1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * Glue code for AES implementation for SPE instructions (PPC)
4*4882a593Smuzhiyun *
5*4882a593Smuzhiyun * Based on generic implementation. The assembler module takes care
6*4882a593Smuzhiyun * about the SPE registers so it can run from interrupt context.
7*4882a593Smuzhiyun *
8*4882a593Smuzhiyun * Copyright (c) 2015 Markus Stockhausen <stockhausen@collogia.de>
9*4882a593Smuzhiyun */
10*4882a593Smuzhiyun
11*4882a593Smuzhiyun #include <crypto/aes.h>
12*4882a593Smuzhiyun #include <linux/module.h>
13*4882a593Smuzhiyun #include <linux/init.h>
14*4882a593Smuzhiyun #include <linux/types.h>
15*4882a593Smuzhiyun #include <linux/errno.h>
16*4882a593Smuzhiyun #include <linux/crypto.h>
17*4882a593Smuzhiyun #include <asm/byteorder.h>
18*4882a593Smuzhiyun #include <asm/switch_to.h>
19*4882a593Smuzhiyun #include <crypto/algapi.h>
20*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
21*4882a593Smuzhiyun #include <crypto/xts.h>
22*4882a593Smuzhiyun #include <crypto/gf128mul.h>
23*4882a593Smuzhiyun #include <crypto/scatterwalk.h>
24*4882a593Smuzhiyun
25*4882a593Smuzhiyun /*
26*4882a593Smuzhiyun * MAX_BYTES defines the number of bytes that are allowed to be processed
27*4882a593Smuzhiyun * between preempt_disable() and preempt_enable(). e500 cores can issue two
28*4882a593Smuzhiyun * instructions per clock cycle using one 32/64 bit unit (SU1) and one 32
29*4882a593Smuzhiyun * bit unit (SU2). One of these can be a memory access that is executed via
30*4882a593Smuzhiyun * a single load and store unit (LSU). XTS-AES-256 takes ~780 operations per
31*4882a593Smuzhiyun * 16 byte block block or 25 cycles per byte. Thus 768 bytes of input data
32*4882a593Smuzhiyun * will need an estimated maximum of 20,000 cycles. Headroom for cache misses
33*4882a593Smuzhiyun * included. Even with the low end model clocked at 667 MHz this equals to a
34*4882a593Smuzhiyun * critical time window of less than 30us. The value has been chosen to
35*4882a593Smuzhiyun * process a 512 byte disk block in one or a large 1400 bytes IPsec network
36*4882a593Smuzhiyun * packet in two runs.
37*4882a593Smuzhiyun *
38*4882a593Smuzhiyun */
39*4882a593Smuzhiyun #define MAX_BYTES 768
40*4882a593Smuzhiyun
41*4882a593Smuzhiyun struct ppc_aes_ctx {
42*4882a593Smuzhiyun u32 key_enc[AES_MAX_KEYLENGTH_U32];
43*4882a593Smuzhiyun u32 key_dec[AES_MAX_KEYLENGTH_U32];
44*4882a593Smuzhiyun u32 rounds;
45*4882a593Smuzhiyun };
46*4882a593Smuzhiyun
47*4882a593Smuzhiyun struct ppc_xts_ctx {
48*4882a593Smuzhiyun u32 key_enc[AES_MAX_KEYLENGTH_U32];
49*4882a593Smuzhiyun u32 key_dec[AES_MAX_KEYLENGTH_U32];
50*4882a593Smuzhiyun u32 key_twk[AES_MAX_KEYLENGTH_U32];
51*4882a593Smuzhiyun u32 rounds;
52*4882a593Smuzhiyun };
53*4882a593Smuzhiyun
54*4882a593Smuzhiyun extern void ppc_encrypt_aes(u8 *out, const u8 *in, u32 *key_enc, u32 rounds);
55*4882a593Smuzhiyun extern void ppc_decrypt_aes(u8 *out, const u8 *in, u32 *key_dec, u32 rounds);
56*4882a593Smuzhiyun extern void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
57*4882a593Smuzhiyun u32 bytes);
58*4882a593Smuzhiyun extern void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
59*4882a593Smuzhiyun u32 bytes);
60*4882a593Smuzhiyun extern void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
61*4882a593Smuzhiyun u32 bytes, u8 *iv);
62*4882a593Smuzhiyun extern void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
63*4882a593Smuzhiyun u32 bytes, u8 *iv);
64*4882a593Smuzhiyun extern void ppc_crypt_ctr (u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
65*4882a593Smuzhiyun u32 bytes, u8 *iv);
66*4882a593Smuzhiyun extern void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
67*4882a593Smuzhiyun u32 bytes, u8 *iv, u32 *key_twk);
68*4882a593Smuzhiyun extern void ppc_decrypt_xts(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
69*4882a593Smuzhiyun u32 bytes, u8 *iv, u32 *key_twk);
70*4882a593Smuzhiyun
71*4882a593Smuzhiyun extern void ppc_expand_key_128(u32 *key_enc, const u8 *key);
72*4882a593Smuzhiyun extern void ppc_expand_key_192(u32 *key_enc, const u8 *key);
73*4882a593Smuzhiyun extern void ppc_expand_key_256(u32 *key_enc, const u8 *key);
74*4882a593Smuzhiyun
75*4882a593Smuzhiyun extern void ppc_generate_decrypt_key(u32 *key_dec,u32 *key_enc,
76*4882a593Smuzhiyun unsigned int key_len);
77*4882a593Smuzhiyun
spe_begin(void)78*4882a593Smuzhiyun static void spe_begin(void)
79*4882a593Smuzhiyun {
80*4882a593Smuzhiyun /* disable preemption and save users SPE registers if required */
81*4882a593Smuzhiyun preempt_disable();
82*4882a593Smuzhiyun enable_kernel_spe();
83*4882a593Smuzhiyun }
84*4882a593Smuzhiyun
spe_end(void)85*4882a593Smuzhiyun static void spe_end(void)
86*4882a593Smuzhiyun {
87*4882a593Smuzhiyun disable_kernel_spe();
88*4882a593Smuzhiyun /* reenable preemption */
89*4882a593Smuzhiyun preempt_enable();
90*4882a593Smuzhiyun }
91*4882a593Smuzhiyun
ppc_aes_setkey(struct crypto_tfm * tfm,const u8 * in_key,unsigned int key_len)92*4882a593Smuzhiyun static int ppc_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key,
93*4882a593Smuzhiyun unsigned int key_len)
94*4882a593Smuzhiyun {
95*4882a593Smuzhiyun struct ppc_aes_ctx *ctx = crypto_tfm_ctx(tfm);
96*4882a593Smuzhiyun
97*4882a593Smuzhiyun switch (key_len) {
98*4882a593Smuzhiyun case AES_KEYSIZE_128:
99*4882a593Smuzhiyun ctx->rounds = 4;
100*4882a593Smuzhiyun ppc_expand_key_128(ctx->key_enc, in_key);
101*4882a593Smuzhiyun break;
102*4882a593Smuzhiyun case AES_KEYSIZE_192:
103*4882a593Smuzhiyun ctx->rounds = 5;
104*4882a593Smuzhiyun ppc_expand_key_192(ctx->key_enc, in_key);
105*4882a593Smuzhiyun break;
106*4882a593Smuzhiyun case AES_KEYSIZE_256:
107*4882a593Smuzhiyun ctx->rounds = 6;
108*4882a593Smuzhiyun ppc_expand_key_256(ctx->key_enc, in_key);
109*4882a593Smuzhiyun break;
110*4882a593Smuzhiyun default:
111*4882a593Smuzhiyun return -EINVAL;
112*4882a593Smuzhiyun }
113*4882a593Smuzhiyun
114*4882a593Smuzhiyun ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len);
115*4882a593Smuzhiyun
116*4882a593Smuzhiyun return 0;
117*4882a593Smuzhiyun }
118*4882a593Smuzhiyun
ppc_aes_setkey_skcipher(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)119*4882a593Smuzhiyun static int ppc_aes_setkey_skcipher(struct crypto_skcipher *tfm,
120*4882a593Smuzhiyun const u8 *in_key, unsigned int key_len)
121*4882a593Smuzhiyun {
122*4882a593Smuzhiyun return ppc_aes_setkey(crypto_skcipher_tfm(tfm), in_key, key_len);
123*4882a593Smuzhiyun }
124*4882a593Smuzhiyun
ppc_xts_setkey(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)125*4882a593Smuzhiyun static int ppc_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key,
126*4882a593Smuzhiyun unsigned int key_len)
127*4882a593Smuzhiyun {
128*4882a593Smuzhiyun struct ppc_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
129*4882a593Smuzhiyun int err;
130*4882a593Smuzhiyun
131*4882a593Smuzhiyun err = xts_verify_key(tfm, in_key, key_len);
132*4882a593Smuzhiyun if (err)
133*4882a593Smuzhiyun return err;
134*4882a593Smuzhiyun
135*4882a593Smuzhiyun key_len >>= 1;
136*4882a593Smuzhiyun
137*4882a593Smuzhiyun switch (key_len) {
138*4882a593Smuzhiyun case AES_KEYSIZE_128:
139*4882a593Smuzhiyun ctx->rounds = 4;
140*4882a593Smuzhiyun ppc_expand_key_128(ctx->key_enc, in_key);
141*4882a593Smuzhiyun ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128);
142*4882a593Smuzhiyun break;
143*4882a593Smuzhiyun case AES_KEYSIZE_192:
144*4882a593Smuzhiyun ctx->rounds = 5;
145*4882a593Smuzhiyun ppc_expand_key_192(ctx->key_enc, in_key);
146*4882a593Smuzhiyun ppc_expand_key_192(ctx->key_twk, in_key + AES_KEYSIZE_192);
147*4882a593Smuzhiyun break;
148*4882a593Smuzhiyun case AES_KEYSIZE_256:
149*4882a593Smuzhiyun ctx->rounds = 6;
150*4882a593Smuzhiyun ppc_expand_key_256(ctx->key_enc, in_key);
151*4882a593Smuzhiyun ppc_expand_key_256(ctx->key_twk, in_key + AES_KEYSIZE_256);
152*4882a593Smuzhiyun break;
153*4882a593Smuzhiyun default:
154*4882a593Smuzhiyun return -EINVAL;
155*4882a593Smuzhiyun }
156*4882a593Smuzhiyun
157*4882a593Smuzhiyun ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len);
158*4882a593Smuzhiyun
159*4882a593Smuzhiyun return 0;
160*4882a593Smuzhiyun }
161*4882a593Smuzhiyun
ppc_aes_encrypt(struct crypto_tfm * tfm,u8 * out,const u8 * in)162*4882a593Smuzhiyun static void ppc_aes_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
163*4882a593Smuzhiyun {
164*4882a593Smuzhiyun struct ppc_aes_ctx *ctx = crypto_tfm_ctx(tfm);
165*4882a593Smuzhiyun
166*4882a593Smuzhiyun spe_begin();
167*4882a593Smuzhiyun ppc_encrypt_aes(out, in, ctx->key_enc, ctx->rounds);
168*4882a593Smuzhiyun spe_end();
169*4882a593Smuzhiyun }
170*4882a593Smuzhiyun
ppc_aes_decrypt(struct crypto_tfm * tfm,u8 * out,const u8 * in)171*4882a593Smuzhiyun static void ppc_aes_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
172*4882a593Smuzhiyun {
173*4882a593Smuzhiyun struct ppc_aes_ctx *ctx = crypto_tfm_ctx(tfm);
174*4882a593Smuzhiyun
175*4882a593Smuzhiyun spe_begin();
176*4882a593Smuzhiyun ppc_decrypt_aes(out, in, ctx->key_dec, ctx->rounds);
177*4882a593Smuzhiyun spe_end();
178*4882a593Smuzhiyun }
179*4882a593Smuzhiyun
ppc_ecb_crypt(struct skcipher_request * req,bool enc)180*4882a593Smuzhiyun static int ppc_ecb_crypt(struct skcipher_request *req, bool enc)
181*4882a593Smuzhiyun {
182*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
183*4882a593Smuzhiyun struct ppc_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
184*4882a593Smuzhiyun struct skcipher_walk walk;
185*4882a593Smuzhiyun unsigned int nbytes;
186*4882a593Smuzhiyun int err;
187*4882a593Smuzhiyun
188*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
189*4882a593Smuzhiyun
190*4882a593Smuzhiyun while ((nbytes = walk.nbytes) != 0) {
191*4882a593Smuzhiyun nbytes = min_t(unsigned int, nbytes, MAX_BYTES);
192*4882a593Smuzhiyun nbytes = round_down(nbytes, AES_BLOCK_SIZE);
193*4882a593Smuzhiyun
194*4882a593Smuzhiyun spe_begin();
195*4882a593Smuzhiyun if (enc)
196*4882a593Smuzhiyun ppc_encrypt_ecb(walk.dst.virt.addr, walk.src.virt.addr,
197*4882a593Smuzhiyun ctx->key_enc, ctx->rounds, nbytes);
198*4882a593Smuzhiyun else
199*4882a593Smuzhiyun ppc_decrypt_ecb(walk.dst.virt.addr, walk.src.virt.addr,
200*4882a593Smuzhiyun ctx->key_dec, ctx->rounds, nbytes);
201*4882a593Smuzhiyun spe_end();
202*4882a593Smuzhiyun
203*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
204*4882a593Smuzhiyun }
205*4882a593Smuzhiyun
206*4882a593Smuzhiyun return err;
207*4882a593Smuzhiyun }
208*4882a593Smuzhiyun
ppc_ecb_encrypt(struct skcipher_request * req)209*4882a593Smuzhiyun static int ppc_ecb_encrypt(struct skcipher_request *req)
210*4882a593Smuzhiyun {
211*4882a593Smuzhiyun return ppc_ecb_crypt(req, true);
212*4882a593Smuzhiyun }
213*4882a593Smuzhiyun
ppc_ecb_decrypt(struct skcipher_request * req)214*4882a593Smuzhiyun static int ppc_ecb_decrypt(struct skcipher_request *req)
215*4882a593Smuzhiyun {
216*4882a593Smuzhiyun return ppc_ecb_crypt(req, false);
217*4882a593Smuzhiyun }
218*4882a593Smuzhiyun
ppc_cbc_crypt(struct skcipher_request * req,bool enc)219*4882a593Smuzhiyun static int ppc_cbc_crypt(struct skcipher_request *req, bool enc)
220*4882a593Smuzhiyun {
221*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
222*4882a593Smuzhiyun struct ppc_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
223*4882a593Smuzhiyun struct skcipher_walk walk;
224*4882a593Smuzhiyun unsigned int nbytes;
225*4882a593Smuzhiyun int err;
226*4882a593Smuzhiyun
227*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
228*4882a593Smuzhiyun
229*4882a593Smuzhiyun while ((nbytes = walk.nbytes) != 0) {
230*4882a593Smuzhiyun nbytes = min_t(unsigned int, nbytes, MAX_BYTES);
231*4882a593Smuzhiyun nbytes = round_down(nbytes, AES_BLOCK_SIZE);
232*4882a593Smuzhiyun
233*4882a593Smuzhiyun spe_begin();
234*4882a593Smuzhiyun if (enc)
235*4882a593Smuzhiyun ppc_encrypt_cbc(walk.dst.virt.addr, walk.src.virt.addr,
236*4882a593Smuzhiyun ctx->key_enc, ctx->rounds, nbytes,
237*4882a593Smuzhiyun walk.iv);
238*4882a593Smuzhiyun else
239*4882a593Smuzhiyun ppc_decrypt_cbc(walk.dst.virt.addr, walk.src.virt.addr,
240*4882a593Smuzhiyun ctx->key_dec, ctx->rounds, nbytes,
241*4882a593Smuzhiyun walk.iv);
242*4882a593Smuzhiyun spe_end();
243*4882a593Smuzhiyun
244*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
245*4882a593Smuzhiyun }
246*4882a593Smuzhiyun
247*4882a593Smuzhiyun return err;
248*4882a593Smuzhiyun }
249*4882a593Smuzhiyun
ppc_cbc_encrypt(struct skcipher_request * req)250*4882a593Smuzhiyun static int ppc_cbc_encrypt(struct skcipher_request *req)
251*4882a593Smuzhiyun {
252*4882a593Smuzhiyun return ppc_cbc_crypt(req, true);
253*4882a593Smuzhiyun }
254*4882a593Smuzhiyun
ppc_cbc_decrypt(struct skcipher_request * req)255*4882a593Smuzhiyun static int ppc_cbc_decrypt(struct skcipher_request *req)
256*4882a593Smuzhiyun {
257*4882a593Smuzhiyun return ppc_cbc_crypt(req, false);
258*4882a593Smuzhiyun }
259*4882a593Smuzhiyun
ppc_ctr_crypt(struct skcipher_request * req)260*4882a593Smuzhiyun static int ppc_ctr_crypt(struct skcipher_request *req)
261*4882a593Smuzhiyun {
262*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
263*4882a593Smuzhiyun struct ppc_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
264*4882a593Smuzhiyun struct skcipher_walk walk;
265*4882a593Smuzhiyun unsigned int nbytes;
266*4882a593Smuzhiyun int err;
267*4882a593Smuzhiyun
268*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
269*4882a593Smuzhiyun
270*4882a593Smuzhiyun while ((nbytes = walk.nbytes) != 0) {
271*4882a593Smuzhiyun nbytes = min_t(unsigned int, nbytes, MAX_BYTES);
272*4882a593Smuzhiyun if (nbytes < walk.total)
273*4882a593Smuzhiyun nbytes = round_down(nbytes, AES_BLOCK_SIZE);
274*4882a593Smuzhiyun
275*4882a593Smuzhiyun spe_begin();
276*4882a593Smuzhiyun ppc_crypt_ctr(walk.dst.virt.addr, walk.src.virt.addr,
277*4882a593Smuzhiyun ctx->key_enc, ctx->rounds, nbytes, walk.iv);
278*4882a593Smuzhiyun spe_end();
279*4882a593Smuzhiyun
280*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
281*4882a593Smuzhiyun }
282*4882a593Smuzhiyun
283*4882a593Smuzhiyun return err;
284*4882a593Smuzhiyun }
285*4882a593Smuzhiyun
ppc_xts_crypt(struct skcipher_request * req,bool enc)286*4882a593Smuzhiyun static int ppc_xts_crypt(struct skcipher_request *req, bool enc)
287*4882a593Smuzhiyun {
288*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
289*4882a593Smuzhiyun struct ppc_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
290*4882a593Smuzhiyun struct skcipher_walk walk;
291*4882a593Smuzhiyun unsigned int nbytes;
292*4882a593Smuzhiyun int err;
293*4882a593Smuzhiyun u32 *twk;
294*4882a593Smuzhiyun
295*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, false);
296*4882a593Smuzhiyun twk = ctx->key_twk;
297*4882a593Smuzhiyun
298*4882a593Smuzhiyun while ((nbytes = walk.nbytes) != 0) {
299*4882a593Smuzhiyun nbytes = min_t(unsigned int, nbytes, MAX_BYTES);
300*4882a593Smuzhiyun nbytes = round_down(nbytes, AES_BLOCK_SIZE);
301*4882a593Smuzhiyun
302*4882a593Smuzhiyun spe_begin();
303*4882a593Smuzhiyun if (enc)
304*4882a593Smuzhiyun ppc_encrypt_xts(walk.dst.virt.addr, walk.src.virt.addr,
305*4882a593Smuzhiyun ctx->key_enc, ctx->rounds, nbytes,
306*4882a593Smuzhiyun walk.iv, twk);
307*4882a593Smuzhiyun else
308*4882a593Smuzhiyun ppc_decrypt_xts(walk.dst.virt.addr, walk.src.virt.addr,
309*4882a593Smuzhiyun ctx->key_dec, ctx->rounds, nbytes,
310*4882a593Smuzhiyun walk.iv, twk);
311*4882a593Smuzhiyun spe_end();
312*4882a593Smuzhiyun
313*4882a593Smuzhiyun twk = NULL;
314*4882a593Smuzhiyun err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
315*4882a593Smuzhiyun }
316*4882a593Smuzhiyun
317*4882a593Smuzhiyun return err;
318*4882a593Smuzhiyun }
319*4882a593Smuzhiyun
ppc_xts_encrypt(struct skcipher_request * req)320*4882a593Smuzhiyun static int ppc_xts_encrypt(struct skcipher_request *req)
321*4882a593Smuzhiyun {
322*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
323*4882a593Smuzhiyun struct ppc_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
324*4882a593Smuzhiyun int tail = req->cryptlen % AES_BLOCK_SIZE;
325*4882a593Smuzhiyun int offset = req->cryptlen - tail - AES_BLOCK_SIZE;
326*4882a593Smuzhiyun struct skcipher_request subreq;
327*4882a593Smuzhiyun u8 b[2][AES_BLOCK_SIZE];
328*4882a593Smuzhiyun int err;
329*4882a593Smuzhiyun
330*4882a593Smuzhiyun if (req->cryptlen < AES_BLOCK_SIZE)
331*4882a593Smuzhiyun return -EINVAL;
332*4882a593Smuzhiyun
333*4882a593Smuzhiyun if (tail) {
334*4882a593Smuzhiyun subreq = *req;
335*4882a593Smuzhiyun skcipher_request_set_crypt(&subreq, req->src, req->dst,
336*4882a593Smuzhiyun req->cryptlen - tail, req->iv);
337*4882a593Smuzhiyun req = &subreq;
338*4882a593Smuzhiyun }
339*4882a593Smuzhiyun
340*4882a593Smuzhiyun err = ppc_xts_crypt(req, true);
341*4882a593Smuzhiyun if (err || !tail)
342*4882a593Smuzhiyun return err;
343*4882a593Smuzhiyun
344*4882a593Smuzhiyun scatterwalk_map_and_copy(b[0], req->dst, offset, AES_BLOCK_SIZE, 0);
345*4882a593Smuzhiyun memcpy(b[1], b[0], tail);
346*4882a593Smuzhiyun scatterwalk_map_and_copy(b[0], req->src, offset + AES_BLOCK_SIZE, tail, 0);
347*4882a593Smuzhiyun
348*4882a593Smuzhiyun spe_begin();
349*4882a593Smuzhiyun ppc_encrypt_xts(b[0], b[0], ctx->key_enc, ctx->rounds, AES_BLOCK_SIZE,
350*4882a593Smuzhiyun req->iv, NULL);
351*4882a593Smuzhiyun spe_end();
352*4882a593Smuzhiyun
353*4882a593Smuzhiyun scatterwalk_map_and_copy(b[0], req->dst, offset, AES_BLOCK_SIZE + tail, 1);
354*4882a593Smuzhiyun
355*4882a593Smuzhiyun return 0;
356*4882a593Smuzhiyun }
357*4882a593Smuzhiyun
ppc_xts_decrypt(struct skcipher_request * req)358*4882a593Smuzhiyun static int ppc_xts_decrypt(struct skcipher_request *req)
359*4882a593Smuzhiyun {
360*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
361*4882a593Smuzhiyun struct ppc_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
362*4882a593Smuzhiyun int tail = req->cryptlen % AES_BLOCK_SIZE;
363*4882a593Smuzhiyun int offset = req->cryptlen - tail - AES_BLOCK_SIZE;
364*4882a593Smuzhiyun struct skcipher_request subreq;
365*4882a593Smuzhiyun u8 b[3][AES_BLOCK_SIZE];
366*4882a593Smuzhiyun le128 twk;
367*4882a593Smuzhiyun int err;
368*4882a593Smuzhiyun
369*4882a593Smuzhiyun if (req->cryptlen < AES_BLOCK_SIZE)
370*4882a593Smuzhiyun return -EINVAL;
371*4882a593Smuzhiyun
372*4882a593Smuzhiyun if (tail) {
373*4882a593Smuzhiyun subreq = *req;
374*4882a593Smuzhiyun skcipher_request_set_crypt(&subreq, req->src, req->dst,
375*4882a593Smuzhiyun offset, req->iv);
376*4882a593Smuzhiyun req = &subreq;
377*4882a593Smuzhiyun }
378*4882a593Smuzhiyun
379*4882a593Smuzhiyun err = ppc_xts_crypt(req, false);
380*4882a593Smuzhiyun if (err || !tail)
381*4882a593Smuzhiyun return err;
382*4882a593Smuzhiyun
383*4882a593Smuzhiyun scatterwalk_map_and_copy(b[1], req->src, offset, AES_BLOCK_SIZE + tail, 0);
384*4882a593Smuzhiyun
385*4882a593Smuzhiyun spe_begin();
386*4882a593Smuzhiyun if (!offset)
387*4882a593Smuzhiyun ppc_encrypt_ecb(req->iv, req->iv, ctx->key_twk, ctx->rounds,
388*4882a593Smuzhiyun AES_BLOCK_SIZE);
389*4882a593Smuzhiyun
390*4882a593Smuzhiyun gf128mul_x_ble(&twk, (le128 *)req->iv);
391*4882a593Smuzhiyun
392*4882a593Smuzhiyun ppc_decrypt_xts(b[1], b[1], ctx->key_dec, ctx->rounds, AES_BLOCK_SIZE,
393*4882a593Smuzhiyun (u8 *)&twk, NULL);
394*4882a593Smuzhiyun memcpy(b[0], b[2], tail);
395*4882a593Smuzhiyun memcpy(b[0] + tail, b[1] + tail, AES_BLOCK_SIZE - tail);
396*4882a593Smuzhiyun ppc_decrypt_xts(b[0], b[0], ctx->key_dec, ctx->rounds, AES_BLOCK_SIZE,
397*4882a593Smuzhiyun req->iv, NULL);
398*4882a593Smuzhiyun spe_end();
399*4882a593Smuzhiyun
400*4882a593Smuzhiyun scatterwalk_map_and_copy(b[0], req->dst, offset, AES_BLOCK_SIZE + tail, 1);
401*4882a593Smuzhiyun
402*4882a593Smuzhiyun return 0;
403*4882a593Smuzhiyun }
404*4882a593Smuzhiyun
405*4882a593Smuzhiyun /*
406*4882a593Smuzhiyun * Algorithm definitions. Disabling alignment (cra_alignmask=0) was chosen
407*4882a593Smuzhiyun * because the e500 platform can handle unaligned reads/writes very efficently.
408*4882a593Smuzhiyun * This improves IPsec thoughput by another few percent. Additionally we assume
409*4882a593Smuzhiyun * that AES context is always aligned to at least 8 bytes because it is created
410*4882a593Smuzhiyun * with kmalloc() in the crypto infrastructure
411*4882a593Smuzhiyun */
412*4882a593Smuzhiyun
413*4882a593Smuzhiyun static struct crypto_alg aes_cipher_alg = {
414*4882a593Smuzhiyun .cra_name = "aes",
415*4882a593Smuzhiyun .cra_driver_name = "aes-ppc-spe",
416*4882a593Smuzhiyun .cra_priority = 300,
417*4882a593Smuzhiyun .cra_flags = CRYPTO_ALG_TYPE_CIPHER,
418*4882a593Smuzhiyun .cra_blocksize = AES_BLOCK_SIZE,
419*4882a593Smuzhiyun .cra_ctxsize = sizeof(struct ppc_aes_ctx),
420*4882a593Smuzhiyun .cra_alignmask = 0,
421*4882a593Smuzhiyun .cra_module = THIS_MODULE,
422*4882a593Smuzhiyun .cra_u = {
423*4882a593Smuzhiyun .cipher = {
424*4882a593Smuzhiyun .cia_min_keysize = AES_MIN_KEY_SIZE,
425*4882a593Smuzhiyun .cia_max_keysize = AES_MAX_KEY_SIZE,
426*4882a593Smuzhiyun .cia_setkey = ppc_aes_setkey,
427*4882a593Smuzhiyun .cia_encrypt = ppc_aes_encrypt,
428*4882a593Smuzhiyun .cia_decrypt = ppc_aes_decrypt
429*4882a593Smuzhiyun }
430*4882a593Smuzhiyun }
431*4882a593Smuzhiyun };
432*4882a593Smuzhiyun
433*4882a593Smuzhiyun static struct skcipher_alg aes_skcipher_algs[] = {
434*4882a593Smuzhiyun {
435*4882a593Smuzhiyun .base.cra_name = "ecb(aes)",
436*4882a593Smuzhiyun .base.cra_driver_name = "ecb-ppc-spe",
437*4882a593Smuzhiyun .base.cra_priority = 300,
438*4882a593Smuzhiyun .base.cra_blocksize = AES_BLOCK_SIZE,
439*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct ppc_aes_ctx),
440*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
441*4882a593Smuzhiyun .min_keysize = AES_MIN_KEY_SIZE,
442*4882a593Smuzhiyun .max_keysize = AES_MAX_KEY_SIZE,
443*4882a593Smuzhiyun .setkey = ppc_aes_setkey_skcipher,
444*4882a593Smuzhiyun .encrypt = ppc_ecb_encrypt,
445*4882a593Smuzhiyun .decrypt = ppc_ecb_decrypt,
446*4882a593Smuzhiyun }, {
447*4882a593Smuzhiyun .base.cra_name = "cbc(aes)",
448*4882a593Smuzhiyun .base.cra_driver_name = "cbc-ppc-spe",
449*4882a593Smuzhiyun .base.cra_priority = 300,
450*4882a593Smuzhiyun .base.cra_blocksize = AES_BLOCK_SIZE,
451*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct ppc_aes_ctx),
452*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
453*4882a593Smuzhiyun .min_keysize = AES_MIN_KEY_SIZE,
454*4882a593Smuzhiyun .max_keysize = AES_MAX_KEY_SIZE,
455*4882a593Smuzhiyun .ivsize = AES_BLOCK_SIZE,
456*4882a593Smuzhiyun .setkey = ppc_aes_setkey_skcipher,
457*4882a593Smuzhiyun .encrypt = ppc_cbc_encrypt,
458*4882a593Smuzhiyun .decrypt = ppc_cbc_decrypt,
459*4882a593Smuzhiyun }, {
460*4882a593Smuzhiyun .base.cra_name = "ctr(aes)",
461*4882a593Smuzhiyun .base.cra_driver_name = "ctr-ppc-spe",
462*4882a593Smuzhiyun .base.cra_priority = 300,
463*4882a593Smuzhiyun .base.cra_blocksize = 1,
464*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct ppc_aes_ctx),
465*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
466*4882a593Smuzhiyun .min_keysize = AES_MIN_KEY_SIZE,
467*4882a593Smuzhiyun .max_keysize = AES_MAX_KEY_SIZE,
468*4882a593Smuzhiyun .ivsize = AES_BLOCK_SIZE,
469*4882a593Smuzhiyun .setkey = ppc_aes_setkey_skcipher,
470*4882a593Smuzhiyun .encrypt = ppc_ctr_crypt,
471*4882a593Smuzhiyun .decrypt = ppc_ctr_crypt,
472*4882a593Smuzhiyun .chunksize = AES_BLOCK_SIZE,
473*4882a593Smuzhiyun }, {
474*4882a593Smuzhiyun .base.cra_name = "xts(aes)",
475*4882a593Smuzhiyun .base.cra_driver_name = "xts-ppc-spe",
476*4882a593Smuzhiyun .base.cra_priority = 300,
477*4882a593Smuzhiyun .base.cra_blocksize = AES_BLOCK_SIZE,
478*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct ppc_xts_ctx),
479*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
480*4882a593Smuzhiyun .min_keysize = AES_MIN_KEY_SIZE * 2,
481*4882a593Smuzhiyun .max_keysize = AES_MAX_KEY_SIZE * 2,
482*4882a593Smuzhiyun .ivsize = AES_BLOCK_SIZE,
483*4882a593Smuzhiyun .setkey = ppc_xts_setkey,
484*4882a593Smuzhiyun .encrypt = ppc_xts_encrypt,
485*4882a593Smuzhiyun .decrypt = ppc_xts_decrypt,
486*4882a593Smuzhiyun }
487*4882a593Smuzhiyun };
488*4882a593Smuzhiyun
ppc_aes_mod_init(void)489*4882a593Smuzhiyun static int __init ppc_aes_mod_init(void)
490*4882a593Smuzhiyun {
491*4882a593Smuzhiyun int err;
492*4882a593Smuzhiyun
493*4882a593Smuzhiyun err = crypto_register_alg(&aes_cipher_alg);
494*4882a593Smuzhiyun if (err)
495*4882a593Smuzhiyun return err;
496*4882a593Smuzhiyun
497*4882a593Smuzhiyun err = crypto_register_skciphers(aes_skcipher_algs,
498*4882a593Smuzhiyun ARRAY_SIZE(aes_skcipher_algs));
499*4882a593Smuzhiyun if (err)
500*4882a593Smuzhiyun crypto_unregister_alg(&aes_cipher_alg);
501*4882a593Smuzhiyun return err;
502*4882a593Smuzhiyun }
503*4882a593Smuzhiyun
ppc_aes_mod_fini(void)504*4882a593Smuzhiyun static void __exit ppc_aes_mod_fini(void)
505*4882a593Smuzhiyun {
506*4882a593Smuzhiyun crypto_unregister_alg(&aes_cipher_alg);
507*4882a593Smuzhiyun crypto_unregister_skciphers(aes_skcipher_algs,
508*4882a593Smuzhiyun ARRAY_SIZE(aes_skcipher_algs));
509*4882a593Smuzhiyun }
510*4882a593Smuzhiyun
511*4882a593Smuzhiyun module_init(ppc_aes_mod_init);
512*4882a593Smuzhiyun module_exit(ppc_aes_mod_fini);
513*4882a593Smuzhiyun
514*4882a593Smuzhiyun MODULE_LICENSE("GPL");
515*4882a593Smuzhiyun MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS, SPE optimized");
516*4882a593Smuzhiyun
517*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("aes");
518*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("ecb(aes)");
519*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cbc(aes)");
520*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("ctr(aes)");
521*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xts(aes)");
522*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("aes-ppc-spe");
523