summaryrefslogtreecommitdiffstats
path: root/crypto/aes/aes_cfb.c
diff options
context:
space:
mode:
authorAndy Polyakov <appro@openssl.org>2006-05-30 07:20:13 +0000
committerAndy Polyakov <appro@openssl.org>2006-05-30 07:20:13 +0000
commit21f0db692dcde2874caaacb0273f0d273a950e03 (patch)
treeb81eb34b51e686d158424a0f684d3a11f984ff73 /crypto/aes/aes_cfb.c
parent4d4e08ec1ce1558ca25f75b05a919ac6dc8f1338 (diff)
Tune up AES CFB. Performance improvement varies from 10% to 50% from
platform to platform. Its absolute value is within few percents marginal from that of ECB.
Diffstat (limited to 'crypto/aes/aes_cfb.c')
-rw-r--r--crypto/aes/aes_cfb.c107
1 files changed, 95 insertions, 12 deletions
diff --git a/crypto/aes/aes_cfb.c b/crypto/aes/aes_cfb.c
index 49f0411010..c139b6f50d 100644
--- a/crypto/aes/aes_cfb.c
+++ b/crypto/aes/aes_cfb.c
@@ -116,39 +116,122 @@
#include "aes_locl.h"
#include "e_os.h"
+#define STRICT_ALIGNMENT
+#if defined(__i386) || defined(__i386__) || \
+ defined(__x86_64) || defined(__x86_64__) || \
+ defined(_M_IX86) || defined(_M_AMD64) || defined(_M_X64)
+# undef STRICT_ALIGNMENT
+#endif
+
/* The input and output encrypted as though 128bit cfb mode is being
* used. The extra state information to record how much of the
* 128bit block we have used is contained in *num;
*/
void AES_cfb128_encrypt(const unsigned char *in, unsigned char *out,
- const unsigned long length, const AES_KEY *key,
+ unsigned long length, const AES_KEY *key,
unsigned char *ivec, int *num, const int enc) {
- unsigned int n;
- unsigned long l = length;
- unsigned char c;
+ unsigned int n;
+ unsigned long l = 0;
+
+ assert(in && out && key && ivec && num);
+
+ n = *num;
+
+#if !defined(OPENSSL_SMALL_FOOTPRINT)
+ if (AES_BLOCK_SIZE%sizeof(size_t) == 0) { /* always true actually */
+ if (enc) {
+ if (n) {
+ while (length) {
+ *(out++) = ivec[n] ^= *(in++);
+ length--;
+ if(!(n = (n + 1) % AES_BLOCK_SIZE))
+ break;
+ }
+ }
+#if defined(STRICT_ALIGNMENT)
+ if (((size_t)in|(size_t)out)%sizeof(size_t) != 0)
+ goto enc_unaligned;
+#endif
+ while ((l + AES_BLOCK_SIZE) <= length) {
+ unsigned int i;
+ AES_encrypt(ivec, ivec, key);
+ for (i=0;i<AES_BLOCK_SIZE;i+=sizeof(size_t)) {
+ *(size_t*)(out+l+i) =
+ *(size_t*)(ivec+i) ^= *(size_t*)(in+l+i);
+ }
+ l += AES_BLOCK_SIZE;
+ }
- assert(in && out && key && ivec && num);
+ if (l < length) {
+ AES_encrypt(ivec, ivec, key);
+ do { out[l] = ivec[n] ^= in[l];
+ l++; n++;
+ } while (l < length);
+ }
+ } else {
+ if (n) {
+ while (length) {
+ unsigned char c;
+ *(out++) = ivec[n] ^ (c = *(in++)); ivec[n] = c;
+ length--;
+ if(!(n = (n + 1) % AES_BLOCK_SIZE))
+ break;
+ }
+ }
+#if defined(STRICT_ALIGNMENT)
+ if (((size_t)in|(size_t)out)%sizeof(size_t) != 0)
+ goto dec_unaligned;
+#endif
+ while (l + AES_BLOCK_SIZE <= length) {
+ unsigned int i;
+ AES_encrypt(ivec, ivec, key);
+ for (i=0;i<AES_BLOCK_SIZE;i+=sizeof(size_t)) {
+ size_t t = *(size_t*)(in+l+i);
+ *(size_t*)(out+l+i) = *(size_t*)(ivec+i) ^ t;
+ *(size_t*)(ivec+i) = t;
+ }
+ l += AES_BLOCK_SIZE;
+ }
- n = *num;
+ if (l < length) {
+ AES_encrypt(ivec, ivec, key);
+ do { unsigned char c;
+ out[l] = ivec[n] ^ (c = in[l]); ivec[n] = c;
+ l++; n++;
+ } while (l < length);
+ }
+ }
+ *num = n;
+ return;
+ }
+#endif
+ /* this code would be commonly eliminated by x86* compiler */
if (enc) {
- while (l--) {
+#if defined(STRICT_ALIGNMENT) && !defined(OPENSSL_SMALL_FOOTPRINT)
+ enc_unaligned:
+#endif
+ while (l<length) {
if (n == 0) {
AES_encrypt(ivec, ivec, key);
}
- ivec[n] = *(out++) = *(in++) ^ ivec[n];
+ out[l] = ivec[n] ^= in[l];
+ l++;
n = (n+1) % AES_BLOCK_SIZE;
}
} else {
- while (l--) {
+#if defined(STRICT_ALIGNMENT) && !defined(OPENSSL_SMALL_FOOTPRINT)
+ dec_unaligned:
+#endif
+ while (l<length) {
+ unsigned char c;
if (n == 0) {
AES_encrypt(ivec, ivec, key);
}
- c = *(in);
- *(out++) = *(in++) ^ ivec[n];
- ivec[n] = c;
+ out[l] = ivec[n] ^ (c = in[l]); ivec[n] = c;
+ l++;
n = (n+1) % AES_BLOCK_SIZE;
}
}