diff options
| author | Eric Biggers <ebiggers@google.com> | 2018-11-16 20:26:21 -0500 |
|---|---|---|
| committer | Herbert Xu <herbert@gondor.apana.org.au> | 2018-11-20 01:26:55 -0500 |
| commit | 1ca1b917940c24ca3d1f490118c5474168622953 (patch) | |
| tree | 26cde5a85d0792a8dd709a6f5316f76af8801a35 /drivers/crypto/caam | |
| parent | de61d7ae5d3789dcba3749a418f76613fbee8414 (diff) | |
crypto: chacha20-generic - refactor to allow varying number of rounds
In preparation for adding XChaCha12 support, rename/refactor
chacha20-generic to support different numbers of rounds. The
justification for needing XChaCha12 support is explained in more detail
in the patch "crypto: chacha - add XChaCha12 support".
The only difference between ChaCha{8,12,20} are the number of rounds
itself; all other parts of the algorithm are the same. Therefore,
remove the "20" from all definitions, structures, functions, files, etc.
that will be shared by all ChaCha versions.
Also make ->setkey() store the round count in the chacha_ctx (previously
chacha20_ctx). The generic code then passes the round count through to
chacha_block(). There will be a ->setkey() function for each explicitly
allowed round count; the encrypt/decrypt functions will be the same. I
decided not to do it the opposite way (same ->setkey() function for all
round counts, with different encrypt/decrypt functions) because that
would have required more boilerplate code in architecture-specific
implementations of ChaCha and XChaCha.
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Acked-by: Martin Willi <martin@strongswan.org>
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'drivers/crypto/caam')
| -rw-r--r-- | drivers/crypto/caam/caamalg.c | 2 | ||||
| -rw-r--r-- | drivers/crypto/caam/caamalg_qi2.c | 8 | ||||
| -rw-r--r-- | drivers/crypto/caam/compat.h | 2 |
3 files changed, 6 insertions, 6 deletions
diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c index 523565ce0060..92e593e2069a 100644 --- a/drivers/crypto/caam/caamalg.c +++ b/drivers/crypto/caam/caamalg.c | |||
| @@ -559,7 +559,7 @@ static int chachapoly_setkey(struct crypto_aead *aead, const u8 *key, | |||
| 559 | unsigned int ivsize = crypto_aead_ivsize(aead); | 559 | unsigned int ivsize = crypto_aead_ivsize(aead); |
| 560 | unsigned int saltlen = CHACHAPOLY_IV_SIZE - ivsize; | 560 | unsigned int saltlen = CHACHAPOLY_IV_SIZE - ivsize; |
| 561 | 561 | ||
| 562 | if (keylen != CHACHA20_KEY_SIZE + saltlen) { | 562 | if (keylen != CHACHA_KEY_SIZE + saltlen) { |
| 563 | crypto_aead_set_flags(aead, CRYPTO_TFM_RES_BAD_KEY_LEN); | 563 | crypto_aead_set_flags(aead, CRYPTO_TFM_RES_BAD_KEY_LEN); |
| 564 | return -EINVAL; | 564 | return -EINVAL; |
| 565 | } | 565 | } |
diff --git a/drivers/crypto/caam/caamalg_qi2.c b/drivers/crypto/caam/caamalg_qi2.c index 2598640aa98b..425d5d974613 100644 --- a/drivers/crypto/caam/caamalg_qi2.c +++ b/drivers/crypto/caam/caamalg_qi2.c | |||
| @@ -591,7 +591,7 @@ static int chachapoly_setkey(struct crypto_aead *aead, const u8 *key, | |||
| 591 | unsigned int ivsize = crypto_aead_ivsize(aead); | 591 | unsigned int ivsize = crypto_aead_ivsize(aead); |
| 592 | unsigned int saltlen = CHACHAPOLY_IV_SIZE - ivsize; | 592 | unsigned int saltlen = CHACHAPOLY_IV_SIZE - ivsize; |
| 593 | 593 | ||
| 594 | if (keylen != CHACHA20_KEY_SIZE + saltlen) { | 594 | if (keylen != CHACHA_KEY_SIZE + saltlen) { |
| 595 | crypto_aead_set_flags(aead, CRYPTO_TFM_RES_BAD_KEY_LEN); | 595 | crypto_aead_set_flags(aead, CRYPTO_TFM_RES_BAD_KEY_LEN); |
| 596 | return -EINVAL; | 596 | return -EINVAL; |
| 597 | } | 597 | } |
| @@ -1577,9 +1577,9 @@ static struct caam_skcipher_alg driver_algs[] = { | |||
| 1577 | .setkey = skcipher_setkey, | 1577 | .setkey = skcipher_setkey, |
| 1578 | .encrypt = skcipher_encrypt, | 1578 | .encrypt = skcipher_encrypt, |
| 1579 | .decrypt = skcipher_decrypt, | 1579 | .decrypt = skcipher_decrypt, |
| 1580 | .min_keysize = CHACHA20_KEY_SIZE, | 1580 | .min_keysize = CHACHA_KEY_SIZE, |
| 1581 | .max_keysize = CHACHA20_KEY_SIZE, | 1581 | .max_keysize = CHACHA_KEY_SIZE, |
| 1582 | .ivsize = CHACHA20_IV_SIZE, | 1582 | .ivsize = CHACHA_IV_SIZE, |
| 1583 | }, | 1583 | }, |
| 1584 | .caam.class1_alg_type = OP_ALG_ALGSEL_CHACHA20, | 1584 | .caam.class1_alg_type = OP_ALG_ALGSEL_CHACHA20, |
| 1585 | }, | 1585 | }, |
diff --git a/drivers/crypto/caam/compat.h b/drivers/crypto/caam/compat.h index 8bde903f9f4a..87d9efe4c7aa 100644 --- a/drivers/crypto/caam/compat.h +++ b/drivers/crypto/caam/compat.h | |||
| @@ -36,7 +36,7 @@ | |||
| 36 | #include <crypto/gcm.h> | 36 | #include <crypto/gcm.h> |
| 37 | #include <crypto/sha.h> | 37 | #include <crypto/sha.h> |
| 38 | #include <crypto/md5.h> | 38 | #include <crypto/md5.h> |
| 39 | #include <crypto/chacha20.h> | 39 | #include <crypto/chacha.h> |
| 40 | #include <crypto/poly1305.h> | 40 | #include <crypto/poly1305.h> |
| 41 | #include <crypto/internal/aead.h> | 41 | #include <crypto/internal/aead.h> |
| 42 | #include <crypto/authenc.h> | 42 | #include <crypto/authenc.h> |
