diff options
Diffstat (limited to 'src/lib/libcrypto/bn/arch/amd64/bn_arch.c')
| -rw-r--r-- | src/lib/libcrypto/bn/arch/amd64/bn_arch.c | 113 |
1 files changed, 91 insertions, 22 deletions
diff --git a/src/lib/libcrypto/bn/arch/amd64/bn_arch.c b/src/lib/libcrypto/bn/arch/amd64/bn_arch.c index a377a05681..9ff8920ca2 100644 --- a/src/lib/libcrypto/bn/arch/amd64/bn_arch.c +++ b/src/lib/libcrypto/bn/arch/amd64/bn_arch.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: bn_arch.c,v 1.7 2023/06/24 16:01:44 jsing Exp $ */ | 1 | /* $OpenBSD: bn_arch.c,v 1.12 2025/08/14 15:29:17 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2023 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2023 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -19,6 +19,7 @@ | |||
| 19 | 19 | ||
| 20 | #include "bn_arch.h" | 20 | #include "bn_arch.h" |
| 21 | #include "bn_local.h" | 21 | #include "bn_local.h" |
| 22 | #include "crypto_arch.h" | ||
| 22 | #include "s2n_bignum.h" | 23 | #include "s2n_bignum.h" |
| 23 | 24 | ||
| 24 | #ifdef HAVE_BN_ADD | 25 | #ifdef HAVE_BN_ADD |
| @@ -26,8 +27,8 @@ BN_ULONG | |||
| 26 | bn_add(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, | 27 | bn_add(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, |
| 27 | int b_len) | 28 | int b_len) |
| 28 | { | 29 | { |
| 29 | return bignum_add(r_len, (uint64_t *)r, a_len, (uint64_t *)a, | 30 | return bignum_add(r_len, (uint64_t *)r, a_len, (const uint64_t *)a, |
| 30 | b_len, (uint64_t *)b); | 31 | b_len, (const uint64_t *)b); |
| 31 | } | 32 | } |
| 32 | #endif | 33 | #endif |
| 33 | 34 | ||
| @@ -36,8 +37,8 @@ bn_add(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, | |||
| 36 | BN_ULONG | 37 | BN_ULONG |
| 37 | bn_add_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) | 38 | bn_add_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) |
| 38 | { | 39 | { |
| 39 | return bignum_add(n, (uint64_t *)rd, n, (uint64_t *)ad, n, | 40 | return bignum_add(n, (uint64_t *)rd, n, (const uint64_t *)ad, n, |
| 40 | (uint64_t *)bd); | 41 | (const uint64_t *)bd); |
| 41 | } | 42 | } |
| 42 | #endif | 43 | #endif |
| 43 | 44 | ||
| @@ -46,8 +47,8 @@ BN_ULONG | |||
| 46 | bn_sub(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, | 47 | bn_sub(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, |
| 47 | int b_len) | 48 | int b_len) |
| 48 | { | 49 | { |
| 49 | return bignum_sub(r_len, (uint64_t *)r, a_len, (uint64_t *)a, | 50 | return bignum_sub(r_len, (uint64_t *)r, a_len, (const uint64_t *)a, |
| 50 | b_len, (uint64_t *)b); | 51 | b_len, (const uint64_t *)b); |
| 51 | } | 52 | } |
| 52 | #endif | 53 | #endif |
| 53 | 54 | ||
| @@ -55,8 +56,28 @@ bn_sub(BN_ULONG *r, int r_len, const BN_ULONG *a, int a_len, const BN_ULONG *b, | |||
| 55 | BN_ULONG | 56 | BN_ULONG |
| 56 | bn_sub_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) | 57 | bn_sub_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) |
| 57 | { | 58 | { |
| 58 | return bignum_sub(n, (uint64_t *)rd, n, (uint64_t *)ad, n, | 59 | return bignum_sub(n, (uint64_t *)rd, n, (const uint64_t *)ad, n, |
| 59 | (uint64_t *)bd); | 60 | (const uint64_t *)bd); |
| 61 | } | ||
| 62 | #endif | ||
| 63 | |||
| 64 | #ifdef HAVE_BN_MOD_ADD_WORDS | ||
| 65 | void | ||
| 66 | bn_mod_add_words(BN_ULONG *r, const BN_ULONG *a, const BN_ULONG *b, | ||
| 67 | const BN_ULONG *m, size_t n) | ||
| 68 | { | ||
| 69 | bignum_modadd(n, (uint64_t *)r, (const uint64_t *)a, | ||
| 70 | (const uint64_t *)b, (const uint64_t *)m); | ||
| 71 | } | ||
| 72 | #endif | ||
| 73 | |||
| 74 | #ifdef HAVE_BN_MOD_SUB_WORDS | ||
| 75 | void | ||
| 76 | bn_mod_sub_words(BN_ULONG *r, const BN_ULONG *a, const BN_ULONG *b, | ||
| 77 | const BN_ULONG *m, size_t n) | ||
| 78 | { | ||
| 79 | bignum_modsub(n, (uint64_t *)r, (const uint64_t *)a, | ||
| 80 | (const uint64_t *)b, (const uint64_t *)m); | ||
| 60 | } | 81 | } |
| 61 | #endif | 82 | #endif |
| 62 | 83 | ||
| @@ -64,7 +85,7 @@ bn_sub_words(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd, int n) | |||
| 64 | BN_ULONG | 85 | BN_ULONG |
| 65 | bn_mul_add_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) | 86 | bn_mul_add_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) |
| 66 | { | 87 | { |
| 67 | return bignum_cmadd(num, (uint64_t *)rd, w, num, (uint64_t *)ad); | 88 | return bignum_cmadd(num, (uint64_t *)rd, w, num, (const uint64_t *)ad); |
| 68 | } | 89 | } |
| 69 | #endif | 90 | #endif |
| 70 | 91 | ||
| @@ -72,25 +93,52 @@ bn_mul_add_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) | |||
| 72 | BN_ULONG | 93 | BN_ULONG |
| 73 | bn_mul_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) | 94 | bn_mul_words(BN_ULONG *rd, const BN_ULONG *ad, int num, BN_ULONG w) |
| 74 | { | 95 | { |
| 75 | return bignum_cmul(num, (uint64_t *)rd, w, num, (uint64_t *)ad); | 96 | return bignum_cmul(num, (uint64_t *)rd, w, num, (const uint64_t *)ad); |
| 76 | } | 97 | } |
| 77 | #endif | 98 | #endif |
| 78 | 99 | ||
| 79 | #ifdef HAVE_BN_MUL_COMBA4 | 100 | #ifdef HAVE_BN_MUL_COMBA4 |
| 80 | void | 101 | void |
| 81 | bn_mul_comba4(BN_ULONG *rd, BN_ULONG *ad, BN_ULONG *bd) | 102 | bn_mul_comba4(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd) |
| 82 | { | 103 | { |
| 83 | /* XXX - consider using non-alt on CPUs that have the ADX extension. */ | 104 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { |
| 84 | bignum_mul_4_8_alt((uint64_t *)rd, (uint64_t *)ad, (uint64_t *)bd); | 105 | bignum_mul_4_8((uint64_t *)rd, (const uint64_t *)ad, |
| 106 | (const uint64_t *)bd); | ||
| 107 | return; | ||
| 108 | } | ||
| 109 | |||
| 110 | bignum_mul_4_8_alt((uint64_t *)rd, (const uint64_t *)ad, | ||
| 111 | (const uint64_t *)bd); | ||
| 112 | } | ||
| 113 | #endif | ||
| 114 | |||
| 115 | #ifdef HAVE_BN_MUL_COMBA6 | ||
| 116 | void | ||
| 117 | bn_mul_comba6(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd) | ||
| 118 | { | ||
| 119 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { | ||
| 120 | bignum_mul_6_12((uint64_t *)rd, (const uint64_t *)ad, | ||
| 121 | (const uint64_t *)bd); | ||
| 122 | return; | ||
| 123 | } | ||
| 124 | |||
| 125 | bignum_mul_6_12_alt((uint64_t *)rd, (const uint64_t *)ad, | ||
| 126 | (const uint64_t *)bd); | ||
| 85 | } | 127 | } |
| 86 | #endif | 128 | #endif |
| 87 | 129 | ||
| 88 | #ifdef HAVE_BN_MUL_COMBA8 | 130 | #ifdef HAVE_BN_MUL_COMBA8 |
| 89 | void | 131 | void |
| 90 | bn_mul_comba8(BN_ULONG *rd, BN_ULONG *ad, BN_ULONG *bd) | 132 | bn_mul_comba8(BN_ULONG *rd, const BN_ULONG *ad, const BN_ULONG *bd) |
| 91 | { | 133 | { |
| 92 | /* XXX - consider using non-alt on CPUs that have the ADX extension. */ | 134 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { |
| 93 | bignum_mul_8_16_alt((uint64_t *)rd, (uint64_t *)ad, (uint64_t *)bd); | 135 | bignum_mul_8_16((uint64_t *)rd, (const uint64_t *)ad, |
| 136 | (const uint64_t *)bd); | ||
| 137 | return; | ||
| 138 | } | ||
| 139 | |||
| 140 | bignum_mul_8_16_alt((uint64_t *)rd, (const uint64_t *)ad, | ||
| 141 | (const uint64_t *)bd); | ||
| 94 | } | 142 | } |
| 95 | #endif | 143 | #endif |
| 96 | 144 | ||
| @@ -98,7 +146,7 @@ bn_mul_comba8(BN_ULONG *rd, BN_ULONG *ad, BN_ULONG *bd) | |||
| 98 | int | 146 | int |
| 99 | bn_sqr(BIGNUM *r, const BIGNUM *a, int r_len, BN_CTX *ctx) | 147 | bn_sqr(BIGNUM *r, const BIGNUM *a, int r_len, BN_CTX *ctx) |
| 100 | { | 148 | { |
| 101 | bignum_sqr(r_len, (uint64_t *)r->d, a->top, (uint64_t *)a->d); | 149 | bignum_sqr(r_len, (uint64_t *)r->d, a->top, (const uint64_t *)a->d); |
| 102 | 150 | ||
| 103 | return 1; | 151 | return 1; |
| 104 | } | 152 | } |
| @@ -108,8 +156,25 @@ bn_sqr(BIGNUM *r, const BIGNUM *a, int r_len, BN_CTX *ctx) | |||
| 108 | void | 156 | void |
| 109 | bn_sqr_comba4(BN_ULONG *rd, const BN_ULONG *ad) | 157 | bn_sqr_comba4(BN_ULONG *rd, const BN_ULONG *ad) |
| 110 | { | 158 | { |
| 111 | /* XXX - consider using non-alt on CPUs that have the ADX extension. */ | 159 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { |
| 112 | bignum_sqr_4_8_alt((uint64_t *)rd, (uint64_t *)ad); | 160 | bignum_sqr_4_8((uint64_t *)rd, (const uint64_t *)ad); |
| 161 | return; | ||
| 162 | } | ||
| 163 | |||
| 164 | bignum_sqr_4_8_alt((uint64_t *)rd, (const uint64_t *)ad); | ||
| 165 | } | ||
| 166 | #endif | ||
| 167 | |||
| 168 | #ifdef HAVE_BN_SQR_COMBA6 | ||
| 169 | void | ||
| 170 | bn_sqr_comba6(BN_ULONG *rd, const BN_ULONG *ad) | ||
| 171 | { | ||
| 172 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { | ||
| 173 | bignum_sqr_6_12((uint64_t *)rd, (const uint64_t *)ad); | ||
| 174 | return; | ||
| 175 | } | ||
| 176 | |||
| 177 | bignum_sqr_6_12_alt((uint64_t *)rd, (const uint64_t *)ad); | ||
| 113 | } | 178 | } |
| 114 | #endif | 179 | #endif |
| 115 | 180 | ||
| @@ -117,8 +182,12 @@ bn_sqr_comba4(BN_ULONG *rd, const BN_ULONG *ad) | |||
| 117 | void | 182 | void |
| 118 | bn_sqr_comba8(BN_ULONG *rd, const BN_ULONG *ad) | 183 | bn_sqr_comba8(BN_ULONG *rd, const BN_ULONG *ad) |
| 119 | { | 184 | { |
| 120 | /* XXX - consider using non-alt on CPUs that have the ADX extension. */ | 185 | if ((crypto_cpu_caps_amd64 & CRYPTO_CPU_CAPS_AMD64_ADX) != 0) { |
| 121 | bignum_sqr_8_16_alt((uint64_t *)rd, (uint64_t *)ad); | 186 | bignum_sqr_8_16((uint64_t *)rd, (const uint64_t *)ad); |
| 187 | return; | ||
| 188 | } | ||
| 189 | |||
| 190 | bignum_sqr_8_16_alt((uint64_t *)rd, (const uint64_t *)ad); | ||
| 122 | } | 191 | } |
| 123 | #endif | 192 | #endif |
| 124 | 193 | ||
