sha512-armv4.pl 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609
  1. #!/usr/bin/env perl
  2. # ====================================================================
  3. # Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
  4. # project. The module is, however, dual licensed under OpenSSL and
  5. # CRYPTOGAMS licenses depending on where you obtain it. For further
  6. # details see http://www.openssl.org/~appro/cryptogams/.
  7. # ====================================================================
  8. # SHA512 block procedure for ARMv4. September 2007.
  9. # This code is ~4.5 (four and a half) times faster than code generated
  10. # by gcc 3.4 and it spends ~72 clock cycles per byte [on single-issue
  11. # Xscale PXA250 core].
  12. #
  13. # July 2010.
  14. #
  15. # Rescheduling for dual-issue pipeline resulted in 6% improvement on
  16. # Cortex A8 core and ~40 cycles per processed byte.
  17. # February 2011.
  18. #
  19. # Profiler-assisted and platform-specific optimization resulted in 7%
  20. # improvement on Coxtex A8 core and ~38 cycles per byte.
  21. # March 2011.
  22. #
  23. # Add NEON implementation. On Cortex A8 it was measured to process
  24. # one byte in 23.3 cycles or ~60% faster than integer-only code.
  25. # August 2012.
  26. #
  27. # Improve NEON performance by 12% on Snapdragon S4. In absolute
  28. # terms it's 22.6 cycles per byte, which is disappointing result.
  29. # Technical writers asserted that 3-way S4 pipeline can sustain
  30. # multiple NEON instructions per cycle, but dual NEON issue could
  31. # not be observed, and for NEON-only sequences IPC(*) was found to
  32. # be limited by 1:-( 0.33 and 0.66 were measured for sequences with
  33. # ILPs(*) of 1 and 2 respectively. This in turn means that you can
  34. # even find yourself striving, as I did here, for achieving IPC
  35. # adequate to one delivered by Cortex A8 [for reference, it's
  36. # 0.5 for ILP of 1, and 1 for higher ILPs].
  37. #
  38. # (*) ILP, instruction-level parallelism, how many instructions
  39. # *can* execute at the same time. IPC, instructions per cycle,
  40. # indicates how many instructions actually execute.
  41. # Byte order [in]dependence. =========================================
  42. #
  43. # Originally caller was expected to maintain specific *dword* order in
  44. # h[0-7], namely with most significant dword at *lower* address, which
  45. # was reflected in below two parameters as 0 and 4. Now caller is
  46. # expected to maintain native byte order for whole 64-bit values.
  47. $hi="HI";
  48. $lo="LO";
  49. # ====================================================================
  50. while (($output=shift) && ($output!~/^\w[\w\-]*\.\w+$/)) {}
  51. open STDOUT,">$output";
  52. $ctx="r0"; # parameter block
  53. $inp="r1";
  54. $len="r2";
  55. $Tlo="r3";
  56. $Thi="r4";
  57. $Alo="r5";
  58. $Ahi="r6";
  59. $Elo="r7";
  60. $Ehi="r8";
  61. $t0="r9";
  62. $t1="r10";
  63. $t2="r11";
  64. $t3="r12";
  65. ############ r13 is stack pointer
  66. $Ktbl="r14";
  67. ############ r15 is program counter
  68. $Aoff=8*0;
  69. $Boff=8*1;
  70. $Coff=8*2;
  71. $Doff=8*3;
  72. $Eoff=8*4;
  73. $Foff=8*5;
  74. $Goff=8*6;
  75. $Hoff=8*7;
  76. $Xoff=8*8;
  77. sub BODY_00_15() {
  78. my $magic = shift;
  79. $code.=<<___;
  80. @ Sigma1(x) (ROTR((x),14) ^ ROTR((x),18) ^ ROTR((x),41))
  81. @ LO lo>>14^hi<<18 ^ lo>>18^hi<<14 ^ hi>>9^lo<<23
  82. @ HI hi>>14^lo<<18 ^ hi>>18^lo<<14 ^ lo>>9^hi<<23
  83. mov $t0,$Elo,lsr#14
  84. str $Tlo,[sp,#$Xoff+0]
  85. mov $t1,$Ehi,lsr#14
  86. str $Thi,[sp,#$Xoff+4]
  87. eor $t0,$t0,$Ehi,lsl#18
  88. ldr $t2,[sp,#$Hoff+0] @ h.lo
  89. eor $t1,$t1,$Elo,lsl#18
  90. ldr $t3,[sp,#$Hoff+4] @ h.hi
  91. eor $t0,$t0,$Elo,lsr#18
  92. eor $t1,$t1,$Ehi,lsr#18
  93. eor $t0,$t0,$Ehi,lsl#14
  94. eor $t1,$t1,$Elo,lsl#14
  95. eor $t0,$t0,$Ehi,lsr#9
  96. eor $t1,$t1,$Elo,lsr#9
  97. eor $t0,$t0,$Elo,lsl#23
  98. eor $t1,$t1,$Ehi,lsl#23 @ Sigma1(e)
  99. adds $Tlo,$Tlo,$t0
  100. ldr $t0,[sp,#$Foff+0] @ f.lo
  101. adc $Thi,$Thi,$t1 @ T += Sigma1(e)
  102. ldr $t1,[sp,#$Foff+4] @ f.hi
  103. adds $Tlo,$Tlo,$t2
  104. ldr $t2,[sp,#$Goff+0] @ g.lo
  105. adc $Thi,$Thi,$t3 @ T += h
  106. ldr $t3,[sp,#$Goff+4] @ g.hi
  107. eor $t0,$t0,$t2
  108. str $Elo,[sp,#$Eoff+0]
  109. eor $t1,$t1,$t3
  110. str $Ehi,[sp,#$Eoff+4]
  111. and $t0,$t0,$Elo
  112. str $Alo,[sp,#$Aoff+0]
  113. and $t1,$t1,$Ehi
  114. str $Ahi,[sp,#$Aoff+4]
  115. eor $t0,$t0,$t2
  116. ldr $t2,[$Ktbl,#$lo] @ K[i].lo
  117. eor $t1,$t1,$t3 @ Ch(e,f,g)
  118. ldr $t3,[$Ktbl,#$hi] @ K[i].hi
  119. adds $Tlo,$Tlo,$t0
  120. ldr $Elo,[sp,#$Doff+0] @ d.lo
  121. adc $Thi,$Thi,$t1 @ T += Ch(e,f,g)
  122. ldr $Ehi,[sp,#$Doff+4] @ d.hi
  123. adds $Tlo,$Tlo,$t2
  124. and $t0,$t2,#0xff
  125. adc $Thi,$Thi,$t3 @ T += K[i]
  126. adds $Elo,$Elo,$Tlo
  127. ldr $t2,[sp,#$Boff+0] @ b.lo
  128. adc $Ehi,$Ehi,$Thi @ d += T
  129. teq $t0,#$magic
  130. ldr $t3,[sp,#$Coff+0] @ c.lo
  131. orreq $Ktbl,$Ktbl,#1
  132. @ Sigma0(x) (ROTR((x),28) ^ ROTR((x),34) ^ ROTR((x),39))
  133. @ LO lo>>28^hi<<4 ^ hi>>2^lo<<30 ^ hi>>7^lo<<25
  134. @ HI hi>>28^lo<<4 ^ lo>>2^hi<<30 ^ lo>>7^hi<<25
  135. mov $t0,$Alo,lsr#28
  136. mov $t1,$Ahi,lsr#28
  137. eor $t0,$t0,$Ahi,lsl#4
  138. eor $t1,$t1,$Alo,lsl#4
  139. eor $t0,$t0,$Ahi,lsr#2
  140. eor $t1,$t1,$Alo,lsr#2
  141. eor $t0,$t0,$Alo,lsl#30
  142. eor $t1,$t1,$Ahi,lsl#30
  143. eor $t0,$t0,$Ahi,lsr#7
  144. eor $t1,$t1,$Alo,lsr#7
  145. eor $t0,$t0,$Alo,lsl#25
  146. eor $t1,$t1,$Ahi,lsl#25 @ Sigma0(a)
  147. adds $Tlo,$Tlo,$t0
  148. and $t0,$Alo,$t2
  149. adc $Thi,$Thi,$t1 @ T += Sigma0(a)
  150. ldr $t1,[sp,#$Boff+4] @ b.hi
  151. orr $Alo,$Alo,$t2
  152. ldr $t2,[sp,#$Coff+4] @ c.hi
  153. and $Alo,$Alo,$t3
  154. and $t3,$Ahi,$t1
  155. orr $Ahi,$Ahi,$t1
  156. orr $Alo,$Alo,$t0 @ Maj(a,b,c).lo
  157. and $Ahi,$Ahi,$t2
  158. adds $Alo,$Alo,$Tlo
  159. orr $Ahi,$Ahi,$t3 @ Maj(a,b,c).hi
  160. sub sp,sp,#8
  161. adc $Ahi,$Ahi,$Thi @ h += T
  162. tst $Ktbl,#1
  163. add $Ktbl,$Ktbl,#8
  164. ___
  165. }
  166. $code=<<___;
  167. #include "arm_arch.h"
  168. #ifdef __ARMEL__
  169. # define LO 0
  170. # define HI 4
  171. # define WORD64(hi0,lo0,hi1,lo1) .word lo0,hi0, lo1,hi1
  172. #else
  173. # define HI 0
  174. # define LO 4
  175. # define WORD64(hi0,lo0,hi1,lo1) .word hi0,lo0, hi1,lo1
  176. #endif
  177. .text
  178. .code 32
  179. .type K512,%object
  180. .align 5
  181. K512:
  182. WORD64(0x428a2f98,0xd728ae22, 0x71374491,0x23ef65cd)
  183. WORD64(0xb5c0fbcf,0xec4d3b2f, 0xe9b5dba5,0x8189dbbc)
  184. WORD64(0x3956c25b,0xf348b538, 0x59f111f1,0xb605d019)
  185. WORD64(0x923f82a4,0xaf194f9b, 0xab1c5ed5,0xda6d8118)
  186. WORD64(0xd807aa98,0xa3030242, 0x12835b01,0x45706fbe)
  187. WORD64(0x243185be,0x4ee4b28c, 0x550c7dc3,0xd5ffb4e2)
  188. WORD64(0x72be5d74,0xf27b896f, 0x80deb1fe,0x3b1696b1)
  189. WORD64(0x9bdc06a7,0x25c71235, 0xc19bf174,0xcf692694)
  190. WORD64(0xe49b69c1,0x9ef14ad2, 0xefbe4786,0x384f25e3)
  191. WORD64(0x0fc19dc6,0x8b8cd5b5, 0x240ca1cc,0x77ac9c65)
  192. WORD64(0x2de92c6f,0x592b0275, 0x4a7484aa,0x6ea6e483)
  193. WORD64(0x5cb0a9dc,0xbd41fbd4, 0x76f988da,0x831153b5)
  194. WORD64(0x983e5152,0xee66dfab, 0xa831c66d,0x2db43210)
  195. WORD64(0xb00327c8,0x98fb213f, 0xbf597fc7,0xbeef0ee4)
  196. WORD64(0xc6e00bf3,0x3da88fc2, 0xd5a79147,0x930aa725)
  197. WORD64(0x06ca6351,0xe003826f, 0x14292967,0x0a0e6e70)
  198. WORD64(0x27b70a85,0x46d22ffc, 0x2e1b2138,0x5c26c926)
  199. WORD64(0x4d2c6dfc,0x5ac42aed, 0x53380d13,0x9d95b3df)
  200. WORD64(0x650a7354,0x8baf63de, 0x766a0abb,0x3c77b2a8)
  201. WORD64(0x81c2c92e,0x47edaee6, 0x92722c85,0x1482353b)
  202. WORD64(0xa2bfe8a1,0x4cf10364, 0xa81a664b,0xbc423001)
  203. WORD64(0xc24b8b70,0xd0f89791, 0xc76c51a3,0x0654be30)
  204. WORD64(0xd192e819,0xd6ef5218, 0xd6990624,0x5565a910)
  205. WORD64(0xf40e3585,0x5771202a, 0x106aa070,0x32bbd1b8)
  206. WORD64(0x19a4c116,0xb8d2d0c8, 0x1e376c08,0x5141ab53)
  207. WORD64(0x2748774c,0xdf8eeb99, 0x34b0bcb5,0xe19b48a8)
  208. WORD64(0x391c0cb3,0xc5c95a63, 0x4ed8aa4a,0xe3418acb)
  209. WORD64(0x5b9cca4f,0x7763e373, 0x682e6ff3,0xd6b2b8a3)
  210. WORD64(0x748f82ee,0x5defb2fc, 0x78a5636f,0x43172f60)
  211. WORD64(0x84c87814,0xa1f0ab72, 0x8cc70208,0x1a6439ec)
  212. WORD64(0x90befffa,0x23631e28, 0xa4506ceb,0xde82bde9)
  213. WORD64(0xbef9a3f7,0xb2c67915, 0xc67178f2,0xe372532b)
  214. WORD64(0xca273ece,0xea26619c, 0xd186b8c7,0x21c0c207)
  215. WORD64(0xeada7dd6,0xcde0eb1e, 0xf57d4f7f,0xee6ed178)
  216. WORD64(0x06f067aa,0x72176fba, 0x0a637dc5,0xa2c898a6)
  217. WORD64(0x113f9804,0xbef90dae, 0x1b710b35,0x131c471b)
  218. WORD64(0x28db77f5,0x23047d84, 0x32caab7b,0x40c72493)
  219. WORD64(0x3c9ebe0a,0x15c9bebc, 0x431d67c4,0x9c100d4c)
  220. WORD64(0x4cc5d4be,0xcb3e42b6, 0x597f299c,0xfc657e2a)
  221. WORD64(0x5fcb6fab,0x3ad6faec, 0x6c44198c,0x4a475817)
  222. .size K512,.-K512
  223. #if __ARM_MAX_ARCH__>=7
  224. .LOPENSSL_armcap:
  225. .word OPENSSL_armcap_P-sha512_block_data_order
  226. .skip 32-4
  227. #else
  228. .skip 32
  229. #endif
  230. .global sha512_block_data_order
  231. .type sha512_block_data_order,%function
  232. sha512_block_data_order:
  233. sub r3,pc,#8 @ sha512_block_data_order
  234. add $len,$inp,$len,lsl#7 @ len to point at the end of inp
  235. #if __ARM_MAX_ARCH__>=7
  236. ldr r12,.LOPENSSL_armcap
  237. ldr r12,[r3,r12] @ OPENSSL_armcap_P
  238. tst r12,#1
  239. bne .LNEON
  240. #endif
  241. stmdb sp!,{r4-r12,lr}
  242. sub $Ktbl,r3,#672 @ K512
  243. sub sp,sp,#9*8
  244. ldr $Elo,[$ctx,#$Eoff+$lo]
  245. ldr $Ehi,[$ctx,#$Eoff+$hi]
  246. ldr $t0, [$ctx,#$Goff+$lo]
  247. ldr $t1, [$ctx,#$Goff+$hi]
  248. ldr $t2, [$ctx,#$Hoff+$lo]
  249. ldr $t3, [$ctx,#$Hoff+$hi]
  250. .Loop:
  251. str $t0, [sp,#$Goff+0]
  252. str $t1, [sp,#$Goff+4]
  253. str $t2, [sp,#$Hoff+0]
  254. str $t3, [sp,#$Hoff+4]
  255. ldr $Alo,[$ctx,#$Aoff+$lo]
  256. ldr $Ahi,[$ctx,#$Aoff+$hi]
  257. ldr $Tlo,[$ctx,#$Boff+$lo]
  258. ldr $Thi,[$ctx,#$Boff+$hi]
  259. ldr $t0, [$ctx,#$Coff+$lo]
  260. ldr $t1, [$ctx,#$Coff+$hi]
  261. ldr $t2, [$ctx,#$Doff+$lo]
  262. ldr $t3, [$ctx,#$Doff+$hi]
  263. str $Tlo,[sp,#$Boff+0]
  264. str $Thi,[sp,#$Boff+4]
  265. str $t0, [sp,#$Coff+0]
  266. str $t1, [sp,#$Coff+4]
  267. str $t2, [sp,#$Doff+0]
  268. str $t3, [sp,#$Doff+4]
  269. ldr $Tlo,[$ctx,#$Foff+$lo]
  270. ldr $Thi,[$ctx,#$Foff+$hi]
  271. str $Tlo,[sp,#$Foff+0]
  272. str $Thi,[sp,#$Foff+4]
  273. .L00_15:
  274. #if __ARM_ARCH__<7
  275. ldrb $Tlo,[$inp,#7]
  276. ldrb $t0, [$inp,#6]
  277. ldrb $t1, [$inp,#5]
  278. ldrb $t2, [$inp,#4]
  279. ldrb $Thi,[$inp,#3]
  280. ldrb $t3, [$inp,#2]
  281. orr $Tlo,$Tlo,$t0,lsl#8
  282. ldrb $t0, [$inp,#1]
  283. orr $Tlo,$Tlo,$t1,lsl#16
  284. ldrb $t1, [$inp],#8
  285. orr $Tlo,$Tlo,$t2,lsl#24
  286. orr $Thi,$Thi,$t3,lsl#8
  287. orr $Thi,$Thi,$t0,lsl#16
  288. orr $Thi,$Thi,$t1,lsl#24
  289. #else
  290. ldr $Tlo,[$inp,#4]
  291. ldr $Thi,[$inp],#8
  292. #ifdef __ARMEL__
  293. rev $Tlo,$Tlo
  294. rev $Thi,$Thi
  295. #endif
  296. #endif
  297. ___
  298. &BODY_00_15(0x94);
  299. $code.=<<___;
  300. tst $Ktbl,#1
  301. beq .L00_15
  302. ldr $t0,[sp,#`$Xoff+8*(16-1)`+0]
  303. ldr $t1,[sp,#`$Xoff+8*(16-1)`+4]
  304. bic $Ktbl,$Ktbl,#1
  305. .L16_79:
  306. @ sigma0(x) (ROTR((x),1) ^ ROTR((x),8) ^ ((x)>>7))
  307. @ LO lo>>1^hi<<31 ^ lo>>8^hi<<24 ^ lo>>7^hi<<25
  308. @ HI hi>>1^lo<<31 ^ hi>>8^lo<<24 ^ hi>>7
  309. mov $Tlo,$t0,lsr#1
  310. ldr $t2,[sp,#`$Xoff+8*(16-14)`+0]
  311. mov $Thi,$t1,lsr#1
  312. ldr $t3,[sp,#`$Xoff+8*(16-14)`+4]
  313. eor $Tlo,$Tlo,$t1,lsl#31
  314. eor $Thi,$Thi,$t0,lsl#31
  315. eor $Tlo,$Tlo,$t0,lsr#8
  316. eor $Thi,$Thi,$t1,lsr#8
  317. eor $Tlo,$Tlo,$t1,lsl#24
  318. eor $Thi,$Thi,$t0,lsl#24
  319. eor $Tlo,$Tlo,$t0,lsr#7
  320. eor $Thi,$Thi,$t1,lsr#7
  321. eor $Tlo,$Tlo,$t1,lsl#25
  322. @ sigma1(x) (ROTR((x),19) ^ ROTR((x),61) ^ ((x)>>6))
  323. @ LO lo>>19^hi<<13 ^ hi>>29^lo<<3 ^ lo>>6^hi<<26
  324. @ HI hi>>19^lo<<13 ^ lo>>29^hi<<3 ^ hi>>6
  325. mov $t0,$t2,lsr#19
  326. mov $t1,$t3,lsr#19
  327. eor $t0,$t0,$t3,lsl#13
  328. eor $t1,$t1,$t2,lsl#13
  329. eor $t0,$t0,$t3,lsr#29
  330. eor $t1,$t1,$t2,lsr#29
  331. eor $t0,$t0,$t2,lsl#3
  332. eor $t1,$t1,$t3,lsl#3
  333. eor $t0,$t0,$t2,lsr#6
  334. eor $t1,$t1,$t3,lsr#6
  335. ldr $t2,[sp,#`$Xoff+8*(16-9)`+0]
  336. eor $t0,$t0,$t3,lsl#26
  337. ldr $t3,[sp,#`$Xoff+8*(16-9)`+4]
  338. adds $Tlo,$Tlo,$t0
  339. ldr $t0,[sp,#`$Xoff+8*16`+0]
  340. adc $Thi,$Thi,$t1
  341. ldr $t1,[sp,#`$Xoff+8*16`+4]
  342. adds $Tlo,$Tlo,$t2
  343. adc $Thi,$Thi,$t3
  344. adds $Tlo,$Tlo,$t0
  345. adc $Thi,$Thi,$t1
  346. ___
  347. &BODY_00_15(0x17);
  348. $code.=<<___;
  349. ldreq $t0,[sp,#`$Xoff+8*(16-1)`+0]
  350. ldreq $t1,[sp,#`$Xoff+8*(16-1)`+4]
  351. beq .L16_79
  352. bic $Ktbl,$Ktbl,#1
  353. ldr $Tlo,[sp,#$Boff+0]
  354. ldr $Thi,[sp,#$Boff+4]
  355. ldr $t0, [$ctx,#$Aoff+$lo]
  356. ldr $t1, [$ctx,#$Aoff+$hi]
  357. ldr $t2, [$ctx,#$Boff+$lo]
  358. ldr $t3, [$ctx,#$Boff+$hi]
  359. adds $t0,$Alo,$t0
  360. str $t0, [$ctx,#$Aoff+$lo]
  361. adc $t1,$Ahi,$t1
  362. str $t1, [$ctx,#$Aoff+$hi]
  363. adds $t2,$Tlo,$t2
  364. str $t2, [$ctx,#$Boff+$lo]
  365. adc $t3,$Thi,$t3
  366. str $t3, [$ctx,#$Boff+$hi]
  367. ldr $Alo,[sp,#$Coff+0]
  368. ldr $Ahi,[sp,#$Coff+4]
  369. ldr $Tlo,[sp,#$Doff+0]
  370. ldr $Thi,[sp,#$Doff+4]
  371. ldr $t0, [$ctx,#$Coff+$lo]
  372. ldr $t1, [$ctx,#$Coff+$hi]
  373. ldr $t2, [$ctx,#$Doff+$lo]
  374. ldr $t3, [$ctx,#$Doff+$hi]
  375. adds $t0,$Alo,$t0
  376. str $t0, [$ctx,#$Coff+$lo]
  377. adc $t1,$Ahi,$t1
  378. str $t1, [$ctx,#$Coff+$hi]
  379. adds $t2,$Tlo,$t2
  380. str $t2, [$ctx,#$Doff+$lo]
  381. adc $t3,$Thi,$t3
  382. str $t3, [$ctx,#$Doff+$hi]
  383. ldr $Tlo,[sp,#$Foff+0]
  384. ldr $Thi,[sp,#$Foff+4]
  385. ldr $t0, [$ctx,#$Eoff+$lo]
  386. ldr $t1, [$ctx,#$Eoff+$hi]
  387. ldr $t2, [$ctx,#$Foff+$lo]
  388. ldr $t3, [$ctx,#$Foff+$hi]
  389. adds $Elo,$Elo,$t0
  390. str $Elo,[$ctx,#$Eoff+$lo]
  391. adc $Ehi,$Ehi,$t1
  392. str $Ehi,[$ctx,#$Eoff+$hi]
  393. adds $t2,$Tlo,$t2
  394. str $t2, [$ctx,#$Foff+$lo]
  395. adc $t3,$Thi,$t3
  396. str $t3, [$ctx,#$Foff+$hi]
  397. ldr $Alo,[sp,#$Goff+0]
  398. ldr $Ahi,[sp,#$Goff+4]
  399. ldr $Tlo,[sp,#$Hoff+0]
  400. ldr $Thi,[sp,#$Hoff+4]
  401. ldr $t0, [$ctx,#$Goff+$lo]
  402. ldr $t1, [$ctx,#$Goff+$hi]
  403. ldr $t2, [$ctx,#$Hoff+$lo]
  404. ldr $t3, [$ctx,#$Hoff+$hi]
  405. adds $t0,$Alo,$t0
  406. str $t0, [$ctx,#$Goff+$lo]
  407. adc $t1,$Ahi,$t1
  408. str $t1, [$ctx,#$Goff+$hi]
  409. adds $t2,$Tlo,$t2
  410. str $t2, [$ctx,#$Hoff+$lo]
  411. adc $t3,$Thi,$t3
  412. str $t3, [$ctx,#$Hoff+$hi]
  413. add sp,sp,#640
  414. sub $Ktbl,$Ktbl,#640
  415. teq $inp,$len
  416. bne .Loop
  417. add sp,sp,#8*9 @ destroy frame
  418. #if __ARM_ARCH__>=5
  419. ldmia sp!,{r4-r12,pc}
  420. #else
  421. ldmia sp!,{r4-r12,lr}
  422. tst lr,#1
  423. moveq pc,lr @ be binary compatible with V4, yet
  424. bx lr @ interoperable with Thumb ISA:-)
  425. #endif
  426. ___
  427. {
  428. my @Sigma0=(28,34,39);
  429. my @Sigma1=(14,18,41);
  430. my @sigma0=(1, 8, 7);
  431. my @sigma1=(19,61,6);
  432. my $Ktbl="r3";
  433. my $cnt="r12"; # volatile register known as ip, intra-procedure-call scratch
  434. my @X=map("d$_",(0..15));
  435. my @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("d$_",(16..23));
  436. sub NEON_00_15() {
  437. my $i=shift;
  438. my ($a,$b,$c,$d,$e,$f,$g,$h)=@_;
  439. my ($t0,$t1,$t2,$T1,$K,$Ch,$Maj)=map("d$_",(24..31)); # temps
  440. $code.=<<___ if ($i<16 || $i&1);
  441. vshr.u64 $t0,$e,#@Sigma1[0] @ $i
  442. #if $i<16
  443. vld1.64 {@X[$i%16]},[$inp]! @ handles unaligned
  444. #endif
  445. vshr.u64 $t1,$e,#@Sigma1[1]
  446. #if $i>0
  447. vadd.i64 $a,$Maj @ h+=Maj from the past
  448. #endif
  449. vshr.u64 $t2,$e,#@Sigma1[2]
  450. ___
  451. $code.=<<___;
  452. vld1.64 {$K},[$Ktbl,:64]! @ K[i++]
  453. vsli.64 $t0,$e,#`64-@Sigma1[0]`
  454. vsli.64 $t1,$e,#`64-@Sigma1[1]`
  455. vmov $Ch,$e
  456. vsli.64 $t2,$e,#`64-@Sigma1[2]`
  457. #if $i<16 && defined(__ARMEL__)
  458. vrev64.8 @X[$i],@X[$i]
  459. #endif
  460. veor $t1,$t0
  461. vbsl $Ch,$f,$g @ Ch(e,f,g)
  462. vshr.u64 $t0,$a,#@Sigma0[0]
  463. veor $t2,$t1 @ Sigma1(e)
  464. vadd.i64 $T1,$Ch,$h
  465. vshr.u64 $t1,$a,#@Sigma0[1]
  466. vsli.64 $t0,$a,#`64-@Sigma0[0]`
  467. vadd.i64 $T1,$t2
  468. vshr.u64 $t2,$a,#@Sigma0[2]
  469. vadd.i64 $K,@X[$i%16]
  470. vsli.64 $t1,$a,#`64-@Sigma0[1]`
  471. veor $Maj,$a,$b
  472. vsli.64 $t2,$a,#`64-@Sigma0[2]`
  473. veor $h,$t0,$t1
  474. vadd.i64 $T1,$K
  475. vbsl $Maj,$c,$b @ Maj(a,b,c)
  476. veor $h,$t2 @ Sigma0(a)
  477. vadd.i64 $d,$T1
  478. vadd.i64 $Maj,$T1
  479. @ vadd.i64 $h,$Maj
  480. ___
  481. }
  482. sub NEON_16_79() {
  483. my $i=shift;
  484. if ($i&1) { &NEON_00_15($i,@_); return; }
  485. # 2x-vectorized, therefore runs every 2nd round
  486. my @X=map("q$_",(0..7)); # view @X as 128-bit vector
  487. my ($t0,$t1,$s0,$s1) = map("q$_",(12..15)); # temps
  488. my ($d0,$d1,$d2) = map("d$_",(24..26)); # temps from NEON_00_15
  489. my $e=@_[4]; # $e from NEON_00_15
  490. $i /= 2;
  491. $code.=<<___;
  492. vshr.u64 $t0,@X[($i+7)%8],#@sigma1[0]
  493. vshr.u64 $t1,@X[($i+7)%8],#@sigma1[1]
  494. vadd.i64 @_[0],d30 @ h+=Maj from the past
  495. vshr.u64 $s1,@X[($i+7)%8],#@sigma1[2]
  496. vsli.64 $t0,@X[($i+7)%8],#`64-@sigma1[0]`
  497. vext.8 $s0,@X[$i%8],@X[($i+1)%8],#8 @ X[i+1]
  498. vsli.64 $t1,@X[($i+7)%8],#`64-@sigma1[1]`
  499. veor $s1,$t0
  500. vshr.u64 $t0,$s0,#@sigma0[0]
  501. veor $s1,$t1 @ sigma1(X[i+14])
  502. vshr.u64 $t1,$s0,#@sigma0[1]
  503. vadd.i64 @X[$i%8],$s1
  504. vshr.u64 $s1,$s0,#@sigma0[2]
  505. vsli.64 $t0,$s0,#`64-@sigma0[0]`
  506. vsli.64 $t1,$s0,#`64-@sigma0[1]`
  507. vext.8 $s0,@X[($i+4)%8],@X[($i+5)%8],#8 @ X[i+9]
  508. veor $s1,$t0
  509. vshr.u64 $d0,$e,#@Sigma1[0] @ from NEON_00_15
  510. vadd.i64 @X[$i%8],$s0
  511. vshr.u64 $d1,$e,#@Sigma1[1] @ from NEON_00_15
  512. veor $s1,$t1 @ sigma0(X[i+1])
  513. vshr.u64 $d2,$e,#@Sigma1[2] @ from NEON_00_15
  514. vadd.i64 @X[$i%8],$s1
  515. ___
  516. &NEON_00_15(2*$i,@_);
  517. }
  518. $code.=<<___;
  519. #if __ARM_MAX_ARCH__>=7
  520. .arch armv7-a
  521. .fpu neon
  522. .align 4
  523. .LNEON:
  524. dmb @ errata #451034 on early Cortex A8
  525. vstmdb sp!,{d8-d15} @ ABI specification says so
  526. sub $Ktbl,r3,#672 @ K512
  527. vldmia $ctx,{$A-$H} @ load context
  528. .Loop_neon:
  529. ___
  530. for($i=0;$i<16;$i++) { &NEON_00_15($i,@V); unshift(@V,pop(@V)); }
  531. $code.=<<___;
  532. mov $cnt,#4
  533. .L16_79_neon:
  534. subs $cnt,#1
  535. ___
  536. for(;$i<32;$i++) { &NEON_16_79($i,@V); unshift(@V,pop(@V)); }
  537. $code.=<<___;
  538. bne .L16_79_neon
  539. vadd.i64 $A,d30 @ h+=Maj from the past
  540. vldmia $ctx,{d24-d31} @ load context to temp
  541. vadd.i64 q8,q12 @ vectorized accumulate
  542. vadd.i64 q9,q13
  543. vadd.i64 q10,q14
  544. vadd.i64 q11,q15
  545. vstmia $ctx,{$A-$H} @ save context
  546. teq $inp,$len
  547. sub $Ktbl,#640 @ rewind K512
  548. bne .Loop_neon
  549. vldmia sp!,{d8-d15} @ epilogue
  550. ret @ bx lr
  551. #endif
  552. ___
  553. }
  554. $code.=<<___;
  555. .size sha512_block_data_order,.-sha512_block_data_order
  556. .asciz "SHA512 block transform for ARMv4/NEON, CRYPTOGAMS by <appro\@openssl.org>"
  557. .align 2
  558. #if __ARM_MAX_ARCH__>=7
  559. .comm OPENSSL_armcap_P,4,4
  560. #endif
  561. ___
  562. $code =~ s/\`([^\`]*)\`/eval $1/gem;
  563. $code =~ s/\bbx\s+lr\b/.word\t0xe12fff1e/gm; # make it possible to compile with -march=armv4
  564. $code =~ s/\bret\b/bx lr/gm;
  565. print $code;
  566. close STDOUT; # enforce flush