162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * x64 SIMD accelerated ChaCha and XChaCha stream ciphers, 462306a36Sopenharmony_ci * including ChaCha20 (RFC7539) 562306a36Sopenharmony_ci * 662306a36Sopenharmony_ci * Copyright (C) 2015 Martin Willi 762306a36Sopenharmony_ci */ 862306a36Sopenharmony_ci 962306a36Sopenharmony_ci#include <crypto/algapi.h> 1062306a36Sopenharmony_ci#include <crypto/internal/chacha.h> 1162306a36Sopenharmony_ci#include <crypto/internal/simd.h> 1262306a36Sopenharmony_ci#include <crypto/internal/skcipher.h> 1362306a36Sopenharmony_ci#include <linux/kernel.h> 1462306a36Sopenharmony_ci#include <linux/module.h> 1562306a36Sopenharmony_ci#include <linux/sizes.h> 1662306a36Sopenharmony_ci#include <asm/simd.h> 1762306a36Sopenharmony_ci 1862306a36Sopenharmony_ciasmlinkage void chacha_block_xor_ssse3(u32 *state, u8 *dst, const u8 *src, 1962306a36Sopenharmony_ci unsigned int len, int nrounds); 2062306a36Sopenharmony_ciasmlinkage void chacha_4block_xor_ssse3(u32 *state, u8 *dst, const u8 *src, 2162306a36Sopenharmony_ci unsigned int len, int nrounds); 2262306a36Sopenharmony_ciasmlinkage void hchacha_block_ssse3(const u32 *state, u32 *out, int nrounds); 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_ciasmlinkage void chacha_2block_xor_avx2(u32 *state, u8 *dst, const u8 *src, 2562306a36Sopenharmony_ci unsigned int len, int nrounds); 2662306a36Sopenharmony_ciasmlinkage void chacha_4block_xor_avx2(u32 *state, u8 *dst, const u8 *src, 2762306a36Sopenharmony_ci unsigned int len, int nrounds); 2862306a36Sopenharmony_ciasmlinkage void chacha_8block_xor_avx2(u32 *state, u8 *dst, const u8 *src, 2962306a36Sopenharmony_ci unsigned int len, int nrounds); 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_ciasmlinkage void chacha_2block_xor_avx512vl(u32 *state, u8 *dst, const u8 *src, 3262306a36Sopenharmony_ci unsigned int len, int nrounds); 3362306a36Sopenharmony_ciasmlinkage void chacha_4block_xor_avx512vl(u32 *state, u8 *dst, const u8 *src, 3462306a36Sopenharmony_ci unsigned int len, int nrounds); 3562306a36Sopenharmony_ciasmlinkage void chacha_8block_xor_avx512vl(u32 *state, u8 *dst, const u8 *src, 3662306a36Sopenharmony_ci unsigned int len, int nrounds); 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_cistatic __ro_after_init DEFINE_STATIC_KEY_FALSE(chacha_use_simd); 3962306a36Sopenharmony_cistatic __ro_after_init DEFINE_STATIC_KEY_FALSE(chacha_use_avx2); 4062306a36Sopenharmony_cistatic __ro_after_init DEFINE_STATIC_KEY_FALSE(chacha_use_avx512vl); 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_cistatic unsigned int chacha_advance(unsigned int len, unsigned int maxblocks) 4362306a36Sopenharmony_ci{ 4462306a36Sopenharmony_ci len = min(len, maxblocks * CHACHA_BLOCK_SIZE); 4562306a36Sopenharmony_ci return round_up(len, CHACHA_BLOCK_SIZE) / CHACHA_BLOCK_SIZE; 4662306a36Sopenharmony_ci} 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_cistatic void chacha_dosimd(u32 *state, u8 *dst, const u8 *src, 4962306a36Sopenharmony_ci unsigned int bytes, int nrounds) 5062306a36Sopenharmony_ci{ 5162306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_AS_AVX512) && 5262306a36Sopenharmony_ci static_branch_likely(&chacha_use_avx512vl)) { 5362306a36Sopenharmony_ci while (bytes >= CHACHA_BLOCK_SIZE * 8) { 5462306a36Sopenharmony_ci chacha_8block_xor_avx512vl(state, dst, src, bytes, 5562306a36Sopenharmony_ci nrounds); 5662306a36Sopenharmony_ci bytes -= CHACHA_BLOCK_SIZE * 8; 5762306a36Sopenharmony_ci src += CHACHA_BLOCK_SIZE * 8; 5862306a36Sopenharmony_ci dst += CHACHA_BLOCK_SIZE * 8; 5962306a36Sopenharmony_ci state[12] += 8; 6062306a36Sopenharmony_ci } 6162306a36Sopenharmony_ci if (bytes > CHACHA_BLOCK_SIZE * 4) { 6262306a36Sopenharmony_ci chacha_8block_xor_avx512vl(state, dst, src, bytes, 6362306a36Sopenharmony_ci nrounds); 6462306a36Sopenharmony_ci state[12] += chacha_advance(bytes, 8); 6562306a36Sopenharmony_ci return; 6662306a36Sopenharmony_ci } 6762306a36Sopenharmony_ci if (bytes > CHACHA_BLOCK_SIZE * 2) { 6862306a36Sopenharmony_ci chacha_4block_xor_avx512vl(state, dst, src, bytes, 6962306a36Sopenharmony_ci nrounds); 7062306a36Sopenharmony_ci state[12] += chacha_advance(bytes, 4); 7162306a36Sopenharmony_ci return; 7262306a36Sopenharmony_ci } 7362306a36Sopenharmony_ci if (bytes) { 7462306a36Sopenharmony_ci chacha_2block_xor_avx512vl(state, dst, src, bytes, 7562306a36Sopenharmony_ci nrounds); 7662306a36Sopenharmony_ci state[12] += chacha_advance(bytes, 2); 7762306a36Sopenharmony_ci return; 7862306a36Sopenharmony_ci } 7962306a36Sopenharmony_ci } 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci if (static_branch_likely(&chacha_use_avx2)) { 8262306a36Sopenharmony_ci while (bytes >= CHACHA_BLOCK_SIZE * 8) { 8362306a36Sopenharmony_ci chacha_8block_xor_avx2(state, dst, src, bytes, nrounds); 8462306a36Sopenharmony_ci bytes -= CHACHA_BLOCK_SIZE * 8; 8562306a36Sopenharmony_ci src += CHACHA_BLOCK_SIZE * 8; 8662306a36Sopenharmony_ci dst += CHACHA_BLOCK_SIZE * 8; 8762306a36Sopenharmony_ci state[12] += 8; 8862306a36Sopenharmony_ci } 8962306a36Sopenharmony_ci if (bytes > CHACHA_BLOCK_SIZE * 4) { 9062306a36Sopenharmony_ci chacha_8block_xor_avx2(state, dst, src, bytes, nrounds); 9162306a36Sopenharmony_ci state[12] += chacha_advance(bytes, 8); 9262306a36Sopenharmony_ci return; 9362306a36Sopenharmony_ci } 9462306a36Sopenharmony_ci if (bytes > CHACHA_BLOCK_SIZE * 2) { 9562306a36Sopenharmony_ci chacha_4block_xor_avx2(state, dst, src, bytes, nrounds); 9662306a36Sopenharmony_ci state[12] += chacha_advance(bytes, 4); 9762306a36Sopenharmony_ci return; 9862306a36Sopenharmony_ci } 9962306a36Sopenharmony_ci if (bytes > CHACHA_BLOCK_SIZE) { 10062306a36Sopenharmony_ci chacha_2block_xor_avx2(state, dst, src, bytes, nrounds); 10162306a36Sopenharmony_ci state[12] += chacha_advance(bytes, 2); 10262306a36Sopenharmony_ci return; 10362306a36Sopenharmony_ci } 10462306a36Sopenharmony_ci } 10562306a36Sopenharmony_ci 10662306a36Sopenharmony_ci while (bytes >= CHACHA_BLOCK_SIZE * 4) { 10762306a36Sopenharmony_ci chacha_4block_xor_ssse3(state, dst, src, bytes, nrounds); 10862306a36Sopenharmony_ci bytes -= CHACHA_BLOCK_SIZE * 4; 10962306a36Sopenharmony_ci src += CHACHA_BLOCK_SIZE * 4; 11062306a36Sopenharmony_ci dst += CHACHA_BLOCK_SIZE * 4; 11162306a36Sopenharmony_ci state[12] += 4; 11262306a36Sopenharmony_ci } 11362306a36Sopenharmony_ci if (bytes > CHACHA_BLOCK_SIZE) { 11462306a36Sopenharmony_ci chacha_4block_xor_ssse3(state, dst, src, bytes, nrounds); 11562306a36Sopenharmony_ci state[12] += chacha_advance(bytes, 4); 11662306a36Sopenharmony_ci return; 11762306a36Sopenharmony_ci } 11862306a36Sopenharmony_ci if (bytes) { 11962306a36Sopenharmony_ci chacha_block_xor_ssse3(state, dst, src, bytes, nrounds); 12062306a36Sopenharmony_ci state[12]++; 12162306a36Sopenharmony_ci } 12262306a36Sopenharmony_ci} 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_civoid hchacha_block_arch(const u32 *state, u32 *stream, int nrounds) 12562306a36Sopenharmony_ci{ 12662306a36Sopenharmony_ci if (!static_branch_likely(&chacha_use_simd) || !crypto_simd_usable()) { 12762306a36Sopenharmony_ci hchacha_block_generic(state, stream, nrounds); 12862306a36Sopenharmony_ci } else { 12962306a36Sopenharmony_ci kernel_fpu_begin(); 13062306a36Sopenharmony_ci hchacha_block_ssse3(state, stream, nrounds); 13162306a36Sopenharmony_ci kernel_fpu_end(); 13262306a36Sopenharmony_ci } 13362306a36Sopenharmony_ci} 13462306a36Sopenharmony_ciEXPORT_SYMBOL(hchacha_block_arch); 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_civoid chacha_init_arch(u32 *state, const u32 *key, const u8 *iv) 13762306a36Sopenharmony_ci{ 13862306a36Sopenharmony_ci chacha_init_generic(state, key, iv); 13962306a36Sopenharmony_ci} 14062306a36Sopenharmony_ciEXPORT_SYMBOL(chacha_init_arch); 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_civoid chacha_crypt_arch(u32 *state, u8 *dst, const u8 *src, unsigned int bytes, 14362306a36Sopenharmony_ci int nrounds) 14462306a36Sopenharmony_ci{ 14562306a36Sopenharmony_ci if (!static_branch_likely(&chacha_use_simd) || !crypto_simd_usable() || 14662306a36Sopenharmony_ci bytes <= CHACHA_BLOCK_SIZE) 14762306a36Sopenharmony_ci return chacha_crypt_generic(state, dst, src, bytes, nrounds); 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_ci do { 15062306a36Sopenharmony_ci unsigned int todo = min_t(unsigned int, bytes, SZ_4K); 15162306a36Sopenharmony_ci 15262306a36Sopenharmony_ci kernel_fpu_begin(); 15362306a36Sopenharmony_ci chacha_dosimd(state, dst, src, todo, nrounds); 15462306a36Sopenharmony_ci kernel_fpu_end(); 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_ci bytes -= todo; 15762306a36Sopenharmony_ci src += todo; 15862306a36Sopenharmony_ci dst += todo; 15962306a36Sopenharmony_ci } while (bytes); 16062306a36Sopenharmony_ci} 16162306a36Sopenharmony_ciEXPORT_SYMBOL(chacha_crypt_arch); 16262306a36Sopenharmony_ci 16362306a36Sopenharmony_cistatic int chacha_simd_stream_xor(struct skcipher_request *req, 16462306a36Sopenharmony_ci const struct chacha_ctx *ctx, const u8 *iv) 16562306a36Sopenharmony_ci{ 16662306a36Sopenharmony_ci u32 state[CHACHA_STATE_WORDS] __aligned(8); 16762306a36Sopenharmony_ci struct skcipher_walk walk; 16862306a36Sopenharmony_ci int err; 16962306a36Sopenharmony_ci 17062306a36Sopenharmony_ci err = skcipher_walk_virt(&walk, req, false); 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_ci chacha_init_generic(state, ctx->key, iv); 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci while (walk.nbytes > 0) { 17562306a36Sopenharmony_ci unsigned int nbytes = walk.nbytes; 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_ci if (nbytes < walk.total) 17862306a36Sopenharmony_ci nbytes = round_down(nbytes, walk.stride); 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci if (!static_branch_likely(&chacha_use_simd) || 18162306a36Sopenharmony_ci !crypto_simd_usable()) { 18262306a36Sopenharmony_ci chacha_crypt_generic(state, walk.dst.virt.addr, 18362306a36Sopenharmony_ci walk.src.virt.addr, nbytes, 18462306a36Sopenharmony_ci ctx->nrounds); 18562306a36Sopenharmony_ci } else { 18662306a36Sopenharmony_ci kernel_fpu_begin(); 18762306a36Sopenharmony_ci chacha_dosimd(state, walk.dst.virt.addr, 18862306a36Sopenharmony_ci walk.src.virt.addr, nbytes, 18962306a36Sopenharmony_ci ctx->nrounds); 19062306a36Sopenharmony_ci kernel_fpu_end(); 19162306a36Sopenharmony_ci } 19262306a36Sopenharmony_ci err = skcipher_walk_done(&walk, walk.nbytes - nbytes); 19362306a36Sopenharmony_ci } 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci return err; 19662306a36Sopenharmony_ci} 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_cistatic int chacha_simd(struct skcipher_request *req) 19962306a36Sopenharmony_ci{ 20062306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 20162306a36Sopenharmony_ci struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm); 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_ci return chacha_simd_stream_xor(req, ctx, req->iv); 20462306a36Sopenharmony_ci} 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_cistatic int xchacha_simd(struct skcipher_request *req) 20762306a36Sopenharmony_ci{ 20862306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 20962306a36Sopenharmony_ci struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm); 21062306a36Sopenharmony_ci u32 state[CHACHA_STATE_WORDS] __aligned(8); 21162306a36Sopenharmony_ci struct chacha_ctx subctx; 21262306a36Sopenharmony_ci u8 real_iv[16]; 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_ci chacha_init_generic(state, ctx->key, req->iv); 21562306a36Sopenharmony_ci 21662306a36Sopenharmony_ci if (req->cryptlen > CHACHA_BLOCK_SIZE && crypto_simd_usable()) { 21762306a36Sopenharmony_ci kernel_fpu_begin(); 21862306a36Sopenharmony_ci hchacha_block_ssse3(state, subctx.key, ctx->nrounds); 21962306a36Sopenharmony_ci kernel_fpu_end(); 22062306a36Sopenharmony_ci } else { 22162306a36Sopenharmony_ci hchacha_block_generic(state, subctx.key, ctx->nrounds); 22262306a36Sopenharmony_ci } 22362306a36Sopenharmony_ci subctx.nrounds = ctx->nrounds; 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ci memcpy(&real_iv[0], req->iv + 24, 8); 22662306a36Sopenharmony_ci memcpy(&real_iv[8], req->iv + 16, 8); 22762306a36Sopenharmony_ci return chacha_simd_stream_xor(req, &subctx, real_iv); 22862306a36Sopenharmony_ci} 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_cistatic struct skcipher_alg algs[] = { 23162306a36Sopenharmony_ci { 23262306a36Sopenharmony_ci .base.cra_name = "chacha20", 23362306a36Sopenharmony_ci .base.cra_driver_name = "chacha20-simd", 23462306a36Sopenharmony_ci .base.cra_priority = 300, 23562306a36Sopenharmony_ci .base.cra_blocksize = 1, 23662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 23762306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 23862306a36Sopenharmony_ci 23962306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 24062306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 24162306a36Sopenharmony_ci .ivsize = CHACHA_IV_SIZE, 24262306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 24362306a36Sopenharmony_ci .setkey = chacha20_setkey, 24462306a36Sopenharmony_ci .encrypt = chacha_simd, 24562306a36Sopenharmony_ci .decrypt = chacha_simd, 24662306a36Sopenharmony_ci }, { 24762306a36Sopenharmony_ci .base.cra_name = "xchacha20", 24862306a36Sopenharmony_ci .base.cra_driver_name = "xchacha20-simd", 24962306a36Sopenharmony_ci .base.cra_priority = 300, 25062306a36Sopenharmony_ci .base.cra_blocksize = 1, 25162306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 25262306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 25562306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 25662306a36Sopenharmony_ci .ivsize = XCHACHA_IV_SIZE, 25762306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 25862306a36Sopenharmony_ci .setkey = chacha20_setkey, 25962306a36Sopenharmony_ci .encrypt = xchacha_simd, 26062306a36Sopenharmony_ci .decrypt = xchacha_simd, 26162306a36Sopenharmony_ci }, { 26262306a36Sopenharmony_ci .base.cra_name = "xchacha12", 26362306a36Sopenharmony_ci .base.cra_driver_name = "xchacha12-simd", 26462306a36Sopenharmony_ci .base.cra_priority = 300, 26562306a36Sopenharmony_ci .base.cra_blocksize = 1, 26662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct chacha_ctx), 26762306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 26862306a36Sopenharmony_ci 26962306a36Sopenharmony_ci .min_keysize = CHACHA_KEY_SIZE, 27062306a36Sopenharmony_ci .max_keysize = CHACHA_KEY_SIZE, 27162306a36Sopenharmony_ci .ivsize = XCHACHA_IV_SIZE, 27262306a36Sopenharmony_ci .chunksize = CHACHA_BLOCK_SIZE, 27362306a36Sopenharmony_ci .setkey = chacha12_setkey, 27462306a36Sopenharmony_ci .encrypt = xchacha_simd, 27562306a36Sopenharmony_ci .decrypt = xchacha_simd, 27662306a36Sopenharmony_ci }, 27762306a36Sopenharmony_ci}; 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_cistatic int __init chacha_simd_mod_init(void) 28062306a36Sopenharmony_ci{ 28162306a36Sopenharmony_ci if (!boot_cpu_has(X86_FEATURE_SSSE3)) 28262306a36Sopenharmony_ci return 0; 28362306a36Sopenharmony_ci 28462306a36Sopenharmony_ci static_branch_enable(&chacha_use_simd); 28562306a36Sopenharmony_ci 28662306a36Sopenharmony_ci if (boot_cpu_has(X86_FEATURE_AVX) && 28762306a36Sopenharmony_ci boot_cpu_has(X86_FEATURE_AVX2) && 28862306a36Sopenharmony_ci cpu_has_xfeatures(XFEATURE_MASK_SSE | XFEATURE_MASK_YMM, NULL)) { 28962306a36Sopenharmony_ci static_branch_enable(&chacha_use_avx2); 29062306a36Sopenharmony_ci 29162306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_AS_AVX512) && 29262306a36Sopenharmony_ci boot_cpu_has(X86_FEATURE_AVX512VL) && 29362306a36Sopenharmony_ci boot_cpu_has(X86_FEATURE_AVX512BW)) /* kmovq */ 29462306a36Sopenharmony_ci static_branch_enable(&chacha_use_avx512vl); 29562306a36Sopenharmony_ci } 29662306a36Sopenharmony_ci return IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER) ? 29762306a36Sopenharmony_ci crypto_register_skciphers(algs, ARRAY_SIZE(algs)) : 0; 29862306a36Sopenharmony_ci} 29962306a36Sopenharmony_ci 30062306a36Sopenharmony_cistatic void __exit chacha_simd_mod_fini(void) 30162306a36Sopenharmony_ci{ 30262306a36Sopenharmony_ci if (IS_REACHABLE(CONFIG_CRYPTO_SKCIPHER) && boot_cpu_has(X86_FEATURE_SSSE3)) 30362306a36Sopenharmony_ci crypto_unregister_skciphers(algs, ARRAY_SIZE(algs)); 30462306a36Sopenharmony_ci} 30562306a36Sopenharmony_ci 30662306a36Sopenharmony_cimodule_init(chacha_simd_mod_init); 30762306a36Sopenharmony_cimodule_exit(chacha_simd_mod_fini); 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 31062306a36Sopenharmony_ciMODULE_AUTHOR("Martin Willi <martin@strongswan.org>"); 31162306a36Sopenharmony_ciMODULE_DESCRIPTION("ChaCha and XChaCha stream ciphers (x64 SIMD accelerated)"); 31262306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("chacha20"); 31362306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("chacha20-simd"); 31462306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha20"); 31562306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha20-simd"); 31662306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha12"); 31762306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("xchacha12-simd"); 318