Contributors: 6
Author Tokens Token Proportion Commits Commit Proportion
Meenakshi Aggarwal 513 60.21% 1 16.67%
Ahmad Fatoum 319 37.44% 1 16.67%
Mimi Zohar 10 1.17% 1 16.67%
Herbert Xu 7 0.82% 1 16.67%
Sumit Garg 2 0.23% 1 16.67%
Thomas Gleixner 1 0.12% 1 16.67%
Total 852 6


// SPDX-License-Identifier: GPL-2.0-only
/*
 * Copyright (C) 2021 Pengutronix, Ahmad Fatoum <kernel@pengutronix.de>
 * Copyright 2025 NXP
 */

#include <keys/trusted_caam.h>
#include <keys/trusted-type.h>
#include <linux/build_bug.h>
#include <linux/key-type.h>
#include <linux/parser.h>
#include <soc/fsl/caam-blob.h>

static struct caam_blob_priv *blobifier;

#define KEYMOD "SECURE_KEY"

static_assert(MAX_KEY_SIZE + CAAM_BLOB_OVERHEAD <= CAAM_BLOB_MAX_LEN);
static_assert(MAX_BLOB_SIZE <= CAAM_BLOB_MAX_LEN);

enum {
	opt_err,
	opt_key_enc_algo,
};

static const match_table_t key_tokens = {
	{opt_key_enc_algo, "key_enc_algo=%s"},
	{opt_err, NULL}
};

#ifdef CAAM_DEBUG
static inline void dump_options(const struct caam_pkey_info *pkey_info)
{
	pr_info("key encryption algo %d\n", pkey_info->key_enc_algo);
}
#else
static inline void dump_options(const struct caam_pkey_info *pkey_info)
{
}
#endif

static int get_pkey_options(char *c,
			    struct caam_pkey_info *pkey_info)
{
	substring_t args[MAX_OPT_ARGS];
	unsigned long token_mask = 0;
	u16 key_enc_algo;
	char *p = c;
	int token;
	int res;

	if (!c)
		return 0;

	while ((p = strsep(&c, " \t"))) {
		if (*p == '\0' || *p == ' ' || *p == '\t')
			continue;
		token = match_token(p, key_tokens, args);
		if (test_and_set_bit(token, &token_mask))
			return -EINVAL;

		switch (token) {
		case opt_key_enc_algo:
			res = kstrtou16(args[0].from, 16, &key_enc_algo);
			if (res < 0)
				return -EINVAL;
			pkey_info->key_enc_algo = key_enc_algo;
			break;
		default:
			return -EINVAL;
		}
	}
	return 0;
}

static bool is_key_pkey(char **datablob)
{
	char *c = NULL;

	do {
		/* Second argument onwards,
		 * determine if tied to HW
		 */
		c = strsep(datablob, " \t");
		if (c && (strcmp(c, "pk") == 0))
			return true;
	} while (c);

	return false;
}

static int trusted_caam_seal(struct trusted_key_payload *p, char *datablob)
{
	int ret;
	struct caam_blob_info info = {
		.input  = p->key,  .input_len   = p->key_len,
		.output = p->blob, .output_len  = MAX_BLOB_SIZE,
		.key_mod = KEYMOD, .key_mod_len = sizeof(KEYMOD) - 1,
	};

	/*
	 * If it is to be treated as protected key,
	 * read next arguments too.
	 */
	if (is_key_pkey(&datablob)) {
		info.pkey_info.plain_key_sz = p->key_len;
		info.pkey_info.is_pkey = 1;
		ret = get_pkey_options(datablob, &info.pkey_info);
		if (ret < 0)
			return 0;
		dump_options(&info.pkey_info);
	}

	ret = caam_encap_blob(blobifier, &info);
	if (ret)
		return ret;

	p->blob_len = info.output_len;
	if (info.pkey_info.is_pkey) {
		p->key_len = p->blob_len + sizeof(struct caam_pkey_info);
		memcpy(p->key, &info.pkey_info, sizeof(struct caam_pkey_info));
		memcpy(p->key + sizeof(struct caam_pkey_info), p->blob, p->blob_len);
	}

	return 0;
}

static int trusted_caam_unseal(struct trusted_key_payload *p, char *datablob)
{
	int ret;
	struct caam_blob_info info = {
		.input   = p->blob,  .input_len  = p->blob_len,
		.output  = p->key,   .output_len = MAX_KEY_SIZE,
		.key_mod = KEYMOD,  .key_mod_len = sizeof(KEYMOD) - 1,
	};

	if (is_key_pkey(&datablob)) {
		info.pkey_info.plain_key_sz = p->blob_len - CAAM_BLOB_OVERHEAD;
		info.pkey_info.is_pkey = 1;
		ret = get_pkey_options(datablob, &info.pkey_info);
		if (ret < 0)
			return 0;
		dump_options(&info.pkey_info);

		p->key_len = p->blob_len + sizeof(struct caam_pkey_info);
		memcpy(p->key, &info.pkey_info, sizeof(struct caam_pkey_info));
		memcpy(p->key + sizeof(struct caam_pkey_info), p->blob, p->blob_len);

		return 0;
	}

	ret = caam_decap_blob(blobifier, &info);
	if (ret)
		return ret;

	p->key_len = info.output_len;

	return 0;
}

static int trusted_caam_init(void)
{
	int ret;

	blobifier = caam_blob_gen_init();
	if (IS_ERR(blobifier))
		return PTR_ERR(blobifier);

	ret = register_key_type(&key_type_trusted);
	if (ret)
		caam_blob_gen_exit(blobifier);

	return ret;
}

static void trusted_caam_exit(void)
{
	unregister_key_type(&key_type_trusted);
	caam_blob_gen_exit(blobifier);
}

struct trusted_key_ops trusted_key_caam_ops = {
	.migratable = 0, /* non-migratable */
	.init = trusted_caam_init,
	.seal = trusted_caam_seal,
	.unseal = trusted_caam_unseal,
	.exit = trusted_caam_exit,
};