Thomas Gleixner | 1ccea77 | 2019-05-19 15:51:43 +0200 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2 | /* |
| 3 | * Twofish for CryptoAPI |
| 4 | * |
| 5 | * Originally Twofish for GPG |
| 6 | * By Matthew Skala <mskala@ansuz.sooke.bc.ca>, July 26, 1998 |
| 7 | * 256-bit key length added March 20, 1999 |
| 8 | * Some modifications to reduce the text size by Werner Koch, April, 1998 |
| 9 | * Ported to the kerneli patch by Marc Mutz <Marc@Mutz.com> |
| 10 | * Ported to CryptoAPI by Colin Slater <hoho@tacomeat.net> |
| 11 | * |
| 12 | * The original author has disclaimed all copyright interest in this |
| 13 | * code and thus put it in the public domain. The subsequent authors |
| 14 | * have put this under the GNU General Public License. |
| 15 | * |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 16 | * This code is a "clean room" implementation, written from the paper |
| 17 | * _Twofish: A 128-Bit Block Cipher_ by Bruce Schneier, John Kelsey, |
| 18 | * Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson, available |
| 19 | * through http://www.counterpane.com/twofish.html |
| 20 | * |
| 21 | * For background information on multiplication in finite fields, used for |
| 22 | * the matrix operations in the key schedule, see the book _Contemporary |
| 23 | * Abstract Algebra_ by Joseph A. Gallian, especially chapter 22 in the |
| 24 | * Third Edition. |
| 25 | */ |
Herbert Xu | 06ace7a | 2005-10-30 21:25:15 +1100 | [diff] [blame] | 26 | |
Ard Biesheuvel | af1050a | 2021-02-01 19:02:37 +0100 | [diff] [blame] | 27 | #include <asm/unaligned.h> |
Joachim Fritschi | 2729bb4 | 2006-06-20 20:37:23 +1000 | [diff] [blame] | 28 | #include <crypto/twofish.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 29 | #include <linux/module.h> |
| 30 | #include <linux/init.h> |
| 31 | #include <linux/types.h> |
| 32 | #include <linux/errno.h> |
| 33 | #include <linux/crypto.h> |
Denis Vlasenko | a5f8c47 | 2006-01-16 17:42:28 +1100 | [diff] [blame] | 34 | #include <linux/bitops.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 35 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 36 | /* Macros to compute the g() function in the encryption and decryption |
| 37 | * rounds. G1 is the straight g() function; G2 includes the 8-bit |
| 38 | * rotation for the high 32-bit word. */ |
| 39 | |
| 40 | #define G1(a) \ |
| 41 | (ctx->s[0][(a) & 0xFF]) ^ (ctx->s[1][((a) >> 8) & 0xFF]) \ |
| 42 | ^ (ctx->s[2][((a) >> 16) & 0xFF]) ^ (ctx->s[3][(a) >> 24]) |
| 43 | |
| 44 | #define G2(b) \ |
| 45 | (ctx->s[1][(b) & 0xFF]) ^ (ctx->s[2][((b) >> 8) & 0xFF]) \ |
| 46 | ^ (ctx->s[3][((b) >> 16) & 0xFF]) ^ (ctx->s[0][(b) >> 24]) |
| 47 | |
| 48 | /* Encryption and decryption Feistel rounds. Each one calls the two g() |
| 49 | * macros, does the PHT, and performs the XOR and the appropriate bit |
| 50 | * rotations. The parameters are the round number (used to select subkeys), |
| 51 | * and the four 32-bit chunks of the text. */ |
| 52 | |
| 53 | #define ENCROUND(n, a, b, c, d) \ |
| 54 | x = G1 (a); y = G2 (b); \ |
| 55 | x += y; y += x + ctx->k[2 * (n) + 1]; \ |
| 56 | (c) ^= x + ctx->k[2 * (n)]; \ |
Denis Vlasenko | a5f8c47 | 2006-01-16 17:42:28 +1100 | [diff] [blame] | 57 | (c) = ror32((c), 1); \ |
| 58 | (d) = rol32((d), 1) ^ y |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 59 | |
| 60 | #define DECROUND(n, a, b, c, d) \ |
| 61 | x = G1 (a); y = G2 (b); \ |
| 62 | x += y; y += x; \ |
| 63 | (d) ^= y + ctx->k[2 * (n) + 1]; \ |
Denis Vlasenko | a5f8c47 | 2006-01-16 17:42:28 +1100 | [diff] [blame] | 64 | (d) = ror32((d), 1); \ |
| 65 | (c) = rol32((c), 1); \ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 66 | (c) ^= (x + ctx->k[2 * (n)]) |
| 67 | |
| 68 | /* Encryption and decryption cycles; each one is simply two Feistel rounds |
| 69 | * with the 32-bit chunks re-ordered to simulate the "swap" */ |
| 70 | |
| 71 | #define ENCCYCLE(n) \ |
| 72 | ENCROUND (2 * (n), a, b, c, d); \ |
| 73 | ENCROUND (2 * (n) + 1, c, d, a, b) |
| 74 | |
| 75 | #define DECCYCLE(n) \ |
| 76 | DECROUND (2 * (n) + 1, c, d, a, b); \ |
| 77 | DECROUND (2 * (n), a, b, c, d) |
| 78 | |
| 79 | /* Macros to convert the input and output bytes into 32-bit words, |
| 80 | * and simultaneously perform the whitening step. INPACK packs word |
| 81 | * number n into the variable named by x, using whitening subkey number m. |
| 82 | * OUTUNPACK unpacks word number n from the variable named by x, using |
| 83 | * whitening subkey number m. */ |
| 84 | |
| 85 | #define INPACK(n, x, m) \ |
Ard Biesheuvel | af1050a | 2021-02-01 19:02:37 +0100 | [diff] [blame] | 86 | x = get_unaligned_le32(in + (n) * 4) ^ ctx->w[m] |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 87 | |
| 88 | #define OUTUNPACK(n, x, m) \ |
| 89 | x ^= ctx->w[m]; \ |
Ard Biesheuvel | af1050a | 2021-02-01 19:02:37 +0100 | [diff] [blame] | 90 | put_unaligned_le32(x, out + (n) * 4) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 91 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 92 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 93 | |
| 94 | /* Encrypt one block. in and out may be the same. */ |
Herbert Xu | 6c2bb98 | 2006-05-16 22:09:29 +1000 | [diff] [blame] | 95 | static void twofish_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 96 | { |
Herbert Xu | 6c2bb98 | 2006-05-16 22:09:29 +1000 | [diff] [blame] | 97 | struct twofish_ctx *ctx = crypto_tfm_ctx(tfm); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 98 | |
| 99 | /* The four 32-bit chunks of the text. */ |
| 100 | u32 a, b, c, d; |
| 101 | |
| 102 | /* Temporaries used by the round function. */ |
| 103 | u32 x, y; |
| 104 | |
| 105 | /* Input whitening and packing. */ |
| 106 | INPACK (0, a, 0); |
| 107 | INPACK (1, b, 1); |
| 108 | INPACK (2, c, 2); |
| 109 | INPACK (3, d, 3); |
| 110 | |
| 111 | /* Encryption Feistel cycles. */ |
| 112 | ENCCYCLE (0); |
| 113 | ENCCYCLE (1); |
| 114 | ENCCYCLE (2); |
| 115 | ENCCYCLE (3); |
| 116 | ENCCYCLE (4); |
| 117 | ENCCYCLE (5); |
| 118 | ENCCYCLE (6); |
| 119 | ENCCYCLE (7); |
| 120 | |
| 121 | /* Output whitening and unpacking. */ |
| 122 | OUTUNPACK (0, c, 4); |
| 123 | OUTUNPACK (1, d, 5); |
| 124 | OUTUNPACK (2, a, 6); |
| 125 | OUTUNPACK (3, b, 7); |
| 126 | |
| 127 | } |
| 128 | |
| 129 | /* Decrypt one block. in and out may be the same. */ |
Herbert Xu | 6c2bb98 | 2006-05-16 22:09:29 +1000 | [diff] [blame] | 130 | static void twofish_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 131 | { |
Herbert Xu | 6c2bb98 | 2006-05-16 22:09:29 +1000 | [diff] [blame] | 132 | struct twofish_ctx *ctx = crypto_tfm_ctx(tfm); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 133 | |
| 134 | /* The four 32-bit chunks of the text. */ |
| 135 | u32 a, b, c, d; |
| 136 | |
| 137 | /* Temporaries used by the round function. */ |
| 138 | u32 x, y; |
| 139 | |
| 140 | /* Input whitening and packing. */ |
| 141 | INPACK (0, c, 4); |
| 142 | INPACK (1, d, 5); |
| 143 | INPACK (2, a, 6); |
| 144 | INPACK (3, b, 7); |
| 145 | |
| 146 | /* Encryption Feistel cycles. */ |
| 147 | DECCYCLE (7); |
| 148 | DECCYCLE (6); |
| 149 | DECCYCLE (5); |
| 150 | DECCYCLE (4); |
| 151 | DECCYCLE (3); |
| 152 | DECCYCLE (2); |
| 153 | DECCYCLE (1); |
| 154 | DECCYCLE (0); |
| 155 | |
| 156 | /* Output whitening and unpacking. */ |
| 157 | OUTUNPACK (0, a, 0); |
| 158 | OUTUNPACK (1, b, 1); |
| 159 | OUTUNPACK (2, c, 2); |
| 160 | OUTUNPACK (3, d, 3); |
| 161 | |
| 162 | } |
| 163 | |
| 164 | static struct crypto_alg alg = { |
| 165 | .cra_name = "twofish", |
Joachim Fritschi | 758f570 | 2006-06-20 20:39:29 +1000 | [diff] [blame] | 166 | .cra_driver_name = "twofish-generic", |
| 167 | .cra_priority = 100, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 168 | .cra_flags = CRYPTO_ALG_TYPE_CIPHER, |
| 169 | .cra_blocksize = TF_BLOCK_SIZE, |
| 170 | .cra_ctxsize = sizeof(struct twofish_ctx), |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 171 | .cra_module = THIS_MODULE, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 172 | .cra_u = { .cipher = { |
| 173 | .cia_min_keysize = TF_MIN_KEY_SIZE, |
| 174 | .cia_max_keysize = TF_MAX_KEY_SIZE, |
| 175 | .cia_setkey = twofish_setkey, |
| 176 | .cia_encrypt = twofish_encrypt, |
| 177 | .cia_decrypt = twofish_decrypt } } |
| 178 | }; |
| 179 | |
Kamalesh Babulal | 3af5b90 | 2008-04-05 21:00:57 +0800 | [diff] [blame] | 180 | static int __init twofish_mod_init(void) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 181 | { |
| 182 | return crypto_register_alg(&alg); |
| 183 | } |
| 184 | |
Kamalesh Babulal | 3af5b90 | 2008-04-05 21:00:57 +0800 | [diff] [blame] | 185 | static void __exit twofish_mod_fini(void) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 186 | { |
| 187 | crypto_unregister_alg(&alg); |
| 188 | } |
| 189 | |
Eric Biggers | c4741b2 | 2019-04-11 21:57:42 -0700 | [diff] [blame] | 190 | subsys_initcall(twofish_mod_init); |
Kamalesh Babulal | 3af5b90 | 2008-04-05 21:00:57 +0800 | [diff] [blame] | 191 | module_exit(twofish_mod_fini); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 192 | |
| 193 | MODULE_LICENSE("GPL"); |
| 194 | MODULE_DESCRIPTION ("Twofish Cipher Algorithm"); |
Kees Cook | 5d26a10 | 2014-11-20 17:05:53 -0800 | [diff] [blame] | 195 | MODULE_ALIAS_CRYPTO("twofish"); |
Mathias Krause | 3e14dcf | 2015-01-11 18:17:42 +0100 | [diff] [blame] | 196 | MODULE_ALIAS_CRYPTO("twofish-generic"); |