162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 OR MIT 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Based on public domain code from Daniel J. Bernstein and Peter Schwabe. This 662306a36Sopenharmony_ci * began from SUPERCOP's curve25519/neon2/scalarmult.s, but has subsequently been 762306a36Sopenharmony_ci * manually reworked for use in kernel space. 862306a36Sopenharmony_ci */ 962306a36Sopenharmony_ci 1062306a36Sopenharmony_ci#include <asm/hwcap.h> 1162306a36Sopenharmony_ci#include <asm/neon.h> 1262306a36Sopenharmony_ci#include <asm/simd.h> 1362306a36Sopenharmony_ci#include <crypto/internal/kpp.h> 1462306a36Sopenharmony_ci#include <crypto/internal/simd.h> 1562306a36Sopenharmony_ci#include <linux/types.h> 1662306a36Sopenharmony_ci#include <linux/module.h> 1762306a36Sopenharmony_ci#include <linux/init.h> 1862306a36Sopenharmony_ci#include <linux/jump_label.h> 1962306a36Sopenharmony_ci#include <linux/scatterlist.h> 2062306a36Sopenharmony_ci#include <crypto/curve25519.h> 2162306a36Sopenharmony_ci 2262306a36Sopenharmony_ciasmlinkage void curve25519_neon(u8 mypublic[CURVE25519_KEY_SIZE], 2362306a36Sopenharmony_ci const u8 secret[CURVE25519_KEY_SIZE], 2462306a36Sopenharmony_ci const u8 basepoint[CURVE25519_KEY_SIZE]); 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_cistatic __ro_after_init DEFINE_STATIC_KEY_FALSE(have_neon); 2762306a36Sopenharmony_ci 2862306a36Sopenharmony_civoid curve25519_arch(u8 out[CURVE25519_KEY_SIZE], 2962306a36Sopenharmony_ci const u8 scalar[CURVE25519_KEY_SIZE], 3062306a36Sopenharmony_ci const u8 point[CURVE25519_KEY_SIZE]) 3162306a36Sopenharmony_ci{ 3262306a36Sopenharmony_ci if (static_branch_likely(&have_neon) && crypto_simd_usable()) { 3362306a36Sopenharmony_ci kernel_neon_begin(); 3462306a36Sopenharmony_ci curve25519_neon(out, scalar, point); 3562306a36Sopenharmony_ci kernel_neon_end(); 3662306a36Sopenharmony_ci } else { 3762306a36Sopenharmony_ci curve25519_generic(out, scalar, point); 3862306a36Sopenharmony_ci } 3962306a36Sopenharmony_ci} 4062306a36Sopenharmony_ciEXPORT_SYMBOL(curve25519_arch); 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_civoid curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE], 4362306a36Sopenharmony_ci const u8 secret[CURVE25519_KEY_SIZE]) 4462306a36Sopenharmony_ci{ 4562306a36Sopenharmony_ci return curve25519_arch(pub, secret, curve25519_base_point); 4662306a36Sopenharmony_ci} 4762306a36Sopenharmony_ciEXPORT_SYMBOL(curve25519_base_arch); 4862306a36Sopenharmony_ci 4962306a36Sopenharmony_cistatic int curve25519_set_secret(struct crypto_kpp *tfm, const void *buf, 5062306a36Sopenharmony_ci unsigned int len) 5162306a36Sopenharmony_ci{ 5262306a36Sopenharmony_ci u8 *secret = kpp_tfm_ctx(tfm); 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_ci if (!len) 5562306a36Sopenharmony_ci curve25519_generate_secret(secret); 5662306a36Sopenharmony_ci else if (len == CURVE25519_KEY_SIZE && 5762306a36Sopenharmony_ci crypto_memneq(buf, curve25519_null_point, CURVE25519_KEY_SIZE)) 5862306a36Sopenharmony_ci memcpy(secret, buf, CURVE25519_KEY_SIZE); 5962306a36Sopenharmony_ci else 6062306a36Sopenharmony_ci return -EINVAL; 6162306a36Sopenharmony_ci return 0; 6262306a36Sopenharmony_ci} 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_cistatic int curve25519_compute_value(struct kpp_request *req) 6562306a36Sopenharmony_ci{ 6662306a36Sopenharmony_ci struct crypto_kpp *tfm = crypto_kpp_reqtfm(req); 6762306a36Sopenharmony_ci const u8 *secret = kpp_tfm_ctx(tfm); 6862306a36Sopenharmony_ci u8 public_key[CURVE25519_KEY_SIZE]; 6962306a36Sopenharmony_ci u8 buf[CURVE25519_KEY_SIZE]; 7062306a36Sopenharmony_ci int copied, nbytes; 7162306a36Sopenharmony_ci u8 const *bp; 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_ci if (req->src) { 7462306a36Sopenharmony_ci copied = sg_copy_to_buffer(req->src, 7562306a36Sopenharmony_ci sg_nents_for_len(req->src, 7662306a36Sopenharmony_ci CURVE25519_KEY_SIZE), 7762306a36Sopenharmony_ci public_key, CURVE25519_KEY_SIZE); 7862306a36Sopenharmony_ci if (copied != CURVE25519_KEY_SIZE) 7962306a36Sopenharmony_ci return -EINVAL; 8062306a36Sopenharmony_ci bp = public_key; 8162306a36Sopenharmony_ci } else { 8262306a36Sopenharmony_ci bp = curve25519_base_point; 8362306a36Sopenharmony_ci } 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_ci curve25519_arch(buf, secret, bp); 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_ci /* might want less than we've got */ 8862306a36Sopenharmony_ci nbytes = min_t(size_t, CURVE25519_KEY_SIZE, req->dst_len); 8962306a36Sopenharmony_ci copied = sg_copy_from_buffer(req->dst, sg_nents_for_len(req->dst, 9062306a36Sopenharmony_ci nbytes), 9162306a36Sopenharmony_ci buf, nbytes); 9262306a36Sopenharmony_ci if (copied != nbytes) 9362306a36Sopenharmony_ci return -EINVAL; 9462306a36Sopenharmony_ci return 0; 9562306a36Sopenharmony_ci} 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_cistatic unsigned int curve25519_max_size(struct crypto_kpp *tfm) 9862306a36Sopenharmony_ci{ 9962306a36Sopenharmony_ci return CURVE25519_KEY_SIZE; 10062306a36Sopenharmony_ci} 10162306a36Sopenharmony_ci 10262306a36Sopenharmony_cistatic struct kpp_alg curve25519_alg = { 10362306a36Sopenharmony_ci .base.cra_name = "curve25519", 10462306a36Sopenharmony_ci .base.cra_driver_name = "curve25519-neon", 10562306a36Sopenharmony_ci .base.cra_priority = 200, 10662306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 10762306a36Sopenharmony_ci .base.cra_ctxsize = CURVE25519_KEY_SIZE, 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_ci .set_secret = curve25519_set_secret, 11062306a36Sopenharmony_ci .generate_public_key = curve25519_compute_value, 11162306a36Sopenharmony_ci .compute_shared_secret = curve25519_compute_value, 11262306a36Sopenharmony_ci .max_size = curve25519_max_size, 11362306a36Sopenharmony_ci}; 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_cistatic int __init arm_curve25519_init(void) 11662306a36Sopenharmony_ci{ 11762306a36Sopenharmony_ci if (elf_hwcap & HWCAP_NEON) { 11862306a36Sopenharmony_ci static_branch_enable(&have_neon); 11962306a36Sopenharmony_ci return IS_REACHABLE(CONFIG_CRYPTO_KPP) ? 12062306a36Sopenharmony_ci crypto_register_kpp(&curve25519_alg) : 0; 12162306a36Sopenharmony_ci } 12262306a36Sopenharmony_ci return 0; 12362306a36Sopenharmony_ci} 12462306a36Sopenharmony_ci 12562306a36Sopenharmony_cistatic void __exit arm_curve25519_exit(void) 12662306a36Sopenharmony_ci{ 12762306a36Sopenharmony_ci if (IS_REACHABLE(CONFIG_CRYPTO_KPP) && elf_hwcap & HWCAP_NEON) 12862306a36Sopenharmony_ci crypto_unregister_kpp(&curve25519_alg); 12962306a36Sopenharmony_ci} 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_cimodule_init(arm_curve25519_init); 13262306a36Sopenharmony_cimodule_exit(arm_curve25519_exit); 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("curve25519"); 13562306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("curve25519-neon"); 13662306a36Sopenharmony_ciMODULE_LICENSE("GPL v2"); 137