i2pd/aes.cpp

203 lines
5.1 KiB
C++
Raw Normal View History

2014-05-06 21:26:28 +04:00
#include <stdlib.h>
2014-05-06 20:22:22 +04:00
#include "aes.h"
namespace i2p
{
namespace crypto
{
2014-05-07 22:48:37 +04:00
#ifdef __x86_64__
2014-05-09 05:43:08 +04:00
ECBCryptoAESNI::ECBCryptoAESNI ()
{
m_KeySchedule = m_UnalignedBuffer;
uint8_t rem = ((uint64_t)m_KeySchedule) & 0x0f;
if (rem)
m_KeySchedule += (16 - rem);
}
2014-05-07 22:48:37 +04:00
#define KeyExpansion256 \
"pshufd $0xff, %%xmm2, %%xmm2 \n" \
"movaps %%xmm1, %%xmm4 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm1 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm1 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm1 \n" \
"pxor %%xmm2, %%xmm1 \n" \
2014-05-09 22:11:05 +04:00
"movaps %%xmm1, (%%rcx) \n" \
2014-05-07 22:48:37 +04:00
"aeskeygenassist $0, %%xmm1, %%xmm4 \n" \
"pshufd $0xaa, %%xmm4, %%xmm2 \n" \
"movaps %%xmm3, %%xmm4 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm3 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm3 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm3 \n" \
"pxor %%xmm2, %%xmm3 \n" \
2014-05-09 22:11:05 +04:00
"movaps %%xmm3, 16(%%rcx) \n" \
2014-05-07 22:48:37 +04:00
"add $32, %%rcx \n"
void ECBCryptoAESNI::ExpandKey (const uint8_t * key)
2014-05-07 22:48:37 +04:00
{
__asm__
(
2014-05-09 22:11:05 +04:00
"movups (%[key]), %%xmm1 \n"
"movups 16(%[key]), %%xmm3 \n"
"movaps %%xmm1, (%[shed]) \n"
"movaps %%xmm3, 16(%[shed]) \n"
"lea 32(%[shed]), %%rcx \n"
2014-05-07 22:48:37 +04:00
"aeskeygenassist $1, %%xmm3, %%xmm2 \n"
KeyExpansion256
"aeskeygenassist $2, %%xmm3, %%xmm2 \n"
KeyExpansion256
"aeskeygenassist $4, %%xmm3, %%xmm2 \n"
KeyExpansion256
"aeskeygenassist $8, %%xmm3, %%xmm2 \n"
KeyExpansion256
2014-05-08 19:53:54 +04:00
"aeskeygenassist $16, %%xmm3, %%xmm2 \n"
2014-05-07 22:48:37 +04:00
KeyExpansion256
2014-05-08 19:53:54 +04:00
"aeskeygenassist $32, %%xmm3, %%xmm2 \n"
2014-05-07 22:48:37 +04:00
KeyExpansion256
2014-05-08 19:53:54 +04:00
"aeskeygenassist $64, %%xmm3, %%xmm2 \n"
2014-05-07 22:48:37 +04:00
// key expansion final
"pshufd $0xff, %%xmm2, %%xmm2 \n"
"movaps %%xmm1, %%xmm4 \n"
"pslldq $4, %%xmm4 \n"
"pxor %%xmm4, %%xmm1 \n"
"pslldq $4, %%xmm4 \n"
"pxor %%xmm4, %%xmm1 \n"
"pslldq $4, %%xmm4 \n"
"pxor %%xmm4, %%xmm1 \n"
"pxor %%xmm2, %%xmm1 \n"
"movups %%xmm1, (%%rcx) \n"
: // output
2014-05-09 22:11:05 +04:00
: [key]"r"(key), [shed]"r"(m_KeySchedule) // input
: "%rcx", "%xmm1", "%xmm2", "%xmm3", "%xmm4" // clogged
2014-05-07 22:48:37 +04:00
);
}
void ECBEncryptionAESNI::Encrypt (const ChipherBlock * in, ChipherBlock * out)
2014-05-07 23:39:30 +04:00
{
__asm__
(
2014-05-09 22:11:05 +04:00
"movups (%[in]), %%xmm0 \n"
"pxor (%[shed]), %%xmm0 \n"
"aesenc 16(%[shed]), %%xmm0 \n"
"aesenc 32(%[shed]), %%xmm0 \n"
"aesenc 48(%[shed]), %%xmm0 \n"
"aesenc 64(%[shed]), %%xmm0 \n"
"aesenc 80(%[shed]), %%xmm0 \n"
"aesenc 96(%[shed]), %%xmm0 \n"
"aesenc 112(%[shed]), %%xmm0 \n"
"aesenc 128(%[shed]), %%xmm0 \n"
"aesenc 144(%[shed]), %%xmm0 \n"
"aesenc 160(%[shed]), %%xmm0 \n"
"aesenc 176(%[shed]), %%xmm0 \n"
"aesenc 192(%[shed]), %%xmm0 \n"
"aesenc 208(%[shed]), %%xmm0 \n"
"aesenclast 224(%[shed]), %%xmm0 \n"
"movups %%xmm0, (%[out]) \n"
: : [shed]"r"(m_KeySchedule), [in]"r"(in), [out]"r"(out) : "%xmm0"
2014-05-07 23:39:30 +04:00
);
}
2014-05-07 23:39:30 +04:00
void ECBDecryptionAESNI::Decrypt (const ChipherBlock * in, ChipherBlock * out)
2014-05-07 23:39:30 +04:00
{
__asm__
(
2014-05-09 22:11:05 +04:00
"movups (%[in]), %%xmm0 \n"
"pxor 224(%[shed]), %%xmm0 \n"
"aesdec 208(%[shed]), %%xmm0 \n"
"aesdec 192(%[shed]), %%xmm0 \n"
"aesdec 176(%[shed]), %%xmm0 \n"
"aesdec 160(%[shed]), %%xmm0 \n"
"aesdec 144(%[shed]), %%xmm0 \n"
"aesdec 128(%[shed]), %%xmm0 \n"
"aesdec 112(%[shed]), %%xmm0 \n"
"aesdec 96(%[shed]), %%xmm0 \n"
"aesdec 80(%[shed]), %%xmm0 \n"
"aesdec 64(%[shed]), %%xmm0 \n"
"aesdec 48(%[shed]), %%xmm0 \n"
"aesdec 32(%[shed]), %%xmm0 \n"
"aesdec 16(%[shed]), %%xmm0 \n"
"aesdeclast (%[shed]), %%xmm0 \n"
"movups %%xmm0, (%[out]) \n"
: : [shed]"r"(m_KeySchedule), [in]"r"(in), [out]"r"(out) : "%xmm0"
2014-05-07 23:39:30 +04:00
);
}
#define CallAESIMC(offset) \
2014-05-09 22:11:05 +04:00
"movaps "#offset"(%[shed]), %%xmm0 \n" \
"aesimc %%xmm0, %%xmm0 \n" \
2014-05-09 22:11:05 +04:00
"movaps %%xmm0, "#offset"(%[shed]) \n"
void ECBDecryptionAESNI::SetKey (const uint8_t * key)
{
ExpandKey (key); // expand encryption key first
// then invert it using aesimc
__asm__
(
CallAESIMC(16)
CallAESIMC(32)
CallAESIMC(48)
CallAESIMC(64)
CallAESIMC(80)
CallAESIMC(96)
CallAESIMC(112)
CallAESIMC(128)
CallAESIMC(144)
CallAESIMC(160)
CallAESIMC(176)
CallAESIMC(192)
CallAESIMC(208)
2014-05-09 22:11:05 +04:00
: : [shed]"r"(m_KeySchedule) : "%xmm0"
);
}
2014-05-07 22:48:37 +04:00
#endif
2014-05-06 20:22:22 +04:00
void CBCEncryption::Encrypt (int numBlocks, const ChipherBlock * in, ChipherBlock * out)
{
for (int i = 0; i < numBlocks; i++)
{
2014-05-09 20:05:04 +04:00
m_LastBlock ^= in[i];
2014-05-09 05:43:08 +04:00
m_ECBEncryption.Encrypt (&m_LastBlock, &m_LastBlock);
2014-05-06 20:22:22 +04:00
out[i] = m_LastBlock;
}
}
2014-05-06 21:26:28 +04:00
bool CBCEncryption::Encrypt (const uint8_t * in, std::size_t len, uint8_t * out)
{
div_t d = div (len, 16);
if (d.rem) return false; // len is not multipple of 16
Encrypt (d.quot, (const ChipherBlock *)in, (ChipherBlock *)out);
return true;
}
2014-05-06 20:22:22 +04:00
void CBCDecryption::Decrypt (int numBlocks, const ChipherBlock * in, ChipherBlock * out)
{
for (int i = 0; i < numBlocks; i++)
{
2014-05-06 21:26:28 +04:00
ChipherBlock tmp = in[i];
2014-05-09 05:43:08 +04:00
m_ECBDecryption.Decrypt (in + i, out + i);
2014-05-09 20:05:04 +04:00
out[i] ^= m_IV;
2014-05-06 21:26:28 +04:00
m_IV = tmp;
2014-05-06 20:22:22 +04:00
}
}
2014-05-06 21:26:28 +04:00
bool CBCDecryption::Decrypt (const uint8_t * in, std::size_t len, uint8_t * out)
{
div_t d = div (len, 16);
if (d.rem) return false; // len is not multipple of 16
Decrypt (d.quot, (const ChipherBlock *)in, (ChipherBlock *)out);
return true;
}
2014-05-06 20:22:22 +04:00
}
}