mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 02:30:34 +02:00 
			
		
		
		
	crypto: sa2ul - Add AEAD algorithm support
Add support for sa2ul hardware AEAD for hmac(sha256),cbc(aes) and hmac(sha1),cbc(aes) algorithms. Signed-off-by: Keerthy <j-keerthy@ti.com> [t-kristo@ti.com: number of bug fixes, major refactoring and cleanup of code] Signed-off-by: Tero Kristo <t-kristo@ti.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
		
							parent
							
								
									2dc53d0047
								
							
						
					
					
						commit
						d2c8ac187f
					
				
					 2 changed files with 518 additions and 21 deletions
				
			
		| 
						 | 
				
			
			@ -17,7 +17,9 @@
 | 
			
		|||
#include <linux/pm_runtime.h>
 | 
			
		||||
 | 
			
		||||
#include <crypto/aes.h>
 | 
			
		||||
#include <crypto/authenc.h>
 | 
			
		||||
#include <crypto/des.h>
 | 
			
		||||
#include <crypto/internal/aead.h>
 | 
			
		||||
#include <crypto/internal/hash.h>
 | 
			
		||||
#include <crypto/internal/skcipher.h>
 | 
			
		||||
#include <crypto/scatterwalk.h>
 | 
			
		||||
| 
						 | 
				
			
			@ -77,6 +79,7 @@ static struct device *sa_k3_dev;
 | 
			
		|||
 * @iv_size: Initialization Vector size
 | 
			
		||||
 * @akey: Authentication key
 | 
			
		||||
 * @akey_len: Authentication key length
 | 
			
		||||
 * @enc: True, if this is an encode request
 | 
			
		||||
 */
 | 
			
		||||
struct sa_cmdl_cfg {
 | 
			
		||||
	int aalg;
 | 
			
		||||
| 
						 | 
				
			
			@ -85,6 +88,7 @@ struct sa_cmdl_cfg {
 | 
			
		|||
	u8 iv_size;
 | 
			
		||||
	const u8 *akey;
 | 
			
		||||
	u16 akey_len;
 | 
			
		||||
	bool enc;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
| 
						 | 
				
			
			@ -101,6 +105,8 @@ struct sa_cmdl_cfg {
 | 
			
		|||
 * @mci_dec: Mode Control Instruction for Decryption
 | 
			
		||||
 * @inv_key: Whether the encryption algorithm demands key inversion
 | 
			
		||||
 * @ctx: Pointer to the algorithm context
 | 
			
		||||
 * @keyed_mac: Whether the authentication algorithm has key
 | 
			
		||||
 * @prep_iopad: Function pointer to generate intermediate ipad/opad
 | 
			
		||||
 */
 | 
			
		||||
struct algo_data {
 | 
			
		||||
	struct sa_eng_info enc_eng;
 | 
			
		||||
| 
						 | 
				
			
			@ -115,6 +121,9 @@ struct algo_data {
 | 
			
		|||
	u8 *mci_dec;
 | 
			
		||||
	bool inv_key;
 | 
			
		||||
	struct sa_tfm_ctx *ctx;
 | 
			
		||||
	bool keyed_mac;
 | 
			
		||||
	void (*prep_iopad)(struct algo_data *algo, const u8 *key,
 | 
			
		||||
			   u16 key_sz, __be32 *ipad, __be32 *opad);
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
| 
						 | 
				
			
			@ -128,6 +137,7 @@ struct sa_alg_tmpl {
 | 
			
		|||
	union {
 | 
			
		||||
		struct skcipher_alg skcipher;
 | 
			
		||||
		struct ahash_alg ahash;
 | 
			
		||||
		struct aead_alg aead;
 | 
			
		||||
	} alg;
 | 
			
		||||
	bool registered;
 | 
			
		||||
};
 | 
			
		||||
| 
						 | 
				
			
			@ -234,6 +244,38 @@ static u8 mci_cbc_dec_array[3][MODE_CONTROL_BYTES] = {
 | 
			
		|||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Mode Control Instructions for various Key lengths 128, 192, 256
 | 
			
		||||
 * For CBC (Cipher Block Chaining) mode for encryption
 | 
			
		||||
 */
 | 
			
		||||
static u8 mci_cbc_enc_no_iv_array[3][MODE_CONTROL_BYTES] = {
 | 
			
		||||
	{	0x21, 0x00, 0x00, 0x18, 0x88, 0x0a, 0xaa, 0x4b, 0x7e, 0x00,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
 | 
			
		||||
	{	0x21, 0x00, 0x00, 0x18, 0x88, 0x4a, 0xaa, 0x4b, 0x7e, 0x00,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
 | 
			
		||||
	{	0x21, 0x00, 0x00, 0x18, 0x88, 0x8a, 0xaa, 0x4b, 0x7e, 0x00,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Mode Control Instructions for various Key lengths 128, 192, 256
 | 
			
		||||
 * For CBC (Cipher Block Chaining) mode for decryption
 | 
			
		||||
 */
 | 
			
		||||
static u8 mci_cbc_dec_no_iv_array[3][MODE_CONTROL_BYTES] = {
 | 
			
		||||
	{	0x31, 0x00, 0x00, 0x80, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
 | 
			
		||||
	{	0x31, 0x00, 0x00, 0x84, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
 | 
			
		||||
	{	0x31, 0x00, 0x00, 0x88, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
 | 
			
		||||
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Mode Control Instructions for various Key lengths 128, 192, 256
 | 
			
		||||
 * For ECB (Electronic Code Book) mode for encryption
 | 
			
		||||
| 
						 | 
				
			
			@ -313,6 +355,82 @@ static void sa_swiz_128(u8 *in, u16 len)
 | 
			
		|||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* Prepare the ipad and opad from key as per SHA algorithm step 1*/
 | 
			
		||||
static void prepare_kiopad(u8 *k_ipad, u8 *k_opad, const u8 *key, u16 key_sz)
 | 
			
		||||
{
 | 
			
		||||
	int i;
 | 
			
		||||
 | 
			
		||||
	for (i = 0; i < key_sz; i++) {
 | 
			
		||||
		k_ipad[i] = key[i] ^ 0x36;
 | 
			
		||||
		k_opad[i] = key[i] ^ 0x5c;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* Instead of XOR with 0 */
 | 
			
		||||
	for (; i < SHA1_BLOCK_SIZE; i++) {
 | 
			
		||||
		k_ipad[i] = 0x36;
 | 
			
		||||
		k_opad[i] = 0x5c;
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void sa_export_shash(struct shash_desc *hash, int block_size,
 | 
			
		||||
			    int digest_size, __be32 *out)
 | 
			
		||||
{
 | 
			
		||||
	union {
 | 
			
		||||
		struct sha1_state sha1;
 | 
			
		||||
		struct sha256_state sha256;
 | 
			
		||||
		struct sha512_state sha512;
 | 
			
		||||
	} sha;
 | 
			
		||||
	void *state;
 | 
			
		||||
	u32 *result;
 | 
			
		||||
	int i;
 | 
			
		||||
 | 
			
		||||
	switch (digest_size) {
 | 
			
		||||
	case SHA1_DIGEST_SIZE:
 | 
			
		||||
		state = &sha.sha1;
 | 
			
		||||
		result = sha.sha1.state;
 | 
			
		||||
		break;
 | 
			
		||||
	case SHA256_DIGEST_SIZE:
 | 
			
		||||
		state = &sha.sha256;
 | 
			
		||||
		result = sha.sha256.state;
 | 
			
		||||
		break;
 | 
			
		||||
	default:
 | 
			
		||||
		dev_err(sa_k3_dev, "%s: bad digest_size=%d\n", __func__,
 | 
			
		||||
			digest_size);
 | 
			
		||||
		return;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	crypto_shash_export(hash, state);
 | 
			
		||||
 | 
			
		||||
	for (i = 0; i < digest_size >> 2; i++)
 | 
			
		||||
		out[i] = cpu_to_be32(result[i]);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void sa_prepare_iopads(struct algo_data *data, const u8 *key,
 | 
			
		||||
			      u16 key_sz, __be32 *ipad, __be32 *opad)
 | 
			
		||||
{
 | 
			
		||||
	SHASH_DESC_ON_STACK(shash, data->ctx->shash);
 | 
			
		||||
	int block_size = crypto_shash_blocksize(data->ctx->shash);
 | 
			
		||||
	int digest_size = crypto_shash_digestsize(data->ctx->shash);
 | 
			
		||||
	u8 k_ipad[SHA1_BLOCK_SIZE];
 | 
			
		||||
	u8 k_opad[SHA1_BLOCK_SIZE];
 | 
			
		||||
 | 
			
		||||
	shash->tfm = data->ctx->shash;
 | 
			
		||||
 | 
			
		||||
	prepare_kiopad(k_ipad, k_opad, key, key_sz);
 | 
			
		||||
 | 
			
		||||
	memzero_explicit(ipad, block_size);
 | 
			
		||||
	memzero_explicit(opad, block_size);
 | 
			
		||||
 | 
			
		||||
	crypto_shash_init(shash);
 | 
			
		||||
	crypto_shash_update(shash, k_ipad, block_size);
 | 
			
		||||
	sa_export_shash(shash, block_size, digest_size, ipad);
 | 
			
		||||
 | 
			
		||||
	crypto_shash_init(shash);
 | 
			
		||||
	crypto_shash_update(shash, k_opad, block_size);
 | 
			
		||||
 | 
			
		||||
	sa_export_shash(shash, block_size, digest_size, opad);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* Derive the inverse key used in AES-CBC decryption operation */
 | 
			
		||||
static inline int sa_aes_inv_key(u8 *inv_key, const u8 *key, u16 key_sz)
 | 
			
		||||
{
 | 
			
		||||
| 
						 | 
				
			
			@ -383,14 +501,26 @@ static int sa_set_sc_enc(struct algo_data *ad, const u8 *key, u16 key_sz,
 | 
			
		|||
static void sa_set_sc_auth(struct algo_data *ad, const u8 *key, u16 key_sz,
 | 
			
		||||
			   u8 *sc_buf)
 | 
			
		||||
{
 | 
			
		||||
	__be32 ipad[64], opad[64];
 | 
			
		||||
 | 
			
		||||
	/* Set Authentication mode selector to hash processing */
 | 
			
		||||
	sc_buf[0] = SA_HASH_PROCESSING;
 | 
			
		||||
	/* Auth SW ctrl word: bit[6]=1 (upload computed hash to TLR section) */
 | 
			
		||||
	sc_buf[1] = SA_UPLOAD_HASH_TO_TLR;
 | 
			
		||||
	sc_buf[1] |= ad->auth_ctrl;
 | 
			
		||||
 | 
			
		||||
	/* basic hash */
 | 
			
		||||
	sc_buf[1] |= SA_BASIC_HASH;
 | 
			
		||||
	/* Copy the keys or ipad/opad */
 | 
			
		||||
	if (ad->keyed_mac) {
 | 
			
		||||
		ad->prep_iopad(ad, key, key_sz, ipad, opad);
 | 
			
		||||
 | 
			
		||||
		/* Copy ipad to AuthKey */
 | 
			
		||||
		memcpy(&sc_buf[32], ipad, ad->hash_size);
 | 
			
		||||
		/* Copy opad to Aux-1 */
 | 
			
		||||
		memcpy(&sc_buf[64], opad, ad->hash_size);
 | 
			
		||||
	} else {
 | 
			
		||||
		/* basic hash */
 | 
			
		||||
		sc_buf[1] |= SA_BASIC_HASH;
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static inline void sa_copy_iv(__be32 *out, const u8 *iv, bool size16)
 | 
			
		||||
| 
						 | 
				
			
			@ -420,16 +550,18 @@ static int sa_format_cmdl_gen(struct sa_cmdl_cfg *cfg, u8 *cmdl,
 | 
			
		|||
	/* Iniialize the command update structure */
 | 
			
		||||
	memzero_explicit(upd_info, sizeof(*upd_info));
 | 
			
		||||
 | 
			
		||||
	if (cfg->enc_eng_id)
 | 
			
		||||
		total = SA_CMDL_HEADER_SIZE_BYTES;
 | 
			
		||||
	if (cfg->enc_eng_id && cfg->auth_eng_id) {
 | 
			
		||||
		if (cfg->enc) {
 | 
			
		||||
			auth_offset = SA_CMDL_HEADER_SIZE_BYTES;
 | 
			
		||||
			enc_next_eng = cfg->auth_eng_id;
 | 
			
		||||
 | 
			
		||||
	if (cfg->auth_eng_id)
 | 
			
		||||
		total = SA_CMDL_HEADER_SIZE_BYTES;
 | 
			
		||||
 | 
			
		||||
	if (cfg->iv_size)
 | 
			
		||||
		total += cfg->iv_size;
 | 
			
		||||
 | 
			
		||||
	enc_next_eng = SA_ENG_ID_OUTPORT2;
 | 
			
		||||
			if (cfg->iv_size)
 | 
			
		||||
				auth_offset += cfg->iv_size;
 | 
			
		||||
		} else {
 | 
			
		||||
			enc_offset = SA_CMDL_HEADER_SIZE_BYTES;
 | 
			
		||||
			auth_next_eng = cfg->enc_eng_id;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (cfg->enc_eng_id) {
 | 
			
		||||
		upd_info->flags |= SA_CMDL_UPD_ENC;
 | 
			
		||||
| 
						 | 
				
			
			@ -450,11 +582,11 @@ static int sa_format_cmdl_gen(struct sa_cmdl_cfg *cfg, u8 *cmdl,
 | 
			
		|||
 | 
			
		||||
			cmdl[enc_offset + SA_CMDL_OFFSET_OPTION_CTRL1] =
 | 
			
		||||
				(SA_CTX_ENC_AUX2_OFFSET | (cfg->iv_size >> 3));
 | 
			
		||||
			enc_offset += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size;
 | 
			
		||||
			total += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size;
 | 
			
		||||
		} else {
 | 
			
		||||
			cmdl[enc_offset + SA_CMDL_OFFSET_LABEL_LEN] =
 | 
			
		||||
						SA_CMDL_HEADER_SIZE_BYTES;
 | 
			
		||||
			enc_offset += SA_CMDL_HEADER_SIZE_BYTES;
 | 
			
		||||
			total += SA_CMDL_HEADER_SIZE_BYTES;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -562,23 +694,28 @@ int sa_init_sc(struct sa_ctx_info *ctx, const u8 *enc_key,
 | 
			
		|||
	int auth_sc_offset = 0;
 | 
			
		||||
	u8 *sc_buf = ctx->sc;
 | 
			
		||||
	u16 sc_id = ctx->sc_id;
 | 
			
		||||
	u8 first_engine;
 | 
			
		||||
	u8 first_engine = 0;
 | 
			
		||||
 | 
			
		||||
	memzero_explicit(sc_buf, SA_CTX_MAX_SZ);
 | 
			
		||||
 | 
			
		||||
	if (ad->enc_eng.eng_id) {
 | 
			
		||||
		enc_sc_offset = SA_CTX_PHP_PE_CTX_SZ;
 | 
			
		||||
		first_engine = ad->enc_eng.eng_id;
 | 
			
		||||
		sc_buf[1] = SA_SCCTL_FE_ENC;
 | 
			
		||||
		ad->hash_size = ad->iv_out_size;
 | 
			
		||||
	} else {
 | 
			
		||||
	if (ad->auth_eng.eng_id) {
 | 
			
		||||
		if (enc)
 | 
			
		||||
			first_engine = ad->enc_eng.eng_id;
 | 
			
		||||
		else
 | 
			
		||||
			first_engine = ad->auth_eng.eng_id;
 | 
			
		||||
 | 
			
		||||
		enc_sc_offset = SA_CTX_PHP_PE_CTX_SZ;
 | 
			
		||||
		auth_sc_offset = enc_sc_offset + ad->enc_eng.sc_size;
 | 
			
		||||
		first_engine = ad->auth_eng.eng_id;
 | 
			
		||||
		sc_buf[1] = SA_SCCTL_FE_AUTH_ENC;
 | 
			
		||||
		if (!ad->hash_size)
 | 
			
		||||
			return -EINVAL;
 | 
			
		||||
		ad->hash_size = roundup(ad->hash_size, 8);
 | 
			
		||||
 | 
			
		||||
	} else if (ad->enc_eng.eng_id && !ad->auth_eng.eng_id) {
 | 
			
		||||
		enc_sc_offset = SA_CTX_PHP_PE_CTX_SZ;
 | 
			
		||||
		first_engine = ad->enc_eng.eng_id;
 | 
			
		||||
		sc_buf[1] = SA_SCCTL_FE_ENC;
 | 
			
		||||
		ad->hash_size = ad->iv_out_size;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* SCCTL Owner info: 0=host, 1=CP_ACE */
 | 
			
		||||
| 
						 | 
				
			
			@ -1491,6 +1628,305 @@ static void sa_sha_cra_exit(struct crypto_tfm *tfm)
 | 
			
		|||
	crypto_free_ahash(ctx->fallback.ahash);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void sa_aead_dma_in_callback(void *data)
 | 
			
		||||
{
 | 
			
		||||
	struct sa_rx_data *rxd = (struct sa_rx_data *)data;
 | 
			
		||||
	struct aead_request *req;
 | 
			
		||||
	struct crypto_aead *tfm;
 | 
			
		||||
	unsigned int start;
 | 
			
		||||
	unsigned int authsize;
 | 
			
		||||
	u8 auth_tag[SA_MAX_AUTH_TAG_SZ];
 | 
			
		||||
	size_t pl, ml;
 | 
			
		||||
	int i, sglen;
 | 
			
		||||
	int err = 0;
 | 
			
		||||
	u16 auth_len;
 | 
			
		||||
	u32 *mdptr;
 | 
			
		||||
	bool diff_dst;
 | 
			
		||||
	enum dma_data_direction dir_src;
 | 
			
		||||
 | 
			
		||||
	req = container_of(rxd->req, struct aead_request, base);
 | 
			
		||||
	tfm = crypto_aead_reqtfm(req);
 | 
			
		||||
	start = req->assoclen + req->cryptlen;
 | 
			
		||||
	authsize = crypto_aead_authsize(tfm);
 | 
			
		||||
 | 
			
		||||
	diff_dst = (req->src != req->dst) ? true : false;
 | 
			
		||||
	dir_src = diff_dst ? DMA_TO_DEVICE : DMA_BIDIRECTIONAL;
 | 
			
		||||
 | 
			
		||||
	mdptr = (u32 *)dmaengine_desc_get_metadata_ptr(rxd->tx_in, &pl, &ml);
 | 
			
		||||
	for (i = 0; i < (authsize / 4); i++)
 | 
			
		||||
		mdptr[i + 4] = swab32(mdptr[i + 4]);
 | 
			
		||||
 | 
			
		||||
	auth_len = req->assoclen + req->cryptlen;
 | 
			
		||||
	if (!rxd->enc)
 | 
			
		||||
		auth_len -= authsize;
 | 
			
		||||
 | 
			
		||||
	sglen =  sg_nents_for_len(rxd->src, auth_len);
 | 
			
		||||
	dma_unmap_sg(rxd->ddev, rxd->src, sglen, dir_src);
 | 
			
		||||
	kfree(rxd->split_src_sg);
 | 
			
		||||
 | 
			
		||||
	if (diff_dst) {
 | 
			
		||||
		sglen = sg_nents_for_len(rxd->dst, auth_len);
 | 
			
		||||
		dma_unmap_sg(rxd->ddev, rxd->dst, sglen, DMA_FROM_DEVICE);
 | 
			
		||||
		kfree(rxd->split_dst_sg);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (rxd->enc) {
 | 
			
		||||
		scatterwalk_map_and_copy(&mdptr[4], req->dst, start, authsize,
 | 
			
		||||
					 1);
 | 
			
		||||
	} else {
 | 
			
		||||
		start -= authsize;
 | 
			
		||||
		scatterwalk_map_and_copy(auth_tag, req->src, start, authsize,
 | 
			
		||||
					 0);
 | 
			
		||||
 | 
			
		||||
		err = memcmp(&mdptr[4], auth_tag, authsize) ? -EBADMSG : 0;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	kfree(rxd);
 | 
			
		||||
 | 
			
		||||
	aead_request_complete(req, err);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int sa_cra_init_aead(struct crypto_aead *tfm, const char *hash,
 | 
			
		||||
			    const char *fallback)
 | 
			
		||||
{
 | 
			
		||||
	struct sa_tfm_ctx *ctx = crypto_aead_ctx(tfm);
 | 
			
		||||
	struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev);
 | 
			
		||||
	int ret;
 | 
			
		||||
 | 
			
		||||
	memzero_explicit(ctx, sizeof(*ctx));
 | 
			
		||||
 | 
			
		||||
	ctx->shash = crypto_alloc_shash(hash, 0, CRYPTO_ALG_NEED_FALLBACK);
 | 
			
		||||
	if (IS_ERR(ctx->shash)) {
 | 
			
		||||
		dev_err(sa_k3_dev, "base driver %s couldn't be loaded\n", hash);
 | 
			
		||||
		return PTR_ERR(ctx->shash);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ctx->fallback.aead = crypto_alloc_aead(fallback, 0,
 | 
			
		||||
					       CRYPTO_ALG_NEED_FALLBACK);
 | 
			
		||||
 | 
			
		||||
	if (IS_ERR(ctx->fallback.aead)) {
 | 
			
		||||
		dev_err(sa_k3_dev, "fallback driver %s couldn't be loaded\n",
 | 
			
		||||
			fallback);
 | 
			
		||||
		return PTR_ERR(ctx->fallback.aead);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	crypto_aead_set_reqsize(tfm, sizeof(struct aead_request) +
 | 
			
		||||
				crypto_aead_reqsize(ctx->fallback.aead));
 | 
			
		||||
 | 
			
		||||
	ret = sa_init_ctx_info(&ctx->enc, data);
 | 
			
		||||
	if (ret)
 | 
			
		||||
		return ret;
 | 
			
		||||
 | 
			
		||||
	ret = sa_init_ctx_info(&ctx->dec, data);
 | 
			
		||||
	if (ret) {
 | 
			
		||||
		sa_free_ctx_info(&ctx->enc, data);
 | 
			
		||||
		return ret;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n",
 | 
			
		||||
		__func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys,
 | 
			
		||||
		ctx->dec.sc_id, &ctx->dec.sc_phys);
 | 
			
		||||
 | 
			
		||||
	return ret;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int sa_cra_init_aead_sha1(struct crypto_aead *tfm)
 | 
			
		||||
{
 | 
			
		||||
	return sa_cra_init_aead(tfm, "sha1",
 | 
			
		||||
				"authenc(hmac(sha1-ce),cbc(aes-ce))");
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int sa_cra_init_aead_sha256(struct crypto_aead *tfm)
 | 
			
		||||
{
 | 
			
		||||
	return sa_cra_init_aead(tfm, "sha256",
 | 
			
		||||
				"authenc(hmac(sha256-ce),cbc(aes-ce))");
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static void sa_exit_tfm_aead(struct crypto_aead *tfm)
 | 
			
		||||
{
 | 
			
		||||
	struct sa_tfm_ctx *ctx = crypto_aead_ctx(tfm);
 | 
			
		||||
	struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev);
 | 
			
		||||
 | 
			
		||||
	crypto_free_shash(ctx->shash);
 | 
			
		||||
	crypto_free_aead(ctx->fallback.aead);
 | 
			
		||||
 | 
			
		||||
	sa_free_ctx_info(&ctx->enc, data);
 | 
			
		||||
	sa_free_ctx_info(&ctx->dec, data);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* AEAD algorithm configuration interface function */
 | 
			
		||||
static int sa_aead_setkey(struct crypto_aead *authenc,
 | 
			
		||||
			  const u8 *key, unsigned int keylen,
 | 
			
		||||
			  struct algo_data *ad)
 | 
			
		||||
{
 | 
			
		||||
	struct sa_tfm_ctx *ctx = crypto_aead_ctx(authenc);
 | 
			
		||||
	struct crypto_authenc_keys keys;
 | 
			
		||||
	int cmdl_len;
 | 
			
		||||
	struct sa_cmdl_cfg cfg;
 | 
			
		||||
	int key_idx;
 | 
			
		||||
 | 
			
		||||
	if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
 | 
			
		||||
		return -EINVAL;
 | 
			
		||||
 | 
			
		||||
	/* Convert the key size (16/24/32) to the key size index (0/1/2) */
 | 
			
		||||
	key_idx = (keys.enckeylen >> 3) - 2;
 | 
			
		||||
	if (key_idx >= 3)
 | 
			
		||||
		return -EINVAL;
 | 
			
		||||
 | 
			
		||||
	ad->ctx = ctx;
 | 
			
		||||
	ad->enc_eng.eng_id = SA_ENG_ID_EM1;
 | 
			
		||||
	ad->enc_eng.sc_size = SA_CTX_ENC_TYPE1_SZ;
 | 
			
		||||
	ad->auth_eng.eng_id = SA_ENG_ID_AM1;
 | 
			
		||||
	ad->auth_eng.sc_size = SA_CTX_AUTH_TYPE2_SZ;
 | 
			
		||||
	ad->mci_enc = mci_cbc_enc_no_iv_array[key_idx];
 | 
			
		||||
	ad->mci_dec = mci_cbc_dec_no_iv_array[key_idx];
 | 
			
		||||
	ad->inv_key = true;
 | 
			
		||||
	ad->keyed_mac = true;
 | 
			
		||||
	ad->ealg_id = SA_EALG_ID_AES_CBC;
 | 
			
		||||
	ad->prep_iopad = sa_prepare_iopads;
 | 
			
		||||
 | 
			
		||||
	memset(&cfg, 0, sizeof(cfg));
 | 
			
		||||
	cfg.enc = true;
 | 
			
		||||
	cfg.aalg = ad->aalg_id;
 | 
			
		||||
	cfg.enc_eng_id = ad->enc_eng.eng_id;
 | 
			
		||||
	cfg.auth_eng_id = ad->auth_eng.eng_id;
 | 
			
		||||
	cfg.iv_size = crypto_aead_ivsize(authenc);
 | 
			
		||||
	cfg.akey = keys.authkey;
 | 
			
		||||
	cfg.akey_len = keys.authkeylen;
 | 
			
		||||
 | 
			
		||||
	/* Setup Encryption Security Context & Command label template */
 | 
			
		||||
	if (sa_init_sc(&ctx->enc, keys.enckey, keys.enckeylen,
 | 
			
		||||
		       keys.authkey, keys.authkeylen,
 | 
			
		||||
		       ad, 1, &ctx->enc.epib[1]))
 | 
			
		||||
		return -EINVAL;
 | 
			
		||||
 | 
			
		||||
	cmdl_len = sa_format_cmdl_gen(&cfg,
 | 
			
		||||
				      (u8 *)ctx->enc.cmdl,
 | 
			
		||||
				      &ctx->enc.cmdl_upd_info);
 | 
			
		||||
	if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32)))
 | 
			
		||||
		return -EINVAL;
 | 
			
		||||
 | 
			
		||||
	ctx->enc.cmdl_size = cmdl_len;
 | 
			
		||||
 | 
			
		||||
	/* Setup Decryption Security Context & Command label template */
 | 
			
		||||
	if (sa_init_sc(&ctx->dec, keys.enckey, keys.enckeylen,
 | 
			
		||||
		       keys.authkey, keys.authkeylen,
 | 
			
		||||
		       ad, 0, &ctx->dec.epib[1]))
 | 
			
		||||
		return -EINVAL;
 | 
			
		||||
 | 
			
		||||
	cfg.enc = false;
 | 
			
		||||
	cmdl_len = sa_format_cmdl_gen(&cfg, (u8 *)ctx->dec.cmdl,
 | 
			
		||||
				      &ctx->dec.cmdl_upd_info);
 | 
			
		||||
 | 
			
		||||
	if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32)))
 | 
			
		||||
		return -EINVAL;
 | 
			
		||||
 | 
			
		||||
	ctx->dec.cmdl_size = cmdl_len;
 | 
			
		||||
 | 
			
		||||
	crypto_aead_clear_flags(ctx->fallback.aead, CRYPTO_TFM_REQ_MASK);
 | 
			
		||||
	crypto_aead_set_flags(ctx->fallback.aead,
 | 
			
		||||
			      crypto_aead_get_flags(authenc) &
 | 
			
		||||
			      CRYPTO_TFM_REQ_MASK);
 | 
			
		||||
	crypto_aead_setkey(ctx->fallback.aead, key, keylen);
 | 
			
		||||
 | 
			
		||||
	return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int sa_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize)
 | 
			
		||||
{
 | 
			
		||||
	struct sa_tfm_ctx *ctx = crypto_tfm_ctx(crypto_aead_tfm(tfm));
 | 
			
		||||
 | 
			
		||||
	return crypto_aead_setauthsize(ctx->fallback.aead, authsize);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int sa_aead_cbc_sha1_setkey(struct crypto_aead *authenc,
 | 
			
		||||
				   const u8 *key, unsigned int keylen)
 | 
			
		||||
{
 | 
			
		||||
	struct algo_data ad = { 0 };
 | 
			
		||||
 | 
			
		||||
	ad.ealg_id = SA_EALG_ID_AES_CBC;
 | 
			
		||||
	ad.aalg_id = SA_AALG_ID_HMAC_SHA1;
 | 
			
		||||
	ad.hash_size = SHA1_DIGEST_SIZE;
 | 
			
		||||
	ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA1;
 | 
			
		||||
 | 
			
		||||
	return sa_aead_setkey(authenc, key, keylen, &ad);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int sa_aead_cbc_sha256_setkey(struct crypto_aead *authenc,
 | 
			
		||||
				     const u8 *key, unsigned int keylen)
 | 
			
		||||
{
 | 
			
		||||
	struct algo_data ad = { 0 };
 | 
			
		||||
 | 
			
		||||
	ad.ealg_id = SA_EALG_ID_AES_CBC;
 | 
			
		||||
	ad.aalg_id = SA_AALG_ID_HMAC_SHA2_256;
 | 
			
		||||
	ad.hash_size = SHA256_DIGEST_SIZE;
 | 
			
		||||
	ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA256;
 | 
			
		||||
 | 
			
		||||
	return sa_aead_setkey(authenc, key, keylen, &ad);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int sa_aead_run(struct aead_request *req, u8 *iv, int enc)
 | 
			
		||||
{
 | 
			
		||||
	struct crypto_aead *tfm = crypto_aead_reqtfm(req);
 | 
			
		||||
	struct sa_tfm_ctx *ctx = crypto_aead_ctx(tfm);
 | 
			
		||||
	struct sa_req sa_req = { 0 };
 | 
			
		||||
	size_t auth_size, enc_size;
 | 
			
		||||
 | 
			
		||||
	enc_size = req->cryptlen;
 | 
			
		||||
	auth_size = req->assoclen + req->cryptlen;
 | 
			
		||||
 | 
			
		||||
	if (!enc) {
 | 
			
		||||
		enc_size -= crypto_aead_authsize(tfm);
 | 
			
		||||
		auth_size -= crypto_aead_authsize(tfm);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (auth_size > SA_MAX_DATA_SZ ||
 | 
			
		||||
	    (auth_size >= SA_UNSAFE_DATA_SZ_MIN &&
 | 
			
		||||
	     auth_size <= SA_UNSAFE_DATA_SZ_MAX)) {
 | 
			
		||||
		struct aead_request *subreq = aead_request_ctx(req);
 | 
			
		||||
		int ret;
 | 
			
		||||
 | 
			
		||||
		aead_request_set_tfm(subreq, ctx->fallback.aead);
 | 
			
		||||
		aead_request_set_callback(subreq, req->base.flags,
 | 
			
		||||
					  req->base.complete, req->base.data);
 | 
			
		||||
		aead_request_set_crypt(subreq, req->src, req->dst,
 | 
			
		||||
				       req->cryptlen, req->iv);
 | 
			
		||||
		aead_request_set_ad(subreq, req->assoclen);
 | 
			
		||||
 | 
			
		||||
		ret = enc ? crypto_aead_encrypt(subreq) :
 | 
			
		||||
			crypto_aead_decrypt(subreq);
 | 
			
		||||
		return ret;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	sa_req.enc_offset = req->assoclen;
 | 
			
		||||
	sa_req.enc_size = enc_size;
 | 
			
		||||
	sa_req.auth_size = auth_size;
 | 
			
		||||
	sa_req.size = auth_size;
 | 
			
		||||
	sa_req.enc_iv = iv;
 | 
			
		||||
	sa_req.type = CRYPTO_ALG_TYPE_AEAD;
 | 
			
		||||
	sa_req.enc = enc;
 | 
			
		||||
	sa_req.callback = sa_aead_dma_in_callback;
 | 
			
		||||
	sa_req.mdata_size = 52;
 | 
			
		||||
	sa_req.base = &req->base;
 | 
			
		||||
	sa_req.ctx = ctx;
 | 
			
		||||
	sa_req.src = req->src;
 | 
			
		||||
	sa_req.dst = req->dst;
 | 
			
		||||
 | 
			
		||||
	return sa_run(&sa_req);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* AEAD algorithm encrypt interface function */
 | 
			
		||||
static int sa_aead_encrypt(struct aead_request *req)
 | 
			
		||||
{
 | 
			
		||||
	return sa_aead_run(req, req->iv, 1);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* AEAD algorithm decrypt interface function */
 | 
			
		||||
static int sa_aead_decrypt(struct aead_request *req)
 | 
			
		||||
{
 | 
			
		||||
	return sa_aead_run(req, req->iv, 0);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static struct sa_alg_tmpl sa_algs[] = {
 | 
			
		||||
	{
 | 
			
		||||
		.type = CRYPTO_ALG_TYPE_SKCIPHER,
 | 
			
		||||
| 
						 | 
				
			
			@ -1669,6 +2105,61 @@ static struct sa_alg_tmpl sa_algs[] = {
 | 
			
		|||
			.import			= sa_sha_import,
 | 
			
		||||
		},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		.type	= CRYPTO_ALG_TYPE_AEAD,
 | 
			
		||||
		.alg.aead = {
 | 
			
		||||
			.base = {
 | 
			
		||||
				.cra_name = "authenc(hmac(sha1),cbc(aes))",
 | 
			
		||||
				.cra_driver_name =
 | 
			
		||||
					"authenc(hmac(sha1),cbc(aes))-sa2ul",
 | 
			
		||||
				.cra_blocksize = AES_BLOCK_SIZE,
 | 
			
		||||
				.cra_flags = CRYPTO_ALG_TYPE_AEAD |
 | 
			
		||||
					CRYPTO_ALG_KERN_DRIVER_ONLY |
 | 
			
		||||
					CRYPTO_ALG_ASYNC |
 | 
			
		||||
					CRYPTO_ALG_NEED_FALLBACK,
 | 
			
		||||
				.cra_ctxsize = sizeof(struct sa_tfm_ctx),
 | 
			
		||||
				.cra_module = THIS_MODULE,
 | 
			
		||||
				.cra_priority = 3000,
 | 
			
		||||
			},
 | 
			
		||||
			.ivsize = AES_BLOCK_SIZE,
 | 
			
		||||
			.maxauthsize = SHA1_DIGEST_SIZE,
 | 
			
		||||
 | 
			
		||||
			.init = sa_cra_init_aead_sha1,
 | 
			
		||||
			.exit = sa_exit_tfm_aead,
 | 
			
		||||
			.setkey = sa_aead_cbc_sha1_setkey,
 | 
			
		||||
			.setauthsize = sa_aead_setauthsize,
 | 
			
		||||
			.encrypt = sa_aead_encrypt,
 | 
			
		||||
			.decrypt = sa_aead_decrypt,
 | 
			
		||||
		},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		.type	= CRYPTO_ALG_TYPE_AEAD,
 | 
			
		||||
		.alg.aead = {
 | 
			
		||||
			.base = {
 | 
			
		||||
				.cra_name = "authenc(hmac(sha256),cbc(aes))",
 | 
			
		||||
				.cra_driver_name =
 | 
			
		||||
					"authenc(hmac(sha256),cbc(aes))-sa2ul",
 | 
			
		||||
				.cra_blocksize = AES_BLOCK_SIZE,
 | 
			
		||||
				.cra_flags = CRYPTO_ALG_TYPE_AEAD |
 | 
			
		||||
					CRYPTO_ALG_KERN_DRIVER_ONLY |
 | 
			
		||||
					CRYPTO_ALG_ASYNC |
 | 
			
		||||
					CRYPTO_ALG_NEED_FALLBACK,
 | 
			
		||||
				.cra_ctxsize = sizeof(struct sa_tfm_ctx),
 | 
			
		||||
				.cra_module = THIS_MODULE,
 | 
			
		||||
				.cra_alignmask = 0,
 | 
			
		||||
				.cra_priority = 3000,
 | 
			
		||||
			},
 | 
			
		||||
			.ivsize = AES_BLOCK_SIZE,
 | 
			
		||||
			.maxauthsize = SHA256_DIGEST_SIZE,
 | 
			
		||||
 | 
			
		||||
			.init = sa_cra_init_aead_sha256,
 | 
			
		||||
			.exit = sa_exit_tfm_aead,
 | 
			
		||||
			.setkey = sa_aead_cbc_sha256_setkey,
 | 
			
		||||
			.setauthsize = sa_aead_setauthsize,
 | 
			
		||||
			.encrypt = sa_aead_encrypt,
 | 
			
		||||
			.decrypt = sa_aead_decrypt,
 | 
			
		||||
		},
 | 
			
		||||
	},
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
/* Register the algorithms in crypto framework */
 | 
			
		||||
| 
						 | 
				
			
			@ -1686,6 +2177,9 @@ static void sa_register_algos(const struct device *dev)
 | 
			
		|||
		} else if (type == CRYPTO_ALG_TYPE_AHASH) {
 | 
			
		||||
			alg_name = sa_algs[i].alg.ahash.halg.base.cra_name;
 | 
			
		||||
			err = crypto_register_ahash(&sa_algs[i].alg.ahash);
 | 
			
		||||
		} else if (type == CRYPTO_ALG_TYPE_AEAD) {
 | 
			
		||||
			alg_name = sa_algs[i].alg.aead.base.cra_name;
 | 
			
		||||
			err = crypto_register_aead(&sa_algs[i].alg.aead);
 | 
			
		||||
		} else {
 | 
			
		||||
			dev_err(dev,
 | 
			
		||||
				"un-supported crypto algorithm (%d)",
 | 
			
		||||
| 
						 | 
				
			
			@ -1714,6 +2208,8 @@ static void sa_unregister_algos(const struct device *dev)
 | 
			
		|||
			crypto_unregister_skcipher(&sa_algs[i].alg.skcipher);
 | 
			
		||||
		else if (type == CRYPTO_ALG_TYPE_AHASH)
 | 
			
		||||
			crypto_unregister_ahash(&sa_algs[i].alg.ahash);
 | 
			
		||||
		else if (type == CRYPTO_ALG_TYPE_AEAD)
 | 
			
		||||
			crypto_unregister_aead(&sa_algs[i].alg.aead);
 | 
			
		||||
 | 
			
		||||
		sa_algs[i].registered = false;
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -313,6 +313,7 @@ struct sa_tfm_ctx {
 | 
			
		|||
	union {
 | 
			
		||||
		struct crypto_sync_skcipher	*skcipher;
 | 
			
		||||
		struct crypto_ahash		*ahash;
 | 
			
		||||
		struct crypto_aead		*aead;
 | 
			
		||||
	} fallback;
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in a new issue