Lines Matching refs:key

23 # as well as avoiding L1 cache aliasing between stack frame and key
26 # Performance in number of cycles per processed byte for 128-bit key:
70 $key="%r15";
125 lea 16($key),$key
142 mov 12($key),$s3
145 mov 0($key),$s0
149 mov 4($key),$s1
150 mov 8($key),$s2
228 mov 16+12($key),$s3
231 mov 16+0($key),$s0
239 mov 16+4($key),$s1
240 mov 16+8($key),$s2
262 $code.=" lea 16($key),$key\n" if ($i==0);
273 $code.=" xor 4*$i($key),$out\n";
329 xor 0($key),$s0 # xor with key
330 xor 4($key),$s1
331 xor 8($key),$s2
332 xor 12($key),$s3
334 mov 240($key),$rnds # load key->rounds
356 xor 16+0($key),$s0 # xor with key
357 xor 16+4($key),$s1
358 xor 16+8($key),$s2
359 xor 16+12($key),$s3
569 xor 0($key),$s0 # xor with key
570 xor 4($key),$s1
571 xor 8($key),$s2
572 xor 12($key),$s3
573 lea 16($key),$key
577 cmp 16(%rsp),$key
585 xor 0($key),$s0
586 xor 4($key),$s1
587 xor 8($key),$s2
588 xor 12($key),$s3
593 # void aes_nohw_encrypt (const void *inp,void *out,const AES_KEY *key);
616 # allocate frame "above" key schedule
617 lea -63(%rdx),%rcx # %rdx is key argument
630 mov %rdx,$key
631 mov 240($key),$rnds # load rounds
639 lea ($key,$rnds),%rbp
640 mov $key,(%rsp) # key schedule
641 mov %rbp,8(%rsp) # end of key schedule
643 # pick Te4 copy which can't "overlap" with stack frame or key schedule
709 lea 16($key),$key
727 mov 12($key),$s3
730 mov 0($key),$s0
734 mov 4($key),$s1
735 mov 8($key),$s2
813 mov 16+12($key),$s3
816 mov 16+0($key),$s0
824 mov 16+4($key),$s1
825 mov 16+8($key),$s2
909 xor 0($key),$s0 # xor with key
910 xor 4($key),$s1
911 xor 8($key),$s2
912 xor 12($key),$s3
914 mov 240($key),$rnds # load key->rounds
926 lea 16($key),$key
927 xor 0($key),$s0 # xor with key
928 xor 4($key),$s1
929 xor 8($key),$s2
930 xor 12($key),$s3
943 xor 16+0($key),$s0 # xor with key
944 xor 16+4($key),$s1
945 xor 16+8($key),$s2
946 xor 16+12($key),$s3
1175 xor 0($key),$s0 # xor with key
1176 xor 4($key),$s1
1177 xor 8($key),$s2
1178 xor 12($key),$s3
1179 lea 16($key),$key
1183 cmp 16(%rsp),$key
1199 xor 0($key),$s0
1200 xor 4($key),$s1
1201 xor 8($key),$s2
1202 xor 12($key),$s3
1207 # void aes_nohw_decrypt (const void *inp,void *out,const AES_KEY *key);
1230 # allocate frame "above" key schedule
1231 lea -63(%rdx),%rcx # %rdx is key argument
1244 mov %rdx,$key
1245 mov 240($key),$rnds # load rounds
1253 lea ($key,$rnds),%rbp
1254 mov $key,(%rsp) # key schedule
1255 mov %rbp,8(%rsp) # end of key schedule
1257 # pick Td4 copy which can't "overlap" with stack frame or key schedule
1324 # int aes_nohw_set_encrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key)
1365 mov %rdx,%rdi # %rdi=key
1601 # int aes_nohw_set_decrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key)
1620 push %rdx # save key schedule
1625 mov (%rsp),%r8 # restore key schedule
1655 mov %r8,$key
1659 lea 16($key),$key
1660 mov 0($key),%rax
1661 mov 8($key),%rcx
1665 mov %eax,0($key)
1666 mov %ebx,4($key)
1667 mov %ecx,8($key)
1668 mov %edx,12($key)
1695 # size_t length, const AES_KEY *key,
1700 my $keyp="0(%rsp)"; # one to pass as $key
1706 my $_key="48(%rsp)"; # copy of 4th parameter, key
1756 lea -88-248(%rsp),$key
1757 and \$-64,$key
1762 mov $key,%r12
1770 sub %r12,$key
1776 sub %r12,$key
1780 xchg %rsp,$key
1781 .cfi_def_cfa_register $key
1783 mov $key,$_rsp # save %rsp
1789 mov %rcx,$_key # save copy of key
1796 mov %rcx,$key
1798 mov 240($key),%eax # key->rounds
1799 # do we copy key schedule to stack?
1800 mov $key,%r10
1809 mov $key,%rsi
1811 lea $aes_key,$key
1816 mov $key,$keyp # save key pointer
1845 mov $keyp,$key # restore key
1884 mov $keyp,$key # restore key
1929 mov $keyp,$key # restore key
1970 cmpl \$0,$mark # was the key schedule copied?
1985 # ... just "above" key schedule
1999 #mov %rcx,$_key # save copy of key
2005 mov %rcx,$key
2008 mov 240($key),%eax
2009 mov $key,$keyp # save key pointer
2011 lea ($key,%rax),%rax
2014 # pick Te4 copy which can't "overlap" with stack frame or key schedule
2038 mov $keyp,$key # restore key
2102 mov $keyp,$key # restore key