boringssl/crypto/bn
Adam Langley 3e6526575a aarch64 support.
This is an initial cut at aarch64 support. I have only qemu to test it
however—hopefully hardware will be coming soon.

This also affects 32-bit ARM in that aarch64 chips can run 32-bit code
and we would like to be able to take advantage of the crypto operations
even in 32-bit mode. AES and GHASH should Just Work in this case: the
-armx.pl files can be built for either 32- or 64-bit mode based on the
flavour argument given to the Perl script.

SHA-1 and SHA-256 don't work like this however because they've never
support for multiple implementations, thus BoringSSL built for 32-bit
won't use the SHA instructions on an aarch64 chip.

No dedicated ChaCha20 or Poly1305 support yet.

Change-Id: Ib275bc4894a365c8ec7c42f4e91af6dba3bd686c
Reviewed-on: https://boringssl-review.googlesource.com/2801
Reviewed-by: Adam Langley <agl@google.com>
2015-01-14 23:38:11 +00:00
..
asm Fix for CVE-2014-3570. 2015-01-09 02:49:10 +00:00
add.c
bn_error.c Move public headers to include/openssl/ 2014-07-14 22:42:18 +00:00
bn_test.c Fix for CVE-2014-3570. 2015-01-09 02:49:10 +00:00
bn.c
CMakeLists.txt The asm files bn/asm/x86* weren't actually used. 2014-07-02 00:29:12 +00:00
cmp.c
convert.c Don't compare signed vs. unsigned. 2014-10-01 02:17:38 +00:00
ctx.c
div.c aarch64 support. 2015-01-14 23:38:11 +00:00
exponentiation.c Shush some dead assignments. 2014-11-06 01:34:33 +00:00
gcd.c
generic.c aarch64 support. 2015-01-14 23:38:11 +00:00
internal.h aarch64 support. 2015-01-14 23:38:11 +00:00
kronecker.c
montgomery.c bignum: allow concurrent BN_MONT_CTX_set_locked() 2014-06-20 13:17:40 -07:00
mul.c Make sure BN_sqr can never return a negative value. 2014-07-28 17:05:12 -07:00
prime.c
random.c Consistently use RAND_bytes and check for failure. 2014-12-16 19:15:59 +00:00
rsaz_exp.c Support building with PNaCl. 2014-07-11 19:04:04 +00:00
rsaz_exp.h Convert all zero-argument functions to '(void)' 2014-08-21 01:06:07 +00:00
shift.c
sqrt.c