blob: 4a1c05dce950f87a0514ea154452586ec9dfa448 [file] [log] [blame]
Thomas Gleixner2874c5f2019-05-27 08:55:01 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Martin Willic70f4ab2015-07-16 19:14:06 +02002/*
3 * Poly1305 authenticator algorithm, RFC7539, SIMD glue code
4 *
5 * Copyright (C) 2015 Martin Willi
Martin Willic70f4ab2015-07-16 19:14:06 +02006 */
7
8#include <crypto/algapi.h>
9#include <crypto/internal/hash.h>
Eric Biggersf2abe0d2019-03-12 22:12:48 -070010#include <crypto/internal/simd.h>
Martin Willic70f4ab2015-07-16 19:14:06 +020011#include <crypto/poly1305.h>
12#include <linux/crypto.h>
13#include <linux/kernel.h>
14#include <linux/module.h>
Martin Willic70f4ab2015-07-16 19:14:06 +020015#include <asm/simd.h>
16
Martin Willida35b222015-07-16 19:14:07 +020017struct poly1305_simd_desc_ctx {
18 struct poly1305_desc_ctx base;
19 /* derived key u set? */
20 bool uset;
Martin Willib1ccc8f2015-07-16 19:14:08 +020021#ifdef CONFIG_AS_AVX2
22 /* derived keys r^3, r^4 set? */
23 bool wset;
24#endif
Martin Willida35b222015-07-16 19:14:07 +020025 /* derived Poly1305 key r^2 */
26 u32 u[5];
Martin Willib1ccc8f2015-07-16 19:14:08 +020027 /* ... silently appended r^3 and r^4 when using AVX2 */
Martin Willida35b222015-07-16 19:14:07 +020028};
29
Martin Willic70f4ab2015-07-16 19:14:06 +020030asmlinkage void poly1305_block_sse2(u32 *h, const u8 *src,
31 const u32 *r, unsigned int blocks);
Martin Willida35b222015-07-16 19:14:07 +020032asmlinkage void poly1305_2block_sse2(u32 *h, const u8 *src, const u32 *r,
33 unsigned int blocks, const u32 *u);
Martin Willib1ccc8f2015-07-16 19:14:08 +020034#ifdef CONFIG_AS_AVX2
35asmlinkage void poly1305_4block_avx2(u32 *h, const u8 *src, const u32 *r,
36 unsigned int blocks, const u32 *u);
37static bool poly1305_use_avx2;
38#endif
Martin Willida35b222015-07-16 19:14:07 +020039
40static int poly1305_simd_init(struct shash_desc *desc)
41{
42 struct poly1305_simd_desc_ctx *sctx = shash_desc_ctx(desc);
43
44 sctx->uset = false;
Martin Willib1ccc8f2015-07-16 19:14:08 +020045#ifdef CONFIG_AS_AVX2
46 sctx->wset = false;
47#endif
Martin Willida35b222015-07-16 19:14:07 +020048
49 return crypto_poly1305_init(desc);
50}
51
52static void poly1305_simd_mult(u32 *a, const u32 *b)
53{
54 u8 m[POLY1305_BLOCK_SIZE];
55
56 memset(m, 0, sizeof(m));
57 /* The poly1305 block function adds a hi-bit to the accumulator which
58 * we don't need for key multiplication; compensate for it. */
59 a[4] -= 1 << 24;
60 poly1305_block_sse2(a, m, b, 1);
61}
Martin Willic70f4ab2015-07-16 19:14:06 +020062
63static unsigned int poly1305_simd_blocks(struct poly1305_desc_ctx *dctx,
64 const u8 *src, unsigned int srclen)
65{
Martin Willida35b222015-07-16 19:14:07 +020066 struct poly1305_simd_desc_ctx *sctx;
Martin Willic70f4ab2015-07-16 19:14:06 +020067 unsigned int blocks, datalen;
68
Martin Willida35b222015-07-16 19:14:07 +020069 BUILD_BUG_ON(offsetof(struct poly1305_simd_desc_ctx, base));
70 sctx = container_of(dctx, struct poly1305_simd_desc_ctx, base);
71
Martin Willic70f4ab2015-07-16 19:14:06 +020072 if (unlikely(!dctx->sset)) {
73 datalen = crypto_poly1305_setdesckey(dctx, src, srclen);
74 src += srclen - datalen;
75 srclen = datalen;
76 }
77
Martin Willib1ccc8f2015-07-16 19:14:08 +020078#ifdef CONFIG_AS_AVX2
79 if (poly1305_use_avx2 && srclen >= POLY1305_BLOCK_SIZE * 4) {
80 if (unlikely(!sctx->wset)) {
81 if (!sctx->uset) {
Eric Biggers878afc32018-11-16 17:26:27 -080082 memcpy(sctx->u, dctx->r.r, sizeof(sctx->u));
83 poly1305_simd_mult(sctx->u, dctx->r.r);
Martin Willib1ccc8f2015-07-16 19:14:08 +020084 sctx->uset = true;
85 }
86 memcpy(sctx->u + 5, sctx->u, sizeof(sctx->u));
Eric Biggers878afc32018-11-16 17:26:27 -080087 poly1305_simd_mult(sctx->u + 5, dctx->r.r);
Martin Willib1ccc8f2015-07-16 19:14:08 +020088 memcpy(sctx->u + 10, sctx->u + 5, sizeof(sctx->u));
Eric Biggers878afc32018-11-16 17:26:27 -080089 poly1305_simd_mult(sctx->u + 10, dctx->r.r);
Martin Willib1ccc8f2015-07-16 19:14:08 +020090 sctx->wset = true;
91 }
92 blocks = srclen / (POLY1305_BLOCK_SIZE * 4);
Eric Biggers878afc32018-11-16 17:26:27 -080093 poly1305_4block_avx2(dctx->h.h, src, dctx->r.r, blocks,
94 sctx->u);
Martin Willib1ccc8f2015-07-16 19:14:08 +020095 src += POLY1305_BLOCK_SIZE * 4 * blocks;
96 srclen -= POLY1305_BLOCK_SIZE * 4 * blocks;
97 }
98#endif
Martin Willida35b222015-07-16 19:14:07 +020099 if (likely(srclen >= POLY1305_BLOCK_SIZE * 2)) {
100 if (unlikely(!sctx->uset)) {
Eric Biggers878afc32018-11-16 17:26:27 -0800101 memcpy(sctx->u, dctx->r.r, sizeof(sctx->u));
102 poly1305_simd_mult(sctx->u, dctx->r.r);
Martin Willida35b222015-07-16 19:14:07 +0200103 sctx->uset = true;
104 }
105 blocks = srclen / (POLY1305_BLOCK_SIZE * 2);
Eric Biggers878afc32018-11-16 17:26:27 -0800106 poly1305_2block_sse2(dctx->h.h, src, dctx->r.r, blocks,
107 sctx->u);
Martin Willida35b222015-07-16 19:14:07 +0200108 src += POLY1305_BLOCK_SIZE * 2 * blocks;
109 srclen -= POLY1305_BLOCK_SIZE * 2 * blocks;
110 }
Martin Willic70f4ab2015-07-16 19:14:06 +0200111 if (srclen >= POLY1305_BLOCK_SIZE) {
Eric Biggers878afc32018-11-16 17:26:27 -0800112 poly1305_block_sse2(dctx->h.h, src, dctx->r.r, 1);
Martin Willida35b222015-07-16 19:14:07 +0200113 srclen -= POLY1305_BLOCK_SIZE;
Martin Willic70f4ab2015-07-16 19:14:06 +0200114 }
115 return srclen;
116}
117
118static int poly1305_simd_update(struct shash_desc *desc,
119 const u8 *src, unsigned int srclen)
120{
121 struct poly1305_desc_ctx *dctx = shash_desc_ctx(desc);
122 unsigned int bytes;
123
124 /* kernel_fpu_begin/end is costly, use fallback for small updates */
Eric Biggersf2abe0d2019-03-12 22:12:48 -0700125 if (srclen <= 288 || !crypto_simd_usable())
Martin Willic70f4ab2015-07-16 19:14:06 +0200126 return crypto_poly1305_update(desc, src, srclen);
127
128 kernel_fpu_begin();
129
130 if (unlikely(dctx->buflen)) {
131 bytes = min(srclen, POLY1305_BLOCK_SIZE - dctx->buflen);
132 memcpy(dctx->buf + dctx->buflen, src, bytes);
133 src += bytes;
134 srclen -= bytes;
135 dctx->buflen += bytes;
136
137 if (dctx->buflen == POLY1305_BLOCK_SIZE) {
138 poly1305_simd_blocks(dctx, dctx->buf,
139 POLY1305_BLOCK_SIZE);
140 dctx->buflen = 0;
141 }
142 }
143
144 if (likely(srclen >= POLY1305_BLOCK_SIZE)) {
145 bytes = poly1305_simd_blocks(dctx, src, srclen);
146 src += srclen - bytes;
147 srclen = bytes;
148 }
149
150 kernel_fpu_end();
151
152 if (unlikely(srclen)) {
153 dctx->buflen = srclen;
154 memcpy(dctx->buf, src, srclen);
155 }
156
157 return 0;
158}
159
160static struct shash_alg alg = {
161 .digestsize = POLY1305_DIGEST_SIZE,
Martin Willida35b222015-07-16 19:14:07 +0200162 .init = poly1305_simd_init,
Martin Willic70f4ab2015-07-16 19:14:06 +0200163 .update = poly1305_simd_update,
164 .final = crypto_poly1305_final,
Martin Willida35b222015-07-16 19:14:07 +0200165 .descsize = sizeof(struct poly1305_simd_desc_ctx),
Martin Willic70f4ab2015-07-16 19:14:06 +0200166 .base = {
167 .cra_name = "poly1305",
168 .cra_driver_name = "poly1305-simd",
169 .cra_priority = 300,
Martin Willic70f4ab2015-07-16 19:14:06 +0200170 .cra_blocksize = POLY1305_BLOCK_SIZE,
171 .cra_module = THIS_MODULE,
172 },
173};
174
175static int __init poly1305_simd_mod_init(void)
176{
Borislav Petkov054efb62016-03-29 17:42:00 +0200177 if (!boot_cpu_has(X86_FEATURE_XMM2))
Martin Willic70f4ab2015-07-16 19:14:06 +0200178 return -ENODEV;
179
Martin Willib1ccc8f2015-07-16 19:14:08 +0200180#ifdef CONFIG_AS_AVX2
Borislav Petkovda154e82016-04-04 22:24:56 +0200181 poly1305_use_avx2 = boot_cpu_has(X86_FEATURE_AVX) &&
182 boot_cpu_has(X86_FEATURE_AVX2) &&
Dave Hansend91cab72015-09-02 16:31:26 -0700183 cpu_has_xfeatures(XFEATURE_MASK_SSE | XFEATURE_MASK_YMM, NULL);
Martin Willib1ccc8f2015-07-16 19:14:08 +0200184 alg.descsize = sizeof(struct poly1305_simd_desc_ctx);
185 if (poly1305_use_avx2)
186 alg.descsize += 10 * sizeof(u32);
187#endif
Martin Willic70f4ab2015-07-16 19:14:06 +0200188 return crypto_register_shash(&alg);
189}
190
191static void __exit poly1305_simd_mod_exit(void)
192{
193 crypto_unregister_shash(&alg);
194}
195
196module_init(poly1305_simd_mod_init);
197module_exit(poly1305_simd_mod_exit);
198
199MODULE_LICENSE("GPL");
200MODULE_AUTHOR("Martin Willi <martin@strongswan.org>");
201MODULE_DESCRIPTION("Poly1305 authenticator");
202MODULE_ALIAS_CRYPTO("poly1305");
203MODULE_ALIAS_CRYPTO("poly1305-simd");