Lines Matching refs:key

26 # processed with 128-bit key. And given their throughput asymptotic
100 # 128-bit key on Westmere, and 5.07 - on Sandy Bridge. These numbers
104 # calculated as latency times number of rounds, 10 for 128-bit key,
114 # 0-round element of the key schedule, with actual encryption of
129 # (numbers are cycles per byte processed with 128-bit key):
164 # one byte out of 8KB with 128-bit key, Sandy Bridge - 0.90. Just like
174 # 128-bit key (less is better).
221 $key="%rcx"; # input to and changed by aesni_[en|de]cryptN !!!
225 $key_="%r11"; # backup copy for $key
244 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout));
247 $movkey ($key),$rndkey0
248 $movkey 16($key),$rndkey1
252 lea 32($key),$key
256 lea 32($key),$key
263 $movkey ($key),$rndkey1
264 lea 16($key),$key
269 # void $PREFIX_[en|de]crypt (const void *inp,void *out,const AES_KEY *key);
271 { my ($inp,$out,$key) = @_4args;
279 mov 240($key),$rounds # key->rounds
281 &aesni_generate1("enc",$key,$rounds);
295 mov 240($key),$rounds # key->rounds
297 &aesni_generate1("dec",$key,$rounds);
324 # As already mentioned it takes in $key and $rounds, which are *not*
330 $movkey ($key),$rndkey0
332 $movkey 16($key),$rndkey1
335 $movkey 32($key),$rndkey0
336 lea 32($key,$rounds),$key
343 $movkey ($key,%rax),$rndkey1
347 $movkey -16($key,%rax),$rndkey0
360 # As already mentioned it takes in $key and $rounds, which are *not*
366 $movkey ($key),$rndkey0
368 $movkey 16($key),$rndkey1
372 $movkey 32($key),$rndkey0
373 lea 32($key,$rounds),$key
381 $movkey ($key,%rax),$rndkey1
386 $movkey -16($key,%rax),$rndkey0
405 # As already mentioned it takes in $key and $rounds, which are *not*
411 $movkey ($key),$rndkey0
413 $movkey 16($key),$rndkey1
418 $movkey 32($key),$rndkey0
419 lea 32($key,$rounds),$key
429 $movkey ($key,%rax),$rndkey1
435 $movkey -16($key,%rax),$rndkey0
452 # As already mentioned it takes in $key and $rounds, which are *not*
458 $movkey ($key),$rndkey0
460 $movkey 16($key),$rndkey1
465 lea 32($key,$rounds),$key
472 $movkey ($key,%rax),$rndkey0
484 $movkey ($key,%rax),$rndkey1
492 $movkey -16($key,%rax),$rndkey0
513 # As already mentioned it takes in $key and $rounds, which are *not*
519 $movkey ($key),$rndkey0
521 $movkey 16($key),$rndkey1
527 lea 32($key,$rounds),$key
534 $movkey ($key,%rax),$rndkey0
549 $movkey ($key,%rax),$rndkey1
559 $movkey -16($key,%rax),$rndkey0
597 # size_t length, const AES_KEY *key,
617 mov 240($key),$rounds # key->rounds
618 $movkey ($key),$rndkey0
619 mov $key,$key_ # backup $key
641 mov $key_,$key # restore $key
668 mov $key_,$key # restore $key
711 &aesni_generate1("enc",$key,$rounds);
777 mov $key_,$key # restore $key
806 mov $key_,$key # restore $key
843 $movkey ($key),$rndkey0
865 &aesni_generate1("dec",$key,$rounds);
957 # size_t blocks, const AES_KEY *key,
986 mov 240($key),$rounds # key->rounds
993 lea 0($key),$key_
996 lea 32($key,$rounds),$key # end of key schedule
1015 $movkey ($key,%rax),$rndkey1
1019 $movkey -16($key,%rax),$rndkey0
1076 mov 240($key),$rounds # key->rounds
1084 mov $key,$key_
1087 &aesni_generate1("enc",$key,$rounds);
1095 lea 32($key_,$rnds_),$key # end of key schedule
1121 $movkey ($key,%rax),$rndkey1
1125 $movkey -16($key,%rax),$rndkey0
1171 # size_t blocks, const AES_KEY *key,
1180 # with zero-round key xor.
1199 mov 240($key),%edx # key->rounds
1201 &aesni_generate1("enc",$key,"%edx");
1236 # xor-ed with zero-round key
1239 movdqu ($key),$rndkey0
1242 mov 12($key),$key0 # 0-round key LSB
1277 mov 240($key),$rounds # key->rounds
1291 $movkey 0x10($key),$rndkey1
1303 lea 0x80($key),$key # size optimization
1312 lea 32($key,$rounds),$key # end of key schedule
1319 $movkey -48($key,$rnds_),$rndkey0
1336 $movkey -32($key,$rnds_),$rndkey1
1353 $movkey -16($key,$rnds_),$rndkey0
1364 $movkey -64($key,$rnds_),$rndkey1
1392 lea -80($key,$rnds_),$key # restore $key
1406 $movkey 0x20-0x80($key),$rndkey0
1417 $movkey 0x30-0x80($key),$rndkey1
1435 $movkey `0x20+0x10*$i`-0x80($key),$rndkeyx
1452 $movkey 0xa0-0x80($key),$rndkey0
1464 $movkey 0xb0-0x80($key),$rndkey1
1474 $movkey 0xc0-0x80($key),$rndkey0
1485 $movkey 0xd0-0x80($key),$rndkey1
1495 $movkey 0xe0-0x80($key),$rndkey0
1538 $movkey 0x10-0x80($key),$rndkey1#real 1st-round key
1562 lea -0x80($key),$key
1566 # counter values xor-ed with 0-round key
1567 lea 16($key),$key
1577 $movkey 16($key),$rndkey0
1580 lea 32-16($key,$rounds),$key# prepare for .Lenc_loop8_enter
1622 lea 16($key),$key
1627 $movkey ($key),$rndkey1
1651 lea 16($key),$key
1655 $movkey ($key),$rndkey1
1789 mov 240($key),$rnds_ # key1->rounds
1794 $movkey ($key),$rndkey0 # zero round key
1795 mov $key,$key_ # backup $key
1801 $movkey 16($key,$rnds_),$rndkey1 # last round key
1836 lea 32($key_,$rnds_),$key # end of key schedule
1899 $movkey -64($key,%rax),$rndkey1
1908 $movkey -80($key,%rax),$rndkey0
1926 $movkey -64($key),$rndkey1
1943 $movkey -48($key),$rndkey0
1960 $movkey -32($key),$rndkey1
2017 mov $key_,$key # restore $key
2074 &aesni_generate1("enc",$key,$rounds);
2156 movzb -16($out),%ecx # ... and $key
2165 mov $key_,$key # restore $key
2171 &aesni_generate1("enc",$key,$rounds);
2272 mov 240($key),$rnds_ # key1->rounds
2283 $movkey ($key),$rndkey0 # zero round key
2284 mov $key,$key_ # backup $key
2290 $movkey 16($key,$rnds_),$rndkey1 # last round key
2322 lea 32($key_,$rnds_),$key # end of key schedule
2356 movdqa @tweak[0],`16*0`(%rsp) # put aside tweaks^last round key
2385 $movkey -64($key,%rax),$rndkey1
2394 $movkey -80($key,%rax),$rndkey0
2412 $movkey -64($key),$rndkey1
2429 $movkey -48($key),$rndkey0
2446 $movkey -32($key),$rndkey1
2503 mov $key_,$key # restore $key
2568 &aesni_generate1("dec",$key,$rounds);
2652 mov $key_,$key # restore $key
2658 &aesni_generate1("dec",$key,$rounds);
2665 movzb ($out),%ecx # ... and $key
2674 mov $key_,$key # restore $key
2680 &aesni_generate1("dec",$key,$rounds);
2756 # const AES_KEY *key, unsigned int start_block_num,
2805 mov 240($key),$rnds_
2806 mov $key,$key_
2808 $movkey ($key),$rndkey0l # round[0]
2809 $movkey 16($key,$rnds_),$rndkey1 # round[last]
2816 lea 32($key_,$rnds_),$key
3094 $movkey ($key,%rax),$rndkey1
3103 $movkey -16($key,%rax),$rndkey0
3171 $movkey ($key,%rax),$rndkey1
3178 $movkey -16($key,%rax),$rndkey0
3215 $movkey ($key,%rax),$rndkey1
3219 $movkey -16($key,%rax),$rndkey0
3265 mov 240($key),$rnds_
3266 mov $key,$key_
3268 $movkey ($key),$rndkey0l # round[0]
3269 $movkey 16($key,$rnds_),$rndkey1 # round[last]
3276 lea 32($key_,$rnds_),$key
3570 $movkey ($key,%rax),$rndkey1
3579 $movkey -16($key,%rax),$rndkey0
3643 $movkey ($key,%rax),$rndkey1
3650 $movkey -16($key,%rax),$rndkey0
3686 $movkey ($key,%rax),$rndkey1
3690 $movkey -16($key,%rax),$rndkey0
3706 # size_t length, const AES_KEY *key,
3721 mov 240($key),$rnds_ # key->rounds
3722 mov $key,$key_ # backup $key
3738 &aesni_generate1("enc",$key,$rounds,$inout0,$inout1);
3741 mov $key_,$key # restore $key
3756 mov $len,%rcx # zaps $key
3766 mov $key_,$key # restore $key
3782 &aesni_generate1("dec",$key,$rnds_);
3818 mov $key,$key_ # [re-]backup $key [after reassignment]
3824 $movkey ($key),$rndkey0
3846 lea 0x70($key),$key # size optimization
3857 $movkey 0x10-0x70($key),$rndkey1
3868 $movkey 0x20-0x70($key),$rndkey0
3879 $movkey 0x30-0x70($key),$rndkey1
3895 $movkey `0x30+0x10*$i`-0x70($key),$rndkeyx
3949 $movkey -0x70($key),$rndkey0
3970 lea -0x70($key),$key
4067 mov $key_,$key
4131 &aesni_generate1("dec",$key,$rounds);
4252 # int bits, AES_KEY *key)
4254 # input: $inp user-supplied key
4256 # $key pointer to key schedule
4258 # *$key key schedule
4260 { my ($inp,$bits,$key) = @_4args;
4275 lea 16($key,$bits),$inp # points at the end of key schedule
4277 $movkey ($key),%xmm0 # just swap
4280 $movkey %xmm1,($key)
4281 lea 16($key),$key
4285 $movkey ($key),%xmm0 # swap and inverse
4289 lea 16($key),$key
4292 $movkey %xmm1,-16($key)
4293 cmp $key,$inp
4296 $movkey ($key),%xmm0 # inverse middle
4320 # int bits, AES_KEY * const key);
4322 # input: $inp user-supplied key
4324 # $key pointer to key schedule
4327 # *$key key schedule
4328 # $key pointer to key schedule (used in
4347 test $key,$key
4355 lea 16($key),%rax # %rax is used as modifiable copy of $key
4364 mov \$9,$bits # 10 rounds for 128-bit key
4368 $movkey %xmm0,($key) # round 0
4400 movdqu %xmm0,($key)
4457 mov $bits,96(%rax) # 240($key)
4468 $movkey %xmm0,($key) # round 0
4495 movdqu %xmm0,($key)
4527 mov $bits,32(%rax) # 240($key)
4539 $movkey %xmm0,($key) # round 0
4540 $movkey %xmm2,16($key) # round 1
4577 movdqu %xmm0,0($key)
4579 movdqu %xmm2,16($key)
4622 mov $bits,16(%rax) # 240($key)