffff1111H 87 mov rdx, 0ffff1111H 88 mov rdx, 0ffff1111H 89 mov rdx, 0ffff1111H 90 mov rdx, 0ffff1111H 91 mov rdx, 0ffff1111H 92 mov rdx, 0ffff1111H 93 mov rdx, 0ffff1111H 94 mov rdx, 0ffff1111H [all …]
|
/external/qemu/distrib/sdl-1.2.15/src/hermes/ |
D | x86p_32.asm | 45 mov edx,[esi] 48 mov [edi],edx 60 mov ebp,ecx 66 .L4: mov eax,[esi] 67 mov ebx,[esi+4] 74 mov ecx,[esi+8] 77 mov edx,[esi+12] 84 mov [edi+0],eax 87 mov [edi+4],ebx 89 mov [edi+8],ecx [all …]
|
/external/chromium_org/third_party/boringssl/src/crypto/bn/asm/ |
D | x86-mont.pl | 60 &mov ("edi",&wparam(5)); # int num 66 &mov ("ebp","esp"); # saved stack pointer! 76 &mov ("eax","esp"); 89 &mov ("eax",&DWP(0*4,"esi"));# BN_ULONG *rp 90 &mov ("ebx",&DWP(1*4,"esi"));# const BN_ULONG *ap 91 &mov ("ecx",&DWP(2*4,"esi"));# const BN_ULONG *bp 92 &mov ("edx",&DWP(3*4,"esi"));# const BN_ULONG *np 93 &mov ("esi",&DWP(4*4,"esi"));# const BN_ULONG *n0 96 &mov ("esi",&DWP(0,"esi")); # pull n0[0] 97 &mov ($_rp,"eax"); # ... save a copy of argument block [all …]
|
/external/chromium_org/third_party/boringssl/win-x86_64/crypto/rc4/ |
D | rc4-x86_64.asm | 9 mov QWORD PTR[8+rsp],rdi ;WIN64 prologue 10 mov QWORD PTR[16+rsp],rsi 11 mov rax,rsp 13 mov rdi,rcx 14 mov rsi,rdx 15 mov rdx,r8 16 mov rcx,r9 21 mov rdi,QWORD PTR[8+rsp] ;WIN64 epilogue 22 mov rsi,QWORD PTR[16+rsp] 29 mov r11,rsi [all …]
|
/external/zlib/src/contrib/masmx64/ |
D | inffasx64.asm | 32 mov [rsp-8],rsi 33 mov [rsp-16],rdi 34 mov [rsp-24],r12 35 mov [rsp-32],r13 36 mov [rsp-40],r14 37 mov [rsp-48],r15 38 mov [rsp-56],rbx 40 mov rax,rcx 42 mov [rax+8], rbp ; /* save regs rbp and rsp */ 43 mov [rax], rsp [all …]
|