mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-16 14:36:42 +07:00
876e9f0c12
The LRW template now wraps an ECB mode algorithm rather than the block cipher directly. Therefore it is now redundant for crypto modules to wrap their ECB code with generic LRW code themselves via lrw_crypt(). Remove the lrw-twofish-avx algorithm which did this. Users who request lrw(twofish) and previously would have gotten lrw-twofish-avx will now get lrw(ecb-twofish-avx) instead, which is just as fast. Signed-off-by: Eric Biggers <ebiggers@google.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
444 lines
12 KiB
C
444 lines
12 KiB
C
/*
|
|
* Glue Code for AVX assembler version of Twofish Cipher
|
|
*
|
|
* Copyright (C) 2012 Johannes Goetzfried
|
|
* <Johannes.Goetzfried@informatik.stud.uni-erlangen.de>
|
|
*
|
|
* Copyright © 2013 Jussi Kivilinna <jussi.kivilinna@iki.fi>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
|
* USA
|
|
*
|
|
*/
|
|
|
|
#include <linux/module.h>
|
|
#include <linux/hardirq.h>
|
|
#include <linux/types.h>
|
|
#include <linux/crypto.h>
|
|
#include <linux/err.h>
|
|
#include <crypto/ablk_helper.h>
|
|
#include <crypto/algapi.h>
|
|
#include <crypto/twofish.h>
|
|
#include <crypto/cryptd.h>
|
|
#include <crypto/b128ops.h>
|
|
#include <crypto/ctr.h>
|
|
#include <crypto/xts.h>
|
|
#include <asm/fpu/api.h>
|
|
#include <asm/crypto/twofish.h>
|
|
#include <asm/crypto/glue_helper.h>
|
|
#include <crypto/scatterwalk.h>
|
|
#include <linux/workqueue.h>
|
|
#include <linux/spinlock.h>
|
|
|
|
#define TWOFISH_PARALLEL_BLOCKS 8
|
|
|
|
/* 8-way parallel cipher functions */
|
|
asmlinkage void twofish_ecb_enc_8way(struct twofish_ctx *ctx, u8 *dst,
|
|
const u8 *src);
|
|
asmlinkage void twofish_ecb_dec_8way(struct twofish_ctx *ctx, u8 *dst,
|
|
const u8 *src);
|
|
|
|
asmlinkage void twofish_cbc_dec_8way(struct twofish_ctx *ctx, u8 *dst,
|
|
const u8 *src);
|
|
asmlinkage void twofish_ctr_8way(struct twofish_ctx *ctx, u8 *dst,
|
|
const u8 *src, le128 *iv);
|
|
|
|
asmlinkage void twofish_xts_enc_8way(struct twofish_ctx *ctx, u8 *dst,
|
|
const u8 *src, le128 *iv);
|
|
asmlinkage void twofish_xts_dec_8way(struct twofish_ctx *ctx, u8 *dst,
|
|
const u8 *src, le128 *iv);
|
|
|
|
static inline void twofish_enc_blk_3way(struct twofish_ctx *ctx, u8 *dst,
|
|
const u8 *src)
|
|
{
|
|
__twofish_enc_blk_3way(ctx, dst, src, false);
|
|
}
|
|
|
|
static void twofish_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv)
|
|
{
|
|
glue_xts_crypt_128bit_one(ctx, dst, src, iv,
|
|
GLUE_FUNC_CAST(twofish_enc_blk));
|
|
}
|
|
|
|
static void twofish_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv)
|
|
{
|
|
glue_xts_crypt_128bit_one(ctx, dst, src, iv,
|
|
GLUE_FUNC_CAST(twofish_dec_blk));
|
|
}
|
|
|
|
struct twofish_xts_ctx {
|
|
struct twofish_ctx tweak_ctx;
|
|
struct twofish_ctx crypt_ctx;
|
|
};
|
|
|
|
static int xts_twofish_setkey(struct crypto_tfm *tfm, const u8 *key,
|
|
unsigned int keylen)
|
|
{
|
|
struct twofish_xts_ctx *ctx = crypto_tfm_ctx(tfm);
|
|
u32 *flags = &tfm->crt_flags;
|
|
int err;
|
|
|
|
err = xts_check_key(tfm, key, keylen);
|
|
if (err)
|
|
return err;
|
|
|
|
/* first half of xts-key is for crypt */
|
|
err = __twofish_setkey(&ctx->crypt_ctx, key, keylen / 2, flags);
|
|
if (err)
|
|
return err;
|
|
|
|
/* second half of xts-key is for tweak */
|
|
return __twofish_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2,
|
|
flags);
|
|
}
|
|
|
|
static const struct common_glue_ctx twofish_enc = {
|
|
.num_funcs = 3,
|
|
.fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
|
|
|
|
.funcs = { {
|
|
.num_blocks = TWOFISH_PARALLEL_BLOCKS,
|
|
.fn_u = { .ecb = GLUE_FUNC_CAST(twofish_ecb_enc_8way) }
|
|
}, {
|
|
.num_blocks = 3,
|
|
.fn_u = { .ecb = GLUE_FUNC_CAST(twofish_enc_blk_3way) }
|
|
}, {
|
|
.num_blocks = 1,
|
|
.fn_u = { .ecb = GLUE_FUNC_CAST(twofish_enc_blk) }
|
|
} }
|
|
};
|
|
|
|
static const struct common_glue_ctx twofish_ctr = {
|
|
.num_funcs = 3,
|
|
.fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
|
|
|
|
.funcs = { {
|
|
.num_blocks = TWOFISH_PARALLEL_BLOCKS,
|
|
.fn_u = { .ctr = GLUE_CTR_FUNC_CAST(twofish_ctr_8way) }
|
|
}, {
|
|
.num_blocks = 3,
|
|
.fn_u = { .ctr = GLUE_CTR_FUNC_CAST(twofish_enc_blk_ctr_3way) }
|
|
}, {
|
|
.num_blocks = 1,
|
|
.fn_u = { .ctr = GLUE_CTR_FUNC_CAST(twofish_enc_blk_ctr) }
|
|
} }
|
|
};
|
|
|
|
static const struct common_glue_ctx twofish_enc_xts = {
|
|
.num_funcs = 2,
|
|
.fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
|
|
|
|
.funcs = { {
|
|
.num_blocks = TWOFISH_PARALLEL_BLOCKS,
|
|
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(twofish_xts_enc_8way) }
|
|
}, {
|
|
.num_blocks = 1,
|
|
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(twofish_xts_enc) }
|
|
} }
|
|
};
|
|
|
|
static const struct common_glue_ctx twofish_dec = {
|
|
.num_funcs = 3,
|
|
.fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
|
|
|
|
.funcs = { {
|
|
.num_blocks = TWOFISH_PARALLEL_BLOCKS,
|
|
.fn_u = { .ecb = GLUE_FUNC_CAST(twofish_ecb_dec_8way) }
|
|
}, {
|
|
.num_blocks = 3,
|
|
.fn_u = { .ecb = GLUE_FUNC_CAST(twofish_dec_blk_3way) }
|
|
}, {
|
|
.num_blocks = 1,
|
|
.fn_u = { .ecb = GLUE_FUNC_CAST(twofish_dec_blk) }
|
|
} }
|
|
};
|
|
|
|
static const struct common_glue_ctx twofish_dec_cbc = {
|
|
.num_funcs = 3,
|
|
.fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
|
|
|
|
.funcs = { {
|
|
.num_blocks = TWOFISH_PARALLEL_BLOCKS,
|
|
.fn_u = { .cbc = GLUE_CBC_FUNC_CAST(twofish_cbc_dec_8way) }
|
|
}, {
|
|
.num_blocks = 3,
|
|
.fn_u = { .cbc = GLUE_CBC_FUNC_CAST(twofish_dec_blk_cbc_3way) }
|
|
}, {
|
|
.num_blocks = 1,
|
|
.fn_u = { .cbc = GLUE_CBC_FUNC_CAST(twofish_dec_blk) }
|
|
} }
|
|
};
|
|
|
|
static const struct common_glue_ctx twofish_dec_xts = {
|
|
.num_funcs = 2,
|
|
.fpu_blocks_limit = TWOFISH_PARALLEL_BLOCKS,
|
|
|
|
.funcs = { {
|
|
.num_blocks = TWOFISH_PARALLEL_BLOCKS,
|
|
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(twofish_xts_dec_8way) }
|
|
}, {
|
|
.num_blocks = 1,
|
|
.fn_u = { .xts = GLUE_XTS_FUNC_CAST(twofish_xts_dec) }
|
|
} }
|
|
};
|
|
|
|
static int ecb_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
|
|
struct scatterlist *src, unsigned int nbytes)
|
|
{
|
|
return glue_ecb_crypt_128bit(&twofish_enc, desc, dst, src, nbytes);
|
|
}
|
|
|
|
static int ecb_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
|
|
struct scatterlist *src, unsigned int nbytes)
|
|
{
|
|
return glue_ecb_crypt_128bit(&twofish_dec, desc, dst, src, nbytes);
|
|
}
|
|
|
|
static int cbc_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
|
|
struct scatterlist *src, unsigned int nbytes)
|
|
{
|
|
return glue_cbc_encrypt_128bit(GLUE_FUNC_CAST(twofish_enc_blk), desc,
|
|
dst, src, nbytes);
|
|
}
|
|
|
|
static int cbc_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
|
|
struct scatterlist *src, unsigned int nbytes)
|
|
{
|
|
return glue_cbc_decrypt_128bit(&twofish_dec_cbc, desc, dst, src,
|
|
nbytes);
|
|
}
|
|
|
|
static int ctr_crypt(struct blkcipher_desc *desc, struct scatterlist *dst,
|
|
struct scatterlist *src, unsigned int nbytes)
|
|
{
|
|
return glue_ctr_crypt_128bit(&twofish_ctr, desc, dst, src, nbytes);
|
|
}
|
|
|
|
static int xts_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
|
|
struct scatterlist *src, unsigned int nbytes)
|
|
{
|
|
struct twofish_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
|
|
|
|
return glue_xts_crypt_128bit(&twofish_enc_xts, desc, dst, src, nbytes,
|
|
XTS_TWEAK_CAST(twofish_enc_blk),
|
|
&ctx->tweak_ctx, &ctx->crypt_ctx);
|
|
}
|
|
|
|
static int xts_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
|
|
struct scatterlist *src, unsigned int nbytes)
|
|
{
|
|
struct twofish_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
|
|
|
|
return glue_xts_crypt_128bit(&twofish_dec_xts, desc, dst, src, nbytes,
|
|
XTS_TWEAK_CAST(twofish_enc_blk),
|
|
&ctx->tweak_ctx, &ctx->crypt_ctx);
|
|
}
|
|
|
|
static struct crypto_alg twofish_algs[] = { {
|
|
.cra_name = "__ecb-twofish-avx",
|
|
.cra_driver_name = "__driver-ecb-twofish-avx",
|
|
.cra_priority = 0,
|
|
.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER |
|
|
CRYPTO_ALG_INTERNAL,
|
|
.cra_blocksize = TF_BLOCK_SIZE,
|
|
.cra_ctxsize = sizeof(struct twofish_ctx),
|
|
.cra_alignmask = 0,
|
|
.cra_type = &crypto_blkcipher_type,
|
|
.cra_module = THIS_MODULE,
|
|
.cra_u = {
|
|
.blkcipher = {
|
|
.min_keysize = TF_MIN_KEY_SIZE,
|
|
.max_keysize = TF_MAX_KEY_SIZE,
|
|
.setkey = twofish_setkey,
|
|
.encrypt = ecb_encrypt,
|
|
.decrypt = ecb_decrypt,
|
|
},
|
|
},
|
|
}, {
|
|
.cra_name = "__cbc-twofish-avx",
|
|
.cra_driver_name = "__driver-cbc-twofish-avx",
|
|
.cra_priority = 0,
|
|
.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER |
|
|
CRYPTO_ALG_INTERNAL,
|
|
.cra_blocksize = TF_BLOCK_SIZE,
|
|
.cra_ctxsize = sizeof(struct twofish_ctx),
|
|
.cra_alignmask = 0,
|
|
.cra_type = &crypto_blkcipher_type,
|
|
.cra_module = THIS_MODULE,
|
|
.cra_u = {
|
|
.blkcipher = {
|
|
.min_keysize = TF_MIN_KEY_SIZE,
|
|
.max_keysize = TF_MAX_KEY_SIZE,
|
|
.setkey = twofish_setkey,
|
|
.encrypt = cbc_encrypt,
|
|
.decrypt = cbc_decrypt,
|
|
},
|
|
},
|
|
}, {
|
|
.cra_name = "__ctr-twofish-avx",
|
|
.cra_driver_name = "__driver-ctr-twofish-avx",
|
|
.cra_priority = 0,
|
|
.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER |
|
|
CRYPTO_ALG_INTERNAL,
|
|
.cra_blocksize = 1,
|
|
.cra_ctxsize = sizeof(struct twofish_ctx),
|
|
.cra_alignmask = 0,
|
|
.cra_type = &crypto_blkcipher_type,
|
|
.cra_module = THIS_MODULE,
|
|
.cra_u = {
|
|
.blkcipher = {
|
|
.min_keysize = TF_MIN_KEY_SIZE,
|
|
.max_keysize = TF_MAX_KEY_SIZE,
|
|
.ivsize = TF_BLOCK_SIZE,
|
|
.setkey = twofish_setkey,
|
|
.encrypt = ctr_crypt,
|
|
.decrypt = ctr_crypt,
|
|
},
|
|
},
|
|
}, {
|
|
.cra_name = "__xts-twofish-avx",
|
|
.cra_driver_name = "__driver-xts-twofish-avx",
|
|
.cra_priority = 0,
|
|
.cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER |
|
|
CRYPTO_ALG_INTERNAL,
|
|
.cra_blocksize = TF_BLOCK_SIZE,
|
|
.cra_ctxsize = sizeof(struct twofish_xts_ctx),
|
|
.cra_alignmask = 0,
|
|
.cra_type = &crypto_blkcipher_type,
|
|
.cra_module = THIS_MODULE,
|
|
.cra_u = {
|
|
.blkcipher = {
|
|
.min_keysize = TF_MIN_KEY_SIZE * 2,
|
|
.max_keysize = TF_MAX_KEY_SIZE * 2,
|
|
.ivsize = TF_BLOCK_SIZE,
|
|
.setkey = xts_twofish_setkey,
|
|
.encrypt = xts_encrypt,
|
|
.decrypt = xts_decrypt,
|
|
},
|
|
},
|
|
}, {
|
|
.cra_name = "ecb(twofish)",
|
|
.cra_driver_name = "ecb-twofish-avx",
|
|
.cra_priority = 400,
|
|
.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
|
|
.cra_blocksize = TF_BLOCK_SIZE,
|
|
.cra_ctxsize = sizeof(struct async_helper_ctx),
|
|
.cra_alignmask = 0,
|
|
.cra_type = &crypto_ablkcipher_type,
|
|
.cra_module = THIS_MODULE,
|
|
.cra_init = ablk_init,
|
|
.cra_exit = ablk_exit,
|
|
.cra_u = {
|
|
.ablkcipher = {
|
|
.min_keysize = TF_MIN_KEY_SIZE,
|
|
.max_keysize = TF_MAX_KEY_SIZE,
|
|
.setkey = ablk_set_key,
|
|
.encrypt = ablk_encrypt,
|
|
.decrypt = ablk_decrypt,
|
|
},
|
|
},
|
|
}, {
|
|
.cra_name = "cbc(twofish)",
|
|
.cra_driver_name = "cbc-twofish-avx",
|
|
.cra_priority = 400,
|
|
.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
|
|
.cra_blocksize = TF_BLOCK_SIZE,
|
|
.cra_ctxsize = sizeof(struct async_helper_ctx),
|
|
.cra_alignmask = 0,
|
|
.cra_type = &crypto_ablkcipher_type,
|
|
.cra_module = THIS_MODULE,
|
|
.cra_init = ablk_init,
|
|
.cra_exit = ablk_exit,
|
|
.cra_u = {
|
|
.ablkcipher = {
|
|
.min_keysize = TF_MIN_KEY_SIZE,
|
|
.max_keysize = TF_MAX_KEY_SIZE,
|
|
.ivsize = TF_BLOCK_SIZE,
|
|
.setkey = ablk_set_key,
|
|
.encrypt = __ablk_encrypt,
|
|
.decrypt = ablk_decrypt,
|
|
},
|
|
},
|
|
}, {
|
|
.cra_name = "ctr(twofish)",
|
|
.cra_driver_name = "ctr-twofish-avx",
|
|
.cra_priority = 400,
|
|
.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
|
|
.cra_blocksize = 1,
|
|
.cra_ctxsize = sizeof(struct async_helper_ctx),
|
|
.cra_alignmask = 0,
|
|
.cra_type = &crypto_ablkcipher_type,
|
|
.cra_module = THIS_MODULE,
|
|
.cra_init = ablk_init,
|
|
.cra_exit = ablk_exit,
|
|
.cra_u = {
|
|
.ablkcipher = {
|
|
.min_keysize = TF_MIN_KEY_SIZE,
|
|
.max_keysize = TF_MAX_KEY_SIZE,
|
|
.ivsize = TF_BLOCK_SIZE,
|
|
.setkey = ablk_set_key,
|
|
.encrypt = ablk_encrypt,
|
|
.decrypt = ablk_encrypt,
|
|
.geniv = "chainiv",
|
|
},
|
|
},
|
|
}, {
|
|
.cra_name = "xts(twofish)",
|
|
.cra_driver_name = "xts-twofish-avx",
|
|
.cra_priority = 400,
|
|
.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
|
|
.cra_blocksize = TF_BLOCK_SIZE,
|
|
.cra_ctxsize = sizeof(struct async_helper_ctx),
|
|
.cra_alignmask = 0,
|
|
.cra_type = &crypto_ablkcipher_type,
|
|
.cra_module = THIS_MODULE,
|
|
.cra_init = ablk_init,
|
|
.cra_exit = ablk_exit,
|
|
.cra_u = {
|
|
.ablkcipher = {
|
|
.min_keysize = TF_MIN_KEY_SIZE * 2,
|
|
.max_keysize = TF_MAX_KEY_SIZE * 2,
|
|
.ivsize = TF_BLOCK_SIZE,
|
|
.setkey = ablk_set_key,
|
|
.encrypt = ablk_encrypt,
|
|
.decrypt = ablk_decrypt,
|
|
},
|
|
},
|
|
} };
|
|
|
|
static int __init twofish_init(void)
|
|
{
|
|
const char *feature_name;
|
|
|
|
if (!cpu_has_xfeatures(XFEATURE_MASK_SSE | XFEATURE_MASK_YMM, &feature_name)) {
|
|
pr_info("CPU feature '%s' is not supported.\n", feature_name);
|
|
return -ENODEV;
|
|
}
|
|
|
|
return crypto_register_algs(twofish_algs, ARRAY_SIZE(twofish_algs));
|
|
}
|
|
|
|
static void __exit twofish_exit(void)
|
|
{
|
|
crypto_unregister_algs(twofish_algs, ARRAY_SIZE(twofish_algs));
|
|
}
|
|
|
|
module_init(twofish_init);
|
|
module_exit(twofish_exit);
|
|
|
|
MODULE_DESCRIPTION("Twofish Cipher Algorithm, AVX optimized");
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_ALIAS_CRYPTO("twofish");
|