mirror of
https://github.com/torvalds/linux.git
synced 2024-11-18 10:01:43 +00:00
477309580d
Convert the x86 implementation of MORUS-640 to use the AEAD SIMD helpers, rather than hand-rolling the same functionality. This simplifies the code and also fixes the bug where the user-provided aead_request is modified. Signed-off-by: Eric Biggers <ebiggers@google.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
98 lines
3.1 KiB
C
98 lines
3.1 KiB
C
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
|
/*
|
|
* The MORUS-640 Authenticated-Encryption Algorithm
|
|
* Common glue skeleton -- header file
|
|
*
|
|
* Copyright (c) 2016-2018 Ondrej Mosnacek <omosnacek@gmail.com>
|
|
* Copyright (C) 2017-2018 Red Hat, Inc. All rights reserved.
|
|
*/
|
|
|
|
#ifndef _CRYPTO_MORUS640_GLUE_H
|
|
#define _CRYPTO_MORUS640_GLUE_H
|
|
|
|
#include <linux/module.h>
|
|
#include <linux/types.h>
|
|
#include <crypto/algapi.h>
|
|
#include <crypto/aead.h>
|
|
#include <crypto/morus_common.h>
|
|
|
|
#define MORUS640_WORD_SIZE 4
|
|
#define MORUS640_BLOCK_SIZE (MORUS_BLOCK_WORDS * MORUS640_WORD_SIZE)
|
|
|
|
struct morus640_block {
|
|
u8 bytes[MORUS640_BLOCK_SIZE];
|
|
};
|
|
|
|
struct morus640_glue_ops {
|
|
void (*init)(void *state, const void *key, const void *iv);
|
|
void (*ad)(void *state, const void *data, unsigned int length);
|
|
void (*enc)(void *state, const void *src, void *dst, unsigned int length);
|
|
void (*dec)(void *state, const void *src, void *dst, unsigned int length);
|
|
void (*enc_tail)(void *state, const void *src, void *dst, unsigned int length);
|
|
void (*dec_tail)(void *state, const void *src, void *dst, unsigned int length);
|
|
void (*final)(void *state, void *tag_xor, u64 assoclen, u64 cryptlen);
|
|
};
|
|
|
|
struct morus640_ctx {
|
|
const struct morus640_glue_ops *ops;
|
|
struct morus640_block key;
|
|
};
|
|
|
|
void crypto_morus640_glue_init_ops(struct crypto_aead *aead,
|
|
const struct morus640_glue_ops *ops);
|
|
int crypto_morus640_glue_setkey(struct crypto_aead *aead, const u8 *key,
|
|
unsigned int keylen);
|
|
int crypto_morus640_glue_setauthsize(struct crypto_aead *tfm,
|
|
unsigned int authsize);
|
|
int crypto_morus640_glue_encrypt(struct aead_request *req);
|
|
int crypto_morus640_glue_decrypt(struct aead_request *req);
|
|
|
|
#define MORUS640_DECLARE_ALG(id, driver_name, priority) \
|
|
static const struct morus640_glue_ops crypto_morus640_##id##_ops = {\
|
|
.init = crypto_morus640_##id##_init, \
|
|
.ad = crypto_morus640_##id##_ad, \
|
|
.enc = crypto_morus640_##id##_enc, \
|
|
.enc_tail = crypto_morus640_##id##_enc_tail, \
|
|
.dec = crypto_morus640_##id##_dec, \
|
|
.dec_tail = crypto_morus640_##id##_dec_tail, \
|
|
.final = crypto_morus640_##id##_final, \
|
|
}; \
|
|
\
|
|
static int crypto_morus640_##id##_init_tfm(struct crypto_aead *tfm) \
|
|
{ \
|
|
crypto_morus640_glue_init_ops(tfm, &crypto_morus640_##id##_ops); \
|
|
return 0; \
|
|
} \
|
|
\
|
|
static void crypto_morus640_##id##_exit_tfm(struct crypto_aead *tfm) \
|
|
{ \
|
|
} \
|
|
\
|
|
static struct aead_alg crypto_morus640_##id##_alg = {\
|
|
.setkey = crypto_morus640_glue_setkey, \
|
|
.setauthsize = crypto_morus640_glue_setauthsize, \
|
|
.encrypt = crypto_morus640_glue_encrypt, \
|
|
.decrypt = crypto_morus640_glue_decrypt, \
|
|
.init = crypto_morus640_##id##_init_tfm, \
|
|
.exit = crypto_morus640_##id##_exit_tfm, \
|
|
\
|
|
.ivsize = MORUS_NONCE_SIZE, \
|
|
.maxauthsize = MORUS_MAX_AUTH_SIZE, \
|
|
.chunksize = MORUS640_BLOCK_SIZE, \
|
|
\
|
|
.base = { \
|
|
.cra_flags = CRYPTO_ALG_INTERNAL, \
|
|
.cra_blocksize = 1, \
|
|
.cra_ctxsize = sizeof(struct morus640_ctx), \
|
|
.cra_alignmask = 0, \
|
|
.cra_priority = priority, \
|
|
\
|
|
.cra_name = "__morus640", \
|
|
.cra_driver_name = "__"driver_name, \
|
|
\
|
|
.cra_module = THIS_MODULE, \
|
|
} \
|
|
}
|
|
|
|
#endif /* _CRYPTO_MORUS640_GLUE_H */
|