| Index: openssl/crypto/rc4/asm/rc4-ia64.pl
 | 
| diff --git a/openssl/crypto/rc4/asm/rc4-ia64.pl b/openssl/crypto/rc4/asm/rc4-ia64.pl
 | 
| deleted file mode 100644
 | 
| index 49cd5b5e6945a16fd3f67d343d028864174d06c8..0000000000000000000000000000000000000000
 | 
| --- a/openssl/crypto/rc4/asm/rc4-ia64.pl
 | 
| +++ /dev/null
 | 
| @@ -1,755 +0,0 @@
 | 
| -#!/usr/bin/env perl
 | 
| -#
 | 
| -# ====================================================================
 | 
| -# Written by David Mosberger <David.Mosberger@acm.org> based on the
 | 
| -# Itanium optimized Crypto code which was released by HP Labs at
 | 
| -# http://www.hpl.hp.com/research/linux/crypto/.
 | 
| -#
 | 
| -# Copyright (c) 2005 Hewlett-Packard Development Company, L.P.
 | 
| -#
 | 
| -# Permission is hereby granted, free of charge, to any person obtaining
 | 
| -# a copy of this software and associated documentation files (the
 | 
| -# "Software"), to deal in the Software without restriction, including
 | 
| -# without limitation the rights to use, copy, modify, merge, publish,
 | 
| -# distribute, sublicense, and/or sell copies of the Software, and to
 | 
| -# permit persons to whom the Software is furnished to do so, subject to
 | 
| -# the following conditions:
 | 
| -#
 | 
| -# The above copyright notice and this permission notice shall be
 | 
| -# included in all copies or substantial portions of the Software.
 | 
| -
 | 
| -# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 | 
| -# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 | 
| -# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
 | 
| -# NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
 | 
| -# LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
 | 
| -# OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
 | 
| -# WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.  */
 | 
| -
 | 
| -
 | 
| -
 | 
| -# This is a little helper program which generates a software-pipelined
 | 
| -# for RC4 encryption.  The basic algorithm looks like this:
 | 
| -#
 | 
| -#   for (counter = 0; counter < len; ++counter)
 | 
| -#     {
 | 
| -#       in = inp[counter];
 | 
| -#       SI = S[I];
 | 
| -#       J = (SI + J) & 0xff;
 | 
| -#       SJ = S[J];
 | 
| -#       T = (SI + SJ) & 0xff;
 | 
| -#       S[I] = SJ, S[J] = SI;
 | 
| -#       ST = S[T];
 | 
| -#       outp[counter] = in ^ ST;
 | 
| -#       I = (I + 1) & 0xff;
 | 
| -#     }
 | 
| -#
 | 
| -# Pipelining this loop isn't easy, because the stores to the S[] array
 | 
| -# need to be observed in the right order.  The loop generated by the
 | 
| -# code below has the following pipeline diagram:
 | 
| -#
 | 
| -#      cycle
 | 
| -#     | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |10 |11 |12 |13 |14 |15 |16 |17 |
 | 
| -# iter
 | 
| -#   1: xxx LDI xxx xxx xxx LDJ xxx SWP xxx LDT xxx xxx
 | 
| -#   2:             xxx LDI xxx xxx xxx LDJ xxx SWP xxx LDT xxx xxx
 | 
| -#   3:                         xxx LDI xxx xxx xxx LDJ xxx SWP xxx LDT xxx xxx
 | 
| -#
 | 
| -#   where:
 | 
| -# 	LDI = load of S[I]
 | 
| -# 	LDJ = load of S[J]
 | 
| -# 	SWP = swap of S[I] and S[J]
 | 
| -# 	LDT = load of S[T]
 | 
| -#
 | 
| -# Note that in the above diagram, the major trouble-spot is that LDI
 | 
| -# of the 2nd iteration is performed BEFORE the SWP of the first
 | 
| -# iteration.  Fortunately, this is easy to detect (I of the 1st
 | 
| -# iteration will be equal to J of the 2nd iteration) and when this
 | 
| -# happens, we simply forward the proper value from the 1st iteration
 | 
| -# to the 2nd one.  The proper value in this case is simply the value
 | 
| -# of S[I] from the first iteration (thanks to the fact that SWP
 | 
| -# simply swaps the contents of S[I] and S[J]).
 | 
| -#
 | 
| -# Another potential trouble-spot is in cycle 7, where SWP of the 1st
 | 
| -# iteration issues at the same time as the LDI of the 3rd iteration.
 | 
| -# However, thanks to IA-64 execution semantics, this can be taken
 | 
| -# care of simply by placing LDI later in the instruction-group than
 | 
| -# SWP.  IA-64 CPUs will automatically forward the value if they
 | 
| -# detect that the SWP and LDI are accessing the same memory-location.
 | 
| -
 | 
| -# The core-loop that can be pipelined then looks like this (annotated
 | 
| -# with McKinley/Madison issue port & latency numbers, assuming L1
 | 
| -# cache hits for the most part):
 | 
| -
 | 
| -# operation:	    instruction:		    issue-ports:  latency
 | 
| -# ------------------  -----------------------------   ------------- -------
 | 
| -
 | 
| -# Data = *inp++       ld1 data = [inp], 1             M0-M1         1 cyc     c0
 | 
| -#                     shladd Iptr = I, KeyTable, 3    M0-M3, I0, I1 1 cyc
 | 
| -# I = (I + 1) & 0xff  padd1 nextI = I, one            M0-M3, I0, I1 3 cyc
 | 
| -#                     ;;
 | 
| -# SI = S[I]           ld8 SI = [Iptr]                 M0-M1         1 cyc     c1 * after SWAP!
 | 
| -#                     ;;
 | 
| -#                     cmp.eq.unc pBypass = I, J                                  * after J is valid!
 | 
| -# J = SI + J          add J = J, SI                   M0-M3, I0, I1 1 cyc     c2
 | 
| -#                     (pBypass) br.cond.spnt Bypass
 | 
| -#                     ;;
 | 
| -# ---------------------------------------------------------------------------------------
 | 
| -# J = J & 0xff        zxt1 J = J                      I0, I1, 1 cyc           c3
 | 
| -#                     ;;
 | 
| -#                     shladd Jptr = J, KeyTable, 3    M0-M3, I0, I1 1 cyc     c4
 | 
| -#                     ;;
 | 
| -# SJ = S[J]           ld8 SJ = [Jptr]                 M0-M1         1 cyc     c5
 | 
| -#                     ;;
 | 
| -# ---------------------------------------------------------------------------------------
 | 
| -# T = (SI + SJ)       add T = SI, SJ                  M0-M3, I0, I1 1 cyc     c6
 | 
| -#                     ;;
 | 
| -# T = T & 0xff        zxt1 T = T                      I0, I1        1 cyc
 | 
| -# S[I] = SJ           st8 [Iptr] = SJ                 M2-M3                   c7
 | 
| -# S[J] = SI           st8 [Jptr] = SI                 M2-M3
 | 
| -#                     ;;
 | 
| -#                     shladd Tptr = T, KeyTable, 3    M0-M3, I0, I1 1 cyc     c8
 | 
| -#                     ;;
 | 
| -# ---------------------------------------------------------------------------------------
 | 
| -# T = S[T]            ld8 T = [Tptr]                  M0-M1         1 cyc     c9
 | 
| -#                     ;;
 | 
| -# data ^= T           xor data = data, T              M0-M3, I0, I1 1 cyc     c10
 | 
| -#                     ;;
 | 
| -# *out++ = Data ^ T   dep word = word, data, 8, POS   I0, I1        1 cyc     c11
 | 
| -#                     ;;
 | 
| -# ---------------------------------------------------------------------------------------
 | 
| -
 | 
| -# There are several points worth making here:
 | 
| -
 | 
| -#   - Note that due to the bypass/forwarding-path, the first two
 | 
| -#     phases of the loop are strangly mingled together.  In
 | 
| -#     particular, note that the first stage of the pipeline is
 | 
| -#     using the value of "J", as calculated by the second stage.
 | 
| -#   - Each bundle-pair will have exactly 6 instructions.
 | 
| -#   - Pipelined, the loop can execute in 3 cycles/iteration and
 | 
| -#     4 stages.  However, McKinley/Madison can issue "st1" to
 | 
| -#     the same bank at a rate of at most one per 4 cycles.  Thus,
 | 
| -#     instead of storing each byte, we accumulate them in a word
 | 
| -#     and then write them back at once with a single "st8" (this
 | 
| -#     implies that the setup code needs to ensure that the output
 | 
| -#     buffer is properly aligned, if need be, by encoding the
 | 
| -#     first few bytes separately).
 | 
| -#   - There is no space for a "br.ctop" instruction.  For this
 | 
| -#     reason we can't use module-loop support in IA-64 and have
 | 
| -#     to do a traditional, purely software-pipelined loop.
 | 
| -#   - We can't replace any of the remaining "add/zxt1" pairs with
 | 
| -#     "padd1" because the latency for that instruction is too high
 | 
| -#     and would push the loop to the point where more bypasses
 | 
| -#     would be needed, which we don't have space for.
 | 
| -#   - The above loop runs at around 3.26 cycles/byte, or roughly
 | 
| -#     440 MByte/sec on a 1.5GHz Madison.  This is well below the
 | 
| -#     system bus bandwidth and hence with judicious use of
 | 
| -#     "lfetch" this loop can run at (almost) peak speed even when
 | 
| -#     the input and output data reside in memory.  The
 | 
| -#     max. latency that can be tolerated is (PREFETCH_DISTANCE *
 | 
| -#     L2_LINE_SIZE * 3 cyc), or about 384 cycles assuming (at
 | 
| -#     least) 1-ahead prefetching of 128 byte cache-lines.  Note
 | 
| -#     that we do NOT prefetch into L1, since that would only
 | 
| -#     interfere with the S[] table values stored there.  This is
 | 
| -#     acceptable because there is a 10 cycle latency between
 | 
| -#     load and first use of the input data.
 | 
| -#   - We use a branch to out-of-line bypass-code of cycle-pressure:
 | 
| -#     we calculate the next J, check for the need to activate the
 | 
| -#     bypass path, and activate the bypass path ALL IN THE SAME
 | 
| -#     CYCLE.  If we didn't have these constraints, we could do
 | 
| -#     the bypass with a simple conditional move instruction.
 | 
| -#     Fortunately, the bypass paths get activated relatively
 | 
| -#     infrequently, so the extra branches don't cost all that much
 | 
| -#     (about 0.04 cycles/byte, measured on a 16396 byte file with
 | 
| -#     random input data).
 | 
| -#
 | 
| -
 | 
| -$phases = 4;		# number of stages/phases in the pipelined-loop
 | 
| -$unroll_count = 6;	# number of times we unrolled it
 | 
| -$pComI = (1 << 0);
 | 
| -$pComJ = (1 << 1);
 | 
| -$pComT = (1 << 2);
 | 
| -$pOut  = (1 << 3);
 | 
| -
 | 
| -$NData = 4;
 | 
| -$NIP = 3;
 | 
| -$NJP = 2;
 | 
| -$NI = 2;
 | 
| -$NSI = 3;
 | 
| -$NSJ = 2;
 | 
| -$NT = 2;
 | 
| -$NOutWord = 2;
 | 
| -
 | 
| -#
 | 
| -# $threshold is the minimum length before we attempt to use the
 | 
| -# big software-pipelined loop.  It MUST be greater-or-equal
 | 
| -# to:
 | 
| -#  		PHASES * (UNROLL_COUNT + 1) + 7
 | 
| -#
 | 
| -# The "+ 7" comes from the fact we may have to encode up to
 | 
| -#   7 bytes separately before the output pointer is aligned.
 | 
| -#
 | 
| -$threshold = (3 * ($phases * ($unroll_count + 1)) + 7);
 | 
| -
 | 
| -sub I {
 | 
| -    local *code = shift;
 | 
| -    local $format = shift;
 | 
| -    $code .= sprintf ("\t\t".$format."\n", @_);
 | 
| -}
 | 
| -
 | 
| -sub P {
 | 
| -    local *code = shift;
 | 
| -    local $format = shift;
 | 
| -    $code .= sprintf ($format."\n", @_);
 | 
| -}
 | 
| -
 | 
| -sub STOP {
 | 
| -    local *code = shift;
 | 
| -    $code .=<<___;
 | 
| -		;;
 | 
| -___
 | 
| -}
 | 
| -
 | 
| -sub emit_body {
 | 
| -    local *c = shift;
 | 
| -    local *bypass = shift;
 | 
| -    local ($iteration, $p) = @_;
 | 
| -
 | 
| -    local $i0 = $iteration;
 | 
| -    local $i1 = $iteration - 1;
 | 
| -    local $i2 = $iteration - 2;
 | 
| -    local $i3 = $iteration - 3;
 | 
| -    local $iw0 = ($iteration - 3) / 8;
 | 
| -    local $iw1 = ($iteration > 3) ? ($iteration - 4) / 8 : 1;
 | 
| -    local $byte_num = ($iteration - 3) % 8;
 | 
| -    local $label = $iteration + 1;
 | 
| -    local $pAny = ($p & 0xf) == 0xf;
 | 
| -    local $pByp = (($p & $pComI) && ($iteration > 0));
 | 
| -
 | 
| -    $c.=<<___;
 | 
| -//////////////////////////////////////////////////
 | 
| -___
 | 
| -
 | 
| -    if (($p & 0xf) == 0) {
 | 
| -	$c.="#ifdef HOST_IS_BIG_ENDIAN\n";
 | 
| -	&I(\$c,"shr.u	OutWord[%u] = OutWord[%u], 32;;",
 | 
| -				$iw1 % $NOutWord, $iw1 % $NOutWord);
 | 
| -	$c.="#endif\n";
 | 
| -	&I(\$c, "st4 [OutPtr] = OutWord[%u], 4", $iw1 % $NOutWord);
 | 
| -	return;
 | 
| -    }
 | 
| -
 | 
| -    # Cycle 0
 | 
| -    &I(\$c, "{ .mmi")					      if ($pAny);
 | 
| -    &I(\$c, "ld1    Data[%u] = [InPtr], 1", $i0 % $NData)     if ($p & $pComI);
 | 
| -    &I(\$c, "padd1  I[%u] = One, I[%u]", $i0 % $NI, $i1 % $NI)if ($p & $pComI);
 | 
| -    &I(\$c, "zxt1   J = J")				      if ($p & $pComJ);
 | 
| -    &I(\$c, "}")					      if ($pAny);
 | 
| -    &I(\$c, "{ .mmi")					      if ($pAny);
 | 
| -    &I(\$c, "LKEY   T[%u] = [T[%u]]", $i1 % $NT, $i1 % $NT)   if ($p & $pOut);
 | 
| -    &I(\$c, "add    T[%u] = SI[%u], SJ[%u]",
 | 
| -       $i0 % $NT, $i2 % $NSI, $i1 % $NSJ)		      if ($p & $pComT);
 | 
| -    &I(\$c, "KEYADDR(IPr[%u], I[%u])", $i0 % $NIP, $i1 % $NI) if ($p & $pComI);
 | 
| -    &I(\$c, "}")					      if ($pAny);
 | 
| -    &STOP(\$c);
 | 
| -
 | 
| -    # Cycle 1
 | 
| -    &I(\$c, "{ .mmi")					      if ($pAny);
 | 
| -    &I(\$c, "SKEY   [IPr[%u]] = SJ[%u]", $i2 % $NIP, $i1%$NSJ)if ($p & $pComT);
 | 
| -    &I(\$c, "SKEY   [JP[%u]] = SI[%u]", $i1 % $NJP, $i2%$NSI) if ($p & $pComT);
 | 
| -    &I(\$c, "zxt1   T[%u] = T[%u]", $i0 % $NT, $i0 % $NT)     if ($p & $pComT);
 | 
| -    &I(\$c, "}")					      if ($pAny);
 | 
| -    &I(\$c, "{ .mmi")					      if ($pAny);
 | 
| -    &I(\$c, "LKEY   SI[%u] = [IPr[%u]]", $i0 % $NSI, $i0%$NIP)if ($p & $pComI);
 | 
| -    &I(\$c, "KEYADDR(JP[%u], J)", $i0 % $NJP)		      if ($p & $pComJ);
 | 
| -    &I(\$c, "xor    Data[%u] = Data[%u], T[%u]",
 | 
| -       $i3 % $NData, $i3 % $NData, $i1 % $NT)		      if ($p & $pOut);
 | 
| -    &I(\$c, "}")					      if ($pAny);
 | 
| -    &STOP(\$c);
 | 
| -
 | 
| -    # Cycle 2
 | 
| -    &I(\$c, "{ .mmi")					      if ($pAny);
 | 
| -    &I(\$c, "LKEY   SJ[%u] = [JP[%u]]", $i0 % $NSJ, $i0%$NJP) if ($p & $pComJ);
 | 
| -    &I(\$c, "cmp.eq pBypass, p0 = I[%u], J", $i1 % $NI)	      if ($pByp);
 | 
| -    &I(\$c, "dep OutWord[%u] = Data[%u], OutWord[%u], BYTE_POS(%u), 8",
 | 
| -       $iw0%$NOutWord, $i3%$NData, $iw1%$NOutWord, $byte_num) if ($p & $pOut);
 | 
| -    &I(\$c, "}")					      if ($pAny);
 | 
| -    &I(\$c, "{ .mmb")					      if ($pAny);
 | 
| -    &I(\$c, "add    J = J, SI[%u]", $i0 % $NSI)		      if ($p & $pComI);
 | 
| -    &I(\$c, "KEYADDR(T[%u], T[%u])", $i0 % $NT, $i0 % $NT)    if ($p & $pComT);
 | 
| -    &P(\$c, "(pBypass)\tbr.cond.spnt.many .rc4Bypass%u",$label)if ($pByp);
 | 
| -    &I(\$c, "}") if ($pAny);
 | 
| -    &STOP(\$c);
 | 
| -
 | 
| -    &P(\$c, ".rc4Resume%u:", $label)			      if ($pByp);
 | 
| -    if ($byte_num == 0 && $iteration >= $phases) {
 | 
| -	&I(\$c, "st8 [OutPtr] = OutWord[%u], 8",
 | 
| -	   $iw1 % $NOutWord)				      if ($p & $pOut);
 | 
| -	if ($iteration == (1 + $unroll_count) * $phases - 1) {
 | 
| -	    if ($unroll_count == 6) {
 | 
| -		&I(\$c, "mov OutWord[%u] = OutWord[%u]",
 | 
| -		   $iw1 % $NOutWord, $iw0 % $NOutWord);
 | 
| -	    }
 | 
| -	    &I(\$c, "lfetch.nt1 [InPrefetch], %u",
 | 
| -	       $unroll_count * $phases);
 | 
| -	    &I(\$c, "lfetch.excl.nt1 [OutPrefetch], %u",
 | 
| -	       $unroll_count * $phases);
 | 
| -	    &I(\$c, "br.cloop.sptk.few .rc4Loop");
 | 
| -	}
 | 
| -    }
 | 
| -
 | 
| -    if ($pByp) {
 | 
| -	&P(\$bypass, ".rc4Bypass%u:", $label);
 | 
| -	&I(\$bypass, "sub J = J, SI[%u]", $i0 % $NSI);
 | 
| -	&I(\$bypass, "nop 0");
 | 
| -	&I(\$bypass, "nop 0");
 | 
| -	&I(\$bypass, ";;");
 | 
| -	&I(\$bypass, "add J = J, SI[%u]", $i1 % $NSI);
 | 
| -	&I(\$bypass, "mov SI[%u] = SI[%u]", $i0 % $NSI, $i1 % $NSI);
 | 
| -	&I(\$bypass, "br.sptk.many .rc4Resume%u\n", $label);
 | 
| -	&I(\$bypass, ";;");
 | 
| -    }
 | 
| -}
 | 
| -
 | 
| -$code=<<___;
 | 
| -.ident \"rc4-ia64.s, version 3.0\"
 | 
| -.ident \"Copyright (c) 2005 Hewlett-Packard Development Company, L.P.\"
 | 
| -
 | 
| -#define LCSave		r8
 | 
| -#define PRSave		r9
 | 
| -
 | 
| -/* Inputs become invalid once rotation begins!  */
 | 
| -
 | 
| -#define StateTable	in0
 | 
| -#define DataLen		in1
 | 
| -#define InputBuffer	in2
 | 
| -#define OutputBuffer	in3
 | 
| -
 | 
| -#define KTable		r14
 | 
| -#define J		r15
 | 
| -#define InPtr		r16
 | 
| -#define OutPtr		r17
 | 
| -#define InPrefetch	r18
 | 
| -#define OutPrefetch	r19
 | 
| -#define One		r20
 | 
| -#define LoopCount	r21
 | 
| -#define Remainder	r22
 | 
| -#define IFinal		r23
 | 
| -#define EndPtr		r24
 | 
| -
 | 
| -#define tmp0		r25
 | 
| -#define tmp1		r26
 | 
| -
 | 
| -#define pBypass		p6
 | 
| -#define pDone		p7
 | 
| -#define pSmall		p8
 | 
| -#define pAligned	p9
 | 
| -#define pUnaligned	p10
 | 
| -
 | 
| -#define pComputeI	pPhase[0]
 | 
| -#define pComputeJ	pPhase[1]
 | 
| -#define pComputeT	pPhase[2]
 | 
| -#define pOutput		pPhase[3]
 | 
| -
 | 
| -#define RetVal		r8
 | 
| -#define L_OK		p7
 | 
| -#define L_NOK		p8
 | 
| -
 | 
| -#define	_NINPUTS	4
 | 
| -#define	_NOUTPUT	0
 | 
| -
 | 
| -#define	_NROTATE	24
 | 
| -#define	_NLOCALS	(_NROTATE - _NINPUTS - _NOUTPUT)
 | 
| -
 | 
| -#ifndef SZ
 | 
| -# define SZ	4	// this must be set to sizeof(RC4_INT)
 | 
| -#endif
 | 
| -
 | 
| -#if SZ == 1
 | 
| -# define LKEY			ld1
 | 
| -# define SKEY			st1
 | 
| -# define KEYADDR(dst, i)	add dst = i, KTable
 | 
| -#elif SZ == 2
 | 
| -# define LKEY			ld2
 | 
| -# define SKEY			st2
 | 
| -# define KEYADDR(dst, i)	shladd dst = i, 1, KTable
 | 
| -#elif SZ == 4
 | 
| -# define LKEY			ld4
 | 
| -# define SKEY			st4
 | 
| -# define KEYADDR(dst, i)	shladd dst = i, 2, KTable
 | 
| -#else
 | 
| -# define LKEY			ld8
 | 
| -# define SKEY			st8
 | 
| -# define KEYADDR(dst, i)	shladd dst = i, 3, KTable
 | 
| -#endif
 | 
| -
 | 
| -#if defined(_HPUX_SOURCE) && !defined(_LP64)
 | 
| -# define ADDP	addp4
 | 
| -#else
 | 
| -# define ADDP	add
 | 
| -#endif
 | 
| -
 | 
| -/* Define a macro for the bit number of the n-th byte: */
 | 
| -
 | 
| -#if defined(_HPUX_SOURCE) || defined(B_ENDIAN)
 | 
| -# define HOST_IS_BIG_ENDIAN
 | 
| -# define BYTE_POS(n)	(56 - (8 * (n)))
 | 
| -#else
 | 
| -# define BYTE_POS(n)	(8 * (n))
 | 
| -#endif
 | 
| -
 | 
| -/*
 | 
| -   We must perform the first phase of the pipeline explicitly since
 | 
| -   we will always load from the stable the first time. The br.cexit
 | 
| -   will never be taken since regardless of the number of bytes because
 | 
| -   the epilogue count is 4.
 | 
| -*/
 | 
| -/* MODSCHED_RC4 macro was split to _PROLOGUE and _LOOP, because HP-UX
 | 
| -   assembler failed on original macro with syntax error. <appro> */
 | 
| -#define MODSCHED_RC4_PROLOGUE						   \\
 | 
| -	{								   \\
 | 
| -				ld1		Data[0] = [InPtr], 1;	   \\
 | 
| -				add		IFinal = 1, I[1];	   \\
 | 
| -				KEYADDR(IPr[0], I[1]);			   \\
 | 
| -	} ;;								   \\
 | 
| -	{								   \\
 | 
| -				LKEY		SI[0] = [IPr[0]];	   \\
 | 
| -				mov		pr.rot = 0x10000;	   \\
 | 
| -				mov		ar.ec = 4;		   \\
 | 
| -	} ;;								   \\
 | 
| -	{								   \\
 | 
| -				add		J = J, SI[0];		   \\
 | 
| -				zxt1		I[0] = IFinal;		   \\
 | 
| -				br.cexit.spnt.few .+16; /* never taken */  \\
 | 
| -	} ;;
 | 
| -#define MODSCHED_RC4_LOOP(label)					   \\
 | 
| -label:									   \\
 | 
| -	{	.mmi;							   \\
 | 
| -		(pComputeI)	ld1		Data[0] = [InPtr], 1;	   \\
 | 
| -		(pComputeI)	add		IFinal = 1, I[1];	   \\
 | 
| -		(pComputeJ)	zxt1		J = J;			   \\
 | 
| -	}{	.mmi;							   \\
 | 
| -		(pOutput)	LKEY		T[1] = [T[1]];		   \\
 | 
| -		(pComputeT)	add		T[0] = SI[2], SJ[1];	   \\
 | 
| -		(pComputeI)	KEYADDR(IPr[0], I[1]);			   \\
 | 
| -	} ;;								   \\
 | 
| -	{	.mmi;							   \\
 | 
| -		(pComputeT)	SKEY		[IPr[2]] = SJ[1];	   \\
 | 
| -		(pComputeT)	SKEY		[JP[1]] = SI[2];	   \\
 | 
| -		(pComputeT)	zxt1		T[0] = T[0];		   \\
 | 
| -	}{	.mmi;							   \\
 | 
| -		(pComputeI)	LKEY		SI[0] = [IPr[0]];	   \\
 | 
| -		(pComputeJ)	KEYADDR(JP[0], J);			   \\
 | 
| -		(pComputeI)	cmp.eq.unc	pBypass, p0 = I[1], J;	   \\
 | 
| -	} ;;								   \\
 | 
| -	{	.mmi;							   \\
 | 
| -		(pComputeJ)	LKEY		SJ[0] = [JP[0]];	   \\
 | 
| -		(pOutput)	xor		Data[3] = Data[3], T[1];   \\
 | 
| -				nop		0x0;			   \\
 | 
| -	}{	.mmi;							   \\
 | 
| -		(pComputeT)	KEYADDR(T[0], T[0]);			   \\
 | 
| -		(pBypass)	mov		SI[0] = SI[1];		   \\
 | 
| -		(pComputeI)	zxt1		I[0] = IFinal;		   \\
 | 
| -	} ;;								   \\
 | 
| -	{	.mmb;							   \\
 | 
| -		(pOutput)	st1		[OutPtr] = Data[3], 1;	   \\
 | 
| -		(pComputeI)	add		J = J, SI[0];		   \\
 | 
| -				br.ctop.sptk.few label;			   \\
 | 
| -	} ;;
 | 
| -
 | 
| -	.text
 | 
| -
 | 
| -	.align	32
 | 
| -
 | 
| -	.type	RC4, \@function
 | 
| -	.global	RC4
 | 
| -
 | 
| -	.proc	RC4
 | 
| -	.prologue
 | 
| -
 | 
| -RC4:
 | 
| -	{
 | 
| -	  	.mmi
 | 
| -		alloc	r2 = ar.pfs, _NINPUTS, _NLOCALS, _NOUTPUT, _NROTATE
 | 
| -
 | 
| -		.rotr Data[4], I[2], IPr[3], SI[3], JP[2], SJ[2], T[2], \\
 | 
| -		      OutWord[2]
 | 
| -		.rotp pPhase[4]
 | 
| -
 | 
| -		ADDP		InPrefetch = 0, InputBuffer
 | 
| -		ADDP		KTable = 0, StateTable
 | 
| -	}
 | 
| -	{
 | 
| -		.mmi
 | 
| -		ADDP		InPtr = 0, InputBuffer
 | 
| -		ADDP		OutPtr = 0, OutputBuffer
 | 
| -		mov		RetVal = r0
 | 
| -	}
 | 
| -	;;
 | 
| -	{
 | 
| -		.mmi
 | 
| -		lfetch.nt1	[InPrefetch], 0x80
 | 
| -		ADDP		OutPrefetch = 0, OutputBuffer
 | 
| -	}
 | 
| -	{               // Return 0 if the input length is nonsensical
 | 
| -        	.mib
 | 
| -		ADDP		StateTable = 0, StateTable
 | 
| -        	cmp.ge.unc  	L_NOK, L_OK = r0, DataLen
 | 
| -	(L_NOK) br.ret.sptk.few rp
 | 
| -	}
 | 
| -	;;
 | 
| -	{
 | 
| -        	.mib
 | 
| -        	cmp.eq.or  	L_NOK, L_OK = r0, InPtr
 | 
| -        	cmp.eq.or  	L_NOK, L_OK = r0, OutPtr
 | 
| -		nop		0x0
 | 
| -	}
 | 
| -	{
 | 
| -		.mib
 | 
| -        	cmp.eq.or  	L_NOK, L_OK = r0, StateTable
 | 
| -		nop		0x0
 | 
| -	(L_NOK) br.ret.sptk.few rp
 | 
| -	}
 | 
| -	;;
 | 
| -		LKEY		I[1] = [KTable], SZ
 | 
| -/* Prefetch the state-table. It contains 256 elements of size SZ */
 | 
| -
 | 
| -#if SZ == 1
 | 
| -		ADDP		tmp0 = 1*128, StateTable
 | 
| -#elif SZ == 2
 | 
| -		ADDP		tmp0 = 3*128, StateTable
 | 
| -		ADDP		tmp1 = 2*128, StateTable
 | 
| -#elif SZ == 4
 | 
| -		ADDP		tmp0 = 7*128, StateTable
 | 
| -		ADDP		tmp1 = 6*128, StateTable
 | 
| -#elif SZ == 8
 | 
| -		ADDP		tmp0 = 15*128, StateTable
 | 
| -		ADDP		tmp1 = 14*128, StateTable
 | 
| -#endif
 | 
| -		;;
 | 
| -#if SZ >= 8
 | 
| -		lfetch.fault.nt1		[tmp0], -256	// 15
 | 
| -		lfetch.fault.nt1		[tmp1], -256;;
 | 
| -		lfetch.fault.nt1		[tmp0], -256	// 13
 | 
| -		lfetch.fault.nt1		[tmp1], -256;;
 | 
| -		lfetch.fault.nt1		[tmp0], -256	// 11
 | 
| -		lfetch.fault.nt1		[tmp1], -256;;
 | 
| -		lfetch.fault.nt1		[tmp0], -256	//  9
 | 
| -		lfetch.fault.nt1		[tmp1], -256;;
 | 
| -#endif
 | 
| -#if SZ >= 4
 | 
| -		lfetch.fault.nt1		[tmp0], -256	//  7
 | 
| -		lfetch.fault.nt1		[tmp1], -256;;
 | 
| -		lfetch.fault.nt1		[tmp0], -256	//  5
 | 
| -		lfetch.fault.nt1		[tmp1], -256;;
 | 
| -#endif
 | 
| -#if SZ >= 2
 | 
| -		lfetch.fault.nt1		[tmp0], -256	//  3
 | 
| -		lfetch.fault.nt1		[tmp1], -256;;
 | 
| -#endif
 | 
| -	{
 | 
| -		.mii
 | 
| -		lfetch.fault.nt1		[tmp0]		//  1
 | 
| -		add		I[1]=1,I[1];;
 | 
| -		zxt1		I[1]=I[1]
 | 
| -	}
 | 
| -	{
 | 
| -		.mmi
 | 
| -		lfetch.nt1	[InPrefetch], 0x80
 | 
| -		lfetch.excl.nt1	[OutPrefetch], 0x80
 | 
| -		.save		pr, PRSave
 | 
| -		mov		PRSave = pr
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mmi
 | 
| -		lfetch.excl.nt1	[OutPrefetch], 0x80
 | 
| -		LKEY		J = [KTable], SZ
 | 
| -		ADDP		EndPtr = DataLen, InPtr
 | 
| -	}  ;;
 | 
| -	{
 | 
| -		.mmi
 | 
| -		ADDP		EndPtr = -1, EndPtr	// Make it point to
 | 
| -							// last data byte.
 | 
| -		mov		One = 1
 | 
| -		.save		ar.lc, LCSave
 | 
| -		mov		LCSave = ar.lc
 | 
| -		.body
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mmb
 | 
| -		sub		Remainder = 0, OutPtr
 | 
| -		cmp.gtu		pSmall, p0 = $threshold, DataLen
 | 
| -(pSmall)	br.cond.dpnt	.rc4Remainder		// Data too small for
 | 
| -							// big loop.
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mmi
 | 
| -		and		Remainder = 0x7, Remainder
 | 
| -		;;
 | 
| -		cmp.eq		pAligned, pUnaligned = Remainder, r0
 | 
| -		nop		0x0
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mmb
 | 
| -.pred.rel	"mutex",pUnaligned,pAligned
 | 
| -(pUnaligned)	add		Remainder = -1, Remainder
 | 
| -(pAligned)	sub		Remainder = EndPtr, InPtr
 | 
| -(pAligned)	br.cond.dptk.many .rc4Aligned
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mmi
 | 
| -		nop		0x0
 | 
| -		nop		0x0
 | 
| -		mov.i		ar.lc = Remainder
 | 
| -	}
 | 
| -
 | 
| -/* Do the initial few bytes via the compact, modulo-scheduled loop
 | 
| -   until the output pointer is 8-byte-aligned.  */
 | 
| -
 | 
| -		MODSCHED_RC4_PROLOGUE
 | 
| -		MODSCHED_RC4_LOOP(.RC4AlignLoop)
 | 
| -
 | 
| -	{
 | 
| -		.mib
 | 
| -		sub		Remainder = EndPtr, InPtr
 | 
| -		zxt1		IFinal = IFinal
 | 
| -		clrrrb				// Clear CFM.rrb.pr so
 | 
| -		;;				// next "mov pr.rot = N"
 | 
| -						// does the right thing.
 | 
| -	}
 | 
| -	{
 | 
| -		.mmi
 | 
| -		mov		I[1] = IFinal
 | 
| -		nop		0x0
 | 
| -		nop		0x0
 | 
| -	} ;;
 | 
| -
 | 
| -
 | 
| -.rc4Aligned:
 | 
| -
 | 
| -/*
 | 
| -   Unrolled loop count = (Remainder - ($unroll_count+1)*$phases)/($unroll_count*$phases)
 | 
| - */
 | 
| -
 | 
| -	{
 | 
| -		.mlx
 | 
| -		add	LoopCount = 1 - ($unroll_count + 1)*$phases, Remainder
 | 
| -		movl		Remainder = 0xaaaaaaaaaaaaaaab
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mmi
 | 
| -		setf.sig	f6 = LoopCount		// M2, M3	6 cyc
 | 
| -		setf.sig	f7 = Remainder		// M2, M3	6 cyc
 | 
| -		nop		0x0
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mfb
 | 
| -		nop		0x0
 | 
| -		xmpy.hu		f6 = f6, f7
 | 
| -		nop		0x0
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mmi
 | 
| -		getf.sig	LoopCount = f6;;	// M2		5 cyc
 | 
| -		nop		0x0
 | 
| -		shr.u		LoopCount = LoopCount, 4
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mmi
 | 
| -		nop		0x0
 | 
| -		nop		0x0
 | 
| -		mov.i		ar.lc = LoopCount
 | 
| -	} ;;
 | 
| -
 | 
| -/* Now comes the unrolled loop: */
 | 
| -
 | 
| -.rc4Prologue:
 | 
| -___
 | 
| -
 | 
| -$iteration = 0;
 | 
| -
 | 
| -# Generate the prologue:
 | 
| -$predicates = 1;
 | 
| -for ($i = 0; $i < $phases; ++$i) {
 | 
| -    &emit_body (\$code, \$bypass, $iteration++, $predicates);
 | 
| -    $predicates = ($predicates << 1) | 1;
 | 
| -}
 | 
| -
 | 
| -$code.=<<___;
 | 
| -.rc4Loop:
 | 
| -___
 | 
| -
 | 
| -# Generate the body:
 | 
| -for ($i = 0; $i < $unroll_count*$phases; ++$i) {
 | 
| -    &emit_body (\$code, \$bypass, $iteration++, $predicates);
 | 
| -}
 | 
| -
 | 
| -$code.=<<___;
 | 
| -.rc4Epilogue:
 | 
| -___
 | 
| -
 | 
| -# Generate the epilogue:
 | 
| -for ($i = 0; $i < $phases; ++$i) {
 | 
| -    $predicates <<= 1;
 | 
| -    &emit_body (\$code, \$bypass, $iteration++, $predicates);
 | 
| -}
 | 
| -
 | 
| -$code.=<<___;
 | 
| -	{
 | 
| -		.mmi
 | 
| -		lfetch.nt1	[EndPtr]	// fetch line with last byte
 | 
| -		mov		IFinal = I[1]
 | 
| -		nop		0x0
 | 
| -	}
 | 
| -
 | 
| -.rc4Remainder:
 | 
| -	{
 | 
| -		.mmi
 | 
| -		sub		Remainder = EndPtr, InPtr	// Calculate
 | 
| -								// # of bytes
 | 
| -								// left - 1
 | 
| -		nop		0x0
 | 
| -		nop		0x0
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mib
 | 
| -		cmp.eq		pDone, p0 = -1, Remainder // done already?
 | 
| -		mov.i		ar.lc = Remainder
 | 
| -(pDone)		br.cond.dptk.few .rc4Complete
 | 
| -	}
 | 
| -
 | 
| -/* Do the remaining bytes via the compact, modulo-scheduled loop */
 | 
| -
 | 
| -		MODSCHED_RC4_PROLOGUE
 | 
| -		MODSCHED_RC4_LOOP(.RC4RestLoop)
 | 
| -
 | 
| -.rc4Complete:
 | 
| -	{
 | 
| -		.mmi
 | 
| -		add		KTable = -SZ, KTable
 | 
| -		add		IFinal = -1, IFinal
 | 
| -		mov		ar.lc = LCSave
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mii
 | 
| -		SKEY		[KTable] = J,-SZ
 | 
| -		zxt1		IFinal = IFinal
 | 
| -		mov		pr = PRSave, 0x1FFFF
 | 
| -	} ;;
 | 
| -	{
 | 
| -		.mib
 | 
| -		SKEY		[KTable] = IFinal
 | 
| -		add		RetVal = 1, r0
 | 
| -		br.ret.sptk.few	rp
 | 
| -	} ;;
 | 
| -___
 | 
| -
 | 
| -# Last but not least, emit the code for the bypass-code of the unrolled loop:
 | 
| -
 | 
| -$code.=$bypass;
 | 
| -
 | 
| -$code.=<<___;
 | 
| -	.endp RC4
 | 
| -___
 | 
| -
 | 
| -print $code;
 | 
| 
 |