xref: /OK3568_Linux_fs/kernel/arch/powerpc/crypto/aes-spe-glue.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-or-later
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Glue code for AES implementation for SPE instructions (PPC)
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * Based on generic implementation. The assembler module takes care
6*4882a593Smuzhiyun  * about the SPE registers so it can run from interrupt context.
7*4882a593Smuzhiyun  *
8*4882a593Smuzhiyun  * Copyright (c) 2015 Markus Stockhausen <stockhausen@collogia.de>
9*4882a593Smuzhiyun  */
10*4882a593Smuzhiyun 
11*4882a593Smuzhiyun #include <crypto/aes.h>
12*4882a593Smuzhiyun #include <linux/module.h>
13*4882a593Smuzhiyun #include <linux/init.h>
14*4882a593Smuzhiyun #include <linux/types.h>
15*4882a593Smuzhiyun #include <linux/errno.h>
16*4882a593Smuzhiyun #include <linux/crypto.h>
17*4882a593Smuzhiyun #include <asm/byteorder.h>
18*4882a593Smuzhiyun #include <asm/switch_to.h>
19*4882a593Smuzhiyun #include <crypto/algapi.h>
20*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
21*4882a593Smuzhiyun #include <crypto/xts.h>
22*4882a593Smuzhiyun #include <crypto/gf128mul.h>
23*4882a593Smuzhiyun #include <crypto/scatterwalk.h>
24*4882a593Smuzhiyun 
25*4882a593Smuzhiyun /*
26*4882a593Smuzhiyun  * MAX_BYTES defines the number of bytes that are allowed to be processed
27*4882a593Smuzhiyun  * between preempt_disable() and preempt_enable(). e500 cores can issue two
28*4882a593Smuzhiyun  * instructions per clock cycle using one 32/64 bit unit (SU1) and one 32
29*4882a593Smuzhiyun  * bit unit (SU2). One of these can be a memory access that is executed via
30*4882a593Smuzhiyun  * a single load and store unit (LSU). XTS-AES-256 takes ~780 operations per
31*4882a593Smuzhiyun  * 16 byte block block or 25 cycles per byte. Thus 768 bytes of input data
32*4882a593Smuzhiyun  * will need an estimated maximum of 20,000 cycles. Headroom for cache misses
33*4882a593Smuzhiyun  * included. Even with the low end model clocked at 667 MHz this equals to a
34*4882a593Smuzhiyun  * critical time window of less than 30us. The value has been chosen to
35*4882a593Smuzhiyun  * process a 512 byte disk block in one or a large 1400 bytes IPsec network
36*4882a593Smuzhiyun  * packet in two runs.
37*4882a593Smuzhiyun  *
38*4882a593Smuzhiyun  */
39*4882a593Smuzhiyun #define MAX_BYTES 768
40*4882a593Smuzhiyun 
41*4882a593Smuzhiyun struct ppc_aes_ctx {
42*4882a593Smuzhiyun 	u32 key_enc[AES_MAX_KEYLENGTH_U32];
43*4882a593Smuzhiyun 	u32 key_dec[AES_MAX_KEYLENGTH_U32];
44*4882a593Smuzhiyun 	u32 rounds;
45*4882a593Smuzhiyun };
46*4882a593Smuzhiyun 
47*4882a593Smuzhiyun struct ppc_xts_ctx {
48*4882a593Smuzhiyun 	u32 key_enc[AES_MAX_KEYLENGTH_U32];
49*4882a593Smuzhiyun 	u32 key_dec[AES_MAX_KEYLENGTH_U32];
50*4882a593Smuzhiyun 	u32 key_twk[AES_MAX_KEYLENGTH_U32];
51*4882a593Smuzhiyun 	u32 rounds;
52*4882a593Smuzhiyun };
53*4882a593Smuzhiyun 
54*4882a593Smuzhiyun extern void ppc_encrypt_aes(u8 *out, const u8 *in, u32 *key_enc, u32 rounds);
55*4882a593Smuzhiyun extern void ppc_decrypt_aes(u8 *out, const u8 *in, u32 *key_dec, u32 rounds);
56*4882a593Smuzhiyun extern void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
57*4882a593Smuzhiyun 			    u32 bytes);
58*4882a593Smuzhiyun extern void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
59*4882a593Smuzhiyun 			    u32 bytes);
60*4882a593Smuzhiyun extern void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
61*4882a593Smuzhiyun 			    u32 bytes, u8 *iv);
62*4882a593Smuzhiyun extern void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
63*4882a593Smuzhiyun 			    u32 bytes, u8 *iv);
64*4882a593Smuzhiyun extern void ppc_crypt_ctr  (u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
65*4882a593Smuzhiyun 			    u32 bytes, u8 *iv);
66*4882a593Smuzhiyun extern void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
67*4882a593Smuzhiyun 			    u32 bytes, u8 *iv, u32 *key_twk);
68*4882a593Smuzhiyun extern void ppc_decrypt_xts(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
69*4882a593Smuzhiyun 			    u32 bytes, u8 *iv, u32 *key_twk);
70*4882a593Smuzhiyun 
71*4882a593Smuzhiyun extern void ppc_expand_key_128(u32 *key_enc, const u8 *key);
72*4882a593Smuzhiyun extern void ppc_expand_key_192(u32 *key_enc, const u8 *key);
73*4882a593Smuzhiyun extern void ppc_expand_key_256(u32 *key_enc, const u8 *key);
74*4882a593Smuzhiyun 
75*4882a593Smuzhiyun extern void ppc_generate_decrypt_key(u32 *key_dec,u32 *key_enc,
76*4882a593Smuzhiyun 				     unsigned int key_len);
77*4882a593Smuzhiyun 
spe_begin(void)78*4882a593Smuzhiyun static void spe_begin(void)
79*4882a593Smuzhiyun {
80*4882a593Smuzhiyun 	/* disable preemption and save users SPE registers if required */
81*4882a593Smuzhiyun 	preempt_disable();
82*4882a593Smuzhiyun 	enable_kernel_spe();
83*4882a593Smuzhiyun }
84*4882a593Smuzhiyun 
spe_end(void)85*4882a593Smuzhiyun static void spe_end(void)
86*4882a593Smuzhiyun {
87*4882a593Smuzhiyun 	disable_kernel_spe();
88*4882a593Smuzhiyun 	/* reenable preemption */
89*4882a593Smuzhiyun 	preempt_enable();
90*4882a593Smuzhiyun }
91*4882a593Smuzhiyun 
ppc_aes_setkey(struct crypto_tfm * tfm,const u8 * in_key,unsigned int key_len)92*4882a593Smuzhiyun static int ppc_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key,
93*4882a593Smuzhiyun 		unsigned int key_len)
94*4882a593Smuzhiyun {
95*4882a593Smuzhiyun 	struct ppc_aes_ctx *ctx = crypto_tfm_ctx(tfm);
96*4882a593Smuzhiyun 
97*4882a593Smuzhiyun 	switch (key_len) {
98*4882a593Smuzhiyun 	case AES_KEYSIZE_128:
99*4882a593Smuzhiyun 		ctx->rounds = 4;
100*4882a593Smuzhiyun 		ppc_expand_key_128(ctx->key_enc, in_key);
101*4882a593Smuzhiyun 		break;
102*4882a593Smuzhiyun 	case AES_KEYSIZE_192:
103*4882a593Smuzhiyun 		ctx->rounds = 5;
104*4882a593Smuzhiyun 		ppc_expand_key_192(ctx->key_enc, in_key);
105*4882a593Smuzhiyun 		break;
106*4882a593Smuzhiyun 	case AES_KEYSIZE_256:
107*4882a593Smuzhiyun 		ctx->rounds = 6;
108*4882a593Smuzhiyun 		ppc_expand_key_256(ctx->key_enc, in_key);
109*4882a593Smuzhiyun 		break;
110*4882a593Smuzhiyun 	default:
111*4882a593Smuzhiyun 		return -EINVAL;
112*4882a593Smuzhiyun 	}
113*4882a593Smuzhiyun 
114*4882a593Smuzhiyun 	ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len);
115*4882a593Smuzhiyun 
116*4882a593Smuzhiyun 	return 0;
117*4882a593Smuzhiyun }
118*4882a593Smuzhiyun 
ppc_aes_setkey_skcipher(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)119*4882a593Smuzhiyun static int ppc_aes_setkey_skcipher(struct crypto_skcipher *tfm,
120*4882a593Smuzhiyun 				   const u8 *in_key, unsigned int key_len)
121*4882a593Smuzhiyun {
122*4882a593Smuzhiyun 	return ppc_aes_setkey(crypto_skcipher_tfm(tfm), in_key, key_len);
123*4882a593Smuzhiyun }
124*4882a593Smuzhiyun 
ppc_xts_setkey(struct crypto_skcipher * tfm,const u8 * in_key,unsigned int key_len)125*4882a593Smuzhiyun static int ppc_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key,
126*4882a593Smuzhiyun 		   unsigned int key_len)
127*4882a593Smuzhiyun {
128*4882a593Smuzhiyun 	struct ppc_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
129*4882a593Smuzhiyun 	int err;
130*4882a593Smuzhiyun 
131*4882a593Smuzhiyun 	err = xts_verify_key(tfm, in_key, key_len);
132*4882a593Smuzhiyun 	if (err)
133*4882a593Smuzhiyun 		return err;
134*4882a593Smuzhiyun 
135*4882a593Smuzhiyun 	key_len >>= 1;
136*4882a593Smuzhiyun 
137*4882a593Smuzhiyun 	switch (key_len) {
138*4882a593Smuzhiyun 	case AES_KEYSIZE_128:
139*4882a593Smuzhiyun 		ctx->rounds = 4;
140*4882a593Smuzhiyun 		ppc_expand_key_128(ctx->key_enc, in_key);
141*4882a593Smuzhiyun 		ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128);
142*4882a593Smuzhiyun 		break;
143*4882a593Smuzhiyun 	case AES_KEYSIZE_192:
144*4882a593Smuzhiyun 		ctx->rounds = 5;
145*4882a593Smuzhiyun 		ppc_expand_key_192(ctx->key_enc, in_key);
146*4882a593Smuzhiyun 		ppc_expand_key_192(ctx->key_twk, in_key + AES_KEYSIZE_192);
147*4882a593Smuzhiyun 		break;
148*4882a593Smuzhiyun 	case AES_KEYSIZE_256:
149*4882a593Smuzhiyun 		ctx->rounds = 6;
150*4882a593Smuzhiyun 		ppc_expand_key_256(ctx->key_enc, in_key);
151*4882a593Smuzhiyun 		ppc_expand_key_256(ctx->key_twk, in_key + AES_KEYSIZE_256);
152*4882a593Smuzhiyun 		break;
153*4882a593Smuzhiyun 	default:
154*4882a593Smuzhiyun 		return -EINVAL;
155*4882a593Smuzhiyun 	}
156*4882a593Smuzhiyun 
157*4882a593Smuzhiyun 	ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len);
158*4882a593Smuzhiyun 
159*4882a593Smuzhiyun 	return 0;
160*4882a593Smuzhiyun }
161*4882a593Smuzhiyun 
ppc_aes_encrypt(struct crypto_tfm * tfm,u8 * out,const u8 * in)162*4882a593Smuzhiyun static void ppc_aes_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
163*4882a593Smuzhiyun {
164*4882a593Smuzhiyun 	struct ppc_aes_ctx *ctx = crypto_tfm_ctx(tfm);
165*4882a593Smuzhiyun 
166*4882a593Smuzhiyun 	spe_begin();
167*4882a593Smuzhiyun 	ppc_encrypt_aes(out, in, ctx->key_enc, ctx->rounds);
168*4882a593Smuzhiyun 	spe_end();
169*4882a593Smuzhiyun }
170*4882a593Smuzhiyun 
ppc_aes_decrypt(struct crypto_tfm * tfm,u8 * out,const u8 * in)171*4882a593Smuzhiyun static void ppc_aes_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in)
172*4882a593Smuzhiyun {
173*4882a593Smuzhiyun 	struct ppc_aes_ctx *ctx = crypto_tfm_ctx(tfm);
174*4882a593Smuzhiyun 
175*4882a593Smuzhiyun 	spe_begin();
176*4882a593Smuzhiyun 	ppc_decrypt_aes(out, in, ctx->key_dec, ctx->rounds);
177*4882a593Smuzhiyun 	spe_end();
178*4882a593Smuzhiyun }
179*4882a593Smuzhiyun 
ppc_ecb_crypt(struct skcipher_request * req,bool enc)180*4882a593Smuzhiyun static int ppc_ecb_crypt(struct skcipher_request *req, bool enc)
181*4882a593Smuzhiyun {
182*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
183*4882a593Smuzhiyun 	struct ppc_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
184*4882a593Smuzhiyun 	struct skcipher_walk walk;
185*4882a593Smuzhiyun 	unsigned int nbytes;
186*4882a593Smuzhiyun 	int err;
187*4882a593Smuzhiyun 
188*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
189*4882a593Smuzhiyun 
190*4882a593Smuzhiyun 	while ((nbytes = walk.nbytes) != 0) {
191*4882a593Smuzhiyun 		nbytes = min_t(unsigned int, nbytes, MAX_BYTES);
192*4882a593Smuzhiyun 		nbytes = round_down(nbytes, AES_BLOCK_SIZE);
193*4882a593Smuzhiyun 
194*4882a593Smuzhiyun 		spe_begin();
195*4882a593Smuzhiyun 		if (enc)
196*4882a593Smuzhiyun 			ppc_encrypt_ecb(walk.dst.virt.addr, walk.src.virt.addr,
197*4882a593Smuzhiyun 					ctx->key_enc, ctx->rounds, nbytes);
198*4882a593Smuzhiyun 		else
199*4882a593Smuzhiyun 			ppc_decrypt_ecb(walk.dst.virt.addr, walk.src.virt.addr,
200*4882a593Smuzhiyun 					ctx->key_dec, ctx->rounds, nbytes);
201*4882a593Smuzhiyun 		spe_end();
202*4882a593Smuzhiyun 
203*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
204*4882a593Smuzhiyun 	}
205*4882a593Smuzhiyun 
206*4882a593Smuzhiyun 	return err;
207*4882a593Smuzhiyun }
208*4882a593Smuzhiyun 
ppc_ecb_encrypt(struct skcipher_request * req)209*4882a593Smuzhiyun static int ppc_ecb_encrypt(struct skcipher_request *req)
210*4882a593Smuzhiyun {
211*4882a593Smuzhiyun 	return ppc_ecb_crypt(req, true);
212*4882a593Smuzhiyun }
213*4882a593Smuzhiyun 
ppc_ecb_decrypt(struct skcipher_request * req)214*4882a593Smuzhiyun static int ppc_ecb_decrypt(struct skcipher_request *req)
215*4882a593Smuzhiyun {
216*4882a593Smuzhiyun 	return ppc_ecb_crypt(req, false);
217*4882a593Smuzhiyun }
218*4882a593Smuzhiyun 
ppc_cbc_crypt(struct skcipher_request * req,bool enc)219*4882a593Smuzhiyun static int ppc_cbc_crypt(struct skcipher_request *req, bool enc)
220*4882a593Smuzhiyun {
221*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
222*4882a593Smuzhiyun 	struct ppc_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
223*4882a593Smuzhiyun 	struct skcipher_walk walk;
224*4882a593Smuzhiyun 	unsigned int nbytes;
225*4882a593Smuzhiyun 	int err;
226*4882a593Smuzhiyun 
227*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
228*4882a593Smuzhiyun 
229*4882a593Smuzhiyun 	while ((nbytes = walk.nbytes) != 0) {
230*4882a593Smuzhiyun 		nbytes = min_t(unsigned int, nbytes, MAX_BYTES);
231*4882a593Smuzhiyun 		nbytes = round_down(nbytes, AES_BLOCK_SIZE);
232*4882a593Smuzhiyun 
233*4882a593Smuzhiyun 		spe_begin();
234*4882a593Smuzhiyun 		if (enc)
235*4882a593Smuzhiyun 			ppc_encrypt_cbc(walk.dst.virt.addr, walk.src.virt.addr,
236*4882a593Smuzhiyun 					ctx->key_enc, ctx->rounds, nbytes,
237*4882a593Smuzhiyun 					walk.iv);
238*4882a593Smuzhiyun 		else
239*4882a593Smuzhiyun 			ppc_decrypt_cbc(walk.dst.virt.addr, walk.src.virt.addr,
240*4882a593Smuzhiyun 					ctx->key_dec, ctx->rounds, nbytes,
241*4882a593Smuzhiyun 					walk.iv);
242*4882a593Smuzhiyun 		spe_end();
243*4882a593Smuzhiyun 
244*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
245*4882a593Smuzhiyun 	}
246*4882a593Smuzhiyun 
247*4882a593Smuzhiyun 	return err;
248*4882a593Smuzhiyun }
249*4882a593Smuzhiyun 
ppc_cbc_encrypt(struct skcipher_request * req)250*4882a593Smuzhiyun static int ppc_cbc_encrypt(struct skcipher_request *req)
251*4882a593Smuzhiyun {
252*4882a593Smuzhiyun 	return ppc_cbc_crypt(req, true);
253*4882a593Smuzhiyun }
254*4882a593Smuzhiyun 
ppc_cbc_decrypt(struct skcipher_request * req)255*4882a593Smuzhiyun static int ppc_cbc_decrypt(struct skcipher_request *req)
256*4882a593Smuzhiyun {
257*4882a593Smuzhiyun 	return ppc_cbc_crypt(req, false);
258*4882a593Smuzhiyun }
259*4882a593Smuzhiyun 
ppc_ctr_crypt(struct skcipher_request * req)260*4882a593Smuzhiyun static int ppc_ctr_crypt(struct skcipher_request *req)
261*4882a593Smuzhiyun {
262*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
263*4882a593Smuzhiyun 	struct ppc_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
264*4882a593Smuzhiyun 	struct skcipher_walk walk;
265*4882a593Smuzhiyun 	unsigned int nbytes;
266*4882a593Smuzhiyun 	int err;
267*4882a593Smuzhiyun 
268*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
269*4882a593Smuzhiyun 
270*4882a593Smuzhiyun 	while ((nbytes = walk.nbytes) != 0) {
271*4882a593Smuzhiyun 		nbytes = min_t(unsigned int, nbytes, MAX_BYTES);
272*4882a593Smuzhiyun 		if (nbytes < walk.total)
273*4882a593Smuzhiyun 			nbytes = round_down(nbytes, AES_BLOCK_SIZE);
274*4882a593Smuzhiyun 
275*4882a593Smuzhiyun 		spe_begin();
276*4882a593Smuzhiyun 		ppc_crypt_ctr(walk.dst.virt.addr, walk.src.virt.addr,
277*4882a593Smuzhiyun 			      ctx->key_enc, ctx->rounds, nbytes, walk.iv);
278*4882a593Smuzhiyun 		spe_end();
279*4882a593Smuzhiyun 
280*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
281*4882a593Smuzhiyun 	}
282*4882a593Smuzhiyun 
283*4882a593Smuzhiyun 	return err;
284*4882a593Smuzhiyun }
285*4882a593Smuzhiyun 
ppc_xts_crypt(struct skcipher_request * req,bool enc)286*4882a593Smuzhiyun static int ppc_xts_crypt(struct skcipher_request *req, bool enc)
287*4882a593Smuzhiyun {
288*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
289*4882a593Smuzhiyun 	struct ppc_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
290*4882a593Smuzhiyun 	struct skcipher_walk walk;
291*4882a593Smuzhiyun 	unsigned int nbytes;
292*4882a593Smuzhiyun 	int err;
293*4882a593Smuzhiyun 	u32 *twk;
294*4882a593Smuzhiyun 
295*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, false);
296*4882a593Smuzhiyun 	twk = ctx->key_twk;
297*4882a593Smuzhiyun 
298*4882a593Smuzhiyun 	while ((nbytes = walk.nbytes) != 0) {
299*4882a593Smuzhiyun 		nbytes = min_t(unsigned int, nbytes, MAX_BYTES);
300*4882a593Smuzhiyun 		nbytes = round_down(nbytes, AES_BLOCK_SIZE);
301*4882a593Smuzhiyun 
302*4882a593Smuzhiyun 		spe_begin();
303*4882a593Smuzhiyun 		if (enc)
304*4882a593Smuzhiyun 			ppc_encrypt_xts(walk.dst.virt.addr, walk.src.virt.addr,
305*4882a593Smuzhiyun 					ctx->key_enc, ctx->rounds, nbytes,
306*4882a593Smuzhiyun 					walk.iv, twk);
307*4882a593Smuzhiyun 		else
308*4882a593Smuzhiyun 			ppc_decrypt_xts(walk.dst.virt.addr, walk.src.virt.addr,
309*4882a593Smuzhiyun 					ctx->key_dec, ctx->rounds, nbytes,
310*4882a593Smuzhiyun 					walk.iv, twk);
311*4882a593Smuzhiyun 		spe_end();
312*4882a593Smuzhiyun 
313*4882a593Smuzhiyun 		twk = NULL;
314*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, walk.nbytes - nbytes);
315*4882a593Smuzhiyun 	}
316*4882a593Smuzhiyun 
317*4882a593Smuzhiyun 	return err;
318*4882a593Smuzhiyun }
319*4882a593Smuzhiyun 
ppc_xts_encrypt(struct skcipher_request * req)320*4882a593Smuzhiyun static int ppc_xts_encrypt(struct skcipher_request *req)
321*4882a593Smuzhiyun {
322*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
323*4882a593Smuzhiyun 	struct ppc_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
324*4882a593Smuzhiyun 	int tail = req->cryptlen % AES_BLOCK_SIZE;
325*4882a593Smuzhiyun 	int offset = req->cryptlen - tail - AES_BLOCK_SIZE;
326*4882a593Smuzhiyun 	struct skcipher_request subreq;
327*4882a593Smuzhiyun 	u8 b[2][AES_BLOCK_SIZE];
328*4882a593Smuzhiyun 	int err;
329*4882a593Smuzhiyun 
330*4882a593Smuzhiyun 	if (req->cryptlen < AES_BLOCK_SIZE)
331*4882a593Smuzhiyun 		return -EINVAL;
332*4882a593Smuzhiyun 
333*4882a593Smuzhiyun 	if (tail) {
334*4882a593Smuzhiyun 		subreq = *req;
335*4882a593Smuzhiyun 		skcipher_request_set_crypt(&subreq, req->src, req->dst,
336*4882a593Smuzhiyun 					   req->cryptlen - tail, req->iv);
337*4882a593Smuzhiyun 		req = &subreq;
338*4882a593Smuzhiyun 	}
339*4882a593Smuzhiyun 
340*4882a593Smuzhiyun 	err = ppc_xts_crypt(req, true);
341*4882a593Smuzhiyun 	if (err || !tail)
342*4882a593Smuzhiyun 		return err;
343*4882a593Smuzhiyun 
344*4882a593Smuzhiyun 	scatterwalk_map_and_copy(b[0], req->dst, offset, AES_BLOCK_SIZE, 0);
345*4882a593Smuzhiyun 	memcpy(b[1], b[0], tail);
346*4882a593Smuzhiyun 	scatterwalk_map_and_copy(b[0], req->src, offset + AES_BLOCK_SIZE, tail, 0);
347*4882a593Smuzhiyun 
348*4882a593Smuzhiyun 	spe_begin();
349*4882a593Smuzhiyun 	ppc_encrypt_xts(b[0], b[0], ctx->key_enc, ctx->rounds, AES_BLOCK_SIZE,
350*4882a593Smuzhiyun 			req->iv, NULL);
351*4882a593Smuzhiyun 	spe_end();
352*4882a593Smuzhiyun 
353*4882a593Smuzhiyun 	scatterwalk_map_and_copy(b[0], req->dst, offset, AES_BLOCK_SIZE + tail, 1);
354*4882a593Smuzhiyun 
355*4882a593Smuzhiyun 	return 0;
356*4882a593Smuzhiyun }
357*4882a593Smuzhiyun 
ppc_xts_decrypt(struct skcipher_request * req)358*4882a593Smuzhiyun static int ppc_xts_decrypt(struct skcipher_request *req)
359*4882a593Smuzhiyun {
360*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
361*4882a593Smuzhiyun 	struct ppc_xts_ctx *ctx = crypto_skcipher_ctx(tfm);
362*4882a593Smuzhiyun 	int tail = req->cryptlen % AES_BLOCK_SIZE;
363*4882a593Smuzhiyun 	int offset = req->cryptlen - tail - AES_BLOCK_SIZE;
364*4882a593Smuzhiyun 	struct skcipher_request subreq;
365*4882a593Smuzhiyun 	u8 b[3][AES_BLOCK_SIZE];
366*4882a593Smuzhiyun 	le128 twk;
367*4882a593Smuzhiyun 	int err;
368*4882a593Smuzhiyun 
369*4882a593Smuzhiyun 	if (req->cryptlen < AES_BLOCK_SIZE)
370*4882a593Smuzhiyun 		return -EINVAL;
371*4882a593Smuzhiyun 
372*4882a593Smuzhiyun 	if (tail) {
373*4882a593Smuzhiyun 		subreq = *req;
374*4882a593Smuzhiyun 		skcipher_request_set_crypt(&subreq, req->src, req->dst,
375*4882a593Smuzhiyun 					   offset, req->iv);
376*4882a593Smuzhiyun 		req = &subreq;
377*4882a593Smuzhiyun 	}
378*4882a593Smuzhiyun 
379*4882a593Smuzhiyun 	err = ppc_xts_crypt(req, false);
380*4882a593Smuzhiyun 	if (err || !tail)
381*4882a593Smuzhiyun 		return err;
382*4882a593Smuzhiyun 
383*4882a593Smuzhiyun 	scatterwalk_map_and_copy(b[1], req->src, offset, AES_BLOCK_SIZE + tail, 0);
384*4882a593Smuzhiyun 
385*4882a593Smuzhiyun 	spe_begin();
386*4882a593Smuzhiyun 	if (!offset)
387*4882a593Smuzhiyun 		ppc_encrypt_ecb(req->iv, req->iv, ctx->key_twk, ctx->rounds,
388*4882a593Smuzhiyun 				AES_BLOCK_SIZE);
389*4882a593Smuzhiyun 
390*4882a593Smuzhiyun 	gf128mul_x_ble(&twk, (le128 *)req->iv);
391*4882a593Smuzhiyun 
392*4882a593Smuzhiyun 	ppc_decrypt_xts(b[1], b[1], ctx->key_dec, ctx->rounds, AES_BLOCK_SIZE,
393*4882a593Smuzhiyun 			(u8 *)&twk, NULL);
394*4882a593Smuzhiyun 	memcpy(b[0], b[2], tail);
395*4882a593Smuzhiyun 	memcpy(b[0] + tail, b[1] + tail, AES_BLOCK_SIZE - tail);
396*4882a593Smuzhiyun 	ppc_decrypt_xts(b[0], b[0], ctx->key_dec, ctx->rounds, AES_BLOCK_SIZE,
397*4882a593Smuzhiyun 			req->iv, NULL);
398*4882a593Smuzhiyun 	spe_end();
399*4882a593Smuzhiyun 
400*4882a593Smuzhiyun 	scatterwalk_map_and_copy(b[0], req->dst, offset, AES_BLOCK_SIZE + tail, 1);
401*4882a593Smuzhiyun 
402*4882a593Smuzhiyun 	return 0;
403*4882a593Smuzhiyun }
404*4882a593Smuzhiyun 
405*4882a593Smuzhiyun /*
406*4882a593Smuzhiyun  * Algorithm definitions. Disabling alignment (cra_alignmask=0) was chosen
407*4882a593Smuzhiyun  * because the e500 platform can handle unaligned reads/writes very efficently.
408*4882a593Smuzhiyun  * This improves IPsec thoughput by another few percent. Additionally we assume
409*4882a593Smuzhiyun  * that AES context is always aligned to at least 8 bytes because it is created
410*4882a593Smuzhiyun  * with kmalloc() in the crypto infrastructure
411*4882a593Smuzhiyun  */
412*4882a593Smuzhiyun 
413*4882a593Smuzhiyun static struct crypto_alg aes_cipher_alg = {
414*4882a593Smuzhiyun 	.cra_name		=	"aes",
415*4882a593Smuzhiyun 	.cra_driver_name	=	"aes-ppc-spe",
416*4882a593Smuzhiyun 	.cra_priority		=	300,
417*4882a593Smuzhiyun 	.cra_flags		=	CRYPTO_ALG_TYPE_CIPHER,
418*4882a593Smuzhiyun 	.cra_blocksize		=	AES_BLOCK_SIZE,
419*4882a593Smuzhiyun 	.cra_ctxsize		=	sizeof(struct ppc_aes_ctx),
420*4882a593Smuzhiyun 	.cra_alignmask		=	0,
421*4882a593Smuzhiyun 	.cra_module		=	THIS_MODULE,
422*4882a593Smuzhiyun 	.cra_u			=	{
423*4882a593Smuzhiyun 		.cipher = {
424*4882a593Smuzhiyun 			.cia_min_keysize	=	AES_MIN_KEY_SIZE,
425*4882a593Smuzhiyun 			.cia_max_keysize	=	AES_MAX_KEY_SIZE,
426*4882a593Smuzhiyun 			.cia_setkey		=	ppc_aes_setkey,
427*4882a593Smuzhiyun 			.cia_encrypt		=	ppc_aes_encrypt,
428*4882a593Smuzhiyun 			.cia_decrypt		=	ppc_aes_decrypt
429*4882a593Smuzhiyun 		}
430*4882a593Smuzhiyun 	}
431*4882a593Smuzhiyun };
432*4882a593Smuzhiyun 
433*4882a593Smuzhiyun static struct skcipher_alg aes_skcipher_algs[] = {
434*4882a593Smuzhiyun 	{
435*4882a593Smuzhiyun 		.base.cra_name		=	"ecb(aes)",
436*4882a593Smuzhiyun 		.base.cra_driver_name	=	"ecb-ppc-spe",
437*4882a593Smuzhiyun 		.base.cra_priority	=	300,
438*4882a593Smuzhiyun 		.base.cra_blocksize	=	AES_BLOCK_SIZE,
439*4882a593Smuzhiyun 		.base.cra_ctxsize	=	sizeof(struct ppc_aes_ctx),
440*4882a593Smuzhiyun 		.base.cra_module	=	THIS_MODULE,
441*4882a593Smuzhiyun 		.min_keysize		=	AES_MIN_KEY_SIZE,
442*4882a593Smuzhiyun 		.max_keysize		=	AES_MAX_KEY_SIZE,
443*4882a593Smuzhiyun 		.setkey			=	ppc_aes_setkey_skcipher,
444*4882a593Smuzhiyun 		.encrypt		=	ppc_ecb_encrypt,
445*4882a593Smuzhiyun 		.decrypt		=	ppc_ecb_decrypt,
446*4882a593Smuzhiyun 	}, {
447*4882a593Smuzhiyun 		.base.cra_name		=	"cbc(aes)",
448*4882a593Smuzhiyun 		.base.cra_driver_name	=	"cbc-ppc-spe",
449*4882a593Smuzhiyun 		.base.cra_priority	=	300,
450*4882a593Smuzhiyun 		.base.cra_blocksize	=	AES_BLOCK_SIZE,
451*4882a593Smuzhiyun 		.base.cra_ctxsize	=	sizeof(struct ppc_aes_ctx),
452*4882a593Smuzhiyun 		.base.cra_module	=	THIS_MODULE,
453*4882a593Smuzhiyun 		.min_keysize		=	AES_MIN_KEY_SIZE,
454*4882a593Smuzhiyun 		.max_keysize		=	AES_MAX_KEY_SIZE,
455*4882a593Smuzhiyun 		.ivsize			=	AES_BLOCK_SIZE,
456*4882a593Smuzhiyun 		.setkey			=	ppc_aes_setkey_skcipher,
457*4882a593Smuzhiyun 		.encrypt		=	ppc_cbc_encrypt,
458*4882a593Smuzhiyun 		.decrypt		=	ppc_cbc_decrypt,
459*4882a593Smuzhiyun 	}, {
460*4882a593Smuzhiyun 		.base.cra_name		=	"ctr(aes)",
461*4882a593Smuzhiyun 		.base.cra_driver_name	=	"ctr-ppc-spe",
462*4882a593Smuzhiyun 		.base.cra_priority	=	300,
463*4882a593Smuzhiyun 		.base.cra_blocksize	=	1,
464*4882a593Smuzhiyun 		.base.cra_ctxsize	=	sizeof(struct ppc_aes_ctx),
465*4882a593Smuzhiyun 		.base.cra_module	=	THIS_MODULE,
466*4882a593Smuzhiyun 		.min_keysize		=	AES_MIN_KEY_SIZE,
467*4882a593Smuzhiyun 		.max_keysize		=	AES_MAX_KEY_SIZE,
468*4882a593Smuzhiyun 		.ivsize			=	AES_BLOCK_SIZE,
469*4882a593Smuzhiyun 		.setkey			=	ppc_aes_setkey_skcipher,
470*4882a593Smuzhiyun 		.encrypt		=	ppc_ctr_crypt,
471*4882a593Smuzhiyun 		.decrypt		=	ppc_ctr_crypt,
472*4882a593Smuzhiyun 		.chunksize		=	AES_BLOCK_SIZE,
473*4882a593Smuzhiyun 	}, {
474*4882a593Smuzhiyun 		.base.cra_name		=	"xts(aes)",
475*4882a593Smuzhiyun 		.base.cra_driver_name	=	"xts-ppc-spe",
476*4882a593Smuzhiyun 		.base.cra_priority	=	300,
477*4882a593Smuzhiyun 		.base.cra_blocksize	=	AES_BLOCK_SIZE,
478*4882a593Smuzhiyun 		.base.cra_ctxsize	=	sizeof(struct ppc_xts_ctx),
479*4882a593Smuzhiyun 		.base.cra_module	=	THIS_MODULE,
480*4882a593Smuzhiyun 		.min_keysize		=	AES_MIN_KEY_SIZE * 2,
481*4882a593Smuzhiyun 		.max_keysize		=	AES_MAX_KEY_SIZE * 2,
482*4882a593Smuzhiyun 		.ivsize			=	AES_BLOCK_SIZE,
483*4882a593Smuzhiyun 		.setkey			=	ppc_xts_setkey,
484*4882a593Smuzhiyun 		.encrypt		=	ppc_xts_encrypt,
485*4882a593Smuzhiyun 		.decrypt		=	ppc_xts_decrypt,
486*4882a593Smuzhiyun 	}
487*4882a593Smuzhiyun };
488*4882a593Smuzhiyun 
ppc_aes_mod_init(void)489*4882a593Smuzhiyun static int __init ppc_aes_mod_init(void)
490*4882a593Smuzhiyun {
491*4882a593Smuzhiyun 	int err;
492*4882a593Smuzhiyun 
493*4882a593Smuzhiyun 	err = crypto_register_alg(&aes_cipher_alg);
494*4882a593Smuzhiyun 	if (err)
495*4882a593Smuzhiyun 		return err;
496*4882a593Smuzhiyun 
497*4882a593Smuzhiyun 	err = crypto_register_skciphers(aes_skcipher_algs,
498*4882a593Smuzhiyun 					ARRAY_SIZE(aes_skcipher_algs));
499*4882a593Smuzhiyun 	if (err)
500*4882a593Smuzhiyun 		crypto_unregister_alg(&aes_cipher_alg);
501*4882a593Smuzhiyun 	return err;
502*4882a593Smuzhiyun }
503*4882a593Smuzhiyun 
ppc_aes_mod_fini(void)504*4882a593Smuzhiyun static void __exit ppc_aes_mod_fini(void)
505*4882a593Smuzhiyun {
506*4882a593Smuzhiyun 	crypto_unregister_alg(&aes_cipher_alg);
507*4882a593Smuzhiyun 	crypto_unregister_skciphers(aes_skcipher_algs,
508*4882a593Smuzhiyun 				    ARRAY_SIZE(aes_skcipher_algs));
509*4882a593Smuzhiyun }
510*4882a593Smuzhiyun 
511*4882a593Smuzhiyun module_init(ppc_aes_mod_init);
512*4882a593Smuzhiyun module_exit(ppc_aes_mod_fini);
513*4882a593Smuzhiyun 
514*4882a593Smuzhiyun MODULE_LICENSE("GPL");
515*4882a593Smuzhiyun MODULE_DESCRIPTION("AES-ECB/CBC/CTR/XTS, SPE optimized");
516*4882a593Smuzhiyun 
517*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("aes");
518*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("ecb(aes)");
519*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("cbc(aes)");
520*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("ctr(aes)");
521*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("xts(aes)");
522*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("aes-ppc-spe");
523