#include #include #include #include #include #define MACOS #ifdef MACOS #include #else #include #endif static char *clErrorString(cl_uint err) { switch (err) { case CL_SUCCESS: return "CL_SUCCESS!"; case CL_DEVICE_NOT_FOUND: return "CL_DEVICE_NOT_FOUND"; case CL_DEVICE_NOT_AVAILABLE: return "CL_DEVICE_NOT_AVAILABLE"; case CL_COMPILER_NOT_AVAILABLE: return "CL_COMPILER_NOT_AVAILABLE"; case CL_MEM_OBJECT_ALLOCATION_FAILURE: return "CL_MEM_OBJECT_ALLOCATION_FAILURE"; case CL_OUT_OF_RESOURCES: return "CL_OUT_OF_RESOURCES"; case CL_OUT_OF_HOST_MEMORY: return "CL_OUT_OF_HOST_MEMORY"; case CL_PROFILING_INFO_NOT_AVAILABLE: return "CL_PROFILING_INFO_NOT_AVAILABLE"; case CL_MEM_COPY_OVERLAP: return "CL_MEM_COPY_OVERLAP"; case CL_IMAGE_FORMAT_MISMATCH: return "CL_IMAGE_FORMAT_MISMATCH"; case CL_IMAGE_FORMAT_NOT_SUPPORTED: return "CL_IMAGE_FORMAT_NOT_SUPPORTED"; case CL_BUILD_PROGRAM_FAILURE: return "CL_BUILD_PROGRAM_FAILURE"; case CL_MAP_FAILURE: return "CL_MAP_FAILURE"; case CL_INVALID_VALUE: return "CL_INVALID_VALUE"; case CL_INVALID_DEVICE_TYPE: return "CL_INVALID_DEVICE_TYPE"; case CL_INVALID_PLATFORM: return "CL_INVALID_PLATFORM"; case CL_INVALID_DEVICE: return "CL_INVALID_DEVICE"; case CL_INVALID_CONTEXT: return "CL_INVALID_CONTEXT"; case CL_INVALID_QUEUE_PROPERTIES: return "CL_INVALID_QUEUE_PROPERTIES"; case CL_INVALID_COMMAND_QUEUE: return "CL_INVALID_COMMAND_QUEUE"; case CL_INVALID_HOST_PTR: return "CL_INVALID_HOST_PTR"; case CL_INVALID_MEM_OBJECT: return "CL_INVALID_MEM_OBJECT"; case CL_INVALID_IMAGE_FORMAT_DESCRIPTOR:return "CL_INVALID_IMAGE_FORMAT_DESCRIPTOR"; case CL_INVALID_IMAGE_SIZE: return "CL_INVALID_IMAGE_SIZE"; case CL_INVALID_SAMPLER: return "CL_INVALID_SAMPLER"; case CL_INVALID_BINARY: return "CL_INVALID_BINARY"; case CL_INVALID_BUILD_OPTIONS: return "CL_INVALID_BUILD_OPTIONS"; case CL_INVALID_PROGRAM: return "CL_INVALID_PROGRAM"; case CL_INVALID_PROGRAM_EXECUTABLE: return "CL_INVALID_PROGRAM_EXECUTABLE"; case CL_INVALID_KERNEL_NAME: return "CL_INVALID_KERNEL_NAME"; case CL_INVALID_KERNEL_DEFINITION: return "CL_INVALID_KERNEL_DEFINITION"; case CL_INVALID_KERNEL: return "CL_INVALID_KERNEL"; case CL_INVALID_ARG_INDEX: return "CL_INVALID_ARG_INDEX"; case CL_INVALID_ARG_VALUE: return "CL_INVALID_ARG_VALUE"; case CL_INVALID_ARG_SIZE: return "CL_INVALID_ARG_SIZE"; case CL_INVALID_KERNEL_ARGS: return "CL_INVALID_KERNEL_ARGS"; case CL_INVALID_WORK_DIMENSION: return "CL_INVALID_WORK_DIMENSION"; case CL_INVALID_WORK_GROUP_SIZE: return "CL_INVALID_WORK_GROUP_SIZE"; case CL_INVALID_WORK_ITEM_SIZE: return "CL_INVALID_WORK_ITEM_SIZE"; case CL_INVALID_GLOBAL_OFFSET: return "CL_INVALID_GLOBAL_OFFSET"; case CL_INVALID_EVENT_WAIT_LIST: return "CL_INVALID_EVENT_WAIT_LIST"; case CL_INVALID_EVENT: return "CL_INVALID_EVENT"; case CL_INVALID_OPERATION: return "CL_INVALID_OPERATION"; case CL_INVALID_GL_OBJECT: return "CL_INVALID_GL_OBJECT"; case CL_INVALID_BUFFER_SIZE: return "CL_INVALID_BUFFER_SIZE"; case CL_INVALID_MIP_LEVEL: return "CL_INVALID_MIP_LEVEL"; } return NULL; } static const char *sm4_cl_src; typedef struct { uint32_t rk[32]; cl_context context; cl_command_queue queue; cl_program program; cl_kernel kernel; cl_mem mem_rk; cl_mem mem_io; size_t workgroup_size; } SM4_CL_CTX; #define cl_error_print(e) \ do { fprintf(stderr, "%s: %d: %s()\n",__FILE__,__LINE__,clErrorString(e)); } while (0) void sm4_cl_cleanup(SM4_CL_CTX *ctx) { clReleaseContext(ctx->context); clReleaseCommandQueue(ctx->queue); clReleaseProgram(ctx->program); clReleaseKernel(ctx->kernel); } static int sm4_cl_set_key(SM4_CL_CTX *ctx, const uint8_t key[16], int enc) { cl_platform_id platform; cl_device_id device; cl_uint device_cnt; cl_int err; char sval[256]; size_t slen; cl_command_queue_properties queue_prop = 0; const char *build_opts = NULL; memset(ctx, 0, sizeof(*ctx)); if ((err = clGetPlatformIDs(1, &platform, NULL)) != CL_SUCCESS) { cl_error_print(err); return -1; } if ((err = clGetDeviceIDs(platform, CL_DEVICE_TYPE_GPU, 1, &device, &device_cnt)) != CL_SUCCESS) { cl_error_print(err); return -1; } if (!(ctx->context = clCreateContext(NULL, 1, &device, NULL, NULL, &err))) { cl_error_print(err); return -1; } if (!(ctx->queue = clCreateCommandQueue(ctx->context, device, queue_prop, &err))) { cl_error_print(err); goto end; } if (!(ctx->program = clCreateProgramWithSource(ctx->context, 1, (const char **)&sm4_cl_src, NULL, &err))) { cl_error_print(err); goto end; } if ((err = clBuildProgram(ctx->program, 1, &device, build_opts, NULL, NULL)) != CL_SUCCESS) { char *log = NULL; size_t loglen; cl_error_print(err); if ((err = clGetProgramBuildInfo(ctx->program, device, CL_PROGRAM_BUILD_LOG, sizeof(log), NULL, &loglen)) != CL_SUCCESS) { cl_error_print(err); goto end; } if (!(log = (char *)malloc(loglen))) { goto end; } if ((err = clGetProgramBuildInfo(ctx->program, device, CL_PROGRAM_BUILD_LOG, sizeof(log), NULL, &loglen)) != CL_SUCCESS) { cl_error_print(err); free(log); goto end; } fprintf(stderr, "%s %d: %s\n", __FILE__, __LINE__, log); free(log); goto end; } if (!(ctx->kernel = clCreateKernel(ctx->program, "sm4_encrypt", &err))) { cl_error_print(err); goto end; } if ((err = clGetKernelWorkGroupInfo(ctx->kernel, device, CL_KERNEL_WORK_GROUP_SIZE, sizeof(ctx->workgroup_size), &ctx->workgroup_size, NULL)) != CL_SUCCESS) { cl_error_print(err); goto end; } if (enc) { sm4_set_encrypt_key((SM4_KEY *)ctx->rk, key); } else { sm4_set_decrypt_key((SM4_KEY *)ctx->rk, key); } if (!(ctx->mem_rk = clCreateBuffer(ctx->context, CL_MEM_READ_WRITE|CL_MEM_USE_HOST_PTR, sizeof(SM4_KEY), ctx->rk, &err))) { cl_error_print(err); goto end; } if ((err = clSetKernelArg(ctx->kernel, 0, sizeof(cl_mem), &ctx->mem_rk)) != CL_SUCCESS) { cl_error_print(err); goto end; } return 1; end: return -1; } int sm4_cl_set_encrypt_key(SM4_CL_CTX *ctx, const uint8_t key[16]) { return sm4_cl_set_key(ctx, key, 1); } int sm4_cl_set_decrypt_key(SM4_CL_CTX *ctx, const uint8_t key[16]) { return sm4_cl_set_key(ctx, key, 0); } int sm4_cl_encrypt(SM4_CL_CTX *ctx, const uint8_t *in, size_t nblocks, uint8_t *out) { int ret = -1; cl_mem mem; cl_int err; size_t len = 16 * nblocks; cl_uint dim = 1; void *p; if (out != in) memcpy(out, in, len); if (!(mem = clCreateBuffer(ctx->context, CL_MEM_READ_WRITE|CL_MEM_USE_HOST_PTR, len, out, &err))) { cl_error_print(err); return -1; } if ((err = clSetKernelArg(ctx->kernel, 1, sizeof(cl_mem), &mem)) != CL_SUCCESS) { cl_error_print(err); goto end; } if ((err = clEnqueueNDRangeKernel(ctx->queue, ctx->kernel, dim, NULL, &nblocks, &ctx->workgroup_size, 0, NULL, NULL)) != CL_SUCCESS) { cl_error_print(err); goto end; } if (!(p = clEnqueueMapBuffer(ctx->queue, mem, CL_TRUE, 0, 0, len, 0, NULL, NULL, &err))) { cl_error_print(err); goto end; } if (p != out) { fprintf(stderr, "%s %d: shit\n", __FILE__, __LINE__); goto end; } ret = 1; end: clReleaseMemObject(mem); return ret; } int test_sm4_cl_encrypt(void) { const uint8_t key[16] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, }; const uint8_t plaintext[16] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10, }; const uint8_t ciphertext[16] = { 0x68, 0x1e, 0xdf, 0x34, 0xd2, 0x06, 0x96, 0x5e, 0x86, 0xb3, 0xe9, 0x4f, 0x53, 0x6e, 0x42, 0x46, }; int ret = -1; SM4_CL_CTX ctx; size_t nblocks = 1024; uint8_t *buf = NULL; size_t i; if (!(buf = (uint8_t *)malloc(16 * nblocks))) { error_print(); return -1; } for (i = 0; i < nblocks; i++) { memcpy(buf + 16 * i, plaintext, 16); } if (sm4_cl_set_encrypt_key(&ctx, key) != 1) { error_print(); goto end; } if (sm4_cl_encrypt(&ctx, buf, nblocks, buf) != 1) { error_print(); goto end; } for (i = 0; i < nblocks; i++) { if (memcmp(buf + 16 * i, ciphertext, 16) != 0) { error_print(); goto end; } } ret = 1; end: if (buf) free(buf); sm4_cl_cleanup(&ctx); return ret; } #define KERNEL(...) #__VA_ARGS__ const char *sm4_cl_src = KERNEL( __constant unsigned char SBOX[256] = { 0xd6, 0x90, 0xe9, 0xfe, 0xcc, 0xe1, 0x3d, 0xb7, 0x16, 0xb6, 0x14, 0xc2, 0x28, 0xfb, 0x2c, 0x05, 0x2b, 0x67, 0x9a, 0x76, 0x2a, 0xbe, 0x04, 0xc3, 0xaa, 0x44, 0x13, 0x26, 0x49, 0x86, 0x06, 0x99, 0x9c, 0x42, 0x50, 0xf4, 0x91, 0xef, 0x98, 0x7a, 0x33, 0x54, 0x0b, 0x43, 0xed, 0xcf, 0xac, 0x62, 0xe4, 0xb3, 0x1c, 0xa9, 0xc9, 0x08, 0xe8, 0x95, 0x80, 0xdf, 0x94, 0xfa, 0x75, 0x8f, 0x3f, 0xa6, 0x47, 0x07, 0xa7, 0xfc, 0xf3, 0x73, 0x17, 0xba, 0x83, 0x59, 0x3c, 0x19, 0xe6, 0x85, 0x4f, 0xa8, 0x68, 0x6b, 0x81, 0xb2, 0x71, 0x64, 0xda, 0x8b, 0xf8, 0xeb, 0x0f, 0x4b, 0x70, 0x56, 0x9d, 0x35, 0x1e, 0x24, 0x0e, 0x5e, 0x63, 0x58, 0xd1, 0xa2, 0x25, 0x22, 0x7c, 0x3b, 0x01, 0x21, 0x78, 0x87, 0xd4, 0x00, 0x46, 0x57, 0x9f, 0xd3, 0x27, 0x52, 0x4c, 0x36, 0x02, 0xe7, 0xa0, 0xc4, 0xc8, 0x9e, 0xea, 0xbf, 0x8a, 0xd2, 0x40, 0xc7, 0x38, 0xb5, 0xa3, 0xf7, 0xf2, 0xce, 0xf9, 0x61, 0x15, 0xa1, 0xe0, 0xae, 0x5d, 0xa4, 0x9b, 0x34, 0x1a, 0x55, 0xad, 0x93, 0x32, 0x30, 0xf5, 0x8c, 0xb1, 0xe3, 0x1d, 0xf6, 0xe2, 0x2e, 0x82, 0x66, 0xca, 0x60, 0xc0, 0x29, 0x23, 0xab, 0x0d, 0x53, 0x4e, 0x6f, 0xd5, 0xdb, 0x37, 0x45, 0xde, 0xfd, 0x8e, 0x2f, 0x03, 0xff, 0x6a, 0x72, 0x6d, 0x6c, 0x5b, 0x51, 0x8d, 0x1b, 0xaf, 0x92, 0xbb, 0xdd, 0xbc, 0x7f, 0x11, 0xd9, 0x5c, 0x41, 0x1f, 0x10, 0x5a, 0xd8, 0x0a, 0xc1, 0x31, 0x88, 0xa5, 0xcd, 0x7b, 0xbd, 0x2d, 0x74, 0xd0, 0x12, 0xb8, 0xe5, 0xb4, 0xb0, 0x89, 0x69, 0x97, 0x4a, 0x0c, 0x96, 0x77, 0x7e, 0x65, 0xb9, 0xf1, 0x09, 0xc5, 0x6e, 0xc6, 0x84, 0x18, 0xf0, 0x7d, 0xec, 0x3a, 0xdc, 0x4d, 0x20, 0x79, 0xee, 0x5f, 0x3e, 0xd7, 0xcb, 0x39, 0x48, }; __kernel void sm4_encrypt(__global const unsigned int *rkey, __global unsigned char *data) { __local unsigned char S[256]; __local unsigned int rk[32]; unsigned int x0, x1, x2, x3, x4, i, t; uint global_id = get_global_id(0); __global unsigned char *p = data + 16 * global_id; __global unsigned int *in = (__global unsigned int *)p; __global unsigned int *out = (__global unsigned int *)p; if (get_local_id(0) == 0) { for (i = 0; i < 256; i++) { S[i] = SBOX[i]; } for (i = 0; i < 32; i++) { rk[i] = rkey[i]; } } x0 = (in[0] >> 24) | ((in[0] >> 8) & 0xff00) | ((in[0] << 8) & 0xff0000) | (in[0] << 24); x1 = (in[1] >> 24) | ((in[1] >> 8) & 0xff00) | ((in[1] << 8) & 0xff0000) | (in[1] << 24); x2 = (in[2] >> 24) | ((in[2] >> 8) & 0xff00) | ((in[2] << 8) & 0xff0000) | (in[2] << 24); x3 = (in[3] >> 24) | ((in[3] >> 8) & 0xff00) | ((in[3] << 8) & 0xff0000) | (in[3] << 24); for (i = 0; i < 31; i++) { x4 = x1 ^ x2 ^ x3 ^ rk[i]; x4 = (S[x4 >> 24] << 24) ^ (S[(x4 >> 16) & 0xff] << 16) ^ (S[(x4 >> 8) & 0xff] << 8) ^ S[x4 & 0xff]; x4 = x0 ^ (x4 ^ ((x4 << 2) | (x4 >> (32 - 2))) ^ ((x4 << 10) | (x4 >> (32 - 10))) ^ ((x4 << 18) | (x4 >> (32 - 18))) ^ ((x4 << 24) | (x4 >> (32 - 24)))); t = x0; x0 = x1; x1 = x2; x2 = x3; x3 = x4; x4 = t; } x4 = x1 ^ x2 ^ x3 ^ rk[i]; x4 = (S[x4 >> 24] << 24) ^ (S[(x4 >> 16) & 0xff] << 16) ^ (S[(x4 >> 8) & 0xff] << 8) ^ S[x4 & 0xff]; x4 = x0 ^ (x4 ^ ((x4 << 2) | (x4 >> (32 - 2))) ^ ((x4 << 10) | (x4 >> (32 - 10))) ^ ((x4 << 18) | (x4 >> (32 - 18))) ^ ((x4 << 24) | (x4 >> (32 - 24)))); out[0] = (x4 >> 24) | ((x4 >> 8) & 0xff00) | ((x4 << 8) & 0xff0000) | (x4 << 24); out[1] = (x3 >> 24) | ((x3 >> 8) & 0xff00) | ((x3 << 8) & 0xff0000) | (x3 << 24); out[2] = (x2 >> 24) | ((x2 >> 8) & 0xff00) | ((x2 << 8) & 0xff0000) | (x2 << 24); out[3] = (x1 >> 24) | ((x1 >> 8) & 0xff00) | ((x1 << 8) & 0xff0000) | (x1 << 24); } );