Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3071095imu; Thu, 29 Nov 2018 15:05:20 -0800 (PST) X-Google-Smtp-Source: AFSGD/VSYPSYoJEQmggQszhz0ourgKjXyHns6ltkxTkwhh/oqJAW/6wwsZ5hoXeZJBfcXsT+4bRR X-Received: by 2002:a63:de46:: with SMTP id y6mr2877455pgi.198.1543532719986; Thu, 29 Nov 2018 15:05:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543532719; cv=none; d=google.com; s=arc-20160816; b=obHU7ttfwKsI6ZspCtAhD+4DbjMiaFYRCLAdNUbC/QkjqLm3WQJDCbiWHnlf+6jJLE 9XW5D7cgV55v3xL4X8/AnY8/34rmPny5GPcYFYA9ez1nrMH5UCmOxhtuQf0Dghixghpx buW0Jc8rEgt9i4dBsbm4LWyM8zC0FltJu7cxgPBAXMsJNk2xSYw3OkNwoSmS+V/6Bok+ dLvW6AKaxZ03Hva9yyTIfMqdO7UyStiTSyvggvEpeAi1pLIP2nxg+2bgcHvKOESmhcsu AzKg8L+C1rDKP9UEJnrN56fFivJb8cIqndwUmu2XA8rg0urm/mRuV8Xsp1hBmc/EgvLC FIfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=ULupmYQMZUOuW84espJ8MySzT0PGtSkrFXaOcxBb71Q=; b=Pics0yrXjWeM/+6VQ14wq2TUvJBM8rHGD58mCm9Zm81TbFVNucNwGXwmXOHtgMpy6S Nu64pAPzectb1O8MVVGuUE4C93wJa/ZqmGLwmNBTPsJ4OezJRLfYckVAkeE7pxkh+PDk lIIGrsR1uJOLtGbygHeFtWORRpqvyQpjML7xX2Xb4oTE0dvII8llJ+ajt8v5C28HATOH T2tuOcYx7KCI0TQ76jcnet6KrhVVEAzfb/rMwylGjxC6ulhZ9EWl7s2Pp+j9r6uc5s/S S3kaSQBU0F1ileRwgRVpnqqrlMo539EZ6yyAIeQGJ4LDrhnNDN9BkCarLVf+uRoLCfJe enug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XEFhbF6N; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e6si2887544pgd.428.2018.11.29.15.05.05; Thu, 29 Nov 2018 15:05:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XEFhbF6N; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727176AbeK3KLJ (ORCPT + 99 others); Fri, 30 Nov 2018 05:11:09 -0500 Received: from mail.kernel.org ([198.145.29.99]:44908 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726904AbeK3KKf (ORCPT ); Fri, 30 Nov 2018 05:10:35 -0500 Received: from ebiggers.mtv.corp.google.com (unknown [104.132.1.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 938242147D; Thu, 29 Nov 2018 23:03:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543532607; bh=nBC9OVb3aNTteHpgQGScNZRTgOQT0CvFyx0FsakJaAQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XEFhbF6NuTyY8Si1Wl/P81ibnipLPIEfJHluVBjbnHd5UadlIJkY5xLNSkqzWyeim cXq7NsVzz5AtqX0XFOgMrYm9SjWpepUcDI9Y70vvBsWnnUT22q3/XXyDlA8WwmCF2k iH5FfAyhFjJQip/O5UvoXBc1VsDXSc3KDYB9N8KI= From: Eric Biggers To: linux-crypto@vger.kernel.org Cc: Paul Crowley , Martin Willi , Milan Broz , "Jason A . Donenfeld" , linux-kernel@vger.kernel.org Subject: [PATCH v2 6/6] crypto: x86/chacha - add XChaCha12 support Date: Thu, 29 Nov 2018 15:02:17 -0800 Message-Id: <20181129230217.158038-7-ebiggers@kernel.org> X-Mailer: git-send-email 2.20.0.rc0.387.gc7a69e6b6c-goog In-Reply-To: <20181129230217.158038-1-ebiggers@kernel.org> References: <20181129230217.158038-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Biggers Now that the x86_64 SIMD implementations of ChaCha20 and XChaCha20 have been refactored to support varying the number of rounds, add support for XChaCha12. This is identical to XChaCha20 except for the number of rounds, which is 12 instead of 20. This can be used by Adiantum. Signed-off-by: Eric Biggers --- arch/x86/crypto/chacha_glue.c | 17 +++++++++++++++++ crypto/Kconfig | 4 ++-- 2 files changed, 19 insertions(+), 2 deletions(-) diff --git a/arch/x86/crypto/chacha_glue.c b/arch/x86/crypto/chacha_glue.c index 83cfb450b816..3db775852205 100644 --- a/arch/x86/crypto/chacha_glue.c +++ b/arch/x86/crypto/chacha_glue.c @@ -225,6 +225,21 @@ static struct skcipher_alg algs[] = { .setkey = crypto_chacha20_setkey, .encrypt = xchacha_simd, .decrypt = xchacha_simd, + }, { + .base.cra_name = "xchacha12", + .base.cra_driver_name = "xchacha12-simd", + .base.cra_priority = 300, + .base.cra_blocksize = 1, + .base.cra_ctxsize = sizeof(struct chacha_ctx), + .base.cra_module = THIS_MODULE, + + .min_keysize = CHACHA_KEY_SIZE, + .max_keysize = CHACHA_KEY_SIZE, + .ivsize = XCHACHA_IV_SIZE, + .chunksize = CHACHA_BLOCK_SIZE, + .setkey = crypto_chacha12_setkey, + .encrypt = xchacha_simd, + .decrypt = xchacha_simd, }, }; @@ -261,3 +276,5 @@ MODULE_ALIAS_CRYPTO("chacha20"); MODULE_ALIAS_CRYPTO("chacha20-simd"); MODULE_ALIAS_CRYPTO("xchacha20"); MODULE_ALIAS_CRYPTO("xchacha20-simd"); +MODULE_ALIAS_CRYPTO("xchacha12"); +MODULE_ALIAS_CRYPTO("xchacha12-simd"); diff --git a/crypto/Kconfig b/crypto/Kconfig index df466771e9bf..29865c599b04 100644 --- a/crypto/Kconfig +++ b/crypto/Kconfig @@ -1473,8 +1473,8 @@ config CRYPTO_CHACHA20_X86_64 select CRYPTO_BLKCIPHER select CRYPTO_CHACHA20 help - SSSE3, AVX2, and AVX-512VL optimized implementations of the ChaCha20 - and XChaCha20 stream ciphers. + SSSE3, AVX2, and AVX-512VL optimized implementations of the ChaCha20, + XChaCha20, and XChaCha12 stream ciphers. config CRYPTO_SEED tristate "SEED cipher algorithm" -- 2.20.0.rc0.387.gc7a69e6b6c-goog