/openssl/crypto/ |
H A D | x86_64cpuid.pl | 88 cmp \$0x49656e69,%edx # "ineI" 99 cmp \$0x69746E65,%edx # "enti" 133 and \$0xefffffff,%edx # ~(1<<28) 174 and \$0xefffffff,%edx # ~(1<<28) 178 or \$0x10000000,%edx # 1<<28 188 mov %edx,%r10d # %r9d:%r10d is copy of %ecx:%edx 401 mov %eax,%edx 403 mov %edx,$lasttick 437 mov %eax,%edx 450 mov %eax,%edx [all …]
|
/openssl/crypto/md5/asm/ |
H A D | md5-x86_64.pl | 25 $code .= " mov %edx, %r11d /* (NEXT STEP) z' = %edx */\n" if ($pos == -1); 48 $code .= " mov %edx, %r11d /* (NEXT STEP) z' = %edx */\n" if ($pos == -1); 49 $code .= " mov %edx, %r12d /* (NEXT STEP) z' = %edx */\n" if ($pos == -1); 106 $code .= " xor %edx, %r11d /* (NEXT STEP) not z' = not %edx*/\n" 167 mov 3*4(%rbp), %edx # edx = ctx->D 183 mov %edx, %r15d 257 add %r15d, %edx 269 mov %edx, 3*4(%rbp) # ctx->D = D
|
/openssl/engines/asm/ |
H A D | e_padlock-x86_64.pl | 63 cmp \$`"0x".unpack("H*",'Hrua')`,%edx 71 cmp \$`"0x".unpack("H*",'hgna')`,%edx 78 mov %eax,%edx 80 cmp \$0xC0000001,%edx 84 mov %edx,%eax 96 mov 240($arg1),%edx 97 inc %edx 98 shl \$2,%edx 104 sub \$1,%edx 162 mov %esi,%edx
|
/openssl/crypto/whrlpool/asm/ |
H A D | wp-x86_64.pl | 119 movz %ah,%edx 128 movz %ah,%edx 135 movz %bh,%edx 142 movz %bh,%edx 149 movz %ah,%edx 162 movz %ah,%edx 169 movz %bh,%edx 176 movz %bh,%edx 183 movz %ah,%edx
|
/openssl/crypto/aes/asm/ |
H A D | bsaes-x86_64.pl | 1673 mov %eax, %edx # rounds 1680 mov %edx, %r10d # pass rounds 1697 mov %edx,%r10d # pass rounds 1737 mov %edx, %r10d # pass rounds 2235 mov %eax, %edx # rounds 2242 mov %edx, %r10d # pass rounds 2289 mov %edx, %r10d # pass rounds 2356 mov %edx, %r10d # pass rounds 2384 mov %edx, %r10d # pass rounds 2410 mov %edx, %r10d # pass rounds [all …]
|
H A D | aes-x86_64.pl | 61 $s3="%edx"; 1323 shr \$16,%edx 1398 mov 96-128(%rbp),%edx 1402 mov 224-128(%rbp),%edx 1425 mov 12(%rdi),%edx # rk[3] 1460 mov 20(%rdi),%edx # rk[5] 1505 mov 28(%rdi),%edx # rk[4] 1522 mov %eax,%edx 1530 shr \$16,%edx 1569 my ($tp1,$tp2,$tp4,$tp8,$acc)=("%eax","%ebx","%edi","%edx","%r8d"); [all …]
|
H A D | aesni-x86_64.pl | 1221 mov 240($key),%edx # key->rounds 1223 &aesni_generate1("enc",$key,"%edx"); 1279 bswap %edx 1281 xor $key0,%edx 1285 pinsrd \$3,%edx,$inout2
|
H A D | aesni-sha1-x86_64.pl | 166 my @V=($A,$B,$C,$D,$E)=("%eax","%ebx","%ecx","%edx","%ebp"); # size optimization 1060 my @V=($A,$B,$C,$D,$E)=("%eax","%ebx","%ecx","%edx","%ebp"); # size optimization
|
H A D | aesni-mb-x86_64.pl | 94 $num="%edx";
|
/openssl/crypto/poly1305/asm/ |
H A D | poly1305-x86_64.pl | 375 mov \$0x3ffffff,%edx 379 and $r0#d,%edx 386 mov \$0x3ffffff,%edx 388 and $d2#d,%edx 405 and \$0x3ffffff,%edx 416 mov \$0x3ffffff,%edx 420 and $d2#d,%edx 450 and $d1#d,%edx 467 and $d1#d,%edx 490 and $d1#d,%edx [all …]
|
/openssl/crypto/perlasm/ |
H A D | x86_64-support.pl | 34 return "%edx";
|
H A D | x86_64-xlate.pl | 1185 my %regrm = ( "%eax"=>0, "%ecx"=>1, "%edx"=>2, "%ebx"=>3,
|
/openssl/engines/ |
H A D | e_padlock.c | 233 int padlock_xstore(void *out, int edx); 244 unsigned int edx = padlock_capability(); in padlock_available() local 247 padlock_use_ace = ((edx & (0x3 << 6)) == (0x3 << 6)); in padlock_available() 248 padlock_use_rng = ((edx & (0x3 << 2)) == (0x3 << 2)); in padlock_available()
|
/openssl/crypto/rc4/asm/ |
H A D | rc4-x86_64.pl | 538 mov OPENSSL_ia32cap_P(%rip),%edx 539 bt \$20,%edx 541 bt \$30,%edx
|
/openssl/crypto/ec/asm/ |
H A D | x25519-x86_64.pl | 585 mov \$38,%edx 666 mov \$38,%edx 730 mov \$121666,%edx
|
H A D | ecp_nistz256-x86_64.pl | 2559 my ($val,$in_t,$index)=$win64?("%rcx","%rdx","%r8d"):("%rdi","%rsi","%edx"); 2801 my ($val,$in_t,$index)=$win64?("%rcx","%rdx","%r8d"):("%rdi","%rsi","%edx"); 2906 my ($val,$in_t,$index)=$win64?("%rcx","%rdx","%r8d"):("%rdi","%rsi","%edx");
|
/openssl/crypto/sha/ |
H A D | sha512.c | 547 _asm mov edx,[ecx + 0] in __pull64be() 551 _asm rol edx, 16 in __pull64be() 559 _asm mov edx,[ecx + 0] in __pull64be() 561 _asm bswap edx in __pull64be()
|
/openssl/crypto/bn/asm/ |
H A D | rsaz-3k-avx512.pl | 303 kmovb %k2,%edx 309 kmovb %k1,%edx
|
H A D | rsaz-4k-avx512.pl | 326 kmovb %k2,%edx 332 kmovb %k1,%edx
|
H A D | rsaz-2k-avx512.pl | 266 kmovb %k5, %edx # k6
|
H A D | rsaz-avx2.pl | 1575 my ($out,$inp,$power) = $win64 ? ("%rcx","%rdx","%r8d") : ("%rdi","%rsi","%edx"); 1771 mov \$0,%edx 1774 cmove %edx,%eax
|
/openssl/crypto/sha/asm/ |
H A D | sha1-x86_64.pl | 146 @xi=("%edx","%ebp","%r14d"); 483 my @V=($A,$B,$C,$D,$E)=("%eax","%ebx","%ecx","%edx","%ebp"); # size optimization 1350 my @ROTX=("%eax","%ebp","%ebx","%ecx","%edx","%esi");
|
H A D | sha1-mb-x86_64.pl | 94 $num="%edx";
|
/openssl/crypto/camellia/asm/ |
H A D | cmll-x86_64.pl | 60 $t0="%eax";$t1="%ebx";$t2="%ecx";$t3="%edx";
|
/openssl/crypto/chacha/asm/ |
H A D | chacha-x86_64.pl | 147 @x=("%eax","%ebx","%ecx","%edx",map("%r${_}d",(8..11)), 419 movzb (%rsp,%rbx),%edx 421 xor %edx,%eax
|