// SPDX-License-Identifier: GPL-2.0-or-later /* * Copyright (C) 2019 Linaro, Ltd. */ #ifdef CONFIG_ARM64 #include #define AES_ROUND "aese %0.16b, %1.16b \n\t aesmc %0.16b, %0.16b" #else #include #define AES_ROUND "aese.8 %q0, %q1 \n\t aesmc.8 %q0, %q0" #endif #define AEGIS_BLOCK_SIZE 16 #include void *memcpy(void *dest, const void *src, size_t n); void *memset(void *s, int c, size_t n); struct aegis128_state { uint8x16_t v[5]; }; static struct aegis128_state aegis128_load_state_neon(const void *state) { return (struct aegis128_state){ { vld1q_u8(state), vld1q_u8(state + 16), vld1q_u8(state + 32), vld1q_u8(state + 48), vld1q_u8(state + 64) } }; } static void aegis128_save_state_neon(struct aegis128_state st, void *state) { vst1q_u8(state, st.v[0]); vst1q_u8(state + 16, st.v[1]); vst1q_u8(state + 32, st.v[2]); vst1q_u8(state + 48, st.v[3]); vst1q_u8(state + 64, st.v[4]); } static uint8x16_t aegis_aes_round(uint8x16_t w) { uint8x16_t z = {}; /* * We use inline asm here instead of the vaeseq_u8/vaesmcq_u8 intrinsics * to force the compiler to issue the aese/aesmc instructions in pairs. * This is much faster on many cores, where the instruction pair can * execute in a single cycle. */ asm(AES_ROUND : "+w"(w) : "w"(z)); return w; } static struct aegis128_state aegis128_update_neon(struct aegis128_state st, uint8x16_t m) { uint8x16_t t; t = aegis_aes_round(st.v[3]); st.v[3] ^= aegis_aes_round(st.v[2]); st.v[2] ^= aegis_aes_round(st.v[1]); st.v[1] ^= aegis_aes_round(st.v[0]); st.v[0] ^= aegis_aes_round(st.v[4]) ^ m; st.v[4] ^= t; return st; } void crypto_aegis128_update_neon(void *state, const void *msg) { struct aegis128_state st = aegis128_load_state_neon(state); st = aegis128_update_neon(st, vld1q_u8(msg)); aegis128_save_state_neon(st, state); } void crypto_aegis128_encrypt_chunk_neon(void *state, void *dst, const void *src, unsigned int size) { struct aegis128_state st = aegis128_load_state_neon(state); uint8x16_t tmp; while (size >= AEGIS_BLOCK_SIZE) { uint8x16_t s = vld1q_u8(src); tmp = s ^ st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; st = aegis128_update_neon(st, s); vst1q_u8(dst, tmp); size -= AEGIS_BLOCK_SIZE; src += AEGIS_BLOCK_SIZE; dst += AEGIS_BLOCK_SIZE; } if (size > 0) { uint8_t buf[AEGIS_BLOCK_SIZE] = {}; uint8x16_t msg; memcpy(buf, src, size); msg = vld1q_u8(buf); tmp = msg ^ st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; st = aegis128_update_neon(st, msg); vst1q_u8(buf, tmp); memcpy(dst, buf, size); } aegis128_save_state_neon(st, state); } void crypto_aegis128_decrypt_chunk_neon(void *state, void *dst, const void *src, unsigned int size) { struct aegis128_state st = aegis128_load_state_neon(state); uint8x16_t tmp; while (size >= AEGIS_BLOCK_SIZE) { tmp = vld1q_u8(src) ^ st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; st = aegis128_update_neon(st, tmp); vst1q_u8(dst, tmp); size -= AEGIS_BLOCK_SIZE; src += AEGIS_BLOCK_SIZE; dst += AEGIS_BLOCK_SIZE; } if (size > 0) { uint8_t buf[AEGIS_BLOCK_SIZE] = {}; uint8x16_t msg; memcpy(buf, src, size); msg = vld1q_u8(buf) ^ st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; vst1q_u8(buf, msg); memcpy(dst, buf, size); memset(buf + size, 0, AEGIS_BLOCK_SIZE - size); msg = vld1q_u8(buf); st = aegis128_update_neon(st, msg); } aegis128_save_state_neon(st, state); }