1*62c56f98SSadaf Ebrahimi /*
2*62c56f98SSadaf Ebrahimi * VIA PadLock support functions
3*62c56f98SSadaf Ebrahimi *
4*62c56f98SSadaf Ebrahimi * Copyright The Mbed TLS Contributors
5*62c56f98SSadaf Ebrahimi * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6*62c56f98SSadaf Ebrahimi */
7*62c56f98SSadaf Ebrahimi /*
8*62c56f98SSadaf Ebrahimi * This implementation is based on the VIA PadLock Programming Guide:
9*62c56f98SSadaf Ebrahimi *
10*62c56f98SSadaf Ebrahimi * http://www.via.com.tw/en/downloads/whitepapers/initiatives/padlock/
11*62c56f98SSadaf Ebrahimi * programming_guide.pdf
12*62c56f98SSadaf Ebrahimi */
13*62c56f98SSadaf Ebrahimi
14*62c56f98SSadaf Ebrahimi #include "common.h"
15*62c56f98SSadaf Ebrahimi
16*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PADLOCK_C)
17*62c56f98SSadaf Ebrahimi
18*62c56f98SSadaf Ebrahimi #include "padlock.h"
19*62c56f98SSadaf Ebrahimi
20*62c56f98SSadaf Ebrahimi #include <string.h>
21*62c56f98SSadaf Ebrahimi
22*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_VIA_PADLOCK_HAVE_CODE)
23*62c56f98SSadaf Ebrahimi
24*62c56f98SSadaf Ebrahimi /*
25*62c56f98SSadaf Ebrahimi * PadLock detection routine
26*62c56f98SSadaf Ebrahimi */
mbedtls_padlock_has_support(int feature)27*62c56f98SSadaf Ebrahimi int mbedtls_padlock_has_support(int feature)
28*62c56f98SSadaf Ebrahimi {
29*62c56f98SSadaf Ebrahimi static int flags = -1;
30*62c56f98SSadaf Ebrahimi int ebx = 0, edx = 0;
31*62c56f98SSadaf Ebrahimi
32*62c56f98SSadaf Ebrahimi if (flags == -1) {
33*62c56f98SSadaf Ebrahimi asm ("movl %%ebx, %0 \n\t"
34*62c56f98SSadaf Ebrahimi "movl $0xC0000000, %%eax \n\t"
35*62c56f98SSadaf Ebrahimi "cpuid \n\t"
36*62c56f98SSadaf Ebrahimi "cmpl $0xC0000001, %%eax \n\t"
37*62c56f98SSadaf Ebrahimi "movl $0, %%edx \n\t"
38*62c56f98SSadaf Ebrahimi "jb 1f \n\t"
39*62c56f98SSadaf Ebrahimi "movl $0xC0000001, %%eax \n\t"
40*62c56f98SSadaf Ebrahimi "cpuid \n\t"
41*62c56f98SSadaf Ebrahimi "1: \n\t"
42*62c56f98SSadaf Ebrahimi "movl %%edx, %1 \n\t"
43*62c56f98SSadaf Ebrahimi "movl %2, %%ebx \n\t"
44*62c56f98SSadaf Ebrahimi : "=m" (ebx), "=m" (edx)
45*62c56f98SSadaf Ebrahimi : "m" (ebx)
46*62c56f98SSadaf Ebrahimi : "eax", "ecx", "edx");
47*62c56f98SSadaf Ebrahimi
48*62c56f98SSadaf Ebrahimi flags = edx;
49*62c56f98SSadaf Ebrahimi }
50*62c56f98SSadaf Ebrahimi
51*62c56f98SSadaf Ebrahimi return flags & feature;
52*62c56f98SSadaf Ebrahimi }
53*62c56f98SSadaf Ebrahimi
54*62c56f98SSadaf Ebrahimi /*
55*62c56f98SSadaf Ebrahimi * PadLock AES-ECB block en(de)cryption
56*62c56f98SSadaf Ebrahimi */
mbedtls_padlock_xcryptecb(mbedtls_aes_context * ctx,int mode,const unsigned char input[16],unsigned char output[16])57*62c56f98SSadaf Ebrahimi int mbedtls_padlock_xcryptecb(mbedtls_aes_context *ctx,
58*62c56f98SSadaf Ebrahimi int mode,
59*62c56f98SSadaf Ebrahimi const unsigned char input[16],
60*62c56f98SSadaf Ebrahimi unsigned char output[16])
61*62c56f98SSadaf Ebrahimi {
62*62c56f98SSadaf Ebrahimi int ebx = 0;
63*62c56f98SSadaf Ebrahimi uint32_t *rk;
64*62c56f98SSadaf Ebrahimi uint32_t *blk;
65*62c56f98SSadaf Ebrahimi uint32_t *ctrl;
66*62c56f98SSadaf Ebrahimi unsigned char buf[256];
67*62c56f98SSadaf Ebrahimi
68*62c56f98SSadaf Ebrahimi rk = ctx->buf + ctx->rk_offset;
69*62c56f98SSadaf Ebrahimi
70*62c56f98SSadaf Ebrahimi if (((long) rk & 15) != 0) {
71*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PADLOCK_DATA_MISALIGNED;
72*62c56f98SSadaf Ebrahimi }
73*62c56f98SSadaf Ebrahimi
74*62c56f98SSadaf Ebrahimi blk = MBEDTLS_PADLOCK_ALIGN16(buf);
75*62c56f98SSadaf Ebrahimi memcpy(blk, input, 16);
76*62c56f98SSadaf Ebrahimi
77*62c56f98SSadaf Ebrahimi ctrl = blk + 4;
78*62c56f98SSadaf Ebrahimi *ctrl = 0x80 | ctx->nr | ((ctx->nr + (mode^1) - 10) << 9);
79*62c56f98SSadaf Ebrahimi
80*62c56f98SSadaf Ebrahimi asm ("pushfl \n\t"
81*62c56f98SSadaf Ebrahimi "popfl \n\t"
82*62c56f98SSadaf Ebrahimi "movl %%ebx, %0 \n\t"
83*62c56f98SSadaf Ebrahimi "movl $1, %%ecx \n\t"
84*62c56f98SSadaf Ebrahimi "movl %2, %%edx \n\t"
85*62c56f98SSadaf Ebrahimi "movl %3, %%ebx \n\t"
86*62c56f98SSadaf Ebrahimi "movl %4, %%esi \n\t"
87*62c56f98SSadaf Ebrahimi "movl %4, %%edi \n\t"
88*62c56f98SSadaf Ebrahimi ".byte 0xf3,0x0f,0xa7,0xc8 \n\t"
89*62c56f98SSadaf Ebrahimi "movl %1, %%ebx \n\t"
90*62c56f98SSadaf Ebrahimi : "=m" (ebx)
91*62c56f98SSadaf Ebrahimi : "m" (ebx), "m" (ctrl), "m" (rk), "m" (blk)
92*62c56f98SSadaf Ebrahimi : "memory", "ecx", "edx", "esi", "edi");
93*62c56f98SSadaf Ebrahimi
94*62c56f98SSadaf Ebrahimi memcpy(output, blk, 16);
95*62c56f98SSadaf Ebrahimi
96*62c56f98SSadaf Ebrahimi return 0;
97*62c56f98SSadaf Ebrahimi }
98*62c56f98SSadaf Ebrahimi
99*62c56f98SSadaf Ebrahimi /*
100*62c56f98SSadaf Ebrahimi * PadLock AES-CBC buffer en(de)cryption
101*62c56f98SSadaf Ebrahimi */
mbedtls_padlock_xcryptcbc(mbedtls_aes_context * ctx,int mode,size_t length,unsigned char iv[16],const unsigned char * input,unsigned char * output)102*62c56f98SSadaf Ebrahimi int mbedtls_padlock_xcryptcbc(mbedtls_aes_context *ctx,
103*62c56f98SSadaf Ebrahimi int mode,
104*62c56f98SSadaf Ebrahimi size_t length,
105*62c56f98SSadaf Ebrahimi unsigned char iv[16],
106*62c56f98SSadaf Ebrahimi const unsigned char *input,
107*62c56f98SSadaf Ebrahimi unsigned char *output)
108*62c56f98SSadaf Ebrahimi {
109*62c56f98SSadaf Ebrahimi int ebx = 0;
110*62c56f98SSadaf Ebrahimi size_t count;
111*62c56f98SSadaf Ebrahimi uint32_t *rk;
112*62c56f98SSadaf Ebrahimi uint32_t *iw;
113*62c56f98SSadaf Ebrahimi uint32_t *ctrl;
114*62c56f98SSadaf Ebrahimi unsigned char buf[256];
115*62c56f98SSadaf Ebrahimi
116*62c56f98SSadaf Ebrahimi rk = ctx->buf + ctx->rk_offset;
117*62c56f98SSadaf Ebrahimi
118*62c56f98SSadaf Ebrahimi if (((long) input & 15) != 0 ||
119*62c56f98SSadaf Ebrahimi ((long) output & 15) != 0 ||
120*62c56f98SSadaf Ebrahimi ((long) rk & 15) != 0) {
121*62c56f98SSadaf Ebrahimi return MBEDTLS_ERR_PADLOCK_DATA_MISALIGNED;
122*62c56f98SSadaf Ebrahimi }
123*62c56f98SSadaf Ebrahimi
124*62c56f98SSadaf Ebrahimi iw = MBEDTLS_PADLOCK_ALIGN16(buf);
125*62c56f98SSadaf Ebrahimi memcpy(iw, iv, 16);
126*62c56f98SSadaf Ebrahimi
127*62c56f98SSadaf Ebrahimi ctrl = iw + 4;
128*62c56f98SSadaf Ebrahimi *ctrl = 0x80 | ctx->nr | ((ctx->nr + (mode ^ 1) - 10) << 9);
129*62c56f98SSadaf Ebrahimi
130*62c56f98SSadaf Ebrahimi count = (length + 15) >> 4;
131*62c56f98SSadaf Ebrahimi
132*62c56f98SSadaf Ebrahimi asm ("pushfl \n\t"
133*62c56f98SSadaf Ebrahimi "popfl \n\t"
134*62c56f98SSadaf Ebrahimi "movl %%ebx, %0 \n\t"
135*62c56f98SSadaf Ebrahimi "movl %2, %%ecx \n\t"
136*62c56f98SSadaf Ebrahimi "movl %3, %%edx \n\t"
137*62c56f98SSadaf Ebrahimi "movl %4, %%ebx \n\t"
138*62c56f98SSadaf Ebrahimi "movl %5, %%esi \n\t"
139*62c56f98SSadaf Ebrahimi "movl %6, %%edi \n\t"
140*62c56f98SSadaf Ebrahimi "movl %7, %%eax \n\t"
141*62c56f98SSadaf Ebrahimi ".byte 0xf3,0x0f,0xa7,0xd0 \n\t"
142*62c56f98SSadaf Ebrahimi "movl %1, %%ebx \n\t"
143*62c56f98SSadaf Ebrahimi : "=m" (ebx)
144*62c56f98SSadaf Ebrahimi : "m" (ebx), "m" (count), "m" (ctrl),
145*62c56f98SSadaf Ebrahimi "m" (rk), "m" (input), "m" (output), "m" (iw)
146*62c56f98SSadaf Ebrahimi : "memory", "eax", "ecx", "edx", "esi", "edi");
147*62c56f98SSadaf Ebrahimi
148*62c56f98SSadaf Ebrahimi memcpy(iv, iw, 16);
149*62c56f98SSadaf Ebrahimi
150*62c56f98SSadaf Ebrahimi return 0;
151*62c56f98SSadaf Ebrahimi }
152*62c56f98SSadaf Ebrahimi
153*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_VIA_PADLOCK_HAVE_CODE */
154*62c56f98SSadaf Ebrahimi
155*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PADLOCK_C */
156