2012-08-25 22:37:23 -07:00
/* Glue code for DES encryption optimized for sparc64 crypto opcodes.
*
* Copyright ( C ) 2012 David S . Miller < davem @ davemloft . net >
*/
2012-09-15 09:17:10 -07:00
# define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
2012-08-25 22:37:23 -07:00
# include <linux/crypto.h>
# include <linux/init.h>
# include <linux/module.h>
# include <linux/mm.h>
# include <linux/types.h>
# include <crypto/algapi.h>
# include <crypto/des.h>
# include <asm/fpumacro.h>
# include <asm/pstate.h>
# include <asm/elf.h>
2012-09-15 09:06:30 -07:00
# include "opcodes.h"
2012-08-25 22:37:23 -07:00
struct des_sparc64_ctx {
u64 encrypt_expkey [ DES_EXPKEY_WORDS / 2 ] ;
u64 decrypt_expkey [ DES_EXPKEY_WORDS / 2 ] ;
} ;
struct des3_ede_sparc64_ctx {
u64 encrypt_expkey [ DES3_EDE_EXPKEY_WORDS / 2 ] ;
u64 decrypt_expkey [ DES3_EDE_EXPKEY_WORDS / 2 ] ;
} ;
static void encrypt_to_decrypt ( u64 * d , const u64 * e )
{
const u64 * s = e + ( DES_EXPKEY_WORDS / 2 ) - 1 ;
int i ;
for ( i = 0 ; i < DES_EXPKEY_WORDS / 2 ; i + + )
* d + + = * s - - ;
}
extern void des_sparc64_key_expand ( const u32 * input_key , u64 * key ) ;
static int des_set_key ( struct crypto_tfm * tfm , const u8 * key ,
unsigned int keylen )
{
struct des_sparc64_ctx * dctx = crypto_tfm_ctx ( tfm ) ;
u32 * flags = & tfm - > crt_flags ;
u32 tmp [ DES_EXPKEY_WORDS ] ;
int ret ;
/* Even though we have special instructions for key expansion,
* we call des_ekey ( ) so that we don ' t have to write our own
* weak key detection code .
*/
ret = des_ekey ( tmp , key ) ;
if ( unlikely ( ret = = 0 ) & & ( * flags & CRYPTO_TFM_REQ_WEAK_KEY ) ) {
* flags | = CRYPTO_TFM_RES_WEAK_KEY ;
return - EINVAL ;
}
des_sparc64_key_expand ( ( const u32 * ) key , & dctx - > encrypt_expkey [ 0 ] ) ;
encrypt_to_decrypt ( & dctx - > decrypt_expkey [ 0 ] , & dctx - > encrypt_expkey [ 0 ] ) ;
return 0 ;
}
extern void des_sparc64_crypt ( const u64 * key , const u64 * input ,
u64 * output ) ;
static void des_encrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
struct des_sparc64_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
const u64 * K = ctx - > encrypt_expkey ;
des_sparc64_crypt ( K , ( const u64 * ) src , ( u64 * ) dst ) ;
}
static void des_decrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
struct des_sparc64_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
const u64 * K = ctx - > decrypt_expkey ;
des_sparc64_crypt ( K , ( const u64 * ) src , ( u64 * ) dst ) ;
}
extern void des_sparc64_load_keys ( const u64 * key ) ;
extern void des_sparc64_ecb_crypt ( const u64 * input , u64 * output ,
unsigned int len ) ;
# define DES_BLOCK_MASK (~(DES_BLOCK_SIZE - 1))
static int __ecb_crypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes , bool encrypt )
{
struct des_sparc64_ctx * ctx = crypto_blkcipher_ctx ( desc - > tfm ) ;
struct blkcipher_walk walk ;
int err ;
blkcipher_walk_init ( & walk , dst , src , nbytes ) ;
err = blkcipher_walk_virt ( desc , & walk ) ;
2012-12-19 15:43:38 -08:00
desc - > flags & = ~ CRYPTO_TFM_REQ_MAY_SLEEP ;
2012-08-25 22:37:23 -07:00
if ( encrypt )
des_sparc64_load_keys ( & ctx - > encrypt_expkey [ 0 ] ) ;
else
des_sparc64_load_keys ( & ctx - > decrypt_expkey [ 0 ] ) ;
while ( ( nbytes = walk . nbytes ) ) {
unsigned int block_len = nbytes & DES_BLOCK_MASK ;
if ( likely ( block_len ) ) {
des_sparc64_ecb_crypt ( ( const u64 * ) walk . src . virt . addr ,
( u64 * ) walk . dst . virt . addr ,
block_len ) ;
}
nbytes & = DES_BLOCK_SIZE - 1 ;
err = blkcipher_walk_done ( desc , & walk , nbytes ) ;
}
fprs_write ( 0 ) ;
return err ;
}
static int ecb_encrypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes )
{
return __ecb_crypt ( desc , dst , src , nbytes , true ) ;
}
static int ecb_decrypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes )
{
return __ecb_crypt ( desc , dst , src , nbytes , false ) ;
}
extern void des_sparc64_cbc_encrypt ( const u64 * input , u64 * output ,
unsigned int len , u64 * iv ) ;
static int cbc_encrypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes )
{
struct des_sparc64_ctx * ctx = crypto_blkcipher_ctx ( desc - > tfm ) ;
struct blkcipher_walk walk ;
int err ;
blkcipher_walk_init ( & walk , dst , src , nbytes ) ;
err = blkcipher_walk_virt ( desc , & walk ) ;
2012-12-19 15:43:38 -08:00
desc - > flags & = ~ CRYPTO_TFM_REQ_MAY_SLEEP ;
2012-08-25 22:37:23 -07:00
des_sparc64_load_keys ( & ctx - > encrypt_expkey [ 0 ] ) ;
while ( ( nbytes = walk . nbytes ) ) {
unsigned int block_len = nbytes & DES_BLOCK_MASK ;
if ( likely ( block_len ) ) {
des_sparc64_cbc_encrypt ( ( const u64 * ) walk . src . virt . addr ,
( u64 * ) walk . dst . virt . addr ,
block_len , ( u64 * ) walk . iv ) ;
}
nbytes & = DES_BLOCK_SIZE - 1 ;
err = blkcipher_walk_done ( desc , & walk , nbytes ) ;
}
fprs_write ( 0 ) ;
return err ;
}
extern void des_sparc64_cbc_decrypt ( const u64 * input , u64 * output ,
unsigned int len , u64 * iv ) ;
static int cbc_decrypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes )
{
struct des_sparc64_ctx * ctx = crypto_blkcipher_ctx ( desc - > tfm ) ;
struct blkcipher_walk walk ;
int err ;
blkcipher_walk_init ( & walk , dst , src , nbytes ) ;
err = blkcipher_walk_virt ( desc , & walk ) ;
2012-12-19 15:43:38 -08:00
desc - > flags & = ~ CRYPTO_TFM_REQ_MAY_SLEEP ;
2012-08-25 22:37:23 -07:00
des_sparc64_load_keys ( & ctx - > decrypt_expkey [ 0 ] ) ;
while ( ( nbytes = walk . nbytes ) ) {
unsigned int block_len = nbytes & DES_BLOCK_MASK ;
if ( likely ( block_len ) ) {
des_sparc64_cbc_decrypt ( ( const u64 * ) walk . src . virt . addr ,
( u64 * ) walk . dst . virt . addr ,
block_len , ( u64 * ) walk . iv ) ;
}
nbytes & = DES_BLOCK_SIZE - 1 ;
err = blkcipher_walk_done ( desc , & walk , nbytes ) ;
}
fprs_write ( 0 ) ;
return err ;
}
static int des3_ede_set_key ( struct crypto_tfm * tfm , const u8 * key ,
unsigned int keylen )
{
struct des3_ede_sparc64_ctx * dctx = crypto_tfm_ctx ( tfm ) ;
const u32 * K = ( const u32 * ) key ;
u32 * flags = & tfm - > crt_flags ;
u64 k1 [ DES_EXPKEY_WORDS / 2 ] ;
u64 k2 [ DES_EXPKEY_WORDS / 2 ] ;
u64 k3 [ DES_EXPKEY_WORDS / 2 ] ;
if ( unlikely ( ! ( ( K [ 0 ] ^ K [ 2 ] ) | ( K [ 1 ] ^ K [ 3 ] ) ) | |
! ( ( K [ 2 ] ^ K [ 4 ] ) | ( K [ 3 ] ^ K [ 5 ] ) ) ) & &
( * flags & CRYPTO_TFM_REQ_WEAK_KEY ) ) {
* flags | = CRYPTO_TFM_RES_WEAK_KEY ;
return - EINVAL ;
}
des_sparc64_key_expand ( ( const u32 * ) key , k1 ) ;
key + = DES_KEY_SIZE ;
des_sparc64_key_expand ( ( const u32 * ) key , k2 ) ;
key + = DES_KEY_SIZE ;
des_sparc64_key_expand ( ( const u32 * ) key , k3 ) ;
memcpy ( & dctx - > encrypt_expkey [ 0 ] , & k1 [ 0 ] , sizeof ( k1 ) ) ;
encrypt_to_decrypt ( & dctx - > encrypt_expkey [ DES_EXPKEY_WORDS / 2 ] , & k2 [ 0 ] ) ;
memcpy ( & dctx - > encrypt_expkey [ ( DES_EXPKEY_WORDS / 2 ) * 2 ] ,
& k3 [ 0 ] , sizeof ( k3 ) ) ;
encrypt_to_decrypt ( & dctx - > decrypt_expkey [ 0 ] , & k3 [ 0 ] ) ;
memcpy ( & dctx - > decrypt_expkey [ DES_EXPKEY_WORDS / 2 ] ,
& k2 [ 0 ] , sizeof ( k2 ) ) ;
encrypt_to_decrypt ( & dctx - > decrypt_expkey [ ( DES_EXPKEY_WORDS / 2 ) * 2 ] ,
& k1 [ 0 ] ) ;
return 0 ;
}
extern void des3_ede_sparc64_crypt ( const u64 * key , const u64 * input ,
u64 * output ) ;
static void des3_ede_encrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
struct des3_ede_sparc64_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
const u64 * K = ctx - > encrypt_expkey ;
des3_ede_sparc64_crypt ( K , ( const u64 * ) src , ( u64 * ) dst ) ;
}
static void des3_ede_decrypt ( struct crypto_tfm * tfm , u8 * dst , const u8 * src )
{
struct des3_ede_sparc64_ctx * ctx = crypto_tfm_ctx ( tfm ) ;
const u64 * K = ctx - > decrypt_expkey ;
des3_ede_sparc64_crypt ( K , ( const u64 * ) src , ( u64 * ) dst ) ;
}
extern void des3_ede_sparc64_load_keys ( const u64 * key ) ;
extern void des3_ede_sparc64_ecb_crypt ( const u64 * expkey , const u64 * input ,
u64 * output , unsigned int len ) ;
static int __ecb3_crypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes , bool encrypt )
{
struct des3_ede_sparc64_ctx * ctx = crypto_blkcipher_ctx ( desc - > tfm ) ;
struct blkcipher_walk walk ;
const u64 * K ;
int err ;
blkcipher_walk_init ( & walk , dst , src , nbytes ) ;
err = blkcipher_walk_virt ( desc , & walk ) ;
2012-12-19 15:43:38 -08:00
desc - > flags & = ~ CRYPTO_TFM_REQ_MAY_SLEEP ;
2012-08-25 22:37:23 -07:00
if ( encrypt )
K = & ctx - > encrypt_expkey [ 0 ] ;
else
K = & ctx - > decrypt_expkey [ 0 ] ;
des3_ede_sparc64_load_keys ( K ) ;
while ( ( nbytes = walk . nbytes ) ) {
unsigned int block_len = nbytes & DES_BLOCK_MASK ;
if ( likely ( block_len ) ) {
const u64 * src64 = ( const u64 * ) walk . src . virt . addr ;
des3_ede_sparc64_ecb_crypt ( K , src64 ,
( u64 * ) walk . dst . virt . addr ,
block_len ) ;
}
nbytes & = DES_BLOCK_SIZE - 1 ;
err = blkcipher_walk_done ( desc , & walk , nbytes ) ;
}
fprs_write ( 0 ) ;
return err ;
}
static int ecb3_encrypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes )
{
return __ecb3_crypt ( desc , dst , src , nbytes , true ) ;
}
static int ecb3_decrypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes )
{
return __ecb3_crypt ( desc , dst , src , nbytes , false ) ;
}
extern void des3_ede_sparc64_cbc_encrypt ( const u64 * expkey , const u64 * input ,
u64 * output , unsigned int len ,
u64 * iv ) ;
static int cbc3_encrypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes )
{
struct des3_ede_sparc64_ctx * ctx = crypto_blkcipher_ctx ( desc - > tfm ) ;
struct blkcipher_walk walk ;
const u64 * K ;
int err ;
blkcipher_walk_init ( & walk , dst , src , nbytes ) ;
err = blkcipher_walk_virt ( desc , & walk ) ;
2012-12-19 15:43:38 -08:00
desc - > flags & = ~ CRYPTO_TFM_REQ_MAY_SLEEP ;
2012-08-25 22:37:23 -07:00
K = & ctx - > encrypt_expkey [ 0 ] ;
des3_ede_sparc64_load_keys ( K ) ;
while ( ( nbytes = walk . nbytes ) ) {
unsigned int block_len = nbytes & DES_BLOCK_MASK ;
if ( likely ( block_len ) ) {
const u64 * src64 = ( const u64 * ) walk . src . virt . addr ;
des3_ede_sparc64_cbc_encrypt ( K , src64 ,
( u64 * ) walk . dst . virt . addr ,
block_len ,
( u64 * ) walk . iv ) ;
}
nbytes & = DES_BLOCK_SIZE - 1 ;
err = blkcipher_walk_done ( desc , & walk , nbytes ) ;
}
fprs_write ( 0 ) ;
return err ;
}
extern void des3_ede_sparc64_cbc_decrypt ( const u64 * expkey , const u64 * input ,
u64 * output , unsigned int len ,
u64 * iv ) ;
static int cbc3_decrypt ( struct blkcipher_desc * desc ,
struct scatterlist * dst , struct scatterlist * src ,
unsigned int nbytes )
{
struct des3_ede_sparc64_ctx * ctx = crypto_blkcipher_ctx ( desc - > tfm ) ;
struct blkcipher_walk walk ;
const u64 * K ;
int err ;
blkcipher_walk_init ( & walk , dst , src , nbytes ) ;
err = blkcipher_walk_virt ( desc , & walk ) ;
2012-12-19 15:43:38 -08:00
desc - > flags & = ~ CRYPTO_TFM_REQ_MAY_SLEEP ;
2012-08-25 22:37:23 -07:00
K = & ctx - > decrypt_expkey [ 0 ] ;
des3_ede_sparc64_load_keys ( K ) ;
while ( ( nbytes = walk . nbytes ) ) {
unsigned int block_len = nbytes & DES_BLOCK_MASK ;
if ( likely ( block_len ) ) {
const u64 * src64 = ( const u64 * ) walk . src . virt . addr ;
des3_ede_sparc64_cbc_decrypt ( K , src64 ,
( u64 * ) walk . dst . virt . addr ,
block_len ,
( u64 * ) walk . iv ) ;
}
nbytes & = DES_BLOCK_SIZE - 1 ;
err = blkcipher_walk_done ( desc , & walk , nbytes ) ;
}
fprs_write ( 0 ) ;
return err ;
}
static struct crypto_alg algs [ ] = { {
. cra_name = " des " ,
. cra_driver_name = " des-sparc64 " ,
2012-09-15 09:06:30 -07:00
. cra_priority = SPARC_CR_OPCODE_PRIORITY ,
2012-08-25 22:37:23 -07:00
. cra_flags = CRYPTO_ALG_TYPE_CIPHER ,
. cra_blocksize = DES_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct des_sparc64_ctx ) ,
. cra_alignmask = 7 ,
. cra_module = THIS_MODULE ,
. cra_u = {
. cipher = {
. cia_min_keysize = DES_KEY_SIZE ,
. cia_max_keysize = DES_KEY_SIZE ,
. cia_setkey = des_set_key ,
. cia_encrypt = des_encrypt ,
. cia_decrypt = des_decrypt
}
}
} , {
. cra_name = " ecb(des) " ,
. cra_driver_name = " ecb-des-sparc64 " ,
2012-09-15 09:06:30 -07:00
. cra_priority = SPARC_CR_OPCODE_PRIORITY ,
2012-08-25 22:37:23 -07:00
. cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER ,
. cra_blocksize = DES_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct des_sparc64_ctx ) ,
. cra_alignmask = 7 ,
. cra_type = & crypto_blkcipher_type ,
. cra_module = THIS_MODULE ,
. cra_u = {
. blkcipher = {
. min_keysize = DES_KEY_SIZE ,
. max_keysize = DES_KEY_SIZE ,
. setkey = des_set_key ,
. encrypt = ecb_encrypt ,
. decrypt = ecb_decrypt ,
} ,
} ,
} , {
. cra_name = " cbc(des) " ,
. cra_driver_name = " cbc-des-sparc64 " ,
2012-09-15 09:06:30 -07:00
. cra_priority = SPARC_CR_OPCODE_PRIORITY ,
2012-08-25 22:37:23 -07:00
. cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER ,
. cra_blocksize = DES_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct des_sparc64_ctx ) ,
. cra_alignmask = 7 ,
. cra_type = & crypto_blkcipher_type ,
. cra_module = THIS_MODULE ,
. cra_u = {
. blkcipher = {
. min_keysize = DES_KEY_SIZE ,
. max_keysize = DES_KEY_SIZE ,
2015-10-05 10:08:51 -05:00
. ivsize = DES_BLOCK_SIZE ,
2012-08-25 22:37:23 -07:00
. setkey = des_set_key ,
. encrypt = cbc_encrypt ,
. decrypt = cbc_decrypt ,
} ,
} ,
} , {
. cra_name = " des3_ede " ,
. cra_driver_name = " des3_ede-sparc64 " ,
2012-09-15 09:06:30 -07:00
. cra_priority = SPARC_CR_OPCODE_PRIORITY ,
2012-08-25 22:37:23 -07:00
. cra_flags = CRYPTO_ALG_TYPE_CIPHER ,
. cra_blocksize = DES3_EDE_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct des3_ede_sparc64_ctx ) ,
. cra_alignmask = 7 ,
. cra_module = THIS_MODULE ,
. cra_u = {
. cipher = {
. cia_min_keysize = DES3_EDE_KEY_SIZE ,
. cia_max_keysize = DES3_EDE_KEY_SIZE ,
. cia_setkey = des3_ede_set_key ,
. cia_encrypt = des3_ede_encrypt ,
. cia_decrypt = des3_ede_decrypt
}
}
} , {
. cra_name = " ecb(des3_ede) " ,
. cra_driver_name = " ecb-des3_ede-sparc64 " ,
2012-09-15 09:06:30 -07:00
. cra_priority = SPARC_CR_OPCODE_PRIORITY ,
2012-08-25 22:37:23 -07:00
. cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER ,
. cra_blocksize = DES3_EDE_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct des3_ede_sparc64_ctx ) ,
. cra_alignmask = 7 ,
. cra_type = & crypto_blkcipher_type ,
. cra_module = THIS_MODULE ,
. cra_u = {
. blkcipher = {
. min_keysize = DES3_EDE_KEY_SIZE ,
. max_keysize = DES3_EDE_KEY_SIZE ,
. setkey = des3_ede_set_key ,
. encrypt = ecb3_encrypt ,
. decrypt = ecb3_decrypt ,
} ,
} ,
} , {
. cra_name = " cbc(des3_ede) " ,
. cra_driver_name = " cbc-des3_ede-sparc64 " ,
2012-09-15 09:06:30 -07:00
. cra_priority = SPARC_CR_OPCODE_PRIORITY ,
2012-08-25 22:37:23 -07:00
. cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER ,
. cra_blocksize = DES3_EDE_BLOCK_SIZE ,
. cra_ctxsize = sizeof ( struct des3_ede_sparc64_ctx ) ,
. cra_alignmask = 7 ,
. cra_type = & crypto_blkcipher_type ,
. cra_module = THIS_MODULE ,
. cra_u = {
. blkcipher = {
. min_keysize = DES3_EDE_KEY_SIZE ,
. max_keysize = DES3_EDE_KEY_SIZE ,
2015-10-05 10:08:51 -05:00
. ivsize = DES3_EDE_BLOCK_SIZE ,
2012-08-25 22:37:23 -07:00
. setkey = des3_ede_set_key ,
. encrypt = cbc3_encrypt ,
. decrypt = cbc3_decrypt ,
} ,
} ,
} } ;
static bool __init sparc64_has_des_opcode ( void )
{
unsigned long cfr ;
if ( ! ( sparc64_elf_hwcap & HWCAP_SPARC_CRYPTO ) )
return false ;
__asm__ __volatile__ ( " rd %%asr26, %0 " : " =r " ( cfr ) ) ;
if ( ! ( cfr & CFR_DES ) )
return false ;
return true ;
}
static int __init des_sparc64_mod_init ( void )
{
int i ;
for ( i = 0 ; i < ARRAY_SIZE ( algs ) ; i + + )
INIT_LIST_HEAD ( & algs [ i ] . cra_list ) ;
if ( sparc64_has_des_opcode ( ) ) {
pr_info ( " Using sparc64 des opcodes optimized DES implementation \n " ) ;
return crypto_register_algs ( algs , ARRAY_SIZE ( algs ) ) ;
}
pr_info ( " sparc64 des opcodes not available. \n " ) ;
return - ENODEV ;
}
static void __exit des_sparc64_mod_fini ( void )
{
crypto_unregister_algs ( algs , ARRAY_SIZE ( algs ) ) ;
}
module_init ( des_sparc64_mod_init ) ;
module_exit ( des_sparc64_mod_fini ) ;
MODULE_LICENSE ( " GPL " ) ;
MODULE_DESCRIPTION ( " DES & Triple DES EDE Cipher Algorithms, sparc64 des opcode accelerated " ) ;
2014-11-20 17:05:53 -08:00
MODULE_ALIAS_CRYPTO ( " des " ) ;
2015-01-11 18:17:45 +01:00
MODULE_ALIAS_CRYPTO ( " des3_ede " ) ;
2012-11-09 20:53:32 -08:00
# include "crop_devid.c"