162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * K3 SA2UL crypto accelerator driver 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2018-2020 Texas Instruments Incorporated - http://www.ti.com 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Authors: Keerthy 862306a36Sopenharmony_ci * Vitaly Andrianov 962306a36Sopenharmony_ci * Tero Kristo 1062306a36Sopenharmony_ci */ 1162306a36Sopenharmony_ci#include <linux/bitfield.h> 1262306a36Sopenharmony_ci#include <linux/clk.h> 1362306a36Sopenharmony_ci#include <linux/dma-mapping.h> 1462306a36Sopenharmony_ci#include <linux/dmaengine.h> 1562306a36Sopenharmony_ci#include <linux/dmapool.h> 1662306a36Sopenharmony_ci#include <linux/kernel.h> 1762306a36Sopenharmony_ci#include <linux/module.h> 1862306a36Sopenharmony_ci#include <linux/of.h> 1962306a36Sopenharmony_ci#include <linux/of_platform.h> 2062306a36Sopenharmony_ci#include <linux/platform_device.h> 2162306a36Sopenharmony_ci#include <linux/pm_runtime.h> 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_ci#include <crypto/aes.h> 2462306a36Sopenharmony_ci#include <crypto/authenc.h> 2562306a36Sopenharmony_ci#include <crypto/des.h> 2662306a36Sopenharmony_ci#include <crypto/internal/aead.h> 2762306a36Sopenharmony_ci#include <crypto/internal/hash.h> 2862306a36Sopenharmony_ci#include <crypto/internal/skcipher.h> 2962306a36Sopenharmony_ci#include <crypto/scatterwalk.h> 3062306a36Sopenharmony_ci#include <crypto/sha1.h> 3162306a36Sopenharmony_ci#include <crypto/sha2.h> 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_ci#include "sa2ul.h" 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_ci/* Byte offset for key in encryption security context */ 3662306a36Sopenharmony_ci#define SC_ENC_KEY_OFFSET (1 + 27 + 4) 3762306a36Sopenharmony_ci/* Byte offset for Aux-1 in encryption security context */ 3862306a36Sopenharmony_ci#define SC_ENC_AUX1_OFFSET (1 + 27 + 4 + 32) 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_ci#define SA_CMDL_UPD_ENC 0x0001 4162306a36Sopenharmony_ci#define SA_CMDL_UPD_AUTH 0x0002 4262306a36Sopenharmony_ci#define SA_CMDL_UPD_ENC_IV 0x0004 4362306a36Sopenharmony_ci#define SA_CMDL_UPD_AUTH_IV 0x0008 4462306a36Sopenharmony_ci#define SA_CMDL_UPD_AUX_KEY 0x0010 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_ci#define SA_AUTH_SUBKEY_LEN 16 4762306a36Sopenharmony_ci#define SA_CMDL_PAYLOAD_LENGTH_MASK 0xFFFF 4862306a36Sopenharmony_ci#define SA_CMDL_SOP_BYPASS_LEN_MASK 0xFF000000 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_ci#define MODE_CONTROL_BYTES 27 5162306a36Sopenharmony_ci#define SA_HASH_PROCESSING 0 5262306a36Sopenharmony_ci#define SA_CRYPTO_PROCESSING 0 5362306a36Sopenharmony_ci#define SA_UPLOAD_HASH_TO_TLR BIT(6) 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci#define SA_SW0_FLAGS_MASK 0xF0000 5662306a36Sopenharmony_ci#define SA_SW0_CMDL_INFO_MASK 0x1F00000 5762306a36Sopenharmony_ci#define SA_SW0_CMDL_PRESENT BIT(4) 5862306a36Sopenharmony_ci#define SA_SW0_ENG_ID_MASK 0x3E000000 5962306a36Sopenharmony_ci#define SA_SW0_DEST_INFO_PRESENT BIT(30) 6062306a36Sopenharmony_ci#define SA_SW2_EGRESS_LENGTH 0xFF000000 6162306a36Sopenharmony_ci#define SA_BASIC_HASH 0x10 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_ci#define SHA256_DIGEST_WORDS 8 6462306a36Sopenharmony_ci/* Make 32-bit word from 4 bytes */ 6562306a36Sopenharmony_ci#define SA_MK_U32(b0, b1, b2, b3) (((b0) << 24) | ((b1) << 16) | \ 6662306a36Sopenharmony_ci ((b2) << 8) | (b3)) 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci/* size of SCCTL structure in bytes */ 6962306a36Sopenharmony_ci#define SA_SCCTL_SZ 16 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_ci/* Max Authentication tag size */ 7262306a36Sopenharmony_ci#define SA_MAX_AUTH_TAG_SZ 64 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_cienum sa_algo_id { 7562306a36Sopenharmony_ci SA_ALG_CBC_AES = 0, 7662306a36Sopenharmony_ci SA_ALG_EBC_AES, 7762306a36Sopenharmony_ci SA_ALG_CBC_DES3, 7862306a36Sopenharmony_ci SA_ALG_ECB_DES3, 7962306a36Sopenharmony_ci SA_ALG_SHA1, 8062306a36Sopenharmony_ci SA_ALG_SHA256, 8162306a36Sopenharmony_ci SA_ALG_SHA512, 8262306a36Sopenharmony_ci SA_ALG_AUTHENC_SHA1_AES, 8362306a36Sopenharmony_ci SA_ALG_AUTHENC_SHA256_AES, 8462306a36Sopenharmony_ci}; 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_cistruct sa_match_data { 8762306a36Sopenharmony_ci u8 priv; 8862306a36Sopenharmony_ci u8 priv_id; 8962306a36Sopenharmony_ci u32 supported_algos; 9062306a36Sopenharmony_ci}; 9162306a36Sopenharmony_ci 9262306a36Sopenharmony_cistatic struct device *sa_k3_dev; 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_ci/** 9562306a36Sopenharmony_ci * struct sa_cmdl_cfg - Command label configuration descriptor 9662306a36Sopenharmony_ci * @aalg: authentication algorithm ID 9762306a36Sopenharmony_ci * @enc_eng_id: Encryption Engine ID supported by the SA hardware 9862306a36Sopenharmony_ci * @auth_eng_id: Authentication Engine ID 9962306a36Sopenharmony_ci * @iv_size: Initialization Vector size 10062306a36Sopenharmony_ci * @akey: Authentication key 10162306a36Sopenharmony_ci * @akey_len: Authentication key length 10262306a36Sopenharmony_ci * @enc: True, if this is an encode request 10362306a36Sopenharmony_ci */ 10462306a36Sopenharmony_cistruct sa_cmdl_cfg { 10562306a36Sopenharmony_ci int aalg; 10662306a36Sopenharmony_ci u8 enc_eng_id; 10762306a36Sopenharmony_ci u8 auth_eng_id; 10862306a36Sopenharmony_ci u8 iv_size; 10962306a36Sopenharmony_ci const u8 *akey; 11062306a36Sopenharmony_ci u16 akey_len; 11162306a36Sopenharmony_ci bool enc; 11262306a36Sopenharmony_ci}; 11362306a36Sopenharmony_ci 11462306a36Sopenharmony_ci/** 11562306a36Sopenharmony_ci * struct algo_data - Crypto algorithm specific data 11662306a36Sopenharmony_ci * @enc_eng: Encryption engine info structure 11762306a36Sopenharmony_ci * @auth_eng: Authentication engine info structure 11862306a36Sopenharmony_ci * @auth_ctrl: Authentication control word 11962306a36Sopenharmony_ci * @hash_size: Size of digest 12062306a36Sopenharmony_ci * @iv_idx: iv index in psdata 12162306a36Sopenharmony_ci * @iv_out_size: iv out size 12262306a36Sopenharmony_ci * @ealg_id: Encryption Algorithm ID 12362306a36Sopenharmony_ci * @aalg_id: Authentication algorithm ID 12462306a36Sopenharmony_ci * @mci_enc: Mode Control Instruction for Encryption algorithm 12562306a36Sopenharmony_ci * @mci_dec: Mode Control Instruction for Decryption 12662306a36Sopenharmony_ci * @inv_key: Whether the encryption algorithm demands key inversion 12762306a36Sopenharmony_ci * @ctx: Pointer to the algorithm context 12862306a36Sopenharmony_ci * @keyed_mac: Whether the authentication algorithm has key 12962306a36Sopenharmony_ci * @prep_iopad: Function pointer to generate intermediate ipad/opad 13062306a36Sopenharmony_ci */ 13162306a36Sopenharmony_cistruct algo_data { 13262306a36Sopenharmony_ci struct sa_eng_info enc_eng; 13362306a36Sopenharmony_ci struct sa_eng_info auth_eng; 13462306a36Sopenharmony_ci u8 auth_ctrl; 13562306a36Sopenharmony_ci u8 hash_size; 13662306a36Sopenharmony_ci u8 iv_idx; 13762306a36Sopenharmony_ci u8 iv_out_size; 13862306a36Sopenharmony_ci u8 ealg_id; 13962306a36Sopenharmony_ci u8 aalg_id; 14062306a36Sopenharmony_ci u8 *mci_enc; 14162306a36Sopenharmony_ci u8 *mci_dec; 14262306a36Sopenharmony_ci bool inv_key; 14362306a36Sopenharmony_ci struct sa_tfm_ctx *ctx; 14462306a36Sopenharmony_ci bool keyed_mac; 14562306a36Sopenharmony_ci void (*prep_iopad)(struct algo_data *algo, const u8 *key, 14662306a36Sopenharmony_ci u16 key_sz, __be32 *ipad, __be32 *opad); 14762306a36Sopenharmony_ci}; 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_ci/** 15062306a36Sopenharmony_ci * struct sa_alg_tmpl: A generic template encompassing crypto/aead algorithms 15162306a36Sopenharmony_ci * @type: Type of the crypto algorithm. 15262306a36Sopenharmony_ci * @alg: Union of crypto algorithm definitions. 15362306a36Sopenharmony_ci * @registered: Flag indicating if the crypto algorithm is already registered 15462306a36Sopenharmony_ci */ 15562306a36Sopenharmony_cistruct sa_alg_tmpl { 15662306a36Sopenharmony_ci u32 type; /* CRYPTO_ALG_TYPE from <linux/crypto.h> */ 15762306a36Sopenharmony_ci union { 15862306a36Sopenharmony_ci struct skcipher_alg skcipher; 15962306a36Sopenharmony_ci struct ahash_alg ahash; 16062306a36Sopenharmony_ci struct aead_alg aead; 16162306a36Sopenharmony_ci } alg; 16262306a36Sopenharmony_ci bool registered; 16362306a36Sopenharmony_ci}; 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci/** 16662306a36Sopenharmony_ci * struct sa_mapped_sg: scatterlist information for tx and rx 16762306a36Sopenharmony_ci * @mapped: Set to true if the @sgt is mapped 16862306a36Sopenharmony_ci * @dir: mapping direction used for @sgt 16962306a36Sopenharmony_ci * @split_sg: Set if the sg is split and needs to be freed up 17062306a36Sopenharmony_ci * @static_sg: Static scatterlist entry for overriding data 17162306a36Sopenharmony_ci * @sgt: scatterlist table for DMA API use 17262306a36Sopenharmony_ci */ 17362306a36Sopenharmony_cistruct sa_mapped_sg { 17462306a36Sopenharmony_ci bool mapped; 17562306a36Sopenharmony_ci enum dma_data_direction dir; 17662306a36Sopenharmony_ci struct scatterlist static_sg; 17762306a36Sopenharmony_ci struct scatterlist *split_sg; 17862306a36Sopenharmony_ci struct sg_table sgt; 17962306a36Sopenharmony_ci}; 18062306a36Sopenharmony_ci/** 18162306a36Sopenharmony_ci * struct sa_rx_data: RX Packet miscellaneous data place holder 18262306a36Sopenharmony_ci * @req: crypto request data pointer 18362306a36Sopenharmony_ci * @ddev: pointer to the DMA device 18462306a36Sopenharmony_ci * @tx_in: dma_async_tx_descriptor pointer for rx channel 18562306a36Sopenharmony_ci * @mapped_sg: Information on tx (0) and rx (1) scatterlist DMA mapping 18662306a36Sopenharmony_ci * @enc: Flag indicating either encryption or decryption 18762306a36Sopenharmony_ci * @enc_iv_size: Initialisation vector size 18862306a36Sopenharmony_ci * @iv_idx: Initialisation vector index 18962306a36Sopenharmony_ci */ 19062306a36Sopenharmony_cistruct sa_rx_data { 19162306a36Sopenharmony_ci void *req; 19262306a36Sopenharmony_ci struct device *ddev; 19362306a36Sopenharmony_ci struct dma_async_tx_descriptor *tx_in; 19462306a36Sopenharmony_ci struct sa_mapped_sg mapped_sg[2]; 19562306a36Sopenharmony_ci u8 enc; 19662306a36Sopenharmony_ci u8 enc_iv_size; 19762306a36Sopenharmony_ci u8 iv_idx; 19862306a36Sopenharmony_ci}; 19962306a36Sopenharmony_ci 20062306a36Sopenharmony_ci/** 20162306a36Sopenharmony_ci * struct sa_req: SA request definition 20262306a36Sopenharmony_ci * @dev: device for the request 20362306a36Sopenharmony_ci * @size: total data to the xmitted via DMA 20462306a36Sopenharmony_ci * @enc_offset: offset of cipher data 20562306a36Sopenharmony_ci * @enc_size: data to be passed to cipher engine 20662306a36Sopenharmony_ci * @enc_iv: cipher IV 20762306a36Sopenharmony_ci * @auth_offset: offset of the authentication data 20862306a36Sopenharmony_ci * @auth_size: size of the authentication data 20962306a36Sopenharmony_ci * @auth_iv: authentication IV 21062306a36Sopenharmony_ci * @type: algorithm type for the request 21162306a36Sopenharmony_ci * @cmdl: command label pointer 21262306a36Sopenharmony_ci * @base: pointer to the base request 21362306a36Sopenharmony_ci * @ctx: pointer to the algorithm context data 21462306a36Sopenharmony_ci * @enc: true if this is an encode request 21562306a36Sopenharmony_ci * @src: source data 21662306a36Sopenharmony_ci * @dst: destination data 21762306a36Sopenharmony_ci * @callback: DMA callback for the request 21862306a36Sopenharmony_ci * @mdata_size: metadata size passed to DMA 21962306a36Sopenharmony_ci */ 22062306a36Sopenharmony_cistruct sa_req { 22162306a36Sopenharmony_ci struct device *dev; 22262306a36Sopenharmony_ci u16 size; 22362306a36Sopenharmony_ci u8 enc_offset; 22462306a36Sopenharmony_ci u16 enc_size; 22562306a36Sopenharmony_ci u8 *enc_iv; 22662306a36Sopenharmony_ci u8 auth_offset; 22762306a36Sopenharmony_ci u16 auth_size; 22862306a36Sopenharmony_ci u8 *auth_iv; 22962306a36Sopenharmony_ci u32 type; 23062306a36Sopenharmony_ci u32 *cmdl; 23162306a36Sopenharmony_ci struct crypto_async_request *base; 23262306a36Sopenharmony_ci struct sa_tfm_ctx *ctx; 23362306a36Sopenharmony_ci bool enc; 23462306a36Sopenharmony_ci struct scatterlist *src; 23562306a36Sopenharmony_ci struct scatterlist *dst; 23662306a36Sopenharmony_ci dma_async_tx_callback callback; 23762306a36Sopenharmony_ci u16 mdata_size; 23862306a36Sopenharmony_ci}; 23962306a36Sopenharmony_ci 24062306a36Sopenharmony_ci/* 24162306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256 24262306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode for encryption 24362306a36Sopenharmony_ci */ 24462306a36Sopenharmony_cistatic u8 mci_cbc_enc_array[3][MODE_CONTROL_BYTES] = { 24562306a36Sopenharmony_ci { 0x61, 0x00, 0x00, 0x18, 0x88, 0x0a, 0xaa, 0x4b, 0x7e, 0x00, 24662306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 24762306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 24862306a36Sopenharmony_ci { 0x61, 0x00, 0x00, 0x18, 0x88, 0x4a, 0xaa, 0x4b, 0x7e, 0x00, 24962306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 25062306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 25162306a36Sopenharmony_ci { 0x61, 0x00, 0x00, 0x18, 0x88, 0x8a, 0xaa, 0x4b, 0x7e, 0x00, 25262306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 25362306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 25462306a36Sopenharmony_ci}; 25562306a36Sopenharmony_ci 25662306a36Sopenharmony_ci/* 25762306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256 25862306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode for decryption 25962306a36Sopenharmony_ci */ 26062306a36Sopenharmony_cistatic u8 mci_cbc_dec_array[3][MODE_CONTROL_BYTES] = { 26162306a36Sopenharmony_ci { 0x71, 0x00, 0x00, 0x80, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0, 26262306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 26362306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 26462306a36Sopenharmony_ci { 0x71, 0x00, 0x00, 0x84, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0, 26562306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 26662306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 26762306a36Sopenharmony_ci { 0x71, 0x00, 0x00, 0x88, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0, 26862306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 26962306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 27062306a36Sopenharmony_ci}; 27162306a36Sopenharmony_ci 27262306a36Sopenharmony_ci/* 27362306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256 27462306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode for encryption 27562306a36Sopenharmony_ci */ 27662306a36Sopenharmony_cistatic u8 mci_cbc_enc_no_iv_array[3][MODE_CONTROL_BYTES] = { 27762306a36Sopenharmony_ci { 0x21, 0x00, 0x00, 0x18, 0x88, 0x0a, 0xaa, 0x4b, 0x7e, 0x00, 27862306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 27962306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 28062306a36Sopenharmony_ci { 0x21, 0x00, 0x00, 0x18, 0x88, 0x4a, 0xaa, 0x4b, 0x7e, 0x00, 28162306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 28262306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 28362306a36Sopenharmony_ci { 0x21, 0x00, 0x00, 0x18, 0x88, 0x8a, 0xaa, 0x4b, 0x7e, 0x00, 28462306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 28562306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 28662306a36Sopenharmony_ci}; 28762306a36Sopenharmony_ci 28862306a36Sopenharmony_ci/* 28962306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256 29062306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode for decryption 29162306a36Sopenharmony_ci */ 29262306a36Sopenharmony_cistatic u8 mci_cbc_dec_no_iv_array[3][MODE_CONTROL_BYTES] = { 29362306a36Sopenharmony_ci { 0x31, 0x00, 0x00, 0x80, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0, 29462306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 29562306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 29662306a36Sopenharmony_ci { 0x31, 0x00, 0x00, 0x84, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0, 29762306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 29862306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 29962306a36Sopenharmony_ci { 0x31, 0x00, 0x00, 0x88, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0, 30062306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 30162306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 30262306a36Sopenharmony_ci}; 30362306a36Sopenharmony_ci 30462306a36Sopenharmony_ci/* 30562306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256 30662306a36Sopenharmony_ci * For ECB (Electronic Code Book) mode for encryption 30762306a36Sopenharmony_ci */ 30862306a36Sopenharmony_cistatic u8 mci_ecb_enc_array[3][27] = { 30962306a36Sopenharmony_ci { 0x21, 0x00, 0x00, 0x80, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00, 31062306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 31162306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 31262306a36Sopenharmony_ci { 0x21, 0x00, 0x00, 0x84, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00, 31362306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 31462306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 31562306a36Sopenharmony_ci { 0x21, 0x00, 0x00, 0x88, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00, 31662306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 31762306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 31862306a36Sopenharmony_ci}; 31962306a36Sopenharmony_ci 32062306a36Sopenharmony_ci/* 32162306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256 32262306a36Sopenharmony_ci * For ECB (Electronic Code Book) mode for decryption 32362306a36Sopenharmony_ci */ 32462306a36Sopenharmony_cistatic u8 mci_ecb_dec_array[3][27] = { 32562306a36Sopenharmony_ci { 0x31, 0x00, 0x00, 0x80, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00, 32662306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 32762306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 32862306a36Sopenharmony_ci { 0x31, 0x00, 0x00, 0x84, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00, 32962306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 33062306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 33162306a36Sopenharmony_ci { 0x31, 0x00, 0x00, 0x88, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00, 33262306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 33362306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, 33462306a36Sopenharmony_ci}; 33562306a36Sopenharmony_ci 33662306a36Sopenharmony_ci/* 33762306a36Sopenharmony_ci * Mode Control Instructions for DES algorithm 33862306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode and ECB mode 33962306a36Sopenharmony_ci * encryption and for decryption respectively 34062306a36Sopenharmony_ci */ 34162306a36Sopenharmony_cistatic u8 mci_cbc_3des_enc_array[MODE_CONTROL_BYTES] = { 34262306a36Sopenharmony_ci 0x60, 0x00, 0x00, 0x18, 0x88, 0x52, 0xaa, 0x4b, 0x7e, 0x00, 0x00, 0x00, 34362306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 34462306a36Sopenharmony_ci 0x00, 0x00, 0x00, 34562306a36Sopenharmony_ci}; 34662306a36Sopenharmony_ci 34762306a36Sopenharmony_cistatic u8 mci_cbc_3des_dec_array[MODE_CONTROL_BYTES] = { 34862306a36Sopenharmony_ci 0x70, 0x00, 0x00, 0x85, 0x0a, 0xca, 0x98, 0xf4, 0x40, 0xc0, 0x00, 0x00, 34962306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 35062306a36Sopenharmony_ci 0x00, 0x00, 0x00, 35162306a36Sopenharmony_ci}; 35262306a36Sopenharmony_ci 35362306a36Sopenharmony_cistatic u8 mci_ecb_3des_enc_array[MODE_CONTROL_BYTES] = { 35462306a36Sopenharmony_ci 0x20, 0x00, 0x00, 0x85, 0x0a, 0x04, 0xb7, 0x90, 0x00, 0x00, 0x00, 0x00, 35562306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 35662306a36Sopenharmony_ci 0x00, 0x00, 0x00, 35762306a36Sopenharmony_ci}; 35862306a36Sopenharmony_ci 35962306a36Sopenharmony_cistatic u8 mci_ecb_3des_dec_array[MODE_CONTROL_BYTES] = { 36062306a36Sopenharmony_ci 0x30, 0x00, 0x00, 0x85, 0x0a, 0x04, 0xb7, 0x90, 0x00, 0x00, 0x00, 0x00, 36162306a36Sopenharmony_ci 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 36262306a36Sopenharmony_ci 0x00, 0x00, 0x00, 36362306a36Sopenharmony_ci}; 36462306a36Sopenharmony_ci 36562306a36Sopenharmony_ci/* 36662306a36Sopenharmony_ci * Perform 16 byte or 128 bit swizzling 36762306a36Sopenharmony_ci * The SA2UL Expects the security context to 36862306a36Sopenharmony_ci * be in little Endian and the bus width is 128 bits or 16 bytes 36962306a36Sopenharmony_ci * Hence swap 16 bytes at a time from higher to lower address 37062306a36Sopenharmony_ci */ 37162306a36Sopenharmony_cistatic void sa_swiz_128(u8 *in, u16 len) 37262306a36Sopenharmony_ci{ 37362306a36Sopenharmony_ci u8 data[16]; 37462306a36Sopenharmony_ci int i, j; 37562306a36Sopenharmony_ci 37662306a36Sopenharmony_ci for (i = 0; i < len; i += 16) { 37762306a36Sopenharmony_ci memcpy(data, &in[i], 16); 37862306a36Sopenharmony_ci for (j = 0; j < 16; j++) 37962306a36Sopenharmony_ci in[i + j] = data[15 - j]; 38062306a36Sopenharmony_ci } 38162306a36Sopenharmony_ci} 38262306a36Sopenharmony_ci 38362306a36Sopenharmony_ci/* Prepare the ipad and opad from key as per SHA algorithm step 1*/ 38462306a36Sopenharmony_cistatic void prepare_kipad(u8 *k_ipad, const u8 *key, u16 key_sz) 38562306a36Sopenharmony_ci{ 38662306a36Sopenharmony_ci int i; 38762306a36Sopenharmony_ci 38862306a36Sopenharmony_ci for (i = 0; i < key_sz; i++) 38962306a36Sopenharmony_ci k_ipad[i] = key[i] ^ 0x36; 39062306a36Sopenharmony_ci 39162306a36Sopenharmony_ci /* Instead of XOR with 0 */ 39262306a36Sopenharmony_ci for (; i < SHA1_BLOCK_SIZE; i++) 39362306a36Sopenharmony_ci k_ipad[i] = 0x36; 39462306a36Sopenharmony_ci} 39562306a36Sopenharmony_ci 39662306a36Sopenharmony_cistatic void prepare_kopad(u8 *k_opad, const u8 *key, u16 key_sz) 39762306a36Sopenharmony_ci{ 39862306a36Sopenharmony_ci int i; 39962306a36Sopenharmony_ci 40062306a36Sopenharmony_ci for (i = 0; i < key_sz; i++) 40162306a36Sopenharmony_ci k_opad[i] = key[i] ^ 0x5c; 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_ci /* Instead of XOR with 0 */ 40462306a36Sopenharmony_ci for (; i < SHA1_BLOCK_SIZE; i++) 40562306a36Sopenharmony_ci k_opad[i] = 0x5c; 40662306a36Sopenharmony_ci} 40762306a36Sopenharmony_ci 40862306a36Sopenharmony_cistatic void sa_export_shash(void *state, struct shash_desc *hash, 40962306a36Sopenharmony_ci int digest_size, __be32 *out) 41062306a36Sopenharmony_ci{ 41162306a36Sopenharmony_ci struct sha1_state *sha1; 41262306a36Sopenharmony_ci struct sha256_state *sha256; 41362306a36Sopenharmony_ci u32 *result; 41462306a36Sopenharmony_ci 41562306a36Sopenharmony_ci switch (digest_size) { 41662306a36Sopenharmony_ci case SHA1_DIGEST_SIZE: 41762306a36Sopenharmony_ci sha1 = state; 41862306a36Sopenharmony_ci result = sha1->state; 41962306a36Sopenharmony_ci break; 42062306a36Sopenharmony_ci case SHA256_DIGEST_SIZE: 42162306a36Sopenharmony_ci sha256 = state; 42262306a36Sopenharmony_ci result = sha256->state; 42362306a36Sopenharmony_ci break; 42462306a36Sopenharmony_ci default: 42562306a36Sopenharmony_ci dev_err(sa_k3_dev, "%s: bad digest_size=%d\n", __func__, 42662306a36Sopenharmony_ci digest_size); 42762306a36Sopenharmony_ci return; 42862306a36Sopenharmony_ci } 42962306a36Sopenharmony_ci 43062306a36Sopenharmony_ci crypto_shash_export(hash, state); 43162306a36Sopenharmony_ci 43262306a36Sopenharmony_ci cpu_to_be32_array(out, result, digest_size / 4); 43362306a36Sopenharmony_ci} 43462306a36Sopenharmony_ci 43562306a36Sopenharmony_cistatic void sa_prepare_iopads(struct algo_data *data, const u8 *key, 43662306a36Sopenharmony_ci u16 key_sz, __be32 *ipad, __be32 *opad) 43762306a36Sopenharmony_ci{ 43862306a36Sopenharmony_ci SHASH_DESC_ON_STACK(shash, data->ctx->shash); 43962306a36Sopenharmony_ci int block_size = crypto_shash_blocksize(data->ctx->shash); 44062306a36Sopenharmony_ci int digest_size = crypto_shash_digestsize(data->ctx->shash); 44162306a36Sopenharmony_ci union { 44262306a36Sopenharmony_ci struct sha1_state sha1; 44362306a36Sopenharmony_ci struct sha256_state sha256; 44462306a36Sopenharmony_ci u8 k_pad[SHA1_BLOCK_SIZE]; 44562306a36Sopenharmony_ci } sha; 44662306a36Sopenharmony_ci 44762306a36Sopenharmony_ci shash->tfm = data->ctx->shash; 44862306a36Sopenharmony_ci 44962306a36Sopenharmony_ci prepare_kipad(sha.k_pad, key, key_sz); 45062306a36Sopenharmony_ci 45162306a36Sopenharmony_ci crypto_shash_init(shash); 45262306a36Sopenharmony_ci crypto_shash_update(shash, sha.k_pad, block_size); 45362306a36Sopenharmony_ci sa_export_shash(&sha, shash, digest_size, ipad); 45462306a36Sopenharmony_ci 45562306a36Sopenharmony_ci prepare_kopad(sha.k_pad, key, key_sz); 45662306a36Sopenharmony_ci 45762306a36Sopenharmony_ci crypto_shash_init(shash); 45862306a36Sopenharmony_ci crypto_shash_update(shash, sha.k_pad, block_size); 45962306a36Sopenharmony_ci 46062306a36Sopenharmony_ci sa_export_shash(&sha, shash, digest_size, opad); 46162306a36Sopenharmony_ci 46262306a36Sopenharmony_ci memzero_explicit(&sha, sizeof(sha)); 46362306a36Sopenharmony_ci} 46462306a36Sopenharmony_ci 46562306a36Sopenharmony_ci/* Derive the inverse key used in AES-CBC decryption operation */ 46662306a36Sopenharmony_cistatic inline int sa_aes_inv_key(u8 *inv_key, const u8 *key, u16 key_sz) 46762306a36Sopenharmony_ci{ 46862306a36Sopenharmony_ci struct crypto_aes_ctx ctx; 46962306a36Sopenharmony_ci int key_pos; 47062306a36Sopenharmony_ci 47162306a36Sopenharmony_ci if (aes_expandkey(&ctx, key, key_sz)) { 47262306a36Sopenharmony_ci dev_err(sa_k3_dev, "%s: bad key len(%d)\n", __func__, key_sz); 47362306a36Sopenharmony_ci return -EINVAL; 47462306a36Sopenharmony_ci } 47562306a36Sopenharmony_ci 47662306a36Sopenharmony_ci /* work around to get the right inverse for AES_KEYSIZE_192 size keys */ 47762306a36Sopenharmony_ci if (key_sz == AES_KEYSIZE_192) { 47862306a36Sopenharmony_ci ctx.key_enc[52] = ctx.key_enc[51] ^ ctx.key_enc[46]; 47962306a36Sopenharmony_ci ctx.key_enc[53] = ctx.key_enc[52] ^ ctx.key_enc[47]; 48062306a36Sopenharmony_ci } 48162306a36Sopenharmony_ci 48262306a36Sopenharmony_ci /* Based crypto_aes_expand_key logic */ 48362306a36Sopenharmony_ci switch (key_sz) { 48462306a36Sopenharmony_ci case AES_KEYSIZE_128: 48562306a36Sopenharmony_ci case AES_KEYSIZE_192: 48662306a36Sopenharmony_ci key_pos = key_sz + 24; 48762306a36Sopenharmony_ci break; 48862306a36Sopenharmony_ci 48962306a36Sopenharmony_ci case AES_KEYSIZE_256: 49062306a36Sopenharmony_ci key_pos = key_sz + 24 - 4; 49162306a36Sopenharmony_ci break; 49262306a36Sopenharmony_ci 49362306a36Sopenharmony_ci default: 49462306a36Sopenharmony_ci dev_err(sa_k3_dev, "%s: bad key len(%d)\n", __func__, key_sz); 49562306a36Sopenharmony_ci return -EINVAL; 49662306a36Sopenharmony_ci } 49762306a36Sopenharmony_ci 49862306a36Sopenharmony_ci memcpy(inv_key, &ctx.key_enc[key_pos], key_sz); 49962306a36Sopenharmony_ci return 0; 50062306a36Sopenharmony_ci} 50162306a36Sopenharmony_ci 50262306a36Sopenharmony_ci/* Set Security context for the encryption engine */ 50362306a36Sopenharmony_cistatic int sa_set_sc_enc(struct algo_data *ad, const u8 *key, u16 key_sz, 50462306a36Sopenharmony_ci u8 enc, u8 *sc_buf) 50562306a36Sopenharmony_ci{ 50662306a36Sopenharmony_ci const u8 *mci = NULL; 50762306a36Sopenharmony_ci 50862306a36Sopenharmony_ci /* Set Encryption mode selector to crypto processing */ 50962306a36Sopenharmony_ci sc_buf[0] = SA_CRYPTO_PROCESSING; 51062306a36Sopenharmony_ci 51162306a36Sopenharmony_ci if (enc) 51262306a36Sopenharmony_ci mci = ad->mci_enc; 51362306a36Sopenharmony_ci else 51462306a36Sopenharmony_ci mci = ad->mci_dec; 51562306a36Sopenharmony_ci /* Set the mode control instructions in security context */ 51662306a36Sopenharmony_ci if (mci) 51762306a36Sopenharmony_ci memcpy(&sc_buf[1], mci, MODE_CONTROL_BYTES); 51862306a36Sopenharmony_ci 51962306a36Sopenharmony_ci /* For AES-CBC decryption get the inverse key */ 52062306a36Sopenharmony_ci if (ad->inv_key && !enc) { 52162306a36Sopenharmony_ci if (sa_aes_inv_key(&sc_buf[SC_ENC_KEY_OFFSET], key, key_sz)) 52262306a36Sopenharmony_ci return -EINVAL; 52362306a36Sopenharmony_ci /* For all other cases: key is used */ 52462306a36Sopenharmony_ci } else { 52562306a36Sopenharmony_ci memcpy(&sc_buf[SC_ENC_KEY_OFFSET], key, key_sz); 52662306a36Sopenharmony_ci } 52762306a36Sopenharmony_ci 52862306a36Sopenharmony_ci return 0; 52962306a36Sopenharmony_ci} 53062306a36Sopenharmony_ci 53162306a36Sopenharmony_ci/* Set Security context for the authentication engine */ 53262306a36Sopenharmony_cistatic void sa_set_sc_auth(struct algo_data *ad, const u8 *key, u16 key_sz, 53362306a36Sopenharmony_ci u8 *sc_buf) 53462306a36Sopenharmony_ci{ 53562306a36Sopenharmony_ci __be32 *ipad = (void *)(sc_buf + 32); 53662306a36Sopenharmony_ci __be32 *opad = (void *)(sc_buf + 64); 53762306a36Sopenharmony_ci 53862306a36Sopenharmony_ci /* Set Authentication mode selector to hash processing */ 53962306a36Sopenharmony_ci sc_buf[0] = SA_HASH_PROCESSING; 54062306a36Sopenharmony_ci /* Auth SW ctrl word: bit[6]=1 (upload computed hash to TLR section) */ 54162306a36Sopenharmony_ci sc_buf[1] = SA_UPLOAD_HASH_TO_TLR; 54262306a36Sopenharmony_ci sc_buf[1] |= ad->auth_ctrl; 54362306a36Sopenharmony_ci 54462306a36Sopenharmony_ci /* Copy the keys or ipad/opad */ 54562306a36Sopenharmony_ci if (ad->keyed_mac) 54662306a36Sopenharmony_ci ad->prep_iopad(ad, key, key_sz, ipad, opad); 54762306a36Sopenharmony_ci else { 54862306a36Sopenharmony_ci /* basic hash */ 54962306a36Sopenharmony_ci sc_buf[1] |= SA_BASIC_HASH; 55062306a36Sopenharmony_ci } 55162306a36Sopenharmony_ci} 55262306a36Sopenharmony_ci 55362306a36Sopenharmony_cistatic inline void sa_copy_iv(__be32 *out, const u8 *iv, bool size16) 55462306a36Sopenharmony_ci{ 55562306a36Sopenharmony_ci int j; 55662306a36Sopenharmony_ci 55762306a36Sopenharmony_ci for (j = 0; j < ((size16) ? 4 : 2); j++) { 55862306a36Sopenharmony_ci *out = cpu_to_be32(*((u32 *)iv)); 55962306a36Sopenharmony_ci iv += 4; 56062306a36Sopenharmony_ci out++; 56162306a36Sopenharmony_ci } 56262306a36Sopenharmony_ci} 56362306a36Sopenharmony_ci 56462306a36Sopenharmony_ci/* Format general command label */ 56562306a36Sopenharmony_cistatic int sa_format_cmdl_gen(struct sa_cmdl_cfg *cfg, u8 *cmdl, 56662306a36Sopenharmony_ci struct sa_cmdl_upd_info *upd_info) 56762306a36Sopenharmony_ci{ 56862306a36Sopenharmony_ci u8 enc_offset = 0, auth_offset = 0, total = 0; 56962306a36Sopenharmony_ci u8 enc_next_eng = SA_ENG_ID_OUTPORT2; 57062306a36Sopenharmony_ci u8 auth_next_eng = SA_ENG_ID_OUTPORT2; 57162306a36Sopenharmony_ci u32 *word_ptr = (u32 *)cmdl; 57262306a36Sopenharmony_ci int i; 57362306a36Sopenharmony_ci 57462306a36Sopenharmony_ci /* Clear the command label */ 57562306a36Sopenharmony_ci memzero_explicit(cmdl, (SA_MAX_CMDL_WORDS * sizeof(u32))); 57662306a36Sopenharmony_ci 57762306a36Sopenharmony_ci /* Iniialize the command update structure */ 57862306a36Sopenharmony_ci memzero_explicit(upd_info, sizeof(*upd_info)); 57962306a36Sopenharmony_ci 58062306a36Sopenharmony_ci if (cfg->enc_eng_id && cfg->auth_eng_id) { 58162306a36Sopenharmony_ci if (cfg->enc) { 58262306a36Sopenharmony_ci auth_offset = SA_CMDL_HEADER_SIZE_BYTES; 58362306a36Sopenharmony_ci enc_next_eng = cfg->auth_eng_id; 58462306a36Sopenharmony_ci 58562306a36Sopenharmony_ci if (cfg->iv_size) 58662306a36Sopenharmony_ci auth_offset += cfg->iv_size; 58762306a36Sopenharmony_ci } else { 58862306a36Sopenharmony_ci enc_offset = SA_CMDL_HEADER_SIZE_BYTES; 58962306a36Sopenharmony_ci auth_next_eng = cfg->enc_eng_id; 59062306a36Sopenharmony_ci } 59162306a36Sopenharmony_ci } 59262306a36Sopenharmony_ci 59362306a36Sopenharmony_ci if (cfg->enc_eng_id) { 59462306a36Sopenharmony_ci upd_info->flags |= SA_CMDL_UPD_ENC; 59562306a36Sopenharmony_ci upd_info->enc_size.index = enc_offset >> 2; 59662306a36Sopenharmony_ci upd_info->enc_offset.index = upd_info->enc_size.index + 1; 59762306a36Sopenharmony_ci /* Encryption command label */ 59862306a36Sopenharmony_ci cmdl[enc_offset + SA_CMDL_OFFSET_NESC] = enc_next_eng; 59962306a36Sopenharmony_ci 60062306a36Sopenharmony_ci /* Encryption modes requiring IV */ 60162306a36Sopenharmony_ci if (cfg->iv_size) { 60262306a36Sopenharmony_ci upd_info->flags |= SA_CMDL_UPD_ENC_IV; 60362306a36Sopenharmony_ci upd_info->enc_iv.index = 60462306a36Sopenharmony_ci (enc_offset + SA_CMDL_HEADER_SIZE_BYTES) >> 2; 60562306a36Sopenharmony_ci upd_info->enc_iv.size = cfg->iv_size; 60662306a36Sopenharmony_ci 60762306a36Sopenharmony_ci cmdl[enc_offset + SA_CMDL_OFFSET_LABEL_LEN] = 60862306a36Sopenharmony_ci SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; 60962306a36Sopenharmony_ci 61062306a36Sopenharmony_ci cmdl[enc_offset + SA_CMDL_OFFSET_OPTION_CTRL1] = 61162306a36Sopenharmony_ci (SA_CTX_ENC_AUX2_OFFSET | (cfg->iv_size >> 3)); 61262306a36Sopenharmony_ci total += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; 61362306a36Sopenharmony_ci } else { 61462306a36Sopenharmony_ci cmdl[enc_offset + SA_CMDL_OFFSET_LABEL_LEN] = 61562306a36Sopenharmony_ci SA_CMDL_HEADER_SIZE_BYTES; 61662306a36Sopenharmony_ci total += SA_CMDL_HEADER_SIZE_BYTES; 61762306a36Sopenharmony_ci } 61862306a36Sopenharmony_ci } 61962306a36Sopenharmony_ci 62062306a36Sopenharmony_ci if (cfg->auth_eng_id) { 62162306a36Sopenharmony_ci upd_info->flags |= SA_CMDL_UPD_AUTH; 62262306a36Sopenharmony_ci upd_info->auth_size.index = auth_offset >> 2; 62362306a36Sopenharmony_ci upd_info->auth_offset.index = upd_info->auth_size.index + 1; 62462306a36Sopenharmony_ci cmdl[auth_offset + SA_CMDL_OFFSET_NESC] = auth_next_eng; 62562306a36Sopenharmony_ci cmdl[auth_offset + SA_CMDL_OFFSET_LABEL_LEN] = 62662306a36Sopenharmony_ci SA_CMDL_HEADER_SIZE_BYTES; 62762306a36Sopenharmony_ci total += SA_CMDL_HEADER_SIZE_BYTES; 62862306a36Sopenharmony_ci } 62962306a36Sopenharmony_ci 63062306a36Sopenharmony_ci total = roundup(total, 8); 63162306a36Sopenharmony_ci 63262306a36Sopenharmony_ci for (i = 0; i < total / 4; i++) 63362306a36Sopenharmony_ci word_ptr[i] = swab32(word_ptr[i]); 63462306a36Sopenharmony_ci 63562306a36Sopenharmony_ci return total; 63662306a36Sopenharmony_ci} 63762306a36Sopenharmony_ci 63862306a36Sopenharmony_ci/* Update Command label */ 63962306a36Sopenharmony_cistatic inline void sa_update_cmdl(struct sa_req *req, u32 *cmdl, 64062306a36Sopenharmony_ci struct sa_cmdl_upd_info *upd_info) 64162306a36Sopenharmony_ci{ 64262306a36Sopenharmony_ci int i = 0, j; 64362306a36Sopenharmony_ci 64462306a36Sopenharmony_ci if (likely(upd_info->flags & SA_CMDL_UPD_ENC)) { 64562306a36Sopenharmony_ci cmdl[upd_info->enc_size.index] &= ~SA_CMDL_PAYLOAD_LENGTH_MASK; 64662306a36Sopenharmony_ci cmdl[upd_info->enc_size.index] |= req->enc_size; 64762306a36Sopenharmony_ci cmdl[upd_info->enc_offset.index] &= 64862306a36Sopenharmony_ci ~SA_CMDL_SOP_BYPASS_LEN_MASK; 64962306a36Sopenharmony_ci cmdl[upd_info->enc_offset.index] |= 65062306a36Sopenharmony_ci FIELD_PREP(SA_CMDL_SOP_BYPASS_LEN_MASK, 65162306a36Sopenharmony_ci req->enc_offset); 65262306a36Sopenharmony_ci 65362306a36Sopenharmony_ci if (likely(upd_info->flags & SA_CMDL_UPD_ENC_IV)) { 65462306a36Sopenharmony_ci __be32 *data = (__be32 *)&cmdl[upd_info->enc_iv.index]; 65562306a36Sopenharmony_ci u32 *enc_iv = (u32 *)req->enc_iv; 65662306a36Sopenharmony_ci 65762306a36Sopenharmony_ci for (j = 0; i < upd_info->enc_iv.size; i += 4, j++) { 65862306a36Sopenharmony_ci data[j] = cpu_to_be32(*enc_iv); 65962306a36Sopenharmony_ci enc_iv++; 66062306a36Sopenharmony_ci } 66162306a36Sopenharmony_ci } 66262306a36Sopenharmony_ci } 66362306a36Sopenharmony_ci 66462306a36Sopenharmony_ci if (likely(upd_info->flags & SA_CMDL_UPD_AUTH)) { 66562306a36Sopenharmony_ci cmdl[upd_info->auth_size.index] &= ~SA_CMDL_PAYLOAD_LENGTH_MASK; 66662306a36Sopenharmony_ci cmdl[upd_info->auth_size.index] |= req->auth_size; 66762306a36Sopenharmony_ci cmdl[upd_info->auth_offset.index] &= 66862306a36Sopenharmony_ci ~SA_CMDL_SOP_BYPASS_LEN_MASK; 66962306a36Sopenharmony_ci cmdl[upd_info->auth_offset.index] |= 67062306a36Sopenharmony_ci FIELD_PREP(SA_CMDL_SOP_BYPASS_LEN_MASK, 67162306a36Sopenharmony_ci req->auth_offset); 67262306a36Sopenharmony_ci if (upd_info->flags & SA_CMDL_UPD_AUTH_IV) { 67362306a36Sopenharmony_ci sa_copy_iv((void *)&cmdl[upd_info->auth_iv.index], 67462306a36Sopenharmony_ci req->auth_iv, 67562306a36Sopenharmony_ci (upd_info->auth_iv.size > 8)); 67662306a36Sopenharmony_ci } 67762306a36Sopenharmony_ci if (upd_info->flags & SA_CMDL_UPD_AUX_KEY) { 67862306a36Sopenharmony_ci int offset = (req->auth_size & 0xF) ? 4 : 0; 67962306a36Sopenharmony_ci 68062306a36Sopenharmony_ci memcpy(&cmdl[upd_info->aux_key_info.index], 68162306a36Sopenharmony_ci &upd_info->aux_key[offset], 16); 68262306a36Sopenharmony_ci } 68362306a36Sopenharmony_ci } 68462306a36Sopenharmony_ci} 68562306a36Sopenharmony_ci 68662306a36Sopenharmony_ci/* Format SWINFO words to be sent to SA */ 68762306a36Sopenharmony_cistatic 68862306a36Sopenharmony_civoid sa_set_swinfo(u8 eng_id, u16 sc_id, dma_addr_t sc_phys, 68962306a36Sopenharmony_ci u8 cmdl_present, u8 cmdl_offset, u8 flags, 69062306a36Sopenharmony_ci u8 hash_size, u32 *swinfo) 69162306a36Sopenharmony_ci{ 69262306a36Sopenharmony_ci swinfo[0] = sc_id; 69362306a36Sopenharmony_ci swinfo[0] |= FIELD_PREP(SA_SW0_FLAGS_MASK, flags); 69462306a36Sopenharmony_ci if (likely(cmdl_present)) 69562306a36Sopenharmony_ci swinfo[0] |= FIELD_PREP(SA_SW0_CMDL_INFO_MASK, 69662306a36Sopenharmony_ci cmdl_offset | SA_SW0_CMDL_PRESENT); 69762306a36Sopenharmony_ci swinfo[0] |= FIELD_PREP(SA_SW0_ENG_ID_MASK, eng_id); 69862306a36Sopenharmony_ci 69962306a36Sopenharmony_ci swinfo[0] |= SA_SW0_DEST_INFO_PRESENT; 70062306a36Sopenharmony_ci swinfo[1] = (u32)(sc_phys & 0xFFFFFFFFULL); 70162306a36Sopenharmony_ci swinfo[2] = (u32)((sc_phys & 0xFFFFFFFF00000000ULL) >> 32); 70262306a36Sopenharmony_ci swinfo[2] |= FIELD_PREP(SA_SW2_EGRESS_LENGTH, hash_size); 70362306a36Sopenharmony_ci} 70462306a36Sopenharmony_ci 70562306a36Sopenharmony_ci/* Dump the security context */ 70662306a36Sopenharmony_cistatic void sa_dump_sc(u8 *buf, dma_addr_t dma_addr) 70762306a36Sopenharmony_ci{ 70862306a36Sopenharmony_ci#ifdef DEBUG 70962306a36Sopenharmony_ci dev_info(sa_k3_dev, "Security context dump:: 0x%pad\n", &dma_addr); 71062306a36Sopenharmony_ci print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET, 71162306a36Sopenharmony_ci 16, 1, buf, SA_CTX_MAX_SZ, false); 71262306a36Sopenharmony_ci#endif 71362306a36Sopenharmony_ci} 71462306a36Sopenharmony_ci 71562306a36Sopenharmony_cistatic 71662306a36Sopenharmony_ciint sa_init_sc(struct sa_ctx_info *ctx, const struct sa_match_data *match_data, 71762306a36Sopenharmony_ci const u8 *enc_key, u16 enc_key_sz, 71862306a36Sopenharmony_ci const u8 *auth_key, u16 auth_key_sz, 71962306a36Sopenharmony_ci struct algo_data *ad, u8 enc, u32 *swinfo) 72062306a36Sopenharmony_ci{ 72162306a36Sopenharmony_ci int enc_sc_offset = 0; 72262306a36Sopenharmony_ci int auth_sc_offset = 0; 72362306a36Sopenharmony_ci u8 *sc_buf = ctx->sc; 72462306a36Sopenharmony_ci u16 sc_id = ctx->sc_id; 72562306a36Sopenharmony_ci u8 first_engine = 0; 72662306a36Sopenharmony_ci 72762306a36Sopenharmony_ci memzero_explicit(sc_buf, SA_CTX_MAX_SZ); 72862306a36Sopenharmony_ci 72962306a36Sopenharmony_ci if (ad->auth_eng.eng_id) { 73062306a36Sopenharmony_ci if (enc) 73162306a36Sopenharmony_ci first_engine = ad->enc_eng.eng_id; 73262306a36Sopenharmony_ci else 73362306a36Sopenharmony_ci first_engine = ad->auth_eng.eng_id; 73462306a36Sopenharmony_ci 73562306a36Sopenharmony_ci enc_sc_offset = SA_CTX_PHP_PE_CTX_SZ; 73662306a36Sopenharmony_ci auth_sc_offset = enc_sc_offset + ad->enc_eng.sc_size; 73762306a36Sopenharmony_ci sc_buf[1] = SA_SCCTL_FE_AUTH_ENC; 73862306a36Sopenharmony_ci if (!ad->hash_size) 73962306a36Sopenharmony_ci return -EINVAL; 74062306a36Sopenharmony_ci ad->hash_size = roundup(ad->hash_size, 8); 74162306a36Sopenharmony_ci 74262306a36Sopenharmony_ci } else if (ad->enc_eng.eng_id && !ad->auth_eng.eng_id) { 74362306a36Sopenharmony_ci enc_sc_offset = SA_CTX_PHP_PE_CTX_SZ; 74462306a36Sopenharmony_ci first_engine = ad->enc_eng.eng_id; 74562306a36Sopenharmony_ci sc_buf[1] = SA_SCCTL_FE_ENC; 74662306a36Sopenharmony_ci ad->hash_size = ad->iv_out_size; 74762306a36Sopenharmony_ci } 74862306a36Sopenharmony_ci 74962306a36Sopenharmony_ci /* SCCTL Owner info: 0=host, 1=CP_ACE */ 75062306a36Sopenharmony_ci sc_buf[SA_CTX_SCCTL_OWNER_OFFSET] = 0; 75162306a36Sopenharmony_ci memcpy(&sc_buf[2], &sc_id, 2); 75262306a36Sopenharmony_ci sc_buf[4] = 0x0; 75362306a36Sopenharmony_ci sc_buf[5] = match_data->priv_id; 75462306a36Sopenharmony_ci sc_buf[6] = match_data->priv; 75562306a36Sopenharmony_ci sc_buf[7] = 0x0; 75662306a36Sopenharmony_ci 75762306a36Sopenharmony_ci /* Prepare context for encryption engine */ 75862306a36Sopenharmony_ci if (ad->enc_eng.sc_size) { 75962306a36Sopenharmony_ci if (sa_set_sc_enc(ad, enc_key, enc_key_sz, enc, 76062306a36Sopenharmony_ci &sc_buf[enc_sc_offset])) 76162306a36Sopenharmony_ci return -EINVAL; 76262306a36Sopenharmony_ci } 76362306a36Sopenharmony_ci 76462306a36Sopenharmony_ci /* Prepare context for authentication engine */ 76562306a36Sopenharmony_ci if (ad->auth_eng.sc_size) 76662306a36Sopenharmony_ci sa_set_sc_auth(ad, auth_key, auth_key_sz, 76762306a36Sopenharmony_ci &sc_buf[auth_sc_offset]); 76862306a36Sopenharmony_ci 76962306a36Sopenharmony_ci /* Set the ownership of context to CP_ACE */ 77062306a36Sopenharmony_ci sc_buf[SA_CTX_SCCTL_OWNER_OFFSET] = 0x80; 77162306a36Sopenharmony_ci 77262306a36Sopenharmony_ci /* swizzle the security context */ 77362306a36Sopenharmony_ci sa_swiz_128(sc_buf, SA_CTX_MAX_SZ); 77462306a36Sopenharmony_ci 77562306a36Sopenharmony_ci sa_set_swinfo(first_engine, ctx->sc_id, ctx->sc_phys, 1, 0, 77662306a36Sopenharmony_ci SA_SW_INFO_FLAG_EVICT, ad->hash_size, swinfo); 77762306a36Sopenharmony_ci 77862306a36Sopenharmony_ci sa_dump_sc(sc_buf, ctx->sc_phys); 77962306a36Sopenharmony_ci 78062306a36Sopenharmony_ci return 0; 78162306a36Sopenharmony_ci} 78262306a36Sopenharmony_ci 78362306a36Sopenharmony_ci/* Free the per direction context memory */ 78462306a36Sopenharmony_cistatic void sa_free_ctx_info(struct sa_ctx_info *ctx, 78562306a36Sopenharmony_ci struct sa_crypto_data *data) 78662306a36Sopenharmony_ci{ 78762306a36Sopenharmony_ci unsigned long bn; 78862306a36Sopenharmony_ci 78962306a36Sopenharmony_ci bn = ctx->sc_id - data->sc_id_start; 79062306a36Sopenharmony_ci spin_lock(&data->scid_lock); 79162306a36Sopenharmony_ci __clear_bit(bn, data->ctx_bm); 79262306a36Sopenharmony_ci data->sc_id--; 79362306a36Sopenharmony_ci spin_unlock(&data->scid_lock); 79462306a36Sopenharmony_ci 79562306a36Sopenharmony_ci if (ctx->sc) { 79662306a36Sopenharmony_ci dma_pool_free(data->sc_pool, ctx->sc, ctx->sc_phys); 79762306a36Sopenharmony_ci ctx->sc = NULL; 79862306a36Sopenharmony_ci } 79962306a36Sopenharmony_ci} 80062306a36Sopenharmony_ci 80162306a36Sopenharmony_cistatic int sa_init_ctx_info(struct sa_ctx_info *ctx, 80262306a36Sopenharmony_ci struct sa_crypto_data *data) 80362306a36Sopenharmony_ci{ 80462306a36Sopenharmony_ci unsigned long bn; 80562306a36Sopenharmony_ci int err; 80662306a36Sopenharmony_ci 80762306a36Sopenharmony_ci spin_lock(&data->scid_lock); 80862306a36Sopenharmony_ci bn = find_first_zero_bit(data->ctx_bm, SA_MAX_NUM_CTX); 80962306a36Sopenharmony_ci __set_bit(bn, data->ctx_bm); 81062306a36Sopenharmony_ci data->sc_id++; 81162306a36Sopenharmony_ci spin_unlock(&data->scid_lock); 81262306a36Sopenharmony_ci 81362306a36Sopenharmony_ci ctx->sc_id = (u16)(data->sc_id_start + bn); 81462306a36Sopenharmony_ci 81562306a36Sopenharmony_ci ctx->sc = dma_pool_alloc(data->sc_pool, GFP_KERNEL, &ctx->sc_phys); 81662306a36Sopenharmony_ci if (!ctx->sc) { 81762306a36Sopenharmony_ci dev_err(&data->pdev->dev, "Failed to allocate SC memory\n"); 81862306a36Sopenharmony_ci err = -ENOMEM; 81962306a36Sopenharmony_ci goto scid_rollback; 82062306a36Sopenharmony_ci } 82162306a36Sopenharmony_ci 82262306a36Sopenharmony_ci return 0; 82362306a36Sopenharmony_ci 82462306a36Sopenharmony_ciscid_rollback: 82562306a36Sopenharmony_ci spin_lock(&data->scid_lock); 82662306a36Sopenharmony_ci __clear_bit(bn, data->ctx_bm); 82762306a36Sopenharmony_ci data->sc_id--; 82862306a36Sopenharmony_ci spin_unlock(&data->scid_lock); 82962306a36Sopenharmony_ci 83062306a36Sopenharmony_ci return err; 83162306a36Sopenharmony_ci} 83262306a36Sopenharmony_ci 83362306a36Sopenharmony_cistatic void sa_cipher_cra_exit(struct crypto_skcipher *tfm) 83462306a36Sopenharmony_ci{ 83562306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_skcipher_ctx(tfm); 83662306a36Sopenharmony_ci struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev); 83762306a36Sopenharmony_ci 83862306a36Sopenharmony_ci dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n", 83962306a36Sopenharmony_ci __func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys, 84062306a36Sopenharmony_ci ctx->dec.sc_id, &ctx->dec.sc_phys); 84162306a36Sopenharmony_ci 84262306a36Sopenharmony_ci sa_free_ctx_info(&ctx->enc, data); 84362306a36Sopenharmony_ci sa_free_ctx_info(&ctx->dec, data); 84462306a36Sopenharmony_ci 84562306a36Sopenharmony_ci crypto_free_skcipher(ctx->fallback.skcipher); 84662306a36Sopenharmony_ci} 84762306a36Sopenharmony_ci 84862306a36Sopenharmony_cistatic int sa_cipher_cra_init(struct crypto_skcipher *tfm) 84962306a36Sopenharmony_ci{ 85062306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_skcipher_ctx(tfm); 85162306a36Sopenharmony_ci struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev); 85262306a36Sopenharmony_ci const char *name = crypto_tfm_alg_name(&tfm->base); 85362306a36Sopenharmony_ci struct crypto_skcipher *child; 85462306a36Sopenharmony_ci int ret; 85562306a36Sopenharmony_ci 85662306a36Sopenharmony_ci memzero_explicit(ctx, sizeof(*ctx)); 85762306a36Sopenharmony_ci ctx->dev_data = data; 85862306a36Sopenharmony_ci 85962306a36Sopenharmony_ci ret = sa_init_ctx_info(&ctx->enc, data); 86062306a36Sopenharmony_ci if (ret) 86162306a36Sopenharmony_ci return ret; 86262306a36Sopenharmony_ci ret = sa_init_ctx_info(&ctx->dec, data); 86362306a36Sopenharmony_ci if (ret) { 86462306a36Sopenharmony_ci sa_free_ctx_info(&ctx->enc, data); 86562306a36Sopenharmony_ci return ret; 86662306a36Sopenharmony_ci } 86762306a36Sopenharmony_ci 86862306a36Sopenharmony_ci child = crypto_alloc_skcipher(name, 0, CRYPTO_ALG_NEED_FALLBACK); 86962306a36Sopenharmony_ci 87062306a36Sopenharmony_ci if (IS_ERR(child)) { 87162306a36Sopenharmony_ci dev_err(sa_k3_dev, "Error allocating fallback algo %s\n", name); 87262306a36Sopenharmony_ci return PTR_ERR(child); 87362306a36Sopenharmony_ci } 87462306a36Sopenharmony_ci 87562306a36Sopenharmony_ci ctx->fallback.skcipher = child; 87662306a36Sopenharmony_ci crypto_skcipher_set_reqsize(tfm, crypto_skcipher_reqsize(child) + 87762306a36Sopenharmony_ci sizeof(struct skcipher_request)); 87862306a36Sopenharmony_ci 87962306a36Sopenharmony_ci dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n", 88062306a36Sopenharmony_ci __func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys, 88162306a36Sopenharmony_ci ctx->dec.sc_id, &ctx->dec.sc_phys); 88262306a36Sopenharmony_ci return 0; 88362306a36Sopenharmony_ci} 88462306a36Sopenharmony_ci 88562306a36Sopenharmony_cistatic int sa_cipher_setkey(struct crypto_skcipher *tfm, const u8 *key, 88662306a36Sopenharmony_ci unsigned int keylen, struct algo_data *ad) 88762306a36Sopenharmony_ci{ 88862306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_skcipher_ctx(tfm); 88962306a36Sopenharmony_ci struct crypto_skcipher *child = ctx->fallback.skcipher; 89062306a36Sopenharmony_ci int cmdl_len; 89162306a36Sopenharmony_ci struct sa_cmdl_cfg cfg; 89262306a36Sopenharmony_ci int ret; 89362306a36Sopenharmony_ci 89462306a36Sopenharmony_ci if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && 89562306a36Sopenharmony_ci keylen != AES_KEYSIZE_256) 89662306a36Sopenharmony_ci return -EINVAL; 89762306a36Sopenharmony_ci 89862306a36Sopenharmony_ci ad->enc_eng.eng_id = SA_ENG_ID_EM1; 89962306a36Sopenharmony_ci ad->enc_eng.sc_size = SA_CTX_ENC_TYPE1_SZ; 90062306a36Sopenharmony_ci 90162306a36Sopenharmony_ci memzero_explicit(&cfg, sizeof(cfg)); 90262306a36Sopenharmony_ci cfg.enc_eng_id = ad->enc_eng.eng_id; 90362306a36Sopenharmony_ci cfg.iv_size = crypto_skcipher_ivsize(tfm); 90462306a36Sopenharmony_ci 90562306a36Sopenharmony_ci crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); 90662306a36Sopenharmony_ci crypto_skcipher_set_flags(child, tfm->base.crt_flags & 90762306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 90862306a36Sopenharmony_ci ret = crypto_skcipher_setkey(child, key, keylen); 90962306a36Sopenharmony_ci if (ret) 91062306a36Sopenharmony_ci return ret; 91162306a36Sopenharmony_ci 91262306a36Sopenharmony_ci /* Setup Encryption Security Context & Command label template */ 91362306a36Sopenharmony_ci if (sa_init_sc(&ctx->enc, ctx->dev_data->match_data, key, keylen, NULL, 0, 91462306a36Sopenharmony_ci ad, 1, &ctx->enc.epib[1])) 91562306a36Sopenharmony_ci goto badkey; 91662306a36Sopenharmony_ci 91762306a36Sopenharmony_ci cmdl_len = sa_format_cmdl_gen(&cfg, 91862306a36Sopenharmony_ci (u8 *)ctx->enc.cmdl, 91962306a36Sopenharmony_ci &ctx->enc.cmdl_upd_info); 92062306a36Sopenharmony_ci if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32))) 92162306a36Sopenharmony_ci goto badkey; 92262306a36Sopenharmony_ci 92362306a36Sopenharmony_ci ctx->enc.cmdl_size = cmdl_len; 92462306a36Sopenharmony_ci 92562306a36Sopenharmony_ci /* Setup Decryption Security Context & Command label template */ 92662306a36Sopenharmony_ci if (sa_init_sc(&ctx->dec, ctx->dev_data->match_data, key, keylen, NULL, 0, 92762306a36Sopenharmony_ci ad, 0, &ctx->dec.epib[1])) 92862306a36Sopenharmony_ci goto badkey; 92962306a36Sopenharmony_ci 93062306a36Sopenharmony_ci cfg.enc_eng_id = ad->enc_eng.eng_id; 93162306a36Sopenharmony_ci cmdl_len = sa_format_cmdl_gen(&cfg, (u8 *)ctx->dec.cmdl, 93262306a36Sopenharmony_ci &ctx->dec.cmdl_upd_info); 93362306a36Sopenharmony_ci 93462306a36Sopenharmony_ci if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32))) 93562306a36Sopenharmony_ci goto badkey; 93662306a36Sopenharmony_ci 93762306a36Sopenharmony_ci ctx->dec.cmdl_size = cmdl_len; 93862306a36Sopenharmony_ci ctx->iv_idx = ad->iv_idx; 93962306a36Sopenharmony_ci 94062306a36Sopenharmony_ci return 0; 94162306a36Sopenharmony_ci 94262306a36Sopenharmony_cibadkey: 94362306a36Sopenharmony_ci dev_err(sa_k3_dev, "%s: badkey\n", __func__); 94462306a36Sopenharmony_ci return -EINVAL; 94562306a36Sopenharmony_ci} 94662306a36Sopenharmony_ci 94762306a36Sopenharmony_cistatic int sa_aes_cbc_setkey(struct crypto_skcipher *tfm, const u8 *key, 94862306a36Sopenharmony_ci unsigned int keylen) 94962306a36Sopenharmony_ci{ 95062306a36Sopenharmony_ci struct algo_data ad = { 0 }; 95162306a36Sopenharmony_ci /* Convert the key size (16/24/32) to the key size index (0/1/2) */ 95262306a36Sopenharmony_ci int key_idx = (keylen >> 3) - 2; 95362306a36Sopenharmony_ci 95462306a36Sopenharmony_ci if (key_idx >= 3) 95562306a36Sopenharmony_ci return -EINVAL; 95662306a36Sopenharmony_ci 95762306a36Sopenharmony_ci ad.mci_enc = mci_cbc_enc_array[key_idx]; 95862306a36Sopenharmony_ci ad.mci_dec = mci_cbc_dec_array[key_idx]; 95962306a36Sopenharmony_ci ad.inv_key = true; 96062306a36Sopenharmony_ci ad.ealg_id = SA_EALG_ID_AES_CBC; 96162306a36Sopenharmony_ci ad.iv_idx = 4; 96262306a36Sopenharmony_ci ad.iv_out_size = 16; 96362306a36Sopenharmony_ci 96462306a36Sopenharmony_ci return sa_cipher_setkey(tfm, key, keylen, &ad); 96562306a36Sopenharmony_ci} 96662306a36Sopenharmony_ci 96762306a36Sopenharmony_cistatic int sa_aes_ecb_setkey(struct crypto_skcipher *tfm, const u8 *key, 96862306a36Sopenharmony_ci unsigned int keylen) 96962306a36Sopenharmony_ci{ 97062306a36Sopenharmony_ci struct algo_data ad = { 0 }; 97162306a36Sopenharmony_ci /* Convert the key size (16/24/32) to the key size index (0/1/2) */ 97262306a36Sopenharmony_ci int key_idx = (keylen >> 3) - 2; 97362306a36Sopenharmony_ci 97462306a36Sopenharmony_ci if (key_idx >= 3) 97562306a36Sopenharmony_ci return -EINVAL; 97662306a36Sopenharmony_ci 97762306a36Sopenharmony_ci ad.mci_enc = mci_ecb_enc_array[key_idx]; 97862306a36Sopenharmony_ci ad.mci_dec = mci_ecb_dec_array[key_idx]; 97962306a36Sopenharmony_ci ad.inv_key = true; 98062306a36Sopenharmony_ci ad.ealg_id = SA_EALG_ID_AES_ECB; 98162306a36Sopenharmony_ci 98262306a36Sopenharmony_ci return sa_cipher_setkey(tfm, key, keylen, &ad); 98362306a36Sopenharmony_ci} 98462306a36Sopenharmony_ci 98562306a36Sopenharmony_cistatic int sa_3des_cbc_setkey(struct crypto_skcipher *tfm, const u8 *key, 98662306a36Sopenharmony_ci unsigned int keylen) 98762306a36Sopenharmony_ci{ 98862306a36Sopenharmony_ci struct algo_data ad = { 0 }; 98962306a36Sopenharmony_ci 99062306a36Sopenharmony_ci ad.mci_enc = mci_cbc_3des_enc_array; 99162306a36Sopenharmony_ci ad.mci_dec = mci_cbc_3des_dec_array; 99262306a36Sopenharmony_ci ad.ealg_id = SA_EALG_ID_3DES_CBC; 99362306a36Sopenharmony_ci ad.iv_idx = 6; 99462306a36Sopenharmony_ci ad.iv_out_size = 8; 99562306a36Sopenharmony_ci 99662306a36Sopenharmony_ci return sa_cipher_setkey(tfm, key, keylen, &ad); 99762306a36Sopenharmony_ci} 99862306a36Sopenharmony_ci 99962306a36Sopenharmony_cistatic int sa_3des_ecb_setkey(struct crypto_skcipher *tfm, const u8 *key, 100062306a36Sopenharmony_ci unsigned int keylen) 100162306a36Sopenharmony_ci{ 100262306a36Sopenharmony_ci struct algo_data ad = { 0 }; 100362306a36Sopenharmony_ci 100462306a36Sopenharmony_ci ad.mci_enc = mci_ecb_3des_enc_array; 100562306a36Sopenharmony_ci ad.mci_dec = mci_ecb_3des_dec_array; 100662306a36Sopenharmony_ci 100762306a36Sopenharmony_ci return sa_cipher_setkey(tfm, key, keylen, &ad); 100862306a36Sopenharmony_ci} 100962306a36Sopenharmony_ci 101062306a36Sopenharmony_cistatic void sa_sync_from_device(struct sa_rx_data *rxd) 101162306a36Sopenharmony_ci{ 101262306a36Sopenharmony_ci struct sg_table *sgt; 101362306a36Sopenharmony_ci 101462306a36Sopenharmony_ci if (rxd->mapped_sg[0].dir == DMA_BIDIRECTIONAL) 101562306a36Sopenharmony_ci sgt = &rxd->mapped_sg[0].sgt; 101662306a36Sopenharmony_ci else 101762306a36Sopenharmony_ci sgt = &rxd->mapped_sg[1].sgt; 101862306a36Sopenharmony_ci 101962306a36Sopenharmony_ci dma_sync_sgtable_for_cpu(rxd->ddev, sgt, DMA_FROM_DEVICE); 102062306a36Sopenharmony_ci} 102162306a36Sopenharmony_ci 102262306a36Sopenharmony_cistatic void sa_free_sa_rx_data(struct sa_rx_data *rxd) 102362306a36Sopenharmony_ci{ 102462306a36Sopenharmony_ci int i; 102562306a36Sopenharmony_ci 102662306a36Sopenharmony_ci for (i = 0; i < ARRAY_SIZE(rxd->mapped_sg); i++) { 102762306a36Sopenharmony_ci struct sa_mapped_sg *mapped_sg = &rxd->mapped_sg[i]; 102862306a36Sopenharmony_ci 102962306a36Sopenharmony_ci if (mapped_sg->mapped) { 103062306a36Sopenharmony_ci dma_unmap_sgtable(rxd->ddev, &mapped_sg->sgt, 103162306a36Sopenharmony_ci mapped_sg->dir, 0); 103262306a36Sopenharmony_ci kfree(mapped_sg->split_sg); 103362306a36Sopenharmony_ci } 103462306a36Sopenharmony_ci } 103562306a36Sopenharmony_ci 103662306a36Sopenharmony_ci kfree(rxd); 103762306a36Sopenharmony_ci} 103862306a36Sopenharmony_ci 103962306a36Sopenharmony_cistatic void sa_aes_dma_in_callback(void *data) 104062306a36Sopenharmony_ci{ 104162306a36Sopenharmony_ci struct sa_rx_data *rxd = data; 104262306a36Sopenharmony_ci struct skcipher_request *req; 104362306a36Sopenharmony_ci u32 *result; 104462306a36Sopenharmony_ci __be32 *mdptr; 104562306a36Sopenharmony_ci size_t ml, pl; 104662306a36Sopenharmony_ci int i; 104762306a36Sopenharmony_ci 104862306a36Sopenharmony_ci sa_sync_from_device(rxd); 104962306a36Sopenharmony_ci req = container_of(rxd->req, struct skcipher_request, base); 105062306a36Sopenharmony_ci 105162306a36Sopenharmony_ci if (req->iv) { 105262306a36Sopenharmony_ci mdptr = (__be32 *)dmaengine_desc_get_metadata_ptr(rxd->tx_in, &pl, 105362306a36Sopenharmony_ci &ml); 105462306a36Sopenharmony_ci result = (u32 *)req->iv; 105562306a36Sopenharmony_ci 105662306a36Sopenharmony_ci for (i = 0; i < (rxd->enc_iv_size / 4); i++) 105762306a36Sopenharmony_ci result[i] = be32_to_cpu(mdptr[i + rxd->iv_idx]); 105862306a36Sopenharmony_ci } 105962306a36Sopenharmony_ci 106062306a36Sopenharmony_ci sa_free_sa_rx_data(rxd); 106162306a36Sopenharmony_ci 106262306a36Sopenharmony_ci skcipher_request_complete(req, 0); 106362306a36Sopenharmony_ci} 106462306a36Sopenharmony_ci 106562306a36Sopenharmony_cistatic void 106662306a36Sopenharmony_cisa_prepare_tx_desc(u32 *mdptr, u32 pslen, u32 *psdata, u32 epiblen, u32 *epib) 106762306a36Sopenharmony_ci{ 106862306a36Sopenharmony_ci u32 *out, *in; 106962306a36Sopenharmony_ci int i; 107062306a36Sopenharmony_ci 107162306a36Sopenharmony_ci for (out = mdptr, in = epib, i = 0; i < epiblen / sizeof(u32); i++) 107262306a36Sopenharmony_ci *out++ = *in++; 107362306a36Sopenharmony_ci 107462306a36Sopenharmony_ci mdptr[4] = (0xFFFF << 16); 107562306a36Sopenharmony_ci for (out = &mdptr[5], in = psdata, i = 0; 107662306a36Sopenharmony_ci i < pslen / sizeof(u32); i++) 107762306a36Sopenharmony_ci *out++ = *in++; 107862306a36Sopenharmony_ci} 107962306a36Sopenharmony_ci 108062306a36Sopenharmony_cistatic int sa_run(struct sa_req *req) 108162306a36Sopenharmony_ci{ 108262306a36Sopenharmony_ci struct sa_rx_data *rxd; 108362306a36Sopenharmony_ci gfp_t gfp_flags; 108462306a36Sopenharmony_ci u32 cmdl[SA_MAX_CMDL_WORDS]; 108562306a36Sopenharmony_ci struct sa_crypto_data *pdata = dev_get_drvdata(sa_k3_dev); 108662306a36Sopenharmony_ci struct device *ddev; 108762306a36Sopenharmony_ci struct dma_chan *dma_rx; 108862306a36Sopenharmony_ci int sg_nents, src_nents, dst_nents; 108962306a36Sopenharmony_ci struct scatterlist *src, *dst; 109062306a36Sopenharmony_ci size_t pl, ml, split_size; 109162306a36Sopenharmony_ci struct sa_ctx_info *sa_ctx = req->enc ? &req->ctx->enc : &req->ctx->dec; 109262306a36Sopenharmony_ci int ret; 109362306a36Sopenharmony_ci struct dma_async_tx_descriptor *tx_out; 109462306a36Sopenharmony_ci u32 *mdptr; 109562306a36Sopenharmony_ci bool diff_dst; 109662306a36Sopenharmony_ci enum dma_data_direction dir_src; 109762306a36Sopenharmony_ci struct sa_mapped_sg *mapped_sg; 109862306a36Sopenharmony_ci 109962306a36Sopenharmony_ci gfp_flags = req->base->flags & CRYPTO_TFM_REQ_MAY_SLEEP ? 110062306a36Sopenharmony_ci GFP_KERNEL : GFP_ATOMIC; 110162306a36Sopenharmony_ci 110262306a36Sopenharmony_ci rxd = kzalloc(sizeof(*rxd), gfp_flags); 110362306a36Sopenharmony_ci if (!rxd) 110462306a36Sopenharmony_ci return -ENOMEM; 110562306a36Sopenharmony_ci 110662306a36Sopenharmony_ci if (req->src != req->dst) { 110762306a36Sopenharmony_ci diff_dst = true; 110862306a36Sopenharmony_ci dir_src = DMA_TO_DEVICE; 110962306a36Sopenharmony_ci } else { 111062306a36Sopenharmony_ci diff_dst = false; 111162306a36Sopenharmony_ci dir_src = DMA_BIDIRECTIONAL; 111262306a36Sopenharmony_ci } 111362306a36Sopenharmony_ci 111462306a36Sopenharmony_ci /* 111562306a36Sopenharmony_ci * SA2UL has an interesting feature where the receive DMA channel 111662306a36Sopenharmony_ci * is selected based on the data passed to the engine. Within the 111762306a36Sopenharmony_ci * transition range, there is also a space where it is impossible 111862306a36Sopenharmony_ci * to determine where the data will end up, and this should be 111962306a36Sopenharmony_ci * avoided. This will be handled by the SW fallback mechanism by 112062306a36Sopenharmony_ci * the individual algorithm implementations. 112162306a36Sopenharmony_ci */ 112262306a36Sopenharmony_ci if (req->size >= 256) 112362306a36Sopenharmony_ci dma_rx = pdata->dma_rx2; 112462306a36Sopenharmony_ci else 112562306a36Sopenharmony_ci dma_rx = pdata->dma_rx1; 112662306a36Sopenharmony_ci 112762306a36Sopenharmony_ci ddev = dmaengine_get_dma_device(pdata->dma_tx); 112862306a36Sopenharmony_ci rxd->ddev = ddev; 112962306a36Sopenharmony_ci 113062306a36Sopenharmony_ci memcpy(cmdl, sa_ctx->cmdl, sa_ctx->cmdl_size); 113162306a36Sopenharmony_ci 113262306a36Sopenharmony_ci sa_update_cmdl(req, cmdl, &sa_ctx->cmdl_upd_info); 113362306a36Sopenharmony_ci 113462306a36Sopenharmony_ci if (req->type != CRYPTO_ALG_TYPE_AHASH) { 113562306a36Sopenharmony_ci if (req->enc) 113662306a36Sopenharmony_ci req->type |= 113762306a36Sopenharmony_ci (SA_REQ_SUBTYPE_ENC << SA_REQ_SUBTYPE_SHIFT); 113862306a36Sopenharmony_ci else 113962306a36Sopenharmony_ci req->type |= 114062306a36Sopenharmony_ci (SA_REQ_SUBTYPE_DEC << SA_REQ_SUBTYPE_SHIFT); 114162306a36Sopenharmony_ci } 114262306a36Sopenharmony_ci 114362306a36Sopenharmony_ci cmdl[sa_ctx->cmdl_size / sizeof(u32)] = req->type; 114462306a36Sopenharmony_ci 114562306a36Sopenharmony_ci /* 114662306a36Sopenharmony_ci * Map the packets, first we check if the data fits into a single 114762306a36Sopenharmony_ci * sg entry and use that if possible. If it does not fit, we check 114862306a36Sopenharmony_ci * if we need to do sg_split to align the scatterlist data on the 114962306a36Sopenharmony_ci * actual data size being processed by the crypto engine. 115062306a36Sopenharmony_ci */ 115162306a36Sopenharmony_ci src = req->src; 115262306a36Sopenharmony_ci sg_nents = sg_nents_for_len(src, req->size); 115362306a36Sopenharmony_ci 115462306a36Sopenharmony_ci split_size = req->size; 115562306a36Sopenharmony_ci 115662306a36Sopenharmony_ci mapped_sg = &rxd->mapped_sg[0]; 115762306a36Sopenharmony_ci if (sg_nents == 1 && split_size <= req->src->length) { 115862306a36Sopenharmony_ci src = &mapped_sg->static_sg; 115962306a36Sopenharmony_ci src_nents = 1; 116062306a36Sopenharmony_ci sg_init_table(src, 1); 116162306a36Sopenharmony_ci sg_set_page(src, sg_page(req->src), split_size, 116262306a36Sopenharmony_ci req->src->offset); 116362306a36Sopenharmony_ci 116462306a36Sopenharmony_ci mapped_sg->sgt.sgl = src; 116562306a36Sopenharmony_ci mapped_sg->sgt.orig_nents = src_nents; 116662306a36Sopenharmony_ci ret = dma_map_sgtable(ddev, &mapped_sg->sgt, dir_src, 0); 116762306a36Sopenharmony_ci if (ret) { 116862306a36Sopenharmony_ci kfree(rxd); 116962306a36Sopenharmony_ci return ret; 117062306a36Sopenharmony_ci } 117162306a36Sopenharmony_ci 117262306a36Sopenharmony_ci mapped_sg->dir = dir_src; 117362306a36Sopenharmony_ci mapped_sg->mapped = true; 117462306a36Sopenharmony_ci } else { 117562306a36Sopenharmony_ci mapped_sg->sgt.sgl = req->src; 117662306a36Sopenharmony_ci mapped_sg->sgt.orig_nents = sg_nents; 117762306a36Sopenharmony_ci ret = dma_map_sgtable(ddev, &mapped_sg->sgt, dir_src, 0); 117862306a36Sopenharmony_ci if (ret) { 117962306a36Sopenharmony_ci kfree(rxd); 118062306a36Sopenharmony_ci return ret; 118162306a36Sopenharmony_ci } 118262306a36Sopenharmony_ci 118362306a36Sopenharmony_ci mapped_sg->dir = dir_src; 118462306a36Sopenharmony_ci mapped_sg->mapped = true; 118562306a36Sopenharmony_ci 118662306a36Sopenharmony_ci ret = sg_split(mapped_sg->sgt.sgl, mapped_sg->sgt.nents, 0, 1, 118762306a36Sopenharmony_ci &split_size, &src, &src_nents, gfp_flags); 118862306a36Sopenharmony_ci if (ret) { 118962306a36Sopenharmony_ci src_nents = mapped_sg->sgt.nents; 119062306a36Sopenharmony_ci src = mapped_sg->sgt.sgl; 119162306a36Sopenharmony_ci } else { 119262306a36Sopenharmony_ci mapped_sg->split_sg = src; 119362306a36Sopenharmony_ci } 119462306a36Sopenharmony_ci } 119562306a36Sopenharmony_ci 119662306a36Sopenharmony_ci dma_sync_sgtable_for_device(ddev, &mapped_sg->sgt, DMA_TO_DEVICE); 119762306a36Sopenharmony_ci 119862306a36Sopenharmony_ci if (!diff_dst) { 119962306a36Sopenharmony_ci dst_nents = src_nents; 120062306a36Sopenharmony_ci dst = src; 120162306a36Sopenharmony_ci } else { 120262306a36Sopenharmony_ci dst_nents = sg_nents_for_len(req->dst, req->size); 120362306a36Sopenharmony_ci mapped_sg = &rxd->mapped_sg[1]; 120462306a36Sopenharmony_ci 120562306a36Sopenharmony_ci if (dst_nents == 1 && split_size <= req->dst->length) { 120662306a36Sopenharmony_ci dst = &mapped_sg->static_sg; 120762306a36Sopenharmony_ci dst_nents = 1; 120862306a36Sopenharmony_ci sg_init_table(dst, 1); 120962306a36Sopenharmony_ci sg_set_page(dst, sg_page(req->dst), split_size, 121062306a36Sopenharmony_ci req->dst->offset); 121162306a36Sopenharmony_ci 121262306a36Sopenharmony_ci mapped_sg->sgt.sgl = dst; 121362306a36Sopenharmony_ci mapped_sg->sgt.orig_nents = dst_nents; 121462306a36Sopenharmony_ci ret = dma_map_sgtable(ddev, &mapped_sg->sgt, 121562306a36Sopenharmony_ci DMA_FROM_DEVICE, 0); 121662306a36Sopenharmony_ci if (ret) 121762306a36Sopenharmony_ci goto err_cleanup; 121862306a36Sopenharmony_ci 121962306a36Sopenharmony_ci mapped_sg->dir = DMA_FROM_DEVICE; 122062306a36Sopenharmony_ci mapped_sg->mapped = true; 122162306a36Sopenharmony_ci } else { 122262306a36Sopenharmony_ci mapped_sg->sgt.sgl = req->dst; 122362306a36Sopenharmony_ci mapped_sg->sgt.orig_nents = dst_nents; 122462306a36Sopenharmony_ci ret = dma_map_sgtable(ddev, &mapped_sg->sgt, 122562306a36Sopenharmony_ci DMA_FROM_DEVICE, 0); 122662306a36Sopenharmony_ci if (ret) 122762306a36Sopenharmony_ci goto err_cleanup; 122862306a36Sopenharmony_ci 122962306a36Sopenharmony_ci mapped_sg->dir = DMA_FROM_DEVICE; 123062306a36Sopenharmony_ci mapped_sg->mapped = true; 123162306a36Sopenharmony_ci 123262306a36Sopenharmony_ci ret = sg_split(mapped_sg->sgt.sgl, mapped_sg->sgt.nents, 123362306a36Sopenharmony_ci 0, 1, &split_size, &dst, &dst_nents, 123462306a36Sopenharmony_ci gfp_flags); 123562306a36Sopenharmony_ci if (ret) { 123662306a36Sopenharmony_ci dst_nents = mapped_sg->sgt.nents; 123762306a36Sopenharmony_ci dst = mapped_sg->sgt.sgl; 123862306a36Sopenharmony_ci } else { 123962306a36Sopenharmony_ci mapped_sg->split_sg = dst; 124062306a36Sopenharmony_ci } 124162306a36Sopenharmony_ci } 124262306a36Sopenharmony_ci } 124362306a36Sopenharmony_ci 124462306a36Sopenharmony_ci rxd->tx_in = dmaengine_prep_slave_sg(dma_rx, dst, dst_nents, 124562306a36Sopenharmony_ci DMA_DEV_TO_MEM, 124662306a36Sopenharmony_ci DMA_PREP_INTERRUPT | DMA_CTRL_ACK); 124762306a36Sopenharmony_ci if (!rxd->tx_in) { 124862306a36Sopenharmony_ci dev_err(pdata->dev, "IN prep_slave_sg() failed\n"); 124962306a36Sopenharmony_ci ret = -EINVAL; 125062306a36Sopenharmony_ci goto err_cleanup; 125162306a36Sopenharmony_ci } 125262306a36Sopenharmony_ci 125362306a36Sopenharmony_ci rxd->req = (void *)req->base; 125462306a36Sopenharmony_ci rxd->enc = req->enc; 125562306a36Sopenharmony_ci rxd->iv_idx = req->ctx->iv_idx; 125662306a36Sopenharmony_ci rxd->enc_iv_size = sa_ctx->cmdl_upd_info.enc_iv.size; 125762306a36Sopenharmony_ci rxd->tx_in->callback = req->callback; 125862306a36Sopenharmony_ci rxd->tx_in->callback_param = rxd; 125962306a36Sopenharmony_ci 126062306a36Sopenharmony_ci tx_out = dmaengine_prep_slave_sg(pdata->dma_tx, src, 126162306a36Sopenharmony_ci src_nents, DMA_MEM_TO_DEV, 126262306a36Sopenharmony_ci DMA_PREP_INTERRUPT | DMA_CTRL_ACK); 126362306a36Sopenharmony_ci 126462306a36Sopenharmony_ci if (!tx_out) { 126562306a36Sopenharmony_ci dev_err(pdata->dev, "OUT prep_slave_sg() failed\n"); 126662306a36Sopenharmony_ci ret = -EINVAL; 126762306a36Sopenharmony_ci goto err_cleanup; 126862306a36Sopenharmony_ci } 126962306a36Sopenharmony_ci 127062306a36Sopenharmony_ci /* 127162306a36Sopenharmony_ci * Prepare metadata for DMA engine. This essentially describes the 127262306a36Sopenharmony_ci * crypto algorithm to be used, data sizes, different keys etc. 127362306a36Sopenharmony_ci */ 127462306a36Sopenharmony_ci mdptr = (u32 *)dmaengine_desc_get_metadata_ptr(tx_out, &pl, &ml); 127562306a36Sopenharmony_ci 127662306a36Sopenharmony_ci sa_prepare_tx_desc(mdptr, (sa_ctx->cmdl_size + (SA_PSDATA_CTX_WORDS * 127762306a36Sopenharmony_ci sizeof(u32))), cmdl, sizeof(sa_ctx->epib), 127862306a36Sopenharmony_ci sa_ctx->epib); 127962306a36Sopenharmony_ci 128062306a36Sopenharmony_ci ml = sa_ctx->cmdl_size + (SA_PSDATA_CTX_WORDS * sizeof(u32)); 128162306a36Sopenharmony_ci dmaengine_desc_set_metadata_len(tx_out, req->mdata_size); 128262306a36Sopenharmony_ci 128362306a36Sopenharmony_ci dmaengine_submit(tx_out); 128462306a36Sopenharmony_ci dmaengine_submit(rxd->tx_in); 128562306a36Sopenharmony_ci 128662306a36Sopenharmony_ci dma_async_issue_pending(dma_rx); 128762306a36Sopenharmony_ci dma_async_issue_pending(pdata->dma_tx); 128862306a36Sopenharmony_ci 128962306a36Sopenharmony_ci return -EINPROGRESS; 129062306a36Sopenharmony_ci 129162306a36Sopenharmony_cierr_cleanup: 129262306a36Sopenharmony_ci sa_free_sa_rx_data(rxd); 129362306a36Sopenharmony_ci 129462306a36Sopenharmony_ci return ret; 129562306a36Sopenharmony_ci} 129662306a36Sopenharmony_ci 129762306a36Sopenharmony_cistatic int sa_cipher_run(struct skcipher_request *req, u8 *iv, int enc) 129862306a36Sopenharmony_ci{ 129962306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = 130062306a36Sopenharmony_ci crypto_skcipher_ctx(crypto_skcipher_reqtfm(req)); 130162306a36Sopenharmony_ci struct crypto_alg *alg = req->base.tfm->__crt_alg; 130262306a36Sopenharmony_ci struct sa_req sa_req = { 0 }; 130362306a36Sopenharmony_ci 130462306a36Sopenharmony_ci if (!req->cryptlen) 130562306a36Sopenharmony_ci return 0; 130662306a36Sopenharmony_ci 130762306a36Sopenharmony_ci if (req->cryptlen % alg->cra_blocksize) 130862306a36Sopenharmony_ci return -EINVAL; 130962306a36Sopenharmony_ci 131062306a36Sopenharmony_ci /* Use SW fallback if the data size is not supported */ 131162306a36Sopenharmony_ci if (req->cryptlen > SA_MAX_DATA_SZ || 131262306a36Sopenharmony_ci (req->cryptlen >= SA_UNSAFE_DATA_SZ_MIN && 131362306a36Sopenharmony_ci req->cryptlen <= SA_UNSAFE_DATA_SZ_MAX)) { 131462306a36Sopenharmony_ci struct skcipher_request *subreq = skcipher_request_ctx(req); 131562306a36Sopenharmony_ci 131662306a36Sopenharmony_ci skcipher_request_set_tfm(subreq, ctx->fallback.skcipher); 131762306a36Sopenharmony_ci skcipher_request_set_callback(subreq, req->base.flags, 131862306a36Sopenharmony_ci req->base.complete, 131962306a36Sopenharmony_ci req->base.data); 132062306a36Sopenharmony_ci skcipher_request_set_crypt(subreq, req->src, req->dst, 132162306a36Sopenharmony_ci req->cryptlen, req->iv); 132262306a36Sopenharmony_ci if (enc) 132362306a36Sopenharmony_ci return crypto_skcipher_encrypt(subreq); 132462306a36Sopenharmony_ci else 132562306a36Sopenharmony_ci return crypto_skcipher_decrypt(subreq); 132662306a36Sopenharmony_ci } 132762306a36Sopenharmony_ci 132862306a36Sopenharmony_ci sa_req.size = req->cryptlen; 132962306a36Sopenharmony_ci sa_req.enc_size = req->cryptlen; 133062306a36Sopenharmony_ci sa_req.src = req->src; 133162306a36Sopenharmony_ci sa_req.dst = req->dst; 133262306a36Sopenharmony_ci sa_req.enc_iv = iv; 133362306a36Sopenharmony_ci sa_req.type = CRYPTO_ALG_TYPE_SKCIPHER; 133462306a36Sopenharmony_ci sa_req.enc = enc; 133562306a36Sopenharmony_ci sa_req.callback = sa_aes_dma_in_callback; 133662306a36Sopenharmony_ci sa_req.mdata_size = 44; 133762306a36Sopenharmony_ci sa_req.base = &req->base; 133862306a36Sopenharmony_ci sa_req.ctx = ctx; 133962306a36Sopenharmony_ci 134062306a36Sopenharmony_ci return sa_run(&sa_req); 134162306a36Sopenharmony_ci} 134262306a36Sopenharmony_ci 134362306a36Sopenharmony_cistatic int sa_encrypt(struct skcipher_request *req) 134462306a36Sopenharmony_ci{ 134562306a36Sopenharmony_ci return sa_cipher_run(req, req->iv, 1); 134662306a36Sopenharmony_ci} 134762306a36Sopenharmony_ci 134862306a36Sopenharmony_cistatic int sa_decrypt(struct skcipher_request *req) 134962306a36Sopenharmony_ci{ 135062306a36Sopenharmony_ci return sa_cipher_run(req, req->iv, 0); 135162306a36Sopenharmony_ci} 135262306a36Sopenharmony_ci 135362306a36Sopenharmony_cistatic void sa_sha_dma_in_callback(void *data) 135462306a36Sopenharmony_ci{ 135562306a36Sopenharmony_ci struct sa_rx_data *rxd = data; 135662306a36Sopenharmony_ci struct ahash_request *req; 135762306a36Sopenharmony_ci struct crypto_ahash *tfm; 135862306a36Sopenharmony_ci unsigned int authsize; 135962306a36Sopenharmony_ci int i; 136062306a36Sopenharmony_ci size_t ml, pl; 136162306a36Sopenharmony_ci u32 *result; 136262306a36Sopenharmony_ci __be32 *mdptr; 136362306a36Sopenharmony_ci 136462306a36Sopenharmony_ci sa_sync_from_device(rxd); 136562306a36Sopenharmony_ci req = container_of(rxd->req, struct ahash_request, base); 136662306a36Sopenharmony_ci tfm = crypto_ahash_reqtfm(req); 136762306a36Sopenharmony_ci authsize = crypto_ahash_digestsize(tfm); 136862306a36Sopenharmony_ci 136962306a36Sopenharmony_ci mdptr = (__be32 *)dmaengine_desc_get_metadata_ptr(rxd->tx_in, &pl, &ml); 137062306a36Sopenharmony_ci result = (u32 *)req->result; 137162306a36Sopenharmony_ci 137262306a36Sopenharmony_ci for (i = 0; i < (authsize / 4); i++) 137362306a36Sopenharmony_ci result[i] = be32_to_cpu(mdptr[i + 4]); 137462306a36Sopenharmony_ci 137562306a36Sopenharmony_ci sa_free_sa_rx_data(rxd); 137662306a36Sopenharmony_ci 137762306a36Sopenharmony_ci ahash_request_complete(req, 0); 137862306a36Sopenharmony_ci} 137962306a36Sopenharmony_ci 138062306a36Sopenharmony_cistatic int zero_message_process(struct ahash_request *req) 138162306a36Sopenharmony_ci{ 138262306a36Sopenharmony_ci struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); 138362306a36Sopenharmony_ci int sa_digest_size = crypto_ahash_digestsize(tfm); 138462306a36Sopenharmony_ci 138562306a36Sopenharmony_ci switch (sa_digest_size) { 138662306a36Sopenharmony_ci case SHA1_DIGEST_SIZE: 138762306a36Sopenharmony_ci memcpy(req->result, sha1_zero_message_hash, sa_digest_size); 138862306a36Sopenharmony_ci break; 138962306a36Sopenharmony_ci case SHA256_DIGEST_SIZE: 139062306a36Sopenharmony_ci memcpy(req->result, sha256_zero_message_hash, sa_digest_size); 139162306a36Sopenharmony_ci break; 139262306a36Sopenharmony_ci case SHA512_DIGEST_SIZE: 139362306a36Sopenharmony_ci memcpy(req->result, sha512_zero_message_hash, sa_digest_size); 139462306a36Sopenharmony_ci break; 139562306a36Sopenharmony_ci default: 139662306a36Sopenharmony_ci return -EINVAL; 139762306a36Sopenharmony_ci } 139862306a36Sopenharmony_ci 139962306a36Sopenharmony_ci return 0; 140062306a36Sopenharmony_ci} 140162306a36Sopenharmony_ci 140262306a36Sopenharmony_cistatic int sa_sha_run(struct ahash_request *req) 140362306a36Sopenharmony_ci{ 140462306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_ahash_ctx(crypto_ahash_reqtfm(req)); 140562306a36Sopenharmony_ci struct sa_sha_req_ctx *rctx = ahash_request_ctx(req); 140662306a36Sopenharmony_ci struct sa_req sa_req = { 0 }; 140762306a36Sopenharmony_ci size_t auth_len; 140862306a36Sopenharmony_ci 140962306a36Sopenharmony_ci auth_len = req->nbytes; 141062306a36Sopenharmony_ci 141162306a36Sopenharmony_ci if (!auth_len) 141262306a36Sopenharmony_ci return zero_message_process(req); 141362306a36Sopenharmony_ci 141462306a36Sopenharmony_ci if (auth_len > SA_MAX_DATA_SZ || 141562306a36Sopenharmony_ci (auth_len >= SA_UNSAFE_DATA_SZ_MIN && 141662306a36Sopenharmony_ci auth_len <= SA_UNSAFE_DATA_SZ_MAX)) { 141762306a36Sopenharmony_ci struct ahash_request *subreq = &rctx->fallback_req; 141862306a36Sopenharmony_ci int ret = 0; 141962306a36Sopenharmony_ci 142062306a36Sopenharmony_ci ahash_request_set_tfm(subreq, ctx->fallback.ahash); 142162306a36Sopenharmony_ci subreq->base.flags = req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP; 142262306a36Sopenharmony_ci 142362306a36Sopenharmony_ci crypto_ahash_init(subreq); 142462306a36Sopenharmony_ci 142562306a36Sopenharmony_ci subreq->nbytes = auth_len; 142662306a36Sopenharmony_ci subreq->src = req->src; 142762306a36Sopenharmony_ci subreq->result = req->result; 142862306a36Sopenharmony_ci 142962306a36Sopenharmony_ci ret |= crypto_ahash_update(subreq); 143062306a36Sopenharmony_ci 143162306a36Sopenharmony_ci subreq->nbytes = 0; 143262306a36Sopenharmony_ci 143362306a36Sopenharmony_ci ret |= crypto_ahash_final(subreq); 143462306a36Sopenharmony_ci 143562306a36Sopenharmony_ci return ret; 143662306a36Sopenharmony_ci } 143762306a36Sopenharmony_ci 143862306a36Sopenharmony_ci sa_req.size = auth_len; 143962306a36Sopenharmony_ci sa_req.auth_size = auth_len; 144062306a36Sopenharmony_ci sa_req.src = req->src; 144162306a36Sopenharmony_ci sa_req.dst = req->src; 144262306a36Sopenharmony_ci sa_req.enc = true; 144362306a36Sopenharmony_ci sa_req.type = CRYPTO_ALG_TYPE_AHASH; 144462306a36Sopenharmony_ci sa_req.callback = sa_sha_dma_in_callback; 144562306a36Sopenharmony_ci sa_req.mdata_size = 28; 144662306a36Sopenharmony_ci sa_req.ctx = ctx; 144762306a36Sopenharmony_ci sa_req.base = &req->base; 144862306a36Sopenharmony_ci 144962306a36Sopenharmony_ci return sa_run(&sa_req); 145062306a36Sopenharmony_ci} 145162306a36Sopenharmony_ci 145262306a36Sopenharmony_cistatic int sa_sha_setup(struct sa_tfm_ctx *ctx, struct algo_data *ad) 145362306a36Sopenharmony_ci{ 145462306a36Sopenharmony_ci int bs = crypto_shash_blocksize(ctx->shash); 145562306a36Sopenharmony_ci int cmdl_len; 145662306a36Sopenharmony_ci struct sa_cmdl_cfg cfg; 145762306a36Sopenharmony_ci 145862306a36Sopenharmony_ci ad->enc_eng.sc_size = SA_CTX_ENC_TYPE1_SZ; 145962306a36Sopenharmony_ci ad->auth_eng.eng_id = SA_ENG_ID_AM1; 146062306a36Sopenharmony_ci ad->auth_eng.sc_size = SA_CTX_AUTH_TYPE2_SZ; 146162306a36Sopenharmony_ci 146262306a36Sopenharmony_ci memset(ctx->authkey, 0, bs); 146362306a36Sopenharmony_ci memset(&cfg, 0, sizeof(cfg)); 146462306a36Sopenharmony_ci cfg.aalg = ad->aalg_id; 146562306a36Sopenharmony_ci cfg.enc_eng_id = ad->enc_eng.eng_id; 146662306a36Sopenharmony_ci cfg.auth_eng_id = ad->auth_eng.eng_id; 146762306a36Sopenharmony_ci cfg.iv_size = 0; 146862306a36Sopenharmony_ci cfg.akey = NULL; 146962306a36Sopenharmony_ci cfg.akey_len = 0; 147062306a36Sopenharmony_ci 147162306a36Sopenharmony_ci ctx->dev_data = dev_get_drvdata(sa_k3_dev); 147262306a36Sopenharmony_ci /* Setup Encryption Security Context & Command label template */ 147362306a36Sopenharmony_ci if (sa_init_sc(&ctx->enc, ctx->dev_data->match_data, NULL, 0, NULL, 0, 147462306a36Sopenharmony_ci ad, 0, &ctx->enc.epib[1])) 147562306a36Sopenharmony_ci goto badkey; 147662306a36Sopenharmony_ci 147762306a36Sopenharmony_ci cmdl_len = sa_format_cmdl_gen(&cfg, 147862306a36Sopenharmony_ci (u8 *)ctx->enc.cmdl, 147962306a36Sopenharmony_ci &ctx->enc.cmdl_upd_info); 148062306a36Sopenharmony_ci if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32))) 148162306a36Sopenharmony_ci goto badkey; 148262306a36Sopenharmony_ci 148362306a36Sopenharmony_ci ctx->enc.cmdl_size = cmdl_len; 148462306a36Sopenharmony_ci 148562306a36Sopenharmony_ci return 0; 148662306a36Sopenharmony_ci 148762306a36Sopenharmony_cibadkey: 148862306a36Sopenharmony_ci dev_err(sa_k3_dev, "%s: badkey\n", __func__); 148962306a36Sopenharmony_ci return -EINVAL; 149062306a36Sopenharmony_ci} 149162306a36Sopenharmony_ci 149262306a36Sopenharmony_cistatic int sa_sha_cra_init_alg(struct crypto_tfm *tfm, const char *alg_base) 149362306a36Sopenharmony_ci{ 149462306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm); 149562306a36Sopenharmony_ci struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev); 149662306a36Sopenharmony_ci int ret; 149762306a36Sopenharmony_ci 149862306a36Sopenharmony_ci memset(ctx, 0, sizeof(*ctx)); 149962306a36Sopenharmony_ci ctx->dev_data = data; 150062306a36Sopenharmony_ci ret = sa_init_ctx_info(&ctx->enc, data); 150162306a36Sopenharmony_ci if (ret) 150262306a36Sopenharmony_ci return ret; 150362306a36Sopenharmony_ci 150462306a36Sopenharmony_ci if (alg_base) { 150562306a36Sopenharmony_ci ctx->shash = crypto_alloc_shash(alg_base, 0, 150662306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK); 150762306a36Sopenharmony_ci if (IS_ERR(ctx->shash)) { 150862306a36Sopenharmony_ci dev_err(sa_k3_dev, "base driver %s couldn't be loaded\n", 150962306a36Sopenharmony_ci alg_base); 151062306a36Sopenharmony_ci return PTR_ERR(ctx->shash); 151162306a36Sopenharmony_ci } 151262306a36Sopenharmony_ci /* for fallback */ 151362306a36Sopenharmony_ci ctx->fallback.ahash = 151462306a36Sopenharmony_ci crypto_alloc_ahash(alg_base, 0, 151562306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK); 151662306a36Sopenharmony_ci if (IS_ERR(ctx->fallback.ahash)) { 151762306a36Sopenharmony_ci dev_err(ctx->dev_data->dev, 151862306a36Sopenharmony_ci "Could not load fallback driver\n"); 151962306a36Sopenharmony_ci return PTR_ERR(ctx->fallback.ahash); 152062306a36Sopenharmony_ci } 152162306a36Sopenharmony_ci } 152262306a36Sopenharmony_ci 152362306a36Sopenharmony_ci dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n", 152462306a36Sopenharmony_ci __func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys, 152562306a36Sopenharmony_ci ctx->dec.sc_id, &ctx->dec.sc_phys); 152662306a36Sopenharmony_ci 152762306a36Sopenharmony_ci crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm), 152862306a36Sopenharmony_ci sizeof(struct sa_sha_req_ctx) + 152962306a36Sopenharmony_ci crypto_ahash_reqsize(ctx->fallback.ahash)); 153062306a36Sopenharmony_ci 153162306a36Sopenharmony_ci return 0; 153262306a36Sopenharmony_ci} 153362306a36Sopenharmony_ci 153462306a36Sopenharmony_cistatic int sa_sha_digest(struct ahash_request *req) 153562306a36Sopenharmony_ci{ 153662306a36Sopenharmony_ci return sa_sha_run(req); 153762306a36Sopenharmony_ci} 153862306a36Sopenharmony_ci 153962306a36Sopenharmony_cistatic int sa_sha_init(struct ahash_request *req) 154062306a36Sopenharmony_ci{ 154162306a36Sopenharmony_ci struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); 154262306a36Sopenharmony_ci struct sa_sha_req_ctx *rctx = ahash_request_ctx(req); 154362306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm); 154462306a36Sopenharmony_ci 154562306a36Sopenharmony_ci dev_dbg(sa_k3_dev, "init: digest size: %u, rctx=%p\n", 154662306a36Sopenharmony_ci crypto_ahash_digestsize(tfm), rctx); 154762306a36Sopenharmony_ci 154862306a36Sopenharmony_ci ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash); 154962306a36Sopenharmony_ci rctx->fallback_req.base.flags = 155062306a36Sopenharmony_ci req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP; 155162306a36Sopenharmony_ci 155262306a36Sopenharmony_ci return crypto_ahash_init(&rctx->fallback_req); 155362306a36Sopenharmony_ci} 155462306a36Sopenharmony_ci 155562306a36Sopenharmony_cistatic int sa_sha_update(struct ahash_request *req) 155662306a36Sopenharmony_ci{ 155762306a36Sopenharmony_ci struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); 155862306a36Sopenharmony_ci struct sa_sha_req_ctx *rctx = ahash_request_ctx(req); 155962306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm); 156062306a36Sopenharmony_ci 156162306a36Sopenharmony_ci ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash); 156262306a36Sopenharmony_ci rctx->fallback_req.base.flags = 156362306a36Sopenharmony_ci req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP; 156462306a36Sopenharmony_ci rctx->fallback_req.nbytes = req->nbytes; 156562306a36Sopenharmony_ci rctx->fallback_req.src = req->src; 156662306a36Sopenharmony_ci 156762306a36Sopenharmony_ci return crypto_ahash_update(&rctx->fallback_req); 156862306a36Sopenharmony_ci} 156962306a36Sopenharmony_ci 157062306a36Sopenharmony_cistatic int sa_sha_final(struct ahash_request *req) 157162306a36Sopenharmony_ci{ 157262306a36Sopenharmony_ci struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); 157362306a36Sopenharmony_ci struct sa_sha_req_ctx *rctx = ahash_request_ctx(req); 157462306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm); 157562306a36Sopenharmony_ci 157662306a36Sopenharmony_ci ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash); 157762306a36Sopenharmony_ci rctx->fallback_req.base.flags = 157862306a36Sopenharmony_ci req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP; 157962306a36Sopenharmony_ci rctx->fallback_req.result = req->result; 158062306a36Sopenharmony_ci 158162306a36Sopenharmony_ci return crypto_ahash_final(&rctx->fallback_req); 158262306a36Sopenharmony_ci} 158362306a36Sopenharmony_ci 158462306a36Sopenharmony_cistatic int sa_sha_finup(struct ahash_request *req) 158562306a36Sopenharmony_ci{ 158662306a36Sopenharmony_ci struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); 158762306a36Sopenharmony_ci struct sa_sha_req_ctx *rctx = ahash_request_ctx(req); 158862306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm); 158962306a36Sopenharmony_ci 159062306a36Sopenharmony_ci ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash); 159162306a36Sopenharmony_ci rctx->fallback_req.base.flags = 159262306a36Sopenharmony_ci req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP; 159362306a36Sopenharmony_ci 159462306a36Sopenharmony_ci rctx->fallback_req.nbytes = req->nbytes; 159562306a36Sopenharmony_ci rctx->fallback_req.src = req->src; 159662306a36Sopenharmony_ci rctx->fallback_req.result = req->result; 159762306a36Sopenharmony_ci 159862306a36Sopenharmony_ci return crypto_ahash_finup(&rctx->fallback_req); 159962306a36Sopenharmony_ci} 160062306a36Sopenharmony_ci 160162306a36Sopenharmony_cistatic int sa_sha_import(struct ahash_request *req, const void *in) 160262306a36Sopenharmony_ci{ 160362306a36Sopenharmony_ci struct sa_sha_req_ctx *rctx = ahash_request_ctx(req); 160462306a36Sopenharmony_ci struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); 160562306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm); 160662306a36Sopenharmony_ci 160762306a36Sopenharmony_ci ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash); 160862306a36Sopenharmony_ci rctx->fallback_req.base.flags = req->base.flags & 160962306a36Sopenharmony_ci CRYPTO_TFM_REQ_MAY_SLEEP; 161062306a36Sopenharmony_ci 161162306a36Sopenharmony_ci return crypto_ahash_import(&rctx->fallback_req, in); 161262306a36Sopenharmony_ci} 161362306a36Sopenharmony_ci 161462306a36Sopenharmony_cistatic int sa_sha_export(struct ahash_request *req, void *out) 161562306a36Sopenharmony_ci{ 161662306a36Sopenharmony_ci struct sa_sha_req_ctx *rctx = ahash_request_ctx(req); 161762306a36Sopenharmony_ci struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); 161862306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm); 161962306a36Sopenharmony_ci struct ahash_request *subreq = &rctx->fallback_req; 162062306a36Sopenharmony_ci 162162306a36Sopenharmony_ci ahash_request_set_tfm(subreq, ctx->fallback.ahash); 162262306a36Sopenharmony_ci subreq->base.flags = req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP; 162362306a36Sopenharmony_ci 162462306a36Sopenharmony_ci return crypto_ahash_export(subreq, out); 162562306a36Sopenharmony_ci} 162662306a36Sopenharmony_ci 162762306a36Sopenharmony_cistatic int sa_sha1_cra_init(struct crypto_tfm *tfm) 162862306a36Sopenharmony_ci{ 162962306a36Sopenharmony_ci struct algo_data ad = { 0 }; 163062306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm); 163162306a36Sopenharmony_ci 163262306a36Sopenharmony_ci sa_sha_cra_init_alg(tfm, "sha1"); 163362306a36Sopenharmony_ci 163462306a36Sopenharmony_ci ad.aalg_id = SA_AALG_ID_SHA1; 163562306a36Sopenharmony_ci ad.hash_size = SHA1_DIGEST_SIZE; 163662306a36Sopenharmony_ci ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA1; 163762306a36Sopenharmony_ci 163862306a36Sopenharmony_ci sa_sha_setup(ctx, &ad); 163962306a36Sopenharmony_ci 164062306a36Sopenharmony_ci return 0; 164162306a36Sopenharmony_ci} 164262306a36Sopenharmony_ci 164362306a36Sopenharmony_cistatic int sa_sha256_cra_init(struct crypto_tfm *tfm) 164462306a36Sopenharmony_ci{ 164562306a36Sopenharmony_ci struct algo_data ad = { 0 }; 164662306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm); 164762306a36Sopenharmony_ci 164862306a36Sopenharmony_ci sa_sha_cra_init_alg(tfm, "sha256"); 164962306a36Sopenharmony_ci 165062306a36Sopenharmony_ci ad.aalg_id = SA_AALG_ID_SHA2_256; 165162306a36Sopenharmony_ci ad.hash_size = SHA256_DIGEST_SIZE; 165262306a36Sopenharmony_ci ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA256; 165362306a36Sopenharmony_ci 165462306a36Sopenharmony_ci sa_sha_setup(ctx, &ad); 165562306a36Sopenharmony_ci 165662306a36Sopenharmony_ci return 0; 165762306a36Sopenharmony_ci} 165862306a36Sopenharmony_ci 165962306a36Sopenharmony_cistatic int sa_sha512_cra_init(struct crypto_tfm *tfm) 166062306a36Sopenharmony_ci{ 166162306a36Sopenharmony_ci struct algo_data ad = { 0 }; 166262306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm); 166362306a36Sopenharmony_ci 166462306a36Sopenharmony_ci sa_sha_cra_init_alg(tfm, "sha512"); 166562306a36Sopenharmony_ci 166662306a36Sopenharmony_ci ad.aalg_id = SA_AALG_ID_SHA2_512; 166762306a36Sopenharmony_ci ad.hash_size = SHA512_DIGEST_SIZE; 166862306a36Sopenharmony_ci ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA512; 166962306a36Sopenharmony_ci 167062306a36Sopenharmony_ci sa_sha_setup(ctx, &ad); 167162306a36Sopenharmony_ci 167262306a36Sopenharmony_ci return 0; 167362306a36Sopenharmony_ci} 167462306a36Sopenharmony_ci 167562306a36Sopenharmony_cistatic void sa_sha_cra_exit(struct crypto_tfm *tfm) 167662306a36Sopenharmony_ci{ 167762306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm); 167862306a36Sopenharmony_ci struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev); 167962306a36Sopenharmony_ci 168062306a36Sopenharmony_ci dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n", 168162306a36Sopenharmony_ci __func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys, 168262306a36Sopenharmony_ci ctx->dec.sc_id, &ctx->dec.sc_phys); 168362306a36Sopenharmony_ci 168462306a36Sopenharmony_ci if (crypto_tfm_alg_type(tfm) == CRYPTO_ALG_TYPE_AHASH) 168562306a36Sopenharmony_ci sa_free_ctx_info(&ctx->enc, data); 168662306a36Sopenharmony_ci 168762306a36Sopenharmony_ci crypto_free_shash(ctx->shash); 168862306a36Sopenharmony_ci crypto_free_ahash(ctx->fallback.ahash); 168962306a36Sopenharmony_ci} 169062306a36Sopenharmony_ci 169162306a36Sopenharmony_cistatic void sa_aead_dma_in_callback(void *data) 169262306a36Sopenharmony_ci{ 169362306a36Sopenharmony_ci struct sa_rx_data *rxd = data; 169462306a36Sopenharmony_ci struct aead_request *req; 169562306a36Sopenharmony_ci struct crypto_aead *tfm; 169662306a36Sopenharmony_ci unsigned int start; 169762306a36Sopenharmony_ci unsigned int authsize; 169862306a36Sopenharmony_ci u8 auth_tag[SA_MAX_AUTH_TAG_SZ]; 169962306a36Sopenharmony_ci size_t pl, ml; 170062306a36Sopenharmony_ci int i; 170162306a36Sopenharmony_ci int err = 0; 170262306a36Sopenharmony_ci u32 *mdptr; 170362306a36Sopenharmony_ci 170462306a36Sopenharmony_ci sa_sync_from_device(rxd); 170562306a36Sopenharmony_ci req = container_of(rxd->req, struct aead_request, base); 170662306a36Sopenharmony_ci tfm = crypto_aead_reqtfm(req); 170762306a36Sopenharmony_ci start = req->assoclen + req->cryptlen; 170862306a36Sopenharmony_ci authsize = crypto_aead_authsize(tfm); 170962306a36Sopenharmony_ci 171062306a36Sopenharmony_ci mdptr = (u32 *)dmaengine_desc_get_metadata_ptr(rxd->tx_in, &pl, &ml); 171162306a36Sopenharmony_ci for (i = 0; i < (authsize / 4); i++) 171262306a36Sopenharmony_ci mdptr[i + 4] = swab32(mdptr[i + 4]); 171362306a36Sopenharmony_ci 171462306a36Sopenharmony_ci if (rxd->enc) { 171562306a36Sopenharmony_ci scatterwalk_map_and_copy(&mdptr[4], req->dst, start, authsize, 171662306a36Sopenharmony_ci 1); 171762306a36Sopenharmony_ci } else { 171862306a36Sopenharmony_ci start -= authsize; 171962306a36Sopenharmony_ci scatterwalk_map_and_copy(auth_tag, req->src, start, authsize, 172062306a36Sopenharmony_ci 0); 172162306a36Sopenharmony_ci 172262306a36Sopenharmony_ci err = memcmp(&mdptr[4], auth_tag, authsize) ? -EBADMSG : 0; 172362306a36Sopenharmony_ci } 172462306a36Sopenharmony_ci 172562306a36Sopenharmony_ci sa_free_sa_rx_data(rxd); 172662306a36Sopenharmony_ci 172762306a36Sopenharmony_ci aead_request_complete(req, err); 172862306a36Sopenharmony_ci} 172962306a36Sopenharmony_ci 173062306a36Sopenharmony_cistatic int sa_cra_init_aead(struct crypto_aead *tfm, const char *hash, 173162306a36Sopenharmony_ci const char *fallback) 173262306a36Sopenharmony_ci{ 173362306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_aead_ctx(tfm); 173462306a36Sopenharmony_ci struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev); 173562306a36Sopenharmony_ci int ret; 173662306a36Sopenharmony_ci 173762306a36Sopenharmony_ci memzero_explicit(ctx, sizeof(*ctx)); 173862306a36Sopenharmony_ci ctx->dev_data = data; 173962306a36Sopenharmony_ci 174062306a36Sopenharmony_ci ctx->shash = crypto_alloc_shash(hash, 0, CRYPTO_ALG_NEED_FALLBACK); 174162306a36Sopenharmony_ci if (IS_ERR(ctx->shash)) { 174262306a36Sopenharmony_ci dev_err(sa_k3_dev, "base driver %s couldn't be loaded\n", hash); 174362306a36Sopenharmony_ci return PTR_ERR(ctx->shash); 174462306a36Sopenharmony_ci } 174562306a36Sopenharmony_ci 174662306a36Sopenharmony_ci ctx->fallback.aead = crypto_alloc_aead(fallback, 0, 174762306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK); 174862306a36Sopenharmony_ci 174962306a36Sopenharmony_ci if (IS_ERR(ctx->fallback.aead)) { 175062306a36Sopenharmony_ci dev_err(sa_k3_dev, "fallback driver %s couldn't be loaded\n", 175162306a36Sopenharmony_ci fallback); 175262306a36Sopenharmony_ci return PTR_ERR(ctx->fallback.aead); 175362306a36Sopenharmony_ci } 175462306a36Sopenharmony_ci 175562306a36Sopenharmony_ci crypto_aead_set_reqsize(tfm, sizeof(struct aead_request) + 175662306a36Sopenharmony_ci crypto_aead_reqsize(ctx->fallback.aead)); 175762306a36Sopenharmony_ci 175862306a36Sopenharmony_ci ret = sa_init_ctx_info(&ctx->enc, data); 175962306a36Sopenharmony_ci if (ret) 176062306a36Sopenharmony_ci return ret; 176162306a36Sopenharmony_ci 176262306a36Sopenharmony_ci ret = sa_init_ctx_info(&ctx->dec, data); 176362306a36Sopenharmony_ci if (ret) { 176462306a36Sopenharmony_ci sa_free_ctx_info(&ctx->enc, data); 176562306a36Sopenharmony_ci return ret; 176662306a36Sopenharmony_ci } 176762306a36Sopenharmony_ci 176862306a36Sopenharmony_ci dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n", 176962306a36Sopenharmony_ci __func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys, 177062306a36Sopenharmony_ci ctx->dec.sc_id, &ctx->dec.sc_phys); 177162306a36Sopenharmony_ci 177262306a36Sopenharmony_ci return ret; 177362306a36Sopenharmony_ci} 177462306a36Sopenharmony_ci 177562306a36Sopenharmony_cistatic int sa_cra_init_aead_sha1(struct crypto_aead *tfm) 177662306a36Sopenharmony_ci{ 177762306a36Sopenharmony_ci return sa_cra_init_aead(tfm, "sha1", 177862306a36Sopenharmony_ci "authenc(hmac(sha1-ce),cbc(aes-ce))"); 177962306a36Sopenharmony_ci} 178062306a36Sopenharmony_ci 178162306a36Sopenharmony_cistatic int sa_cra_init_aead_sha256(struct crypto_aead *tfm) 178262306a36Sopenharmony_ci{ 178362306a36Sopenharmony_ci return sa_cra_init_aead(tfm, "sha256", 178462306a36Sopenharmony_ci "authenc(hmac(sha256-ce),cbc(aes-ce))"); 178562306a36Sopenharmony_ci} 178662306a36Sopenharmony_ci 178762306a36Sopenharmony_cistatic void sa_exit_tfm_aead(struct crypto_aead *tfm) 178862306a36Sopenharmony_ci{ 178962306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_aead_ctx(tfm); 179062306a36Sopenharmony_ci struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev); 179162306a36Sopenharmony_ci 179262306a36Sopenharmony_ci crypto_free_shash(ctx->shash); 179362306a36Sopenharmony_ci crypto_free_aead(ctx->fallback.aead); 179462306a36Sopenharmony_ci 179562306a36Sopenharmony_ci sa_free_ctx_info(&ctx->enc, data); 179662306a36Sopenharmony_ci sa_free_ctx_info(&ctx->dec, data); 179762306a36Sopenharmony_ci} 179862306a36Sopenharmony_ci 179962306a36Sopenharmony_ci/* AEAD algorithm configuration interface function */ 180062306a36Sopenharmony_cistatic int sa_aead_setkey(struct crypto_aead *authenc, 180162306a36Sopenharmony_ci const u8 *key, unsigned int keylen, 180262306a36Sopenharmony_ci struct algo_data *ad) 180362306a36Sopenharmony_ci{ 180462306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_aead_ctx(authenc); 180562306a36Sopenharmony_ci struct crypto_authenc_keys keys; 180662306a36Sopenharmony_ci int cmdl_len; 180762306a36Sopenharmony_ci struct sa_cmdl_cfg cfg; 180862306a36Sopenharmony_ci int key_idx; 180962306a36Sopenharmony_ci 181062306a36Sopenharmony_ci if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) 181162306a36Sopenharmony_ci return -EINVAL; 181262306a36Sopenharmony_ci 181362306a36Sopenharmony_ci /* Convert the key size (16/24/32) to the key size index (0/1/2) */ 181462306a36Sopenharmony_ci key_idx = (keys.enckeylen >> 3) - 2; 181562306a36Sopenharmony_ci if (key_idx >= 3) 181662306a36Sopenharmony_ci return -EINVAL; 181762306a36Sopenharmony_ci 181862306a36Sopenharmony_ci ad->ctx = ctx; 181962306a36Sopenharmony_ci ad->enc_eng.eng_id = SA_ENG_ID_EM1; 182062306a36Sopenharmony_ci ad->enc_eng.sc_size = SA_CTX_ENC_TYPE1_SZ; 182162306a36Sopenharmony_ci ad->auth_eng.eng_id = SA_ENG_ID_AM1; 182262306a36Sopenharmony_ci ad->auth_eng.sc_size = SA_CTX_AUTH_TYPE2_SZ; 182362306a36Sopenharmony_ci ad->mci_enc = mci_cbc_enc_no_iv_array[key_idx]; 182462306a36Sopenharmony_ci ad->mci_dec = mci_cbc_dec_no_iv_array[key_idx]; 182562306a36Sopenharmony_ci ad->inv_key = true; 182662306a36Sopenharmony_ci ad->keyed_mac = true; 182762306a36Sopenharmony_ci ad->ealg_id = SA_EALG_ID_AES_CBC; 182862306a36Sopenharmony_ci ad->prep_iopad = sa_prepare_iopads; 182962306a36Sopenharmony_ci 183062306a36Sopenharmony_ci memset(&cfg, 0, sizeof(cfg)); 183162306a36Sopenharmony_ci cfg.enc = true; 183262306a36Sopenharmony_ci cfg.aalg = ad->aalg_id; 183362306a36Sopenharmony_ci cfg.enc_eng_id = ad->enc_eng.eng_id; 183462306a36Sopenharmony_ci cfg.auth_eng_id = ad->auth_eng.eng_id; 183562306a36Sopenharmony_ci cfg.iv_size = crypto_aead_ivsize(authenc); 183662306a36Sopenharmony_ci cfg.akey = keys.authkey; 183762306a36Sopenharmony_ci cfg.akey_len = keys.authkeylen; 183862306a36Sopenharmony_ci 183962306a36Sopenharmony_ci /* Setup Encryption Security Context & Command label template */ 184062306a36Sopenharmony_ci if (sa_init_sc(&ctx->enc, ctx->dev_data->match_data, keys.enckey, 184162306a36Sopenharmony_ci keys.enckeylen, keys.authkey, keys.authkeylen, 184262306a36Sopenharmony_ci ad, 1, &ctx->enc.epib[1])) 184362306a36Sopenharmony_ci return -EINVAL; 184462306a36Sopenharmony_ci 184562306a36Sopenharmony_ci cmdl_len = sa_format_cmdl_gen(&cfg, 184662306a36Sopenharmony_ci (u8 *)ctx->enc.cmdl, 184762306a36Sopenharmony_ci &ctx->enc.cmdl_upd_info); 184862306a36Sopenharmony_ci if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32))) 184962306a36Sopenharmony_ci return -EINVAL; 185062306a36Sopenharmony_ci 185162306a36Sopenharmony_ci ctx->enc.cmdl_size = cmdl_len; 185262306a36Sopenharmony_ci 185362306a36Sopenharmony_ci /* Setup Decryption Security Context & Command label template */ 185462306a36Sopenharmony_ci if (sa_init_sc(&ctx->dec, ctx->dev_data->match_data, keys.enckey, 185562306a36Sopenharmony_ci keys.enckeylen, keys.authkey, keys.authkeylen, 185662306a36Sopenharmony_ci ad, 0, &ctx->dec.epib[1])) 185762306a36Sopenharmony_ci return -EINVAL; 185862306a36Sopenharmony_ci 185962306a36Sopenharmony_ci cfg.enc = false; 186062306a36Sopenharmony_ci cmdl_len = sa_format_cmdl_gen(&cfg, (u8 *)ctx->dec.cmdl, 186162306a36Sopenharmony_ci &ctx->dec.cmdl_upd_info); 186262306a36Sopenharmony_ci 186362306a36Sopenharmony_ci if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32))) 186462306a36Sopenharmony_ci return -EINVAL; 186562306a36Sopenharmony_ci 186662306a36Sopenharmony_ci ctx->dec.cmdl_size = cmdl_len; 186762306a36Sopenharmony_ci 186862306a36Sopenharmony_ci crypto_aead_clear_flags(ctx->fallback.aead, CRYPTO_TFM_REQ_MASK); 186962306a36Sopenharmony_ci crypto_aead_set_flags(ctx->fallback.aead, 187062306a36Sopenharmony_ci crypto_aead_get_flags(authenc) & 187162306a36Sopenharmony_ci CRYPTO_TFM_REQ_MASK); 187262306a36Sopenharmony_ci 187362306a36Sopenharmony_ci return crypto_aead_setkey(ctx->fallback.aead, key, keylen); 187462306a36Sopenharmony_ci} 187562306a36Sopenharmony_ci 187662306a36Sopenharmony_cistatic int sa_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize) 187762306a36Sopenharmony_ci{ 187862306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_tfm_ctx(crypto_aead_tfm(tfm)); 187962306a36Sopenharmony_ci 188062306a36Sopenharmony_ci return crypto_aead_setauthsize(ctx->fallback.aead, authsize); 188162306a36Sopenharmony_ci} 188262306a36Sopenharmony_ci 188362306a36Sopenharmony_cistatic int sa_aead_cbc_sha1_setkey(struct crypto_aead *authenc, 188462306a36Sopenharmony_ci const u8 *key, unsigned int keylen) 188562306a36Sopenharmony_ci{ 188662306a36Sopenharmony_ci struct algo_data ad = { 0 }; 188762306a36Sopenharmony_ci 188862306a36Sopenharmony_ci ad.ealg_id = SA_EALG_ID_AES_CBC; 188962306a36Sopenharmony_ci ad.aalg_id = SA_AALG_ID_HMAC_SHA1; 189062306a36Sopenharmony_ci ad.hash_size = SHA1_DIGEST_SIZE; 189162306a36Sopenharmony_ci ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA1; 189262306a36Sopenharmony_ci 189362306a36Sopenharmony_ci return sa_aead_setkey(authenc, key, keylen, &ad); 189462306a36Sopenharmony_ci} 189562306a36Sopenharmony_ci 189662306a36Sopenharmony_cistatic int sa_aead_cbc_sha256_setkey(struct crypto_aead *authenc, 189762306a36Sopenharmony_ci const u8 *key, unsigned int keylen) 189862306a36Sopenharmony_ci{ 189962306a36Sopenharmony_ci struct algo_data ad = { 0 }; 190062306a36Sopenharmony_ci 190162306a36Sopenharmony_ci ad.ealg_id = SA_EALG_ID_AES_CBC; 190262306a36Sopenharmony_ci ad.aalg_id = SA_AALG_ID_HMAC_SHA2_256; 190362306a36Sopenharmony_ci ad.hash_size = SHA256_DIGEST_SIZE; 190462306a36Sopenharmony_ci ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA256; 190562306a36Sopenharmony_ci 190662306a36Sopenharmony_ci return sa_aead_setkey(authenc, key, keylen, &ad); 190762306a36Sopenharmony_ci} 190862306a36Sopenharmony_ci 190962306a36Sopenharmony_cistatic int sa_aead_run(struct aead_request *req, u8 *iv, int enc) 191062306a36Sopenharmony_ci{ 191162306a36Sopenharmony_ci struct crypto_aead *tfm = crypto_aead_reqtfm(req); 191262306a36Sopenharmony_ci struct sa_tfm_ctx *ctx = crypto_aead_ctx(tfm); 191362306a36Sopenharmony_ci struct sa_req sa_req = { 0 }; 191462306a36Sopenharmony_ci size_t auth_size, enc_size; 191562306a36Sopenharmony_ci 191662306a36Sopenharmony_ci enc_size = req->cryptlen; 191762306a36Sopenharmony_ci auth_size = req->assoclen + req->cryptlen; 191862306a36Sopenharmony_ci 191962306a36Sopenharmony_ci if (!enc) { 192062306a36Sopenharmony_ci enc_size -= crypto_aead_authsize(tfm); 192162306a36Sopenharmony_ci auth_size -= crypto_aead_authsize(tfm); 192262306a36Sopenharmony_ci } 192362306a36Sopenharmony_ci 192462306a36Sopenharmony_ci if (auth_size > SA_MAX_DATA_SZ || 192562306a36Sopenharmony_ci (auth_size >= SA_UNSAFE_DATA_SZ_MIN && 192662306a36Sopenharmony_ci auth_size <= SA_UNSAFE_DATA_SZ_MAX)) { 192762306a36Sopenharmony_ci struct aead_request *subreq = aead_request_ctx(req); 192862306a36Sopenharmony_ci int ret; 192962306a36Sopenharmony_ci 193062306a36Sopenharmony_ci aead_request_set_tfm(subreq, ctx->fallback.aead); 193162306a36Sopenharmony_ci aead_request_set_callback(subreq, req->base.flags, 193262306a36Sopenharmony_ci req->base.complete, req->base.data); 193362306a36Sopenharmony_ci aead_request_set_crypt(subreq, req->src, req->dst, 193462306a36Sopenharmony_ci req->cryptlen, req->iv); 193562306a36Sopenharmony_ci aead_request_set_ad(subreq, req->assoclen); 193662306a36Sopenharmony_ci 193762306a36Sopenharmony_ci ret = enc ? crypto_aead_encrypt(subreq) : 193862306a36Sopenharmony_ci crypto_aead_decrypt(subreq); 193962306a36Sopenharmony_ci return ret; 194062306a36Sopenharmony_ci } 194162306a36Sopenharmony_ci 194262306a36Sopenharmony_ci sa_req.enc_offset = req->assoclen; 194362306a36Sopenharmony_ci sa_req.enc_size = enc_size; 194462306a36Sopenharmony_ci sa_req.auth_size = auth_size; 194562306a36Sopenharmony_ci sa_req.size = auth_size; 194662306a36Sopenharmony_ci sa_req.enc_iv = iv; 194762306a36Sopenharmony_ci sa_req.type = CRYPTO_ALG_TYPE_AEAD; 194862306a36Sopenharmony_ci sa_req.enc = enc; 194962306a36Sopenharmony_ci sa_req.callback = sa_aead_dma_in_callback; 195062306a36Sopenharmony_ci sa_req.mdata_size = 52; 195162306a36Sopenharmony_ci sa_req.base = &req->base; 195262306a36Sopenharmony_ci sa_req.ctx = ctx; 195362306a36Sopenharmony_ci sa_req.src = req->src; 195462306a36Sopenharmony_ci sa_req.dst = req->dst; 195562306a36Sopenharmony_ci 195662306a36Sopenharmony_ci return sa_run(&sa_req); 195762306a36Sopenharmony_ci} 195862306a36Sopenharmony_ci 195962306a36Sopenharmony_ci/* AEAD algorithm encrypt interface function */ 196062306a36Sopenharmony_cistatic int sa_aead_encrypt(struct aead_request *req) 196162306a36Sopenharmony_ci{ 196262306a36Sopenharmony_ci return sa_aead_run(req, req->iv, 1); 196362306a36Sopenharmony_ci} 196462306a36Sopenharmony_ci 196562306a36Sopenharmony_ci/* AEAD algorithm decrypt interface function */ 196662306a36Sopenharmony_cistatic int sa_aead_decrypt(struct aead_request *req) 196762306a36Sopenharmony_ci{ 196862306a36Sopenharmony_ci return sa_aead_run(req, req->iv, 0); 196962306a36Sopenharmony_ci} 197062306a36Sopenharmony_ci 197162306a36Sopenharmony_cistatic struct sa_alg_tmpl sa_algs[] = { 197262306a36Sopenharmony_ci [SA_ALG_CBC_AES] = { 197362306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_SKCIPHER, 197462306a36Sopenharmony_ci .alg.skcipher = { 197562306a36Sopenharmony_ci .base.cra_name = "cbc(aes)", 197662306a36Sopenharmony_ci .base.cra_driver_name = "cbc-aes-sa2ul", 197762306a36Sopenharmony_ci .base.cra_priority = 30000, 197862306a36Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_TYPE_SKCIPHER | 197962306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 198062306a36Sopenharmony_ci CRYPTO_ALG_ASYNC | 198162306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 198262306a36Sopenharmony_ci .base.cra_blocksize = AES_BLOCK_SIZE, 198362306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct sa_tfm_ctx), 198462306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 198562306a36Sopenharmony_ci .init = sa_cipher_cra_init, 198662306a36Sopenharmony_ci .exit = sa_cipher_cra_exit, 198762306a36Sopenharmony_ci .min_keysize = AES_MIN_KEY_SIZE, 198862306a36Sopenharmony_ci .max_keysize = AES_MAX_KEY_SIZE, 198962306a36Sopenharmony_ci .ivsize = AES_BLOCK_SIZE, 199062306a36Sopenharmony_ci .setkey = sa_aes_cbc_setkey, 199162306a36Sopenharmony_ci .encrypt = sa_encrypt, 199262306a36Sopenharmony_ci .decrypt = sa_decrypt, 199362306a36Sopenharmony_ci } 199462306a36Sopenharmony_ci }, 199562306a36Sopenharmony_ci [SA_ALG_EBC_AES] = { 199662306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_SKCIPHER, 199762306a36Sopenharmony_ci .alg.skcipher = { 199862306a36Sopenharmony_ci .base.cra_name = "ecb(aes)", 199962306a36Sopenharmony_ci .base.cra_driver_name = "ecb-aes-sa2ul", 200062306a36Sopenharmony_ci .base.cra_priority = 30000, 200162306a36Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_TYPE_SKCIPHER | 200262306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 200362306a36Sopenharmony_ci CRYPTO_ALG_ASYNC | 200462306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 200562306a36Sopenharmony_ci .base.cra_blocksize = AES_BLOCK_SIZE, 200662306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct sa_tfm_ctx), 200762306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 200862306a36Sopenharmony_ci .init = sa_cipher_cra_init, 200962306a36Sopenharmony_ci .exit = sa_cipher_cra_exit, 201062306a36Sopenharmony_ci .min_keysize = AES_MIN_KEY_SIZE, 201162306a36Sopenharmony_ci .max_keysize = AES_MAX_KEY_SIZE, 201262306a36Sopenharmony_ci .setkey = sa_aes_ecb_setkey, 201362306a36Sopenharmony_ci .encrypt = sa_encrypt, 201462306a36Sopenharmony_ci .decrypt = sa_decrypt, 201562306a36Sopenharmony_ci } 201662306a36Sopenharmony_ci }, 201762306a36Sopenharmony_ci [SA_ALG_CBC_DES3] = { 201862306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_SKCIPHER, 201962306a36Sopenharmony_ci .alg.skcipher = { 202062306a36Sopenharmony_ci .base.cra_name = "cbc(des3_ede)", 202162306a36Sopenharmony_ci .base.cra_driver_name = "cbc-des3-sa2ul", 202262306a36Sopenharmony_ci .base.cra_priority = 30000, 202362306a36Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_TYPE_SKCIPHER | 202462306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 202562306a36Sopenharmony_ci CRYPTO_ALG_ASYNC | 202662306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 202762306a36Sopenharmony_ci .base.cra_blocksize = DES_BLOCK_SIZE, 202862306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct sa_tfm_ctx), 202962306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 203062306a36Sopenharmony_ci .init = sa_cipher_cra_init, 203162306a36Sopenharmony_ci .exit = sa_cipher_cra_exit, 203262306a36Sopenharmony_ci .min_keysize = 3 * DES_KEY_SIZE, 203362306a36Sopenharmony_ci .max_keysize = 3 * DES_KEY_SIZE, 203462306a36Sopenharmony_ci .ivsize = DES_BLOCK_SIZE, 203562306a36Sopenharmony_ci .setkey = sa_3des_cbc_setkey, 203662306a36Sopenharmony_ci .encrypt = sa_encrypt, 203762306a36Sopenharmony_ci .decrypt = sa_decrypt, 203862306a36Sopenharmony_ci } 203962306a36Sopenharmony_ci }, 204062306a36Sopenharmony_ci [SA_ALG_ECB_DES3] = { 204162306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_SKCIPHER, 204262306a36Sopenharmony_ci .alg.skcipher = { 204362306a36Sopenharmony_ci .base.cra_name = "ecb(des3_ede)", 204462306a36Sopenharmony_ci .base.cra_driver_name = "ecb-des3-sa2ul", 204562306a36Sopenharmony_ci .base.cra_priority = 30000, 204662306a36Sopenharmony_ci .base.cra_flags = CRYPTO_ALG_TYPE_SKCIPHER | 204762306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 204862306a36Sopenharmony_ci CRYPTO_ALG_ASYNC | 204962306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 205062306a36Sopenharmony_ci .base.cra_blocksize = DES_BLOCK_SIZE, 205162306a36Sopenharmony_ci .base.cra_ctxsize = sizeof(struct sa_tfm_ctx), 205262306a36Sopenharmony_ci .base.cra_module = THIS_MODULE, 205362306a36Sopenharmony_ci .init = sa_cipher_cra_init, 205462306a36Sopenharmony_ci .exit = sa_cipher_cra_exit, 205562306a36Sopenharmony_ci .min_keysize = 3 * DES_KEY_SIZE, 205662306a36Sopenharmony_ci .max_keysize = 3 * DES_KEY_SIZE, 205762306a36Sopenharmony_ci .setkey = sa_3des_ecb_setkey, 205862306a36Sopenharmony_ci .encrypt = sa_encrypt, 205962306a36Sopenharmony_ci .decrypt = sa_decrypt, 206062306a36Sopenharmony_ci } 206162306a36Sopenharmony_ci }, 206262306a36Sopenharmony_ci [SA_ALG_SHA1] = { 206362306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_AHASH, 206462306a36Sopenharmony_ci .alg.ahash = { 206562306a36Sopenharmony_ci .halg.base = { 206662306a36Sopenharmony_ci .cra_name = "sha1", 206762306a36Sopenharmony_ci .cra_driver_name = "sha1-sa2ul", 206862306a36Sopenharmony_ci .cra_priority = 400, 206962306a36Sopenharmony_ci .cra_flags = CRYPTO_ALG_TYPE_AHASH | 207062306a36Sopenharmony_ci CRYPTO_ALG_ASYNC | 207162306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 207262306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 207362306a36Sopenharmony_ci .cra_blocksize = SHA1_BLOCK_SIZE, 207462306a36Sopenharmony_ci .cra_ctxsize = sizeof(struct sa_tfm_ctx), 207562306a36Sopenharmony_ci .cra_module = THIS_MODULE, 207662306a36Sopenharmony_ci .cra_init = sa_sha1_cra_init, 207762306a36Sopenharmony_ci .cra_exit = sa_sha_cra_exit, 207862306a36Sopenharmony_ci }, 207962306a36Sopenharmony_ci .halg.digestsize = SHA1_DIGEST_SIZE, 208062306a36Sopenharmony_ci .halg.statesize = sizeof(struct sa_sha_req_ctx) + 208162306a36Sopenharmony_ci sizeof(struct sha1_state), 208262306a36Sopenharmony_ci .init = sa_sha_init, 208362306a36Sopenharmony_ci .update = sa_sha_update, 208462306a36Sopenharmony_ci .final = sa_sha_final, 208562306a36Sopenharmony_ci .finup = sa_sha_finup, 208662306a36Sopenharmony_ci .digest = sa_sha_digest, 208762306a36Sopenharmony_ci .export = sa_sha_export, 208862306a36Sopenharmony_ci .import = sa_sha_import, 208962306a36Sopenharmony_ci }, 209062306a36Sopenharmony_ci }, 209162306a36Sopenharmony_ci [SA_ALG_SHA256] = { 209262306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_AHASH, 209362306a36Sopenharmony_ci .alg.ahash = { 209462306a36Sopenharmony_ci .halg.base = { 209562306a36Sopenharmony_ci .cra_name = "sha256", 209662306a36Sopenharmony_ci .cra_driver_name = "sha256-sa2ul", 209762306a36Sopenharmony_ci .cra_priority = 400, 209862306a36Sopenharmony_ci .cra_flags = CRYPTO_ALG_TYPE_AHASH | 209962306a36Sopenharmony_ci CRYPTO_ALG_ASYNC | 210062306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 210162306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 210262306a36Sopenharmony_ci .cra_blocksize = SHA256_BLOCK_SIZE, 210362306a36Sopenharmony_ci .cra_ctxsize = sizeof(struct sa_tfm_ctx), 210462306a36Sopenharmony_ci .cra_module = THIS_MODULE, 210562306a36Sopenharmony_ci .cra_init = sa_sha256_cra_init, 210662306a36Sopenharmony_ci .cra_exit = sa_sha_cra_exit, 210762306a36Sopenharmony_ci }, 210862306a36Sopenharmony_ci .halg.digestsize = SHA256_DIGEST_SIZE, 210962306a36Sopenharmony_ci .halg.statesize = sizeof(struct sa_sha_req_ctx) + 211062306a36Sopenharmony_ci sizeof(struct sha256_state), 211162306a36Sopenharmony_ci .init = sa_sha_init, 211262306a36Sopenharmony_ci .update = sa_sha_update, 211362306a36Sopenharmony_ci .final = sa_sha_final, 211462306a36Sopenharmony_ci .finup = sa_sha_finup, 211562306a36Sopenharmony_ci .digest = sa_sha_digest, 211662306a36Sopenharmony_ci .export = sa_sha_export, 211762306a36Sopenharmony_ci .import = sa_sha_import, 211862306a36Sopenharmony_ci }, 211962306a36Sopenharmony_ci }, 212062306a36Sopenharmony_ci [SA_ALG_SHA512] = { 212162306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_AHASH, 212262306a36Sopenharmony_ci .alg.ahash = { 212362306a36Sopenharmony_ci .halg.base = { 212462306a36Sopenharmony_ci .cra_name = "sha512", 212562306a36Sopenharmony_ci .cra_driver_name = "sha512-sa2ul", 212662306a36Sopenharmony_ci .cra_priority = 400, 212762306a36Sopenharmony_ci .cra_flags = CRYPTO_ALG_TYPE_AHASH | 212862306a36Sopenharmony_ci CRYPTO_ALG_ASYNC | 212962306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 213062306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 213162306a36Sopenharmony_ci .cra_blocksize = SHA512_BLOCK_SIZE, 213262306a36Sopenharmony_ci .cra_ctxsize = sizeof(struct sa_tfm_ctx), 213362306a36Sopenharmony_ci .cra_module = THIS_MODULE, 213462306a36Sopenharmony_ci .cra_init = sa_sha512_cra_init, 213562306a36Sopenharmony_ci .cra_exit = sa_sha_cra_exit, 213662306a36Sopenharmony_ci }, 213762306a36Sopenharmony_ci .halg.digestsize = SHA512_DIGEST_SIZE, 213862306a36Sopenharmony_ci .halg.statesize = sizeof(struct sa_sha_req_ctx) + 213962306a36Sopenharmony_ci sizeof(struct sha512_state), 214062306a36Sopenharmony_ci .init = sa_sha_init, 214162306a36Sopenharmony_ci .update = sa_sha_update, 214262306a36Sopenharmony_ci .final = sa_sha_final, 214362306a36Sopenharmony_ci .finup = sa_sha_finup, 214462306a36Sopenharmony_ci .digest = sa_sha_digest, 214562306a36Sopenharmony_ci .export = sa_sha_export, 214662306a36Sopenharmony_ci .import = sa_sha_import, 214762306a36Sopenharmony_ci }, 214862306a36Sopenharmony_ci }, 214962306a36Sopenharmony_ci [SA_ALG_AUTHENC_SHA1_AES] = { 215062306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_AEAD, 215162306a36Sopenharmony_ci .alg.aead = { 215262306a36Sopenharmony_ci .base = { 215362306a36Sopenharmony_ci .cra_name = "authenc(hmac(sha1),cbc(aes))", 215462306a36Sopenharmony_ci .cra_driver_name = 215562306a36Sopenharmony_ci "authenc(hmac(sha1),cbc(aes))-sa2ul", 215662306a36Sopenharmony_ci .cra_blocksize = AES_BLOCK_SIZE, 215762306a36Sopenharmony_ci .cra_flags = CRYPTO_ALG_TYPE_AEAD | 215862306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 215962306a36Sopenharmony_ci CRYPTO_ALG_ASYNC | 216062306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 216162306a36Sopenharmony_ci .cra_ctxsize = sizeof(struct sa_tfm_ctx), 216262306a36Sopenharmony_ci .cra_module = THIS_MODULE, 216362306a36Sopenharmony_ci .cra_priority = 3000, 216462306a36Sopenharmony_ci }, 216562306a36Sopenharmony_ci .ivsize = AES_BLOCK_SIZE, 216662306a36Sopenharmony_ci .maxauthsize = SHA1_DIGEST_SIZE, 216762306a36Sopenharmony_ci 216862306a36Sopenharmony_ci .init = sa_cra_init_aead_sha1, 216962306a36Sopenharmony_ci .exit = sa_exit_tfm_aead, 217062306a36Sopenharmony_ci .setkey = sa_aead_cbc_sha1_setkey, 217162306a36Sopenharmony_ci .setauthsize = sa_aead_setauthsize, 217262306a36Sopenharmony_ci .encrypt = sa_aead_encrypt, 217362306a36Sopenharmony_ci .decrypt = sa_aead_decrypt, 217462306a36Sopenharmony_ci }, 217562306a36Sopenharmony_ci }, 217662306a36Sopenharmony_ci [SA_ALG_AUTHENC_SHA256_AES] = { 217762306a36Sopenharmony_ci .type = CRYPTO_ALG_TYPE_AEAD, 217862306a36Sopenharmony_ci .alg.aead = { 217962306a36Sopenharmony_ci .base = { 218062306a36Sopenharmony_ci .cra_name = "authenc(hmac(sha256),cbc(aes))", 218162306a36Sopenharmony_ci .cra_driver_name = 218262306a36Sopenharmony_ci "authenc(hmac(sha256),cbc(aes))-sa2ul", 218362306a36Sopenharmony_ci .cra_blocksize = AES_BLOCK_SIZE, 218462306a36Sopenharmony_ci .cra_flags = CRYPTO_ALG_TYPE_AEAD | 218562306a36Sopenharmony_ci CRYPTO_ALG_KERN_DRIVER_ONLY | 218662306a36Sopenharmony_ci CRYPTO_ALG_ASYNC | 218762306a36Sopenharmony_ci CRYPTO_ALG_NEED_FALLBACK, 218862306a36Sopenharmony_ci .cra_ctxsize = sizeof(struct sa_tfm_ctx), 218962306a36Sopenharmony_ci .cra_module = THIS_MODULE, 219062306a36Sopenharmony_ci .cra_alignmask = 0, 219162306a36Sopenharmony_ci .cra_priority = 3000, 219262306a36Sopenharmony_ci }, 219362306a36Sopenharmony_ci .ivsize = AES_BLOCK_SIZE, 219462306a36Sopenharmony_ci .maxauthsize = SHA256_DIGEST_SIZE, 219562306a36Sopenharmony_ci 219662306a36Sopenharmony_ci .init = sa_cra_init_aead_sha256, 219762306a36Sopenharmony_ci .exit = sa_exit_tfm_aead, 219862306a36Sopenharmony_ci .setkey = sa_aead_cbc_sha256_setkey, 219962306a36Sopenharmony_ci .setauthsize = sa_aead_setauthsize, 220062306a36Sopenharmony_ci .encrypt = sa_aead_encrypt, 220162306a36Sopenharmony_ci .decrypt = sa_aead_decrypt, 220262306a36Sopenharmony_ci }, 220362306a36Sopenharmony_ci }, 220462306a36Sopenharmony_ci}; 220562306a36Sopenharmony_ci 220662306a36Sopenharmony_ci/* Register the algorithms in crypto framework */ 220762306a36Sopenharmony_cistatic void sa_register_algos(struct sa_crypto_data *dev_data) 220862306a36Sopenharmony_ci{ 220962306a36Sopenharmony_ci const struct sa_match_data *match_data = dev_data->match_data; 221062306a36Sopenharmony_ci struct device *dev = dev_data->dev; 221162306a36Sopenharmony_ci char *alg_name; 221262306a36Sopenharmony_ci u32 type; 221362306a36Sopenharmony_ci int i, err; 221462306a36Sopenharmony_ci 221562306a36Sopenharmony_ci for (i = 0; i < ARRAY_SIZE(sa_algs); i++) { 221662306a36Sopenharmony_ci /* Skip unsupported algos */ 221762306a36Sopenharmony_ci if (!(match_data->supported_algos & BIT(i))) 221862306a36Sopenharmony_ci continue; 221962306a36Sopenharmony_ci 222062306a36Sopenharmony_ci type = sa_algs[i].type; 222162306a36Sopenharmony_ci if (type == CRYPTO_ALG_TYPE_SKCIPHER) { 222262306a36Sopenharmony_ci alg_name = sa_algs[i].alg.skcipher.base.cra_name; 222362306a36Sopenharmony_ci err = crypto_register_skcipher(&sa_algs[i].alg.skcipher); 222462306a36Sopenharmony_ci } else if (type == CRYPTO_ALG_TYPE_AHASH) { 222562306a36Sopenharmony_ci alg_name = sa_algs[i].alg.ahash.halg.base.cra_name; 222662306a36Sopenharmony_ci err = crypto_register_ahash(&sa_algs[i].alg.ahash); 222762306a36Sopenharmony_ci } else if (type == CRYPTO_ALG_TYPE_AEAD) { 222862306a36Sopenharmony_ci alg_name = sa_algs[i].alg.aead.base.cra_name; 222962306a36Sopenharmony_ci err = crypto_register_aead(&sa_algs[i].alg.aead); 223062306a36Sopenharmony_ci } else { 223162306a36Sopenharmony_ci dev_err(dev, 223262306a36Sopenharmony_ci "un-supported crypto algorithm (%d)", 223362306a36Sopenharmony_ci sa_algs[i].type); 223462306a36Sopenharmony_ci continue; 223562306a36Sopenharmony_ci } 223662306a36Sopenharmony_ci 223762306a36Sopenharmony_ci if (err) 223862306a36Sopenharmony_ci dev_err(dev, "Failed to register '%s'\n", alg_name); 223962306a36Sopenharmony_ci else 224062306a36Sopenharmony_ci sa_algs[i].registered = true; 224162306a36Sopenharmony_ci } 224262306a36Sopenharmony_ci} 224362306a36Sopenharmony_ci 224462306a36Sopenharmony_ci/* Unregister the algorithms in crypto framework */ 224562306a36Sopenharmony_cistatic void sa_unregister_algos(const struct device *dev) 224662306a36Sopenharmony_ci{ 224762306a36Sopenharmony_ci u32 type; 224862306a36Sopenharmony_ci int i; 224962306a36Sopenharmony_ci 225062306a36Sopenharmony_ci for (i = 0; i < ARRAY_SIZE(sa_algs); i++) { 225162306a36Sopenharmony_ci type = sa_algs[i].type; 225262306a36Sopenharmony_ci if (!sa_algs[i].registered) 225362306a36Sopenharmony_ci continue; 225462306a36Sopenharmony_ci if (type == CRYPTO_ALG_TYPE_SKCIPHER) 225562306a36Sopenharmony_ci crypto_unregister_skcipher(&sa_algs[i].alg.skcipher); 225662306a36Sopenharmony_ci else if (type == CRYPTO_ALG_TYPE_AHASH) 225762306a36Sopenharmony_ci crypto_unregister_ahash(&sa_algs[i].alg.ahash); 225862306a36Sopenharmony_ci else if (type == CRYPTO_ALG_TYPE_AEAD) 225962306a36Sopenharmony_ci crypto_unregister_aead(&sa_algs[i].alg.aead); 226062306a36Sopenharmony_ci 226162306a36Sopenharmony_ci sa_algs[i].registered = false; 226262306a36Sopenharmony_ci } 226362306a36Sopenharmony_ci} 226462306a36Sopenharmony_ci 226562306a36Sopenharmony_cistatic int sa_init_mem(struct sa_crypto_data *dev_data) 226662306a36Sopenharmony_ci{ 226762306a36Sopenharmony_ci struct device *dev = &dev_data->pdev->dev; 226862306a36Sopenharmony_ci /* Setup dma pool for security context buffers */ 226962306a36Sopenharmony_ci dev_data->sc_pool = dma_pool_create("keystone-sc", dev, 227062306a36Sopenharmony_ci SA_CTX_MAX_SZ, 64, 0); 227162306a36Sopenharmony_ci if (!dev_data->sc_pool) { 227262306a36Sopenharmony_ci dev_err(dev, "Failed to create dma pool"); 227362306a36Sopenharmony_ci return -ENOMEM; 227462306a36Sopenharmony_ci } 227562306a36Sopenharmony_ci 227662306a36Sopenharmony_ci return 0; 227762306a36Sopenharmony_ci} 227862306a36Sopenharmony_ci 227962306a36Sopenharmony_cistatic int sa_dma_init(struct sa_crypto_data *dd) 228062306a36Sopenharmony_ci{ 228162306a36Sopenharmony_ci int ret; 228262306a36Sopenharmony_ci struct dma_slave_config cfg; 228362306a36Sopenharmony_ci 228462306a36Sopenharmony_ci dd->dma_rx1 = NULL; 228562306a36Sopenharmony_ci dd->dma_tx = NULL; 228662306a36Sopenharmony_ci dd->dma_rx2 = NULL; 228762306a36Sopenharmony_ci 228862306a36Sopenharmony_ci ret = dma_coerce_mask_and_coherent(dd->dev, DMA_BIT_MASK(48)); 228962306a36Sopenharmony_ci if (ret) 229062306a36Sopenharmony_ci return ret; 229162306a36Sopenharmony_ci 229262306a36Sopenharmony_ci dd->dma_rx1 = dma_request_chan(dd->dev, "rx1"); 229362306a36Sopenharmony_ci if (IS_ERR(dd->dma_rx1)) 229462306a36Sopenharmony_ci return dev_err_probe(dd->dev, PTR_ERR(dd->dma_rx1), 229562306a36Sopenharmony_ci "Unable to request rx1 DMA channel\n"); 229662306a36Sopenharmony_ci 229762306a36Sopenharmony_ci dd->dma_rx2 = dma_request_chan(dd->dev, "rx2"); 229862306a36Sopenharmony_ci if (IS_ERR(dd->dma_rx2)) { 229962306a36Sopenharmony_ci ret = dev_err_probe(dd->dev, PTR_ERR(dd->dma_rx2), 230062306a36Sopenharmony_ci "Unable to request rx2 DMA channel\n"); 230162306a36Sopenharmony_ci goto err_dma_rx2; 230262306a36Sopenharmony_ci } 230362306a36Sopenharmony_ci 230462306a36Sopenharmony_ci dd->dma_tx = dma_request_chan(dd->dev, "tx"); 230562306a36Sopenharmony_ci if (IS_ERR(dd->dma_tx)) { 230662306a36Sopenharmony_ci ret = dev_err_probe(dd->dev, PTR_ERR(dd->dma_tx), 230762306a36Sopenharmony_ci "Unable to request tx DMA channel\n"); 230862306a36Sopenharmony_ci goto err_dma_tx; 230962306a36Sopenharmony_ci } 231062306a36Sopenharmony_ci 231162306a36Sopenharmony_ci memzero_explicit(&cfg, sizeof(cfg)); 231262306a36Sopenharmony_ci 231362306a36Sopenharmony_ci cfg.src_addr_width = DMA_SLAVE_BUSWIDTH_4_BYTES; 231462306a36Sopenharmony_ci cfg.dst_addr_width = DMA_SLAVE_BUSWIDTH_4_BYTES; 231562306a36Sopenharmony_ci cfg.src_maxburst = 4; 231662306a36Sopenharmony_ci cfg.dst_maxburst = 4; 231762306a36Sopenharmony_ci 231862306a36Sopenharmony_ci ret = dmaengine_slave_config(dd->dma_rx1, &cfg); 231962306a36Sopenharmony_ci if (ret) { 232062306a36Sopenharmony_ci dev_err(dd->dev, "can't configure IN dmaengine slave: %d\n", 232162306a36Sopenharmony_ci ret); 232262306a36Sopenharmony_ci goto err_dma_config; 232362306a36Sopenharmony_ci } 232462306a36Sopenharmony_ci 232562306a36Sopenharmony_ci ret = dmaengine_slave_config(dd->dma_rx2, &cfg); 232662306a36Sopenharmony_ci if (ret) { 232762306a36Sopenharmony_ci dev_err(dd->dev, "can't configure IN dmaengine slave: %d\n", 232862306a36Sopenharmony_ci ret); 232962306a36Sopenharmony_ci goto err_dma_config; 233062306a36Sopenharmony_ci } 233162306a36Sopenharmony_ci 233262306a36Sopenharmony_ci ret = dmaengine_slave_config(dd->dma_tx, &cfg); 233362306a36Sopenharmony_ci if (ret) { 233462306a36Sopenharmony_ci dev_err(dd->dev, "can't configure OUT dmaengine slave: %d\n", 233562306a36Sopenharmony_ci ret); 233662306a36Sopenharmony_ci goto err_dma_config; 233762306a36Sopenharmony_ci } 233862306a36Sopenharmony_ci 233962306a36Sopenharmony_ci return 0; 234062306a36Sopenharmony_ci 234162306a36Sopenharmony_cierr_dma_config: 234262306a36Sopenharmony_ci dma_release_channel(dd->dma_tx); 234362306a36Sopenharmony_cierr_dma_tx: 234462306a36Sopenharmony_ci dma_release_channel(dd->dma_rx2); 234562306a36Sopenharmony_cierr_dma_rx2: 234662306a36Sopenharmony_ci dma_release_channel(dd->dma_rx1); 234762306a36Sopenharmony_ci 234862306a36Sopenharmony_ci return ret; 234962306a36Sopenharmony_ci} 235062306a36Sopenharmony_ci 235162306a36Sopenharmony_cistatic int sa_link_child(struct device *dev, void *data) 235262306a36Sopenharmony_ci{ 235362306a36Sopenharmony_ci struct device *parent = data; 235462306a36Sopenharmony_ci 235562306a36Sopenharmony_ci device_link_add(dev, parent, DL_FLAG_AUTOPROBE_CONSUMER); 235662306a36Sopenharmony_ci 235762306a36Sopenharmony_ci return 0; 235862306a36Sopenharmony_ci} 235962306a36Sopenharmony_ci 236062306a36Sopenharmony_cistatic struct sa_match_data am654_match_data = { 236162306a36Sopenharmony_ci .priv = 1, 236262306a36Sopenharmony_ci .priv_id = 1, 236362306a36Sopenharmony_ci .supported_algos = BIT(SA_ALG_CBC_AES) | 236462306a36Sopenharmony_ci BIT(SA_ALG_EBC_AES) | 236562306a36Sopenharmony_ci BIT(SA_ALG_CBC_DES3) | 236662306a36Sopenharmony_ci BIT(SA_ALG_ECB_DES3) | 236762306a36Sopenharmony_ci BIT(SA_ALG_SHA1) | 236862306a36Sopenharmony_ci BIT(SA_ALG_SHA256) | 236962306a36Sopenharmony_ci BIT(SA_ALG_SHA512) | 237062306a36Sopenharmony_ci BIT(SA_ALG_AUTHENC_SHA1_AES) | 237162306a36Sopenharmony_ci BIT(SA_ALG_AUTHENC_SHA256_AES), 237262306a36Sopenharmony_ci}; 237362306a36Sopenharmony_ci 237462306a36Sopenharmony_cistatic struct sa_match_data am64_match_data = { 237562306a36Sopenharmony_ci .priv = 0, 237662306a36Sopenharmony_ci .priv_id = 0, 237762306a36Sopenharmony_ci .supported_algos = BIT(SA_ALG_CBC_AES) | 237862306a36Sopenharmony_ci BIT(SA_ALG_EBC_AES) | 237962306a36Sopenharmony_ci BIT(SA_ALG_SHA256) | 238062306a36Sopenharmony_ci BIT(SA_ALG_SHA512) | 238162306a36Sopenharmony_ci BIT(SA_ALG_AUTHENC_SHA256_AES), 238262306a36Sopenharmony_ci}; 238362306a36Sopenharmony_ci 238462306a36Sopenharmony_cistatic const struct of_device_id of_match[] = { 238562306a36Sopenharmony_ci { .compatible = "ti,j721e-sa2ul", .data = &am654_match_data, }, 238662306a36Sopenharmony_ci { .compatible = "ti,am654-sa2ul", .data = &am654_match_data, }, 238762306a36Sopenharmony_ci { .compatible = "ti,am64-sa2ul", .data = &am64_match_data, }, 238862306a36Sopenharmony_ci { .compatible = "ti,am62-sa3ul", .data = &am64_match_data, }, 238962306a36Sopenharmony_ci {}, 239062306a36Sopenharmony_ci}; 239162306a36Sopenharmony_ciMODULE_DEVICE_TABLE(of, of_match); 239262306a36Sopenharmony_ci 239362306a36Sopenharmony_cistatic int sa_ul_probe(struct platform_device *pdev) 239462306a36Sopenharmony_ci{ 239562306a36Sopenharmony_ci struct device *dev = &pdev->dev; 239662306a36Sopenharmony_ci struct device_node *node = dev->of_node; 239762306a36Sopenharmony_ci static void __iomem *saul_base; 239862306a36Sopenharmony_ci struct sa_crypto_data *dev_data; 239962306a36Sopenharmony_ci u32 status, val; 240062306a36Sopenharmony_ci int ret; 240162306a36Sopenharmony_ci 240262306a36Sopenharmony_ci dev_data = devm_kzalloc(dev, sizeof(*dev_data), GFP_KERNEL); 240362306a36Sopenharmony_ci if (!dev_data) 240462306a36Sopenharmony_ci return -ENOMEM; 240562306a36Sopenharmony_ci 240662306a36Sopenharmony_ci dev_data->match_data = of_device_get_match_data(dev); 240762306a36Sopenharmony_ci if (!dev_data->match_data) 240862306a36Sopenharmony_ci return -ENODEV; 240962306a36Sopenharmony_ci 241062306a36Sopenharmony_ci saul_base = devm_platform_ioremap_resource(pdev, 0); 241162306a36Sopenharmony_ci if (IS_ERR(saul_base)) 241262306a36Sopenharmony_ci return PTR_ERR(saul_base); 241362306a36Sopenharmony_ci 241462306a36Sopenharmony_ci sa_k3_dev = dev; 241562306a36Sopenharmony_ci dev_data->dev = dev; 241662306a36Sopenharmony_ci dev_data->pdev = pdev; 241762306a36Sopenharmony_ci dev_data->base = saul_base; 241862306a36Sopenharmony_ci platform_set_drvdata(pdev, dev_data); 241962306a36Sopenharmony_ci dev_set_drvdata(sa_k3_dev, dev_data); 242062306a36Sopenharmony_ci 242162306a36Sopenharmony_ci pm_runtime_enable(dev); 242262306a36Sopenharmony_ci ret = pm_runtime_resume_and_get(dev); 242362306a36Sopenharmony_ci if (ret < 0) { 242462306a36Sopenharmony_ci dev_err(dev, "%s: failed to get sync: %d\n", __func__, ret); 242562306a36Sopenharmony_ci pm_runtime_disable(dev); 242662306a36Sopenharmony_ci return ret; 242762306a36Sopenharmony_ci } 242862306a36Sopenharmony_ci 242962306a36Sopenharmony_ci sa_init_mem(dev_data); 243062306a36Sopenharmony_ci ret = sa_dma_init(dev_data); 243162306a36Sopenharmony_ci if (ret) 243262306a36Sopenharmony_ci goto destroy_dma_pool; 243362306a36Sopenharmony_ci 243462306a36Sopenharmony_ci spin_lock_init(&dev_data->scid_lock); 243562306a36Sopenharmony_ci 243662306a36Sopenharmony_ci val = SA_EEC_ENCSS_EN | SA_EEC_AUTHSS_EN | SA_EEC_CTXCACH_EN | 243762306a36Sopenharmony_ci SA_EEC_CPPI_PORT_IN_EN | SA_EEC_CPPI_PORT_OUT_EN | 243862306a36Sopenharmony_ci SA_EEC_TRNG_EN; 243962306a36Sopenharmony_ci status = readl_relaxed(saul_base + SA_ENGINE_STATUS); 244062306a36Sopenharmony_ci /* Only enable engines if all are not already enabled */ 244162306a36Sopenharmony_ci if (val & ~status) 244262306a36Sopenharmony_ci writel_relaxed(val, saul_base + SA_ENGINE_ENABLE_CONTROL); 244362306a36Sopenharmony_ci 244462306a36Sopenharmony_ci sa_register_algos(dev_data); 244562306a36Sopenharmony_ci 244662306a36Sopenharmony_ci ret = of_platform_populate(node, NULL, NULL, dev); 244762306a36Sopenharmony_ci if (ret) 244862306a36Sopenharmony_ci goto release_dma; 244962306a36Sopenharmony_ci 245062306a36Sopenharmony_ci device_for_each_child(dev, dev, sa_link_child); 245162306a36Sopenharmony_ci 245262306a36Sopenharmony_ci return 0; 245362306a36Sopenharmony_ci 245462306a36Sopenharmony_cirelease_dma: 245562306a36Sopenharmony_ci sa_unregister_algos(dev); 245662306a36Sopenharmony_ci 245762306a36Sopenharmony_ci dma_release_channel(dev_data->dma_rx2); 245862306a36Sopenharmony_ci dma_release_channel(dev_data->dma_rx1); 245962306a36Sopenharmony_ci dma_release_channel(dev_data->dma_tx); 246062306a36Sopenharmony_ci 246162306a36Sopenharmony_cidestroy_dma_pool: 246262306a36Sopenharmony_ci dma_pool_destroy(dev_data->sc_pool); 246362306a36Sopenharmony_ci 246462306a36Sopenharmony_ci pm_runtime_put_sync(dev); 246562306a36Sopenharmony_ci pm_runtime_disable(dev); 246662306a36Sopenharmony_ci 246762306a36Sopenharmony_ci return ret; 246862306a36Sopenharmony_ci} 246962306a36Sopenharmony_ci 247062306a36Sopenharmony_cistatic int sa_ul_remove(struct platform_device *pdev) 247162306a36Sopenharmony_ci{ 247262306a36Sopenharmony_ci struct sa_crypto_data *dev_data = platform_get_drvdata(pdev); 247362306a36Sopenharmony_ci 247462306a36Sopenharmony_ci of_platform_depopulate(&pdev->dev); 247562306a36Sopenharmony_ci 247662306a36Sopenharmony_ci sa_unregister_algos(&pdev->dev); 247762306a36Sopenharmony_ci 247862306a36Sopenharmony_ci dma_release_channel(dev_data->dma_rx2); 247962306a36Sopenharmony_ci dma_release_channel(dev_data->dma_rx1); 248062306a36Sopenharmony_ci dma_release_channel(dev_data->dma_tx); 248162306a36Sopenharmony_ci 248262306a36Sopenharmony_ci dma_pool_destroy(dev_data->sc_pool); 248362306a36Sopenharmony_ci 248462306a36Sopenharmony_ci platform_set_drvdata(pdev, NULL); 248562306a36Sopenharmony_ci 248662306a36Sopenharmony_ci pm_runtime_put_sync(&pdev->dev); 248762306a36Sopenharmony_ci pm_runtime_disable(&pdev->dev); 248862306a36Sopenharmony_ci 248962306a36Sopenharmony_ci return 0; 249062306a36Sopenharmony_ci} 249162306a36Sopenharmony_ci 249262306a36Sopenharmony_cistatic struct platform_driver sa_ul_driver = { 249362306a36Sopenharmony_ci .probe = sa_ul_probe, 249462306a36Sopenharmony_ci .remove = sa_ul_remove, 249562306a36Sopenharmony_ci .driver = { 249662306a36Sopenharmony_ci .name = "saul-crypto", 249762306a36Sopenharmony_ci .of_match_table = of_match, 249862306a36Sopenharmony_ci }, 249962306a36Sopenharmony_ci}; 250062306a36Sopenharmony_cimodule_platform_driver(sa_ul_driver); 250162306a36Sopenharmony_ciMODULE_LICENSE("GPL v2"); 2502