/* * Copied and modified from Shay Gueron's intrin_sequential_ks4_enc8.cpp */ /********************************************************************/ /* Copyright(c) 2014, Intel Corp. */ /* Developers and authors: Shay Gueron (1) (2) */ /* (1) University of Haifa, Israel */ /* (2) Intel, Israel */ /* IPG, Architecture, Israel Development Center, Haifa, Israel */ /********************************************************************/ #include "intrin_sequential_enc8.h" #ifdef USE_PIPELINED_AES_NI #define KS_BLOCK(t, reg, reg2) {globAux=_mm_slli_epi64(reg, 32);\ reg=_mm_xor_si128(globAux, reg);\ globAux=_mm_shuffle_epi8(reg, con3);\ reg=_mm_xor_si128(globAux, reg);\ reg=_mm_xor_si128(reg2, reg);\ } #define KS_round(i) { x2 =_mm_shuffle_epi8(keyA, mask); \ keyA_aux=_mm_aesenclast_si128 (x2, con); \ KS_BLOCK(0, keyA, keyA_aux);\ x2 =_mm_shuffle_epi8(keyB, mask); \ keyB_aux=_mm_aesenclast_si128 (x2, con); \ KS_BLOCK(1, keyB, keyB_aux);\ x2 =_mm_shuffle_epi8(keyC, mask); \ keyC_aux=_mm_aesenclast_si128 (x2, con); \ KS_BLOCK(2, keyC, keyC_aux);\ x2 =_mm_shuffle_epi8(keyD, mask); \ keyD_aux=_mm_aesenclast_si128 (x2, con); \ KS_BLOCK(3, keyD, keyD_aux);\ con=_mm_slli_epi32(con, 1);\ _mm_storeu_si128((__m128i *)(keyptr[0].KEY+i*16), keyA);\ _mm_storeu_si128((__m128i *)(keyptr[1].KEY+i*16), keyB); \ _mm_storeu_si128((__m128i *)(keyptr[2].KEY+i*16), keyC); \ _mm_storeu_si128((__m128i *)(keyptr[3].KEY+i*16), keyD); \ } #define KS_round_last(i) { x2 =_mm_shuffle_epi8(keyA, mask); \ keyA_aux=_mm_aesenclast_si128 (x2, con); \ x2 =_mm_shuffle_epi8(keyB, mask); \ keyB_aux=_mm_aesenclast_si128 (x2, con); \ x2 =_mm_shuffle_epi8(keyC, mask); \ keyC_aux=_mm_aesenclast_si128 (x2, con); \ x2 =_mm_shuffle_epi8(keyD, mask); \ keyD_aux=_mm_aesenclast_si128 (x2, con); \ KS_BLOCK(0, keyA, keyA_aux);\ KS_BLOCK(1, keyB, keyB_aux);\ KS_BLOCK(2, keyC, keyC_aux);\ KS_BLOCK(3, keyD, keyD_aux);\ _mm_storeu_si128((__m128i *)(keyptr[0].KEY+i*16), keyA);\ _mm_storeu_si128((__m128i *)(keyptr[1].KEY+i*16), keyB); \ _mm_storeu_si128((__m128i *)(keyptr[2].KEY+i*16), keyC); \ _mm_storeu_si128((__m128i *)(keyptr[3].KEY+i*16), keyD); \ } #define READ_KEYS(i) {keyA = _mm_loadu_si128((__m128i const*)(keyptr[0].KEY+i*16));\ keyB = _mm_loadu_si128((__m128i const*)(keyptr[1].KEY+i*16));\ keyC = _mm_loadu_si128((__m128i const*)(keyptr[2].KEY+i*16));\ keyD = _mm_loadu_si128((__m128i const*)(keyptr[3].KEY+i*16));\ keyE = _mm_loadu_si128((__m128i const*)(keyptr[4].KEY+i*16));\ keyF = _mm_loadu_si128((__m128i const*)(keyptr[5].KEY+i*16));\ keyG = _mm_loadu_si128((__m128i const*)(keyptr[6].KEY+i*16));\ keyH = _mm_loadu_si128((__m128i const*)(keyptr[7].KEY+i*16));\ } #define ENC_round(i) {block1=_mm_aesenc_si128(block1, (*(__m128i const*)(keyptr[0].KEY+i*16))); \ block2=_mm_aesenc_si128(block2, (*(__m128i const*)(keyptr[1].KEY+i*16))); \ block3=_mm_aesenc_si128(block3, (*(__m128i const*)(keyptr[2].KEY+i*16))); \ block4=_mm_aesenc_si128(block4, (*(__m128i const*)(keyptr[3].KEY+i*16))); \ block5=_mm_aesenc_si128(block5, (*(__m128i const*)(keyptr[4].KEY+i*16))); \ block6=_mm_aesenc_si128(block6, (*(__m128i const*)(keyptr[5].KEY+i*16))); \ block7=_mm_aesenc_si128(block7, (*(__m128i const*)(keyptr[6].KEY+i*16))); \ block8=_mm_aesenc_si128(block8, (*(__m128i const*)(keyptr[7].KEY+i*16))); \ } #define ENC_round_last(i) {block1=_mm_aesenclast_si128(block1, (*(__m128i const*)(keyptr[0].KEY+i*16))); \ block2=_mm_aesenclast_si128(block2, (*(__m128i const*)(keyptr[1].KEY+i*16))); \ block3=_mm_aesenclast_si128(block3, (*(__m128i const*)(keyptr[2].KEY+i*16))); \ block4=_mm_aesenclast_si128(block4, (*(__m128i const*)(keyptr[3].KEY+i*16))); \ block5=_mm_aesenclast_si128(block5, (*(__m128i const*)(keyptr[4].KEY+i*16))); \ block6=_mm_aesenclast_si128(block6, (*(__m128i const*)(keyptr[5].KEY+i*16))); \ block7=_mm_aesenclast_si128(block7, (*(__m128i const*)(keyptr[6].KEY+i*16))); \ block8=_mm_aesenclast_si128(block8, (*(__m128i const*)(keyptr[7].KEY+i*16))); \ } #define KS1_BLOCK(t, reg, reg2) {globAux=_mm_slli_epi64(reg, 32);\ reg=_mm_xor_si128(globAux, reg);\ globAux=_mm_shuffle_epi8(reg, con3);\ reg=_mm_xor_si128(globAux, reg);\ reg=_mm_xor_si128(reg2, reg);\ } #define KS1_round(i) { x2 =_mm_shuffle_epi8(keyA, mask); \ keyA_aux=_mm_aesenclast_si128 (x2, con); \ KS1_BLOCK(0, keyA, keyA_aux);\ con=_mm_slli_epi32(con, 1);\ _mm_storeu_si128((__m128i *)(keyptr[0].KEY+i*16), keyA);\ } #define KS1_round_last(i) { x2 =_mm_shuffle_epi8(keyA, mask); \ keyA_aux=_mm_aesenclast_si128 (x2, con); \ KS1_BLOCK(0, keyA, keyA_aux);\ _mm_storeu_si128((__m128i *)(keyptr[0].KEY+i*16), keyA);\ } #define READ_KEYS1(i) {keyA = _mm_loadu_si128((__m128i const*)(keyptr[0].KEY+i*16));\ } #define ENC1_round(i) {block1=_mm_aesenc_si128(block1, (*(__m128i const*)(keyptr[0].KEY+i*16))); \ } #define ENC1_round_last(i) {block1=_mm_aesenclast_si128(block1, (*(__m128i const*)(keyptr[0].KEY+i*16))); \ } //generates nkeys round keys from the bytes stored in key_bytes void intrin_sequential_ks4(ROUND_KEYS* ks, unsigned char* key_bytes, int nkeys) { ROUND_KEYS *keyptr=(ROUND_KEYS *)ks; register __m128i keyA, keyB, keyC, keyD, con, mask, x2, keyA_aux, keyB_aux, keyC_aux, keyD_aux, globAux; int i; int _con1[4]={1,1,1,1}; int _con2[4]={0x1b,0x1b,0x1b,0x1b}; int _mask[4]={0x0c0f0e0d,0x0c0f0e0d,0x0c0f0e0d,0x0c0f0e0d}; int _con3[4]={0x0ffffffff, 0x0ffffffff, 0x07060504, 0x07060504}; __m128i con3=_mm_loadu_si128((__m128i const*)_con3); int lim = (nkeys/4)*4; for (i=0;i