1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * Glue Code for AVX assembler version of Twofish Cipher
4*4882a593Smuzhiyun *
5*4882a593Smuzhiyun * Copyright (C) 2012 Johannes Goetzfried
6*4882a593Smuzhiyun * <Johannes.Goetzfried@informatik.stud.uni-erlangen.de>
7*4882a593Smuzhiyun *
8*4882a593Smuzhiyun * Copyright © 2013 Jussi Kivilinna <jussi.kivilinna@iki.fi>
9*4882a593Smuzhiyun */
10*4882a593Smuzhiyun
11*4882a593Smuzhiyun #include <linux/module.h>
12*4882a593Smuzhiyun #include <linux/types.h>
13*4882a593Smuzhiyun #include <linux/crypto.h>
14*4882a593Smuzhiyun #include <linux/err.h>
15*4882a593Smuzhiyun #include <crypto/algapi.h>
16*4882a593Smuzhiyun #include <crypto/internal/simd.h>
17*4882a593Smuzhiyun #include <crypto/twofish.h>
18*4882a593Smuzhiyun #include <crypto/xts.h>
19*4882a593Smuzhiyun #include <asm/crypto/glue_helper.h>
20*4882a593Smuzhiyun #include <asm/crypto/twofish.h>
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun #define TWOFISH_PARALLEL_BLOCKS 8
23*4882a593Smuzhiyun
24*4882a593Smuzhiyun /* 8-way parallel cipher functions */
25*4882a593Smuzhiyun asmlinkage void twofish_ecb_enc_8way(const void *ctx, u8 *dst, const u8 *src);
26*4882a593Smuzhiyun asmlinkage void twofish_ecb_dec_8way(const void *ctx, u8 *dst, const u8 *src);
27*4882a593Smuzhiyun
28*4882a593Smuzhiyun asmlinkage void twofish_cbc_dec_8way(const void *ctx, u8 *dst, const u8 *src);
29*4882a593Smuzhiyun asmlinkage void twofish_ctr_8way(const void *ctx, u8 *dst, const u8 *src,
30*4882a593Smuzhiyun le128 *iv);
31*4882a593Smuzhiyun
32*4882a593Smuzhiyun asmlinkage void twofish_xts_enc_8way(const void *ctx, u8 *dst, const u8 *src,
33*4882a593Smuzhiyun le128 *iv);
34*4882a593Smuzhiyun asmlinkage void twofish_xts_dec_8way(const void *ctx, u8 *dst, const u8 *src,
35*4882a593Smuzhiyun le128 *iv);
36*4882a593Smuzhiyun
twofish_setkey_skcipher(struct crypto_skcipher * tfm,const u8 * key,unsigned int keylen)37*4882a593Smuzhiyun static int twofish_setkey_skcipher(struct crypto_skcipher *tfm,
38*4882a593Smuzhiyun const u8 *key, unsigned int keylen)
39*4882a593Smuzhiyun {
40*4882a593Smuzhiyun return twofish_setkey(&tfm->base, key, keylen);
41*4882a593Smuzhiyun }
42*4882a593Smuzhiyun
twofish_enc_blk_3way(const void * ctx,u8 * dst,const u8 * src)43*4882a593Smuzhiyun static inline void twofish_enc_blk_3way(const void *ctx, u8 *dst, const u8 *src)
44*4882a593Smuzhiyun {
45*4882a593Smuzhiyun __twofish_enc_blk_3way(ctx, dst, src, false);
46*4882a593Smuzhiyun }
47*4882a593Smuzhiyun
twofish_xts_enc(const void * ctx,u8 * dst,const u8 * src,le128 * iv)48*4882a593Smuzhiyun static void twofish_xts_enc(const void *ctx, u8 *dst, const u8 *src, le128 *iv)
49*4882a593Smuzhiyun {
50*4882a593Smuzhiyun glue_xts_crypt_128bit_one(ctx, dst, src, iv, twofish_enc_blk);
51*4882a593Smuzhiyun }
52*4882a593Smuzhiyun
twofish_xts_dec(const void * ctx,u8 * dst,const u8 * src,le128 * iv)53*4882a593Smuzhiyun static void twofish_xts_dec(const void *ctx, u8 *dst, const u8 *src, le128 *iv)
54*4882a593Smuzhiyun {
55*4882a593Smuzhiyun glue_xts_crypt_128bit_one(ctx, dst, src, iv, twofish_dec_blk);
56*4882a593Smuzhiyun }
57*4882a593Smuzhiyun
58*4882a593Smuzhiyun struct twofish_xts_ctx {
59*4882a593Smuzhiyun struct twofish_ctx tweak_ctx;
60*4882a593Smuzhiyun struct twofish_ctx crypt_ctx;
61*4882a593Smuzhiyun };
62*4882a593Smuzhiyun
xts_twofish_setkey(struct crypto_skcipher * tfm,const u8 * key,unsigned int keylen)63*4882a593Smuzhiyun static int xts_twofish_setkey(struct crypto_skcipher *tfm, const u8 *key,
64*4882a593Smuzhiyun unsigned int keylen)
65*4882a593Smuzhiyun {
66*4882a593Smuzhiyun struct twofish_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
67*4882a593Smuzhiyun int err;
68*4882a593Smuzhiyun
69*4882a593Smuzhiyun err = xts_verify_key(tfm, key, keylen);
70*4882a593Smuzhiyun if (err)
71*4882a593Smuzhiyun return err;
72*4882a593Smuzhiyun
73*4882a593Smuzhiyun /* first half of xts-key is for crypt */
74*4882a593Smuzhiyun err = __twofish_setkey(&ctx->crypt_ctx, key, keylen / 2);
75*4882a593Smuzhiyun if (err)
76*4882a593Smuzhiyun return err;
77*4882a593Smuzhiyun
78*4882a593Smuzhiyun /* second half of xts-key is for tweak */
79*4882a593Smuzhiyun return __twofish_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2);
80*4882a593Smuzhiyun }
81*4882a593Smuzhiyun
82*4882a593Smuzhiyun static const struct common_glue_ctx twofish_enc = {
83*4882a593Smuzhiyun .num_funcs = 3,
84*4882a593Smuzhiyun .fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
85*4882a593Smuzhiyun
86*4882a593Smuzhiyun .funcs = { {
87*4882a593Smuzhiyun .num_blocks = TWOFISH_PARALLEL_BLOCKS,
88*4882a593Smuzhiyun .fn_u = { .ecb = twofish_ecb_enc_8way }
89*4882a593Smuzhiyun }, {
90*4882a593Smuzhiyun .num_blocks = 3,
91*4882a593Smuzhiyun .fn_u = { .ecb = twofish_enc_blk_3way }
92*4882a593Smuzhiyun }, {
93*4882a593Smuzhiyun .num_blocks = 1,
94*4882a593Smuzhiyun .fn_u = { .ecb = twofish_enc_blk }
95*4882a593Smuzhiyun } }
96*4882a593Smuzhiyun };
97*4882a593Smuzhiyun
98*4882a593Smuzhiyun static const struct common_glue_ctx twofish_ctr = {
99*4882a593Smuzhiyun .num_funcs = 3,
100*4882a593Smuzhiyun .fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
101*4882a593Smuzhiyun
102*4882a593Smuzhiyun .funcs = { {
103*4882a593Smuzhiyun .num_blocks = TWOFISH_PARALLEL_BLOCKS,
104*4882a593Smuzhiyun .fn_u = { .ctr = twofish_ctr_8way }
105*4882a593Smuzhiyun }, {
106*4882a593Smuzhiyun .num_blocks = 3,
107*4882a593Smuzhiyun .fn_u = { .ctr = twofish_enc_blk_ctr_3way }
108*4882a593Smuzhiyun }, {
109*4882a593Smuzhiyun .num_blocks = 1,
110*4882a593Smuzhiyun .fn_u = { .ctr = twofish_enc_blk_ctr }
111*4882a593Smuzhiyun } }
112*4882a593Smuzhiyun };
113*4882a593Smuzhiyun
114*4882a593Smuzhiyun static const struct common_glue_ctx twofish_enc_xts = {
115*4882a593Smuzhiyun .num_funcs = 2,
116*4882a593Smuzhiyun .fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
117*4882a593Smuzhiyun
118*4882a593Smuzhiyun .funcs = { {
119*4882a593Smuzhiyun .num_blocks = TWOFISH_PARALLEL_BLOCKS,
120*4882a593Smuzhiyun .fn_u = { .xts = twofish_xts_enc_8way }
121*4882a593Smuzhiyun }, {
122*4882a593Smuzhiyun .num_blocks = 1,
123*4882a593Smuzhiyun .fn_u = { .xts = twofish_xts_enc }
124*4882a593Smuzhiyun } }
125*4882a593Smuzhiyun };
126*4882a593Smuzhiyun
127*4882a593Smuzhiyun static const struct common_glue_ctx twofish_dec = {
128*4882a593Smuzhiyun .num_funcs = 3,
129*4882a593Smuzhiyun .fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
130*4882a593Smuzhiyun
131*4882a593Smuzhiyun .funcs = { {
132*4882a593Smuzhiyun .num_blocks = TWOFISH_PARALLEL_BLOCKS,
133*4882a593Smuzhiyun .fn_u = { .ecb = twofish_ecb_dec_8way }
134*4882a593Smuzhiyun }, {
135*4882a593Smuzhiyun .num_blocks = 3,
136*4882a593Smuzhiyun .fn_u = { .ecb = twofish_dec_blk_3way }
137*4882a593Smuzhiyun }, {
138*4882a593Smuzhiyun .num_blocks = 1,
139*4882a593Smuzhiyun .fn_u = { .ecb = twofish_dec_blk }
140*4882a593Smuzhiyun } }
141*4882a593Smuzhiyun };
142*4882a593Smuzhiyun
143*4882a593Smuzhiyun static const struct common_glue_ctx twofish_dec_cbc = {
144*4882a593Smuzhiyun .num_funcs = 3,
145*4882a593Smuzhiyun .fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
146*4882a593Smuzhiyun
147*4882a593Smuzhiyun .funcs = { {
148*4882a593Smuzhiyun .num_blocks = TWOFISH_PARALLEL_BLOCKS,
149*4882a593Smuzhiyun .fn_u = { .cbc = twofish_cbc_dec_8way }
150*4882a593Smuzhiyun }, {
151*4882a593Smuzhiyun .num_blocks = 3,
152*4882a593Smuzhiyun .fn_u = { .cbc = twofish_dec_blk_cbc_3way }
153*4882a593Smuzhiyun }, {
154*4882a593Smuzhiyun .num_blocks = 1,
155*4882a593Smuzhiyun .fn_u = { .cbc = twofish_dec_blk }
156*4882a593Smuzhiyun } }
157*4882a593Smuzhiyun };
158*4882a593Smuzhiyun
159*4882a593Smuzhiyun static const struct common_glue_ctx twofish_dec_xts = {
160*4882a593Smuzhiyun .num_funcs = 2,
161*4882a593Smuzhiyun .fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
162*4882a593Smuzhiyun
163*4882a593Smuzhiyun .funcs = { {
164*4882a593Smuzhiyun .num_blocks = TWOFISH_PARALLEL_BLOCKS,
165*4882a593Smuzhiyun .fn_u = { .xts = twofish_xts_dec_8way }
166*4882a593Smuzhiyun }, {
167*4882a593Smuzhiyun .num_blocks = 1,
168*4882a593Smuzhiyun .fn_u = { .xts = twofish_xts_dec }
169*4882a593Smuzhiyun } }
170*4882a593Smuzhiyun };
171*4882a593Smuzhiyun
ecb_encrypt(struct skcipher_request * req)172*4882a593Smuzhiyun static int ecb_encrypt(struct skcipher_request *req)
173*4882a593Smuzhiyun {
174*4882a593Smuzhiyun return glue_ecb_req_128bit(&twofish_enc, req);
175*4882a593Smuzhiyun }
176*4882a593Smuzhiyun
ecb_decrypt(struct skcipher_request * req)177*4882a593Smuzhiyun static int ecb_decrypt(struct skcipher_request *req)
178*4882a593Smuzhiyun {
179*4882a593Smuzhiyun return glue_ecb_req_128bit(&twofish_dec, req);
180*4882a593Smuzhiyun }
181*4882a593Smuzhiyun
cbc_encrypt(struct skcipher_request * req)182*4882a593Smuzhiyun static int cbc_encrypt(struct skcipher_request *req)
183*4882a593Smuzhiyun {
184*4882a593Smuzhiyun return glue_cbc_encrypt_req_128bit(twofish_enc_blk, req);
185*4882a593Smuzhiyun }
186*4882a593Smuzhiyun
cbc_decrypt(struct skcipher_request * req)187*4882a593Smuzhiyun static int cbc_decrypt(struct skcipher_request *req)
188*4882a593Smuzhiyun {
189*4882a593Smuzhiyun return glue_cbc_decrypt_req_128bit(&twofish_dec_cbc, req);
190*4882a593Smuzhiyun }
191*4882a593Smuzhiyun
ctr_crypt(struct skcipher_request * req)192*4882a593Smuzhiyun static int ctr_crypt(struct skcipher_request *req)
193*4882a593Smuzhiyun {
194*4882a593Smuzhiyun return glue_ctr_req_128bit(&twofish_ctr, req);
195*4882a593Smuzhiyun }
196*4882a593Smuzhiyun
xts_encrypt(struct skcipher_request * req)197*4882a593Smuzhiyun static int xts_encrypt(struct skcipher_request *req)
198*4882a593Smuzhiyun {
199*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
200*4882a593Smuzhiyun struct twofish_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
201*4882a593Smuzhiyun
202*4882a593Smuzhiyun return glue_xts_req_128bit(&twofish_enc_xts, req, twofish_enc_blk,
203*4882a593Smuzhiyun &ctx->tweak_ctx, &ctx->crypt_ctx, false);
204*4882a593Smuzhiyun }
205*4882a593Smuzhiyun
xts_decrypt(struct skcipher_request * req)206*4882a593Smuzhiyun static int xts_decrypt(struct skcipher_request *req)
207*4882a593Smuzhiyun {
208*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
209*4882a593Smuzhiyun struct twofish_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
210*4882a593Smuzhiyun
211*4882a593Smuzhiyun return glue_xts_req_128bit(&twofish_dec_xts, req, twofish_enc_blk,
212*4882a593Smuzhiyun &ctx->tweak_ctx, &ctx->crypt_ctx, true);
213*4882a593Smuzhiyun }
214*4882a593Smuzhiyun
215*4882a593Smuzhiyun static struct skcipher_alg twofish_algs[] = {
216*4882a593Smuzhiyun {
217*4882a593Smuzhiyun .base.cra_name = "__ecb(twofish)",
218*4882a593Smuzhiyun .base.cra_driver_name = "__ecb-twofish-avx",
219*4882a593Smuzhiyun .base.cra_priority = 400,
220*4882a593Smuzhiyun .base.cra_flags = CRYPTO_ALG_INTERNAL,
221*4882a593Smuzhiyun .base.cra_blocksize = TF_BLOCK_SIZE,
222*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct twofish_ctx),
223*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
224*4882a593Smuzhiyun .min_keysize = TF_MIN_KEY_SIZE,
225*4882a593Smuzhiyun .max_keysize = TF_MAX_KEY_SIZE,
226*4882a593Smuzhiyun .setkey = twofish_setkey_skcipher,
227*4882a593Smuzhiyun .encrypt = ecb_encrypt,
228*4882a593Smuzhiyun .decrypt = ecb_decrypt,
229*4882a593Smuzhiyun }, {
230*4882a593Smuzhiyun .base.cra_name = "__cbc(twofish)",
231*4882a593Smuzhiyun .base.cra_driver_name = "__cbc-twofish-avx",
232*4882a593Smuzhiyun .base.cra_priority = 400,
233*4882a593Smuzhiyun .base.cra_flags = CRYPTO_ALG_INTERNAL,
234*4882a593Smuzhiyun .base.cra_blocksize = TF_BLOCK_SIZE,
235*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct twofish_ctx),
236*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
237*4882a593Smuzhiyun .min_keysize = TF_MIN_KEY_SIZE,
238*4882a593Smuzhiyun .max_keysize = TF_MAX_KEY_SIZE,
239*4882a593Smuzhiyun .ivsize = TF_BLOCK_SIZE,
240*4882a593Smuzhiyun .setkey = twofish_setkey_skcipher,
241*4882a593Smuzhiyun .encrypt = cbc_encrypt,
242*4882a593Smuzhiyun .decrypt = cbc_decrypt,
243*4882a593Smuzhiyun }, {
244*4882a593Smuzhiyun .base.cra_name = "__ctr(twofish)",
245*4882a593Smuzhiyun .base.cra_driver_name = "__ctr-twofish-avx",
246*4882a593Smuzhiyun .base.cra_priority = 400,
247*4882a593Smuzhiyun .base.cra_flags = CRYPTO_ALG_INTERNAL,
248*4882a593Smuzhiyun .base.cra_blocksize = 1,
249*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct twofish_ctx),
250*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
251*4882a593Smuzhiyun .min_keysize = TF_MIN_KEY_SIZE,
252*4882a593Smuzhiyun .max_keysize = TF_MAX_KEY_SIZE,
253*4882a593Smuzhiyun .ivsize = TF_BLOCK_SIZE,
254*4882a593Smuzhiyun .chunksize = TF_BLOCK_SIZE,
255*4882a593Smuzhiyun .setkey = twofish_setkey_skcipher,
256*4882a593Smuzhiyun .encrypt = ctr_crypt,
257*4882a593Smuzhiyun .decrypt = ctr_crypt,
258*4882a593Smuzhiyun }, {
259*4882a593Smuzhiyun .base.cra_name = "__xts(twofish)",
260*4882a593Smuzhiyun .base.cra_driver_name = "__xts-twofish-avx",
261*4882a593Smuzhiyun .base.cra_priority = 400,
262*4882a593Smuzhiyun .base.cra_flags = CRYPTO_ALG_INTERNAL,
263*4882a593Smuzhiyun .base.cra_blocksize = TF_BLOCK_SIZE,
264*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct twofish_xts_ctx),
265*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
266*4882a593Smuzhiyun .min_keysize = 2 * TF_MIN_KEY_SIZE,
267*4882a593Smuzhiyun .max_keysize = 2 * TF_MAX_KEY_SIZE,
268*4882a593Smuzhiyun .ivsize = TF_BLOCK_SIZE,
269*4882a593Smuzhiyun .setkey = xts_twofish_setkey,
270*4882a593Smuzhiyun .encrypt = xts_encrypt,
271*4882a593Smuzhiyun .decrypt = xts_decrypt,
272*4882a593Smuzhiyun },
273*4882a593Smuzhiyun };
274*4882a593Smuzhiyun
275*4882a593Smuzhiyun static struct simd_skcipher_alg *twofish_simd_algs[ARRAY_SIZE(twofish_algs)];
276*4882a593Smuzhiyun
twofish_init(void)277*4882a593Smuzhiyun static int __init twofish_init(void)
278*4882a593Smuzhiyun {
279*4882a593Smuzhiyun const char *feature_name;
280*4882a593Smuzhiyun
281*4882a593Smuzhiyun if (!cpu_has_xfeatures(XFEATURE_MASK_SSE | XFEATURE_MASK_YMM, &feature_name)) {
282*4882a593Smuzhiyun pr_info("CPU feature '%s' is not supported.\n", feature_name);
283*4882a593Smuzhiyun return -ENODEV;
284*4882a593Smuzhiyun }
285*4882a593Smuzhiyun
286*4882a593Smuzhiyun return simd_register_skciphers_compat(twofish_algs,
287*4882a593Smuzhiyun ARRAY_SIZE(twofish_algs),
288*4882a593Smuzhiyun twofish_simd_algs);
289*4882a593Smuzhiyun }
290*4882a593Smuzhiyun
twofish_exit(void)291*4882a593Smuzhiyun static void __exit twofish_exit(void)
292*4882a593Smuzhiyun {
293*4882a593Smuzhiyun simd_unregister_skciphers(twofish_algs, ARRAY_SIZE(twofish_algs),
294*4882a593Smuzhiyun twofish_simd_algs);
295*4882a593Smuzhiyun }
296*4882a593Smuzhiyun
297*4882a593Smuzhiyun module_init(twofish_init);
298*4882a593Smuzhiyun module_exit(twofish_exit);
299*4882a593Smuzhiyun
300*4882a593Smuzhiyun MODULE_DESCRIPTION("Twofish Cipher Algorithm, AVX optimized");
301*4882a593Smuzhiyun MODULE_LICENSE("GPL");
302*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("twofish");
303