Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp2115138rwn; Fri, 16 Sep 2022 06:02:50 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6xBHlIC0KhlyoIBRz7LxZGz+ozF24ktYI/Rn0wVCbrKYkSKNIsfgN+ZcnTPirIiKJWq0kX X-Received: by 2002:a17:907:8687:b0:730:7c7b:b9ce with SMTP id qa7-20020a170907868700b007307c7bb9cemr3480771ejc.656.1663333370141; Fri, 16 Sep 2022 06:02:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663333370; cv=none; d=google.com; s=arc-20160816; b=NijUKSvgHyTg6Aw5N/bwH4Tt6QymyY6R36e1MR6OwO/9utgflO/V6F33mkirGxxe45 eah1Ui1st3NSdcDTEgyLehpVnPwkZf03jWz3g4Cz/FWBUYyUe/jg23KwYEnDb0oogpA9 bwNkj6yX4e8w9xf4oF+4oM9ShpT9IZmHwx7rgYWaHgBFhIcF/GF0Bvz8K8TFHprnS7vV DaeGdsS7CSrQB9Z9Otsld9BhaBQdRT3d5cEU0ucYMcgOwuP8765LqXGH/9TT/bkvSjnk HMkpGv1pU8S+kKpaSmh4TebOKaUy43ZsVw+qcwSc/27/V21sdDltQ/5utb1badj2vYAl jwmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature; bh=NhrqvZnuCci1IT2EJoYVm3Gz6nKG5qgvgSBl8lC0wuI=; b=y8nC0lGkLYQykDs/Q5EZTBroHH2wEFOmMAmUrtfi3SMQwOUYiYAOZ6aExOw5eVaK3z zIixV0X154tKdYxKsdYqdvdjYZU2SGpdEnXQdw2/NtoEElix21GVWh1ImAr4l/WioCwi /oHNVH6Ft2es5rhhQPskHQgKq55DRLj6qZqTLxpoYPBwijxIVqPnxPU2zOrEz/qfKtQM RWz2ajh/hjIvpFxDH1iJzNHolZTddi6SKcapwJC7RudSe228kn+f2TbSWMJQ5aRmY5/H tVXnT5l0QjVwnWHxH1M2VujKHuTPQrYcF5L0gtGEDZjjfEaYRx29LMh7ZNKkFn6nfgRS hsTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b="g8Z8/IKX"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nd11-20020a170907628b00b00741a1daf191si20722595ejc.401.2022.09.16.06.02.02; Fri, 16 Sep 2022 06:02:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b="g8Z8/IKX"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229510AbiIPM6H (ORCPT + 99 others); Fri, 16 Sep 2022 08:58:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46350 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231139AbiIPM6C (ORCPT ); Fri, 16 Sep 2022 08:58:02 -0400 Received: from mail-pj1-x1034.google.com (mail-pj1-x1034.google.com [IPv6:2607:f8b0:4864:20::1034]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3C20B7F244 for ; Fri, 16 Sep 2022 05:58:00 -0700 (PDT) Received: by mail-pj1-x1034.google.com with SMTP id s14-20020a17090a6e4e00b0020057c70943so25611699pjm.1 for ; Fri, 16 Sep 2022 05:58:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=references:in-reply-to:message-id:date:subject:cc:to:from:from:to :cc:subject:date; bh=NhrqvZnuCci1IT2EJoYVm3Gz6nKG5qgvgSBl8lC0wuI=; b=g8Z8/IKXJOcv5iloSzH+uybTFS1ICtauq+zJ+Z8SCZZ+b2hhbv0i4GVyeF1OZaoHFz yRpBsTKu4xUoDs7iNyzLd4w8jDDL5V/CLfd8ZW93gyTthi35H1hgvm5nEx3F0H4wKUHM rwgEzWRQHzy+qv9qlm4cqC9H1N4JDekGCUeAAkRvO0asca7V7Gbo+/ffd604+57cY5ng UGs823lVNvzP2/Xvu3asSgIOhMGjewR2o7IrX6rL4A/WdTfk+qCzotn3tHrt2VUNNwMl OuCyVVwbzg96bqp8CwT/t3SAO1QwaKxdW51rCI7wZO1HnbRUXALq4OL4Wcosc2TV7yVt qYeg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=references:in-reply-to:message-id:date:subject:cc:to:from :x-gm-message-state:from:to:cc:subject:date; bh=NhrqvZnuCci1IT2EJoYVm3Gz6nKG5qgvgSBl8lC0wuI=; b=Z47WgP3cM/rO6e4C7idHtn/SMFfnaKi12oKD0ijC9xiiBORPScL04BSfVkLfzeGmhN ebg35ez5OqaKbAMomW4L64KieBFiIEuA0CRWS2vajrOWW9WodoJ0M6hTnHaGRVU3AGlx Ff//EGl8MNsjMK1Guyu0M4WqffOAKIv8rZKWGl5vcczGoqZjvE89jLFcn9W9hmZA8crP 5oyAf3xVescprzBTNJRIh+E7fehw3Zvjejcc0hiYFMM7+ooBQH3PC12KyJaX45CGhaKL ggWQ+2D87bnlXIRZkmmgbxjJOoCAYeASNMyFefYm/ec4gKw852ArJjyT8NHRq+yQge9v jrNA== X-Gm-Message-State: ACrzQf0Ub/H29VkyqXgRhvP2YA7/WHiLJga+ZCBFYwVHOQf9RUqb61a/ Wm6TgUxN5yUi7wfs3BrV/xtdtzlj7LE= X-Received: by 2002:a17:902:e742:b0:176:dc6b:eecc with SMTP id p2-20020a170902e74200b00176dc6beeccmr4763422plf.104.1663333079435; Fri, 16 Sep 2022 05:57:59 -0700 (PDT) Received: from localhost.localdomain ([182.213.254.91]) by smtp.gmail.com with ESMTPSA id f20-20020a170902f39400b0017829a3df46sm11941062ple.204.2022.09.16.05.57.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 16 Sep 2022 05:57:58 -0700 (PDT) From: Taehee Yoo To: linux-crypto@vger.kernel.org, herbert@gondor.apana.org.au, davem@davemloft.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, jussi.kivilinna@iki.fi, elliott@hpe.com, peterz@infradead.org Cc: ap420073@gmail.com Subject: [PATCH v4 1/3] crypto: aria: prepare generic module for optimized implementations Date: Fri, 16 Sep 2022 12:57:34 +0000 Message-Id: <20220916125736.23598-2-ap420073@gmail.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220916125736.23598-1-ap420073@gmail.com> References: <20220916125736.23598-1-ap420073@gmail.com> X-Spam-Status: No, score=-1.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org It renames aria to aria_generic and exports some functions such as aria_set_key(), aria_encrypt(), and aria_decrypt() to be able to be used by aria-avx implementation. Signed-off-by: Taehee Yoo --- v4: - No changes. v3: - No changes. v2: - No changes. crypto/Makefile | 2 +- crypto/{aria.c => aria_generic.c} | 39 +++++++++++++++++++++++++------ include/crypto/aria.h | 17 ++++++-------- 3 files changed, 40 insertions(+), 18 deletions(-) rename crypto/{aria.c => aria_generic.c} (86%) diff --git a/crypto/Makefile b/crypto/Makefile index a6f94e04e1da..303b21c43df0 100644 --- a/crypto/Makefile +++ b/crypto/Makefile @@ -149,7 +149,7 @@ obj-$(CONFIG_CRYPTO_TEA) += tea.o obj-$(CONFIG_CRYPTO_KHAZAD) += khazad.o obj-$(CONFIG_CRYPTO_ANUBIS) += anubis.o obj-$(CONFIG_CRYPTO_SEED) += seed.o -obj-$(CONFIG_CRYPTO_ARIA) += aria.o +obj-$(CONFIG_CRYPTO_ARIA) += aria_generic.o obj-$(CONFIG_CRYPTO_CHACHA20) += chacha_generic.o obj-$(CONFIG_CRYPTO_POLY1305) += poly1305_generic.o obj-$(CONFIG_CRYPTO_DEFLATE) += deflate.o diff --git a/crypto/aria.c b/crypto/aria_generic.c similarity index 86% rename from crypto/aria.c rename to crypto/aria_generic.c index ac3dffac34bb..4cc29b82b99d 100644 --- a/crypto/aria.c +++ b/crypto/aria_generic.c @@ -16,6 +16,14 @@ #include +static const u32 key_rc[20] = { + 0x517cc1b7, 0x27220a94, 0xfe13abe8, 0xfa9a6ee0, + 0x6db14acc, 0x9e21c820, 0xff28b1d5, 0xef5de2b0, + 0xdb92371d, 0x2126e970, 0x03249775, 0x04e8c90e, + 0x517cc1b7, 0x27220a94, 0xfe13abe8, 0xfa9a6ee0, + 0x6db14acc, 0x9e21c820, 0xff28b1d5, 0xef5de2b0 +}; + static void aria_set_encrypt_key(struct aria_ctx *ctx, const u8 *in_key, unsigned int key_len) { @@ -25,7 +33,7 @@ static void aria_set_encrypt_key(struct aria_ctx *ctx, const u8 *in_key, const u32 *ck; int rkidx = 0; - ck = &key_rc[(key_len - 16) / 8][0]; + ck = &key_rc[(key_len - 16) / 2]; w0[0] = be32_to_cpu(key[0]); w0[1] = be32_to_cpu(key[1]); @@ -163,8 +171,7 @@ static void aria_set_decrypt_key(struct aria_ctx *ctx) } } -static int aria_set_key(struct crypto_tfm *tfm, const u8 *in_key, - unsigned int key_len) +int aria_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) { struct aria_ctx *ctx = crypto_tfm_ctx(tfm); @@ -179,6 +186,7 @@ static int aria_set_key(struct crypto_tfm *tfm, const u8 *in_key, return 0; } +EXPORT_SYMBOL_GPL(aria_set_key); static void __aria_crypt(struct aria_ctx *ctx, u8 *out, const u8 *in, u32 key[][ARIA_RD_KEY_WORDS]) @@ -235,14 +243,30 @@ static void __aria_crypt(struct aria_ctx *ctx, u8 *out, const u8 *in, dst[3] = cpu_to_be32(reg3); } -static void aria_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) +void aria_encrypt(void *_ctx, u8 *out, const u8 *in) +{ + struct aria_ctx *ctx = (struct aria_ctx *)_ctx; + + __aria_crypt(ctx, out, in, ctx->enc_key); +} +EXPORT_SYMBOL_GPL(aria_encrypt); + +void aria_decrypt(void *_ctx, u8 *out, const u8 *in) +{ + struct aria_ctx *ctx = (struct aria_ctx *)_ctx; + + __aria_crypt(ctx, out, in, ctx->dec_key); +} +EXPORT_SYMBOL_GPL(aria_decrypt); + +static void __aria_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) { struct aria_ctx *ctx = crypto_tfm_ctx(tfm); __aria_crypt(ctx, out, in, ctx->enc_key); } -static void aria_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) +static void __aria_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) { struct aria_ctx *ctx = crypto_tfm_ctx(tfm); @@ -263,8 +287,8 @@ static struct crypto_alg aria_alg = { .cia_min_keysize = ARIA_MIN_KEY_SIZE, .cia_max_keysize = ARIA_MAX_KEY_SIZE, .cia_setkey = aria_set_key, - .cia_encrypt = aria_encrypt, - .cia_decrypt = aria_decrypt + .cia_encrypt = __aria_encrypt, + .cia_decrypt = __aria_decrypt } } }; @@ -286,3 +310,4 @@ MODULE_DESCRIPTION("ARIA Cipher Algorithm"); MODULE_LICENSE("GPL"); MODULE_AUTHOR("Taehee Yoo "); MODULE_ALIAS_CRYPTO("aria"); +MODULE_ALIAS_CRYPTO("aria-generic"); diff --git a/include/crypto/aria.h b/include/crypto/aria.h index 4a86661788e8..254da46cc385 100644 --- a/include/crypto/aria.h +++ b/include/crypto/aria.h @@ -32,18 +32,10 @@ #define ARIA_RD_KEY_WORDS (ARIA_BLOCK_SIZE / sizeof(u32)) struct aria_ctx { - int key_length; - int rounds; u32 enc_key[ARIA_MAX_RD_KEYS][ARIA_RD_KEY_WORDS]; u32 dec_key[ARIA_MAX_RD_KEYS][ARIA_RD_KEY_WORDS]; -}; - -static const u32 key_rc[5][4] = { - { 0x517cc1b7, 0x27220a94, 0xfe13abe8, 0xfa9a6ee0 }, - { 0x6db14acc, 0x9e21c820, 0xff28b1d5, 0xef5de2b0 }, - { 0xdb92371d, 0x2126e970, 0x03249775, 0x04e8c90e }, - { 0x517cc1b7, 0x27220a94, 0xfe13abe8, 0xfa9a6ee0 }, - { 0x6db14acc, 0x9e21c820, 0xff28b1d5, 0xef5de2b0 } + int rounds; + int key_length; }; static const u32 s1[256] = { @@ -458,4 +450,9 @@ static inline void aria_gsrk(u32 *rk, u32 *x, u32 *y, u32 n) ((y[(q + 2) % 4]) << (32 - r)); } +void aria_encrypt(void *ctx, u8 *out, const u8 *in); +void aria_decrypt(void *ctx, u8 *out, const u8 *in); +int aria_set_key(struct crypto_tfm *tfm, const u8 *in_key, + unsigned int key_len); + #endif -- 2.17.1