mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-15 06:55:13 +08:00
97b70180b7
Instead of calculating the tag and returning it to the caller on decryption, use a SIMD compare and min across vector to perform the comparison. This is slightly more efficient, and removes the need on the caller's part to wipe the tag from memory if the decryption failed. While at it, switch to unsigned int when passing cryptlen and assoclen - we don't support input sizes where it matters anyway. Signed-off-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Ondrej Mosnacek <omosnacek@gmail.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
80 lines
2.0 KiB
C
80 lines
2.0 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* Copyright (C) 2019 Linaro Ltd <ard.biesheuvel@linaro.org>
|
|
*/
|
|
|
|
#include <asm/cpufeature.h>
|
|
#include <asm/neon.h>
|
|
|
|
#include "aegis.h"
|
|
|
|
void crypto_aegis128_init_neon(void *state, const void *key, const void *iv);
|
|
void crypto_aegis128_update_neon(void *state, const void *msg);
|
|
void crypto_aegis128_encrypt_chunk_neon(void *state, void *dst, const void *src,
|
|
unsigned int size);
|
|
void crypto_aegis128_decrypt_chunk_neon(void *state, void *dst, const void *src,
|
|
unsigned int size);
|
|
int crypto_aegis128_final_neon(void *state, void *tag_xor,
|
|
unsigned int assoclen,
|
|
unsigned int cryptlen,
|
|
unsigned int authsize);
|
|
|
|
int aegis128_have_aes_insn __ro_after_init;
|
|
|
|
bool crypto_aegis128_have_simd(void)
|
|
{
|
|
if (cpu_have_feature(cpu_feature(AES))) {
|
|
aegis128_have_aes_insn = 1;
|
|
return true;
|
|
}
|
|
return IS_ENABLED(CONFIG_ARM64);
|
|
}
|
|
|
|
void crypto_aegis128_init_simd(union aegis_block *state,
|
|
const union aegis_block *key,
|
|
const u8 *iv)
|
|
{
|
|
kernel_neon_begin();
|
|
crypto_aegis128_init_neon(state, key, iv);
|
|
kernel_neon_end();
|
|
}
|
|
|
|
void crypto_aegis128_update_simd(union aegis_block *state, const void *msg)
|
|
{
|
|
kernel_neon_begin();
|
|
crypto_aegis128_update_neon(state, msg);
|
|
kernel_neon_end();
|
|
}
|
|
|
|
void crypto_aegis128_encrypt_chunk_simd(union aegis_block *state, u8 *dst,
|
|
const u8 *src, unsigned int size)
|
|
{
|
|
kernel_neon_begin();
|
|
crypto_aegis128_encrypt_chunk_neon(state, dst, src, size);
|
|
kernel_neon_end();
|
|
}
|
|
|
|
void crypto_aegis128_decrypt_chunk_simd(union aegis_block *state, u8 *dst,
|
|
const u8 *src, unsigned int size)
|
|
{
|
|
kernel_neon_begin();
|
|
crypto_aegis128_decrypt_chunk_neon(state, dst, src, size);
|
|
kernel_neon_end();
|
|
}
|
|
|
|
int crypto_aegis128_final_simd(union aegis_block *state,
|
|
union aegis_block *tag_xor,
|
|
unsigned int assoclen,
|
|
unsigned int cryptlen,
|
|
unsigned int authsize)
|
|
{
|
|
int ret;
|
|
|
|
kernel_neon_begin();
|
|
ret = crypto_aegis128_final_neon(state, tag_xor, assoclen, cryptlen,
|
|
authsize);
|
|
kernel_neon_end();
|
|
|
|
return ret;
|
|
}
|