sha256-armv4.pl 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211
  1. #!/usr/bin/env perl
  2. # ====================================================================
  3. # Written by Andy Polyakov <[email protected]> for the OpenSSL
  4. # project. The module is, however, dual licensed under OpenSSL and
  5. # CRYPTOGAMS licenses depending on where you obtain it. For further
  6. # details see http://www.openssl.org/~appro/cryptogams/.
  7. # ====================================================================
  8. # SHA256 block procedure for ARMv4. May 2007.
  9. # Performance is ~2x better than gcc 3.4 generated code and in "abso-
  10. # lute" terms is ~2250 cycles per 64-byte block or ~35 cycles per
  11. # byte [on single-issue Xscale PXA250 core].
  12. # July 2010.
  13. #
  14. # Rescheduling for dual-issue pipeline resulted in 22% improvement on
  15. # Cortex A8 core and ~20 cycles per processed byte.
  16. # February 2011.
  17. #
  18. # Profiler-assisted and platform-specific optimization resulted in 16%
  19. # improvement on Cortex A8 core and ~17 cycles per processed byte.
  20. while (($output=shift) && ($output!~/^\w[\w\-]*\.\w+$/)) {}
  21. open STDOUT,">$output";
  22. $ctx="r0"; $t0="r0";
  23. $inp="r1"; $t3="r1";
  24. $len="r2"; $t1="r2";
  25. $T1="r3";
  26. $A="r4";
  27. $B="r5";
  28. $C="r6";
  29. $D="r7";
  30. $E="r8";
  31. $F="r9";
  32. $G="r10";
  33. $H="r11";
  34. @V=($A,$B,$C,$D,$E,$F,$G,$H);
  35. $t2="r12";
  36. $Ktbl="r14";
  37. @Sigma0=( 2,13,22);
  38. @Sigma1=( 6,11,25);
  39. @sigma0=( 7,18, 3);
  40. @sigma1=(17,19,10);
  41. sub BODY_00_15 {
  42. my ($i,$a,$b,$c,$d,$e,$f,$g,$h) = @_;
  43. $code.=<<___ if ($i<16);
  44. #if __ARM_ARCH__>=7
  45. ldr $T1,[$inp],#4
  46. #else
  47. ldrb $T1,[$inp,#3] @ $i
  48. ldrb $t2,[$inp,#2]
  49. ldrb $t1,[$inp,#1]
  50. ldrb $t0,[$inp],#4
  51. orr $T1,$T1,$t2,lsl#8
  52. orr $T1,$T1,$t1,lsl#16
  53. orr $T1,$T1,$t0,lsl#24
  54. #endif
  55. ___
  56. $code.=<<___;
  57. mov $t0,$e,ror#$Sigma1[0]
  58. ldr $t2,[$Ktbl],#4 @ *K256++
  59. eor $t0,$t0,$e,ror#$Sigma1[1]
  60. eor $t1,$f,$g
  61. #if $i>=16
  62. add $T1,$T1,$t3 @ from BODY_16_xx
  63. #elif __ARM_ARCH__>=7 && defined(__ARMEL__)
  64. rev $T1,$T1
  65. #endif
  66. #if $i==15
  67. str $inp,[sp,#17*4] @ leave room for $t3
  68. #endif
  69. eor $t0,$t0,$e,ror#$Sigma1[2] @ Sigma1(e)
  70. and $t1,$t1,$e
  71. str $T1,[sp,#`$i%16`*4]
  72. add $T1,$T1,$t0
  73. eor $t1,$t1,$g @ Ch(e,f,g)
  74. add $T1,$T1,$h
  75. mov $h,$a,ror#$Sigma0[0]
  76. add $T1,$T1,$t1
  77. eor $h,$h,$a,ror#$Sigma0[1]
  78. add $T1,$T1,$t2
  79. eor $h,$h,$a,ror#$Sigma0[2] @ Sigma0(a)
  80. #if $i>=15
  81. ldr $t3,[sp,#`($i+2)%16`*4] @ from BODY_16_xx
  82. #endif
  83. orr $t0,$a,$b
  84. and $t1,$a,$b
  85. and $t0,$t0,$c
  86. add $h,$h,$T1
  87. orr $t0,$t0,$t1 @ Maj(a,b,c)
  88. add $d,$d,$T1
  89. add $h,$h,$t0
  90. ___
  91. }
  92. sub BODY_16_XX {
  93. my ($i,$a,$b,$c,$d,$e,$f,$g,$h) = @_;
  94. $code.=<<___;
  95. @ ldr $t3,[sp,#`($i+1)%16`*4] @ $i
  96. ldr $t2,[sp,#`($i+14)%16`*4]
  97. mov $t0,$t3,ror#$sigma0[0]
  98. ldr $T1,[sp,#`($i+0)%16`*4]
  99. eor $t0,$t0,$t3,ror#$sigma0[1]
  100. ldr $t1,[sp,#`($i+9)%16`*4]
  101. eor $t0,$t0,$t3,lsr#$sigma0[2] @ sigma0(X[i+1])
  102. mov $t3,$t2,ror#$sigma1[0]
  103. add $T1,$T1,$t0
  104. eor $t3,$t3,$t2,ror#$sigma1[1]
  105. add $T1,$T1,$t1
  106. eor $t3,$t3,$t2,lsr#$sigma1[2] @ sigma1(X[i+14])
  107. @ add $T1,$T1,$t3
  108. ___
  109. &BODY_00_15(@_);
  110. }
  111. $code=<<___;
  112. #include "arm_arch.h"
  113. .text
  114. .code 32
  115. .type K256,%object
  116. .align 5
  117. K256:
  118. .word 0x428a2f98,0x71374491,0xb5c0fbcf,0xe9b5dba5
  119. .word 0x3956c25b,0x59f111f1,0x923f82a4,0xab1c5ed5
  120. .word 0xd807aa98,0x12835b01,0x243185be,0x550c7dc3
  121. .word 0x72be5d74,0x80deb1fe,0x9bdc06a7,0xc19bf174
  122. .word 0xe49b69c1,0xefbe4786,0x0fc19dc6,0x240ca1cc
  123. .word 0x2de92c6f,0x4a7484aa,0x5cb0a9dc,0x76f988da
  124. .word 0x983e5152,0xa831c66d,0xb00327c8,0xbf597fc7
  125. .word 0xc6e00bf3,0xd5a79147,0x06ca6351,0x14292967
  126. .word 0x27b70a85,0x2e1b2138,0x4d2c6dfc,0x53380d13
  127. .word 0x650a7354,0x766a0abb,0x81c2c92e,0x92722c85
  128. .word 0xa2bfe8a1,0xa81a664b,0xc24b8b70,0xc76c51a3
  129. .word 0xd192e819,0xd6990624,0xf40e3585,0x106aa070
  130. .word 0x19a4c116,0x1e376c08,0x2748774c,0x34b0bcb5
  131. .word 0x391c0cb3,0x4ed8aa4a,0x5b9cca4f,0x682e6ff3
  132. .word 0x748f82ee,0x78a5636f,0x84c87814,0x8cc70208
  133. .word 0x90befffa,0xa4506ceb,0xbef9a3f7,0xc67178f2
  134. .size K256,.-K256
  135. .global sha256_block_data_order
  136. .type sha256_block_data_order,%function
  137. sha256_block_data_order:
  138. sub r3,pc,#8 @ sha256_block_data_order
  139. add $len,$inp,$len,lsl#6 @ len to point at the end of inp
  140. stmdb sp!,{$ctx,$inp,$len,r4-r11,lr}
  141. ldmia $ctx,{$A,$B,$C,$D,$E,$F,$G,$H}
  142. sub $Ktbl,r3,#256 @ K256
  143. sub sp,sp,#16*4 @ alloca(X[16])
  144. .Loop:
  145. ___
  146. for($i=0;$i<16;$i++) { &BODY_00_15($i,@V); unshift(@V,pop(@V)); }
  147. $code.=".Lrounds_16_xx:\n";
  148. for (;$i<32;$i++) { &BODY_16_XX($i,@V); unshift(@V,pop(@V)); }
  149. $code.=<<___;
  150. and $t2,$t2,#0xff
  151. cmp $t2,#0xf2
  152. bne .Lrounds_16_xx
  153. ldr $T1,[sp,#16*4] @ pull ctx
  154. ldr $t0,[$T1,#0]
  155. ldr $t1,[$T1,#4]
  156. ldr $t2,[$T1,#8]
  157. add $A,$A,$t0
  158. ldr $t0,[$T1,#12]
  159. add $B,$B,$t1
  160. ldr $t1,[$T1,#16]
  161. add $C,$C,$t2
  162. ldr $t2,[$T1,#20]
  163. add $D,$D,$t0
  164. ldr $t0,[$T1,#24]
  165. add $E,$E,$t1
  166. ldr $t1,[$T1,#28]
  167. add $F,$F,$t2
  168. ldr $inp,[sp,#17*4] @ pull inp
  169. ldr $t2,[sp,#18*4] @ pull inp+len
  170. add $G,$G,$t0
  171. add $H,$H,$t1
  172. stmia $T1,{$A,$B,$C,$D,$E,$F,$G,$H}
  173. cmp $inp,$t2
  174. sub $Ktbl,$Ktbl,#256 @ rewind Ktbl
  175. bne .Loop
  176. add sp,sp,#`16+3`*4 @ destroy frame
  177. #if __ARM_ARCH__>=5
  178. ldmia sp!,{r4-r11,pc}
  179. #else
  180. ldmia sp!,{r4-r11,lr}
  181. tst lr,#1
  182. moveq pc,lr @ be binary compatible with V4, yet
  183. bx lr @ interoperable with Thumb ISA:-)
  184. #endif
  185. .size sha256_block_data_order,.-sha256_block_data_order
  186. .asciz "SHA256 block transform for ARMv4, CRYPTOGAMS by <appro\@openssl.org>"
  187. .align 2
  188. ___
  189. $code =~ s/\`([^\`]*)\`/eval $1/gem;
  190. $code =~ s/\bbx\s+lr\b/.word\t0xe12fff1e/gm; # make it possible to compile with -march=armv4
  191. print $code;
  192. close STDOUT; # enforce flush