diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-21 11:54:28 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-21 11:54:28 +0000 |
commit | e6918187568dbd01842d8d1d2c808ce16a894239 (patch) | |
tree | 64f88b554b444a49f656b6c656111a145cbbaa28 /src/spdk/intel-ipsec-mb/aes_keyexp_256.asm | |
parent | Initial commit. (diff) | |
download | ceph-e6918187568dbd01842d8d1d2c808ce16a894239.tar.xz ceph-e6918187568dbd01842d8d1d2c808ce16a894239.zip |
Adding upstream version 18.2.2.upstream/18.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/spdk/intel-ipsec-mb/aes_keyexp_256.asm')
-rw-r--r-- | src/spdk/intel-ipsec-mb/aes_keyexp_256.asm | 677 |
1 files changed, 677 insertions, 0 deletions
diff --git a/src/spdk/intel-ipsec-mb/aes_keyexp_256.asm b/src/spdk/intel-ipsec-mb/aes_keyexp_256.asm new file mode 100644 index 000000000..1acdac3dd --- /dev/null +++ b/src/spdk/intel-ipsec-mb/aes_keyexp_256.asm @@ -0,0 +1,677 @@ +;; +;; Copyright (c) 2012-2018, Intel Corporation +;; +;; Redistribution and use in source and binary forms, with or without +;; modification, are permitted provided that the following conditions are met: +;; +;; * Redistributions of source code must retain the above copyright notice, +;; this list of conditions and the following disclaimer. +;; * Redistributions in binary form must reproduce the above copyright +;; notice, this list of conditions and the following disclaimer in the +;; documentation and/or other materials provided with the distribution. +;; * Neither the name of Intel Corporation nor the names of its contributors +;; may be used to endorse or promote products derived from this software +;; without specific prior written permission. +;; +;; THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" +;; AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +;; IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE +;; DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE +;; FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +;; DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR +;; SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +;; CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, +;; OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +;; OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +;; + +; Routine to do AES key expansion +%include "include/os.asm" +%define NO_AESNI_RENAME +%include "include/aesni_emu.inc" +%include "include/clear_regs.asm" + +; Uses the f() function of the aeskeygenassist result +%macro key_expansion_256_sse 0 + ;; Assumes the xmm3 includes all zeros at this point. + pshufd xmm2, xmm2, 11111111b + shufps xmm3, xmm1, 00010000b + pxor xmm1, xmm3 + shufps xmm3, xmm1, 10001100b + pxor xmm1, xmm3 + pxor xmm1, xmm2 +%endmacro + +; Uses the SubWord function of the aeskeygenassist result +%macro key_expansion_256_sse_2 0 + ;; Assumes the xmm3 includes all zeros at this point. + pshufd xmm2, xmm2, 10101010b + shufps xmm3, xmm4, 00010000b + pxor xmm4, xmm3 + shufps xmm3, xmm4, 10001100b + pxor xmm4, xmm3 + pxor xmm4, xmm2 +%endmacro + +; Uses the f() function of the aeskeygenassist result +%macro key_expansion_256_avx 0 + ;; Assumes the xmm3 includes all zeros at this point. + vpshufd xmm2, xmm2, 11111111b + vshufps xmm3, xmm3, xmm1, 00010000b + vpxor xmm1, xmm1, xmm3 + vshufps xmm3, xmm3, xmm1, 10001100b + vpxor xmm1, xmm1, xmm3 + vpxor xmm1, xmm1, xmm2 +%endmacro + +; Uses the SubWord function of the aeskeygenassist result +%macro key_expansion_256_avx_2 0 + ;; Assumes the xmm3 includes all zeros at this point. + vpshufd xmm2, xmm2, 10101010b + vshufps xmm3, xmm3, xmm4, 00010000b + vpxor xmm4, xmm4, xmm3 + vshufps xmm3, xmm3, xmm4, 10001100b + vpxor xmm4, xmm4, xmm3 + vpxor xmm4, xmm4, xmm2 +%endmacro + +%ifdef LINUX +%define KEY rdi +%define EXP_ENC_KEYS rsi +%define EXP_DEC_KEYS rdx +%else +%define KEY rcx +%define EXP_ENC_KEYS rdx +%define EXP_DEC_KEYS r8 +%endif + +section .text + +; void aes_keyexp_256(UINT128 *key, +; UINT128 *enc_exp_keys, +; UINT128 *dec_exp_keys); +; +; arg 1: rcx: pointer to key +; arg 2: rdx: pointer to expanded key array for encrypt +; arg 3: r8: pointer to expanded key array for decrypt +; +MKGLOBAL(aes_keyexp_256_sse,function,) +aes_keyexp_256_sse: + +%ifdef SAFE_PARAM + cmp KEY, 0 + jz aes_keyexp_256_sse_return + cmp EXP_ENC_KEYS, 0 + jz aes_keyexp_256_sse_return + cmp EXP_DEC_KEYS, 0 + jz aes_keyexp_256_sse_return +%endif + + movdqu xmm1, [KEY] ; loading the AES key + movdqa [EXP_ENC_KEYS + 16*0], xmm1 + movdqa [EXP_DEC_KEYS + 16*14], xmm1 ; Storing key in memory + + movdqu xmm4, [KEY+16] ; loading the AES key + movdqa [EXP_ENC_KEYS + 16*1], xmm4 + aesimc xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*13], xmm0 ; Storing key in memory + + pxor xmm3, xmm3 ; Required for the key_expansion. + + aeskeygenassist xmm2, xmm4, 0x1 ; Generating round key 2 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*2], xmm1 + aesimc xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*12], xmm5 + + aeskeygenassist xmm2, xmm1, 0x1 ; Generating round key 3 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*3], xmm4 + aesimc xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*11], xmm0 + + aeskeygenassist xmm2, xmm4, 0x2 ; Generating round key 4 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*4], xmm1 + aesimc xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*10], xmm5 + + aeskeygenassist xmm2, xmm1, 0x2 ; Generating round key 5 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*5], xmm4 + aesimc xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*9], xmm0 + + aeskeygenassist xmm2, xmm4, 0x4 ; Generating round key 6 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*6], xmm1 + aesimc xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*8], xmm5 + + aeskeygenassist xmm2, xmm1, 0x4 ; Generating round key 7 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*7], xmm4 + aesimc xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*7], xmm0 + + aeskeygenassist xmm2, xmm4, 0x8 ; Generating round key 8 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*8], xmm1 + aesimc xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*6], xmm5 + + aeskeygenassist xmm2, xmm1, 0x8 ; Generating round key 9 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*9], xmm4 + aesimc xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*5], xmm0 + + aeskeygenassist xmm2, xmm4, 0x10 ; Generating round key 10 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*10], xmm1 + aesimc xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*4], xmm5 + + aeskeygenassist xmm2, xmm1, 0x10 ; Generating round key 11 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*11], xmm4 + aesimc xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*3], xmm0 + + aeskeygenassist xmm2, xmm4, 0x20 ; Generating round key 12 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*12], xmm1 + aesimc xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*2], xmm5 + + aeskeygenassist xmm2, xmm1, 0x20 ; Generating round key 13 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*13], xmm4 + aesimc xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*1], xmm0 + + aeskeygenassist xmm2, xmm4, 0x40 ; Generating round key 14 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*14], xmm1 + movdqa [EXP_DEC_KEYS + 16*0], xmm1 + +%ifdef SAFE_DATA + clear_scratch_gps_asm + clear_scratch_xmms_sse_asm +%endif + +aes_keyexp_256_sse_return: + ret + +MKGLOBAL(aes_keyexp_256_sse_no_aesni,function,) +aes_keyexp_256_sse_no_aesni: + +%ifdef SAFE_PARAM + cmp KEY, 0 + jz aes_keyexp_256_sse_no_aesni_return + cmp EXP_ENC_KEYS, 0 + jz aes_keyexp_256_sse_no_aesni_return + cmp EXP_DEC_KEYS, 0 + jz aes_keyexp_256_sse_no_aesni_return +%endif + + movdqu xmm1, [KEY] ; loading the AES key + movdqa [EXP_ENC_KEYS + 16*0], xmm1 + movdqa [EXP_DEC_KEYS + 16*14], xmm1 ; Storing key in memory + + movdqu xmm4, [KEY+16] ; loading the AES key + movdqa [EXP_ENC_KEYS + 16*1], xmm4 + EMULATE_AESIMC xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*13], xmm0 ; Storing key in memory + + pxor xmm3, xmm3 ; Required for the key_expansion. + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x1 ; Generating round key 2 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*2], xmm1 + EMULATE_AESIMC xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*12], xmm5 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x1 ; Generating round key 3 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*3], xmm4 + EMULATE_AESIMC xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*11], xmm0 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x2 ; Generating round key 4 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*4], xmm1 + EMULATE_AESIMC xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*10], xmm5 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x2 ; Generating round key 5 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*5], xmm4 + EMULATE_AESIMC xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*9], xmm0 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x4 ; Generating round key 6 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*6], xmm1 + EMULATE_AESIMC xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*8], xmm5 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x4 ; Generating round key 7 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*7], xmm4 + EMULATE_AESIMC xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*7], xmm0 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x8 ; Generating round key 8 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*8], xmm1 + EMULATE_AESIMC xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*6], xmm5 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x8 ; Generating round key 9 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*9], xmm4 + EMULATE_AESIMC xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*5], xmm0 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x10 ; Generating round key 10 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*10], xmm1 + EMULATE_AESIMC xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*4], xmm5 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x10 ; Generating round key 11 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*11], xmm4 + EMULATE_AESIMC xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*3], xmm0 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x20 ; Generating round key 12 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*12], xmm1 + EMULATE_AESIMC xmm5, xmm1 + movdqa [EXP_DEC_KEYS + 16*2], xmm5 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x20 ; Generating round key 13 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*13], xmm4 + EMULATE_AESIMC xmm0, xmm4 + movdqa [EXP_DEC_KEYS + 16*1], xmm0 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x40 ; Generating round key 14 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*14], xmm1 + movdqa [EXP_DEC_KEYS + 16*0], xmm1 + +%ifdef SAFE_DATA + clear_scratch_gps_asm + clear_scratch_xmms_sse_asm +%endif + +aes_keyexp_256_sse_no_aesni_return: + ret + +MKGLOBAL(aes_keyexp_256_avx,function,) +MKGLOBAL(aes_keyexp_256_avx2,function,) +MKGLOBAL(aes_keyexp_256_avx512,function,) +aes_keyexp_256_avx: +aes_keyexp_256_avx2: +aes_keyexp_256_avx512: + +%ifdef SAFE_PARAM + cmp KEY, 0 + jz aes_keyexp_256_avx_return + cmp EXP_ENC_KEYS, 0 + jz aes_keyexp_256_avx_return + cmp EXP_DEC_KEYS, 0 + jz aes_keyexp_256_avx_return +%endif + + vmovdqu xmm1, [KEY] ; loading the AES key + vmovdqa [EXP_ENC_KEYS + 16*0], xmm1 + vmovdqa [EXP_DEC_KEYS + 16*14], xmm1 ; Storing key in memory + + vmovdqu xmm4, [KEY+16] ; loading the AES key + vmovdqa [EXP_ENC_KEYS + 16*1], xmm4 + vaesimc xmm0, xmm4 + vmovdqa [EXP_DEC_KEYS + 16*13], xmm0 ; Storing key in memory + + vpxor xmm3, xmm3, xmm3 ; Required for the key_expansion. + + vaeskeygenassist xmm2, xmm4, 0x1 ; Generating round key 2 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*2], xmm1 + vaesimc xmm5, xmm1 + vmovdqa [EXP_DEC_KEYS + 16*12], xmm5 + + vaeskeygenassist xmm2, xmm1, 0x1 ; Generating round key 3 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*3], xmm4 + vaesimc xmm0, xmm4 + vmovdqa [EXP_DEC_KEYS + 16*11], xmm0 + + vaeskeygenassist xmm2, xmm4, 0x2 ; Generating round key 4 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*4], xmm1 + vaesimc xmm5, xmm1 + vmovdqa [EXP_DEC_KEYS + 16*10], xmm5 + + vaeskeygenassist xmm2, xmm1, 0x2 ; Generating round key 5 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*5], xmm4 + vaesimc xmm0, xmm4 + vmovdqa [EXP_DEC_KEYS + 16*9], xmm0 + + vaeskeygenassist xmm2, xmm4, 0x4 ; Generating round key 6 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*6], xmm1 + vaesimc xmm5, xmm1 + vmovdqa [EXP_DEC_KEYS + 16*8], xmm5 + + vaeskeygenassist xmm2, xmm1, 0x4 ; Generating round key 7 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*7], xmm4 + vaesimc xmm0, xmm4 + vmovdqa [EXP_DEC_KEYS + 16*7], xmm0 + + vaeskeygenassist xmm2, xmm4, 0x8 ; Generating round key 8 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*8], xmm1 + vaesimc xmm5, xmm1 + vmovdqa [EXP_DEC_KEYS + 16*6], xmm5 + + vaeskeygenassist xmm2, xmm1, 0x8 ; Generating round key 9 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*9], xmm4 + vaesimc xmm0, xmm4 + vmovdqa [EXP_DEC_KEYS + 16*5], xmm0 + + vaeskeygenassist xmm2, xmm4, 0x10 ; Generating round key 10 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*10], xmm1 + vaesimc xmm5, xmm1 + vmovdqa [EXP_DEC_KEYS + 16*4], xmm5 + + vaeskeygenassist xmm2, xmm1, 0x10 ; Generating round key 11 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*11], xmm4 + vaesimc xmm0, xmm4 + vmovdqa [EXP_DEC_KEYS + 16*3], xmm0 + + vaeskeygenassist xmm2, xmm4, 0x20 ; Generating round key 12 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*12], xmm1 + vaesimc xmm5, xmm1 + vmovdqa [EXP_DEC_KEYS + 16*2], xmm5 + + vaeskeygenassist xmm2, xmm1, 0x20 ; Generating round key 13 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*13], xmm4 + vaesimc xmm0, xmm4 + vmovdqa [EXP_DEC_KEYS + 16*1], xmm0 + + vaeskeygenassist xmm2, xmm4, 0x40 ; Generating round key 14 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*14], xmm1 + vmovdqa [EXP_DEC_KEYS + 16*0], xmm1 + +%ifdef SAFE_DATA + clear_scratch_gps_asm + clear_scratch_xmms_avx_asm +%endif + +aes_keyexp_256_avx_return: + ret + +;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; +;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; +;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; +;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; + +; void aes_keyexp_256_enc_sse(UINT128 *key, +; UINT128 *enc_exp_keys); +; +; arg 1: rcx: pointer to key +; arg 2: rdx: pointer to expanded key array for encrypt +; +MKGLOBAL(aes_keyexp_256_enc_sse,function,) +aes_keyexp_256_enc_sse: + +%ifdef SAFE_PARAM + cmp KEY, 0 + jz aes_keyexp_256_enc_sse_return + cmp EXP_ENC_KEYS, 0 + jz aes_keyexp_256_enc_sse_return +%endif + + movdqu xmm1, [KEY] ; loading the AES key + movdqa [EXP_ENC_KEYS + 16*0], xmm1 + + movdqu xmm4, [KEY+16] ; loading the AES key + movdqa [EXP_ENC_KEYS + 16*1], xmm4 + + pxor xmm3, xmm3 ; Required for the key_expansion. + + aeskeygenassist xmm2, xmm4, 0x1 ; Generating round key 2 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*2], xmm1 + + aeskeygenassist xmm2, xmm1, 0x1 ; Generating round key 3 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*3], xmm4 + + aeskeygenassist xmm2, xmm4, 0x2 ; Generating round key 4 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*4], xmm1 + + aeskeygenassist xmm2, xmm1, 0x2 ; Generating round key 5 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*5], xmm4 + + aeskeygenassist xmm2, xmm4, 0x4 ; Generating round key 6 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*6], xmm1 + + aeskeygenassist xmm2, xmm1, 0x4 ; Generating round key 7 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*7], xmm4 + + aeskeygenassist xmm2, xmm4, 0x8 ; Generating round key 8 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*8], xmm1 + + aeskeygenassist xmm2, xmm1, 0x8 ; Generating round key 9 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*9], xmm4 + + aeskeygenassist xmm2, xmm4, 0x10 ; Generating round key 10 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*10], xmm1 + + aeskeygenassist xmm2, xmm1, 0x10 ; Generating round key 11 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*11], xmm4 + + aeskeygenassist xmm2, xmm4, 0x20 ; Generating round key 12 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*12], xmm1 + + aeskeygenassist xmm2, xmm1, 0x20 ; Generating round key 13 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*13], xmm4 + + aeskeygenassist xmm2, xmm4, 0x40 ; Generating round key 14 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*14], xmm1 + +%ifdef SAFE_DATA + clear_scratch_gps_asm + clear_scratch_xmms_sse_asm +%endif + +aes_keyexp_256_enc_sse_return: + ret + +MKGLOBAL(aes_keyexp_256_enc_sse_no_aesni,function,) +aes_keyexp_256_enc_sse_no_aesni: + +%ifdef SAFE_PARAM + cmp KEY, 0 + jz aes_keyexp_256_enc_sse_no_aesni_return + cmp EXP_ENC_KEYS, 0 + jz aes_keyexp_256_enc_sse_no_aesni_return +%endif + + movdqu xmm1, [KEY] ; loading the AES key + movdqa [EXP_ENC_KEYS + 16*0], xmm1 + + movdqu xmm4, [KEY+16] ; loading the AES key + movdqa [EXP_ENC_KEYS + 16*1], xmm4 + + pxor xmm3, xmm3 ; Required for the key_expansion. + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x1 ; Generating round key 2 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*2], xmm1 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x1 ; Generating round key 3 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*3], xmm4 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x2 ; Generating round key 4 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*4], xmm1 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x2 ; Generating round key 5 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*5], xmm4 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x4 ; Generating round key 6 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*6], xmm1 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x4 ; Generating round key 7 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*7], xmm4 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x8 ; Generating round key 8 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*8], xmm1 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x8 ; Generating round key 9 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*9], xmm4 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x10 ; Generating round key 10 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*10], xmm1 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x10 ; Generating round key 11 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*11], xmm4 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x20 ; Generating round key 12 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*12], xmm1 + + EMULATE_AESKEYGENASSIST xmm2, xmm1, 0x20 ; Generating round key 13 + key_expansion_256_sse_2 + movdqa [EXP_ENC_KEYS + 16*13], xmm4 + + EMULATE_AESKEYGENASSIST xmm2, xmm4, 0x40 ; Generating round key 14 + key_expansion_256_sse + movdqa [EXP_ENC_KEYS + 16*14], xmm1 + +%ifdef SAFE_DATA + clear_scratch_gps_asm + clear_scratch_xmms_sse_asm +%endif + +aes_keyexp_256_enc_sse_no_aesni_return: + ret + +MKGLOBAL(aes_keyexp_256_enc_avx,function,) +MKGLOBAL(aes_keyexp_256_enc_avx2,function,) +MKGLOBAL(aes_keyexp_256_enc_avx512,function,) +aes_keyexp_256_enc_avx: +aes_keyexp_256_enc_avx2: +aes_keyexp_256_enc_avx512: + +%ifdef SAFE_PARAM + cmp KEY, 0 + jz aes_keyexp_256_enc_avx_return + cmp EXP_ENC_KEYS, 0 + jz aes_keyexp_256_enc_avx_return +%endif + + vmovdqu xmm1, [KEY] ; loading the AES key + vmovdqa [EXP_ENC_KEYS + 16*0], xmm1 + + vmovdqu xmm4, [KEY+16] ; loading the AES key + vmovdqa [EXP_ENC_KEYS + 16*1], xmm4 + + vpxor xmm3, xmm3, xmm3 ; Required for the key_expansion. + + vaeskeygenassist xmm2, xmm4, 0x1 ; Generating round key 2 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*2], xmm1 + + vaeskeygenassist xmm2, xmm1, 0x1 ; Generating round key 3 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*3], xmm4 + + vaeskeygenassist xmm2, xmm4, 0x2 ; Generating round key 4 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*4], xmm1 + + vaeskeygenassist xmm2, xmm1, 0x2 ; Generating round key 5 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*5], xmm4 + + vaeskeygenassist xmm2, xmm4, 0x4 ; Generating round key 6 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*6], xmm1 + + vaeskeygenassist xmm2, xmm1, 0x4 ; Generating round key 7 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*7], xmm4 + + vaeskeygenassist xmm2, xmm4, 0x8 ; Generating round key 8 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*8], xmm1 + + vaeskeygenassist xmm2, xmm1, 0x8 ; Generating round key 9 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*9], xmm4 + + vaeskeygenassist xmm2, xmm4, 0x10 ; Generating round key 10 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*10], xmm1 + + vaeskeygenassist xmm2, xmm1, 0x10 ; Generating round key 11 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*11], xmm4 + + vaeskeygenassist xmm2, xmm4, 0x20 ; Generating round key 12 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*12], xmm1 + + vaeskeygenassist xmm2, xmm1, 0x20 ; Generating round key 13 + key_expansion_256_avx_2 + vmovdqa [EXP_ENC_KEYS + 16*13], xmm4 + + vaeskeygenassist xmm2, xmm4, 0x40 ; Generating round key 14 + key_expansion_256_avx + vmovdqa [EXP_ENC_KEYS + 16*14], xmm1 + +%ifdef SAFE_DATA + clear_scratch_gps_asm + clear_scratch_xmms_avx_asm +%endif + +aes_keyexp_256_enc_avx_return: + ret + +%ifdef LINUX +section .note.GNU-stack noalloc noexec nowrite progbits +%endif |