3 # ====================================================================
4 # Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
5 # project. The module is, however, dual licensed under OpenSSL and
6 # CRYPTOGAMS licenses depending on where you obtain it. For further
7 # details see http://www.openssl.org/~appro/cryptogams/.
8 # ====================================================================
10 # GHASH for ARMv8 Crypto Extension, 64-bit polynomial multiplication.
14 # Initial version was developed in tight cooperation with Ard
15 # Biesheuvel <ard.biesheuvel@linaro.org> from bits-n-pieces from
16 # other assembly modules. Just like aesv8-armx.pl this module
17 # supports both AArch32 and AArch64 execution modes.
21 # Implement 2x aggregated reduction [see ghash-x86.pl for background
24 # Current performance in cycles per processed byte:
26 # PMULL[2] 32-bit NEON(*)
28 # Cortex-A53 1.01 8.39
29 # Cortex-A57 1.17 7.61
31 # (*) presented for reference/comparison purposes;
34 open STDOUT
,">".shift;
36 $Xi="x0"; # argument block
44 my ($Xl,$Xm,$Xh,$IN)=map("q$_",(0..3));
45 my ($t0,$t1,$t2,$xC2,$H,$Hhl,$H2)=map("q$_",(8..14));
52 $code.=".arch armv8-a+crypto\n" if ($flavour =~ /64/);
53 $code.=".fpu neon\n.code 32\n" if ($flavour !~ /64/);
55 ################################################################################
56 # void gcm_init_v8(u128 Htable[16],const u64 H[2]);
58 # input: 128-bit H - secret parameter E(K,0^128)
59 # output: precomputed table filled with degrees of twisted H;
60 # H is twisted to handle reverse bitness of GHASH;
61 # only few of 16 slots of Htable[16] are used;
62 # data is opaque to outside world (which allows to
63 # optimize the code independently);
67 .type gcm_init_v8
,%function
70 vld1
.64
{$t1},[x1
] @ load input H
72 vshl
.i64
$xC2,$xC2,#57 @ 0xc2.0
76 vext
.8 $t0,$t2,$xC2,#8 @ t0=0xc2....01
78 vshr
.s32
$t1,$t1,#31 @ broadcast carry bit
83 vorr
$IN,$IN,$t2 @ H
<<<=1
84 veor
$H,$IN,$t0 @ twisted H
85 vst1
.64
{$H},[x0
],#16 @ store Htable[0]
88 vext
.8 $t0,$H,$H,#8 @ Karatsuba pre-processing
92 vpmull
.p64
$Xm,$t0,$t0
94 vext
.8 $t1,$Xl,$Xh,#8 @ Karatsuba post-processing
98 vpmull
.p64
$t2,$Xl,$xC2 @
1st phase
100 vmov
$Xh#lo,$Xm#hi @ Xh|Xm - 256-bit result
101 vmov
$Xm#hi,$Xl#lo @ Xm is rotated Xl
104 vext
.8 $t2,$Xl,$Xl,#8 @ 2nd phase
105 vpmull
.p64
$Xl,$Xl,$xC2
109 vext
.8 $t1,$H2,$H2,#8 @ Karatsuba pre-processing
111 vext
.8 $Hhl,$t0,$t1,#8 @ pack Karatsuba pre-processed
112 vst1
.64
{$Hhl-$H2},[x0
] @ store Htable
[1..2]
115 .size gcm_init_v8
,.-gcm_init_v8
117 ################################################################################
118 # void gcm_gmult_v8(u64 Xi[2],const u128 Htable[16]);
120 # input: Xi - current hash value;
121 # Htable - table precomputed in gcm_init_v8;
122 # output: Xi - next hash value Xi;
126 .type gcm_gmult_v8
,%function
129 vld1
.64
{$t1},[$Xi] @ load Xi
131 vld1
.64
{$H-$Hhl},[$Htbl] @ load twisted H
, ...
132 vshl
.u64
$xC2,$xC2,#57
136 vext
.8 $IN,$t1,$t1,#8
138 vpmull
.p64
$Xl,$H,$IN @ H
.lo·Xi
.lo
139 veor
$t1,$t1,$IN @ Karatsuba pre
-processing
140 vpmull2
.p64
$Xh,$H,$IN @ H
.hi·Xi
.hi
141 vpmull
.p64
$Xm,$Hhl,$t1 @
(H
.lo
+H
.hi
)·
(Xi
.lo
+Xi
.hi
)
143 vext
.8 $t1,$Xl,$Xh,#8 @ Karatsuba post-processing
147 vpmull
.p64
$t2,$Xl,$xC2 @
1st phase of reduction
149 vmov
$Xh#lo,$Xm#hi @ Xh|Xm - 256-bit result
150 vmov
$Xm#hi,$Xl#lo @ Xm is rotated Xl
153 vext
.8 $t2,$Xl,$Xl,#8 @ 2nd phase of reduction
154 vpmull
.p64
$Xl,$Xl,$xC2
161 vext
.8 $Xl,$Xl,$Xl,#8
162 vst1
.64
{$Xl},[$Xi] @
write out Xi
165 .size gcm_gmult_v8
,.-gcm_gmult_v8
167 ################################################################################
168 # void gcm_ghash_v8(u64 Xi[2],const u128 Htable[16],const u8 *inp,size_t len);
170 # input: table precomputed in gcm_init_v8;
171 # current hash value Xi;
172 # pointer to input data;
173 # length of input data in bytes, but divisible by block size;
174 # output: next hash value Xi;
178 .type gcm_ghash_v8
,%function
182 $code.=<<___
if ($flavour !~ /64/);
183 vstmdb sp
!,{d8
-d15
} @
32-bit ABI says so
186 vld1
.64
{$Xl},[$Xi] @ load
[rotated
] Xi
187 @
"[rotated]" means that
188 @ loaded value would have
189 @ to be rotated
in order to
190 @ make it appear as
in
191 @ alorithm specification
192 subs
$len,$len,#32 @ see if $len is 32 or larger
193 mov
$inc,#16 @ $inc is used as post-
194 @ increment
for input pointer
;
195 @ as
loop is modulo
-scheduled
196 @
$inc is zeroed just
in time
197 @ to preclude oversteping
198 @ inp
[len
], which means that
199 @
last block
[s
] are actually
200 @ loaded twice
, but
last
201 @ copy is
not processed
202 vld1
.64
{$H-$Hhl},[$Htbl],#32 @ load twisted H, ..., H^2
204 vld1
.64
{$H2},[$Htbl]
205 cclr
$inc,eq @ is it
time to zero
$inc?
206 vext
.8 $Xl,$Xl,$Xl,#8 @ rotate Xi
207 vld1
.64
{$t0},[$inp],#16 @ load [rotated] I[0]
208 vshl
.u64
$xC2,$xC2,#57 @ compose 0xc2.0 constant
213 vext
.8 $IN,$t0,$t0,#8 @ rotate I[0]
214 b
.lo
.Lodd_tail_v8 @
$len was less than
32
216 { my ($Xln,$Xmn,$Xhn,$In) = map("q$_",(4..7));
218 # Xi+2 =[H*(Ii+1 + Xi+1)] mod P =
219 # [(H*Ii+1) + (H*Xi+1)] mod P =
220 # [(H*Ii+1) + H^2*(Ii+Xi)] mod P
223 vld1
.64
{$t1},[$inp],$inc @ load
[rotated
] I
[1]
227 vext
.8 $In,$t1,$t1,#8
228 veor
$IN,$IN,$Xl @ I
[i
]^=Xi
229 vpmull
.p64
$Xln,$H,$In @ H·Ii
+1
230 veor
$t1,$t1,$In @ Karatsuba pre
-processing
231 vpmull2
.p64
$Xhn,$H,$In
236 vext
.8 $t2,$IN,$IN,#8
237 subs
$len,$len,#32 @ is there more data?
238 vpmull
.p64
$Xl,$H2,$IN @ H
^2.lo·Xi
.lo
239 cclr
$inc,lo @ is it
time to zero
$inc?
241 vpmull
.p64
$Xmn,$Hhl,$t1
242 veor
$t2,$t2,$IN @ Karatsuba pre
-processing
243 vpmull2
.p64
$Xh,$H2,$IN @ H
^2.hi·Xi
.hi
244 veor
$Xl,$Xl,$Xln @ accumulate
245 vpmull2
.p64
$Xm,$Hhl,$t2 @
(H
^2.lo
+H
^2.hi
)·
(Xi
.lo
+Xi
.hi
)
246 vld1
.64
{$t0},[$inp],$inc @ load
[rotated
] I
[i
+2]
249 cclr
$inc,eq @ is it
time to zero
$inc?
252 vext
.8 $t1,$Xl,$Xh,#8 @ Karatsuba post-processing
255 vld1
.64
{$t1},[$inp],$inc @ load
[rotated
] I
[i
+3]
260 vpmull
.p64
$t2,$Xl,$xC2 @
1st phase of reduction
265 vmov
$Xh#lo,$Xm#hi @ Xh|Xm - 256-bit result
266 vmov
$Xm#hi,$Xl#lo @ Xm is rotated Xl
267 vext
.8 $In,$t1,$t1,#8
268 vext
.8 $IN,$t0,$t0,#8
270 vpmull
.p64
$Xln,$H,$In @ H·Ii
+1
271 veor
$IN,$IN,$Xh @ accumulate
$IN early
273 vext
.8 $t2,$Xl,$Xl,#8 @ 2nd phase of reduction
274 vpmull
.p64
$Xl,$Xl,$xC2
276 veor
$t1,$t1,$In @ Karatsuba pre
-processing
278 vpmull2
.p64
$Xhn,$H,$In
279 b
.hs
.Loop_mod2x_v8 @ there was at least
32 more bytes
282 vext
.8 $IN,$t0,$t0,#8 @ re-construct $IN
283 adds
$len,$len,#32 @ re-construct $len
284 veor
$Xl,$Xl,$Xh @ re
-construct
$Xl
285 b
.eq .Ldone_v8 @ is
$len zero?
290 vext
.8 $t2,$Xl,$Xl,#8
291 veor
$IN,$IN,$Xl @ inp
^=Xi
292 veor
$t1,$t0,$t2 @
$t1 is rotated inp
^Xi
294 vpmull
.p64
$Xl,$H,$IN @ H
.lo·Xi
.lo
295 veor
$t1,$t1,$IN @ Karatsuba pre
-processing
296 vpmull2
.p64
$Xh,$H,$IN @ H
.hi·Xi
.hi
297 vpmull
.p64
$Xm,$Hhl,$t1 @
(H
.lo
+H
.hi
)·
(Xi
.lo
+Xi
.hi
)
299 vext
.8 $t1,$Xl,$Xh,#8 @ Karatsuba post-processing
303 vpmull
.p64
$t2,$Xl,$xC2 @
1st phase of reduction
305 vmov
$Xh#lo,$Xm#hi @ Xh|Xm - 256-bit result
306 vmov
$Xm#hi,$Xl#lo @ Xm is rotated Xl
309 vext
.8 $t2,$Xl,$Xl,#8 @ 2nd phase of reduction
310 vpmull
.p64
$Xl,$Xl,$xC2
318 vext
.8 $Xl,$Xl,$Xl,#8
319 vst1
.64
{$Xl},[$Xi] @
write out Xi
322 $code.=<<___
if ($flavour !~ /64/);
323 vldmia sp
!,{d8
-d15
} @
32-bit ABI says so
327 .size gcm_ghash_v8
,.-gcm_ghash_v8
331 .asciz
"GHASH for ARMv8, CRYPTOGAMS by <appro\@openssl.org>"
335 if ($flavour =~ /64/) { ######## 64-bit code
339 $arg =~ m/q([0-9]+)#(lo|hi),\s*q([0-9]+)#(lo|hi)/o &&
340 sprintf "ins v%d.d[%d],v%d.d[%d]",$1,($2 eq "lo")?
0:1,$3,($4 eq "lo")?
0:1;
342 foreach(split("\n",$code)) {
343 s/cclr\s+([wx])([^,]+),\s*([a-z]+)/csel $1$2,$1zr,$1$2,$3/o or
344 s/vmov\.i8/movi/o or # fix up legacy mnemonics
345 s/vmov\s+(.*)/unvmov($1)/geo or
347 s/vshr\.s/sshr\.s/o or
349 s/^(\s+)v/$1/o or # strip off v prefix
352 s/\bq([0-9]+)\b/"v".($1<8?$1:$1+8).".16b"/geo; # old->new registers
353 s/@\s/\/\
//o; # old->new style commentary
355 # fix up remainig legacy suffixes
357 s/\.[uis]?32//o and s/\.16b/\.4s/go;
358 m/\.p64/o and s/\.16b/\.1q/o; # 1st pmull argument
359 m/l\.p64/o and s/\.16b/\.1d/go; # 2nd and 3rd pmull arguments
360 s/\.[uisp]?64//o and s/\.16b/\.2d/go;
361 s/\.[42]([sd])\[([0-3])\]/\.$1\[$2\]/o;
365 } else { ######## 32-bit code
369 $arg =~ m/q([0-9]+),\s*q([0-9]+)\[([0-3])\]/o &&
370 sprintf "vdup.32 q%d,d%d[%d]",$1,2*$2+($3>>1),$3&1;
373 my ($mnemonic,$arg)=@_;
375 if ($arg =~ m/q([0-9]+),\s*q([0-9]+),\s*q([0-9]+)/o) {
376 my $word = 0xf2a00e00|(($1&7)<<13)|(($1&8)<<19)
377 |(($2&7)<<17)|(($2&8)<<4)
378 |(($3&7)<<1) |(($3&8)<<2);
379 $word |= 0x00010001 if ($mnemonic =~ "2");
380 # since ARMv7 instructions are always encoded little-endian.
381 # correct solution is to use .inst directive, but older
382 # assemblers don't implement it:-(
383 sprintf ".byte\t0x%02x,0x%02x,0x%02x,0x%02x\t@ %s %s",
384 $word&0xff,($word>>8)&0xff,
385 ($word>>16)&0xff,($word>>24)&0xff,
390 foreach(split("\n",$code)) {
391 s/\b[wx]([0-9]+)\b/r$1/go; # new->old registers
392 s/\bv([0-9])\.[12468]+[bsd]\b/q$1/go; # new->old registers
393 s/\/\/\s?
/@ /o; # new->old style commentary
395 # fix up remainig new-style suffixes
398 s/cclr\s+([^,]+),\s*([a-z]+)/mov$2 $1,#0/o or
399 s/vdup\.32\s+(.*)/unvdup32($1)/geo or
400 s/v?(pmull2?)\.p64\s+(.*)/unvpmullp64($1,$2)/geo or
401 s/\bq([0-9]+)#(lo|hi)/sprintf "d%d",2*$1+($2 eq "hi")/geo or
403 s/^(\s+)ret/$1bx\tlr/o;
409 close STDOUT
; # enforce flush