162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Cryptographic API.
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Support for VIA PadLock hardware crypto engine.
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Copyright (c) 2006  Michal Ludvig <michal@logix.cz>
862306a36Sopenharmony_ci */
962306a36Sopenharmony_ci
1062306a36Sopenharmony_ci#include <crypto/internal/hash.h>
1162306a36Sopenharmony_ci#include <crypto/padlock.h>
1262306a36Sopenharmony_ci#include <crypto/sha1.h>
1362306a36Sopenharmony_ci#include <crypto/sha2.h>
1462306a36Sopenharmony_ci#include <linux/err.h>
1562306a36Sopenharmony_ci#include <linux/module.h>
1662306a36Sopenharmony_ci#include <linux/init.h>
1762306a36Sopenharmony_ci#include <linux/errno.h>
1862306a36Sopenharmony_ci#include <linux/interrupt.h>
1962306a36Sopenharmony_ci#include <linux/kernel.h>
2062306a36Sopenharmony_ci#include <linux/scatterlist.h>
2162306a36Sopenharmony_ci#include <asm/cpu_device_id.h>
2262306a36Sopenharmony_ci#include <asm/fpu/api.h>
2362306a36Sopenharmony_ci
2462306a36Sopenharmony_cistruct padlock_sha_desc {
2562306a36Sopenharmony_ci	struct shash_desc fallback;
2662306a36Sopenharmony_ci};
2762306a36Sopenharmony_ci
2862306a36Sopenharmony_cistruct padlock_sha_ctx {
2962306a36Sopenharmony_ci	struct crypto_shash *fallback;
3062306a36Sopenharmony_ci};
3162306a36Sopenharmony_ci
3262306a36Sopenharmony_cistatic int padlock_sha_init(struct shash_desc *desc)
3362306a36Sopenharmony_ci{
3462306a36Sopenharmony_ci	struct padlock_sha_desc *dctx = shash_desc_ctx(desc);
3562306a36Sopenharmony_ci	struct padlock_sha_ctx *ctx = crypto_shash_ctx(desc->tfm);
3662306a36Sopenharmony_ci
3762306a36Sopenharmony_ci	dctx->fallback.tfm = ctx->fallback;
3862306a36Sopenharmony_ci	return crypto_shash_init(&dctx->fallback);
3962306a36Sopenharmony_ci}
4062306a36Sopenharmony_ci
4162306a36Sopenharmony_cistatic int padlock_sha_update(struct shash_desc *desc,
4262306a36Sopenharmony_ci			      const u8 *data, unsigned int length)
4362306a36Sopenharmony_ci{
4462306a36Sopenharmony_ci	struct padlock_sha_desc *dctx = shash_desc_ctx(desc);
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_ci	return crypto_shash_update(&dctx->fallback, data, length);
4762306a36Sopenharmony_ci}
4862306a36Sopenharmony_ci
4962306a36Sopenharmony_cistatic int padlock_sha_export(struct shash_desc *desc, void *out)
5062306a36Sopenharmony_ci{
5162306a36Sopenharmony_ci	struct padlock_sha_desc *dctx = shash_desc_ctx(desc);
5262306a36Sopenharmony_ci
5362306a36Sopenharmony_ci	return crypto_shash_export(&dctx->fallback, out);
5462306a36Sopenharmony_ci}
5562306a36Sopenharmony_ci
5662306a36Sopenharmony_cistatic int padlock_sha_import(struct shash_desc *desc, const void *in)
5762306a36Sopenharmony_ci{
5862306a36Sopenharmony_ci	struct padlock_sha_desc *dctx = shash_desc_ctx(desc);
5962306a36Sopenharmony_ci	struct padlock_sha_ctx *ctx = crypto_shash_ctx(desc->tfm);
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci	dctx->fallback.tfm = ctx->fallback;
6262306a36Sopenharmony_ci	return crypto_shash_import(&dctx->fallback, in);
6362306a36Sopenharmony_ci}
6462306a36Sopenharmony_ci
6562306a36Sopenharmony_cistatic inline void padlock_output_block(uint32_t *src,
6662306a36Sopenharmony_ci		 	uint32_t *dst, size_t count)
6762306a36Sopenharmony_ci{
6862306a36Sopenharmony_ci	while (count--)
6962306a36Sopenharmony_ci		*dst++ = swab32(*src++);
7062306a36Sopenharmony_ci}
7162306a36Sopenharmony_ci
7262306a36Sopenharmony_cistatic int padlock_sha1_finup(struct shash_desc *desc, const u8 *in,
7362306a36Sopenharmony_ci			      unsigned int count, u8 *out)
7462306a36Sopenharmony_ci{
7562306a36Sopenharmony_ci	/* We can't store directly to *out as it may be unaligned. */
7662306a36Sopenharmony_ci	/* BTW Don't reduce the buffer size below 128 Bytes!
7762306a36Sopenharmony_ci	 *     PadLock microcode needs it that big. */
7862306a36Sopenharmony_ci	char buf[128 + PADLOCK_ALIGNMENT - STACK_ALIGN] __attribute__
7962306a36Sopenharmony_ci		((aligned(STACK_ALIGN)));
8062306a36Sopenharmony_ci	char *result = PTR_ALIGN(&buf[0], PADLOCK_ALIGNMENT);
8162306a36Sopenharmony_ci	struct padlock_sha_desc *dctx = shash_desc_ctx(desc);
8262306a36Sopenharmony_ci	struct sha1_state state;
8362306a36Sopenharmony_ci	unsigned int space;
8462306a36Sopenharmony_ci	unsigned int leftover;
8562306a36Sopenharmony_ci	int err;
8662306a36Sopenharmony_ci
8762306a36Sopenharmony_ci	err = crypto_shash_export(&dctx->fallback, &state);
8862306a36Sopenharmony_ci	if (err)
8962306a36Sopenharmony_ci		goto out;
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_ci	if (state.count + count > ULONG_MAX)
9262306a36Sopenharmony_ci		return crypto_shash_finup(&dctx->fallback, in, count, out);
9362306a36Sopenharmony_ci
9462306a36Sopenharmony_ci	leftover = ((state.count - 1) & (SHA1_BLOCK_SIZE - 1)) + 1;
9562306a36Sopenharmony_ci	space =  SHA1_BLOCK_SIZE - leftover;
9662306a36Sopenharmony_ci	if (space) {
9762306a36Sopenharmony_ci		if (count > space) {
9862306a36Sopenharmony_ci			err = crypto_shash_update(&dctx->fallback, in, space) ?:
9962306a36Sopenharmony_ci			      crypto_shash_export(&dctx->fallback, &state);
10062306a36Sopenharmony_ci			if (err)
10162306a36Sopenharmony_ci				goto out;
10262306a36Sopenharmony_ci			count -= space;
10362306a36Sopenharmony_ci			in += space;
10462306a36Sopenharmony_ci		} else {
10562306a36Sopenharmony_ci			memcpy(state.buffer + leftover, in, count);
10662306a36Sopenharmony_ci			in = state.buffer;
10762306a36Sopenharmony_ci			count += leftover;
10862306a36Sopenharmony_ci			state.count &= ~(SHA1_BLOCK_SIZE - 1);
10962306a36Sopenharmony_ci		}
11062306a36Sopenharmony_ci	}
11162306a36Sopenharmony_ci
11262306a36Sopenharmony_ci	memcpy(result, &state.state, SHA1_DIGEST_SIZE);
11362306a36Sopenharmony_ci
11462306a36Sopenharmony_ci	asm volatile (".byte 0xf3,0x0f,0xa6,0xc8" /* rep xsha1 */
11562306a36Sopenharmony_ci		      : \
11662306a36Sopenharmony_ci		      : "c"((unsigned long)state.count + count), \
11762306a36Sopenharmony_ci			"a"((unsigned long)state.count), \
11862306a36Sopenharmony_ci			"S"(in), "D"(result));
11962306a36Sopenharmony_ci
12062306a36Sopenharmony_ci	padlock_output_block((uint32_t *)result, (uint32_t *)out, 5);
12162306a36Sopenharmony_ci
12262306a36Sopenharmony_ciout:
12362306a36Sopenharmony_ci	return err;
12462306a36Sopenharmony_ci}
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_cistatic int padlock_sha1_final(struct shash_desc *desc, u8 *out)
12762306a36Sopenharmony_ci{
12862306a36Sopenharmony_ci	u8 buf[4];
12962306a36Sopenharmony_ci
13062306a36Sopenharmony_ci	return padlock_sha1_finup(desc, buf, 0, out);
13162306a36Sopenharmony_ci}
13262306a36Sopenharmony_ci
13362306a36Sopenharmony_cistatic int padlock_sha256_finup(struct shash_desc *desc, const u8 *in,
13462306a36Sopenharmony_ci				unsigned int count, u8 *out)
13562306a36Sopenharmony_ci{
13662306a36Sopenharmony_ci	/* We can't store directly to *out as it may be unaligned. */
13762306a36Sopenharmony_ci	/* BTW Don't reduce the buffer size below 128 Bytes!
13862306a36Sopenharmony_ci	 *     PadLock microcode needs it that big. */
13962306a36Sopenharmony_ci	char buf[128 + PADLOCK_ALIGNMENT - STACK_ALIGN] __attribute__
14062306a36Sopenharmony_ci		((aligned(STACK_ALIGN)));
14162306a36Sopenharmony_ci	char *result = PTR_ALIGN(&buf[0], PADLOCK_ALIGNMENT);
14262306a36Sopenharmony_ci	struct padlock_sha_desc *dctx = shash_desc_ctx(desc);
14362306a36Sopenharmony_ci	struct sha256_state state;
14462306a36Sopenharmony_ci	unsigned int space;
14562306a36Sopenharmony_ci	unsigned int leftover;
14662306a36Sopenharmony_ci	int err;
14762306a36Sopenharmony_ci
14862306a36Sopenharmony_ci	err = crypto_shash_export(&dctx->fallback, &state);
14962306a36Sopenharmony_ci	if (err)
15062306a36Sopenharmony_ci		goto out;
15162306a36Sopenharmony_ci
15262306a36Sopenharmony_ci	if (state.count + count > ULONG_MAX)
15362306a36Sopenharmony_ci		return crypto_shash_finup(&dctx->fallback, in, count, out);
15462306a36Sopenharmony_ci
15562306a36Sopenharmony_ci	leftover = ((state.count - 1) & (SHA256_BLOCK_SIZE - 1)) + 1;
15662306a36Sopenharmony_ci	space =  SHA256_BLOCK_SIZE - leftover;
15762306a36Sopenharmony_ci	if (space) {
15862306a36Sopenharmony_ci		if (count > space) {
15962306a36Sopenharmony_ci			err = crypto_shash_update(&dctx->fallback, in, space) ?:
16062306a36Sopenharmony_ci			      crypto_shash_export(&dctx->fallback, &state);
16162306a36Sopenharmony_ci			if (err)
16262306a36Sopenharmony_ci				goto out;
16362306a36Sopenharmony_ci			count -= space;
16462306a36Sopenharmony_ci			in += space;
16562306a36Sopenharmony_ci		} else {
16662306a36Sopenharmony_ci			memcpy(state.buf + leftover, in, count);
16762306a36Sopenharmony_ci			in = state.buf;
16862306a36Sopenharmony_ci			count += leftover;
16962306a36Sopenharmony_ci			state.count &= ~(SHA1_BLOCK_SIZE - 1);
17062306a36Sopenharmony_ci		}
17162306a36Sopenharmony_ci	}
17262306a36Sopenharmony_ci
17362306a36Sopenharmony_ci	memcpy(result, &state.state, SHA256_DIGEST_SIZE);
17462306a36Sopenharmony_ci
17562306a36Sopenharmony_ci	asm volatile (".byte 0xf3,0x0f,0xa6,0xd0" /* rep xsha256 */
17662306a36Sopenharmony_ci		      : \
17762306a36Sopenharmony_ci		      : "c"((unsigned long)state.count + count), \
17862306a36Sopenharmony_ci			"a"((unsigned long)state.count), \
17962306a36Sopenharmony_ci			"S"(in), "D"(result));
18062306a36Sopenharmony_ci
18162306a36Sopenharmony_ci	padlock_output_block((uint32_t *)result, (uint32_t *)out, 8);
18262306a36Sopenharmony_ci
18362306a36Sopenharmony_ciout:
18462306a36Sopenharmony_ci	return err;
18562306a36Sopenharmony_ci}
18662306a36Sopenharmony_ci
18762306a36Sopenharmony_cistatic int padlock_sha256_final(struct shash_desc *desc, u8 *out)
18862306a36Sopenharmony_ci{
18962306a36Sopenharmony_ci	u8 buf[4];
19062306a36Sopenharmony_ci
19162306a36Sopenharmony_ci	return padlock_sha256_finup(desc, buf, 0, out);
19262306a36Sopenharmony_ci}
19362306a36Sopenharmony_ci
19462306a36Sopenharmony_cistatic int padlock_init_tfm(struct crypto_shash *hash)
19562306a36Sopenharmony_ci{
19662306a36Sopenharmony_ci	const char *fallback_driver_name = crypto_shash_alg_name(hash);
19762306a36Sopenharmony_ci	struct padlock_sha_ctx *ctx = crypto_shash_ctx(hash);
19862306a36Sopenharmony_ci	struct crypto_shash *fallback_tfm;
19962306a36Sopenharmony_ci
20062306a36Sopenharmony_ci	/* Allocate a fallback and abort if it failed. */
20162306a36Sopenharmony_ci	fallback_tfm = crypto_alloc_shash(fallback_driver_name, 0,
20262306a36Sopenharmony_ci					  CRYPTO_ALG_NEED_FALLBACK);
20362306a36Sopenharmony_ci	if (IS_ERR(fallback_tfm)) {
20462306a36Sopenharmony_ci		printk(KERN_WARNING PFX "Fallback driver '%s' could not be loaded!\n",
20562306a36Sopenharmony_ci		       fallback_driver_name);
20662306a36Sopenharmony_ci		return PTR_ERR(fallback_tfm);
20762306a36Sopenharmony_ci	}
20862306a36Sopenharmony_ci
20962306a36Sopenharmony_ci	ctx->fallback = fallback_tfm;
21062306a36Sopenharmony_ci	hash->descsize += crypto_shash_descsize(fallback_tfm);
21162306a36Sopenharmony_ci	return 0;
21262306a36Sopenharmony_ci}
21362306a36Sopenharmony_ci
21462306a36Sopenharmony_cistatic void padlock_exit_tfm(struct crypto_shash *hash)
21562306a36Sopenharmony_ci{
21662306a36Sopenharmony_ci	struct padlock_sha_ctx *ctx = crypto_shash_ctx(hash);
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci	crypto_free_shash(ctx->fallback);
21962306a36Sopenharmony_ci}
22062306a36Sopenharmony_ci
22162306a36Sopenharmony_cistatic struct shash_alg sha1_alg = {
22262306a36Sopenharmony_ci	.digestsize	=	SHA1_DIGEST_SIZE,
22362306a36Sopenharmony_ci	.init   	= 	padlock_sha_init,
22462306a36Sopenharmony_ci	.update 	=	padlock_sha_update,
22562306a36Sopenharmony_ci	.finup  	=	padlock_sha1_finup,
22662306a36Sopenharmony_ci	.final  	=	padlock_sha1_final,
22762306a36Sopenharmony_ci	.export		=	padlock_sha_export,
22862306a36Sopenharmony_ci	.import		=	padlock_sha_import,
22962306a36Sopenharmony_ci	.init_tfm	=	padlock_init_tfm,
23062306a36Sopenharmony_ci	.exit_tfm	=	padlock_exit_tfm,
23162306a36Sopenharmony_ci	.descsize	=	sizeof(struct padlock_sha_desc),
23262306a36Sopenharmony_ci	.statesize	=	sizeof(struct sha1_state),
23362306a36Sopenharmony_ci	.base		=	{
23462306a36Sopenharmony_ci		.cra_name		=	"sha1",
23562306a36Sopenharmony_ci		.cra_driver_name	=	"sha1-padlock",
23662306a36Sopenharmony_ci		.cra_priority		=	PADLOCK_CRA_PRIORITY,
23762306a36Sopenharmony_ci		.cra_flags		=	CRYPTO_ALG_NEED_FALLBACK,
23862306a36Sopenharmony_ci		.cra_blocksize		=	SHA1_BLOCK_SIZE,
23962306a36Sopenharmony_ci		.cra_ctxsize		=	sizeof(struct padlock_sha_ctx),
24062306a36Sopenharmony_ci		.cra_module		=	THIS_MODULE,
24162306a36Sopenharmony_ci	}
24262306a36Sopenharmony_ci};
24362306a36Sopenharmony_ci
24462306a36Sopenharmony_cistatic struct shash_alg sha256_alg = {
24562306a36Sopenharmony_ci	.digestsize	=	SHA256_DIGEST_SIZE,
24662306a36Sopenharmony_ci	.init   	= 	padlock_sha_init,
24762306a36Sopenharmony_ci	.update 	=	padlock_sha_update,
24862306a36Sopenharmony_ci	.finup  	=	padlock_sha256_finup,
24962306a36Sopenharmony_ci	.final  	=	padlock_sha256_final,
25062306a36Sopenharmony_ci	.export		=	padlock_sha_export,
25162306a36Sopenharmony_ci	.import		=	padlock_sha_import,
25262306a36Sopenharmony_ci	.init_tfm	=	padlock_init_tfm,
25362306a36Sopenharmony_ci	.exit_tfm	=	padlock_exit_tfm,
25462306a36Sopenharmony_ci	.descsize	=	sizeof(struct padlock_sha_desc),
25562306a36Sopenharmony_ci	.statesize	=	sizeof(struct sha256_state),
25662306a36Sopenharmony_ci	.base		=	{
25762306a36Sopenharmony_ci		.cra_name		=	"sha256",
25862306a36Sopenharmony_ci		.cra_driver_name	=	"sha256-padlock",
25962306a36Sopenharmony_ci		.cra_priority		=	PADLOCK_CRA_PRIORITY,
26062306a36Sopenharmony_ci		.cra_flags		=	CRYPTO_ALG_NEED_FALLBACK,
26162306a36Sopenharmony_ci		.cra_blocksize		=	SHA256_BLOCK_SIZE,
26262306a36Sopenharmony_ci		.cra_ctxsize		=	sizeof(struct padlock_sha_ctx),
26362306a36Sopenharmony_ci		.cra_module		=	THIS_MODULE,
26462306a36Sopenharmony_ci	}
26562306a36Sopenharmony_ci};
26662306a36Sopenharmony_ci
26762306a36Sopenharmony_ci/* Add two shash_alg instance for hardware-implemented *
26862306a36Sopenharmony_ci* multiple-parts hash supported by VIA Nano Processor.*/
26962306a36Sopenharmony_cistatic int padlock_sha1_init_nano(struct shash_desc *desc)
27062306a36Sopenharmony_ci{
27162306a36Sopenharmony_ci	struct sha1_state *sctx = shash_desc_ctx(desc);
27262306a36Sopenharmony_ci
27362306a36Sopenharmony_ci	*sctx = (struct sha1_state){
27462306a36Sopenharmony_ci		.state = { SHA1_H0, SHA1_H1, SHA1_H2, SHA1_H3, SHA1_H4 },
27562306a36Sopenharmony_ci	};
27662306a36Sopenharmony_ci
27762306a36Sopenharmony_ci	return 0;
27862306a36Sopenharmony_ci}
27962306a36Sopenharmony_ci
28062306a36Sopenharmony_cistatic int padlock_sha1_update_nano(struct shash_desc *desc,
28162306a36Sopenharmony_ci			const u8 *data,	unsigned int len)
28262306a36Sopenharmony_ci{
28362306a36Sopenharmony_ci	struct sha1_state *sctx = shash_desc_ctx(desc);
28462306a36Sopenharmony_ci	unsigned int partial, done;
28562306a36Sopenharmony_ci	const u8 *src;
28662306a36Sopenharmony_ci	/*The PHE require the out buffer must 128 bytes and 16-bytes aligned*/
28762306a36Sopenharmony_ci	u8 buf[128 + PADLOCK_ALIGNMENT - STACK_ALIGN] __attribute__
28862306a36Sopenharmony_ci		((aligned(STACK_ALIGN)));
28962306a36Sopenharmony_ci	u8 *dst = PTR_ALIGN(&buf[0], PADLOCK_ALIGNMENT);
29062306a36Sopenharmony_ci
29162306a36Sopenharmony_ci	partial = sctx->count & 0x3f;
29262306a36Sopenharmony_ci	sctx->count += len;
29362306a36Sopenharmony_ci	done = 0;
29462306a36Sopenharmony_ci	src = data;
29562306a36Sopenharmony_ci	memcpy(dst, (u8 *)(sctx->state), SHA1_DIGEST_SIZE);
29662306a36Sopenharmony_ci
29762306a36Sopenharmony_ci	if ((partial + len) >= SHA1_BLOCK_SIZE) {
29862306a36Sopenharmony_ci
29962306a36Sopenharmony_ci		/* Append the bytes in state's buffer to a block to handle */
30062306a36Sopenharmony_ci		if (partial) {
30162306a36Sopenharmony_ci			done = -partial;
30262306a36Sopenharmony_ci			memcpy(sctx->buffer + partial, data,
30362306a36Sopenharmony_ci				done + SHA1_BLOCK_SIZE);
30462306a36Sopenharmony_ci			src = sctx->buffer;
30562306a36Sopenharmony_ci			asm volatile (".byte 0xf3,0x0f,0xa6,0xc8"
30662306a36Sopenharmony_ci			: "+S"(src), "+D"(dst) \
30762306a36Sopenharmony_ci			: "a"((long)-1), "c"((unsigned long)1));
30862306a36Sopenharmony_ci			done += SHA1_BLOCK_SIZE;
30962306a36Sopenharmony_ci			src = data + done;
31062306a36Sopenharmony_ci		}
31162306a36Sopenharmony_ci
31262306a36Sopenharmony_ci		/* Process the left bytes from the input data */
31362306a36Sopenharmony_ci		if (len - done >= SHA1_BLOCK_SIZE) {
31462306a36Sopenharmony_ci			asm volatile (".byte 0xf3,0x0f,0xa6,0xc8"
31562306a36Sopenharmony_ci			: "+S"(src), "+D"(dst)
31662306a36Sopenharmony_ci			: "a"((long)-1),
31762306a36Sopenharmony_ci			"c"((unsigned long)((len - done) / SHA1_BLOCK_SIZE)));
31862306a36Sopenharmony_ci			done += ((len - done) - (len - done) % SHA1_BLOCK_SIZE);
31962306a36Sopenharmony_ci			src = data + done;
32062306a36Sopenharmony_ci		}
32162306a36Sopenharmony_ci		partial = 0;
32262306a36Sopenharmony_ci	}
32362306a36Sopenharmony_ci	memcpy((u8 *)(sctx->state), dst, SHA1_DIGEST_SIZE);
32462306a36Sopenharmony_ci	memcpy(sctx->buffer + partial, src, len - done);
32562306a36Sopenharmony_ci
32662306a36Sopenharmony_ci	return 0;
32762306a36Sopenharmony_ci}
32862306a36Sopenharmony_ci
32962306a36Sopenharmony_cistatic int padlock_sha1_final_nano(struct shash_desc *desc, u8 *out)
33062306a36Sopenharmony_ci{
33162306a36Sopenharmony_ci	struct sha1_state *state = (struct sha1_state *)shash_desc_ctx(desc);
33262306a36Sopenharmony_ci	unsigned int partial, padlen;
33362306a36Sopenharmony_ci	__be64 bits;
33462306a36Sopenharmony_ci	static const u8 padding[64] = { 0x80, };
33562306a36Sopenharmony_ci
33662306a36Sopenharmony_ci	bits = cpu_to_be64(state->count << 3);
33762306a36Sopenharmony_ci
33862306a36Sopenharmony_ci	/* Pad out to 56 mod 64 */
33962306a36Sopenharmony_ci	partial = state->count & 0x3f;
34062306a36Sopenharmony_ci	padlen = (partial < 56) ? (56 - partial) : ((64+56) - partial);
34162306a36Sopenharmony_ci	padlock_sha1_update_nano(desc, padding, padlen);
34262306a36Sopenharmony_ci
34362306a36Sopenharmony_ci	/* Append length field bytes */
34462306a36Sopenharmony_ci	padlock_sha1_update_nano(desc, (const u8 *)&bits, sizeof(bits));
34562306a36Sopenharmony_ci
34662306a36Sopenharmony_ci	/* Swap to output */
34762306a36Sopenharmony_ci	padlock_output_block((uint32_t *)(state->state), (uint32_t *)out, 5);
34862306a36Sopenharmony_ci
34962306a36Sopenharmony_ci	return 0;
35062306a36Sopenharmony_ci}
35162306a36Sopenharmony_ci
35262306a36Sopenharmony_cistatic int padlock_sha256_init_nano(struct shash_desc *desc)
35362306a36Sopenharmony_ci{
35462306a36Sopenharmony_ci	struct sha256_state *sctx = shash_desc_ctx(desc);
35562306a36Sopenharmony_ci
35662306a36Sopenharmony_ci	*sctx = (struct sha256_state){
35762306a36Sopenharmony_ci		.state = { SHA256_H0, SHA256_H1, SHA256_H2, SHA256_H3, \
35862306a36Sopenharmony_ci				SHA256_H4, SHA256_H5, SHA256_H6, SHA256_H7},
35962306a36Sopenharmony_ci	};
36062306a36Sopenharmony_ci
36162306a36Sopenharmony_ci	return 0;
36262306a36Sopenharmony_ci}
36362306a36Sopenharmony_ci
36462306a36Sopenharmony_cistatic int padlock_sha256_update_nano(struct shash_desc *desc, const u8 *data,
36562306a36Sopenharmony_ci			  unsigned int len)
36662306a36Sopenharmony_ci{
36762306a36Sopenharmony_ci	struct sha256_state *sctx = shash_desc_ctx(desc);
36862306a36Sopenharmony_ci	unsigned int partial, done;
36962306a36Sopenharmony_ci	const u8 *src;
37062306a36Sopenharmony_ci	/*The PHE require the out buffer must 128 bytes and 16-bytes aligned*/
37162306a36Sopenharmony_ci	u8 buf[128 + PADLOCK_ALIGNMENT - STACK_ALIGN] __attribute__
37262306a36Sopenharmony_ci		((aligned(STACK_ALIGN)));
37362306a36Sopenharmony_ci	u8 *dst = PTR_ALIGN(&buf[0], PADLOCK_ALIGNMENT);
37462306a36Sopenharmony_ci
37562306a36Sopenharmony_ci	partial = sctx->count & 0x3f;
37662306a36Sopenharmony_ci	sctx->count += len;
37762306a36Sopenharmony_ci	done = 0;
37862306a36Sopenharmony_ci	src = data;
37962306a36Sopenharmony_ci	memcpy(dst, (u8 *)(sctx->state), SHA256_DIGEST_SIZE);
38062306a36Sopenharmony_ci
38162306a36Sopenharmony_ci	if ((partial + len) >= SHA256_BLOCK_SIZE) {
38262306a36Sopenharmony_ci
38362306a36Sopenharmony_ci		/* Append the bytes in state's buffer to a block to handle */
38462306a36Sopenharmony_ci		if (partial) {
38562306a36Sopenharmony_ci			done = -partial;
38662306a36Sopenharmony_ci			memcpy(sctx->buf + partial, data,
38762306a36Sopenharmony_ci				done + SHA256_BLOCK_SIZE);
38862306a36Sopenharmony_ci			src = sctx->buf;
38962306a36Sopenharmony_ci			asm volatile (".byte 0xf3,0x0f,0xa6,0xd0"
39062306a36Sopenharmony_ci			: "+S"(src), "+D"(dst)
39162306a36Sopenharmony_ci			: "a"((long)-1), "c"((unsigned long)1));
39262306a36Sopenharmony_ci			done += SHA256_BLOCK_SIZE;
39362306a36Sopenharmony_ci			src = data + done;
39462306a36Sopenharmony_ci		}
39562306a36Sopenharmony_ci
39662306a36Sopenharmony_ci		/* Process the left bytes from input data*/
39762306a36Sopenharmony_ci		if (len - done >= SHA256_BLOCK_SIZE) {
39862306a36Sopenharmony_ci			asm volatile (".byte 0xf3,0x0f,0xa6,0xd0"
39962306a36Sopenharmony_ci			: "+S"(src), "+D"(dst)
40062306a36Sopenharmony_ci			: "a"((long)-1),
40162306a36Sopenharmony_ci			"c"((unsigned long)((len - done) / 64)));
40262306a36Sopenharmony_ci			done += ((len - done) - (len - done) % 64);
40362306a36Sopenharmony_ci			src = data + done;
40462306a36Sopenharmony_ci		}
40562306a36Sopenharmony_ci		partial = 0;
40662306a36Sopenharmony_ci	}
40762306a36Sopenharmony_ci	memcpy((u8 *)(sctx->state), dst, SHA256_DIGEST_SIZE);
40862306a36Sopenharmony_ci	memcpy(sctx->buf + partial, src, len - done);
40962306a36Sopenharmony_ci
41062306a36Sopenharmony_ci	return 0;
41162306a36Sopenharmony_ci}
41262306a36Sopenharmony_ci
41362306a36Sopenharmony_cistatic int padlock_sha256_final_nano(struct shash_desc *desc, u8 *out)
41462306a36Sopenharmony_ci{
41562306a36Sopenharmony_ci	struct sha256_state *state =
41662306a36Sopenharmony_ci		(struct sha256_state *)shash_desc_ctx(desc);
41762306a36Sopenharmony_ci	unsigned int partial, padlen;
41862306a36Sopenharmony_ci	__be64 bits;
41962306a36Sopenharmony_ci	static const u8 padding[64] = { 0x80, };
42062306a36Sopenharmony_ci
42162306a36Sopenharmony_ci	bits = cpu_to_be64(state->count << 3);
42262306a36Sopenharmony_ci
42362306a36Sopenharmony_ci	/* Pad out to 56 mod 64 */
42462306a36Sopenharmony_ci	partial = state->count & 0x3f;
42562306a36Sopenharmony_ci	padlen = (partial < 56) ? (56 - partial) : ((64+56) - partial);
42662306a36Sopenharmony_ci	padlock_sha256_update_nano(desc, padding, padlen);
42762306a36Sopenharmony_ci
42862306a36Sopenharmony_ci	/* Append length field bytes */
42962306a36Sopenharmony_ci	padlock_sha256_update_nano(desc, (const u8 *)&bits, sizeof(bits));
43062306a36Sopenharmony_ci
43162306a36Sopenharmony_ci	/* Swap to output */
43262306a36Sopenharmony_ci	padlock_output_block((uint32_t *)(state->state), (uint32_t *)out, 8);
43362306a36Sopenharmony_ci
43462306a36Sopenharmony_ci	return 0;
43562306a36Sopenharmony_ci}
43662306a36Sopenharmony_ci
43762306a36Sopenharmony_cistatic int padlock_sha_export_nano(struct shash_desc *desc,
43862306a36Sopenharmony_ci				void *out)
43962306a36Sopenharmony_ci{
44062306a36Sopenharmony_ci	int statesize = crypto_shash_statesize(desc->tfm);
44162306a36Sopenharmony_ci	void *sctx = shash_desc_ctx(desc);
44262306a36Sopenharmony_ci
44362306a36Sopenharmony_ci	memcpy(out, sctx, statesize);
44462306a36Sopenharmony_ci	return 0;
44562306a36Sopenharmony_ci}
44662306a36Sopenharmony_ci
44762306a36Sopenharmony_cistatic int padlock_sha_import_nano(struct shash_desc *desc,
44862306a36Sopenharmony_ci				const void *in)
44962306a36Sopenharmony_ci{
45062306a36Sopenharmony_ci	int statesize = crypto_shash_statesize(desc->tfm);
45162306a36Sopenharmony_ci	void *sctx = shash_desc_ctx(desc);
45262306a36Sopenharmony_ci
45362306a36Sopenharmony_ci	memcpy(sctx, in, statesize);
45462306a36Sopenharmony_ci	return 0;
45562306a36Sopenharmony_ci}
45662306a36Sopenharmony_ci
45762306a36Sopenharmony_cistatic struct shash_alg sha1_alg_nano = {
45862306a36Sopenharmony_ci	.digestsize	=	SHA1_DIGEST_SIZE,
45962306a36Sopenharmony_ci	.init		=	padlock_sha1_init_nano,
46062306a36Sopenharmony_ci	.update		=	padlock_sha1_update_nano,
46162306a36Sopenharmony_ci	.final		=	padlock_sha1_final_nano,
46262306a36Sopenharmony_ci	.export		=	padlock_sha_export_nano,
46362306a36Sopenharmony_ci	.import		=	padlock_sha_import_nano,
46462306a36Sopenharmony_ci	.descsize	=	sizeof(struct sha1_state),
46562306a36Sopenharmony_ci	.statesize	=	sizeof(struct sha1_state),
46662306a36Sopenharmony_ci	.base		=	{
46762306a36Sopenharmony_ci		.cra_name		=	"sha1",
46862306a36Sopenharmony_ci		.cra_driver_name	=	"sha1-padlock-nano",
46962306a36Sopenharmony_ci		.cra_priority		=	PADLOCK_CRA_PRIORITY,
47062306a36Sopenharmony_ci		.cra_blocksize		=	SHA1_BLOCK_SIZE,
47162306a36Sopenharmony_ci		.cra_module		=	THIS_MODULE,
47262306a36Sopenharmony_ci	}
47362306a36Sopenharmony_ci};
47462306a36Sopenharmony_ci
47562306a36Sopenharmony_cistatic struct shash_alg sha256_alg_nano = {
47662306a36Sopenharmony_ci	.digestsize	=	SHA256_DIGEST_SIZE,
47762306a36Sopenharmony_ci	.init		=	padlock_sha256_init_nano,
47862306a36Sopenharmony_ci	.update		=	padlock_sha256_update_nano,
47962306a36Sopenharmony_ci	.final		=	padlock_sha256_final_nano,
48062306a36Sopenharmony_ci	.export		=	padlock_sha_export_nano,
48162306a36Sopenharmony_ci	.import		=	padlock_sha_import_nano,
48262306a36Sopenharmony_ci	.descsize	=	sizeof(struct sha256_state),
48362306a36Sopenharmony_ci	.statesize	=	sizeof(struct sha256_state),
48462306a36Sopenharmony_ci	.base		=	{
48562306a36Sopenharmony_ci		.cra_name		=	"sha256",
48662306a36Sopenharmony_ci		.cra_driver_name	=	"sha256-padlock-nano",
48762306a36Sopenharmony_ci		.cra_priority		=	PADLOCK_CRA_PRIORITY,
48862306a36Sopenharmony_ci		.cra_blocksize		=	SHA256_BLOCK_SIZE,
48962306a36Sopenharmony_ci		.cra_module		=	THIS_MODULE,
49062306a36Sopenharmony_ci	}
49162306a36Sopenharmony_ci};
49262306a36Sopenharmony_ci
49362306a36Sopenharmony_cistatic const struct x86_cpu_id padlock_sha_ids[] = {
49462306a36Sopenharmony_ci	X86_MATCH_FEATURE(X86_FEATURE_PHE, NULL),
49562306a36Sopenharmony_ci	{}
49662306a36Sopenharmony_ci};
49762306a36Sopenharmony_ciMODULE_DEVICE_TABLE(x86cpu, padlock_sha_ids);
49862306a36Sopenharmony_ci
49962306a36Sopenharmony_cistatic int __init padlock_init(void)
50062306a36Sopenharmony_ci{
50162306a36Sopenharmony_ci	int rc = -ENODEV;
50262306a36Sopenharmony_ci	struct cpuinfo_x86 *c = &cpu_data(0);
50362306a36Sopenharmony_ci	struct shash_alg *sha1;
50462306a36Sopenharmony_ci	struct shash_alg *sha256;
50562306a36Sopenharmony_ci
50662306a36Sopenharmony_ci	if (!x86_match_cpu(padlock_sha_ids) || !boot_cpu_has(X86_FEATURE_PHE_EN))
50762306a36Sopenharmony_ci		return -ENODEV;
50862306a36Sopenharmony_ci
50962306a36Sopenharmony_ci	/* Register the newly added algorithm module if on *
51062306a36Sopenharmony_ci	* VIA Nano processor, or else just do as before */
51162306a36Sopenharmony_ci	if (c->x86_model < 0x0f) {
51262306a36Sopenharmony_ci		sha1 = &sha1_alg;
51362306a36Sopenharmony_ci		sha256 = &sha256_alg;
51462306a36Sopenharmony_ci	} else {
51562306a36Sopenharmony_ci		sha1 = &sha1_alg_nano;
51662306a36Sopenharmony_ci		sha256 = &sha256_alg_nano;
51762306a36Sopenharmony_ci	}
51862306a36Sopenharmony_ci
51962306a36Sopenharmony_ci	rc = crypto_register_shash(sha1);
52062306a36Sopenharmony_ci	if (rc)
52162306a36Sopenharmony_ci		goto out;
52262306a36Sopenharmony_ci
52362306a36Sopenharmony_ci	rc = crypto_register_shash(sha256);
52462306a36Sopenharmony_ci	if (rc)
52562306a36Sopenharmony_ci		goto out_unreg1;
52662306a36Sopenharmony_ci
52762306a36Sopenharmony_ci	printk(KERN_NOTICE PFX "Using VIA PadLock ACE for SHA1/SHA256 algorithms.\n");
52862306a36Sopenharmony_ci
52962306a36Sopenharmony_ci	return 0;
53062306a36Sopenharmony_ci
53162306a36Sopenharmony_ciout_unreg1:
53262306a36Sopenharmony_ci	crypto_unregister_shash(sha1);
53362306a36Sopenharmony_ci
53462306a36Sopenharmony_ciout:
53562306a36Sopenharmony_ci	printk(KERN_ERR PFX "VIA PadLock SHA1/SHA256 initialization failed.\n");
53662306a36Sopenharmony_ci	return rc;
53762306a36Sopenharmony_ci}
53862306a36Sopenharmony_ci
53962306a36Sopenharmony_cistatic void __exit padlock_fini(void)
54062306a36Sopenharmony_ci{
54162306a36Sopenharmony_ci	struct cpuinfo_x86 *c = &cpu_data(0);
54262306a36Sopenharmony_ci
54362306a36Sopenharmony_ci	if (c->x86_model >= 0x0f) {
54462306a36Sopenharmony_ci		crypto_unregister_shash(&sha1_alg_nano);
54562306a36Sopenharmony_ci		crypto_unregister_shash(&sha256_alg_nano);
54662306a36Sopenharmony_ci	} else {
54762306a36Sopenharmony_ci		crypto_unregister_shash(&sha1_alg);
54862306a36Sopenharmony_ci		crypto_unregister_shash(&sha256_alg);
54962306a36Sopenharmony_ci	}
55062306a36Sopenharmony_ci}
55162306a36Sopenharmony_ci
55262306a36Sopenharmony_cimodule_init(padlock_init);
55362306a36Sopenharmony_cimodule_exit(padlock_fini);
55462306a36Sopenharmony_ci
55562306a36Sopenharmony_ciMODULE_DESCRIPTION("VIA PadLock SHA1/SHA256 algorithms support.");
55662306a36Sopenharmony_ciMODULE_LICENSE("GPL");
55762306a36Sopenharmony_ciMODULE_AUTHOR("Michal Ludvig");
55862306a36Sopenharmony_ci
55962306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("sha1-all");
56062306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("sha256-all");
56162306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("sha1-padlock");
56262306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("sha256-padlock");
563