2019-05-27 08:55:05 +02:00
// SPDX-License-Identifier: GPL-2.0-or-later
2011-09-26 16:47:25 +03:00
/*
* Glue Code for 3 - way parallel assembler optimized version of Twofish
*
* Copyright ( c ) 2011 Jussi Kivilinna < jussi . kivilinna @ mbnet . fi >
*/
2018-02-19 23:48:09 -08:00
# include <crypto/algapi.h>
# include <crypto/twofish.h>
2011-09-26 16:47:25 +03:00
# include <linux/crypto.h>
# include <linux/init.h>
# include <linux/module.h>
# include <linux/types.h>
2011-10-18 13:33:02 +03:00
2021-01-05 17:48:09 +01:00
# include "twofish.h"
2021-01-05 17:48:07 +01:00
# include "ecb_cbc_helpers.h"
2012-05-28 15:54:24 +02:00
EXPORT_SYMBOL_GPL ( __twofish_enc_blk_3way ) ;
EXPORT_SYMBOL_GPL ( twofish_dec_blk_3way ) ;
2011-09-26 16:47:25 +03:00
2018-02-19 23:48:09 -08:00
static int twofish_setkey_skcipher ( struct crypto_skcipher * tfm ,
const u8 * key , unsigned int keylen )
{
return twofish_setkey ( & tfm - > base , key , keylen ) ;
}
2019-11-26 22:08:02 -08:00
static inline void twofish_enc_blk_3way ( const void * ctx , u8 * dst , const u8 * src )
2011-09-26 16:47:25 +03:00
{
__twofish_enc_blk_3way ( ctx , dst , src , false ) ;
}
2021-01-05 17:48:07 +01:00
void twofish_dec_blk_cbc_3way ( const void * ctx , u8 * dst , const u8 * src )
2011-09-26 16:47:25 +03:00
{
2021-01-05 17:48:07 +01:00
u8 buf [ 2 ] [ TF_BLOCK_SIZE ] ;
const u8 * s = src ;
2011-09-26 16:47:25 +03:00
2021-01-05 17:48:07 +01:00
if ( dst = = src )
s = memcpy ( buf , src , sizeof ( buf ) ) ;
twofish_dec_blk_3way ( ctx , dst , src ) ;
crypto_xor ( dst + TF_BLOCK_SIZE , s , sizeof ( buf ) ) ;
2011-09-26 16:47:25 +03:00
}
2012-06-18 14:07:39 +03:00
EXPORT_SYMBOL_GPL ( twofish_dec_blk_cbc_3way ) ;
2011-09-26 16:47:25 +03:00
2018-02-19 23:48:09 -08:00
static int ecb_encrypt ( struct skcipher_request * req )
2011-09-26 16:47:25 +03:00
{
2021-01-05 17:48:07 +01:00
ECB_WALK_START ( req , TF_BLOCK_SIZE , - 1 ) ;
ECB_BLOCK ( 3 , twofish_enc_blk_3way ) ;
ECB_BLOCK ( 1 , twofish_enc_blk ) ;
ECB_WALK_END ( ) ;
2011-09-26 16:47:25 +03:00
}
2018-02-19 23:48:09 -08:00
static int ecb_decrypt ( struct skcipher_request * req )
2011-09-26 16:47:25 +03:00
{
2021-01-05 17:48:07 +01:00
ECB_WALK_START ( req , TF_BLOCK_SIZE , - 1 ) ;
ECB_BLOCK ( 3 , twofish_dec_blk_3way ) ;
ECB_BLOCK ( 1 , twofish_dec_blk ) ;
ECB_WALK_END ( ) ;
2011-09-26 16:47:25 +03:00
}
2018-02-19 23:48:09 -08:00
static int cbc_encrypt ( struct skcipher_request * req )
2011-09-26 16:47:25 +03:00
{
2021-01-05 17:48:07 +01:00
CBC_WALK_START ( req , TF_BLOCK_SIZE , - 1 ) ;
CBC_ENC_BLOCK ( twofish_enc_blk ) ;
CBC_WALK_END ( ) ;
2011-09-26 16:47:25 +03:00
}
2018-02-19 23:48:09 -08:00
static int cbc_decrypt ( struct skcipher_request * req )
2011-09-26 16:47:25 +03:00
{
2021-01-05 17:48:07 +01:00
CBC_WALK_START ( req , TF_BLOCK_SIZE , - 1 ) ;
CBC_DEC_BLOCK ( 3 , twofish_dec_blk_cbc_3way ) ;
CBC_DEC_BLOCK ( 1 , twofish_dec_blk ) ;
CBC_WALK_END ( ) ;
2011-09-26 16:47:25 +03:00
}
2018-02-19 23:48:09 -08:00
static struct skcipher_alg tf_skciphers [ ] = {
{
. base . cra_name = " ecb(twofish) " ,
. base . cra_driver_name = " ecb-twofish-3way " ,
. base . cra_priority = 300 ,
. base . cra_blocksize = TF_BLOCK_SIZE ,
. base . cra_ctxsize = sizeof ( struct twofish_ctx ) ,
. base . cra_module = THIS_MODULE ,
. min_keysize = TF_MIN_KEY_SIZE ,
. max_keysize = TF_MAX_KEY_SIZE ,
. setkey = twofish_setkey_skcipher ,
. encrypt = ecb_encrypt ,
. decrypt = ecb_decrypt ,
} , {
. base . cra_name = " cbc(twofish) " ,
. base . cra_driver_name = " cbc-twofish-3way " ,
. base . cra_priority = 300 ,
. base . cra_blocksize = TF_BLOCK_SIZE ,
. base . cra_ctxsize = sizeof ( struct twofish_ctx ) ,
. base . cra_module = THIS_MODULE ,
. min_keysize = TF_MIN_KEY_SIZE ,
. max_keysize = TF_MAX_KEY_SIZE ,
. ivsize = TF_BLOCK_SIZE ,
. setkey = twofish_setkey_skcipher ,
. encrypt = cbc_encrypt ,
. decrypt = cbc_decrypt ,
2012-02-17 22:48:43 +02:00
} ,
2018-02-19 23:48:09 -08:00
} ;
2011-10-18 13:33:43 +03:00
2011-12-20 12:20:16 +02:00
static bool is_blacklisted_cpu ( void )
{
if ( boot_cpu_data . x86_vendor ! = X86_VENDOR_INTEL )
return false ;
if ( boot_cpu_data . x86 = = 0x06 & &
( boot_cpu_data . x86_model = = 0x1c | |
boot_cpu_data . x86_model = = 0x26 | |
boot_cpu_data . x86_model = = 0x36 ) ) {
/*
* On Atom , twofish - 3 way is slower than original assembler
* implementation . Twofish - 3 way trades off some performance in
* storing blocks in 64 bit registers to allow three blocks to
* be processed parallel . Parallel operation then allows gaining
* more performance than was trade off , on out - of - order CPUs .
2021-03-18 15:28:01 +01:00
* However Atom does not benefit from this parallelism and
2011-12-20 12:20:16 +02:00
* should be blacklisted .
*/
return true ;
}
if ( boot_cpu_data . x86 = = 0x0f ) {
/*
* On Pentium 4 , twofish - 3 way is slower than original assembler
* implementation because excessive uses of 64 bit rotate and
* left - shifts ( which are really slow on P4 ) needed to store and
* handle 128 bit block in two 64 bit registers .
*/
return true ;
}
return false ;
}
static int force ;
module_param ( force , int , 0 ) ;
MODULE_PARM_DESC ( force , " Force module load, ignore CPU blacklist " ) ;
2012-03-15 22:11:57 +02:00
static int __init init ( void )
2011-09-26 16:47:25 +03:00
{
2011-12-20 12:20:16 +02:00
if ( ! force & & is_blacklisted_cpu ( ) ) {
printk ( KERN_INFO
" twofish-x86_64-3way: performance on this CPU "
" would be suboptimal: disabling "
" twofish-x86_64-3way. \n " ) ;
return - ENODEV ;
}
2018-02-19 23:48:09 -08:00
return crypto_register_skciphers ( tf_skciphers ,
ARRAY_SIZE ( tf_skciphers ) ) ;
2011-09-26 16:47:25 +03:00
}
2012-03-15 22:11:57 +02:00
static void __exit fini ( void )
2011-09-26 16:47:25 +03:00
{
2018-02-19 23:48:09 -08:00
crypto_unregister_skciphers ( tf_skciphers , ARRAY_SIZE ( tf_skciphers ) ) ;
2011-09-26 16:47:25 +03:00
}
module_init ( init ) ;
module_exit ( fini ) ;
MODULE_LICENSE ( " GPL " ) ;
MODULE_DESCRIPTION ( " Twofish Cipher Algorithm, 3-way parallel asm optimized " ) ;
2014-11-20 17:05:53 -08:00
MODULE_ALIAS_CRYPTO ( " twofish " ) ;
MODULE_ALIAS_CRYPTO ( " twofish-asm " ) ;