2019-05-19 13:08:20 +01:00
// SPDX-License-Identifier: GPL-2.0-only
2012-08-25 22:37:23 -07:00
/* Glue code for DES encryption optimized for sparc64 crypto opcodes.
*
* Copyright ( C ) 2012 David S . Miller < davem @ davemloft . net >
*/
2012-09-15 09:17:10 -07:00
# define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
2012-08-25 22:37:23 -07:00
# include <linux/crypto.h>
# include <linux/init.h>
# include <linux/module.h>
# include <linux/mm.h>
# include <linux/types.h>
# include <crypto/algapi.h>
2019-08-15 12:00:45 +03:00
# include <crypto/internal/des.h>
2019-10-11 21:38:50 -07:00
# include <crypto/internal/skcipher.h>
2012-08-25 22:37:23 -07:00
# include <asm/fpumacro.h>
# include <asm/pstate.h>
# include <asm/elf.h>
2012-09-15 09:06:30 -07:00
# include "opcodes.h"
2012-08-25 22:37:23 -07:00
struct des_sparc64_ctx {
u64 encrypt_expkey [ DES_EXPKEY_WORDS / 2 ] ;
u64 decrypt_expkey [ DES_EXPKEY_WORDS / 2 ] ;
} ;
struct des3_ede_sparc64_ctx {
u64 encrypt_expkey [ DES3_EDE_EXPKEY_WORDS / 2 ] ;
u64 decrypt_expkey [ DES3_EDE_EXPKEY_WORDS / 2 ] ;
} ;
static void encrypt_to_decrypt ( u64 * d , const u64 * e )
{
const u64 * s = e + ( DES_EXPKEY_WORDS / 2 ) - 1 ;
int i ;
for ( i = 0 ; i < DES_EXPKEY_WORDS / 2 ; i + + )
* d + + = * s - - ;
}
extern void des_sparc64_key_expand ( const u32 * input_key , u64 * key ) ;
static int des_set_key ( struct crypto_tfm * tfm , const u8 * key ,
unsigned int keylen )
{
struct des_sparc64_ctx * dctx = crypto_tfm_ctx ( tfm ) ;
2019-08-15 12:00:45 +03:00
int err ;
2012-08-25 22:37:23 -07:00
/* Even though we have special instructions for key expansion,
2019-08-15 12:00:45 +03:00
* we call des_verify_key ( ) so that we don ' t have to write our own
2012-08-25 22:37:23 -07:00
* weak key detection code .
*/
2019-08-15 12:00:45 +03:00
err = crypto_des_verify_key ( tfm , key ) ;
if ( err )
return err ;
2012-08-25 22:37:23 -07:00
des_sparc64_key_expand ( ( const u32 * ) key , & dctx - > encrypt_expkey [ 0 ] ) ;
encrypt_to_decrypt ( & dctx - > decrypt_expkey [ 0 ] , & dctx - > encrypt_expkey [ 0 ] ) ;
return 0 ;
}
2019-10-11 21:38:50 -07:00
static int des_set_key_skcipher ( struct crypto_skcipher * tfm , const u8 * key ,
unsigned int keylen )
{
return des_set_key ( crypto_skcipher_tfm ( tfm ) , key , keylen ) ;
}
2012-08-25 22:37:23 -07:00
extern void des_sparc64_crypt ( const u64 * key , const u64 * input ,
u64 * output ) ;
2019-08-15 12:00:45 +03:00
static void sparc_des_encrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
2012-08-25 22:37:23 -07:00
{
struct des_sparc64_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
const u64 * K = ctx - > encrypt_expkey ;
des_sparc64_crypt ( K , ( const u64 * ) src , ( u64 * ) dst ) ;
}
2019-08-15 12:00:45 +03:00
static void sparc_des_decrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
2012-08-25 22:37:23 -07:00
{
struct des_sparc64_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
const u64 * K = ctx - > decrypt_expkey ;
des_sparc64_crypt ( K , ( const u64 * ) src , ( u64 * ) dst ) ;
}
extern void des_sparc64_load_keys ( const u64 * key ) ;
extern void des_sparc64_ecb_crypt ( const u64 * input , u64 * output ,
unsigned int len ) ;
2019-10-11 21:38:50 -07:00
static int __ecb_crypt ( struct skcipher_request * req , bool encrypt )
2012-08-25 22:37:23 -07:00
{
2019-10-11 21:38:50 -07:00
struct crypto_skcipher * tfm = crypto_skcipher_reqtfm ( req ) ;
const struct des_sparc64_ctx * ctx = crypto_skcipher_ctx ( tfm ) ;
struct skcipher_walk walk ;
unsigned int nbytes ;
2012-08-25 22:37:23 -07:00
int err ;
2019-10-11 21:38:50 -07:00
err = skcipher_walk_virt ( & walk , req , true ) ;
if ( err )
return err ;
2012-08-25 22:37:23 -07:00
if ( encrypt )
des_sparc64_load_keys ( & ctx - > encrypt_expkey [ 0 ] ) ;
else
des_sparc64_load_keys ( & ctx - > decrypt_expkey [ 0 ] ) ;
2019-10-11 21:38:50 -07:00
while ( ( nbytes = walk . nbytes ) ! = 0 ) {
des_sparc64_ecb_crypt ( walk . src . virt . addr , walk . dst . virt . addr ,
round_down ( nbytes , DES_BLOCK_SIZE ) ) ;
err = skcipher_walk_done ( & walk , nbytes % DES_BLOCK_SIZE ) ;
2012-08-25 22:37:23 -07:00
}
fprs_write ( 0 ) ;
return err ;
}
2019-10-11 21:38:50 -07:00
static int ecb_encrypt ( struct skcipher_request * req )
2012-08-25 22:37:23 -07:00
{
2019-10-11 21:38:50 -07:00
return __ecb_crypt ( req , true ) ;
2012-08-25 22:37:23 -07:00
}
2019-10-11 21:38:50 -07:00
static int ecb_decrypt ( struct skcipher_request * req )
2012-08-25 22:37:23 -07:00
{
2019-10-11 21:38:50 -07:00
return __ecb_crypt ( req , false ) ;
2012-08-25 22:37:23 -07:00
}
extern void des_sparc64_cbc_encrypt ( const u64 * input , u64 * output ,
unsigned int len , u64 * iv ) ;
2019-10-11 21:38:50 -07:00
extern void des_sparc64_cbc_decrypt ( const u64 * input , u64 * output ,
unsigned int len , u64 * iv ) ;
static int __cbc_crypt ( struct skcipher_request * req , bool encrypt )
2012-08-25 22:37:23 -07:00
{
2019-10-11 21:38:50 -07:00
struct crypto_skcipher * tfm = crypto_skcipher_reqtfm ( req ) ;
const struct des_sparc64_ctx * ctx = crypto_skcipher_ctx ( tfm ) ;
struct skcipher_walk walk ;
unsigned int nbytes ;
2012-08-25 22:37:23 -07:00
int err ;
2019-10-11 21:38:50 -07:00
err = skcipher_walk_virt ( & walk , req , true ) ;
if ( err )
return err ;
2012-08-25 22:37:23 -07:00
2019-10-11 21:38:50 -07:00
if ( encrypt )
des_sparc64_load_keys ( & ctx - > encrypt_expkey [ 0 ] ) ;
else
des_sparc64_load_keys ( & ctx - > decrypt_expkey [ 0 ] ) ;
while ( ( nbytes = walk . nbytes ) ! = 0 ) {
if ( encrypt )
des_sparc64_cbc_encrypt ( walk . src . virt . addr ,
walk . dst . virt . addr ,
round_down ( nbytes ,
DES_BLOCK_SIZE ) ,
walk . iv ) ;
else
des_sparc64_cbc_decrypt ( walk . src . virt . addr ,
walk . dst . virt . addr ,
round_down ( nbytes ,
DES_BLOCK_SIZE ) ,
walk . iv ) ;
err = skcipher_walk_done ( & walk , nbytes % DES_BLOCK_SIZE ) ;
2012-08-25 22:37:23 -07:00
}
fprs_write ( 0 ) ;
return err ;
}
2019-10-11 21:38:50 -07:00
static int cbc_encrypt ( struct skcipher_request * req )
2012-08-25 22:37:23 -07:00
{
2019-10-11 21:38:50 -07:00
return __cbc_crypt ( req , true ) ;
}
2012-08-25 22:37:23 -07:00
2019-10-11 21:38:50 -07:00
static int cbc_decrypt ( struct skcipher_request * req )
{
return __cbc_crypt ( req , false ) ;
2012-08-25 22:37:23 -07:00
}
static int des3_ede_set_key ( struct crypto_tfm * tfm , const u8 * key ,
unsigned int keylen )
{
struct des3_ede_sparc64_ctx * dctx = crypto_tfm_ctx ( tfm ) ;
u64 k1 [ DES_EXPKEY_WORDS / 2 ] ;
u64 k2 [ DES_EXPKEY_WORDS / 2 ] ;
u64 k3 [ DES_EXPKEY_WORDS / 2 ] ;
2019-04-11 16:50:58 +08:00
int err ;
2012-08-25 22:37:23 -07:00
2019-08-15 12:00:45 +03:00
err = crypto_des3_ede_verify_key ( tfm , key ) ;
if ( err )
2019-04-11 16:50:58 +08:00
return err ;
2012-08-25 22:37:23 -07:00
des_sparc64_key_expand ( ( const u32 * ) key , k1 ) ;
key + = DES_KEY_SIZE ;
des_sparc64_key_expand ( ( const u32 * ) key , k2 ) ;
key + = DES_KEY_SIZE ;
des_sparc64_key_expand ( ( const u32 * ) key , k3 ) ;
memcpy ( & dctx - > encrypt_expkey [ 0 ] , & k1 [ 0 ] , sizeof ( k1 ) ) ;
encrypt_to_decrypt ( & dctx - > encrypt_expkey [ DES_EXPKEY_WORDS / 2 ] , & k2 [ 0 ] ) ;
memcpy ( & dctx - > encrypt_expkey [ ( DES_EXPKEY_WORDS / 2 ) * 2 ] ,
& k3 [ 0 ] , sizeof ( k3 ) ) ;
encrypt_to_decrypt ( & dctx - > decrypt_expkey [ 0 ] , & k3 [ 0 ] ) ;
memcpy ( & dctx - > decrypt_expkey [ DES_EXPKEY_WORDS / 2 ] ,
& k2 [ 0 ] , sizeof ( k2 ) ) ;
encrypt_to_decrypt ( & dctx - > decrypt_expkey [ ( DES_EXPKEY_WORDS / 2 ) * 2 ] ,
& k1 [ 0 ] ) ;
return 0 ;
}
2019-10-11 21:38:50 -07:00
static int des3_ede_set_key_skcipher ( struct crypto_skcipher * tfm , const u8 * key ,
unsigned int keylen )
{
return des3_ede_set_key ( crypto_skcipher_tfm ( tfm ) , key , keylen ) ;
}
2012-08-25 22:37:23 -07:00
extern void des3_ede_sparc64_crypt ( const u64 * key , const u64 * input ,
u64 * output ) ;
2019-08-15 12:00:45 +03:00
static void sparc_des3_ede_encrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
2012-08-25 22:37:23 -07:00
{
struct des3_ede_sparc64_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
const u64 * K = ctx - > encrypt_expkey ;
des3_ede_sparc64_crypt ( K , ( const u64 * ) src , ( u64 * ) dst ) ;
}
2019-08-15 12:00:45 +03:00
static void sparc_des3_ede_decrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
2012-08-25 22:37:23 -07:00
{
struct des3_ede_sparc64_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
const u64 * K = ctx - > decrypt_expkey ;
des3_ede_sparc64_crypt ( K , ( const u64 * ) src , ( u64 * ) dst ) ;
}
extern void des3_ede_sparc64_load_keys ( const u64 * key ) ;
extern void des3_ede_sparc64_ecb_crypt ( const u64 * expkey , const u64 * input ,
u64 * output , unsigned int len ) ;
2019-10-11 21:38:50 -07:00
static int __ecb3_crypt ( struct skcipher_request * req , bool encrypt )
2012-08-25 22:37:23 -07:00
{
2019-10-11 21:38:50 -07:00
struct crypto_skcipher * tfm = crypto_skcipher_reqtfm ( req ) ;
const struct des3_ede_sparc64_ctx * ctx = crypto_skcipher_ctx ( tfm ) ;
struct skcipher_walk walk ;
2012-08-25 22:37:23 -07:00
const u64 * K ;
2019-10-11 21:38:50 -07:00
unsigned int nbytes ;
2012-08-25 22:37:23 -07:00
int err ;
2019-10-11 21:38:50 -07:00
err = skcipher_walk_virt ( & walk , req , true ) ;
if ( err )
return err ;
2012-08-25 22:37:23 -07:00
if ( encrypt )
K = & ctx - > encrypt_expkey [ 0 ] ;
else
K = & ctx - > decrypt_expkey [ 0 ] ;
des3_ede_sparc64_load_keys ( K ) ;
2019-10-11 21:38:50 -07:00
while ( ( nbytes = walk . nbytes ) ! = 0 ) {
des3_ede_sparc64_ecb_crypt ( K , walk . src . virt . addr ,
walk . dst . virt . addr ,
round_down ( nbytes , DES_BLOCK_SIZE ) ) ;
err = skcipher_walk_done ( & walk , nbytes % DES_BLOCK_SIZE ) ;
2012-08-25 22:37:23 -07:00
}
fprs_write ( 0 ) ;
return err ;
}
2019-10-11 21:38:50 -07:00
static int ecb3_encrypt ( struct skcipher_request * req )
2012-08-25 22:37:23 -07:00
{
2019-10-11 21:38:50 -07:00
return __ecb3_crypt ( req , true ) ;
2012-08-25 22:37:23 -07:00
}
2019-10-11 21:38:50 -07:00
static int ecb3_decrypt ( struct skcipher_request * req )
2012-08-25 22:37:23 -07:00
{
2019-10-11 21:38:50 -07:00
return __ecb3_crypt ( req , false ) ;
2012-08-25 22:37:23 -07:00
}
extern void des3_ede_sparc64_cbc_encrypt ( const u64 * expkey , const u64 * input ,
u64 * output , unsigned int len ,
u64 * iv ) ;
extern void des3_ede_sparc64_cbc_decrypt ( const u64 * expkey , const u64 * input ,
u64 * output , unsigned int len ,
u64 * iv ) ;
2019-10-11 21:38:50 -07:00
static int __cbc3_crypt ( struct skcipher_request * req , bool encrypt )
2012-08-25 22:37:23 -07:00
{
2019-10-11 21:38:50 -07:00
struct crypto_skcipher * tfm = crypto_skcipher_reqtfm ( req ) ;
const struct des3_ede_sparc64_ctx * ctx = crypto_skcipher_ctx ( tfm ) ;
struct skcipher_walk walk ;
2012-08-25 22:37:23 -07:00
const u64 * K ;
2019-10-11 21:38:50 -07:00
unsigned int nbytes ;
2012-08-25 22:37:23 -07:00
int err ;
2019-10-11 21:38:50 -07:00
err = skcipher_walk_virt ( & walk , req , true ) ;
if ( err )
return err ;
2012-08-25 22:37:23 -07:00
2019-10-11 21:38:50 -07:00
if ( encrypt )
K = & ctx - > encrypt_expkey [ 0 ] ;
else
K = & ctx - > decrypt_expkey [ 0 ] ;
2012-08-25 22:37:23 -07:00
des3_ede_sparc64_load_keys ( K ) ;
2019-10-11 21:38:50 -07:00
while ( ( nbytes = walk . nbytes ) ! = 0 ) {
if ( encrypt )
des3_ede_sparc64_cbc_encrypt ( K , walk . src . virt . addr ,
walk . dst . virt . addr ,
round_down ( nbytes ,
DES_BLOCK_SIZE ) ,
walk . iv ) ;
else
des3_ede_sparc64_cbc_decrypt ( K , walk . src . virt . addr ,
walk . dst . virt . addr ,
round_down ( nbytes ,
DES_BLOCK_SIZE ) ,
walk . iv ) ;
err = skcipher_walk_done ( & walk , nbytes % DES_BLOCK_SIZE ) ;
2012-08-25 22:37:23 -07:00
}
fprs_write ( 0 ) ;
return err ;
}
2019-10-11 21:38:50 -07:00
static int cbc3_encrypt ( struct skcipher_request * req )
{
return __cbc3_crypt ( req , true ) ;
}
static int cbc3_decrypt ( struct skcipher_request * req )
{
return __cbc3_crypt ( req , false ) ;
}
static struct crypto_alg cipher_algs [ ] = {
{
. cra_name = " des " ,
. cra_driver_name = " des-sparc64 " ,
. cra_priority = SPARC_CR_OPCODE_PRIORITY ,
. cra_flags = CRYPTO_ALG_TYPE_CIPHER ,
. cra_blocksize = DES_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct des_sparc64_ctx ) ,
. cra_alignmask = 7 ,
. cra_module = THIS_MODULE ,
. cra_u = {
. cipher = {
. cia_min_keysize = DES_KEY_SIZE ,
. cia_max_keysize = DES_KEY_SIZE ,
. cia_setkey = des_set_key ,
. cia_encrypt = sparc_des_encrypt ,
. cia_decrypt = sparc_des_decrypt
}
2012-08-25 22:37:23 -07:00
}
2019-10-11 21:38:50 -07:00
} , {
. cra_name = " des3_ede " ,
. cra_driver_name = " des3_ede-sparc64 " ,
. cra_priority = SPARC_CR_OPCODE_PRIORITY ,
. cra_flags = CRYPTO_ALG_TYPE_CIPHER ,
. cra_blocksize = DES3_EDE_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct des3_ede_sparc64_ctx ) ,
. cra_alignmask = 7 ,
. cra_module = THIS_MODULE ,
. cra_u = {
. cipher = {
. cia_min_keysize = DES3_EDE_KEY_SIZE ,
. cia_max_keysize = DES3_EDE_KEY_SIZE ,
. cia_setkey = des3_ede_set_key ,
. cia_encrypt = sparc_des3_ede_encrypt ,
. cia_decrypt = sparc_des3_ede_decrypt
}
2012-08-25 22:37:23 -07:00
}
}
2019-10-11 21:38:50 -07:00
} ;
static struct skcipher_alg skcipher_algs [ ] = {
{
. base . cra_name = " ecb(des) " ,
. base . cra_driver_name = " ecb-des-sparc64 " ,
. base . cra_priority = SPARC_CR_OPCODE_PRIORITY ,
. base . cra_blocksize = DES_BLOCK_SIZE ,
. base . cra_ctxsize = sizeof ( struct des_sparc64_ctx ) ,
. base . cra_alignmask = 7 ,
. base . cra_module = THIS_MODULE ,
. min_keysize = DES_KEY_SIZE ,
. max_keysize = DES_KEY_SIZE ,
. setkey = des_set_key_skcipher ,
. encrypt = ecb_encrypt ,
. decrypt = ecb_decrypt ,
} , {
. base . cra_name = " cbc(des) " ,
. base . cra_driver_name = " cbc-des-sparc64 " ,
. base . cra_priority = SPARC_CR_OPCODE_PRIORITY ,
. base . cra_blocksize = DES_BLOCK_SIZE ,
. base . cra_ctxsize = sizeof ( struct des_sparc64_ctx ) ,
. base . cra_alignmask = 7 ,
. base . cra_module = THIS_MODULE ,
. min_keysize = DES_KEY_SIZE ,
. max_keysize = DES_KEY_SIZE ,
. ivsize = DES_BLOCK_SIZE ,
. setkey = des_set_key_skcipher ,
. encrypt = cbc_encrypt ,
. decrypt = cbc_decrypt ,
} , {
. base . cra_name = " ecb(des3_ede) " ,
. base . cra_driver_name = " ecb-des3_ede-sparc64 " ,
. base . cra_priority = SPARC_CR_OPCODE_PRIORITY ,
. base . cra_blocksize = DES3_EDE_BLOCK_SIZE ,
. base . cra_ctxsize = sizeof ( struct des3_ede_sparc64_ctx ) ,
. base . cra_alignmask = 7 ,
. base . cra_module = THIS_MODULE ,
. min_keysize = DES3_EDE_KEY_SIZE ,
. max_keysize = DES3_EDE_KEY_SIZE ,
. setkey = des3_ede_set_key_skcipher ,
. encrypt = ecb3_encrypt ,
. decrypt = ecb3_decrypt ,
} , {
. base . cra_name = " cbc(des3_ede) " ,
. base . cra_driver_name = " cbc-des3_ede-sparc64 " ,
. base . cra_priority = SPARC_CR_OPCODE_PRIORITY ,
. base . cra_blocksize = DES3_EDE_BLOCK_SIZE ,
. base . cra_ctxsize = sizeof ( struct des3_ede_sparc64_ctx ) ,
. base . cra_alignmask = 7 ,
. base . cra_module = THIS_MODULE ,
. min_keysize = DES3_EDE_KEY_SIZE ,
. max_keysize = DES3_EDE_KEY_SIZE ,
. ivsize = DES3_EDE_BLOCK_SIZE ,
. setkey = des3_ede_set_key_skcipher ,
. encrypt = cbc3_encrypt ,
. decrypt = cbc3_decrypt ,
}
} ;
2012-08-25 22:37:23 -07:00
static bool __init sparc64_has_des_opcode ( void )
{
unsigned long cfr ;
if ( ! ( sparc64_elf_hwcap & HWCAP_SPARC_CRYPTO ) )
return false ;
__asm__ __volatile__ ( " rd %%asr26, %0 " : " =r " ( cfr ) ) ;
if ( ! ( cfr & CFR_DES ) )
return false ;
return true ;
}
static int __init des_sparc64_mod_init ( void )
{
2019-10-11 21:38:50 -07:00
int err ;
if ( ! sparc64_has_des_opcode ( ) ) {
pr_info ( " sparc64 des opcodes not available. \n " ) ;
return - ENODEV ;
2012-08-25 22:37:23 -07:00
}
2019-10-11 21:38:50 -07:00
pr_info ( " Using sparc64 des opcodes optimized DES implementation \n " ) ;
err = crypto_register_algs ( cipher_algs , ARRAY_SIZE ( cipher_algs ) ) ;
if ( err )
return err ;
err = crypto_register_skciphers ( skcipher_algs ,
ARRAY_SIZE ( skcipher_algs ) ) ;
if ( err )
crypto_unregister_algs ( cipher_algs , ARRAY_SIZE ( cipher_algs ) ) ;
return err ;
2012-08-25 22:37:23 -07:00
}
static void __exit des_sparc64_mod_fini ( void )
{
2019-10-11 21:38:50 -07:00
crypto_unregister_algs ( cipher_algs , ARRAY_SIZE ( cipher_algs ) ) ;
crypto_unregister_skciphers ( skcipher_algs , ARRAY_SIZE ( skcipher_algs ) ) ;
2012-08-25 22:37:23 -07:00
}
module_init ( des_sparc64_mod_init ) ;
module_exit ( des_sparc64_mod_fini ) ;
MODULE_LICENSE ( " GPL " ) ;
MODULE_DESCRIPTION ( " DES & Triple DES EDE Cipher Algorithms, sparc64 des opcode accelerated " ) ;
2014-11-20 17:05:53 -08:00
MODULE_ALIAS_CRYPTO ( " des " ) ;
2015-01-11 18:17:45 +01:00
MODULE_ALIAS_CRYPTO ( " des3_ede " ) ;
2012-11-09 20:53:32 -08:00
# include "crop_devid.c"