pqc/crypto_sign/sphincs-haraka-256f-robust/aesni/haraka.c

802 lines
27 KiB
C

/*
Plain C implementation of the Haraka256 and Haraka512 permutations.
*/
#include <immintrin.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "haraka.h"
#define HARAKAS_RATE 32
#define u64 uint64_t
#define u128 __m128i
#define LOAD(src) _mm_loadu_si128((u128 *)(src))
#define STORE(dest,src) _mm_storeu_si128((u128 *)(dest),src)
#define XOR128(a, b) _mm_xor_si128(a, b)
#define AES2(s0, s1, rci) \
(s0) = _mm_aesenc_si128(s0, *(rci)); \
(s1) = _mm_aesenc_si128(s1, *((rci) + 1)); \
(s0) = _mm_aesenc_si128(s0, *((rci) + 2)); \
(s1) = _mm_aesenc_si128(s1, *((rci) + 3));
#define AES2_4x(s0, s1, s2, s3, rci) \
AES2((s0)[0], (s0)[1], rci); \
AES2((s1)[0], (s1)[1], rci); \
AES2((s2)[0], (s2)[1], rci); \
AES2((s3)[0], (s3)[1], rci);
#define AES4(s0, s1, s2, s3, rci) \
(s0) = _mm_aesenc_si128(s0, *(rci)); \
(s1) = _mm_aesenc_si128(s1, *((rci) + 1)); \
(s2) = _mm_aesenc_si128(s2, *((rci) + 2)); \
(s3) = _mm_aesenc_si128(s3, *((rci) + 3)); \
(s0) = _mm_aesenc_si128(s0, *((rci) + 4)); \
(s1) = _mm_aesenc_si128(s1, *((rci) + 5)); \
(s2) = _mm_aesenc_si128(s2, *((rci) + 6)); \
(s3) = _mm_aesenc_si128(s3, *((rci) + 7));
#define AES4_4x(s0, s1, s2, s3, rci) \
AES4((s0)[0], (s0)[1], (s0)[2], (s0)[3], rci); \
AES4((s1)[0], (s1)[1], (s1)[2], (s1)[3], rci); \
AES4((s2)[0], (s2)[1], (s2)[2], (s2)[3], rci); \
AES4((s3)[0], (s3)[1], (s3)[2], (s3)[3], rci);
#define MIX2(s0, s1) \
tmp = _mm_unpacklo_epi32(s0, s1); \
(s1) = _mm_unpackhi_epi32(s0, s1); \
(s0) = tmp;
#define MIX4(s0, s1, s2, s3) \
tmp = _mm_unpacklo_epi32(s0, s1); \
(s0) = _mm_unpackhi_epi32(s0, s1); \
(s1) = _mm_unpacklo_epi32(s2, s3); \
(s2) = _mm_unpackhi_epi32(s2, s3); \
(s3) = _mm_unpacklo_epi32(s0, s2); \
(s0) = _mm_unpackhi_epi32(s0, s2); \
(s2) = _mm_unpackhi_epi32(s1, tmp); \
(s1) = _mm_unpacklo_epi32(s1, tmp);
#define TRUNCSTORE(out, s0, s1, s2, s3) \
_mm_storeu_si128((u128 *)(out), \
_mm_castpd_si128(_mm_shuffle_pd(_mm_castsi128_pd(s0), _mm_castsi128_pd(s1), 3))); \
_mm_storeu_si128((u128 *)((out) + 16), \
_mm_castpd_si128(_mm_shuffle_pd(_mm_castsi128_pd(s2), _mm_castsi128_pd(s3), 0)));
static void load_haraka_constants(u128 rc[40]) {
rc[ 0] = _mm_set_epi32((int)0x0684704c, (int)0xe620c00a, (int)0xb2c5fef0, (int)0x75817b9d);
rc[ 1] = _mm_set_epi32((int)0x8b66b4e1, (int)0x88f3a06b, (int)0x640f6ba4, (int)0x2f08f717);
rc[ 2] = _mm_set_epi32((int)0x3402de2d, (int)0x53f28498, (int)0xcf029d60, (int)0x9f029114);
rc[ 3] = _mm_set_epi32((int)0x0ed6eae6, (int)0x2e7b4f08, (int)0xbbf3bcaf, (int)0xfd5b4f79);
rc[ 4] = _mm_set_epi32((int)0xcbcfb0cb, (int)0x4872448b, (int)0x79eecd1c, (int)0xbe397044);
rc[ 5] = _mm_set_epi32((int)0x7eeacdee, (int)0x6e9032b7, (int)0x8d5335ed, (int)0x2b8a057b);
rc[ 6] = _mm_set_epi32((int)0x67c28f43, (int)0x5e2e7cd0, (int)0xe2412761, (int)0xda4fef1b);
rc[ 7] = _mm_set_epi32((int)0x2924d9b0, (int)0xafcacc07, (int)0x675ffde2, (int)0x1fc70b3b);
rc[ 8] = _mm_set_epi32((int)0xab4d63f1, (int)0xe6867fe9, (int)0xecdb8fca, (int)0xb9d465ee);
rc[ 9] = _mm_set_epi32((int)0x1c30bf84, (int)0xd4b7cd64, (int)0x5b2a404f, (int)0xad037e33);
rc[10] = _mm_set_epi32((int)0xb2cc0bb9, (int)0x941723bf, (int)0x69028b2e, (int)0x8df69800);
rc[11] = _mm_set_epi32((int)0xfa0478a6, (int)0xde6f5572, (int)0x4aaa9ec8, (int)0x5c9d2d8a);
rc[12] = _mm_set_epi32((int)0xdfb49f2b, (int)0x6b772a12, (int)0x0efa4f2e, (int)0x29129fd4);
rc[13] = _mm_set_epi32((int)0x1ea10344, (int)0xf449a236, (int)0x32d611ae, (int)0xbb6a12ee);
rc[14] = _mm_set_epi32((int)0xaf044988, (int)0x4b050084, (int)0x5f9600c9, (int)0x9ca8eca6);
rc[15] = _mm_set_epi32((int)0x21025ed8, (int)0x9d199c4f, (int)0x78a2c7e3, (int)0x27e593ec);
rc[16] = _mm_set_epi32((int)0xbf3aaaf8, (int)0xa759c9b7, (int)0xb9282ecd, (int)0x82d40173);
rc[17] = _mm_set_epi32((int)0x6260700d, (int)0x6186b017, (int)0x37f2efd9, (int)0x10307d6b);
rc[18] = _mm_set_epi32((int)0x5aca45c2, (int)0x21300443, (int)0x81c29153, (int)0xf6fc9ac6);
rc[19] = _mm_set_epi32((int)0x9223973c, (int)0x226b68bb, (int)0x2caf92e8, (int)0x36d1943a);
rc[20] = _mm_set_epi32((int)0xd3bf9238, (int)0x225886eb, (int)0x6cbab958, (int)0xe51071b4);
rc[21] = _mm_set_epi32((int)0xdb863ce5, (int)0xaef0c677, (int)0x933dfddd, (int)0x24e1128d);
rc[22] = _mm_set_epi32((int)0xbb606268, (int)0xffeba09c, (int)0x83e48de3, (int)0xcb2212b1);
rc[23] = _mm_set_epi32((int)0x734bd3dc, (int)0xe2e4d19c, (int)0x2db91a4e, (int)0xc72bf77d);
rc[24] = _mm_set_epi32((int)0x43bb47c3, (int)0x61301b43, (int)0x4b1415c4, (int)0x2cb3924e);
rc[25] = _mm_set_epi32((int)0xdba775a8, (int)0xe707eff6, (int)0x03b231dd, (int)0x16eb6899);
rc[26] = _mm_set_epi32((int)0x6df3614b, (int)0x3c755977, (int)0x8e5e2302, (int)0x7eca472c);
rc[27] = _mm_set_epi32((int)0xcda75a17, (int)0xd6de7d77, (int)0x6d1be5b9, (int)0xb88617f9);
rc[28] = _mm_set_epi32((int)0xec6b43f0, (int)0x6ba8e9aa, (int)0x9d6c069d, (int)0xa946ee5d);
rc[29] = _mm_set_epi32((int)0xcb1e6950, (int)0xf957332b, (int)0xa2531159, (int)0x3bf327c1);
rc[30] = _mm_set_epi32((int)0x2cee0c75, (int)0x00da619c, (int)0xe4ed0353, (int)0x600ed0d9);
rc[31] = _mm_set_epi32((int)0xf0b1a5a1, (int)0x96e90cab, (int)0x80bbbabc, (int)0x63a4a350);
rc[32] = _mm_set_epi32((int)0xae3db102, (int)0x5e962988, (int)0xab0dde30, (int)0x938dca39);
rc[33] = _mm_set_epi32((int)0x17bb8f38, (int)0xd554a40b, (int)0x8814f3a8, (int)0x2e75b442);
rc[34] = _mm_set_epi32((int)0x34bb8a5b, (int)0x5f427fd7, (int)0xaeb6b779, (int)0x360a16f6);
rc[35] = _mm_set_epi32((int)0x26f65241, (int)0xcbe55438, (int)0x43ce5918, (int)0xffbaafde);
rc[36] = _mm_set_epi32((int)0x4ce99a54, (int)0xb9f3026a, (int)0xa2ca9cf7, (int)0x839ec978);
rc[37] = _mm_set_epi32((int)0xae51a51a, (int)0x1bdff7be, (int)0x40c06e28, (int)0x22901235);
rc[38] = _mm_set_epi32((int)0xa0c1613c, (int)0xba7ed22b, (int)0xc173bc0f, (int)0x48a659cf);
rc[39] = _mm_set_epi32((int)0x756acc03, (int)0x02288288, (int)0x4ad6bdfd, (int)0xe9c59da1);
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_tweak_constants(
harakactx *state,
const unsigned char *pk_seed, const unsigned char *sk_seed,
unsigned long long seed_length) {
int i;
unsigned char buf[40 * 16];
/* Use the standard constants to generate tweaked ones. */
load_haraka_constants(state->rc);
/* Constants for sk.seed */
if (sk_seed != NULL) {
PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka_S(buf, 40 * 16, sk_seed, seed_length, state);
/* Tweak constants with the pub_seed */
for (i = 0; i < 40; i++) {
state->rc_sseed[i] = LOAD(buf + i * 16);
}
}
/* Constants for pk.seed */
PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka_S(buf, 40 * 16, pk_seed, seed_length, state);
/* Tweak constants with the pub_seed */
for (i = 0; i < 40; i++) {
state->rc[i] = LOAD(buf + i * 16);
}
}
static void haraka_S_absorb(unsigned char *s,
const unsigned char *m, unsigned long long mlen,
unsigned char p,
const harakactx *state) {
unsigned long long i;
unsigned char t[HARAKAS_RATE];
while (mlen >= HARAKAS_RATE) {
// XOR block to state
STORE(s, XOR128(LOAD(s), LOAD(m)));
STORE(s + 16, XOR128(LOAD(s + 16), LOAD(m + 16)));
PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512_perm(s, s, state);
mlen -= HARAKAS_RATE;
m += HARAKAS_RATE;
}
for (i = 0; i < HARAKAS_RATE; ++i) {
t[i] = 0;
}
for (i = 0; i < mlen; ++i) {
t[i] = m[i];
}
t[i] = p;
t[HARAKAS_RATE - 1] |= 128;
STORE(s, XOR128(LOAD(s), LOAD(t)));
STORE(s + 16, XOR128(LOAD(s + 16), LOAD(t + 16)));
}
static void haraka_S_absorb4x(unsigned char *s,
const unsigned char *m0,
const unsigned char *m1,
const unsigned char *m2,
const unsigned char *m3,
unsigned long long int mlen,
unsigned char p,
const harakactx *state) {
unsigned long long i;
unsigned char t0[HARAKAS_RATE];
unsigned char t1[HARAKAS_RATE];
unsigned char t2[HARAKAS_RATE];
unsigned char t3[HARAKAS_RATE];
while (mlen >= HARAKAS_RATE) {
// XOR block to state
STORE(s, XOR128(LOAD(s), LOAD(m0)));
STORE(s + 16, XOR128(LOAD(s + 16), LOAD(m0 + 16)));
STORE(s + 64, XOR128(LOAD(s + 64), LOAD(m1)));
STORE(s + 80, XOR128(LOAD(s + 80), LOAD(m1 + 16)));
STORE(s + 128, XOR128(LOAD(s + 128), LOAD(m2)));
STORE(s + 144, XOR128(LOAD(s + 144), LOAD(m2 + 16)));
STORE(s + 192, XOR128(LOAD(s + 192), LOAD(m3)));
STORE(s + 208, XOR128(LOAD(s + 208), LOAD(m3 + 16)));
PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512_perm_x4(s, s, state);
mlen -= HARAKAS_RATE;
m0 += HARAKAS_RATE;
m1 += HARAKAS_RATE;
m2 += HARAKAS_RATE;
m3 += HARAKAS_RATE;
}
for (i = 0; i < HARAKAS_RATE; ++i) {
t0[i] = 0;
t1[i] = 0;
t2[i] = 0;
t3[i] = 0;
}
for (i = 0; i < mlen; ++i) {
t0[i] = m0[i];
t1[i] = m1[i];
t2[i] = m2[i];
t3[i] = m3[i];
}
t0[i] = p;
t1[i] = p;
t2[i] = p;
t3[i] = p;
t0[HARAKAS_RATE - 1] |= 128;
t1[HARAKAS_RATE - 1] |= 128;
t2[HARAKAS_RATE - 1] |= 128;
t3[HARAKAS_RATE - 1] |= 128;
STORE(s, XOR128(LOAD(s), LOAD(t0)));
STORE(s + 16, XOR128(LOAD(s + 16), LOAD(t0 + 16)));
STORE(s + 64, XOR128(LOAD(s + 64), LOAD(t1)));
STORE(s + 80, XOR128(LOAD(s + 80), LOAD(t1 + 16)));
STORE(s + 128, XOR128(LOAD(s + 128), LOAD(t2)));
STORE(s + 144, XOR128(LOAD(s + 144), LOAD(t2 + 16)));
STORE(s + 192, XOR128(LOAD(s + 192), LOAD(t3)));
STORE(s + 208, XOR128(LOAD(s + 208), LOAD(t3 + 16)));
}
static void haraka_S_squeezeblocks(unsigned char *h, unsigned long long nblocks,
unsigned char *s, unsigned int r, const harakactx *state) {
while (nblocks > 0) {
PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512_perm(s, s, state);
STORE(h, LOAD(s));
STORE(h + 16, LOAD(s + 16));
h += r;
nblocks--;
}
}
static void haraka_S_squeezeblocks4x(unsigned char *h0,
unsigned char *h1,
unsigned char *h2,
unsigned char *h3,
unsigned long long nblocks,
unsigned char *s,
unsigned int r,
const harakactx *state) {
while (nblocks > 0) {
PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512_perm_x4(s, s, state);
STORE(h0, LOAD(s));
STORE(h0 + 16, LOAD(s + 16));
STORE(h1, LOAD(s + 64));
STORE(h1 + 16, LOAD(s + 80));
STORE(h2, LOAD(s + 128));
STORE(h2 + 16, LOAD(s + 144));
STORE(h3, LOAD(s + 192));
STORE(h3 + 16, LOAD(s + 208));
h0 += r;
h1 += r;
h2 += r;
h3 += r;
nblocks--;
}
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka_S_inc_init(uint8_t *s_inc) {
size_t i;
for (i = 0; i < 64; i++) {
s_inc[i] = 0;
}
s_inc[64] = 0;
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka_S_inc_absorb(uint8_t *s_inc, const uint8_t *m, size_t mlen, const harakactx *state) {
size_t i;
/* Recall that s_inc[64] is the non-absorbed bytes xored into the state */
while (mlen + s_inc[64] >= HARAKAS_RATE) {
for (i = 0; i < (size_t)(HARAKAS_RATE - s_inc[64]); i++) {
/* Take the i'th byte from message
xor with the s_inc[64] + i'th byte of the state */
s_inc[s_inc[64] + i] ^= m[i];
}
mlen -= (size_t)(HARAKAS_RATE - s_inc[64]);
m += HARAKAS_RATE - s_inc[64];
s_inc[64] = 0;
PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512_perm(s_inc, s_inc, state);
}
for (i = 0; i < mlen; i++) {
s_inc[s_inc[64] + i] ^= m[i];
}
s_inc[64] = (uint8_t)(s_inc[64] + mlen);
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka_S_inc_finalize(uint8_t *s_inc) {
/* After haraka_S_inc_absorb, we are guaranteed that s_inc[64] < HARAKAS_RATE,
so we can always use one more byte for p in the current state. */
s_inc[s_inc[64]] ^= 0x1F;
s_inc[HARAKAS_RATE - 1] ^= 128;
s_inc[64] = 0;
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka_S_inc_squeeze(uint8_t *out, size_t outlen, uint8_t *s_inc, const harakactx *state) {
size_t i;
/* First consume any bytes we still have sitting around */
for (i = 0; i < outlen && i < s_inc[64]; i++) {
/* There are s_inc[64] bytes left, so r - s_inc[64] is the first
available byte. We consume from there, i.e., up to r. */
out[i] = (uint8_t)s_inc[(HARAKAS_RATE - s_inc[64] + (uint8_t)i)];
}
out += i;
outlen -= i;
s_inc[64] = (uint8_t)(s_inc[64] - i);
/* Then squeeze the remaining necessary blocks */
while (outlen > 0) {
PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512_perm(s_inc, s_inc, state);
for (i = 0; i < outlen && i < HARAKAS_RATE; i++) {
out[i] = s_inc[i];
}
out += i;
outlen -= i;
s_inc[64] = (uint8_t)(HARAKAS_RATE - i);
}
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka_S(unsigned char *out, unsigned long long outlen,
const unsigned char *in, unsigned long long inlen, const harakactx *state) {
unsigned long long i;
unsigned char s[64];
unsigned char d[32];
for (i = 0; i < 64; i++) {
s[i] = 0;
}
haraka_S_absorb(s, in, inlen, 0x1F, state);
haraka_S_squeezeblocks(out, outlen / HARAKAS_RATE, s, HARAKAS_RATE, state);
out += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
if (outlen % HARAKAS_RATE) {
haraka_S_squeezeblocks(d, 1, s, HARAKAS_RATE, state);
for (i = 0; i < outlen % HARAKAS_RATE; i++) {
out[i] = d[i];
}
}
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka_Sx4(unsigned char *out0,
unsigned char *out1,
unsigned char *out2,
unsigned char *out3,
unsigned long long outlen,
const unsigned char *in0,
const unsigned char *in1,
const unsigned char *in2,
const unsigned char *in3,
unsigned long long inlen,
const harakactx *state) {
unsigned long long i;
unsigned char s[64 * 4];
unsigned char d0[32];
unsigned char d1[32];
unsigned char d2[32];
unsigned char d3[32];
for (i = 0; i < 64 * 4; i++) {
s[i] = 0;
}
haraka_S_absorb4x(s, in0, in1, in2, in3, inlen, 0x1F, state);
haraka_S_squeezeblocks4x(out0, out1, out2, out3, outlen / HARAKAS_RATE, s, HARAKAS_RATE, state);
out0 += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
out1 += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
out2 += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
out3 += (outlen / HARAKAS_RATE) * HARAKAS_RATE;
if (outlen % HARAKAS_RATE) {
haraka_S_squeezeblocks4x(d0, d1, d2, d3, 1, s, HARAKAS_RATE, state);
for (i = 0; i < outlen % HARAKAS_RATE; i++) {
out0[i] = d0[i];
out1[i] = d1[i];
out2[i] = d2[i];
out3[i] = d3[i];
}
}
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512_perm(unsigned char *out, const unsigned char *in, const harakactx *state) {
u128 s[4], tmp;
s[0] = LOAD(in);
s[1] = LOAD(in + 16);
s[2] = LOAD(in + 32);
s[3] = LOAD(in + 48);
AES4(s[0], s[1], s[2], s[3], state->rc);
MIX4(s[0], s[1], s[2], s[3]);
AES4(s[0], s[1], s[2], s[3], state->rc + 8);
MIX4(s[0], s[1], s[2], s[3]);
AES4(s[0], s[1], s[2], s[3], state->rc + 16);
MIX4(s[0], s[1], s[2], s[3]);
AES4(s[0], s[1], s[2], s[3], state->rc + 24);
MIX4(s[0], s[1], s[2], s[3]);
AES4(s[0], s[1], s[2], s[3], state->rc + 32);
MIX4(s[0], s[1], s[2], s[3]);
STORE(out, s[0]);
STORE(out + 16, s[1]);
STORE(out + 32, s[2]);
STORE(out + 48, s[3]);
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512_perm_x4(unsigned char *out, const unsigned char *in, const harakactx *state) {
u128 s[4][4], tmp;
s[0][0] = LOAD(in);
s[0][1] = LOAD(in + 16);
s[0][2] = LOAD(in + 32);
s[0][3] = LOAD(in + 48);
s[1][0] = LOAD(in + 64);
s[1][1] = LOAD(in + 80);
s[1][2] = LOAD(in + 96);
s[1][3] = LOAD(in + 112);
s[2][0] = LOAD(in + 128);
s[2][1] = LOAD(in + 144);
s[2][2] = LOAD(in + 160);
s[2][3] = LOAD(in + 176);
s[3][0] = LOAD(in + 192);
s[3][1] = LOAD(in + 208);
s[3][2] = LOAD(in + 224);
s[3][3] = LOAD(in + 240);
AES4_4x(s[0], s[1], s[2], s[3], state->rc);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 8);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 16);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 24);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 32);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
STORE(out, s[0][0]);
STORE(out + 16, s[0][1]);
STORE(out + 32, s[0][2]);
STORE(out + 48, s[0][3]);
STORE(out + 64, s[1][0]);
STORE(out + 80, s[1][1]);
STORE(out + 96, s[1][2]);
STORE(out + 112, s[1][3]);
STORE(out + 128, s[2][0]);
STORE(out + 144, s[2][1]);
STORE(out + 160, s[2][2]);
STORE(out + 176, s[2][3]);
STORE(out + 192, s[3][0]);
STORE(out + 208, s[3][1]);
STORE(out + 224, s[3][2]);
STORE(out + 240, s[3][3]);
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512(unsigned char *out, const unsigned char *in, const harakactx *state) {
u128 s[4], tmp;
s[0] = LOAD(in);
s[1] = LOAD(in + 16);
s[2] = LOAD(in + 32);
s[3] = LOAD(in + 48);
AES4(s[0], s[1], s[2], s[3], state->rc);
MIX4(s[0], s[1], s[2], s[3]);
AES4(s[0], s[1], s[2], s[3], state->rc + 8);
MIX4(s[0], s[1], s[2], s[3]);
AES4(s[0], s[1], s[2], s[3], state->rc + 16);
MIX4(s[0], s[1], s[2], s[3]);
AES4(s[0], s[1], s[2], s[3], state->rc + 24);
MIX4(s[0], s[1], s[2], s[3]);
AES4(s[0], s[1], s[2], s[3], state->rc + 32);
MIX4(s[0], s[1], s[2], s[3]);
s[0] = XOR128(s[0], LOAD(in));
s[1] = XOR128(s[1], LOAD(in + 16));
s[2] = XOR128(s[2], LOAD(in + 32));
s[3] = XOR128(s[3], LOAD(in + 48));
// truncate and store result
TRUNCSTORE(out, s[0], s[1], s[2], s[3]);
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka512x4(unsigned char *out, const unsigned char *in, const harakactx *state) {
u128 s[4][4], tmp;
s[0][0] = LOAD(in);
s[0][1] = LOAD(in + 16);
s[0][2] = LOAD(in + 32);
s[0][3] = LOAD(in + 48);
s[1][0] = LOAD(in + 64);
s[1][1] = LOAD(in + 80);
s[1][2] = LOAD(in + 96);
s[1][3] = LOAD(in + 112);
s[2][0] = LOAD(in + 128);
s[2][1] = LOAD(in + 144);
s[2][2] = LOAD(in + 160);
s[2][3] = LOAD(in + 176);
s[3][0] = LOAD(in + 192);
s[3][1] = LOAD(in + 208);
s[3][2] = LOAD(in + 224);
s[3][3] = LOAD(in + 240);
AES4_4x(s[0], s[1], s[2], s[3], state->rc);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 8);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 16);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 24);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
AES4_4x(s[0], s[1], s[2], s[3], state->rc + 32);
MIX4(s[0][0], s[0][1], s[0][2], s[0][3]);
MIX4(s[1][0], s[1][1], s[1][2], s[1][3]);
MIX4(s[2][0], s[2][1], s[2][2], s[2][3]);
MIX4(s[3][0], s[3][1], s[3][2], s[3][3]);
s[0][0] = XOR128(s[0][0], LOAD(in));
s[0][1] = XOR128(s[0][1], LOAD(in + 16));
s[0][2] = XOR128(s[0][2], LOAD(in + 32));
s[0][3] = XOR128(s[0][3], LOAD(in + 48));
s[1][0] = XOR128(s[1][0], LOAD(in + 64));
s[1][1] = XOR128(s[1][1], LOAD(in + 80));
s[1][2] = XOR128(s[1][2], LOAD(in + 96));
s[1][3] = XOR128(s[1][3], LOAD(in + 112));
s[2][0] = XOR128(s[2][0], LOAD(in + 128));
s[2][1] = XOR128(s[2][1], LOAD(in + 144));
s[2][2] = XOR128(s[2][2], LOAD(in + 160));
s[2][3] = XOR128(s[2][3], LOAD(in + 176));
s[3][0] = XOR128(s[3][0], LOAD(in + 192));
s[3][1] = XOR128(s[3][1], LOAD(in + 208));
s[3][2] = XOR128(s[3][2], LOAD(in + 224));
s[3][3] = XOR128(s[3][3], LOAD(in + 240));
TRUNCSTORE(out, s[0][0], s[0][1], s[0][2], s[0][3]);
TRUNCSTORE((out + 32), s[1][0], s[1][1], s[1][2], s[1][3]);
TRUNCSTORE((out + 64), s[2][0], s[2][1], s[2][2], s[2][3]);
TRUNCSTORE((out + 96), s[3][0], s[3][1], s[3][2], s[3][3]);
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka256(unsigned char *out, const unsigned char *in, const harakactx *state) {
u128 s[2], tmp;
s[0] = LOAD(in);
s[1] = LOAD(in + 16);
AES2(s[0], s[1], state->rc);
MIX2(s[0], s[1]);
AES2(s[0], s[1], state->rc + 4);
MIX2(s[0], s[1]);
AES2(s[0], s[1], state->rc + 8);
MIX2(s[0], s[1]);
AES2(s[0], s[1], state->rc + 12);
MIX2(s[0], s[1]);
AES2(s[0], s[1], state->rc + 16);
MIX2(s[0], s[1]);
s[0] = XOR128(s[0], LOAD(in));
s[1] = XOR128(s[1], LOAD(in + 16));
STORE(out, s[0]);
STORE(out + 16, s[1]);
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka256x4(unsigned char *out, const unsigned char *in, const harakactx *state) {
u128 s[4][2], tmp;
s[0][0] = LOAD(in);
s[0][1] = LOAD(in + 16);
s[1][0] = LOAD(in + 32);
s[1][1] = LOAD(in + 48);
s[2][0] = LOAD(in + 64);
s[2][1] = LOAD(in + 80);
s[3][0] = LOAD(in + 96);
s[3][1] = LOAD(in + 112);
// Round 1
AES2_4x(s[0], s[1], s[2], s[3], state->rc);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Round 2
AES2_4x(s[0], s[1], s[2], s[3], state->rc + 4);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Round 3
AES2_4x(s[0], s[1], s[2], s[3], state->rc + 8);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Round 4
AES2_4x(s[0], s[1], s[2], s[3], state->rc + 12);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Round 5
AES2_4x(s[0], s[1], s[2], s[3], state->rc + 16);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Feed Forward
s[0][0] = _mm_xor_si128(s[0][0], LOAD(in));
s[0][1] = _mm_xor_si128(s[0][1], LOAD(in + 16));
s[1][0] = _mm_xor_si128(s[1][0], LOAD(in + 32));
s[1][1] = _mm_xor_si128(s[1][1], LOAD(in + 48));
s[2][0] = _mm_xor_si128(s[2][0], LOAD(in + 64));
s[2][1] = _mm_xor_si128(s[2][1], LOAD(in + 80));
s[3][0] = _mm_xor_si128(s[3][0], LOAD(in + 96));
s[3][1] = _mm_xor_si128(s[3][1], LOAD(in + 112));
STORE(out, s[0][0]);
STORE(out + 16, s[0][1]);
STORE(out + 32, s[1][0]);
STORE(out + 48, s[1][1]);
STORE(out + 64, s[2][0]);
STORE(out + 80, s[2][1]);
STORE(out + 96, s[3][0]);
STORE(out + 112, s[3][1]);
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka256_sk(unsigned char *out, const unsigned char *in, const harakactx *state) {
u128 s[2], tmp;
s[0] = LOAD(in);
s[1] = LOAD(in + 16);
AES2(s[0], s[1], state->rc_sseed);
MIX2(s[0], s[1]);
AES2(s[0], s[1], state->rc_sseed + 4);
MIX2(s[0], s[1]);
AES2(s[0], s[1], state->rc_sseed + 8);
MIX2(s[0], s[1]);
AES2(s[0], s[1], state->rc_sseed + 12);
MIX2(s[0], s[1]);
AES2(s[0], s[1], state->rc_sseed + 16);
MIX2(s[0], s[1]);
s[0] = XOR128(s[0], LOAD(in));
s[1] = XOR128(s[1], LOAD(in + 16));
STORE(out, s[0]);
STORE(out + 16, s[1]);
}
void PQCLEAN_SPHINCSHARAKA256FROBUST_AESNI_haraka256_skx4(unsigned char *out, const unsigned char *in, const harakactx *state) {
u128 s[4][2], tmp;
s[0][0] = LOAD(in);
s[0][1] = LOAD(in + 16);
s[1][0] = LOAD(in + 32);
s[1][1] = LOAD(in + 48);
s[2][0] = LOAD(in + 64);
s[2][1] = LOAD(in + 80);
s[3][0] = LOAD(in + 96);
s[3][1] = LOAD(in + 112);
// Round 1
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Round 2
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed + 4);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Round 3
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed + 8);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Round 4
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed + 12);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Round 5
AES2_4x(s[0], s[1], s[2], s[3], state->rc_sseed + 16);
MIX2(s[0][0], s[0][1]);
MIX2(s[1][0], s[1][1]);
MIX2(s[2][0], s[2][1]);
MIX2(s[3][0], s[3][1]);
// Feed Forward
s[0][0] = XOR128(s[0][0], LOAD(in));
s[0][1] = XOR128(s[0][1], LOAD(in + 16));
s[1][0] = XOR128(s[1][0], LOAD(in + 32));
s[1][1] = XOR128(s[1][1], LOAD(in + 48));
s[2][0] = XOR128(s[2][0], LOAD(in + 64));
s[2][1] = XOR128(s[2][1], LOAD(in + 80));
s[3][0] = XOR128(s[3][0], LOAD(in + 96));
s[3][1] = XOR128(s[3][1], LOAD(in + 112));
STORE(out, s[0][0]);
STORE(out + 16, s[0][1]);
STORE(out + 32, s[1][0]);
STORE(out + 48, s[1][1]);
STORE(out + 64, s[2][0]);
STORE(out + 80, s[2][1]);
STORE(out + 96, s[3][0]);
STORE(out + 112, s[3][1]);
}