1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-only
2*4882a593Smuzhiyun /* Glue code for DES encryption optimized for sparc64 crypto opcodes.
3*4882a593Smuzhiyun *
4*4882a593Smuzhiyun * Copyright (C) 2012 David S. Miller <davem@davemloft.net>
5*4882a593Smuzhiyun */
6*4882a593Smuzhiyun
7*4882a593Smuzhiyun #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
8*4882a593Smuzhiyun
9*4882a593Smuzhiyun #include <linux/crypto.h>
10*4882a593Smuzhiyun #include <linux/init.h>
11*4882a593Smuzhiyun #include <linux/module.h>
12*4882a593Smuzhiyun #include <linux/mm.h>
13*4882a593Smuzhiyun #include <linux/types.h>
14*4882a593Smuzhiyun #include <crypto/algapi.h>
15*4882a593Smuzhiyun #include <crypto/internal/des.h>
16*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
17*4882a593Smuzhiyun
18*4882a593Smuzhiyun #include <asm/fpumacro.h>
19*4882a593Smuzhiyun #include <asm/pstate.h>
20*4882a593Smuzhiyun #include <asm/elf.h>
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun #include "opcodes.h"
23*4882a593Smuzhiyun
24*4882a593Smuzhiyun struct des_sparc64_ctx {
25*4882a593Smuzhiyun u64 encrypt_expkey[DES_EXPKEY_WORDS / 2];
26*4882a593Smuzhiyun u64 decrypt_expkey[DES_EXPKEY_WORDS / 2];
27*4882a593Smuzhiyun };
28*4882a593Smuzhiyun
29*4882a593Smuzhiyun struct des3_ede_sparc64_ctx {
30*4882a593Smuzhiyun u64 encrypt_expkey[DES3_EDE_EXPKEY_WORDS / 2];
31*4882a593Smuzhiyun u64 decrypt_expkey[DES3_EDE_EXPKEY_WORDS / 2];
32*4882a593Smuzhiyun };
33*4882a593Smuzhiyun
encrypt_to_decrypt(u64 * d,const u64 * e)34*4882a593Smuzhiyun static void encrypt_to_decrypt(u64 *d, const u64 *e)
35*4882a593Smuzhiyun {
36*4882a593Smuzhiyun const u64 *s = e + (DES_EXPKEY_WORDS / 2) - 1;
37*4882a593Smuzhiyun int i;
38*4882a593Smuzhiyun
39*4882a593Smuzhiyun for (i = 0; i < DES_EXPKEY_WORDS / 2; i++)
40*4882a593Smuzhiyun *d++ = *s--;
41*4882a593Smuzhiyun }
42*4882a593Smuzhiyun
43*4882a593Smuzhiyun extern void des_sparc64_key_expand(const u32 *input_key, u64 *key);
44*4882a593Smuzhiyun
des_set_key(struct crypto_tfm * tfm,const u8 * key,unsigned int keylen)45*4882a593Smuzhiyun static int des_set_key(struct crypto_tfm *tfm, const u8 *key,
46*4882a593Smuzhiyun unsigned int keylen)
47*4882a593Smuzhiyun {
48*4882a593Smuzhiyun struct des_sparc64_ctx *dctx = crypto_tfm_ctx(tfm);
49*4882a593Smuzhiyun int err;
50*4882a593Smuzhiyun
51*4882a593Smuzhiyun /* Even though we have special instructions for key expansion,
52*4882a593Smuzhiyun * we call des_verify_key() so that we don't have to write our own
53*4882a593Smuzhiyun * weak key detection code.
54*4882a593Smuzhiyun */
55*4882a593Smuzhiyun err = crypto_des_verify_key(tfm, key);
56*4882a593Smuzhiyun if (err)
57*4882a593Smuzhiyun return err;
58*4882a593Smuzhiyun
59*4882a593Smuzhiyun des_sparc64_key_expand((const u32 *) key, &dctx->encrypt_expkey[0]);
60*4882a593Smuzhiyun encrypt_to_decrypt(&dctx->decrypt_expkey[0], &dctx->encrypt_expkey[0]);
61*4882a593Smuzhiyun
62*4882a593Smuzhiyun return 0;
63*4882a593Smuzhiyun }
64*4882a593Smuzhiyun
des_set_key_skcipher(struct crypto_skcipher * tfm,const u8 * key,unsigned int keylen)65*4882a593Smuzhiyun static int des_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *key,
66*4882a593Smuzhiyun unsigned int keylen)
67*4882a593Smuzhiyun {
68*4882a593Smuzhiyun return des_set_key(crypto_skcipher_tfm(tfm), key, keylen);
69*4882a593Smuzhiyun }
70*4882a593Smuzhiyun
71*4882a593Smuzhiyun extern void des_sparc64_crypt(const u64 *key, const u64 *input,
72*4882a593Smuzhiyun u64 *output);
73*4882a593Smuzhiyun
sparc_des_encrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)74*4882a593Smuzhiyun static void sparc_des_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
75*4882a593Smuzhiyun {
76*4882a593Smuzhiyun struct des_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
77*4882a593Smuzhiyun const u64 *K = ctx->encrypt_expkey;
78*4882a593Smuzhiyun
79*4882a593Smuzhiyun des_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
80*4882a593Smuzhiyun }
81*4882a593Smuzhiyun
sparc_des_decrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)82*4882a593Smuzhiyun static void sparc_des_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
83*4882a593Smuzhiyun {
84*4882a593Smuzhiyun struct des_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
85*4882a593Smuzhiyun const u64 *K = ctx->decrypt_expkey;
86*4882a593Smuzhiyun
87*4882a593Smuzhiyun des_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
88*4882a593Smuzhiyun }
89*4882a593Smuzhiyun
90*4882a593Smuzhiyun extern void des_sparc64_load_keys(const u64 *key);
91*4882a593Smuzhiyun
92*4882a593Smuzhiyun extern void des_sparc64_ecb_crypt(const u64 *input, u64 *output,
93*4882a593Smuzhiyun unsigned int len);
94*4882a593Smuzhiyun
__ecb_crypt(struct skcipher_request * req,bool encrypt)95*4882a593Smuzhiyun static int __ecb_crypt(struct skcipher_request *req, bool encrypt)
96*4882a593Smuzhiyun {
97*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
98*4882a593Smuzhiyun const struct des_sparc64_ctx *ctx = crypto_skcipher_ctx(tfm);
99*4882a593Smuzhiyun struct skcipher_walk walk;
100*4882a593Smuzhiyun unsigned int nbytes;
101*4882a593Smuzhiyun int err;
102*4882a593Smuzhiyun
103*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, true);
104*4882a593Smuzhiyun if (err)
105*4882a593Smuzhiyun return err;
106*4882a593Smuzhiyun
107*4882a593Smuzhiyun if (encrypt)
108*4882a593Smuzhiyun des_sparc64_load_keys(&ctx->encrypt_expkey[0]);
109*4882a593Smuzhiyun else
110*4882a593Smuzhiyun des_sparc64_load_keys(&ctx->decrypt_expkey[0]);
111*4882a593Smuzhiyun while ((nbytes = walk.nbytes) != 0) {
112*4882a593Smuzhiyun des_sparc64_ecb_crypt(walk.src.virt.addr, walk.dst.virt.addr,
113*4882a593Smuzhiyun round_down(nbytes, DES_BLOCK_SIZE));
114*4882a593Smuzhiyun err = skcipher_walk_done(&walk, nbytes % DES_BLOCK_SIZE);
115*4882a593Smuzhiyun }
116*4882a593Smuzhiyun fprs_write(0);
117*4882a593Smuzhiyun return err;
118*4882a593Smuzhiyun }
119*4882a593Smuzhiyun
ecb_encrypt(struct skcipher_request * req)120*4882a593Smuzhiyun static int ecb_encrypt(struct skcipher_request *req)
121*4882a593Smuzhiyun {
122*4882a593Smuzhiyun return __ecb_crypt(req, true);
123*4882a593Smuzhiyun }
124*4882a593Smuzhiyun
ecb_decrypt(struct skcipher_request * req)125*4882a593Smuzhiyun static int ecb_decrypt(struct skcipher_request *req)
126*4882a593Smuzhiyun {
127*4882a593Smuzhiyun return __ecb_crypt(req, false);
128*4882a593Smuzhiyun }
129*4882a593Smuzhiyun
130*4882a593Smuzhiyun extern void des_sparc64_cbc_encrypt(const u64 *input, u64 *output,
131*4882a593Smuzhiyun unsigned int len, u64 *iv);
132*4882a593Smuzhiyun
133*4882a593Smuzhiyun extern void des_sparc64_cbc_decrypt(const u64 *input, u64 *output,
134*4882a593Smuzhiyun unsigned int len, u64 *iv);
135*4882a593Smuzhiyun
__cbc_crypt(struct skcipher_request * req,bool encrypt)136*4882a593Smuzhiyun static int __cbc_crypt(struct skcipher_request *req, bool encrypt)
137*4882a593Smuzhiyun {
138*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
139*4882a593Smuzhiyun const struct des_sparc64_ctx *ctx = crypto_skcipher_ctx(tfm);
140*4882a593Smuzhiyun struct skcipher_walk walk;
141*4882a593Smuzhiyun unsigned int nbytes;
142*4882a593Smuzhiyun int err;
143*4882a593Smuzhiyun
144*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, true);
145*4882a593Smuzhiyun if (err)
146*4882a593Smuzhiyun return err;
147*4882a593Smuzhiyun
148*4882a593Smuzhiyun if (encrypt)
149*4882a593Smuzhiyun des_sparc64_load_keys(&ctx->encrypt_expkey[0]);
150*4882a593Smuzhiyun else
151*4882a593Smuzhiyun des_sparc64_load_keys(&ctx->decrypt_expkey[0]);
152*4882a593Smuzhiyun while ((nbytes = walk.nbytes) != 0) {
153*4882a593Smuzhiyun if (encrypt)
154*4882a593Smuzhiyun des_sparc64_cbc_encrypt(walk.src.virt.addr,
155*4882a593Smuzhiyun walk.dst.virt.addr,
156*4882a593Smuzhiyun round_down(nbytes,
157*4882a593Smuzhiyun DES_BLOCK_SIZE),
158*4882a593Smuzhiyun walk.iv);
159*4882a593Smuzhiyun else
160*4882a593Smuzhiyun des_sparc64_cbc_decrypt(walk.src.virt.addr,
161*4882a593Smuzhiyun walk.dst.virt.addr,
162*4882a593Smuzhiyun round_down(nbytes,
163*4882a593Smuzhiyun DES_BLOCK_SIZE),
164*4882a593Smuzhiyun walk.iv);
165*4882a593Smuzhiyun err = skcipher_walk_done(&walk, nbytes % DES_BLOCK_SIZE);
166*4882a593Smuzhiyun }
167*4882a593Smuzhiyun fprs_write(0);
168*4882a593Smuzhiyun return err;
169*4882a593Smuzhiyun }
170*4882a593Smuzhiyun
cbc_encrypt(struct skcipher_request * req)171*4882a593Smuzhiyun static int cbc_encrypt(struct skcipher_request *req)
172*4882a593Smuzhiyun {
173*4882a593Smuzhiyun return __cbc_crypt(req, true);
174*4882a593Smuzhiyun }
175*4882a593Smuzhiyun
cbc_decrypt(struct skcipher_request * req)176*4882a593Smuzhiyun static int cbc_decrypt(struct skcipher_request *req)
177*4882a593Smuzhiyun {
178*4882a593Smuzhiyun return __cbc_crypt(req, false);
179*4882a593Smuzhiyun }
180*4882a593Smuzhiyun
des3_ede_set_key(struct crypto_tfm * tfm,const u8 * key,unsigned int keylen)181*4882a593Smuzhiyun static int des3_ede_set_key(struct crypto_tfm *tfm, const u8 *key,
182*4882a593Smuzhiyun unsigned int keylen)
183*4882a593Smuzhiyun {
184*4882a593Smuzhiyun struct des3_ede_sparc64_ctx *dctx = crypto_tfm_ctx(tfm);
185*4882a593Smuzhiyun u64 k1[DES_EXPKEY_WORDS / 2];
186*4882a593Smuzhiyun u64 k2[DES_EXPKEY_WORDS / 2];
187*4882a593Smuzhiyun u64 k3[DES_EXPKEY_WORDS / 2];
188*4882a593Smuzhiyun int err;
189*4882a593Smuzhiyun
190*4882a593Smuzhiyun err = crypto_des3_ede_verify_key(tfm, key);
191*4882a593Smuzhiyun if (err)
192*4882a593Smuzhiyun return err;
193*4882a593Smuzhiyun
194*4882a593Smuzhiyun des_sparc64_key_expand((const u32 *)key, k1);
195*4882a593Smuzhiyun key += DES_KEY_SIZE;
196*4882a593Smuzhiyun des_sparc64_key_expand((const u32 *)key, k2);
197*4882a593Smuzhiyun key += DES_KEY_SIZE;
198*4882a593Smuzhiyun des_sparc64_key_expand((const u32 *)key, k3);
199*4882a593Smuzhiyun
200*4882a593Smuzhiyun memcpy(&dctx->encrypt_expkey[0], &k1[0], sizeof(k1));
201*4882a593Smuzhiyun encrypt_to_decrypt(&dctx->encrypt_expkey[DES_EXPKEY_WORDS / 2], &k2[0]);
202*4882a593Smuzhiyun memcpy(&dctx->encrypt_expkey[(DES_EXPKEY_WORDS / 2) * 2],
203*4882a593Smuzhiyun &k3[0], sizeof(k3));
204*4882a593Smuzhiyun
205*4882a593Smuzhiyun encrypt_to_decrypt(&dctx->decrypt_expkey[0], &k3[0]);
206*4882a593Smuzhiyun memcpy(&dctx->decrypt_expkey[DES_EXPKEY_WORDS / 2],
207*4882a593Smuzhiyun &k2[0], sizeof(k2));
208*4882a593Smuzhiyun encrypt_to_decrypt(&dctx->decrypt_expkey[(DES_EXPKEY_WORDS / 2) * 2],
209*4882a593Smuzhiyun &k1[0]);
210*4882a593Smuzhiyun
211*4882a593Smuzhiyun return 0;
212*4882a593Smuzhiyun }
213*4882a593Smuzhiyun
des3_ede_set_key_skcipher(struct crypto_skcipher * tfm,const u8 * key,unsigned int keylen)214*4882a593Smuzhiyun static int des3_ede_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *key,
215*4882a593Smuzhiyun unsigned int keylen)
216*4882a593Smuzhiyun {
217*4882a593Smuzhiyun return des3_ede_set_key(crypto_skcipher_tfm(tfm), key, keylen);
218*4882a593Smuzhiyun }
219*4882a593Smuzhiyun
220*4882a593Smuzhiyun extern void des3_ede_sparc64_crypt(const u64 *key, const u64 *input,
221*4882a593Smuzhiyun u64 *output);
222*4882a593Smuzhiyun
sparc_des3_ede_encrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)223*4882a593Smuzhiyun static void sparc_des3_ede_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
224*4882a593Smuzhiyun {
225*4882a593Smuzhiyun struct des3_ede_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
226*4882a593Smuzhiyun const u64 *K = ctx->encrypt_expkey;
227*4882a593Smuzhiyun
228*4882a593Smuzhiyun des3_ede_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
229*4882a593Smuzhiyun }
230*4882a593Smuzhiyun
sparc_des3_ede_decrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)231*4882a593Smuzhiyun static void sparc_des3_ede_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
232*4882a593Smuzhiyun {
233*4882a593Smuzhiyun struct des3_ede_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
234*4882a593Smuzhiyun const u64 *K = ctx->decrypt_expkey;
235*4882a593Smuzhiyun
236*4882a593Smuzhiyun des3_ede_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
237*4882a593Smuzhiyun }
238*4882a593Smuzhiyun
239*4882a593Smuzhiyun extern void des3_ede_sparc64_load_keys(const u64 *key);
240*4882a593Smuzhiyun
241*4882a593Smuzhiyun extern void des3_ede_sparc64_ecb_crypt(const u64 *expkey, const u64 *input,
242*4882a593Smuzhiyun u64 *output, unsigned int len);
243*4882a593Smuzhiyun
__ecb3_crypt(struct skcipher_request * req,bool encrypt)244*4882a593Smuzhiyun static int __ecb3_crypt(struct skcipher_request *req, bool encrypt)
245*4882a593Smuzhiyun {
246*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
247*4882a593Smuzhiyun const struct des3_ede_sparc64_ctx *ctx = crypto_skcipher_ctx(tfm);
248*4882a593Smuzhiyun struct skcipher_walk walk;
249*4882a593Smuzhiyun const u64 *K;
250*4882a593Smuzhiyun unsigned int nbytes;
251*4882a593Smuzhiyun int err;
252*4882a593Smuzhiyun
253*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, true);
254*4882a593Smuzhiyun if (err)
255*4882a593Smuzhiyun return err;
256*4882a593Smuzhiyun
257*4882a593Smuzhiyun if (encrypt)
258*4882a593Smuzhiyun K = &ctx->encrypt_expkey[0];
259*4882a593Smuzhiyun else
260*4882a593Smuzhiyun K = &ctx->decrypt_expkey[0];
261*4882a593Smuzhiyun des3_ede_sparc64_load_keys(K);
262*4882a593Smuzhiyun while ((nbytes = walk.nbytes) != 0) {
263*4882a593Smuzhiyun des3_ede_sparc64_ecb_crypt(K, walk.src.virt.addr,
264*4882a593Smuzhiyun walk.dst.virt.addr,
265*4882a593Smuzhiyun round_down(nbytes, DES_BLOCK_SIZE));
266*4882a593Smuzhiyun err = skcipher_walk_done(&walk, nbytes % DES_BLOCK_SIZE);
267*4882a593Smuzhiyun }
268*4882a593Smuzhiyun fprs_write(0);
269*4882a593Smuzhiyun return err;
270*4882a593Smuzhiyun }
271*4882a593Smuzhiyun
ecb3_encrypt(struct skcipher_request * req)272*4882a593Smuzhiyun static int ecb3_encrypt(struct skcipher_request *req)
273*4882a593Smuzhiyun {
274*4882a593Smuzhiyun return __ecb3_crypt(req, true);
275*4882a593Smuzhiyun }
276*4882a593Smuzhiyun
ecb3_decrypt(struct skcipher_request * req)277*4882a593Smuzhiyun static int ecb3_decrypt(struct skcipher_request *req)
278*4882a593Smuzhiyun {
279*4882a593Smuzhiyun return __ecb3_crypt(req, false);
280*4882a593Smuzhiyun }
281*4882a593Smuzhiyun
282*4882a593Smuzhiyun extern void des3_ede_sparc64_cbc_encrypt(const u64 *expkey, const u64 *input,
283*4882a593Smuzhiyun u64 *output, unsigned int len,
284*4882a593Smuzhiyun u64 *iv);
285*4882a593Smuzhiyun
286*4882a593Smuzhiyun extern void des3_ede_sparc64_cbc_decrypt(const u64 *expkey, const u64 *input,
287*4882a593Smuzhiyun u64 *output, unsigned int len,
288*4882a593Smuzhiyun u64 *iv);
289*4882a593Smuzhiyun
__cbc3_crypt(struct skcipher_request * req,bool encrypt)290*4882a593Smuzhiyun static int __cbc3_crypt(struct skcipher_request *req, bool encrypt)
291*4882a593Smuzhiyun {
292*4882a593Smuzhiyun struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
293*4882a593Smuzhiyun const struct des3_ede_sparc64_ctx *ctx = crypto_skcipher_ctx(tfm);
294*4882a593Smuzhiyun struct skcipher_walk walk;
295*4882a593Smuzhiyun const u64 *K;
296*4882a593Smuzhiyun unsigned int nbytes;
297*4882a593Smuzhiyun int err;
298*4882a593Smuzhiyun
299*4882a593Smuzhiyun err = skcipher_walk_virt(&walk, req, true);
300*4882a593Smuzhiyun if (err)
301*4882a593Smuzhiyun return err;
302*4882a593Smuzhiyun
303*4882a593Smuzhiyun if (encrypt)
304*4882a593Smuzhiyun K = &ctx->encrypt_expkey[0];
305*4882a593Smuzhiyun else
306*4882a593Smuzhiyun K = &ctx->decrypt_expkey[0];
307*4882a593Smuzhiyun des3_ede_sparc64_load_keys(K);
308*4882a593Smuzhiyun while ((nbytes = walk.nbytes) != 0) {
309*4882a593Smuzhiyun if (encrypt)
310*4882a593Smuzhiyun des3_ede_sparc64_cbc_encrypt(K, walk.src.virt.addr,
311*4882a593Smuzhiyun walk.dst.virt.addr,
312*4882a593Smuzhiyun round_down(nbytes,
313*4882a593Smuzhiyun DES_BLOCK_SIZE),
314*4882a593Smuzhiyun walk.iv);
315*4882a593Smuzhiyun else
316*4882a593Smuzhiyun des3_ede_sparc64_cbc_decrypt(K, walk.src.virt.addr,
317*4882a593Smuzhiyun walk.dst.virt.addr,
318*4882a593Smuzhiyun round_down(nbytes,
319*4882a593Smuzhiyun DES_BLOCK_SIZE),
320*4882a593Smuzhiyun walk.iv);
321*4882a593Smuzhiyun err = skcipher_walk_done(&walk, nbytes % DES_BLOCK_SIZE);
322*4882a593Smuzhiyun }
323*4882a593Smuzhiyun fprs_write(0);
324*4882a593Smuzhiyun return err;
325*4882a593Smuzhiyun }
326*4882a593Smuzhiyun
cbc3_encrypt(struct skcipher_request * req)327*4882a593Smuzhiyun static int cbc3_encrypt(struct skcipher_request *req)
328*4882a593Smuzhiyun {
329*4882a593Smuzhiyun return __cbc3_crypt(req, true);
330*4882a593Smuzhiyun }
331*4882a593Smuzhiyun
cbc3_decrypt(struct skcipher_request * req)332*4882a593Smuzhiyun static int cbc3_decrypt(struct skcipher_request *req)
333*4882a593Smuzhiyun {
334*4882a593Smuzhiyun return __cbc3_crypt(req, false);
335*4882a593Smuzhiyun }
336*4882a593Smuzhiyun
337*4882a593Smuzhiyun static struct crypto_alg cipher_algs[] = {
338*4882a593Smuzhiyun {
339*4882a593Smuzhiyun .cra_name = "des",
340*4882a593Smuzhiyun .cra_driver_name = "des-sparc64",
341*4882a593Smuzhiyun .cra_priority = SPARC_CR_OPCODE_PRIORITY,
342*4882a593Smuzhiyun .cra_flags = CRYPTO_ALG_TYPE_CIPHER,
343*4882a593Smuzhiyun .cra_blocksize = DES_BLOCK_SIZE,
344*4882a593Smuzhiyun .cra_ctxsize = sizeof(struct des_sparc64_ctx),
345*4882a593Smuzhiyun .cra_alignmask = 7,
346*4882a593Smuzhiyun .cra_module = THIS_MODULE,
347*4882a593Smuzhiyun .cra_u = {
348*4882a593Smuzhiyun .cipher = {
349*4882a593Smuzhiyun .cia_min_keysize = DES_KEY_SIZE,
350*4882a593Smuzhiyun .cia_max_keysize = DES_KEY_SIZE,
351*4882a593Smuzhiyun .cia_setkey = des_set_key,
352*4882a593Smuzhiyun .cia_encrypt = sparc_des_encrypt,
353*4882a593Smuzhiyun .cia_decrypt = sparc_des_decrypt
354*4882a593Smuzhiyun }
355*4882a593Smuzhiyun }
356*4882a593Smuzhiyun }, {
357*4882a593Smuzhiyun .cra_name = "des3_ede",
358*4882a593Smuzhiyun .cra_driver_name = "des3_ede-sparc64",
359*4882a593Smuzhiyun .cra_priority = SPARC_CR_OPCODE_PRIORITY,
360*4882a593Smuzhiyun .cra_flags = CRYPTO_ALG_TYPE_CIPHER,
361*4882a593Smuzhiyun .cra_blocksize = DES3_EDE_BLOCK_SIZE,
362*4882a593Smuzhiyun .cra_ctxsize = sizeof(struct des3_ede_sparc64_ctx),
363*4882a593Smuzhiyun .cra_alignmask = 7,
364*4882a593Smuzhiyun .cra_module = THIS_MODULE,
365*4882a593Smuzhiyun .cra_u = {
366*4882a593Smuzhiyun .cipher = {
367*4882a593Smuzhiyun .cia_min_keysize = DES3_EDE_KEY_SIZE,
368*4882a593Smuzhiyun .cia_max_keysize = DES3_EDE_KEY_SIZE,
369*4882a593Smuzhiyun .cia_setkey = des3_ede_set_key,
370*4882a593Smuzhiyun .cia_encrypt = sparc_des3_ede_encrypt,
371*4882a593Smuzhiyun .cia_decrypt = sparc_des3_ede_decrypt
372*4882a593Smuzhiyun }
373*4882a593Smuzhiyun }
374*4882a593Smuzhiyun }
375*4882a593Smuzhiyun };
376*4882a593Smuzhiyun
377*4882a593Smuzhiyun static struct skcipher_alg skcipher_algs[] = {
378*4882a593Smuzhiyun {
379*4882a593Smuzhiyun .base.cra_name = "ecb(des)",
380*4882a593Smuzhiyun .base.cra_driver_name = "ecb-des-sparc64",
381*4882a593Smuzhiyun .base.cra_priority = SPARC_CR_OPCODE_PRIORITY,
382*4882a593Smuzhiyun .base.cra_blocksize = DES_BLOCK_SIZE,
383*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct des_sparc64_ctx),
384*4882a593Smuzhiyun .base.cra_alignmask = 7,
385*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
386*4882a593Smuzhiyun .min_keysize = DES_KEY_SIZE,
387*4882a593Smuzhiyun .max_keysize = DES_KEY_SIZE,
388*4882a593Smuzhiyun .setkey = des_set_key_skcipher,
389*4882a593Smuzhiyun .encrypt = ecb_encrypt,
390*4882a593Smuzhiyun .decrypt = ecb_decrypt,
391*4882a593Smuzhiyun }, {
392*4882a593Smuzhiyun .base.cra_name = "cbc(des)",
393*4882a593Smuzhiyun .base.cra_driver_name = "cbc-des-sparc64",
394*4882a593Smuzhiyun .base.cra_priority = SPARC_CR_OPCODE_PRIORITY,
395*4882a593Smuzhiyun .base.cra_blocksize = DES_BLOCK_SIZE,
396*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct des_sparc64_ctx),
397*4882a593Smuzhiyun .base.cra_alignmask = 7,
398*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
399*4882a593Smuzhiyun .min_keysize = DES_KEY_SIZE,
400*4882a593Smuzhiyun .max_keysize = DES_KEY_SIZE,
401*4882a593Smuzhiyun .ivsize = DES_BLOCK_SIZE,
402*4882a593Smuzhiyun .setkey = des_set_key_skcipher,
403*4882a593Smuzhiyun .encrypt = cbc_encrypt,
404*4882a593Smuzhiyun .decrypt = cbc_decrypt,
405*4882a593Smuzhiyun }, {
406*4882a593Smuzhiyun .base.cra_name = "ecb(des3_ede)",
407*4882a593Smuzhiyun .base.cra_driver_name = "ecb-des3_ede-sparc64",
408*4882a593Smuzhiyun .base.cra_priority = SPARC_CR_OPCODE_PRIORITY,
409*4882a593Smuzhiyun .base.cra_blocksize = DES3_EDE_BLOCK_SIZE,
410*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct des3_ede_sparc64_ctx),
411*4882a593Smuzhiyun .base.cra_alignmask = 7,
412*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
413*4882a593Smuzhiyun .min_keysize = DES3_EDE_KEY_SIZE,
414*4882a593Smuzhiyun .max_keysize = DES3_EDE_KEY_SIZE,
415*4882a593Smuzhiyun .setkey = des3_ede_set_key_skcipher,
416*4882a593Smuzhiyun .encrypt = ecb3_encrypt,
417*4882a593Smuzhiyun .decrypt = ecb3_decrypt,
418*4882a593Smuzhiyun }, {
419*4882a593Smuzhiyun .base.cra_name = "cbc(des3_ede)",
420*4882a593Smuzhiyun .base.cra_driver_name = "cbc-des3_ede-sparc64",
421*4882a593Smuzhiyun .base.cra_priority = SPARC_CR_OPCODE_PRIORITY,
422*4882a593Smuzhiyun .base.cra_blocksize = DES3_EDE_BLOCK_SIZE,
423*4882a593Smuzhiyun .base.cra_ctxsize = sizeof(struct des3_ede_sparc64_ctx),
424*4882a593Smuzhiyun .base.cra_alignmask = 7,
425*4882a593Smuzhiyun .base.cra_module = THIS_MODULE,
426*4882a593Smuzhiyun .min_keysize = DES3_EDE_KEY_SIZE,
427*4882a593Smuzhiyun .max_keysize = DES3_EDE_KEY_SIZE,
428*4882a593Smuzhiyun .ivsize = DES3_EDE_BLOCK_SIZE,
429*4882a593Smuzhiyun .setkey = des3_ede_set_key_skcipher,
430*4882a593Smuzhiyun .encrypt = cbc3_encrypt,
431*4882a593Smuzhiyun .decrypt = cbc3_decrypt,
432*4882a593Smuzhiyun }
433*4882a593Smuzhiyun };
434*4882a593Smuzhiyun
sparc64_has_des_opcode(void)435*4882a593Smuzhiyun static bool __init sparc64_has_des_opcode(void)
436*4882a593Smuzhiyun {
437*4882a593Smuzhiyun unsigned long cfr;
438*4882a593Smuzhiyun
439*4882a593Smuzhiyun if (!(sparc64_elf_hwcap & HWCAP_SPARC_CRYPTO))
440*4882a593Smuzhiyun return false;
441*4882a593Smuzhiyun
442*4882a593Smuzhiyun __asm__ __volatile__("rd %%asr26, %0" : "=r" (cfr));
443*4882a593Smuzhiyun if (!(cfr & CFR_DES))
444*4882a593Smuzhiyun return false;
445*4882a593Smuzhiyun
446*4882a593Smuzhiyun return true;
447*4882a593Smuzhiyun }
448*4882a593Smuzhiyun
des_sparc64_mod_init(void)449*4882a593Smuzhiyun static int __init des_sparc64_mod_init(void)
450*4882a593Smuzhiyun {
451*4882a593Smuzhiyun int err;
452*4882a593Smuzhiyun
453*4882a593Smuzhiyun if (!sparc64_has_des_opcode()) {
454*4882a593Smuzhiyun pr_info("sparc64 des opcodes not available.\n");
455*4882a593Smuzhiyun return -ENODEV;
456*4882a593Smuzhiyun }
457*4882a593Smuzhiyun pr_info("Using sparc64 des opcodes optimized DES implementation\n");
458*4882a593Smuzhiyun err = crypto_register_algs(cipher_algs, ARRAY_SIZE(cipher_algs));
459*4882a593Smuzhiyun if (err)
460*4882a593Smuzhiyun return err;
461*4882a593Smuzhiyun err = crypto_register_skciphers(skcipher_algs,
462*4882a593Smuzhiyun ARRAY_SIZE(skcipher_algs));
463*4882a593Smuzhiyun if (err)
464*4882a593Smuzhiyun crypto_unregister_algs(cipher_algs, ARRAY_SIZE(cipher_algs));
465*4882a593Smuzhiyun return err;
466*4882a593Smuzhiyun }
467*4882a593Smuzhiyun
des_sparc64_mod_fini(void)468*4882a593Smuzhiyun static void __exit des_sparc64_mod_fini(void)
469*4882a593Smuzhiyun {
470*4882a593Smuzhiyun crypto_unregister_algs(cipher_algs, ARRAY_SIZE(cipher_algs));
471*4882a593Smuzhiyun crypto_unregister_skciphers(skcipher_algs, ARRAY_SIZE(skcipher_algs));
472*4882a593Smuzhiyun }
473*4882a593Smuzhiyun
474*4882a593Smuzhiyun module_init(des_sparc64_mod_init);
475*4882a593Smuzhiyun module_exit(des_sparc64_mod_fini);
476*4882a593Smuzhiyun
477*4882a593Smuzhiyun MODULE_LICENSE("GPL");
478*4882a593Smuzhiyun MODULE_DESCRIPTION("DES & Triple DES EDE Cipher Algorithms, sparc64 des opcode accelerated");
479*4882a593Smuzhiyun
480*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("des");
481*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("des3_ede");
482*4882a593Smuzhiyun
483*4882a593Smuzhiyun #include "crop_devid.c"
484