aboutsummaryrefslogtreecommitdiffstats
path: root/modules/sha_x86
Commit message (Expand)AuthorAgeFilesLines
* Add a loop macro, continue converting the assembly to use the wrapperlloyd2006-08-132-14/+24
* Set up some macros to help portability and readabilitylloyd2006-08-133-90/+146
* Format cleanuplloyd2006-08-121-14/+14
* Remove some trailing whitespacelloyd2006-08-121-10/+7
* Reschedule some instructions in attempt to hide latencieslloyd2006-08-121-17/+18
* Fully unroll the byte-reader loop, now to reschedulelloyd2006-08-121-6/+12
* Finish unrolling the expansion loop, and start on the byte-reading looplloyd2006-08-121-36/+43
* Pull a variable directly out of a live register, rather than going outlloyd2006-08-121-4/+4
* Rearrange some operations, though instruction scheduling still needs alloyd2006-08-121-19/+16
* Use different registers in each iteration of the unrolled loop, so we canlloyd2006-08-121-20/+21
* Unroll the expansion looplloyd2006-08-121-8/+36
* Use indexed addressing to pull out elements of W[], rather thanlloyd2006-08-121-30/+36
* Use LEA inside the round functions, various cleanupslloyd2006-08-121-62/+45
* Remove the C implementations of the round functions, no longer usedlloyd2006-08-121-40/+0
* Entire SHA-1 compression function now implemented in assembly, just needslloyd2006-08-122-70/+45
* Implement the second set of SHA-1 functions in assembler; add somelloyd2006-08-122-36/+38
* Implement the first set of rounds of SHA-1 in assemblylloyd2006-08-122-5/+85
* Get all of the (callee-saved) registers saved so we have maximum spacelloyd2006-08-121-11/+14
* Add preliminary version of an SHA-1 x86 assembly modulelloyd2006-08-123-0/+187