Return to aesni_key.c CVS log | Up to [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / src / libstrongswan / plugins / aesni |
1.1 misho 1: /* 2: * Copyright (C) 2015 Martin Willi 3: * Copyright (C) 2015 revosec AG 4: * 5: * This program is free software; you can redistribute it and/or modify it 6: * under the terms of the GNU General Public License as published by the 7: * Free Software Foundation; either version 2 of the License, or (at your 8: * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>. 9: * 10: * This program is distributed in the hope that it will be useful, but 11: * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY 12: * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 13: * for more details. 14: */ 15: 16: #include "aesni_key.h" 17: 18: /** 19: * Rounds used for each AES key size 20: */ 21: #define AES128_ROUNDS 10 22: #define AES192_ROUNDS 12 23: #define AES256_ROUNDS 14 24: 25: typedef struct private_aesni_key_t private_aesni_key_t; 26: 27: /** 28: * Private data of an aesni_key_t object. 29: */ 30: struct private_aesni_key_t { 31: 32: /** 33: * Public aesni_key_t interface. 34: */ 35: aesni_key_t public; 36: }; 37: 38: /** 39: * Invert round encryption keys to get a decryption key schedule 40: */ 41: static void reverse_key(aesni_key_t *this) 42: { 43: __m128i t[this->rounds + 1]; 44: int i; 45: 46: for (i = 0; i <= this->rounds; i++) 47: { 48: t[i] = this->schedule[i]; 49: } 50: this->schedule[this->rounds] = t[0]; 51: for (i = 1; i < this->rounds; i++) 52: { 53: this->schedule[this->rounds - i] = _mm_aesimc_si128(t[i]); 54: } 55: this->schedule[0] = t[this->rounds]; 56: 57: memwipe(t, sizeof(t)); 58: } 59: 60: /** 61: * Assist in creating a 128-bit round key 62: */ 63: static __m128i assist128(__m128i a, __m128i b) 64: { 65: __m128i c; 66: 67: b = _mm_shuffle_epi32(b ,0xff); 68: c = _mm_slli_si128(a, 0x04); 69: a = _mm_xor_si128(a, c); 70: c = _mm_slli_si128(c, 0x04); 71: a = _mm_xor_si128(a, c); 72: c = _mm_slli_si128(c, 0x04); 73: a = _mm_xor_si128(a, c); 74: a = _mm_xor_si128(a, b); 75: 76: return a; 77: } 78: 79: /** 80: * Expand a 128-bit key to encryption round keys 81: */ 82: static void expand128(__m128i *key, __m128i *schedule) 83: { 84: __m128i t; 85: 86: schedule[0] = t = _mm_loadu_si128(key); 87: schedule[1] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x01)); 88: schedule[2] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x02)); 89: schedule[3] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x04)); 90: schedule[4] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x08)); 91: schedule[5] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x10)); 92: schedule[6] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x20)); 93: schedule[7] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x40)); 94: schedule[8] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x80)); 95: schedule[9] = t = assist128(t, _mm_aeskeygenassist_si128(t, 0x1b)); 96: schedule[10] = assist128(t, _mm_aeskeygenassist_si128(t, 0x36)); 97: } 98: 99: /** 100: * Assist in creating a 192-bit round key 101: */ 102: static __m128i assist192(__m128i b, __m128i c, __m128i *a) 103: { 104: __m128i t; 105: 106: b = _mm_shuffle_epi32(b, 0x55); 107: t = _mm_slli_si128(*a, 0x04); 108: *a = _mm_xor_si128(*a, t); 109: t = _mm_slli_si128(t, 0x04); 110: *a = _mm_xor_si128(*a, t); 111: t = _mm_slli_si128(t, 0x04); 112: *a = _mm_xor_si128(*a, t); 113: *a = _mm_xor_si128(*a, b); 114: b = _mm_shuffle_epi32(*a, 0xff); 115: t = _mm_slli_si128(c, 0x04); 116: t = _mm_xor_si128(c, t); 117: t = _mm_xor_si128(t, b); 118: 119: return t; 120: } 121: 122: /** 123: * return a[63:0] | b[63:0] << 64 124: */ 125: static __m128i _mm_shuffle_i00(__m128i a, __m128i b) 126: { 127: return (__m128i)_mm_shuffle_pd((__m128d)a, (__m128d)b, 0); 128: } 129: 130: /** 131: * return a[127:64] >> 64 | b[63:0] << 64 132: */ 133: static __m128i _mm_shuffle_i01(__m128i a, __m128i b) 134: { 135: return (__m128i)_mm_shuffle_pd((__m128d)a, (__m128d)b, 1); 136: } 137: 138: /** 139: * Expand a 192-bit encryption key to round keys 140: */ 141: static void expand192(__m128i *key, __m128i *schedule) 142: { 143: __m128i t1, t2, t3; 144: 145: schedule[0] = t1 = _mm_loadu_si128(key); 146: t2 = t3 = _mm_loadu_si128(key + 1); 147: 148: t2 = assist192(_mm_aeskeygenassist_si128(t2, 0x1), t2, &t1); 149: schedule[1] = _mm_shuffle_i00(t3, t1); 150: schedule[2] = _mm_shuffle_i01(t1, t2); 151: t2 = t3 = assist192(_mm_aeskeygenassist_si128(t2, 0x2), t2, &t1); 152: schedule[3] = t1; 153: 154: t2 = assist192(_mm_aeskeygenassist_si128(t2, 0x4), t2, &t1); 155: schedule[4] = _mm_shuffle_i00(t3, t1); 156: schedule[5] = _mm_shuffle_i01(t1, t2); 157: t2 = t3 = assist192(_mm_aeskeygenassist_si128(t2, 0x8), t2, &t1); 158: schedule[6] = t1; 159: 160: t2 = assist192(_mm_aeskeygenassist_si128 (t2,0x10), t2, &t1); 161: schedule[7] = _mm_shuffle_i00(t3, t1); 162: schedule[8] = _mm_shuffle_i01(t1, t2); 163: t2 = t3 = assist192(_mm_aeskeygenassist_si128 (t2,0x20), t2, &t1); 164: schedule[9] = t1; 165: 166: t2 = assist192(_mm_aeskeygenassist_si128(t2, 0x40), t2, &t1); 167: schedule[10] = _mm_shuffle_i00(t3, t1); 168: schedule[11] = _mm_shuffle_i01(t1, t2); 169: assist192(_mm_aeskeygenassist_si128(t2, 0x80), t2, &t1); 170: schedule[12] = t1; 171: } 172: 173: /** 174: * Assist in creating a 256-bit round key 175: */ 176: static __m128i assist256_1(__m128i a, __m128i b) 177: { 178: __m128i x, y; 179: 180: b = _mm_shuffle_epi32(b, 0xff); 181: y = _mm_slli_si128(a, 0x04); 182: x = _mm_xor_si128(a, y); 183: y = _mm_slli_si128(y, 0x04); 184: x = _mm_xor_si128 (x, y); 185: y = _mm_slli_si128(y, 0x04); 186: x = _mm_xor_si128(x, y); 187: x = _mm_xor_si128(x, b); 188: 189: return x; 190: } 191: 192: /** 193: * Assist in creating a 256-bit round key 194: */ 195: static __m128i assist256_2(__m128i a, __m128i b) 196: { 197: __m128i x, y, z; 198: 199: y = _mm_aeskeygenassist_si128(a, 0x00); 200: z = _mm_shuffle_epi32(y, 0xaa); 201: y = _mm_slli_si128(b, 0x04); 202: x = _mm_xor_si128(b, y); 203: y = _mm_slli_si128(y, 0x04); 204: x = _mm_xor_si128(x, y); 205: y = _mm_slli_si128(y, 0x04); 206: x = _mm_xor_si128(x, y); 207: x = _mm_xor_si128(x, z); 208: 209: return x; 210: } 211: 212: /** 213: * Expand a 256-bit encryption key to round keys 214: */ 215: static void expand256(__m128i *key, __m128i *schedule) 216: { 217: __m128i t1, t2; 218: 219: schedule[0] = t1 = _mm_loadu_si128(key); 220: schedule[1] = t2 = _mm_loadu_si128(key + 1); 221: 222: schedule[2] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x01)); 223: schedule[3] = t2 = assist256_2(t1, t2); 224: 225: schedule[4] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x02)); 226: schedule[5] = t2 = assist256_2(t1, t2); 227: 228: schedule[6] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x04)); 229: schedule[7] = t2 = assist256_2(t1, t2); 230: 231: schedule[8] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x08)); 232: schedule[9] = t2 = assist256_2(t1, t2); 233: 234: schedule[10] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x10)); 235: schedule[11] = t2 = assist256_2(t1, t2); 236: 237: schedule[12] = t1 = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x20)); 238: schedule[13] = t2 = assist256_2(t1, t2); 239: 240: schedule[14] = assist256_1(t1, _mm_aeskeygenassist_si128(t2, 0x40)); 241: } 242: 243: METHOD(aesni_key_t, destroy, void, 244: private_aesni_key_t *this) 245: { 246: memwipe(this, sizeof(*this) + (this->public.rounds + 1) * AES_BLOCK_SIZE); 247: free_align(this); 248: } 249: 250: /** 251: * See header 252: */ 253: aesni_key_t *aesni_key_create(bool encrypt, chunk_t key) 254: { 255: private_aesni_key_t *this; 256: int rounds; 257: 258: switch (key.len) 259: { 260: case 16: 261: rounds = AES128_ROUNDS; 262: break; 263: case 24: 264: rounds = AES192_ROUNDS; 265: break; 266: case 32: 267: rounds = AES256_ROUNDS; 268: break; 269: default: 270: return NULL; 271: } 272: 273: INIT_EXTRA_ALIGN(this, (rounds + 1) * AES_BLOCK_SIZE, sizeof(__m128i), 274: .public = { 275: .destroy = _destroy, 276: .rounds = rounds, 277: }, 278: ); 279: 280: switch (key.len) 281: { 282: case 16: 283: expand128((__m128i*)key.ptr, this->public.schedule); 284: break; 285: case 24: 286: expand192((__m128i*)key.ptr, this->public.schedule); 287: break; 288: case 32: 289: expand256((__m128i*)key.ptr, this->public.schedule); 290: break; 291: default: 292: break; 293: } 294: 295: if (!encrypt) 296: { 297: reverse_key(&this->public); 298: } 299: 300: return &this->public; 301: }