003 File Manager
Current Path:
/usr/src/contrib/bearssl/src/symcipher
usr
/
src
/
contrib
/
bearssl
/
src
/
symcipher
/
📁
..
📄
aes_big_cbcdec.c
(2.09 KB)
📄
aes_big_cbcenc.c
(2.04 KB)
📄
aes_big_ctr.c
(2.27 KB)
📄
aes_big_ctrcbc.c
(3.81 KB)
📄
aes_big_dec.c
(9.29 KB)
📄
aes_big_enc.c
(6.34 KB)
📄
aes_common.c
(3.86 KB)
📄
aes_ct.c
(6.91 KB)
📄
aes_ct64.c
(8.83 KB)
📄
aes_ct64_cbcdec.c
(2.89 KB)
📄
aes_ct64_cbcenc.c
(2.56 KB)
📄
aes_ct64_ctr.c
(3.13 KB)
📄
aes_ct64_ctrcbc.c
(10.98 KB)
📄
aes_ct64_dec.c
(4.11 KB)
📄
aes_ct64_enc.c
(3.03 KB)
📄
aes_ct_cbcdec.c
(3.13 KB)
📄
aes_ct_cbcenc.c
(2.68 KB)
📄
aes_ct_ctr.c
(3.03 KB)
📄
aes_ct_ctrcbc.c
(10.39 KB)
📄
aes_ct_dec.c
(4.63 KB)
📄
aes_ct_enc.c
(2.89 KB)
📄
aes_pwr8.c
(8.85 KB)
📄
aes_pwr8_cbcdec.c
(14.52 KB)
📄
aes_pwr8_cbcenc.c
(8.8 KB)
📄
aes_pwr8_ctr.c
(15.47 KB)
📄
aes_pwr8_ctrcbc.c
(22.02 KB)
📄
aes_small_cbcdec.c
(2.1 KB)
📄
aes_small_cbcenc.c
(2.06 KB)
📄
aes_small_ctr.c
(2.29 KB)
📄
aes_small_ctrcbc.c
(3.86 KB)
📄
aes_small_dec.c
(5.04 KB)
📄
aes_small_enc.c
(3.12 KB)
📄
aes_x86ni.c
(5.94 KB)
📄
aes_x86ni_cbcdec.c
(6.48 KB)
📄
aes_x86ni_cbcenc.c
(3.39 KB)
📄
aes_x86ni_ctr.c
(6.47 KB)
📄
aes_x86ni_ctrcbc.c
(16.84 KB)
📄
chacha20_ct.c
(2.96 KB)
📄
chacha20_sse2.c
(5.7 KB)
📄
des_ct.c
(12.14 KB)
📄
des_ct_cbcdec.c
(2.45 KB)
📄
des_ct_cbcenc.c
(2.11 KB)
📄
des_support.c
(4.01 KB)
📄
des_tab.c
(10.24 KB)
📄
des_tab_cbcdec.c
(2.38 KB)
📄
des_tab_cbcenc.c
(2.04 KB)
📄
poly1305_ctmul.c
(7.2 KB)
📄
poly1305_ctmul32.c
(8.23 KB)
📄
poly1305_ctmulq.c
(11.32 KB)
📄
poly1305_i15.c
(5.32 KB)
Editing: chacha20_sse2.c
/* * Copyright (c) 2017 Thomas Pornin <pornin@bolet.org> * * Permission is hereby granted, free of charge, to any person obtaining * a copy of this software and associated documentation files (the * "Software"), to deal in the Software without restriction, including * without limitation the rights to use, copy, modify, merge, publish, * distribute, sublicense, and/or sell copies of the Software, and to * permit persons to whom the Software is furnished to do so, subject to * the following conditions: * * The above copyright notice and this permission notice shall be * included in all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE * SOFTWARE. */ #define BR_ENABLE_INTRINSICS 1 #include "inner.h" #if BR_SSE2 /* * This file contains a ChaCha20 implementation that leverages SSE2 * opcodes for better performance. */ /* see bearssl_block.h */ br_chacha20_run br_chacha20_sse2_get(void) { /* * If using 64-bit mode, then SSE2 opcodes should be automatically * available, since they are part of the ABI. * * In 32-bit mode, we use CPUID to detect the SSE2 feature. */ #if BR_amd64 return &br_chacha20_sse2_run; #else /* * SSE2 support is indicated by bit 26 in EDX. */ if (br_cpuid(0, 0, 0, 0x04000000)) { return &br_chacha20_sse2_run; } else { return 0; } #endif } BR_TARGETS_X86_UP /* see bearssl_block.h */ BR_TARGET("sse2") uint32_t br_chacha20_sse2_run(const void *key, const void *iv, uint32_t cc, void *data, size_t len) { unsigned char *buf; uint32_t ivtmp[4]; __m128i kw0, kw1; __m128i iw, cw; __m128i one; static const uint32_t CW[] = { 0x61707865, 0x3320646e, 0x79622d32, 0x6b206574 }; buf = data; kw0 = _mm_loadu_si128(key); kw1 = _mm_loadu_si128((const void *)((const unsigned char *)key + 16)); ivtmp[0] = cc; memcpy(ivtmp + 1, iv, 12); iw = _mm_loadu_si128((const void *)ivtmp); cw = _mm_loadu_si128((const void *)CW); one = _mm_set_epi32(0, 0, 0, 1); while (len > 0) { /* * sj contains state words 4*j to 4*j+3. */ __m128i s0, s1, s2, s3; int i; s0 = cw; s1 = kw0; s2 = kw1; s3 = iw; for (i = 0; i < 10; i ++) { /* * Even round is straightforward application on * the state words. */ s0 = _mm_add_epi32(s0, s1); s3 = _mm_xor_si128(s3, s0); s3 = _mm_or_si128( _mm_slli_epi32(s3, 16), _mm_srli_epi32(s3, 16)); s2 = _mm_add_epi32(s2, s3); s1 = _mm_xor_si128(s1, s2); s1 = _mm_or_si128( _mm_slli_epi32(s1, 12), _mm_srli_epi32(s1, 20)); s0 = _mm_add_epi32(s0, s1); s3 = _mm_xor_si128(s3, s0); s3 = _mm_or_si128( _mm_slli_epi32(s3, 8), _mm_srli_epi32(s3, 24)); s2 = _mm_add_epi32(s2, s3); s1 = _mm_xor_si128(s1, s2); s1 = _mm_or_si128( _mm_slli_epi32(s1, 7), _mm_srli_epi32(s1, 25)); /* * For the odd round, we must rotate some state * words so that the computations apply on the * right combinations of words. */ s1 = _mm_shuffle_epi32(s1, 0x39); s2 = _mm_shuffle_epi32(s2, 0x4E); s3 = _mm_shuffle_epi32(s3, 0x93); s0 = _mm_add_epi32(s0, s1); s3 = _mm_xor_si128(s3, s0); s3 = _mm_or_si128( _mm_slli_epi32(s3, 16), _mm_srli_epi32(s3, 16)); s2 = _mm_add_epi32(s2, s3); s1 = _mm_xor_si128(s1, s2); s1 = _mm_or_si128( _mm_slli_epi32(s1, 12), _mm_srli_epi32(s1, 20)); s0 = _mm_add_epi32(s0, s1); s3 = _mm_xor_si128(s3, s0); s3 = _mm_or_si128( _mm_slli_epi32(s3, 8), _mm_srli_epi32(s3, 24)); s2 = _mm_add_epi32(s2, s3); s1 = _mm_xor_si128(s1, s2); s1 = _mm_or_si128( _mm_slli_epi32(s1, 7), _mm_srli_epi32(s1, 25)); /* * After the odd round, we rotate back the values * to undo the rotate at the start of the odd round. */ s1 = _mm_shuffle_epi32(s1, 0x93); s2 = _mm_shuffle_epi32(s2, 0x4E); s3 = _mm_shuffle_epi32(s3, 0x39); } /* * Addition with the initial state. */ s0 = _mm_add_epi32(s0, cw); s1 = _mm_add_epi32(s1, kw0); s2 = _mm_add_epi32(s2, kw1); s3 = _mm_add_epi32(s3, iw); /* * Increment block counter. */ iw = _mm_add_epi32(iw, one); /* * XOR final state with the data. */ if (len < 64) { unsigned char tmp[64]; size_t u; _mm_storeu_si128((void *)(tmp + 0), s0); _mm_storeu_si128((void *)(tmp + 16), s1); _mm_storeu_si128((void *)(tmp + 32), s2); _mm_storeu_si128((void *)(tmp + 48), s3); for (u = 0; u < len; u ++) { buf[u] ^= tmp[u]; } break; } else { __m128i b0, b1, b2, b3; b0 = _mm_loadu_si128((const void *)(buf + 0)); b1 = _mm_loadu_si128((const void *)(buf + 16)); b2 = _mm_loadu_si128((const void *)(buf + 32)); b3 = _mm_loadu_si128((const void *)(buf + 48)); b0 = _mm_xor_si128(b0, s0); b1 = _mm_xor_si128(b1, s1); b2 = _mm_xor_si128(b2, s2); b3 = _mm_xor_si128(b3, s3); _mm_storeu_si128((void *)(buf + 0), b0); _mm_storeu_si128((void *)(buf + 16), b1); _mm_storeu_si128((void *)(buf + 32), b2); _mm_storeu_si128((void *)(buf + 48), b3); buf += 64; len -= 64; } } /* * _mm_extract_epi32() requires SSE4.1. We prefer to stick to * raw SSE2, thus we use _mm_extract_epi16(). */ return (uint32_t)_mm_extract_epi16(iw, 0) | ((uint32_t)_mm_extract_epi16(iw, 1) << 16); } BR_TARGETS_X86_DOWN #else /* see bearssl_block.h */ br_chacha20_run br_chacha20_sse2_get(void) { return 0; } #endif
Upload File
Create Folder