xref: /freebsd/sys/crypto/aesni/aeskeys_amd64.S (revision d8a0fe102c0cfdfcd5b818f850eff09d8536c9bc)
1/*-
2* The white paper of AES-NI instructions can be downloaded from:
3 *   http://softwarecommunity.intel.com/isn/downloads/intelavx/AES-Instructions-Set_WP.pdf
4 *
5 * Copyright (C) 2008-2010, Intel Corporation
6 *    Author: Huang Ying <ying.huang@intel.com>
7 *            Vinodh Gopal <vinodh.gopal@intel.com>
8 *            Kahraman Akdemir
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following
12 * conditions are met:
13 *
14 * - Redistributions of source code must retain the above copyright
15 *   notice, this list of conditions and the following disclaimer.
16 *
17 * - Redistributions in binary form must reproduce the above copyright
18 *   notice, this list of conditions and the following disclaimer in the
19 *   documentation and/or other materials provided with the
20 *   distribution.
21 *
22 * - Neither the name of Intel Corporation nor the names of its
23 *   contributors may be used to endorse or promote products
24 *   derived from this software without specific prior written
25 *   permission.
26 *
27 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
28 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
29 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
30 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
31 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
32 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
33 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
34 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
35 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
36 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
37 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
38 */
39
40#include <machine/asmacros.h>
41
42	.text
43
44ENTRY(_key_expansion_128)
45_key_expansion_256a:
46	.cfi_startproc
47	pshufd	$0b11111111,%xmm1,%xmm1
48	shufps	$0b00010000,%xmm0,%xmm4
49	pxor	%xmm4,%xmm0
50	shufps	$0b10001100,%xmm0,%xmm4
51	pxor	%xmm4,%xmm0
52	pxor	%xmm1,%xmm0
53	movaps	%xmm0,(%rsi)
54	addq	$0x10,%rsi
55	retq
56	.cfi_endproc
57END(_key_expansion_128)
58
59ENTRY(_key_expansion_192a)
60	.cfi_startproc
61	pshufd	$0b01010101,%xmm1,%xmm1
62	shufps	$0b00010000,%xmm0,%xmm4
63	pxor	%xmm4,%xmm0
64	shufps	$0b10001100,%xmm0,%xmm4
65	pxor	%xmm4,%xmm0
66	pxor	%xmm1,%xmm0
67	movaps	%xmm2,%xmm5
68	movaps	%xmm2,%xmm6
69	pslldq	$4,%xmm5
70	pshufd	$0b11111111,%xmm0,%xmm3
71	pxor	%xmm3,%xmm2
72	pxor	%xmm5,%xmm2
73	movaps	%xmm0,%xmm1
74	shufps	$0b01000100,%xmm0,%xmm6
75	movaps	%xmm6,(%rsi)
76	shufps	$0b01001110,%xmm2,%xmm1
77	movaps	%xmm1,0x10(%rsi)
78	addq	$0x20,%rsi
79	retq
80	.cfi_endproc
81END(_key_expansion_192a)
82
83ENTRY(_key_expansion_192b)
84	.cfi_startproc
85	pshufd	$0b01010101,%xmm1,%xmm1
86	shufps	$0b00010000,%xmm0,%xmm4
87	pxor	%xmm4,%xmm0
88	shufps	$0b10001100,%xmm0,%xmm4
89	pxor	%xmm4,%xmm0
90	pxor	%xmm1,%xmm0
91	movaps	%xmm2,%xmm5
92	pslldq	$4,%xmm5
93	pshufd	$0b11111111,%xmm0,%xmm3
94	pxor	%xmm3,%xmm2
95	pxor	%xmm5,%xmm2
96	movaps	%xmm0,(%rsi)
97	addq	$0x10,%rsi
98	retq
99	.cfi_endproc
100END(_key_expansion_192b)
101
102ENTRY(_key_expansion_256b)
103	.cfi_startproc
104	pshufd	$0b10101010,%xmm1,%xmm1
105	shufps	$0b00010000,%xmm2,%xmm4
106	pxor	%xmm4,%xmm2
107	shufps	$0b10001100,%xmm2,%xmm4
108	pxor	%xmm4,%xmm2
109	pxor	%xmm1,%xmm2
110	movaps	%xmm2,(%rsi)
111	addq	$0x10,%rsi
112	retq
113	.cfi_endproc
114END(_key_expansion_256b)
115
116ENTRY(aesni_set_enckey)
117	.cfi_startproc
118	movups	(%rdi),%xmm0		# user key (first 16 bytes)
119	movaps	%xmm0,(%rsi)
120	addq	$0x10,%rsi		# key addr
121	pxor	%xmm4,%xmm4		# xmm4 is assumed 0 in _key_expansion_x
122	cmpl	$12,%edx
123	jb	.Lenc_key128
124	je	.Lenc_key192
125	movups	0x10(%rdi),%xmm2	# other user key
126	movaps	%xmm2,(%rsi)
127	addq	$0x10,%rsi
128	aeskeygenassist $0x1,%xmm2,%xmm1	# round 1
129	call	_key_expansion_256a
130	aeskeygenassist $0x1,%xmm0,%xmm1
131	call	_key_expansion_256b
132	aeskeygenassist $0x2,%xmm2,%xmm1	# round 2
133	call	_key_expansion_256a
134	aeskeygenassist $0x2,%xmm0,%xmm1
135	call	_key_expansion_256b
136	aeskeygenassist $0x4,%xmm2,%xmm1	# round 3
137	call	_key_expansion_256a
138	aeskeygenassist $0x4,%xmm0,%xmm1
139	call	_key_expansion_256b
140	aeskeygenassist $0x8,%xmm2,%xmm1	# round 4
141	call	_key_expansion_256a
142	aeskeygenassist $0x8,%xmm0,%xmm1
143	call	_key_expansion_256b
144	aeskeygenassist $0x10,%xmm2,%xmm1	# round 5
145	call	_key_expansion_256a
146	aeskeygenassist $0x10,%xmm0,%xmm1
147	call	_key_expansion_256b
148	aeskeygenassist $0x20,%xmm2,%xmm1	# round 6
149	call	_key_expansion_256a
150	aeskeygenassist $0x20,%xmm0,%xmm1
151	call	_key_expansion_256b
152	aeskeygenassist $0x40,%xmm2,%xmm1	# round 7
153	call	_key_expansion_256a
154	retq
155.Lenc_key192:
156	movq	0x10(%rdi),%xmm2		# other user key
157	aeskeygenassist $0x1,%xmm2,%xmm1	# round 1
158	call	_key_expansion_192a
159	aeskeygenassist $0x2,%xmm2,%xmm1	# round 2
160	call	_key_expansion_192b
161	aeskeygenassist $0x4,%xmm2,%xmm1	# round 3
162	call	_key_expansion_192a
163	aeskeygenassist $0x8,%xmm2,%xmm1	# round 4
164	call	_key_expansion_192b
165	aeskeygenassist $0x10,%xmm2,%xmm1	# round 5
166	call	_key_expansion_192a
167	aeskeygenassist $0x20,%xmm2,%xmm1	# round 6
168	call	_key_expansion_192b
169	aeskeygenassist $0x40,%xmm2,%xmm1	# round 7
170	call	_key_expansion_192a
171	aeskeygenassist $0x80,%xmm2,%xmm1	# round 8
172	call	_key_expansion_192b
173	retq
174.Lenc_key128:
175	aeskeygenassist $0x1,%xmm0,%xmm1	# round 1
176	call	_key_expansion_128
177	aeskeygenassist $0x2,%xmm0,%xmm1	# round 2
178	call	_key_expansion_128
179	aeskeygenassist $0x4,%xmm0,%xmm1	# round 3
180	call	_key_expansion_128
181	aeskeygenassist $0x8,%xmm0,%xmm1	# round 4
182	call	_key_expansion_128
183	aeskeygenassist $0x10,%xmm0,%xmm1	# round 5
184	call	_key_expansion_128
185	aeskeygenassist $0x20,%xmm0,%xmm1	# round 6
186	call	_key_expansion_128
187	aeskeygenassist $0x40,%xmm0,%xmm1	# round 7
188	call	_key_expansion_128
189	aeskeygenassist $0x80,%xmm0,%xmm1	# round 8
190	call	_key_expansion_128
191	aeskeygenassist $0x1b,%xmm0,%xmm1	# round 9
192	call	_key_expansion_128
193	aeskeygenassist $0x36,%xmm0,%xmm1	# round 10
194	call	_key_expansion_128
195	retq
196	.cfi_endproc
197END(aesni_set_enckey)
198
199ENTRY(aesni_set_deckey)
200	.cfi_startproc
201	movslq	%edx,%rax
202	shlq	$4,%rax
203	addq	%rax,%rdi
204	movdqa	(%rdi),%xmm0
205	movdqa	%xmm0,(%rsi)
206	decl	%edx
2071:
208	addq	$0x10,%rsi
209	subq	$0x10,%rdi
210	aesimc	(%rdi),%xmm1
211	movdqa	%xmm1,(%rsi)
212	decl	%edx
213	jne	1b
214
215	addq	$0x10,%rsi
216	subq	$0x10,%rdi
217	movdqa	(%rdi),%xmm0
218	movdqa	%xmm0,(%rsi)
219	retq
220	.cfi_endproc
221END(aesni_set_deckey)
222
223	.ident	"$FreeBSD$"
224