162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * AMD Cryptographic Coprocessor (CCP) DES3 crypto API support
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (C) 2016,2017 Advanced Micro Devices, Inc.
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Author: Gary R Hook <ghook@amd.com>
862306a36Sopenharmony_ci */
962306a36Sopenharmony_ci
1062306a36Sopenharmony_ci#include <linux/module.h>
1162306a36Sopenharmony_ci#include <linux/sched.h>
1262306a36Sopenharmony_ci#include <linux/delay.h>
1362306a36Sopenharmony_ci#include <linux/scatterlist.h>
1462306a36Sopenharmony_ci#include <linux/crypto.h>
1562306a36Sopenharmony_ci#include <crypto/algapi.h>
1662306a36Sopenharmony_ci#include <crypto/scatterwalk.h>
1762306a36Sopenharmony_ci#include <crypto/internal/des.h>
1862306a36Sopenharmony_ci
1962306a36Sopenharmony_ci#include "ccp-crypto.h"
2062306a36Sopenharmony_ci
2162306a36Sopenharmony_cistatic int ccp_des3_complete(struct crypto_async_request *async_req, int ret)
2262306a36Sopenharmony_ci{
2362306a36Sopenharmony_ci	struct skcipher_request *req = skcipher_request_cast(async_req);
2462306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(
2562306a36Sopenharmony_ci		crypto_skcipher_reqtfm(req));
2662306a36Sopenharmony_ci	struct ccp_des3_req_ctx *rctx = skcipher_request_ctx_dma(req);
2762306a36Sopenharmony_ci
2862306a36Sopenharmony_ci	if (ret)
2962306a36Sopenharmony_ci		return ret;
3062306a36Sopenharmony_ci
3162306a36Sopenharmony_ci	if (ctx->u.des3.mode != CCP_DES3_MODE_ECB)
3262306a36Sopenharmony_ci		memcpy(req->iv, rctx->iv, DES3_EDE_BLOCK_SIZE);
3362306a36Sopenharmony_ci
3462306a36Sopenharmony_ci	return 0;
3562306a36Sopenharmony_ci}
3662306a36Sopenharmony_ci
3762306a36Sopenharmony_cistatic int ccp_des3_setkey(struct crypto_skcipher *tfm, const u8 *key,
3862306a36Sopenharmony_ci		unsigned int key_len)
3962306a36Sopenharmony_ci{
4062306a36Sopenharmony_ci	struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm);
4162306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm);
4262306a36Sopenharmony_ci	int err;
4362306a36Sopenharmony_ci
4462306a36Sopenharmony_ci	err = verify_skcipher_des3_key(tfm, key);
4562306a36Sopenharmony_ci	if (err)
4662306a36Sopenharmony_ci		return err;
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_ci	/* It's not clear that there is any support for a keysize of 112.
4962306a36Sopenharmony_ci	 * If needed, the caller should make K1 == K3
5062306a36Sopenharmony_ci	 */
5162306a36Sopenharmony_ci	ctx->u.des3.type = CCP_DES3_TYPE_168;
5262306a36Sopenharmony_ci	ctx->u.des3.mode = alg->mode;
5362306a36Sopenharmony_ci	ctx->u.des3.key_len = key_len;
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_ci	memcpy(ctx->u.des3.key, key, key_len);
5662306a36Sopenharmony_ci	sg_init_one(&ctx->u.des3.key_sg, ctx->u.des3.key, key_len);
5762306a36Sopenharmony_ci
5862306a36Sopenharmony_ci	return 0;
5962306a36Sopenharmony_ci}
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_cistatic int ccp_des3_crypt(struct skcipher_request *req, bool encrypt)
6262306a36Sopenharmony_ci{
6362306a36Sopenharmony_ci	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
6462306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm);
6562306a36Sopenharmony_ci	struct ccp_des3_req_ctx *rctx = skcipher_request_ctx_dma(req);
6662306a36Sopenharmony_ci	struct scatterlist *iv_sg = NULL;
6762306a36Sopenharmony_ci	unsigned int iv_len = 0;
6862306a36Sopenharmony_ci
6962306a36Sopenharmony_ci	if (!ctx->u.des3.key_len)
7062306a36Sopenharmony_ci		return -EINVAL;
7162306a36Sopenharmony_ci
7262306a36Sopenharmony_ci	if (((ctx->u.des3.mode == CCP_DES3_MODE_ECB) ||
7362306a36Sopenharmony_ci	     (ctx->u.des3.mode == CCP_DES3_MODE_CBC)) &&
7462306a36Sopenharmony_ci	    (req->cryptlen & (DES3_EDE_BLOCK_SIZE - 1)))
7562306a36Sopenharmony_ci		return -EINVAL;
7662306a36Sopenharmony_ci
7762306a36Sopenharmony_ci	if (ctx->u.des3.mode != CCP_DES3_MODE_ECB) {
7862306a36Sopenharmony_ci		if (!req->iv)
7962306a36Sopenharmony_ci			return -EINVAL;
8062306a36Sopenharmony_ci
8162306a36Sopenharmony_ci		memcpy(rctx->iv, req->iv, DES3_EDE_BLOCK_SIZE);
8262306a36Sopenharmony_ci		iv_sg = &rctx->iv_sg;
8362306a36Sopenharmony_ci		iv_len = DES3_EDE_BLOCK_SIZE;
8462306a36Sopenharmony_ci		sg_init_one(iv_sg, rctx->iv, iv_len);
8562306a36Sopenharmony_ci	}
8662306a36Sopenharmony_ci
8762306a36Sopenharmony_ci	memset(&rctx->cmd, 0, sizeof(rctx->cmd));
8862306a36Sopenharmony_ci	INIT_LIST_HEAD(&rctx->cmd.entry);
8962306a36Sopenharmony_ci	rctx->cmd.engine = CCP_ENGINE_DES3;
9062306a36Sopenharmony_ci	rctx->cmd.u.des3.type = ctx->u.des3.type;
9162306a36Sopenharmony_ci	rctx->cmd.u.des3.mode = ctx->u.des3.mode;
9262306a36Sopenharmony_ci	rctx->cmd.u.des3.action = (encrypt)
9362306a36Sopenharmony_ci				  ? CCP_DES3_ACTION_ENCRYPT
9462306a36Sopenharmony_ci				  : CCP_DES3_ACTION_DECRYPT;
9562306a36Sopenharmony_ci	rctx->cmd.u.des3.key = &ctx->u.des3.key_sg;
9662306a36Sopenharmony_ci	rctx->cmd.u.des3.key_len = ctx->u.des3.key_len;
9762306a36Sopenharmony_ci	rctx->cmd.u.des3.iv = iv_sg;
9862306a36Sopenharmony_ci	rctx->cmd.u.des3.iv_len = iv_len;
9962306a36Sopenharmony_ci	rctx->cmd.u.des3.src = req->src;
10062306a36Sopenharmony_ci	rctx->cmd.u.des3.src_len = req->cryptlen;
10162306a36Sopenharmony_ci	rctx->cmd.u.des3.dst = req->dst;
10262306a36Sopenharmony_ci
10362306a36Sopenharmony_ci	return ccp_crypto_enqueue_request(&req->base, &rctx->cmd);
10462306a36Sopenharmony_ci}
10562306a36Sopenharmony_ci
10662306a36Sopenharmony_cistatic int ccp_des3_encrypt(struct skcipher_request *req)
10762306a36Sopenharmony_ci{
10862306a36Sopenharmony_ci	return ccp_des3_crypt(req, true);
10962306a36Sopenharmony_ci}
11062306a36Sopenharmony_ci
11162306a36Sopenharmony_cistatic int ccp_des3_decrypt(struct skcipher_request *req)
11262306a36Sopenharmony_ci{
11362306a36Sopenharmony_ci	return ccp_des3_crypt(req, false);
11462306a36Sopenharmony_ci}
11562306a36Sopenharmony_ci
11662306a36Sopenharmony_cistatic int ccp_des3_init_tfm(struct crypto_skcipher *tfm)
11762306a36Sopenharmony_ci{
11862306a36Sopenharmony_ci	struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm);
11962306a36Sopenharmony_ci
12062306a36Sopenharmony_ci	ctx->complete = ccp_des3_complete;
12162306a36Sopenharmony_ci	ctx->u.des3.key_len = 0;
12262306a36Sopenharmony_ci
12362306a36Sopenharmony_ci	crypto_skcipher_set_reqsize_dma(tfm, sizeof(struct ccp_des3_req_ctx));
12462306a36Sopenharmony_ci
12562306a36Sopenharmony_ci	return 0;
12662306a36Sopenharmony_ci}
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_cistatic const struct skcipher_alg ccp_des3_defaults = {
12962306a36Sopenharmony_ci	.setkey			= ccp_des3_setkey,
13062306a36Sopenharmony_ci	.encrypt		= ccp_des3_encrypt,
13162306a36Sopenharmony_ci	.decrypt		= ccp_des3_decrypt,
13262306a36Sopenharmony_ci	.min_keysize		= DES3_EDE_KEY_SIZE,
13362306a36Sopenharmony_ci	.max_keysize		= DES3_EDE_KEY_SIZE,
13462306a36Sopenharmony_ci	.init			= ccp_des3_init_tfm,
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci	.base.cra_flags		= CRYPTO_ALG_ASYNC |
13762306a36Sopenharmony_ci				  CRYPTO_ALG_ALLOCATES_MEMORY |
13862306a36Sopenharmony_ci				  CRYPTO_ALG_KERN_DRIVER_ONLY |
13962306a36Sopenharmony_ci				  CRYPTO_ALG_NEED_FALLBACK,
14062306a36Sopenharmony_ci	.base.cra_blocksize	= DES3_EDE_BLOCK_SIZE,
14162306a36Sopenharmony_ci	.base.cra_ctxsize	= sizeof(struct ccp_ctx) + CRYPTO_DMA_PADDING,
14262306a36Sopenharmony_ci	.base.cra_priority	= CCP_CRA_PRIORITY,
14362306a36Sopenharmony_ci	.base.cra_module	= THIS_MODULE,
14462306a36Sopenharmony_ci};
14562306a36Sopenharmony_ci
14662306a36Sopenharmony_cistruct ccp_des3_def {
14762306a36Sopenharmony_ci	enum ccp_des3_mode mode;
14862306a36Sopenharmony_ci	unsigned int version;
14962306a36Sopenharmony_ci	const char *name;
15062306a36Sopenharmony_ci	const char *driver_name;
15162306a36Sopenharmony_ci	unsigned int blocksize;
15262306a36Sopenharmony_ci	unsigned int ivsize;
15362306a36Sopenharmony_ci	const struct skcipher_alg *alg_defaults;
15462306a36Sopenharmony_ci};
15562306a36Sopenharmony_ci
15662306a36Sopenharmony_cistatic const struct ccp_des3_def des3_algs[] = {
15762306a36Sopenharmony_ci	{
15862306a36Sopenharmony_ci		.mode		= CCP_DES3_MODE_ECB,
15962306a36Sopenharmony_ci		.version	= CCP_VERSION(5, 0),
16062306a36Sopenharmony_ci		.name		= "ecb(des3_ede)",
16162306a36Sopenharmony_ci		.driver_name	= "ecb-des3-ccp",
16262306a36Sopenharmony_ci		.blocksize	= DES3_EDE_BLOCK_SIZE,
16362306a36Sopenharmony_ci		.ivsize		= 0,
16462306a36Sopenharmony_ci		.alg_defaults	= &ccp_des3_defaults,
16562306a36Sopenharmony_ci	},
16662306a36Sopenharmony_ci	{
16762306a36Sopenharmony_ci		.mode		= CCP_DES3_MODE_CBC,
16862306a36Sopenharmony_ci		.version	= CCP_VERSION(5, 0),
16962306a36Sopenharmony_ci		.name		= "cbc(des3_ede)",
17062306a36Sopenharmony_ci		.driver_name	= "cbc-des3-ccp",
17162306a36Sopenharmony_ci		.blocksize	= DES3_EDE_BLOCK_SIZE,
17262306a36Sopenharmony_ci		.ivsize		= DES3_EDE_BLOCK_SIZE,
17362306a36Sopenharmony_ci		.alg_defaults	= &ccp_des3_defaults,
17462306a36Sopenharmony_ci	},
17562306a36Sopenharmony_ci};
17662306a36Sopenharmony_ci
17762306a36Sopenharmony_cistatic int ccp_register_des3_alg(struct list_head *head,
17862306a36Sopenharmony_ci				 const struct ccp_des3_def *def)
17962306a36Sopenharmony_ci{
18062306a36Sopenharmony_ci	struct ccp_crypto_skcipher_alg *ccp_alg;
18162306a36Sopenharmony_ci	struct skcipher_alg *alg;
18262306a36Sopenharmony_ci	int ret;
18362306a36Sopenharmony_ci
18462306a36Sopenharmony_ci	ccp_alg = kzalloc(sizeof(*ccp_alg), GFP_KERNEL);
18562306a36Sopenharmony_ci	if (!ccp_alg)
18662306a36Sopenharmony_ci		return -ENOMEM;
18762306a36Sopenharmony_ci
18862306a36Sopenharmony_ci	INIT_LIST_HEAD(&ccp_alg->entry);
18962306a36Sopenharmony_ci
19062306a36Sopenharmony_ci	ccp_alg->mode = def->mode;
19162306a36Sopenharmony_ci
19262306a36Sopenharmony_ci	/* Copy the defaults and override as necessary */
19362306a36Sopenharmony_ci	alg = &ccp_alg->alg;
19462306a36Sopenharmony_ci	*alg = *def->alg_defaults;
19562306a36Sopenharmony_ci	snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name);
19662306a36Sopenharmony_ci	snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
19762306a36Sopenharmony_ci			def->driver_name);
19862306a36Sopenharmony_ci	alg->base.cra_blocksize = def->blocksize;
19962306a36Sopenharmony_ci	alg->ivsize = def->ivsize;
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_ci	ret = crypto_register_skcipher(alg);
20262306a36Sopenharmony_ci	if (ret) {
20362306a36Sopenharmony_ci		pr_err("%s skcipher algorithm registration error (%d)\n",
20462306a36Sopenharmony_ci				alg->base.cra_name, ret);
20562306a36Sopenharmony_ci		kfree(ccp_alg);
20662306a36Sopenharmony_ci		return ret;
20762306a36Sopenharmony_ci	}
20862306a36Sopenharmony_ci
20962306a36Sopenharmony_ci	list_add(&ccp_alg->entry, head);
21062306a36Sopenharmony_ci
21162306a36Sopenharmony_ci	return 0;
21262306a36Sopenharmony_ci}
21362306a36Sopenharmony_ci
21462306a36Sopenharmony_ciint ccp_register_des3_algs(struct list_head *head)
21562306a36Sopenharmony_ci{
21662306a36Sopenharmony_ci	int i, ret;
21762306a36Sopenharmony_ci	unsigned int ccpversion = ccp_version();
21862306a36Sopenharmony_ci
21962306a36Sopenharmony_ci	for (i = 0; i < ARRAY_SIZE(des3_algs); i++) {
22062306a36Sopenharmony_ci		if (des3_algs[i].version > ccpversion)
22162306a36Sopenharmony_ci			continue;
22262306a36Sopenharmony_ci		ret = ccp_register_des3_alg(head, &des3_algs[i]);
22362306a36Sopenharmony_ci		if (ret)
22462306a36Sopenharmony_ci			return ret;
22562306a36Sopenharmony_ci	}
22662306a36Sopenharmony_ci
22762306a36Sopenharmony_ci	return 0;
22862306a36Sopenharmony_ci}
229