Write this ARM assemble language program, Basic Computer Science

Assignment Help:
Programming Assignment
CS252 Spring 2014

Write an ARM assembly language subroutine that performs according to the following specification (Caesar cypher).

Given a mixed case alphabetic string from the C driver program, convert it to all upper case and create a new string for return to the C program. The new string has the characters from the old string replaced by upper case characters from the alphabet offset by the given amount in the alphabet.

If the character string is ‘Abc’ with an offset of -3 the new string would be ‘XYZ’. For characters in the alphabet such as ‘mno’, the alphabet is ‘JKL’. The beginning of the alphabet is wrapped to the end.

To convert a character to upper case, AND the character with 0xDF. Do not process the space character (leave it as a space) or the NULL byte terminator but be sure to include the NULL byte in the new string.

The C driver code:
/* C code for cipher */
#include
#include

extern char * cypher( char * s, int offset ) ;

int main( int argc, char * argv[] )
{
?char string[] = "The quick brown fox jumped over the lazy dog" ;
?char * result ;
?int offset = -5 ;

?result = cypher( string, offset ) ;
?printf( "Original:%s\n", string ) ;
?printf( "Coded: %s\n", result ) ;
?
?exit( 0 ) ;
}

The assembly routines definition is:
?extern char * cypher( char * s, int offset )
?where?char * s is the pointer to the string,
?int offset is the integer distance to move
?returns a pointer to a string.

To determine the length of the string in order to reserve space for the new string use the library routine strlen. Register a1 contains a pointer to the string to measure and on return register a1 has the number of characters in the string. You need to add one to this result since strlen does not account for the null byte at the end.
You can pass this length to the malloc library routine to obtain space for the new string.

Related Discussions:- Write this ARM assemble language program

Artificial intelligence, Artificial Intelligence Artificial Intelligen...

Artificial Intelligence Artificial Intelligence is difficult science to explain, as it has fuzzy borders with  computer science, mathematics,  philosophy, physics,  psychology

What is collaboration, Question 1 What is Collaboration? Write down the ob...

Question 1 What is Collaboration? Write down the objectives of collaboration Question 2 What is proxy server? Write down the reasons for using proxy server Question

Unix/linux, I need someone to help me with my Unix/Linux homework.

I need someone to help me with my Unix/Linux homework.

Briefly explain formatting tool bar, Question 1 Briefly explain the classi...

Question 1 Briefly explain the classification of the computers Question 2 What is arithmetic logic unit? How it is helpful in CPU Question 3 How do you install a new pri

How should an ideal hospital software be? , How Should an Ideal Software be...

How Should an Ideal Software be?  It should be easy to operate, with minimal training of nursing personnel.   Should be reliable, and thoroughly tested in various nur

Discuss on segmentation, Question 1 What is an operating system? Explain i...

Question 1 What is an operating system? Explain its functions Question 2 Discuss round-robin scheduling Question 3 Discuss on segmentation Question 4 What are the s

Microwave transmission, Microwave Transmission: Using space as transmi...

Microwave Transmission: Using space as transmission medium, microwave emanates from an origination point on earth, such as telephone exchange, where many individual messages h

N-ary relationships in database design, n-ary relationships in database des...

n-ary relationships in database design Each n-ary where n>2 relationship type is maped into a table name of the relationship works as the name of the table. The primary key of suc

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Iterative deepening search-artificial intelligence, Iterative Deepening Sea...

Iterative Deepening Search- Artificial intelligence: So, breadth first search is guaranteed to find a solution (if one exists), but it grape whole memory. However, Depth first

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd