Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
0e1467a6
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
12 个月 前同步成功
通知
8
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
0e1467a6
编写于
12月 15, 2011
作者:
A
Andy Polyakov
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
vpaes-x86.pl: revert previous commit and solve the problem through x86masm.pl.
PR: 2657
上级
f2fc3075
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
8 addition
and
6 deletion
+8
-6
crypto/aes/asm/vpaes-x86.pl
crypto/aes/asm/vpaes-x86.pl
+5
-5
crypto/perlasm/x86masm.pl
crypto/perlasm/x86masm.pl
+3
-1
未找到文件。
crypto/aes/asm/vpaes-x86.pl
浏览文件 @
0e1467a6
...
...
@@ -762,7 +762,7 @@ $k_dsbo=0x2c0; # decryption sbox final output
&mov
(
$magic
,
0x30
);
&mov
(
$out
,
0
);
&
mov
(
$const
,
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
"
));
&
lea
(
$const
,
&DWP
(
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
")
));
&call
("
_vpaes_schedule_core
");
&set_label
("
pic_point
");
...
...
@@ -792,7 +792,7 @@ $k_dsbo=0x2c0; # decryption sbox final output
&and
(
$magic
,
32
);
&xor
(
$magic
,
32
);
# nbist==192?0:32;
&
mov
(
$const
,
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
"
));
&
lea
(
$const
,
&DWP
(
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
")
));
&call
("
_vpaes_schedule_core
");
&set_label
("
pic_point
");
...
...
@@ -801,7 +801,7 @@ $k_dsbo=0x2c0; # decryption sbox final output
&function_end
("
${PREFIX}
_set_decrypt_key
");
&function_begin
("
${PREFIX}
_encrypt
");
&
mov
(
$const
,
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
"
));
&
lea
(
$const
,
&DWP
(
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
")
));
&call
("
_vpaes_preheat
");
&set_label
("
pic_point
");
&mov
(
$inp
,
&wparam
(
0
));
# inp
...
...
@@ -820,7 +820,7 @@ $k_dsbo=0x2c0; # decryption sbox final output
&function_end
("
${PREFIX}
_encrypt
");
&function_begin
("
${PREFIX}
_decrypt
");
&
mov
(
$const
,
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
"
));
&
lea
(
$const
,
&DWP
(
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
")
));
&call
("
_vpaes_preheat
");
&set_label
("
pic_point
");
&mov
(
$inp
,
&wparam
(
0
));
# inp
...
...
@@ -858,7 +858,7 @@ $k_dsbo=0x2c0; # decryption sbox final output
&mov
(
&DWP
(
8
,"
esp
"),
$const
);
# save ivp
&mov
(
$out
,
$round
);
# $out works as $len
&
mov
(
$const
,
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
"
));
&
lea
(
$const
,
&DWP
(
&label
("
_vpaes_consts
")
.
"
+0x30-
"
.
&label
("
pic_point
")
));
&call
("
_vpaes_preheat
");
&set_label
("
pic_point
");
&cmp
(
$magic
,
0
);
...
...
crypto/perlasm/x86masm.pl
浏览文件 @
0e1467a6
...
...
@@ -16,7 +16,9 @@ sub ::generic
# fix hexadecimal constants
for
(
@arg
)
{
s/(?<![\w\$\.])0x([0-9a-f]+)/0$1h/oi
;
}
if
(
$opcode
!~
/movq/
)
if
(
$opcode
=~
/lea/
&&
@arg
[
1
]
=~
s/.*PTR\s+([^\[]+)$/$1/
)
# no []
{
$opcode
=
"
mov
";
}
elsif
(
$opcode
!~
/movq/
)
{
# fix xmm references
$arg
[
0
]
=~
s/\b[A-Z]+WORD\s+PTR/XMMWORD PTR/i
if
(
$arg
[
1
]
=~
/\bxmm[0-7]\b/i
);
$arg
[
1
]
=~
s/\b[A-Z]+WORD\s+PTR/XMMWORD PTR/i
if
(
$arg
[
0
]
=~
/\bxmm[0-7]\b/i
);
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录