xref: /openbmc/linux/crypto/twofish_generic.c (revision 14386d47)
11ccea77eSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later
25b04fc17SJoachim Fritschi /*
35b04fc17SJoachim Fritschi  * Twofish for CryptoAPI
45b04fc17SJoachim Fritschi  *
55b04fc17SJoachim Fritschi  * Originally Twofish for GPG
65b04fc17SJoachim Fritschi  * By Matthew Skala <mskala@ansuz.sooke.bc.ca>, July 26, 1998
75b04fc17SJoachim Fritschi  * 256-bit key length added March 20, 1999
85b04fc17SJoachim Fritschi  * Some modifications to reduce the text size by Werner Koch, April, 1998
95b04fc17SJoachim Fritschi  * Ported to the kerneli patch by Marc Mutz <Marc@Mutz.com>
105b04fc17SJoachim Fritschi  * Ported to CryptoAPI by Colin Slater <hoho@tacomeat.net>
115b04fc17SJoachim Fritschi  *
125b04fc17SJoachim Fritschi  * The original author has disclaimed all copyright interest in this
135b04fc17SJoachim Fritschi  * code and thus put it in the public domain. The subsequent authors
145b04fc17SJoachim Fritschi  * have put this under the GNU General Public License.
155b04fc17SJoachim Fritschi  *
165b04fc17SJoachim Fritschi  * This code is a "clean room" implementation, written from the paper
175b04fc17SJoachim Fritschi  * _Twofish: A 128-Bit Block Cipher_ by Bruce Schneier, John Kelsey,
185b04fc17SJoachim Fritschi  * Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson, available
195b04fc17SJoachim Fritschi  * through http://www.counterpane.com/twofish.html
205b04fc17SJoachim Fritschi  *
215b04fc17SJoachim Fritschi  * For background information on multiplication in finite fields, used for
225b04fc17SJoachim Fritschi  * the matrix operations in the key schedule, see the book _Contemporary
235b04fc17SJoachim Fritschi  * Abstract Algebra_ by Joseph A. Gallian, especially chapter 22 in the
245b04fc17SJoachim Fritschi  * Third Edition.
255b04fc17SJoachim Fritschi  */
265b04fc17SJoachim Fritschi 
27af1050a4SArd Biesheuvel #include <asm/unaligned.h>
28*14386d47SHerbert Xu #include <crypto/algapi.h>
295b04fc17SJoachim Fritschi #include <crypto/twofish.h>
305b04fc17SJoachim Fritschi #include <linux/module.h>
315b04fc17SJoachim Fritschi #include <linux/init.h>
325b04fc17SJoachim Fritschi #include <linux/types.h>
335b04fc17SJoachim Fritschi #include <linux/errno.h>
345b04fc17SJoachim Fritschi #include <linux/bitops.h>
355b04fc17SJoachim Fritschi 
365b04fc17SJoachim Fritschi /* Macros to compute the g() function in the encryption and decryption
375b04fc17SJoachim Fritschi  * rounds.  G1 is the straight g() function; G2 includes the 8-bit
385b04fc17SJoachim Fritschi  * rotation for the high 32-bit word. */
395b04fc17SJoachim Fritschi 
405b04fc17SJoachim Fritschi #define G1(a) \
415b04fc17SJoachim Fritschi      (ctx->s[0][(a) & 0xFF]) ^ (ctx->s[1][((a) >> 8) & 0xFF]) \
425b04fc17SJoachim Fritschi    ^ (ctx->s[2][((a) >> 16) & 0xFF]) ^ (ctx->s[3][(a) >> 24])
435b04fc17SJoachim Fritschi 
445b04fc17SJoachim Fritschi #define G2(b) \
455b04fc17SJoachim Fritschi      (ctx->s[1][(b) & 0xFF]) ^ (ctx->s[2][((b) >> 8) & 0xFF]) \
465b04fc17SJoachim Fritschi    ^ (ctx->s[3][((b) >> 16) & 0xFF]) ^ (ctx->s[0][(b) >> 24])
475b04fc17SJoachim Fritschi 
485b04fc17SJoachim Fritschi /* Encryption and decryption Feistel rounds.  Each one calls the two g()
495b04fc17SJoachim Fritschi  * macros, does the PHT, and performs the XOR and the appropriate bit
505b04fc17SJoachim Fritschi  * rotations.  The parameters are the round number (used to select subkeys),
515b04fc17SJoachim Fritschi  * and the four 32-bit chunks of the text. */
525b04fc17SJoachim Fritschi 
535b04fc17SJoachim Fritschi #define ENCROUND(n, a, b, c, d) \
545b04fc17SJoachim Fritschi    x = G1 (a); y = G2 (b); \
555b04fc17SJoachim Fritschi    x += y; y += x + ctx->k[2 * (n) + 1]; \
565b04fc17SJoachim Fritschi    (c) ^= x + ctx->k[2 * (n)]; \
575b04fc17SJoachim Fritschi    (c) = ror32((c), 1); \
585b04fc17SJoachim Fritschi    (d) = rol32((d), 1) ^ y
595b04fc17SJoachim Fritschi 
605b04fc17SJoachim Fritschi #define DECROUND(n, a, b, c, d) \
615b04fc17SJoachim Fritschi    x = G1 (a); y = G2 (b); \
625b04fc17SJoachim Fritschi    x += y; y += x; \
635b04fc17SJoachim Fritschi    (d) ^= y + ctx->k[2 * (n) + 1]; \
645b04fc17SJoachim Fritschi    (d) = ror32((d), 1); \
655b04fc17SJoachim Fritschi    (c) = rol32((c), 1); \
665b04fc17SJoachim Fritschi    (c) ^= (x + ctx->k[2 * (n)])
675b04fc17SJoachim Fritschi 
685b04fc17SJoachim Fritschi /* Encryption and decryption cycles; each one is simply two Feistel rounds
695b04fc17SJoachim Fritschi  * with the 32-bit chunks re-ordered to simulate the "swap" */
705b04fc17SJoachim Fritschi 
715b04fc17SJoachim Fritschi #define ENCCYCLE(n) \
725b04fc17SJoachim Fritschi    ENCROUND (2 * (n), a, b, c, d); \
735b04fc17SJoachim Fritschi    ENCROUND (2 * (n) + 1, c, d, a, b)
745b04fc17SJoachim Fritschi 
755b04fc17SJoachim Fritschi #define DECCYCLE(n) \
765b04fc17SJoachim Fritschi    DECROUND (2 * (n) + 1, c, d, a, b); \
775b04fc17SJoachim Fritschi    DECROUND (2 * (n), a, b, c, d)
785b04fc17SJoachim Fritschi 
795b04fc17SJoachim Fritschi /* Macros to convert the input and output bytes into 32-bit words,
805b04fc17SJoachim Fritschi  * and simultaneously perform the whitening step.  INPACK packs word
815b04fc17SJoachim Fritschi  * number n into the variable named by x, using whitening subkey number m.
825b04fc17SJoachim Fritschi  * OUTUNPACK unpacks word number n from the variable named by x, using
835b04fc17SJoachim Fritschi  * whitening subkey number m. */
845b04fc17SJoachim Fritschi 
855b04fc17SJoachim Fritschi #define INPACK(n, x, m) \
86af1050a4SArd Biesheuvel    x = get_unaligned_le32(in + (n) * 4) ^ ctx->w[m]
875b04fc17SJoachim Fritschi 
885b04fc17SJoachim Fritschi #define OUTUNPACK(n, x, m) \
895b04fc17SJoachim Fritschi    x ^= ctx->w[m]; \
90af1050a4SArd Biesheuvel    put_unaligned_le32(x, out + (n) * 4)
915b04fc17SJoachim Fritschi 
925b04fc17SJoachim Fritschi 
935b04fc17SJoachim Fritschi 
945b04fc17SJoachim Fritschi /* Encrypt one block.  in and out may be the same. */
twofish_encrypt(struct crypto_tfm * tfm,u8 * out,const u8 * in)955b04fc17SJoachim Fritschi static void twofish_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
965b04fc17SJoachim Fritschi {
975b04fc17SJoachim Fritschi 	struct twofish_ctx *ctx = crypto_tfm_ctx(tfm);
985b04fc17SJoachim Fritschi 
995b04fc17SJoachim Fritschi 	/* The four 32-bit chunks of the text. */
1005b04fc17SJoachim Fritschi 	u32 a, b, c, d;
1015b04fc17SJoachim Fritschi 
1025b04fc17SJoachim Fritschi 	/* Temporaries used by the round function. */
1035b04fc17SJoachim Fritschi 	u32 x, y;
1045b04fc17SJoachim Fritschi 
1055b04fc17SJoachim Fritschi 	/* Input whitening and packing. */
1065b04fc17SJoachim Fritschi 	INPACK (0, a, 0);
1075b04fc17SJoachim Fritschi 	INPACK (1, b, 1);
1085b04fc17SJoachim Fritschi 	INPACK (2, c, 2);
1095b04fc17SJoachim Fritschi 	INPACK (3, d, 3);
1105b04fc17SJoachim Fritschi 
1115b04fc17SJoachim Fritschi 	/* Encryption Feistel cycles. */
1125b04fc17SJoachim Fritschi 	ENCCYCLE (0);
1135b04fc17SJoachim Fritschi 	ENCCYCLE (1);
1145b04fc17SJoachim Fritschi 	ENCCYCLE (2);
1155b04fc17SJoachim Fritschi 	ENCCYCLE (3);
1165b04fc17SJoachim Fritschi 	ENCCYCLE (4);
1175b04fc17SJoachim Fritschi 	ENCCYCLE (5);
1185b04fc17SJoachim Fritschi 	ENCCYCLE (6);
1195b04fc17SJoachim Fritschi 	ENCCYCLE (7);
1205b04fc17SJoachim Fritschi 
1215b04fc17SJoachim Fritschi 	/* Output whitening and unpacking. */
1225b04fc17SJoachim Fritschi 	OUTUNPACK (0, c, 4);
1235b04fc17SJoachim Fritschi 	OUTUNPACK (1, d, 5);
1245b04fc17SJoachim Fritschi 	OUTUNPACK (2, a, 6);
1255b04fc17SJoachim Fritschi 	OUTUNPACK (3, b, 7);
1265b04fc17SJoachim Fritschi 
1275b04fc17SJoachim Fritschi }
1285b04fc17SJoachim Fritschi 
1295b04fc17SJoachim Fritschi /* Decrypt one block.  in and out may be the same. */
twofish_decrypt(struct crypto_tfm * tfm,u8 * out,const u8 * in)1305b04fc17SJoachim Fritschi static void twofish_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
1315b04fc17SJoachim Fritschi {
1325b04fc17SJoachim Fritschi 	struct twofish_ctx *ctx = crypto_tfm_ctx(tfm);
1335b04fc17SJoachim Fritschi 
1345b04fc17SJoachim Fritschi 	/* The four 32-bit chunks of the text. */
1355b04fc17SJoachim Fritschi 	u32 a, b, c, d;
1365b04fc17SJoachim Fritschi 
1375b04fc17SJoachim Fritschi 	/* Temporaries used by the round function. */
1385b04fc17SJoachim Fritschi 	u32 x, y;
1395b04fc17SJoachim Fritschi 
1405b04fc17SJoachim Fritschi 	/* Input whitening and packing. */
1415b04fc17SJoachim Fritschi 	INPACK (0, c, 4);
1425b04fc17SJoachim Fritschi 	INPACK (1, d, 5);
1435b04fc17SJoachim Fritschi 	INPACK (2, a, 6);
1445b04fc17SJoachim Fritschi 	INPACK (3, b, 7);
1455b04fc17SJoachim Fritschi 
1465b04fc17SJoachim Fritschi 	/* Encryption Feistel cycles. */
1475b04fc17SJoachim Fritschi 	DECCYCLE (7);
1485b04fc17SJoachim Fritschi 	DECCYCLE (6);
1495b04fc17SJoachim Fritschi 	DECCYCLE (5);
1505b04fc17SJoachim Fritschi 	DECCYCLE (4);
1515b04fc17SJoachim Fritschi 	DECCYCLE (3);
1525b04fc17SJoachim Fritschi 	DECCYCLE (2);
1535b04fc17SJoachim Fritschi 	DECCYCLE (1);
1545b04fc17SJoachim Fritschi 	DECCYCLE (0);
1555b04fc17SJoachim Fritschi 
1565b04fc17SJoachim Fritschi 	/* Output whitening and unpacking. */
1575b04fc17SJoachim Fritschi 	OUTUNPACK (0, a, 0);
1585b04fc17SJoachim Fritschi 	OUTUNPACK (1, b, 1);
1595b04fc17SJoachim Fritschi 	OUTUNPACK (2, c, 2);
1605b04fc17SJoachim Fritschi 	OUTUNPACK (3, d, 3);
1615b04fc17SJoachim Fritschi 
1625b04fc17SJoachim Fritschi }
1635b04fc17SJoachim Fritschi 
1645b04fc17SJoachim Fritschi static struct crypto_alg alg = {
1655b04fc17SJoachim Fritschi 	.cra_name           =   "twofish",
1665b04fc17SJoachim Fritschi 	.cra_driver_name    =   "twofish-generic",
1675b04fc17SJoachim Fritschi 	.cra_priority       =   100,
1685b04fc17SJoachim Fritschi 	.cra_flags          =   CRYPTO_ALG_TYPE_CIPHER,
1695b04fc17SJoachim Fritschi 	.cra_blocksize      =   TF_BLOCK_SIZE,
1705b04fc17SJoachim Fritschi 	.cra_ctxsize        =   sizeof(struct twofish_ctx),
1715b04fc17SJoachim Fritschi 	.cra_module         =   THIS_MODULE,
1725b04fc17SJoachim Fritschi 	.cra_u              =   { .cipher = {
1735b04fc17SJoachim Fritschi 	.cia_min_keysize    =   TF_MIN_KEY_SIZE,
1745b04fc17SJoachim Fritschi 	.cia_max_keysize    =   TF_MAX_KEY_SIZE,
1755b04fc17SJoachim Fritschi 	.cia_setkey         =   twofish_setkey,
1765b04fc17SJoachim Fritschi 	.cia_encrypt        =   twofish_encrypt,
1775b04fc17SJoachim Fritschi 	.cia_decrypt        =   twofish_decrypt } }
1785b04fc17SJoachim Fritschi };
1795b04fc17SJoachim Fritschi 
twofish_mod_init(void)1805b04fc17SJoachim Fritschi static int __init twofish_mod_init(void)
1815b04fc17SJoachim Fritschi {
1825b04fc17SJoachim Fritschi 	return crypto_register_alg(&alg);
1835b04fc17SJoachim Fritschi }
1845b04fc17SJoachim Fritschi 
twofish_mod_fini(void)1855b04fc17SJoachim Fritschi static void __exit twofish_mod_fini(void)
1865b04fc17SJoachim Fritschi {
1875b04fc17SJoachim Fritschi 	crypto_unregister_alg(&alg);
1885b04fc17SJoachim Fritschi }
1895b04fc17SJoachim Fritschi 
190c4741b23SEric Biggers subsys_initcall(twofish_mod_init);
1915b04fc17SJoachim Fritschi module_exit(twofish_mod_fini);
1925b04fc17SJoachim Fritschi 
1935b04fc17SJoachim Fritschi MODULE_LICENSE("GPL");
1945b04fc17SJoachim Fritschi MODULE_DESCRIPTION ("Twofish Cipher Algorithm");
1955d26a105SKees Cook MODULE_ALIAS_CRYPTO("twofish");
1963e14dcf7SMathias Krause MODULE_ALIAS_CRYPTO("twofish-generic");
197