162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * sun8i-ss-cipher.c - hardware cryptographic offloader for 462306a36Sopenharmony_ci * Allwinner A80/A83T SoC 562306a36Sopenharmony_ci * 662306a36Sopenharmony_ci * Copyright (C) 2016-2019 Corentin LABBE <clabbe.montjoie@gmail.com> 762306a36Sopenharmony_ci * 862306a36Sopenharmony_ci * This file add support for AES cipher with 128,192,256 bits keysize in 962306a36Sopenharmony_ci * CBC and ECB mode. 1062306a36Sopenharmony_ci * 1162306a36Sopenharmony_ci * You could find a link for the datasheet in Documentation/arch/arm/sunxi.rst 1262306a36Sopenharmony_ci */ 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ci#include <linux/bottom_half.h> 1562306a36Sopenharmony_ci#include <linux/crypto.h> 1662306a36Sopenharmony_ci#include <linux/dma-mapping.h> 1762306a36Sopenharmony_ci#include <linux/io.h> 1862306a36Sopenharmony_ci#include <linux/pm_runtime.h> 1962306a36Sopenharmony_ci#include <crypto/scatterwalk.h> 2062306a36Sopenharmony_ci#include <crypto/internal/skcipher.h> 2162306a36Sopenharmony_ci#include "sun8i-ss.h" 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_cistatic bool sun8i_ss_need_fallback(struct skcipher_request *areq) 2462306a36Sopenharmony_ci{ 2562306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(areq); 2662306a36Sopenharmony_ci struct skcipher_alg *alg = crypto_skcipher_alg(tfm); 2762306a36Sopenharmony_ci struct sun8i_ss_alg_template *algt = container_of(alg, struct sun8i_ss_alg_template, alg.skcipher.base); 2862306a36Sopenharmony_ci struct scatterlist *in_sg = areq->src; 2962306a36Sopenharmony_ci struct scatterlist *out_sg = areq->dst; 3062306a36Sopenharmony_ci struct scatterlist *sg; 3162306a36Sopenharmony_ci unsigned int todo, len; 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_ci if (areq->cryptlen == 0 || areq->cryptlen % 16) { 3462306a36Sopenharmony_ci algt->stat_fb_len++; 3562306a36Sopenharmony_ci return true; 3662306a36Sopenharmony_ci } 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_ci if (sg_nents_for_len(areq->src, areq->cryptlen) > 8 || 3962306a36Sopenharmony_ci sg_nents_for_len(areq->dst, areq->cryptlen) > 8) { 4062306a36Sopenharmony_ci algt->stat_fb_sgnum++; 4162306a36Sopenharmony_ci return true; 4262306a36Sopenharmony_ci } 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_ci len = areq->cryptlen; 4562306a36Sopenharmony_ci sg = areq->src; 4662306a36Sopenharmony_ci while (sg) { 4762306a36Sopenharmony_ci todo = min(len, sg->length); 4862306a36Sopenharmony_ci if ((todo % 16) != 0) { 4962306a36Sopenharmony_ci algt->stat_fb_sglen++; 5062306a36Sopenharmony_ci return true; 5162306a36Sopenharmony_ci } 5262306a36Sopenharmony_ci if (!IS_ALIGNED(sg->offset, 16)) { 5362306a36Sopenharmony_ci algt->stat_fb_align++; 5462306a36Sopenharmony_ci return true; 5562306a36Sopenharmony_ci } 5662306a36Sopenharmony_ci len -= todo; 5762306a36Sopenharmony_ci sg = sg_next(sg); 5862306a36Sopenharmony_ci } 5962306a36Sopenharmony_ci len = areq->cryptlen; 6062306a36Sopenharmony_ci sg = areq->dst; 6162306a36Sopenharmony_ci while (sg) { 6262306a36Sopenharmony_ci todo = min(len, sg->length); 6362306a36Sopenharmony_ci if ((todo % 16) != 0) { 6462306a36Sopenharmony_ci algt->stat_fb_sglen++; 6562306a36Sopenharmony_ci return true; 6662306a36Sopenharmony_ci } 6762306a36Sopenharmony_ci if (!IS_ALIGNED(sg->offset, 16)) { 6862306a36Sopenharmony_ci algt->stat_fb_align++; 6962306a36Sopenharmony_ci return true; 7062306a36Sopenharmony_ci } 7162306a36Sopenharmony_ci len -= todo; 7262306a36Sopenharmony_ci sg = sg_next(sg); 7362306a36Sopenharmony_ci } 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci /* SS need same numbers of SG (with same length) for source and destination */ 7662306a36Sopenharmony_ci in_sg = areq->src; 7762306a36Sopenharmony_ci out_sg = areq->dst; 7862306a36Sopenharmony_ci while (in_sg && out_sg) { 7962306a36Sopenharmony_ci if (in_sg->length != out_sg->length) 8062306a36Sopenharmony_ci return true; 8162306a36Sopenharmony_ci in_sg = sg_next(in_sg); 8262306a36Sopenharmony_ci out_sg = sg_next(out_sg); 8362306a36Sopenharmony_ci } 8462306a36Sopenharmony_ci if (in_sg || out_sg) 8562306a36Sopenharmony_ci return true; 8662306a36Sopenharmony_ci return false; 8762306a36Sopenharmony_ci} 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_cistatic int sun8i_ss_cipher_fallback(struct skcipher_request *areq) 9062306a36Sopenharmony_ci{ 9162306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(areq); 9262306a36Sopenharmony_ci struct sun8i_cipher_tfm_ctx *op = crypto_skcipher_ctx(tfm); 9362306a36Sopenharmony_ci struct sun8i_cipher_req_ctx *rctx = skcipher_request_ctx(areq); 9462306a36Sopenharmony_ci int err; 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_CRYPTO_DEV_SUN8I_SS_DEBUG)) { 9762306a36Sopenharmony_ci struct skcipher_alg *alg = crypto_skcipher_alg(tfm); 9862306a36Sopenharmony_ci struct sun8i_ss_alg_template *algt __maybe_unused; 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_ci algt = container_of(alg, struct sun8i_ss_alg_template, 10162306a36Sopenharmony_ci alg.skcipher.base); 10262306a36Sopenharmony_ci 10362306a36Sopenharmony_ci#ifdef CONFIG_CRYPTO_DEV_SUN8I_SS_DEBUG 10462306a36Sopenharmony_ci algt->stat_fb++; 10562306a36Sopenharmony_ci#endif 10662306a36Sopenharmony_ci } 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_ci skcipher_request_set_tfm(&rctx->fallback_req, op->fallback_tfm); 10962306a36Sopenharmony_ci skcipher_request_set_callback(&rctx->fallback_req, areq->base.flags, 11062306a36Sopenharmony_ci areq->base.complete, areq->base.data); 11162306a36Sopenharmony_ci skcipher_request_set_crypt(&rctx->fallback_req, areq->src, areq->dst, 11262306a36Sopenharmony_ci areq->cryptlen, areq->iv); 11362306a36Sopenharmony_ci if (rctx->op_dir & SS_DECRYPTION) 11462306a36Sopenharmony_ci err = crypto_skcipher_decrypt(&rctx->fallback_req); 11562306a36Sopenharmony_ci else 11662306a36Sopenharmony_ci err = crypto_skcipher_encrypt(&rctx->fallback_req); 11762306a36Sopenharmony_ci return err; 11862306a36Sopenharmony_ci} 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_cistatic int sun8i_ss_setup_ivs(struct skcipher_request *areq) 12162306a36Sopenharmony_ci{ 12262306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(areq); 12362306a36Sopenharmony_ci struct sun8i_cipher_tfm_ctx *op = crypto_skcipher_ctx(tfm); 12462306a36Sopenharmony_ci struct sun8i_ss_dev *ss = op->ss; 12562306a36Sopenharmony_ci struct sun8i_cipher_req_ctx *rctx = skcipher_request_ctx(areq); 12662306a36Sopenharmony_ci struct scatterlist *sg = areq->src; 12762306a36Sopenharmony_ci unsigned int todo, offset; 12862306a36Sopenharmony_ci unsigned int len = areq->cryptlen; 12962306a36Sopenharmony_ci unsigned int ivsize = crypto_skcipher_ivsize(tfm); 13062306a36Sopenharmony_ci struct sun8i_ss_flow *sf = &ss->flows[rctx->flow]; 13162306a36Sopenharmony_ci int i = 0; 13262306a36Sopenharmony_ci dma_addr_t a; 13362306a36Sopenharmony_ci int err; 13462306a36Sopenharmony_ci 13562306a36Sopenharmony_ci rctx->ivlen = ivsize; 13662306a36Sopenharmony_ci if (rctx->op_dir & SS_DECRYPTION) { 13762306a36Sopenharmony_ci offset = areq->cryptlen - ivsize; 13862306a36Sopenharmony_ci scatterwalk_map_and_copy(sf->biv, areq->src, offset, 13962306a36Sopenharmony_ci ivsize, 0); 14062306a36Sopenharmony_ci } 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci /* we need to copy all IVs from source in case DMA is bi-directionnal */ 14362306a36Sopenharmony_ci while (sg && len) { 14462306a36Sopenharmony_ci if (sg_dma_len(sg) == 0) { 14562306a36Sopenharmony_ci sg = sg_next(sg); 14662306a36Sopenharmony_ci continue; 14762306a36Sopenharmony_ci } 14862306a36Sopenharmony_ci if (i == 0) 14962306a36Sopenharmony_ci memcpy(sf->iv[0], areq->iv, ivsize); 15062306a36Sopenharmony_ci a = dma_map_single(ss->dev, sf->iv[i], ivsize, DMA_TO_DEVICE); 15162306a36Sopenharmony_ci if (dma_mapping_error(ss->dev, a)) { 15262306a36Sopenharmony_ci memzero_explicit(sf->iv[i], ivsize); 15362306a36Sopenharmony_ci dev_err(ss->dev, "Cannot DMA MAP IV\n"); 15462306a36Sopenharmony_ci err = -EFAULT; 15562306a36Sopenharmony_ci goto dma_iv_error; 15662306a36Sopenharmony_ci } 15762306a36Sopenharmony_ci rctx->p_iv[i] = a; 15862306a36Sopenharmony_ci /* we need to setup all others IVs only in the decrypt way */ 15962306a36Sopenharmony_ci if (rctx->op_dir == SS_ENCRYPTION) 16062306a36Sopenharmony_ci return 0; 16162306a36Sopenharmony_ci todo = min(len, sg_dma_len(sg)); 16262306a36Sopenharmony_ci len -= todo; 16362306a36Sopenharmony_ci i++; 16462306a36Sopenharmony_ci if (i < MAX_SG) { 16562306a36Sopenharmony_ci offset = sg->length - ivsize; 16662306a36Sopenharmony_ci scatterwalk_map_and_copy(sf->iv[i], sg, offset, ivsize, 0); 16762306a36Sopenharmony_ci } 16862306a36Sopenharmony_ci rctx->niv = i; 16962306a36Sopenharmony_ci sg = sg_next(sg); 17062306a36Sopenharmony_ci } 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_ci return 0; 17362306a36Sopenharmony_cidma_iv_error: 17462306a36Sopenharmony_ci i--; 17562306a36Sopenharmony_ci while (i >= 0) { 17662306a36Sopenharmony_ci dma_unmap_single(ss->dev, rctx->p_iv[i], ivsize, DMA_TO_DEVICE); 17762306a36Sopenharmony_ci memzero_explicit(sf->iv[i], ivsize); 17862306a36Sopenharmony_ci i--; 17962306a36Sopenharmony_ci } 18062306a36Sopenharmony_ci return err; 18162306a36Sopenharmony_ci} 18262306a36Sopenharmony_ci 18362306a36Sopenharmony_cistatic int sun8i_ss_cipher(struct skcipher_request *areq) 18462306a36Sopenharmony_ci{ 18562306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(areq); 18662306a36Sopenharmony_ci struct sun8i_cipher_tfm_ctx *op = crypto_skcipher_ctx(tfm); 18762306a36Sopenharmony_ci struct sun8i_ss_dev *ss = op->ss; 18862306a36Sopenharmony_ci struct sun8i_cipher_req_ctx *rctx = skcipher_request_ctx(areq); 18962306a36Sopenharmony_ci struct skcipher_alg *alg = crypto_skcipher_alg(tfm); 19062306a36Sopenharmony_ci struct sun8i_ss_alg_template *algt; 19162306a36Sopenharmony_ci struct sun8i_ss_flow *sf = &ss->flows[rctx->flow]; 19262306a36Sopenharmony_ci struct scatterlist *sg; 19362306a36Sopenharmony_ci unsigned int todo, len, offset, ivsize; 19462306a36Sopenharmony_ci int nr_sgs = 0; 19562306a36Sopenharmony_ci int nr_sgd = 0; 19662306a36Sopenharmony_ci int err = 0; 19762306a36Sopenharmony_ci int nsgs = sg_nents_for_len(areq->src, areq->cryptlen); 19862306a36Sopenharmony_ci int nsgd = sg_nents_for_len(areq->dst, areq->cryptlen); 19962306a36Sopenharmony_ci int i; 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci algt = container_of(alg, struct sun8i_ss_alg_template, alg.skcipher.base); 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_ci dev_dbg(ss->dev, "%s %s %u %x IV(%p %u) key=%u\n", __func__, 20462306a36Sopenharmony_ci crypto_tfm_alg_name(areq->base.tfm), 20562306a36Sopenharmony_ci areq->cryptlen, 20662306a36Sopenharmony_ci rctx->op_dir, areq->iv, crypto_skcipher_ivsize(tfm), 20762306a36Sopenharmony_ci op->keylen); 20862306a36Sopenharmony_ci 20962306a36Sopenharmony_ci#ifdef CONFIG_CRYPTO_DEV_SUN8I_SS_DEBUG 21062306a36Sopenharmony_ci algt->stat_req++; 21162306a36Sopenharmony_ci#endif 21262306a36Sopenharmony_ci 21362306a36Sopenharmony_ci rctx->op_mode = ss->variant->op_mode[algt->ss_blockmode]; 21462306a36Sopenharmony_ci rctx->method = ss->variant->alg_cipher[algt->ss_algo_id]; 21562306a36Sopenharmony_ci rctx->keylen = op->keylen; 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_ci rctx->p_key = dma_map_single(ss->dev, op->key, op->keylen, DMA_TO_DEVICE); 21862306a36Sopenharmony_ci if (dma_mapping_error(ss->dev, rctx->p_key)) { 21962306a36Sopenharmony_ci dev_err(ss->dev, "Cannot DMA MAP KEY\n"); 22062306a36Sopenharmony_ci err = -EFAULT; 22162306a36Sopenharmony_ci goto theend; 22262306a36Sopenharmony_ci } 22362306a36Sopenharmony_ci 22462306a36Sopenharmony_ci ivsize = crypto_skcipher_ivsize(tfm); 22562306a36Sopenharmony_ci if (areq->iv && crypto_skcipher_ivsize(tfm) > 0) { 22662306a36Sopenharmony_ci err = sun8i_ss_setup_ivs(areq); 22762306a36Sopenharmony_ci if (err) 22862306a36Sopenharmony_ci goto theend_key; 22962306a36Sopenharmony_ci } 23062306a36Sopenharmony_ci if (areq->src == areq->dst) { 23162306a36Sopenharmony_ci nr_sgs = dma_map_sg(ss->dev, areq->src, nsgs, DMA_BIDIRECTIONAL); 23262306a36Sopenharmony_ci if (nr_sgs <= 0 || nr_sgs > 8) { 23362306a36Sopenharmony_ci dev_err(ss->dev, "Invalid sg number %d\n", nr_sgs); 23462306a36Sopenharmony_ci err = -EINVAL; 23562306a36Sopenharmony_ci goto theend_iv; 23662306a36Sopenharmony_ci } 23762306a36Sopenharmony_ci nr_sgd = nr_sgs; 23862306a36Sopenharmony_ci } else { 23962306a36Sopenharmony_ci nr_sgs = dma_map_sg(ss->dev, areq->src, nsgs, DMA_TO_DEVICE); 24062306a36Sopenharmony_ci if (nr_sgs <= 0 || nr_sgs > 8) { 24162306a36Sopenharmony_ci dev_err(ss->dev, "Invalid sg number %d\n", nr_sgs); 24262306a36Sopenharmony_ci err = -EINVAL; 24362306a36Sopenharmony_ci goto theend_iv; 24462306a36Sopenharmony_ci } 24562306a36Sopenharmony_ci nr_sgd = dma_map_sg(ss->dev, areq->dst, nsgd, DMA_FROM_DEVICE); 24662306a36Sopenharmony_ci if (nr_sgd <= 0 || nr_sgd > 8) { 24762306a36Sopenharmony_ci dev_err(ss->dev, "Invalid sg number %d\n", nr_sgd); 24862306a36Sopenharmony_ci err = -EINVAL; 24962306a36Sopenharmony_ci goto theend_sgs; 25062306a36Sopenharmony_ci } 25162306a36Sopenharmony_ci } 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci len = areq->cryptlen; 25462306a36Sopenharmony_ci i = 0; 25562306a36Sopenharmony_ci sg = areq->src; 25662306a36Sopenharmony_ci while (i < nr_sgs && sg && len) { 25762306a36Sopenharmony_ci if (sg_dma_len(sg) == 0) 25862306a36Sopenharmony_ci goto sgs_next; 25962306a36Sopenharmony_ci rctx->t_src[i].addr = sg_dma_address(sg); 26062306a36Sopenharmony_ci todo = min(len, sg_dma_len(sg)); 26162306a36Sopenharmony_ci rctx->t_src[i].len = todo / 4; 26262306a36Sopenharmony_ci dev_dbg(ss->dev, "%s total=%u SGS(%d %u off=%d) todo=%u\n", __func__, 26362306a36Sopenharmony_ci areq->cryptlen, i, rctx->t_src[i].len, sg->offset, todo); 26462306a36Sopenharmony_ci len -= todo; 26562306a36Sopenharmony_ci i++; 26662306a36Sopenharmony_cisgs_next: 26762306a36Sopenharmony_ci sg = sg_next(sg); 26862306a36Sopenharmony_ci } 26962306a36Sopenharmony_ci if (len > 0) { 27062306a36Sopenharmony_ci dev_err(ss->dev, "remaining len %d\n", len); 27162306a36Sopenharmony_ci err = -EINVAL; 27262306a36Sopenharmony_ci goto theend_sgs; 27362306a36Sopenharmony_ci } 27462306a36Sopenharmony_ci 27562306a36Sopenharmony_ci len = areq->cryptlen; 27662306a36Sopenharmony_ci i = 0; 27762306a36Sopenharmony_ci sg = areq->dst; 27862306a36Sopenharmony_ci while (i < nr_sgd && sg && len) { 27962306a36Sopenharmony_ci if (sg_dma_len(sg) == 0) 28062306a36Sopenharmony_ci goto sgd_next; 28162306a36Sopenharmony_ci rctx->t_dst[i].addr = sg_dma_address(sg); 28262306a36Sopenharmony_ci todo = min(len, sg_dma_len(sg)); 28362306a36Sopenharmony_ci rctx->t_dst[i].len = todo / 4; 28462306a36Sopenharmony_ci dev_dbg(ss->dev, "%s total=%u SGD(%d %u off=%d) todo=%u\n", __func__, 28562306a36Sopenharmony_ci areq->cryptlen, i, rctx->t_dst[i].len, sg->offset, todo); 28662306a36Sopenharmony_ci len -= todo; 28762306a36Sopenharmony_ci i++; 28862306a36Sopenharmony_cisgd_next: 28962306a36Sopenharmony_ci sg = sg_next(sg); 29062306a36Sopenharmony_ci } 29162306a36Sopenharmony_ci if (len > 0) { 29262306a36Sopenharmony_ci dev_err(ss->dev, "remaining len %d\n", len); 29362306a36Sopenharmony_ci err = -EINVAL; 29462306a36Sopenharmony_ci goto theend_sgs; 29562306a36Sopenharmony_ci } 29662306a36Sopenharmony_ci 29762306a36Sopenharmony_ci err = sun8i_ss_run_task(ss, rctx, crypto_tfm_alg_name(areq->base.tfm)); 29862306a36Sopenharmony_ci 29962306a36Sopenharmony_citheend_sgs: 30062306a36Sopenharmony_ci if (areq->src == areq->dst) { 30162306a36Sopenharmony_ci dma_unmap_sg(ss->dev, areq->src, nsgs, DMA_BIDIRECTIONAL); 30262306a36Sopenharmony_ci } else { 30362306a36Sopenharmony_ci dma_unmap_sg(ss->dev, areq->src, nsgs, DMA_TO_DEVICE); 30462306a36Sopenharmony_ci dma_unmap_sg(ss->dev, areq->dst, nsgd, DMA_FROM_DEVICE); 30562306a36Sopenharmony_ci } 30662306a36Sopenharmony_ci 30762306a36Sopenharmony_citheend_iv: 30862306a36Sopenharmony_ci if (areq->iv && ivsize > 0) { 30962306a36Sopenharmony_ci for (i = 0; i < rctx->niv; i++) { 31062306a36Sopenharmony_ci dma_unmap_single(ss->dev, rctx->p_iv[i], ivsize, DMA_TO_DEVICE); 31162306a36Sopenharmony_ci memzero_explicit(sf->iv[i], ivsize); 31262306a36Sopenharmony_ci } 31362306a36Sopenharmony_ci 31462306a36Sopenharmony_ci offset = areq->cryptlen - ivsize; 31562306a36Sopenharmony_ci if (rctx->op_dir & SS_DECRYPTION) { 31662306a36Sopenharmony_ci memcpy(areq->iv, sf->biv, ivsize); 31762306a36Sopenharmony_ci memzero_explicit(sf->biv, ivsize); 31862306a36Sopenharmony_ci } else { 31962306a36Sopenharmony_ci scatterwalk_map_and_copy(areq->iv, areq->dst, offset, 32062306a36Sopenharmony_ci ivsize, 0); 32162306a36Sopenharmony_ci } 32262306a36Sopenharmony_ci } 32362306a36Sopenharmony_ci 32462306a36Sopenharmony_citheend_key: 32562306a36Sopenharmony_ci dma_unmap_single(ss->dev, rctx->p_key, op->keylen, DMA_TO_DEVICE); 32662306a36Sopenharmony_ci 32762306a36Sopenharmony_citheend: 32862306a36Sopenharmony_ci 32962306a36Sopenharmony_ci return err; 33062306a36Sopenharmony_ci} 33162306a36Sopenharmony_ci 33262306a36Sopenharmony_ciint sun8i_ss_handle_cipher_request(struct crypto_engine *engine, void *areq) 33362306a36Sopenharmony_ci{ 33462306a36Sopenharmony_ci int err; 33562306a36Sopenharmony_ci struct skcipher_request *breq = container_of(areq, struct skcipher_request, base); 33662306a36Sopenharmony_ci 33762306a36Sopenharmony_ci err = sun8i_ss_cipher(breq); 33862306a36Sopenharmony_ci local_bh_disable(); 33962306a36Sopenharmony_ci crypto_finalize_skcipher_request(engine, breq, err); 34062306a36Sopenharmony_ci local_bh_enable(); 34162306a36Sopenharmony_ci 34262306a36Sopenharmony_ci return 0; 34362306a36Sopenharmony_ci} 34462306a36Sopenharmony_ci 34562306a36Sopenharmony_ciint sun8i_ss_skdecrypt(struct skcipher_request *areq) 34662306a36Sopenharmony_ci{ 34762306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(areq); 34862306a36Sopenharmony_ci struct sun8i_cipher_tfm_ctx *op = crypto_skcipher_ctx(tfm); 34962306a36Sopenharmony_ci struct sun8i_cipher_req_ctx *rctx = skcipher_request_ctx(areq); 35062306a36Sopenharmony_ci struct crypto_engine *engine; 35162306a36Sopenharmony_ci int e; 35262306a36Sopenharmony_ci 35362306a36Sopenharmony_ci memset(rctx, 0, sizeof(struct sun8i_cipher_req_ctx)); 35462306a36Sopenharmony_ci rctx->op_dir = SS_DECRYPTION; 35562306a36Sopenharmony_ci 35662306a36Sopenharmony_ci if (sun8i_ss_need_fallback(areq)) 35762306a36Sopenharmony_ci return sun8i_ss_cipher_fallback(areq); 35862306a36Sopenharmony_ci 35962306a36Sopenharmony_ci e = sun8i_ss_get_engine_number(op->ss); 36062306a36Sopenharmony_ci engine = op->ss->flows[e].engine; 36162306a36Sopenharmony_ci rctx->flow = e; 36262306a36Sopenharmony_ci 36362306a36Sopenharmony_ci return crypto_transfer_skcipher_request_to_engine(engine, areq); 36462306a36Sopenharmony_ci} 36562306a36Sopenharmony_ci 36662306a36Sopenharmony_ciint sun8i_ss_skencrypt(struct skcipher_request *areq) 36762306a36Sopenharmony_ci{ 36862306a36Sopenharmony_ci struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(areq); 36962306a36Sopenharmony_ci struct sun8i_cipher_tfm_ctx *op = crypto_skcipher_ctx(tfm); 37062306a36Sopenharmony_ci struct sun8i_cipher_req_ctx *rctx = skcipher_request_ctx(areq); 37162306a36Sopenharmony_ci struct crypto_engine *engine; 37262306a36Sopenharmony_ci int e; 37362306a36Sopenharmony_ci 37462306a36Sopenharmony_ci memset(rctx, 0, sizeof(struct sun8i_cipher_req_ctx)); 37562306a36Sopenharmony_ci rctx->op_dir = SS_ENCRYPTION; 37662306a36Sopenharmony_ci 37762306a36Sopenharmony_ci if (sun8i_ss_need_fallback(areq)) 37862306a36Sopenharmony_ci return sun8i_ss_cipher_fallback(areq); 37962306a36Sopenharmony_ci 38062306a36Sopenharmony_ci e = sun8i_ss_get_engine_number(op->ss); 38162306a36Sopenharmony_ci engine = op->ss->flows[e].engine; 38262306a36Sopenharmony_ci rctx->flow = e; 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_ci return crypto_transfer_skcipher_request_to_engine(engine, areq); 38562306a36Sopenharmony_ci} 38662306a36Sopenharmony_ci 38762306a36Sopenharmony_ciint sun8i_ss_cipher_init(struct crypto_tfm *tfm) 38862306a36Sopenharmony_ci{ 38962306a36Sopenharmony_ci struct sun8i_cipher_tfm_ctx *op = crypto_tfm_ctx(tfm); 39062306a36Sopenharmony_ci struct sun8i_ss_alg_template *algt; 39162306a36Sopenharmony_ci const char *name = crypto_tfm_alg_name(tfm); 39262306a36Sopenharmony_ci struct crypto_skcipher *sktfm = __crypto_skcipher_cast(tfm); 39362306a36Sopenharmony_ci struct skcipher_alg *alg = crypto_skcipher_alg(sktfm); 39462306a36Sopenharmony_ci int err; 39562306a36Sopenharmony_ci 39662306a36Sopenharmony_ci memset(op, 0, sizeof(struct sun8i_cipher_tfm_ctx)); 39762306a36Sopenharmony_ci 39862306a36Sopenharmony_ci algt = container_of(alg, struct sun8i_ss_alg_template, alg.skcipher.base); 39962306a36Sopenharmony_ci op->ss = algt->ss; 40062306a36Sopenharmony_ci 40162306a36Sopenharmony_ci op->fallback_tfm = crypto_alloc_skcipher(name, 0, CRYPTO_ALG_NEED_FALLBACK); 40262306a36Sopenharmony_ci if (IS_ERR(op->fallback_tfm)) { 40362306a36Sopenharmony_ci dev_err(op->ss->dev, "ERROR: Cannot allocate fallback for %s %ld\n", 40462306a36Sopenharmony_ci name, PTR_ERR(op->fallback_tfm)); 40562306a36Sopenharmony_ci return PTR_ERR(op->fallback_tfm); 40662306a36Sopenharmony_ci } 40762306a36Sopenharmony_ci 40862306a36Sopenharmony_ci sktfm->reqsize = sizeof(struct sun8i_cipher_req_ctx) + 40962306a36Sopenharmony_ci crypto_skcipher_reqsize(op->fallback_tfm); 41062306a36Sopenharmony_ci 41162306a36Sopenharmony_ci 41262306a36Sopenharmony_ci memcpy(algt->fbname, 41362306a36Sopenharmony_ci crypto_tfm_alg_driver_name(crypto_skcipher_tfm(op->fallback_tfm)), 41462306a36Sopenharmony_ci CRYPTO_MAX_ALG_NAME); 41562306a36Sopenharmony_ci 41662306a36Sopenharmony_ci err = pm_runtime_resume_and_get(op->ss->dev); 41762306a36Sopenharmony_ci if (err < 0) { 41862306a36Sopenharmony_ci dev_err(op->ss->dev, "pm error %d\n", err); 41962306a36Sopenharmony_ci goto error_pm; 42062306a36Sopenharmony_ci } 42162306a36Sopenharmony_ci 42262306a36Sopenharmony_ci return 0; 42362306a36Sopenharmony_cierror_pm: 42462306a36Sopenharmony_ci crypto_free_skcipher(op->fallback_tfm); 42562306a36Sopenharmony_ci return err; 42662306a36Sopenharmony_ci} 42762306a36Sopenharmony_ci 42862306a36Sopenharmony_civoid sun8i_ss_cipher_exit(struct crypto_tfm *tfm) 42962306a36Sopenharmony_ci{ 43062306a36Sopenharmony_ci struct sun8i_cipher_tfm_ctx *op = crypto_tfm_ctx(tfm); 43162306a36Sopenharmony_ci 43262306a36Sopenharmony_ci kfree_sensitive(op->key); 43362306a36Sopenharmony_ci crypto_free_skcipher(op->fallback_tfm); 43462306a36Sopenharmony_ci pm_runtime_put_sync(op->ss->dev); 43562306a36Sopenharmony_ci} 43662306a36Sopenharmony_ci 43762306a36Sopenharmony_ciint sun8i_ss_aes_setkey(struct crypto_skcipher *tfm, const u8 *key, 43862306a36Sopenharmony_ci unsigned int keylen) 43962306a36Sopenharmony_ci{ 44062306a36Sopenharmony_ci struct sun8i_cipher_tfm_ctx *op = crypto_skcipher_ctx(tfm); 44162306a36Sopenharmony_ci struct sun8i_ss_dev *ss = op->ss; 44262306a36Sopenharmony_ci 44362306a36Sopenharmony_ci switch (keylen) { 44462306a36Sopenharmony_ci case 128 / 8: 44562306a36Sopenharmony_ci break; 44662306a36Sopenharmony_ci case 192 / 8: 44762306a36Sopenharmony_ci break; 44862306a36Sopenharmony_ci case 256 / 8: 44962306a36Sopenharmony_ci break; 45062306a36Sopenharmony_ci default: 45162306a36Sopenharmony_ci dev_dbg(ss->dev, "ERROR: Invalid keylen %u\n", keylen); 45262306a36Sopenharmony_ci return -EINVAL; 45362306a36Sopenharmony_ci } 45462306a36Sopenharmony_ci kfree_sensitive(op->key); 45562306a36Sopenharmony_ci op->keylen = keylen; 45662306a36Sopenharmony_ci op->key = kmemdup(key, keylen, GFP_KERNEL); 45762306a36Sopenharmony_ci if (!op->key) 45862306a36Sopenharmony_ci return -ENOMEM; 45962306a36Sopenharmony_ci 46062306a36Sopenharmony_ci crypto_skcipher_clear_flags(op->fallback_tfm, CRYPTO_TFM_REQ_MASK); 46162306a36Sopenharmony_ci crypto_skcipher_set_flags(op->fallback_tfm, tfm->base.crt_flags & CRYPTO_TFM_REQ_MASK); 46262306a36Sopenharmony_ci 46362306a36Sopenharmony_ci return crypto_skcipher_setkey(op->fallback_tfm, key, keylen); 46462306a36Sopenharmony_ci} 46562306a36Sopenharmony_ci 46662306a36Sopenharmony_ciint sun8i_ss_des3_setkey(struct crypto_skcipher *tfm, const u8 *key, 46762306a36Sopenharmony_ci unsigned int keylen) 46862306a36Sopenharmony_ci{ 46962306a36Sopenharmony_ci struct sun8i_cipher_tfm_ctx *op = crypto_skcipher_ctx(tfm); 47062306a36Sopenharmony_ci struct sun8i_ss_dev *ss = op->ss; 47162306a36Sopenharmony_ci 47262306a36Sopenharmony_ci if (unlikely(keylen != 3 * DES_KEY_SIZE)) { 47362306a36Sopenharmony_ci dev_dbg(ss->dev, "Invalid keylen %u\n", keylen); 47462306a36Sopenharmony_ci return -EINVAL; 47562306a36Sopenharmony_ci } 47662306a36Sopenharmony_ci 47762306a36Sopenharmony_ci kfree_sensitive(op->key); 47862306a36Sopenharmony_ci op->keylen = keylen; 47962306a36Sopenharmony_ci op->key = kmemdup(key, keylen, GFP_KERNEL); 48062306a36Sopenharmony_ci if (!op->key) 48162306a36Sopenharmony_ci return -ENOMEM; 48262306a36Sopenharmony_ci 48362306a36Sopenharmony_ci crypto_skcipher_clear_flags(op->fallback_tfm, CRYPTO_TFM_REQ_MASK); 48462306a36Sopenharmony_ci crypto_skcipher_set_flags(op->fallback_tfm, tfm->base.crt_flags & CRYPTO_TFM_REQ_MASK); 48562306a36Sopenharmony_ci 48662306a36Sopenharmony_ci return crypto_skcipher_setkey(op->fallback_tfm, key, keylen); 48762306a36Sopenharmony_ci} 488