gmsm/sm4/cipher_asm.go

68 lines
1.5 KiB
Go
Raw Normal View History

2021-03-18 13:01:24 +08:00
// +build amd64
package sm4
import (
"crypto/cipher"
"golang.org/x/sys/cpu"
)
//go:noescape
func encryptBlocksAsm(xk *uint32, dst, src *byte)
2021-03-21 19:20:23 +08:00
//go:noescape
func encryptBlockAsm(xk *uint32, dst, src *byte)
2021-03-21 12:35:53 +08:00
//go:noescape
func expandKeyAsm(key *byte, ck, enc, dec *uint32)
2021-03-18 13:01:24 +08:00
type sm4CipherAsm struct {
sm4Cipher
}
var supportsAES = cpu.X86.HasAES
2021-03-19 17:17:19 +08:00
var supportsGFMUL = cpu.X86.HasPCLMULQDQ
2021-03-18 13:01:24 +08:00
func newCipher(key []byte) (cipher.Block, error) {
if !supportsAES {
return newCipherGeneric(key)
}
c := sm4CipherAsm{sm4Cipher{make([]uint32, rounds), make([]uint32, rounds)}}
2021-03-21 12:35:53 +08:00
expandKeyAsm(&key[0], &ck[0], &c.enc[0], &c.dec[0])
2021-03-19 17:17:19 +08:00
if supportsAES && supportsGFMUL {
return &sm4CipherGCM{c}, nil
}
2021-03-18 13:01:24 +08:00
return &c, nil
}
const FourBlocksSize = 64
func (c *sm4CipherAsm) BlockSize() int { return BlockSize }
func (c *sm4CipherAsm) Encrypt(dst, src []byte) {
if len(src) < BlockSize {
panic("sm4: input not full block")
}
if len(dst) < BlockSize {
panic("sm4: output not full block")
}
if InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
panic("sm4: invalid buffer overlap")
}
2021-03-21 19:20:23 +08:00
encryptBlockAsm(&c.enc[0], &dst[0], &src[0])
2021-03-18 13:01:24 +08:00
}
func (c *sm4CipherAsm) Decrypt(dst, src []byte) {
if len(src) < BlockSize {
panic("sm4: input not full block")
}
if len(dst) < BlockSize {
panic("sm4: output not full block")
}
if InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
panic("sm4: invalid buffer overlap")
}
2021-03-21 19:20:23 +08:00
encryptBlockAsm(&c.dec[0], &dst[0], &src[0])
2021-03-18 13:01:24 +08:00
}