]>
Commit | Line | Data |
---|---|---|
a62b01cd AB |
1 | /* |
2 | * Shared async block cipher helpers | |
3 | * | |
4 | * Copyright (c) 2012 Jussi Kivilinna <[email protected]> | |
5 | * | |
6 | * Based on aesni-intel_glue.c by: | |
7 | * Copyright (C) 2008, Intel Corp. | |
8 | * Author: Huang Ying <[email protected]> | |
9 | * | |
10 | * This program is free software; you can redistribute it and/or modify | |
11 | * it under the terms of the GNU General Public License as published by | |
12 | * the Free Software Foundation; either version 2 of the License, or | |
13 | * (at your option) any later version. | |
14 | * | |
15 | * This program is distributed in the hope that it will be useful, | |
16 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | * GNU General Public License for more details. | |
19 | * | |
20 | * You should have received a copy of the GNU General Public License | |
21 | * along with this program; if not, write to the Free Software | |
22 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
23 | * USA | |
24 | * | |
25 | */ | |
26 | ||
27 | #include <linux/kernel.h> | |
28 | #include <linux/crypto.h> | |
29 | #include <linux/init.h> | |
30 | #include <linux/module.h> | |
31 | #include <linux/hardirq.h> | |
32 | #include <crypto/algapi.h> | |
33 | #include <crypto/cryptd.h> | |
34 | #include <crypto/ablk_helper.h> | |
35 | #include <asm/simd.h> | |
36 | ||
37 | int ablk_set_key(struct crypto_ablkcipher *tfm, const u8 *key, | |
38 | unsigned int key_len) | |
39 | { | |
40 | struct async_helper_ctx *ctx = crypto_ablkcipher_ctx(tfm); | |
41 | struct crypto_ablkcipher *child = &ctx->cryptd_tfm->base; | |
42 | int err; | |
43 | ||
44 | crypto_ablkcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); | |
45 | crypto_ablkcipher_set_flags(child, crypto_ablkcipher_get_flags(tfm) | |
46 | & CRYPTO_TFM_REQ_MASK); | |
47 | err = crypto_ablkcipher_setkey(child, key, key_len); | |
48 | crypto_ablkcipher_set_flags(tfm, crypto_ablkcipher_get_flags(child) | |
49 | & CRYPTO_TFM_RES_MASK); | |
50 | return err; | |
51 | } | |
52 | EXPORT_SYMBOL_GPL(ablk_set_key); | |
53 | ||
54 | int __ablk_encrypt(struct ablkcipher_request *req) | |
55 | { | |
56 | struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(req); | |
57 | struct async_helper_ctx *ctx = crypto_ablkcipher_ctx(tfm); | |
58 | struct blkcipher_desc desc; | |
59 | ||
60 | desc.tfm = cryptd_ablkcipher_child(ctx->cryptd_tfm); | |
61 | desc.info = req->info; | |
62 | desc.flags = 0; | |
63 | ||
64 | return crypto_blkcipher_crt(desc.tfm)->encrypt( | |
65 | &desc, req->dst, req->src, req->nbytes); | |
66 | } | |
67 | EXPORT_SYMBOL_GPL(__ablk_encrypt); | |
68 | ||
69 | int ablk_encrypt(struct ablkcipher_request *req) | |
70 | { | |
71 | struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(req); | |
72 | struct async_helper_ctx *ctx = crypto_ablkcipher_ctx(tfm); | |
73 | ||
88407a39 HX |
74 | if (!may_use_simd() || |
75 | (in_atomic() && cryptd_ablkcipher_queued(ctx->cryptd_tfm))) { | |
a62b01cd AB |
76 | struct ablkcipher_request *cryptd_req = |
77 | ablkcipher_request_ctx(req); | |
78 | ||
ea493d32 | 79 | *cryptd_req = *req; |
a62b01cd AB |
80 | ablkcipher_request_set_tfm(cryptd_req, &ctx->cryptd_tfm->base); |
81 | ||
82 | return crypto_ablkcipher_encrypt(cryptd_req); | |
83 | } else { | |
84 | return __ablk_encrypt(req); | |
85 | } | |
86 | } | |
87 | EXPORT_SYMBOL_GPL(ablk_encrypt); | |
88 | ||
89 | int ablk_decrypt(struct ablkcipher_request *req) | |
90 | { | |
91 | struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(req); | |
92 | struct async_helper_ctx *ctx = crypto_ablkcipher_ctx(tfm); | |
93 | ||
88407a39 HX |
94 | if (!may_use_simd() || |
95 | (in_atomic() && cryptd_ablkcipher_queued(ctx->cryptd_tfm))) { | |
a62b01cd AB |
96 | struct ablkcipher_request *cryptd_req = |
97 | ablkcipher_request_ctx(req); | |
98 | ||
ea493d32 | 99 | *cryptd_req = *req; |
a62b01cd AB |
100 | ablkcipher_request_set_tfm(cryptd_req, &ctx->cryptd_tfm->base); |
101 | ||
102 | return crypto_ablkcipher_decrypt(cryptd_req); | |
103 | } else { | |
104 | struct blkcipher_desc desc; | |
105 | ||
106 | desc.tfm = cryptd_ablkcipher_child(ctx->cryptd_tfm); | |
107 | desc.info = req->info; | |
108 | desc.flags = 0; | |
109 | ||
110 | return crypto_blkcipher_crt(desc.tfm)->decrypt( | |
111 | &desc, req->dst, req->src, req->nbytes); | |
112 | } | |
113 | } | |
114 | EXPORT_SYMBOL_GPL(ablk_decrypt); | |
115 | ||
116 | void ablk_exit(struct crypto_tfm *tfm) | |
117 | { | |
118 | struct async_helper_ctx *ctx = crypto_tfm_ctx(tfm); | |
119 | ||
120 | cryptd_free_ablkcipher(ctx->cryptd_tfm); | |
121 | } | |
122 | EXPORT_SYMBOL_GPL(ablk_exit); | |
123 | ||
124 | int ablk_init_common(struct crypto_tfm *tfm, const char *drv_name) | |
125 | { | |
126 | struct async_helper_ctx *ctx = crypto_tfm_ctx(tfm); | |
127 | struct cryptd_ablkcipher *cryptd_tfm; | |
128 | ||
466a7b9e SM |
129 | cryptd_tfm = cryptd_alloc_ablkcipher(drv_name, CRYPTO_ALG_INTERNAL, |
130 | CRYPTO_ALG_INTERNAL); | |
a62b01cd AB |
131 | if (IS_ERR(cryptd_tfm)) |
132 | return PTR_ERR(cryptd_tfm); | |
133 | ||
134 | ctx->cryptd_tfm = cryptd_tfm; | |
135 | tfm->crt_ablkcipher.reqsize = sizeof(struct ablkcipher_request) + | |
136 | crypto_ablkcipher_reqsize(&cryptd_tfm->base); | |
137 | ||
138 | return 0; | |
139 | } | |
140 | EXPORT_SYMBOL_GPL(ablk_init_common); | |
141 | ||
142 | int ablk_init(struct crypto_tfm *tfm) | |
143 | { | |
144 | char drv_name[CRYPTO_MAX_ALG_NAME]; | |
145 | ||
146 | snprintf(drv_name, sizeof(drv_name), "__driver-%s", | |
147 | crypto_tfm_alg_driver_name(tfm)); | |
148 | ||
149 | return ablk_init_common(tfm, drv_name); | |
150 | } | |
151 | EXPORT_SYMBOL_GPL(ablk_init); | |
152 | ||
153 | MODULE_LICENSE("GPL"); |