3 # ====================================================================
4 # Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
5 # project. The module is, however, dual licensed under OpenSSL and
6 # CRYPTOGAMS licenses depending on where you obtain it. For further
7 # details see http://www.openssl.org/~appro/cryptogams/.
8 # ====================================================================
14 # Code uses single 1K S-box and is >2 times faster than code generated
15 # by gcc-3.4.1. This is thanks to unique feature of ARMv4 ISA, which
16 # allows to merge logical or arithmetic operation with shift or rotate
17 # in one instruction and emit combined result every cycle. The module
18 # is endian-neutral. The performance is ~42 cycles/byte for 128-bit
19 # key [on single-issue Xscale PXA250 core].
23 # AES_set_[en|de]crypt_key is added.
27 # Rescheduling for dual-issue pipeline resulted in 12% improvement on
28 # Cortex A8 core and ~25 cycles per byte processed with 128-bit key.
32 # Profiler-assisted and platform-specific optimization resulted in 16%
33 # improvement on Cortex A8 core and ~21.5 cycles per byte.
36 if ($flavour=~/^\w[\w\-]*\.\w+$/) { $output=$flavour; undef $flavour; }
37 else { while (($output=shift) && ($output!~/^\w[\w\-]*\.\w+$/)) {} }
39 if ($flavour && $flavour ne "void") {
40 $0 =~ m/(.*[\/\\])[^\/\\]+$/; $dir=$1;
41 ( $xlate="${dir}arm-xlate.pl" and -f $xlate ) or
42 ( $xlate="${dir}../../perlasm/arm-xlate.pl" and -f $xlate) or
43 die "can't locate arm-xlate.pl";
45 open STDOUT,"| \"$^X\" $xlate $flavour $output";
47 open STDOUT,">$output";
67 # include "arm_arch.h"
69 # define __ARM_ARCH__ __LINUX_ARM_ARCH__
73 #if defined(__thumb2__) && !defined(__APPLE__)
84 .word 0xc66363a5, 0xf87c7c84, 0xee777799, 0xf67b7b8d
85 .word 0xfff2f20d, 0xd66b6bbd, 0xde6f6fb1, 0x91c5c554
86 .word 0x60303050, 0x02010103, 0xce6767a9, 0x562b2b7d
87 .word 0xe7fefe19, 0xb5d7d762, 0x4dababe6, 0xec76769a
88 .word 0x8fcaca45, 0x1f82829d, 0x89c9c940, 0xfa7d7d87
89 .word 0xeffafa15, 0xb25959eb, 0x8e4747c9, 0xfbf0f00b
90 .word 0x41adadec, 0xb3d4d467, 0x5fa2a2fd, 0x45afafea
91 .word 0x239c9cbf, 0x53a4a4f7, 0xe4727296, 0x9bc0c05b
92 .word 0x75b7b7c2, 0xe1fdfd1c, 0x3d9393ae, 0x4c26266a
93 .word 0x6c36365a, 0x7e3f3f41, 0xf5f7f702, 0x83cccc4f
94 .word 0x6834345c, 0x51a5a5f4, 0xd1e5e534, 0xf9f1f108
95 .word 0xe2717193, 0xabd8d873, 0x62313153, 0x2a15153f
96 .word 0x0804040c, 0x95c7c752, 0x46232365, 0x9dc3c35e
97 .word 0x30181828, 0x379696a1, 0x0a05050f, 0x2f9a9ab5
98 .word 0x0e070709, 0x24121236, 0x1b80809b, 0xdfe2e23d
99 .word 0xcdebeb26, 0x4e272769, 0x7fb2b2cd, 0xea75759f
100 .word 0x1209091b, 0x1d83839e, 0x582c2c74, 0x341a1a2e
101 .word 0x361b1b2d, 0xdc6e6eb2, 0xb45a5aee, 0x5ba0a0fb
102 .word 0xa45252f6, 0x763b3b4d, 0xb7d6d661, 0x7db3b3ce
103 .word 0x5229297b, 0xdde3e33e, 0x5e2f2f71, 0x13848497
104 .word 0xa65353f5, 0xb9d1d168, 0x00000000, 0xc1eded2c
105 .word 0x40202060, 0xe3fcfc1f, 0x79b1b1c8, 0xb65b5bed
106 .word 0xd46a6abe, 0x8dcbcb46, 0x67bebed9, 0x7239394b
107 .word 0x944a4ade, 0x984c4cd4, 0xb05858e8, 0x85cfcf4a
108 .word 0xbbd0d06b, 0xc5efef2a, 0x4faaaae5, 0xedfbfb16
109 .word 0x864343c5, 0x9a4d4dd7, 0x66333355, 0x11858594
110 .word 0x8a4545cf, 0xe9f9f910, 0x04020206, 0xfe7f7f81
111 .word 0xa05050f0, 0x783c3c44, 0x259f9fba, 0x4ba8a8e3
112 .word 0xa25151f3, 0x5da3a3fe, 0x804040c0, 0x058f8f8a
113 .word 0x3f9292ad, 0x219d9dbc, 0x70383848, 0xf1f5f504
114 .word 0x63bcbcdf, 0x77b6b6c1, 0xafdada75, 0x42212163
115 .word 0x20101030, 0xe5ffff1a, 0xfdf3f30e, 0xbfd2d26d
116 .word 0x81cdcd4c, 0x180c0c14, 0x26131335, 0xc3ecec2f
117 .word 0xbe5f5fe1, 0x359797a2, 0x884444cc, 0x2e171739
118 .word 0x93c4c457, 0x55a7a7f2, 0xfc7e7e82, 0x7a3d3d47
119 .word 0xc86464ac, 0xba5d5de7, 0x3219192b, 0xe6737395
120 .word 0xc06060a0, 0x19818198, 0x9e4f4fd1, 0xa3dcdc7f
121 .word 0x44222266, 0x542a2a7e, 0x3b9090ab, 0x0b888883
122 .word 0x8c4646ca, 0xc7eeee29, 0x6bb8b8d3, 0x2814143c
123 .word 0xa7dede79, 0xbc5e5ee2, 0x160b0b1d, 0xaddbdb76
124 .word 0xdbe0e03b, 0x64323256, 0x743a3a4e, 0x140a0a1e
125 .word 0x924949db, 0x0c06060a, 0x4824246c, 0xb85c5ce4
126 .word 0x9fc2c25d, 0xbdd3d36e, 0x43acacef, 0xc46262a6
127 .word 0x399191a8, 0x319595a4, 0xd3e4e437, 0xf279798b
128 .word 0xd5e7e732, 0x8bc8c843, 0x6e373759, 0xda6d6db7
129 .word 0x018d8d8c, 0xb1d5d564, 0x9c4e4ed2, 0x49a9a9e0
130 .word 0xd86c6cb4, 0xac5656fa, 0xf3f4f407, 0xcfeaea25
131 .word 0xca6565af, 0xf47a7a8e, 0x47aeaee9, 0x10080818
132 .word 0x6fbabad5, 0xf0787888, 0x4a25256f, 0x5c2e2e72
133 .word 0x381c1c24, 0x57a6a6f1, 0x73b4b4c7, 0x97c6c651
134 .word 0xcbe8e823, 0xa1dddd7c, 0xe874749c, 0x3e1f1f21
135 .word 0x964b4bdd, 0x61bdbddc, 0x0d8b8b86, 0x0f8a8a85
136 .word 0xe0707090, 0x7c3e3e42, 0x71b5b5c4, 0xcc6666aa
137 .word 0x904848d8, 0x06030305, 0xf7f6f601, 0x1c0e0e12
138 .word 0xc26161a3, 0x6a35355f, 0xae5757f9, 0x69b9b9d0
139 .word 0x17868691, 0x99c1c158, 0x3a1d1d27, 0x279e9eb9
140 .word 0xd9e1e138, 0xebf8f813, 0x2b9898b3, 0x22111133
141 .word 0xd26969bb, 0xa9d9d970, 0x078e8e89, 0x339494a7
142 .word 0x2d9b9bb6, 0x3c1e1e22, 0x15878792, 0xc9e9e920
143 .word 0x87cece49, 0xaa5555ff, 0x50282878, 0xa5dfdf7a
144 .word 0x038c8c8f, 0x59a1a1f8, 0x09898980, 0x1a0d0d17
145 .word 0x65bfbfda, 0xd7e6e631, 0x844242c6, 0xd06868b8
146 .word 0x824141c3, 0x299999b0, 0x5a2d2d77, 0x1e0f0f11
147 .word 0x7bb0b0cb, 0xa85454fc, 0x6dbbbbd6, 0x2c16163a
149 .byte 0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5
150 .byte 0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76
151 .byte 0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0
152 .byte 0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0
153 .byte 0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc
154 .byte 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15
155 .byte 0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a
156 .byte 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75
157 .byte 0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0
158 .byte 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84
159 .byte 0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b
160 .byte 0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf
161 .byte 0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85
162 .byte 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8
163 .byte 0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5
164 .byte 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2
165 .byte 0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17
166 .byte 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73
167 .byte 0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88
168 .byte 0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb
169 .byte 0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c
170 .byte 0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79
171 .byte 0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9
172 .byte 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08
173 .byte 0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6
174 .byte 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a
175 .byte 0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e
176 .byte 0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e
177 .byte 0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94
178 .byte 0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf
179 .byte 0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68
180 .byte 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16
182 .word 0x01000000, 0x02000000, 0x04000000, 0x08000000
183 .word 0x10000000, 0x20000000, 0x40000000, 0x80000000
184 .word 0x1B000000, 0x36000000, 0, 0, 0, 0, 0, 0
185 .size AES_Te,.-AES_Te
187 @ void AES_encrypt(const unsigned char *in, unsigned char *out,
188 @ const AES_KEY *key) {
190 .type AES_encrypt,%function
194 sub r3,pc,#8 @ AES_encrypt
198 stmdb sp!,{r1,r4-r12,lr}
202 sub $tbl,r3,#AES_encrypt-AES_Te @ Te
207 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
208 ldrb $t1,[$rounds,#2] @ manner...
209 ldrb $t2,[$rounds,#1]
210 ldrb $t3,[$rounds,#0]
211 orr $s0,$s0,$t1,lsl#8
212 ldrb $s1,[$rounds,#7]
213 orr $s0,$s0,$t2,lsl#16
214 ldrb $t1,[$rounds,#6]
215 orr $s0,$s0,$t3,lsl#24
216 ldrb $t2,[$rounds,#5]
217 ldrb $t3,[$rounds,#4]
218 orr $s1,$s1,$t1,lsl#8
219 ldrb $s2,[$rounds,#11]
220 orr $s1,$s1,$t2,lsl#16
221 ldrb $t1,[$rounds,#10]
222 orr $s1,$s1,$t3,lsl#24
223 ldrb $t2,[$rounds,#9]
224 ldrb $t3,[$rounds,#8]
225 orr $s2,$s2,$t1,lsl#8
226 ldrb $s3,[$rounds,#15]
227 orr $s2,$s2,$t2,lsl#16
228 ldrb $t1,[$rounds,#14]
229 orr $s2,$s2,$t3,lsl#24
230 ldrb $t2,[$rounds,#13]
231 ldrb $t3,[$rounds,#12]
232 orr $s3,$s3,$t1,lsl#8
233 orr $s3,$s3,$t2,lsl#16
234 orr $s3,$s3,$t3,lsl#24
239 ldr $s3,[$rounds,#12]
247 bl _armv4_AES_encrypt
249 ldr $rounds,[sp],#4 @ pop out
260 str $s3,[$rounds,#12]
262 mov $t1,$s0,lsr#24 @ write output in endian-neutral
263 mov $t2,$s0,lsr#16 @ manner...
265 strb $t1,[$rounds,#0]
266 strb $t2,[$rounds,#1]
268 strb $t3,[$rounds,#2]
270 strb $s0,[$rounds,#3]
272 strb $t1,[$rounds,#4]
273 strb $t2,[$rounds,#5]
275 strb $t3,[$rounds,#6]
277 strb $s1,[$rounds,#7]
279 strb $t1,[$rounds,#8]
280 strb $t2,[$rounds,#9]
282 strb $t3,[$rounds,#10]
284 strb $s2,[$rounds,#11]
286 strb $t1,[$rounds,#12]
287 strb $t2,[$rounds,#13]
288 strb $t3,[$rounds,#14]
289 strb $s3,[$rounds,#15]
292 ldmia sp!,{r4-r12,pc}
294 ldmia sp!,{r4-r12,lr}
296 moveq pc,lr @ be binary compatible with V4, yet
297 bx lr @ interoperable with Thumb ISA:-)
299 .size AES_encrypt,.-AES_encrypt
301 .type _armv4_AES_encrypt,%function
304 str lr,[sp,#-4]! @ push lr
305 ldmia $key!,{$t1-$i1}
307 ldr $rounds,[$key,#240-16]
311 sub $rounds,$rounds,#1
316 and $i3,lr,$s0,lsr#16
319 ldr $t1,[$tbl,$i1,lsl#2] @ Te3[s0>>0]
320 and $i1,lr,$s1,lsr#16 @ i0
321 ldr $t2,[$tbl,$i2,lsl#2] @ Te2[s0>>8]
323 ldr $t3,[$tbl,$i3,lsl#2] @ Te1[s0>>16]
325 ldr $s0,[$tbl,$s0,lsl#2] @ Te0[s0>>24]
328 ldr $i1,[$tbl,$i1,lsl#2] @ Te1[s1>>16]
329 ldr $i2,[$tbl,$i2,lsl#2] @ Te3[s1>>0]
330 ldr $i3,[$tbl,$i3,lsl#2] @ Te2[s1>>8]
331 eor $s0,$s0,$i1,ror#8
332 ldr $s1,[$tbl,$s1,lsl#2] @ Te0[s1>>24]
333 and $i1,lr,$s2,lsr#8 @ i0
334 eor $t2,$t2,$i2,ror#8
335 and $i2,lr,$s2,lsr#16 @ i1
336 eor $t3,$t3,$i3,ror#8
338 ldr $i1,[$tbl,$i1,lsl#2] @ Te2[s2>>8]
339 eor $s1,$s1,$t1,ror#24
340 ldr $i2,[$tbl,$i2,lsl#2] @ Te1[s2>>16]
343 ldr $i3,[$tbl,$i3,lsl#2] @ Te3[s2>>0]
344 eor $s0,$s0,$i1,ror#16
345 ldr $s2,[$tbl,$s2,lsl#2] @ Te0[s2>>24]
347 eor $s1,$s1,$i2,ror#8
348 and $i2,lr,$s3,lsr#8 @ i1
349 eor $t3,$t3,$i3,ror#16
350 and $i3,lr,$s3,lsr#16 @ i2
351 ldr $i1,[$tbl,$i1,lsl#2] @ Te3[s3>>0]
352 eor $s2,$s2,$t2,ror#16
353 ldr $i2,[$tbl,$i2,lsl#2] @ Te2[s3>>8]
356 ldr $i3,[$tbl,$i3,lsl#2] @ Te1[s3>>16]
357 eor $s0,$s0,$i1,ror#24
359 eor $s1,$s1,$i2,ror#16
360 ldr $s3,[$tbl,$s3,lsl#2] @ Te0[s3>>24]
361 eor $s2,$s2,$i3,ror#8
363 eor $s3,$s3,$t3,ror#8
372 and $i3,lr,$s0,lsr#16
376 subs $rounds,$rounds,#1
381 ldrb $t1,[$tbl,$i1,lsl#2] @ Te4[s0>>0]
382 and $i1,lr,$s1,lsr#16 @ i0
383 ldrb $t2,[$tbl,$i2,lsl#2] @ Te4[s0>>8]
385 ldrb $t3,[$tbl,$i3,lsl#2] @ Te4[s0>>16]
387 ldrb $s0,[$tbl,$s0,lsl#2] @ Te4[s0>>24]
390 ldrb $i1,[$tbl,$i1,lsl#2] @ Te4[s1>>16]
391 ldrb $i2,[$tbl,$i2,lsl#2] @ Te4[s1>>0]
392 ldrb $i3,[$tbl,$i3,lsl#2] @ Te4[s1>>8]
393 eor $s0,$i1,$s0,lsl#8
394 ldrb $s1,[$tbl,$s1,lsl#2] @ Te4[s1>>24]
395 and $i1,lr,$s2,lsr#8 @ i0
396 eor $t2,$i2,$t2,lsl#8
397 and $i2,lr,$s2,lsr#16 @ i1
398 eor $t3,$i3,$t3,lsl#8
400 ldrb $i1,[$tbl,$i1,lsl#2] @ Te4[s2>>8]
401 eor $s1,$t1,$s1,lsl#24
402 ldrb $i2,[$tbl,$i2,lsl#2] @ Te4[s2>>16]
405 ldrb $i3,[$tbl,$i3,lsl#2] @ Te4[s2>>0]
406 eor $s0,$i1,$s0,lsl#8
407 ldrb $s2,[$tbl,$s2,lsl#2] @ Te4[s2>>24]
409 eor $s1,$s1,$i2,lsl#16
410 and $i2,lr,$s3,lsr#8 @ i1
411 eor $t3,$i3,$t3,lsl#8
412 and $i3,lr,$s3,lsr#16 @ i2
413 ldrb $i1,[$tbl,$i1,lsl#2] @ Te4[s3>>0]
414 eor $s2,$t2,$s2,lsl#24
415 ldrb $i2,[$tbl,$i2,lsl#2] @ Te4[s3>>8]
418 ldrb $i3,[$tbl,$i3,lsl#2] @ Te4[s3>>16]
419 eor $s0,$i1,$s0,lsl#8
421 ldrb $s3,[$tbl,$s3,lsl#2] @ Te4[s3>>24]
422 eor $s1,$s1,$i2,lsl#8
424 eor $s2,$s2,$i3,lsl#16
426 eor $s3,$t3,$s3,lsl#24
435 ldr pc,[sp],#4 @ pop and return
436 .size _armv4_AES_encrypt,.-_armv4_AES_encrypt
438 .global AES_set_encrypt_key
439 .type AES_set_encrypt_key,%function
442 _armv4_AES_set_encrypt_key:
444 sub r3,pc,#8 @ AES_set_encrypt_key
446 adr r3,AES_set_encrypt_key
450 itt eq @ Thumb2 thing, sanity check in ARM
456 itt eq @ Thumb2 thing, sanity check in ARM
467 itt ne @ Thumb2 thing, sanity check in ARM
472 .Lok: stmdb sp!,{r4-r12,lr}
478 adr $tbl,AES_Te+1024 @ Te4
480 sub $tbl,r3,#_armv4_AES_set_encrypt_key-AES_Te-1024 @ Te4
484 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
485 ldrb $t1,[$rounds,#2] @ manner...
486 ldrb $t2,[$rounds,#1]
487 ldrb $t3,[$rounds,#0]
488 orr $s0,$s0,$t1,lsl#8
489 ldrb $s1,[$rounds,#7]
490 orr $s0,$s0,$t2,lsl#16
491 ldrb $t1,[$rounds,#6]
492 orr $s0,$s0,$t3,lsl#24
493 ldrb $t2,[$rounds,#5]
494 ldrb $t3,[$rounds,#4]
495 orr $s1,$s1,$t1,lsl#8
496 ldrb $s2,[$rounds,#11]
497 orr $s1,$s1,$t2,lsl#16
498 ldrb $t1,[$rounds,#10]
499 orr $s1,$s1,$t3,lsl#24
500 ldrb $t2,[$rounds,#9]
501 ldrb $t3,[$rounds,#8]
502 orr $s2,$s2,$t1,lsl#8
503 ldrb $s3,[$rounds,#15]
504 orr $s2,$s2,$t2,lsl#16
505 ldrb $t1,[$rounds,#14]
506 orr $s2,$s2,$t3,lsl#24
507 ldrb $t2,[$rounds,#13]
508 ldrb $t3,[$rounds,#12]
509 orr $s3,$s3,$t1,lsl#8
511 orr $s3,$s3,$t2,lsl#16
513 orr $s3,$s3,$t3,lsl#24
520 ldr $s3,[$rounds,#12]
536 str $rounds,[$key,#240-16]
537 add $t3,$tbl,#256 @ rcon
541 and $t2,lr,$s3,lsr#24
542 and $i1,lr,$s3,lsr#16
548 orr $t2,$t2,$i1,lsl#24
550 orr $t2,$t2,$i2,lsl#16
551 ldr $t1,[$t3],#4 @ rcon[i++]
552 orr $t2,$t2,$i3,lsl#8
554 eor $s0,$s0,$t2 @ rk[4]=rk[0]^...
555 eor $s1,$s1,$s0 @ rk[5]=rk[1]^rk[4]
557 eor $s2,$s2,$s1 @ rk[6]=rk[2]^rk[5]
559 eor $s3,$s3,$s2 @ rk[7]=rk[3]^rk[6]
561 subs $rounds,$rounds,#1
569 ldrb $i2,[$rounds,#19]
570 ldrb $t1,[$rounds,#18]
571 ldrb $t2,[$rounds,#17]
572 ldrb $t3,[$rounds,#16]
573 orr $i2,$i2,$t1,lsl#8
574 ldrb $i3,[$rounds,#23]
575 orr $i2,$i2,$t2,lsl#16
576 ldrb $t1,[$rounds,#22]
577 orr $i2,$i2,$t3,lsl#24
578 ldrb $t2,[$rounds,#21]
579 ldrb $t3,[$rounds,#20]
580 orr $i3,$i3,$t1,lsl#8
581 orr $i3,$i3,$t2,lsl#16
583 orr $i3,$i3,$t3,lsl#24
586 ldr $i2,[$rounds,#16]
587 ldr $i3,[$rounds,#20]
599 str $rounds,[$key,#240-24]
600 add $t3,$tbl,#256 @ rcon
605 and $t2,lr,$i3,lsr#24
606 and $i1,lr,$i3,lsr#16
612 orr $t2,$t2,$i1,lsl#24
614 orr $t2,$t2,$i2,lsl#16
615 ldr $t1,[$t3],#4 @ rcon[i++]
616 orr $t2,$t2,$i3,lsl#8
618 eor $s0,$s0,$i3 @ rk[6]=rk[0]^...
619 eor $s1,$s1,$s0 @ rk[7]=rk[1]^rk[6]
621 eor $s2,$s2,$s1 @ rk[8]=rk[2]^rk[7]
623 eor $s3,$s3,$s2 @ rk[9]=rk[3]^rk[8]
625 subs $rounds,$rounds,#1
628 itt eq @ Thumb2 thing, sanity check in ARM
635 eor $i1,$i1,$s3 @ rk[10]=rk[4]^rk[9]
636 eor $i3,$i2,$i1 @ rk[11]=rk[5]^rk[10]
643 ldrb $i2,[$rounds,#27]
644 ldrb $t1,[$rounds,#26]
645 ldrb $t2,[$rounds,#25]
646 ldrb $t3,[$rounds,#24]
647 orr $i2,$i2,$t1,lsl#8
648 ldrb $i3,[$rounds,#31]
649 orr $i2,$i2,$t2,lsl#16
650 ldrb $t1,[$rounds,#30]
651 orr $i2,$i2,$t3,lsl#24
652 ldrb $t2,[$rounds,#29]
653 ldrb $t3,[$rounds,#28]
654 orr $i3,$i3,$t1,lsl#8
655 orr $i3,$i3,$t2,lsl#16
657 orr $i3,$i3,$t3,lsl#24
660 ldr $i2,[$rounds,#24]
661 ldr $i3,[$rounds,#28]
671 str $rounds,[$key,#240-32]
672 add $t3,$tbl,#256 @ rcon
677 and $t2,lr,$i3,lsr#24
678 and $i1,lr,$i3,lsr#16
684 orr $t2,$t2,$i1,lsl#24
686 orr $t2,$t2,$i2,lsl#16
687 ldr $t1,[$t3],#4 @ rcon[i++]
688 orr $t2,$t2,$i3,lsl#8
690 eor $s0,$s0,$i3 @ rk[8]=rk[0]^...
691 eor $s1,$s1,$s0 @ rk[9]=rk[1]^rk[8]
693 eor $s2,$s2,$s1 @ rk[10]=rk[2]^rk[9]
695 eor $s3,$s3,$s2 @ rk[11]=rk[3]^rk[10]
697 subs $rounds,$rounds,#1
700 itt eq @ Thumb2 thing, sanity check in ARM
708 and $i2,lr,$s3,lsr#16
710 and $i3,lr,$s3,lsr#24
712 orr $t2,$t2,$i1,lsl#8
714 orr $t2,$t2,$i2,lsl#16
716 orr $t2,$t2,$i3,lsl#24
720 eor $t1,$t1,$t2 @ rk[12]=rk[4]^...
722 eor $i1,$i1,$t1 @ rk[13]=rk[5]^rk[12]
724 eor $i2,$i2,$i1 @ rk[14]=rk[6]^rk[13]
726 eor $i3,$i3,$i2 @ rk[15]=rk[7]^rk[14]
733 ldmia sp!,{r4-r12,lr}
739 moveq pc,lr @ be binary compatible with V4, yet
740 bx lr @ interoperable with Thumb ISA:-)
742 .size AES_set_encrypt_key,.-AES_set_encrypt_key
744 .global AES_set_decrypt_key
745 .type AES_set_decrypt_key,%function
748 str lr,[sp,#-4]! @ push lr
749 bl _armv4_AES_set_encrypt_key
751 ldr lr,[sp],#4 @ pop lr
754 mov r0,r2 @ AES_set_encrypt_key preserves r2,
755 mov r1,r2 @ which is AES_KEY *key
756 b _armv4_AES_set_enc2dec_key
757 .size AES_set_decrypt_key,.-AES_set_decrypt_key
759 @ void AES_set_enc2dec_key(const AES_KEY *inp,AES_KEY *out)
760 .global AES_set_enc2dec_key
761 .type AES_set_enc2dec_key,%function
764 _armv4_AES_set_enc2dec_key:
765 stmdb sp!,{r4-r12,lr}
767 ldr $rounds,[r0,#240]
769 add $i2,r0,$rounds,lsl#4
771 add $tbl,r1,$rounds,lsl#4
772 str $rounds,[r1,#240]
774 .Linv: ldr $s0,[$i1],#16
785 str $s3,[$tbl,#16+12]
801 sub $key,$key,$rounds,lsl#3
807 ldr $s0,[$key,#16]! @ prefetch tp1
810 orr $mask80,$mask80,#0x8000
811 orr $mask1b,$mask1b,#0x1b00
812 orr $mask80,$mask80,$mask80,lsl#16
813 orr $mask1b,$mask1b,$mask1b,lsl#16
814 sub $rounds,$rounds,#1
816 mov $rounds,$rounds,lsl#2 @ (rounds-1)*4
818 .Lmix: and $t1,$s0,$mask80
820 sub $t1,$t1,$t1,lsr#7
822 eor $s1,$t1,$s1,lsl#1 @ tp2
826 sub $t1,$t1,$t1,lsr#7
828 eor $s2,$t1,$s2,lsl#1 @ tp4
832 sub $t1,$t1,$t1,lsr#7
834 eor $s3,$t1,$s3,lsl#1 @ tp8
837 eor $t2,$s0,$s3 @ tp9
838 eor $t1,$t1,$s3 @ tpe
839 eor $t1,$t1,$s1,ror#24
840 eor $t1,$t1,$t2,ror#24 @ ^= ROTATE(tpb=tp9^tp2,8)
841 eor $t1,$t1,$s2,ror#16
842 eor $t1,$t1,$t2,ror#16 @ ^= ROTATE(tpd=tp9^tp4,16)
843 eor $t1,$t1,$t2,ror#8 @ ^= ROTATE(tp9,24)
845 ldr $s0,[$key,#4] @ prefetch tp1
847 subs $rounds,$rounds,#1
852 ldmia sp!,{r4-r12,pc}
854 ldmia sp!,{r4-r12,lr}
856 moveq pc,lr @ be binary compatible with V4, yet
857 bx lr @ interoperable with Thumb ISA:-)
859 .size AES_set_enc2dec_key,.-AES_set_enc2dec_key
864 .word 0x51f4a750, 0x7e416553, 0x1a17a4c3, 0x3a275e96
865 .word 0x3bab6bcb, 0x1f9d45f1, 0xacfa58ab, 0x4be30393
866 .word 0x2030fa55, 0xad766df6, 0x88cc7691, 0xf5024c25
867 .word 0x4fe5d7fc, 0xc52acbd7, 0x26354480, 0xb562a38f
868 .word 0xdeb15a49, 0x25ba1b67, 0x45ea0e98, 0x5dfec0e1
869 .word 0xc32f7502, 0x814cf012, 0x8d4697a3, 0x6bd3f9c6
870 .word 0x038f5fe7, 0x15929c95, 0xbf6d7aeb, 0x955259da
871 .word 0xd4be832d, 0x587421d3, 0x49e06929, 0x8ec9c844
872 .word 0x75c2896a, 0xf48e7978, 0x99583e6b, 0x27b971dd
873 .word 0xbee14fb6, 0xf088ad17, 0xc920ac66, 0x7dce3ab4
874 .word 0x63df4a18, 0xe51a3182, 0x97513360, 0x62537f45
875 .word 0xb16477e0, 0xbb6bae84, 0xfe81a01c, 0xf9082b94
876 .word 0x70486858, 0x8f45fd19, 0x94de6c87, 0x527bf8b7
877 .word 0xab73d323, 0x724b02e2, 0xe31f8f57, 0x6655ab2a
878 .word 0xb2eb2807, 0x2fb5c203, 0x86c57b9a, 0xd33708a5
879 .word 0x302887f2, 0x23bfa5b2, 0x02036aba, 0xed16825c
880 .word 0x8acf1c2b, 0xa779b492, 0xf307f2f0, 0x4e69e2a1
881 .word 0x65daf4cd, 0x0605bed5, 0xd134621f, 0xc4a6fe8a
882 .word 0x342e539d, 0xa2f355a0, 0x058ae132, 0xa4f6eb75
883 .word 0x0b83ec39, 0x4060efaa, 0x5e719f06, 0xbd6e1051
884 .word 0x3e218af9, 0x96dd063d, 0xdd3e05ae, 0x4de6bd46
885 .word 0x91548db5, 0x71c45d05, 0x0406d46f, 0x605015ff
886 .word 0x1998fb24, 0xd6bde997, 0x894043cc, 0x67d99e77
887 .word 0xb0e842bd, 0x07898b88, 0xe7195b38, 0x79c8eedb
888 .word 0xa17c0a47, 0x7c420fe9, 0xf8841ec9, 0x00000000
889 .word 0x09808683, 0x322bed48, 0x1e1170ac, 0x6c5a724e
890 .word 0xfd0efffb, 0x0f853856, 0x3daed51e, 0x362d3927
891 .word 0x0a0fd964, 0x685ca621, 0x9b5b54d1, 0x24362e3a
892 .word 0x0c0a67b1, 0x9357e70f, 0xb4ee96d2, 0x1b9b919e
893 .word 0x80c0c54f, 0x61dc20a2, 0x5a774b69, 0x1c121a16
894 .word 0xe293ba0a, 0xc0a02ae5, 0x3c22e043, 0x121b171d
895 .word 0x0e090d0b, 0xf28bc7ad, 0x2db6a8b9, 0x141ea9c8
896 .word 0x57f11985, 0xaf75074c, 0xee99ddbb, 0xa37f60fd
897 .word 0xf701269f, 0x5c72f5bc, 0x44663bc5, 0x5bfb7e34
898 .word 0x8b432976, 0xcb23c6dc, 0xb6edfc68, 0xb8e4f163
899 .word 0xd731dcca, 0x42638510, 0x13972240, 0x84c61120
900 .word 0x854a247d, 0xd2bb3df8, 0xaef93211, 0xc729a16d
901 .word 0x1d9e2f4b, 0xdcb230f3, 0x0d8652ec, 0x77c1e3d0
902 .word 0x2bb3166c, 0xa970b999, 0x119448fa, 0x47e96422
903 .word 0xa8fc8cc4, 0xa0f03f1a, 0x567d2cd8, 0x223390ef
904 .word 0x87494ec7, 0xd938d1c1, 0x8ccaa2fe, 0x98d40b36
905 .word 0xa6f581cf, 0xa57ade28, 0xdab78e26, 0x3fadbfa4
906 .word 0x2c3a9de4, 0x5078920d, 0x6a5fcc9b, 0x547e4662
907 .word 0xf68d13c2, 0x90d8b8e8, 0x2e39f75e, 0x82c3aff5
908 .word 0x9f5d80be, 0x69d0937c, 0x6fd52da9, 0xcf2512b3
909 .word 0xc8ac993b, 0x10187da7, 0xe89c636e, 0xdb3bbb7b
910 .word 0xcd267809, 0x6e5918f4, 0xec9ab701, 0x834f9aa8
911 .word 0xe6956e65, 0xaaffe67e, 0x21bccf08, 0xef15e8e6
912 .word 0xbae79bd9, 0x4a6f36ce, 0xea9f09d4, 0x29b07cd6
913 .word 0x31a4b2af, 0x2a3f2331, 0xc6a59430, 0x35a266c0
914 .word 0x744ebc37, 0xfc82caa6, 0xe090d0b0, 0x33a7d815
915 .word 0xf104984a, 0x41ecdaf7, 0x7fcd500e, 0x1791f62f
916 .word 0x764dd68d, 0x43efb04d, 0xccaa4d54, 0xe49604df
917 .word 0x9ed1b5e3, 0x4c6a881b, 0xc12c1fb8, 0x4665517f
918 .word 0x9d5eea04, 0x018c355d, 0xfa877473, 0xfb0b412e
919 .word 0xb3671d5a, 0x92dbd252, 0xe9105633, 0x6dd64713
920 .word 0x9ad7618c, 0x37a10c7a, 0x59f8148e, 0xeb133c89
921 .word 0xcea927ee, 0xb761c935, 0xe11ce5ed, 0x7a47b13c
922 .word 0x9cd2df59, 0x55f2733f, 0x1814ce79, 0x73c737bf
923 .word 0x53f7cdea, 0x5ffdaa5b, 0xdf3d6f14, 0x7844db86
924 .word 0xcaaff381, 0xb968c43e, 0x3824342c, 0xc2a3405f
925 .word 0x161dc372, 0xbce2250c, 0x283c498b, 0xff0d9541
926 .word 0x39a80171, 0x080cb3de, 0xd8b4e49c, 0x6456c190
927 .word 0x7bcb8461, 0xd532b670, 0x486c5c74, 0xd0b85742
929 .byte 0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38
930 .byte 0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb
931 .byte 0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87
932 .byte 0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb
933 .byte 0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d
934 .byte 0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e
935 .byte 0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2
936 .byte 0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25
937 .byte 0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16
938 .byte 0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, 0xb6, 0x92
939 .byte 0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda
940 .byte 0x5e, 0x15, 0x46, 0x57, 0xa7, 0x8d, 0x9d, 0x84
941 .byte 0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a
942 .byte 0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06
943 .byte 0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02
944 .byte 0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b
945 .byte 0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea
946 .byte 0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, 0x73
947 .byte 0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85
948 .byte 0xe2, 0xf9, 0x37, 0xe8, 0x1c, 0x75, 0xdf, 0x6e
949 .byte 0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89
950 .byte 0x6f, 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b
951 .byte 0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20
952 .byte 0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4
953 .byte 0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31
954 .byte 0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f
955 .byte 0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d
956 .byte 0x2d, 0xe5, 0x7a, 0x9f, 0x93, 0xc9, 0x9c, 0xef
957 .byte 0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0
958 .byte 0xc8, 0xeb, 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61
959 .byte 0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26
960 .byte 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d
961 .size AES_Td,.-AES_Td
963 @ void AES_decrypt(const unsigned char *in, unsigned char *out,
964 @ const AES_KEY *key) {
966 .type AES_decrypt,%function
970 sub r3,pc,#8 @ AES_decrypt
974 stmdb sp!,{r1,r4-r12,lr}
978 sub $tbl,r3,#AES_decrypt-AES_Td @ Td
983 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
984 ldrb $t1,[$rounds,#2] @ manner...
985 ldrb $t2,[$rounds,#1]
986 ldrb $t3,[$rounds,#0]
987 orr $s0,$s0,$t1,lsl#8
988 ldrb $s1,[$rounds,#7]
989 orr $s0,$s0,$t2,lsl#16
990 ldrb $t1,[$rounds,#6]
991 orr $s0,$s0,$t3,lsl#24
992 ldrb $t2,[$rounds,#5]
993 ldrb $t3,[$rounds,#4]
994 orr $s1,$s1,$t1,lsl#8
995 ldrb $s2,[$rounds,#11]
996 orr $s1,$s1,$t2,lsl#16
997 ldrb $t1,[$rounds,#10]
998 orr $s1,$s1,$t3,lsl#24
999 ldrb $t2,[$rounds,#9]
1000 ldrb $t3,[$rounds,#8]
1001 orr $s2,$s2,$t1,lsl#8
1002 ldrb $s3,[$rounds,#15]
1003 orr $s2,$s2,$t2,lsl#16
1004 ldrb $t1,[$rounds,#14]
1005 orr $s2,$s2,$t3,lsl#24
1006 ldrb $t2,[$rounds,#13]
1007 ldrb $t3,[$rounds,#12]
1008 orr $s3,$s3,$t1,lsl#8
1009 orr $s3,$s3,$t2,lsl#16
1010 orr $s3,$s3,$t3,lsl#24
1012 ldr $s0,[$rounds,#0]
1013 ldr $s1,[$rounds,#4]
1014 ldr $s2,[$rounds,#8]
1015 ldr $s3,[$rounds,#12]
1023 bl _armv4_AES_decrypt
1025 ldr $rounds,[sp],#4 @ pop out
1033 str $s0,[$rounds,#0]
1034 str $s1,[$rounds,#4]
1035 str $s2,[$rounds,#8]
1036 str $s3,[$rounds,#12]
1038 mov $t1,$s0,lsr#24 @ write output in endian-neutral
1039 mov $t2,$s0,lsr#16 @ manner...
1041 strb $t1,[$rounds,#0]
1042 strb $t2,[$rounds,#1]
1044 strb $t3,[$rounds,#2]
1046 strb $s0,[$rounds,#3]
1048 strb $t1,[$rounds,#4]
1049 strb $t2,[$rounds,#5]
1051 strb $t3,[$rounds,#6]
1053 strb $s1,[$rounds,#7]
1055 strb $t1,[$rounds,#8]
1056 strb $t2,[$rounds,#9]
1058 strb $t3,[$rounds,#10]
1060 strb $s2,[$rounds,#11]
1062 strb $t1,[$rounds,#12]
1063 strb $t2,[$rounds,#13]
1064 strb $t3,[$rounds,#14]
1065 strb $s3,[$rounds,#15]
1068 ldmia sp!,{r4-r12,pc}
1070 ldmia sp!,{r4-r12,lr}
1072 moveq pc,lr @ be binary compatible with V4, yet
1073 bx lr @ interoperable with Thumb ISA:-)
1075 .size AES_decrypt,.-AES_decrypt
1077 .type _armv4_AES_decrypt,%function
1080 str lr,[sp,#-4]! @ push lr
1081 ldmia $key!,{$t1-$i1}
1083 ldr $rounds,[$key,#240-16]
1087 sub $rounds,$rounds,#1
1090 and $i1,lr,$s0,lsr#16
1091 and $i2,lr,$s0,lsr#8
1095 ldr $t1,[$tbl,$i1,lsl#2] @ Td1[s0>>16]
1097 ldr $t2,[$tbl,$i2,lsl#2] @ Td2[s0>>8]
1098 and $i2,lr,$s1,lsr#16
1099 ldr $t3,[$tbl,$i3,lsl#2] @ Td3[s0>>0]
1100 and $i3,lr,$s1,lsr#8
1101 ldr $s0,[$tbl,$s0,lsl#2] @ Td0[s0>>24]
1104 ldr $i1,[$tbl,$i1,lsl#2] @ Td3[s1>>0]
1105 ldr $i2,[$tbl,$i2,lsl#2] @ Td1[s1>>16]
1106 ldr $i3,[$tbl,$i3,lsl#2] @ Td2[s1>>8]
1107 eor $s0,$s0,$i1,ror#24
1108 ldr $s1,[$tbl,$s1,lsl#2] @ Td0[s1>>24]
1109 and $i1,lr,$s2,lsr#8 @ i0
1110 eor $t2,$i2,$t2,ror#8
1112 eor $t3,$i3,$t3,ror#8
1113 and $i3,lr,$s2,lsr#16
1114 ldr $i1,[$tbl,$i1,lsl#2] @ Td2[s2>>8]
1115 eor $s1,$s1,$t1,ror#8
1116 ldr $i2,[$tbl,$i2,lsl#2] @ Td3[s2>>0]
1119 ldr $i3,[$tbl,$i3,lsl#2] @ Td1[s2>>16]
1120 eor $s0,$s0,$i1,ror#16
1121 ldr $s2,[$tbl,$s2,lsl#2] @ Td0[s2>>24]
1122 and $i1,lr,$s3,lsr#16 @ i0
1123 eor $s1,$s1,$i2,ror#24
1124 and $i2,lr,$s3,lsr#8 @ i1
1125 eor $t3,$i3,$t3,ror#8
1127 ldr $i1,[$tbl,$i1,lsl#2] @ Td1[s3>>16]
1128 eor $s2,$s2,$t2,ror#8
1129 ldr $i2,[$tbl,$i2,lsl#2] @ Td2[s3>>8]
1132 ldr $i3,[$tbl,$i3,lsl#2] @ Td3[s3>>0]
1133 eor $s0,$s0,$i1,ror#8
1135 eor $s1,$s1,$i2,ror#16
1136 ldr $s3,[$tbl,$s3,lsl#2] @ Td0[s3>>24]
1137 eor $s2,$s2,$i3,ror#24
1142 eor $s3,$s3,$t3,ror#8
1144 and $i1,lr,$s0,lsr#16
1146 and $i2,lr,$s0,lsr#8
1152 subs $rounds,$rounds,#1
1157 ldr $t2,[$tbl,#0] @ prefetch Td4
1166 ldrb $s0,[$tbl,$s0] @ Td4[s0>>24]
1167 ldrb $t1,[$tbl,$i1] @ Td4[s0>>16]
1169 ldrb $t2,[$tbl,$i2] @ Td4[s0>>8]
1170 and $i2,lr,$s1,lsr#16
1171 ldrb $t3,[$tbl,$i3] @ Td4[s0>>0]
1172 and $i3,lr,$s1,lsr#8
1174 add $s1,$tbl,$s1,lsr#24
1175 ldrb $i1,[$tbl,$i1] @ Td4[s1>>0]
1176 ldrb $s1,[$s1] @ Td4[s1>>24]
1177 ldrb $i2,[$tbl,$i2] @ Td4[s1>>16]
1178 eor $s0,$i1,$s0,lsl#24
1179 ldrb $i3,[$tbl,$i3] @ Td4[s1>>8]
1180 eor $s1,$t1,$s1,lsl#8
1181 and $i1,lr,$s2,lsr#8 @ i0
1182 eor $t2,$t2,$i2,lsl#8
1184 ldrb $i1,[$tbl,$i1] @ Td4[s2>>8]
1185 eor $t3,$t3,$i3,lsl#8
1186 ldrb $i2,[$tbl,$i2] @ Td4[s2>>0]
1187 and $i3,lr,$s2,lsr#16
1189 add $s2,$tbl,$s2,lsr#24
1190 ldrb $s2,[$s2] @ Td4[s2>>24]
1191 eor $s0,$s0,$i1,lsl#8
1192 ldrb $i3,[$tbl,$i3] @ Td4[s2>>16]
1193 eor $s1,$i2,$s1,lsl#16
1194 and $i1,lr,$s3,lsr#16 @ i0
1195 eor $s2,$t2,$s2,lsl#16
1196 and $i2,lr,$s3,lsr#8 @ i1
1197 ldrb $i1,[$tbl,$i1] @ Td4[s3>>16]
1198 eor $t3,$t3,$i3,lsl#16
1199 ldrb $i2,[$tbl,$i2] @ Td4[s3>>8]
1202 add $s3,$tbl,$s3,lsr#24
1203 ldrb $i3,[$tbl,$i3] @ Td4[s3>>0]
1204 ldrb $s3,[$s3] @ Td4[s3>>24]
1205 eor $s0,$s0,$i1,lsl#16
1207 eor $s1,$s1,$i2,lsl#8
1209 eor $s2,$i3,$s2,lsl#8
1211 eor $s3,$t3,$s3,lsl#24
1220 ldr pc,[sp],#4 @ pop and return
1221 .size _armv4_AES_decrypt,.-_armv4_AES_decrypt
1222 .asciz "AES for ARMv4, CRYPTOGAMS by <appro\@openssl.org>"
1226 $code =~ s/\bbx\s+lr\b/.word\t0xe12fff1e/gm; # make it possible to compile with -march=armv4
1227 $code =~ s/\bret\b/bx\tlr/gm;
1232 last if (!s/^#/@/ and !/^$/);
1238 close STDOUT; # enforce flush