mirror of
https://github.com/openssl/openssl.git
synced 2024-12-09 05:51:54 +08:00
227 lines
4.4 KiB
Raku
227 lines
4.4 KiB
Raku
#!/usr/bin/env perl
|
|
|
|
# ====================================================================
|
|
# Written by Andy Polyakov <appro@fy.chalmers.se> for the OpenSSL
|
|
# project. The module is, however, dual licensed under OpenSSL and
|
|
# CRYPTOGAMS licenses depending on where you obtain it. For further
|
|
# details see http://www.openssl.org/~appro/cryptogams/.
|
|
# ====================================================================
|
|
|
|
# SHA1 block procedure for s390x.
|
|
|
|
# April 2007.
|
|
#
|
|
# Performance is >30% better than gcc 3.3 generated code. But the real
|
|
# twist is that SHA1 hardware support is detected and utilized. In
|
|
# which case performance can reach further >4.5x for larger chunks.
|
|
|
|
# January 2009.
|
|
#
|
|
# Optimize Xupdate for amount of memory references and reschedule
|
|
# instructions to favour dual-issue z10 pipeline. On z10 hardware is
|
|
# "only" ~2.3x faster than software.
|
|
|
|
$kimdfunc=1; # magic function code for kimd instruction
|
|
|
|
while (($output=shift) && ($output!~/^\w[\w\-]*\.\w+$/)) {}
|
|
open STDOUT,">$output";
|
|
|
|
$K_00_39="%r0"; $K=$K_00_39;
|
|
$K_40_79="%r1";
|
|
$ctx="%r2"; $prefetch="%r2";
|
|
$inp="%r3";
|
|
$len="%r4";
|
|
|
|
$A="%r5";
|
|
$B="%r6";
|
|
$C="%r7";
|
|
$D="%r8";
|
|
$E="%r9"; @V=($A,$B,$C,$D,$E);
|
|
$t0="%r10";
|
|
$t1="%r11";
|
|
@X=("%r12","%r13","%r14");
|
|
$sp="%r15";
|
|
|
|
$frame=160+16*4;
|
|
|
|
sub Xupdate {
|
|
my $i=shift;
|
|
|
|
$code.=<<___ if ($i==15);
|
|
lg $prefetch,160($sp) ### Xupdate(16) warm-up
|
|
lr $X[0],$X[2]
|
|
___
|
|
return if ($i&1); # Xupdate is vectorized and executed every 2nd cycle
|
|
$code.=<<___ if ($i<16);
|
|
lg $X[0],`$i*4`($inp) ### Xload($i)
|
|
rllg $X[1],$X[0],32
|
|
___
|
|
$code.=<<___ if ($i>=16);
|
|
xgr $X[0],$prefetch ### Xupdate($i)
|
|
lg $prefetch,`160+4*(($i+2)%16)`($sp)
|
|
xg $X[0],`160+4*(($i+8)%16)`($sp)
|
|
xgr $X[0],$prefetch
|
|
rll $X[0],$X[0],1
|
|
rllg $X[1],$X[0],32
|
|
rll $X[1],$X[1],1
|
|
rllg $X[0],$X[1],32
|
|
lr $X[2],$X[1] # feedback
|
|
___
|
|
$code.=<<___ if ($i<=70);
|
|
stg $X[0],`160+4*($i%16)`($sp)
|
|
___
|
|
unshift(@X,pop(@X));
|
|
}
|
|
|
|
sub BODY_00_19 {
|
|
my ($i,$a,$b,$c,$d,$e)=@_;
|
|
my $xi=$X[1];
|
|
|
|
&Xupdate($i);
|
|
$code.=<<___;
|
|
alr $e,$K ### $i
|
|
rll $t1,$a,5
|
|
lr $t0,$d
|
|
xr $t0,$c
|
|
alr $e,$t1
|
|
nr $t0,$b
|
|
alr $e,$xi
|
|
xr $t0,$d
|
|
rll $b,$b,30
|
|
alr $e,$t0
|
|
___
|
|
}
|
|
|
|
sub BODY_20_39 {
|
|
my ($i,$a,$b,$c,$d,$e)=@_;
|
|
my $xi=$X[1];
|
|
|
|
&Xupdate($i);
|
|
$code.=<<___;
|
|
alr $e,$K ### $i
|
|
rll $t1,$a,5
|
|
lr $t0,$b
|
|
alr $e,$t1
|
|
xr $t0,$c
|
|
alr $e,$xi
|
|
xr $t0,$d
|
|
rll $b,$b,30
|
|
alr $e,$t0
|
|
___
|
|
}
|
|
|
|
sub BODY_40_59 {
|
|
my ($i,$a,$b,$c,$d,$e)=@_;
|
|
my $xi=$X[1];
|
|
|
|
&Xupdate($i);
|
|
$code.=<<___;
|
|
alr $e,$K ### $i
|
|
rll $t1,$a,5
|
|
lr $t0,$b
|
|
alr $e,$t1
|
|
or $t0,$c
|
|
lr $t1,$b
|
|
nr $t0,$d
|
|
nr $t1,$c
|
|
alr $e,$xi
|
|
or $t0,$t1
|
|
rll $b,$b,30
|
|
alr $e,$t0
|
|
___
|
|
}
|
|
|
|
$code.=<<___;
|
|
.text
|
|
.align 64
|
|
.type Ktable,\@object
|
|
Ktable: .long 0x5a827999,0x6ed9eba1,0x8f1bbcdc,0xca62c1d6
|
|
.skip 48 #.long 0,0,0,0,0,0,0,0,0,0,0,0
|
|
.size Ktable,.-Ktable
|
|
.globl sha1_block_data_order
|
|
.type sha1_block_data_order,\@function
|
|
sha1_block_data_order:
|
|
___
|
|
$code.=<<___ if ($kimdfunc);
|
|
larl %r1,OPENSSL_s390xcap_P
|
|
lg %r0,0(%r1)
|
|
tmhl %r0,0x4000 # check for message-security assist
|
|
jz .Lsoftware
|
|
lghi %r0,0
|
|
la %r1,16($sp)
|
|
.long 0xb93e0002 # kimd %r0,%r2
|
|
lg %r0,16($sp)
|
|
tmhh %r0,`0x8000>>$kimdfunc`
|
|
jz .Lsoftware
|
|
lghi %r0,$kimdfunc
|
|
lgr %r1,$ctx
|
|
lgr %r2,$inp
|
|
sllg %r3,$len,6
|
|
.long 0xb93e0002 # kimd %r0,%r2
|
|
brc 1,.-4 # pay attention to "partial completion"
|
|
br %r14
|
|
.align 16
|
|
.Lsoftware:
|
|
___
|
|
$code.=<<___;
|
|
lghi %r1,-$frame
|
|
stg $ctx,16($sp)
|
|
stmg %r6,%r15,48($sp)
|
|
lgr %r0,$sp
|
|
la $sp,0(%r1,$sp)
|
|
stg %r0,0($sp)
|
|
|
|
larl $t0,Ktable
|
|
llgf $A,0($ctx)
|
|
llgf $B,4($ctx)
|
|
llgf $C,8($ctx)
|
|
llgf $D,12($ctx)
|
|
llgf $E,16($ctx)
|
|
|
|
lg $K_00_39,0($t0)
|
|
lg $K_40_79,8($t0)
|
|
|
|
.Lloop:
|
|
rllg $K_00_39,$K_00_39,32
|
|
___
|
|
for ($i=0;$i<20;$i++) { &BODY_00_19($i,@V); unshift(@V,pop(@V)); }
|
|
$code.=<<___;
|
|
rllg $K_00_39,$K_00_39,32
|
|
___
|
|
for (;$i<40;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); }
|
|
$code.=<<___; $K=$K_40_79;
|
|
rllg $K_40_79,$K_40_79,32
|
|
___
|
|
for (;$i<60;$i++) { &BODY_40_59($i,@V); unshift(@V,pop(@V)); }
|
|
$code.=<<___;
|
|
rllg $K_40_79,$K_40_79,32
|
|
___
|
|
for (;$i<80;$i++) { &BODY_20_39($i,@V); unshift(@V,pop(@V)); }
|
|
$code.=<<___;
|
|
|
|
lg $ctx,`$frame+16`($sp)
|
|
la $inp,64($inp)
|
|
al $A,0($ctx)
|
|
al $B,4($ctx)
|
|
al $C,8($ctx)
|
|
al $D,12($ctx)
|
|
al $E,16($ctx)
|
|
st $A,0($ctx)
|
|
st $B,4($ctx)
|
|
st $C,8($ctx)
|
|
st $D,12($ctx)
|
|
st $E,16($ctx)
|
|
brct $len,.Lloop
|
|
|
|
lmg %r6,%r15,`$frame+48`($sp)
|
|
br %r14
|
|
.size sha1_block_data_order,.-sha1_block_data_order
|
|
.string "SHA1 block transform for s390x, CRYPTOGAMS by <appro\@openssl.org>"
|
|
.comm OPENSSL_s390xcap_P,8,8
|
|
___
|
|
|
|
$code =~ s/\`([^\`]*)\`/eval $1/gem;
|
|
|
|
print $code;
|
|
close STDOUT;
|