diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2012-05-23 18:59:10 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2012-05-23 18:59:10 -0400 |
commit | 0bd3fbd4abeafa19ae0302d25194468b022d1a56 (patch) | |
tree | 1fc34b25666c97b85dfb7199e48b2e074ffde264 | |
parent | 0b87da68a0f0a7bf7f7446cf64f92e672bd68ef8 (diff) | |
parent | ef45b834319f8a18f257a40ba4bce6b829ef1708 (diff) |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Pull crypto updates from Herbert Xu:
- New cipher/hash driver for ARM ux500.
- Code clean-up for aesni-intel.
- Misc fixes.
Fixed up conflicts in arch/arm/mach-ux500/devices-common.h, where quite
frankly some of it made no sense at all (the pull brought in a
declaration for the dbx500_add_platform_device_noirq() function, which
neither exists nor is used anywhere).
Also some trivial add-add context conflicts in the Kconfig file in
drivers/{char/hw_random,crypto}/
* git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6:
crypto: aesni-intel - move more common code to ablk_init_common
crypto: aesni-intel - use crypto_[un]register_algs
crypto: ux500 - Cleanup hardware identification
crypto: ux500 - Update DMA handling for 3.4
mach-ux500: crypto - core support for CRYP/HASH module.
crypto: ux500 - Add driver for HASH hardware
crypto: ux500 - Add driver for CRYP hardware
hwrng: Kconfig - modify default state for atmel-rng driver
hwrng: omap - use devm_request_and_ioremap
crypto: crypto4xx - move up err_request_irq label
crypto, xor: Sanitize checksumming function selection output
crypto: caam - add backward compatible string sec4.0
30 files changed, 5777 insertions, 511 deletions
diff --git a/arch/arm/mach-ux500/board-mop500.c b/arch/arm/mach-ux500/board-mop500.c index 4bc0cbc5f071..f943687acaf0 100644 --- a/arch/arm/mach-ux500/board-mop500.c +++ b/arch/arm/mach-ux500/board-mop500.c | |||
@@ -47,6 +47,7 @@ | |||
47 | #include <mach/setup.h> | 47 | #include <mach/setup.h> |
48 | #include <mach/devices.h> | 48 | #include <mach/devices.h> |
49 | #include <mach/irqs.h> | 49 | #include <mach/irqs.h> |
50 | #include <mach/crypto-ux500.h> | ||
50 | 51 | ||
51 | #include "ste-dma40-db8500.h" | 52 | #include "ste-dma40-db8500.h" |
52 | #include "devices-db8500.h" | 53 | #include "devices-db8500.h" |
@@ -417,6 +418,45 @@ static void mop500_prox_deactivate(struct device *dev) | |||
417 | regulator_put(prox_regulator); | 418 | regulator_put(prox_regulator); |
418 | } | 419 | } |
419 | 420 | ||
421 | static struct cryp_platform_data u8500_cryp1_platform_data = { | ||
422 | .mem_to_engine = { | ||
423 | .dir = STEDMA40_MEM_TO_PERIPH, | ||
424 | .src_dev_type = STEDMA40_DEV_SRC_MEMORY, | ||
425 | .dst_dev_type = DB8500_DMA_DEV48_CAC1_TX, | ||
426 | .src_info.data_width = STEDMA40_WORD_WIDTH, | ||
427 | .dst_info.data_width = STEDMA40_WORD_WIDTH, | ||
428 | .mode = STEDMA40_MODE_LOGICAL, | ||
429 | .src_info.psize = STEDMA40_PSIZE_LOG_4, | ||
430 | .dst_info.psize = STEDMA40_PSIZE_LOG_4, | ||
431 | }, | ||
432 | .engine_to_mem = { | ||
433 | .dir = STEDMA40_PERIPH_TO_MEM, | ||
434 | .src_dev_type = DB8500_DMA_DEV48_CAC1_RX, | ||
435 | .dst_dev_type = STEDMA40_DEV_DST_MEMORY, | ||
436 | .src_info.data_width = STEDMA40_WORD_WIDTH, | ||
437 | .dst_info.data_width = STEDMA40_WORD_WIDTH, | ||
438 | .mode = STEDMA40_MODE_LOGICAL, | ||
439 | .src_info.psize = STEDMA40_PSIZE_LOG_4, | ||
440 | .dst_info.psize = STEDMA40_PSIZE_LOG_4, | ||
441 | } | ||
442 | }; | ||
443 | |||
444 | static struct stedma40_chan_cfg u8500_hash_dma_cfg_tx = { | ||
445 | .dir = STEDMA40_MEM_TO_PERIPH, | ||
446 | .src_dev_type = STEDMA40_DEV_SRC_MEMORY, | ||
447 | .dst_dev_type = DB8500_DMA_DEV50_HAC1_TX, | ||
448 | .src_info.data_width = STEDMA40_WORD_WIDTH, | ||
449 | .dst_info.data_width = STEDMA40_WORD_WIDTH, | ||
450 | .mode = STEDMA40_MODE_LOGICAL, | ||
451 | .src_info.psize = STEDMA40_PSIZE_LOG_16, | ||
452 | .dst_info.psize = STEDMA40_PSIZE_LOG_16, | ||
453 | }; | ||
454 | |||
455 | static struct hash_platform_data u8500_hash1_platform_data = { | ||
456 | .mem_to_engine = &u8500_hash_dma_cfg_tx, | ||
457 | .dma_filter = stedma40_filter, | ||
458 | }; | ||
459 | |||
420 | /* add any platform devices here - TODO */ | 460 | /* add any platform devices here - TODO */ |
421 | static struct platform_device *mop500_platform_devs[] __initdata = { | 461 | static struct platform_device *mop500_platform_devs[] __initdata = { |
422 | &mop500_gpio_keys_device, | 462 | &mop500_gpio_keys_device, |
@@ -624,6 +664,12 @@ static void __init mop500_uart_init(struct device *parent) | |||
624 | db8500_add_uart2(parent, &uart2_plat); | 664 | db8500_add_uart2(parent, &uart2_plat); |
625 | } | 665 | } |
626 | 666 | ||
667 | static void __init u8500_cryp1_hash1_init(struct device *parent) | ||
668 | { | ||
669 | db8500_add_cryp1(parent, &u8500_cryp1_platform_data); | ||
670 | db8500_add_hash1(parent, &u8500_hash1_platform_data); | ||
671 | } | ||
672 | |||
627 | static struct platform_device *snowball_platform_devs[] __initdata = { | 673 | static struct platform_device *snowball_platform_devs[] __initdata = { |
628 | &snowball_led_dev, | 674 | &snowball_led_dev, |
629 | &snowball_key_dev, | 675 | &snowball_key_dev, |
@@ -654,6 +700,8 @@ static void __init mop500_init_machine(void) | |||
654 | mop500_msp_init(parent); | 700 | mop500_msp_init(parent); |
655 | mop500_uart_init(parent); | 701 | mop500_uart_init(parent); |
656 | 702 | ||
703 | u8500_cryp1_hash1_init(parent); | ||
704 | |||
657 | i2c0_devs = ARRAY_SIZE(mop500_i2c0_devices); | 705 | i2c0_devs = ARRAY_SIZE(mop500_i2c0_devices); |
658 | 706 | ||
659 | i2c_register_board_info(0, mop500_i2c0_devices, i2c0_devs); | 707 | i2c_register_board_info(0, mop500_i2c0_devices, i2c0_devs); |
diff --git a/arch/arm/mach-ux500/clock.c b/arch/arm/mach-ux500/clock.c index a121cb472dd6..1762c4728f1e 100644 --- a/arch/arm/mach-ux500/clock.c +++ b/arch/arm/mach-ux500/clock.c | |||
@@ -381,14 +381,15 @@ static DEFINE_PRCC_CLK(5, usb, 0, 0, NULL); | |||
381 | /* Peripheral Cluster #6 */ | 381 | /* Peripheral Cluster #6 */ |
382 | 382 | ||
383 | /* MTU ID in data */ | 383 | /* MTU ID in data */ |
384 | static DEFINE_PRCC_CLK_CUSTOM(6, mtu1, 8, -1, NULL, clk_mtu_get_rate, 1); | 384 | static DEFINE_PRCC_CLK_CUSTOM(6, mtu1, 9, -1, NULL, clk_mtu_get_rate, 1); |
385 | static DEFINE_PRCC_CLK_CUSTOM(6, mtu0, 7, -1, NULL, clk_mtu_get_rate, 0); | 385 | static DEFINE_PRCC_CLK_CUSTOM(6, mtu0, 8, -1, NULL, clk_mtu_get_rate, 0); |
386 | static DEFINE_PRCC_CLK(6, cfgreg, 6, 6, NULL); | 386 | static DEFINE_PRCC_CLK(6, cfgreg, 7, 7, NULL); |
387 | static DEFINE_PRCC_CLK(6, hash1, 5, -1, NULL); | 387 | static DEFINE_PRCC_CLK(6, hash1, 6, -1, NULL); |
388 | static DEFINE_PRCC_CLK(6, unipro, 4, 1, &clk_uniproclk); | 388 | static DEFINE_PRCC_CLK(6, unipro, 5, 1, &clk_uniproclk); |
389 | static DEFINE_PRCC_CLK(6, pka, 3, -1, NULL); | 389 | static DEFINE_PRCC_CLK(6, pka, 4, -1, NULL); |
390 | static DEFINE_PRCC_CLK(6, hash0, 2, -1, NULL); | 390 | static DEFINE_PRCC_CLK(6, hash0, 3, -1, NULL); |
391 | static DEFINE_PRCC_CLK(6, cryp0, 1, -1, NULL); | 391 | static DEFINE_PRCC_CLK(6, cryp0, 2, -1, NULL); |
392 | static DEFINE_PRCC_CLK(6, cryp1, 1, -1, NULL); | ||
392 | static DEFINE_PRCC_CLK(6, rng, 0, 0, &clk_rngclk); | 393 | static DEFINE_PRCC_CLK(6, rng, 0, 0, &clk_rngclk); |
393 | 394 | ||
394 | static struct clk clk_dummy_apb_pclk = { | 395 | static struct clk clk_dummy_apb_pclk = { |
@@ -430,6 +431,7 @@ static struct clk_lookup u8500_clks[] = { | |||
430 | CLK(pka, "pka", NULL), | 431 | CLK(pka, "pka", NULL), |
431 | CLK(hash0, "hash0", NULL), | 432 | CLK(hash0, "hash0", NULL), |
432 | CLK(cryp0, "cryp0", NULL), | 433 | CLK(cryp0, "cryp0", NULL), |
434 | CLK(cryp1, "cryp1", NULL), | ||
433 | 435 | ||
434 | /* PRCMU level clock gating */ | 436 | /* PRCMU level clock gating */ |
435 | 437 | ||
diff --git a/arch/arm/mach-ux500/devices-common.h b/arch/arm/mach-ux500/devices-common.h index 7cbccfd9e158..6e4706560266 100644 --- a/arch/arm/mach-ux500/devices-common.h +++ b/arch/arm/mach-ux500/devices-common.h | |||
@@ -13,6 +13,7 @@ | |||
13 | #include <linux/sys_soc.h> | 13 | #include <linux/sys_soc.h> |
14 | #include <linux/amba/bus.h> | 14 | #include <linux/amba/bus.h> |
15 | #include <plat/i2c.h> | 15 | #include <plat/i2c.h> |
16 | #include <mach/crypto-ux500.h> | ||
16 | 17 | ||
17 | struct spi_master_cntlr; | 18 | struct spi_master_cntlr; |
18 | 19 | ||
@@ -85,6 +86,55 @@ dbx500_add_rtc(struct device *parent, resource_size_t base, int irq) | |||
85 | 0, NULL, 0); | 86 | 0, NULL, 0); |
86 | } | 87 | } |
87 | 88 | ||
89 | struct cryp_platform_data; | ||
90 | |||
91 | static inline struct platform_device * | ||
92 | dbx500_add_cryp1(struct device *parent, int id, resource_size_t base, int irq, | ||
93 | struct cryp_platform_data *pdata) | ||
94 | { | ||
95 | struct resource res[] = { | ||
96 | DEFINE_RES_MEM(base, SZ_4K), | ||
97 | DEFINE_RES_IRQ(irq), | ||
98 | }; | ||
99 | |||
100 | struct platform_device_info pdevinfo = { | ||
101 | .parent = parent, | ||
102 | .name = "cryp1", | ||
103 | .id = id, | ||
104 | .res = res, | ||
105 | .num_res = ARRAY_SIZE(res), | ||
106 | .data = pdata, | ||
107 | .size_data = sizeof(*pdata), | ||
108 | .dma_mask = DMA_BIT_MASK(32), | ||
109 | }; | ||
110 | |||
111 | return platform_device_register_full(&pdevinfo); | ||
112 | } | ||
113 | |||
114 | struct hash_platform_data; | ||
115 | |||
116 | static inline struct platform_device * | ||
117 | dbx500_add_hash1(struct device *parent, int id, resource_size_t base, | ||
118 | struct hash_platform_data *pdata) | ||
119 | { | ||
120 | struct resource res[] = { | ||
121 | DEFINE_RES_MEM(base, SZ_4K), | ||
122 | }; | ||
123 | |||
124 | struct platform_device_info pdevinfo = { | ||
125 | .parent = parent, | ||
126 | .name = "hash1", | ||
127 | .id = id, | ||
128 | .res = res, | ||
129 | .num_res = ARRAY_SIZE(res), | ||
130 | .data = pdata, | ||
131 | .size_data = sizeof(*pdata), | ||
132 | .dma_mask = DMA_BIT_MASK(32), | ||
133 | }; | ||
134 | |||
135 | return platform_device_register_full(&pdevinfo); | ||
136 | } | ||
137 | |||
88 | struct nmk_gpio_platform_data; | 138 | struct nmk_gpio_platform_data; |
89 | 139 | ||
90 | void dbx500_add_gpios(struct device *parent, resource_size_t *base, int num, | 140 | void dbx500_add_gpios(struct device *parent, resource_size_t *base, int num, |
diff --git a/arch/arm/mach-ux500/devices-db8500.c b/arch/arm/mach-ux500/devices-db8500.c index 6e66d3777ed5..91754a8a0d49 100644 --- a/arch/arm/mach-ux500/devices-db8500.c +++ b/arch/arm/mach-ux500/devices-db8500.c | |||
@@ -104,6 +104,8 @@ static const dma_addr_t dma40_tx_map[DB8500_DMA_NR_DEV] = { | |||
104 | [DB8500_DMA_DEV14_MSP2_TX] = U8500_MSP2_BASE + MSP_TX_RX_REG_OFFSET, | 104 | [DB8500_DMA_DEV14_MSP2_TX] = U8500_MSP2_BASE + MSP_TX_RX_REG_OFFSET, |
105 | [DB8500_DMA_DEV30_MSP1_TX] = U8500_MSP1_BASE + MSP_TX_RX_REG_OFFSET, | 105 | [DB8500_DMA_DEV30_MSP1_TX] = U8500_MSP1_BASE + MSP_TX_RX_REG_OFFSET, |
106 | [DB8500_DMA_DEV31_MSP0_TX_SLIM0_CH0_TX] = U8500_MSP0_BASE + MSP_TX_RX_REG_OFFSET, | 106 | [DB8500_DMA_DEV31_MSP0_TX_SLIM0_CH0_TX] = U8500_MSP0_BASE + MSP_TX_RX_REG_OFFSET, |
107 | [DB8500_DMA_DEV48_CAC1_TX] = U8500_CRYP1_BASE + CRYP1_TX_REG_OFFSET, | ||
108 | [DB8500_DMA_DEV50_HAC1_TX] = U8500_HASH1_BASE + HASH1_TX_REG_OFFSET, | ||
107 | }; | 109 | }; |
108 | 110 | ||
109 | /* Mapping between source event lines and physical device address */ | 111 | /* Mapping between source event lines and physical device address */ |
@@ -139,6 +141,7 @@ static const dma_addr_t dma40_rx_map[DB8500_DMA_NR_DEV] = { | |||
139 | [DB8500_DMA_DEV14_MSP2_RX] = U8500_MSP2_BASE + MSP_TX_RX_REG_OFFSET, | 141 | [DB8500_DMA_DEV14_MSP2_RX] = U8500_MSP2_BASE + MSP_TX_RX_REG_OFFSET, |
140 | [DB8500_DMA_DEV30_MSP3_RX] = U8500_MSP3_BASE + MSP_TX_RX_REG_OFFSET, | 142 | [DB8500_DMA_DEV30_MSP3_RX] = U8500_MSP3_BASE + MSP_TX_RX_REG_OFFSET, |
141 | [DB8500_DMA_DEV31_MSP0_RX_SLIM0_CH0_RX] = U8500_MSP0_BASE + MSP_TX_RX_REG_OFFSET, | 143 | [DB8500_DMA_DEV31_MSP0_RX_SLIM0_CH0_RX] = U8500_MSP0_BASE + MSP_TX_RX_REG_OFFSET, |
144 | [DB8500_DMA_DEV48_CAC1_RX] = U8500_CRYP1_BASE + CRYP1_RX_REG_OFFSET, | ||
142 | }; | 145 | }; |
143 | 146 | ||
144 | /* Reserved event lines for memcpy only */ | 147 | /* Reserved event lines for memcpy only */ |
diff --git a/arch/arm/mach-ux500/devices-db8500.h b/arch/arm/mach-ux500/devices-db8500.h index 0b9677a95bbc..3c8010f4fb3f 100644 --- a/arch/arm/mach-ux500/devices-db8500.h +++ b/arch/arm/mach-ux500/devices-db8500.h | |||
@@ -114,4 +114,8 @@ db8500_add_ssp(struct device *parent, const char *name, resource_size_t base, | |||
114 | dbx500_add_uart(parent, "uart2", U8500_UART2_BASE, \ | 114 | dbx500_add_uart(parent, "uart2", U8500_UART2_BASE, \ |
115 | IRQ_DB8500_UART2, pdata) | 115 | IRQ_DB8500_UART2, pdata) |
116 | 116 | ||
117 | #define db8500_add_cryp1(parent, pdata) \ | ||
118 | dbx500_add_cryp1(parent, -1, U8500_CRYP1_BASE, IRQ_DB8500_CRYP1, pdata) | ||
119 | #define db8500_add_hash1(parent, pdata) \ | ||
120 | dbx500_add_hash1(parent, -1, U8500_HASH1_BASE, pdata) | ||
117 | #endif | 121 | #endif |
diff --git a/arch/arm/mach-ux500/include/mach/crypto-ux500.h b/arch/arm/mach-ux500/include/mach/crypto-ux500.h new file mode 100644 index 000000000000..5b2d0817e26a --- /dev/null +++ b/arch/arm/mach-ux500/include/mach/crypto-ux500.h | |||
@@ -0,0 +1,22 @@ | |||
1 | /* | ||
2 | * Copyright (C) ST-Ericsson SA 2011 | ||
3 | * | ||
4 | * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson | ||
5 | * License terms: GNU General Public License (GPL) version 2 | ||
6 | */ | ||
7 | #ifndef _CRYPTO_UX500_H | ||
8 | #define _CRYPTO_UX500_H | ||
9 | #include <linux/dmaengine.h> | ||
10 | #include <plat/ste_dma40.h> | ||
11 | |||
12 | struct hash_platform_data { | ||
13 | void *mem_to_engine; | ||
14 | bool (*dma_filter)(struct dma_chan *chan, void *filter_param); | ||
15 | }; | ||
16 | |||
17 | struct cryp_platform_data { | ||
18 | struct stedma40_chan_cfg mem_to_engine; | ||
19 | struct stedma40_chan_cfg engine_to_mem; | ||
20 | }; | ||
21 | |||
22 | #endif | ||
diff --git a/arch/arm/mach-ux500/include/mach/devices.h b/arch/arm/mach-ux500/include/mach/devices.h index 9b5eb69a0154..cbc6f1e4104d 100644 --- a/arch/arm/mach-ux500/include/mach/devices.h +++ b/arch/arm/mach-ux500/include/mach/devices.h | |||
@@ -14,6 +14,9 @@ extern struct platform_device u8500_gpio_devs[]; | |||
14 | 14 | ||
15 | extern struct amba_device ux500_pl031_device; | 15 | extern struct amba_device ux500_pl031_device; |
16 | 16 | ||
17 | extern struct platform_device ux500_hash1_device; | ||
18 | extern struct platform_device ux500_cryp1_device; | ||
19 | |||
17 | extern struct platform_device u8500_dma40_device; | 20 | extern struct platform_device u8500_dma40_device; |
18 | extern struct platform_device ux500_ske_keypad_device; | 21 | extern struct platform_device ux500_ske_keypad_device; |
19 | 22 | ||
diff --git a/arch/arm/mach-ux500/include/mach/hardware.h b/arch/arm/mach-ux500/include/mach/hardware.h index 808c1d6601c5..28d16e744bfd 100644 --- a/arch/arm/mach-ux500/include/mach/hardware.h +++ b/arch/arm/mach-ux500/include/mach/hardware.h | |||
@@ -33,6 +33,9 @@ | |||
33 | #include <mach/db8500-regs.h> | 33 | #include <mach/db8500-regs.h> |
34 | 34 | ||
35 | #define MSP_TX_RX_REG_OFFSET 0 | 35 | #define MSP_TX_RX_REG_OFFSET 0 |
36 | #define CRYP1_RX_REG_OFFSET 0x10 | ||
37 | #define CRYP1_TX_REG_OFFSET 0x8 | ||
38 | #define HASH1_TX_REG_OFFSET 0x4 | ||
36 | 39 | ||
37 | #ifndef __ASSEMBLY__ | 40 | #ifndef __ASSEMBLY__ |
38 | 41 | ||
diff --git a/arch/x86/crypto/aesni-intel_glue.c b/arch/x86/crypto/aesni-intel_glue.c index c799352e24fc..ac7f5cd019e8 100644 --- a/arch/x86/crypto/aesni-intel_glue.c +++ b/arch/x86/crypto/aesni-intel_glue.c | |||
@@ -222,27 +222,6 @@ static void aes_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) | |||
222 | } | 222 | } |
223 | } | 223 | } |
224 | 224 | ||
225 | static struct crypto_alg aesni_alg = { | ||
226 | .cra_name = "aes", | ||
227 | .cra_driver_name = "aes-aesni", | ||
228 | .cra_priority = 300, | ||
229 | .cra_flags = CRYPTO_ALG_TYPE_CIPHER, | ||
230 | .cra_blocksize = AES_BLOCK_SIZE, | ||
231 | .cra_ctxsize = sizeof(struct crypto_aes_ctx)+AESNI_ALIGN-1, | ||
232 | .cra_alignmask = 0, | ||
233 | .cra_module = THIS_MODULE, | ||
234 | .cra_list = LIST_HEAD_INIT(aesni_alg.cra_list), | ||
235 | .cra_u = { | ||
236 | .cipher = { | ||
237 | .cia_min_keysize = AES_MIN_KEY_SIZE, | ||
238 | .cia_max_keysize = AES_MAX_KEY_SIZE, | ||
239 | .cia_setkey = aes_set_key, | ||
240 | .cia_encrypt = aes_encrypt, | ||
241 | .cia_decrypt = aes_decrypt | ||
242 | } | ||
243 | } | ||
244 | }; | ||
245 | |||
246 | static void __aes_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) | 225 | static void __aes_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) |
247 | { | 226 | { |
248 | struct crypto_aes_ctx *ctx = aes_ctx(crypto_tfm_ctx(tfm)); | 227 | struct crypto_aes_ctx *ctx = aes_ctx(crypto_tfm_ctx(tfm)); |
@@ -257,27 +236,6 @@ static void __aes_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) | |||
257 | aesni_dec(ctx, dst, src); | 236 | aesni_dec(ctx, dst, src); |
258 | } | 237 | } |
259 | 238 | ||
260 | static struct crypto_alg __aesni_alg = { | ||
261 | .cra_name = "__aes-aesni", | ||
262 | .cra_driver_name = "__driver-aes-aesni", | ||
263 | .cra_priority = 0, | ||
264 | .cra_flags = CRYPTO_ALG_TYPE_CIPHER, | ||
265 | .cra_blocksize = AES_BLOCK_SIZE, | ||
266 | .cra_ctxsize = sizeof(struct crypto_aes_ctx)+AESNI_ALIGN-1, | ||
267 | .cra_alignmask = 0, | ||
268 | .cra_module = THIS_MODULE, | ||
269 | .cra_list = LIST_HEAD_INIT(__aesni_alg.cra_list), | ||
270 | .cra_u = { | ||
271 | .cipher = { | ||
272 | .cia_min_keysize = AES_MIN_KEY_SIZE, | ||
273 | .cia_max_keysize = AES_MAX_KEY_SIZE, | ||
274 | .cia_setkey = aes_set_key, | ||
275 | .cia_encrypt = __aes_encrypt, | ||
276 | .cia_decrypt = __aes_decrypt | ||
277 | } | ||
278 | } | ||
279 | }; | ||
280 | |||
281 | static int ecb_encrypt(struct blkcipher_desc *desc, | 239 | static int ecb_encrypt(struct blkcipher_desc *desc, |
282 | struct scatterlist *dst, struct scatterlist *src, | 240 | struct scatterlist *dst, struct scatterlist *src, |
283 | unsigned int nbytes) | 241 | unsigned int nbytes) |
@@ -326,28 +284,6 @@ static int ecb_decrypt(struct blkcipher_desc *desc, | |||
326 | return err; | 284 | return err; |
327 | } | 285 | } |
328 | 286 | ||
329 | static struct crypto_alg blk_ecb_alg = { | ||
330 | .cra_name = "__ecb-aes-aesni", | ||
331 | .cra_driver_name = "__driver-ecb-aes-aesni", | ||
332 | .cra_priority = 0, | ||
333 | .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, | ||
334 | .cra_blocksize = AES_BLOCK_SIZE, | ||
335 | .cra_ctxsize = sizeof(struct crypto_aes_ctx)+AESNI_ALIGN-1, | ||
336 | .cra_alignmask = 0, | ||
337 | .cra_type = &crypto_blkcipher_type, | ||
338 | .cra_module = THIS_MODULE, | ||
339 | .cra_list = LIST_HEAD_INIT(blk_ecb_alg.cra_list), | ||
340 | .cra_u = { | ||
341 | .blkcipher = { | ||
342 | .min_keysize = AES_MIN_KEY_SIZE, | ||
343 | .max_keysize = AES_MAX_KEY_SIZE, | ||
344 | .setkey = aes_set_key, | ||
345 | .encrypt = ecb_encrypt, | ||
346 | .decrypt = ecb_decrypt, | ||
347 | }, | ||
348 | }, | ||
349 | }; | ||
350 | |||
351 | static int cbc_encrypt(struct blkcipher_desc *desc, | 287 | static int cbc_encrypt(struct blkcipher_desc *desc, |
352 | struct scatterlist *dst, struct scatterlist *src, | 288 | struct scatterlist *dst, struct scatterlist *src, |
353 | unsigned int nbytes) | 289 | unsigned int nbytes) |
@@ -396,28 +332,6 @@ static int cbc_decrypt(struct blkcipher_desc *desc, | |||
396 | return err; | 332 | return err; |
397 | } | 333 | } |
398 | 334 | ||
399 | static struct crypto_alg blk_cbc_alg = { | ||
400 | .cra_name = "__cbc-aes-aesni", | ||
401 | .cra_driver_name = "__driver-cbc-aes-aesni", | ||
402 | .cra_priority = 0, | ||
403 | .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, | ||
404 | .cra_blocksize = AES_BLOCK_SIZE, | ||
405 | .cra_ctxsize = sizeof(struct crypto_aes_ctx)+AESNI_ALIGN-1, | ||
406 | .cra_alignmask = 0, | ||
407 | .cra_type = &crypto_blkcipher_type, | ||
408 | .cra_module = THIS_MODULE, | ||
409 | .cra_list = LIST_HEAD_INIT(blk_cbc_alg.cra_list), | ||
410 | .cra_u = { | ||
411 | .blkcipher = { | ||
412 | .min_keysize = AES_MIN_KEY_SIZE, | ||
413 | .max_keysize = AES_MAX_KEY_SIZE, | ||
414 | .setkey = aes_set_key, | ||
415 | .encrypt = cbc_encrypt, | ||
416 | .decrypt = cbc_decrypt, | ||
417 | }, | ||
418 | }, | ||
419 | }; | ||
420 | |||
421 | #ifdef CONFIG_X86_64 | 335 | #ifdef CONFIG_X86_64 |
422 | static void ctr_crypt_final(struct crypto_aes_ctx *ctx, | 336 | static void ctr_crypt_final(struct crypto_aes_ctx *ctx, |
423 | struct blkcipher_walk *walk) | 337 | struct blkcipher_walk *walk) |
@@ -461,29 +375,6 @@ static int ctr_crypt(struct blkcipher_desc *desc, | |||
461 | 375 | ||
462 | return err; | 376 | return err; |
463 | } | 377 | } |
464 | |||
465 | static struct crypto_alg blk_ctr_alg = { | ||
466 | .cra_name = "__ctr-aes-aesni", | ||
467 | .cra_driver_name = "__driver-ctr-aes-aesni", | ||
468 | .cra_priority = 0, | ||
469 | .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, | ||
470 | .cra_blocksize = 1, | ||
471 | .cra_ctxsize = sizeof(struct crypto_aes_ctx)+AESNI_ALIGN-1, | ||
472 | .cra_alignmask = 0, | ||
473 | .cra_type = &crypto_blkcipher_type, | ||
474 | .cra_module = THIS_MODULE, | ||
475 | .cra_list = LIST_HEAD_INIT(blk_ctr_alg.cra_list), | ||
476 | .cra_u = { | ||
477 | .blkcipher = { | ||
478 | .min_keysize = AES_MIN_KEY_SIZE, | ||
479 | .max_keysize = AES_MAX_KEY_SIZE, | ||
480 | .ivsize = AES_BLOCK_SIZE, | ||
481 | .setkey = aes_set_key, | ||
482 | .encrypt = ctr_crypt, | ||
483 | .decrypt = ctr_crypt, | ||
484 | }, | ||
485 | }, | ||
486 | }; | ||
487 | #endif | 378 | #endif |
488 | 379 | ||
489 | static int ablk_set_key(struct crypto_ablkcipher *tfm, const u8 *key, | 380 | static int ablk_set_key(struct crypto_ablkcipher *tfm, const u8 *key, |
@@ -551,281 +442,65 @@ static void ablk_exit(struct crypto_tfm *tfm) | |||
551 | cryptd_free_ablkcipher(ctx->cryptd_tfm); | 442 | cryptd_free_ablkcipher(ctx->cryptd_tfm); |
552 | } | 443 | } |
553 | 444 | ||
554 | static void ablk_init_common(struct crypto_tfm *tfm, | 445 | static int ablk_init_common(struct crypto_tfm *tfm, const char *drv_name) |
555 | struct cryptd_ablkcipher *cryptd_tfm) | ||
556 | { | 446 | { |
557 | struct async_aes_ctx *ctx = crypto_tfm_ctx(tfm); | 447 | struct async_aes_ctx *ctx = crypto_tfm_ctx(tfm); |
448 | struct cryptd_ablkcipher *cryptd_tfm; | ||
449 | |||
450 | cryptd_tfm = cryptd_alloc_ablkcipher(drv_name, 0, 0); | ||
451 | if (IS_ERR(cryptd_tfm)) | ||
452 | return PTR_ERR(cryptd_tfm); | ||
558 | 453 | ||
559 | ctx->cryptd_tfm = cryptd_tfm; | 454 | ctx->cryptd_tfm = cryptd_tfm; |
560 | tfm->crt_ablkcipher.reqsize = sizeof(struct ablkcipher_request) + | 455 | tfm->crt_ablkcipher.reqsize = sizeof(struct ablkcipher_request) + |
561 | crypto_ablkcipher_reqsize(&cryptd_tfm->base); | 456 | crypto_ablkcipher_reqsize(&cryptd_tfm->base); |
457 | |||
458 | return 0; | ||
562 | } | 459 | } |
563 | 460 | ||
564 | static int ablk_ecb_init(struct crypto_tfm *tfm) | 461 | static int ablk_ecb_init(struct crypto_tfm *tfm) |
565 | { | 462 | { |
566 | struct cryptd_ablkcipher *cryptd_tfm; | 463 | return ablk_init_common(tfm, "__driver-ecb-aes-aesni"); |
567 | |||
568 | cryptd_tfm = cryptd_alloc_ablkcipher("__driver-ecb-aes-aesni", 0, 0); | ||
569 | if (IS_ERR(cryptd_tfm)) | ||
570 | return PTR_ERR(cryptd_tfm); | ||
571 | ablk_init_common(tfm, cryptd_tfm); | ||
572 | return 0; | ||
573 | } | 464 | } |
574 | 465 | ||
575 | static struct crypto_alg ablk_ecb_alg = { | ||
576 | .cra_name = "ecb(aes)", | ||
577 | .cra_driver_name = "ecb-aes-aesni", | ||
578 | .cra_priority = 400, | ||
579 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER|CRYPTO_ALG_ASYNC, | ||
580 | .cra_blocksize = AES_BLOCK_SIZE, | ||
581 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
582 | .cra_alignmask = 0, | ||
583 | .cra_type = &crypto_ablkcipher_type, | ||
584 | .cra_module = THIS_MODULE, | ||
585 | .cra_list = LIST_HEAD_INIT(ablk_ecb_alg.cra_list), | ||
586 | .cra_init = ablk_ecb_init, | ||
587 | .cra_exit = ablk_exit, | ||
588 | .cra_u = { | ||
589 | .ablkcipher = { | ||
590 | .min_keysize = AES_MIN_KEY_SIZE, | ||
591 | .max_keysize = AES_MAX_KEY_SIZE, | ||
592 | .setkey = ablk_set_key, | ||
593 | .encrypt = ablk_encrypt, | ||
594 | .decrypt = ablk_decrypt, | ||
595 | }, | ||
596 | }, | ||
597 | }; | ||
598 | |||
599 | static int ablk_cbc_init(struct crypto_tfm *tfm) | 466 | static int ablk_cbc_init(struct crypto_tfm *tfm) |
600 | { | 467 | { |
601 | struct cryptd_ablkcipher *cryptd_tfm; | 468 | return ablk_init_common(tfm, "__driver-cbc-aes-aesni"); |
602 | |||
603 | cryptd_tfm = cryptd_alloc_ablkcipher("__driver-cbc-aes-aesni", 0, 0); | ||
604 | if (IS_ERR(cryptd_tfm)) | ||
605 | return PTR_ERR(cryptd_tfm); | ||
606 | ablk_init_common(tfm, cryptd_tfm); | ||
607 | return 0; | ||
608 | } | 469 | } |
609 | 470 | ||
610 | static struct crypto_alg ablk_cbc_alg = { | ||
611 | .cra_name = "cbc(aes)", | ||
612 | .cra_driver_name = "cbc-aes-aesni", | ||
613 | .cra_priority = 400, | ||
614 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER|CRYPTO_ALG_ASYNC, | ||
615 | .cra_blocksize = AES_BLOCK_SIZE, | ||
616 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
617 | .cra_alignmask = 0, | ||
618 | .cra_type = &crypto_ablkcipher_type, | ||
619 | .cra_module = THIS_MODULE, | ||
620 | .cra_list = LIST_HEAD_INIT(ablk_cbc_alg.cra_list), | ||
621 | .cra_init = ablk_cbc_init, | ||
622 | .cra_exit = ablk_exit, | ||
623 | .cra_u = { | ||
624 | .ablkcipher = { | ||
625 | .min_keysize = AES_MIN_KEY_SIZE, | ||
626 | .max_keysize = AES_MAX_KEY_SIZE, | ||
627 | .ivsize = AES_BLOCK_SIZE, | ||
628 | .setkey = ablk_set_key, | ||
629 | .encrypt = ablk_encrypt, | ||
630 | .decrypt = ablk_decrypt, | ||
631 | }, | ||
632 | }, | ||
633 | }; | ||
634 | |||
635 | #ifdef CONFIG_X86_64 | 471 | #ifdef CONFIG_X86_64 |
636 | static int ablk_ctr_init(struct crypto_tfm *tfm) | 472 | static int ablk_ctr_init(struct crypto_tfm *tfm) |
637 | { | 473 | { |
638 | struct cryptd_ablkcipher *cryptd_tfm; | 474 | return ablk_init_common(tfm, "__driver-ctr-aes-aesni"); |
639 | |||
640 | cryptd_tfm = cryptd_alloc_ablkcipher("__driver-ctr-aes-aesni", 0, 0); | ||
641 | if (IS_ERR(cryptd_tfm)) | ||
642 | return PTR_ERR(cryptd_tfm); | ||
643 | ablk_init_common(tfm, cryptd_tfm); | ||
644 | return 0; | ||
645 | } | 475 | } |
646 | 476 | ||
647 | static struct crypto_alg ablk_ctr_alg = { | ||
648 | .cra_name = "ctr(aes)", | ||
649 | .cra_driver_name = "ctr-aes-aesni", | ||
650 | .cra_priority = 400, | ||
651 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER|CRYPTO_ALG_ASYNC, | ||
652 | .cra_blocksize = 1, | ||
653 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
654 | .cra_alignmask = 0, | ||
655 | .cra_type = &crypto_ablkcipher_type, | ||
656 | .cra_module = THIS_MODULE, | ||
657 | .cra_list = LIST_HEAD_INIT(ablk_ctr_alg.cra_list), | ||
658 | .cra_init = ablk_ctr_init, | ||
659 | .cra_exit = ablk_exit, | ||
660 | .cra_u = { | ||
661 | .ablkcipher = { | ||
662 | .min_keysize = AES_MIN_KEY_SIZE, | ||
663 | .max_keysize = AES_MAX_KEY_SIZE, | ||
664 | .ivsize = AES_BLOCK_SIZE, | ||
665 | .setkey = ablk_set_key, | ||
666 | .encrypt = ablk_encrypt, | ||
667 | .decrypt = ablk_encrypt, | ||
668 | .geniv = "chainiv", | ||
669 | }, | ||
670 | }, | ||
671 | }; | ||
672 | |||
673 | #ifdef HAS_CTR | 477 | #ifdef HAS_CTR |
674 | static int ablk_rfc3686_ctr_init(struct crypto_tfm *tfm) | 478 | static int ablk_rfc3686_ctr_init(struct crypto_tfm *tfm) |
675 | { | 479 | { |
676 | struct cryptd_ablkcipher *cryptd_tfm; | 480 | return ablk_init_common(tfm, "rfc3686(__driver-ctr-aes-aesni)"); |
677 | |||
678 | cryptd_tfm = cryptd_alloc_ablkcipher( | ||
679 | "rfc3686(__driver-ctr-aes-aesni)", 0, 0); | ||
680 | if (IS_ERR(cryptd_tfm)) | ||
681 | return PTR_ERR(cryptd_tfm); | ||
682 | ablk_init_common(tfm, cryptd_tfm); | ||
683 | return 0; | ||
684 | } | 481 | } |
685 | |||
686 | static struct crypto_alg ablk_rfc3686_ctr_alg = { | ||
687 | .cra_name = "rfc3686(ctr(aes))", | ||
688 | .cra_driver_name = "rfc3686-ctr-aes-aesni", | ||
689 | .cra_priority = 400, | ||
690 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER|CRYPTO_ALG_ASYNC, | ||
691 | .cra_blocksize = 1, | ||
692 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
693 | .cra_alignmask = 0, | ||
694 | .cra_type = &crypto_ablkcipher_type, | ||
695 | .cra_module = THIS_MODULE, | ||
696 | .cra_list = LIST_HEAD_INIT(ablk_rfc3686_ctr_alg.cra_list), | ||
697 | .cra_init = ablk_rfc3686_ctr_init, | ||
698 | .cra_exit = ablk_exit, | ||
699 | .cra_u = { | ||
700 | .ablkcipher = { | ||
701 | .min_keysize = AES_MIN_KEY_SIZE+CTR_RFC3686_NONCE_SIZE, | ||
702 | .max_keysize = AES_MAX_KEY_SIZE+CTR_RFC3686_NONCE_SIZE, | ||
703 | .ivsize = CTR_RFC3686_IV_SIZE, | ||
704 | .setkey = ablk_set_key, | ||
705 | .encrypt = ablk_encrypt, | ||
706 | .decrypt = ablk_decrypt, | ||
707 | .geniv = "seqiv", | ||
708 | }, | ||
709 | }, | ||
710 | }; | ||
711 | #endif | 482 | #endif |
712 | #endif | 483 | #endif |
713 | 484 | ||
714 | #ifdef HAS_LRW | 485 | #ifdef HAS_LRW |
715 | static int ablk_lrw_init(struct crypto_tfm *tfm) | 486 | static int ablk_lrw_init(struct crypto_tfm *tfm) |
716 | { | 487 | { |
717 | struct cryptd_ablkcipher *cryptd_tfm; | 488 | return ablk_init_common(tfm, "fpu(lrw(__driver-aes-aesni))"); |
718 | |||
719 | cryptd_tfm = cryptd_alloc_ablkcipher("fpu(lrw(__driver-aes-aesni))", | ||
720 | 0, 0); | ||
721 | if (IS_ERR(cryptd_tfm)) | ||
722 | return PTR_ERR(cryptd_tfm); | ||
723 | ablk_init_common(tfm, cryptd_tfm); | ||
724 | return 0; | ||
725 | } | 489 | } |
726 | |||
727 | static struct crypto_alg ablk_lrw_alg = { | ||
728 | .cra_name = "lrw(aes)", | ||
729 | .cra_driver_name = "lrw-aes-aesni", | ||
730 | .cra_priority = 400, | ||
731 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER|CRYPTO_ALG_ASYNC, | ||
732 | .cra_blocksize = AES_BLOCK_SIZE, | ||
733 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
734 | .cra_alignmask = 0, | ||
735 | .cra_type = &crypto_ablkcipher_type, | ||
736 | .cra_module = THIS_MODULE, | ||
737 | .cra_list = LIST_HEAD_INIT(ablk_lrw_alg.cra_list), | ||
738 | .cra_init = ablk_lrw_init, | ||
739 | .cra_exit = ablk_exit, | ||
740 | .cra_u = { | ||
741 | .ablkcipher = { | ||
742 | .min_keysize = AES_MIN_KEY_SIZE + AES_BLOCK_SIZE, | ||
743 | .max_keysize = AES_MAX_KEY_SIZE + AES_BLOCK_SIZE, | ||
744 | .ivsize = AES_BLOCK_SIZE, | ||
745 | .setkey = ablk_set_key, | ||
746 | .encrypt = ablk_encrypt, | ||
747 | .decrypt = ablk_decrypt, | ||
748 | }, | ||
749 | }, | ||
750 | }; | ||
751 | #endif | 490 | #endif |
752 | 491 | ||
753 | #ifdef HAS_PCBC | 492 | #ifdef HAS_PCBC |
754 | static int ablk_pcbc_init(struct crypto_tfm *tfm) | 493 | static int ablk_pcbc_init(struct crypto_tfm *tfm) |
755 | { | 494 | { |
756 | struct cryptd_ablkcipher *cryptd_tfm; | 495 | return ablk_init_common(tfm, "fpu(pcbc(__driver-aes-aesni))"); |
757 | |||
758 | cryptd_tfm = cryptd_alloc_ablkcipher("fpu(pcbc(__driver-aes-aesni))", | ||
759 | 0, 0); | ||
760 | if (IS_ERR(cryptd_tfm)) | ||
761 | return PTR_ERR(cryptd_tfm); | ||
762 | ablk_init_common(tfm, cryptd_tfm); | ||
763 | return 0; | ||
764 | } | 496 | } |
765 | |||
766 | static struct crypto_alg ablk_pcbc_alg = { | ||
767 | .cra_name = "pcbc(aes)", | ||
768 | .cra_driver_name = "pcbc-aes-aesni", | ||
769 | .cra_priority = 400, | ||
770 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER|CRYPTO_ALG_ASYNC, | ||
771 | .cra_blocksize = AES_BLOCK_SIZE, | ||
772 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
773 | .cra_alignmask = 0, | ||
774 | .cra_type = &crypto_ablkcipher_type, | ||
775 | .cra_module = THIS_MODULE, | ||
776 | .cra_list = LIST_HEAD_INIT(ablk_pcbc_alg.cra_list), | ||
777 | .cra_init = ablk_pcbc_init, | ||
778 | .cra_exit = ablk_exit, | ||
779 | .cra_u = { | ||
780 | .ablkcipher = { | ||
781 | .min_keysize = AES_MIN_KEY_SIZE, | ||
782 | .max_keysize = AES_MAX_KEY_SIZE, | ||
783 | .ivsize = AES_BLOCK_SIZE, | ||
784 | .setkey = ablk_set_key, | ||
785 | .encrypt = ablk_encrypt, | ||
786 | .decrypt = ablk_decrypt, | ||
787 | }, | ||
788 | }, | ||
789 | }; | ||
790 | #endif | 497 | #endif |
791 | 498 | ||
792 | #ifdef HAS_XTS | 499 | #ifdef HAS_XTS |
793 | static int ablk_xts_init(struct crypto_tfm *tfm) | 500 | static int ablk_xts_init(struct crypto_tfm *tfm) |
794 | { | 501 | { |
795 | struct cryptd_ablkcipher *cryptd_tfm; | 502 | return ablk_init_common(tfm, "fpu(xts(__driver-aes-aesni))"); |
796 | |||
797 | cryptd_tfm = cryptd_alloc_ablkcipher("fpu(xts(__driver-aes-aesni))", | ||
798 | 0, 0); | ||
799 | if (IS_ERR(cryptd_tfm)) | ||
800 | return PTR_ERR(cryptd_tfm); | ||
801 | ablk_init_common(tfm, cryptd_tfm); | ||
802 | return 0; | ||
803 | } | 503 | } |
804 | |||
805 | static struct crypto_alg ablk_xts_alg = { | ||
806 | .cra_name = "xts(aes)", | ||
807 | .cra_driver_name = "xts-aes-aesni", | ||
808 | .cra_priority = 400, | ||
809 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER|CRYPTO_ALG_ASYNC, | ||
810 | .cra_blocksize = AES_BLOCK_SIZE, | ||
811 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
812 | .cra_alignmask = 0, | ||
813 | .cra_type = &crypto_ablkcipher_type, | ||
814 | .cra_module = THIS_MODULE, | ||
815 | .cra_list = LIST_HEAD_INIT(ablk_xts_alg.cra_list), | ||
816 | .cra_init = ablk_xts_init, | ||
817 | .cra_exit = ablk_exit, | ||
818 | .cra_u = { | ||
819 | .ablkcipher = { | ||
820 | .min_keysize = 2 * AES_MIN_KEY_SIZE, | ||
821 | .max_keysize = 2 * AES_MAX_KEY_SIZE, | ||
822 | .ivsize = AES_BLOCK_SIZE, | ||
823 | .setkey = ablk_set_key, | ||
824 | .encrypt = ablk_encrypt, | ||
825 | .decrypt = ablk_decrypt, | ||
826 | }, | ||
827 | }, | ||
828 | }; | ||
829 | #endif | 504 | #endif |
830 | 505 | ||
831 | #ifdef CONFIG_X86_64 | 506 | #ifdef CONFIG_X86_64 |
@@ -1050,32 +725,6 @@ static int rfc4106_decrypt(struct aead_request *req) | |||
1050 | } | 725 | } |
1051 | } | 726 | } |
1052 | 727 | ||
1053 | static struct crypto_alg rfc4106_alg = { | ||
1054 | .cra_name = "rfc4106(gcm(aes))", | ||
1055 | .cra_driver_name = "rfc4106-gcm-aesni", | ||
1056 | .cra_priority = 400, | ||
1057 | .cra_flags = CRYPTO_ALG_TYPE_AEAD | CRYPTO_ALG_ASYNC, | ||
1058 | .cra_blocksize = 1, | ||
1059 | .cra_ctxsize = sizeof(struct aesni_rfc4106_gcm_ctx) + AESNI_ALIGN, | ||
1060 | .cra_alignmask = 0, | ||
1061 | .cra_type = &crypto_nivaead_type, | ||
1062 | .cra_module = THIS_MODULE, | ||
1063 | .cra_list = LIST_HEAD_INIT(rfc4106_alg.cra_list), | ||
1064 | .cra_init = rfc4106_init, | ||
1065 | .cra_exit = rfc4106_exit, | ||
1066 | .cra_u = { | ||
1067 | .aead = { | ||
1068 | .setkey = rfc4106_set_key, | ||
1069 | .setauthsize = rfc4106_set_authsize, | ||
1070 | .encrypt = rfc4106_encrypt, | ||
1071 | .decrypt = rfc4106_decrypt, | ||
1072 | .geniv = "seqiv", | ||
1073 | .ivsize = 8, | ||
1074 | .maxauthsize = 16, | ||
1075 | }, | ||
1076 | }, | ||
1077 | }; | ||
1078 | |||
1079 | static int __driver_rfc4106_encrypt(struct aead_request *req) | 728 | static int __driver_rfc4106_encrypt(struct aead_request *req) |
1080 | { | 729 | { |
1081 | u8 one_entry_in_sg = 0; | 730 | u8 one_entry_in_sg = 0; |
@@ -1233,26 +882,316 @@ static int __driver_rfc4106_decrypt(struct aead_request *req) | |||
1233 | } | 882 | } |
1234 | return retval; | 883 | return retval; |
1235 | } | 884 | } |
885 | #endif | ||
1236 | 886 | ||
1237 | static struct crypto_alg __rfc4106_alg = { | 887 | static struct crypto_alg aesni_algs[] = { { |
888 | .cra_name = "aes", | ||
889 | .cra_driver_name = "aes-aesni", | ||
890 | .cra_priority = 300, | ||
891 | .cra_flags = CRYPTO_ALG_TYPE_CIPHER, | ||
892 | .cra_blocksize = AES_BLOCK_SIZE, | ||
893 | .cra_ctxsize = sizeof(struct crypto_aes_ctx) + | ||
894 | AESNI_ALIGN - 1, | ||
895 | .cra_alignmask = 0, | ||
896 | .cra_module = THIS_MODULE, | ||
897 | .cra_u = { | ||
898 | .cipher = { | ||
899 | .cia_min_keysize = AES_MIN_KEY_SIZE, | ||
900 | .cia_max_keysize = AES_MAX_KEY_SIZE, | ||
901 | .cia_setkey = aes_set_key, | ||
902 | .cia_encrypt = aes_encrypt, | ||
903 | .cia_decrypt = aes_decrypt | ||
904 | } | ||
905 | } | ||
906 | }, { | ||
907 | .cra_name = "__aes-aesni", | ||
908 | .cra_driver_name = "__driver-aes-aesni", | ||
909 | .cra_priority = 0, | ||
910 | .cra_flags = CRYPTO_ALG_TYPE_CIPHER, | ||
911 | .cra_blocksize = AES_BLOCK_SIZE, | ||
912 | .cra_ctxsize = sizeof(struct crypto_aes_ctx) + | ||
913 | AESNI_ALIGN - 1, | ||
914 | .cra_alignmask = 0, | ||
915 | .cra_module = THIS_MODULE, | ||
916 | .cra_u = { | ||
917 | .cipher = { | ||
918 | .cia_min_keysize = AES_MIN_KEY_SIZE, | ||
919 | .cia_max_keysize = AES_MAX_KEY_SIZE, | ||
920 | .cia_setkey = aes_set_key, | ||
921 | .cia_encrypt = __aes_encrypt, | ||
922 | .cia_decrypt = __aes_decrypt | ||
923 | } | ||
924 | } | ||
925 | }, { | ||
926 | .cra_name = "__ecb-aes-aesni", | ||
927 | .cra_driver_name = "__driver-ecb-aes-aesni", | ||
928 | .cra_priority = 0, | ||
929 | .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, | ||
930 | .cra_blocksize = AES_BLOCK_SIZE, | ||
931 | .cra_ctxsize = sizeof(struct crypto_aes_ctx) + | ||
932 | AESNI_ALIGN - 1, | ||
933 | .cra_alignmask = 0, | ||
934 | .cra_type = &crypto_blkcipher_type, | ||
935 | .cra_module = THIS_MODULE, | ||
936 | .cra_u = { | ||
937 | .blkcipher = { | ||
938 | .min_keysize = AES_MIN_KEY_SIZE, | ||
939 | .max_keysize = AES_MAX_KEY_SIZE, | ||
940 | .setkey = aes_set_key, | ||
941 | .encrypt = ecb_encrypt, | ||
942 | .decrypt = ecb_decrypt, | ||
943 | }, | ||
944 | }, | ||
945 | }, { | ||
946 | .cra_name = "__cbc-aes-aesni", | ||
947 | .cra_driver_name = "__driver-cbc-aes-aesni", | ||
948 | .cra_priority = 0, | ||
949 | .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, | ||
950 | .cra_blocksize = AES_BLOCK_SIZE, | ||
951 | .cra_ctxsize = sizeof(struct crypto_aes_ctx) + | ||
952 | AESNI_ALIGN - 1, | ||
953 | .cra_alignmask = 0, | ||
954 | .cra_type = &crypto_blkcipher_type, | ||
955 | .cra_module = THIS_MODULE, | ||
956 | .cra_u = { | ||
957 | .blkcipher = { | ||
958 | .min_keysize = AES_MIN_KEY_SIZE, | ||
959 | .max_keysize = AES_MAX_KEY_SIZE, | ||
960 | .setkey = aes_set_key, | ||
961 | .encrypt = cbc_encrypt, | ||
962 | .decrypt = cbc_decrypt, | ||
963 | }, | ||
964 | }, | ||
965 | }, { | ||
966 | .cra_name = "ecb(aes)", | ||
967 | .cra_driver_name = "ecb-aes-aesni", | ||
968 | .cra_priority = 400, | ||
969 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, | ||
970 | .cra_blocksize = AES_BLOCK_SIZE, | ||
971 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
972 | .cra_alignmask = 0, | ||
973 | .cra_type = &crypto_ablkcipher_type, | ||
974 | .cra_module = THIS_MODULE, | ||
975 | .cra_init = ablk_ecb_init, | ||
976 | .cra_exit = ablk_exit, | ||
977 | .cra_u = { | ||
978 | .ablkcipher = { | ||
979 | .min_keysize = AES_MIN_KEY_SIZE, | ||
980 | .max_keysize = AES_MAX_KEY_SIZE, | ||
981 | .setkey = ablk_set_key, | ||
982 | .encrypt = ablk_encrypt, | ||
983 | .decrypt = ablk_decrypt, | ||
984 | }, | ||
985 | }, | ||
986 | }, { | ||
987 | .cra_name = "cbc(aes)", | ||
988 | .cra_driver_name = "cbc-aes-aesni", | ||
989 | .cra_priority = 400, | ||
990 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, | ||
991 | .cra_blocksize = AES_BLOCK_SIZE, | ||
992 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
993 | .cra_alignmask = 0, | ||
994 | .cra_type = &crypto_ablkcipher_type, | ||
995 | .cra_module = THIS_MODULE, | ||
996 | .cra_init = ablk_cbc_init, | ||
997 | .cra_exit = ablk_exit, | ||
998 | .cra_u = { | ||
999 | .ablkcipher = { | ||
1000 | .min_keysize = AES_MIN_KEY_SIZE, | ||
1001 | .max_keysize = AES_MAX_KEY_SIZE, | ||
1002 | .ivsize = AES_BLOCK_SIZE, | ||
1003 | .setkey = ablk_set_key, | ||
1004 | .encrypt = ablk_encrypt, | ||
1005 | .decrypt = ablk_decrypt, | ||
1006 | }, | ||
1007 | }, | ||
1008 | #ifdef CONFIG_X86_64 | ||
1009 | }, { | ||
1010 | .cra_name = "__ctr-aes-aesni", | ||
1011 | .cra_driver_name = "__driver-ctr-aes-aesni", | ||
1012 | .cra_priority = 0, | ||
1013 | .cra_flags = CRYPTO_ALG_TYPE_BLKCIPHER, | ||
1014 | .cra_blocksize = 1, | ||
1015 | .cra_ctxsize = sizeof(struct crypto_aes_ctx) + | ||
1016 | AESNI_ALIGN - 1, | ||
1017 | .cra_alignmask = 0, | ||
1018 | .cra_type = &crypto_blkcipher_type, | ||
1019 | .cra_module = THIS_MODULE, | ||
1020 | .cra_u = { | ||
1021 | .blkcipher = { | ||
1022 | .min_keysize = AES_MIN_KEY_SIZE, | ||
1023 | .max_keysize = AES_MAX_KEY_SIZE, | ||
1024 | .ivsize = AES_BLOCK_SIZE, | ||
1025 | .setkey = aes_set_key, | ||
1026 | .encrypt = ctr_crypt, | ||
1027 | .decrypt = ctr_crypt, | ||
1028 | }, | ||
1029 | }, | ||
1030 | }, { | ||
1031 | .cra_name = "ctr(aes)", | ||
1032 | .cra_driver_name = "ctr-aes-aesni", | ||
1033 | .cra_priority = 400, | ||
1034 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, | ||
1035 | .cra_blocksize = 1, | ||
1036 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
1037 | .cra_alignmask = 0, | ||
1038 | .cra_type = &crypto_ablkcipher_type, | ||
1039 | .cra_module = THIS_MODULE, | ||
1040 | .cra_init = ablk_ctr_init, | ||
1041 | .cra_exit = ablk_exit, | ||
1042 | .cra_u = { | ||
1043 | .ablkcipher = { | ||
1044 | .min_keysize = AES_MIN_KEY_SIZE, | ||
1045 | .max_keysize = AES_MAX_KEY_SIZE, | ||
1046 | .ivsize = AES_BLOCK_SIZE, | ||
1047 | .setkey = ablk_set_key, | ||
1048 | .encrypt = ablk_encrypt, | ||
1049 | .decrypt = ablk_encrypt, | ||
1050 | .geniv = "chainiv", | ||
1051 | }, | ||
1052 | }, | ||
1053 | }, { | ||
1238 | .cra_name = "__gcm-aes-aesni", | 1054 | .cra_name = "__gcm-aes-aesni", |
1239 | .cra_driver_name = "__driver-gcm-aes-aesni", | 1055 | .cra_driver_name = "__driver-gcm-aes-aesni", |
1240 | .cra_priority = 0, | 1056 | .cra_priority = 0, |
1241 | .cra_flags = CRYPTO_ALG_TYPE_AEAD, | 1057 | .cra_flags = CRYPTO_ALG_TYPE_AEAD, |
1242 | .cra_blocksize = 1, | 1058 | .cra_blocksize = 1, |
1243 | .cra_ctxsize = sizeof(struct aesni_rfc4106_gcm_ctx) + AESNI_ALIGN, | 1059 | .cra_ctxsize = sizeof(struct aesni_rfc4106_gcm_ctx) + |
1060 | AESNI_ALIGN, | ||
1244 | .cra_alignmask = 0, | 1061 | .cra_alignmask = 0, |
1245 | .cra_type = &crypto_aead_type, | 1062 | .cra_type = &crypto_aead_type, |
1246 | .cra_module = THIS_MODULE, | 1063 | .cra_module = THIS_MODULE, |
1247 | .cra_list = LIST_HEAD_INIT(__rfc4106_alg.cra_list), | ||
1248 | .cra_u = { | 1064 | .cra_u = { |
1249 | .aead = { | 1065 | .aead = { |
1250 | .encrypt = __driver_rfc4106_encrypt, | 1066 | .encrypt = __driver_rfc4106_encrypt, |
1251 | .decrypt = __driver_rfc4106_decrypt, | 1067 | .decrypt = __driver_rfc4106_decrypt, |
1252 | }, | 1068 | }, |
1253 | }, | 1069 | }, |
1254 | }; | 1070 | }, { |
1071 | .cra_name = "rfc4106(gcm(aes))", | ||
1072 | .cra_driver_name = "rfc4106-gcm-aesni", | ||
1073 | .cra_priority = 400, | ||
1074 | .cra_flags = CRYPTO_ALG_TYPE_AEAD | CRYPTO_ALG_ASYNC, | ||
1075 | .cra_blocksize = 1, | ||
1076 | .cra_ctxsize = sizeof(struct aesni_rfc4106_gcm_ctx) + | ||
1077 | AESNI_ALIGN, | ||
1078 | .cra_alignmask = 0, | ||
1079 | .cra_type = &crypto_nivaead_type, | ||
1080 | .cra_module = THIS_MODULE, | ||
1081 | .cra_init = rfc4106_init, | ||
1082 | .cra_exit = rfc4106_exit, | ||
1083 | .cra_u = { | ||
1084 | .aead = { | ||
1085 | .setkey = rfc4106_set_key, | ||
1086 | .setauthsize = rfc4106_set_authsize, | ||
1087 | .encrypt = rfc4106_encrypt, | ||
1088 | .decrypt = rfc4106_decrypt, | ||
1089 | .geniv = "seqiv", | ||
1090 | .ivsize = 8, | ||
1091 | .maxauthsize = 16, | ||
1092 | }, | ||
1093 | }, | ||
1094 | #ifdef HAS_CTR | ||
1095 | }, { | ||
1096 | .cra_name = "rfc3686(ctr(aes))", | ||
1097 | .cra_driver_name = "rfc3686-ctr-aes-aesni", | ||
1098 | .cra_priority = 400, | ||
1099 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, | ||
1100 | .cra_blocksize = 1, | ||
1101 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
1102 | .cra_alignmask = 0, | ||
1103 | .cra_type = &crypto_ablkcipher_type, | ||
1104 | .cra_module = THIS_MODULE, | ||
1105 | .cra_init = ablk_rfc3686_ctr_init, | ||
1106 | .cra_exit = ablk_exit, | ||
1107 | .cra_u = { | ||
1108 | .ablkcipher = { | ||
1109 | .min_keysize = AES_MIN_KEY_SIZE + | ||
1110 | CTR_RFC3686_NONCE_SIZE, | ||
1111 | .max_keysize = AES_MAX_KEY_SIZE + | ||
1112 | CTR_RFC3686_NONCE_SIZE, | ||
1113 | .ivsize = CTR_RFC3686_IV_SIZE, | ||
1114 | .setkey = ablk_set_key, | ||
1115 | .encrypt = ablk_encrypt, | ||
1116 | .decrypt = ablk_decrypt, | ||
1117 | .geniv = "seqiv", | ||
1118 | }, | ||
1119 | }, | ||
1120 | #endif | ||
1121 | #endif | ||
1122 | #ifdef HAS_LRW | ||
1123 | }, { | ||
1124 | .cra_name = "lrw(aes)", | ||
1125 | .cra_driver_name = "lrw-aes-aesni", | ||
1126 | .cra_priority = 400, | ||
1127 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, | ||
1128 | .cra_blocksize = AES_BLOCK_SIZE, | ||
1129 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
1130 | .cra_alignmask = 0, | ||
1131 | .cra_type = &crypto_ablkcipher_type, | ||
1132 | .cra_module = THIS_MODULE, | ||
1133 | .cra_init = ablk_lrw_init, | ||
1134 | .cra_exit = ablk_exit, | ||
1135 | .cra_u = { | ||
1136 | .ablkcipher = { | ||
1137 | .min_keysize = AES_MIN_KEY_SIZE + AES_BLOCK_SIZE, | ||
1138 | .max_keysize = AES_MAX_KEY_SIZE + AES_BLOCK_SIZE, | ||
1139 | .ivsize = AES_BLOCK_SIZE, | ||
1140 | .setkey = ablk_set_key, | ||
1141 | .encrypt = ablk_encrypt, | ||
1142 | .decrypt = ablk_decrypt, | ||
1143 | }, | ||
1144 | }, | ||
1145 | #endif | ||
1146 | #ifdef HAS_PCBC | ||
1147 | }, { | ||
1148 | .cra_name = "pcbc(aes)", | ||
1149 | .cra_driver_name = "pcbc-aes-aesni", | ||
1150 | .cra_priority = 400, | ||
1151 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, | ||
1152 | .cra_blocksize = AES_BLOCK_SIZE, | ||
1153 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
1154 | .cra_alignmask = 0, | ||
1155 | .cra_type = &crypto_ablkcipher_type, | ||
1156 | .cra_module = THIS_MODULE, | ||
1157 | .cra_init = ablk_pcbc_init, | ||
1158 | .cra_exit = ablk_exit, | ||
1159 | .cra_u = { | ||
1160 | .ablkcipher = { | ||
1161 | .min_keysize = AES_MIN_KEY_SIZE, | ||
1162 | .max_keysize = AES_MAX_KEY_SIZE, | ||
1163 | .ivsize = AES_BLOCK_SIZE, | ||
1164 | .setkey = ablk_set_key, | ||
1165 | .encrypt = ablk_encrypt, | ||
1166 | .decrypt = ablk_decrypt, | ||
1167 | }, | ||
1168 | }, | ||
1255 | #endif | 1169 | #endif |
1170 | #ifdef HAS_XTS | ||
1171 | }, { | ||
1172 | .cra_name = "xts(aes)", | ||
1173 | .cra_driver_name = "xts-aes-aesni", | ||
1174 | .cra_priority = 400, | ||
1175 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, | ||
1176 | .cra_blocksize = AES_BLOCK_SIZE, | ||
1177 | .cra_ctxsize = sizeof(struct async_aes_ctx), | ||
1178 | .cra_alignmask = 0, | ||
1179 | .cra_type = &crypto_ablkcipher_type, | ||
1180 | .cra_module = THIS_MODULE, | ||
1181 | .cra_init = ablk_xts_init, | ||
1182 | .cra_exit = ablk_exit, | ||
1183 | .cra_u = { | ||
1184 | .ablkcipher = { | ||
1185 | .min_keysize = 2 * AES_MIN_KEY_SIZE, | ||
1186 | .max_keysize = 2 * AES_MAX_KEY_SIZE, | ||
1187 | .ivsize = AES_BLOCK_SIZE, | ||
1188 | .setkey = ablk_set_key, | ||
1189 | .encrypt = ablk_encrypt, | ||
1190 | .decrypt = ablk_decrypt, | ||
1191 | }, | ||
1192 | }, | ||
1193 | #endif | ||
1194 | } }; | ||
1256 | 1195 | ||
1257 | 1196 | ||
1258 | static const struct x86_cpu_id aesni_cpu_id[] = { | 1197 | static const struct x86_cpu_id aesni_cpu_id[] = { |
@@ -1263,120 +1202,24 @@ MODULE_DEVICE_TABLE(x86cpu, aesni_cpu_id); | |||
1263 | 1202 | ||
1264 | static int __init aesni_init(void) | 1203 | static int __init aesni_init(void) |
1265 | { | 1204 | { |
1266 | int err; | 1205 | int err, i; |
1267 | 1206 | ||
1268 | if (!x86_match_cpu(aesni_cpu_id)) | 1207 | if (!x86_match_cpu(aesni_cpu_id)) |
1269 | return -ENODEV; | 1208 | return -ENODEV; |
1270 | 1209 | ||
1271 | if ((err = crypto_fpu_init())) | 1210 | err = crypto_fpu_init(); |
1272 | goto fpu_err; | 1211 | if (err) |
1273 | if ((err = crypto_register_alg(&aesni_alg))) | 1212 | return err; |
1274 | goto aes_err; | ||
1275 | if ((err = crypto_register_alg(&__aesni_alg))) | ||
1276 | goto __aes_err; | ||
1277 | if ((err = crypto_register_alg(&blk_ecb_alg))) | ||
1278 | goto blk_ecb_err; | ||
1279 | if ((err = crypto_register_alg(&blk_cbc_alg))) | ||
1280 | goto blk_cbc_err; | ||
1281 | if ((err = crypto_register_alg(&ablk_ecb_alg))) | ||
1282 | goto ablk_ecb_err; | ||
1283 | if ((err = crypto_register_alg(&ablk_cbc_alg))) | ||
1284 | goto ablk_cbc_err; | ||
1285 | #ifdef CONFIG_X86_64 | ||
1286 | if ((err = crypto_register_alg(&blk_ctr_alg))) | ||
1287 | goto blk_ctr_err; | ||
1288 | if ((err = crypto_register_alg(&ablk_ctr_alg))) | ||
1289 | goto ablk_ctr_err; | ||
1290 | if ((err = crypto_register_alg(&__rfc4106_alg))) | ||
1291 | goto __aead_gcm_err; | ||
1292 | if ((err = crypto_register_alg(&rfc4106_alg))) | ||
1293 | goto aead_gcm_err; | ||
1294 | #ifdef HAS_CTR | ||
1295 | if ((err = crypto_register_alg(&ablk_rfc3686_ctr_alg))) | ||
1296 | goto ablk_rfc3686_ctr_err; | ||
1297 | #endif | ||
1298 | #endif | ||
1299 | #ifdef HAS_LRW | ||
1300 | if ((err = crypto_register_alg(&ablk_lrw_alg))) | ||
1301 | goto ablk_lrw_err; | ||
1302 | #endif | ||
1303 | #ifdef HAS_PCBC | ||
1304 | if ((err = crypto_register_alg(&ablk_pcbc_alg))) | ||
1305 | goto ablk_pcbc_err; | ||
1306 | #endif | ||
1307 | #ifdef HAS_XTS | ||
1308 | if ((err = crypto_register_alg(&ablk_xts_alg))) | ||
1309 | goto ablk_xts_err; | ||
1310 | #endif | ||
1311 | return err; | ||
1312 | 1213 | ||
1313 | #ifdef HAS_XTS | 1214 | for (i = 0; i < ARRAY_SIZE(aesni_algs); i++) |
1314 | ablk_xts_err: | 1215 | INIT_LIST_HEAD(&aesni_algs[i].cra_list); |
1315 | #endif | 1216 | |
1316 | #ifdef HAS_PCBC | 1217 | return crypto_register_algs(aesni_algs, ARRAY_SIZE(aesni_algs)); |
1317 | crypto_unregister_alg(&ablk_pcbc_alg); | ||
1318 | ablk_pcbc_err: | ||
1319 | #endif | ||
1320 | #ifdef HAS_LRW | ||
1321 | crypto_unregister_alg(&ablk_lrw_alg); | ||
1322 | ablk_lrw_err: | ||
1323 | #endif | ||
1324 | #ifdef CONFIG_X86_64 | ||
1325 | #ifdef HAS_CTR | ||
1326 | crypto_unregister_alg(&ablk_rfc3686_ctr_alg); | ||
1327 | ablk_rfc3686_ctr_err: | ||
1328 | #endif | ||
1329 | crypto_unregister_alg(&rfc4106_alg); | ||
1330 | aead_gcm_err: | ||
1331 | crypto_unregister_alg(&__rfc4106_alg); | ||
1332 | __aead_gcm_err: | ||
1333 | crypto_unregister_alg(&ablk_ctr_alg); | ||
1334 | ablk_ctr_err: | ||
1335 | crypto_unregister_alg(&blk_ctr_alg); | ||
1336 | blk_ctr_err: | ||
1337 | #endif | ||
1338 | crypto_unregister_alg(&ablk_cbc_alg); | ||
1339 | ablk_cbc_err: | ||
1340 | crypto_unregister_alg(&ablk_ecb_alg); | ||
1341 | ablk_ecb_err: | ||
1342 | crypto_unregister_alg(&blk_cbc_alg); | ||
1343 | blk_cbc_err: | ||
1344 | crypto_unregister_alg(&blk_ecb_alg); | ||
1345 | blk_ecb_err: | ||
1346 | crypto_unregister_alg(&__aesni_alg); | ||
1347 | __aes_err: | ||
1348 | crypto_unregister_alg(&aesni_alg); | ||
1349 | aes_err: | ||
1350 | fpu_err: | ||
1351 | return err; | ||
1352 | } | 1218 | } |
1353 | 1219 | ||
1354 | static void __exit aesni_exit(void) | 1220 | static void __exit aesni_exit(void) |
1355 | { | 1221 | { |
1356 | #ifdef HAS_XTS | 1222 | crypto_unregister_algs(aesni_algs, ARRAY_SIZE(aesni_algs)); |
1357 | crypto_unregister_alg(&ablk_xts_alg); | ||
1358 | #endif | ||
1359 | #ifdef HAS_PCBC | ||
1360 | crypto_unregister_alg(&ablk_pcbc_alg); | ||
1361 | #endif | ||
1362 | #ifdef HAS_LRW | ||
1363 | crypto_unregister_alg(&ablk_lrw_alg); | ||
1364 | #endif | ||
1365 | #ifdef CONFIG_X86_64 | ||
1366 | #ifdef HAS_CTR | ||
1367 | crypto_unregister_alg(&ablk_rfc3686_ctr_alg); | ||
1368 | #endif | ||
1369 | crypto_unregister_alg(&rfc4106_alg); | ||
1370 | crypto_unregister_alg(&__rfc4106_alg); | ||
1371 | crypto_unregister_alg(&ablk_ctr_alg); | ||
1372 | crypto_unregister_alg(&blk_ctr_alg); | ||
1373 | #endif | ||
1374 | crypto_unregister_alg(&ablk_cbc_alg); | ||
1375 | crypto_unregister_alg(&ablk_ecb_alg); | ||
1376 | crypto_unregister_alg(&blk_cbc_alg); | ||
1377 | crypto_unregister_alg(&blk_ecb_alg); | ||
1378 | crypto_unregister_alg(&__aesni_alg); | ||
1379 | crypto_unregister_alg(&aesni_alg); | ||
1380 | 1223 | ||
1381 | crypto_fpu_exit(); | 1224 | crypto_fpu_exit(); |
1382 | } | 1225 | } |
diff --git a/crypto/xor.c b/crypto/xor.c index b75182d8ab14..664b6dfa9e2c 100644 --- a/crypto/xor.c +++ b/crypto/xor.c | |||
@@ -129,9 +129,9 @@ calibrate_xor_blocks(void) | |||
129 | 129 | ||
130 | if (fastest) { | 130 | if (fastest) { |
131 | printk(KERN_INFO "xor: automatically using best " | 131 | printk(KERN_INFO "xor: automatically using best " |
132 | "checksumming function: %s\n", | 132 | "checksumming function:\n"); |
133 | fastest->name); | ||
134 | xor_speed(fastest); | 133 | xor_speed(fastest); |
134 | goto out; | ||
135 | } else { | 135 | } else { |
136 | printk(KERN_INFO "xor: measuring software checksum speed\n"); | 136 | printk(KERN_INFO "xor: measuring software checksum speed\n"); |
137 | XOR_TRY_TEMPLATES; | 137 | XOR_TRY_TEMPLATES; |
@@ -146,6 +146,7 @@ calibrate_xor_blocks(void) | |||
146 | 146 | ||
147 | #undef xor_speed | 147 | #undef xor_speed |
148 | 148 | ||
149 | out: | ||
149 | free_pages((unsigned long)b1, 2); | 150 | free_pages((unsigned long)b1, 2); |
150 | 151 | ||
151 | active_template = fastest; | 152 | active_template = fastest; |
diff --git a/drivers/char/hw_random/Kconfig b/drivers/char/hw_random/Kconfig index c225314468ee..f45dad39a18b 100644 --- a/drivers/char/hw_random/Kconfig +++ b/drivers/char/hw_random/Kconfig | |||
@@ -63,7 +63,7 @@ config HW_RANDOM_AMD | |||
63 | config HW_RANDOM_ATMEL | 63 | config HW_RANDOM_ATMEL |
64 | tristate "Atmel Random Number Generator support" | 64 | tristate "Atmel Random Number Generator support" |
65 | depends on HW_RANDOM && HAVE_CLK | 65 | depends on HW_RANDOM && HAVE_CLK |
66 | default HW_RANDOM | 66 | default (HW_RANDOM && ARCH_AT91) |
67 | ---help--- | 67 | ---help--- |
68 | This driver provides kernel-side support for the Random Number | 68 | This driver provides kernel-side support for the Random Number |
69 | Generator hardware found on Atmel AT91 devices. | 69 | Generator hardware found on Atmel AT91 devices. |
diff --git a/drivers/char/hw_random/omap-rng.c b/drivers/char/hw_random/omap-rng.c index a07a5caa599c..1412565c01af 100644 --- a/drivers/char/hw_random/omap-rng.c +++ b/drivers/char/hw_random/omap-rng.c | |||
@@ -115,22 +115,12 @@ static int __devinit omap_rng_probe(struct platform_device *pdev) | |||
115 | 115 | ||
116 | res = platform_get_resource(pdev, IORESOURCE_MEM, 0); | 116 | res = platform_get_resource(pdev, IORESOURCE_MEM, 0); |
117 | 117 | ||
118 | if (!res) { | 118 | rng_base = devm_request_and_ioremap(&pdev->dev, res); |
119 | ret = -ENOENT; | ||
120 | goto err_region; | ||
121 | } | ||
122 | |||
123 | if (!request_mem_region(res->start, resource_size(res), pdev->name)) { | ||
124 | ret = -EBUSY; | ||
125 | goto err_region; | ||
126 | } | ||
127 | |||
128 | dev_set_drvdata(&pdev->dev, res); | ||
129 | rng_base = ioremap(res->start, resource_size(res)); | ||
130 | if (!rng_base) { | 119 | if (!rng_base) { |
131 | ret = -ENOMEM; | 120 | ret = -ENOMEM; |
132 | goto err_ioremap; | 121 | goto err_ioremap; |
133 | } | 122 | } |
123 | dev_set_drvdata(&pdev->dev, res); | ||
134 | 124 | ||
135 | ret = hwrng_register(&omap_rng_ops); | 125 | ret = hwrng_register(&omap_rng_ops); |
136 | if (ret) | 126 | if (ret) |
@@ -145,11 +135,8 @@ static int __devinit omap_rng_probe(struct platform_device *pdev) | |||
145 | return 0; | 135 | return 0; |
146 | 136 | ||
147 | err_register: | 137 | err_register: |
148 | iounmap(rng_base); | ||
149 | rng_base = NULL; | 138 | rng_base = NULL; |
150 | err_ioremap: | 139 | err_ioremap: |
151 | release_mem_region(res->start, resource_size(res)); | ||
152 | err_region: | ||
153 | if (cpu_is_omap24xx()) { | 140 | if (cpu_is_omap24xx()) { |
154 | clk_disable(rng_ick); | 141 | clk_disable(rng_ick); |
155 | clk_put(rng_ick); | 142 | clk_put(rng_ick); |
@@ -159,20 +146,15 @@ err_region: | |||
159 | 146 | ||
160 | static int __exit omap_rng_remove(struct platform_device *pdev) | 147 | static int __exit omap_rng_remove(struct platform_device *pdev) |
161 | { | 148 | { |
162 | struct resource *res = dev_get_drvdata(&pdev->dev); | ||
163 | |||
164 | hwrng_unregister(&omap_rng_ops); | 149 | hwrng_unregister(&omap_rng_ops); |
165 | 150 | ||
166 | omap_rng_write_reg(RNG_MASK_REG, 0x0); | 151 | omap_rng_write_reg(RNG_MASK_REG, 0x0); |
167 | 152 | ||
168 | iounmap(rng_base); | ||
169 | |||
170 | if (cpu_is_omap24xx()) { | 153 | if (cpu_is_omap24xx()) { |
171 | clk_disable(rng_ick); | 154 | clk_disable(rng_ick); |
172 | clk_put(rng_ick); | 155 | clk_put(rng_ick); |
173 | } | 156 | } |
174 | 157 | ||
175 | release_mem_region(res->start, resource_size(res)); | ||
176 | rng_base = NULL; | 158 | rng_base = NULL; |
177 | 159 | ||
178 | return 0; | 160 | return 0; |
diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig index 6373fa0ddb65..1092a770482e 100644 --- a/drivers/crypto/Kconfig +++ b/drivers/crypto/Kconfig | |||
@@ -314,4 +314,15 @@ config CRYPTO_DEV_NX | |||
314 | module supports acceleration for AES and SHA2 algorithms. If you | 314 | module supports acceleration for AES and SHA2 algorithms. If you |
315 | choose 'M' here, this module will be called nx_crypto. | 315 | choose 'M' here, this module will be called nx_crypto. |
316 | 316 | ||
317 | config CRYPTO_DEV_UX500 | ||
318 | tristate "Driver for ST-Ericsson UX500 crypto hardware acceleration" | ||
319 | depends on ARCH_U8500 | ||
320 | select CRYPTO_ALGAPI | ||
321 | help | ||
322 | Driver for ST-Ericsson UX500 crypto engine. | ||
323 | |||
324 | if CRYPTO_DEV_UX500 | ||
325 | source "drivers/crypto/ux500/Kconfig" | ||
326 | endif # if CRYPTO_DEV_UX500 | ||
327 | |||
317 | endif # CRYPTO_HW | 328 | endif # CRYPTO_HW |
diff --git a/drivers/crypto/Makefile b/drivers/crypto/Makefile index f3e64eadd7af..01390325d72d 100644 --- a/drivers/crypto/Makefile +++ b/drivers/crypto/Makefile | |||
@@ -14,3 +14,4 @@ obj-$(CONFIG_CRYPTO_DEV_OMAP_AES) += omap-aes.o | |||
14 | obj-$(CONFIG_CRYPTO_DEV_PICOXCELL) += picoxcell_crypto.o | 14 | obj-$(CONFIG_CRYPTO_DEV_PICOXCELL) += picoxcell_crypto.o |
15 | obj-$(CONFIG_CRYPTO_DEV_S5P) += s5p-sss.o | 15 | obj-$(CONFIG_CRYPTO_DEV_S5P) += s5p-sss.o |
16 | obj-$(CONFIG_CRYPTO_DEV_TEGRA_AES) += tegra-aes.o | 16 | obj-$(CONFIG_CRYPTO_DEV_TEGRA_AES) += tegra-aes.o |
17 | obj-$(CONFIG_CRYPTO_DEV_UX500) += ux500/ \ No newline at end of file | ||
diff --git a/drivers/crypto/amcc/crypto4xx_core.c b/drivers/crypto/amcc/crypto4xx_core.c index 13f8e1a14988..802e85102c32 100644 --- a/drivers/crypto/amcc/crypto4xx_core.c +++ b/drivers/crypto/amcc/crypto4xx_core.c | |||
@@ -1244,9 +1244,9 @@ err_start_dev: | |||
1244 | iounmap(core_dev->dev->ce_base); | 1244 | iounmap(core_dev->dev->ce_base); |
1245 | err_iomap: | 1245 | err_iomap: |
1246 | free_irq(core_dev->irq, dev); | 1246 | free_irq(core_dev->irq, dev); |
1247 | err_request_irq: | ||
1247 | irq_dispose_mapping(core_dev->irq); | 1248 | irq_dispose_mapping(core_dev->irq); |
1248 | tasklet_kill(&core_dev->tasklet); | 1249 | tasklet_kill(&core_dev->tasklet); |
1249 | err_request_irq: | ||
1250 | crypto4xx_destroy_sdr(core_dev->dev); | 1250 | crypto4xx_destroy_sdr(core_dev->dev); |
1251 | err_build_sdr: | 1251 | err_build_sdr: |
1252 | crypto4xx_destroy_gdr(core_dev->dev); | 1252 | crypto4xx_destroy_gdr(core_dev->dev); |
diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c index 534a36469d57..4eec389184d3 100644 --- a/drivers/crypto/caam/caamalg.c +++ b/drivers/crypto/caam/caamalg.c | |||
@@ -2267,8 +2267,11 @@ static void __exit caam_algapi_exit(void) | |||
2267 | int i, err; | 2267 | int i, err; |
2268 | 2268 | ||
2269 | dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec-v4.0"); | 2269 | dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec-v4.0"); |
2270 | if (!dev_node) | 2270 | if (!dev_node) { |
2271 | return; | 2271 | dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec4.0"); |
2272 | if (!dev_node) | ||
2273 | return; | ||
2274 | } | ||
2272 | 2275 | ||
2273 | pdev = of_find_device_by_node(dev_node); | 2276 | pdev = of_find_device_by_node(dev_node); |
2274 | if (!pdev) | 2277 | if (!pdev) |
@@ -2350,8 +2353,11 @@ static int __init caam_algapi_init(void) | |||
2350 | int i = 0, err = 0; | 2353 | int i = 0, err = 0; |
2351 | 2354 | ||
2352 | dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec-v4.0"); | 2355 | dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec-v4.0"); |
2353 | if (!dev_node) | 2356 | if (!dev_node) { |
2354 | return -ENODEV; | 2357 | dev_node = of_find_compatible_node(NULL, NULL, "fsl,sec4.0"); |
2358 | if (!dev_node) | ||
2359 | return -ENODEV; | ||
2360 | } | ||
2355 | 2361 | ||
2356 | pdev = of_find_device_by_node(dev_node); | 2362 | pdev = of_find_device_by_node(dev_node); |
2357 | if (!pdev) | 2363 | if (!pdev) |
diff --git a/drivers/crypto/caam/ctrl.c b/drivers/crypto/caam/ctrl.c index c5f61c55d923..77557ebcd337 100644 --- a/drivers/crypto/caam/ctrl.c +++ b/drivers/crypto/caam/ctrl.c | |||
@@ -98,6 +98,12 @@ static int caam_probe(struct platform_device *pdev) | |||
98 | rspec = 0; | 98 | rspec = 0; |
99 | for_each_compatible_node(np, NULL, "fsl,sec-v4.0-job-ring") | 99 | for_each_compatible_node(np, NULL, "fsl,sec-v4.0-job-ring") |
100 | rspec++; | 100 | rspec++; |
101 | if (!rspec) { | ||
102 | /* for backward compatible with device trees */ | ||
103 | for_each_compatible_node(np, NULL, "fsl,sec4.0-job-ring") | ||
104 | rspec++; | ||
105 | } | ||
106 | |||
101 | ctrlpriv->jrdev = kzalloc(sizeof(struct device *) * rspec, GFP_KERNEL); | 107 | ctrlpriv->jrdev = kzalloc(sizeof(struct device *) * rspec, GFP_KERNEL); |
102 | if (ctrlpriv->jrdev == NULL) { | 108 | if (ctrlpriv->jrdev == NULL) { |
103 | iounmap(&topregs->ctrl); | 109 | iounmap(&topregs->ctrl); |
@@ -111,6 +117,13 @@ static int caam_probe(struct platform_device *pdev) | |||
111 | ctrlpriv->total_jobrs++; | 117 | ctrlpriv->total_jobrs++; |
112 | ring++; | 118 | ring++; |
113 | } | 119 | } |
120 | if (!ring) { | ||
121 | for_each_compatible_node(np, NULL, "fsl,sec4.0-job-ring") { | ||
122 | caam_jr_probe(pdev, np, ring); | ||
123 | ctrlpriv->total_jobrs++; | ||
124 | ring++; | ||
125 | } | ||
126 | } | ||
114 | 127 | ||
115 | /* Check to see if QI present. If so, enable */ | 128 | /* Check to see if QI present. If so, enable */ |
116 | ctrlpriv->qi_present = !!(rd_reg64(&topregs->ctrl.perfmon.comp_parms) & | 129 | ctrlpriv->qi_present = !!(rd_reg64(&topregs->ctrl.perfmon.comp_parms) & |
@@ -226,6 +239,9 @@ static struct of_device_id caam_match[] = { | |||
226 | { | 239 | { |
227 | .compatible = "fsl,sec-v4.0", | 240 | .compatible = "fsl,sec-v4.0", |
228 | }, | 241 | }, |
242 | { | ||
243 | .compatible = "fsl,sec4.0", | ||
244 | }, | ||
229 | {}, | 245 | {}, |
230 | }; | 246 | }; |
231 | MODULE_DEVICE_TABLE(of, caam_match); | 247 | MODULE_DEVICE_TABLE(of, caam_match); |
diff --git a/drivers/crypto/ux500/Kconfig b/drivers/crypto/ux500/Kconfig new file mode 100644 index 000000000000..b35e5c4b025a --- /dev/null +++ b/drivers/crypto/ux500/Kconfig | |||
@@ -0,0 +1,30 @@ | |||
1 | # | ||
2 | # Copyright (C) ST-Ericsson SA 2010 | ||
3 | # Author: Shujuan Chen (shujuan.chen@stericsson.com) | ||
4 | # License terms: GNU General Public License (GPL) version 2 | ||
5 | # | ||
6 | |||
7 | config CRYPTO_DEV_UX500_CRYP | ||
8 | tristate "UX500 crypto driver for CRYP block" | ||
9 | depends on CRYPTO_DEV_UX500 | ||
10 | select CRYPTO_DES | ||
11 | help | ||
12 | This selects the crypto driver for the UX500_CRYP hardware. It supports | ||
13 | AES-ECB, CBC and CTR with keys sizes of 128, 192 and 256 bit sizes. | ||
14 | |||
15 | config CRYPTO_DEV_UX500_HASH | ||
16 | tristate "UX500 crypto driver for HASH block" | ||
17 | depends on CRYPTO_DEV_UX500 | ||
18 | select CRYPTO_HASH | ||
19 | select CRYPTO_HMAC | ||
20 | help | ||
21 | This selects the hash driver for the UX500_HASH hardware. | ||
22 | Depends on UX500/STM DMA if running in DMA mode. | ||
23 | |||
24 | config CRYPTO_DEV_UX500_DEBUG | ||
25 | bool "Activate ux500 platform debug-mode for crypto and hash block" | ||
26 | depends on CRYPTO_DEV_UX500_CRYP || CRYPTO_DEV_UX500_HASH | ||
27 | default n | ||
28 | help | ||
29 | Say Y if you want to add debug prints to ux500_hash and | ||
30 | ux500_cryp devices. | ||
diff --git a/drivers/crypto/ux500/Makefile b/drivers/crypto/ux500/Makefile new file mode 100644 index 000000000000..b9a365bade86 --- /dev/null +++ b/drivers/crypto/ux500/Makefile | |||
@@ -0,0 +1,8 @@ | |||
1 | # | ||
2 | # Copyright (C) ST-Ericsson SA 2010 | ||
3 | # Author: Shujuan Chen (shujuan.chen@stericsson.com) | ||
4 | # License terms: GNU General Public License (GPL) version 2 | ||
5 | # | ||
6 | |||
7 | obj-$(CONFIG_CRYPTO_DEV_UX500_HASH) += hash/ | ||
8 | obj-$(CONFIG_CRYPTO_DEV_UX500_CRYP) += cryp/ | ||
diff --git a/drivers/crypto/ux500/cryp/Makefile b/drivers/crypto/ux500/cryp/Makefile new file mode 100644 index 000000000000..e5d362a6f680 --- /dev/null +++ b/drivers/crypto/ux500/cryp/Makefile | |||
@@ -0,0 +1,13 @@ | |||
1 | #/* | ||
2 | # * Copyright (C) ST-Ericsson SA 2010 | ||
3 | # * Author: shujuan.chen@stericsson.com for ST-Ericsson. | ||
4 | # * License terms: GNU General Public License (GPL) version 2 */ | ||
5 | |||
6 | ifdef CONFIG_CRYPTO_DEV_UX500_DEBUG | ||
7 | CFLAGS_cryp_core.o := -DDEBUG -O0 | ||
8 | CFLAGS_cryp.o := -DDEBUG -O0 | ||
9 | CFLAGS_cryp_irq.o := -DDEBUG -O0 | ||
10 | endif | ||
11 | |||
12 | obj-$(CONFIG_CRYPTO_DEV_UX500_CRYP) += ux500_cryp.o | ||
13 | ux500_cryp-objs := cryp.o cryp_irq.o cryp_core.o | ||
diff --git a/drivers/crypto/ux500/cryp/cryp.c b/drivers/crypto/ux500/cryp/cryp.c new file mode 100644 index 000000000000..e208ceaf81c9 --- /dev/null +++ b/drivers/crypto/ux500/cryp/cryp.c | |||
@@ -0,0 +1,389 @@ | |||
1 | /** | ||
2 | * Copyright (C) ST-Ericsson SA 2010 | ||
3 | * Author: Shujuan Chen <shujuan.chen@stericsson.com> for ST-Ericsson. | ||
4 | * Author: Jonas Linde <jonas.linde@stericsson.com> for ST-Ericsson. | ||
5 | * Author: Niklas Hernaeus <niklas.hernaeus@stericsson.com> for ST-Ericsson. | ||
6 | * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson. | ||
7 | * Author: Berne Hebark <berne.herbark@stericsson.com> for ST-Ericsson. | ||
8 | * License terms: GNU General Public License (GPL) version 2 | ||
9 | */ | ||
10 | |||
11 | #include <linux/errno.h> | ||
12 | #include <linux/kernel.h> | ||
13 | #include <linux/types.h> | ||
14 | |||
15 | #include <mach/hardware.h> | ||
16 | |||
17 | #include "cryp_p.h" | ||
18 | #include "cryp.h" | ||
19 | |||
20 | /** | ||
21 | * cryp_wait_until_done - wait until the device logic is not busy | ||
22 | */ | ||
23 | void cryp_wait_until_done(struct cryp_device_data *device_data) | ||
24 | { | ||
25 | while (cryp_is_logic_busy(device_data)) | ||
26 | cpu_relax(); | ||
27 | } | ||
28 | |||
29 | /** | ||
30 | * cryp_check - This routine checks Peripheral and PCell Id | ||
31 | * @device_data: Pointer to the device data struct for base address. | ||
32 | */ | ||
33 | int cryp_check(struct cryp_device_data *device_data) | ||
34 | { | ||
35 | int peripheralid2 = 0; | ||
36 | |||
37 | if (NULL == device_data) | ||
38 | return -EINVAL; | ||
39 | |||
40 | peripheralid2 = readl_relaxed(&device_data->base->periphId2); | ||
41 | |||
42 | if (peripheralid2 != CRYP_PERIPHERAL_ID2_DB8500) | ||
43 | return -EPERM; | ||
44 | |||
45 | /* Check Peripheral and Pcell Id Register for CRYP */ | ||
46 | if ((CRYP_PERIPHERAL_ID0 == | ||
47 | readl_relaxed(&device_data->base->periphId0)) | ||
48 | && (CRYP_PERIPHERAL_ID1 == | ||
49 | readl_relaxed(&device_data->base->periphId1)) | ||
50 | && (CRYP_PERIPHERAL_ID3 == | ||
51 | readl_relaxed(&device_data->base->periphId3)) | ||
52 | && (CRYP_PCELL_ID0 == | ||
53 | readl_relaxed(&device_data->base->pcellId0)) | ||
54 | && (CRYP_PCELL_ID1 == | ||
55 | readl_relaxed(&device_data->base->pcellId1)) | ||
56 | && (CRYP_PCELL_ID2 == | ||
57 | readl_relaxed(&device_data->base->pcellId2)) | ||
58 | && (CRYP_PCELL_ID3 == | ||
59 | readl_relaxed(&device_data->base->pcellId3))) { | ||
60 | return 0; | ||
61 | } | ||
62 | |||
63 | return -EPERM; | ||
64 | } | ||
65 | |||
66 | /** | ||
67 | * cryp_activity - This routine enables/disable the cryptography function. | ||
68 | * @device_data: Pointer to the device data struct for base address. | ||
69 | * @cryp_crypen: Enable/Disable functionality | ||
70 | */ | ||
71 | void cryp_activity(struct cryp_device_data *device_data, | ||
72 | enum cryp_crypen cryp_crypen) | ||
73 | { | ||
74 | CRYP_PUT_BITS(&device_data->base->cr, | ||
75 | cryp_crypen, | ||
76 | CRYP_CR_CRYPEN_POS, | ||
77 | CRYP_CR_CRYPEN_MASK); | ||
78 | } | ||
79 | |||
80 | /** | ||
81 | * cryp_flush_inoutfifo - Resets both the input and the output FIFOs | ||
82 | * @device_data: Pointer to the device data struct for base address. | ||
83 | */ | ||
84 | void cryp_flush_inoutfifo(struct cryp_device_data *device_data) | ||
85 | { | ||
86 | /* | ||
87 | * We always need to disble the hardware before trying to flush the | ||
88 | * FIFO. This is something that isn't written in the design | ||
89 | * specification, but we have been informed by the hardware designers | ||
90 | * that this must be done. | ||
91 | */ | ||
92 | cryp_activity(device_data, CRYP_CRYPEN_DISABLE); | ||
93 | cryp_wait_until_done(device_data); | ||
94 | |||
95 | CRYP_SET_BITS(&device_data->base->cr, CRYP_CR_FFLUSH_MASK); | ||
96 | /* | ||
97 | * CRYP_SR_INFIFO_READY_MASK is the expected value on the status | ||
98 | * register when starting a new calculation, which means Input FIFO is | ||
99 | * not full and input FIFO is empty. | ||
100 | */ | ||
101 | while (readl_relaxed(&device_data->base->sr) != | ||
102 | CRYP_SR_INFIFO_READY_MASK) | ||
103 | cpu_relax(); | ||
104 | } | ||
105 | |||
106 | /** | ||
107 | * cryp_set_configuration - This routine set the cr CRYP IP | ||
108 | * @device_data: Pointer to the device data struct for base address. | ||
109 | * @cryp_config: Pointer to the configuration parameter | ||
110 | * @control_register: The control register to be written later on. | ||
111 | */ | ||
112 | int cryp_set_configuration(struct cryp_device_data *device_data, | ||
113 | struct cryp_config *cryp_config, | ||
114 | u32 *control_register) | ||
115 | { | ||
116 | u32 cr_for_kse; | ||
117 | |||
118 | if (NULL == device_data || NULL == cryp_config) | ||
119 | return -EINVAL; | ||
120 | |||
121 | *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); | ||
122 | |||
123 | /* Prepare key for decryption in AES_ECB and AES_CBC mode. */ | ||
124 | if ((CRYP_ALGORITHM_DECRYPT == cryp_config->algodir) && | ||
125 | ((CRYP_ALGO_AES_ECB == cryp_config->algomode) || | ||
126 | (CRYP_ALGO_AES_CBC == cryp_config->algomode))) { | ||
127 | cr_for_kse = *control_register; | ||
128 | /* | ||
129 | * This seems a bit odd, but it is indeed needed to set this to | ||
130 | * encrypt even though it is a decryption that we are doing. It | ||
131 | * also mentioned in the design spec that you need to do this. | ||
132 | * After the keyprepartion for decrypting is done you should set | ||
133 | * algodir back to decryption, which is done outside this if | ||
134 | * statement. | ||
135 | * | ||
136 | * According to design specification we should set mode ECB | ||
137 | * during key preparation even though we might be running CBC | ||
138 | * when enter this function. | ||
139 | * | ||
140 | * Writing to KSE_ENABLED will drop CRYPEN when key preparation | ||
141 | * is done. Therefore we need to set CRYPEN again outside this | ||
142 | * if statement when running decryption. | ||
143 | */ | ||
144 | cr_for_kse |= ((CRYP_ALGORITHM_ENCRYPT << CRYP_CR_ALGODIR_POS) | | ||
145 | (CRYP_ALGO_AES_ECB << CRYP_CR_ALGOMODE_POS) | | ||
146 | (CRYP_CRYPEN_ENABLE << CRYP_CR_CRYPEN_POS) | | ||
147 | (KSE_ENABLED << CRYP_CR_KSE_POS)); | ||
148 | |||
149 | writel_relaxed(cr_for_kse, &device_data->base->cr); | ||
150 | cryp_wait_until_done(device_data); | ||
151 | } | ||
152 | |||
153 | *control_register |= | ||
154 | ((cryp_config->algomode << CRYP_CR_ALGOMODE_POS) | | ||
155 | (cryp_config->algodir << CRYP_CR_ALGODIR_POS)); | ||
156 | |||
157 | return 0; | ||
158 | } | ||
159 | |||
160 | /** | ||
161 | * cryp_configure_protection - set the protection bits in the CRYP logic. | ||
162 | * @device_data: Pointer to the device data struct for base address. | ||
163 | * @p_protect_config: Pointer to the protection mode and | ||
164 | * secure mode configuration | ||
165 | */ | ||
166 | int cryp_configure_protection(struct cryp_device_data *device_data, | ||
167 | struct cryp_protection_config *p_protect_config) | ||
168 | { | ||
169 | if (NULL == p_protect_config) | ||
170 | return -EINVAL; | ||
171 | |||
172 | CRYP_WRITE_BIT(&device_data->base->cr, | ||
173 | (u32) p_protect_config->secure_access, | ||
174 | CRYP_CR_SECURE_MASK); | ||
175 | CRYP_PUT_BITS(&device_data->base->cr, | ||
176 | p_protect_config->privilege_access, | ||
177 | CRYP_CR_PRLG_POS, | ||
178 | CRYP_CR_PRLG_MASK); | ||
179 | |||
180 | return 0; | ||
181 | } | ||
182 | |||
183 | /** | ||
184 | * cryp_is_logic_busy - returns the busy status of the CRYP logic | ||
185 | * @device_data: Pointer to the device data struct for base address. | ||
186 | */ | ||
187 | int cryp_is_logic_busy(struct cryp_device_data *device_data) | ||
188 | { | ||
189 | return CRYP_TEST_BITS(&device_data->base->sr, | ||
190 | CRYP_SR_BUSY_MASK); | ||
191 | } | ||
192 | |||
193 | /** | ||
194 | * cryp_configure_for_dma - configures the CRYP IP for DMA operation | ||
195 | * @device_data: Pointer to the device data struct for base address. | ||
196 | * @dma_req: Specifies the DMA request type value. | ||
197 | */ | ||
198 | void cryp_configure_for_dma(struct cryp_device_data *device_data, | ||
199 | enum cryp_dma_req_type dma_req) | ||
200 | { | ||
201 | CRYP_SET_BITS(&device_data->base->dmacr, | ||
202 | (u32) dma_req); | ||
203 | } | ||
204 | |||
205 | /** | ||
206 | * cryp_configure_key_values - configures the key values for CRYP operations | ||
207 | * @device_data: Pointer to the device data struct for base address. | ||
208 | * @key_reg_index: Key value index register | ||
209 | * @key_value: The key value struct | ||
210 | */ | ||
211 | int cryp_configure_key_values(struct cryp_device_data *device_data, | ||
212 | enum cryp_key_reg_index key_reg_index, | ||
213 | struct cryp_key_value key_value) | ||
214 | { | ||
215 | while (cryp_is_logic_busy(device_data)) | ||
216 | cpu_relax(); | ||
217 | |||
218 | switch (key_reg_index) { | ||
219 | case CRYP_KEY_REG_1: | ||
220 | writel_relaxed(key_value.key_value_left, | ||
221 | &device_data->base->key_1_l); | ||
222 | writel_relaxed(key_value.key_value_right, | ||
223 | &device_data->base->key_1_r); | ||
224 | break; | ||
225 | case CRYP_KEY_REG_2: | ||
226 | writel_relaxed(key_value.key_value_left, | ||
227 | &device_data->base->key_2_l); | ||
228 | writel_relaxed(key_value.key_value_right, | ||
229 | &device_data->base->key_2_r); | ||
230 | break; | ||
231 | case CRYP_KEY_REG_3: | ||
232 | writel_relaxed(key_value.key_value_left, | ||
233 | &device_data->base->key_3_l); | ||
234 | writel_relaxed(key_value.key_value_right, | ||
235 | &device_data->base->key_3_r); | ||
236 | break; | ||
237 | case CRYP_KEY_REG_4: | ||
238 | writel_relaxed(key_value.key_value_left, | ||
239 | &device_data->base->key_4_l); | ||
240 | writel_relaxed(key_value.key_value_right, | ||
241 | &device_data->base->key_4_r); | ||
242 | break; | ||
243 | default: | ||
244 | return -EINVAL; | ||
245 | } | ||
246 | |||
247 | return 0; | ||
248 | } | ||
249 | |||
250 | /** | ||
251 | * cryp_configure_init_vector - configures the initialization vector register | ||
252 | * @device_data: Pointer to the device data struct for base address. | ||
253 | * @init_vector_index: Specifies the index of the init vector. | ||
254 | * @init_vector_value: Specifies the value for the init vector. | ||
255 | */ | ||
256 | int cryp_configure_init_vector(struct cryp_device_data *device_data, | ||
257 | enum cryp_init_vector_index | ||
258 | init_vector_index, | ||
259 | struct cryp_init_vector_value | ||
260 | init_vector_value) | ||
261 | { | ||
262 | while (cryp_is_logic_busy(device_data)) | ||
263 | cpu_relax(); | ||
264 | |||
265 | switch (init_vector_index) { | ||
266 | case CRYP_INIT_VECTOR_INDEX_0: | ||
267 | writel_relaxed(init_vector_value.init_value_left, | ||
268 | &device_data->base->init_vect_0_l); | ||
269 | writel_relaxed(init_vector_value.init_value_right, | ||
270 | &device_data->base->init_vect_0_r); | ||
271 | break; | ||
272 | case CRYP_INIT_VECTOR_INDEX_1: | ||
273 | writel_relaxed(init_vector_value.init_value_left, | ||
274 | &device_data->base->init_vect_1_l); | ||
275 | writel_relaxed(init_vector_value.init_value_right, | ||
276 | &device_data->base->init_vect_1_r); | ||
277 | break; | ||
278 | default: | ||
279 | return -EINVAL; | ||
280 | } | ||
281 | |||
282 | return 0; | ||
283 | } | ||
284 | |||
285 | /** | ||
286 | * cryp_save_device_context - Store hardware registers and | ||
287 | * other device context parameter | ||
288 | * @device_data: Pointer to the device data struct for base address. | ||
289 | * @ctx: Crypto device context | ||
290 | */ | ||
291 | void cryp_save_device_context(struct cryp_device_data *device_data, | ||
292 | struct cryp_device_context *ctx, | ||
293 | int cryp_mode) | ||
294 | { | ||
295 | enum cryp_algo_mode algomode; | ||
296 | struct cryp_register *src_reg = device_data->base; | ||
297 | struct cryp_config *config = | ||
298 | (struct cryp_config *)device_data->current_ctx; | ||
299 | |||
300 | /* | ||
301 | * Always start by disable the hardware and wait for it to finish the | ||
302 | * ongoing calculations before trying to reprogram it. | ||
303 | */ | ||
304 | cryp_activity(device_data, CRYP_CRYPEN_DISABLE); | ||
305 | cryp_wait_until_done(device_data); | ||
306 | |||
307 | if (cryp_mode == CRYP_MODE_DMA) | ||
308 | cryp_configure_for_dma(device_data, CRYP_DMA_DISABLE_BOTH); | ||
309 | |||
310 | if (CRYP_TEST_BITS(&src_reg->sr, CRYP_SR_IFEM_MASK) == 0) | ||
311 | ctx->din = readl_relaxed(&src_reg->din); | ||
312 | |||
313 | ctx->cr = readl_relaxed(&src_reg->cr) & CRYP_CR_CONTEXT_SAVE_MASK; | ||
314 | |||
315 | switch (config->keysize) { | ||
316 | case CRYP_KEY_SIZE_256: | ||
317 | ctx->key_4_l = readl_relaxed(&src_reg->key_4_l); | ||
318 | ctx->key_4_r = readl_relaxed(&src_reg->key_4_r); | ||
319 | |||
320 | case CRYP_KEY_SIZE_192: | ||
321 | ctx->key_3_l = readl_relaxed(&src_reg->key_3_l); | ||
322 | ctx->key_3_r = readl_relaxed(&src_reg->key_3_r); | ||
323 | |||
324 | case CRYP_KEY_SIZE_128: | ||
325 | ctx->key_2_l = readl_relaxed(&src_reg->key_2_l); | ||
326 | ctx->key_2_r = readl_relaxed(&src_reg->key_2_r); | ||
327 | |||
328 | default: | ||
329 | ctx->key_1_l = readl_relaxed(&src_reg->key_1_l); | ||
330 | ctx->key_1_r = readl_relaxed(&src_reg->key_1_r); | ||
331 | } | ||
332 | |||
333 | /* Save IV for CBC mode for both AES and DES. */ | ||
334 | algomode = ((ctx->cr & CRYP_CR_ALGOMODE_MASK) >> CRYP_CR_ALGOMODE_POS); | ||
335 | if (algomode == CRYP_ALGO_TDES_CBC || | ||
336 | algomode == CRYP_ALGO_DES_CBC || | ||
337 | algomode == CRYP_ALGO_AES_CBC) { | ||
338 | ctx->init_vect_0_l = readl_relaxed(&src_reg->init_vect_0_l); | ||
339 | ctx->init_vect_0_r = readl_relaxed(&src_reg->init_vect_0_r); | ||
340 | ctx->init_vect_1_l = readl_relaxed(&src_reg->init_vect_1_l); | ||
341 | ctx->init_vect_1_r = readl_relaxed(&src_reg->init_vect_1_r); | ||
342 | } | ||
343 | } | ||
344 | |||
345 | /** | ||
346 | * cryp_restore_device_context - Restore hardware registers and | ||
347 | * other device context parameter | ||
348 | * @device_data: Pointer to the device data struct for base address. | ||
349 | * @ctx: Crypto device context | ||
350 | */ | ||
351 | void cryp_restore_device_context(struct cryp_device_data *device_data, | ||
352 | struct cryp_device_context *ctx) | ||
353 | { | ||
354 | struct cryp_register *reg = device_data->base; | ||
355 | struct cryp_config *config = | ||
356 | (struct cryp_config *)device_data->current_ctx; | ||
357 | |||
358 | /* | ||
359 | * Fall through for all items in switch statement. DES is captured in | ||
360 | * the default. | ||
361 | */ | ||
362 | switch (config->keysize) { | ||
363 | case CRYP_KEY_SIZE_256: | ||
364 | writel_relaxed(ctx->key_4_l, ®->key_4_l); | ||
365 | writel_relaxed(ctx->key_4_r, ®->key_4_r); | ||
366 | |||
367 | case CRYP_KEY_SIZE_192: | ||
368 | writel_relaxed(ctx->key_3_l, ®->key_3_l); | ||
369 | writel_relaxed(ctx->key_3_r, ®->key_3_r); | ||
370 | |||
371 | case CRYP_KEY_SIZE_128: | ||
372 | writel_relaxed(ctx->key_2_l, ®->key_2_l); | ||
373 | writel_relaxed(ctx->key_2_r, ®->key_2_r); | ||
374 | |||
375 | default: | ||
376 | writel_relaxed(ctx->key_1_l, ®->key_1_l); | ||
377 | writel_relaxed(ctx->key_1_r, ®->key_1_r); | ||
378 | } | ||
379 | |||
380 | /* Restore IV for CBC mode for AES and DES. */ | ||
381 | if (config->algomode == CRYP_ALGO_TDES_CBC || | ||
382 | config->algomode == CRYP_ALGO_DES_CBC || | ||
383 | config->algomode == CRYP_ALGO_AES_CBC) { | ||
384 | writel_relaxed(ctx->init_vect_0_l, ®->init_vect_0_l); | ||
385 | writel_relaxed(ctx->init_vect_0_r, ®->init_vect_0_r); | ||
386 | writel_relaxed(ctx->init_vect_1_l, ®->init_vect_1_l); | ||
387 | writel_relaxed(ctx->init_vect_1_r, ®->init_vect_1_r); | ||
388 | } | ||
389 | } | ||
diff --git a/drivers/crypto/ux500/cryp/cryp.h b/drivers/crypto/ux500/cryp/cryp.h new file mode 100644 index 000000000000..14cfd05b777a --- /dev/null +++ b/drivers/crypto/ux500/cryp/cryp.h | |||
@@ -0,0 +1,308 @@ | |||
1 | /** | ||
2 | * Copyright (C) ST-Ericsson SA 2010 | ||
3 | * Author: Shujuan Chen <shujuan.chen@stericsson.com> for ST-Ericsson. | ||
4 | * Author: Jonas Linde <jonas.linde@stericsson.com> for ST-Ericsson. | ||
5 | * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson. | ||
6 | * Author: Berne Hebark <berne.herbark@stericsson.com> for ST-Ericsson. | ||
7 | * Author: Niklas Hernaeus <niklas.hernaeus@stericsson.com> for ST-Ericsson. | ||
8 | * License terms: GNU General Public License (GPL) version 2 | ||
9 | */ | ||
10 | |||
11 | #ifndef _CRYP_H_ | ||
12 | #define _CRYP_H_ | ||
13 | |||
14 | #include <linux/completion.h> | ||
15 | #include <linux/dmaengine.h> | ||
16 | #include <linux/klist.h> | ||
17 | #include <linux/mutex.h> | ||
18 | |||
19 | #define DEV_DBG_NAME "crypX crypX:" | ||
20 | |||
21 | /* CRYP enable/disable */ | ||
22 | enum cryp_crypen { | ||
23 | CRYP_CRYPEN_DISABLE = 0, | ||
24 | CRYP_CRYPEN_ENABLE = 1 | ||
25 | }; | ||
26 | |||
27 | /* CRYP Start Computation enable/disable */ | ||
28 | enum cryp_start { | ||
29 | CRYP_START_DISABLE = 0, | ||
30 | CRYP_START_ENABLE = 1 | ||
31 | }; | ||
32 | |||
33 | /* CRYP Init Signal enable/disable */ | ||
34 | enum cryp_init { | ||
35 | CRYP_INIT_DISABLE = 0, | ||
36 | CRYP_INIT_ENABLE = 1 | ||
37 | }; | ||
38 | |||
39 | /* Cryp State enable/disable */ | ||
40 | enum cryp_state { | ||
41 | CRYP_STATE_DISABLE = 0, | ||
42 | CRYP_STATE_ENABLE = 1 | ||
43 | }; | ||
44 | |||
45 | /* Key preparation bit enable */ | ||
46 | enum cryp_key_prep { | ||
47 | KSE_DISABLED = 0, | ||
48 | KSE_ENABLED = 1 | ||
49 | }; | ||
50 | |||
51 | /* Key size for AES */ | ||
52 | #define CRYP_KEY_SIZE_128 (0) | ||
53 | #define CRYP_KEY_SIZE_192 (1) | ||
54 | #define CRYP_KEY_SIZE_256 (2) | ||
55 | |||
56 | /* AES modes */ | ||
57 | enum cryp_algo_mode { | ||
58 | CRYP_ALGO_TDES_ECB, | ||
59 | CRYP_ALGO_TDES_CBC, | ||
60 | CRYP_ALGO_DES_ECB, | ||
61 | CRYP_ALGO_DES_CBC, | ||
62 | CRYP_ALGO_AES_ECB, | ||
63 | CRYP_ALGO_AES_CBC, | ||
64 | CRYP_ALGO_AES_CTR, | ||
65 | CRYP_ALGO_AES_XTS | ||
66 | }; | ||
67 | |||
68 | /* Cryp Encryption or Decryption */ | ||
69 | enum cryp_algorithm_dir { | ||
70 | CRYP_ALGORITHM_ENCRYPT, | ||
71 | CRYP_ALGORITHM_DECRYPT | ||
72 | }; | ||
73 | |||
74 | /* Hardware access method */ | ||
75 | enum cryp_mode { | ||
76 | CRYP_MODE_POLLING, | ||
77 | CRYP_MODE_INTERRUPT, | ||
78 | CRYP_MODE_DMA | ||
79 | }; | ||
80 | |||
81 | /** | ||
82 | * struct cryp_config - | ||
83 | * @keysize: Key size for AES | ||
84 | * @algomode: AES modes | ||
85 | * @algodir: Cryp Encryption or Decryption | ||
86 | * | ||
87 | * CRYP configuration structure to be passed to set configuration | ||
88 | */ | ||
89 | struct cryp_config { | ||
90 | int keysize; | ||
91 | enum cryp_algo_mode algomode; | ||
92 | enum cryp_algorithm_dir algodir; | ||
93 | }; | ||
94 | |||
95 | /** | ||
96 | * struct cryp_protection_config - | ||
97 | * @privilege_access: Privileged cryp state enable/disable | ||
98 | * @secure_access: Secure cryp state enable/disable | ||
99 | * | ||
100 | * Protection configuration structure for setting privilage access | ||
101 | */ | ||
102 | struct cryp_protection_config { | ||
103 | enum cryp_state privilege_access; | ||
104 | enum cryp_state secure_access; | ||
105 | }; | ||
106 | |||
107 | /* Cryp status */ | ||
108 | enum cryp_status_id { | ||
109 | CRYP_STATUS_BUSY = 0x10, | ||
110 | CRYP_STATUS_OUTPUT_FIFO_FULL = 0x08, | ||
111 | CRYP_STATUS_OUTPUT_FIFO_NOT_EMPTY = 0x04, | ||
112 | CRYP_STATUS_INPUT_FIFO_NOT_FULL = 0x02, | ||
113 | CRYP_STATUS_INPUT_FIFO_EMPTY = 0x01 | ||
114 | }; | ||
115 | |||
116 | /* Cryp DMA interface */ | ||
117 | enum cryp_dma_req_type { | ||
118 | CRYP_DMA_DISABLE_BOTH, | ||
119 | CRYP_DMA_ENABLE_IN_DATA, | ||
120 | CRYP_DMA_ENABLE_OUT_DATA, | ||
121 | CRYP_DMA_ENABLE_BOTH_DIRECTIONS | ||
122 | }; | ||
123 | |||
124 | enum cryp_dma_channel { | ||
125 | CRYP_DMA_RX = 0, | ||
126 | CRYP_DMA_TX | ||
127 | }; | ||
128 | |||
129 | /* Key registers */ | ||
130 | enum cryp_key_reg_index { | ||
131 | CRYP_KEY_REG_1, | ||
132 | CRYP_KEY_REG_2, | ||
133 | CRYP_KEY_REG_3, | ||
134 | CRYP_KEY_REG_4 | ||
135 | }; | ||
136 | |||
137 | /* Key register left and right */ | ||
138 | struct cryp_key_value { | ||
139 | u32 key_value_left; | ||
140 | u32 key_value_right; | ||
141 | }; | ||
142 | |||
143 | /* Cryp Initialization structure */ | ||
144 | enum cryp_init_vector_index { | ||
145 | CRYP_INIT_VECTOR_INDEX_0, | ||
146 | CRYP_INIT_VECTOR_INDEX_1 | ||
147 | }; | ||
148 | |||
149 | /* struct cryp_init_vector_value - | ||
150 | * @init_value_left | ||
151 | * @init_value_right | ||
152 | * */ | ||
153 | struct cryp_init_vector_value { | ||
154 | u32 init_value_left; | ||
155 | u32 init_value_right; | ||
156 | }; | ||
157 | |||
158 | /** | ||
159 | * struct cryp_device_context - structure for a cryp context. | ||
160 | * @cr: control register | ||
161 | * @dmacr: DMA control register | ||
162 | * @imsc: Interrupt mask set/clear register | ||
163 | * @key_1_l: Key 1l register | ||
164 | * @key_1_r: Key 1r register | ||
165 | * @key_2_l: Key 2l register | ||
166 | * @key_2_r: Key 2r register | ||
167 | * @key_3_l: Key 3l register | ||
168 | * @key_3_r: Key 3r register | ||
169 | * @key_4_l: Key 4l register | ||
170 | * @key_4_r: Key 4r register | ||
171 | * @init_vect_0_l: Initialization vector 0l register | ||
172 | * @init_vect_0_r: Initialization vector 0r register | ||
173 | * @init_vect_1_l: Initialization vector 1l register | ||
174 | * @init_vect_1_r: Initialization vector 0r register | ||
175 | * @din: Data in register | ||
176 | * @dout: Data out register | ||
177 | * | ||
178 | * CRYP power management specifc structure. | ||
179 | */ | ||
180 | struct cryp_device_context { | ||
181 | u32 cr; | ||
182 | u32 dmacr; | ||
183 | u32 imsc; | ||
184 | |||
185 | u32 key_1_l; | ||
186 | u32 key_1_r; | ||
187 | u32 key_2_l; | ||
188 | u32 key_2_r; | ||
189 | u32 key_3_l; | ||
190 | u32 key_3_r; | ||
191 | u32 key_4_l; | ||
192 | u32 key_4_r; | ||
193 | |||
194 | u32 init_vect_0_l; | ||
195 | u32 init_vect_0_r; | ||
196 | u32 init_vect_1_l; | ||
197 | u32 init_vect_1_r; | ||
198 | |||
199 | u32 din; | ||
200 | u32 dout; | ||
201 | }; | ||
202 | |||
203 | struct cryp_dma { | ||
204 | dma_cap_mask_t mask; | ||
205 | struct completion cryp_dma_complete; | ||
206 | struct dma_chan *chan_cryp2mem; | ||
207 | struct dma_chan *chan_mem2cryp; | ||
208 | struct stedma40_chan_cfg *cfg_cryp2mem; | ||
209 | struct stedma40_chan_cfg *cfg_mem2cryp; | ||
210 | int sg_src_len; | ||
211 | int sg_dst_len; | ||
212 | struct scatterlist *sg_src; | ||
213 | struct scatterlist *sg_dst; | ||
214 | int nents_src; | ||
215 | int nents_dst; | ||
216 | }; | ||
217 | |||
218 | /** | ||
219 | * struct cryp_device_data - structure for a cryp device. | ||
220 | * @base: Pointer to the hardware base address. | ||
221 | * @dev: Pointer to the devices dev structure. | ||
222 | * @clk: Pointer to the device's clock control. | ||
223 | * @pwr_regulator: Pointer to the device's power control. | ||
224 | * @power_status: Current status of the power. | ||
225 | * @ctx_lock: Lock for current_ctx. | ||
226 | * @current_ctx: Pointer to the currently allocated context. | ||
227 | * @list_node: For inclusion into a klist. | ||
228 | * @dma: The dma structure holding channel configuration. | ||
229 | * @power_state: TRUE = power state on, FALSE = power state off. | ||
230 | * @power_state_spinlock: Spinlock for power_state. | ||
231 | * @restore_dev_ctx: TRUE = saved ctx, FALSE = no saved ctx. | ||
232 | */ | ||
233 | struct cryp_device_data { | ||
234 | struct cryp_register __iomem *base; | ||
235 | struct device *dev; | ||
236 | struct clk *clk; | ||
237 | struct regulator *pwr_regulator; | ||
238 | int power_status; | ||
239 | struct spinlock ctx_lock; | ||
240 | struct cryp_ctx *current_ctx; | ||
241 | struct klist_node list_node; | ||
242 | struct cryp_dma dma; | ||
243 | bool power_state; | ||
244 | struct spinlock power_state_spinlock; | ||
245 | bool restore_dev_ctx; | ||
246 | }; | ||
247 | |||
248 | void cryp_wait_until_done(struct cryp_device_data *device_data); | ||
249 | |||
250 | /* Initialization functions */ | ||
251 | |||
252 | int cryp_check(struct cryp_device_data *device_data); | ||
253 | |||
254 | void cryp_activity(struct cryp_device_data *device_data, | ||
255 | enum cryp_crypen cryp_crypen); | ||
256 | |||
257 | void cryp_flush_inoutfifo(struct cryp_device_data *device_data); | ||
258 | |||
259 | int cryp_set_configuration(struct cryp_device_data *device_data, | ||
260 | struct cryp_config *cryp_config, | ||
261 | u32 *control_register); | ||
262 | |||
263 | void cryp_configure_for_dma(struct cryp_device_data *device_data, | ||
264 | enum cryp_dma_req_type dma_req); | ||
265 | |||
266 | int cryp_configure_key_values(struct cryp_device_data *device_data, | ||
267 | enum cryp_key_reg_index key_reg_index, | ||
268 | struct cryp_key_value key_value); | ||
269 | |||
270 | int cryp_configure_init_vector(struct cryp_device_data *device_data, | ||
271 | enum cryp_init_vector_index | ||
272 | init_vector_index, | ||
273 | struct cryp_init_vector_value | ||
274 | init_vector_value); | ||
275 | |||
276 | int cryp_configure_protection(struct cryp_device_data *device_data, | ||
277 | struct cryp_protection_config *p_protect_config); | ||
278 | |||
279 | /* Power management funtions */ | ||
280 | void cryp_save_device_context(struct cryp_device_data *device_data, | ||
281 | struct cryp_device_context *ctx, | ||
282 | int cryp_mode); | ||
283 | |||
284 | void cryp_restore_device_context(struct cryp_device_data *device_data, | ||
285 | struct cryp_device_context *ctx); | ||
286 | |||
287 | /* Data transfer and status bits. */ | ||
288 | int cryp_is_logic_busy(struct cryp_device_data *device_data); | ||
289 | |||
290 | int cryp_get_status(struct cryp_device_data *device_data); | ||
291 | |||
292 | /** | ||
293 | * cryp_write_indata - This routine writes 32 bit data into the data input | ||
294 | * register of the cryptography IP. | ||
295 | * @device_data: Pointer to the device data struct for base address. | ||
296 | * @write_data: Data to write. | ||
297 | */ | ||
298 | int cryp_write_indata(struct cryp_device_data *device_data, u32 write_data); | ||
299 | |||
300 | /** | ||
301 | * cryp_read_outdata - This routine reads the data from the data output | ||
302 | * register of the CRYP logic | ||
303 | * @device_data: Pointer to the device data struct for base address. | ||
304 | * @read_data: Read the data from the output FIFO. | ||
305 | */ | ||
306 | int cryp_read_outdata(struct cryp_device_data *device_data, u32 *read_data); | ||
307 | |||
308 | #endif /* _CRYP_H_ */ | ||
diff --git a/drivers/crypto/ux500/cryp/cryp_core.c b/drivers/crypto/ux500/cryp/cryp_core.c new file mode 100644 index 000000000000..7cac12793a4b --- /dev/null +++ b/drivers/crypto/ux500/cryp/cryp_core.c | |||
@@ -0,0 +1,1784 @@ | |||
1 | /** | ||
2 | * Copyright (C) ST-Ericsson SA 2010 | ||
3 | * Author: Shujuan Chen <shujuan.chen@stericsson.com> for ST-Ericsson. | ||
4 | * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson. | ||
5 | * Author: Berne Hebark <berne.herbark@stericsson.com> for ST-Ericsson. | ||
6 | * Author: Niklas Hernaeus <niklas.hernaeus@stericsson.com> for ST-Ericsson. | ||
7 | * Author: Jonas Linde <jonas.linde@stericsson.com> for ST-Ericsson. | ||
8 | * Author: Andreas Westin <andreas.westin@stericsson.com> for ST-Ericsson. | ||
9 | * License terms: GNU General Public License (GPL) version 2 | ||
10 | */ | ||
11 | |||
12 | #include <linux/clk.h> | ||
13 | #include <linux/completion.h> | ||
14 | #include <linux/crypto.h> | ||
15 | #include <linux/dmaengine.h> | ||
16 | #include <linux/err.h> | ||
17 | #include <linux/errno.h> | ||
18 | #include <linux/interrupt.h> | ||
19 | #include <linux/io.h> | ||
20 | #include <linux/irqreturn.h> | ||
21 | #include <linux/klist.h> | ||
22 | #include <linux/module.h> | ||
23 | #include <linux/platform_device.h> | ||
24 | #include <linux/regulator/consumer.h> | ||
25 | #include <linux/semaphore.h> | ||
26 | |||
27 | #include <crypto/aes.h> | ||
28 | #include <crypto/algapi.h> | ||
29 | #include <crypto/ctr.h> | ||
30 | #include <crypto/des.h> | ||
31 | #include <crypto/scatterwalk.h> | ||
32 | |||
33 | #include <plat/ste_dma40.h> | ||
34 | |||
35 | #include <mach/crypto-ux500.h> | ||
36 | #include <mach/hardware.h> | ||
37 | |||
38 | #include "cryp_p.h" | ||
39 | #include "cryp.h" | ||
40 | |||
41 | #define CRYP_MAX_KEY_SIZE 32 | ||
42 | #define BYTES_PER_WORD 4 | ||
43 | |||
44 | static int cryp_mode; | ||
45 | static atomic_t session_id; | ||
46 | |||
47 | static struct stedma40_chan_cfg *mem_to_engine; | ||
48 | static struct stedma40_chan_cfg *engine_to_mem; | ||
49 | |||
50 | /** | ||
51 | * struct cryp_driver_data - data specific to the driver. | ||
52 | * | ||
53 | * @device_list: A list of registered devices to choose from. | ||
54 | * @device_allocation: A semaphore initialized with number of devices. | ||
55 | */ | ||
56 | struct cryp_driver_data { | ||
57 | struct klist device_list; | ||
58 | struct semaphore device_allocation; | ||
59 | }; | ||
60 | |||
61 | /** | ||
62 | * struct cryp_ctx - Crypto context | ||
63 | * @config: Crypto mode. | ||
64 | * @key[CRYP_MAX_KEY_SIZE]: Key. | ||
65 | * @keylen: Length of key. | ||
66 | * @iv: Pointer to initialization vector. | ||
67 | * @indata: Pointer to indata. | ||
68 | * @outdata: Pointer to outdata. | ||
69 | * @datalen: Length of indata. | ||
70 | * @outlen: Length of outdata. | ||
71 | * @blocksize: Size of blocks. | ||
72 | * @updated: Updated flag. | ||
73 | * @dev_ctx: Device dependent context. | ||
74 | * @device: Pointer to the device. | ||
75 | */ | ||
76 | struct cryp_ctx { | ||
77 | struct cryp_config config; | ||
78 | u8 key[CRYP_MAX_KEY_SIZE]; | ||
79 | u32 keylen; | ||
80 | u8 *iv; | ||
81 | const u8 *indata; | ||
82 | u8 *outdata; | ||
83 | u32 datalen; | ||
84 | u32 outlen; | ||
85 | u32 blocksize; | ||
86 | u8 updated; | ||
87 | struct cryp_device_context dev_ctx; | ||
88 | struct cryp_device_data *device; | ||
89 | u32 session_id; | ||
90 | }; | ||
91 | |||
92 | static struct cryp_driver_data driver_data; | ||
93 | |||
94 | /** | ||
95 | * uint8p_to_uint32_be - 4*uint8 to uint32 big endian | ||
96 | * @in: Data to convert. | ||
97 | */ | ||
98 | static inline u32 uint8p_to_uint32_be(u8 *in) | ||
99 | { | ||
100 | u32 *data = (u32 *)in; | ||
101 | |||
102 | return cpu_to_be32p(data); | ||
103 | } | ||
104 | |||
105 | /** | ||
106 | * swap_bits_in_byte - mirror the bits in a byte | ||
107 | * @b: the byte to be mirrored | ||
108 | * | ||
109 | * The bits are swapped the following way: | ||
110 | * Byte b include bits 0-7, nibble 1 (n1) include bits 0-3 and | ||
111 | * nibble 2 (n2) bits 4-7. | ||
112 | * | ||
113 | * Nibble 1 (n1): | ||
114 | * (The "old" (moved) bit is replaced with a zero) | ||
115 | * 1. Move bit 6 and 7, 4 positions to the left. | ||
116 | * 2. Move bit 3 and 5, 2 positions to the left. | ||
117 | * 3. Move bit 1-4, 1 position to the left. | ||
118 | * | ||
119 | * Nibble 2 (n2): | ||
120 | * 1. Move bit 0 and 1, 4 positions to the right. | ||
121 | * 2. Move bit 2 and 4, 2 positions to the right. | ||
122 | * 3. Move bit 3-6, 1 position to the right. | ||
123 | * | ||
124 | * Combine the two nibbles to a complete and swapped byte. | ||
125 | */ | ||
126 | |||
127 | static inline u8 swap_bits_in_byte(u8 b) | ||
128 | { | ||
129 | #define R_SHIFT_4_MASK 0xc0 /* Bits 6 and 7, right shift 4 */ | ||
130 | #define R_SHIFT_2_MASK 0x28 /* (After right shift 4) Bits 3 and 5, | ||
131 | right shift 2 */ | ||
132 | #define R_SHIFT_1_MASK 0x1e /* (After right shift 2) Bits 1-4, | ||
133 | right shift 1 */ | ||
134 | #define L_SHIFT_4_MASK 0x03 /* Bits 0 and 1, left shift 4 */ | ||
135 | #define L_SHIFT_2_MASK 0x14 /* (After left shift 4) Bits 2 and 4, | ||
136 | left shift 2 */ | ||
137 | #define L_SHIFT_1_MASK 0x78 /* (After left shift 1) Bits 3-6, | ||
138 | left shift 1 */ | ||
139 | |||
140 | u8 n1; | ||
141 | u8 n2; | ||
142 | |||
143 | /* Swap most significant nibble */ | ||
144 | /* Right shift 4, bits 6 and 7 */ | ||
145 | n1 = ((b & R_SHIFT_4_MASK) >> 4) | (b & ~(R_SHIFT_4_MASK >> 4)); | ||
146 | /* Right shift 2, bits 3 and 5 */ | ||
147 | n1 = ((n1 & R_SHIFT_2_MASK) >> 2) | (n1 & ~(R_SHIFT_2_MASK >> 2)); | ||
148 | /* Right shift 1, bits 1-4 */ | ||
149 | n1 = (n1 & R_SHIFT_1_MASK) >> 1; | ||
150 | |||
151 | /* Swap least significant nibble */ | ||
152 | /* Left shift 4, bits 0 and 1 */ | ||
153 | n2 = ((b & L_SHIFT_4_MASK) << 4) | (b & ~(L_SHIFT_4_MASK << 4)); | ||
154 | /* Left shift 2, bits 2 and 4 */ | ||
155 | n2 = ((n2 & L_SHIFT_2_MASK) << 2) | (n2 & ~(L_SHIFT_2_MASK << 2)); | ||
156 | /* Left shift 1, bits 3-6 */ | ||
157 | n2 = (n2 & L_SHIFT_1_MASK) << 1; | ||
158 | |||
159 | return n1 | n2; | ||
160 | } | ||
161 | |||
162 | static inline void swap_words_in_key_and_bits_in_byte(const u8 *in, | ||
163 | u8 *out, u32 len) | ||
164 | { | ||
165 | unsigned int i = 0; | ||
166 | int j; | ||
167 | int index = 0; | ||
168 | |||
169 | j = len - BYTES_PER_WORD; | ||
170 | while (j >= 0) { | ||
171 | for (i = 0; i < BYTES_PER_WORD; i++) { | ||
172 | index = len - j - BYTES_PER_WORD + i; | ||
173 | out[j + i] = | ||
174 | swap_bits_in_byte(in[index]); | ||
175 | } | ||
176 | j -= BYTES_PER_WORD; | ||
177 | } | ||
178 | } | ||
179 | |||
180 | static void add_session_id(struct cryp_ctx *ctx) | ||
181 | { | ||
182 | /* | ||
183 | * We never want 0 to be a valid value, since this is the default value | ||
184 | * for the software context. | ||
185 | */ | ||
186 | if (unlikely(atomic_inc_and_test(&session_id))) | ||
187 | atomic_inc(&session_id); | ||
188 | |||
189 | ctx->session_id = atomic_read(&session_id); | ||
190 | } | ||
191 | |||
192 | static irqreturn_t cryp_interrupt_handler(int irq, void *param) | ||
193 | { | ||
194 | struct cryp_ctx *ctx; | ||
195 | int i; | ||
196 | struct cryp_device_data *device_data; | ||
197 | |||
198 | if (param == NULL) { | ||
199 | BUG_ON(!param); | ||
200 | return IRQ_HANDLED; | ||
201 | } | ||
202 | |||
203 | /* The device is coming from the one found in hw_crypt_noxts. */ | ||
204 | device_data = (struct cryp_device_data *)param; | ||
205 | |||
206 | ctx = device_data->current_ctx; | ||
207 | |||
208 | if (ctx == NULL) { | ||
209 | BUG_ON(!ctx); | ||
210 | return IRQ_HANDLED; | ||
211 | } | ||
212 | |||
213 | dev_dbg(ctx->device->dev, "[%s] (len: %d) %s, ", __func__, ctx->outlen, | ||
214 | cryp_pending_irq_src(device_data, CRYP_IRQ_SRC_OUTPUT_FIFO) ? | ||
215 | "out" : "in"); | ||
216 | |||
217 | if (cryp_pending_irq_src(device_data, | ||
218 | CRYP_IRQ_SRC_OUTPUT_FIFO)) { | ||
219 | if (ctx->outlen / ctx->blocksize > 0) { | ||
220 | for (i = 0; i < ctx->blocksize / 4; i++) { | ||
221 | *(ctx->outdata) = readl_relaxed( | ||
222 | &device_data->base->dout); | ||
223 | ctx->outdata += 4; | ||
224 | ctx->outlen -= 4; | ||
225 | } | ||
226 | |||
227 | if (ctx->outlen == 0) { | ||
228 | cryp_disable_irq_src(device_data, | ||
229 | CRYP_IRQ_SRC_OUTPUT_FIFO); | ||
230 | } | ||
231 | } | ||
232 | } else if (cryp_pending_irq_src(device_data, | ||
233 | CRYP_IRQ_SRC_INPUT_FIFO)) { | ||
234 | if (ctx->datalen / ctx->blocksize > 0) { | ||
235 | for (i = 0 ; i < ctx->blocksize / 4; i++) { | ||
236 | writel_relaxed(ctx->indata, | ||
237 | &device_data->base->din); | ||
238 | ctx->indata += 4; | ||
239 | ctx->datalen -= 4; | ||
240 | } | ||
241 | |||
242 | if (ctx->datalen == 0) | ||
243 | cryp_disable_irq_src(device_data, | ||
244 | CRYP_IRQ_SRC_INPUT_FIFO); | ||
245 | |||
246 | if (ctx->config.algomode == CRYP_ALGO_AES_XTS) { | ||
247 | CRYP_PUT_BITS(&device_data->base->cr, | ||
248 | CRYP_START_ENABLE, | ||
249 | CRYP_CR_START_POS, | ||
250 | CRYP_CR_START_MASK); | ||
251 | |||
252 | cryp_wait_until_done(device_data); | ||
253 | } | ||
254 | } | ||
255 | } | ||
256 | |||
257 | return IRQ_HANDLED; | ||
258 | } | ||
259 | |||
260 | static int mode_is_aes(enum cryp_algo_mode mode) | ||
261 | { | ||
262 | return CRYP_ALGO_AES_ECB == mode || | ||
263 | CRYP_ALGO_AES_CBC == mode || | ||
264 | CRYP_ALGO_AES_CTR == mode || | ||
265 | CRYP_ALGO_AES_XTS == mode; | ||
266 | } | ||
267 | |||
268 | static int cfg_iv(struct cryp_device_data *device_data, u32 left, u32 right, | ||
269 | enum cryp_init_vector_index index) | ||
270 | { | ||
271 | struct cryp_init_vector_value vector_value; | ||
272 | |||
273 | dev_dbg(device_data->dev, "[%s]", __func__); | ||
274 | |||
275 | vector_value.init_value_left = left; | ||
276 | vector_value.init_value_right = right; | ||
277 | |||
278 | return cryp_configure_init_vector(device_data, | ||
279 | index, | ||
280 | vector_value); | ||
281 | } | ||
282 | |||
283 | static int cfg_ivs(struct cryp_device_data *device_data, struct cryp_ctx *ctx) | ||
284 | { | ||
285 | int i; | ||
286 | int status = 0; | ||
287 | int num_of_regs = ctx->blocksize / 8; | ||
288 | u32 iv[AES_BLOCK_SIZE / 4]; | ||
289 | |||
290 | dev_dbg(device_data->dev, "[%s]", __func__); | ||
291 | |||
292 | /* | ||
293 | * Since we loop on num_of_regs we need to have a check in case | ||
294 | * someone provides an incorrect blocksize which would force calling | ||
295 | * cfg_iv with i greater than 2 which is an error. | ||
296 | */ | ||
297 | if (num_of_regs > 2) { | ||
298 | dev_err(device_data->dev, "[%s] Incorrect blocksize %d", | ||
299 | __func__, ctx->blocksize); | ||
300 | return -EINVAL; | ||
301 | } | ||
302 | |||
303 | for (i = 0; i < ctx->blocksize / 4; i++) | ||
304 | iv[i] = uint8p_to_uint32_be(ctx->iv + i*4); | ||
305 | |||
306 | for (i = 0; i < num_of_regs; i++) { | ||
307 | status = cfg_iv(device_data, iv[i*2], iv[i*2+1], | ||
308 | (enum cryp_init_vector_index) i); | ||
309 | if (status != 0) | ||
310 | return status; | ||
311 | } | ||
312 | return status; | ||
313 | } | ||
314 | |||
315 | static int set_key(struct cryp_device_data *device_data, | ||
316 | u32 left_key, | ||
317 | u32 right_key, | ||
318 | enum cryp_key_reg_index index) | ||
319 | { | ||
320 | struct cryp_key_value key_value; | ||
321 | int cryp_error; | ||
322 | |||
323 | dev_dbg(device_data->dev, "[%s]", __func__); | ||
324 | |||
325 | key_value.key_value_left = left_key; | ||
326 | key_value.key_value_right = right_key; | ||
327 | |||
328 | cryp_error = cryp_configure_key_values(device_data, | ||
329 | index, | ||
330 | key_value); | ||
331 | if (cryp_error != 0) | ||
332 | dev_err(device_data->dev, "[%s]: " | ||
333 | "cryp_configure_key_values() failed!", __func__); | ||
334 | |||
335 | return cryp_error; | ||
336 | } | ||
337 | |||
338 | static int cfg_keys(struct cryp_ctx *ctx) | ||
339 | { | ||
340 | int i; | ||
341 | int num_of_regs = ctx->keylen / 8; | ||
342 | u32 swapped_key[CRYP_MAX_KEY_SIZE / 4]; | ||
343 | int cryp_error = 0; | ||
344 | |||
345 | dev_dbg(ctx->device->dev, "[%s]", __func__); | ||
346 | |||
347 | if (mode_is_aes(ctx->config.algomode)) { | ||
348 | swap_words_in_key_and_bits_in_byte((u8 *)ctx->key, | ||
349 | (u8 *)swapped_key, | ||
350 | ctx->keylen); | ||
351 | } else { | ||
352 | for (i = 0; i < ctx->keylen / 4; i++) | ||
353 | swapped_key[i] = uint8p_to_uint32_be(ctx->key + i*4); | ||
354 | } | ||
355 | |||
356 | for (i = 0; i < num_of_regs; i++) { | ||
357 | cryp_error = set_key(ctx->device, | ||
358 | *(((u32 *)swapped_key)+i*2), | ||
359 | *(((u32 *)swapped_key)+i*2+1), | ||
360 | (enum cryp_key_reg_index) i); | ||
361 | |||
362 | if (cryp_error != 0) { | ||
363 | dev_err(ctx->device->dev, "[%s]: set_key() failed!", | ||
364 | __func__); | ||
365 | return cryp_error; | ||
366 | } | ||
367 | } | ||
368 | return cryp_error; | ||
369 | } | ||
370 | |||
371 | static int cryp_setup_context(struct cryp_ctx *ctx, | ||
372 | struct cryp_device_data *device_data) | ||
373 | { | ||
374 | u32 control_register = CRYP_CR_DEFAULT; | ||
375 | |||
376 | switch (cryp_mode) { | ||
377 | case CRYP_MODE_INTERRUPT: | ||
378 | writel_relaxed(CRYP_IMSC_DEFAULT, &device_data->base->imsc); | ||
379 | break; | ||
380 | |||
381 | case CRYP_MODE_DMA: | ||
382 | writel_relaxed(CRYP_DMACR_DEFAULT, &device_data->base->dmacr); | ||
383 | break; | ||
384 | |||
385 | default: | ||
386 | break; | ||
387 | } | ||
388 | |||
389 | if (ctx->updated == 0) { | ||
390 | cryp_flush_inoutfifo(device_data); | ||
391 | if (cfg_keys(ctx) != 0) { | ||
392 | dev_err(ctx->device->dev, "[%s]: cfg_keys failed!", | ||
393 | __func__); | ||
394 | return -EINVAL; | ||
395 | } | ||
396 | |||
397 | if (ctx->iv && | ||
398 | CRYP_ALGO_AES_ECB != ctx->config.algomode && | ||
399 | CRYP_ALGO_DES_ECB != ctx->config.algomode && | ||
400 | CRYP_ALGO_TDES_ECB != ctx->config.algomode) { | ||
401 | if (cfg_ivs(device_data, ctx) != 0) | ||
402 | return -EPERM; | ||
403 | } | ||
404 | |||
405 | cryp_set_configuration(device_data, &ctx->config, | ||
406 | &control_register); | ||
407 | add_session_id(ctx); | ||
408 | } else if (ctx->updated == 1 && | ||
409 | ctx->session_id != atomic_read(&session_id)) { | ||
410 | cryp_flush_inoutfifo(device_data); | ||
411 | cryp_restore_device_context(device_data, &ctx->dev_ctx); | ||
412 | |||
413 | add_session_id(ctx); | ||
414 | control_register = ctx->dev_ctx.cr; | ||
415 | } else | ||
416 | control_register = ctx->dev_ctx.cr; | ||
417 | |||
418 | writel(control_register | | ||
419 | (CRYP_CRYPEN_ENABLE << CRYP_CR_CRYPEN_POS), | ||
420 | &device_data->base->cr); | ||
421 | |||
422 | return 0; | ||
423 | } | ||
424 | |||
425 | static int cryp_get_device_data(struct cryp_ctx *ctx, | ||
426 | struct cryp_device_data **device_data) | ||
427 | { | ||
428 | int ret; | ||
429 | struct klist_iter device_iterator; | ||
430 | struct klist_node *device_node; | ||
431 | struct cryp_device_data *local_device_data = NULL; | ||
432 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
433 | |||
434 | /* Wait until a device is available */ | ||
435 | ret = down_interruptible(&driver_data.device_allocation); | ||
436 | if (ret) | ||
437 | return ret; /* Interrupted */ | ||
438 | |||
439 | /* Select a device */ | ||
440 | klist_iter_init(&driver_data.device_list, &device_iterator); | ||
441 | |||
442 | device_node = klist_next(&device_iterator); | ||
443 | while (device_node) { | ||
444 | local_device_data = container_of(device_node, | ||
445 | struct cryp_device_data, list_node); | ||
446 | spin_lock(&local_device_data->ctx_lock); | ||
447 | /* current_ctx allocates a device, NULL = unallocated */ | ||
448 | if (local_device_data->current_ctx) { | ||
449 | device_node = klist_next(&device_iterator); | ||
450 | } else { | ||
451 | local_device_data->current_ctx = ctx; | ||
452 | ctx->device = local_device_data; | ||
453 | spin_unlock(&local_device_data->ctx_lock); | ||
454 | break; | ||
455 | } | ||
456 | spin_unlock(&local_device_data->ctx_lock); | ||
457 | } | ||
458 | klist_iter_exit(&device_iterator); | ||
459 | |||
460 | if (!device_node) { | ||
461 | /** | ||
462 | * No free device found. | ||
463 | * Since we allocated a device with down_interruptible, this | ||
464 | * should not be able to happen. | ||
465 | * Number of available devices, which are contained in | ||
466 | * device_allocation, is therefore decremented by not doing | ||
467 | * an up(device_allocation). | ||
468 | */ | ||
469 | return -EBUSY; | ||
470 | } | ||
471 | |||
472 | *device_data = local_device_data; | ||
473 | |||
474 | return 0; | ||
475 | } | ||
476 | |||
477 | static void cryp_dma_setup_channel(struct cryp_device_data *device_data, | ||
478 | struct device *dev) | ||
479 | { | ||
480 | dma_cap_zero(device_data->dma.mask); | ||
481 | dma_cap_set(DMA_SLAVE, device_data->dma.mask); | ||
482 | |||
483 | device_data->dma.cfg_mem2cryp = mem_to_engine; | ||
484 | device_data->dma.chan_mem2cryp = | ||
485 | dma_request_channel(device_data->dma.mask, | ||
486 | stedma40_filter, | ||
487 | device_data->dma.cfg_mem2cryp); | ||
488 | |||
489 | device_data->dma.cfg_cryp2mem = engine_to_mem; | ||
490 | device_data->dma.chan_cryp2mem = | ||
491 | dma_request_channel(device_data->dma.mask, | ||
492 | stedma40_filter, | ||
493 | device_data->dma.cfg_cryp2mem); | ||
494 | |||
495 | init_completion(&device_data->dma.cryp_dma_complete); | ||
496 | } | ||
497 | |||
498 | static void cryp_dma_out_callback(void *data) | ||
499 | { | ||
500 | struct cryp_ctx *ctx = (struct cryp_ctx *) data; | ||
501 | dev_dbg(ctx->device->dev, "[%s]: ", __func__); | ||
502 | |||
503 | complete(&ctx->device->dma.cryp_dma_complete); | ||
504 | } | ||
505 | |||
506 | static int cryp_set_dma_transfer(struct cryp_ctx *ctx, | ||
507 | struct scatterlist *sg, | ||
508 | int len, | ||
509 | enum dma_data_direction direction) | ||
510 | { | ||
511 | struct dma_async_tx_descriptor *desc; | ||
512 | struct dma_chan *channel = NULL; | ||
513 | dma_cookie_t cookie; | ||
514 | |||
515 | dev_dbg(ctx->device->dev, "[%s]: ", __func__); | ||
516 | |||
517 | if (unlikely(!IS_ALIGNED((u32)sg, 4))) { | ||
518 | dev_err(ctx->device->dev, "[%s]: Data in sg list isn't " | ||
519 | "aligned! Addr: 0x%08x", __func__, (u32)sg); | ||
520 | return -EFAULT; | ||
521 | } | ||
522 | |||
523 | switch (direction) { | ||
524 | case DMA_TO_DEVICE: | ||
525 | channel = ctx->device->dma.chan_mem2cryp; | ||
526 | ctx->device->dma.sg_src = sg; | ||
527 | ctx->device->dma.sg_src_len = dma_map_sg(channel->device->dev, | ||
528 | ctx->device->dma.sg_src, | ||
529 | ctx->device->dma.nents_src, | ||
530 | direction); | ||
531 | |||
532 | if (!ctx->device->dma.sg_src_len) { | ||
533 | dev_dbg(ctx->device->dev, | ||
534 | "[%s]: Could not map the sg list (TO_DEVICE)", | ||
535 | __func__); | ||
536 | return -EFAULT; | ||
537 | } | ||
538 | |||
539 | dev_dbg(ctx->device->dev, "[%s]: Setting up DMA for buffer " | ||
540 | "(TO_DEVICE)", __func__); | ||
541 | |||
542 | desc = channel->device->device_prep_slave_sg(channel, | ||
543 | ctx->device->dma.sg_src, | ||
544 | ctx->device->dma.sg_src_len, | ||
545 | direction, DMA_CTRL_ACK, NULL); | ||
546 | break; | ||
547 | |||
548 | case DMA_FROM_DEVICE: | ||
549 | channel = ctx->device->dma.chan_cryp2mem; | ||
550 | ctx->device->dma.sg_dst = sg; | ||
551 | ctx->device->dma.sg_dst_len = dma_map_sg(channel->device->dev, | ||
552 | ctx->device->dma.sg_dst, | ||
553 | ctx->device->dma.nents_dst, | ||
554 | direction); | ||
555 | |||
556 | if (!ctx->device->dma.sg_dst_len) { | ||
557 | dev_dbg(ctx->device->dev, | ||
558 | "[%s]: Could not map the sg list (FROM_DEVICE)", | ||
559 | __func__); | ||
560 | return -EFAULT; | ||
561 | } | ||
562 | |||
563 | dev_dbg(ctx->device->dev, "[%s]: Setting up DMA for buffer " | ||
564 | "(FROM_DEVICE)", __func__); | ||
565 | |||
566 | desc = channel->device->device_prep_slave_sg(channel, | ||
567 | ctx->device->dma.sg_dst, | ||
568 | ctx->device->dma.sg_dst_len, | ||
569 | direction, | ||
570 | DMA_CTRL_ACK | | ||
571 | DMA_PREP_INTERRUPT, NULL); | ||
572 | |||
573 | desc->callback = cryp_dma_out_callback; | ||
574 | desc->callback_param = ctx; | ||
575 | break; | ||
576 | |||
577 | default: | ||
578 | dev_dbg(ctx->device->dev, "[%s]: Invalid DMA direction", | ||
579 | __func__); | ||
580 | return -EFAULT; | ||
581 | } | ||
582 | |||
583 | cookie = desc->tx_submit(desc); | ||
584 | dma_async_issue_pending(channel); | ||
585 | |||
586 | return 0; | ||
587 | } | ||
588 | |||
589 | static void cryp_dma_done(struct cryp_ctx *ctx) | ||
590 | { | ||
591 | struct dma_chan *chan; | ||
592 | |||
593 | dev_dbg(ctx->device->dev, "[%s]: ", __func__); | ||
594 | |||
595 | chan = ctx->device->dma.chan_mem2cryp; | ||
596 | chan->device->device_control(chan, DMA_TERMINATE_ALL, 0); | ||
597 | dma_unmap_sg(chan->device->dev, ctx->device->dma.sg_src, | ||
598 | ctx->device->dma.sg_src_len, DMA_TO_DEVICE); | ||
599 | |||
600 | chan = ctx->device->dma.chan_cryp2mem; | ||
601 | chan->device->device_control(chan, DMA_TERMINATE_ALL, 0); | ||
602 | dma_unmap_sg(chan->device->dev, ctx->device->dma.sg_dst, | ||
603 | ctx->device->dma.sg_dst_len, DMA_FROM_DEVICE); | ||
604 | } | ||
605 | |||
606 | static int cryp_dma_write(struct cryp_ctx *ctx, struct scatterlist *sg, | ||
607 | int len) | ||
608 | { | ||
609 | int error = cryp_set_dma_transfer(ctx, sg, len, DMA_TO_DEVICE); | ||
610 | dev_dbg(ctx->device->dev, "[%s]: ", __func__); | ||
611 | |||
612 | if (error) { | ||
613 | dev_dbg(ctx->device->dev, "[%s]: cryp_set_dma_transfer() " | ||
614 | "failed", __func__); | ||
615 | return error; | ||
616 | } | ||
617 | |||
618 | return len; | ||
619 | } | ||
620 | |||
621 | static int cryp_dma_read(struct cryp_ctx *ctx, struct scatterlist *sg, int len) | ||
622 | { | ||
623 | int error = cryp_set_dma_transfer(ctx, sg, len, DMA_FROM_DEVICE); | ||
624 | if (error) { | ||
625 | dev_dbg(ctx->device->dev, "[%s]: cryp_set_dma_transfer() " | ||
626 | "failed", __func__); | ||
627 | return error; | ||
628 | } | ||
629 | |||
630 | return len; | ||
631 | } | ||
632 | |||
633 | static void cryp_polling_mode(struct cryp_ctx *ctx, | ||
634 | struct cryp_device_data *device_data) | ||
635 | { | ||
636 | int len = ctx->blocksize / BYTES_PER_WORD; | ||
637 | int remaining_length = ctx->datalen; | ||
638 | u32 *indata = (u32 *)ctx->indata; | ||
639 | u32 *outdata = (u32 *)ctx->outdata; | ||
640 | |||
641 | while (remaining_length > 0) { | ||
642 | writesl(&device_data->base->din, indata, len); | ||
643 | indata += len; | ||
644 | remaining_length -= (len * BYTES_PER_WORD); | ||
645 | cryp_wait_until_done(device_data); | ||
646 | |||
647 | readsl(&device_data->base->dout, outdata, len); | ||
648 | outdata += len; | ||
649 | cryp_wait_until_done(device_data); | ||
650 | } | ||
651 | } | ||
652 | |||
653 | static int cryp_disable_power(struct device *dev, | ||
654 | struct cryp_device_data *device_data, | ||
655 | bool save_device_context) | ||
656 | { | ||
657 | int ret = 0; | ||
658 | |||
659 | dev_dbg(dev, "[%s]", __func__); | ||
660 | |||
661 | spin_lock(&device_data->power_state_spinlock); | ||
662 | if (!device_data->power_state) | ||
663 | goto out; | ||
664 | |||
665 | spin_lock(&device_data->ctx_lock); | ||
666 | if (save_device_context && device_data->current_ctx) { | ||
667 | cryp_save_device_context(device_data, | ||
668 | &device_data->current_ctx->dev_ctx, | ||
669 | cryp_mode); | ||
670 | device_data->restore_dev_ctx = true; | ||
671 | } | ||
672 | spin_unlock(&device_data->ctx_lock); | ||
673 | |||
674 | clk_disable(device_data->clk); | ||
675 | ret = regulator_disable(device_data->pwr_regulator); | ||
676 | if (ret) | ||
677 | dev_err(dev, "[%s]: " | ||
678 | "regulator_disable() failed!", | ||
679 | __func__); | ||
680 | |||
681 | device_data->power_state = false; | ||
682 | |||
683 | out: | ||
684 | spin_unlock(&device_data->power_state_spinlock); | ||
685 | |||
686 | return ret; | ||
687 | } | ||
688 | |||
689 | static int cryp_enable_power( | ||
690 | struct device *dev, | ||
691 | struct cryp_device_data *device_data, | ||
692 | bool restore_device_context) | ||
693 | { | ||
694 | int ret = 0; | ||
695 | |||
696 | dev_dbg(dev, "[%s]", __func__); | ||
697 | |||
698 | spin_lock(&device_data->power_state_spinlock); | ||
699 | if (!device_data->power_state) { | ||
700 | ret = regulator_enable(device_data->pwr_regulator); | ||
701 | if (ret) { | ||
702 | dev_err(dev, "[%s]: regulator_enable() failed!", | ||
703 | __func__); | ||
704 | goto out; | ||
705 | } | ||
706 | |||
707 | ret = clk_enable(device_data->clk); | ||
708 | if (ret) { | ||
709 | dev_err(dev, "[%s]: clk_enable() failed!", | ||
710 | __func__); | ||
711 | regulator_disable(device_data->pwr_regulator); | ||
712 | goto out; | ||
713 | } | ||
714 | device_data->power_state = true; | ||
715 | } | ||
716 | |||
717 | if (device_data->restore_dev_ctx) { | ||
718 | spin_lock(&device_data->ctx_lock); | ||
719 | if (restore_device_context && device_data->current_ctx) { | ||
720 | device_data->restore_dev_ctx = false; | ||
721 | cryp_restore_device_context(device_data, | ||
722 | &device_data->current_ctx->dev_ctx); | ||
723 | } | ||
724 | spin_unlock(&device_data->ctx_lock); | ||
725 | } | ||
726 | out: | ||
727 | spin_unlock(&device_data->power_state_spinlock); | ||
728 | |||
729 | return ret; | ||
730 | } | ||
731 | |||
732 | static int hw_crypt_noxts(struct cryp_ctx *ctx, | ||
733 | struct cryp_device_data *device_data) | ||
734 | { | ||
735 | int ret = 0; | ||
736 | |||
737 | const u8 *indata = ctx->indata; | ||
738 | u8 *outdata = ctx->outdata; | ||
739 | u32 datalen = ctx->datalen; | ||
740 | u32 outlen = datalen; | ||
741 | |||
742 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
743 | |||
744 | ctx->outlen = ctx->datalen; | ||
745 | |||
746 | if (unlikely(!IS_ALIGNED((u32)indata, 4))) { | ||
747 | pr_debug(DEV_DBG_NAME " [%s]: Data isn't aligned! Addr: " | ||
748 | "0x%08x", __func__, (u32)indata); | ||
749 | return -EINVAL; | ||
750 | } | ||
751 | |||
752 | ret = cryp_setup_context(ctx, device_data); | ||
753 | |||
754 | if (ret) | ||
755 | goto out; | ||
756 | |||
757 | if (cryp_mode == CRYP_MODE_INTERRUPT) { | ||
758 | cryp_enable_irq_src(device_data, CRYP_IRQ_SRC_INPUT_FIFO | | ||
759 | CRYP_IRQ_SRC_OUTPUT_FIFO); | ||
760 | |||
761 | /* | ||
762 | * ctx->outlen is decremented in the cryp_interrupt_handler | ||
763 | * function. We had to add cpu_relax() (barrier) to make sure | ||
764 | * that gcc didn't optimze away this variable. | ||
765 | */ | ||
766 | while (ctx->outlen > 0) | ||
767 | cpu_relax(); | ||
768 | } else if (cryp_mode == CRYP_MODE_POLLING || | ||
769 | cryp_mode == CRYP_MODE_DMA) { | ||
770 | /* | ||
771 | * The reason for having DMA in this if case is that if we are | ||
772 | * running cryp_mode = 2, then we separate DMA routines for | ||
773 | * handling cipher/plaintext > blocksize, except when | ||
774 | * running the normal CRYPTO_ALG_TYPE_CIPHER, then we still use | ||
775 | * the polling mode. Overhead of doing DMA setup eats up the | ||
776 | * benefits using it. | ||
777 | */ | ||
778 | cryp_polling_mode(ctx, device_data); | ||
779 | } else { | ||
780 | dev_err(ctx->device->dev, "[%s]: Invalid operation mode!", | ||
781 | __func__); | ||
782 | ret = -EPERM; | ||
783 | goto out; | ||
784 | } | ||
785 | |||
786 | cryp_save_device_context(device_data, &ctx->dev_ctx, cryp_mode); | ||
787 | ctx->updated = 1; | ||
788 | |||
789 | out: | ||
790 | ctx->indata = indata; | ||
791 | ctx->outdata = outdata; | ||
792 | ctx->datalen = datalen; | ||
793 | ctx->outlen = outlen; | ||
794 | |||
795 | return ret; | ||
796 | } | ||
797 | |||
798 | static int get_nents(struct scatterlist *sg, int nbytes) | ||
799 | { | ||
800 | int nents = 0; | ||
801 | |||
802 | while (nbytes > 0) { | ||
803 | nbytes -= sg->length; | ||
804 | sg = scatterwalk_sg_next(sg); | ||
805 | nents++; | ||
806 | } | ||
807 | |||
808 | return nents; | ||
809 | } | ||
810 | |||
811 | static int ablk_dma_crypt(struct ablkcipher_request *areq) | ||
812 | { | ||
813 | struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); | ||
814 | struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); | ||
815 | struct cryp_device_data *device_data; | ||
816 | |||
817 | int bytes_written = 0; | ||
818 | int bytes_read = 0; | ||
819 | int ret; | ||
820 | |||
821 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
822 | |||
823 | ctx->datalen = areq->nbytes; | ||
824 | ctx->outlen = areq->nbytes; | ||
825 | |||
826 | ret = cryp_get_device_data(ctx, &device_data); | ||
827 | if (ret) | ||
828 | return ret; | ||
829 | |||
830 | ret = cryp_setup_context(ctx, device_data); | ||
831 | if (ret) | ||
832 | goto out; | ||
833 | |||
834 | /* We have the device now, so store the nents in the dma struct. */ | ||
835 | ctx->device->dma.nents_src = get_nents(areq->src, ctx->datalen); | ||
836 | ctx->device->dma.nents_dst = get_nents(areq->dst, ctx->outlen); | ||
837 | |||
838 | /* Enable DMA in- and output. */ | ||
839 | cryp_configure_for_dma(device_data, CRYP_DMA_ENABLE_BOTH_DIRECTIONS); | ||
840 | |||
841 | bytes_written = cryp_dma_write(ctx, areq->src, ctx->datalen); | ||
842 | bytes_read = cryp_dma_read(ctx, areq->dst, bytes_written); | ||
843 | |||
844 | wait_for_completion(&ctx->device->dma.cryp_dma_complete); | ||
845 | cryp_dma_done(ctx); | ||
846 | |||
847 | cryp_save_device_context(device_data, &ctx->dev_ctx, cryp_mode); | ||
848 | ctx->updated = 1; | ||
849 | |||
850 | out: | ||
851 | spin_lock(&device_data->ctx_lock); | ||
852 | device_data->current_ctx = NULL; | ||
853 | ctx->device = NULL; | ||
854 | spin_unlock(&device_data->ctx_lock); | ||
855 | |||
856 | /* | ||
857 | * The down_interruptible part for this semaphore is called in | ||
858 | * cryp_get_device_data. | ||
859 | */ | ||
860 | up(&driver_data.device_allocation); | ||
861 | |||
862 | if (unlikely(bytes_written != bytes_read)) | ||
863 | return -EPERM; | ||
864 | |||
865 | return 0; | ||
866 | } | ||
867 | |||
868 | static int ablk_crypt(struct ablkcipher_request *areq) | ||
869 | { | ||
870 | struct ablkcipher_walk walk; | ||
871 | struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); | ||
872 | struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); | ||
873 | struct cryp_device_data *device_data; | ||
874 | unsigned long src_paddr; | ||
875 | unsigned long dst_paddr; | ||
876 | int ret; | ||
877 | int nbytes; | ||
878 | |||
879 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
880 | |||
881 | ret = cryp_get_device_data(ctx, &device_data); | ||
882 | if (ret) | ||
883 | goto out; | ||
884 | |||
885 | ablkcipher_walk_init(&walk, areq->dst, areq->src, areq->nbytes); | ||
886 | ret = ablkcipher_walk_phys(areq, &walk); | ||
887 | |||
888 | if (ret) { | ||
889 | pr_err(DEV_DBG_NAME "[%s]: ablkcipher_walk_phys() failed!", | ||
890 | __func__); | ||
891 | goto out; | ||
892 | } | ||
893 | |||
894 | while ((nbytes = walk.nbytes) > 0) { | ||
895 | ctx->iv = walk.iv; | ||
896 | src_paddr = (page_to_phys(walk.src.page) + walk.src.offset); | ||
897 | ctx->indata = phys_to_virt(src_paddr); | ||
898 | |||
899 | dst_paddr = (page_to_phys(walk.dst.page) + walk.dst.offset); | ||
900 | ctx->outdata = phys_to_virt(dst_paddr); | ||
901 | |||
902 | ctx->datalen = nbytes - (nbytes % ctx->blocksize); | ||
903 | |||
904 | ret = hw_crypt_noxts(ctx, device_data); | ||
905 | if (ret) | ||
906 | goto out; | ||
907 | |||
908 | nbytes -= ctx->datalen; | ||
909 | ret = ablkcipher_walk_done(areq, &walk, nbytes); | ||
910 | if (ret) | ||
911 | goto out; | ||
912 | } | ||
913 | ablkcipher_walk_complete(&walk); | ||
914 | |||
915 | out: | ||
916 | /* Release the device */ | ||
917 | spin_lock(&device_data->ctx_lock); | ||
918 | device_data->current_ctx = NULL; | ||
919 | ctx->device = NULL; | ||
920 | spin_unlock(&device_data->ctx_lock); | ||
921 | |||
922 | /* | ||
923 | * The down_interruptible part for this semaphore is called in | ||
924 | * cryp_get_device_data. | ||
925 | */ | ||
926 | up(&driver_data.device_allocation); | ||
927 | |||
928 | return ret; | ||
929 | } | ||
930 | |||
931 | static int aes_ablkcipher_setkey(struct crypto_ablkcipher *cipher, | ||
932 | const u8 *key, unsigned int keylen) | ||
933 | { | ||
934 | struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); | ||
935 | u32 *flags = &cipher->base.crt_flags; | ||
936 | |||
937 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
938 | |||
939 | switch (keylen) { | ||
940 | case AES_KEYSIZE_128: | ||
941 | ctx->config.keysize = CRYP_KEY_SIZE_128; | ||
942 | break; | ||
943 | |||
944 | case AES_KEYSIZE_192: | ||
945 | ctx->config.keysize = CRYP_KEY_SIZE_192; | ||
946 | break; | ||
947 | |||
948 | case AES_KEYSIZE_256: | ||
949 | ctx->config.keysize = CRYP_KEY_SIZE_256; | ||
950 | break; | ||
951 | |||
952 | default: | ||
953 | pr_err(DEV_DBG_NAME "[%s]: Unknown keylen!", __func__); | ||
954 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; | ||
955 | return -EINVAL; | ||
956 | } | ||
957 | |||
958 | memcpy(ctx->key, key, keylen); | ||
959 | ctx->keylen = keylen; | ||
960 | |||
961 | ctx->updated = 0; | ||
962 | |||
963 | return 0; | ||
964 | } | ||
965 | |||
966 | static int des_ablkcipher_setkey(struct crypto_ablkcipher *cipher, | ||
967 | const u8 *key, unsigned int keylen) | ||
968 | { | ||
969 | struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); | ||
970 | u32 *flags = &cipher->base.crt_flags; | ||
971 | u32 tmp[DES_EXPKEY_WORDS]; | ||
972 | int ret; | ||
973 | |||
974 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
975 | if (keylen != DES_KEY_SIZE) { | ||
976 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; | ||
977 | pr_debug(DEV_DBG_NAME " [%s]: CRYPTO_TFM_RES_BAD_KEY_LEN", | ||
978 | __func__); | ||
979 | return -EINVAL; | ||
980 | } | ||
981 | |||
982 | ret = des_ekey(tmp, key); | ||
983 | if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) { | ||
984 | *flags |= CRYPTO_TFM_RES_WEAK_KEY; | ||
985 | pr_debug(DEV_DBG_NAME " [%s]: CRYPTO_TFM_REQ_WEAK_KEY", | ||
986 | __func__); | ||
987 | return -EINVAL; | ||
988 | } | ||
989 | |||
990 | memcpy(ctx->key, key, keylen); | ||
991 | ctx->keylen = keylen; | ||
992 | |||
993 | ctx->updated = 0; | ||
994 | return 0; | ||
995 | } | ||
996 | |||
997 | static int des3_ablkcipher_setkey(struct crypto_ablkcipher *cipher, | ||
998 | const u8 *key, unsigned int keylen) | ||
999 | { | ||
1000 | struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); | ||
1001 | u32 *flags = &cipher->base.crt_flags; | ||
1002 | const u32 *K = (const u32 *)key; | ||
1003 | u32 tmp[DES3_EDE_EXPKEY_WORDS]; | ||
1004 | int i, ret; | ||
1005 | |||
1006 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
1007 | if (keylen != DES3_EDE_KEY_SIZE) { | ||
1008 | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; | ||
1009 | pr_debug(DEV_DBG_NAME " [%s]: CRYPTO_TFM_RES_BAD_KEY_LEN", | ||
1010 | __func__); | ||
1011 | return -EINVAL; | ||
1012 | } | ||
1013 | |||
1014 | /* Checking key interdependency for weak key detection. */ | ||
1015 | if (unlikely(!((K[0] ^ K[2]) | (K[1] ^ K[3])) || | ||
1016 | !((K[2] ^ K[4]) | (K[3] ^ K[5]))) && | ||
1017 | (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) { | ||
1018 | *flags |= CRYPTO_TFM_RES_WEAK_KEY; | ||
1019 | pr_debug(DEV_DBG_NAME " [%s]: CRYPTO_TFM_REQ_WEAK_KEY", | ||
1020 | __func__); | ||
1021 | return -EINVAL; | ||
1022 | } | ||
1023 | for (i = 0; i < 3; i++) { | ||
1024 | ret = des_ekey(tmp, key + i*DES_KEY_SIZE); | ||
1025 | if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) { | ||
1026 | *flags |= CRYPTO_TFM_RES_WEAK_KEY; | ||
1027 | pr_debug(DEV_DBG_NAME " [%s]: " | ||
1028 | "CRYPTO_TFM_REQ_WEAK_KEY", __func__); | ||
1029 | return -EINVAL; | ||
1030 | } | ||
1031 | } | ||
1032 | |||
1033 | memcpy(ctx->key, key, keylen); | ||
1034 | ctx->keylen = keylen; | ||
1035 | |||
1036 | ctx->updated = 0; | ||
1037 | return 0; | ||
1038 | } | ||
1039 | |||
1040 | static int cryp_blk_encrypt(struct ablkcipher_request *areq) | ||
1041 | { | ||
1042 | struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); | ||
1043 | struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); | ||
1044 | |||
1045 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
1046 | |||
1047 | ctx->config.algodir = CRYP_ALGORITHM_ENCRYPT; | ||
1048 | |||
1049 | /* | ||
1050 | * DMA does not work for DES due to a hw bug */ | ||
1051 | if (cryp_mode == CRYP_MODE_DMA && mode_is_aes(ctx->config.algomode)) | ||
1052 | return ablk_dma_crypt(areq); | ||
1053 | |||
1054 | /* For everything except DMA, we run the non DMA version. */ | ||
1055 | return ablk_crypt(areq); | ||
1056 | } | ||
1057 | |||
1058 | static int cryp_blk_decrypt(struct ablkcipher_request *areq) | ||
1059 | { | ||
1060 | struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); | ||
1061 | struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); | ||
1062 | |||
1063 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
1064 | |||
1065 | ctx->config.algodir = CRYP_ALGORITHM_DECRYPT; | ||
1066 | |||
1067 | /* DMA does not work for DES due to a hw bug */ | ||
1068 | if (cryp_mode == CRYP_MODE_DMA && mode_is_aes(ctx->config.algomode)) | ||
1069 | return ablk_dma_crypt(areq); | ||
1070 | |||
1071 | /* For everything except DMA, we run the non DMA version. */ | ||
1072 | return ablk_crypt(areq); | ||
1073 | } | ||
1074 | |||
1075 | struct cryp_algo_template { | ||
1076 | enum cryp_algo_mode algomode; | ||
1077 | struct crypto_alg crypto; | ||
1078 | }; | ||
1079 | |||
1080 | static int cryp_cra_init(struct crypto_tfm *tfm) | ||
1081 | { | ||
1082 | struct cryp_ctx *ctx = crypto_tfm_ctx(tfm); | ||
1083 | struct crypto_alg *alg = tfm->__crt_alg; | ||
1084 | struct cryp_algo_template *cryp_alg = container_of(alg, | ||
1085 | struct cryp_algo_template, | ||
1086 | crypto); | ||
1087 | |||
1088 | ctx->config.algomode = cryp_alg->algomode; | ||
1089 | ctx->blocksize = crypto_tfm_alg_blocksize(tfm); | ||
1090 | |||
1091 | return 0; | ||
1092 | } | ||
1093 | |||
1094 | static struct cryp_algo_template cryp_algs[] = { | ||
1095 | { | ||
1096 | .algomode = CRYP_ALGO_AES_ECB, | ||
1097 | .crypto = { | ||
1098 | .cra_name = "aes", | ||
1099 | .cra_driver_name = "aes-ux500", | ||
1100 | .cra_priority = 300, | ||
1101 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1102 | CRYPTO_ALG_ASYNC, | ||
1103 | .cra_blocksize = AES_BLOCK_SIZE, | ||
1104 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1105 | .cra_alignmask = 3, | ||
1106 | .cra_type = &crypto_ablkcipher_type, | ||
1107 | .cra_init = cryp_cra_init, | ||
1108 | .cra_module = THIS_MODULE, | ||
1109 | .cra_u = { | ||
1110 | .ablkcipher = { | ||
1111 | .min_keysize = AES_MIN_KEY_SIZE, | ||
1112 | .max_keysize = AES_MAX_KEY_SIZE, | ||
1113 | .setkey = aes_ablkcipher_setkey, | ||
1114 | .encrypt = cryp_blk_encrypt, | ||
1115 | .decrypt = cryp_blk_decrypt | ||
1116 | } | ||
1117 | } | ||
1118 | } | ||
1119 | }, | ||
1120 | { | ||
1121 | .algomode = CRYP_ALGO_AES_ECB, | ||
1122 | .crypto = { | ||
1123 | .cra_name = "ecb(aes)", | ||
1124 | .cra_driver_name = "ecb-aes-ux500", | ||
1125 | .cra_priority = 300, | ||
1126 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1127 | CRYPTO_ALG_ASYNC, | ||
1128 | .cra_blocksize = AES_BLOCK_SIZE, | ||
1129 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1130 | .cra_alignmask = 3, | ||
1131 | .cra_type = &crypto_ablkcipher_type, | ||
1132 | .cra_init = cryp_cra_init, | ||
1133 | .cra_module = THIS_MODULE, | ||
1134 | .cra_u = { | ||
1135 | .ablkcipher = { | ||
1136 | .min_keysize = AES_MIN_KEY_SIZE, | ||
1137 | .max_keysize = AES_MAX_KEY_SIZE, | ||
1138 | .setkey = aes_ablkcipher_setkey, | ||
1139 | .encrypt = cryp_blk_encrypt, | ||
1140 | .decrypt = cryp_blk_decrypt, | ||
1141 | } | ||
1142 | } | ||
1143 | } | ||
1144 | }, | ||
1145 | { | ||
1146 | .algomode = CRYP_ALGO_AES_CBC, | ||
1147 | .crypto = { | ||
1148 | .cra_name = "cbc(aes)", | ||
1149 | .cra_driver_name = "cbc-aes-ux500", | ||
1150 | .cra_priority = 300, | ||
1151 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1152 | CRYPTO_ALG_ASYNC, | ||
1153 | .cra_blocksize = AES_BLOCK_SIZE, | ||
1154 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1155 | .cra_alignmask = 3, | ||
1156 | .cra_type = &crypto_ablkcipher_type, | ||
1157 | .cra_init = cryp_cra_init, | ||
1158 | .cra_module = THIS_MODULE, | ||
1159 | .cra_u = { | ||
1160 | .ablkcipher = { | ||
1161 | .min_keysize = AES_MIN_KEY_SIZE, | ||
1162 | .max_keysize = AES_MAX_KEY_SIZE, | ||
1163 | .setkey = aes_ablkcipher_setkey, | ||
1164 | .encrypt = cryp_blk_encrypt, | ||
1165 | .decrypt = cryp_blk_decrypt, | ||
1166 | .ivsize = AES_BLOCK_SIZE, | ||
1167 | } | ||
1168 | } | ||
1169 | } | ||
1170 | }, | ||
1171 | { | ||
1172 | .algomode = CRYP_ALGO_AES_CTR, | ||
1173 | .crypto = { | ||
1174 | .cra_name = "ctr(aes)", | ||
1175 | .cra_driver_name = "ctr-aes-ux500", | ||
1176 | .cra_priority = 300, | ||
1177 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1178 | CRYPTO_ALG_ASYNC, | ||
1179 | .cra_blocksize = AES_BLOCK_SIZE, | ||
1180 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1181 | .cra_alignmask = 3, | ||
1182 | .cra_type = &crypto_ablkcipher_type, | ||
1183 | .cra_init = cryp_cra_init, | ||
1184 | .cra_module = THIS_MODULE, | ||
1185 | .cra_u = { | ||
1186 | .ablkcipher = { | ||
1187 | .min_keysize = AES_MIN_KEY_SIZE, | ||
1188 | .max_keysize = AES_MAX_KEY_SIZE, | ||
1189 | .setkey = aes_ablkcipher_setkey, | ||
1190 | .encrypt = cryp_blk_encrypt, | ||
1191 | .decrypt = cryp_blk_decrypt, | ||
1192 | .ivsize = AES_BLOCK_SIZE, | ||
1193 | } | ||
1194 | } | ||
1195 | } | ||
1196 | }, | ||
1197 | { | ||
1198 | .algomode = CRYP_ALGO_DES_ECB, | ||
1199 | .crypto = { | ||
1200 | .cra_name = "des", | ||
1201 | .cra_driver_name = "des-ux500", | ||
1202 | .cra_priority = 300, | ||
1203 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1204 | CRYPTO_ALG_ASYNC, | ||
1205 | .cra_blocksize = DES_BLOCK_SIZE, | ||
1206 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1207 | .cra_alignmask = 3, | ||
1208 | .cra_type = &crypto_ablkcipher_type, | ||
1209 | .cra_init = cryp_cra_init, | ||
1210 | .cra_module = THIS_MODULE, | ||
1211 | .cra_u = { | ||
1212 | .ablkcipher = { | ||
1213 | .min_keysize = DES_KEY_SIZE, | ||
1214 | .max_keysize = DES_KEY_SIZE, | ||
1215 | .setkey = des_ablkcipher_setkey, | ||
1216 | .encrypt = cryp_blk_encrypt, | ||
1217 | .decrypt = cryp_blk_decrypt | ||
1218 | } | ||
1219 | } | ||
1220 | } | ||
1221 | |||
1222 | }, | ||
1223 | { | ||
1224 | .algomode = CRYP_ALGO_TDES_ECB, | ||
1225 | .crypto = { | ||
1226 | .cra_name = "des3_ede", | ||
1227 | .cra_driver_name = "des3_ede-ux500", | ||
1228 | .cra_priority = 300, | ||
1229 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1230 | CRYPTO_ALG_ASYNC, | ||
1231 | .cra_blocksize = DES3_EDE_BLOCK_SIZE, | ||
1232 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1233 | .cra_alignmask = 3, | ||
1234 | .cra_type = &crypto_ablkcipher_type, | ||
1235 | .cra_init = cryp_cra_init, | ||
1236 | .cra_module = THIS_MODULE, | ||
1237 | .cra_u = { | ||
1238 | .ablkcipher = { | ||
1239 | .min_keysize = DES3_EDE_KEY_SIZE, | ||
1240 | .max_keysize = DES3_EDE_KEY_SIZE, | ||
1241 | .setkey = des_ablkcipher_setkey, | ||
1242 | .encrypt = cryp_blk_encrypt, | ||
1243 | .decrypt = cryp_blk_decrypt | ||
1244 | } | ||
1245 | } | ||
1246 | } | ||
1247 | }, | ||
1248 | { | ||
1249 | .algomode = CRYP_ALGO_DES_ECB, | ||
1250 | .crypto = { | ||
1251 | .cra_name = "ecb(des)", | ||
1252 | .cra_driver_name = "ecb-des-ux500", | ||
1253 | .cra_priority = 300, | ||
1254 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1255 | CRYPTO_ALG_ASYNC, | ||
1256 | .cra_blocksize = DES_BLOCK_SIZE, | ||
1257 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1258 | .cra_alignmask = 3, | ||
1259 | .cra_type = &crypto_ablkcipher_type, | ||
1260 | .cra_init = cryp_cra_init, | ||
1261 | .cra_module = THIS_MODULE, | ||
1262 | .cra_u = { | ||
1263 | .ablkcipher = { | ||
1264 | .min_keysize = DES_KEY_SIZE, | ||
1265 | .max_keysize = DES_KEY_SIZE, | ||
1266 | .setkey = des_ablkcipher_setkey, | ||
1267 | .encrypt = cryp_blk_encrypt, | ||
1268 | .decrypt = cryp_blk_decrypt, | ||
1269 | } | ||
1270 | } | ||
1271 | } | ||
1272 | }, | ||
1273 | { | ||
1274 | .algomode = CRYP_ALGO_TDES_ECB, | ||
1275 | .crypto = { | ||
1276 | .cra_name = "ecb(des3_ede)", | ||
1277 | .cra_driver_name = "ecb-des3_ede-ux500", | ||
1278 | .cra_priority = 300, | ||
1279 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1280 | CRYPTO_ALG_ASYNC, | ||
1281 | .cra_blocksize = DES3_EDE_BLOCK_SIZE, | ||
1282 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1283 | .cra_alignmask = 3, | ||
1284 | .cra_type = &crypto_ablkcipher_type, | ||
1285 | .cra_init = cryp_cra_init, | ||
1286 | .cra_module = THIS_MODULE, | ||
1287 | .cra_u = { | ||
1288 | .ablkcipher = { | ||
1289 | .min_keysize = DES3_EDE_KEY_SIZE, | ||
1290 | .max_keysize = DES3_EDE_KEY_SIZE, | ||
1291 | .setkey = des3_ablkcipher_setkey, | ||
1292 | .encrypt = cryp_blk_encrypt, | ||
1293 | .decrypt = cryp_blk_decrypt, | ||
1294 | } | ||
1295 | } | ||
1296 | } | ||
1297 | }, | ||
1298 | { | ||
1299 | .algomode = CRYP_ALGO_DES_CBC, | ||
1300 | .crypto = { | ||
1301 | .cra_name = "cbc(des)", | ||
1302 | .cra_driver_name = "cbc-des-ux500", | ||
1303 | .cra_priority = 300, | ||
1304 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1305 | CRYPTO_ALG_ASYNC, | ||
1306 | .cra_blocksize = DES_BLOCK_SIZE, | ||
1307 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1308 | .cra_alignmask = 3, | ||
1309 | .cra_type = &crypto_ablkcipher_type, | ||
1310 | .cra_init = cryp_cra_init, | ||
1311 | .cra_module = THIS_MODULE, | ||
1312 | .cra_u = { | ||
1313 | .ablkcipher = { | ||
1314 | .min_keysize = DES_KEY_SIZE, | ||
1315 | .max_keysize = DES_KEY_SIZE, | ||
1316 | .setkey = des_ablkcipher_setkey, | ||
1317 | .encrypt = cryp_blk_encrypt, | ||
1318 | .decrypt = cryp_blk_decrypt, | ||
1319 | } | ||
1320 | } | ||
1321 | } | ||
1322 | }, | ||
1323 | { | ||
1324 | .algomode = CRYP_ALGO_TDES_CBC, | ||
1325 | .crypto = { | ||
1326 | .cra_name = "cbc(des3_ede)", | ||
1327 | .cra_driver_name = "cbc-des3_ede-ux500", | ||
1328 | .cra_priority = 300, | ||
1329 | .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | | ||
1330 | CRYPTO_ALG_ASYNC, | ||
1331 | .cra_blocksize = DES3_EDE_BLOCK_SIZE, | ||
1332 | .cra_ctxsize = sizeof(struct cryp_ctx), | ||
1333 | .cra_alignmask = 3, | ||
1334 | .cra_type = &crypto_ablkcipher_type, | ||
1335 | .cra_init = cryp_cra_init, | ||
1336 | .cra_module = THIS_MODULE, | ||
1337 | .cra_u = { | ||
1338 | .ablkcipher = { | ||
1339 | .min_keysize = DES3_EDE_KEY_SIZE, | ||
1340 | .max_keysize = DES3_EDE_KEY_SIZE, | ||
1341 | .setkey = des3_ablkcipher_setkey, | ||
1342 | .encrypt = cryp_blk_encrypt, | ||
1343 | .decrypt = cryp_blk_decrypt, | ||
1344 | .ivsize = DES3_EDE_BLOCK_SIZE, | ||
1345 | } | ||
1346 | } | ||
1347 | } | ||
1348 | } | ||
1349 | }; | ||
1350 | |||
1351 | /** | ||
1352 | * cryp_algs_register_all - | ||
1353 | */ | ||
1354 | static int cryp_algs_register_all(void) | ||
1355 | { | ||
1356 | int ret; | ||
1357 | int i; | ||
1358 | int count; | ||
1359 | |||
1360 | pr_debug("[%s]", __func__); | ||
1361 | |||
1362 | for (i = 0; i < ARRAY_SIZE(cryp_algs); i++) { | ||
1363 | ret = crypto_register_alg(&cryp_algs[i].crypto); | ||
1364 | if (ret) { | ||
1365 | count = i; | ||
1366 | pr_err("[%s] alg registration failed", | ||
1367 | cryp_algs[i].crypto.cra_driver_name); | ||
1368 | goto unreg; | ||
1369 | } | ||
1370 | } | ||
1371 | return 0; | ||
1372 | unreg: | ||
1373 | for (i = 0; i < count; i++) | ||
1374 | crypto_unregister_alg(&cryp_algs[i].crypto); | ||
1375 | return ret; | ||
1376 | } | ||
1377 | |||
1378 | /** | ||
1379 | * cryp_algs_unregister_all - | ||
1380 | */ | ||
1381 | static void cryp_algs_unregister_all(void) | ||
1382 | { | ||
1383 | int i; | ||
1384 | |||
1385 | pr_debug(DEV_DBG_NAME " [%s]", __func__); | ||
1386 | |||
1387 | for (i = 0; i < ARRAY_SIZE(cryp_algs); i++) | ||
1388 | crypto_unregister_alg(&cryp_algs[i].crypto); | ||
1389 | } | ||
1390 | |||
1391 | static int ux500_cryp_probe(struct platform_device *pdev) | ||
1392 | { | ||
1393 | int ret; | ||
1394 | int cryp_error = 0; | ||
1395 | struct resource *res = NULL; | ||
1396 | struct resource *res_irq = NULL; | ||
1397 | struct cryp_device_data *device_data; | ||
1398 | struct cryp_protection_config prot = { | ||
1399 | .privilege_access = CRYP_STATE_ENABLE | ||
1400 | }; | ||
1401 | struct device *dev = &pdev->dev; | ||
1402 | |||
1403 | dev_dbg(dev, "[%s]", __func__); | ||
1404 | device_data = kzalloc(sizeof(struct cryp_device_data), GFP_ATOMIC); | ||
1405 | if (!device_data) { | ||
1406 | dev_err(dev, "[%s]: kzalloc() failed!", __func__); | ||
1407 | ret = -ENOMEM; | ||
1408 | goto out; | ||
1409 | } | ||
1410 | |||
1411 | device_data->dev = dev; | ||
1412 | device_data->current_ctx = NULL; | ||
1413 | |||
1414 | /* Grab the DMA configuration from platform data. */ | ||
1415 | mem_to_engine = &((struct cryp_platform_data *) | ||
1416 | dev->platform_data)->mem_to_engine; | ||
1417 | engine_to_mem = &((struct cryp_platform_data *) | ||
1418 | dev->platform_data)->engine_to_mem; | ||
1419 | |||
1420 | res = platform_get_resource(pdev, IORESOURCE_MEM, 0); | ||
1421 | if (!res) { | ||
1422 | dev_err(dev, "[%s]: platform_get_resource() failed", | ||
1423 | __func__); | ||
1424 | ret = -ENODEV; | ||
1425 | goto out_kfree; | ||
1426 | } | ||
1427 | |||
1428 | res = request_mem_region(res->start, resource_size(res), pdev->name); | ||
1429 | if (res == NULL) { | ||
1430 | dev_err(dev, "[%s]: request_mem_region() failed", | ||
1431 | __func__); | ||
1432 | ret = -EBUSY; | ||
1433 | goto out_kfree; | ||
1434 | } | ||
1435 | |||
1436 | device_data->base = ioremap(res->start, resource_size(res)); | ||
1437 | if (!device_data->base) { | ||
1438 | dev_err(dev, "[%s]: ioremap failed!", __func__); | ||
1439 | ret = -ENOMEM; | ||
1440 | goto out_free_mem; | ||
1441 | } | ||
1442 | |||
1443 | spin_lock_init(&device_data->ctx_lock); | ||
1444 | spin_lock_init(&device_data->power_state_spinlock); | ||
1445 | |||
1446 | /* Enable power for CRYP hardware block */ | ||
1447 | device_data->pwr_regulator = regulator_get(&pdev->dev, "v-ape"); | ||
1448 | if (IS_ERR(device_data->pwr_regulator)) { | ||
1449 | dev_err(dev, "[%s]: could not get cryp regulator", __func__); | ||
1450 | ret = PTR_ERR(device_data->pwr_regulator); | ||
1451 | device_data->pwr_regulator = NULL; | ||
1452 | goto out_unmap; | ||
1453 | } | ||
1454 | |||
1455 | /* Enable the clk for CRYP hardware block */ | ||
1456 | device_data->clk = clk_get(&pdev->dev, NULL); | ||
1457 | if (IS_ERR(device_data->clk)) { | ||
1458 | dev_err(dev, "[%s]: clk_get() failed!", __func__); | ||
1459 | ret = PTR_ERR(device_data->clk); | ||
1460 | goto out_regulator; | ||
1461 | } | ||
1462 | |||
1463 | /* Enable device power (and clock) */ | ||
1464 | ret = cryp_enable_power(device_data->dev, device_data, false); | ||
1465 | if (ret) { | ||
1466 | dev_err(dev, "[%s]: cryp_enable_power() failed!", __func__); | ||
1467 | goto out_clk; | ||
1468 | } | ||
1469 | |||
1470 | cryp_error = cryp_check(device_data); | ||
1471 | if (cryp_error != 0) { | ||
1472 | dev_err(dev, "[%s]: cryp_init() failed!", __func__); | ||
1473 | ret = -EINVAL; | ||
1474 | goto out_power; | ||
1475 | } | ||
1476 | |||
1477 | cryp_error = cryp_configure_protection(device_data, &prot); | ||
1478 | if (cryp_error != 0) { | ||
1479 | dev_err(dev, "[%s]: cryp_configure_protection() failed!", | ||
1480 | __func__); | ||
1481 | ret = -EINVAL; | ||
1482 | goto out_power; | ||
1483 | } | ||
1484 | |||
1485 | res_irq = platform_get_resource(pdev, IORESOURCE_IRQ, 0); | ||
1486 | if (!res_irq) { | ||
1487 | dev_err(dev, "[%s]: IORESOURCE_IRQ unavailable", | ||
1488 | __func__); | ||
1489 | goto out_power; | ||
1490 | } | ||
1491 | |||
1492 | ret = request_irq(res_irq->start, | ||
1493 | cryp_interrupt_handler, | ||
1494 | 0, | ||
1495 | "cryp1", | ||
1496 | device_data); | ||
1497 | if (ret) { | ||
1498 | dev_err(dev, "[%s]: Unable to request IRQ", __func__); | ||
1499 | goto out_power; | ||
1500 | } | ||
1501 | |||
1502 | if (cryp_mode == CRYP_MODE_DMA) | ||
1503 | cryp_dma_setup_channel(device_data, dev); | ||
1504 | |||
1505 | platform_set_drvdata(pdev, device_data); | ||
1506 | |||
1507 | /* Put the new device into the device list... */ | ||
1508 | klist_add_tail(&device_data->list_node, &driver_data.device_list); | ||
1509 | |||
1510 | /* ... and signal that a new device is available. */ | ||
1511 | up(&driver_data.device_allocation); | ||
1512 | |||
1513 | atomic_set(&session_id, 1); | ||
1514 | |||
1515 | ret = cryp_algs_register_all(); | ||
1516 | if (ret) { | ||
1517 | dev_err(dev, "[%s]: cryp_algs_register_all() failed!", | ||
1518 | __func__); | ||
1519 | goto out_power; | ||
1520 | } | ||
1521 | |||
1522 | return 0; | ||
1523 | |||
1524 | out_power: | ||
1525 | cryp_disable_power(device_data->dev, device_data, false); | ||
1526 | |||
1527 | out_clk: | ||
1528 | clk_put(device_data->clk); | ||
1529 | |||
1530 | out_regulator: | ||
1531 | regulator_put(device_data->pwr_regulator); | ||
1532 | |||
1533 | out_unmap: | ||
1534 | iounmap(device_data->base); | ||
1535 | |||
1536 | out_free_mem: | ||
1537 | release_mem_region(res->start, resource_size(res)); | ||
1538 | |||
1539 | out_kfree: | ||
1540 | kfree(device_data); | ||
1541 | out: | ||
1542 | return ret; | ||
1543 | } | ||
1544 | |||
1545 | static int ux500_cryp_remove(struct platform_device *pdev) | ||
1546 | { | ||
1547 | struct resource *res = NULL; | ||
1548 | struct resource *res_irq = NULL; | ||
1549 | struct cryp_device_data *device_data; | ||
1550 | |||
1551 | dev_dbg(&pdev->dev, "[%s]", __func__); | ||
1552 | device_data = platform_get_drvdata(pdev); | ||
1553 | if (!device_data) { | ||
1554 | dev_err(&pdev->dev, "[%s]: platform_get_drvdata() failed!", | ||
1555 | __func__); | ||
1556 | return -ENOMEM; | ||
1557 | } | ||
1558 | |||
1559 | /* Try to decrease the number of available devices. */ | ||
1560 | if (down_trylock(&driver_data.device_allocation)) | ||
1561 | return -EBUSY; | ||
1562 | |||
1563 | /* Check that the device is free */ | ||
1564 | spin_lock(&device_data->ctx_lock); | ||
1565 | /* current_ctx allocates a device, NULL = unallocated */ | ||
1566 | if (device_data->current_ctx) { | ||
1567 | /* The device is busy */ | ||
1568 | spin_unlock(&device_data->ctx_lock); | ||
1569 | /* Return the device to the pool. */ | ||
1570 | up(&driver_data.device_allocation); | ||
1571 | return -EBUSY; | ||
1572 | } | ||
1573 | |||
1574 | spin_unlock(&device_data->ctx_lock); | ||
1575 | |||
1576 | /* Remove the device from the list */ | ||
1577 | if (klist_node_attached(&device_data->list_node)) | ||
1578 | klist_remove(&device_data->list_node); | ||
1579 | |||
1580 | /* If this was the last device, remove the services */ | ||
1581 | if (list_empty(&driver_data.device_list.k_list)) | ||
1582 | cryp_algs_unregister_all(); | ||
1583 | |||
1584 | res_irq = platform_get_resource(pdev, IORESOURCE_IRQ, 0); | ||
1585 | if (!res_irq) | ||
1586 | dev_err(&pdev->dev, "[%s]: IORESOURCE_IRQ, unavailable", | ||
1587 | __func__); | ||
1588 | else { | ||
1589 | disable_irq(res_irq->start); | ||
1590 | free_irq(res_irq->start, device_data); | ||
1591 | } | ||
1592 | |||
1593 | if (cryp_disable_power(&pdev->dev, device_data, false)) | ||
1594 | dev_err(&pdev->dev, "[%s]: cryp_disable_power() failed", | ||
1595 | __func__); | ||
1596 | |||
1597 | clk_put(device_data->clk); | ||
1598 | regulator_put(device_data->pwr_regulator); | ||
1599 | |||
1600 | iounmap(device_data->base); | ||
1601 | |||
1602 | res = platform_get_resource(pdev, IORESOURCE_MEM, 0); | ||
1603 | if (res) | ||
1604 | release_mem_region(res->start, res->end - res->start + 1); | ||
1605 | |||
1606 | kfree(device_data); | ||
1607 | |||
1608 | return 0; | ||
1609 | } | ||
1610 | |||
1611 | static void ux500_cryp_shutdown(struct platform_device *pdev) | ||
1612 | { | ||
1613 | struct resource *res_irq = NULL; | ||
1614 | struct cryp_device_data *device_data; | ||
1615 | |||
1616 | dev_dbg(&pdev->dev, "[%s]", __func__); | ||
1617 | |||
1618 | device_data = platform_get_drvdata(pdev); | ||
1619 | if (!device_data) { | ||
1620 | dev_err(&pdev->dev, "[%s]: platform_get_drvdata() failed!", | ||
1621 | __func__); | ||
1622 | return; | ||
1623 | } | ||
1624 | |||
1625 | /* Check that the device is free */ | ||
1626 | spin_lock(&device_data->ctx_lock); | ||
1627 | /* current_ctx allocates a device, NULL = unallocated */ | ||
1628 | if (!device_data->current_ctx) { | ||
1629 | if (down_trylock(&driver_data.device_allocation)) | ||
1630 | dev_dbg(&pdev->dev, "[%s]: Cryp still in use!" | ||
1631 | "Shutting down anyway...", __func__); | ||
1632 | /** | ||
1633 | * (Allocate the device) | ||
1634 | * Need to set this to non-null (dummy) value, | ||
1635 | * to avoid usage if context switching. | ||
1636 | */ | ||
1637 | device_data->current_ctx++; | ||
1638 | } | ||
1639 | spin_unlock(&device_data->ctx_lock); | ||
1640 | |||
1641 | /* Remove the device from the list */ | ||
1642 | if (klist_node_attached(&device_data->list_node)) | ||
1643 | klist_remove(&device_data->list_node); | ||
1644 | |||
1645 | /* If this was the last device, remove the services */ | ||
1646 | if (list_empty(&driver_data.device_list.k_list)) | ||
1647 | cryp_algs_unregister_all(); | ||
1648 | |||
1649 | res_irq = platform_get_resource(pdev, IORESOURCE_IRQ, 0); | ||
1650 | if (!res_irq) | ||
1651 | dev_err(&pdev->dev, "[%s]: IORESOURCE_IRQ, unavailable", | ||
1652 | __func__); | ||
1653 | else { | ||
1654 | disable_irq(res_irq->start); | ||
1655 | free_irq(res_irq->start, device_data); | ||
1656 | } | ||
1657 | |||
1658 | if (cryp_disable_power(&pdev->dev, device_data, false)) | ||
1659 | dev_err(&pdev->dev, "[%s]: cryp_disable_power() failed", | ||
1660 | __func__); | ||
1661 | |||
1662 | } | ||
1663 | |||
1664 | static int ux500_cryp_suspend(struct platform_device *pdev, pm_message_t state) | ||
1665 | { | ||
1666 | int ret; | ||
1667 | struct cryp_device_data *device_data; | ||
1668 | struct resource *res_irq; | ||
1669 | struct cryp_ctx *temp_ctx = NULL; | ||
1670 | |||
1671 | dev_dbg(&pdev->dev, "[%s]", __func__); | ||
1672 | |||
1673 | /* Handle state? */ | ||
1674 | device_data = platform_get_drvdata(pdev); | ||
1675 | if (!device_data) { | ||
1676 | dev_err(&pdev->dev, "[%s]: platform_get_drvdata() failed!", | ||
1677 | __func__); | ||
1678 | return -ENOMEM; | ||
1679 | } | ||
1680 | |||
1681 | res_irq = platform_get_resource(pdev, IORESOURCE_IRQ, 0); | ||
1682 | if (!res_irq) | ||
1683 | dev_err(&pdev->dev, "[%s]: IORESOURCE_IRQ, unavailable", | ||
1684 | __func__); | ||
1685 | else | ||
1686 | disable_irq(res_irq->start); | ||
1687 | |||
1688 | spin_lock(&device_data->ctx_lock); | ||
1689 | if (!device_data->current_ctx) | ||
1690 | device_data->current_ctx++; | ||
1691 | spin_unlock(&device_data->ctx_lock); | ||
1692 | |||
1693 | if (device_data->current_ctx == ++temp_ctx) { | ||
1694 | if (down_interruptible(&driver_data.device_allocation)) | ||
1695 | dev_dbg(&pdev->dev, "[%s]: down_interruptible() " | ||
1696 | "failed", __func__); | ||
1697 | ret = cryp_disable_power(&pdev->dev, device_data, false); | ||
1698 | |||
1699 | } else | ||
1700 | ret = cryp_disable_power(&pdev->dev, device_data, true); | ||
1701 | |||
1702 | if (ret) | ||
1703 | dev_err(&pdev->dev, "[%s]: cryp_disable_power()", __func__); | ||
1704 | |||
1705 | return ret; | ||
1706 | } | ||
1707 | |||
1708 | static int ux500_cryp_resume(struct platform_device *pdev) | ||
1709 | { | ||
1710 | int ret = 0; | ||
1711 | struct cryp_device_data *device_data; | ||
1712 | struct resource *res_irq; | ||
1713 | struct cryp_ctx *temp_ctx = NULL; | ||
1714 | |||
1715 | dev_dbg(&pdev->dev, "[%s]", __func__); | ||
1716 | |||
1717 | device_data = platform_get_drvdata(pdev); | ||
1718 | if (!device_data) { | ||
1719 | dev_err(&pdev->dev, "[%s]: platform_get_drvdata() failed!", | ||
1720 | __func__); | ||
1721 | return -ENOMEM; | ||
1722 | } | ||
1723 | |||
1724 | spin_lock(&device_data->ctx_lock); | ||
1725 | if (device_data->current_ctx == ++temp_ctx) | ||
1726 | device_data->current_ctx = NULL; | ||
1727 | spin_unlock(&device_data->ctx_lock); | ||
1728 | |||
1729 | |||
1730 | if (!device_data->current_ctx) | ||
1731 | up(&driver_data.device_allocation); | ||
1732 | else | ||
1733 | ret = cryp_enable_power(&pdev->dev, device_data, true); | ||
1734 | |||
1735 | if (ret) | ||
1736 | dev_err(&pdev->dev, "[%s]: cryp_enable_power() failed!", | ||
1737 | __func__); | ||
1738 | else { | ||
1739 | res_irq = platform_get_resource(pdev, IORESOURCE_IRQ, 0); | ||
1740 | if (res_irq) | ||
1741 | enable_irq(res_irq->start); | ||
1742 | } | ||
1743 | |||
1744 | return ret; | ||
1745 | } | ||
1746 | |||
1747 | static struct platform_driver cryp_driver = { | ||
1748 | .probe = ux500_cryp_probe, | ||
1749 | .remove = ux500_cryp_remove, | ||
1750 | .shutdown = ux500_cryp_shutdown, | ||
1751 | .suspend = ux500_cryp_suspend, | ||
1752 | .resume = ux500_cryp_resume, | ||
1753 | .driver = { | ||
1754 | .owner = THIS_MODULE, | ||
1755 | .name = "cryp1" | ||
1756 | } | ||
1757 | }; | ||
1758 | |||
1759 | static int __init ux500_cryp_mod_init(void) | ||
1760 | { | ||
1761 | pr_debug("[%s] is called!", __func__); | ||
1762 | klist_init(&driver_data.device_list, NULL, NULL); | ||
1763 | /* Initialize the semaphore to 0 devices (locked state) */ | ||
1764 | sema_init(&driver_data.device_allocation, 0); | ||
1765 | return platform_driver_register(&cryp_driver); | ||
1766 | } | ||
1767 | |||
1768 | static void __exit ux500_cryp_mod_fini(void) | ||
1769 | { | ||
1770 | pr_debug("[%s] is called!", __func__); | ||
1771 | platform_driver_unregister(&cryp_driver); | ||
1772 | return; | ||
1773 | } | ||
1774 | |||
1775 | module_init(ux500_cryp_mod_init); | ||
1776 | module_exit(ux500_cryp_mod_fini); | ||
1777 | |||
1778 | module_param(cryp_mode, int, 0); | ||
1779 | |||
1780 | MODULE_DESCRIPTION("Driver for ST-Ericsson UX500 CRYP crypto engine."); | ||
1781 | MODULE_ALIAS("aes-all"); | ||
1782 | MODULE_ALIAS("des-all"); | ||
1783 | |||
1784 | MODULE_LICENSE("GPL"); | ||
diff --git a/drivers/crypto/ux500/cryp/cryp_irq.c b/drivers/crypto/ux500/cryp/cryp_irq.c new file mode 100644 index 000000000000..08d291cdbe6d --- /dev/null +++ b/drivers/crypto/ux500/cryp/cryp_irq.c | |||
@@ -0,0 +1,45 @@ | |||
1 | /** | ||
2 | * Copyright (C) ST-Ericsson SA 2010 | ||
3 | * Author: Shujuan Chen <shujuan.chen@stericsson.com> for ST-Ericsson. | ||
4 | * Author: Jonas Linde <jonas.linde@stericsson.com> for ST-Ericsson. | ||
5 | * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson. | ||
6 | * Author: Berne Hebark <berne.herbark@stericsson.com> for ST-Ericsson. | ||
7 | * Author: Niklas Hernaeus <niklas.hernaeus@stericsson.com> for ST-Ericsson. | ||
8 | * License terms: GNU General Public License (GPL) version 2. | ||
9 | */ | ||
10 | |||
11 | #include <linux/kernel.h> | ||
12 | #include <linux/bitmap.h> | ||
13 | #include <linux/device.h> | ||
14 | |||
15 | #include "cryp.h" | ||
16 | #include "cryp_p.h" | ||
17 | #include "cryp_irq.h" | ||
18 | #include "cryp_irqp.h" | ||
19 | |||
20 | void cryp_enable_irq_src(struct cryp_device_data *device_data, u32 irq_src) | ||
21 | { | ||
22 | u32 i; | ||
23 | |||
24 | dev_dbg(device_data->dev, "[%s]", __func__); | ||
25 | |||
26 | i = readl_relaxed(&device_data->base->imsc); | ||
27 | i = i | irq_src; | ||
28 | writel_relaxed(i, &device_data->base->imsc); | ||
29 | } | ||
30 | |||
31 | void cryp_disable_irq_src(struct cryp_device_data *device_data, u32 irq_src) | ||
32 | { | ||
33 | u32 i; | ||
34 | |||
35 | dev_dbg(device_data->dev, "[%s]", __func__); | ||
36 | |||
37 | i = readl_relaxed(&device_data->base->imsc); | ||
38 | i = i & ~irq_src; | ||
39 | writel_relaxed(i, &device_data->base->imsc); | ||
40 | } | ||
41 | |||
42 | bool cryp_pending_irq_src(struct cryp_device_data *device_data, u32 irq_src) | ||
43 | { | ||
44 | return (readl_relaxed(&device_data->base->mis) & irq_src) > 0; | ||
45 | } | ||
diff --git a/drivers/crypto/ux500/cryp/cryp_irq.h b/drivers/crypto/ux500/cryp/cryp_irq.h new file mode 100644 index 000000000000..5a7837f1b8f9 --- /dev/null +++ b/drivers/crypto/ux500/cryp/cryp_irq.h | |||
@@ -0,0 +1,31 @@ | |||
1 | /** | ||
2 | * Copyright (C) ST-Ericsson SA 2010 | ||
3 | * Author: Shujuan Chen <shujuan.chen@stericsson.com> for ST-Ericsson. | ||
4 | * Author: Jonas Linde <jonas.linde@stericsson.com> for ST-Ericsson. | ||
5 | * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson. | ||
6 | * Author: Berne Hebark <berne.herbark@stericsson.com> for ST-Ericsson. | ||
7 | * Author: Niklas Hernaeus <niklas.hernaeus@stericsson.com> for ST-Ericsson. | ||
8 | * License terms: GNU General Public License (GPL) version 2 | ||
9 | */ | ||
10 | |||
11 | #ifndef _CRYP_IRQ_H_ | ||
12 | #define _CRYP_IRQ_H_ | ||
13 | |||
14 | #include "cryp.h" | ||
15 | |||
16 | enum cryp_irq_src_id { | ||
17 | CRYP_IRQ_SRC_INPUT_FIFO = 0x1, | ||
18 | CRYP_IRQ_SRC_OUTPUT_FIFO = 0x2, | ||
19 | CRYP_IRQ_SRC_ALL = 0x3 | ||
20 | }; | ||
21 | |||
22 | /** | ||
23 | * M0 Funtions | ||
24 | */ | ||
25 | void cryp_enable_irq_src(struct cryp_device_data *device_data, u32 irq_src); | ||
26 | |||
27 | void cryp_disable_irq_src(struct cryp_device_data *device_data, u32 irq_src); | ||
28 | |||
29 | bool cryp_pending_irq_src(struct cryp_device_data *device_data, u32 irq_src); | ||
30 | |||
31 | #endif /* _CRYP_IRQ_H_ */ | ||
diff --git a/drivers/crypto/ux500/cryp/cryp_irqp.h b/drivers/crypto/ux500/cryp/cryp_irqp.h new file mode 100644 index 000000000000..8b339cc34bf8 --- /dev/null +++ b/drivers/crypto/ux500/cryp/cryp_irqp.h | |||
@@ -0,0 +1,125 @@ | |||
1 | /** | ||
2 | * Copyright (C) ST-Ericsson SA 2010 | ||
3 | * Author: Shujuan Chen <shujuan.chen@stericsson.com> for ST-Ericsson. | ||
4 | * Author: Jonas Linde <jonas.linde@stericsson.com> for ST-Ericsson. | ||
5 | * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson. | ||
6 | * Author: Berne Hebark <berne.herbark@stericsson.com> for ST-Ericsson. | ||
7 | * Author: Niklas Hernaeus <niklas.hernaeus@stericsson.com> for ST-Ericsson. | ||
8 | * License terms: GNU General Public License (GPL) version 2 | ||
9 | */ | ||
10 | |||
11 | #ifndef __CRYP_IRQP_H_ | ||
12 | #define __CRYP_IRQP_H_ | ||
13 | |||
14 | #include "cryp_irq.h" | ||
15 | |||
16 | /** | ||
17 | * | ||
18 | * CRYP Registers - Offset mapping | ||
19 | * +-----------------+ | ||
20 | * 00h | CRYP_CR | Configuration register | ||
21 | * +-----------------+ | ||
22 | * 04h | CRYP_SR | Status register | ||
23 | * +-----------------+ | ||
24 | * 08h | CRYP_DIN | Data In register | ||
25 | * +-----------------+ | ||
26 | * 0ch | CRYP_DOUT | Data out register | ||
27 | * +-----------------+ | ||
28 | * 10h | CRYP_DMACR | DMA control register | ||
29 | * +-----------------+ | ||
30 | * 14h | CRYP_IMSC | IMSC | ||
31 | * +-----------------+ | ||
32 | * 18h | CRYP_RIS | Raw interrupt status | ||
33 | * +-----------------+ | ||
34 | * 1ch | CRYP_MIS | Masked interrupt status. | ||
35 | * +-----------------+ | ||
36 | * Key registers | ||
37 | * IVR registers | ||
38 | * Peripheral | ||
39 | * Cell IDs | ||
40 | * | ||
41 | * Refer data structure for other register map | ||
42 | */ | ||
43 | |||
44 | /** | ||
45 | * struct cryp_register | ||
46 | * @cr - Configuration register | ||
47 | * @status - Status register | ||
48 | * @din - Data input register | ||
49 | * @din_size - Data input size register | ||
50 | * @dout - Data output register | ||
51 | * @dout_size - Data output size register | ||
52 | * @dmacr - Dma control register | ||
53 | * @imsc - Interrupt mask set/clear register | ||
54 | * @ris - Raw interrupt status | ||
55 | * @mis - Masked interrupt statu register | ||
56 | * @key_1_l - Key register 1 L | ||
57 | * @key_1_r - Key register 1 R | ||
58 | * @key_2_l - Key register 2 L | ||
59 | * @key_2_r - Key register 2 R | ||
60 | * @key_3_l - Key register 3 L | ||
61 | * @key_3_r - Key register 3 R | ||
62 | * @key_4_l - Key register 4 L | ||
63 | * @key_4_r - Key register 4 R | ||
64 | * @init_vect_0_l - init vector 0 L | ||
65 | * @init_vect_0_r - init vector 0 R | ||
66 | * @init_vect_1_l - init vector 1 L | ||
67 | * @init_vect_1_r - init vector 1 R | ||
68 | * @cryp_unused1 - unused registers | ||
69 | * @itcr - Integration test control register | ||
70 | * @itip - Integration test input register | ||
71 | * @itop - Integration test output register | ||
72 | * @cryp_unused2 - unused registers | ||
73 | * @periphId0 - FE0 CRYP Peripheral Identication Register | ||
74 | * @periphId1 - FE4 | ||
75 | * @periphId2 - FE8 | ||
76 | * @periphId3 - FEC | ||
77 | * @pcellId0 - FF0 CRYP PCell Identication Register | ||
78 | * @pcellId1 - FF4 | ||
79 | * @pcellId2 - FF8 | ||
80 | * @pcellId3 - FFC | ||
81 | */ | ||
82 | struct cryp_register { | ||
83 | u32 cr; /* Configuration register */ | ||
84 | u32 sr; /* Status register */ | ||
85 | u32 din; /* Data input register */ | ||
86 | u32 din_size; /* Data input size register */ | ||
87 | u32 dout; /* Data output register */ | ||
88 | u32 dout_size; /* Data output size register */ | ||
89 | u32 dmacr; /* Dma control register */ | ||
90 | u32 imsc; /* Interrupt mask set/clear register */ | ||
91 | u32 ris; /* Raw interrupt status */ | ||
92 | u32 mis; /* Masked interrupt statu register */ | ||
93 | |||
94 | u32 key_1_l; /*Key register 1 L */ | ||
95 | u32 key_1_r; /*Key register 1 R */ | ||
96 | u32 key_2_l; /*Key register 2 L */ | ||
97 | u32 key_2_r; /*Key register 2 R */ | ||
98 | u32 key_3_l; /*Key register 3 L */ | ||
99 | u32 key_3_r; /*Key register 3 R */ | ||
100 | u32 key_4_l; /*Key register 4 L */ | ||
101 | u32 key_4_r; /*Key register 4 R */ | ||
102 | |||
103 | u32 init_vect_0_l; /*init vector 0 L */ | ||
104 | u32 init_vect_0_r; /*init vector 0 R */ | ||
105 | u32 init_vect_1_l; /*init vector 1 L */ | ||
106 | u32 init_vect_1_r; /*init vector 1 R */ | ||
107 | |||
108 | u32 cryp_unused1[(0x80 - 0x58) / sizeof(u32)]; /* unused registers */ | ||
109 | u32 itcr; /*Integration test control register */ | ||
110 | u32 itip; /*Integration test input register */ | ||
111 | u32 itop; /*Integration test output register */ | ||
112 | u32 cryp_unused2[(0xFE0 - 0x8C) / sizeof(u32)]; /* unused registers */ | ||
113 | |||
114 | u32 periphId0; /* FE0 CRYP Peripheral Identication Register */ | ||
115 | u32 periphId1; /* FE4 */ | ||
116 | u32 periphId2; /* FE8 */ | ||
117 | u32 periphId3; /* FEC */ | ||
118 | |||
119 | u32 pcellId0; /* FF0 CRYP PCell Identication Register */ | ||
120 | u32 pcellId1; /* FF4 */ | ||
121 | u32 pcellId2; /* FF8 */ | ||
122 | u32 pcellId3; /* FFC */ | ||
123 | }; | ||
124 | |||
125 | #endif | ||
diff --git a/drivers/crypto/ux500/cryp/cryp_p.h b/drivers/crypto/ux500/cryp/cryp_p.h new file mode 100644 index 000000000000..6dcffe15c2bc --- /dev/null +++ b/drivers/crypto/ux500/cryp/cryp_p.h | |||
@@ -0,0 +1,123 @@ | |||
1 | /** | ||
2 | * Copyright (C) ST-Ericsson SA 2010 | ||
3 | * Author: Shujuan Chen <shujuan.chen@stericsson.com> for ST-Ericsson. | ||
4 | * Author: Jonas Linde <jonas.linde@stericsson.com> for ST-Ericsson. | ||
5 | * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson. | ||
6 | * Author: Berne Hebark <berne.herbark@stericsson.com> for ST-Ericsson. | ||
7 | * Author: Niklas Hernaeus <niklas.hernaeus@stericsson.com> for ST-Ericsson. | ||
8 | * License terms: GNU General Public License (GPL) version 2 | ||
9 | */ | ||
10 | |||
11 | #ifndef _CRYP_P_H_ | ||
12 | #define _CRYP_P_H_ | ||
13 | |||
14 | #include <linux/io.h> | ||
15 | #include <linux/bitops.h> | ||
16 | |||
17 | #include "cryp.h" | ||
18 | #include "cryp_irqp.h" | ||
19 | |||
20 | /** | ||
21 | * Generic Macros | ||
22 | */ | ||
23 | #define CRYP_SET_BITS(reg_name, mask) \ | ||
24 | writel_relaxed((readl_relaxed(reg_name) | mask), reg_name) | ||
25 | |||
26 | #define CRYP_WRITE_BIT(reg_name, val, mask) \ | ||
27 | writel_relaxed(((readl_relaxed(reg_name) & ~(mask)) |\ | ||
28 | ((val) & (mask))), reg_name) | ||
29 | |||
30 | #define CRYP_TEST_BITS(reg_name, val) \ | ||
31 | (readl_relaxed(reg_name) & (val)) | ||
32 | |||
33 | #define CRYP_PUT_BITS(reg, val, shift, mask) \ | ||
34 | writel_relaxed(((readl_relaxed(reg) & ~(mask)) | \ | ||
35 | (((u32)val << shift) & (mask))), reg) | ||
36 | |||
37 | /** | ||
38 | * CRYP specific Macros | ||
39 | */ | ||
40 | #define CRYP_PERIPHERAL_ID0 0xE3 | ||
41 | #define CRYP_PERIPHERAL_ID1 0x05 | ||
42 | |||
43 | #define CRYP_PERIPHERAL_ID2_DB8500 0x28 | ||
44 | #define CRYP_PERIPHERAL_ID3 0x00 | ||
45 | |||
46 | #define CRYP_PCELL_ID0 0x0D | ||
47 | #define CRYP_PCELL_ID1 0xF0 | ||
48 | #define CRYP_PCELL_ID2 0x05 | ||
49 | #define CRYP_PCELL_ID3 0xB1 | ||
50 | |||
51 | /** | ||
52 | * CRYP register default values | ||
53 | */ | ||
54 | #define MAX_DEVICE_SUPPORT 2 | ||
55 | |||
56 | /* Priv set, keyrden set and datatype 8bits swapped set as default. */ | ||
57 | #define CRYP_CR_DEFAULT 0x0482 | ||
58 | #define CRYP_DMACR_DEFAULT 0x0 | ||
59 | #define CRYP_IMSC_DEFAULT 0x0 | ||
60 | #define CRYP_DIN_DEFAULT 0x0 | ||
61 | #define CRYP_DOUT_DEFAULT 0x0 | ||
62 | #define CRYP_KEY_DEFAULT 0x0 | ||
63 | #define CRYP_INIT_VECT_DEFAULT 0x0 | ||
64 | |||
65 | /** | ||
66 | * CRYP Control register specific mask | ||
67 | */ | ||
68 | #define CRYP_CR_SECURE_MASK BIT(0) | ||
69 | #define CRYP_CR_PRLG_MASK BIT(1) | ||
70 | #define CRYP_CR_ALGODIR_MASK BIT(2) | ||
71 | #define CRYP_CR_ALGOMODE_MASK (BIT(5) | BIT(4) | BIT(3)) | ||
72 | #define CRYP_CR_DATATYPE_MASK (BIT(7) | BIT(6)) | ||
73 | #define CRYP_CR_KEYSIZE_MASK (BIT(9) | BIT(8)) | ||
74 | #define CRYP_CR_KEYRDEN_MASK BIT(10) | ||
75 | #define CRYP_CR_KSE_MASK BIT(11) | ||
76 | #define CRYP_CR_START_MASK BIT(12) | ||
77 | #define CRYP_CR_INIT_MASK BIT(13) | ||
78 | #define CRYP_CR_FFLUSH_MASK BIT(14) | ||
79 | #define CRYP_CR_CRYPEN_MASK BIT(15) | ||
80 | #define CRYP_CR_CONTEXT_SAVE_MASK (CRYP_CR_SECURE_MASK |\ | ||
81 | CRYP_CR_PRLG_MASK |\ | ||
82 | CRYP_CR_ALGODIR_MASK |\ | ||
83 | CRYP_CR_ALGOMODE_MASK |\ | ||
84 | CRYP_CR_DATATYPE_MASK |\ | ||
85 | CRYP_CR_KEYSIZE_MASK |\ | ||
86 | CRYP_CR_KEYRDEN_MASK |\ | ||
87 | CRYP_CR_DATATYPE_MASK) | ||
88 | |||
89 | |||
90 | #define CRYP_SR_INFIFO_READY_MASK (BIT(0) | BIT(1)) | ||
91 | #define CRYP_SR_IFEM_MASK BIT(0) | ||
92 | #define CRYP_SR_BUSY_MASK BIT(4) | ||
93 | |||
94 | /** | ||
95 | * Bit position used while setting bits in register | ||
96 | */ | ||
97 | #define CRYP_CR_PRLG_POS 1 | ||
98 | #define CRYP_CR_ALGODIR_POS 2 | ||
99 | #define CRYP_CR_ALGOMODE_POS 3 | ||
100 | #define CRYP_CR_DATATYPE_POS 6 | ||
101 | #define CRYP_CR_KEYSIZE_POS 8 | ||
102 | #define CRYP_CR_KEYRDEN_POS 10 | ||
103 | #define CRYP_CR_KSE_POS 11 | ||
104 | #define CRYP_CR_START_POS 12 | ||
105 | #define CRYP_CR_INIT_POS 13 | ||
106 | #define CRYP_CR_CRYPEN_POS 15 | ||
107 | |||
108 | #define CRYP_SR_BUSY_POS 4 | ||
109 | |||
110 | /** | ||
111 | * CRYP PCRs------PC_NAND control register | ||
112 | * BIT_MASK | ||
113 | */ | ||
114 | #define CRYP_DMA_REQ_MASK (BIT(1) | BIT(0)) | ||
115 | #define CRYP_DMA_REQ_MASK_POS 0 | ||
116 | |||
117 | |||
118 | struct cryp_system_context { | ||
119 | /* CRYP Register structure */ | ||
120 | struct cryp_register *p_cryp_reg[MAX_DEVICE_SUPPORT]; | ||
121 | }; | ||
122 | |||
123 | #endif | ||
diff --git a/drivers/crypto/ux500/hash/Makefile b/drivers/crypto/ux500/hash/Makefile new file mode 100644 index 000000000000..b2f90d9bac72 --- /dev/null +++ b/drivers/crypto/ux500/hash/Makefile | |||
@@ -0,0 +1,11 @@ | |||
1 | # | ||
2 | # Copyright (C) ST-Ericsson SA 2010 | ||
3 | # Author: Shujuan Chen (shujuan.chen@stericsson.com) | ||
4 | # License terms: GNU General Public License (GPL) version 2 | ||
5 | # | ||
6 | ifdef CONFIG_CRYPTO_DEV_UX500_DEBUG | ||
7 | CFLAGS_hash_core.o := -DDEBUG -O0 | ||
8 | endif | ||
9 | |||
10 | obj-$(CONFIG_CRYPTO_DEV_UX500_HASH) += ux500_hash.o | ||
11 | ux500_hash-objs := hash_core.o | ||
diff --git a/drivers/crypto/ux500/hash/hash_alg.h b/drivers/crypto/ux500/hash/hash_alg.h new file mode 100644 index 000000000000..cd9351cb24df --- /dev/null +++ b/drivers/crypto/ux500/hash/hash_alg.h | |||
@@ -0,0 +1,395 @@ | |||
1 | /* | ||
2 | * Copyright (C) ST-Ericsson SA 2010 | ||
3 | * Author: Shujuan Chen (shujuan.chen@stericsson.com) | ||
4 | * Author: Joakim Bech (joakim.xx.bech@stericsson.com) | ||
5 | * Author: Berne Hebark (berne.hebark@stericsson.com)) | ||
6 | * License terms: GNU General Public License (GPL) version 2 | ||
7 | */ | ||
8 | #ifndef _HASH_ALG_H | ||
9 | #define _HASH_ALG_H | ||
10 | |||
11 | #include <linux/bitops.h> | ||
12 | |||
13 | #define HASH_BLOCK_SIZE 64 | ||
14 | #define HASH_DMA_ALIGN_SIZE 4 | ||
15 | #define HASH_DMA_PERFORMANCE_MIN_SIZE 1024 | ||
16 | #define HASH_BYTES_PER_WORD 4 | ||
17 | |||
18 | /* Maximum value of the length's high word */ | ||
19 | #define HASH_HIGH_WORD_MAX_VAL 0xFFFFFFFFUL | ||
20 | |||
21 | /* Power on Reset values HASH registers */ | ||
22 | #define HASH_RESET_CR_VALUE 0x0 | ||
23 | #define HASH_RESET_STR_VALUE 0x0 | ||
24 | |||
25 | /* Number of context swap registers */ | ||
26 | #define HASH_CSR_COUNT 52 | ||
27 | |||
28 | #define HASH_RESET_CSRX_REG_VALUE 0x0 | ||
29 | #define HASH_RESET_CSFULL_REG_VALUE 0x0 | ||
30 | #define HASH_RESET_CSDATAIN_REG_VALUE 0x0 | ||
31 | |||
32 | #define HASH_RESET_INDEX_VAL 0x0 | ||
33 | #define HASH_RESET_BIT_INDEX_VAL 0x0 | ||
34 | #define HASH_RESET_BUFFER_VAL 0x0 | ||
35 | #define HASH_RESET_LEN_HIGH_VAL 0x0 | ||
36 | #define HASH_RESET_LEN_LOW_VAL 0x0 | ||
37 | |||
38 | /* Control register bitfields */ | ||
39 | #define HASH_CR_RESUME_MASK 0x11FCF | ||
40 | |||
41 | #define HASH_CR_SWITCHON_POS 31 | ||
42 | #define HASH_CR_SWITCHON_MASK BIT(31) | ||
43 | |||
44 | #define HASH_CR_EMPTYMSG_POS 20 | ||
45 | #define HASH_CR_EMPTYMSG_MASK BIT(20) | ||
46 | |||
47 | #define HASH_CR_DINF_POS 12 | ||
48 | #define HASH_CR_DINF_MASK BIT(12) | ||
49 | |||
50 | #define HASH_CR_NBW_POS 8 | ||
51 | #define HASH_CR_NBW_MASK 0x00000F00UL | ||
52 | |||
53 | #define HASH_CR_LKEY_POS 16 | ||
54 | #define HASH_CR_LKEY_MASK BIT(16) | ||
55 | |||
56 | #define HASH_CR_ALGO_POS 7 | ||
57 | #define HASH_CR_ALGO_MASK BIT(7) | ||
58 | |||
59 | #define HASH_CR_MODE_POS 6 | ||
60 | #define HASH_CR_MODE_MASK BIT(6) | ||
61 | |||
62 | #define HASH_CR_DATAFORM_POS 4 | ||
63 | #define HASH_CR_DATAFORM_MASK (BIT(4) | BIT(5)) | ||
64 | |||
65 | #define HASH_CR_DMAE_POS 3 | ||
66 | #define HASH_CR_DMAE_MASK BIT(3) | ||
67 | |||
68 | #define HASH_CR_INIT_POS 2 | ||
69 | #define HASH_CR_INIT_MASK BIT(2) | ||
70 | |||
71 | #define HASH_CR_PRIVN_POS 1 | ||
72 | #define HASH_CR_PRIVN_MASK BIT(1) | ||
73 | |||
74 | #define HASH_CR_SECN_POS 0 | ||
75 | #define HASH_CR_SECN_MASK BIT(0) | ||
76 | |||
77 | /* Start register bitfields */ | ||
78 | #define HASH_STR_DCAL_POS 8 | ||
79 | #define HASH_STR_DCAL_MASK BIT(8) | ||
80 | #define HASH_STR_DEFAULT 0x0 | ||
81 | |||
82 | #define HASH_STR_NBLW_POS 0 | ||
83 | #define HASH_STR_NBLW_MASK 0x0000001FUL | ||
84 | |||
85 | #define HASH_NBLW_MAX_VAL 0x1F | ||
86 | |||
87 | /* PrimeCell IDs */ | ||
88 | #define HASH_P_ID0 0xE0 | ||
89 | #define HASH_P_ID1 0x05 | ||
90 | #define HASH_P_ID2 0x38 | ||
91 | #define HASH_P_ID3 0x00 | ||
92 | #define HASH_CELL_ID0 0x0D | ||
93 | #define HASH_CELL_ID1 0xF0 | ||
94 | #define HASH_CELL_ID2 0x05 | ||
95 | #define HASH_CELL_ID3 0xB1 | ||
96 | |||
97 | #define HASH_SET_BITS(reg_name, mask) \ | ||
98 | writel_relaxed((readl_relaxed(reg_name) | mask), reg_name) | ||
99 | |||
100 | #define HASH_CLEAR_BITS(reg_name, mask) \ | ||
101 | writel_relaxed((readl_relaxed(reg_name) & ~mask), reg_name) | ||
102 | |||
103 | #define HASH_PUT_BITS(reg, val, shift, mask) \ | ||
104 | writel_relaxed(((readl(reg) & ~(mask)) | \ | ||
105 | (((u32)val << shift) & (mask))), reg) | ||
106 | |||
107 | #define HASH_SET_DIN(val, len) writesl(&device_data->base->din, (val), (len)) | ||
108 | |||
109 | #define HASH_INITIALIZE \ | ||
110 | HASH_PUT_BITS( \ | ||
111 | &device_data->base->cr, \ | ||
112 | 0x01, HASH_CR_INIT_POS, \ | ||
113 | HASH_CR_INIT_MASK) | ||
114 | |||
115 | #define HASH_SET_DATA_FORMAT(data_format) \ | ||
116 | HASH_PUT_BITS( \ | ||
117 | &device_data->base->cr, \ | ||
118 | (u32) (data_format), HASH_CR_DATAFORM_POS, \ | ||
119 | HASH_CR_DATAFORM_MASK) | ||
120 | #define HASH_SET_NBLW(val) \ | ||
121 | HASH_PUT_BITS( \ | ||
122 | &device_data->base->str, \ | ||
123 | (u32) (val), HASH_STR_NBLW_POS, \ | ||
124 | HASH_STR_NBLW_MASK) | ||
125 | #define HASH_SET_DCAL \ | ||
126 | HASH_PUT_BITS( \ | ||
127 | &device_data->base->str, \ | ||
128 | 0x01, HASH_STR_DCAL_POS, \ | ||
129 | HASH_STR_DCAL_MASK) | ||
130 | |||
131 | /* Hardware access method */ | ||
132 | enum hash_mode { | ||
133 | HASH_MODE_CPU, | ||
134 | HASH_MODE_DMA | ||
135 | }; | ||
136 | |||
137 | /** | ||
138 | * struct uint64 - Structure to handle 64 bits integers. | ||
139 | * @high_word: Most significant bits. | ||
140 | * @low_word: Least significant bits. | ||
141 | * | ||
142 | * Used to handle 64 bits integers. | ||
143 | */ | ||
144 | struct uint64 { | ||
145 | u32 high_word; | ||
146 | u32 low_word; | ||
147 | }; | ||
148 | |||
149 | /** | ||
150 | * struct hash_register - Contains all registers in ux500 hash hardware. | ||
151 | * @cr: HASH control register (0x000). | ||
152 | * @din: HASH data input register (0x004). | ||
153 | * @str: HASH start register (0x008). | ||
154 | * @hx: HASH digest register 0..7 (0x00c-0x01C). | ||
155 | * @padding0: Reserved (0x02C). | ||
156 | * @itcr: Integration test control register (0x080). | ||
157 | * @itip: Integration test input register (0x084). | ||
158 | * @itop: Integration test output register (0x088). | ||
159 | * @padding1: Reserved (0x08C). | ||
160 | * @csfull: HASH context full register (0x0F8). | ||
161 | * @csdatain: HASH context swap data input register (0x0FC). | ||
162 | * @csrx: HASH context swap register 0..51 (0x100-0x1CC). | ||
163 | * @padding2: Reserved (0x1D0). | ||
164 | * @periphid0: HASH peripheral identification register 0 (0xFE0). | ||
165 | * @periphid1: HASH peripheral identification register 1 (0xFE4). | ||
166 | * @periphid2: HASH peripheral identification register 2 (0xFE8). | ||
167 | * @periphid3: HASH peripheral identification register 3 (0xFEC). | ||
168 | * @cellid0: HASH PCell identification register 0 (0xFF0). | ||
169 | * @cellid1: HASH PCell identification register 1 (0xFF4). | ||
170 | * @cellid2: HASH PCell identification register 2 (0xFF8). | ||
171 | * @cellid3: HASH PCell identification register 3 (0xFFC). | ||
172 | * | ||
173 | * The device communicates to the HASH via 32-bit-wide control registers | ||
174 | * accessible via the 32-bit width AMBA rev. 2.0 AHB Bus. Below is a structure | ||
175 | * with the registers used. | ||
176 | */ | ||
177 | struct hash_register { | ||
178 | u32 cr; | ||
179 | u32 din; | ||
180 | u32 str; | ||
181 | u32 hx[8]; | ||
182 | |||
183 | u32 padding0[(0x080 - 0x02C) / sizeof(u32)]; | ||
184 | |||
185 | u32 itcr; | ||
186 | u32 itip; | ||
187 | u32 itop; | ||
188 | |||
189 | u32 padding1[(0x0F8 - 0x08C) / sizeof(u32)]; | ||
190 | |||
191 | u32 csfull; | ||
192 | u32 csdatain; | ||
193 | u32 csrx[HASH_CSR_COUNT]; | ||
194 | |||
195 | u32 padding2[(0xFE0 - 0x1D0) / sizeof(u32)]; | ||
196 | |||
197 | u32 periphid0; | ||
198 | u32 periphid1; | ||
199 | u32 periphid2; | ||
200 | u32 periphid3; | ||
201 | |||
202 | u32 cellid0; | ||
203 | u32 cellid1; | ||
204 | u32 cellid2; | ||
205 | u32 cellid3; | ||
206 | }; | ||
207 | |||
208 | /** | ||
209 | * struct hash_state - Hash context state. | ||
210 | * @temp_cr: Temporary HASH Control Register. | ||
211 | * @str_reg: HASH Start Register. | ||
212 | * @din_reg: HASH Data Input Register. | ||
213 | * @csr[52]: HASH Context Swap Registers 0-39. | ||
214 | * @csfull: HASH Context Swap Registers 40 ie Status flags. | ||
215 | * @csdatain: HASH Context Swap Registers 41 ie Input data. | ||
216 | * @buffer: Working buffer for messages going to the hardware. | ||
217 | * @length: Length of the part of message hashed so far (floor(N/64) * 64). | ||
218 | * @index: Valid number of bytes in buffer (N % 64). | ||
219 | * @bit_index: Valid number of bits in buffer (N % 8). | ||
220 | * | ||
221 | * This structure is used between context switches, i.e. when ongoing jobs are | ||
222 | * interupted with new jobs. When this happens we need to store intermediate | ||
223 | * results in software. | ||
224 | * | ||
225 | * WARNING: "index" is the member of the structure, to be sure that "buffer" | ||
226 | * is aligned on a 4-bytes boundary. This is highly implementation dependent | ||
227 | * and MUST be checked whenever this code is ported on new platforms. | ||
228 | */ | ||
229 | struct hash_state { | ||
230 | u32 temp_cr; | ||
231 | u32 str_reg; | ||
232 | u32 din_reg; | ||
233 | u32 csr[52]; | ||
234 | u32 csfull; | ||
235 | u32 csdatain; | ||
236 | u32 buffer[HASH_BLOCK_SIZE / sizeof(u32)]; | ||
237 | struct uint64 length; | ||
238 | u8 index; | ||
239 | u8 bit_index; | ||
240 | }; | ||
241 | |||
242 | /** | ||
243 | * enum hash_device_id - HASH device ID. | ||
244 | * @HASH_DEVICE_ID_0: Hash hardware with ID 0 | ||
245 | * @HASH_DEVICE_ID_1: Hash hardware with ID 1 | ||
246 | */ | ||
247 | enum hash_device_id { | ||
248 | HASH_DEVICE_ID_0 = 0, | ||
249 | HASH_DEVICE_ID_1 = 1 | ||
250 | }; | ||
251 | |||
252 | /** | ||
253 | * enum hash_data_format - HASH data format. | ||
254 | * @HASH_DATA_32_BITS: 32 bits data format | ||
255 | * @HASH_DATA_16_BITS: 16 bits data format | ||
256 | * @HASH_DATA_8_BITS: 8 bits data format. | ||
257 | * @HASH_DATA_1_BITS: 1 bit data format. | ||
258 | */ | ||
259 | enum hash_data_format { | ||
260 | HASH_DATA_32_BITS = 0x0, | ||
261 | HASH_DATA_16_BITS = 0x1, | ||
262 | HASH_DATA_8_BITS = 0x2, | ||
263 | HASH_DATA_1_BIT = 0x3 | ||
264 | }; | ||
265 | |||
266 | /** | ||
267 | * enum hash_algo - Enumeration for selecting between SHA1 or SHA2 algorithm. | ||
268 | * @HASH_ALGO_SHA1: Indicates that SHA1 is used. | ||
269 | * @HASH_ALGO_SHA2: Indicates that SHA2 (SHA256) is used. | ||
270 | */ | ||
271 | enum hash_algo { | ||
272 | HASH_ALGO_SHA1 = 0x0, | ||
273 | HASH_ALGO_SHA256 = 0x1 | ||
274 | }; | ||
275 | |||
276 | /** | ||
277 | * enum hash_op - Enumeration for selecting between HASH or HMAC mode. | ||
278 | * @HASH_OPER_MODE_HASH: Indicates usage of normal HASH mode. | ||
279 | * @HASH_OPER_MODE_HMAC: Indicates usage of HMAC. | ||
280 | */ | ||
281 | enum hash_op { | ||
282 | HASH_OPER_MODE_HASH = 0x0, | ||
283 | HASH_OPER_MODE_HMAC = 0x1 | ||
284 | }; | ||
285 | |||
286 | /** | ||
287 | * struct hash_config - Configuration data for the hardware. | ||
288 | * @data_format: Format of data entered into the hash data in register. | ||
289 | * @algorithm: Algorithm selection bit. | ||
290 | * @oper_mode: Operating mode selection bit. | ||
291 | */ | ||
292 | struct hash_config { | ||
293 | int data_format; | ||
294 | int algorithm; | ||
295 | int oper_mode; | ||
296 | }; | ||
297 | |||
298 | /** | ||
299 | * struct hash_dma - Structure used for dma. | ||
300 | * @mask: DMA capabilities bitmap mask. | ||
301 | * @complete: Used to maintain state for a "completion". | ||
302 | * @chan_mem2hash: DMA channel. | ||
303 | * @cfg_mem2hash: DMA channel configuration. | ||
304 | * @sg_len: Scatterlist length. | ||
305 | * @sg: Scatterlist. | ||
306 | * @nents: Number of sg entries. | ||
307 | */ | ||
308 | struct hash_dma { | ||
309 | dma_cap_mask_t mask; | ||
310 | struct completion complete; | ||
311 | struct dma_chan *chan_mem2hash; | ||
312 | void *cfg_mem2hash; | ||
313 | int sg_len; | ||
314 | struct scatterlist *sg; | ||
315 | int nents; | ||
316 | }; | ||
317 | |||
318 | /** | ||
319 | * struct hash_ctx - The context used for hash calculations. | ||
320 | * @key: The key used in the operation. | ||
321 | * @keylen: The length of the key. | ||
322 | * @state: The state of the current calculations. | ||
323 | * @config: The current configuration. | ||
324 | * @digestsize: The size of current digest. | ||
325 | * @device: Pointer to the device structure. | ||
326 | */ | ||
327 | struct hash_ctx { | ||
328 | u8 *key; | ||
329 | u32 keylen; | ||
330 | struct hash_config config; | ||
331 | int digestsize; | ||
332 | struct hash_device_data *device; | ||
333 | }; | ||
334 | |||
335 | /** | ||
336 | * struct hash_ctx - The request context used for hash calculations. | ||
337 | * @state: The state of the current calculations. | ||
338 | * @dma_mode: Used in special cases (workaround), e.g. need to change to | ||
339 | * cpu mode, if not supported/working in dma mode. | ||
340 | * @updated: Indicates if hardware is initialized for new operations. | ||
341 | */ | ||
342 | struct hash_req_ctx { | ||
343 | struct hash_state state; | ||
344 | bool dma_mode; | ||
345 | u8 updated; | ||
346 | }; | ||
347 | |||
348 | /** | ||
349 | * struct hash_device_data - structure for a hash device. | ||
350 | * @base: Pointer to the hardware base address. | ||
351 | * @list_node: For inclusion in klist. | ||
352 | * @dev: Pointer to the device dev structure. | ||
353 | * @ctx_lock: Spinlock for current_ctx. | ||
354 | * @current_ctx: Pointer to the currently allocated context. | ||
355 | * @power_state: TRUE = power state on, FALSE = power state off. | ||
356 | * @power_state_lock: Spinlock for power_state. | ||
357 | * @regulator: Pointer to the device's power control. | ||
358 | * @clk: Pointer to the device's clock control. | ||
359 | * @restore_dev_state: TRUE = saved state, FALSE = no saved state. | ||
360 | * @dma: Structure used for dma. | ||
361 | */ | ||
362 | struct hash_device_data { | ||
363 | struct hash_register __iomem *base; | ||
364 | struct klist_node list_node; | ||
365 | struct device *dev; | ||
366 | struct spinlock ctx_lock; | ||
367 | struct hash_ctx *current_ctx; | ||
368 | bool power_state; | ||
369 | struct spinlock power_state_lock; | ||
370 | struct regulator *regulator; | ||
371 | struct clk *clk; | ||
372 | bool restore_dev_state; | ||
373 | struct hash_state state; /* Used for saving and resuming state */ | ||
374 | struct hash_dma dma; | ||
375 | }; | ||
376 | |||
377 | int hash_check_hw(struct hash_device_data *device_data); | ||
378 | |||
379 | int hash_setconfiguration(struct hash_device_data *device_data, | ||
380 | struct hash_config *config); | ||
381 | |||
382 | void hash_begin(struct hash_device_data *device_data, struct hash_ctx *ctx); | ||
383 | |||
384 | void hash_get_digest(struct hash_device_data *device_data, | ||
385 | u8 *digest, int algorithm); | ||
386 | |||
387 | int hash_hw_update(struct ahash_request *req); | ||
388 | |||
389 | int hash_save_state(struct hash_device_data *device_data, | ||
390 | struct hash_state *state); | ||
391 | |||
392 | int hash_resume_state(struct hash_device_data *device_data, | ||
393 | const struct hash_state *state); | ||
394 | |||
395 | #endif | ||
diff --git a/drivers/crypto/ux500/hash/hash_core.c b/drivers/crypto/ux500/hash/hash_core.c new file mode 100644 index 000000000000..6dbb9ec709a3 --- /dev/null +++ b/drivers/crypto/ux500/hash/hash_core.c | |||
@@ -0,0 +1,2009 @@ | |||
1 | /* | ||
2 | * Cryptographic API. | ||
3 | * Support for Nomadik hardware crypto engine. | ||
4 | |||
5 | * Copyright (C) ST-Ericsson SA 2010 | ||
6 | * Author: Shujuan Chen <shujuan.chen@stericsson.com> for ST-Ericsson | ||
7 | * Author: Joakim Bech <joakim.xx.bech@stericsson.com> for ST-Ericsson | ||
8 | * Author: Berne Hebark <berne.herbark@stericsson.com> for ST-Ericsson. | ||
9 | * Author: Niklas Hernaeus <niklas.hernaeus@stericsson.com> for ST-Ericsson. | ||
10 | * Author: Andreas Westin <andreas.westin@stericsson.com> for ST-Ericsson. | ||
11 | * License terms: GNU General Public License (GPL) version 2 | ||
12 | */ | ||
13 | |||
14 | #include <linux/clk.h> | ||
15 | #include <linux/device.h> | ||
16 | #include <linux/err.h> | ||
17 | #include <linux/init.h> | ||
18 | #include <linux/io.h> | ||
19 | #include <linux/klist.h> | ||
20 | #include <linux/kernel.h> | ||
21 | #include <linux/module.h> | ||
22 | #include <linux/platform_device.h> | ||
23 | #include <linux/crypto.h> | ||
24 | |||
25 | #include <linux/regulator/consumer.h> | ||
26 | #include <linux/dmaengine.h> | ||
27 | #include <linux/bitops.h> | ||
28 | |||
29 | #include <crypto/internal/hash.h> | ||
30 | #include <crypto/sha.h> | ||
31 | #include <crypto/scatterwalk.h> | ||
32 | #include <crypto/algapi.h> | ||
33 | |||
34 | #include <mach/crypto-ux500.h> | ||
35 | #include <mach/hardware.h> | ||
36 | |||
37 | #include "hash_alg.h" | ||
38 | |||
39 | #define DEV_DBG_NAME "hashX hashX:" | ||
40 | |||
41 | static int hash_mode; | ||
42 | module_param(hash_mode, int, 0); | ||
43 | MODULE_PARM_DESC(hash_mode, "CPU or DMA mode. CPU = 0 (default), DMA = 1"); | ||
44 | |||
45 | /** | ||
46 | * Pre-calculated empty message digests. | ||
47 | */ | ||
48 | static u8 zero_message_hash_sha1[SHA1_DIGEST_SIZE] = { | ||
49 | 0xda, 0x39, 0xa3, 0xee, 0x5e, 0x6b, 0x4b, 0x0d, | ||
50 | 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90, | ||
51 | 0xaf, 0xd8, 0x07, 0x09 | ||
52 | }; | ||
53 | |||
54 | static u8 zero_message_hash_sha256[SHA256_DIGEST_SIZE] = { | ||
55 | 0xe3, 0xb0, 0xc4, 0x42, 0x98, 0xfc, 0x1c, 0x14, | ||
56 | 0x9a, 0xfb, 0xf4, 0xc8, 0x99, 0x6f, 0xb9, 0x24, | ||
57 | 0x27, 0xae, 0x41, 0xe4, 0x64, 0x9b, 0x93, 0x4c, | ||
58 | 0xa4, 0x95, 0x99, 0x1b, 0x78, 0x52, 0xb8, 0x55 | ||
59 | }; | ||
60 | |||
61 | /* HMAC-SHA1, no key */ | ||
62 | static u8 zero_message_hmac_sha1[SHA1_DIGEST_SIZE] = { | ||
63 | 0xfb, 0xdb, 0x1d, 0x1b, 0x18, 0xaa, 0x6c, 0x08, | ||
64 | 0x32, 0x4b, 0x7d, 0x64, 0xb7, 0x1f, 0xb7, 0x63, | ||
65 | 0x70, 0x69, 0x0e, 0x1d | ||
66 | }; | ||
67 | |||
68 | /* HMAC-SHA256, no key */ | ||
69 | static u8 zero_message_hmac_sha256[SHA256_DIGEST_SIZE] = { | ||
70 | 0xb6, 0x13, 0x67, 0x9a, 0x08, 0x14, 0xd9, 0xec, | ||
71 | 0x77, 0x2f, 0x95, 0xd7, 0x78, 0xc3, 0x5f, 0xc5, | ||
72 | 0xff, 0x16, 0x97, 0xc4, 0x93, 0x71, 0x56, 0x53, | ||
73 | 0xc6, 0xc7, 0x12, 0x14, 0x42, 0x92, 0xc5, 0xad | ||
74 | }; | ||
75 | |||
76 | /** | ||
77 | * struct hash_driver_data - data specific to the driver. | ||
78 | * | ||
79 | * @device_list: A list of registered devices to choose from. | ||
80 | * @device_allocation: A semaphore initialized with number of devices. | ||
81 | */ | ||
82 | struct hash_driver_data { | ||
83 | struct klist device_list; | ||
84 | struct semaphore device_allocation; | ||
85 | }; | ||
86 | |||
87 | static struct hash_driver_data driver_data; | ||
88 | |||
89 | /* Declaration of functions */ | ||
90 | /** | ||
91 | * hash_messagepad - Pads a message and write the nblw bits. | ||
92 | * @device_data: Structure for the hash device. | ||
93 | * @message: Last word of a message | ||
94 | * @index_bytes: The number of bytes in the last message | ||
95 | * | ||
96 | * This function manages the final part of the digest calculation, when less | ||
97 | * than 512 bits (64 bytes) remain in message. This means index_bytes < 64. | ||
98 | * | ||
99 | */ | ||
100 | static void hash_messagepad(struct hash_device_data *device_data, | ||
101 | const u32 *message, u8 index_bytes); | ||
102 | |||
103 | /** | ||
104 | * release_hash_device - Releases a previously allocated hash device. | ||
105 | * @device_data: Structure for the hash device. | ||
106 | * | ||
107 | */ | ||
108 | static void release_hash_device(struct hash_device_data *device_data) | ||
109 | { | ||
110 | spin_lock(&device_data->ctx_lock); | ||
111 | device_data->current_ctx->device = NULL; | ||
112 | device_data->current_ctx = NULL; | ||
113 | spin_unlock(&device_data->ctx_lock); | ||
114 | |||
115 | /* | ||
116 | * The down_interruptible part for this semaphore is called in | ||
117 | * cryp_get_device_data. | ||
118 | */ | ||
119 | up(&driver_data.device_allocation); | ||
120 | } | ||
121 | |||
122 | static void hash_dma_setup_channel(struct hash_device_data *device_data, | ||
123 | struct device *dev) | ||
124 | { | ||
125 | struct hash_platform_data *platform_data = dev->platform_data; | ||
126 | dma_cap_zero(device_data->dma.mask); | ||
127 | dma_cap_set(DMA_SLAVE, device_data->dma.mask); | ||
128 | |||
129 | device_data->dma.cfg_mem2hash = platform_data->mem_to_engine; | ||
130 | device_data->dma.chan_mem2hash = | ||
131 | dma_request_channel(device_data->dma.mask, | ||
132 | platform_data->dma_filter, | ||
133 | device_data->dma.cfg_mem2hash); | ||
134 | |||
135 | init_completion(&device_data->dma.complete); | ||
136 | } | ||
137 | |||
138 | static void hash_dma_callback(void *data) | ||
139 | { | ||
140 | struct hash_ctx *ctx = (struct hash_ctx *) data; | ||
141 | |||
142 | complete(&ctx->device->dma.complete); | ||
143 | } | ||
144 | |||
145 | static int hash_set_dma_transfer(struct hash_ctx *ctx, struct scatterlist *sg, | ||
146 | int len, enum dma_data_direction direction) | ||
147 | { | ||
148 | struct dma_async_tx_descriptor *desc = NULL; | ||
149 | struct dma_chan *channel = NULL; | ||
150 | dma_cookie_t cookie; | ||
151 | |||
152 | if (direction != DMA_TO_DEVICE) { | ||
153 | dev_err(ctx->device->dev, "[%s] Invalid DMA direction", | ||
154 | __func__); | ||
155 | return -EFAULT; | ||
156 | } | ||
157 | |||
158 | sg->length = ALIGN(sg->length, HASH_DMA_ALIGN_SIZE); | ||
159 | |||
160 | channel = ctx->device->dma.chan_mem2hash; | ||
161 | ctx->device->dma.sg = sg; | ||
162 | ctx->device->dma.sg_len = dma_map_sg(channel->device->dev, | ||
163 | ctx->device->dma.sg, ctx->device->dma.nents, | ||
164 | direction); | ||
165 | |||
166 | if (!ctx->device->dma.sg_len) { | ||
167 | dev_err(ctx->device->dev, | ||
168 | "[%s]: Could not map the sg list (TO_DEVICE)", | ||
169 | __func__); | ||
170 | return -EFAULT; | ||
171 | } | ||
172 | |||
173 | dev_dbg(ctx->device->dev, "[%s]: Setting up DMA for buffer " | ||
174 | "(TO_DEVICE)", __func__); | ||
175 | desc = channel->device->device_prep_slave_sg(channel, | ||
176 | ctx->device->dma.sg, ctx->device->dma.sg_len, | ||
177 | direction, DMA_CTRL_ACK | DMA_PREP_INTERRUPT, NULL); | ||
178 | if (!desc) { | ||
179 | dev_err(ctx->device->dev, | ||
180 | "[%s]: device_prep_slave_sg() failed!", __func__); | ||
181 | return -EFAULT; | ||
182 | } | ||
183 | |||
184 | desc->callback = hash_dma_callback; | ||
185 | desc->callback_param = ctx; | ||
186 | |||
187 | cookie = desc->tx_submit(desc); | ||
188 | dma_async_issue_pending(channel); | ||
189 | |||
190 | return 0; | ||
191 | } | ||
192 | |||
193 | static void hash_dma_done(struct hash_ctx *ctx) | ||
194 | { | ||
195 | struct dma_chan *chan; | ||
196 | |||
197 | chan = ctx->device->dma.chan_mem2hash; | ||
198 | chan->device->device_control(chan, DMA_TERMINATE_ALL, 0); | ||
199 | dma_unmap_sg(chan->device->dev, ctx->device->dma.sg, | ||
200 | ctx->device->dma.sg_len, DMA_TO_DEVICE); | ||
201 | |||
202 | } | ||
203 | |||
204 | static int hash_dma_write(struct hash_ctx *ctx, | ||
205 | struct scatterlist *sg, int len) | ||
206 | { | ||
207 | int error = hash_set_dma_transfer(ctx, sg, len, DMA_TO_DEVICE); | ||
208 | if (error) { | ||
209 | dev_dbg(ctx->device->dev, "[%s]: hash_set_dma_transfer() " | ||
210 | "failed", __func__); | ||
211 | return error; | ||
212 | } | ||
213 | |||
214 | return len; | ||
215 | } | ||
216 | |||
217 | /** | ||
218 | * get_empty_message_digest - Returns a pre-calculated digest for | ||
219 | * the empty message. | ||
220 | * @device_data: Structure for the hash device. | ||
221 | * @zero_hash: Buffer to return the empty message digest. | ||
222 | * @zero_hash_size: Hash size of the empty message digest. | ||
223 | * @zero_digest: True if zero_digest returned. | ||
224 | */ | ||
225 | static int get_empty_message_digest( | ||
226 | struct hash_device_data *device_data, | ||
227 | u8 *zero_hash, u32 *zero_hash_size, bool *zero_digest) | ||
228 | { | ||
229 | int ret = 0; | ||
230 | struct hash_ctx *ctx = device_data->current_ctx; | ||
231 | *zero_digest = false; | ||
232 | |||
233 | /** | ||
234 | * Caller responsible for ctx != NULL. | ||
235 | */ | ||
236 | |||
237 | if (HASH_OPER_MODE_HASH == ctx->config.oper_mode) { | ||
238 | if (HASH_ALGO_SHA1 == ctx->config.algorithm) { | ||
239 | memcpy(zero_hash, &zero_message_hash_sha1[0], | ||
240 | SHA1_DIGEST_SIZE); | ||
241 | *zero_hash_size = SHA1_DIGEST_SIZE; | ||
242 | *zero_digest = true; | ||
243 | } else if (HASH_ALGO_SHA256 == | ||
244 | ctx->config.algorithm) { | ||
245 | memcpy(zero_hash, &zero_message_hash_sha256[0], | ||
246 | SHA256_DIGEST_SIZE); | ||
247 | *zero_hash_size = SHA256_DIGEST_SIZE; | ||
248 | *zero_digest = true; | ||
249 | } else { | ||
250 | dev_err(device_data->dev, "[%s] " | ||
251 | "Incorrect algorithm!" | ||
252 | , __func__); | ||
253 | ret = -EINVAL; | ||
254 | goto out; | ||
255 | } | ||
256 | } else if (HASH_OPER_MODE_HMAC == ctx->config.oper_mode) { | ||
257 | if (!ctx->keylen) { | ||
258 | if (HASH_ALGO_SHA1 == ctx->config.algorithm) { | ||
259 | memcpy(zero_hash, &zero_message_hmac_sha1[0], | ||
260 | SHA1_DIGEST_SIZE); | ||
261 | *zero_hash_size = SHA1_DIGEST_SIZE; | ||
262 | *zero_digest = true; | ||
263 | } else if (HASH_ALGO_SHA256 == ctx->config.algorithm) { | ||
264 | memcpy(zero_hash, &zero_message_hmac_sha256[0], | ||
265 | SHA256_DIGEST_SIZE); | ||
266 | *zero_hash_size = SHA256_DIGEST_SIZE; | ||
267 | *zero_digest = true; | ||
268 | } else { | ||
269 | dev_err(device_data->dev, "[%s] " | ||
270 | "Incorrect algorithm!" | ||
271 | , __func__); | ||
272 | ret = -EINVAL; | ||
273 | goto out; | ||
274 | } | ||
275 | } else { | ||
276 | dev_dbg(device_data->dev, "[%s] Continue hash " | ||
277 | "calculation, since hmac key avalable", | ||
278 | __func__); | ||
279 | } | ||
280 | } | ||
281 | out: | ||
282 | |||
283 | return ret; | ||
284 | } | ||
285 | |||
286 | /** | ||
287 | * hash_disable_power - Request to disable power and clock. | ||
288 | * @device_data: Structure for the hash device. | ||
289 | * @save_device_state: If true, saves the current hw state. | ||
290 | * | ||
291 | * This function request for disabling power (regulator) and clock, | ||
292 | * and could also save current hw state. | ||
293 | */ | ||
294 | static int hash_disable_power( | ||
295 | struct hash_device_data *device_data, | ||
296 | bool save_device_state) | ||
297 | { | ||
298 | int ret = 0; | ||
299 | struct device *dev = device_data->dev; | ||
300 | |||
301 | spin_lock(&device_data->power_state_lock); | ||
302 | if (!device_data->power_state) | ||
303 | goto out; | ||
304 | |||
305 | if (save_device_state) { | ||
306 | hash_save_state(device_data, | ||
307 | &device_data->state); | ||
308 | device_data->restore_dev_state = true; | ||
309 | } | ||
310 | |||
311 | clk_disable(device_data->clk); | ||
312 | ret = regulator_disable(device_data->regulator); | ||
313 | if (ret) | ||
314 | dev_err(dev, "[%s] regulator_disable() failed!", __func__); | ||
315 | |||
316 | device_data->power_state = false; | ||
317 | |||
318 | out: | ||
319 | spin_unlock(&device_data->power_state_lock); | ||
320 | |||
321 | return ret; | ||
322 | } | ||
323 | |||
324 | /** | ||
325 | * hash_enable_power - Request to enable power and clock. | ||
326 | * @device_data: Structure for the hash device. | ||
327 | * @restore_device_state: If true, restores a previous saved hw state. | ||
328 | * | ||
329 | * This function request for enabling power (regulator) and clock, | ||
330 | * and could also restore a previously saved hw state. | ||
331 | */ | ||
332 | static int hash_enable_power( | ||
333 | struct hash_device_data *device_data, | ||
334 | bool restore_device_state) | ||
335 | { | ||
336 | int ret = 0; | ||
337 | struct device *dev = device_data->dev; | ||
338 | |||
339 | spin_lock(&device_data->power_state_lock); | ||
340 | if (!device_data->power_state) { | ||
341 | ret = regulator_enable(device_data->regulator); | ||
342 | if (ret) { | ||
343 | dev_err(dev, "[%s]: regulator_enable() failed!", | ||
344 | __func__); | ||
345 | goto out; | ||
346 | } | ||
347 | ret = clk_enable(device_data->clk); | ||
348 | if (ret) { | ||
349 | dev_err(dev, "[%s]: clk_enable() failed!", | ||
350 | __func__); | ||
351 | ret = regulator_disable( | ||
352 | device_data->regulator); | ||
353 | goto out; | ||
354 | } | ||
355 | device_data->power_state = true; | ||
356 | } | ||
357 | |||
358 | if (device_data->restore_dev_state) { | ||
359 | if (restore_device_state) { | ||
360 | device_data->restore_dev_state = false; | ||
361 | hash_resume_state(device_data, | ||
362 | &device_data->state); | ||
363 | } | ||
364 | } | ||
365 | out: | ||
366 | spin_unlock(&device_data->power_state_lock); | ||
367 | |||
368 | return ret; | ||
369 | } | ||
370 | |||
371 | /** | ||
372 | * hash_get_device_data - Checks for an available hash device and return it. | ||
373 | * @hash_ctx: Structure for the hash context. | ||
374 | * @device_data: Structure for the hash device. | ||
375 | * | ||
376 | * This function check for an available hash device and return it to | ||
377 | * the caller. | ||
378 | * Note! Caller need to release the device, calling up(). | ||
379 | */ | ||
380 | static int hash_get_device_data(struct hash_ctx *ctx, | ||
381 | struct hash_device_data **device_data) | ||
382 | { | ||
383 | int ret; | ||
384 | struct klist_iter device_iterator; | ||
385 | struct klist_node *device_node; | ||
386 | struct hash_device_data *local_device_data = NULL; | ||
387 | |||
388 | /* Wait until a device is available */ | ||
389 | ret = down_interruptible(&driver_data.device_allocation); | ||
390 | if (ret) | ||
391 | return ret; /* Interrupted */ | ||
392 | |||
393 | /* Select a device */ | ||
394 | klist_iter_init(&driver_data.device_list, &device_iterator); | ||
395 | device_node = klist_next(&device_iterator); | ||
396 | while (device_node) { | ||
397 | local_device_data = container_of(device_node, | ||
398 | struct hash_device_data, list_node); | ||
399 | spin_lock(&local_device_data->ctx_lock); | ||
400 | /* current_ctx allocates a device, NULL = unallocated */ | ||
401 | if (local_device_data->current_ctx) { | ||
402 | device_node = klist_next(&device_iterator); | ||
403 | } else { | ||
404 | local_device_data->current_ctx = ctx; | ||
405 | ctx->device = local_device_data; | ||
406 | spin_unlock(&local_device_data->ctx_lock); | ||
407 | break; | ||
408 | } | ||
409 | spin_unlock(&local_device_data->ctx_lock); | ||
410 | } | ||
411 | klist_iter_exit(&device_iterator); | ||
412 | |||
413 | if (!device_node) { | ||
414 | /** | ||
415 | * No free device found. | ||
416 | * Since we allocated a device with down_interruptible, this | ||
417 | * should not be able to happen. | ||
418 | * Number of available devices, which are contained in | ||
419 | * device_allocation, is therefore decremented by not doing | ||
420 | * an up(device_allocation). | ||
421 | */ | ||
422 | return -EBUSY; | ||
423 | } | ||
424 | |||
425 | *device_data = local_device_data; | ||
426 | |||
427 | return 0; | ||
428 | } | ||
429 | |||
430 | /** | ||
431 | * hash_hw_write_key - Writes the key to the hardware registries. | ||
432 | * | ||
433 | * @device_data: Structure for the hash device. | ||
434 | * @key: Key to be written. | ||
435 | * @keylen: The lengt of the key. | ||
436 | * | ||
437 | * Note! This function DOES NOT write to the NBLW registry, even though | ||
438 | * specified in the the hw design spec. Either due to incorrect info in the | ||
439 | * spec or due to a bug in the hw. | ||
440 | */ | ||
441 | static void hash_hw_write_key(struct hash_device_data *device_data, | ||
442 | const u8 *key, unsigned int keylen) | ||
443 | { | ||
444 | u32 word = 0; | ||
445 | int nwords = 1; | ||
446 | |||
447 | HASH_CLEAR_BITS(&device_data->base->str, HASH_STR_NBLW_MASK); | ||
448 | |||
449 | while (keylen >= 4) { | ||
450 | u32 *key_word = (u32 *)key; | ||
451 | |||
452 | HASH_SET_DIN(key_word, nwords); | ||
453 | keylen -= 4; | ||
454 | key += 4; | ||
455 | } | ||
456 | |||
457 | /* Take care of the remaining bytes in the last word */ | ||
458 | if (keylen) { | ||
459 | word = 0; | ||
460 | while (keylen) { | ||
461 | word |= (key[keylen - 1] << (8 * (keylen - 1))); | ||
462 | keylen--; | ||
463 | } | ||
464 | |||
465 | HASH_SET_DIN(&word, nwords); | ||
466 | } | ||
467 | |||
468 | while (device_data->base->str & HASH_STR_DCAL_MASK) | ||
469 | cpu_relax(); | ||
470 | |||
471 | HASH_SET_DCAL; | ||
472 | |||
473 | while (device_data->base->str & HASH_STR_DCAL_MASK) | ||
474 | cpu_relax(); | ||
475 | } | ||
476 | |||
477 | /** | ||
478 | * init_hash_hw - Initialise the hash hardware for a new calculation. | ||
479 | * @device_data: Structure for the hash device. | ||
480 | * @ctx: The hash context. | ||
481 | * | ||
482 | * This function will enable the bits needed to clear and start a new | ||
483 | * calculation. | ||
484 | */ | ||
485 | static int init_hash_hw(struct hash_device_data *device_data, | ||
486 | struct hash_ctx *ctx) | ||
487 | { | ||
488 | int ret = 0; | ||
489 | |||
490 | ret = hash_setconfiguration(device_data, &ctx->config); | ||
491 | if (ret) { | ||
492 | dev_err(device_data->dev, "[%s] hash_setconfiguration() " | ||
493 | "failed!", __func__); | ||
494 | return ret; | ||
495 | } | ||
496 | |||
497 | hash_begin(device_data, ctx); | ||
498 | |||
499 | if (ctx->config.oper_mode == HASH_OPER_MODE_HMAC) | ||
500 | hash_hw_write_key(device_data, ctx->key, ctx->keylen); | ||
501 | |||
502 | return ret; | ||
503 | } | ||
504 | |||
505 | /** | ||
506 | * hash_get_nents - Return number of entries (nents) in scatterlist (sg). | ||
507 | * | ||
508 | * @sg: Scatterlist. | ||
509 | * @size: Size in bytes. | ||
510 | * @aligned: True if sg data aligned to work in DMA mode. | ||
511 | * | ||
512 | */ | ||
513 | static int hash_get_nents(struct scatterlist *sg, int size, bool *aligned) | ||
514 | { | ||
515 | int nents = 0; | ||
516 | bool aligned_data = true; | ||
517 | |||
518 | while (size > 0 && sg) { | ||
519 | nents++; | ||
520 | size -= sg->length; | ||
521 | |||
522 | /* hash_set_dma_transfer will align last nent */ | ||
523 | if ((aligned && !IS_ALIGNED(sg->offset, HASH_DMA_ALIGN_SIZE)) | ||
524 | || (!IS_ALIGNED(sg->length, HASH_DMA_ALIGN_SIZE) && | ||
525 | size > 0)) | ||
526 | aligned_data = false; | ||
527 | |||
528 | sg = sg_next(sg); | ||
529 | } | ||
530 | |||
531 | if (aligned) | ||
532 | *aligned = aligned_data; | ||
533 | |||
534 | if (size != 0) | ||
535 | return -EFAULT; | ||
536 | |||
537 | return nents; | ||
538 | } | ||
539 | |||
540 | /** | ||
541 | * hash_dma_valid_data - checks for dma valid sg data. | ||
542 | * @sg: Scatterlist. | ||
543 | * @datasize: Datasize in bytes. | ||
544 | * | ||
545 | * NOTE! This function checks for dma valid sg data, since dma | ||
546 | * only accept datasizes of even wordsize. | ||
547 | */ | ||
548 | static bool hash_dma_valid_data(struct scatterlist *sg, int datasize) | ||
549 | { | ||
550 | bool aligned; | ||
551 | |||
552 | /* Need to include at least one nent, else error */ | ||
553 | if (hash_get_nents(sg, datasize, &aligned) < 1) | ||
554 | return false; | ||
555 | |||
556 | return aligned; | ||
557 | } | ||
558 | |||
559 | /** | ||
560 | * hash_init - Common hash init function for SHA1/SHA2 (SHA256). | ||
561 | * @req: The hash request for the job. | ||
562 | * | ||
563 | * Initialize structures. | ||
564 | */ | ||
565 | static int hash_init(struct ahash_request *req) | ||
566 | { | ||
567 | struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); | ||
568 | struct hash_ctx *ctx = crypto_ahash_ctx(tfm); | ||
569 | struct hash_req_ctx *req_ctx = ahash_request_ctx(req); | ||
570 | |||
571 | if (!ctx->key) | ||
572 | ctx->keylen = 0; | ||
573 | |||
574 | memset(&req_ctx->state, 0, sizeof(struct hash_state)); | ||
575 | req_ctx->updated = 0; | ||
576 | if (hash_mode == HASH_MODE_DMA) { | ||
577 | if (req->nbytes < HASH_DMA_ALIGN_SIZE) { | ||
578 | req_ctx->dma_mode = false; /* Don't use DMA */ | ||
579 | |||
580 | pr_debug(DEV_DBG_NAME " [%s] DMA mode, but direct " | ||
581 | "to CPU mode for data size < %d", | ||
582 | __func__, HASH_DMA_ALIGN_SIZE); | ||
583 | } else { | ||
584 | if (req->nbytes >= HASH_DMA_PERFORMANCE_MIN_SIZE && | ||
585 | hash_dma_valid_data(req->src, | ||
586 | req->nbytes)) { | ||
587 | req_ctx->dma_mode = true; | ||
588 | } else { | ||
589 | req_ctx->dma_mode = false; | ||
590 | pr_debug(DEV_DBG_NAME " [%s] DMA mode, but use" | ||
591 | " CPU mode for datalength < %d" | ||
592 | " or non-aligned data, except " | ||
593 | "in last nent", __func__, | ||
594 | HASH_DMA_PERFORMANCE_MIN_SIZE); | ||
595 | } | ||
596 | } | ||
597 | } | ||
598 | return 0; | ||
599 | } | ||
600 | |||
601 | /** | ||
602 | * hash_processblock - This function processes a single block of 512 bits (64 | ||
603 | * bytes), word aligned, starting at message. | ||
604 | * @device_data: Structure for the hash device. | ||
605 | * @message: Block (512 bits) of message to be written to | ||
606 | * the HASH hardware. | ||
607 | * | ||
608 | */ | ||
609 | static void hash_processblock( | ||
610 | struct hash_device_data *device_data, | ||
611 | const u32 *message, int length) | ||
612 | { | ||
613 | int len = length / HASH_BYTES_PER_WORD; | ||
614 | /* | ||
615 | * NBLW bits. Reset the number of bits in last word (NBLW). | ||
616 | */ | ||
617 | HASH_CLEAR_BITS(&device_data->base->str, HASH_STR_NBLW_MASK); | ||
618 | |||
619 | /* | ||
620 | * Write message data to the HASH_DIN register. | ||
621 | */ | ||
622 | HASH_SET_DIN(message, len); | ||
623 | } | ||
624 | |||
625 | /** | ||
626 | * hash_messagepad - Pads a message and write the nblw bits. | ||
627 | * @device_data: Structure for the hash device. | ||
628 | * @message: Last word of a message. | ||
629 | * @index_bytes: The number of bytes in the last message. | ||
630 | * | ||
631 | * This function manages the final part of the digest calculation, when less | ||
632 | * than 512 bits (64 bytes) remain in message. This means index_bytes < 64. | ||
633 | * | ||
634 | */ | ||
635 | static void hash_messagepad(struct hash_device_data *device_data, | ||
636 | const u32 *message, u8 index_bytes) | ||
637 | { | ||
638 | int nwords = 1; | ||
639 | |||
640 | /* | ||
641 | * Clear hash str register, only clear NBLW | ||
642 | * since DCAL will be reset by hardware. | ||
643 | */ | ||
644 | HASH_CLEAR_BITS(&device_data->base->str, HASH_STR_NBLW_MASK); | ||
645 | |||
646 | /* Main loop */ | ||
647 | while (index_bytes >= 4) { | ||
648 | HASH_SET_DIN(message, nwords); | ||
649 | index_bytes -= 4; | ||
650 | message++; | ||
651 | } | ||
652 | |||
653 | if (index_bytes) | ||
654 | HASH_SET_DIN(message, nwords); | ||
655 | |||
656 | while (device_data->base->str & HASH_STR_DCAL_MASK) | ||
657 | cpu_relax(); | ||
658 | |||
659 | /* num_of_bytes == 0 => NBLW <- 0 (32 bits valid in DATAIN) */ | ||
660 | HASH_SET_NBLW(index_bytes * 8); | ||
661 | dev_dbg(device_data->dev, "[%s] DIN=0x%08x NBLW=%d", __func__, | ||
662 | readl_relaxed(&device_data->base->din), | ||
663 | (int)(readl_relaxed(&device_data->base->str) & | ||
664 | HASH_STR_NBLW_MASK)); | ||
665 | HASH_SET_DCAL; | ||
666 | dev_dbg(device_data->dev, "[%s] after dcal -> DIN=0x%08x NBLW=%d", | ||
667 | __func__, readl_relaxed(&device_data->base->din), | ||
668 | (int)(readl_relaxed(&device_data->base->str) & | ||
669 | HASH_STR_NBLW_MASK)); | ||
670 | |||
671 | while (device_data->base->str & HASH_STR_DCAL_MASK) | ||
672 | cpu_relax(); | ||
673 | } | ||
674 | |||
675 | /** | ||
676 | * hash_incrementlength - Increments the length of the current message. | ||
677 | * @ctx: Hash context | ||
678 | * @incr: Length of message processed already | ||
679 | * | ||
680 | * Overflow cannot occur, because conditions for overflow are checked in | ||
681 | * hash_hw_update. | ||
682 | */ | ||
683 | static void hash_incrementlength(struct hash_req_ctx *ctx, u32 incr) | ||
684 | { | ||
685 | ctx->state.length.low_word += incr; | ||
686 | |||
687 | /* Check for wrap-around */ | ||
688 | if (ctx->state.length.low_word < incr) | ||
689 | ctx->state.length.high_word++; | ||
690 | } | ||
691 | |||
692 | /** | ||
693 | * hash_setconfiguration - Sets the required configuration for the hash | ||
694 | * hardware. | ||
695 | * @device_data: Structure for the hash device. | ||
696 | * @config: Pointer to a configuration structure. | ||
697 | */ | ||
698 | int hash_setconfiguration(struct hash_device_data *device_data, | ||
699 | struct hash_config *config) | ||
700 | { | ||
701 | int ret = 0; | ||
702 | |||
703 | if (config->algorithm != HASH_ALGO_SHA1 && | ||
704 | config->algorithm != HASH_ALGO_SHA256) | ||
705 | return -EPERM; | ||
706 | |||
707 | /* | ||
708 | * DATAFORM bits. Set the DATAFORM bits to 0b11, which means the data | ||
709 | * to be written to HASH_DIN is considered as 32 bits. | ||
710 | */ | ||
711 | HASH_SET_DATA_FORMAT(config->data_format); | ||
712 | |||
713 | /* | ||
714 | * ALGO bit. Set to 0b1 for SHA-1 and 0b0 for SHA-256 | ||
715 | */ | ||
716 | switch (config->algorithm) { | ||
717 | case HASH_ALGO_SHA1: | ||
718 | HASH_SET_BITS(&device_data->base->cr, HASH_CR_ALGO_MASK); | ||
719 | break; | ||
720 | |||
721 | case HASH_ALGO_SHA256: | ||
722 | HASH_CLEAR_BITS(&device_data->base->cr, HASH_CR_ALGO_MASK); | ||
723 | break; | ||
724 | |||
725 | default: | ||
726 | dev_err(device_data->dev, "[%s] Incorrect algorithm.", | ||
727 | __func__); | ||
728 | return -EPERM; | ||
729 | } | ||
730 | |||
731 | /* | ||
732 | * MODE bit. This bit selects between HASH or HMAC mode for the | ||
733 | * selected algorithm. 0b0 = HASH and 0b1 = HMAC. | ||
734 | */ | ||
735 | if (HASH_OPER_MODE_HASH == config->oper_mode) | ||
736 | HASH_CLEAR_BITS(&device_data->base->cr, | ||
737 | HASH_CR_MODE_MASK); | ||
738 | else if (HASH_OPER_MODE_HMAC == config->oper_mode) { | ||
739 | HASH_SET_BITS(&device_data->base->cr, | ||
740 | HASH_CR_MODE_MASK); | ||
741 | if (device_data->current_ctx->keylen > HASH_BLOCK_SIZE) { | ||
742 | /* Truncate key to blocksize */ | ||
743 | dev_dbg(device_data->dev, "[%s] LKEY set", __func__); | ||
744 | HASH_SET_BITS(&device_data->base->cr, | ||
745 | HASH_CR_LKEY_MASK); | ||
746 | } else { | ||
747 | dev_dbg(device_data->dev, "[%s] LKEY cleared", | ||
748 | __func__); | ||
749 | HASH_CLEAR_BITS(&device_data->base->cr, | ||
750 | HASH_CR_LKEY_MASK); | ||
751 | } | ||
752 | } else { /* Wrong hash mode */ | ||
753 | ret = -EPERM; | ||
754 | dev_err(device_data->dev, "[%s] HASH_INVALID_PARAMETER!", | ||
755 | __func__); | ||
756 | } | ||
757 | return ret; | ||
758 | } | ||
759 | |||
760 | /** | ||
761 | * hash_begin - This routine resets some globals and initializes the hash | ||
762 | * hardware. | ||
763 | * @device_data: Structure for the hash device. | ||
764 | * @ctx: Hash context. | ||
765 | */ | ||
766 | void hash_begin(struct hash_device_data *device_data, struct hash_ctx *ctx) | ||
767 | { | ||
768 | /* HW and SW initializations */ | ||
769 | /* Note: there is no need to initialize buffer and digest members */ | ||
770 | |||
771 | while (device_data->base->str & HASH_STR_DCAL_MASK) | ||
772 | cpu_relax(); | ||
773 | |||
774 | /* | ||
775 | * INIT bit. Set this bit to 0b1 to reset the HASH processor core and | ||
776 | * prepare the initialize the HASH accelerator to compute the message | ||
777 | * digest of a new message. | ||
778 | */ | ||
779 | HASH_INITIALIZE; | ||
780 | |||
781 | /* | ||
782 | * NBLW bits. Reset the number of bits in last word (NBLW). | ||
783 | */ | ||
784 | HASH_CLEAR_BITS(&device_data->base->str, HASH_STR_NBLW_MASK); | ||
785 | } | ||
786 | |||
787 | int hash_process_data( | ||
788 | struct hash_device_data *device_data, | ||
789 | struct hash_ctx *ctx, struct hash_req_ctx *req_ctx, | ||
790 | int msg_length, u8 *data_buffer, u8 *buffer, u8 *index) | ||
791 | { | ||
792 | int ret = 0; | ||
793 | u32 count; | ||
794 | |||
795 | do { | ||
796 | if ((*index + msg_length) < HASH_BLOCK_SIZE) { | ||
797 | for (count = 0; count < msg_length; count++) { | ||
798 | buffer[*index + count] = | ||
799 | *(data_buffer + count); | ||
800 | } | ||
801 | *index += msg_length; | ||
802 | msg_length = 0; | ||
803 | } else { | ||
804 | if (req_ctx->updated) { | ||
805 | |||
806 | ret = hash_resume_state(device_data, | ||
807 | &device_data->state); | ||
808 | memmove(req_ctx->state.buffer, | ||
809 | device_data->state.buffer, | ||
810 | HASH_BLOCK_SIZE / sizeof(u32)); | ||
811 | if (ret) { | ||
812 | dev_err(device_data->dev, "[%s] " | ||
813 | "hash_resume_state()" | ||
814 | " failed!", __func__); | ||
815 | goto out; | ||
816 | } | ||
817 | } else { | ||
818 | ret = init_hash_hw(device_data, ctx); | ||
819 | if (ret) { | ||
820 | dev_err(device_data->dev, "[%s] " | ||
821 | "init_hash_hw()" | ||
822 | " failed!", __func__); | ||
823 | goto out; | ||
824 | } | ||
825 | req_ctx->updated = 1; | ||
826 | } | ||
827 | /* | ||
828 | * If 'data_buffer' is four byte aligned and | ||
829 | * local buffer does not have any data, we can | ||
830 | * write data directly from 'data_buffer' to | ||
831 | * HW peripheral, otherwise we first copy data | ||
832 | * to a local buffer | ||
833 | */ | ||
834 | if ((0 == (((u32)data_buffer) % 4)) | ||
835 | && (0 == *index)) | ||
836 | hash_processblock(device_data, | ||
837 | (const u32 *) | ||
838 | data_buffer, HASH_BLOCK_SIZE); | ||
839 | else { | ||
840 | for (count = 0; count < | ||
841 | (u32)(HASH_BLOCK_SIZE - | ||
842 | *index); | ||
843 | count++) { | ||
844 | buffer[*index + count] = | ||
845 | *(data_buffer + count); | ||
846 | } | ||
847 | hash_processblock(device_data, | ||
848 | (const u32 *)buffer, | ||
849 | HASH_BLOCK_SIZE); | ||
850 | } | ||
851 | hash_incrementlength(req_ctx, HASH_BLOCK_SIZE); | ||
852 | data_buffer += (HASH_BLOCK_SIZE - *index); | ||
853 | |||
854 | msg_length -= (HASH_BLOCK_SIZE - *index); | ||
855 | *index = 0; | ||
856 | |||
857 | ret = hash_save_state(device_data, | ||
858 | &device_data->state); | ||
859 | |||
860 | memmove(device_data->state.buffer, | ||
861 | req_ctx->state.buffer, | ||
862 | HASH_BLOCK_SIZE / sizeof(u32)); | ||
863 | if (ret) { | ||
864 | dev_err(device_data->dev, "[%s] " | ||
865 | "hash_save_state()" | ||
866 | " failed!", __func__); | ||
867 | goto out; | ||
868 | } | ||
869 | } | ||
870 | } while (msg_length != 0); | ||
871 | out: | ||
872 | |||
873 | return ret; | ||
874 | } | ||
875 | |||
876 | /** | ||
877 | * hash_dma_final - The hash dma final function for SHA1/SHA256. | ||
878 | * @req: The hash request for the job. | ||
879 | */ | ||
880 | static int hash_dma_final(struct ahash_request *req) | ||
881 | { | ||
882 | int ret = 0; | ||
883 | struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); | ||
884 | struct hash_ctx *ctx = crypto_ahash_ctx(tfm); | ||
885 | struct hash_req_ctx *req_ctx = ahash_request_ctx(req); | ||
886 | struct hash_device_data *device_data; | ||
887 | u8 digest[SHA256_DIGEST_SIZE]; | ||
888 | int bytes_written = 0; | ||
889 | |||
890 | ret = hash_get_device_data(ctx, &device_data); | ||
891 | if (ret) | ||
892 | return ret; | ||
893 | |||
894 | dev_dbg(device_data->dev, "[%s] (ctx=0x%x)!", __func__, (u32) ctx); | ||
895 | |||
896 | if (req_ctx->updated) { | ||
897 | ret = hash_resume_state(device_data, &device_data->state); | ||
898 | |||
899 | if (ret) { | ||
900 | dev_err(device_data->dev, "[%s] hash_resume_state() " | ||
901 | "failed!", __func__); | ||
902 | goto out; | ||
903 | } | ||
904 | |||
905 | } | ||
906 | |||
907 | if (!req_ctx->updated) { | ||
908 | ret = hash_setconfiguration(device_data, &ctx->config); | ||
909 | if (ret) { | ||
910 | dev_err(device_data->dev, "[%s] " | ||
911 | "hash_setconfiguration() failed!", | ||
912 | __func__); | ||
913 | goto out; | ||
914 | } | ||
915 | |||
916 | /* Enable DMA input */ | ||
917 | if (hash_mode != HASH_MODE_DMA || !req_ctx->dma_mode) { | ||
918 | HASH_CLEAR_BITS(&device_data->base->cr, | ||
919 | HASH_CR_DMAE_MASK); | ||
920 | } else { | ||
921 | HASH_SET_BITS(&device_data->base->cr, | ||
922 | HASH_CR_DMAE_MASK); | ||
923 | HASH_SET_BITS(&device_data->base->cr, | ||
924 | HASH_CR_PRIVN_MASK); | ||
925 | } | ||
926 | |||
927 | HASH_INITIALIZE; | ||
928 | |||
929 | if (ctx->config.oper_mode == HASH_OPER_MODE_HMAC) | ||
930 | hash_hw_write_key(device_data, ctx->key, ctx->keylen); | ||
931 | |||
932 | /* Number of bits in last word = (nbytes * 8) % 32 */ | ||
933 | HASH_SET_NBLW((req->nbytes * 8) % 32); | ||
934 | req_ctx->updated = 1; | ||
935 | } | ||
936 | |||
937 | /* Store the nents in the dma struct. */ | ||
938 | ctx->device->dma.nents = hash_get_nents(req->src, req->nbytes, NULL); | ||
939 | if (!ctx->device->dma.nents) { | ||
940 | dev_err(device_data->dev, "[%s] " | ||
941 | "ctx->device->dma.nents = 0", __func__); | ||
942 | goto out; | ||
943 | } | ||
944 | |||
945 | bytes_written = hash_dma_write(ctx, req->src, req->nbytes); | ||
946 | if (bytes_written != req->nbytes) { | ||
947 | dev_err(device_data->dev, "[%s] " | ||
948 | "hash_dma_write() failed!", __func__); | ||
949 | goto out; | ||
950 | } | ||
951 | |||
952 | wait_for_completion(&ctx->device->dma.complete); | ||
953 | hash_dma_done(ctx); | ||
954 | |||
955 | while (device_data->base->str & HASH_STR_DCAL_MASK) | ||
956 | cpu_relax(); | ||
957 | |||
958 | if (ctx->config.oper_mode == HASH_OPER_MODE_HMAC && ctx->key) { | ||
959 | unsigned int keylen = ctx->keylen; | ||
960 | u8 *key = ctx->key; | ||
961 | |||
962 | dev_dbg(device_data->dev, "[%s] keylen: %d", __func__, | ||
963 | ctx->keylen); | ||
964 | hash_hw_write_key(device_data, key, keylen); | ||
965 | } | ||
966 | |||
967 | hash_get_digest(device_data, digest, ctx->config.algorithm); | ||
968 | memcpy(req->result, digest, ctx->digestsize); | ||
969 | |||
970 | out: | ||
971 | release_hash_device(device_data); | ||
972 | |||
973 | /** | ||
974 | * Allocated in setkey, and only used in HMAC. | ||
975 | */ | ||
976 | kfree(ctx->key); | ||
977 | |||
978 | return ret; | ||
979 | } | ||
980 | |||
981 | /** | ||
982 | * hash_hw_final - The final hash calculation function | ||
983 | * @req: The hash request for the job. | ||
984 | */ | ||
985 | int hash_hw_final(struct ahash_request *req) | ||
986 | { | ||
987 | int ret = 0; | ||
988 | struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); | ||
989 | struct hash_ctx *ctx = crypto_ahash_ctx(tfm); | ||
990 | struct hash_req_ctx *req_ctx = ahash_request_ctx(req); | ||
991 | struct hash_device_data *device_data; | ||
992 | u8 digest[SHA256_DIGEST_SIZE]; | ||
993 | |||
994 | ret = hash_get_device_data(ctx, &device_data); | ||
995 | if (ret) | ||
996 | return ret; | ||
997 | |||
998 | dev_dbg(device_data->dev, "[%s] (ctx=0x%x)!", __func__, (u32) ctx); | ||
999 | |||
1000 | if (req_ctx->updated) { | ||
1001 | ret = hash_resume_state(device_data, &device_data->state); | ||
1002 | |||
1003 | if (ret) { | ||
1004 | dev_err(device_data->dev, "[%s] hash_resume_state() " | ||
1005 | "failed!", __func__); | ||
1006 | goto out; | ||
1007 | } | ||
1008 | } else if (req->nbytes == 0 && ctx->keylen == 0) { | ||
1009 | u8 zero_hash[SHA256_DIGEST_SIZE]; | ||
1010 | u32 zero_hash_size = 0; | ||
1011 | bool zero_digest = false; | ||
1012 | /** | ||
1013 | * Use a pre-calculated empty message digest | ||
1014 | * (workaround since hw return zeroes, hw bug!?) | ||
1015 | */ | ||
1016 | ret = get_empty_message_digest(device_data, &zero_hash[0], | ||
1017 | &zero_hash_size, &zero_digest); | ||
1018 | if (!ret && likely(zero_hash_size == ctx->digestsize) && | ||
1019 | zero_digest) { | ||
1020 | memcpy(req->result, &zero_hash[0], ctx->digestsize); | ||
1021 | goto out; | ||
1022 | } else if (!ret && !zero_digest) { | ||
1023 | dev_dbg(device_data->dev, "[%s] HMAC zero msg with " | ||
1024 | "key, continue...", __func__); | ||
1025 | } else { | ||
1026 | dev_err(device_data->dev, "[%s] ret=%d, or wrong " | ||
1027 | "digest size? %s", __func__, ret, | ||
1028 | (zero_hash_size == ctx->digestsize) ? | ||
1029 | "true" : "false"); | ||
1030 | /* Return error */ | ||
1031 | goto out; | ||
1032 | } | ||
1033 | } else if (req->nbytes == 0 && ctx->keylen > 0) { | ||
1034 | dev_err(device_data->dev, "[%s] Empty message with " | ||
1035 | "keylength > 0, NOT supported.", __func__); | ||
1036 | goto out; | ||
1037 | } | ||
1038 | |||
1039 | if (!req_ctx->updated) { | ||
1040 | ret = init_hash_hw(device_data, ctx); | ||
1041 | if (ret) { | ||
1042 | dev_err(device_data->dev, "[%s] init_hash_hw() " | ||
1043 | "failed!", __func__); | ||
1044 | goto out; | ||
1045 | } | ||
1046 | } | ||
1047 | |||
1048 | if (req_ctx->state.index) { | ||
1049 | hash_messagepad(device_data, req_ctx->state.buffer, | ||
1050 | req_ctx->state.index); | ||
1051 | } else { | ||
1052 | HASH_SET_DCAL; | ||
1053 | while (device_data->base->str & HASH_STR_DCAL_MASK) | ||
1054 | cpu_relax(); | ||
1055 | } | ||
1056 | |||
1057 | if (ctx->config.oper_mode == HASH_OPER_MODE_HMAC && ctx->key) { | ||
1058 | unsigned int keylen = ctx->keylen; | ||
1059 | u8 *key = ctx->key; | ||
1060 | |||
1061 | dev_dbg(device_data->dev, "[%s] keylen: %d", __func__, | ||
1062 | ctx->keylen); | ||
1063 | hash_hw_write_key(device_data, key, keylen); | ||
1064 | } | ||
1065 | |||
1066 | hash_get_digest(device_data, digest, ctx->config.algorithm); | ||
1067 | memcpy(req->result, digest, ctx->digestsize); | ||
1068 | |||
1069 | out: | ||
1070 | release_hash_device(device_data); | ||
1071 | |||
1072 | /** | ||
1073 | * Allocated in setkey, and only used in HMAC. | ||
1074 | */ | ||
1075 | kfree(ctx->key); | ||
1076 | |||
1077 | return ret; | ||
1078 | } | ||
1079 | |||
1080 | /** | ||
1081 | * hash_hw_update - Updates current HASH computation hashing another part of | ||
1082 | * the message. | ||
1083 | * @req: Byte array containing the message to be hashed (caller | ||
1084 | * allocated). | ||
1085 | */ | ||
1086 | int hash_hw_update(struct ahash_request *req) | ||
1087 | { | ||
1088 | int ret = 0; | ||
1089 | u8 index = 0; | ||
1090 | u8 *buffer; | ||
1091 | struct hash_device_data *device_data; | ||
1092 | u8 *data_buffer; | ||
1093 | struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); | ||
1094 | struct hash_ctx *ctx = crypto_ahash_ctx(tfm); | ||
1095 | struct hash_req_ctx *req_ctx = ahash_request_ctx(req); | ||
1096 | struct crypto_hash_walk walk; | ||
1097 | int msg_length = crypto_hash_walk_first(req, &walk); | ||
1098 | |||
1099 | /* Empty message ("") is correct indata */ | ||
1100 | if (msg_length == 0) | ||
1101 | return ret; | ||
1102 | |||
1103 | index = req_ctx->state.index; | ||
1104 | buffer = (u8 *)req_ctx->state.buffer; | ||
1105 | |||
1106 | /* Check if ctx->state.length + msg_length | ||
1107 | overflows */ | ||
1108 | if (msg_length > (req_ctx->state.length.low_word + msg_length) && | ||
1109 | HASH_HIGH_WORD_MAX_VAL == | ||
1110 | req_ctx->state.length.high_word) { | ||
1111 | pr_err(DEV_DBG_NAME " [%s] HASH_MSG_LENGTH_OVERFLOW!", | ||
1112 | __func__); | ||
1113 | return -EPERM; | ||
1114 | } | ||
1115 | |||
1116 | ret = hash_get_device_data(ctx, &device_data); | ||
1117 | if (ret) | ||
1118 | return ret; | ||
1119 | |||
1120 | /* Main loop */ | ||
1121 | while (0 != msg_length) { | ||
1122 | data_buffer = walk.data; | ||
1123 | ret = hash_process_data(device_data, ctx, req_ctx, msg_length, | ||
1124 | data_buffer, buffer, &index); | ||
1125 | |||
1126 | if (ret) { | ||
1127 | dev_err(device_data->dev, "[%s] hash_internal_hw_" | ||
1128 | "update() failed!", __func__); | ||
1129 | goto out; | ||
1130 | } | ||
1131 | |||
1132 | msg_length = crypto_hash_walk_done(&walk, 0); | ||
1133 | } | ||
1134 | |||
1135 | req_ctx->state.index = index; | ||
1136 | dev_dbg(device_data->dev, "[%s] indata length=%d, bin=%d))", | ||
1137 | __func__, req_ctx->state.index, | ||
1138 | req_ctx->state.bit_index); | ||
1139 | |||
1140 | out: | ||
1141 | release_hash_device(device_data); | ||
1142 | |||
1143 | return ret; | ||
1144 | } | ||
1145 | |||
1146 | /** | ||
1147 | * hash_resume_state - Function that resumes the state of an calculation. | ||
1148 | * @device_data: Pointer to the device structure. | ||
1149 | * @device_state: The state to be restored in the hash hardware | ||
1150 | */ | ||
1151 | int hash_resume_state(struct hash_device_data *device_data, | ||
1152 | const struct hash_state *device_state) | ||
1153 | { | ||
1154 | u32 temp_cr; | ||
1155 | s32 count; | ||
1156 | int hash_mode = HASH_OPER_MODE_HASH; | ||
1157 | |||
1158 | if (NULL == device_state) { | ||
1159 | dev_err(device_data->dev, "[%s] HASH_INVALID_PARAMETER!", | ||
1160 | __func__); | ||
1161 | return -EPERM; | ||
1162 | } | ||
1163 | |||
1164 | /* Check correctness of index and length members */ | ||
1165 | if (device_state->index > HASH_BLOCK_SIZE | ||
1166 | || (device_state->length.low_word % HASH_BLOCK_SIZE) != 0) { | ||
1167 | dev_err(device_data->dev, "[%s] HASH_INVALID_PARAMETER!", | ||
1168 | __func__); | ||
1169 | return -EPERM; | ||
1170 | } | ||
1171 | |||
1172 | /* | ||
1173 | * INIT bit. Set this bit to 0b1 to reset the HASH processor core and | ||
1174 | * prepare the initialize the HASH accelerator to compute the message | ||
1175 | * digest of a new message. | ||
1176 | */ | ||
1177 | HASH_INITIALIZE; | ||
1178 | |||
1179 | temp_cr = device_state->temp_cr; | ||
1180 | writel_relaxed(temp_cr & HASH_CR_RESUME_MASK, &device_data->base->cr); | ||
1181 | |||
1182 | if (device_data->base->cr & HASH_CR_MODE_MASK) | ||
1183 | hash_mode = HASH_OPER_MODE_HMAC; | ||
1184 | else | ||
1185 | hash_mode = HASH_OPER_MODE_HASH; | ||
1186 | |||
1187 | for (count = 0; count < HASH_CSR_COUNT; count++) { | ||
1188 | if ((count >= 36) && (hash_mode == HASH_OPER_MODE_HASH)) | ||
1189 | break; | ||
1190 | |||
1191 | writel_relaxed(device_state->csr[count], | ||
1192 | &device_data->base->csrx[count]); | ||
1193 | } | ||
1194 | |||
1195 | writel_relaxed(device_state->csfull, &device_data->base->csfull); | ||
1196 | writel_relaxed(device_state->csdatain, &device_data->base->csdatain); | ||
1197 | |||
1198 | writel_relaxed(device_state->str_reg, &device_data->base->str); | ||
1199 | writel_relaxed(temp_cr, &device_data->base->cr); | ||
1200 | |||
1201 | return 0; | ||
1202 | } | ||
1203 | |||
1204 | /** | ||
1205 | * hash_save_state - Function that saves the state of hardware. | ||
1206 | * @device_data: Pointer to the device structure. | ||
1207 | * @device_state: The strucure where the hardware state should be saved. | ||
1208 | */ | ||
1209 | int hash_save_state(struct hash_device_data *device_data, | ||
1210 | struct hash_state *device_state) | ||
1211 | { | ||
1212 | u32 temp_cr; | ||
1213 | u32 count; | ||
1214 | int hash_mode = HASH_OPER_MODE_HASH; | ||
1215 | |||
1216 | if (NULL == device_state) { | ||
1217 | dev_err(device_data->dev, "[%s] HASH_INVALID_PARAMETER!", | ||
1218 | __func__); | ||
1219 | return -ENOTSUPP; | ||
1220 | } | ||
1221 | |||
1222 | /* Write dummy value to force digest intermediate calculation. This | ||
1223 | * actually makes sure that there isn't any ongoing calculation in the | ||
1224 | * hardware. | ||
1225 | */ | ||
1226 | while (device_data->base->str & HASH_STR_DCAL_MASK) | ||
1227 | cpu_relax(); | ||
1228 | |||
1229 | temp_cr = readl_relaxed(&device_data->base->cr); | ||
1230 | |||
1231 | device_state->str_reg = readl_relaxed(&device_data->base->str); | ||
1232 | |||
1233 | device_state->din_reg = readl_relaxed(&device_data->base->din); | ||
1234 | |||
1235 | if (device_data->base->cr & HASH_CR_MODE_MASK) | ||
1236 | hash_mode = HASH_OPER_MODE_HMAC; | ||
1237 | else | ||
1238 | hash_mode = HASH_OPER_MODE_HASH; | ||
1239 | |||
1240 | for (count = 0; count < HASH_CSR_COUNT; count++) { | ||
1241 | if ((count >= 36) && (hash_mode == HASH_OPER_MODE_HASH)) | ||
1242 | break; | ||
1243 | |||
1244 | device_state->csr[count] = | ||
1245 | readl_relaxed(&device_data->base->csrx[count]); | ||
1246 | } | ||
1247 | |||
1248 | device_state->csfull = readl_relaxed(&device_data->base->csfull); | ||
1249 | device_state->csdatain = readl_relaxed(&device_data->base->csdatain); | ||
1250 | |||
1251 | device_state->temp_cr = temp_cr; | ||
1252 | |||
1253 | return 0; | ||
1254 | } | ||
1255 | |||
1256 | /** | ||
1257 | * hash_check_hw - This routine checks for peripheral Ids and PCell Ids. | ||
1258 | * @device_data: | ||
1259 | * | ||
1260 | */ | ||
1261 | int hash_check_hw(struct hash_device_data *device_data) | ||
1262 | { | ||
1263 | /* Checking Peripheral Ids */ | ||
1264 | if (HASH_P_ID0 == readl_relaxed(&device_data->base->periphid0) | ||
1265 | && HASH_P_ID1 == readl_relaxed(&device_data->base->periphid1) | ||
1266 | && HASH_P_ID2 == readl_relaxed(&device_data->base->periphid2) | ||
1267 | && HASH_P_ID3 == readl_relaxed(&device_data->base->periphid3) | ||
1268 | && HASH_CELL_ID0 == readl_relaxed(&device_data->base->cellid0) | ||
1269 | && HASH_CELL_ID1 == readl_relaxed(&device_data->base->cellid1) | ||
1270 | && HASH_CELL_ID2 == readl_relaxed(&device_data->base->cellid2) | ||
1271 | && HASH_CELL_ID3 == readl_relaxed(&device_data->base->cellid3) | ||
1272 | ) { | ||
1273 | return 0; | ||
1274 | } | ||
1275 | |||
1276 | dev_err(device_data->dev, "[%s] HASH_UNSUPPORTED_HW!", | ||
1277 | __func__); | ||
1278 | return -ENOTSUPP; | ||
1279 | } | ||
1280 | |||
1281 | /** | ||
1282 | * hash_get_digest - Gets the digest. | ||
1283 | * @device_data: Pointer to the device structure. | ||
1284 | * @digest: User allocated byte array for the calculated digest. | ||
1285 | * @algorithm: The algorithm in use. | ||
1286 | */ | ||
1287 | void hash_get_digest(struct hash_device_data *device_data, | ||
1288 | u8 *digest, int algorithm) | ||
1289 | { | ||
1290 | u32 temp_hx_val, count; | ||
1291 | int loop_ctr; | ||
1292 | |||
1293 | if (algorithm != HASH_ALGO_SHA1 && algorithm != HASH_ALGO_SHA256) { | ||
1294 | dev_err(device_data->dev, "[%s] Incorrect algorithm %d", | ||
1295 | __func__, algorithm); | ||
1296 | return; | ||
1297 | } | ||
1298 | |||
1299 | if (algorithm == HASH_ALGO_SHA1) | ||
1300 | loop_ctr = SHA1_DIGEST_SIZE / sizeof(u32); | ||
1301 | else | ||
1302 | loop_ctr = SHA256_DIGEST_SIZE / sizeof(u32); | ||
1303 | |||
1304 | dev_dbg(device_data->dev, "[%s] digest array:(0x%x)", | ||
1305 | __func__, (u32) digest); | ||
1306 | |||
1307 | /* Copy result into digest array */ | ||
1308 | for (count = 0; count < loop_ctr; count++) { | ||
1309 | temp_hx_val = readl_relaxed(&device_data->base->hx[count]); | ||
1310 | digest[count * 4] = (u8) ((temp_hx_val >> 24) & 0xFF); | ||
1311 | digest[count * 4 + 1] = (u8) ((temp_hx_val >> 16) & 0xFF); | ||
1312 | digest[count * 4 + 2] = (u8) ((temp_hx_val >> 8) & 0xFF); | ||
1313 | digest[count * 4 + 3] = (u8) ((temp_hx_val >> 0) & 0xFF); | ||
1314 | } | ||
1315 | } | ||
1316 | |||
1317 | /** | ||
1318 | * hash_update - The hash update function for SHA1/SHA2 (SHA256). | ||
1319 | * @req: The hash request for the job. | ||
1320 | */ | ||
1321 | static int ahash_update(struct ahash_request *req) | ||
1322 | { | ||
1323 | int ret = 0; | ||
1324 | struct hash_req_ctx *req_ctx = ahash_request_ctx(req); | ||
1325 | |||
1326 | if (hash_mode != HASH_MODE_DMA || !req_ctx->dma_mode) | ||
1327 | ret = hash_hw_update(req); | ||
1328 | /* Skip update for DMA, all data will be passed to DMA in final */ | ||
1329 | |||
1330 | if (ret) { | ||
1331 | pr_err(DEV_DBG_NAME " [%s] hash_hw_update() failed!", | ||
1332 | __func__); | ||
1333 | } | ||
1334 | |||
1335 | return ret; | ||
1336 | } | ||
1337 | |||
1338 | /** | ||
1339 | * hash_final - The hash final function for SHA1/SHA2 (SHA256). | ||
1340 | * @req: The hash request for the job. | ||
1341 | */ | ||
1342 | static int ahash_final(struct ahash_request *req) | ||
1343 | { | ||
1344 | int ret = 0; | ||
1345 | struct hash_req_ctx *req_ctx = ahash_request_ctx(req); | ||
1346 | |||
1347 | pr_debug(DEV_DBG_NAME " [%s] data size: %d", __func__, req->nbytes); | ||
1348 | |||
1349 | if ((hash_mode == HASH_MODE_DMA) && req_ctx->dma_mode) | ||
1350 | ret = hash_dma_final(req); | ||
1351 | else | ||
1352 | ret = hash_hw_final(req); | ||
1353 | |||
1354 | if (ret) { | ||
1355 | pr_err(DEV_DBG_NAME " [%s] hash_hw/dma_final() failed", | ||
1356 | __func__); | ||
1357 | } | ||
1358 | |||
1359 | return ret; | ||
1360 | } | ||
1361 | |||
1362 | static int hash_setkey(struct crypto_ahash *tfm, | ||
1363 | const u8 *key, unsigned int keylen, int alg) | ||
1364 | { | ||
1365 | int ret = 0; | ||
1366 | struct hash_ctx *ctx = crypto_ahash_ctx(tfm); | ||
1367 | |||
1368 | /** | ||
1369 | * Freed in final. | ||
1370 | */ | ||
1371 | ctx->key = kmalloc(keylen, GFP_KERNEL); | ||
1372 | if (!ctx->key) { | ||
1373 | pr_err(DEV_DBG_NAME " [%s] Failed to allocate ctx->key " | ||
1374 | "for %d\n", __func__, alg); | ||
1375 | return -ENOMEM; | ||
1376 | } | ||
1377 | |||
1378 | memcpy(ctx->key, key, keylen); | ||
1379 | ctx->keylen = keylen; | ||
1380 | |||
1381 | return ret; | ||
1382 | } | ||
1383 | |||
1384 | static int ahash_sha1_init(struct ahash_request *req) | ||
1385 | { | ||
1386 | struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); | ||
1387 | struct hash_ctx *ctx = crypto_ahash_ctx(tfm); | ||
1388 | |||
1389 | ctx->config.data_format = HASH_DATA_8_BITS; | ||
1390 | ctx->config.algorithm = HASH_ALGO_SHA1; | ||
1391 | ctx->config.oper_mode = HASH_OPER_MODE_HASH; | ||
1392 | ctx->digestsize = SHA1_DIGEST_SIZE; | ||
1393 | |||
1394 | return hash_init(req); | ||
1395 | } | ||
1396 | |||
1397 | static int ahash_sha256_init(struct ahash_request *req) | ||
1398 | { | ||
1399 | struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); | ||
1400 | struct hash_ctx *ctx = crypto_ahash_ctx(tfm); | ||
1401 | |||
1402 | ctx->config.data_format = HASH_DATA_8_BITS; | ||
1403 | ctx->config.algorithm = HASH_ALGO_SHA256; | ||
1404 | ctx->config.oper_mode = HASH_OPER_MODE_HASH; | ||
1405 | ctx->digestsize = SHA256_DIGEST_SIZE; | ||
1406 | |||
1407 | return hash_init(req); | ||
1408 | } | ||
1409 | |||
1410 | static int ahash_sha1_digest(struct ahash_request *req) | ||
1411 | { | ||
1412 | int ret2, ret1; | ||
1413 | |||
1414 | ret1 = ahash_sha1_init(req); | ||
1415 | if (ret1) | ||
1416 | goto out; | ||
1417 | |||
1418 | ret1 = ahash_update(req); | ||
1419 | ret2 = ahash_final(req); | ||
1420 | |||
1421 | out: | ||
1422 | return ret1 ? ret1 : ret2; | ||
1423 | } | ||
1424 | |||
1425 | static int ahash_sha256_digest(struct ahash_request *req) | ||
1426 | { | ||
1427 | int ret2, ret1; | ||
1428 | |||
1429 | ret1 = ahash_sha256_init(req); | ||
1430 | if (ret1) | ||
1431 | goto out; | ||
1432 | |||
1433 | ret1 = ahash_update(req); | ||
1434 | ret2 = ahash_final(req); | ||
1435 | |||
1436 | out: | ||
1437 | return ret1 ? ret1 : ret2; | ||
1438 | } | ||
1439 | |||
1440 | static int hmac_sha1_init(struct ahash_request *req) | ||
1441 | { | ||
1442 | struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); | ||
1443 | struct hash_ctx *ctx = crypto_ahash_ctx(tfm); | ||
1444 | |||
1445 | ctx->config.data_format = HASH_DATA_8_BITS; | ||
1446 | ctx->config.algorithm = HASH_ALGO_SHA1; | ||
1447 | ctx->config.oper_mode = HASH_OPER_MODE_HMAC; | ||
1448 | ctx->digestsize = SHA1_DIGEST_SIZE; | ||
1449 | |||
1450 | return hash_init(req); | ||
1451 | } | ||
1452 | |||
1453 | static int hmac_sha256_init(struct ahash_request *req) | ||
1454 | { | ||
1455 | struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); | ||
1456 | struct hash_ctx *ctx = crypto_ahash_ctx(tfm); | ||
1457 | |||
1458 | ctx->config.data_format = HASH_DATA_8_BITS; | ||
1459 | ctx->config.algorithm = HASH_ALGO_SHA256; | ||
1460 | ctx->config.oper_mode = HASH_OPER_MODE_HMAC; | ||
1461 | ctx->digestsize = SHA256_DIGEST_SIZE; | ||
1462 | |||
1463 | return hash_init(req); | ||
1464 | } | ||
1465 | |||
1466 | static int hmac_sha1_digest(struct ahash_request *req) | ||
1467 | { | ||
1468 | int ret2, ret1; | ||
1469 | |||
1470 | ret1 = hmac_sha1_init(req); | ||
1471 | if (ret1) | ||
1472 | goto out; | ||
1473 | |||
1474 | ret1 = ahash_update(req); | ||
1475 | ret2 = ahash_final(req); | ||
1476 | |||
1477 | out: | ||
1478 | return ret1 ? ret1 : ret2; | ||
1479 | } | ||
1480 | |||
1481 | static int hmac_sha256_digest(struct ahash_request *req) | ||
1482 | { | ||
1483 | int ret2, ret1; | ||
1484 | |||
1485 | ret1 = hmac_sha256_init(req); | ||
1486 | if (ret1) | ||
1487 | goto out; | ||
1488 | |||
1489 | ret1 = ahash_update(req); | ||
1490 | ret2 = ahash_final(req); | ||
1491 | |||
1492 | out: | ||
1493 | return ret1 ? ret1 : ret2; | ||
1494 | } | ||
1495 | |||
1496 | static int hmac_sha1_setkey(struct crypto_ahash *tfm, | ||
1497 | const u8 *key, unsigned int keylen) | ||
1498 | { | ||
1499 | return hash_setkey(tfm, key, keylen, HASH_ALGO_SHA1); | ||
1500 | } | ||
1501 | |||
1502 | static int hmac_sha256_setkey(struct crypto_ahash *tfm, | ||
1503 | const u8 *key, unsigned int keylen) | ||
1504 | { | ||
1505 | return hash_setkey(tfm, key, keylen, HASH_ALGO_SHA256); | ||
1506 | } | ||
1507 | |||
1508 | struct hash_algo_template { | ||
1509 | struct hash_config conf; | ||
1510 | struct ahash_alg hash; | ||
1511 | }; | ||
1512 | |||
1513 | static int hash_cra_init(struct crypto_tfm *tfm) | ||
1514 | { | ||
1515 | struct hash_ctx *ctx = crypto_tfm_ctx(tfm); | ||
1516 | struct crypto_alg *alg = tfm->__crt_alg; | ||
1517 | struct hash_algo_template *hash_alg; | ||
1518 | |||
1519 | hash_alg = container_of(__crypto_ahash_alg(alg), | ||
1520 | struct hash_algo_template, | ||
1521 | hash); | ||
1522 | |||
1523 | crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm), | ||
1524 | sizeof(struct hash_req_ctx)); | ||
1525 | |||
1526 | ctx->config.data_format = HASH_DATA_8_BITS; | ||
1527 | ctx->config.algorithm = hash_alg->conf.algorithm; | ||
1528 | ctx->config.oper_mode = hash_alg->conf.oper_mode; | ||
1529 | |||
1530 | ctx->digestsize = hash_alg->hash.halg.digestsize; | ||
1531 | |||
1532 | return 0; | ||
1533 | } | ||
1534 | |||
1535 | static struct hash_algo_template hash_algs[] = { | ||
1536 | { | ||
1537 | .conf.algorithm = HASH_ALGO_SHA1, | ||
1538 | .conf.oper_mode = HASH_OPER_MODE_HASH, | ||
1539 | .hash = { | ||
1540 | .init = hash_init, | ||
1541 | .update = ahash_update, | ||
1542 | .final = ahash_final, | ||
1543 | .digest = ahash_sha1_digest, | ||
1544 | .halg.digestsize = SHA1_DIGEST_SIZE, | ||
1545 | .halg.statesize = sizeof(struct hash_ctx), | ||
1546 | .halg.base = { | ||
1547 | .cra_name = "sha1", | ||
1548 | .cra_driver_name = "sha1-ux500", | ||
1549 | .cra_flags = CRYPTO_ALG_TYPE_AHASH | | ||
1550 | CRYPTO_ALG_ASYNC, | ||
1551 | .cra_blocksize = SHA1_BLOCK_SIZE, | ||
1552 | .cra_ctxsize = sizeof(struct hash_ctx), | ||
1553 | .cra_init = hash_cra_init, | ||
1554 | .cra_module = THIS_MODULE, | ||
1555 | } | ||
1556 | } | ||
1557 | }, | ||
1558 | { | ||
1559 | .conf.algorithm = HASH_ALGO_SHA256, | ||
1560 | .conf.oper_mode = HASH_OPER_MODE_HASH, | ||
1561 | .hash = { | ||
1562 | .init = hash_init, | ||
1563 | .update = ahash_update, | ||
1564 | .final = ahash_final, | ||
1565 | .digest = ahash_sha256_digest, | ||
1566 | .halg.digestsize = SHA256_DIGEST_SIZE, | ||
1567 | .halg.statesize = sizeof(struct hash_ctx), | ||
1568 | .halg.base = { | ||
1569 | .cra_name = "sha256", | ||
1570 | .cra_driver_name = "sha256-ux500", | ||
1571 | .cra_flags = CRYPTO_ALG_TYPE_AHASH | | ||
1572 | CRYPTO_ALG_ASYNC, | ||
1573 | .cra_blocksize = SHA256_BLOCK_SIZE, | ||
1574 | .cra_ctxsize = sizeof(struct hash_ctx), | ||
1575 | .cra_type = &crypto_ahash_type, | ||
1576 | .cra_init = hash_cra_init, | ||
1577 | .cra_module = THIS_MODULE, | ||
1578 | } | ||
1579 | } | ||
1580 | |||
1581 | }, | ||
1582 | { | ||
1583 | .conf.algorithm = HASH_ALGO_SHA1, | ||
1584 | .conf.oper_mode = HASH_OPER_MODE_HMAC, | ||
1585 | .hash = { | ||
1586 | .init = hash_init, | ||
1587 | .update = ahash_update, | ||
1588 | .final = ahash_final, | ||
1589 | .digest = hmac_sha1_digest, | ||
1590 | .setkey = hmac_sha1_setkey, | ||
1591 | .halg.digestsize = SHA1_DIGEST_SIZE, | ||
1592 | .halg.statesize = sizeof(struct hash_ctx), | ||
1593 | .halg.base = { | ||
1594 | .cra_name = "hmac(sha1)", | ||
1595 | .cra_driver_name = "hmac-sha1-ux500", | ||
1596 | .cra_flags = CRYPTO_ALG_TYPE_AHASH | | ||
1597 | CRYPTO_ALG_ASYNC, | ||
1598 | .cra_blocksize = SHA1_BLOCK_SIZE, | ||
1599 | .cra_ctxsize = sizeof(struct hash_ctx), | ||
1600 | .cra_type = &crypto_ahash_type, | ||
1601 | .cra_init = hash_cra_init, | ||
1602 | .cra_module = THIS_MODULE, | ||
1603 | } | ||
1604 | } | ||
1605 | }, | ||
1606 | { | ||
1607 | .conf.algorithm = HASH_ALGO_SHA256, | ||
1608 | .conf.oper_mode = HASH_OPER_MODE_HMAC, | ||
1609 | .hash = { | ||
1610 | .init = hash_init, | ||
1611 | .update = ahash_update, | ||
1612 | .final = ahash_final, | ||
1613 | .digest = hmac_sha256_digest, | ||
1614 | .setkey = hmac_sha256_setkey, | ||
1615 | .halg.digestsize = SHA256_DIGEST_SIZE, | ||
1616 | .halg.statesize = sizeof(struct hash_ctx), | ||
1617 | .halg.base = { | ||
1618 | .cra_name = "hmac(sha256)", | ||
1619 | .cra_driver_name = "hmac-sha256-ux500", | ||
1620 | .cra_flags = CRYPTO_ALG_TYPE_AHASH | | ||
1621 | CRYPTO_ALG_ASYNC, | ||
1622 | .cra_blocksize = SHA256_BLOCK_SIZE, | ||
1623 | .cra_ctxsize = sizeof(struct hash_ctx), | ||
1624 | .cra_type = &crypto_ahash_type, | ||
1625 | .cra_init = hash_cra_init, | ||
1626 | .cra_module = THIS_MODULE, | ||
1627 | } | ||
1628 | } | ||
1629 | } | ||
1630 | }; | ||
1631 | |||
1632 | /** | ||
1633 | * hash_algs_register_all - | ||
1634 | */ | ||
1635 | static int ahash_algs_register_all(struct hash_device_data *device_data) | ||
1636 | { | ||
1637 | int ret; | ||
1638 | int i; | ||
1639 | int count; | ||
1640 | |||
1641 | for (i = 0; i < ARRAY_SIZE(hash_algs); i++) { | ||
1642 | ret = crypto_register_ahash(&hash_algs[i].hash); | ||
1643 | if (ret) { | ||
1644 | count = i; | ||
1645 | dev_err(device_data->dev, "[%s] alg registration failed", | ||
1646 | hash_algs[i].hash.halg.base.cra_driver_name); | ||
1647 | goto unreg; | ||
1648 | } | ||
1649 | } | ||
1650 | return 0; | ||
1651 | unreg: | ||
1652 | for (i = 0; i < count; i++) | ||
1653 | crypto_unregister_ahash(&hash_algs[i].hash); | ||
1654 | return ret; | ||
1655 | } | ||
1656 | |||
1657 | /** | ||
1658 | * hash_algs_unregister_all - | ||
1659 | */ | ||
1660 | static void ahash_algs_unregister_all(struct hash_device_data *device_data) | ||
1661 | { | ||
1662 | int i; | ||
1663 | |||
1664 | for (i = 0; i < ARRAY_SIZE(hash_algs); i++) | ||
1665 | crypto_unregister_ahash(&hash_algs[i].hash); | ||
1666 | } | ||
1667 | |||
1668 | /** | ||
1669 | * ux500_hash_probe - Function that probes the hash hardware. | ||
1670 | * @pdev: The platform device. | ||
1671 | */ | ||
1672 | static int ux500_hash_probe(struct platform_device *pdev) | ||
1673 | { | ||
1674 | int ret = 0; | ||
1675 | struct resource *res = NULL; | ||
1676 | struct hash_device_data *device_data; | ||
1677 | struct device *dev = &pdev->dev; | ||
1678 | |||
1679 | device_data = kzalloc(sizeof(struct hash_device_data), GFP_ATOMIC); | ||
1680 | if (!device_data) { | ||
1681 | dev_dbg(dev, "[%s] kzalloc() failed!", __func__); | ||
1682 | ret = -ENOMEM; | ||
1683 | goto out; | ||
1684 | } | ||
1685 | |||
1686 | device_data->dev = dev; | ||
1687 | device_data->current_ctx = NULL; | ||
1688 | |||
1689 | res = platform_get_resource(pdev, IORESOURCE_MEM, 0); | ||
1690 | if (!res) { | ||
1691 | dev_dbg(dev, "[%s] platform_get_resource() failed!", __func__); | ||
1692 | ret = -ENODEV; | ||
1693 | goto out_kfree; | ||
1694 | } | ||
1695 | |||
1696 | res = request_mem_region(res->start, resource_size(res), pdev->name); | ||
1697 | if (res == NULL) { | ||
1698 | dev_dbg(dev, "[%s] request_mem_region() failed!", __func__); | ||
1699 | ret = -EBUSY; | ||
1700 | goto out_kfree; | ||
1701 | } | ||
1702 | |||
1703 | device_data->base = ioremap(res->start, resource_size(res)); | ||
1704 | if (!device_data->base) { | ||
1705 | dev_err(dev, "[%s] ioremap() failed!", | ||
1706 | __func__); | ||
1707 | ret = -ENOMEM; | ||
1708 | goto out_free_mem; | ||
1709 | } | ||
1710 | spin_lock_init(&device_data->ctx_lock); | ||
1711 | spin_lock_init(&device_data->power_state_lock); | ||
1712 | |||
1713 | /* Enable power for HASH1 hardware block */ | ||
1714 | device_data->regulator = regulator_get(dev, "v-ape"); | ||
1715 | if (IS_ERR(device_data->regulator)) { | ||
1716 | dev_err(dev, "[%s] regulator_get() failed!", __func__); | ||
1717 | ret = PTR_ERR(device_data->regulator); | ||
1718 | device_data->regulator = NULL; | ||
1719 | goto out_unmap; | ||
1720 | } | ||
1721 | |||
1722 | /* Enable the clock for HASH1 hardware block */ | ||
1723 | device_data->clk = clk_get(dev, NULL); | ||
1724 | if (IS_ERR(device_data->clk)) { | ||
1725 | dev_err(dev, "[%s] clk_get() failed!", __func__); | ||
1726 | ret = PTR_ERR(device_data->clk); | ||
1727 | goto out_regulator; | ||
1728 | } | ||
1729 | |||
1730 | /* Enable device power (and clock) */ | ||
1731 | ret = hash_enable_power(device_data, false); | ||
1732 | if (ret) { | ||
1733 | dev_err(dev, "[%s]: hash_enable_power() failed!", __func__); | ||
1734 | goto out_clk; | ||
1735 | } | ||
1736 | |||
1737 | ret = hash_check_hw(device_data); | ||
1738 | if (ret) { | ||
1739 | dev_err(dev, "[%s] hash_check_hw() failed!", __func__); | ||
1740 | goto out_power; | ||
1741 | } | ||
1742 | |||
1743 | if (hash_mode == HASH_MODE_DMA) | ||
1744 | hash_dma_setup_channel(device_data, dev); | ||
1745 | |||
1746 | platform_set_drvdata(pdev, device_data); | ||
1747 | |||
1748 | /* Put the new device into the device list... */ | ||
1749 | klist_add_tail(&device_data->list_node, &driver_data.device_list); | ||
1750 | /* ... and signal that a new device is available. */ | ||
1751 | up(&driver_data.device_allocation); | ||
1752 | |||
1753 | ret = ahash_algs_register_all(device_data); | ||
1754 | if (ret) { | ||
1755 | dev_err(dev, "[%s] ahash_algs_register_all() " | ||
1756 | "failed!", __func__); | ||
1757 | goto out_power; | ||
1758 | } | ||
1759 | |||
1760 | dev_info(dev, "[%s] successfully probed\n", __func__); | ||
1761 | return 0; | ||
1762 | |||
1763 | out_power: | ||
1764 | hash_disable_power(device_data, false); | ||
1765 | |||
1766 | out_clk: | ||
1767 | clk_put(device_data->clk); | ||
1768 | |||
1769 | out_regulator: | ||
1770 | regulator_put(device_data->regulator); | ||
1771 | |||
1772 | out_unmap: | ||
1773 | iounmap(device_data->base); | ||
1774 | |||
1775 | out_free_mem: | ||
1776 | release_mem_region(res->start, resource_size(res)); | ||
1777 | |||
1778 | out_kfree: | ||
1779 | kfree(device_data); | ||
1780 | out: | ||
1781 | return ret; | ||
1782 | } | ||
1783 | |||
1784 | /** | ||
1785 | * ux500_hash_remove - Function that removes the hash device from the platform. | ||
1786 | * @pdev: The platform device. | ||
1787 | */ | ||
1788 | static int ux500_hash_remove(struct platform_device *pdev) | ||
1789 | { | ||
1790 | struct resource *res; | ||
1791 | struct hash_device_data *device_data; | ||
1792 | struct device *dev = &pdev->dev; | ||
1793 | |||
1794 | device_data = platform_get_drvdata(pdev); | ||
1795 | if (!device_data) { | ||
1796 | dev_err(dev, "[%s]: platform_get_drvdata() failed!", | ||
1797 | __func__); | ||
1798 | return -ENOMEM; | ||
1799 | } | ||
1800 | |||
1801 | /* Try to decrease the number of available devices. */ | ||
1802 | if (down_trylock(&driver_data.device_allocation)) | ||
1803 | return -EBUSY; | ||
1804 | |||
1805 | /* Check that the device is free */ | ||
1806 | spin_lock(&device_data->ctx_lock); | ||
1807 | /* current_ctx allocates a device, NULL = unallocated */ | ||
1808 | if (device_data->current_ctx) { | ||
1809 | /* The device is busy */ | ||
1810 | spin_unlock(&device_data->ctx_lock); | ||
1811 | /* Return the device to the pool. */ | ||
1812 | up(&driver_data.device_allocation); | ||
1813 | return -EBUSY; | ||
1814 | } | ||
1815 | |||
1816 | spin_unlock(&device_data->ctx_lock); | ||
1817 | |||
1818 | /* Remove the device from the list */ | ||
1819 | if (klist_node_attached(&device_data->list_node)) | ||
1820 | klist_remove(&device_data->list_node); | ||
1821 | |||
1822 | /* If this was the last device, remove the services */ | ||
1823 | if (list_empty(&driver_data.device_list.k_list)) | ||
1824 | ahash_algs_unregister_all(device_data); | ||
1825 | |||
1826 | if (hash_disable_power(device_data, false)) | ||
1827 | dev_err(dev, "[%s]: hash_disable_power() failed", | ||
1828 | __func__); | ||
1829 | |||
1830 | clk_put(device_data->clk); | ||
1831 | regulator_put(device_data->regulator); | ||
1832 | |||
1833 | iounmap(device_data->base); | ||
1834 | |||
1835 | res = platform_get_resource(pdev, IORESOURCE_MEM, 0); | ||
1836 | if (res) | ||
1837 | release_mem_region(res->start, resource_size(res)); | ||
1838 | |||
1839 | kfree(device_data); | ||
1840 | |||
1841 | return 0; | ||
1842 | } | ||
1843 | |||
1844 | /** | ||
1845 | * ux500_hash_shutdown - Function that shutdown the hash device. | ||
1846 | * @pdev: The platform device | ||
1847 | */ | ||
1848 | static void ux500_hash_shutdown(struct platform_device *pdev) | ||
1849 | { | ||
1850 | struct resource *res = NULL; | ||
1851 | struct hash_device_data *device_data; | ||
1852 | |||
1853 | device_data = platform_get_drvdata(pdev); | ||
1854 | if (!device_data) { | ||
1855 | dev_err(&pdev->dev, "[%s] platform_get_drvdata() failed!", | ||
1856 | __func__); | ||
1857 | return; | ||
1858 | } | ||
1859 | |||
1860 | /* Check that the device is free */ | ||
1861 | spin_lock(&device_data->ctx_lock); | ||
1862 | /* current_ctx allocates a device, NULL = unallocated */ | ||
1863 | if (!device_data->current_ctx) { | ||
1864 | if (down_trylock(&driver_data.device_allocation)) | ||
1865 | dev_dbg(&pdev->dev, "[%s]: Cryp still in use!" | ||
1866 | "Shutting down anyway...", __func__); | ||
1867 | /** | ||
1868 | * (Allocate the device) | ||
1869 | * Need to set this to non-null (dummy) value, | ||
1870 | * to avoid usage if context switching. | ||
1871 | */ | ||
1872 | device_data->current_ctx++; | ||
1873 | } | ||
1874 | spin_unlock(&device_data->ctx_lock); | ||
1875 | |||
1876 | /* Remove the device from the list */ | ||
1877 | if (klist_node_attached(&device_data->list_node)) | ||
1878 | klist_remove(&device_data->list_node); | ||
1879 | |||
1880 | /* If this was the last device, remove the services */ | ||
1881 | if (list_empty(&driver_data.device_list.k_list)) | ||
1882 | ahash_algs_unregister_all(device_data); | ||
1883 | |||
1884 | iounmap(device_data->base); | ||
1885 | |||
1886 | res = platform_get_resource(pdev, IORESOURCE_MEM, 0); | ||
1887 | if (res) | ||
1888 | release_mem_region(res->start, resource_size(res)); | ||
1889 | |||
1890 | if (hash_disable_power(device_data, false)) | ||
1891 | dev_err(&pdev->dev, "[%s] hash_disable_power() failed", | ||
1892 | __func__); | ||
1893 | } | ||
1894 | |||
1895 | /** | ||
1896 | * ux500_hash_suspend - Function that suspends the hash device. | ||
1897 | * @pdev: The platform device. | ||
1898 | * @state: - | ||
1899 | */ | ||
1900 | static int ux500_hash_suspend(struct platform_device *pdev, pm_message_t state) | ||
1901 | { | ||
1902 | int ret; | ||
1903 | struct hash_device_data *device_data; | ||
1904 | struct hash_ctx *temp_ctx = NULL; | ||
1905 | |||
1906 | device_data = platform_get_drvdata(pdev); | ||
1907 | if (!device_data) { | ||
1908 | dev_err(&pdev->dev, "[%s] platform_get_drvdata() failed!", | ||
1909 | __func__); | ||
1910 | return -ENOMEM; | ||
1911 | } | ||
1912 | |||
1913 | spin_lock(&device_data->ctx_lock); | ||
1914 | if (!device_data->current_ctx) | ||
1915 | device_data->current_ctx++; | ||
1916 | spin_unlock(&device_data->ctx_lock); | ||
1917 | |||
1918 | if (device_data->current_ctx == ++temp_ctx) { | ||
1919 | if (down_interruptible(&driver_data.device_allocation)) | ||
1920 | dev_dbg(&pdev->dev, "[%s]: down_interruptible() " | ||
1921 | "failed", __func__); | ||
1922 | ret = hash_disable_power(device_data, false); | ||
1923 | |||
1924 | } else | ||
1925 | ret = hash_disable_power(device_data, true); | ||
1926 | |||
1927 | if (ret) | ||
1928 | dev_err(&pdev->dev, "[%s]: hash_disable_power()", __func__); | ||
1929 | |||
1930 | return ret; | ||
1931 | } | ||
1932 | |||
1933 | /** | ||
1934 | * ux500_hash_resume - Function that resume the hash device. | ||
1935 | * @pdev: The platform device. | ||
1936 | */ | ||
1937 | static int ux500_hash_resume(struct platform_device *pdev) | ||
1938 | { | ||
1939 | int ret = 0; | ||
1940 | struct hash_device_data *device_data; | ||
1941 | struct hash_ctx *temp_ctx = NULL; | ||
1942 | |||
1943 | device_data = platform_get_drvdata(pdev); | ||
1944 | if (!device_data) { | ||
1945 | dev_err(&pdev->dev, "[%s] platform_get_drvdata() failed!", | ||
1946 | __func__); | ||
1947 | return -ENOMEM; | ||
1948 | } | ||
1949 | |||
1950 | spin_lock(&device_data->ctx_lock); | ||
1951 | if (device_data->current_ctx == ++temp_ctx) | ||
1952 | device_data->current_ctx = NULL; | ||
1953 | spin_unlock(&device_data->ctx_lock); | ||
1954 | |||
1955 | if (!device_data->current_ctx) | ||
1956 | up(&driver_data.device_allocation); | ||
1957 | else | ||
1958 | ret = hash_enable_power(device_data, true); | ||
1959 | |||
1960 | if (ret) | ||
1961 | dev_err(&pdev->dev, "[%s]: hash_enable_power() failed!", | ||
1962 | __func__); | ||
1963 | |||
1964 | return ret; | ||
1965 | } | ||
1966 | |||
1967 | static struct platform_driver hash_driver = { | ||
1968 | .probe = ux500_hash_probe, | ||
1969 | .remove = ux500_hash_remove, | ||
1970 | .shutdown = ux500_hash_shutdown, | ||
1971 | .suspend = ux500_hash_suspend, | ||
1972 | .resume = ux500_hash_resume, | ||
1973 | .driver = { | ||
1974 | .owner = THIS_MODULE, | ||
1975 | .name = "hash1", | ||
1976 | } | ||
1977 | }; | ||
1978 | |||
1979 | /** | ||
1980 | * ux500_hash_mod_init - The kernel module init function. | ||
1981 | */ | ||
1982 | static int __init ux500_hash_mod_init(void) | ||
1983 | { | ||
1984 | klist_init(&driver_data.device_list, NULL, NULL); | ||
1985 | /* Initialize the semaphore to 0 devices (locked state) */ | ||
1986 | sema_init(&driver_data.device_allocation, 0); | ||
1987 | |||
1988 | return platform_driver_register(&hash_driver); | ||
1989 | } | ||
1990 | |||
1991 | /** | ||
1992 | * ux500_hash_mod_fini - The kernel module exit function. | ||
1993 | */ | ||
1994 | static void __exit ux500_hash_mod_fini(void) | ||
1995 | { | ||
1996 | platform_driver_unregister(&hash_driver); | ||
1997 | return; | ||
1998 | } | ||
1999 | |||
2000 | module_init(ux500_hash_mod_init); | ||
2001 | module_exit(ux500_hash_mod_fini); | ||
2002 | |||
2003 | MODULE_DESCRIPTION("Driver for ST-Ericsson UX500 HASH engine."); | ||
2004 | MODULE_LICENSE("GPL"); | ||
2005 | |||
2006 | MODULE_ALIAS("sha1-all"); | ||
2007 | MODULE_ALIAS("sha256-all"); | ||
2008 | MODULE_ALIAS("hmac-sha1-all"); | ||
2009 | MODULE_ALIAS("hmac-sha256-all"); | ||