aeskeys_amd64.S (b17f9ad2c9da34e8544d02c3d530fe9fb41fdbe2) aeskeys_amd64.S (93ed70f9b49087f7041b2086d6b8d125cf89f275)
1/*-
2* The white paper of AES-NI instructions can be downloaded from:
3 * http://softwarecommunity.intel.com/isn/downloads/intelavx/AES-Instructions-Set_WP.pdf
4 *
5 * Copyright (C) 2008-2010, Intel Corporation
6 * Author: Huang Ying <ying.huang@intel.com>
7 * Vinodh Gopal <vinodh.gopal@intel.com>
8 * Kahraman Akdemir

--- 148 unchanged lines hidden (view full) ---

157 call _key_expansion_256b
158// aeskeygenassist $0x20,%xmm2,%xmm1 # round 6
159 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x20
160 call _key_expansion_256a
161// aeskeygenassist $0x20,%xmm0,%xmm1
162 .byte 0x66,0x0f,0x3a,0xdf,0xc8,0x20
163 call _key_expansion_256b
164// aeskeygenassist $0x40,%xmm2,%xmm1 # round 7
1/*-
2* The white paper of AES-NI instructions can be downloaded from:
3 * http://softwarecommunity.intel.com/isn/downloads/intelavx/AES-Instructions-Set_WP.pdf
4 *
5 * Copyright (C) 2008-2010, Intel Corporation
6 * Author: Huang Ying <ying.huang@intel.com>
7 * Vinodh Gopal <vinodh.gopal@intel.com>
8 * Kahraman Akdemir

--- 148 unchanged lines hidden (view full) ---

157 call _key_expansion_256b
158// aeskeygenassist $0x20,%xmm2,%xmm1 # round 6
159 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x20
160 call _key_expansion_256a
161// aeskeygenassist $0x20,%xmm0,%xmm1
162 .byte 0x66,0x0f,0x3a,0xdf,0xc8,0x20
163 call _key_expansion_256b
164// aeskeygenassist $0x40,%xmm2,%xmm1 # round 7
165 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x20
165 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x40
166 call _key_expansion_256a
167 retq
168.Lenc_key192:
169 movq 0x10(%rdi),%xmm2 # other user key
170// aeskeygenassist $0x1,%xmm2,%xmm1 # round 1
171 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x01
172 call _key_expansion_192a
173// aeskeygenassist $0x2,%xmm2,%xmm1 # round 2

--- 82 unchanged lines hidden ---
166 call _key_expansion_256a
167 retq
168.Lenc_key192:
169 movq 0x10(%rdi),%xmm2 # other user key
170// aeskeygenassist $0x1,%xmm2,%xmm1 # round 1
171 .byte 0x66,0x0f,0x3a,0xdf,0xca,0x01
172 call _key_expansion_192a
173// aeskeygenassist $0x2,%xmm2,%xmm1 # round 2

--- 82 unchanged lines hidden ---