blake2b_generic.c 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. // SPDX-License-Identifier: (GPL-2.0-only OR Apache-2.0)
  2. /*
  3. * Generic implementation of the BLAKE2b digest algorithm. Based on the BLAKE2b
  4. * reference implementation, but it has been heavily modified for use in the
  5. * kernel. The reference implementation was:
  6. *
  7. * Copyright 2012, Samuel Neves <sneves@dei.uc.pt>. You may use this under
  8. * the terms of the CC0, the OpenSSL Licence, or the Apache Public License
  9. * 2.0, at your option. The terms of these licenses can be found at:
  10. *
  11. * - CC0 1.0 Universal : http://creativecommons.org/publicdomain/zero/1.0
  12. * - OpenSSL license : https://www.openssl.org/source/license.html
  13. * - Apache 2.0 : https://www.apache.org/licenses/LICENSE-2.0
  14. *
  15. * More information about BLAKE2 can be found at https://blake2.net.
  16. */
  17. #include <asm/unaligned.h>
  18. #include <linux/module.h>
  19. #include <linux/kernel.h>
  20. #include <linux/bitops.h>
  21. #include <crypto/internal/blake2b.h>
  22. #include <crypto/internal/hash.h>
  23. static const u8 blake2b_sigma[12][16] = {
  24. { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 },
  25. { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 },
  26. { 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 },
  27. { 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 },
  28. { 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 },
  29. { 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 },
  30. { 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 },
  31. { 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 },
  32. { 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 },
  33. { 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13, 0 },
  34. { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 },
  35. { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 }
  36. };
  37. static void blake2b_increment_counter(struct blake2b_state *S, const u64 inc)
  38. {
  39. S->t[0] += inc;
  40. S->t[1] += (S->t[0] < inc);
  41. }
  42. #define G(r,i,a,b,c,d) \
  43. do { \
  44. a = a + b + m[blake2b_sigma[r][2*i+0]]; \
  45. d = ror64(d ^ a, 32); \
  46. c = c + d; \
  47. b = ror64(b ^ c, 24); \
  48. a = a + b + m[blake2b_sigma[r][2*i+1]]; \
  49. d = ror64(d ^ a, 16); \
  50. c = c + d; \
  51. b = ror64(b ^ c, 63); \
  52. } while (0)
  53. #define ROUND(r) \
  54. do { \
  55. G(r,0,v[ 0],v[ 4],v[ 8],v[12]); \
  56. G(r,1,v[ 1],v[ 5],v[ 9],v[13]); \
  57. G(r,2,v[ 2],v[ 6],v[10],v[14]); \
  58. G(r,3,v[ 3],v[ 7],v[11],v[15]); \
  59. G(r,4,v[ 0],v[ 5],v[10],v[15]); \
  60. G(r,5,v[ 1],v[ 6],v[11],v[12]); \
  61. G(r,6,v[ 2],v[ 7],v[ 8],v[13]); \
  62. G(r,7,v[ 3],v[ 4],v[ 9],v[14]); \
  63. } while (0)
  64. static void blake2b_compress_one_generic(struct blake2b_state *S,
  65. const u8 block[BLAKE2B_BLOCK_SIZE])
  66. {
  67. u64 m[16];
  68. u64 v[16];
  69. size_t i;
  70. for (i = 0; i < 16; ++i)
  71. m[i] = get_unaligned_le64(block + i * sizeof(m[i]));
  72. for (i = 0; i < 8; ++i)
  73. v[i] = S->h[i];
  74. v[ 8] = BLAKE2B_IV0;
  75. v[ 9] = BLAKE2B_IV1;
  76. v[10] = BLAKE2B_IV2;
  77. v[11] = BLAKE2B_IV3;
  78. v[12] = BLAKE2B_IV4 ^ S->t[0];
  79. v[13] = BLAKE2B_IV5 ^ S->t[1];
  80. v[14] = BLAKE2B_IV6 ^ S->f[0];
  81. v[15] = BLAKE2B_IV7 ^ S->f[1];
  82. ROUND(0);
  83. ROUND(1);
  84. ROUND(2);
  85. ROUND(3);
  86. ROUND(4);
  87. ROUND(5);
  88. ROUND(6);
  89. ROUND(7);
  90. ROUND(8);
  91. ROUND(9);
  92. ROUND(10);
  93. ROUND(11);
  94. #ifdef CONFIG_CC_IS_CLANG
  95. #pragma nounroll /* https://bugs.llvm.org/show_bug.cgi?id=45803 */
  96. #endif
  97. for (i = 0; i < 8; ++i)
  98. S->h[i] = S->h[i] ^ v[i] ^ v[i + 8];
  99. }
  100. #undef G
  101. #undef ROUND
  102. void blake2b_compress_generic(struct blake2b_state *state,
  103. const u8 *block, size_t nblocks, u32 inc)
  104. {
  105. do {
  106. blake2b_increment_counter(state, inc);
  107. blake2b_compress_one_generic(state, block);
  108. block += BLAKE2B_BLOCK_SIZE;
  109. } while (--nblocks);
  110. }
  111. EXPORT_SYMBOL(blake2b_compress_generic);
  112. static int crypto_blake2b_update_generic(struct shash_desc *desc,
  113. const u8 *in, unsigned int inlen)
  114. {
  115. return crypto_blake2b_update(desc, in, inlen, blake2b_compress_generic);
  116. }
  117. static int crypto_blake2b_final_generic(struct shash_desc *desc, u8 *out)
  118. {
  119. return crypto_blake2b_final(desc, out, blake2b_compress_generic);
  120. }
  121. #define BLAKE2B_ALG(name, driver_name, digest_size) \
  122. { \
  123. .base.cra_name = name, \
  124. .base.cra_driver_name = driver_name, \
  125. .base.cra_priority = 100, \
  126. .base.cra_flags = CRYPTO_ALG_OPTIONAL_KEY, \
  127. .base.cra_blocksize = BLAKE2B_BLOCK_SIZE, \
  128. .base.cra_ctxsize = sizeof(struct blake2b_tfm_ctx), \
  129. .base.cra_module = THIS_MODULE, \
  130. .digestsize = digest_size, \
  131. .setkey = crypto_blake2b_setkey, \
  132. .init = crypto_blake2b_init, \
  133. .update = crypto_blake2b_update_generic, \
  134. .final = crypto_blake2b_final_generic, \
  135. .descsize = sizeof(struct blake2b_state), \
  136. }
  137. static struct shash_alg blake2b_algs[] = {
  138. BLAKE2B_ALG("blake2b-160", "blake2b-160-generic",
  139. BLAKE2B_160_HASH_SIZE),
  140. BLAKE2B_ALG("blake2b-256", "blake2b-256-generic",
  141. BLAKE2B_256_HASH_SIZE),
  142. BLAKE2B_ALG("blake2b-384", "blake2b-384-generic",
  143. BLAKE2B_384_HASH_SIZE),
  144. BLAKE2B_ALG("blake2b-512", "blake2b-512-generic",
  145. BLAKE2B_512_HASH_SIZE),
  146. };
  147. static int __init blake2b_mod_init(void)
  148. {
  149. return crypto_register_shashes(blake2b_algs, ARRAY_SIZE(blake2b_algs));
  150. }
  151. static void __exit blake2b_mod_fini(void)
  152. {
  153. crypto_unregister_shashes(blake2b_algs, ARRAY_SIZE(blake2b_algs));
  154. }
  155. subsys_initcall(blake2b_mod_init);
  156. module_exit(blake2b_mod_fini);
  157. MODULE_AUTHOR("David Sterba <kdave@kernel.org>");
  158. MODULE_DESCRIPTION("BLAKE2b generic implementation");
  159. MODULE_LICENSE("GPL");
  160. MODULE_ALIAS_CRYPTO("blake2b-160");
  161. MODULE_ALIAS_CRYPTO("blake2b-160-generic");
  162. MODULE_ALIAS_CRYPTO("blake2b-256");
  163. MODULE_ALIAS_CRYPTO("blake2b-256-generic");
  164. MODULE_ALIAS_CRYPTO("blake2b-384");
  165. MODULE_ALIAS_CRYPTO("blake2b-384-generic");
  166. MODULE_ALIAS_CRYPTO("blake2b-512");
  167. MODULE_ALIAS_CRYPTO("blake2b-512-generic");