/openssl/crypto/bn/asm/ |
H A D | sparcv9a-mont.pl | 73 $bias="STACK_BIAS"; 201 stx %o0,[%sp+$bias+$frame+0] 297 ldx [%sp+$bias+$frame+0],%o0 299 ldx [%sp+$bias+$frame+8],%o1 384 ldx [%sp+$bias+$frame+0],%o0 386 ldx [%sp+$bias+$frame+8],%o1 463 ldx [%sp+$bias+$frame+0],%o0 464 ldx [%sp+$bias+$frame+8],%o1 531 stx %o0,[%sp+$bias+$frame+0] 607 ldx [%sp+$bias+$frame+0],%o0 [all …]
|
H A D | sparcv9-mont.pl | 63 $bias="STACK_BIAS"; 118 sub %o7,$bias,%sp ! alloca 126 add %sp,$bias+$frame,$tp 185 add %sp,$bias+$frame,$tp 311 add %sp,$bias+$frame,$tp 383 ld [%sp+$bias+$frame],$tmp0 ! tp[0] 410 add %sp,$bias+$frame+4,$tp 458 ld [%sp+$bias+$frame],$tmp1 ! tp[0] 472 add %sp,$bias+$frame,$tp 559 ld [%sp+$bias+$frame],$tmp1 ! tp[0] [all …]
|
H A D | vis3-mont.pl | 31 $bias = "STACK_BIAS"; 62 add %sp, $bias, %g4 ! real top of stack 97 add %sp, $bias+$frame, $tp 354 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 365 $_=$bias{$1}+$2;
|
/openssl/crypto/ |
H A D | punycode.c | 124 unsigned int bias = initial_bias; in ossl_punycode_decode() local 168 t = (k <= bias) ? tmin : (k >= bias + tmax) ? tmax : k - bias; in ossl_punycode_decode() 178 bias = adapt(i - oldi, written_out + 1, (oldi == 0)); in ossl_punycode_decode()
|
/openssl/crypto/modes/asm/ |
H A D | ghash-x86.pl | 247 my $bias = shift; 249 &mov (&DWP($bias+0, "esp"),0x0000<<16); 250 &mov (&DWP($bias+4, "esp"),0x1C20<<16); 251 &mov (&DWP($bias+8, "esp"),0x3840<<16); 252 &mov (&DWP($bias+12,"esp"),0x2460<<16); 253 &mov (&DWP($bias+16,"esp"),0x7080<<16); 254 &mov (&DWP($bias+20,"esp"),0x6CA0<<16); 255 &mov (&DWP($bias+24,"esp"),0x48C0<<16); 256 &mov (&DWP($bias+28,"esp"),0x54E0<<16); 257 &mov (&DWP($bias+32,"esp"),0xE100<<16); [all …]
|
H A D | ghash-sparcv9.pl | 59 $bias="STACK_BIAS"; 550 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 562 $_=$bias{$1}+$2;
|
/openssl/crypto/camellia/asm/ |
H A D | cmll-x86_64.pl | 383 my $bias=int(@T[0])?shift(@T):0; 387 mov @T[1],`$bias+$rnd*8+0`($key) 388 mov @T[0],`$bias+$rnd*8+4`($key) 389 mov @T[3],`$bias+$rnd*8+8`($key) 390 mov @T[2],`$bias+$rnd*8+12`($key) 393 $code.=" mov @T[0],`$bias+$rnd*8+0`($key)\n"; 394 $code.=" mov @T[1],`$bias+$rnd*8+8`($key)\n" if ($#T>=1); 400 my $bias=int(@T[0])?shift(@T):0; 402 $code.=" mov `$bias+$rnd*8+0`($key),@T[0]\n"; 403 $code.=" mov `$bias+$rnd*8+8`($key),@T[1]\n" if ($#T>=1);
|
H A D | cmll-x86.pl | 534 my $bias=int(@T[0])?shift(@T):0; 536 &mov (&DWP($bias+$rnd*8+0,$key),@T[0]); 537 &mov (&DWP($bias+$rnd*8+4,$key),@T[1]) if ($#T>=1); 538 &mov (&DWP($bias+$rnd*8+8,$key),@T[2]) if ($#T>=2); 539 &mov (&DWP($bias+$rnd*8+12,$key),@T[3]) if ($#T>=3); 544 my $bias=int(@T[0])?shift(@T):0; 546 &mov (@T[0],&DWP($bias+$rnd*8+0,$key)); 547 &mov (@T[1],&DWP($bias+$rnd*8+4,$key)) if ($#T>=1); 548 &mov (@T[2],&DWP($bias+$rnd*8+8,$key)) if ($#T>=2); 549 &mov (@T[3],&DWP($bias+$rnd*8+12,$key)) if ($#T>=3);
|
/openssl/crypto/sha/asm/ |
H A D | sha1-sparcv9a.pl | 47 if ($bits==64) { $bias=2047; $frame=192; } 48 else { $bias=0; $frame=112; } 421 add %fp,$bias-256,$base 435 sub $base,$bias+$frame,%sp 587 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 591 if (/%([goli])([0-7])/) { $_=$bias{$1}+$2; }
|
H A D | sha1-sparcv9.pl | 411 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 415 if (/%([goli])([0-7])/) { $_=$bias{$1}+$2; }
|
H A D | sha512-sparcv9.pl | 837 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 841 if (/%([goli])([0-7])/) { $_=$bias{$1}+$2; }
|
/openssl/crypto/ec/asm/ |
H A D | ecp_nistz256-x86_64.pl | 3069 lea $bias+$a, $a_ptr 3080 lea $bias+$a, $a_ptr 3225 my ($src0,$sfx,$bias); 3231 $bias = 0; 3249 $bias = 128; 3471 my ($src0,$sfx,$bias); 3482 $bias = 0; 3500 $bias = 128; 3852 my ($src0,$sfx,$bias); 3862 $bias = 0; [all …]
|
H A D | ecp_nistz256-sparcv9.pl | 3030 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 3041 $_=$bias{$1}+$2;
|
/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 26 $::bias="STACK_BIAS"; 32 if ($::abibits==64) { $::bias=2047; $::frame=192; $::size_t_cc="%xcc"; } 33 else { $::bias=0; $::frame=112; $::size_t_cc="%icc"; } 1436 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 1450 $_=$bias{$1}+$2; 1578 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24, "f" => 0 ); 1591 $_=$bias{$1}+$2;
|
/openssl/crypto/aes/asm/ |
H A D | aes-sparcv9.pl | 43 $bias="STACK_BIAS"; 204 stx %i7,[%sp+$bias+$frame+0] ! off-load return address 492 ldx [%sp+$bias+$frame+0],%i7 ! restore return address 750 stx %i7,[%sp+$bias+$frame+0] ! off-load return address 1038 ldx [%sp+$bias+$frame+0],%i7 ! restore return address
|
H A D | aesfx-sparcv9.pl | 1171 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 1182 $_=$bias{$1}+$2;
|
/openssl/crypto/md5/asm/ |
H A D | md5-sparcv9.pl | 417 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 421 if (/%([goli])([0-7])/) { $_=$bias{$1}+$2; }
|
/openssl/crypto/poly1305/asm/ |
H A D | poly1305-sparcv9.pl | 1058 my %bias = ( "g" => 0, "o" => 8, "l" => 16, "i" => 24 ); 1069 $_=$bias{$1}+$2;
|
/openssl/ |
H A D | CHANGES.md | 279 * Improved EC/DSA nonce generation routines to avoid bias and timing
|