aboutsummaryrefslogtreecommitdiffstats
path: root/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
blob: 1687c80c59952d373a061d906f08a4e465fd0038 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
/*
 * Multi-buffer SHA256 algorithm hash compute routine
 *
 * This file is provided under a dual BSD/GPLv2 license.  When using or
 * redistributing this file, you may do so under either license.
 *
 * GPL LICENSE SUMMARY
 *
 *  Copyright(c) 2016 Intel Corporation.
 *
 *  This program is free software; you can redistribute it and/or modify
 *  it under the terms of version 2 of the GNU General Public License as
 *  published by the Free Software Foundation.
 *
 *  This program is distributed in the hope that it will be useful, but
 *  WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 *  General Public License for more details.
 *
 *  Contact Information:
 *	Megha Dey <megha.dey@linux.intel.com>
 *
 *  BSD LICENSE
 *
 *  Copyright(c) 2016 Intel Corporation.
 *
 *  Redistribution and use in source and binary forms, with or without
 *  modification, are permitted provided that the following conditions
 *  are met:
 *
 *    * Redistributions of source code must retain the above copyright
 *      notice, this list of conditions and the following disclaimer.
 *    * Redistributions in binary form must reproduce the above copyright
 *      notice, this list of conditions and the following disclaimer in
 *      the documentation and/or other materials provided with the
 *      distribution.
 *    * Neither the name of Intel Corporation nor the names of its
 *      contributors may be used to endorse or promote products derived
 *      from this software without specific prior written permission.
 *
 *  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 *  "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 *  LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
 *  A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
 *  OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 *  SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
 *  LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 *  DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 *  THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 *  (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

#include <linux/linkage.h>
#include "sha256_mb_mgr_datastruct.S"

## code to compute oct SHA256 using SSE-256
## outer calling routine takes care of save and restore of XMM registers
## Logic designed/laid out by JDG

## Function clobbers: rax, rcx, rdx,   rbx, rsi, rdi, r9-r15; %ymm0-15
## Linux clobbers:    rax rbx rcx rdx rsi            r9 r10 r11 r12 r13 r14 r15
## Linux preserves:                       rdi rbp r8
##
## clobbers %ymm0-15

arg1 = %rdi
arg2 = %rsi
reg3 = %rcx
reg4 = %rdx

# Common definitions
STATE = arg1
INP_SIZE = arg2

IDX = %rax
ROUND = %rbx
TBL = reg3

inp0 = %r9
inp1 = %r10
inp2 = %r11
inp3 = %r12
inp4 = %r13
inp5 = %r14
inp6 = %r15
inp7 = reg4

a = %ymm0
b = %ymm1
c = %ymm2
d = %ymm3
e = %ymm4
f = %ymm5
g = %ymm6
h = %ymm7

T1 = %ymm8

a0 = %ymm12
a1 = %ymm13
a2 = %ymm14
TMP = %ymm15
TMP0 = %ymm6
TMP1 = %ymm7

TT0 = %ymm8
TT1 = %ymm9
TT2 = %ymm10
TT3 = %ymm11
TT4 = %ymm12
TT5 = %ymm13
TT6 = %ymm14
TT7 = %ymm15

# Define stack usage

# Assume stack aligned to 32 bytes before call
# Therefore FRAMESZ mod 32 must be 32-8 = 24

#define FRAMESZ	0x388

#define VMOVPS	vmovups

# TRANSPOSE8 r0, r1, r2, r3, r4, r5, r6, r7, t0, t1
# "transpose" data in {r0...r7} using temps {t0...t1}
# Input looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
# r0 = {a7 a6 a5 a4   a3 a2 a1 a0}
# r1 = {b7 b6 b5 b4   b3 b2 b1 b0}
# r2 = {c7 c6 c5 c4   c3 c2 c1 c0}
# r3 = {d7 d6 d5 d4   d3 d2 d1 d0}
# r4 = {e7 e6 e5 e4   e3 e2 e1 e0}
# r5 = {f7 f6 f5 f4   f3 f2 f1 f0}
# r6 = {g7 g6 g5 g4   g3 g2 g1 g0}
# r7 = {h7 h6 h5 h4   h3 h2 h1 h0}
#
# Output looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
# r0 = {h0 g0 f0 e0   d0 c0 b0 a0}
# r1 = {h1 g1 f1 e1   d1 c1 b1 a1}
# r2 = {h2 g2 f2 e2   d2 c2 b2 a2}
# r3 = {h3 g3 f3 e3   d3 c3 b3 a3}
# r4 = {h4 g4 f4 e4   d4 c4 b4 a4}
# r5 = {h5 g5 f5 e5   d5 c5 b5 a5}
# r6 = {h6 g6 f6 e6   d6 c6 b6 a6}
# r7 = {h7 g7 f7 e7   d7 c7 b7 a7}
#

.macro TRANSPOSE8 r0 r1 r2 r3 r4 r5 r6 r7 t0 t1
	# process top half (r0..r3) {a...d}
	vshufps	$0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4   b1 b0 a1 a0}
	vshufps	$0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6   b3 b2 a3 a2}
	vshufps	$0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4   d1 d0 c1 c0}
	vshufps	$0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6   d3 d2 c3 c2}
	vshufps	$0xDD, \t1, \t0, \r3 # r3 = {d5 c5 b5 a5   d1 c1 b1 a1}
	vshufps	$0x88, \r2, \r0, \r1 # r1 = {d6 c6 b6 a6   d2 c2 b2 a2}
	vshufps	$0xDD, \r2, \r0, \r0 # r0 = {d7 c7 b7 a7   d3 c3 b3 a3}
	vshufps	$0x88, \t1, \t0, \t0 # t0 = {d4 c4 b4 a4   d0 c0 b0 a0}

	# use r2 in place of t0
	# process bottom half (r4..r7) {e...h}
	vshufps	$0x44, \r5, \r4, \r2 # r2 = {f5 f4 e5 e4   f1 f0 e1 e0}
	vshufps	$0xEE, \r5, \r4, \r4 # r4 = {f7 f6 e7 e6   f3 f2 e3 e2}
	vshufps	$0x44, \r7, \r6, \t1 # t1 = {h5 h4 g5 g4   h1 h0 g1 g0}
	vshufps	$0xEE, \r7, \r6, \r6 # r6 = {h7 h6 g7 g6   h3 h2 g3 g2}
	vshufps	$0xDD, \t1, \r2, \r7 # r7 = {h5 g5 f5 e5   h1 g1 f1 e1}
	vshufps	$0x88, \r6, \r4, \r5 # r5 = {h6 g6 f6 e6   h2 g2 f2 e2}
	vshufps	$0xDD, \r6, \r4, \r4 # r4 = {h7 g7 f7 e7   h3 g3 f3 e3}
	vshufps	$0x88, \t1, \r2, \t1 # t1 = {h4 g4 f4 e4   h0 g0 f0 e0}

	vperm2f128	$0x13, \r1, \r5, \r6  # h6...a6
	vperm2f128	$0x02, \r1, \r5, \r2  # h2...a2
	vperm2f128	$0x13, \r3, \r7, \r5  # h5...a5
	vperm2f128	$0x02, \r3, \r7, \r1  # h1...a1
	vperm2f128	$0x13, \r0, \r4, \r7  # h7...a7
	vperm2f128	$0x02, \r0, \r4, \r3  # h3...a3
	vperm2f128	$0x13, \t0, \t1, \r4  # h4...a4
	vperm2f128	$0x02, \t0, \t1, \r0  # h0...a0

.endm

.macro ROTATE_ARGS
TMP_ = h
h = g
g = f
f = e
e = d
d = c
c = b
b = a
a = TMP_
.endm

.macro _PRORD reg imm tmp
	vpslld	$(32-\imm),\reg,\tmp
	vpsrld	$\imm,\reg, \reg
	vpor	\tmp,\reg, \reg
.endm

# PRORD_nd reg, imm, tmp, src
.macro _PRORD_nd reg imm tmp src
	vpslld	$(32-\imm), \src, \tmp
	vpsrld	$\imm, \src, \reg
	vpor	\tmp, \reg, \reg
.endm

# PRORD dst/src, amt
.macro PRORD reg imm
	_PRORD	\reg,\imm,TMP
.endm

# PRORD_nd dst, src, amt
.macro PRORD_nd reg tmp imm
	_PRORD_nd	\reg, \imm, TMP, \tmp
.endm

# arguments passed implicitly in preprocessor symbols i, a...h
.macro ROUND_00_15 _T1 i
	PRORD_nd	a0,e,5	# sig1: a0 = (e >> 5)

	vpxor	g, f, a2	# ch: a2 = f^g
	vpand	e,a2, a2	# ch: a2 = (f^g)&e
	vpxor	g, a2, a2	# a2 = ch

	PRORD_nd	a1,e,25	# sig1: a1 = (e >> 25)

	vmovdqu	\_T1,(SZ8*(\i & 0xf))(%rsp)
	vpaddd	(TBL,ROUND,1), \_T1, \_T1	# T1 = W + K
	vpxor	e,a0, a0	# sig1: a0 = e ^ (e >> 5)
	PRORD	a0, 6		# sig1: a0 = (e >> 6) ^ (e >> 11)
	vpaddd	a2, h, h	# h = h + ch
	PRORD_nd	a2,a,11	# sig0: a2 = (a >> 11)
	vpaddd	\_T1,h, h 	# h = h + ch + W + K
	vpxor	a1, a0, a0	# a0 = sigma1
	PRORD_nd	a1,a,22	# sig0: a1 = (a >> 22)
	vpxor	c, a, \_T1	# maj: T1 = a^c
	add	$SZ8, ROUND	# ROUND++
	vpand	b, \_T1, \_T1	# maj: T1 = (a^c)&b
	vpaddd	a0, h, h
	vpaddd	h, d, d
	vpxor	a, a2, a2	# sig0: a2 = a ^ (a >> 11)
	PRORD	a2,2		# sig0: a2 = (a >> 2) ^ (a >> 13)
	vpxor	a1, a2, a2	# a2 = sig0
	vpand	c, a, a1	# maj: a1 = a&c
	vpor	\_T1, a1, a1 	# a1 = maj
	vpaddd	a1, h, h	# h = h + ch + W + K + maj
	vpaddd	a2, h, h	# h = h + ch + W + K + maj + sigma0
	ROTATE_ARGS
.endm

# arguments passed implicitly in preprocessor symbols i, a...h
.macro ROUND_16_XX _T1 i
	vmovdqu	(SZ8*((\i-15)&0xf))(%rsp), \_T1
	vmovdqu	(SZ8*((\i-2)&0xf))(%rsp), a1
	vmovdqu	\_T1, a0
	PRORD	\_T1,11
	vmovdqu	a1, a2
	PRORD	a1,2
	vpxor	a0, \_T1, \_T1
	PRORD	\_T1, 7
	vpxor	a2, a1, a1
	PRORD	a1, 17
	vpsrld	$3, a0, a0
	vpxor	a0, \_T1, \_T1
	vpsrld	$10, a2, a2
	vpxor	a2, a1, a1
	vpaddd	(SZ8*((\i-16)&0xf))(%rsp), \_T1, \_T1
	vpaddd	(SZ8*((\i-7)&0xf))(%rsp), a1, a1
	vpaddd	a1, \_T1, \_T1

	ROUND_00_15 \_T1,\i
.endm

# SHA256_ARGS:
#   UINT128 digest[8];  // transposed digests
#   UINT8  *data_ptr[4];

# void sha256_x8_avx2(SHA256_ARGS *args, UINT64 bytes);
# arg 1 : STATE : pointer to array of pointers to input data
# arg 2 : INP_SIZE  : size of input in blocks
	# general registers preserved in outer calling routine
	# outer calling routine saves all the XMM registers
	# save rsp, allocate 32-byte aligned for local variables
ENTRY(sha256_x8_avx2)

	# save callee-saved clobbered registers to comply with C function ABI
	push    %r12
	push    %r13
	push    %r14
	push    %r15

	mov	%rsp, IDX
	sub	$FRAMESZ, %rsp
	and	$~0x1F, %rsp
	mov	IDX, _rsp(%rsp)

	# Load the pre-transposed incoming digest.
	vmovdqu	0*SHA256_DIGEST_ROW_SIZE(STATE),a
	vmovdqu	1*SHA256_DIGEST_ROW_SIZE(STATE),b
	vmovdqu	2*SHA256_DIGEST_ROW_SIZE(STATE),c
	vmovdqu	3*SHA256_DIGEST_ROW_SIZE(STATE),d
	vmovdqu	4*SHA256_DIGEST_ROW_SIZE(STATE),e
	vmovdqu	5*SHA256_DIGEST_ROW_SIZE(STATE),f
	vmovdqu	6*SHA256_DIGEST_ROW_SIZE(STATE),g
	vmovdqu	7*SHA256_DIGEST_ROW_SIZE(STATE),h

	lea	K256_8(%rip),TBL

	# load the address of each of the 4 message lanes
	# getting ready to transpose input onto stack
	mov	_args_data_ptr+0*PTR_SZ(STATE),inp0
	mov	_args_data_ptr+1*PTR_SZ(STATE),inp1
	mov	_args_data_ptr+2*PTR_SZ(STATE),inp2
	mov	_args_data_ptr+3*PTR_SZ(STATE),inp3
	mov	_args_data_ptr+4*PTR_SZ(STATE),inp4
	mov	_args_data_ptr+5*PTR_SZ(STATE),inp5
	mov	_args_data_ptr+6*PTR_SZ(STATE),inp6
	mov	_args_data_ptr+7*PTR_SZ(STATE),inp7

	xor	IDX, IDX
lloop:
	xor	ROUND, ROUND

	# save old digest
	vmovdqu	a, _digest(%rsp)
	vmovdqu	b, _digest+1*SZ8(%rsp)
	vmovdqu	c, _digest+2*SZ8(%rsp)
	vmovdqu	d, _digest+3*SZ8(%rsp)
	vmovdqu	e, _digest+4*SZ8(%rsp)
	vmovdqu	f, _digest+5*SZ8(%rsp)
	vmovdqu	g, _digest+6*SZ8(%rsp)
	vmovdqu	h, _digest+7*SZ8(%rsp)
	i = 0
.rep 2
	VMOVPS	i*32(inp0, IDX), TT0
	VMOVPS	i*32(inp1, IDX), TT1
	VMOVPS	i*32(inp2, IDX), TT2
	VMOVPS	i*32(inp3, IDX), TT3
	VMOVPS	i*32(inp4, IDX), TT4
	VMOVPS	i*32(inp5, IDX), TT5
	VMOVPS	i*32(inp6, IDX), TT6
	VMOVPS	i*32(inp7, IDX), TT7
	vmovdqu	g, _ytmp(%rsp)
	vmovdqu	h, _ytmp+1*SZ8(%rsp)
	TRANSPOSE8	TT0, TT1, TT2, TT3, TT4, TT5, TT6, TT7,   TMP0, TMP1
	vmovdqu	PSHUFFLE_BYTE_FLIP_MASK(%rip), TMP1
	vmovdqu	_ytmp(%rsp), g
	vpshufb	TMP1, TT0, TT0
	vpshufb	TMP1, TT1, TT1
	vpshufb	TMP1, TT2, TT2
	vpshufb	TMP1, TT3, TT3
	vpshufb	TMP1, TT4, TT4
	vpshufb	TMP1, TT5, TT5
	vpshufb	TMP1, TT6, TT6
	vpshufb	TMP1, TT7, TT7
	vmovdqu	_ytmp+1*SZ8(%rsp), h
	vmovdqu	TT4, _ytmp(%rsp)
	vmovdqu	TT5, _ytmp+1*SZ8(%rsp)
	vmovdqu	TT6, _ytmp+2*SZ8(%rsp)
	vmovdqu	TT7, _ytmp+3*SZ8(%rsp)
	ROUND_00_15	TT0,(i*8+0)
	vmovdqu	_ytmp(%rsp), TT0
	ROUND_00_15	TT1,(i*8+1)
	vmovdqu	_ytmp+1*SZ8(%rsp), TT1
	ROUND_00_15	TT2,(i*8+2)
	vmovdqu	_ytmp+2*SZ8(%rsp), TT2
	ROUND_00_15	TT3,(i*8+3)
	vmovdqu	_ytmp+3*SZ8(%rsp), TT3
	ROUND_00_15	TT0,(i*8+4)
	ROUND_00_15	TT1,(i*8+5)
	ROUND_00_15	TT2,(i*8+6)
	ROUND_00_15	TT3,(i*8+7)
	i = (i+1)
.endr
	add	$64, IDX
	i = (i*8)

	jmp	Lrounds_16_xx
.align 16
Lrounds_16_xx:
.rep 16
	ROUND_16_XX	T1, i
	i = (i+1)
.endr

	cmp	$ROUNDS,ROUND
	jb	Lrounds_16_xx

	# add old digest
	vpaddd	_digest+0*SZ8(%rsp), a, a
	vpaddd	_digest+1*SZ8(%rsp), b, b
	vpaddd	_digest+2*SZ8(%rsp), c, c
	vpaddd	_digest+3*SZ8(%rsp), d, d
	vpaddd	_digest+4*SZ8(%rsp), e, e
	vpaddd	_digest+5*SZ8(%rsp), f, f
	vpaddd	_digest+6*SZ8(%rsp), g, g
	vpaddd	_digest+7*SZ8(%rsp), h, h

	sub	$1, INP_SIZE  # unit is blocks
	jne	lloop

	# write back to memory (state object) the transposed digest
	vmovdqu	a, 0*SHA256_DIGEST_ROW_SIZE(STATE)
	vmovdqu	b, 1*SHA256_DIGEST_ROW_SIZE(STATE)
	vmovdqu	c, 2*SHA256_DIGEST_ROW_SIZE(STATE)
	vmovdqu	d, 3*SHA256_DIGEST_ROW_SIZE(STATE)
	vmovdqu	e, 4*SHA256_DIGEST_ROW_SIZE(STATE)
	vmovdqu	f, 5*SHA256_DIGEST_ROW_SIZE(STATE)
	vmovdqu	g, 6*SHA256_DIGEST_ROW_SIZE(STATE)
	vmovdqu	h, 7*SHA256_DIGEST_ROW_SIZE(STATE)

	# update input pointers
	add	IDX, inp0
	mov	inp0, _args_data_ptr+0*8(STATE)
	add	IDX, inp1
	mov	inp1, _args_data_ptr+1*8(STATE)
	add	IDX, inp2
	mov	inp2, _args_data_ptr+2*8(STATE)
	add	IDX, inp3
	mov	inp3, _args_data_ptr+3*8(STATE)
	add	IDX, inp4
	mov	inp4, _args_data_ptr+4*8(STATE)
	add	IDX, inp5
	mov	inp5, _args_data_ptr+5*8(STATE)
	add	IDX, inp6
	mov	inp6, _args_data_ptr+6*8(STATE)
	add	IDX, inp7
	mov	inp7, _args_data_ptr+7*8(STATE)

	# Postamble
	mov	_rsp(%rsp), %rsp

	# restore callee-saved clobbered registers
	pop     %r15
	pop     %r14
	pop     %r13
	pop     %r12

	ret
ENDPROC(sha256_x8_avx2)

.section	.rodata.K256_8, "a", @progbits
.align 64
K256_8:
	.octa	0x428a2f98428a2f98428a2f98428a2f98
	.octa	0x428a2f98428a2f98428a2f98428a2f98
	.octa	0x71374491713744917137449171374491
	.octa	0x71374491713744917137449171374491
	.octa	0xb5c0fbcfb5c0fbcfb5c0fbcfb5c0fbcf
	.octa	0xb5c0fbcfb5c0fbcfb5c0fbcfb5c0fbcf
	.octa	0xe9b5dba5e9b5dba5e9b5dba5e9b5dba5
	.octa	0xe9b5dba5e9b5dba5e9b5dba5e9b5dba5
	.octa	0x3956c25b3956c25b3956c25b3956c25b
	.octa	0x3956c25b3956c25b3956c25b3956c25b
	.octa	0x59f111f159f111f159f111f159f111f1
	.octa	0x59f111f159f111f159f111f159f111f1
	.octa	0x923f82a4923f82a4923f82a4923f82a4
	.octa	0x923f82a4923f82a4923f82a4923f82a4
	.octa	0xab1c5ed5ab1c5ed5ab1c5ed5ab1c5ed5
	.octa	0xab1c5ed5ab1c5ed5ab1c5ed5ab1c5ed5
	.octa	0xd807aa98d807aa98d807aa98d807aa98
	.octa	0xd807aa98d807aa98d807aa98d807aa98
	.octa	0x12835b0112835b0112835b0112835b01
	.octa	0x12835b0112835b0112835b0112835b01
	.octa	0x243185be243185be243185be243185be
	.octa	0x243185be243185be243185be243185be
	.octa	0x550c7dc3550c7dc3550c7dc3550c7dc3
	.octa	0x550c7dc3550c7dc3550c7dc3550c7dc3
	.octa	0x72be5d7472be5d7472be5d7472be5d74
	.octa	0x72be5d7472be5d7472be5d7472be5d74
	.octa	0x80deb1fe80deb1fe80deb1fe80deb1fe
	.octa	0x80deb1fe80deb1fe80deb1fe80deb1fe
	.octa	0x9bdc06a79bdc06a79bdc06a79bdc06a7
	.octa	0x9bdc06a79bdc06a79bdc06a79bdc06a7
	.octa	0xc19bf174c19bf174c19bf174c19bf174
	.octa	0xc19bf174c19bf174c19bf174c19bf174
	.octa	0xe49b69c1e49b69c1e49b69c1e49b69c1
	.octa	0xe49b69c1e49b69c1e49b69c1e49b69c1
	.octa	0xefbe4786efbe4786efbe4786efbe4786
	.octa	0xefbe4786efbe4786efbe4786efbe4786
	.octa	0x0fc19dc60fc19dc60fc19dc60fc19dc6
	.octa	0x0fc19dc60fc19dc60fc19dc60fc19dc6
	.octa	0x240ca1cc240ca1cc240ca1cc240ca1cc
	.octa	0x240ca1cc240ca1cc240ca1cc240ca1cc
	.octa	0x2de92c6f2de92c6f2de92c6f2de92c6f
	.octa	0x2de92c6f2de92c6f2de92c6f2de92c6f
	.octa	0x4a7484aa4a7484aa4a7484aa4a7484aa
	.octa	0x4a7484aa4a7484aa4a7484aa4a7484aa
	.octa	0x5cb0a9dc5cb0a9dc5cb0a9dc5cb0a9dc
	.octa	0x5cb0a9dc5cb0a9dc5cb0a9dc5cb0a9dc
	.octa	0x76f988da76f988da76f988da76f988da
	.octa	0x76f988da76f988da76f988da76f988da
	.octa	0x983e5152983e5152983e5152983e5152
	.octa	0x983e5152983e5152983e5152983e5152
	.octa	0xa831c66da831c66da831c66da831c66d
	.octa	0xa831c66da831c66da831c66da831c66d
	.octa	0xb00327c8b00327c8b00327c8b00327c8
	.octa	0xb00327c8b00327c8b00327c8b00327c8
	.octa	0xbf597fc7bf597fc7bf597fc7bf597fc7
	.octa	0xbf597fc7bf597fc7bf597fc7bf597fc7
	.octa	0xc6e00bf3c6e00bf3c6e00bf3c6e00bf3
	.octa	0xc6e00bf3c6e00bf3c6e00bf3c6e00bf3
	.octa	0xd5a79147d5a79147d5a79147d5a79147
	.octa	0xd5a79147d5a79147d5a79147d5a79147
	.octa	0x06ca635106ca635106ca635106ca6351
	.octa	0x06ca635106ca635106ca635106ca6351
	.octa	0x14292967142929671429296714292967
	.octa	0x14292967142929671429296714292967
	.octa	0x27b70a8527b70a8527b70a8527b70a85
	.octa	0x27b70a8527b70a8527b70a8527b70a85
	.octa	0x2e1b21382e1b21382e1b21382e1b2138
	.octa	0x2e1b21382e1b21382e1b21382e1b2138
	.octa	0x4d2c6dfc4d2c6dfc4d2c6dfc4d2c6dfc
	.octa	0x4d2c6dfc4d2c6dfc4d2c6dfc4d2c6dfc
	.octa	0x53380d1353380d1353380d1353380d13
	.octa	0x53380d1353380d1353380d1353380d13
	.octa	0x650a7354650a7354650a7354650a7354
	.octa	0x650a7354650a7354650a7354650a7354
	.octa	0x766a0abb766a0abb766a0abb766a0abb
	.octa	0x766a0abb766a0abb766a0abb766a0abb
	.octa	0x81c2c92e81c2c92e81c2c92e81c2c92e
	.octa	0x81c2c92e81c2c92e81c2c92e81c2c92e
	.octa	0x92722c8592722c8592722c8592722c85
	.octa	0x92722c8592722c8592722c8592722c85
	.octa	0xa2bfe8a1a2bfe8a1a2bfe8a1a2bfe8a1
	.octa	0xa2bfe8a1a2bfe8a1a2bfe8a1a2bfe8a1
	.octa	0xa81a664ba81a664ba81a664ba81a664b
	.octa	0xa81a664ba81a664ba81a664ba81a664b
	.octa	0xc24b8b70c24b8b70c24b8b70c24b8b70
	.octa	0xc24b8b70c24b8b70c24b8b70c24b8b70
	.octa	0xc76c51a3c76c51a3c76c51a3c76c51a3
	.octa	0xc76c51a3c76c51a3c76c51a3c76c51a3
	.octa	0xd192e819d192e819d192e819d192e819
	.octa	0xd192e819d192e819d192e819d192e819
	.octa	0xd6990624d6990624d6990624d6990624
	.octa	0xd6990624d6990624d6990624d6990624
	.octa	0xf40e3585f40e3585f40e3585f40e3585
	.octa	0xf40e3585f40e3585f40e3585f40e3585
	.octa	0x106aa070106aa070106aa070106aa070
	.octa	0x106aa070106aa070106aa070106aa070
	.octa	0x19a4c11619a4c11619a4c11619a4c116
	.octa	0x19a4c11619a4c11619a4c11619a4c116
	.octa	0x1e376c081e376c081e376c081e376c08
	.octa	0x1e376c081e376c081e376c081e376c08
	.octa	0x2748774c2748774c2748774c2748774c
	.octa	0x2748774c2748774c2748774c2748774c
	.octa	0x34b0bcb534b0bcb534b0bcb534b0bcb5
	.octa	0x34b0bcb534b0bcb534b0bcb534b0bcb5
	.octa	0x391c0cb3391c0cb3391c0cb3391c0cb3
	.octa	0x391c0cb3391c0cb3391c0cb3391c0cb3
	.octa	0x4ed8aa4a4ed8aa4a4ed8aa4a4ed8aa4a
	.octa	0x4ed8aa4a4ed8aa4a4ed8aa4a4ed8aa4a
	.octa	0x5b9cca4f5b9cca4f5b9cca4f5b9cca4f
	.octa	0x5b9cca4f5b9cca4f5b9cca4f5b9cca4f
	.octa	0x682e6ff3682e6ff3682e6ff3682e6ff3
	.octa	0x682e6ff3682e6ff3682e6ff3682e6ff3
	.octa	0x748f82ee748f82ee748f82ee748f82ee
	.octa	0x748f82ee748f82ee748f82ee748f82ee
	.octa	0x78a5636f78a5636f78a5636f78a5636f
	.octa	0x78a5636f78a5636f78a5636f78a5636f
	.octa	0x84c8781484c8781484c8781484c87814
	.octa	0x84c8781484c8781484c8781484c87814
	.octa	0x8cc702088cc702088cc702088cc70208
	.octa	0x8cc702088cc702088cc702088cc70208
	.octa	0x90befffa90befffa90befffa90befffa
	.octa	0x90befffa90befffa90befffa90befffa
	.octa	0xa4506ceba4506ceba4506ceba4506ceb
	.octa	0xa4506ceba4506ceba4506ceba4506ceb
	.octa	0xbef9a3f7bef9a3f7bef9a3f7bef9a3f7
	.octa	0xbef9a3f7bef9a3f7bef9a3f7bef9a3f7
	.octa	0xc67178f2c67178f2c67178f2c67178f2
	.octa	0xc67178f2c67178f2c67178f2c67178f2

.section	.rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
.align 32
PSHUFFLE_BYTE_FLIP_MASK:
.octa 0x0c0d0e0f08090a0b0405060700010203
.octa 0x0c0d0e0f08090a0b0405060700010203

.section	.rodata.cst256.K256, "aM", @progbits, 256
.align 64
.global K256
K256:
	.int	0x428a2f98,0x71374491,0xb5c0fbcf,0xe9b5dba5
	.int	0x3956c25b,0x59f111f1,0x923f82a4,0xab1c5ed5
	.int	0xd807aa98,0x12835b01,0x243185be,0x550c7dc3
	.int	0x72be5d74,0x80deb1fe,0x9bdc06a7,0xc19bf174
	.int	0xe49b69c1,0xefbe4786,0x0fc19dc6,0x240ca1cc
	.int	0x2de92c6f,0x4a7484aa,0x5cb0a9dc,0x76f988da
	.int	0x983e5152,0xa831c66d,0xb00327c8,0xbf597fc7
	.int	0xc6e00bf3,0xd5a79147,0x06ca6351,0x14292967
	.int	0x27b70a85,0x2e1b2138,0x4d2c6dfc,0x53380d13
	.int	0x650a7354,0x766a0abb,0x81c2c92e,0x92722c85
	.int	0xa2bfe8a1,0xa81a664b,0xc24b8b70,0xc76c51a3
	.int	0xd192e819,0xd6990624,0xf40e3585,0x106aa070
	.int	0x19a4c116,0x1e376c08,0x2748774c,0x34b0bcb5
	.int	0x391c0cb3,0x4ed8aa4a,0x5b9cca4f,0x682e6ff3
	.int	0x748f82ee,0x78a5636f,0x84c87814,0x8cc70208
	.int	0x90befffa,0xa4506ceb,0xbef9a3f7,0xc67178f2