xref: /OK3568_Linux_fs/kernel/arch/sparc/crypto/des_glue.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-only
2*4882a593Smuzhiyun /* Glue code for DES encryption optimized for sparc64 crypto opcodes.
3*4882a593Smuzhiyun  *
4*4882a593Smuzhiyun  * Copyright (C) 2012 David S. Miller <davem@davemloft.net>
5*4882a593Smuzhiyun  */
6*4882a593Smuzhiyun 
7*4882a593Smuzhiyun #define pr_fmt(fmt)	KBUILD_MODNAME ": " fmt
8*4882a593Smuzhiyun 
9*4882a593Smuzhiyun #include <linux/crypto.h>
10*4882a593Smuzhiyun #include <linux/init.h>
11*4882a593Smuzhiyun #include <linux/module.h>
12*4882a593Smuzhiyun #include <linux/mm.h>
13*4882a593Smuzhiyun #include <linux/types.h>
14*4882a593Smuzhiyun #include <crypto/algapi.h>
15*4882a593Smuzhiyun #include <crypto/internal/des.h>
16*4882a593Smuzhiyun #include <crypto/internal/skcipher.h>
17*4882a593Smuzhiyun 
18*4882a593Smuzhiyun #include <asm/fpumacro.h>
19*4882a593Smuzhiyun #include <asm/pstate.h>
20*4882a593Smuzhiyun #include <asm/elf.h>
21*4882a593Smuzhiyun 
22*4882a593Smuzhiyun #include "opcodes.h"
23*4882a593Smuzhiyun 
24*4882a593Smuzhiyun struct des_sparc64_ctx {
25*4882a593Smuzhiyun 	u64 encrypt_expkey[DES_EXPKEY_WORDS / 2];
26*4882a593Smuzhiyun 	u64 decrypt_expkey[DES_EXPKEY_WORDS / 2];
27*4882a593Smuzhiyun };
28*4882a593Smuzhiyun 
29*4882a593Smuzhiyun struct des3_ede_sparc64_ctx {
30*4882a593Smuzhiyun 	u64 encrypt_expkey[DES3_EDE_EXPKEY_WORDS / 2];
31*4882a593Smuzhiyun 	u64 decrypt_expkey[DES3_EDE_EXPKEY_WORDS / 2];
32*4882a593Smuzhiyun };
33*4882a593Smuzhiyun 
encrypt_to_decrypt(u64 * d,const u64 * e)34*4882a593Smuzhiyun static void encrypt_to_decrypt(u64 *d, const u64 *e)
35*4882a593Smuzhiyun {
36*4882a593Smuzhiyun 	const u64 *s = e + (DES_EXPKEY_WORDS / 2) - 1;
37*4882a593Smuzhiyun 	int i;
38*4882a593Smuzhiyun 
39*4882a593Smuzhiyun 	for (i = 0; i < DES_EXPKEY_WORDS / 2; i++)
40*4882a593Smuzhiyun 		*d++ = *s--;
41*4882a593Smuzhiyun }
42*4882a593Smuzhiyun 
43*4882a593Smuzhiyun extern void des_sparc64_key_expand(const u32 *input_key, u64 *key);
44*4882a593Smuzhiyun 
des_set_key(struct crypto_tfm * tfm,const u8 * key,unsigned int keylen)45*4882a593Smuzhiyun static int des_set_key(struct crypto_tfm *tfm, const u8 *key,
46*4882a593Smuzhiyun 		       unsigned int keylen)
47*4882a593Smuzhiyun {
48*4882a593Smuzhiyun 	struct des_sparc64_ctx *dctx = crypto_tfm_ctx(tfm);
49*4882a593Smuzhiyun 	int err;
50*4882a593Smuzhiyun 
51*4882a593Smuzhiyun 	/* Even though we have special instructions for key expansion,
52*4882a593Smuzhiyun 	 * we call des_verify_key() so that we don't have to write our own
53*4882a593Smuzhiyun 	 * weak key detection code.
54*4882a593Smuzhiyun 	 */
55*4882a593Smuzhiyun 	err = crypto_des_verify_key(tfm, key);
56*4882a593Smuzhiyun 	if (err)
57*4882a593Smuzhiyun 		return err;
58*4882a593Smuzhiyun 
59*4882a593Smuzhiyun 	des_sparc64_key_expand((const u32 *) key, &dctx->encrypt_expkey[0]);
60*4882a593Smuzhiyun 	encrypt_to_decrypt(&dctx->decrypt_expkey[0], &dctx->encrypt_expkey[0]);
61*4882a593Smuzhiyun 
62*4882a593Smuzhiyun 	return 0;
63*4882a593Smuzhiyun }
64*4882a593Smuzhiyun 
des_set_key_skcipher(struct crypto_skcipher * tfm,const u8 * key,unsigned int keylen)65*4882a593Smuzhiyun static int des_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *key,
66*4882a593Smuzhiyun 				unsigned int keylen)
67*4882a593Smuzhiyun {
68*4882a593Smuzhiyun 	return des_set_key(crypto_skcipher_tfm(tfm), key, keylen);
69*4882a593Smuzhiyun }
70*4882a593Smuzhiyun 
71*4882a593Smuzhiyun extern void des_sparc64_crypt(const u64 *key, const u64 *input,
72*4882a593Smuzhiyun 			      u64 *output);
73*4882a593Smuzhiyun 
sparc_des_encrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)74*4882a593Smuzhiyun static void sparc_des_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
75*4882a593Smuzhiyun {
76*4882a593Smuzhiyun 	struct des_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
77*4882a593Smuzhiyun 	const u64 *K = ctx->encrypt_expkey;
78*4882a593Smuzhiyun 
79*4882a593Smuzhiyun 	des_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
80*4882a593Smuzhiyun }
81*4882a593Smuzhiyun 
sparc_des_decrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)82*4882a593Smuzhiyun static void sparc_des_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
83*4882a593Smuzhiyun {
84*4882a593Smuzhiyun 	struct des_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
85*4882a593Smuzhiyun 	const u64 *K = ctx->decrypt_expkey;
86*4882a593Smuzhiyun 
87*4882a593Smuzhiyun 	des_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
88*4882a593Smuzhiyun }
89*4882a593Smuzhiyun 
90*4882a593Smuzhiyun extern void des_sparc64_load_keys(const u64 *key);
91*4882a593Smuzhiyun 
92*4882a593Smuzhiyun extern void des_sparc64_ecb_crypt(const u64 *input, u64 *output,
93*4882a593Smuzhiyun 				  unsigned int len);
94*4882a593Smuzhiyun 
__ecb_crypt(struct skcipher_request * req,bool encrypt)95*4882a593Smuzhiyun static int __ecb_crypt(struct skcipher_request *req, bool encrypt)
96*4882a593Smuzhiyun {
97*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
98*4882a593Smuzhiyun 	const struct des_sparc64_ctx *ctx = crypto_skcipher_ctx(tfm);
99*4882a593Smuzhiyun 	struct skcipher_walk walk;
100*4882a593Smuzhiyun 	unsigned int nbytes;
101*4882a593Smuzhiyun 	int err;
102*4882a593Smuzhiyun 
103*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, true);
104*4882a593Smuzhiyun 	if (err)
105*4882a593Smuzhiyun 		return err;
106*4882a593Smuzhiyun 
107*4882a593Smuzhiyun 	if (encrypt)
108*4882a593Smuzhiyun 		des_sparc64_load_keys(&ctx->encrypt_expkey[0]);
109*4882a593Smuzhiyun 	else
110*4882a593Smuzhiyun 		des_sparc64_load_keys(&ctx->decrypt_expkey[0]);
111*4882a593Smuzhiyun 	while ((nbytes = walk.nbytes) != 0) {
112*4882a593Smuzhiyun 		des_sparc64_ecb_crypt(walk.src.virt.addr, walk.dst.virt.addr,
113*4882a593Smuzhiyun 				      round_down(nbytes, DES_BLOCK_SIZE));
114*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, nbytes % DES_BLOCK_SIZE);
115*4882a593Smuzhiyun 	}
116*4882a593Smuzhiyun 	fprs_write(0);
117*4882a593Smuzhiyun 	return err;
118*4882a593Smuzhiyun }
119*4882a593Smuzhiyun 
ecb_encrypt(struct skcipher_request * req)120*4882a593Smuzhiyun static int ecb_encrypt(struct skcipher_request *req)
121*4882a593Smuzhiyun {
122*4882a593Smuzhiyun 	return __ecb_crypt(req, true);
123*4882a593Smuzhiyun }
124*4882a593Smuzhiyun 
ecb_decrypt(struct skcipher_request * req)125*4882a593Smuzhiyun static int ecb_decrypt(struct skcipher_request *req)
126*4882a593Smuzhiyun {
127*4882a593Smuzhiyun 	return __ecb_crypt(req, false);
128*4882a593Smuzhiyun }
129*4882a593Smuzhiyun 
130*4882a593Smuzhiyun extern void des_sparc64_cbc_encrypt(const u64 *input, u64 *output,
131*4882a593Smuzhiyun 				    unsigned int len, u64 *iv);
132*4882a593Smuzhiyun 
133*4882a593Smuzhiyun extern void des_sparc64_cbc_decrypt(const u64 *input, u64 *output,
134*4882a593Smuzhiyun 				    unsigned int len, u64 *iv);
135*4882a593Smuzhiyun 
__cbc_crypt(struct skcipher_request * req,bool encrypt)136*4882a593Smuzhiyun static int __cbc_crypt(struct skcipher_request *req, bool encrypt)
137*4882a593Smuzhiyun {
138*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
139*4882a593Smuzhiyun 	const struct des_sparc64_ctx *ctx = crypto_skcipher_ctx(tfm);
140*4882a593Smuzhiyun 	struct skcipher_walk walk;
141*4882a593Smuzhiyun 	unsigned int nbytes;
142*4882a593Smuzhiyun 	int err;
143*4882a593Smuzhiyun 
144*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, true);
145*4882a593Smuzhiyun 	if (err)
146*4882a593Smuzhiyun 		return err;
147*4882a593Smuzhiyun 
148*4882a593Smuzhiyun 	if (encrypt)
149*4882a593Smuzhiyun 		des_sparc64_load_keys(&ctx->encrypt_expkey[0]);
150*4882a593Smuzhiyun 	else
151*4882a593Smuzhiyun 		des_sparc64_load_keys(&ctx->decrypt_expkey[0]);
152*4882a593Smuzhiyun 	while ((nbytes = walk.nbytes) != 0) {
153*4882a593Smuzhiyun 		if (encrypt)
154*4882a593Smuzhiyun 			des_sparc64_cbc_encrypt(walk.src.virt.addr,
155*4882a593Smuzhiyun 						walk.dst.virt.addr,
156*4882a593Smuzhiyun 						round_down(nbytes,
157*4882a593Smuzhiyun 							   DES_BLOCK_SIZE),
158*4882a593Smuzhiyun 						walk.iv);
159*4882a593Smuzhiyun 		else
160*4882a593Smuzhiyun 			des_sparc64_cbc_decrypt(walk.src.virt.addr,
161*4882a593Smuzhiyun 						walk.dst.virt.addr,
162*4882a593Smuzhiyun 						round_down(nbytes,
163*4882a593Smuzhiyun 							   DES_BLOCK_SIZE),
164*4882a593Smuzhiyun 						walk.iv);
165*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, nbytes % DES_BLOCK_SIZE);
166*4882a593Smuzhiyun 	}
167*4882a593Smuzhiyun 	fprs_write(0);
168*4882a593Smuzhiyun 	return err;
169*4882a593Smuzhiyun }
170*4882a593Smuzhiyun 
cbc_encrypt(struct skcipher_request * req)171*4882a593Smuzhiyun static int cbc_encrypt(struct skcipher_request *req)
172*4882a593Smuzhiyun {
173*4882a593Smuzhiyun 	return __cbc_crypt(req, true);
174*4882a593Smuzhiyun }
175*4882a593Smuzhiyun 
cbc_decrypt(struct skcipher_request * req)176*4882a593Smuzhiyun static int cbc_decrypt(struct skcipher_request *req)
177*4882a593Smuzhiyun {
178*4882a593Smuzhiyun 	return __cbc_crypt(req, false);
179*4882a593Smuzhiyun }
180*4882a593Smuzhiyun 
des3_ede_set_key(struct crypto_tfm * tfm,const u8 * key,unsigned int keylen)181*4882a593Smuzhiyun static int des3_ede_set_key(struct crypto_tfm *tfm, const u8 *key,
182*4882a593Smuzhiyun 			    unsigned int keylen)
183*4882a593Smuzhiyun {
184*4882a593Smuzhiyun 	struct des3_ede_sparc64_ctx *dctx = crypto_tfm_ctx(tfm);
185*4882a593Smuzhiyun 	u64 k1[DES_EXPKEY_WORDS / 2];
186*4882a593Smuzhiyun 	u64 k2[DES_EXPKEY_WORDS / 2];
187*4882a593Smuzhiyun 	u64 k3[DES_EXPKEY_WORDS / 2];
188*4882a593Smuzhiyun 	int err;
189*4882a593Smuzhiyun 
190*4882a593Smuzhiyun 	err = crypto_des3_ede_verify_key(tfm, key);
191*4882a593Smuzhiyun 	if (err)
192*4882a593Smuzhiyun 		return err;
193*4882a593Smuzhiyun 
194*4882a593Smuzhiyun 	des_sparc64_key_expand((const u32 *)key, k1);
195*4882a593Smuzhiyun 	key += DES_KEY_SIZE;
196*4882a593Smuzhiyun 	des_sparc64_key_expand((const u32 *)key, k2);
197*4882a593Smuzhiyun 	key += DES_KEY_SIZE;
198*4882a593Smuzhiyun 	des_sparc64_key_expand((const u32 *)key, k3);
199*4882a593Smuzhiyun 
200*4882a593Smuzhiyun 	memcpy(&dctx->encrypt_expkey[0], &k1[0], sizeof(k1));
201*4882a593Smuzhiyun 	encrypt_to_decrypt(&dctx->encrypt_expkey[DES_EXPKEY_WORDS / 2], &k2[0]);
202*4882a593Smuzhiyun 	memcpy(&dctx->encrypt_expkey[(DES_EXPKEY_WORDS / 2) * 2],
203*4882a593Smuzhiyun 	       &k3[0], sizeof(k3));
204*4882a593Smuzhiyun 
205*4882a593Smuzhiyun 	encrypt_to_decrypt(&dctx->decrypt_expkey[0], &k3[0]);
206*4882a593Smuzhiyun 	memcpy(&dctx->decrypt_expkey[DES_EXPKEY_WORDS / 2],
207*4882a593Smuzhiyun 	       &k2[0], sizeof(k2));
208*4882a593Smuzhiyun 	encrypt_to_decrypt(&dctx->decrypt_expkey[(DES_EXPKEY_WORDS / 2) * 2],
209*4882a593Smuzhiyun 			   &k1[0]);
210*4882a593Smuzhiyun 
211*4882a593Smuzhiyun 	return 0;
212*4882a593Smuzhiyun }
213*4882a593Smuzhiyun 
des3_ede_set_key_skcipher(struct crypto_skcipher * tfm,const u8 * key,unsigned int keylen)214*4882a593Smuzhiyun static int des3_ede_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *key,
215*4882a593Smuzhiyun 				     unsigned int keylen)
216*4882a593Smuzhiyun {
217*4882a593Smuzhiyun 	return des3_ede_set_key(crypto_skcipher_tfm(tfm), key, keylen);
218*4882a593Smuzhiyun }
219*4882a593Smuzhiyun 
220*4882a593Smuzhiyun extern void des3_ede_sparc64_crypt(const u64 *key, const u64 *input,
221*4882a593Smuzhiyun 				   u64 *output);
222*4882a593Smuzhiyun 
sparc_des3_ede_encrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)223*4882a593Smuzhiyun static void sparc_des3_ede_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
224*4882a593Smuzhiyun {
225*4882a593Smuzhiyun 	struct des3_ede_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
226*4882a593Smuzhiyun 	const u64 *K = ctx->encrypt_expkey;
227*4882a593Smuzhiyun 
228*4882a593Smuzhiyun 	des3_ede_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
229*4882a593Smuzhiyun }
230*4882a593Smuzhiyun 
sparc_des3_ede_decrypt(struct crypto_tfm * tfm,u8 * dst,const u8 * src)231*4882a593Smuzhiyun static void sparc_des3_ede_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
232*4882a593Smuzhiyun {
233*4882a593Smuzhiyun 	struct des3_ede_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
234*4882a593Smuzhiyun 	const u64 *K = ctx->decrypt_expkey;
235*4882a593Smuzhiyun 
236*4882a593Smuzhiyun 	des3_ede_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
237*4882a593Smuzhiyun }
238*4882a593Smuzhiyun 
239*4882a593Smuzhiyun extern void des3_ede_sparc64_load_keys(const u64 *key);
240*4882a593Smuzhiyun 
241*4882a593Smuzhiyun extern void des3_ede_sparc64_ecb_crypt(const u64 *expkey, const u64 *input,
242*4882a593Smuzhiyun 				       u64 *output, unsigned int len);
243*4882a593Smuzhiyun 
__ecb3_crypt(struct skcipher_request * req,bool encrypt)244*4882a593Smuzhiyun static int __ecb3_crypt(struct skcipher_request *req, bool encrypt)
245*4882a593Smuzhiyun {
246*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
247*4882a593Smuzhiyun 	const struct des3_ede_sparc64_ctx *ctx = crypto_skcipher_ctx(tfm);
248*4882a593Smuzhiyun 	struct skcipher_walk walk;
249*4882a593Smuzhiyun 	const u64 *K;
250*4882a593Smuzhiyun 	unsigned int nbytes;
251*4882a593Smuzhiyun 	int err;
252*4882a593Smuzhiyun 
253*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, true);
254*4882a593Smuzhiyun 	if (err)
255*4882a593Smuzhiyun 		return err;
256*4882a593Smuzhiyun 
257*4882a593Smuzhiyun 	if (encrypt)
258*4882a593Smuzhiyun 		K = &ctx->encrypt_expkey[0];
259*4882a593Smuzhiyun 	else
260*4882a593Smuzhiyun 		K = &ctx->decrypt_expkey[0];
261*4882a593Smuzhiyun 	des3_ede_sparc64_load_keys(K);
262*4882a593Smuzhiyun 	while ((nbytes = walk.nbytes) != 0) {
263*4882a593Smuzhiyun 		des3_ede_sparc64_ecb_crypt(K, walk.src.virt.addr,
264*4882a593Smuzhiyun 					   walk.dst.virt.addr,
265*4882a593Smuzhiyun 					   round_down(nbytes, DES_BLOCK_SIZE));
266*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, nbytes % DES_BLOCK_SIZE);
267*4882a593Smuzhiyun 	}
268*4882a593Smuzhiyun 	fprs_write(0);
269*4882a593Smuzhiyun 	return err;
270*4882a593Smuzhiyun }
271*4882a593Smuzhiyun 
ecb3_encrypt(struct skcipher_request * req)272*4882a593Smuzhiyun static int ecb3_encrypt(struct skcipher_request *req)
273*4882a593Smuzhiyun {
274*4882a593Smuzhiyun 	return __ecb3_crypt(req, true);
275*4882a593Smuzhiyun }
276*4882a593Smuzhiyun 
ecb3_decrypt(struct skcipher_request * req)277*4882a593Smuzhiyun static int ecb3_decrypt(struct skcipher_request *req)
278*4882a593Smuzhiyun {
279*4882a593Smuzhiyun 	return __ecb3_crypt(req, false);
280*4882a593Smuzhiyun }
281*4882a593Smuzhiyun 
282*4882a593Smuzhiyun extern void des3_ede_sparc64_cbc_encrypt(const u64 *expkey, const u64 *input,
283*4882a593Smuzhiyun 					 u64 *output, unsigned int len,
284*4882a593Smuzhiyun 					 u64 *iv);
285*4882a593Smuzhiyun 
286*4882a593Smuzhiyun extern void des3_ede_sparc64_cbc_decrypt(const u64 *expkey, const u64 *input,
287*4882a593Smuzhiyun 					 u64 *output, unsigned int len,
288*4882a593Smuzhiyun 					 u64 *iv);
289*4882a593Smuzhiyun 
__cbc3_crypt(struct skcipher_request * req,bool encrypt)290*4882a593Smuzhiyun static int __cbc3_crypt(struct skcipher_request *req, bool encrypt)
291*4882a593Smuzhiyun {
292*4882a593Smuzhiyun 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
293*4882a593Smuzhiyun 	const struct des3_ede_sparc64_ctx *ctx = crypto_skcipher_ctx(tfm);
294*4882a593Smuzhiyun 	struct skcipher_walk walk;
295*4882a593Smuzhiyun 	const u64 *K;
296*4882a593Smuzhiyun 	unsigned int nbytes;
297*4882a593Smuzhiyun 	int err;
298*4882a593Smuzhiyun 
299*4882a593Smuzhiyun 	err = skcipher_walk_virt(&walk, req, true);
300*4882a593Smuzhiyun 	if (err)
301*4882a593Smuzhiyun 		return err;
302*4882a593Smuzhiyun 
303*4882a593Smuzhiyun 	if (encrypt)
304*4882a593Smuzhiyun 		K = &ctx->encrypt_expkey[0];
305*4882a593Smuzhiyun 	else
306*4882a593Smuzhiyun 		K = &ctx->decrypt_expkey[0];
307*4882a593Smuzhiyun 	des3_ede_sparc64_load_keys(K);
308*4882a593Smuzhiyun 	while ((nbytes = walk.nbytes) != 0) {
309*4882a593Smuzhiyun 		if (encrypt)
310*4882a593Smuzhiyun 			des3_ede_sparc64_cbc_encrypt(K, walk.src.virt.addr,
311*4882a593Smuzhiyun 						     walk.dst.virt.addr,
312*4882a593Smuzhiyun 						     round_down(nbytes,
313*4882a593Smuzhiyun 								DES_BLOCK_SIZE),
314*4882a593Smuzhiyun 						     walk.iv);
315*4882a593Smuzhiyun 		else
316*4882a593Smuzhiyun 			des3_ede_sparc64_cbc_decrypt(K, walk.src.virt.addr,
317*4882a593Smuzhiyun 						     walk.dst.virt.addr,
318*4882a593Smuzhiyun 						     round_down(nbytes,
319*4882a593Smuzhiyun 								DES_BLOCK_SIZE),
320*4882a593Smuzhiyun 						     walk.iv);
321*4882a593Smuzhiyun 		err = skcipher_walk_done(&walk, nbytes % DES_BLOCK_SIZE);
322*4882a593Smuzhiyun 	}
323*4882a593Smuzhiyun 	fprs_write(0);
324*4882a593Smuzhiyun 	return err;
325*4882a593Smuzhiyun }
326*4882a593Smuzhiyun 
cbc3_encrypt(struct skcipher_request * req)327*4882a593Smuzhiyun static int cbc3_encrypt(struct skcipher_request *req)
328*4882a593Smuzhiyun {
329*4882a593Smuzhiyun 	return __cbc3_crypt(req, true);
330*4882a593Smuzhiyun }
331*4882a593Smuzhiyun 
cbc3_decrypt(struct skcipher_request * req)332*4882a593Smuzhiyun static int cbc3_decrypt(struct skcipher_request *req)
333*4882a593Smuzhiyun {
334*4882a593Smuzhiyun 	return __cbc3_crypt(req, false);
335*4882a593Smuzhiyun }
336*4882a593Smuzhiyun 
337*4882a593Smuzhiyun static struct crypto_alg cipher_algs[] = {
338*4882a593Smuzhiyun 	{
339*4882a593Smuzhiyun 		.cra_name		= "des",
340*4882a593Smuzhiyun 		.cra_driver_name	= "des-sparc64",
341*4882a593Smuzhiyun 		.cra_priority		= SPARC_CR_OPCODE_PRIORITY,
342*4882a593Smuzhiyun 		.cra_flags		= CRYPTO_ALG_TYPE_CIPHER,
343*4882a593Smuzhiyun 		.cra_blocksize		= DES_BLOCK_SIZE,
344*4882a593Smuzhiyun 		.cra_ctxsize		= sizeof(struct des_sparc64_ctx),
345*4882a593Smuzhiyun 		.cra_alignmask		= 7,
346*4882a593Smuzhiyun 		.cra_module		= THIS_MODULE,
347*4882a593Smuzhiyun 		.cra_u	= {
348*4882a593Smuzhiyun 			.cipher	= {
349*4882a593Smuzhiyun 				.cia_min_keysize	= DES_KEY_SIZE,
350*4882a593Smuzhiyun 				.cia_max_keysize	= DES_KEY_SIZE,
351*4882a593Smuzhiyun 				.cia_setkey		= des_set_key,
352*4882a593Smuzhiyun 				.cia_encrypt		= sparc_des_encrypt,
353*4882a593Smuzhiyun 				.cia_decrypt		= sparc_des_decrypt
354*4882a593Smuzhiyun 			}
355*4882a593Smuzhiyun 		}
356*4882a593Smuzhiyun 	}, {
357*4882a593Smuzhiyun 		.cra_name		= "des3_ede",
358*4882a593Smuzhiyun 		.cra_driver_name	= "des3_ede-sparc64",
359*4882a593Smuzhiyun 		.cra_priority		= SPARC_CR_OPCODE_PRIORITY,
360*4882a593Smuzhiyun 		.cra_flags		= CRYPTO_ALG_TYPE_CIPHER,
361*4882a593Smuzhiyun 		.cra_blocksize		= DES3_EDE_BLOCK_SIZE,
362*4882a593Smuzhiyun 		.cra_ctxsize		= sizeof(struct des3_ede_sparc64_ctx),
363*4882a593Smuzhiyun 		.cra_alignmask		= 7,
364*4882a593Smuzhiyun 		.cra_module		= THIS_MODULE,
365*4882a593Smuzhiyun 		.cra_u	= {
366*4882a593Smuzhiyun 			.cipher	= {
367*4882a593Smuzhiyun 				.cia_min_keysize	= DES3_EDE_KEY_SIZE,
368*4882a593Smuzhiyun 				.cia_max_keysize	= DES3_EDE_KEY_SIZE,
369*4882a593Smuzhiyun 				.cia_setkey		= des3_ede_set_key,
370*4882a593Smuzhiyun 				.cia_encrypt		= sparc_des3_ede_encrypt,
371*4882a593Smuzhiyun 				.cia_decrypt		= sparc_des3_ede_decrypt
372*4882a593Smuzhiyun 			}
373*4882a593Smuzhiyun 		}
374*4882a593Smuzhiyun 	}
375*4882a593Smuzhiyun };
376*4882a593Smuzhiyun 
377*4882a593Smuzhiyun static struct skcipher_alg skcipher_algs[] = {
378*4882a593Smuzhiyun 	{
379*4882a593Smuzhiyun 		.base.cra_name		= "ecb(des)",
380*4882a593Smuzhiyun 		.base.cra_driver_name	= "ecb-des-sparc64",
381*4882a593Smuzhiyun 		.base.cra_priority	= SPARC_CR_OPCODE_PRIORITY,
382*4882a593Smuzhiyun 		.base.cra_blocksize	= DES_BLOCK_SIZE,
383*4882a593Smuzhiyun 		.base.cra_ctxsize	= sizeof(struct des_sparc64_ctx),
384*4882a593Smuzhiyun 		.base.cra_alignmask	= 7,
385*4882a593Smuzhiyun 		.base.cra_module	= THIS_MODULE,
386*4882a593Smuzhiyun 		.min_keysize		= DES_KEY_SIZE,
387*4882a593Smuzhiyun 		.max_keysize		= DES_KEY_SIZE,
388*4882a593Smuzhiyun 		.setkey			= des_set_key_skcipher,
389*4882a593Smuzhiyun 		.encrypt		= ecb_encrypt,
390*4882a593Smuzhiyun 		.decrypt		= ecb_decrypt,
391*4882a593Smuzhiyun 	}, {
392*4882a593Smuzhiyun 		.base.cra_name		= "cbc(des)",
393*4882a593Smuzhiyun 		.base.cra_driver_name	= "cbc-des-sparc64",
394*4882a593Smuzhiyun 		.base.cra_priority	= SPARC_CR_OPCODE_PRIORITY,
395*4882a593Smuzhiyun 		.base.cra_blocksize	= DES_BLOCK_SIZE,
396*4882a593Smuzhiyun 		.base.cra_ctxsize	= sizeof(struct des_sparc64_ctx),
397*4882a593Smuzhiyun 		.base.cra_alignmask	= 7,
398*4882a593Smuzhiyun 		.base.cra_module	= THIS_MODULE,
399*4882a593Smuzhiyun 		.min_keysize		= DES_KEY_SIZE,
400*4882a593Smuzhiyun 		.max_keysize		= DES_KEY_SIZE,
401*4882a593Smuzhiyun 		.ivsize			= DES_BLOCK_SIZE,
402*4882a593Smuzhiyun 		.setkey			= des_set_key_skcipher,
403*4882a593Smuzhiyun 		.encrypt		= cbc_encrypt,
404*4882a593Smuzhiyun 		.decrypt		= cbc_decrypt,
405*4882a593Smuzhiyun 	}, {
406*4882a593Smuzhiyun 		.base.cra_name		= "ecb(des3_ede)",
407*4882a593Smuzhiyun 		.base.cra_driver_name	= "ecb-des3_ede-sparc64",
408*4882a593Smuzhiyun 		.base.cra_priority	= SPARC_CR_OPCODE_PRIORITY,
409*4882a593Smuzhiyun 		.base.cra_blocksize	= DES3_EDE_BLOCK_SIZE,
410*4882a593Smuzhiyun 		.base.cra_ctxsize	= sizeof(struct des3_ede_sparc64_ctx),
411*4882a593Smuzhiyun 		.base.cra_alignmask	= 7,
412*4882a593Smuzhiyun 		.base.cra_module	= THIS_MODULE,
413*4882a593Smuzhiyun 		.min_keysize		= DES3_EDE_KEY_SIZE,
414*4882a593Smuzhiyun 		.max_keysize		= DES3_EDE_KEY_SIZE,
415*4882a593Smuzhiyun 		.setkey			= des3_ede_set_key_skcipher,
416*4882a593Smuzhiyun 		.encrypt		= ecb3_encrypt,
417*4882a593Smuzhiyun 		.decrypt		= ecb3_decrypt,
418*4882a593Smuzhiyun 	}, {
419*4882a593Smuzhiyun 		.base.cra_name		= "cbc(des3_ede)",
420*4882a593Smuzhiyun 		.base.cra_driver_name	= "cbc-des3_ede-sparc64",
421*4882a593Smuzhiyun 		.base.cra_priority	= SPARC_CR_OPCODE_PRIORITY,
422*4882a593Smuzhiyun 		.base.cra_blocksize	= DES3_EDE_BLOCK_SIZE,
423*4882a593Smuzhiyun 		.base.cra_ctxsize	= sizeof(struct des3_ede_sparc64_ctx),
424*4882a593Smuzhiyun 		.base.cra_alignmask	= 7,
425*4882a593Smuzhiyun 		.base.cra_module	= THIS_MODULE,
426*4882a593Smuzhiyun 		.min_keysize		= DES3_EDE_KEY_SIZE,
427*4882a593Smuzhiyun 		.max_keysize		= DES3_EDE_KEY_SIZE,
428*4882a593Smuzhiyun 		.ivsize			= DES3_EDE_BLOCK_SIZE,
429*4882a593Smuzhiyun 		.setkey			= des3_ede_set_key_skcipher,
430*4882a593Smuzhiyun 		.encrypt		= cbc3_encrypt,
431*4882a593Smuzhiyun 		.decrypt		= cbc3_decrypt,
432*4882a593Smuzhiyun 	}
433*4882a593Smuzhiyun };
434*4882a593Smuzhiyun 
sparc64_has_des_opcode(void)435*4882a593Smuzhiyun static bool __init sparc64_has_des_opcode(void)
436*4882a593Smuzhiyun {
437*4882a593Smuzhiyun 	unsigned long cfr;
438*4882a593Smuzhiyun 
439*4882a593Smuzhiyun 	if (!(sparc64_elf_hwcap & HWCAP_SPARC_CRYPTO))
440*4882a593Smuzhiyun 		return false;
441*4882a593Smuzhiyun 
442*4882a593Smuzhiyun 	__asm__ __volatile__("rd %%asr26, %0" : "=r" (cfr));
443*4882a593Smuzhiyun 	if (!(cfr & CFR_DES))
444*4882a593Smuzhiyun 		return false;
445*4882a593Smuzhiyun 
446*4882a593Smuzhiyun 	return true;
447*4882a593Smuzhiyun }
448*4882a593Smuzhiyun 
des_sparc64_mod_init(void)449*4882a593Smuzhiyun static int __init des_sparc64_mod_init(void)
450*4882a593Smuzhiyun {
451*4882a593Smuzhiyun 	int err;
452*4882a593Smuzhiyun 
453*4882a593Smuzhiyun 	if (!sparc64_has_des_opcode()) {
454*4882a593Smuzhiyun 		pr_info("sparc64 des opcodes not available.\n");
455*4882a593Smuzhiyun 		return -ENODEV;
456*4882a593Smuzhiyun 	}
457*4882a593Smuzhiyun 	pr_info("Using sparc64 des opcodes optimized DES implementation\n");
458*4882a593Smuzhiyun 	err = crypto_register_algs(cipher_algs, ARRAY_SIZE(cipher_algs));
459*4882a593Smuzhiyun 	if (err)
460*4882a593Smuzhiyun 		return err;
461*4882a593Smuzhiyun 	err = crypto_register_skciphers(skcipher_algs,
462*4882a593Smuzhiyun 					ARRAY_SIZE(skcipher_algs));
463*4882a593Smuzhiyun 	if (err)
464*4882a593Smuzhiyun 		crypto_unregister_algs(cipher_algs, ARRAY_SIZE(cipher_algs));
465*4882a593Smuzhiyun 	return err;
466*4882a593Smuzhiyun }
467*4882a593Smuzhiyun 
des_sparc64_mod_fini(void)468*4882a593Smuzhiyun static void __exit des_sparc64_mod_fini(void)
469*4882a593Smuzhiyun {
470*4882a593Smuzhiyun 	crypto_unregister_algs(cipher_algs, ARRAY_SIZE(cipher_algs));
471*4882a593Smuzhiyun 	crypto_unregister_skciphers(skcipher_algs, ARRAY_SIZE(skcipher_algs));
472*4882a593Smuzhiyun }
473*4882a593Smuzhiyun 
474*4882a593Smuzhiyun module_init(des_sparc64_mod_init);
475*4882a593Smuzhiyun module_exit(des_sparc64_mod_fini);
476*4882a593Smuzhiyun 
477*4882a593Smuzhiyun MODULE_LICENSE("GPL");
478*4882a593Smuzhiyun MODULE_DESCRIPTION("DES & Triple DES EDE Cipher Algorithms, sparc64 des opcode accelerated");
479*4882a593Smuzhiyun 
480*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("des");
481*4882a593Smuzhiyun MODULE_ALIAS_CRYPTO("des3_ede");
482*4882a593Smuzhiyun 
483*4882a593Smuzhiyun #include "crop_devid.c"
484