;; ;; Copyright (c) 2012-2018, Intel Corporation ;; ;; Redistribution and use in source and binary forms, with or without ;; modification, are permitted provided that the following conditions are met: ;; ;; * Redistributions of source code must retain the above copyright notice, ;; this list of conditions and the following disclaimer. ;; * Redistributions in binary form must reproduce the above copyright ;; notice, this list of conditions and the following disclaimer in the ;; documentation and/or other materials provided with the distribution. ;; * Neither the name of Intel Corporation nor the names of its contributors ;; may be used to endorse or promote products derived from this software ;; without specific prior written permission. ;; ;; THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" ;; AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE ;; IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE ;; DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE ;; FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL ;; DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR ;; SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER ;; CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, ;; OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE ;; OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ;; ;;; routine to do a 256 bit CBC AES encrypt ;; clobbers all registers except for ARG1 and rbp %include "include/os.asm" %include "mb_mgr_datastruct.asm" %define VMOVDQ vmovdqu ;; assume buffers not aligned %macro VPXOR2 2 vpxor %1, %1, %2 %endm ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ;; struct AES_ARGS { ;; void* in[8]; ;; void* out[8]; ;; UINT128* keys[8]; ;; UINT128 IV[8]; ;; } ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ;; void aes_cbc_enc_256_x8(AES_ARGS *args, UINT64 len); ;; arg 1: ARG : addr of AES_ARGS structure ;; arg 2: LEN : len (in units of bytes) struc STACK _gpr_save: resq 1 _len: resq 1 endstruc %define GPR_SAVE_AREA rsp + _gpr_save %define LEN_AREA rsp + _len %ifdef LINUX %define ARG rdi %define LEN rsi %define REG3 rcx %define REG4 rdx %else %define ARG rcx %define LEN rdx %define REG3 rsi %define REG4 rdi %endif %define IDX rax %define TMP rbx %define KEYS0 REG3 %define KEYS1 REG4 %define KEYS2 rbp %define KEYS3 r8 %define KEYS4 r9 %define KEYS5 r10 %define KEYS6 r11 %define KEYS7 r12 %define IN0 r13 %define IN2 r14 %define IN4 r15 %define IN6 LEN %define XDATA0 xmm0 %define XDATA1 xmm1 %define XDATA2 xmm2 %define XDATA3 xmm3 %define XDATA4 xmm4 %define XDATA5 xmm5 %define XDATA6 xmm6 %define XDATA7 xmm7 %define XKEY0_3 xmm8 %define XKEY1_4 xmm9 %define XKEY2_5 xmm10 %define XKEY3_6 xmm11 %define XKEY4_7 xmm12 %define XKEY5_8 xmm13 %define XKEY6_9 xmm14 %define XTMP xmm15 section .text MKGLOBAL(aes_cbc_enc_256_x8,function,internal) aes_cbc_enc_256_x8: sub rsp, STACK_size mov [GPR_SAVE_AREA + 8*0], rbp mov IDX, 16 mov [LEN_AREA], LEN mov IN0, [ARG + _aesarg_in + 8*0] mov IN2, [ARG + _aesarg_in + 8*2] mov IN4, [ARG + _aesarg_in + 8*4] mov IN6, [ARG + _aesarg_in + 8*6] ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; mov TMP, [ARG + _aesarg_in + 8*1] VMOVDQ XDATA0, [IN0] ; load first block of plain text VMOVDQ XDATA1, [TMP] ; load first block of plain text mov TMP, [ARG + _aesarg_in + 8*3] VMOVDQ XDATA2, [IN2] ; load first block of plain text VMOVDQ XDATA3, [TMP] ; load first block of plain text mov TMP, [ARG + _aesarg_in + 8*5] VMOVDQ XDATA4, [IN4] ; load first block of plain text VMOVDQ XDATA5, [TMP] ; load first block of plain text mov TMP, [ARG + _aesarg_in + 8*7] VMOVDQ XDATA6, [IN6] ; load first block of plain text VMOVDQ XDATA7, [TMP] ; load first block of plain text VPXOR2 XDATA0, [ARG + _aesarg_IV + 16*0] ; plaintext XOR IV VPXOR2 XDATA1, [ARG + _aesarg_IV + 16*1] ; plaintext XOR IV VPXOR2 XDATA2, [ARG + _aesarg_IV + 16*2] ; plaintext XOR IV VPXOR2 XDATA3, [ARG + _aesarg_IV + 16*3] ; plaintext XOR IV VPXOR2 XDATA4, [ARG + _aesarg_IV + 16*4] ; plaintext XOR IV VPXOR2 XDATA5, [ARG + _aesarg_IV + 16*5] ; plaintext XOR IV VPXOR2 XDATA6, [ARG + _aesarg_IV + 16*6] ; plaintext XOR IV VPXOR2 XDATA7, [ARG + _aesarg_IV + 16*7] ; plaintext XOR IV mov KEYS0, [ARG + _aesarg_keys + 8*0] mov KEYS1, [ARG + _aesarg_keys + 8*1] mov KEYS2, [ARG + _aesarg_keys + 8*2] mov KEYS3, [ARG + _aesarg_keys + 8*3] mov KEYS4, [ARG + _aesarg_keys + 8*4] mov KEYS5, [ARG + _aesarg_keys + 8*5] mov KEYS6, [ARG + _aesarg_keys + 8*6] mov KEYS7, [ARG + _aesarg_keys + 8*7] VPXOR2 XDATA0, [KEYS0 + 16*0] ; 0. ARK VPXOR2 XDATA1, [KEYS1 + 16*0] ; 0. ARK VPXOR2 XDATA2, [KEYS2 + 16*0] ; 0. ARK VPXOR2 XDATA3, [KEYS3 + 16*0] ; 0. ARK VPXOR2 XDATA4, [KEYS4 + 16*0] ; 0. ARK VPXOR2 XDATA5, [KEYS5 + 16*0] ; 0. ARK VPXOR2 XDATA6, [KEYS6 + 16*0] ; 0. ARK VPXOR2 XDATA7, [KEYS7 + 16*0] ; 0. ARK vaesenc XDATA0, [KEYS0 + 16*1] ; 1. ENC vaesenc XDATA1, [KEYS1 + 16*1] ; 1. ENC vaesenc XDATA2, [KEYS2 + 16*1] ; 1. ENC vaesenc XDATA3, [KEYS3 + 16*1] ; 1. ENC vaesenc XDATA4, [KEYS4 + 16*1] ; 1. ENC vaesenc XDATA5, [KEYS5 + 16*1] ; 1. ENC vaesenc XDATA6, [KEYS6 + 16*1] ; 1. ENC vaesenc XDATA7, [KEYS7 + 16*1] ; 1. ENC vmovdqa XKEY0_3, [KEYS0 + 16*3] ; load round 3 key vaesenc XDATA0, [KEYS0 + 16*2] ; 2. ENC vaesenc XDATA1, [KEYS1 + 16*2] ; 2. ENC vaesenc XDATA2, [KEYS2 + 16*2] ; 2. ENC vaesenc XDATA3, [KEYS3 + 16*2] ; 2. ENC vaesenc XDATA4, [KEYS4 + 16*2] ; 2. ENC vaesenc XDATA5, [KEYS5 + 16*2] ; 2. ENC vaesenc XDATA6, [KEYS6 + 16*2] ; 2. ENC vaesenc XDATA7, [KEYS7 + 16*2] ; 2. ENC vmovdqa XKEY1_4, [KEYS1 + 16*4] ; load round 4 key vaesenc XDATA0, XKEY0_3 ; 3. ENC vaesenc XDATA1, [KEYS1 + 16*3] ; 3. ENC vaesenc XDATA2, [KEYS2 + 16*3] ; 3. ENC vaesenc XDATA3, [KEYS3 + 16*3] ; 3. ENC vaesenc XDATA4, [KEYS4 + 16*3] ; 3. ENC vaesenc XDATA5, [KEYS5 + 16*3] ; 3. ENC vaesenc XDATA6, [KEYS6 + 16*3] ; 3. ENC vaesenc XDATA7, [KEYS7 + 16*3] ; 3. ENC vaesenc XDATA0, [KEYS0 + 16*4] ; 4. ENC vmovdqa XKEY2_5, [KEYS2 + 16*5] ; load round 5 key vaesenc XDATA1, XKEY1_4 ; 4. ENC vaesenc XDATA2, [KEYS2 + 16*4] ; 4. ENC vaesenc XDATA3, [KEYS3 + 16*4] ; 4. ENC vaesenc XDATA4, [KEYS4 + 16*4] ; 4. ENC vaesenc XDATA5, [KEYS5 + 16*4] ; 4. ENC vaesenc XDATA6, [KEYS6 + 16*4] ; 4. ENC vaesenc XDATA7, [KEYS7 + 16*4] ; 4. ENC vaesenc XDATA0, [KEYS0 + 16*5] ; 5. ENC vaesenc XDATA1, [KEYS1 + 16*5] ; 5. ENC vmovdqa XKEY3_6, [KEYS3 + 16*6] ; load round 6 key vaesenc XDATA2, XKEY2_5 ; 5. ENC vaesenc XDATA3, [KEYS3 + 16*5] ; 5. ENC vaesenc XDATA4, [KEYS4 + 16*5] ; 5. ENC vaesenc XDATA5, [KEYS5 + 16*5] ; 5. ENC vaesenc XDATA6, [KEYS6 + 16*5] ; 5. ENC vaesenc XDATA7, [KEYS7 + 16*5] ; 5. ENC vaesenc XDATA0, [KEYS0 + 16*6] ; 6. ENC vaesenc XDATA1, [KEYS1 + 16*6] ; 6. ENC vaesenc XDATA2, [KEYS2 + 16*6] ; 6. ENC vmovdqa XKEY4_7, [KEYS4 + 16*7] ; load round 7 key vaesenc XDATA3, XKEY3_6 ; 6. ENC vaesenc XDATA4, [KEYS4 + 16*6] ; 6. ENC vaesenc XDATA5, [KEYS5 + 16*6] ; 6. ENC vaesenc XDATA6, [KEYS6 + 16*6] ; 6. ENC vaesenc XDATA7, [KEYS7 + 16*6] ; 6. ENC vaesenc XDATA0, [KEYS0 + 16*7] ; 7. ENC vaesenc XDATA1, [KEYS1 + 16*7] ; 7. ENC vaesenc XDATA2, [KEYS2 + 16*7] ; 7. ENC vaesenc XDATA3, [KEYS3 + 16*7] ; 7. ENC vmovdqa XKEY5_8, [KEYS5 + 16*8] ; load round 8 key vaesenc XDATA4, XKEY4_7 ; 7. ENC vaesenc XDATA5, [KEYS5 + 16*7] ; 7. ENC vaesenc XDATA6, [KEYS6 + 16*7] ; 7. ENC vaesenc XDATA7, [KEYS7 + 16*7] ; 7. ENC vaesenc XDATA0, [KEYS0 + 16*8] ; 8. ENC vaesenc XDATA1, [KEYS1 + 16*8] ; 8. ENC vaesenc XDATA2, [KEYS2 + 16*8] ; 8. ENC vaesenc XDATA3, [KEYS3 + 16*8] ; 8. ENC vaesenc XDATA4, [KEYS4 + 16*8] ; 8. ENC vmovdqa XKEY6_9, [KEYS6 + 16*9] ; load round 9 key vaesenc XDATA5, XKEY5_8 ; 8. ENC vaesenc XDATA6, [KEYS6 + 16*8] ; 8. ENC vaesenc XDATA7, [KEYS7 + 16*8] ; 8. ENC vaesenc XDATA0, [KEYS0 + 16*9] ; 9. ENC vaesenc XDATA1, [KEYS1 + 16*9] ; 9. ENC vaesenc XDATA2, [KEYS2 + 16*9] ; 9. ENC vaesenc XDATA3, [KEYS3 + 16*9] ; 9. ENC vaesenc XDATA4, [KEYS4 + 16*9] ; 9. ENC vaesenc XDATA5, [KEYS5 + 16*9] ; 9. ENC mov TMP, [ARG + _aesarg_out + 8*0] vaesenc XDATA6, XKEY6_9 ; 9. ENC vaesenc XDATA7, [KEYS7 + 16*9] ; 9. ENC vaesenc XDATA0, [KEYS0 + 16*10] ; 10. ENC vaesenc XDATA1, [KEYS1 + 16*10] ; 10. ENC vaesenc XDATA2, [KEYS2 + 16*10] ; 10. ENC vaesenc XDATA3, [KEYS3 + 16*10] ; 10. ENC vaesenc XDATA4, [KEYS4 + 16*10] ; 10. ENC vaesenc XDATA5, [KEYS5 + 16*10] ; 10. ENC vaesenc XDATA6, [KEYS6 + 16*10] ; 10. ENC vaesenc XDATA7, [KEYS7 + 16*10] ; 10. ENC vaesenc XDATA0, [KEYS0 + 16*11] ; 11. ENC vaesenc XDATA1, [KEYS1 + 16*11] ; 11. ENC vaesenc XDATA2, [KEYS2 + 16*11] ; 11. ENC vaesenc XDATA3, [KEYS3 + 16*11] ; 11. ENC vaesenc XDATA4, [KEYS4 + 16*11] ; 11. ENC vaesenc XDATA5, [KEYS5 + 16*11] ; 11. ENC vaesenc XDATA6, [KEYS6 + 16*11] ; 11. ENC vaesenc XDATA7, [KEYS7 + 16*11] ; 11. ENC vaesenc XDATA0, [KEYS0 + 16*12] ; 12. ENC vaesenc XDATA1, [KEYS1 + 16*12] ; 12. ENC vaesenc XDATA2, [KEYS2 + 16*12] ; 12. ENC vaesenc XDATA3, [KEYS3 + 16*12] ; 12. ENC vaesenc XDATA4, [KEYS4 + 16*12] ; 12. ENC vaesenc XDATA5, [KEYS5 + 16*12] ; 12. ENC vaesenc XDATA6, [KEYS6 + 16*12] ; 12. ENC vaesenc XDATA7, [KEYS7 + 16*12] ; 12. ENC vaesenc XDATA0, [KEYS0 + 16*13] ; 13. ENC vaesenc XDATA1, [KEYS1 + 16*13] ; 13. ENC vaesenc XDATA2, [KEYS2 + 16*13] ; 13. ENC vaesenc XDATA3, [KEYS3 + 16*13] ; 13. ENC vaesenc XDATA4, [KEYS4 + 16*13] ; 13. ENC vaesenc XDATA5, [KEYS5 + 16*13] ; 13. ENC vaesenc XDATA6, [KEYS6 + 16*13] ; 13. ENC vaesenc XDATA7, [KEYS7 + 16*13] ; 13. ENC vaesenclast XDATA0, [KEYS0 + 16*14] ; 14. ENC vaesenclast XDATA1, [KEYS1 + 16*14] ; 14. ENC vaesenclast XDATA2, [KEYS2 + 16*14] ; 14. ENC vaesenclast XDATA3, [KEYS3 + 16*14] ; 14. ENC vaesenclast XDATA4, [KEYS4 + 16*14] ; 14. ENC vaesenclast XDATA5, [KEYS5 + 16*14] ; 14. ENC vaesenclast XDATA6, [KEYS6 + 16*14] ; 14. ENC vaesenclast XDATA7, [KEYS7 + 16*14] ; 14. ENC VMOVDQ [TMP], XDATA0 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*1] VMOVDQ [TMP], XDATA1 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*2] VMOVDQ [TMP], XDATA2 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*3] VMOVDQ [TMP], XDATA3 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*4] VMOVDQ [TMP], XDATA4 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*5] VMOVDQ [TMP], XDATA5 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*6] VMOVDQ [TMP], XDATA6 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*7] VMOVDQ [TMP], XDATA7 ; write back ciphertext cmp [LEN_AREA], IDX je done main_loop: mov TMP, [ARG + _aesarg_in + 8*1] VPXOR2 XDATA0, [IN0 + IDX] ; load next block of plain text VPXOR2 XDATA1, [TMP + IDX] ; load next block of plain text mov TMP, [ARG + _aesarg_in + 8*3] VPXOR2 XDATA2, [IN2 + IDX] ; load next block of plain text VPXOR2 XDATA3, [TMP + IDX] ; load next block of plain text mov TMP, [ARG + _aesarg_in + 8*5] VPXOR2 XDATA4, [IN4 + IDX] ; load next block of plain text VPXOR2 XDATA5, [TMP + IDX] ; load next block of plain text mov TMP, [ARG + _aesarg_in + 8*7] VPXOR2 XDATA6, [IN6 + IDX] ; load next block of plain text VPXOR2 XDATA7, [TMP + IDX] ; load next block of plain text VPXOR2 XDATA0, [KEYS0 + 16*0] ; 0. ARK VPXOR2 XDATA1, [KEYS1 + 16*0] ; 0. ARK VPXOR2 XDATA2, [KEYS2 + 16*0] ; 0. ARK VPXOR2 XDATA3, [KEYS3 + 16*0] ; 0. ARK VPXOR2 XDATA4, [KEYS4 + 16*0] ; 0. ARK VPXOR2 XDATA5, [KEYS5 + 16*0] ; 0. ARK VPXOR2 XDATA6, [KEYS6 + 16*0] ; 0. ARK VPXOR2 XDATA7, [KEYS7 + 16*0] ; 0. ARK vaesenc XDATA0, [KEYS0 + 16*1] ; 1. ENC vaesenc XDATA1, [KEYS1 + 16*1] ; 1. ENC vaesenc XDATA2, [KEYS2 + 16*1] ; 1. ENC vaesenc XDATA3, [KEYS3 + 16*1] ; 1. ENC vaesenc XDATA4, [KEYS4 + 16*1] ; 1. ENC vaesenc XDATA5, [KEYS5 + 16*1] ; 1. ENC vaesenc XDATA6, [KEYS6 + 16*1] ; 1. ENC vaesenc XDATA7, [KEYS7 + 16*1] ; 1. ENC vaesenc XDATA0, [KEYS0 + 16*2] ; 2. ENC vaesenc XDATA1, [KEYS1 + 16*2] ; 2. ENC vaesenc XDATA2, [KEYS2 + 16*2] ; 2. ENC vaesenc XDATA3, [KEYS3 + 16*2] ; 2. ENC vaesenc XDATA4, [KEYS4 + 16*2] ; 2. ENC vaesenc XDATA5, [KEYS5 + 16*2] ; 2. ENC vaesenc XDATA6, [KEYS6 + 16*2] ; 2. ENC vaesenc XDATA7, [KEYS7 + 16*2] ; 2. ENC vaesenc XDATA0, XKEY0_3 ; 3. ENC vaesenc XDATA1, [KEYS1 + 16*3] ; 3. ENC vaesenc XDATA2, [KEYS2 + 16*3] ; 3. ENC vaesenc XDATA3, [KEYS3 + 16*3] ; 3. ENC vaesenc XDATA4, [KEYS4 + 16*3] ; 3. ENC vaesenc XDATA5, [KEYS5 + 16*3] ; 3. ENC vaesenc XDATA6, [KEYS6 + 16*3] ; 3. ENC vaesenc XDATA7, [KEYS7 + 16*3] ; 3. ENC vaesenc XDATA0, [KEYS0 + 16*4] ; 4. ENC vaesenc XDATA1, XKEY1_4 ; 4. ENC vaesenc XDATA2, [KEYS2 + 16*4] ; 4. ENC vaesenc XDATA3, [KEYS3 + 16*4] ; 4. ENC vaesenc XDATA4, [KEYS4 + 16*4] ; 4. ENC vaesenc XDATA5, [KEYS5 + 16*4] ; 4. ENC vaesenc XDATA6, [KEYS6 + 16*4] ; 4. ENC vaesenc XDATA7, [KEYS7 + 16*4] ; 4. ENC vaesenc XDATA0, [KEYS0 + 16*5] ; 5. ENC vaesenc XDATA1, [KEYS1 + 16*5] ; 5. ENC vaesenc XDATA2, XKEY2_5 ; 5. ENC vaesenc XDATA3, [KEYS3 + 16*5] ; 5. ENC vaesenc XDATA4, [KEYS4 + 16*5] ; 5. ENC vaesenc XDATA5, [KEYS5 + 16*5] ; 5. ENC vaesenc XDATA6, [KEYS6 + 16*5] ; 5. ENC vaesenc XDATA7, [KEYS7 + 16*5] ; 5. ENC vaesenc XDATA0, [KEYS0 + 16*6] ; 6. ENC vaesenc XDATA1, [KEYS1 + 16*6] ; 6. ENC vaesenc XDATA2, [KEYS2 + 16*6] ; 6. ENC vaesenc XDATA3, XKEY3_6 ; 6. ENC vaesenc XDATA4, [KEYS4 + 16*6] ; 6. ENC vaesenc XDATA5, [KEYS5 + 16*6] ; 6. ENC vaesenc XDATA6, [KEYS6 + 16*6] ; 6. ENC vaesenc XDATA7, [KEYS7 + 16*6] ; 6. ENC vaesenc XDATA0, [KEYS0 + 16*7] ; 7. ENC vaesenc XDATA1, [KEYS1 + 16*7] ; 7. ENC vaesenc XDATA2, [KEYS2 + 16*7] ; 7. ENC vaesenc XDATA3, [KEYS3 + 16*7] ; 7. ENC vaesenc XDATA4, XKEY4_7 ; 7. ENC vaesenc XDATA5, [KEYS5 + 16*7] ; 7. ENC vaesenc XDATA6, [KEYS6 + 16*7] ; 7. ENC vaesenc XDATA7, [KEYS7 + 16*7] ; 7. ENC vaesenc XDATA0, [KEYS0 + 16*8] ; 8. ENC vaesenc XDATA1, [KEYS1 + 16*8] ; 8. ENC vaesenc XDATA2, [KEYS2 + 16*8] ; 8. ENC vaesenc XDATA3, [KEYS3 + 16*8] ; 8. ENC vaesenc XDATA4, [KEYS4 + 16*8] ; 8. ENC vaesenc XDATA5, XKEY5_8 ; 8. ENC vaesenc XDATA6, [KEYS6 + 16*8] ; 8. ENC vaesenc XDATA7, [KEYS7 + 16*8] ; 8. ENC vaesenc XDATA0, [KEYS0 + 16*9] ; 9. ENC vaesenc XDATA1, [KEYS1 + 16*9] ; 9. ENC vaesenc XDATA2, [KEYS2 + 16*9] ; 9. ENC vaesenc XDATA3, [KEYS3 + 16*9] ; 9. ENC vaesenc XDATA4, [KEYS4 + 16*9] ; 9. ENC vaesenc XDATA5, [KEYS5 + 16*9] ; 9. ENC mov TMP, [ARG + _aesarg_out + 8*0] vaesenc XDATA6, XKEY6_9 ; 9. ENC vaesenc XDATA7, [KEYS7 + 16*9] ; 9. ENC vaesenc XDATA0, [KEYS0 + 16*10] ; 10. ENC vaesenc XDATA1, [KEYS1 + 16*10] ; 10. ENC vaesenc XDATA2, [KEYS2 + 16*10] ; 10. ENC vaesenc XDATA3, [KEYS3 + 16*10] ; 10. ENC vaesenc XDATA4, [KEYS4 + 16*10] ; 10. ENC vaesenc XDATA5, [KEYS5 + 16*10] ; 10. ENC vaesenc XDATA6, [KEYS6 + 16*10] ; 10. ENC vaesenc XDATA7, [KEYS7 + 16*10] ; 10. ENC vaesenc XDATA0, [KEYS0 + 16*11] ; 11. ENC vaesenc XDATA1, [KEYS1 + 16*11] ; 11. ENC vaesenc XDATA2, [KEYS2 + 16*11] ; 11. ENC vaesenc XDATA3, [KEYS3 + 16*11] ; 11. ENC vaesenc XDATA4, [KEYS4 + 16*11] ; 11. ENC vaesenc XDATA5, [KEYS5 + 16*11] ; 11. ENC vaesenc XDATA6, [KEYS6 + 16*11] ; 11. ENC vaesenc XDATA7, [KEYS7 + 16*11] ; 11. ENC vaesenc XDATA0, [KEYS0 + 16*12] ; 12. ENC vaesenc XDATA1, [KEYS1 + 16*12] ; 12. ENC vaesenc XDATA2, [KEYS2 + 16*12] ; 12. ENC vaesenc XDATA3, [KEYS3 + 16*12] ; 12. ENC vaesenc XDATA4, [KEYS4 + 16*12] ; 12. ENC vaesenc XDATA5, [KEYS5 + 16*12] ; 12. ENC vaesenc XDATA6, [KEYS6 + 16*12] ; 12. ENC vaesenc XDATA7, [KEYS7 + 16*12] ; 12. ENC vaesenc XDATA0, [KEYS0 + 16*13] ; 13. ENC vaesenc XDATA1, [KEYS1 + 16*13] ; 13. ENC vaesenc XDATA2, [KEYS2 + 16*13] ; 13. ENC vaesenc XDATA3, [KEYS3 + 16*13] ; 13. ENC vaesenc XDATA4, [KEYS4 + 16*13] ; 13. ENC vaesenc XDATA5, [KEYS5 + 16*13] ; 13. ENC vaesenc XDATA6, [KEYS6 + 16*13] ; 13. ENC vaesenc XDATA7, [KEYS7 + 16*13] ; 13. ENC vaesenclast XDATA0, [KEYS0 + 16*14] ; 14. ENC vaesenclast XDATA1, [KEYS1 + 16*14] ; 14. ENC vaesenclast XDATA2, [KEYS2 + 16*14] ; 14. ENC vaesenclast XDATA3, [KEYS3 + 16*14] ; 14. ENC vaesenclast XDATA4, [KEYS4 + 16*14] ; 14. ENC vaesenclast XDATA5, [KEYS5 + 16*14] ; 14. ENC vaesenclast XDATA6, [KEYS6 + 16*14] ; 14. ENC vaesenclast XDATA7, [KEYS7 + 16*14] ; 14. ENC VMOVDQ [TMP + IDX], XDATA0 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*1] VMOVDQ [TMP + IDX], XDATA1 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*2] VMOVDQ [TMP + IDX], XDATA2 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*3] VMOVDQ [TMP + IDX], XDATA3 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*4] VMOVDQ [TMP + IDX], XDATA4 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*5] VMOVDQ [TMP + IDX], XDATA5 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*6] VMOVDQ [TMP + IDX], XDATA6 ; write back ciphertext mov TMP, [ARG + _aesarg_out + 8*7] VMOVDQ [TMP + IDX], XDATA7 ; write back ciphertext add IDX, 16 cmp [LEN_AREA], IDX jne main_loop done: ;; update IV vmovdqa [ARG + _aesarg_IV + 16*0], XDATA0 vmovdqa [ARG + _aesarg_IV + 16*1], XDATA1 vmovdqa [ARG + _aesarg_IV + 16*2], XDATA2 vmovdqa [ARG + _aesarg_IV + 16*3], XDATA3 vmovdqa [ARG + _aesarg_IV + 16*4], XDATA4 vmovdqa [ARG + _aesarg_IV + 16*5], XDATA5 vmovdqa [ARG + _aesarg_IV + 16*6], XDATA6 vmovdqa [ARG + _aesarg_IV + 16*7], XDATA7 ;; update IN and OUT vmovd xmm0, [LEN_AREA] vpshufd xmm0, xmm0, 0x44 vpaddq xmm1, xmm0, [ARG + _aesarg_in + 16*0] vpaddq xmm2, xmm0, [ARG + _aesarg_in + 16*1] vpaddq xmm3, xmm0, [ARG + _aesarg_in + 16*2] vpaddq xmm4, xmm0, [ARG + _aesarg_in + 16*3] vmovdqa [ARG + _aesarg_in + 16*0], xmm1 vmovdqa [ARG + _aesarg_in + 16*1], xmm2 vmovdqa [ARG + _aesarg_in + 16*2], xmm3 vmovdqa [ARG + _aesarg_in + 16*3], xmm4 vpaddq xmm5, xmm0, [ARG + _aesarg_out + 16*0] vpaddq xmm6, xmm0, [ARG + _aesarg_out + 16*1] vpaddq xmm7, xmm0, [ARG + _aesarg_out + 16*2] vpaddq xmm8, xmm0, [ARG + _aesarg_out + 16*3] vmovdqa [ARG + _aesarg_out + 16*0], xmm5 vmovdqa [ARG + _aesarg_out + 16*1], xmm6 vmovdqa [ARG + _aesarg_out + 16*2], xmm7 vmovdqa [ARG + _aesarg_out + 16*3], xmm8 ;; XMMs are saved at a higher level mov rbp, [GPR_SAVE_AREA + 8*0] add rsp, STACK_size ret %ifdef LINUX section .note.GNU-stack noalloc noexec nowrite progbits %endif