1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-only
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * linux/arch/arm64/crypto/aes-glue.c - wrapper code for ARMv8 AES
4*4882a593Smuzhiyun *
5*4882a593Smuzhiyun * Copyright (C) 2013 - 2017 Linaro Ltd <ard.biesheuvel@linaro.org>
6*4882a593Smuzhiyun */
7*4882a593Smuzhiyun
8*4882a593Smuzhiyun #include <asm/neon.h>
9*4882a593Smuzhiyun #include <asm/hwcap.h>
10*4882a593Smuzhiyun #include <asm/simd.h>
11*4882a593Smuzhiyun #include <crypto/aes.h>
12*4882a593Smuzhiyun #include <crypto/ctr.h>
13*4882a593Smuzhiyun #include <crypto/sha.h>
14*4882a593Smuzhiyun #include <crypto/internal/hash.h>
15*4882a593Smuzhiyun #include <crypto/internal/simd.h>
16*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
17*4882a593Smuzhiyun #include <crypto/scatterwalk.h>
18*4882a593Smuzhiyun #include <linux/module.h>
19*4882a593Smuzhiyun #include <linux/cpufeature.h>
20*4882a593Smuzhiyun #include <crypto/xts.h>
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun #include "aes-ce-setkey.h"
23*4882a593Smuzhiyun
24*4882a593Smuzhiyun #ifdef USE_V8_CRYPTO_EXTENSIONS
25*4882a593Smuzhiyun #define MODE "ce"
26*4882a593Smuzhiyun #define PRIO 300
27*4882a593Smuzhiyun #define aes_expandkey ce_aes_expandkey
28*4882a593Smuzhiyun #define aes_ecb_encrypt ce_aes_ecb_encrypt
29*4882a593Smuzhiyun #define aes_ecb_decrypt ce_aes_ecb_decrypt
30*4882a593Smuzhiyun #define aes_cbc_encrypt ce_aes_cbc_encrypt
31*4882a593Smuzhiyun #define aes_cbc_decrypt ce_aes_cbc_decrypt
32*4882a593Smuzhiyun #define aes_cbc_cts_encrypt ce_aes_cbc_cts_encrypt
33*4882a593Smuzhiyun #define aes_cbc_cts_decrypt ce_aes_cbc_cts_decrypt
34*4882a593Smuzhiyun #define aes_essiv_cbc_encrypt ce_aes_essiv_cbc_encrypt
35*4882a593Smuzhiyun #define aes_essiv_cbc_decrypt ce_aes_essiv_cbc_decrypt
36*4882a593Smuzhiyun #define aes_ctr_encrypt ce_aes_ctr_encrypt
37*4882a593Smuzhiyun #define aes_xts_encrypt ce_aes_xts_encrypt
38*4882a593Smuzhiyun #define aes_xts_decrypt ce_aes_xts_decrypt
39*4882a593Smuzhiyun #define aes_mac_update ce_aes_mac_update
40*4882a593Smuzhiyun MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS using ARMv8 Crypto Extensions");
41*4882a593Smuzhiyun #else
42*4882a593Smuzhiyun #define MODE "neon"
43*4882a593Smuzhiyun #define PRIO 200
44*4882a593Smuzhiyun #define aes_ecb_encrypt neon_aes_ecb_encrypt
45*4882a593Smuzhiyun #define aes_ecb_decrypt neon_aes_ecb_decrypt
46*4882a593Smuzhiyun #define aes_cbc_encrypt neon_aes_cbc_encrypt
47*4882a593Smuzhiyun #define aes_cbc_decrypt neon_aes_cbc_decrypt
48*4882a593Smuzhiyun #define aes_cbc_cts_encrypt neon_aes_cbc_cts_encrypt
49*4882a593Smuzhiyun #define aes_cbc_cts_decrypt neon_aes_cbc_cts_decrypt
50*4882a593Smuzhiyun #define aes_essiv_cbc_encrypt neon_aes_essiv_cbc_encrypt
51*4882a593Smuzhiyun #define aes_essiv_cbc_decrypt neon_aes_essiv_cbc_decrypt
52*4882a593Smuzhiyun #define aes_ctr_encrypt neon_aes_ctr_encrypt
53*4882a593Smuzhiyun #define aes_xts_encrypt neon_aes_xts_encrypt
54*4882a593Smuzhiyun #define aes_xts_decrypt neon_aes_xts_decrypt
55*4882a593Smuzhiyun #define aes_mac_update neon_aes_mac_update
56*4882a593Smuzhiyun MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS using ARMv8 NEON");
57*4882a593Smuzhiyun #endif
58*4882a593Smuzhiyun #if defined(USE_V8_CRYPTO_EXTENSIONS) || !IS_ENABLED(CONFIG_CRYPTO_AES_ARM64_BS)
59*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("ecb(aes)");
60*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cbc(aes)");
61*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("ctr(aes)");
62*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xts(aes)");
63*4882a593Smuzhiyun #endif
64*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cts(cbc(aes))");
65*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("essiv(cbc(aes),sha256)");
66*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cmac(aes)");
67*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xcbc(aes)");
68*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cbcmac(aes)");
69*4882a593Smuzhiyun
70*4882a593Smuzhiyun MODULE_AUTHOR("Ard Biesheuvel <ard.biesheuvel@linaro.org>");
71*4882a593Smuzhiyun MODULE_LICENSE("GPL v2");
72*4882a593Smuzhiyun
73*4882a593Smuzhiyun /* defined in aes-modes.S */
74*4882a593Smuzhiyun asmlinkage void aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[],
75*4882a593Smuzhiyun int rounds, int blocks);
76*4882a593Smuzhiyun asmlinkage void aes_ecb_decrypt(u8 out[], u8 const in[], u32 const rk[],
77*4882a593Smuzhiyun int rounds, int blocks);
78*4882a593Smuzhiyun
79*4882a593Smuzhiyun asmlinkage void aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[],
80*4882a593Smuzhiyun int rounds, int blocks, u8 iv[]);
81*4882a593Smuzhiyun asmlinkage void aes_cbc_decrypt(u8 out[], u8 const in[], u32 const rk[],
82*4882a593Smuzhiyun int rounds, int blocks, u8 iv[]);
83*4882a593Smuzhiyun
84*4882a593Smuzhiyun asmlinkage void aes_cbc_cts_encrypt(u8 out[], u8 const in[], u32 const rk[],
85*4882a593Smuzhiyun int rounds, int bytes, u8 const iv[]);
86*4882a593Smuzhiyun asmlinkage void aes_cbc_cts_decrypt(u8 out[], u8 const in[], u32 const rk[],
87*4882a593Smuzhiyun int rounds, int bytes, u8 const iv[]);
88*4882a593Smuzhiyun
89*4882a593Smuzhiyun asmlinkage void aes_ctr_encrypt(u8 out[], u8 const in[], u32 const rk[],
90*4882a593Smuzhiyun int rounds, int blocks, u8 ctr[]);
91*4882a593Smuzhiyun
92*4882a593Smuzhiyun asmlinkage void aes_xts_encrypt(u8 out[], u8 const in[], u32 const rk1[],
93*4882a593Smuzhiyun int rounds, int bytes, u32 const rk2[], u8 iv[],
94*4882a593Smuzhiyun int first);
95*4882a593Smuzhiyun asmlinkage void aes_xts_decrypt(u8 out[], u8 const in[], u32 const rk1[],
96*4882a593Smuzhiyun int rounds, int bytes, u32 const rk2[], u8 iv[],
97*4882a593Smuzhiyun int first);
98*4882a593Smuzhiyun
99*4882a593Smuzhiyun asmlinkage void aes_essiv_cbc_encrypt(u8 out[], u8 const in[], u32 const rk1[],
100*4882a593Smuzhiyun int rounds, int blocks, u8 iv[],
101*4882a593Smuzhiyun u32 const rk2[]);
102*4882a593Smuzhiyun asmlinkage void aes_essiv_cbc_decrypt(u8 out[], u8 const in[], u32 const rk1[],
103*4882a593Smuzhiyun int rounds, int blocks, u8 iv[],
104*4882a593Smuzhiyun u32 const rk2[]);
105*4882a593Smuzhiyun
106*4882a593Smuzhiyun asmlinkage int aes_mac_update(u8 const in[], u32 const rk[], int rounds,
107*4882a593Smuzhiyun int blocks, u8 dg[], int enc_before,
108*4882a593Smuzhiyun int enc_after);
109*4882a593Smuzhiyun
110*4882a593Smuzhiyun struct crypto_aes_xts_ctx {
111*4882a593Smuzhiyun struct crypto_aes_ctx key1;
112*4882a593Smuzhiyun struct crypto_aes_ctx __aligned(8) key2;
113*4882a593Smuzhiyun };
114*4882a593Smuzhiyun
115*4882a593Smuzhiyun struct crypto_aes_essiv_cbc_ctx {
116*4882a593Smuzhiyun struct crypto_aes_ctx key1;
117*4882a593Smuzhiyun struct crypto_aes_ctx __aligned(8) key2;
118*4882a593Smuzhiyun struct crypto_shash *hash;
119*4882a593Smuzhiyun };
120*4882a593Smuzhiyun
121*4882a593Smuzhiyun struct mac_tfm_ctx {
122*4882a593Smuzhiyun struct crypto_aes_ctx key;
123*4882a593Smuzhiyun u8 __aligned(8) consts[];
124*4882a593Smuzhiyun };
125*4882a593Smuzhiyun
126*4882a593Smuzhiyun struct mac_desc_ctx {
127*4882a593Smuzhiyun unsigned int len;
128*4882a593Smuzhiyun u8 dg[AES_BLOCK_SIZE];
129*4882a593Smuzhiyun };
130*4882a593Smuzhiyun
skcipher_aes_setkey(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)131*4882a593Smuzhiyun static int skcipher_aes_setkey(struct crypto_skcipher *tfm, const u8 *in_key,
132*4882a593Smuzhiyun unsigned int key_len)
133*4882a593Smuzhiyun {
134*4882a593Smuzhiyun struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
135*4882a593Smuzhiyun
136*4882a593Smuzhiyun return aes_expandkey(ctx, in_key, key_len);
137*4882a593Smuzhiyun }
138*4882a593Smuzhiyun
xts_set_key(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)139*4882a593Smuzhiyun static int __maybe_unused xts_set_key(struct crypto_skcipher *tfm,
140*4882a593Smuzhiyun const u8 *in_key, unsigned int key_len)
141*4882a593Smuzhiyun {
142*4882a593Smuzhiyun struct crypto_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
143*4882a593Smuzhiyun int ret;
144*4882a593Smuzhiyun
145*4882a593Smuzhiyun ret = xts_verify_key(tfm, in_key, key_len);
146*4882a593Smuzhiyun if (ret)
147*4882a593Smuzhiyun return ret;
148*4882a593Smuzhiyun
149*4882a593Smuzhiyun ret = aes_expandkey(&ctx->key1, in_key, key_len / 2);
150*4882a593Smuzhiyun if (!ret)
151*4882a593Smuzhiyun ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2],
152*4882a593Smuzhiyun key_len / 2);
153*4882a593Smuzhiyun return ret;
154*4882a593Smuzhiyun }
155*4882a593Smuzhiyun
essiv_cbc_set_key(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)156*4882a593Smuzhiyun static int __maybe_unused essiv_cbc_set_key(struct crypto_skcipher *tfm,
157*4882a593Smuzhiyun const u8 *in_key,
158*4882a593Smuzhiyun unsigned int key_len)
159*4882a593Smuzhiyun {
160*4882a593Smuzhiyun struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
161*4882a593Smuzhiyun u8 digest[SHA256_DIGEST_SIZE];
162*4882a593Smuzhiyun int ret;
163*4882a593Smuzhiyun
164*4882a593Smuzhiyun ret = aes_expandkey(&ctx->key1, in_key, key_len);
165*4882a593Smuzhiyun if (ret)
166*4882a593Smuzhiyun return ret;
167*4882a593Smuzhiyun
168*4882a593Smuzhiyun crypto_shash_tfm_digest(ctx->hash, in_key, key_len, digest);
169*4882a593Smuzhiyun
170*4882a593Smuzhiyun return aes_expandkey(&ctx->key2, digest, sizeof(digest));
171*4882a593Smuzhiyun }
172*4882a593Smuzhiyun
ecb_encrypt(struct skcipher_request * req)173*4882a593Smuzhiyun static int __maybe_unused ecb_encrypt(struct skcipher_request *req)
174*4882a593Smuzhiyun {
175*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
176*4882a593Smuzhiyun struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
177*4882a593Smuzhiyun int err, rounds = 6 + ctx->key_length / 4;
178*4882a593Smuzhiyun struct skcipher_walk walk;
179*4882a593Smuzhiyun unsigned int blocks;
180*4882a593Smuzhiyun
181*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
182*4882a593Smuzhiyun
183*4882a593Smuzhiyun while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) {
184*4882a593Smuzhiyun kernel_neon_begin();
185*4882a593Smuzhiyun aes_ecb_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
186*4882a593Smuzhiyun ctx->key_enc, rounds, blocks);
187*4882a593Smuzhiyun kernel_neon_end();
188*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
189*4882a593Smuzhiyun }
190*4882a593Smuzhiyun return err;
191*4882a593Smuzhiyun }
192*4882a593Smuzhiyun
ecb_decrypt(struct skcipher_request * req)193*4882a593Smuzhiyun static int __maybe_unused ecb_decrypt(struct skcipher_request *req)
194*4882a593Smuzhiyun {
195*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
196*4882a593Smuzhiyun struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
197*4882a593Smuzhiyun int err, rounds = 6 + ctx->key_length / 4;
198*4882a593Smuzhiyun struct skcipher_walk walk;
199*4882a593Smuzhiyun unsigned int blocks;
200*4882a593Smuzhiyun
201*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
202*4882a593Smuzhiyun
203*4882a593Smuzhiyun while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) {
204*4882a593Smuzhiyun kernel_neon_begin();
205*4882a593Smuzhiyun aes_ecb_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
206*4882a593Smuzhiyun ctx->key_dec, rounds, blocks);
207*4882a593Smuzhiyun kernel_neon_end();
208*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
209*4882a593Smuzhiyun }
210*4882a593Smuzhiyun return err;
211*4882a593Smuzhiyun }
212*4882a593Smuzhiyun
cbc_encrypt_walk(struct skcipher_request * req,struct skcipher_walk * walk)213*4882a593Smuzhiyun static int cbc_encrypt_walk(struct skcipher_request *req,
214*4882a593Smuzhiyun struct skcipher_walk *walk)
215*4882a593Smuzhiyun {
216*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
217*4882a593Smuzhiyun struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
218*4882a593Smuzhiyun int err = 0, rounds = 6 + ctx->key_length / 4;
219*4882a593Smuzhiyun unsigned int blocks;
220*4882a593Smuzhiyun
221*4882a593Smuzhiyun while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) {
222*4882a593Smuzhiyun kernel_neon_begin();
223*4882a593Smuzhiyun aes_cbc_encrypt(walk->dst.virt.addr, walk->src.virt.addr,
224*4882a593Smuzhiyun ctx->key_enc, rounds, blocks, walk->iv);
225*4882a593Smuzhiyun kernel_neon_end();
226*4882a593Smuzhiyun err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE);
227*4882a593Smuzhiyun }
228*4882a593Smuzhiyun return err;
229*4882a593Smuzhiyun }
230*4882a593Smuzhiyun
cbc_encrypt(struct skcipher_request * req)231*4882a593Smuzhiyun static int __maybe_unused cbc_encrypt(struct skcipher_request *req)
232*4882a593Smuzhiyun {
233*4882a593Smuzhiyun struct skcipher_walk walk;
234*4882a593Smuzhiyun int err;
235*4882a593Smuzhiyun
236*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
237*4882a593Smuzhiyun if (err)
238*4882a593Smuzhiyun return err;
239*4882a593Smuzhiyun return cbc_encrypt_walk(req, &walk);
240*4882a593Smuzhiyun }
241*4882a593Smuzhiyun
cbc_decrypt_walk(struct skcipher_request * req,struct skcipher_walk * walk)242*4882a593Smuzhiyun static int cbc_decrypt_walk(struct skcipher_request *req,
243*4882a593Smuzhiyun struct skcipher_walk *walk)
244*4882a593Smuzhiyun {
245*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
246*4882a593Smuzhiyun struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
247*4882a593Smuzhiyun int err = 0, rounds = 6 + ctx->key_length / 4;
248*4882a593Smuzhiyun unsigned int blocks;
249*4882a593Smuzhiyun
250*4882a593Smuzhiyun while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) {
251*4882a593Smuzhiyun kernel_neon_begin();
252*4882a593Smuzhiyun aes_cbc_decrypt(walk->dst.virt.addr, walk->src.virt.addr,
253*4882a593Smuzhiyun ctx->key_dec, rounds, blocks, walk->iv);
254*4882a593Smuzhiyun kernel_neon_end();
255*4882a593Smuzhiyun err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE);
256*4882a593Smuzhiyun }
257*4882a593Smuzhiyun return err;
258*4882a593Smuzhiyun }
259*4882a593Smuzhiyun
cbc_decrypt(struct skcipher_request * req)260*4882a593Smuzhiyun static int __maybe_unused cbc_decrypt(struct skcipher_request *req)
261*4882a593Smuzhiyun {
262*4882a593Smuzhiyun struct skcipher_walk walk;
263*4882a593Smuzhiyun int err;
264*4882a593Smuzhiyun
265*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
266*4882a593Smuzhiyun if (err)
267*4882a593Smuzhiyun return err;
268*4882a593Smuzhiyun return cbc_decrypt_walk(req, &walk);
269*4882a593Smuzhiyun }
270*4882a593Smuzhiyun
cts_cbc_encrypt(struct skcipher_request * req)271*4882a593Smuzhiyun static int cts_cbc_encrypt(struct skcipher_request *req)
272*4882a593Smuzhiyun {
273*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
274*4882a593Smuzhiyun struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
275*4882a593Smuzhiyun int err, rounds = 6 + ctx->key_length / 4;
276*4882a593Smuzhiyun int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2;
277*4882a593Smuzhiyun struct scatterlist *src = req->src, *dst = req->dst;
278*4882a593Smuzhiyun struct scatterlist sg_src[2], sg_dst[2];
279*4882a593Smuzhiyun struct skcipher_request subreq;
280*4882a593Smuzhiyun struct skcipher_walk walk;
281*4882a593Smuzhiyun
282*4882a593Smuzhiyun skcipher_request_set_tfm(&subreq, tfm);
283*4882a593Smuzhiyun skcipher_request_set_callback(&subreq, skcipher_request_flags(req),
284*4882a593Smuzhiyun NULL, NULL);
285*4882a593Smuzhiyun
286*4882a593Smuzhiyun if (req->cryptlen <= AES_BLOCK_SIZE) {
287*4882a593Smuzhiyun if (req->cryptlen < AES_BLOCK_SIZE)
288*4882a593Smuzhiyun return -EINVAL;
289*4882a593Smuzhiyun cbc_blocks = 1;
290*4882a593Smuzhiyun }
291*4882a593Smuzhiyun
292*4882a593Smuzhiyun if (cbc_blocks > 0) {
293*4882a593Smuzhiyun skcipher_request_set_crypt(&subreq, req->src, req->dst,
294*4882a593Smuzhiyun cbc_blocks * AES_BLOCK_SIZE,
295*4882a593Smuzhiyun req->iv);
296*4882a593Smuzhiyun
297*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, &subreq, false) ?:
298*4882a593Smuzhiyun cbc_encrypt_walk(&subreq, &walk);
299*4882a593Smuzhiyun if (err)
300*4882a593Smuzhiyun return err;
301*4882a593Smuzhiyun
302*4882a593Smuzhiyun if (req->cryptlen == AES_BLOCK_SIZE)
303*4882a593Smuzhiyun return 0;
304*4882a593Smuzhiyun
305*4882a593Smuzhiyun dst = src = scatterwalk_ffwd(sg_src, req->src, subreq.cryptlen);
306*4882a593Smuzhiyun if (req->dst != req->src)
307*4882a593Smuzhiyun dst = scatterwalk_ffwd(sg_dst, req->dst,
308*4882a593Smuzhiyun subreq.cryptlen);
309*4882a593Smuzhiyun }
310*4882a593Smuzhiyun
311*4882a593Smuzhiyun /* handle ciphertext stealing */
312*4882a593Smuzhiyun skcipher_request_set_crypt(&subreq, src, dst,
313*4882a593Smuzhiyun req->cryptlen - cbc_blocks * AES_BLOCK_SIZE,
314*4882a593Smuzhiyun req->iv);
315*4882a593Smuzhiyun
316*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, &subreq, false);
317*4882a593Smuzhiyun if (err)
318*4882a593Smuzhiyun return err;
319*4882a593Smuzhiyun
320*4882a593Smuzhiyun kernel_neon_begin();
321*4882a593Smuzhiyun aes_cbc_cts_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
322*4882a593Smuzhiyun ctx->key_enc, rounds, walk.nbytes, walk.iv);
323*4882a593Smuzhiyun kernel_neon_end();
324*4882a593Smuzhiyun
325*4882a593Smuzhiyun return skcipher_walk_done(&walk, 0);
326*4882a593Smuzhiyun }
327*4882a593Smuzhiyun
cts_cbc_decrypt(struct skcipher_request * req)328*4882a593Smuzhiyun static int cts_cbc_decrypt(struct skcipher_request *req)
329*4882a593Smuzhiyun {
330*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
331*4882a593Smuzhiyun struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
332*4882a593Smuzhiyun int err, rounds = 6 + ctx->key_length / 4;
333*4882a593Smuzhiyun int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2;
334*4882a593Smuzhiyun struct scatterlist *src = req->src, *dst = req->dst;
335*4882a593Smuzhiyun struct scatterlist sg_src[2], sg_dst[2];
336*4882a593Smuzhiyun struct skcipher_request subreq;
337*4882a593Smuzhiyun struct skcipher_walk walk;
338*4882a593Smuzhiyun
339*4882a593Smuzhiyun skcipher_request_set_tfm(&subreq, tfm);
340*4882a593Smuzhiyun skcipher_request_set_callback(&subreq, skcipher_request_flags(req),
341*4882a593Smuzhiyun NULL, NULL);
342*4882a593Smuzhiyun
343*4882a593Smuzhiyun if (req->cryptlen <= AES_BLOCK_SIZE) {
344*4882a593Smuzhiyun if (req->cryptlen < AES_BLOCK_SIZE)
345*4882a593Smuzhiyun return -EINVAL;
346*4882a593Smuzhiyun cbc_blocks = 1;
347*4882a593Smuzhiyun }
348*4882a593Smuzhiyun
349*4882a593Smuzhiyun if (cbc_blocks > 0) {
350*4882a593Smuzhiyun skcipher_request_set_crypt(&subreq, req->src, req->dst,
351*4882a593Smuzhiyun cbc_blocks * AES_BLOCK_SIZE,
352*4882a593Smuzhiyun req->iv);
353*4882a593Smuzhiyun
354*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, &subreq, false) ?:
355*4882a593Smuzhiyun cbc_decrypt_walk(&subreq, &walk);
356*4882a593Smuzhiyun if (err)
357*4882a593Smuzhiyun return err;
358*4882a593Smuzhiyun
359*4882a593Smuzhiyun if (req->cryptlen == AES_BLOCK_SIZE)
360*4882a593Smuzhiyun return 0;
361*4882a593Smuzhiyun
362*4882a593Smuzhiyun dst = src = scatterwalk_ffwd(sg_src, req->src, subreq.cryptlen);
363*4882a593Smuzhiyun if (req->dst != req->src)
364*4882a593Smuzhiyun dst = scatterwalk_ffwd(sg_dst, req->dst,
365*4882a593Smuzhiyun subreq.cryptlen);
366*4882a593Smuzhiyun }
367*4882a593Smuzhiyun
368*4882a593Smuzhiyun /* handle ciphertext stealing */
369*4882a593Smuzhiyun skcipher_request_set_crypt(&subreq, src, dst,
370*4882a593Smuzhiyun req->cryptlen - cbc_blocks * AES_BLOCK_SIZE,
371*4882a593Smuzhiyun req->iv);
372*4882a593Smuzhiyun
373*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, &subreq, false);
374*4882a593Smuzhiyun if (err)
375*4882a593Smuzhiyun return err;
376*4882a593Smuzhiyun
377*4882a593Smuzhiyun kernel_neon_begin();
378*4882a593Smuzhiyun aes_cbc_cts_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
379*4882a593Smuzhiyun ctx->key_dec, rounds, walk.nbytes, walk.iv);
380*4882a593Smuzhiyun kernel_neon_end();
381*4882a593Smuzhiyun
382*4882a593Smuzhiyun return skcipher_walk_done(&walk, 0);
383*4882a593Smuzhiyun }
384*4882a593Smuzhiyun
essiv_cbc_init_tfm(struct crypto_skcipher * tfm)385*4882a593Smuzhiyun static int __maybe_unused essiv_cbc_init_tfm(struct crypto_skcipher *tfm)
386*4882a593Smuzhiyun {
387*4882a593Smuzhiyun struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
388*4882a593Smuzhiyun
389*4882a593Smuzhiyun ctx->hash = crypto_alloc_shash("sha256", 0, 0);
390*4882a593Smuzhiyun
391*4882a593Smuzhiyun return PTR_ERR_OR_ZERO(ctx->hash);
392*4882a593Smuzhiyun }
393*4882a593Smuzhiyun
essiv_cbc_exit_tfm(struct crypto_skcipher * tfm)394*4882a593Smuzhiyun static void __maybe_unused essiv_cbc_exit_tfm(struct crypto_skcipher *tfm)
395*4882a593Smuzhiyun {
396*4882a593Smuzhiyun struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
397*4882a593Smuzhiyun
398*4882a593Smuzhiyun crypto_free_shash(ctx->hash);
399*4882a593Smuzhiyun }
400*4882a593Smuzhiyun
essiv_cbc_encrypt(struct skcipher_request * req)401*4882a593Smuzhiyun static int __maybe_unused essiv_cbc_encrypt(struct skcipher_request *req)
402*4882a593Smuzhiyun {
403*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
404*4882a593Smuzhiyun struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
405*4882a593Smuzhiyun int err, rounds = 6 + ctx->key1.key_length / 4;
406*4882a593Smuzhiyun struct skcipher_walk walk;
407*4882a593Smuzhiyun unsigned int blocks;
408*4882a593Smuzhiyun
409*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
410*4882a593Smuzhiyun
411*4882a593Smuzhiyun blocks = walk.nbytes / AES_BLOCK_SIZE;
412*4882a593Smuzhiyun if (blocks) {
413*4882a593Smuzhiyun kernel_neon_begin();
414*4882a593Smuzhiyun aes_essiv_cbc_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
415*4882a593Smuzhiyun ctx->key1.key_enc, rounds, blocks,
416*4882a593Smuzhiyun req->iv, ctx->key2.key_enc);
417*4882a593Smuzhiyun kernel_neon_end();
418*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
419*4882a593Smuzhiyun }
420*4882a593Smuzhiyun return err ?: cbc_encrypt_walk(req, &walk);
421*4882a593Smuzhiyun }
422*4882a593Smuzhiyun
essiv_cbc_decrypt(struct skcipher_request * req)423*4882a593Smuzhiyun static int __maybe_unused essiv_cbc_decrypt(struct skcipher_request *req)
424*4882a593Smuzhiyun {
425*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
426*4882a593Smuzhiyun struct crypto_aes_essiv_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
427*4882a593Smuzhiyun int err, rounds = 6 + ctx->key1.key_length / 4;
428*4882a593Smuzhiyun struct skcipher_walk walk;
429*4882a593Smuzhiyun unsigned int blocks;
430*4882a593Smuzhiyun
431*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
432*4882a593Smuzhiyun
433*4882a593Smuzhiyun blocks = walk.nbytes / AES_BLOCK_SIZE;
434*4882a593Smuzhiyun if (blocks) {
435*4882a593Smuzhiyun kernel_neon_begin();
436*4882a593Smuzhiyun aes_essiv_cbc_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
437*4882a593Smuzhiyun ctx->key1.key_dec, rounds, blocks,
438*4882a593Smuzhiyun req->iv, ctx->key2.key_enc);
439*4882a593Smuzhiyun kernel_neon_end();
440*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
441*4882a593Smuzhiyun }
442*4882a593Smuzhiyun return err ?: cbc_decrypt_walk(req, &walk);
443*4882a593Smuzhiyun }
444*4882a593Smuzhiyun
ctr_encrypt(struct skcipher_request * req)445*4882a593Smuzhiyun static int __maybe_unused ctr_encrypt(struct skcipher_request *req)
446*4882a593Smuzhiyun {
447*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
448*4882a593Smuzhiyun struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
449*4882a593Smuzhiyun int err, rounds = 6 + ctx->key_length / 4;
450*4882a593Smuzhiyun struct skcipher_walk walk;
451*4882a593Smuzhiyun int blocks;
452*4882a593Smuzhiyun
453*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
454*4882a593Smuzhiyun
455*4882a593Smuzhiyun while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) {
456*4882a593Smuzhiyun kernel_neon_begin();
457*4882a593Smuzhiyun aes_ctr_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
458*4882a593Smuzhiyun ctx->key_enc, rounds, blocks, walk.iv);
459*4882a593Smuzhiyun kernel_neon_end();
460*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
461*4882a593Smuzhiyun }
462*4882a593Smuzhiyun if (walk.nbytes) {
463*4882a593Smuzhiyun u8 __aligned(8) tail[AES_BLOCK_SIZE];
464*4882a593Smuzhiyun unsigned int nbytes = walk.nbytes;
465*4882a593Smuzhiyun u8 *tdst = walk.dst.virt.addr;
466*4882a593Smuzhiyun u8 *tsrc = walk.src.virt.addr;
467*4882a593Smuzhiyun
468*4882a593Smuzhiyun /*
469*4882a593Smuzhiyun * Tell aes_ctr_encrypt() to process a tail block.
470*4882a593Smuzhiyun */
471*4882a593Smuzhiyun blocks = -1;
472*4882a593Smuzhiyun
473*4882a593Smuzhiyun kernel_neon_begin();
474*4882a593Smuzhiyun aes_ctr_encrypt(tail, NULL, ctx->key_enc, rounds,
475*4882a593Smuzhiyun blocks, walk.iv);
476*4882a593Smuzhiyun kernel_neon_end();
477*4882a593Smuzhiyun crypto_xor_cpy(tdst, tsrc, tail, nbytes);
478*4882a593Smuzhiyun err = skcipher_walk_done(&walk, 0);
479*4882a593Smuzhiyun }
480*4882a593Smuzhiyun
481*4882a593Smuzhiyun return err;
482*4882a593Smuzhiyun }
483*4882a593Smuzhiyun
xts_encrypt(struct skcipher_request * req)484*4882a593Smuzhiyun static int __maybe_unused xts_encrypt(struct skcipher_request *req)
485*4882a593Smuzhiyun {
486*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
487*4882a593Smuzhiyun struct crypto_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
488*4882a593Smuzhiyun int err, first, rounds = 6 + ctx->key1.key_length / 4;
489*4882a593Smuzhiyun int tail = req->cryptlen % AES_BLOCK_SIZE;
490*4882a593Smuzhiyun struct scatterlist sg_src[2], sg_dst[2];
491*4882a593Smuzhiyun struct skcipher_request subreq;
492*4882a593Smuzhiyun struct scatterlist *src, *dst;
493*4882a593Smuzhiyun struct skcipher_walk walk;
494*4882a593Smuzhiyun
495*4882a593Smuzhiyun if (req->cryptlen < AES_BLOCK_SIZE)
496*4882a593Smuzhiyun return -EINVAL;
497*4882a593Smuzhiyun
498*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
499*4882a593Smuzhiyun
500*4882a593Smuzhiyun if (unlikely(tail > 0 && walk.nbytes < walk.total)) {
501*4882a593Smuzhiyun int xts_blocks = DIV_ROUND_UP(req->cryptlen,
502*4882a593Smuzhiyun AES_BLOCK_SIZE) - 2;
503*4882a593Smuzhiyun
504*4882a593Smuzhiyun skcipher_walk_abort(&walk);
505*4882a593Smuzhiyun
506*4882a593Smuzhiyun skcipher_request_set_tfm(&subreq, tfm);
507*4882a593Smuzhiyun skcipher_request_set_callback(&subreq,
508*4882a593Smuzhiyun skcipher_request_flags(req),
509*4882a593Smuzhiyun NULL, NULL);
510*4882a593Smuzhiyun skcipher_request_set_crypt(&subreq, req->src, req->dst,
511*4882a593Smuzhiyun xts_blocks * AES_BLOCK_SIZE,
512*4882a593Smuzhiyun req->iv);
513*4882a593Smuzhiyun req = &subreq;
514*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
515*4882a593Smuzhiyun } else {
516*4882a593Smuzhiyun tail = 0;
517*4882a593Smuzhiyun }
518*4882a593Smuzhiyun
519*4882a593Smuzhiyun for (first = 1; walk.nbytes >= AES_BLOCK_SIZE; first = 0) {
520*4882a593Smuzhiyun int nbytes = walk.nbytes;
521*4882a593Smuzhiyun
522*4882a593Smuzhiyun if (walk.nbytes < walk.total)
523*4882a593Smuzhiyun nbytes &= ~(AES_BLOCK_SIZE - 1);
524*4882a593Smuzhiyun
525*4882a593Smuzhiyun kernel_neon_begin();
526*4882a593Smuzhiyun aes_xts_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
527*4882a593Smuzhiyun ctx->key1.key_enc, rounds, nbytes,
528*4882a593Smuzhiyun ctx->key2.key_enc, walk.iv, first);
529*4882a593Smuzhiyun kernel_neon_end();
530*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
531*4882a593Smuzhiyun }
532*4882a593Smuzhiyun
533*4882a593Smuzhiyun if (err || likely(!tail))
534*4882a593Smuzhiyun return err;
535*4882a593Smuzhiyun
536*4882a593Smuzhiyun dst = src = scatterwalk_ffwd(sg_src, req->src, req->cryptlen);
537*4882a593Smuzhiyun if (req->dst != req->src)
538*4882a593Smuzhiyun dst = scatterwalk_ffwd(sg_dst, req->dst, req->cryptlen);
539*4882a593Smuzhiyun
540*4882a593Smuzhiyun skcipher_request_set_crypt(req, src, dst, AES_BLOCK_SIZE + tail,
541*4882a593Smuzhiyun req->iv);
542*4882a593Smuzhiyun
543*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, &subreq, false);
544*4882a593Smuzhiyun if (err)
545*4882a593Smuzhiyun return err;
546*4882a593Smuzhiyun
547*4882a593Smuzhiyun kernel_neon_begin();
548*4882a593Smuzhiyun aes_xts_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
549*4882a593Smuzhiyun ctx->key1.key_enc, rounds, walk.nbytes,
550*4882a593Smuzhiyun ctx->key2.key_enc, walk.iv, first);
551*4882a593Smuzhiyun kernel_neon_end();
552*4882a593Smuzhiyun
553*4882a593Smuzhiyun return skcipher_walk_done(&walk, 0);
554*4882a593Smuzhiyun }
555*4882a593Smuzhiyun
xts_decrypt(struct skcipher_request * req)556*4882a593Smuzhiyun static int __maybe_unused xts_decrypt(struct skcipher_request *req)
557*4882a593Smuzhiyun {
558*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
559*4882a593Smuzhiyun struct crypto_aes_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
560*4882a593Smuzhiyun int err, first, rounds = 6 + ctx->key1.key_length / 4;
561*4882a593Smuzhiyun int tail = req->cryptlen % AES_BLOCK_SIZE;
562*4882a593Smuzhiyun struct scatterlist sg_src[2], sg_dst[2];
563*4882a593Smuzhiyun struct skcipher_request subreq;
564*4882a593Smuzhiyun struct scatterlist *src, *dst;
565*4882a593Smuzhiyun struct skcipher_walk walk;
566*4882a593Smuzhiyun
567*4882a593Smuzhiyun if (req->cryptlen < AES_BLOCK_SIZE)
568*4882a593Smuzhiyun return -EINVAL;
569*4882a593Smuzhiyun
570*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
571*4882a593Smuzhiyun
572*4882a593Smuzhiyun if (unlikely(tail > 0 && walk.nbytes < walk.total)) {
573*4882a593Smuzhiyun int xts_blocks = DIV_ROUND_UP(req->cryptlen,
574*4882a593Smuzhiyun AES_BLOCK_SIZE) - 2;
575*4882a593Smuzhiyun
576*4882a593Smuzhiyun skcipher_walk_abort(&walk);
577*4882a593Smuzhiyun
578*4882a593Smuzhiyun skcipher_request_set_tfm(&subreq, tfm);
579*4882a593Smuzhiyun skcipher_request_set_callback(&subreq,
580*4882a593Smuzhiyun skcipher_request_flags(req),
581*4882a593Smuzhiyun NULL, NULL);
582*4882a593Smuzhiyun skcipher_request_set_crypt(&subreq, req->src, req->dst,
583*4882a593Smuzhiyun xts_blocks * AES_BLOCK_SIZE,
584*4882a593Smuzhiyun req->iv);
585*4882a593Smuzhiyun req = &subreq;
586*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
587*4882a593Smuzhiyun } else {
588*4882a593Smuzhiyun tail = 0;
589*4882a593Smuzhiyun }
590*4882a593Smuzhiyun
591*4882a593Smuzhiyun for (first = 1; walk.nbytes >= AES_BLOCK_SIZE; first = 0) {
592*4882a593Smuzhiyun int nbytes = walk.nbytes;
593*4882a593Smuzhiyun
594*4882a593Smuzhiyun if (walk.nbytes < walk.total)
595*4882a593Smuzhiyun nbytes &= ~(AES_BLOCK_SIZE - 1);
596*4882a593Smuzhiyun
597*4882a593Smuzhiyun kernel_neon_begin();
598*4882a593Smuzhiyun aes_xts_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
599*4882a593Smuzhiyun ctx->key1.key_dec, rounds, nbytes,
600*4882a593Smuzhiyun ctx->key2.key_enc, walk.iv, first);
601*4882a593Smuzhiyun kernel_neon_end();
602*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
603*4882a593Smuzhiyun }
604*4882a593Smuzhiyun
605*4882a593Smuzhiyun if (err || likely(!tail))
606*4882a593Smuzhiyun return err;
607*4882a593Smuzhiyun
608*4882a593Smuzhiyun dst = src = scatterwalk_ffwd(sg_src, req->src, req->cryptlen);
609*4882a593Smuzhiyun if (req->dst != req->src)
610*4882a593Smuzhiyun dst = scatterwalk_ffwd(sg_dst, req->dst, req->cryptlen);
611*4882a593Smuzhiyun
612*4882a593Smuzhiyun skcipher_request_set_crypt(req, src, dst, AES_BLOCK_SIZE + tail,
613*4882a593Smuzhiyun req->iv);
614*4882a593Smuzhiyun
615*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, &subreq, false);
616*4882a593Smuzhiyun if (err)
617*4882a593Smuzhiyun return err;
618*4882a593Smuzhiyun
619*4882a593Smuzhiyun
620*4882a593Smuzhiyun kernel_neon_begin();
621*4882a593Smuzhiyun aes_xts_decrypt(walk.dst.virt.addr, walk.src.virt.addr,
622*4882a593Smuzhiyun ctx->key1.key_dec, rounds, walk.nbytes,
623*4882a593Smuzhiyun ctx->key2.key_enc, walk.iv, first);
624*4882a593Smuzhiyun kernel_neon_end();
625*4882a593Smuzhiyun
626*4882a593Smuzhiyun return skcipher_walk_done(&walk, 0);
627*4882a593Smuzhiyun }
628*4882a593Smuzhiyun
629*4882a593Smuzhiyun static struct skcipher_alg aes_algs[] = { {
630*4882a593Smuzhiyun #if defined(USE_V8_CRYPTO_EXTENSIONS) || !IS_ENABLED(CONFIG_CRYPTO_AES_ARM64_BS)
631*4882a593Smuzhiyun .base = {
632*4882a593Smuzhiyun .cra_name = "ecb(aes)",
633*4882a593Smuzhiyun .cra_driver_name = "ecb-aes-" MODE,
634*4882a593Smuzhiyun .cra_priority = PRIO,
635*4882a593Smuzhiyun .cra_blocksize = AES_BLOCK_SIZE,
636*4882a593Smuzhiyun .cra_ctxsize = sizeof(struct crypto_aes_ctx),
637*4882a593Smuzhiyun .cra_module = THIS_MODULE,
638*4882a593Smuzhiyun },
639*4882a593Smuzhiyun .min_keysize = AES_MIN_KEY_SIZE,
640*4882a593Smuzhiyun .max_keysize = AES_MAX_KEY_SIZE,
641*4882a593Smuzhiyun .setkey = skcipher_aes_setkey,
642*4882a593Smuzhiyun .encrypt = ecb_encrypt,
643*4882a593Smuzhiyun .decrypt = ecb_decrypt,
644*4882a593Smuzhiyun }, {
645*4882a593Smuzhiyun .base = {
646*4882a593Smuzhiyun .cra_name = "cbc(aes)",
647*4882a593Smuzhiyun .cra_driver_name = "cbc-aes-" MODE,
648*4882a593Smuzhiyun .cra_priority = PRIO,
649*4882a593Smuzhiyun .cra_blocksize = AES_BLOCK_SIZE,
650*4882a593Smuzhiyun .cra_ctxsize = sizeof(struct crypto_aes_ctx),
651*4882a593Smuzhiyun .cra_module = THIS_MODULE,
652*4882a593Smuzhiyun },
653*4882a593Smuzhiyun .min_keysize = AES_MIN_KEY_SIZE,
654*4882a593Smuzhiyun .max_keysize = AES_MAX_KEY_SIZE,
655*4882a593Smuzhiyun .ivsize = AES_BLOCK_SIZE,
656*4882a593Smuzhiyun .setkey = skcipher_aes_setkey,
657*4882a593Smuzhiyun .encrypt = cbc_encrypt,
658*4882a593Smuzhiyun .decrypt = cbc_decrypt,
659*4882a593Smuzhiyun }, {
660*4882a593Smuzhiyun .base = {
661*4882a593Smuzhiyun .cra_name = "ctr(aes)",
662*4882a593Smuzhiyun .cra_driver_name = "ctr-aes-" MODE,
663*4882a593Smuzhiyun .cra_priority = PRIO,
664*4882a593Smuzhiyun .cra_blocksize = 1,
665*4882a593Smuzhiyun .cra_ctxsize = sizeof(struct crypto_aes_ctx),
666*4882a593Smuzhiyun .cra_module = THIS_MODULE,
667*4882a593Smuzhiyun },
668*4882a593Smuzhiyun .min_keysize = AES_MIN_KEY_SIZE,
669*4882a593Smuzhiyun .max_keysize = AES_MAX_KEY_SIZE,
670*4882a593Smuzhiyun .ivsize = AES_BLOCK_SIZE,
671*4882a593Smuzhiyun .chunksize = AES_BLOCK_SIZE,
672*4882a593Smuzhiyun .setkey = skcipher_aes_setkey,
673*4882a593Smuzhiyun .encrypt = ctr_encrypt,
674*4882a593Smuzhiyun .decrypt = ctr_encrypt,
675*4882a593Smuzhiyun }, {
676*4882a593Smuzhiyun .base = {
677*4882a593Smuzhiyun .cra_name = "xts(aes)",
678*4882a593Smuzhiyun .cra_driver_name = "xts-aes-" MODE,
679*4882a593Smuzhiyun .cra_priority = PRIO,
680*4882a593Smuzhiyun .cra_blocksize = AES_BLOCK_SIZE,
681*4882a593Smuzhiyun .cra_ctxsize = sizeof(struct crypto_aes_xts_ctx),
682*4882a593Smuzhiyun .cra_module = THIS_MODULE,
683*4882a593Smuzhiyun },
684*4882a593Smuzhiyun .min_keysize = 2 * AES_MIN_KEY_SIZE,
685*4882a593Smuzhiyun .max_keysize = 2 * AES_MAX_KEY_SIZE,
686*4882a593Smuzhiyun .ivsize = AES_BLOCK_SIZE,
687*4882a593Smuzhiyun .walksize = 2 * AES_BLOCK_SIZE,
688*4882a593Smuzhiyun .setkey = xts_set_key,
689*4882a593Smuzhiyun .encrypt = xts_encrypt,
690*4882a593Smuzhiyun .decrypt = xts_decrypt,
691*4882a593Smuzhiyun }, {
692*4882a593Smuzhiyun #endif
693*4882a593Smuzhiyun .base = {
694*4882a593Smuzhiyun .cra_name = "cts(cbc(aes))",
695*4882a593Smuzhiyun .cra_driver_name = "cts-cbc-aes-" MODE,
696*4882a593Smuzhiyun .cra_priority = PRIO,
697*4882a593Smuzhiyun .cra_blocksize = AES_BLOCK_SIZE,
698*4882a593Smuzhiyun .cra_ctxsize = sizeof(struct crypto_aes_ctx),
699*4882a593Smuzhiyun .cra_module = THIS_MODULE,
700*4882a593Smuzhiyun },
701*4882a593Smuzhiyun .min_keysize = AES_MIN_KEY_SIZE,
702*4882a593Smuzhiyun .max_keysize = AES_MAX_KEY_SIZE,
703*4882a593Smuzhiyun .ivsize = AES_BLOCK_SIZE,
704*4882a593Smuzhiyun .walksize = 2 * AES_BLOCK_SIZE,
705*4882a593Smuzhiyun .setkey = skcipher_aes_setkey,
706*4882a593Smuzhiyun .encrypt = cts_cbc_encrypt,
707*4882a593Smuzhiyun .decrypt = cts_cbc_decrypt,
708*4882a593Smuzhiyun }, {
709*4882a593Smuzhiyun .base = {
710*4882a593Smuzhiyun .cra_name = "essiv(cbc(aes),sha256)",
711*4882a593Smuzhiyun .cra_driver_name = "essiv-cbc-aes-sha256-" MODE,
712*4882a593Smuzhiyun .cra_priority = PRIO + 1,
713*4882a593Smuzhiyun .cra_blocksize = AES_BLOCK_SIZE,
714*4882a593Smuzhiyun .cra_ctxsize = sizeof(struct crypto_aes_essiv_cbc_ctx),
715*4882a593Smuzhiyun .cra_module = THIS_MODULE,
716*4882a593Smuzhiyun },
717*4882a593Smuzhiyun .min_keysize = AES_MIN_KEY_SIZE,
718*4882a593Smuzhiyun .max_keysize = AES_MAX_KEY_SIZE,
719*4882a593Smuzhiyun .ivsize = AES_BLOCK_SIZE,
720*4882a593Smuzhiyun .setkey = essiv_cbc_set_key,
721*4882a593Smuzhiyun .encrypt = essiv_cbc_encrypt,
722*4882a593Smuzhiyun .decrypt = essiv_cbc_decrypt,
723*4882a593Smuzhiyun .init = essiv_cbc_init_tfm,
724*4882a593Smuzhiyun .exit = essiv_cbc_exit_tfm,
725*4882a593Smuzhiyun } };
726*4882a593Smuzhiyun
cbcmac_setkey(struct crypto_shash * tfm,const u8 * in_key,unsigned int key_len)727*4882a593Smuzhiyun static int cbcmac_setkey(struct crypto_shash *tfm, const u8 *in_key,
728*4882a593Smuzhiyun unsigned int key_len)
729*4882a593Smuzhiyun {
730*4882a593Smuzhiyun struct mac_tfm_ctx *ctx = crypto_shash_ctx(tfm);
731*4882a593Smuzhiyun
732*4882a593Smuzhiyun return aes_expandkey(&ctx->key, in_key, key_len);
733*4882a593Smuzhiyun }
734*4882a593Smuzhiyun
cmac_gf128_mul_by_x(be128 * y,const be128 * x)735*4882a593Smuzhiyun static void cmac_gf128_mul_by_x(be128 *y, const be128 *x)
736*4882a593Smuzhiyun {
737*4882a593Smuzhiyun u64 a = be64_to_cpu(x->a);
738*4882a593Smuzhiyun u64 b = be64_to_cpu(x->b);
739*4882a593Smuzhiyun
740*4882a593Smuzhiyun y->a = cpu_to_be64((a << 1) | (b >> 63));
741*4882a593Smuzhiyun y->b = cpu_to_be64((b << 1) ^ ((a >> 63) ? 0x87 : 0));
742*4882a593Smuzhiyun }
743*4882a593Smuzhiyun
cmac_setkey(struct crypto_shash * tfm,const u8 * in_key,unsigned int key_len)744*4882a593Smuzhiyun static int cmac_setkey(struct crypto_shash *tfm, const u8 *in_key,
745*4882a593Smuzhiyun unsigned int key_len)
746*4882a593Smuzhiyun {
747*4882a593Smuzhiyun struct mac_tfm_ctx *ctx = crypto_shash_ctx(tfm);
748*4882a593Smuzhiyun be128 *consts = (be128 *)ctx->consts;
749*4882a593Smuzhiyun int rounds = 6 + key_len / 4;
750*4882a593Smuzhiyun int err;
751*4882a593Smuzhiyun
752*4882a593Smuzhiyun err = cbcmac_setkey(tfm, in_key, key_len);
753*4882a593Smuzhiyun if (err)
754*4882a593Smuzhiyun return err;
755*4882a593Smuzhiyun
756*4882a593Smuzhiyun /* encrypt the zero vector */
757*4882a593Smuzhiyun kernel_neon_begin();
758*4882a593Smuzhiyun aes_ecb_encrypt(ctx->consts, (u8[AES_BLOCK_SIZE]){}, ctx->key.key_enc,
759*4882a593Smuzhiyun rounds, 1);
760*4882a593Smuzhiyun kernel_neon_end();
761*4882a593Smuzhiyun
762*4882a593Smuzhiyun cmac_gf128_mul_by_x(consts, consts);
763*4882a593Smuzhiyun cmac_gf128_mul_by_x(consts + 1, consts);
764*4882a593Smuzhiyun
765*4882a593Smuzhiyun return 0;
766*4882a593Smuzhiyun }
767*4882a593Smuzhiyun
xcbc_setkey(struct crypto_shash * tfm,const u8 * in_key,unsigned int key_len)768*4882a593Smuzhiyun static int xcbc_setkey(struct crypto_shash *tfm, const u8 *in_key,
769*4882a593Smuzhiyun unsigned int key_len)
770*4882a593Smuzhiyun {
771*4882a593Smuzhiyun static u8 const ks[3][AES_BLOCK_SIZE] = {
772*4882a593Smuzhiyun { [0 ... AES_BLOCK_SIZE - 1] = 0x1 },
773*4882a593Smuzhiyun { [0 ... AES_BLOCK_SIZE - 1] = 0x2 },
774*4882a593Smuzhiyun { [0 ... AES_BLOCK_SIZE - 1] = 0x3 },
775*4882a593Smuzhiyun };
776*4882a593Smuzhiyun
777*4882a593Smuzhiyun struct mac_tfm_ctx *ctx = crypto_shash_ctx(tfm);
778*4882a593Smuzhiyun int rounds = 6 + key_len / 4;
779*4882a593Smuzhiyun u8 key[AES_BLOCK_SIZE];
780*4882a593Smuzhiyun int err;
781*4882a593Smuzhiyun
782*4882a593Smuzhiyun err = cbcmac_setkey(tfm, in_key, key_len);
783*4882a593Smuzhiyun if (err)
784*4882a593Smuzhiyun return err;
785*4882a593Smuzhiyun
786*4882a593Smuzhiyun kernel_neon_begin();
787*4882a593Smuzhiyun aes_ecb_encrypt(key, ks[0], ctx->key.key_enc, rounds, 1);
788*4882a593Smuzhiyun aes_ecb_encrypt(ctx->consts, ks[1], ctx->key.key_enc, rounds, 2);
789*4882a593Smuzhiyun kernel_neon_end();
790*4882a593Smuzhiyun
791*4882a593Smuzhiyun return cbcmac_setkey(tfm, key, sizeof(key));
792*4882a593Smuzhiyun }
793*4882a593Smuzhiyun
mac_init(struct shash_desc * desc)794*4882a593Smuzhiyun static int mac_init(struct shash_desc *desc)
795*4882a593Smuzhiyun {
796*4882a593Smuzhiyun struct mac_desc_ctx *ctx = shash_desc_ctx(desc);
797*4882a593Smuzhiyun
798*4882a593Smuzhiyun memset(ctx->dg, 0, AES_BLOCK_SIZE);
799*4882a593Smuzhiyun ctx->len = 0;
800*4882a593Smuzhiyun
801*4882a593Smuzhiyun return 0;
802*4882a593Smuzhiyun }
803*4882a593Smuzhiyun
mac_do_update(struct crypto_aes_ctx * ctx,u8 const in[],int blocks,u8 dg[],int enc_before,int enc_after)804*4882a593Smuzhiyun static void mac_do_update(struct crypto_aes_ctx *ctx, u8 const in[], int blocks,
805*4882a593Smuzhiyun u8 dg[], int enc_before, int enc_after)
806*4882a593Smuzhiyun {
807*4882a593Smuzhiyun int rounds = 6 + ctx->key_length / 4;
808*4882a593Smuzhiyun
809*4882a593Smuzhiyun if (crypto_simd_usable()) {
810*4882a593Smuzhiyun int rem;
811*4882a593Smuzhiyun
812*4882a593Smuzhiyun do {
813*4882a593Smuzhiyun kernel_neon_begin();
814*4882a593Smuzhiyun rem = aes_mac_update(in, ctx->key_enc, rounds, blocks,
815*4882a593Smuzhiyun dg, enc_before, enc_after);
816*4882a593Smuzhiyun kernel_neon_end();
817*4882a593Smuzhiyun in += (blocks - rem) * AES_BLOCK_SIZE;
818*4882a593Smuzhiyun blocks = rem;
819*4882a593Smuzhiyun enc_before = 0;
820*4882a593Smuzhiyun } while (blocks);
821*4882a593Smuzhiyun } else {
822*4882a593Smuzhiyun if (enc_before)
823*4882a593Smuzhiyun aes_encrypt(ctx, dg, dg);
824*4882a593Smuzhiyun
825*4882a593Smuzhiyun while (blocks--) {
826*4882a593Smuzhiyun crypto_xor(dg, in, AES_BLOCK_SIZE);
827*4882a593Smuzhiyun in += AES_BLOCK_SIZE;
828*4882a593Smuzhiyun
829*4882a593Smuzhiyun if (blocks || enc_after)
830*4882a593Smuzhiyun aes_encrypt(ctx, dg, dg);
831*4882a593Smuzhiyun }
832*4882a593Smuzhiyun }
833*4882a593Smuzhiyun }
834*4882a593Smuzhiyun
mac_update(struct shash_desc * desc,const u8 * p,unsigned int len)835*4882a593Smuzhiyun static int mac_update(struct shash_desc *desc, const u8 *p, unsigned int len)
836*4882a593Smuzhiyun {
837*4882a593Smuzhiyun struct mac_tfm_ctx *tctx = crypto_shash_ctx(desc->tfm);
838*4882a593Smuzhiyun struct mac_desc_ctx *ctx = shash_desc_ctx(desc);
839*4882a593Smuzhiyun
840*4882a593Smuzhiyun while (len > 0) {
841*4882a593Smuzhiyun unsigned int l;
842*4882a593Smuzhiyun
843*4882a593Smuzhiyun if ((ctx->len % AES_BLOCK_SIZE) == 0 &&
844*4882a593Smuzhiyun (ctx->len + len) > AES_BLOCK_SIZE) {
845*4882a593Smuzhiyun
846*4882a593Smuzhiyun int blocks = len / AES_BLOCK_SIZE;
847*4882a593Smuzhiyun
848*4882a593Smuzhiyun len %= AES_BLOCK_SIZE;
849*4882a593Smuzhiyun
850*4882a593Smuzhiyun mac_do_update(&tctx->key, p, blocks, ctx->dg,
851*4882a593Smuzhiyun (ctx->len != 0), (len != 0));
852*4882a593Smuzhiyun
853*4882a593Smuzhiyun p += blocks * AES_BLOCK_SIZE;
854*4882a593Smuzhiyun
855*4882a593Smuzhiyun if (!len) {
856*4882a593Smuzhiyun ctx->len = AES_BLOCK_SIZE;
857*4882a593Smuzhiyun break;
858*4882a593Smuzhiyun }
859*4882a593Smuzhiyun ctx->len = 0;
860*4882a593Smuzhiyun }
861*4882a593Smuzhiyun
862*4882a593Smuzhiyun l = min(len, AES_BLOCK_SIZE - ctx->len);
863*4882a593Smuzhiyun
864*4882a593Smuzhiyun if (l <= AES_BLOCK_SIZE) {
865*4882a593Smuzhiyun crypto_xor(ctx->dg + ctx->len, p, l);
866*4882a593Smuzhiyun ctx->len += l;
867*4882a593Smuzhiyun len -= l;
868*4882a593Smuzhiyun p += l;
869*4882a593Smuzhiyun }
870*4882a593Smuzhiyun }
871*4882a593Smuzhiyun
872*4882a593Smuzhiyun return 0;
873*4882a593Smuzhiyun }
874*4882a593Smuzhiyun
cbcmac_final(struct shash_desc * desc,u8 * out)875*4882a593Smuzhiyun static int cbcmac_final(struct shash_desc *desc, u8 *out)
876*4882a593Smuzhiyun {
877*4882a593Smuzhiyun struct mac_tfm_ctx *tctx = crypto_shash_ctx(desc->tfm);
878*4882a593Smuzhiyun struct mac_desc_ctx *ctx = shash_desc_ctx(desc);
879*4882a593Smuzhiyun
880*4882a593Smuzhiyun mac_do_update(&tctx->key, NULL, 0, ctx->dg, (ctx->len != 0), 0);
881*4882a593Smuzhiyun
882*4882a593Smuzhiyun memcpy(out, ctx->dg, AES_BLOCK_SIZE);
883*4882a593Smuzhiyun
884*4882a593Smuzhiyun return 0;
885*4882a593Smuzhiyun }
886*4882a593Smuzhiyun
cmac_final(struct shash_desc * desc,u8 * out)887*4882a593Smuzhiyun static int cmac_final(struct shash_desc *desc, u8 *out)
888*4882a593Smuzhiyun {
889*4882a593Smuzhiyun struct mac_tfm_ctx *tctx = crypto_shash_ctx(desc->tfm);
890*4882a593Smuzhiyun struct mac_desc_ctx *ctx = shash_desc_ctx(desc);
891*4882a593Smuzhiyun u8 *consts = tctx->consts;
892*4882a593Smuzhiyun
893*4882a593Smuzhiyun if (ctx->len != AES_BLOCK_SIZE) {
894*4882a593Smuzhiyun ctx->dg[ctx->len] ^= 0x80;
895*4882a593Smuzhiyun consts += AES_BLOCK_SIZE;
896*4882a593Smuzhiyun }
897*4882a593Smuzhiyun
898*4882a593Smuzhiyun mac_do_update(&tctx->key, consts, 1, ctx->dg, 0, 1);
899*4882a593Smuzhiyun
900*4882a593Smuzhiyun memcpy(out, ctx->dg, AES_BLOCK_SIZE);
901*4882a593Smuzhiyun
902*4882a593Smuzhiyun return 0;
903*4882a593Smuzhiyun }
904*4882a593Smuzhiyun
905*4882a593Smuzhiyun static struct shash_alg mac_algs[] = { {
906*4882a593Smuzhiyun .base.cra_name = "cmac(aes)",
907*4882a593Smuzhiyun .base.cra_driver_name = "cmac-aes-" MODE,
908*4882a593Smuzhiyun .base.cra_priority = PRIO,
909*4882a593Smuzhiyun .base.cra_blocksize = AES_BLOCK_SIZE,
910*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct mac_tfm_ctx) +
911*4882a593Smuzhiyun 2 * AES_BLOCK_SIZE,
912*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
913*4882a593Smuzhiyun
914*4882a593Smuzhiyun .digestsize = AES_BLOCK_SIZE,
915*4882a593Smuzhiyun .init = mac_init,
916*4882a593Smuzhiyun .update = mac_update,
917*4882a593Smuzhiyun .final = cmac_final,
918*4882a593Smuzhiyun .setkey = cmac_setkey,
919*4882a593Smuzhiyun .descsize = sizeof(struct mac_desc_ctx),
920*4882a593Smuzhiyun }, {
921*4882a593Smuzhiyun .base.cra_name = "xcbc(aes)",
922*4882a593Smuzhiyun .base.cra_driver_name = "xcbc-aes-" MODE,
923*4882a593Smuzhiyun .base.cra_priority = PRIO,
924*4882a593Smuzhiyun .base.cra_blocksize = AES_BLOCK_SIZE,
925*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct mac_tfm_ctx) +
926*4882a593Smuzhiyun 2 * AES_BLOCK_SIZE,
927*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
928*4882a593Smuzhiyun
929*4882a593Smuzhiyun .digestsize = AES_BLOCK_SIZE,
930*4882a593Smuzhiyun .init = mac_init,
931*4882a593Smuzhiyun .update = mac_update,
932*4882a593Smuzhiyun .final = cmac_final,
933*4882a593Smuzhiyun .setkey = xcbc_setkey,
934*4882a593Smuzhiyun .descsize = sizeof(struct mac_desc_ctx),
935*4882a593Smuzhiyun }, {
936*4882a593Smuzhiyun .base.cra_name = "cbcmac(aes)",
937*4882a593Smuzhiyun .base.cra_driver_name = "cbcmac-aes-" MODE,
938*4882a593Smuzhiyun .base.cra_priority = PRIO,
939*4882a593Smuzhiyun .base.cra_blocksize = 1,
940*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct mac_tfm_ctx),
941*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
942*4882a593Smuzhiyun
943*4882a593Smuzhiyun .digestsize = AES_BLOCK_SIZE,
944*4882a593Smuzhiyun .init = mac_init,
945*4882a593Smuzhiyun .update = mac_update,
946*4882a593Smuzhiyun .final = cbcmac_final,
947*4882a593Smuzhiyun .setkey = cbcmac_setkey,
948*4882a593Smuzhiyun .descsize = sizeof(struct mac_desc_ctx),
949*4882a593Smuzhiyun } };
950*4882a593Smuzhiyun
aes_exit(void)951*4882a593Smuzhiyun static void aes_exit(void)
952*4882a593Smuzhiyun {
953*4882a593Smuzhiyun crypto_unregister_shashes(mac_algs, ARRAY_SIZE(mac_algs));
954*4882a593Smuzhiyun crypto_unregister_skciphers(aes_algs, ARRAY_SIZE(aes_algs));
955*4882a593Smuzhiyun }
956*4882a593Smuzhiyun
aes_init(void)957*4882a593Smuzhiyun static int __init aes_init(void)
958*4882a593Smuzhiyun {
959*4882a593Smuzhiyun int err;
960*4882a593Smuzhiyun
961*4882a593Smuzhiyun err = crypto_register_skciphers(aes_algs, ARRAY_SIZE(aes_algs));
962*4882a593Smuzhiyun if (err)
963*4882a593Smuzhiyun return err;
964*4882a593Smuzhiyun
965*4882a593Smuzhiyun err = crypto_register_shashes(mac_algs, ARRAY_SIZE(mac_algs));
966*4882a593Smuzhiyun if (err)
967*4882a593Smuzhiyun goto unregister_ciphers;
968*4882a593Smuzhiyun
969*4882a593Smuzhiyun return 0;
970*4882a593Smuzhiyun
971*4882a593Smuzhiyun unregister_ciphers:
972*4882a593Smuzhiyun crypto_unregister_skciphers(aes_algs, ARRAY_SIZE(aes_algs));
973*4882a593Smuzhiyun return err;
974*4882a593Smuzhiyun }
975*4882a593Smuzhiyun
976*4882a593Smuzhiyun #ifdef USE_V8_CRYPTO_EXTENSIONS
977*4882a593Smuzhiyun module_cpu_feature_match(AES, aes_init);
978*4882a593Smuzhiyun #else
979*4882a593Smuzhiyun module_init(aes_init);
980*4882a593Smuzhiyun EXPORT_SYMBOL(neon_aes_ecb_encrypt);
981*4882a593Smuzhiyun EXPORT_SYMBOL(neon_aes_cbc_encrypt);
982*4882a593Smuzhiyun EXPORT_SYMBOL(neon_aes_xts_encrypt);
983*4882a593Smuzhiyun EXPORT_SYMBOL(neon_aes_xts_decrypt);
984*4882a593Smuzhiyun #endif
985*4882a593Smuzhiyun module_exit(aes_exit);
986