190 lines
7.5 KiB
C
190 lines
7.5 KiB
C
/*
|
|
Copyright (c) 2018-2019, tevador <tevador@gmail.com>
|
|
|
|
All rights reserved.
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
modification, are permitted provided that the following conditions are met:
|
|
* Redistributions of source code must retain the above copyright
|
|
notice, this list of conditions and the following disclaimer.
|
|
* Redistributions in binary form must reproduce the above copyright
|
|
notice, this list of conditions and the following disclaimer in the
|
|
documentation and/or other materials provided with the distribution.
|
|
* Neither the name of the copyright holder nor the
|
|
names of its contributors may be used to endorse or promote products
|
|
derived from this software without specific prior written permission.
|
|
|
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
|
|
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
|
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
/* Original code from Argon2 reference source code package used under CC0 Licence
|
|
* https://github.com/P-H-C/phc-winner-argon2
|
|
* Copyright 2015
|
|
* Daniel Dinu, Dmitry Khovratovich, Jean-Philippe Aumasson, and Samuel Neves
|
|
*/
|
|
|
|
#ifndef BLAKE_ROUND_MKA_OPT_H
|
|
#define BLAKE_ROUND_MKA_OPT_H
|
|
|
|
#include "blake2-impl.h"
|
|
|
|
#ifdef __GNUC__
|
|
#include <x86intrin.h>
|
|
#else
|
|
#include <intrin.h>
|
|
#endif
|
|
|
|
#define rotr32(x) _mm256_shuffle_epi32(x, _MM_SHUFFLE(2, 3, 0, 1))
|
|
#define rotr24(x) _mm256_shuffle_epi8(x, _mm256_setr_epi8(3, 4, 5, 6, 7, 0, 1, 2, 11, 12, 13, 14, 15, 8, 9, 10, 3, 4, 5, 6, 7, 0, 1, 2, 11, 12, 13, 14, 15, 8, 9, 10))
|
|
#define rotr16(x) _mm256_shuffle_epi8(x, _mm256_setr_epi8(2, 3, 4, 5, 6, 7, 0, 1, 10, 11, 12, 13, 14, 15, 8, 9, 2, 3, 4, 5, 6, 7, 0, 1, 10, 11, 12, 13, 14, 15, 8, 9))
|
|
#define rotr63(x) _mm256_xor_si256(_mm256_srli_epi64((x), 63), _mm256_add_epi64((x), (x)))
|
|
|
|
#define G1_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
do { \
|
|
__m256i ml = _mm256_mul_epu32(A0, B0); \
|
|
ml = _mm256_add_epi64(ml, ml); \
|
|
A0 = _mm256_add_epi64(A0, _mm256_add_epi64(B0, ml)); \
|
|
D0 = _mm256_xor_si256(D0, A0); \
|
|
D0 = rotr32(D0); \
|
|
\
|
|
ml = _mm256_mul_epu32(C0, D0); \
|
|
ml = _mm256_add_epi64(ml, ml); \
|
|
C0 = _mm256_add_epi64(C0, _mm256_add_epi64(D0, ml)); \
|
|
\
|
|
B0 = _mm256_xor_si256(B0, C0); \
|
|
B0 = rotr24(B0); \
|
|
\
|
|
ml = _mm256_mul_epu32(A1, B1); \
|
|
ml = _mm256_add_epi64(ml, ml); \
|
|
A1 = _mm256_add_epi64(A1, _mm256_add_epi64(B1, ml)); \
|
|
D1 = _mm256_xor_si256(D1, A1); \
|
|
D1 = rotr32(D1); \
|
|
\
|
|
ml = _mm256_mul_epu32(C1, D1); \
|
|
ml = _mm256_add_epi64(ml, ml); \
|
|
C1 = _mm256_add_epi64(C1, _mm256_add_epi64(D1, ml)); \
|
|
\
|
|
B1 = _mm256_xor_si256(B1, C1); \
|
|
B1 = rotr24(B1); \
|
|
} while((void)0, 0);
|
|
|
|
#define G2_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
do { \
|
|
__m256i ml = _mm256_mul_epu32(A0, B0); \
|
|
ml = _mm256_add_epi64(ml, ml); \
|
|
A0 = _mm256_add_epi64(A0, _mm256_add_epi64(B0, ml)); \
|
|
D0 = _mm256_xor_si256(D0, A0); \
|
|
D0 = rotr16(D0); \
|
|
\
|
|
ml = _mm256_mul_epu32(C0, D0); \
|
|
ml = _mm256_add_epi64(ml, ml); \
|
|
C0 = _mm256_add_epi64(C0, _mm256_add_epi64(D0, ml)); \
|
|
B0 = _mm256_xor_si256(B0, C0); \
|
|
B0 = rotr63(B0); \
|
|
\
|
|
ml = _mm256_mul_epu32(A1, B1); \
|
|
ml = _mm256_add_epi64(ml, ml); \
|
|
A1 = _mm256_add_epi64(A1, _mm256_add_epi64(B1, ml)); \
|
|
D1 = _mm256_xor_si256(D1, A1); \
|
|
D1 = rotr16(D1); \
|
|
\
|
|
ml = _mm256_mul_epu32(C1, D1); \
|
|
ml = _mm256_add_epi64(ml, ml); \
|
|
C1 = _mm256_add_epi64(C1, _mm256_add_epi64(D1, ml)); \
|
|
B1 = _mm256_xor_si256(B1, C1); \
|
|
B1 = rotr63(B1); \
|
|
} while((void)0, 0);
|
|
|
|
#define DIAGONALIZE_1(A0, B0, C0, D0, A1, B1, C1, D1) \
|
|
do { \
|
|
B0 = _mm256_permute4x64_epi64(B0, _MM_SHUFFLE(0, 3, 2, 1)); \
|
|
C0 = _mm256_permute4x64_epi64(C0, _MM_SHUFFLE(1, 0, 3, 2)); \
|
|
D0 = _mm256_permute4x64_epi64(D0, _MM_SHUFFLE(2, 1, 0, 3)); \
|
|
\
|
|
B1 = _mm256_permute4x64_epi64(B1, _MM_SHUFFLE(0, 3, 2, 1)); \
|
|
C1 = _mm256_permute4x64_epi64(C1, _MM_SHUFFLE(1, 0, 3, 2)); \
|
|
D1 = _mm256_permute4x64_epi64(D1, _MM_SHUFFLE(2, 1, 0, 3)); \
|
|
} while((void)0, 0);
|
|
|
|
#define DIAGONALIZE_2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
do { \
|
|
__m256i tmp1 = _mm256_blend_epi32(B0, B1, 0xCC); \
|
|
__m256i tmp2 = _mm256_blend_epi32(B0, B1, 0x33); \
|
|
B1 = _mm256_permute4x64_epi64(tmp1, _MM_SHUFFLE(2,3,0,1)); \
|
|
B0 = _mm256_permute4x64_epi64(tmp2, _MM_SHUFFLE(2,3,0,1)); \
|
|
\
|
|
tmp1 = C0; \
|
|
C0 = C1; \
|
|
C1 = tmp1; \
|
|
\
|
|
tmp1 = _mm256_blend_epi32(D0, D1, 0xCC); \
|
|
tmp2 = _mm256_blend_epi32(D0, D1, 0x33); \
|
|
D0 = _mm256_permute4x64_epi64(tmp1, _MM_SHUFFLE(2,3,0,1)); \
|
|
D1 = _mm256_permute4x64_epi64(tmp2, _MM_SHUFFLE(2,3,0,1)); \
|
|
} while(0);
|
|
|
|
#define UNDIAGONALIZE_1(A0, B0, C0, D0, A1, B1, C1, D1) \
|
|
do { \
|
|
B0 = _mm256_permute4x64_epi64(B0, _MM_SHUFFLE(2, 1, 0, 3)); \
|
|
C0 = _mm256_permute4x64_epi64(C0, _MM_SHUFFLE(1, 0, 3, 2)); \
|
|
D0 = _mm256_permute4x64_epi64(D0, _MM_SHUFFLE(0, 3, 2, 1)); \
|
|
\
|
|
B1 = _mm256_permute4x64_epi64(B1, _MM_SHUFFLE(2, 1, 0, 3)); \
|
|
C1 = _mm256_permute4x64_epi64(C1, _MM_SHUFFLE(1, 0, 3, 2)); \
|
|
D1 = _mm256_permute4x64_epi64(D1, _MM_SHUFFLE(0, 3, 2, 1)); \
|
|
} while((void)0, 0);
|
|
|
|
#define UNDIAGONALIZE_2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
do { \
|
|
__m256i tmp1 = _mm256_blend_epi32(B0, B1, 0xCC); \
|
|
__m256i tmp2 = _mm256_blend_epi32(B0, B1, 0x33); \
|
|
B0 = _mm256_permute4x64_epi64(tmp1, _MM_SHUFFLE(2,3,0,1)); \
|
|
B1 = _mm256_permute4x64_epi64(tmp2, _MM_SHUFFLE(2,3,0,1)); \
|
|
\
|
|
tmp1 = C0; \
|
|
C0 = C1; \
|
|
C1 = tmp1; \
|
|
\
|
|
tmp1 = _mm256_blend_epi32(D0, D1, 0x33); \
|
|
tmp2 = _mm256_blend_epi32(D0, D1, 0xCC); \
|
|
D0 = _mm256_permute4x64_epi64(tmp1, _MM_SHUFFLE(2,3,0,1)); \
|
|
D1 = _mm256_permute4x64_epi64(tmp2, _MM_SHUFFLE(2,3,0,1)); \
|
|
} while((void)0, 0);
|
|
|
|
#define BLAKE2_ROUND_1(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
do{ \
|
|
G1_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
G2_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
\
|
|
DIAGONALIZE_1(A0, B0, C0, D0, A1, B1, C1, D1) \
|
|
\
|
|
G1_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
G2_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
\
|
|
UNDIAGONALIZE_1(A0, B0, C0, D0, A1, B1, C1, D1) \
|
|
} while((void)0, 0);
|
|
|
|
#define BLAKE2_ROUND_2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
do{ \
|
|
G1_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
G2_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
\
|
|
DIAGONALIZE_2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
\
|
|
G1_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
G2_AVX2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
\
|
|
UNDIAGONALIZE_2(A0, A1, B0, B1, C0, C1, D0, D1) \
|
|
} while((void)0, 0);
|
|
|
|
#endif /* BLAKE_ROUND_MKA_OPT_H */
|