xref: /OK3568_Linux_fs/kernel/crypto/poly1305_generic.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /*
2*4882a593Smuzhiyun  * Poly1305 authenticator algorithm, RFC7539
3*4882a593Smuzhiyun  *
4*4882a593Smuzhiyun  * Copyright (C) 2015 Martin Willi
5*4882a593Smuzhiyun  *
6*4882a593Smuzhiyun  * Based on public domain code by Andrew Moon and Daniel J. Bernstein.
7*4882a593Smuzhiyun  *
8*4882a593Smuzhiyun  * This program is free software; you can redistribute it and/or modify
9*4882a593Smuzhiyun  * it under the terms of the GNU General Public License as published by
10*4882a593Smuzhiyun  * the Free Software Foundation; either version 2 of the License, or
11*4882a593Smuzhiyun  * (at your option) any later version.
12*4882a593Smuzhiyun  */
13*4882a593Smuzhiyun 
14*4882a593Smuzhiyun #include <crypto/algapi.h>
15*4882a593Smuzhiyun #include <crypto/internal/hash.h>
16*4882a593Smuzhiyun #include <crypto/internal/poly1305.h>
17*4882a593Smuzhiyun #include <linux/crypto.h>
18*4882a593Smuzhiyun #include <linux/kernel.h>
19*4882a593Smuzhiyun #include <linux/module.h>
20*4882a593Smuzhiyun #include <asm/unaligned.h>
21*4882a593Smuzhiyun 
crypto_poly1305_init(struct shash_desc * desc)22*4882a593Smuzhiyun static int crypto_poly1305_init(struct shash_desc *desc)
23*4882a593Smuzhiyun {
24*4882a593Smuzhiyun 	struct poly1305_desc_ctx *dctx = shash_desc_ctx(desc);
25*4882a593Smuzhiyun 
26*4882a593Smuzhiyun 	poly1305_core_init(&dctx->h);
27*4882a593Smuzhiyun 	dctx->buflen = 0;
28*4882a593Smuzhiyun 	dctx->rset = 0;
29*4882a593Smuzhiyun 	dctx->sset = false;
30*4882a593Smuzhiyun 
31*4882a593Smuzhiyun 	return 0;
32*4882a593Smuzhiyun }
33*4882a593Smuzhiyun 
crypto_poly1305_setdesckey(struct poly1305_desc_ctx * dctx,const u8 * src,unsigned int srclen)34*4882a593Smuzhiyun static unsigned int crypto_poly1305_setdesckey(struct poly1305_desc_ctx *dctx,
35*4882a593Smuzhiyun 					       const u8 *src, unsigned int srclen)
36*4882a593Smuzhiyun {
37*4882a593Smuzhiyun 	if (!dctx->sset) {
38*4882a593Smuzhiyun 		if (!dctx->rset && srclen >= POLY1305_BLOCK_SIZE) {
39*4882a593Smuzhiyun 			poly1305_core_setkey(&dctx->core_r, src);
40*4882a593Smuzhiyun 			src += POLY1305_BLOCK_SIZE;
41*4882a593Smuzhiyun 			srclen -= POLY1305_BLOCK_SIZE;
42*4882a593Smuzhiyun 			dctx->rset = 2;
43*4882a593Smuzhiyun 		}
44*4882a593Smuzhiyun 		if (srclen >= POLY1305_BLOCK_SIZE) {
45*4882a593Smuzhiyun 			dctx->s[0] = get_unaligned_le32(src +  0);
46*4882a593Smuzhiyun 			dctx->s[1] = get_unaligned_le32(src +  4);
47*4882a593Smuzhiyun 			dctx->s[2] = get_unaligned_le32(src +  8);
48*4882a593Smuzhiyun 			dctx->s[3] = get_unaligned_le32(src + 12);
49*4882a593Smuzhiyun 			src += POLY1305_BLOCK_SIZE;
50*4882a593Smuzhiyun 			srclen -= POLY1305_BLOCK_SIZE;
51*4882a593Smuzhiyun 			dctx->sset = true;
52*4882a593Smuzhiyun 		}
53*4882a593Smuzhiyun 	}
54*4882a593Smuzhiyun 	return srclen;
55*4882a593Smuzhiyun }
56*4882a593Smuzhiyun 
poly1305_blocks(struct poly1305_desc_ctx * dctx,const u8 * src,unsigned int srclen)57*4882a593Smuzhiyun static void poly1305_blocks(struct poly1305_desc_ctx *dctx, const u8 *src,
58*4882a593Smuzhiyun 			    unsigned int srclen)
59*4882a593Smuzhiyun {
60*4882a593Smuzhiyun 	unsigned int datalen;
61*4882a593Smuzhiyun 
62*4882a593Smuzhiyun 	if (unlikely(!dctx->sset)) {
63*4882a593Smuzhiyun 		datalen = crypto_poly1305_setdesckey(dctx, src, srclen);
64*4882a593Smuzhiyun 		src += srclen - datalen;
65*4882a593Smuzhiyun 		srclen = datalen;
66*4882a593Smuzhiyun 	}
67*4882a593Smuzhiyun 
68*4882a593Smuzhiyun 	poly1305_core_blocks(&dctx->h, &dctx->core_r, src,
69*4882a593Smuzhiyun 			     srclen / POLY1305_BLOCK_SIZE, 1);
70*4882a593Smuzhiyun }
71*4882a593Smuzhiyun 
crypto_poly1305_update(struct shash_desc * desc,const u8 * src,unsigned int srclen)72*4882a593Smuzhiyun static int crypto_poly1305_update(struct shash_desc *desc,
73*4882a593Smuzhiyun 				  const u8 *src, unsigned int srclen)
74*4882a593Smuzhiyun {
75*4882a593Smuzhiyun 	struct poly1305_desc_ctx *dctx = shash_desc_ctx(desc);
76*4882a593Smuzhiyun 	unsigned int bytes;
77*4882a593Smuzhiyun 
78*4882a593Smuzhiyun 	if (unlikely(dctx->buflen)) {
79*4882a593Smuzhiyun 		bytes = min(srclen, POLY1305_BLOCK_SIZE - dctx->buflen);
80*4882a593Smuzhiyun 		memcpy(dctx->buf + dctx->buflen, src, bytes);
81*4882a593Smuzhiyun 		src += bytes;
82*4882a593Smuzhiyun 		srclen -= bytes;
83*4882a593Smuzhiyun 		dctx->buflen += bytes;
84*4882a593Smuzhiyun 
85*4882a593Smuzhiyun 		if (dctx->buflen == POLY1305_BLOCK_SIZE) {
86*4882a593Smuzhiyun 			poly1305_blocks(dctx, dctx->buf,
87*4882a593Smuzhiyun 					POLY1305_BLOCK_SIZE);
88*4882a593Smuzhiyun 			dctx->buflen = 0;
89*4882a593Smuzhiyun 		}
90*4882a593Smuzhiyun 	}
91*4882a593Smuzhiyun 
92*4882a593Smuzhiyun 	if (likely(srclen >= POLY1305_BLOCK_SIZE)) {
93*4882a593Smuzhiyun 		poly1305_blocks(dctx, src, srclen);
94*4882a593Smuzhiyun 		src += srclen - (srclen % POLY1305_BLOCK_SIZE);
95*4882a593Smuzhiyun 		srclen %= POLY1305_BLOCK_SIZE;
96*4882a593Smuzhiyun 	}
97*4882a593Smuzhiyun 
98*4882a593Smuzhiyun 	if (unlikely(srclen)) {
99*4882a593Smuzhiyun 		dctx->buflen = srclen;
100*4882a593Smuzhiyun 		memcpy(dctx->buf, src, srclen);
101*4882a593Smuzhiyun 	}
102*4882a593Smuzhiyun 
103*4882a593Smuzhiyun 	return 0;
104*4882a593Smuzhiyun }
105*4882a593Smuzhiyun 
crypto_poly1305_final(struct shash_desc * desc,u8 * dst)106*4882a593Smuzhiyun static int crypto_poly1305_final(struct shash_desc *desc, u8 *dst)
107*4882a593Smuzhiyun {
108*4882a593Smuzhiyun 	struct poly1305_desc_ctx *dctx = shash_desc_ctx(desc);
109*4882a593Smuzhiyun 
110*4882a593Smuzhiyun 	if (unlikely(!dctx->sset))
111*4882a593Smuzhiyun 		return -ENOKEY;
112*4882a593Smuzhiyun 
113*4882a593Smuzhiyun 	poly1305_final_generic(dctx, dst);
114*4882a593Smuzhiyun 	return 0;
115*4882a593Smuzhiyun }
116*4882a593Smuzhiyun 
117*4882a593Smuzhiyun static struct shash_alg poly1305_alg = {
118*4882a593Smuzhiyun 	.digestsize	= POLY1305_DIGEST_SIZE,
119*4882a593Smuzhiyun 	.init		= crypto_poly1305_init,
120*4882a593Smuzhiyun 	.update		= crypto_poly1305_update,
121*4882a593Smuzhiyun 	.final		= crypto_poly1305_final,
122*4882a593Smuzhiyun 	.descsize	= sizeof(struct poly1305_desc_ctx),
123*4882a593Smuzhiyun 	.base		= {
124*4882a593Smuzhiyun 		.cra_name		= "poly1305",
125*4882a593Smuzhiyun 		.cra_driver_name	= "poly1305-generic",
126*4882a593Smuzhiyun 		.cra_priority		= 100,
127*4882a593Smuzhiyun 		.cra_blocksize		= POLY1305_BLOCK_SIZE,
128*4882a593Smuzhiyun 		.cra_module		= THIS_MODULE,
129*4882a593Smuzhiyun 	},
130*4882a593Smuzhiyun };
131*4882a593Smuzhiyun 
poly1305_mod_init(void)132*4882a593Smuzhiyun static int __init poly1305_mod_init(void)
133*4882a593Smuzhiyun {
134*4882a593Smuzhiyun 	return crypto_register_shash(&poly1305_alg);
135*4882a593Smuzhiyun }
136*4882a593Smuzhiyun 
poly1305_mod_exit(void)137*4882a593Smuzhiyun static void __exit poly1305_mod_exit(void)
138*4882a593Smuzhiyun {
139*4882a593Smuzhiyun 	crypto_unregister_shash(&poly1305_alg);
140*4882a593Smuzhiyun }
141*4882a593Smuzhiyun 
142*4882a593Smuzhiyun subsys_initcall(poly1305_mod_init);
143*4882a593Smuzhiyun module_exit(poly1305_mod_exit);
144*4882a593Smuzhiyun 
145*4882a593Smuzhiyun MODULE_LICENSE("GPL");
146*4882a593Smuzhiyun MODULE_AUTHOR("Martin Willi <martin@strongswan.org>");
147*4882a593Smuzhiyun MODULE_DESCRIPTION("Poly1305 authenticator");
148*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("poly1305");
149*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("poly1305-generic");
150