xref: /linux/arch/powerpc/crypto/curve25519-ppc64le-core.c (revision 85ffc6e4ed3712f8b3fedb3fbe42afae644a699c)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * Copyright 2024- IBM Corp.
4  *
5  * X25519 scalar multiplication with 51 bits limbs for PPC64le.
6  *   Based on RFC7748 and AArch64 optimized implementation for X25519
7  *     - Algorithm 1 Scalar multiplication of a variable point
8  */
9 
10 #include <crypto/curve25519.h>
11 #include <crypto/internal/kpp.h>
12 
13 #include <linux/types.h>
14 #include <linux/jump_label.h>
15 #include <linux/kernel.h>
16 #include <linux/module.h>
17 #include <linux/scatterlist.h>
18 
19 #include <linux/cpufeature.h>
20 #include <linux/processor.h>
21 
22 typedef uint64_t fe51[5];
23 
24 asmlinkage void x25519_fe51_mul(fe51 h, const fe51 f, const fe51 g);
25 asmlinkage void x25519_fe51_sqr(fe51 h, const fe51 f);
26 asmlinkage void x25519_fe51_mul121666(fe51 h, fe51 f);
27 asmlinkage void x25519_fe51_sqr_times(fe51 h, const fe51 f, int n);
28 asmlinkage void x25519_fe51_frombytes(fe51 h, const uint8_t *s);
29 asmlinkage void x25519_fe51_tobytes(uint8_t *s, const fe51 h);
30 asmlinkage void x25519_cswap(fe51 p, fe51 q, unsigned int bit);
31 
32 #define fmul x25519_fe51_mul
33 #define fsqr x25519_fe51_sqr
34 #define fmul121666 x25519_fe51_mul121666
35 #define fe51_tobytes x25519_fe51_tobytes
36 
fadd(fe51 h,const fe51 f,const fe51 g)37 static void fadd(fe51 h, const fe51 f, const fe51 g)
38 {
39 	h[0] = f[0] + g[0];
40 	h[1] = f[1] + g[1];
41 	h[2] = f[2] + g[2];
42 	h[3] = f[3] + g[3];
43 	h[4] = f[4] + g[4];
44 }
45 
46 /*
47  * Prime = 2 ** 255 - 19, 255 bits
48  *    (0x7fffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffed)
49  *
50  * Prime in 5 51-bit limbs
51  */
52 static fe51 prime51 = { 0x7ffffffffffed, 0x7ffffffffffff, 0x7ffffffffffff, 0x7ffffffffffff, 0x7ffffffffffff};
53 
fsub(fe51 h,const fe51 f,const fe51 g)54 static void fsub(fe51 h, const fe51 f, const fe51 g)
55 {
56 	h[0] = (f[0] + ((prime51[0] * 2))) - g[0];
57 	h[1] = (f[1] + ((prime51[1] * 2))) - g[1];
58 	h[2] = (f[2] + ((prime51[2] * 2))) - g[2];
59 	h[3] = (f[3] + ((prime51[3] * 2))) - g[3];
60 	h[4] = (f[4] + ((prime51[4] * 2))) - g[4];
61 }
62 
fe51_frombytes(fe51 h,const uint8_t * s)63 static void fe51_frombytes(fe51 h, const uint8_t *s)
64 {
65 	/*
66 	 * Make sure 64-bit aligned.
67 	 */
68 	unsigned char sbuf[32+8];
69 	unsigned char *sb = PTR_ALIGN((void *)sbuf, 8);
70 
71 	memcpy(sb, s, 32);
72 	x25519_fe51_frombytes(h, sb);
73 }
74 
finv(fe51 o,const fe51 i)75 static void finv(fe51 o, const fe51 i)
76 {
77 	fe51 a0, b, c, t00;
78 
79 	fsqr(a0, i);
80 	x25519_fe51_sqr_times(t00, a0, 2);
81 
82 	fmul(b, t00, i);
83 	fmul(a0, b, a0);
84 
85 	fsqr(t00, a0);
86 
87 	fmul(b, t00, b);
88 	x25519_fe51_sqr_times(t00, b, 5);
89 
90 	fmul(b, t00, b);
91 	x25519_fe51_sqr_times(t00, b, 10);
92 
93 	fmul(c, t00, b);
94 	x25519_fe51_sqr_times(t00, c, 20);
95 
96 	fmul(t00, t00, c);
97 	x25519_fe51_sqr_times(t00, t00, 10);
98 
99 	fmul(b, t00, b);
100 	x25519_fe51_sqr_times(t00, b, 50);
101 
102 	fmul(c, t00, b);
103 	x25519_fe51_sqr_times(t00, c, 100);
104 
105 	fmul(t00, t00, c);
106 	x25519_fe51_sqr_times(t00, t00, 50);
107 
108 	fmul(t00, t00, b);
109 	x25519_fe51_sqr_times(t00, t00, 5);
110 
111 	fmul(o, t00, a0);
112 }
113 
curve25519_fe51(uint8_t out[32],const uint8_t scalar[32],const uint8_t point[32])114 static void curve25519_fe51(uint8_t out[32], const uint8_t scalar[32],
115 			    const uint8_t point[32])
116 {
117 	fe51 x1, x2, z2, x3, z3;
118 	uint8_t s[32];
119 	unsigned int swap = 0;
120 	int i;
121 
122 	memcpy(s, scalar, 32);
123 	s[0]  &= 0xf8;
124 	s[31] &= 0x7f;
125 	s[31] |= 0x40;
126 	fe51_frombytes(x1, point);
127 
128 	z2[0] = z2[1] = z2[2] = z2[3] = z2[4] = 0;
129 	x3[0] = x1[0];
130 	x3[1] = x1[1];
131 	x3[2] = x1[2];
132 	x3[3] = x1[3];
133 	x3[4] = x1[4];
134 
135 	x2[0] = z3[0] = 1;
136 	x2[1] = z3[1] = 0;
137 	x2[2] = z3[2] = 0;
138 	x2[3] = z3[3] = 0;
139 	x2[4] = z3[4] = 0;
140 
141 	for (i = 254; i >= 0; --i) {
142 		unsigned int k_t = 1 & (s[i / 8] >> (i & 7));
143 		fe51 a, b, c, d, e;
144 		fe51 da, cb, aa, bb;
145 		fe51 dacb_p, dacb_m;
146 
147 		swap ^= k_t;
148 		x25519_cswap(x2, x3, swap);
149 		x25519_cswap(z2, z3, swap);
150 		swap = k_t;
151 
152 		fsub(b, x2, z2);		// B = x_2 - z_2
153 		fadd(a, x2, z2);		// A = x_2 + z_2
154 		fsub(d, x3, z3);		// D = x_3 - z_3
155 		fadd(c, x3, z3);		// C = x_3 + z_3
156 
157 		fsqr(bb, b);			// BB = B^2
158 		fsqr(aa, a);			// AA = A^2
159 		fmul(da, d, a);			// DA = D * A
160 		fmul(cb, c, b);			// CB = C * B
161 
162 		fsub(e, aa, bb);		// E = AA - BB
163 		fmul(x2, aa, bb);		// x2 = AA * BB
164 		fadd(dacb_p, da, cb);		// DA + CB
165 		fsub(dacb_m, da, cb);		// DA - CB
166 
167 		fmul121666(z3, e);		// 121666 * E
168 		fsqr(z2, dacb_m);		// (DA - CB)^2
169 		fsqr(x3, dacb_p);		// x3 = (DA + CB)^2
170 		fadd(b, bb, z3);		// BB + 121666 * E
171 		fmul(z3, x1, z2);		// z3 = x1 * (DA - CB)^2
172 		fmul(z2, e, b);		// z2 = e * (BB + (DA + CB)^2)
173 	}
174 
175 	finv(z2, z2);
176 	fmul(x2, x2, z2);
177 	fe51_tobytes(out, x2);
178 }
179 
curve25519_arch(u8 mypublic[CURVE25519_KEY_SIZE],const u8 secret[CURVE25519_KEY_SIZE],const u8 basepoint[CURVE25519_KEY_SIZE])180 void curve25519_arch(u8 mypublic[CURVE25519_KEY_SIZE],
181 		     const u8 secret[CURVE25519_KEY_SIZE],
182 		     const u8 basepoint[CURVE25519_KEY_SIZE])
183 {
184 	curve25519_fe51(mypublic, secret, basepoint);
185 }
186 EXPORT_SYMBOL(curve25519_arch);
187 
curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE],const u8 secret[CURVE25519_KEY_SIZE])188 void curve25519_base_arch(u8 pub[CURVE25519_KEY_SIZE],
189 			  const u8 secret[CURVE25519_KEY_SIZE])
190 {
191 	curve25519_fe51(pub, secret, curve25519_base_point);
192 }
193 EXPORT_SYMBOL(curve25519_base_arch);
194 
curve25519_set_secret(struct crypto_kpp * tfm,const void * buf,unsigned int len)195 static int curve25519_set_secret(struct crypto_kpp *tfm, const void *buf,
196 				 unsigned int len)
197 {
198 	u8 *secret = kpp_tfm_ctx(tfm);
199 
200 	if (!len)
201 		curve25519_generate_secret(secret);
202 	else if (len == CURVE25519_KEY_SIZE &&
203 		 crypto_memneq(buf, curve25519_null_point, CURVE25519_KEY_SIZE))
204 		memcpy(secret, buf, CURVE25519_KEY_SIZE);
205 	else
206 		return -EINVAL;
207 	return 0;
208 }
209 
curve25519_generate_public_key(struct kpp_request * req)210 static int curve25519_generate_public_key(struct kpp_request *req)
211 {
212 	struct crypto_kpp *tfm = crypto_kpp_reqtfm(req);
213 	const u8 *secret = kpp_tfm_ctx(tfm);
214 	u8 buf[CURVE25519_KEY_SIZE];
215 	int copied, nbytes;
216 
217 	if (req->src)
218 		return -EINVAL;
219 
220 	curve25519_base_arch(buf, secret);
221 
222 	/* might want less than we've got */
223 	nbytes = min_t(size_t, CURVE25519_KEY_SIZE, req->dst_len);
224 	copied = sg_copy_from_buffer(req->dst, sg_nents_for_len(req->dst,
225 								nbytes),
226 				     buf, nbytes);
227 	if (copied != nbytes)
228 		return -EINVAL;
229 	return 0;
230 }
231 
curve25519_compute_shared_secret(struct kpp_request * req)232 static int curve25519_compute_shared_secret(struct kpp_request *req)
233 {
234 	struct crypto_kpp *tfm = crypto_kpp_reqtfm(req);
235 	const u8 *secret = kpp_tfm_ctx(tfm);
236 	u8 public_key[CURVE25519_KEY_SIZE];
237 	u8 buf[CURVE25519_KEY_SIZE];
238 	int copied, nbytes;
239 
240 	if (!req->src)
241 		return -EINVAL;
242 
243 	copied = sg_copy_to_buffer(req->src,
244 				   sg_nents_for_len(req->src,
245 						    CURVE25519_KEY_SIZE),
246 				   public_key, CURVE25519_KEY_SIZE);
247 	if (copied != CURVE25519_KEY_SIZE)
248 		return -EINVAL;
249 
250 	curve25519_arch(buf, secret, public_key);
251 
252 	/* might want less than we've got */
253 	nbytes = min_t(size_t, CURVE25519_KEY_SIZE, req->dst_len);
254 	copied = sg_copy_from_buffer(req->dst, sg_nents_for_len(req->dst,
255 								nbytes),
256 				     buf, nbytes);
257 	if (copied != nbytes)
258 		return -EINVAL;
259 	return 0;
260 }
261 
curve25519_max_size(struct crypto_kpp * tfm)262 static unsigned int curve25519_max_size(struct crypto_kpp *tfm)
263 {
264 	return CURVE25519_KEY_SIZE;
265 }
266 
267 static struct kpp_alg curve25519_alg = {
268 	.base.cra_name		= "curve25519",
269 	.base.cra_driver_name	= "curve25519-ppc64le",
270 	.base.cra_priority	= 200,
271 	.base.cra_module	= THIS_MODULE,
272 	.base.cra_ctxsize	= CURVE25519_KEY_SIZE,
273 
274 	.set_secret		= curve25519_set_secret,
275 	.generate_public_key	= curve25519_generate_public_key,
276 	.compute_shared_secret	= curve25519_compute_shared_secret,
277 	.max_size		= curve25519_max_size,
278 };
279 
280 
curve25519_mod_init(void)281 static int __init curve25519_mod_init(void)
282 {
283 	return IS_REACHABLE(CONFIG_CRYPTO_KPP) ?
284 		crypto_register_kpp(&curve25519_alg) : 0;
285 }
286 
curve25519_mod_exit(void)287 static void __exit curve25519_mod_exit(void)
288 {
289 	if (IS_REACHABLE(CONFIG_CRYPTO_KPP))
290 		crypto_unregister_kpp(&curve25519_alg);
291 }
292 
293 module_init(curve25519_mod_init);
294 module_exit(curve25519_mod_exit);
295 
296 MODULE_ALIAS_CRYPTO("curve25519");
297 MODULE_ALIAS_CRYPTO("curve25519-ppc64le");
298 MODULE_DESCRIPTION("PPC64le Curve25519 scalar multiplication with 51 bits limbs");
299 MODULE_LICENSE("GPL v2");
300 MODULE_AUTHOR("Danny Tsen <dtsen@us.ibm.com>");
301