vpaes-armv8.S 43 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235
  1. // This file is generated from a similarly-named Perl script in the BoringSSL
  2. // source tree. Do not edit by hand.
  3. #if !defined(__has_feature)
  4. #define __has_feature(x) 0
  5. #endif
  6. #if __has_feature(memory_sanitizer) && !defined(OPENSSL_NO_ASM)
  7. #define OPENSSL_NO_ASM
  8. #endif
  9. #if !defined(OPENSSL_NO_ASM)
  10. #if defined(__aarch64__)
  11. #if defined(BORINGSSL_PREFIX)
  12. #include <boringssl_prefix_symbols_asm.h>
  13. #endif
  14. #include <openssl/arm_arch.h>
  15. .section .rodata
  16. .type _vpaes_consts,%object
  17. .align 7 // totally strategic alignment
  18. _vpaes_consts:
  19. .Lk_mc_forward: // mc_forward
  20. .quad 0x0407060500030201, 0x0C0F0E0D080B0A09
  21. .quad 0x080B0A0904070605, 0x000302010C0F0E0D
  22. .quad 0x0C0F0E0D080B0A09, 0x0407060500030201
  23. .quad 0x000302010C0F0E0D, 0x080B0A0904070605
  24. .Lk_mc_backward: // mc_backward
  25. .quad 0x0605040702010003, 0x0E0D0C0F0A09080B
  26. .quad 0x020100030E0D0C0F, 0x0A09080B06050407
  27. .quad 0x0E0D0C0F0A09080B, 0x0605040702010003
  28. .quad 0x0A09080B06050407, 0x020100030E0D0C0F
  29. .Lk_sr: // sr
  30. .quad 0x0706050403020100, 0x0F0E0D0C0B0A0908
  31. .quad 0x030E09040F0A0500, 0x0B06010C07020D08
  32. .quad 0x0F060D040B020900, 0x070E050C030A0108
  33. .quad 0x0B0E0104070A0D00, 0x0306090C0F020508
  34. //
  35. // "Hot" constants
  36. //
  37. .Lk_inv: // inv, inva
  38. .quad 0x0E05060F0D080180, 0x040703090A0B0C02
  39. .quad 0x01040A060F0B0780, 0x030D0E0C02050809
  40. .Lk_ipt: // input transform (lo, hi)
  41. .quad 0xC2B2E8985A2A7000, 0xCABAE09052227808
  42. .quad 0x4C01307D317C4D00, 0xCD80B1FCB0FDCC81
  43. .Lk_sbo: // sbou, sbot
  44. .quad 0xD0D26D176FBDC700, 0x15AABF7AC502A878
  45. .quad 0xCFE474A55FBB6A00, 0x8E1E90D1412B35FA
  46. .Lk_sb1: // sb1u, sb1t
  47. .quad 0x3618D415FAE22300, 0x3BF7CCC10D2ED9EF
  48. .quad 0xB19BE18FCB503E00, 0xA5DF7A6E142AF544
  49. .Lk_sb2: // sb2u, sb2t
  50. .quad 0x69EB88400AE12900, 0xC2A163C8AB82234A
  51. .quad 0xE27A93C60B712400, 0x5EB7E955BC982FCD
  52. //
  53. // Decryption stuff
  54. //
  55. .Lk_dipt: // decryption input transform
  56. .quad 0x0F505B040B545F00, 0x154A411E114E451A
  57. .quad 0x86E383E660056500, 0x12771772F491F194
  58. .Lk_dsbo: // decryption sbox final output
  59. .quad 0x1387EA537EF94000, 0xC7AA6DB9D4943E2D
  60. .quad 0x12D7560F93441D00, 0xCA4B8159D8C58E9C
  61. .Lk_dsb9: // decryption sbox output *9*u, *9*t
  62. .quad 0x851C03539A86D600, 0xCAD51F504F994CC9
  63. .quad 0xC03B1789ECD74900, 0x725E2C9EB2FBA565
  64. .Lk_dsbd: // decryption sbox output *D*u, *D*t
  65. .quad 0x7D57CCDFE6B1A200, 0xF56E9B13882A4439
  66. .quad 0x3CE2FAF724C6CB00, 0x2931180D15DEEFD3
  67. .Lk_dsbb: // decryption sbox output *B*u, *B*t
  68. .quad 0xD022649296B44200, 0x602646F6B0F2D404
  69. .quad 0xC19498A6CD596700, 0xF3FF0C3E3255AA6B
  70. .Lk_dsbe: // decryption sbox output *E*u, *E*t
  71. .quad 0x46F2929626D4D000, 0x2242600464B4F6B0
  72. .quad 0x0C55A6CDFFAAC100, 0x9467F36B98593E32
  73. //
  74. // Key schedule constants
  75. //
  76. .Lk_dksd: // decryption key schedule: invskew x*D
  77. .quad 0xFEB91A5DA3E44700, 0x0740E3A45A1DBEF9
  78. .quad 0x41C277F4B5368300, 0x5FDC69EAAB289D1E
  79. .Lk_dksb: // decryption key schedule: invskew x*B
  80. .quad 0x9A4FCA1F8550D500, 0x03D653861CC94C99
  81. .quad 0x115BEDA7B6FC4A00, 0xD993256F7E3482C8
  82. .Lk_dkse: // decryption key schedule: invskew x*E + 0x63
  83. .quad 0xD5031CCA1FC9D600, 0x53859A4C994F5086
  84. .quad 0xA23196054FDC7BE8, 0xCD5EF96A20B31487
  85. .Lk_dks9: // decryption key schedule: invskew x*9
  86. .quad 0xB6116FC87ED9A700, 0x4AED933482255BFC
  87. .quad 0x4576516227143300, 0x8BB89FACE9DAFDCE
  88. .Lk_rcon: // rcon
  89. .quad 0x1F8391B9AF9DEEB6, 0x702A98084D7C7D81
  90. .Lk_opt: // output transform
  91. .quad 0xFF9F4929D6B66000, 0xF7974121DEBE6808
  92. .quad 0x01EDBD5150BCEC00, 0xE10D5DB1B05C0CE0
  93. .Lk_deskew: // deskew tables: inverts the sbox's "skew"
  94. .quad 0x07E4A34047A4E300, 0x1DFEB95A5DBEF91A
  95. .quad 0x5F36B5DC83EA6900, 0x2841C2ABF49D1E77
  96. .byte 86,101,99,116,111,114,32,80,101,114,109,117,116,97,116,105,111,110,32,65,69,83,32,102,111,114,32,65,82,77,118,56,44,32,77,105,107,101,32,72,97,109,98,117,114,103,32,40,83,116,97,110,102,111,114,100,32,85,110,105,118,101,114,115,105,116,121,41,0
  97. .align 2
  98. .size _vpaes_consts,.-_vpaes_consts
  99. .align 6
  100. .text
  101. ##
  102. ## _aes_preheat
  103. ##
  104. ## Fills register %r10 -> .aes_consts (so you can -fPIC)
  105. ## and %xmm9-%xmm15 as specified below.
  106. ##
  107. .type _vpaes_encrypt_preheat,%function
  108. .align 4
  109. _vpaes_encrypt_preheat:
  110. adrp x10, .Lk_inv
  111. add x10, x10, :lo12:.Lk_inv
  112. movi v17.16b, #0x0f
  113. ld1 {v18.2d,v19.2d}, [x10],#32 // .Lk_inv
  114. ld1 {v20.2d,v21.2d,v22.2d,v23.2d}, [x10],#64 // .Lk_ipt, .Lk_sbo
  115. ld1 {v24.2d,v25.2d,v26.2d,v27.2d}, [x10] // .Lk_sb1, .Lk_sb2
  116. ret
  117. .size _vpaes_encrypt_preheat,.-_vpaes_encrypt_preheat
  118. ##
  119. ## _aes_encrypt_core
  120. ##
  121. ## AES-encrypt %xmm0.
  122. ##
  123. ## Inputs:
  124. ## %xmm0 = input
  125. ## %xmm9-%xmm15 as in _vpaes_preheat
  126. ## (%rdx) = scheduled keys
  127. ##
  128. ## Output in %xmm0
  129. ## Clobbers %xmm1-%xmm5, %r9, %r10, %r11, %rax
  130. ## Preserves %xmm6 - %xmm8 so you get some local vectors
  131. ##
  132. ##
  133. .type _vpaes_encrypt_core,%function
  134. .align 4
  135. _vpaes_encrypt_core:
  136. mov x9, x2
  137. ldr w8, [x2,#240] // pull rounds
  138. adrp x11, .Lk_mc_forward+16
  139. add x11, x11, :lo12:.Lk_mc_forward+16
  140. // vmovdqa .Lk_ipt(%rip), %xmm2 # iptlo
  141. ld1 {v16.2d}, [x9], #16 // vmovdqu (%r9), %xmm5 # round0 key
  142. and v1.16b, v7.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  143. ushr v0.16b, v7.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  144. tbl v1.16b, {v20.16b}, v1.16b // vpshufb %xmm1, %xmm2, %xmm1
  145. // vmovdqa .Lk_ipt+16(%rip), %xmm3 # ipthi
  146. tbl v2.16b, {v21.16b}, v0.16b // vpshufb %xmm0, %xmm3, %xmm2
  147. eor v0.16b, v1.16b, v16.16b // vpxor %xmm5, %xmm1, %xmm0
  148. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  149. b .Lenc_entry
  150. .align 4
  151. .Lenc_loop:
  152. // middle of middle round
  153. add x10, x11, #0x40
  154. tbl v4.16b, {v25.16b}, v2.16b // vpshufb %xmm2, %xmm13, %xmm4 # 4 = sb1u
  155. ld1 {v1.2d}, [x11], #16 // vmovdqa -0x40(%r11,%r10), %xmm1 # .Lk_mc_forward[]
  156. tbl v0.16b, {v24.16b}, v3.16b // vpshufb %xmm3, %xmm12, %xmm0 # 0 = sb1t
  157. eor v4.16b, v4.16b, v16.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = sb1u + k
  158. tbl v5.16b, {v27.16b}, v2.16b // vpshufb %xmm2, %xmm15, %xmm5 # 4 = sb2u
  159. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = A
  160. tbl v2.16b, {v26.16b}, v3.16b // vpshufb %xmm3, %xmm14, %xmm2 # 2 = sb2t
  161. ld1 {v4.2d}, [x10] // vmovdqa (%r11,%r10), %xmm4 # .Lk_mc_backward[]
  162. tbl v3.16b, {v0.16b}, v1.16b // vpshufb %xmm1, %xmm0, %xmm3 # 0 = B
  163. eor v2.16b, v2.16b, v5.16b // vpxor %xmm5, %xmm2, %xmm2 # 2 = 2A
  164. tbl v0.16b, {v0.16b}, v4.16b // vpshufb %xmm4, %xmm0, %xmm0 # 3 = D
  165. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 0 = 2A+B
  166. tbl v4.16b, {v3.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm4 # 0 = 2B+C
  167. eor v0.16b, v0.16b, v3.16b // vpxor %xmm3, %xmm0, %xmm0 # 3 = 2A+B+D
  168. and x11, x11, #~(1<<6) // and $0x30, %r11 # ... mod 4
  169. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = 2A+3B+C+D
  170. sub w8, w8, #1 // nr--
  171. .Lenc_entry:
  172. // top of round
  173. and v1.16b, v0.16b, v17.16b // vpand %xmm0, %xmm9, %xmm1 # 0 = k
  174. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  175. tbl v5.16b, {v19.16b}, v1.16b // vpshufb %xmm1, %xmm11, %xmm5 # 2 = a/k
  176. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  177. tbl v3.16b, {v18.16b}, v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  178. tbl v4.16b, {v18.16b}, v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  179. eor v3.16b, v3.16b, v5.16b // vpxor %xmm5, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  180. eor v4.16b, v4.16b, v5.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  181. tbl v2.16b, {v18.16b}, v3.16b // vpshufb %xmm3, %xmm10, %xmm2 # 2 = 1/iak
  182. tbl v3.16b, {v18.16b}, v4.16b // vpshufb %xmm4, %xmm10, %xmm3 # 3 = 1/jak
  183. eor v2.16b, v2.16b, v1.16b // vpxor %xmm1, %xmm2, %xmm2 # 2 = io
  184. eor v3.16b, v3.16b, v0.16b // vpxor %xmm0, %xmm3, %xmm3 # 3 = jo
  185. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm5
  186. cbnz w8, .Lenc_loop
  187. // middle of last round
  188. add x10, x11, #0x80
  189. // vmovdqa -0x60(%r10), %xmm4 # 3 : sbou .Lk_sbo
  190. // vmovdqa -0x50(%r10), %xmm0 # 0 : sbot .Lk_sbo+16
  191. tbl v4.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbou
  192. ld1 {v1.2d}, [x10] // vmovdqa 0x40(%r11,%r10), %xmm1 # .Lk_sr[]
  193. tbl v0.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm0, %xmm0 # 0 = sb1t
  194. eor v4.16b, v4.16b, v16.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = sb1u + k
  195. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = A
  196. tbl v0.16b, {v0.16b}, v1.16b // vpshufb %xmm1, %xmm0, %xmm0
  197. ret
  198. .size _vpaes_encrypt_core,.-_vpaes_encrypt_core
  199. .globl vpaes_encrypt
  200. .hidden vpaes_encrypt
  201. .type vpaes_encrypt,%function
  202. .align 4
  203. vpaes_encrypt:
  204. AARCH64_SIGN_LINK_REGISTER
  205. stp x29,x30,[sp,#-16]!
  206. add x29,sp,#0
  207. ld1 {v7.16b}, [x0]
  208. bl _vpaes_encrypt_preheat
  209. bl _vpaes_encrypt_core
  210. st1 {v0.16b}, [x1]
  211. ldp x29,x30,[sp],#16
  212. AARCH64_VALIDATE_LINK_REGISTER
  213. ret
  214. .size vpaes_encrypt,.-vpaes_encrypt
  215. .type _vpaes_encrypt_2x,%function
  216. .align 4
  217. _vpaes_encrypt_2x:
  218. mov x9, x2
  219. ldr w8, [x2,#240] // pull rounds
  220. adrp x11, .Lk_mc_forward+16
  221. add x11, x11, :lo12:.Lk_mc_forward+16
  222. // vmovdqa .Lk_ipt(%rip), %xmm2 # iptlo
  223. ld1 {v16.2d}, [x9], #16 // vmovdqu (%r9), %xmm5 # round0 key
  224. and v1.16b, v14.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  225. ushr v0.16b, v14.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  226. and v9.16b, v15.16b, v17.16b
  227. ushr v8.16b, v15.16b, #4
  228. tbl v1.16b, {v20.16b}, v1.16b // vpshufb %xmm1, %xmm2, %xmm1
  229. tbl v9.16b, {v20.16b}, v9.16b
  230. // vmovdqa .Lk_ipt+16(%rip), %xmm3 # ipthi
  231. tbl v2.16b, {v21.16b}, v0.16b // vpshufb %xmm0, %xmm3, %xmm2
  232. tbl v10.16b, {v21.16b}, v8.16b
  233. eor v0.16b, v1.16b, v16.16b // vpxor %xmm5, %xmm1, %xmm0
  234. eor v8.16b, v9.16b, v16.16b
  235. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  236. eor v8.16b, v8.16b, v10.16b
  237. b .Lenc_2x_entry
  238. .align 4
  239. .Lenc_2x_loop:
  240. // middle of middle round
  241. add x10, x11, #0x40
  242. tbl v4.16b, {v25.16b}, v2.16b // vpshufb %xmm2, %xmm13, %xmm4 # 4 = sb1u
  243. tbl v12.16b, {v25.16b}, v10.16b
  244. ld1 {v1.2d}, [x11], #16 // vmovdqa -0x40(%r11,%r10), %xmm1 # .Lk_mc_forward[]
  245. tbl v0.16b, {v24.16b}, v3.16b // vpshufb %xmm3, %xmm12, %xmm0 # 0 = sb1t
  246. tbl v8.16b, {v24.16b}, v11.16b
  247. eor v4.16b, v4.16b, v16.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = sb1u + k
  248. eor v12.16b, v12.16b, v16.16b
  249. tbl v5.16b, {v27.16b}, v2.16b // vpshufb %xmm2, %xmm15, %xmm5 # 4 = sb2u
  250. tbl v13.16b, {v27.16b}, v10.16b
  251. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = A
  252. eor v8.16b, v8.16b, v12.16b
  253. tbl v2.16b, {v26.16b}, v3.16b // vpshufb %xmm3, %xmm14, %xmm2 # 2 = sb2t
  254. tbl v10.16b, {v26.16b}, v11.16b
  255. ld1 {v4.2d}, [x10] // vmovdqa (%r11,%r10), %xmm4 # .Lk_mc_backward[]
  256. tbl v3.16b, {v0.16b}, v1.16b // vpshufb %xmm1, %xmm0, %xmm3 # 0 = B
  257. tbl v11.16b, {v8.16b}, v1.16b
  258. eor v2.16b, v2.16b, v5.16b // vpxor %xmm5, %xmm2, %xmm2 # 2 = 2A
  259. eor v10.16b, v10.16b, v13.16b
  260. tbl v0.16b, {v0.16b}, v4.16b // vpshufb %xmm4, %xmm0, %xmm0 # 3 = D
  261. tbl v8.16b, {v8.16b}, v4.16b
  262. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 0 = 2A+B
  263. eor v11.16b, v11.16b, v10.16b
  264. tbl v4.16b, {v3.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm4 # 0 = 2B+C
  265. tbl v12.16b, {v11.16b},v1.16b
  266. eor v0.16b, v0.16b, v3.16b // vpxor %xmm3, %xmm0, %xmm0 # 3 = 2A+B+D
  267. eor v8.16b, v8.16b, v11.16b
  268. and x11, x11, #~(1<<6) // and $0x30, %r11 # ... mod 4
  269. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = 2A+3B+C+D
  270. eor v8.16b, v8.16b, v12.16b
  271. sub w8, w8, #1 // nr--
  272. .Lenc_2x_entry:
  273. // top of round
  274. and v1.16b, v0.16b, v17.16b // vpand %xmm0, %xmm9, %xmm1 # 0 = k
  275. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  276. and v9.16b, v8.16b, v17.16b
  277. ushr v8.16b, v8.16b, #4
  278. tbl v5.16b, {v19.16b},v1.16b // vpshufb %xmm1, %xmm11, %xmm5 # 2 = a/k
  279. tbl v13.16b, {v19.16b},v9.16b
  280. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  281. eor v9.16b, v9.16b, v8.16b
  282. tbl v3.16b, {v18.16b},v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  283. tbl v11.16b, {v18.16b},v8.16b
  284. tbl v4.16b, {v18.16b},v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  285. tbl v12.16b, {v18.16b},v9.16b
  286. eor v3.16b, v3.16b, v5.16b // vpxor %xmm5, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  287. eor v11.16b, v11.16b, v13.16b
  288. eor v4.16b, v4.16b, v5.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  289. eor v12.16b, v12.16b, v13.16b
  290. tbl v2.16b, {v18.16b},v3.16b // vpshufb %xmm3, %xmm10, %xmm2 # 2 = 1/iak
  291. tbl v10.16b, {v18.16b},v11.16b
  292. tbl v3.16b, {v18.16b},v4.16b // vpshufb %xmm4, %xmm10, %xmm3 # 3 = 1/jak
  293. tbl v11.16b, {v18.16b},v12.16b
  294. eor v2.16b, v2.16b, v1.16b // vpxor %xmm1, %xmm2, %xmm2 # 2 = io
  295. eor v10.16b, v10.16b, v9.16b
  296. eor v3.16b, v3.16b, v0.16b // vpxor %xmm0, %xmm3, %xmm3 # 3 = jo
  297. eor v11.16b, v11.16b, v8.16b
  298. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm5
  299. cbnz w8, .Lenc_2x_loop
  300. // middle of last round
  301. add x10, x11, #0x80
  302. // vmovdqa -0x60(%r10), %xmm4 # 3 : sbou .Lk_sbo
  303. // vmovdqa -0x50(%r10), %xmm0 # 0 : sbot .Lk_sbo+16
  304. tbl v4.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbou
  305. tbl v12.16b, {v22.16b}, v10.16b
  306. ld1 {v1.2d}, [x10] // vmovdqa 0x40(%r11,%r10), %xmm1 # .Lk_sr[]
  307. tbl v0.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm0, %xmm0 # 0 = sb1t
  308. tbl v8.16b, {v23.16b}, v11.16b
  309. eor v4.16b, v4.16b, v16.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = sb1u + k
  310. eor v12.16b, v12.16b, v16.16b
  311. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = A
  312. eor v8.16b, v8.16b, v12.16b
  313. tbl v0.16b, {v0.16b},v1.16b // vpshufb %xmm1, %xmm0, %xmm0
  314. tbl v1.16b, {v8.16b},v1.16b
  315. ret
  316. .size _vpaes_encrypt_2x,.-_vpaes_encrypt_2x
  317. .type _vpaes_decrypt_preheat,%function
  318. .align 4
  319. _vpaes_decrypt_preheat:
  320. adrp x10, .Lk_inv
  321. add x10, x10, :lo12:.Lk_inv
  322. movi v17.16b, #0x0f
  323. adrp x11, .Lk_dipt
  324. add x11, x11, :lo12:.Lk_dipt
  325. ld1 {v18.2d,v19.2d}, [x10],#32 // .Lk_inv
  326. ld1 {v20.2d,v21.2d,v22.2d,v23.2d}, [x11],#64 // .Lk_dipt, .Lk_dsbo
  327. ld1 {v24.2d,v25.2d,v26.2d,v27.2d}, [x11],#64 // .Lk_dsb9, .Lk_dsbd
  328. ld1 {v28.2d,v29.2d,v30.2d,v31.2d}, [x11] // .Lk_dsbb, .Lk_dsbe
  329. ret
  330. .size _vpaes_decrypt_preheat,.-_vpaes_decrypt_preheat
  331. ##
  332. ## Decryption core
  333. ##
  334. ## Same API as encryption core.
  335. ##
  336. .type _vpaes_decrypt_core,%function
  337. .align 4
  338. _vpaes_decrypt_core:
  339. mov x9, x2
  340. ldr w8, [x2,#240] // pull rounds
  341. // vmovdqa .Lk_dipt(%rip), %xmm2 # iptlo
  342. lsl x11, x8, #4 // mov %rax, %r11; shl $4, %r11
  343. eor x11, x11, #0x30 // xor $0x30, %r11
  344. adrp x10, .Lk_sr
  345. add x10, x10, :lo12:.Lk_sr
  346. and x11, x11, #0x30 // and $0x30, %r11
  347. add x11, x11, x10
  348. adrp x10, .Lk_mc_forward+48
  349. add x10, x10, :lo12:.Lk_mc_forward+48
  350. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm4 # round0 key
  351. and v1.16b, v7.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  352. ushr v0.16b, v7.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  353. tbl v2.16b, {v20.16b}, v1.16b // vpshufb %xmm1, %xmm2, %xmm2
  354. ld1 {v5.2d}, [x10] // vmovdqa .Lk_mc_forward+48(%rip), %xmm5
  355. // vmovdqa .Lk_dipt+16(%rip), %xmm1 # ipthi
  356. tbl v0.16b, {v21.16b}, v0.16b // vpshufb %xmm0, %xmm1, %xmm0
  357. eor v2.16b, v2.16b, v16.16b // vpxor %xmm4, %xmm2, %xmm2
  358. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  359. b .Ldec_entry
  360. .align 4
  361. .Ldec_loop:
  362. //
  363. // Inverse mix columns
  364. //
  365. // vmovdqa -0x20(%r10),%xmm4 # 4 : sb9u
  366. // vmovdqa -0x10(%r10),%xmm1 # 0 : sb9t
  367. tbl v4.16b, {v24.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sb9u
  368. tbl v1.16b, {v25.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sb9t
  369. eor v0.16b, v4.16b, v16.16b // vpxor %xmm4, %xmm0, %xmm0
  370. // vmovdqa 0x00(%r10),%xmm4 # 4 : sbdu
  371. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  372. // vmovdqa 0x10(%r10),%xmm1 # 0 : sbdt
  373. tbl v4.16b, {v26.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbdu
  374. tbl v0.16b, {v0.16b}, v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  375. tbl v1.16b, {v27.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbdt
  376. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  377. // vmovdqa 0x20(%r10), %xmm4 # 4 : sbbu
  378. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  379. // vmovdqa 0x30(%r10), %xmm1 # 0 : sbbt
  380. tbl v4.16b, {v28.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbbu
  381. tbl v0.16b, {v0.16b}, v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  382. tbl v1.16b, {v29.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbbt
  383. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  384. // vmovdqa 0x40(%r10), %xmm4 # 4 : sbeu
  385. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  386. // vmovdqa 0x50(%r10), %xmm1 # 0 : sbet
  387. tbl v4.16b, {v30.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbeu
  388. tbl v0.16b, {v0.16b}, v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  389. tbl v1.16b, {v31.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbet
  390. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  391. ext v5.16b, v5.16b, v5.16b, #12 // vpalignr $12, %xmm5, %xmm5, %xmm5
  392. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  393. sub w8, w8, #1 // sub $1,%rax # nr--
  394. .Ldec_entry:
  395. // top of round
  396. and v1.16b, v0.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1 # 0 = k
  397. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  398. tbl v2.16b, {v19.16b}, v1.16b // vpshufb %xmm1, %xmm11, %xmm2 # 2 = a/k
  399. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  400. tbl v3.16b, {v18.16b}, v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  401. tbl v4.16b, {v18.16b}, v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  402. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  403. eor v4.16b, v4.16b, v2.16b // vpxor %xmm2, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  404. tbl v2.16b, {v18.16b}, v3.16b // vpshufb %xmm3, %xmm10, %xmm2 # 2 = 1/iak
  405. tbl v3.16b, {v18.16b}, v4.16b // vpshufb %xmm4, %xmm10, %xmm3 # 3 = 1/jak
  406. eor v2.16b, v2.16b, v1.16b // vpxor %xmm1, %xmm2, %xmm2 # 2 = io
  407. eor v3.16b, v3.16b, v0.16b // vpxor %xmm0, %xmm3, %xmm3 # 3 = jo
  408. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm0
  409. cbnz w8, .Ldec_loop
  410. // middle of last round
  411. // vmovdqa 0x60(%r10), %xmm4 # 3 : sbou
  412. tbl v4.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbou
  413. // vmovdqa 0x70(%r10), %xmm1 # 0 : sbot
  414. ld1 {v2.2d}, [x11] // vmovdqa -0x160(%r11), %xmm2 # .Lk_sr-.Lk_dsbd=-0x160
  415. tbl v1.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sb1t
  416. eor v4.16b, v4.16b, v16.16b // vpxor %xmm0, %xmm4, %xmm4 # 4 = sb1u + k
  417. eor v0.16b, v1.16b, v4.16b // vpxor %xmm4, %xmm1, %xmm0 # 0 = A
  418. tbl v0.16b, {v0.16b}, v2.16b // vpshufb %xmm2, %xmm0, %xmm0
  419. ret
  420. .size _vpaes_decrypt_core,.-_vpaes_decrypt_core
  421. .globl vpaes_decrypt
  422. .hidden vpaes_decrypt
  423. .type vpaes_decrypt,%function
  424. .align 4
  425. vpaes_decrypt:
  426. AARCH64_SIGN_LINK_REGISTER
  427. stp x29,x30,[sp,#-16]!
  428. add x29,sp,#0
  429. ld1 {v7.16b}, [x0]
  430. bl _vpaes_decrypt_preheat
  431. bl _vpaes_decrypt_core
  432. st1 {v0.16b}, [x1]
  433. ldp x29,x30,[sp],#16
  434. AARCH64_VALIDATE_LINK_REGISTER
  435. ret
  436. .size vpaes_decrypt,.-vpaes_decrypt
  437. // v14-v15 input, v0-v1 output
  438. .type _vpaes_decrypt_2x,%function
  439. .align 4
  440. _vpaes_decrypt_2x:
  441. mov x9, x2
  442. ldr w8, [x2,#240] // pull rounds
  443. // vmovdqa .Lk_dipt(%rip), %xmm2 # iptlo
  444. lsl x11, x8, #4 // mov %rax, %r11; shl $4, %r11
  445. eor x11, x11, #0x30 // xor $0x30, %r11
  446. adrp x10, .Lk_sr
  447. add x10, x10, :lo12:.Lk_sr
  448. and x11, x11, #0x30 // and $0x30, %r11
  449. add x11, x11, x10
  450. adrp x10, .Lk_mc_forward+48
  451. add x10, x10, :lo12:.Lk_mc_forward+48
  452. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm4 # round0 key
  453. and v1.16b, v14.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  454. ushr v0.16b, v14.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  455. and v9.16b, v15.16b, v17.16b
  456. ushr v8.16b, v15.16b, #4
  457. tbl v2.16b, {v20.16b},v1.16b // vpshufb %xmm1, %xmm2, %xmm2
  458. tbl v10.16b, {v20.16b},v9.16b
  459. ld1 {v5.2d}, [x10] // vmovdqa .Lk_mc_forward+48(%rip), %xmm5
  460. // vmovdqa .Lk_dipt+16(%rip), %xmm1 # ipthi
  461. tbl v0.16b, {v21.16b},v0.16b // vpshufb %xmm0, %xmm1, %xmm0
  462. tbl v8.16b, {v21.16b},v8.16b
  463. eor v2.16b, v2.16b, v16.16b // vpxor %xmm4, %xmm2, %xmm2
  464. eor v10.16b, v10.16b, v16.16b
  465. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  466. eor v8.16b, v8.16b, v10.16b
  467. b .Ldec_2x_entry
  468. .align 4
  469. .Ldec_2x_loop:
  470. //
  471. // Inverse mix columns
  472. //
  473. // vmovdqa -0x20(%r10),%xmm4 # 4 : sb9u
  474. // vmovdqa -0x10(%r10),%xmm1 # 0 : sb9t
  475. tbl v4.16b, {v24.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sb9u
  476. tbl v12.16b, {v24.16b}, v10.16b
  477. tbl v1.16b, {v25.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sb9t
  478. tbl v9.16b, {v25.16b}, v11.16b
  479. eor v0.16b, v4.16b, v16.16b // vpxor %xmm4, %xmm0, %xmm0
  480. eor v8.16b, v12.16b, v16.16b
  481. // vmovdqa 0x00(%r10),%xmm4 # 4 : sbdu
  482. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  483. eor v8.16b, v8.16b, v9.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  484. // vmovdqa 0x10(%r10),%xmm1 # 0 : sbdt
  485. tbl v4.16b, {v26.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbdu
  486. tbl v12.16b, {v26.16b}, v10.16b
  487. tbl v0.16b, {v0.16b},v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  488. tbl v8.16b, {v8.16b},v5.16b
  489. tbl v1.16b, {v27.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbdt
  490. tbl v9.16b, {v27.16b}, v11.16b
  491. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  492. eor v8.16b, v8.16b, v12.16b
  493. // vmovdqa 0x20(%r10), %xmm4 # 4 : sbbu
  494. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  495. eor v8.16b, v8.16b, v9.16b
  496. // vmovdqa 0x30(%r10), %xmm1 # 0 : sbbt
  497. tbl v4.16b, {v28.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbbu
  498. tbl v12.16b, {v28.16b}, v10.16b
  499. tbl v0.16b, {v0.16b},v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  500. tbl v8.16b, {v8.16b},v5.16b
  501. tbl v1.16b, {v29.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbbt
  502. tbl v9.16b, {v29.16b}, v11.16b
  503. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  504. eor v8.16b, v8.16b, v12.16b
  505. // vmovdqa 0x40(%r10), %xmm4 # 4 : sbeu
  506. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  507. eor v8.16b, v8.16b, v9.16b
  508. // vmovdqa 0x50(%r10), %xmm1 # 0 : sbet
  509. tbl v4.16b, {v30.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbeu
  510. tbl v12.16b, {v30.16b}, v10.16b
  511. tbl v0.16b, {v0.16b},v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  512. tbl v8.16b, {v8.16b},v5.16b
  513. tbl v1.16b, {v31.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbet
  514. tbl v9.16b, {v31.16b}, v11.16b
  515. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  516. eor v8.16b, v8.16b, v12.16b
  517. ext v5.16b, v5.16b, v5.16b, #12 // vpalignr $12, %xmm5, %xmm5, %xmm5
  518. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  519. eor v8.16b, v8.16b, v9.16b
  520. sub w8, w8, #1 // sub $1,%rax # nr--
  521. .Ldec_2x_entry:
  522. // top of round
  523. and v1.16b, v0.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1 # 0 = k
  524. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  525. and v9.16b, v8.16b, v17.16b
  526. ushr v8.16b, v8.16b, #4
  527. tbl v2.16b, {v19.16b},v1.16b // vpshufb %xmm1, %xmm11, %xmm2 # 2 = a/k
  528. tbl v10.16b, {v19.16b},v9.16b
  529. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  530. eor v9.16b, v9.16b, v8.16b
  531. tbl v3.16b, {v18.16b},v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  532. tbl v11.16b, {v18.16b},v8.16b
  533. tbl v4.16b, {v18.16b},v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  534. tbl v12.16b, {v18.16b},v9.16b
  535. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  536. eor v11.16b, v11.16b, v10.16b
  537. eor v4.16b, v4.16b, v2.16b // vpxor %xmm2, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  538. eor v12.16b, v12.16b, v10.16b
  539. tbl v2.16b, {v18.16b},v3.16b // vpshufb %xmm3, %xmm10, %xmm2 # 2 = 1/iak
  540. tbl v10.16b, {v18.16b},v11.16b
  541. tbl v3.16b, {v18.16b},v4.16b // vpshufb %xmm4, %xmm10, %xmm3 # 3 = 1/jak
  542. tbl v11.16b, {v18.16b},v12.16b
  543. eor v2.16b, v2.16b, v1.16b // vpxor %xmm1, %xmm2, %xmm2 # 2 = io
  544. eor v10.16b, v10.16b, v9.16b
  545. eor v3.16b, v3.16b, v0.16b // vpxor %xmm0, %xmm3, %xmm3 # 3 = jo
  546. eor v11.16b, v11.16b, v8.16b
  547. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm0
  548. cbnz w8, .Ldec_2x_loop
  549. // middle of last round
  550. // vmovdqa 0x60(%r10), %xmm4 # 3 : sbou
  551. tbl v4.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbou
  552. tbl v12.16b, {v22.16b}, v10.16b
  553. // vmovdqa 0x70(%r10), %xmm1 # 0 : sbot
  554. tbl v1.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sb1t
  555. tbl v9.16b, {v23.16b}, v11.16b
  556. ld1 {v2.2d}, [x11] // vmovdqa -0x160(%r11), %xmm2 # .Lk_sr-.Lk_dsbd=-0x160
  557. eor v4.16b, v4.16b, v16.16b // vpxor %xmm0, %xmm4, %xmm4 # 4 = sb1u + k
  558. eor v12.16b, v12.16b, v16.16b
  559. eor v0.16b, v1.16b, v4.16b // vpxor %xmm4, %xmm1, %xmm0 # 0 = A
  560. eor v8.16b, v9.16b, v12.16b
  561. tbl v0.16b, {v0.16b},v2.16b // vpshufb %xmm2, %xmm0, %xmm0
  562. tbl v1.16b, {v8.16b},v2.16b
  563. ret
  564. .size _vpaes_decrypt_2x,.-_vpaes_decrypt_2x
  565. ########################################################
  566. ## ##
  567. ## AES key schedule ##
  568. ## ##
  569. ########################################################
  570. .type _vpaes_key_preheat,%function
  571. .align 4
  572. _vpaes_key_preheat:
  573. adrp x10, .Lk_inv
  574. add x10, x10, :lo12:.Lk_inv
  575. movi v16.16b, #0x5b // .Lk_s63
  576. adrp x11, .Lk_sb1
  577. add x11, x11, :lo12:.Lk_sb1
  578. movi v17.16b, #0x0f // .Lk_s0F
  579. ld1 {v18.2d,v19.2d,v20.2d,v21.2d}, [x10] // .Lk_inv, .Lk_ipt
  580. adrp x10, .Lk_dksd
  581. add x10, x10, :lo12:.Lk_dksd
  582. ld1 {v22.2d,v23.2d}, [x11] // .Lk_sb1
  583. adrp x11, .Lk_mc_forward
  584. add x11, x11, :lo12:.Lk_mc_forward
  585. ld1 {v24.2d,v25.2d,v26.2d,v27.2d}, [x10],#64 // .Lk_dksd, .Lk_dksb
  586. ld1 {v28.2d,v29.2d,v30.2d,v31.2d}, [x10],#64 // .Lk_dkse, .Lk_dks9
  587. ld1 {v8.2d}, [x10] // .Lk_rcon
  588. ld1 {v9.2d}, [x11] // .Lk_mc_forward[0]
  589. ret
  590. .size _vpaes_key_preheat,.-_vpaes_key_preheat
  591. .type _vpaes_schedule_core,%function
  592. .align 4
  593. _vpaes_schedule_core:
  594. AARCH64_SIGN_LINK_REGISTER
  595. stp x29, x30, [sp,#-16]!
  596. add x29,sp,#0
  597. bl _vpaes_key_preheat // load the tables
  598. ld1 {v0.16b}, [x0],#16 // vmovdqu (%rdi), %xmm0 # load key (unaligned)
  599. // input transform
  600. mov v3.16b, v0.16b // vmovdqa %xmm0, %xmm3
  601. bl _vpaes_schedule_transform
  602. mov v7.16b, v0.16b // vmovdqa %xmm0, %xmm7
  603. adrp x10, .Lk_sr // lea .Lk_sr(%rip),%r10
  604. add x10, x10, :lo12:.Lk_sr
  605. add x8, x8, x10
  606. cbnz w3, .Lschedule_am_decrypting
  607. // encrypting, output zeroth round key after transform
  608. st1 {v0.2d}, [x2] // vmovdqu %xmm0, (%rdx)
  609. b .Lschedule_go
  610. .Lschedule_am_decrypting:
  611. // decrypting, output zeroth round key after shiftrows
  612. ld1 {v1.2d}, [x8] // vmovdqa (%r8,%r10), %xmm1
  613. tbl v3.16b, {v3.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  614. st1 {v3.2d}, [x2] // vmovdqu %xmm3, (%rdx)
  615. eor x8, x8, #0x30 // xor $0x30, %r8
  616. .Lschedule_go:
  617. cmp w1, #192 // cmp $192, %esi
  618. b.hi .Lschedule_256
  619. b.eq .Lschedule_192
  620. // 128: fall though
  621. ##
  622. ## .schedule_128
  623. ##
  624. ## 128-bit specific part of key schedule.
  625. ##
  626. ## This schedule is really simple, because all its parts
  627. ## are accomplished by the subroutines.
  628. ##
  629. .Lschedule_128:
  630. mov x0, #10 // mov $10, %esi
  631. .Loop_schedule_128:
  632. sub x0, x0, #1 // dec %esi
  633. bl _vpaes_schedule_round
  634. cbz x0, .Lschedule_mangle_last
  635. bl _vpaes_schedule_mangle // write output
  636. b .Loop_schedule_128
  637. ##
  638. ## .aes_schedule_192
  639. ##
  640. ## 192-bit specific part of key schedule.
  641. ##
  642. ## The main body of this schedule is the same as the 128-bit
  643. ## schedule, but with more smearing. The long, high side is
  644. ## stored in %xmm7 as before, and the short, low side is in
  645. ## the high bits of %xmm6.
  646. ##
  647. ## This schedule is somewhat nastier, however, because each
  648. ## round produces 192 bits of key material, or 1.5 round keys.
  649. ## Therefore, on each cycle we do 2 rounds and produce 3 round
  650. ## keys.
  651. ##
  652. .align 4
  653. .Lschedule_192:
  654. sub x0, x0, #8
  655. ld1 {v0.16b}, [x0] // vmovdqu 8(%rdi),%xmm0 # load key part 2 (very unaligned)
  656. bl _vpaes_schedule_transform // input transform
  657. mov v6.16b, v0.16b // vmovdqa %xmm0, %xmm6 # save short part
  658. eor v4.16b, v4.16b, v4.16b // vpxor %xmm4, %xmm4, %xmm4 # clear 4
  659. ins v6.d[0], v4.d[0] // vmovhlps %xmm4, %xmm6, %xmm6 # clobber low side with zeros
  660. mov x0, #4 // mov $4, %esi
  661. .Loop_schedule_192:
  662. sub x0, x0, #1 // dec %esi
  663. bl _vpaes_schedule_round
  664. ext v0.16b, v6.16b, v0.16b, #8 // vpalignr $8,%xmm6,%xmm0,%xmm0
  665. bl _vpaes_schedule_mangle // save key n
  666. bl _vpaes_schedule_192_smear
  667. bl _vpaes_schedule_mangle // save key n+1
  668. bl _vpaes_schedule_round
  669. cbz x0, .Lschedule_mangle_last
  670. bl _vpaes_schedule_mangle // save key n+2
  671. bl _vpaes_schedule_192_smear
  672. b .Loop_schedule_192
  673. ##
  674. ## .aes_schedule_256
  675. ##
  676. ## 256-bit specific part of key schedule.
  677. ##
  678. ## The structure here is very similar to the 128-bit
  679. ## schedule, but with an additional "low side" in
  680. ## %xmm6. The low side's rounds are the same as the
  681. ## high side's, except no rcon and no rotation.
  682. ##
  683. .align 4
  684. .Lschedule_256:
  685. ld1 {v0.16b}, [x0] // vmovdqu 16(%rdi),%xmm0 # load key part 2 (unaligned)
  686. bl _vpaes_schedule_transform // input transform
  687. mov x0, #7 // mov $7, %esi
  688. .Loop_schedule_256:
  689. sub x0, x0, #1 // dec %esi
  690. bl _vpaes_schedule_mangle // output low result
  691. mov v6.16b, v0.16b // vmovdqa %xmm0, %xmm6 # save cur_lo in xmm6
  692. // high round
  693. bl _vpaes_schedule_round
  694. cbz x0, .Lschedule_mangle_last
  695. bl _vpaes_schedule_mangle
  696. // low round. swap xmm7 and xmm6
  697. dup v0.4s, v0.s[3] // vpshufd $0xFF, %xmm0, %xmm0
  698. movi v4.16b, #0
  699. mov v5.16b, v7.16b // vmovdqa %xmm7, %xmm5
  700. mov v7.16b, v6.16b // vmovdqa %xmm6, %xmm7
  701. bl _vpaes_schedule_low_round
  702. mov v7.16b, v5.16b // vmovdqa %xmm5, %xmm7
  703. b .Loop_schedule_256
  704. ##
  705. ## .aes_schedule_mangle_last
  706. ##
  707. ## Mangler for last round of key schedule
  708. ## Mangles %xmm0
  709. ## when encrypting, outputs out(%xmm0) ^ 63
  710. ## when decrypting, outputs unskew(%xmm0)
  711. ##
  712. ## Always called right before return... jumps to cleanup and exits
  713. ##
  714. .align 4
  715. .Lschedule_mangle_last:
  716. // schedule last round key from xmm0
  717. adrp x11, .Lk_deskew // lea .Lk_deskew(%rip),%r11 # prepare to deskew
  718. add x11, x11, :lo12:.Lk_deskew
  719. cbnz w3, .Lschedule_mangle_last_dec
  720. // encrypting
  721. ld1 {v1.2d}, [x8] // vmovdqa (%r8,%r10),%xmm1
  722. adrp x11, .Lk_opt // lea .Lk_opt(%rip), %r11 # prepare to output transform
  723. add x11, x11, :lo12:.Lk_opt
  724. add x2, x2, #32 // add $32, %rdx
  725. tbl v0.16b, {v0.16b}, v1.16b // vpshufb %xmm1, %xmm0, %xmm0 # output permute
  726. .Lschedule_mangle_last_dec:
  727. ld1 {v20.2d,v21.2d}, [x11] // reload constants
  728. sub x2, x2, #16 // add $-16, %rdx
  729. eor v0.16b, v0.16b, v16.16b // vpxor .Lk_s63(%rip), %xmm0, %xmm0
  730. bl _vpaes_schedule_transform // output transform
  731. st1 {v0.2d}, [x2] // vmovdqu %xmm0, (%rdx) # save last key
  732. // cleanup
  733. eor v0.16b, v0.16b, v0.16b // vpxor %xmm0, %xmm0, %xmm0
  734. eor v1.16b, v1.16b, v1.16b // vpxor %xmm1, %xmm1, %xmm1
  735. eor v2.16b, v2.16b, v2.16b // vpxor %xmm2, %xmm2, %xmm2
  736. eor v3.16b, v3.16b, v3.16b // vpxor %xmm3, %xmm3, %xmm3
  737. eor v4.16b, v4.16b, v4.16b // vpxor %xmm4, %xmm4, %xmm4
  738. eor v5.16b, v5.16b, v5.16b // vpxor %xmm5, %xmm5, %xmm5
  739. eor v6.16b, v6.16b, v6.16b // vpxor %xmm6, %xmm6, %xmm6
  740. eor v7.16b, v7.16b, v7.16b // vpxor %xmm7, %xmm7, %xmm7
  741. ldp x29, x30, [sp],#16
  742. AARCH64_VALIDATE_LINK_REGISTER
  743. ret
  744. .size _vpaes_schedule_core,.-_vpaes_schedule_core
  745. ##
  746. ## .aes_schedule_192_smear
  747. ##
  748. ## Smear the short, low side in the 192-bit key schedule.
  749. ##
  750. ## Inputs:
  751. ## %xmm7: high side, b a x y
  752. ## %xmm6: low side, d c 0 0
  753. ## %xmm13: 0
  754. ##
  755. ## Outputs:
  756. ## %xmm6: b+c+d b+c 0 0
  757. ## %xmm0: b+c+d b+c b a
  758. ##
  759. .type _vpaes_schedule_192_smear,%function
  760. .align 4
  761. _vpaes_schedule_192_smear:
  762. movi v1.16b, #0
  763. dup v0.4s, v7.s[3]
  764. ins v1.s[3], v6.s[2] // vpshufd $0x80, %xmm6, %xmm1 # d c 0 0 -> c 0 0 0
  765. ins v0.s[0], v7.s[2] // vpshufd $0xFE, %xmm7, %xmm0 # b a _ _ -> b b b a
  766. eor v6.16b, v6.16b, v1.16b // vpxor %xmm1, %xmm6, %xmm6 # -> c+d c 0 0
  767. eor v1.16b, v1.16b, v1.16b // vpxor %xmm1, %xmm1, %xmm1
  768. eor v6.16b, v6.16b, v0.16b // vpxor %xmm0, %xmm6, %xmm6 # -> b+c+d b+c b a
  769. mov v0.16b, v6.16b // vmovdqa %xmm6, %xmm0
  770. ins v6.d[0], v1.d[0] // vmovhlps %xmm1, %xmm6, %xmm6 # clobber low side with zeros
  771. ret
  772. .size _vpaes_schedule_192_smear,.-_vpaes_schedule_192_smear
  773. ##
  774. ## .aes_schedule_round
  775. ##
  776. ## Runs one main round of the key schedule on %xmm0, %xmm7
  777. ##
  778. ## Specifically, runs subbytes on the high dword of %xmm0
  779. ## then rotates it by one byte and xors into the low dword of
  780. ## %xmm7.
  781. ##
  782. ## Adds rcon from low byte of %xmm8, then rotates %xmm8 for
  783. ## next rcon.
  784. ##
  785. ## Smears the dwords of %xmm7 by xoring the low into the
  786. ## second low, result into third, result into highest.
  787. ##
  788. ## Returns results in %xmm7 = %xmm0.
  789. ## Clobbers %xmm1-%xmm4, %r11.
  790. ##
  791. .type _vpaes_schedule_round,%function
  792. .align 4
  793. _vpaes_schedule_round:
  794. // extract rcon from xmm8
  795. movi v4.16b, #0 // vpxor %xmm4, %xmm4, %xmm4
  796. ext v1.16b, v8.16b, v4.16b, #15 // vpalignr $15, %xmm8, %xmm4, %xmm1
  797. ext v8.16b, v8.16b, v8.16b, #15 // vpalignr $15, %xmm8, %xmm8, %xmm8
  798. eor v7.16b, v7.16b, v1.16b // vpxor %xmm1, %xmm7, %xmm7
  799. // rotate
  800. dup v0.4s, v0.s[3] // vpshufd $0xFF, %xmm0, %xmm0
  801. ext v0.16b, v0.16b, v0.16b, #1 // vpalignr $1, %xmm0, %xmm0, %xmm0
  802. // fall through...
  803. // low round: same as high round, but no rotation and no rcon.
  804. _vpaes_schedule_low_round:
  805. // smear xmm7
  806. ext v1.16b, v4.16b, v7.16b, #12 // vpslldq $4, %xmm7, %xmm1
  807. eor v7.16b, v7.16b, v1.16b // vpxor %xmm1, %xmm7, %xmm7
  808. ext v4.16b, v4.16b, v7.16b, #8 // vpslldq $8, %xmm7, %xmm4
  809. // subbytes
  810. and v1.16b, v0.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1 # 0 = k
  811. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  812. eor v7.16b, v7.16b, v4.16b // vpxor %xmm4, %xmm7, %xmm7
  813. tbl v2.16b, {v19.16b}, v1.16b // vpshufb %xmm1, %xmm11, %xmm2 # 2 = a/k
  814. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  815. tbl v3.16b, {v18.16b}, v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  816. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  817. tbl v4.16b, {v18.16b}, v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  818. eor v7.16b, v7.16b, v16.16b // vpxor .Lk_s63(%rip), %xmm7, %xmm7
  819. tbl v3.16b, {v18.16b}, v3.16b // vpshufb %xmm3, %xmm10, %xmm3 # 2 = 1/iak
  820. eor v4.16b, v4.16b, v2.16b // vpxor %xmm2, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  821. tbl v2.16b, {v18.16b}, v4.16b // vpshufb %xmm4, %xmm10, %xmm2 # 3 = 1/jak
  822. eor v3.16b, v3.16b, v1.16b // vpxor %xmm1, %xmm3, %xmm3 # 2 = io
  823. eor v2.16b, v2.16b, v0.16b // vpxor %xmm0, %xmm2, %xmm2 # 3 = jo
  824. tbl v4.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm13, %xmm4 # 4 = sbou
  825. tbl v1.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm12, %xmm1 # 0 = sb1t
  826. eor v1.16b, v1.16b, v4.16b // vpxor %xmm4, %xmm1, %xmm1 # 0 = sbox output
  827. // add in smeared stuff
  828. eor v0.16b, v1.16b, v7.16b // vpxor %xmm7, %xmm1, %xmm0
  829. eor v7.16b, v1.16b, v7.16b // vmovdqa %xmm0, %xmm7
  830. ret
  831. .size _vpaes_schedule_round,.-_vpaes_schedule_round
  832. ##
  833. ## .aes_schedule_transform
  834. ##
  835. ## Linear-transform %xmm0 according to tables at (%r11)
  836. ##
  837. ## Requires that %xmm9 = 0x0F0F... as in preheat
  838. ## Output in %xmm0
  839. ## Clobbers %xmm1, %xmm2
  840. ##
  841. .type _vpaes_schedule_transform,%function
  842. .align 4
  843. _vpaes_schedule_transform:
  844. and v1.16b, v0.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  845. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  846. // vmovdqa (%r11), %xmm2 # lo
  847. tbl v2.16b, {v20.16b}, v1.16b // vpshufb %xmm1, %xmm2, %xmm2
  848. // vmovdqa 16(%r11), %xmm1 # hi
  849. tbl v0.16b, {v21.16b}, v0.16b // vpshufb %xmm0, %xmm1, %xmm0
  850. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  851. ret
  852. .size _vpaes_schedule_transform,.-_vpaes_schedule_transform
  853. ##
  854. ## .aes_schedule_mangle
  855. ##
  856. ## Mangle xmm0 from (basis-transformed) standard version
  857. ## to our version.
  858. ##
  859. ## On encrypt,
  860. ## xor with 0x63
  861. ## multiply by circulant 0,1,1,1
  862. ## apply shiftrows transform
  863. ##
  864. ## On decrypt,
  865. ## xor with 0x63
  866. ## multiply by "inverse mixcolumns" circulant E,B,D,9
  867. ## deskew
  868. ## apply shiftrows transform
  869. ##
  870. ##
  871. ## Writes out to (%rdx), and increments or decrements it
  872. ## Keeps track of round number mod 4 in %r8
  873. ## Preserves xmm0
  874. ## Clobbers xmm1-xmm5
  875. ##
  876. .type _vpaes_schedule_mangle,%function
  877. .align 4
  878. _vpaes_schedule_mangle:
  879. mov v4.16b, v0.16b // vmovdqa %xmm0, %xmm4 # save xmm0 for later
  880. // vmovdqa .Lk_mc_forward(%rip),%xmm5
  881. cbnz w3, .Lschedule_mangle_dec
  882. // encrypting
  883. eor v4.16b, v0.16b, v16.16b // vpxor .Lk_s63(%rip), %xmm0, %xmm4
  884. add x2, x2, #16 // add $16, %rdx
  885. tbl v4.16b, {v4.16b}, v9.16b // vpshufb %xmm5, %xmm4, %xmm4
  886. tbl v1.16b, {v4.16b}, v9.16b // vpshufb %xmm5, %xmm4, %xmm1
  887. tbl v3.16b, {v1.16b}, v9.16b // vpshufb %xmm5, %xmm1, %xmm3
  888. eor v4.16b, v4.16b, v1.16b // vpxor %xmm1, %xmm4, %xmm4
  889. ld1 {v1.2d}, [x8] // vmovdqa (%r8,%r10), %xmm1
  890. eor v3.16b, v3.16b, v4.16b // vpxor %xmm4, %xmm3, %xmm3
  891. b .Lschedule_mangle_both
  892. .align 4
  893. .Lschedule_mangle_dec:
  894. // inverse mix columns
  895. // lea .Lk_dksd(%rip),%r11
  896. ushr v1.16b, v4.16b, #4 // vpsrlb $4, %xmm4, %xmm1 # 1 = hi
  897. and v4.16b, v4.16b, v17.16b // vpand %xmm9, %xmm4, %xmm4 # 4 = lo
  898. // vmovdqa 0x00(%r11), %xmm2
  899. tbl v2.16b, {v24.16b}, v4.16b // vpshufb %xmm4, %xmm2, %xmm2
  900. // vmovdqa 0x10(%r11), %xmm3
  901. tbl v3.16b, {v25.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  902. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3
  903. tbl v3.16b, {v3.16b}, v9.16b // vpshufb %xmm5, %xmm3, %xmm3
  904. // vmovdqa 0x20(%r11), %xmm2
  905. tbl v2.16b, {v26.16b}, v4.16b // vpshufb %xmm4, %xmm2, %xmm2
  906. eor v2.16b, v2.16b, v3.16b // vpxor %xmm3, %xmm2, %xmm2
  907. // vmovdqa 0x30(%r11), %xmm3
  908. tbl v3.16b, {v27.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  909. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3
  910. tbl v3.16b, {v3.16b}, v9.16b // vpshufb %xmm5, %xmm3, %xmm3
  911. // vmovdqa 0x40(%r11), %xmm2
  912. tbl v2.16b, {v28.16b}, v4.16b // vpshufb %xmm4, %xmm2, %xmm2
  913. eor v2.16b, v2.16b, v3.16b // vpxor %xmm3, %xmm2, %xmm2
  914. // vmovdqa 0x50(%r11), %xmm3
  915. tbl v3.16b, {v29.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  916. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3
  917. // vmovdqa 0x60(%r11), %xmm2
  918. tbl v2.16b, {v30.16b}, v4.16b // vpshufb %xmm4, %xmm2, %xmm2
  919. tbl v3.16b, {v3.16b}, v9.16b // vpshufb %xmm5, %xmm3, %xmm3
  920. // vmovdqa 0x70(%r11), %xmm4
  921. tbl v4.16b, {v31.16b}, v1.16b // vpshufb %xmm1, %xmm4, %xmm4
  922. ld1 {v1.2d}, [x8] // vmovdqa (%r8,%r10), %xmm1
  923. eor v2.16b, v2.16b, v3.16b // vpxor %xmm3, %xmm2, %xmm2
  924. eor v3.16b, v4.16b, v2.16b // vpxor %xmm2, %xmm4, %xmm3
  925. sub x2, x2, #16 // add $-16, %rdx
  926. .Lschedule_mangle_both:
  927. tbl v3.16b, {v3.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  928. add x8, x8, #48 // add $-16, %r8
  929. and x8, x8, #~(1<<6) // and $0x30, %r8
  930. st1 {v3.2d}, [x2] // vmovdqu %xmm3, (%rdx)
  931. ret
  932. .size _vpaes_schedule_mangle,.-_vpaes_schedule_mangle
  933. .globl vpaes_set_encrypt_key
  934. .hidden vpaes_set_encrypt_key
  935. .type vpaes_set_encrypt_key,%function
  936. .align 4
  937. vpaes_set_encrypt_key:
  938. AARCH64_SIGN_LINK_REGISTER
  939. stp x29,x30,[sp,#-16]!
  940. add x29,sp,#0
  941. stp d8,d9,[sp,#-16]! // ABI spec says so
  942. lsr w9, w1, #5 // shr $5,%eax
  943. add w9, w9, #5 // $5,%eax
  944. str w9, [x2,#240] // mov %eax,240(%rdx) # AES_KEY->rounds = nbits/32+5;
  945. mov w3, #0 // mov $0,%ecx
  946. mov x8, #0x30 // mov $0x30,%r8d
  947. bl _vpaes_schedule_core
  948. eor x0, x0, x0
  949. ldp d8,d9,[sp],#16
  950. ldp x29,x30,[sp],#16
  951. AARCH64_VALIDATE_LINK_REGISTER
  952. ret
  953. .size vpaes_set_encrypt_key,.-vpaes_set_encrypt_key
  954. .globl vpaes_set_decrypt_key
  955. .hidden vpaes_set_decrypt_key
  956. .type vpaes_set_decrypt_key,%function
  957. .align 4
  958. vpaes_set_decrypt_key:
  959. AARCH64_SIGN_LINK_REGISTER
  960. stp x29,x30,[sp,#-16]!
  961. add x29,sp,#0
  962. stp d8,d9,[sp,#-16]! // ABI spec says so
  963. lsr w9, w1, #5 // shr $5,%eax
  964. add w9, w9, #5 // $5,%eax
  965. str w9, [x2,#240] // mov %eax,240(%rdx) # AES_KEY->rounds = nbits/32+5;
  966. lsl w9, w9, #4 // shl $4,%eax
  967. add x2, x2, #16 // lea 16(%rdx,%rax),%rdx
  968. add x2, x2, x9
  969. mov w3, #1 // mov $1,%ecx
  970. lsr w8, w1, #1 // shr $1,%r8d
  971. and x8, x8, #32 // and $32,%r8d
  972. eor x8, x8, #32 // xor $32,%r8d # nbits==192?0:32
  973. bl _vpaes_schedule_core
  974. ldp d8,d9,[sp],#16
  975. ldp x29,x30,[sp],#16
  976. AARCH64_VALIDATE_LINK_REGISTER
  977. ret
  978. .size vpaes_set_decrypt_key,.-vpaes_set_decrypt_key
  979. .globl vpaes_cbc_encrypt
  980. .hidden vpaes_cbc_encrypt
  981. .type vpaes_cbc_encrypt,%function
  982. .align 4
  983. vpaes_cbc_encrypt:
  984. AARCH64_SIGN_LINK_REGISTER
  985. cbz x2, .Lcbc_abort
  986. cmp w5, #0 // check direction
  987. b.eq vpaes_cbc_decrypt
  988. stp x29,x30,[sp,#-16]!
  989. add x29,sp,#0
  990. mov x17, x2 // reassign
  991. mov x2, x3 // reassign
  992. ld1 {v0.16b}, [x4] // load ivec
  993. bl _vpaes_encrypt_preheat
  994. b .Lcbc_enc_loop
  995. .align 4
  996. .Lcbc_enc_loop:
  997. ld1 {v7.16b}, [x0],#16 // load input
  998. eor v7.16b, v7.16b, v0.16b // xor with ivec
  999. bl _vpaes_encrypt_core
  1000. st1 {v0.16b}, [x1],#16 // save output
  1001. subs x17, x17, #16
  1002. b.hi .Lcbc_enc_loop
  1003. st1 {v0.16b}, [x4] // write ivec
  1004. ldp x29,x30,[sp],#16
  1005. .Lcbc_abort:
  1006. AARCH64_VALIDATE_LINK_REGISTER
  1007. ret
  1008. .size vpaes_cbc_encrypt,.-vpaes_cbc_encrypt
  1009. .type vpaes_cbc_decrypt,%function
  1010. .align 4
  1011. vpaes_cbc_decrypt:
  1012. // Not adding AARCH64_SIGN_LINK_REGISTER here because vpaes_cbc_decrypt is jumped to
  1013. // only from vpaes_cbc_encrypt which has already signed the return address.
  1014. stp x29,x30,[sp,#-16]!
  1015. add x29,sp,#0
  1016. stp d8,d9,[sp,#-16]! // ABI spec says so
  1017. stp d10,d11,[sp,#-16]!
  1018. stp d12,d13,[sp,#-16]!
  1019. stp d14,d15,[sp,#-16]!
  1020. mov x17, x2 // reassign
  1021. mov x2, x3 // reassign
  1022. ld1 {v6.16b}, [x4] // load ivec
  1023. bl _vpaes_decrypt_preheat
  1024. tst x17, #16
  1025. b.eq .Lcbc_dec_loop2x
  1026. ld1 {v7.16b}, [x0], #16 // load input
  1027. bl _vpaes_decrypt_core
  1028. eor v0.16b, v0.16b, v6.16b // xor with ivec
  1029. orr v6.16b, v7.16b, v7.16b // next ivec value
  1030. st1 {v0.16b}, [x1], #16
  1031. subs x17, x17, #16
  1032. b.ls .Lcbc_dec_done
  1033. .align 4
  1034. .Lcbc_dec_loop2x:
  1035. ld1 {v14.16b,v15.16b}, [x0], #32
  1036. bl _vpaes_decrypt_2x
  1037. eor v0.16b, v0.16b, v6.16b // xor with ivec
  1038. eor v1.16b, v1.16b, v14.16b
  1039. orr v6.16b, v15.16b, v15.16b
  1040. st1 {v0.16b,v1.16b}, [x1], #32
  1041. subs x17, x17, #32
  1042. b.hi .Lcbc_dec_loop2x
  1043. .Lcbc_dec_done:
  1044. st1 {v6.16b}, [x4]
  1045. ldp d14,d15,[sp],#16
  1046. ldp d12,d13,[sp],#16
  1047. ldp d10,d11,[sp],#16
  1048. ldp d8,d9,[sp],#16
  1049. ldp x29,x30,[sp],#16
  1050. AARCH64_VALIDATE_LINK_REGISTER
  1051. ret
  1052. .size vpaes_cbc_decrypt,.-vpaes_cbc_decrypt
  1053. .globl vpaes_ctr32_encrypt_blocks
  1054. .hidden vpaes_ctr32_encrypt_blocks
  1055. .type vpaes_ctr32_encrypt_blocks,%function
  1056. .align 4
  1057. vpaes_ctr32_encrypt_blocks:
  1058. AARCH64_SIGN_LINK_REGISTER
  1059. stp x29,x30,[sp,#-16]!
  1060. add x29,sp,#0
  1061. stp d8,d9,[sp,#-16]! // ABI spec says so
  1062. stp d10,d11,[sp,#-16]!
  1063. stp d12,d13,[sp,#-16]!
  1064. stp d14,d15,[sp,#-16]!
  1065. cbz x2, .Lctr32_done
  1066. // Note, unlike the other functions, x2 here is measured in blocks,
  1067. // not bytes.
  1068. mov x17, x2
  1069. mov x2, x3
  1070. // Load the IV and counter portion.
  1071. ldr w6, [x4, #12]
  1072. ld1 {v7.16b}, [x4]
  1073. bl _vpaes_encrypt_preheat
  1074. tst x17, #1
  1075. rev w6, w6 // The counter is big-endian.
  1076. b.eq .Lctr32_prep_loop
  1077. // Handle one block so the remaining block count is even for
  1078. // _vpaes_encrypt_2x.
  1079. ld1 {v6.16b}, [x0], #16 // .Load input ahead of time
  1080. bl _vpaes_encrypt_core
  1081. eor v0.16b, v0.16b, v6.16b // XOR input and result
  1082. st1 {v0.16b}, [x1], #16
  1083. subs x17, x17, #1
  1084. // Update the counter.
  1085. add w6, w6, #1
  1086. rev w7, w6
  1087. mov v7.s[3], w7
  1088. b.ls .Lctr32_done
  1089. .Lctr32_prep_loop:
  1090. // _vpaes_encrypt_core takes its input from v7, while _vpaes_encrypt_2x
  1091. // uses v14 and v15.
  1092. mov v15.16b, v7.16b
  1093. mov v14.16b, v7.16b
  1094. add w6, w6, #1
  1095. rev w7, w6
  1096. mov v15.s[3], w7
  1097. .Lctr32_loop:
  1098. ld1 {v6.16b,v7.16b}, [x0], #32 // .Load input ahead of time
  1099. bl _vpaes_encrypt_2x
  1100. eor v0.16b, v0.16b, v6.16b // XOR input and result
  1101. eor v1.16b, v1.16b, v7.16b // XOR input and result (#2)
  1102. st1 {v0.16b,v1.16b}, [x1], #32
  1103. subs x17, x17, #2
  1104. // Update the counter.
  1105. add w7, w6, #1
  1106. add w6, w6, #2
  1107. rev w7, w7
  1108. mov v14.s[3], w7
  1109. rev w7, w6
  1110. mov v15.s[3], w7
  1111. b.hi .Lctr32_loop
  1112. .Lctr32_done:
  1113. ldp d14,d15,[sp],#16
  1114. ldp d12,d13,[sp],#16
  1115. ldp d10,d11,[sp],#16
  1116. ldp d8,d9,[sp],#16
  1117. ldp x29,x30,[sp],#16
  1118. AARCH64_VALIDATE_LINK_REGISTER
  1119. ret
  1120. .size vpaes_ctr32_encrypt_blocks,.-vpaes_ctr32_encrypt_blocks
  1121. #endif
  1122. #endif // !OPENSSL_NO_ASM
  1123. .section .note.GNU-stack,"",%progbits