162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * The AEGIS-128 Authenticated-Encryption Algorithm 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (c) 2017-2018 Ondrej Mosnacek <omosnacek@gmail.com> 662306a36Sopenharmony_ci * Copyright (C) 2017-2018 Red Hat, Inc. All rights reserved. 762306a36Sopenharmony_ci */ 862306a36Sopenharmony_ci 962306a36Sopenharmony_ci#include <crypto/algapi.h> 1062306a36Sopenharmony_ci#include <crypto/internal/aead.h> 1162306a36Sopenharmony_ci#include <crypto/internal/simd.h> 1262306a36Sopenharmony_ci#include <crypto/internal/skcipher.h> 1362306a36Sopenharmony_ci#include <crypto/scatterwalk.h> 1462306a36Sopenharmony_ci#include <linux/err.h> 1562306a36Sopenharmony_ci#include <linux/init.h> 1662306a36Sopenharmony_ci#include <linux/jump_label.h> 1762306a36Sopenharmony_ci#include <linux/kernel.h> 1862306a36Sopenharmony_ci#include <linux/module.h> 1962306a36Sopenharmony_ci#include <linux/scatterlist.h> 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_ci#include <asm/simd.h> 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_ci#include "aegis.h" 2462306a36Sopenharmony_ci 2562306a36Sopenharmony_ci#define AEGIS128_NONCE_SIZE 16 2662306a36Sopenharmony_ci#define AEGIS128_STATE_BLOCKS 5 2762306a36Sopenharmony_ci#define AEGIS128_KEY_SIZE 16 2862306a36Sopenharmony_ci#define AEGIS128_MIN_AUTH_SIZE 8 2962306a36Sopenharmony_ci#define AEGIS128_MAX_AUTH_SIZE 16 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_cistruct aegis_state { 3262306a36Sopenharmony_ci union aegis_block blocks[AEGIS128_STATE_BLOCKS]; 3362306a36Sopenharmony_ci}; 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_cistruct aegis_ctx { 3662306a36Sopenharmony_ci union aegis_block key; 3762306a36Sopenharmony_ci}; 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_cistatic __ro_after_init DEFINE_STATIC_KEY_FALSE(have_simd); 4062306a36Sopenharmony_ci 4162306a36Sopenharmony_cistatic const union aegis_block crypto_aegis_const[2] = { 4262306a36Sopenharmony_ci { .words64 = { 4362306a36Sopenharmony_ci cpu_to_le64(U64_C(0x0d08050302010100)), 4462306a36Sopenharmony_ci cpu_to_le64(U64_C(0x6279e99059372215)), 4562306a36Sopenharmony_ci } }, 4662306a36Sopenharmony_ci { .words64 = { 4762306a36Sopenharmony_ci cpu_to_le64(U64_C(0xf12fc26d55183ddb)), 4862306a36Sopenharmony_ci cpu_to_le64(U64_C(0xdd28b57342311120)), 4962306a36Sopenharmony_ci } }, 5062306a36Sopenharmony_ci}; 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_cistatic bool aegis128_do_simd(void) 5362306a36Sopenharmony_ci{ 5462306a36Sopenharmony_ci#ifdef CONFIG_CRYPTO_AEGIS128_SIMD 5562306a36Sopenharmony_ci if (static_branch_likely(&have_simd)) 5662306a36Sopenharmony_ci return crypto_simd_usable(); 5762306a36Sopenharmony_ci#endif 5862306a36Sopenharmony_ci return false; 5962306a36Sopenharmony_ci} 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_cistatic void crypto_aegis128_update(struct aegis_state *state) 6262306a36Sopenharmony_ci{ 6362306a36Sopenharmony_ci union aegis_block tmp; 6462306a36Sopenharmony_ci unsigned int i; 6562306a36Sopenharmony_ci 6662306a36Sopenharmony_ci tmp = state->blocks[AEGIS128_STATE_BLOCKS - 1]; 6762306a36Sopenharmony_ci for (i = AEGIS128_STATE_BLOCKS - 1; i > 0; i--) 6862306a36Sopenharmony_ci crypto_aegis_aesenc(&state->blocks[i], &state->blocks[i - 1], 6962306a36Sopenharmony_ci &state->blocks[i]); 7062306a36Sopenharmony_ci crypto_aegis_aesenc(&state->blocks[0], &tmp, &state->blocks[0]); 7162306a36Sopenharmony_ci} 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_cistatic void crypto_aegis128_update_a(struct aegis_state *state, 7462306a36Sopenharmony_ci const union aegis_block *msg, 7562306a36Sopenharmony_ci bool do_simd) 7662306a36Sopenharmony_ci{ 7762306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_CRYPTO_AEGIS128_SIMD) && do_simd) { 7862306a36Sopenharmony_ci crypto_aegis128_update_simd(state, msg); 7962306a36Sopenharmony_ci return; 8062306a36Sopenharmony_ci } 8162306a36Sopenharmony_ci 8262306a36Sopenharmony_ci crypto_aegis128_update(state); 8362306a36Sopenharmony_ci crypto_aegis_block_xor(&state->blocks[0], msg); 8462306a36Sopenharmony_ci} 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_cistatic void crypto_aegis128_update_u(struct aegis_state *state, const void *msg, 8762306a36Sopenharmony_ci bool do_simd) 8862306a36Sopenharmony_ci{ 8962306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_CRYPTO_AEGIS128_SIMD) && do_simd) { 9062306a36Sopenharmony_ci crypto_aegis128_update_simd(state, msg); 9162306a36Sopenharmony_ci return; 9262306a36Sopenharmony_ci } 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_ci crypto_aegis128_update(state); 9562306a36Sopenharmony_ci crypto_xor(state->blocks[0].bytes, msg, AEGIS_BLOCK_SIZE); 9662306a36Sopenharmony_ci} 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_cistatic void crypto_aegis128_init(struct aegis_state *state, 9962306a36Sopenharmony_ci const union aegis_block *key, 10062306a36Sopenharmony_ci const u8 *iv) 10162306a36Sopenharmony_ci{ 10262306a36Sopenharmony_ci union aegis_block key_iv; 10362306a36Sopenharmony_ci unsigned int i; 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci key_iv = *key; 10662306a36Sopenharmony_ci crypto_xor(key_iv.bytes, iv, AEGIS_BLOCK_SIZE); 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_ci state->blocks[0] = key_iv; 10962306a36Sopenharmony_ci state->blocks[1] = crypto_aegis_const[1]; 11062306a36Sopenharmony_ci state->blocks[2] = crypto_aegis_const[0]; 11162306a36Sopenharmony_ci state->blocks[3] = *key; 11262306a36Sopenharmony_ci state->blocks[4] = *key; 11362306a36Sopenharmony_ci 11462306a36Sopenharmony_ci crypto_aegis_block_xor(&state->blocks[3], &crypto_aegis_const[0]); 11562306a36Sopenharmony_ci crypto_aegis_block_xor(&state->blocks[4], &crypto_aegis_const[1]); 11662306a36Sopenharmony_ci 11762306a36Sopenharmony_ci for (i = 0; i < 5; i++) { 11862306a36Sopenharmony_ci crypto_aegis128_update_a(state, key, false); 11962306a36Sopenharmony_ci crypto_aegis128_update_a(state, &key_iv, false); 12062306a36Sopenharmony_ci } 12162306a36Sopenharmony_ci} 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_cistatic void crypto_aegis128_ad(struct aegis_state *state, 12462306a36Sopenharmony_ci const u8 *src, unsigned int size, 12562306a36Sopenharmony_ci bool do_simd) 12662306a36Sopenharmony_ci{ 12762306a36Sopenharmony_ci if (AEGIS_ALIGNED(src)) { 12862306a36Sopenharmony_ci const union aegis_block *src_blk = 12962306a36Sopenharmony_ci (const union aegis_block *)src; 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_ci while (size >= AEGIS_BLOCK_SIZE) { 13262306a36Sopenharmony_ci crypto_aegis128_update_a(state, src_blk, do_simd); 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci size -= AEGIS_BLOCK_SIZE; 13562306a36Sopenharmony_ci src_blk++; 13662306a36Sopenharmony_ci } 13762306a36Sopenharmony_ci } else { 13862306a36Sopenharmony_ci while (size >= AEGIS_BLOCK_SIZE) { 13962306a36Sopenharmony_ci crypto_aegis128_update_u(state, src, do_simd); 14062306a36Sopenharmony_ci 14162306a36Sopenharmony_ci size -= AEGIS_BLOCK_SIZE; 14262306a36Sopenharmony_ci src += AEGIS_BLOCK_SIZE; 14362306a36Sopenharmony_ci } 14462306a36Sopenharmony_ci } 14562306a36Sopenharmony_ci} 14662306a36Sopenharmony_ci 14762306a36Sopenharmony_cistatic void crypto_aegis128_wipe_chunk(struct aegis_state *state, u8 *dst, 14862306a36Sopenharmony_ci const u8 *src, unsigned int size) 14962306a36Sopenharmony_ci{ 15062306a36Sopenharmony_ci memzero_explicit(dst, size); 15162306a36Sopenharmony_ci} 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_cistatic void crypto_aegis128_encrypt_chunk(struct aegis_state *state, u8 *dst, 15462306a36Sopenharmony_ci const u8 *src, unsigned int size) 15562306a36Sopenharmony_ci{ 15662306a36Sopenharmony_ci union aegis_block tmp; 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci if (AEGIS_ALIGNED(src) && AEGIS_ALIGNED(dst)) { 15962306a36Sopenharmony_ci while (size >= AEGIS_BLOCK_SIZE) { 16062306a36Sopenharmony_ci union aegis_block *dst_blk = 16162306a36Sopenharmony_ci (union aegis_block *)dst; 16262306a36Sopenharmony_ci const union aegis_block *src_blk = 16362306a36Sopenharmony_ci (const union aegis_block *)src; 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci tmp = state->blocks[2]; 16662306a36Sopenharmony_ci crypto_aegis_block_and(&tmp, &state->blocks[3]); 16762306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[4]); 16862306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[1]); 16962306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, src_blk); 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_ci crypto_aegis128_update_a(state, src_blk, false); 17262306a36Sopenharmony_ci 17362306a36Sopenharmony_ci *dst_blk = tmp; 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_ci size -= AEGIS_BLOCK_SIZE; 17662306a36Sopenharmony_ci src += AEGIS_BLOCK_SIZE; 17762306a36Sopenharmony_ci dst += AEGIS_BLOCK_SIZE; 17862306a36Sopenharmony_ci } 17962306a36Sopenharmony_ci } else { 18062306a36Sopenharmony_ci while (size >= AEGIS_BLOCK_SIZE) { 18162306a36Sopenharmony_ci tmp = state->blocks[2]; 18262306a36Sopenharmony_ci crypto_aegis_block_and(&tmp, &state->blocks[3]); 18362306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[4]); 18462306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[1]); 18562306a36Sopenharmony_ci crypto_xor(tmp.bytes, src, AEGIS_BLOCK_SIZE); 18662306a36Sopenharmony_ci 18762306a36Sopenharmony_ci crypto_aegis128_update_u(state, src, false); 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_ci memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE); 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_ci size -= AEGIS_BLOCK_SIZE; 19262306a36Sopenharmony_ci src += AEGIS_BLOCK_SIZE; 19362306a36Sopenharmony_ci dst += AEGIS_BLOCK_SIZE; 19462306a36Sopenharmony_ci } 19562306a36Sopenharmony_ci } 19662306a36Sopenharmony_ci 19762306a36Sopenharmony_ci if (size > 0) { 19862306a36Sopenharmony_ci union aegis_block msg = {}; 19962306a36Sopenharmony_ci memcpy(msg.bytes, src, size); 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci tmp = state->blocks[2]; 20262306a36Sopenharmony_ci crypto_aegis_block_and(&tmp, &state->blocks[3]); 20362306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[4]); 20462306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[1]); 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_ci crypto_aegis128_update_a(state, &msg, false); 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_ci crypto_aegis_block_xor(&msg, &tmp); 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_ci memcpy(dst, msg.bytes, size); 21162306a36Sopenharmony_ci } 21262306a36Sopenharmony_ci} 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_cistatic void crypto_aegis128_decrypt_chunk(struct aegis_state *state, u8 *dst, 21562306a36Sopenharmony_ci const u8 *src, unsigned int size) 21662306a36Sopenharmony_ci{ 21762306a36Sopenharmony_ci union aegis_block tmp; 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci if (AEGIS_ALIGNED(src) && AEGIS_ALIGNED(dst)) { 22062306a36Sopenharmony_ci while (size >= AEGIS_BLOCK_SIZE) { 22162306a36Sopenharmony_ci union aegis_block *dst_blk = 22262306a36Sopenharmony_ci (union aegis_block *)dst; 22362306a36Sopenharmony_ci const union aegis_block *src_blk = 22462306a36Sopenharmony_ci (const union aegis_block *)src; 22562306a36Sopenharmony_ci 22662306a36Sopenharmony_ci tmp = state->blocks[2]; 22762306a36Sopenharmony_ci crypto_aegis_block_and(&tmp, &state->blocks[3]); 22862306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[4]); 22962306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[1]); 23062306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, src_blk); 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_ci crypto_aegis128_update_a(state, &tmp, false); 23362306a36Sopenharmony_ci 23462306a36Sopenharmony_ci *dst_blk = tmp; 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci size -= AEGIS_BLOCK_SIZE; 23762306a36Sopenharmony_ci src += AEGIS_BLOCK_SIZE; 23862306a36Sopenharmony_ci dst += AEGIS_BLOCK_SIZE; 23962306a36Sopenharmony_ci } 24062306a36Sopenharmony_ci } else { 24162306a36Sopenharmony_ci while (size >= AEGIS_BLOCK_SIZE) { 24262306a36Sopenharmony_ci tmp = state->blocks[2]; 24362306a36Sopenharmony_ci crypto_aegis_block_and(&tmp, &state->blocks[3]); 24462306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[4]); 24562306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[1]); 24662306a36Sopenharmony_ci crypto_xor(tmp.bytes, src, AEGIS_BLOCK_SIZE); 24762306a36Sopenharmony_ci 24862306a36Sopenharmony_ci crypto_aegis128_update_a(state, &tmp, false); 24962306a36Sopenharmony_ci 25062306a36Sopenharmony_ci memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE); 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_ci size -= AEGIS_BLOCK_SIZE; 25362306a36Sopenharmony_ci src += AEGIS_BLOCK_SIZE; 25462306a36Sopenharmony_ci dst += AEGIS_BLOCK_SIZE; 25562306a36Sopenharmony_ci } 25662306a36Sopenharmony_ci } 25762306a36Sopenharmony_ci 25862306a36Sopenharmony_ci if (size > 0) { 25962306a36Sopenharmony_ci union aegis_block msg = {}; 26062306a36Sopenharmony_ci memcpy(msg.bytes, src, size); 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_ci tmp = state->blocks[2]; 26362306a36Sopenharmony_ci crypto_aegis_block_and(&tmp, &state->blocks[3]); 26462306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[4]); 26562306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[1]); 26662306a36Sopenharmony_ci crypto_aegis_block_xor(&msg, &tmp); 26762306a36Sopenharmony_ci 26862306a36Sopenharmony_ci memset(msg.bytes + size, 0, AEGIS_BLOCK_SIZE - size); 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_ci crypto_aegis128_update_a(state, &msg, false); 27162306a36Sopenharmony_ci 27262306a36Sopenharmony_ci memcpy(dst, msg.bytes, size); 27362306a36Sopenharmony_ci } 27462306a36Sopenharmony_ci} 27562306a36Sopenharmony_ci 27662306a36Sopenharmony_cistatic void crypto_aegis128_process_ad(struct aegis_state *state, 27762306a36Sopenharmony_ci struct scatterlist *sg_src, 27862306a36Sopenharmony_ci unsigned int assoclen, 27962306a36Sopenharmony_ci bool do_simd) 28062306a36Sopenharmony_ci{ 28162306a36Sopenharmony_ci struct scatter_walk walk; 28262306a36Sopenharmony_ci union aegis_block buf; 28362306a36Sopenharmony_ci unsigned int pos = 0; 28462306a36Sopenharmony_ci 28562306a36Sopenharmony_ci scatterwalk_start(&walk, sg_src); 28662306a36Sopenharmony_ci while (assoclen != 0) { 28762306a36Sopenharmony_ci unsigned int size = scatterwalk_clamp(&walk, assoclen); 28862306a36Sopenharmony_ci unsigned int left = size; 28962306a36Sopenharmony_ci void *mapped = scatterwalk_map(&walk); 29062306a36Sopenharmony_ci const u8 *src = (const u8 *)mapped; 29162306a36Sopenharmony_ci 29262306a36Sopenharmony_ci if (pos + size >= AEGIS_BLOCK_SIZE) { 29362306a36Sopenharmony_ci if (pos > 0) { 29462306a36Sopenharmony_ci unsigned int fill = AEGIS_BLOCK_SIZE - pos; 29562306a36Sopenharmony_ci memcpy(buf.bytes + pos, src, fill); 29662306a36Sopenharmony_ci crypto_aegis128_update_a(state, &buf, do_simd); 29762306a36Sopenharmony_ci pos = 0; 29862306a36Sopenharmony_ci left -= fill; 29962306a36Sopenharmony_ci src += fill; 30062306a36Sopenharmony_ci } 30162306a36Sopenharmony_ci 30262306a36Sopenharmony_ci crypto_aegis128_ad(state, src, left, do_simd); 30362306a36Sopenharmony_ci src += left & ~(AEGIS_BLOCK_SIZE - 1); 30462306a36Sopenharmony_ci left &= AEGIS_BLOCK_SIZE - 1; 30562306a36Sopenharmony_ci } 30662306a36Sopenharmony_ci 30762306a36Sopenharmony_ci memcpy(buf.bytes + pos, src, left); 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci pos += left; 31062306a36Sopenharmony_ci assoclen -= size; 31162306a36Sopenharmony_ci scatterwalk_unmap(mapped); 31262306a36Sopenharmony_ci scatterwalk_advance(&walk, size); 31362306a36Sopenharmony_ci scatterwalk_done(&walk, 0, assoclen); 31462306a36Sopenharmony_ci } 31562306a36Sopenharmony_ci 31662306a36Sopenharmony_ci if (pos > 0) { 31762306a36Sopenharmony_ci memset(buf.bytes + pos, 0, AEGIS_BLOCK_SIZE - pos); 31862306a36Sopenharmony_ci crypto_aegis128_update_a(state, &buf, do_simd); 31962306a36Sopenharmony_ci } 32062306a36Sopenharmony_ci} 32162306a36Sopenharmony_ci 32262306a36Sopenharmony_cistatic __always_inline 32362306a36Sopenharmony_ciint crypto_aegis128_process_crypt(struct aegis_state *state, 32462306a36Sopenharmony_ci struct skcipher_walk *walk, 32562306a36Sopenharmony_ci void (*crypt)(struct aegis_state *state, 32662306a36Sopenharmony_ci u8 *dst, const u8 *src, 32762306a36Sopenharmony_ci unsigned int size)) 32862306a36Sopenharmony_ci{ 32962306a36Sopenharmony_ci int err = 0; 33062306a36Sopenharmony_ci 33162306a36Sopenharmony_ci while (walk->nbytes) { 33262306a36Sopenharmony_ci unsigned int nbytes = walk->nbytes; 33362306a36Sopenharmony_ci 33462306a36Sopenharmony_ci if (nbytes < walk->total) 33562306a36Sopenharmony_ci nbytes = round_down(nbytes, walk->stride); 33662306a36Sopenharmony_ci 33762306a36Sopenharmony_ci crypt(state, walk->dst.virt.addr, walk->src.virt.addr, nbytes); 33862306a36Sopenharmony_ci 33962306a36Sopenharmony_ci err = skcipher_walk_done(walk, walk->nbytes - nbytes); 34062306a36Sopenharmony_ci } 34162306a36Sopenharmony_ci return err; 34262306a36Sopenharmony_ci} 34362306a36Sopenharmony_ci 34462306a36Sopenharmony_cistatic void crypto_aegis128_final(struct aegis_state *state, 34562306a36Sopenharmony_ci union aegis_block *tag_xor, 34662306a36Sopenharmony_ci u64 assoclen, u64 cryptlen) 34762306a36Sopenharmony_ci{ 34862306a36Sopenharmony_ci u64 assocbits = assoclen * 8; 34962306a36Sopenharmony_ci u64 cryptbits = cryptlen * 8; 35062306a36Sopenharmony_ci 35162306a36Sopenharmony_ci union aegis_block tmp; 35262306a36Sopenharmony_ci unsigned int i; 35362306a36Sopenharmony_ci 35462306a36Sopenharmony_ci tmp.words64[0] = cpu_to_le64(assocbits); 35562306a36Sopenharmony_ci tmp.words64[1] = cpu_to_le64(cryptbits); 35662306a36Sopenharmony_ci 35762306a36Sopenharmony_ci crypto_aegis_block_xor(&tmp, &state->blocks[3]); 35862306a36Sopenharmony_ci 35962306a36Sopenharmony_ci for (i = 0; i < 7; i++) 36062306a36Sopenharmony_ci crypto_aegis128_update_a(state, &tmp, false); 36162306a36Sopenharmony_ci 36262306a36Sopenharmony_ci for (i = 0; i < AEGIS128_STATE_BLOCKS; i++) 36362306a36Sopenharmony_ci crypto_aegis_block_xor(tag_xor, &state->blocks[i]); 36462306a36Sopenharmony_ci} 36562306a36Sopenharmony_ci 36662306a36Sopenharmony_cistatic int crypto_aegis128_setkey(struct crypto_aead *aead, const u8 *key, 36762306a36Sopenharmony_ci unsigned int keylen) 36862306a36Sopenharmony_ci{ 36962306a36Sopenharmony_ci struct aegis_ctx *ctx = crypto_aead_ctx(aead); 37062306a36Sopenharmony_ci 37162306a36Sopenharmony_ci if (keylen != AEGIS128_KEY_SIZE) 37262306a36Sopenharmony_ci return -EINVAL; 37362306a36Sopenharmony_ci 37462306a36Sopenharmony_ci memcpy(ctx->key.bytes, key, AEGIS128_KEY_SIZE); 37562306a36Sopenharmony_ci return 0; 37662306a36Sopenharmony_ci} 37762306a36Sopenharmony_ci 37862306a36Sopenharmony_cistatic int crypto_aegis128_setauthsize(struct crypto_aead *tfm, 37962306a36Sopenharmony_ci unsigned int authsize) 38062306a36Sopenharmony_ci{ 38162306a36Sopenharmony_ci if (authsize > AEGIS128_MAX_AUTH_SIZE) 38262306a36Sopenharmony_ci return -EINVAL; 38362306a36Sopenharmony_ci if (authsize < AEGIS128_MIN_AUTH_SIZE) 38462306a36Sopenharmony_ci return -EINVAL; 38562306a36Sopenharmony_ci return 0; 38662306a36Sopenharmony_ci} 38762306a36Sopenharmony_ci 38862306a36Sopenharmony_cistatic int crypto_aegis128_encrypt_generic(struct aead_request *req) 38962306a36Sopenharmony_ci{ 39062306a36Sopenharmony_ci struct crypto_aead *tfm = crypto_aead_reqtfm(req); 39162306a36Sopenharmony_ci union aegis_block tag = {}; 39262306a36Sopenharmony_ci unsigned int authsize = crypto_aead_authsize(tfm); 39362306a36Sopenharmony_ci struct aegis_ctx *ctx = crypto_aead_ctx(tfm); 39462306a36Sopenharmony_ci unsigned int cryptlen = req->cryptlen; 39562306a36Sopenharmony_ci struct skcipher_walk walk; 39662306a36Sopenharmony_ci struct aegis_state state; 39762306a36Sopenharmony_ci 39862306a36Sopenharmony_ci skcipher_walk_aead_encrypt(&walk, req, false); 39962306a36Sopenharmony_ci crypto_aegis128_init(&state, &ctx->key, req->iv); 40062306a36Sopenharmony_ci crypto_aegis128_process_ad(&state, req->src, req->assoclen, false); 40162306a36Sopenharmony_ci crypto_aegis128_process_crypt(&state, &walk, 40262306a36Sopenharmony_ci crypto_aegis128_encrypt_chunk); 40362306a36Sopenharmony_ci crypto_aegis128_final(&state, &tag, req->assoclen, cryptlen); 40462306a36Sopenharmony_ci 40562306a36Sopenharmony_ci scatterwalk_map_and_copy(tag.bytes, req->dst, req->assoclen + cryptlen, 40662306a36Sopenharmony_ci authsize, 1); 40762306a36Sopenharmony_ci return 0; 40862306a36Sopenharmony_ci} 40962306a36Sopenharmony_ci 41062306a36Sopenharmony_cistatic int crypto_aegis128_decrypt_generic(struct aead_request *req) 41162306a36Sopenharmony_ci{ 41262306a36Sopenharmony_ci static const u8 zeros[AEGIS128_MAX_AUTH_SIZE] = {}; 41362306a36Sopenharmony_ci struct crypto_aead *tfm = crypto_aead_reqtfm(req); 41462306a36Sopenharmony_ci union aegis_block tag; 41562306a36Sopenharmony_ci unsigned int authsize = crypto_aead_authsize(tfm); 41662306a36Sopenharmony_ci unsigned int cryptlen = req->cryptlen - authsize; 41762306a36Sopenharmony_ci struct aegis_ctx *ctx = crypto_aead_ctx(tfm); 41862306a36Sopenharmony_ci struct skcipher_walk walk; 41962306a36Sopenharmony_ci struct aegis_state state; 42062306a36Sopenharmony_ci 42162306a36Sopenharmony_ci scatterwalk_map_and_copy(tag.bytes, req->src, req->assoclen + cryptlen, 42262306a36Sopenharmony_ci authsize, 0); 42362306a36Sopenharmony_ci 42462306a36Sopenharmony_ci skcipher_walk_aead_decrypt(&walk, req, false); 42562306a36Sopenharmony_ci crypto_aegis128_init(&state, &ctx->key, req->iv); 42662306a36Sopenharmony_ci crypto_aegis128_process_ad(&state, req->src, req->assoclen, false); 42762306a36Sopenharmony_ci crypto_aegis128_process_crypt(&state, &walk, 42862306a36Sopenharmony_ci crypto_aegis128_decrypt_chunk); 42962306a36Sopenharmony_ci crypto_aegis128_final(&state, &tag, req->assoclen, cryptlen); 43062306a36Sopenharmony_ci 43162306a36Sopenharmony_ci if (unlikely(crypto_memneq(tag.bytes, zeros, authsize))) { 43262306a36Sopenharmony_ci /* 43362306a36Sopenharmony_ci * From Chapter 4. 'Security Analysis' of the AEGIS spec [0] 43462306a36Sopenharmony_ci * 43562306a36Sopenharmony_ci * "3. If verification fails, the decrypted plaintext and the 43662306a36Sopenharmony_ci * wrong authentication tag should not be given as output." 43762306a36Sopenharmony_ci * 43862306a36Sopenharmony_ci * [0] https://competitions.cr.yp.to/round3/aegisv11.pdf 43962306a36Sopenharmony_ci */ 44062306a36Sopenharmony_ci skcipher_walk_aead_decrypt(&walk, req, false); 44162306a36Sopenharmony_ci crypto_aegis128_process_crypt(NULL, &walk, 44262306a36Sopenharmony_ci crypto_aegis128_wipe_chunk); 44362306a36Sopenharmony_ci memzero_explicit(&tag, sizeof(tag)); 44462306a36Sopenharmony_ci return -EBADMSG; 44562306a36Sopenharmony_ci } 44662306a36Sopenharmony_ci return 0; 44762306a36Sopenharmony_ci} 44862306a36Sopenharmony_ci 44962306a36Sopenharmony_cistatic int crypto_aegis128_encrypt_simd(struct aead_request *req) 45062306a36Sopenharmony_ci{ 45162306a36Sopenharmony_ci struct crypto_aead *tfm = crypto_aead_reqtfm(req); 45262306a36Sopenharmony_ci union aegis_block tag = {}; 45362306a36Sopenharmony_ci unsigned int authsize = crypto_aead_authsize(tfm); 45462306a36Sopenharmony_ci struct aegis_ctx *ctx = crypto_aead_ctx(tfm); 45562306a36Sopenharmony_ci unsigned int cryptlen = req->cryptlen; 45662306a36Sopenharmony_ci struct skcipher_walk walk; 45762306a36Sopenharmony_ci struct aegis_state state; 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_ci if (!aegis128_do_simd()) 46062306a36Sopenharmony_ci return crypto_aegis128_encrypt_generic(req); 46162306a36Sopenharmony_ci 46262306a36Sopenharmony_ci skcipher_walk_aead_encrypt(&walk, req, false); 46362306a36Sopenharmony_ci crypto_aegis128_init_simd(&state, &ctx->key, req->iv); 46462306a36Sopenharmony_ci crypto_aegis128_process_ad(&state, req->src, req->assoclen, true); 46562306a36Sopenharmony_ci crypto_aegis128_process_crypt(&state, &walk, 46662306a36Sopenharmony_ci crypto_aegis128_encrypt_chunk_simd); 46762306a36Sopenharmony_ci crypto_aegis128_final_simd(&state, &tag, req->assoclen, cryptlen, 0); 46862306a36Sopenharmony_ci 46962306a36Sopenharmony_ci scatterwalk_map_and_copy(tag.bytes, req->dst, req->assoclen + cryptlen, 47062306a36Sopenharmony_ci authsize, 1); 47162306a36Sopenharmony_ci return 0; 47262306a36Sopenharmony_ci} 47362306a36Sopenharmony_ci 47462306a36Sopenharmony_cistatic int crypto_aegis128_decrypt_simd(struct aead_request *req) 47562306a36Sopenharmony_ci{ 47662306a36Sopenharmony_ci struct crypto_aead *tfm = crypto_aead_reqtfm(req); 47762306a36Sopenharmony_ci union aegis_block tag; 47862306a36Sopenharmony_ci unsigned int authsize = crypto_aead_authsize(tfm); 47962306a36Sopenharmony_ci unsigned int cryptlen = req->cryptlen - authsize; 48062306a36Sopenharmony_ci struct aegis_ctx *ctx = crypto_aead_ctx(tfm); 48162306a36Sopenharmony_ci struct skcipher_walk walk; 48262306a36Sopenharmony_ci struct aegis_state state; 48362306a36Sopenharmony_ci 48462306a36Sopenharmony_ci if (!aegis128_do_simd()) 48562306a36Sopenharmony_ci return crypto_aegis128_decrypt_generic(req); 48662306a36Sopenharmony_ci 48762306a36Sopenharmony_ci scatterwalk_map_and_copy(tag.bytes, req->src, req->assoclen + cryptlen, 48862306a36Sopenharmony_ci authsize, 0); 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_ci skcipher_walk_aead_decrypt(&walk, req, false); 49162306a36Sopenharmony_ci crypto_aegis128_init_simd(&state, &ctx->key, req->iv); 49262306a36Sopenharmony_ci crypto_aegis128_process_ad(&state, req->src, req->assoclen, true); 49362306a36Sopenharmony_ci crypto_aegis128_process_crypt(&state, &walk, 49462306a36Sopenharmony_ci crypto_aegis128_decrypt_chunk_simd); 49562306a36Sopenharmony_ci 49662306a36Sopenharmony_ci if (unlikely(crypto_aegis128_final_simd(&state, &tag, req->assoclen, 49762306a36Sopenharmony_ci cryptlen, authsize))) { 49862306a36Sopenharmony_ci skcipher_walk_aead_decrypt(&walk, req, false); 49962306a36Sopenharmony_ci crypto_aegis128_process_crypt(NULL, &walk, 50062306a36Sopenharmony_ci crypto_aegis128_wipe_chunk); 50162306a36Sopenharmony_ci return -EBADMSG; 50262306a36Sopenharmony_ci } 50362306a36Sopenharmony_ci return 0; 50462306a36Sopenharmony_ci} 50562306a36Sopenharmony_ci 50662306a36Sopenharmony_cistatic struct aead_alg crypto_aegis128_alg_generic = { 50762306a36Sopenharmony_ci .setkey = crypto_aegis128_setkey, 50862306a36Sopenharmony_ci .setauthsize = crypto_aegis128_setauthsize, 50962306a36Sopenharmony_ci .encrypt = crypto_aegis128_encrypt_generic, 51062306a36Sopenharmony_ci .decrypt = crypto_aegis128_decrypt_generic, 51162306a36Sopenharmony_ci 51262306a36Sopenharmony_ci .ivsize = AEGIS128_NONCE_SIZE, 51362306a36Sopenharmony_ci .maxauthsize = AEGIS128_MAX_AUTH_SIZE, 51462306a36Sopenharmony_ci .chunksize = AEGIS_BLOCK_SIZE, 51562306a36Sopenharmony_ci 51662306a36Sopenharmony_ci .base.cra_blocksize = 1, 51762306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct aegis_ctx), 51862306a36Sopenharmony_ci .base.cra_alignmask = 0, 51962306a36Sopenharmony_ci .base.cra_priority = 100, 52062306a36Sopenharmony_ci .base.cra_name = "aegis128", 52162306a36Sopenharmony_ci .base.cra_driver_name = "aegis128-generic", 52262306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 52362306a36Sopenharmony_ci}; 52462306a36Sopenharmony_ci 52562306a36Sopenharmony_cistatic struct aead_alg crypto_aegis128_alg_simd = { 52662306a36Sopenharmony_ci .setkey = crypto_aegis128_setkey, 52762306a36Sopenharmony_ci .setauthsize = crypto_aegis128_setauthsize, 52862306a36Sopenharmony_ci .encrypt = crypto_aegis128_encrypt_simd, 52962306a36Sopenharmony_ci .decrypt = crypto_aegis128_decrypt_simd, 53062306a36Sopenharmony_ci 53162306a36Sopenharmony_ci .ivsize = AEGIS128_NONCE_SIZE, 53262306a36Sopenharmony_ci .maxauthsize = AEGIS128_MAX_AUTH_SIZE, 53362306a36Sopenharmony_ci .chunksize = AEGIS_BLOCK_SIZE, 53462306a36Sopenharmony_ci 53562306a36Sopenharmony_ci .base.cra_blocksize = 1, 53662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct aegis_ctx), 53762306a36Sopenharmony_ci .base.cra_alignmask = 0, 53862306a36Sopenharmony_ci .base.cra_priority = 200, 53962306a36Sopenharmony_ci .base.cra_name = "aegis128", 54062306a36Sopenharmony_ci .base.cra_driver_name = "aegis128-simd", 54162306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 54262306a36Sopenharmony_ci}; 54362306a36Sopenharmony_ci 54462306a36Sopenharmony_cistatic int __init crypto_aegis128_module_init(void) 54562306a36Sopenharmony_ci{ 54662306a36Sopenharmony_ci int ret; 54762306a36Sopenharmony_ci 54862306a36Sopenharmony_ci ret = crypto_register_aead(&crypto_aegis128_alg_generic); 54962306a36Sopenharmony_ci if (ret) 55062306a36Sopenharmony_ci return ret; 55162306a36Sopenharmony_ci 55262306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_CRYPTO_AEGIS128_SIMD) && 55362306a36Sopenharmony_ci crypto_aegis128_have_simd()) { 55462306a36Sopenharmony_ci ret = crypto_register_aead(&crypto_aegis128_alg_simd); 55562306a36Sopenharmony_ci if (ret) { 55662306a36Sopenharmony_ci crypto_unregister_aead(&crypto_aegis128_alg_generic); 55762306a36Sopenharmony_ci return ret; 55862306a36Sopenharmony_ci } 55962306a36Sopenharmony_ci static_branch_enable(&have_simd); 56062306a36Sopenharmony_ci } 56162306a36Sopenharmony_ci return 0; 56262306a36Sopenharmony_ci} 56362306a36Sopenharmony_ci 56462306a36Sopenharmony_cistatic void __exit crypto_aegis128_module_exit(void) 56562306a36Sopenharmony_ci{ 56662306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_CRYPTO_AEGIS128_SIMD) && 56762306a36Sopenharmony_ci crypto_aegis128_have_simd()) 56862306a36Sopenharmony_ci crypto_unregister_aead(&crypto_aegis128_alg_simd); 56962306a36Sopenharmony_ci 57062306a36Sopenharmony_ci crypto_unregister_aead(&crypto_aegis128_alg_generic); 57162306a36Sopenharmony_ci} 57262306a36Sopenharmony_ci 57362306a36Sopenharmony_cisubsys_initcall(crypto_aegis128_module_init); 57462306a36Sopenharmony_cimodule_exit(crypto_aegis128_module_exit); 57562306a36Sopenharmony_ci 57662306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 57762306a36Sopenharmony_ciMODULE_AUTHOR("Ondrej Mosnacek <omosnacek@gmail.com>"); 57862306a36Sopenharmony_ciMODULE_DESCRIPTION("AEGIS-128 AEAD algorithm"); 57962306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("aegis128"); 58062306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("aegis128-generic"); 58162306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("aegis128-simd"); 582