|
| 1 | +/* |
| 2 | + * AES OpenCL XTS functions |
| 3 | + * |
| 4 | + * Copyright (c) 2017-2025, magnum. |
| 5 | + * |
| 6 | + * This software is hereby released to the general public under |
| 7 | + * the following terms: Redistribution and use in source and binary |
| 8 | + * forms, with or without modification, are permitted. |
| 9 | + */ |
| 10 | + |
| 11 | +#ifndef _OPENCL_AES_XTS_H_ |
| 12 | +#define _OPENCL_AES_XTS_H_ |
| 13 | + |
| 14 | +#ifdef _OPENCL_AES_H_ |
| 15 | +#error "opencl_aes_xts.h cannot be sourced after opencl_aes.h" |
| 16 | +#endif |
| 17 | + |
| 18 | +/* Tell the AES code we use two contexts simultaneously */ |
| 19 | +#define AES_SIMULTANEOUS_CTX_SHIFT 1 |
| 20 | +#include "opencl_aes.h" |
| 21 | + |
| 22 | +INLINE void AES_256_XTS_first_sector(AES_SRC_TYPE uint *in, AES_DST_TYPE uint *out, |
| 23 | + AES_KEY_TYPE uchar *double_key, |
| 24 | + __local aes_local_t *lt1, __local aes_local_t *lt2) |
| 25 | +{ |
| 26 | + uint tweak[4] = { 0 }; |
| 27 | + uint buf[4]; |
| 28 | + int i; |
| 29 | + AES_KEY akey1, akey2; akey1.lt = lt1; akey2.lt = lt2; |
| 30 | + |
| 31 | + AES_set_decrypt_key(double_key, 256, &akey1); |
| 32 | + AES_set_encrypt_key(double_key + 32, 256, &akey2); |
| 33 | + |
| 34 | + AES_encrypt((uchar*)tweak, (uchar*)tweak, &akey2); |
| 35 | + |
| 36 | + for (i = 0; i < 4; i++) |
| 37 | + buf[i] = in[i] ^ tweak[i]; |
| 38 | + |
| 39 | + AES_decrypt((uchar*)buf, (uchar*)buf, &akey1); |
| 40 | + |
| 41 | + for (i = 0; i < 4; i++) |
| 42 | + out[i] = buf[i] ^ tweak[i]; |
| 43 | +} |
| 44 | + |
| 45 | +INLINE void AES_256_XTS_DiskCryptor(AES_SRC_TYPE uchar *data, AES_DST_TYPE uchar *output, |
| 46 | + AES_KEY_TYPE uchar *double_key, int len, |
| 47 | + __local aes_local_t *lt1, __local aes_local_t *lt2) |
| 48 | +{ |
| 49 | + uchar buf[16]; |
| 50 | + int i, j, cnt; |
| 51 | + AES_KEY key1; key1.lt = lt1; |
| 52 | + AES_KEY key2; key2.lt = lt2; |
| 53 | + int bits = 256; |
| 54 | + uchar buffer[96]; |
| 55 | + uchar *out = buffer; |
| 56 | + unsigned char tweak[16] = { 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; |
| 57 | + |
| 58 | + AES_set_decrypt_key(double_key, bits, &key1); |
| 59 | + AES_set_encrypt_key(&double_key[bits / 8], bits, &key2); |
| 60 | + |
| 61 | + // first aes tweak, we do it right over tweak |
| 62 | + AES_encrypt(tweak, tweak, &key2); |
| 63 | + |
| 64 | + cnt = len / 16; |
| 65 | + for (j = 0;;) { |
| 66 | + for (i = 0; i < 16; ++i) buf[i] = data[i]^tweak[i]; |
| 67 | + AES_decrypt(buf, out, &key1); |
| 68 | + for (i = 0; i < 16; ++i) out[i] ^= tweak[i]; |
| 69 | + ++j; |
| 70 | + if (j == cnt) |
| 71 | + break; |
| 72 | + else { |
| 73 | + unsigned char Cin, Cout; |
| 74 | + unsigned x; |
| 75 | + Cin = 0; |
| 76 | + for (x = 0; x < 16; ++x) { |
| 77 | + Cout = (tweak[x] >> 7) & 1; |
| 78 | + tweak[x] = ((tweak[x] << 1) + Cin) & 0xFF; |
| 79 | + Cin = Cout; |
| 80 | + } |
| 81 | + if (Cout) |
| 82 | + tweak[0] ^= 135; // GF_128_FDBK; |
| 83 | + } |
| 84 | + data += 16; |
| 85 | + out += 16; |
| 86 | + } |
| 87 | + |
| 88 | + memcpy_macro(output, buffer, 96); |
| 89 | +} |
| 90 | + |
| 91 | +#endif /* _OPENCL_AES_XTS_H_ */ |
0 commit comments