162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0+ 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Cryptographic API. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * s390 implementation of the AES Cipher Algorithm. 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * s390 Version: 862306a36Sopenharmony_ci * Copyright IBM Corp. 2005, 2017 962306a36Sopenharmony_ci * Author(s): Jan Glauber (jang@de.ibm.com) 1062306a36Sopenharmony_ci * Sebastian Siewior (sebastian@breakpoint.cc> SW-Fallback 1162306a36Sopenharmony_ci * Patrick Steuer <patrick.steuer@de.ibm.com> 1262306a36Sopenharmony_ci * Harald Freudenberger <freude@de.ibm.com> 1362306a36Sopenharmony_ci * 1462306a36Sopenharmony_ci * Derived from "crypto/aes_generic.c" 1562306a36Sopenharmony_ci */ 1662306a36Sopenharmony_ci 1762306a36Sopenharmony_ci#define KMSG_COMPONENT "aes_s390" 1862306a36Sopenharmony_ci#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci#include <crypto/aes.h> 2162306a36Sopenharmony_ci#include <crypto/algapi.h> 2262306a36Sopenharmony_ci#include <crypto/ghash.h> 2362306a36Sopenharmony_ci#include <crypto/internal/aead.h> 2462306a36Sopenharmony_ci#include <crypto/internal/cipher.h> 2562306a36Sopenharmony_ci#include <crypto/internal/skcipher.h> 2662306a36Sopenharmony_ci#include <crypto/scatterwalk.h> 2762306a36Sopenharmony_ci#include <linux/err.h> 2862306a36Sopenharmony_ci#include <linux/module.h> 2962306a36Sopenharmony_ci#include <linux/cpufeature.h> 3062306a36Sopenharmony_ci#include <linux/init.h> 3162306a36Sopenharmony_ci#include <linux/mutex.h> 3262306a36Sopenharmony_ci#include <linux/fips.h> 3362306a36Sopenharmony_ci#include <linux/string.h> 3462306a36Sopenharmony_ci#include <crypto/xts.h> 3562306a36Sopenharmony_ci#include <asm/cpacf.h> 3662306a36Sopenharmony_ci 3762306a36Sopenharmony_cistatic u8 *ctrblk; 3862306a36Sopenharmony_cistatic DEFINE_MUTEX(ctrblk_lock); 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_cistatic cpacf_mask_t km_functions, kmc_functions, kmctr_functions, 4162306a36Sopenharmony_ci kma_functions; 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_cistruct s390_aes_ctx { 4462306a36Sopenharmony_ci u8 key[AES_MAX_KEY_SIZE]; 4562306a36Sopenharmony_ci int key_len; 4662306a36Sopenharmony_ci unsigned long fc; 4762306a36Sopenharmony_ci union { 4862306a36Sopenharmony_ci struct crypto_skcipher *skcipher; 4962306a36Sopenharmony_ci struct crypto_cipher *cip; 5062306a36Sopenharmony_ci } fallback; 5162306a36Sopenharmony_ci}; 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_cistruct s390_xts_ctx { 5462306a36Sopenharmony_ci u8 key[32]; 5562306a36Sopenharmony_ci u8 pcc_key[32]; 5662306a36Sopenharmony_ci int key_len; 5762306a36Sopenharmony_ci unsigned long fc; 5862306a36Sopenharmony_ci struct crypto_skcipher *fallback; 5962306a36Sopenharmony_ci}; 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_cistruct gcm_sg_walk { 6262306a36Sopenharmony_ci struct scatter_walk walk; 6362306a36Sopenharmony_ci unsigned int walk_bytes; 6462306a36Sopenharmony_ci u8 *walk_ptr; 6562306a36Sopenharmony_ci unsigned int walk_bytes_remain; 6662306a36Sopenharmony_ci u8 buf[AES_BLOCK_SIZE]; 6762306a36Sopenharmony_ci unsigned int buf_bytes; 6862306a36Sopenharmony_ci u8 *ptr; 6962306a36Sopenharmony_ci unsigned int nbytes; 7062306a36Sopenharmony_ci}; 7162306a36Sopenharmony_ci 7262306a36Sopenharmony_cistatic int setkey_fallback_cip(struct crypto_tfm *tfm, const u8 *in_key, 7362306a36Sopenharmony_ci unsigned int key_len) 7462306a36Sopenharmony_ci{ 7562306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_tfm_ctx(tfm); 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci sctx->fallback.cip->base.crt_flags &= ~CRYPTO_TFM_REQ_MASK; 7862306a36Sopenharmony_ci sctx->fallback.cip->base.crt_flags |= (tfm->crt_flags & 7962306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci return crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); 8262306a36Sopenharmony_ci} 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_cistatic int aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, 8562306a36Sopenharmony_ci unsigned int key_len) 8662306a36Sopenharmony_ci{ 8762306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_tfm_ctx(tfm); 8862306a36Sopenharmony_ci unsigned long fc; 8962306a36Sopenharmony_ci 9062306a36Sopenharmony_ci /* Pick the correct function code based on the key length */ 9162306a36Sopenharmony_ci fc = (key_len == 16) ? CPACF_KM_AES_128 : 9262306a36Sopenharmony_ci (key_len == 24) ? CPACF_KM_AES_192 : 9362306a36Sopenharmony_ci (key_len == 32) ? CPACF_KM_AES_256 : 0; 9462306a36Sopenharmony_ci 9562306a36Sopenharmony_ci /* Check if the function code is available */ 9662306a36Sopenharmony_ci sctx->fc = (fc && cpacf_test_func(&km_functions, fc)) ? fc : 0; 9762306a36Sopenharmony_ci if (!sctx->fc) 9862306a36Sopenharmony_ci return setkey_fallback_cip(tfm, in_key, key_len); 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_ci sctx->key_len = key_len; 10162306a36Sopenharmony_ci memcpy(sctx->key, in_key, key_len); 10262306a36Sopenharmony_ci return 0; 10362306a36Sopenharmony_ci} 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_cistatic void crypto_aes_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) 10662306a36Sopenharmony_ci{ 10762306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_tfm_ctx(tfm); 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_ci if (unlikely(!sctx->fc)) { 11062306a36Sopenharmony_ci crypto_cipher_encrypt_one(sctx->fallback.cip, out, in); 11162306a36Sopenharmony_ci return; 11262306a36Sopenharmony_ci } 11362306a36Sopenharmony_ci cpacf_km(sctx->fc, &sctx->key, out, in, AES_BLOCK_SIZE); 11462306a36Sopenharmony_ci} 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_cistatic void crypto_aes_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) 11762306a36Sopenharmony_ci{ 11862306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_tfm_ctx(tfm); 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_ci if (unlikely(!sctx->fc)) { 12162306a36Sopenharmony_ci crypto_cipher_decrypt_one(sctx->fallback.cip, out, in); 12262306a36Sopenharmony_ci return; 12362306a36Sopenharmony_ci } 12462306a36Sopenharmony_ci cpacf_km(sctx->fc | CPACF_DECRYPT, 12562306a36Sopenharmony_ci &sctx->key, out, in, AES_BLOCK_SIZE); 12662306a36Sopenharmony_ci} 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_cistatic int fallback_init_cip(struct crypto_tfm *tfm) 12962306a36Sopenharmony_ci{ 13062306a36Sopenharmony_ci const char *name = tfm->__crt_alg->cra_name; 13162306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_tfm_ctx(tfm); 13262306a36Sopenharmony_ci 13362306a36Sopenharmony_ci sctx->fallback.cip = crypto_alloc_cipher(name, 0, 13462306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK); 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci if (IS_ERR(sctx->fallback.cip)) { 13762306a36Sopenharmony_ci pr_err("Allocating AES fallback algorithm %s failed\n", 13862306a36Sopenharmony_ci name); 13962306a36Sopenharmony_ci return PTR_ERR(sctx->fallback.cip); 14062306a36Sopenharmony_ci } 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci return 0; 14362306a36Sopenharmony_ci} 14462306a36Sopenharmony_ci 14562306a36Sopenharmony_cistatic void fallback_exit_cip(struct crypto_tfm *tfm) 14662306a36Sopenharmony_ci{ 14762306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_tfm_ctx(tfm); 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_ci crypto_free_cipher(sctx->fallback.cip); 15062306a36Sopenharmony_ci sctx->fallback.cip = NULL; 15162306a36Sopenharmony_ci} 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_cistatic struct crypto_alg aes_alg = { 15462306a36Sopenharmony_ci .cra_name = "aes", 15562306a36Sopenharmony_ci .cra_driver_name = "aes-s390", 15662306a36Sopenharmony_ci .cra_priority = 300, 15762306a36Sopenharmony_ci .cra_flags = CRYPTO_ALG_TYPE_CIPHER | 15862306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 15962306a36Sopenharmony_ci .cra_blocksize = AES_BLOCK_SIZE, 16062306a36Sopenharmony_ci .cra_ctxsize = sizeof(struct s390_aes_ctx), 16162306a36Sopenharmony_ci .cra_module = THIS_MODULE, 16262306a36Sopenharmony_ci .cra_init = fallback_init_cip, 16362306a36Sopenharmony_ci .cra_exit = fallback_exit_cip, 16462306a36Sopenharmony_ci .cra_u = { 16562306a36Sopenharmony_ci .cipher = { 16662306a36Sopenharmony_ci .cia_min_keysize = AES_MIN_KEY_SIZE, 16762306a36Sopenharmony_ci .cia_max_keysize = AES_MAX_KEY_SIZE, 16862306a36Sopenharmony_ci .cia_setkey = aes_set_key, 16962306a36Sopenharmony_ci .cia_encrypt = crypto_aes_encrypt, 17062306a36Sopenharmony_ci .cia_decrypt = crypto_aes_decrypt, 17162306a36Sopenharmony_ci } 17262306a36Sopenharmony_ci } 17362306a36Sopenharmony_ci}; 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_cistatic int setkey_fallback_skcipher(struct crypto_skcipher *tfm, const u8 *key, 17662306a36Sopenharmony_ci unsigned int len) 17762306a36Sopenharmony_ci{ 17862306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_skcipher_ctx(tfm); 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci crypto_skcipher_clear_flags(sctx->fallback.skcipher, 18162306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 18262306a36Sopenharmony_ci crypto_skcipher_set_flags(sctx->fallback.skcipher, 18362306a36Sopenharmony_ci crypto_skcipher_get_flags(tfm) & 18462306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 18562306a36Sopenharmony_ci return crypto_skcipher_setkey(sctx->fallback.skcipher, key, len); 18662306a36Sopenharmony_ci} 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_cistatic int fallback_skcipher_crypt(struct s390_aes_ctx *sctx, 18962306a36Sopenharmony_ci struct skcipher_request *req, 19062306a36Sopenharmony_ci unsigned long modifier) 19162306a36Sopenharmony_ci{ 19262306a36Sopenharmony_ci struct skcipher_request *subreq = skcipher_request_ctx(req); 19362306a36Sopenharmony_ci 19462306a36Sopenharmony_ci *subreq = *req; 19562306a36Sopenharmony_ci skcipher_request_set_tfm(subreq, sctx->fallback.skcipher); 19662306a36Sopenharmony_ci return (modifier & CPACF_DECRYPT) ? 19762306a36Sopenharmony_ci crypto_skcipher_decrypt(subreq) : 19862306a36Sopenharmony_ci crypto_skcipher_encrypt(subreq); 19962306a36Sopenharmony_ci} 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_cistatic int ecb_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, 20262306a36Sopenharmony_ci unsigned int key_len) 20362306a36Sopenharmony_ci{ 20462306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_skcipher_ctx(tfm); 20562306a36Sopenharmony_ci unsigned long fc; 20662306a36Sopenharmony_ci 20762306a36Sopenharmony_ci /* Pick the correct function code based on the key length */ 20862306a36Sopenharmony_ci fc = (key_len == 16) ? CPACF_KM_AES_128 : 20962306a36Sopenharmony_ci (key_len == 24) ? CPACF_KM_AES_192 : 21062306a36Sopenharmony_ci (key_len == 32) ? CPACF_KM_AES_256 : 0; 21162306a36Sopenharmony_ci 21262306a36Sopenharmony_ci /* Check if the function code is available */ 21362306a36Sopenharmony_ci sctx->fc = (fc && cpacf_test_func(&km_functions, fc)) ? fc : 0; 21462306a36Sopenharmony_ci if (!sctx->fc) 21562306a36Sopenharmony_ci return setkey_fallback_skcipher(tfm, in_key, key_len); 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_ci sctx->key_len = key_len; 21862306a36Sopenharmony_ci memcpy(sctx->key, in_key, key_len); 21962306a36Sopenharmony_ci return 0; 22062306a36Sopenharmony_ci} 22162306a36Sopenharmony_ci 22262306a36Sopenharmony_cistatic int ecb_aes_crypt(struct skcipher_request *req, unsigned long modifier) 22362306a36Sopenharmony_ci{ 22462306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 22562306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_skcipher_ctx(tfm); 22662306a36Sopenharmony_ci struct skcipher_walk walk; 22762306a36Sopenharmony_ci unsigned int nbytes, n; 22862306a36Sopenharmony_ci int ret; 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_ci if (unlikely(!sctx->fc)) 23162306a36Sopenharmony_ci return fallback_skcipher_crypt(sctx, req, modifier); 23262306a36Sopenharmony_ci 23362306a36Sopenharmony_ci ret = skcipher_walk_virt(&walk, req, false); 23462306a36Sopenharmony_ci while ((nbytes = walk.nbytes) != 0) { 23562306a36Sopenharmony_ci /* only use complete blocks */ 23662306a36Sopenharmony_ci n = nbytes & ~(AES_BLOCK_SIZE - 1); 23762306a36Sopenharmony_ci cpacf_km(sctx->fc | modifier, sctx->key, 23862306a36Sopenharmony_ci walk.dst.virt.addr, walk.src.virt.addr, n); 23962306a36Sopenharmony_ci ret = skcipher_walk_done(&walk, nbytes - n); 24062306a36Sopenharmony_ci } 24162306a36Sopenharmony_ci return ret; 24262306a36Sopenharmony_ci} 24362306a36Sopenharmony_ci 24462306a36Sopenharmony_cistatic int ecb_aes_encrypt(struct skcipher_request *req) 24562306a36Sopenharmony_ci{ 24662306a36Sopenharmony_ci return ecb_aes_crypt(req, 0); 24762306a36Sopenharmony_ci} 24862306a36Sopenharmony_ci 24962306a36Sopenharmony_cistatic int ecb_aes_decrypt(struct skcipher_request *req) 25062306a36Sopenharmony_ci{ 25162306a36Sopenharmony_ci return ecb_aes_crypt(req, CPACF_DECRYPT); 25262306a36Sopenharmony_ci} 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_cistatic int fallback_init_skcipher(struct crypto_skcipher *tfm) 25562306a36Sopenharmony_ci{ 25662306a36Sopenharmony_ci const char *name = crypto_tfm_alg_name(&tfm->base); 25762306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_skcipher_ctx(tfm); 25862306a36Sopenharmony_ci 25962306a36Sopenharmony_ci sctx->fallback.skcipher = crypto_alloc_skcipher(name, 0, 26062306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK | CRYPTO_ALG_ASYNC); 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_ci if (IS_ERR(sctx->fallback.skcipher)) { 26362306a36Sopenharmony_ci pr_err("Allocating AES fallback algorithm %s failed\n", 26462306a36Sopenharmony_ci name); 26562306a36Sopenharmony_ci return PTR_ERR(sctx->fallback.skcipher); 26662306a36Sopenharmony_ci } 26762306a36Sopenharmony_ci 26862306a36Sopenharmony_ci crypto_skcipher_set_reqsize(tfm, sizeof(struct skcipher_request) + 26962306a36Sopenharmony_ci crypto_skcipher_reqsize(sctx->fallback.skcipher)); 27062306a36Sopenharmony_ci return 0; 27162306a36Sopenharmony_ci} 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_cistatic void fallback_exit_skcipher(struct crypto_skcipher *tfm) 27462306a36Sopenharmony_ci{ 27562306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_skcipher_ctx(tfm); 27662306a36Sopenharmony_ci 27762306a36Sopenharmony_ci crypto_free_skcipher(sctx->fallback.skcipher); 27862306a36Sopenharmony_ci} 27962306a36Sopenharmony_ci 28062306a36Sopenharmony_cistatic struct skcipher_alg ecb_aes_alg = { 28162306a36Sopenharmony_ci .base.cra_name = "ecb(aes)", 28262306a36Sopenharmony_ci .base.cra_driver_name = "ecb-aes-s390", 28362306a36Sopenharmony_ci .base.cra_priority = 401, /* combo: aes + ecb + 1 */ 28462306a36Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_NEED_FALLBACK, 28562306a36Sopenharmony_ci .base.cra_blocksize = AES_BLOCK_SIZE, 28662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct s390_aes_ctx), 28762306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 28862306a36Sopenharmony_ci .init = fallback_init_skcipher, 28962306a36Sopenharmony_ci .exit = fallback_exit_skcipher, 29062306a36Sopenharmony_ci .min_keysize = AES_MIN_KEY_SIZE, 29162306a36Sopenharmony_ci .max_keysize = AES_MAX_KEY_SIZE, 29262306a36Sopenharmony_ci .setkey = ecb_aes_set_key, 29362306a36Sopenharmony_ci .encrypt = ecb_aes_encrypt, 29462306a36Sopenharmony_ci .decrypt = ecb_aes_decrypt, 29562306a36Sopenharmony_ci}; 29662306a36Sopenharmony_ci 29762306a36Sopenharmony_cistatic int cbc_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, 29862306a36Sopenharmony_ci unsigned int key_len) 29962306a36Sopenharmony_ci{ 30062306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_skcipher_ctx(tfm); 30162306a36Sopenharmony_ci unsigned long fc; 30262306a36Sopenharmony_ci 30362306a36Sopenharmony_ci /* Pick the correct function code based on the key length */ 30462306a36Sopenharmony_ci fc = (key_len == 16) ? CPACF_KMC_AES_128 : 30562306a36Sopenharmony_ci (key_len == 24) ? CPACF_KMC_AES_192 : 30662306a36Sopenharmony_ci (key_len == 32) ? CPACF_KMC_AES_256 : 0; 30762306a36Sopenharmony_ci 30862306a36Sopenharmony_ci /* Check if the function code is available */ 30962306a36Sopenharmony_ci sctx->fc = (fc && cpacf_test_func(&kmc_functions, fc)) ? fc : 0; 31062306a36Sopenharmony_ci if (!sctx->fc) 31162306a36Sopenharmony_ci return setkey_fallback_skcipher(tfm, in_key, key_len); 31262306a36Sopenharmony_ci 31362306a36Sopenharmony_ci sctx->key_len = key_len; 31462306a36Sopenharmony_ci memcpy(sctx->key, in_key, key_len); 31562306a36Sopenharmony_ci return 0; 31662306a36Sopenharmony_ci} 31762306a36Sopenharmony_ci 31862306a36Sopenharmony_cistatic int cbc_aes_crypt(struct skcipher_request *req, unsigned long modifier) 31962306a36Sopenharmony_ci{ 32062306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 32162306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_skcipher_ctx(tfm); 32262306a36Sopenharmony_ci struct skcipher_walk walk; 32362306a36Sopenharmony_ci unsigned int nbytes, n; 32462306a36Sopenharmony_ci int ret; 32562306a36Sopenharmony_ci struct { 32662306a36Sopenharmony_ci u8 iv[AES_BLOCK_SIZE]; 32762306a36Sopenharmony_ci u8 key[AES_MAX_KEY_SIZE]; 32862306a36Sopenharmony_ci } param; 32962306a36Sopenharmony_ci 33062306a36Sopenharmony_ci if (unlikely(!sctx->fc)) 33162306a36Sopenharmony_ci return fallback_skcipher_crypt(sctx, req, modifier); 33262306a36Sopenharmony_ci 33362306a36Sopenharmony_ci ret = skcipher_walk_virt(&walk, req, false); 33462306a36Sopenharmony_ci if (ret) 33562306a36Sopenharmony_ci return ret; 33662306a36Sopenharmony_ci memcpy(param.iv, walk.iv, AES_BLOCK_SIZE); 33762306a36Sopenharmony_ci memcpy(param.key, sctx->key, sctx->key_len); 33862306a36Sopenharmony_ci while ((nbytes = walk.nbytes) != 0) { 33962306a36Sopenharmony_ci /* only use complete blocks */ 34062306a36Sopenharmony_ci n = nbytes & ~(AES_BLOCK_SIZE - 1); 34162306a36Sopenharmony_ci cpacf_kmc(sctx->fc | modifier, ¶m, 34262306a36Sopenharmony_ci walk.dst.virt.addr, walk.src.virt.addr, n); 34362306a36Sopenharmony_ci memcpy(walk.iv, param.iv, AES_BLOCK_SIZE); 34462306a36Sopenharmony_ci ret = skcipher_walk_done(&walk, nbytes - n); 34562306a36Sopenharmony_ci } 34662306a36Sopenharmony_ci memzero_explicit(¶m, sizeof(param)); 34762306a36Sopenharmony_ci return ret; 34862306a36Sopenharmony_ci} 34962306a36Sopenharmony_ci 35062306a36Sopenharmony_cistatic int cbc_aes_encrypt(struct skcipher_request *req) 35162306a36Sopenharmony_ci{ 35262306a36Sopenharmony_ci return cbc_aes_crypt(req, 0); 35362306a36Sopenharmony_ci} 35462306a36Sopenharmony_ci 35562306a36Sopenharmony_cistatic int cbc_aes_decrypt(struct skcipher_request *req) 35662306a36Sopenharmony_ci{ 35762306a36Sopenharmony_ci return cbc_aes_crypt(req, CPACF_DECRYPT); 35862306a36Sopenharmony_ci} 35962306a36Sopenharmony_ci 36062306a36Sopenharmony_cistatic struct skcipher_alg cbc_aes_alg = { 36162306a36Sopenharmony_ci .base.cra_name = "cbc(aes)", 36262306a36Sopenharmony_ci .base.cra_driver_name = "cbc-aes-s390", 36362306a36Sopenharmony_ci .base.cra_priority = 402, /* ecb-aes-s390 + 1 */ 36462306a36Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_NEED_FALLBACK, 36562306a36Sopenharmony_ci .base.cra_blocksize = AES_BLOCK_SIZE, 36662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct s390_aes_ctx), 36762306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 36862306a36Sopenharmony_ci .init = fallback_init_skcipher, 36962306a36Sopenharmony_ci .exit = fallback_exit_skcipher, 37062306a36Sopenharmony_ci .min_keysize = AES_MIN_KEY_SIZE, 37162306a36Sopenharmony_ci .max_keysize = AES_MAX_KEY_SIZE, 37262306a36Sopenharmony_ci .ivsize = AES_BLOCK_SIZE, 37362306a36Sopenharmony_ci .setkey = cbc_aes_set_key, 37462306a36Sopenharmony_ci .encrypt = cbc_aes_encrypt, 37562306a36Sopenharmony_ci .decrypt = cbc_aes_decrypt, 37662306a36Sopenharmony_ci}; 37762306a36Sopenharmony_ci 37862306a36Sopenharmony_cistatic int xts_fallback_setkey(struct crypto_skcipher *tfm, const u8 *key, 37962306a36Sopenharmony_ci unsigned int len) 38062306a36Sopenharmony_ci{ 38162306a36Sopenharmony_ci struct s390_xts_ctx *xts_ctx = crypto_skcipher_ctx(tfm); 38262306a36Sopenharmony_ci 38362306a36Sopenharmony_ci crypto_skcipher_clear_flags(xts_ctx->fallback, CRYPTO_TFM_REQ_MASK); 38462306a36Sopenharmony_ci crypto_skcipher_set_flags(xts_ctx->fallback, 38562306a36Sopenharmony_ci crypto_skcipher_get_flags(tfm) & 38662306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 38762306a36Sopenharmony_ci return crypto_skcipher_setkey(xts_ctx->fallback, key, len); 38862306a36Sopenharmony_ci} 38962306a36Sopenharmony_ci 39062306a36Sopenharmony_cistatic int xts_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, 39162306a36Sopenharmony_ci unsigned int key_len) 39262306a36Sopenharmony_ci{ 39362306a36Sopenharmony_ci struct s390_xts_ctx *xts_ctx = crypto_skcipher_ctx(tfm); 39462306a36Sopenharmony_ci unsigned long fc; 39562306a36Sopenharmony_ci int err; 39662306a36Sopenharmony_ci 39762306a36Sopenharmony_ci err = xts_fallback_setkey(tfm, in_key, key_len); 39862306a36Sopenharmony_ci if (err) 39962306a36Sopenharmony_ci return err; 40062306a36Sopenharmony_ci 40162306a36Sopenharmony_ci /* Pick the correct function code based on the key length */ 40262306a36Sopenharmony_ci fc = (key_len == 32) ? CPACF_KM_XTS_128 : 40362306a36Sopenharmony_ci (key_len == 64) ? CPACF_KM_XTS_256 : 0; 40462306a36Sopenharmony_ci 40562306a36Sopenharmony_ci /* Check if the function code is available */ 40662306a36Sopenharmony_ci xts_ctx->fc = (fc && cpacf_test_func(&km_functions, fc)) ? fc : 0; 40762306a36Sopenharmony_ci if (!xts_ctx->fc) 40862306a36Sopenharmony_ci return 0; 40962306a36Sopenharmony_ci 41062306a36Sopenharmony_ci /* Split the XTS key into the two subkeys */ 41162306a36Sopenharmony_ci key_len = key_len / 2; 41262306a36Sopenharmony_ci xts_ctx->key_len = key_len; 41362306a36Sopenharmony_ci memcpy(xts_ctx->key, in_key, key_len); 41462306a36Sopenharmony_ci memcpy(xts_ctx->pcc_key, in_key + key_len, key_len); 41562306a36Sopenharmony_ci return 0; 41662306a36Sopenharmony_ci} 41762306a36Sopenharmony_ci 41862306a36Sopenharmony_cistatic int xts_aes_crypt(struct skcipher_request *req, unsigned long modifier) 41962306a36Sopenharmony_ci{ 42062306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 42162306a36Sopenharmony_ci struct s390_xts_ctx *xts_ctx = crypto_skcipher_ctx(tfm); 42262306a36Sopenharmony_ci struct skcipher_walk walk; 42362306a36Sopenharmony_ci unsigned int offset, nbytes, n; 42462306a36Sopenharmony_ci int ret; 42562306a36Sopenharmony_ci struct { 42662306a36Sopenharmony_ci u8 key[32]; 42762306a36Sopenharmony_ci u8 tweak[16]; 42862306a36Sopenharmony_ci u8 block[16]; 42962306a36Sopenharmony_ci u8 bit[16]; 43062306a36Sopenharmony_ci u8 xts[16]; 43162306a36Sopenharmony_ci } pcc_param; 43262306a36Sopenharmony_ci struct { 43362306a36Sopenharmony_ci u8 key[32]; 43462306a36Sopenharmony_ci u8 init[16]; 43562306a36Sopenharmony_ci } xts_param; 43662306a36Sopenharmony_ci 43762306a36Sopenharmony_ci if (req->cryptlen < AES_BLOCK_SIZE) 43862306a36Sopenharmony_ci return -EINVAL; 43962306a36Sopenharmony_ci 44062306a36Sopenharmony_ci if (unlikely(!xts_ctx->fc || (req->cryptlen % AES_BLOCK_SIZE) != 0)) { 44162306a36Sopenharmony_ci struct skcipher_request *subreq = skcipher_request_ctx(req); 44262306a36Sopenharmony_ci 44362306a36Sopenharmony_ci *subreq = *req; 44462306a36Sopenharmony_ci skcipher_request_set_tfm(subreq, xts_ctx->fallback); 44562306a36Sopenharmony_ci return (modifier & CPACF_DECRYPT) ? 44662306a36Sopenharmony_ci crypto_skcipher_decrypt(subreq) : 44762306a36Sopenharmony_ci crypto_skcipher_encrypt(subreq); 44862306a36Sopenharmony_ci } 44962306a36Sopenharmony_ci 45062306a36Sopenharmony_ci ret = skcipher_walk_virt(&walk, req, false); 45162306a36Sopenharmony_ci if (ret) 45262306a36Sopenharmony_ci return ret; 45362306a36Sopenharmony_ci offset = xts_ctx->key_len & 0x10; 45462306a36Sopenharmony_ci memset(pcc_param.block, 0, sizeof(pcc_param.block)); 45562306a36Sopenharmony_ci memset(pcc_param.bit, 0, sizeof(pcc_param.bit)); 45662306a36Sopenharmony_ci memset(pcc_param.xts, 0, sizeof(pcc_param.xts)); 45762306a36Sopenharmony_ci memcpy(pcc_param.tweak, walk.iv, sizeof(pcc_param.tweak)); 45862306a36Sopenharmony_ci memcpy(pcc_param.key + offset, xts_ctx->pcc_key, xts_ctx->key_len); 45962306a36Sopenharmony_ci cpacf_pcc(xts_ctx->fc, pcc_param.key + offset); 46062306a36Sopenharmony_ci 46162306a36Sopenharmony_ci memcpy(xts_param.key + offset, xts_ctx->key, xts_ctx->key_len); 46262306a36Sopenharmony_ci memcpy(xts_param.init, pcc_param.xts, 16); 46362306a36Sopenharmony_ci 46462306a36Sopenharmony_ci while ((nbytes = walk.nbytes) != 0) { 46562306a36Sopenharmony_ci /* only use complete blocks */ 46662306a36Sopenharmony_ci n = nbytes & ~(AES_BLOCK_SIZE - 1); 46762306a36Sopenharmony_ci cpacf_km(xts_ctx->fc | modifier, xts_param.key + offset, 46862306a36Sopenharmony_ci walk.dst.virt.addr, walk.src.virt.addr, n); 46962306a36Sopenharmony_ci ret = skcipher_walk_done(&walk, nbytes - n); 47062306a36Sopenharmony_ci } 47162306a36Sopenharmony_ci memzero_explicit(&pcc_param, sizeof(pcc_param)); 47262306a36Sopenharmony_ci memzero_explicit(&xts_param, sizeof(xts_param)); 47362306a36Sopenharmony_ci return ret; 47462306a36Sopenharmony_ci} 47562306a36Sopenharmony_ci 47662306a36Sopenharmony_cistatic int xts_aes_encrypt(struct skcipher_request *req) 47762306a36Sopenharmony_ci{ 47862306a36Sopenharmony_ci return xts_aes_crypt(req, 0); 47962306a36Sopenharmony_ci} 48062306a36Sopenharmony_ci 48162306a36Sopenharmony_cistatic int xts_aes_decrypt(struct skcipher_request *req) 48262306a36Sopenharmony_ci{ 48362306a36Sopenharmony_ci return xts_aes_crypt(req, CPACF_DECRYPT); 48462306a36Sopenharmony_ci} 48562306a36Sopenharmony_ci 48662306a36Sopenharmony_cistatic int xts_fallback_init(struct crypto_skcipher *tfm) 48762306a36Sopenharmony_ci{ 48862306a36Sopenharmony_ci const char *name = crypto_tfm_alg_name(&tfm->base); 48962306a36Sopenharmony_ci struct s390_xts_ctx *xts_ctx = crypto_skcipher_ctx(tfm); 49062306a36Sopenharmony_ci 49162306a36Sopenharmony_ci xts_ctx->fallback = crypto_alloc_skcipher(name, 0, 49262306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK | CRYPTO_ALG_ASYNC); 49362306a36Sopenharmony_ci 49462306a36Sopenharmony_ci if (IS_ERR(xts_ctx->fallback)) { 49562306a36Sopenharmony_ci pr_err("Allocating XTS fallback algorithm %s failed\n", 49662306a36Sopenharmony_ci name); 49762306a36Sopenharmony_ci return PTR_ERR(xts_ctx->fallback); 49862306a36Sopenharmony_ci } 49962306a36Sopenharmony_ci crypto_skcipher_set_reqsize(tfm, sizeof(struct skcipher_request) + 50062306a36Sopenharmony_ci crypto_skcipher_reqsize(xts_ctx->fallback)); 50162306a36Sopenharmony_ci return 0; 50262306a36Sopenharmony_ci} 50362306a36Sopenharmony_ci 50462306a36Sopenharmony_cistatic void xts_fallback_exit(struct crypto_skcipher *tfm) 50562306a36Sopenharmony_ci{ 50662306a36Sopenharmony_ci struct s390_xts_ctx *xts_ctx = crypto_skcipher_ctx(tfm); 50762306a36Sopenharmony_ci 50862306a36Sopenharmony_ci crypto_free_skcipher(xts_ctx->fallback); 50962306a36Sopenharmony_ci} 51062306a36Sopenharmony_ci 51162306a36Sopenharmony_cistatic struct skcipher_alg xts_aes_alg = { 51262306a36Sopenharmony_ci .base.cra_name = "xts(aes)", 51362306a36Sopenharmony_ci .base.cra_driver_name = "xts-aes-s390", 51462306a36Sopenharmony_ci .base.cra_priority = 402, /* ecb-aes-s390 + 1 */ 51562306a36Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_NEED_FALLBACK, 51662306a36Sopenharmony_ci .base.cra_blocksize = AES_BLOCK_SIZE, 51762306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct s390_xts_ctx), 51862306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 51962306a36Sopenharmony_ci .init = xts_fallback_init, 52062306a36Sopenharmony_ci .exit = xts_fallback_exit, 52162306a36Sopenharmony_ci .min_keysize = 2 * AES_MIN_KEY_SIZE, 52262306a36Sopenharmony_ci .max_keysize = 2 * AES_MAX_KEY_SIZE, 52362306a36Sopenharmony_ci .ivsize = AES_BLOCK_SIZE, 52462306a36Sopenharmony_ci .setkey = xts_aes_set_key, 52562306a36Sopenharmony_ci .encrypt = xts_aes_encrypt, 52662306a36Sopenharmony_ci .decrypt = xts_aes_decrypt, 52762306a36Sopenharmony_ci}; 52862306a36Sopenharmony_ci 52962306a36Sopenharmony_cistatic int ctr_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, 53062306a36Sopenharmony_ci unsigned int key_len) 53162306a36Sopenharmony_ci{ 53262306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_skcipher_ctx(tfm); 53362306a36Sopenharmony_ci unsigned long fc; 53462306a36Sopenharmony_ci 53562306a36Sopenharmony_ci /* Pick the correct function code based on the key length */ 53662306a36Sopenharmony_ci fc = (key_len == 16) ? CPACF_KMCTR_AES_128 : 53762306a36Sopenharmony_ci (key_len == 24) ? CPACF_KMCTR_AES_192 : 53862306a36Sopenharmony_ci (key_len == 32) ? CPACF_KMCTR_AES_256 : 0; 53962306a36Sopenharmony_ci 54062306a36Sopenharmony_ci /* Check if the function code is available */ 54162306a36Sopenharmony_ci sctx->fc = (fc && cpacf_test_func(&kmctr_functions, fc)) ? fc : 0; 54262306a36Sopenharmony_ci if (!sctx->fc) 54362306a36Sopenharmony_ci return setkey_fallback_skcipher(tfm, in_key, key_len); 54462306a36Sopenharmony_ci 54562306a36Sopenharmony_ci sctx->key_len = key_len; 54662306a36Sopenharmony_ci memcpy(sctx->key, in_key, key_len); 54762306a36Sopenharmony_ci return 0; 54862306a36Sopenharmony_ci} 54962306a36Sopenharmony_ci 55062306a36Sopenharmony_cistatic unsigned int __ctrblk_init(u8 *ctrptr, u8 *iv, unsigned int nbytes) 55162306a36Sopenharmony_ci{ 55262306a36Sopenharmony_ci unsigned int i, n; 55362306a36Sopenharmony_ci 55462306a36Sopenharmony_ci /* only use complete blocks, max. PAGE_SIZE */ 55562306a36Sopenharmony_ci memcpy(ctrptr, iv, AES_BLOCK_SIZE); 55662306a36Sopenharmony_ci n = (nbytes > PAGE_SIZE) ? PAGE_SIZE : nbytes & ~(AES_BLOCK_SIZE - 1); 55762306a36Sopenharmony_ci for (i = (n / AES_BLOCK_SIZE) - 1; i > 0; i--) { 55862306a36Sopenharmony_ci memcpy(ctrptr + AES_BLOCK_SIZE, ctrptr, AES_BLOCK_SIZE); 55962306a36Sopenharmony_ci crypto_inc(ctrptr + AES_BLOCK_SIZE, AES_BLOCK_SIZE); 56062306a36Sopenharmony_ci ctrptr += AES_BLOCK_SIZE; 56162306a36Sopenharmony_ci } 56262306a36Sopenharmony_ci return n; 56362306a36Sopenharmony_ci} 56462306a36Sopenharmony_ci 56562306a36Sopenharmony_cistatic int ctr_aes_crypt(struct skcipher_request *req) 56662306a36Sopenharmony_ci{ 56762306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 56862306a36Sopenharmony_ci struct s390_aes_ctx *sctx = crypto_skcipher_ctx(tfm); 56962306a36Sopenharmony_ci u8 buf[AES_BLOCK_SIZE], *ctrptr; 57062306a36Sopenharmony_ci struct skcipher_walk walk; 57162306a36Sopenharmony_ci unsigned int n, nbytes; 57262306a36Sopenharmony_ci int ret, locked; 57362306a36Sopenharmony_ci 57462306a36Sopenharmony_ci if (unlikely(!sctx->fc)) 57562306a36Sopenharmony_ci return fallback_skcipher_crypt(sctx, req, 0); 57662306a36Sopenharmony_ci 57762306a36Sopenharmony_ci locked = mutex_trylock(&ctrblk_lock); 57862306a36Sopenharmony_ci 57962306a36Sopenharmony_ci ret = skcipher_walk_virt(&walk, req, false); 58062306a36Sopenharmony_ci while ((nbytes = walk.nbytes) >= AES_BLOCK_SIZE) { 58162306a36Sopenharmony_ci n = AES_BLOCK_SIZE; 58262306a36Sopenharmony_ci 58362306a36Sopenharmony_ci if (nbytes >= 2*AES_BLOCK_SIZE && locked) 58462306a36Sopenharmony_ci n = __ctrblk_init(ctrblk, walk.iv, nbytes); 58562306a36Sopenharmony_ci ctrptr = (n > AES_BLOCK_SIZE) ? ctrblk : walk.iv; 58662306a36Sopenharmony_ci cpacf_kmctr(sctx->fc, sctx->key, walk.dst.virt.addr, 58762306a36Sopenharmony_ci walk.src.virt.addr, n, ctrptr); 58862306a36Sopenharmony_ci if (ctrptr == ctrblk) 58962306a36Sopenharmony_ci memcpy(walk.iv, ctrptr + n - AES_BLOCK_SIZE, 59062306a36Sopenharmony_ci AES_BLOCK_SIZE); 59162306a36Sopenharmony_ci crypto_inc(walk.iv, AES_BLOCK_SIZE); 59262306a36Sopenharmony_ci ret = skcipher_walk_done(&walk, nbytes - n); 59362306a36Sopenharmony_ci } 59462306a36Sopenharmony_ci if (locked) 59562306a36Sopenharmony_ci mutex_unlock(&ctrblk_lock); 59662306a36Sopenharmony_ci /* 59762306a36Sopenharmony_ci * final block may be < AES_BLOCK_SIZE, copy only nbytes 59862306a36Sopenharmony_ci */ 59962306a36Sopenharmony_ci if (nbytes) { 60062306a36Sopenharmony_ci memset(buf, 0, AES_BLOCK_SIZE); 60162306a36Sopenharmony_ci memcpy(buf, walk.src.virt.addr, nbytes); 60262306a36Sopenharmony_ci cpacf_kmctr(sctx->fc, sctx->key, buf, buf, 60362306a36Sopenharmony_ci AES_BLOCK_SIZE, walk.iv); 60462306a36Sopenharmony_ci memcpy(walk.dst.virt.addr, buf, nbytes); 60562306a36Sopenharmony_ci crypto_inc(walk.iv, AES_BLOCK_SIZE); 60662306a36Sopenharmony_ci ret = skcipher_walk_done(&walk, 0); 60762306a36Sopenharmony_ci } 60862306a36Sopenharmony_ci 60962306a36Sopenharmony_ci return ret; 61062306a36Sopenharmony_ci} 61162306a36Sopenharmony_ci 61262306a36Sopenharmony_cistatic struct skcipher_alg ctr_aes_alg = { 61362306a36Sopenharmony_ci .base.cra_name = "ctr(aes)", 61462306a36Sopenharmony_ci .base.cra_driver_name = "ctr-aes-s390", 61562306a36Sopenharmony_ci .base.cra_priority = 402, /* ecb-aes-s390 + 1 */ 61662306a36Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_NEED_FALLBACK, 61762306a36Sopenharmony_ci .base.cra_blocksize = 1, 61862306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct s390_aes_ctx), 61962306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 62062306a36Sopenharmony_ci .init = fallback_init_skcipher, 62162306a36Sopenharmony_ci .exit = fallback_exit_skcipher, 62262306a36Sopenharmony_ci .min_keysize = AES_MIN_KEY_SIZE, 62362306a36Sopenharmony_ci .max_keysize = AES_MAX_KEY_SIZE, 62462306a36Sopenharmony_ci .ivsize = AES_BLOCK_SIZE, 62562306a36Sopenharmony_ci .setkey = ctr_aes_set_key, 62662306a36Sopenharmony_ci .encrypt = ctr_aes_crypt, 62762306a36Sopenharmony_ci .decrypt = ctr_aes_crypt, 62862306a36Sopenharmony_ci .chunksize = AES_BLOCK_SIZE, 62962306a36Sopenharmony_ci}; 63062306a36Sopenharmony_ci 63162306a36Sopenharmony_cistatic int gcm_aes_setkey(struct crypto_aead *tfm, const u8 *key, 63262306a36Sopenharmony_ci unsigned int keylen) 63362306a36Sopenharmony_ci{ 63462306a36Sopenharmony_ci struct s390_aes_ctx *ctx = crypto_aead_ctx(tfm); 63562306a36Sopenharmony_ci 63662306a36Sopenharmony_ci switch (keylen) { 63762306a36Sopenharmony_ci case AES_KEYSIZE_128: 63862306a36Sopenharmony_ci ctx->fc = CPACF_KMA_GCM_AES_128; 63962306a36Sopenharmony_ci break; 64062306a36Sopenharmony_ci case AES_KEYSIZE_192: 64162306a36Sopenharmony_ci ctx->fc = CPACF_KMA_GCM_AES_192; 64262306a36Sopenharmony_ci break; 64362306a36Sopenharmony_ci case AES_KEYSIZE_256: 64462306a36Sopenharmony_ci ctx->fc = CPACF_KMA_GCM_AES_256; 64562306a36Sopenharmony_ci break; 64662306a36Sopenharmony_ci default: 64762306a36Sopenharmony_ci return -EINVAL; 64862306a36Sopenharmony_ci } 64962306a36Sopenharmony_ci 65062306a36Sopenharmony_ci memcpy(ctx->key, key, keylen); 65162306a36Sopenharmony_ci ctx->key_len = keylen; 65262306a36Sopenharmony_ci return 0; 65362306a36Sopenharmony_ci} 65462306a36Sopenharmony_ci 65562306a36Sopenharmony_cistatic int gcm_aes_setauthsize(struct crypto_aead *tfm, unsigned int authsize) 65662306a36Sopenharmony_ci{ 65762306a36Sopenharmony_ci switch (authsize) { 65862306a36Sopenharmony_ci case 4: 65962306a36Sopenharmony_ci case 8: 66062306a36Sopenharmony_ci case 12: 66162306a36Sopenharmony_ci case 13: 66262306a36Sopenharmony_ci case 14: 66362306a36Sopenharmony_ci case 15: 66462306a36Sopenharmony_ci case 16: 66562306a36Sopenharmony_ci break; 66662306a36Sopenharmony_ci default: 66762306a36Sopenharmony_ci return -EINVAL; 66862306a36Sopenharmony_ci } 66962306a36Sopenharmony_ci 67062306a36Sopenharmony_ci return 0; 67162306a36Sopenharmony_ci} 67262306a36Sopenharmony_ci 67362306a36Sopenharmony_cistatic void gcm_walk_start(struct gcm_sg_walk *gw, struct scatterlist *sg, 67462306a36Sopenharmony_ci unsigned int len) 67562306a36Sopenharmony_ci{ 67662306a36Sopenharmony_ci memset(gw, 0, sizeof(*gw)); 67762306a36Sopenharmony_ci gw->walk_bytes_remain = len; 67862306a36Sopenharmony_ci scatterwalk_start(&gw->walk, sg); 67962306a36Sopenharmony_ci} 68062306a36Sopenharmony_ci 68162306a36Sopenharmony_cistatic inline unsigned int _gcm_sg_clamp_and_map(struct gcm_sg_walk *gw) 68262306a36Sopenharmony_ci{ 68362306a36Sopenharmony_ci struct scatterlist *nextsg; 68462306a36Sopenharmony_ci 68562306a36Sopenharmony_ci gw->walk_bytes = scatterwalk_clamp(&gw->walk, gw->walk_bytes_remain); 68662306a36Sopenharmony_ci while (!gw->walk_bytes) { 68762306a36Sopenharmony_ci nextsg = sg_next(gw->walk.sg); 68862306a36Sopenharmony_ci if (!nextsg) 68962306a36Sopenharmony_ci return 0; 69062306a36Sopenharmony_ci scatterwalk_start(&gw->walk, nextsg); 69162306a36Sopenharmony_ci gw->walk_bytes = scatterwalk_clamp(&gw->walk, 69262306a36Sopenharmony_ci gw->walk_bytes_remain); 69362306a36Sopenharmony_ci } 69462306a36Sopenharmony_ci gw->walk_ptr = scatterwalk_map(&gw->walk); 69562306a36Sopenharmony_ci return gw->walk_bytes; 69662306a36Sopenharmony_ci} 69762306a36Sopenharmony_ci 69862306a36Sopenharmony_cistatic inline void _gcm_sg_unmap_and_advance(struct gcm_sg_walk *gw, 69962306a36Sopenharmony_ci unsigned int nbytes) 70062306a36Sopenharmony_ci{ 70162306a36Sopenharmony_ci gw->walk_bytes_remain -= nbytes; 70262306a36Sopenharmony_ci scatterwalk_unmap(gw->walk_ptr); 70362306a36Sopenharmony_ci scatterwalk_advance(&gw->walk, nbytes); 70462306a36Sopenharmony_ci scatterwalk_done(&gw->walk, 0, gw->walk_bytes_remain); 70562306a36Sopenharmony_ci gw->walk_ptr = NULL; 70662306a36Sopenharmony_ci} 70762306a36Sopenharmony_ci 70862306a36Sopenharmony_cistatic int gcm_in_walk_go(struct gcm_sg_walk *gw, unsigned int minbytesneeded) 70962306a36Sopenharmony_ci{ 71062306a36Sopenharmony_ci int n; 71162306a36Sopenharmony_ci 71262306a36Sopenharmony_ci if (gw->buf_bytes && gw->buf_bytes >= minbytesneeded) { 71362306a36Sopenharmony_ci gw->ptr = gw->buf; 71462306a36Sopenharmony_ci gw->nbytes = gw->buf_bytes; 71562306a36Sopenharmony_ci goto out; 71662306a36Sopenharmony_ci } 71762306a36Sopenharmony_ci 71862306a36Sopenharmony_ci if (gw->walk_bytes_remain == 0) { 71962306a36Sopenharmony_ci gw->ptr = NULL; 72062306a36Sopenharmony_ci gw->nbytes = 0; 72162306a36Sopenharmony_ci goto out; 72262306a36Sopenharmony_ci } 72362306a36Sopenharmony_ci 72462306a36Sopenharmony_ci if (!_gcm_sg_clamp_and_map(gw)) { 72562306a36Sopenharmony_ci gw->ptr = NULL; 72662306a36Sopenharmony_ci gw->nbytes = 0; 72762306a36Sopenharmony_ci goto out; 72862306a36Sopenharmony_ci } 72962306a36Sopenharmony_ci 73062306a36Sopenharmony_ci if (!gw->buf_bytes && gw->walk_bytes >= minbytesneeded) { 73162306a36Sopenharmony_ci gw->ptr = gw->walk_ptr; 73262306a36Sopenharmony_ci gw->nbytes = gw->walk_bytes; 73362306a36Sopenharmony_ci goto out; 73462306a36Sopenharmony_ci } 73562306a36Sopenharmony_ci 73662306a36Sopenharmony_ci while (1) { 73762306a36Sopenharmony_ci n = min(gw->walk_bytes, AES_BLOCK_SIZE - gw->buf_bytes); 73862306a36Sopenharmony_ci memcpy(gw->buf + gw->buf_bytes, gw->walk_ptr, n); 73962306a36Sopenharmony_ci gw->buf_bytes += n; 74062306a36Sopenharmony_ci _gcm_sg_unmap_and_advance(gw, n); 74162306a36Sopenharmony_ci if (gw->buf_bytes >= minbytesneeded) { 74262306a36Sopenharmony_ci gw->ptr = gw->buf; 74362306a36Sopenharmony_ci gw->nbytes = gw->buf_bytes; 74462306a36Sopenharmony_ci goto out; 74562306a36Sopenharmony_ci } 74662306a36Sopenharmony_ci if (!_gcm_sg_clamp_and_map(gw)) { 74762306a36Sopenharmony_ci gw->ptr = NULL; 74862306a36Sopenharmony_ci gw->nbytes = 0; 74962306a36Sopenharmony_ci goto out; 75062306a36Sopenharmony_ci } 75162306a36Sopenharmony_ci } 75262306a36Sopenharmony_ci 75362306a36Sopenharmony_ciout: 75462306a36Sopenharmony_ci return gw->nbytes; 75562306a36Sopenharmony_ci} 75662306a36Sopenharmony_ci 75762306a36Sopenharmony_cistatic int gcm_out_walk_go(struct gcm_sg_walk *gw, unsigned int minbytesneeded) 75862306a36Sopenharmony_ci{ 75962306a36Sopenharmony_ci if (gw->walk_bytes_remain == 0) { 76062306a36Sopenharmony_ci gw->ptr = NULL; 76162306a36Sopenharmony_ci gw->nbytes = 0; 76262306a36Sopenharmony_ci goto out; 76362306a36Sopenharmony_ci } 76462306a36Sopenharmony_ci 76562306a36Sopenharmony_ci if (!_gcm_sg_clamp_and_map(gw)) { 76662306a36Sopenharmony_ci gw->ptr = NULL; 76762306a36Sopenharmony_ci gw->nbytes = 0; 76862306a36Sopenharmony_ci goto out; 76962306a36Sopenharmony_ci } 77062306a36Sopenharmony_ci 77162306a36Sopenharmony_ci if (gw->walk_bytes >= minbytesneeded) { 77262306a36Sopenharmony_ci gw->ptr = gw->walk_ptr; 77362306a36Sopenharmony_ci gw->nbytes = gw->walk_bytes; 77462306a36Sopenharmony_ci goto out; 77562306a36Sopenharmony_ci } 77662306a36Sopenharmony_ci 77762306a36Sopenharmony_ci scatterwalk_unmap(gw->walk_ptr); 77862306a36Sopenharmony_ci gw->walk_ptr = NULL; 77962306a36Sopenharmony_ci 78062306a36Sopenharmony_ci gw->ptr = gw->buf; 78162306a36Sopenharmony_ci gw->nbytes = sizeof(gw->buf); 78262306a36Sopenharmony_ci 78362306a36Sopenharmony_ciout: 78462306a36Sopenharmony_ci return gw->nbytes; 78562306a36Sopenharmony_ci} 78662306a36Sopenharmony_ci 78762306a36Sopenharmony_cistatic int gcm_in_walk_done(struct gcm_sg_walk *gw, unsigned int bytesdone) 78862306a36Sopenharmony_ci{ 78962306a36Sopenharmony_ci if (gw->ptr == NULL) 79062306a36Sopenharmony_ci return 0; 79162306a36Sopenharmony_ci 79262306a36Sopenharmony_ci if (gw->ptr == gw->buf) { 79362306a36Sopenharmony_ci int n = gw->buf_bytes - bytesdone; 79462306a36Sopenharmony_ci if (n > 0) { 79562306a36Sopenharmony_ci memmove(gw->buf, gw->buf + bytesdone, n); 79662306a36Sopenharmony_ci gw->buf_bytes = n; 79762306a36Sopenharmony_ci } else 79862306a36Sopenharmony_ci gw->buf_bytes = 0; 79962306a36Sopenharmony_ci } else 80062306a36Sopenharmony_ci _gcm_sg_unmap_and_advance(gw, bytesdone); 80162306a36Sopenharmony_ci 80262306a36Sopenharmony_ci return bytesdone; 80362306a36Sopenharmony_ci} 80462306a36Sopenharmony_ci 80562306a36Sopenharmony_cistatic int gcm_out_walk_done(struct gcm_sg_walk *gw, unsigned int bytesdone) 80662306a36Sopenharmony_ci{ 80762306a36Sopenharmony_ci int i, n; 80862306a36Sopenharmony_ci 80962306a36Sopenharmony_ci if (gw->ptr == NULL) 81062306a36Sopenharmony_ci return 0; 81162306a36Sopenharmony_ci 81262306a36Sopenharmony_ci if (gw->ptr == gw->buf) { 81362306a36Sopenharmony_ci for (i = 0; i < bytesdone; i += n) { 81462306a36Sopenharmony_ci if (!_gcm_sg_clamp_and_map(gw)) 81562306a36Sopenharmony_ci return i; 81662306a36Sopenharmony_ci n = min(gw->walk_bytes, bytesdone - i); 81762306a36Sopenharmony_ci memcpy(gw->walk_ptr, gw->buf + i, n); 81862306a36Sopenharmony_ci _gcm_sg_unmap_and_advance(gw, n); 81962306a36Sopenharmony_ci } 82062306a36Sopenharmony_ci } else 82162306a36Sopenharmony_ci _gcm_sg_unmap_and_advance(gw, bytesdone); 82262306a36Sopenharmony_ci 82362306a36Sopenharmony_ci return bytesdone; 82462306a36Sopenharmony_ci} 82562306a36Sopenharmony_ci 82662306a36Sopenharmony_cistatic int gcm_aes_crypt(struct aead_request *req, unsigned int flags) 82762306a36Sopenharmony_ci{ 82862306a36Sopenharmony_ci struct crypto_aead *tfm = crypto_aead_reqtfm(req); 82962306a36Sopenharmony_ci struct s390_aes_ctx *ctx = crypto_aead_ctx(tfm); 83062306a36Sopenharmony_ci unsigned int ivsize = crypto_aead_ivsize(tfm); 83162306a36Sopenharmony_ci unsigned int taglen = crypto_aead_authsize(tfm); 83262306a36Sopenharmony_ci unsigned int aadlen = req->assoclen; 83362306a36Sopenharmony_ci unsigned int pclen = req->cryptlen; 83462306a36Sopenharmony_ci int ret = 0; 83562306a36Sopenharmony_ci 83662306a36Sopenharmony_ci unsigned int n, len, in_bytes, out_bytes, 83762306a36Sopenharmony_ci min_bytes, bytes, aad_bytes, pc_bytes; 83862306a36Sopenharmony_ci struct gcm_sg_walk gw_in, gw_out; 83962306a36Sopenharmony_ci u8 tag[GHASH_DIGEST_SIZE]; 84062306a36Sopenharmony_ci 84162306a36Sopenharmony_ci struct { 84262306a36Sopenharmony_ci u32 _[3]; /* reserved */ 84362306a36Sopenharmony_ci u32 cv; /* Counter Value */ 84462306a36Sopenharmony_ci u8 t[GHASH_DIGEST_SIZE];/* Tag */ 84562306a36Sopenharmony_ci u8 h[AES_BLOCK_SIZE]; /* Hash-subkey */ 84662306a36Sopenharmony_ci u64 taadl; /* Total AAD Length */ 84762306a36Sopenharmony_ci u64 tpcl; /* Total Plain-/Cipher-text Length */ 84862306a36Sopenharmony_ci u8 j0[GHASH_BLOCK_SIZE];/* initial counter value */ 84962306a36Sopenharmony_ci u8 k[AES_MAX_KEY_SIZE]; /* Key */ 85062306a36Sopenharmony_ci } param; 85162306a36Sopenharmony_ci 85262306a36Sopenharmony_ci /* 85362306a36Sopenharmony_ci * encrypt 85462306a36Sopenharmony_ci * req->src: aad||plaintext 85562306a36Sopenharmony_ci * req->dst: aad||ciphertext||tag 85662306a36Sopenharmony_ci * decrypt 85762306a36Sopenharmony_ci * req->src: aad||ciphertext||tag 85862306a36Sopenharmony_ci * req->dst: aad||plaintext, return 0 or -EBADMSG 85962306a36Sopenharmony_ci * aad, plaintext and ciphertext may be empty. 86062306a36Sopenharmony_ci */ 86162306a36Sopenharmony_ci if (flags & CPACF_DECRYPT) 86262306a36Sopenharmony_ci pclen -= taglen; 86362306a36Sopenharmony_ci len = aadlen + pclen; 86462306a36Sopenharmony_ci 86562306a36Sopenharmony_ci memset(¶m, 0, sizeof(param)); 86662306a36Sopenharmony_ci param.cv = 1; 86762306a36Sopenharmony_ci param.taadl = aadlen * 8; 86862306a36Sopenharmony_ci param.tpcl = pclen * 8; 86962306a36Sopenharmony_ci memcpy(param.j0, req->iv, ivsize); 87062306a36Sopenharmony_ci *(u32 *)(param.j0 + ivsize) = 1; 87162306a36Sopenharmony_ci memcpy(param.k, ctx->key, ctx->key_len); 87262306a36Sopenharmony_ci 87362306a36Sopenharmony_ci gcm_walk_start(&gw_in, req->src, len); 87462306a36Sopenharmony_ci gcm_walk_start(&gw_out, req->dst, len); 87562306a36Sopenharmony_ci 87662306a36Sopenharmony_ci do { 87762306a36Sopenharmony_ci min_bytes = min_t(unsigned int, 87862306a36Sopenharmony_ci aadlen > 0 ? aadlen : pclen, AES_BLOCK_SIZE); 87962306a36Sopenharmony_ci in_bytes = gcm_in_walk_go(&gw_in, min_bytes); 88062306a36Sopenharmony_ci out_bytes = gcm_out_walk_go(&gw_out, min_bytes); 88162306a36Sopenharmony_ci bytes = min(in_bytes, out_bytes); 88262306a36Sopenharmony_ci 88362306a36Sopenharmony_ci if (aadlen + pclen <= bytes) { 88462306a36Sopenharmony_ci aad_bytes = aadlen; 88562306a36Sopenharmony_ci pc_bytes = pclen; 88662306a36Sopenharmony_ci flags |= CPACF_KMA_LAAD | CPACF_KMA_LPC; 88762306a36Sopenharmony_ci } else { 88862306a36Sopenharmony_ci if (aadlen <= bytes) { 88962306a36Sopenharmony_ci aad_bytes = aadlen; 89062306a36Sopenharmony_ci pc_bytes = (bytes - aadlen) & 89162306a36Sopenharmony_ci ~(AES_BLOCK_SIZE - 1); 89262306a36Sopenharmony_ci flags |= CPACF_KMA_LAAD; 89362306a36Sopenharmony_ci } else { 89462306a36Sopenharmony_ci aad_bytes = bytes & ~(AES_BLOCK_SIZE - 1); 89562306a36Sopenharmony_ci pc_bytes = 0; 89662306a36Sopenharmony_ci } 89762306a36Sopenharmony_ci } 89862306a36Sopenharmony_ci 89962306a36Sopenharmony_ci if (aad_bytes > 0) 90062306a36Sopenharmony_ci memcpy(gw_out.ptr, gw_in.ptr, aad_bytes); 90162306a36Sopenharmony_ci 90262306a36Sopenharmony_ci cpacf_kma(ctx->fc | flags, ¶m, 90362306a36Sopenharmony_ci gw_out.ptr + aad_bytes, 90462306a36Sopenharmony_ci gw_in.ptr + aad_bytes, pc_bytes, 90562306a36Sopenharmony_ci gw_in.ptr, aad_bytes); 90662306a36Sopenharmony_ci 90762306a36Sopenharmony_ci n = aad_bytes + pc_bytes; 90862306a36Sopenharmony_ci if (gcm_in_walk_done(&gw_in, n) != n) 90962306a36Sopenharmony_ci return -ENOMEM; 91062306a36Sopenharmony_ci if (gcm_out_walk_done(&gw_out, n) != n) 91162306a36Sopenharmony_ci return -ENOMEM; 91262306a36Sopenharmony_ci aadlen -= aad_bytes; 91362306a36Sopenharmony_ci pclen -= pc_bytes; 91462306a36Sopenharmony_ci } while (aadlen + pclen > 0); 91562306a36Sopenharmony_ci 91662306a36Sopenharmony_ci if (flags & CPACF_DECRYPT) { 91762306a36Sopenharmony_ci scatterwalk_map_and_copy(tag, req->src, len, taglen, 0); 91862306a36Sopenharmony_ci if (crypto_memneq(tag, param.t, taglen)) 91962306a36Sopenharmony_ci ret = -EBADMSG; 92062306a36Sopenharmony_ci } else 92162306a36Sopenharmony_ci scatterwalk_map_and_copy(param.t, req->dst, len, taglen, 1); 92262306a36Sopenharmony_ci 92362306a36Sopenharmony_ci memzero_explicit(¶m, sizeof(param)); 92462306a36Sopenharmony_ci return ret; 92562306a36Sopenharmony_ci} 92662306a36Sopenharmony_ci 92762306a36Sopenharmony_cistatic int gcm_aes_encrypt(struct aead_request *req) 92862306a36Sopenharmony_ci{ 92962306a36Sopenharmony_ci return gcm_aes_crypt(req, CPACF_ENCRYPT); 93062306a36Sopenharmony_ci} 93162306a36Sopenharmony_ci 93262306a36Sopenharmony_cistatic int gcm_aes_decrypt(struct aead_request *req) 93362306a36Sopenharmony_ci{ 93462306a36Sopenharmony_ci return gcm_aes_crypt(req, CPACF_DECRYPT); 93562306a36Sopenharmony_ci} 93662306a36Sopenharmony_ci 93762306a36Sopenharmony_cistatic struct aead_alg gcm_aes_aead = { 93862306a36Sopenharmony_ci .setkey = gcm_aes_setkey, 93962306a36Sopenharmony_ci .setauthsize = gcm_aes_setauthsize, 94062306a36Sopenharmony_ci .encrypt = gcm_aes_encrypt, 94162306a36Sopenharmony_ci .decrypt = gcm_aes_decrypt, 94262306a36Sopenharmony_ci 94362306a36Sopenharmony_ci .ivsize = GHASH_BLOCK_SIZE - sizeof(u32), 94462306a36Sopenharmony_ci .maxauthsize = GHASH_DIGEST_SIZE, 94562306a36Sopenharmony_ci .chunksize = AES_BLOCK_SIZE, 94662306a36Sopenharmony_ci 94762306a36Sopenharmony_ci .base = { 94862306a36Sopenharmony_ci .cra_blocksize = 1, 94962306a36Sopenharmony_ci .cra_ctxsize = sizeof(struct s390_aes_ctx), 95062306a36Sopenharmony_ci .cra_priority = 900, 95162306a36Sopenharmony_ci .cra_name = "gcm(aes)", 95262306a36Sopenharmony_ci .cra_driver_name = "gcm-aes-s390", 95362306a36Sopenharmony_ci .cra_module = THIS_MODULE, 95462306a36Sopenharmony_ci }, 95562306a36Sopenharmony_ci}; 95662306a36Sopenharmony_ci 95762306a36Sopenharmony_cistatic struct crypto_alg *aes_s390_alg; 95862306a36Sopenharmony_cistatic struct skcipher_alg *aes_s390_skcipher_algs[4]; 95962306a36Sopenharmony_cistatic int aes_s390_skciphers_num; 96062306a36Sopenharmony_cistatic struct aead_alg *aes_s390_aead_alg; 96162306a36Sopenharmony_ci 96262306a36Sopenharmony_cistatic int aes_s390_register_skcipher(struct skcipher_alg *alg) 96362306a36Sopenharmony_ci{ 96462306a36Sopenharmony_ci int ret; 96562306a36Sopenharmony_ci 96662306a36Sopenharmony_ci ret = crypto_register_skcipher(alg); 96762306a36Sopenharmony_ci if (!ret) 96862306a36Sopenharmony_ci aes_s390_skcipher_algs[aes_s390_skciphers_num++] = alg; 96962306a36Sopenharmony_ci return ret; 97062306a36Sopenharmony_ci} 97162306a36Sopenharmony_ci 97262306a36Sopenharmony_cistatic void aes_s390_fini(void) 97362306a36Sopenharmony_ci{ 97462306a36Sopenharmony_ci if (aes_s390_alg) 97562306a36Sopenharmony_ci crypto_unregister_alg(aes_s390_alg); 97662306a36Sopenharmony_ci while (aes_s390_skciphers_num--) 97762306a36Sopenharmony_ci crypto_unregister_skcipher(aes_s390_skcipher_algs[aes_s390_skciphers_num]); 97862306a36Sopenharmony_ci if (ctrblk) 97962306a36Sopenharmony_ci free_page((unsigned long) ctrblk); 98062306a36Sopenharmony_ci 98162306a36Sopenharmony_ci if (aes_s390_aead_alg) 98262306a36Sopenharmony_ci crypto_unregister_aead(aes_s390_aead_alg); 98362306a36Sopenharmony_ci} 98462306a36Sopenharmony_ci 98562306a36Sopenharmony_cistatic int __init aes_s390_init(void) 98662306a36Sopenharmony_ci{ 98762306a36Sopenharmony_ci int ret; 98862306a36Sopenharmony_ci 98962306a36Sopenharmony_ci /* Query available functions for KM, KMC, KMCTR and KMA */ 99062306a36Sopenharmony_ci cpacf_query(CPACF_KM, &km_functions); 99162306a36Sopenharmony_ci cpacf_query(CPACF_KMC, &kmc_functions); 99262306a36Sopenharmony_ci cpacf_query(CPACF_KMCTR, &kmctr_functions); 99362306a36Sopenharmony_ci cpacf_query(CPACF_KMA, &kma_functions); 99462306a36Sopenharmony_ci 99562306a36Sopenharmony_ci if (cpacf_test_func(&km_functions, CPACF_KM_AES_128) || 99662306a36Sopenharmony_ci cpacf_test_func(&km_functions, CPACF_KM_AES_192) || 99762306a36Sopenharmony_ci cpacf_test_func(&km_functions, CPACF_KM_AES_256)) { 99862306a36Sopenharmony_ci ret = crypto_register_alg(&aes_alg); 99962306a36Sopenharmony_ci if (ret) 100062306a36Sopenharmony_ci goto out_err; 100162306a36Sopenharmony_ci aes_s390_alg = &aes_alg; 100262306a36Sopenharmony_ci ret = aes_s390_register_skcipher(&ecb_aes_alg); 100362306a36Sopenharmony_ci if (ret) 100462306a36Sopenharmony_ci goto out_err; 100562306a36Sopenharmony_ci } 100662306a36Sopenharmony_ci 100762306a36Sopenharmony_ci if (cpacf_test_func(&kmc_functions, CPACF_KMC_AES_128) || 100862306a36Sopenharmony_ci cpacf_test_func(&kmc_functions, CPACF_KMC_AES_192) || 100962306a36Sopenharmony_ci cpacf_test_func(&kmc_functions, CPACF_KMC_AES_256)) { 101062306a36Sopenharmony_ci ret = aes_s390_register_skcipher(&cbc_aes_alg); 101162306a36Sopenharmony_ci if (ret) 101262306a36Sopenharmony_ci goto out_err; 101362306a36Sopenharmony_ci } 101462306a36Sopenharmony_ci 101562306a36Sopenharmony_ci if (cpacf_test_func(&km_functions, CPACF_KM_XTS_128) || 101662306a36Sopenharmony_ci cpacf_test_func(&km_functions, CPACF_KM_XTS_256)) { 101762306a36Sopenharmony_ci ret = aes_s390_register_skcipher(&xts_aes_alg); 101862306a36Sopenharmony_ci if (ret) 101962306a36Sopenharmony_ci goto out_err; 102062306a36Sopenharmony_ci } 102162306a36Sopenharmony_ci 102262306a36Sopenharmony_ci if (cpacf_test_func(&kmctr_functions, CPACF_KMCTR_AES_128) || 102362306a36Sopenharmony_ci cpacf_test_func(&kmctr_functions, CPACF_KMCTR_AES_192) || 102462306a36Sopenharmony_ci cpacf_test_func(&kmctr_functions, CPACF_KMCTR_AES_256)) { 102562306a36Sopenharmony_ci ctrblk = (u8 *) __get_free_page(GFP_KERNEL); 102662306a36Sopenharmony_ci if (!ctrblk) { 102762306a36Sopenharmony_ci ret = -ENOMEM; 102862306a36Sopenharmony_ci goto out_err; 102962306a36Sopenharmony_ci } 103062306a36Sopenharmony_ci ret = aes_s390_register_skcipher(&ctr_aes_alg); 103162306a36Sopenharmony_ci if (ret) 103262306a36Sopenharmony_ci goto out_err; 103362306a36Sopenharmony_ci } 103462306a36Sopenharmony_ci 103562306a36Sopenharmony_ci if (cpacf_test_func(&kma_functions, CPACF_KMA_GCM_AES_128) || 103662306a36Sopenharmony_ci cpacf_test_func(&kma_functions, CPACF_KMA_GCM_AES_192) || 103762306a36Sopenharmony_ci cpacf_test_func(&kma_functions, CPACF_KMA_GCM_AES_256)) { 103862306a36Sopenharmony_ci ret = crypto_register_aead(&gcm_aes_aead); 103962306a36Sopenharmony_ci if (ret) 104062306a36Sopenharmony_ci goto out_err; 104162306a36Sopenharmony_ci aes_s390_aead_alg = &gcm_aes_aead; 104262306a36Sopenharmony_ci } 104362306a36Sopenharmony_ci 104462306a36Sopenharmony_ci return 0; 104562306a36Sopenharmony_ciout_err: 104662306a36Sopenharmony_ci aes_s390_fini(); 104762306a36Sopenharmony_ci return ret; 104862306a36Sopenharmony_ci} 104962306a36Sopenharmony_ci 105062306a36Sopenharmony_cimodule_cpu_feature_match(S390_CPU_FEATURE_MSA, aes_s390_init); 105162306a36Sopenharmony_cimodule_exit(aes_s390_fini); 105262306a36Sopenharmony_ci 105362306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("aes-all"); 105462306a36Sopenharmony_ci 105562306a36Sopenharmony_ciMODULE_DESCRIPTION("Rijndael (AES) Cipher Algorithm"); 105662306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 105762306a36Sopenharmony_ciMODULE_IMPORT_NS(CRYPTO_INTERNAL); 1058