#
# Extracted value (output) is 20 digit number in 2^52 radix.
#
-# void extract_multiplier_2x20_win5(BN_ULONG *red_Y,
-# const BN_ULONG red_table[1 << EXP_WIN_SIZE][2][20],
-# int red_table_idx,
-# int tbl_idx); # 0 or 1
+# void ossl_extract_multiplier_2x20_win5(BN_ULONG *red_Y,
+# const BN_ULONG red_table[1 << EXP_WIN_SIZE][2][20],
+# int red_table_idx,
+# int tbl_idx); # 0 or 1
#
# EXP_WIN_SIZE = 5
###############################################################################
.text
.align 32
-.globl extract_multiplier_2x20_win5
-.type extract_multiplier_2x20_win5,\@function,4
-extract_multiplier_2x20_win5:
+.globl ossl_extract_multiplier_2x20_win5
+.type ossl_extract_multiplier_2x20_win5,\@function,4
+ossl_extract_multiplier_2x20_win5:
.cfi_startproc
endbranch
leaq ($tbl_idx,$tbl_idx,4), %rax
ret
.cfi_endproc
-.size extract_multiplier_2x20_win5, .-extract_multiplier_2x20_win5
+.size ossl_extract_multiplier_2x20_win5, .-ossl_extract_multiplier_2x20_win5
___
$code.=<<___;
.data
.rva .LSEH_end_RSAZ_amm52x20_x2_256
.rva .LSEH_info_RSAZ_amm52x20_x2_256
- .rva .LSEH_begin_extract_multiplier_2x20_win5
- .rva .LSEH_end_extract_multiplier_2x20_win5
- .rva .LSEH_info_extract_multiplier_2x20_win5
+ .rva .LSEH_begin_ossl_extract_multiplier_2x20_win5
+ .rva .LSEH_end_ossl_extract_multiplier_2x20_win5
+ .rva .LSEH_info_ossl_extract_multiplier_2x20_win5
.section .xdata
.align 8
.byte 9,0,0,0
.rva rsaz_def_handler
.rva .Lrsaz_amm52x20_x2_256_body,.Lrsaz_amm52x20_x2_256_epilogue
-.LSEH_info_extract_multiplier_2x20_win5:
+.LSEH_info_ossl_extract_multiplier_2x20_win5:
.byte 9,0,0,0
.rva rsaz_def_handler
- .rva .LSEH_begin_extract_multiplier_2x20_win5,.LSEH_begin_extract_multiplier_2x20_win5
+ .rva .LSEH_begin_ossl_extract_multiplier_2x20_win5,.LSEH_begin_ossl_extract_multiplier_2x20_win5
___
}
}}} else {{{ # fallback for old assembler
.globl RSAZ_amm52x20_x1_256
.globl RSAZ_amm52x20_x2_256
-.globl extract_multiplier_2x20_win5
+.globl ossl_extract_multiplier_2x20_win5
.type RSAZ_amm52x20_x1_256,\@abi-omnipotent
RSAZ_amm52x20_x1_256:
RSAZ_amm52x20_x2_256:
-extract_multiplier_2x20_win5:
+ossl_extract_multiplier_2x20_win5:
.byte 0x0f,0x0b # ud2
ret
.size RSAZ_amm52x20_x1_256, .-RSAZ_amm52x20_x1_256
void RSAZ_amm52x20_x2_256(BN_ULONG *out, const BN_ULONG *a,
const BN_ULONG *b, const BN_ULONG *m,
const BN_ULONG k0[2]);
-void extract_multiplier_2x20_win5(BN_ULONG *red_Y,
- const BN_ULONG *red_table,
- int red_table_idx, int tbl_idx);
+void ossl_extract_multiplier_2x20_win5(BN_ULONG *red_Y,
+ const BN_ULONG *red_table,
+ int red_table_idx, int tbl_idx);
/*
* Dual Montgomery modular exponentiation using prime moduli of the
red_table_idx_0 >>= exp_chunk_shift;
red_table_idx_1 >>= exp_chunk_shift;
- extract_multiplier_2x20_win5(red_Y[0], (const BN_ULONG*)red_table, (int)red_table_idx_0, 0);
- extract_multiplier_2x20_win5(red_Y[1], (const BN_ULONG*)red_table, (int)red_table_idx_1, 1);
+ ossl_extract_multiplier_2x20_win5(red_Y[0], (const BN_ULONG*)red_table,
+ (int)red_table_idx_0, 0);
+ ossl_extract_multiplier_2x20_win5(red_Y[1], (const BN_ULONG*)red_table,
+ (int)red_table_idx_1, 1);
/* Process other exp windows */
for (exp_bit_no -= EXP_WIN_SIZE; exp_bit_no >= 0; exp_bit_no -= EXP_WIN_SIZE) {
}
red_table_idx_0 &= table_idx_mask;
- extract_multiplier_2x20_win5(red_X[0], (const BN_ULONG*)red_table, (int)red_table_idx_0, 0);
+ ossl_extract_multiplier_2x20_win5(red_X[0],
+ (const BN_ULONG*)red_table,
+ (int)red_table_idx_0, 0);
}
{
red_table_idx_1 = expz[1][exp_chunk_no];
}
red_table_idx_1 &= table_idx_mask;
- extract_multiplier_2x20_win5(red_X[1], (const BN_ULONG*)red_table, (int)red_table_idx_1, 1);
+ ossl_extract_multiplier_2x20_win5(red_X[1],
+ (const BN_ULONG*)red_table,
+ (int)red_table_idx_1, 1);
}
}