• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

randombit / botan / 23385199118

21 Mar 2026 05:47PM UTC coverage: 89.401% (+0.006%) from 89.395%
23385199118

push

github

web-flow
Merge pull request #5474 from randombit/jack/ctr-avx2

Add AVX2 codepath for CTR counter handling and XOR

104463 of 116848 relevant lines covered (89.4%)

11789599.03 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

93.02
/src/lib/stream/ctr/ctr.cpp
1
/*
2
* Counter mode
3
* (C) 1999-2011,2014 Jack Lloyd
4
*
5
* Botan is released under the Simplified BSD License (see license.txt)
6
*/
7

8
#include <botan/internal/ctr.h>
9

10
#include <botan/exceptn.h>
11
#include <botan/internal/bit_ops.h>
12
#include <botan/internal/fmt.h>
13
#include <botan/internal/loadstor.h>
14

15
#if defined(BOTAN_HAS_CTR_BE_AVX2)
16
   #include <botan/internal/cpuid.h>
17
#endif
18

19
namespace Botan {
20

21
CTR_BE::CTR_BE(std::unique_ptr<BlockCipher> cipher) :
1,023✔
22
      m_cipher(std::move(cipher)),
1,023✔
23
      m_block_size(m_cipher->block_size()),
1,023✔
24
      m_ctr_size(m_block_size),
1,023✔
25
      m_ctr_blocks(m_cipher->parallel_bytes() / m_block_size),
1,023✔
26
      m_counter(m_cipher->parallel_bytes()),
2,046✔
27
      m_pad(m_counter.size()),
1,023✔
28
      m_pad_pos(0) {}
2,046✔
29

30
CTR_BE::CTR_BE(std::unique_ptr<BlockCipher> cipher, size_t ctr_size) :
100,611✔
31
      m_cipher(std::move(cipher)),
100,611✔
32
      m_block_size(m_cipher->block_size()),
100,611✔
33
      m_ctr_size(ctr_size),
100,611✔
34
      m_ctr_blocks(m_cipher->parallel_bytes() / m_block_size),
100,611✔
35
      m_counter(m_cipher->parallel_bytes()),
201,222✔
36
      m_pad(m_counter.size()),
100,611✔
37
      m_pad_pos(0) {
201,222✔
38
   BOTAN_ARG_CHECK(m_ctr_size >= 4 && m_ctr_size <= m_block_size, "Invalid CTR-BE counter size");
100,611✔
39
}
100,611✔
40

41
void CTR_BE::clear() {
7,502✔
42
   m_cipher->clear();
7,502✔
43
   zeroise(m_pad);
7,502✔
44
   zeroise(m_counter);
7,502✔
45
   zap(m_iv);
7,502✔
46
   m_pad_pos = 0;
7,502✔
47
}
7,502✔
48

49
size_t CTR_BE::default_iv_length() const {
3,276✔
50
   return m_block_size;
3,276✔
51
}
52

53
bool CTR_BE::valid_iv_length(size_t iv_len) const {
327,072✔
54
   return (iv_len <= m_block_size);
327,072✔
55
}
56

57
size_t CTR_BE::buffer_size() const {
1,659✔
58
   return m_pad.size();
1,659✔
59
}
60

61
Key_Length_Specification CTR_BE::key_spec() const {
207,697✔
62
   return m_cipher->key_spec();
207,697✔
63
}
64

65
std::unique_ptr<StreamCipher> CTR_BE::new_object() const {
1,638✔
66
   return std::make_unique<CTR_BE>(m_cipher->new_object(), m_ctr_size);
1,638✔
67
}
68

69
bool CTR_BE::has_keying_material() const {
20,984,029✔
70
   return m_cipher->has_keying_material();
20,984,029✔
71
}
72

73
void CTR_BE::key_schedule(std::span<const uint8_t> key) {
104,667✔
74
   m_cipher->set_key(key);
104,667✔
75

76
   // Set a default all-zeros IV
77
   set_iv(nullptr, 0);
104,667✔
78
}
104,667✔
79

80
std::string CTR_BE::name() const {
14,103✔
81
   if(m_ctr_size == m_block_size) {
14,103✔
82
      return fmt("CTR-BE({})", m_cipher->name());
13,065✔
83
   } else {
84
      return fmt("CTR-BE({},{})", m_cipher->name(), m_ctr_size);
1,038✔
85
   }
86
}
87

88
void CTR_BE::cipher_bytes(const uint8_t in[], uint8_t out[], size_t length) {
131,682✔
89
   assert_key_material_set();
131,682✔
90

91
   const uint8_t* pad_bits = m_pad.data();
127,730✔
92
   const size_t pad_size = m_pad.size();
127,730✔
93

94
   /* Consume any already computed keystream in m_pad */
95

96
   if(m_pad_pos > 0) {
127,730✔
97
      const size_t avail = pad_size - m_pad_pos;
106,294✔
98
      const size_t take = std::min(length, avail);
106,294✔
99
      xor_buf(out, in, pad_bits + m_pad_pos, take);
106,294✔
100
      length -= take;
106,294✔
101
      in += take;
106,294✔
102
      out += take;
106,294✔
103
      m_pad_pos += take;
106,294✔
104

105
      if(take == avail) {
106,294✔
106
         add_counter(m_ctr_blocks);
2,747✔
107
         m_cipher->encrypt_n(m_counter.data(), m_pad.data(), m_ctr_blocks);
2,747✔
108
         m_pad_pos = 0;
2,747✔
109
      }
110
   }
111

112
   /* Bulk processing */
113

114
#if defined(BOTAN_HAS_CTR_BE_AVX2)
115
   if(length >= pad_size && m_block_size == 16 && m_ctr_size == 4 && pad_size % 64 == 0 &&
127,730✔
116
      CPUID::has(CPUID::Feature::AVX2)) {
1,608✔
117
      const size_t consumed = ctr_proc_bs16_ctr4_avx2(in, out, length);
1,605✔
118
      in += consumed;
1,605✔
119
      out += consumed;
1,605✔
120
      length -= consumed;
1,605✔
121
   }
122
#endif
123

124
   while(length >= pad_size) {
127,888✔
125
      xor_buf(out, in, pad_bits, pad_size);
158✔
126
      length -= pad_size;
158✔
127
      in += pad_size;
158✔
128
      out += pad_size;
158✔
129

130
      add_counter(m_ctr_blocks);
158✔
131
      m_cipher->encrypt_n(m_counter.data(), m_pad.data(), m_ctr_blocks);
158✔
132
   }
133

134
   /* Now if length > 0 then we have some remaining text, and m_pad is full - consume as required */
135
   if(length > 0) {
127,730✔
136
      xor_buf(out, in, pad_bits, length);
23,426✔
137
      m_pad_pos = length;
23,426✔
138
   }
139
}
127,730✔
140

141
void CTR_BE::generate_keystream(uint8_t out[], size_t length) {
20,609,635✔
142
   assert_key_material_set();
20,609,635✔
143

144
   const size_t avail = m_pad.size() - m_pad_pos;
20,609,635✔
145
   const size_t take = std::min(length, avail);
20,609,635✔
146
   copy_mem(out, &m_pad[m_pad_pos], take);
20,609,635✔
147
   length -= take;
20,609,635✔
148
   out += take;
20,609,635✔
149
   m_pad_pos += take;
20,609,635✔
150

151
   while(length >= m_pad.size()) {
20,609,637✔
152
      add_counter(m_ctr_blocks);
2✔
153
      m_cipher->encrypt_n(m_counter.data(), out, m_ctr_blocks);
2✔
154

155
      length -= m_pad.size();
2✔
156
      out += m_pad.size();
2✔
157
   }
158

159
   if(m_pad_pos == m_pad.size()) {
20,609,635✔
160
      add_counter(m_ctr_blocks);
84,891✔
161
      m_cipher->encrypt_n(m_counter.data(), m_pad.data(), m_ctr_blocks);
84,891✔
162
      m_pad_pos = 0;
84,891✔
163
   }
164

165
   copy_mem(out, m_pad.data(), length);
20,609,635✔
166
   m_pad_pos += length;
20,609,635✔
167
   BOTAN_ASSERT_NOMSG(m_pad_pos < m_pad.size());
20,609,635✔
168
}
20,609,635✔
169

170
void CTR_BE::set_iv_bytes(const uint8_t iv[], size_t iv_len) {
227,821✔
171
   if(!valid_iv_length(iv_len)) {
227,821✔
172
      throw Invalid_IV_Length(name(), iv_len);
3,284✔
173
   }
174

175
   m_iv.resize(m_block_size);
226,179✔
176
   zeroise(m_iv);
226,179✔
177
   copy_mem(m_iv.data(), iv, iv_len);
226,179✔
178

179
   seek(0);
226,179✔
180
}
224,227✔
181

182
void CTR_BE::add_counter(const uint64_t counter) {
87,822✔
183
   const size_t ctr_size = m_ctr_size;
87,822✔
184
   const size_t ctr_blocks = m_ctr_blocks;
87,822✔
185
   const size_t BS = m_block_size;
87,822✔
186

187
   if(ctr_size == 4) {
87,822✔
188
      const size_t off = (BS - 4);
2,732✔
189
      const uint32_t low32 = static_cast<uint32_t>(counter + load_be<uint32_t>(&m_counter[off], 0));
2,732✔
190

191
      for(size_t i = 0; i != ctr_blocks; ++i) {
64,788✔
192
         store_be(uint32_t(low32 + i), &m_counter[i * BS + off]);
62,056✔
193
      }
194
   } else if(ctr_size == 8) {
85,090✔
195
      const size_t off = (BS - 8);
38✔
196
      const uint64_t low64 = counter + load_be<uint64_t>(&m_counter[off], 0);
38✔
197

198
      for(size_t i = 0; i != ctr_blocks; ++i) {
1,574✔
199
         store_be(uint64_t(low64 + i), &m_counter[i * BS + off]);
1,536✔
200
      }
201
   } else if(ctr_size == 16) {
85,052✔
202
      const size_t off = (BS - 16);
85,052✔
203
      uint64_t b0 = load_be<uint64_t>(&m_counter[off], 0);
85,052✔
204
      uint64_t b1 = load_be<uint64_t>(&m_counter[off], 1);
85,052✔
205
      b1 += counter;
85,052✔
206
      b0 += (b1 < counter) ? 1 : 0;  // carry
85,052✔
207

208
      for(size_t i = 0; i != ctr_blocks; ++i) {
2,749,092✔
209
         store_be(b0, &m_counter[i * BS + off]);
2,664,040✔
210
         store_be(b1, &m_counter[i * BS + off + 8]);
2,664,040✔
211
         b1 += 1;
2,664,040✔
212
         if(b1 == 0) {
2,664,040✔
213
            b0 += 1;  // carry
×
214
         }
215
      }
216
   } else {
217
      for(size_t i = 0; i != ctr_blocks; ++i) {
×
218
         uint64_t local_counter = counter;
×
219
         uint16_t carry = static_cast<uint8_t>(local_counter);
×
220
         for(size_t j = 0; (carry > 0 || local_counter > 0) && j != ctr_size; ++j) {
×
221
            const size_t off = i * BS + (BS - 1 - j);
×
222
            const uint16_t cnt = static_cast<uint16_t>(m_counter[off]) + carry;
×
223
            m_counter[off] = static_cast<uint8_t>(cnt);
×
224
            local_counter = (local_counter >> 8);
×
225
            carry = (cnt >> 8) + static_cast<uint8_t>(local_counter);
×
226
         }
227
      }
228
   }
229
}
87,822✔
230

231
void CTR_BE::seek(uint64_t offset) {
231,017✔
232
   assert_key_material_set();
231,017✔
233

234
   const uint64_t base_counter = m_ctr_blocks * (offset / m_counter.size());
227,427✔
235

236
   zeroise(m_counter);
227,427✔
237
   BOTAN_ASSERT_NOMSG(m_counter.size() >= m_iv.size());
227,427✔
238
   copy_mem(m_counter.data(), m_iv.data(), m_iv.size());
227,427✔
239

240
   const size_t BS = m_block_size;
227,427✔
241

242
   // Set m_counter blocks to IV, IV + 1, ... IV + n
243

244
   if(m_ctr_size == 4 && BS >= 8) {
227,427✔
245
      const uint32_t low32 = load_be<uint32_t>(&m_counter[BS - 4], 0);
17,516✔
246

247
      if(m_ctr_blocks >= 4 && is_power_of_2(m_ctr_blocks)) {
17,516✔
248
         size_t written = 1;
249
         while(written < m_ctr_blocks) {
102,660✔
250
            copy_mem(&m_counter[written * BS], &m_counter[0], BS * written);  // NOLINT(*container-data-pointer)
85,144✔
251
            written *= 2;
85,144✔
252
         }
253
      } else {
254
         for(size_t i = 1; i != m_ctr_blocks; ++i) {
×
255
            copy_mem(&m_counter[i * BS], &m_counter[0], BS - 4);  // NOLINT(*container-data-pointer)
×
256
         }
257
      }
258

259
      for(size_t i = 1; i != m_ctr_blocks; ++i) {
537,736✔
260
         const uint32_t c = static_cast<uint32_t>(low32 + i);
520,220✔
261
         store_be(c, &m_counter[(BS - 4) + i * BS]);
520,220✔
262
      }
263
   } else {
264
      // do everything sequentially:
265
      for(size_t i = 1; i != m_ctr_blocks; ++i) {
7,060,916✔
266
         copy_mem(&m_counter[i * BS], &m_counter[(i - 1) * BS], BS);
6,851,005✔
267

268
         for(size_t j = 0; j != m_ctr_size; ++j) {
6,857,174✔
269
            uint8_t& c = m_counter[i * BS + (BS - 1 - j)];
6,857,117✔
270
            c += 1;
6,857,117✔
271
            if(c > 0) {
6,857,117✔
272
               break;
273
            }
274
         }
275
      }
276
   }
277

278
   if(base_counter > 0) {
227,427✔
279
      add_counter(base_counter);
24✔
280
   }
281

282
   m_cipher->encrypt_n(m_counter.data(), m_pad.data(), m_ctr_blocks);
227,427✔
283
   m_pad_pos = offset % m_counter.size();
227,427✔
284
}
227,427✔
285
}  // namespace Botan
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc