xref: /OK3568_Linux_fs/kernel/arch/arm64/crypto/aes-glue.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-only
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * linux/arch/arm64/crypto/aes-glue.c - wrapper code for ARMv8 AES
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * Copyright (C) 2013 - 2017 Linaro Ltd <ard.biesheuvel@linaro.org>
6*4882a593Smuzhiyun  */
7*4882a593Smuzhiyun 
8*4882a593Smuzhiyun #include <asm/neon.h>
9*4882a593Smuzhiyun #include <asm/hwcap.h>
10*4882a593Smuzhiyun #include <asm/simd.h>
11*4882a593Smuzhiyun #include <crypto/aes.h>
12*4882a593Smuzhiyun #include <crypto/ctr.h>
13*4882a593Smuzhiyun #include <crypto/sha.h>
14*4882a593Smuzhiyun #include <crypto/internal/hash.h>
15*4882a593Smuzhiyun #include <crypto/internal/simd.h>
16*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
17*4882a593Smuzhiyun #include <crypto/scatterwalk.h>
18*4882a593Smuzhiyun #include <linux/module.h>
19*4882a593Smuzhiyun #include <linux/cpufeature.h>
20*4882a593Smuzhiyun #include <crypto/xts.h>
21*4882a593Smuzhiyun 
22*4882a593Smuzhiyun #include "aes-ce-setkey.h"
23*4882a593Smuzhiyun 
24*4882a593Smuzhiyun #ifdef USE_V8_CRYPTO_EXTENSIONS
25*4882a593Smuzhiyun #define MODE			"ce"
26*4882a593Smuzhiyun #define PRIO			300
27*4882a593Smuzhiyun #define aes_expandkey		ce_aes_expandkey
28*4882a593Smuzhiyun #define aes_ecb_encrypt		ce_aes_ecb_encrypt
29*4882a593Smuzhiyun #define aes_ecb_decrypt		ce_aes_ecb_decrypt
30*4882a593Smuzhiyun #define aes_cbc_encrypt		ce_aes_cbc_encrypt
31*4882a593Smuzhiyun #define aes_cbc_decrypt		ce_aes_cbc_decrypt
32*4882a593Smuzhiyun #define aes_cbc_cts_encrypt	ce_aes_cbc_cts_encrypt
33*4882a593Smuzhiyun #define aes_cbc_cts_decrypt	ce_aes_cbc_cts_decrypt
34*4882a593Smuzhiyun #define aes_essiv_cbc_encrypt	ce_aes_essiv_cbc_encrypt
35*4882a593Smuzhiyun #define aes_essiv_cbc_decrypt	ce_aes_essiv_cbc_decrypt
36*4882a593Smuzhiyun #define aes_ctr_encrypt		ce_aes_ctr_encrypt
37*4882a593Smuzhiyun #define aes_xts_encrypt		ce_aes_xts_encrypt
38*4882a593Smuzhiyun #define aes_xts_decrypt		ce_aes_xts_decrypt
39*4882a593Smuzhiyun #define aes_mac_update		ce_aes_mac_update
40*4882a593Smuzhiyun MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS using ARMv8 Crypto Extensions");
41*4882a593Smuzhiyun #else
42*4882a593Smuzhiyun #define MODE			"neon"
43*4882a593Smuzhiyun #define PRIO			200
44*4882a593Smuzhiyun #define aes_ecb_encrypt		neon_aes_ecb_encrypt
45*4882a593Smuzhiyun #define aes_ecb_decrypt		neon_aes_ecb_decrypt
46*4882a593Smuzhiyun #define aes_cbc_encrypt		neon_aes_cbc_encrypt
47*4882a593Smuzhiyun #define aes_cbc_decrypt		neon_aes_cbc_decrypt
48*4882a593Smuzhiyun #define aes_cbc_cts_encrypt	neon_aes_cbc_cts_encrypt
49*4882a593Smuzhiyun #define aes_cbc_cts_decrypt	neon_aes_cbc_cts_decrypt
50*4882a593Smuzhiyun #define aes_essiv_cbc_encrypt	neon_aes_essiv_cbc_encrypt
51*4882a593Smuzhiyun #define aes_essiv_cbc_decrypt	neon_aes_essiv_cbc_decrypt
52*4882a593Smuzhiyun #define aes_ctr_encrypt		neon_aes_ctr_encrypt
53*4882a593Smuzhiyun #define aes_xts_encrypt		neon_aes_xts_encrypt
54*4882a593Smuzhiyun #define aes_xts_decrypt		neon_aes_xts_decrypt
55*4882a593Smuzhiyun #define aes_mac_update		neon_aes_mac_update
56*4882a593Smuzhiyun MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS using ARMv8 NEON");
57*4882a593Smuzhiyun #endif
58*4882a593Smuzhiyun #if defined(USE_V8_CRYPTO_EXTENSIONS) || !IS_ENABLED(CONFIG_CRYPTO_AES_ARM64_BS)
59*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("ecb(aes)");
60*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cbc(aes)");
61*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("ctr(aes)");
62*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xts(aes)");
63*4882a593Smuzhiyun #endif
64*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cts(cbc(aes))");
65*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("essiv(cbc(aes),sha256)");
66*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cmac(aes)");
67*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xcbc(aes)");
68*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cbcmac(aes)");
69*4882a593Smuzhiyun 
70*4882a593Smuzhiyun MODULE_AUTHOR("Ard Biesheuvel <ard.biesheuvel@linaro.org>");
71*4882a593Smuzhiyun MODULE_LICENSE("GPL v2");
72*4882a593Smuzhiyun 
73*4882a593Smuzhiyun /* defined in aes-modes.S */
74*4882a593Smuzhiyun asmlinkage void aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[],
75*4882a593Smuzhiyun 				int rounds, int blocks);
76*4882a593Smuzhiyun asmlinkage void aes_ecb_decrypt(u8 out[], u8 const in[], u32 const rk[],
77*4882a593Smuzhiyun 				int rounds, int blocks);
78*4882a593Smuzhiyun 
79*4882a593Smuzhiyun asmlinkage void aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[],
80*4882a593Smuzhiyun 				int rounds, int blocks, u8 iv[]);
81*4882a593Smuzhiyun asmlinkage void aes_cbc_decrypt(u8 out[], u8 const in[], u32 const rk[],
82*4882a593Smuzhiyun 				int rounds, int blocks, u8 iv[]);
83*4882a593Smuzhiyun 
84*4882a593Smuzhiyun asmlinkage void aes_cbc_cts_encrypt(u8 out[], u8 const in[], u32 const rk[],
85*4882a593Smuzhiyun 				int rounds, int bytes, u8 const iv[]);
86*4882a593Smuzhiyun asmlinkage void aes_cbc_cts_decrypt(u8 out[], u8 const in[], u32 const rk[],
87*4882a593Smuzhiyun 				int rounds, int bytes, u8 const iv[]);
88*4882a593Smuzhiyun 
89*4882a593Smuzhiyun asmlinkage void aes_ctr_encrypt(u8 out[], u8 const in[], u32 const rk[],
90*4882a593Smuzhiyun 				int rounds, int blocks, u8 ctr[]);
91*4882a593Smuzhiyun 
92*4882a593Smuzhiyun asmlinkage void aes_xts_encrypt(u8 out[], u8 const in[], u32 const rk1[],
93*4882a593Smuzhiyun 				int rounds, int bytes, u32 const rk2[], u8 iv[],
94*4882a593Smuzhiyun 				int first);
95*4882a593Smuzhiyun asmlinkage void aes_xts_decrypt(u8 out[], u8 const in[], u32 const rk1[],
96*4882a593Smuzhiyun 				int rounds, int bytes, u32 const rk2[], u8 iv[],
97*4882a593Smuzhiyun 				int first);
98*4882a593Smuzhiyun 
99*4882a593Smuzhiyun asmlinkage void aes_essiv_cbc_encrypt(u8 out[], u8 const in[], u32 const rk1[],
100*4882a593Smuzhiyun 				      int rounds, int blocks, u8 iv[],
101*4882a593Smuzhiyun 				      u32 const rk2[]);
102*4882a593Smuzhiyun asmlinkage void aes_essiv_cbc_decrypt(u8 out[], u8 const in[], u32 const rk1[],
103*4882a593Smuzhiyun 				      int rounds, int blocks, u8 iv[],
104*4882a593Smuzhiyun 				      u32 const rk2[]);
105*4882a593Smuzhiyun 
106*4882a593Smuzhiyun asmlinkage int aes_mac_update(u8 const in[], u32 const rk[], int rounds,
107*4882a593Smuzhiyun 			      int blocks, u8 dg[], int enc_before,
108*4882a593Smuzhiyun 			      int enc_after);
109*4882a593Smuzhiyun 
110*4882a593Smuzhiyun struct crypto_aes_xts_ctx {
111*4882a593Smuzhiyun 	struct crypto_aes_ctx key1;
112*4882a593Smuzhiyun 	struct crypto_aes_ctx __aligned(8) key2;
113*4882a593Smuzhiyun };
114*4882a593Smuzhiyun 
115*4882a593Smuzhiyun struct crypto_aes_essiv_cbc_ctx {
116*4882a593Smuzhiyun 	struct crypto_aes_ctx key1;
117*4882a593Smuzhiyun 	struct crypto_aes_ctx __aligned(8) key2;
118*4882a593Smuzhiyun 	struct crypto_shash *hash;
119*4882a593Smuzhiyun };
120*4882a593Smuzhiyun 
121*4882a593Smuzhiyun struct mac_tfm_ctx {
122*4882a593Smuzhiyun 	struct crypto_aes_ctx key;
123*4882a593Smuzhiyun 	u8 __aligned(8) consts[];
124*4882a593Smuzhiyun };
125*4882a593Smuzhiyun 
126*4882a593Smuzhiyun struct mac_desc_ctx {
127*4882a593Smuzhiyun 	unsigned int len;
128*4882a593Smuzhiyun 	u8 dg[AES_BLOCK_SIZE];
129*4882a593Smuzhiyun };
130*4882a593Smuzhiyun 
skcipher_aes_setkey(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)131*4882a593Smuzhiyun static int skcipher_aes_setkey(struct crypto_skcipher *tfm, const u8 *in_key,
132*4882a593Smuzhiyun 			       unsigned int key_len)
133*4882a593Smuzhiyun {
134*4882a593Smuzhiyun 	struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
135*4882a593Smuzhiyun 
136*4882a593Smuzhiyun 	return aes_expandkey(ctx, in_key, key_len);
137*4882a593Smuzhiyun }
138*4882a593Smuzhiyun 
xts_set_key(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)139*4882a593Smuzhiyun static int __maybe_unused xts_set_key(struct crypto_skcipher *tfm,
140*4882a593Smuzhiyun 				      const u8 *in_key, unsigned int key_len)
141*4882a593Smuzhiyun {
142*4882a593Smuzhiyun 	struct crypto_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
143*4882a593Smuzhiyun 	int ret;
144*4882a593Smuzhiyun 
145*4882a593Smuzhiyun 	ret = xts_verify_key(tfm, in_key, key_len);
146*4882a593Smuzhiyun 	if (ret)
147*4882a593Smuzhiyun 		return ret;
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun 	ret = aes_expandkey(&ctx->key1, in_key, key_len / 2);
150*4882a593Smuzhiyun 	if (!ret)
151*4882a593Smuzhiyun 		ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2],
152*4882a593Smuzhiyun 				    key_len / 2);
153*4882a593Smuzhiyun 	return ret;
154*4882a593Smuzhiyun }
155*4882a593Smuzhiyun 
essiv_cbc_set_key(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)156*4882a593Smuzhiyun static int __maybe_unused essiv_cbc_set_key(struct crypto_skcipher *tfm,
157*4882a593Smuzhiyun 					    const u8 *in_key,
158*4882a593Smuzhiyun 					    unsigned int key_len)
159*4882a593Smuzhiyun {
160*4882a593Smuzhiyun 	struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
161*4882a593Smuzhiyun 	u8 digest[SHA256_DIGEST_SIZE];
162*4882a593Smuzhiyun 	int ret;
163*4882a593Smuzhiyun 
164*4882a593Smuzhiyun 	ret = aes_expandkey(&ctx->key1, in_key, key_len);
165*4882a593Smuzhiyun 	if (ret)
166*4882a593Smuzhiyun 		return ret;
167*4882a593Smuzhiyun 
168*4882a593Smuzhiyun 	crypto_shash_tfm_digest(ctx->hash, in_key, key_len, digest);
169*4882a593Smuzhiyun 
170*4882a593Smuzhiyun 	return aes_expandkey(&ctx->key2, digest, sizeof(digest));
171*4882a593Smuzhiyun }
172*4882a593Smuzhiyun 
ecb_encrypt(struct skcipher_request * req)173*4882a593Smuzhiyun static int __maybe_unused ecb_encrypt(struct skcipher_request *req)
174*4882a593Smuzhiyun {
175*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
176*4882a593Smuzhiyun 	struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
177*4882a593Smuzhiyun 	int err, rounds = 6 + ctx->key_length / 4;
178*4882a593Smuzhiyun 	struct skcipher_walk walk;
179*4882a593Smuzhiyun 	unsigned int blocks;
180*4882a593Smuzhiyun 
181*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
182*4882a593Smuzhiyun 
183*4882a593Smuzhiyun 	while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) {
184*4882a593Smuzhiyun 		kernel_neon_begin();
185*4882a593Smuzhiyun 		aes_ecb_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
186*4882a593Smuzhiyun 				ctx->key_enc, rounds, blocks);
187*4882a593Smuzhiyun 		kernel_neon_end();
188*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
189*4882a593Smuzhiyun 	}
190*4882a593Smuzhiyun 	return err;
191*4882a593Smuzhiyun }
192*4882a593Smuzhiyun 
ecb_decrypt(struct skcipher_request * req)193*4882a593Smuzhiyun static int __maybe_unused ecb_decrypt(struct skcipher_request *req)
194*4882a593Smuzhiyun {
195*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
196*4882a593Smuzhiyun 	struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
197*4882a593Smuzhiyun 	int err, rounds = 6 + ctx->key_length / 4;
198*4882a593Smuzhiyun 	struct skcipher_walk walk;
199*4882a593Smuzhiyun 	unsigned int blocks;
200*4882a593Smuzhiyun 
201*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
202*4882a593Smuzhiyun 
203*4882a593Smuzhiyun 	while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) {
204*4882a593Smuzhiyun 		kernel_neon_begin();
205*4882a593Smuzhiyun 		aes_ecb_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
206*4882a593Smuzhiyun 				ctx->key_dec, rounds, blocks);
207*4882a593Smuzhiyun 		kernel_neon_end();
208*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
209*4882a593Smuzhiyun 	}
210*4882a593Smuzhiyun 	return err;
211*4882a593Smuzhiyun }
212*4882a593Smuzhiyun 
cbc_encrypt_walk(struct skcipher_request * req,struct skcipher_walk * walk)213*4882a593Smuzhiyun static int cbc_encrypt_walk(struct skcipher_request *req,
214*4882a593Smuzhiyun 			    struct skcipher_walk *walk)
215*4882a593Smuzhiyun {
216*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
217*4882a593Smuzhiyun 	struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
218*4882a593Smuzhiyun 	int err = 0, rounds = 6 + ctx->key_length / 4;
219*4882a593Smuzhiyun 	unsigned int blocks;
220*4882a593Smuzhiyun 
221*4882a593Smuzhiyun 	while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) {
222*4882a593Smuzhiyun 		kernel_neon_begin();
223*4882a593Smuzhiyun 		aes_cbc_encrypt(walk->dst.virt.addr, walk->src.virt.addr,
224*4882a593Smuzhiyun 				ctx->key_enc, rounds, blocks, walk->iv);
225*4882a593Smuzhiyun 		kernel_neon_end();
226*4882a593Smuzhiyun 		err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE);
227*4882a593Smuzhiyun 	}
228*4882a593Smuzhiyun 	return err;
229*4882a593Smuzhiyun }
230*4882a593Smuzhiyun 
cbc_encrypt(struct skcipher_request * req)231*4882a593Smuzhiyun static int __maybe_unused cbc_encrypt(struct skcipher_request *req)
232*4882a593Smuzhiyun {
233*4882a593Smuzhiyun 	struct skcipher_walk walk;
234*4882a593Smuzhiyun 	int err;
235*4882a593Smuzhiyun 
236*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
237*4882a593Smuzhiyun 	if (err)
238*4882a593Smuzhiyun 		return err;
239*4882a593Smuzhiyun 	return cbc_encrypt_walk(req, &walk);
240*4882a593Smuzhiyun }
241*4882a593Smuzhiyun 
cbc_decrypt_walk(struct skcipher_request * req,struct skcipher_walk * walk)242*4882a593Smuzhiyun static int cbc_decrypt_walk(struct skcipher_request *req,
243*4882a593Smuzhiyun 			    struct skcipher_walk *walk)
244*4882a593Smuzhiyun {
245*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
246*4882a593Smuzhiyun 	struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
247*4882a593Smuzhiyun 	int err = 0, rounds = 6 + ctx->key_length / 4;
248*4882a593Smuzhiyun 	unsigned int blocks;
249*4882a593Smuzhiyun 
250*4882a593Smuzhiyun 	while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) {
251*4882a593Smuzhiyun 		kernel_neon_begin();
252*4882a593Smuzhiyun 		aes_cbc_decrypt(walk->dst.virt.addr, walk->src.virt.addr,
253*4882a593Smuzhiyun 				ctx->key_dec, rounds, blocks, walk->iv);
254*4882a593Smuzhiyun 		kernel_neon_end();
255*4882a593Smuzhiyun 		err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE);
256*4882a593Smuzhiyun 	}
257*4882a593Smuzhiyun 	return err;
258*4882a593Smuzhiyun }
259*4882a593Smuzhiyun 
cbc_decrypt(struct skcipher_request * req)260*4882a593Smuzhiyun static int __maybe_unused cbc_decrypt(struct skcipher_request *req)
261*4882a593Smuzhiyun {
262*4882a593Smuzhiyun 	struct skcipher_walk walk;
263*4882a593Smuzhiyun 	int err;
264*4882a593Smuzhiyun 
265*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
266*4882a593Smuzhiyun 	if (err)
267*4882a593Smuzhiyun 		return err;
268*4882a593Smuzhiyun 	return cbc_decrypt_walk(req, &walk);
269*4882a593Smuzhiyun }
270*4882a593Smuzhiyun 
cts_cbc_encrypt(struct skcipher_request * req)271*4882a593Smuzhiyun static int cts_cbc_encrypt(struct skcipher_request *req)
272*4882a593Smuzhiyun {
273*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
274*4882a593Smuzhiyun 	struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
275*4882a593Smuzhiyun 	int err, rounds = 6 + ctx->key_length / 4;
276*4882a593Smuzhiyun 	int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2;
277*4882a593Smuzhiyun 	struct scatterlist *src = req->src, *dst = req->dst;
278*4882a593Smuzhiyun 	struct scatterlist sg_src[2], sg_dst[2];
279*4882a593Smuzhiyun 	struct skcipher_request subreq;
280*4882a593Smuzhiyun 	struct skcipher_walk walk;
281*4882a593Smuzhiyun 
282*4882a593Smuzhiyun 	skcipher_request_set_tfm(&subreq, tfm);
283*4882a593Smuzhiyun 	skcipher_request_set_callback(&subreq, skcipher_request_flags(req),
284*4882a593Smuzhiyun 				      NULL, NULL);
285*4882a593Smuzhiyun 
286*4882a593Smuzhiyun 	if (req->cryptlen <= AES_BLOCK_SIZE) {
287*4882a593Smuzhiyun 		if (req->cryptlen < AES_BLOCK_SIZE)
288*4882a593Smuzhiyun 			return -EINVAL;
289*4882a593Smuzhiyun 		cbc_blocks = 1;
290*4882a593Smuzhiyun 	}
291*4882a593Smuzhiyun 
292*4882a593Smuzhiyun 	if (cbc_blocks > 0) {
293*4882a593Smuzhiyun 		skcipher_request_set_crypt(&subreq, req->src, req->dst,
294*4882a593Smuzhiyun 					   cbc_blocks * AES_BLOCK_SIZE,
295*4882a593Smuzhiyun 					   req->iv);
296*4882a593Smuzhiyun 
297*4882a593Smuzhiyun 		err = skcipher_walk_virt(&walk, &subreq, false) ?:
298*4882a593Smuzhiyun 		      cbc_encrypt_walk(&subreq, &walk);
299*4882a593Smuzhiyun 		if (err)
300*4882a593Smuzhiyun 			return err;
301*4882a593Smuzhiyun 
302*4882a593Smuzhiyun 		if (req->cryptlen == AES_BLOCK_SIZE)
303*4882a593Smuzhiyun 			return 0;
304*4882a593Smuzhiyun 
305*4882a593Smuzhiyun 		dst = src = scatterwalk_ffwd(sg_src, req->src, subreq.cryptlen);
306*4882a593Smuzhiyun 		if (req->dst != req->src)
307*4882a593Smuzhiyun 			dst = scatterwalk_ffwd(sg_dst, req->dst,
308*4882a593Smuzhiyun 					       subreq.cryptlen);
309*4882a593Smuzhiyun 	}
310*4882a593Smuzhiyun 
311*4882a593Smuzhiyun 	/* handle ciphertext stealing */
312*4882a593Smuzhiyun 	skcipher_request_set_crypt(&subreq, src, dst,
313*4882a593Smuzhiyun 				   req->cryptlen - cbc_blocks * AES_BLOCK_SIZE,
314*4882a593Smuzhiyun 				   req->iv);
315*4882a593Smuzhiyun 
316*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, &subreq, false);
317*4882a593Smuzhiyun 	if (err)
318*4882a593Smuzhiyun 		return err;
319*4882a593Smuzhiyun 
320*4882a593Smuzhiyun 	kernel_neon_begin();
321*4882a593Smuzhiyun 	aes_cbc_cts_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
322*4882a593Smuzhiyun 			    ctx->key_enc, rounds, walk.nbytes, walk.iv);
323*4882a593Smuzhiyun 	kernel_neon_end();
324*4882a593Smuzhiyun 
325*4882a593Smuzhiyun 	return skcipher_walk_done(&walk, 0);
326*4882a593Smuzhiyun }
327*4882a593Smuzhiyun 
cts_cbc_decrypt(struct skcipher_request * req)328*4882a593Smuzhiyun static int cts_cbc_decrypt(struct skcipher_request *req)
329*4882a593Smuzhiyun {
330*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
331*4882a593Smuzhiyun 	struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
332*4882a593Smuzhiyun 	int err, rounds = 6 + ctx->key_length / 4;
333*4882a593Smuzhiyun 	int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2;
334*4882a593Smuzhiyun 	struct scatterlist *src = req->src, *dst = req->dst;
335*4882a593Smuzhiyun 	struct scatterlist sg_src[2], sg_dst[2];
336*4882a593Smuzhiyun 	struct skcipher_request subreq;
337*4882a593Smuzhiyun 	struct skcipher_walk walk;
338*4882a593Smuzhiyun 
339*4882a593Smuzhiyun 	skcipher_request_set_tfm(&subreq, tfm);
340*4882a593Smuzhiyun 	skcipher_request_set_callback(&subreq, skcipher_request_flags(req),
341*4882a593Smuzhiyun 				      NULL, NULL);
342*4882a593Smuzhiyun 
343*4882a593Smuzhiyun 	if (req->cryptlen <= AES_BLOCK_SIZE) {
344*4882a593Smuzhiyun 		if (req->cryptlen < AES_BLOCK_SIZE)
345*4882a593Smuzhiyun 			return -EINVAL;
346*4882a593Smuzhiyun 		cbc_blocks = 1;
347*4882a593Smuzhiyun 	}
348*4882a593Smuzhiyun 
349*4882a593Smuzhiyun 	if (cbc_blocks > 0) {
350*4882a593Smuzhiyun 		skcipher_request_set_crypt(&subreq, req->src, req->dst,
351*4882a593Smuzhiyun 					   cbc_blocks * AES_BLOCK_SIZE,
352*4882a593Smuzhiyun 					   req->iv);
353*4882a593Smuzhiyun 
354*4882a593Smuzhiyun 		err = skcipher_walk_virt(&walk, &subreq, false) ?:
355*4882a593Smuzhiyun 		      cbc_decrypt_walk(&subreq, &walk);
356*4882a593Smuzhiyun 		if (err)
357*4882a593Smuzhiyun 			return err;
358*4882a593Smuzhiyun 
359*4882a593Smuzhiyun 		if (req->cryptlen == AES_BLOCK_SIZE)
360*4882a593Smuzhiyun 			return 0;
361*4882a593Smuzhiyun 
362*4882a593Smuzhiyun 		dst = src = scatterwalk_ffwd(sg_src, req->src, subreq.cryptlen);
363*4882a593Smuzhiyun 		if (req->dst != req->src)
364*4882a593Smuzhiyun 			dst = scatterwalk_ffwd(sg_dst, req->dst,
365*4882a593Smuzhiyun 					       subreq.cryptlen);
366*4882a593Smuzhiyun 	}
367*4882a593Smuzhiyun 
368*4882a593Smuzhiyun 	/* handle ciphertext stealing */
369*4882a593Smuzhiyun 	skcipher_request_set_crypt(&subreq, src, dst,
370*4882a593Smuzhiyun 				   req->cryptlen - cbc_blocks * AES_BLOCK_SIZE,
371*4882a593Smuzhiyun 				   req->iv);
372*4882a593Smuzhiyun 
373*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, &subreq, false);
374*4882a593Smuzhiyun 	if (err)
375*4882a593Smuzhiyun 		return err;
376*4882a593Smuzhiyun 
377*4882a593Smuzhiyun 	kernel_neon_begin();
378*4882a593Smuzhiyun 	aes_cbc_cts_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
379*4882a593Smuzhiyun 			    ctx->key_dec, rounds, walk.nbytes, walk.iv);
380*4882a593Smuzhiyun 	kernel_neon_end();
381*4882a593Smuzhiyun 
382*4882a593Smuzhiyun 	return skcipher_walk_done(&walk, 0);
383*4882a593Smuzhiyun }
384*4882a593Smuzhiyun 
essiv_cbc_init_tfm(struct crypto_skcipher * tfm)385*4882a593Smuzhiyun static int __maybe_unused essiv_cbc_init_tfm(struct crypto_skcipher *tfm)
386*4882a593Smuzhiyun {
387*4882a593Smuzhiyun 	struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
388*4882a593Smuzhiyun 
389*4882a593Smuzhiyun 	ctx->hash = crypto_alloc_shash("sha256", 0, 0);
390*4882a593Smuzhiyun 
391*4882a593Smuzhiyun 	return PTR_ERR_OR_ZERO(ctx->hash);
392*4882a593Smuzhiyun }
393*4882a593Smuzhiyun 
essiv_cbc_exit_tfm(struct crypto_skcipher * tfm)394*4882a593Smuzhiyun static void __maybe_unused essiv_cbc_exit_tfm(struct crypto_skcipher *tfm)
395*4882a593Smuzhiyun {
396*4882a593Smuzhiyun 	struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
397*4882a593Smuzhiyun 
398*4882a593Smuzhiyun 	crypto_free_shash(ctx->hash);
399*4882a593Smuzhiyun }
400*4882a593Smuzhiyun 
essiv_cbc_encrypt(struct skcipher_request * req)401*4882a593Smuzhiyun static int __maybe_unused essiv_cbc_encrypt(struct skcipher_request *req)
402*4882a593Smuzhiyun {
403*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
404*4882a593Smuzhiyun 	struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
405*4882a593Smuzhiyun 	int err, rounds = 6 + ctx->key1.key_length / 4;
406*4882a593Smuzhiyun 	struct skcipher_walk walk;
407*4882a593Smuzhiyun 	unsigned int blocks;
408*4882a593Smuzhiyun 
409*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
410*4882a593Smuzhiyun 
411*4882a593Smuzhiyun 	blocks = walk.nbytes / AES_BLOCK_SIZE;
412*4882a593Smuzhiyun 	if (blocks) {
413*4882a593Smuzhiyun 		kernel_neon_begin();
414*4882a593Smuzhiyun 		aes_essiv_cbc_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
415*4882a593Smuzhiyun 				      ctx->key1.key_enc, rounds, blocks,
416*4882a593Smuzhiyun 				      req->iv, ctx->key2.key_enc);
417*4882a593Smuzhiyun 		kernel_neon_end();
418*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
419*4882a593Smuzhiyun 	}
420*4882a593Smuzhiyun 	return err ?: cbc_encrypt_walk(req, &walk);
421*4882a593Smuzhiyun }
422*4882a593Smuzhiyun 
essiv_cbc_decrypt(struct skcipher_request * req)423*4882a593Smuzhiyun static int __maybe_unused essiv_cbc_decrypt(struct skcipher_request *req)
424*4882a593Smuzhiyun {
425*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
426*4882a593Smuzhiyun 	struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
427*4882a593Smuzhiyun 	int err, rounds = 6 + ctx->key1.key_length / 4;
428*4882a593Smuzhiyun 	struct skcipher_walk walk;
429*4882a593Smuzhiyun 	unsigned int blocks;
430*4882a593Smuzhiyun 
431*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
432*4882a593Smuzhiyun 
433*4882a593Smuzhiyun 	blocks = walk.nbytes / AES_BLOCK_SIZE;
434*4882a593Smuzhiyun 	if (blocks) {
435*4882a593Smuzhiyun 		kernel_neon_begin();
436*4882a593Smuzhiyun 		aes_essiv_cbc_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
437*4882a593Smuzhiyun 				      ctx->key1.key_dec, rounds, blocks,
438*4882a593Smuzhiyun 				      req->iv, ctx->key2.key_enc);
439*4882a593Smuzhiyun 		kernel_neon_end();
440*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
441*4882a593Smuzhiyun 	}
442*4882a593Smuzhiyun 	return err ?: cbc_decrypt_walk(req, &walk);
443*4882a593Smuzhiyun }
444*4882a593Smuzhiyun 
ctr_encrypt(struct skcipher_request * req)445*4882a593Smuzhiyun static int __maybe_unused ctr_encrypt(struct skcipher_request *req)
446*4882a593Smuzhiyun {
447*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
448*4882a593Smuzhiyun 	struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
449*4882a593Smuzhiyun 	int err, rounds = 6 + ctx->key_length / 4;
450*4882a593Smuzhiyun 	struct skcipher_walk walk;
451*4882a593Smuzhiyun 	int blocks;
452*4882a593Smuzhiyun 
453*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
454*4882a593Smuzhiyun 
455*4882a593Smuzhiyun 	while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) {
456*4882a593Smuzhiyun 		kernel_neon_begin();
457*4882a593Smuzhiyun 		aes_ctr_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
458*4882a593Smuzhiyun 				ctx->key_enc, rounds, blocks, walk.iv);
459*4882a593Smuzhiyun 		kernel_neon_end();
460*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
461*4882a593Smuzhiyun 	}
462*4882a593Smuzhiyun 	if (walk.nbytes) {
463*4882a593Smuzhiyun 		u8 __aligned(8) tail[AES_BLOCK_SIZE];
464*4882a593Smuzhiyun 		unsigned int nbytes = walk.nbytes;
465*4882a593Smuzhiyun 		u8 *tdst = walk.dst.virt.addr;
466*4882a593Smuzhiyun 		u8 *tsrc = walk.src.virt.addr;
467*4882a593Smuzhiyun 
468*4882a593Smuzhiyun 		/*
469*4882a593Smuzhiyun 		 * Tell aes_ctr_encrypt() to process a tail block.
470*4882a593Smuzhiyun 		 */
471*4882a593Smuzhiyun 		blocks = -1;
472*4882a593Smuzhiyun 
473*4882a593Smuzhiyun 		kernel_neon_begin();
474*4882a593Smuzhiyun 		aes_ctr_encrypt(tail, NULL, ctx->key_enc, rounds,
475*4882a593Smuzhiyun 				blocks, walk.iv);
476*4882a593Smuzhiyun 		kernel_neon_end();
477*4882a593Smuzhiyun 		crypto_xor_cpy(tdst, tsrc, tail, nbytes);
478*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, 0);
479*4882a593Smuzhiyun 	}
480*4882a593Smuzhiyun 
481*4882a593Smuzhiyun 	return err;
482*4882a593Smuzhiyun }
483*4882a593Smuzhiyun 
xts_encrypt(struct skcipher_request * req)484*4882a593Smuzhiyun static int __maybe_unused xts_encrypt(struct skcipher_request *req)
485*4882a593Smuzhiyun {
486*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
487*4882a593Smuzhiyun 	struct crypto_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
488*4882a593Smuzhiyun 	int err, first, rounds = 6 + ctx->key1.key_length / 4;
489*4882a593Smuzhiyun 	int tail = req->cryptlen % AES_BLOCK_SIZE;
490*4882a593Smuzhiyun 	struct scatterlist sg_src[2], sg_dst[2];
491*4882a593Smuzhiyun 	struct skcipher_request subreq;
492*4882a593Smuzhiyun 	struct scatterlist *src, *dst;
493*4882a593Smuzhiyun 	struct skcipher_walk walk;
494*4882a593Smuzhiyun 
495*4882a593Smuzhiyun 	if (req->cryptlen < AES_BLOCK_SIZE)
496*4882a593Smuzhiyun 		return -EINVAL;
497*4882a593Smuzhiyun 
498*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
499*4882a593Smuzhiyun 
500*4882a593Smuzhiyun 	if (unlikely(tail > 0 && walk.nbytes < walk.total)) {
501*4882a593Smuzhiyun 		int xts_blocks = DIV_ROUND_UP(req->cryptlen,
502*4882a593Smuzhiyun 					      AES_BLOCK_SIZE) - 2;
503*4882a593Smuzhiyun 
504*4882a593Smuzhiyun 		skcipher_walk_abort(&walk);
505*4882a593Smuzhiyun 
506*4882a593Smuzhiyun 		skcipher_request_set_tfm(&subreq, tfm);
507*4882a593Smuzhiyun 		skcipher_request_set_callback(&subreq,
508*4882a593Smuzhiyun 					      skcipher_request_flags(req),
509*4882a593Smuzhiyun 					      NULL, NULL);
510*4882a593Smuzhiyun 		skcipher_request_set_crypt(&subreq, req->src, req->dst,
511*4882a593Smuzhiyun 					   xts_blocks * AES_BLOCK_SIZE,
512*4882a593Smuzhiyun 					   req->iv);
513*4882a593Smuzhiyun 		req = &subreq;
514*4882a593Smuzhiyun 		err = skcipher_walk_virt(&walk, req, false);
515*4882a593Smuzhiyun 	} else {
516*4882a593Smuzhiyun 		tail = 0;
517*4882a593Smuzhiyun 	}
518*4882a593Smuzhiyun 
519*4882a593Smuzhiyun 	for (first = 1; walk.nbytes >= AES_BLOCK_SIZE; first = 0) {
520*4882a593Smuzhiyun 		int nbytes = walk.nbytes;
521*4882a593Smuzhiyun 
522*4882a593Smuzhiyun 		if (walk.nbytes < walk.total)
523*4882a593Smuzhiyun 			nbytes &= ~(AES_BLOCK_SIZE - 1);
524*4882a593Smuzhiyun 
525*4882a593Smuzhiyun 		kernel_neon_begin();
526*4882a593Smuzhiyun 		aes_xts_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
527*4882a593Smuzhiyun 				ctx->key1.key_enc, rounds, nbytes,
528*4882a593Smuzhiyun 				ctx->key2.key_enc, walk.iv, first);
529*4882a593Smuzhiyun 		kernel_neon_end();
530*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
531*4882a593Smuzhiyun 	}
532*4882a593Smuzhiyun 
533*4882a593Smuzhiyun 	if (err || likely(!tail))
534*4882a593Smuzhiyun 		return err;
535*4882a593Smuzhiyun 
536*4882a593Smuzhiyun 	dst = src = scatterwalk_ffwd(sg_src, req->src, req->cryptlen);
537*4882a593Smuzhiyun 	if (req->dst != req->src)
538*4882a593Smuzhiyun 		dst = scatterwalk_ffwd(sg_dst, req->dst, req->cryptlen);
539*4882a593Smuzhiyun 
540*4882a593Smuzhiyun 	skcipher_request_set_crypt(req, src, dst, AES_BLOCK_SIZE + tail,
541*4882a593Smuzhiyun 				   req->iv);
542*4882a593Smuzhiyun 
543*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, &subreq, false);
544*4882a593Smuzhiyun 	if (err)
545*4882a593Smuzhiyun 		return err;
546*4882a593Smuzhiyun 
547*4882a593Smuzhiyun 	kernel_neon_begin();
548*4882a593Smuzhiyun 	aes_xts_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
549*4882a593Smuzhiyun 			ctx->key1.key_enc, rounds, walk.nbytes,
550*4882a593Smuzhiyun 			ctx->key2.key_enc, walk.iv, first);
551*4882a593Smuzhiyun 	kernel_neon_end();
552*4882a593Smuzhiyun 
553*4882a593Smuzhiyun 	return skcipher_walk_done(&walk, 0);
554*4882a593Smuzhiyun }
555*4882a593Smuzhiyun 
xts_decrypt(struct skcipher_request * req)556*4882a593Smuzhiyun static int __maybe_unused xts_decrypt(struct skcipher_request *req)
557*4882a593Smuzhiyun {
558*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
559*4882a593Smuzhiyun 	struct crypto_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
560*4882a593Smuzhiyun 	int err, first, rounds = 6 + ctx->key1.key_length / 4;
561*4882a593Smuzhiyun 	int tail = req->cryptlen % AES_BLOCK_SIZE;
562*4882a593Smuzhiyun 	struct scatterlist sg_src[2], sg_dst[2];
563*4882a593Smuzhiyun 	struct skcipher_request subreq;
564*4882a593Smuzhiyun 	struct scatterlist *src, *dst;
565*4882a593Smuzhiyun 	struct skcipher_walk walk;
566*4882a593Smuzhiyun 
567*4882a593Smuzhiyun 	if (req->cryptlen < AES_BLOCK_SIZE)
568*4882a593Smuzhiyun 		return -EINVAL;
569*4882a593Smuzhiyun 
570*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
571*4882a593Smuzhiyun 
572*4882a593Smuzhiyun 	if (unlikely(tail > 0 && walk.nbytes < walk.total)) {
573*4882a593Smuzhiyun 		int xts_blocks = DIV_ROUND_UP(req->cryptlen,
574*4882a593Smuzhiyun 					      AES_BLOCK_SIZE) - 2;
575*4882a593Smuzhiyun 
576*4882a593Smuzhiyun 		skcipher_walk_abort(&walk);
577*4882a593Smuzhiyun 
578*4882a593Smuzhiyun 		skcipher_request_set_tfm(&subreq, tfm);
579*4882a593Smuzhiyun 		skcipher_request_set_callback(&subreq,
580*4882a593Smuzhiyun 					      skcipher_request_flags(req),
581*4882a593Smuzhiyun 					      NULL, NULL);
582*4882a593Smuzhiyun 		skcipher_request_set_crypt(&subreq, req->src, req->dst,
583*4882a593Smuzhiyun 					   xts_blocks * AES_BLOCK_SIZE,
584*4882a593Smuzhiyun 					   req->iv);
585*4882a593Smuzhiyun 		req = &subreq;
586*4882a593Smuzhiyun 		err = skcipher_walk_virt(&walk, req, false);
587*4882a593Smuzhiyun 	} else {
588*4882a593Smuzhiyun 		tail = 0;
589*4882a593Smuzhiyun 	}
590*4882a593Smuzhiyun 
591*4882a593Smuzhiyun 	for (first = 1; walk.nbytes >= AES_BLOCK_SIZE; first = 0) {
592*4882a593Smuzhiyun 		int nbytes = walk.nbytes;
593*4882a593Smuzhiyun 
594*4882a593Smuzhiyun 		if (walk.nbytes < walk.total)
595*4882a593Smuzhiyun 			nbytes &= ~(AES_BLOCK_SIZE - 1);
596*4882a593Smuzhiyun 
597*4882a593Smuzhiyun 		kernel_neon_begin();
598*4882a593Smuzhiyun 		aes_xts_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
599*4882a593Smuzhiyun 				ctx->key1.key_dec, rounds, nbytes,
600*4882a593Smuzhiyun 				ctx->key2.key_enc, walk.iv, first);
601*4882a593Smuzhiyun 		kernel_neon_end();
602*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
603*4882a593Smuzhiyun 	}
604*4882a593Smuzhiyun 
605*4882a593Smuzhiyun 	if (err || likely(!tail))
606*4882a593Smuzhiyun 		return err;
607*4882a593Smuzhiyun 
608*4882a593Smuzhiyun 	dst = src = scatterwalk_ffwd(sg_src, req->src, req->cryptlen);
609*4882a593Smuzhiyun 	if (req->dst != req->src)
610*4882a593Smuzhiyun 		dst = scatterwalk_ffwd(sg_dst, req->dst, req->cryptlen);
611*4882a593Smuzhiyun 
612*4882a593Smuzhiyun 	skcipher_request_set_crypt(req, src, dst, AES_BLOCK_SIZE + tail,
613*4882a593Smuzhiyun 				   req->iv);
614*4882a593Smuzhiyun 
615*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, &subreq, false);
616*4882a593Smuzhiyun 	if (err)
617*4882a593Smuzhiyun 		return err;
618*4882a593Smuzhiyun 
619*4882a593Smuzhiyun 
620*4882a593Smuzhiyun 	kernel_neon_begin();
621*4882a593Smuzhiyun 	aes_xts_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
622*4882a593Smuzhiyun 			ctx->key1.key_dec, rounds, walk.nbytes,
623*4882a593Smuzhiyun 			ctx->key2.key_enc, walk.iv, first);
624*4882a593Smuzhiyun 	kernel_neon_end();
625*4882a593Smuzhiyun 
626*4882a593Smuzhiyun 	return skcipher_walk_done(&walk, 0);
627*4882a593Smuzhiyun }
628*4882a593Smuzhiyun 
629*4882a593Smuzhiyun static struct skcipher_alg aes_algs[] = { {
630*4882a593Smuzhiyun #if defined(USE_V8_CRYPTO_EXTENSIONS) || !IS_ENABLED(CONFIG_CRYPTO_AES_ARM64_BS)
631*4882a593Smuzhiyun 	.base = {
632*4882a593Smuzhiyun 		.cra_name		= "ecb(aes)",
633*4882a593Smuzhiyun 		.cra_driver_name	= "ecb-aes-" MODE,
634*4882a593Smuzhiyun 		.cra_priority		= PRIO,
635*4882a593Smuzhiyun 		.cra_blocksize		= AES_BLOCK_SIZE,
636*4882a593Smuzhiyun 		.cra_ctxsize		= sizeof(struct crypto_aes_ctx),
637*4882a593Smuzhiyun 		.cra_module		= THIS_MODULE,
638*4882a593Smuzhiyun 	},
639*4882a593Smuzhiyun 	.min_keysize	= AES_MIN_KEY_SIZE,
640*4882a593Smuzhiyun 	.max_keysize	= AES_MAX_KEY_SIZE,
641*4882a593Smuzhiyun 	.setkey		= skcipher_aes_setkey,
642*4882a593Smuzhiyun 	.encrypt	= ecb_encrypt,
643*4882a593Smuzhiyun 	.decrypt	= ecb_decrypt,
644*4882a593Smuzhiyun }, {
645*4882a593Smuzhiyun 	.base = {
646*4882a593Smuzhiyun 		.cra_name		= "cbc(aes)",
647*4882a593Smuzhiyun 		.cra_driver_name	= "cbc-aes-" MODE,
648*4882a593Smuzhiyun 		.cra_priority		= PRIO,
649*4882a593Smuzhiyun 		.cra_blocksize		= AES_BLOCK_SIZE,
650*4882a593Smuzhiyun 		.cra_ctxsize		= sizeof(struct crypto_aes_ctx),
651*4882a593Smuzhiyun 		.cra_module		= THIS_MODULE,
652*4882a593Smuzhiyun 	},
653*4882a593Smuzhiyun 	.min_keysize	= AES_MIN_KEY_SIZE,
654*4882a593Smuzhiyun 	.max_keysize	= AES_MAX_KEY_SIZE,
655*4882a593Smuzhiyun 	.ivsize		= AES_BLOCK_SIZE,
656*4882a593Smuzhiyun 	.setkey		= skcipher_aes_setkey,
657*4882a593Smuzhiyun 	.encrypt	= cbc_encrypt,
658*4882a593Smuzhiyun 	.decrypt	= cbc_decrypt,
659*4882a593Smuzhiyun }, {
660*4882a593Smuzhiyun 	.base = {
661*4882a593Smuzhiyun 		.cra_name		= "ctr(aes)",
662*4882a593Smuzhiyun 		.cra_driver_name	= "ctr-aes-" MODE,
663*4882a593Smuzhiyun 		.cra_priority		= PRIO,
664*4882a593Smuzhiyun 		.cra_blocksize		= 1,
665*4882a593Smuzhiyun 		.cra_ctxsize		= sizeof(struct crypto_aes_ctx),
666*4882a593Smuzhiyun 		.cra_module		= THIS_MODULE,
667*4882a593Smuzhiyun 	},
668*4882a593Smuzhiyun 	.min_keysize	= AES_MIN_KEY_SIZE,
669*4882a593Smuzhiyun 	.max_keysize	= AES_MAX_KEY_SIZE,
670*4882a593Smuzhiyun 	.ivsize		= AES_BLOCK_SIZE,
671*4882a593Smuzhiyun 	.chunksize	= AES_BLOCK_SIZE,
672*4882a593Smuzhiyun 	.setkey		= skcipher_aes_setkey,
673*4882a593Smuzhiyun 	.encrypt	= ctr_encrypt,
674*4882a593Smuzhiyun 	.decrypt	= ctr_encrypt,
675*4882a593Smuzhiyun }, {
676*4882a593Smuzhiyun 	.base = {
677*4882a593Smuzhiyun 		.cra_name		= "xts(aes)",
678*4882a593Smuzhiyun 		.cra_driver_name	= "xts-aes-" MODE,
679*4882a593Smuzhiyun 		.cra_priority		= PRIO,
680*4882a593Smuzhiyun 		.cra_blocksize		= AES_BLOCK_SIZE,
681*4882a593Smuzhiyun 		.cra_ctxsize		= sizeof(struct crypto_aes_xts_ctx),
682*4882a593Smuzhiyun 		.cra_module		= THIS_MODULE,
683*4882a593Smuzhiyun 	},
684*4882a593Smuzhiyun 	.min_keysize	= 2 * AES_MIN_KEY_SIZE,
685*4882a593Smuzhiyun 	.max_keysize	= 2 * AES_MAX_KEY_SIZE,
686*4882a593Smuzhiyun 	.ivsize		= AES_BLOCK_SIZE,
687*4882a593Smuzhiyun 	.walksize	= 2 * AES_BLOCK_SIZE,
688*4882a593Smuzhiyun 	.setkey		= xts_set_key,
689*4882a593Smuzhiyun 	.encrypt	= xts_encrypt,
690*4882a593Smuzhiyun 	.decrypt	= xts_decrypt,
691*4882a593Smuzhiyun }, {
692*4882a593Smuzhiyun #endif
693*4882a593Smuzhiyun 	.base = {
694*4882a593Smuzhiyun 		.cra_name		= "cts(cbc(aes))",
695*4882a593Smuzhiyun 		.cra_driver_name	= "cts-cbc-aes-" MODE,
696*4882a593Smuzhiyun 		.cra_priority		= PRIO,
697*4882a593Smuzhiyun 		.cra_blocksize		= AES_BLOCK_SIZE,
698*4882a593Smuzhiyun 		.cra_ctxsize		= sizeof(struct crypto_aes_ctx),
699*4882a593Smuzhiyun 		.cra_module		= THIS_MODULE,
700*4882a593Smuzhiyun 	},
701*4882a593Smuzhiyun 	.min_keysize	= AES_MIN_KEY_SIZE,
702*4882a593Smuzhiyun 	.max_keysize	= AES_MAX_KEY_SIZE,
703*4882a593Smuzhiyun 	.ivsize		= AES_BLOCK_SIZE,
704*4882a593Smuzhiyun 	.walksize	= 2 * AES_BLOCK_SIZE,
705*4882a593Smuzhiyun 	.setkey		= skcipher_aes_setkey,
706*4882a593Smuzhiyun 	.encrypt	= cts_cbc_encrypt,
707*4882a593Smuzhiyun 	.decrypt	= cts_cbc_decrypt,
708*4882a593Smuzhiyun }, {
709*4882a593Smuzhiyun 	.base = {
710*4882a593Smuzhiyun 		.cra_name		= "essiv(cbc(aes),sha256)",
711*4882a593Smuzhiyun 		.cra_driver_name	= "essiv-cbc-aes-sha256-" MODE,
712*4882a593Smuzhiyun 		.cra_priority		= PRIO + 1,
713*4882a593Smuzhiyun 		.cra_blocksize		= AES_BLOCK_SIZE,
714*4882a593Smuzhiyun 		.cra_ctxsize		= sizeof(struct crypto_aes_essiv_cbc_ctx),
715*4882a593Smuzhiyun 		.cra_module		= THIS_MODULE,
716*4882a593Smuzhiyun 	},
717*4882a593Smuzhiyun 	.min_keysize	= AES_MIN_KEY_SIZE,
718*4882a593Smuzhiyun 	.max_keysize	= AES_MAX_KEY_SIZE,
719*4882a593Smuzhiyun 	.ivsize		= AES_BLOCK_SIZE,
720*4882a593Smuzhiyun 	.setkey		= essiv_cbc_set_key,
721*4882a593Smuzhiyun 	.encrypt	= essiv_cbc_encrypt,
722*4882a593Smuzhiyun 	.decrypt	= essiv_cbc_decrypt,
723*4882a593Smuzhiyun 	.init		= essiv_cbc_init_tfm,
724*4882a593Smuzhiyun 	.exit		= essiv_cbc_exit_tfm,
725*4882a593Smuzhiyun } };
726*4882a593Smuzhiyun 
cbcmac_setkey(struct crypto_shash * tfm,const u8 * in_key,unsigned int key_len)727*4882a593Smuzhiyun static int cbcmac_setkey(struct crypto_shash *tfm, const u8 *in_key,
728*4882a593Smuzhiyun 			 unsigned int key_len)
729*4882a593Smuzhiyun {
730*4882a593Smuzhiyun 	struct mac_tfm_ctx *ctx = crypto_shash_ctx(tfm);
731*4882a593Smuzhiyun 
732*4882a593Smuzhiyun 	return aes_expandkey(&ctx->key, in_key, key_len);
733*4882a593Smuzhiyun }
734*4882a593Smuzhiyun 
cmac_gf128_mul_by_x(be128 * y,const be128 * x)735*4882a593Smuzhiyun static void cmac_gf128_mul_by_x(be128 *y, const be128 *x)
736*4882a593Smuzhiyun {
737*4882a593Smuzhiyun 	u64 a = be64_to_cpu(x->a);
738*4882a593Smuzhiyun 	u64 b = be64_to_cpu(x->b);
739*4882a593Smuzhiyun 
740*4882a593Smuzhiyun 	y->a = cpu_to_be64((a << 1) | (b >> 63));
741*4882a593Smuzhiyun 	y->b = cpu_to_be64((b << 1) ^ ((a >> 63) ? 0x87 : 0));
742*4882a593Smuzhiyun }
743*4882a593Smuzhiyun 
cmac_setkey(struct crypto_shash * tfm,const u8 * in_key,unsigned int key_len)744*4882a593Smuzhiyun static int cmac_setkey(struct crypto_shash *tfm, const u8 *in_key,
745*4882a593Smuzhiyun 		       unsigned int key_len)
746*4882a593Smuzhiyun {
747*4882a593Smuzhiyun 	struct mac_tfm_ctx *ctx = crypto_shash_ctx(tfm);
748*4882a593Smuzhiyun 	be128 *consts = (be128 *)ctx->consts;
749*4882a593Smuzhiyun 	int rounds = 6 + key_len / 4;
750*4882a593Smuzhiyun 	int err;
751*4882a593Smuzhiyun 
752*4882a593Smuzhiyun 	err = cbcmac_setkey(tfm, in_key, key_len);
753*4882a593Smuzhiyun 	if (err)
754*4882a593Smuzhiyun 		return err;
755*4882a593Smuzhiyun 
756*4882a593Smuzhiyun 	/* encrypt the zero vector */
757*4882a593Smuzhiyun 	kernel_neon_begin();
758*4882a593Smuzhiyun 	aes_ecb_encrypt(ctx->consts, (u8[AES_BLOCK_SIZE]){}, ctx->key.key_enc,
759*4882a593Smuzhiyun 			rounds, 1);
760*4882a593Smuzhiyun 	kernel_neon_end();
761*4882a593Smuzhiyun 
762*4882a593Smuzhiyun 	cmac_gf128_mul_by_x(consts, consts);
763*4882a593Smuzhiyun 	cmac_gf128_mul_by_x(consts + 1, consts);
764*4882a593Smuzhiyun 
765*4882a593Smuzhiyun 	return 0;
766*4882a593Smuzhiyun }
767*4882a593Smuzhiyun 
xcbc_setkey(struct crypto_shash * tfm,const u8 * in_key,unsigned int key_len)768*4882a593Smuzhiyun static int xcbc_setkey(struct crypto_shash *tfm, const u8 *in_key,
769*4882a593Smuzhiyun 		       unsigned int key_len)
770*4882a593Smuzhiyun {
771*4882a593Smuzhiyun 	static u8 const ks[3][AES_BLOCK_SIZE] = {
772*4882a593Smuzhiyun 		{ [0 ... AES_BLOCK_SIZE - 1] = 0x1 },
773*4882a593Smuzhiyun 		{ [0 ... AES_BLOCK_SIZE - 1] = 0x2 },
774*4882a593Smuzhiyun 		{ [0 ... AES_BLOCK_SIZE - 1] = 0x3 },
775*4882a593Smuzhiyun 	};
776*4882a593Smuzhiyun 
777*4882a593Smuzhiyun 	struct mac_tfm_ctx *ctx = crypto_shash_ctx(tfm);
778*4882a593Smuzhiyun 	int rounds = 6 + key_len / 4;
779*4882a593Smuzhiyun 	u8 key[AES_BLOCK_SIZE];
780*4882a593Smuzhiyun 	int err;
781*4882a593Smuzhiyun 
782*4882a593Smuzhiyun 	err = cbcmac_setkey(tfm, in_key, key_len);
783*4882a593Smuzhiyun 	if (err)
784*4882a593Smuzhiyun 		return err;
785*4882a593Smuzhiyun 
786*4882a593Smuzhiyun 	kernel_neon_begin();
787*4882a593Smuzhiyun 	aes_ecb_encrypt(key, ks[0], ctx->key.key_enc, rounds, 1);
788*4882a593Smuzhiyun 	aes_ecb_encrypt(ctx->consts, ks[1], ctx->key.key_enc, rounds, 2);
789*4882a593Smuzhiyun 	kernel_neon_end();
790*4882a593Smuzhiyun 
791*4882a593Smuzhiyun 	return cbcmac_setkey(tfm, key, sizeof(key));
792*4882a593Smuzhiyun }
793*4882a593Smuzhiyun 
mac_init(struct shash_desc * desc)794*4882a593Smuzhiyun static int mac_init(struct shash_desc *desc)
795*4882a593Smuzhiyun {
796*4882a593Smuzhiyun 	struct mac_desc_ctx *ctx = shash_desc_ctx(desc);
797*4882a593Smuzhiyun 
798*4882a593Smuzhiyun 	memset(ctx->dg, 0, AES_BLOCK_SIZE);
799*4882a593Smuzhiyun 	ctx->len = 0;
800*4882a593Smuzhiyun 
801*4882a593Smuzhiyun 	return 0;
802*4882a593Smuzhiyun }
803*4882a593Smuzhiyun 
mac_do_update(struct crypto_aes_ctx * ctx,u8 const in[],int blocks,u8 dg[],int enc_before,int enc_after)804*4882a593Smuzhiyun static void mac_do_update(struct crypto_aes_ctx *ctx, u8 const in[], int blocks,
805*4882a593Smuzhiyun 			  u8 dg[], int enc_before, int enc_after)
806*4882a593Smuzhiyun {
807*4882a593Smuzhiyun 	int rounds = 6 + ctx->key_length / 4;
808*4882a593Smuzhiyun 
809*4882a593Smuzhiyun 	if (crypto_simd_usable()) {
810*4882a593Smuzhiyun 		int rem;
811*4882a593Smuzhiyun 
812*4882a593Smuzhiyun 		do {
813*4882a593Smuzhiyun 			kernel_neon_begin();
814*4882a593Smuzhiyun 			rem = aes_mac_update(in, ctx->key_enc, rounds, blocks,
815*4882a593Smuzhiyun 					     dg, enc_before, enc_after);
816*4882a593Smuzhiyun 			kernel_neon_end();
817*4882a593Smuzhiyun 			in += (blocks - rem) * AES_BLOCK_SIZE;
818*4882a593Smuzhiyun 			blocks = rem;
819*4882a593Smuzhiyun 			enc_before = 0;
820*4882a593Smuzhiyun 		} while (blocks);
821*4882a593Smuzhiyun 	} else {
822*4882a593Smuzhiyun 		if (enc_before)
823*4882a593Smuzhiyun 			aes_encrypt(ctx, dg, dg);
824*4882a593Smuzhiyun 
825*4882a593Smuzhiyun 		while (blocks--) {
826*4882a593Smuzhiyun 			crypto_xor(dg, in, AES_BLOCK_SIZE);
827*4882a593Smuzhiyun 			in += AES_BLOCK_SIZE;
828*4882a593Smuzhiyun 
829*4882a593Smuzhiyun 			if (blocks || enc_after)
830*4882a593Smuzhiyun 				aes_encrypt(ctx, dg, dg);
831*4882a593Smuzhiyun 		}
832*4882a593Smuzhiyun 	}
833*4882a593Smuzhiyun }
834*4882a593Smuzhiyun 
mac_update(struct shash_desc * desc,const u8 * p,unsigned int len)835*4882a593Smuzhiyun static int mac_update(struct shash_desc *desc, const u8 *p, unsigned int len)
836*4882a593Smuzhiyun {
837*4882a593Smuzhiyun 	struct mac_tfm_ctx *tctx = crypto_shash_ctx(desc->tfm);
838*4882a593Smuzhiyun 	struct mac_desc_ctx *ctx = shash_desc_ctx(desc);
839*4882a593Smuzhiyun 
840*4882a593Smuzhiyun 	while (len > 0) {
841*4882a593Smuzhiyun 		unsigned int l;
842*4882a593Smuzhiyun 
843*4882a593Smuzhiyun 		if ((ctx->len % AES_BLOCK_SIZE) == 0 &&
844*4882a593Smuzhiyun 		    (ctx->len + len) > AES_BLOCK_SIZE) {
845*4882a593Smuzhiyun 
846*4882a593Smuzhiyun 			int blocks = len / AES_BLOCK_SIZE;
847*4882a593Smuzhiyun 
848*4882a593Smuzhiyun 			len %= AES_BLOCK_SIZE;
849*4882a593Smuzhiyun 
850*4882a593Smuzhiyun 			mac_do_update(&tctx->key, p, blocks, ctx->dg,
851*4882a593Smuzhiyun 				      (ctx->len != 0), (len != 0));
852*4882a593Smuzhiyun 
853*4882a593Smuzhiyun 			p += blocks * AES_BLOCK_SIZE;
854*4882a593Smuzhiyun 
855*4882a593Smuzhiyun 			if (!len) {
856*4882a593Smuzhiyun 				ctx->len = AES_BLOCK_SIZE;
857*4882a593Smuzhiyun 				break;
858*4882a593Smuzhiyun 			}
859*4882a593Smuzhiyun 			ctx->len = 0;
860*4882a593Smuzhiyun 		}
861*4882a593Smuzhiyun 
862*4882a593Smuzhiyun 		l = min(len, AES_BLOCK_SIZE - ctx->len);
863*4882a593Smuzhiyun 
864*4882a593Smuzhiyun 		if (l <= AES_BLOCK_SIZE) {
865*4882a593Smuzhiyun 			crypto_xor(ctx->dg + ctx->len, p, l);
866*4882a593Smuzhiyun 			ctx->len += l;
867*4882a593Smuzhiyun 			len -= l;
868*4882a593Smuzhiyun 			p += l;
869*4882a593Smuzhiyun 		}
870*4882a593Smuzhiyun 	}
871*4882a593Smuzhiyun 
872*4882a593Smuzhiyun 	return 0;
873*4882a593Smuzhiyun }
874*4882a593Smuzhiyun 
cbcmac_final(struct shash_desc * desc,u8 * out)875*4882a593Smuzhiyun static int cbcmac_final(struct shash_desc *desc, u8 *out)
876*4882a593Smuzhiyun {
877*4882a593Smuzhiyun 	struct mac_tfm_ctx *tctx = crypto_shash_ctx(desc->tfm);
878*4882a593Smuzhiyun 	struct mac_desc_ctx *ctx = shash_desc_ctx(desc);
879*4882a593Smuzhiyun 
880*4882a593Smuzhiyun 	mac_do_update(&tctx->key, NULL, 0, ctx->dg, (ctx->len != 0), 0);
881*4882a593Smuzhiyun 
882*4882a593Smuzhiyun 	memcpy(out, ctx->dg, AES_BLOCK_SIZE);
883*4882a593Smuzhiyun 
884*4882a593Smuzhiyun 	return 0;
885*4882a593Smuzhiyun }
886*4882a593Smuzhiyun 
cmac_final(struct shash_desc * desc,u8 * out)887*4882a593Smuzhiyun static int cmac_final(struct shash_desc *desc, u8 *out)
888*4882a593Smuzhiyun {
889*4882a593Smuzhiyun 	struct mac_tfm_ctx *tctx = crypto_shash_ctx(desc->tfm);
890*4882a593Smuzhiyun 	struct mac_desc_ctx *ctx = shash_desc_ctx(desc);
891*4882a593Smuzhiyun 	u8 *consts = tctx->consts;
892*4882a593Smuzhiyun 
893*4882a593Smuzhiyun 	if (ctx->len != AES_BLOCK_SIZE) {
894*4882a593Smuzhiyun 		ctx->dg[ctx->len] ^= 0x80;
895*4882a593Smuzhiyun 		consts += AES_BLOCK_SIZE;
896*4882a593Smuzhiyun 	}
897*4882a593Smuzhiyun 
898*4882a593Smuzhiyun 	mac_do_update(&tctx->key, consts, 1, ctx->dg, 0, 1);
899*4882a593Smuzhiyun 
900*4882a593Smuzhiyun 	memcpy(out, ctx->dg, AES_BLOCK_SIZE);
901*4882a593Smuzhiyun 
902*4882a593Smuzhiyun 	return 0;
903*4882a593Smuzhiyun }
904*4882a593Smuzhiyun 
905*4882a593Smuzhiyun static struct shash_alg mac_algs[] = { {
906*4882a593Smuzhiyun 	.base.cra_name		= "cmac(aes)",
907*4882a593Smuzhiyun 	.base.cra_driver_name	= "cmac-aes-" MODE,
908*4882a593Smuzhiyun 	.base.cra_priority	= PRIO,
909*4882a593Smuzhiyun 	.base.cra_blocksize	= AES_BLOCK_SIZE,
910*4882a593Smuzhiyun 	.base.cra_ctxsize	= sizeof(struct mac_tfm_ctx) +
911*4882a593Smuzhiyun 				  2 * AES_BLOCK_SIZE,
912*4882a593Smuzhiyun 	.base.cra_module	= THIS_MODULE,
913*4882a593Smuzhiyun 
914*4882a593Smuzhiyun 	.digestsize		= AES_BLOCK_SIZE,
915*4882a593Smuzhiyun 	.init			= mac_init,
916*4882a593Smuzhiyun 	.update			= mac_update,
917*4882a593Smuzhiyun 	.final			= cmac_final,
918*4882a593Smuzhiyun 	.setkey			= cmac_setkey,
919*4882a593Smuzhiyun 	.descsize		= sizeof(struct mac_desc_ctx),
920*4882a593Smuzhiyun }, {
921*4882a593Smuzhiyun 	.base.cra_name		= "xcbc(aes)",
922*4882a593Smuzhiyun 	.base.cra_driver_name	= "xcbc-aes-" MODE,
923*4882a593Smuzhiyun 	.base.cra_priority	= PRIO,
924*4882a593Smuzhiyun 	.base.cra_blocksize	= AES_BLOCK_SIZE,
925*4882a593Smuzhiyun 	.base.cra_ctxsize	= sizeof(struct mac_tfm_ctx) +
926*4882a593Smuzhiyun 				  2 * AES_BLOCK_SIZE,
927*4882a593Smuzhiyun 	.base.cra_module	= THIS_MODULE,
928*4882a593Smuzhiyun 
929*4882a593Smuzhiyun 	.digestsize		= AES_BLOCK_SIZE,
930*4882a593Smuzhiyun 	.init			= mac_init,
931*4882a593Smuzhiyun 	.update			= mac_update,
932*4882a593Smuzhiyun 	.final			= cmac_final,
933*4882a593Smuzhiyun 	.setkey			= xcbc_setkey,
934*4882a593Smuzhiyun 	.descsize		= sizeof(struct mac_desc_ctx),
935*4882a593Smuzhiyun }, {
936*4882a593Smuzhiyun 	.base.cra_name		= "cbcmac(aes)",
937*4882a593Smuzhiyun 	.base.cra_driver_name	= "cbcmac-aes-" MODE,
938*4882a593Smuzhiyun 	.base.cra_priority	= PRIO,
939*4882a593Smuzhiyun 	.base.cra_blocksize	= 1,
940*4882a593Smuzhiyun 	.base.cra_ctxsize	= sizeof(struct mac_tfm_ctx),
941*4882a593Smuzhiyun 	.base.cra_module	= THIS_MODULE,
942*4882a593Smuzhiyun 
943*4882a593Smuzhiyun 	.digestsize		= AES_BLOCK_SIZE,
944*4882a593Smuzhiyun 	.init			= mac_init,
945*4882a593Smuzhiyun 	.update			= mac_update,
946*4882a593Smuzhiyun 	.final			= cbcmac_final,
947*4882a593Smuzhiyun 	.setkey			= cbcmac_setkey,
948*4882a593Smuzhiyun 	.descsize		= sizeof(struct mac_desc_ctx),
949*4882a593Smuzhiyun } };
950*4882a593Smuzhiyun 
aes_exit(void)951*4882a593Smuzhiyun static void aes_exit(void)
952*4882a593Smuzhiyun {
953*4882a593Smuzhiyun 	crypto_unregister_shashes(mac_algs, ARRAY_SIZE(mac_algs));
954*4882a593Smuzhiyun 	crypto_unregister_skciphers(aes_algs, ARRAY_SIZE(aes_algs));
955*4882a593Smuzhiyun }
956*4882a593Smuzhiyun 
aes_init(void)957*4882a593Smuzhiyun static int __init aes_init(void)
958*4882a593Smuzhiyun {
959*4882a593Smuzhiyun 	int err;
960*4882a593Smuzhiyun 
961*4882a593Smuzhiyun 	err = crypto_register_skciphers(aes_algs, ARRAY_SIZE(aes_algs));
962*4882a593Smuzhiyun 	if (err)
963*4882a593Smuzhiyun 		return err;
964*4882a593Smuzhiyun 
965*4882a593Smuzhiyun 	err = crypto_register_shashes(mac_algs, ARRAY_SIZE(mac_algs));
966*4882a593Smuzhiyun 	if (err)
967*4882a593Smuzhiyun 		goto unregister_ciphers;
968*4882a593Smuzhiyun 
969*4882a593Smuzhiyun 	return 0;
970*4882a593Smuzhiyun 
971*4882a593Smuzhiyun unregister_ciphers:
972*4882a593Smuzhiyun 	crypto_unregister_skciphers(aes_algs, ARRAY_SIZE(aes_algs));
973*4882a593Smuzhiyun 	return err;
974*4882a593Smuzhiyun }
975*4882a593Smuzhiyun 
976*4882a593Smuzhiyun #ifdef USE_V8_CRYPTO_EXTENSIONS
977*4882a593Smuzhiyun module_cpu_feature_match(AES, aes_init);
978*4882a593Smuzhiyun #else
979*4882a593Smuzhiyun module_init(aes_init);
980*4882a593Smuzhiyun EXPORT_SYMBOL(neon_aes_ecb_encrypt);
981*4882a593Smuzhiyun EXPORT_SYMBOL(neon_aes_cbc_encrypt);
982*4882a593Smuzhiyun EXPORT_SYMBOL(neon_aes_xts_encrypt);
983*4882a593Smuzhiyun EXPORT_SYMBOL(neon_aes_xts_decrypt);
984*4882a593Smuzhiyun #endif
985*4882a593Smuzhiyun module_exit(aes_exit);
986