X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=shabal192-asm.S;fp=shabal192-asm.S;h=0000000000000000000000000000000000000000;hb=4f50c75ee5a6cc88bf7ea71957ed509e298e6c25;hp=09b41d5baea6a6b13e9e2b3d4245cda85329d981;hpb=7701e318e4e2bac7f84dbf6e368f1501814948fc;p=avr-crypto-lib.git
diff --git a/shabal192-asm.S b/shabal192-asm.S
deleted file mode 100644
index 09b41d5..0000000
--- a/shabal192-asm.S
+++ /dev/null
@@ -1,191 +0,0 @@
-/* shabal192-asm.S */
-/*
- This file is part of the AVR-Crypto-Lib.
- Copyright (C) 2009 Daniel Otte (daniel.otte@rub.de)
-
- This program is free software: you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation, either version 3 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program. If not, see .
-*/
-/*
- * \file shabal192-asm.S
- * \author Daniel Otte
- * \email daniel.otte@rub.de
- * \date 2009-04-27
- * \license GPLv3 or later
- */
-
-#include "avr-asm-macros.S"
-
-shabal192_iv:
- /* A */
-.long 0xFD749ED4, 0xB798E530, 0x33904B6F, 0x46BDA85E
-.long 0x076934B4, 0x454B4058, 0x77F74527, 0xFB4CF465
-.long 0x62931DA9, 0xE778C8DB, 0x22B3998E, 0xAC15CFB9
- /* B */
-.long 0x58BCBAC4, 0xEC47A08E, 0xAEE933B2, 0xDFCBC824
-.long 0xA7944804, 0xBF65BDB0, 0x5A9D4502, 0x59979AF7
-.long 0xC5CEA54E, 0x4B6B8150, 0x16E71909, 0x7D632319
-.long 0x930573A0, 0xF34C63D1, 0xCAF914B4, 0xFDD6612C
- /* C */
-.long 0x61550878, 0x89EF2B75, 0xA1660C46, 0x7EF3855B
-.long 0x7297B58C, 0x1BC67793, 0x7FB1C723, 0xB66FC640
-.long 0x1A48B71C, 0xF0976D17, 0x088CE80A, 0xA454EDF3
-.long 0x1C096BF4, 0xAC76224B, 0x5215781C, 0xCD5D2669
-
-
-/******************************************************************************/
-/*
-void shabal192_init(shabal_ctx_t* ctx){
- uint8_t i;
- ctx->b = ctx->b_buffer;
- ctx->c = ctx->c_buffer;
- ctx->w.w64 = 1LL;
- for(i=0;ia[i] = pgm_read_dword(&(shabal192_iv[i]));
- }
- for(i=0;i<16;++i){
- ctx->b[i] = pgm_read_dword(&(shabal192_iv[SHABAL_R+i]));
- }
- for(i=0;i<16;++i){
- ctx->c[i] = pgm_read_dword(&(shabal192_iv[SHABAL_R+16+i]));
- }
-}
-*/
-/*
- * param ctx: r24,r25
- */
-.global shabal192_init
-shabal192_init:
- movw r26, r24
- ldi r24, 1
- st X+, r24
- st X+, r1
- st X+, r1
- st X+, r1
- st X+, r1
- st X+, r1
- st X+, r1
- st X+, r1
- movw r24, r26
- adiw r24, 12*4+2+2
- st X+, r24
- st X+, r25
- adiw r24, 4*16-1
- adiw r24, 1
- st X+, r24
- st X+, r25
- ldi r24, (12+16+16)
- ldi r30, lo8(shabal192_iv)
- ldi r31, hi8(shabal192_iv)
-1: lpm r0, Z+
- st X+, r0
- lpm r0, Z+
- st X+, r0
- lpm r0, Z+
- st X+, r0
- lpm r0, Z+
- st X+, r0
- dec r24
- brne 1b
- ret
-
-/******************************************************************************/
-/*
- * param dest: r24:r25
- * param ctx: r22:r23
- */
-.global shabal192_ctx2hash
-shabal192_ctx2hash:
- movw r26, r24
- movw r30, r22
- ldd r24, Z+(8+2)
- ldd r25, Z+(8+2+1)
- movw r30, r24
- adiw r30, (16-192/32)*4
- ldi r24, 192/8
-1: ld r0, Z+
- st X+, r0
- dec r24
- brne 1b
- ret
-
-/******************************************************************************/
-/*
-void shabal192(void* dest, void* msg, uint32_t length_b){
- shabal_ctx_t ctx;
- shabal192_init(&ctx);
- while(length_b>=SHABAL_BLOCKSIZE){
- shabal_nextBlock(&ctx, msg);
- msg = (uint8_t*)msg+SHABAL_BLOCKSIZE_B;
- length_b -= SHABAL_BLOCKSIZE;
- }
- shabal_lastBlock(&ctx, msg, length_b);
- shabal192_ctx2hash(dest, &ctx);
-}
-*/
-/*
- * param dest: r24:r25
- * param msg: r22:r23
- * param length_b: r18:r21
- */
-DST0 = 8
-DST1 = 9
-CTX0 = 10
-CTX1 = 11
-MSG0 = 12
-MSG1 = 13
-LEN2 = 14
-LEN3 = 15
-LEN0 = 16
-LEN1 = 17
-.global shabal192
-shabal192:
- push_range 8, 17
- stack_alloc_large 188
- adiw r30, 1 /* Z points to stack space (ctx) */
- movw CTX0, r30
- movw DST0, r24
- movw MSG0, r22
- movw LEN0, r18
- movw LEN2, r20
- movw r24, r30
- rcall shabal192_init
-2:
- tst LEN2
- brne 3f
- tst LEN3
- breq 4f
-3:
- movw r24, CTX0
- movw r22, MSG0
- rcall shabal_nextBlock
- subi LEN1, 0x02
- sbc LEN2, r1
- sbc LEN3, r1
- ldi r18, 64
- add MSG0, r18
- adc MSG1, r1
- rjmp 2b
-4:
- movw r24, CTX0
- movw r22, MSG0
- movw r20, LEN0
- rcall shabal_lastBlock
- movw r24, DST0
- movw r22, CTX0
- rcall shabal192_ctx2hash
- stack_free_large2 188
- pop_range 8, 17
- ret
-
-