xref: /OK3568_Linux_fs/kernel/arch/mips/crypto/chacha-glue.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * MIPS accelerated ChaCha and XChaCha stream ciphers,
4*4882a593Smuzhiyun  * including ChaCha20 (RFC7539)
5*4882a593Smuzhiyun  *
6*4882a593Smuzhiyun  * Copyright (C) 2019 Linaro, Ltd. <ard.biesheuvel@linaro.org>
7*4882a593Smuzhiyun  */
8*4882a593Smuzhiyun 
9*4882a593Smuzhiyun #include <asm/byteorder.h>
10*4882a593Smuzhiyun #include <crypto/algapi.h>
11*4882a593Smuzhiyun #include <crypto/internal/chacha.h>
12*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
13*4882a593Smuzhiyun #include <linux/kernel.h>
14*4882a593Smuzhiyun #include <linux/module.h>
15*4882a593Smuzhiyun 
16*4882a593Smuzhiyun asmlinkage void chacha_crypt_arch(u32 *state, u8 *dst, const u8 *src,
17*4882a593Smuzhiyun 				  unsigned int bytes, int nrounds);
18*4882a593Smuzhiyun EXPORT_SYMBOL(chacha_crypt_arch);
19*4882a593Smuzhiyun 
20*4882a593Smuzhiyun asmlinkage void hchacha_block_arch(const u32 *state, u32 *stream, int nrounds);
21*4882a593Smuzhiyun EXPORT_SYMBOL(hchacha_block_arch);
22*4882a593Smuzhiyun 
chacha_init_arch(u32 * state,const u32 * key,const u8 * iv)23*4882a593Smuzhiyun void chacha_init_arch(u32 *state, const u32 *key, const u8 *iv)
24*4882a593Smuzhiyun {
25*4882a593Smuzhiyun 	chacha_init_generic(state, key, iv);
26*4882a593Smuzhiyun }
27*4882a593Smuzhiyun EXPORT_SYMBOL(chacha_init_arch);
28*4882a593Smuzhiyun 
chacha_mips_stream_xor(struct skcipher_request * req,const struct chacha_ctx * ctx,const u8 * iv)29*4882a593Smuzhiyun static int chacha_mips_stream_xor(struct skcipher_request *req,
30*4882a593Smuzhiyun 				  const struct chacha_ctx *ctx, const u8 *iv)
31*4882a593Smuzhiyun {
32*4882a593Smuzhiyun 	struct skcipher_walk walk;
33*4882a593Smuzhiyun 	u32 state[16];
34*4882a593Smuzhiyun 	int err;
35*4882a593Smuzhiyun 
36*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
37*4882a593Smuzhiyun 
38*4882a593Smuzhiyun 	chacha_init_generic(state, ctx->key, iv);
39*4882a593Smuzhiyun 
40*4882a593Smuzhiyun 	while (walk.nbytes > 0) {
41*4882a593Smuzhiyun 		unsigned int nbytes = walk.nbytes;
42*4882a593Smuzhiyun 
43*4882a593Smuzhiyun 		if (nbytes < walk.total)
44*4882a593Smuzhiyun 			nbytes = round_down(nbytes, walk.stride);
45*4882a593Smuzhiyun 
46*4882a593Smuzhiyun 		chacha_crypt(state, walk.dst.virt.addr, walk.src.virt.addr,
47*4882a593Smuzhiyun 			     nbytes, ctx->nrounds);
48*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
49*4882a593Smuzhiyun 	}
50*4882a593Smuzhiyun 
51*4882a593Smuzhiyun 	return err;
52*4882a593Smuzhiyun }
53*4882a593Smuzhiyun 
chacha_mips(struct skcipher_request * req)54*4882a593Smuzhiyun static int chacha_mips(struct skcipher_request *req)
55*4882a593Smuzhiyun {
56*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
57*4882a593Smuzhiyun 	struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm);
58*4882a593Smuzhiyun 
59*4882a593Smuzhiyun 	return chacha_mips_stream_xor(req, ctx, req->iv);
60*4882a593Smuzhiyun }
61*4882a593Smuzhiyun 
xchacha_mips(struct skcipher_request * req)62*4882a593Smuzhiyun static int xchacha_mips(struct skcipher_request *req)
63*4882a593Smuzhiyun {
64*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
65*4882a593Smuzhiyun 	struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm);
66*4882a593Smuzhiyun 	struct chacha_ctx subctx;
67*4882a593Smuzhiyun 	u32 state[16];
68*4882a593Smuzhiyun 	u8 real_iv[16];
69*4882a593Smuzhiyun 
70*4882a593Smuzhiyun 	chacha_init_generic(state, ctx->key, req->iv);
71*4882a593Smuzhiyun 
72*4882a593Smuzhiyun 	hchacha_block(state, subctx.key, ctx->nrounds);
73*4882a593Smuzhiyun 	subctx.nrounds = ctx->nrounds;
74*4882a593Smuzhiyun 
75*4882a593Smuzhiyun 	memcpy(&real_iv[0], req->iv + 24, 8);
76*4882a593Smuzhiyun 	memcpy(&real_iv[8], req->iv + 16, 8);
77*4882a593Smuzhiyun 	return chacha_mips_stream_xor(req, &subctx, real_iv);
78*4882a593Smuzhiyun }
79*4882a593Smuzhiyun 
80*4882a593Smuzhiyun static struct skcipher_alg algs[] = {
81*4882a593Smuzhiyun 	{
82*4882a593Smuzhiyun 		.base.cra_name		= "chacha20",
83*4882a593Smuzhiyun 		.base.cra_driver_name	= "chacha20-mips",
84*4882a593Smuzhiyun 		.base.cra_priority	= 200,
85*4882a593Smuzhiyun 		.base.cra_blocksize	= 1,
86*4882a593Smuzhiyun 		.base.cra_ctxsize	= sizeof(struct chacha_ctx),
87*4882a593Smuzhiyun 		.base.cra_module	= THIS_MODULE,
88*4882a593Smuzhiyun 
89*4882a593Smuzhiyun 		.min_keysize		= CHACHA_KEY_SIZE,
90*4882a593Smuzhiyun 		.max_keysize		= CHACHA_KEY_SIZE,
91*4882a593Smuzhiyun 		.ivsize			= CHACHA_IV_SIZE,
92*4882a593Smuzhiyun 		.chunksize		= CHACHA_BLOCK_SIZE,
93*4882a593Smuzhiyun 		.setkey			= chacha20_setkey,
94*4882a593Smuzhiyun 		.encrypt		= chacha_mips,
95*4882a593Smuzhiyun 		.decrypt		= chacha_mips,
96*4882a593Smuzhiyun 	}, {
97*4882a593Smuzhiyun 		.base.cra_name		= "xchacha20",
98*4882a593Smuzhiyun 		.base.cra_driver_name	= "xchacha20-mips",
99*4882a593Smuzhiyun 		.base.cra_priority	= 200,
100*4882a593Smuzhiyun 		.base.cra_blocksize	= 1,
101*4882a593Smuzhiyun 		.base.cra_ctxsize	= sizeof(struct chacha_ctx),
102*4882a593Smuzhiyun 		.base.cra_module	= THIS_MODULE,
103*4882a593Smuzhiyun 
104*4882a593Smuzhiyun 		.min_keysize		= CHACHA_KEY_SIZE,
105*4882a593Smuzhiyun 		.max_keysize		= CHACHA_KEY_SIZE,
106*4882a593Smuzhiyun 		.ivsize			= XCHACHA_IV_SIZE,
107*4882a593Smuzhiyun 		.chunksize		= CHACHA_BLOCK_SIZE,
108*4882a593Smuzhiyun 		.setkey			= chacha20_setkey,
109*4882a593Smuzhiyun 		.encrypt		= xchacha_mips,
110*4882a593Smuzhiyun 		.decrypt		= xchacha_mips,
111*4882a593Smuzhiyun 	}, {
112*4882a593Smuzhiyun 		.base.cra_name		= "xchacha12",
113*4882a593Smuzhiyun 		.base.cra_driver_name	= "xchacha12-mips",
114*4882a593Smuzhiyun 		.base.cra_priority	= 200,
115*4882a593Smuzhiyun 		.base.cra_blocksize	= 1,
116*4882a593Smuzhiyun 		.base.cra_ctxsize	= sizeof(struct chacha_ctx),
117*4882a593Smuzhiyun 		.base.cra_module	= THIS_MODULE,
118*4882a593Smuzhiyun 
119*4882a593Smuzhiyun 		.min_keysize		= CHACHA_KEY_SIZE,
120*4882a593Smuzhiyun 		.max_keysize		= CHACHA_KEY_SIZE,
121*4882a593Smuzhiyun 		.ivsize			= XCHACHA_IV_SIZE,
122*4882a593Smuzhiyun 		.chunksize		= CHACHA_BLOCK_SIZE,
123*4882a593Smuzhiyun 		.setkey			= chacha12_setkey,
124*4882a593Smuzhiyun 		.encrypt		= xchacha_mips,
125*4882a593Smuzhiyun 		.decrypt		= xchacha_mips,
126*4882a593Smuzhiyun 	}
127*4882a593Smuzhiyun };
128*4882a593Smuzhiyun 
chacha_simd_mod_init(void)129*4882a593Smuzhiyun static int __init chacha_simd_mod_init(void)
130*4882a593Smuzhiyun {
131*4882a593Smuzhiyun 	return IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER) ?
132*4882a593Smuzhiyun 		crypto_register_skciphers(algs, ARRAY_SIZE(algs)) : 0;
133*4882a593Smuzhiyun }
134*4882a593Smuzhiyun 
chacha_simd_mod_fini(void)135*4882a593Smuzhiyun static void __exit chacha_simd_mod_fini(void)
136*4882a593Smuzhiyun {
137*4882a593Smuzhiyun 	if (IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER))
138*4882a593Smuzhiyun 		crypto_unregister_skciphers(algs, ARRAY_SIZE(algs));
139*4882a593Smuzhiyun }
140*4882a593Smuzhiyun 
141*4882a593Smuzhiyun module_init(chacha_simd_mod_init);
142*4882a593Smuzhiyun module_exit(chacha_simd_mod_fini);
143*4882a593Smuzhiyun 
144*4882a593Smuzhiyun MODULE_DESCRIPTION("ChaCha and XChaCha stream ciphers (MIPS accelerated)");
145*4882a593Smuzhiyun MODULE_AUTHOR("Ard Biesheuvel <ard.biesheuvel@linaro.org>");
146*4882a593Smuzhiyun MODULE_LICENSE("GPL v2");
147*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("chacha20");
148*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("chacha20-mips");
149*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xchacha20");
150*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xchacha20-mips");
151*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xchacha12");
152*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xchacha12-mips");
153