- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 142 for r13 (0.42 sec)
-
src/crypto/internal/edwards25519/field/fe_arm64.s
AND $0x7ffffffffffff, R1, R11 AND $0x7ffffffffffff, R2, R12 AND $0x7ffffffffffff, R3, R13 AND $0x7ffffffffffff, R4, R14 ADD R0>>51, R11, R11 ADD R1>>51, R12, R12 ADD R2>>51, R13, R13 ADD R3>>51, R14, R14 // R4>>51 * 19 + R10 -> R10 LSR $51, R4, R21 MOVD $19, R22 MADD R22, R10, R21, R10 STP (R10, R11), 0(R20) STP (R12, R13), 16(R20) MOVD R14, 32(R20)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 1K bytes - Viewed (0) -
src/runtime/memmove_mipsx.s
ADDU $32, R1 MOVW 0(R2), R8 MOVW 4(R2), R9 MOVW 8(R2), R10 MOVW 12(R2), R11 MOVW 16(R2), R12 MOVW 20(R2), R13 MOVW 24(R2), R14 MOVW 28(R2), R15 ADDU $32, R2 MOVW R8, -32(R1) MOVW R9, -28(R1) MOVW R10, -24(R1) MOVW R11, -20(R1) MOVW R12, -16(R1) MOVW R13, -12(R1) MOVW R14, -8(R1) MOVW R15, -4(R1) JMP f_large f_words: BEQ R1, R6, f_tail ADDU $4, R1 MOVW 0(R2), R8
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Sat Nov 06 10:24:44 UTC 2021 - 4.4K bytes - Viewed (0) -
src/vendor/golang.org/x/crypto/internal/poly1305/sum_amd64.s
multiply: POLY1305_MUL(R8, R9, R10, R11, R12, BX, CX, R13, R14) SUBQ $16, R15 CMPQ R15, $16 JAE loop bytes_between_0_and_15: TESTQ R15, R15 JZ done MOVQ $1, BX XORQ CX, CX XORQ R13, R13 ADDQ R15, SI flush_buffer: SHLQ $8, BX, CX SHLQ $8, BX MOVB -1(SI), R13 XORQ R13, BX DECQ SI DECQ R15 JNZ flush_buffer ADDQ BX, R8 ADCQ CX, R9
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Oct 19 23:33:33 UTC 2023 - 2.5K bytes - Viewed (0) -
src/cmd/cgo/internal/test/issue9400/asm_loong64.s
ADDV $(1024*8), R3 // Ask signaller to setgid MOVW $1, R12 DBAR MOVW R12, ·Baton(SB) DBAR // Wait for setgid completion loop: DBAR MOVW ·Baton(SB), R12 OR R13, R13, R13 // hint that we're in a spin loop BNE R12, loop DBAR // Restore stack ADDV $(-1024*8), R3
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri May 12 12:00:02 UTC 2023 - 633 bytes - Viewed (0) -
src/math/big/arith_amd64.s
// regular loop body unrolled 4x ADDQ CX, CX // restore CF MOVQ 0(R8)(SI*8), R11 MOVQ 8(R8)(SI*8), R12 MOVQ 16(R8)(SI*8), R13 MOVQ 24(R8)(SI*8), R14 ADCQ 0(R9)(SI*8), R11 ADCQ 8(R9)(SI*8), R12 ADCQ 16(R9)(SI*8), R13 ADCQ 24(R9)(SI*8), R14 MOVQ R11, 0(R10)(SI*8) MOVQ R12, 8(R10)(SI*8) MOVQ R13, 16(R10)(SI*8) MOVQ R14, 24(R10)(SI*8) SBBQ CX, CX // save CF ADDQ $4, SI // i += 4 SUBQ $4, DI // n -= 4
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Oct 19 23:33:27 UTC 2023 - 9.1K bytes - Viewed (0) -
src/runtime/rt0_linux_ppc64le.s
MOVD 0(R1), R3 // argc ADD $8, R1, R4 // argv // Did the TLS pointer get set? If so, don't change it (e.g musl). CMP R13, $0 BNE tls_and_argcv_in_reg MOVD $runtime·m0+m_tls(SB), R13 // TLS ADD $0x7000, R13 tls_and_argcv_in_reg: BR main(SB) TEXT main(SB),NOSPLIT,$-8 MOVD $runtime·rt0_go(SB), R12 MOVD R12, CTR
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 18:17:17 UTC 2024 - 2.9K bytes - Viewed (0) -
src/crypto/aes/asm_arm64.s
MOVW $1, R13 TBZ $1, R8, ks192 TBNZ $2, R8, ks256 LDPW (R9), (R4, R5) LDPW 8(R9), (R6, R7) STPW.P (R4, R5), 8(R10) STPW.P (R6, R7), 8(R10) MOVW $0x1b, R14 ks128Loop: VMOV R7, V2.S[0] WORD $0x4E030042 // TBL V3.B16, [V2.B16], V2.B16 AESE V0.B16, V2.B16 // Use AES to compute the SBOX EORW R13, R4 LSLW $1, R13 // Compute next Rcon
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 6.9K bytes - Viewed (0) -
src/cmd/asm/internal/asm/testdata/arm64enc.s
//TODO LDTR -0x1e(R3), R4 // 64285eb8 //TODO LDTR -0xe5(R3), R10 // 6ab851f8 //TODO LDTRB 0xf0(R13), R10 // aa094f38 //TODO LDTRH 0xe8(R13), R23 // b7894e78 //TODO LDTRSB -0x24(R20), R5 // 85cadd38 //TODO LDTRSB -0x75(R9), R13 // 2db99838 //TODO LDTRSH 0xef(R3), LR // 7ef8ce78 //TODO LDTRSH 0x96(R19), R24 // 786a8978
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jul 24 01:11:41 UTC 2023 - 43.9K bytes - Viewed (0) -
src/runtime/sys_solaris_amd64.s
// Execute call on m->g0. get_tls(R15) CMPQ R15, $0 JE noswitch MOVQ g(R15), R13 CMPQ R13, $0 JE noswitch MOVQ g_m(R13), R13 CMPQ R13, $0 JE noswitch // TODO(aram): do something about the cpu profiler here. MOVQ m_g0(R13), R14 CMPQ g(R15), R14 JNE switch // executing on m->g0 already CALL AX RET switch:
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Apr 21 19:29:00 UTC 2023 - 6.4K bytes - Viewed (0) -
src/runtime/sys_windows_arm64.s
SAVE_R19_TO_R28(8*9) // Create a struct callbackArgs on our stack. MOVD $cbargs-(18*8+callbackArgs__size)(SP), R13 MOVD R12, callbackArgs_index(R13) // callback index MOVD R14, R0 MOVD R0, callbackArgs_args(R13) // address of args vector MOVD $0, R0 MOVD R0, callbackArgs_result(R13) // result // Call cgocallback, which will call callbackWrap(frame).
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Sep 21 15:56:43 UTC 2023 - 6.8K bytes - Viewed (0)