18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * Cryptographic API. 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * SHA-512 and SHA-384 Secure Hash Algorithm. 68c2ecf20Sopenharmony_ci * 78c2ecf20Sopenharmony_ci * Adapted for OCTEON by Aaro Koskinen <aaro.koskinen@iki.fi>. 88c2ecf20Sopenharmony_ci * 98c2ecf20Sopenharmony_ci * Based on crypto/sha512_generic.c, which is: 108c2ecf20Sopenharmony_ci * 118c2ecf20Sopenharmony_ci * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com> 128c2ecf20Sopenharmony_ci * Copyright (c) Andrew McDonald <andrew@mcdonald.org.uk> 138c2ecf20Sopenharmony_ci * Copyright (c) 2003 Kyle McMartin <kyle@debian.org> 148c2ecf20Sopenharmony_ci */ 158c2ecf20Sopenharmony_ci 168c2ecf20Sopenharmony_ci#include <linux/mm.h> 178c2ecf20Sopenharmony_ci#include <crypto/sha.h> 188c2ecf20Sopenharmony_ci#include <linux/init.h> 198c2ecf20Sopenharmony_ci#include <linux/types.h> 208c2ecf20Sopenharmony_ci#include <linux/module.h> 218c2ecf20Sopenharmony_ci#include <asm/byteorder.h> 228c2ecf20Sopenharmony_ci#include <asm/octeon/octeon.h> 238c2ecf20Sopenharmony_ci#include <crypto/internal/hash.h> 248c2ecf20Sopenharmony_ci 258c2ecf20Sopenharmony_ci#include "octeon-crypto.h" 268c2ecf20Sopenharmony_ci 278c2ecf20Sopenharmony_ci/* 288c2ecf20Sopenharmony_ci * We pass everything as 64-bit. OCTEON can handle misaligned data. 298c2ecf20Sopenharmony_ci */ 308c2ecf20Sopenharmony_ci 318c2ecf20Sopenharmony_cistatic void octeon_sha512_store_hash(struct sha512_state *sctx) 328c2ecf20Sopenharmony_ci{ 338c2ecf20Sopenharmony_ci write_octeon_64bit_hash_sha512(sctx->state[0], 0); 348c2ecf20Sopenharmony_ci write_octeon_64bit_hash_sha512(sctx->state[1], 1); 358c2ecf20Sopenharmony_ci write_octeon_64bit_hash_sha512(sctx->state[2], 2); 368c2ecf20Sopenharmony_ci write_octeon_64bit_hash_sha512(sctx->state[3], 3); 378c2ecf20Sopenharmony_ci write_octeon_64bit_hash_sha512(sctx->state[4], 4); 388c2ecf20Sopenharmony_ci write_octeon_64bit_hash_sha512(sctx->state[5], 5); 398c2ecf20Sopenharmony_ci write_octeon_64bit_hash_sha512(sctx->state[6], 6); 408c2ecf20Sopenharmony_ci write_octeon_64bit_hash_sha512(sctx->state[7], 7); 418c2ecf20Sopenharmony_ci} 428c2ecf20Sopenharmony_ci 438c2ecf20Sopenharmony_cistatic void octeon_sha512_read_hash(struct sha512_state *sctx) 448c2ecf20Sopenharmony_ci{ 458c2ecf20Sopenharmony_ci sctx->state[0] = read_octeon_64bit_hash_sha512(0); 468c2ecf20Sopenharmony_ci sctx->state[1] = read_octeon_64bit_hash_sha512(1); 478c2ecf20Sopenharmony_ci sctx->state[2] = read_octeon_64bit_hash_sha512(2); 488c2ecf20Sopenharmony_ci sctx->state[3] = read_octeon_64bit_hash_sha512(3); 498c2ecf20Sopenharmony_ci sctx->state[4] = read_octeon_64bit_hash_sha512(4); 508c2ecf20Sopenharmony_ci sctx->state[5] = read_octeon_64bit_hash_sha512(5); 518c2ecf20Sopenharmony_ci sctx->state[6] = read_octeon_64bit_hash_sha512(6); 528c2ecf20Sopenharmony_ci sctx->state[7] = read_octeon_64bit_hash_sha512(7); 538c2ecf20Sopenharmony_ci} 548c2ecf20Sopenharmony_ci 558c2ecf20Sopenharmony_cistatic void octeon_sha512_transform(const void *_block) 568c2ecf20Sopenharmony_ci{ 578c2ecf20Sopenharmony_ci const u64 *block = _block; 588c2ecf20Sopenharmony_ci 598c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[0], 0); 608c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[1], 1); 618c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[2], 2); 628c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[3], 3); 638c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[4], 4); 648c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[5], 5); 658c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[6], 6); 668c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[7], 7); 678c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[8], 8); 688c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[9], 9); 698c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[10], 10); 708c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[11], 11); 718c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[12], 12); 728c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[13], 13); 738c2ecf20Sopenharmony_ci write_octeon_64bit_block_sha512(block[14], 14); 748c2ecf20Sopenharmony_ci octeon_sha512_start(block[15]); 758c2ecf20Sopenharmony_ci} 768c2ecf20Sopenharmony_ci 778c2ecf20Sopenharmony_cistatic int octeon_sha512_init(struct shash_desc *desc) 788c2ecf20Sopenharmony_ci{ 798c2ecf20Sopenharmony_ci struct sha512_state *sctx = shash_desc_ctx(desc); 808c2ecf20Sopenharmony_ci 818c2ecf20Sopenharmony_ci sctx->state[0] = SHA512_H0; 828c2ecf20Sopenharmony_ci sctx->state[1] = SHA512_H1; 838c2ecf20Sopenharmony_ci sctx->state[2] = SHA512_H2; 848c2ecf20Sopenharmony_ci sctx->state[3] = SHA512_H3; 858c2ecf20Sopenharmony_ci sctx->state[4] = SHA512_H4; 868c2ecf20Sopenharmony_ci sctx->state[5] = SHA512_H5; 878c2ecf20Sopenharmony_ci sctx->state[6] = SHA512_H6; 888c2ecf20Sopenharmony_ci sctx->state[7] = SHA512_H7; 898c2ecf20Sopenharmony_ci sctx->count[0] = sctx->count[1] = 0; 908c2ecf20Sopenharmony_ci 918c2ecf20Sopenharmony_ci return 0; 928c2ecf20Sopenharmony_ci} 938c2ecf20Sopenharmony_ci 948c2ecf20Sopenharmony_cistatic int octeon_sha384_init(struct shash_desc *desc) 958c2ecf20Sopenharmony_ci{ 968c2ecf20Sopenharmony_ci struct sha512_state *sctx = shash_desc_ctx(desc); 978c2ecf20Sopenharmony_ci 988c2ecf20Sopenharmony_ci sctx->state[0] = SHA384_H0; 998c2ecf20Sopenharmony_ci sctx->state[1] = SHA384_H1; 1008c2ecf20Sopenharmony_ci sctx->state[2] = SHA384_H2; 1018c2ecf20Sopenharmony_ci sctx->state[3] = SHA384_H3; 1028c2ecf20Sopenharmony_ci sctx->state[4] = SHA384_H4; 1038c2ecf20Sopenharmony_ci sctx->state[5] = SHA384_H5; 1048c2ecf20Sopenharmony_ci sctx->state[6] = SHA384_H6; 1058c2ecf20Sopenharmony_ci sctx->state[7] = SHA384_H7; 1068c2ecf20Sopenharmony_ci sctx->count[0] = sctx->count[1] = 0; 1078c2ecf20Sopenharmony_ci 1088c2ecf20Sopenharmony_ci return 0; 1098c2ecf20Sopenharmony_ci} 1108c2ecf20Sopenharmony_ci 1118c2ecf20Sopenharmony_cistatic void __octeon_sha512_update(struct sha512_state *sctx, const u8 *data, 1128c2ecf20Sopenharmony_ci unsigned int len) 1138c2ecf20Sopenharmony_ci{ 1148c2ecf20Sopenharmony_ci unsigned int part_len; 1158c2ecf20Sopenharmony_ci unsigned int index; 1168c2ecf20Sopenharmony_ci unsigned int i; 1178c2ecf20Sopenharmony_ci 1188c2ecf20Sopenharmony_ci /* Compute number of bytes mod 128. */ 1198c2ecf20Sopenharmony_ci index = sctx->count[0] % SHA512_BLOCK_SIZE; 1208c2ecf20Sopenharmony_ci 1218c2ecf20Sopenharmony_ci /* Update number of bytes. */ 1228c2ecf20Sopenharmony_ci if ((sctx->count[0] += len) < len) 1238c2ecf20Sopenharmony_ci sctx->count[1]++; 1248c2ecf20Sopenharmony_ci 1258c2ecf20Sopenharmony_ci part_len = SHA512_BLOCK_SIZE - index; 1268c2ecf20Sopenharmony_ci 1278c2ecf20Sopenharmony_ci /* Transform as many times as possible. */ 1288c2ecf20Sopenharmony_ci if (len >= part_len) { 1298c2ecf20Sopenharmony_ci memcpy(&sctx->buf[index], data, part_len); 1308c2ecf20Sopenharmony_ci octeon_sha512_transform(sctx->buf); 1318c2ecf20Sopenharmony_ci 1328c2ecf20Sopenharmony_ci for (i = part_len; i + SHA512_BLOCK_SIZE <= len; 1338c2ecf20Sopenharmony_ci i += SHA512_BLOCK_SIZE) 1348c2ecf20Sopenharmony_ci octeon_sha512_transform(&data[i]); 1358c2ecf20Sopenharmony_ci 1368c2ecf20Sopenharmony_ci index = 0; 1378c2ecf20Sopenharmony_ci } else { 1388c2ecf20Sopenharmony_ci i = 0; 1398c2ecf20Sopenharmony_ci } 1408c2ecf20Sopenharmony_ci 1418c2ecf20Sopenharmony_ci /* Buffer remaining input. */ 1428c2ecf20Sopenharmony_ci memcpy(&sctx->buf[index], &data[i], len - i); 1438c2ecf20Sopenharmony_ci} 1448c2ecf20Sopenharmony_ci 1458c2ecf20Sopenharmony_cistatic int octeon_sha512_update(struct shash_desc *desc, const u8 *data, 1468c2ecf20Sopenharmony_ci unsigned int len) 1478c2ecf20Sopenharmony_ci{ 1488c2ecf20Sopenharmony_ci struct sha512_state *sctx = shash_desc_ctx(desc); 1498c2ecf20Sopenharmony_ci struct octeon_cop2_state state; 1508c2ecf20Sopenharmony_ci unsigned long flags; 1518c2ecf20Sopenharmony_ci 1528c2ecf20Sopenharmony_ci /* 1538c2ecf20Sopenharmony_ci * Small updates never reach the crypto engine, so the generic sha512 is 1548c2ecf20Sopenharmony_ci * faster because of the heavyweight octeon_crypto_enable() / 1558c2ecf20Sopenharmony_ci * octeon_crypto_disable(). 1568c2ecf20Sopenharmony_ci */ 1578c2ecf20Sopenharmony_ci if ((sctx->count[0] % SHA512_BLOCK_SIZE) + len < SHA512_BLOCK_SIZE) 1588c2ecf20Sopenharmony_ci return crypto_sha512_update(desc, data, len); 1598c2ecf20Sopenharmony_ci 1608c2ecf20Sopenharmony_ci flags = octeon_crypto_enable(&state); 1618c2ecf20Sopenharmony_ci octeon_sha512_store_hash(sctx); 1628c2ecf20Sopenharmony_ci 1638c2ecf20Sopenharmony_ci __octeon_sha512_update(sctx, data, len); 1648c2ecf20Sopenharmony_ci 1658c2ecf20Sopenharmony_ci octeon_sha512_read_hash(sctx); 1668c2ecf20Sopenharmony_ci octeon_crypto_disable(&state, flags); 1678c2ecf20Sopenharmony_ci 1688c2ecf20Sopenharmony_ci return 0; 1698c2ecf20Sopenharmony_ci} 1708c2ecf20Sopenharmony_ci 1718c2ecf20Sopenharmony_cistatic int octeon_sha512_final(struct shash_desc *desc, u8 *hash) 1728c2ecf20Sopenharmony_ci{ 1738c2ecf20Sopenharmony_ci struct sha512_state *sctx = shash_desc_ctx(desc); 1748c2ecf20Sopenharmony_ci static u8 padding[128] = { 0x80, }; 1758c2ecf20Sopenharmony_ci struct octeon_cop2_state state; 1768c2ecf20Sopenharmony_ci __be64 *dst = (__be64 *)hash; 1778c2ecf20Sopenharmony_ci unsigned int pad_len; 1788c2ecf20Sopenharmony_ci unsigned long flags; 1798c2ecf20Sopenharmony_ci unsigned int index; 1808c2ecf20Sopenharmony_ci __be64 bits[2]; 1818c2ecf20Sopenharmony_ci int i; 1828c2ecf20Sopenharmony_ci 1838c2ecf20Sopenharmony_ci /* Save number of bits. */ 1848c2ecf20Sopenharmony_ci bits[1] = cpu_to_be64(sctx->count[0] << 3); 1858c2ecf20Sopenharmony_ci bits[0] = cpu_to_be64(sctx->count[1] << 3 | sctx->count[0] >> 61); 1868c2ecf20Sopenharmony_ci 1878c2ecf20Sopenharmony_ci /* Pad out to 112 mod 128. */ 1888c2ecf20Sopenharmony_ci index = sctx->count[0] & 0x7f; 1898c2ecf20Sopenharmony_ci pad_len = (index < 112) ? (112 - index) : ((128+112) - index); 1908c2ecf20Sopenharmony_ci 1918c2ecf20Sopenharmony_ci flags = octeon_crypto_enable(&state); 1928c2ecf20Sopenharmony_ci octeon_sha512_store_hash(sctx); 1938c2ecf20Sopenharmony_ci 1948c2ecf20Sopenharmony_ci __octeon_sha512_update(sctx, padding, pad_len); 1958c2ecf20Sopenharmony_ci 1968c2ecf20Sopenharmony_ci /* Append length (before padding). */ 1978c2ecf20Sopenharmony_ci __octeon_sha512_update(sctx, (const u8 *)bits, sizeof(bits)); 1988c2ecf20Sopenharmony_ci 1998c2ecf20Sopenharmony_ci octeon_sha512_read_hash(sctx); 2008c2ecf20Sopenharmony_ci octeon_crypto_disable(&state, flags); 2018c2ecf20Sopenharmony_ci 2028c2ecf20Sopenharmony_ci /* Store state in digest. */ 2038c2ecf20Sopenharmony_ci for (i = 0; i < 8; i++) 2048c2ecf20Sopenharmony_ci dst[i] = cpu_to_be64(sctx->state[i]); 2058c2ecf20Sopenharmony_ci 2068c2ecf20Sopenharmony_ci /* Zeroize sensitive information. */ 2078c2ecf20Sopenharmony_ci memset(sctx, 0, sizeof(struct sha512_state)); 2088c2ecf20Sopenharmony_ci 2098c2ecf20Sopenharmony_ci return 0; 2108c2ecf20Sopenharmony_ci} 2118c2ecf20Sopenharmony_ci 2128c2ecf20Sopenharmony_cistatic int octeon_sha384_final(struct shash_desc *desc, u8 *hash) 2138c2ecf20Sopenharmony_ci{ 2148c2ecf20Sopenharmony_ci u8 D[64]; 2158c2ecf20Sopenharmony_ci 2168c2ecf20Sopenharmony_ci octeon_sha512_final(desc, D); 2178c2ecf20Sopenharmony_ci 2188c2ecf20Sopenharmony_ci memcpy(hash, D, 48); 2198c2ecf20Sopenharmony_ci memzero_explicit(D, 64); 2208c2ecf20Sopenharmony_ci 2218c2ecf20Sopenharmony_ci return 0; 2228c2ecf20Sopenharmony_ci} 2238c2ecf20Sopenharmony_ci 2248c2ecf20Sopenharmony_cistatic struct shash_alg octeon_sha512_algs[2] = { { 2258c2ecf20Sopenharmony_ci .digestsize = SHA512_DIGEST_SIZE, 2268c2ecf20Sopenharmony_ci .init = octeon_sha512_init, 2278c2ecf20Sopenharmony_ci .update = octeon_sha512_update, 2288c2ecf20Sopenharmony_ci .final = octeon_sha512_final, 2298c2ecf20Sopenharmony_ci .descsize = sizeof(struct sha512_state), 2308c2ecf20Sopenharmony_ci .base = { 2318c2ecf20Sopenharmony_ci .cra_name = "sha512", 2328c2ecf20Sopenharmony_ci .cra_driver_name= "octeon-sha512", 2338c2ecf20Sopenharmony_ci .cra_priority = OCTEON_CR_OPCODE_PRIORITY, 2348c2ecf20Sopenharmony_ci .cra_blocksize = SHA512_BLOCK_SIZE, 2358c2ecf20Sopenharmony_ci .cra_module = THIS_MODULE, 2368c2ecf20Sopenharmony_ci } 2378c2ecf20Sopenharmony_ci}, { 2388c2ecf20Sopenharmony_ci .digestsize = SHA384_DIGEST_SIZE, 2398c2ecf20Sopenharmony_ci .init = octeon_sha384_init, 2408c2ecf20Sopenharmony_ci .update = octeon_sha512_update, 2418c2ecf20Sopenharmony_ci .final = octeon_sha384_final, 2428c2ecf20Sopenharmony_ci .descsize = sizeof(struct sha512_state), 2438c2ecf20Sopenharmony_ci .base = { 2448c2ecf20Sopenharmony_ci .cra_name = "sha384", 2458c2ecf20Sopenharmony_ci .cra_driver_name= "octeon-sha384", 2468c2ecf20Sopenharmony_ci .cra_priority = OCTEON_CR_OPCODE_PRIORITY, 2478c2ecf20Sopenharmony_ci .cra_blocksize = SHA384_BLOCK_SIZE, 2488c2ecf20Sopenharmony_ci .cra_module = THIS_MODULE, 2498c2ecf20Sopenharmony_ci } 2508c2ecf20Sopenharmony_ci} }; 2518c2ecf20Sopenharmony_ci 2528c2ecf20Sopenharmony_cistatic int __init octeon_sha512_mod_init(void) 2538c2ecf20Sopenharmony_ci{ 2548c2ecf20Sopenharmony_ci if (!octeon_has_crypto()) 2558c2ecf20Sopenharmony_ci return -ENOTSUPP; 2568c2ecf20Sopenharmony_ci return crypto_register_shashes(octeon_sha512_algs, 2578c2ecf20Sopenharmony_ci ARRAY_SIZE(octeon_sha512_algs)); 2588c2ecf20Sopenharmony_ci} 2598c2ecf20Sopenharmony_ci 2608c2ecf20Sopenharmony_cistatic void __exit octeon_sha512_mod_fini(void) 2618c2ecf20Sopenharmony_ci{ 2628c2ecf20Sopenharmony_ci crypto_unregister_shashes(octeon_sha512_algs, 2638c2ecf20Sopenharmony_ci ARRAY_SIZE(octeon_sha512_algs)); 2648c2ecf20Sopenharmony_ci} 2658c2ecf20Sopenharmony_ci 2668c2ecf20Sopenharmony_cimodule_init(octeon_sha512_mod_init); 2678c2ecf20Sopenharmony_cimodule_exit(octeon_sha512_mod_fini); 2688c2ecf20Sopenharmony_ci 2698c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 2708c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("SHA-512 and SHA-384 Secure Hash Algorithms (OCTEON)"); 2718c2ecf20Sopenharmony_ciMODULE_AUTHOR("Aaro Koskinen <aaro.koskinen@iki.fi>"); 272