1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0 24c1ec1f9SYuan Kang /* 34c1ec1f9SYuan Kang * CAAM/SEC 4.x functions for handling key-generation jobs 44c1ec1f9SYuan Kang * 54c1ec1f9SYuan Kang * Copyright 2008-2011 Freescale Semiconductor, Inc. 64c1ec1f9SYuan Kang * 74c1ec1f9SYuan Kang */ 84c1ec1f9SYuan Kang #include "compat.h" 94c1ec1f9SYuan Kang #include "jr.h" 104c1ec1f9SYuan Kang #include "error.h" 114c1ec1f9SYuan Kang #include "desc_constr.h" 124c1ec1f9SYuan Kang #include "key_gen.h" 134c1ec1f9SYuan Kang 144c1ec1f9SYuan Kang void split_key_done(struct device *dev, u32 *desc, u32 err, 154c1ec1f9SYuan Kang void *context) 164c1ec1f9SYuan Kang { 174c1ec1f9SYuan Kang struct split_key_result *res = context; 181984aaeeSHoria Geantă int ecode = 0; 194c1ec1f9SYuan Kang 206e005503SSascha Hauer dev_dbg(dev, "%s %d: err 0x%x\n", __func__, __LINE__, err); 214c1ec1f9SYuan Kang 22fa9659cdSMarek Vasut if (err) 231984aaeeSHoria Geantă ecode = caam_jr_strstatus(dev, err); 244c1ec1f9SYuan Kang 251984aaeeSHoria Geantă res->err = ecode; 264c1ec1f9SYuan Kang 274c1ec1f9SYuan Kang complete(&res->completion); 284c1ec1f9SYuan Kang } 294c1ec1f9SYuan Kang EXPORT_SYMBOL(split_key_done); 304c1ec1f9SYuan Kang /* 314c1ec1f9SYuan Kang get a split ipad/opad key 324c1ec1f9SYuan Kang 334c1ec1f9SYuan Kang Split key generation----------------------------------------------- 344c1ec1f9SYuan Kang 354c1ec1f9SYuan Kang [00] 0xb0810008 jobdesc: stidx=1 share=never len=8 364c1ec1f9SYuan Kang [01] 0x04000014 key: class2->keyreg len=20 374c1ec1f9SYuan Kang @0xffe01000 384c1ec1f9SYuan Kang [03] 0x84410014 operation: cls2-op sha1 hmac init dec 394c1ec1f9SYuan Kang [04] 0x24940000 fifold: class2 msgdata-last2 len=0 imm 404c1ec1f9SYuan Kang [05] 0xa4000001 jump: class2 local all ->1 [06] 414c1ec1f9SYuan Kang [06] 0x64260028 fifostr: class2 mdsplit-jdk len=40 424c1ec1f9SYuan Kang @0xffe04000 434c1ec1f9SYuan Kang */ 44db57656bSHoria Geantă int gen_split_key(struct device *jrdev, u8 *key_out, 456655cb8eSHoria Geantă struct alginfo * const adata, const u8 *key_in, u32 keylen, 466655cb8eSHoria Geantă int max_keylen) 474c1ec1f9SYuan Kang { 484c1ec1f9SYuan Kang u32 *desc; 494c1ec1f9SYuan Kang struct split_key_result result; 5030724445SHoria Geantă dma_addr_t dma_addr; 51*e9b4913aSHoria Geantă unsigned int local_max; 52738459e3SCristian Stoica int ret = -ENOMEM; 534c1ec1f9SYuan Kang 546655cb8eSHoria Geantă adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK); 556655cb8eSHoria Geantă adata->keylen_pad = split_key_pad_len(adata->algtype & 566655cb8eSHoria Geantă OP_ALG_ALGSEL_MASK); 57*e9b4913aSHoria Geantă local_max = max(keylen, adata->keylen_pad); 586655cb8eSHoria Geantă 596e005503SSascha Hauer dev_dbg(jrdev, "split keylen %d split keylen padded %d\n", 606655cb8eSHoria Geantă adata->keylen, adata->keylen_pad); 616e005503SSascha Hauer print_hex_dump_debug("ctx.key@" __stringify(__LINE__)": ", 626655cb8eSHoria Geantă DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); 636655cb8eSHoria Geantă 64*e9b4913aSHoria Geantă if (local_max > max_keylen) 656655cb8eSHoria Geantă return -EINVAL; 666655cb8eSHoria Geantă 674c1ec1f9SYuan Kang desc = kmalloc(CAAM_CMD_SZ * 6 + CAAM_PTR_SZ * 2, GFP_KERNEL | GFP_DMA); 682af8f4a2SKim Phillips if (!desc) { 692af8f4a2SKim Phillips dev_err(jrdev, "unable to allocate key input memory\n"); 70738459e3SCristian Stoica return ret; 712af8f4a2SKim Phillips } 724c1ec1f9SYuan Kang 7330724445SHoria Geantă memcpy(key_out, key_in, keylen); 7430724445SHoria Geantă 75*e9b4913aSHoria Geantă dma_addr = dma_map_single(jrdev, key_out, local_max, DMA_BIDIRECTIONAL); 7630724445SHoria Geantă if (dma_mapping_error(jrdev, dma_addr)) { 7730724445SHoria Geantă dev_err(jrdev, "unable to map key memory\n"); 78738459e3SCristian Stoica goto out_free; 794c1ec1f9SYuan Kang } 80738459e3SCristian Stoica 81738459e3SCristian Stoica init_job_desc(desc, 0); 8230724445SHoria Geantă append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG); 834c1ec1f9SYuan Kang 844c1ec1f9SYuan Kang /* Sets MDHA up into an HMAC-INIT */ 85488ebc3aSHoria Geantă append_operation(desc, (adata->algtype & OP_ALG_ALGSEL_MASK) | 86488ebc3aSHoria Geantă OP_ALG_AAI_HMAC | OP_TYPE_CLASS2_ALG | OP_ALG_DECRYPT | 87488ebc3aSHoria Geantă OP_ALG_AS_INIT); 884c1ec1f9SYuan Kang 894c1ec1f9SYuan Kang /* 904c1ec1f9SYuan Kang * do a FIFO_LOAD of zero, this will trigger the internal key expansion 914c1ec1f9SYuan Kang * into both pads inside MDHA 924c1ec1f9SYuan Kang */ 934c1ec1f9SYuan Kang append_fifo_load_as_imm(desc, NULL, 0, LDST_CLASS_2_CCB | 944c1ec1f9SYuan Kang FIFOLD_TYPE_MSG | FIFOLD_TYPE_LAST2); 954c1ec1f9SYuan Kang 964c1ec1f9SYuan Kang /* 974c1ec1f9SYuan Kang * FIFO_STORE with the explicit split-key content store 984c1ec1f9SYuan Kang * (0x26 output type) 994c1ec1f9SYuan Kang */ 10030724445SHoria Geantă append_fifo_store(desc, dma_addr, adata->keylen, 1014c1ec1f9SYuan Kang LDST_CLASS_2_CCB | FIFOST_TYPE_SPLIT_KEK); 1024c1ec1f9SYuan Kang 1036e005503SSascha Hauer print_hex_dump_debug("jobdesc@"__stringify(__LINE__)": ", 1046e005503SSascha Hauer DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1056e005503SSascha Hauer 1); 1064c1ec1f9SYuan Kang 1074c1ec1f9SYuan Kang result.err = 0; 1084c1ec1f9SYuan Kang init_completion(&result.completion); 1094c1ec1f9SYuan Kang 1104c1ec1f9SYuan Kang ret = caam_jr_enqueue(jrdev, desc, split_key_done, &result); 1114c1ec1f9SYuan Kang if (!ret) { 1124c1ec1f9SYuan Kang /* in progress */ 1137459e1d2SHoria Geantă wait_for_completion(&result.completion); 1144c1ec1f9SYuan Kang ret = result.err; 1156e005503SSascha Hauer 1166e005503SSascha Hauer print_hex_dump_debug("ctx.key@"__stringify(__LINE__)": ", 1174c1ec1f9SYuan Kang DUMP_PREFIX_ADDRESS, 16, 4, key_out, 118db57656bSHoria Geantă adata->keylen_pad, 1); 1194c1ec1f9SYuan Kang } 1204c1ec1f9SYuan Kang 121*e9b4913aSHoria Geantă dma_unmap_single(jrdev, dma_addr, local_max, DMA_BIDIRECTIONAL); 122738459e3SCristian Stoica out_free: 1234c1ec1f9SYuan Kang kfree(desc); 1244c1ec1f9SYuan Kang return ret; 1254c1ec1f9SYuan Kang } 1263b75a2c1SBen Collins EXPORT_SYMBOL(gen_split_key); 127