2 # Copyright 2014-2016 The OpenSSL Project Authors. All Rights Reserved.
4 # Licensed under the Apache License 2.0 (the "License"). You may not use
5 # this file except in compliance with the License. You can obtain a copy
6 # in the file LICENSE in the source distribution or at
7 # https://www.openssl.org/source/license.html
10 # ====================================================================
11 # Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
12 # project. The module is, however, dual licensed under OpenSSL and
13 # CRYPTOGAMS licenses depending on where you obtain it. For further
14 # details see http://www.openssl.org/~appro/cryptogams/.
15 # ====================================================================
19 # Performance in cycles per processed byte and improvement coefficient
20 # over code generated with "default" compiler:
22 # hardware-assisted software(*)
23 # Apple A7 2.31 4.13 (+14%)
24 # Cortex-A53 2.24 8.03 (+97%)
25 # Cortex-A57 2.35 7.88 (+74%)
26 # Denver 2.13 3.97 (+0%)(**)
28 # Mongoose 2.05 6.50 (+160%)
29 # Kryo 1.88 8.00 (+90%)
31 # (*) Software results are presented mostly for reference purposes.
32 # (**) Keep in mind that Denver relies on binary translation, which
33 # optimizes compiler output at run-time.
38 $0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
39 ( $xlate="${dir}arm-xlate.pl" and -f $xlate ) or
40 ( $xlate="${dir}../../perlasm/arm-xlate.pl" and -f $xlate) or
41 die "can't locate arm-xlate.pl";
43 open OUT,"| \"$^X\" $xlate $flavour $output";
46 ($ctx,$inp,$num)=("x0","x1","x2");
47 @Xw=map("w$_",(3..17,19));
48 @Xx=map("x$_",(3..17,19));
49 @V=($A,$B,$C,$D,$E)=map("w$_",(20..24));
50 ($t0,$t1,$t2,$K)=map("w$_",(25..28));
54 my ($i,$a,$b,$c,$d,$e)=@_;
57 $code.=<<___ if ($i<15 && !($i&1));
58 lsr @Xx[$i+1],@Xx[$i],#32
60 $code.=<<___ if ($i<14 && !($i&1));
61 ldur @Xx[$i+2],[$inp,#`($i+2)*4-64`]
63 $code.=<<___ if ($i<14 && ($i&1));
65 ror @Xx[$i+1],@Xx[$i+1],#32
67 rev32 @Xx[$i+1],@Xx[$i+1]
70 $code.=<<___ if ($i<14);
74 add $d,$d,$K // future e+=K
76 add $e,$e,$t2 // e+=rot(a,5)
78 add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
79 add $e,$e,$t0 // e+=F(b,c,d)
81 $code.=<<___ if ($i==19);
83 movk $K,#0x6ed9,lsl#16
85 $code.=<<___ if ($i>=14);
86 eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
90 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
91 add $d,$d,$K // future e+=K
93 add $e,$e,$t2 // e+=rot(a,5)
94 eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
96 add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
97 add $e,$e,$t0 // e+=F(b,c,d)
98 ror @Xw[$j],@Xw[$j],#31
103 my ($i,$a,$b,$c,$d,$e)=@_;
106 $code.=<<___ if ($i==59);
108 movk $K,#0xca62,lsl#16
113 eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
116 add $d,$d,$K // future e+=K
117 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
118 add $e,$e,$t2 // e+=rot(a,5)
121 eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
122 add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
123 add $e,$e,$t0 // e+=F(b,c,d)
124 ror @Xw[$j],@Xw[$j],#31
129 my ($i,$a,$b,$c,$d,$e)=@_;
132 $code.=<<___ if ($i==39);
134 movk $K,#0x8f1b,lsl#16
136 $code.=<<___ if ($i<78);
137 eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
140 add $d,$d,$K // future e+=K
141 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
143 add $e,$e,$t2 // e+=rot(a,5)
145 eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
146 add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
147 add $e,$e,$t0 // e+=F(b,c,d)
148 ror @Xw[$j],@Xw[$j],#31
150 $code.=<<___ if ($i==78);
151 ldp @Xw[1],@Xw[2],[$ctx]
154 add $d,$d,$K // future e+=K
156 add $e,$e,$t2 // e+=rot(a,5)
158 add $d,$d,@Xw[($i+1)&15] // future e+=X[i]
159 add $e,$e,$t0 // e+=F(b,c,d)
161 $code.=<<___ if ($i==79);
162 ldp @Xw[3],@Xw[4],[$ctx,#8]
166 add $e,$e,$t2 // e+=rot(a,5)
168 ldr @Xw[5],[$ctx,#16]
169 add $e,$e,$t0 // e+=F(b,c,d)
175 # include "arm_arch.h"
176 .extern OPENSSL_armcap_P
181 .globl sha1_block_data_order
182 .type sha1_block_data_order,%function
184 sha1_block_data_order:
185 adrp x16,OPENSSL_armcap_P
186 ldr w16,[x16,#:lo12:OPENSSL_armcap_P]
190 stp x29,x30,[sp,#-96]!
203 ldr @Xx[0],[$inp],#64
206 movk $K,#0x5a82,lsl#16
208 ror $Xx[0],@Xx[0],#32
212 add $E,$E,$K // warm it up
215 for($i=0;$i<20;$i++) { &BODY_00_19($i,@V); unshift(@V,pop(@V)); }
216 for(;$i<40;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); }
217 for(;$i<60;$i++) { &BODY_40_59($i,@V); unshift(@V,pop(@V)); }
218 for(;$i<80;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); }
237 .size sha1_block_data_order,.-sha1_block_data_order
240 my ($ABCD,$E,$E0,$E1)=map("v$_.16b",(0..3));
241 my @MSG=map("v$_.16b",(4..7));
242 my @Kxx=map("v$_.4s",(16..19));
243 my ($W0,$W1)=("v20.4s","v21.4s");
244 my $ABCD_SAVE="v22.16b";
247 .type sha1_block_armv8,%function
251 stp x29,x30,[sp,#-16]!
256 ld1.32 {$ABCD},[$ctx],#16
257 ld1.32 {$E}[0],[$ctx]
259 ld1.32 {@Kxx[0]-@Kxx[3]},[x4]
262 ld1 {@MSG[0]-@MSG[3]},[$inp],#64
264 rev32 @MSG[0],@MSG[0]
265 rev32 @MSG[1],@MSG[1]
267 add.i32 $W0,@Kxx[0],@MSG[0]
268 rev32 @MSG[2],@MSG[2]
269 orr $ABCD_SAVE,$ABCD,$ABCD // offload
271 add.i32 $W1,@Kxx[0],@MSG[1]
272 rev32 @MSG[3],@MSG[3]
274 sha1c $ABCD,$E,$W0 // 0
275 add.i32 $W0,@Kxx[$j],@MSG[2]
276 sha1su0 @MSG[0],@MSG[1],@MSG[2]
278 for ($j=0,$i=1;$i<20-3;$i++) {
279 my $f=("c","p","m","p")[$i/5];
281 sha1h $E0,$ABCD // $i
283 add.i32 $W1,@Kxx[$j],@MSG[3]
284 sha1su1 @MSG[0],@MSG[3]
286 $code.=<<___ if ($i<20-4);
287 sha1su0 @MSG[1],@MSG[2],@MSG[3]
289 ($E0,$E1)=($E1,$E0); ($W0,$W1)=($W1,$W0);
290 push(@MSG,shift(@MSG)); $j++ if ((($i+3)%5)==0);
293 sha1h $E0,$ABCD // $i
295 add.i32 $W1,@Kxx[$j],@MSG[3]
297 sha1h $E1,$ABCD // 18
300 sha1h $E0,$ABCD // 19
304 add.i32 $ABCD,$ABCD,$ABCD_SAVE
308 st1.32 {$ABCD},[$ctx],#16
309 st1.32 {$E}[0],[$ctx]
313 .size sha1_block_armv8,.-sha1_block_armv8
316 .long 0x5a827999,0x5a827999,0x5a827999,0x5a827999 //K_00_19
317 .long 0x6ed9eba1,0x6ed9eba1,0x6ed9eba1,0x6ed9eba1 //K_20_39
318 .long 0x8f1bbcdc,0x8f1bbcdc,0x8f1bbcdc,0x8f1bbcdc //K_40_59
319 .long 0xca62c1d6,0xca62c1d6,0xca62c1d6,0xca62c1d6 //K_60_79
320 .asciz "SHA1 block transform for ARMv8, CRYPTOGAMS by <appro\@openssl.org>"
322 #if !defined(__KERNELL__) && !defined(_WIN64)
323 .comm OPENSSL_armcap_P,4,4
329 "sha1c" => 0x5e000000, "sha1p" => 0x5e001000,
330 "sha1m" => 0x5e002000, "sha1su0" => 0x5e003000,
331 "sha1h" => 0x5e280800, "sha1su1" => 0x5e281800 );
334 my ($mnemonic,$arg)=@_;
336 $arg =~ m/[qv]([0-9]+)[^,]*,\s*[qv]([0-9]+)[^,]*(?:,\s*[qv]([0-9]+))?/o
338 sprintf ".inst\t0x%08x\t//%s %s",
339 $opcode{$mnemonic}|$1|($2<<5)|($3<<16),
344 foreach(split("\n",$code)) {
346 s/\`([^\`]*)\`/eval($1)/geo;
348 s/\b(sha1\w+)\s+([qv].*)/unsha1($1,$2)/geo;
350 s/\.\w?32\b//o and s/\.16b/\.4s/go;
351 m/(ld|st)1[^\[]+\[0\]/o and s/\.4s/\.s/go;