I2P: End-to-End encrypted and anonymous Internet https://i2pd.website/
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

203 lines
5.1 KiB

#include <stdlib.h>
11 years ago
#include "aes.h"
namespace i2p
{
namespace crypto
{
11 years ago
#ifdef __x86_64__
ECBCryptoAESNI::ECBCryptoAESNI ()
{
m_KeySchedule = m_UnalignedBuffer;
uint8_t rem = ((uint64_t)m_KeySchedule) & 0x0f;
if (rem)
m_KeySchedule += (16 - rem);
}
11 years ago
#define KeyExpansion256 \
"pshufd $0xff, %%xmm2, %%xmm2 \n" \
"movaps %%xmm1, %%xmm4 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm1 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm1 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm1 \n" \
"pxor %%xmm2, %%xmm1 \n" \
"movaps %%xmm1, (%%rcx) \n" \
11 years ago
"aeskeygenassist $0, %%xmm1, %%xmm4 \n" \
"pshufd $0xaa, %%xmm4, %%xmm2 \n" \
"movaps %%xmm3, %%xmm4 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm3 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm3 \n" \
"pslldq $4, %%xmm4 \n" \
"pxor %%xmm4, %%xmm3 \n" \
"pxor %%xmm2, %%xmm3 \n" \
"movaps %%xmm3, 16(%%rcx) \n" \
11 years ago
"add $32, %%rcx \n"
void ECBCryptoAESNI::ExpandKey (const uint8_t * key)
11 years ago
{
__asm__
(
"movups (%[key]), %%xmm1 \n"
"movups 16(%[key]), %%xmm3 \n"
"movaps %%xmm1, (%[shed]) \n"
"movaps %%xmm3, 16(%[shed]) \n"
"lea 32(%[shed]), %%rcx \n"
11 years ago
"aeskeygenassist $1, %%xmm3, %%xmm2 \n"
KeyExpansion256
"aeskeygenassist $2, %%xmm3, %%xmm2 \n"
KeyExpansion256
"aeskeygenassist $4, %%xmm3, %%xmm2 \n"
KeyExpansion256
"aeskeygenassist $8, %%xmm3, %%xmm2 \n"
KeyExpansion256
"aeskeygenassist $16, %%xmm3, %%xmm2 \n"
11 years ago
KeyExpansion256
"aeskeygenassist $32, %%xmm3, %%xmm2 \n"
11 years ago
KeyExpansion256
"aeskeygenassist $64, %%xmm3, %%xmm2 \n"
11 years ago
// key expansion final
"pshufd $0xff, %%xmm2, %%xmm2 \n"
"movaps %%xmm1, %%xmm4 \n"
"pslldq $4, %%xmm4 \n"
"pxor %%xmm4, %%xmm1 \n"
"pslldq $4, %%xmm4 \n"
"pxor %%xmm4, %%xmm1 \n"
"pslldq $4, %%xmm4 \n"
"pxor %%xmm4, %%xmm1 \n"
"pxor %%xmm2, %%xmm1 \n"
"movups %%xmm1, (%%rcx) \n"
: // output
: [key]"r"(key), [shed]"r"(m_KeySchedule) // input
: "%rcx", "%xmm1", "%xmm2", "%xmm3", "%xmm4" // clogged
11 years ago
);
}
void ECBEncryptionAESNI::Encrypt (const ChipherBlock * in, ChipherBlock * out)
{
__asm__
(
"movups (%[in]), %%xmm0 \n"
"pxor (%[shed]), %%xmm0 \n"
"aesenc 16(%[shed]), %%xmm0 \n"
"aesenc 32(%[shed]), %%xmm0 \n"
"aesenc 48(%[shed]), %%xmm0 \n"
"aesenc 64(%[shed]), %%xmm0 \n"
"aesenc 80(%[shed]), %%xmm0 \n"
"aesenc 96(%[shed]), %%xmm0 \n"
"aesenc 112(%[shed]), %%xmm0 \n"
"aesenc 128(%[shed]), %%xmm0 \n"
"aesenc 144(%[shed]), %%xmm0 \n"
"aesenc 160(%[shed]), %%xmm0 \n"
"aesenc 176(%[shed]), %%xmm0 \n"
"aesenc 192(%[shed]), %%xmm0 \n"
"aesenc 208(%[shed]), %%xmm0 \n"
"aesenclast 224(%[shed]), %%xmm0 \n"
"movups %%xmm0, (%[out]) \n"
: : [shed]"r"(m_KeySchedule), [in]"r"(in), [out]"r"(out) : "%xmm0"
);
}
void ECBDecryptionAESNI::Decrypt (const ChipherBlock * in, ChipherBlock * out)
{
__asm__
(
"movups (%[in]), %%xmm0 \n"
"pxor 224(%[shed]), %%xmm0 \n"
"aesdec 208(%[shed]), %%xmm0 \n"
"aesdec 192(%[shed]), %%xmm0 \n"
"aesdec 176(%[shed]), %%xmm0 \n"
"aesdec 160(%[shed]), %%xmm0 \n"
"aesdec 144(%[shed]), %%xmm0 \n"
"aesdec 128(%[shed]), %%xmm0 \n"
"aesdec 112(%[shed]), %%xmm0 \n"
"aesdec 96(%[shed]), %%xmm0 \n"
"aesdec 80(%[shed]), %%xmm0 \n"
"aesdec 64(%[shed]), %%xmm0 \n"
"aesdec 48(%[shed]), %%xmm0 \n"
"aesdec 32(%[shed]), %%xmm0 \n"
"aesdec 16(%[shed]), %%xmm0 \n"
"aesdeclast (%[shed]), %%xmm0 \n"
"movups %%xmm0, (%[out]) \n"
: : [shed]"r"(m_KeySchedule), [in]"r"(in), [out]"r"(out) : "%xmm0"
);
}
#define CallAESIMC(offset) \
"movaps "#offset"(%[shed]), %%xmm0 \n" \
"aesimc %%xmm0, %%xmm0 \n" \
"movaps %%xmm0, "#offset"(%[shed]) \n"
void ECBDecryptionAESNI::SetKey (const uint8_t * key)
{
ExpandKey (key); // expand encryption key first
// then invert it using aesimc
__asm__
(
CallAESIMC(16)
CallAESIMC(32)
CallAESIMC(48)
CallAESIMC(64)
CallAESIMC(80)
CallAESIMC(96)
CallAESIMC(112)
CallAESIMC(128)
CallAESIMC(144)
CallAESIMC(160)
CallAESIMC(176)
CallAESIMC(192)
CallAESIMC(208)
: : [shed]"r"(m_KeySchedule) : "%xmm0"
);
}
11 years ago
#endif
11 years ago
void CBCEncryption::Encrypt (int numBlocks, const ChipherBlock * in, ChipherBlock * out)
{
for (int i = 0; i < numBlocks; i++)
{
11 years ago
m_LastBlock ^= in[i];
m_ECBEncryption.Encrypt (&m_LastBlock, &m_LastBlock);
11 years ago
out[i] = m_LastBlock;
}
}
bool CBCEncryption::Encrypt (const uint8_t * in, std::size_t len, uint8_t * out)
{
div_t d = div (len, 16);
if (d.rem) return false; // len is not multipple of 16
Encrypt (d.quot, (const ChipherBlock *)in, (ChipherBlock *)out);
return true;
}
11 years ago
void CBCDecryption::Decrypt (int numBlocks, const ChipherBlock * in, ChipherBlock * out)
{
for (int i = 0; i < numBlocks; i++)
{
ChipherBlock tmp = in[i];
m_ECBDecryption.Decrypt (in + i, out + i);
11 years ago
out[i] ^= m_IV;
m_IV = tmp;
11 years ago
}
}
bool CBCDecryption::Decrypt (const uint8_t * in, std::size_t len, uint8_t * out)
{
div_t d = div (len, 16);
if (d.rem) return false; // len is not multipple of 16
Decrypt (d.quot, (const ChipherBlock *)in, (ChipherBlock *)out);
return true;
}
11 years ago
}
}