nx-aes-ecb.c (3146B)
1// SPDX-License-Identifier: GPL-2.0-only 2/* 3 * AES ECB routines supporting the Power 7+ Nest Accelerators driver 4 * 5 * Copyright (C) 2011-2012 International Business Machines Inc. 6 * 7 * Author: Kent Yoder <yoder1@us.ibm.com> 8 */ 9 10#include <crypto/aes.h> 11#include <crypto/algapi.h> 12#include <linux/module.h> 13#include <linux/types.h> 14#include <linux/crypto.h> 15#include <asm/vio.h> 16 17#include "nx_csbcpb.h" 18#include "nx.h" 19 20 21static int ecb_aes_nx_set_key(struct crypto_skcipher *tfm, 22 const u8 *in_key, 23 unsigned int key_len) 24{ 25 struct nx_crypto_ctx *nx_ctx = crypto_skcipher_ctx(tfm); 26 struct nx_csbcpb *csbcpb = (struct nx_csbcpb *)nx_ctx->csbcpb; 27 28 nx_ctx_init(nx_ctx, HCOP_FC_AES); 29 30 switch (key_len) { 31 case AES_KEYSIZE_128: 32 NX_CPB_SET_KEY_SIZE(csbcpb, NX_KS_AES_128); 33 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_128]; 34 break; 35 case AES_KEYSIZE_192: 36 NX_CPB_SET_KEY_SIZE(csbcpb, NX_KS_AES_192); 37 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_192]; 38 break; 39 case AES_KEYSIZE_256: 40 NX_CPB_SET_KEY_SIZE(csbcpb, NX_KS_AES_256); 41 nx_ctx->ap = &nx_ctx->props[NX_PROPS_AES_256]; 42 break; 43 default: 44 return -EINVAL; 45 } 46 47 csbcpb->cpb.hdr.mode = NX_MODE_AES_ECB; 48 memcpy(csbcpb->cpb.aes_ecb.key, in_key, key_len); 49 50 return 0; 51} 52 53static int ecb_aes_nx_crypt(struct skcipher_request *req, 54 int enc) 55{ 56 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); 57 struct nx_crypto_ctx *nx_ctx = crypto_skcipher_ctx(tfm); 58 struct nx_csbcpb *csbcpb = nx_ctx->csbcpb; 59 unsigned long irq_flags; 60 unsigned int processed = 0, to_process; 61 int rc; 62 63 spin_lock_irqsave(&nx_ctx->lock, irq_flags); 64 65 if (enc) 66 NX_CPB_FDM(csbcpb) |= NX_FDM_ENDE_ENCRYPT; 67 else 68 NX_CPB_FDM(csbcpb) &= ~NX_FDM_ENDE_ENCRYPT; 69 70 do { 71 to_process = req->cryptlen - processed; 72 73 rc = nx_build_sg_lists(nx_ctx, NULL, req->dst, req->src, 74 &to_process, processed, NULL); 75 if (rc) 76 goto out; 77 78 if (!nx_ctx->op.inlen || !nx_ctx->op.outlen) { 79 rc = -EINVAL; 80 goto out; 81 } 82 83 rc = nx_hcall_sync(nx_ctx, &nx_ctx->op, 84 req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP); 85 if (rc) 86 goto out; 87 88 atomic_inc(&(nx_ctx->stats->aes_ops)); 89 atomic64_add(be32_to_cpu(csbcpb->csb.processed_byte_count), 90 &(nx_ctx->stats->aes_bytes)); 91 92 processed += to_process; 93 } while (processed < req->cryptlen); 94 95out: 96 spin_unlock_irqrestore(&nx_ctx->lock, irq_flags); 97 return rc; 98} 99 100static int ecb_aes_nx_encrypt(struct skcipher_request *req) 101{ 102 return ecb_aes_nx_crypt(req, 1); 103} 104 105static int ecb_aes_nx_decrypt(struct skcipher_request *req) 106{ 107 return ecb_aes_nx_crypt(req, 0); 108} 109 110struct skcipher_alg nx_ecb_aes_alg = { 111 .base.cra_name = "ecb(aes)", 112 .base.cra_driver_name = "ecb-aes-nx", 113 .base.cra_priority = 300, 114 .base.cra_blocksize = AES_BLOCK_SIZE, 115 .base.cra_alignmask = 0xf, 116 .base.cra_ctxsize = sizeof(struct nx_crypto_ctx), 117 .base.cra_module = THIS_MODULE, 118 .init = nx_crypto_ctx_aes_ecb_init, 119 .exit = nx_crypto_ctx_skcipher_exit, 120 .min_keysize = AES_MIN_KEY_SIZE, 121 .max_keysize = AES_MAX_KEY_SIZE, 122 .setkey = ecb_aes_nx_set_key, 123 .encrypt = ecb_aes_nx_encrypt, 124 .decrypt = ecb_aes_nx_decrypt, 125};