gmsm/sm4/cipher_asm.go
2021-03-21 19:20:23 +08:00

68 lines
1.5 KiB
Go

// +build amd64
package sm4
import (
"crypto/cipher"
"golang.org/x/sys/cpu"
)
//go:noescape
func encryptBlocksAsm(xk *uint32, dst, src *byte)
//go:noescape
func encryptBlockAsm(xk *uint32, dst, src *byte)
//go:noescape
func expandKeyAsm(key *byte, ck, enc, dec *uint32)
type sm4CipherAsm struct {
sm4Cipher
}
var supportsAES = cpu.X86.HasAES
var supportsGFMUL = cpu.X86.HasPCLMULQDQ
func newCipher(key []byte) (cipher.Block, error) {
if !supportsAES {
return newCipherGeneric(key)
}
c := sm4CipherAsm{sm4Cipher{make([]uint32, rounds), make([]uint32, rounds)}}
expandKeyAsm(&key[0], &ck[0], &c.enc[0], &c.dec[0])
if supportsAES && supportsGFMUL {
return &sm4CipherGCM{c}, nil
}
return &c, nil
}
const FourBlocksSize = 64
func (c *sm4CipherAsm) BlockSize() int { return BlockSize }
func (c *sm4CipherAsm) Encrypt(dst, src []byte) {
if len(src) < BlockSize {
panic("sm4: input not full block")
}
if len(dst) < BlockSize {
panic("sm4: output not full block")
}
if InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
panic("sm4: invalid buffer overlap")
}
encryptBlockAsm(&c.enc[0], &dst[0], &src[0])
}
func (c *sm4CipherAsm) Decrypt(dst, src []byte) {
if len(src) < BlockSize {
panic("sm4: input not full block")
}
if len(dst) < BlockSize {
panic("sm4: output not full block")
}
if InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
panic("sm4: invalid buffer overlap")
}
encryptBlockAsm(&c.dec[0], &dst[0], &src[0])
}