162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Microchip / Atmel ECC (I2C) driver.
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (c) 2017, Microchip Technology Inc.
662306a36Sopenharmony_ci * Author: Tudor Ambarus
762306a36Sopenharmony_ci */
862306a36Sopenharmony_ci
962306a36Sopenharmony_ci#include <linux/delay.h>
1062306a36Sopenharmony_ci#include <linux/device.h>
1162306a36Sopenharmony_ci#include <linux/err.h>
1262306a36Sopenharmony_ci#include <linux/errno.h>
1362306a36Sopenharmony_ci#include <linux/i2c.h>
1462306a36Sopenharmony_ci#include <linux/init.h>
1562306a36Sopenharmony_ci#include <linux/kernel.h>
1662306a36Sopenharmony_ci#include <linux/module.h>
1762306a36Sopenharmony_ci#include <linux/of.h>
1862306a36Sopenharmony_ci#include <linux/scatterlist.h>
1962306a36Sopenharmony_ci#include <linux/slab.h>
2062306a36Sopenharmony_ci#include <linux/workqueue.h>
2162306a36Sopenharmony_ci#include <crypto/internal/kpp.h>
2262306a36Sopenharmony_ci#include <crypto/ecdh.h>
2362306a36Sopenharmony_ci#include <crypto/kpp.h>
2462306a36Sopenharmony_ci#include "atmel-i2c.h"
2562306a36Sopenharmony_ci
2662306a36Sopenharmony_cistatic struct atmel_ecc_driver_data driver_data;
2762306a36Sopenharmony_ci
2862306a36Sopenharmony_ci/**
2962306a36Sopenharmony_ci * struct atmel_ecdh_ctx - transformation context
3062306a36Sopenharmony_ci * @client     : pointer to i2c client device
3162306a36Sopenharmony_ci * @fallback   : used for unsupported curves or when user wants to use its own
3262306a36Sopenharmony_ci *               private key.
3362306a36Sopenharmony_ci * @public_key : generated when calling set_secret(). It's the responsibility
3462306a36Sopenharmony_ci *               of the user to not call set_secret() while
3562306a36Sopenharmony_ci *               generate_public_key() or compute_shared_secret() are in flight.
3662306a36Sopenharmony_ci * @curve_id   : elliptic curve id
3762306a36Sopenharmony_ci * @do_fallback: true when the device doesn't support the curve or when the user
3862306a36Sopenharmony_ci *               wants to use its own private key.
3962306a36Sopenharmony_ci */
4062306a36Sopenharmony_cistruct atmel_ecdh_ctx {
4162306a36Sopenharmony_ci	struct i2c_client *client;
4262306a36Sopenharmony_ci	struct crypto_kpp *fallback;
4362306a36Sopenharmony_ci	const u8 *public_key;
4462306a36Sopenharmony_ci	unsigned int curve_id;
4562306a36Sopenharmony_ci	bool do_fallback;
4662306a36Sopenharmony_ci};
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_cistatic void atmel_ecdh_done(struct atmel_i2c_work_data *work_data, void *areq,
4962306a36Sopenharmony_ci			    int status)
5062306a36Sopenharmony_ci{
5162306a36Sopenharmony_ci	struct kpp_request *req = areq;
5262306a36Sopenharmony_ci	struct atmel_i2c_cmd *cmd = &work_data->cmd;
5362306a36Sopenharmony_ci	size_t copied, n_sz;
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_ci	if (status)
5662306a36Sopenharmony_ci		goto free_work_data;
5762306a36Sopenharmony_ci
5862306a36Sopenharmony_ci	/* might want less than we've got */
5962306a36Sopenharmony_ci	n_sz = min_t(size_t, ATMEL_ECC_NIST_P256_N_SIZE, req->dst_len);
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci	/* copy the shared secret */
6262306a36Sopenharmony_ci	copied = sg_copy_from_buffer(req->dst, sg_nents_for_len(req->dst, n_sz),
6362306a36Sopenharmony_ci				     &cmd->data[RSP_DATA_IDX], n_sz);
6462306a36Sopenharmony_ci	if (copied != n_sz)
6562306a36Sopenharmony_ci		status = -EINVAL;
6662306a36Sopenharmony_ci
6762306a36Sopenharmony_ci	/* fall through */
6862306a36Sopenharmony_cifree_work_data:
6962306a36Sopenharmony_ci	kfree_sensitive(work_data);
7062306a36Sopenharmony_ci	kpp_request_complete(req, status);
7162306a36Sopenharmony_ci}
7262306a36Sopenharmony_ci
7362306a36Sopenharmony_ci/*
7462306a36Sopenharmony_ci * A random private key is generated and stored in the device. The device
7562306a36Sopenharmony_ci * returns the pair public key.
7662306a36Sopenharmony_ci */
7762306a36Sopenharmony_cistatic int atmel_ecdh_set_secret(struct crypto_kpp *tfm, const void *buf,
7862306a36Sopenharmony_ci				 unsigned int len)
7962306a36Sopenharmony_ci{
8062306a36Sopenharmony_ci	struct atmel_ecdh_ctx *ctx = kpp_tfm_ctx(tfm);
8162306a36Sopenharmony_ci	struct atmel_i2c_cmd *cmd;
8262306a36Sopenharmony_ci	void *public_key;
8362306a36Sopenharmony_ci	struct ecdh params;
8462306a36Sopenharmony_ci	int ret = -ENOMEM;
8562306a36Sopenharmony_ci
8662306a36Sopenharmony_ci	/* free the old public key, if any */
8762306a36Sopenharmony_ci	kfree(ctx->public_key);
8862306a36Sopenharmony_ci	/* make sure you don't free the old public key twice */
8962306a36Sopenharmony_ci	ctx->public_key = NULL;
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_ci	if (crypto_ecdh_decode_key(buf, len, &params) < 0) {
9262306a36Sopenharmony_ci		dev_err(&ctx->client->dev, "crypto_ecdh_decode_key failed\n");
9362306a36Sopenharmony_ci		return -EINVAL;
9462306a36Sopenharmony_ci	}
9562306a36Sopenharmony_ci
9662306a36Sopenharmony_ci	if (params.key_size) {
9762306a36Sopenharmony_ci		/* fallback to ecdh software implementation */
9862306a36Sopenharmony_ci		ctx->do_fallback = true;
9962306a36Sopenharmony_ci		return crypto_kpp_set_secret(ctx->fallback, buf, len);
10062306a36Sopenharmony_ci	}
10162306a36Sopenharmony_ci
10262306a36Sopenharmony_ci	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
10362306a36Sopenharmony_ci	if (!cmd)
10462306a36Sopenharmony_ci		return -ENOMEM;
10562306a36Sopenharmony_ci
10662306a36Sopenharmony_ci	/*
10762306a36Sopenharmony_ci	 * The device only supports NIST P256 ECC keys. The public key size will
10862306a36Sopenharmony_ci	 * always be the same. Use a macro for the key size to avoid unnecessary
10962306a36Sopenharmony_ci	 * computations.
11062306a36Sopenharmony_ci	 */
11162306a36Sopenharmony_ci	public_key = kmalloc(ATMEL_ECC_PUBKEY_SIZE, GFP_KERNEL);
11262306a36Sopenharmony_ci	if (!public_key)
11362306a36Sopenharmony_ci		goto free_cmd;
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_ci	ctx->do_fallback = false;
11662306a36Sopenharmony_ci
11762306a36Sopenharmony_ci	atmel_i2c_init_genkey_cmd(cmd, DATA_SLOT_2);
11862306a36Sopenharmony_ci
11962306a36Sopenharmony_ci	ret = atmel_i2c_send_receive(ctx->client, cmd);
12062306a36Sopenharmony_ci	if (ret)
12162306a36Sopenharmony_ci		goto free_public_key;
12262306a36Sopenharmony_ci
12362306a36Sopenharmony_ci	/* save the public key */
12462306a36Sopenharmony_ci	memcpy(public_key, &cmd->data[RSP_DATA_IDX], ATMEL_ECC_PUBKEY_SIZE);
12562306a36Sopenharmony_ci	ctx->public_key = public_key;
12662306a36Sopenharmony_ci
12762306a36Sopenharmony_ci	kfree(cmd);
12862306a36Sopenharmony_ci	return 0;
12962306a36Sopenharmony_ci
13062306a36Sopenharmony_cifree_public_key:
13162306a36Sopenharmony_ci	kfree(public_key);
13262306a36Sopenharmony_cifree_cmd:
13362306a36Sopenharmony_ci	kfree(cmd);
13462306a36Sopenharmony_ci	return ret;
13562306a36Sopenharmony_ci}
13662306a36Sopenharmony_ci
13762306a36Sopenharmony_cistatic int atmel_ecdh_generate_public_key(struct kpp_request *req)
13862306a36Sopenharmony_ci{
13962306a36Sopenharmony_ci	struct crypto_kpp *tfm = crypto_kpp_reqtfm(req);
14062306a36Sopenharmony_ci	struct atmel_ecdh_ctx *ctx = kpp_tfm_ctx(tfm);
14162306a36Sopenharmony_ci	size_t copied, nbytes;
14262306a36Sopenharmony_ci	int ret = 0;
14362306a36Sopenharmony_ci
14462306a36Sopenharmony_ci	if (ctx->do_fallback) {
14562306a36Sopenharmony_ci		kpp_request_set_tfm(req, ctx->fallback);
14662306a36Sopenharmony_ci		return crypto_kpp_generate_public_key(req);
14762306a36Sopenharmony_ci	}
14862306a36Sopenharmony_ci
14962306a36Sopenharmony_ci	if (!ctx->public_key)
15062306a36Sopenharmony_ci		return -EINVAL;
15162306a36Sopenharmony_ci
15262306a36Sopenharmony_ci	/* might want less than we've got */
15362306a36Sopenharmony_ci	nbytes = min_t(size_t, ATMEL_ECC_PUBKEY_SIZE, req->dst_len);
15462306a36Sopenharmony_ci
15562306a36Sopenharmony_ci	/* public key was saved at private key generation */
15662306a36Sopenharmony_ci	copied = sg_copy_from_buffer(req->dst,
15762306a36Sopenharmony_ci				     sg_nents_for_len(req->dst, nbytes),
15862306a36Sopenharmony_ci				     ctx->public_key, nbytes);
15962306a36Sopenharmony_ci	if (copied != nbytes)
16062306a36Sopenharmony_ci		ret = -EINVAL;
16162306a36Sopenharmony_ci
16262306a36Sopenharmony_ci	return ret;
16362306a36Sopenharmony_ci}
16462306a36Sopenharmony_ci
16562306a36Sopenharmony_cistatic int atmel_ecdh_compute_shared_secret(struct kpp_request *req)
16662306a36Sopenharmony_ci{
16762306a36Sopenharmony_ci	struct crypto_kpp *tfm = crypto_kpp_reqtfm(req);
16862306a36Sopenharmony_ci	struct atmel_ecdh_ctx *ctx = kpp_tfm_ctx(tfm);
16962306a36Sopenharmony_ci	struct atmel_i2c_work_data *work_data;
17062306a36Sopenharmony_ci	gfp_t gfp;
17162306a36Sopenharmony_ci	int ret;
17262306a36Sopenharmony_ci
17362306a36Sopenharmony_ci	if (ctx->do_fallback) {
17462306a36Sopenharmony_ci		kpp_request_set_tfm(req, ctx->fallback);
17562306a36Sopenharmony_ci		return crypto_kpp_compute_shared_secret(req);
17662306a36Sopenharmony_ci	}
17762306a36Sopenharmony_ci
17862306a36Sopenharmony_ci	/* must have exactly two points to be on the curve */
17962306a36Sopenharmony_ci	if (req->src_len != ATMEL_ECC_PUBKEY_SIZE)
18062306a36Sopenharmony_ci		return -EINVAL;
18162306a36Sopenharmony_ci
18262306a36Sopenharmony_ci	gfp = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? GFP_KERNEL :
18362306a36Sopenharmony_ci							     GFP_ATOMIC;
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	work_data = kmalloc(sizeof(*work_data), gfp);
18662306a36Sopenharmony_ci	if (!work_data)
18762306a36Sopenharmony_ci		return -ENOMEM;
18862306a36Sopenharmony_ci
18962306a36Sopenharmony_ci	work_data->ctx = ctx;
19062306a36Sopenharmony_ci	work_data->client = ctx->client;
19162306a36Sopenharmony_ci
19262306a36Sopenharmony_ci	ret = atmel_i2c_init_ecdh_cmd(&work_data->cmd, req->src);
19362306a36Sopenharmony_ci	if (ret)
19462306a36Sopenharmony_ci		goto free_work_data;
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci	atmel_i2c_enqueue(work_data, atmel_ecdh_done, req);
19762306a36Sopenharmony_ci
19862306a36Sopenharmony_ci	return -EINPROGRESS;
19962306a36Sopenharmony_ci
20062306a36Sopenharmony_cifree_work_data:
20162306a36Sopenharmony_ci	kfree(work_data);
20262306a36Sopenharmony_ci	return ret;
20362306a36Sopenharmony_ci}
20462306a36Sopenharmony_ci
20562306a36Sopenharmony_cistatic struct i2c_client *atmel_ecc_i2c_client_alloc(void)
20662306a36Sopenharmony_ci{
20762306a36Sopenharmony_ci	struct atmel_i2c_client_priv *i2c_priv, *min_i2c_priv = NULL;
20862306a36Sopenharmony_ci	struct i2c_client *client = ERR_PTR(-ENODEV);
20962306a36Sopenharmony_ci	int min_tfm_cnt = INT_MAX;
21062306a36Sopenharmony_ci	int tfm_cnt;
21162306a36Sopenharmony_ci
21262306a36Sopenharmony_ci	spin_lock(&driver_data.i2c_list_lock);
21362306a36Sopenharmony_ci
21462306a36Sopenharmony_ci	if (list_empty(&driver_data.i2c_client_list)) {
21562306a36Sopenharmony_ci		spin_unlock(&driver_data.i2c_list_lock);
21662306a36Sopenharmony_ci		return ERR_PTR(-ENODEV);
21762306a36Sopenharmony_ci	}
21862306a36Sopenharmony_ci
21962306a36Sopenharmony_ci	list_for_each_entry(i2c_priv, &driver_data.i2c_client_list,
22062306a36Sopenharmony_ci			    i2c_client_list_node) {
22162306a36Sopenharmony_ci		tfm_cnt = atomic_read(&i2c_priv->tfm_count);
22262306a36Sopenharmony_ci		if (tfm_cnt < min_tfm_cnt) {
22362306a36Sopenharmony_ci			min_tfm_cnt = tfm_cnt;
22462306a36Sopenharmony_ci			min_i2c_priv = i2c_priv;
22562306a36Sopenharmony_ci		}
22662306a36Sopenharmony_ci		if (!min_tfm_cnt)
22762306a36Sopenharmony_ci			break;
22862306a36Sopenharmony_ci	}
22962306a36Sopenharmony_ci
23062306a36Sopenharmony_ci	if (min_i2c_priv) {
23162306a36Sopenharmony_ci		atomic_inc(&min_i2c_priv->tfm_count);
23262306a36Sopenharmony_ci		client = min_i2c_priv->client;
23362306a36Sopenharmony_ci	}
23462306a36Sopenharmony_ci
23562306a36Sopenharmony_ci	spin_unlock(&driver_data.i2c_list_lock);
23662306a36Sopenharmony_ci
23762306a36Sopenharmony_ci	return client;
23862306a36Sopenharmony_ci}
23962306a36Sopenharmony_ci
24062306a36Sopenharmony_cistatic void atmel_ecc_i2c_client_free(struct i2c_client *client)
24162306a36Sopenharmony_ci{
24262306a36Sopenharmony_ci	struct atmel_i2c_client_priv *i2c_priv = i2c_get_clientdata(client);
24362306a36Sopenharmony_ci
24462306a36Sopenharmony_ci	atomic_dec(&i2c_priv->tfm_count);
24562306a36Sopenharmony_ci}
24662306a36Sopenharmony_ci
24762306a36Sopenharmony_cistatic int atmel_ecdh_init_tfm(struct crypto_kpp *tfm)
24862306a36Sopenharmony_ci{
24962306a36Sopenharmony_ci	const char *alg = kpp_alg_name(tfm);
25062306a36Sopenharmony_ci	struct crypto_kpp *fallback;
25162306a36Sopenharmony_ci	struct atmel_ecdh_ctx *ctx = kpp_tfm_ctx(tfm);
25262306a36Sopenharmony_ci
25362306a36Sopenharmony_ci	ctx->curve_id = ECC_CURVE_NIST_P256;
25462306a36Sopenharmony_ci	ctx->client = atmel_ecc_i2c_client_alloc();
25562306a36Sopenharmony_ci	if (IS_ERR(ctx->client)) {
25662306a36Sopenharmony_ci		pr_err("tfm - i2c_client binding failed\n");
25762306a36Sopenharmony_ci		return PTR_ERR(ctx->client);
25862306a36Sopenharmony_ci	}
25962306a36Sopenharmony_ci
26062306a36Sopenharmony_ci	fallback = crypto_alloc_kpp(alg, 0, CRYPTO_ALG_NEED_FALLBACK);
26162306a36Sopenharmony_ci	if (IS_ERR(fallback)) {
26262306a36Sopenharmony_ci		dev_err(&ctx->client->dev, "Failed to allocate transformation for '%s': %ld\n",
26362306a36Sopenharmony_ci			alg, PTR_ERR(fallback));
26462306a36Sopenharmony_ci		return PTR_ERR(fallback);
26562306a36Sopenharmony_ci	}
26662306a36Sopenharmony_ci
26762306a36Sopenharmony_ci	crypto_kpp_set_flags(fallback, crypto_kpp_get_flags(tfm));
26862306a36Sopenharmony_ci	ctx->fallback = fallback;
26962306a36Sopenharmony_ci
27062306a36Sopenharmony_ci	return 0;
27162306a36Sopenharmony_ci}
27262306a36Sopenharmony_ci
27362306a36Sopenharmony_cistatic void atmel_ecdh_exit_tfm(struct crypto_kpp *tfm)
27462306a36Sopenharmony_ci{
27562306a36Sopenharmony_ci	struct atmel_ecdh_ctx *ctx = kpp_tfm_ctx(tfm);
27662306a36Sopenharmony_ci
27762306a36Sopenharmony_ci	kfree(ctx->public_key);
27862306a36Sopenharmony_ci	crypto_free_kpp(ctx->fallback);
27962306a36Sopenharmony_ci	atmel_ecc_i2c_client_free(ctx->client);
28062306a36Sopenharmony_ci}
28162306a36Sopenharmony_ci
28262306a36Sopenharmony_cistatic unsigned int atmel_ecdh_max_size(struct crypto_kpp *tfm)
28362306a36Sopenharmony_ci{
28462306a36Sopenharmony_ci	struct atmel_ecdh_ctx *ctx = kpp_tfm_ctx(tfm);
28562306a36Sopenharmony_ci
28662306a36Sopenharmony_ci	if (ctx->fallback)
28762306a36Sopenharmony_ci		return crypto_kpp_maxsize(ctx->fallback);
28862306a36Sopenharmony_ci
28962306a36Sopenharmony_ci	/*
29062306a36Sopenharmony_ci	 * The device only supports NIST P256 ECC keys. The public key size will
29162306a36Sopenharmony_ci	 * always be the same. Use a macro for the key size to avoid unnecessary
29262306a36Sopenharmony_ci	 * computations.
29362306a36Sopenharmony_ci	 */
29462306a36Sopenharmony_ci	return ATMEL_ECC_PUBKEY_SIZE;
29562306a36Sopenharmony_ci}
29662306a36Sopenharmony_ci
29762306a36Sopenharmony_cistatic struct kpp_alg atmel_ecdh_nist_p256 = {
29862306a36Sopenharmony_ci	.set_secret = atmel_ecdh_set_secret,
29962306a36Sopenharmony_ci	.generate_public_key = atmel_ecdh_generate_public_key,
30062306a36Sopenharmony_ci	.compute_shared_secret = atmel_ecdh_compute_shared_secret,
30162306a36Sopenharmony_ci	.init = atmel_ecdh_init_tfm,
30262306a36Sopenharmony_ci	.exit = atmel_ecdh_exit_tfm,
30362306a36Sopenharmony_ci	.max_size = atmel_ecdh_max_size,
30462306a36Sopenharmony_ci	.base = {
30562306a36Sopenharmony_ci		.cra_flags = CRYPTO_ALG_NEED_FALLBACK,
30662306a36Sopenharmony_ci		.cra_name = "ecdh-nist-p256",
30762306a36Sopenharmony_ci		.cra_driver_name = "atmel-ecdh",
30862306a36Sopenharmony_ci		.cra_priority = ATMEL_ECC_PRIORITY,
30962306a36Sopenharmony_ci		.cra_module = THIS_MODULE,
31062306a36Sopenharmony_ci		.cra_ctxsize = sizeof(struct atmel_ecdh_ctx),
31162306a36Sopenharmony_ci	},
31262306a36Sopenharmony_ci};
31362306a36Sopenharmony_ci
31462306a36Sopenharmony_cistatic int atmel_ecc_probe(struct i2c_client *client)
31562306a36Sopenharmony_ci{
31662306a36Sopenharmony_ci	struct atmel_i2c_client_priv *i2c_priv;
31762306a36Sopenharmony_ci	int ret;
31862306a36Sopenharmony_ci
31962306a36Sopenharmony_ci	ret = atmel_i2c_probe(client);
32062306a36Sopenharmony_ci	if (ret)
32162306a36Sopenharmony_ci		return ret;
32262306a36Sopenharmony_ci
32362306a36Sopenharmony_ci	i2c_priv = i2c_get_clientdata(client);
32462306a36Sopenharmony_ci
32562306a36Sopenharmony_ci	spin_lock(&driver_data.i2c_list_lock);
32662306a36Sopenharmony_ci	list_add_tail(&i2c_priv->i2c_client_list_node,
32762306a36Sopenharmony_ci		      &driver_data.i2c_client_list);
32862306a36Sopenharmony_ci	spin_unlock(&driver_data.i2c_list_lock);
32962306a36Sopenharmony_ci
33062306a36Sopenharmony_ci	ret = crypto_register_kpp(&atmel_ecdh_nist_p256);
33162306a36Sopenharmony_ci	if (ret) {
33262306a36Sopenharmony_ci		spin_lock(&driver_data.i2c_list_lock);
33362306a36Sopenharmony_ci		list_del(&i2c_priv->i2c_client_list_node);
33462306a36Sopenharmony_ci		spin_unlock(&driver_data.i2c_list_lock);
33562306a36Sopenharmony_ci
33662306a36Sopenharmony_ci		dev_err(&client->dev, "%s alg registration failed\n",
33762306a36Sopenharmony_ci			atmel_ecdh_nist_p256.base.cra_driver_name);
33862306a36Sopenharmony_ci	} else {
33962306a36Sopenharmony_ci		dev_info(&client->dev, "atmel ecc algorithms registered in /proc/crypto\n");
34062306a36Sopenharmony_ci	}
34162306a36Sopenharmony_ci
34262306a36Sopenharmony_ci	return ret;
34362306a36Sopenharmony_ci}
34462306a36Sopenharmony_ci
34562306a36Sopenharmony_cistatic void atmel_ecc_remove(struct i2c_client *client)
34662306a36Sopenharmony_ci{
34762306a36Sopenharmony_ci	struct atmel_i2c_client_priv *i2c_priv = i2c_get_clientdata(client);
34862306a36Sopenharmony_ci
34962306a36Sopenharmony_ci	/* Return EBUSY if i2c client already allocated. */
35062306a36Sopenharmony_ci	if (atomic_read(&i2c_priv->tfm_count)) {
35162306a36Sopenharmony_ci		/*
35262306a36Sopenharmony_ci		 * After we return here, the memory backing the device is freed.
35362306a36Sopenharmony_ci		 * That happens no matter what the return value of this function
35462306a36Sopenharmony_ci		 * is because in the Linux device model there is no error
35562306a36Sopenharmony_ci		 * handling for unbinding a driver.
35662306a36Sopenharmony_ci		 * If there is still some action pending, it probably involves
35762306a36Sopenharmony_ci		 * accessing the freed memory.
35862306a36Sopenharmony_ci		 */
35962306a36Sopenharmony_ci		dev_emerg(&client->dev, "Device is busy, expect memory corruption.\n");
36062306a36Sopenharmony_ci		return;
36162306a36Sopenharmony_ci	}
36262306a36Sopenharmony_ci
36362306a36Sopenharmony_ci	crypto_unregister_kpp(&atmel_ecdh_nist_p256);
36462306a36Sopenharmony_ci
36562306a36Sopenharmony_ci	spin_lock(&driver_data.i2c_list_lock);
36662306a36Sopenharmony_ci	list_del(&i2c_priv->i2c_client_list_node);
36762306a36Sopenharmony_ci	spin_unlock(&driver_data.i2c_list_lock);
36862306a36Sopenharmony_ci}
36962306a36Sopenharmony_ci
37062306a36Sopenharmony_ci#ifdef CONFIG_OF
37162306a36Sopenharmony_cistatic const struct of_device_id atmel_ecc_dt_ids[] = {
37262306a36Sopenharmony_ci	{
37362306a36Sopenharmony_ci		.compatible = "atmel,atecc508a",
37462306a36Sopenharmony_ci	}, {
37562306a36Sopenharmony_ci		/* sentinel */
37662306a36Sopenharmony_ci	}
37762306a36Sopenharmony_ci};
37862306a36Sopenharmony_ciMODULE_DEVICE_TABLE(of, atmel_ecc_dt_ids);
37962306a36Sopenharmony_ci#endif
38062306a36Sopenharmony_ci
38162306a36Sopenharmony_cistatic const struct i2c_device_id atmel_ecc_id[] = {
38262306a36Sopenharmony_ci	{ "atecc508a", 0 },
38362306a36Sopenharmony_ci	{ }
38462306a36Sopenharmony_ci};
38562306a36Sopenharmony_ciMODULE_DEVICE_TABLE(i2c, atmel_ecc_id);
38662306a36Sopenharmony_ci
38762306a36Sopenharmony_cistatic struct i2c_driver atmel_ecc_driver = {
38862306a36Sopenharmony_ci	.driver = {
38962306a36Sopenharmony_ci		.name	= "atmel-ecc",
39062306a36Sopenharmony_ci		.of_match_table = of_match_ptr(atmel_ecc_dt_ids),
39162306a36Sopenharmony_ci	},
39262306a36Sopenharmony_ci	.probe		= atmel_ecc_probe,
39362306a36Sopenharmony_ci	.remove		= atmel_ecc_remove,
39462306a36Sopenharmony_ci	.id_table	= atmel_ecc_id,
39562306a36Sopenharmony_ci};
39662306a36Sopenharmony_ci
39762306a36Sopenharmony_cistatic int __init atmel_ecc_init(void)
39862306a36Sopenharmony_ci{
39962306a36Sopenharmony_ci	spin_lock_init(&driver_data.i2c_list_lock);
40062306a36Sopenharmony_ci	INIT_LIST_HEAD(&driver_data.i2c_client_list);
40162306a36Sopenharmony_ci	return i2c_add_driver(&atmel_ecc_driver);
40262306a36Sopenharmony_ci}
40362306a36Sopenharmony_ci
40462306a36Sopenharmony_cistatic void __exit atmel_ecc_exit(void)
40562306a36Sopenharmony_ci{
40662306a36Sopenharmony_ci	atmel_i2c_flush_queue();
40762306a36Sopenharmony_ci	i2c_del_driver(&atmel_ecc_driver);
40862306a36Sopenharmony_ci}
40962306a36Sopenharmony_ci
41062306a36Sopenharmony_cimodule_init(atmel_ecc_init);
41162306a36Sopenharmony_cimodule_exit(atmel_ecc_exit);
41262306a36Sopenharmony_ci
41362306a36Sopenharmony_ciMODULE_AUTHOR("Tudor Ambarus");
41462306a36Sopenharmony_ciMODULE_DESCRIPTION("Microchip / Atmel ECC (I2C) driver");
41562306a36Sopenharmony_ciMODULE_LICENSE("GPL v2");
416