162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * MIPS accelerated ChaCha and XChaCha stream ciphers, 462306a36Sopenharmony_ci * including ChaCha20 (RFC7539) 562306a36Sopenharmony_ci * 662306a36Sopenharmony_ci * Copyright (C) 2019 Linaro, Ltd. <ard.biesheuvel@linaro.org> 762306a36Sopenharmony_ci */ 862306a36Sopenharmony_ci 962306a36Sopenharmony_ci#include <asm/byteorder.h> 1062306a36Sopenharmony_ci#include <crypto/algapi.h> 1162306a36Sopenharmony_ci#include <crypto/internal/chacha.h> 1262306a36Sopenharmony_ci#include <crypto/internal/skcipher.h> 1362306a36Sopenharmony_ci#include <linux/kernel.h> 1462306a36Sopenharmony_ci#include <linux/module.h> 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_ciasmlinkage void chacha_crypt_arch(u32 *state, u8 *dst, const u8 *src, 1762306a36Sopenharmony_ci unsigned int bytes, int nrounds); 1862306a36Sopenharmony_ciEXPORT_SYMBOL(chacha_crypt_arch); 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ciasmlinkage void hchacha_block_arch(const u32 *state, u32 *stream, int nrounds); 2162306a36Sopenharmony_ciEXPORT_SYMBOL(hchacha_block_arch); 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_civoid chacha_init_arch(u32 *state, const u32 *key, const u8 *iv) 2462306a36Sopenharmony_ci{ 2562306a36Sopenharmony_ci chacha_init_generic(state, key, iv); 2662306a36Sopenharmony_ci} 2762306a36Sopenharmony_ciEXPORT_SYMBOL(chacha_init_arch); 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_cistatic int chacha_mips_stream_xor(struct skcipher_request *req, 3062306a36Sopenharmony_ci const struct chacha_ctx *ctx, const u8 *iv) 3162306a36Sopenharmony_ci{ 3262306a36Sopenharmony_ci struct skcipher_walk walk; 3362306a36Sopenharmony_ci u32 state[16]; 3462306a36Sopenharmony_ci int err; 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_ci err = skcipher_walk_virt(&walk, req, false); 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_ci chacha_init_generic(state, ctx->key, iv); 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_ci while (walk.nbytes > 0) { 4162306a36Sopenharmony_ci unsigned int nbytes = walk.nbytes; 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_ci if (nbytes < walk.total) 4462306a36Sopenharmony_ci nbytes = round_down(nbytes, walk.stride); 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_ci chacha_crypt(state, walk.dst.virt.addr, walk.src.virt.addr, 4762306a36Sopenharmony_ci nbytes, ctx->nrounds); 4862306a36Sopenharmony_ci err = skcipher_walk_done(&walk, walk.nbytes - nbytes); 4962306a36Sopenharmony_ci } 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_ci return err; 5262306a36Sopenharmony_ci} 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_cistatic int chacha_mips(struct skcipher_request *req) 5562306a36Sopenharmony_ci{ 5662306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 5762306a36Sopenharmony_ci struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm); 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_ci return chacha_mips_stream_xor(req, ctx, req->iv); 6062306a36Sopenharmony_ci} 6162306a36Sopenharmony_ci 6262306a36Sopenharmony_cistatic int xchacha_mips(struct skcipher_request *req) 6362306a36Sopenharmony_ci{ 6462306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 6562306a36Sopenharmony_ci struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm); 6662306a36Sopenharmony_ci struct chacha_ctx subctx; 6762306a36Sopenharmony_ci u32 state[16]; 6862306a36Sopenharmony_ci u8 real_iv[16]; 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci chacha_init_generic(state, ctx->key, req->iv); 7162306a36Sopenharmony_ci 7262306a36Sopenharmony_ci hchacha_block(state, subctx.key, ctx->nrounds); 7362306a36Sopenharmony_ci subctx.nrounds = ctx->nrounds; 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci memcpy(&real_iv[0], req->iv + 24, 8); 7662306a36Sopenharmony_ci memcpy(&real_iv[8], req->iv + 16, 8); 7762306a36Sopenharmony_ci return chacha_mips_stream_xor(req, &subctx, real_iv); 7862306a36Sopenharmony_ci} 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_cistatic struct skcipher_alg algs[] = { 8162306a36Sopenharmony_ci { 8262306a36Sopenharmony_ci .base.cra_name = "chacha20", 8362306a36Sopenharmony_ci .base.cra_driver_name = "chacha20-mips", 8462306a36Sopenharmony_ci .base.cra_priority = 200, 8562306a36Sopenharmony_ci .base.cra_blocksize = 1, 8662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 8762306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 9062306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 9162306a36Sopenharmony_ci .ivsize = CHACHA_IV_SIZE, 9262306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 9362306a36Sopenharmony_ci .setkey = chacha20_setkey, 9462306a36Sopenharmony_ci .encrypt = chacha_mips, 9562306a36Sopenharmony_ci .decrypt = chacha_mips, 9662306a36Sopenharmony_ci }, { 9762306a36Sopenharmony_ci .base.cra_name = "xchacha20", 9862306a36Sopenharmony_ci .base.cra_driver_name = "xchacha20-mips", 9962306a36Sopenharmony_ci .base.cra_priority = 200, 10062306a36Sopenharmony_ci .base.cra_blocksize = 1, 10162306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 10262306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 10562306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 10662306a36Sopenharmony_ci .ivsize = XCHACHA_IV_SIZE, 10762306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 10862306a36Sopenharmony_ci .setkey = chacha20_setkey, 10962306a36Sopenharmony_ci .encrypt = xchacha_mips, 11062306a36Sopenharmony_ci .decrypt = xchacha_mips, 11162306a36Sopenharmony_ci }, { 11262306a36Sopenharmony_ci .base.cra_name = "xchacha12", 11362306a36Sopenharmony_ci .base.cra_driver_name = "xchacha12-mips", 11462306a36Sopenharmony_ci .base.cra_priority = 200, 11562306a36Sopenharmony_ci .base.cra_blocksize = 1, 11662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 11762306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 12062306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 12162306a36Sopenharmony_ci .ivsize = XCHACHA_IV_SIZE, 12262306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 12362306a36Sopenharmony_ci .setkey = chacha12_setkey, 12462306a36Sopenharmony_ci .encrypt = xchacha_mips, 12562306a36Sopenharmony_ci .decrypt = xchacha_mips, 12662306a36Sopenharmony_ci } 12762306a36Sopenharmony_ci}; 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_cistatic int __init chacha_simd_mod_init(void) 13062306a36Sopenharmony_ci{ 13162306a36Sopenharmony_ci return IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER) ? 13262306a36Sopenharmony_ci crypto_register_skciphers(algs, ARRAY_SIZE(algs)) : 0; 13362306a36Sopenharmony_ci} 13462306a36Sopenharmony_ci 13562306a36Sopenharmony_cistatic void __exit chacha_simd_mod_fini(void) 13662306a36Sopenharmony_ci{ 13762306a36Sopenharmony_ci if (IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER)) 13862306a36Sopenharmony_ci crypto_unregister_skciphers(algs, ARRAY_SIZE(algs)); 13962306a36Sopenharmony_ci} 14062306a36Sopenharmony_ci 14162306a36Sopenharmony_cimodule_init(chacha_simd_mod_init); 14262306a36Sopenharmony_cimodule_exit(chacha_simd_mod_fini); 14362306a36Sopenharmony_ci 14462306a36Sopenharmony_ciMODULE_DESCRIPTION("ChaCha and XChaCha stream ciphers (MIPS accelerated)"); 14562306a36Sopenharmony_ciMODULE_AUTHOR("Ard Biesheuvel <ard.biesheuvel@linaro.org>"); 14662306a36Sopenharmony_ciMODULE_LICENSE("GPL v2"); 14762306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("chacha20"); 14862306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("chacha20-mips"); 14962306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha20"); 15062306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha20-mips"); 15162306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha12"); 15262306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha12-mips"); 153