AES-NI and PCLMUL with per-function target compiler options
This commit is contained in:
parent
dae01d056d
commit
f5706959a4
@ -30,10 +30,6 @@
|
|||||||
|
|
||||||
#ifdef WITH_AESNI
|
#ifdef WITH_AESNI
|
||||||
|
|
||||||
#pragma GCC push_options
|
|
||||||
#pragma GCC target("ssse3", "aes")
|
|
||||||
#pragma clang attribute push (__attribute__((target("ssse3,aes"))), apply_to=function)
|
|
||||||
|
|
||||||
#include <wmmintrin.h>
|
#include <wmmintrin.h>
|
||||||
#include <tmmintrin.h>
|
#include <tmmintrin.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
@ -50,6 +46,7 @@
|
|||||||
/* old GCC version doesn't cope with the shuffle parameters, that can take 2 values (0xff and 0xaa)
|
/* old GCC version doesn't cope with the shuffle parameters, that can take 2 values (0xff and 0xaa)
|
||||||
* in our case, passed as argument despite being a immediate 8 bits constant anyway.
|
* in our case, passed as argument despite being a immediate 8 bits constant anyway.
|
||||||
* un-factorise aes_128_key_expansion into 2 version that have the shuffle parameter explicitly set */
|
* un-factorise aes_128_key_expansion into 2 version that have the shuffle parameter explicitly set */
|
||||||
|
TARGET_AESNI
|
||||||
static __m128i aes_128_key_expansion_ff(__m128i key, __m128i keygened)
|
static __m128i aes_128_key_expansion_ff(__m128i key, __m128i keygened)
|
||||||
{
|
{
|
||||||
keygened = _mm_shuffle_epi32(keygened, 0xff);
|
keygened = _mm_shuffle_epi32(keygened, 0xff);
|
||||||
@ -59,6 +56,7 @@ static __m128i aes_128_key_expansion_ff(__m128i key, __m128i keygened)
|
|||||||
return _mm_xor_si128(key, keygened);
|
return _mm_xor_si128(key, keygened);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
static __m128i aes_128_key_expansion_aa(__m128i key, __m128i keygened)
|
static __m128i aes_128_key_expansion_aa(__m128i key, __m128i keygened)
|
||||||
{
|
{
|
||||||
keygened = _mm_shuffle_epi32(keygened, 0xaa);
|
keygened = _mm_shuffle_epi32(keygened, 0xaa);
|
||||||
@ -68,6 +66,7 @@ static __m128i aes_128_key_expansion_aa(__m128i key, __m128i keygened)
|
|||||||
return _mm_xor_si128(key, keygened);
|
return _mm_xor_si128(key, keygened);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void cryptonite_aesni_init(aes_key *key, uint8_t *ikey, uint8_t size)
|
void cryptonite_aesni_init(aes_key *key, uint8_t *ikey, uint8_t size)
|
||||||
{
|
{
|
||||||
__m128i k[28];
|
__m128i k[28];
|
||||||
@ -149,6 +148,7 @@ void cryptonite_aesni_init(aes_key *key, uint8_t *ikey, uint8_t size)
|
|||||||
/* TO OPTIMISE: use pcmulqdq... or some faster code.
|
/* TO OPTIMISE: use pcmulqdq... or some faster code.
|
||||||
* this is the lamest way of doing it, but i'm out of time.
|
* this is the lamest way of doing it, but i'm out of time.
|
||||||
* this is basically a copy of gf_mulx in gf.c */
|
* this is basically a copy of gf_mulx in gf.c */
|
||||||
|
TARGET_AESNI
|
||||||
static __m128i gfmulx(__m128i v)
|
static __m128i gfmulx(__m128i v)
|
||||||
{
|
{
|
||||||
uint64_t v_[2] ALIGNMENT(16);
|
uint64_t v_[2] ALIGNMENT(16);
|
||||||
@ -162,6 +162,7 @@ static __m128i gfmulx(__m128i v)
|
|||||||
return v;
|
return v;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
static __m128i gfmul_generic(__m128i tag, const table_4bit htable)
|
static __m128i gfmul_generic(__m128i tag, const table_4bit htable)
|
||||||
{
|
{
|
||||||
aes_block _t;
|
aes_block _t;
|
||||||
@ -181,6 +182,7 @@ __m128i (*gfmul_branch_ptr)(__m128i a, const table_4bit t) = gfmul_generic;
|
|||||||
* Adapted from figure 5, with additional byte swapping so that interface
|
* Adapted from figure 5, with additional byte swapping so that interface
|
||||||
* is simimar to cryptonite_aes_generic_gf_mul.
|
* is simimar to cryptonite_aes_generic_gf_mul.
|
||||||
*/
|
*/
|
||||||
|
TARGET_AESNI_PCLMUL
|
||||||
static __m128i gfmul_pclmuldq(__m128i a, const table_4bit htable)
|
static __m128i gfmul_pclmuldq(__m128i a, const table_4bit htable)
|
||||||
{
|
{
|
||||||
__m128i b, tmp2, tmp3, tmp4, tmp5, tmp6, tmp7, tmp8, tmp9;
|
__m128i b, tmp2, tmp3, tmp4, tmp5, tmp6, tmp7, tmp8, tmp9;
|
||||||
@ -244,6 +246,7 @@ void cryptonite_aesni_hinit_pclmul(table_4bit htable, const block128 *h)
|
|||||||
htable->q[1] = bitfn_swap64(h->q[0]);
|
htable->q[1] = bitfn_swap64(h->q[0]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI_PCLMUL
|
||||||
void cryptonite_aesni_gf_mul_pclmul(block128 *a, const table_4bit htable)
|
void cryptonite_aesni_gf_mul_pclmul(block128 *a, const table_4bit htable)
|
||||||
{
|
{
|
||||||
__m128i _a, _b;
|
__m128i _a, _b;
|
||||||
@ -261,6 +264,7 @@ void cryptonite_aesni_init_pclmul(void)
|
|||||||
#define gfmul(a,t) (gfmul_generic(a,t))
|
#define gfmul(a,t) (gfmul_generic(a,t))
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
static inline __m128i ghash_add(__m128i tag, const table_4bit htable, __m128i m)
|
static inline __m128i ghash_add(__m128i tag, const table_4bit htable, __m128i m)
|
||||||
{
|
{
|
||||||
tag = _mm_xor_si128(tag, m);
|
tag = _mm_xor_si128(tag, m);
|
||||||
@ -404,7 +408,4 @@ static inline __m128i ghash_add(__m128i tag, const table_4bit htable, __m128i m)
|
|||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#pragma clang attribute pop
|
|
||||||
#pragma GCC pop_options
|
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@ -40,7 +40,11 @@
|
|||||||
#include <cryptonite_aes.h>
|
#include <cryptonite_aes.h>
|
||||||
#include <aes/block128.h>
|
#include <aes/block128.h>
|
||||||
|
|
||||||
|
#define TARGET_AESNI __attribute__((target("ssse3,aes")))
|
||||||
|
#define TARGET_AESNI_PCLMUL __attribute__((target("sse4.1,aes,pclmul")))
|
||||||
|
|
||||||
#ifdef IMPL_DEBUG
|
#ifdef IMPL_DEBUG
|
||||||
|
TARGET_AESNI
|
||||||
static void block128_sse_print(__m128i m)
|
static void block128_sse_print(__m128i m)
|
||||||
{
|
{
|
||||||
block128 b;
|
block128 b;
|
||||||
|
|||||||
@ -28,6 +28,7 @@
|
|||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_encrypt_block)(aes_block *out, aes_key *key, aes_block *in)
|
void SIZED(cryptonite_aesni_encrypt_block)(aes_block *out, aes_key *key, aes_block *in)
|
||||||
{
|
{
|
||||||
__m128i *k = (__m128i *) key->data;
|
__m128i *k = (__m128i *) key->data;
|
||||||
@ -37,6 +38,7 @@ void SIZED(cryptonite_aesni_encrypt_block)(aes_block *out, aes_key *key, aes_blo
|
|||||||
_mm_storeu_si128((__m128i *) out, m);
|
_mm_storeu_si128((__m128i *) out, m);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_decrypt_block)(aes_block *out, aes_key *key, aes_block *in)
|
void SIZED(cryptonite_aesni_decrypt_block)(aes_block *out, aes_key *key, aes_block *in)
|
||||||
{
|
{
|
||||||
__m128i *k = (__m128i *) key->data;
|
__m128i *k = (__m128i *) key->data;
|
||||||
@ -46,6 +48,7 @@ void SIZED(cryptonite_aesni_decrypt_block)(aes_block *out, aes_key *key, aes_blo
|
|||||||
_mm_storeu_si128((__m128i *) out, m);
|
_mm_storeu_si128((__m128i *) out, m);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_encrypt_ecb)(aes_block *out, aes_key *key, aes_block *in, uint32_t blocks)
|
void SIZED(cryptonite_aesni_encrypt_ecb)(aes_block *out, aes_key *key, aes_block *in, uint32_t blocks)
|
||||||
{
|
{
|
||||||
__m128i *k = (__m128i *) key->data;
|
__m128i *k = (__m128i *) key->data;
|
||||||
@ -58,6 +61,7 @@ void SIZED(cryptonite_aesni_encrypt_ecb)(aes_block *out, aes_key *key, aes_block
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_decrypt_ecb)(aes_block *out, aes_key *key, aes_block *in, uint32_t blocks)
|
void SIZED(cryptonite_aesni_decrypt_ecb)(aes_block *out, aes_key *key, aes_block *in, uint32_t blocks)
|
||||||
{
|
{
|
||||||
__m128i *k = (__m128i *) key->data;
|
__m128i *k = (__m128i *) key->data;
|
||||||
@ -71,6 +75,7 @@ void SIZED(cryptonite_aesni_decrypt_ecb)(aes_block *out, aes_key *key, aes_block
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_encrypt_cbc)(aes_block *out, aes_key *key, aes_block *_iv, aes_block *in, uint32_t blocks)
|
void SIZED(cryptonite_aesni_encrypt_cbc)(aes_block *out, aes_key *key, aes_block *_iv, aes_block *in, uint32_t blocks)
|
||||||
{
|
{
|
||||||
__m128i *k = (__m128i *) key->data;
|
__m128i *k = (__m128i *) key->data;
|
||||||
@ -87,6 +92,7 @@ void SIZED(cryptonite_aesni_encrypt_cbc)(aes_block *out, aes_key *key, aes_block
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_decrypt_cbc)(aes_block *out, aes_key *key, aes_block *_iv, aes_block *in, uint32_t blocks)
|
void SIZED(cryptonite_aesni_decrypt_cbc)(aes_block *out, aes_key *key, aes_block *_iv, aes_block *in, uint32_t blocks)
|
||||||
{
|
{
|
||||||
__m128i *k = (__m128i *) key->data;
|
__m128i *k = (__m128i *) key->data;
|
||||||
@ -106,6 +112,7 @@ void SIZED(cryptonite_aesni_decrypt_cbc)(aes_block *out, aes_key *key, aes_block
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_encrypt_ctr)(uint8_t *output, aes_key *key, aes_block *_iv, uint8_t *input, uint32_t len)
|
void SIZED(cryptonite_aesni_encrypt_ctr)(uint8_t *output, aes_key *key, aes_block *_iv, uint8_t *input, uint32_t len)
|
||||||
{
|
{
|
||||||
__m128i *k = (__m128i *) key->data;
|
__m128i *k = (__m128i *) key->data;
|
||||||
@ -151,6 +158,7 @@ void SIZED(cryptonite_aesni_encrypt_ctr)(uint8_t *output, aes_key *key, aes_bloc
|
|||||||
return ;
|
return ;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_encrypt_c32_)(uint8_t *output, aes_key *key, aes_block *_iv, uint8_t *input, uint32_t len)
|
void SIZED(cryptonite_aesni_encrypt_c32_)(uint8_t *output, aes_key *key, aes_block *_iv, uint8_t *input, uint32_t len)
|
||||||
{
|
{
|
||||||
__m128i *k = (__m128i *) key->data;
|
__m128i *k = (__m128i *) key->data;
|
||||||
@ -192,6 +200,7 @@ void SIZED(cryptonite_aesni_encrypt_c32_)(uint8_t *output, aes_key *key, aes_blo
|
|||||||
return ;
|
return ;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_encrypt_xts)(aes_block *out, aes_key *key1, aes_key *key2,
|
void SIZED(cryptonite_aesni_encrypt_xts)(aes_block *out, aes_key *key1, aes_key *key2,
|
||||||
aes_block *_tweak, uint32_t spoint, aes_block *in, uint32_t blocks)
|
aes_block *_tweak, uint32_t spoint, aes_block *in, uint32_t blocks)
|
||||||
{
|
{
|
||||||
@ -222,6 +231,7 @@ void SIZED(cryptonite_aesni_encrypt_xts)(aes_block *out, aes_key *key1, aes_key
|
|||||||
} while (0);
|
} while (0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TARGET_AESNI
|
||||||
void SIZED(cryptonite_aesni_gcm_encrypt)(uint8_t *output, aes_gcm *gcm, aes_key *key, uint8_t *input, uint32_t length)
|
void SIZED(cryptonite_aesni_gcm_encrypt)(uint8_t *output, aes_gcm *gcm, aes_key *key, uint8_t *input, uint32_t length)
|
||||||
{
|
{
|
||||||
__m128i *k = (__m128i *) key->data;
|
__m128i *k = (__m128i *) key->data;
|
||||||
|
|||||||
@ -338,7 +338,7 @@ Library
|
|||||||
if flag(support_aesni) && (os(linux) || os(freebsd) || os(osx)) && (arch(i386) || arch(x86_64))
|
if flag(support_aesni) && (os(linux) || os(freebsd) || os(osx)) && (arch(i386) || arch(x86_64))
|
||||||
CC-options: -DWITH_AESNI
|
CC-options: -DWITH_AESNI
|
||||||
if flag(support_pclmuldq)
|
if flag(support_pclmuldq)
|
||||||
CC-options: -msse4.1 -mpclmul -DWITH_PCLMUL
|
CC-options: -DWITH_PCLMUL
|
||||||
C-sources: cbits/aes/x86ni.c
|
C-sources: cbits/aes/x86ni.c
|
||||||
, cbits/aes/generic.c
|
, cbits/aes/generic.c
|
||||||
, cbits/aes/gf.c
|
, cbits/aes/gf.c
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user