xref: /freebsd/contrib/bearssl/src/symcipher/aes_big_enc.c (revision 2aaf9152a852aba9eb2036b95f4948ee77988826)
1 /*
2  * Copyright (c) 2016 Thomas Pornin <pornin@bolet.org>
3  *
4  * Permission is hereby granted, free of charge, to any person obtaining
5  * a copy of this software and associated documentation files (the
6  * "Software"), to deal in the Software without restriction, including
7  * without limitation the rights to use, copy, modify, merge, publish,
8  * distribute, sublicense, and/or sell copies of the Software, and to
9  * permit persons to whom the Software is furnished to do so, subject to
10  * the following conditions:
11  *
12  * The above copyright notice and this permission notice shall be
13  * included in all copies or substantial portions of the Software.
14  *
15  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
16  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
17  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
18  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
19  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
20  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
21  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
22  * SOFTWARE.
23  */
24 
25 #include "inner.h"
26 
27 #define S   br_aes_S
28 
29 static const uint32_t Ssm0[] = {
30 	0xC66363A5, 0xF87C7C84, 0xEE777799, 0xF67B7B8D, 0xFFF2F20D, 0xD66B6BBD,
31 	0xDE6F6FB1, 0x91C5C554, 0x60303050, 0x02010103, 0xCE6767A9, 0x562B2B7D,
32 	0xE7FEFE19, 0xB5D7D762, 0x4DABABE6, 0xEC76769A, 0x8FCACA45, 0x1F82829D,
33 	0x89C9C940, 0xFA7D7D87, 0xEFFAFA15, 0xB25959EB, 0x8E4747C9, 0xFBF0F00B,
34 	0x41ADADEC, 0xB3D4D467, 0x5FA2A2FD, 0x45AFAFEA, 0x239C9CBF, 0x53A4A4F7,
35 	0xE4727296, 0x9BC0C05B, 0x75B7B7C2, 0xE1FDFD1C, 0x3D9393AE, 0x4C26266A,
36 	0x6C36365A, 0x7E3F3F41, 0xF5F7F702, 0x83CCCC4F, 0x6834345C, 0x51A5A5F4,
37 	0xD1E5E534, 0xF9F1F108, 0xE2717193, 0xABD8D873, 0x62313153, 0x2A15153F,
38 	0x0804040C, 0x95C7C752, 0x46232365, 0x9DC3C35E, 0x30181828, 0x379696A1,
39 	0x0A05050F, 0x2F9A9AB5, 0x0E070709, 0x24121236, 0x1B80809B, 0xDFE2E23D,
40 	0xCDEBEB26, 0x4E272769, 0x7FB2B2CD, 0xEA75759F, 0x1209091B, 0x1D83839E,
41 	0x582C2C74, 0x341A1A2E, 0x361B1B2D, 0xDC6E6EB2, 0xB45A5AEE, 0x5BA0A0FB,
42 	0xA45252F6, 0x763B3B4D, 0xB7D6D661, 0x7DB3B3CE, 0x5229297B, 0xDDE3E33E,
43 	0x5E2F2F71, 0x13848497, 0xA65353F5, 0xB9D1D168, 0x00000000, 0xC1EDED2C,
44 	0x40202060, 0xE3FCFC1F, 0x79B1B1C8, 0xB65B5BED, 0xD46A6ABE, 0x8DCBCB46,
45 	0x67BEBED9, 0x7239394B, 0x944A4ADE, 0x984C4CD4, 0xB05858E8, 0x85CFCF4A,
46 	0xBBD0D06B, 0xC5EFEF2A, 0x4FAAAAE5, 0xEDFBFB16, 0x864343C5, 0x9A4D4DD7,
47 	0x66333355, 0x11858594, 0x8A4545CF, 0xE9F9F910, 0x04020206, 0xFE7F7F81,
48 	0xA05050F0, 0x783C3C44, 0x259F9FBA, 0x4BA8A8E3, 0xA25151F3, 0x5DA3A3FE,
49 	0x804040C0, 0x058F8F8A, 0x3F9292AD, 0x219D9DBC, 0x70383848, 0xF1F5F504,
50 	0x63BCBCDF, 0x77B6B6C1, 0xAFDADA75, 0x42212163, 0x20101030, 0xE5FFFF1A,
51 	0xFDF3F30E, 0xBFD2D26D, 0x81CDCD4C, 0x180C0C14, 0x26131335, 0xC3ECEC2F,
52 	0xBE5F5FE1, 0x359797A2, 0x884444CC, 0x2E171739, 0x93C4C457, 0x55A7A7F2,
53 	0xFC7E7E82, 0x7A3D3D47, 0xC86464AC, 0xBA5D5DE7, 0x3219192B, 0xE6737395,
54 	0xC06060A0, 0x19818198, 0x9E4F4FD1, 0xA3DCDC7F, 0x44222266, 0x542A2A7E,
55 	0x3B9090AB, 0x0B888883, 0x8C4646CA, 0xC7EEEE29, 0x6BB8B8D3, 0x2814143C,
56 	0xA7DEDE79, 0xBC5E5EE2, 0x160B0B1D, 0xADDBDB76, 0xDBE0E03B, 0x64323256,
57 	0x743A3A4E, 0x140A0A1E, 0x924949DB, 0x0C06060A, 0x4824246C, 0xB85C5CE4,
58 	0x9FC2C25D, 0xBDD3D36E, 0x43ACACEF, 0xC46262A6, 0x399191A8, 0x319595A4,
59 	0xD3E4E437, 0xF279798B, 0xD5E7E732, 0x8BC8C843, 0x6E373759, 0xDA6D6DB7,
60 	0x018D8D8C, 0xB1D5D564, 0x9C4E4ED2, 0x49A9A9E0, 0xD86C6CB4, 0xAC5656FA,
61 	0xF3F4F407, 0xCFEAEA25, 0xCA6565AF, 0xF47A7A8E, 0x47AEAEE9, 0x10080818,
62 	0x6FBABAD5, 0xF0787888, 0x4A25256F, 0x5C2E2E72, 0x381C1C24, 0x57A6A6F1,
63 	0x73B4B4C7, 0x97C6C651, 0xCBE8E823, 0xA1DDDD7C, 0xE874749C, 0x3E1F1F21,
64 	0x964B4BDD, 0x61BDBDDC, 0x0D8B8B86, 0x0F8A8A85, 0xE0707090, 0x7C3E3E42,
65 	0x71B5B5C4, 0xCC6666AA, 0x904848D8, 0x06030305, 0xF7F6F601, 0x1C0E0E12,
66 	0xC26161A3, 0x6A35355F, 0xAE5757F9, 0x69B9B9D0, 0x17868691, 0x99C1C158,
67 	0x3A1D1D27, 0x279E9EB9, 0xD9E1E138, 0xEBF8F813, 0x2B9898B3, 0x22111133,
68 	0xD26969BB, 0xA9D9D970, 0x078E8E89, 0x339494A7, 0x2D9B9BB6, 0x3C1E1E22,
69 	0x15878792, 0xC9E9E920, 0x87CECE49, 0xAA5555FF, 0x50282878, 0xA5DFDF7A,
70 	0x038C8C8F, 0x59A1A1F8, 0x09898980, 0x1A0D0D17, 0x65BFBFDA, 0xD7E6E631,
71 	0x844242C6, 0xD06868B8, 0x824141C3, 0x299999B0, 0x5A2D2D77, 0x1E0F0F11,
72 	0x7BB0B0CB, 0xA85454FC, 0x6DBBBBD6, 0x2C16163A
73 };
74 
75 static inline uint32_t
rotr(uint32_t x,int n)76 rotr(uint32_t x, int n)
77 {
78 	return (x << (32 - n)) | (x >> n);
79 }
80 
81 #define SboxExt0(x)   (Ssm0[x])
82 #define SboxExt1(x)   (rotr(Ssm0[x], 8))
83 #define SboxExt2(x)   (rotr(Ssm0[x], 16))
84 #define SboxExt3(x)   (rotr(Ssm0[x], 24))
85 
86 
87 /* see bearssl.h */
88 void
br_aes_big_encrypt(unsigned num_rounds,const uint32_t * skey,void * data)89 br_aes_big_encrypt(unsigned num_rounds, const uint32_t *skey, void *data)
90 {
91 	unsigned char *buf;
92 	uint32_t s0, s1, s2, s3;
93 	uint32_t t0, t1, t2, t3;
94 	unsigned u;
95 
96 	buf = data;
97 	s0 = br_dec32be(buf);
98 	s1 = br_dec32be(buf + 4);
99 	s2 = br_dec32be(buf + 8);
100 	s3 = br_dec32be(buf + 12);
101 	s0 ^= skey[0];
102 	s1 ^= skey[1];
103 	s2 ^= skey[2];
104 	s3 ^= skey[3];
105 	for (u = 1; u < num_rounds; u ++) {
106 		uint32_t v0, v1, v2, v3;
107 
108 		v0 = SboxExt0(s0 >> 24)
109 			^ SboxExt1((s1 >> 16) & 0xFF)
110 			^ SboxExt2((s2 >> 8) & 0xFF)
111 			^ SboxExt3(s3 & 0xFF);
112 		v1 = SboxExt0(s1 >> 24)
113 			^ SboxExt1((s2 >> 16) & 0xFF)
114 			^ SboxExt2((s3 >> 8) & 0xFF)
115 			^ SboxExt3(s0 & 0xFF);
116 		v2 = SboxExt0(s2 >> 24)
117 			^ SboxExt1((s3 >> 16) & 0xFF)
118 			^ SboxExt2((s0 >> 8) & 0xFF)
119 			^ SboxExt3(s1 & 0xFF);
120 		v3 = SboxExt0(s3 >> 24)
121 			^ SboxExt1((s0 >> 16) & 0xFF)
122 			^ SboxExt2((s1 >> 8) & 0xFF)
123 			^ SboxExt3(s2 & 0xFF);
124 		s0 = v0;
125 		s1 = v1;
126 		s2 = v2;
127 		s3 = v3;
128 		s0 ^= skey[u << 2];
129 		s1 ^= skey[(u << 2) + 1];
130 		s2 ^= skey[(u << 2) + 2];
131 		s3 ^= skey[(u << 2) + 3];
132 	}
133 	t0 = ((uint32_t)S[s0 >> 24] << 24)
134 		| ((uint32_t)S[(s1 >> 16) & 0xFF] << 16)
135 		| ((uint32_t)S[(s2 >> 8) & 0xFF] << 8)
136 		| (uint32_t)S[s3 & 0xFF];
137 	t1 = ((uint32_t)S[s1 >> 24] << 24)
138 		| ((uint32_t)S[(s2 >> 16) & 0xFF] << 16)
139 		| ((uint32_t)S[(s3 >> 8) & 0xFF] << 8)
140 		| (uint32_t)S[s0 & 0xFF];
141 	t2 = ((uint32_t)S[s2 >> 24] << 24)
142 		| ((uint32_t)S[(s3 >> 16) & 0xFF] << 16)
143 		| ((uint32_t)S[(s0 >> 8) & 0xFF] << 8)
144 		| (uint32_t)S[s1 & 0xFF];
145 	t3 = ((uint32_t)S[s3 >> 24] << 24)
146 		| ((uint32_t)S[(s0 >> 16) & 0xFF] << 16)
147 		| ((uint32_t)S[(s1 >> 8) & 0xFF] << 8)
148 		| (uint32_t)S[s2 & 0xFF];
149 	s0 = t0 ^ skey[num_rounds << 2];
150 	s1 = t1 ^ skey[(num_rounds << 2) + 1];
151 	s2 = t2 ^ skey[(num_rounds << 2) + 2];
152 	s3 = t3 ^ skey[(num_rounds << 2) + 3];
153 	br_enc32be(buf, s0);
154 	br_enc32be(buf + 4, s1);
155 	br_enc32be(buf + 8, s2);
156 	br_enc32be(buf + 12, s3);
157 }
158