| // SPDX-License-Identifier: GPL-2.0-only |
| /* Copyright (C) 2020 Marvell. */ |
| |
| #include <crypto/aes.h> |
| #include <crypto/authenc.h> |
| #include <crypto/cryptd.h> |
| #include <crypto/des.h> |
| #include <crypto/internal/aead.h> |
| #include <crypto/sha1.h> |
| #include <crypto/sha2.h> |
| #include <crypto/xts.h> |
| #include <crypto/gcm.h> |
| #include <crypto/scatterwalk.h> |
| #include <linux/rtnetlink.h> |
| #include <linux/sort.h> |
| #include <linux/module.h> |
| #include "otx2_cptvf.h" |
| #include "otx2_cptvf_algs.h" |
| #include "otx2_cpt_reqmgr.h" |
| |
| /* Size of salt in AES GCM mode */ |
| #define AES_GCM_SALT_SIZE 4 |
| /* Size of IV in AES GCM mode */ |
| #define AES_GCM_IV_SIZE 8 |
| /* Size of ICV (Integrity Check Value) in AES GCM mode */ |
| #define AES_GCM_ICV_SIZE 16 |
| /* Offset of IV in AES GCM mode */ |
| #define AES_GCM_IV_OFFSET 8 |
| #define CONTROL_WORD_LEN 8 |
| #define KEY2_OFFSET 48 |
| #define DMA_MODE_FLAG(dma_mode) \ |
| (((dma_mode) == OTX2_CPT_DMA_MODE_SG) ? (1 << 7) : 0) |
| |
| /* Truncated SHA digest size */ |
| #define SHA1_TRUNC_DIGEST_SIZE 12 |
| #define SHA256_TRUNC_DIGEST_SIZE 16 |
| #define SHA384_TRUNC_DIGEST_SIZE 24 |
| #define SHA512_TRUNC_DIGEST_SIZE 32 |
| |
| static DEFINE_MUTEX(mutex); |
| static int is_crypto_registered; |
| |
| struct cpt_device_desc { |
| struct pci_dev *dev; |
| int num_queues; |
| }; |
| |
| struct cpt_device_table { |
| atomic_t count; |
| struct cpt_device_desc desc[OTX2_CPT_MAX_LFS_NUM]; |
| }; |
| |
| static struct cpt_device_table se_devices = { |
| .count = ATOMIC_INIT(0) |
| }; |
| |
| static inline int get_se_device(struct pci_dev **pdev, int *cpu_num) |
| { |
| int count; |
| |
| count = atomic_read(&se_devices.count); |
| if (count < 1) |
| return -ENODEV; |
| |
| *cpu_num = get_cpu(); |
| /* |
| * On OcteonTX2 platform CPT instruction queue is bound to each |
| * local function LF, in turn LFs can be attached to PF |
| * or VF therefore we always use first device. We get maximum |
| * performance if one CPT queue is available for each cpu |
| * otherwise CPT queues need to be shared between cpus. |
| */ |
| if (*cpu_num >= se_devices.desc[0].num_queues) |
| *cpu_num %= se_devices.desc[0].num_queues; |
| *pdev = se_devices.desc[0].dev; |
| |
| put_cpu(); |
| |
| return 0; |
| } |
| |
| static inline int validate_hmac_cipher_null(struct otx2_cpt_req_info *cpt_req) |
| { |
| struct otx2_cpt_req_ctx *rctx; |
| struct aead_request *req; |
| struct crypto_aead *tfm; |
| |
| req = container_of(cpt_req->areq, struct aead_request, base); |
| tfm = crypto_aead_reqtfm(req); |
| rctx = aead_request_ctx(req); |
| if (memcmp(rctx->fctx.hmac.s.hmac_calc, |
| rctx->fctx.hmac.s.hmac_recv, |
| crypto_aead_authsize(tfm)) != 0) |
| return -EBADMSG; |
| |
| return 0; |
| } |
| |
| static void otx2_cpt_aead_callback(int status, void *arg1, void *arg2) |
| { |
| struct otx2_cpt_inst_info *inst_info = arg2; |
| struct crypto_async_request *areq = arg1; |
| struct otx2_cpt_req_info *cpt_req; |
| struct pci_dev *pdev; |
| |
| if (inst_info) { |
| cpt_req = inst_info->req; |
| if (!status) { |
| /* |
| * When selected cipher is NULL we need to manually |
| * verify whether calculated hmac value matches |
| * received hmac value |
| */ |
| if (cpt_req->req_type == |
| OTX2_CPT_AEAD_ENC_DEC_NULL_REQ && |
| !cpt_req->is_enc) |
| status = validate_hmac_cipher_null(cpt_req); |
| } |
| pdev = inst_info->pdev; |
| otx2_cpt_info_destroy(pdev, inst_info); |
| } |
| if (areq) |
| areq->complete(areq, status); |
| } |
| |
| static void output_iv_copyback(struct crypto_async_request *areq) |
| { |
| struct otx2_cpt_req_info *req_info; |
| struct otx2_cpt_req_ctx *rctx; |
| struct skcipher_request *sreq; |
| struct crypto_skcipher *stfm; |
| struct otx2_cpt_enc_ctx *ctx; |
| u32 start, ivsize; |
| |
| sreq = container_of(areq, struct skcipher_request, base); |
| stfm = crypto_skcipher_reqtfm(sreq); |
| ctx = crypto_skcipher_ctx(stfm); |
| if (ctx->cipher_type == OTX2_CPT_AES_CBC || |
| ctx->cipher_type == OTX2_CPT_DES3_CBC) { |
| rctx = skcipher_request_ctx(sreq); |
| req_info = &rctx->cpt_req; |
| ivsize = crypto_skcipher_ivsize(stfm); |
| start = sreq->cryptlen - ivsize; |
| |
| if (req_info->is_enc) { |
| scatterwalk_map_and_copy(sreq->iv, sreq->dst, start, |
| ivsize, 0); |
| } else { |
| if (sreq->src != sreq->dst) { |
| scatterwalk_map_and_copy(sreq->iv, sreq->src, |
| start, ivsize, 0); |
| } else { |
| memcpy(sreq->iv, req_info->iv_out, ivsize); |
| kfree(req_info->iv_out); |
| } |
| } |
| } |
| } |
| |
| static void otx2_cpt_skcipher_callback(int status, void *arg1, void *arg2) |
| { |
| struct otx2_cpt_inst_info *inst_info = arg2; |
| struct crypto_async_request *areq = arg1; |
| struct pci_dev *pdev; |
| |
| if (areq) { |
| if (!status) |
| output_iv_copyback(areq); |
| if (inst_info) { |
| pdev = inst_info->pdev; |
| otx2_cpt_info_destroy(pdev, inst_info); |
| } |
| areq->complete(areq, status); |
| } |
| } |
| |
| static inline void update_input_data(struct otx2_cpt_req_info *req_info, |
| struct scatterlist *inp_sg, |
| u32 nbytes, u32 *argcnt) |
| { |
| req_info->req.dlen += nbytes; |
| |
| while (nbytes) { |
| u32 len = (nbytes < inp_sg->length) ? nbytes : inp_sg->length; |
| u8 *ptr = sg_virt(inp_sg); |
| |
| req_info->in[*argcnt].vptr = (void *)ptr; |
| req_info->in[*argcnt].size = len; |
| nbytes -= len; |
| ++(*argcnt); |
| inp_sg = sg_next(inp_sg); |
| } |
| } |
| |
| static inline void update_output_data(struct otx2_cpt_req_info *req_info, |
| struct scatterlist *outp_sg, |
| u32 offset, u32 nbytes, u32 *argcnt) |
| { |
| u32 len, sg_len; |
| u8 *ptr; |
| |
| req_info->rlen += nbytes; |
| |
| while (nbytes) { |
| sg_len = outp_sg->length - offset; |
| len = (nbytes < sg_len) ? nbytes : sg_len; |
| ptr = sg_virt(outp_sg); |
| |
| req_info->out[*argcnt].vptr = (void *) (ptr + offset); |
| req_info->out[*argcnt].size = len; |
| nbytes -= len; |
| ++(*argcnt); |
| offset = 0; |
| outp_sg = sg_next(outp_sg); |
| } |
| } |
| |
| static inline int create_ctx_hdr(struct skcipher_request *req, u32 enc, |
| u32 *argcnt) |
| { |
| struct crypto_skcipher *stfm = crypto_skcipher_reqtfm(req); |
| struct otx2_cpt_req_ctx *rctx = skcipher_request_ctx(req); |
| struct otx2_cpt_enc_ctx *ctx = crypto_skcipher_ctx(stfm); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| struct otx2_cpt_fc_ctx *fctx = &rctx->fctx; |
| int ivsize = crypto_skcipher_ivsize(stfm); |
| u32 start = req->cryptlen - ivsize; |
| gfp_t flags; |
| |
| flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? |
| GFP_KERNEL : GFP_ATOMIC; |
| req_info->ctrl.s.dma_mode = OTX2_CPT_DMA_MODE_SG; |
| req_info->ctrl.s.se_req = 1; |
| |
| req_info->req.opcode.s.major = OTX2_CPT_MAJOR_OP_FC | |
| DMA_MODE_FLAG(OTX2_CPT_DMA_MODE_SG); |
| if (enc) { |
| req_info->req.opcode.s.minor = 2; |
| } else { |
| req_info->req.opcode.s.minor = 3; |
| if ((ctx->cipher_type == OTX2_CPT_AES_CBC || |
| ctx->cipher_type == OTX2_CPT_DES3_CBC) && |
| req->src == req->dst) { |
| req_info->iv_out = kmalloc(ivsize, flags); |
| if (!req_info->iv_out) |
| return -ENOMEM; |
| |
| scatterwalk_map_and_copy(req_info->iv_out, req->src, |
| start, ivsize, 0); |
| } |
| } |
| /* Encryption data length */ |
| req_info->req.param1 = req->cryptlen; |
| /* Authentication data length */ |
| req_info->req.param2 = 0; |
| |
| fctx->enc.enc_ctrl.e.enc_cipher = ctx->cipher_type; |
| fctx->enc.enc_ctrl.e.aes_key = ctx->key_type; |
| fctx->enc.enc_ctrl.e.iv_source = OTX2_CPT_FROM_CPTR; |
| |
| if (ctx->cipher_type == OTX2_CPT_AES_XTS) |
| memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len * 2); |
| else |
| memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len); |
| |
| memcpy(fctx->enc.encr_iv, req->iv, crypto_skcipher_ivsize(stfm)); |
| |
| cpu_to_be64s(&fctx->enc.enc_ctrl.u); |
| |
| /* |
| * Storing Packet Data Information in offset |
| * Control Word First 8 bytes |
| */ |
| req_info->in[*argcnt].vptr = (u8 *)&rctx->ctrl_word; |
| req_info->in[*argcnt].size = CONTROL_WORD_LEN; |
| req_info->req.dlen += CONTROL_WORD_LEN; |
| ++(*argcnt); |
| |
| req_info->in[*argcnt].vptr = (u8 *)fctx; |
| req_info->in[*argcnt].size = sizeof(struct otx2_cpt_fc_ctx); |
| req_info->req.dlen += sizeof(struct otx2_cpt_fc_ctx); |
| |
| ++(*argcnt); |
| |
| return 0; |
| } |
| |
| static inline int create_input_list(struct skcipher_request *req, u32 enc, |
| u32 enc_iv_len) |
| { |
| struct otx2_cpt_req_ctx *rctx = skcipher_request_ctx(req); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| u32 argcnt = 0; |
| int ret; |
| |
| ret = create_ctx_hdr(req, enc, &argcnt); |
| if (ret) |
| return ret; |
| |
| update_input_data(req_info, req->src, req->cryptlen, &argcnt); |
| req_info->in_cnt = argcnt; |
| |
| return 0; |
| } |
| |
| static inline void create_output_list(struct skcipher_request *req, |
| u32 enc_iv_len) |
| { |
| struct otx2_cpt_req_ctx *rctx = skcipher_request_ctx(req); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| u32 argcnt = 0; |
| |
| /* |
| * OUTPUT Buffer Processing |
| * AES encryption/decryption output would be |
| * received in the following format |
| * |
| * ------IV--------|------ENCRYPTED/DECRYPTED DATA-----| |
| * [ 16 Bytes/ [ Request Enc/Dec/ DATA Len AES CBC ] |
| */ |
| update_output_data(req_info, req->dst, 0, req->cryptlen, &argcnt); |
| req_info->out_cnt = argcnt; |
| } |
| |
| static int skcipher_do_fallback(struct skcipher_request *req, bool is_enc) |
| { |
| struct crypto_skcipher *stfm = crypto_skcipher_reqtfm(req); |
| struct otx2_cpt_req_ctx *rctx = skcipher_request_ctx(req); |
| struct otx2_cpt_enc_ctx *ctx = crypto_skcipher_ctx(stfm); |
| int ret; |
| |
| if (ctx->fbk_cipher) { |
| skcipher_request_set_tfm(&rctx->sk_fbk_req, ctx->fbk_cipher); |
| skcipher_request_set_callback(&rctx->sk_fbk_req, |
| req->base.flags, |
| req->base.complete, |
| req->base.data); |
| skcipher_request_set_crypt(&rctx->sk_fbk_req, req->src, |
| req->dst, req->cryptlen, req->iv); |
| ret = is_enc ? crypto_skcipher_encrypt(&rctx->sk_fbk_req) : |
| crypto_skcipher_decrypt(&rctx->sk_fbk_req); |
| } else { |
| ret = -EINVAL; |
| } |
| return ret; |
| } |
| |
| static inline int cpt_enc_dec(struct skcipher_request *req, u32 enc) |
| { |
| struct crypto_skcipher *stfm = crypto_skcipher_reqtfm(req); |
| struct otx2_cpt_req_ctx *rctx = skcipher_request_ctx(req); |
| struct otx2_cpt_enc_ctx *ctx = crypto_skcipher_ctx(stfm); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| u32 enc_iv_len = crypto_skcipher_ivsize(stfm); |
| struct pci_dev *pdev; |
| int status, cpu_num; |
| |
| if (req->cryptlen == 0) |
| return 0; |
| |
| if (!IS_ALIGNED(req->cryptlen, ctx->enc_align_len)) |
| return -EINVAL; |
| |
| if (req->cryptlen > OTX2_CPT_MAX_REQ_SIZE) |
| return skcipher_do_fallback(req, enc); |
| |
| /* Clear control words */ |
| rctx->ctrl_word.flags = 0; |
| rctx->fctx.enc.enc_ctrl.u = 0; |
| |
| status = create_input_list(req, enc, enc_iv_len); |
| if (status) |
| return status; |
| create_output_list(req, enc_iv_len); |
| |
| status = get_se_device(&pdev, &cpu_num); |
| if (status) |
| return status; |
| |
| req_info->callback = otx2_cpt_skcipher_callback; |
| req_info->areq = &req->base; |
| req_info->req_type = OTX2_CPT_ENC_DEC_REQ; |
| req_info->is_enc = enc; |
| req_info->is_trunc_hmac = false; |
| req_info->ctrl.s.grp = otx2_cpt_get_kcrypto_eng_grp_num(pdev); |
| |
| /* |
| * We perform an asynchronous send and once |
| * the request is completed the driver would |
| * intimate through registered call back functions |
| */ |
| status = otx2_cpt_do_request(pdev, req_info, cpu_num); |
| |
| return status; |
| } |
| |
| static int otx2_cpt_skcipher_encrypt(struct skcipher_request *req) |
| { |
| return cpt_enc_dec(req, true); |
| } |
| |
| static int otx2_cpt_skcipher_decrypt(struct skcipher_request *req) |
| { |
| return cpt_enc_dec(req, false); |
| } |
| |
| static int otx2_cpt_skcipher_xts_setkey(struct crypto_skcipher *tfm, |
| const u8 *key, u32 keylen) |
| { |
| struct otx2_cpt_enc_ctx *ctx = crypto_skcipher_ctx(tfm); |
| const u8 *key2 = key + (keylen / 2); |
| const u8 *key1 = key; |
| int ret; |
| |
| ret = xts_check_key(crypto_skcipher_tfm(tfm), key, keylen); |
| if (ret) |
| return ret; |
| ctx->key_len = keylen; |
| ctx->enc_align_len = 1; |
| memcpy(ctx->enc_key, key1, keylen / 2); |
| memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); |
| ctx->cipher_type = OTX2_CPT_AES_XTS; |
| switch (ctx->key_len) { |
| case 2 * AES_KEYSIZE_128: |
| ctx->key_type = OTX2_CPT_AES_128_BIT; |
| break; |
| case 2 * AES_KEYSIZE_192: |
| ctx->key_type = OTX2_CPT_AES_192_BIT; |
| break; |
| case 2 * AES_KEYSIZE_256: |
| ctx->key_type = OTX2_CPT_AES_256_BIT; |
| break; |
| default: |
| return -EINVAL; |
| } |
| return crypto_skcipher_setkey(ctx->fbk_cipher, key, keylen); |
| } |
| |
| static int cpt_des_setkey(struct crypto_skcipher *tfm, const u8 *key, |
| u32 keylen, u8 cipher_type) |
| { |
| struct otx2_cpt_enc_ctx *ctx = crypto_skcipher_ctx(tfm); |
| |
| if (keylen != DES3_EDE_KEY_SIZE) |
| return -EINVAL; |
| |
| ctx->key_len = keylen; |
| ctx->cipher_type = cipher_type; |
| ctx->enc_align_len = 8; |
| |
| memcpy(ctx->enc_key, key, keylen); |
| |
| return crypto_skcipher_setkey(ctx->fbk_cipher, key, keylen); |
| } |
| |
| static int cpt_aes_setkey(struct crypto_skcipher *tfm, const u8 *key, |
| u32 keylen, u8 cipher_type) |
| { |
| struct otx2_cpt_enc_ctx *ctx = crypto_skcipher_ctx(tfm); |
| |
| switch (keylen) { |
| case AES_KEYSIZE_128: |
| ctx->key_type = OTX2_CPT_AES_128_BIT; |
| break; |
| case AES_KEYSIZE_192: |
| ctx->key_type = OTX2_CPT_AES_192_BIT; |
| break; |
| case AES_KEYSIZE_256: |
| ctx->key_type = OTX2_CPT_AES_256_BIT; |
| break; |
| default: |
| return -EINVAL; |
| } |
| if (cipher_type == OTX2_CPT_AES_CBC || cipher_type == OTX2_CPT_AES_ECB) |
| ctx->enc_align_len = 16; |
| else |
| ctx->enc_align_len = 1; |
| |
| ctx->key_len = keylen; |
| ctx->cipher_type = cipher_type; |
| |
| memcpy(ctx->enc_key, key, keylen); |
| |
| return crypto_skcipher_setkey(ctx->fbk_cipher, key, keylen); |
| } |
| |
| static int otx2_cpt_skcipher_cbc_aes_setkey(struct crypto_skcipher *tfm, |
| const u8 *key, u32 keylen) |
| { |
| return cpt_aes_setkey(tfm, key, keylen, OTX2_CPT_AES_CBC); |
| } |
| |
| static int otx2_cpt_skcipher_ecb_aes_setkey(struct crypto_skcipher *tfm, |
| const u8 *key, u32 keylen) |
| { |
| return cpt_aes_setkey(tfm, key, keylen, OTX2_CPT_AES_ECB); |
| } |
| |
| static int otx2_cpt_skcipher_cbc_des3_setkey(struct crypto_skcipher *tfm, |
| const u8 *key, u32 keylen) |
| { |
| return cpt_des_setkey(tfm, key, keylen, OTX2_CPT_DES3_CBC); |
| } |
| |
| static int otx2_cpt_skcipher_ecb_des3_setkey(struct crypto_skcipher *tfm, |
| const u8 *key, u32 keylen) |
| { |
| return cpt_des_setkey(tfm, key, keylen, OTX2_CPT_DES3_ECB); |
| } |
| |
| static int cpt_skcipher_fallback_init(struct otx2_cpt_enc_ctx *ctx, |
| struct crypto_alg *alg) |
| { |
| if (alg->cra_flags & CRYPTO_ALG_NEED_FALLBACK) { |
| ctx->fbk_cipher = |
| crypto_alloc_skcipher(alg->cra_name, 0, |
| CRYPTO_ALG_ASYNC | |
| CRYPTO_ALG_NEED_FALLBACK); |
| if (IS_ERR(ctx->fbk_cipher)) { |
| pr_err("%s() failed to allocate fallback for %s\n", |
| __func__, alg->cra_name); |
| return PTR_ERR(ctx->fbk_cipher); |
| } |
| } |
| return 0; |
| } |
| |
| static int otx2_cpt_enc_dec_init(struct crypto_skcipher *stfm) |
| { |
| struct otx2_cpt_enc_ctx *ctx = crypto_skcipher_ctx(stfm); |
| struct crypto_tfm *tfm = crypto_skcipher_tfm(stfm); |
| struct crypto_alg *alg = tfm->__crt_alg; |
| |
| memset(ctx, 0, sizeof(*ctx)); |
| /* |
| * Additional memory for skcipher_request is |
| * allocated since the cryptd daemon uses |
| * this memory for request_ctx information |
| */ |
| crypto_skcipher_set_reqsize(stfm, sizeof(struct otx2_cpt_req_ctx) + |
| sizeof(struct skcipher_request)); |
| |
| return cpt_skcipher_fallback_init(ctx, alg); |
| } |
| |
| static void otx2_cpt_skcipher_exit(struct crypto_skcipher *tfm) |
| { |
| struct otx2_cpt_enc_ctx *ctx = crypto_skcipher_ctx(tfm); |
| |
| if (ctx->fbk_cipher) { |
| crypto_free_skcipher(ctx->fbk_cipher); |
| ctx->fbk_cipher = NULL; |
| } |
| } |
| |
| static int cpt_aead_fallback_init(struct otx2_cpt_aead_ctx *ctx, |
| struct crypto_alg *alg) |
| { |
| if (alg->cra_flags & CRYPTO_ALG_NEED_FALLBACK) { |
| ctx->fbk_cipher = |
| crypto_alloc_aead(alg->cra_name, 0, |
| CRYPTO_ALG_ASYNC | |
| CRYPTO_ALG_NEED_FALLBACK); |
| if (IS_ERR(ctx->fbk_cipher)) { |
| pr_err("%s() failed to allocate fallback for %s\n", |
| __func__, alg->cra_name); |
| return PTR_ERR(ctx->fbk_cipher); |
| } |
| } |
| return 0; |
| } |
| |
| static int cpt_aead_init(struct crypto_aead *atfm, u8 cipher_type, u8 mac_type) |
| { |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(atfm); |
| struct crypto_tfm *tfm = crypto_aead_tfm(atfm); |
| struct crypto_alg *alg = tfm->__crt_alg; |
| |
| ctx->cipher_type = cipher_type; |
| ctx->mac_type = mac_type; |
| |
| /* |
| * When selected cipher is NULL we use HMAC opcode instead of |
| * FLEXICRYPTO opcode therefore we don't need to use HASH algorithms |
| * for calculating ipad and opad |
| */ |
| if (ctx->cipher_type != OTX2_CPT_CIPHER_NULL) { |
| switch (ctx->mac_type) { |
| case OTX2_CPT_SHA1: |
| ctx->hashalg = crypto_alloc_shash("sha1", 0, |
| CRYPTO_ALG_ASYNC); |
| if (IS_ERR(ctx->hashalg)) |
| return PTR_ERR(ctx->hashalg); |
| break; |
| |
| case OTX2_CPT_SHA256: |
| ctx->hashalg = crypto_alloc_shash("sha256", 0, |
| CRYPTO_ALG_ASYNC); |
| if (IS_ERR(ctx->hashalg)) |
| return PTR_ERR(ctx->hashalg); |
| break; |
| |
| case OTX2_CPT_SHA384: |
| ctx->hashalg = crypto_alloc_shash("sha384", 0, |
| CRYPTO_ALG_ASYNC); |
| if (IS_ERR(ctx->hashalg)) |
| return PTR_ERR(ctx->hashalg); |
| break; |
| |
| case OTX2_CPT_SHA512: |
| ctx->hashalg = crypto_alloc_shash("sha512", 0, |
| CRYPTO_ALG_ASYNC); |
| if (IS_ERR(ctx->hashalg)) |
| return PTR_ERR(ctx->hashalg); |
| break; |
| } |
| } |
| switch (ctx->cipher_type) { |
| case OTX2_CPT_AES_CBC: |
| case OTX2_CPT_AES_ECB: |
| ctx->enc_align_len = 16; |
| break; |
| case OTX2_CPT_DES3_CBC: |
| case OTX2_CPT_DES3_ECB: |
| ctx->enc_align_len = 8; |
| break; |
| case OTX2_CPT_AES_GCM: |
| case OTX2_CPT_CIPHER_NULL: |
| ctx->enc_align_len = 1; |
| break; |
| } |
| crypto_aead_set_reqsize(atfm, sizeof(struct otx2_cpt_req_ctx)); |
| |
| return cpt_aead_fallback_init(ctx, alg); |
| } |
| |
| static int otx2_cpt_aead_cbc_aes_sha1_init(struct crypto_aead *tfm) |
| { |
| return cpt_aead_init(tfm, OTX2_CPT_AES_CBC, OTX2_CPT_SHA1); |
| } |
| |
| static int otx2_cpt_aead_cbc_aes_sha256_init(struct crypto_aead *tfm) |
| { |
| return cpt_aead_init(tfm, OTX2_CPT_AES_CBC, OTX2_CPT_SHA256); |
| } |
| |
| static int otx2_cpt_aead_cbc_aes_sha384_init(struct crypto_aead *tfm) |
| { |
| return cpt_aead_init(tfm, OTX2_CPT_AES_CBC, OTX2_CPT_SHA384); |
| } |
| |
| static int otx2_cpt_aead_cbc_aes_sha512_init(struct crypto_aead *tfm) |
| { |
| return cpt_aead_init(tfm, OTX2_CPT_AES_CBC, OTX2_CPT_SHA512); |
| } |
| |
| static int otx2_cpt_aead_ecb_null_sha1_init(struct crypto_aead *tfm) |
| { |
| return cpt_aead_init(tfm, OTX2_CPT_CIPHER_NULL, OTX2_CPT_SHA1); |
| } |
| |
| static int otx2_cpt_aead_ecb_null_sha256_init(struct crypto_aead *tfm) |
| { |
| return cpt_aead_init(tfm, OTX2_CPT_CIPHER_NULL, OTX2_CPT_SHA256); |
| } |
| |
| static int otx2_cpt_aead_ecb_null_sha384_init(struct crypto_aead *tfm) |
| { |
| return cpt_aead_init(tfm, OTX2_CPT_CIPHER_NULL, OTX2_CPT_SHA384); |
| } |
| |
| static int otx2_cpt_aead_ecb_null_sha512_init(struct crypto_aead *tfm) |
| { |
| return cpt_aead_init(tfm, OTX2_CPT_CIPHER_NULL, OTX2_CPT_SHA512); |
| } |
| |
| static int otx2_cpt_aead_gcm_aes_init(struct crypto_aead *tfm) |
| { |
| return cpt_aead_init(tfm, OTX2_CPT_AES_GCM, OTX2_CPT_MAC_NULL); |
| } |
| |
| static void otx2_cpt_aead_exit(struct crypto_aead *tfm) |
| { |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(tfm); |
| |
| kfree(ctx->ipad); |
| kfree(ctx->opad); |
| if (ctx->hashalg) |
| crypto_free_shash(ctx->hashalg); |
| kfree(ctx->sdesc); |
| |
| if (ctx->fbk_cipher) { |
| crypto_free_aead(ctx->fbk_cipher); |
| ctx->fbk_cipher = NULL; |
| } |
| } |
| |
| static int otx2_cpt_aead_gcm_set_authsize(struct crypto_aead *tfm, |
| unsigned int authsize) |
| { |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(tfm); |
| |
| if (crypto_rfc4106_check_authsize(authsize)) |
| return -EINVAL; |
| |
| tfm->authsize = authsize; |
| /* Set authsize for fallback case */ |
| if (ctx->fbk_cipher) |
| ctx->fbk_cipher->authsize = authsize; |
| |
| return 0; |
| } |
| |
| static int otx2_cpt_aead_set_authsize(struct crypto_aead *tfm, |
| unsigned int authsize) |
| { |
| tfm->authsize = authsize; |
| |
| return 0; |
| } |
| |
| static int otx2_cpt_aead_null_set_authsize(struct crypto_aead *tfm, |
| unsigned int authsize) |
| { |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(tfm); |
| |
| ctx->is_trunc_hmac = true; |
| tfm->authsize = authsize; |
| |
| return 0; |
| } |
| |
| static struct otx2_cpt_sdesc *alloc_sdesc(struct crypto_shash *alg) |
| { |
| struct otx2_cpt_sdesc *sdesc; |
| int size; |
| |
| size = sizeof(struct shash_desc) + crypto_shash_descsize(alg); |
| sdesc = kmalloc(size, GFP_KERNEL); |
| if (!sdesc) |
| return NULL; |
| |
| sdesc->shash.tfm = alg; |
| |
| return sdesc; |
| } |
| |
| static inline void swap_data32(void *buf, u32 len) |
| { |
| cpu_to_be32_array(buf, buf, len / 4); |
| } |
| |
| static inline void swap_data64(void *buf, u32 len) |
| { |
| u64 *src = buf; |
| int i = 0; |
| |
| for (i = 0 ; i < len / 8; i++, src++) |
| cpu_to_be64s(src); |
| } |
| |
| static int copy_pad(u8 mac_type, u8 *out_pad, u8 *in_pad) |
| { |
| struct sha512_state *sha512; |
| struct sha256_state *sha256; |
| struct sha1_state *sha1; |
| |
| switch (mac_type) { |
| case OTX2_CPT_SHA1: |
| sha1 = (struct sha1_state *) in_pad; |
| swap_data32(sha1->state, SHA1_DIGEST_SIZE); |
| memcpy(out_pad, &sha1->state, SHA1_DIGEST_SIZE); |
| break; |
| |
| case OTX2_CPT_SHA256: |
| sha256 = (struct sha256_state *) in_pad; |
| swap_data32(sha256->state, SHA256_DIGEST_SIZE); |
| memcpy(out_pad, &sha256->state, SHA256_DIGEST_SIZE); |
| break; |
| |
| case OTX2_CPT_SHA384: |
| case OTX2_CPT_SHA512: |
| sha512 = (struct sha512_state *) in_pad; |
| swap_data64(sha512->state, SHA512_DIGEST_SIZE); |
| memcpy(out_pad, &sha512->state, SHA512_DIGEST_SIZE); |
| break; |
| |
| default: |
| return -EINVAL; |
| } |
| |
| return 0; |
| } |
| |
| static int aead_hmac_init(struct crypto_aead *cipher) |
| { |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(cipher); |
| int state_size = crypto_shash_statesize(ctx->hashalg); |
| int ds = crypto_shash_digestsize(ctx->hashalg); |
| int bs = crypto_shash_blocksize(ctx->hashalg); |
| int authkeylen = ctx->auth_key_len; |
| u8 *ipad = NULL, *opad = NULL; |
| int ret = 0, icount = 0; |
| |
| ctx->sdesc = alloc_sdesc(ctx->hashalg); |
| if (!ctx->sdesc) |
| return -ENOMEM; |
| |
| ctx->ipad = kzalloc(bs, GFP_KERNEL); |
| if (!ctx->ipad) { |
| ret = -ENOMEM; |
| goto calc_fail; |
| } |
| |
| ctx->opad = kzalloc(bs, GFP_KERNEL); |
| if (!ctx->opad) { |
| ret = -ENOMEM; |
| goto calc_fail; |
| } |
| |
| ipad = kzalloc(state_size, GFP_KERNEL); |
| if (!ipad) { |
| ret = -ENOMEM; |
| goto calc_fail; |
| } |
| |
| opad = kzalloc(state_size, GFP_KERNEL); |
| if (!opad) { |
| ret = -ENOMEM; |
| goto calc_fail; |
| } |
| |
| if (authkeylen > bs) { |
| ret = crypto_shash_digest(&ctx->sdesc->shash, ctx->key, |
| authkeylen, ipad); |
| if (ret) |
| goto calc_fail; |
| |
| authkeylen = ds; |
| } else { |
| memcpy(ipad, ctx->key, authkeylen); |
| } |
| |
| memset(ipad + authkeylen, 0, bs - authkeylen); |
| memcpy(opad, ipad, bs); |
| |
| for (icount = 0; icount < bs; icount++) { |
| ipad[icount] ^= 0x36; |
| opad[icount] ^= 0x5c; |
| } |
| |
| /* |
| * Partial Hash calculated from the software |
| * algorithm is retrieved for IPAD & OPAD |
| */ |
| |
| /* IPAD Calculation */ |
| crypto_shash_init(&ctx->sdesc->shash); |
| crypto_shash_update(&ctx->sdesc->shash, ipad, bs); |
| crypto_shash_export(&ctx->sdesc->shash, ipad); |
| ret = copy_pad(ctx->mac_type, ctx->ipad, ipad); |
| if (ret) |
| goto calc_fail; |
| |
| /* OPAD Calculation */ |
| crypto_shash_init(&ctx->sdesc->shash); |
| crypto_shash_update(&ctx->sdesc->shash, opad, bs); |
| crypto_shash_export(&ctx->sdesc->shash, opad); |
| ret = copy_pad(ctx->mac_type, ctx->opad, opad); |
| if (ret) |
| goto calc_fail; |
| |
| kfree(ipad); |
| kfree(opad); |
| |
| return 0; |
| |
| calc_fail: |
| kfree(ctx->ipad); |
| ctx->ipad = NULL; |
| kfree(ctx->opad); |
| ctx->opad = NULL; |
| kfree(ipad); |
| kfree(opad); |
| kfree(ctx->sdesc); |
| ctx->sdesc = NULL; |
| |
| return ret; |
| } |
| |
| static int otx2_cpt_aead_cbc_aes_sha_setkey(struct crypto_aead *cipher, |
| const unsigned char *key, |
| unsigned int keylen) |
| { |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(cipher); |
| struct crypto_authenc_key_param *param; |
| int enckeylen = 0, authkeylen = 0; |
| struct rtattr *rta = (void *)key; |
| int status; |
| |
| if (!RTA_OK(rta, keylen)) |
| return -EINVAL; |
| |
| if (rta->rta_type != CRYPTO_AUTHENC_KEYA_PARAM) |
| return -EINVAL; |
| |
| if (RTA_PAYLOAD(rta) < sizeof(*param)) |
| return -EINVAL; |
| |
| param = RTA_DATA(rta); |
| enckeylen = be32_to_cpu(param->enckeylen); |
| key += RTA_ALIGN(rta->rta_len); |
| keylen -= RTA_ALIGN(rta->rta_len); |
| if (keylen < enckeylen) |
| return -EINVAL; |
| |
| if (keylen > OTX2_CPT_MAX_KEY_SIZE) |
| return -EINVAL; |
| |
| authkeylen = keylen - enckeylen; |
| memcpy(ctx->key, key, keylen); |
| |
| switch (enckeylen) { |
| case AES_KEYSIZE_128: |
| ctx->key_type = OTX2_CPT_AES_128_BIT; |
| break; |
| case AES_KEYSIZE_192: |
| ctx->key_type = OTX2_CPT_AES_192_BIT; |
| break; |
| case AES_KEYSIZE_256: |
| ctx->key_type = OTX2_CPT_AES_256_BIT; |
| break; |
| default: |
| /* Invalid key length */ |
| return -EINVAL; |
| } |
| |
| ctx->enc_key_len = enckeylen; |
| ctx->auth_key_len = authkeylen; |
| |
| status = aead_hmac_init(cipher); |
| if (status) |
| return status; |
| |
| return 0; |
| } |
| |
| static int otx2_cpt_aead_ecb_null_sha_setkey(struct crypto_aead *cipher, |
| const unsigned char *key, |
| unsigned int keylen) |
| { |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(cipher); |
| struct crypto_authenc_key_param *param; |
| struct rtattr *rta = (void *)key; |
| int enckeylen = 0; |
| |
| if (!RTA_OK(rta, keylen)) |
| return -EINVAL; |
| |
| if (rta->rta_type != CRYPTO_AUTHENC_KEYA_PARAM) |
| return -EINVAL; |
| |
| if (RTA_PAYLOAD(rta) < sizeof(*param)) |
| return -EINVAL; |
| |
| param = RTA_DATA(rta); |
| enckeylen = be32_to_cpu(param->enckeylen); |
| key += RTA_ALIGN(rta->rta_len); |
| keylen -= RTA_ALIGN(rta->rta_len); |
| if (enckeylen != 0) |
| return -EINVAL; |
| |
| if (keylen > OTX2_CPT_MAX_KEY_SIZE) |
| return -EINVAL; |
| |
| memcpy(ctx->key, key, keylen); |
| ctx->enc_key_len = enckeylen; |
| ctx->auth_key_len = keylen; |
| |
| return 0; |
| } |
| |
| static int otx2_cpt_aead_gcm_aes_setkey(struct crypto_aead *cipher, |
| const unsigned char *key, |
| unsigned int keylen) |
| { |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(cipher); |
| |
| /* |
| * For aes gcm we expect to get encryption key (16, 24, 32 bytes) |
| * and salt (4 bytes) |
| */ |
| switch (keylen) { |
| case AES_KEYSIZE_128 + AES_GCM_SALT_SIZE: |
| ctx->key_type = OTX2_CPT_AES_128_BIT; |
| ctx->enc_key_len = AES_KEYSIZE_128; |
| break; |
| case AES_KEYSIZE_192 + AES_GCM_SALT_SIZE: |
| ctx->key_type = OTX2_CPT_AES_192_BIT; |
| ctx->enc_key_len = AES_KEYSIZE_192; |
| break; |
| case AES_KEYSIZE_256 + AES_GCM_SALT_SIZE: |
| ctx->key_type = OTX2_CPT_AES_256_BIT; |
| ctx->enc_key_len = AES_KEYSIZE_256; |
| break; |
| default: |
| /* Invalid key and salt length */ |
| return -EINVAL; |
| } |
| |
| /* Store encryption key and salt */ |
| memcpy(ctx->key, key, keylen); |
| |
| return crypto_aead_setkey(ctx->fbk_cipher, key, keylen); |
| } |
| |
| static inline int create_aead_ctx_hdr(struct aead_request *req, u32 enc, |
| u32 *argcnt) |
| { |
| struct otx2_cpt_req_ctx *rctx = aead_request_ctx(req); |
| struct crypto_aead *tfm = crypto_aead_reqtfm(req); |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(tfm); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| struct otx2_cpt_fc_ctx *fctx = &rctx->fctx; |
| int mac_len = crypto_aead_authsize(tfm); |
| int ds; |
| |
| rctx->ctrl_word.e.enc_data_offset = req->assoclen; |
| |
| switch (ctx->cipher_type) { |
| case OTX2_CPT_AES_CBC: |
| if (req->assoclen > 248 || !IS_ALIGNED(req->assoclen, 8)) |
| return -EINVAL; |
| |
| fctx->enc.enc_ctrl.e.iv_source = OTX2_CPT_FROM_CPTR; |
| /* Copy encryption key to context */ |
| memcpy(fctx->enc.encr_key, ctx->key + ctx->auth_key_len, |
| ctx->enc_key_len); |
| /* Copy IV to context */ |
| memcpy(fctx->enc.encr_iv, req->iv, crypto_aead_ivsize(tfm)); |
| |
| ds = crypto_shash_digestsize(ctx->hashalg); |
| if (ctx->mac_type == OTX2_CPT_SHA384) |
| ds = SHA512_DIGEST_SIZE; |
| if (ctx->ipad) |
| memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); |
| if (ctx->opad) |
| memcpy(fctx->hmac.e.opad, ctx->opad, ds); |
| break; |
| |
| case OTX2_CPT_AES_GCM: |
| if (crypto_ipsec_check_assoclen(req->assoclen)) |
| return -EINVAL; |
| |
| fctx->enc.enc_ctrl.e.iv_source = OTX2_CPT_FROM_DPTR; |
| /* Copy encryption key to context */ |
| memcpy(fctx->enc.encr_key, ctx->key, ctx->enc_key_len); |
| /* Copy salt to context */ |
| memcpy(fctx->enc.encr_iv, ctx->key + ctx->enc_key_len, |
| AES_GCM_SALT_SIZE); |
| |
| rctx->ctrl_word.e.iv_offset = req->assoclen - AES_GCM_IV_OFFSET; |
| break; |
| |
| default: |
| /* Unknown cipher type */ |
| return -EINVAL; |
| } |
| cpu_to_be64s(&rctx->ctrl_word.flags); |
| |
| req_info->ctrl.s.dma_mode = OTX2_CPT_DMA_MODE_SG; |
| req_info->ctrl.s.se_req = 1; |
| req_info->req.opcode.s.major = OTX2_CPT_MAJOR_OP_FC | |
| DMA_MODE_FLAG(OTX2_CPT_DMA_MODE_SG); |
| if (enc) { |
| req_info->req.opcode.s.minor = 2; |
| req_info->req.param1 = req->cryptlen; |
| req_info->req.param2 = req->cryptlen + req->assoclen; |
| } else { |
| req_info->req.opcode.s.minor = 3; |
| req_info->req.param1 = req->cryptlen - mac_len; |
| req_info->req.param2 = req->cryptlen + req->assoclen - mac_len; |
| } |
| |
| fctx->enc.enc_ctrl.e.enc_cipher = ctx->cipher_type; |
| fctx->enc.enc_ctrl.e.aes_key = ctx->key_type; |
| fctx->enc.enc_ctrl.e.mac_type = ctx->mac_type; |
| fctx->enc.enc_ctrl.e.mac_len = mac_len; |
| cpu_to_be64s(&fctx->enc.enc_ctrl.u); |
| |
| /* |
| * Storing Packet Data Information in offset |
| * Control Word First 8 bytes |
| */ |
| req_info->in[*argcnt].vptr = (u8 *)&rctx->ctrl_word; |
| req_info->in[*argcnt].size = CONTROL_WORD_LEN; |
| req_info->req.dlen += CONTROL_WORD_LEN; |
| ++(*argcnt); |
| |
| req_info->in[*argcnt].vptr = (u8 *)fctx; |
| req_info->in[*argcnt].size = sizeof(struct otx2_cpt_fc_ctx); |
| req_info->req.dlen += sizeof(struct otx2_cpt_fc_ctx); |
| ++(*argcnt); |
| |
| return 0; |
| } |
| |
| static inline void create_hmac_ctx_hdr(struct aead_request *req, u32 *argcnt, |
| u32 enc) |
| { |
| struct otx2_cpt_req_ctx *rctx = aead_request_ctx(req); |
| struct crypto_aead *tfm = crypto_aead_reqtfm(req); |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(tfm); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| |
| req_info->ctrl.s.dma_mode = OTX2_CPT_DMA_MODE_SG; |
| req_info->ctrl.s.se_req = 1; |
| req_info->req.opcode.s.major = OTX2_CPT_MAJOR_OP_HMAC | |
| DMA_MODE_FLAG(OTX2_CPT_DMA_MODE_SG); |
| req_info->is_trunc_hmac = ctx->is_trunc_hmac; |
| |
| req_info->req.opcode.s.minor = 0; |
| req_info->req.param1 = ctx->auth_key_len; |
| req_info->req.param2 = ctx->mac_type << 8; |
| |
| /* Add authentication key */ |
| req_info->in[*argcnt].vptr = ctx->key; |
| req_info->in[*argcnt].size = round_up(ctx->auth_key_len, 8); |
| req_info->req.dlen += round_up(ctx->auth_key_len, 8); |
| ++(*argcnt); |
| } |
| |
| static inline int create_aead_input_list(struct aead_request *req, u32 enc) |
| { |
| struct otx2_cpt_req_ctx *rctx = aead_request_ctx(req); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| u32 inputlen = req->cryptlen + req->assoclen; |
| u32 status, argcnt = 0; |
| |
| status = create_aead_ctx_hdr(req, enc, &argcnt); |
| if (status) |
| return status; |
| update_input_data(req_info, req->src, inputlen, &argcnt); |
| req_info->in_cnt = argcnt; |
| |
| return 0; |
| } |
| |
| static inline void create_aead_output_list(struct aead_request *req, u32 enc, |
| u32 mac_len) |
| { |
| struct otx2_cpt_req_ctx *rctx = aead_request_ctx(req); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| u32 argcnt = 0, outputlen = 0; |
| |
| if (enc) |
| outputlen = req->cryptlen + req->assoclen + mac_len; |
| else |
| outputlen = req->cryptlen + req->assoclen - mac_len; |
| |
| update_output_data(req_info, req->dst, 0, outputlen, &argcnt); |
| req_info->out_cnt = argcnt; |
| } |
| |
| static inline void create_aead_null_input_list(struct aead_request *req, |
| u32 enc, u32 mac_len) |
| { |
| struct otx2_cpt_req_ctx *rctx = aead_request_ctx(req); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| u32 inputlen, argcnt = 0; |
| |
| if (enc) |
| inputlen = req->cryptlen + req->assoclen; |
| else |
| inputlen = req->cryptlen + req->assoclen - mac_len; |
| |
| create_hmac_ctx_hdr(req, &argcnt, enc); |
| update_input_data(req_info, req->src, inputlen, &argcnt); |
| req_info->in_cnt = argcnt; |
| } |
| |
| static inline int create_aead_null_output_list(struct aead_request *req, |
| u32 enc, u32 mac_len) |
| { |
| struct otx2_cpt_req_ctx *rctx = aead_request_ctx(req); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| struct scatterlist *dst; |
| u8 *ptr = NULL; |
| int argcnt = 0, status, offset; |
| u32 inputlen; |
| |
| if (enc) |
| inputlen = req->cryptlen + req->assoclen; |
| else |
| inputlen = req->cryptlen + req->assoclen - mac_len; |
| |
| /* |
| * If source and destination are different |
| * then copy payload to destination |
| */ |
| if (req->src != req->dst) { |
| |
| ptr = kmalloc(inputlen, (req_info->areq->flags & |
| CRYPTO_TFM_REQ_MAY_SLEEP) ? |
| GFP_KERNEL : GFP_ATOMIC); |
| if (!ptr) |
| return -ENOMEM; |
| |
| status = sg_copy_to_buffer(req->src, sg_nents(req->src), ptr, |
| inputlen); |
| if (status != inputlen) { |
| status = -EINVAL; |
| goto error_free; |
| } |
| status = sg_copy_from_buffer(req->dst, sg_nents(req->dst), ptr, |
| inputlen); |
| if (status != inputlen) { |
| status = -EINVAL; |
| goto error_free; |
| } |
| kfree(ptr); |
| } |
| |
| if (enc) { |
| /* |
| * In an encryption scenario hmac needs |
| * to be appended after payload |
| */ |
| dst = req->dst; |
| offset = inputlen; |
| while (offset >= dst->length) { |
| offset -= dst->length; |
| dst = sg_next(dst); |
| if (!dst) |
| return -ENOENT; |
| } |
| |
| update_output_data(req_info, dst, offset, mac_len, &argcnt); |
| } else { |
| /* |
| * In a decryption scenario calculated hmac for received |
| * payload needs to be compare with hmac received |
| */ |
| status = sg_copy_buffer(req->src, sg_nents(req->src), |
| rctx->fctx.hmac.s.hmac_recv, mac_len, |
| inputlen, true); |
| if (status != mac_len) |
| return -EINVAL; |
| |
| req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc; |
| req_info->out[argcnt].size = mac_len; |
| argcnt++; |
| } |
| |
| req_info->out_cnt = argcnt; |
| return 0; |
| |
| error_free: |
| kfree(ptr); |
| return status; |
| } |
| |
| static int aead_do_fallback(struct aead_request *req, bool is_enc) |
| { |
| struct otx2_cpt_req_ctx *rctx = aead_request_ctx(req); |
| struct crypto_aead *aead = crypto_aead_reqtfm(req); |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(aead); |
| int ret; |
| |
| if (ctx->fbk_cipher) { |
| /* Store the cipher tfm and then use the fallback tfm */ |
| aead_request_set_tfm(&rctx->fbk_req, ctx->fbk_cipher); |
| aead_request_set_callback(&rctx->fbk_req, req->base.flags, |
| req->base.complete, req->base.data); |
| aead_request_set_crypt(&rctx->fbk_req, req->src, |
| req->dst, req->cryptlen, req->iv); |
| ret = is_enc ? crypto_aead_encrypt(&rctx->fbk_req) : |
| crypto_aead_decrypt(&rctx->fbk_req); |
| } else { |
| ret = -EINVAL; |
| } |
| |
| return ret; |
| } |
| |
| static int cpt_aead_enc_dec(struct aead_request *req, u8 reg_type, u8 enc) |
| { |
| struct otx2_cpt_req_ctx *rctx = aead_request_ctx(req); |
| struct otx2_cpt_req_info *req_info = &rctx->cpt_req; |
| struct crypto_aead *tfm = crypto_aead_reqtfm(req); |
| struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx(tfm); |
| struct pci_dev *pdev; |
| int status, cpu_num; |
| |
| /* Clear control words */ |
| rctx->ctrl_word.flags = 0; |
| rctx->fctx.enc.enc_ctrl.u = 0; |
| |
| req_info->callback = otx2_cpt_aead_callback; |
| req_info->areq = &req->base; |
| req_info->req_type = reg_type; |
| req_info->is_enc = enc; |
| req_info->is_trunc_hmac = false; |
| |
| switch (reg_type) { |
| case OTX2_CPT_AEAD_ENC_DEC_REQ: |
| status = create_aead_input_list(req, enc); |
| if (status) |
| return status; |
| create_aead_output_list(req, enc, crypto_aead_authsize(tfm)); |
| break; |
| |
| case OTX2_CPT_AEAD_ENC_DEC_NULL_REQ: |
| create_aead_null_input_list(req, enc, |
| crypto_aead_authsize(tfm)); |
| status = create_aead_null_output_list(req, enc, |
| crypto_aead_authsize(tfm)); |
| if (status) |
| return status; |
| break; |
| |
| default: |
| return -EINVAL; |
| } |
| if (!IS_ALIGNED(req_info->req.param1, ctx->enc_align_len)) |
| return -EINVAL; |
| |
| if (!req_info->req.param2 || |
| (req_info->req.param1 > OTX2_CPT_MAX_REQ_SIZE) || |
| (req_info->req.param2 > OTX2_CPT_MAX_REQ_SIZE)) |
| return aead_do_fallback(req, enc); |
| |
| status = get_se_device(&pdev, &cpu_num); |
| if (status) |
| return status; |
| |
| req_info->ctrl.s.grp = otx2_cpt_get_kcrypto_eng_grp_num(pdev); |
| |
| /* |
| * We perform an asynchronous send and once |
| * the request is completed the driver would |
| * intimate through registered call back functions |
| */ |
| return otx2_cpt_do_request(pdev, req_info, cpu_num); |
| } |
| |
| static int otx2_cpt_aead_encrypt(struct aead_request *req) |
| { |
| return cpt_aead_enc_dec(req, OTX2_CPT_AEAD_ENC_DEC_REQ, true); |
| } |
| |
| static int otx2_cpt_aead_decrypt(struct aead_request *req) |
| { |
| return cpt_aead_enc_dec(req, OTX2_CPT_AEAD_ENC_DEC_REQ, false); |
| } |
| |
| static int otx2_cpt_aead_null_encrypt(struct aead_request *req) |
| { |
| return cpt_aead_enc_dec(req, OTX2_CPT_AEAD_ENC_DEC_NULL_REQ, true); |
| } |
| |
| static int otx2_cpt_aead_null_decrypt(struct aead_request *req) |
| { |
| return cpt_aead_enc_dec(req, OTX2_CPT_AEAD_ENC_DEC_NULL_REQ, false); |
| } |
| |
| static struct skcipher_alg otx2_cpt_skciphers[] = { { |
| .base.cra_name = "xts(aes)", |
| .base.cra_driver_name = "cpt_xts_aes", |
| .base.cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .base.cra_blocksize = AES_BLOCK_SIZE, |
| .base.cra_ctxsize = sizeof(struct otx2_cpt_enc_ctx), |
| .base.cra_alignmask = 7, |
| .base.cra_priority = 4001, |
| .base.cra_module = THIS_MODULE, |
| |
| .init = otx2_cpt_enc_dec_init, |
| .exit = otx2_cpt_skcipher_exit, |
| .ivsize = AES_BLOCK_SIZE, |
| .min_keysize = 2 * AES_MIN_KEY_SIZE, |
| .max_keysize = 2 * AES_MAX_KEY_SIZE, |
| .setkey = otx2_cpt_skcipher_xts_setkey, |
| .encrypt = otx2_cpt_skcipher_encrypt, |
| .decrypt = otx2_cpt_skcipher_decrypt, |
| }, { |
| .base.cra_name = "cbc(aes)", |
| .base.cra_driver_name = "cpt_cbc_aes", |
| .base.cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .base.cra_blocksize = AES_BLOCK_SIZE, |
| .base.cra_ctxsize = sizeof(struct otx2_cpt_enc_ctx), |
| .base.cra_alignmask = 7, |
| .base.cra_priority = 4001, |
| .base.cra_module = THIS_MODULE, |
| |
| .init = otx2_cpt_enc_dec_init, |
| .exit = otx2_cpt_skcipher_exit, |
| .ivsize = AES_BLOCK_SIZE, |
| .min_keysize = AES_MIN_KEY_SIZE, |
| .max_keysize = AES_MAX_KEY_SIZE, |
| .setkey = otx2_cpt_skcipher_cbc_aes_setkey, |
| .encrypt = otx2_cpt_skcipher_encrypt, |
| .decrypt = otx2_cpt_skcipher_decrypt, |
| }, { |
| .base.cra_name = "ecb(aes)", |
| .base.cra_driver_name = "cpt_ecb_aes", |
| .base.cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .base.cra_blocksize = AES_BLOCK_SIZE, |
| .base.cra_ctxsize = sizeof(struct otx2_cpt_enc_ctx), |
| .base.cra_alignmask = 7, |
| .base.cra_priority = 4001, |
| .base.cra_module = THIS_MODULE, |
| |
| .init = otx2_cpt_enc_dec_init, |
| .exit = otx2_cpt_skcipher_exit, |
| .ivsize = 0, |
| .min_keysize = AES_MIN_KEY_SIZE, |
| .max_keysize = AES_MAX_KEY_SIZE, |
| .setkey = otx2_cpt_skcipher_ecb_aes_setkey, |
| .encrypt = otx2_cpt_skcipher_encrypt, |
| .decrypt = otx2_cpt_skcipher_decrypt, |
| }, { |
| .base.cra_name = "cbc(des3_ede)", |
| .base.cra_driver_name = "cpt_cbc_des3_ede", |
| .base.cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .base.cra_blocksize = DES3_EDE_BLOCK_SIZE, |
| .base.cra_ctxsize = sizeof(struct otx2_cpt_enc_ctx), |
| .base.cra_alignmask = 7, |
| .base.cra_priority = 4001, |
| .base.cra_module = THIS_MODULE, |
| |
| .init = otx2_cpt_enc_dec_init, |
| .exit = otx2_cpt_skcipher_exit, |
| .min_keysize = DES3_EDE_KEY_SIZE, |
| .max_keysize = DES3_EDE_KEY_SIZE, |
| .ivsize = DES_BLOCK_SIZE, |
| .setkey = otx2_cpt_skcipher_cbc_des3_setkey, |
| .encrypt = otx2_cpt_skcipher_encrypt, |
| .decrypt = otx2_cpt_skcipher_decrypt, |
| }, { |
| .base.cra_name = "ecb(des3_ede)", |
| .base.cra_driver_name = "cpt_ecb_des3_ede", |
| .base.cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .base.cra_blocksize = DES3_EDE_BLOCK_SIZE, |
| .base.cra_ctxsize = sizeof(struct otx2_cpt_enc_ctx), |
| .base.cra_alignmask = 7, |
| .base.cra_priority = 4001, |
| .base.cra_module = THIS_MODULE, |
| |
| .init = otx2_cpt_enc_dec_init, |
| .exit = otx2_cpt_skcipher_exit, |
| .min_keysize = DES3_EDE_KEY_SIZE, |
| .max_keysize = DES3_EDE_KEY_SIZE, |
| .ivsize = 0, |
| .setkey = otx2_cpt_skcipher_ecb_des3_setkey, |
| .encrypt = otx2_cpt_skcipher_encrypt, |
| .decrypt = otx2_cpt_skcipher_decrypt, |
| } }; |
| |
| static struct aead_alg otx2_cpt_aeads[] = { { |
| .base = { |
| .cra_name = "authenc(hmac(sha1),cbc(aes))", |
| .cra_driver_name = "cpt_hmac_sha1_cbc_aes", |
| .cra_blocksize = AES_BLOCK_SIZE, |
| .cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .cra_ctxsize = sizeof(struct otx2_cpt_aead_ctx), |
| .cra_priority = 4001, |
| .cra_alignmask = 0, |
| .cra_module = THIS_MODULE, |
| }, |
| .init = otx2_cpt_aead_cbc_aes_sha1_init, |
| .exit = otx2_cpt_aead_exit, |
| .setkey = otx2_cpt_aead_cbc_aes_sha_setkey, |
| .setauthsize = otx2_cpt_aead_set_authsize, |
| .encrypt = otx2_cpt_aead_encrypt, |
| .decrypt = otx2_cpt_aead_decrypt, |
| .ivsize = AES_BLOCK_SIZE, |
| .maxauthsize = SHA1_DIGEST_SIZE, |
| }, { |
| .base = { |
| .cra_name = "authenc(hmac(sha256),cbc(aes))", |
| .cra_driver_name = "cpt_hmac_sha256_cbc_aes", |
| .cra_blocksize = AES_BLOCK_SIZE, |
| .cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .cra_ctxsize = sizeof(struct otx2_cpt_aead_ctx), |
| .cra_priority = 4001, |
| .cra_alignmask = 0, |
| .cra_module = THIS_MODULE, |
| }, |
| .init = otx2_cpt_aead_cbc_aes_sha256_init, |
| .exit = otx2_cpt_aead_exit, |
| .setkey = otx2_cpt_aead_cbc_aes_sha_setkey, |
| .setauthsize = otx2_cpt_aead_set_authsize, |
| .encrypt = otx2_cpt_aead_encrypt, |
| .decrypt = otx2_cpt_aead_decrypt, |
| .ivsize = AES_BLOCK_SIZE, |
| .maxauthsize = SHA256_DIGEST_SIZE, |
| }, { |
| .base = { |
| .cra_name = "authenc(hmac(sha384),cbc(aes))", |
| .cra_driver_name = "cpt_hmac_sha384_cbc_aes", |
| .cra_blocksize = AES_BLOCK_SIZE, |
| .cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .cra_ctxsize = sizeof(struct otx2_cpt_aead_ctx), |
| .cra_priority = 4001, |
| .cra_alignmask = 0, |
| .cra_module = THIS_MODULE, |
| }, |
| .init = otx2_cpt_aead_cbc_aes_sha384_init, |
| .exit = otx2_cpt_aead_exit, |
| .setkey = otx2_cpt_aead_cbc_aes_sha_setkey, |
| .setauthsize = otx2_cpt_aead_set_authsize, |
| .encrypt = otx2_cpt_aead_encrypt, |
| .decrypt = otx2_cpt_aead_decrypt, |
| .ivsize = AES_BLOCK_SIZE, |
| .maxauthsize = SHA384_DIGEST_SIZE, |
| }, { |
| .base = { |
| .cra_name = "authenc(hmac(sha512),cbc(aes))", |
| .cra_driver_name = "cpt_hmac_sha512_cbc_aes", |
| .cra_blocksize = AES_BLOCK_SIZE, |
| .cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .cra_ctxsize = sizeof(struct otx2_cpt_aead_ctx), |
| .cra_priority = 4001, |
| .cra_alignmask = 0, |
| .cra_module = THIS_MODULE, |
| }, |
| .init = otx2_cpt_aead_cbc_aes_sha512_init, |
| .exit = otx2_cpt_aead_exit, |
| .setkey = otx2_cpt_aead_cbc_aes_sha_setkey, |
| .setauthsize = otx2_cpt_aead_set_authsize, |
| .encrypt = otx2_cpt_aead_encrypt, |
| .decrypt = otx2_cpt_aead_decrypt, |
| .ivsize = AES_BLOCK_SIZE, |
| .maxauthsize = SHA512_DIGEST_SIZE, |
| }, { |
| .base = { |
| .cra_name = "authenc(hmac(sha1),ecb(cipher_null))", |
| .cra_driver_name = "cpt_hmac_sha1_ecb_null", |
| .cra_blocksize = 1, |
| .cra_flags = CRYPTO_ALG_ASYNC, |
| .cra_ctxsize = sizeof(struct otx2_cpt_aead_ctx), |
| .cra_priority = 4001, |
| .cra_alignmask = 0, |
| .cra_module = THIS_MODULE, |
| }, |
| .init = otx2_cpt_aead_ecb_null_sha1_init, |
| .exit = otx2_cpt_aead_exit, |
| .setkey = otx2_cpt_aead_ecb_null_sha_setkey, |
| .setauthsize = otx2_cpt_aead_null_set_authsize, |
| .encrypt = otx2_cpt_aead_null_encrypt, |
| .decrypt = otx2_cpt_aead_null_decrypt, |
| .ivsize = 0, |
| .maxauthsize = SHA1_DIGEST_SIZE, |
| }, { |
| .base = { |
| .cra_name = "authenc(hmac(sha256),ecb(cipher_null))", |
| .cra_driver_name = "cpt_hmac_sha256_ecb_null", |
| .cra_blocksize = 1, |
| .cra_flags = CRYPTO_ALG_ASYNC, |
| .cra_ctxsize = sizeof(struct otx2_cpt_aead_ctx), |
| .cra_priority = 4001, |
| .cra_alignmask = 0, |
| .cra_module = THIS_MODULE, |
| }, |
| .init = otx2_cpt_aead_ecb_null_sha256_init, |
| .exit = otx2_cpt_aead_exit, |
| .setkey = otx2_cpt_aead_ecb_null_sha_setkey, |
| .setauthsize = otx2_cpt_aead_null_set_authsize, |
| .encrypt = otx2_cpt_aead_null_encrypt, |
| .decrypt = otx2_cpt_aead_null_decrypt, |
| .ivsize = 0, |
| .maxauthsize = SHA256_DIGEST_SIZE, |
| }, { |
| .base = { |
| .cra_name = "authenc(hmac(sha384),ecb(cipher_null))", |
| .cra_driver_name = "cpt_hmac_sha384_ecb_null", |
| .cra_blocksize = 1, |
| .cra_flags = CRYPTO_ALG_ASYNC, |
| .cra_ctxsize = sizeof(struct otx2_cpt_aead_ctx), |
| .cra_priority = 4001, |
| .cra_alignmask = 0, |
| .cra_module = THIS_MODULE, |
| }, |
| .init = otx2_cpt_aead_ecb_null_sha384_init, |
| .exit = otx2_cpt_aead_exit, |
| .setkey = otx2_cpt_aead_ecb_null_sha_setkey, |
| .setauthsize = otx2_cpt_aead_null_set_authsize, |
| .encrypt = otx2_cpt_aead_null_encrypt, |
| .decrypt = otx2_cpt_aead_null_decrypt, |
| .ivsize = 0, |
| .maxauthsize = SHA384_DIGEST_SIZE, |
| }, { |
| .base = { |
| .cra_name = "authenc(hmac(sha512),ecb(cipher_null))", |
| .cra_driver_name = "cpt_hmac_sha512_ecb_null", |
| .cra_blocksize = 1, |
| .cra_flags = CRYPTO_ALG_ASYNC, |
| .cra_ctxsize = sizeof(struct otx2_cpt_aead_ctx), |
| .cra_priority = 4001, |
| .cra_alignmask = 0, |
| .cra_module = THIS_MODULE, |
| }, |
| .init = otx2_cpt_aead_ecb_null_sha512_init, |
| .exit = otx2_cpt_aead_exit, |
| .setkey = otx2_cpt_aead_ecb_null_sha_setkey, |
| .setauthsize = otx2_cpt_aead_null_set_authsize, |
| .encrypt = otx2_cpt_aead_null_encrypt, |
| .decrypt = otx2_cpt_aead_null_decrypt, |
| .ivsize = 0, |
| .maxauthsize = SHA512_DIGEST_SIZE, |
| }, { |
| .base = { |
| .cra_name = "rfc4106(gcm(aes))", |
| .cra_driver_name = "cpt_rfc4106_gcm_aes", |
| .cra_blocksize = 1, |
| .cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, |
| .cra_ctxsize = sizeof(struct otx2_cpt_aead_ctx), |
| .cra_priority = 4001, |
| .cra_alignmask = 0, |
| .cra_module = THIS_MODULE, |
| }, |
| .init = otx2_cpt_aead_gcm_aes_init, |
| .exit = otx2_cpt_aead_exit, |
| .setkey = otx2_cpt_aead_gcm_aes_setkey, |
| .setauthsize = otx2_cpt_aead_gcm_set_authsize, |
| .encrypt = otx2_cpt_aead_encrypt, |
| .decrypt = otx2_cpt_aead_decrypt, |
| .ivsize = AES_GCM_IV_SIZE, |
| .maxauthsize = AES_GCM_ICV_SIZE, |
| } }; |
| |
| static inline int cpt_register_algs(void) |
| { |
| int i, err = 0; |
| |
| if (!IS_ENABLED(CONFIG_DM_CRYPT)) { |
| for (i = 0; i < ARRAY_SIZE(otx2_cpt_skciphers); i++) |
| otx2_cpt_skciphers[i].base.cra_flags &= |
| ~CRYPTO_ALG_DEAD; |
| |
| err = crypto_register_skciphers(otx2_cpt_skciphers, |
| ARRAY_SIZE(otx2_cpt_skciphers)); |
| if (err) |
| return err; |
| } |
| |
| for (i = 0; i < ARRAY_SIZE(otx2_cpt_aeads); i++) |
| otx2_cpt_aeads[i].base.cra_flags &= ~CRYPTO_ALG_DEAD; |
| |
| err = crypto_register_aeads(otx2_cpt_aeads, |
| ARRAY_SIZE(otx2_cpt_aeads)); |
| if (err) { |
| crypto_unregister_skciphers(otx2_cpt_skciphers, |
| ARRAY_SIZE(otx2_cpt_skciphers)); |
| return err; |
| } |
| |
| return 0; |
| } |
| |
| static inline void cpt_unregister_algs(void) |
| { |
| crypto_unregister_skciphers(otx2_cpt_skciphers, |
| ARRAY_SIZE(otx2_cpt_skciphers)); |
| crypto_unregister_aeads(otx2_cpt_aeads, ARRAY_SIZE(otx2_cpt_aeads)); |
| } |
| |
| static int compare_func(const void *lptr, const void *rptr) |
| { |
| const struct cpt_device_desc *ldesc = (struct cpt_device_desc *) lptr; |
| const struct cpt_device_desc *rdesc = (struct cpt_device_desc *) rptr; |
| |
| if (ldesc->dev->devfn < rdesc->dev->devfn) |
| return -1; |
| if (ldesc->dev->devfn > rdesc->dev->devfn) |
| return 1; |
| return 0; |
| } |
| |
| static void swap_func(void *lptr, void *rptr, int size) |
| { |
| struct cpt_device_desc *ldesc = lptr; |
| struct cpt_device_desc *rdesc = rptr; |
| struct cpt_device_desc desc; |
| |
| desc = *ldesc; |
| *ldesc = *rdesc; |
| *rdesc = desc; |
| } |
| |
| int otx2_cpt_crypto_init(struct pci_dev *pdev, struct module *mod, |
| int num_queues, int num_devices) |
| { |
| int ret = 0; |
| int count; |
| |
| mutex_lock(&mutex); |
| count = atomic_read(&se_devices.count); |
| if (count >= OTX2_CPT_MAX_LFS_NUM) { |
| dev_err(&pdev->dev, "No space to add a new device\n"); |
| ret = -ENOSPC; |
| goto unlock; |
| } |
| se_devices.desc[count].num_queues = num_queues; |
| se_devices.desc[count++].dev = pdev; |
| atomic_inc(&se_devices.count); |
| |
| if (atomic_read(&se_devices.count) == num_devices && |
| is_crypto_registered == false) { |
| if (cpt_register_algs()) { |
| dev_err(&pdev->dev, |
| "Error in registering crypto algorithms\n"); |
| ret = -EINVAL; |
| goto unlock; |
| } |
| try_module_get(mod); |
| is_crypto_registered = true; |
| } |
| sort(se_devices.desc, count, sizeof(struct cpt_device_desc), |
| compare_func, swap_func); |
| |
| unlock: |
| mutex_unlock(&mutex); |
| return ret; |
| } |
| |
| void otx2_cpt_crypto_exit(struct pci_dev *pdev, struct module *mod) |
| { |
| struct cpt_device_table *dev_tbl; |
| bool dev_found = false; |
| int i, j, count; |
| |
| mutex_lock(&mutex); |
| |
| dev_tbl = &se_devices; |
| count = atomic_read(&dev_tbl->count); |
| for (i = 0; i < count; i++) { |
| if (pdev == dev_tbl->desc[i].dev) { |
| for (j = i; j < count-1; j++) |
| dev_tbl->desc[j] = dev_tbl->desc[j+1]; |
| dev_found = true; |
| break; |
| } |
| } |
| |
| if (!dev_found) { |
| dev_err(&pdev->dev, "%s device not found\n", __func__); |
| goto unlock; |
| } |
| if (atomic_dec_and_test(&se_devices.count)) { |
| cpt_unregister_algs(); |
| module_put(mod); |
| is_crypto_registered = false; |
| } |
| |
| unlock: |
| mutex_unlock(&mutex); |
| } |