1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * CAAM/SEC 4.x functions for handling key-generation jobs
4*4882a593Smuzhiyun *
5*4882a593Smuzhiyun * Copyright 2008-2011 Freescale Semiconductor, Inc.
6*4882a593Smuzhiyun *
7*4882a593Smuzhiyun */
8*4882a593Smuzhiyun #include "compat.h"
9*4882a593Smuzhiyun #include "jr.h"
10*4882a593Smuzhiyun #include "error.h"
11*4882a593Smuzhiyun #include "desc_constr.h"
12*4882a593Smuzhiyun #include "key_gen.h"
13*4882a593Smuzhiyun
split_key_done(struct device * dev,u32 * desc,u32 err,void * context)14*4882a593Smuzhiyun void split_key_done(struct device *dev, u32 *desc, u32 err,
15*4882a593Smuzhiyun void *context)
16*4882a593Smuzhiyun {
17*4882a593Smuzhiyun struct split_key_result *res = context;
18*4882a593Smuzhiyun int ecode = 0;
19*4882a593Smuzhiyun
20*4882a593Smuzhiyun dev_dbg(dev, "%s %d: err 0x%x\n", __func__, __LINE__, err);
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun if (err)
23*4882a593Smuzhiyun ecode = caam_jr_strstatus(dev, err);
24*4882a593Smuzhiyun
25*4882a593Smuzhiyun res->err = ecode;
26*4882a593Smuzhiyun
27*4882a593Smuzhiyun complete(&res->completion);
28*4882a593Smuzhiyun }
29*4882a593Smuzhiyun EXPORT_SYMBOL(split_key_done);
30*4882a593Smuzhiyun /*
31*4882a593Smuzhiyun get a split ipad/opad key
32*4882a593Smuzhiyun
33*4882a593Smuzhiyun Split key generation-----------------------------------------------
34*4882a593Smuzhiyun
35*4882a593Smuzhiyun [00] 0xb0810008 jobdesc: stidx=1 share=never len=8
36*4882a593Smuzhiyun [01] 0x04000014 key: class2->keyreg len=20
37*4882a593Smuzhiyun @0xffe01000
38*4882a593Smuzhiyun [03] 0x84410014 operation: cls2-op sha1 hmac init dec
39*4882a593Smuzhiyun [04] 0x24940000 fifold: class2 msgdata-last2 len=0 imm
40*4882a593Smuzhiyun [05] 0xa4000001 jump: class2 local all ->1 [06]
41*4882a593Smuzhiyun [06] 0x64260028 fifostr: class2 mdsplit-jdk len=40
42*4882a593Smuzhiyun @0xffe04000
43*4882a593Smuzhiyun */
gen_split_key(struct device * jrdev,u8 * key_out,struct alginfo * const adata,const u8 * key_in,u32 keylen,int max_keylen)44*4882a593Smuzhiyun int gen_split_key(struct device *jrdev, u8 *key_out,
45*4882a593Smuzhiyun struct alginfo * const adata, const u8 *key_in, u32 keylen,
46*4882a593Smuzhiyun int max_keylen)
47*4882a593Smuzhiyun {
48*4882a593Smuzhiyun u32 *desc;
49*4882a593Smuzhiyun struct split_key_result result;
50*4882a593Smuzhiyun dma_addr_t dma_addr;
51*4882a593Smuzhiyun unsigned int local_max;
52*4882a593Smuzhiyun int ret = -ENOMEM;
53*4882a593Smuzhiyun
54*4882a593Smuzhiyun adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK);
55*4882a593Smuzhiyun adata->keylen_pad = split_key_pad_len(adata->algtype &
56*4882a593Smuzhiyun OP_ALG_ALGSEL_MASK);
57*4882a593Smuzhiyun local_max = max(keylen, adata->keylen_pad);
58*4882a593Smuzhiyun
59*4882a593Smuzhiyun dev_dbg(jrdev, "split keylen %d split keylen padded %d\n",
60*4882a593Smuzhiyun adata->keylen, adata->keylen_pad);
61*4882a593Smuzhiyun print_hex_dump_debug("ctx.key@" __stringify(__LINE__)": ",
62*4882a593Smuzhiyun DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1);
63*4882a593Smuzhiyun
64*4882a593Smuzhiyun if (local_max > max_keylen)
65*4882a593Smuzhiyun return -EINVAL;
66*4882a593Smuzhiyun
67*4882a593Smuzhiyun desc = kmalloc(CAAM_CMD_SZ * 6 + CAAM_PTR_SZ * 2, GFP_KERNEL | GFP_DMA);
68*4882a593Smuzhiyun if (!desc) {
69*4882a593Smuzhiyun dev_err(jrdev, "unable to allocate key input memory\n");
70*4882a593Smuzhiyun return ret;
71*4882a593Smuzhiyun }
72*4882a593Smuzhiyun
73*4882a593Smuzhiyun memcpy(key_out, key_in, keylen);
74*4882a593Smuzhiyun
75*4882a593Smuzhiyun dma_addr = dma_map_single(jrdev, key_out, local_max, DMA_BIDIRECTIONAL);
76*4882a593Smuzhiyun if (dma_mapping_error(jrdev, dma_addr)) {
77*4882a593Smuzhiyun dev_err(jrdev, "unable to map key memory\n");
78*4882a593Smuzhiyun goto out_free;
79*4882a593Smuzhiyun }
80*4882a593Smuzhiyun
81*4882a593Smuzhiyun init_job_desc(desc, 0);
82*4882a593Smuzhiyun append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG);
83*4882a593Smuzhiyun
84*4882a593Smuzhiyun /* Sets MDHA up into an HMAC-INIT */
85*4882a593Smuzhiyun append_operation(desc, (adata->algtype & OP_ALG_ALGSEL_MASK) |
86*4882a593Smuzhiyun OP_ALG_AAI_HMAC | OP_TYPE_CLASS2_ALG | OP_ALG_DECRYPT |
87*4882a593Smuzhiyun OP_ALG_AS_INIT);
88*4882a593Smuzhiyun
89*4882a593Smuzhiyun /*
90*4882a593Smuzhiyun * do a FIFO_LOAD of zero, this will trigger the internal key expansion
91*4882a593Smuzhiyun * into both pads inside MDHA
92*4882a593Smuzhiyun */
93*4882a593Smuzhiyun append_fifo_load_as_imm(desc, NULL, 0, LDST_CLASS_2_CCB |
94*4882a593Smuzhiyun FIFOLD_TYPE_MSG | FIFOLD_TYPE_LAST2);
95*4882a593Smuzhiyun
96*4882a593Smuzhiyun /*
97*4882a593Smuzhiyun * FIFO_STORE with the explicit split-key content store
98*4882a593Smuzhiyun * (0x26 output type)
99*4882a593Smuzhiyun */
100*4882a593Smuzhiyun append_fifo_store(desc, dma_addr, adata->keylen,
101*4882a593Smuzhiyun LDST_CLASS_2_CCB | FIFOST_TYPE_SPLIT_KEK);
102*4882a593Smuzhiyun
103*4882a593Smuzhiyun print_hex_dump_debug("jobdesc@"__stringify(__LINE__)": ",
104*4882a593Smuzhiyun DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc),
105*4882a593Smuzhiyun 1);
106*4882a593Smuzhiyun
107*4882a593Smuzhiyun result.err = 0;
108*4882a593Smuzhiyun init_completion(&result.completion);
109*4882a593Smuzhiyun
110*4882a593Smuzhiyun ret = caam_jr_enqueue(jrdev, desc, split_key_done, &result);
111*4882a593Smuzhiyun if (ret == -EINPROGRESS) {
112*4882a593Smuzhiyun /* in progress */
113*4882a593Smuzhiyun wait_for_completion(&result.completion);
114*4882a593Smuzhiyun ret = result.err;
115*4882a593Smuzhiyun
116*4882a593Smuzhiyun print_hex_dump_debug("ctx.key@"__stringify(__LINE__)": ",
117*4882a593Smuzhiyun DUMP_PREFIX_ADDRESS, 16, 4, key_out,
118*4882a593Smuzhiyun adata->keylen_pad, 1);
119*4882a593Smuzhiyun }
120*4882a593Smuzhiyun
121*4882a593Smuzhiyun dma_unmap_single(jrdev, dma_addr, local_max, DMA_BIDIRECTIONAL);
122*4882a593Smuzhiyun out_free:
123*4882a593Smuzhiyun kfree(desc);
124*4882a593Smuzhiyun return ret;
125*4882a593Smuzhiyun }
126*4882a593Smuzhiyun EXPORT_SYMBOL(gen_split_key);
127