亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? aes-sparcv9.pl

?? OpenSSL 0.9.8k 最新版OpenSSL
?? PL
?? 第 1 頁 / 共 2 頁
字號:
#!/usr/bin/env perl## ====================================================================# Written by Andy Polyakov <appro@fy.chalmers.se> for the OpenSSL# project. Rights for redistribution and usage in source and binary# forms are granted according to the OpenSSL license.# ====================================================================## Version 1.1## The major reason for undertaken effort was to mitigate the hazard of# cache-timing attack. This is [currently and initially!] addressed in# two ways. 1. S-boxes are compressed from 5KB to 2KB+256B size each.# 2. References to them are scheduled for L2 cache latency, meaning# that the tables don't have to reside in L1 cache. Once again, this# is an initial draft and one should expect more countermeasures to# be implemented...## Version 1.1 prefetches T[ed]4 in order to mitigate attack on last# round.## Even though performance was not the primary goal [on the contrary,# extra shifts "induced" by compressed S-box and longer loop epilogue# "induced" by scheduling for L2 have negative effect on performance],# the code turned out to run in ~23 cycles per processed byte en-/# decrypted with 128-bit key. This is pretty good result for code# with mentioned qualities and UltraSPARC core. Compared to Sun C# generated code my encrypt procedure runs just few percents faster,# while decrypt one - whole 50% faster [yes, Sun C failed to generate# optimal decrypt procedure]. Compared to GNU C generated code both# procedures are more than 60% faster:-)$bits=32;for (@ARGV)	{ $bits=64 if (/\-m64/ || /\-xarch\=v9/); }if ($bits==64)	{ $bias=2047; $frame=192; }else		{ $bias=0;    $frame=112; }$locals=16;$acc0="%l0";$acc1="%o0";$acc2="%o1";$acc3="%o2";$acc4="%l1";$acc5="%o3";$acc6="%o4";$acc7="%o5";$acc8="%l2";$acc9="%o7";$acc10="%g1";$acc11="%g2";$acc12="%l3";$acc13="%g3";$acc14="%g4";$acc15="%g5";$t0="%l4";$t1="%l5";$t2="%l6";$t3="%l7";$s0="%i0";$s1="%i1";$s2="%i2";$s3="%i3";$tbl="%i4";$key="%i5";$rounds="%i7";	# aliases with return address, which is off-loaded to stacksub _data_word(){ my $i;    while(defined($i=shift)) { $code.=sprintf"\t.long\t0x%08x,0x%08x\n",$i,$i; }}$code.=<<___ if ($bits==64);.register	%g2,#scratch.register	%g3,#scratch___$code.=<<___;.section	".text",#alloc,#execinstr.align	256AES_Te:___&_data_word(	0xc66363a5, 0xf87c7c84, 0xee777799, 0xf67b7b8d,	0xfff2f20d, 0xd66b6bbd, 0xde6f6fb1, 0x91c5c554,	0x60303050, 0x02010103, 0xce6767a9, 0x562b2b7d,	0xe7fefe19, 0xb5d7d762, 0x4dababe6, 0xec76769a,	0x8fcaca45, 0x1f82829d, 0x89c9c940, 0xfa7d7d87,	0xeffafa15, 0xb25959eb, 0x8e4747c9, 0xfbf0f00b,	0x41adadec, 0xb3d4d467, 0x5fa2a2fd, 0x45afafea,	0x239c9cbf, 0x53a4a4f7, 0xe4727296, 0x9bc0c05b,	0x75b7b7c2, 0xe1fdfd1c, 0x3d9393ae, 0x4c26266a,	0x6c36365a, 0x7e3f3f41, 0xf5f7f702, 0x83cccc4f,	0x6834345c, 0x51a5a5f4, 0xd1e5e534, 0xf9f1f108,	0xe2717193, 0xabd8d873, 0x62313153, 0x2a15153f,	0x0804040c, 0x95c7c752, 0x46232365, 0x9dc3c35e,	0x30181828, 0x379696a1, 0x0a05050f, 0x2f9a9ab5,	0x0e070709, 0x24121236, 0x1b80809b, 0xdfe2e23d,	0xcdebeb26, 0x4e272769, 0x7fb2b2cd, 0xea75759f,	0x1209091b, 0x1d83839e, 0x582c2c74, 0x341a1a2e,	0x361b1b2d, 0xdc6e6eb2, 0xb45a5aee, 0x5ba0a0fb,	0xa45252f6, 0x763b3b4d, 0xb7d6d661, 0x7db3b3ce,	0x5229297b, 0xdde3e33e, 0x5e2f2f71, 0x13848497,	0xa65353f5, 0xb9d1d168, 0x00000000, 0xc1eded2c,	0x40202060, 0xe3fcfc1f, 0x79b1b1c8, 0xb65b5bed,	0xd46a6abe, 0x8dcbcb46, 0x67bebed9, 0x7239394b,	0x944a4ade, 0x984c4cd4, 0xb05858e8, 0x85cfcf4a,	0xbbd0d06b, 0xc5efef2a, 0x4faaaae5, 0xedfbfb16,	0x864343c5, 0x9a4d4dd7, 0x66333355, 0x11858594,	0x8a4545cf, 0xe9f9f910, 0x04020206, 0xfe7f7f81,	0xa05050f0, 0x783c3c44, 0x259f9fba, 0x4ba8a8e3,	0xa25151f3, 0x5da3a3fe, 0x804040c0, 0x058f8f8a,	0x3f9292ad, 0x219d9dbc, 0x70383848, 0xf1f5f504,	0x63bcbcdf, 0x77b6b6c1, 0xafdada75, 0x42212163,	0x20101030, 0xe5ffff1a, 0xfdf3f30e, 0xbfd2d26d,	0x81cdcd4c, 0x180c0c14, 0x26131335, 0xc3ecec2f,	0xbe5f5fe1, 0x359797a2, 0x884444cc, 0x2e171739,	0x93c4c457, 0x55a7a7f2, 0xfc7e7e82, 0x7a3d3d47,	0xc86464ac, 0xba5d5de7, 0x3219192b, 0xe6737395,	0xc06060a0, 0x19818198, 0x9e4f4fd1, 0xa3dcdc7f,	0x44222266, 0x542a2a7e, 0x3b9090ab, 0x0b888883,	0x8c4646ca, 0xc7eeee29, 0x6bb8b8d3, 0x2814143c,	0xa7dede79, 0xbc5e5ee2, 0x160b0b1d, 0xaddbdb76,	0xdbe0e03b, 0x64323256, 0x743a3a4e, 0x140a0a1e,	0x924949db, 0x0c06060a, 0x4824246c, 0xb85c5ce4,	0x9fc2c25d, 0xbdd3d36e, 0x43acacef, 0xc46262a6,	0x399191a8, 0x319595a4, 0xd3e4e437, 0xf279798b,	0xd5e7e732, 0x8bc8c843, 0x6e373759, 0xda6d6db7,	0x018d8d8c, 0xb1d5d564, 0x9c4e4ed2, 0x49a9a9e0,	0xd86c6cb4, 0xac5656fa, 0xf3f4f407, 0xcfeaea25,	0xca6565af, 0xf47a7a8e, 0x47aeaee9, 0x10080818,	0x6fbabad5, 0xf0787888, 0x4a25256f, 0x5c2e2e72,	0x381c1c24, 0x57a6a6f1, 0x73b4b4c7, 0x97c6c651,	0xcbe8e823, 0xa1dddd7c, 0xe874749c, 0x3e1f1f21,	0x964b4bdd, 0x61bdbddc, 0x0d8b8b86, 0x0f8a8a85,	0xe0707090, 0x7c3e3e42, 0x71b5b5c4, 0xcc6666aa,	0x904848d8, 0x06030305, 0xf7f6f601, 0x1c0e0e12,	0xc26161a3, 0x6a35355f, 0xae5757f9, 0x69b9b9d0,	0x17868691, 0x99c1c158, 0x3a1d1d27, 0x279e9eb9,	0xd9e1e138, 0xebf8f813, 0x2b9898b3, 0x22111133,	0xd26969bb, 0xa9d9d970, 0x078e8e89, 0x339494a7,	0x2d9b9bb6, 0x3c1e1e22, 0x15878792, 0xc9e9e920,	0x87cece49, 0xaa5555ff, 0x50282878, 0xa5dfdf7a,	0x038c8c8f, 0x59a1a1f8, 0x09898980, 0x1a0d0d17,	0x65bfbfda, 0xd7e6e631, 0x844242c6, 0xd06868b8,	0x824141c3, 0x299999b0, 0x5a2d2d77, 0x1e0f0f11,	0x7bb0b0cb, 0xa85454fc, 0x6dbbbbd6, 0x2c16163a);$code.=<<___;	.byte	0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5	.byte	0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76	.byte	0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0	.byte	0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0	.byte	0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc	.byte	0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15	.byte	0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a	.byte	0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75	.byte	0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0	.byte	0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84	.byte	0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b	.byte	0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf	.byte	0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85	.byte	0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8	.byte	0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5	.byte	0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2	.byte	0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17	.byte	0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73	.byte	0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88	.byte	0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb	.byte	0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c	.byte	0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79	.byte	0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9	.byte	0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08	.byte	0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6	.byte	0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a	.byte	0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e	.byte	0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e	.byte	0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94	.byte	0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf	.byte	0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68	.byte	0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16.type	AES_Te,#object.size	AES_Te,(.-AES_Te).align	64.skip	16_sparcv9_AES_encrypt:	save	%sp,-$frame-$locals,%sp	stx	%i7,[%sp+$bias+$frame+0]	! off-load return address	ld	[$key+240],$rounds	ld	[$key+0],$t0	ld	[$key+4],$t1			!	ld	[$key+8],$t2	srl	$rounds,1,$rounds	xor	$t0,$s0,$s0	ld	[$key+12],$t3	srl	$s0,21,$acc0	xor	$t1,$s1,$s1	ld	[$key+16],$t0	srl	$s1,13,$acc1			!	xor	$t2,$s2,$s2	ld	[$key+20],$t1	xor	$t3,$s3,$s3	ld	[$key+24],$t2	and	$acc0,2040,$acc0	ld	[$key+28],$t3	nop.Lenc_loop:	srl	$s2,5,$acc2			!	and	$acc1,2040,$acc1	ldx	[$tbl+$acc0],$acc0	sll	$s3,3,$acc3	and	$acc2,2040,$acc2	ldx	[$tbl+$acc1],$acc1	srl	$s1,21,$acc4	and	$acc3,2040,$acc3	ldx	[$tbl+$acc2],$acc2		!	srl	$s2,13,$acc5	and	$acc4,2040,$acc4	ldx	[$tbl+$acc3],$acc3	srl	$s3,5,$acc6	and	$acc5,2040,$acc5	ldx	[$tbl+$acc4],$acc4	fmovs	%f0,%f0	sll	$s0,3,$acc7			!	and	$acc6,2040,$acc6	ldx	[$tbl+$acc5],$acc5	srl	$s2,21,$acc8	and	$acc7,2040,$acc7	ldx	[$tbl+$acc6],$acc6	srl	$s3,13,$acc9	and	$acc8,2040,$acc8	ldx	[$tbl+$acc7],$acc7		!	srl	$s0,5,$acc10	and	$acc9,2040,$acc9	ldx	[$tbl+$acc8],$acc8	sll	$s1,3,$acc11	and	$acc10,2040,$acc10	ldx	[$tbl+$acc9],$acc9	fmovs	%f0,%f0	srl	$s3,21,$acc12			!	and	$acc11,2040,$acc11	ldx	[$tbl+$acc10],$acc10	srl	$s0,13,$acc13	and	$acc12,2040,$acc12	ldx	[$tbl+$acc11],$acc11	srl	$s1,5,$acc14	and	$acc13,2040,$acc13	ldx	[$tbl+$acc12],$acc12		!	sll	$s2,3,$acc15	and	$acc14,2040,$acc14	ldx	[$tbl+$acc13],$acc13	and	$acc15,2040,$acc15	add	$key,32,$key	ldx	[$tbl+$acc14],$acc14	fmovs	%f0,%f0	subcc	$rounds,1,$rounds		!	ldx	[$tbl+$acc15],$acc15	bz,a,pn	%icc,.Lenc_last	add	$tbl,2048,$rounds		srlx	$acc1,8,$acc1		xor	$acc0,$t0,$t0	ld	[$key+0],$s0	fmovs	%f0,%f0		srlx	$acc2,16,$acc2		!		xor	$acc1,$t0,$t0	ld	[$key+4],$s1		srlx	$acc3,24,$acc3		xor	$acc2,$t0,$t0	ld	[$key+8],$s2		srlx	$acc5,8,$acc5		xor	$acc3,$t0,$t0	ld	[$key+12],$s3			!		srlx	$acc6,16,$acc6		xor	$acc4,$t1,$t1	fmovs	%f0,%f0		srlx	$acc7,24,$acc7		xor	$acc5,$t1,$t1		srlx	$acc9,8,$acc9		xor	$acc6,$t1,$t1		srlx	$acc10,16,$acc10	!		xor	$acc7,$t1,$t1		srlx	$acc11,24,$acc11		xor	$acc8,$t2,$t2		srlx	$acc13,8,$acc13		xor	$acc9,$t2,$t2		srlx	$acc14,16,$acc14		xor	$acc10,$t2,$t2		srlx	$acc15,24,$acc15	!		xor	$acc11,$t2,$t2		xor	$acc12,$acc14,$acc14		xor	$acc13,$t3,$t3	srl	$t0,21,$acc0		xor	$acc14,$t3,$t3	srl	$t1,13,$acc1		xor	$acc15,$t3,$t3	and	$acc0,2040,$acc0		!	srl	$t2,5,$acc2	and	$acc1,2040,$acc1	ldx	[$tbl+$acc0],$acc0	sll	$t3,3,$acc3	and	$acc2,2040,$acc2	ldx	[$tbl+$acc1],$acc1	fmovs	%f0,%f0	srl	$t1,21,$acc4			!	and	$acc3,2040,$acc3	ldx	[$tbl+$acc2],$acc2	srl	$t2,13,$acc5	and	$acc4,2040,$acc4	ldx	[$tbl+$acc3],$acc3	srl	$t3,5,$acc6	and	$acc5,2040,$acc5	ldx	[$tbl+$acc4],$acc4		!	sll	$t0,3,$acc7	and	$acc6,2040,$acc6	ldx	[$tbl+$acc5],$acc5	srl	$t2,21,$acc8	and	$acc7,2040,$acc7	ldx	[$tbl+$acc6],$acc6	fmovs	%f0,%f0	srl	$t3,13,$acc9			!	and	$acc8,2040,$acc8	ldx	[$tbl+$acc7],$acc7	srl	$t0,5,$acc10	and	$acc9,2040,$acc9	ldx	[$tbl+$acc8],$acc8	sll	$t1,3,$acc11	and	$acc10,2040,$acc10	ldx	[$tbl+$acc9],$acc9		!	srl	$t3,21,$acc12	and	$acc11,2040,$acc11	ldx	[$tbl+$acc10],$acc10	srl	$t0,13,$acc13	and	$acc12,2040,$acc12	ldx	[$tbl+$acc11],$acc11	fmovs	%f0,%f0	srl	$t1,5,$acc14			!	and	$acc13,2040,$acc13	ldx	[$tbl+$acc12],$acc12	sll	$t2,3,$acc15	and	$acc14,2040,$acc14	ldx	[$tbl+$acc13],$acc13		srlx	$acc1,8,$acc1	and	$acc15,2040,$acc15	ldx	[$tbl+$acc14],$acc14		!		srlx	$acc2,16,$acc2		xor	$acc0,$s0,$s0	ldx	[$tbl+$acc15],$acc15		srlx	$acc3,24,$acc3		xor	$acc1,$s0,$s0	ld	[$key+16],$t0	fmovs	%f0,%f0		srlx	$acc5,8,$acc5		!		xor	$acc2,$s0,$s0	ld	[$key+20],$t1		srlx	$acc6,16,$acc6		xor	$acc3,$s0,$s0	ld	[$key+24],$t2		srlx	$acc7,24,$acc7		xor	$acc4,$s1,$s1	ld	[$key+28],$t3			!		srlx	$acc9,8,$acc9		xor	$acc5,$s1,$s1	ldx	[$tbl+2048+0],%g0		! prefetch te4		srlx	$acc10,16,$acc10		xor	$acc6,$s1,$s1	ldx	[$tbl+2048+32],%g0		! prefetch te4		srlx	$acc11,24,$acc11		xor	$acc7,$s1,$s1	ldx	[$tbl+2048+64],%g0		! prefetch te4		srlx	$acc13,8,$acc13		xor	$acc8,$s2,$s2	ldx	[$tbl+2048+96],%g0		! prefetch te4		srlx	$acc14,16,$acc14	!		xor	$acc9,$s2,$s2	ldx	[$tbl+2048+128],%g0		! prefetch te4		srlx	$acc15,24,$acc15		xor	$acc10,$s2,$s2	ldx	[$tbl+2048+160],%g0		! prefetch te4	srl	$s0,21,$acc0		xor	$acc11,$s2,$s2	ldx	[$tbl+2048+192],%g0		! prefetch te4		xor	$acc12,$acc14,$acc14		xor	$acc13,$s3,$s3	ldx	[$tbl+2048+224],%g0		! prefetch te4	srl	$s1,13,$acc1			!		xor	$acc14,$s3,$s3		xor	$acc15,$s3,$s3	ba	.Lenc_loop	and	$acc0,2040,$acc0.align	32.Lenc_last:		srlx	$acc1,8,$acc1		!		xor	$acc0,$t0,$t0	ld	[$key+0],$s0		srlx	$acc2,16,$acc2		xor	$acc1,$t0,$t0	ld	[$key+4],$s1		srlx	$acc3,24,$acc3		xor	$acc2,$t0,$t0	ld	[$key+8],$s2			!		srlx	$acc5,8,$acc5		xor	$acc3,$t0,$t0	ld	[$key+12],$s3		srlx	$acc6,16,$acc6		xor	$acc4,$t1,$t1		srlx	$acc7,24,$acc7		xor	$acc5,$t1,$t1		srlx	$acc9,8,$acc9		!		xor	$acc6,$t1,$t1		srlx	$acc10,16,$acc10		xor	$acc7,$t1,$t1		srlx	$acc11,24,$acc11		xor	$acc8,$t2,$t2		srlx	$acc13,8,$acc13		xor	$acc9,$t2,$t2		srlx	$acc14,16,$acc14	!		xor	$acc10,$t2,$t2		srlx	$acc15,24,$acc15		xor	$acc11,$t2,$t2		xor	$acc12,$acc14,$acc14		xor	$acc13,$t3,$t3	srl	$t0,24,$acc0		xor	$acc14,$t3,$t3	srl	$t1,16,$acc1			!		xor	$acc15,$t3,$t3	srl	$t2,8,$acc2	and	$acc1,255,$acc1	ldub	[$rounds+$acc0],$acc0	srl	$t1,24,$acc4	and	$acc2,255,$acc2	ldub	[$rounds+$acc1],$acc1	srl	$t2,16,$acc5			!	and	$t3,255,$acc3	ldub	[$rounds+$acc2],$acc2	ldub	[$rounds+$acc3],$acc3	srl	$t3,8,$acc6	and	$acc5,255,$acc5	ldub	[$rounds+$acc4],$acc4	fmovs	%f0,%f0	srl	$t2,24,$acc8			!	and	$acc6,255,$acc6	ldub	[$rounds+$acc5],$acc5	srl	$t3,16,$acc9	and	$t0,255,$acc7	ldub	[$rounds+$acc6],$acc6	ldub	[$rounds+$acc7],$acc7	fmovs	%f0,%f0	srl	$t0,8,$acc10			!	and	$acc9,255,$acc9	ldub	[$rounds+$acc8],$acc8	srl	$t3,24,$acc12	and	$acc10,255,$acc10	ldub	[$rounds+$acc9],$acc9	srl	$t0,16,$acc13	and	$t1,255,$acc11	ldub	[$rounds+$acc10],$acc10		!	srl	$t1,8,$acc14	and	$acc13,255,$acc13	ldub	[$rounds+$acc11],$acc11	ldub	[$rounds+$acc12],$acc12	and	$acc14,255,$acc14	ldub	[$rounds+$acc13],$acc13	and	$t2,255,$acc15	ldub	[$rounds+$acc14],$acc14		!		sll	$acc0,24,$acc0		xor	$acc3,$s0,$s0	ldub	[$rounds+$acc15],$acc15		sll	$acc1,16,$acc1		xor	$acc0,$s0,$s0	ldx	[%sp+$bias+$frame+0],%i7	! restore return address	fmovs	%f0,%f0		sll	$acc2,8,$acc2		!		xor	$acc1,$s0,$s0		sll	$acc4,24,$acc4		xor	$acc2,$s0,$s0		sll	$acc5,16,$acc5		xor	$acc7,$s1,$s1		sll	$acc6,8,$acc6		xor	$acc4,$s1,$s1		sll	$acc8,24,$acc8		!		xor	$acc5,$s1,$s1		sll	$acc9,16,$acc9		xor	$acc11,$s2,$s2		sll	$acc10,8,$acc10		xor	$acc6,$s1,$s1		sll	$acc12,24,$acc12		xor	$acc8,$s2,$s2		sll	$acc13,16,$acc13	!		xor	$acc9,$s2,$s2		sll	$acc14,8,$acc14		xor	$acc10,$s2,$s2		xor	$acc12,$acc14,$acc14		xor	$acc13,$s3,$s3		xor	$acc14,$s3,$s3		xor	$acc15,$s3,$s3	ret	restore.type	_sparcv9_AES_encrypt,#function.size	_sparcv9_AES_encrypt,(.-_sparcv9_AES_encrypt).align	32.globl	AES_encryptAES_encrypt:	or	%o0,%o1,%g1	andcc	%g1,3,%g0	bnz,pn	%xcc,.Lunaligned_enc	save	%sp,-$frame,%sp	ld	[%i0+0],%o0	ld	[%i0+4],%o1	ld	[%i0+8],%o2	ld	[%i0+12],%o31:	call	.+8	add	%o7,AES_Te-1b,%o4	call	_sparcv9_AES_encrypt	mov	%i2,%o5	st	%o0,[%i1+0]	st	%o1,[%i1+4]	st	%o2,[%i1+8]	st	%o3,[%i1+12]	ret	restore.align	32.Lunaligned_enc:	ldub	[%i0+0],%l0	ldub	[%i0+1],%l1	ldub	[%i0+2],%l2	sll	%l0,24,%l0	ldub	[%i0+3],%l3	sll	%l1,16,%l1	ldub	[%i0+4],%l4	sll	%l2,8,%l2	or	%l1,%l0,%l0	ldub	[%i0+5],%l5	sll	%l4,24,%l4	or	%l3,%l2,%l2	ldub	[%i0+6],%l6	sll	%l5,16,%l5	or	%l0,%l2,%o0	ldub	[%i0+7],%l7	sll	%l6,8,%l6	or	%l5,%l4,%l4	ldub	[%i0+8],%l0	or	%l7,%l6,%l6	ldub	[%i0+9],%l1	or	%l4,%l6,%o1	ldub	[%i0+10],%l2	sll	%l0,24,%l0	ldub	[%i0+11],%l3	sll	%l1,16,%l1	ldub	[%i0+12],%l4	sll	%l2,8,%l2	or	%l1,%l0,%l0	ldub	[%i0+13],%l5	sll	%l4,24,%l4	or	%l3,%l2,%l2	ldub	[%i0+14],%l6	sll	%l5,16,%l5	or	%l0,%l2,%o2	ldub	[%i0+15],%l7	sll	%l6,8,%l6	or	%l5,%l4,%l4	or	%l7,%l6,%l6	or	%l4,%l6,%o31:	call	.+8	add	%o7,AES_Te-1b,%o4	call	_sparcv9_AES_encrypt	mov	%i2,%o5	srl	%o0,24,%l0	srl	%o0,16,%l1

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
九一九一国产精品| 国产欧美精品区一区二区三区| 日韩一区二区三区视频在线| 中文字幕精品—区二区四季| 亚洲成va人在线观看| 不卡的av电影| 精品久久99ma| 日韩vs国产vs欧美| 色综合久久88色综合天天6| 2020国产成人综合网| 亚洲一区二区精品久久av| 成人精品视频一区二区三区尤物| 欧美一区二区三区小说| 亚洲线精品一区二区三区八戒| 成人激情小说乱人伦| 精品国产一区二区三区久久影院| 亚洲成av人片| 欧美性一区二区| 亚洲日本成人在线观看| 成人免费的视频| 久久久精品tv| 国产精品小仙女| 日韩欧美的一区| 日韩欧美123| 欧美日本国产视频| 一区二区三区日本| www.亚洲精品| 国产精品久久福利| 99久久免费视频.com| 欧美国产精品久久| 国产成人超碰人人澡人人澡| 久久久国际精品| 国产美女主播视频一区| 久久色在线观看| 国产91丝袜在线播放九色| 久久久精品免费网站| 成人涩涩免费视频| 国产精品家庭影院| 色老汉一区二区三区| 亚洲精品成人少妇| 欧美日韩三级一区| 国产91丝袜在线18| 亚洲视频免费在线| 欧美三级在线播放| 人人爽香蕉精品| 欧美xxxxx牲另类人与| 国产综合久久久久久久久久久久| 精品国精品自拍自在线| 粉嫩嫩av羞羞动漫久久久 | 激情图片小说一区| 久久蜜桃一区二区| 成人国产在线观看| 亚洲激情五月婷婷| 制服丝袜在线91| 国产一区二区三区免费| 成人欧美一区二区三区黑人麻豆 | 一区二区不卡在线视频 午夜欧美不卡在| 亚洲综合一区二区三区| 欧美乱妇23p| 国产精品一区二区无线| 综合久久一区二区三区| 欧美精品成人一区二区三区四区| 麻豆视频一区二区| 国产精品久久二区二区| 欧美精品vⅰdeose4hd| 国产成人精品影视| 亚洲国产综合人成综合网站| 日韩免费一区二区| 91亚洲精华国产精华精华液| 男人操女人的视频在线观看欧美| 中文字幕中文在线不卡住| 欧美伦理电影网| 成人av影视在线观看| 日本成人在线电影网| 中文字幕一区二区三区乱码在线| 欧美一区二区福利在线| 91免费版在线| 国内精品久久久久影院一蜜桃| 亚洲三级免费观看| 久久免费偷拍视频| 欧美电影在哪看比较好| 99久久免费精品高清特色大片| 日韩av中文字幕一区二区三区| 国产精品国模大尺度视频| 日韩一区二区影院| 色偷偷88欧美精品久久久| 国产一区二区三区在线观看免费| 午夜电影一区二区| 一区二区三区四区精品在线视频| 国产日韩精品一区二区浪潮av | 免费久久99精品国产| 136国产福利精品导航| 精品国产在天天线2019| 欧美日韩在线不卡| 91蝌蚪porny九色| 国产成人丝袜美腿| 久久91精品国产91久久小草| 亚洲国产精品久久久久婷婷884| 中文字幕+乱码+中文字幕一区| 日韩精品一区二区三区swag| 欧美日韩精品一区二区三区四区| 99视频精品全部免费在线| 岛国精品在线观看| 国产露脸91国语对白| 国产69精品久久777的优势| 精品一区二区三区免费视频| 香蕉成人伊视频在线观看| 国产精品视频一二| 国产精品视频线看| 国产精品美女视频| 国产精品麻豆欧美日韩ww| 国产欧美日韩三级| 日本一区二区三区免费乱视频 | 成人欧美一区二区三区黑人麻豆| 中日韩av电影| 亚洲欧洲精品一区二区精品久久久| 久久久精品黄色| 日本一区二区综合亚洲| 久久久久久久综合色一本| 久久久www免费人成精品| 久久久久久久久99精品| 欧美国产精品一区二区三区| 国产精品久久久久婷婷| 亚洲欧美区自拍先锋| 一区二区三区蜜桃| 日本三级韩国三级欧美三级| 麻豆精品蜜桃视频网站| 韩国三级电影一区二区| 成人性生交大片免费| 99久久99久久精品国产片果冻| 色综合中文字幕国产| 色婷婷一区二区三区四区| 在线观看一区日韩| 日韩精品中文字幕一区二区三区| 亚洲视频 欧洲视频| 亚洲国产岛国毛片在线| 亚洲精品日产精品乱码不卡| 亚洲黄色尤物视频| 美女视频一区在线观看| 成人久久视频在线观看| 欧美亚洲国产bt| 亚洲精品一区二区三区四区高清| 国产日韩av一区| 亚洲欧美aⅴ...| 免费xxxx性欧美18vr| 成人18视频在线播放| 欧美在线高清视频| 精品粉嫩超白一线天av| 国产精品传媒入口麻豆| 日韩国产欧美在线视频| 国产999精品久久久久久| 在线观看日韩精品| 26uuu欧美| 亚洲一区二区3| 国产高清久久久久| 欧美揉bbbbb揉bbbbb| 国产三级精品视频| 青草av.久久免费一区| 国产成人h网站| 欧美一区二区福利视频| 亚洲特黄一级片| 国产在线视频精品一区| 欧美在线视频你懂得| 国产精品欧美一区二区三区| 男男成人高潮片免费网站| 日本精品一级二级| 国产亚洲精品bt天堂精选| 亚洲大片在线观看| kk眼镜猥琐国模调教系列一区二区 | 日韩高清在线不卡| 色综合久久久久综合99| 久久久久亚洲综合| 免费观看一级欧美片| 在线免费观看日本欧美| 国产精品麻豆久久久| 国产精品资源在线观看| 欧美一区二区三区小说| 亚洲成人tv网| 欧美在线视频不卡| 亚洲美女淫视频| 国产成人亚洲综合a∨婷婷图片| 欧美精品久久天天躁| 性欧美疯狂xxxxbbbb| 91久久一区二区| 亚洲猫色日本管| 91蝌蚪porny成人天涯| 国产精品成人免费在线| 国产成人精品综合在线观看| 精品国产乱码久久久久久久久| 日韩av电影免费观看高清完整版 | 国产精品久久久久久久久久久免费看 | 亚洲午夜一区二区三区| a4yy欧美一区二区三区| 国产精品视频一区二区三区不卡| 国产精华液一区二区三区| 久久久噜噜噜久久人人看 | 极品美女销魂一区二区三区| 91麻豆精品久久久久蜜臀| 日本网站在线观看一区二区三区| 欧美日韩一区中文字幕|