sha1-armv8.pl 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338
  1. #!/usr/bin/env perl
  2. #
  3. # ====================================================================
  4. # Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
  5. # project. The module is, however, dual licensed under OpenSSL and
  6. # CRYPTOGAMS licenses depending on where you obtain it. For further
  7. # details see http://www.openssl.org/~appro/cryptogams/.
  8. # ====================================================================
  9. #
  10. # SHA1 for ARMv8.
  11. #
  12. # Performance in cycles per processed byte and improvement coefficient
  13. # over code generated with "default" compiler:
  14. #
  15. # hardware-assisted software(*)
  16. # Apple A7 2.31 4.13 (+14%)
  17. # Cortex-A53 2.24 8.03 (+97%)
  18. # Cortex-A57 2.35 7.88 (+74%)
  19. # Denver 2.13 3.97 (+0%)(**)
  20. # X-Gene 8.80 (+200%)
  21. #
  22. # (*) Software results are presented mostly for reference purposes.
  23. # (**) Keep in mind that Denver relies on binary translation, which
  24. # optimizes compiler output at run-time.
  25. $flavour = shift;
  26. open STDOUT,">".shift;
  27. ($ctx,$inp,$num)=("x0","x1","x2");
  28. @Xw=map("w$_",(3..17,19));
  29. @Xx=map("x$_",(3..17,19));
  30. @V=($A,$B,$C,$D,$E)=map("w$_",(20..24));
  31. ($t0,$t1,$t2,$K)=map("w$_",(25..28));
  32. sub BODY_00_19 {
  33. my ($i,$a,$b,$c,$d,$e)=@_;
  34. my $j=($i+2)&15;
  35. $code.=<<___ if ($i<15 && !($i&1));
  36. lsr @Xx[$i+1],@Xx[$i],#32
  37. ___
  38. $code.=<<___ if ($i<14 && !($i&1));
  39. ldr @Xx[$i+2],[$inp,#`($i+2)*4-64`]
  40. ___
  41. $code.=<<___ if ($i<14 && ($i&1));
  42. #ifdef __ARMEB__
  43. ror @Xx[$i+1],@Xx[$i+1],#32
  44. #else
  45. rev32 @Xx[$i+1],@Xx[$i+1]
  46. #endif
  47. ___
  48. $code.=<<___ if ($i<14);
  49. bic $t0,$d,$b
  50. and $t1,$c,$b
  51. ror $t2,$a,#27
  52. add $d,$d,$K // future e+=K
  53. orr $t0,$t0,$t1
  54. add $e,$e,$t2 // e+=rot(a,5)
  55. ror $b,$b,#2
  56. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  57. add $e,$e,$t0 // e+=F(b,c,d)
  58. ___
  59. $code.=<<___ if ($i==19);
  60. movz $K,#0xeba1
  61. movk $K,#0x6ed9,lsl#16
  62. ___
  63. $code.=<<___ if ($i>=14);
  64. eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
  65. bic $t0,$d,$b
  66. and $t1,$c,$b
  67. ror $t2,$a,#27
  68. eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
  69. add $d,$d,$K // future e+=K
  70. orr $t0,$t0,$t1
  71. add $e,$e,$t2 // e+=rot(a,5)
  72. eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
  73. ror $b,$b,#2
  74. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  75. add $e,$e,$t0 // e+=F(b,c,d)
  76. ror @Xw[$j],@Xw[$j],#31
  77. ___
  78. }
  79. sub BODY_40_59 {
  80. my ($i,$a,$b,$c,$d,$e)=@_;
  81. my $j=($i+2)&15;
  82. $code.=<<___ if ($i==59);
  83. movz $K,#0xc1d6
  84. movk $K,#0xca62,lsl#16
  85. ___
  86. $code.=<<___;
  87. orr $t0,$b,$c
  88. and $t1,$b,$c
  89. eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
  90. ror $t2,$a,#27
  91. and $t0,$t0,$d
  92. add $d,$d,$K // future e+=K
  93. eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
  94. add $e,$e,$t2 // e+=rot(a,5)
  95. orr $t0,$t0,$t1
  96. ror $b,$b,#2
  97. eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
  98. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  99. add $e,$e,$t0 // e+=F(b,c,d)
  100. ror @Xw[$j],@Xw[$j],#31
  101. ___
  102. }
  103. sub BODY_20_39 {
  104. my ($i,$a,$b,$c,$d,$e)=@_;
  105. my $j=($i+2)&15;
  106. $code.=<<___ if ($i==39);
  107. movz $K,#0xbcdc
  108. movk $K,#0x8f1b,lsl#16
  109. ___
  110. $code.=<<___ if ($i<78);
  111. eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
  112. eor $t0,$d,$b
  113. ror $t2,$a,#27
  114. add $d,$d,$K // future e+=K
  115. eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
  116. eor $t0,$t0,$c
  117. add $e,$e,$t2 // e+=rot(a,5)
  118. ror $b,$b,#2
  119. eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
  120. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  121. add $e,$e,$t0 // e+=F(b,c,d)
  122. ror @Xw[$j],@Xw[$j],#31
  123. ___
  124. $code.=<<___ if ($i==78);
  125. ldp @Xw[1],@Xw[2],[$ctx]
  126. eor $t0,$d,$b
  127. ror $t2,$a,#27
  128. add $d,$d,$K // future e+=K
  129. eor $t0,$t0,$c
  130. add $e,$e,$t2 // e+=rot(a,5)
  131. ror $b,$b,#2
  132. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  133. add $e,$e,$t0 // e+=F(b,c,d)
  134. ___
  135. $code.=<<___ if ($i==79);
  136. ldp @Xw[3],@Xw[4],[$ctx,#8]
  137. eor $t0,$d,$b
  138. ror $t2,$a,#27
  139. eor $t0,$t0,$c
  140. add $e,$e,$t2 // e+=rot(a,5)
  141. ror $b,$b,#2
  142. ldr @Xw[5],[$ctx,#16]
  143. add $e,$e,$t0 // e+=F(b,c,d)
  144. ___
  145. }
  146. $code.=<<___;
  147. #include "arm_arch.h"
  148. .text
  149. .globl sha1_block_data_order
  150. .type sha1_block_data_order,%function
  151. .align 6
  152. sha1_block_data_order:
  153. ldr x16,.LOPENSSL_armcap_P
  154. adr x17,.LOPENSSL_armcap_P
  155. add x16,x16,x17
  156. ldr w16,[x16]
  157. tst w16,#ARMV8_SHA1
  158. b.ne .Lv8_entry
  159. stp x29,x30,[sp,#-96]!
  160. add x29,sp,#0
  161. stp x19,x20,[sp,#16]
  162. stp x21,x22,[sp,#32]
  163. stp x23,x24,[sp,#48]
  164. stp x25,x26,[sp,#64]
  165. stp x27,x28,[sp,#80]
  166. ldp $A,$B,[$ctx]
  167. ldp $C,$D,[$ctx,#8]
  168. ldr $E,[$ctx,#16]
  169. .Loop:
  170. ldr @Xx[0],[$inp],#64
  171. movz $K,#0x7999
  172. sub $num,$num,#1
  173. movk $K,#0x5a82,lsl#16
  174. #ifdef __ARMEB__
  175. ror $Xx[0],@Xx[0],#32
  176. #else
  177. rev32 @Xx[0],@Xx[0]
  178. #endif
  179. add $E,$E,$K // warm it up
  180. add $E,$E,@Xw[0]
  181. ___
  182. for($i=0;$i<20;$i++) { &BODY_00_19($i,@V); unshift(@V,pop(@V)); }
  183. for(;$i<40;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); }
  184. for(;$i<60;$i++) { &BODY_40_59($i,@V); unshift(@V,pop(@V)); }
  185. for(;$i<80;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); }
  186. $code.=<<___;
  187. add $B,$B,@Xw[2]
  188. add $C,$C,@Xw[3]
  189. add $A,$A,@Xw[1]
  190. add $D,$D,@Xw[4]
  191. add $E,$E,@Xw[5]
  192. stp $A,$B,[$ctx]
  193. stp $C,$D,[$ctx,#8]
  194. str $E,[$ctx,#16]
  195. cbnz $num,.Loop
  196. ldp x19,x20,[sp,#16]
  197. ldp x21,x22,[sp,#32]
  198. ldp x23,x24,[sp,#48]
  199. ldp x25,x26,[sp,#64]
  200. ldp x27,x28,[sp,#80]
  201. ldr x29,[sp],#96
  202. ret
  203. .size sha1_block_data_order,.-sha1_block_data_order
  204. ___
  205. {{{
  206. my ($ABCD,$E,$E0,$E1)=map("v$_.16b",(0..3));
  207. my @MSG=map("v$_.16b",(4..7));
  208. my @Kxx=map("v$_.4s",(16..19));
  209. my ($W0,$W1)=("v20.4s","v21.4s");
  210. my $ABCD_SAVE="v22.16b";
  211. $code.=<<___;
  212. .type sha1_block_armv8,%function
  213. .align 6
  214. sha1_block_armv8:
  215. .Lv8_entry:
  216. stp x29,x30,[sp,#-16]!
  217. add x29,sp,#0
  218. adr x4,.Lconst
  219. eor $E,$E,$E
  220. ld1.32 {$ABCD},[$ctx],#16
  221. ld1.32 {$E}[0],[$ctx]
  222. sub $ctx,$ctx,#16
  223. ld1.32 {@Kxx[0]-@Kxx[3]},[x4]
  224. .Loop_hw:
  225. ld1 {@MSG[0]-@MSG[3]},[$inp],#64
  226. sub $num,$num,#1
  227. rev32 @MSG[0],@MSG[0]
  228. rev32 @MSG[1],@MSG[1]
  229. add.i32 $W0,@Kxx[0],@MSG[0]
  230. rev32 @MSG[2],@MSG[2]
  231. orr $ABCD_SAVE,$ABCD,$ABCD // offload
  232. add.i32 $W1,@Kxx[0],@MSG[1]
  233. rev32 @MSG[3],@MSG[3]
  234. sha1h $E1,$ABCD
  235. sha1c $ABCD,$E,$W0 // 0
  236. add.i32 $W0,@Kxx[$j],@MSG[2]
  237. sha1su0 @MSG[0],@MSG[1],@MSG[2]
  238. ___
  239. for ($j=0,$i=1;$i<20-3;$i++) {
  240. my $f=("c","p","m","p")[$i/5];
  241. $code.=<<___;
  242. sha1h $E0,$ABCD // $i
  243. sha1$f $ABCD,$E1,$W1
  244. add.i32 $W1,@Kxx[$j],@MSG[3]
  245. sha1su1 @MSG[0],@MSG[3]
  246. ___
  247. $code.=<<___ if ($i<20-4);
  248. sha1su0 @MSG[1],@MSG[2],@MSG[3]
  249. ___
  250. ($E0,$E1)=($E1,$E0); ($W0,$W1)=($W1,$W0);
  251. push(@MSG,shift(@MSG)); $j++ if ((($i+3)%5)==0);
  252. }
  253. $code.=<<___;
  254. sha1h $E0,$ABCD // $i
  255. sha1p $ABCD,$E1,$W1
  256. add.i32 $W1,@Kxx[$j],@MSG[3]
  257. sha1h $E1,$ABCD // 18
  258. sha1p $ABCD,$E0,$W0
  259. sha1h $E0,$ABCD // 19
  260. sha1p $ABCD,$E1,$W1
  261. add.i32 $E,$E,$E0
  262. add.i32 $ABCD,$ABCD,$ABCD_SAVE
  263. cbnz $num,.Loop_hw
  264. st1.32 {$ABCD},[$ctx],#16
  265. st1.32 {$E}[0],[$ctx]
  266. ldr x29,[sp],#16
  267. ret
  268. .size sha1_block_armv8,.-sha1_block_armv8
  269. .align 6
  270. .Lconst:
  271. .long 0x5a827999,0x5a827999,0x5a827999,0x5a827999 //K_00_19
  272. .long 0x6ed9eba1,0x6ed9eba1,0x6ed9eba1,0x6ed9eba1 //K_20_39
  273. .long 0x8f1bbcdc,0x8f1bbcdc,0x8f1bbcdc,0x8f1bbcdc //K_40_59
  274. .long 0xca62c1d6,0xca62c1d6,0xca62c1d6,0xca62c1d6 //K_60_79
  275. .LOPENSSL_armcap_P:
  276. .quad OPENSSL_armcap_P-.
  277. .asciz "SHA1 block transform for ARMv8, CRYPTOGAMS by <appro\@openssl.org>"
  278. .align 2
  279. .comm OPENSSL_armcap_P,4,4
  280. ___
  281. }}}
  282. { my %opcode = (
  283. "sha1c" => 0x5e000000, "sha1p" => 0x5e001000,
  284. "sha1m" => 0x5e002000, "sha1su0" => 0x5e003000,
  285. "sha1h" => 0x5e280800, "sha1su1" => 0x5e281800 );
  286. sub unsha1 {
  287. my ($mnemonic,$arg)=@_;
  288. $arg =~ m/[qv]([0-9]+)[^,]*,\s*[qv]([0-9]+)[^,]*(?:,\s*[qv]([0-9]+))?/o
  289. &&
  290. sprintf ".inst\t0x%08x\t//%s %s",
  291. $opcode{$mnemonic}|$1|($2<<5)|($3<<16),
  292. $mnemonic,$arg;
  293. }
  294. }
  295. foreach(split("\n",$code)) {
  296. s/\`([^\`]*)\`/eval($1)/geo;
  297. s/\b(sha1\w+)\s+([qv].*)/unsha1($1,$2)/geo;
  298. s/\.\w?32\b//o and s/\.16b/\.4s/go;
  299. m/(ld|st)1[^\[]+\[0\]/o and s/\.4s/\.s/go;
  300. print $_,"\n";
  301. }
  302. close STDOUT;