Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
23328d4b
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
23328d4b
编写于
10月 24, 2012
作者:
A
Andy Polyakov
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
ghash-sparcv9.pl: add VIS3 code path.
上级
30765fed
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
233 addition
and
3 deletion
+233
-3
crypto/modes/asm/ghash-sparcv9.pl
crypto/modes/asm/ghash-sparcv9.pl
+217
-3
crypto/modes/gcm128.c
crypto/modes/gcm128.c
+16
-0
未找到文件。
crypto/modes/asm/ghash-sparcv9.pl
浏览文件 @
23328d4b
...
...
@@ -36,6 +36,13 @@
# references to input data and Z.hi updates to achieve 12 cycles
# timing. To anchor to something else, sha1-sparcv9.pl spends 11.6
# cycles to process one byte on UltraSPARC pre-Tx CPU and ~24 on T1.
#
# October 2012
#
# Add VIS3 lookup-table-free implementation using polynomial
# multiplication xmulx[hi] and extended addition addxc[cc]
# instructions. 3.96/6.26x improvement on T3/T4 or in absolute
# terms 9.02/2.61 cycles per byte.
$bits
=
32
;
for
(
@ARGV
)
{
$bits
=
64
if
(
/\-m64/
||
/\-xarch\=v9/
);
}
...
...
@@ -66,6 +73,10 @@ $Htbl="%i1";
$inp
=
"
%i2
";
$len
=
"
%i3
";
$code
.=<<
___
if
(
$bits
==
64
);
.
register
%g2
,
#scratch
.
register
%g3
,
#scratch
___
$code
.=
<<___;
.section ".text",#alloc,#execinstr
...
...
@@ -321,10 +332,213 @@ gcm_gmult_4bit:
restore
.type gcm_gmult_4bit,#function
.size gcm_gmult_4bit,(.-gcm_gmult_4bit)
.asciz "GHASH for SPARCv9, CRYPTOGAMS by <appro\@openssl.org>"
___
{{{
# Straightforward 64-bits-at-a-time approach with pair of 128x64-bit
# multiplications followed by 64-bit reductions. While it might be
# suboptimal with regard to sheer amount of multiplications, other
# methods would require larger amount of 64-bit registers, which we
# don't have in 32-bit application. Also, they [alternative methods
# such as aggregated reduction] kind of thrive on fast 128-bit SIMD
# instructions and these are not option on SPARC...
(
$Xip
,
$Htable
,
$inp
,
$len
)
=
map
("
%i
$_
",(
0
..
3
));
(
$xE1
,
$Hhi
,
$Hlo
,
$Rhi
,
$Rlo
,
$M0hi
,
$M0lo
,
$M1hi
,
$M1lo
,
$Zhi
,
$Zlo
,
$X
)
=
(
map
("
%g
$_
",(
1
..
5
)),
map
("
%o
$_
",(
0
..
5
,
7
)));
(
$shl
,
$shr
)
=
map
("
%l
$_
",(
0
..
7
));
$code
.=
<<___;
.globl gcm_gmult_vis3
.align 32
gcm_gmult_vis3:
save %sp,-$frame,%sp
ldx [$Xip+8],$X ! load X.lo
ldx [$Htable-8], $Hlo ! load H
ldx [$Htable-16],$Hhi
mov 0xE1,$xE1
sllx $xE1,57,$xE1
xmulx $X,$Hlo,$M0lo ! HX.lo
xmulxhi $X,$Hlo,$M0hi
xmulx $X,$Hhi,$M1lo
xmulxhi $X,$Hhi,$M1hi
ldx [$Xip+0],$X ! load X.hi
addcc $M0lo,$M0lo,$M0lo ! (HX.lo)<<1
xor $M0hi,$M1lo,$M1lo
xmulx $xE1,$M0lo,$Rlo ! res=Z.lo(0xE1<<57)
xmulxhi $xE1,$M0lo,$Rhi
addxccc $M1lo,$M1lo,$Zlo ! Z=((HX.lo)<<1)>>64
addxc $M1hi,$M1hi,$Zhi
xor $M0lo,$Zhi,$Zhi ! overflow bit from 0xE1<<57
xmulx $X,$Hlo,$M0lo ! HX.hi
xmulxhi $X,$Hlo,$M0hi
xmulx $X,$Hhi,$M1lo
xmulxhi $X,$Hhi,$M1hi
xor $Rlo,$Zlo,$Zlo ! Z^=res
xor $Rhi,$Zhi,$Zhi
addcc $M0lo,$M0lo,$M0lo ! (HX.lo)<<1
xor $Zlo, $M0lo,$M0lo
xor $M0hi,$M1lo,$M1lo
xmulx $xE1,$M0lo,$Rlo ! res=Z.lo(0xE1<<57)
xmulxhi $xE1,$M0lo,$Rhi
addxccc $M1lo,$M1lo,$M1lo
addxc $M1hi,$M1hi,$M1hi
xor $M1lo,$Zhi,$Zlo ! Z=(Z^(HX.hi)<<1)>>64
xor $M0lo,$M1hi,$Zhi ! overflow bit from 0xE1<<57
xor $Rlo,$Zlo,$Zlo ! Z^=res
xor $Rhi,$Zhi,$Zhi
stx $Zlo,[$Xip+8] ! save Xi
stx $Zhi,[$Xip+0]
ret
restore
.type gcm_gmult_vis3,#function
.size gcm_gmult_vis3,.-gcm_gmult_vis3
.globl gcm_ghash_vis3
.align 32
gcm_ghash_vis3:
save %sp,-$frame,%sp
ldx [$Xip+0],$Zhi ! load X.hi
ldx [$Xip+8],$Zlo ! load X.lo
and $inp,7,$shl
andn $inp,7,$inp
ldx [$Htable-8], $Hlo ! load H
ldx [$Htable-16],$Hhi
sll $shl,3,$shl
prefetch [$inp+63], 20
mov 0xE1,$xE1
sub %g0,$shl,$shr
sllx $xE1,57,$xE1
.Loop:
ldx [$inp+8],$Rlo ! load *inp
brz,pt $shl,1f
ldx [$inp+0],$Rhi
ldx [$inp+16],$X ! align data
srlx $Rlo,$shr,$M0lo
sllx $Rlo,$shl,$Rlo
sllx $Rhi,$shl,$Rhi
srlx $X,$shr,$X
or $M0lo,$Rhi,$Rhi
or $X,$Rlo,$Rlo
1:
add $inp,16,$inp
sub $len,16,$len
xor $Rlo,$Zlo,$X
prefetch [$inp+63], 20
xmulx $X,$Hlo,$M0lo ! HX.lo
xmulxhi $X,$Hlo,$M0hi
xmulx $X,$Hhi,$M1lo
xmulxhi $X,$Hhi,$M1hi
xor $Rhi,$Zhi,$X
addcc $M0lo,$M0lo,$M0lo ! (HX.lo)<<1
xor $M0hi,$M1lo,$M1lo
xmulx $xE1,$M0lo,$Rlo ! res=Z.lo(0xE1<<57)
xmulxhi $xE1,$M0lo,$Rhi
addxccc $M1lo,$M1lo,$Zlo ! Z=((HX.lo)<<1)>>64
addxc $M1hi,$M1hi,$Zhi
xor $M0lo,$Zhi,$Zhi ! overflow bit from 0xE1<<57
xmulx $X,$Hlo,$M0lo ! HX.hi
xmulxhi $X,$Hlo,$M0hi
xmulx $X,$Hhi,$M1lo
xmulxhi $X,$Hhi,$M1hi
xor $Rlo,$Zlo,$Zlo ! Z^=res
xor $Rhi,$Zhi,$Zhi
addcc $M0lo,$M0lo,$M0lo ! (HX.lo)<<1
xor $Zlo, $M0lo,$M0lo
xor $M0hi,$M1lo,$M1lo
xmulx $xE1,$M0lo,$Rlo ! res=Z.lo(0xE1<<57)
xmulxhi $xE1,$M0lo,$Rhi
addxccc $M1lo,$M1lo,$M1lo
addxc $M1hi,$M1hi,$M1hi
xor $M1lo,$Zhi,$Zlo ! Z=(Z^(HX.hi)<<1)>>64
xor $M0lo,$M1hi,$Zhi ! overflow bit from 0xE1<<57
xor $Rlo,$Zlo,$Zlo ! Z^=res
brnz,pt $len,.Loop
xor $Rhi,$Zhi,$Zhi
stx $Zlo,[$Xip+8] ! save Xi
stx $Zhi,[$Xip+0]
ret
restore
.type gcm_ghash_vis3,#function
.size gcm_ghash_vis3,.-gcm_ghash_vis3
___
}}}
$code
.=
<<___;
.asciz "GHASH for SPARCv9/VIS3, CRYPTOGAMS by <appro\@openssl.org>"
.align 4
___
$code
=~
s/\`([^\`]*)\`/eval $1/g
em
;
print
$code
;
# Purpose of these subroutines is to explicitly encode VIS instructions,
# so that one can compile the module without having to specify VIS
# extentions on compiler command line, e.g. -xarch=v9 vs. -xarch=v9a.
# Idea is to reserve for option to produce "universal" binary and let
# programmer detect if current CPU is VIS capable at run-time.
sub
unvis3
{
my
(
$mnemonic
,
$rs1
,
$rs2
,
$rd
)
=
@_
;
my
%bias
=
(
"
g
"
=>
0
,
"
o
"
=>
8
,
"
l
"
=>
16
,
"
i
"
=>
24
);
my
(
$ref
,
$opf
);
my
%visopf
=
(
"
addxc
"
=>
0x011
,
"
addxccc
"
=>
0x013
,
"
xmulx
"
=>
0x115
,
"
xmulxhi
"
=>
0x116
);
$ref
=
"
$mnemonic
\t
$rs1
,
$rs2
,
$rd
";
if
(
$opf
=
$visopf
{
$mnemonic
})
{
foreach
(
$rs1
,
$rs2
,
$rd
)
{
return
$ref
if
(
!
/%([goli])([0-9])/
);
$_
=
$bias
{
$
1
}
+
$
2
;
}
return
sprintf
"
.word
\t
0x%08x !%s
",
0x81b00000
|
$rd
<<
25
|
$rs1
<<
14
|
$opf
<<
5
|
$rs2
,
$ref
;
}
else
{
return
$ref
;
}
}
foreach
(
split
("
\n
",
$code
))
{
s/\`([^\`]*)\`/eval $1/g
e
;
s/\b(xmulx[hi]*|addxc[c]{0,2})\s+(%[goli][0-7]),\s*(%[goli][0-7]),\s*(%[goli][0-7])/
&unvis3($1,$2,$3,$4)
/g
e
;
print
$_
,"
\n
";
}
close
STDOUT
;
crypto/modes/gcm128.c
浏览文件 @
23328d4b
...
...
@@ -674,6 +674,13 @@ void gcm_ghash_4bit_x86(u64 Xi[2],const u128 Htable[16],const u8 *inp,size_t len
void
gcm_gmult_neon
(
u64
Xi
[
2
],
const
u128
Htable
[
16
]);
void
gcm_ghash_neon
(
u64
Xi
[
2
],
const
u128
Htable
[
16
],
const
u8
*
inp
,
size_t
len
);
# endif
# elif defined(__sparc__) || defined(__sparc)
# include "sparc_arch.h"
# define GHASH_ASM_SPARC
# define GCM_FUNCREF_4BIT
extern
unsigned
int
OPENSSL_sparcv9cap_P
[];
void
gcm_gmult_vis3
(
u64
Xi
[
2
],
const
u128
Htable
[
16
]);
void
gcm_ghash_vis3
(
u64
Xi
[
2
],
const
u128
Htable
[
16
],
const
u8
*
inp
,
size_t
len
);
# endif
#endif
...
...
@@ -750,6 +757,15 @@ void CRYPTO_gcm128_init(GCM128_CONTEXT *ctx,void *key,block128_f block)
ctx
->
gmult
=
gcm_gmult_4bit
;
ctx
->
ghash
=
gcm_ghash_4bit
;
}
# elif defined(GHASH_ASM_SPARC)
if
(
OPENSSL_sparcv9cap_P
[
0
]
&
SPARCV9_VIS3
)
{
ctx
->
gmult
=
gcm_gmult_vis3
;
ctx
->
ghash
=
gcm_ghash_vis3
;
}
else
{
gcm_init_4bit
(
ctx
->
Htable
,
ctx
->
H
.
u
);
ctx
->
gmult
=
gcm_gmult_4bit
;
ctx
->
ghash
=
gcm_ghash_4bit
;
}
# else
gcm_init_4bit
(
ctx
->
Htable
,
ctx
->
H
.
u
);
# endif
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录