blob: 5ec0309e48c081a54aa144b3a6865acb6cd68fb5 [file] [log] [blame]
David S. Millerc5aac2d2012-08-25 22:37:23 -07001/* Glue code for DES encryption optimized for sparc64 crypto opcodes.
2 *
3 * Copyright (C) 2012 David S. Miller <davem@davemloft.net>
4 */
5
6#include <linux/crypto.h>
7#include <linux/init.h>
8#include <linux/module.h>
9#include <linux/mm.h>
10#include <linux/types.h>
11#include <crypto/algapi.h>
12#include <crypto/des.h>
13
14#include <asm/fpumacro.h>
15#include <asm/pstate.h>
16#include <asm/elf.h>
17
18struct des_sparc64_ctx {
19 u64 encrypt_expkey[DES_EXPKEY_WORDS / 2];
20 u64 decrypt_expkey[DES_EXPKEY_WORDS / 2];
21};
22
23struct des3_ede_sparc64_ctx {
24 u64 encrypt_expkey[DES3_EDE_EXPKEY_WORDS / 2];
25 u64 decrypt_expkey[DES3_EDE_EXPKEY_WORDS / 2];
26};
27
28static void encrypt_to_decrypt(u64 *d, const u64 *e)
29{
30 const u64 *s = e + (DES_EXPKEY_WORDS / 2) - 1;
31 int i;
32
33 for (i = 0; i < DES_EXPKEY_WORDS / 2; i++)
34 *d++ = *s--;
35}
36
37extern void des_sparc64_key_expand(const u32 *input_key, u64 *key);
38
39static int des_set_key(struct crypto_tfm *tfm, const u8 *key,
40 unsigned int keylen)
41{
42 struct des_sparc64_ctx *dctx = crypto_tfm_ctx(tfm);
43 u32 *flags = &tfm->crt_flags;
44 u32 tmp[DES_EXPKEY_WORDS];
45 int ret;
46
47 /* Even though we have special instructions for key expansion,
48 * we call des_ekey() so that we don't have to write our own
49 * weak key detection code.
50 */
51 ret = des_ekey(tmp, key);
52 if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
53 *flags |= CRYPTO_TFM_RES_WEAK_KEY;
54 return -EINVAL;
55 }
56
57 des_sparc64_key_expand((const u32 *) key, &dctx->encrypt_expkey[0]);
58 encrypt_to_decrypt(&dctx->decrypt_expkey[0], &dctx->encrypt_expkey[0]);
59
60 return 0;
61}
62
63extern void des_sparc64_crypt(const u64 *key, const u64 *input,
64 u64 *output);
65
66static void des_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
67{
68 struct des_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
69 const u64 *K = ctx->encrypt_expkey;
70
71 des_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
72}
73
74static void des_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
75{
76 struct des_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
77 const u64 *K = ctx->decrypt_expkey;
78
79 des_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
80}
81
82extern void des_sparc64_load_keys(const u64 *key);
83
84extern void des_sparc64_ecb_crypt(const u64 *input, u64 *output,
85 unsigned int len);
86
87#define DES_BLOCK_MASK (~(DES_BLOCK_SIZE - 1))
88
89static int __ecb_crypt(struct blkcipher_desc *desc,
90 struct scatterlist *dst, struct scatterlist *src,
91 unsigned int nbytes, bool encrypt)
92{
93 struct des_sparc64_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
94 struct blkcipher_walk walk;
95 int err;
96
97 blkcipher_walk_init(&walk, dst, src, nbytes);
98 err = blkcipher_walk_virt(desc, &walk);
99
100 if (encrypt)
101 des_sparc64_load_keys(&ctx->encrypt_expkey[0]);
102 else
103 des_sparc64_load_keys(&ctx->decrypt_expkey[0]);
104 while ((nbytes = walk.nbytes)) {
105 unsigned int block_len = nbytes & DES_BLOCK_MASK;
106
107 if (likely(block_len)) {
108 des_sparc64_ecb_crypt((const u64 *)walk.src.virt.addr,
109 (u64 *) walk.dst.virt.addr,
110 block_len);
111 }
112 nbytes &= DES_BLOCK_SIZE - 1;
113 err = blkcipher_walk_done(desc, &walk, nbytes);
114 }
115 fprs_write(0);
116 return err;
117}
118
119static int ecb_encrypt(struct blkcipher_desc *desc,
120 struct scatterlist *dst, struct scatterlist *src,
121 unsigned int nbytes)
122{
123 return __ecb_crypt(desc, dst, src, nbytes, true);
124}
125
126static int ecb_decrypt(struct blkcipher_desc *desc,
127 struct scatterlist *dst, struct scatterlist *src,
128 unsigned int nbytes)
129{
130 return __ecb_crypt(desc, dst, src, nbytes, false);
131}
132
133extern void des_sparc64_cbc_encrypt(const u64 *input, u64 *output,
134 unsigned int len, u64 *iv);
135
136static int cbc_encrypt(struct blkcipher_desc *desc,
137 struct scatterlist *dst, struct scatterlist *src,
138 unsigned int nbytes)
139{
140 struct des_sparc64_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
141 struct blkcipher_walk walk;
142 int err;
143
144 blkcipher_walk_init(&walk, dst, src, nbytes);
145 err = blkcipher_walk_virt(desc, &walk);
146
147 des_sparc64_load_keys(&ctx->encrypt_expkey[0]);
148 while ((nbytes = walk.nbytes)) {
149 unsigned int block_len = nbytes & DES_BLOCK_MASK;
150
151 if (likely(block_len)) {
152 des_sparc64_cbc_encrypt((const u64 *)walk.src.virt.addr,
153 (u64 *) walk.dst.virt.addr,
154 block_len, (u64 *) walk.iv);
155 }
156 nbytes &= DES_BLOCK_SIZE - 1;
157 err = blkcipher_walk_done(desc, &walk, nbytes);
158 }
159 fprs_write(0);
160 return err;
161}
162
163extern void des_sparc64_cbc_decrypt(const u64 *input, u64 *output,
164 unsigned int len, u64 *iv);
165
166static int cbc_decrypt(struct blkcipher_desc *desc,
167 struct scatterlist *dst, struct scatterlist *src,
168 unsigned int nbytes)
169{
170 struct des_sparc64_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
171 struct blkcipher_walk walk;
172 int err;
173
174 blkcipher_walk_init(&walk, dst, src, nbytes);
175 err = blkcipher_walk_virt(desc, &walk);
176
177 des_sparc64_load_keys(&ctx->decrypt_expkey[0]);
178 while ((nbytes = walk.nbytes)) {
179 unsigned int block_len = nbytes & DES_BLOCK_MASK;
180
181 if (likely(block_len)) {
182 des_sparc64_cbc_decrypt((const u64 *)walk.src.virt.addr,
183 (u64 *) walk.dst.virt.addr,
184 block_len, (u64 *) walk.iv);
185 }
186 nbytes &= DES_BLOCK_SIZE - 1;
187 err = blkcipher_walk_done(desc, &walk, nbytes);
188 }
189 fprs_write(0);
190 return err;
191}
192
193static int des3_ede_set_key(struct crypto_tfm *tfm, const u8 *key,
194 unsigned int keylen)
195{
196 struct des3_ede_sparc64_ctx *dctx = crypto_tfm_ctx(tfm);
197 const u32 *K = (const u32 *)key;
198 u32 *flags = &tfm->crt_flags;
199 u64 k1[DES_EXPKEY_WORDS / 2];
200 u64 k2[DES_EXPKEY_WORDS / 2];
201 u64 k3[DES_EXPKEY_WORDS / 2];
202
203 if (unlikely(!((K[0] ^ K[2]) | (K[1] ^ K[3])) ||
204 !((K[2] ^ K[4]) | (K[3] ^ K[5]))) &&
205 (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
206 *flags |= CRYPTO_TFM_RES_WEAK_KEY;
207 return -EINVAL;
208 }
209
210 des_sparc64_key_expand((const u32 *)key, k1);
211 key += DES_KEY_SIZE;
212 des_sparc64_key_expand((const u32 *)key, k2);
213 key += DES_KEY_SIZE;
214 des_sparc64_key_expand((const u32 *)key, k3);
215
216 memcpy(&dctx->encrypt_expkey[0], &k1[0], sizeof(k1));
217 encrypt_to_decrypt(&dctx->encrypt_expkey[DES_EXPKEY_WORDS / 2], &k2[0]);
218 memcpy(&dctx->encrypt_expkey[(DES_EXPKEY_WORDS / 2) * 2],
219 &k3[0], sizeof(k3));
220
221 encrypt_to_decrypt(&dctx->decrypt_expkey[0], &k3[0]);
222 memcpy(&dctx->decrypt_expkey[DES_EXPKEY_WORDS / 2],
223 &k2[0], sizeof(k2));
224 encrypt_to_decrypt(&dctx->decrypt_expkey[(DES_EXPKEY_WORDS / 2) * 2],
225 &k1[0]);
226
227 return 0;
228}
229
230extern void des3_ede_sparc64_crypt(const u64 *key, const u64 *input,
231 u64 *output);
232
233static void des3_ede_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
234{
235 struct des3_ede_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
236 const u64 *K = ctx->encrypt_expkey;
237
238 des3_ede_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
239}
240
241static void des3_ede_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src)
242{
243 struct des3_ede_sparc64_ctx *ctx = crypto_tfm_ctx(tfm);
244 const u64 *K = ctx->decrypt_expkey;
245
246 des3_ede_sparc64_crypt(K, (const u64 *) src, (u64 *) dst);
247}
248
249extern void des3_ede_sparc64_load_keys(const u64 *key);
250
251extern void des3_ede_sparc64_ecb_crypt(const u64 *expkey, const u64 *input,
252 u64 *output, unsigned int len);
253
254static int __ecb3_crypt(struct blkcipher_desc *desc,
255 struct scatterlist *dst, struct scatterlist *src,
256 unsigned int nbytes, bool encrypt)
257{
258 struct des3_ede_sparc64_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
259 struct blkcipher_walk walk;
260 const u64 *K;
261 int err;
262
263 blkcipher_walk_init(&walk, dst, src, nbytes);
264 err = blkcipher_walk_virt(desc, &walk);
265
266 if (encrypt)
267 K = &ctx->encrypt_expkey[0];
268 else
269 K = &ctx->decrypt_expkey[0];
270 des3_ede_sparc64_load_keys(K);
271 while ((nbytes = walk.nbytes)) {
272 unsigned int block_len = nbytes & DES_BLOCK_MASK;
273
274 if (likely(block_len)) {
275 const u64 *src64 = (const u64 *)walk.src.virt.addr;
276 des3_ede_sparc64_ecb_crypt(K, src64,
277 (u64 *) walk.dst.virt.addr,
278 block_len);
279 }
280 nbytes &= DES_BLOCK_SIZE - 1;
281 err = blkcipher_walk_done(desc, &walk, nbytes);
282 }
283 fprs_write(0);
284 return err;
285}
286
287static int ecb3_encrypt(struct blkcipher_desc *desc,
288 struct scatterlist *dst, struct scatterlist *src,
289 unsigned int nbytes)
290{
291 return __ecb3_crypt(desc, dst, src, nbytes, true);
292}
293
294static int ecb3_decrypt(struct blkcipher_desc *desc,
295 struct scatterlist *dst, struct scatterlist *src,
296 unsigned int nbytes)
297{
298 return __ecb3_crypt(desc, dst, src, nbytes, false);
299}
300
301extern void des3_ede_sparc64_cbc_encrypt(const u64 *expkey, const u64 *input,
302 u64 *output, unsigned int len,
303 u64 *iv);
304
305static int cbc3_encrypt(struct blkcipher_desc *desc,
306 struct scatterlist *dst, struct scatterlist *src,
307 unsigned int nbytes)
308{
309 struct des3_ede_sparc64_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
310 struct blkcipher_walk walk;
311 const u64 *K;
312 int err;
313
314 blkcipher_walk_init(&walk, dst, src, nbytes);
315 err = blkcipher_walk_virt(desc, &walk);
316
317 K = &ctx->encrypt_expkey[0];
318 des3_ede_sparc64_load_keys(K);
319 while ((nbytes = walk.nbytes)) {
320 unsigned int block_len = nbytes & DES_BLOCK_MASK;
321
322 if (likely(block_len)) {
323 const u64 *src64 = (const u64 *)walk.src.virt.addr;
324 des3_ede_sparc64_cbc_encrypt(K, src64,
325 (u64 *) walk.dst.virt.addr,
326 block_len,
327 (u64 *) walk.iv);
328 }
329 nbytes &= DES_BLOCK_SIZE - 1;
330 err = blkcipher_walk_done(desc, &walk, nbytes);
331 }
332 fprs_write(0);
333 return err;
334}
335
336extern void des3_ede_sparc64_cbc_decrypt(const u64 *expkey, const u64 *input,
337 u64 *output, unsigned int len,
338 u64 *iv);
339
340static int cbc3_decrypt(struct blkcipher_desc *desc,
341 struct scatterlist *dst, struct scatterlist *src,
342 unsigned int nbytes)
343{
344 struct des3_ede_sparc64_ctx *ctx = crypto_blkcipher_ctx(desc->tfm);
345 struct blkcipher_walk walk;
346 const u64 *K;
347 int err;
348
349 blkcipher_walk_init(&walk, dst, src, nbytes);
350 err = blkcipher_walk_virt(desc, &walk);
351
352 K = &ctx->decrypt_expkey[0];
353 des3_ede_sparc64_load_keys(K);
354 while ((nbytes = walk.nbytes)) {
355 unsigned int block_len = nbytes & DES_BLOCK_MASK;
356
357 if (likely(block_len)) {
358 const u64 *src64 = (const u64 *)walk.src.virt.addr;
359 des3_ede_sparc64_cbc_decrypt(K, src64,
360 (u64 *) walk.dst.virt.addr,
361 block_len,
362 (u64 *) walk.iv);
363 }
364 nbytes &= DES_BLOCK_SIZE - 1;
365 err = blkcipher_walk_done(desc, &walk, nbytes);
366 }
367 fprs_write(0);
368 return err;
369}
370
371static struct crypto_alg algs[] = { {
372 .cra_name = "des",
373 .cra_driver_name = "des-sparc64",
374 .cra_priority = 150,
375 .cra_flags = CRYPTO_ALG_TYPE_CIPHER,
376 .cra_blocksize = DES_BLOCK_SIZE,
377 .cra_ctxsize = sizeof(struct des_sparc64_ctx),
378 .cra_alignmask = 7,
379 .cra_module = THIS_MODULE,
380 .cra_u = {
381 .cipher = {
382 .cia_min_keysize = DES_KEY_SIZE,
383 .cia_max_keysize = DES_KEY_SIZE,
384 .cia_setkey = des_set_key,
385 .cia_encrypt = des_encrypt,
386 .cia_decrypt = des_decrypt
387 }
388 }
389}, {
390 .cra_name = "ecb(des)",
391 .cra_driver_name = "ecb-des-sparc64",
392 .cra_priority = 150,
393 .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
394 .cra_blocksize = DES_BLOCK_SIZE,
395 .cra_ctxsize = sizeof(struct des_sparc64_ctx),
396 .cra_alignmask = 7,
397 .cra_type = &crypto_blkcipher_type,
398 .cra_module = THIS_MODULE,
399 .cra_u = {
400 .blkcipher = {
401 .min_keysize = DES_KEY_SIZE,
402 .max_keysize = DES_KEY_SIZE,
403 .setkey = des_set_key,
404 .encrypt = ecb_encrypt,
405 .decrypt = ecb_decrypt,
406 },
407 },
408}, {
409 .cra_name = "cbc(des)",
410 .cra_driver_name = "cbc-des-sparc64",
411 .cra_priority = 150,
412 .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
413 .cra_blocksize = DES_BLOCK_SIZE,
414 .cra_ctxsize = sizeof(struct des_sparc64_ctx),
415 .cra_alignmask = 7,
416 .cra_type = &crypto_blkcipher_type,
417 .cra_module = THIS_MODULE,
418 .cra_u = {
419 .blkcipher = {
420 .min_keysize = DES_KEY_SIZE,
421 .max_keysize = DES_KEY_SIZE,
422 .setkey = des_set_key,
423 .encrypt = cbc_encrypt,
424 .decrypt = cbc_decrypt,
425 },
426 },
427}, {
428 .cra_name = "des3_ede",
429 .cra_driver_name = "des3_ede-sparc64",
430 .cra_priority = 150,
431 .cra_flags = CRYPTO_ALG_TYPE_CIPHER,
432 .cra_blocksize = DES3_EDE_BLOCK_SIZE,
433 .cra_ctxsize = sizeof(struct des3_ede_sparc64_ctx),
434 .cra_alignmask = 7,
435 .cra_module = THIS_MODULE,
436 .cra_u = {
437 .cipher = {
438 .cia_min_keysize = DES3_EDE_KEY_SIZE,
439 .cia_max_keysize = DES3_EDE_KEY_SIZE,
440 .cia_setkey = des3_ede_set_key,
441 .cia_encrypt = des3_ede_encrypt,
442 .cia_decrypt = des3_ede_decrypt
443 }
444 }
445}, {
446 .cra_name = "ecb(des3_ede)",
447 .cra_driver_name = "ecb-des3_ede-sparc64",
448 .cra_priority = 150,
449 .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
450 .cra_blocksize = DES3_EDE_BLOCK_SIZE,
451 .cra_ctxsize = sizeof(struct des3_ede_sparc64_ctx),
452 .cra_alignmask = 7,
453 .cra_type = &crypto_blkcipher_type,
454 .cra_module = THIS_MODULE,
455 .cra_u = {
456 .blkcipher = {
457 .min_keysize = DES3_EDE_KEY_SIZE,
458 .max_keysize = DES3_EDE_KEY_SIZE,
459 .setkey = des3_ede_set_key,
460 .encrypt = ecb3_encrypt,
461 .decrypt = ecb3_decrypt,
462 },
463 },
464}, {
465 .cra_name = "cbc(des3_ede)",
466 .cra_driver_name = "cbc-des3_ede-sparc64",
467 .cra_priority = 150,
468 .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER,
469 .cra_blocksize = DES3_EDE_BLOCK_SIZE,
470 .cra_ctxsize = sizeof(struct des3_ede_sparc64_ctx),
471 .cra_alignmask = 7,
472 .cra_type = &crypto_blkcipher_type,
473 .cra_module = THIS_MODULE,
474 .cra_u = {
475 .blkcipher = {
476 .min_keysize = DES3_EDE_KEY_SIZE,
477 .max_keysize = DES3_EDE_KEY_SIZE,
478 .setkey = des3_ede_set_key,
479 .encrypt = cbc3_encrypt,
480 .decrypt = cbc3_decrypt,
481 },
482 },
483} };
484
485static bool __init sparc64_has_des_opcode(void)
486{
487 unsigned long cfr;
488
489 if (!(sparc64_elf_hwcap & HWCAP_SPARC_CRYPTO))
490 return false;
491
492 __asm__ __volatile__("rd %%asr26, %0" : "=r" (cfr));
493 if (!(cfr & CFR_DES))
494 return false;
495
496 return true;
497}
498
499static int __init des_sparc64_mod_init(void)
500{
501 int i;
502
503 for (i = 0; i < ARRAY_SIZE(algs); i++)
504 INIT_LIST_HEAD(&algs[i].cra_list);
505
506 if (sparc64_has_des_opcode()) {
507 pr_info("Using sparc64 des opcodes optimized DES implementation\n");
508 return crypto_register_algs(algs, ARRAY_SIZE(algs));
509 }
510 pr_info("sparc64 des opcodes not available.\n");
511 return -ENODEV;
512}
513
514static void __exit des_sparc64_mod_fini(void)
515{
516 crypto_unregister_algs(algs, ARRAY_SIZE(algs));
517}
518
519module_init(des_sparc64_mod_init);
520module_exit(des_sparc64_mod_fini);
521
522MODULE_LICENSE("GPL");
523MODULE_DESCRIPTION("DES & Triple DES EDE Cipher Algorithms, sparc64 des opcode accelerated");
524
525MODULE_ALIAS("des");