safexcel_cipher.c 108 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * Copyright (C) 2017 Marvell
  4. *
  5. * Antoine Tenart <[email protected]>
  6. */
  7. #include <asm/unaligned.h>
  8. #include <linux/device.h>
  9. #include <linux/dma-mapping.h>
  10. #include <linux/dmapool.h>
  11. #include <crypto/aead.h>
  12. #include <crypto/aes.h>
  13. #include <crypto/authenc.h>
  14. #include <crypto/chacha.h>
  15. #include <crypto/ctr.h>
  16. #include <crypto/internal/des.h>
  17. #include <crypto/gcm.h>
  18. #include <crypto/ghash.h>
  19. #include <crypto/poly1305.h>
  20. #include <crypto/sha1.h>
  21. #include <crypto/sha2.h>
  22. #include <crypto/sm3.h>
  23. #include <crypto/sm4.h>
  24. #include <crypto/xts.h>
  25. #include <crypto/skcipher.h>
  26. #include <crypto/internal/aead.h>
  27. #include <crypto/internal/skcipher.h>
  28. #include "safexcel.h"
  29. enum safexcel_cipher_direction {
  30. SAFEXCEL_ENCRYPT,
  31. SAFEXCEL_DECRYPT,
  32. };
  33. enum safexcel_cipher_alg {
  34. SAFEXCEL_DES,
  35. SAFEXCEL_3DES,
  36. SAFEXCEL_AES,
  37. SAFEXCEL_CHACHA20,
  38. SAFEXCEL_SM4,
  39. };
  40. struct safexcel_cipher_ctx {
  41. struct safexcel_context base;
  42. struct safexcel_crypto_priv *priv;
  43. u32 mode;
  44. enum safexcel_cipher_alg alg;
  45. u8 aead; /* !=0=AEAD, 2=IPSec ESP AEAD, 3=IPsec ESP GMAC */
  46. u8 xcm; /* 0=authenc, 1=GCM, 2 reserved for CCM */
  47. u8 aadskip;
  48. u8 blocksz;
  49. u32 ivmask;
  50. u32 ctrinit;
  51. __le32 key[16];
  52. u32 nonce;
  53. unsigned int key_len, xts;
  54. /* All the below is AEAD specific */
  55. u32 hash_alg;
  56. u32 state_sz;
  57. struct crypto_aead *fback;
  58. };
  59. struct safexcel_cipher_req {
  60. enum safexcel_cipher_direction direction;
  61. /* Number of result descriptors associated to the request */
  62. unsigned int rdescs;
  63. bool needs_inv;
  64. int nr_src, nr_dst;
  65. };
  66. static int safexcel_skcipher_iv(struct safexcel_cipher_ctx *ctx, u8 *iv,
  67. struct safexcel_command_desc *cdesc)
  68. {
  69. if (ctx->mode == CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD) {
  70. cdesc->control_data.options |= EIP197_OPTION_4_TOKEN_IV_CMD;
  71. /* 32 bit nonce */
  72. cdesc->control_data.token[0] = ctx->nonce;
  73. /* 64 bit IV part */
  74. memcpy(&cdesc->control_data.token[1], iv, 8);
  75. /* 32 bit counter, start at 0 or 1 (big endian!) */
  76. cdesc->control_data.token[3] =
  77. (__force u32)cpu_to_be32(ctx->ctrinit);
  78. return 4;
  79. }
  80. if (ctx->alg == SAFEXCEL_CHACHA20) {
  81. cdesc->control_data.options |= EIP197_OPTION_4_TOKEN_IV_CMD;
  82. /* 96 bit nonce part */
  83. memcpy(&cdesc->control_data.token[0], &iv[4], 12);
  84. /* 32 bit counter */
  85. cdesc->control_data.token[3] = *(u32 *)iv;
  86. return 4;
  87. }
  88. cdesc->control_data.options |= ctx->ivmask;
  89. memcpy(cdesc->control_data.token, iv, ctx->blocksz);
  90. return ctx->blocksz / sizeof(u32);
  91. }
  92. static void safexcel_skcipher_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
  93. struct safexcel_command_desc *cdesc,
  94. struct safexcel_token *atoken,
  95. u32 length)
  96. {
  97. struct safexcel_token *token;
  98. int ivlen;
  99. ivlen = safexcel_skcipher_iv(ctx, iv, cdesc);
  100. if (ivlen == 4) {
  101. /* No space in cdesc, instruction moves to atoken */
  102. cdesc->additional_cdata_size = 1;
  103. token = atoken;
  104. } else {
  105. /* Everything fits in cdesc */
  106. token = (struct safexcel_token *)(cdesc->control_data.token + 2);
  107. /* Need to pad with NOP */
  108. eip197_noop_token(&token[1]);
  109. }
  110. token->opcode = EIP197_TOKEN_OPCODE_DIRECTION;
  111. token->packet_length = length;
  112. token->stat = EIP197_TOKEN_STAT_LAST_PACKET |
  113. EIP197_TOKEN_STAT_LAST_HASH;
  114. token->instructions = EIP197_TOKEN_INS_LAST |
  115. EIP197_TOKEN_INS_TYPE_CRYPTO |
  116. EIP197_TOKEN_INS_TYPE_OUTPUT;
  117. }
  118. static void safexcel_aead_iv(struct safexcel_cipher_ctx *ctx, u8 *iv,
  119. struct safexcel_command_desc *cdesc)
  120. {
  121. if (ctx->mode == CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD ||
  122. ctx->aead & EIP197_AEAD_TYPE_IPSEC_ESP) { /* _ESP and _ESP_GMAC */
  123. /* 32 bit nonce */
  124. cdesc->control_data.token[0] = ctx->nonce;
  125. /* 64 bit IV part */
  126. memcpy(&cdesc->control_data.token[1], iv, 8);
  127. /* 32 bit counter, start at 0 or 1 (big endian!) */
  128. cdesc->control_data.token[3] =
  129. (__force u32)cpu_to_be32(ctx->ctrinit);
  130. return;
  131. }
  132. if (ctx->xcm == EIP197_XCM_MODE_GCM || ctx->alg == SAFEXCEL_CHACHA20) {
  133. /* 96 bit IV part */
  134. memcpy(&cdesc->control_data.token[0], iv, 12);
  135. /* 32 bit counter, start at 0 or 1 (big endian!) */
  136. cdesc->control_data.token[3] =
  137. (__force u32)cpu_to_be32(ctx->ctrinit);
  138. return;
  139. }
  140. /* CBC */
  141. memcpy(cdesc->control_data.token, iv, ctx->blocksz);
  142. }
  143. static void safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv,
  144. struct safexcel_command_desc *cdesc,
  145. struct safexcel_token *atoken,
  146. enum safexcel_cipher_direction direction,
  147. u32 cryptlen, u32 assoclen, u32 digestsize)
  148. {
  149. struct safexcel_token *aadref;
  150. int atoksize = 2; /* Start with minimum size */
  151. int assocadj = assoclen - ctx->aadskip, aadalign;
  152. /* Always 4 dwords of embedded IV for AEAD modes */
  153. cdesc->control_data.options |= EIP197_OPTION_4_TOKEN_IV_CMD;
  154. if (direction == SAFEXCEL_DECRYPT)
  155. cryptlen -= digestsize;
  156. if (unlikely(ctx->xcm == EIP197_XCM_MODE_CCM)) {
  157. /* Construct IV block B0 for the CBC-MAC */
  158. u8 *final_iv = (u8 *)cdesc->control_data.token;
  159. u8 *cbcmaciv = (u8 *)&atoken[1];
  160. __le32 *aadlen = (__le32 *)&atoken[5];
  161. if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) {
  162. /* Length + nonce */
  163. cdesc->control_data.token[0] = ctx->nonce;
  164. /* Fixup flags byte */
  165. *(__le32 *)cbcmaciv =
  166. cpu_to_le32(ctx->nonce |
  167. ((assocadj > 0) << 6) |
  168. ((digestsize - 2) << 2));
  169. /* 64 bit IV part */
  170. memcpy(&cdesc->control_data.token[1], iv, 8);
  171. memcpy(cbcmaciv + 4, iv, 8);
  172. /* Start counter at 0 */
  173. cdesc->control_data.token[3] = 0;
  174. /* Message length */
  175. *(__be32 *)(cbcmaciv + 12) = cpu_to_be32(cryptlen);
  176. } else {
  177. /* Variable length IV part */
  178. memcpy(final_iv, iv, 15 - iv[0]);
  179. memcpy(cbcmaciv, iv, 15 - iv[0]);
  180. /* Start variable length counter at 0 */
  181. memset(final_iv + 15 - iv[0], 0, iv[0] + 1);
  182. memset(cbcmaciv + 15 - iv[0], 0, iv[0] - 1);
  183. /* fixup flags byte */
  184. cbcmaciv[0] |= ((assocadj > 0) << 6) |
  185. ((digestsize - 2) << 2);
  186. /* insert lower 2 bytes of message length */
  187. cbcmaciv[14] = cryptlen >> 8;
  188. cbcmaciv[15] = cryptlen & 255;
  189. }
  190. atoken->opcode = EIP197_TOKEN_OPCODE_INSERT;
  191. atoken->packet_length = AES_BLOCK_SIZE +
  192. ((assocadj > 0) << 1);
  193. atoken->stat = 0;
  194. atoken->instructions = EIP197_TOKEN_INS_ORIGIN_TOKEN |
  195. EIP197_TOKEN_INS_TYPE_HASH;
  196. if (likely(assocadj)) {
  197. *aadlen = cpu_to_le32((assocadj >> 8) |
  198. (assocadj & 255) << 8);
  199. atoken += 6;
  200. atoksize += 7;
  201. } else {
  202. atoken += 5;
  203. atoksize += 6;
  204. }
  205. /* Process AAD data */
  206. aadref = atoken;
  207. atoken->opcode = EIP197_TOKEN_OPCODE_DIRECTION;
  208. atoken->packet_length = assocadj;
  209. atoken->stat = 0;
  210. atoken->instructions = EIP197_TOKEN_INS_TYPE_HASH;
  211. atoken++;
  212. /* For CCM only, align AAD data towards hash engine */
  213. atoken->opcode = EIP197_TOKEN_OPCODE_INSERT;
  214. aadalign = (assocadj + 2) & 15;
  215. atoken->packet_length = assocadj && aadalign ?
  216. 16 - aadalign :
  217. 0;
  218. if (likely(cryptlen)) {
  219. atoken->stat = 0;
  220. atoken->instructions = EIP197_TOKEN_INS_TYPE_HASH;
  221. } else {
  222. atoken->stat = EIP197_TOKEN_STAT_LAST_HASH;
  223. atoken->instructions = EIP197_TOKEN_INS_LAST |
  224. EIP197_TOKEN_INS_TYPE_HASH;
  225. }
  226. } else {
  227. safexcel_aead_iv(ctx, iv, cdesc);
  228. /* Process AAD data */
  229. aadref = atoken;
  230. atoken->opcode = EIP197_TOKEN_OPCODE_DIRECTION;
  231. atoken->packet_length = assocadj;
  232. atoken->stat = EIP197_TOKEN_STAT_LAST_HASH;
  233. atoken->instructions = EIP197_TOKEN_INS_LAST |
  234. EIP197_TOKEN_INS_TYPE_HASH;
  235. }
  236. atoken++;
  237. if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) {
  238. /* For ESP mode (and not GMAC), skip over the IV */
  239. atoken->opcode = EIP197_TOKEN_OPCODE_DIRECTION;
  240. atoken->packet_length = EIP197_AEAD_IPSEC_IV_SIZE;
  241. atoken->stat = 0;
  242. atoken->instructions = 0;
  243. atoken++;
  244. atoksize++;
  245. } else if (unlikely(ctx->alg == SAFEXCEL_CHACHA20 &&
  246. direction == SAFEXCEL_DECRYPT)) {
  247. /* Poly-chacha decryption needs a dummy NOP here ... */
  248. atoken->opcode = EIP197_TOKEN_OPCODE_INSERT;
  249. atoken->packet_length = 16; /* According to Op Manual */
  250. atoken->stat = 0;
  251. atoken->instructions = 0;
  252. atoken++;
  253. atoksize++;
  254. }
  255. if (ctx->xcm) {
  256. /* For GCM and CCM, obtain enc(Y0) */
  257. atoken->opcode = EIP197_TOKEN_OPCODE_INSERT_REMRES;
  258. atoken->packet_length = 0;
  259. atoken->stat = 0;
  260. atoken->instructions = AES_BLOCK_SIZE;
  261. atoken++;
  262. atoken->opcode = EIP197_TOKEN_OPCODE_INSERT;
  263. atoken->packet_length = AES_BLOCK_SIZE;
  264. atoken->stat = 0;
  265. atoken->instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
  266. EIP197_TOKEN_INS_TYPE_CRYPTO;
  267. atoken++;
  268. atoksize += 2;
  269. }
  270. if (likely(cryptlen || ctx->alg == SAFEXCEL_CHACHA20)) {
  271. /* Fixup stat field for AAD direction instruction */
  272. aadref->stat = 0;
  273. /* Process crypto data */
  274. atoken->opcode = EIP197_TOKEN_OPCODE_DIRECTION;
  275. atoken->packet_length = cryptlen;
  276. if (unlikely(ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP_GMAC)) {
  277. /* Fixup instruction field for AAD dir instruction */
  278. aadref->instructions = EIP197_TOKEN_INS_TYPE_HASH;
  279. /* Do not send to crypt engine in case of GMAC */
  280. atoken->instructions = EIP197_TOKEN_INS_LAST |
  281. EIP197_TOKEN_INS_TYPE_HASH |
  282. EIP197_TOKEN_INS_TYPE_OUTPUT;
  283. } else {
  284. atoken->instructions = EIP197_TOKEN_INS_LAST |
  285. EIP197_TOKEN_INS_TYPE_CRYPTO |
  286. EIP197_TOKEN_INS_TYPE_HASH |
  287. EIP197_TOKEN_INS_TYPE_OUTPUT;
  288. }
  289. cryptlen &= 15;
  290. if (unlikely(ctx->xcm == EIP197_XCM_MODE_CCM && cryptlen)) {
  291. atoken->stat = 0;
  292. /* For CCM only, pad crypto data to the hash engine */
  293. atoken++;
  294. atoksize++;
  295. atoken->opcode = EIP197_TOKEN_OPCODE_INSERT;
  296. atoken->packet_length = 16 - cryptlen;
  297. atoken->stat = EIP197_TOKEN_STAT_LAST_HASH;
  298. atoken->instructions = EIP197_TOKEN_INS_TYPE_HASH;
  299. } else {
  300. atoken->stat = EIP197_TOKEN_STAT_LAST_HASH;
  301. }
  302. atoken++;
  303. atoksize++;
  304. }
  305. if (direction == SAFEXCEL_ENCRYPT) {
  306. /* Append ICV */
  307. atoken->opcode = EIP197_TOKEN_OPCODE_INSERT;
  308. atoken->packet_length = digestsize;
  309. atoken->stat = EIP197_TOKEN_STAT_LAST_HASH |
  310. EIP197_TOKEN_STAT_LAST_PACKET;
  311. atoken->instructions = EIP197_TOKEN_INS_TYPE_OUTPUT |
  312. EIP197_TOKEN_INS_INSERT_HASH_DIGEST;
  313. } else {
  314. /* Extract ICV */
  315. atoken->opcode = EIP197_TOKEN_OPCODE_RETRIEVE;
  316. atoken->packet_length = digestsize;
  317. atoken->stat = EIP197_TOKEN_STAT_LAST_HASH |
  318. EIP197_TOKEN_STAT_LAST_PACKET;
  319. atoken->instructions = EIP197_TOKEN_INS_INSERT_HASH_DIGEST;
  320. atoken++;
  321. atoksize++;
  322. /* Verify ICV */
  323. atoken->opcode = EIP197_TOKEN_OPCODE_VERIFY;
  324. atoken->packet_length = digestsize |
  325. EIP197_TOKEN_HASH_RESULT_VERIFY;
  326. atoken->stat = EIP197_TOKEN_STAT_LAST_HASH |
  327. EIP197_TOKEN_STAT_LAST_PACKET;
  328. atoken->instructions = EIP197_TOKEN_INS_TYPE_OUTPUT;
  329. }
  330. /* Fixup length of the token in the command descriptor */
  331. cdesc->additional_cdata_size = atoksize;
  332. }
  333. static int safexcel_skcipher_aes_setkey(struct crypto_skcipher *ctfm,
  334. const u8 *key, unsigned int len)
  335. {
  336. struct crypto_tfm *tfm = crypto_skcipher_tfm(ctfm);
  337. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  338. struct safexcel_crypto_priv *priv = ctx->base.priv;
  339. struct crypto_aes_ctx aes;
  340. int ret, i;
  341. ret = aes_expandkey(&aes, key, len);
  342. if (ret)
  343. return ret;
  344. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma) {
  345. for (i = 0; i < len / sizeof(u32); i++) {
  346. if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) {
  347. ctx->base.needs_inv = true;
  348. break;
  349. }
  350. }
  351. }
  352. for (i = 0; i < len / sizeof(u32); i++)
  353. ctx->key[i] = cpu_to_le32(aes.key_enc[i]);
  354. ctx->key_len = len;
  355. memzero_explicit(&aes, sizeof(aes));
  356. return 0;
  357. }
  358. static int safexcel_aead_setkey(struct crypto_aead *ctfm, const u8 *key,
  359. unsigned int len)
  360. {
  361. struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
  362. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  363. struct safexcel_crypto_priv *priv = ctx->base.priv;
  364. struct crypto_authenc_keys keys;
  365. struct crypto_aes_ctx aes;
  366. int err = -EINVAL, i;
  367. const char *alg;
  368. if (unlikely(crypto_authenc_extractkeys(&keys, key, len)))
  369. goto badkey;
  370. if (ctx->mode == CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD) {
  371. /* Must have at least space for the nonce here */
  372. if (unlikely(keys.enckeylen < CTR_RFC3686_NONCE_SIZE))
  373. goto badkey;
  374. /* last 4 bytes of key are the nonce! */
  375. ctx->nonce = *(u32 *)(keys.enckey + keys.enckeylen -
  376. CTR_RFC3686_NONCE_SIZE);
  377. /* exclude the nonce here */
  378. keys.enckeylen -= CTR_RFC3686_NONCE_SIZE;
  379. }
  380. /* Encryption key */
  381. switch (ctx->alg) {
  382. case SAFEXCEL_DES:
  383. err = verify_aead_des_key(ctfm, keys.enckey, keys.enckeylen);
  384. if (unlikely(err))
  385. goto badkey;
  386. break;
  387. case SAFEXCEL_3DES:
  388. err = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen);
  389. if (unlikely(err))
  390. goto badkey;
  391. break;
  392. case SAFEXCEL_AES:
  393. err = aes_expandkey(&aes, keys.enckey, keys.enckeylen);
  394. if (unlikely(err))
  395. goto badkey;
  396. break;
  397. case SAFEXCEL_SM4:
  398. if (unlikely(keys.enckeylen != SM4_KEY_SIZE))
  399. goto badkey;
  400. break;
  401. default:
  402. dev_err(priv->dev, "aead: unsupported cipher algorithm\n");
  403. goto badkey;
  404. }
  405. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma) {
  406. for (i = 0; i < keys.enckeylen / sizeof(u32); i++) {
  407. if (le32_to_cpu(ctx->key[i]) !=
  408. ((u32 *)keys.enckey)[i]) {
  409. ctx->base.needs_inv = true;
  410. break;
  411. }
  412. }
  413. }
  414. /* Auth key */
  415. switch (ctx->hash_alg) {
  416. case CONTEXT_CONTROL_CRYPTO_ALG_SHA1:
  417. alg = "safexcel-sha1";
  418. break;
  419. case CONTEXT_CONTROL_CRYPTO_ALG_SHA224:
  420. alg = "safexcel-sha224";
  421. break;
  422. case CONTEXT_CONTROL_CRYPTO_ALG_SHA256:
  423. alg = "safexcel-sha256";
  424. break;
  425. case CONTEXT_CONTROL_CRYPTO_ALG_SHA384:
  426. alg = "safexcel-sha384";
  427. break;
  428. case CONTEXT_CONTROL_CRYPTO_ALG_SHA512:
  429. alg = "safexcel-sha512";
  430. break;
  431. case CONTEXT_CONTROL_CRYPTO_ALG_SM3:
  432. alg = "safexcel-sm3";
  433. break;
  434. default:
  435. dev_err(priv->dev, "aead: unsupported hash algorithm\n");
  436. goto badkey;
  437. }
  438. if (safexcel_hmac_setkey(&ctx->base, keys.authkey, keys.authkeylen,
  439. alg, ctx->state_sz))
  440. goto badkey;
  441. /* Now copy the keys into the context */
  442. for (i = 0; i < keys.enckeylen / sizeof(u32); i++)
  443. ctx->key[i] = cpu_to_le32(((u32 *)keys.enckey)[i]);
  444. ctx->key_len = keys.enckeylen;
  445. memzero_explicit(&keys, sizeof(keys));
  446. return 0;
  447. badkey:
  448. memzero_explicit(&keys, sizeof(keys));
  449. return err;
  450. }
  451. static int safexcel_context_control(struct safexcel_cipher_ctx *ctx,
  452. struct crypto_async_request *async,
  453. struct safexcel_cipher_req *sreq,
  454. struct safexcel_command_desc *cdesc)
  455. {
  456. struct safexcel_crypto_priv *priv = ctx->base.priv;
  457. int ctrl_size = ctx->key_len / sizeof(u32);
  458. cdesc->control_data.control1 = ctx->mode;
  459. if (ctx->aead) {
  460. /* Take in account the ipad+opad digests */
  461. if (ctx->xcm) {
  462. ctrl_size += ctx->state_sz / sizeof(u32);
  463. cdesc->control_data.control0 =
  464. CONTEXT_CONTROL_KEY_EN |
  465. CONTEXT_CONTROL_DIGEST_XCM |
  466. ctx->hash_alg |
  467. CONTEXT_CONTROL_SIZE(ctrl_size);
  468. } else if (ctx->alg == SAFEXCEL_CHACHA20) {
  469. /* Chacha20-Poly1305 */
  470. cdesc->control_data.control0 =
  471. CONTEXT_CONTROL_KEY_EN |
  472. CONTEXT_CONTROL_CRYPTO_ALG_CHACHA20 |
  473. (sreq->direction == SAFEXCEL_ENCRYPT ?
  474. CONTEXT_CONTROL_TYPE_ENCRYPT_HASH_OUT :
  475. CONTEXT_CONTROL_TYPE_HASH_DECRYPT_IN) |
  476. ctx->hash_alg |
  477. CONTEXT_CONTROL_SIZE(ctrl_size);
  478. return 0;
  479. } else {
  480. ctrl_size += ctx->state_sz / sizeof(u32) * 2;
  481. cdesc->control_data.control0 =
  482. CONTEXT_CONTROL_KEY_EN |
  483. CONTEXT_CONTROL_DIGEST_HMAC |
  484. ctx->hash_alg |
  485. CONTEXT_CONTROL_SIZE(ctrl_size);
  486. }
  487. if (sreq->direction == SAFEXCEL_ENCRYPT &&
  488. (ctx->xcm == EIP197_XCM_MODE_CCM ||
  489. ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP_GMAC))
  490. cdesc->control_data.control0 |=
  491. CONTEXT_CONTROL_TYPE_HASH_ENCRYPT_OUT;
  492. else if (sreq->direction == SAFEXCEL_ENCRYPT)
  493. cdesc->control_data.control0 |=
  494. CONTEXT_CONTROL_TYPE_ENCRYPT_HASH_OUT;
  495. else if (ctx->xcm == EIP197_XCM_MODE_CCM)
  496. cdesc->control_data.control0 |=
  497. CONTEXT_CONTROL_TYPE_DECRYPT_HASH_IN;
  498. else
  499. cdesc->control_data.control0 |=
  500. CONTEXT_CONTROL_TYPE_HASH_DECRYPT_IN;
  501. } else {
  502. if (sreq->direction == SAFEXCEL_ENCRYPT)
  503. cdesc->control_data.control0 =
  504. CONTEXT_CONTROL_TYPE_CRYPTO_OUT |
  505. CONTEXT_CONTROL_KEY_EN |
  506. CONTEXT_CONTROL_SIZE(ctrl_size);
  507. else
  508. cdesc->control_data.control0 =
  509. CONTEXT_CONTROL_TYPE_CRYPTO_IN |
  510. CONTEXT_CONTROL_KEY_EN |
  511. CONTEXT_CONTROL_SIZE(ctrl_size);
  512. }
  513. if (ctx->alg == SAFEXCEL_DES) {
  514. cdesc->control_data.control0 |=
  515. CONTEXT_CONTROL_CRYPTO_ALG_DES;
  516. } else if (ctx->alg == SAFEXCEL_3DES) {
  517. cdesc->control_data.control0 |=
  518. CONTEXT_CONTROL_CRYPTO_ALG_3DES;
  519. } else if (ctx->alg == SAFEXCEL_AES) {
  520. switch (ctx->key_len >> ctx->xts) {
  521. case AES_KEYSIZE_128:
  522. cdesc->control_data.control0 |=
  523. CONTEXT_CONTROL_CRYPTO_ALG_AES128;
  524. break;
  525. case AES_KEYSIZE_192:
  526. cdesc->control_data.control0 |=
  527. CONTEXT_CONTROL_CRYPTO_ALG_AES192;
  528. break;
  529. case AES_KEYSIZE_256:
  530. cdesc->control_data.control0 |=
  531. CONTEXT_CONTROL_CRYPTO_ALG_AES256;
  532. break;
  533. default:
  534. dev_err(priv->dev, "aes keysize not supported: %u\n",
  535. ctx->key_len >> ctx->xts);
  536. return -EINVAL;
  537. }
  538. } else if (ctx->alg == SAFEXCEL_CHACHA20) {
  539. cdesc->control_data.control0 |=
  540. CONTEXT_CONTROL_CRYPTO_ALG_CHACHA20;
  541. } else if (ctx->alg == SAFEXCEL_SM4) {
  542. cdesc->control_data.control0 |=
  543. CONTEXT_CONTROL_CRYPTO_ALG_SM4;
  544. }
  545. return 0;
  546. }
  547. static int safexcel_handle_req_result(struct safexcel_crypto_priv *priv, int ring,
  548. struct crypto_async_request *async,
  549. struct scatterlist *src,
  550. struct scatterlist *dst,
  551. unsigned int cryptlen,
  552. struct safexcel_cipher_req *sreq,
  553. bool *should_complete, int *ret)
  554. {
  555. struct skcipher_request *areq = skcipher_request_cast(async);
  556. struct crypto_skcipher *skcipher = crypto_skcipher_reqtfm(areq);
  557. struct safexcel_cipher_ctx *ctx = crypto_skcipher_ctx(skcipher);
  558. struct safexcel_result_desc *rdesc;
  559. int ndesc = 0;
  560. *ret = 0;
  561. if (unlikely(!sreq->rdescs))
  562. return 0;
  563. while (sreq->rdescs--) {
  564. rdesc = safexcel_ring_next_rptr(priv, &priv->ring[ring].rdr);
  565. if (IS_ERR(rdesc)) {
  566. dev_err(priv->dev,
  567. "cipher: result: could not retrieve the result descriptor\n");
  568. *ret = PTR_ERR(rdesc);
  569. break;
  570. }
  571. if (likely(!*ret))
  572. *ret = safexcel_rdesc_check_errors(priv, rdesc);
  573. ndesc++;
  574. }
  575. safexcel_complete(priv, ring);
  576. if (src == dst) {
  577. if (sreq->nr_src > 0)
  578. dma_unmap_sg(priv->dev, src, sreq->nr_src,
  579. DMA_BIDIRECTIONAL);
  580. } else {
  581. if (sreq->nr_src > 0)
  582. dma_unmap_sg(priv->dev, src, sreq->nr_src,
  583. DMA_TO_DEVICE);
  584. if (sreq->nr_dst > 0)
  585. dma_unmap_sg(priv->dev, dst, sreq->nr_dst,
  586. DMA_FROM_DEVICE);
  587. }
  588. /*
  589. * Update IV in req from last crypto output word for CBC modes
  590. */
  591. if ((!ctx->aead) && (ctx->mode == CONTEXT_CONTROL_CRYPTO_MODE_CBC) &&
  592. (sreq->direction == SAFEXCEL_ENCRYPT)) {
  593. /* For encrypt take the last output word */
  594. sg_pcopy_to_buffer(dst, sreq->nr_dst, areq->iv,
  595. crypto_skcipher_ivsize(skcipher),
  596. (cryptlen -
  597. crypto_skcipher_ivsize(skcipher)));
  598. }
  599. *should_complete = true;
  600. return ndesc;
  601. }
  602. static int safexcel_send_req(struct crypto_async_request *base, int ring,
  603. struct safexcel_cipher_req *sreq,
  604. struct scatterlist *src, struct scatterlist *dst,
  605. unsigned int cryptlen, unsigned int assoclen,
  606. unsigned int digestsize, u8 *iv, int *commands,
  607. int *results)
  608. {
  609. struct skcipher_request *areq = skcipher_request_cast(base);
  610. struct crypto_skcipher *skcipher = crypto_skcipher_reqtfm(areq);
  611. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(base->tfm);
  612. struct safexcel_crypto_priv *priv = ctx->base.priv;
  613. struct safexcel_command_desc *cdesc;
  614. struct safexcel_command_desc *first_cdesc = NULL;
  615. struct safexcel_result_desc *rdesc, *first_rdesc = NULL;
  616. struct scatterlist *sg;
  617. unsigned int totlen;
  618. unsigned int totlen_src = cryptlen + assoclen;
  619. unsigned int totlen_dst = totlen_src;
  620. struct safexcel_token *atoken;
  621. int n_cdesc = 0, n_rdesc = 0;
  622. int queued, i, ret = 0;
  623. bool first = true;
  624. sreq->nr_src = sg_nents_for_len(src, totlen_src);
  625. if (ctx->aead) {
  626. /*
  627. * AEAD has auth tag appended to output for encrypt and
  628. * removed from the output for decrypt!
  629. */
  630. if (sreq->direction == SAFEXCEL_DECRYPT)
  631. totlen_dst -= digestsize;
  632. else
  633. totlen_dst += digestsize;
  634. memcpy(ctx->base.ctxr->data + ctx->key_len / sizeof(u32),
  635. &ctx->base.ipad, ctx->state_sz);
  636. if (!ctx->xcm)
  637. memcpy(ctx->base.ctxr->data + (ctx->key_len +
  638. ctx->state_sz) / sizeof(u32), &ctx->base.opad,
  639. ctx->state_sz);
  640. } else if ((ctx->mode == CONTEXT_CONTROL_CRYPTO_MODE_CBC) &&
  641. (sreq->direction == SAFEXCEL_DECRYPT)) {
  642. /*
  643. * Save IV from last crypto input word for CBC modes in decrypt
  644. * direction. Need to do this first in case of inplace operation
  645. * as it will be overwritten.
  646. */
  647. sg_pcopy_to_buffer(src, sreq->nr_src, areq->iv,
  648. crypto_skcipher_ivsize(skcipher),
  649. (totlen_src -
  650. crypto_skcipher_ivsize(skcipher)));
  651. }
  652. sreq->nr_dst = sg_nents_for_len(dst, totlen_dst);
  653. /*
  654. * Remember actual input length, source buffer length may be
  655. * updated in case of inline operation below.
  656. */
  657. totlen = totlen_src;
  658. queued = totlen_src;
  659. if (src == dst) {
  660. sreq->nr_src = max(sreq->nr_src, sreq->nr_dst);
  661. sreq->nr_dst = sreq->nr_src;
  662. if (unlikely((totlen_src || totlen_dst) &&
  663. (sreq->nr_src <= 0))) {
  664. dev_err(priv->dev, "In-place buffer not large enough (need %d bytes)!",
  665. max(totlen_src, totlen_dst));
  666. return -EINVAL;
  667. }
  668. if (sreq->nr_src > 0)
  669. dma_map_sg(priv->dev, src, sreq->nr_src,
  670. DMA_BIDIRECTIONAL);
  671. } else {
  672. if (unlikely(totlen_src && (sreq->nr_src <= 0))) {
  673. dev_err(priv->dev, "Source buffer not large enough (need %d bytes)!",
  674. totlen_src);
  675. return -EINVAL;
  676. }
  677. if (sreq->nr_src > 0)
  678. dma_map_sg(priv->dev, src, sreq->nr_src, DMA_TO_DEVICE);
  679. if (unlikely(totlen_dst && (sreq->nr_dst <= 0))) {
  680. dev_err(priv->dev, "Dest buffer not large enough (need %d bytes)!",
  681. totlen_dst);
  682. ret = -EINVAL;
  683. goto unmap;
  684. }
  685. if (sreq->nr_dst > 0)
  686. dma_map_sg(priv->dev, dst, sreq->nr_dst,
  687. DMA_FROM_DEVICE);
  688. }
  689. memcpy(ctx->base.ctxr->data, ctx->key, ctx->key_len);
  690. if (!totlen) {
  691. /*
  692. * The EIP97 cannot deal with zero length input packets!
  693. * So stuff a dummy command descriptor indicating a 1 byte
  694. * (dummy) input packet, using the context record as source.
  695. */
  696. first_cdesc = safexcel_add_cdesc(priv, ring,
  697. 1, 1, ctx->base.ctxr_dma,
  698. 1, 1, ctx->base.ctxr_dma,
  699. &atoken);
  700. if (IS_ERR(first_cdesc)) {
  701. /* No space left in the command descriptor ring */
  702. ret = PTR_ERR(first_cdesc);
  703. goto cdesc_rollback;
  704. }
  705. n_cdesc = 1;
  706. goto skip_cdesc;
  707. }
  708. /* command descriptors */
  709. for_each_sg(src, sg, sreq->nr_src, i) {
  710. int len = sg_dma_len(sg);
  711. /* Do not overflow the request */
  712. if (queued < len)
  713. len = queued;
  714. cdesc = safexcel_add_cdesc(priv, ring, !n_cdesc,
  715. !(queued - len),
  716. sg_dma_address(sg), len, totlen,
  717. ctx->base.ctxr_dma, &atoken);
  718. if (IS_ERR(cdesc)) {
  719. /* No space left in the command descriptor ring */
  720. ret = PTR_ERR(cdesc);
  721. goto cdesc_rollback;
  722. }
  723. if (!n_cdesc)
  724. first_cdesc = cdesc;
  725. n_cdesc++;
  726. queued -= len;
  727. if (!queued)
  728. break;
  729. }
  730. skip_cdesc:
  731. /* Add context control words and token to first command descriptor */
  732. safexcel_context_control(ctx, base, sreq, first_cdesc);
  733. if (ctx->aead)
  734. safexcel_aead_token(ctx, iv, first_cdesc, atoken,
  735. sreq->direction, cryptlen,
  736. assoclen, digestsize);
  737. else
  738. safexcel_skcipher_token(ctx, iv, first_cdesc, atoken,
  739. cryptlen);
  740. /* result descriptors */
  741. for_each_sg(dst, sg, sreq->nr_dst, i) {
  742. bool last = (i == sreq->nr_dst - 1);
  743. u32 len = sg_dma_len(sg);
  744. /* only allow the part of the buffer we know we need */
  745. if (len > totlen_dst)
  746. len = totlen_dst;
  747. if (unlikely(!len))
  748. break;
  749. totlen_dst -= len;
  750. /* skip over AAD space in buffer - not written */
  751. if (assoclen) {
  752. if (assoclen >= len) {
  753. assoclen -= len;
  754. continue;
  755. }
  756. rdesc = safexcel_add_rdesc(priv, ring, first, last,
  757. sg_dma_address(sg) +
  758. assoclen,
  759. len - assoclen);
  760. assoclen = 0;
  761. } else {
  762. rdesc = safexcel_add_rdesc(priv, ring, first, last,
  763. sg_dma_address(sg),
  764. len);
  765. }
  766. if (IS_ERR(rdesc)) {
  767. /* No space left in the result descriptor ring */
  768. ret = PTR_ERR(rdesc);
  769. goto rdesc_rollback;
  770. }
  771. if (first) {
  772. first_rdesc = rdesc;
  773. first = false;
  774. }
  775. n_rdesc++;
  776. }
  777. if (unlikely(first)) {
  778. /*
  779. * Special case: AEAD decrypt with only AAD data.
  780. * In this case there is NO output data from the engine,
  781. * but the engine still needs a result descriptor!
  782. * Create a dummy one just for catching the result token.
  783. */
  784. rdesc = safexcel_add_rdesc(priv, ring, true, true, 0, 0);
  785. if (IS_ERR(rdesc)) {
  786. /* No space left in the result descriptor ring */
  787. ret = PTR_ERR(rdesc);
  788. goto rdesc_rollback;
  789. }
  790. first_rdesc = rdesc;
  791. n_rdesc = 1;
  792. }
  793. safexcel_rdr_req_set(priv, ring, first_rdesc, base);
  794. *commands = n_cdesc;
  795. *results = n_rdesc;
  796. return 0;
  797. rdesc_rollback:
  798. for (i = 0; i < n_rdesc; i++)
  799. safexcel_ring_rollback_wptr(priv, &priv->ring[ring].rdr);
  800. cdesc_rollback:
  801. for (i = 0; i < n_cdesc; i++)
  802. safexcel_ring_rollback_wptr(priv, &priv->ring[ring].cdr);
  803. unmap:
  804. if (src == dst) {
  805. if (sreq->nr_src > 0)
  806. dma_unmap_sg(priv->dev, src, sreq->nr_src,
  807. DMA_BIDIRECTIONAL);
  808. } else {
  809. if (sreq->nr_src > 0)
  810. dma_unmap_sg(priv->dev, src, sreq->nr_src,
  811. DMA_TO_DEVICE);
  812. if (sreq->nr_dst > 0)
  813. dma_unmap_sg(priv->dev, dst, sreq->nr_dst,
  814. DMA_FROM_DEVICE);
  815. }
  816. return ret;
  817. }
  818. static int safexcel_handle_inv_result(struct safexcel_crypto_priv *priv,
  819. int ring,
  820. struct crypto_async_request *base,
  821. struct safexcel_cipher_req *sreq,
  822. bool *should_complete, int *ret)
  823. {
  824. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(base->tfm);
  825. struct safexcel_result_desc *rdesc;
  826. int ndesc = 0, enq_ret;
  827. *ret = 0;
  828. if (unlikely(!sreq->rdescs))
  829. return 0;
  830. while (sreq->rdescs--) {
  831. rdesc = safexcel_ring_next_rptr(priv, &priv->ring[ring].rdr);
  832. if (IS_ERR(rdesc)) {
  833. dev_err(priv->dev,
  834. "cipher: invalidate: could not retrieve the result descriptor\n");
  835. *ret = PTR_ERR(rdesc);
  836. break;
  837. }
  838. if (likely(!*ret))
  839. *ret = safexcel_rdesc_check_errors(priv, rdesc);
  840. ndesc++;
  841. }
  842. safexcel_complete(priv, ring);
  843. if (ctx->base.exit_inv) {
  844. dma_pool_free(priv->context_pool, ctx->base.ctxr,
  845. ctx->base.ctxr_dma);
  846. *should_complete = true;
  847. return ndesc;
  848. }
  849. ring = safexcel_select_ring(priv);
  850. ctx->base.ring = ring;
  851. spin_lock_bh(&priv->ring[ring].queue_lock);
  852. enq_ret = crypto_enqueue_request(&priv->ring[ring].queue, base);
  853. spin_unlock_bh(&priv->ring[ring].queue_lock);
  854. if (enq_ret != -EINPROGRESS)
  855. *ret = enq_ret;
  856. queue_work(priv->ring[ring].workqueue,
  857. &priv->ring[ring].work_data.work);
  858. *should_complete = false;
  859. return ndesc;
  860. }
  861. static int safexcel_skcipher_handle_result(struct safexcel_crypto_priv *priv,
  862. int ring,
  863. struct crypto_async_request *async,
  864. bool *should_complete, int *ret)
  865. {
  866. struct skcipher_request *req = skcipher_request_cast(async);
  867. struct safexcel_cipher_req *sreq = skcipher_request_ctx(req);
  868. int err;
  869. if (sreq->needs_inv) {
  870. sreq->needs_inv = false;
  871. err = safexcel_handle_inv_result(priv, ring, async, sreq,
  872. should_complete, ret);
  873. } else {
  874. err = safexcel_handle_req_result(priv, ring, async, req->src,
  875. req->dst, req->cryptlen, sreq,
  876. should_complete, ret);
  877. }
  878. return err;
  879. }
  880. static int safexcel_aead_handle_result(struct safexcel_crypto_priv *priv,
  881. int ring,
  882. struct crypto_async_request *async,
  883. bool *should_complete, int *ret)
  884. {
  885. struct aead_request *req = aead_request_cast(async);
  886. struct crypto_aead *tfm = crypto_aead_reqtfm(req);
  887. struct safexcel_cipher_req *sreq = aead_request_ctx(req);
  888. int err;
  889. if (sreq->needs_inv) {
  890. sreq->needs_inv = false;
  891. err = safexcel_handle_inv_result(priv, ring, async, sreq,
  892. should_complete, ret);
  893. } else {
  894. err = safexcel_handle_req_result(priv, ring, async, req->src,
  895. req->dst,
  896. req->cryptlen + crypto_aead_authsize(tfm),
  897. sreq, should_complete, ret);
  898. }
  899. return err;
  900. }
  901. static int safexcel_cipher_send_inv(struct crypto_async_request *base,
  902. int ring, int *commands, int *results)
  903. {
  904. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(base->tfm);
  905. struct safexcel_crypto_priv *priv = ctx->base.priv;
  906. int ret;
  907. ret = safexcel_invalidate_cache(base, priv, ctx->base.ctxr_dma, ring);
  908. if (unlikely(ret))
  909. return ret;
  910. *commands = 1;
  911. *results = 1;
  912. return 0;
  913. }
  914. static int safexcel_skcipher_send(struct crypto_async_request *async, int ring,
  915. int *commands, int *results)
  916. {
  917. struct skcipher_request *req = skcipher_request_cast(async);
  918. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
  919. struct safexcel_cipher_req *sreq = skcipher_request_ctx(req);
  920. struct safexcel_crypto_priv *priv = ctx->base.priv;
  921. int ret;
  922. BUG_ON(!(priv->flags & EIP197_TRC_CACHE) && sreq->needs_inv);
  923. if (sreq->needs_inv) {
  924. ret = safexcel_cipher_send_inv(async, ring, commands, results);
  925. } else {
  926. struct crypto_skcipher *skcipher = crypto_skcipher_reqtfm(req);
  927. u8 input_iv[AES_BLOCK_SIZE];
  928. /*
  929. * Save input IV in case of CBC decrypt mode
  930. * Will be overwritten with output IV prior to use!
  931. */
  932. memcpy(input_iv, req->iv, crypto_skcipher_ivsize(skcipher));
  933. ret = safexcel_send_req(async, ring, sreq, req->src,
  934. req->dst, req->cryptlen, 0, 0, input_iv,
  935. commands, results);
  936. }
  937. sreq->rdescs = *results;
  938. return ret;
  939. }
  940. static int safexcel_aead_send(struct crypto_async_request *async, int ring,
  941. int *commands, int *results)
  942. {
  943. struct aead_request *req = aead_request_cast(async);
  944. struct crypto_aead *tfm = crypto_aead_reqtfm(req);
  945. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
  946. struct safexcel_cipher_req *sreq = aead_request_ctx(req);
  947. struct safexcel_crypto_priv *priv = ctx->base.priv;
  948. int ret;
  949. BUG_ON(!(priv->flags & EIP197_TRC_CACHE) && sreq->needs_inv);
  950. if (sreq->needs_inv)
  951. ret = safexcel_cipher_send_inv(async, ring, commands, results);
  952. else
  953. ret = safexcel_send_req(async, ring, sreq, req->src, req->dst,
  954. req->cryptlen, req->assoclen,
  955. crypto_aead_authsize(tfm), req->iv,
  956. commands, results);
  957. sreq->rdescs = *results;
  958. return ret;
  959. }
  960. static int safexcel_cipher_exit_inv(struct crypto_tfm *tfm,
  961. struct crypto_async_request *base,
  962. struct safexcel_cipher_req *sreq,
  963. struct safexcel_inv_result *result)
  964. {
  965. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  966. struct safexcel_crypto_priv *priv = ctx->base.priv;
  967. int ring = ctx->base.ring;
  968. init_completion(&result->completion);
  969. ctx = crypto_tfm_ctx(base->tfm);
  970. ctx->base.exit_inv = true;
  971. sreq->needs_inv = true;
  972. spin_lock_bh(&priv->ring[ring].queue_lock);
  973. crypto_enqueue_request(&priv->ring[ring].queue, base);
  974. spin_unlock_bh(&priv->ring[ring].queue_lock);
  975. queue_work(priv->ring[ring].workqueue,
  976. &priv->ring[ring].work_data.work);
  977. wait_for_completion(&result->completion);
  978. if (result->error) {
  979. dev_warn(priv->dev,
  980. "cipher: sync: invalidate: completion error %d\n",
  981. result->error);
  982. return result->error;
  983. }
  984. return 0;
  985. }
  986. static int safexcel_skcipher_exit_inv(struct crypto_tfm *tfm)
  987. {
  988. EIP197_REQUEST_ON_STACK(req, skcipher, EIP197_SKCIPHER_REQ_SIZE);
  989. struct safexcel_cipher_req *sreq = skcipher_request_ctx(req);
  990. struct safexcel_inv_result result = {};
  991. memset(req, 0, sizeof(struct skcipher_request));
  992. skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  993. safexcel_inv_complete, &result);
  994. skcipher_request_set_tfm(req, __crypto_skcipher_cast(tfm));
  995. return safexcel_cipher_exit_inv(tfm, &req->base, sreq, &result);
  996. }
  997. static int safexcel_aead_exit_inv(struct crypto_tfm *tfm)
  998. {
  999. EIP197_REQUEST_ON_STACK(req, aead, EIP197_AEAD_REQ_SIZE);
  1000. struct safexcel_cipher_req *sreq = aead_request_ctx(req);
  1001. struct safexcel_inv_result result = {};
  1002. memset(req, 0, sizeof(struct aead_request));
  1003. aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
  1004. safexcel_inv_complete, &result);
  1005. aead_request_set_tfm(req, __crypto_aead_cast(tfm));
  1006. return safexcel_cipher_exit_inv(tfm, &req->base, sreq, &result);
  1007. }
  1008. static int safexcel_queue_req(struct crypto_async_request *base,
  1009. struct safexcel_cipher_req *sreq,
  1010. enum safexcel_cipher_direction dir)
  1011. {
  1012. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(base->tfm);
  1013. struct safexcel_crypto_priv *priv = ctx->base.priv;
  1014. int ret, ring;
  1015. sreq->needs_inv = false;
  1016. sreq->direction = dir;
  1017. if (ctx->base.ctxr) {
  1018. if (priv->flags & EIP197_TRC_CACHE && ctx->base.needs_inv) {
  1019. sreq->needs_inv = true;
  1020. ctx->base.needs_inv = false;
  1021. }
  1022. } else {
  1023. ctx->base.ring = safexcel_select_ring(priv);
  1024. ctx->base.ctxr = dma_pool_zalloc(priv->context_pool,
  1025. EIP197_GFP_FLAGS(*base),
  1026. &ctx->base.ctxr_dma);
  1027. if (!ctx->base.ctxr)
  1028. return -ENOMEM;
  1029. }
  1030. ring = ctx->base.ring;
  1031. spin_lock_bh(&priv->ring[ring].queue_lock);
  1032. ret = crypto_enqueue_request(&priv->ring[ring].queue, base);
  1033. spin_unlock_bh(&priv->ring[ring].queue_lock);
  1034. queue_work(priv->ring[ring].workqueue,
  1035. &priv->ring[ring].work_data.work);
  1036. return ret;
  1037. }
  1038. static int safexcel_encrypt(struct skcipher_request *req)
  1039. {
  1040. return safexcel_queue_req(&req->base, skcipher_request_ctx(req),
  1041. SAFEXCEL_ENCRYPT);
  1042. }
  1043. static int safexcel_decrypt(struct skcipher_request *req)
  1044. {
  1045. return safexcel_queue_req(&req->base, skcipher_request_ctx(req),
  1046. SAFEXCEL_DECRYPT);
  1047. }
  1048. static int safexcel_skcipher_cra_init(struct crypto_tfm *tfm)
  1049. {
  1050. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1051. struct safexcel_alg_template *tmpl =
  1052. container_of(tfm->__crt_alg, struct safexcel_alg_template,
  1053. alg.skcipher.base);
  1054. crypto_skcipher_set_reqsize(__crypto_skcipher_cast(tfm),
  1055. sizeof(struct safexcel_cipher_req));
  1056. ctx->base.priv = tmpl->priv;
  1057. ctx->base.send = safexcel_skcipher_send;
  1058. ctx->base.handle_result = safexcel_skcipher_handle_result;
  1059. ctx->ivmask = EIP197_OPTION_4_TOKEN_IV_CMD;
  1060. ctx->ctrinit = 1;
  1061. return 0;
  1062. }
  1063. static int safexcel_cipher_cra_exit(struct crypto_tfm *tfm)
  1064. {
  1065. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1066. memzero_explicit(ctx->key, sizeof(ctx->key));
  1067. /* context not allocated, skip invalidation */
  1068. if (!ctx->base.ctxr)
  1069. return -ENOMEM;
  1070. memzero_explicit(ctx->base.ctxr->data, sizeof(ctx->base.ctxr->data));
  1071. return 0;
  1072. }
  1073. static void safexcel_skcipher_cra_exit(struct crypto_tfm *tfm)
  1074. {
  1075. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1076. struct safexcel_crypto_priv *priv = ctx->base.priv;
  1077. int ret;
  1078. if (safexcel_cipher_cra_exit(tfm))
  1079. return;
  1080. if (priv->flags & EIP197_TRC_CACHE) {
  1081. ret = safexcel_skcipher_exit_inv(tfm);
  1082. if (ret)
  1083. dev_warn(priv->dev, "skcipher: invalidation error %d\n",
  1084. ret);
  1085. } else {
  1086. dma_pool_free(priv->context_pool, ctx->base.ctxr,
  1087. ctx->base.ctxr_dma);
  1088. }
  1089. }
  1090. static void safexcel_aead_cra_exit(struct crypto_tfm *tfm)
  1091. {
  1092. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1093. struct safexcel_crypto_priv *priv = ctx->base.priv;
  1094. int ret;
  1095. if (safexcel_cipher_cra_exit(tfm))
  1096. return;
  1097. if (priv->flags & EIP197_TRC_CACHE) {
  1098. ret = safexcel_aead_exit_inv(tfm);
  1099. if (ret)
  1100. dev_warn(priv->dev, "aead: invalidation error %d\n",
  1101. ret);
  1102. } else {
  1103. dma_pool_free(priv->context_pool, ctx->base.ctxr,
  1104. ctx->base.ctxr_dma);
  1105. }
  1106. }
  1107. static int safexcel_skcipher_aes_ecb_cra_init(struct crypto_tfm *tfm)
  1108. {
  1109. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1110. safexcel_skcipher_cra_init(tfm);
  1111. ctx->alg = SAFEXCEL_AES;
  1112. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_ECB;
  1113. ctx->blocksz = 0;
  1114. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1115. return 0;
  1116. }
  1117. struct safexcel_alg_template safexcel_alg_ecb_aes = {
  1118. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  1119. .algo_mask = SAFEXCEL_ALG_AES,
  1120. .alg.skcipher = {
  1121. .setkey = safexcel_skcipher_aes_setkey,
  1122. .encrypt = safexcel_encrypt,
  1123. .decrypt = safexcel_decrypt,
  1124. .min_keysize = AES_MIN_KEY_SIZE,
  1125. .max_keysize = AES_MAX_KEY_SIZE,
  1126. .base = {
  1127. .cra_name = "ecb(aes)",
  1128. .cra_driver_name = "safexcel-ecb-aes",
  1129. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1130. .cra_flags = CRYPTO_ALG_ASYNC |
  1131. CRYPTO_ALG_ALLOCATES_MEMORY |
  1132. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1133. .cra_blocksize = AES_BLOCK_SIZE,
  1134. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1135. .cra_alignmask = 0,
  1136. .cra_init = safexcel_skcipher_aes_ecb_cra_init,
  1137. .cra_exit = safexcel_skcipher_cra_exit,
  1138. .cra_module = THIS_MODULE,
  1139. },
  1140. },
  1141. };
  1142. static int safexcel_skcipher_aes_cbc_cra_init(struct crypto_tfm *tfm)
  1143. {
  1144. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1145. safexcel_skcipher_cra_init(tfm);
  1146. ctx->alg = SAFEXCEL_AES;
  1147. ctx->blocksz = AES_BLOCK_SIZE;
  1148. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CBC;
  1149. return 0;
  1150. }
  1151. struct safexcel_alg_template safexcel_alg_cbc_aes = {
  1152. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  1153. .algo_mask = SAFEXCEL_ALG_AES,
  1154. .alg.skcipher = {
  1155. .setkey = safexcel_skcipher_aes_setkey,
  1156. .encrypt = safexcel_encrypt,
  1157. .decrypt = safexcel_decrypt,
  1158. .min_keysize = AES_MIN_KEY_SIZE,
  1159. .max_keysize = AES_MAX_KEY_SIZE,
  1160. .ivsize = AES_BLOCK_SIZE,
  1161. .base = {
  1162. .cra_name = "cbc(aes)",
  1163. .cra_driver_name = "safexcel-cbc-aes",
  1164. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1165. .cra_flags = CRYPTO_ALG_ASYNC |
  1166. CRYPTO_ALG_ALLOCATES_MEMORY |
  1167. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1168. .cra_blocksize = AES_BLOCK_SIZE,
  1169. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1170. .cra_alignmask = 0,
  1171. .cra_init = safexcel_skcipher_aes_cbc_cra_init,
  1172. .cra_exit = safexcel_skcipher_cra_exit,
  1173. .cra_module = THIS_MODULE,
  1174. },
  1175. },
  1176. };
  1177. static int safexcel_skcipher_aes_cfb_cra_init(struct crypto_tfm *tfm)
  1178. {
  1179. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1180. safexcel_skcipher_cra_init(tfm);
  1181. ctx->alg = SAFEXCEL_AES;
  1182. ctx->blocksz = AES_BLOCK_SIZE;
  1183. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CFB;
  1184. return 0;
  1185. }
  1186. struct safexcel_alg_template safexcel_alg_cfb_aes = {
  1187. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  1188. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_AES_XFB,
  1189. .alg.skcipher = {
  1190. .setkey = safexcel_skcipher_aes_setkey,
  1191. .encrypt = safexcel_encrypt,
  1192. .decrypt = safexcel_decrypt,
  1193. .min_keysize = AES_MIN_KEY_SIZE,
  1194. .max_keysize = AES_MAX_KEY_SIZE,
  1195. .ivsize = AES_BLOCK_SIZE,
  1196. .base = {
  1197. .cra_name = "cfb(aes)",
  1198. .cra_driver_name = "safexcel-cfb-aes",
  1199. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1200. .cra_flags = CRYPTO_ALG_ASYNC |
  1201. CRYPTO_ALG_ALLOCATES_MEMORY |
  1202. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1203. .cra_blocksize = 1,
  1204. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1205. .cra_alignmask = 0,
  1206. .cra_init = safexcel_skcipher_aes_cfb_cra_init,
  1207. .cra_exit = safexcel_skcipher_cra_exit,
  1208. .cra_module = THIS_MODULE,
  1209. },
  1210. },
  1211. };
  1212. static int safexcel_skcipher_aes_ofb_cra_init(struct crypto_tfm *tfm)
  1213. {
  1214. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1215. safexcel_skcipher_cra_init(tfm);
  1216. ctx->alg = SAFEXCEL_AES;
  1217. ctx->blocksz = AES_BLOCK_SIZE;
  1218. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_OFB;
  1219. return 0;
  1220. }
  1221. struct safexcel_alg_template safexcel_alg_ofb_aes = {
  1222. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  1223. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_AES_XFB,
  1224. .alg.skcipher = {
  1225. .setkey = safexcel_skcipher_aes_setkey,
  1226. .encrypt = safexcel_encrypt,
  1227. .decrypt = safexcel_decrypt,
  1228. .min_keysize = AES_MIN_KEY_SIZE,
  1229. .max_keysize = AES_MAX_KEY_SIZE,
  1230. .ivsize = AES_BLOCK_SIZE,
  1231. .base = {
  1232. .cra_name = "ofb(aes)",
  1233. .cra_driver_name = "safexcel-ofb-aes",
  1234. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1235. .cra_flags = CRYPTO_ALG_ASYNC |
  1236. CRYPTO_ALG_ALLOCATES_MEMORY |
  1237. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1238. .cra_blocksize = 1,
  1239. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1240. .cra_alignmask = 0,
  1241. .cra_init = safexcel_skcipher_aes_ofb_cra_init,
  1242. .cra_exit = safexcel_skcipher_cra_exit,
  1243. .cra_module = THIS_MODULE,
  1244. },
  1245. },
  1246. };
  1247. static int safexcel_skcipher_aesctr_setkey(struct crypto_skcipher *ctfm,
  1248. const u8 *key, unsigned int len)
  1249. {
  1250. struct crypto_tfm *tfm = crypto_skcipher_tfm(ctfm);
  1251. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1252. struct safexcel_crypto_priv *priv = ctx->base.priv;
  1253. struct crypto_aes_ctx aes;
  1254. int ret, i;
  1255. unsigned int keylen;
  1256. /* last 4 bytes of key are the nonce! */
  1257. ctx->nonce = *(u32 *)(key + len - CTR_RFC3686_NONCE_SIZE);
  1258. /* exclude the nonce here */
  1259. keylen = len - CTR_RFC3686_NONCE_SIZE;
  1260. ret = aes_expandkey(&aes, key, keylen);
  1261. if (ret)
  1262. return ret;
  1263. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma) {
  1264. for (i = 0; i < keylen / sizeof(u32); i++) {
  1265. if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) {
  1266. ctx->base.needs_inv = true;
  1267. break;
  1268. }
  1269. }
  1270. }
  1271. for (i = 0; i < keylen / sizeof(u32); i++)
  1272. ctx->key[i] = cpu_to_le32(aes.key_enc[i]);
  1273. ctx->key_len = keylen;
  1274. memzero_explicit(&aes, sizeof(aes));
  1275. return 0;
  1276. }
  1277. static int safexcel_skcipher_aes_ctr_cra_init(struct crypto_tfm *tfm)
  1278. {
  1279. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1280. safexcel_skcipher_cra_init(tfm);
  1281. ctx->alg = SAFEXCEL_AES;
  1282. ctx->blocksz = AES_BLOCK_SIZE;
  1283. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD;
  1284. return 0;
  1285. }
  1286. struct safexcel_alg_template safexcel_alg_ctr_aes = {
  1287. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  1288. .algo_mask = SAFEXCEL_ALG_AES,
  1289. .alg.skcipher = {
  1290. .setkey = safexcel_skcipher_aesctr_setkey,
  1291. .encrypt = safexcel_encrypt,
  1292. .decrypt = safexcel_decrypt,
  1293. /* Add nonce size */
  1294. .min_keysize = AES_MIN_KEY_SIZE + CTR_RFC3686_NONCE_SIZE,
  1295. .max_keysize = AES_MAX_KEY_SIZE + CTR_RFC3686_NONCE_SIZE,
  1296. .ivsize = CTR_RFC3686_IV_SIZE,
  1297. .base = {
  1298. .cra_name = "rfc3686(ctr(aes))",
  1299. .cra_driver_name = "safexcel-ctr-aes",
  1300. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1301. .cra_flags = CRYPTO_ALG_ASYNC |
  1302. CRYPTO_ALG_ALLOCATES_MEMORY |
  1303. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1304. .cra_blocksize = 1,
  1305. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1306. .cra_alignmask = 0,
  1307. .cra_init = safexcel_skcipher_aes_ctr_cra_init,
  1308. .cra_exit = safexcel_skcipher_cra_exit,
  1309. .cra_module = THIS_MODULE,
  1310. },
  1311. },
  1312. };
  1313. static int safexcel_des_setkey(struct crypto_skcipher *ctfm, const u8 *key,
  1314. unsigned int len)
  1315. {
  1316. struct safexcel_cipher_ctx *ctx = crypto_skcipher_ctx(ctfm);
  1317. struct safexcel_crypto_priv *priv = ctx->base.priv;
  1318. int ret;
  1319. ret = verify_skcipher_des_key(ctfm, key);
  1320. if (ret)
  1321. return ret;
  1322. /* if context exits and key changed, need to invalidate it */
  1323. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma)
  1324. if (memcmp(ctx->key, key, len))
  1325. ctx->base.needs_inv = true;
  1326. memcpy(ctx->key, key, len);
  1327. ctx->key_len = len;
  1328. return 0;
  1329. }
  1330. static int safexcel_skcipher_des_cbc_cra_init(struct crypto_tfm *tfm)
  1331. {
  1332. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1333. safexcel_skcipher_cra_init(tfm);
  1334. ctx->alg = SAFEXCEL_DES;
  1335. ctx->blocksz = DES_BLOCK_SIZE;
  1336. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1337. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CBC;
  1338. return 0;
  1339. }
  1340. struct safexcel_alg_template safexcel_alg_cbc_des = {
  1341. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  1342. .algo_mask = SAFEXCEL_ALG_DES,
  1343. .alg.skcipher = {
  1344. .setkey = safexcel_des_setkey,
  1345. .encrypt = safexcel_encrypt,
  1346. .decrypt = safexcel_decrypt,
  1347. .min_keysize = DES_KEY_SIZE,
  1348. .max_keysize = DES_KEY_SIZE,
  1349. .ivsize = DES_BLOCK_SIZE,
  1350. .base = {
  1351. .cra_name = "cbc(des)",
  1352. .cra_driver_name = "safexcel-cbc-des",
  1353. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1354. .cra_flags = CRYPTO_ALG_ASYNC |
  1355. CRYPTO_ALG_ALLOCATES_MEMORY |
  1356. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1357. .cra_blocksize = DES_BLOCK_SIZE,
  1358. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1359. .cra_alignmask = 0,
  1360. .cra_init = safexcel_skcipher_des_cbc_cra_init,
  1361. .cra_exit = safexcel_skcipher_cra_exit,
  1362. .cra_module = THIS_MODULE,
  1363. },
  1364. },
  1365. };
  1366. static int safexcel_skcipher_des_ecb_cra_init(struct crypto_tfm *tfm)
  1367. {
  1368. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1369. safexcel_skcipher_cra_init(tfm);
  1370. ctx->alg = SAFEXCEL_DES;
  1371. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_ECB;
  1372. ctx->blocksz = 0;
  1373. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1374. return 0;
  1375. }
  1376. struct safexcel_alg_template safexcel_alg_ecb_des = {
  1377. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  1378. .algo_mask = SAFEXCEL_ALG_DES,
  1379. .alg.skcipher = {
  1380. .setkey = safexcel_des_setkey,
  1381. .encrypt = safexcel_encrypt,
  1382. .decrypt = safexcel_decrypt,
  1383. .min_keysize = DES_KEY_SIZE,
  1384. .max_keysize = DES_KEY_SIZE,
  1385. .base = {
  1386. .cra_name = "ecb(des)",
  1387. .cra_driver_name = "safexcel-ecb-des",
  1388. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1389. .cra_flags = CRYPTO_ALG_ASYNC |
  1390. CRYPTO_ALG_ALLOCATES_MEMORY |
  1391. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1392. .cra_blocksize = DES_BLOCK_SIZE,
  1393. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1394. .cra_alignmask = 0,
  1395. .cra_init = safexcel_skcipher_des_ecb_cra_init,
  1396. .cra_exit = safexcel_skcipher_cra_exit,
  1397. .cra_module = THIS_MODULE,
  1398. },
  1399. },
  1400. };
  1401. static int safexcel_des3_ede_setkey(struct crypto_skcipher *ctfm,
  1402. const u8 *key, unsigned int len)
  1403. {
  1404. struct safexcel_cipher_ctx *ctx = crypto_skcipher_ctx(ctfm);
  1405. struct safexcel_crypto_priv *priv = ctx->base.priv;
  1406. int err;
  1407. err = verify_skcipher_des3_key(ctfm, key);
  1408. if (err)
  1409. return err;
  1410. /* if context exits and key changed, need to invalidate it */
  1411. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma)
  1412. if (memcmp(ctx->key, key, len))
  1413. ctx->base.needs_inv = true;
  1414. memcpy(ctx->key, key, len);
  1415. ctx->key_len = len;
  1416. return 0;
  1417. }
  1418. static int safexcel_skcipher_des3_cbc_cra_init(struct crypto_tfm *tfm)
  1419. {
  1420. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1421. safexcel_skcipher_cra_init(tfm);
  1422. ctx->alg = SAFEXCEL_3DES;
  1423. ctx->blocksz = DES3_EDE_BLOCK_SIZE;
  1424. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1425. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CBC;
  1426. return 0;
  1427. }
  1428. struct safexcel_alg_template safexcel_alg_cbc_des3_ede = {
  1429. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  1430. .algo_mask = SAFEXCEL_ALG_DES,
  1431. .alg.skcipher = {
  1432. .setkey = safexcel_des3_ede_setkey,
  1433. .encrypt = safexcel_encrypt,
  1434. .decrypt = safexcel_decrypt,
  1435. .min_keysize = DES3_EDE_KEY_SIZE,
  1436. .max_keysize = DES3_EDE_KEY_SIZE,
  1437. .ivsize = DES3_EDE_BLOCK_SIZE,
  1438. .base = {
  1439. .cra_name = "cbc(des3_ede)",
  1440. .cra_driver_name = "safexcel-cbc-des3_ede",
  1441. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1442. .cra_flags = CRYPTO_ALG_ASYNC |
  1443. CRYPTO_ALG_ALLOCATES_MEMORY |
  1444. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1445. .cra_blocksize = DES3_EDE_BLOCK_SIZE,
  1446. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1447. .cra_alignmask = 0,
  1448. .cra_init = safexcel_skcipher_des3_cbc_cra_init,
  1449. .cra_exit = safexcel_skcipher_cra_exit,
  1450. .cra_module = THIS_MODULE,
  1451. },
  1452. },
  1453. };
  1454. static int safexcel_skcipher_des3_ecb_cra_init(struct crypto_tfm *tfm)
  1455. {
  1456. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1457. safexcel_skcipher_cra_init(tfm);
  1458. ctx->alg = SAFEXCEL_3DES;
  1459. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_ECB;
  1460. ctx->blocksz = 0;
  1461. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1462. return 0;
  1463. }
  1464. struct safexcel_alg_template safexcel_alg_ecb_des3_ede = {
  1465. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  1466. .algo_mask = SAFEXCEL_ALG_DES,
  1467. .alg.skcipher = {
  1468. .setkey = safexcel_des3_ede_setkey,
  1469. .encrypt = safexcel_encrypt,
  1470. .decrypt = safexcel_decrypt,
  1471. .min_keysize = DES3_EDE_KEY_SIZE,
  1472. .max_keysize = DES3_EDE_KEY_SIZE,
  1473. .base = {
  1474. .cra_name = "ecb(des3_ede)",
  1475. .cra_driver_name = "safexcel-ecb-des3_ede",
  1476. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1477. .cra_flags = CRYPTO_ALG_ASYNC |
  1478. CRYPTO_ALG_ALLOCATES_MEMORY |
  1479. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1480. .cra_blocksize = DES3_EDE_BLOCK_SIZE,
  1481. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1482. .cra_alignmask = 0,
  1483. .cra_init = safexcel_skcipher_des3_ecb_cra_init,
  1484. .cra_exit = safexcel_skcipher_cra_exit,
  1485. .cra_module = THIS_MODULE,
  1486. },
  1487. },
  1488. };
  1489. static int safexcel_aead_encrypt(struct aead_request *req)
  1490. {
  1491. struct safexcel_cipher_req *creq = aead_request_ctx(req);
  1492. return safexcel_queue_req(&req->base, creq, SAFEXCEL_ENCRYPT);
  1493. }
  1494. static int safexcel_aead_decrypt(struct aead_request *req)
  1495. {
  1496. struct safexcel_cipher_req *creq = aead_request_ctx(req);
  1497. return safexcel_queue_req(&req->base, creq, SAFEXCEL_DECRYPT);
  1498. }
  1499. static int safexcel_aead_cra_init(struct crypto_tfm *tfm)
  1500. {
  1501. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1502. struct safexcel_alg_template *tmpl =
  1503. container_of(tfm->__crt_alg, struct safexcel_alg_template,
  1504. alg.aead.base);
  1505. crypto_aead_set_reqsize(__crypto_aead_cast(tfm),
  1506. sizeof(struct safexcel_cipher_req));
  1507. ctx->base.priv = tmpl->priv;
  1508. ctx->alg = SAFEXCEL_AES; /* default */
  1509. ctx->blocksz = AES_BLOCK_SIZE;
  1510. ctx->ivmask = EIP197_OPTION_4_TOKEN_IV_CMD;
  1511. ctx->ctrinit = 1;
  1512. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CBC; /* default */
  1513. ctx->aead = true;
  1514. ctx->base.send = safexcel_aead_send;
  1515. ctx->base.handle_result = safexcel_aead_handle_result;
  1516. return 0;
  1517. }
  1518. static int safexcel_aead_sha1_cra_init(struct crypto_tfm *tfm)
  1519. {
  1520. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1521. safexcel_aead_cra_init(tfm);
  1522. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA1;
  1523. ctx->state_sz = SHA1_DIGEST_SIZE;
  1524. return 0;
  1525. }
  1526. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha1_cbc_aes = {
  1527. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1528. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA1,
  1529. .alg.aead = {
  1530. .setkey = safexcel_aead_setkey,
  1531. .encrypt = safexcel_aead_encrypt,
  1532. .decrypt = safexcel_aead_decrypt,
  1533. .ivsize = AES_BLOCK_SIZE,
  1534. .maxauthsize = SHA1_DIGEST_SIZE,
  1535. .base = {
  1536. .cra_name = "authenc(hmac(sha1),cbc(aes))",
  1537. .cra_driver_name = "safexcel-authenc-hmac-sha1-cbc-aes",
  1538. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1539. .cra_flags = CRYPTO_ALG_ASYNC |
  1540. CRYPTO_ALG_ALLOCATES_MEMORY |
  1541. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1542. .cra_blocksize = AES_BLOCK_SIZE,
  1543. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1544. .cra_alignmask = 0,
  1545. .cra_init = safexcel_aead_sha1_cra_init,
  1546. .cra_exit = safexcel_aead_cra_exit,
  1547. .cra_module = THIS_MODULE,
  1548. },
  1549. },
  1550. };
  1551. static int safexcel_aead_sha256_cra_init(struct crypto_tfm *tfm)
  1552. {
  1553. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1554. safexcel_aead_cra_init(tfm);
  1555. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA256;
  1556. ctx->state_sz = SHA256_DIGEST_SIZE;
  1557. return 0;
  1558. }
  1559. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha256_cbc_aes = {
  1560. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1561. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA2_256,
  1562. .alg.aead = {
  1563. .setkey = safexcel_aead_setkey,
  1564. .encrypt = safexcel_aead_encrypt,
  1565. .decrypt = safexcel_aead_decrypt,
  1566. .ivsize = AES_BLOCK_SIZE,
  1567. .maxauthsize = SHA256_DIGEST_SIZE,
  1568. .base = {
  1569. .cra_name = "authenc(hmac(sha256),cbc(aes))",
  1570. .cra_driver_name = "safexcel-authenc-hmac-sha256-cbc-aes",
  1571. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1572. .cra_flags = CRYPTO_ALG_ASYNC |
  1573. CRYPTO_ALG_ALLOCATES_MEMORY |
  1574. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1575. .cra_blocksize = AES_BLOCK_SIZE,
  1576. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1577. .cra_alignmask = 0,
  1578. .cra_init = safexcel_aead_sha256_cra_init,
  1579. .cra_exit = safexcel_aead_cra_exit,
  1580. .cra_module = THIS_MODULE,
  1581. },
  1582. },
  1583. };
  1584. static int safexcel_aead_sha224_cra_init(struct crypto_tfm *tfm)
  1585. {
  1586. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1587. safexcel_aead_cra_init(tfm);
  1588. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA224;
  1589. ctx->state_sz = SHA256_DIGEST_SIZE;
  1590. return 0;
  1591. }
  1592. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha224_cbc_aes = {
  1593. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1594. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA2_256,
  1595. .alg.aead = {
  1596. .setkey = safexcel_aead_setkey,
  1597. .encrypt = safexcel_aead_encrypt,
  1598. .decrypt = safexcel_aead_decrypt,
  1599. .ivsize = AES_BLOCK_SIZE,
  1600. .maxauthsize = SHA224_DIGEST_SIZE,
  1601. .base = {
  1602. .cra_name = "authenc(hmac(sha224),cbc(aes))",
  1603. .cra_driver_name = "safexcel-authenc-hmac-sha224-cbc-aes",
  1604. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1605. .cra_flags = CRYPTO_ALG_ASYNC |
  1606. CRYPTO_ALG_ALLOCATES_MEMORY |
  1607. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1608. .cra_blocksize = AES_BLOCK_SIZE,
  1609. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1610. .cra_alignmask = 0,
  1611. .cra_init = safexcel_aead_sha224_cra_init,
  1612. .cra_exit = safexcel_aead_cra_exit,
  1613. .cra_module = THIS_MODULE,
  1614. },
  1615. },
  1616. };
  1617. static int safexcel_aead_sha512_cra_init(struct crypto_tfm *tfm)
  1618. {
  1619. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1620. safexcel_aead_cra_init(tfm);
  1621. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA512;
  1622. ctx->state_sz = SHA512_DIGEST_SIZE;
  1623. return 0;
  1624. }
  1625. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha512_cbc_aes = {
  1626. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1627. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA2_512,
  1628. .alg.aead = {
  1629. .setkey = safexcel_aead_setkey,
  1630. .encrypt = safexcel_aead_encrypt,
  1631. .decrypt = safexcel_aead_decrypt,
  1632. .ivsize = AES_BLOCK_SIZE,
  1633. .maxauthsize = SHA512_DIGEST_SIZE,
  1634. .base = {
  1635. .cra_name = "authenc(hmac(sha512),cbc(aes))",
  1636. .cra_driver_name = "safexcel-authenc-hmac-sha512-cbc-aes",
  1637. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1638. .cra_flags = CRYPTO_ALG_ASYNC |
  1639. CRYPTO_ALG_ALLOCATES_MEMORY |
  1640. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1641. .cra_blocksize = AES_BLOCK_SIZE,
  1642. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1643. .cra_alignmask = 0,
  1644. .cra_init = safexcel_aead_sha512_cra_init,
  1645. .cra_exit = safexcel_aead_cra_exit,
  1646. .cra_module = THIS_MODULE,
  1647. },
  1648. },
  1649. };
  1650. static int safexcel_aead_sha384_cra_init(struct crypto_tfm *tfm)
  1651. {
  1652. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1653. safexcel_aead_cra_init(tfm);
  1654. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA384;
  1655. ctx->state_sz = SHA512_DIGEST_SIZE;
  1656. return 0;
  1657. }
  1658. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha384_cbc_aes = {
  1659. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1660. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA2_512,
  1661. .alg.aead = {
  1662. .setkey = safexcel_aead_setkey,
  1663. .encrypt = safexcel_aead_encrypt,
  1664. .decrypt = safexcel_aead_decrypt,
  1665. .ivsize = AES_BLOCK_SIZE,
  1666. .maxauthsize = SHA384_DIGEST_SIZE,
  1667. .base = {
  1668. .cra_name = "authenc(hmac(sha384),cbc(aes))",
  1669. .cra_driver_name = "safexcel-authenc-hmac-sha384-cbc-aes",
  1670. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1671. .cra_flags = CRYPTO_ALG_ASYNC |
  1672. CRYPTO_ALG_ALLOCATES_MEMORY |
  1673. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1674. .cra_blocksize = AES_BLOCK_SIZE,
  1675. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1676. .cra_alignmask = 0,
  1677. .cra_init = safexcel_aead_sha384_cra_init,
  1678. .cra_exit = safexcel_aead_cra_exit,
  1679. .cra_module = THIS_MODULE,
  1680. },
  1681. },
  1682. };
  1683. static int safexcel_aead_sha1_des3_cra_init(struct crypto_tfm *tfm)
  1684. {
  1685. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1686. safexcel_aead_sha1_cra_init(tfm);
  1687. ctx->alg = SAFEXCEL_3DES; /* override default */
  1688. ctx->blocksz = DES3_EDE_BLOCK_SIZE;
  1689. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1690. return 0;
  1691. }
  1692. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha1_cbc_des3_ede = {
  1693. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1694. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA1,
  1695. .alg.aead = {
  1696. .setkey = safexcel_aead_setkey,
  1697. .encrypt = safexcel_aead_encrypt,
  1698. .decrypt = safexcel_aead_decrypt,
  1699. .ivsize = DES3_EDE_BLOCK_SIZE,
  1700. .maxauthsize = SHA1_DIGEST_SIZE,
  1701. .base = {
  1702. .cra_name = "authenc(hmac(sha1),cbc(des3_ede))",
  1703. .cra_driver_name = "safexcel-authenc-hmac-sha1-cbc-des3_ede",
  1704. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1705. .cra_flags = CRYPTO_ALG_ASYNC |
  1706. CRYPTO_ALG_ALLOCATES_MEMORY |
  1707. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1708. .cra_blocksize = DES3_EDE_BLOCK_SIZE,
  1709. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1710. .cra_alignmask = 0,
  1711. .cra_init = safexcel_aead_sha1_des3_cra_init,
  1712. .cra_exit = safexcel_aead_cra_exit,
  1713. .cra_module = THIS_MODULE,
  1714. },
  1715. },
  1716. };
  1717. static int safexcel_aead_sha256_des3_cra_init(struct crypto_tfm *tfm)
  1718. {
  1719. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1720. safexcel_aead_sha256_cra_init(tfm);
  1721. ctx->alg = SAFEXCEL_3DES; /* override default */
  1722. ctx->blocksz = DES3_EDE_BLOCK_SIZE;
  1723. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1724. return 0;
  1725. }
  1726. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha256_cbc_des3_ede = {
  1727. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1728. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA2_256,
  1729. .alg.aead = {
  1730. .setkey = safexcel_aead_setkey,
  1731. .encrypt = safexcel_aead_encrypt,
  1732. .decrypt = safexcel_aead_decrypt,
  1733. .ivsize = DES3_EDE_BLOCK_SIZE,
  1734. .maxauthsize = SHA256_DIGEST_SIZE,
  1735. .base = {
  1736. .cra_name = "authenc(hmac(sha256),cbc(des3_ede))",
  1737. .cra_driver_name = "safexcel-authenc-hmac-sha256-cbc-des3_ede",
  1738. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1739. .cra_flags = CRYPTO_ALG_ASYNC |
  1740. CRYPTO_ALG_ALLOCATES_MEMORY |
  1741. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1742. .cra_blocksize = DES3_EDE_BLOCK_SIZE,
  1743. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1744. .cra_alignmask = 0,
  1745. .cra_init = safexcel_aead_sha256_des3_cra_init,
  1746. .cra_exit = safexcel_aead_cra_exit,
  1747. .cra_module = THIS_MODULE,
  1748. },
  1749. },
  1750. };
  1751. static int safexcel_aead_sha224_des3_cra_init(struct crypto_tfm *tfm)
  1752. {
  1753. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1754. safexcel_aead_sha224_cra_init(tfm);
  1755. ctx->alg = SAFEXCEL_3DES; /* override default */
  1756. ctx->blocksz = DES3_EDE_BLOCK_SIZE;
  1757. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1758. return 0;
  1759. }
  1760. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha224_cbc_des3_ede = {
  1761. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1762. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA2_256,
  1763. .alg.aead = {
  1764. .setkey = safexcel_aead_setkey,
  1765. .encrypt = safexcel_aead_encrypt,
  1766. .decrypt = safexcel_aead_decrypt,
  1767. .ivsize = DES3_EDE_BLOCK_SIZE,
  1768. .maxauthsize = SHA224_DIGEST_SIZE,
  1769. .base = {
  1770. .cra_name = "authenc(hmac(sha224),cbc(des3_ede))",
  1771. .cra_driver_name = "safexcel-authenc-hmac-sha224-cbc-des3_ede",
  1772. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1773. .cra_flags = CRYPTO_ALG_ASYNC |
  1774. CRYPTO_ALG_ALLOCATES_MEMORY |
  1775. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1776. .cra_blocksize = DES3_EDE_BLOCK_SIZE,
  1777. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1778. .cra_alignmask = 0,
  1779. .cra_init = safexcel_aead_sha224_des3_cra_init,
  1780. .cra_exit = safexcel_aead_cra_exit,
  1781. .cra_module = THIS_MODULE,
  1782. },
  1783. },
  1784. };
  1785. static int safexcel_aead_sha512_des3_cra_init(struct crypto_tfm *tfm)
  1786. {
  1787. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1788. safexcel_aead_sha512_cra_init(tfm);
  1789. ctx->alg = SAFEXCEL_3DES; /* override default */
  1790. ctx->blocksz = DES3_EDE_BLOCK_SIZE;
  1791. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1792. return 0;
  1793. }
  1794. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha512_cbc_des3_ede = {
  1795. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1796. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA2_512,
  1797. .alg.aead = {
  1798. .setkey = safexcel_aead_setkey,
  1799. .encrypt = safexcel_aead_encrypt,
  1800. .decrypt = safexcel_aead_decrypt,
  1801. .ivsize = DES3_EDE_BLOCK_SIZE,
  1802. .maxauthsize = SHA512_DIGEST_SIZE,
  1803. .base = {
  1804. .cra_name = "authenc(hmac(sha512),cbc(des3_ede))",
  1805. .cra_driver_name = "safexcel-authenc-hmac-sha512-cbc-des3_ede",
  1806. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1807. .cra_flags = CRYPTO_ALG_ASYNC |
  1808. CRYPTO_ALG_ALLOCATES_MEMORY |
  1809. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1810. .cra_blocksize = DES3_EDE_BLOCK_SIZE,
  1811. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1812. .cra_alignmask = 0,
  1813. .cra_init = safexcel_aead_sha512_des3_cra_init,
  1814. .cra_exit = safexcel_aead_cra_exit,
  1815. .cra_module = THIS_MODULE,
  1816. },
  1817. },
  1818. };
  1819. static int safexcel_aead_sha384_des3_cra_init(struct crypto_tfm *tfm)
  1820. {
  1821. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1822. safexcel_aead_sha384_cra_init(tfm);
  1823. ctx->alg = SAFEXCEL_3DES; /* override default */
  1824. ctx->blocksz = DES3_EDE_BLOCK_SIZE;
  1825. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1826. return 0;
  1827. }
  1828. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha384_cbc_des3_ede = {
  1829. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1830. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA2_512,
  1831. .alg.aead = {
  1832. .setkey = safexcel_aead_setkey,
  1833. .encrypt = safexcel_aead_encrypt,
  1834. .decrypt = safexcel_aead_decrypt,
  1835. .ivsize = DES3_EDE_BLOCK_SIZE,
  1836. .maxauthsize = SHA384_DIGEST_SIZE,
  1837. .base = {
  1838. .cra_name = "authenc(hmac(sha384),cbc(des3_ede))",
  1839. .cra_driver_name = "safexcel-authenc-hmac-sha384-cbc-des3_ede",
  1840. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1841. .cra_flags = CRYPTO_ALG_ASYNC |
  1842. CRYPTO_ALG_ALLOCATES_MEMORY |
  1843. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1844. .cra_blocksize = DES3_EDE_BLOCK_SIZE,
  1845. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1846. .cra_alignmask = 0,
  1847. .cra_init = safexcel_aead_sha384_des3_cra_init,
  1848. .cra_exit = safexcel_aead_cra_exit,
  1849. .cra_module = THIS_MODULE,
  1850. },
  1851. },
  1852. };
  1853. static int safexcel_aead_sha1_des_cra_init(struct crypto_tfm *tfm)
  1854. {
  1855. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1856. safexcel_aead_sha1_cra_init(tfm);
  1857. ctx->alg = SAFEXCEL_DES; /* override default */
  1858. ctx->blocksz = DES_BLOCK_SIZE;
  1859. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1860. return 0;
  1861. }
  1862. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha1_cbc_des = {
  1863. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1864. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA1,
  1865. .alg.aead = {
  1866. .setkey = safexcel_aead_setkey,
  1867. .encrypt = safexcel_aead_encrypt,
  1868. .decrypt = safexcel_aead_decrypt,
  1869. .ivsize = DES_BLOCK_SIZE,
  1870. .maxauthsize = SHA1_DIGEST_SIZE,
  1871. .base = {
  1872. .cra_name = "authenc(hmac(sha1),cbc(des))",
  1873. .cra_driver_name = "safexcel-authenc-hmac-sha1-cbc-des",
  1874. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1875. .cra_flags = CRYPTO_ALG_ASYNC |
  1876. CRYPTO_ALG_ALLOCATES_MEMORY |
  1877. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1878. .cra_blocksize = DES_BLOCK_SIZE,
  1879. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1880. .cra_alignmask = 0,
  1881. .cra_init = safexcel_aead_sha1_des_cra_init,
  1882. .cra_exit = safexcel_aead_cra_exit,
  1883. .cra_module = THIS_MODULE,
  1884. },
  1885. },
  1886. };
  1887. static int safexcel_aead_sha256_des_cra_init(struct crypto_tfm *tfm)
  1888. {
  1889. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1890. safexcel_aead_sha256_cra_init(tfm);
  1891. ctx->alg = SAFEXCEL_DES; /* override default */
  1892. ctx->blocksz = DES_BLOCK_SIZE;
  1893. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1894. return 0;
  1895. }
  1896. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha256_cbc_des = {
  1897. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1898. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA2_256,
  1899. .alg.aead = {
  1900. .setkey = safexcel_aead_setkey,
  1901. .encrypt = safexcel_aead_encrypt,
  1902. .decrypt = safexcel_aead_decrypt,
  1903. .ivsize = DES_BLOCK_SIZE,
  1904. .maxauthsize = SHA256_DIGEST_SIZE,
  1905. .base = {
  1906. .cra_name = "authenc(hmac(sha256),cbc(des))",
  1907. .cra_driver_name = "safexcel-authenc-hmac-sha256-cbc-des",
  1908. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1909. .cra_flags = CRYPTO_ALG_ASYNC |
  1910. CRYPTO_ALG_ALLOCATES_MEMORY |
  1911. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1912. .cra_blocksize = DES_BLOCK_SIZE,
  1913. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1914. .cra_alignmask = 0,
  1915. .cra_init = safexcel_aead_sha256_des_cra_init,
  1916. .cra_exit = safexcel_aead_cra_exit,
  1917. .cra_module = THIS_MODULE,
  1918. },
  1919. },
  1920. };
  1921. static int safexcel_aead_sha224_des_cra_init(struct crypto_tfm *tfm)
  1922. {
  1923. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1924. safexcel_aead_sha224_cra_init(tfm);
  1925. ctx->alg = SAFEXCEL_DES; /* override default */
  1926. ctx->blocksz = DES_BLOCK_SIZE;
  1927. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1928. return 0;
  1929. }
  1930. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha224_cbc_des = {
  1931. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1932. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA2_256,
  1933. .alg.aead = {
  1934. .setkey = safexcel_aead_setkey,
  1935. .encrypt = safexcel_aead_encrypt,
  1936. .decrypt = safexcel_aead_decrypt,
  1937. .ivsize = DES_BLOCK_SIZE,
  1938. .maxauthsize = SHA224_DIGEST_SIZE,
  1939. .base = {
  1940. .cra_name = "authenc(hmac(sha224),cbc(des))",
  1941. .cra_driver_name = "safexcel-authenc-hmac-sha224-cbc-des",
  1942. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1943. .cra_flags = CRYPTO_ALG_ASYNC |
  1944. CRYPTO_ALG_ALLOCATES_MEMORY |
  1945. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1946. .cra_blocksize = DES_BLOCK_SIZE,
  1947. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1948. .cra_alignmask = 0,
  1949. .cra_init = safexcel_aead_sha224_des_cra_init,
  1950. .cra_exit = safexcel_aead_cra_exit,
  1951. .cra_module = THIS_MODULE,
  1952. },
  1953. },
  1954. };
  1955. static int safexcel_aead_sha512_des_cra_init(struct crypto_tfm *tfm)
  1956. {
  1957. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1958. safexcel_aead_sha512_cra_init(tfm);
  1959. ctx->alg = SAFEXCEL_DES; /* override default */
  1960. ctx->blocksz = DES_BLOCK_SIZE;
  1961. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1962. return 0;
  1963. }
  1964. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha512_cbc_des = {
  1965. .type = SAFEXCEL_ALG_TYPE_AEAD,
  1966. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA2_512,
  1967. .alg.aead = {
  1968. .setkey = safexcel_aead_setkey,
  1969. .encrypt = safexcel_aead_encrypt,
  1970. .decrypt = safexcel_aead_decrypt,
  1971. .ivsize = DES_BLOCK_SIZE,
  1972. .maxauthsize = SHA512_DIGEST_SIZE,
  1973. .base = {
  1974. .cra_name = "authenc(hmac(sha512),cbc(des))",
  1975. .cra_driver_name = "safexcel-authenc-hmac-sha512-cbc-des",
  1976. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  1977. .cra_flags = CRYPTO_ALG_ASYNC |
  1978. CRYPTO_ALG_ALLOCATES_MEMORY |
  1979. CRYPTO_ALG_KERN_DRIVER_ONLY,
  1980. .cra_blocksize = DES_BLOCK_SIZE,
  1981. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  1982. .cra_alignmask = 0,
  1983. .cra_init = safexcel_aead_sha512_des_cra_init,
  1984. .cra_exit = safexcel_aead_cra_exit,
  1985. .cra_module = THIS_MODULE,
  1986. },
  1987. },
  1988. };
  1989. static int safexcel_aead_sha384_des_cra_init(struct crypto_tfm *tfm)
  1990. {
  1991. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  1992. safexcel_aead_sha384_cra_init(tfm);
  1993. ctx->alg = SAFEXCEL_DES; /* override default */
  1994. ctx->blocksz = DES_BLOCK_SIZE;
  1995. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  1996. return 0;
  1997. }
  1998. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha384_cbc_des = {
  1999. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2000. .algo_mask = SAFEXCEL_ALG_DES | SAFEXCEL_ALG_SHA2_512,
  2001. .alg.aead = {
  2002. .setkey = safexcel_aead_setkey,
  2003. .encrypt = safexcel_aead_encrypt,
  2004. .decrypt = safexcel_aead_decrypt,
  2005. .ivsize = DES_BLOCK_SIZE,
  2006. .maxauthsize = SHA384_DIGEST_SIZE,
  2007. .base = {
  2008. .cra_name = "authenc(hmac(sha384),cbc(des))",
  2009. .cra_driver_name = "safexcel-authenc-hmac-sha384-cbc-des",
  2010. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2011. .cra_flags = CRYPTO_ALG_ASYNC |
  2012. CRYPTO_ALG_ALLOCATES_MEMORY |
  2013. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2014. .cra_blocksize = DES_BLOCK_SIZE,
  2015. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2016. .cra_alignmask = 0,
  2017. .cra_init = safexcel_aead_sha384_des_cra_init,
  2018. .cra_exit = safexcel_aead_cra_exit,
  2019. .cra_module = THIS_MODULE,
  2020. },
  2021. },
  2022. };
  2023. static int safexcel_aead_sha1_ctr_cra_init(struct crypto_tfm *tfm)
  2024. {
  2025. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2026. safexcel_aead_sha1_cra_init(tfm);
  2027. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD; /* override default */
  2028. return 0;
  2029. }
  2030. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha1_ctr_aes = {
  2031. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2032. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA1,
  2033. .alg.aead = {
  2034. .setkey = safexcel_aead_setkey,
  2035. .encrypt = safexcel_aead_encrypt,
  2036. .decrypt = safexcel_aead_decrypt,
  2037. .ivsize = CTR_RFC3686_IV_SIZE,
  2038. .maxauthsize = SHA1_DIGEST_SIZE,
  2039. .base = {
  2040. .cra_name = "authenc(hmac(sha1),rfc3686(ctr(aes)))",
  2041. .cra_driver_name = "safexcel-authenc-hmac-sha1-ctr-aes",
  2042. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2043. .cra_flags = CRYPTO_ALG_ASYNC |
  2044. CRYPTO_ALG_ALLOCATES_MEMORY |
  2045. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2046. .cra_blocksize = 1,
  2047. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2048. .cra_alignmask = 0,
  2049. .cra_init = safexcel_aead_sha1_ctr_cra_init,
  2050. .cra_exit = safexcel_aead_cra_exit,
  2051. .cra_module = THIS_MODULE,
  2052. },
  2053. },
  2054. };
  2055. static int safexcel_aead_sha256_ctr_cra_init(struct crypto_tfm *tfm)
  2056. {
  2057. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2058. safexcel_aead_sha256_cra_init(tfm);
  2059. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD; /* override default */
  2060. return 0;
  2061. }
  2062. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha256_ctr_aes = {
  2063. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2064. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA2_256,
  2065. .alg.aead = {
  2066. .setkey = safexcel_aead_setkey,
  2067. .encrypt = safexcel_aead_encrypt,
  2068. .decrypt = safexcel_aead_decrypt,
  2069. .ivsize = CTR_RFC3686_IV_SIZE,
  2070. .maxauthsize = SHA256_DIGEST_SIZE,
  2071. .base = {
  2072. .cra_name = "authenc(hmac(sha256),rfc3686(ctr(aes)))",
  2073. .cra_driver_name = "safexcel-authenc-hmac-sha256-ctr-aes",
  2074. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2075. .cra_flags = CRYPTO_ALG_ASYNC |
  2076. CRYPTO_ALG_ALLOCATES_MEMORY |
  2077. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2078. .cra_blocksize = 1,
  2079. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2080. .cra_alignmask = 0,
  2081. .cra_init = safexcel_aead_sha256_ctr_cra_init,
  2082. .cra_exit = safexcel_aead_cra_exit,
  2083. .cra_module = THIS_MODULE,
  2084. },
  2085. },
  2086. };
  2087. static int safexcel_aead_sha224_ctr_cra_init(struct crypto_tfm *tfm)
  2088. {
  2089. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2090. safexcel_aead_sha224_cra_init(tfm);
  2091. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD; /* override default */
  2092. return 0;
  2093. }
  2094. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha224_ctr_aes = {
  2095. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2096. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA2_256,
  2097. .alg.aead = {
  2098. .setkey = safexcel_aead_setkey,
  2099. .encrypt = safexcel_aead_encrypt,
  2100. .decrypt = safexcel_aead_decrypt,
  2101. .ivsize = CTR_RFC3686_IV_SIZE,
  2102. .maxauthsize = SHA224_DIGEST_SIZE,
  2103. .base = {
  2104. .cra_name = "authenc(hmac(sha224),rfc3686(ctr(aes)))",
  2105. .cra_driver_name = "safexcel-authenc-hmac-sha224-ctr-aes",
  2106. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2107. .cra_flags = CRYPTO_ALG_ASYNC |
  2108. CRYPTO_ALG_ALLOCATES_MEMORY |
  2109. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2110. .cra_blocksize = 1,
  2111. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2112. .cra_alignmask = 0,
  2113. .cra_init = safexcel_aead_sha224_ctr_cra_init,
  2114. .cra_exit = safexcel_aead_cra_exit,
  2115. .cra_module = THIS_MODULE,
  2116. },
  2117. },
  2118. };
  2119. static int safexcel_aead_sha512_ctr_cra_init(struct crypto_tfm *tfm)
  2120. {
  2121. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2122. safexcel_aead_sha512_cra_init(tfm);
  2123. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD; /* override default */
  2124. return 0;
  2125. }
  2126. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha512_ctr_aes = {
  2127. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2128. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA2_512,
  2129. .alg.aead = {
  2130. .setkey = safexcel_aead_setkey,
  2131. .encrypt = safexcel_aead_encrypt,
  2132. .decrypt = safexcel_aead_decrypt,
  2133. .ivsize = CTR_RFC3686_IV_SIZE,
  2134. .maxauthsize = SHA512_DIGEST_SIZE,
  2135. .base = {
  2136. .cra_name = "authenc(hmac(sha512),rfc3686(ctr(aes)))",
  2137. .cra_driver_name = "safexcel-authenc-hmac-sha512-ctr-aes",
  2138. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2139. .cra_flags = CRYPTO_ALG_ASYNC |
  2140. CRYPTO_ALG_ALLOCATES_MEMORY |
  2141. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2142. .cra_blocksize = 1,
  2143. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2144. .cra_alignmask = 0,
  2145. .cra_init = safexcel_aead_sha512_ctr_cra_init,
  2146. .cra_exit = safexcel_aead_cra_exit,
  2147. .cra_module = THIS_MODULE,
  2148. },
  2149. },
  2150. };
  2151. static int safexcel_aead_sha384_ctr_cra_init(struct crypto_tfm *tfm)
  2152. {
  2153. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2154. safexcel_aead_sha384_cra_init(tfm);
  2155. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD; /* override default */
  2156. return 0;
  2157. }
  2158. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha384_ctr_aes = {
  2159. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2160. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_SHA2_512,
  2161. .alg.aead = {
  2162. .setkey = safexcel_aead_setkey,
  2163. .encrypt = safexcel_aead_encrypt,
  2164. .decrypt = safexcel_aead_decrypt,
  2165. .ivsize = CTR_RFC3686_IV_SIZE,
  2166. .maxauthsize = SHA384_DIGEST_SIZE,
  2167. .base = {
  2168. .cra_name = "authenc(hmac(sha384),rfc3686(ctr(aes)))",
  2169. .cra_driver_name = "safexcel-authenc-hmac-sha384-ctr-aes",
  2170. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2171. .cra_flags = CRYPTO_ALG_ASYNC |
  2172. CRYPTO_ALG_ALLOCATES_MEMORY |
  2173. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2174. .cra_blocksize = 1,
  2175. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2176. .cra_alignmask = 0,
  2177. .cra_init = safexcel_aead_sha384_ctr_cra_init,
  2178. .cra_exit = safexcel_aead_cra_exit,
  2179. .cra_module = THIS_MODULE,
  2180. },
  2181. },
  2182. };
  2183. static int safexcel_skcipher_aesxts_setkey(struct crypto_skcipher *ctfm,
  2184. const u8 *key, unsigned int len)
  2185. {
  2186. struct crypto_tfm *tfm = crypto_skcipher_tfm(ctfm);
  2187. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2188. struct safexcel_crypto_priv *priv = ctx->base.priv;
  2189. struct crypto_aes_ctx aes;
  2190. int ret, i;
  2191. unsigned int keylen;
  2192. /* Check for illegal XTS keys */
  2193. ret = xts_verify_key(ctfm, key, len);
  2194. if (ret)
  2195. return ret;
  2196. /* Only half of the key data is cipher key */
  2197. keylen = (len >> 1);
  2198. ret = aes_expandkey(&aes, key, keylen);
  2199. if (ret)
  2200. return ret;
  2201. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma) {
  2202. for (i = 0; i < keylen / sizeof(u32); i++) {
  2203. if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) {
  2204. ctx->base.needs_inv = true;
  2205. break;
  2206. }
  2207. }
  2208. }
  2209. for (i = 0; i < keylen / sizeof(u32); i++)
  2210. ctx->key[i] = cpu_to_le32(aes.key_enc[i]);
  2211. /* The other half is the tweak key */
  2212. ret = aes_expandkey(&aes, (u8 *)(key + keylen), keylen);
  2213. if (ret)
  2214. return ret;
  2215. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma) {
  2216. for (i = 0; i < keylen / sizeof(u32); i++) {
  2217. if (le32_to_cpu(ctx->key[i + keylen / sizeof(u32)]) !=
  2218. aes.key_enc[i]) {
  2219. ctx->base.needs_inv = true;
  2220. break;
  2221. }
  2222. }
  2223. }
  2224. for (i = 0; i < keylen / sizeof(u32); i++)
  2225. ctx->key[i + keylen / sizeof(u32)] =
  2226. cpu_to_le32(aes.key_enc[i]);
  2227. ctx->key_len = keylen << 1;
  2228. memzero_explicit(&aes, sizeof(aes));
  2229. return 0;
  2230. }
  2231. static int safexcel_skcipher_aes_xts_cra_init(struct crypto_tfm *tfm)
  2232. {
  2233. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2234. safexcel_skcipher_cra_init(tfm);
  2235. ctx->alg = SAFEXCEL_AES;
  2236. ctx->blocksz = AES_BLOCK_SIZE;
  2237. ctx->xts = 1;
  2238. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_XTS;
  2239. return 0;
  2240. }
  2241. static int safexcel_encrypt_xts(struct skcipher_request *req)
  2242. {
  2243. if (req->cryptlen < XTS_BLOCK_SIZE)
  2244. return -EINVAL;
  2245. return safexcel_queue_req(&req->base, skcipher_request_ctx(req),
  2246. SAFEXCEL_ENCRYPT);
  2247. }
  2248. static int safexcel_decrypt_xts(struct skcipher_request *req)
  2249. {
  2250. if (req->cryptlen < XTS_BLOCK_SIZE)
  2251. return -EINVAL;
  2252. return safexcel_queue_req(&req->base, skcipher_request_ctx(req),
  2253. SAFEXCEL_DECRYPT);
  2254. }
  2255. struct safexcel_alg_template safexcel_alg_xts_aes = {
  2256. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  2257. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_AES_XTS,
  2258. .alg.skcipher = {
  2259. .setkey = safexcel_skcipher_aesxts_setkey,
  2260. .encrypt = safexcel_encrypt_xts,
  2261. .decrypt = safexcel_decrypt_xts,
  2262. /* XTS actually uses 2 AES keys glued together */
  2263. .min_keysize = AES_MIN_KEY_SIZE * 2,
  2264. .max_keysize = AES_MAX_KEY_SIZE * 2,
  2265. .ivsize = XTS_BLOCK_SIZE,
  2266. .base = {
  2267. .cra_name = "xts(aes)",
  2268. .cra_driver_name = "safexcel-xts-aes",
  2269. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2270. .cra_flags = CRYPTO_ALG_ASYNC |
  2271. CRYPTO_ALG_ALLOCATES_MEMORY |
  2272. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2273. .cra_blocksize = XTS_BLOCK_SIZE,
  2274. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2275. .cra_alignmask = 0,
  2276. .cra_init = safexcel_skcipher_aes_xts_cra_init,
  2277. .cra_exit = safexcel_skcipher_cra_exit,
  2278. .cra_module = THIS_MODULE,
  2279. },
  2280. },
  2281. };
  2282. static int safexcel_aead_gcm_setkey(struct crypto_aead *ctfm, const u8 *key,
  2283. unsigned int len)
  2284. {
  2285. struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
  2286. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2287. struct safexcel_crypto_priv *priv = ctx->base.priv;
  2288. struct crypto_aes_ctx aes;
  2289. u32 hashkey[AES_BLOCK_SIZE >> 2];
  2290. int ret, i;
  2291. ret = aes_expandkey(&aes, key, len);
  2292. if (ret) {
  2293. memzero_explicit(&aes, sizeof(aes));
  2294. return ret;
  2295. }
  2296. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma) {
  2297. for (i = 0; i < len / sizeof(u32); i++) {
  2298. if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) {
  2299. ctx->base.needs_inv = true;
  2300. break;
  2301. }
  2302. }
  2303. }
  2304. for (i = 0; i < len / sizeof(u32); i++)
  2305. ctx->key[i] = cpu_to_le32(aes.key_enc[i]);
  2306. ctx->key_len = len;
  2307. /* Compute hash key by encrypting zeroes with cipher key */
  2308. memset(hashkey, 0, AES_BLOCK_SIZE);
  2309. aes_encrypt(&aes, (u8 *)hashkey, (u8 *)hashkey);
  2310. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma) {
  2311. for (i = 0; i < AES_BLOCK_SIZE / sizeof(u32); i++) {
  2312. if (be32_to_cpu(ctx->base.ipad.be[i]) != hashkey[i]) {
  2313. ctx->base.needs_inv = true;
  2314. break;
  2315. }
  2316. }
  2317. }
  2318. for (i = 0; i < AES_BLOCK_SIZE / sizeof(u32); i++)
  2319. ctx->base.ipad.be[i] = cpu_to_be32(hashkey[i]);
  2320. memzero_explicit(hashkey, AES_BLOCK_SIZE);
  2321. memzero_explicit(&aes, sizeof(aes));
  2322. return 0;
  2323. }
  2324. static int safexcel_aead_gcm_cra_init(struct crypto_tfm *tfm)
  2325. {
  2326. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2327. safexcel_aead_cra_init(tfm);
  2328. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_GHASH;
  2329. ctx->state_sz = GHASH_BLOCK_SIZE;
  2330. ctx->xcm = EIP197_XCM_MODE_GCM;
  2331. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_XCM; /* override default */
  2332. return 0;
  2333. }
  2334. static void safexcel_aead_gcm_cra_exit(struct crypto_tfm *tfm)
  2335. {
  2336. safexcel_aead_cra_exit(tfm);
  2337. }
  2338. static int safexcel_aead_gcm_setauthsize(struct crypto_aead *tfm,
  2339. unsigned int authsize)
  2340. {
  2341. return crypto_gcm_check_authsize(authsize);
  2342. }
  2343. struct safexcel_alg_template safexcel_alg_gcm = {
  2344. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2345. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_GHASH,
  2346. .alg.aead = {
  2347. .setkey = safexcel_aead_gcm_setkey,
  2348. .setauthsize = safexcel_aead_gcm_setauthsize,
  2349. .encrypt = safexcel_aead_encrypt,
  2350. .decrypt = safexcel_aead_decrypt,
  2351. .ivsize = GCM_AES_IV_SIZE,
  2352. .maxauthsize = GHASH_DIGEST_SIZE,
  2353. .base = {
  2354. .cra_name = "gcm(aes)",
  2355. .cra_driver_name = "safexcel-gcm-aes",
  2356. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2357. .cra_flags = CRYPTO_ALG_ASYNC |
  2358. CRYPTO_ALG_ALLOCATES_MEMORY |
  2359. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2360. .cra_blocksize = 1,
  2361. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2362. .cra_alignmask = 0,
  2363. .cra_init = safexcel_aead_gcm_cra_init,
  2364. .cra_exit = safexcel_aead_gcm_cra_exit,
  2365. .cra_module = THIS_MODULE,
  2366. },
  2367. },
  2368. };
  2369. static int safexcel_aead_ccm_setkey(struct crypto_aead *ctfm, const u8 *key,
  2370. unsigned int len)
  2371. {
  2372. struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
  2373. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2374. struct safexcel_crypto_priv *priv = ctx->base.priv;
  2375. struct crypto_aes_ctx aes;
  2376. int ret, i;
  2377. ret = aes_expandkey(&aes, key, len);
  2378. if (ret) {
  2379. memzero_explicit(&aes, sizeof(aes));
  2380. return ret;
  2381. }
  2382. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma) {
  2383. for (i = 0; i < len / sizeof(u32); i++) {
  2384. if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) {
  2385. ctx->base.needs_inv = true;
  2386. break;
  2387. }
  2388. }
  2389. }
  2390. for (i = 0; i < len / sizeof(u32); i++) {
  2391. ctx->key[i] = cpu_to_le32(aes.key_enc[i]);
  2392. ctx->base.ipad.be[i + 2 * AES_BLOCK_SIZE / sizeof(u32)] =
  2393. cpu_to_be32(aes.key_enc[i]);
  2394. }
  2395. ctx->key_len = len;
  2396. ctx->state_sz = 2 * AES_BLOCK_SIZE + len;
  2397. if (len == AES_KEYSIZE_192)
  2398. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_XCBC192;
  2399. else if (len == AES_KEYSIZE_256)
  2400. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_XCBC256;
  2401. else
  2402. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_XCBC128;
  2403. memzero_explicit(&aes, sizeof(aes));
  2404. return 0;
  2405. }
  2406. static int safexcel_aead_ccm_cra_init(struct crypto_tfm *tfm)
  2407. {
  2408. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2409. safexcel_aead_cra_init(tfm);
  2410. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_XCBC128;
  2411. ctx->state_sz = 3 * AES_BLOCK_SIZE;
  2412. ctx->xcm = EIP197_XCM_MODE_CCM;
  2413. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_XCM; /* override default */
  2414. ctx->ctrinit = 0;
  2415. return 0;
  2416. }
  2417. static int safexcel_aead_ccm_setauthsize(struct crypto_aead *tfm,
  2418. unsigned int authsize)
  2419. {
  2420. /* Borrowed from crypto/ccm.c */
  2421. switch (authsize) {
  2422. case 4:
  2423. case 6:
  2424. case 8:
  2425. case 10:
  2426. case 12:
  2427. case 14:
  2428. case 16:
  2429. break;
  2430. default:
  2431. return -EINVAL;
  2432. }
  2433. return 0;
  2434. }
  2435. static int safexcel_ccm_encrypt(struct aead_request *req)
  2436. {
  2437. struct safexcel_cipher_req *creq = aead_request_ctx(req);
  2438. if (req->iv[0] < 1 || req->iv[0] > 7)
  2439. return -EINVAL;
  2440. return safexcel_queue_req(&req->base, creq, SAFEXCEL_ENCRYPT);
  2441. }
  2442. static int safexcel_ccm_decrypt(struct aead_request *req)
  2443. {
  2444. struct safexcel_cipher_req *creq = aead_request_ctx(req);
  2445. if (req->iv[0] < 1 || req->iv[0] > 7)
  2446. return -EINVAL;
  2447. return safexcel_queue_req(&req->base, creq, SAFEXCEL_DECRYPT);
  2448. }
  2449. struct safexcel_alg_template safexcel_alg_ccm = {
  2450. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2451. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_CBC_MAC_ALL,
  2452. .alg.aead = {
  2453. .setkey = safexcel_aead_ccm_setkey,
  2454. .setauthsize = safexcel_aead_ccm_setauthsize,
  2455. .encrypt = safexcel_ccm_encrypt,
  2456. .decrypt = safexcel_ccm_decrypt,
  2457. .ivsize = AES_BLOCK_SIZE,
  2458. .maxauthsize = AES_BLOCK_SIZE,
  2459. .base = {
  2460. .cra_name = "ccm(aes)",
  2461. .cra_driver_name = "safexcel-ccm-aes",
  2462. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2463. .cra_flags = CRYPTO_ALG_ASYNC |
  2464. CRYPTO_ALG_ALLOCATES_MEMORY |
  2465. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2466. .cra_blocksize = 1,
  2467. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2468. .cra_alignmask = 0,
  2469. .cra_init = safexcel_aead_ccm_cra_init,
  2470. .cra_exit = safexcel_aead_cra_exit,
  2471. .cra_module = THIS_MODULE,
  2472. },
  2473. },
  2474. };
  2475. static void safexcel_chacha20_setkey(struct safexcel_cipher_ctx *ctx,
  2476. const u8 *key)
  2477. {
  2478. struct safexcel_crypto_priv *priv = ctx->base.priv;
  2479. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma)
  2480. if (memcmp(ctx->key, key, CHACHA_KEY_SIZE))
  2481. ctx->base.needs_inv = true;
  2482. memcpy(ctx->key, key, CHACHA_KEY_SIZE);
  2483. ctx->key_len = CHACHA_KEY_SIZE;
  2484. }
  2485. static int safexcel_skcipher_chacha20_setkey(struct crypto_skcipher *ctfm,
  2486. const u8 *key, unsigned int len)
  2487. {
  2488. struct safexcel_cipher_ctx *ctx = crypto_skcipher_ctx(ctfm);
  2489. if (len != CHACHA_KEY_SIZE)
  2490. return -EINVAL;
  2491. safexcel_chacha20_setkey(ctx, key);
  2492. return 0;
  2493. }
  2494. static int safexcel_skcipher_chacha20_cra_init(struct crypto_tfm *tfm)
  2495. {
  2496. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2497. safexcel_skcipher_cra_init(tfm);
  2498. ctx->alg = SAFEXCEL_CHACHA20;
  2499. ctx->ctrinit = 0;
  2500. ctx->mode = CONTEXT_CONTROL_CHACHA20_MODE_256_32;
  2501. return 0;
  2502. }
  2503. struct safexcel_alg_template safexcel_alg_chacha20 = {
  2504. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  2505. .algo_mask = SAFEXCEL_ALG_CHACHA20,
  2506. .alg.skcipher = {
  2507. .setkey = safexcel_skcipher_chacha20_setkey,
  2508. .encrypt = safexcel_encrypt,
  2509. .decrypt = safexcel_decrypt,
  2510. .min_keysize = CHACHA_KEY_SIZE,
  2511. .max_keysize = CHACHA_KEY_SIZE,
  2512. .ivsize = CHACHA_IV_SIZE,
  2513. .base = {
  2514. .cra_name = "chacha20",
  2515. .cra_driver_name = "safexcel-chacha20",
  2516. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2517. .cra_flags = CRYPTO_ALG_ASYNC |
  2518. CRYPTO_ALG_ALLOCATES_MEMORY |
  2519. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2520. .cra_blocksize = 1,
  2521. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2522. .cra_alignmask = 0,
  2523. .cra_init = safexcel_skcipher_chacha20_cra_init,
  2524. .cra_exit = safexcel_skcipher_cra_exit,
  2525. .cra_module = THIS_MODULE,
  2526. },
  2527. },
  2528. };
  2529. static int safexcel_aead_chachapoly_setkey(struct crypto_aead *ctfm,
  2530. const u8 *key, unsigned int len)
  2531. {
  2532. struct safexcel_cipher_ctx *ctx = crypto_aead_ctx(ctfm);
  2533. if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP &&
  2534. len > EIP197_AEAD_IPSEC_NONCE_SIZE) {
  2535. /* ESP variant has nonce appended to key */
  2536. len -= EIP197_AEAD_IPSEC_NONCE_SIZE;
  2537. ctx->nonce = *(u32 *)(key + len);
  2538. }
  2539. if (len != CHACHA_KEY_SIZE)
  2540. return -EINVAL;
  2541. safexcel_chacha20_setkey(ctx, key);
  2542. return 0;
  2543. }
  2544. static int safexcel_aead_chachapoly_setauthsize(struct crypto_aead *tfm,
  2545. unsigned int authsize)
  2546. {
  2547. if (authsize != POLY1305_DIGEST_SIZE)
  2548. return -EINVAL;
  2549. return 0;
  2550. }
  2551. static int safexcel_aead_chachapoly_crypt(struct aead_request *req,
  2552. enum safexcel_cipher_direction dir)
  2553. {
  2554. struct safexcel_cipher_req *creq = aead_request_ctx(req);
  2555. struct crypto_aead *aead = crypto_aead_reqtfm(req);
  2556. struct crypto_tfm *tfm = crypto_aead_tfm(aead);
  2557. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2558. struct aead_request *subreq = aead_request_ctx(req);
  2559. u32 key[CHACHA_KEY_SIZE / sizeof(u32) + 1];
  2560. int ret = 0;
  2561. /*
  2562. * Instead of wasting time detecting umpteen silly corner cases,
  2563. * just dump all "small" requests to the fallback implementation.
  2564. * HW would not be faster on such small requests anyway.
  2565. */
  2566. if (likely((ctx->aead != EIP197_AEAD_TYPE_IPSEC_ESP ||
  2567. req->assoclen >= EIP197_AEAD_IPSEC_IV_SIZE) &&
  2568. req->cryptlen > POLY1305_DIGEST_SIZE)) {
  2569. return safexcel_queue_req(&req->base, creq, dir);
  2570. }
  2571. /* HW cannot do full (AAD+payload) zero length, use fallback */
  2572. memcpy(key, ctx->key, CHACHA_KEY_SIZE);
  2573. if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) {
  2574. /* ESP variant has nonce appended to the key */
  2575. key[CHACHA_KEY_SIZE / sizeof(u32)] = ctx->nonce;
  2576. ret = crypto_aead_setkey(ctx->fback, (u8 *)key,
  2577. CHACHA_KEY_SIZE +
  2578. EIP197_AEAD_IPSEC_NONCE_SIZE);
  2579. } else {
  2580. ret = crypto_aead_setkey(ctx->fback, (u8 *)key,
  2581. CHACHA_KEY_SIZE);
  2582. }
  2583. if (ret) {
  2584. crypto_aead_clear_flags(aead, CRYPTO_TFM_REQ_MASK);
  2585. crypto_aead_set_flags(aead, crypto_aead_get_flags(ctx->fback) &
  2586. CRYPTO_TFM_REQ_MASK);
  2587. return ret;
  2588. }
  2589. aead_request_set_tfm(subreq, ctx->fback);
  2590. aead_request_set_callback(subreq, req->base.flags, req->base.complete,
  2591. req->base.data);
  2592. aead_request_set_crypt(subreq, req->src, req->dst, req->cryptlen,
  2593. req->iv);
  2594. aead_request_set_ad(subreq, req->assoclen);
  2595. return (dir == SAFEXCEL_ENCRYPT) ?
  2596. crypto_aead_encrypt(subreq) :
  2597. crypto_aead_decrypt(subreq);
  2598. }
  2599. static int safexcel_aead_chachapoly_encrypt(struct aead_request *req)
  2600. {
  2601. return safexcel_aead_chachapoly_crypt(req, SAFEXCEL_ENCRYPT);
  2602. }
  2603. static int safexcel_aead_chachapoly_decrypt(struct aead_request *req)
  2604. {
  2605. return safexcel_aead_chachapoly_crypt(req, SAFEXCEL_DECRYPT);
  2606. }
  2607. static int safexcel_aead_fallback_cra_init(struct crypto_tfm *tfm)
  2608. {
  2609. struct crypto_aead *aead = __crypto_aead_cast(tfm);
  2610. struct aead_alg *alg = crypto_aead_alg(aead);
  2611. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2612. safexcel_aead_cra_init(tfm);
  2613. /* Allocate fallback implementation */
  2614. ctx->fback = crypto_alloc_aead(alg->base.cra_name, 0,
  2615. CRYPTO_ALG_ASYNC |
  2616. CRYPTO_ALG_NEED_FALLBACK);
  2617. if (IS_ERR(ctx->fback))
  2618. return PTR_ERR(ctx->fback);
  2619. crypto_aead_set_reqsize(aead, max(sizeof(struct safexcel_cipher_req),
  2620. sizeof(struct aead_request) +
  2621. crypto_aead_reqsize(ctx->fback)));
  2622. return 0;
  2623. }
  2624. static int safexcel_aead_chachapoly_cra_init(struct crypto_tfm *tfm)
  2625. {
  2626. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2627. safexcel_aead_fallback_cra_init(tfm);
  2628. ctx->alg = SAFEXCEL_CHACHA20;
  2629. ctx->mode = CONTEXT_CONTROL_CHACHA20_MODE_256_32 |
  2630. CONTEXT_CONTROL_CHACHA20_MODE_CALC_OTK;
  2631. ctx->ctrinit = 0;
  2632. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_POLY1305;
  2633. ctx->state_sz = 0; /* Precomputed by HW */
  2634. return 0;
  2635. }
  2636. static void safexcel_aead_fallback_cra_exit(struct crypto_tfm *tfm)
  2637. {
  2638. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2639. crypto_free_aead(ctx->fback);
  2640. safexcel_aead_cra_exit(tfm);
  2641. }
  2642. struct safexcel_alg_template safexcel_alg_chachapoly = {
  2643. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2644. .algo_mask = SAFEXCEL_ALG_CHACHA20 | SAFEXCEL_ALG_POLY1305,
  2645. .alg.aead = {
  2646. .setkey = safexcel_aead_chachapoly_setkey,
  2647. .setauthsize = safexcel_aead_chachapoly_setauthsize,
  2648. .encrypt = safexcel_aead_chachapoly_encrypt,
  2649. .decrypt = safexcel_aead_chachapoly_decrypt,
  2650. .ivsize = CHACHAPOLY_IV_SIZE,
  2651. .maxauthsize = POLY1305_DIGEST_SIZE,
  2652. .base = {
  2653. .cra_name = "rfc7539(chacha20,poly1305)",
  2654. .cra_driver_name = "safexcel-chacha20-poly1305",
  2655. /* +1 to put it above HW chacha + SW poly */
  2656. .cra_priority = SAFEXCEL_CRA_PRIORITY + 1,
  2657. .cra_flags = CRYPTO_ALG_ASYNC |
  2658. CRYPTO_ALG_ALLOCATES_MEMORY |
  2659. CRYPTO_ALG_KERN_DRIVER_ONLY |
  2660. CRYPTO_ALG_NEED_FALLBACK,
  2661. .cra_blocksize = 1,
  2662. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2663. .cra_alignmask = 0,
  2664. .cra_init = safexcel_aead_chachapoly_cra_init,
  2665. .cra_exit = safexcel_aead_fallback_cra_exit,
  2666. .cra_module = THIS_MODULE,
  2667. },
  2668. },
  2669. };
  2670. static int safexcel_aead_chachapolyesp_cra_init(struct crypto_tfm *tfm)
  2671. {
  2672. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2673. int ret;
  2674. ret = safexcel_aead_chachapoly_cra_init(tfm);
  2675. ctx->aead = EIP197_AEAD_TYPE_IPSEC_ESP;
  2676. ctx->aadskip = EIP197_AEAD_IPSEC_IV_SIZE;
  2677. return ret;
  2678. }
  2679. struct safexcel_alg_template safexcel_alg_chachapoly_esp = {
  2680. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2681. .algo_mask = SAFEXCEL_ALG_CHACHA20 | SAFEXCEL_ALG_POLY1305,
  2682. .alg.aead = {
  2683. .setkey = safexcel_aead_chachapoly_setkey,
  2684. .setauthsize = safexcel_aead_chachapoly_setauthsize,
  2685. .encrypt = safexcel_aead_chachapoly_encrypt,
  2686. .decrypt = safexcel_aead_chachapoly_decrypt,
  2687. .ivsize = CHACHAPOLY_IV_SIZE - EIP197_AEAD_IPSEC_NONCE_SIZE,
  2688. .maxauthsize = POLY1305_DIGEST_SIZE,
  2689. .base = {
  2690. .cra_name = "rfc7539esp(chacha20,poly1305)",
  2691. .cra_driver_name = "safexcel-chacha20-poly1305-esp",
  2692. /* +1 to put it above HW chacha + SW poly */
  2693. .cra_priority = SAFEXCEL_CRA_PRIORITY + 1,
  2694. .cra_flags = CRYPTO_ALG_ASYNC |
  2695. CRYPTO_ALG_ALLOCATES_MEMORY |
  2696. CRYPTO_ALG_KERN_DRIVER_ONLY |
  2697. CRYPTO_ALG_NEED_FALLBACK,
  2698. .cra_blocksize = 1,
  2699. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2700. .cra_alignmask = 0,
  2701. .cra_init = safexcel_aead_chachapolyesp_cra_init,
  2702. .cra_exit = safexcel_aead_fallback_cra_exit,
  2703. .cra_module = THIS_MODULE,
  2704. },
  2705. },
  2706. };
  2707. static int safexcel_skcipher_sm4_setkey(struct crypto_skcipher *ctfm,
  2708. const u8 *key, unsigned int len)
  2709. {
  2710. struct crypto_tfm *tfm = crypto_skcipher_tfm(ctfm);
  2711. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2712. struct safexcel_crypto_priv *priv = ctx->base.priv;
  2713. if (len != SM4_KEY_SIZE)
  2714. return -EINVAL;
  2715. if (priv->flags & EIP197_TRC_CACHE && ctx->base.ctxr_dma)
  2716. if (memcmp(ctx->key, key, SM4_KEY_SIZE))
  2717. ctx->base.needs_inv = true;
  2718. memcpy(ctx->key, key, SM4_KEY_SIZE);
  2719. ctx->key_len = SM4_KEY_SIZE;
  2720. return 0;
  2721. }
  2722. static int safexcel_sm4_blk_encrypt(struct skcipher_request *req)
  2723. {
  2724. /* Workaround for HW bug: EIP96 4.3 does not report blocksize error */
  2725. if (req->cryptlen & (SM4_BLOCK_SIZE - 1))
  2726. return -EINVAL;
  2727. else
  2728. return safexcel_queue_req(&req->base, skcipher_request_ctx(req),
  2729. SAFEXCEL_ENCRYPT);
  2730. }
  2731. static int safexcel_sm4_blk_decrypt(struct skcipher_request *req)
  2732. {
  2733. /* Workaround for HW bug: EIP96 4.3 does not report blocksize error */
  2734. if (req->cryptlen & (SM4_BLOCK_SIZE - 1))
  2735. return -EINVAL;
  2736. else
  2737. return safexcel_queue_req(&req->base, skcipher_request_ctx(req),
  2738. SAFEXCEL_DECRYPT);
  2739. }
  2740. static int safexcel_skcipher_sm4_ecb_cra_init(struct crypto_tfm *tfm)
  2741. {
  2742. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2743. safexcel_skcipher_cra_init(tfm);
  2744. ctx->alg = SAFEXCEL_SM4;
  2745. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_ECB;
  2746. ctx->blocksz = 0;
  2747. ctx->ivmask = EIP197_OPTION_2_TOKEN_IV_CMD;
  2748. return 0;
  2749. }
  2750. struct safexcel_alg_template safexcel_alg_ecb_sm4 = {
  2751. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  2752. .algo_mask = SAFEXCEL_ALG_SM4,
  2753. .alg.skcipher = {
  2754. .setkey = safexcel_skcipher_sm4_setkey,
  2755. .encrypt = safexcel_sm4_blk_encrypt,
  2756. .decrypt = safexcel_sm4_blk_decrypt,
  2757. .min_keysize = SM4_KEY_SIZE,
  2758. .max_keysize = SM4_KEY_SIZE,
  2759. .base = {
  2760. .cra_name = "ecb(sm4)",
  2761. .cra_driver_name = "safexcel-ecb-sm4",
  2762. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2763. .cra_flags = CRYPTO_ALG_ASYNC |
  2764. CRYPTO_ALG_ALLOCATES_MEMORY |
  2765. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2766. .cra_blocksize = SM4_BLOCK_SIZE,
  2767. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2768. .cra_alignmask = 0,
  2769. .cra_init = safexcel_skcipher_sm4_ecb_cra_init,
  2770. .cra_exit = safexcel_skcipher_cra_exit,
  2771. .cra_module = THIS_MODULE,
  2772. },
  2773. },
  2774. };
  2775. static int safexcel_skcipher_sm4_cbc_cra_init(struct crypto_tfm *tfm)
  2776. {
  2777. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2778. safexcel_skcipher_cra_init(tfm);
  2779. ctx->alg = SAFEXCEL_SM4;
  2780. ctx->blocksz = SM4_BLOCK_SIZE;
  2781. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CBC;
  2782. return 0;
  2783. }
  2784. struct safexcel_alg_template safexcel_alg_cbc_sm4 = {
  2785. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  2786. .algo_mask = SAFEXCEL_ALG_SM4,
  2787. .alg.skcipher = {
  2788. .setkey = safexcel_skcipher_sm4_setkey,
  2789. .encrypt = safexcel_sm4_blk_encrypt,
  2790. .decrypt = safexcel_sm4_blk_decrypt,
  2791. .min_keysize = SM4_KEY_SIZE,
  2792. .max_keysize = SM4_KEY_SIZE,
  2793. .ivsize = SM4_BLOCK_SIZE,
  2794. .base = {
  2795. .cra_name = "cbc(sm4)",
  2796. .cra_driver_name = "safexcel-cbc-sm4",
  2797. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2798. .cra_flags = CRYPTO_ALG_ASYNC |
  2799. CRYPTO_ALG_ALLOCATES_MEMORY |
  2800. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2801. .cra_blocksize = SM4_BLOCK_SIZE,
  2802. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2803. .cra_alignmask = 0,
  2804. .cra_init = safexcel_skcipher_sm4_cbc_cra_init,
  2805. .cra_exit = safexcel_skcipher_cra_exit,
  2806. .cra_module = THIS_MODULE,
  2807. },
  2808. },
  2809. };
  2810. static int safexcel_skcipher_sm4_ofb_cra_init(struct crypto_tfm *tfm)
  2811. {
  2812. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2813. safexcel_skcipher_cra_init(tfm);
  2814. ctx->alg = SAFEXCEL_SM4;
  2815. ctx->blocksz = SM4_BLOCK_SIZE;
  2816. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_OFB;
  2817. return 0;
  2818. }
  2819. struct safexcel_alg_template safexcel_alg_ofb_sm4 = {
  2820. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  2821. .algo_mask = SAFEXCEL_ALG_SM4 | SAFEXCEL_ALG_AES_XFB,
  2822. .alg.skcipher = {
  2823. .setkey = safexcel_skcipher_sm4_setkey,
  2824. .encrypt = safexcel_encrypt,
  2825. .decrypt = safexcel_decrypt,
  2826. .min_keysize = SM4_KEY_SIZE,
  2827. .max_keysize = SM4_KEY_SIZE,
  2828. .ivsize = SM4_BLOCK_SIZE,
  2829. .base = {
  2830. .cra_name = "ofb(sm4)",
  2831. .cra_driver_name = "safexcel-ofb-sm4",
  2832. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2833. .cra_flags = CRYPTO_ALG_ASYNC |
  2834. CRYPTO_ALG_ALLOCATES_MEMORY |
  2835. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2836. .cra_blocksize = 1,
  2837. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2838. .cra_alignmask = 0,
  2839. .cra_init = safexcel_skcipher_sm4_ofb_cra_init,
  2840. .cra_exit = safexcel_skcipher_cra_exit,
  2841. .cra_module = THIS_MODULE,
  2842. },
  2843. },
  2844. };
  2845. static int safexcel_skcipher_sm4_cfb_cra_init(struct crypto_tfm *tfm)
  2846. {
  2847. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2848. safexcel_skcipher_cra_init(tfm);
  2849. ctx->alg = SAFEXCEL_SM4;
  2850. ctx->blocksz = SM4_BLOCK_SIZE;
  2851. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CFB;
  2852. return 0;
  2853. }
  2854. struct safexcel_alg_template safexcel_alg_cfb_sm4 = {
  2855. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  2856. .algo_mask = SAFEXCEL_ALG_SM4 | SAFEXCEL_ALG_AES_XFB,
  2857. .alg.skcipher = {
  2858. .setkey = safexcel_skcipher_sm4_setkey,
  2859. .encrypt = safexcel_encrypt,
  2860. .decrypt = safexcel_decrypt,
  2861. .min_keysize = SM4_KEY_SIZE,
  2862. .max_keysize = SM4_KEY_SIZE,
  2863. .ivsize = SM4_BLOCK_SIZE,
  2864. .base = {
  2865. .cra_name = "cfb(sm4)",
  2866. .cra_driver_name = "safexcel-cfb-sm4",
  2867. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2868. .cra_flags = CRYPTO_ALG_ASYNC |
  2869. CRYPTO_ALG_ALLOCATES_MEMORY |
  2870. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2871. .cra_blocksize = 1,
  2872. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2873. .cra_alignmask = 0,
  2874. .cra_init = safexcel_skcipher_sm4_cfb_cra_init,
  2875. .cra_exit = safexcel_skcipher_cra_exit,
  2876. .cra_module = THIS_MODULE,
  2877. },
  2878. },
  2879. };
  2880. static int safexcel_skcipher_sm4ctr_setkey(struct crypto_skcipher *ctfm,
  2881. const u8 *key, unsigned int len)
  2882. {
  2883. struct crypto_tfm *tfm = crypto_skcipher_tfm(ctfm);
  2884. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2885. /* last 4 bytes of key are the nonce! */
  2886. ctx->nonce = *(u32 *)(key + len - CTR_RFC3686_NONCE_SIZE);
  2887. /* exclude the nonce here */
  2888. len -= CTR_RFC3686_NONCE_SIZE;
  2889. return safexcel_skcipher_sm4_setkey(ctfm, key, len);
  2890. }
  2891. static int safexcel_skcipher_sm4_ctr_cra_init(struct crypto_tfm *tfm)
  2892. {
  2893. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2894. safexcel_skcipher_cra_init(tfm);
  2895. ctx->alg = SAFEXCEL_SM4;
  2896. ctx->blocksz = SM4_BLOCK_SIZE;
  2897. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD;
  2898. return 0;
  2899. }
  2900. struct safexcel_alg_template safexcel_alg_ctr_sm4 = {
  2901. .type = SAFEXCEL_ALG_TYPE_SKCIPHER,
  2902. .algo_mask = SAFEXCEL_ALG_SM4,
  2903. .alg.skcipher = {
  2904. .setkey = safexcel_skcipher_sm4ctr_setkey,
  2905. .encrypt = safexcel_encrypt,
  2906. .decrypt = safexcel_decrypt,
  2907. /* Add nonce size */
  2908. .min_keysize = SM4_KEY_SIZE + CTR_RFC3686_NONCE_SIZE,
  2909. .max_keysize = SM4_KEY_SIZE + CTR_RFC3686_NONCE_SIZE,
  2910. .ivsize = CTR_RFC3686_IV_SIZE,
  2911. .base = {
  2912. .cra_name = "rfc3686(ctr(sm4))",
  2913. .cra_driver_name = "safexcel-ctr-sm4",
  2914. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2915. .cra_flags = CRYPTO_ALG_ASYNC |
  2916. CRYPTO_ALG_ALLOCATES_MEMORY |
  2917. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2918. .cra_blocksize = 1,
  2919. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2920. .cra_alignmask = 0,
  2921. .cra_init = safexcel_skcipher_sm4_ctr_cra_init,
  2922. .cra_exit = safexcel_skcipher_cra_exit,
  2923. .cra_module = THIS_MODULE,
  2924. },
  2925. },
  2926. };
  2927. static int safexcel_aead_sm4_blk_encrypt(struct aead_request *req)
  2928. {
  2929. /* Workaround for HW bug: EIP96 4.3 does not report blocksize error */
  2930. if (req->cryptlen & (SM4_BLOCK_SIZE - 1))
  2931. return -EINVAL;
  2932. return safexcel_queue_req(&req->base, aead_request_ctx(req),
  2933. SAFEXCEL_ENCRYPT);
  2934. }
  2935. static int safexcel_aead_sm4_blk_decrypt(struct aead_request *req)
  2936. {
  2937. struct crypto_aead *tfm = crypto_aead_reqtfm(req);
  2938. /* Workaround for HW bug: EIP96 4.3 does not report blocksize error */
  2939. if ((req->cryptlen - crypto_aead_authsize(tfm)) & (SM4_BLOCK_SIZE - 1))
  2940. return -EINVAL;
  2941. return safexcel_queue_req(&req->base, aead_request_ctx(req),
  2942. SAFEXCEL_DECRYPT);
  2943. }
  2944. static int safexcel_aead_sm4cbc_sha1_cra_init(struct crypto_tfm *tfm)
  2945. {
  2946. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2947. safexcel_aead_cra_init(tfm);
  2948. ctx->alg = SAFEXCEL_SM4;
  2949. ctx->blocksz = SM4_BLOCK_SIZE;
  2950. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA1;
  2951. ctx->state_sz = SHA1_DIGEST_SIZE;
  2952. return 0;
  2953. }
  2954. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha1_cbc_sm4 = {
  2955. .type = SAFEXCEL_ALG_TYPE_AEAD,
  2956. .algo_mask = SAFEXCEL_ALG_SM4 | SAFEXCEL_ALG_SHA1,
  2957. .alg.aead = {
  2958. .setkey = safexcel_aead_setkey,
  2959. .encrypt = safexcel_aead_sm4_blk_encrypt,
  2960. .decrypt = safexcel_aead_sm4_blk_decrypt,
  2961. .ivsize = SM4_BLOCK_SIZE,
  2962. .maxauthsize = SHA1_DIGEST_SIZE,
  2963. .base = {
  2964. .cra_name = "authenc(hmac(sha1),cbc(sm4))",
  2965. .cra_driver_name = "safexcel-authenc-hmac-sha1-cbc-sm4",
  2966. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  2967. .cra_flags = CRYPTO_ALG_ASYNC |
  2968. CRYPTO_ALG_ALLOCATES_MEMORY |
  2969. CRYPTO_ALG_KERN_DRIVER_ONLY,
  2970. .cra_blocksize = SM4_BLOCK_SIZE,
  2971. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  2972. .cra_alignmask = 0,
  2973. .cra_init = safexcel_aead_sm4cbc_sha1_cra_init,
  2974. .cra_exit = safexcel_aead_cra_exit,
  2975. .cra_module = THIS_MODULE,
  2976. },
  2977. },
  2978. };
  2979. static int safexcel_aead_fallback_setkey(struct crypto_aead *ctfm,
  2980. const u8 *key, unsigned int len)
  2981. {
  2982. struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
  2983. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2984. /* Keep fallback cipher synchronized */
  2985. return crypto_aead_setkey(ctx->fback, (u8 *)key, len) ?:
  2986. safexcel_aead_setkey(ctfm, key, len);
  2987. }
  2988. static int safexcel_aead_fallback_setauthsize(struct crypto_aead *ctfm,
  2989. unsigned int authsize)
  2990. {
  2991. struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
  2992. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  2993. /* Keep fallback cipher synchronized */
  2994. return crypto_aead_setauthsize(ctx->fback, authsize);
  2995. }
  2996. static int safexcel_aead_fallback_crypt(struct aead_request *req,
  2997. enum safexcel_cipher_direction dir)
  2998. {
  2999. struct crypto_aead *aead = crypto_aead_reqtfm(req);
  3000. struct crypto_tfm *tfm = crypto_aead_tfm(aead);
  3001. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  3002. struct aead_request *subreq = aead_request_ctx(req);
  3003. aead_request_set_tfm(subreq, ctx->fback);
  3004. aead_request_set_callback(subreq, req->base.flags, req->base.complete,
  3005. req->base.data);
  3006. aead_request_set_crypt(subreq, req->src, req->dst, req->cryptlen,
  3007. req->iv);
  3008. aead_request_set_ad(subreq, req->assoclen);
  3009. return (dir == SAFEXCEL_ENCRYPT) ?
  3010. crypto_aead_encrypt(subreq) :
  3011. crypto_aead_decrypt(subreq);
  3012. }
  3013. static int safexcel_aead_sm4cbc_sm3_encrypt(struct aead_request *req)
  3014. {
  3015. struct safexcel_cipher_req *creq = aead_request_ctx(req);
  3016. /* Workaround for HW bug: EIP96 4.3 does not report blocksize error */
  3017. if (req->cryptlen & (SM4_BLOCK_SIZE - 1))
  3018. return -EINVAL;
  3019. else if (req->cryptlen || req->assoclen) /* If input length > 0 only */
  3020. return safexcel_queue_req(&req->base, creq, SAFEXCEL_ENCRYPT);
  3021. /* HW cannot do full (AAD+payload) zero length, use fallback */
  3022. return safexcel_aead_fallback_crypt(req, SAFEXCEL_ENCRYPT);
  3023. }
  3024. static int safexcel_aead_sm4cbc_sm3_decrypt(struct aead_request *req)
  3025. {
  3026. struct safexcel_cipher_req *creq = aead_request_ctx(req);
  3027. struct crypto_aead *tfm = crypto_aead_reqtfm(req);
  3028. /* Workaround for HW bug: EIP96 4.3 does not report blocksize error */
  3029. if ((req->cryptlen - crypto_aead_authsize(tfm)) & (SM4_BLOCK_SIZE - 1))
  3030. return -EINVAL;
  3031. else if (req->cryptlen > crypto_aead_authsize(tfm) || req->assoclen)
  3032. /* If input length > 0 only */
  3033. return safexcel_queue_req(&req->base, creq, SAFEXCEL_DECRYPT);
  3034. /* HW cannot do full (AAD+payload) zero length, use fallback */
  3035. return safexcel_aead_fallback_crypt(req, SAFEXCEL_DECRYPT);
  3036. }
  3037. static int safexcel_aead_sm4cbc_sm3_cra_init(struct crypto_tfm *tfm)
  3038. {
  3039. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  3040. safexcel_aead_fallback_cra_init(tfm);
  3041. ctx->alg = SAFEXCEL_SM4;
  3042. ctx->blocksz = SM4_BLOCK_SIZE;
  3043. ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SM3;
  3044. ctx->state_sz = SM3_DIGEST_SIZE;
  3045. return 0;
  3046. }
  3047. struct safexcel_alg_template safexcel_alg_authenc_hmac_sm3_cbc_sm4 = {
  3048. .type = SAFEXCEL_ALG_TYPE_AEAD,
  3049. .algo_mask = SAFEXCEL_ALG_SM4 | SAFEXCEL_ALG_SM3,
  3050. .alg.aead = {
  3051. .setkey = safexcel_aead_fallback_setkey,
  3052. .setauthsize = safexcel_aead_fallback_setauthsize,
  3053. .encrypt = safexcel_aead_sm4cbc_sm3_encrypt,
  3054. .decrypt = safexcel_aead_sm4cbc_sm3_decrypt,
  3055. .ivsize = SM4_BLOCK_SIZE,
  3056. .maxauthsize = SM3_DIGEST_SIZE,
  3057. .base = {
  3058. .cra_name = "authenc(hmac(sm3),cbc(sm4))",
  3059. .cra_driver_name = "safexcel-authenc-hmac-sm3-cbc-sm4",
  3060. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  3061. .cra_flags = CRYPTO_ALG_ASYNC |
  3062. CRYPTO_ALG_ALLOCATES_MEMORY |
  3063. CRYPTO_ALG_KERN_DRIVER_ONLY |
  3064. CRYPTO_ALG_NEED_FALLBACK,
  3065. .cra_blocksize = SM4_BLOCK_SIZE,
  3066. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  3067. .cra_alignmask = 0,
  3068. .cra_init = safexcel_aead_sm4cbc_sm3_cra_init,
  3069. .cra_exit = safexcel_aead_fallback_cra_exit,
  3070. .cra_module = THIS_MODULE,
  3071. },
  3072. },
  3073. };
  3074. static int safexcel_aead_sm4ctr_sha1_cra_init(struct crypto_tfm *tfm)
  3075. {
  3076. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  3077. safexcel_aead_sm4cbc_sha1_cra_init(tfm);
  3078. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD;
  3079. return 0;
  3080. }
  3081. struct safexcel_alg_template safexcel_alg_authenc_hmac_sha1_ctr_sm4 = {
  3082. .type = SAFEXCEL_ALG_TYPE_AEAD,
  3083. .algo_mask = SAFEXCEL_ALG_SM4 | SAFEXCEL_ALG_SHA1,
  3084. .alg.aead = {
  3085. .setkey = safexcel_aead_setkey,
  3086. .encrypt = safexcel_aead_encrypt,
  3087. .decrypt = safexcel_aead_decrypt,
  3088. .ivsize = CTR_RFC3686_IV_SIZE,
  3089. .maxauthsize = SHA1_DIGEST_SIZE,
  3090. .base = {
  3091. .cra_name = "authenc(hmac(sha1),rfc3686(ctr(sm4)))",
  3092. .cra_driver_name = "safexcel-authenc-hmac-sha1-ctr-sm4",
  3093. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  3094. .cra_flags = CRYPTO_ALG_ASYNC |
  3095. CRYPTO_ALG_ALLOCATES_MEMORY |
  3096. CRYPTO_ALG_KERN_DRIVER_ONLY,
  3097. .cra_blocksize = 1,
  3098. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  3099. .cra_alignmask = 0,
  3100. .cra_init = safexcel_aead_sm4ctr_sha1_cra_init,
  3101. .cra_exit = safexcel_aead_cra_exit,
  3102. .cra_module = THIS_MODULE,
  3103. },
  3104. },
  3105. };
  3106. static int safexcel_aead_sm4ctr_sm3_cra_init(struct crypto_tfm *tfm)
  3107. {
  3108. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  3109. safexcel_aead_sm4cbc_sm3_cra_init(tfm);
  3110. ctx->mode = CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD;
  3111. return 0;
  3112. }
  3113. struct safexcel_alg_template safexcel_alg_authenc_hmac_sm3_ctr_sm4 = {
  3114. .type = SAFEXCEL_ALG_TYPE_AEAD,
  3115. .algo_mask = SAFEXCEL_ALG_SM4 | SAFEXCEL_ALG_SM3,
  3116. .alg.aead = {
  3117. .setkey = safexcel_aead_setkey,
  3118. .encrypt = safexcel_aead_encrypt,
  3119. .decrypt = safexcel_aead_decrypt,
  3120. .ivsize = CTR_RFC3686_IV_SIZE,
  3121. .maxauthsize = SM3_DIGEST_SIZE,
  3122. .base = {
  3123. .cra_name = "authenc(hmac(sm3),rfc3686(ctr(sm4)))",
  3124. .cra_driver_name = "safexcel-authenc-hmac-sm3-ctr-sm4",
  3125. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  3126. .cra_flags = CRYPTO_ALG_ASYNC |
  3127. CRYPTO_ALG_ALLOCATES_MEMORY |
  3128. CRYPTO_ALG_KERN_DRIVER_ONLY,
  3129. .cra_blocksize = 1,
  3130. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  3131. .cra_alignmask = 0,
  3132. .cra_init = safexcel_aead_sm4ctr_sm3_cra_init,
  3133. .cra_exit = safexcel_aead_cra_exit,
  3134. .cra_module = THIS_MODULE,
  3135. },
  3136. },
  3137. };
  3138. static int safexcel_rfc4106_gcm_setkey(struct crypto_aead *ctfm, const u8 *key,
  3139. unsigned int len)
  3140. {
  3141. struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
  3142. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  3143. /* last 4 bytes of key are the nonce! */
  3144. ctx->nonce = *(u32 *)(key + len - CTR_RFC3686_NONCE_SIZE);
  3145. len -= CTR_RFC3686_NONCE_SIZE;
  3146. return safexcel_aead_gcm_setkey(ctfm, key, len);
  3147. }
  3148. static int safexcel_rfc4106_gcm_setauthsize(struct crypto_aead *tfm,
  3149. unsigned int authsize)
  3150. {
  3151. return crypto_rfc4106_check_authsize(authsize);
  3152. }
  3153. static int safexcel_rfc4106_encrypt(struct aead_request *req)
  3154. {
  3155. return crypto_ipsec_check_assoclen(req->assoclen) ?:
  3156. safexcel_aead_encrypt(req);
  3157. }
  3158. static int safexcel_rfc4106_decrypt(struct aead_request *req)
  3159. {
  3160. return crypto_ipsec_check_assoclen(req->assoclen) ?:
  3161. safexcel_aead_decrypt(req);
  3162. }
  3163. static int safexcel_rfc4106_gcm_cra_init(struct crypto_tfm *tfm)
  3164. {
  3165. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  3166. int ret;
  3167. ret = safexcel_aead_gcm_cra_init(tfm);
  3168. ctx->aead = EIP197_AEAD_TYPE_IPSEC_ESP;
  3169. ctx->aadskip = EIP197_AEAD_IPSEC_IV_SIZE;
  3170. return ret;
  3171. }
  3172. struct safexcel_alg_template safexcel_alg_rfc4106_gcm = {
  3173. .type = SAFEXCEL_ALG_TYPE_AEAD,
  3174. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_GHASH,
  3175. .alg.aead = {
  3176. .setkey = safexcel_rfc4106_gcm_setkey,
  3177. .setauthsize = safexcel_rfc4106_gcm_setauthsize,
  3178. .encrypt = safexcel_rfc4106_encrypt,
  3179. .decrypt = safexcel_rfc4106_decrypt,
  3180. .ivsize = GCM_RFC4106_IV_SIZE,
  3181. .maxauthsize = GHASH_DIGEST_SIZE,
  3182. .base = {
  3183. .cra_name = "rfc4106(gcm(aes))",
  3184. .cra_driver_name = "safexcel-rfc4106-gcm-aes",
  3185. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  3186. .cra_flags = CRYPTO_ALG_ASYNC |
  3187. CRYPTO_ALG_ALLOCATES_MEMORY |
  3188. CRYPTO_ALG_KERN_DRIVER_ONLY,
  3189. .cra_blocksize = 1,
  3190. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  3191. .cra_alignmask = 0,
  3192. .cra_init = safexcel_rfc4106_gcm_cra_init,
  3193. .cra_exit = safexcel_aead_gcm_cra_exit,
  3194. },
  3195. },
  3196. };
  3197. static int safexcel_rfc4543_gcm_setauthsize(struct crypto_aead *tfm,
  3198. unsigned int authsize)
  3199. {
  3200. if (authsize != GHASH_DIGEST_SIZE)
  3201. return -EINVAL;
  3202. return 0;
  3203. }
  3204. static int safexcel_rfc4543_gcm_cra_init(struct crypto_tfm *tfm)
  3205. {
  3206. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  3207. int ret;
  3208. ret = safexcel_aead_gcm_cra_init(tfm);
  3209. ctx->aead = EIP197_AEAD_TYPE_IPSEC_ESP_GMAC;
  3210. return ret;
  3211. }
  3212. struct safexcel_alg_template safexcel_alg_rfc4543_gcm = {
  3213. .type = SAFEXCEL_ALG_TYPE_AEAD,
  3214. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_GHASH,
  3215. .alg.aead = {
  3216. .setkey = safexcel_rfc4106_gcm_setkey,
  3217. .setauthsize = safexcel_rfc4543_gcm_setauthsize,
  3218. .encrypt = safexcel_rfc4106_encrypt,
  3219. .decrypt = safexcel_rfc4106_decrypt,
  3220. .ivsize = GCM_RFC4543_IV_SIZE,
  3221. .maxauthsize = GHASH_DIGEST_SIZE,
  3222. .base = {
  3223. .cra_name = "rfc4543(gcm(aes))",
  3224. .cra_driver_name = "safexcel-rfc4543-gcm-aes",
  3225. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  3226. .cra_flags = CRYPTO_ALG_ASYNC |
  3227. CRYPTO_ALG_ALLOCATES_MEMORY |
  3228. CRYPTO_ALG_KERN_DRIVER_ONLY,
  3229. .cra_blocksize = 1,
  3230. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  3231. .cra_alignmask = 0,
  3232. .cra_init = safexcel_rfc4543_gcm_cra_init,
  3233. .cra_exit = safexcel_aead_gcm_cra_exit,
  3234. },
  3235. },
  3236. };
  3237. static int safexcel_rfc4309_ccm_setkey(struct crypto_aead *ctfm, const u8 *key,
  3238. unsigned int len)
  3239. {
  3240. struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
  3241. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  3242. /* First byte of the nonce = L = always 3 for RFC4309 (4 byte ctr) */
  3243. *(u8 *)&ctx->nonce = EIP197_AEAD_IPSEC_COUNTER_SIZE - 1;
  3244. /* last 3 bytes of key are the nonce! */
  3245. memcpy((u8 *)&ctx->nonce + 1, key + len -
  3246. EIP197_AEAD_IPSEC_CCM_NONCE_SIZE,
  3247. EIP197_AEAD_IPSEC_CCM_NONCE_SIZE);
  3248. len -= EIP197_AEAD_IPSEC_CCM_NONCE_SIZE;
  3249. return safexcel_aead_ccm_setkey(ctfm, key, len);
  3250. }
  3251. static int safexcel_rfc4309_ccm_setauthsize(struct crypto_aead *tfm,
  3252. unsigned int authsize)
  3253. {
  3254. /* Borrowed from crypto/ccm.c */
  3255. switch (authsize) {
  3256. case 8:
  3257. case 12:
  3258. case 16:
  3259. break;
  3260. default:
  3261. return -EINVAL;
  3262. }
  3263. return 0;
  3264. }
  3265. static int safexcel_rfc4309_ccm_encrypt(struct aead_request *req)
  3266. {
  3267. struct safexcel_cipher_req *creq = aead_request_ctx(req);
  3268. /* Borrowed from crypto/ccm.c */
  3269. if (req->assoclen != 16 && req->assoclen != 20)
  3270. return -EINVAL;
  3271. return safexcel_queue_req(&req->base, creq, SAFEXCEL_ENCRYPT);
  3272. }
  3273. static int safexcel_rfc4309_ccm_decrypt(struct aead_request *req)
  3274. {
  3275. struct safexcel_cipher_req *creq = aead_request_ctx(req);
  3276. /* Borrowed from crypto/ccm.c */
  3277. if (req->assoclen != 16 && req->assoclen != 20)
  3278. return -EINVAL;
  3279. return safexcel_queue_req(&req->base, creq, SAFEXCEL_DECRYPT);
  3280. }
  3281. static int safexcel_rfc4309_ccm_cra_init(struct crypto_tfm *tfm)
  3282. {
  3283. struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
  3284. int ret;
  3285. ret = safexcel_aead_ccm_cra_init(tfm);
  3286. ctx->aead = EIP197_AEAD_TYPE_IPSEC_ESP;
  3287. ctx->aadskip = EIP197_AEAD_IPSEC_IV_SIZE;
  3288. return ret;
  3289. }
  3290. struct safexcel_alg_template safexcel_alg_rfc4309_ccm = {
  3291. .type = SAFEXCEL_ALG_TYPE_AEAD,
  3292. .algo_mask = SAFEXCEL_ALG_AES | SAFEXCEL_ALG_CBC_MAC_ALL,
  3293. .alg.aead = {
  3294. .setkey = safexcel_rfc4309_ccm_setkey,
  3295. .setauthsize = safexcel_rfc4309_ccm_setauthsize,
  3296. .encrypt = safexcel_rfc4309_ccm_encrypt,
  3297. .decrypt = safexcel_rfc4309_ccm_decrypt,
  3298. .ivsize = EIP197_AEAD_IPSEC_IV_SIZE,
  3299. .maxauthsize = AES_BLOCK_SIZE,
  3300. .base = {
  3301. .cra_name = "rfc4309(ccm(aes))",
  3302. .cra_driver_name = "safexcel-rfc4309-ccm-aes",
  3303. .cra_priority = SAFEXCEL_CRA_PRIORITY,
  3304. .cra_flags = CRYPTO_ALG_ASYNC |
  3305. CRYPTO_ALG_ALLOCATES_MEMORY |
  3306. CRYPTO_ALG_KERN_DRIVER_ONLY,
  3307. .cra_blocksize = 1,
  3308. .cra_ctxsize = sizeof(struct safexcel_cipher_ctx),
  3309. .cra_alignmask = 0,
  3310. .cra_init = safexcel_rfc4309_ccm_cra_init,
  3311. .cra_exit = safexcel_aead_cra_exit,
  3312. .cra_module = THIS_MODULE,
  3313. },
  3314. },
  3315. };