162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Shared crypto simd helpers 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (c) 2012 Jussi Kivilinna <jussi.kivilinna@mbnet.fi> 662306a36Sopenharmony_ci * Copyright (c) 2016 Herbert Xu <herbert@gondor.apana.org.au> 762306a36Sopenharmony_ci * Copyright (c) 2019 Google LLC 862306a36Sopenharmony_ci * 962306a36Sopenharmony_ci * Based on aesni-intel_glue.c by: 1062306a36Sopenharmony_ci * Copyright (C) 2008, Intel Corp. 1162306a36Sopenharmony_ci * Author: Huang Ying <ying.huang@intel.com> 1262306a36Sopenharmony_ci */ 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ci/* 1562306a36Sopenharmony_ci * Shared crypto SIMD helpers. These functions dynamically create and register 1662306a36Sopenharmony_ci * an skcipher or AEAD algorithm that wraps another, internal algorithm. The 1762306a36Sopenharmony_ci * wrapper ensures that the internal algorithm is only executed in a context 1862306a36Sopenharmony_ci * where SIMD instructions are usable, i.e. where may_use_simd() returns true. 1962306a36Sopenharmony_ci * If SIMD is already usable, the wrapper directly calls the internal algorithm. 2062306a36Sopenharmony_ci * Otherwise it defers execution to a workqueue via cryptd. 2162306a36Sopenharmony_ci * 2262306a36Sopenharmony_ci * This is an alternative to the internal algorithm implementing a fallback for 2362306a36Sopenharmony_ci * the !may_use_simd() case itself. 2462306a36Sopenharmony_ci * 2562306a36Sopenharmony_ci * Note that the wrapper algorithm is asynchronous, i.e. it has the 2662306a36Sopenharmony_ci * CRYPTO_ALG_ASYNC flag set. Therefore it won't be found by users who 2762306a36Sopenharmony_ci * explicitly allocate a synchronous algorithm. 2862306a36Sopenharmony_ci */ 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_ci#include <crypto/cryptd.h> 3162306a36Sopenharmony_ci#include <crypto/internal/aead.h> 3262306a36Sopenharmony_ci#include <crypto/internal/simd.h> 3362306a36Sopenharmony_ci#include <crypto/internal/skcipher.h> 3462306a36Sopenharmony_ci#include <linux/kernel.h> 3562306a36Sopenharmony_ci#include <linux/module.h> 3662306a36Sopenharmony_ci#include <linux/preempt.h> 3762306a36Sopenharmony_ci#include <asm/simd.h> 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_ci/* skcipher support */ 4062306a36Sopenharmony_ci 4162306a36Sopenharmony_cistruct simd_skcipher_alg { 4262306a36Sopenharmony_ci const char *ialg_name; 4362306a36Sopenharmony_ci struct skcipher_alg alg; 4462306a36Sopenharmony_ci}; 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_cistruct simd_skcipher_ctx { 4762306a36Sopenharmony_ci struct cryptd_skcipher *cryptd_tfm; 4862306a36Sopenharmony_ci}; 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_cistatic int simd_skcipher_setkey(struct crypto_skcipher *tfm, const u8 *key, 5162306a36Sopenharmony_ci unsigned int key_len) 5262306a36Sopenharmony_ci{ 5362306a36Sopenharmony_ci struct simd_skcipher_ctx *ctx = crypto_skcipher_ctx(tfm); 5462306a36Sopenharmony_ci struct crypto_skcipher *child = &ctx->cryptd_tfm->base; 5562306a36Sopenharmony_ci 5662306a36Sopenharmony_ci crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); 5762306a36Sopenharmony_ci crypto_skcipher_set_flags(child, crypto_skcipher_get_flags(tfm) & 5862306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 5962306a36Sopenharmony_ci return crypto_skcipher_setkey(child, key, key_len); 6062306a36Sopenharmony_ci} 6162306a36Sopenharmony_ci 6262306a36Sopenharmony_cistatic int simd_skcipher_encrypt(struct skcipher_request *req) 6362306a36Sopenharmony_ci{ 6462306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 6562306a36Sopenharmony_ci struct simd_skcipher_ctx *ctx = crypto_skcipher_ctx(tfm); 6662306a36Sopenharmony_ci struct skcipher_request *subreq; 6762306a36Sopenharmony_ci struct crypto_skcipher *child; 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci subreq = skcipher_request_ctx(req); 7062306a36Sopenharmony_ci *subreq = *req; 7162306a36Sopenharmony_ci 7262306a36Sopenharmony_ci if (!crypto_simd_usable() || 7362306a36Sopenharmony_ci (in_atomic() && cryptd_skcipher_queued(ctx->cryptd_tfm))) 7462306a36Sopenharmony_ci child = &ctx->cryptd_tfm->base; 7562306a36Sopenharmony_ci else 7662306a36Sopenharmony_ci child = cryptd_skcipher_child(ctx->cryptd_tfm); 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci skcipher_request_set_tfm(subreq, child); 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci return crypto_skcipher_encrypt(subreq); 8162306a36Sopenharmony_ci} 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_cistatic int simd_skcipher_decrypt(struct skcipher_request *req) 8462306a36Sopenharmony_ci{ 8562306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 8662306a36Sopenharmony_ci struct simd_skcipher_ctx *ctx = crypto_skcipher_ctx(tfm); 8762306a36Sopenharmony_ci struct skcipher_request *subreq; 8862306a36Sopenharmony_ci struct crypto_skcipher *child; 8962306a36Sopenharmony_ci 9062306a36Sopenharmony_ci subreq = skcipher_request_ctx(req); 9162306a36Sopenharmony_ci *subreq = *req; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci if (!crypto_simd_usable() || 9462306a36Sopenharmony_ci (in_atomic() && cryptd_skcipher_queued(ctx->cryptd_tfm))) 9562306a36Sopenharmony_ci child = &ctx->cryptd_tfm->base; 9662306a36Sopenharmony_ci else 9762306a36Sopenharmony_ci child = cryptd_skcipher_child(ctx->cryptd_tfm); 9862306a36Sopenharmony_ci 9962306a36Sopenharmony_ci skcipher_request_set_tfm(subreq, child); 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci return crypto_skcipher_decrypt(subreq); 10262306a36Sopenharmony_ci} 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_cistatic void simd_skcipher_exit(struct crypto_skcipher *tfm) 10562306a36Sopenharmony_ci{ 10662306a36Sopenharmony_ci struct simd_skcipher_ctx *ctx = crypto_skcipher_ctx(tfm); 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_ci cryptd_free_skcipher(ctx->cryptd_tfm); 10962306a36Sopenharmony_ci} 11062306a36Sopenharmony_ci 11162306a36Sopenharmony_cistatic int simd_skcipher_init(struct crypto_skcipher *tfm) 11262306a36Sopenharmony_ci{ 11362306a36Sopenharmony_ci struct simd_skcipher_ctx *ctx = crypto_skcipher_ctx(tfm); 11462306a36Sopenharmony_ci struct cryptd_skcipher *cryptd_tfm; 11562306a36Sopenharmony_ci struct simd_skcipher_alg *salg; 11662306a36Sopenharmony_ci struct skcipher_alg *alg; 11762306a36Sopenharmony_ci unsigned reqsize; 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci alg = crypto_skcipher_alg(tfm); 12062306a36Sopenharmony_ci salg = container_of(alg, struct simd_skcipher_alg, alg); 12162306a36Sopenharmony_ci 12262306a36Sopenharmony_ci cryptd_tfm = cryptd_alloc_skcipher(salg->ialg_name, 12362306a36Sopenharmony_ci CRYPTO_ALG_INTERNAL, 12462306a36Sopenharmony_ci CRYPTO_ALG_INTERNAL); 12562306a36Sopenharmony_ci if (IS_ERR(cryptd_tfm)) 12662306a36Sopenharmony_ci return PTR_ERR(cryptd_tfm); 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci ctx->cryptd_tfm = cryptd_tfm; 12962306a36Sopenharmony_ci 13062306a36Sopenharmony_ci reqsize = crypto_skcipher_reqsize(cryptd_skcipher_child(cryptd_tfm)); 13162306a36Sopenharmony_ci reqsize = max(reqsize, crypto_skcipher_reqsize(&cryptd_tfm->base)); 13262306a36Sopenharmony_ci reqsize += sizeof(struct skcipher_request); 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci crypto_skcipher_set_reqsize(tfm, reqsize); 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci return 0; 13762306a36Sopenharmony_ci} 13862306a36Sopenharmony_ci 13962306a36Sopenharmony_cistruct simd_skcipher_alg *simd_skcipher_create_compat(const char *algname, 14062306a36Sopenharmony_ci const char *drvname, 14162306a36Sopenharmony_ci const char *basename) 14262306a36Sopenharmony_ci{ 14362306a36Sopenharmony_ci struct simd_skcipher_alg *salg; 14462306a36Sopenharmony_ci struct crypto_skcipher *tfm; 14562306a36Sopenharmony_ci struct skcipher_alg *ialg; 14662306a36Sopenharmony_ci struct skcipher_alg *alg; 14762306a36Sopenharmony_ci int err; 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_ci tfm = crypto_alloc_skcipher(basename, CRYPTO_ALG_INTERNAL, 15062306a36Sopenharmony_ci CRYPTO_ALG_INTERNAL | CRYPTO_ALG_ASYNC); 15162306a36Sopenharmony_ci if (IS_ERR(tfm)) 15262306a36Sopenharmony_ci return ERR_CAST(tfm); 15362306a36Sopenharmony_ci 15462306a36Sopenharmony_ci ialg = crypto_skcipher_alg(tfm); 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_ci salg = kzalloc(sizeof(*salg), GFP_KERNEL); 15762306a36Sopenharmony_ci if (!salg) { 15862306a36Sopenharmony_ci salg = ERR_PTR(-ENOMEM); 15962306a36Sopenharmony_ci goto out_put_tfm; 16062306a36Sopenharmony_ci } 16162306a36Sopenharmony_ci 16262306a36Sopenharmony_ci salg->ialg_name = basename; 16362306a36Sopenharmony_ci alg = &salg->alg; 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci err = -ENAMETOOLONG; 16662306a36Sopenharmony_ci if (snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", algname) >= 16762306a36Sopenharmony_ci CRYPTO_MAX_ALG_NAME) 16862306a36Sopenharmony_ci goto out_free_salg; 16962306a36Sopenharmony_ci 17062306a36Sopenharmony_ci if (snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", 17162306a36Sopenharmony_ci drvname) >= CRYPTO_MAX_ALG_NAME) 17262306a36Sopenharmony_ci goto out_free_salg; 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci alg->base.cra_flags = CRYPTO_ALG_ASYNC | 17562306a36Sopenharmony_ci (ialg->base.cra_flags & CRYPTO_ALG_INHERITED_FLAGS); 17662306a36Sopenharmony_ci alg->base.cra_priority = ialg->base.cra_priority; 17762306a36Sopenharmony_ci alg->base.cra_blocksize = ialg->base.cra_blocksize; 17862306a36Sopenharmony_ci alg->base.cra_alignmask = ialg->base.cra_alignmask; 17962306a36Sopenharmony_ci alg->base.cra_module = ialg->base.cra_module; 18062306a36Sopenharmony_ci alg->base.cra_ctxsize = sizeof(struct simd_skcipher_ctx); 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci alg->ivsize = ialg->ivsize; 18362306a36Sopenharmony_ci alg->chunksize = ialg->chunksize; 18462306a36Sopenharmony_ci alg->min_keysize = ialg->min_keysize; 18562306a36Sopenharmony_ci alg->max_keysize = ialg->max_keysize; 18662306a36Sopenharmony_ci 18762306a36Sopenharmony_ci alg->init = simd_skcipher_init; 18862306a36Sopenharmony_ci alg->exit = simd_skcipher_exit; 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_ci alg->setkey = simd_skcipher_setkey; 19162306a36Sopenharmony_ci alg->encrypt = simd_skcipher_encrypt; 19262306a36Sopenharmony_ci alg->decrypt = simd_skcipher_decrypt; 19362306a36Sopenharmony_ci 19462306a36Sopenharmony_ci err = crypto_register_skcipher(alg); 19562306a36Sopenharmony_ci if (err) 19662306a36Sopenharmony_ci goto out_free_salg; 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ciout_put_tfm: 19962306a36Sopenharmony_ci crypto_free_skcipher(tfm); 20062306a36Sopenharmony_ci return salg; 20162306a36Sopenharmony_ci 20262306a36Sopenharmony_ciout_free_salg: 20362306a36Sopenharmony_ci kfree(salg); 20462306a36Sopenharmony_ci salg = ERR_PTR(err); 20562306a36Sopenharmony_ci goto out_put_tfm; 20662306a36Sopenharmony_ci} 20762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_skcipher_create_compat); 20862306a36Sopenharmony_ci 20962306a36Sopenharmony_cistruct simd_skcipher_alg *simd_skcipher_create(const char *algname, 21062306a36Sopenharmony_ci const char *basename) 21162306a36Sopenharmony_ci{ 21262306a36Sopenharmony_ci char drvname[CRYPTO_MAX_ALG_NAME]; 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_ci if (snprintf(drvname, CRYPTO_MAX_ALG_NAME, "simd-%s", basename) >= 21562306a36Sopenharmony_ci CRYPTO_MAX_ALG_NAME) 21662306a36Sopenharmony_ci return ERR_PTR(-ENAMETOOLONG); 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci return simd_skcipher_create_compat(algname, drvname, basename); 21962306a36Sopenharmony_ci} 22062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_skcipher_create); 22162306a36Sopenharmony_ci 22262306a36Sopenharmony_civoid simd_skcipher_free(struct simd_skcipher_alg *salg) 22362306a36Sopenharmony_ci{ 22462306a36Sopenharmony_ci crypto_unregister_skcipher(&salg->alg); 22562306a36Sopenharmony_ci kfree(salg); 22662306a36Sopenharmony_ci} 22762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_skcipher_free); 22862306a36Sopenharmony_ci 22962306a36Sopenharmony_ciint simd_register_skciphers_compat(struct skcipher_alg *algs, int count, 23062306a36Sopenharmony_ci struct simd_skcipher_alg **simd_algs) 23162306a36Sopenharmony_ci{ 23262306a36Sopenharmony_ci int err; 23362306a36Sopenharmony_ci int i; 23462306a36Sopenharmony_ci const char *algname; 23562306a36Sopenharmony_ci const char *drvname; 23662306a36Sopenharmony_ci const char *basename; 23762306a36Sopenharmony_ci struct simd_skcipher_alg *simd; 23862306a36Sopenharmony_ci 23962306a36Sopenharmony_ci err = crypto_register_skciphers(algs, count); 24062306a36Sopenharmony_ci if (err) 24162306a36Sopenharmony_ci return err; 24262306a36Sopenharmony_ci 24362306a36Sopenharmony_ci for (i = 0; i < count; i++) { 24462306a36Sopenharmony_ci WARN_ON(strncmp(algs[i].base.cra_name, "__", 2)); 24562306a36Sopenharmony_ci WARN_ON(strncmp(algs[i].base.cra_driver_name, "__", 2)); 24662306a36Sopenharmony_ci algname = algs[i].base.cra_name + 2; 24762306a36Sopenharmony_ci drvname = algs[i].base.cra_driver_name + 2; 24862306a36Sopenharmony_ci basename = algs[i].base.cra_driver_name; 24962306a36Sopenharmony_ci simd = simd_skcipher_create_compat(algname, drvname, basename); 25062306a36Sopenharmony_ci err = PTR_ERR(simd); 25162306a36Sopenharmony_ci if (IS_ERR(simd)) 25262306a36Sopenharmony_ci goto err_unregister; 25362306a36Sopenharmony_ci simd_algs[i] = simd; 25462306a36Sopenharmony_ci } 25562306a36Sopenharmony_ci return 0; 25662306a36Sopenharmony_ci 25762306a36Sopenharmony_cierr_unregister: 25862306a36Sopenharmony_ci simd_unregister_skciphers(algs, count, simd_algs); 25962306a36Sopenharmony_ci return err; 26062306a36Sopenharmony_ci} 26162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_register_skciphers_compat); 26262306a36Sopenharmony_ci 26362306a36Sopenharmony_civoid simd_unregister_skciphers(struct skcipher_alg *algs, int count, 26462306a36Sopenharmony_ci struct simd_skcipher_alg **simd_algs) 26562306a36Sopenharmony_ci{ 26662306a36Sopenharmony_ci int i; 26762306a36Sopenharmony_ci 26862306a36Sopenharmony_ci crypto_unregister_skciphers(algs, count); 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_ci for (i = 0; i < count; i++) { 27162306a36Sopenharmony_ci if (simd_algs[i]) { 27262306a36Sopenharmony_ci simd_skcipher_free(simd_algs[i]); 27362306a36Sopenharmony_ci simd_algs[i] = NULL; 27462306a36Sopenharmony_ci } 27562306a36Sopenharmony_ci } 27662306a36Sopenharmony_ci} 27762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_unregister_skciphers); 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_ci/* AEAD support */ 28062306a36Sopenharmony_ci 28162306a36Sopenharmony_cistruct simd_aead_alg { 28262306a36Sopenharmony_ci const char *ialg_name; 28362306a36Sopenharmony_ci struct aead_alg alg; 28462306a36Sopenharmony_ci}; 28562306a36Sopenharmony_ci 28662306a36Sopenharmony_cistruct simd_aead_ctx { 28762306a36Sopenharmony_ci struct cryptd_aead *cryptd_tfm; 28862306a36Sopenharmony_ci}; 28962306a36Sopenharmony_ci 29062306a36Sopenharmony_cistatic int simd_aead_setkey(struct crypto_aead *tfm, const u8 *key, 29162306a36Sopenharmony_ci unsigned int key_len) 29262306a36Sopenharmony_ci{ 29362306a36Sopenharmony_ci struct simd_aead_ctx *ctx = crypto_aead_ctx(tfm); 29462306a36Sopenharmony_ci struct crypto_aead *child = &ctx->cryptd_tfm->base; 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_ci crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK); 29762306a36Sopenharmony_ci crypto_aead_set_flags(child, crypto_aead_get_flags(tfm) & 29862306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 29962306a36Sopenharmony_ci return crypto_aead_setkey(child, key, key_len); 30062306a36Sopenharmony_ci} 30162306a36Sopenharmony_ci 30262306a36Sopenharmony_cistatic int simd_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize) 30362306a36Sopenharmony_ci{ 30462306a36Sopenharmony_ci struct simd_aead_ctx *ctx = crypto_aead_ctx(tfm); 30562306a36Sopenharmony_ci struct crypto_aead *child = &ctx->cryptd_tfm->base; 30662306a36Sopenharmony_ci 30762306a36Sopenharmony_ci return crypto_aead_setauthsize(child, authsize); 30862306a36Sopenharmony_ci} 30962306a36Sopenharmony_ci 31062306a36Sopenharmony_cistatic int simd_aead_encrypt(struct aead_request *req) 31162306a36Sopenharmony_ci{ 31262306a36Sopenharmony_ci struct crypto_aead *tfm = crypto_aead_reqtfm(req); 31362306a36Sopenharmony_ci struct simd_aead_ctx *ctx = crypto_aead_ctx(tfm); 31462306a36Sopenharmony_ci struct aead_request *subreq; 31562306a36Sopenharmony_ci struct crypto_aead *child; 31662306a36Sopenharmony_ci 31762306a36Sopenharmony_ci subreq = aead_request_ctx(req); 31862306a36Sopenharmony_ci *subreq = *req; 31962306a36Sopenharmony_ci 32062306a36Sopenharmony_ci if (!crypto_simd_usable() || 32162306a36Sopenharmony_ci (in_atomic() && cryptd_aead_queued(ctx->cryptd_tfm))) 32262306a36Sopenharmony_ci child = &ctx->cryptd_tfm->base; 32362306a36Sopenharmony_ci else 32462306a36Sopenharmony_ci child = cryptd_aead_child(ctx->cryptd_tfm); 32562306a36Sopenharmony_ci 32662306a36Sopenharmony_ci aead_request_set_tfm(subreq, child); 32762306a36Sopenharmony_ci 32862306a36Sopenharmony_ci return crypto_aead_encrypt(subreq); 32962306a36Sopenharmony_ci} 33062306a36Sopenharmony_ci 33162306a36Sopenharmony_cistatic int simd_aead_decrypt(struct aead_request *req) 33262306a36Sopenharmony_ci{ 33362306a36Sopenharmony_ci struct crypto_aead *tfm = crypto_aead_reqtfm(req); 33462306a36Sopenharmony_ci struct simd_aead_ctx *ctx = crypto_aead_ctx(tfm); 33562306a36Sopenharmony_ci struct aead_request *subreq; 33662306a36Sopenharmony_ci struct crypto_aead *child; 33762306a36Sopenharmony_ci 33862306a36Sopenharmony_ci subreq = aead_request_ctx(req); 33962306a36Sopenharmony_ci *subreq = *req; 34062306a36Sopenharmony_ci 34162306a36Sopenharmony_ci if (!crypto_simd_usable() || 34262306a36Sopenharmony_ci (in_atomic() && cryptd_aead_queued(ctx->cryptd_tfm))) 34362306a36Sopenharmony_ci child = &ctx->cryptd_tfm->base; 34462306a36Sopenharmony_ci else 34562306a36Sopenharmony_ci child = cryptd_aead_child(ctx->cryptd_tfm); 34662306a36Sopenharmony_ci 34762306a36Sopenharmony_ci aead_request_set_tfm(subreq, child); 34862306a36Sopenharmony_ci 34962306a36Sopenharmony_ci return crypto_aead_decrypt(subreq); 35062306a36Sopenharmony_ci} 35162306a36Sopenharmony_ci 35262306a36Sopenharmony_cistatic void simd_aead_exit(struct crypto_aead *tfm) 35362306a36Sopenharmony_ci{ 35462306a36Sopenharmony_ci struct simd_aead_ctx *ctx = crypto_aead_ctx(tfm); 35562306a36Sopenharmony_ci 35662306a36Sopenharmony_ci cryptd_free_aead(ctx->cryptd_tfm); 35762306a36Sopenharmony_ci} 35862306a36Sopenharmony_ci 35962306a36Sopenharmony_cistatic int simd_aead_init(struct crypto_aead *tfm) 36062306a36Sopenharmony_ci{ 36162306a36Sopenharmony_ci struct simd_aead_ctx *ctx = crypto_aead_ctx(tfm); 36262306a36Sopenharmony_ci struct cryptd_aead *cryptd_tfm; 36362306a36Sopenharmony_ci struct simd_aead_alg *salg; 36462306a36Sopenharmony_ci struct aead_alg *alg; 36562306a36Sopenharmony_ci unsigned reqsize; 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_ci alg = crypto_aead_alg(tfm); 36862306a36Sopenharmony_ci salg = container_of(alg, struct simd_aead_alg, alg); 36962306a36Sopenharmony_ci 37062306a36Sopenharmony_ci cryptd_tfm = cryptd_alloc_aead(salg->ialg_name, CRYPTO_ALG_INTERNAL, 37162306a36Sopenharmony_ci CRYPTO_ALG_INTERNAL); 37262306a36Sopenharmony_ci if (IS_ERR(cryptd_tfm)) 37362306a36Sopenharmony_ci return PTR_ERR(cryptd_tfm); 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci ctx->cryptd_tfm = cryptd_tfm; 37662306a36Sopenharmony_ci 37762306a36Sopenharmony_ci reqsize = crypto_aead_reqsize(cryptd_aead_child(cryptd_tfm)); 37862306a36Sopenharmony_ci reqsize = max(reqsize, crypto_aead_reqsize(&cryptd_tfm->base)); 37962306a36Sopenharmony_ci reqsize += sizeof(struct aead_request); 38062306a36Sopenharmony_ci 38162306a36Sopenharmony_ci crypto_aead_set_reqsize(tfm, reqsize); 38262306a36Sopenharmony_ci 38362306a36Sopenharmony_ci return 0; 38462306a36Sopenharmony_ci} 38562306a36Sopenharmony_ci 38662306a36Sopenharmony_cistruct simd_aead_alg *simd_aead_create_compat(const char *algname, 38762306a36Sopenharmony_ci const char *drvname, 38862306a36Sopenharmony_ci const char *basename) 38962306a36Sopenharmony_ci{ 39062306a36Sopenharmony_ci struct simd_aead_alg *salg; 39162306a36Sopenharmony_ci struct crypto_aead *tfm; 39262306a36Sopenharmony_ci struct aead_alg *ialg; 39362306a36Sopenharmony_ci struct aead_alg *alg; 39462306a36Sopenharmony_ci int err; 39562306a36Sopenharmony_ci 39662306a36Sopenharmony_ci tfm = crypto_alloc_aead(basename, CRYPTO_ALG_INTERNAL, 39762306a36Sopenharmony_ci CRYPTO_ALG_INTERNAL | CRYPTO_ALG_ASYNC); 39862306a36Sopenharmony_ci if (IS_ERR(tfm)) 39962306a36Sopenharmony_ci return ERR_CAST(tfm); 40062306a36Sopenharmony_ci 40162306a36Sopenharmony_ci ialg = crypto_aead_alg(tfm); 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_ci salg = kzalloc(sizeof(*salg), GFP_KERNEL); 40462306a36Sopenharmony_ci if (!salg) { 40562306a36Sopenharmony_ci salg = ERR_PTR(-ENOMEM); 40662306a36Sopenharmony_ci goto out_put_tfm; 40762306a36Sopenharmony_ci } 40862306a36Sopenharmony_ci 40962306a36Sopenharmony_ci salg->ialg_name = basename; 41062306a36Sopenharmony_ci alg = &salg->alg; 41162306a36Sopenharmony_ci 41262306a36Sopenharmony_ci err = -ENAMETOOLONG; 41362306a36Sopenharmony_ci if (snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", algname) >= 41462306a36Sopenharmony_ci CRYPTO_MAX_ALG_NAME) 41562306a36Sopenharmony_ci goto out_free_salg; 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci if (snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", 41862306a36Sopenharmony_ci drvname) >= CRYPTO_MAX_ALG_NAME) 41962306a36Sopenharmony_ci goto out_free_salg; 42062306a36Sopenharmony_ci 42162306a36Sopenharmony_ci alg->base.cra_flags = CRYPTO_ALG_ASYNC | 42262306a36Sopenharmony_ci (ialg->base.cra_flags & CRYPTO_ALG_INHERITED_FLAGS); 42362306a36Sopenharmony_ci alg->base.cra_priority = ialg->base.cra_priority; 42462306a36Sopenharmony_ci alg->base.cra_blocksize = ialg->base.cra_blocksize; 42562306a36Sopenharmony_ci alg->base.cra_alignmask = ialg->base.cra_alignmask; 42662306a36Sopenharmony_ci alg->base.cra_module = ialg->base.cra_module; 42762306a36Sopenharmony_ci alg->base.cra_ctxsize = sizeof(struct simd_aead_ctx); 42862306a36Sopenharmony_ci 42962306a36Sopenharmony_ci alg->ivsize = ialg->ivsize; 43062306a36Sopenharmony_ci alg->maxauthsize = ialg->maxauthsize; 43162306a36Sopenharmony_ci alg->chunksize = ialg->chunksize; 43262306a36Sopenharmony_ci 43362306a36Sopenharmony_ci alg->init = simd_aead_init; 43462306a36Sopenharmony_ci alg->exit = simd_aead_exit; 43562306a36Sopenharmony_ci 43662306a36Sopenharmony_ci alg->setkey = simd_aead_setkey; 43762306a36Sopenharmony_ci alg->setauthsize = simd_aead_setauthsize; 43862306a36Sopenharmony_ci alg->encrypt = simd_aead_encrypt; 43962306a36Sopenharmony_ci alg->decrypt = simd_aead_decrypt; 44062306a36Sopenharmony_ci 44162306a36Sopenharmony_ci err = crypto_register_aead(alg); 44262306a36Sopenharmony_ci if (err) 44362306a36Sopenharmony_ci goto out_free_salg; 44462306a36Sopenharmony_ci 44562306a36Sopenharmony_ciout_put_tfm: 44662306a36Sopenharmony_ci crypto_free_aead(tfm); 44762306a36Sopenharmony_ci return salg; 44862306a36Sopenharmony_ci 44962306a36Sopenharmony_ciout_free_salg: 45062306a36Sopenharmony_ci kfree(salg); 45162306a36Sopenharmony_ci salg = ERR_PTR(err); 45262306a36Sopenharmony_ci goto out_put_tfm; 45362306a36Sopenharmony_ci} 45462306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_aead_create_compat); 45562306a36Sopenharmony_ci 45662306a36Sopenharmony_cistruct simd_aead_alg *simd_aead_create(const char *algname, 45762306a36Sopenharmony_ci const char *basename) 45862306a36Sopenharmony_ci{ 45962306a36Sopenharmony_ci char drvname[CRYPTO_MAX_ALG_NAME]; 46062306a36Sopenharmony_ci 46162306a36Sopenharmony_ci if (snprintf(drvname, CRYPTO_MAX_ALG_NAME, "simd-%s", basename) >= 46262306a36Sopenharmony_ci CRYPTO_MAX_ALG_NAME) 46362306a36Sopenharmony_ci return ERR_PTR(-ENAMETOOLONG); 46462306a36Sopenharmony_ci 46562306a36Sopenharmony_ci return simd_aead_create_compat(algname, drvname, basename); 46662306a36Sopenharmony_ci} 46762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_aead_create); 46862306a36Sopenharmony_ci 46962306a36Sopenharmony_civoid simd_aead_free(struct simd_aead_alg *salg) 47062306a36Sopenharmony_ci{ 47162306a36Sopenharmony_ci crypto_unregister_aead(&salg->alg); 47262306a36Sopenharmony_ci kfree(salg); 47362306a36Sopenharmony_ci} 47462306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_aead_free); 47562306a36Sopenharmony_ci 47662306a36Sopenharmony_ciint simd_register_aeads_compat(struct aead_alg *algs, int count, 47762306a36Sopenharmony_ci struct simd_aead_alg **simd_algs) 47862306a36Sopenharmony_ci{ 47962306a36Sopenharmony_ci int err; 48062306a36Sopenharmony_ci int i; 48162306a36Sopenharmony_ci const char *algname; 48262306a36Sopenharmony_ci const char *drvname; 48362306a36Sopenharmony_ci const char *basename; 48462306a36Sopenharmony_ci struct simd_aead_alg *simd; 48562306a36Sopenharmony_ci 48662306a36Sopenharmony_ci err = crypto_register_aeads(algs, count); 48762306a36Sopenharmony_ci if (err) 48862306a36Sopenharmony_ci return err; 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_ci for (i = 0; i < count; i++) { 49162306a36Sopenharmony_ci WARN_ON(strncmp(algs[i].base.cra_name, "__", 2)); 49262306a36Sopenharmony_ci WARN_ON(strncmp(algs[i].base.cra_driver_name, "__", 2)); 49362306a36Sopenharmony_ci algname = algs[i].base.cra_name + 2; 49462306a36Sopenharmony_ci drvname = algs[i].base.cra_driver_name + 2; 49562306a36Sopenharmony_ci basename = algs[i].base.cra_driver_name; 49662306a36Sopenharmony_ci simd = simd_aead_create_compat(algname, drvname, basename); 49762306a36Sopenharmony_ci err = PTR_ERR(simd); 49862306a36Sopenharmony_ci if (IS_ERR(simd)) 49962306a36Sopenharmony_ci goto err_unregister; 50062306a36Sopenharmony_ci simd_algs[i] = simd; 50162306a36Sopenharmony_ci } 50262306a36Sopenharmony_ci return 0; 50362306a36Sopenharmony_ci 50462306a36Sopenharmony_cierr_unregister: 50562306a36Sopenharmony_ci simd_unregister_aeads(algs, count, simd_algs); 50662306a36Sopenharmony_ci return err; 50762306a36Sopenharmony_ci} 50862306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_register_aeads_compat); 50962306a36Sopenharmony_ci 51062306a36Sopenharmony_civoid simd_unregister_aeads(struct aead_alg *algs, int count, 51162306a36Sopenharmony_ci struct simd_aead_alg **simd_algs) 51262306a36Sopenharmony_ci{ 51362306a36Sopenharmony_ci int i; 51462306a36Sopenharmony_ci 51562306a36Sopenharmony_ci crypto_unregister_aeads(algs, count); 51662306a36Sopenharmony_ci 51762306a36Sopenharmony_ci for (i = 0; i < count; i++) { 51862306a36Sopenharmony_ci if (simd_algs[i]) { 51962306a36Sopenharmony_ci simd_aead_free(simd_algs[i]); 52062306a36Sopenharmony_ci simd_algs[i] = NULL; 52162306a36Sopenharmony_ci } 52262306a36Sopenharmony_ci } 52362306a36Sopenharmony_ci} 52462306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(simd_unregister_aeads); 52562306a36Sopenharmony_ci 52662306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 527