<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <title>Crypto++: panama.cpp Source File</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <link href="doxygen.css" rel="stylesheet" type="text/css"/> </head> <body> <!-- Generated by Doxygen 1.6.1 --> <div class="navigation" id="top"> <div class="tabs"> <ul> <li><a href="index.html"><span>Main Page</span></a></li> <li><a href="namespaces.html"><span>Namespaces</span></a></li> <li><a href="annotated.html"><span>Classes</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> </ul> </div> <div class="tabs"> <ul> <li><a href="files.html"><span>File List</span></a></li> <li><a href="globals.html"><span>File Members</span></a></li> </ul> </div> <h1>panama.cpp</h1><div class="fragment"><pre class="fragment"><a name="l00001"></a>00001 <span class="comment">// panama.cpp - written and placed in the public domain by Wei Dai</span> <a name="l00002"></a>00002 <a name="l00003"></a>00003 <span class="comment">// use "cl /EP /P /DCRYPTOPP_GENERATE_X64_MASM panama.cpp" to generate MASM code</span> <a name="l00004"></a>00004 <a name="l00005"></a>00005 <span class="preprocessor">#include "pch.h"</span> <a name="l00006"></a>00006 <a name="l00007"></a>00007 <span class="preprocessor">#ifndef CRYPTOPP_GENERATE_X64_MASM</span> <a name="l00008"></a>00008 <span class="preprocessor"></span> <a name="l00009"></a>00009 <span class="preprocessor">#include "panama.h"</span> <a name="l00010"></a>00010 <span class="preprocessor">#include "misc.h"</span> <a name="l00011"></a>00011 <span class="preprocessor">#include "cpu.h"</span> <a name="l00012"></a>00012 <a name="l00013"></a>00013 NAMESPACE_BEGIN(CryptoPP) <a name="l00014"></a>00014 <a name="l00015"></a>00015 template <class B> <a name="l00016"></a>00016 <span class="keywordtype">void</span> <a class="code" href="class_panama.html" title="base class, do not use directly">Panama</a><B>::Reset() <a name="l00017"></a>00017 { <a name="l00018"></a>00018 memset(m_state, 0, m_state.SizeInBytes()); <a name="l00019"></a>00019 <span class="preprocessor">#if CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE</span> <a name="l00020"></a>00020 <span class="preprocessor"></span> m_state[17] = HasSSSE3(); <a name="l00021"></a>00021 <span class="preprocessor">#endif</span> <a name="l00022"></a>00022 <span class="preprocessor"></span>} <a name="l00023"></a>00023 <a name="l00024"></a>00024 <span class="preprocessor">#endif // #ifndef CRYPTOPP_GENERATE_X64_MASM</span> <a name="l00025"></a>00025 <span class="preprocessor"></span> <a name="l00026"></a>00026 <span class="preprocessor">#ifdef CRYPTOPP_X64_MASM_AVAILABLE</span> <a name="l00027"></a>00027 <span class="preprocessor"></span><span class="keyword">extern</span> <span class="stringliteral">"C"</span> { <a name="l00028"></a>00028 <span class="keywordtype">void</span> Panama_SSE2_Pull(<span class="keywordtype">size_t</span> count, word32 *state, word32 *z, <span class="keyword">const</span> word32 *y); <a name="l00029"></a>00029 } <a name="l00030"></a>00030 <span class="preprocessor">#elif CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE</span> <a name="l00031"></a>00031 <span class="preprocessor"></span> <a name="l00032"></a>00032 <span class="preprocessor">#ifdef CRYPTOPP_GENERATE_X64_MASM</span> <a name="l00033"></a>00033 <span class="preprocessor"></span> Panama_SSE2_Pull PROC FRAME <a name="l00034"></a>00034 rex_push_reg rdi <a name="l00035"></a>00035 alloc_stack(2*16) <a name="l00036"></a>00036 save_xmm128 xmm6, 0h <a name="l00037"></a>00037 save_xmm128 xmm7, 10h <a name="l00038"></a>00038 .endprolog <a name="l00039"></a>00039 <span class="preprocessor">#else</span> <a name="l00040"></a>00040 <span class="preprocessor"></span><span class="preprocessor">#pragma warning(disable: 4731) // frame pointer register 'ebp' modified by inline assembly code</span> <a name="l00041"></a>00041 <span class="preprocessor"></span><span class="keywordtype">void</span> CRYPTOPP_NOINLINE Panama_SSE2_Pull(<span class="keywordtype">size_t</span> count, word32 *state, word32 *z, <span class="keyword">const</span> word32 *y) <a name="l00042"></a>00042 { <a name="l00043"></a>00043 <span class="preprocessor">#ifdef __GNUC__</span> <a name="l00044"></a>00044 <span class="preprocessor"></span> __asm__ __volatile__ <a name="l00045"></a>00045 ( <a name="l00046"></a>00046 <span class="stringliteral">".intel_syntax noprefix;"</span> <a name="l00047"></a>00047 AS_PUSH_IF86( bx) <a name="l00048"></a>00048 #<span class="keywordflow">else</span> <a name="l00049"></a>00049 AS2( mov AS_REG_1, count) <a name="l00050"></a>00050 AS2( mov AS_REG_2, state) <a name="l00051"></a>00051 AS2( mov AS_REG_3, z) <a name="l00052"></a>00052 AS2( mov AS_REG_4, y) <a name="l00053"></a>00053 #endif <a name="l00054"></a>00054 #endif <span class="comment">// #ifdef CRYPTOPP_GENERATE_X64_MASM</span> <a name="l00055"></a>00055 <a name="l00056"></a>00056 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_X86 <a name="l00057"></a>00057 #define REG_loopEnd [esp] <a name="l00058"></a>00058 #elif defined(CRYPTOPP_GENERATE_X64_MASM) <a name="l00059"></a>00059 #define REG_loopEnd rdi <a name="l00060"></a>00060 #<span class="keywordflow">else</span> <a name="l00061"></a>00061 #define REG_loopEnd r8 <a name="l00062"></a>00062 #endif <a name="l00063"></a>00063 <a name="l00064"></a>00064 AS2( shl AS_REG_1, 5) <a name="l00065"></a>00065 ASJ( jz, 5, f) <a name="l00066"></a>00066 AS2( mov AS_REG_6d, [AS_REG_2+4*17]) <a name="l00067"></a>00067 AS2( add AS_REG_1, AS_REG_6) <a name="l00068"></a>00068 <a name="l00069"></a>00069 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_X64 <a name="l00070"></a>00070 AS2( mov REG_loopEnd, AS_REG_1) <a name="l00071"></a>00071 #<span class="keywordflow">else</span> <a name="l00072"></a>00072 AS1( push ebp) <a name="l00073"></a>00073 AS1( push AS_REG_1) <a name="l00074"></a>00074 #endif <a name="l00075"></a>00075 <a name="l00076"></a>00076 AS2( movdqa xmm0, XMMWORD_PTR [AS_REG_2+0*16]) <a name="l00077"></a>00077 AS2( movdqa xmm1, XMMWORD_PTR [AS_REG_2+1*16]) <a name="l00078"></a>00078 AS2( movdqa xmm2, XMMWORD_PTR [AS_REG_2+2*16]) <a name="l00079"></a>00079 AS2( movdqa xmm3, XMMWORD_PTR [AS_REG_2+3*16]) <a name="l00080"></a>00080 AS2( mov eax, dword ptr [AS_REG_2+4*16]) <a name="l00081"></a>00081 <a name="l00082"></a>00082 ASL(4) <a name="l00083"></a>00083 <span class="comment">// gamma and pi</span> <a name="l00084"></a>00084 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE <a name="l00085"></a>00085 AS2( test AS_REG_6, 1) <a name="l00086"></a>00086 ASJ( jnz, 6, f) <a name="l00087"></a>00087 #endif <a name="l00088"></a>00088 AS2( movdqa xmm6, xmm2) <a name="l00089"></a>00089 AS2( movss xmm6, xmm3) <a name="l00090"></a>00090 ASS( pshufd xmm5, xmm6, 0, 3, 2, 1) <a name="l00091"></a>00091 AS2( movd xmm6, eax) <a name="l00092"></a>00092 AS2( movdqa xmm7, xmm3) <a name="l00093"></a>00093 AS2( movss xmm7, xmm6) <a name="l00094"></a>00094 ASS( pshufd xmm6, xmm7, 0, 3, 2, 1) <a name="l00095"></a>00095 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE <a name="l00096"></a>00096 ASJ( jmp, 7, f) <a name="l00097"></a>00097 ASL(6) <a name="l00098"></a>00098 AS2( movdqa xmm5, xmm3) <a name="l00099"></a>00099 AS3( palignr xmm5, xmm2, 4) <a name="l00100"></a>00100 AS2( movd xmm6, eax) <a name="l00101"></a>00101 AS3( palignr xmm6, xmm3, 4) <a name="l00102"></a>00102 ASL(7) <a name="l00103"></a>00103 #endif <a name="l00104"></a>00104 <a name="l00105"></a>00105 AS2( movd AS_REG_1d, xmm2) <a name="l00106"></a>00106 AS1( not AS_REG_1d) <a name="l00107"></a>00107 AS2( movd AS_REG_7d, xmm3) <a name="l00108"></a>00108 AS2( or AS_REG_1d, AS_REG_7d) <a name="l00109"></a>00109 AS2( xor eax, AS_REG_1d) <a name="l00110"></a>00110 <a name="l00111"></a>00111 #define SSE2_Index(i) ASM_MOD(((i)*13+16), 17) <a name="l00112"></a>00112 <a name="l00113"></a>00113 #define pi(i) \ <a name="l00114"></a>00114 AS2( movd AS_REG_1d, xmm7)\ <a name="l00115"></a>00115 AS2( rol AS_REG_1d, ASM_MOD((ASM_MOD(5*i,17)*(ASM_MOD(5*i,17)+1)/2), 32))\ <a name="l00116"></a>00116 AS2( mov [AS_REG_2+SSE2_Index(ASM_MOD(5*(i), 17))*4], AS_REG_1d) <a name="l00117"></a>00117 <a name="l00118"></a>00118 #define pi4(x, y, z, a, b, c, d) \ <a name="l00119"></a>00119 AS2( pcmpeqb xmm7, xmm7)\ <a name="l00120"></a>00120 AS2( pxor xmm7, x)\ <a name="l00121"></a>00121 AS2( por xmm7, y)\ <a name="l00122"></a>00122 AS2( pxor xmm7, z)\ <a name="l00123"></a>00123 pi(a)\ <a name="l00124"></a>00124 ASS( pshuflw xmm7, xmm7, 1, 0, 3, 2)\ <a name="l00125"></a>00125 pi(b)\ <a name="l00126"></a>00126 AS2( punpckhqdq xmm7, xmm7)\ <a name="l00127"></a>00127 pi(c)\ <a name="l00128"></a>00128 ASS( pshuflw xmm7, xmm7, 1, 0, 3, 2)\ <a name="l00129"></a>00129 pi(d) <a name="l00130"></a>00130 <a name="l00131"></a>00131 pi4(xmm1, xmm2, xmm3, 1, 5, 9, 13) <a name="l00132"></a>00132 pi4(xmm0, xmm1, xmm2, 2, 6, 10, 14) <a name="l00133"></a>00133 pi4(xmm6, xmm0, xmm1, 3, 7, 11, 15) <a name="l00134"></a>00134 pi4(xmm5, xmm6, xmm0, 4, 8, 12, 16) <a name="l00135"></a>00135 <a name="l00136"></a>00136 <span class="comment">// output keystream and update buffer here to hide partial memory stalls between pi and theta</span> <a name="l00137"></a>00137 AS2( movdqa xmm4, xmm3) <a name="l00138"></a>00138 AS2( punpcklqdq xmm3, xmm2) <span class="comment">// 1 5 2 6</span> <a name="l00139"></a>00139 AS2( punpckhdq xmm4, xmm2) <span class="comment">// 9 10 13 14</span> <a name="l00140"></a>00140 AS2( movdqa xmm2, xmm1) <a name="l00141"></a>00141 AS2( punpcklqdq xmm1, xmm0) <span class="comment">// 3 7 4 8</span> <a name="l00142"></a>00142 AS2( punpckhdq xmm2, xmm0) <span class="comment">// 11 12 15 16</span> <a name="l00143"></a>00143 <a name="l00144"></a>00144 <span class="comment">// keystream</span> <a name="l00145"></a>00145 AS2( test AS_REG_3, AS_REG_3) <a name="l00146"></a>00146 ASJ( jz, 0, f) <a name="l00147"></a>00147 AS2( movdqa xmm6, xmm4) <a name="l00148"></a>00148 AS2( punpcklqdq xmm4, xmm2) <a name="l00149"></a>00149 AS2( punpckhqdq xmm6, xmm2) <a name="l00150"></a>00150 AS2( test AS_REG_4, 15) <a name="l00151"></a>00151 ASJ( jnz, 2, f) <a name="l00152"></a>00152 AS2( test AS_REG_4, AS_REG_4) <a name="l00153"></a>00153 ASJ( jz, 1, f) <a name="l00154"></a>00154 AS2( pxor xmm4, [AS_REG_4]) <a name="l00155"></a>00155 AS2( pxor xmm6, [AS_REG_4+16]) <a name="l00156"></a>00156 AS2( add AS_REG_4, 32) <a name="l00157"></a>00157 ASJ( jmp, 1, f) <a name="l00158"></a>00158 ASL(2) <a name="l00159"></a>00159 AS2( movdqu xmm0, [AS_REG_4]) <a name="l00160"></a>00160 AS2( movdqu xmm2, [AS_REG_4+16]) <a name="l00161"></a>00161 AS2( pxor xmm4, xmm0) <a name="l00162"></a>00162 AS2( pxor xmm6, xmm2) <a name="l00163"></a>00163 AS2( add AS_REG_4, 32) <a name="l00164"></a>00164 ASL(1) <a name="l00165"></a>00165 AS2( test AS_REG_3, 15) <a name="l00166"></a>00166 ASJ( jnz, 3, f) <a name="l00167"></a>00167 AS2( movdqa XMMWORD_PTR [AS_REG_3], xmm4) <a name="l00168"></a>00168 AS2( movdqa XMMWORD_PTR [AS_REG_3+16], xmm6) <a name="l00169"></a>00169 AS2( add AS_REG_3, 32) <a name="l00170"></a>00170 ASJ( jmp, 0, f) <a name="l00171"></a>00171 ASL(3) <a name="l00172"></a>00172 AS2( movdqu XMMWORD_PTR [AS_REG_3], xmm4) <a name="l00173"></a>00173 AS2( movdqu XMMWORD_PTR [AS_REG_3+16], xmm6) <a name="l00174"></a>00174 AS2( add AS_REG_3, 32) <a name="l00175"></a>00175 ASL(0) <a name="l00176"></a>00176 <a name="l00177"></a>00177 <span class="comment">// buffer update</span> <a name="l00178"></a>00178 AS2( lea AS_REG_1, [AS_REG_6 + 32]) <a name="l00179"></a>00179 AS2( and AS_REG_1, 31*32) <a name="l00180"></a>00180 AS2( lea AS_REG_7, [AS_REG_6 + (32-24)*32]) <a name="l00181"></a>00181 AS2( and AS_REG_7, 31*32) <a name="l00182"></a>00182 <a name="l00183"></a>00183 AS2( movdqa xmm0, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+0*8]) <a name="l00184"></a>00184 AS2( pxor xmm3, xmm0) <a name="l00185"></a>00185 ASS( pshufd xmm0, xmm0, 2, 3, 0, 1) <a name="l00186"></a>00186 AS2( movdqa XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+0*8], xmm3) <a name="l00187"></a>00187 AS2( pxor xmm0, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+2*8]) <a name="l00188"></a>00188 AS2( movdqa XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+2*8], xmm0) <a name="l00189"></a>00189 <a name="l00190"></a>00190 AS2( movdqa xmm4, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+2*8]) <a name="l00191"></a>00191 AS2( pxor xmm1, xmm4) <a name="l00192"></a>00192 AS2( movdqa XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+2*8], xmm1) <a name="l00193"></a>00193 AS2( pxor xmm4, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+0*8]) <a name="l00194"></a>00194 AS2( movdqa XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+0*8], xmm4) <a name="l00195"></a>00195 <a name="l00196"></a>00196 <span class="comment">// theta</span> <a name="l00197"></a>00197 AS2( movdqa xmm3, XMMWORD_PTR [AS_REG_2+3*16]) <a name="l00198"></a>00198 AS2( movdqa xmm2, XMMWORD_PTR [AS_REG_2+2*16]) <a name="l00199"></a>00199 AS2( movdqa xmm1, XMMWORD_PTR [AS_REG_2+1*16]) <a name="l00200"></a>00200 AS2( movdqa xmm0, XMMWORD_PTR [AS_REG_2+0*16]) <a name="l00201"></a>00201 <a name="l00202"></a>00202 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE <a name="l00203"></a>00203 AS2( test AS_REG_6, 1) <a name="l00204"></a>00204 ASJ( jnz, 8, f) <a name="l00205"></a>00205 #endif <a name="l00206"></a>00206 AS2( movd xmm6, eax) <a name="l00207"></a>00207 AS2( movdqa xmm7, xmm3) <a name="l00208"></a>00208 AS2( movss xmm7, xmm6) <a name="l00209"></a>00209 AS2( movdqa xmm6, xmm2) <a name="l00210"></a>00210 AS2( movss xmm6, xmm3) <a name="l00211"></a>00211 AS2( movdqa xmm5, xmm1) <a name="l00212"></a>00212 AS2( movss xmm5, xmm2) <a name="l00213"></a>00213 AS2( movdqa xmm4, xmm0) <a name="l00214"></a>00214 AS2( movss xmm4, xmm1) <a name="l00215"></a>00215 ASS( pshufd xmm7, xmm7, 0, 3, 2, 1) <a name="l00216"></a>00216 ASS( pshufd xmm6, xmm6, 0, 3, 2, 1) <a name="l00217"></a>00217 ASS( pshufd xmm5, xmm5, 0, 3, 2, 1) <a name="l00218"></a>00218 ASS( pshufd xmm4, xmm4, 0, 3, 2, 1) <a name="l00219"></a>00219 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE <a name="l00220"></a>00220 ASJ( jmp, 9, f) <a name="l00221"></a>00221 ASL(8) <a name="l00222"></a>00222 AS2( movd xmm7, eax) <a name="l00223"></a>00223 AS3( palignr xmm7, xmm3, 4) <a name="l00224"></a>00224 AS2( movq xmm6, xmm3) <a name="l00225"></a>00225 AS3( palignr xmm6, xmm2, 4) <a name="l00226"></a>00226 AS2( movq xmm5, xmm2) <a name="l00227"></a>00227 AS3( palignr xmm5, xmm1, 4) <a name="l00228"></a>00228 AS2( movq xmm4, xmm1) <a name="l00229"></a>00229 AS3( palignr xmm4, xmm0, 4) <a name="l00230"></a>00230 ASL(9) <a name="l00231"></a>00231 #endif <a name="l00232"></a>00232 <a name="l00233"></a>00233 AS2( xor eax, 1) <a name="l00234"></a>00234 AS2( movd AS_REG_1d, xmm0) <a name="l00235"></a>00235 AS2( xor eax, AS_REG_1d) <a name="l00236"></a>00236 AS2( movd AS_REG_1d, xmm3) <a name="l00237"></a>00237 AS2( xor eax, AS_REG_1d) <a name="l00238"></a>00238 <a name="l00239"></a>00239 AS2( pxor xmm3, xmm2) <a name="l00240"></a>00240 AS2( pxor xmm2, xmm1) <a name="l00241"></a>00241 AS2( pxor xmm1, xmm0) <a name="l00242"></a>00242 AS2( pxor xmm0, xmm7) <a name="l00243"></a>00243 AS2( pxor xmm3, xmm7) <a name="l00244"></a>00244 AS2( pxor xmm2, xmm6) <a name="l00245"></a>00245 AS2( pxor xmm1, xmm5) <a name="l00246"></a>00246 AS2( pxor xmm0, xmm4) <a name="l00247"></a>00247 <a name="l00248"></a>00248 <span class="comment">// sigma</span> <a name="l00249"></a>00249 AS2( lea AS_REG_1, [AS_REG_6 + (32-4)*32]) <a name="l00250"></a>00250 AS2( and AS_REG_1, 31*32) <a name="l00251"></a>00251 AS2( lea AS_REG_7, [AS_REG_6 + 16*32]) <a name="l00252"></a>00252 AS2( and AS_REG_7, 31*32) <a name="l00253"></a>00253 <a name="l00254"></a>00254 AS2( movdqa xmm4, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+0*16]) <a name="l00255"></a>00255 AS2( movdqa xmm5, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+0*16]) <a name="l00256"></a>00256 AS2( movdqa xmm6, xmm4) <a name="l00257"></a>00257 AS2( punpcklqdq xmm4, xmm5) <a name="l00258"></a>00258 AS2( punpckhqdq xmm6, xmm5) <a name="l00259"></a>00259 AS2( pxor xmm3, xmm4) <a name="l00260"></a>00260 AS2( pxor xmm2, xmm6) <a name="l00261"></a>00261 <a name="l00262"></a>00262 AS2( movdqa xmm4, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_1+1*16]) <a name="l00263"></a>00263 AS2( movdqa xmm5, XMMWORD_PTR [AS_REG_2+20*4+AS_REG_7+1*16]) <a name="l00264"></a>00264 AS2( movdqa xmm6, xmm4) <a name="l00265"></a>00265 AS2( punpcklqdq xmm4, xmm5) <a name="l00266"></a>00266 AS2( punpckhqdq xmm6, xmm5) <a name="l00267"></a>00267 AS2( pxor xmm1, xmm4) <a name="l00268"></a>00268 AS2( pxor xmm0, xmm6) <a name="l00269"></a>00269 <a name="l00270"></a>00270 <span class="comment">// loop</span> <a name="l00271"></a>00271 AS2( add AS_REG_6, 32) <a name="l00272"></a>00272 AS2( cmp AS_REG_6, REG_loopEnd) <a name="l00273"></a>00273 ASJ( jne, 4, b) <a name="l00274"></a>00274 <a name="l00275"></a>00275 <span class="comment">// save state</span> <a name="l00276"></a>00276 AS2( mov [AS_REG_2+4*16], eax) <a name="l00277"></a>00277 AS2( movdqa XMMWORD_PTR [AS_REG_2+3*16], xmm3) <a name="l00278"></a>00278 AS2( movdqa XMMWORD_PTR [AS_REG_2+2*16], xmm2) <a name="l00279"></a>00279 AS2( movdqa XMMWORD_PTR [AS_REG_2+1*16], xmm1) <a name="l00280"></a>00280 AS2( movdqa XMMWORD_PTR [AS_REG_2+0*16], xmm0) <a name="l00281"></a>00281 <a name="l00282"></a>00282 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_X86 <a name="l00283"></a>00283 AS2( add esp, 4) <a name="l00284"></a>00284 AS1( pop ebp) <a name="l00285"></a>00285 #endif <a name="l00286"></a>00286 ASL(5) <a name="l00287"></a>00287 <a name="l00288"></a>00288 #ifdef __GNUC__ <a name="l00289"></a>00289 AS_POP_IF86( bx) <a name="l00290"></a>00290 <span class="stringliteral">".att_syntax prefix;"</span> <a name="l00291"></a>00291 : <a name="l00292"></a>00292 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_X64 <a name="l00293"></a>00293 : <span class="stringliteral">"D"</span> (count), <span class="stringliteral">"S"</span> (state), <span class="stringliteral">"d"</span> (z), <span class="stringliteral">"c"</span> (y) <a name="l00294"></a>00294 : <span class="stringliteral">"%r8"</span>, <span class="stringliteral">"%r9"</span>, <span class="stringliteral">"r10"</span>, <span class="stringliteral">"%eax"</span>, <span class="stringliteral">"memory"</span>, <span class="stringliteral">"cc"</span>, <span class="stringliteral">"%xmm0"</span>, <span class="stringliteral">"%xmm1"</span>, <span class="stringliteral">"%xmm2"</span>, <span class="stringliteral">"%xmm3"</span>, <span class="stringliteral">"%xmm4"</span>, <span class="stringliteral">"%xmm5"</span>, <span class="stringliteral">"%xmm6"</span>, <span class="stringliteral">"%xmm7"</span> <a name="l00295"></a>00295 #<span class="keywordflow">else</span> <a name="l00296"></a>00296 : <span class="stringliteral">"c"</span> (count), <span class="stringliteral">"d"</span> (state), <span class="stringliteral">"S"</span> (z), <span class="stringliteral">"D"</span> (y) <a name="l00297"></a>00297 : <span class="stringliteral">"%eax"</span>, <span class="stringliteral">"memory"</span>, <span class="stringliteral">"cc"</span> <a name="l00298"></a>00298 #endif <a name="l00299"></a>00299 ); <a name="l00300"></a>00300 <span class="preprocessor">#endif</span> <a name="l00301"></a>00301 <span class="preprocessor"></span><span class="preprocessor">#ifdef CRYPTOPP_GENERATE_X64_MASM</span> <a name="l00302"></a>00302 <span class="preprocessor"></span> movdqa xmm6, [rsp + 0h] <a name="l00303"></a>00303 movdqa xmm7, [rsp + 10h] <a name="l00304"></a>00304 add rsp, 2*16 <a name="l00305"></a>00305 pop rdi <a name="l00306"></a>00306 ret <a name="l00307"></a>00307 Panama_SSE2_Pull ENDP <a name="l00308"></a>00308 <span class="preprocessor">#else</span> <a name="l00309"></a>00309 <span class="preprocessor"></span>} <a name="l00310"></a>00310 <span class="preprocessor">#endif</span> <a name="l00311"></a>00311 <span class="preprocessor"></span><span class="preprocessor">#endif // #ifdef CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE</span> <a name="l00312"></a>00312 <span class="preprocessor"></span> <a name="l00313"></a>00313 <span class="preprocessor">#ifndef CRYPTOPP_GENERATE_X64_MASM</span> <a name="l00314"></a>00314 <span class="preprocessor"></span> <a name="l00315"></a>00315 <span class="keyword">template</span> <<span class="keyword">class</span> B> <a name="l00316"></a>00316 <span class="keywordtype">void</span> <a class="code" href="class_panama.html" title="base class, do not use directly">Panama<B>::Iterate</a>(<span class="keywordtype">size_t</span> count, <span class="keyword">const</span> word32 *p, word32 *z, <span class="keyword">const</span> word32 *y) <a name="l00317"></a>00317 { <a name="l00318"></a>00318 word32 bstart = m_state[17]; <a name="l00319"></a>00319 word32 *<span class="keyword">const</span> aPtr = m_state; <a name="l00320"></a>00320 word32 cPtr[17]; <a name="l00321"></a>00321 <a name="l00322"></a>00322 <span class="preprocessor">#define bPtr ((byte *)(aPtr+20))</span> <a name="l00323"></a>00323 <span class="preprocessor"></span> <a name="l00324"></a>00324 <span class="comment">// reorder the state for SSE2</span> <a name="l00325"></a>00325 <span class="comment">// a and c: 4 8 12 16 | 3 7 11 15 | 2 6 10 14 | 1 5 9 13 | 0</span> <a name="l00326"></a>00326 <span class="comment">// xmm0 xmm1 xmm2 xmm3 eax</span> <a name="l00327"></a>00327 <span class="preprocessor">#define a(i) aPtr[((i)*13+16) % 17] // 13 is inverse of 4 mod 17</span> <a name="l00328"></a>00328 <span class="preprocessor"></span><span class="preprocessor">#define c(i) cPtr[((i)*13+16) % 17]</span> <a name="l00329"></a>00329 <span class="preprocessor"></span><span class="comment">// b: 0 4 | 1 5 | 2 6 | 3 7</span> <a name="l00330"></a>00330 <span class="preprocessor">#define b(i, j) b##i[(j)*2%8 + (j)/4]</span> <a name="l00331"></a>00331 <span class="preprocessor"></span> <a name="l00332"></a>00332 <span class="comment">// output</span> <a name="l00333"></a>00333 <span class="preprocessor">#define OA(i) z[i] = ConditionalByteReverse(B::ToEnum(), a(i+9))</span> <a name="l00334"></a>00334 <span class="preprocessor"></span><span class="preprocessor">#define OX(i) z[i] = y[i] ^ ConditionalByteReverse(B::ToEnum(), a(i+9))</span> <a name="l00335"></a>00335 <span class="preprocessor"></span><span class="comment">// buffer update</span> <a name="l00336"></a>00336 <span class="preprocessor">#define US(i) {word32 t=b(0,i); b(0,i)=ConditionalByteReverse(B::ToEnum(), p[i])^t; b(25,(i+6)%8)^=t;}</span> <a name="l00337"></a>00337 <span class="preprocessor"></span><span class="preprocessor">#define UL(i) {word32 t=b(0,i); b(0,i)=a(i+1)^t; b(25,(i+6)%8)^=t;}</span> <a name="l00338"></a>00338 <span class="preprocessor"></span><span class="comment">// gamma and pi</span> <a name="l00339"></a>00339 <span class="preprocessor">#define GP(i) c(5*i%17) = rotlFixed(a(i) ^ (a((i+1)%17) | ~a((i+2)%17)), ((5*i%17)*((5*i%17)+1)/2)%32)</span> <a name="l00340"></a>00340 <span class="preprocessor"></span><span class="comment">// theta and sigma</span> <a name="l00341"></a>00341 <span class="preprocessor">#define T(i,x) a(i) = c(i) ^ c((i+1)%17) ^ c((i+4)%17) ^ x</span> <a name="l00342"></a>00342 <span class="preprocessor"></span><span class="preprocessor">#define TS1S(i) T(i+1, ConditionalByteReverse(B::ToEnum(), p[i]))</span> <a name="l00343"></a>00343 <span class="preprocessor"></span><span class="preprocessor">#define TS1L(i) T(i+1, b(4,i))</span> <a name="l00344"></a>00344 <span class="preprocessor"></span><span class="preprocessor">#define TS2(i) T(i+9, b(16,i))</span> <a name="l00345"></a>00345 <span class="preprocessor"></span> <a name="l00346"></a>00346 <span class="keywordflow">while</span> (count--) <a name="l00347"></a>00347 { <a name="l00348"></a>00348 <span class="keywordflow">if</span> (z) <a name="l00349"></a>00349 { <a name="l00350"></a>00350 <span class="keywordflow">if</span> (y) <a name="l00351"></a>00351 { <a name="l00352"></a>00352 OX(0); OX(1); OX(2); OX(3); OX(4); OX(5); OX(6); OX(7); <a name="l00353"></a>00353 y += 8; <a name="l00354"></a>00354 } <a name="l00355"></a>00355 <span class="keywordflow">else</span> <a name="l00356"></a>00356 { <a name="l00357"></a>00357 OA(0); OA(1); OA(2); OA(3); OA(4); OA(5); OA(6); OA(7); <a name="l00358"></a>00358 } <a name="l00359"></a>00359 z += 8; <a name="l00360"></a>00360 } <a name="l00361"></a>00361 <a name="l00362"></a>00362 word32 *<span class="keyword">const</span> b16 = (word32 *)(bPtr+((bstart+16*32) & 31*32)); <a name="l00363"></a>00363 word32 *<span class="keyword">const</span> b4 = (word32 *)(bPtr+((bstart+(32-4)*32) & 31*32)); <a name="l00364"></a>00364 bstart += 32; <a name="l00365"></a>00365 word32 *<span class="keyword">const</span> b0 = (word32 *)(bPtr+((bstart) & 31*32)); <a name="l00366"></a>00366 word32 *<span class="keyword">const</span> b25 = (word32 *)(bPtr+((bstart+(32-25)*32) & 31*32)); <a name="l00367"></a>00367 <a name="l00368"></a>00368 <span class="keywordflow">if</span> (p) <a name="l00369"></a>00369 { <a name="l00370"></a>00370 US(0); US(1); US(2); US(3); US(4); US(5); US(6); US(7); <a name="l00371"></a>00371 } <a name="l00372"></a>00372 <span class="keywordflow">else</span> <a name="l00373"></a>00373 { <a name="l00374"></a>00374 UL(0); UL(1); UL(2); UL(3); UL(4); UL(5); UL(6); UL(7); <a name="l00375"></a>00375 } <a name="l00376"></a>00376 <a name="l00377"></a>00377 GP(0); <a name="l00378"></a>00378 GP(1); <a name="l00379"></a>00379 GP(2); <a name="l00380"></a>00380 GP(3); <a name="l00381"></a>00381 GP(4); <a name="l00382"></a>00382 GP(5); <a name="l00383"></a>00383 GP(6); <a name="l00384"></a>00384 GP(7); <a name="l00385"></a>00385 GP(8); <a name="l00386"></a>00386 GP(9); <a name="l00387"></a>00387 GP(10); <a name="l00388"></a>00388 GP(11); <a name="l00389"></a>00389 GP(12); <a name="l00390"></a>00390 GP(13); <a name="l00391"></a>00391 GP(14); <a name="l00392"></a>00392 GP(15); <a name="l00393"></a>00393 GP(16); <a name="l00394"></a>00394 <a name="l00395"></a>00395 T(0,1); <a name="l00396"></a>00396 <a name="l00397"></a>00397 <span class="keywordflow">if</span> (p) <a name="l00398"></a>00398 { <a name="l00399"></a>00399 TS1S(0); TS1S(1); TS1S(2); TS1S(3); TS1S(4); TS1S(5); TS1S(6); TS1S(7); <a name="l00400"></a>00400 p += 8; <a name="l00401"></a>00401 } <a name="l00402"></a>00402 <span class="keywordflow">else</span> <a name="l00403"></a>00403 { <a name="l00404"></a>00404 TS1L(0); TS1L(1); TS1L(2); TS1L(3); TS1L(4); TS1L(5); TS1L(6); TS1L(7); <a name="l00405"></a>00405 } <a name="l00406"></a>00406 <a name="l00407"></a>00407 TS2(0); TS2(1); TS2(2); TS2(3); TS2(4); TS2(5); TS2(6); TS2(7); <a name="l00408"></a>00408 } <a name="l00409"></a>00409 m_state[17] = bstart; <a name="l00410"></a>00410 } <a name="l00411"></a>00411 <a name="l00412"></a>00412 <span class="keyword">namespace </span>Weak { <a name="l00413"></a>00413 <span class="keyword">template</span> <<span class="keyword">class</span> B> <a name="l00414"></a>00414 <span class="keywordtype">size_t</span> PanamaHash<B>::HashMultipleBlocks(<span class="keyword">const</span> word32 *input, <span class="keywordtype">size_t</span> length) <a name="l00415"></a>00415 { <a name="l00416"></a>00416 this->Iterate(length / this->BLOCKSIZE, input); <a name="l00417"></a>00417 <span class="keywordflow">return</span> length % this->BLOCKSIZE; <a name="l00418"></a>00418 } <a name="l00419"></a>00419 <a name="l00420"></a>00420 <span class="keyword">template</span> <<span class="keyword">class</span> B> <a name="l00421"></a><a class="code" href="class_weak_1_1_panama_hash.html#af4d1ab27a1cebb1857ba24901b30b3b6">00421</a> <span class="keywordtype">void</span> <a class="code" href="class_weak_1_1_panama_hash.html" title="Panama Hash">PanamaHash<B>::TruncatedFinal</a>(byte *hash, <span class="keywordtype">size_t</span> size) <a name="l00422"></a>00422 { <a name="l00423"></a>00423 this->ThrowIfInvalidTruncatedSize(size); <a name="l00424"></a>00424 <a name="l00425"></a>00425 PadLastBlock(this->BLOCKSIZE, 0x01); <a name="l00426"></a>00426 <a name="l00427"></a>00427 HashEndianCorrectedBlock(this->m_data); <a name="l00428"></a>00428 <a name="l00429"></a>00429 this->Iterate(32); <span class="comment">// pull</span> <a name="l00430"></a>00430 <a name="l00431"></a>00431 <a class="code" href="class_fixed_size_sec_block.html">FixedSizeSecBlock<word32, 8></a> buf; <a name="l00432"></a>00432 this->Iterate(1, NULL, buf, NULL); <a name="l00433"></a>00433 <a name="l00434"></a>00434 memcpy(hash, buf, size); <a name="l00435"></a>00435 <a name="l00436"></a>00436 this->Restart(); <span class="comment">// reinit for next use</span> <a name="l00437"></a>00437 } <a name="l00438"></a>00438 } <a name="l00439"></a>00439 <a name="l00440"></a>00440 <span class="keyword">template</span> <<span class="keyword">class</span> B> <a name="l00441"></a>00441 <span class="keywordtype">void</span> <a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy<B>::CipherSetKey</a>(<span class="keyword">const</span> <a class="code" href="class_name_value_pairs.html" title="interface for retrieving values given their names">NameValuePairs</a> &params, <span class="keyword">const</span> byte *key, <span class="keywordtype">size_t</span> length) <a name="l00442"></a>00442 { <a name="l00443"></a>00443 assert(length==32); <a name="l00444"></a>00444 memcpy(m_key, key, 32); <a name="l00445"></a>00445 } <a name="l00446"></a>00446 <a name="l00447"></a>00447 <span class="keyword">template</span> <<span class="keyword">class</span> B> <a name="l00448"></a>00448 <span class="keywordtype">void</span> <a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy<B>::CipherResynchronize</a>(byte *keystreamBuffer, <span class="keyword">const</span> byte *iv, <span class="keywordtype">size_t</span> length) <a name="l00449"></a>00449 { <a name="l00450"></a>00450 assert(length==32); <a name="l00451"></a>00451 this->Reset(); <a name="l00452"></a>00452 this->Iterate(1, m_key); <a name="l00453"></a>00453 <span class="keywordflow">if</span> (iv && IsAligned<word32>(iv)) <a name="l00454"></a>00454 this->Iterate(1, (<span class="keyword">const</span> word32 *)iv); <a name="l00455"></a>00455 <span class="keywordflow">else</span> <a name="l00456"></a>00456 { <a name="l00457"></a>00457 <a class="code" href="class_fixed_size_sec_block.html">FixedSizeSecBlock<word32, 8></a> buf; <a name="l00458"></a>00458 <span class="keywordflow">if</span> (iv) <a name="l00459"></a>00459 memcpy(buf, iv, 32); <a name="l00460"></a>00460 <span class="keywordflow">else</span> <a name="l00461"></a>00461 memset(buf, 0, 32); <a name="l00462"></a>00462 this->Iterate(1, buf); <a name="l00463"></a>00463 } <a name="l00464"></a>00464 <a name="l00465"></a>00465 <span class="preprocessor">#if CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE || defined(CRYPTOPP_X64_MASM_AVAILABLE)</span> <a name="l00466"></a>00466 <span class="preprocessor"></span> <span class="keywordflow">if</span> (B::ToEnum() == LITTLE_ENDIAN_ORDER && HasSSE2() && !IsP4()) <span class="comment">// SSE2 code is slower on P4 Prescott</span> <a name="l00467"></a>00467 Panama_SSE2_Pull(32, this->m_state, NULL, NULL); <a name="l00468"></a>00468 <span class="keywordflow">else</span> <a name="l00469"></a>00469 <span class="preprocessor">#endif</span> <a name="l00470"></a>00470 <span class="preprocessor"></span> this->Iterate(32); <a name="l00471"></a>00471 } <a name="l00472"></a>00472 <a name="l00473"></a>00473 <span class="preprocessor">#if CRYPTOPP_BOOL_X86 || CRYPTOPP_BOOL_X64</span> <a name="l00474"></a>00474 <span class="preprocessor"></span><span class="keyword">template</span> <<span class="keyword">class</span> B> <a name="l00475"></a>00475 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> <a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy<B>::GetAlignment</a>()<span class="keyword"> const</span> <a name="l00476"></a>00476 <span class="keyword"></span>{ <a name="l00477"></a>00477 <span class="preprocessor">#if CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE || defined(CRYPTOPP_X64_MASM_AVAILABLE)</span> <a name="l00478"></a>00478 <span class="preprocessor"></span> <span class="keywordflow">if</span> (B::ToEnum() == LITTLE_ENDIAN_ORDER && HasSSE2()) <a name="l00479"></a>00479 <span class="keywordflow">return</span> 16; <a name="l00480"></a>00480 <span class="keywordflow">else</span> <a name="l00481"></a>00481 <span class="preprocessor">#endif</span> <a name="l00482"></a>00482 <span class="preprocessor"></span> <span class="keywordflow">return</span> 1; <a name="l00483"></a>00483 } <a name="l00484"></a>00484 <span class="preprocessor">#endif</span> <a name="l00485"></a>00485 <span class="preprocessor"></span> <a name="l00486"></a>00486 <span class="keyword">template</span> <<span class="keyword">class</span> B> <a name="l00487"></a>00487 <span class="keywordtype">void</span> <a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy<B>::OperateKeystream</a>(KeystreamOperation operation, byte *output, <span class="keyword">const</span> byte *input, <span class="keywordtype">size_t</span> iterationCount) <a name="l00488"></a>00488 { <a name="l00489"></a>00489 <span class="preprocessor">#if CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE || defined(CRYPTOPP_X64_MASM_AVAILABLE)</span> <a name="l00490"></a>00490 <span class="preprocessor"></span> <span class="keywordflow">if</span> (B::ToEnum() == LITTLE_ENDIAN_ORDER && HasSSE2()) <a name="l00491"></a>00491 Panama_SSE2_Pull(iterationCount, this->m_state, (word32 *)output, (<span class="keyword">const</span> word32 *)input); <a name="l00492"></a>00492 <span class="keywordflow">else</span> <a name="l00493"></a>00493 <span class="preprocessor">#endif</span> <a name="l00494"></a>00494 <span class="preprocessor"></span> this->Iterate(iterationCount, NULL, (word32 *)output, (<span class="keyword">const</span> word32 *)input); <a name="l00495"></a>00495 } <a name="l00496"></a>00496 <a name="l00497"></a>00497 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_panama.html" title="base class, do not use directly">Panama<BigEndian></a>; <a name="l00498"></a>00498 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_panama.html" title="base class, do not use directly">Panama<LittleEndian></a>; <a name="l00499"></a>00499 <a name="l00500"></a>00500 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_weak_1_1_panama_hash.html" title="Panama Hash">Weak::PanamaHash<BigEndian></a>; <a name="l00501"></a>00501 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_weak_1_1_panama_hash.html" title="Panama Hash">Weak::PanamaHash<LittleEndian></a>; <a name="l00502"></a>00502 <a name="l00503"></a>00503 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy<BigEndian></a>; <a name="l00504"></a>00504 <span class="keyword">template</span> <span class="keyword">class </span><a class="code" href="class_panama_cipher_policy.html" title="_">PanamaCipherPolicy<LittleEndian></a>; <a name="l00505"></a>00505 <a name="l00506"></a>00506 NAMESPACE_END <a name="l00507"></a>00507 <a name="l00508"></a>00508 <span class="preprocessor">#endif // #ifndef CRYPTOPP_GENERATE_X64_MASM</span> </pre></div></div> <hr size="1"/><address style="text-align: right;"><small>Generated on 9 Dec 2009 for Crypto++ by <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/></a> 1.6.1 </small></address> </body> </html>