/barrelfish-master/lib/compiler-rt/builtins/arm/ |
H A D | gtsf2vfp.S | 22 vcmp.f32 s0, s1
|
H A D | lesf2vfp.S | 22 vcmp.f32 s0, s1
|
H A D | ltsf2vfp.S | 22 vcmp.f32 s0, s1
|
H A D | nesf2vfp.S | 22 vcmp.f32 s0, s1
|
H A D | unordsf2vfp.S | 22 vcmp.f32 s0, s1
|
H A D | aeabi_fcmp.S | 22 vmov s0, r0 SEPARATOR \
|
H A D | comparesf2.S | 47 vmov r0, s0 224 vmov r0, s0 252 vmov s0, r0
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/asm/ |
H A D | aes-armv4.pl | 33 $s0="r0"; 170 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 174 orr $s0,$s0,$t1,lsl#8 176 orr $s0,$s0,$t2,lsl#16 178 orr $s0,$s0,$t3,lsl#24 202 mov $t1,$s0,lsr#24 @ write output in endian-neutral 203 mov $t2,$s0,ls [all...] |
H A D | aes-586.pl | 197 $s0="eax"; 208 $__s0=&DWP(4,"esp"); # s0 backing store 249 &mov ($v1,$s[0]); # copy s0 254 &mov ($s[0],&DWP(0,$te,$s[0],8)); # s0>>0 256 &mov ($s[3],&DWP(3,$te,$s[2],8)); # s0>>8 259 &mov ($s[2],&DWP(2,$te,$v1,8)); # s0>>16 261 &mov ($s[1],&DWP(1,$te,$s[1],8)); # s0>>24 304 &movz ($v0,&LB($s0)); # 3, 2, 1, 0* 311 &rotr ($s0,16); # 1, 0, 3, 2 322 &movz ($v0,&HB($s0)); # [all...] |
H A D | aes-ppc.pl | 71 $s0="r8"; 356 lwz $s0,0($inp) 362 stw $s0,0($out) 404 xor $s0,$s0,$t0 411 rlwinm $acc00,$s0,`32-24+3`,21,28 422 rlwinm $acc07,$s0,`32-16+3`,21,28 429 rlwinm $acc10,$s0,`32-8+3`,21,28 434 rlwinm $acc13,$s0,`0+3`,21,28 459 xor $s0, [all...] |
H A D | aes-sparcv9.pl | 64 $s0="%i0"; 198 xor $t0,$s0,$s0 200 srl $s0,21,$acc0 228 sll $s0,3,$acc7 ! 237 srl $s0,5,$acc10 247 srl $s0,13,$acc13 267 ld [$key+0],$s0 353 xor $acc0,$s0,$s0 [all...] |
H A D | aes-x86_64.pl | 47 $s0="%eax"; 94 movzb `&lo("$s0")`,$acc0 110 movzb `&hi("$s0")`,$acc2 117 shr \$16,$s0 121 movzb `&lo("$s0")`,$acc2 127 movzb `&hi("$s0")`,$acc1 136 mov 0($key),$s0 142 xor $t0,$s0 153 movzb `&lo("$s0")`,$acc0 175 movzb `&hi("$s0")`, [all...] |
H A D | aes-ia64.S | 48 t0=r32; s0=r33; 83 // s0-s3 85 // Output: r16,r20,r24,r28 as s0-s3 104 { .mmi; xor s0=s0,t0 118 (p0) and te30=s0,maskff // 0/1:s0&0xff 119 (p0) shr.u te00=s0,twenty4 };; // 0/0:s0>>24 121 (p0) shladd te33=te33,3,te3 // 1/0:te0+s0>>2 [all...] |
/barrelfish-master/lib/gdtoa/ |
H A D | gethex.c | 47 CONST unsigned char *decpt, *s0, *s, *s1; local 58 if (!(s0 = decimalpoint_cache)) { 59 s0 = (unsigned char*)localeconv()->decimal_point; 60 if ((decimalpoint_cache = (char*)MALLOC(strlen(s0) + 1))) { 61 strcpy(decimalpoint_cache, s0); 62 s0 = decimalpoint_cache; 65 decimalpoint = s0; 73 s0 = *(CONST unsigned char **)sp + 2; 74 while(s0[havedig] == '0') 76 s0 [all...] |
H A D | strtod.c | 97 CONST char *s, *s0, *s1; local 117 if (!(s0 = decimalpoint_cache)) { 118 s0 = localeconv_l(loc)->decimal_point; 119 if ((decimalpoint_cache = (char*)MALLOC(strlen(s0) + 1))) { 120 strcpy(decimalpoint_cache, s0); 121 s0 = decimalpoint_cache; 123 dplen = strlen(s0); 125 decimalpoint = (char*)s0; 206 s0 = s; 230 s0 [all...] |
/barrelfish-master/lib/acpica/tests/aslts/bin/bugstate/ |
H A D | parsebuglist | 40 # echo "=====================$s0:$s1:$s2:$s3:$s4:$s5:$line" 42 ID="$s0" 85 read s0 s1 s2 s3 s4 s5 line
|
H A D | bdemossum | 42 read s0 s1 s2 s3 s4 s5 line
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/aes/ |
H A D | aes_core.c | 785 u32 s0, s1, s2, s3, t0, t1, t2, t3; local 797 s0 = GETU32(in ) ^ rk[0]; 803 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; 804 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5]; 805 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6]; 806 t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7]; 808 s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; 813 t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; 814 t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13]; 815 t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 976 u32 s0, s1, s2, s3, t0, t1, t2, t3; local [all...] |
H A D | aes_x86core.c | 656 u32 s0, s1, s2, s3, t[4]; local 666 s0 = GETU32(in ) ^ rk[0]; 674 t[0] = Te4[(s0 ) & 0xff] ^ 681 Te4[(s0 >> 24) ] << 24; 684 Te4[(s0 >> 16) & 0xff] << 16 ^ 687 Te4[(s0 >> 8) & 0xff] << 8 ^ 712 t[0] = Te0[(s0 ) & 0xff] ^ 720 Te3[(s0 >> 24) ] ^ 724 Te2[(s0 >> 16) & 0xff] ^ 728 Te1[(s0 >> 868 u32 s0, s1, s2, s3, t[4]; local [all...] |
/barrelfish-master/lib/libc/arm/aeabi/ |
H A D | aeabi_vfp_double.S | 144 vcvt.s32.f64 s0, d0 146 ftosizd s0, d0 148 vmov r0, s0 155 vcvt.f32.f64 s0, d0 156 UNLOAD_SREG(r0, s0) 162 vmov s0, r0 163 vcvt.f64.s32 d0, s0
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/camellia/asm/ |
H A D | cmll-x86.pl | 55 $__s0=&DWP(4,"esp"); # s0 backing store 264 &mov ($__s1,@T[1]); # s1^=LeftRotate(s0&key[0],1); 273 &mov ($__s0,@T[0]); # s0^=s1|key[1]; 439 &mov ($__s1,@T[1]); # s1^=LeftRotate(s0&key[0],1); 448 &mov ($__s0,@T[0]); # s0^=s1|key[1]; 806 # 0(%esp) # s0 4(%esp) 819 my ($s0,$s1,$s2,$s3) = @T; 829 &mov ($s0,&wparam(0)); # load inp 853 &mov ($_inp,$s0); # save copy of inp 866 &mov ($s0, [all...] |
/barrelfish-master/lib/acpica/tests/aslts/bin/ |
H A D | common | 421 read marker s0 s1 s2 s3 line 427 0) echo "$s0" ;; 586 local n0=0 h0=00 m0=00 s0=00 csec0=00 sec0=0 total0=0 593 s0=`echo "$x" | awk -F"." '{ print $1}'` 602 s0=`echo "$x" | awk -F"." '{ print $1}'` 611 sec0=$[ $s0 + $m0 * 60 + $h0 * 3600 ]
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/sha/ |
H A D | sha256.c | 153 unsigned MD32_REG_T a,b,c,d,e,f,g,h,s0,s1,T1,T2; local 174 s0 = X[(i+1)&0x0f]; s0 = sigma0(s0); 177 T1 = X[i&0xf] += s0 + s1 + X[(i+9)&0xf]; 198 s0 = X[(i+1)&0x0f]; s0 = sigma0(s0); \ 200 T1 = X[(i)&0x0f] += s0 + s1 + X[(i+9)&0x0f]; \ 205 unsigned MD32_REG_T a,b,c,d,e,f,g,h,s0,s local [all...] |
/barrelfish-master/lib/libc/riscv/gen/ |
H A D | _setjmp.S | 49 sd s0, (0 * 8)(a0) 105 ld s0, (0 * 8)(a0)
|
H A D | setjmp.S | 63 sd s0, (0 * 8)(a0) 133 ld s0, (0 * 8)(a0)
|