Du kannst nicht mehr als 25 Themen auswählen Themen müssen entweder mit einem Buchstaben oder einer Ziffer beginnen. Sie können Bindestriche („-“) enthalten und bis zu 35 Zeichen lang sein.
 
 
 
 
 
 

335 Zeilen
7.2 KiB

  1. #!/usr/bin/env perl
  2. #
  3. # ====================================================================
  4. # Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
  5. # project. The module is, however, dual licensed under OpenSSL and
  6. # CRYPTOGAMS licenses depending on where you obtain it. For further
  7. # details see http://www.openssl.org/~appro/cryptogams/.
  8. # ====================================================================
  9. #
  10. # SHA1 for ARMv8.
  11. #
  12. # Performance in cycles per processed byte and improvement coefficient
  13. # over code generated with "default" compiler:
  14. #
  15. # hardware-assisted software(*)
  16. # Apple A7 2.31 4.13 (+14%)
  17. # Cortex-A53 2.19 8.73 (+108%)
  18. # Cortex-A57 2.35 7.88 (+74%)
  19. #
  20. # (*) Software results are presented mostly for reference purposes.
  21. $flavour = shift;
  22. open STDOUT,">".shift;
  23. ($ctx,$inp,$num)=("x0","x1","x2");
  24. @Xw=map("w$_",(3..17,19));
  25. @Xx=map("x$_",(3..17,19));
  26. @V=($A,$B,$C,$D,$E)=map("w$_",(20..24));
  27. ($t0,$t1,$t2,$K)=map("w$_",(25..28));
  28. sub BODY_00_19 {
  29. my ($i,$a,$b,$c,$d,$e)=@_;
  30. my $j=($i+2)&15;
  31. $code.=<<___ if ($i<15 && !($i&1));
  32. lsr @Xx[$i+1],@Xx[$i],#32
  33. ___
  34. $code.=<<___ if ($i<14 && !($i&1));
  35. ldr @Xx[$i+2],[$inp,#`($i+2)*4-64`]
  36. ___
  37. $code.=<<___ if ($i<14 && ($i&1));
  38. #ifdef __ARMEB__
  39. ror @Xx[$i+1],@Xx[$i+1],#32
  40. #else
  41. rev32 @Xx[$i+1],@Xx[$i+1]
  42. #endif
  43. ___
  44. $code.=<<___ if ($i<14);
  45. bic $t0,$d,$b
  46. and $t1,$c,$b
  47. ror $t2,$a,#27
  48. add $d,$d,$K // future e+=K
  49. orr $t0,$t0,$t1
  50. add $e,$e,$t2 // e+=rot(a,5)
  51. ror $b,$b,#2
  52. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  53. add $e,$e,$t0 // e+=F(b,c,d)
  54. ___
  55. $code.=<<___ if ($i==19);
  56. movz $K,#0xeba1
  57. movk $K,#0x6ed9,lsl#16
  58. ___
  59. $code.=<<___ if ($i>=14);
  60. eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
  61. bic $t0,$d,$b
  62. and $t1,$c,$b
  63. ror $t2,$a,#27
  64. eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
  65. add $d,$d,$K // future e+=K
  66. orr $t0,$t0,$t1
  67. add $e,$e,$t2 // e+=rot(a,5)
  68. eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
  69. ror $b,$b,#2
  70. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  71. add $e,$e,$t0 // e+=F(b,c,d)
  72. ror @Xw[$j],@Xw[$j],#31
  73. ___
  74. }
  75. sub BODY_40_59 {
  76. my ($i,$a,$b,$c,$d,$e)=@_;
  77. my $j=($i+2)&15;
  78. $code.=<<___ if ($i==59);
  79. movz $K,#0xc1d6
  80. movk $K,#0xca62,lsl#16
  81. ___
  82. $code.=<<___;
  83. orr $t0,$b,$c
  84. and $t1,$b,$c
  85. eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
  86. ror $t2,$a,#27
  87. and $t0,$t0,$d
  88. add $d,$d,$K // future e+=K
  89. eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
  90. add $e,$e,$t2 // e+=rot(a,5)
  91. orr $t0,$t0,$t1
  92. ror $b,$b,#2
  93. eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
  94. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  95. add $e,$e,$t0 // e+=F(b,c,d)
  96. ror @Xw[$j],@Xw[$j],#31
  97. ___
  98. }
  99. sub BODY_20_39 {
  100. my ($i,$a,$b,$c,$d,$e)=@_;
  101. my $j=($i+2)&15;
  102. $code.=<<___ if ($i==39);
  103. movz $K,#0xbcdc
  104. movk $K,#0x8f1b,lsl#16
  105. ___
  106. $code.=<<___ if ($i<78);
  107. eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
  108. eor $t0,$d,$b
  109. ror $t2,$a,#27
  110. add $d,$d,$K // future e+=K
  111. eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
  112. eor $t0,$t0,$c
  113. add $e,$e,$t2 // e+=rot(a,5)
  114. ror $b,$b,#2
  115. eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
  116. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  117. add $e,$e,$t0 // e+=F(b,c,d)
  118. ror @Xw[$j],@Xw[$j],#31
  119. ___
  120. $code.=<<___ if ($i==78);
  121. ldp @Xw[1],@Xw[2],[$ctx]
  122. eor $t0,$d,$b
  123. ror $t2,$a,#27
  124. add $d,$d,$K // future e+=K
  125. eor $t0,$t0,$c
  126. add $e,$e,$t2 // e+=rot(a,5)
  127. ror $b,$b,#2
  128. add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
  129. add $e,$e,$t0 // e+=F(b,c,d)
  130. ___
  131. $code.=<<___ if ($i==79);
  132. ldp @Xw[3],@Xw[4],[$ctx,#8]
  133. eor $t0,$d,$b
  134. ror $t2,$a,#27
  135. eor $t0,$t0,$c
  136. add $e,$e,$t2 // e+=rot(a,5)
  137. ror $b,$b,#2
  138. ldr @Xw[5],[$ctx,#16]
  139. add $e,$e,$t0 // e+=F(b,c,d)
  140. ___
  141. }
  142. $code.=<<___;
  143. #include "arm_arch.h"
  144. .text
  145. .globl sha1_block_data_order
  146. .type sha1_block_data_order,%function
  147. .align 6
  148. sha1_block_data_order:
  149. ldr x16,.LOPENSSL_armcap_P
  150. adr x17,.LOPENSSL_armcap_P
  151. add x16,x16,x17
  152. ldr w16,[x16]
  153. tst w16,#ARMV8_SHA1
  154. b.ne .Lv8_entry
  155. stp x29,x30,[sp,#-96]!
  156. add x29,sp,#0
  157. stp x19,x20,[sp,#16]
  158. stp x21,x22,[sp,#32]
  159. stp x23,x24,[sp,#48]
  160. stp x25,x26,[sp,#64]
  161. stp x27,x28,[sp,#80]
  162. ldp $A,$B,[$ctx]
  163. ldp $C,$D,[$ctx,#8]
  164. ldr $E,[$ctx,#16]
  165. .Loop:
  166. ldr @Xx[0],[$inp],#64
  167. movz $K,#0x7999
  168. sub $num,$num,#1
  169. movk $K,#0x5a82,lsl#16
  170. #ifdef __ARMEB__
  171. ror $Xx[0],@Xx[0],#32
  172. #else
  173. rev32 @Xx[0],@Xx[0]
  174. #endif
  175. add $E,$E,$K // warm it up
  176. add $E,$E,@Xw[0]
  177. ___
  178. for($i=0;$i<20;$i++) { &BODY_00_19($i,@V); unshift(@V,pop(@V)); }
  179. for(;$i<40;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); }
  180. for(;$i<60;$i++) { &BODY_40_59($i,@V); unshift(@V,pop(@V)); }
  181. for(;$i<80;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); }
  182. $code.=<<___;
  183. add $B,$B,@Xw[2]
  184. add $C,$C,@Xw[3]
  185. add $A,$A,@Xw[1]
  186. add $D,$D,@Xw[4]
  187. add $E,$E,@Xw[5]
  188. stp $A,$B,[$ctx]
  189. stp $C,$D,[$ctx,#8]
  190. str $E,[$ctx,#16]
  191. cbnz $num,.Loop
  192. ldp x19,x20,[sp,#16]
  193. ldp x21,x22,[sp,#32]
  194. ldp x23,x24,[sp,#48]
  195. ldp x25,x26,[sp,#64]
  196. ldp x27,x28,[sp,#80]
  197. ldr x29,[sp],#96
  198. ret
  199. .size sha1_block_data_order,.-sha1_block_data_order
  200. ___
  201. {{{
  202. my ($ABCD,$E,$E0,$E1)=map("v$_.16b",(0..3));
  203. my @MSG=map("v$_.16b",(4..7));
  204. my @Kxx=map("v$_.4s",(16..19));
  205. my ($W0,$W1)=("v20.4s","v21.4s");
  206. my $ABCD_SAVE="v22.16b";
  207. $code.=<<___;
  208. .type sha1_block_armv8,%function
  209. .align 6
  210. sha1_block_armv8:
  211. .Lv8_entry:
  212. stp x29,x30,[sp,#-16]!
  213. add x29,sp,#0
  214. adr x4,.Lconst
  215. eor $E,$E,$E
  216. ld1.32 {$ABCD},[$ctx],#16
  217. ld1.32 {$E}[0],[$ctx]
  218. sub $ctx,$ctx,#16
  219. ld1.32 {@Kxx[0]-@Kxx[3]},[x4]
  220. .Loop_hw:
  221. ld1 {@MSG[0]-@MSG[3]},[$inp],#64
  222. sub $num,$num,#1
  223. rev32 @MSG[0],@MSG[0]
  224. rev32 @MSG[1],@MSG[1]
  225. add.i32 $W0,@Kxx[0],@MSG[0]
  226. rev32 @MSG[2],@MSG[2]
  227. orr $ABCD_SAVE,$ABCD,$ABCD // offload
  228. add.i32 $W1,@Kxx[0],@MSG[1]
  229. rev32 @MSG[3],@MSG[3]
  230. sha1h $E1,$ABCD
  231. sha1c $ABCD,$E,$W0 // 0
  232. add.i32 $W0,@Kxx[$j],@MSG[2]
  233. sha1su0 @MSG[0],@MSG[1],@MSG[2]
  234. ___
  235. for ($j=0,$i=1;$i<20-3;$i++) {
  236. my $f=("c","p","m","p")[$i/5];
  237. $code.=<<___;
  238. sha1h $E0,$ABCD // $i
  239. sha1$f $ABCD,$E1,$W1
  240. add.i32 $W1,@Kxx[$j],@MSG[3]
  241. sha1su1 @MSG[0],@MSG[3]
  242. ___
  243. $code.=<<___ if ($i<20-4);
  244. sha1su0 @MSG[1],@MSG[2],@MSG[3]
  245. ___
  246. ($E0,$E1)=($E1,$E0); ($W0,$W1)=($W1,$W0);
  247. push(@MSG,shift(@MSG)); $j++ if ((($i+3)%5)==0);
  248. }
  249. $code.=<<___;
  250. sha1h $E0,$ABCD // $i
  251. sha1p $ABCD,$E1,$W1
  252. add.i32 $W1,@Kxx[$j],@MSG[3]
  253. sha1h $E1,$ABCD // 18
  254. sha1p $ABCD,$E0,$W0
  255. sha1h $E0,$ABCD // 19
  256. sha1p $ABCD,$E1,$W1
  257. add.i32 $E,$E,$E0
  258. add.i32 $ABCD,$ABCD,$ABCD_SAVE
  259. cbnz $num,.Loop_hw
  260. st1.32 {$ABCD},[$ctx],#16
  261. st1.32 {$E}[0],[$ctx]
  262. ldr x29,[sp],#16
  263. ret
  264. .size sha1_block_armv8,.-sha1_block_armv8
  265. .align 6
  266. .Lconst:
  267. .long 0x5a827999,0x5a827999,0x5a827999,0x5a827999 //K_00_19
  268. .long 0x6ed9eba1,0x6ed9eba1,0x6ed9eba1,0x6ed9eba1 //K_20_39
  269. .long 0x8f1bbcdc,0x8f1bbcdc,0x8f1bbcdc,0x8f1bbcdc //K_40_59
  270. .long 0xca62c1d6,0xca62c1d6,0xca62c1d6,0xca62c1d6 //K_60_79
  271. .LOPENSSL_armcap_P:
  272. .quad OPENSSL_armcap_P-.
  273. .asciz "SHA1 block transform for ARMv8, CRYPTOGAMS by <appro\@openssl.org>"
  274. .align 2
  275. .comm OPENSSL_armcap_P,4,4
  276. ___
  277. }}}
  278. { my %opcode = (
  279. "sha1c" => 0x5e000000, "sha1p" => 0x5e001000,
  280. "sha1m" => 0x5e002000, "sha1su0" => 0x5e003000,
  281. "sha1h" => 0x5e280800, "sha1su1" => 0x5e281800 );
  282. sub unsha1 {
  283. my ($mnemonic,$arg)=@_;
  284. $arg =~ m/[qv]([0-9]+)[^,]*,\s*[qv]([0-9]+)[^,]*(?:,\s*[qv]([0-9]+))?/o
  285. &&
  286. sprintf ".inst\t0x%08x\t//%s %s",
  287. $opcode{$mnemonic}|$1|($2<<5)|($3<<16),
  288. $mnemonic,$arg;
  289. }
  290. }
  291. foreach(split("\n",$code)) {
  292. s/\`([^\`]*)\`/eval($1)/geo;
  293. s/\b(sha1\w+)\s+([qv].*)/unsha1($1,$2)/geo;
  294. s/\.\w?32\b//o and s/\.16b/\.4s/go;
  295. m/(ld|st)1[^\[]+\[0\]/o and s/\.4s/\.s/go;
  296. print $_,"\n";
  297. }
  298. close STDOUT;