diff options
author | Jeffrey Walton <noloader@gmail.com> | 2018-08-20 07:16:59 -0400 |
---|---|---|
committer | Jeffrey Walton <noloader@gmail.com> | 2018-08-20 07:16:59 -0400 |
commit | 01779726dbd29803792ea524bd169f18e2b45722 (patch) | |
tree | 367d9f6c8d44418d543b48135a20b91e6969c7d5 /gcm.cpp | |
parent | 8c5a5586630fa2f39f76725f125596085ba2e12e (diff) | |
download | cryptopp-git-01779726dbd29803792ea524bd169f18e2b45722.tar.gz |
Use consistent suffix for SSE2 ASM
Diffstat (limited to 'gcm.cpp')
-rw-r--r-- | gcm.cpp | 16 |
1 files changed, 8 insertions, 8 deletions
@@ -378,8 +378,8 @@ unsigned int GCM_Base::OptimalDataAlignment() const #ifdef CRYPTOPP_X64_MASM_AVAILABLE
extern "C" {
-void GCM_AuthenticateBlocks_2K(const byte *data, size_t blocks, word64 *hashBuffer, const word16 *reductionTable);
-void GCM_AuthenticateBlocks_64K(const byte *data, size_t blocks, word64 *hashBuffer);
+void GCM_AuthenticateBlocks_2K_SSE2(const byte *data, size_t blocks, word64 *hashBuffer, const word16 *reductionTable);
+void GCM_AuthenticateBlocks_64K_SSE2(const byte *data, size_t blocks, word64 *hashBuffer);
}
#endif
@@ -550,10 +550,10 @@ size_t GCM_Base::AuthenticateBlocks(const byte *data, size_t len) #ifdef CRYPTOPP_X64_MASM_AVAILABLE
case 1: // SSE2 and 2K tables
- GCM_AuthenticateBlocks_2K(data, len/16, hashBuffer, s_reductionTable);
+ GCM_AuthenticateBlocks_2K_SSE2(data, len/16, hashBuffer, s_reductionTable);
return len % 16;
case 3: // SSE2 and 64K tables
- GCM_AuthenticateBlocks_64K(data, len/16, hashBuffer);
+ GCM_AuthenticateBlocks_64K_SSE2(data, len/16, hashBuffer);
return len % 16;
#endif
@@ -566,7 +566,7 @@ size_t GCM_Base::AuthenticateBlocks(const byte *data, size_t len) INTEL_NOPREFIX
#elif defined(CRYPTOPP_GENERATE_X64_MASM)
ALIGN 8
- GCM_AuthenticateBlocks_2K PROC FRAME
+ GCM_AuthenticateBlocks_2K_SSE2 PROC FRAME
rex_push_reg rsi
push_reg rdi
push_reg rbx
@@ -734,7 +734,7 @@ size_t GCM_Base::AuthenticateBlocks(const byte *data, size_t len) pop rdi
pop rsi
ret
- GCM_AuthenticateBlocks_2K ENDP
+ GCM_AuthenticateBlocks_2K_SSE2 ENDP
#endif
return len%16;
@@ -747,7 +747,7 @@ size_t GCM_Base::AuthenticateBlocks(const byte *data, size_t len) INTEL_NOPREFIX
#elif defined(CRYPTOPP_GENERATE_X64_MASM)
ALIGN 8
- GCM_AuthenticateBlocks_64K PROC FRAME
+ GCM_AuthenticateBlocks_64K_SSE2 PROC FRAME
rex_push_reg rsi
push_reg rdi
.endprolog
@@ -809,7 +809,7 @@ size_t GCM_Base::AuthenticateBlocks(const byte *data, size_t len) pop rdi
pop rsi
ret
- GCM_AuthenticateBlocks_64K ENDP
+ GCM_AuthenticateBlocks_64K_SSE2 ENDP
#endif
return len%16;
|