Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1178744imu; Mon, 5 Nov 2018 15:28:24 -0800 (PST) X-Google-Smtp-Source: AJdET5dbd9yn0JBxytVd5oVMSiiSHwbcycgUClK8MrDgeL86/tkGgbbMLYkz5zW1MIEMX9Agyqoz X-Received: by 2002:a63:dc54:: with SMTP id f20mr22066072pgj.410.1541460503950; Mon, 05 Nov 2018 15:28:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541460503; cv=none; d=google.com; s=arc-20160816; b=QqyFiPNAOUu0hBHecVcZZqAO6SdX8MXNtwAmjsKitQkGLRJM+cUvxzyBnBNQc1SZn1 5VrVjzU4VZo6LTCrnWsghrTQlBeDlAqLrO4e7Ael9YXTcJY9Tm9xgTlUgbRbQvUGCIVL UE1vfOVHcz2xfe++p5fJm3GOzfiefrmoB2i/B1dRkspdKPCiM4P8jUFd9mwK3ycz+n/8 juGdNAZbBO51Gdi8qLwCQuPEFMZTv7Rvv8Cjkjj3fcuR+MTJAr1Cq5k4YJvUwq3cp+mS wuYuEaskzHt7DRYmmOXefvqkBEkgHmCMKfUCwWTGXp/F7T5u0+9gQoT4+yKvQw5kkR1s oI3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=lDBk8Nv7qytezFNwNrgX1flk49ZoImbFeUrRHl2/hug=; b=NFT5ERlBXjspl6fVXtCUu7g+5iQ/sVj+m8C+Sa9pGp4DN7LfUUw5t7vUinIYzK7hm5 DgJ/7LlTw22SqLAFxlnyCg7n7Sw4X3cn5ENg96cjxSeA8Edb6/UfeMFF49sOqz3m8Gdk bL7GJZMcSpsSBYB7DlRL3zyIUp1n6QKQ/KcptZ35eEan0petHHrS/dyE7RfULS4KYg9s mvBXTOg1yn2O6uSZSCplYxWELO0cMNwUA4bz64QLAiS4F3tTJa9eR/LO9IhQa58q+scM y+Qaz1PaA9K1RFi8BwPcrO7f0ShLh1fBZQ0aZKb/qy3guh7rbJji/q9ANypeoSDhc6P6 3zRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tLcJOvsZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u8-v6si37685631plh.188.2018.11.05.15.28.08; Mon, 05 Nov 2018 15:28:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tLcJOvsZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729571AbeKFItj (ORCPT + 99 others); Tue, 6 Nov 2018 03:49:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:54570 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728874AbeKFItO (ORCPT ); Tue, 6 Nov 2018 03:49:14 -0500 Received: from ebiggers-linuxstation.kir.corp.google.com (unknown [104.132.51.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A757320882; Mon, 5 Nov 2018 23:27:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541460423; bh=UfVOfpNm8KumA3Dquyb1Ebjv7QdPISAdQPzqU9X5I5I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tLcJOvsZfYUcdcvRuhx1XxV8QeymOvIeZ12oyz281QuN6iZOATsfWcYSNPpGWGzH9 Hdmx25fmgFFFMtmPYiMZJhaQ6rxbHbnmmnix0ryeTdL9FPDGx0+ozGsHye7QE9yqzb BZAXnJYGhs53KQUANxT8ylz6mf8wyTpp0gRbsric= From: Eric Biggers To: linux-crypto@vger.kernel.org Cc: linux-fscrypt@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Herbert Xu , Paul Crowley , Greg Kaiser , "Jason A . Donenfeld" , Samuel Neves , Tomer Ashur Subject: [RFC PATCH v3 09/15] crypto: arm/chacha - add XChaCha12 support Date: Mon, 5 Nov 2018 15:25:20 -0800 Message-Id: <20181105232526.173947-10-ebiggers@kernel.org> X-Mailer: git-send-email 2.19.1.930.g4563a0d9d0-goog In-Reply-To: <20181105232526.173947-1-ebiggers@kernel.org> References: <20181105232526.173947-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Biggers Now that the 32-bit ARM NEON implementation of ChaCha20 and XChaCha20 has been refactored to support varying the number of rounds, add support for XChaCha12. This is identical to XChaCha20 except for the number of rounds, which is 12 instead of 20. XChaCha12 is faster than XChaCha20 but has a lower security margin, though still greater than AES-256's since the best known attacks make it through only 7 rounds. See the patch "crypto: chacha - add XChaCha12 support" for more details about why we need XChaCha12 support. Reviewed-by: Ard Biesheuvel Signed-off-by: Eric Biggers --- arch/arm/crypto/Kconfig | 2 +- arch/arm/crypto/chacha-neon-glue.c | 21 ++++++++++++++++++++- 2 files changed, 21 insertions(+), 2 deletions(-) diff --git a/arch/arm/crypto/Kconfig b/arch/arm/crypto/Kconfig index 0aa1471f27d2..cc932d9bba56 100644 --- a/arch/arm/crypto/Kconfig +++ b/arch/arm/crypto/Kconfig @@ -117,7 +117,7 @@ config CRYPTO_CRC32_ARM_CE select CRYPTO_HASH config CRYPTO_CHACHA20_NEON - tristate "NEON accelerated ChaCha20 stream cipher algorithms" + tristate "NEON accelerated ChaCha stream cipher algorithms" depends on KERNEL_MODE_NEON select CRYPTO_BLKCIPHER select CRYPTO_CHACHA20 diff --git a/arch/arm/crypto/chacha-neon-glue.c b/arch/arm/crypto/chacha-neon-glue.c index 385557d38634..9d6fda81986d 100644 --- a/arch/arm/crypto/chacha-neon-glue.c +++ b/arch/arm/crypto/chacha-neon-glue.c @@ -1,5 +1,6 @@ /* - * ChaCha20 (RFC7539) and XChaCha20 stream ciphers, NEON accelerated + * ARM NEON accelerated ChaCha and XChaCha stream ciphers, + * including ChaCha20 (RFC7539) * * Copyright (C) 2016 Linaro, Ltd. * @@ -154,6 +155,22 @@ static struct skcipher_alg algs[] = { .setkey = crypto_chacha20_setkey, .encrypt = xchacha_neon, .decrypt = xchacha_neon, + }, { + .base.cra_name = "xchacha12", + .base.cra_driver_name = "xchacha12-neon", + .base.cra_priority = 300, + .base.cra_blocksize = 1, + .base.cra_ctxsize = sizeof(struct chacha_ctx), + .base.cra_module = THIS_MODULE, + + .min_keysize = CHACHA_KEY_SIZE, + .max_keysize = CHACHA_KEY_SIZE, + .ivsize = XCHACHA_IV_SIZE, + .chunksize = CHACHA_BLOCK_SIZE, + .walksize = 4 * CHACHA_BLOCK_SIZE, + .setkey = crypto_chacha12_setkey, + .encrypt = xchacha_neon, + .decrypt = xchacha_neon, } }; @@ -180,3 +197,5 @@ MODULE_ALIAS_CRYPTO("chacha20"); MODULE_ALIAS_CRYPTO("chacha20-neon"); MODULE_ALIAS_CRYPTO("xchacha20"); MODULE_ALIAS_CRYPTO("xchacha20-neon"); +MODULE_ALIAS_CRYPTO("xchacha12"); +MODULE_ALIAS_CRYPTO("xchacha12-neon"); -- 2.19.1.930.g4563a0d9d0-goog