2 * Copyright (C) 2011-2012 Free Software Foundation, Inc.
4 * Author: Nikos Mavrogiannopoulos
6 * This file is part of GnuTLS.
8 * The GnuTLS is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public License
10 * as published by the Free Software Foundation; either version 2.1 of
11 * the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful, but
14 * WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public License
19 * along with this program. If not, see <http://www.gnu.org/licenses/>
24 * The following code is an implementation of the AES-128-CBC cipher
25 * using intel's AES instruction set.
28 #include <gnutls_errors.h>
29 #include <gnutls_int.h>
30 #include <gnutls/crypto.h>
31 #include <gnutls_errors.h>
42 unsigned int _gnutls_x86_cpuid_s[4];
45 aes_cipher_init(gnutls_cipher_algorithm_t algorithm, void **_ctx, int enc)
47 /* we use key size to distinguish */
48 if (algorithm != GNUTLS_CIPHER_AES_128_CBC
49 && algorithm != GNUTLS_CIPHER_AES_192_CBC
50 && algorithm != GNUTLS_CIPHER_AES_256_CBC)
51 return GNUTLS_E_INVALID_REQUEST;
53 *_ctx = gnutls_calloc(1, sizeof(struct aes_ctx));
56 return GNUTLS_E_MEMORY_ERROR;
59 ((struct aes_ctx *) (*_ctx))->enc = enc;
65 aes_cipher_setkey(void *_ctx, const void *userkey, size_t keysize)
67 struct aes_ctx *ctx = _ctx;
72 aesni_set_encrypt_key(userkey, keysize * 8,
73 ALIGN16(&ctx->expanded_key));
76 aesni_set_decrypt_key(userkey, keysize * 8,
77 ALIGN16(&ctx->expanded_key));
80 return gnutls_assert_val(GNUTLS_E_ENCRYPTION_FAILED);
85 static int aes_setiv(void *_ctx, const void *iv, size_t iv_size)
87 struct aes_ctx *ctx = _ctx;
89 memcpy(ctx->iv, iv, 16);
94 aes_encrypt(void *_ctx, const void *src, size_t src_size,
95 void *dst, size_t dst_size)
97 struct aes_ctx *ctx = _ctx;
99 aesni_cbc_encrypt(src, dst, src_size, ALIGN16(&ctx->expanded_key),
105 aes_decrypt(void *_ctx, const void *src, size_t src_size,
106 void *dst, size_t dst_size)
108 struct aes_ctx *ctx = _ctx;
110 aesni_cbc_encrypt(src, dst, src_size, ALIGN16(&ctx->expanded_key),
116 static void aes_deinit(void *_ctx)
121 static const gnutls_crypto_cipher_st cipher_struct = {
122 .init = aes_cipher_init,
123 .setkey = aes_cipher_setkey,
125 .encrypt = aes_encrypt,
126 .decrypt = aes_decrypt,
127 .deinit = aes_deinit,
130 static unsigned check_optimized_aes(void)
132 return (_gnutls_x86_cpuid_s[2] & 0x2000000);
135 static unsigned check_ssse3(void)
137 return (_gnutls_x86_cpuid_s[2] & 0x0000200);
141 static unsigned check_pclmul(void)
143 return (_gnutls_x86_cpuid_s[2] & 0x2);
147 static unsigned check_intel_or_amd(void)
149 unsigned int a, b, c, d;
150 gnutls_cpuid(0, &a, &b, &c, &d);
152 if ((memcmp(&b, "Genu", 4) == 0 &&
153 memcmp(&d, "ineI", 4) == 0 &&
154 memcmp(&c, "ntel", 4) == 0) ||
155 (memcmp(&b, "Auth", 4) == 0 &&
156 memcmp(&d, "enti", 4) == 0 && memcmp(&c, "cAMD", 4) == 0)) {
163 void register_x86_crypto(void)
167 if (check_intel_or_amd() == 0)
170 gnutls_cpuid(1, &_gnutls_x86_cpuid_s[0], &_gnutls_x86_cpuid_s[1],
171 &_gnutls_x86_cpuid_s[2], &_gnutls_x86_cpuid_s[3]);
174 _gnutls_debug_log("Intel SSSE3 was detected\n");
177 gnutls_crypto_single_digest_register(GNUTLS_DIG_SHA1,
185 gnutls_crypto_single_digest_register(GNUTLS_DIG_SHA224,
193 gnutls_crypto_single_digest_register(GNUTLS_DIG_SHA256,
202 gnutls_crypto_single_mac_register(GNUTLS_DIG_SHA1,
204 &hmac_sha_x86_struct);
209 gnutls_crypto_single_mac_register(GNUTLS_DIG_SHA224,
211 &hmac_sha_x86_struct);
216 gnutls_crypto_single_mac_register(GNUTLS_DIG_SHA256,
218 &hmac_sha_x86_struct);
224 gnutls_crypto_single_digest_register(GNUTLS_DIG_SHA384,
231 gnutls_crypto_single_digest_register(GNUTLS_DIG_SHA512,
237 gnutls_crypto_single_mac_register(GNUTLS_DIG_SHA384,
239 &hmac_sha_x86_struct);
244 gnutls_crypto_single_mac_register(GNUTLS_DIG_SHA512,
246 &hmac_sha_x86_struct);
252 if (check_optimized_aes()) {
253 _gnutls_debug_log("Intel AES accelerator was detected\n");
255 gnutls_crypto_single_cipher_register
256 (GNUTLS_CIPHER_AES_128_CBC, 80, &cipher_struct);
262 gnutls_crypto_single_cipher_register
263 (GNUTLS_CIPHER_AES_192_CBC, 80, &cipher_struct);
269 gnutls_crypto_single_cipher_register
270 (GNUTLS_CIPHER_AES_256_CBC, 80, &cipher_struct);
275 if (check_pclmul()) {
276 /* register GCM ciphers */
278 ("Intel GCM accelerator was detected\n");
280 gnutls_crypto_single_cipher_register
281 (GNUTLS_CIPHER_AES_128_GCM, 80,
288 gnutls_crypto_single_cipher_register
289 (GNUTLS_CIPHER_AES_256_GCM, 80,
298 /* convert _gnutls_x86_cpuid_s the way openssl asm expects it */
299 _gnutls_x86_cpuid_s[1] = _gnutls_x86_cpuid_s[2];