diff options
author | Andy Polyakov <appro@openssl.org> | 2013-06-18 10:37:00 +0200 |
---|---|---|
committer | Andy Polyakov <appro@openssl.org> | 2013-06-18 10:37:00 +0200 |
commit | 02450ec69dda7815ba1e7bd74eb30f0ae1eb3042 (patch) | |
tree | 72728f16dd59c69c3fd821b7b1f3477b04f3ae46 /crypto/bn/asm/parisc-mont.pl | |
parent | 8a99cb29d1f0013243a532bccc1dc70ed678eebe (diff) |
PA-RISC assembler pack: switch to bve in 64-bit builds.
PR: 3074
Diffstat (limited to 'crypto/bn/asm/parisc-mont.pl')
-rw-r--r-- | crypto/bn/asm/parisc-mont.pl | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/crypto/bn/asm/parisc-mont.pl b/crypto/bn/asm/parisc-mont.pl index 4a766a87fb..c02ef6f014 100644 --- a/crypto/bn/asm/parisc-mont.pl +++ b/crypto/bn/asm/parisc-mont.pl @@ -40,7 +40,7 @@ # of arithmetic operations, most notably multiplications. It requires # more memory references, most notably to tp[num], but this doesn't # seem to exhaust memory port capacity. And indeed, dedicated PA-RISC -# 2.0 code path, provides virtually same performance as pa-risc2[W].s: +# 2.0 code path provides virtually same performance as pa-risc2[W].s: # it's ~10% better for shortest key length and ~10% worse for longest # one. # @@ -988,6 +988,8 @@ foreach (split("\n",$code)) { # assemble 2.0 instructions in 32-bit mode... s/^\s+([a-z]+)([\S]*)\s+([\S]*)/&assemble($1,$2,$3)/e if ($BN_SZ==4); + s/\bbv\b/bve/gm if ($SIZE_T==8); + print $_,"\n"; } close STDOUT; |