aeskeys_amd64.S (b17f9ad2c9da34e8544d02c3d530fe9fb41fdbe2) | aeskeys_amd64.S (93ed70f9b49087f7041b2086d6b8d125cf89f275) |
---|---|
1/*- 2* The white paper of AES-NI instructions can be downloaded from: 3 * http://softwarecommunity.intel.com/isn/downloads/intelavx/AES-Instructions-Set_WP.pdf 4 * 5 * Copyright (C) 2008-2010, Intel Corporation 6 * Author: Huang Ying <ying.huang@intel.com> 7 * Vinodh Gopal <vinodh.gopal@intel.com> 8 * Kahraman Akdemir --- 148 unchanged lines hidden (view full) --- 157 call _key_expansion_256b 158// aeskeygenassist $0x20,%xmm2,%xmm1 # round 6 159 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x20 160 call _key_expansion_256a 161// aeskeygenassist $0x20,%xmm0,%xmm1 162 .byte 0x66,0x0f,0x3a,0xdf,0xc8,0x20 163 call _key_expansion_256b 164// aeskeygenassist $0x40,%xmm2,%xmm1 # round 7 | 1/*- 2* The white paper of AES-NI instructions can be downloaded from: 3 * http://softwarecommunity.intel.com/isn/downloads/intelavx/AES-Instructions-Set_WP.pdf 4 * 5 * Copyright (C) 2008-2010, Intel Corporation 6 * Author: Huang Ying <ying.huang@intel.com> 7 * Vinodh Gopal <vinodh.gopal@intel.com> 8 * Kahraman Akdemir --- 148 unchanged lines hidden (view full) --- 157 call _key_expansion_256b 158// aeskeygenassist $0x20,%xmm2,%xmm1 # round 6 159 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x20 160 call _key_expansion_256a 161// aeskeygenassist $0x20,%xmm0,%xmm1 162 .byte 0x66,0x0f,0x3a,0xdf,0xc8,0x20 163 call _key_expansion_256b 164// aeskeygenassist $0x40,%xmm2,%xmm1 # round 7 |
165 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x20 | 165 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x40 |
166 call _key_expansion_256a 167 retq 168.Lenc_key192: 169 movq 0x10(%rdi),%xmm2 # other user key 170// aeskeygenassist $0x1,%xmm2,%xmm1 # round 1 171 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x01 172 call _key_expansion_192a 173// aeskeygenassist $0x2,%xmm2,%xmm1 # round 2 --- 82 unchanged lines hidden --- | 166 call _key_expansion_256a 167 retq 168.Lenc_key192: 169 movq 0x10(%rdi),%xmm2 # other user key 170// aeskeygenassist $0x1,%xmm2,%xmm1 # round 1 171 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x01 172 call _key_expansion_192a 173// aeskeygenassist $0x2,%xmm2,%xmm1 # round 2 --- 82 unchanged lines hidden --- |