diff options
Diffstat (limited to '')
-rw-r--r-- | src/lib/libcrypto/bn/arch/amd64/bn_arch.c | 113 |
1 files changed, 91 insertions, 22 deletions
diff --git a/src/lib/libcrypto/bn/arch/amd64/bn_arch.c b/src/lib/libcrypto/bn/arch/amd64/bn_arch.c index a377a05681..9ff8920ca2 100644 --- a/src/lib/libcrypto/bn/arch/amd64/bn_arch.c +++ b/src/lib/libcrypto/bn/arch/amd64/bn_arch.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: bn_arch.c,v 1.7 2023/06/24 16:01:44 jsing Exp $ */ | 1 | /* $OpenBSD: bn_arch.c,v 1.12 2025/08/14 15:29:17 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2023 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2023 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -19,6 +19,7 @@ | |||
19 | 19 | ||
20 | #include "bn_arch.h" | 20 | #include "bn_arch.h" |
21 | #include "bn_local.h" | 21 | #include "bn_local.h" |
22 | #include "crypto_arch.h" | ||
22 | #include "s2n_bignum.h" | 23 | #include "s2n_bignum.h" |
23 | 24 | ||
24 | #ifdef HAVE_BN_ADD | 25 | #ifdef HAVE_BN_ADD |
@@ -26,8 +27,8 @@ BN_ULONG | |||
26 | bn_add(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, | 27 | bn_add(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, |
27 | int b_len) | 28 | int b_len) |
28 | { | 29 | { |
29 | return bignum_add(r_len, (uint64_t *)r, a_len, (uint64_t *)a, | 30 | return bignum_add(r_len, (uint64_t *)r, a_len, (const uint64_t *)a, |
30 | b_len, (uint64_t *)b); | 31 | b_len, (const uint64_t *)b); |
31 | } | 32 | } |
32 | #endif | 33 | #endif |
33 | 34 | ||
@@ -36,8 +37,8 @@ bn_add(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, | |||
36 | BN_ULONG | 37 | BN_ULONG |
37 | bn_add_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) | 38 | bn_add_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) |
38 | { | 39 | { |
39 | return bignum_add(n, (uint64_t *)rd, n, (uint64_t *)ad, n, | 40 | return bignum_add(n, (uint64_t *)rd, n, (const uint64_t *)ad, n, |
40 | (uint64_t *)bd); | 41 | (const uint64_t *)bd); |
41 | } | 42 | } |
42 | #endif | 43 | #endif |
43 | 44 | ||
@@ -46,8 +47,8 @@ BN_ULONG | |||
46 | bn_sub(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, | 47 | bn_sub(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, |
47 | int b_len) | 48 | int b_len) |
48 | { | 49 | { |
49 | return bignum_sub(r_len, (uint64_t *)r, a_len, (uint64_t *)a, | 50 | return bignum_sub(r_len, (uint64_t *)r, a_len, (const uint64_t *)a, |
50 | b_len, (uint64_t *)b); | 51 | b_len, (const uint64_t *)b); |
51 | } | 52 | } |
52 | #endif | 53 | #endif |
53 | 54 | ||
@@ -55,8 +56,28 @@ bn_sub(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, | |||
55 | BN_ULONG | 56 | BN_ULONG |
56 | bn_sub_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) | 57 | bn_sub_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) |
57 | { | 58 | { |
58 | return bignum_sub(n, (uint64_t *)rd, n, (uint64_t *)ad, n, | 59 | return bignum_sub(n, (uint64_t *)rd, n, (const uint64_t *)ad, n, |
59 | (uint64_t *)bd); | 60 | (const uint64_t *)bd); |
61 | } | ||
62 | #endif | ||
63 | |||
64 | #ifdef HAVE_BN_MOD_ADD_WORDS | ||
65 | void | ||
66 | bn_mod_add_words(BN_ULONG *r, const BN_ULONG *a, const BN_ULONG *b, | ||
67 | const BN_ULONG *m, size_t n) | ||
68 | { | ||
69 | bignum_modadd(n, (uint64_t *)r, (const uint64_t *)a, | ||
70 | (const uint64_t *)b, (const uint64_t *)m); | ||
71 | } | ||
72 | #endif | ||
73 | |||
74 | #ifdef HAVE_BN_MOD_SUB_WORDS | ||
75 | void | ||
76 | bn_mod_sub_words(BN_ULONG *r, const BN_ULONG *a, const BN_ULONG *b, | ||
77 | const BN_ULONG *m, size_t n) | ||
78 | { | ||
79 | bignum_modsub(n, (uint64_t *)r, (const uint64_t *)a, | ||
80 | (const uint64_t *)b, (const uint64_t *)m); | ||
60 | } | 81 | } |
61 | #endif | 82 | #endif |
62 | 83 | ||
@@ -64,7 +85,7 @@ bn_sub_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) | |||
64 | BN_ULONG | 85 | BN_ULONG |
65 | bn_mul_add_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) | 86 | bn_mul_add_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) |
66 | { | 87 | { |
67 | return bignum_cmadd(num, (uint64_t *)rd, w, num, (uint64_t *)ad); | 88 | return bignum_cmadd(num, (uint64_t *)rd, w, num, (const uint64_t *)ad); |
68 | } | 89 | } |
69 | #endif | 90 | #endif |
70 | 91 | ||
@@ -72,25 +93,52 @@ bn_mul_add_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) | |||
72 | BN_ULONG | 93 | BN_ULONG |
73 | bn_mul_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) | 94 | bn_mul_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) |
74 | { | 95 | { |
75 | return bignum_cmul(num, (uint64_t *)rd, w, num, (uint64_t *)ad); | 96 | return bignum_cmul(num, (uint64_t *)rd, w, num, (const uint64_t *)ad); |
76 | } | 97 | } |
77 | #endif | 98 | #endif |
78 | 99 | ||
79 | #ifdef HAVE_BN_MUL_COMBA4 | 100 | #ifdef HAVE_BN_MUL_COMBA4 |
80 | void | 101 | void |
81 | bn_mul_comba4(BN_ULONG *rd, BN_ULONG *ad, BN_ULONG *bd) | 102 | bn_mul_comba4(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd) |
82 | { | 103 | { |
83 | /* XXX - consider using non-alt on CPUs that have the ADX extension. */ | 104 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { |
84 | bignum_mul_4_8_alt((uint64_t *)rd, (uint64_t *)ad, (uint64_t *)bd); | 105 | bignum_mul_4_8((uint64_t *)rd, (const uint64_t *)ad, |
106 | (const uint64_t *)bd); | ||
107 | return; | ||
108 | } | ||
109 | |||
110 | bignum_mul_4_8_alt((uint64_t *)rd, (const uint64_t *)ad, | ||
111 | (const uint64_t *)bd); | ||
112 | } | ||
113 | #endif | ||
114 | |||
115 | #ifdef HAVE_BN_MUL_COMBA6 | ||
116 | void | ||
117 | bn_mul_comba6(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd) | ||
118 | { | ||
119 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { | ||
120 | bignum_mul_6_12((uint64_t *)rd, (const uint64_t *)ad, | ||
121 | (const uint64_t *)bd); | ||
122 | return; | ||
123 | } | ||
124 | |||
125 | bignum_mul_6_12_alt((uint64_t *)rd, (const uint64_t *)ad, | ||
126 | (const uint64_t *)bd); | ||
85 | } | 127 | } |
86 | #endif | 128 | #endif |
87 | 129 | ||
88 | #ifdef HAVE_BN_MUL_COMBA8 | 130 | #ifdef HAVE_BN_MUL_COMBA8 |
89 | void | 131 | void |
90 | bn_mul_comba8(BN_ULONG *rd, BN_ULONG *ad, BN_ULONG *bd) | 132 | bn_mul_comba8(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd) |
91 | { | 133 | { |
92 | /* XXX - consider using non-alt on CPUs that have the ADX extension. */ | 134 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { |
93 | bignum_mul_8_16_alt((uint64_t *)rd, (uint64_t *)ad, (uint64_t *)bd); | 135 | bignum_mul_8_16((uint64_t *)rd, (const uint64_t *)ad, |
136 | (const uint64_t *)bd); | ||
137 | return; | ||
138 | } | ||
139 | |||
140 | bignum_mul_8_16_alt((uint64_t *)rd, (const uint64_t *)ad, | ||
141 | (const uint64_t *)bd); | ||
94 | } | 142 | } |
95 | #endif | 143 | #endif |
96 | 144 | ||
@@ -98,7 +146,7 @@ bn_mul_comba8(BN_ULONG *rd, BN_ULONG *ad, BN_ULONG *bd) | |||
98 | int | 146 | int |
99 | bn_sqr(BIGNUM *r, const BIGNUM *a, int r_len, BN_CTX *ctx) | 147 | bn_sqr(BIGNUM *r, const BIGNUM *a, int r_len, BN_CTX *ctx) |
100 | { | 148 | { |
101 | bignum_sqr(r_len, (uint64_t *)r->d, a->top, (uint64_t *)a->d); | 149 | bignum_sqr(r_len, (uint64_t *)r->d, a->top, (const uint64_t *)a->d); |
102 | 150 | ||
103 | return 1; | 151 | return 1; |
104 | } | 152 | } |
@@ -108,8 +156,25 @@ bn_sqr(BIGNUM *r, const BIGNUM *a, int r_len, BN_CTX *ctx) | |||
108 | void | 156 | void |
109 | bn_sqr_comba4(BN_ULONG *rd, const BN_ULONG *ad) | 157 | bn_sqr_comba4(BN_ULONG *rd, const BN_ULONG *ad) |
110 | { | 158 | { |
111 | /* XXX - consider using non-alt on CPUs that have the ADX extension. */ | 159 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { |
112 | bignum_sqr_4_8_alt((uint64_t *)rd, (uint64_t *)ad); | 160 | bignum_sqr_4_8((uint64_t *)rd, (const uint64_t *)ad); |
161 | return; | ||
162 | } | ||
163 | |||
164 | bignum_sqr_4_8_alt((uint64_t *)rd, (const uint64_t *)ad); | ||
165 | } | ||
166 | #endif | ||
167 | |||
168 | #ifdef HAVE_BN_SQR_COMBA6 | ||
169 | void | ||
170 | bn_sqr_comba6(BN_ULONG *rd, const BN_ULONG *ad) | ||
171 | { | ||
172 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { | ||
173 | bignum_sqr_6_12((uint64_t *)rd, (const uint64_t *)ad); | ||
174 | return; | ||
175 | } | ||
176 | |||
177 | bignum_sqr_6_12_alt((uint64_t *)rd, (const uint64_t *)ad); | ||
113 | } | 178 | } |
114 | #endif | 179 | #endif |
115 | 180 | ||
@@ -117,8 +182,12 @@ bn_sqr_comba4(BN_ULONG *rd, const BN_ULONG *ad) | |||
117 | void | 182 | void |
118 | bn_sqr_comba8(BN_ULONG *rd, const BN_ULONG *ad) | 183 | bn_sqr_comba8(BN_ULONG *rd, const BN_ULONG *ad) |
119 | { | 184 | { |
120 | /* XXX - consider using non-alt on CPUs that have the ADX extension. */ | 185 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { |
121 | bignum_sqr_8_16_alt((uint64_t *)rd, (uint64_t *)ad); | 186 | bignum_sqr_8_16((uint64_t *)rd, (const uint64_t *)ad); |
187 | return; | ||
188 | } | ||
189 | |||
190 | bignum_sqr_8_16_alt((uint64_t *)rd, (const uint64_t *)ad); | ||
122 | } | 191 | } |
123 | #endif | 192 | #endif |
124 | 193 | ||