Annotation of embedaddon/strongswan/src/libstrongswan/plugins/aesni/aesni_key.c, revision 1.1
1.1 ! misho 1: /*
! 2: * Copyright (C) 2015 Martin Willi
! 3: * Copyright (C) 2015 revosec AG
! 4: *
! 5: * This program is free software; you can redistribute it and/or modify it
! 6: * under the terms of the GNU General Public License as published by the
! 7: * Free Software Foundation; either version 2 of the License, or (at your
! 8: * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
! 9: *
! 10: * This program is distributed in the hope that it will be useful, but
! 11: * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
! 12: * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
! 13: * for more details.
! 14: */
! 15:
! 16: #include "aesni_key.h"
! 17:
! 18: /**
! 19: * Rounds used for each AES key size
! 20: */
! 21: #define AES128_ROUNDS 10
! 22: #define AES192_ROUNDS 12
! 23: #define AES256_ROUNDS 14
! 24:
! 25: typedef struct private_aesni_key_t private_aesni_key_t;
! 26:
! 27: /**
! 28: * Private data of an aesni_key_t object.
! 29: */
! 30: struct private_aesni_key_t {
! 31:
! 32: /**
! 33: * Public aesni_key_t interface.
! 34: */
! 35: aesni_key_t public;
! 36: };
! 37:
! 38: /**
! 39: * Invert round encryption keys to get a decryption key schedule
! 40: */
! 41: static void reverse_key(aesni_key_t *this)
! 42: {
! 43: __m128i t[this->rounds + 1];
! 44: int i;
! 45:
! 46: for (i = 0; i <= this->rounds; i++)
! 47: {
! 48: t[i] = this->schedule[i];
! 49: }
! 50: this->schedule[this->rounds] = t[0];
! 51: for (i = 1; i < this->rounds; i++)
! 52: {
! 53: this->schedule[this->rounds - i] = _mm_aesimc_si128(t[i]);
! 54: }
! 55: this->schedule[0] = t[this->rounds];
! 56:
! 57: memwipe(t, sizeof(t));
! 58: }
! 59:
! 60: /**
! 61: * Assist in creating a 128-bit round key
! 62: */
! 63: static __m128i assist128(__m128i a, __m128i b)
! 64: {
! 65: __m128i c;
! 66:
! 67: b = _mm_shuffle_epi32(b ,0xff);
! 68: c = _mm_slli_si128(a, 0x04);
! 69: a = _mm_xor_si128(a, c);
! 70: c = _mm_slli_si128(c, 0x04);
! 71: a = _mm_xor_si128(a, c);
! 72: c = _mm_slli_si128(c, 0x04);
! 73: a = _mm_xor_si128(a, c);
! 74: a = _mm_xor_si128(a, b);
! 75:
! 76: return a;
! 77: }
! 78:
! 79: /**
! 80: * Expand a 128-bit key to encryption round keys
! 81: */
! 82: static void expand128(__m128i *key, __m128i *schedule)
! 83: {
! 84: __m128i t;
! 85:
! 86: schedule[0] = t = _mm_loadu_si128(key);
! 87: schedule[1] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x01));
! 88: schedule[2] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x02));
! 89: schedule[3] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x04));
! 90: schedule[4] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x08));
! 91: schedule[5] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x10));
! 92: schedule[6] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x20));
! 93: schedule[7] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x40));
! 94: schedule[8] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x80));
! 95: schedule[9] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x1b));
! 96: schedule[10] = assist128(t, _mm_aeskeygenassist_si128(t, 0x36));
! 97: }
! 98:
! 99: /**
! 100: * Assist in creating a 192-bit round key
! 101: */
! 102: static __m128i assist192(__m128i b, __m128i c, __m128i *a)
! 103: {
! 104: __m128i t;
! 105:
! 106: b = _mm_shuffle_epi32(b, 0x55);
! 107: t = _mm_slli_si128(*a, 0x04);
! 108: *a = _mm_xor_si128(*a, t);
! 109: t = _mm_slli_si128(t, 0x04);
! 110: *a = _mm_xor_si128(*a, t);
! 111: t = _mm_slli_si128(t, 0x04);
! 112: *a = _mm_xor_si128(*a, t);
! 113: *a = _mm_xor_si128(*a, b);
! 114: b = _mm_shuffle_epi32(*a, 0xff);
! 115: t = _mm_slli_si128(c, 0x04);
! 116: t = _mm_xor_si128(c, t);
! 117: t = _mm_xor_si128(t, b);
! 118:
! 119: return t;
! 120: }
! 121:
! 122: /**
! 123: * return a[63:0] | b[63:0] << 64
! 124: */
! 125: static __m128i _mm_shuffle_i00(__m128i a, __m128i b)
! 126: {
! 127: return (__m128i)_mm_shuffle_pd((__m128d)a, (__m128d)b, 0);
! 128: }
! 129:
! 130: /**
! 131: * return a[127:64] >> 64 | b[63:0] << 64
! 132: */
! 133: static __m128i _mm_shuffle_i01(__m128i a, __m128i b)
! 134: {
! 135: return (__m128i)_mm_shuffle_pd((__m128d)a, (__m128d)b, 1);
! 136: }
! 137:
! 138: /**
! 139: * Expand a 192-bit encryption key to round keys
! 140: */
! 141: static void expand192(__m128i *key, __m128i *schedule)
! 142: {
! 143: __m128i t1, t2, t3;
! 144:
! 145: schedule[0] = t1 = _mm_loadu_si128(key);
! 146: t2 = t3 = _mm_loadu_si128(key + 1);
! 147:
! 148: t2 = assist192(_mm_aeskeygenassist_si128(t2, 0x1), t2, &t1);
! 149: schedule[1] = _mm_shuffle_i00(t3, t1);
! 150: schedule[2] = _mm_shuffle_i01(t1, t2);
! 151: t2 = t3 = assist192(_mm_aeskeygenassist_si128(t2, 0x2), t2, &t1);
! 152: schedule[3] = t1;
! 153:
! 154: t2 = assist192(_mm_aeskeygenassist_si128(t2, 0x4), t2, &t1);
! 155: schedule[4] = _mm_shuffle_i00(t3, t1);
! 156: schedule[5] = _mm_shuffle_i01(t1, t2);
! 157: t2 = t3 = assist192(_mm_aeskeygenassist_si128(t2, 0x8), t2, &t1);
! 158: schedule[6] = t1;
! 159:
! 160: t2 = assist192(_mm_aeskeygenassist_si128 (t2,0x10), t2, &t1);
! 161: schedule[7] = _mm_shuffle_i00(t3, t1);
! 162: schedule[8] = _mm_shuffle_i01(t1, t2);
! 163: t2 = t3 = assist192(_mm_aeskeygenassist_si128 (t2,0x20), t2, &t1);
! 164: schedule[9] = t1;
! 165:
! 166: t2 = assist192(_mm_aeskeygenassist_si128(t2, 0x40), t2, &t1);
! 167: schedule[10] = _mm_shuffle_i00(t3, t1);
! 168: schedule[11] = _mm_shuffle_i01(t1, t2);
! 169: assist192(_mm_aeskeygenassist_si128(t2, 0x80), t2, &t1);
! 170: schedule[12] = t1;
! 171: }
! 172:
! 173: /**
! 174: * Assist in creating a 256-bit round key
! 175: */
! 176: static __m128i assist256_1(__m128i a, __m128i b)
! 177: {
! 178: __m128i x, y;
! 179:
! 180: b = _mm_shuffle_epi32(b, 0xff);
! 181: y = _mm_slli_si128(a, 0x04);
! 182: x = _mm_xor_si128(a, y);
! 183: y = _mm_slli_si128(y, 0x04);
! 184: x = _mm_xor_si128 (x, y);
! 185: y = _mm_slli_si128(y, 0x04);
! 186: x = _mm_xor_si128(x, y);
! 187: x = _mm_xor_si128(x, b);
! 188:
! 189: return x;
! 190: }
! 191:
! 192: /**
! 193: * Assist in creating a 256-bit round key
! 194: */
! 195: static __m128i assist256_2(__m128i a, __m128i b)
! 196: {
! 197: __m128i x, y, z;
! 198:
! 199: y = _mm_aeskeygenassist_si128(a, 0x00);
! 200: z = _mm_shuffle_epi32(y, 0xaa);
! 201: y = _mm_slli_si128(b, 0x04);
! 202: x = _mm_xor_si128(b, y);
! 203: y = _mm_slli_si128(y, 0x04);
! 204: x = _mm_xor_si128(x, y);
! 205: y = _mm_slli_si128(y, 0x04);
! 206: x = _mm_xor_si128(x, y);
! 207: x = _mm_xor_si128(x, z);
! 208:
! 209: return x;
! 210: }
! 211:
! 212: /**
! 213: * Expand a 256-bit encryption key to round keys
! 214: */
! 215: static void expand256(__m128i *key, __m128i *schedule)
! 216: {
! 217: __m128i t1, t2;
! 218:
! 219: schedule[0] = t1 = _mm_loadu_si128(key);
! 220: schedule[1] = t2 = _mm_loadu_si128(key + 1);
! 221:
! 222: schedule[2] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x01));
! 223: schedule[3] = t2 = assist256_2(t1, t2);
! 224:
! 225: schedule[4] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x02));
! 226: schedule[5] = t2 = assist256_2(t1, t2);
! 227:
! 228: schedule[6] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x04));
! 229: schedule[7] = t2 = assist256_2(t1, t2);
! 230:
! 231: schedule[8] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x08));
! 232: schedule[9] = t2 = assist256_2(t1, t2);
! 233:
! 234: schedule[10] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x10));
! 235: schedule[11] = t2 = assist256_2(t1, t2);
! 236:
! 237: schedule[12] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x20));
! 238: schedule[13] = t2 = assist256_2(t1, t2);
! 239:
! 240: schedule[14] = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x40));
! 241: }
! 242:
! 243: METHOD(aesni_key_t, destroy, void,
! 244: private_aesni_key_t *this)
! 245: {
! 246: memwipe(this, sizeof(*this) + (this->public.rounds + 1) * AES_BLOCK_SIZE);
! 247: free_align(this);
! 248: }
! 249:
! 250: /**
! 251: * See header
! 252: */
! 253: aesni_key_t *aesni_key_create(bool encrypt, chunk_t key)
! 254: {
! 255: private_aesni_key_t *this;
! 256: int rounds;
! 257:
! 258: switch (key.len)
! 259: {
! 260: case 16:
! 261: rounds = AES128_ROUNDS;
! 262: break;
! 263: case 24:
! 264: rounds = AES192_ROUNDS;
! 265: break;
! 266: case 32:
! 267: rounds = AES256_ROUNDS;
! 268: break;
! 269: default:
! 270: return NULL;
! 271: }
! 272:
! 273: INIT_EXTRA_ALIGN(this, (rounds + 1) * AES_BLOCK_SIZE, sizeof(__m128i),
! 274: .public = {
! 275: .destroy = _destroy,
! 276: .rounds = rounds,
! 277: },
! 278: );
! 279:
! 280: switch (key.len)
! 281: {
! 282: case 16:
! 283: expand128((__m128i*)key.ptr, this->public.schedule);
! 284: break;
! 285: case 24:
! 286: expand192((__m128i*)key.ptr, this->public.schedule);
! 287: break;
! 288: case 32:
! 289: expand256((__m128i*)key.ptr, this->public.schedule);
! 290: break;
! 291: default:
! 292: break;
! 293: }
! 294:
! 295: if (!encrypt)
! 296: {
! 297: reverse_key(&this->public);
! 298: }
! 299:
! 300: return &this->public;
! 301: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>