configure.ac: Don't be so picky about identifying ARM variants.
[catacomb] / symm / rijndael.c
CommitLineData
3a65506d 1/* -*-c-*-
2 *
3a65506d 3 * The Rijndael block cipher
4 *
5 * (c) 2000 Straylight/Edgeware
6 */
7
45c0fd36 8/*----- Licensing notice --------------------------------------------------*
3a65506d 9 *
10 * This file is part of Catacomb.
11 *
12 * Catacomb is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU Library General Public License as
14 * published by the Free Software Foundation; either version 2 of the
15 * License, or (at your option) any later version.
45c0fd36 16 *
3a65506d 17 * Catacomb is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU Library General Public License for more details.
45c0fd36 21 *
3a65506d 22 * You should have received a copy of the GNU Library General Public
23 * License along with Catacomb; if not, write to the Free
24 * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
25 * MA 02111-1307, USA.
26 */
27
3a65506d 28/*----- Header files ------------------------------------------------------*/
29
226639f3
MW
30#include "config.h"
31
3a65506d 32#include <assert.h>
33#include <stdio.h>
34
35#include <mLib/bits.h>
36
37#include "blkc.h"
226639f3 38#include "dispatch.h"
3a65506d 39#include "gcipher.h"
40#include "rijndael.h"
7cee294a 41#include "rijndael-base.h"
3a65506d 42
43/*----- Main code ---------------------------------------------------------*/
44
3a65506d 45/* --- @rijndael_init@ --- *
46 *
47 * Arguments: @rijndael_ctx *k@ = pointer to context to initialize
48 * @const void *buf@ = pointer to buffer of key material
49 * @size_t sz@ = size of the key material
50 *
51 * Returns: ---
52 *
53 * Use: Initializes a Rijndael context with a particular key. This
54 * implementation of Rijndael doesn't impose any particular
55 * limits on the key size except that it must be multiple of 4
56 * bytes long. 256 bits seems sensible, though.
57 */
58
59void rijndael_init(rijndael_ctx *k, const void *buf, size_t sz)
60{
7cee294a 61 rijndael_setup(k, RIJNDAEL_BLKSZ / 4, buf, sz);
3a65506d 62}
63
64/* --- @rijndael_eblk@, @rijndael_dblk@ --- *
65 *
66 * Arguments: @const rijndael_ctx *k@ = pointer to Rijndael context
67 * @const uint32 s[4]@ = pointer to source block
68 * @uint32 d[4]@ = pointer to destination block
69 *
70 * Returns: ---
71 *
72 * Use: Low-level block encryption and decryption.
73 */
74
8a1aa284
MW
75CPU_DISPATCH(EMPTY, EMPTY, void, rijndael_eblk,
76 (const rijndael_ctx *k, const uint32 s[4], uint32 d[4]),
226639f3
MW
77 (k, s, d), pick_eblk, simple_eblk)
78
8a1aa284
MW
79CPU_DISPATCH(EMPTY, EMPTY, void, rijndael_dblk,
80 (const rijndael_ctx *k, const uint32 s[4], uint32 d[4]),
226639f3
MW
81 (k, s, d), pick_dblk, simple_dblk)
82
0f23f75f
MW
83#if CPUFAM_X86 || CPUFAM_AMD64
84extern rijndael_eblk__functype rijndael_eblk_x86ish_aesni;
85extern rijndael_dblk__functype rijndael_dblk_x86ish_aesni;
226639f3 86#endif
26e182fc
MW
87#if CPUFAM_ARMEL && HAVE_AS_ARMV8_CRYPTO
88extern rijndael_eblk__functype rijndael_eblk_arm_crypto;
89extern rijndael_dblk__functype rijndael_dblk_arm_crypto;
90#endif
226639f3
MW
91
92static rijndael_eblk__functype *pick_eblk(void)
93{
0f23f75f
MW
94#if CPUFAM_X86 || CPUFAM_AMD64
95 DISPATCH_PICK_COND(rijndael_eblk, rijndael_eblk_x86ish_aesni,
fac645f7 96 cpu_feature_p(CPUFEAT_X86_AESNI));
226639f3 97#endif
26e182fc
MW
98#if CPUFAM_ARMEL && HAVE_AS_ARMV8_CRYPTO
99 DISPATCH_PICK_COND(rijndael_eblk, rijndael_eblk_arm_crypto,
100 cpu_feature_p(CPUFEAT_ARM_AES));
101#endif
fac645f7 102 DISPATCH_PICK_FALLBACK(rijndael_eblk, simple_eblk);
226639f3
MW
103}
104
105static rijndael_dblk__functype *pick_dblk(void)
106{
0f23f75f
MW
107#if CPUFAM_X86 || CPUFAM_AMD64
108 DISPATCH_PICK_COND(rijndael_dblk, rijndael_dblk_x86ish_aesni,
fac645f7 109 cpu_feature_p(CPUFEAT_X86_AESNI));
226639f3 110#endif
26e182fc
MW
111#if CPUFAM_ARMEL && HAVE_AS_ARMV8_CRYPTO
112 DISPATCH_PICK_COND(rijndael_dblk, rijndael_dblk_arm_crypto,
113 cpu_feature_p(CPUFEAT_ARM_AES));
114#endif
fac645f7 115 DISPATCH_PICK_FALLBACK(rijndael_dblk, simple_dblk);
226639f3
MW
116}
117
bb3d2477 118#define DO(what, t, aa, bb, cc, dd, a, b, c, d, w) do { \
119 aa = what(t, a, b, c, d) ^ *w++; \
120 bb = what(t, b, c, d, a) ^ *w++; \
121 cc = what(t, c, d, a, b) ^ *w++; \
122 dd = what(t, d, a, b, c) ^ *w++; \
3a65506d 123} while (0)
124
bb3d2477 125#define UNDO(what, t, aa, bb, cc, dd, a, b, c, d, w) do { \
126 aa = what(t, a, d, c, b) ^ *w++; \
127 bb = what(t, b, a, d, c) ^ *w++; \
128 cc = what(t, c, b, a, d) ^ *w++; \
129 dd = what(t, d, c, b, a) ^ *w++; \
3a65506d 130} while (0)
131
226639f3 132static void simple_eblk(const rijndael_ctx *k, const uint32 *s, uint32 *dst)
3a65506d 133{
134 uint32 a = s[0], b = s[1], c = s[2], d = s[3];
135 uint32 aa, bb, cc, dd;
78ec50fa 136 const uint32 *w = k->w;
3a65506d 137
138 a ^= *w++; b ^= *w++; c ^= *w++; d ^= *w++;
bb3d2477 139 aa = a; bb = b; cc = c; dd = d;
3a65506d 140
141 switch (k->nr) {
142 case 14:
bb3d2477 143 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
144 case 13:
145 DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
3a65506d 146 case 12:
bb3d2477 147 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
148 case 11:
149 DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
3a65506d 150 case 10:
151 default:
bb3d2477 152 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
153 DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
154 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
155 DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
156 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
157 DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
158 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
159 DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
160 DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
3a65506d 161 }
bb3d2477 162 DO(SUB, S, a, b, c, d, aa, bb, cc, dd, w);
3a65506d 163
164 dst[0] = a; dst[1] = b; dst[2] = c; dst[3] = d;
165}
166
226639f3 167static void simple_dblk(const rijndael_ctx *k, const uint32 *s, uint32 *dst)
3a65506d 168{
169 uint32 a = s[0], b = s[1], c = s[2], d = s[3];
170 uint32 aa, bb, cc, dd;
78ec50fa 171 const uint32 *w = k->wi;
3a65506d 172
173 a ^= *w++; b ^= *w++; c ^= *w++; d ^= *w++;
bb3d2477 174 aa = a; bb = b; cc = c; dd = d;
3a65506d 175
176 switch (k->nr) {
177 case 14:
bb3d2477 178 UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
179 case 13:
180 UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
3a65506d 181 case 12:
bb3d2477 182 UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
183 case 11:
184 UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
3a65506d 185 case 10:
186 default:
bb3d2477 187 UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
188 UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
189 UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
190 UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
191 UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
192 UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
193 UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
194 UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
195 UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
3a65506d 196 }
bb3d2477 197 UNDO(SUB, SI, a, b, c, d, aa, bb, cc, dd, w);
3a65506d 198
199 dst[0] = a; dst[1] = b; dst[2] = c; dst[3] = d;
200}
201
202BLKC_TEST(RIJNDAEL, rijndael)
203
204/*----- That's all, folks -------------------------------------------------*/