Home
last modified time | relevance | path

Searched refs:esp (Results 1 – 25 of 574) sorted by relevance

12345678910>>...23

/external/ppp/pppd/
Deap.c203 eap_state *esp = &eap_states[unit]; local
205 BZERO(esp, sizeof (*esp));
206 esp->es_unit = unit;
207 esp->es_server.ea_timeout = EAP_DEFTIMEOUT;
208 esp->es_server.ea_maxrequests = EAP_DEFTRANSMITS;
209 esp->es_server.ea_id = (u_char)(drand48() * 0x100);
210 esp->es_client.ea_timeout = EAP_DEFREQTIME;
211 esp->es_client.ea_maxrequests = EAP_DEFALLOWREQ;
222 eap_state *esp = (eap_state *) arg; local
224 if (!eap_client_active(esp))
[all …]
/external/boringssl/linux-x86/crypto/sha/
Dsha256-586.S14 movl 20(%esp),%esi
15 movl 24(%esp),%edi
16 movl 28(%esp),%eax
17 movl %esp,%ebx
22 subl $16,%esp
23 andl $-64,%esp
26 movl %esi,(%esp)
27 movl %edi,4(%esp)
28 movl %eax,8(%esp)
29 movl %ebx,12(%esp)
[all …]
Dsha1-586.S34 movl 20(%esp),%ebp
35 movl 24(%esp),%esi
36 movl 28(%esp),%eax
37 subl $76,%esp
40 movl %eax,104(%esp)
53 movl %eax,(%esp)
54 movl %ebx,4(%esp)
55 movl %ecx,8(%esp)
56 movl %edx,12(%esp)
65 movl %eax,16(%esp)
[all …]
Dsha512-586.S14 movl 20(%esp),%esi
15 movl 24(%esp),%edi
16 movl 28(%esp),%eax
17 movl %esp,%ebx
22 subl $16,%esp
23 andl $-64,%esp
26 movl %esi,(%esp)
27 movl %edi,4(%esp)
28 movl %eax,8(%esp)
29 movl %ebx,12(%esp)
[all …]
/external/boringssl/mac-x86/crypto/sha/
Dsha256-586.S13 movl 20(%esp),%esi
14 movl 24(%esp),%edi
15 movl 28(%esp),%eax
16 movl %esp,%ebx
21 subl $16,%esp
22 andl $-64,%esp
25 movl %esi,(%esp)
26 movl %edi,4(%esp)
27 movl %eax,8(%esp)
28 movl %ebx,12(%esp)
[all …]
Dsha1-586.S33 movl 20(%esp),%ebp
34 movl 24(%esp),%esi
35 movl 28(%esp),%eax
36 subl $76,%esp
39 movl %eax,104(%esp)
52 movl %eax,(%esp)
53 movl %ebx,4(%esp)
54 movl %ecx,8(%esp)
55 movl %edx,12(%esp)
64 movl %eax,16(%esp)
[all …]
Dsha512-586.S13 movl 20(%esp),%esi
14 movl 24(%esp),%edi
15 movl 28(%esp),%eax
16 movl %esp,%ebx
21 subl $16,%esp
22 andl $-64,%esp
25 movl %esi,(%esp)
26 movl %edi,4(%esp)
27 movl %eax,8(%esp)
28 movl %ebx,12(%esp)
[all …]
/external/boringssl/win-x86/crypto/sha/
Dsha256-586.asm26 mov esi,DWORD [20+esp]
27 mov edi,DWORD [24+esp]
28 mov eax,DWORD [28+esp]
29 mov ebx,esp
34 sub esp,16
35 and esp,-64
38 mov DWORD [esp],esi
39 mov DWORD [4+esp],edi
40 mov DWORD [8+esp],eax
41 mov DWORD [12+esp],ebx
[all …]
Dsha1-586.asm46 mov ebp,DWORD [20+esp]
47 mov esi,DWORD [24+esp]
48 mov eax,DWORD [28+esp]
49 sub esp,76
52 mov DWORD [104+esp],eax
65 mov DWORD [esp],eax
66 mov DWORD [4+esp],ebx
67 mov DWORD [8+esp],ecx
68 mov DWORD [12+esp],edx
77 mov DWORD [16+esp],eax
[all …]
Dsha512-586.asm26 mov esi,DWORD [20+esp]
27 mov edi,DWORD [24+esp]
28 mov eax,DWORD [28+esp]
29 mov ebx,esp
34 sub esp,16
35 and esp,-64
38 mov DWORD [esp],esi
39 mov DWORD [4+esp],edi
40 mov DWORD [8+esp],eax
41 mov DWORD [12+esp],ebx
[all …]
/external/boringssl/linux-x86/crypto/bn/
Dx86-mont.S15 movl 40(%esp),%edi
18 leal 20(%esp),%esi
19 leal 24(%esp),%edx
20 movl %esp,%ebp
23 leal -32(%esp,%edi,4),%esp
25 movl %esp,%eax
28 subl %eax,%esp
29 xorl %esp,%edx
32 subl %edx,%esp
33 andl $-64,%esp
[all …]
/external/boringssl/mac-x86/crypto/bn/
Dx86-mont.S14 movl 40(%esp),%edi
17 leal 20(%esp),%esi
18 leal 24(%esp),%edx
19 movl %esp,%ebp
22 leal -32(%esp,%edi,4),%esp
24 movl %esp,%eax
27 subl %eax,%esp
28 xorl %esp,%edx
31 subl %edx,%esp
32 andl $-64,%esp
[all …]
/external/google-breakpad/src/tools/windows/dump_syms/testdata/
Domap_reorder_bbs.sym3705 STACK WIN 4 2cec 54 6 0 8 0 14 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
3706 STACK WIN 4 4b70 a 3 0 0 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
3707 STACK WIN 4 25a8 21 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
3708 STACK WIN 4 131c 14 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
3709 STACK WIN 4 1b94 16 7 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
3710 STACK WIN 4 11e8 1e 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
3711 STACK WIN 4 1b3c 10 7 0 0 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
3712 STACK WIN 4 669c 7 3 0 4 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
3713 STACK WIN 4 16d4 7 7 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
3714 STACK WIN 4 16db 19 0 0 4 0 4 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + =
[all …]
/external/boringssl/win-x86/crypto/bn/
Dx86-mont.asm27 mov edi,DWORD [40+esp]
30 lea esi,[20+esp]
31 lea edx,[24+esp]
32 mov ebp,esp
35 lea esp,[edi*4+esp-32]
37 mov eax,esp
40 sub esp,eax
41 xor edx,esp
44 sub esp,edx
45 and esp,-64
[all …]
/external/boringssl/mac-x86/crypto/modes/
Dghash-x86.S13 subl $84,%esp
14 movl 104(%esp),%edi
15 movl 108(%esp),%esi
20 movl $0,16(%esp)
21 movl $471859200,20(%esp)
22 movl $943718400,24(%esp)
23 movl $610271232,28(%esp)
24 movl $1887436800,32(%esp)
25 movl $1822425088,36(%esp)
26 movl $1220542464,40(%esp)
[all …]
/external/boringssl/linux-x86/crypto/modes/
Dghash-x86.S14 subl $84,%esp
15 movl 104(%esp),%edi
16 movl 108(%esp),%esi
21 movl $0,16(%esp)
22 movl $471859200,20(%esp)
23 movl $943718400,24(%esp)
24 movl $610271232,28(%esp)
25 movl $1887436800,32(%esp)
26 movl $1822425088,36(%esp)
27 movl $1220542464,40(%esp)
[all …]
/external/google-breakpad/src/processor/testdata/symbols/kernel32.pdb/BCE8785C57B44245A669896B6A19B9542/
Dkernel32.sym1578 STACK WIN 4 b5ae 16 5 0 c 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c…
1579 STACK WIN 4 9b47 66 5 0 4 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c…
1580 STACK WIN 4 17826 35 0 0 0 0 0 0 1 $T2 $esp .cbLocals + .cbSavedRegs + = $T0 .raSearchStart = $eip …
1581 STACK WIN 4 55709 1f7 c 0 10 8 4c 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T…
1582 …K WIN 4 558b4 e 0 0 10 8 4c 0 1 $T0 $ebp = $T2 $esp = $T1 .raSearchStart = $eip $T1 ^ = $ebp $ebp …
1583 STACK WIN 4 be41 c7 c 0 4 8 3c 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .…
1584 …CK WIN 4 39bc8 e 0 0 4 8 3c 0 1 $T0 $ebp = $T2 $esp = $T1 .raSearchStart = $eip $T1 ^ = $ebp $ebp …
1585 STACK WIN 4 98f4 2b 5 0 8 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c…
1586 STACK WIN 4 936b 1e 6 0 4 0 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c…
1587 STACK WIN 4 9371 14 0 0 4 4 0 0 1 $T0 $ebp = $eip $T0 4 + ^ = $ebp $T0 ^ = $esp $T0 8 + = $L $T0 .c…
[all …]
/external/boringssl/win-x86/crypto/modes/
Dghash-x86.asm25 sub esp,84
26 mov edi,DWORD [104+esp]
27 mov esi,DWORD [108+esp]
32 mov DWORD [16+esp],0
33 mov DWORD [20+esp],471859200
34 mov DWORD [24+esp],943718400
35 mov DWORD [28+esp],610271232
36 mov DWORD [32+esp],1887436800
37 mov DWORD [36+esp],1822425088
38 mov DWORD [40+esp],1220542464
[all …]
/external/compiler-rt/lib/builtins/i386/
Dmoddi3.S30 movl 20(%esp), %edx // high word of b
31 movl 16(%esp), %eax // low word of b
38 movl %edx, 20(%esp)
39 movl %eax, 16(%esp) // store abs(b) back to stack
41 movl 12(%esp), %edx // high word of b
42 movl 8(%esp), %eax // low word of b
49 movl %edx, 12(%esp)
50 movl %eax, 8(%esp) // store abs(a) back to stack
54 movl 24(%esp), %ebx // Find the index i of the leading bit in b.
60 movl 20(%esp), %eax // Construct bhi, containing bits [1+i:32+i] of b
[all …]
Dumoddi3.S27 movl 20(%esp), %ebx // Find the index i of the leading bit in b.
33 movl 16(%esp), %eax // Construct bhi, containing bits [1+i:32+i] of b
40 movl 12(%esp), %edx // Load the high and low words of a, and jump
41 movl 8(%esp), %eax // to [2] if the high word is larger than bhi
54 mull 20(%esp) // q*blo
55 movl 12(%esp), %ebx
56 movl 16(%esp), %ecx // ECX:EBX = a
59 movl 24(%esp), %eax
64 addl 20(%esp), %ebx // otherwise
65 adcl 24(%esp), %ecx // ECX:EBX = a - (q-1)*b = result
[all …]
Ddivdi3.S30 movl 20(%esp), %edx // high word of b
31 movl 16(%esp), %eax // low word of b
38 movl %edx, 20(%esp)
39 movl %eax, 16(%esp) // store abs(b) back to stack
42 movl 12(%esp), %edx // high word of b
43 movl 8(%esp), %eax // low word of b
50 movl %edx, 12(%esp)
51 movl %eax, 8(%esp) // store abs(a) back to stack
55 movl 24(%esp), %ebx // Find the index i of the leading bit in b.
61 movl 20(%esp), %eax // Construct bhi, containing bits [1+i:32+i] of b
[all …]
/external/zlib/src/contrib/asm686/
Dmatch.S103 subl $LocalVarsSize, %esp
111 movl deflatestate(%esp), %edx
112 movl curmatch(%esp), %ecx
137 movl %ebx, chainlenwmask(%esp)
146 LookaheadLess: movl %ebx, nicematch(%esp)
151 movl %esi, window(%esp)
154 movl %edi, scan(%esp)
162 movl %eax, scanalign(%esp)
177 movl %eax, bestlen(%esp)
182 movl %esi, windowbestlen(%esp)
[all …]
/external/llvm/lib/Target/X86/
DREADME-MMX.txt18 subl $28, %esp
19 movl 32(%esp), %eax
21 movq %mm0, (%esp)
22 movl (%esp), %eax
23 movl %eax, 20(%esp)
24 movq %mm0, 8(%esp)
25 movl 12(%esp), %eax
26 movl %eax, 16(%esp)
27 movq 16(%esp), %mm0
28 addl $28, %esp
[all …]
/external/zlib/src/contrib/inflate86/
Dinffas86.c79 /* 0 0 */ void *esp; /* esp save */ member
800 mov [eax], esp /* save esp, ebp */
802 mov esp, eax
803 mov esi, [esp+8] /* esi = in */
804 mov edi, [esp+16] /* edi = out */
805 mov edx, [esp+40] /* edx = hold */
806 mov ebx, [esp+44] /* ebx = bits */
807 mov ebp, [esp+32] /* ebp = lcode */
814 cmp [esp+24], edi
816 cmp [esp+12], esi
[all …]
/external/boringssl/linux-x86/crypto/aes/
Daesni-x86.S10 movl 4(%esp),%eax
11 movl 12(%esp),%edx
14 movl 8(%esp),%eax
38 movl 4(%esp),%eax
39 movl 12(%esp),%edx
42 movl 8(%esp),%eax
380 movl 20(%esp),%esi
381 movl 24(%esp),%edi
382 movl 28(%esp),%eax
383 movl 32(%esp),%edx
[all …]

12345678910>>...23