Home | History | Annotate | Line # | Download | only in x86
aes_sse2_subr.c revision 1.4
      1  1.4  riastrad /*	$NetBSD: aes_sse2_subr.c,v 1.4 2020/09/08 22:48:24 riastradh Exp $	*/
      2  1.1  riastrad 
      3  1.1  riastrad /*-
      4  1.1  riastrad  * Copyright (c) 2020 The NetBSD Foundation, Inc.
      5  1.1  riastrad  * All rights reserved.
      6  1.1  riastrad  *
      7  1.1  riastrad  * Redistribution and use in source and binary forms, with or without
      8  1.1  riastrad  * modification, are permitted provided that the following conditions
      9  1.1  riastrad  * are met:
     10  1.1  riastrad  * 1. Redistributions of source code must retain the above copyright
     11  1.1  riastrad  *    notice, this list of conditions and the following disclaimer.
     12  1.1  riastrad  * 2. Redistributions in binary form must reproduce the above copyright
     13  1.1  riastrad  *    notice, this list of conditions and the following disclaimer in the
     14  1.1  riastrad  *    documentation and/or other materials provided with the distribution.
     15  1.1  riastrad  *
     16  1.1  riastrad  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17  1.1  riastrad  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18  1.1  riastrad  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19  1.1  riastrad  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20  1.1  riastrad  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21  1.1  riastrad  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22  1.1  riastrad  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23  1.1  riastrad  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24  1.1  riastrad  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25  1.1  riastrad  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26  1.1  riastrad  * POSSIBILITY OF SUCH DAMAGE.
     27  1.1  riastrad  */
     28  1.1  riastrad 
     29  1.1  riastrad #include <sys/cdefs.h>
     30  1.4  riastrad __KERNEL_RCSID(1, "$NetBSD: aes_sse2_subr.c,v 1.4 2020/09/08 22:48:24 riastradh Exp $");
     31  1.1  riastrad 
     32  1.2  riastrad #ifdef _KERNEL
     33  1.1  riastrad #include <sys/systm.h>
     34  1.1  riastrad #include <lib/libkern/libkern.h>
     35  1.2  riastrad #else
     36  1.2  riastrad #include <err.h>
     37  1.2  riastrad #include <assert.h>
     38  1.2  riastrad #include <inttypes.h>
     39  1.2  riastrad #include <stdio.h>
     40  1.2  riastrad #include <string.h>
     41  1.2  riastrad #define	KASSERT			assert
     42  1.2  riastrad #define	panic(fmt, args...)	err(1, fmt, ##args)
     43  1.2  riastrad #endif
     44  1.1  riastrad 
     45  1.1  riastrad #include <crypto/aes/aes.h>
     46  1.1  riastrad #include <crypto/aes/arch/x86/aes_sse2.h>
     47  1.1  riastrad 
     48  1.1  riastrad #include "aes_sse2_impl.h"
     49  1.1  riastrad 
     50  1.1  riastrad void
     51  1.1  riastrad aes_sse2_setkey(uint64_t rk[static 30], const void *key, uint32_t nrounds)
     52  1.1  riastrad {
     53  1.1  riastrad 	size_t key_len;
     54  1.1  riastrad 
     55  1.1  riastrad 	switch (nrounds) {
     56  1.1  riastrad 	case 10:
     57  1.1  riastrad 		key_len = 16;
     58  1.1  riastrad 		break;
     59  1.1  riastrad 	case 12:
     60  1.1  riastrad 		key_len = 24;
     61  1.1  riastrad 		break;
     62  1.1  riastrad 	case 14:
     63  1.1  riastrad 		key_len = 32;
     64  1.1  riastrad 		break;
     65  1.1  riastrad 	default:
     66  1.1  riastrad 		panic("invalid AES nrounds: %u", nrounds);
     67  1.1  riastrad 	}
     68  1.1  riastrad 
     69  1.1  riastrad 	aes_sse2_keysched(rk, key, key_len);
     70  1.1  riastrad }
     71  1.1  riastrad 
     72  1.1  riastrad void
     73  1.1  riastrad aes_sse2_enc(const struct aesenc *enc, const uint8_t in[static 16],
     74  1.1  riastrad     uint8_t out[static 16], uint32_t nrounds)
     75  1.1  riastrad {
     76  1.1  riastrad 	uint64_t sk_exp[120];
     77  1.1  riastrad 	__m128i q[4];
     78  1.1  riastrad 
     79  1.1  riastrad 	/* Expand round keys for bitslicing.  */
     80  1.1  riastrad 	aes_sse2_skey_expand(sk_exp, nrounds, enc->aese_aes.aes_rk64);
     81  1.1  riastrad 
     82  1.1  riastrad 	/* Load input block interleaved with garbage blocks.  */
     83  1.1  riastrad 	q[0] = aes_sse2_interleave_in(_mm_loadu_epi8(in));
     84  1.1  riastrad 	q[1] = q[2] = q[3] = _mm_setzero_si128();
     85  1.1  riastrad 
     86  1.1  riastrad 	/* Transform to bitslice, decrypt, transform from bitslice.  */
     87  1.1  riastrad 	aes_sse2_ortho(q);
     88  1.1  riastrad 	aes_sse2_bitslice_encrypt(nrounds, sk_exp, q);
     89  1.1  riastrad 	aes_sse2_ortho(q);
     90  1.1  riastrad 
     91  1.1  riastrad 	/* Store output block.  */
     92  1.1  riastrad 	_mm_storeu_epi8(out, aes_sse2_interleave_out(q[0]));
     93  1.1  riastrad 
     94  1.1  riastrad 	/* Paranoia: Zero temporary buffers.  */
     95  1.1  riastrad 	explicit_memset(sk_exp, 0, sizeof sk_exp);
     96  1.1  riastrad 	explicit_memset(q, 0, sizeof q);
     97  1.1  riastrad }
     98  1.1  riastrad 
     99  1.1  riastrad void
    100  1.1  riastrad aes_sse2_dec(const struct aesdec *dec, const uint8_t in[static 16],
    101  1.1  riastrad     uint8_t out[static 16], uint32_t nrounds)
    102  1.1  riastrad {
    103  1.1  riastrad 	uint64_t sk_exp[120];
    104  1.1  riastrad 	__m128i q[4];
    105  1.1  riastrad 
    106  1.1  riastrad 	/* Expand round keys for bitslicing.  */
    107  1.1  riastrad 	aes_sse2_skey_expand(sk_exp, nrounds, dec->aesd_aes.aes_rk64);
    108  1.1  riastrad 
    109  1.1  riastrad 	/* Load input block interleaved with garbage blocks.  */
    110  1.1  riastrad 	q[0] = aes_sse2_interleave_in(_mm_loadu_epi8(in));
    111  1.1  riastrad 	q[1] = q[2] = q[3] = _mm_setzero_si128();
    112  1.1  riastrad 
    113  1.1  riastrad 	/* Transform to bitslice, decrypt, transform from bitslice.  */
    114  1.1  riastrad 	aes_sse2_ortho(q);
    115  1.1  riastrad 	aes_sse2_bitslice_decrypt(nrounds, sk_exp, q);
    116  1.1  riastrad 	aes_sse2_ortho(q);
    117  1.1  riastrad 
    118  1.1  riastrad 	/* Store output block.  */
    119  1.1  riastrad 	_mm_storeu_epi8(out, aes_sse2_interleave_out(q[0]));
    120  1.1  riastrad 
    121  1.1  riastrad 	/* Paranoia: Zero temporary buffers.  */
    122  1.1  riastrad 	explicit_memset(sk_exp, 0, sizeof sk_exp);
    123  1.1  riastrad 	explicit_memset(q, 0, sizeof q);
    124  1.1  riastrad }
    125  1.1  riastrad 
    126  1.1  riastrad void
    127  1.1  riastrad aes_sse2_cbc_enc(const struct aesenc *enc, const uint8_t in[static 16],
    128  1.1  riastrad     uint8_t out[static 16], size_t nbytes, uint8_t iv[static 16],
    129  1.1  riastrad     uint32_t nrounds)
    130  1.1  riastrad {
    131  1.1  riastrad 	uint64_t sk_exp[120];
    132  1.1  riastrad 	__m128i q[4];
    133  1.1  riastrad 	__m128i cv;
    134  1.1  riastrad 
    135  1.1  riastrad 	KASSERT(nbytes);
    136  1.1  riastrad 	KASSERT(nbytes % 16 == 0);
    137  1.1  riastrad 
    138  1.1  riastrad 	/* Expand round keys for bitslicing.  */
    139  1.1  riastrad 	aes_sse2_skey_expand(sk_exp, nrounds, enc->aese_aes.aes_rk64);
    140  1.1  riastrad 
    141  1.1  riastrad 	/* Load the IV.  */
    142  1.1  riastrad 	cv = _mm_loadu_epi8(iv);
    143  1.1  riastrad 
    144  1.1  riastrad 	for (; nbytes; nbytes -= 16, in += 16, out += 16) {
    145  1.1  riastrad 		/* Load input block and apply CV.  */
    146  1.1  riastrad 		q[0] = aes_sse2_interleave_in(cv ^ _mm_loadu_epi8(in));
    147  1.1  riastrad 
    148  1.1  riastrad 		/* Transform to bitslice, encrypt, transform from bitslice.  */
    149  1.1  riastrad 		aes_sse2_ortho(q);
    150  1.1  riastrad 		aes_sse2_bitslice_encrypt(nrounds, sk_exp, q);
    151  1.1  riastrad 		aes_sse2_ortho(q);
    152  1.1  riastrad 
    153  1.1  riastrad 		/* Remember ciphertext as CV and store output block.  */
    154  1.1  riastrad 		cv = aes_sse2_interleave_out(q[0]);
    155  1.1  riastrad 		_mm_storeu_epi8(out, cv);
    156  1.1  riastrad 	}
    157  1.1  riastrad 
    158  1.1  riastrad 	/* Store updated IV.  */
    159  1.1  riastrad 	_mm_storeu_epi8(iv, cv);
    160  1.1  riastrad 
    161  1.1  riastrad 	/* Paranoia: Zero temporary buffers.  */
    162  1.1  riastrad 	explicit_memset(sk_exp, 0, sizeof sk_exp);
    163  1.1  riastrad 	explicit_memset(q, 0, sizeof q);
    164  1.1  riastrad }
    165  1.1  riastrad 
    166  1.1  riastrad void
    167  1.1  riastrad aes_sse2_cbc_dec(const struct aesdec *dec, const uint8_t in[static 16],
    168  1.1  riastrad     uint8_t out[static 16], size_t nbytes, uint8_t ivp[static 16],
    169  1.1  riastrad     uint32_t nrounds)
    170  1.1  riastrad {
    171  1.1  riastrad 	uint64_t sk_exp[120];
    172  1.1  riastrad 	__m128i q[4];
    173  1.1  riastrad 	__m128i cv, iv, w;
    174  1.1  riastrad 
    175  1.1  riastrad 	KASSERT(nbytes);
    176  1.1  riastrad 	KASSERT(nbytes % 16 == 0);
    177  1.1  riastrad 
    178  1.1  riastrad 	/* Expand round keys for bitslicing.  */
    179  1.1  riastrad 	aes_sse2_skey_expand(sk_exp, nrounds, dec->aesd_aes.aes_rk64);
    180  1.1  riastrad 
    181  1.1  riastrad 	/* Load the IV.  */
    182  1.1  riastrad 	iv = _mm_loadu_epi8(ivp);
    183  1.1  riastrad 
    184  1.1  riastrad 	/* Load the last cipher block.  */
    185  1.1  riastrad 	cv = _mm_loadu_epi8(in + nbytes - 16);
    186  1.1  riastrad 
    187  1.1  riastrad 	/* Store the updated IV.  */
    188  1.1  riastrad 	_mm_storeu_epi8(ivp, cv);
    189  1.1  riastrad 
    190  1.1  riastrad 	/* Process the last blocks if not an even multiple of four.  */
    191  1.1  riastrad 	if (nbytes % (4*16)) {
    192  1.1  riastrad 		unsigned n = (nbytes/16) % 4;
    193  1.1  riastrad 
    194  1.1  riastrad 		KASSERT(n > 0);
    195  1.1  riastrad 		KASSERT(n < 4);
    196  1.1  riastrad 
    197  1.1  riastrad 		q[1] = q[2] = q[3] = _mm_setzero_si128();
    198  1.1  riastrad 		q[n - 1] = aes_sse2_interleave_in(cv);
    199  1.1  riastrad 		switch (nbytes % 64) {
    200  1.1  riastrad 		case 48:
    201  1.1  riastrad 			w = _mm_loadu_epi8(in + nbytes - 32);
    202  1.1  riastrad 			q[1] = aes_sse2_interleave_in(w);
    203  1.4  riastrad 			w = _mm_loadu_epi8(in + nbytes - 48);
    204  1.4  riastrad 			q[0] = aes_sse2_interleave_in(w);
    205  1.4  riastrad 			break;
    206  1.1  riastrad 		case 32:
    207  1.4  riastrad 			w = _mm_loadu_epi8(in + nbytes - 32);
    208  1.1  riastrad 			q[0] = aes_sse2_interleave_in(w);
    209  1.4  riastrad 			break;
    210  1.1  riastrad 		case 16:
    211  1.1  riastrad 			break;
    212  1.1  riastrad 		}
    213  1.1  riastrad 
    214  1.1  riastrad 		/* Decrypt.  */
    215  1.1  riastrad 		aes_sse2_ortho(q);
    216  1.1  riastrad 		aes_sse2_bitslice_decrypt(nrounds, sk_exp, q);
    217  1.1  riastrad 		aes_sse2_ortho(q);
    218  1.1  riastrad 
    219  1.1  riastrad 		do {
    220  1.1  riastrad 			n--;
    221  1.1  riastrad 			w = aes_sse2_interleave_out(q[n]);
    222  1.1  riastrad 			if ((nbytes -= 16) == 0)
    223  1.1  riastrad 				goto out;
    224  1.1  riastrad 			cv = _mm_loadu_epi8(in + nbytes - 16);
    225  1.1  riastrad 			_mm_storeu_epi8(out + nbytes, w ^ cv);
    226  1.1  riastrad 		} while (n);
    227  1.1  riastrad 	}
    228  1.1  riastrad 
    229  1.1  riastrad 	for (;;) {
    230  1.1  riastrad 		KASSERT(nbytes >= 64);
    231  1.1  riastrad 		nbytes -= 64;
    232  1.1  riastrad 
    233  1.1  riastrad 		/*
    234  1.1  riastrad 		 * 1. Set up upper cipher block from cv.
    235  1.1  riastrad 		 * 2. Load lower cipher block into cv and set it up.
    236  1.1  riastrad 		 * 3. Decrypt.
    237  1.1  riastrad 		 */
    238  1.1  riastrad 		q[3] = aes_sse2_interleave_in(cv);
    239  1.1  riastrad 
    240  1.1  riastrad 		w = _mm_loadu_epi8(in + nbytes + 4*8);
    241  1.1  riastrad 		q[2] = aes_sse2_interleave_in(w);
    242  1.1  riastrad 
    243  1.1  riastrad 		w = _mm_loadu_epi8(in + nbytes + 4*4);
    244  1.1  riastrad 		q[1] = aes_sse2_interleave_in(w);
    245  1.1  riastrad 
    246  1.1  riastrad 		w = _mm_loadu_epi8(in + nbytes + 4*0);
    247  1.1  riastrad 		q[0] = aes_sse2_interleave_in(w);
    248  1.1  riastrad 
    249  1.1  riastrad 		aes_sse2_ortho(q);
    250  1.1  riastrad 		aes_sse2_bitslice_decrypt(nrounds, sk_exp, q);
    251  1.1  riastrad 		aes_sse2_ortho(q);
    252  1.1  riastrad 
    253  1.1  riastrad 		/* Store the upper output block.  */
    254  1.1  riastrad 		w = aes_sse2_interleave_out(q[3]);
    255  1.1  riastrad 		cv = _mm_loadu_epi8(in + nbytes + 4*8);
    256  1.1  riastrad 		_mm_storeu_epi8(out + nbytes + 4*12, w ^ cv);
    257  1.1  riastrad 
    258  1.1  riastrad 		/* Store the middle output blocks.  */
    259  1.1  riastrad 		w = aes_sse2_interleave_out(q[2]);
    260  1.1  riastrad 		cv = _mm_loadu_epi8(in + nbytes + 4*4);
    261  1.1  riastrad 		_mm_storeu_epi8(out + nbytes + 4*8, w ^ cv);
    262  1.1  riastrad 
    263  1.1  riastrad 		w = aes_sse2_interleave_out(q[1]);
    264  1.1  riastrad 		cv = _mm_loadu_epi8(in + nbytes + 4*0);
    265  1.1  riastrad 		_mm_storeu_epi8(out + nbytes + 4*4, w ^ cv);
    266  1.1  riastrad 
    267  1.1  riastrad 		/*
    268  1.1  riastrad 		 * Get the first output block, but don't load the CV
    269  1.1  riastrad 		 * yet -- it might be the previous ciphertext block, or
    270  1.1  riastrad 		 * it might be the IV.
    271  1.1  riastrad 		 */
    272  1.1  riastrad 		w = aes_sse2_interleave_out(q[0]);
    273  1.1  riastrad 
    274  1.1  riastrad 		/* Stop if we've reached the first output block.  */
    275  1.1  riastrad 		if (nbytes == 0)
    276  1.1  riastrad 			goto out;
    277  1.1  riastrad 
    278  1.1  riastrad 		/*
    279  1.1  riastrad 		 * Load the preceding cipher block, and apply it as the
    280  1.1  riastrad 		 * chaining value to this one.
    281  1.1  riastrad 		 */
    282  1.1  riastrad 		cv = _mm_loadu_epi8(in + nbytes - 16);
    283  1.1  riastrad 		_mm_storeu_epi8(out + nbytes, w ^ cv);
    284  1.1  riastrad 	}
    285  1.1  riastrad 
    286  1.1  riastrad out:	/* Store the first output block.  */
    287  1.1  riastrad 	_mm_storeu_epi8(out, w ^ iv);
    288  1.1  riastrad 
    289  1.1  riastrad 	/* Paranoia: Zero temporary buffers.  */
    290  1.1  riastrad 	explicit_memset(sk_exp, 0, sizeof sk_exp);
    291  1.1  riastrad 	explicit_memset(q, 0, sizeof q);
    292  1.1  riastrad }
    293  1.1  riastrad 
    294  1.1  riastrad static inline __m128i
    295  1.1  riastrad aes_sse2_xts_update(__m128i t)
    296  1.1  riastrad {
    297  1.1  riastrad 	const __m128i one = _mm_set_epi64x(1, 1);
    298  1.1  riastrad 	__m128i s, m, c;
    299  1.1  riastrad 
    300  1.1  riastrad 	s = _mm_srli_epi64(t, 63);	/* 1 if high bit set else 0 */
    301  1.1  riastrad 	m = _mm_sub_epi64(s, one);	/* 0 if high bit set else -1 */
    302  1.1  riastrad 	m = _mm_shuffle_epi32(m, 0x4e);	/* swap halves */
    303  1.1  riastrad 	c = _mm_set_epi64x(1, 0x87);	/* carry */
    304  1.1  riastrad 
    305  1.1  riastrad 	return _mm_slli_epi64(t, 1) ^ (c & ~m);
    306  1.1  riastrad }
    307  1.1  riastrad 
    308  1.1  riastrad static int
    309  1.1  riastrad aes_sse2_xts_update_selftest(void)
    310  1.1  riastrad {
    311  1.1  riastrad 	static const struct {
    312  1.1  riastrad 		uint32_t in[4], out[4];
    313  1.1  riastrad 	} cases[] = {
    314  1.1  riastrad 		[0] = { {1}, {2} },
    315  1.1  riastrad 		[1] = { {0x80000000U,0,0,0}, {0,1,0,0} },
    316  1.1  riastrad 		[2] = { {0,0x80000000U,0,0}, {0,0,1,0} },
    317  1.1  riastrad 		[3] = { {0,0,0x80000000U,0}, {0,0,0,1} },
    318  1.1  riastrad 		[4] = { {0,0,0,0x80000000U}, {0x87,0,0,0} },
    319  1.1  riastrad 		[5] = { {0,0x80000000U,0,0x80000000U}, {0x87,0,1,0} },
    320  1.1  riastrad 	};
    321  1.1  riastrad 	unsigned i;
    322  1.1  riastrad 	uint32_t t[4];
    323  1.1  riastrad 	int result = 0;
    324  1.1  riastrad 
    325  1.1  riastrad 	for (i = 0; i < sizeof(cases)/sizeof(cases[0]); i++) {
    326  1.1  riastrad 		t[0] = cases[i].in[0];
    327  1.1  riastrad 		t[1] = cases[i].in[1];
    328  1.1  riastrad 		t[2] = cases[i].in[2];
    329  1.1  riastrad 		t[3] = cases[i].in[3];
    330  1.1  riastrad 		_mm_storeu_epi8(t, aes_sse2_xts_update(_mm_loadu_epi8(t)));
    331  1.1  riastrad 		if (t[0] != cases[i].out[0] ||
    332  1.1  riastrad 		    t[1] != cases[i].out[1] ||
    333  1.1  riastrad 		    t[2] != cases[i].out[2] ||
    334  1.1  riastrad 		    t[3] != cases[i].out[3]) {
    335  1.1  riastrad 			printf("%s %u:"
    336  1.1  riastrad 			    " %"PRIx32" %"PRIx32" %"PRIx32" %"PRIx32"\n",
    337  1.1  riastrad 			    __func__, i, t[0], t[1], t[2], t[3]);
    338  1.1  riastrad 			result = -1;
    339  1.1  riastrad 		}
    340  1.1  riastrad 	}
    341  1.1  riastrad 
    342  1.1  riastrad 	return result;
    343  1.1  riastrad }
    344  1.1  riastrad 
    345  1.1  riastrad void
    346  1.1  riastrad aes_sse2_xts_enc(const struct aesenc *enc, const uint8_t in[static 16],
    347  1.1  riastrad     uint8_t out[static 16], size_t nbytes, uint8_t tweak[static 16],
    348  1.1  riastrad     uint32_t nrounds)
    349  1.1  riastrad {
    350  1.1  riastrad 	uint64_t sk_exp[120];
    351  1.1  riastrad 	__m128i q[4];
    352  1.1  riastrad 	__m128i w;
    353  1.1  riastrad 	__m128i t[5];
    354  1.1  riastrad 	unsigned i;
    355  1.1  riastrad 
    356  1.1  riastrad 	KASSERT(nbytes);
    357  1.1  riastrad 	KASSERT(nbytes % 16 == 0);
    358  1.1  riastrad 
    359  1.1  riastrad 	/* Expand round keys for bitslicing.  */
    360  1.1  riastrad 	aes_sse2_skey_expand(sk_exp, nrounds, enc->aese_aes.aes_rk64);
    361  1.1  riastrad 
    362  1.1  riastrad 	/* Load tweak.  */
    363  1.1  riastrad 	t[0] = _mm_loadu_epi8(tweak);
    364  1.1  riastrad 
    365  1.1  riastrad 	/* Handle the first block separately if odd number.  */
    366  1.1  riastrad 	if (nbytes % (4*16)) {
    367  1.1  riastrad 		/* Load up the tweaked inputs.  */
    368  1.1  riastrad 		for (i = 0; i < (nbytes/16) % 4; i++) {
    369  1.1  riastrad 			w = _mm_loadu_epi8(in + 16*i) ^ t[i];
    370  1.1  riastrad 			q[i] = aes_sse2_interleave_in(w);
    371  1.1  riastrad 			t[i + 1] = aes_sse2_xts_update(t[i]);
    372  1.1  riastrad 		}
    373  1.1  riastrad 		for (; i < 4; i++)
    374  1.1  riastrad 			q[i] = _mm_setzero_si128();
    375  1.1  riastrad 
    376  1.1  riastrad 		/* Encrypt up to four blocks.  */
    377  1.1  riastrad 		aes_sse2_ortho(q);
    378  1.1  riastrad 		aes_sse2_bitslice_encrypt(nrounds, sk_exp, q);
    379  1.1  riastrad 		aes_sse2_ortho(q);
    380  1.1  riastrad 
    381  1.1  riastrad 		/* Store the tweaked outputs.  */
    382  1.1  riastrad 		for (i = 0; i < (nbytes/16) % 4; i++) {
    383  1.1  riastrad 			w = aes_sse2_interleave_out(q[i]);
    384  1.1  riastrad 			_mm_storeu_epi8(out + 16*i, w ^ t[i]);
    385  1.1  riastrad 		}
    386  1.1  riastrad 
    387  1.1  riastrad 		/* Advance to the next block.  */
    388  1.1  riastrad 		t[0] = t[i];
    389  1.1  riastrad 		in += nbytes % (4*16);
    390  1.1  riastrad 		out += nbytes % (4*16);
    391  1.1  riastrad 		nbytes -= nbytes % (4*16);
    392  1.1  riastrad 		if (nbytes == 0)
    393  1.1  riastrad 			goto out;
    394  1.1  riastrad 	}
    395  1.1  riastrad 
    396  1.1  riastrad 	do {
    397  1.1  riastrad 		KASSERT(nbytes % 64 == 0);
    398  1.1  riastrad 		KASSERT(nbytes >= 64);
    399  1.1  riastrad 
    400  1.1  riastrad 		/* Load up the tweaked inputs.  */
    401  1.1  riastrad 		for (i = 0; i < 4; i++) {
    402  1.1  riastrad 			w = _mm_loadu_epi8(in + 16*i) ^ t[i];
    403  1.1  riastrad 			q[i] = aes_sse2_interleave_in(w);
    404  1.1  riastrad 			t[i + 1] = aes_sse2_xts_update(t[i]);
    405  1.1  riastrad 		}
    406  1.1  riastrad 
    407  1.1  riastrad 		/* Encrypt four blocks.  */
    408  1.1  riastrad 		aes_sse2_ortho(q);
    409  1.1  riastrad 		aes_sse2_bitslice_encrypt(nrounds, sk_exp, q);
    410  1.1  riastrad 		aes_sse2_ortho(q);
    411  1.1  riastrad 
    412  1.1  riastrad 		/* Store the tweaked outputs.  */
    413  1.1  riastrad 		for (i = 0; i < 4; i++) {
    414  1.1  riastrad 			w = aes_sse2_interleave_out(q[i]);
    415  1.1  riastrad 			_mm_storeu_epi8(out + 16*i, w ^ t[i]);
    416  1.1  riastrad 		}
    417  1.1  riastrad 
    418  1.1  riastrad 		/* Advance to the next block.  */
    419  1.1  riastrad 		t[0] = t[4];
    420  1.1  riastrad 		in += 64;
    421  1.1  riastrad 		out += 64;
    422  1.1  riastrad 		nbytes -= 64;
    423  1.1  riastrad 	} while (nbytes);
    424  1.1  riastrad 
    425  1.1  riastrad out:	/* Store the updated tweak.  */
    426  1.1  riastrad 	_mm_storeu_epi8(tweak, t[0]);
    427  1.1  riastrad 
    428  1.1  riastrad 	/* Paranoia: Zero temporary buffers.  */
    429  1.1  riastrad 	explicit_memset(sk_exp, 0, sizeof sk_exp);
    430  1.1  riastrad 	explicit_memset(q, 0, sizeof q);
    431  1.1  riastrad 	explicit_memset(t, 0, sizeof t);
    432  1.1  riastrad }
    433  1.1  riastrad 
    434  1.1  riastrad void
    435  1.1  riastrad aes_sse2_xts_dec(const struct aesdec *dec, const uint8_t in[static 16],
    436  1.1  riastrad     uint8_t out[static 16], size_t nbytes, uint8_t tweak[static 16],
    437  1.1  riastrad     uint32_t nrounds)
    438  1.1  riastrad {
    439  1.1  riastrad 	uint64_t sk_exp[120];
    440  1.1  riastrad 	__m128i q[4];
    441  1.1  riastrad 	__m128i w;
    442  1.1  riastrad 	__m128i t[5];
    443  1.1  riastrad 	unsigned i;
    444  1.1  riastrad 
    445  1.1  riastrad 	KASSERT(nbytes);
    446  1.1  riastrad 	KASSERT(nbytes % 16 == 0);
    447  1.1  riastrad 
    448  1.1  riastrad 	/* Expand round keys for bitslicing.  */
    449  1.1  riastrad 	aes_sse2_skey_expand(sk_exp, nrounds, dec->aesd_aes.aes_rk64);
    450  1.1  riastrad 
    451  1.1  riastrad 	/* Load tweak.  */
    452  1.1  riastrad 	t[0] = _mm_loadu_epi8(tweak);
    453  1.1  riastrad 
    454  1.1  riastrad 	/* Handle the first block separately if odd number.  */
    455  1.1  riastrad 	if (nbytes % (4*16)) {
    456  1.1  riastrad 		/* Load up the tweaked inputs.  */
    457  1.1  riastrad 		for (i = 0; i < (nbytes/16) % 4; i++) {
    458  1.1  riastrad 			w = _mm_loadu_epi8(in + 16*i) ^ t[i];
    459  1.1  riastrad 			q[i] = aes_sse2_interleave_in(w);
    460  1.1  riastrad 			t[i + 1] = aes_sse2_xts_update(t[i]);
    461  1.1  riastrad 		}
    462  1.1  riastrad 		for (; i < 4; i++)
    463  1.1  riastrad 			q[i] = _mm_setzero_si128();
    464  1.1  riastrad 
    465  1.1  riastrad 		/* Decrypt up to four blocks.  */
    466  1.1  riastrad 		aes_sse2_ortho(q);
    467  1.1  riastrad 		aes_sse2_bitslice_decrypt(nrounds, sk_exp, q);
    468  1.1  riastrad 		aes_sse2_ortho(q);
    469  1.1  riastrad 
    470  1.1  riastrad 		/* Store the tweaked outputs.  */
    471  1.1  riastrad 		for (i = 0; i < (nbytes/16) % 4; i++) {
    472  1.1  riastrad 			w = aes_sse2_interleave_out(q[i]);
    473  1.1  riastrad 			_mm_storeu_epi8(out + 16*i, w ^ t[i]);
    474  1.1  riastrad 		}
    475  1.1  riastrad 
    476  1.1  riastrad 		/* Advance to the next block.  */
    477  1.1  riastrad 		t[0] = t[i];
    478  1.1  riastrad 		in += nbytes % (4*16);
    479  1.1  riastrad 		out += nbytes % (4*16);
    480  1.1  riastrad 		nbytes -= nbytes % (4*16);
    481  1.1  riastrad 		if (nbytes == 0)
    482  1.1  riastrad 			goto out;
    483  1.1  riastrad 	}
    484  1.1  riastrad 
    485  1.1  riastrad 	do {
    486  1.1  riastrad 		KASSERT(nbytes % 64 == 0);
    487  1.1  riastrad 		KASSERT(nbytes >= 64);
    488  1.1  riastrad 
    489  1.1  riastrad 		/* Load up the tweaked inputs.  */
    490  1.1  riastrad 		for (i = 0; i < 4; i++) {
    491  1.1  riastrad 			w = _mm_loadu_epi8(in + 16*i) ^ t[i];
    492  1.1  riastrad 			q[i] = aes_sse2_interleave_in(w);
    493  1.1  riastrad 			t[i + 1] = aes_sse2_xts_update(t[i]);
    494  1.1  riastrad 		}
    495  1.1  riastrad 
    496  1.1  riastrad 		/* Decrypt four blocks.  */
    497  1.1  riastrad 		aes_sse2_ortho(q);
    498  1.1  riastrad 		aes_sse2_bitslice_decrypt(nrounds, sk_exp, q);
    499  1.1  riastrad 		aes_sse2_ortho(q);
    500  1.1  riastrad 
    501  1.1  riastrad 		/* Store the tweaked outputs.  */
    502  1.1  riastrad 		for (i = 0; i < 4; i++) {
    503  1.1  riastrad 			w = aes_sse2_interleave_out(q[i]);
    504  1.1  riastrad 			_mm_storeu_epi8(out + 16*i, w ^ t[i]);
    505  1.1  riastrad 		}
    506  1.1  riastrad 
    507  1.1  riastrad 		/* Advance to the next block.  */
    508  1.1  riastrad 		t[0] = t[4];
    509  1.1  riastrad 		in += 64;
    510  1.1  riastrad 		out += 64;
    511  1.1  riastrad 		nbytes -= 64;
    512  1.1  riastrad 	} while (nbytes);
    513  1.1  riastrad 
    514  1.1  riastrad out:	/* Store the updated tweak.  */
    515  1.1  riastrad 	_mm_storeu_epi8(tweak, t[0]);
    516  1.1  riastrad 
    517  1.1  riastrad 	/* Paranoia: Zero temporary buffers.  */
    518  1.1  riastrad 	explicit_memset(sk_exp, 0, sizeof sk_exp);
    519  1.1  riastrad 	explicit_memset(q, 0, sizeof q);
    520  1.1  riastrad 	explicit_memset(t, 0, sizeof t);
    521  1.1  riastrad }
    522  1.1  riastrad 
    523  1.3  riastrad void
    524  1.3  riastrad aes_sse2_cbcmac_update1(const struct aesenc *enc, const uint8_t in[static 16],
    525  1.3  riastrad     size_t nbytes, uint8_t auth[static 16], uint32_t nrounds)
    526  1.3  riastrad {
    527  1.3  riastrad 	uint64_t sk_exp[120];
    528  1.3  riastrad 	__m128i q[4];
    529  1.3  riastrad 
    530  1.3  riastrad 	KASSERT(nbytes);
    531  1.3  riastrad 	KASSERT(nbytes % 16 == 0);
    532  1.3  riastrad 
    533  1.3  riastrad 	/* Expand round keys for bitslicing.  */
    534  1.3  riastrad 	aes_sse2_skey_expand(sk_exp, nrounds, enc->aese_aes.aes_rk64);
    535  1.3  riastrad 
    536  1.3  riastrad 	/* Load initial authenticator.  */
    537  1.3  riastrad 	q[0] = aes_sse2_interleave_in(_mm_loadu_epi8(auth));
    538  1.3  riastrad 
    539  1.3  riastrad 	for (; nbytes; nbytes -= 16, in += 16) {
    540  1.3  riastrad 		q[0] ^= aes_sse2_interleave_in(_mm_loadu_epi8(in));
    541  1.3  riastrad 		aes_sse2_ortho(q);
    542  1.3  riastrad 		aes_sse2_bitslice_encrypt(nrounds, sk_exp, q);
    543  1.3  riastrad 		aes_sse2_ortho(q);
    544  1.3  riastrad 	}
    545  1.3  riastrad 
    546  1.3  riastrad 	/* Store updated authenticator.  */
    547  1.3  riastrad 	_mm_storeu_epi8(auth, aes_sse2_interleave_out(q[0]));
    548  1.3  riastrad 
    549  1.3  riastrad 	/* Paranoia: Zero temporary buffers.  */
    550  1.3  riastrad 	explicit_memset(sk_exp, 0, sizeof sk_exp);
    551  1.3  riastrad 	explicit_memset(q, 0, sizeof q);
    552  1.3  riastrad }
    553  1.3  riastrad 
    554  1.3  riastrad void
    555  1.3  riastrad aes_sse2_ccm_enc1(const struct aesenc *enc, const uint8_t in[static 16],
    556  1.3  riastrad     uint8_t out[static 16], size_t nbytes, uint8_t authctr[static 32],
    557  1.3  riastrad     uint32_t nrounds)
    558  1.3  riastrad {
    559  1.3  riastrad 	uint64_t sk_exp[120];
    560  1.3  riastrad 	__m128i q[4];
    561  1.3  riastrad 	__m128i ctr;
    562  1.3  riastrad 	uint32_t c0, c1, c2, c3;
    563  1.3  riastrad 
    564  1.3  riastrad 	KASSERT(nbytes);
    565  1.3  riastrad 	KASSERT(nbytes % 16 == 0);
    566  1.3  riastrad 
    567  1.3  riastrad 	/* Expand round keys for bitslicing.  */
    568  1.3  riastrad 	aes_sse2_skey_expand(sk_exp, nrounds, enc->aese_aes.aes_rk64);
    569  1.3  riastrad 
    570  1.3  riastrad 	/* Set first block to authenticator.  */
    571  1.3  riastrad 	q[0] = aes_sse2_interleave_in(_mm_loadu_epi8(authctr));
    572  1.3  riastrad 
    573  1.3  riastrad 	/* Load initial counter block, big-endian so we can increment it.  */
    574  1.3  riastrad 	c0 = le32dec(authctr + 16 + 4*0);
    575  1.3  riastrad 	c1 = le32dec(authctr + 16 + 4*1);
    576  1.3  riastrad 	c2 = le32dec(authctr + 16 + 4*2);
    577  1.3  riastrad 	c3 = be32dec(authctr + 16 + 4*3);
    578  1.3  riastrad 
    579  1.3  riastrad 	/* Set other blocks to garbage -- can't take advantage.  */
    580  1.3  riastrad 	q[2] = q[3] = _mm_setzero_si128();
    581  1.3  riastrad 
    582  1.3  riastrad 	for (; nbytes; nbytes -= 16, in += 16, out += 16) {
    583  1.3  riastrad 		/* Update authenticator.  */
    584  1.3  riastrad 		q[0] ^= aes_sse2_interleave_in(_mm_loadu_epi8(in));
    585  1.3  riastrad 
    586  1.3  riastrad 		/* Increment 32-bit counter.  */
    587  1.3  riastrad 		ctr = _mm_set_epi32(bswap32(++c3), c2, c1, c0);
    588  1.3  riastrad 		q[1] = aes_sse2_interleave_in(ctr);
    589  1.3  riastrad 
    590  1.3  riastrad 		/* Encrypt authenticator and counter.  */
    591  1.3  riastrad 		aes_sse2_ortho(q);
    592  1.3  riastrad 		aes_sse2_bitslice_encrypt(nrounds, sk_exp, q);
    593  1.3  riastrad 		aes_sse2_ortho(q);
    594  1.3  riastrad 
    595  1.3  riastrad 		/* Encrypt with CTR output.  */
    596  1.3  riastrad 		_mm_storeu_epi8(out,
    597  1.3  riastrad 		    _mm_loadu_epi8(in) ^ aes_sse2_interleave_out(q[1]));
    598  1.3  riastrad 	}
    599  1.3  riastrad 
    600  1.3  riastrad 	/* Update authenticator.  */
    601  1.3  riastrad 	_mm_storeu_epi8(authctr, aes_sse2_interleave_out(q[0]));
    602  1.3  riastrad 
    603  1.3  riastrad 	/* Update counter.  */
    604  1.3  riastrad 	be32enc(authctr + 16 + 4*3, c3);
    605  1.3  riastrad 
    606  1.3  riastrad 	/* Paranoia: Zero temporary buffers.  */
    607  1.3  riastrad 	explicit_memset(sk_exp, 0, sizeof sk_exp);
    608  1.3  riastrad 	explicit_memset(q, 0, sizeof q);
    609  1.3  riastrad }
    610  1.3  riastrad 
    611  1.3  riastrad void
    612  1.3  riastrad aes_sse2_ccm_dec1(const struct aesenc *enc, const uint8_t in[static 16],
    613  1.3  riastrad     uint8_t out[static 16], size_t nbytes, uint8_t authctr[static 32],
    614  1.3  riastrad     uint32_t nrounds)
    615  1.3  riastrad {
    616  1.3  riastrad 	uint64_t sk_exp[120];
    617  1.3  riastrad 	__m128i q[4];
    618  1.3  riastrad 	__m128i ctr, block;
    619  1.3  riastrad 	uint32_t c0, c1, c2, c3;
    620  1.3  riastrad 
    621  1.3  riastrad 	KASSERT(nbytes);
    622  1.3  riastrad 	KASSERT(nbytes % 16 == 0);
    623  1.3  riastrad 
    624  1.3  riastrad 	/* Expand round keys for bitslicing.  */
    625  1.3  riastrad 	aes_sse2_skey_expand(sk_exp, nrounds, enc->aese_aes.aes_rk64);
    626  1.3  riastrad 
    627  1.3  riastrad 	/* Load initial counter block, big-endian so we can increment it.  */
    628  1.3  riastrad 	c0 = le32dec(authctr + 16 + 4*0);
    629  1.3  riastrad 	c1 = le32dec(authctr + 16 + 4*1);
    630  1.3  riastrad 	c2 = le32dec(authctr + 16 + 4*2);
    631  1.3  riastrad 	c3 = be32dec(authctr + 16 + 4*3);
    632  1.3  riastrad 
    633  1.3  riastrad 	/* Increment 32-bit counter.  */
    634  1.3  riastrad 	ctr = _mm_set_epi32(bswap32(++c3), c2, c1, c0);
    635  1.3  riastrad 	q[0] = aes_sse2_interleave_in(ctr);
    636  1.3  riastrad 
    637  1.3  riastrad 	/*
    638  1.3  riastrad 	 * Set the other blocks to garbage -- we don't have any
    639  1.3  riastrad 	 * plaintext to authenticate yet.
    640  1.3  riastrad 	 */
    641  1.3  riastrad 	q[1] = q[2] = q[3] = _mm_setzero_si128();
    642  1.3  riastrad 
    643  1.3  riastrad 	/* Encrypt first CTR.  */
    644  1.3  riastrad 	aes_sse2_ortho(q);
    645  1.3  riastrad 	aes_sse2_bitslice_encrypt(nrounds, sk_exp, q);
    646  1.3  riastrad 	aes_sse2_ortho(q);
    647  1.3  riastrad 
    648  1.3  riastrad 	/* Load the initial authenticator.  */
    649  1.3  riastrad 	q[1] = aes_sse2_interleave_in(_mm_loadu_epi8(authctr));
    650  1.3  riastrad 
    651  1.3  riastrad 	for (;; in += 16, out += 16) {
    652  1.3  riastrad 		/* Decrypt the block.  */
    653  1.3  riastrad 		block = _mm_loadu_epi8(in) ^ aes_sse2_interleave_out(q[0]);
    654  1.3  riastrad 
    655  1.3  riastrad 		/* Update authenticator.  */
    656  1.3  riastrad 		q[1] ^= aes_sse2_interleave_in(block);
    657  1.3  riastrad 
    658  1.3  riastrad 		/* Store plaintext.  */
    659  1.3  riastrad 		_mm_storeu_epi8(out, block);
    660  1.3  riastrad 
    661  1.3  riastrad 		/* If this is the last block, stop.  */
    662  1.3  riastrad 		if ((nbytes -= 16) == 0)
    663  1.3  riastrad 			break;
    664  1.3  riastrad 
    665  1.3  riastrad 		/* Increment 32-bit counter.  */
    666  1.3  riastrad 		ctr = _mm_set_epi32(bswap32(++c3), c2, c1, c0);
    667  1.3  riastrad 		q[0] = aes_sse2_interleave_in(ctr);
    668  1.3  riastrad 
    669  1.3  riastrad 		/* Authenticate previous plaintext, encrypt next CTR.  */
    670  1.3  riastrad 		aes_sse2_ortho(q);
    671  1.3  riastrad 		aes_sse2_bitslice_encrypt(nrounds, sk_exp, q);
    672  1.3  riastrad 		aes_sse2_ortho(q);
    673  1.3  riastrad 	}
    674  1.3  riastrad 
    675  1.3  riastrad 	/*
    676  1.3  riastrad 	 * Authenticate last plaintext.  We're only doing this for the
    677  1.3  riastrad 	 * authenticator, not for the counter, so don't bother to
    678  1.3  riastrad 	 * initialize q[0], q[2], q[3].  (Even for the sake of
    679  1.3  riastrad 	 * sanitizers, they're already initialized to something by
    680  1.3  riastrad 	 * now.)
    681  1.3  riastrad 	 */
    682  1.3  riastrad 	aes_sse2_ortho(q);
    683  1.3  riastrad 	aes_sse2_bitslice_encrypt(nrounds, sk_exp, q);
    684  1.3  riastrad 	aes_sse2_ortho(q);
    685  1.3  riastrad 
    686  1.3  riastrad 	/* Update authenticator.  */
    687  1.3  riastrad 	_mm_storeu_epi8(authctr, aes_sse2_interleave_out(q[1]));
    688  1.3  riastrad 
    689  1.3  riastrad 	/* Update counter.  */
    690  1.3  riastrad 	be32enc(authctr + 16 + 4*3, c3);
    691  1.3  riastrad 
    692  1.3  riastrad 	/* Paranoia: Zero temporary buffers.  */
    693  1.3  riastrad 	explicit_memset(sk_exp, 0, sizeof sk_exp);
    694  1.3  riastrad 	explicit_memset(q, 0, sizeof q);
    695  1.3  riastrad }
    696  1.3  riastrad 
    697  1.1  riastrad int
    698  1.1  riastrad aes_sse2_selftest(void)
    699  1.1  riastrad {
    700  1.1  riastrad 
    701  1.1  riastrad 	if (aes_sse2_xts_update_selftest())
    702  1.1  riastrad 		return -1;
    703  1.1  riastrad 
    704  1.1  riastrad 	/* XXX test aes_sse2_bitslice_decrypt */
    705  1.1  riastrad 	/* XXX test aes_sse2_bitslice_encrypt */
    706  1.1  riastrad 	/* XXX test aes_sse2_keysched */
    707  1.1  riastrad 	/* XXX test aes_sse2_ortho */
    708  1.1  riastrad 	/* XXX test aes_sse2_skey_expand */
    709  1.1  riastrad 
    710  1.1  riastrad 	return 0;
    711  1.1  riastrad }
    712