xref: /aosp_15_r20/external/mbedtls/library/padlock.c (revision 62c56f9862f102b96d72393aff6076c951fb8148)
1*62c56f98SSadaf Ebrahimi /*
2*62c56f98SSadaf Ebrahimi  *  VIA PadLock support functions
3*62c56f98SSadaf Ebrahimi  *
4*62c56f98SSadaf Ebrahimi  *  Copyright The Mbed TLS Contributors
5*62c56f98SSadaf Ebrahimi  *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6*62c56f98SSadaf Ebrahimi  */
7*62c56f98SSadaf Ebrahimi /*
8*62c56f98SSadaf Ebrahimi  *  This implementation is based on the VIA PadLock Programming Guide:
9*62c56f98SSadaf Ebrahimi  *
10*62c56f98SSadaf Ebrahimi  *  http://www.via.com.tw/en/downloads/whitepapers/initiatives/padlock/
11*62c56f98SSadaf Ebrahimi  *  programming_guide.pdf
12*62c56f98SSadaf Ebrahimi  */
13*62c56f98SSadaf Ebrahimi 
14*62c56f98SSadaf Ebrahimi #include "common.h"
15*62c56f98SSadaf Ebrahimi 
16*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PADLOCK_C)
17*62c56f98SSadaf Ebrahimi 
18*62c56f98SSadaf Ebrahimi #include "padlock.h"
19*62c56f98SSadaf Ebrahimi 
20*62c56f98SSadaf Ebrahimi #include <string.h>
21*62c56f98SSadaf Ebrahimi 
22*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_VIA_PADLOCK_HAVE_CODE)
23*62c56f98SSadaf Ebrahimi 
24*62c56f98SSadaf Ebrahimi /*
25*62c56f98SSadaf Ebrahimi  * PadLock detection routine
26*62c56f98SSadaf Ebrahimi  */
mbedtls_padlock_has_support(int feature)27*62c56f98SSadaf Ebrahimi int mbedtls_padlock_has_support(int feature)
28*62c56f98SSadaf Ebrahimi {
29*62c56f98SSadaf Ebrahimi     static int flags = -1;
30*62c56f98SSadaf Ebrahimi     int ebx = 0, edx = 0;
31*62c56f98SSadaf Ebrahimi 
32*62c56f98SSadaf Ebrahimi     if (flags == -1) {
33*62c56f98SSadaf Ebrahimi         asm ("movl  %%ebx, %0           \n\t"
34*62c56f98SSadaf Ebrahimi              "movl  $0xC0000000, %%eax  \n\t"
35*62c56f98SSadaf Ebrahimi              "cpuid                     \n\t"
36*62c56f98SSadaf Ebrahimi              "cmpl  $0xC0000001, %%eax  \n\t"
37*62c56f98SSadaf Ebrahimi              "movl  $0, %%edx           \n\t"
38*62c56f98SSadaf Ebrahimi              "jb    1f                  \n\t"
39*62c56f98SSadaf Ebrahimi              "movl  $0xC0000001, %%eax  \n\t"
40*62c56f98SSadaf Ebrahimi              "cpuid                     \n\t"
41*62c56f98SSadaf Ebrahimi              "1:                        \n\t"
42*62c56f98SSadaf Ebrahimi              "movl  %%edx, %1           \n\t"
43*62c56f98SSadaf Ebrahimi              "movl  %2, %%ebx           \n\t"
44*62c56f98SSadaf Ebrahimi              : "=m" (ebx), "=m" (edx)
45*62c56f98SSadaf Ebrahimi              :  "m" (ebx)
46*62c56f98SSadaf Ebrahimi              : "eax", "ecx", "edx");
47*62c56f98SSadaf Ebrahimi 
48*62c56f98SSadaf Ebrahimi         flags = edx;
49*62c56f98SSadaf Ebrahimi     }
50*62c56f98SSadaf Ebrahimi 
51*62c56f98SSadaf Ebrahimi     return flags & feature;
52*62c56f98SSadaf Ebrahimi }
53*62c56f98SSadaf Ebrahimi 
54*62c56f98SSadaf Ebrahimi /*
55*62c56f98SSadaf Ebrahimi  * PadLock AES-ECB block en(de)cryption
56*62c56f98SSadaf Ebrahimi  */
mbedtls_padlock_xcryptecb(mbedtls_aes_context * ctx,int mode,const unsigned char input[16],unsigned char output[16])57*62c56f98SSadaf Ebrahimi int mbedtls_padlock_xcryptecb(mbedtls_aes_context *ctx,
58*62c56f98SSadaf Ebrahimi                               int mode,
59*62c56f98SSadaf Ebrahimi                               const unsigned char input[16],
60*62c56f98SSadaf Ebrahimi                               unsigned char output[16])
61*62c56f98SSadaf Ebrahimi {
62*62c56f98SSadaf Ebrahimi     int ebx = 0;
63*62c56f98SSadaf Ebrahimi     uint32_t *rk;
64*62c56f98SSadaf Ebrahimi     uint32_t *blk;
65*62c56f98SSadaf Ebrahimi     uint32_t *ctrl;
66*62c56f98SSadaf Ebrahimi     unsigned char buf[256];
67*62c56f98SSadaf Ebrahimi 
68*62c56f98SSadaf Ebrahimi     rk = ctx->buf + ctx->rk_offset;
69*62c56f98SSadaf Ebrahimi 
70*62c56f98SSadaf Ebrahimi     if (((long) rk & 15) != 0) {
71*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PADLOCK_DATA_MISALIGNED;
72*62c56f98SSadaf Ebrahimi     }
73*62c56f98SSadaf Ebrahimi 
74*62c56f98SSadaf Ebrahimi     blk = MBEDTLS_PADLOCK_ALIGN16(buf);
75*62c56f98SSadaf Ebrahimi     memcpy(blk, input, 16);
76*62c56f98SSadaf Ebrahimi 
77*62c56f98SSadaf Ebrahimi     ctrl = blk + 4;
78*62c56f98SSadaf Ebrahimi     *ctrl = 0x80 | ctx->nr | ((ctx->nr + (mode^1) - 10) << 9);
79*62c56f98SSadaf Ebrahimi 
80*62c56f98SSadaf Ebrahimi     asm ("pushfl                        \n\t"
81*62c56f98SSadaf Ebrahimi          "popfl                         \n\t"
82*62c56f98SSadaf Ebrahimi          "movl    %%ebx, %0             \n\t"
83*62c56f98SSadaf Ebrahimi          "movl    $1, %%ecx             \n\t"
84*62c56f98SSadaf Ebrahimi          "movl    %2, %%edx             \n\t"
85*62c56f98SSadaf Ebrahimi          "movl    %3, %%ebx             \n\t"
86*62c56f98SSadaf Ebrahimi          "movl    %4, %%esi             \n\t"
87*62c56f98SSadaf Ebrahimi          "movl    %4, %%edi             \n\t"
88*62c56f98SSadaf Ebrahimi          ".byte  0xf3,0x0f,0xa7,0xc8    \n\t"
89*62c56f98SSadaf Ebrahimi          "movl    %1, %%ebx             \n\t"
90*62c56f98SSadaf Ebrahimi          : "=m" (ebx)
91*62c56f98SSadaf Ebrahimi          :  "m" (ebx), "m" (ctrl), "m" (rk), "m" (blk)
92*62c56f98SSadaf Ebrahimi          : "memory", "ecx", "edx", "esi", "edi");
93*62c56f98SSadaf Ebrahimi 
94*62c56f98SSadaf Ebrahimi     memcpy(output, blk, 16);
95*62c56f98SSadaf Ebrahimi 
96*62c56f98SSadaf Ebrahimi     return 0;
97*62c56f98SSadaf Ebrahimi }
98*62c56f98SSadaf Ebrahimi 
99*62c56f98SSadaf Ebrahimi /*
100*62c56f98SSadaf Ebrahimi  * PadLock AES-CBC buffer en(de)cryption
101*62c56f98SSadaf Ebrahimi  */
mbedtls_padlock_xcryptcbc(mbedtls_aes_context * ctx,int mode,size_t length,unsigned char iv[16],const unsigned char * input,unsigned char * output)102*62c56f98SSadaf Ebrahimi int mbedtls_padlock_xcryptcbc(mbedtls_aes_context *ctx,
103*62c56f98SSadaf Ebrahimi                               int mode,
104*62c56f98SSadaf Ebrahimi                               size_t length,
105*62c56f98SSadaf Ebrahimi                               unsigned char iv[16],
106*62c56f98SSadaf Ebrahimi                               const unsigned char *input,
107*62c56f98SSadaf Ebrahimi                               unsigned char *output)
108*62c56f98SSadaf Ebrahimi {
109*62c56f98SSadaf Ebrahimi     int ebx = 0;
110*62c56f98SSadaf Ebrahimi     size_t count;
111*62c56f98SSadaf Ebrahimi     uint32_t *rk;
112*62c56f98SSadaf Ebrahimi     uint32_t *iw;
113*62c56f98SSadaf Ebrahimi     uint32_t *ctrl;
114*62c56f98SSadaf Ebrahimi     unsigned char buf[256];
115*62c56f98SSadaf Ebrahimi 
116*62c56f98SSadaf Ebrahimi     rk = ctx->buf + ctx->rk_offset;
117*62c56f98SSadaf Ebrahimi 
118*62c56f98SSadaf Ebrahimi     if (((long) input  & 15) != 0 ||
119*62c56f98SSadaf Ebrahimi         ((long) output & 15) != 0 ||
120*62c56f98SSadaf Ebrahimi         ((long) rk & 15) != 0) {
121*62c56f98SSadaf Ebrahimi         return MBEDTLS_ERR_PADLOCK_DATA_MISALIGNED;
122*62c56f98SSadaf Ebrahimi     }
123*62c56f98SSadaf Ebrahimi 
124*62c56f98SSadaf Ebrahimi     iw = MBEDTLS_PADLOCK_ALIGN16(buf);
125*62c56f98SSadaf Ebrahimi     memcpy(iw, iv, 16);
126*62c56f98SSadaf Ebrahimi 
127*62c56f98SSadaf Ebrahimi     ctrl = iw + 4;
128*62c56f98SSadaf Ebrahimi     *ctrl = 0x80 | ctx->nr | ((ctx->nr + (mode ^ 1) - 10) << 9);
129*62c56f98SSadaf Ebrahimi 
130*62c56f98SSadaf Ebrahimi     count = (length + 15) >> 4;
131*62c56f98SSadaf Ebrahimi 
132*62c56f98SSadaf Ebrahimi     asm ("pushfl                        \n\t"
133*62c56f98SSadaf Ebrahimi          "popfl                         \n\t"
134*62c56f98SSadaf Ebrahimi          "movl    %%ebx, %0             \n\t"
135*62c56f98SSadaf Ebrahimi          "movl    %2, %%ecx             \n\t"
136*62c56f98SSadaf Ebrahimi          "movl    %3, %%edx             \n\t"
137*62c56f98SSadaf Ebrahimi          "movl    %4, %%ebx             \n\t"
138*62c56f98SSadaf Ebrahimi          "movl    %5, %%esi             \n\t"
139*62c56f98SSadaf Ebrahimi          "movl    %6, %%edi             \n\t"
140*62c56f98SSadaf Ebrahimi          "movl    %7, %%eax             \n\t"
141*62c56f98SSadaf Ebrahimi          ".byte  0xf3,0x0f,0xa7,0xd0    \n\t"
142*62c56f98SSadaf Ebrahimi          "movl    %1, %%ebx             \n\t"
143*62c56f98SSadaf Ebrahimi          : "=m" (ebx)
144*62c56f98SSadaf Ebrahimi          :  "m" (ebx), "m" (count), "m" (ctrl),
145*62c56f98SSadaf Ebrahimi          "m"  (rk), "m" (input), "m" (output), "m" (iw)
146*62c56f98SSadaf Ebrahimi          : "memory", "eax", "ecx", "edx", "esi", "edi");
147*62c56f98SSadaf Ebrahimi 
148*62c56f98SSadaf Ebrahimi     memcpy(iv, iw, 16);
149*62c56f98SSadaf Ebrahimi 
150*62c56f98SSadaf Ebrahimi     return 0;
151*62c56f98SSadaf Ebrahimi }
152*62c56f98SSadaf Ebrahimi 
153*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_VIA_PADLOCK_HAVE_CODE */
154*62c56f98SSadaf Ebrahimi 
155*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PADLOCK_C */
156