twofish_glue_3way.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696
  1. /*
  2. * Glue Code for 3-way parallel assembler optimized version of Twofish
  3. *
  4. * Copyright (c) 2011 Jussi Kivilinna <jussi.kivilinna@mbnet.fi>
  5. *
  6. * CBC & ECB parts based on code (crypto/cbc.c,ecb.c) by:
  7. * Copyright (c) 2006 Herbert Xu <herbert@gondor.apana.org.au>
  8. * CTR part based on code (crypto/ctr.c) by:
  9. * (C) Copyright IBM Corp. 2007 - Joy Latten <latten@us.ibm.com>
  10. *
  11. * This program is free software; you can redistribute it and/or modify
  12. * it under the terms of the GNU General Public License as published by
  13. * the Free Software Foundation; either version 2 of the License, or
  14. * (at your option) any later version.
  15. *
  16. * This program is distributed in the hope that it will be useful,
  17. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  18. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  19. * GNU General Public License for more details.
  20. *
  21. * You should have received a copy of the GNU General Public License
  22. * along with this program; if not, write to the Free Software
  23. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
  24. * USA
  25. *
  26. */
  27. #include <asm/processor.h>
  28. #include <linux/crypto.h>
  29. #include <linux/init.h>
  30. #include <linux/module.h>
  31. #include <linux/types.h>
  32. #include <crypto/algapi.h>
  33. #include <crypto/twofish.h>
  34. #include <crypto/b128ops.h>
  35. #include <crypto/lrw.h>
  36. #include <crypto/xts.h>
  37. /* regular block cipher functions from twofish_x86_64 module */
  38. asmlinkage void twofish_enc_blk(struct twofish_ctx *ctx, u8 *dst,
  39. const u8 *src);
  40. asmlinkage void twofish_dec_blk(struct twofish_ctx *ctx, u8 *dst,
  41. const u8 *src);
  42. /* 3-way parallel cipher functions */
  43. asmlinkage void __twofish_enc_blk_3way(struct twofish_ctx *ctx, u8 *dst,
  44. const u8 *src, bool xor);
  45. asmlinkage void twofish_dec_blk_3way(struct twofish_ctx *ctx, u8 *dst,
  46. const u8 *src);
  47. static inline void twofish_enc_blk_3way(struct twofish_ctx *ctx, u8 *dst,
  48. const u8 *src)
  49. {
  50. __twofish_enc_blk_3way(ctx, dst, src, false);
  51. }
  52. static inline void twofish_enc_blk_xor_3way(struct twofish_ctx *ctx, u8 *dst,
  53. const u8 *src)
  54. {
  55. __twofish_enc_blk_3way(ctx, dst, src, true);
  56. }
  57. static int ecb_crypt(struct blkcipher_desc *desc, struct blkcipher_walk *walk,
  58. void (*fn)(struct twofish_ctx *, u8 *, const u8 *),
  59. void (*fn_3way)(struct twofish_ctx *, u8 *, const u8 *))
  60. {
  61. struct twofish_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  62. unsigned int bsize = TF_BLOCK_SIZE;
  63. unsigned int nbytes;
  64. int err;
  65. err = blkcipher_walk_virt(desc, walk);
  66. while ((nbytes = walk->nbytes)) {
  67. u8 *wsrc = walk->src.virt.addr;
  68. u8 *wdst = walk->dst.virt.addr;
  69. /* Process three block batch */
  70. if (nbytes >= bsize * 3) {
  71. do {
  72. fn_3way(ctx, wdst, wsrc);
  73. wsrc += bsize * 3;
  74. wdst += bsize * 3;
  75. nbytes -= bsize * 3;
  76. } while (nbytes >= bsize * 3);
  77. if (nbytes < bsize)
  78. goto done;
  79. }
  80. /* Handle leftovers */
  81. do {
  82. fn(ctx, wdst, wsrc);
  83. wsrc += bsize;
  84. wdst += bsize;
  85. nbytes -= bsize;
  86. } while (nbytes >= bsize);
  87. done:
  88. err = blkcipher_walk_done(desc, walk, nbytes);
  89. }
  90. return err;
  91. }
  92. static int ecb_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  93. struct scatterlist *src, unsigned int nbytes)
  94. {
  95. struct blkcipher_walk walk;
  96. blkcipher_walk_init(&walk, dst, src, nbytes);
  97. return ecb_crypt(desc, &walk, twofish_enc_blk, twofish_enc_blk_3way);
  98. }
  99. static int ecb_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  100. struct scatterlist *src, unsigned int nbytes)
  101. {
  102. struct blkcipher_walk walk;
  103. blkcipher_walk_init(&walk, dst, src, nbytes);
  104. return ecb_crypt(desc, &walk, twofish_dec_blk, twofish_dec_blk_3way);
  105. }
  106. static unsigned int __cbc_encrypt(struct blkcipher_desc *desc,
  107. struct blkcipher_walk *walk)
  108. {
  109. struct twofish_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  110. unsigned int bsize = TF_BLOCK_SIZE;
  111. unsigned int nbytes = walk->nbytes;
  112. u128 *src = (u128 *)walk->src.virt.addr;
  113. u128 *dst = (u128 *)walk->dst.virt.addr;
  114. u128 *iv = (u128 *)walk->iv;
  115. do {
  116. u128_xor(dst, src, iv);
  117. twofish_enc_blk(ctx, (u8 *)dst, (u8 *)dst);
  118. iv = dst;
  119. src += 1;
  120. dst += 1;
  121. nbytes -= bsize;
  122. } while (nbytes >= bsize);
  123. u128_xor((u128 *)walk->iv, (u128 *)walk->iv, iv);
  124. return nbytes;
  125. }
  126. static int cbc_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  127. struct scatterlist *src, unsigned int nbytes)
  128. {
  129. struct blkcipher_walk walk;
  130. int err;
  131. blkcipher_walk_init(&walk, dst, src, nbytes);
  132. err = blkcipher_walk_virt(desc, &walk);
  133. while ((nbytes = walk.nbytes)) {
  134. nbytes = __cbc_encrypt(desc, &walk);
  135. err = blkcipher_walk_done(desc, &walk, nbytes);
  136. }
  137. return err;
  138. }
  139. static unsigned int __cbc_decrypt(struct blkcipher_desc *desc,
  140. struct blkcipher_walk *walk)
  141. {
  142. struct twofish_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  143. unsigned int bsize = TF_BLOCK_SIZE;
  144. unsigned int nbytes = walk->nbytes;
  145. u128 *src = (u128 *)walk->src.virt.addr;
  146. u128 *dst = (u128 *)walk->dst.virt.addr;
  147. u128 ivs[3 - 1];
  148. u128 last_iv;
  149. /* Start of the last block. */
  150. src += nbytes / bsize - 1;
  151. dst += nbytes / bsize - 1;
  152. last_iv = *src;
  153. /* Process three block batch */
  154. if (nbytes >= bsize * 3) {
  155. do {
  156. nbytes -= bsize * (3 - 1);
  157. src -= 3 - 1;
  158. dst -= 3 - 1;
  159. ivs[0] = src[0];
  160. ivs[1] = src[1];
  161. twofish_dec_blk_3way(ctx, (u8 *)dst, (u8 *)src);
  162. u128_xor(dst + 1, dst + 1, ivs + 0);
  163. u128_xor(dst + 2, dst + 2, ivs + 1);
  164. nbytes -= bsize;
  165. if (nbytes < bsize)
  166. goto done;
  167. u128_xor(dst, dst, src - 1);
  168. src -= 1;
  169. dst -= 1;
  170. } while (nbytes >= bsize * 3);
  171. if (nbytes < bsize)
  172. goto done;
  173. }
  174. /* Handle leftovers */
  175. for (;;) {
  176. twofish_dec_blk(ctx, (u8 *)dst, (u8 *)src);
  177. nbytes -= bsize;
  178. if (nbytes < bsize)
  179. break;
  180. u128_xor(dst, dst, src - 1);
  181. src -= 1;
  182. dst -= 1;
  183. }
  184. done:
  185. u128_xor(dst, dst, (u128 *)walk->iv);
  186. *(u128 *)walk->iv = last_iv;
  187. return nbytes;
  188. }
  189. static int cbc_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  190. struct scatterlist *src, unsigned int nbytes)
  191. {
  192. struct blkcipher_walk walk;
  193. int err;
  194. blkcipher_walk_init(&walk, dst, src, nbytes);
  195. err = blkcipher_walk_virt(desc, &walk);
  196. while ((nbytes = walk.nbytes)) {
  197. nbytes = __cbc_decrypt(desc, &walk);
  198. err = blkcipher_walk_done(desc, &walk, nbytes);
  199. }
  200. return err;
  201. }
  202. static inline void u128_to_be128(be128 *dst, const u128 *src)
  203. {
  204. dst->a = cpu_to_be64(src->a);
  205. dst->b = cpu_to_be64(src->b);
  206. }
  207. static inline void be128_to_u128(u128 *dst, const be128 *src)
  208. {
  209. dst->a = be64_to_cpu(src->a);
  210. dst->b = be64_to_cpu(src->b);
  211. }
  212. static inline void u128_inc(u128 *i)
  213. {
  214. i->b++;
  215. if (!i->b)
  216. i->a++;
  217. }
  218. static void ctr_crypt_final(struct blkcipher_desc *desc,
  219. struct blkcipher_walk *walk)
  220. {
  221. struct twofish_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  222. u8 *ctrblk = walk->iv;
  223. u8 keystream[TF_BLOCK_SIZE];
  224. u8 *src = walk->src.virt.addr;
  225. u8 *dst = walk->dst.virt.addr;
  226. unsigned int nbytes = walk->nbytes;
  227. twofish_enc_blk(ctx, keystream, ctrblk);
  228. crypto_xor(keystream, src, nbytes);
  229. memcpy(dst, keystream, nbytes);
  230. crypto_inc(ctrblk, TF_BLOCK_SIZE);
  231. }
  232. static unsigned int __ctr_crypt(struct blkcipher_desc *desc,
  233. struct blkcipher_walk *walk)
  234. {
  235. struct twofish_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  236. unsigned int bsize = TF_BLOCK_SIZE;
  237. unsigned int nbytes = walk->nbytes;
  238. u128 *src = (u128 *)walk->src.virt.addr;
  239. u128 *dst = (u128 *)walk->dst.virt.addr;
  240. u128 ctrblk;
  241. be128 ctrblocks[3];
  242. be128_to_u128(&ctrblk, (be128 *)walk->iv);
  243. /* Process three block batch */
  244. if (nbytes >= bsize * 3) {
  245. do {
  246. if (dst != src) {
  247. dst[0] = src[0];
  248. dst[1] = src[1];
  249. dst[2] = src[2];
  250. }
  251. /* create ctrblks for parallel encrypt */
  252. u128_to_be128(&ctrblocks[0], &ctrblk);
  253. u128_inc(&ctrblk);
  254. u128_to_be128(&ctrblocks[1], &ctrblk);
  255. u128_inc(&ctrblk);
  256. u128_to_be128(&ctrblocks[2], &ctrblk);
  257. u128_inc(&ctrblk);
  258. twofish_enc_blk_xor_3way(ctx, (u8 *)dst,
  259. (u8 *)ctrblocks);
  260. src += 3;
  261. dst += 3;
  262. nbytes -= bsize * 3;
  263. } while (nbytes >= bsize * 3);
  264. if (nbytes < bsize)
  265. goto done;
  266. }
  267. /* Handle leftovers */
  268. do {
  269. if (dst != src)
  270. *dst = *src;
  271. u128_to_be128(&ctrblocks[0], &ctrblk);
  272. u128_inc(&ctrblk);
  273. twofish_enc_blk(ctx, (u8 *)ctrblocks, (u8 *)ctrblocks);
  274. u128_xor(dst, dst, (u128 *)ctrblocks);
  275. src += 1;
  276. dst += 1;
  277. nbytes -= bsize;
  278. } while (nbytes >= bsize);
  279. done:
  280. u128_to_be128((be128 *)walk->iv, &ctrblk);
  281. return nbytes;
  282. }
  283. static int ctr_crypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  284. struct scatterlist *src, unsigned int nbytes)
  285. {
  286. struct blkcipher_walk walk;
  287. int err;
  288. blkcipher_walk_init(&walk, dst, src, nbytes);
  289. err = blkcipher_walk_virt_block(desc, &walk, TF_BLOCK_SIZE);
  290. while ((nbytes = walk.nbytes) >= TF_BLOCK_SIZE) {
  291. nbytes = __ctr_crypt(desc, &walk);
  292. err = blkcipher_walk_done(desc, &walk, nbytes);
  293. }
  294. if (walk.nbytes) {
  295. ctr_crypt_final(desc, &walk);
  296. err = blkcipher_walk_done(desc, &walk, 0);
  297. }
  298. return err;
  299. }
  300. static void encrypt_callback(void *priv, u8 *srcdst, unsigned int nbytes)
  301. {
  302. const unsigned int bsize = TF_BLOCK_SIZE;
  303. struct twofish_ctx *ctx = priv;
  304. int i;
  305. if (nbytes == 3 * bsize) {
  306. twofish_enc_blk_3way(ctx, srcdst, srcdst);
  307. return;
  308. }
  309. for (i = 0; i < nbytes / bsize; i++, srcdst += bsize)
  310. twofish_enc_blk(ctx, srcdst, srcdst);
  311. }
  312. static void decrypt_callback(void *priv, u8 *srcdst, unsigned int nbytes)
  313. {
  314. const unsigned int bsize = TF_BLOCK_SIZE;
  315. struct twofish_ctx *ctx = priv;
  316. int i;
  317. if (nbytes == 3 * bsize) {
  318. twofish_dec_blk_3way(ctx, srcdst, srcdst);
  319. return;
  320. }
  321. for (i = 0; i < nbytes / bsize; i++, srcdst += bsize)
  322. twofish_dec_blk(ctx, srcdst, srcdst);
  323. }
  324. struct twofish_lrw_ctx {
  325. struct lrw_table_ctx lrw_table;
  326. struct twofish_ctx twofish_ctx;
  327. };
  328. static int lrw_twofish_setkey(struct crypto_tfm *tfm, const u8 *key,
  329. unsigned int keylen)
  330. {
  331. struct twofish_lrw_ctx *ctx = crypto_tfm_ctx(tfm);
  332. int err;
  333. err = __twofish_setkey(&ctx->twofish_ctx, key, keylen - TF_BLOCK_SIZE,
  334. &tfm->crt_flags);
  335. if (err)
  336. return err;
  337. return lrw_init_table(&ctx->lrw_table, key + keylen - TF_BLOCK_SIZE);
  338. }
  339. static int lrw_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  340. struct scatterlist *src, unsigned int nbytes)
  341. {
  342. struct twofish_lrw_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  343. be128 buf[3];
  344. struct lrw_crypt_req req = {
  345. .tbuf = buf,
  346. .tbuflen = sizeof(buf),
  347. .table_ctx = &ctx->lrw_table,
  348. .crypt_ctx = &ctx->twofish_ctx,
  349. .crypt_fn = encrypt_callback,
  350. };
  351. return lrw_crypt(desc, dst, src, nbytes, &req);
  352. }
  353. static int lrw_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  354. struct scatterlist *src, unsigned int nbytes)
  355. {
  356. struct twofish_lrw_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  357. be128 buf[3];
  358. struct lrw_crypt_req req = {
  359. .tbuf = buf,
  360. .tbuflen = sizeof(buf),
  361. .table_ctx = &ctx->lrw_table,
  362. .crypt_ctx = &ctx->twofish_ctx,
  363. .crypt_fn = decrypt_callback,
  364. };
  365. return lrw_crypt(desc, dst, src, nbytes, &req);
  366. }
  367. static void lrw_exit_tfm(struct crypto_tfm *tfm)
  368. {
  369. struct twofish_lrw_ctx *ctx = crypto_tfm_ctx(tfm);
  370. lrw_free_table(&ctx->lrw_table);
  371. }
  372. struct twofish_xts_ctx {
  373. struct twofish_ctx tweak_ctx;
  374. struct twofish_ctx crypt_ctx;
  375. };
  376. static int xts_twofish_setkey(struct crypto_tfm *tfm, const u8 *key,
  377. unsigned int keylen)
  378. {
  379. struct twofish_xts_ctx *ctx = crypto_tfm_ctx(tfm);
  380. u32 *flags = &tfm->crt_flags;
  381. int err;
  382. /* key consists of keys of equal size concatenated, therefore
  383. * the length must be even
  384. */
  385. if (keylen % 2) {
  386. *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN;
  387. return -EINVAL;
  388. }
  389. /* first half of xts-key is for crypt */
  390. err = __twofish_setkey(&ctx->crypt_ctx, key, keylen / 2, flags);
  391. if (err)
  392. return err;
  393. /* second half of xts-key is for tweak */
  394. return __twofish_setkey(&ctx->tweak_ctx, key + keylen / 2, keylen / 2,
  395. flags);
  396. }
  397. static int xts_encrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  398. struct scatterlist *src, unsigned int nbytes)
  399. {
  400. struct twofish_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  401. be128 buf[3];
  402. struct xts_crypt_req req = {
  403. .tbuf = buf,
  404. .tbuflen = sizeof(buf),
  405. .tweak_ctx = &ctx->tweak_ctx,
  406. .tweak_fn = XTS_TWEAK_CAST(twofish_enc_blk),
  407. .crypt_ctx = &ctx->crypt_ctx,
  408. .crypt_fn = encrypt_callback,
  409. };
  410. return xts_crypt(desc, dst, src, nbytes, &req);
  411. }
  412. static int xts_decrypt(struct blkcipher_desc *desc, struct scatterlist *dst,
  413. struct scatterlist *src, unsigned int nbytes)
  414. {
  415. struct twofish_xts_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
  416. be128 buf[3];
  417. struct xts_crypt_req req = {
  418. .tbuf = buf,
  419. .tbuflen = sizeof(buf),
  420. .tweak_ctx = &ctx->tweak_ctx,
  421. .tweak_fn = XTS_TWEAK_CAST(twofish_enc_blk),
  422. .crypt_ctx = &ctx->crypt_ctx,
  423. .crypt_fn = decrypt_callback,
  424. };
  425. return xts_crypt(desc, dst, src, nbytes, &req);
  426. }
  427. static struct crypto_alg tf_algs[5] = { {
  428. .cra_name = "ecb(twofish)",
  429. .cra_driver_name = "ecb-twofish-3way",
  430. .cra_priority = 300,
  431. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  432. .cra_blocksize = TF_BLOCK_SIZE,
  433. .cra_ctxsize = sizeof(struct twofish_ctx),
  434. .cra_alignmask = 0,
  435. .cra_type = &crypto_blkcipher_type,
  436. .cra_module = THIS_MODULE,
  437. .cra_list = LIST_HEAD_INIT(tf_algs[0].cra_list),
  438. .cra_u = {
  439. .blkcipher = {
  440. .min_keysize = TF_MIN_KEY_SIZE,
  441. .max_keysize = TF_MAX_KEY_SIZE,
  442. .setkey = twofish_setkey,
  443. .encrypt = ecb_encrypt,
  444. .decrypt = ecb_decrypt,
  445. },
  446. },
  447. }, {
  448. .cra_name = "cbc(twofish)",
  449. .cra_driver_name = "cbc-twofish-3way",
  450. .cra_priority = 300,
  451. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  452. .cra_blocksize = TF_BLOCK_SIZE,
  453. .cra_ctxsize = sizeof(struct twofish_ctx),
  454. .cra_alignmask = 0,
  455. .cra_type = &crypto_blkcipher_type,
  456. .cra_module = THIS_MODULE,
  457. .cra_list = LIST_HEAD_INIT(tf_algs[1].cra_list),
  458. .cra_u = {
  459. .blkcipher = {
  460. .min_keysize = TF_MIN_KEY_SIZE,
  461. .max_keysize = TF_MAX_KEY_SIZE,
  462. .ivsize = TF_BLOCK_SIZE,
  463. .setkey = twofish_setkey,
  464. .encrypt = cbc_encrypt,
  465. .decrypt = cbc_decrypt,
  466. },
  467. },
  468. }, {
  469. .cra_name = "ctr(twofish)",
  470. .cra_driver_name = "ctr-twofish-3way",
  471. .cra_priority = 300,
  472. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  473. .cra_blocksize = 1,
  474. .cra_ctxsize = sizeof(struct twofish_ctx),
  475. .cra_alignmask = 0,
  476. .cra_type = &crypto_blkcipher_type,
  477. .cra_module = THIS_MODULE,
  478. .cra_list = LIST_HEAD_INIT(tf_algs[2].cra_list),
  479. .cra_u = {
  480. .blkcipher = {
  481. .min_keysize = TF_MIN_KEY_SIZE,
  482. .max_keysize = TF_MAX_KEY_SIZE,
  483. .ivsize = TF_BLOCK_SIZE,
  484. .setkey = twofish_setkey,
  485. .encrypt = ctr_crypt,
  486. .decrypt = ctr_crypt,
  487. },
  488. },
  489. }, {
  490. .cra_name = "lrw(twofish)",
  491. .cra_driver_name = "lrw-twofish-3way",
  492. .cra_priority = 300,
  493. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  494. .cra_blocksize = TF_BLOCK_SIZE,
  495. .cra_ctxsize = sizeof(struct twofish_lrw_ctx),
  496. .cra_alignmask = 0,
  497. .cra_type = &crypto_blkcipher_type,
  498. .cra_module = THIS_MODULE,
  499. .cra_list = LIST_HEAD_INIT(tf_algs[3].cra_list),
  500. .cra_exit = lrw_exit_tfm,
  501. .cra_u = {
  502. .blkcipher = {
  503. .min_keysize = TF_MIN_KEY_SIZE + TF_BLOCK_SIZE,
  504. .max_keysize = TF_MAX_KEY_SIZE + TF_BLOCK_SIZE,
  505. .ivsize = TF_BLOCK_SIZE,
  506. .setkey = lrw_twofish_setkey,
  507. .encrypt = lrw_encrypt,
  508. .decrypt = lrw_decrypt,
  509. },
  510. },
  511. }, {
  512. .cra_name = "xts(twofish)",
  513. .cra_driver_name = "xts-twofish-3way",
  514. .cra_priority = 300,
  515. .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
  516. .cra_blocksize = TF_BLOCK_SIZE,
  517. .cra_ctxsize = sizeof(struct twofish_xts_ctx),
  518. .cra_alignmask = 0,
  519. .cra_type = &crypto_blkcipher_type,
  520. .cra_module = THIS_MODULE,
  521. .cra_list = LIST_HEAD_INIT(tf_algs[4].cra_list),
  522. .cra_u = {
  523. .blkcipher = {
  524. .min_keysize = TF_MIN_KEY_SIZE * 2,
  525. .max_keysize = TF_MAX_KEY_SIZE * 2,
  526. .ivsize = TF_BLOCK_SIZE,
  527. .setkey = xts_twofish_setkey,
  528. .encrypt = xts_encrypt,
  529. .decrypt = xts_decrypt,
  530. },
  531. },
  532. } };
  533. static bool is_blacklisted_cpu(void)
  534. {
  535. if (boot_cpu_data.x86_vendor != X86_VENDOR_INTEL)
  536. return false;
  537. if (boot_cpu_data.x86 == 0x06 &&
  538. (boot_cpu_data.x86_model == 0x1c ||
  539. boot_cpu_data.x86_model == 0x26 ||
  540. boot_cpu_data.x86_model == 0x36)) {
  541. /*
  542. * On Atom, twofish-3way is slower than original assembler
  543. * implementation. Twofish-3way trades off some performance in
  544. * storing blocks in 64bit registers to allow three blocks to
  545. * be processed parallel. Parallel operation then allows gaining
  546. * more performance than was trade off, on out-of-order CPUs.
  547. * However Atom does not benefit from this parallellism and
  548. * should be blacklisted.
  549. */
  550. return true;
  551. }
  552. if (boot_cpu_data.x86 == 0x0f) {
  553. /*
  554. * On Pentium 4, twofish-3way is slower than original assembler
  555. * implementation because excessive uses of 64bit rotate and
  556. * left-shifts (which are really slow on P4) needed to store and
  557. * handle 128bit block in two 64bit registers.
  558. */
  559. return true;
  560. }
  561. return false;
  562. }
  563. static int force;
  564. module_param(force, int, 0);
  565. MODULE_PARM_DESC(force, "Force module load, ignore CPU blacklist");
  566. static int __init init(void)
  567. {
  568. if (!force && is_blacklisted_cpu()) {
  569. printk(KERN_INFO
  570. "twofish-x86_64-3way: performance on this CPU "
  571. "would be suboptimal: disabling "
  572. "twofish-x86_64-3way.\n");
  573. return -ENODEV;
  574. }
  575. return crypto_register_algs(tf_algs, ARRAY_SIZE(tf_algs));
  576. }
  577. static void __exit fini(void)
  578. {
  579. crypto_unregister_algs(tf_algs, ARRAY_SIZE(tf_algs));
  580. }
  581. module_init(init);
  582. module_exit(fini);
  583. MODULE_LICENSE("GPL");
  584. MODULE_DESCRIPTION("Twofish Cipher Algorithm, 3-way parallel asm optimized");
  585. MODULE_ALIAS("twofish");
  586. MODULE_ALIAS("twofish-asm");