18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
28c2ecf20Sopenharmony_ci/**
38c2ecf20Sopenharmony_ci * AES CTR routines supporting VMX instructions on the Power 8
48c2ecf20Sopenharmony_ci *
58c2ecf20Sopenharmony_ci * Copyright (C) 2015 International Business Machines Inc.
68c2ecf20Sopenharmony_ci *
78c2ecf20Sopenharmony_ci * Author: Marcelo Henrique Cerri <mhcerri@br.ibm.com>
88c2ecf20Sopenharmony_ci */
98c2ecf20Sopenharmony_ci
108c2ecf20Sopenharmony_ci#include <asm/simd.h>
118c2ecf20Sopenharmony_ci#include <asm/switch_to.h>
128c2ecf20Sopenharmony_ci#include <crypto/aes.h>
138c2ecf20Sopenharmony_ci#include <crypto/internal/simd.h>
148c2ecf20Sopenharmony_ci#include <crypto/internal/skcipher.h>
158c2ecf20Sopenharmony_ci
168c2ecf20Sopenharmony_ci#include "aesp8-ppc.h"
178c2ecf20Sopenharmony_ci
188c2ecf20Sopenharmony_cistruct p8_aes_ctr_ctx {
198c2ecf20Sopenharmony_ci	struct crypto_skcipher *fallback;
208c2ecf20Sopenharmony_ci	struct aes_key enc_key;
218c2ecf20Sopenharmony_ci};
228c2ecf20Sopenharmony_ci
238c2ecf20Sopenharmony_cistatic int p8_aes_ctr_init(struct crypto_skcipher *tfm)
248c2ecf20Sopenharmony_ci{
258c2ecf20Sopenharmony_ci	struct p8_aes_ctr_ctx *ctx = crypto_skcipher_ctx(tfm);
268c2ecf20Sopenharmony_ci	struct crypto_skcipher *fallback;
278c2ecf20Sopenharmony_ci
288c2ecf20Sopenharmony_ci	fallback = crypto_alloc_skcipher("ctr(aes)", 0,
298c2ecf20Sopenharmony_ci					 CRYPTO_ALG_NEED_FALLBACK |
308c2ecf20Sopenharmony_ci					 CRYPTO_ALG_ASYNC);
318c2ecf20Sopenharmony_ci	if (IS_ERR(fallback)) {
328c2ecf20Sopenharmony_ci		pr_err("Failed to allocate ctr(aes) fallback: %ld\n",
338c2ecf20Sopenharmony_ci		       PTR_ERR(fallback));
348c2ecf20Sopenharmony_ci		return PTR_ERR(fallback);
358c2ecf20Sopenharmony_ci	}
368c2ecf20Sopenharmony_ci
378c2ecf20Sopenharmony_ci	crypto_skcipher_set_reqsize(tfm, sizeof(struct skcipher_request) +
388c2ecf20Sopenharmony_ci				    crypto_skcipher_reqsize(fallback));
398c2ecf20Sopenharmony_ci	ctx->fallback = fallback;
408c2ecf20Sopenharmony_ci	return 0;
418c2ecf20Sopenharmony_ci}
428c2ecf20Sopenharmony_ci
438c2ecf20Sopenharmony_cistatic void p8_aes_ctr_exit(struct crypto_skcipher *tfm)
448c2ecf20Sopenharmony_ci{
458c2ecf20Sopenharmony_ci	struct p8_aes_ctr_ctx *ctx = crypto_skcipher_ctx(tfm);
468c2ecf20Sopenharmony_ci
478c2ecf20Sopenharmony_ci	crypto_free_skcipher(ctx->fallback);
488c2ecf20Sopenharmony_ci}
498c2ecf20Sopenharmony_ci
508c2ecf20Sopenharmony_cistatic int p8_aes_ctr_setkey(struct crypto_skcipher *tfm, const u8 *key,
518c2ecf20Sopenharmony_ci			     unsigned int keylen)
528c2ecf20Sopenharmony_ci{
538c2ecf20Sopenharmony_ci	struct p8_aes_ctr_ctx *ctx = crypto_skcipher_ctx(tfm);
548c2ecf20Sopenharmony_ci	int ret;
558c2ecf20Sopenharmony_ci
568c2ecf20Sopenharmony_ci	preempt_disable();
578c2ecf20Sopenharmony_ci	pagefault_disable();
588c2ecf20Sopenharmony_ci	enable_kernel_vsx();
598c2ecf20Sopenharmony_ci	ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key);
608c2ecf20Sopenharmony_ci	disable_kernel_vsx();
618c2ecf20Sopenharmony_ci	pagefault_enable();
628c2ecf20Sopenharmony_ci	preempt_enable();
638c2ecf20Sopenharmony_ci
648c2ecf20Sopenharmony_ci	ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen);
658c2ecf20Sopenharmony_ci
668c2ecf20Sopenharmony_ci	return ret ? -EINVAL : 0;
678c2ecf20Sopenharmony_ci}
688c2ecf20Sopenharmony_ci
698c2ecf20Sopenharmony_cistatic void p8_aes_ctr_final(const struct p8_aes_ctr_ctx *ctx,
708c2ecf20Sopenharmony_ci			     struct skcipher_walk *walk)
718c2ecf20Sopenharmony_ci{
728c2ecf20Sopenharmony_ci	u8 *ctrblk = walk->iv;
738c2ecf20Sopenharmony_ci	u8 keystream[AES_BLOCK_SIZE];
748c2ecf20Sopenharmony_ci	u8 *src = walk->src.virt.addr;
758c2ecf20Sopenharmony_ci	u8 *dst = walk->dst.virt.addr;
768c2ecf20Sopenharmony_ci	unsigned int nbytes = walk->nbytes;
778c2ecf20Sopenharmony_ci
788c2ecf20Sopenharmony_ci	preempt_disable();
798c2ecf20Sopenharmony_ci	pagefault_disable();
808c2ecf20Sopenharmony_ci	enable_kernel_vsx();
818c2ecf20Sopenharmony_ci	aes_p8_encrypt(ctrblk, keystream, &ctx->enc_key);
828c2ecf20Sopenharmony_ci	disable_kernel_vsx();
838c2ecf20Sopenharmony_ci	pagefault_enable();
848c2ecf20Sopenharmony_ci	preempt_enable();
858c2ecf20Sopenharmony_ci
868c2ecf20Sopenharmony_ci	crypto_xor_cpy(dst, keystream, src, nbytes);
878c2ecf20Sopenharmony_ci	crypto_inc(ctrblk, AES_BLOCK_SIZE);
888c2ecf20Sopenharmony_ci}
898c2ecf20Sopenharmony_ci
908c2ecf20Sopenharmony_cistatic int p8_aes_ctr_crypt(struct skcipher_request *req)
918c2ecf20Sopenharmony_ci{
928c2ecf20Sopenharmony_ci	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
938c2ecf20Sopenharmony_ci	const struct p8_aes_ctr_ctx *ctx = crypto_skcipher_ctx(tfm);
948c2ecf20Sopenharmony_ci	struct skcipher_walk walk;
958c2ecf20Sopenharmony_ci	unsigned int nbytes;
968c2ecf20Sopenharmony_ci	int ret;
978c2ecf20Sopenharmony_ci
988c2ecf20Sopenharmony_ci	if (!crypto_simd_usable()) {
998c2ecf20Sopenharmony_ci		struct skcipher_request *subreq = skcipher_request_ctx(req);
1008c2ecf20Sopenharmony_ci
1018c2ecf20Sopenharmony_ci		*subreq = *req;
1028c2ecf20Sopenharmony_ci		skcipher_request_set_tfm(subreq, ctx->fallback);
1038c2ecf20Sopenharmony_ci		return crypto_skcipher_encrypt(subreq);
1048c2ecf20Sopenharmony_ci	}
1058c2ecf20Sopenharmony_ci
1068c2ecf20Sopenharmony_ci	ret = skcipher_walk_virt(&walk, req, false);
1078c2ecf20Sopenharmony_ci	while ((nbytes = walk.nbytes) >= AES_BLOCK_SIZE) {
1088c2ecf20Sopenharmony_ci		preempt_disable();
1098c2ecf20Sopenharmony_ci		pagefault_disable();
1108c2ecf20Sopenharmony_ci		enable_kernel_vsx();
1118c2ecf20Sopenharmony_ci		aes_p8_ctr32_encrypt_blocks(walk.src.virt.addr,
1128c2ecf20Sopenharmony_ci					    walk.dst.virt.addr,
1138c2ecf20Sopenharmony_ci					    nbytes / AES_BLOCK_SIZE,
1148c2ecf20Sopenharmony_ci					    &ctx->enc_key, walk.iv);
1158c2ecf20Sopenharmony_ci		disable_kernel_vsx();
1168c2ecf20Sopenharmony_ci		pagefault_enable();
1178c2ecf20Sopenharmony_ci		preempt_enable();
1188c2ecf20Sopenharmony_ci
1198c2ecf20Sopenharmony_ci		do {
1208c2ecf20Sopenharmony_ci			crypto_inc(walk.iv, AES_BLOCK_SIZE);
1218c2ecf20Sopenharmony_ci		} while ((nbytes -= AES_BLOCK_SIZE) >= AES_BLOCK_SIZE);
1228c2ecf20Sopenharmony_ci
1238c2ecf20Sopenharmony_ci		ret = skcipher_walk_done(&walk, nbytes);
1248c2ecf20Sopenharmony_ci	}
1258c2ecf20Sopenharmony_ci	if (nbytes) {
1268c2ecf20Sopenharmony_ci		p8_aes_ctr_final(ctx, &walk);
1278c2ecf20Sopenharmony_ci		ret = skcipher_walk_done(&walk, 0);
1288c2ecf20Sopenharmony_ci	}
1298c2ecf20Sopenharmony_ci	return ret;
1308c2ecf20Sopenharmony_ci}
1318c2ecf20Sopenharmony_ci
1328c2ecf20Sopenharmony_cistruct skcipher_alg p8_aes_ctr_alg = {
1338c2ecf20Sopenharmony_ci	.base.cra_name = "ctr(aes)",
1348c2ecf20Sopenharmony_ci	.base.cra_driver_name = "p8_aes_ctr",
1358c2ecf20Sopenharmony_ci	.base.cra_module = THIS_MODULE,
1368c2ecf20Sopenharmony_ci	.base.cra_priority = 2000,
1378c2ecf20Sopenharmony_ci	.base.cra_flags = CRYPTO_ALG_NEED_FALLBACK,
1388c2ecf20Sopenharmony_ci	.base.cra_blocksize = 1,
1398c2ecf20Sopenharmony_ci	.base.cra_ctxsize = sizeof(struct p8_aes_ctr_ctx),
1408c2ecf20Sopenharmony_ci	.setkey = p8_aes_ctr_setkey,
1418c2ecf20Sopenharmony_ci	.encrypt = p8_aes_ctr_crypt,
1428c2ecf20Sopenharmony_ci	.decrypt = p8_aes_ctr_crypt,
1438c2ecf20Sopenharmony_ci	.init = p8_aes_ctr_init,
1448c2ecf20Sopenharmony_ci	.exit = p8_aes_ctr_exit,
1458c2ecf20Sopenharmony_ci	.min_keysize = AES_MIN_KEY_SIZE,
1468c2ecf20Sopenharmony_ci	.max_keysize = AES_MAX_KEY_SIZE,
1478c2ecf20Sopenharmony_ci	.ivsize = AES_BLOCK_SIZE,
1488c2ecf20Sopenharmony_ci	.chunksize = AES_BLOCK_SIZE,
1498c2ecf20Sopenharmony_ci};
150