| 1 | //! AES Key Locker Intrinsics | 
| 2 | //! | 
|---|
| 3 | //! The Intrinsics here correspond to those in the `keylockerintrin.h` C header. | 
|---|
| 4 |  | 
|---|
| 5 | use crate::core_arch::x86::__m128i; | 
|---|
| 6 | use crate::ptr; | 
|---|
| 7 |  | 
|---|
| 8 | #[ cfg(test)] | 
|---|
| 9 | use stdarch_test::assert_instr; | 
|---|
| 10 |  | 
|---|
| 11 | #[ repr(C, packed)] | 
|---|
| 12 | struct EncodeKey128Output(u32, __m128i, __m128i, __m128i, __m128i, __m128i, __m128i); | 
|---|
| 13 |  | 
|---|
| 14 | #[ repr(C, packed)] | 
|---|
| 15 | struct EncodeKey256Output( | 
|---|
| 16 | u32, | 
|---|
| 17 | __m128i, | 
|---|
| 18 | __m128i, | 
|---|
| 19 | __m128i, | 
|---|
| 20 | __m128i, | 
|---|
| 21 | __m128i, | 
|---|
| 22 | __m128i, | 
|---|
| 23 | __m128i, | 
|---|
| 24 | ); | 
|---|
| 25 |  | 
|---|
| 26 | #[ repr(C, packed)] | 
|---|
| 27 | struct AesOutput(u8, __m128i); | 
|---|
| 28 |  | 
|---|
| 29 | #[ repr(C, packed)] | 
|---|
| 30 | struct WideAesOutput( | 
|---|
| 31 | u8, | 
|---|
| 32 | __m128i, | 
|---|
| 33 | __m128i, | 
|---|
| 34 | __m128i, | 
|---|
| 35 | __m128i, | 
|---|
| 36 | __m128i, | 
|---|
| 37 | __m128i, | 
|---|
| 38 | __m128i, | 
|---|
| 39 | __m128i, | 
|---|
| 40 | ); | 
|---|
| 41 |  | 
|---|
| 42 | #[ allow(improper_ctypes)] | 
|---|
| 43 | unsafe extern "unadjusted"{ | 
|---|
| 44 | #[ link_name= "llvm.x86.loadiwkey"] | 
|---|
| 45 | unsafefn loadiwkey(integrity_key: __m128i, key_lo: __m128i, key_hi: __m128i, control: u32); | 
|---|
| 46 |  | 
|---|
| 47 | #[ link_name= "llvm.x86.encodekey128"] | 
|---|
| 48 | unsafefn encodekey128(key_metadata: u32, key: __m128i) -> EncodeKey128Output; | 
|---|
| 49 | #[ link_name= "llvm.x86.encodekey256"] | 
|---|
| 50 | unsafefn encodekey256(key_metadata: u32, key_lo: __m128i, key_hi: __m128i) -> EncodeKey256Output; | 
|---|
| 51 |  | 
|---|
| 52 | #[ link_name= "llvm.x86.aesenc128kl"] | 
|---|
| 53 | unsafefn aesenc128kl(data: __m128i, handle: *const u8) -> AesOutput; | 
|---|
| 54 | #[ link_name= "llvm.x86.aesdec128kl"] | 
|---|
| 55 | unsafefn aesdec128kl(data: __m128i, handle: *const u8) -> AesOutput; | 
|---|
| 56 | #[ link_name= "llvm.x86.aesenc256kl"] | 
|---|
| 57 | unsafefn aesenc256kl(data: __m128i, handle: *const u8) -> AesOutput; | 
|---|
| 58 | #[ link_name= "llvm.x86.aesdec256kl"] | 
|---|
| 59 | unsafefn aesdec256kl(data: __m128i, handle: *const u8) -> AesOutput; | 
|---|
| 60 |  | 
|---|
| 61 | #[ link_name= "llvm.x86.aesencwide128kl"] | 
|---|
| 62 | unsafefn aesencwide128kl( | 
|---|
| 63 | handle: *const u8, | 
|---|
| 64 | i0: __m128i, | 
|---|
| 65 | i1: __m128i, | 
|---|
| 66 | i2: __m128i, | 
|---|
| 67 | i3: __m128i, | 
|---|
| 68 | i4: __m128i, | 
|---|
| 69 | i5: __m128i, | 
|---|
| 70 | i6: __m128i, | 
|---|
| 71 | i7: __m128i, | 
|---|
| 72 | ) -> WideAesOutput; | 
|---|
| 73 | #[ link_name= "llvm.x86.aesdecwide128kl"] | 
|---|
| 74 | unsafefn aesdecwide128kl( | 
|---|
| 75 | handle: *const u8, | 
|---|
| 76 | i0: __m128i, | 
|---|
| 77 | i1: __m128i, | 
|---|
| 78 | i2: __m128i, | 
|---|
| 79 | i3: __m128i, | 
|---|
| 80 | i4: __m128i, | 
|---|
| 81 | i5: __m128i, | 
|---|
| 82 | i6: __m128i, | 
|---|
| 83 | i7: __m128i, | 
|---|
| 84 | ) -> WideAesOutput; | 
|---|
| 85 | #[ link_name= "llvm.x86.aesencwide256kl"] | 
|---|
| 86 | unsafefn aesencwide256kl( | 
|---|
| 87 | handle: *const u8, | 
|---|
| 88 | i0: __m128i, | 
|---|
| 89 | i1: __m128i, | 
|---|
| 90 | i2: __m128i, | 
|---|
| 91 | i3: __m128i, | 
|---|
| 92 | i4: __m128i, | 
|---|
| 93 | i5: __m128i, | 
|---|
| 94 | i6: __m128i, | 
|---|
| 95 | i7: __m128i, | 
|---|
| 96 | ) -> WideAesOutput; | 
|---|
| 97 | #[ link_name= "llvm.x86.aesdecwide256kl"] | 
|---|
| 98 | unsafefn aesdecwide256kl( | 
|---|
| 99 | handle: *const u8, | 
|---|
| 100 | i0: __m128i, | 
|---|
| 101 | i1: __m128i, | 
|---|
| 102 | i2: __m128i, | 
|---|
| 103 | i3: __m128i, | 
|---|
| 104 | i4: __m128i, | 
|---|
| 105 | i5: __m128i, | 
|---|
| 106 | i6: __m128i, | 
|---|
| 107 | i7: __m128i, | 
|---|
| 108 | ) -> WideAesOutput; | 
|---|
| 109 | } | 
|---|
| 110 |  | 
|---|
| 111 | /// Load internal wrapping key (IWKey). The 32-bit unsigned integer `control` specifies IWKey's KeySource | 
|---|
| 112 | /// and whether backing up the key is permitted. IWKey's 256-bit encryption key is loaded from `key_lo` | 
|---|
| 113 | /// and `key_hi`. | 
|---|
| 114 | /// | 
|---|
| 115 | ///  - `control[0]`: NoBackup bit. If set, the IWKey cannot be backed up. | 
|---|
| 116 | ///  - `control[1:4]`: KeySource bits. These bits specify the encoding method of the IWKey. The only | 
|---|
| 117 | ///    allowed values are `0` (AES GCM SIV wrapping algorithm with the specified key) and `1` (AES GCM | 
|---|
| 118 | ///    SIV wrapping algorithm with random keys enforced by hardware). After calling `_mm_loadiwkey` with | 
|---|
| 119 | ///    KeySource set to `1`, software must check `ZF` to ensure that the key was loaded successfully. | 
|---|
| 120 | ///    Using any other value may result in a General Protection Exception. | 
|---|
| 121 | ///  - `control[5:31]`: Reserved for future use, must be set to `0`. | 
|---|
| 122 | /// | 
|---|
| 123 | /// Note that setting the NoBackup bit and using the KeySource value `1` requires hardware support. These | 
|---|
| 124 | /// permissions can be found by calling `__cpuid(0x19)` and checking the `ECX[0:1]` bits. Failing to follow | 
|---|
| 125 | /// these restrictions may result in a General Protection Exception. | 
|---|
| 126 | /// | 
|---|
| 127 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_loadiwkey) | 
|---|
| 128 | #[ inline] | 
|---|
| 129 | #[ target_feature(enable = "kl")] | 
|---|
| 130 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 131 | #[ cfg_attr(test, assert_instr(loadiwkey))] | 
|---|
| 132 | pub unsafe fn _mm_loadiwkey( | 
|---|
| 133 | control: u32, | 
|---|
| 134 | integrity_key: __m128i, | 
|---|
| 135 | key_lo: __m128i, | 
|---|
| 136 | key_hi: __m128i, | 
|---|
| 137 | ) { | 
|---|
| 138 | loadiwkey(integrity_key, key_lo, key_hi, control); | 
|---|
| 139 | } | 
|---|
| 140 |  | 
|---|
| 141 | /// Wrap a 128-bit AES key into a 384-bit key handle and stores it in `handle`. Returns the `control` | 
|---|
| 142 | /// parameter used to create the IWKey. | 
|---|
| 143 | /// | 
|---|
| 144 | ///  - `key_params[0]`: If set, this key can only be used by the Kernel. | 
|---|
| 145 | ///  - `key_params[1]`: If set, this key can not be used to encrypt. | 
|---|
| 146 | ///  - `key_params[2]`: If set, this key can not be used to decrypt. | 
|---|
| 147 | ///  - `key_params[31:3]`: Reserved for future use, must be set to `0`. | 
|---|
| 148 | /// | 
|---|
| 149 | /// Note that these restrictions need hardware support, and the supported restrictions can be found by | 
|---|
| 150 | /// calling `__cpuid(0x19)` and checking the `EAX[0:2]` bits. Failing to follow these restrictions may | 
|---|
| 151 | /// result in a General Protection Exception. | 
|---|
| 152 | /// | 
|---|
| 153 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_encodekey128_u32) | 
|---|
| 154 | #[ inline] | 
|---|
| 155 | #[ target_feature(enable = "kl")] | 
|---|
| 156 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 157 | #[ cfg_attr(test, assert_instr(encodekey128))] | 
|---|
| 158 | pub unsafe fn _mm_encodekey128_u32(key_params: u32, key: __m128i, handle: *mut u8) -> u32 { | 
|---|
| 159 | let EncodeKey128Output(control: u32, key0: __m128i, key1: __m128i, key2: __m128i, _, _, _) = encodekey128(key_metadata:key_params, key); | 
|---|
| 160 | ptr::write_unaligned(dst:handle.cast(), [key0, key1, key2]); | 
|---|
| 161 | control | 
|---|
| 162 | } | 
|---|
| 163 |  | 
|---|
| 164 | /// Wrap a 256-bit AES key into a 512-bit key handle and stores it in `handle`. Returns the `control` | 
|---|
| 165 | /// parameter used to create the IWKey. | 
|---|
| 166 | /// | 
|---|
| 167 | ///  - `key_params[0]`: If set, this key can only be used by the Kernel. | 
|---|
| 168 | ///  - `key_params[1]`: If set, this key can not be used to encrypt. | 
|---|
| 169 | ///  - `key_params[2]`: If set, this key can not be used to decrypt. | 
|---|
| 170 | ///  - `key_params[31:3]`: Reserved for future use, must be set to `0`. | 
|---|
| 171 | /// | 
|---|
| 172 | /// Note that these restrictions need hardware support, and the supported restrictions can be found by | 
|---|
| 173 | /// calling `__cpuid(0x19)` and checking the `EAX[0:2]` bits. Failing to follow these restrictions may | 
|---|
| 174 | /// result in a General Protection Exception. | 
|---|
| 175 | /// | 
|---|
| 176 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_encodekey256_u32) | 
|---|
| 177 | #[ inline] | 
|---|
| 178 | #[ target_feature(enable = "kl")] | 
|---|
| 179 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 180 | #[ cfg_attr(test, assert_instr(encodekey256))] | 
|---|
| 181 | pub unsafe fn _mm_encodekey256_u32( | 
|---|
| 182 | key_params: u32, | 
|---|
| 183 | key_lo: __m128i, | 
|---|
| 184 | key_hi: __m128i, | 
|---|
| 185 | handle: *mut u8, | 
|---|
| 186 | ) -> u32 { | 
|---|
| 187 | let EncodeKey256Output(control: u32, key0: __m128i, key1: __m128i, key2: __m128i, key3: __m128i, _, _, _) = | 
|---|
| 188 | encodekey256(key_metadata:key_params, key_lo, key_hi); | 
|---|
| 189 | ptr::write_unaligned(dst:handle.cast(), [key0, key1, key2, key3]); | 
|---|
| 190 | control | 
|---|
| 191 | } | 
|---|
| 192 |  | 
|---|
| 193 | /// Encrypt 10 rounds of unsigned 8-bit integers in `input` using 128-bit AES key specified in the | 
|---|
| 194 | /// 384-bit key handle `handle`. Store the resulting unsigned 8-bit integers into the corresponding | 
|---|
| 195 | /// elements of `output`. Returns `0` if the operation was successful, and `1` if the operation failed | 
|---|
| 196 | /// due to a handle violation. | 
|---|
| 197 | /// | 
|---|
| 198 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_aesenc128kl_u8) | 
|---|
| 199 | #[ inline] | 
|---|
| 200 | #[ target_feature(enable = "kl")] | 
|---|
| 201 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 202 | #[ cfg_attr(test, assert_instr(aesenc128kl))] | 
|---|
| 203 | pub unsafe fn _mm_aesenc128kl_u8(output: *mut __m128i, input: __m128i, handle: *const u8) -> u8 { | 
|---|
| 204 | let AesOutput(status: u8, result: __m128i) = aesenc128kl(data:input, handle); | 
|---|
| 205 | *output = result; | 
|---|
| 206 | status | 
|---|
| 207 | } | 
|---|
| 208 |  | 
|---|
| 209 | /// Decrypt 10 rounds of unsigned 8-bit integers in `input` using 128-bit AES key specified in the | 
|---|
| 210 | /// 384-bit key handle `handle`. Store the resulting unsigned 8-bit integers into the corresponding | 
|---|
| 211 | /// elements of `output`. Returns `0` if the operation was successful, and `1` if the operation failed | 
|---|
| 212 | /// due to a handle violation. | 
|---|
| 213 | /// | 
|---|
| 214 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_aesdec128kl_u8) | 
|---|
| 215 | #[ inline] | 
|---|
| 216 | #[ target_feature(enable = "kl")] | 
|---|
| 217 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 218 | #[ cfg_attr(test, assert_instr(aesdec128kl))] | 
|---|
| 219 | pub unsafe fn _mm_aesdec128kl_u8(output: *mut __m128i, input: __m128i, handle: *const u8) -> u8 { | 
|---|
| 220 | let AesOutput(status: u8, result: __m128i) = aesdec128kl(data:input, handle); | 
|---|
| 221 | *output = result; | 
|---|
| 222 | status | 
|---|
| 223 | } | 
|---|
| 224 |  | 
|---|
| 225 | /// Encrypt 14 rounds of unsigned 8-bit integers in `input` using 256-bit AES key specified in the | 
|---|
| 226 | /// 512-bit key handle `handle`. Store the resulting unsigned 8-bit integers into the corresponding | 
|---|
| 227 | /// elements of `output`. Returns `0` if the operation was successful, and `1` if the operation failed | 
|---|
| 228 | /// due to a handle violation. | 
|---|
| 229 | /// | 
|---|
| 230 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_aesenc256kl_u8) | 
|---|
| 231 | #[ inline] | 
|---|
| 232 | #[ target_feature(enable = "kl")] | 
|---|
| 233 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 234 | #[ cfg_attr(test, assert_instr(aesenc256kl))] | 
|---|
| 235 | pub unsafe fn _mm_aesenc256kl_u8(output: *mut __m128i, input: __m128i, handle: *const u8) -> u8 { | 
|---|
| 236 | let AesOutput(status: u8, result: __m128i) = aesenc256kl(data:input, handle); | 
|---|
| 237 | *output = result; | 
|---|
| 238 | status | 
|---|
| 239 | } | 
|---|
| 240 |  | 
|---|
| 241 | /// Decrypt 14 rounds of unsigned 8-bit integers in `input` using 256-bit AES key specified in the | 
|---|
| 242 | /// 512-bit key handle `handle`. Store the resulting unsigned 8-bit integers into the corresponding | 
|---|
| 243 | /// elements of `output`. Returns `0` if the operation was successful, and `1` if the operation failed | 
|---|
| 244 | /// due to a handle violation. | 
|---|
| 245 | /// | 
|---|
| 246 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_aesdec256kl_u8) | 
|---|
| 247 | #[ inline] | 
|---|
| 248 | #[ target_feature(enable = "kl")] | 
|---|
| 249 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 250 | #[ cfg_attr(test, assert_instr(aesdec256kl))] | 
|---|
| 251 | pub unsafe fn _mm_aesdec256kl_u8(output: *mut __m128i, input: __m128i, handle: *const u8) -> u8 { | 
|---|
| 252 | let AesOutput(status: u8, result: __m128i) = aesdec256kl(data:input, handle); | 
|---|
| 253 | *output = result; | 
|---|
| 254 | status | 
|---|
| 255 | } | 
|---|
| 256 |  | 
|---|
| 257 | /// Encrypt 10 rounds of 8 groups of unsigned 8-bit integers in `input` using 128-bit AES key specified | 
|---|
| 258 | /// in the 384-bit key handle `handle`. Store the resulting unsigned 8-bit integers into the corresponding | 
|---|
| 259 | /// elements of `output`. Returns `0` if the operation was successful, and `1` if the operation failed | 
|---|
| 260 | /// due to a handle violation. | 
|---|
| 261 | /// | 
|---|
| 262 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_aesencwide128kl_u8) | 
|---|
| 263 | #[ inline] | 
|---|
| 264 | #[ target_feature(enable = "widekl")] | 
|---|
| 265 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 266 | #[ cfg_attr(test, assert_instr(aesencwide128kl))] | 
|---|
| 267 | pub unsafe fn _mm_aesencwide128kl_u8( | 
|---|
| 268 | output: *mut __m128i, | 
|---|
| 269 | input: *const __m128i, | 
|---|
| 270 | handle: *const u8, | 
|---|
| 271 | ) -> u8 { | 
|---|
| 272 | let input: &[__m128i] = &*ptr::slice_from_raw_parts(data:input, len:8); | 
|---|
| 273 | let WideAesOutput(status: u8, out0: __m128i, out1: __m128i, out2: __m128i, out3: __m128i, out4: __m128i, out5: __m128i, out6: __m128i, out7: __m128i) = aesencwide128kl( | 
|---|
| 274 | handle, i0:input[0], i1:input[1], i2:input[2], i3:input[3], i4:input[4], i5:input[5], i6:input[6], i7:input[7], | 
|---|
| 275 | ); | 
|---|
| 276 | *output.cast() = [out0, out1, out2, out3, out4, out5, out6, out7]; | 
|---|
| 277 | status | 
|---|
| 278 | } | 
|---|
| 279 |  | 
|---|
| 280 | /// Decrypt 10 rounds of 8 groups of unsigned 8-bit integers in `input` using 128-bit AES key specified | 
|---|
| 281 | /// in the 384-bit key handle `handle`. Store the resulting unsigned 8-bit integers into the corresponding | 
|---|
| 282 | /// elements of `output`. Returns `0` if the operation was successful, and `1` if the operation failed | 
|---|
| 283 | /// due to a handle violation. | 
|---|
| 284 | /// | 
|---|
| 285 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_aesdecwide128kl_u8) | 
|---|
| 286 | #[ inline] | 
|---|
| 287 | #[ target_feature(enable = "widekl")] | 
|---|
| 288 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 289 | #[ cfg_attr(test, assert_instr(aesdecwide128kl))] | 
|---|
| 290 | pub unsafe fn _mm_aesdecwide128kl_u8( | 
|---|
| 291 | output: *mut __m128i, | 
|---|
| 292 | input: *const __m128i, | 
|---|
| 293 | handle: *const u8, | 
|---|
| 294 | ) -> u8 { | 
|---|
| 295 | let input: &[__m128i] = &*ptr::slice_from_raw_parts(data:input, len:8); | 
|---|
| 296 | let WideAesOutput(status: u8, out0: __m128i, out1: __m128i, out2: __m128i, out3: __m128i, out4: __m128i, out5: __m128i, out6: __m128i, out7: __m128i) = aesdecwide128kl( | 
|---|
| 297 | handle, i0:input[0], i1:input[1], i2:input[2], i3:input[3], i4:input[4], i5:input[5], i6:input[6], i7:input[7], | 
|---|
| 298 | ); | 
|---|
| 299 | *output.cast() = [out0, out1, out2, out3, out4, out5, out6, out7]; | 
|---|
| 300 | status | 
|---|
| 301 | } | 
|---|
| 302 |  | 
|---|
| 303 | /// Encrypt 14 rounds of 8 groups of unsigned 8-bit integers in `input` using 256-bit AES key specified | 
|---|
| 304 | /// in the 512-bit key handle `handle`. Store the resulting unsigned 8-bit integers into the corresponding | 
|---|
| 305 | /// elements of `output`. Returns `0` if the operation was successful, and `1` if the operation failed | 
|---|
| 306 | /// due to a handle violation. | 
|---|
| 307 | /// | 
|---|
| 308 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_aesencwide256kl_u8) | 
|---|
| 309 | #[ inline] | 
|---|
| 310 | #[ target_feature(enable = "widekl")] | 
|---|
| 311 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 312 | #[ cfg_attr(test, assert_instr(aesencwide256kl))] | 
|---|
| 313 | pub unsafe fn _mm_aesencwide256kl_u8( | 
|---|
| 314 | output: *mut __m128i, | 
|---|
| 315 | input: *const __m128i, | 
|---|
| 316 | handle: *const u8, | 
|---|
| 317 | ) -> u8 { | 
|---|
| 318 | let input: &[__m128i] = &*ptr::slice_from_raw_parts(data:input, len:8); | 
|---|
| 319 | let WideAesOutput(status: u8, out0: __m128i, out1: __m128i, out2: __m128i, out3: __m128i, out4: __m128i, out5: __m128i, out6: __m128i, out7: __m128i) = aesencwide256kl( | 
|---|
| 320 | handle, i0:input[0], i1:input[1], i2:input[2], i3:input[3], i4:input[4], i5:input[5], i6:input[6], i7:input[7], | 
|---|
| 321 | ); | 
|---|
| 322 | *output.cast() = [out0, out1, out2, out3, out4, out5, out6, out7]; | 
|---|
| 323 | status | 
|---|
| 324 | } | 
|---|
| 325 |  | 
|---|
| 326 | /// Decrypt 14 rounds of 8 groups of unsigned 8-bit integers in `input` using 256-bit AES key specified | 
|---|
| 327 | /// in the 512-bit key handle `handle`. Store the resulting unsigned 8-bit integers into the corresponding | 
|---|
| 328 | /// elements of `output`. Returns `0` if the operation was successful, and `1` if the operation failed | 
|---|
| 329 | /// due to a handle violation. | 
|---|
| 330 | /// | 
|---|
| 331 | /// [Intel's documentation](https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html#text=_mm_aesdecwide256kl_u8) | 
|---|
| 332 | #[ inline] | 
|---|
| 333 | #[ target_feature(enable = "widekl")] | 
|---|
| 334 | #[ stable(feature = "keylocker_x86", since = "CURRENT_RUSTC_VERSION")] | 
|---|
| 335 | #[ cfg_attr(test, assert_instr(aesdecwide256kl))] | 
|---|
| 336 | pub unsafe fn _mm_aesdecwide256kl_u8( | 
|---|
| 337 | output: *mut __m128i, | 
|---|
| 338 | input: *const __m128i, | 
|---|
| 339 | handle: *const u8, | 
|---|
| 340 | ) -> u8 { | 
|---|
| 341 | let input: &[__m128i] = &*ptr::slice_from_raw_parts(data:input, len:8); | 
|---|
| 342 | let WideAesOutput(status: u8, out0: __m128i, out1: __m128i, out2: __m128i, out3: __m128i, out4: __m128i, out5: __m128i, out6: __m128i, out7: __m128i) = aesdecwide256kl( | 
|---|
| 343 | handle, i0:input[0], i1:input[1], i2:input[2], i3:input[3], i4:input[4], i5:input[5], i6:input[6], i7:input[7], | 
|---|
| 344 | ); | 
|---|
| 345 | *output.cast() = [out0, out1, out2, out3, out4, out5, out6, out7]; | 
|---|
| 346 | status | 
|---|
| 347 | } | 
|---|
| 348 |  | 
|---|
| 349 | #[ cfg(test)] | 
|---|
| 350 | mod tests { | 
|---|
| 351 | use crate::core_arch::x86::*; | 
|---|
| 352 | use stdarch_test::simd_test; | 
|---|
| 353 |  | 
|---|
| 354 | #[ target_feature(enable = "kl")] | 
|---|
| 355 | unsafe fn encodekey128() -> [u8; 48] { | 
|---|
| 356 | let mut handle = [0; 48]; | 
|---|
| 357 | let _ = _mm_encodekey128_u32(0, _mm_setzero_si128(), handle.as_mut_ptr()); | 
|---|
| 358 | handle | 
|---|
| 359 | } | 
|---|
| 360 |  | 
|---|
| 361 | #[ target_feature(enable = "kl")] | 
|---|
| 362 | unsafe fn encodekey256() -> [u8; 64] { | 
|---|
| 363 | let mut handle = [0; 64]; | 
|---|
| 364 | let _ = _mm_encodekey256_u32( | 
|---|
| 365 | 0, | 
|---|
| 366 | _mm_setzero_si128(), | 
|---|
| 367 | _mm_setzero_si128(), | 
|---|
| 368 | handle.as_mut_ptr(), | 
|---|
| 369 | ); | 
|---|
| 370 | handle | 
|---|
| 371 | } | 
|---|
| 372 |  | 
|---|
| 373 | #[simd_test(enable = "kl")] | 
|---|
| 374 | unsafe fn test_mm_encodekey128_u32() { | 
|---|
| 375 | encodekey128(); | 
|---|
| 376 | } | 
|---|
| 377 |  | 
|---|
| 378 | #[simd_test(enable = "kl")] | 
|---|
| 379 | unsafe fn test_mm_encodekey256_u32() { | 
|---|
| 380 | encodekey256(); | 
|---|
| 381 | } | 
|---|
| 382 |  | 
|---|
| 383 | #[simd_test(enable = "kl")] | 
|---|
| 384 | unsafe fn test_mm_aesenc128kl_u8() { | 
|---|
| 385 | let mut buffer = _mm_setzero_si128(); | 
|---|
| 386 | let key = encodekey128(); | 
|---|
| 387 |  | 
|---|
| 388 | for _ in 0..100 { | 
|---|
| 389 | let status = _mm_aesenc128kl_u8(&mut buffer, buffer, key.as_ptr()); | 
|---|
| 390 | assert_eq!(status, 0); | 
|---|
| 391 | } | 
|---|
| 392 | for _ in 0..100 { | 
|---|
| 393 | let status = _mm_aesdec128kl_u8(&mut buffer, buffer, key.as_ptr()); | 
|---|
| 394 | assert_eq!(status, 0); | 
|---|
| 395 | } | 
|---|
| 396 |  | 
|---|
| 397 | assert_eq_m128i(buffer, _mm_setzero_si128()); | 
|---|
| 398 | } | 
|---|
| 399 |  | 
|---|
| 400 | #[simd_test(enable = "kl")] | 
|---|
| 401 | unsafe fn test_mm_aesdec128kl_u8() { | 
|---|
| 402 | let mut buffer = _mm_setzero_si128(); | 
|---|
| 403 | let key = encodekey128(); | 
|---|
| 404 |  | 
|---|
| 405 | for _ in 0..100 { | 
|---|
| 406 | let status = _mm_aesdec128kl_u8(&mut buffer, buffer, key.as_ptr()); | 
|---|
| 407 | assert_eq!(status, 0); | 
|---|
| 408 | } | 
|---|
| 409 | for _ in 0..100 { | 
|---|
| 410 | let status = _mm_aesenc128kl_u8(&mut buffer, buffer, key.as_ptr()); | 
|---|
| 411 | assert_eq!(status, 0); | 
|---|
| 412 | } | 
|---|
| 413 |  | 
|---|
| 414 | assert_eq_m128i(buffer, _mm_setzero_si128()); | 
|---|
| 415 | } | 
|---|
| 416 |  | 
|---|
| 417 | #[simd_test(enable = "kl")] | 
|---|
| 418 | unsafe fn test_mm_aesenc256kl_u8() { | 
|---|
| 419 | let mut buffer = _mm_setzero_si128(); | 
|---|
| 420 | let key = encodekey256(); | 
|---|
| 421 |  | 
|---|
| 422 | for _ in 0..100 { | 
|---|
| 423 | let status = _mm_aesenc256kl_u8(&mut buffer, buffer, key.as_ptr()); | 
|---|
| 424 | assert_eq!(status, 0); | 
|---|
| 425 | } | 
|---|
| 426 | for _ in 0..100 { | 
|---|
| 427 | let status = _mm_aesdec256kl_u8(&mut buffer, buffer, key.as_ptr()); | 
|---|
| 428 | assert_eq!(status, 0); | 
|---|
| 429 | } | 
|---|
| 430 |  | 
|---|
| 431 | assert_eq_m128i(buffer, _mm_setzero_si128()); | 
|---|
| 432 | } | 
|---|
| 433 |  | 
|---|
| 434 | #[simd_test(enable = "kl")] | 
|---|
| 435 | unsafe fn test_mm_aesdec256kl_u8() { | 
|---|
| 436 | let mut buffer = _mm_setzero_si128(); | 
|---|
| 437 | let key = encodekey256(); | 
|---|
| 438 |  | 
|---|
| 439 | for _ in 0..100 { | 
|---|
| 440 | let status = _mm_aesdec256kl_u8(&mut buffer, buffer, key.as_ptr()); | 
|---|
| 441 | assert_eq!(status, 0); | 
|---|
| 442 | } | 
|---|
| 443 | for _ in 0..100 { | 
|---|
| 444 | let status = _mm_aesenc256kl_u8(&mut buffer, buffer, key.as_ptr()); | 
|---|
| 445 | assert_eq!(status, 0); | 
|---|
| 446 | } | 
|---|
| 447 |  | 
|---|
| 448 | assert_eq_m128i(buffer, _mm_setzero_si128()); | 
|---|
| 449 | } | 
|---|
| 450 |  | 
|---|
| 451 | #[simd_test(enable = "widekl")] | 
|---|
| 452 | unsafe fn test_mm_aesencwide128kl_u8() { | 
|---|
| 453 | let mut buffer = [_mm_setzero_si128(); 8]; | 
|---|
| 454 | let key = encodekey128(); | 
|---|
| 455 |  | 
|---|
| 456 | for _ in 0..100 { | 
|---|
| 457 | let status = _mm_aesencwide128kl_u8(buffer.as_mut_ptr(), buffer.as_ptr(), key.as_ptr()); | 
|---|
| 458 | assert_eq!(status, 0); | 
|---|
| 459 | } | 
|---|
| 460 | for _ in 0..100 { | 
|---|
| 461 | let status = _mm_aesdecwide128kl_u8(buffer.as_mut_ptr(), buffer.as_ptr(), key.as_ptr()); | 
|---|
| 462 | assert_eq!(status, 0); | 
|---|
| 463 | } | 
|---|
| 464 |  | 
|---|
| 465 | for elem in buffer { | 
|---|
| 466 | assert_eq_m128i(elem, _mm_setzero_si128()); | 
|---|
| 467 | } | 
|---|
| 468 | } | 
|---|
| 469 |  | 
|---|
| 470 | #[simd_test(enable = "widekl")] | 
|---|
| 471 | unsafe fn test_mm_aesdecwide128kl_u8() { | 
|---|
| 472 | let mut buffer = [_mm_setzero_si128(); 8]; | 
|---|
| 473 | let key = encodekey128(); | 
|---|
| 474 |  | 
|---|
| 475 | for _ in 0..100 { | 
|---|
| 476 | let status = _mm_aesdecwide128kl_u8(buffer.as_mut_ptr(), buffer.as_ptr(), key.as_ptr()); | 
|---|
| 477 | assert_eq!(status, 0); | 
|---|
| 478 | } | 
|---|
| 479 | for _ in 0..100 { | 
|---|
| 480 | let status = _mm_aesencwide128kl_u8(buffer.as_mut_ptr(), buffer.as_ptr(), key.as_ptr()); | 
|---|
| 481 | assert_eq!(status, 0); | 
|---|
| 482 | } | 
|---|
| 483 |  | 
|---|
| 484 | for elem in buffer { | 
|---|
| 485 | assert_eq_m128i(elem, _mm_setzero_si128()); | 
|---|
| 486 | } | 
|---|
| 487 | } | 
|---|
| 488 |  | 
|---|
| 489 | #[simd_test(enable = "widekl")] | 
|---|
| 490 | unsafe fn test_mm_aesencwide256kl_u8() { | 
|---|
| 491 | let mut buffer = [_mm_setzero_si128(); 8]; | 
|---|
| 492 | let key = encodekey256(); | 
|---|
| 493 |  | 
|---|
| 494 | for _ in 0..100 { | 
|---|
| 495 | let status = _mm_aesencwide256kl_u8(buffer.as_mut_ptr(), buffer.as_ptr(), key.as_ptr()); | 
|---|
| 496 | assert_eq!(status, 0); | 
|---|
| 497 | } | 
|---|
| 498 | for _ in 0..100 { | 
|---|
| 499 | let status = _mm_aesdecwide256kl_u8(buffer.as_mut_ptr(), buffer.as_ptr(), key.as_ptr()); | 
|---|
| 500 | assert_eq!(status, 0); | 
|---|
| 501 | } | 
|---|
| 502 |  | 
|---|
| 503 | for elem in buffer { | 
|---|
| 504 | assert_eq_m128i(elem, _mm_setzero_si128()); | 
|---|
| 505 | } | 
|---|
| 506 | } | 
|---|
| 507 |  | 
|---|
| 508 | #[simd_test(enable = "widekl")] | 
|---|
| 509 | unsafe fn test_mm_aesdecwide256kl_u8() { | 
|---|
| 510 | let mut buffer = [_mm_setzero_si128(); 8]; | 
|---|
| 511 | let key = encodekey256(); | 
|---|
| 512 |  | 
|---|
| 513 | for _ in 0..100 { | 
|---|
| 514 | let status = _mm_aesdecwide256kl_u8(buffer.as_mut_ptr(), buffer.as_ptr(), key.as_ptr()); | 
|---|
| 515 | assert_eq!(status, 0); | 
|---|
| 516 | } | 
|---|
| 517 | for _ in 0..100 { | 
|---|
| 518 | let status = _mm_aesencwide256kl_u8(buffer.as_mut_ptr(), buffer.as_ptr(), key.as_ptr()); | 
|---|
| 519 | assert_eq!(status, 0); | 
|---|
| 520 | } | 
|---|
| 521 |  | 
|---|
| 522 | for elem in buffer { | 
|---|
| 523 | assert_eq_m128i(elem, _mm_setzero_si128()); | 
|---|
| 524 | } | 
|---|
| 525 | } | 
|---|
| 526 | } | 
|---|
| 527 |  | 
|---|