| /src/crypto/openssl/crypto/ec/asm/ |
| H A D | ecp_nistz256-x86.pl | 136 &lea ("esi",&DWP(0,"edi")); 462 &lea ("ebp",&DWP(&label("RR")."-".&label("pic"),"eax")); 476 &lea ("ebp",&DWP(&label("ONE")."-".&label("pic"),"eax")); 541 &lea ("ebp",&DWP(4,"ebp")); 548 &lea ("ebx",&DWP(0x80,"esp")); 621 &lea ("ebp",&DWP(4,"ebp")); 667 &lea ("ebp",&DWP(4,"ebp")); 1127 &lea ("edi",&DWP(128-4,"edi","ebp",4)); 1134 &lea ("esi",&DWP(16,"esi")); 1139 &lea ("edi",&DWP(64*4,"edi")); [all …]
|
| /src/crypto/openssl/crypto/bn/asm/ |
| H A D | via-mont.pl | 141 &lea ("ecx",&DWP($pad,"","ecx",4)); # ecx becomes vector size in bytes 142 &lea ("ebp",&DWP(64,"","ecx",4)); # allocate 4 vectors + 64 bytes 152 &lea ("esi",&DWP(64,"esp")); # tp 154 &lea ("edi",&DWP(32,"esp")); # scratch area 158 &lea ("ebp",&DWP(-$pad,"ecx")); 164 &lea ("ecx",&DWP((32+$pad)/4,"ecx"));# padded tp + scratch 168 &lea ("edi",&DWP(64+$pad,"esp","ecx",4));# pointer to ap copy 199 &lea ("esi",&DWP(64,"esp")); # tp 202 &lea ("ebp",&DWP(-$pad,"edi","ebp",4)); # so just "rewind" 210 &lea ("edx",&DWP(1,"edx")); # i++ [all …]
|
| H A D | x86-mont.pl | 73 &lea ("esi",&wparam(0)); # put aside pointer to argument block 74 &lea ("edx",&wparam(1)); # load ap 77 &lea ("ebp",&DWP(-$frame,"esp","edi",4)); # future alloca($frame+4*(num+2)) 108 &lea ("esp",&DWP(0,"ebp","eax")); 115 &lea ("esp",&DWP(-4096,"esp")); 135 &lea ($num,&DWP(-3,"edi")); # num=num-1 to assist modulo-scheduling 199 &lea ($j,&DWP(1,$j)); 267 &lea ($j,&DWP(1,$j)); # j++ 288 &lea ($i,&DWP(1,$i)); # i++ 314 &lea ($carry,&DWP(1,$num)); [all …]
|
| /src/contrib/bionic-x86_64-string/ |
| H A D | sse2-strcpy-slm.S | 68 lea TABLE(%rip), %r11; \ 70 lea (%r11, %rcx), %rcx; \ 237 lea 16(%rsi, %rcx), %rsi 242 lea 128(%r8, %rdx), %r8 313 lea 48(%rdi, %rdx), %rax 318 lea 49(%rdi, %rdx), %rdi 408 lea (%rdi, %rdx), %rax 413 lea 1(%rdi, %rdx), %rdi 425 lea 16(%rdi, %rdx), %rax 430 lea 17(%rdi, %rdx), %rdi [all …]
|
| H A D | sse2-memmove-slm.S | 168 lea 64(%rdi), %r8 187 lea (%rdi, %rdx), %rbx 208 lea 64(%r8), %r8 218 lea (%r8, %rsi), %r9 390 lea (%rdi, %rdx), %r9 409 lea -64(%r9), %r9 411 lea 64(%rdi), %rbx 433 lea -64(%r9), %r9 493 lea 64(%r8), %r8 510 lea -64(%r9), %r9
|
| /src/crypto/openssl/engines/asm/ |
| H A D | e_padlock-x86.pl | 124 &lea ("edx",&DWP(4,"edx")); 141 &lea ("eax",($::win32 or $::coff) ? &DWP(&label("padlock_saved_context")) : 146 &lea ("esp",&DWP(4,"esp")); 177 &lea ("ebx",&DWP(32,$ctx)); # key 178 &lea ($ctx,&DWP(16,$ctx)); # control word 199 &lea ("eax",($::win32 or $::coff) ? &DWP(&label("padlock_saved_context")) : 205 &lea ($ctx,&DWP(16,$ctx)); # control word 223 &lea ("ebp",&DWP(-24,"esp")); 230 &lea ("esp",&DWP(0,"eax","ebp")); # alloca 271 &lea ($out,&DWP(16,$out)); [all …]
|
| /src/crypto/openssl/crypto/sha/asm/ |
| H A D | keccak1600-mmx.pl | 196 &lea ("ebx",&DWP(8,"ebx")) if ($y == 0); 290 &lea ("ebx",&DWP(-192,"ebx")); # rewind iotas 301 &lea ("ebx",&DWP(&label("iotas")."-".&label("pic_point"),"ebx")); 303 &lea ("esi",&DWP(100,"esi")); # size optimization 304 &lea ("edi",&DWP(8*5+100,"esp")); # size optimization 322 &lea ("ebx",&DWP(&label("iotas")."-".&label("pic_point"),"ebx")); 326 &lea ("esi",&DWP(100,"esi")); # size optimization 337 &lea ("eax",&DWP(8,"eax")); 339 &lea ("edi",&DWP(8,"edi")); 345 &lea ("edi",&DWP(8*5+100,"esp")); # size optimization [all …]
|
| H A D | sha512-586.pl | 290 &lea ($K512,&DWP(8,$K512)); # K++ 303 &lea ($K512,&DWP(&label("K512")."-".&label("pic_point"),$K512)); 456 &lea ("esp",&DWP(0,"esp","eax")); # destroy frame 472 &lea ($frame,&DWP(-64,"esp")); 503 &lea ($K512,&DWP(16*8,$K512)); 509 &lea ("edi",&DWP(128,"edi")); # advance input 629 &lea ($K512,&DWP(16*8,$K512)); 634 &lea ($K512,&DWP(-80*8,$K512)); # rewind 712 &lea ("edi",&DWP(8,"esp"));
|
| /src/crypto/openssl/crypto/aes/asm/ |
| H A D | vpaes-x86.pl | 204 &lea ($base,&DWP($k_mc_backward,$const)); 278 &lea ($base,&DWP($k_dsbd,$const)); 297 &lea ($magic,&DWP($k_sr-$k_dsbd,$base,$magic)); 386 &lea ($base,&DWP($k_ipt,$const)); 511 &lea ($base,&DWP($k_deskew,$const)); 518 &lea ($base,&DWP($k_opt,$const)); # prepare to output transform 708 &lea ($inp,&DWP($k_dksd,$const)); 760 &lea ($base,&DWP(-56,"esp")); 774 &lea ($const,&DWP(&label("_vpaes_consts")."+0x30-".&label("pic_point"))); 784 &lea ($base,&DWP(-56,"esp")); [all …]
|
| H A D | aesni-x86.pl | 132 &lea ($key,&DWP(32,$key)); 139 &lea ($key,&DWP(16,$key)); 152 &lea ($key,&DWP(0x30,$key)); 155 &lea ($key,&DWP(0x20,$key)); 157 &lea ($key,&DWP(0x20,$key)); 253 &lea ($key,&DWP(32,$key,$rounds)); 285 &lea ($key,&DWP(32,$key,$rounds)); 326 &lea ($key,&DWP(32,$key,$rounds)); 372 &lea ($key,&DWP(32,$key,$rounds)); 452 &lea ($inp,&DWP(0x60,$inp)); [all …]
|
| H A D | aes-586.pl | 490 &lea ($r2,&DWP(0,$s[$i],$s[$i])); 520 &lea ($acc,&DWP(-2,$acc,$acc)); 521 &lea ($acc,&DWP(0,$key,$acc,8)); 712 &lea ($acc,&DWP(-2,$acc,$acc)); 713 &lea ($acc,&DWP(0,$key,$acc,8)); 871 &lea ($acc,&DWP(-2,$acc,$acc)); 872 &lea ($acc,&DWP(0,$key,$acc,8)); 1183 &lea ($s1,&DWP(-64-63,$key)); 1195 &lea ($tbl,&DWP(&label("AES_Te")."-".&label("pic_point"),$tbl)); 1198 &lea ($s1,&DWP(768-4,"esp")); [all …]
|
| /src/crypto/openssl/crypto/ |
| H A D | x86cpuid.pl | 295 &lea ("eax",&DWP(4,"esp")); 306 &lea ("ebx",&DWP(0,"eax","ecx")); 326 &lea ("edx",&DWP(1,"edx")); 335 &lea ("ecx",&DWP(-1,"ecx")); 336 &lea ("edx",&DWP(1,"edx")); 340 &lea ("ecx",&DWP(-4,"ecx")); 342 &lea ("edx",&DWP(4,"edx")); 361 &lea ("esi",&DWP(1,"esi")); 363 &lea ("edi",&DWP(1,"edi")); 411 &lea ($out,&DWP(4,$out)); # ++$out [all …]
|
| /src/contrib/llvm-project/compiler-rt/lib/tsan/rtl/ |
| H A D | tsan_rtl_amd64.S | 35 lea 8(%rsp), %rdi 37 lea 16(%rsp), %rdi 77 lea 8(%rsp), %rdi 79 lea 16(%rsp), %rdi 126 lea 24(%rsp), %rdi 128 lea 32(%rsp), %rdi 183 lea 24(%rsp), %rdi 185 lea 32(%rsp), %rdi
|
| /src/crypto/openssl/crypto/camellia/asm/ |
| H A D | cmll-x86.pl | 141 &lea ("ecx",&DWP(-64-63,$key)); 149 &lea ("eax",&DWP(0,$key,"eax")); 156 &lea ($Tbl,&DWP(&label("Camellia_SBOX")."-".&label("pic_point"),$Tbl)); 206 &lea ("ecx",&DWP(-64-63,$key)); 214 &lea ("eax",&DWP(0,$key,"eax")); 221 &lea ($Tbl,&DWP(&label("Camellia_SBOX")."-".&label("pic_point"),$Tbl)); 316 &lea ("ecx",&DWP(-64-63,$key)); 325 &lea ($key,&DWP(0,$key,"eax")); 331 &lea ($Tbl,&DWP(&label("Camellia_SBOX")."-".&label("pic_point"),$Tbl)); 381 &lea ("ecx",&DWP(-64-63,$key)); [all …]
|
| /src/lib/libc/amd64/string/ |
| H A D | strrchr.S | 61 neg %r8 # negate 01..01 so we can use lea 72 lea (%rax, %r8, 1), %rdx # str - 0x01..01 78 lea (%rcx, %r8, 1), %rdx # (str ^ c) - 0x01..01 87 3: lea (%rcx, %r8, 1), %rdx # (str ^ c) - 0x01..01 91 lea -8(%rdi), %rdx 99 lea (%rax, %r8, 1), %rdx # str - 0x01..01 105 lea (%rcx, %r8, 1), %rdx # (str ^ c) - 0x01..01 117 lea (%rax, %r8, 1), %rdx # str - 0x01..01 125 2: lea (%rcx, %r8, 1), %rdx # (str ^ c) - 0x01..01 129 lea -1(%rax), %rdx [all …]
|
| H A D | memchr.S | 46 lea (, %rdi, 8), %ecx 60 lea (, %rdx, 8), %ecx 62 neg %r8 # negate 01..01 so we can use lea 75 0: lea (%rax, %r8, 1), %rcx # (str ^ c) - 0x01..01 87 lea (%rax, %r8, 1), %rcx # (str ^ c) - 0x01..01 99 .Ltail: lea (%rax, %r8, 1), %rcx # (str ^ c) - 0x01..01 108 lea -8(%rdi, %rax), %rax # pointer to found c 186 lea -32(%rdi, %rax, 1), %rax # point to matching byte 198 lea -32(%rdi, %rdx, 1), %rdx # pointer to match (if any)
|
| H A D | strchrnul.S | 67 neg %r8 # negate 01..01 so we can use lea 74 lea (%rax, %r8, 1), %rdx # str - 0x01..01 75 lea (%rcx, %r8, 1), %r11 # (str ^ c) - 0x01..01 89 lea (%rax, %r8, 1), %rdx # str - 0x01..01 90 lea (%rcx, %r8, 1), %r11 # (str ^ c) - 0x01..01 103 lea (%rax, %r8, 1), %rdx # str - 0x01..01 104 lea (%rcx, %r8, 1), %r11 # (str ^ c) - 0x01..01
|
| H A D | memccpy.S | 58 lea 1(%rax), %rdx 61 lea (%rdi, %rdx, 1), %rbx # res = dest + size 90 lea -32(%rcx), %r11 101 lea 1(%rdi, %rdx, 1), %rax # return value 118 lea 1(%rdi, %rdx, 1), %rax # return value 170 lea 17(%rdi, %r8, 1), %rsi # return value if terminator encountered 183 lea 1(%rdi, %rax, 1), %rax # compute return value 202 lea 1(%rdi, %rdx, 1), %r8 # return value if terminator found + rcx
|
| H A D | stpncpy.S | 102 lea -33(%rcx), %rax # set up overflow-proof comparison rdx+rcx<=32 110 lea (%rdx, %rcx, 1), %r10 # buffer length from alignment boundary 162 lea 16(%rdi, %r8, 1), %rax # point return value to NUL byte 173 lea .Lmask+16(%rip), %rcx 174 lea (%rdi, %r8, 1), %rax # where the NUL byte will be 204 lea (%rdi, %r8, 1), %rax # make RAX point to the NUL byte 240 lea bounce(%rsp, %rcx, 1), %rsi # start of string copy on stack 241 lea (%rdi, %r8, 1), %rax # return pointer to NUL byte
|
| /src/crypto/openssl/crypto/rc4/asm/ |
| H A D | rc4-586.pl | 116 &lea (@XX[1],&DWP(1,@XX[0])); 182 &lea ($tx,&DWP(0,$inp,$ty)); 211 &lea ($ty,&DWP(-8,$inp,$ty)); 225 &lea ($inp,&DWP(8,$inp)); 247 &lea ($ty,&DWP(-4,$inp,$ty)); 256 &lea ($inp,&DWP(4,$inp)); 274 &lea ($inp,&DWP(1,$inp)); 295 &lea ($inp,&DWP(1,$inp)); 323 &lea ($out,&DWP(2*4,$out)); # &key->data 324 &lea ($inp,&DWP(0,$inp,$idi)); # $inp to point at the end [all …]
|
| /src/crypto/openssl/crypto/chacha/asm/ |
| H A D | chacha-x86.pl | 300 &lea ($b,&DWP(4*16,$b)); 309 &lea ($a,&DWP(4*16,$a)); 365 &lea ($c_,&DWP(1,$c_)); 464 &lea ("eax",&DWP(&label("ssse3_data")."-". 480 &lea ("ebp",&DWP(256+128,"esp")); # size optimization 503 &lea ("ebx",&DWP(128,"esp")); # size optimization 522 &lea ($inp,&DWP(128,$inp)); # size optimization 523 &lea ($out,&DWP(128,$out)); # size optimization 624 &lea ($inp,&QWP($i<192?16:(64*4-16*3),$inp)); 637 &lea ($out,&QWP($i<192?16:(64*4-16*3),$out)); [all …]
|
| /src/crypto/openssl/crypto/poly1305/asm/ |
| H A D | poly1305-x86.pl | 107 &lea ("eax",&DWP("poly1305_blocks-".&label("pic_point"),"ebx")); 108 &lea ("edx",&DWP("poly1305_emit-".&label("pic_point"),"ebx")); 116 &lea ("eax",&DWP("_poly1305_blocks_sse2-".&label("pic_point"),"ebx")); 117 &lea ("edx",&DWP("_poly1305_emit_sse2-".&label("pic_point"),"ebx")); 124 &lea ("eax",&DWP("_poly1305_blocks_avx2-".&label("pic_point"),"ebx")); 165 &lea ("ebp",&DWP(0,"esi","ecx")); # end of input 201 &lea ("ebp",&DWP(4*4,"ebp")); 305 &lea ("edx",&DWP(0,"edx","edx",4)); # *5 398 &lea ("edi",&DWP(16*3,"edi")); # size optimization 421 &lea ("edx",&DWP(16*9,"esp")); # size optimization [all …]
|
| /src/sys/contrib/openzfs/module/icp/asm-x86_64/aes/ |
| H A D | aes_aesni.S | 331 lea 0x10(%AESKEY), %rcx // key addr 521 lea 0x10(%AESKEY), %rcx // key addr 532 lea 0x10(%AESKEY), %AESKEY 533 lea -0x10(%ROUNDS64), %ROUNDS64 544 lea 0x10(%rcx), %rcx 613 lea 0x30(%KEYP), %KEYP 616 lea 0x20(%KEYP), %KEYP 620 lea 0x20(%KEYP), %KEYP 696 lea 0x30(%KEYP), %KEYP 699 lea 0x20(%KEYP), %KEYP [all …]
|
| /src/crypto/openssl/crypto/modes/asm/ |
| H A D | ghash-x86.pl | 337 &lea ($inp,&DWP(16,$inp)); 437 &lea ("eax",&DWP(&label("rem_4bit")."-".&label("pic_point"),"eax")); 462 &lea ("eax",&DWP(&label("rem_4bit")."-".&label("pic_point"),"eax")); 491 &lea ($inp,&DWP(16,$inp)); 610 &lea ("eax",&DWP(&label("rem_4bit")."-".&label("pic_point"),"eax")); 644 &lea ($rem_8bit,&DWP(&label("rem_8bit")."-".&label("pic_point"),$rem_8bit)); 661 &lea ("edi",&DWP(16+128,"esp")); 662 &lea ("ebp",&DWP(16+256+128,"esp")); 706 &lea ("ecx",&DWP(16,"ecx")); # inp+=16 938 &lea ($const,&DWP(&label("bswap")."-".&label("pic"),$const)); [all …]
|
| /src/crypto/openssl/crypto/whrlpool/asm/ |
| H A D | wp-mmx.pl | 75 { if ($SCALE==2) { &lea(@_[0],&DWP(0,@_[1],@_[1])); } 76 elsif ($SCALE==8) { &lea(@_[0],&DWP(0,"",@_[1],8)); } 103 &lea ("ebx",&DWP(128,"esp")); 112 &lea ($tbl,&DWP(&label("table")."-".&label("pic_point"),$tbl)); 198 &lea ("ebx",&DWP(128,"esp")); 217 &lea ("edi",&DWP(64,"edi")); # inp+=64
|