⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 panama_8cpp-source.html

📁 著名的密码库Crypto++的文档 C++语言的杰作。程序员必备。
💻 HTML
📖 第 1 页 / 共 3 页
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><title>Crypto++: panama.cpp Source File</title><link href="doxygen.css" rel="stylesheet" type="text/css"><link href="tabs.css" rel="stylesheet" type="text/css"></head><body><!-- Generated by Doxygen 1.5.2 --><div class="tabs">  <ul>    <li><a href="index.html"><span>Main&nbsp;Page</span></a></li>    <li><a href="namespaces.html"><span>Namespaces</span></a></li>    <li><a href="classes.html"><span>Classes</span></a></li>    <li class="current"><a href="files.html"><span>Files</span></a></li>  </ul></div><div class="tabs">  <ul>    <li><a href="files.html"><span>File&nbsp;List</span></a></li>    <li><a href="globals.html"><span>File&nbsp;Members</span></a></li>  </ul></div><h1>panama.cpp</h1><div class="fragment"><pre class="fragment"><a name="l00001"></a>00001 <span class="comment">// panama.cpp - written and placed in the public domain by Wei Dai</span><a name="l00002"></a>00002 <a name="l00003"></a>00003 <span class="preprocessor">#include "pch.h"</span><a name="l00004"></a>00004 <span class="preprocessor">#include "panama.h"</span><a name="l00005"></a>00005 <span class="preprocessor">#include "misc.h"</span><a name="l00006"></a>00006 <span class="preprocessor">#include "cpu.h"</span><a name="l00007"></a>00007 <a name="l00008"></a>00008 NAMESPACE_BEGIN(CryptoPP)<a name="l00009"></a>00009 <a name="l00010"></a>00010 template &lt;class B&gt;<a name="l00011"></a><a class="code" href="class_panama.html#20f3428611261bcb3a179d0f59f55722">00011</a> <span class="keywordtype">void</span> <a class="code" href="class_panama.html" title="base class, do not use directly">Panama</a>&lt;B&gt;::Reset()<a name="l00012"></a>00012 {<a name="l00013"></a>00013         memset(m_state, 0, m_state.SizeInBytes());<a name="l00014"></a>00014 <span class="preprocessor">#if CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE</span><a name="l00015"></a>00015 <span class="preprocessor"></span>        m_state[17] = HasSSSE3();<a name="l00016"></a>00016 <span class="preprocessor">#endif</span><a name="l00017"></a>00017 <span class="preprocessor"></span>}<a name="l00018"></a>00018 <a name="l00019"></a>00019 <span class="preprocessor">#if CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE</span><a name="l00020"></a>00020 <span class="preprocessor"></span><a name="l00021"></a>00021 <span class="preprocessor">#pragma warning(disable: 4731)  // frame pointer register 'ebp' modified by inline assembly code</span><a name="l00022"></a>00022 <span class="preprocessor"></span><a name="l00023"></a>00023 <span class="keywordtype">void</span> Panama_SSE2_Pull(<span class="keywordtype">size_t</span> count, word32 *state, word32 *z, <span class="keyword">const</span> word32 *y)<a name="l00024"></a>00024 {<a name="l00025"></a>00025 <span class="preprocessor">#ifdef __GNUC__</span><a name="l00026"></a>00026 <span class="preprocessor"></span>        __asm__ __volatile__<a name="l00027"></a>00027         (<a name="l00028"></a>00028                 <span class="stringliteral">".intel_syntax noprefix;"</span><a name="l00029"></a>00029         AS_PUSH(                bx)<a name="l00030"></a>00030 #<span class="keywordflow">else</span><a name="l00031"></a>00031         AS2(    mov             WORD_REG(cx), count)<a name="l00032"></a>00032         AS2(    mov             WORD_REG(si), state)<a name="l00033"></a>00033         AS2(    mov             WORD_REG(di), z)<a name="l00034"></a>00034         AS2(    mov             WORD_REG(dx), y)<a name="l00035"></a>00035 #endif<a name="l00036"></a>00036         AS2(    shl             WORD_REG(cx), 5)<a name="l00037"></a>00037         ASJ(    jz,             5, f)<a name="l00038"></a>00038         AS2(    mov             ebx, [WORD_REG(si)+4*17])<a name="l00039"></a>00039         AS2(    <span class="keyword">add</span>             WORD_REG(cx), WORD_REG(bx))<a name="l00040"></a>00040 <a name="l00041"></a>00041         AS_PUSH(                bp)<a name="l00042"></a>00042         AS_PUSH(                cx)<a name="l00043"></a>00043 <a name="l00044"></a>00044         AS2(    movdqa  xmm0, [WORD_REG(si)+0*16])<a name="l00045"></a>00045         AS2(    movdqa  xmm1, [WORD_REG(si)+1*16])<a name="l00046"></a>00046         AS2(    movdqa  xmm2, [WORD_REG(si)+2*16])<a name="l00047"></a>00047         AS2(    movdqa  xmm3, [WORD_REG(si)+3*16])<a name="l00048"></a>00048         AS2(    mov             eax, [WORD_REG(si)+4*16])<a name="l00049"></a>00049 <a name="l00050"></a>00050         ASL(4)<a name="l00051"></a>00051         <span class="comment">// gamma and pi</span><a name="l00052"></a>00052 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE<a name="l00053"></a>00053         AS2(    test    WORD_REG(bx), 1)<a name="l00054"></a>00054         ASJ(    jnz,    6, f)<a name="l00055"></a>00055 #endif<a name="l00056"></a>00056         AS2(    movdqa  xmm6, xmm2)<a name="l00057"></a>00057         AS2(    movss   xmm6, xmm3)<a name="l00058"></a>00058         ASS(    pshufd  xmm5, xmm6, 0, 3, 2, 1)<a name="l00059"></a>00059         AS2(    movd    xmm6, eax)<a name="l00060"></a>00060         AS2(    movdqa  xmm7, xmm3)<a name="l00061"></a>00061         AS2(    movss   xmm7, xmm6)<a name="l00062"></a>00062         ASS(    pshufd  xmm6, xmm7, 0, 3, 2, 1)<a name="l00063"></a>00063 #<span class="keywordflow">if</span> CRYPTOPP_BOOL_SSSE3_ASM_AVAILABLE<a name="l00064"></a>00064         ASJ(    jmp,    7, f)<a name="l00065"></a>00065         ASL(6)<a name="l00066"></a>00066         AS2(    movdqa  xmm5, xmm3)<a name="l00067"></a>00067         AS3(    palignr xmm5, xmm2, 4)<a name="l00068"></a>00068         AS2(    movd    xmm6, eax)<a name="l00069"></a>00069         AS3(    palignr xmm6, xmm3, 4)<a name="l00070"></a>00070         ASL(7)<a name="l00071"></a>00071 #endif<a name="l00072"></a>00072 <a name="l00073"></a>00073         AS2(    movd    ecx, xmm2)<a name="l00074"></a>00074         AS1(    not             ecx)<a name="l00075"></a>00075         AS2(    movd    ebp, xmm3)<a name="l00076"></a>00076         AS2(    or              ecx, ebp)<a name="l00077"></a>00077         AS2(    xor             eax, ecx)<a name="l00078"></a>00078 <a name="l00079"></a>00079 #define SSE2_Index(i) ASM_MOD(((i)*13+16), 17)<a name="l00080"></a>00080 <a name="l00081"></a>00081 #define pi(i)   \<a name="l00082"></a>00082         AS2(    movd    ecx, xmm7)\<a name="l00083"></a>00083         AS2(    rol             ecx, ASM_MOD((ASM_MOD(5*i,17)*(ASM_MOD(5*i,17)+1)/2), 32))\<a name="l00084"></a>00084         AS2(    mov             [WORD_REG(si)+SSE2_Index(ASM_MOD(5*(i), 17))*4], ecx)<a name="l00085"></a>00085 <a name="l00086"></a>00086 #define pi4(x, y, z, a, b, c, d)        \<a name="l00087"></a>00087         AS2(    pcmpeqb xmm7, xmm7)\<a name="l00088"></a>00088         AS2(    pxor    xmm7, x)\<a name="l00089"></a>00089         AS2(    por             xmm7, y)\<a name="l00090"></a>00090         AS2(    pxor    xmm7, z)\<a name="l00091"></a>00091         pi(a)\<a name="l00092"></a>00092         ASS(    pshuflw xmm7, xmm7, 1, 0, 3, 2)\<a name="l00093"></a>00093         pi(b)\<a name="l00094"></a>00094         AS2(    punpckhqdq      xmm7, xmm7)\<a name="l00095"></a>00095         pi(c)\<a name="l00096"></a>00096         ASS(    pshuflw xmm7, xmm7, 1, 0, 3, 2)\<a name="l00097"></a>00097         pi(d)<a name="l00098"></a>00098 <a name="l00099"></a>00099         pi4(xmm1, xmm2, xmm3, 1, 5, 9, 13)<a name="l00100"></a>00100         pi4(xmm0, xmm1, xmm2, 2, 6, 10, 14)<a name="l00101"></a>00101         pi4(xmm6, xmm0, xmm1, 3, 7, 11, 15)<a name="l00102"></a>00102         pi4(xmm5, xmm6, xmm0, 4, 8, 12, 16)<a name="l00103"></a>00103 <a name="l00104"></a>00104         <span class="comment">// output keystream and update buffer here to hide partial memory stalls between pi and theta</span><a name="l00105"></a>00105         AS2(    movdqa  xmm4, xmm3)<a name="l00106"></a>00106         AS2(    punpcklqdq      xmm3, xmm2)             <span class="comment">// 1 5 2 6</span><a name="l00107"></a>00107         AS2(    punpckhdq       xmm4, xmm2)             <span class="comment">// 9 10 13 14</span><a name="l00108"></a>00108         AS2(    movdqa  xmm2, xmm1)<a name="l00109"></a>00109         AS2(    punpcklqdq      xmm1, xmm0)             <span class="comment">// 3 7 4 8</span><a name="l00110"></a>00110         AS2(    punpckhdq       xmm2, xmm0)             <span class="comment">// 11 12 15 16</span><a name="l00111"></a>00111 <a name="l00112"></a>00112         <span class="comment">// keystream</span><a name="l00113"></a>00113         AS2(    test    WORD_REG(di), WORD_REG(di))<a name="l00114"></a>00114         ASJ(    jz,             0, f)<a name="l00115"></a>00115         AS2(    movdqa  xmm6, xmm4)<a name="l00116"></a>00116         AS2(    punpcklqdq      xmm4, xmm2)<a name="l00117"></a>00117         AS2(    punpckhqdq      xmm6, xmm2)<a name="l00118"></a>00118         AS2(    test    WORD_REG(dx), 0xf)<a name="l00119"></a>00119         ASJ(    jnz,    2, f)<a name="l00120"></a>00120         AS2(    test    WORD_REG(dx), WORD_REG(dx))<a name="l00121"></a>00121         ASJ(    jz,             1, f)<a name="l00122"></a>00122         AS2(    pxor    xmm4, [WORD_REG(dx)])<a name="l00123"></a>00123         AS2(    pxor    xmm6, [WORD_REG(dx)+16])<a name="l00124"></a>00124         AS2(    <span class="keyword">add</span>             WORD_REG(dx), 32)<a name="l00125"></a>00125         ASJ(    jmp,    1, f)<a name="l00126"></a>00126         ASL(2)<a name="l00127"></a>00127         AS2(    movdqu  xmm0, [WORD_REG(dx)])<a name="l00128"></a>00128         AS2(    movdqu  xmm2, [WORD_REG(dx)+16])<a name="l00129"></a>00129         AS2(    pxor    xmm4, xmm0)<a name="l00130"></a>00130         AS2(    pxor    xmm6, xmm2)<a name="l00131"></a>00131         AS2(    <span class="keyword">add</span>             WORD_REG(dx), 32)<a name="l00132"></a>00132         ASL(1)<a name="l00133"></a>00133         AS2(    test    WORD_REG(di), 0xf)<a name="l00134"></a>00134         ASJ(    jnz,    3, f)<a name="l00135"></a>00135         AS2(    movdqa  [WORD_REG(di)], xmm4)<a name="l00136"></a>00136         AS2(    movdqa  [WORD_REG(di)+16], xmm6)<a name="l00137"></a>00137         AS2(    <span class="keyword">add</span>             WORD_REG(di), 32)<a name="l00138"></a>00138         ASJ(    jmp,    0, f)<a name="l00139"></a>00139         ASL(3)<a name="l00140"></a>00140         AS2(    movdqu  [WORD_REG(di)], xmm4)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -