sha512-armv4.pl 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598
  1. #!/usr/bin/env perl
  2. # ====================================================================
  3. # Written by Andy Polyakov <appro@fy.chalmers.se> for the OpenSSL
  4. # project. The module is, however, dual licensed under OpenSSL and
  5. # CRYPTOGAMS licenses depending on where you obtain it. For further
  6. # details see http://www.openssl.org/~appro/cryptogams/.
  7. # ====================================================================
  8. # SHA512 block procedure for ARMv4. September 2007.
  9. # This code is ~4.5 (four and a half) times faster than code generated
  10. # by gcc 3.4 and it spends ~72 clock cycles per byte [on single-issue
  11. # Xscale PXA250 core].
  12. #
  13. # July 2010.
  14. #
  15. # Rescheduling for dual-issue pipeline resulted in 6% improvement on
  16. # Cortex A8 core and ~40 cycles per processed byte.
  17. # February 2011.
  18. #
  19. # Profiler-assisted and platform-specific optimization resulted in 7%
  20. # improvement on Coxtex A8 core and ~38 cycles per byte.
  21. # March 2011.
  22. #
  23. # Add NEON implementation. On Cortex A8 it was measured to process
  24. # one byte in 25.5 cycles or 47% faster than integer-only code.
  25. # Byte order [in]dependence. =========================================
  26. #
  27. # Originally caller was expected to maintain specific *dword* order in
  28. # h[0-7], namely with most significant dword at *lower* address, which
  29. # was reflected in below two parameters as 0 and 4. Now caller is
  30. # expected to maintain native byte order for whole 64-bit values.
  31. $hi="HI";
  32. $lo="LO";
  33. # ====================================================================
  34. $flavour = shift;
  35. if ($flavour=~/^\w[\w\-]*\.\w+$/) { $output=$flavour; undef $flavour; }
  36. else { while (($output=shift) && ($output!~/^\w[\w\-]*\.\w+$/)) {} }
  37. if ($flavour && $flavour ne "void") {
  38. $0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
  39. ( $xlate="${dir}arm-xlate.pl" and -f $xlate ) or
  40. ( $xlate="${dir}../../perlasm/arm-xlate.pl" and -f $xlate) or
  41. die "can't locate arm-xlate.pl";
  42. open STDOUT,"| \"$^X\" $xlate $flavour $output";
  43. } else {
  44. open STDOUT,">$output";
  45. }
  46. $ctx="r0"; # parameter block
  47. $inp="r1";
  48. $len="r2";
  49. $Tlo="r3";
  50. $Thi="r4";
  51. $Alo="r5";
  52. $Ahi="r6";
  53. $Elo="r7";
  54. $Ehi="r8";
  55. $t0="r9";
  56. $t1="r10";
  57. $t2="r11";
  58. $t3="r12";
  59. ############ r13 is stack pointer
  60. $Ktbl="r14";
  61. ############ r15 is program counter
  62. $Aoff=8*0;
  63. $Boff=8*1;
  64. $Coff=8*2;
  65. $Doff=8*3;
  66. $Eoff=8*4;
  67. $Foff=8*5;
  68. $Goff=8*6;
  69. $Hoff=8*7;
  70. $Xoff=8*8;
  71. sub BODY_00_15() {
  72. my $magic = shift;
  73. $code.=<<___;
  74. @ Sigma1(x) (ROTR((x),14) ^ ROTR((x),18) ^ ROTR((x),41))
  75. @ LO lo>>14^hi<<18 ^ lo>>18^hi<<14 ^ hi>>9^lo<<23
  76. @ HI hi>>14^lo<<18 ^ hi>>18^lo<<14 ^ lo>>9^hi<<23
  77. mov $t0,$Elo,lsr#14
  78. str $Tlo,[sp,#$Xoff+0]
  79. mov $t1,$Ehi,lsr#14
  80. str $Thi,[sp,#$Xoff+4]
  81. eor $t0,$t0,$Ehi,lsl#18
  82. ldr $t2,[sp,#$Hoff+0] @ h.lo
  83. eor $t1,$t1,$Elo,lsl#18
  84. ldr $t3,[sp,#$Hoff+4] @ h.hi
  85. eor $t0,$t0,$Elo,lsr#18
  86. eor $t1,$t1,$Ehi,lsr#18
  87. eor $t0,$t0,$Ehi,lsl#14
  88. eor $t1,$t1,$Elo,lsl#14
  89. eor $t0,$t0,$Ehi,lsr#9
  90. eor $t1,$t1,$Elo,lsr#9
  91. eor $t0,$t0,$Elo,lsl#23
  92. eor $t1,$t1,$Ehi,lsl#23 @ Sigma1(e)
  93. adds $Tlo,$Tlo,$t0
  94. ldr $t0,[sp,#$Foff+0] @ f.lo
  95. adc $Thi,$Thi,$t1 @ T += Sigma1(e)
  96. ldr $t1,[sp,#$Foff+4] @ f.hi
  97. adds $Tlo,$Tlo,$t2
  98. ldr $t2,[sp,#$Goff+0] @ g.lo
  99. adc $Thi,$Thi,$t3 @ T += h
  100. ldr $t3,[sp,#$Goff+4] @ g.hi
  101. eor $t0,$t0,$t2
  102. str $Elo,[sp,#$Eoff+0]
  103. eor $t1,$t1,$t3
  104. str $Ehi,[sp,#$Eoff+4]
  105. and $t0,$t0,$Elo
  106. str $Alo,[sp,#$Aoff+0]
  107. and $t1,$t1,$Ehi
  108. str $Ahi,[sp,#$Aoff+4]
  109. eor $t0,$t0,$t2
  110. ldr $t2,[$Ktbl,#$lo] @ K[i].lo
  111. eor $t1,$t1,$t3 @ Ch(e,f,g)
  112. ldr $t3,[$Ktbl,#$hi] @ K[i].hi
  113. adds $Tlo,$Tlo,$t0
  114. ldr $Elo,[sp,#$Doff+0] @ d.lo
  115. adc $Thi,$Thi,$t1 @ T += Ch(e,f,g)
  116. ldr $Ehi,[sp,#$Doff+4] @ d.hi
  117. adds $Tlo,$Tlo,$t2
  118. and $t0,$t2,#0xff
  119. adc $Thi,$Thi,$t3 @ T += K[i]
  120. adds $Elo,$Elo,$Tlo
  121. ldr $t2,[sp,#$Boff+0] @ b.lo
  122. adc $Ehi,$Ehi,$Thi @ d += T
  123. teq $t0,#$magic
  124. ldr $t3,[sp,#$Coff+0] @ c.lo
  125. orreq $Ktbl,$Ktbl,#1
  126. @ Sigma0(x) (ROTR((x),28) ^ ROTR((x),34) ^ ROTR((x),39))
  127. @ LO lo>>28^hi<<4 ^ hi>>2^lo<<30 ^ hi>>7^lo<<25
  128. @ HI hi>>28^lo<<4 ^ lo>>2^hi<<30 ^ lo>>7^hi<<25
  129. mov $t0,$Alo,lsr#28
  130. mov $t1,$Ahi,lsr#28
  131. eor $t0,$t0,$Ahi,lsl#4
  132. eor $t1,$t1,$Alo,lsl#4
  133. eor $t0,$t0,$Ahi,lsr#2
  134. eor $t1,$t1,$Alo,lsr#2
  135. eor $t0,$t0,$Alo,lsl#30
  136. eor $t1,$t1,$Ahi,lsl#30
  137. eor $t0,$t0,$Ahi,lsr#7
  138. eor $t1,$t1,$Alo,lsr#7
  139. eor $t0,$t0,$Alo,lsl#25
  140. eor $t1,$t1,$Ahi,lsl#25 @ Sigma0(a)
  141. adds $Tlo,$Tlo,$t0
  142. and $t0,$Alo,$t2
  143. adc $Thi,$Thi,$t1 @ T += Sigma0(a)
  144. ldr $t1,[sp,#$Boff+4] @ b.hi
  145. orr $Alo,$Alo,$t2
  146. ldr $t2,[sp,#$Coff+4] @ c.hi
  147. and $Alo,$Alo,$t3
  148. and $t3,$Ahi,$t1
  149. orr $Ahi,$Ahi,$t1
  150. orr $Alo,$Alo,$t0 @ Maj(a,b,c).lo
  151. and $Ahi,$Ahi,$t2
  152. adds $Alo,$Alo,$Tlo
  153. orr $Ahi,$Ahi,$t3 @ Maj(a,b,c).hi
  154. sub sp,sp,#8
  155. adc $Ahi,$Ahi,$Thi @ h += T
  156. tst $Ktbl,#1
  157. add $Ktbl,$Ktbl,#8
  158. ___
  159. }
  160. $code=<<___;
  161. #include "arm_arch.h"
  162. #ifdef __ARMEL__
  163. # define LO 0
  164. # define HI 4
  165. # define WORD64(hi0,lo0,hi1,lo1) .word lo0,hi0, lo1,hi1
  166. #else
  167. # define HI 0
  168. # define LO 4
  169. # define WORD64(hi0,lo0,hi1,lo1) .word hi0,lo0, hi1,lo1
  170. #endif
  171. .text
  172. .code 32
  173. .type K512,%object
  174. .align 5
  175. K512:
  176. WORD64(0x428a2f98,0xd728ae22, 0x71374491,0x23ef65cd)
  177. WORD64(0xb5c0fbcf,0xec4d3b2f, 0xe9b5dba5,0x8189dbbc)
  178. WORD64(0x3956c25b,0xf348b538, 0x59f111f1,0xb605d019)
  179. WORD64(0x923f82a4,0xaf194f9b, 0xab1c5ed5,0xda6d8118)
  180. WORD64(0xd807aa98,0xa3030242, 0x12835b01,0x45706fbe)
  181. WORD64(0x243185be,0x4ee4b28c, 0x550c7dc3,0xd5ffb4e2)
  182. WORD64(0x72be5d74,0xf27b896f, 0x80deb1fe,0x3b1696b1)
  183. WORD64(0x9bdc06a7,0x25c71235, 0xc19bf174,0xcf692694)
  184. WORD64(0xe49b69c1,0x9ef14ad2, 0xefbe4786,0x384f25e3)
  185. WORD64(0x0fc19dc6,0x8b8cd5b5, 0x240ca1cc,0x77ac9c65)
  186. WORD64(0x2de92c6f,0x592b0275, 0x4a7484aa,0x6ea6e483)
  187. WORD64(0x5cb0a9dc,0xbd41fbd4, 0x76f988da,0x831153b5)
  188. WORD64(0x983e5152,0xee66dfab, 0xa831c66d,0x2db43210)
  189. WORD64(0xb00327c8,0x98fb213f, 0xbf597fc7,0xbeef0ee4)
  190. WORD64(0xc6e00bf3,0x3da88fc2, 0xd5a79147,0x930aa725)
  191. WORD64(0x06ca6351,0xe003826f, 0x14292967,0x0a0e6e70)
  192. WORD64(0x27b70a85,0x46d22ffc, 0x2e1b2138,0x5c26c926)
  193. WORD64(0x4d2c6dfc,0x5ac42aed, 0x53380d13,0x9d95b3df)
  194. WORD64(0x650a7354,0x8baf63de, 0x766a0abb,0x3c77b2a8)
  195. WORD64(0x81c2c92e,0x47edaee6, 0x92722c85,0x1482353b)
  196. WORD64(0xa2bfe8a1,0x4cf10364, 0xa81a664b,0xbc423001)
  197. WORD64(0xc24b8b70,0xd0f89791, 0xc76c51a3,0x0654be30)
  198. WORD64(0xd192e819,0xd6ef5218, 0xd6990624,0x5565a910)
  199. WORD64(0xf40e3585,0x5771202a, 0x106aa070,0x32bbd1b8)
  200. WORD64(0x19a4c116,0xb8d2d0c8, 0x1e376c08,0x5141ab53)
  201. WORD64(0x2748774c,0xdf8eeb99, 0x34b0bcb5,0xe19b48a8)
  202. WORD64(0x391c0cb3,0xc5c95a63, 0x4ed8aa4a,0xe3418acb)
  203. WORD64(0x5b9cca4f,0x7763e373, 0x682e6ff3,0xd6b2b8a3)
  204. WORD64(0x748f82ee,0x5defb2fc, 0x78a5636f,0x43172f60)
  205. WORD64(0x84c87814,0xa1f0ab72, 0x8cc70208,0x1a6439ec)
  206. WORD64(0x90befffa,0x23631e28, 0xa4506ceb,0xde82bde9)
  207. WORD64(0xbef9a3f7,0xb2c67915, 0xc67178f2,0xe372532b)
  208. WORD64(0xca273ece,0xea26619c, 0xd186b8c7,0x21c0c207)
  209. WORD64(0xeada7dd6,0xcde0eb1e, 0xf57d4f7f,0xee6ed178)
  210. WORD64(0x06f067aa,0x72176fba, 0x0a637dc5,0xa2c898a6)
  211. WORD64(0x113f9804,0xbef90dae, 0x1b710b35,0x131c471b)
  212. WORD64(0x28db77f5,0x23047d84, 0x32caab7b,0x40c72493)
  213. WORD64(0x3c9ebe0a,0x15c9bebc, 0x431d67c4,0x9c100d4c)
  214. WORD64(0x4cc5d4be,0xcb3e42b6, 0x597f299c,0xfc657e2a)
  215. WORD64(0x5fcb6fab,0x3ad6faec, 0x6c44198c,0x4a475817)
  216. .size K512,.-K512
  217. .LOPENSSL_armcap:
  218. .word OPENSSL_armcap_P-.Lsha512_block_data_order
  219. .skip 32-4
  220. .global sha512_block_data_order
  221. .type sha512_block_data_order,%function
  222. sha512_block_data_order:
  223. .Lsha512_block_data_order:
  224. sub r3,pc,#8 @ sha512_block_data_order
  225. add $len,$inp,$len,lsl#7 @ len to point at the end of inp
  226. #if __ARM_ARCH__>=7
  227. ldr r12,.LOPENSSL_armcap
  228. ldr r12,[r3,r12] @ OPENSSL_armcap_P
  229. #ifdef __APPLE__
  230. ldr r12,[r12]
  231. #endif
  232. tst r12,#1
  233. bne .LNEON
  234. #endif
  235. stmdb sp!,{r4-r12,lr}
  236. sub $Ktbl,r3,#672 @ K512
  237. sub sp,sp,#9*8
  238. ldr $Elo,[$ctx,#$Eoff+$lo]
  239. ldr $Ehi,[$ctx,#$Eoff+$hi]
  240. ldr $t0, [$ctx,#$Goff+$lo]
  241. ldr $t1, [$ctx,#$Goff+$hi]
  242. ldr $t2, [$ctx,#$Hoff+$lo]
  243. ldr $t3, [$ctx,#$Hoff+$hi]
  244. .Loop:
  245. str $t0, [sp,#$Goff+0]
  246. str $t1, [sp,#$Goff+4]
  247. str $t2, [sp,#$Hoff+0]
  248. str $t3, [sp,#$Hoff+4]
  249. ldr $Alo,[$ctx,#$Aoff+$lo]
  250. ldr $Ahi,[$ctx,#$Aoff+$hi]
  251. ldr $Tlo,[$ctx,#$Boff+$lo]
  252. ldr $Thi,[$ctx,#$Boff+$hi]
  253. ldr $t0, [$ctx,#$Coff+$lo]
  254. ldr $t1, [$ctx,#$Coff+$hi]
  255. ldr $t2, [$ctx,#$Doff+$lo]
  256. ldr $t3, [$ctx,#$Doff+$hi]
  257. str $Tlo,[sp,#$Boff+0]
  258. str $Thi,[sp,#$Boff+4]
  259. str $t0, [sp,#$Coff+0]
  260. str $t1, [sp,#$Coff+4]
  261. str $t2, [sp,#$Doff+0]
  262. str $t3, [sp,#$Doff+4]
  263. ldr $Tlo,[$ctx,#$Foff+$lo]
  264. ldr $Thi,[$ctx,#$Foff+$hi]
  265. str $Tlo,[sp,#$Foff+0]
  266. str $Thi,[sp,#$Foff+4]
  267. .L00_15:
  268. #if __ARM_ARCH__<7
  269. ldrb $Tlo,[$inp,#7]
  270. ldrb $t0, [$inp,#6]
  271. ldrb $t1, [$inp,#5]
  272. ldrb $t2, [$inp,#4]
  273. ldrb $Thi,[$inp,#3]
  274. ldrb $t3, [$inp,#2]
  275. orr $Tlo,$Tlo,$t0,lsl#8
  276. ldrb $t0, [$inp,#1]
  277. orr $Tlo,$Tlo,$t1,lsl#16
  278. ldrb $t1, [$inp],#8
  279. orr $Tlo,$Tlo,$t2,lsl#24
  280. orr $Thi,$Thi,$t3,lsl#8
  281. orr $Thi,$Thi,$t0,lsl#16
  282. orr $Thi,$Thi,$t1,lsl#24
  283. #else
  284. ldr $Tlo,[$inp,#4]
  285. ldr $Thi,[$inp],#8
  286. #ifdef __ARMEL__
  287. rev $Tlo,$Tlo
  288. rev $Thi,$Thi
  289. #endif
  290. #endif
  291. ___
  292. &BODY_00_15(0x94);
  293. $code.=<<___;
  294. tst $Ktbl,#1
  295. beq .L00_15
  296. ldr $t0,[sp,#`$Xoff+8*(16-1)`+0]
  297. ldr $t1,[sp,#`$Xoff+8*(16-1)`+4]
  298. bic $Ktbl,$Ktbl,#1
  299. .L16_79:
  300. @ sigma0(x) (ROTR((x),1) ^ ROTR((x),8) ^ ((x)>>7))
  301. @ LO lo>>1^hi<<31 ^ lo>>8^hi<<24 ^ lo>>7^hi<<25
  302. @ HI hi>>1^lo<<31 ^ hi>>8^lo<<24 ^ hi>>7
  303. mov $Tlo,$t0,lsr#1
  304. ldr $t2,[sp,#`$Xoff+8*(16-14)`+0]
  305. mov $Thi,$t1,lsr#1
  306. ldr $t3,[sp,#`$Xoff+8*(16-14)`+4]
  307. eor $Tlo,$Tlo,$t1,lsl#31
  308. eor $Thi,$Thi,$t0,lsl#31
  309. eor $Tlo,$Tlo,$t0,lsr#8
  310. eor $Thi,$Thi,$t1,lsr#8
  311. eor $Tlo,$Tlo,$t1,lsl#24
  312. eor $Thi,$Thi,$t0,lsl#24
  313. eor $Tlo,$Tlo,$t0,lsr#7
  314. eor $Thi,$Thi,$t1,lsr#7
  315. eor $Tlo,$Tlo,$t1,lsl#25
  316. @ sigma1(x) (ROTR((x),19) ^ ROTR((x),61) ^ ((x)>>6))
  317. @ LO lo>>19^hi<<13 ^ hi>>29^lo<<3 ^ lo>>6^hi<<26
  318. @ HI hi>>19^lo<<13 ^ lo>>29^hi<<3 ^ hi>>6
  319. mov $t0,$t2,lsr#19
  320. mov $t1,$t3,lsr#19
  321. eor $t0,$t0,$t3,lsl#13
  322. eor $t1,$t1,$t2,lsl#13
  323. eor $t0,$t0,$t3,lsr#29
  324. eor $t1,$t1,$t2,lsr#29
  325. eor $t0,$t0,$t2,lsl#3
  326. eor $t1,$t1,$t3,lsl#3
  327. eor $t0,$t0,$t2,lsr#6
  328. eor $t1,$t1,$t3,lsr#6
  329. ldr $t2,[sp,#`$Xoff+8*(16-9)`+0]
  330. eor $t0,$t0,$t3,lsl#26
  331. ldr $t3,[sp,#`$Xoff+8*(16-9)`+4]
  332. adds $Tlo,$Tlo,$t0
  333. ldr $t0,[sp,#`$Xoff+8*16`+0]
  334. adc $Thi,$Thi,$t1
  335. ldr $t1,[sp,#`$Xoff+8*16`+4]
  336. adds $Tlo,$Tlo,$t2
  337. adc $Thi,$Thi,$t3
  338. adds $Tlo,$Tlo,$t0
  339. adc $Thi,$Thi,$t1
  340. ___
  341. &BODY_00_15(0x17);
  342. $code.=<<___;
  343. ldreq $t0,[sp,#`$Xoff+8*(16-1)`+0]
  344. ldreq $t1,[sp,#`$Xoff+8*(16-1)`+4]
  345. beq .L16_79
  346. bic $Ktbl,$Ktbl,#1
  347. ldr $Tlo,[sp,#$Boff+0]
  348. ldr $Thi,[sp,#$Boff+4]
  349. ldr $t0, [$ctx,#$Aoff+$lo]
  350. ldr $t1, [$ctx,#$Aoff+$hi]
  351. ldr $t2, [$ctx,#$Boff+$lo]
  352. ldr $t3, [$ctx,#$Boff+$hi]
  353. adds $t0,$Alo,$t0
  354. str $t0, [$ctx,#$Aoff+$lo]
  355. adc $t1,$Ahi,$t1
  356. str $t1, [$ctx,#$Aoff+$hi]
  357. adds $t2,$Tlo,$t2
  358. str $t2, [$ctx,#$Boff+$lo]
  359. adc $t3,$Thi,$t3
  360. str $t3, [$ctx,#$Boff+$hi]
  361. ldr $Alo,[sp,#$Coff+0]
  362. ldr $Ahi,[sp,#$Coff+4]
  363. ldr $Tlo,[sp,#$Doff+0]
  364. ldr $Thi,[sp,#$Doff+4]
  365. ldr $t0, [$ctx,#$Coff+$lo]
  366. ldr $t1, [$ctx,#$Coff+$hi]
  367. ldr $t2, [$ctx,#$Doff+$lo]
  368. ldr $t3, [$ctx,#$Doff+$hi]
  369. adds $t0,$Alo,$t0
  370. str $t0, [$ctx,#$Coff+$lo]
  371. adc $t1,$Ahi,$t1
  372. str $t1, [$ctx,#$Coff+$hi]
  373. adds $t2,$Tlo,$t2
  374. str $t2, [$ctx,#$Doff+$lo]
  375. adc $t3,$Thi,$t3
  376. str $t3, [$ctx,#$Doff+$hi]
  377. ldr $Tlo,[sp,#$Foff+0]
  378. ldr $Thi,[sp,#$Foff+4]
  379. ldr $t0, [$ctx,#$Eoff+$lo]
  380. ldr $t1, [$ctx,#$Eoff+$hi]
  381. ldr $t2, [$ctx,#$Foff+$lo]
  382. ldr $t3, [$ctx,#$Foff+$hi]
  383. adds $Elo,$Elo,$t0
  384. str $Elo,[$ctx,#$Eoff+$lo]
  385. adc $Ehi,$Ehi,$t1
  386. str $Ehi,[$ctx,#$Eoff+$hi]
  387. adds $t2,$Tlo,$t2
  388. str $t2, [$ctx,#$Foff+$lo]
  389. adc $t3,$Thi,$t3
  390. str $t3, [$ctx,#$Foff+$hi]
  391. ldr $Alo,[sp,#$Goff+0]
  392. ldr $Ahi,[sp,#$Goff+4]
  393. ldr $Tlo,[sp,#$Hoff+0]
  394. ldr $Thi,[sp,#$Hoff+4]
  395. ldr $t0, [$ctx,#$Goff+$lo]
  396. ldr $t1, [$ctx,#$Goff+$hi]
  397. ldr $t2, [$ctx,#$Hoff+$lo]
  398. ldr $t3, [$ctx,#$Hoff+$hi]
  399. adds $t0,$Alo,$t0
  400. str $t0, [$ctx,#$Goff+$lo]
  401. adc $t1,$Ahi,$t1
  402. str $t1, [$ctx,#$Goff+$hi]
  403. adds $t2,$Tlo,$t2
  404. str $t2, [$ctx,#$Hoff+$lo]
  405. adc $t3,$Thi,$t3
  406. str $t3, [$ctx,#$Hoff+$hi]
  407. add sp,sp,#640
  408. sub $Ktbl,$Ktbl,#640
  409. teq $inp,$len
  410. bne .Loop
  411. add sp,sp,#8*9 @ destroy frame
  412. #if __ARM_ARCH__>=5
  413. ldmia sp!,{r4-r12,pc}
  414. #else
  415. ldmia sp!,{r4-r12,lr}
  416. tst lr,#1
  417. moveq pc,lr @ be binary compatible with V4, yet
  418. bx lr @ interoperable with Thumb ISA:-)
  419. #endif
  420. ___
  421. {
  422. my @Sigma0=(28,34,39);
  423. my @Sigma1=(14,18,41);
  424. my @sigma0=(1, 8, 7);
  425. my @sigma1=(19,61,6);
  426. my $Ktbl="r3";
  427. my $cnt="r12"; # volatile register known as ip, intra-procedure-call scratch
  428. my @X=map("d$_",(0..15));
  429. my @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("d$_",(16..23));
  430. sub NEON_00_15() {
  431. my $i=shift;
  432. my ($a,$b,$c,$d,$e,$f,$g,$h)=@_;
  433. my ($t0,$t1,$t2,$T1,$K,$Ch,$Maj)=map("d$_",(24..31)); # temps
  434. $code.=<<___ if ($i<16 || $i&1);
  435. vshr.u64 $t0,$e,#@Sigma1[0] @ $i
  436. #if $i<16
  437. vld1.64 {@X[$i%16]},[$inp]! @ handles unaligned
  438. #endif
  439. vshr.u64 $t1,$e,#@Sigma1[1]
  440. vshr.u64 $t2,$e,#@Sigma1[2]
  441. ___
  442. $code.=<<___;
  443. vld1.64 {$K},[$Ktbl,:64]! @ K[i++]
  444. vsli.64 $t0,$e,#`64-@Sigma1[0]`
  445. vsli.64 $t1,$e,#`64-@Sigma1[1]`
  446. vsli.64 $t2,$e,#`64-@Sigma1[2]`
  447. #if $i<16 && defined(__ARMEL__)
  448. vrev64.8 @X[$i],@X[$i]
  449. #endif
  450. vadd.i64 $T1,$K,$h
  451. veor $Ch,$f,$g
  452. veor $t0,$t1
  453. vand $Ch,$e
  454. veor $t0,$t2 @ Sigma1(e)
  455. veor $Ch,$g @ Ch(e,f,g)
  456. vadd.i64 $T1,$t0
  457. vshr.u64 $t0,$a,#@Sigma0[0]
  458. vadd.i64 $T1,$Ch
  459. vshr.u64 $t1,$a,#@Sigma0[1]
  460. vshr.u64 $t2,$a,#@Sigma0[2]
  461. vsli.64 $t0,$a,#`64-@Sigma0[0]`
  462. vsli.64 $t1,$a,#`64-@Sigma0[1]`
  463. vsli.64 $t2,$a,#`64-@Sigma0[2]`
  464. vadd.i64 $T1,@X[$i%16]
  465. vorr $Maj,$a,$c
  466. vand $Ch,$a,$c
  467. veor $h,$t0,$t1
  468. vand $Maj,$b
  469. veor $h,$t2 @ Sigma0(a)
  470. vorr $Maj,$Ch @ Maj(a,b,c)
  471. vadd.i64 $h,$T1
  472. vadd.i64 $d,$T1
  473. vadd.i64 $h,$Maj
  474. ___
  475. }
  476. sub NEON_16_79() {
  477. my $i=shift;
  478. if ($i&1) { &NEON_00_15($i,@_); return; }
  479. # 2x-vectorized, therefore runs every 2nd round
  480. my @X=map("q$_",(0..7)); # view @X as 128-bit vector
  481. my ($t0,$t1,$s0,$s1) = map("q$_",(12..15)); # temps
  482. my ($d0,$d1,$d2) = map("d$_",(24..26)); # temps from NEON_00_15
  483. my $e=@_[4]; # $e from NEON_00_15
  484. $i /= 2;
  485. $code.=<<___;
  486. vshr.u64 $t0,@X[($i+7)%8],#@sigma1[0]
  487. vshr.u64 $t1,@X[($i+7)%8],#@sigma1[1]
  488. vshr.u64 $s1,@X[($i+7)%8],#@sigma1[2]
  489. vsli.64 $t0,@X[($i+7)%8],#`64-@sigma1[0]`
  490. vext.8 $s0,@X[$i%8],@X[($i+1)%8],#8 @ X[i+1]
  491. vsli.64 $t1,@X[($i+7)%8],#`64-@sigma1[1]`
  492. veor $s1,$t0
  493. vshr.u64 $t0,$s0,#@sigma0[0]
  494. veor $s1,$t1 @ sigma1(X[i+14])
  495. vshr.u64 $t1,$s0,#@sigma0[1]
  496. vadd.i64 @X[$i%8],$s1
  497. vshr.u64 $s1,$s0,#@sigma0[2]
  498. vsli.64 $t0,$s0,#`64-@sigma0[0]`
  499. vsli.64 $t1,$s0,#`64-@sigma0[1]`
  500. vext.8 $s0,@X[($i+4)%8],@X[($i+5)%8],#8 @ X[i+9]
  501. veor $s1,$t0
  502. vshr.u64 $d0,$e,#@Sigma1[0] @ from NEON_00_15
  503. vadd.i64 @X[$i%8],$s0
  504. vshr.u64 $d1,$e,#@Sigma1[1] @ from NEON_00_15
  505. veor $s1,$t1 @ sigma0(X[i+1])
  506. vshr.u64 $d2,$e,#@Sigma1[2] @ from NEON_00_15
  507. vadd.i64 @X[$i%8],$s1
  508. ___
  509. &NEON_00_15(2*$i,@_);
  510. }
  511. $code.=<<___;
  512. #if __ARM_ARCH__>=7
  513. .fpu neon
  514. .align 4
  515. .LNEON:
  516. dmb @ errata #451034 on early Cortex A8
  517. vstmdb sp!,{d8-d15} @ ABI specification says so
  518. sub $Ktbl,r3,#672 @ K512
  519. vldmia $ctx,{$A-$H} @ load context
  520. .Loop_neon:
  521. ___
  522. for($i=0;$i<16;$i++) { &NEON_00_15($i,@V); unshift(@V,pop(@V)); }
  523. $code.=<<___;
  524. mov $cnt,#4
  525. .L16_79_neon:
  526. subs $cnt,#1
  527. ___
  528. for(;$i<32;$i++) { &NEON_16_79($i,@V); unshift(@V,pop(@V)); }
  529. $code.=<<___;
  530. bne .L16_79_neon
  531. vldmia $ctx,{d24-d31} @ load context to temp
  532. vadd.i64 q8,q12 @ vectorized accumulate
  533. vadd.i64 q9,q13
  534. vadd.i64 q10,q14
  535. vadd.i64 q11,q15
  536. vstmia $ctx,{$A-$H} @ save context
  537. teq $inp,$len
  538. sub $Ktbl,#640 @ rewind K512
  539. bne .Loop_neon
  540. vldmia sp!,{d8-d15} @ epilogue
  541. bx lr
  542. #endif
  543. ___
  544. }
  545. $code.=<<___;
  546. .size sha512_block_data_order,.-sha512_block_data_order
  547. .asciz "SHA512 block transform for ARMv4/NEON, CRYPTOGAMS by <appro\@openssl.org>"
  548. .align 2
  549. .comm OPENSSL_armcap_P,4,4
  550. ___
  551. $code =~ s/\`([^\`]*)\`/eval $1/gem;
  552. $code =~ s/\bbx\s+lr\b/.word\t0xe12fff1e/gm; # make it possible to compile with -march=armv4
  553. print $code;
  554. close STDOUT; # enforce flush