2013-03-27 01:00:02 +04:00
/*
* Cryptographic API .
*
* Glue code for the SHA512 Secure Hash Algorithm assembler
* implementation using supplemental SSE3 / AVX / AVX2 instructions .
*
* This file is based on sha512_generic . c
*
* Copyright ( C ) 2013 Intel Corporation
* Author : Tim Chen < tim . c . chen @ linux . intel . com >
*
* This program is free software ; you can redistribute it and / or modify it
* under the terms of the GNU General Public License as published by the Free
* Software Foundation ; either version 2 of the License , or ( at your option )
* any later version .
*
* THE SOFTWARE IS PROVIDED " AS IS " , WITHOUT WARRANTY OF ANY KIND ,
* EXPRESS OR IMPLIED , INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY , FITNESS FOR A PARTICULAR PURPOSE AND
* NONINFRINGEMENT . IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
* BE LIABLE FOR ANY CLAIM , DAMAGES OR OTHER LIABILITY , WHETHER IN AN
* ACTION OF CONTRACT , TORT OR OTHERWISE , ARISING FROM , OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE .
*
*/
# define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
# include <crypto/internal/hash.h>
# include <linux/init.h>
# include <linux/module.h>
# include <linux/mm.h>
# include <linux/cryptohash.h>
# include <linux/types.h>
# include <crypto/sha.h>
2015-04-09 13:55:48 +03:00
# include <crypto/sha512_base.h>
2015-04-24 03:46:00 +03:00
# include <asm/fpu/api.h>
2013-03-27 01:00:02 +04:00
# include <linux/string.h>
2015-04-09 13:55:48 +03:00
asmlinkage void sha512_transform_ssse3 ( u64 * digest , const char * data ,
u64 rounds ) ;
2013-03-27 01:00:02 +04:00
2015-09-17 02:35:53 +03:00
typedef void ( sha512_transform_fn ) ( u64 * digest , const char * data , u64 rounds ) ;
2013-03-27 01:00:02 +04:00
2015-09-17 02:35:53 +03:00
static int sha512_update ( struct shash_desc * desc , const u8 * data ,
unsigned int len , sha512_transform_fn * sha512_xform )
2013-03-27 01:00:02 +04:00
{
struct sha512_state * sctx = shash_desc_ctx ( desc ) ;
2015-04-09 13:55:48 +03:00
if ( ! irq_fpu_usable ( ) | |
( sctx - > count [ 0 ] % SHA512_BLOCK_SIZE ) + len < SHA512_BLOCK_SIZE )
return crypto_sha512_update ( desc , data , len ) ;
2013-03-27 01:00:02 +04:00
2015-04-09 13:55:48 +03:00
/* make sure casting to sha512_block_fn() is safe */
BUILD_BUG_ON ( offsetof ( struct sha512_state , state ) ! = 0 ) ;
2013-03-27 01:00:02 +04:00
2015-04-09 13:55:48 +03:00
kernel_fpu_begin ( ) ;
sha512_base_do_update ( desc , data , len ,
2015-09-17 02:35:53 +03:00
( sha512_block_fn * ) sha512_xform ) ;
2015-04-09 13:55:48 +03:00
kernel_fpu_end ( ) ;
2013-03-27 01:00:02 +04:00
return 0 ;
}
2015-09-17 02:35:53 +03:00
static int sha512_finup ( struct shash_desc * desc , const u8 * data ,
unsigned int len , u8 * out , sha512_transform_fn * sha512_xform )
2013-03-27 01:00:02 +04:00
{
2015-04-09 13:55:48 +03:00
if ( ! irq_fpu_usable ( ) )
return crypto_sha512_finup ( desc , data , len , out ) ;
2013-03-27 01:00:02 +04:00
2015-04-09 13:55:48 +03:00
kernel_fpu_begin ( ) ;
if ( len )
sha512_base_do_update ( desc , data , len ,
2015-09-17 02:35:53 +03:00
( sha512_block_fn * ) sha512_xform ) ;
sha512_base_do_finalize ( desc , ( sha512_block_fn * ) sha512_xform ) ;
2015-04-09 13:55:48 +03:00
kernel_fpu_end ( ) ;
2013-03-27 01:00:02 +04:00
2015-04-09 13:55:48 +03:00
return sha512_base_finish ( desc , out ) ;
2013-03-27 01:00:02 +04:00
}
2015-09-17 02:35:53 +03:00
static int sha512_ssse3_update ( struct shash_desc * desc , const u8 * data ,
unsigned int len )
{
return sha512_update ( desc , data , len , sha512_transform_ssse3 ) ;
}
static int sha512_ssse3_finup ( struct shash_desc * desc , const u8 * data ,
unsigned int len , u8 * out )
{
return sha512_finup ( desc , data , len , out , sha512_transform_ssse3 ) ;
}
2013-03-27 01:00:02 +04:00
/* Add padding and return the message digest. */
static int sha512_ssse3_final ( struct shash_desc * desc , u8 * out )
{
2015-04-09 13:55:48 +03:00
return sha512_ssse3_finup ( desc , NULL , 0 , out ) ;
2013-05-21 18:10:44 +04:00
}
2015-09-17 02:35:53 +03:00
static struct shash_alg sha512_ssse3_algs [ ] = { {
2013-03-27 01:00:02 +04:00
. digestsize = SHA512_DIGEST_SIZE ,
2015-04-09 13:55:48 +03:00
. init = sha512_base_init ,
2013-03-27 01:00:02 +04:00
. update = sha512_ssse3_update ,
. final = sha512_ssse3_final ,
2015-04-09 13:55:48 +03:00
. finup = sha512_ssse3_finup ,
2013-03-27 01:00:02 +04:00
. descsize = sizeof ( struct sha512_state ) ,
. base = {
. cra_name = " sha512 " ,
. cra_driver_name = " sha512-ssse3 " ,
. cra_priority = 150 ,
. cra_flags = CRYPTO_ALG_TYPE_SHASH ,
. cra_blocksize = SHA512_BLOCK_SIZE ,
. cra_module = THIS_MODULE ,
}
2013-05-21 18:10:44 +04:00
} , {
. digestsize = SHA384_DIGEST_SIZE ,
2015-04-09 13:55:48 +03:00
. init = sha384_base_init ,
2013-05-21 18:10:44 +04:00
. update = sha512_ssse3_update ,
2015-04-09 13:55:48 +03:00
. final = sha512_ssse3_final ,
. finup = sha512_ssse3_finup ,
2013-05-21 18:10:44 +04:00
. descsize = sizeof ( struct sha512_state ) ,
. base = {
. cra_name = " sha384 " ,
. cra_driver_name = " sha384-ssse3 " ,
. cra_priority = 150 ,
. cra_flags = CRYPTO_ALG_TYPE_SHASH ,
. cra_blocksize = SHA384_BLOCK_SIZE ,
. cra_module = THIS_MODULE ,
}
} } ;
2013-03-27 01:00:02 +04:00
2015-09-17 02:35:53 +03:00
static int register_sha512_ssse3 ( void )
{
if ( boot_cpu_has ( X86_FEATURE_SSSE3 ) )
return crypto_register_shashes ( sha512_ssse3_algs ,
ARRAY_SIZE ( sha512_ssse3_algs ) ) ;
return 0 ;
}
static void unregister_sha512_ssse3 ( void )
{
if ( boot_cpu_has ( X86_FEATURE_SSSE3 ) )
crypto_unregister_shashes ( sha512_ssse3_algs ,
ARRAY_SIZE ( sha512_ssse3_algs ) ) ;
}
2013-03-27 01:00:02 +04:00
# ifdef CONFIG_AS_AVX
2015-09-17 02:35:53 +03:00
asmlinkage void sha512_transform_avx ( u64 * digest , const char * data ,
u64 rounds ) ;
static bool avx_usable ( void )
2013-03-27 01:00:02 +04:00
{
2015-09-03 02:31:26 +03:00
if ( ! cpu_has_xfeatures ( XFEATURE_MASK_SSE | XFEATURE_MASK_YMM , NULL ) ) {
2016-04-04 23:24:56 +03:00
if ( boot_cpu_has ( X86_FEATURE_AVX ) )
2015-04-28 11:11:24 +03:00
pr_info ( " AVX detected but unusable. \n " ) ;
2013-03-27 01:00:02 +04:00
return false ;
}
return true ;
}
2015-09-17 02:35:53 +03:00
static int sha512_avx_update ( struct shash_desc * desc , const u8 * data ,
unsigned int len )
2013-03-27 01:00:02 +04:00
{
2015-09-17 02:35:53 +03:00
return sha512_update ( desc , data , len , sha512_transform_avx ) ;
}
2013-03-27 01:00:02 +04:00
2015-09-17 02:35:53 +03:00
static int sha512_avx_finup ( struct shash_desc * desc , const u8 * data ,
unsigned int len , u8 * out )
{
return sha512_finup ( desc , data , len , out , sha512_transform_avx ) ;
}
/* Add padding and return the message digest. */
static int sha512_avx_final ( struct shash_desc * desc , u8 * out )
{
return sha512_avx_finup ( desc , NULL , 0 , out ) ;
}
static struct shash_alg sha512_avx_algs [ ] = { {
. digestsize = SHA512_DIGEST_SIZE ,
. init = sha512_base_init ,
. update = sha512_avx_update ,
. final = sha512_avx_final ,
. finup = sha512_avx_finup ,
. descsize = sizeof ( struct sha512_state ) ,
. base = {
. cra_name = " sha512 " ,
. cra_driver_name = " sha512-avx " ,
. cra_priority = 160 ,
. cra_flags = CRYPTO_ALG_TYPE_SHASH ,
. cra_blocksize = SHA512_BLOCK_SIZE ,
. cra_module = THIS_MODULE ,
2013-03-27 01:00:02 +04:00
}
2015-09-17 02:35:53 +03:00
} , {
. digestsize = SHA384_DIGEST_SIZE ,
. init = sha384_base_init ,
. update = sha512_avx_update ,
. final = sha512_avx_final ,
. finup = sha512_avx_finup ,
. descsize = sizeof ( struct sha512_state ) ,
. base = {
. cra_name = " sha384 " ,
. cra_driver_name = " sha384-avx " ,
. cra_priority = 160 ,
. cra_flags = CRYPTO_ALG_TYPE_SHASH ,
. cra_blocksize = SHA384_BLOCK_SIZE ,
. cra_module = THIS_MODULE ,
}
} } ;
2013-03-27 01:00:02 +04:00
2015-09-17 02:35:53 +03:00
static int register_sha512_avx ( void )
{
if ( avx_usable ( ) )
return crypto_register_shashes ( sha512_avx_algs ,
ARRAY_SIZE ( sha512_avx_algs ) ) ;
return 0 ;
}
static void unregister_sha512_avx ( void )
{
if ( avx_usable ( ) )
crypto_unregister_shashes ( sha512_avx_algs ,
ARRAY_SIZE ( sha512_avx_algs ) ) ;
}
# else
static inline int register_sha512_avx ( void ) { return 0 ; }
static inline void unregister_sha512_avx ( void ) { }
2013-03-27 01:00:02 +04:00
# endif
2015-09-17 02:35:53 +03:00
# if defined(CONFIG_AS_AVX2) && defined(CONFIG_AS_AVX)
asmlinkage void sha512_transform_rorx ( u64 * digest , const char * data ,
u64 rounds ) ;
static int sha512_avx2_update ( struct shash_desc * desc , const u8 * data ,
unsigned int len )
{
return sha512_update ( desc , data , len , sha512_transform_rorx ) ;
}
static int sha512_avx2_finup ( struct shash_desc * desc , const u8 * data ,
unsigned int len , u8 * out )
{
return sha512_finup ( desc , data , len , out , sha512_transform_rorx ) ;
}
/* Add padding and return the message digest. */
static int sha512_avx2_final ( struct shash_desc * desc , u8 * out )
{
return sha512_avx2_finup ( desc , NULL , 0 , out ) ;
}
static struct shash_alg sha512_avx2_algs [ ] = { {
. digestsize = SHA512_DIGEST_SIZE ,
. init = sha512_base_init ,
. update = sha512_avx2_update ,
. final = sha512_avx2_final ,
. finup = sha512_avx2_finup ,
. descsize = sizeof ( struct sha512_state ) ,
. base = {
. cra_name = " sha512 " ,
. cra_driver_name = " sha512-avx2 " ,
. cra_priority = 170 ,
. cra_flags = CRYPTO_ALG_TYPE_SHASH ,
. cra_blocksize = SHA512_BLOCK_SIZE ,
. cra_module = THIS_MODULE ,
}
} , {
. digestsize = SHA384_DIGEST_SIZE ,
. init = sha384_base_init ,
. update = sha512_avx2_update ,
. final = sha512_avx2_final ,
. finup = sha512_avx2_finup ,
. descsize = sizeof ( struct sha512_state ) ,
. base = {
. cra_name = " sha384 " ,
. cra_driver_name = " sha384-avx2 " ,
. cra_priority = 170 ,
. cra_flags = CRYPTO_ALG_TYPE_SHASH ,
. cra_blocksize = SHA384_BLOCK_SIZE ,
. cra_module = THIS_MODULE ,
}
} } ;
static bool avx2_usable ( void )
{
if ( avx_usable ( ) & & boot_cpu_has ( X86_FEATURE_AVX2 ) & &
boot_cpu_has ( X86_FEATURE_BMI2 ) )
return true ;
return false ;
}
static int register_sha512_avx2 ( void )
{
if ( avx2_usable ( ) )
return crypto_register_shashes ( sha512_avx2_algs ,
ARRAY_SIZE ( sha512_avx2_algs ) ) ;
return 0 ;
}
static void unregister_sha512_avx2 ( void )
{
if ( avx2_usable ( ) )
crypto_unregister_shashes ( sha512_avx2_algs ,
ARRAY_SIZE ( sha512_avx2_algs ) ) ;
}
# else
static inline int register_sha512_avx2 ( void ) { return 0 ; }
static inline void unregister_sha512_avx2 ( void ) { }
2013-03-27 01:00:02 +04:00
# endif
2015-09-17 02:35:53 +03:00
static int __init sha512_ssse3_mod_init ( void )
{
if ( register_sha512_ssse3 ( ) )
goto fail ;
if ( register_sha512_avx ( ) ) {
unregister_sha512_ssse3 ( ) ;
goto fail ;
2013-03-27 01:00:02 +04:00
}
2015-09-17 02:35:53 +03:00
if ( register_sha512_avx2 ( ) ) {
unregister_sha512_avx ( ) ;
unregister_sha512_ssse3 ( ) ;
goto fail ;
}
return 0 ;
fail :
2013-03-27 01:00:02 +04:00
return - ENODEV ;
}
static void __exit sha512_ssse3_mod_fini ( void )
{
2015-09-17 02:35:53 +03:00
unregister_sha512_avx2 ( ) ;
unregister_sha512_avx ( ) ;
unregister_sha512_ssse3 ( ) ;
2013-03-27 01:00:02 +04:00
}
module_init ( sha512_ssse3_mod_init ) ;
module_exit ( sha512_ssse3_mod_fini ) ;
MODULE_LICENSE ( " GPL " ) ;
MODULE_DESCRIPTION ( " SHA512 Secure Hash Algorithm, Supplemental SSE3 accelerated " ) ;
2014-11-21 04:05:53 +03:00
MODULE_ALIAS_CRYPTO ( " sha512 " ) ;
2016-05-13 15:02:00 +03:00
MODULE_ALIAS_CRYPTO ( " sha512-ssse3 " ) ;
MODULE_ALIAS_CRYPTO ( " sha512-avx " ) ;
MODULE_ALIAS_CRYPTO ( " sha512-avx2 " ) ;
2014-11-21 04:05:53 +03:00
MODULE_ALIAS_CRYPTO ( " sha384 " ) ;
2016-05-13 15:02:00 +03:00
MODULE_ALIAS_CRYPTO ( " sha384-ssse3 " ) ;
MODULE_ALIAS_CRYPTO ( " sha384-avx " ) ;
MODULE_ALIAS_CRYPTO ( " sha384-avx2 " ) ;