1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * MIPS accelerated ChaCha and XChaCha stream ciphers,
4*4882a593Smuzhiyun * including ChaCha20 (RFC7539)
5*4882a593Smuzhiyun *
6*4882a593Smuzhiyun * Copyright (C) 2019 Linaro, Ltd. <ard.biesheuvel@linaro.org>
7*4882a593Smuzhiyun */
8*4882a593Smuzhiyun
9*4882a593Smuzhiyun #include <asm/byteorder.h>
10*4882a593Smuzhiyun #include <crypto/algapi.h>
11*4882a593Smuzhiyun #include <crypto/internal/chacha.h>
12*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
13*4882a593Smuzhiyun #include <linux/kernel.h>
14*4882a593Smuzhiyun #include <linux/module.h>
15*4882a593Smuzhiyun
16*4882a593Smuzhiyun asmlinkage void chacha_crypt_arch(u32 *state, u8 *dst, const u8 *src,
17*4882a593Smuzhiyun unsigned int bytes, int nrounds);
18*4882a593Smuzhiyun EXPORT_SYMBOL(chacha_crypt_arch);
19*4882a593Smuzhiyun
20*4882a593Smuzhiyun asmlinkage void hchacha_block_arch(const u32 *state, u32 *stream, int nrounds);
21*4882a593Smuzhiyun EXPORT_SYMBOL(hchacha_block_arch);
22*4882a593Smuzhiyun
chacha_init_arch(u32 * state,const u32 * key,const u8 * iv)23*4882a593Smuzhiyun void chacha_init_arch(u32 *state, const u32 *key, const u8 *iv)
24*4882a593Smuzhiyun {
25*4882a593Smuzhiyun chacha_init_generic(state, key, iv);
26*4882a593Smuzhiyun }
27*4882a593Smuzhiyun EXPORT_SYMBOL(chacha_init_arch);
28*4882a593Smuzhiyun
chacha_mips_stream_xor(struct skcipher_request * req,const struct chacha_ctx * ctx,const u8 * iv)29*4882a593Smuzhiyun static int chacha_mips_stream_xor(struct skcipher_request *req,
30*4882a593Smuzhiyun const struct chacha_ctx *ctx, const u8 *iv)
31*4882a593Smuzhiyun {
32*4882a593Smuzhiyun struct skcipher_walk walk;
33*4882a593Smuzhiyun u32 state[16];
34*4882a593Smuzhiyun int err;
35*4882a593Smuzhiyun
36*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
37*4882a593Smuzhiyun
38*4882a593Smuzhiyun chacha_init_generic(state, ctx->key, iv);
39*4882a593Smuzhiyun
40*4882a593Smuzhiyun while (walk.nbytes > 0) {
41*4882a593Smuzhiyun unsigned int nbytes = walk.nbytes;
42*4882a593Smuzhiyun
43*4882a593Smuzhiyun if (nbytes < walk.total)
44*4882a593Smuzhiyun nbytes = round_down(nbytes, walk.stride);
45*4882a593Smuzhiyun
46*4882a593Smuzhiyun chacha_crypt(state, walk.dst.virt.addr, walk.src.virt.addr,
47*4882a593Smuzhiyun nbytes, ctx->nrounds);
48*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
49*4882a593Smuzhiyun }
50*4882a593Smuzhiyun
51*4882a593Smuzhiyun return err;
52*4882a593Smuzhiyun }
53*4882a593Smuzhiyun
chacha_mips(struct skcipher_request * req)54*4882a593Smuzhiyun static int chacha_mips(struct skcipher_request *req)
55*4882a593Smuzhiyun {
56*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
57*4882a593Smuzhiyun struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm);
58*4882a593Smuzhiyun
59*4882a593Smuzhiyun return chacha_mips_stream_xor(req, ctx, req->iv);
60*4882a593Smuzhiyun }
61*4882a593Smuzhiyun
xchacha_mips(struct skcipher_request * req)62*4882a593Smuzhiyun static int xchacha_mips(struct skcipher_request *req)
63*4882a593Smuzhiyun {
64*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
65*4882a593Smuzhiyun struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm);
66*4882a593Smuzhiyun struct chacha_ctx subctx;
67*4882a593Smuzhiyun u32 state[16];
68*4882a593Smuzhiyun u8 real_iv[16];
69*4882a593Smuzhiyun
70*4882a593Smuzhiyun chacha_init_generic(state, ctx->key, req->iv);
71*4882a593Smuzhiyun
72*4882a593Smuzhiyun hchacha_block(state, subctx.key, ctx->nrounds);
73*4882a593Smuzhiyun subctx.nrounds = ctx->nrounds;
74*4882a593Smuzhiyun
75*4882a593Smuzhiyun memcpy(&real_iv[0], req->iv + 24, 8);
76*4882a593Smuzhiyun memcpy(&real_iv[8], req->iv + 16, 8);
77*4882a593Smuzhiyun return chacha_mips_stream_xor(req, &subctx, real_iv);
78*4882a593Smuzhiyun }
79*4882a593Smuzhiyun
80*4882a593Smuzhiyun static struct skcipher_alg algs[] = {
81*4882a593Smuzhiyun {
82*4882a593Smuzhiyun .base.cra_name = "chacha20",
83*4882a593Smuzhiyun .base.cra_driver_name = "chacha20-mips",
84*4882a593Smuzhiyun .base.cra_priority = 200,
85*4882a593Smuzhiyun .base.cra_blocksize = 1,
86*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct chacha_ctx),
87*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
88*4882a593Smuzhiyun
89*4882a593Smuzhiyun .min_keysize = CHACHA_KEY_SIZE,
90*4882a593Smuzhiyun .max_keysize = CHACHA_KEY_SIZE,
91*4882a593Smuzhiyun .ivsize = CHACHA_IV_SIZE,
92*4882a593Smuzhiyun .chunksize = CHACHA_BLOCK_SIZE,
93*4882a593Smuzhiyun .setkey = chacha20_setkey,
94*4882a593Smuzhiyun .encrypt = chacha_mips,
95*4882a593Smuzhiyun .decrypt = chacha_mips,
96*4882a593Smuzhiyun }, {
97*4882a593Smuzhiyun .base.cra_name = "xchacha20",
98*4882a593Smuzhiyun .base.cra_driver_name = "xchacha20-mips",
99*4882a593Smuzhiyun .base.cra_priority = 200,
100*4882a593Smuzhiyun .base.cra_blocksize = 1,
101*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct chacha_ctx),
102*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
103*4882a593Smuzhiyun
104*4882a593Smuzhiyun .min_keysize = CHACHA_KEY_SIZE,
105*4882a593Smuzhiyun .max_keysize = CHACHA_KEY_SIZE,
106*4882a593Smuzhiyun .ivsize = XCHACHA_IV_SIZE,
107*4882a593Smuzhiyun .chunksize = CHACHA_BLOCK_SIZE,
108*4882a593Smuzhiyun .setkey = chacha20_setkey,
109*4882a593Smuzhiyun .encrypt = xchacha_mips,
110*4882a593Smuzhiyun .decrypt = xchacha_mips,
111*4882a593Smuzhiyun }, {
112*4882a593Smuzhiyun .base.cra_name = "xchacha12",
113*4882a593Smuzhiyun .base.cra_driver_name = "xchacha12-mips",
114*4882a593Smuzhiyun .base.cra_priority = 200,
115*4882a593Smuzhiyun .base.cra_blocksize = 1,
116*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct chacha_ctx),
117*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
118*4882a593Smuzhiyun
119*4882a593Smuzhiyun .min_keysize = CHACHA_KEY_SIZE,
120*4882a593Smuzhiyun .max_keysize = CHACHA_KEY_SIZE,
121*4882a593Smuzhiyun .ivsize = XCHACHA_IV_SIZE,
122*4882a593Smuzhiyun .chunksize = CHACHA_BLOCK_SIZE,
123*4882a593Smuzhiyun .setkey = chacha12_setkey,
124*4882a593Smuzhiyun .encrypt = xchacha_mips,
125*4882a593Smuzhiyun .decrypt = xchacha_mips,
126*4882a593Smuzhiyun }
127*4882a593Smuzhiyun };
128*4882a593Smuzhiyun
chacha_simd_mod_init(void)129*4882a593Smuzhiyun static int __init chacha_simd_mod_init(void)
130*4882a593Smuzhiyun {
131*4882a593Smuzhiyun return IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER) ?
132*4882a593Smuzhiyun crypto_register_skciphers(algs, ARRAY_SIZE(algs)) : 0;
133*4882a593Smuzhiyun }
134*4882a593Smuzhiyun
chacha_simd_mod_fini(void)135*4882a593Smuzhiyun static void __exit chacha_simd_mod_fini(void)
136*4882a593Smuzhiyun {
137*4882a593Smuzhiyun if (IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER))
138*4882a593Smuzhiyun crypto_unregister_skciphers(algs, ARRAY_SIZE(algs));
139*4882a593Smuzhiyun }
140*4882a593Smuzhiyun
141*4882a593Smuzhiyun module_init(chacha_simd_mod_init);
142*4882a593Smuzhiyun module_exit(chacha_simd_mod_fini);
143*4882a593Smuzhiyun
144*4882a593Smuzhiyun MODULE_DESCRIPTION("ChaCha and XChaCha stream ciphers (MIPS accelerated)");
145*4882a593Smuzhiyun MODULE_AUTHOR("Ard Biesheuvel <ard.biesheuvel@linaro.org>");
146*4882a593Smuzhiyun MODULE_LICENSE("GPL v2");
147*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("chacha20");
148*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("chacha20-mips");
149*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xchacha20");
150*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xchacha20-mips");
151*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xchacha12");
152*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xchacha12-mips");
153