Sophie

Sophie

distrib > Fedora > 14 > x86_64 > by-pkgid > 23e07fd43e778a61ff4b78161a3e2389 > files > 1883

cryptopp-doc-5.6.1-5.fc14.noarch.rpm

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<title>Crypto++: panama.cpp Source File</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<link href="doxygen.css" rel="stylesheet" type="text/css"/>
</head>
<body>
<!-- Generated by Doxygen 1.7.4 -->
<div id="top">
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
 <tbody>
 <tr style="height: 56px;">
  <td style="padding-left: 0.5em;">
   <div id="projectname">Crypto++</div>
  </td>
 </tr>
 </tbody>
</table>
</div>
  <div id="navrow1" class="tabs">
    <ul class="tablist">
      <li><a href="index.html"><span>Main&#160;Page</span></a></li>
      <li><a href="namespaces.html"><span>Namespaces</span></a></li>
      <li><a href="annotated.html"><span>Classes</span></a></li>
      <li class="current"><a href="files.html"><span>Files</span></a></li>
    </ul>
  </div>
  <div id="navrow2" class="tabs2">
    <ul class="tablist">
      <li><a href="files.html"><span>File&#160;List</span></a></li>
      <li><a href="globals.html"><span>File&#160;Members</span></a></li>
    </ul>
  </div>
<div class="header">
  <div class="headertitle">
<div class="title">panama.cpp</div>  </div>
</div>
<div class="contents">
<div class="fragment"><pre class="fragment"><a name="l00001"></a>00001 <span class="comment">// panama.cpp - written and placed in the public domain by Wei Dai</span>
<a name="l00002"></a>00002 
<a name="l00003"></a>00003 <span class="comment">// use &quot;cl /EP /P /DCRYPTOPP_GENERATE_X64_MASM panama.cpp&quot; to generate MASM code</span>
<a name="l00004"></a>00004 
<a name="l00005"></a>00005 <span class="preprocessor">#include &quot;pch.h&quot;</span>
<a name="l00006"></a>00006 
<a name="l00007"></a>00007 <span class="preprocessor">#ifndef CRYPTOPP_GENERATE_X64_MASM</span>
<a name="l00008"></a>00008 <span class="preprocessor"></span>
<a name="l00009"></a>00009 <span class="preprocessor">#include &quot;panama.h&quot;</span>
<a name="l00010"></a>00010 <span class="preprocessor">#include &quot;misc.h&quot;</span>
<a name="l00011"></a>00011 <span class="preprocessor">#include &quot;cpu.h&quot;</span>
<a name="l00012"></a>00012 
<a name="l00013"></a>00013 NAMESPACE_BEGIN(CryptoPP)
<a name="l00014"></a>00014 
<a name="l00015"></a>00015 template &lt;class B&gt;
<a name="l00016"></a>00016 <span class="keywordtype">void</span> <a class="code" href="class_panama.html" title="base class, do not use directly">Panama</a>&lt;B&gt;::Reset()
<a name="l00017"></a>00017 {
<a name="l00018"></a>00018         memset(m_state, 0, m_state.SizeInBytes());
<a name="l00019"></a>00019 <span class="preprocessor">#if CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE</span>
<a name="l00020"></a>00020 <span class="preprocessor"></span>        m_state[17] = HasSSSE3();
<a name="l00021"></a>00021 <span class="preprocessor">#endif</span>
<a name="l00022"></a>00022 <span class="preprocessor"></span>}
<a name="l00023"></a>00023 
<a name="l00024"></a>00024 <span class="preprocessor">#endif  // #ifndef CRYPTOPP_GENERATE_X64_MASM</span>
<a name="l00025"></a>00025 <span class="preprocessor"></span>
<a name="l00026"></a>00026 <span class="preprocessor">#ifdef CRYPTOPP_X64_MASM_AVAILABLE</span>
<a name="l00027"></a>00027 <span class="preprocessor"></span><span class="keyword">extern</span> <span class="stringliteral">&quot;C&quot;</span> {
<a name="l00028"></a>00028 <span class="keywordtype">void</span> Panama_SSE2_Pull(<span class="keywordtype">size_t</span> count, word32 *state, word32 *z, <span class="keyword">const</span> word32 *y);
<a name="l00029"></a>00029 }
<a name="l00030"></a>00030 <span class="preprocessor">#elif CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE</span>
<a name="l00031"></a>00031 <span class="preprocessor"></span>
<a name="l00032"></a>00032 <span class="preprocessor">#ifdef CRYPTOPP_GENERATE_X64_MASM</span>
<a name="l00033"></a>00033 <span class="preprocessor"></span>        Panama_SSE2_Pull        PROC FRAME
<a name="l00034"></a>00034         rex_push_reg rdi
<a name="l00035"></a>00035         alloc_stack(2*16)
<a name="l00036"></a>00036         save_xmm128 xmm6, 0h
<a name="l00037"></a>00037         save_xmm128 xmm7, 10h
<a name="l00038"></a>00038         .endprolog
<a name="l00039"></a>00039 <span class="preprocessor">#else</span>
<a name="l00040"></a>00040 <span class="preprocessor"></span><span class="preprocessor">#pragma warning(disable: 4731)  // frame pointer register &#39;ebp&#39; modified by inline assembly code</span>
<a name="l00041"></a>00041 <span class="preprocessor"></span><span class="keywordtype">void</span> CRYPTOPP_NOINLINE Panama_SSE2_Pull(<span class="keywordtype">size_t</span> count, word32 *state, word32 *z, <span class="keyword">const</span> word32 *y)
<a name="l00042"></a>00042 {
<a name="l00043"></a>00043 <span class="preprocessor">#ifdef CRYPTOPP_GNU_STYLE_INLINE_ASSEMBLY</span>
<a name="l00044"></a>00044 <span class="preprocessor"></span>        <span class="keyword">asm</span> __volatile__
<a name="l00045"></a>00045         (
<a name="l00046"></a>00046                 <span class="stringliteral">&quot;.intel_syntax noprefix;&quot;</span>
<a name="l00047"></a>00047                 AS_PUSH_IF86(   bx)
<a name="l00048"></a>00048 #<span class="keywordflow">else</span>
<a name="l00049"></a>00049         AS2(    mov             AS_REG_1, count)
<a name="l00050"></a>00050         AS2(    mov             AS_REG_2, state)
<a name="l00051"></a>00051         AS2(    mov             AS_REG_3, z)
<a name="l00052"></a>00052         AS2(    mov             AS_REG_4, y)
<a name="l00053"></a>00053 #endif
<a name="l00054"></a>00054 #endif  <span class="comment">// #ifdef CRYPTOPP_GENERATE_X64_MASM</span>
<a name="l00055"></a>00055 
<a name="l00056"></a>00056 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_X86
<a name="l00057"></a>00057         #define REG_loopEnd                     [esp]
<a name="l00058"></a>00058 #elif defined(CRYPTOPP_GENERATE_X64_MASM)
<a name="l00059"></a>00059         #define REG_loopEnd                     rdi
<a name="l00060"></a>00060 #<span class="keywordflow">else</span>
<a name="l00061"></a>00061         #define REG_loopEnd                     r8
<a name="l00062"></a>00062 #endif
<a name="l00063"></a>00063 
<a name="l00064"></a>00064         AS2(    shl             AS_REG_1, 5)
<a name="l00065"></a>00065         ASJ(    jz,             5, f)
<a name="l00066"></a>00066         AS2(    mov             AS_REG_6d, [AS_REG_2+4*17])
<a name="l00067"></a>00067         AS2(    add             AS_REG_1, AS_REG_6)
<a name="l00068"></a>00068 
<a name="l00069"></a>00069         #<span class="keywordflow">if</span> CRYPTOPP_BOOL_X64
<a name="l00070"></a>00070                 AS2(    mov             REG_loopEnd, AS_REG_1)
<a name="l00071"></a>00071         #<span class="keywordflow">else</span>
<a name="l00072"></a>00072                 AS1(    push    ebp)
<a name="l00073"></a>00073                 AS1(    push    AS_REG_1)
<a name="l00074"></a>00074         #endif
<a name="l00075"></a>00075 
<a name="l00076"></a>00076         AS2(    movdqa  xmm0, XMMWORD_PTR [AS_REG_2+0*16])
<a name="l00077"></a>00077         AS2(    movdqa  xmm1, XMMWORD_PTR [AS_REG_2+1*16])
<a name="l00078"></a>00078         AS2(    movdqa  xmm2, XMMWORD_PTR [AS_REG_2+2*16])
<a name="l00079"></a>00079         AS2(    movdqa  xmm3, XMMWORD_PTR [AS_REG_2+3*16])
<a name="l00080"></a>00080         AS2(    mov             eax, dword ptr [AS_REG_2+4*16])
<a name="l00081"></a>00081 
<a name="l00082"></a>00082         ASL(4)
<a name="l00083"></a>00083         <span class="comment">// gamma and pi</span>
<a name="l00084"></a>00084 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE
<a name="l00085"></a>00085         AS2(    test    AS_REG_6, 1)
<a name="l00086"></a>00086         ASJ(    jnz,    6, f)
<a name="l00087"></a>00087 #endif
<a name="l00088"></a>00088         AS2(    movdqa  xmm6, xmm2)
<a name="l00089"></a>00089         AS2(    movss   xmm6, xmm3)
<a name="l00090"></a>00090         ASS(    pshufd  xmm5, xmm6, 0, 3, 2, 1)
<a name="l00091"></a>00091         AS2(    movd    xmm6, eax)
<a name="l00092"></a>00092         AS2(    movdqa  xmm7, xmm3)
<a name="l00093"></a>00093         AS2(    movss   xmm7, xmm6)
<a name="l00094"></a>00094         ASS(    pshufd  xmm6, xmm7, 0, 3, 2, 1)
<a name="l00095"></a>00095 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE
<a name="l00096"></a>00096         ASJ(    jmp,    7, f)
<a name="l00097"></a>00097         ASL(6)
<a name="l00098"></a>00098         AS2(    movdqa  xmm5, xmm3)
<a name="l00099"></a>00099         AS3(    palignr xmm5, xmm2, 4)
<a name="l00100"></a>00100         AS2(    movd    xmm6, eax)
<a name="l00101"></a>00101         AS3(    palignr xmm6, xmm3, 4)
<a name="l00102"></a>00102         ASL(7)
<a name="l00103"></a>00103 #endif
<a name="l00104"></a>00104 
<a name="l00105"></a>00105         AS2(    movd    AS_REG_1d, xmm2)
<a name="l00106"></a>00106         AS1(    not             AS_REG_1d)
<a name="l00107"></a>00107         AS2(    movd    AS_REG_7d, xmm3)
<a name="l00108"></a>00108         AS2(    or              AS_REG_1d, AS_REG_7d)
<a name="l00109"></a>00109         AS2(    xor             eax, AS_REG_1d)
<a name="l00110"></a>00110 
<a name="l00111"></a>00111 #define SSE2_Index(i) ASM_MOD(((i)*13+16), 17)
<a name="l00112"></a>00112 
<a name="l00113"></a>00113 #define pi(i)   \
<a name="l00114"></a>00114         AS2(    movd    AS_REG_1d, xmm7)\
<a name="l00115"></a>00115         AS2(    rol             AS_REG_1d, ASM_MOD((ASM_MOD(5*i,17)*(ASM_MOD(5*i,17)+1)/2), 32))\
<a name="l00116"></a>00116         AS2(    mov             [AS_REG_2+SSE2_Index(ASM_MOD(5*(i), 17))*4], AS_REG_1d)
<a name="l00117"></a>00117 
<a name="l00118"></a>00118 #define pi4(x, y, z, a, b, c, d)        \
<a name="l00119"></a>00119         AS2(    pcmpeqb xmm7, xmm7)\
<a name="l00120"></a>00120         AS2(    pxor    xmm7, x)\
<a name="l00121"></a>00121         AS2(    por             xmm7, y)\
<a name="l00122"></a>00122         AS2(    pxor    xmm7, z)\
<a name="l00123"></a>00123         pi(a)\
<a name="l00124"></a>00124         ASS(    pshuflw xmm7, xmm7, 1, 0, 3, 2)\
<a name="l00125"></a>00125         pi(b)\
<a name="l00126"></a>00126         AS2(    punpckhqdq      xmm7, xmm7)\
<a name="l00127"></a>00127         pi(c)\
<a name="l00128"></a>00128         ASS(    pshuflw xmm7, xmm7, 1, 0, 3, 2)\
<a name="l00129"></a>00129         pi(d)
<a name="l00130"></a>00130 
<a name="l00131"></a>00131         pi4(xmm1, xmm2, xmm3, 1, 5, 9, 13)
<a name="l00132"></a>00132         pi4(xmm0, xmm1, xmm2, 2, 6, 10, 14)
<a name="l00133"></a>00133         pi4(xmm6, xmm0, xmm1, 3, 7, 11, 15)
<a name="l00134"></a>00134         pi4(xmm5, xmm6, xmm0, 4, 8, 12, 16)
<a name="l00135"></a>00135 
<a name="l00136"></a>00136         <span class="comment">// output keystream and update buffer here to hide partial memory stalls between pi and theta</span>
<a name="l00137"></a>00137         AS2(    movdqa  xmm4, xmm3)
<a name="l00138"></a>00138         AS2(    punpcklqdq      xmm3, xmm2)             <span class="comment">// 1 5 2 6</span>
<a name="l00139"></a>00139         AS2(    punpckhdq       xmm4, xmm2)             <span class="comment">// 9 10 13 14</span>
<a name="l00140"></a>00140         AS2(    movdqa  xmm2, xmm1)
<a name="l00141"></a>00141         AS2(    punpcklqdq      xmm1, xmm0)             <span class="comment">// 3 7 4 8</span>
<a name="l00142"></a>00142         AS2(    punpckhdq       xmm2, xmm0)             <span class="comment">// 11 12 15 16</span>
<a name="l00143"></a>00143 
<a name="l00144"></a>00144         <span class="comment">// keystream</span>
<a name="l00145"></a>00145         AS2(    test    AS_REG_3, AS_REG_3)
<a name="l00146"></a>00146         ASJ(    jz,             0, f)
<a name="l00147"></a>00147         AS2(    movdqa  xmm6, xmm4)
<a name="l00148"></a>00148         AS2(    punpcklqdq      xmm4, xmm2)
<a name="l00149"></a>00149         AS2(    punpckhqdq      xmm6, xmm2)
<a name="l00150"></a>00150         AS2(    test    AS_REG_4, 15)
<a name="l00151"></a>00151         ASJ(    jnz,    2, f)
<a name="l00152"></a>00152         AS2(    test    AS_REG_4, AS_REG_4)
<a name="l00153"></a>00153         ASJ(    jz,             1, f)
<a name="l00154"></a>00154         AS2(    pxor    xmm4, [AS_REG_4])
<a name="l00155"></a>00155         AS2(    pxor    xmm6, [AS_REG_4+16])
<a name="l00156"></a>00156         AS2(    add             AS_REG_4, 32)
<a name="l00157"></a>00157         ASJ(    jmp,    1, f)
<a name="l00158"></a>00158         ASL(2)
<a name="l00159"></a>00159         AS2(    movdqu  xmm0, [AS_REG_4])
<a name="l00160"></a>00160         AS2(    movdqu  xmm2, [AS_REG_4+16])
<a name="l00161"></a>00161         AS2(    pxor    xmm4, xmm0)
<a name="l00162"></a>00162         AS2(    pxor    xmm6, xmm2)
<a name="l00163"></a>00163         AS2(    add             AS_REG_4, 32)
<a name="l00164"></a>00164         ASL(1)
<a name="l00165"></a>00165         AS2(    test    AS_REG_3, 15)
<a name="l00166"></a>00166         ASJ(    jnz,    3, f)
<a name="l00167"></a>00167         AS2(    movdqa  XMMWORD_PTR [AS_REG_3], xmm4)
<a name="l00168"></a>00168         AS2(    movdqa  XMMWORD_PTR [AS_REG_3+16], xmm6)
<a name="l00169"></a>00169         AS2(    add             AS_REG_3, 32)
<a name="l00170"></a>00170         ASJ(    jmp,    0, f)
<a name="l00171"></a>00171         ASL(3)
<a name="l00172"></a>00172         AS2(    movdqu  XMMWORD_PTR [AS_REG_3], xmm4)
<a name="l00173"></a>00173         AS2(    movdqu  XMMWORD_PTR [AS_REG_3+16], xmm6)
<a name="l00174"></a>00174         AS2(    add             AS_REG_3, 32)
<a name="l00175"></a>00175         ASL(0)
<a name="l00176"></a>00176 
<a name="l00177"></a>00177         <span class="comment">// buffer update</span>
<a name="l00178"></a>00178         AS2(    lea             AS_REG_1, [AS_REG_6 + 32])
<a name="l00179"></a>00179         AS2(    and             AS_REG_1, 31*32)
<a name="l00180"></a>00180         AS2(    lea             AS_REG_7, [AS_REG_6 + (32-24)*32])
<a name="l00181"></a>00181         AS2(    and             AS_REG_7, 31*32)
<a name="l00182"></a>00182 
<a name="l00183"></a>00183         AS2(    movdqa  xmm0, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+0*8])
<a name="l00184"></a>00184         AS2(    pxor    xmm3, xmm0)
<a name="l00185"></a>00185         ASS(    pshufd  xmm0, xmm0, 2, 3, 0, 1)
<a name="l00186"></a>00186         AS2(    movdqa  XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+0*8], xmm3)
<a name="l00187"></a>00187         AS2(    pxor    xmm0, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+2*8])
<a name="l00188"></a>00188         AS2(    movdqa  XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+2*8], xmm0)
<a name="l00189"></a>00189 
<a name="l00190"></a>00190         AS2(    movdqa  xmm4, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+2*8])
<a name="l00191"></a>00191         AS2(    pxor    xmm1, xmm4)
<a name="l00192"></a>00192         AS2(    movdqa  XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+2*8], xmm1)
<a name="l00193"></a>00193         AS2(    pxor    xmm4, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+0*8])
<a name="l00194"></a>00194         AS2(    movdqa  XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+0*8], xmm4)
<a name="l00195"></a>00195 
<a name="l00196"></a>00196         <span class="comment">// theta</span>
<a name="l00197"></a>00197         AS2(    movdqa  xmm3, XMMWORD_PTR [AS_REG_2+3*16])
<a name="l00198"></a>00198         AS2(    movdqa  xmm2, XMMWORD_PTR [AS_REG_2+2*16])
<a name="l00199"></a>00199         AS2(    movdqa  xmm1, XMMWORD_PTR [AS_REG_2+1*16])
<a name="l00200"></a>00200         AS2(    movdqa  xmm0, XMMWORD_PTR [AS_REG_2+0*16])
<a name="l00201"></a>00201 
<a name="l00202"></a>00202 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE
<a name="l00203"></a>00203         AS2(    test    AS_REG_6, 1)
<a name="l00204"></a>00204         ASJ(    jnz,    8, f)
<a name="l00205"></a>00205 #endif
<a name="l00206"></a>00206         AS2(    movd    xmm6, eax)
<a name="l00207"></a>00207         AS2(    movdqa  xmm7, xmm3)
<a name="l00208"></a>00208         AS2(    movss   xmm7, xmm6)
<a name="l00209"></a>00209         AS2(    movdqa  xmm6, xmm2)
<a name="l00210"></a>00210         AS2(    movss   xmm6, xmm3)
<a name="l00211"></a>00211         AS2(    movdqa  xmm5, xmm1)
<a name="l00212"></a>00212         AS2(    movss   xmm5, xmm2)
<a name="l00213"></a>00213         AS2(    movdqa  xmm4, xmm0)
<a name="l00214"></a>00214         AS2(    movss   xmm4, xmm1)
<a name="l00215"></a>00215         ASS(    pshufd  xmm7, xmm7, 0, 3, 2, 1)
<a name="l00216"></a>00216         ASS(    pshufd  xmm6, xmm6, 0, 3, 2, 1)
<a name="l00217"></a>00217         ASS(    pshufd  xmm5, xmm5, 0, 3, 2, 1)
<a name="l00218"></a>00218         ASS(    pshufd  xmm4, xmm4, 0, 3, 2, 1)
<a name="l00219"></a>00219 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE
<a name="l00220"></a>00220         ASJ(    jmp,    9, f)
<a name="l00221"></a>00221         ASL(8)
<a name="l00222"></a>00222         AS2(    movd    xmm7, eax)
<a name="l00223"></a>00223         AS3(    palignr xmm7, xmm3, 4)
<a name="l00224"></a>00224         AS2(    movq    xmm6, xmm3)
<a name="l00225"></a>00225         AS3(    palignr xmm6, xmm2, 4)
<a name="l00226"></a>00226         AS2(    movq    xmm5, xmm2)
<a name="l00227"></a>00227         AS3(    palignr xmm5, xmm1, 4)
<a name="l00228"></a>00228         AS2(    movq    xmm4, xmm1)
<a name="l00229"></a>00229         AS3(    palignr xmm4, xmm0, 4)
<a name="l00230"></a>00230         ASL(9)
<a name="l00231"></a>00231 #endif
<a name="l00232"></a>00232 
<a name="l00233"></a>00233         AS2(    xor             eax, 1)
<a name="l00234"></a>00234         AS2(    movd    AS_REG_1d, xmm0)
<a name="l00235"></a>00235         AS2(    xor             eax, AS_REG_1d)
<a name="l00236"></a>00236         AS2(    movd    AS_REG_1d, xmm3)
<a name="l00237"></a>00237         AS2(    xor             eax, AS_REG_1d)
<a name="l00238"></a>00238 
<a name="l00239"></a>00239         AS2(    pxor    xmm3, xmm2)
<a name="l00240"></a>00240         AS2(    pxor    xmm2, xmm1)
<a name="l00241"></a>00241         AS2(    pxor    xmm1, xmm0)
<a name="l00242"></a>00242         AS2(    pxor    xmm0, xmm7)
<a name="l00243"></a>00243         AS2(    pxor    xmm3, xmm7)
<a name="l00244"></a>00244         AS2(    pxor    xmm2, xmm6)
<a name="l00245"></a>00245         AS2(    pxor    xmm1, xmm5)
<a name="l00246"></a>00246         AS2(    pxor    xmm0, xmm4)
<a name="l00247"></a>00247 
<a name="l00248"></a>00248         <span class="comment">// sigma</span>
<a name="l00249"></a>00249         AS2(    lea             AS_REG_1, [AS_REG_6 + (32-4)*32])
<a name="l00250"></a>00250         AS2(    and             AS_REG_1, 31*32)
<a name="l00251"></a>00251         AS2(    lea             AS_REG_7, [AS_REG_6 + 16*32])
<a name="l00252"></a>00252         AS2(    and             AS_REG_7, 31*32)
<a name="l00253"></a>00253 
<a name="l00254"></a>00254         AS2(    movdqa  xmm4, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+0*16])
<a name="l00255"></a>00255         AS2(    movdqa  xmm5, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+0*16])
<a name="l00256"></a>00256         AS2(    movdqa  xmm6, xmm4)
<a name="l00257"></a>00257         AS2(    punpcklqdq      xmm4, xmm5)
<a name="l00258"></a>00258         AS2(    punpckhqdq      xmm6, xmm5)
<a name="l00259"></a>00259         AS2(    pxor    xmm3, xmm4)
<a name="l00260"></a>00260         AS2(    pxor    xmm2, xmm6)
<a name="l00261"></a>00261 
<a name="l00262"></a>00262         AS2(    movdqa  xmm4, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+1*16])
<a name="l00263"></a>00263         AS2(    movdqa  xmm5, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+1*16])
<a name="l00264"></a>00264         AS2(    movdqa  xmm6, xmm4)
<a name="l00265"></a>00265         AS2(    punpcklqdq      xmm4, xmm5)
<a name="l00266"></a>00266         AS2(    punpckhqdq      xmm6, xmm5)
<a name="l00267"></a>00267         AS2(    pxor    xmm1, xmm4)
<a name="l00268"></a>00268         AS2(    pxor    xmm0, xmm6)
<a name="l00269"></a>00269 
<a name="l00270"></a>00270         <span class="comment">// loop</span>
<a name="l00271"></a>00271         AS2(    add             AS_REG_6, 32)
<a name="l00272"></a>00272         AS2(    cmp             AS_REG_6, REG_loopEnd)
<a name="l00273"></a>00273         ASJ(    jne,    4, b)
<a name="l00274"></a>00274 
<a name="l00275"></a>00275         <span class="comment">// save state</span>
<a name="l00276"></a>00276         AS2(    mov             [AS_REG_2+4*16], eax)
<a name="l00277"></a>00277         AS2(    movdqa  XMMWORD_PTR [AS_REG_2+3*16], xmm3)
<a name="l00278"></a>00278         AS2(    movdqa  XMMWORD_PTR [AS_REG_2+2*16], xmm2)
<a name="l00279"></a>00279         AS2(    movdqa  XMMWORD_PTR [AS_REG_2+1*16], xmm1)
<a name="l00280"></a>00280         AS2(    movdqa  XMMWORD_PTR [AS_REG_2+0*16], xmm0)
<a name="l00281"></a>00281 
<a name="l00282"></a>00282         #<span class="keywordflow">if</span> CRYPTOPP_BOOL_X86
<a name="l00283"></a>00283                 AS2(    add             esp, 4)
<a name="l00284"></a>00284                 AS1(    pop             ebp)
<a name="l00285"></a>00285         #endif
<a name="l00286"></a>00286         ASL(5)
<a name="l00287"></a>00287 
<a name="l00288"></a>00288 #ifdef CRYPTOPP_GNU_STYLE_INLINE_ASSEMBLY
<a name="l00289"></a>00289                 AS_POP_IF86(    bx)
<a name="l00290"></a>00290                 <span class="stringliteral">&quot;.att_syntax prefix;&quot;</span>
<a name="l00291"></a>00291                         :
<a name="l00292"></a>00292         #<span class="keywordflow">if</span> CRYPTOPP_BOOL_X64
<a name="l00293"></a>00293                         : <span class="stringliteral">&quot;D&quot;</span> (count), <span class="stringliteral">&quot;S&quot;</span> (state), <span class="stringliteral">&quot;d&quot;</span> (z), <span class="stringliteral">&quot;c&quot;</span> (y)
<a name="l00294"></a>00294                         : <span class="stringliteral">&quot;%r8&quot;</span>, <span class="stringliteral">&quot;%r9&quot;</span>, <span class="stringliteral">&quot;r10&quot;</span>, <span class="stringliteral">&quot;%eax&quot;</span>, <span class="stringliteral">&quot;memory&quot;</span>, <span class="stringliteral">&quot;cc&quot;</span>, <span class="stringliteral">&quot;%xmm0&quot;</span>, <span class="stringliteral">&quot;%xmm1&quot;</span>, <span class="stringliteral">&quot;%xmm2&quot;</span>, <span class="stringliteral">&quot;%xmm3&quot;</span>, <span class="stringliteral">&quot;%xmm4&quot;</span>, <span class="stringliteral">&quot;%xmm5&quot;</span>, <span class="stringliteral">&quot;%xmm6&quot;</span>, <span class="stringliteral">&quot;%xmm7&quot;</span>
<a name="l00295"></a>00295         #<span class="keywordflow">else</span>
<a name="l00296"></a>00296                         : <span class="stringliteral">&quot;c&quot;</span> (count), <span class="stringliteral">&quot;d&quot;</span> (state), <span class="stringliteral">&quot;S&quot;</span> (z), <span class="stringliteral">&quot;D&quot;</span> (y)
<a name="l00297"></a>00297                         : <span class="stringliteral">&quot;%eax&quot;</span>, <span class="stringliteral">&quot;memory&quot;</span>, <span class="stringliteral">&quot;cc&quot;</span>
<a name="l00298"></a>00298         #endif
<a name="l00299"></a>00299         );
<a name="l00300"></a>00300 <span class="preprocessor">#endif</span>
<a name="l00301"></a>00301 <span class="preprocessor"></span><span class="preprocessor">#ifdef CRYPTOPP_GENERATE_X64_MASM</span>
<a name="l00302"></a>00302 <span class="preprocessor"></span>        movdqa  xmm6, [rsp + 0h]
<a name="l00303"></a>00303         movdqa  xmm7, [rsp + 10h]
<a name="l00304"></a>00304         add rsp, 2*16
<a name="l00305"></a>00305         pop     rdi
<a name="l00306"></a>00306         ret
<a name="l00307"></a>00307         Panama_SSE2_Pull ENDP
<a name="l00308"></a>00308 <span class="preprocessor">#else</span>
<a name="l00309"></a>00309 <span class="preprocessor"></span>}
<a name="l00310"></a>00310 <span class="preprocessor">#endif</span>
<a name="l00311"></a>00311 <span class="preprocessor"></span><span class="preprocessor">#endif  // #ifdef CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE</span>
<a name="l00312"></a>00312 <span class="preprocessor"></span>
<a name="l00313"></a>00313 <span class="preprocessor">#ifndef CRYPTOPP_GENERATE_X64_MASM</span>
<a name="l00314"></a>00314 <span class="preprocessor"></span>
<a name="l00315"></a>00315 <span class="keyword">template</span> &lt;<span class="keyword">class</span> B&gt;
<a name="l00316"></a>00316 <span class="keywordtype">void</span> <a class="code" href="class_panama.html" title="base class, do not use directly">Panama&lt;B&gt;::Iterate</a>(<span class="keywordtype">size_t</span> count, <span class="keyword">const</span> word32 *p, word32 *z, <span class="keyword">const</span> word32 *y)
<a name="l00317"></a>00317 {
<a name="l00318"></a>00318         word32 bstart = m_state[17];
<a name="l00319"></a>00319         word32 *<span class="keyword">const</span> aPtr = m_state;
<a name="l00320"></a>00320         word32 cPtr[17];
<a name="l00321"></a>00321 
<a name="l00322"></a>00322 <span class="preprocessor">#define bPtr ((byte *)(aPtr+20))</span>
<a name="l00323"></a>00323 <span class="preprocessor"></span>
<a name="l00324"></a>00324 <span class="comment">// reorder the state for SSE2</span>
<a name="l00325"></a>00325 <span class="comment">// a and c: 4 8 12 16 | 3 7 11 15 | 2 6 10 14 | 1 5 9 13 | 0</span>
<a name="l00326"></a>00326 <span class="comment">//                      xmm0            xmm1            xmm2            xmm3            eax</span>
<a name="l00327"></a>00327 <span class="preprocessor">#define a(i) aPtr[((i)*13+16) % 17]             // 13 is inverse of 4 mod 17</span>
<a name="l00328"></a>00328 <span class="preprocessor"></span><span class="preprocessor">#define c(i) cPtr[((i)*13+16) % 17]</span>
<a name="l00329"></a>00329 <span class="preprocessor"></span><span class="comment">// b: 0 4 | 1 5 | 2 6 | 3 7</span>
<a name="l00330"></a>00330 <span class="preprocessor">#define b(i, j) b##i[(j)*2%8 + (j)/4]</span>
<a name="l00331"></a>00331 <span class="preprocessor"></span>
<a name="l00332"></a>00332 <span class="comment">// output</span>
<a name="l00333"></a>00333 <span class="preprocessor">#define OA(i) z[i] = ConditionalByteReverse(B::ToEnum(), a(i+9))</span>
<a name="l00334"></a>00334 <span class="preprocessor"></span><span class="preprocessor">#define OX(i) z[i] = y[i] ^ ConditionalByteReverse(B::ToEnum(), a(i+9))</span>
<a name="l00335"></a>00335 <span class="preprocessor"></span><span class="comment">// buffer update</span>
<a name="l00336"></a>00336 <span class="preprocessor">#define US(i) {word32 t=b(0,i); b(0,i)=ConditionalByteReverse(B::ToEnum(), p[i])^t; b(25,(i+6)%8)^=t;}</span>
<a name="l00337"></a>00337 <span class="preprocessor"></span><span class="preprocessor">#define UL(i) {word32 t=b(0,i); b(0,i)=a(i+1)^t; b(25,(i+6)%8)^=t;}</span>
<a name="l00338"></a>00338 <span class="preprocessor"></span><span class="comment">// gamma and pi</span>
<a name="l00339"></a>00339 <span class="preprocessor">#define GP(i) c(5*i%17) = rotlFixed(a(i) ^ (a((i+1)%17) | ~a((i+2)%17)), ((5*i%17)*((5*i%17)+1)/2)%32)</span>
<a name="l00340"></a>00340 <span class="preprocessor"></span><span class="comment">// theta and sigma</span>
<a name="l00341"></a>00341 <span class="preprocessor">#define T(i,x) a(i) = c(i) ^ c((i+1)%17) ^ c((i+4)%17) ^ x</span>
<a name="l00342"></a>00342 <span class="preprocessor"></span><span class="preprocessor">#define TS1S(i) T(i+1, ConditionalByteReverse(B::ToEnum(), p[i]))</span>
<a name="l00343"></a>00343 <span class="preprocessor"></span><span class="preprocessor">#define TS1L(i) T(i+1, b(4,i))</span>
<a name="l00344"></a>00344 <span class="preprocessor"></span><span class="preprocessor">#define TS2(i) T(i+9, b(16,i))</span>
<a name="l00345"></a>00345 <span class="preprocessor"></span>
<a name="l00346"></a>00346         <span class="keywordflow">while</span> (count--)
<a name="l00347"></a>00347         {
<a name="l00348"></a>00348                 <span class="keywordflow">if</span> (z)
<a name="l00349"></a>00349                 {
<a name="l00350"></a>00350                         <span class="keywordflow">if</span> (y)
<a name="l00351"></a>00351                         {
<a name="l00352"></a>00352                                 OX(0); OX(1); OX(2); OX(3); OX(4); OX(5); OX(6); OX(7);
<a name="l00353"></a>00353                                 y += 8;
<a name="l00354"></a>00354                         }
<a name="l00355"></a>00355                         <span class="keywordflow">else</span>
<a name="l00356"></a>00356                         {
<a name="l00357"></a>00357                                 OA(0); OA(1); OA(2); OA(3); OA(4); OA(5); OA(6); OA(7);
<a name="l00358"></a>00358                         }
<a name="l00359"></a>00359                         z += 8;
<a name="l00360"></a>00360                 }
<a name="l00361"></a>00361 
<a name="l00362"></a>00362                 word32 *<span class="keyword">const</span> b16 = (word32 *)(bPtr+((bstart+16*32) &amp; 31*32));
<a name="l00363"></a>00363                 word32 *<span class="keyword">const</span> b4 = (word32 *)(bPtr+((bstart+(32-4)*32) &amp; 31*32));
<a name="l00364"></a>00364         bstart += 32;
<a name="l00365"></a>00365                 word32 *<span class="keyword">const</span> b0 = (word32 *)(bPtr+((bstart) &amp; 31*32));
<a name="l00366"></a>00366                 word32 *<span class="keyword">const</span> b25 = (word32 *)(bPtr+((bstart+(32-25)*32) &amp; 31*32));
<a name="l00367"></a>00367 
<a name="l00368"></a>00368                 <span class="keywordflow">if</span> (p)
<a name="l00369"></a>00369                 {
<a name="l00370"></a>00370                         US(0); US(1); US(2); US(3); US(4); US(5); US(6); US(7);
<a name="l00371"></a>00371                 }
<a name="l00372"></a>00372                 <span class="keywordflow">else</span>
<a name="l00373"></a>00373                 {
<a name="l00374"></a>00374                         UL(0); UL(1); UL(2); UL(3); UL(4); UL(5); UL(6); UL(7);
<a name="l00375"></a>00375                 }
<a name="l00376"></a>00376 
<a name="l00377"></a>00377                 GP(0); 
<a name="l00378"></a>00378                 GP(1); 
<a name="l00379"></a>00379                 GP(2); 
<a name="l00380"></a>00380                 GP(3); 
<a name="l00381"></a>00381                 GP(4); 
<a name="l00382"></a>00382                 GP(5); 
<a name="l00383"></a>00383                 GP(6); 
<a name="l00384"></a>00384                 GP(7);
<a name="l00385"></a>00385                 GP(8); 
<a name="l00386"></a>00386                 GP(9); 
<a name="l00387"></a>00387                 GP(10); 
<a name="l00388"></a>00388                 GP(11); 
<a name="l00389"></a>00389                 GP(12); 
<a name="l00390"></a>00390                 GP(13); 
<a name="l00391"></a>00391                 GP(14); 
<a name="l00392"></a>00392                 GP(15); 
<a name="l00393"></a>00393                 GP(16);
<a name="l00394"></a>00394 
<a name="l00395"></a>00395                 T(0,1);
<a name="l00396"></a>00396 
<a name="l00397"></a>00397                 <span class="keywordflow">if</span> (p)
<a name="l00398"></a>00398                 {
<a name="l00399"></a>00399                         TS1S(0); TS1S(1); TS1S(2); TS1S(3); TS1S(4); TS1S(5); TS1S(6); TS1S(7);
<a name="l00400"></a>00400                         p += 8;
<a name="l00401"></a>00401                 }
<a name="l00402"></a>00402                 <span class="keywordflow">else</span>
<a name="l00403"></a>00403                 {
<a name="l00404"></a>00404                         TS1L(0); TS1L(1); TS1L(2); TS1L(3); TS1L(4); TS1L(5); TS1L(6); TS1L(7);
<a name="l00405"></a>00405                 }
<a name="l00406"></a>00406 
<a name="l00407"></a>00407                 TS2(0); TS2(1); TS2(2); TS2(3); TS2(4); TS2(5); TS2(6); TS2(7);
<a name="l00408"></a>00408         }
<a name="l00409"></a>00409         m_state[17] = bstart;
<a name="l00410"></a>00410 }
<a name="l00411"></a>00411 
<a name="l00412"></a>00412 <span class="keyword">namespace </span>Weak {
<a name="l00413"></a>00413 <span class="keyword">template</span> &lt;<span class="keyword">class</span> B&gt;
<a name="l00414"></a>00414 <span class="keywordtype">size_t</span> PanamaHash&lt;B&gt;::HashMultipleBlocks(<span class="keyword">const</span> word32 *input, <span class="keywordtype">size_t</span> length)
<a name="l00415"></a>00415 {
<a name="l00416"></a>00416         this-&gt;Iterate(length / this-&gt;BLOCKSIZE, input);
<a name="l00417"></a>00417         <span class="keywordflow">return</span> length % this-&gt;BLOCKSIZE;
<a name="l00418"></a>00418 }
<a name="l00419"></a>00419 
<a name="l00420"></a>00420 <span class="keyword">template</span> &lt;<span class="keyword">class</span> B&gt;
<a name="l00421"></a><a class="code" href="class_weak_1_1_panama_hash.html#af4d1ab27a1cebb1857ba24901b30b3b6">00421</a> <span class="keywordtype">void</span> <a class="code" href="class_weak_1_1_panama_hash.html#af4d1ab27a1cebb1857ba24901b30b3b6" title="truncated version of Final()">PanamaHash&lt;B&gt;::TruncatedFinal</a>(byte *hash, <span class="keywordtype">size_t</span> size)
<a name="l00422"></a>00422 {
<a name="l00423"></a>00423         this-&gt;ThrowIfInvalidTruncatedSize(size);
<a name="l00424"></a>00424 
<a name="l00425"></a>00425         PadLastBlock(this-&gt;BLOCKSIZE, 0x01);
<a name="l00426"></a>00426         
<a name="l00427"></a>00427         HashEndianCorrectedBlock(this-&gt;m_data);
<a name="l00428"></a>00428 
<a name="l00429"></a>00429         this-&gt;Iterate(32);      <span class="comment">// pull</span>
<a name="l00430"></a>00430 
<a name="l00431"></a>00431         <a class="code" href="class_fixed_size_sec_block.html">FixedSizeSecBlock&lt;word32, 8&gt;</a> buf;
<a name="l00432"></a>00432         this-&gt;Iterate(1, NULL, buf, NULL);
<a name="l00433"></a>00433 
<a name="l00434"></a>00434         memcpy(hash, buf, size);
<a name="l00435"></a>00435 
<a name="l00436"></a>00436         this-&gt;Restart();                <span class="comment">// reinit for next use</span>
<a name="l00437"></a>00437 }
<a name="l00438"></a>00438 }
<a name="l00439"></a>00439 
<a name="l00440"></a>00440 <span class="keyword">template</span> &lt;<span class="keyword">class</span> B&gt;
<a name="l00441"></a>00441 <span class="keywordtype">void</span> <a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy&lt;B&gt;::CipherSetKey</a>(<span class="keyword">const</span> <a class="code" href="class_name_value_pairs.html" title="interface for retrieving values given their names">NameValuePairs</a> &amp;params, <span class="keyword">const</span> byte *key, <span class="keywordtype">size_t</span> length)
<a name="l00442"></a>00442 {
<a name="l00443"></a>00443         assert(length==32);
<a name="l00444"></a>00444         memcpy(m_key, key, 32);
<a name="l00445"></a>00445 }
<a name="l00446"></a>00446 
<a name="l00447"></a>00447 <span class="keyword">template</span> &lt;<span class="keyword">class</span> B&gt;
<a name="l00448"></a>00448 <span class="keywordtype">void</span> <a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy&lt;B&gt;::CipherResynchronize</a>(byte *keystreamBuffer, <span class="keyword">const</span> byte *iv, <span class="keywordtype">size_t</span> length)
<a name="l00449"></a>00449 {
<a name="l00450"></a>00450         assert(length==32);
<a name="l00451"></a>00451         this-&gt;Reset();
<a name="l00452"></a>00452         this-&gt;Iterate(1, m_key);
<a name="l00453"></a>00453         <span class="keywordflow">if</span> (iv &amp;&amp; IsAligned&lt;word32&gt;(iv))
<a name="l00454"></a>00454                 this-&gt;Iterate(1, (<span class="keyword">const</span> word32 *)iv);
<a name="l00455"></a>00455         <span class="keywordflow">else</span>
<a name="l00456"></a>00456         {
<a name="l00457"></a>00457                 <a class="code" href="class_fixed_size_sec_block.html">FixedSizeSecBlock&lt;word32, 8&gt;</a> buf;
<a name="l00458"></a>00458                 <span class="keywordflow">if</span> (iv)
<a name="l00459"></a>00459                         memcpy(buf, iv, 32);
<a name="l00460"></a>00460                 <span class="keywordflow">else</span>
<a name="l00461"></a>00461                         memset(buf, 0, 32);
<a name="l00462"></a>00462                 this-&gt;Iterate(1, buf);
<a name="l00463"></a>00463         }
<a name="l00464"></a>00464 
<a name="l00465"></a>00465 <span class="preprocessor">#if CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE || defined(CRYPTOPP_X64_MASM_AVAILABLE)</span>
<a name="l00466"></a>00466 <span class="preprocessor"></span>        <span class="keywordflow">if</span> (B::ToEnum() == LITTLE_ENDIAN_ORDER &amp;&amp; HasSSE2() &amp;&amp; !IsP4())         <span class="comment">// SSE2 code is slower on P4 Prescott</span>
<a name="l00467"></a>00467                 Panama_SSE2_Pull(32, this-&gt;m_state, NULL, NULL);
<a name="l00468"></a>00468         <span class="keywordflow">else</span>
<a name="l00469"></a>00469 <span class="preprocessor">#endif</span>
<a name="l00470"></a>00470 <span class="preprocessor"></span>                this-&gt;Iterate(32);
<a name="l00471"></a>00471 }
<a name="l00472"></a>00472 
<a name="l00473"></a>00473 <span class="preprocessor">#if CRYPTOPP_BOOL_X86 || CRYPTOPP_BOOL_X64</span>
<a name="l00474"></a>00474 <span class="preprocessor"></span><span class="keyword">template</span> &lt;<span class="keyword">class</span> B&gt;
<a name="l00475"></a>00475 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> <a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy&lt;B&gt;::GetAlignment</a>()<span class="keyword"> const</span>
<a name="l00476"></a>00476 <span class="keyword"></span>{
<a name="l00477"></a>00477 <span class="preprocessor">#if CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE || defined(CRYPTOPP_X64_MASM_AVAILABLE)</span>
<a name="l00478"></a>00478 <span class="preprocessor"></span>        <span class="keywordflow">if</span> (B::ToEnum() == LITTLE_ENDIAN_ORDER &amp;&amp; HasSSE2())
<a name="l00479"></a>00479                 <span class="keywordflow">return</span> 16;
<a name="l00480"></a>00480         <span class="keywordflow">else</span>
<a name="l00481"></a>00481 <span class="preprocessor">#endif</span>
<a name="l00482"></a>00482 <span class="preprocessor"></span>                <span class="keywordflow">return</span> 1;
<a name="l00483"></a>00483 }
<a name="l00484"></a>00484 <span class="preprocessor">#endif</span>
<a name="l00485"></a>00485 <span class="preprocessor"></span>
<a name="l00486"></a>00486 <span class="keyword">template</span> &lt;<span class="keyword">class</span> B&gt;
<a name="l00487"></a>00487 <span class="keywordtype">void</span> <a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy&lt;B&gt;::OperateKeystream</a>(KeystreamOperation operation, byte *output, <span class="keyword">const</span> byte *input, <span class="keywordtype">size_t</span> iterationCount)
<a name="l00488"></a>00488 {
<a name="l00489"></a>00489 <span class="preprocessor">#if CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE || defined(CRYPTOPP_X64_MASM_AVAILABLE)</span>
<a name="l00490"></a>00490 <span class="preprocessor"></span>        <span class="keywordflow">if</span> (B::ToEnum() == LITTLE_ENDIAN_ORDER &amp;&amp; HasSSE2())
<a name="l00491"></a>00491                 Panama_SSE2_Pull(iterationCount, this-&gt;m_state, (word32 *)output, (<span class="keyword">const</span> word32 *)input);
<a name="l00492"></a>00492         <span class="keywordflow">else</span>
<a name="l00493"></a>00493 <span class="preprocessor">#endif</span>
<a name="l00494"></a>00494 <span class="preprocessor"></span>                this-&gt;Iterate(iterationCount, NULL, (word32 *)output, (<span class="keyword">const</span> word32 *)input);
<a name="l00495"></a>00495 }
<a name="l00496"></a>00496 
<a name="l00497"></a>00497 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_panama.html" title="base class, do not use directly">Panama&lt;BigEndian&gt;</a>;
<a name="l00498"></a>00498 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_panama.html" title="base class, do not use directly">Panama&lt;LittleEndian&gt;</a>;
<a name="l00499"></a>00499 
<a name="l00500"></a>00500 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_weak_1_1_panama_hash.html" title="Panama Hash">Weak::PanamaHash&lt;BigEndian&gt;</a>;
<a name="l00501"></a>00501 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_weak_1_1_panama_hash.html" title="Panama Hash">Weak::PanamaHash&lt;LittleEndian&gt;</a>;
<a name="l00502"></a>00502 
<a name="l00503"></a>00503 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy&lt;BigEndian&gt;</a>;
<a name="l00504"></a>00504 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy&lt;LittleEndian&gt;</a>;
<a name="l00505"></a>00505 
<a name="l00506"></a>00506 NAMESPACE_END
<a name="l00507"></a>00507 
<a name="l00508"></a>00508 <span class="preprocessor">#endif  // #ifndef CRYPTOPP_GENERATE_X64_MASM</span>
</pre></div></div>
</div>
<hr class="footer"/><address class="footer"><small>Generated on Sun Oct 16 2011 for Crypto++ by&#160;
<a href="http://www.doxygen.org/index.html">
<img class="footer" src="doxygen.png" alt="doxygen"/></a> 1.7.4 </small></address>
</body>
</html>