162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * AMD Cryptographic Coprocessor (CCP) AES crypto API support
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (C) 2013-2019 Advanced Micro Devices, Inc.
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Author: Tom Lendacky <thomas.lendacky@amd.com>
862306a36Sopenharmony_ci */
962306a36Sopenharmony_ci
1062306a36Sopenharmony_ci#include <linux/module.h>
1162306a36Sopenharmony_ci#include <linux/sched.h>
1262306a36Sopenharmony_ci#include <linux/delay.h>
1362306a36Sopenharmony_ci#include <linux/scatterlist.h>
1462306a36Sopenharmony_ci#include <linux/crypto.h>
1562306a36Sopenharmony_ci#include <crypto/algapi.h>
1662306a36Sopenharmony_ci#include <crypto/aes.h>
1762306a36Sopenharmony_ci#include <crypto/ctr.h>
1862306a36Sopenharmony_ci#include <crypto/scatterwalk.h>
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci#include "ccp-crypto.h"
2162306a36Sopenharmony_ci
2262306a36Sopenharmony_cistatic int ccp_aes_complete(struct crypto_async_request *async_req, int ret)
2362306a36Sopenharmony_ci{
2462306a36Sopenharmony_ci	struct skcipher_request *req = skcipher_request_cast(async_req);
2562306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(
2662306a36Sopenharmony_ci		crypto_skcipher_reqtfm(req));
2762306a36Sopenharmony_ci	struct ccp_aes_req_ctx *rctx = skcipher_request_ctx_dma(req);
2862306a36Sopenharmony_ci
2962306a36Sopenharmony_ci	if (ret)
3062306a36Sopenharmony_ci		return ret;
3162306a36Sopenharmony_ci
3262306a36Sopenharmony_ci	if (ctx->u.aes.mode != CCP_AES_MODE_ECB)
3362306a36Sopenharmony_ci		memcpy(req->iv, rctx->iv, AES_BLOCK_SIZE);
3462306a36Sopenharmony_ci
3562306a36Sopenharmony_ci	return 0;
3662306a36Sopenharmony_ci}
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_cistatic int ccp_aes_setkey(struct crypto_skcipher *tfm, const u8 *key,
3962306a36Sopenharmony_ci			  unsigned int key_len)
4062306a36Sopenharmony_ci{
4162306a36Sopenharmony_ci	struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm);
4262306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm);
4362306a36Sopenharmony_ci
4462306a36Sopenharmony_ci	switch (key_len) {
4562306a36Sopenharmony_ci	case AES_KEYSIZE_128:
4662306a36Sopenharmony_ci		ctx->u.aes.type = CCP_AES_TYPE_128;
4762306a36Sopenharmony_ci		break;
4862306a36Sopenharmony_ci	case AES_KEYSIZE_192:
4962306a36Sopenharmony_ci		ctx->u.aes.type = CCP_AES_TYPE_192;
5062306a36Sopenharmony_ci		break;
5162306a36Sopenharmony_ci	case AES_KEYSIZE_256:
5262306a36Sopenharmony_ci		ctx->u.aes.type = CCP_AES_TYPE_256;
5362306a36Sopenharmony_ci		break;
5462306a36Sopenharmony_ci	default:
5562306a36Sopenharmony_ci		return -EINVAL;
5662306a36Sopenharmony_ci	}
5762306a36Sopenharmony_ci	ctx->u.aes.mode = alg->mode;
5862306a36Sopenharmony_ci	ctx->u.aes.key_len = key_len;
5962306a36Sopenharmony_ci
6062306a36Sopenharmony_ci	memcpy(ctx->u.aes.key, key, key_len);
6162306a36Sopenharmony_ci	sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len);
6262306a36Sopenharmony_ci
6362306a36Sopenharmony_ci	return 0;
6462306a36Sopenharmony_ci}
6562306a36Sopenharmony_ci
6662306a36Sopenharmony_cistatic int ccp_aes_crypt(struct skcipher_request *req, bool encrypt)
6762306a36Sopenharmony_ci{
6862306a36Sopenharmony_ci	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
6962306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm);
7062306a36Sopenharmony_ci	struct ccp_aes_req_ctx *rctx = skcipher_request_ctx_dma(req);
7162306a36Sopenharmony_ci	struct scatterlist *iv_sg = NULL;
7262306a36Sopenharmony_ci	unsigned int iv_len = 0;
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_ci	if (!ctx->u.aes.key_len)
7562306a36Sopenharmony_ci		return -EINVAL;
7662306a36Sopenharmony_ci
7762306a36Sopenharmony_ci	if (((ctx->u.aes.mode == CCP_AES_MODE_ECB) ||
7862306a36Sopenharmony_ci	     (ctx->u.aes.mode == CCP_AES_MODE_CBC)) &&
7962306a36Sopenharmony_ci	    (req->cryptlen & (AES_BLOCK_SIZE - 1)))
8062306a36Sopenharmony_ci		return -EINVAL;
8162306a36Sopenharmony_ci
8262306a36Sopenharmony_ci	if (ctx->u.aes.mode != CCP_AES_MODE_ECB) {
8362306a36Sopenharmony_ci		if (!req->iv)
8462306a36Sopenharmony_ci			return -EINVAL;
8562306a36Sopenharmony_ci
8662306a36Sopenharmony_ci		memcpy(rctx->iv, req->iv, AES_BLOCK_SIZE);
8762306a36Sopenharmony_ci		iv_sg = &rctx->iv_sg;
8862306a36Sopenharmony_ci		iv_len = AES_BLOCK_SIZE;
8962306a36Sopenharmony_ci		sg_init_one(iv_sg, rctx->iv, iv_len);
9062306a36Sopenharmony_ci	}
9162306a36Sopenharmony_ci
9262306a36Sopenharmony_ci	memset(&rctx->cmd, 0, sizeof(rctx->cmd));
9362306a36Sopenharmony_ci	INIT_LIST_HEAD(&rctx->cmd.entry);
9462306a36Sopenharmony_ci	rctx->cmd.engine = CCP_ENGINE_AES;
9562306a36Sopenharmony_ci	rctx->cmd.u.aes.type = ctx->u.aes.type;
9662306a36Sopenharmony_ci	rctx->cmd.u.aes.mode = ctx->u.aes.mode;
9762306a36Sopenharmony_ci	rctx->cmd.u.aes.action =
9862306a36Sopenharmony_ci		(encrypt) ? CCP_AES_ACTION_ENCRYPT : CCP_AES_ACTION_DECRYPT;
9962306a36Sopenharmony_ci	rctx->cmd.u.aes.key = &ctx->u.aes.key_sg;
10062306a36Sopenharmony_ci	rctx->cmd.u.aes.key_len = ctx->u.aes.key_len;
10162306a36Sopenharmony_ci	rctx->cmd.u.aes.iv = iv_sg;
10262306a36Sopenharmony_ci	rctx->cmd.u.aes.iv_len = iv_len;
10362306a36Sopenharmony_ci	rctx->cmd.u.aes.src = req->src;
10462306a36Sopenharmony_ci	rctx->cmd.u.aes.src_len = req->cryptlen;
10562306a36Sopenharmony_ci	rctx->cmd.u.aes.dst = req->dst;
10662306a36Sopenharmony_ci
10762306a36Sopenharmony_ci	return ccp_crypto_enqueue_request(&req->base, &rctx->cmd);
10862306a36Sopenharmony_ci}
10962306a36Sopenharmony_ci
11062306a36Sopenharmony_cistatic int ccp_aes_encrypt(struct skcipher_request *req)
11162306a36Sopenharmony_ci{
11262306a36Sopenharmony_ci	return ccp_aes_crypt(req, true);
11362306a36Sopenharmony_ci}
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_cistatic int ccp_aes_decrypt(struct skcipher_request *req)
11662306a36Sopenharmony_ci{
11762306a36Sopenharmony_ci	return ccp_aes_crypt(req, false);
11862306a36Sopenharmony_ci}
11962306a36Sopenharmony_ci
12062306a36Sopenharmony_cistatic int ccp_aes_init_tfm(struct crypto_skcipher *tfm)
12162306a36Sopenharmony_ci{
12262306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm);
12362306a36Sopenharmony_ci
12462306a36Sopenharmony_ci	ctx->complete = ccp_aes_complete;
12562306a36Sopenharmony_ci	ctx->u.aes.key_len = 0;
12662306a36Sopenharmony_ci
12762306a36Sopenharmony_ci	crypto_skcipher_set_reqsize(tfm, sizeof(struct ccp_aes_req_ctx));
12862306a36Sopenharmony_ci
12962306a36Sopenharmony_ci	return 0;
13062306a36Sopenharmony_ci}
13162306a36Sopenharmony_ci
13262306a36Sopenharmony_cistatic int ccp_aes_rfc3686_complete(struct crypto_async_request *async_req,
13362306a36Sopenharmony_ci				    int ret)
13462306a36Sopenharmony_ci{
13562306a36Sopenharmony_ci	struct skcipher_request *req = skcipher_request_cast(async_req);
13662306a36Sopenharmony_ci	struct ccp_aes_req_ctx *rctx = skcipher_request_ctx_dma(req);
13762306a36Sopenharmony_ci
13862306a36Sopenharmony_ci	/* Restore the original pointer */
13962306a36Sopenharmony_ci	req->iv = rctx->rfc3686_info;
14062306a36Sopenharmony_ci
14162306a36Sopenharmony_ci	return ccp_aes_complete(async_req, ret);
14262306a36Sopenharmony_ci}
14362306a36Sopenharmony_ci
14462306a36Sopenharmony_cistatic int ccp_aes_rfc3686_setkey(struct crypto_skcipher *tfm, const u8 *key,
14562306a36Sopenharmony_ci				  unsigned int key_len)
14662306a36Sopenharmony_ci{
14762306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm);
14862306a36Sopenharmony_ci
14962306a36Sopenharmony_ci	if (key_len < CTR_RFC3686_NONCE_SIZE)
15062306a36Sopenharmony_ci		return -EINVAL;
15162306a36Sopenharmony_ci
15262306a36Sopenharmony_ci	key_len -= CTR_RFC3686_NONCE_SIZE;
15362306a36Sopenharmony_ci	memcpy(ctx->u.aes.nonce, key + key_len, CTR_RFC3686_NONCE_SIZE);
15462306a36Sopenharmony_ci
15562306a36Sopenharmony_ci	return ccp_aes_setkey(tfm, key, key_len);
15662306a36Sopenharmony_ci}
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_cistatic int ccp_aes_rfc3686_crypt(struct skcipher_request *req, bool encrypt)
15962306a36Sopenharmony_ci{
16062306a36Sopenharmony_ci	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
16162306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm);
16262306a36Sopenharmony_ci	struct ccp_aes_req_ctx *rctx = skcipher_request_ctx_dma(req);
16362306a36Sopenharmony_ci	u8 *iv;
16462306a36Sopenharmony_ci
16562306a36Sopenharmony_ci	/* Initialize the CTR block */
16662306a36Sopenharmony_ci	iv = rctx->rfc3686_iv;
16762306a36Sopenharmony_ci	memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE);
16862306a36Sopenharmony_ci
16962306a36Sopenharmony_ci	iv += CTR_RFC3686_NONCE_SIZE;
17062306a36Sopenharmony_ci	memcpy(iv, req->iv, CTR_RFC3686_IV_SIZE);
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_ci	iv += CTR_RFC3686_IV_SIZE;
17362306a36Sopenharmony_ci	*(__be32 *)iv = cpu_to_be32(1);
17462306a36Sopenharmony_ci
17562306a36Sopenharmony_ci	/* Point to the new IV */
17662306a36Sopenharmony_ci	rctx->rfc3686_info = req->iv;
17762306a36Sopenharmony_ci	req->iv = rctx->rfc3686_iv;
17862306a36Sopenharmony_ci
17962306a36Sopenharmony_ci	return ccp_aes_crypt(req, encrypt);
18062306a36Sopenharmony_ci}
18162306a36Sopenharmony_ci
18262306a36Sopenharmony_cistatic int ccp_aes_rfc3686_encrypt(struct skcipher_request *req)
18362306a36Sopenharmony_ci{
18462306a36Sopenharmony_ci	return ccp_aes_rfc3686_crypt(req, true);
18562306a36Sopenharmony_ci}
18662306a36Sopenharmony_ci
18762306a36Sopenharmony_cistatic int ccp_aes_rfc3686_decrypt(struct skcipher_request *req)
18862306a36Sopenharmony_ci{
18962306a36Sopenharmony_ci	return ccp_aes_rfc3686_crypt(req, false);
19062306a36Sopenharmony_ci}
19162306a36Sopenharmony_ci
19262306a36Sopenharmony_cistatic int ccp_aes_rfc3686_init_tfm(struct crypto_skcipher *tfm)
19362306a36Sopenharmony_ci{
19462306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm);
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci	ctx->complete = ccp_aes_rfc3686_complete;
19762306a36Sopenharmony_ci	ctx->u.aes.key_len = 0;
19862306a36Sopenharmony_ci
19962306a36Sopenharmony_ci	crypto_skcipher_set_reqsize_dma(tfm, sizeof(struct ccp_aes_req_ctx));
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_ci	return 0;
20262306a36Sopenharmony_ci}
20362306a36Sopenharmony_ci
20462306a36Sopenharmony_cistatic const struct skcipher_alg ccp_aes_defaults = {
20562306a36Sopenharmony_ci	.setkey			= ccp_aes_setkey,
20662306a36Sopenharmony_ci	.encrypt		= ccp_aes_encrypt,
20762306a36Sopenharmony_ci	.decrypt		= ccp_aes_decrypt,
20862306a36Sopenharmony_ci	.min_keysize		= AES_MIN_KEY_SIZE,
20962306a36Sopenharmony_ci	.max_keysize		= AES_MAX_KEY_SIZE,
21062306a36Sopenharmony_ci	.init			= ccp_aes_init_tfm,
21162306a36Sopenharmony_ci
21262306a36Sopenharmony_ci	.base.cra_flags		= CRYPTO_ALG_ASYNC |
21362306a36Sopenharmony_ci				  CRYPTO_ALG_ALLOCATES_MEMORY |
21462306a36Sopenharmony_ci				  CRYPTO_ALG_KERN_DRIVER_ONLY |
21562306a36Sopenharmony_ci				  CRYPTO_ALG_NEED_FALLBACK,
21662306a36Sopenharmony_ci	.base.cra_blocksize	= AES_BLOCK_SIZE,
21762306a36Sopenharmony_ci	.base.cra_ctxsize	= sizeof(struct ccp_ctx) + CRYPTO_DMA_PADDING,
21862306a36Sopenharmony_ci	.base.cra_priority	= CCP_CRA_PRIORITY,
21962306a36Sopenharmony_ci	.base.cra_module	= THIS_MODULE,
22062306a36Sopenharmony_ci};
22162306a36Sopenharmony_ci
22262306a36Sopenharmony_cistatic const struct skcipher_alg ccp_aes_rfc3686_defaults = {
22362306a36Sopenharmony_ci	.setkey			= ccp_aes_rfc3686_setkey,
22462306a36Sopenharmony_ci	.encrypt		= ccp_aes_rfc3686_encrypt,
22562306a36Sopenharmony_ci	.decrypt		= ccp_aes_rfc3686_decrypt,
22662306a36Sopenharmony_ci	.min_keysize		= AES_MIN_KEY_SIZE + CTR_RFC3686_NONCE_SIZE,
22762306a36Sopenharmony_ci	.max_keysize		= AES_MAX_KEY_SIZE + CTR_RFC3686_NONCE_SIZE,
22862306a36Sopenharmony_ci	.init			= ccp_aes_rfc3686_init_tfm,
22962306a36Sopenharmony_ci
23062306a36Sopenharmony_ci	.base.cra_flags		= CRYPTO_ALG_ASYNC |
23162306a36Sopenharmony_ci				  CRYPTO_ALG_ALLOCATES_MEMORY |
23262306a36Sopenharmony_ci				  CRYPTO_ALG_KERN_DRIVER_ONLY |
23362306a36Sopenharmony_ci				  CRYPTO_ALG_NEED_FALLBACK,
23462306a36Sopenharmony_ci	.base.cra_blocksize	= CTR_RFC3686_BLOCK_SIZE,
23562306a36Sopenharmony_ci	.base.cra_ctxsize	= sizeof(struct ccp_ctx) + CRYPTO_DMA_PADDING,
23662306a36Sopenharmony_ci	.base.cra_priority	= CCP_CRA_PRIORITY,
23762306a36Sopenharmony_ci	.base.cra_module	= THIS_MODULE,
23862306a36Sopenharmony_ci};
23962306a36Sopenharmony_ci
24062306a36Sopenharmony_cistruct ccp_aes_def {
24162306a36Sopenharmony_ci	enum ccp_aes_mode mode;
24262306a36Sopenharmony_ci	unsigned int version;
24362306a36Sopenharmony_ci	const char *name;
24462306a36Sopenharmony_ci	const char *driver_name;
24562306a36Sopenharmony_ci	unsigned int blocksize;
24662306a36Sopenharmony_ci	unsigned int ivsize;
24762306a36Sopenharmony_ci	const struct skcipher_alg *alg_defaults;
24862306a36Sopenharmony_ci};
24962306a36Sopenharmony_ci
25062306a36Sopenharmony_cistatic struct ccp_aes_def aes_algs[] = {
25162306a36Sopenharmony_ci	{
25262306a36Sopenharmony_ci		.mode		= CCP_AES_MODE_ECB,
25362306a36Sopenharmony_ci		.version	= CCP_VERSION(3, 0),
25462306a36Sopenharmony_ci		.name		= "ecb(aes)",
25562306a36Sopenharmony_ci		.driver_name	= "ecb-aes-ccp",
25662306a36Sopenharmony_ci		.blocksize	= AES_BLOCK_SIZE,
25762306a36Sopenharmony_ci		.ivsize		= 0,
25862306a36Sopenharmony_ci		.alg_defaults	= &ccp_aes_defaults,
25962306a36Sopenharmony_ci	},
26062306a36Sopenharmony_ci	{
26162306a36Sopenharmony_ci		.mode		= CCP_AES_MODE_CBC,
26262306a36Sopenharmony_ci		.version	= CCP_VERSION(3, 0),
26362306a36Sopenharmony_ci		.name		= "cbc(aes)",
26462306a36Sopenharmony_ci		.driver_name	= "cbc-aes-ccp",
26562306a36Sopenharmony_ci		.blocksize	= AES_BLOCK_SIZE,
26662306a36Sopenharmony_ci		.ivsize		= AES_BLOCK_SIZE,
26762306a36Sopenharmony_ci		.alg_defaults	= &ccp_aes_defaults,
26862306a36Sopenharmony_ci	},
26962306a36Sopenharmony_ci	{
27062306a36Sopenharmony_ci		.mode		= CCP_AES_MODE_CFB,
27162306a36Sopenharmony_ci		.version	= CCP_VERSION(3, 0),
27262306a36Sopenharmony_ci		.name		= "cfb(aes)",
27362306a36Sopenharmony_ci		.driver_name	= "cfb-aes-ccp",
27462306a36Sopenharmony_ci		.blocksize	= 1,
27562306a36Sopenharmony_ci		.ivsize		= AES_BLOCK_SIZE,
27662306a36Sopenharmony_ci		.alg_defaults	= &ccp_aes_defaults,
27762306a36Sopenharmony_ci	},
27862306a36Sopenharmony_ci	{
27962306a36Sopenharmony_ci		.mode		= CCP_AES_MODE_OFB,
28062306a36Sopenharmony_ci		.version	= CCP_VERSION(3, 0),
28162306a36Sopenharmony_ci		.name		= "ofb(aes)",
28262306a36Sopenharmony_ci		.driver_name	= "ofb-aes-ccp",
28362306a36Sopenharmony_ci		.blocksize	= 1,
28462306a36Sopenharmony_ci		.ivsize		= AES_BLOCK_SIZE,
28562306a36Sopenharmony_ci		.alg_defaults	= &ccp_aes_defaults,
28662306a36Sopenharmony_ci	},
28762306a36Sopenharmony_ci	{
28862306a36Sopenharmony_ci		.mode		= CCP_AES_MODE_CTR,
28962306a36Sopenharmony_ci		.version	= CCP_VERSION(3, 0),
29062306a36Sopenharmony_ci		.name		= "ctr(aes)",
29162306a36Sopenharmony_ci		.driver_name	= "ctr-aes-ccp",
29262306a36Sopenharmony_ci		.blocksize	= 1,
29362306a36Sopenharmony_ci		.ivsize		= AES_BLOCK_SIZE,
29462306a36Sopenharmony_ci		.alg_defaults	= &ccp_aes_defaults,
29562306a36Sopenharmony_ci	},
29662306a36Sopenharmony_ci	{
29762306a36Sopenharmony_ci		.mode		= CCP_AES_MODE_CTR,
29862306a36Sopenharmony_ci		.version	= CCP_VERSION(3, 0),
29962306a36Sopenharmony_ci		.name		= "rfc3686(ctr(aes))",
30062306a36Sopenharmony_ci		.driver_name	= "rfc3686-ctr-aes-ccp",
30162306a36Sopenharmony_ci		.blocksize	= 1,
30262306a36Sopenharmony_ci		.ivsize		= CTR_RFC3686_IV_SIZE,
30362306a36Sopenharmony_ci		.alg_defaults	= &ccp_aes_rfc3686_defaults,
30462306a36Sopenharmony_ci	},
30562306a36Sopenharmony_ci};
30662306a36Sopenharmony_ci
30762306a36Sopenharmony_cistatic int ccp_register_aes_alg(struct list_head *head,
30862306a36Sopenharmony_ci				const struct ccp_aes_def *def)
30962306a36Sopenharmony_ci{
31062306a36Sopenharmony_ci	struct ccp_crypto_skcipher_alg *ccp_alg;
31162306a36Sopenharmony_ci	struct skcipher_alg *alg;
31262306a36Sopenharmony_ci	int ret;
31362306a36Sopenharmony_ci
31462306a36Sopenharmony_ci	ccp_alg = kzalloc(sizeof(*ccp_alg), GFP_KERNEL);
31562306a36Sopenharmony_ci	if (!ccp_alg)
31662306a36Sopenharmony_ci		return -ENOMEM;
31762306a36Sopenharmony_ci
31862306a36Sopenharmony_ci	INIT_LIST_HEAD(&ccp_alg->entry);
31962306a36Sopenharmony_ci
32062306a36Sopenharmony_ci	ccp_alg->mode = def->mode;
32162306a36Sopenharmony_ci
32262306a36Sopenharmony_ci	/* Copy the defaults and override as necessary */
32362306a36Sopenharmony_ci	alg = &ccp_alg->alg;
32462306a36Sopenharmony_ci	*alg = *def->alg_defaults;
32562306a36Sopenharmony_ci	snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name);
32662306a36Sopenharmony_ci	snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
32762306a36Sopenharmony_ci		 def->driver_name);
32862306a36Sopenharmony_ci	alg->base.cra_blocksize = def->blocksize;
32962306a36Sopenharmony_ci	alg->ivsize = def->ivsize;
33062306a36Sopenharmony_ci
33162306a36Sopenharmony_ci	ret = crypto_register_skcipher(alg);
33262306a36Sopenharmony_ci	if (ret) {
33362306a36Sopenharmony_ci		pr_err("%s skcipher algorithm registration error (%d)\n",
33462306a36Sopenharmony_ci		       alg->base.cra_name, ret);
33562306a36Sopenharmony_ci		kfree(ccp_alg);
33662306a36Sopenharmony_ci		return ret;
33762306a36Sopenharmony_ci	}
33862306a36Sopenharmony_ci
33962306a36Sopenharmony_ci	list_add(&ccp_alg->entry, head);
34062306a36Sopenharmony_ci
34162306a36Sopenharmony_ci	return 0;
34262306a36Sopenharmony_ci}
34362306a36Sopenharmony_ci
34462306a36Sopenharmony_ciint ccp_register_aes_algs(struct list_head *head)
34562306a36Sopenharmony_ci{
34662306a36Sopenharmony_ci	int i, ret;
34762306a36Sopenharmony_ci	unsigned int ccpversion = ccp_version();
34862306a36Sopenharmony_ci
34962306a36Sopenharmony_ci	for (i = 0; i < ARRAY_SIZE(aes_algs); i++) {
35062306a36Sopenharmony_ci		if (aes_algs[i].version > ccpversion)
35162306a36Sopenharmony_ci			continue;
35262306a36Sopenharmony_ci		ret = ccp_register_aes_alg(head, &aes_algs[i]);
35362306a36Sopenharmony_ci		if (ret)
35462306a36Sopenharmony_ci			return ret;
35562306a36Sopenharmony_ci	}
35662306a36Sopenharmony_ci
35762306a36Sopenharmony_ci	return 0;
35862306a36Sopenharmony_ci}
359