|
@@ -10,7 +10,6 @@
|
|
|
|
|
|
#include <asm/neon.h>
|
|
|
#include <crypto/aes.h>
|
|
|
-#include <crypto/cbc.h>
|
|
|
#include <crypto/internal/simd.h>
|
|
|
#include <crypto/internal/skcipher.h>
|
|
|
#include <crypto/xts.h>
|
|
@@ -42,7 +41,12 @@ asmlinkage void aesbs_xts_encrypt(u8 out[], u8 const in[], u8 const rk[],
|
|
|
asmlinkage void aesbs_xts_decrypt(u8 out[], u8 const in[], u8 const rk[],
|
|
|
int rounds, int blocks, u8 iv[]);
|
|
|
|
|
|
-asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
|
|
|
+/* borrowed from aes-neon-blk.ko */
|
|
|
+asmlinkage void neon_aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[],
|
|
|
+ int rounds, int blocks, int first);
|
|
|
+asmlinkage void neon_aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[],
|
|
|
+ int rounds, int blocks, u8 iv[],
|
|
|
+ int first);
|
|
|
|
|
|
struct aesbs_ctx {
|
|
|
u8 rk[13 * (8 * AES_BLOCK_SIZE) + 32];
|
|
@@ -140,16 +144,28 @@ static int aesbs_cbc_setkey(struct crypto_skcipher *tfm, const u8 *in_key,
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
|
-static void cbc_encrypt_one(struct crypto_skcipher *tfm, const u8 *src, u8 *dst)
|
|
|
+static int cbc_encrypt(struct skcipher_request *req)
|
|
|
{
|
|
|
+ struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
|
|
|
struct aesbs_cbc_ctx *ctx = crypto_skcipher_ctx(tfm);
|
|
|
+ struct skcipher_walk walk;
|
|
|
+ int err, first = 1;
|
|
|
|
|
|
- __aes_arm64_encrypt(ctx->enc, dst, src, ctx->key.rounds);
|
|
|
-}
|
|
|
+ err = skcipher_walk_virt(&walk, req, true);
|
|
|
|
|
|
-static int cbc_encrypt(struct skcipher_request *req)
|
|
|
-{
|
|
|
- return crypto_cbc_encrypt_walk(req, cbc_encrypt_one);
|
|
|
+ kernel_neon_begin();
|
|
|
+ while (walk.nbytes >= AES_BLOCK_SIZE) {
|
|
|
+ unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE;
|
|
|
+
|
|
|
+ /* fall back to the non-bitsliced NEON implementation */
|
|
|
+ neon_aes_cbc_encrypt(walk.dst.virt.addr, walk.src.virt.addr,
|
|
|
+ ctx->enc, ctx->key.rounds, blocks, walk.iv,
|
|
|
+ first);
|
|
|
+ err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE);
|
|
|
+ first = 0;
|
|
|
+ }
|
|
|
+ kernel_neon_end();
|
|
|
+ return err;
|
|
|
}
|
|
|
|
|
|
static int cbc_decrypt(struct skcipher_request *req)
|
|
@@ -254,9 +270,11 @@ static int __xts_crypt(struct skcipher_request *req,
|
|
|
|
|
|
err = skcipher_walk_virt(&walk, req, true);
|
|
|
|
|
|
- __aes_arm64_encrypt(ctx->twkey, walk.iv, walk.iv, ctx->key.rounds);
|
|
|
-
|
|
|
kernel_neon_begin();
|
|
|
+
|
|
|
+ neon_aes_ecb_encrypt(walk.iv, walk.iv, ctx->twkey,
|
|
|
+ ctx->key.rounds, 1, 1);
|
|
|
+
|
|
|
while (walk.nbytes >= AES_BLOCK_SIZE) {
|
|
|
unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE;
|
|
|
|