#!/usr/bin/env perl # # ==================================================================== # Written by Andy Polyakov <appro@openssl.org> for the OpenSSL # project. The module is, however, dual licensed under OpenSSL and # CRYPTOGAMS licenses depending on where you obtain it. For further # details see http://www.openssl.org/~appro/cryptogams/. # ==================================================================== # # SHA1 for ARMv8. # # Performance in cycles per processed byte and improvement coefficient # over code generated with "default" compiler: # # hardware-assisted software(*) # Apple A7 2.31 4.13 (+14%) # Cortex-A5x n/a n/a # # (*) Software results are presented mostly for reference purposes. $flavour = shift; open STDOUT,">".shift; ($ctx,$inp,$num)=("x0","x1","x2"); @Xw=map("w$_",(3..17,19)); @Xx=map("x$_",(3..17,19)); @V=($A,$B,$C,$D,$E)=map("w$_",(20..24)); ($t0,$t1,$t2,$K)=map("w$_",(25..28)); sub BODY_00_19 { my ($i,$a,$b,$c,$d,$e)=@_; my $j=($i+2)&15; $code.=<<___ if ($i<15 && !($i&1)); lsr @Xx[$i+1],@Xx[$i],#32 ___ $code.=<<___ if ($i<14 && !($i&1)); ldr @Xx[$i+2],[$inp,#`($i+2)*4-64`] ___ $code.=<<___ if ($i<14 && ($i&1)); #ifdef __ARMEB__ ror @Xx[$i+1],@Xx[$i+1],#32 #else rev32 @Xx[$i+1],@Xx[$i+1] #endif ___ $code.=<<___ if ($i<14); bic $t0,$d,$b and $t1,$c,$b ror $t2,$a,#27 add $d,$d,$K // future e+=K orr $t0,$t0,$t1 add $e,$e,$t2 // e+=rot(a,5) ror $b,$b,#2 add $d,$d,@Xw[($i+1)&15] // future e+=X[i] add $e,$e,$t0 // e+=F(b,c,d) ___ $code.=<<___ if ($i==19); movz $K,#0xeba1 movk $K,#0x6ed9,lsl#16 ___ $code.=<<___ if ($i>=14); eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15] bic $t0,$d,$b and $t1,$c,$b ror $t2,$a,#27 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15] add $d,$d,$K // future e+=K orr $t0,$t0,$t1 add $e,$e,$t2 // e+=rot(a,5) eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15] ror $b,$b,#2 add $d,$d,@Xw[($i+1)&15] // future e+=X[i] add $e,$e,$t0 // e+=F(b,c,d) ror @Xw[$j],@Xw[$j],#31 ___ } sub BODY_40_59 { my ($i,$a,$b,$c,$d,$e)=@_; my $j=($i+2)&15; $code.=<<___ if ($i==59); movz $K,#0xc1d6 movk $K,#0xca62,lsl#16 ___ $code.=<<___; orr $t0,$b,$c and $t1,$b,$c eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15] ror $t2,$a,#27 and $t0,$t0,$d add $d,$d,$K // future e+=K eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15] add $e,$e,$t2 // e+=rot(a,5) orr $t0,$t0,$t1 ror $b,$b,#2 eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15] add $d,$d,@Xw[($i+1)&15] // future e+=X[i] add $e,$e,$t0 // e+=F(b,c,d) ror @Xw[$j],@Xw[$j],#31 ___ } sub BODY_20_39 { my ($i,$a,$b,$c,$d,$e)=@_; my $j=($i+2)&15; $code.=<<___ if ($i==39); movz $K,#0xbcdc movk $K,#0x8f1b,lsl#16 ___ $code.=<<___ if ($i<78); eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15] eor $t0,$d,$b ror $t2,$a,#27 add $d,$d,$K // future e+=K eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15] eor $t0,$t0,$c add $e,$e,$t2 // e+=rot(a,5) ror $b,$b,#2 eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15] add $d,$d,@Xw[($i+1)&15] // future e+=X[i] add $e,$e,$t0 // e+=F(b,c,d) ror @Xw[$j],@Xw[$j],#31 ___ $code.=<<___ if ($i==78); ldp @Xw[1],@Xw[2],[$ctx] eor $t0,$d,$b ror $t2,$a,#27 add $d,$d,$K // future e+=K eor $t0,$t0,$c add $e,$e,$t2 // e+=rot(a,5) ror $b,$b,#2 add $d,$d,@Xw[($i+1)&15] // future e+=X[i] add $e,$e,$t0 // e+=F(b,c,d) ___ $code.=<<___ if ($i==79); ldp @Xw[3],@Xw[4],[$ctx,#8] eor $t0,$d,$b ror $t2,$a,#27 eor $t0,$t0,$c add $e,$e,$t2 // e+=rot(a,5) ror $b,$b,#2 ldr @Xw[5],[$ctx,#16] add $e,$e,$t0 // e+=F(b,c,d) ___ } $code.=<<___; #include "arm_arch.h" .text .globl sha1_block_data_order .type sha1_block_data_order,%function .align 6 sha1_block_data_order: ldr x16,.LOPENSSL_armcap_P adr x17,.LOPENSSL_armcap_P add x16,x16,x17 ldr w16,[x16] tst w16,#ARMV8_SHA1 b.ne .Lv8_entry stp x29,x30,[sp,#-96]! add x29,sp,#0 stp x19,x20,[sp,#16] stp x21,x22,[sp,#32] stp x23,x24,[sp,#48] stp x25,x26,[sp,#64] stp x27,x28,[sp,#80] ldp $A,$B,[$ctx] ldp $C,$D,[$ctx,#8] ldr $E,[$ctx,#16] .Loop: ldr @Xx[0],[$inp],#64 movz $K,#0x7999 sub $num,$num,#1 movk $K,#0x5a82,lsl#16 #ifdef __ARMEB__ ror $Xx[0],@Xx[0],#32 #else rev32 @Xx[0],@Xx[0] #endif add $E,$E,$K // warm it up add $E,$E,@Xw[0] ___ for($i=0;$i<20;$i++) { &BODY_00_19($i,@V); unshift(@V,pop(@V)); } for(;$i<40;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); } for(;$i<60;$i++) { &BODY_40_59($i,@V); unshift(@V,pop(@V)); } for(;$i<80;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); } $code.=<<___; add $B,$B,@Xw[2] add $C,$C,@Xw[3] add $A,$A,@Xw[1] add $D,$D,@Xw[4] add $E,$E,@Xw[5] stp $A,$B,[$ctx] stp $C,$D,[$ctx,#8] str $E,[$ctx,#16] cbnz $num,.Loop ldp x19,x20,[sp,#16] ldp x21,x22,[sp,#32] ldp x23,x24,[sp,#48] ldp x25,x26,[sp,#64] ldp x27,x28,[sp,#80] ldr x29,[sp],#96 ret .size sha1_block_data_order,.-sha1_block_data_order ___ {{{ my ($ABCD,$E,$E0,$E1)=map("v$_.16b",(0..3)); my @MSG=map("v$_.16b",(4..7)); my @Kxx=map("v$_.4s",(16..19)); my ($W0,$W1)=("v20.4s","v21.4s"); my $ABCD_SAVE="v22.16b"; $code.=<<___; .type sha1_block_armv8,%function .align 6 sha1_block_armv8: .Lv8_entry: stp x29,x30,[sp,#-16]! add x29,sp,#0 adr x4,.Lconst eor $E,$E,$E ld1.32 {$ABCD},[$ctx],#16 ld1.32 {$E}[0],[$ctx] sub $ctx,$ctx,#16 ld1.32 {@Kxx[0]-@Kxx[3]},[x4] .Loop_hw: ld1 {@MSG[0]-@MSG[3]},[$inp],#64 sub $num,$num,#1 rev32 @MSG[0],@MSG[0] rev32 @MSG[1],@MSG[1] add.i32 $W0,@Kxx[0],@MSG[0] rev32 @MSG[2],@MSG[2] orr $ABCD_SAVE,$ABCD,$ABCD // offload add.i32 $W1,@Kxx[0],@MSG[1] rev32 @MSG[3],@MSG[3] sha1h $E1,$ABCD sha1c $ABCD,$E,$W0 // 0 add.i32 $W0,@Kxx[$j],@MSG[2] sha1su0 @MSG[0],@MSG[1],@MSG[2] ___ for ($j=0,$i=1;$i<20-3;$i++) { my $f=("c","p","m","p")[$i/5]; $code.=<<___; sha1h $E0,$ABCD // $i sha1$f $ABCD,$E1,$W1 add.i32 $W1,@Kxx[$j],@MSG[3] sha1su1 @MSG[0],@MSG[3] ___ $code.=<<___ if ($i<20-4); sha1su0 @MSG[1],@MSG[2],@MSG[3] ___ ($E0,$E1)=($E1,$E0); ($W0,$W1)=($W1,$W0); push(@MSG,shift(@MSG)); $j++ if ((($i+3)%5)==0); } $code.=<<___; sha1h $E0,$ABCD // $i sha1p $ABCD,$E1,$W1 add.i32 $W1,@Kxx[$j],@MSG[3] sha1h $E1,$ABCD // 18 sha1p $ABCD,$E0,$W0 sha1h $E0,$ABCD // 19 sha1p $ABCD,$E1,$W1 add.i32 $E,$E,$E0 add.i32 $ABCD,$ABCD,$ABCD_SAVE cbnz $num,.Loop_hw st1.32 {$ABCD},[$ctx],#16 st1.32 {$E}[0],[$ctx] ldr x29,[sp],#16 ret .size sha1_block_armv8,.-sha1_block_armv8 .align 6 .Lconst: .long 0x5a827999,0x5a827999,0x5a827999,0x5a827999 //K_00_19 .long 0x6ed9eba1,0x6ed9eba1,0x6ed9eba1,0x6ed9eba1 //K_20_39 .long 0x8f1bbcdc,0x8f1bbcdc,0x8f1bbcdc,0x8f1bbcdc //K_40_59 .long 0xca62c1d6,0xca62c1d6,0xca62c1d6,0xca62c1d6 //K_60_79 .LOPENSSL_armcap_P: .quad OPENSSL_armcap_P-. .asciz "SHA1 block transform for ARMv8, CRYPTOGAMS by <appro\@openssl.org>" .align 2 .comm OPENSSL_armcap_P,4,4 ___ }}} { my %opcode = ( "sha1c" => 0x5e000000, "sha1p" => 0x5e001000, "sha1m" => 0x5e002000, "sha1su0" => 0x5e003000, "sha1h" => 0x5e280800, "sha1su1" => 0x5e281800 ); sub unsha1 { my ($mnemonic,$arg)=@_; $arg =~ m/[qv]([0-9]+)[^,]*,\s*[qv]([0-9]+)[^,]*(?:,\s*[qv]([0-9]+))?/o && sprintf ".inst\t0x%08x\t//%s %s", $opcode{$mnemonic}|$1|($2<<5)|($3<<16), $mnemonic,$arg; } } foreach(split("\n",$code)) { s/\`([^\`]*)\`/eval($1)/geo; s/\b(sha1\w+)\s+([qv].*)/unsha1($1,$2)/geo; s/\.\w?32\b//o and s/\.16b/\.4s/go; m/(ld|st)1[^\[]+\[0\]/o and s/\.4s/\.s/go; print $_,"\n"; } close STDOUT;