chacha_generic.c 6 KB
Newer Older
1
/*
2
 * ChaCha and XChaCha stream ciphers, including ChaCha20 (RFC7539)
3 4
 *
 * Copyright (C) 2015 Martin Willi
5
 * Copyright (C) 2018 Google LLC
6 7 8 9 10 11 12
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 */

13
#include <asm/unaligned.h>
14
#include <crypto/algapi.h>
15
#include <crypto/chacha.h>
16 17
#include <crypto/internal/skcipher.h>
#include <linux/module.h>
18

19 20
static void chacha_docrypt(u32 *state, u8 *dst, const u8 *src,
			   unsigned int bytes, int nrounds)
21
{
22
	/* aligned to potentially speed up crypto_xor() */
23
	u8 stream[CHACHA_BLOCK_SIZE] __aligned(sizeof(long));
24

25 26
	while (bytes >= CHACHA_BLOCK_SIZE) {
		chacha_block(state, stream, nrounds);
27
		crypto_xor_cpy(dst, src, stream, CHACHA_BLOCK_SIZE);
28 29
		bytes -= CHACHA_BLOCK_SIZE;
		dst += CHACHA_BLOCK_SIZE;
30
		src += CHACHA_BLOCK_SIZE;
31 32
	}
	if (bytes) {
33
		chacha_block(state, stream, nrounds);
34
		crypto_xor_cpy(dst, src, stream, bytes);
35 36 37
	}
}

38 39
static int chacha_stream_xor(struct skcipher_request *req,
			     struct chacha_ctx *ctx, u8 *iv)
40 41 42 43 44 45 46
{
	struct skcipher_walk walk;
	u32 state[16];
	int err;

	err = skcipher_walk_virt(&walk, req, false);

47
	crypto_chacha_init(state, ctx, iv);
48 49 50 51 52

	while (walk.nbytes > 0) {
		unsigned int nbytes = walk.nbytes;

		if (nbytes < walk.total)
53
			nbytes = round_down(nbytes, CHACHA_BLOCK_SIZE);
54

55 56
		chacha_docrypt(state, walk.dst.virt.addr, walk.src.virt.addr,
			       nbytes, ctx->nrounds);
57 58 59 60 61 62
		err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
	}

	return err;
}

63
void crypto_chacha_init(u32 *state, struct chacha_ctx *ctx, u8 *iv)
64
{
65 66 67 68
	state[0]  = 0x61707865; /* "expa" */
	state[1]  = 0x3320646e; /* "nd 3" */
	state[2]  = 0x79622d32; /* "2-by" */
	state[3]  = 0x6b206574; /* "te k" */
69 70 71 72 73 74 75 76
	state[4]  = ctx->key[0];
	state[5]  = ctx->key[1];
	state[6]  = ctx->key[2];
	state[7]  = ctx->key[3];
	state[8]  = ctx->key[4];
	state[9]  = ctx->key[5];
	state[10] = ctx->key[6];
	state[11] = ctx->key[7];
77 78 79 80
	state[12] = get_unaligned_le32(iv +  0);
	state[13] = get_unaligned_le32(iv +  4);
	state[14] = get_unaligned_le32(iv +  8);
	state[15] = get_unaligned_le32(iv + 12);
81
}
82
EXPORT_SYMBOL_GPL(crypto_chacha_init);
83

84 85
static int chacha_setkey(struct crypto_skcipher *tfm, const u8 *key,
			 unsigned int keysize, int nrounds)
86
{
87
	struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm);
88 89
	int i;

90
	if (keysize != CHACHA_KEY_SIZE)
91 92 93
		return -EINVAL;

	for (i = 0; i < ARRAY_SIZE(ctx->key); i++)
94
		ctx->key[i] = get_unaligned_le32(key + i * sizeof(u32));
95

96
	ctx->nrounds = nrounds;
97 98
	return 0;
}
99 100 101 102 103 104

int crypto_chacha20_setkey(struct crypto_skcipher *tfm, const u8 *key,
			   unsigned int keysize)
{
	return chacha_setkey(tfm, key, keysize, 20);
}
105
EXPORT_SYMBOL_GPL(crypto_chacha20_setkey);
106

107 108 109 110 111 112 113
int crypto_chacha12_setkey(struct crypto_skcipher *tfm, const u8 *key,
			   unsigned int keysize)
{
	return chacha_setkey(tfm, key, keysize, 12);
}
EXPORT_SYMBOL_GPL(crypto_chacha12_setkey);

114
int crypto_chacha_crypt(struct skcipher_request *req)
115
{
116
	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
117
	struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm);
118

119
	return chacha_stream_xor(req, ctx, req->iv);
120
}
121
EXPORT_SYMBOL_GPL(crypto_chacha_crypt);
122

123
int crypto_xchacha_crypt(struct skcipher_request *req)
124 125
{
	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
126 127
	struct chacha_ctx *ctx = crypto_skcipher_ctx(tfm);
	struct chacha_ctx subctx;
128 129
	u32 state[16];
	u8 real_iv[16];
130

131
	/* Compute the subkey given the original key and first 128 nonce bits */
132 133 134
	crypto_chacha_init(state, ctx, req->iv);
	hchacha_block(state, subctx.key, ctx->nrounds);
	subctx.nrounds = ctx->nrounds;
135

136 137 138
	/* Build the real IV */
	memcpy(&real_iv[0], req->iv + 24, 8); /* stream position */
	memcpy(&real_iv[8], req->iv + 16, 8); /* remaining 64 nonce bits */
139

140
	/* Generate the stream and XOR it with the data */
141
	return chacha_stream_xor(req, &subctx, real_iv);
142
}
143
EXPORT_SYMBOL_GPL(crypto_xchacha_crypt);
144 145 146 147 148 149 150

static struct skcipher_alg algs[] = {
	{
		.base.cra_name		= "chacha20",
		.base.cra_driver_name	= "chacha20-generic",
		.base.cra_priority	= 100,
		.base.cra_blocksize	= 1,
151
		.base.cra_ctxsize	= sizeof(struct chacha_ctx),
152 153
		.base.cra_module	= THIS_MODULE,

154 155 156 157
		.min_keysize		= CHACHA_KEY_SIZE,
		.max_keysize		= CHACHA_KEY_SIZE,
		.ivsize			= CHACHA_IV_SIZE,
		.chunksize		= CHACHA_BLOCK_SIZE,
158
		.setkey			= crypto_chacha20_setkey,
159 160
		.encrypt		= crypto_chacha_crypt,
		.decrypt		= crypto_chacha_crypt,
161 162 163 164 165
	}, {
		.base.cra_name		= "xchacha20",
		.base.cra_driver_name	= "xchacha20-generic",
		.base.cra_priority	= 100,
		.base.cra_blocksize	= 1,
166
		.base.cra_ctxsize	= sizeof(struct chacha_ctx),
167 168
		.base.cra_module	= THIS_MODULE,

169 170 171 172
		.min_keysize		= CHACHA_KEY_SIZE,
		.max_keysize		= CHACHA_KEY_SIZE,
		.ivsize			= XCHACHA_IV_SIZE,
		.chunksize		= CHACHA_BLOCK_SIZE,
173
		.setkey			= crypto_chacha20_setkey,
174 175
		.encrypt		= crypto_xchacha_crypt,
		.decrypt		= crypto_xchacha_crypt,
176 177 178 179 180 181 182 183 184 185 186 187 188 189 190
	}, {
		.base.cra_name		= "xchacha12",
		.base.cra_driver_name	= "xchacha12-generic",
		.base.cra_priority	= 100,
		.base.cra_blocksize	= 1,
		.base.cra_ctxsize	= sizeof(struct chacha_ctx),
		.base.cra_module	= THIS_MODULE,

		.min_keysize		= CHACHA_KEY_SIZE,
		.max_keysize		= CHACHA_KEY_SIZE,
		.ivsize			= XCHACHA_IV_SIZE,
		.chunksize		= CHACHA_BLOCK_SIZE,
		.setkey			= crypto_chacha12_setkey,
		.encrypt		= crypto_xchacha_crypt,
		.decrypt		= crypto_xchacha_crypt,
191
	}
192 193
};

194
static int __init chacha_generic_mod_init(void)
195
{
196
	return crypto_register_skciphers(algs, ARRAY_SIZE(algs));
197 198
}

199
static void __exit chacha_generic_mod_fini(void)
200
{
201
	crypto_unregister_skciphers(algs, ARRAY_SIZE(algs));
202 203
}

204 205
module_init(chacha_generic_mod_init);
module_exit(chacha_generic_mod_fini);
206 207 208

MODULE_LICENSE("GPL");
MODULE_AUTHOR("Martin Willi <martin@strongswan.org>");
209
MODULE_DESCRIPTION("ChaCha and XChaCha stream ciphers (generic)");
210 211
MODULE_ALIAS_CRYPTO("chacha20");
MODULE_ALIAS_CRYPTO("chacha20-generic");
212 213
MODULE_ALIAS_CRYPTO("xchacha20");
MODULE_ALIAS_CRYPTO("xchacha20-generic");
214 215
MODULE_ALIAS_CRYPTO("xchacha12");
MODULE_ALIAS_CRYPTO("xchacha12-generic");