Write this ARM assemble language program, Basic Computer Science

Assignment Help:
Programming Assignment
CS252 Spring 2014

Write an ARM assembly language subroutine that performs according to the following specification (Caesar cypher).

Given a mixed case alphabetic string from the C driver program, convert it to all upper case and create a new string for return to the C program. The new string has the characters from the old string replaced by upper case characters from the alphabet offset by the given amount in the alphabet.

If the character string is ‘Abc’ with an offset of -3 the new string would be ‘XYZ’. For characters in the alphabet such as ‘mno’, the alphabet is ‘JKL’. The beginning of the alphabet is wrapped to the end.

To convert a character to upper case, AND the character with 0xDF. Do not process the space character (leave it as a space) or the NULL byte terminator but be sure to include the NULL byte in the new string.

The C driver code:
/* C code for cipher */
#include
#include

extern char * cypher( char * s, int offset ) ;

int main( int argc, char * argv[] )
{
?char string[] = "The quick brown fox jumped over the lazy dog" ;
?char * result ;
?int offset = -5 ;

?result = cypher( string, offset ) ;
?printf( "Original:%s\n", string ) ;
?printf( "Coded: %s\n", result ) ;
?
?exit( 0 ) ;
}

The assembly routines definition is:
?extern char * cypher( char * s, int offset )
?where?char * s is the pointer to the string,
?int offset is the integer distance to move
?returns a pointer to a string.

To determine the length of the string in order to reserve space for the new string use the library routine strlen. Register a1 contains a pointer to the string to measure and on return register a1 has the number of characters in the string. You need to add one to this result since strlen does not account for the null byte at the end.
You can pass this length to the malloc library routine to obtain space for the new string.

Related Discussions:- Write this ARM assemble language program

Keystroke logger and data-stealing, Keystroke logger and Data-stealing: ...

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

Data structure, #question.a tree has 0 off springs at each node. if it had ...

#question.a tree has 0 off springs at each node. if it had a label L, what will be the maximum number of nodes that the tree can have. only an expression involving the number of no

Java programming, Write a program that lets the user play the game Rock, Pa...

Write a program that lets the user play the game Rock, Paper, Scissors against the computer. The program should work as follows: ? When the program begins, the results of the prev

Database management, Suppose you are designing a database for an art museum...

Suppose you are designing a database for an art museum that owns a large volume of works of art. Each work of art is described by a unique item code, a title, a type, and a size. T

OPERATING SYSTEM, WHAT IS MULTIPLE CONTIGUOUS VARIABLE PARTITIONING

WHAT IS MULTIPLE CONTIGUOUS VARIABLE PARTITIONING

Explain Modern architecture of microprocessor, There are many other techniq...

There are many other techniques in which companies who manufacture microprocessors have attempted to get better the performance of their CPUs. Cache memory this is a small quantit

Paper system, Paper System : When setting up a computer system you need to...

Paper System : When setting up a computer system you need to ask yourself 'Does the system you plan to operate work manually, i.e., on paper?' It is a popular misconception that t

How Round robin scheduling algorithm is useful than others ?, Round robin (...

Round robin (RR) is one of the simplest, oldest, fairest and most extensively used algorithms. • In the round robin scheduling, processes are posted in a FIFO manner but are given

Obtain the truth table and a boolean expression, Problem 1. Convert the...

Problem 1. Convert the following number system 12.34 (8) to binary number system 23BC.0A (16) to decimal number system 456.012 (16) to Octal number system 123

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd