d040920727
Prevents the functions from potentially clashing with other stuff in Common in the future
76 lines
2.5 KiB
C++
76 lines
2.5 KiB
C++
/* This file is part of the dynarmic project.
|
|
* Copyright (c) 2018 MerryMage
|
|
* This software may be used and distributed according to the terms of the GNU
|
|
* General Public License version 2 or any later version.
|
|
*/
|
|
|
|
#include "backend_x64/abi.h"
|
|
#include "backend_x64/block_of_code.h"
|
|
#include "backend_x64/emit_x64.h"
|
|
#include "common/aes.h"
|
|
#include "common/common_types.h"
|
|
#include "frontend/ir/microinstruction.h"
|
|
#include "frontend/ir/opcodes.h"
|
|
|
|
namespace Dynarmic::BackendX64 {
|
|
|
|
using namespace Xbyak::util;
|
|
|
|
using AESFn = void(Common::AES::State&, const Common::AES::State&);
|
|
|
|
static void EmitAESFunction(std::array<Argument, 3> args, EmitContext& ctx, BlockOfCode& code,
|
|
IR::Inst* inst, AESFn fn) {
|
|
constexpr u32 stack_space = static_cast<u32>(sizeof(Common::AES::State)) * 2;
|
|
const Xbyak::Xmm input = ctx.reg_alloc.UseXmm(args[0]);
|
|
ctx.reg_alloc.EndOfAllocScope();
|
|
|
|
ctx.reg_alloc.HostCall(nullptr);
|
|
code.sub(rsp, stack_space + ABI_SHADOW_SPACE);
|
|
code.lea(code.ABI_PARAM1, ptr[rsp + ABI_SHADOW_SPACE]);
|
|
code.lea(code.ABI_PARAM2, ptr[rsp + ABI_SHADOW_SPACE + sizeof(Common::AES::State)]);
|
|
|
|
code.movaps(xword[code.ABI_PARAM2], input);
|
|
|
|
code.CallFunction(fn);
|
|
|
|
code.movaps(xmm0, xword[rsp + ABI_SHADOW_SPACE]);
|
|
|
|
// Free memory
|
|
code.add(rsp, stack_space + ABI_SHADOW_SPACE);
|
|
|
|
ctx.reg_alloc.DefineValue(inst, xmm0);
|
|
}
|
|
|
|
void EmitX64::EmitAESDecryptSingleRound(EmitContext& ctx, IR::Inst* inst) {
|
|
auto args = ctx.reg_alloc.GetArgumentInfo(inst);
|
|
|
|
EmitAESFunction(args, ctx, code, inst, Common::AES::DecryptSingleRound);
|
|
}
|
|
|
|
void EmitX64::EmitAESEncryptSingleRound(EmitContext& ctx, IR::Inst* inst) {
|
|
auto args = ctx.reg_alloc.GetArgumentInfo(inst);
|
|
|
|
EmitAESFunction(args, ctx, code, inst, Common::AES::EncryptSingleRound);
|
|
}
|
|
|
|
void EmitX64::EmitAESInverseMixColumns(EmitContext& ctx, IR::Inst* inst) {
|
|
auto args = ctx.reg_alloc.GetArgumentInfo(inst);
|
|
|
|
if (code.DoesCpuSupport(Xbyak::util::Cpu::tAESNI)) {
|
|
const Xbyak::Xmm operand = ctx.reg_alloc.UseXmm(args[0]);
|
|
const Xbyak::Xmm result = ctx.reg_alloc.ScratchXmm();
|
|
|
|
code.aesimc(result, operand);
|
|
|
|
ctx.reg_alloc.DefineValue(inst, result);
|
|
} else {
|
|
EmitAESFunction(args, ctx, code, inst, Common::AES::InverseMixColumns);
|
|
}
|
|
}
|
|
|
|
void EmitX64::EmitAESMixColumns(EmitContext& ctx, IR::Inst* inst) {
|
|
auto args = ctx.reg_alloc.GetArgumentInfo(inst);
|
|
EmitAESFunction(args, ctx, code, inst, Common::AES::MixColumns);
|
|
}
|
|
|
|
} // namespace Dynarmic::BackendX64
|