| // Copyright 2016 The Go Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style |
| // license that can be found in the LICENSE file. |
| |
| // +build ignore |
| |
| package aes |
| |
| import ( |
| "crypto/cipher" |
| ) |
| |
| // defined in asm_ppc64le.s |
| |
| //go:noescape |
| |
| func setEncryptKeyAsm(key *byte, keylen int, enc *uint32) int |
| |
| //go:noescape |
| |
| func setDecryptKeyAsm(key *byte, keylen int, dec *uint32) int |
| |
| //go:noescape |
| |
| func doEncryptKeyAsm(key *byte, keylen int, dec *uint32) int |
| |
| //go:noescape |
| |
| func encryptBlockAsm(dst, src *byte, enc *uint32) |
| |
| //go:noescape |
| |
| func decryptBlockAsm(dst, src *byte, dec *uint32) |
| |
| type aesCipherAsm struct { |
| aesCipher |
| } |
| |
| func newCipher(key []byte) (cipher.Block, error) { |
| n := 64 // size is fixed for all and round value is stored inside it too |
| c := aesCipherAsm{aesCipher{make([]uint32, n), make([]uint32, n)}} |
| k := len(key) |
| |
| ret := 0 |
| ret += setEncryptKeyAsm(&key[0], k*8, &c.enc[0]) |
| ret += setDecryptKeyAsm(&key[0], k*8, &c.dec[0]) |
| |
| if ret > 0 { |
| return nil, KeySizeError(k) |
| } |
| |
| return &c, nil |
| } |
| |
| func (c *aesCipherAsm) BlockSize() int { return BlockSize } |
| |
| func (c *aesCipherAsm) Encrypt(dst, src []byte) { |
| if len(src) < BlockSize { |
| panic("crypto/aes: input not full block") |
| } |
| if len(dst) < BlockSize { |
| panic("crypto/aes: output not full block") |
| } |
| encryptBlockAsm(&dst[0], &src[0], &c.enc[0]) |
| } |
| |
| func (c *aesCipherAsm) Decrypt(dst, src []byte) { |
| if len(src) < BlockSize { |
| panic("crypto/aes: input not full block") |
| } |
| if len(dst) < BlockSize { |
| panic("crypto/aes: output not full block") |
| } |
| decryptBlockAsm(&dst[0], &src[0], &c.dec[0]) |
| } |
| |
| // expandKey is used by BenchmarkExpand to ensure that the asm implementation |
| // of key expansion is used for the benchmark when it is available. |
| func expandKey(key []byte, enc, dec []uint32) { |
| setEncryptKeyAsm(&key[0], len(key)*8, &enc[0]) |
| setDecryptKeyAsm(&key[0], len(key)*8, &dec[0]) |
| } |