summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/sha/asm (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Another now unused perlasm script can bite the dust.jsing2024-12-041-1267/+0
|
* Remove sha512-x86_64.pl.jsing2024-11-161-347/+0
| | | | | Now that we have replacement SHA-256 and SHA-512 assembly implementations for amd64, sha512-x86_64.pl can go the way of the dodo.
* Replace uses of endbr64 with _CET_ENDBR from cet.htb2024-02-242-5/+5
| | | | | | | | | cet.h is needed for other platforms to emit the relevant .gnu.properties sections that are necessary for them to enable IBT. It also avoids issues with older toolchains on macOS that explode on encountering endbr64. based on a diff by kettenis ok beck kettenis
* Add endbr64 where needed by inspection. Passes regresson tests.deraadt2023-04-252-0/+5
| | | | ok jsing, and kind of tb an earlier version
* Use explicit .text instead of .previous to please Windows/MinGW on amd64tb2023-02-232-3/+3
| | | | ok miod
* Use .section .rodata instead of a plain .rodatatb2023-02-093-4/+4
| | | | | | | | At least gcc 12 on Fedora is very unhappy about a plain .rodata and throws Error: unknown pseudo-op: `.rodata'. So add a .section in front of it to make it happy. ok deraadt miod
* Remove AIX toc data after every function. NFCmiod2023-02-022-13/+0
|
* Move all data blocks from .text to .rodata and cleanup up and homogeneize codemiod2023-02-021-1/+0
| | | | responsible from getting the proper address of those blocks.
* Move all data blocks from .text to .rodata and cleanup up and homogeneize codemiod2023-02-013-29/+29
| | | | | | responsible from getting the proper address of those blocks. ok tb@ jsing@
* For xonly, move sha512-ppc.pl's table from text to rodatagkoehler2023-02-011-18/+7
| | | | | | | | | | | OpenBSD/macppc will enforce xonly on PowerPC G5, then libcrypto's sha256 would crash by SIGSEGV, because it can't read text. Use ELF relocations "@ha" and "@l" to find the table in rodata. This might break the PowerPC asm on a not-ELF platform (like AIX or Mac OS) if someone would try it there. ok kettenis@ deraadt@
* Remove various unused assembly files and assembly generation scripts.jsing2023-01-192-867/+0
| | | | | | These are just creating clutter and cause grep noise. ok miod@
* Move constants out of text segment into rodata to prepare for xonly supportderaadt2023-01-142-1/+6
| | | | | on amd64. no pic handling is neccessary since amd64 has full reach. ok kettenis
* Move all data tables from .text section to .rodata, and update the code tomiod2023-01-133-12/+27
| | | | | | | fetch them correctly when building PIC. Also drop unused data, and remove --no-execute-only from linker flags. ok kettenis@
* Move all data tables from .text section to .rodata, and update the code tomiod2023-01-132-21/+9
| | | | | | | fetch them correctly when building PIC. Also drop unused data, and remove --no-execute-only from linker flags. ok jsing@ kettenis@
* spelling fixes; from paul tagliamontejmc2022-12-265-9/+9
| | | | | | | i removed the arithmetics -> arithmetic changes, as i felt they were not clearly correct ok tb
* Make the NEON codepaths conditional on __STRICT_ALIGNMENT not beingkettenis2018-01-241-2/+2
| | | | | | defined as they rely on unaligned access. ok joel@
* On OpenBSD/armv7 we deliberately trap unaligned access. Unfortunatelykettenis2018-01-073-4/+4
| | | | | | | | the assembly code in libcrypto assumes unaligned access is allowed for ARMv7. Make these paths conditional on __STRICT_ALIGNMENT not being defined and define __STRICT_ALIGNMENT in arm_arch.h for OpenBSD. ok tom@
* Replace all uses of magic numbers when operating on OPENSSL_ia32_P[] bymiod2016-11-043-10/+11
| | | | | | | | | | | | | | | meaningful constants in a private header file, so that reviewers can actually get a chance to figure out what the code is attempting to do without knowing all cpuid bits. While there, turn it from an array of two 32-bit ints into a properly aligned 64-bit int. Use of OPENSSL_ia32_P is now restricted to the assembler parts. C code will now always use OPENSSL_cpu_caps() and check for the proper bits in the whole 64-bit word it returns. i386 tests and ok jsing@
* Less S390.jsing2016-09-042-568/+0
| | | | ok deraadt@
* Less IA64.jsing2016-09-042-977/+0
| | | | ok deraadt@
* 'accomodate' -> 'accommodate' in comments.krw2016-03-151-1/+1
| | | | Started by diff from Mical Mazurek.
* mutli -> multimiod2015-11-141-1/+1
|
* Various *syncron* -> *synchron* typos.miod2015-11-141-1/+1
|
* typosmiod2015-08-181-1/+1
|
* Make sure to load absolute symbol address with `dla' instead of `la' whenmiod2014-12-071-1/+7
| | | | generating code for 64-bit mips userland.
* Remove OPENSSL_FIPSCANISTER mentions.miod2014-12-072-8/+0
|
* Three independent typos for `independent' or `independently'.miod2014-08-191-1/+1
|
* The assembly sha512 code detects at runtime if it is running on a 64-bitmiod2014-05-021-0/+6
| | | | | | | | | | | | processor (PA2.0) and, if so, switches to 64-bit code. However, when running under a 32-bit OpenBSD/hppa kernel, there is no guarantee that the upper part of the registers will be preserved accross context switches (or even userland->kernel boundaries), which causes this code to fail. Wrap the generated code within #ifndef __OpenBSD__ in that case, to avoid using the 64-bit code completely. (OpenBSD/hppa64, once stable, will not be affected by this)
* Do not output SOM-specific directives.miod2014-05-012-0/+12
|
* Fix include filename to get register name aliases under BSDmiod2014-05-011-6/+1
|
* First pass at removing win64 support from the assembly generating Perljsing2014-04-301-109/+0
| | | | | | | scripts. We certainly do not need an identical copy of the win64 exception handler in each script (surely one copy would be sufficient). ok miod@
* Aren't you glad to have this file tell you that ``C2.pl works''? Bonus pointmiod2014-04-171-1/+0
| | | | if you can spot C2.pl.
* No need to consider being compiled by NASM anymore.miod2014-04-171-4/+0
|
* This commit was generated by cvs2git to track changes on a CVS vendormiod2014-04-139-17/+23
|\ | | | | branch.
| * Import OpenSSL 1.0.1gmiod2014-04-139-17/+23
| |
* | resolve conflictsdjm2012-10-131-49/+1058
| |
* | This commit was generated by cvs2git to track changes on a CVS vendordjm2012-10-1317-556/+3906
|\| | | | | branch.
| * import OpenSSL-1.0.1cdjm2012-10-1318-605/+4964
| |
* | This commit was generated by cvs2git to track changes on a CVS vendordjm2011-11-036-69/+75
|\| | | | | branch.
| * import OpenSSL 1.0.0edjm2011-11-036-69/+75
| |
* | resolve conflicts, fix local changesdjm2010-10-012-404/+1
| |
* | This commit was generated by cvs2git to track changes on a CVS vendordjm2010-10-0115-22/+4995
|\| | | | | branch.
| * import OpenSSL-1.0.0adjm2010-10-0116-22/+4996
| |
* | This commit was generated by cvs2git to track changes on a CVS vendordjm2009-04-061-0/+1
|\| | | | | branch.
| * import of OpenSSL 0.9.8kdjm2009-04-061-0/+1
| |
| * import openssl-0.9.8jdjm2009-01-091-1/+1
| |
* | update to openssl-0.9.8i; tested by several, especially krw@djm2009-01-051-1/+1
| |
* | resolve conflictsdjm2008-09-061-339/+133
| |
* | This commit was generated by cvs2git to track changes on a CVS vendordjm2008-09-064-295/+1309
|\| | | | | branch.
| * import of OpenSSL 0.9.8hdjm2008-09-065-634/+1442
| |