3 # ====================================================================
4 # Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
5 # project. The module is, however, dual licensed under OpenSSL and
6 # CRYPTOGAMS licenses depending on where you obtain it. For further
7 # details see http://www.openssl.org/~appro/cryptogams/.
8 # ====================================================================
10 # SHA256/512 for ARMv8.
12 # Performance in cycles per processed byte and improvement coefficient
13 # over code generated with "default" compiler:
15 # SHA256-hw SHA256(*) SHA512
16 # Apple A7 1.97 10.5 (+33%) 6.73 (-1%(**))
17 # Cortex-A53 2.38 15.6 (+110%) 10.1 (+190%(***))
18 # Cortex-A57 2.31 11.6 (+86%) 7.51 (+260%(***))
20 # (*) Software SHA256 results are of lesser relevance, presented
21 # mostly for informational purposes.
22 # (**) The result is a trade-off: it's possible to improve it by
23 # 10% (or by 1 cycle per round), but at the cost of 20% loss
24 # on Cortex-A53 (or by 4 cycles per round).
25 # (***) Super-impressive coefficients over gcc-generated code are
26 # indication of some compiler "pathology", most notably code
27 # generated with -mgeneral-regs-only is significanty faster
28 # and lags behind assembly only by 50-90%.
32 open STDOUT
,">$output";
34 if ($output =~ /512/) {
54 $func="sha${BITS}_block_data_order";
56 ($ctx,$inp,$num,$Ktbl)=map("x$_",(0..2,30));
58 @X=map("$reg_t$_",(3..15,0..2));
59 @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("$reg_t$_",(20..27));
60 ($t0,$t1,$t2,$t3)=map("$reg_t$_",(16,17,19,28));
63 my ($i,$a,$b,$c,$d,$e,$f,$g,$h)=@_;
65 my ($T0,$T1,$T2)=(@X[($i-8)&15],@X[($i-9)&15],@X[($i-10)&15]);
66 $T0=@X[$i+3] if ($i<11);
68 $code.=<<___
if ($i<16);
70 rev
@X[$i],@X[$i] // $i
73 $code.=<<___
if ($i<13 && ($i&1));
74 ldp
@X[$i+1],@X[$i+2],[$inp],#2*$SZ
76 $code.=<<___
if ($i==13);
77 ldp
@X[14],@X[15],[$inp]
79 $code.=<<___
if ($i>=14);
80 ldr
@X[($i-11)&15],[sp
,#`$SZ*(($i-11)%4)`]
82 $code.=<<___
if ($i>0 && $i<16);
83 add
$a,$a,$t1 // h
+=Sigma0
(a
)
85 $code.=<<___
if ($i>=11);
86 str
@X[($i-8)&15],[sp
,#`$SZ*(($i-8)%4)`]
88 # While ARMv8 specifies merged rotate-n-logical operation such as
89 # 'eor x,y,z,ror#n', it was found to negatively affect performance
90 # on Apple A7. The reason seems to be that it requires even 'y' to
91 # be available earlier. This means that such merged instruction is
92 # not necessarily best choice on critical path... On the other hand
93 # Cortex-A5x handles merged instructions much better than disjoint
94 # rotate and logical... See (**) footnote above.
95 $code.=<<___
if ($i<15);
96 ror
$t0,$e,#$Sigma1[0]
97 add
$h,$h,$t2 // h
+=K
[i
]
98 eor
$T0,$e,$e,ror
#`$Sigma1[2]-$Sigma1[1]`
101 add
$h,$h,@X[$i&15] // h
+=X
[i
]
102 orr
$t1,$t1,$t2 // Ch
(e
,f
,g
)
103 eor
$t2,$a,$b // a
^b
, b
^c
in next round
104 eor
$t0,$t0,$T0,ror
#$Sigma1[1] // Sigma1(e)
105 ror
$T0,$a,#$Sigma0[0]
106 add
$h,$h,$t1 // h
+=Ch
(e
,f
,g
)
107 eor
$t1,$a,$a,ror
#`$Sigma0[2]-$Sigma0[1]`
108 add
$h,$h,$t0 // h
+=Sigma1
(e
)
109 and $t3,$t3,$t2 // (b
^c
)&=(a
^b
)
111 eor
$t3,$t3,$b // Maj
(a
,b
,c
)
112 eor
$t1,$T0,$t1,ror
#$Sigma0[1] // Sigma0(a)
113 add
$h,$h,$t3 // h
+=Maj
(a
,b
,c
)
114 ldr
$t3,[$Ktbl],#$SZ // *K++, $t2 in next round
115 //add $h,$h,$t1 // h
+=Sigma0
(a
)
117 $code.=<<___
if ($i>=15);
118 ror
$t0,$e,#$Sigma1[0]
119 add
$h,$h,$t2 // h
+=K
[i
]
120 ror
$T1,@X[($j+1)&15],#$sigma0[0]
122 ror
$T2,@X[($j+14)&15],#$sigma1[0]
124 ror
$T0,$a,#$Sigma0[0]
125 add
$h,$h,@X[$i&15] // h
+=X
[i
]
126 eor
$t0,$t0,$e,ror
#$Sigma1[1]
127 eor
$T1,$T1,@X[($j+1)&15],ror
#$sigma0[1]
128 orr
$t1,$t1,$t2 // Ch
(e
,f
,g
)
129 eor
$t2,$a,$b // a
^b
, b
^c
in next round
130 eor
$t0,$t0,$e,ror
#$Sigma1[2] // Sigma1(e)
131 eor
$T0,$T0,$a,ror
#$Sigma0[1]
132 add
$h,$h,$t1 // h
+=Ch
(e
,f
,g
)
133 and $t3,$t3,$t2 // (b
^c
)&=(a
^b
)
134 eor
$T2,$T2,@X[($j+14)&15],ror
#$sigma1[1]
135 eor
$T1,$T1,@X[($j+1)&15],lsr
#$sigma0[2] // sigma0(X[i+1])
136 add
$h,$h,$t0 // h
+=Sigma1
(e
)
137 eor
$t3,$t3,$b // Maj
(a
,b
,c
)
138 eor
$t1,$T0,$a,ror
#$Sigma0[2] // Sigma0(a)
139 eor
$T2,$T2,@X[($j+14)&15],lsr
#$sigma1[2] // sigma1(X[i+14])
140 add
@X[$j],@X[$j],@X[($j+9)&15]
142 add
$h,$h,$t3 // h
+=Maj
(a
,b
,c
)
143 ldr
$t3,[$Ktbl],#$SZ // *K++, $t2 in next round
144 add
@X[$j],@X[$j],$T1
145 add
$h,$h,$t1 // h
+=Sigma0
(a
)
146 add
@X[$j],@X[$j],$T2
152 #include "arm_arch.h"
157 .type
$func,%function
161 $code.=<<___
if ($SZ==4);
162 ldr x16
,.LOPENSSL_armcap_P
163 adr x17
,.LOPENSSL_armcap_P
166 tst w16
,#ARMV8_SHA256
170 stp x29
,x30
,[sp
,#-128]!
180 ldp
$A,$B,[$ctx] // load context
181 ldp
$C,$D,[$ctx,#2*$SZ]
182 ldp
$E,$F,[$ctx,#4*$SZ]
183 add
$num,$inp,$num,lsl
#`log(16*$SZ)/log(2)` // end of input
184 ldp
$G,$H,[$ctx,#6*$SZ]
186 stp
$ctx,$num,[x29
,#96]
189 ldp
@X[0],@X[1],[$inp],#2*$SZ
190 ldr
$t2,[$Ktbl],#$SZ // *K++
191 eor
$t3,$B,$C // magic seed
194 for ($i=0;$i<16;$i++) { &BODY_00_xx
($i,@V); unshift(@V,pop(@V)); }
195 $code.=".Loop_16_xx:\n";
196 for (;$i<32;$i++) { &BODY_00_xx
($i,@V); unshift(@V,pop(@V)); }
200 ldp
$ctx,$num,[x29
,#96]
202 sub $Ktbl,$Ktbl,#`$SZ*($rounds+1)` // rewind
204 ldp
@X[0],@X[1],[$ctx]
205 ldp
@X[2],@X[3],[$ctx,#2*$SZ]
206 add
$inp,$inp,#14*$SZ // advance input pointer
207 ldp
@X[4],@X[5],[$ctx,#4*$SZ]
209 ldp
@X[6],@X[7],[$ctx,#6*$SZ]
216 stp
$C,$D,[$ctx,#2*$SZ]
220 stp
$E,$F,[$ctx,#4*$SZ]
221 stp
$G,$H,[$ctx,#6*$SZ]
224 ldp x19
,x20
,[x29
,#16]
226 ldp x21
,x22
,[x29
,#32]
227 ldp x23
,x24
,[x29
,#48]
228 ldp x25
,x26
,[x29
,#64]
229 ldp x27
,x28
,[x29
,#80]
230 ldp x29
,x30
,[sp
],#128
238 $code.=<<___
if ($SZ==8);
239 .quad
0x428a2f98d728ae22,0x7137449123ef65cd
240 .quad
0xb5c0fbcfec4d3b2f,0xe9b5dba58189dbbc
241 .quad
0x3956c25bf348b538,0x59f111f1b605d019
242 .quad
0x923f82a4af194f9b,0xab1c5ed5da6d8118
243 .quad
0xd807aa98a3030242,0x12835b0145706fbe
244 .quad
0x243185be4ee4b28c,0x550c7dc3d5ffb4e2
245 .quad
0x72be5d74f27b896f,0x80deb1fe3b1696b1
246 .quad
0x9bdc06a725c71235,0xc19bf174cf692694
247 .quad
0xe49b69c19ef14ad2,0xefbe4786384f25e3
248 .quad
0x0fc19dc68b8cd5b5,0x240ca1cc77ac9c65
249 .quad
0x2de92c6f592b0275,0x4a7484aa6ea6e483
250 .quad
0x5cb0a9dcbd41fbd4,0x76f988da831153b5
251 .quad
0x983e5152ee66dfab,0xa831c66d2db43210
252 .quad
0xb00327c898fb213f,0xbf597fc7beef0ee4
253 .quad
0xc6e00bf33da88fc2,0xd5a79147930aa725
254 .quad
0x06ca6351e003826f,0x142929670a0e6e70
255 .quad
0x27b70a8546d22ffc,0x2e1b21385c26c926
256 .quad
0x4d2c6dfc5ac42aed,0x53380d139d95b3df
257 .quad
0x650a73548baf63de,0x766a0abb3c77b2a8
258 .quad
0x81c2c92e47edaee6,0x92722c851482353b
259 .quad
0xa2bfe8a14cf10364,0xa81a664bbc423001
260 .quad
0xc24b8b70d0f89791,0xc76c51a30654be30
261 .quad
0xd192e819d6ef5218,0xd69906245565a910
262 .quad
0xf40e35855771202a,0x106aa07032bbd1b8
263 .quad
0x19a4c116b8d2d0c8,0x1e376c085141ab53
264 .quad
0x2748774cdf8eeb99,0x34b0bcb5e19b48a8
265 .quad
0x391c0cb3c5c95a63,0x4ed8aa4ae3418acb
266 .quad
0x5b9cca4f7763e373,0x682e6ff3d6b2b8a3
267 .quad
0x748f82ee5defb2fc,0x78a5636f43172f60
268 .quad
0x84c87814a1f0ab72,0x8cc702081a6439ec
269 .quad
0x90befffa23631e28,0xa4506cebde82bde9
270 .quad
0xbef9a3f7b2c67915,0xc67178f2e372532b
271 .quad
0xca273eceea26619c,0xd186b8c721c0c207
272 .quad
0xeada7dd6cde0eb1e,0xf57d4f7fee6ed178
273 .quad
0x06f067aa72176fba,0x0a637dc5a2c898a6
274 .quad
0x113f9804bef90dae,0x1b710b35131c471b
275 .quad
0x28db77f523047d84,0x32caab7b40c72493
276 .quad
0x3c9ebe0a15c9bebc,0x431d67c49c100d4c
277 .quad
0x4cc5d4becb3e42b6,0x597f299cfc657e2a
278 .quad
0x5fcb6fab3ad6faec,0x6c44198c4a475817
279 .quad
0 // terminator
281 $code.=<<___
if ($SZ==4);
282 .long
0x428a2f98,0x71374491,0xb5c0fbcf,0xe9b5dba5
283 .long
0x3956c25b,0x59f111f1,0x923f82a4,0xab1c5ed5
284 .long
0xd807aa98,0x12835b01,0x243185be,0x550c7dc3
285 .long
0x72be5d74,0x80deb1fe,0x9bdc06a7,0xc19bf174
286 .long
0xe49b69c1,0xefbe4786,0x0fc19dc6,0x240ca1cc
287 .long
0x2de92c6f,0x4a7484aa,0x5cb0a9dc,0x76f988da
288 .long
0x983e5152,0xa831c66d,0xb00327c8,0xbf597fc7
289 .long
0xc6e00bf3,0xd5a79147,0x06ca6351,0x14292967
290 .long
0x27b70a85,0x2e1b2138,0x4d2c6dfc,0x53380d13
291 .long
0x650a7354,0x766a0abb,0x81c2c92e,0x92722c85
292 .long
0xa2bfe8a1,0xa81a664b,0xc24b8b70,0xc76c51a3
293 .long
0xd192e819,0xd6990624,0xf40e3585,0x106aa070
294 .long
0x19a4c116,0x1e376c08,0x2748774c,0x34b0bcb5
295 .long
0x391c0cb3,0x4ed8aa4a,0x5b9cca4f,0x682e6ff3
296 .long
0x748f82ee,0x78a5636f,0x84c87814,0x8cc70208
297 .long
0x90befffa,0xa4506ceb,0xbef9a3f7,0xc67178f2
301 .size K
$BITS,.-K
$BITS
304 .quad OPENSSL_armcap_P
-.
305 .asciz
"SHA$BITS block transform for ARMv8, CRYPTOGAMS by <appro\@openssl.org>"
312 my ($ABCD,$EFGH,$abcd)=map("v$_.16b",(0..2));
313 my @MSG=map("v$_.16b",(4..7));
314 my ($W0,$W1)=("v16.4s","v17.4s");
315 my ($ABCD_SAVE,$EFGH_SAVE)=("v18.16b","v19.16b");
318 .type sha256_block_armv8
,%function
322 stp x29
,x30
,[sp
,#-16]!
325 ld1
.32
{$ABCD,$EFGH},[$ctx]
329 ld1
{@MSG[0]-@MSG[3]},[$inp],#64
331 ld1
.32
{$W0},[$Ktbl],#16
332 rev32
@MSG[0],@MSG[0]
333 rev32
@MSG[1],@MSG[1]
334 rev32
@MSG[2],@MSG[2]
335 rev32
@MSG[3],@MSG[3]
336 orr
$ABCD_SAVE,$ABCD,$ABCD // offload
337 orr
$EFGH_SAVE,$EFGH,$EFGH
339 for($i=0;$i<12;$i++) {
341 ld1
.32
{$W1},[$Ktbl],#16
342 add
.i32
$W0,$W0,@MSG[0]
343 sha256su0
@MSG[0],@MSG[1]
344 orr
$abcd,$ABCD,$ABCD
345 sha256h
$ABCD,$EFGH,$W0
346 sha256h2
$EFGH,$abcd,$W0
347 sha256su1
@MSG[0],@MSG[2],@MSG[3]
349 ($W0,$W1)=($W1,$W0); push(@MSG,shift(@MSG));
352 ld1
.32
{$W1},[$Ktbl],#16
353 add
.i32
$W0,$W0,@MSG[0]
354 orr
$abcd,$ABCD,$ABCD
355 sha256h
$ABCD,$EFGH,$W0
356 sha256h2
$EFGH,$abcd,$W0
358 ld1
.32
{$W0},[$Ktbl],#16
359 add
.i32
$W1,$W1,@MSG[1]
360 orr
$abcd,$ABCD,$ABCD
361 sha256h
$ABCD,$EFGH,$W1
362 sha256h2
$EFGH,$abcd,$W1
365 add
.i32
$W0,$W0,@MSG[2]
366 sub $Ktbl,$Ktbl,#$rounds*$SZ-16 // rewind
367 orr
$abcd,$ABCD,$ABCD
368 sha256h
$ABCD,$EFGH,$W0
369 sha256h2
$EFGH,$abcd,$W0
371 add
.i32
$W1,$W1,@MSG[3]
372 orr
$abcd,$ABCD,$ABCD
373 sha256h
$ABCD,$EFGH,$W1
374 sha256h2
$EFGH,$abcd,$W1
376 add
.i32
$ABCD,$ABCD,$ABCD_SAVE
377 add
.i32
$EFGH,$EFGH,$EFGH_SAVE
381 st1
.32
{$ABCD,$EFGH},[$ctx]
385 .size sha256_block_armv8
,.-sha256_block_armv8
390 .comm OPENSSL_armcap_P
,4,4
394 "sha256h" => 0x5e004000, "sha256h2" => 0x5e005000,
395 "sha256su0" => 0x5e282800, "sha256su1" => 0x5e006000 );
398 my ($mnemonic,$arg)=@_;
400 $arg =~ m/[qv]([0-9]+)[^,]*,\s*[qv]([0-9]+)[^,]*(?:,\s*[qv]([0-9]+))?/o
402 sprintf ".inst\t0x%08x\t//%s %s",
403 $opcode{$mnemonic}|$1|($2<<5)|($3<<16),
408 foreach(split("\n",$code)) {
410 s/\`([^\`]*)\`/eval($1)/geo;
412 s/\b(sha256\w+)\s+([qv].*)/unsha256($1,$2)/geo;
414 s/\.\w?32\b//o and s/\.16b/\.4s/go;
415 m/(ld|st)1[^\[]+\[0\]/o and s/\.4s/\.s/go;