openssl/crypto/bn/asm
Andy Polyakov 07645deeb8 Apply "better safe than sorry" approach after addressing sporadic SEGV in
bn_sub_words to the rest of the sparcv8plus.S.
2005-11-15 08:02:10 +00:00
..
x86
.cvsignore Add emacs cache files to .cvsignore. 2005-04-11 14:17:07 +00:00
bn-586.pl IA-32 BN tune-up. Performance imrpovement varies with platform and 2005-09-20 12:26:54 +00:00
co-586.pl
ia64.S Fix Intel assembler warnings. 2005-08-10 08:28:36 +00:00
mips3.s
pa-risc2.s pa-risc2.s was not PIC, see RT#426. I strip call to fprintf as it's 2003-01-03 10:52:40 +00:00
pa-risc2W.s
ppc.pl Trap condition should be 64-bit when it's due. 2005-07-03 09:17:50 +00:00
README
sparcv8.S
sparcv8plus.S Apply "better safe than sorry" approach after addressing sporadic SEGV in 2005-11-15 08:02:10 +00:00
sparcv9a-mont.pl Clarify binary compatibility with HAL/Fujitsu SPARC64 family. 2005-10-25 15:39:47 +00:00
vms.mar Finally, a bn_div_words() in VAX assembler that goes through all tests. 2002-12-23 11:25:51 +00:00
x86_64-gcc.c Make bn/asm/x86_64-gcc.c gcc4 savvy. +r is likely to be initially 2005-04-03 18:53:29 +00:00
x86_64-mont.pl Change bn_mul_mont declaration and BN_MONT_CTX. Update CHANGES. 2005-10-22 17:57:18 +00:00
x86-mont.pl Change bn_mul_mont declaration and BN_MONT_CTX. Update CHANGES. 2005-10-22 17:57:18 +00:00
x86.pl

<OBSOLETE>

All assember in this directory are just version of the file
crypto/bn/bn_asm.c.

Quite a few of these files are just the assember output from gcc since on 
quite a few machines they are 2 times faster than the system compiler.

For the x86, I have hand written assember because of the bad job all
compilers seem to do on it.  This normally gives a 2 time speed up in the RSA
routines.

For the DEC alpha, I also hand wrote the assember (except the division which
is just the output from the C compiler pasted on the end of the file).
On the 2 alpha C compilers I had access to, it was not possible to do
64b x 64b -> 128b calculations (both long and the long long data types
were 64 bits).  So the hand assember gives access to the 128 bit result and
a 2 times speedup :-).

There are 3 versions of assember for the HP PA-RISC.

pa-risc.s is the origional one which works fine and generated using gcc :-)

pa-risc2W.s and pa-risc2.s are 64 and 32-bit PA-RISC 2.0 implementations
by Chris Ruemmler from HP (with some help from the HP C compiler).

</OBSOLETE>