162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * GHASH: hash function for GCM (Galois/Counter Mode).
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (c) 2007 Nokia Siemens Networks - Mikko Herranen <mh1@iki.fi>
662306a36Sopenharmony_ci * Copyright (c) 2009 Intel Corp.
762306a36Sopenharmony_ci *   Author: Huang Ying <ying.huang@intel.com>
862306a36Sopenharmony_ci */
962306a36Sopenharmony_ci
1062306a36Sopenharmony_ci/*
1162306a36Sopenharmony_ci * GHASH is a keyed hash function used in GCM authentication tag generation.
1262306a36Sopenharmony_ci *
1362306a36Sopenharmony_ci * The original GCM paper [1] presents GHASH as a function GHASH(H, A, C) which
1462306a36Sopenharmony_ci * takes a 16-byte hash key H, additional authenticated data A, and a ciphertext
1562306a36Sopenharmony_ci * C.  It formats A and C into a single byte string X, interprets X as a
1662306a36Sopenharmony_ci * polynomial over GF(2^128), and evaluates this polynomial at the point H.
1762306a36Sopenharmony_ci *
1862306a36Sopenharmony_ci * However, the NIST standard for GCM [2] presents GHASH as GHASH(H, X) where X
1962306a36Sopenharmony_ci * is the already-formatted byte string containing both A and C.
2062306a36Sopenharmony_ci *
2162306a36Sopenharmony_ci * "ghash" in the Linux crypto API uses the 'X' (pre-formatted) convention,
2262306a36Sopenharmony_ci * since the API supports only a single data stream per hash.  Thus, the
2362306a36Sopenharmony_ci * formatting of 'A' and 'C' is done in the "gcm" template, not in "ghash".
2462306a36Sopenharmony_ci *
2562306a36Sopenharmony_ci * The reason "ghash" is separate from "gcm" is to allow "gcm" to use an
2662306a36Sopenharmony_ci * accelerated "ghash" when a standalone accelerated "gcm(aes)" is unavailable.
2762306a36Sopenharmony_ci * It is generally inappropriate to use "ghash" for other purposes, since it is
2862306a36Sopenharmony_ci * an "ε-almost-XOR-universal hash function", not a cryptographic hash function.
2962306a36Sopenharmony_ci * It can only be used securely in crypto modes specially designed to use it.
3062306a36Sopenharmony_ci *
3162306a36Sopenharmony_ci * [1] The Galois/Counter Mode of Operation (GCM)
3262306a36Sopenharmony_ci *     (http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.694.695&rep=rep1&type=pdf)
3362306a36Sopenharmony_ci * [2] Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
3462306a36Sopenharmony_ci *     (https://csrc.nist.gov/publications/detail/sp/800-38d/final)
3562306a36Sopenharmony_ci */
3662306a36Sopenharmony_ci
3762306a36Sopenharmony_ci#include <crypto/algapi.h>
3862306a36Sopenharmony_ci#include <crypto/gf128mul.h>
3962306a36Sopenharmony_ci#include <crypto/ghash.h>
4062306a36Sopenharmony_ci#include <crypto/internal/hash.h>
4162306a36Sopenharmony_ci#include <linux/crypto.h>
4262306a36Sopenharmony_ci#include <linux/init.h>
4362306a36Sopenharmony_ci#include <linux/kernel.h>
4462306a36Sopenharmony_ci#include <linux/module.h>
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_cistatic int ghash_init(struct shash_desc *desc)
4762306a36Sopenharmony_ci{
4862306a36Sopenharmony_ci	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
4962306a36Sopenharmony_ci
5062306a36Sopenharmony_ci	memset(dctx, 0, sizeof(*dctx));
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_ci	return 0;
5362306a36Sopenharmony_ci}
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_cistatic int ghash_setkey(struct crypto_shash *tfm,
5662306a36Sopenharmony_ci			const u8 *key, unsigned int keylen)
5762306a36Sopenharmony_ci{
5862306a36Sopenharmony_ci	struct ghash_ctx *ctx = crypto_shash_ctx(tfm);
5962306a36Sopenharmony_ci	be128 k;
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci	if (keylen != GHASH_BLOCK_SIZE)
6262306a36Sopenharmony_ci		return -EINVAL;
6362306a36Sopenharmony_ci
6462306a36Sopenharmony_ci	if (ctx->gf128)
6562306a36Sopenharmony_ci		gf128mul_free_4k(ctx->gf128);
6662306a36Sopenharmony_ci
6762306a36Sopenharmony_ci	BUILD_BUG_ON(sizeof(k) != GHASH_BLOCK_SIZE);
6862306a36Sopenharmony_ci	memcpy(&k, key, GHASH_BLOCK_SIZE); /* avoid violating alignment rules */
6962306a36Sopenharmony_ci	ctx->gf128 = gf128mul_init_4k_lle(&k);
7062306a36Sopenharmony_ci	memzero_explicit(&k, GHASH_BLOCK_SIZE);
7162306a36Sopenharmony_ci
7262306a36Sopenharmony_ci	if (!ctx->gf128)
7362306a36Sopenharmony_ci		return -ENOMEM;
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_ci	return 0;
7662306a36Sopenharmony_ci}
7762306a36Sopenharmony_ci
7862306a36Sopenharmony_cistatic int ghash_update(struct shash_desc *desc,
7962306a36Sopenharmony_ci			 const u8 *src, unsigned int srclen)
8062306a36Sopenharmony_ci{
8162306a36Sopenharmony_ci	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
8262306a36Sopenharmony_ci	struct ghash_ctx *ctx = crypto_shash_ctx(desc->tfm);
8362306a36Sopenharmony_ci	u8 *dst = dctx->buffer;
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_ci	if (dctx->bytes) {
8662306a36Sopenharmony_ci		int n = min(srclen, dctx->bytes);
8762306a36Sopenharmony_ci		u8 *pos = dst + (GHASH_BLOCK_SIZE - dctx->bytes);
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci		dctx->bytes -= n;
9062306a36Sopenharmony_ci		srclen -= n;
9162306a36Sopenharmony_ci
9262306a36Sopenharmony_ci		while (n--)
9362306a36Sopenharmony_ci			*pos++ ^= *src++;
9462306a36Sopenharmony_ci
9562306a36Sopenharmony_ci		if (!dctx->bytes)
9662306a36Sopenharmony_ci			gf128mul_4k_lle((be128 *)dst, ctx->gf128);
9762306a36Sopenharmony_ci	}
9862306a36Sopenharmony_ci
9962306a36Sopenharmony_ci	while (srclen >= GHASH_BLOCK_SIZE) {
10062306a36Sopenharmony_ci		crypto_xor(dst, src, GHASH_BLOCK_SIZE);
10162306a36Sopenharmony_ci		gf128mul_4k_lle((be128 *)dst, ctx->gf128);
10262306a36Sopenharmony_ci		src += GHASH_BLOCK_SIZE;
10362306a36Sopenharmony_ci		srclen -= GHASH_BLOCK_SIZE;
10462306a36Sopenharmony_ci	}
10562306a36Sopenharmony_ci
10662306a36Sopenharmony_ci	if (srclen) {
10762306a36Sopenharmony_ci		dctx->bytes = GHASH_BLOCK_SIZE - srclen;
10862306a36Sopenharmony_ci		while (srclen--)
10962306a36Sopenharmony_ci			*dst++ ^= *src++;
11062306a36Sopenharmony_ci	}
11162306a36Sopenharmony_ci
11262306a36Sopenharmony_ci	return 0;
11362306a36Sopenharmony_ci}
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_cistatic void ghash_flush(struct ghash_ctx *ctx, struct ghash_desc_ctx *dctx)
11662306a36Sopenharmony_ci{
11762306a36Sopenharmony_ci	u8 *dst = dctx->buffer;
11862306a36Sopenharmony_ci
11962306a36Sopenharmony_ci	if (dctx->bytes) {
12062306a36Sopenharmony_ci		u8 *tmp = dst + (GHASH_BLOCK_SIZE - dctx->bytes);
12162306a36Sopenharmony_ci
12262306a36Sopenharmony_ci		while (dctx->bytes--)
12362306a36Sopenharmony_ci			*tmp++ ^= 0;
12462306a36Sopenharmony_ci
12562306a36Sopenharmony_ci		gf128mul_4k_lle((be128 *)dst, ctx->gf128);
12662306a36Sopenharmony_ci	}
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_ci	dctx->bytes = 0;
12962306a36Sopenharmony_ci}
13062306a36Sopenharmony_ci
13162306a36Sopenharmony_cistatic int ghash_final(struct shash_desc *desc, u8 *dst)
13262306a36Sopenharmony_ci{
13362306a36Sopenharmony_ci	struct ghash_desc_ctx *dctx = shash_desc_ctx(desc);
13462306a36Sopenharmony_ci	struct ghash_ctx *ctx = crypto_shash_ctx(desc->tfm);
13562306a36Sopenharmony_ci	u8 *buf = dctx->buffer;
13662306a36Sopenharmony_ci
13762306a36Sopenharmony_ci	ghash_flush(ctx, dctx);
13862306a36Sopenharmony_ci	memcpy(dst, buf, GHASH_BLOCK_SIZE);
13962306a36Sopenharmony_ci
14062306a36Sopenharmony_ci	return 0;
14162306a36Sopenharmony_ci}
14262306a36Sopenharmony_ci
14362306a36Sopenharmony_cistatic void ghash_exit_tfm(struct crypto_tfm *tfm)
14462306a36Sopenharmony_ci{
14562306a36Sopenharmony_ci	struct ghash_ctx *ctx = crypto_tfm_ctx(tfm);
14662306a36Sopenharmony_ci	if (ctx->gf128)
14762306a36Sopenharmony_ci		gf128mul_free_4k(ctx->gf128);
14862306a36Sopenharmony_ci}
14962306a36Sopenharmony_ci
15062306a36Sopenharmony_cistatic struct shash_alg ghash_alg = {
15162306a36Sopenharmony_ci	.digestsize	= GHASH_DIGEST_SIZE,
15262306a36Sopenharmony_ci	.init		= ghash_init,
15362306a36Sopenharmony_ci	.update		= ghash_update,
15462306a36Sopenharmony_ci	.final		= ghash_final,
15562306a36Sopenharmony_ci	.setkey		= ghash_setkey,
15662306a36Sopenharmony_ci	.descsize	= sizeof(struct ghash_desc_ctx),
15762306a36Sopenharmony_ci	.base		= {
15862306a36Sopenharmony_ci		.cra_name		= "ghash",
15962306a36Sopenharmony_ci		.cra_driver_name	= "ghash-generic",
16062306a36Sopenharmony_ci		.cra_priority		= 100,
16162306a36Sopenharmony_ci		.cra_blocksize		= GHASH_BLOCK_SIZE,
16262306a36Sopenharmony_ci		.cra_ctxsize		= sizeof(struct ghash_ctx),
16362306a36Sopenharmony_ci		.cra_module		= THIS_MODULE,
16462306a36Sopenharmony_ci		.cra_exit		= ghash_exit_tfm,
16562306a36Sopenharmony_ci	},
16662306a36Sopenharmony_ci};
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_cistatic int __init ghash_mod_init(void)
16962306a36Sopenharmony_ci{
17062306a36Sopenharmony_ci	return crypto_register_shash(&ghash_alg);
17162306a36Sopenharmony_ci}
17262306a36Sopenharmony_ci
17362306a36Sopenharmony_cistatic void __exit ghash_mod_exit(void)
17462306a36Sopenharmony_ci{
17562306a36Sopenharmony_ci	crypto_unregister_shash(&ghash_alg);
17662306a36Sopenharmony_ci}
17762306a36Sopenharmony_ci
17862306a36Sopenharmony_cisubsys_initcall(ghash_mod_init);
17962306a36Sopenharmony_cimodule_exit(ghash_mod_exit);
18062306a36Sopenharmony_ci
18162306a36Sopenharmony_ciMODULE_LICENSE("GPL");
18262306a36Sopenharmony_ciMODULE_DESCRIPTION("GHASH hash function");
18362306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("ghash");
18462306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("ghash-generic");
185