Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Declan Murphy | 3586 | 75.72% | 1 | 16.67% |
Daniele Alessandrelli | 1129 | 23.84% | 2 | 33.33% |
Herbert Xu | 12 | 0.25% | 1 | 16.67% |
Wei Yongjun | 7 | 0.15% | 1 | 16.67% |
Dan Carpenter | 2 | 0.04% | 1 | 16.67% |
Total | 4736 | 6 |
// SPDX-License-Identifier: GPL-2.0-only /* * Intel Keem Bay OCS HCU Crypto Driver. * * Copyright (C) 2018-2020 Intel Corporation */ #include <linux/completion.h> #include <linux/delay.h> #include <linux/dma-mapping.h> #include <linux/interrupt.h> #include <linux/module.h> #include <linux/of_device.h> #include <crypto/engine.h> #include <crypto/scatterwalk.h> #include <crypto/sha2.h> #include <crypto/sm3.h> #include <crypto/hmac.h> #include <crypto/internal/hash.h> #include "ocs-hcu.h" #define DRV_NAME "keembay-ocs-hcu" /* Flag marking a final request. */ #define REQ_FINAL BIT(0) /* Flag marking a HMAC request. */ #define REQ_FLAGS_HMAC BIT(1) /* Flag set when HW HMAC is being used. */ #define REQ_FLAGS_HMAC_HW BIT(2) /* Flag set when SW HMAC is being used. */ #define REQ_FLAGS_HMAC_SW BIT(3) /** * struct ocs_hcu_ctx: OCS HCU Transform context. * @engine_ctx: Crypto Engine context. * @hcu_dev: The OCS HCU device used by the transformation. * @key: The key (used only for HMAC transformations). * @key_len: The length of the key. * @is_sm3_tfm: Whether or not this is an SM3 transformation. * @is_hmac_tfm: Whether or not this is a HMAC transformation. */ struct ocs_hcu_ctx { struct crypto_engine_ctx engine_ctx; struct ocs_hcu_dev *hcu_dev; u8 key[SHA512_BLOCK_SIZE]; size_t key_len; bool is_sm3_tfm; bool is_hmac_tfm; }; /** * struct ocs_hcu_rctx - Context for the request. * @hcu_dev: OCS HCU device to be used to service the request. * @flags: Flags tracking request status. * @algo: Algorithm to use for the request. * @blk_sz: Block size of the transformation / request. * @dig_sz: Digest size of the transformation / request. * @dma_list: OCS DMA linked list. * @hash_ctx: OCS HCU hashing context. * @buffer: Buffer to store: partial block of data and SW HMAC * artifacts (ipad, opad, etc.). * @buf_cnt: Number of bytes currently stored in the buffer. * @buf_dma_addr: The DMA address of @buffer (when mapped). * @buf_dma_count: The number of bytes in @buffer currently DMA-mapped. * @sg: Head of the scatterlist entries containing data. * @sg_data_total: Total data in the SG list at any time. * @sg_data_offset: Offset into the data of the current individual SG node. * @sg_dma_nents: Number of sg entries mapped in dma_list. */ struct ocs_hcu_rctx { struct ocs_hcu_dev *hcu_dev; u32 flags; enum ocs_hcu_algo algo; size_t blk_sz; size_t dig_sz; struct ocs_hcu_dma_list *dma_list; struct ocs_hcu_hash_ctx hash_ctx; /* * Buffer is double the block size because we need space for SW HMAC * artifacts, i.e: * - ipad (1 block) + a possible partial block of data. * - opad (1 block) + digest of H(k ^ ipad || m) */ u8 buffer[2 * SHA512_BLOCK_SIZE]; size_t buf_cnt; dma_addr_t buf_dma_addr; size_t buf_dma_count; struct scatterlist *sg; unsigned int sg_data_total; unsigned int sg_data_offset; unsigned int sg_dma_nents; }; /** * struct ocs_hcu_drv - Driver data * @dev_list: The list of HCU devices. * @lock: The lock protecting dev_list. */ struct ocs_hcu_drv { struct list_head dev_list; spinlock_t lock; /* Protects dev_list. */ }; static struct ocs_hcu_drv ocs_hcu = { .dev_list = LIST_HEAD_INIT(ocs_hcu.dev_list), .lock = __SPIN_LOCK_UNLOCKED(ocs_hcu.lock), }; /* * Return the total amount of data in the request; that is: the data in the * request buffer + the data in the sg list. */ static inline unsigned int kmb_get_total_data(struct ocs_hcu_rctx *rctx) { return rctx->sg_data_total + rctx->buf_cnt; } /* Move remaining content of scatter-gather list to context buffer. */ static int flush_sg_to_ocs_buffer(struct ocs_hcu_rctx *rctx) { size_t count; if (rctx->sg_data_total > (sizeof(rctx->buffer) - rctx->buf_cnt)) { WARN(1, "%s: sg data does not fit in buffer\n", __func__); return -EINVAL; } while (rctx->sg_data_total) { if (!rctx->sg) { WARN(1, "%s: unexpected NULL sg\n", __func__); return -EINVAL; } /* * If current sg has been fully processed, skip to the next * one. */ if (rctx->sg_data_offset == rctx->sg->length) { rctx->sg = sg_next(rctx->sg); rctx->sg_data_offset = 0; continue; } /* * Determine the maximum data available to copy from the node. * Minimum of the length left in the sg node, or the total data * in the request. */ count = min(rctx->sg->length - rctx->sg_data_offset, rctx->sg_data_total); /* Copy from scatter-list entry to context buffer. */ scatterwalk_map_and_copy(&rctx->buffer[rctx->buf_cnt], rctx->sg, rctx->sg_data_offset, count, 0); rctx->sg_data_offset += count; rctx->sg_data_total -= count; rctx->buf_cnt += count; } return 0; } static struct ocs_hcu_dev *kmb_ocs_hcu_find_dev(struct ahash_request *req) { struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); struct ocs_hcu_ctx *tctx = crypto_ahash_ctx(tfm); /* If the HCU device for the request was previously set, return it. */ if (tctx->hcu_dev) return tctx->hcu_dev; /* * Otherwise, get the first HCU device available (there should be one * and only one device). */ spin_lock_bh(&ocs_hcu.lock); tctx->hcu_dev = list_first_entry_or_null(&ocs_hcu.dev_list, struct ocs_hcu_dev, list); spin_unlock_bh(&ocs_hcu.lock); return tctx->hcu_dev; } /* Free OCS DMA linked list and DMA-able context buffer. */ static void kmb_ocs_hcu_dma_cleanup(struct ahash_request *req, struct ocs_hcu_rctx *rctx) { struct ocs_hcu_dev *hcu_dev = rctx->hcu_dev; struct device *dev = hcu_dev->dev; /* Unmap rctx->buffer (if mapped). */ if (rctx->buf_dma_count) { dma_unmap_single(dev, rctx->buf_dma_addr, rctx->buf_dma_count, DMA_TO_DEVICE); rctx->buf_dma_count = 0; } /* Unmap req->src (if mapped). */ if (rctx->sg_dma_nents) { dma_unmap_sg(dev, req->src, rctx->sg_dma_nents, DMA_TO_DEVICE); rctx->sg_dma_nents = 0; } /* Free dma_list (if allocated). */ if (rctx->dma_list) { ocs_hcu_dma_list_free(hcu_dev, rctx->dma_list); rctx->dma_list = NULL; } } /* * Prepare for DMA operation: * - DMA-map request context buffer (if needed) * - DMA-map SG list (only the entries to be processed, see note below) * - Allocate OCS HCU DMA linked list (number of elements = SG entries to * process + context buffer (if not empty)). * - Add DMA-mapped request context buffer to OCS HCU DMA list. * - Add SG entries to DMA list. * * Note: if this is a final request, we process all the data in the SG list, * otherwise we can only process up to the maximum amount of block-aligned data * (the remainder will be put into the context buffer and processed in the next * request). */ static int kmb_ocs_dma_prepare(struct ahash_request *req) { struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); struct device *dev = rctx->hcu_dev->dev; unsigned int remainder = 0; unsigned int total; size_t nents; size_t count; int rc; int i; /* This function should be called only when there is data to process. */ total = kmb_get_total_data(rctx); if (!total) return -EINVAL; /* * If this is not a final DMA (terminated DMA), the data passed to the * HCU must be aligned to the block size; compute the remainder data to * be processed in the next request. */ if (!(rctx->flags & REQ_FINAL)) remainder = total % rctx->blk_sz; /* Determine the number of scatter gather list entries to process. */ nents = sg_nents_for_len(req->src, rctx->sg_data_total - remainder); /* If there are entries to process, map them. */ if (nents) { rctx->sg_dma_nents = dma_map_sg(dev, req->src, nents, DMA_TO_DEVICE); if (!rctx->sg_dma_nents) { dev_err(dev, "Failed to MAP SG\n"); rc = -ENOMEM; goto cleanup; } /* * The value returned by dma_map_sg() can be < nents; so update * nents accordingly. */ nents = rctx->sg_dma_nents; } /* * If context buffer is not empty, map it and add extra DMA entry for * it. */ if (rctx->buf_cnt) { rctx->buf_dma_addr = dma_map_single(dev, rctx->buffer, rctx->buf_cnt, DMA_TO_DEVICE); if (dma_mapping_error(dev, rctx->buf_dma_addr)) { dev_err(dev, "Failed to map request context buffer\n"); rc = -ENOMEM; goto cleanup; } rctx->buf_dma_count = rctx->buf_cnt; /* Increase number of dma entries. */ nents++; } /* Allocate OCS HCU DMA list. */ rctx->dma_list = ocs_hcu_dma_list_alloc(rctx->hcu_dev, nents); if (!rctx->dma_list) { rc = -ENOMEM; goto cleanup; } /* Add request context buffer (if previously DMA-mapped) */ if (rctx->buf_dma_count) { rc = ocs_hcu_dma_list_add_tail(rctx->hcu_dev, rctx->dma_list, rctx->buf_dma_addr, rctx->buf_dma_count); if (rc) goto cleanup; } /* Add the SG nodes to be processed to the DMA linked list. */ for_each_sg(req->src, rctx->sg, rctx->sg_dma_nents, i) { /* * The number of bytes to add to the list entry is the minimum * between: * - The DMA length of the SG entry. * - The data left to be processed. */ count = min(rctx->sg_data_total - remainder, sg_dma_len(rctx->sg) - rctx->sg_data_offset); /* * Do not create a zero length DMA descriptor. Check in case of * zero length SG node. */ if (count == 0) continue; /* Add sg to HCU DMA list. */ rc = ocs_hcu_dma_list_add_tail(rctx->hcu_dev, rctx->dma_list, rctx->sg->dma_address, count); if (rc) goto cleanup; /* Update amount of data remaining in SG list. */ rctx->sg_data_total -= count; /* * If remaining data is equal to remainder (note: 'less than' * case should never happen in practice), we are done: update * offset and exit the loop. */ if (rctx->sg_data_total <= remainder) { WARN_ON(rctx->sg_data_total < remainder); rctx->sg_data_offset += count; break; } /* * If we get here is because we need to process the next sg in * the list; set offset within the sg to 0. */ rctx->sg_data_offset = 0; } return 0; cleanup: dev_err(dev, "Failed to prepare DMA.\n"); kmb_ocs_hcu_dma_cleanup(req, rctx); return rc; } static void kmb_ocs_hcu_secure_cleanup(struct ahash_request *req) { struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); /* Clear buffer of any data. */ memzero_explicit(rctx->buffer, sizeof(rctx->buffer)); } static int kmb_ocs_hcu_handle_queue(struct ahash_request *req) { struct ocs_hcu_dev *hcu_dev = kmb_ocs_hcu_find_dev(req); if (!hcu_dev) return -ENOENT; return crypto_transfer_hash_request_to_engine(hcu_dev->engine, req); } static int prepare_ipad(struct ahash_request *req) { struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); struct ocs_hcu_ctx *ctx = crypto_ahash_ctx(tfm); int i; WARN(rctx->buf_cnt, "%s: Context buffer is not empty\n", __func__); WARN(!(rctx->flags & REQ_FLAGS_HMAC_SW), "%s: HMAC_SW flag is not set\n", __func__); /* * Key length must be equal to block size. If key is shorter, * we pad it with zero (note: key cannot be longer, since * longer keys are hashed by kmb_ocs_hcu_setkey()). */ if (ctx->key_len > rctx->blk_sz) { WARN(1, "%s: Invalid key length in tfm context\n", __func__); return -EINVAL; } memzero_explicit(&ctx->key[ctx->key_len], rctx->blk_sz - ctx->key_len); ctx->key_len = rctx->blk_sz; /* * Prepare IPAD for HMAC. Only done for first block. * HMAC(k,m) = H(k ^ opad || H(k ^ ipad || m)) * k ^ ipad will be first hashed block. * k ^ opad will be calculated in the final request. * Only needed if not using HW HMAC. */ for (i = 0; i < rctx->blk_sz; i++) rctx->buffer[i] = ctx->key[i] ^ HMAC_IPAD_VALUE; rctx->buf_cnt = rctx->blk_sz; return 0; } static int kmb_ocs_hcu_do_one_request(struct crypto_engine *engine, void *areq) { struct ahash_request *req = container_of(areq, struct ahash_request, base); struct ocs_hcu_dev *hcu_dev = kmb_ocs_hcu_find_dev(req); struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); struct ocs_hcu_ctx *tctx = crypto_ahash_ctx(tfm); int rc; int i; if (!hcu_dev) { rc = -ENOENT; goto error; } /* * If hardware HMAC flag is set, perform HMAC in hardware. * * NOTE: this flag implies REQ_FINAL && kmb_get_total_data(rctx) */ if (rctx->flags & REQ_FLAGS_HMAC_HW) { /* Map input data into the HCU DMA linked list. */ rc = kmb_ocs_dma_prepare(req); if (rc) goto error; rc = ocs_hcu_hmac(hcu_dev, rctx->algo, tctx->key, tctx->key_len, rctx->dma_list, req->result, rctx->dig_sz); /* Unmap data and free DMA list regardless of return code. */ kmb_ocs_hcu_dma_cleanup(req, rctx); /* Process previous return code. */ if (rc) goto error; goto done; } /* Handle update request case. */ if (!(rctx->flags & REQ_FINAL)) { /* Update should always have input data. */ if (!kmb_get_total_data(rctx)) return -EINVAL; /* Map input data into the HCU DMA linked list. */ rc = kmb_ocs_dma_prepare(req); if (rc) goto error; /* Do hashing step. */ rc = ocs_hcu_hash_update(hcu_dev, &rctx->hash_ctx, rctx->dma_list); /* Unmap data and free DMA list regardless of return code. */ kmb_ocs_hcu_dma_cleanup(req, rctx); /* Process previous return code. */ if (rc) goto error; /* * Reset request buffer count (data in the buffer was just * processed). */ rctx->buf_cnt = 0; /* * Move remaining sg data into the request buffer, so that it * will be processed during the next request. * * NOTE: we have remaining data if kmb_get_total_data() was not * a multiple of block size. */ rc = flush_sg_to_ocs_buffer(rctx); if (rc) goto error; goto done; } /* If we get here, this is a final request. */ /* If there is data to process, use finup. */ if (kmb_get_total_data(rctx)) { /* Map input data into the HCU DMA linked list. */ rc = kmb_ocs_dma_prepare(req); if (rc) goto error; /* Do hashing step. */ rc = ocs_hcu_hash_finup(hcu_dev, &rctx->hash_ctx, rctx->dma_list, req->result, rctx->dig_sz); /* Free DMA list regardless of return code. */ kmb_ocs_hcu_dma_cleanup(req, rctx); /* Process previous return code. */ if (rc) goto error; } else { /* Otherwise (if we have no data), use final. */ rc = ocs_hcu_hash_final(hcu_dev, &rctx->hash_ctx, req->result, rctx->dig_sz); if (rc) goto error; } /* * If we are finalizing a SW HMAC request, we just computed the result * of: H(k ^ ipad || m). * * We now need to complete the HMAC calculation with the OPAD step, * that is, we need to compute H(k ^ opad || digest), where digest is * the digest we just obtained, i.e., H(k ^ ipad || m). */ if (rctx->flags & REQ_FLAGS_HMAC_SW) { /* * Compute k ^ opad and store it in the request buffer (which * is not used anymore at this point). * Note: key has been padded / hashed already (so keylen == * blksz) . */ WARN_ON(tctx->key_len != rctx->blk_sz); for (i = 0; i < rctx->blk_sz; i++) rctx->buffer[i] = tctx->key[i] ^ HMAC_OPAD_VALUE; /* Now append the digest to the rest of the buffer. */ for (i = 0; (i < rctx->dig_sz); i++) rctx->buffer[rctx->blk_sz + i] = req->result[i]; /* Now hash the buffer to obtain the final HMAC. */ rc = ocs_hcu_digest(hcu_dev, rctx->algo, rctx->buffer, rctx->blk_sz + rctx->dig_sz, req->result, rctx->dig_sz); if (rc) goto error; } /* Perform secure clean-up. */ kmb_ocs_hcu_secure_cleanup(req); done: crypto_finalize_hash_request(hcu_dev->engine, req, 0); return 0; error: kmb_ocs_hcu_secure_cleanup(req); return rc; } static int kmb_ocs_hcu_init(struct ahash_request *req) { struct ocs_hcu_dev *hcu_dev = kmb_ocs_hcu_find_dev(req); struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); struct ocs_hcu_ctx *ctx = crypto_ahash_ctx(tfm); if (!hcu_dev) return -ENOENT; /* Initialize entire request context to zero. */ memset(rctx, 0, sizeof(*rctx)); rctx->hcu_dev = hcu_dev; rctx->dig_sz = crypto_ahash_digestsize(tfm); switch (rctx->dig_sz) { #ifdef CONFIG_CRYPTO_DEV_KEEMBAY_OCS_HCU_HMAC_SHA224 case SHA224_DIGEST_SIZE: rctx->blk_sz = SHA224_BLOCK_SIZE; rctx->algo = OCS_HCU_ALGO_SHA224; break; #endif /* CONFIG_CRYPTO_DEV_KEEMBAY_OCS_HCU_HMAC_SHA224 */ case SHA256_DIGEST_SIZE: rctx->blk_sz = SHA256_BLOCK_SIZE; /* * SHA256 and SM3 have the same digest size: use info from tfm * context to find out which one we should use. */ rctx->algo = ctx->is_sm3_tfm ? OCS_HCU_ALGO_SM3 : OCS_HCU_ALGO_SHA256; break; case SHA384_DIGEST_SIZE: rctx->blk_sz = SHA384_BLOCK_SIZE; rctx->algo = OCS_HCU_ALGO_SHA384; break; case SHA512_DIGEST_SIZE: rctx->blk_sz = SHA512_BLOCK_SIZE; rctx->algo = OCS_HCU_ALGO_SHA512; break; default: return -EINVAL; } /* Initialize intermediate data. */ ocs_hcu_hash_init(&rctx->hash_ctx, rctx->algo); /* If this a HMAC request, set HMAC flag. */ if (ctx->is_hmac_tfm) rctx->flags |= REQ_FLAGS_HMAC; return 0; } static int kmb_ocs_hcu_update(struct ahash_request *req) { struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); int rc; if (!req->nbytes) return 0; rctx->sg_data_total = req->nbytes; rctx->sg_data_offset = 0; rctx->sg = req->src; /* * If we are doing HMAC, then we must use SW-assisted HMAC, since HW * HMAC does not support context switching (there it can only be used * with finup() or digest()). */ if (rctx->flags & REQ_FLAGS_HMAC && !(rctx->flags & REQ_FLAGS_HMAC_SW)) { rctx->flags |= REQ_FLAGS_HMAC_SW; rc = prepare_ipad(req); if (rc) return rc; } /* * If remaining sg_data fits into ctx buffer, just copy it there; we'll * process it at the next update() or final(). */ if (rctx->sg_data_total <= (sizeof(rctx->buffer) - rctx->buf_cnt)) return flush_sg_to_ocs_buffer(rctx); return kmb_ocs_hcu_handle_queue(req); } /* Common logic for kmb_ocs_hcu_final() and kmb_ocs_hcu_finup(). */ static int kmb_ocs_hcu_fin_common(struct ahash_request *req) { struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); struct ocs_hcu_ctx *ctx = crypto_ahash_ctx(tfm); int rc; rctx->flags |= REQ_FINAL; /* * If this is a HMAC request and, so far, we didn't have to switch to * SW HMAC, check if we can use HW HMAC. */ if (rctx->flags & REQ_FLAGS_HMAC && !(rctx->flags & REQ_FLAGS_HMAC_SW)) { /* * If we are here, it means we never processed any data so far, * so we can use HW HMAC, but only if there is some data to * process (since OCS HW MAC does not support zero-length * messages) and the key length is supported by the hardware * (OCS HCU HW only supports length <= 64); if HW HMAC cannot * be used, fall back to SW-assisted HMAC. */ if (kmb_get_total_data(rctx) && ctx->key_len <= OCS_HCU_HW_KEY_LEN) { rctx->flags |= REQ_FLAGS_HMAC_HW; } else { rctx->flags |= REQ_FLAGS_HMAC_SW; rc = prepare_ipad(req); if (rc) return rc; } } return kmb_ocs_hcu_handle_queue(req); } static int kmb_ocs_hcu_final(struct ahash_request *req) { struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); rctx->sg_data_total = 0; rctx->sg_data_offset = 0; rctx->sg = NULL; return kmb_ocs_hcu_fin_common(req); } static int kmb_ocs_hcu_finup(struct ahash_request *req) { struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); rctx->sg_data_total = req->nbytes; rctx->sg_data_offset = 0; rctx->sg = req->src; return kmb_ocs_hcu_fin_common(req); } static int kmb_ocs_hcu_digest(struct ahash_request *req) { int rc = 0; struct ocs_hcu_dev *hcu_dev = kmb_ocs_hcu_find_dev(req); if (!hcu_dev) return -ENOENT; rc = kmb_ocs_hcu_init(req); if (rc) return rc; rc = kmb_ocs_hcu_finup(req); return rc; } static int kmb_ocs_hcu_export(struct ahash_request *req, void *out) { struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); /* Intermediate data is always stored and applied per request. */ memcpy(out, rctx, sizeof(*rctx)); return 0; } static int kmb_ocs_hcu_import(struct ahash_request *req, const void *in) { struct ocs_hcu_rctx *rctx = ahash_request_ctx_dma(req); /* Intermediate data is always stored and applied per request. */ memcpy(rctx, in, sizeof(*rctx)); return 0; } static int kmb_ocs_hcu_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) { unsigned int digestsize = crypto_ahash_digestsize(tfm); struct ocs_hcu_ctx *ctx = crypto_ahash_ctx(tfm); size_t blk_sz = crypto_ahash_blocksize(tfm); struct crypto_ahash *ahash_tfm; struct ahash_request *req; struct crypto_wait wait; struct scatterlist sg; const char *alg_name; int rc; /* * Key length must be equal to block size: * - If key is shorter, we are done for now (the key will be padded * later on); this is to maximize the use of HW HMAC (which works * only for keys <= 64 bytes). * - If key is longer, we hash it. */ if (keylen <= blk_sz) { memcpy(ctx->key, key, keylen); ctx->key_len = keylen; return 0; } switch (digestsize) { #ifdef CONFIG_CRYPTO_DEV_KEEMBAY_OCS_HCU_HMAC_SHA224 case SHA224_DIGEST_SIZE: alg_name = "sha224-keembay-ocs"; break; #endif /* CONFIG_CRYPTO_DEV_KEEMBAY_OCS_HCU_HMAC_SHA224 */ case SHA256_DIGEST_SIZE: alg_name = ctx->is_sm3_tfm ? "sm3-keembay-ocs" : "sha256-keembay-ocs"; break; case SHA384_DIGEST_SIZE: alg_name = "sha384-keembay-ocs"; break; case SHA512_DIGEST_SIZE: alg_name = "sha512-keembay-ocs"; break; default: return -EINVAL; } ahash_tfm = crypto_alloc_ahash(alg_name, 0, 0); if (IS_ERR(ahash_tfm)) return PTR_ERR(ahash_tfm); req = ahash_request_alloc(ahash_tfm, GFP_KERNEL); if (!req) { rc = -ENOMEM; goto err_free_ahash; } crypto_init_wait(&wait); ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG, crypto_req_done, &wait); crypto_ahash_clear_flags(ahash_tfm, ~0); sg_init_one(&sg, key, keylen); ahash_request_set_crypt(req, &sg, ctx->key, keylen); rc = crypto_wait_req(crypto_ahash_digest(req), &wait); if (rc == 0) ctx->key_len = digestsize; ahash_request_free(req); err_free_ahash: crypto_free_ahash(ahash_tfm); return rc; } /* Set request size and initialize tfm context. */ static void __cra_init(struct crypto_tfm *tfm, struct ocs_hcu_ctx *ctx) { crypto_ahash_set_reqsize_dma(__crypto_ahash_cast(tfm), sizeof(struct ocs_hcu_rctx)); /* Init context to 0. */ memzero_explicit(ctx, sizeof(*ctx)); /* Set engine ops. */ ctx->engine_ctx.op.do_one_request = kmb_ocs_hcu_do_one_request; } static int kmb_ocs_hcu_sha_cra_init(struct crypto_tfm *tfm) { struct ocs_hcu_ctx *ctx = crypto_tfm_ctx(tfm); __cra_init(tfm, ctx); return 0; } static int kmb_ocs_hcu_sm3_cra_init(struct crypto_tfm *tfm) { struct ocs_hcu_ctx *ctx = crypto_tfm_ctx(tfm); __cra_init(tfm, ctx); ctx->is_sm3_tfm = true; return 0; } static int kmb_ocs_hcu_hmac_sm3_cra_init(struct crypto_tfm *tfm) { struct ocs_hcu_ctx *ctx = crypto_tfm_ctx(tfm); __cra_init(tfm, ctx); ctx->is_sm3_tfm = true; ctx->is_hmac_tfm = true; return 0; } static int kmb_ocs_hcu_hmac_cra_init(struct crypto_tfm *tfm) { struct ocs_hcu_ctx *ctx = crypto_tfm_ctx(tfm); __cra_init(tfm, ctx); ctx->is_hmac_tfm = true; return 0; } /* Function called when 'tfm' is de-initialized. */ static void kmb_ocs_hcu_hmac_cra_exit(struct crypto_tfm *tfm) { struct ocs_hcu_ctx *ctx = crypto_tfm_ctx(tfm); /* Clear the key. */ memzero_explicit(ctx->key, sizeof(ctx->key)); } static struct ahash_alg ocs_hcu_algs[] = { #ifdef CONFIG_CRYPTO_DEV_KEEMBAY_OCS_HCU_HMAC_SHA224 { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .halg = { .digestsize = SHA224_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "sha224", .cra_driver_name = "sha224-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SHA224_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_sha_cra_init, } } }, { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .setkey = kmb_ocs_hcu_setkey, .halg = { .digestsize = SHA224_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "hmac(sha224)", .cra_driver_name = "hmac-sha224-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SHA224_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_hmac_cra_init, .cra_exit = kmb_ocs_hcu_hmac_cra_exit, } } }, #endif /* CONFIG_CRYPTO_DEV_KEEMBAY_OCS_HCU_HMAC_SHA224 */ { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .halg = { .digestsize = SHA256_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "sha256", .cra_driver_name = "sha256-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SHA256_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_sha_cra_init, } } }, { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .setkey = kmb_ocs_hcu_setkey, .halg = { .digestsize = SHA256_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "hmac(sha256)", .cra_driver_name = "hmac-sha256-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SHA256_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_hmac_cra_init, .cra_exit = kmb_ocs_hcu_hmac_cra_exit, } } }, { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .halg = { .digestsize = SM3_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "sm3", .cra_driver_name = "sm3-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SM3_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_sm3_cra_init, } } }, { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .setkey = kmb_ocs_hcu_setkey, .halg = { .digestsize = SM3_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "hmac(sm3)", .cra_driver_name = "hmac-sm3-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SM3_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_hmac_sm3_cra_init, .cra_exit = kmb_ocs_hcu_hmac_cra_exit, } } }, { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .halg = { .digestsize = SHA384_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "sha384", .cra_driver_name = "sha384-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SHA384_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_sha_cra_init, } } }, { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .setkey = kmb_ocs_hcu_setkey, .halg = { .digestsize = SHA384_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "hmac(sha384)", .cra_driver_name = "hmac-sha384-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SHA384_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_hmac_cra_init, .cra_exit = kmb_ocs_hcu_hmac_cra_exit, } } }, { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .halg = { .digestsize = SHA512_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "sha512", .cra_driver_name = "sha512-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SHA512_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_sha_cra_init, } } }, { .init = kmb_ocs_hcu_init, .update = kmb_ocs_hcu_update, .final = kmb_ocs_hcu_final, .finup = kmb_ocs_hcu_finup, .digest = kmb_ocs_hcu_digest, .export = kmb_ocs_hcu_export, .import = kmb_ocs_hcu_import, .setkey = kmb_ocs_hcu_setkey, .halg = { .digestsize = SHA512_DIGEST_SIZE, .statesize = sizeof(struct ocs_hcu_rctx), .base = { .cra_name = "hmac(sha512)", .cra_driver_name = "hmac-sha512-keembay-ocs", .cra_priority = 255, .cra_flags = CRYPTO_ALG_ASYNC, .cra_blocksize = SHA512_BLOCK_SIZE, .cra_ctxsize = sizeof(struct ocs_hcu_ctx), .cra_alignmask = 0, .cra_module = THIS_MODULE, .cra_init = kmb_ocs_hcu_hmac_cra_init, .cra_exit = kmb_ocs_hcu_hmac_cra_exit, } } }, }; /* Device tree driver match. */ static const struct of_device_id kmb_ocs_hcu_of_match[] = { { .compatible = "intel,keembay-ocs-hcu", }, {} }; static int kmb_ocs_hcu_remove(struct platform_device *pdev) { struct ocs_hcu_dev *hcu_dev; int rc; hcu_dev = platform_get_drvdata(pdev); if (!hcu_dev) return -ENODEV; crypto_unregister_ahashes(ocs_hcu_algs, ARRAY_SIZE(ocs_hcu_algs)); rc = crypto_engine_exit(hcu_dev->engine); spin_lock_bh(&ocs_hcu.lock); list_del(&hcu_dev->list); spin_unlock_bh(&ocs_hcu.lock); return rc; } static int kmb_ocs_hcu_probe(struct platform_device *pdev) { struct device *dev = &pdev->dev; struct ocs_hcu_dev *hcu_dev; struct resource *hcu_mem; int rc; hcu_dev = devm_kzalloc(dev, sizeof(*hcu_dev), GFP_KERNEL); if (!hcu_dev) return -ENOMEM; hcu_dev->dev = dev; platform_set_drvdata(pdev, hcu_dev); rc = dma_set_mask_and_coherent(&pdev->dev, OCS_HCU_DMA_BIT_MASK); if (rc) return rc; /* Get the memory address and remap. */ hcu_mem = platform_get_resource(pdev, IORESOURCE_MEM, 0); if (!hcu_mem) { dev_err(dev, "Could not retrieve io mem resource.\n"); return -ENODEV; } hcu_dev->io_base = devm_ioremap_resource(dev, hcu_mem); if (IS_ERR(hcu_dev->io_base)) return PTR_ERR(hcu_dev->io_base); init_completion(&hcu_dev->irq_done); /* Get and request IRQ. */ hcu_dev->irq = platform_get_irq(pdev, 0); if (hcu_dev->irq < 0) return hcu_dev->irq; rc = devm_request_threaded_irq(&pdev->dev, hcu_dev->irq, ocs_hcu_irq_handler, NULL, 0, "keembay-ocs-hcu", hcu_dev); if (rc < 0) { dev_err(dev, "Could not request IRQ.\n"); return rc; } INIT_LIST_HEAD(&hcu_dev->list); spin_lock_bh(&ocs_hcu.lock); list_add_tail(&hcu_dev->list, &ocs_hcu.dev_list); spin_unlock_bh(&ocs_hcu.lock); /* Initialize crypto engine */ hcu_dev->engine = crypto_engine_alloc_init(dev, 1); if (!hcu_dev->engine) { rc = -ENOMEM; goto list_del; } rc = crypto_engine_start(hcu_dev->engine); if (rc) { dev_err(dev, "Could not start engine.\n"); goto cleanup; } /* Security infrastructure guarantees OCS clock is enabled. */ rc = crypto_register_ahashes(ocs_hcu_algs, ARRAY_SIZE(ocs_hcu_algs)); if (rc) { dev_err(dev, "Could not register algorithms.\n"); goto cleanup; } return 0; cleanup: crypto_engine_exit(hcu_dev->engine); list_del: spin_lock_bh(&ocs_hcu.lock); list_del(&hcu_dev->list); spin_unlock_bh(&ocs_hcu.lock); return rc; } /* The OCS driver is a platform device. */ static struct platform_driver kmb_ocs_hcu_driver = { .probe = kmb_ocs_hcu_probe, .remove = kmb_ocs_hcu_remove, .driver = { .name = DRV_NAME, .of_match_table = kmb_ocs_hcu_of_match, }, }; module_platform_driver(kmb_ocs_hcu_driver); MODULE_LICENSE("GPL");
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1