/external/valgrind/main/none/tests/amd64/ |
aes.stdout.exp | 2 aesenc 7b5b54657374566563746f725d53475d 48692853686179295b477565726f6e5d result 95e5d7de584b108bc5a3db9f2f1c31a8 8 aesenc aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb result 17171717171717171717171717171717 14 aesenc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa result 40404040404040404040404040404040 20 aesenc 3243f6a8885a308d313198a2e0370734 2b7e151628aed2a6abf7158809cf4f3c result 5b21939f0be8c5228779cc82ded0bbe7 26 aesenc 193de3bea0f4e22b9ac68d2ae9f84808 d42711aee0bf98f1b8b45de51e415230 result dcd62e1fbee4a50fc2300ed34b3c9300 32 aesenc d4bf5d30e0b452aeb84111f11e2798e5 046681e5e0cb199a48f8d37a2806264c result bd2484c75918df5c3d46548f45760114 38 aesenc a0fafe1788542cb123a339392a6c7605 a49c7ff2689f352b6b5bea43026a5049 result 699f68563c8856d00046268c8f25170e 44 aesenc 49ded28945db96f17f39871a7702533b 49db873b453953897f02d2f177de961a result 7eb10f92ed990efeb1c8aec03eb90798 50 aesenc 584dcaf11b4b5aacdbe7caa81b6bb0e5 f2c295f27a96b9435935807a7359f67f result 9363371070b47e1c20f85db0a2e95d3c 56 aesenc aa8f5f0361dde3ef82d24ad26832469a ac73cf7befc111df13b5d6b545235ab8 result dfa13bc2c191383f003da25f3 (…) [all...] |
aes.c | 130 static void AESENC(char *s_argL, char *s_argR, char *s_exp) 146 "aesenc %%xmm2, %%xmm1" "\n\t" 159 printf ("aesenc %s %s result %s\n", s_argL, s_argR, s_res); 338 AESENC("7b5b54657374566563746f725d53475d", 366 AESENC(aes_args[i].argL, aes_args[i].argR, "");
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
aes.asm | 2 aesenc xmm1, xmm2 label 3 aesenc xmm1, [rax] label 4 aesenc xmm1, dqword [rax] label 5 aesenc xmm10, xmm12 label 6 aesenc xmm10, [rax+r15*4] label 7 aesenc xmm10, [r14+r15*4] label
|
/external/lzma/Asm/x86/ |
AesOpt.asm | 134 op aesenc, -16
136 op aesenc, +0
137 op aesenc, +16
|
/external/chromium_org/third_party/openssl/openssl/crypto/aes/asm/ |
aesni-x86_64.pl | 99 # it accounts *solely* for aesenc instructions. But there are extra 152 # CTR mode was implemented with 6x aesenc interleave factor. 874 aesenc $rndkey1,$inout0 876 aesenc $rndkey1,$inout1 878 aesenc $rndkey0,$inout0 880 aesenc $rndkey0,$inout1 883 aesenc $rndkey1,$inout0 884 aesenc $rndkey1,$inout1 967 aesenc $rndkey1,$inout0 969 aesenc $rndkey1,$inout [all...] |
aesni-x86.pl | 89 sub aesenc { aescommon(0xdc,@_); } subroutine 637 &aesenc ($inout0,$rndkey1); 639 &aesenc ($cmac,$rndkey1); 641 &aesenc ($inout0,$rndkey0); 643 &aesenc ($cmac,$rndkey0); 646 &aesenc ($inout0,$rndkey1); 647 &aesenc ($cmac,$rndkey1); 733 &aesenc ($inout0,$rndkey1); 735 &aesenc ($cmac,$rndkey1); 737 &aesenc ($inout0,$rndkey0) [all...] |
aesni-sha1-x86_64.pl | 209 my $aesenc=sub { 222 aesenc $rndkey[0],$iv 231 aesenc $rndkey[0],$iv 233 aesenc $rndkey[1],$iv 236 aesenc $rndkey[0],$iv 238 aesenc $rndkey[1],$iv 245 aesenc $rndkey[0],$iv 486 @r[$k%$n].='&$aesenc();' if ($jj==$k/$n); 507 @r[$k%$n].='&$aesenc();' if ($jj==$k/$n); 532 @r[$k%$n].='&$aesenc();' if ($jj==$k/$n) [all...] |
bsaes-x86_64.pl | 24 # allowed to feed its output back to aesenc[last], this was 456 # modified to emit output in order suitable for feeding back to aesenc[last] 664 sub aesenc { # not used subroutine [all...] |
/external/openssl/crypto/aes/asm/ |
aesni-x86_64.pl | 99 # it accounts *solely* for aesenc instructions. But there are extra 152 # CTR mode was implemented with 6x aesenc interleave factor. 874 aesenc $rndkey1,$inout0 876 aesenc $rndkey1,$inout1 878 aesenc $rndkey0,$inout0 880 aesenc $rndkey0,$inout1 883 aesenc $rndkey1,$inout0 884 aesenc $rndkey1,$inout1 967 aesenc $rndkey1,$inout0 969 aesenc $rndkey1,$inout [all...] |
aesni-x86.pl | 89 sub aesenc { aescommon(0xdc,@_); } subroutine 637 &aesenc ($inout0,$rndkey1); 639 &aesenc ($cmac,$rndkey1); 641 &aesenc ($inout0,$rndkey0); 643 &aesenc ($cmac,$rndkey0); 646 &aesenc ($inout0,$rndkey1); 647 &aesenc ($cmac,$rndkey1); 733 &aesenc ($inout0,$rndkey1); 735 &aesenc ($cmac,$rndkey1); 737 &aesenc ($inout0,$rndkey0) [all...] |
aesni-sha1-x86_64.pl | 209 my $aesenc=sub { 222 aesenc $rndkey[0],$iv 231 aesenc $rndkey[0],$iv 233 aesenc $rndkey[1],$iv 236 aesenc $rndkey[0],$iv 238 aesenc $rndkey[1],$iv 245 aesenc $rndkey[0],$iv 486 @r[$k%$n].='&$aesenc();' if ($jj==$k/$n); 507 @r[$k%$n].='&$aesenc();' if ($jj==$k/$n); 532 @r[$k%$n].='&$aesenc();' if ($jj==$k/$n) [all...] |
bsaes-x86_64.pl | 24 # allowed to feed its output back to aesenc[last], this was 456 # modified to emit output in order suitable for feeding back to aesenc[last] 664 sub aesenc { # not used subroutine [all...] |
/external/valgrind/main/VEX/priv/ |
guest_amd64_defs.h | 237 give opcode corresponding to AESENC/AESENCLAST/AESDEC/AESDECLAST/AESIMC.
|
guest_amd64_helpers.c | [all...] |
/external/llvm/test/CodeGen/X86/ |
avx-intrinsics-x86.ll | 21 %res = call <2 x i64> @llvm.x86.aesni.aesenc(<2 x i64> %a0, <2 x i64> %a1) ; <<2 x i64>> [#uses=1] 24 declare <2 x i64> @llvm.x86.aesni.aesenc(<2 x i64>, <2 x i64>) nounwind readnone [all...] |
/external/chromium_org/third_party/yasm/source/patched-yasm/ |
x86insn_nasm.gperf | 29 aesenc, aes_insn, 2, SUF_Z, 0x38, 0xDC, 0, 0, CPU_AVX, 0, 0 [all...] |
x86insn_gas.gperf | 38 aesenc, aes_insn, 2, SUF_Z, 0x38, 0xDC, 0, 0, CPU_AVX, 0, 0 [all...] |
/prebuilts/gcc/linux-x86/x86/i686-linux-android-4.6/bin/ |
i686-linux-android-as | |
i686-linux-android-objdump | |
/prebuilts/gcc/linux-x86/x86/i686-linux-android-4.6/i686-linux-android/bin/ |
as | |
objdump | |
/external/llvm/lib/Target/X86/ |
X86InstrSSE.td | [all...] |
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/ |
gen_x86_insn.py | [all...] |