162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * AMD Cryptographic Coprocessor (CCP) DES3 crypto API support 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2016,2017 Advanced Micro Devices, Inc. 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Author: Gary R Hook <ghook@amd.com> 862306a36Sopenharmony_ci */ 962306a36Sopenharmony_ci 1062306a36Sopenharmony_ci#include <linux/module.h> 1162306a36Sopenharmony_ci#include <linux/sched.h> 1262306a36Sopenharmony_ci#include <linux/delay.h> 1362306a36Sopenharmony_ci#include <linux/scatterlist.h> 1462306a36Sopenharmony_ci#include <linux/crypto.h> 1562306a36Sopenharmony_ci#include <crypto/algapi.h> 1662306a36Sopenharmony_ci#include <crypto/scatterwalk.h> 1762306a36Sopenharmony_ci#include <crypto/internal/des.h> 1862306a36Sopenharmony_ci 1962306a36Sopenharmony_ci#include "ccp-crypto.h" 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_cistatic int ccp_des3_complete(struct crypto_async_request *async_req, int ret) 2262306a36Sopenharmony_ci{ 2362306a36Sopenharmony_ci struct skcipher_request *req = skcipher_request_cast(async_req); 2462306a36Sopenharmony_ci struct ccp_ctx *ctx = crypto_skcipher_ctx_dma( 2562306a36Sopenharmony_ci crypto_skcipher_reqtfm(req)); 2662306a36Sopenharmony_ci struct ccp_des3_req_ctx *rctx = skcipher_request_ctx_dma(req); 2762306a36Sopenharmony_ci 2862306a36Sopenharmony_ci if (ret) 2962306a36Sopenharmony_ci return ret; 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_ci if (ctx->u.des3.mode != CCP_DES3_MODE_ECB) 3262306a36Sopenharmony_ci memcpy(req->iv, rctx->iv, DES3_EDE_BLOCK_SIZE); 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_ci return 0; 3562306a36Sopenharmony_ci} 3662306a36Sopenharmony_ci 3762306a36Sopenharmony_cistatic int ccp_des3_setkey(struct crypto_skcipher *tfm, const u8 *key, 3862306a36Sopenharmony_ci unsigned int key_len) 3962306a36Sopenharmony_ci{ 4062306a36Sopenharmony_ci struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); 4162306a36Sopenharmony_ci struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm); 4262306a36Sopenharmony_ci int err; 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_ci err = verify_skcipher_des3_key(tfm, key); 4562306a36Sopenharmony_ci if (err) 4662306a36Sopenharmony_ci return err; 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_ci /* It's not clear that there is any support for a keysize of 112. 4962306a36Sopenharmony_ci * If needed, the caller should make K1 == K3 5062306a36Sopenharmony_ci */ 5162306a36Sopenharmony_ci ctx->u.des3.type = CCP_DES3_TYPE_168; 5262306a36Sopenharmony_ci ctx->u.des3.mode = alg->mode; 5362306a36Sopenharmony_ci ctx->u.des3.key_len = key_len; 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci memcpy(ctx->u.des3.key, key, key_len); 5662306a36Sopenharmony_ci sg_init_one(&ctx->u.des3.key_sg, ctx->u.des3.key, key_len); 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_ci return 0; 5962306a36Sopenharmony_ci} 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_cistatic int ccp_des3_crypt(struct skcipher_request *req, bool encrypt) 6262306a36Sopenharmony_ci{ 6362306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 6462306a36Sopenharmony_ci struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm); 6562306a36Sopenharmony_ci struct ccp_des3_req_ctx *rctx = skcipher_request_ctx_dma(req); 6662306a36Sopenharmony_ci struct scatterlist *iv_sg = NULL; 6762306a36Sopenharmony_ci unsigned int iv_len = 0; 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci if (!ctx->u.des3.key_len) 7062306a36Sopenharmony_ci return -EINVAL; 7162306a36Sopenharmony_ci 7262306a36Sopenharmony_ci if (((ctx->u.des3.mode == CCP_DES3_MODE_ECB) || 7362306a36Sopenharmony_ci (ctx->u.des3.mode == CCP_DES3_MODE_CBC)) && 7462306a36Sopenharmony_ci (req->cryptlen & (DES3_EDE_BLOCK_SIZE - 1))) 7562306a36Sopenharmony_ci return -EINVAL; 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci if (ctx->u.des3.mode != CCP_DES3_MODE_ECB) { 7862306a36Sopenharmony_ci if (!req->iv) 7962306a36Sopenharmony_ci return -EINVAL; 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci memcpy(rctx->iv, req->iv, DES3_EDE_BLOCK_SIZE); 8262306a36Sopenharmony_ci iv_sg = &rctx->iv_sg; 8362306a36Sopenharmony_ci iv_len = DES3_EDE_BLOCK_SIZE; 8462306a36Sopenharmony_ci sg_init_one(iv_sg, rctx->iv, iv_len); 8562306a36Sopenharmony_ci } 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_ci memset(&rctx->cmd, 0, sizeof(rctx->cmd)); 8862306a36Sopenharmony_ci INIT_LIST_HEAD(&rctx->cmd.entry); 8962306a36Sopenharmony_ci rctx->cmd.engine = CCP_ENGINE_DES3; 9062306a36Sopenharmony_ci rctx->cmd.u.des3.type = ctx->u.des3.type; 9162306a36Sopenharmony_ci rctx->cmd.u.des3.mode = ctx->u.des3.mode; 9262306a36Sopenharmony_ci rctx->cmd.u.des3.action = (encrypt) 9362306a36Sopenharmony_ci ? CCP_DES3_ACTION_ENCRYPT 9462306a36Sopenharmony_ci : CCP_DES3_ACTION_DECRYPT; 9562306a36Sopenharmony_ci rctx->cmd.u.des3.key = &ctx->u.des3.key_sg; 9662306a36Sopenharmony_ci rctx->cmd.u.des3.key_len = ctx->u.des3.key_len; 9762306a36Sopenharmony_ci rctx->cmd.u.des3.iv = iv_sg; 9862306a36Sopenharmony_ci rctx->cmd.u.des3.iv_len = iv_len; 9962306a36Sopenharmony_ci rctx->cmd.u.des3.src = req->src; 10062306a36Sopenharmony_ci rctx->cmd.u.des3.src_len = req->cryptlen; 10162306a36Sopenharmony_ci rctx->cmd.u.des3.dst = req->dst; 10262306a36Sopenharmony_ci 10362306a36Sopenharmony_ci return ccp_crypto_enqueue_request(&req->base, &rctx->cmd); 10462306a36Sopenharmony_ci} 10562306a36Sopenharmony_ci 10662306a36Sopenharmony_cistatic int ccp_des3_encrypt(struct skcipher_request *req) 10762306a36Sopenharmony_ci{ 10862306a36Sopenharmony_ci return ccp_des3_crypt(req, true); 10962306a36Sopenharmony_ci} 11062306a36Sopenharmony_ci 11162306a36Sopenharmony_cistatic int ccp_des3_decrypt(struct skcipher_request *req) 11262306a36Sopenharmony_ci{ 11362306a36Sopenharmony_ci return ccp_des3_crypt(req, false); 11462306a36Sopenharmony_ci} 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_cistatic int ccp_des3_init_tfm(struct crypto_skcipher *tfm) 11762306a36Sopenharmony_ci{ 11862306a36Sopenharmony_ci struct ccp_ctx *ctx = crypto_skcipher_ctx_dma(tfm); 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_ci ctx->complete = ccp_des3_complete; 12162306a36Sopenharmony_ci ctx->u.des3.key_len = 0; 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci crypto_skcipher_set_reqsize_dma(tfm, sizeof(struct ccp_des3_req_ctx)); 12462306a36Sopenharmony_ci 12562306a36Sopenharmony_ci return 0; 12662306a36Sopenharmony_ci} 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_cistatic const struct skcipher_alg ccp_des3_defaults = { 12962306a36Sopenharmony_ci .setkey = ccp_des3_setkey, 13062306a36Sopenharmony_ci .encrypt = ccp_des3_encrypt, 13162306a36Sopenharmony_ci .decrypt = ccp_des3_decrypt, 13262306a36Sopenharmony_ci .min_keysize = DES3_EDE_KEY_SIZE, 13362306a36Sopenharmony_ci .max_keysize = DES3_EDE_KEY_SIZE, 13462306a36Sopenharmony_ci .init = ccp_des3_init_tfm, 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_ASYNC | 13762306a36Sopenharmony_ci CRYPTO_ALG_ALLOCATES_MEMORY | 13862306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 13962306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 14062306a36Sopenharmony_ci .base.cra_blocksize = DES3_EDE_BLOCK_SIZE, 14162306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct ccp_ctx) + CRYPTO_DMA_PADDING, 14262306a36Sopenharmony_ci .base.cra_priority = CCP_CRA_PRIORITY, 14362306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 14462306a36Sopenharmony_ci}; 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_cistruct ccp_des3_def { 14762306a36Sopenharmony_ci enum ccp_des3_mode mode; 14862306a36Sopenharmony_ci unsigned int version; 14962306a36Sopenharmony_ci const char *name; 15062306a36Sopenharmony_ci const char *driver_name; 15162306a36Sopenharmony_ci unsigned int blocksize; 15262306a36Sopenharmony_ci unsigned int ivsize; 15362306a36Sopenharmony_ci const struct skcipher_alg *alg_defaults; 15462306a36Sopenharmony_ci}; 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_cistatic const struct ccp_des3_def des3_algs[] = { 15762306a36Sopenharmony_ci { 15862306a36Sopenharmony_ci .mode = CCP_DES3_MODE_ECB, 15962306a36Sopenharmony_ci .version = CCP_VERSION(5, 0), 16062306a36Sopenharmony_ci .name = "ecb(des3_ede)", 16162306a36Sopenharmony_ci .driver_name = "ecb-des3-ccp", 16262306a36Sopenharmony_ci .blocksize = DES3_EDE_BLOCK_SIZE, 16362306a36Sopenharmony_ci .ivsize = 0, 16462306a36Sopenharmony_ci .alg_defaults = &ccp_des3_defaults, 16562306a36Sopenharmony_ci }, 16662306a36Sopenharmony_ci { 16762306a36Sopenharmony_ci .mode = CCP_DES3_MODE_CBC, 16862306a36Sopenharmony_ci .version = CCP_VERSION(5, 0), 16962306a36Sopenharmony_ci .name = "cbc(des3_ede)", 17062306a36Sopenharmony_ci .driver_name = "cbc-des3-ccp", 17162306a36Sopenharmony_ci .blocksize = DES3_EDE_BLOCK_SIZE, 17262306a36Sopenharmony_ci .ivsize = DES3_EDE_BLOCK_SIZE, 17362306a36Sopenharmony_ci .alg_defaults = &ccp_des3_defaults, 17462306a36Sopenharmony_ci }, 17562306a36Sopenharmony_ci}; 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_cistatic int ccp_register_des3_alg(struct list_head *head, 17862306a36Sopenharmony_ci const struct ccp_des3_def *def) 17962306a36Sopenharmony_ci{ 18062306a36Sopenharmony_ci struct ccp_crypto_skcipher_alg *ccp_alg; 18162306a36Sopenharmony_ci struct skcipher_alg *alg; 18262306a36Sopenharmony_ci int ret; 18362306a36Sopenharmony_ci 18462306a36Sopenharmony_ci ccp_alg = kzalloc(sizeof(*ccp_alg), GFP_KERNEL); 18562306a36Sopenharmony_ci if (!ccp_alg) 18662306a36Sopenharmony_ci return -ENOMEM; 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ci INIT_LIST_HEAD(&ccp_alg->entry); 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_ci ccp_alg->mode = def->mode; 19162306a36Sopenharmony_ci 19262306a36Sopenharmony_ci /* Copy the defaults and override as necessary */ 19362306a36Sopenharmony_ci alg = &ccp_alg->alg; 19462306a36Sopenharmony_ci *alg = *def->alg_defaults; 19562306a36Sopenharmony_ci snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); 19662306a36Sopenharmony_ci snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", 19762306a36Sopenharmony_ci def->driver_name); 19862306a36Sopenharmony_ci alg->base.cra_blocksize = def->blocksize; 19962306a36Sopenharmony_ci alg->ivsize = def->ivsize; 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci ret = crypto_register_skcipher(alg); 20262306a36Sopenharmony_ci if (ret) { 20362306a36Sopenharmony_ci pr_err("%s skcipher algorithm registration error (%d)\n", 20462306a36Sopenharmony_ci alg->base.cra_name, ret); 20562306a36Sopenharmony_ci kfree(ccp_alg); 20662306a36Sopenharmony_ci return ret; 20762306a36Sopenharmony_ci } 20862306a36Sopenharmony_ci 20962306a36Sopenharmony_ci list_add(&ccp_alg->entry, head); 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci return 0; 21262306a36Sopenharmony_ci} 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_ciint ccp_register_des3_algs(struct list_head *head) 21562306a36Sopenharmony_ci{ 21662306a36Sopenharmony_ci int i, ret; 21762306a36Sopenharmony_ci unsigned int ccpversion = ccp_version(); 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci for (i = 0; i < ARRAY_SIZE(des3_algs); i++) { 22062306a36Sopenharmony_ci if (des3_algs[i].version > ccpversion) 22162306a36Sopenharmony_ci continue; 22262306a36Sopenharmony_ci ret = ccp_register_des3_alg(head, &des3_algs[i]); 22362306a36Sopenharmony_ci if (ret) 22462306a36Sopenharmony_ci return ret; 22562306a36Sopenharmony_ci } 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_ci return 0; 22862306a36Sopenharmony_ci} 229