arm64.S 41 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178
  1. .text
  2. .type _vpaes_consts,%object
  3. .align 7 // totally strategic alignment
  4. _vpaes_consts:
  5. .Lk_mc_forward: // mc_forward
  6. .quad 0x0407060500030201, 0x0C0F0E0D080B0A09
  7. .quad 0x080B0A0904070605, 0x000302010C0F0E0D
  8. .quad 0x0C0F0E0D080B0A09, 0x0407060500030201
  9. .quad 0x000302010C0F0E0D, 0x080B0A0904070605
  10. .Lk_mc_backward: // mc_backward
  11. .quad 0x0605040702010003, 0x0E0D0C0F0A09080B
  12. .quad 0x020100030E0D0C0F, 0x0A09080B06050407
  13. .quad 0x0E0D0C0F0A09080B, 0x0605040702010003
  14. .quad 0x0A09080B06050407, 0x020100030E0D0C0F
  15. .Lk_sr: // sr
  16. .quad 0x0706050403020100, 0x0F0E0D0C0B0A0908
  17. .quad 0x030E09040F0A0500, 0x0B06010C07020D08
  18. .quad 0x0F060D040B020900, 0x070E050C030A0108
  19. .quad 0x0B0E0104070A0D00, 0x0306090C0F020508
  20. //
  21. // "Hot" constants
  22. //
  23. .Lk_inv: // inv, inva
  24. .quad 0x0E05060F0D080180, 0x040703090A0B0C02
  25. .quad 0x01040A060F0B0780, 0x030D0E0C02050809
  26. .Lk_ipt: // input transform (lo, hi)
  27. .quad 0xC2B2E8985A2A7000, 0xCABAE09052227808
  28. .quad 0x4C01307D317C4D00, 0xCD80B1FCB0FDCC81
  29. .Lk_sbo: // sbou, sbot
  30. .quad 0xD0D26D176FBDC700, 0x15AABF7AC502A878
  31. .quad 0xCFE474A55FBB6A00, 0x8E1E90D1412B35FA
  32. .Lk_sb1: // sb1u, sb1t
  33. .quad 0x3618D415FAE22300, 0x3BF7CCC10D2ED9EF
  34. .quad 0xB19BE18FCB503E00, 0xA5DF7A6E142AF544
  35. .Lk_sb2: // sb2u, sb2t
  36. .quad 0x69EB88400AE12900, 0xC2A163C8AB82234A
  37. .quad 0xE27A93C60B712400, 0x5EB7E955BC982FCD
  38. //
  39. // Decryption stuff
  40. //
  41. .Lk_dipt: // decryption input transform
  42. .quad 0x0F505B040B545F00, 0x154A411E114E451A
  43. .quad 0x86E383E660056500, 0x12771772F491F194
  44. .Lk_dsbo: // decryption sbox final output
  45. .quad 0x1387EA537EF94000, 0xC7AA6DB9D4943E2D
  46. .quad 0x12D7560F93441D00, 0xCA4B8159D8C58E9C
  47. .Lk_dsb9: // decryption sbox output *9*u, *9*t
  48. .quad 0x851C03539A86D600, 0xCAD51F504F994CC9
  49. .quad 0xC03B1789ECD74900, 0x725E2C9EB2FBA565
  50. .Lk_dsbd: // decryption sbox output *D*u, *D*t
  51. .quad 0x7D57CCDFE6B1A200, 0xF56E9B13882A4439
  52. .quad 0x3CE2FAF724C6CB00, 0x2931180D15DEEFD3
  53. .Lk_dsbb: // decryption sbox output *B*u, *B*t
  54. .quad 0xD022649296B44200, 0x602646F6B0F2D404
  55. .quad 0xC19498A6CD596700, 0xF3FF0C3E3255AA6B
  56. .Lk_dsbe: // decryption sbox output *E*u, *E*t
  57. .quad 0x46F2929626D4D000, 0x2242600464B4F6B0
  58. .quad 0x0C55A6CDFFAAC100, 0x9467F36B98593E32
  59. //
  60. // Key schedule constants
  61. //
  62. .Lk_dksd: // decryption key schedule: invskew x*D
  63. .quad 0xFEB91A5DA3E44700, 0x0740E3A45A1DBEF9
  64. .quad 0x41C277F4B5368300, 0x5FDC69EAAB289D1E
  65. .Lk_dksb: // decryption key schedule: invskew x*B
  66. .quad 0x9A4FCA1F8550D500, 0x03D653861CC94C99
  67. .quad 0x115BEDA7B6FC4A00, 0xD993256F7E3482C8
  68. .Lk_dkse: // decryption key schedule: invskew x*E + 0x63
  69. .quad 0xD5031CCA1FC9D600, 0x53859A4C994F5086
  70. .quad 0xA23196054FDC7BE8, 0xCD5EF96A20B31487
  71. .Lk_dks9: // decryption key schedule: invskew x*9
  72. .quad 0xB6116FC87ED9A700, 0x4AED933482255BFC
  73. .quad 0x4576516227143300, 0x8BB89FACE9DAFDCE
  74. .Lk_rcon: // rcon
  75. .quad 0x1F8391B9AF9DEEB6, 0x702A98084D7C7D81
  76. .Lk_opt: // output transform
  77. .quad 0xFF9F4929D6B66000, 0xF7974121DEBE6808
  78. .quad 0x01EDBD5150BCEC00, 0xE10D5DB1B05C0CE0
  79. .Lk_deskew: // deskew tables: inverts the sbox's "skew"
  80. .quad 0x07E4A34047A4E300, 0x1DFEB95A5DBEF91A
  81. .quad 0x5F36B5DC83EA6900, 0x2841C2ABF49D1E77
  82. .byte 86,101,99,116,111,114,32,80,101,114,109,117,116,97,105,111,110,32,65,69,83,32,102,111,114,32,65,82,77,118,56,44,32,77,105,107,101,32,72,97,109,98,117,114,103,32,40,83,116,97,110,102,111,114,100,32,85,110,105,118,101,114,115,105,116,121,41,0
  83. .align 2
  84. .size _vpaes_consts,.-_vpaes_consts
  85. .align 6
  86. ##
  87. ## _aes_preheat
  88. ##
  89. ## Fills register %r10 -> .aes_consts (so you can -fPIC)
  90. ## and %xmm9-%xmm15 as specified below.
  91. ##
  92. .type _vpaes_encrypt_preheat,%function
  93. .align 4
  94. _vpaes_encrypt_preheat:
  95. adr x10, .Lk_inv
  96. movi v17.16b, #0x0f
  97. ld1 {v18.2d,v19.2d}, [x10],#32 // .Lk_inv
  98. ld1 {v20.2d,v21.2d,v22.2d,v23.2d}, [x10],#64 // .Lk_ipt, .Lk_sbo
  99. ld1 {v24.2d,v25.2d,v26.2d,v27.2d}, [x10] // .Lk_sb1, .Lk_sb2
  100. ret
  101. .size _vpaes_encrypt_preheat,.-_vpaes_encrypt_preheat
  102. ##
  103. ## _aes_encrypt_core
  104. ##
  105. ## AES-encrypt %xmm0.
  106. ##
  107. ## Inputs:
  108. ## %xmm0 = input
  109. ## %xmm9-%xmm15 as in _vpaes_preheat
  110. ## (%rdx) = scheduled keys
  111. ##
  112. ## Output in %xmm0
  113. ## Clobbers %xmm1-%xmm5, %r9, %r10, %r11, %rax
  114. ## Preserves %xmm6 - %xmm8 so you get some local vectors
  115. ##
  116. ##
  117. .type _vpaes_encrypt_core,%function
  118. .align 4
  119. _vpaes_encrypt_core:
  120. mov x9, x2
  121. ldr w8, [x2,#240] // pull rounds
  122. adr x11, .Lk_mc_forward+16
  123. // vmovdqa .Lk_ipt(%rip), %xmm2 # iptlo
  124. ld1 {v16.2d}, [x9], #16 // vmovdqu (%r9), %xmm5 # round0 key
  125. and v1.16b, v7.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  126. ushr v0.16b, v7.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  127. tbl v1.16b, {v20.16b}, v1.16b // vpshufb %xmm1, %xmm2, %xmm1
  128. // vmovdqa .Lk_ipt+16(%rip), %xmm3 # ipthi
  129. tbl v2.16b, {v21.16b}, v0.16b // vpshufb %xmm0, %xmm3, %xmm2
  130. eor v0.16b, v1.16b, v16.16b // vpxor %xmm5, %xmm1, %xmm0
  131. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  132. b .Lenc_entry
  133. .align 4
  134. .Lenc_loop:
  135. // middle of middle round
  136. add x10, x11, #0x40
  137. tbl v4.16b, {v25.16b}, v2.16b // vpshufb %xmm2, %xmm13, %xmm4 # 4 = sb1u
  138. ld1 {v1.2d}, [x11], #16 // vmovdqa -0x40(%r11,%r10), %xmm1 # .Lk_mc_forward[]
  139. tbl v0.16b, {v24.16b}, v3.16b // vpshufb %xmm3, %xmm12, %xmm0 # 0 = sb1t
  140. eor v4.16b, v4.16b, v16.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = sb1u + k
  141. tbl v5.16b, {v27.16b}, v2.16b // vpshufb %xmm2, %xmm15, %xmm5 # 4 = sb2u
  142. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = A
  143. tbl v2.16b, {v26.16b}, v3.16b // vpshufb %xmm3, %xmm14, %xmm2 # 2 = sb2t
  144. ld1 {v4.2d}, [x10] // vmovdqa (%r11,%r10), %xmm4 # .Lk_mc_backward[]
  145. tbl v3.16b, {v0.16b}, v1.16b // vpshufb %xmm1, %xmm0, %xmm3 # 0 = B
  146. eor v2.16b, v2.16b, v5.16b // vpxor %xmm5, %xmm2, %xmm2 # 2 = 2A
  147. tbl v0.16b, {v0.16b}, v4.16b // vpshufb %xmm4, %xmm0, %xmm0 # 3 = D
  148. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 0 = 2A+B
  149. tbl v4.16b, {v3.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm4 # 0 = 2B+C
  150. eor v0.16b, v0.16b, v3.16b // vpxor %xmm3, %xmm0, %xmm0 # 3 = 2A+B+D
  151. and x11, x11, #~(1<<6) // and $0x30, %r11 # ... mod 4
  152. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = 2A+3B+C+D
  153. sub w8, w8, #1 // nr--
  154. .Lenc_entry:
  155. // top of round
  156. and v1.16b, v0.16b, v17.16b // vpand %xmm0, %xmm9, %xmm1 # 0 = k
  157. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  158. tbl v5.16b, {v19.16b}, v1.16b // vpshufb %xmm1, %xmm11, %xmm5 # 2 = a/k
  159. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  160. tbl v3.16b, {v18.16b}, v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  161. tbl v4.16b, {v18.16b}, v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  162. eor v3.16b, v3.16b, v5.16b // vpxor %xmm5, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  163. eor v4.16b, v4.16b, v5.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  164. tbl v2.16b, {v18.16b}, v3.16b // vpshufb %xmm3, %xmm10, %xmm2 # 2 = 1/iak
  165. tbl v3.16b, {v18.16b}, v4.16b // vpshufb %xmm4, %xmm10, %xmm3 # 3 = 1/jak
  166. eor v2.16b, v2.16b, v1.16b // vpxor %xmm1, %xmm2, %xmm2 # 2 = io
  167. eor v3.16b, v3.16b, v0.16b // vpxor %xmm0, %xmm3, %xmm3 # 3 = jo
  168. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm5
  169. cbnz w8, .Lenc_loop
  170. // middle of last round
  171. add x10, x11, #0x80
  172. // vmovdqa -0x60(%r10), %xmm4 # 3 : sbou .Lk_sbo
  173. // vmovdqa -0x50(%r10), %xmm0 # 0 : sbot .Lk_sbo+16
  174. tbl v4.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbou
  175. ld1 {v1.2d}, [x10] // vmovdqa 0x40(%r11,%r10), %xmm1 # .Lk_sr[]
  176. tbl v0.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm0, %xmm0 # 0 = sb1t
  177. eor v4.16b, v4.16b, v16.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = sb1u + k
  178. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = A
  179. tbl v0.16b, {v0.16b}, v1.16b // vpshufb %xmm1, %xmm0, %xmm0
  180. ret
  181. .size _vpaes_encrypt_core,.-_vpaes_encrypt_core
  182. .globl vpaes_encrypt
  183. .type vpaes_encrypt,%function
  184. .align 4
  185. vpaes_encrypt:
  186. stp x29,x30,[sp,#-16]!
  187. add x29,sp,#0
  188. ld1 {v7.16b}, [x0]
  189. bl _vpaes_encrypt_preheat
  190. bl _vpaes_encrypt_core
  191. st1 {v0.16b}, [x1]
  192. ldp x29,x30,[sp],#16
  193. ret
  194. .size vpaes_encrypt,.-vpaes_encrypt
  195. .type _vpaes_encrypt_2x,%function
  196. .align 4
  197. _vpaes_encrypt_2x:
  198. mov x9, x2
  199. ldr w8, [x2,#240] // pull rounds
  200. adr x11, .Lk_mc_forward+16
  201. // vmovdqa .Lk_ipt(%rip), %xmm2 # iptlo
  202. ld1 {v16.2d}, [x9], #16 // vmovdqu (%r9), %xmm5 # round0 key
  203. and v1.16b, v14.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  204. ushr v0.16b, v14.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  205. and v9.16b, v15.16b, v17.16b
  206. ushr v8.16b, v15.16b, #4
  207. tbl v1.16b, {v20.16b}, v1.16b // vpshufb %xmm1, %xmm2, %xmm1
  208. tbl v9.16b, {v20.16b}, v9.16b
  209. // vmovdqa .Lk_ipt+16(%rip), %xmm3 # ipthi
  210. tbl v2.16b, {v21.16b}, v0.16b // vpshufb %xmm0, %xmm3, %xmm2
  211. tbl v10.16b, {v21.16b}, v8.16b
  212. eor v0.16b, v1.16b, v16.16b // vpxor %xmm5, %xmm1, %xmm0
  213. eor v8.16b, v9.16b, v16.16b
  214. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  215. eor v8.16b, v8.16b, v10.16b
  216. b .Lenc_2x_entry
  217. .align 4
  218. .Lenc_2x_loop:
  219. // middle of middle round
  220. add x10, x11, #0x40
  221. tbl v4.16b, {v25.16b}, v2.16b // vpshufb %xmm2, %xmm13, %xmm4 # 4 = sb1u
  222. tbl v12.16b, {v25.16b}, v10.16b
  223. ld1 {v1.2d}, [x11], #16 // vmovdqa -0x40(%r11,%r10), %xmm1 # .Lk_mc_forward[]
  224. tbl v0.16b, {v24.16b}, v3.16b // vpshufb %xmm3, %xmm12, %xmm0 # 0 = sb1t
  225. tbl v8.16b, {v24.16b}, v11.16b
  226. eor v4.16b, v4.16b, v16.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = sb1u + k
  227. eor v12.16b, v12.16b, v16.16b
  228. tbl v5.16b, {v27.16b}, v2.16b // vpshufb %xmm2, %xmm15, %xmm5 # 4 = sb2u
  229. tbl v13.16b, {v27.16b}, v10.16b
  230. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = A
  231. eor v8.16b, v8.16b, v12.16b
  232. tbl v2.16b, {v26.16b}, v3.16b // vpshufb %xmm3, %xmm14, %xmm2 # 2 = sb2t
  233. tbl v10.16b, {v26.16b}, v11.16b
  234. ld1 {v4.2d}, [x10] // vmovdqa (%r11,%r10), %xmm4 # .Lk_mc_backward[]
  235. tbl v3.16b, {v0.16b}, v1.16b // vpshufb %xmm1, %xmm0, %xmm3 # 0 = B
  236. tbl v11.16b, {v8.16b}, v1.16b
  237. eor v2.16b, v2.16b, v5.16b // vpxor %xmm5, %xmm2, %xmm2 # 2 = 2A
  238. eor v10.16b, v10.16b, v13.16b
  239. tbl v0.16b, {v0.16b}, v4.16b // vpshufb %xmm4, %xmm0, %xmm0 # 3 = D
  240. tbl v8.16b, {v8.16b}, v4.16b
  241. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 0 = 2A+B
  242. eor v11.16b, v11.16b, v10.16b
  243. tbl v4.16b, {v3.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm4 # 0 = 2B+C
  244. tbl v12.16b, {v11.16b},v1.16b
  245. eor v0.16b, v0.16b, v3.16b // vpxor %xmm3, %xmm0, %xmm0 # 3 = 2A+B+D
  246. eor v8.16b, v8.16b, v11.16b
  247. and x11, x11, #~(1<<6) // and $0x30, %r11 # ... mod 4
  248. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = 2A+3B+C+D
  249. eor v8.16b, v8.16b, v12.16b
  250. sub w8, w8, #1 // nr--
  251. .Lenc_2x_entry:
  252. // top of round
  253. and v1.16b, v0.16b, v17.16b // vpand %xmm0, %xmm9, %xmm1 # 0 = k
  254. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  255. and v9.16b, v8.16b, v17.16b
  256. ushr v8.16b, v8.16b, #4
  257. tbl v5.16b, {v19.16b},v1.16b // vpshufb %xmm1, %xmm11, %xmm5 # 2 = a/k
  258. tbl v13.16b, {v19.16b},v9.16b
  259. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  260. eor v9.16b, v9.16b, v8.16b
  261. tbl v3.16b, {v18.16b},v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  262. tbl v11.16b, {v18.16b},v8.16b
  263. tbl v4.16b, {v18.16b},v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  264. tbl v12.16b, {v18.16b},v9.16b
  265. eor v3.16b, v3.16b, v5.16b // vpxor %xmm5, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  266. eor v11.16b, v11.16b, v13.16b
  267. eor v4.16b, v4.16b, v5.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  268. eor v12.16b, v12.16b, v13.16b
  269. tbl v2.16b, {v18.16b},v3.16b // vpshufb %xmm3, %xmm10, %xmm2 # 2 = 1/iak
  270. tbl v10.16b, {v18.16b},v11.16b
  271. tbl v3.16b, {v18.16b},v4.16b // vpshufb %xmm4, %xmm10, %xmm3 # 3 = 1/jak
  272. tbl v11.16b, {v18.16b},v12.16b
  273. eor v2.16b, v2.16b, v1.16b // vpxor %xmm1, %xmm2, %xmm2 # 2 = io
  274. eor v10.16b, v10.16b, v9.16b
  275. eor v3.16b, v3.16b, v0.16b // vpxor %xmm0, %xmm3, %xmm3 # 3 = jo
  276. eor v11.16b, v11.16b, v8.16b
  277. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm5
  278. cbnz w8, .Lenc_2x_loop
  279. // middle of last round
  280. add x10, x11, #0x80
  281. // vmovdqa -0x60(%r10), %xmm4 # 3 : sbou .Lk_sbo
  282. // vmovdqa -0x50(%r10), %xmm0 # 0 : sbot .Lk_sbo+16
  283. tbl v4.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbou
  284. tbl v12.16b, {v22.16b}, v10.16b
  285. ld1 {v1.2d}, [x10] // vmovdqa 0x40(%r11,%r10), %xmm1 # .Lk_sr[]
  286. tbl v0.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm0, %xmm0 # 0 = sb1t
  287. tbl v8.16b, {v23.16b}, v11.16b
  288. eor v4.16b, v4.16b, v16.16b // vpxor %xmm5, %xmm4, %xmm4 # 4 = sb1u + k
  289. eor v12.16b, v12.16b, v16.16b
  290. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 0 = A
  291. eor v8.16b, v8.16b, v12.16b
  292. tbl v0.16b, {v0.16b},v1.16b // vpshufb %xmm1, %xmm0, %xmm0
  293. tbl v1.16b, {v8.16b},v1.16b
  294. ret
  295. .size _vpaes_encrypt_2x,.-_vpaes_encrypt_2x
  296. .type _vpaes_decrypt_preheat,%function
  297. .align 4
  298. _vpaes_decrypt_preheat:
  299. adr x10, .Lk_inv
  300. movi v17.16b, #0x0f
  301. adr x11, .Lk_dipt
  302. ld1 {v18.2d,v19.2d}, [x10],#32 // .Lk_inv
  303. ld1 {v20.2d,v21.2d,v22.2d,v23.2d}, [x11],#64 // .Lk_dipt, .Lk_dsbo
  304. ld1 {v24.2d,v25.2d,v26.2d,v27.2d}, [x11],#64 // .Lk_dsb9, .Lk_dsbd
  305. ld1 {v28.2d,v29.2d,v30.2d,v31.2d}, [x11] // .Lk_dsbb, .Lk_dsbe
  306. ret
  307. .size _vpaes_decrypt_preheat,.-_vpaes_decrypt_preheat
  308. ##
  309. ## Decryption core
  310. ##
  311. ## Same API as encryption core.
  312. ##
  313. .type _vpaes_decrypt_core,%function
  314. .align 4
  315. _vpaes_decrypt_core:
  316. mov x9, x2
  317. ldr w8, [x2,#240] // pull rounds
  318. // vmovdqa .Lk_dipt(%rip), %xmm2 # iptlo
  319. lsl x11, x8, #4 // mov %rax, %r11; shl $4, %r11
  320. eor x11, x11, #0x30 // xor $0x30, %r11
  321. adr x10, .Lk_sr
  322. and x11, x11, #0x30 // and $0x30, %r11
  323. add x11, x11, x10
  324. adr x10, .Lk_mc_forward+48
  325. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm4 # round0 key
  326. and v1.16b, v7.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  327. ushr v0.16b, v7.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  328. tbl v2.16b, {v20.16b}, v1.16b // vpshufb %xmm1, %xmm2, %xmm2
  329. ld1 {v5.2d}, [x10] // vmovdqa .Lk_mc_forward+48(%rip), %xmm5
  330. // vmovdqa .Lk_dipt+16(%rip), %xmm1 # ipthi
  331. tbl v0.16b, {v21.16b}, v0.16b // vpshufb %xmm0, %xmm1, %xmm0
  332. eor v2.16b, v2.16b, v16.16b // vpxor %xmm4, %xmm2, %xmm2
  333. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  334. b .Ldec_entry
  335. .align 4
  336. .Ldec_loop:
  337. //
  338. // Inverse mix columns
  339. //
  340. // vmovdqa -0x20(%r10),%xmm4 # 4 : sb9u
  341. // vmovdqa -0x10(%r10),%xmm1 # 0 : sb9t
  342. tbl v4.16b, {v24.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sb9u
  343. tbl v1.16b, {v25.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sb9t
  344. eor v0.16b, v4.16b, v16.16b // vpxor %xmm4, %xmm0, %xmm0
  345. // vmovdqa 0x00(%r10),%xmm4 # 4 : sbdu
  346. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  347. // vmovdqa 0x10(%r10),%xmm1 # 0 : sbdt
  348. tbl v4.16b, {v26.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbdu
  349. tbl v0.16b, {v0.16b}, v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  350. tbl v1.16b, {v27.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbdt
  351. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  352. // vmovdqa 0x20(%r10), %xmm4 # 4 : sbbu
  353. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  354. // vmovdqa 0x30(%r10), %xmm1 # 0 : sbbt
  355. tbl v4.16b, {v28.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbbu
  356. tbl v0.16b, {v0.16b}, v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  357. tbl v1.16b, {v29.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbbt
  358. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  359. // vmovdqa 0x40(%r10), %xmm4 # 4 : sbeu
  360. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  361. // vmovdqa 0x50(%r10), %xmm1 # 0 : sbet
  362. tbl v4.16b, {v30.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbeu
  363. tbl v0.16b, {v0.16b}, v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  364. tbl v1.16b, {v31.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbet
  365. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  366. ext v5.16b, v5.16b, v5.16b, #12 // vpalignr $12, %xmm5, %xmm5, %xmm5
  367. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  368. sub w8, w8, #1 // sub $1,%rax # nr--
  369. .Ldec_entry:
  370. // top of round
  371. and v1.16b, v0.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1 # 0 = k
  372. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  373. tbl v2.16b, {v19.16b}, v1.16b // vpshufb %xmm1, %xmm11, %xmm2 # 2 = a/k
  374. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  375. tbl v3.16b, {v18.16b}, v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  376. tbl v4.16b, {v18.16b}, v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  377. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  378. eor v4.16b, v4.16b, v2.16b // vpxor %xmm2, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  379. tbl v2.16b, {v18.16b}, v3.16b // vpshufb %xmm3, %xmm10, %xmm2 # 2 = 1/iak
  380. tbl v3.16b, {v18.16b}, v4.16b // vpshufb %xmm4, %xmm10, %xmm3 # 3 = 1/jak
  381. eor v2.16b, v2.16b, v1.16b // vpxor %xmm1, %xmm2, %xmm2 # 2 = io
  382. eor v3.16b, v3.16b, v0.16b // vpxor %xmm0, %xmm3, %xmm3 # 3 = jo
  383. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm0
  384. cbnz w8, .Ldec_loop
  385. // middle of last round
  386. // vmovdqa 0x60(%r10), %xmm4 # 3 : sbou
  387. tbl v4.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbou
  388. // vmovdqa 0x70(%r10), %xmm1 # 0 : sbot
  389. ld1 {v2.2d}, [x11] // vmovdqa -0x160(%r11), %xmm2 # .Lk_sr-.Lk_dsbd=-0x160
  390. tbl v1.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sb1t
  391. eor v4.16b, v4.16b, v16.16b // vpxor %xmm0, %xmm4, %xmm4 # 4 = sb1u + k
  392. eor v0.16b, v1.16b, v4.16b // vpxor %xmm4, %xmm1, %xmm0 # 0 = A
  393. tbl v0.16b, {v0.16b}, v2.16b // vpshufb %xmm2, %xmm0, %xmm0
  394. ret
  395. .size _vpaes_decrypt_core,.-_vpaes_decrypt_core
  396. .globl vpaes_decrypt
  397. .type vpaes_decrypt,%function
  398. .align 4
  399. vpaes_decrypt:
  400. stp x29,x30,[sp,#-16]!
  401. add x29,sp,#0
  402. ld1 {v7.16b}, [x0]
  403. bl _vpaes_decrypt_preheat
  404. bl _vpaes_decrypt_core
  405. st1 {v0.16b}, [x1]
  406. ldp x29,x30,[sp],#16
  407. ret
  408. .size vpaes_decrypt,.-vpaes_decrypt
  409. // v14-v15 input, v0-v1 output
  410. .type _vpaes_decrypt_2x,%function
  411. .align 4
  412. _vpaes_decrypt_2x:
  413. mov x9, x2
  414. ldr w8, [x2,#240] // pull rounds
  415. // vmovdqa .Lk_dipt(%rip), %xmm2 # iptlo
  416. lsl x11, x8, #4 // mov %rax, %r11; shl $4, %r11
  417. eor x11, x11, #0x30 // xor $0x30, %r11
  418. adr x10, .Lk_sr
  419. and x11, x11, #0x30 // and $0x30, %r11
  420. add x11, x11, x10
  421. adr x10, .Lk_mc_forward+48
  422. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm4 # round0 key
  423. and v1.16b, v14.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  424. ushr v0.16b, v14.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  425. and v9.16b, v15.16b, v17.16b
  426. ushr v8.16b, v15.16b, #4
  427. tbl v2.16b, {v20.16b},v1.16b // vpshufb %xmm1, %xmm2, %xmm2
  428. tbl v10.16b, {v20.16b},v9.16b
  429. ld1 {v5.2d}, [x10] // vmovdqa .Lk_mc_forward+48(%rip), %xmm5
  430. // vmovdqa .Lk_dipt+16(%rip), %xmm1 # ipthi
  431. tbl v0.16b, {v21.16b},v0.16b // vpshufb %xmm0, %xmm1, %xmm0
  432. tbl v8.16b, {v21.16b},v8.16b
  433. eor v2.16b, v2.16b, v16.16b // vpxor %xmm4, %xmm2, %xmm2
  434. eor v10.16b, v10.16b, v16.16b
  435. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  436. eor v8.16b, v8.16b, v10.16b
  437. b .Ldec_2x_entry
  438. .align 4
  439. .Ldec_2x_loop:
  440. //
  441. // Inverse mix columns
  442. //
  443. // vmovdqa -0x20(%r10),%xmm4 # 4 : sb9u
  444. // vmovdqa -0x10(%r10),%xmm1 # 0 : sb9t
  445. tbl v4.16b, {v24.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sb9u
  446. tbl v12.16b, {v24.16b}, v10.16b
  447. tbl v1.16b, {v25.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sb9t
  448. tbl v9.16b, {v25.16b}, v11.16b
  449. eor v0.16b, v4.16b, v16.16b // vpxor %xmm4, %xmm0, %xmm0
  450. eor v8.16b, v12.16b, v16.16b
  451. // vmovdqa 0x00(%r10),%xmm4 # 4 : sbdu
  452. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  453. eor v8.16b, v8.16b, v9.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  454. // vmovdqa 0x10(%r10),%xmm1 # 0 : sbdt
  455. tbl v4.16b, {v26.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbdu
  456. tbl v12.16b, {v26.16b}, v10.16b
  457. tbl v0.16b, {v0.16b},v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  458. tbl v8.16b, {v8.16b},v5.16b
  459. tbl v1.16b, {v27.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbdt
  460. tbl v9.16b, {v27.16b}, v11.16b
  461. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  462. eor v8.16b, v8.16b, v12.16b
  463. // vmovdqa 0x20(%r10), %xmm4 # 4 : sbbu
  464. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  465. eor v8.16b, v8.16b, v9.16b
  466. // vmovdqa 0x30(%r10), %xmm1 # 0 : sbbt
  467. tbl v4.16b, {v28.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbbu
  468. tbl v12.16b, {v28.16b}, v10.16b
  469. tbl v0.16b, {v0.16b},v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  470. tbl v8.16b, {v8.16b},v5.16b
  471. tbl v1.16b, {v29.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbbt
  472. tbl v9.16b, {v29.16b}, v11.16b
  473. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  474. eor v8.16b, v8.16b, v12.16b
  475. // vmovdqa 0x40(%r10), %xmm4 # 4 : sbeu
  476. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  477. eor v8.16b, v8.16b, v9.16b
  478. // vmovdqa 0x50(%r10), %xmm1 # 0 : sbet
  479. tbl v4.16b, {v30.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbeu
  480. tbl v12.16b, {v30.16b}, v10.16b
  481. tbl v0.16b, {v0.16b},v5.16b // vpshufb %xmm5, %xmm0, %xmm0 # MC ch
  482. tbl v8.16b, {v8.16b},v5.16b
  483. tbl v1.16b, {v31.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sbet
  484. tbl v9.16b, {v31.16b}, v11.16b
  485. eor v0.16b, v0.16b, v4.16b // vpxor %xmm4, %xmm0, %xmm0 # 4 = ch
  486. eor v8.16b, v8.16b, v12.16b
  487. ext v5.16b, v5.16b, v5.16b, #12 // vpalignr $12, %xmm5, %xmm5, %xmm5
  488. eor v0.16b, v0.16b, v1.16b // vpxor %xmm1, %xmm0, %xmm0 # 0 = ch
  489. eor v8.16b, v8.16b, v9.16b
  490. sub w8, w8, #1 // sub $1,%rax # nr--
  491. .Ldec_2x_entry:
  492. // top of round
  493. and v1.16b, v0.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1 # 0 = k
  494. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  495. and v9.16b, v8.16b, v17.16b
  496. ushr v8.16b, v8.16b, #4
  497. tbl v2.16b, {v19.16b},v1.16b // vpshufb %xmm1, %xmm11, %xmm2 # 2 = a/k
  498. tbl v10.16b, {v19.16b},v9.16b
  499. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  500. eor v9.16b, v9.16b, v8.16b
  501. tbl v3.16b, {v18.16b},v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  502. tbl v11.16b, {v18.16b},v8.16b
  503. tbl v4.16b, {v18.16b},v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  504. tbl v12.16b, {v18.16b},v9.16b
  505. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  506. eor v11.16b, v11.16b, v10.16b
  507. eor v4.16b, v4.16b, v2.16b // vpxor %xmm2, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  508. eor v12.16b, v12.16b, v10.16b
  509. tbl v2.16b, {v18.16b},v3.16b // vpshufb %xmm3, %xmm10, %xmm2 # 2 = 1/iak
  510. tbl v10.16b, {v18.16b},v11.16b
  511. tbl v3.16b, {v18.16b},v4.16b // vpshufb %xmm4, %xmm10, %xmm3 # 3 = 1/jak
  512. tbl v11.16b, {v18.16b},v12.16b
  513. eor v2.16b, v2.16b, v1.16b // vpxor %xmm1, %xmm2, %xmm2 # 2 = io
  514. eor v10.16b, v10.16b, v9.16b
  515. eor v3.16b, v3.16b, v0.16b // vpxor %xmm0, %xmm3, %xmm3 # 3 = jo
  516. eor v11.16b, v11.16b, v8.16b
  517. ld1 {v16.2d}, [x9],#16 // vmovdqu (%r9), %xmm0
  518. cbnz w8, .Ldec_2x_loop
  519. // middle of last round
  520. // vmovdqa 0x60(%r10), %xmm4 # 3 : sbou
  521. tbl v4.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm4, %xmm4 # 4 = sbou
  522. tbl v12.16b, {v22.16b}, v10.16b
  523. // vmovdqa 0x70(%r10), %xmm1 # 0 : sbot
  524. tbl v1.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm1, %xmm1 # 0 = sb1t
  525. tbl v9.16b, {v23.16b}, v11.16b
  526. ld1 {v2.2d}, [x11] // vmovdqa -0x160(%r11), %xmm2 # .Lk_sr-.Lk_dsbd=-0x160
  527. eor v4.16b, v4.16b, v16.16b // vpxor %xmm0, %xmm4, %xmm4 # 4 = sb1u + k
  528. eor v12.16b, v12.16b, v16.16b
  529. eor v0.16b, v1.16b, v4.16b // vpxor %xmm4, %xmm1, %xmm0 # 0 = A
  530. eor v8.16b, v9.16b, v12.16b
  531. tbl v0.16b, {v0.16b},v2.16b // vpshufb %xmm2, %xmm0, %xmm0
  532. tbl v1.16b, {v8.16b},v2.16b
  533. ret
  534. .size _vpaes_decrypt_2x,.-_vpaes_decrypt_2x
  535. ########################################################
  536. ## ##
  537. ## AES key schedule ##
  538. ## ##
  539. ########################################################
  540. .type _vpaes_key_preheat,%function
  541. .align 4
  542. _vpaes_key_preheat:
  543. adr x10, .Lk_inv
  544. movi v16.16b, #0x5b // .Lk_s63
  545. adr x11, .Lk_sb1
  546. movi v17.16b, #0x0f // .Lk_s0F
  547. ld1 {v18.2d,v19.2d,v20.2d,v21.2d}, [x10] // .Lk_inv, .Lk_ipt
  548. adr x10, .Lk_dksd
  549. ld1 {v22.2d,v23.2d}, [x11] // .Lk_sb1
  550. adr x11, .Lk_mc_forward
  551. ld1 {v24.2d,v25.2d,v26.2d,v27.2d}, [x10],#64 // .Lk_dksd, .Lk_dksb
  552. ld1 {v28.2d,v29.2d,v30.2d,v31.2d}, [x10],#64 // .Lk_dkse, .Lk_dks9
  553. ld1 {v8.2d}, [x10] // .Lk_rcon
  554. ld1 {v9.2d}, [x11] // .Lk_mc_forward[0]
  555. ret
  556. .size _vpaes_key_preheat,.-_vpaes_key_preheat
  557. .type _vpaes_schedule_core,%function
  558. .align 4
  559. _vpaes_schedule_core:
  560. stp x29, x30, [sp,#-16]!
  561. add x29,sp,#0
  562. bl _vpaes_key_preheat // load the tables
  563. ld1 {v0.16b}, [x0],#16 // vmovdqu (%rdi), %xmm0 # load key (unaligned)
  564. // input transform
  565. mov v3.16b, v0.16b // vmovdqa %xmm0, %xmm3
  566. bl _vpaes_schedule_transform
  567. mov v7.16b, v0.16b // vmovdqa %xmm0, %xmm7
  568. adr x10, .Lk_sr // lea .Lk_sr(%rip),%r10
  569. add x8, x8, x10
  570. cbnz w3, .Lschedule_am_decrypting
  571. // encrypting, output zeroth round key after transform
  572. st1 {v0.2d}, [x2] // vmovdqu %xmm0, (%rdx)
  573. b .Lschedule_go
  574. .Lschedule_am_decrypting:
  575. // decrypting, output zeroth round key after shiftrows
  576. ld1 {v1.2d}, [x8] // vmovdqa (%r8,%r10), %xmm1
  577. tbl v3.16b, {v3.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  578. st1 {v3.2d}, [x2] // vmovdqu %xmm3, (%rdx)
  579. eor x8, x8, #0x30 // xor $0x30, %r8
  580. .Lschedule_go:
  581. cmp w1, #192 // cmp $192, %esi
  582. b.hi .Lschedule_256
  583. b.eq .Lschedule_192
  584. // 128: fall though
  585. ##
  586. ## .schedule_128
  587. ##
  588. ## 128-bit specific part of key schedule.
  589. ##
  590. ## This schedule is really simple, because all its parts
  591. ## are accomplished by the subroutines.
  592. ##
  593. .Lschedule_128:
  594. mov x0, #10 // mov $10, %esi
  595. .Loop_schedule_128:
  596. sub x0, x0, #1 // dec %esi
  597. bl _vpaes_schedule_round
  598. cbz x0, .Lschedule_mangle_last
  599. bl _vpaes_schedule_mangle // write output
  600. b .Loop_schedule_128
  601. ##
  602. ## .aes_schedule_192
  603. ##
  604. ## 192-bit specific part of key schedule.
  605. ##
  606. ## The main body of this schedule is the same as the 128-bit
  607. ## schedule, but with more smearing. The long, high side is
  608. ## stored in %xmm7 as before, and the short, low side is in
  609. ## the high bits of %xmm6.
  610. ##
  611. ## This schedule is somewhat nastier, however, because each
  612. ## round produces 192 bits of key material, or 1.5 round keys.
  613. ## Therefore, on each cycle we do 2 rounds and produce 3 round
  614. ## keys.
  615. ##
  616. .align 4
  617. .Lschedule_192:
  618. sub x0, x0, #8
  619. ld1 {v0.16b}, [x0] // vmovdqu 8(%rdi),%xmm0 # load key part 2 (very unaligned)
  620. bl _vpaes_schedule_transform // input transform
  621. mov v6.16b, v0.16b // vmovdqa %xmm0, %xmm6 # save short part
  622. eor v4.16b, v4.16b, v4.16b // vpxor %xmm4, %xmm4, %xmm4 # clear 4
  623. ins v6.d[0], v4.d[0] // vmovhlps %xmm4, %xmm6, %xmm6 # clobber low side with zeros
  624. mov x0, #4 // mov $4, %esi
  625. .Loop_schedule_192:
  626. sub x0, x0, #1 // dec %esi
  627. bl _vpaes_schedule_round
  628. ext v0.16b, v6.16b, v0.16b, #8 // vpalignr $8,%xmm6,%xmm0,%xmm0
  629. bl _vpaes_schedule_mangle // save key n
  630. bl _vpaes_schedule_192_smear
  631. bl _vpaes_schedule_mangle // save key n+1
  632. bl _vpaes_schedule_round
  633. cbz x0, .Lschedule_mangle_last
  634. bl _vpaes_schedule_mangle // save key n+2
  635. bl _vpaes_schedule_192_smear
  636. b .Loop_schedule_192
  637. ##
  638. ## .aes_schedule_256
  639. ##
  640. ## 256-bit specific part of key schedule.
  641. ##
  642. ## The structure here is very similar to the 128-bit
  643. ## schedule, but with an additional "low side" in
  644. ## %xmm6. The low side's rounds are the same as the
  645. ## high side's, except no rcon and no rotation.
  646. ##
  647. .align 4
  648. .Lschedule_256:
  649. ld1 {v0.16b}, [x0] // vmovdqu 16(%rdi),%xmm0 # load key part 2 (unaligned)
  650. bl _vpaes_schedule_transform // input transform
  651. mov x0, #7 // mov $7, %esi
  652. .Loop_schedule_256:
  653. sub x0, x0, #1 // dec %esi
  654. bl _vpaes_schedule_mangle // output low result
  655. mov v6.16b, v0.16b // vmovdqa %xmm0, %xmm6 # save cur_lo in xmm6
  656. // high round
  657. bl _vpaes_schedule_round
  658. cbz x0, .Lschedule_mangle_last
  659. bl _vpaes_schedule_mangle
  660. // low round. swap xmm7 and xmm6
  661. dup v0.4s, v0.s[3] // vpshufd $0xFF, %xmm0, %xmm0
  662. movi v4.16b, #0
  663. mov v5.16b, v7.16b // vmovdqa %xmm7, %xmm5
  664. mov v7.16b, v6.16b // vmovdqa %xmm6, %xmm7
  665. bl _vpaes_schedule_low_round
  666. mov v7.16b, v5.16b // vmovdqa %xmm5, %xmm7
  667. b .Loop_schedule_256
  668. ##
  669. ## .aes_schedule_mangle_last
  670. ##
  671. ## Mangler for last round of key schedule
  672. ## Mangles %xmm0
  673. ## when encrypting, outputs out(%xmm0) ^ 63
  674. ## when decrypting, outputs unskew(%xmm0)
  675. ##
  676. ## Always called right before return... jumps to cleanup and exits
  677. ##
  678. .align 4
  679. .Lschedule_mangle_last:
  680. // schedule last round key from xmm0
  681. adr x11, .Lk_deskew // lea .Lk_deskew(%rip),%r11 # prepare to deskew
  682. cbnz w3, .Lschedule_mangle_last_dec
  683. // encrypting
  684. ld1 {v1.2d}, [x8] // vmovdqa (%r8,%r10),%xmm1
  685. adr x11, .Lk_opt // lea .Lk_opt(%rip), %r11 # prepare to output transform
  686. add x2, x2, #32 // add $32, %rdx
  687. tbl v0.16b, {v0.16b}, v1.16b // vpshufb %xmm1, %xmm0, %xmm0 # output permute
  688. .Lschedule_mangle_last_dec:
  689. ld1 {v20.2d,v21.2d}, [x11] // reload constants
  690. sub x2, x2, #16 // add $-16, %rdx
  691. eor v0.16b, v0.16b, v16.16b // vpxor .Lk_s63(%rip), %xmm0, %xmm0
  692. bl _vpaes_schedule_transform // output transform
  693. st1 {v0.2d}, [x2] // vmovdqu %xmm0, (%rdx) # save last key
  694. // cleanup
  695. eor v0.16b, v0.16b, v0.16b // vpxor %xmm0, %xmm0, %xmm0
  696. eor v1.16b, v1.16b, v1.16b // vpxor %xmm1, %xmm1, %xmm1
  697. eor v2.16b, v2.16b, v2.16b // vpxor %xmm2, %xmm2, %xmm2
  698. eor v3.16b, v3.16b, v3.16b // vpxor %xmm3, %xmm3, %xmm3
  699. eor v4.16b, v4.16b, v4.16b // vpxor %xmm4, %xmm4, %xmm4
  700. eor v5.16b, v5.16b, v5.16b // vpxor %xmm5, %xmm5, %xmm5
  701. eor v6.16b, v6.16b, v6.16b // vpxor %xmm6, %xmm6, %xmm6
  702. eor v7.16b, v7.16b, v7.16b // vpxor %xmm7, %xmm7, %xmm7
  703. ldp x29, x30, [sp],#16
  704. ret
  705. .size _vpaes_schedule_core,.-_vpaes_schedule_core
  706. ##
  707. ## .aes_schedule_192_smear
  708. ##
  709. ## Smear the short, low side in the 192-bit key schedule.
  710. ##
  711. ## Inputs:
  712. ## %xmm7: high side, b a x y
  713. ## %xmm6: low side, d c 0 0
  714. ## %xmm13: 0
  715. ##
  716. ## Outputs:
  717. ## %xmm6: b+c+d b+c 0 0
  718. ## %xmm0: b+c+d b+c b a
  719. ##
  720. .type _vpaes_schedule_192_smear,%function
  721. .align 4
  722. _vpaes_schedule_192_smear:
  723. movi v1.16b, #0
  724. dup v0.4s, v7.s[3]
  725. ins v1.s[3], v6.s[2] // vpshufd $0x80, %xmm6, %xmm1 # d c 0 0 -> c 0 0 0
  726. ins v0.s[0], v7.s[2] // vpshufd $0xFE, %xmm7, %xmm0 # b a _ _ -> b b b a
  727. eor v6.16b, v6.16b, v1.16b // vpxor %xmm1, %xmm6, %xmm6 # -> c+d c 0 0
  728. eor v1.16b, v1.16b, v1.16b // vpxor %xmm1, %xmm1, %xmm1
  729. eor v6.16b, v6.16b, v0.16b // vpxor %xmm0, %xmm6, %xmm6 # -> b+c+d b+c b a
  730. mov v0.16b, v6.16b // vmovdqa %xmm6, %xmm0
  731. ins v6.d[0], v1.d[0] // vmovhlps %xmm1, %xmm6, %xmm6 # clobber low side with zeros
  732. ret
  733. .size _vpaes_schedule_192_smear,.-_vpaes_schedule_192_smear
  734. ##
  735. ## .aes_schedule_round
  736. ##
  737. ## Runs one main round of the key schedule on %xmm0, %xmm7
  738. ##
  739. ## Specifically, runs subbytes on the high dword of %xmm0
  740. ## then rotates it by one byte and xors into the low dword of
  741. ## %xmm7.
  742. ##
  743. ## Adds rcon from low byte of %xmm8, then rotates %xmm8 for
  744. ## next rcon.
  745. ##
  746. ## Smears the dwords of %xmm7 by xoring the low into the
  747. ## second low, result into third, result into highest.
  748. ##
  749. ## Returns results in %xmm7 = %xmm0.
  750. ## Clobbers %xmm1-%xmm4, %r11.
  751. ##
  752. .type _vpaes_schedule_round,%function
  753. .align 4
  754. _vpaes_schedule_round:
  755. // extract rcon from xmm8
  756. movi v4.16b, #0 // vpxor %xmm4, %xmm4, %xmm4
  757. ext v1.16b, v8.16b, v4.16b, #15 // vpalignr $15, %xmm8, %xmm4, %xmm1
  758. ext v8.16b, v8.16b, v8.16b, #15 // vpalignr $15, %xmm8, %xmm8, %xmm8
  759. eor v7.16b, v7.16b, v1.16b // vpxor %xmm1, %xmm7, %xmm7
  760. // rotate
  761. dup v0.4s, v0.s[3] // vpshufd $0xFF, %xmm0, %xmm0
  762. ext v0.16b, v0.16b, v0.16b, #1 // vpalignr $1, %xmm0, %xmm0, %xmm0
  763. // fall through...
  764. // low round: same as high round, but no rotation and no rcon.
  765. _vpaes_schedule_low_round:
  766. // smear xmm7
  767. ext v1.16b, v4.16b, v7.16b, #12 // vpslldq $4, %xmm7, %xmm1
  768. eor v7.16b, v7.16b, v1.16b // vpxor %xmm1, %xmm7, %xmm7
  769. ext v4.16b, v4.16b, v7.16b, #8 // vpslldq $8, %xmm7, %xmm4
  770. // subbytes
  771. and v1.16b, v0.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1 # 0 = k
  772. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0 # 1 = i
  773. eor v7.16b, v7.16b, v4.16b // vpxor %xmm4, %xmm7, %xmm7
  774. tbl v2.16b, {v19.16b}, v1.16b // vpshufb %xmm1, %xmm11, %xmm2 # 2 = a/k
  775. eor v1.16b, v1.16b, v0.16b // vpxor %xmm0, %xmm1, %xmm1 # 0 = j
  776. tbl v3.16b, {v18.16b}, v0.16b // vpshufb %xmm0, %xmm10, %xmm3 # 3 = 1/i
  777. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3 # 3 = iak = 1/i + a/k
  778. tbl v4.16b, {v18.16b}, v1.16b // vpshufb %xmm1, %xmm10, %xmm4 # 4 = 1/j
  779. eor v7.16b, v7.16b, v16.16b // vpxor .Lk_s63(%rip), %xmm7, %xmm7
  780. tbl v3.16b, {v18.16b}, v3.16b // vpshufb %xmm3, %xmm10, %xmm3 # 2 = 1/iak
  781. eor v4.16b, v4.16b, v2.16b // vpxor %xmm2, %xmm4, %xmm4 # 4 = jak = 1/j + a/k
  782. tbl v2.16b, {v18.16b}, v4.16b // vpshufb %xmm4, %xmm10, %xmm2 # 3 = 1/jak
  783. eor v3.16b, v3.16b, v1.16b // vpxor %xmm1, %xmm3, %xmm3 # 2 = io
  784. eor v2.16b, v2.16b, v0.16b // vpxor %xmm0, %xmm2, %xmm2 # 3 = jo
  785. tbl v4.16b, {v23.16b}, v3.16b // vpshufb %xmm3, %xmm13, %xmm4 # 4 = sbou
  786. tbl v1.16b, {v22.16b}, v2.16b // vpshufb %xmm2, %xmm12, %xmm1 # 0 = sb1t
  787. eor v1.16b, v1.16b, v4.16b // vpxor %xmm4, %xmm1, %xmm1 # 0 = sbox output
  788. // add in smeared stuff
  789. eor v0.16b, v1.16b, v7.16b // vpxor %xmm7, %xmm1, %xmm0
  790. eor v7.16b, v1.16b, v7.16b // vmovdqa %xmm0, %xmm7
  791. ret
  792. .size _vpaes_schedule_round,.-_vpaes_schedule_round
  793. ##
  794. ## .aes_schedule_transform
  795. ##
  796. ## Linear-transform %xmm0 according to tables at (%r11)
  797. ##
  798. ## Requires that %xmm9 = 0x0F0F... as in preheat
  799. ## Output in %xmm0
  800. ## Clobbers %xmm1, %xmm2
  801. ##
  802. .type _vpaes_schedule_transform,%function
  803. .align 4
  804. _vpaes_schedule_transform:
  805. and v1.16b, v0.16b, v17.16b // vpand %xmm9, %xmm0, %xmm1
  806. ushr v0.16b, v0.16b, #4 // vpsrlb $4, %xmm0, %xmm0
  807. // vmovdqa (%r11), %xmm2 # lo
  808. tbl v2.16b, {v20.16b}, v1.16b // vpshufb %xmm1, %xmm2, %xmm2
  809. // vmovdqa 16(%r11), %xmm1 # hi
  810. tbl v0.16b, {v21.16b}, v0.16b // vpshufb %xmm0, %xmm1, %xmm0
  811. eor v0.16b, v0.16b, v2.16b // vpxor %xmm2, %xmm0, %xmm0
  812. ret
  813. .size _vpaes_schedule_transform,.-_vpaes_schedule_transform
  814. ##
  815. ## .aes_schedule_mangle
  816. ##
  817. ## Mangle xmm0 from (basis-transformed) standard version
  818. ## to our version.
  819. ##
  820. ## On encrypt,
  821. ## xor with 0x63
  822. ## multiply by circulant 0,1,1,1
  823. ## apply shiftrows transform
  824. ##
  825. ## On decrypt,
  826. ## xor with 0x63
  827. ## multiply by "inverse mixcolumns" circulant E,B,D,9
  828. ## deskew
  829. ## apply shiftrows transform
  830. ##
  831. ##
  832. ## Writes out to (%rdx), and increments or decrements it
  833. ## Keeps track of round number mod 4 in %r8
  834. ## Preserves xmm0
  835. ## Clobbers xmm1-xmm5
  836. ##
  837. .type _vpaes_schedule_mangle,%function
  838. .align 4
  839. _vpaes_schedule_mangle:
  840. mov v4.16b, v0.16b // vmovdqa %xmm0, %xmm4 # save xmm0 for later
  841. // vmovdqa .Lk_mc_forward(%rip),%xmm5
  842. cbnz w3, .Lschedule_mangle_dec
  843. // encrypting
  844. eor v4.16b, v0.16b, v16.16b // vpxor .Lk_s63(%rip), %xmm0, %xmm4
  845. add x2, x2, #16 // add $16, %rdx
  846. tbl v4.16b, {v4.16b}, v9.16b // vpshufb %xmm5, %xmm4, %xmm4
  847. tbl v1.16b, {v4.16b}, v9.16b // vpshufb %xmm5, %xmm4, %xmm1
  848. tbl v3.16b, {v1.16b}, v9.16b // vpshufb %xmm5, %xmm1, %xmm3
  849. eor v4.16b, v4.16b, v1.16b // vpxor %xmm1, %xmm4, %xmm4
  850. ld1 {v1.2d}, [x8] // vmovdqa (%r8,%r10), %xmm1
  851. eor v3.16b, v3.16b, v4.16b // vpxor %xmm4, %xmm3, %xmm3
  852. b .Lschedule_mangle_both
  853. .align 4
  854. .Lschedule_mangle_dec:
  855. // inverse mix columns
  856. // lea .Lk_dksd(%rip),%r11
  857. ushr v1.16b, v4.16b, #4 // vpsrlb $4, %xmm4, %xmm1 # 1 = hi
  858. and v4.16b, v4.16b, v17.16b // vpand %xmm9, %xmm4, %xmm4 # 4 = lo
  859. // vmovdqa 0x00(%r11), %xmm2
  860. tbl v2.16b, {v24.16b}, v4.16b // vpshufb %xmm4, %xmm2, %xmm2
  861. // vmovdqa 0x10(%r11), %xmm3
  862. tbl v3.16b, {v25.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  863. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3
  864. tbl v3.16b, {v3.16b}, v9.16b // vpshufb %xmm5, %xmm3, %xmm3
  865. // vmovdqa 0x20(%r11), %xmm2
  866. tbl v2.16b, {v26.16b}, v4.16b // vpshufb %xmm4, %xmm2, %xmm2
  867. eor v2.16b, v2.16b, v3.16b // vpxor %xmm3, %xmm2, %xmm2
  868. // vmovdqa 0x30(%r11), %xmm3
  869. tbl v3.16b, {v27.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  870. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3
  871. tbl v3.16b, {v3.16b}, v9.16b // vpshufb %xmm5, %xmm3, %xmm3
  872. // vmovdqa 0x40(%r11), %xmm2
  873. tbl v2.16b, {v28.16b}, v4.16b // vpshufb %xmm4, %xmm2, %xmm2
  874. eor v2.16b, v2.16b, v3.16b // vpxor %xmm3, %xmm2, %xmm2
  875. // vmovdqa 0x50(%r11), %xmm3
  876. tbl v3.16b, {v29.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  877. eor v3.16b, v3.16b, v2.16b // vpxor %xmm2, %xmm3, %xmm3
  878. // vmovdqa 0x60(%r11), %xmm2
  879. tbl v2.16b, {v30.16b}, v4.16b // vpshufb %xmm4, %xmm2, %xmm2
  880. tbl v3.16b, {v3.16b}, v9.16b // vpshufb %xmm5, %xmm3, %xmm3
  881. // vmovdqa 0x70(%r11), %xmm4
  882. tbl v4.16b, {v31.16b}, v1.16b // vpshufb %xmm1, %xmm4, %xmm4
  883. ld1 {v1.2d}, [x8] // vmovdqa (%r8,%r10), %xmm1
  884. eor v2.16b, v2.16b, v3.16b // vpxor %xmm3, %xmm2, %xmm2
  885. eor v3.16b, v4.16b, v2.16b // vpxor %xmm2, %xmm4, %xmm3
  886. sub x2, x2, #16 // add $-16, %rdx
  887. .Lschedule_mangle_both:
  888. tbl v3.16b, {v3.16b}, v1.16b // vpshufb %xmm1, %xmm3, %xmm3
  889. add x8, x8, #64-16 // add $-16, %r8
  890. and x8, x8, #~(1<<6) // and $0x30, %r8
  891. st1 {v3.2d}, [x2] // vmovdqu %xmm3, (%rdx)
  892. ret
  893. .size _vpaes_schedule_mangle,.-_vpaes_schedule_mangle
  894. .globl vpaes_set_encrypt_key
  895. .type vpaes_set_encrypt_key,%function
  896. .align 4
  897. vpaes_set_encrypt_key:
  898. stp x29,x30,[sp,#-16]!
  899. add x29,sp,#0
  900. stp d8,d9,[sp,#-16]! // ABI spec says so
  901. lsr w9, w1, #5 // shr $5,%eax
  902. add w9, w9, #5 // $5,%eax
  903. str w9, [x2,#240] // mov %eax,240(%rdx) # AES_KEY->rounds = nbits/32+5;
  904. mov w3, #0 // mov $0,%ecx
  905. mov x8, #0x30 // mov $0x30,%r8d
  906. bl _vpaes_schedule_core
  907. eor x0, x0, x0
  908. ldp d8,d9,[sp],#16
  909. ldp x29,x30,[sp],#16
  910. ret
  911. .size vpaes_set_encrypt_key,.-vpaes_set_encrypt_key
  912. .globl vpaes_set_decrypt_key
  913. .type vpaes_set_decrypt_key,%function
  914. .align 4
  915. vpaes_set_decrypt_key:
  916. stp x29,x30,[sp,#-16]!
  917. add x29,sp,#0
  918. stp d8,d9,[sp,#-16]! // ABI spec says so
  919. lsr w9, w1, #5 // shr $5,%eax
  920. add w9, w9, #5 // $5,%eax
  921. str w9, [x2,#240] // mov %eax,240(%rdx) # AES_KEY->rounds = nbits/32+5;
  922. lsl w9, w9, #4 // shl $4,%eax
  923. add x2, x2, #16 // lea 16(%rdx,%rax),%rdx
  924. add x2, x2, x9
  925. mov w3, #1 // mov $1,%ecx
  926. lsr w8, w1, #1 // shr $1,%r8d
  927. and x8, x8, #32 // and $32,%r8d
  928. eor x8, x8, #32 // xor $32,%r8d # nbits==192?0:32
  929. bl _vpaes_schedule_core
  930. ldp d8,d9,[sp],#16
  931. ldp x29,x30,[sp],#16
  932. ret
  933. .size vpaes_set_decrypt_key,.-vpaes_set_decrypt_key
  934. .globl vpaes_cbc_encrypt
  935. .type vpaes_cbc_encrypt,%function
  936. .align 4
  937. vpaes_cbc_encrypt:
  938. cbz x2, .Lcbc_abort
  939. cmp w5, #0 // check direction
  940. b.eq vpaes_cbc_decrypt
  941. stp x29,x30,[sp,#-16]!
  942. add x29,sp,#0
  943. mov x17, x2 // reassign
  944. mov x2, x3 // reassign
  945. ld1 {v0.16b}, [x4] // load ivec
  946. bl _vpaes_encrypt_preheat
  947. b .Lcbc_enc_loop
  948. .align 4
  949. .Lcbc_enc_loop:
  950. ld1 {v7.16b}, [x0],#16 // load input
  951. eor v7.16b, v7.16b, v0.16b // xor with ivec
  952. bl _vpaes_encrypt_core
  953. st1 {v0.16b}, [x1],#16 // save output
  954. subs x17, x17, #16
  955. b.hi .Lcbc_enc_loop
  956. st1 {v0.16b}, [x4] // write ivec
  957. ldp x29,x30,[sp],#16
  958. .Lcbc_abort:
  959. ret
  960. .size vpaes_cbc_encrypt,.-vpaes_cbc_encrypt
  961. .type vpaes_cbc_decrypt,%function
  962. .align 4
  963. vpaes_cbc_decrypt:
  964. stp x29,x30,[sp,#-16]!
  965. add x29,sp,#0
  966. stp d8,d9,[sp,#-16]! // ABI spec says so
  967. stp d10,d11,[sp,#-16]!
  968. stp d12,d13,[sp,#-16]!
  969. stp d14,d15,[sp,#-16]!
  970. mov x17, x2 // reassign
  971. mov x2, x3 // reassign
  972. ld1 {v6.16b}, [x4] // load ivec
  973. bl _vpaes_decrypt_preheat
  974. tst x17, #16
  975. b.eq .Lcbc_dec_loop2x
  976. ld1 {v7.16b}, [x0], #16 // load input
  977. bl _vpaes_decrypt_core
  978. eor v0.16b, v0.16b, v6.16b // xor with ivec
  979. orr v6.16b, v7.16b, v7.16b // next ivec value
  980. st1 {v0.16b}, [x1], #16
  981. subs x17, x17, #16
  982. b.ls .Lcbc_dec_done
  983. .align 4
  984. .Lcbc_dec_loop2x:
  985. ld1 {v14.16b,v15.16b}, [x0], #32
  986. bl _vpaes_decrypt_2x
  987. eor v0.16b, v0.16b, v6.16b // xor with ivec
  988. eor v1.16b, v1.16b, v14.16b
  989. orr v6.16b, v15.16b, v15.16b
  990. st1 {v0.16b,v1.16b}, [x1], #32
  991. subs x17, x17, #32
  992. b.hi .Lcbc_dec_loop2x
  993. .Lcbc_dec_done:
  994. st1 {v6.16b}, [x4]
  995. ldp d14,d15,[sp],#16
  996. ldp d12,d13,[sp],#16
  997. ldp d10,d11,[sp],#16
  998. ldp d8,d9,[sp],#16
  999. ldp x29,x30,[sp],#16
  1000. ret
  1001. .size vpaes_cbc_decrypt,.-vpaes_cbc_decrypt
  1002. .globl vpaes_ecb_encrypt
  1003. .type vpaes_ecb_encrypt,%function
  1004. .align 4
  1005. vpaes_ecb_encrypt:
  1006. stp x29,x30,[sp,#-16]!
  1007. add x29,sp,#0
  1008. stp d8,d9,[sp,#-16]! // ABI spec says so
  1009. stp d10,d11,[sp,#-16]!
  1010. stp d12,d13,[sp,#-16]!
  1011. stp d14,d15,[sp,#-16]!
  1012. mov x17, x2
  1013. mov x2, x3
  1014. bl _vpaes_encrypt_preheat
  1015. tst x17, #16
  1016. b.eq .Lecb_enc_loop
  1017. ld1 {v7.16b}, [x0],#16
  1018. bl _vpaes_encrypt_core
  1019. st1 {v0.16b}, [x1],#16
  1020. subs x17, x17, #16
  1021. b.ls .Lecb_enc_done
  1022. .align 4
  1023. .Lecb_enc_loop:
  1024. ld1 {v14.16b,v15.16b}, [x0], #32
  1025. bl _vpaes_encrypt_2x
  1026. st1 {v0.16b,v1.16b}, [x1], #32
  1027. subs x17, x17, #32
  1028. b.hi .Lecb_enc_loop
  1029. .Lecb_enc_done:
  1030. ldp d14,d15,[sp],#16
  1031. ldp d12,d13,[sp],#16
  1032. ldp d10,d11,[sp],#16
  1033. ldp d8,d9,[sp],#16
  1034. ldp x29,x30,[sp],#16
  1035. ret
  1036. .size vpaes_ecb_encrypt,.-vpaes_ecb_encrypt
  1037. .globl vpaes_ecb_decrypt
  1038. .type vpaes_ecb_decrypt,%function
  1039. .align 4
  1040. vpaes_ecb_decrypt:
  1041. stp x29,x30,[sp,#-16]!
  1042. add x29,sp,#0
  1043. stp d8,d9,[sp,#-16]! // ABI spec says so
  1044. stp d10,d11,[sp,#-16]!
  1045. stp d12,d13,[sp,#-16]!
  1046. stp d14,d15,[sp,#-16]!
  1047. mov x17, x2
  1048. mov x2, x3
  1049. bl _vpaes_decrypt_preheat
  1050. tst x17, #16
  1051. b.eq .Lecb_dec_loop
  1052. ld1 {v7.16b}, [x0],#16
  1053. bl _vpaes_encrypt_core
  1054. st1 {v0.16b}, [x1],#16
  1055. subs x17, x17, #16
  1056. b.ls .Lecb_dec_done
  1057. .align 4
  1058. .Lecb_dec_loop:
  1059. ld1 {v14.16b,v15.16b}, [x0], #32
  1060. bl _vpaes_decrypt_2x
  1061. st1 {v0.16b,v1.16b}, [x1], #32
  1062. subs x17, x17, #32
  1063. b.hi .Lecb_dec_loop
  1064. .Lecb_dec_done:
  1065. ldp d14,d15,[sp],#16
  1066. ldp d12,d13,[sp],#16
  1067. ldp d10,d11,[sp],#16
  1068. ldp d8,d9,[sp],#16
  1069. ldp x29,x30,[sp],#16
  1070. ret
  1071. .size vpaes_ecb_decrypt,.-vpaes_ecb_decrypt