1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * Copyright (c) 2019 Fuzhou Rockchip Electronics Co., Ltd
4*4882a593Smuzhiyun */
5*4882a593Smuzhiyun
6*4882a593Smuzhiyun #include <common.h>
7*4882a593Smuzhiyun #include <clk.h>
8*4882a593Smuzhiyun #include <crypto.h>
9*4882a593Smuzhiyun #include <dm.h>
10*4882a593Smuzhiyun #include <asm/io.h>
11*4882a593Smuzhiyun #include <clk-uclass.h>
12*4882a593Smuzhiyun #include <asm/arch/hardware.h>
13*4882a593Smuzhiyun #include <asm/arch/clock.h>
14*4882a593Smuzhiyun #include <rockchip/crypto_hash_cache.h>
15*4882a593Smuzhiyun #include <rockchip/crypto_v2.h>
16*4882a593Smuzhiyun #include <rockchip/crypto_v2_pka.h>
17*4882a593Smuzhiyun
18*4882a593Smuzhiyun #define RK_HASH_CTX_MAGIC 0x1A1A1A1A
19*4882a593Smuzhiyun
20*4882a593Smuzhiyun #ifdef DEBUG
21*4882a593Smuzhiyun #define IMSG(format, ...) printf("[%s, %05d]-trace: " format "\n", \
22*4882a593Smuzhiyun __func__, __LINE__, ##__VA_ARGS__)
23*4882a593Smuzhiyun #else
24*4882a593Smuzhiyun #define IMSG(format, ...)
25*4882a593Smuzhiyun #endif
26*4882a593Smuzhiyun
27*4882a593Smuzhiyun struct crypto_lli_desc {
28*4882a593Smuzhiyun u32 src_addr;
29*4882a593Smuzhiyun u32 src_len;
30*4882a593Smuzhiyun u32 dst_addr;
31*4882a593Smuzhiyun u32 dst_len;
32*4882a593Smuzhiyun u32 user_define;
33*4882a593Smuzhiyun u32 reserve;
34*4882a593Smuzhiyun u32 dma_ctrl;
35*4882a593Smuzhiyun u32 next_addr;
36*4882a593Smuzhiyun };
37*4882a593Smuzhiyun
38*4882a593Smuzhiyun struct rk_hash_ctx {
39*4882a593Smuzhiyun struct crypto_lli_desc data_lli; /* lli desc */
40*4882a593Smuzhiyun struct crypto_hash_cache *hash_cache;
41*4882a593Smuzhiyun u32 magic; /* to check ctx */
42*4882a593Smuzhiyun u32 algo; /* hash algo */
43*4882a593Smuzhiyun u8 digest_size; /* hash out length */
44*4882a593Smuzhiyun u8 reserved[3];
45*4882a593Smuzhiyun };
46*4882a593Smuzhiyun
47*4882a593Smuzhiyun struct rk_crypto_soc_data {
48*4882a593Smuzhiyun u32 capability;
49*4882a593Smuzhiyun u32 (*dynamic_cap)(void);
50*4882a593Smuzhiyun };
51*4882a593Smuzhiyun
52*4882a593Smuzhiyun struct rockchip_crypto_priv {
53*4882a593Smuzhiyun fdt_addr_t reg;
54*4882a593Smuzhiyun u32 frequency;
55*4882a593Smuzhiyun char *clocks;
56*4882a593Smuzhiyun u32 *frequencies;
57*4882a593Smuzhiyun u32 nclocks;
58*4882a593Smuzhiyun u32 freq_nclocks;
59*4882a593Smuzhiyun u32 length;
60*4882a593Smuzhiyun struct rk_hash_ctx *hw_ctx;
61*4882a593Smuzhiyun struct rk_crypto_soc_data *soc_data;
62*4882a593Smuzhiyun };
63*4882a593Smuzhiyun
64*4882a593Smuzhiyun #define LLI_ADDR_ALIGN_SIZE 8
65*4882a593Smuzhiyun #define DATA_ADDR_ALIGN_SIZE 8
66*4882a593Smuzhiyun #define DATA_LEN_ALIGN_SIZE 64
67*4882a593Smuzhiyun
68*4882a593Smuzhiyun /* crypto timeout 500ms, must support more than 32M data per times*/
69*4882a593Smuzhiyun #define HASH_UPDATE_LIMIT (32 * 1024 * 1024)
70*4882a593Smuzhiyun #define RK_CRYPTO_TIMEOUT 500000
71*4882a593Smuzhiyun
72*4882a593Smuzhiyun #define RK_POLL_TIMEOUT(condition, timeout) \
73*4882a593Smuzhiyun ({ \
74*4882a593Smuzhiyun int time_out = timeout; \
75*4882a593Smuzhiyun while (condition) { \
76*4882a593Smuzhiyun if (--time_out <= 0) { \
77*4882a593Smuzhiyun debug("[%s] %d: time out!\n", __func__,\
78*4882a593Smuzhiyun __LINE__); \
79*4882a593Smuzhiyun break; \
80*4882a593Smuzhiyun } \
81*4882a593Smuzhiyun udelay(1); \
82*4882a593Smuzhiyun } \
83*4882a593Smuzhiyun (time_out <= 0) ? -ETIMEDOUT : 0; \
84*4882a593Smuzhiyun })
85*4882a593Smuzhiyun
86*4882a593Smuzhiyun #define WAIT_TAG_VALID(channel, timeout) ({ \
87*4882a593Smuzhiyun u32 tag_mask = CRYPTO_CH0_TAG_VALID << (channel);\
88*4882a593Smuzhiyun int ret;\
89*4882a593Smuzhiyun ret = RK_POLL_TIMEOUT(!(crypto_read(CRYPTO_TAG_VALID) & tag_mask),\
90*4882a593Smuzhiyun timeout);\
91*4882a593Smuzhiyun crypto_write(crypto_read(CRYPTO_TAG_VALID) & tag_mask, CRYPTO_TAG_VALID);\
92*4882a593Smuzhiyun ret;\
93*4882a593Smuzhiyun })
94*4882a593Smuzhiyun
95*4882a593Smuzhiyun #define virt_to_phys(addr) (((unsigned long)addr) & 0xffffffff)
96*4882a593Smuzhiyun #define phys_to_virt(addr, area) ((unsigned long)addr)
97*4882a593Smuzhiyun
98*4882a593Smuzhiyun #define align_malloc(bytes, alignment) memalign(alignment, bytes)
99*4882a593Smuzhiyun #define align_free(addr) do {if (addr) free(addr);} while (0)
100*4882a593Smuzhiyun
101*4882a593Smuzhiyun #define ROUNDUP(size, alignment) round_up(size, alignment)
102*4882a593Smuzhiyun #define cache_op_inner(type, addr, size) \
103*4882a593Smuzhiyun crypto_flush_cacheline((ulong)addr, size)
104*4882a593Smuzhiyun
105*4882a593Smuzhiyun #define IS_NEED_IV(rk_mode) ((rk_mode) != RK_MODE_ECB && \
106*4882a593Smuzhiyun (rk_mode) != RK_MODE_CMAC && \
107*4882a593Smuzhiyun (rk_mode) != RK_MODE_CBC_MAC)
108*4882a593Smuzhiyun
109*4882a593Smuzhiyun #define IS_NEED_TAG(rk_mode) ((rk_mode) == RK_MODE_CMAC || \
110*4882a593Smuzhiyun (rk_mode) == RK_MODE_CBC_MAC || \
111*4882a593Smuzhiyun (rk_mode) == RK_MODE_CCM || \
112*4882a593Smuzhiyun (rk_mode) == RK_MODE_GCM)
113*4882a593Smuzhiyun
114*4882a593Smuzhiyun #define IS_MAC_MODE(rk_mode) ((rk_mode) == RK_MODE_CMAC || \
115*4882a593Smuzhiyun (rk_mode) == RK_MODE_CBC_MAC)
116*4882a593Smuzhiyun
117*4882a593Smuzhiyun #define IS_AE_MODE(rk_mode) ((rk_mode) == RK_MODE_CCM || \
118*4882a593Smuzhiyun (rk_mode) == RK_MODE_GCM)
119*4882a593Smuzhiyun
120*4882a593Smuzhiyun fdt_addr_t crypto_base;
121*4882a593Smuzhiyun
word2byte_be(u32 word,u8 * ch)122*4882a593Smuzhiyun static inline void word2byte_be(u32 word, u8 *ch)
123*4882a593Smuzhiyun {
124*4882a593Smuzhiyun ch[0] = (word >> 24) & 0xff;
125*4882a593Smuzhiyun ch[1] = (word >> 16) & 0xff;
126*4882a593Smuzhiyun ch[2] = (word >> 8) & 0xff;
127*4882a593Smuzhiyun ch[3] = (word >> 0) & 0xff;
128*4882a593Smuzhiyun }
129*4882a593Smuzhiyun
byte2word_be(const u8 * ch)130*4882a593Smuzhiyun static inline u32 byte2word_be(const u8 *ch)
131*4882a593Smuzhiyun {
132*4882a593Smuzhiyun return (*ch << 24) + (*(ch + 1) << 16) + (*(ch + 2) << 8) + *(ch + 3);
133*4882a593Smuzhiyun }
134*4882a593Smuzhiyun
clear_regs(u32 base,u32 words)135*4882a593Smuzhiyun static inline void clear_regs(u32 base, u32 words)
136*4882a593Smuzhiyun {
137*4882a593Smuzhiyun int i;
138*4882a593Smuzhiyun
139*4882a593Smuzhiyun /*clear out register*/
140*4882a593Smuzhiyun for (i = 0; i < words; i++)
141*4882a593Smuzhiyun crypto_write(0, base + 4 * i);
142*4882a593Smuzhiyun }
143*4882a593Smuzhiyun
clear_hash_out_reg(void)144*4882a593Smuzhiyun static inline void clear_hash_out_reg(void)
145*4882a593Smuzhiyun {
146*4882a593Smuzhiyun clear_regs(CRYPTO_HASH_DOUT_0, 16);
147*4882a593Smuzhiyun }
148*4882a593Smuzhiyun
clear_key_regs(void)149*4882a593Smuzhiyun static inline void clear_key_regs(void)
150*4882a593Smuzhiyun {
151*4882a593Smuzhiyun clear_regs(CRYPTO_CH0_KEY_0, CRYPTO_KEY_CHANNEL_NUM * 4);
152*4882a593Smuzhiyun }
153*4882a593Smuzhiyun
read_regs(u32 base,u8 * data,u32 data_len)154*4882a593Smuzhiyun static inline void read_regs(u32 base, u8 *data, u32 data_len)
155*4882a593Smuzhiyun {
156*4882a593Smuzhiyun u8 tmp_buf[4];
157*4882a593Smuzhiyun u32 i;
158*4882a593Smuzhiyun
159*4882a593Smuzhiyun for (i = 0; i < data_len / 4; i++)
160*4882a593Smuzhiyun word2byte_be(crypto_read(base + i * 4),
161*4882a593Smuzhiyun data + i * 4);
162*4882a593Smuzhiyun
163*4882a593Smuzhiyun if (data_len % 4) {
164*4882a593Smuzhiyun word2byte_be(crypto_read(base + i * 4), tmp_buf);
165*4882a593Smuzhiyun memcpy(data + i * 4, tmp_buf, data_len % 4);
166*4882a593Smuzhiyun }
167*4882a593Smuzhiyun }
168*4882a593Smuzhiyun
write_regs(u32 base,const u8 * data,u32 data_len)169*4882a593Smuzhiyun static inline void write_regs(u32 base, const u8 *data, u32 data_len)
170*4882a593Smuzhiyun {
171*4882a593Smuzhiyun u8 tmp_buf[4];
172*4882a593Smuzhiyun u32 i;
173*4882a593Smuzhiyun
174*4882a593Smuzhiyun for (i = 0; i < data_len / 4; i++, base += 4)
175*4882a593Smuzhiyun crypto_write(byte2word_be(data + i * 4), base);
176*4882a593Smuzhiyun
177*4882a593Smuzhiyun if (data_len % 4) {
178*4882a593Smuzhiyun memset(tmp_buf, 0x00, sizeof(tmp_buf));
179*4882a593Smuzhiyun memcpy((u8 *)tmp_buf, data + i * 4, data_len % 4);
180*4882a593Smuzhiyun crypto_write(byte2word_be(tmp_buf), base);
181*4882a593Smuzhiyun }
182*4882a593Smuzhiyun }
183*4882a593Smuzhiyun
write_key_reg(u32 chn,const u8 * key,u32 key_len)184*4882a593Smuzhiyun static inline void write_key_reg(u32 chn, const u8 *key, u32 key_len)
185*4882a593Smuzhiyun {
186*4882a593Smuzhiyun write_regs(CRYPTO_CH0_KEY_0 + chn * 0x10, key, key_len);
187*4882a593Smuzhiyun }
188*4882a593Smuzhiyun
set_iv_reg(u32 chn,const u8 * iv,u32 iv_len)189*4882a593Smuzhiyun static inline void set_iv_reg(u32 chn, const u8 *iv, u32 iv_len)
190*4882a593Smuzhiyun {
191*4882a593Smuzhiyun u32 base_iv;
192*4882a593Smuzhiyun
193*4882a593Smuzhiyun base_iv = CRYPTO_CH0_IV_0 + chn * 0x10;
194*4882a593Smuzhiyun
195*4882a593Smuzhiyun /* clear iv */
196*4882a593Smuzhiyun clear_regs(base_iv, 4);
197*4882a593Smuzhiyun
198*4882a593Smuzhiyun if (!iv || iv_len == 0)
199*4882a593Smuzhiyun return;
200*4882a593Smuzhiyun
201*4882a593Smuzhiyun write_regs(base_iv, iv, iv_len);
202*4882a593Smuzhiyun
203*4882a593Smuzhiyun crypto_write(iv_len, CRYPTO_CH0_IV_LEN_0 + 4 * chn);
204*4882a593Smuzhiyun }
205*4882a593Smuzhiyun
get_iv_reg(u32 chn,u8 * iv,u32 iv_len)206*4882a593Smuzhiyun static inline void get_iv_reg(u32 chn, u8 *iv, u32 iv_len)
207*4882a593Smuzhiyun {
208*4882a593Smuzhiyun u32 base_iv;
209*4882a593Smuzhiyun
210*4882a593Smuzhiyun base_iv = CRYPTO_CH0_IV_0 + chn * 0x10;
211*4882a593Smuzhiyun
212*4882a593Smuzhiyun read_regs(base_iv, iv, iv_len);
213*4882a593Smuzhiyun }
214*4882a593Smuzhiyun
get_tag_from_reg(u32 chn,u8 * tag,u32 tag_len)215*4882a593Smuzhiyun static inline void get_tag_from_reg(u32 chn, u8 *tag, u32 tag_len)
216*4882a593Smuzhiyun {
217*4882a593Smuzhiyun u32 i;
218*4882a593Smuzhiyun u32 chn_base = CRYPTO_CH0_TAG_0 + 0x10 * chn;
219*4882a593Smuzhiyun
220*4882a593Smuzhiyun for (i = 0; i < tag_len / 4; i++, chn_base += 4)
221*4882a593Smuzhiyun word2byte_be(crypto_read(chn_base), tag + 4 * i);
222*4882a593Smuzhiyun }
223*4882a593Smuzhiyun
rk_crypto_do_enable_clk(struct udevice * dev,int enable)224*4882a593Smuzhiyun static int rk_crypto_do_enable_clk(struct udevice *dev, int enable)
225*4882a593Smuzhiyun {
226*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = dev_get_priv(dev);
227*4882a593Smuzhiyun struct clk clk;
228*4882a593Smuzhiyun int i, ret;
229*4882a593Smuzhiyun
230*4882a593Smuzhiyun for (i = 0; i < priv->nclocks; i++) {
231*4882a593Smuzhiyun ret = clk_get_by_index(dev, i, &clk);
232*4882a593Smuzhiyun if (ret < 0) {
233*4882a593Smuzhiyun printf("Failed to get clk index %d, ret=%d\n", i, ret);
234*4882a593Smuzhiyun return ret;
235*4882a593Smuzhiyun }
236*4882a593Smuzhiyun
237*4882a593Smuzhiyun if (enable)
238*4882a593Smuzhiyun ret = clk_enable(&clk);
239*4882a593Smuzhiyun else
240*4882a593Smuzhiyun ret = clk_disable(&clk);
241*4882a593Smuzhiyun if (ret < 0 && ret != -ENOSYS) {
242*4882a593Smuzhiyun printf("Failed to enable(%d) clk(%ld): ret=%d\n",
243*4882a593Smuzhiyun enable, clk.id, ret);
244*4882a593Smuzhiyun return ret;
245*4882a593Smuzhiyun }
246*4882a593Smuzhiyun }
247*4882a593Smuzhiyun
248*4882a593Smuzhiyun return 0;
249*4882a593Smuzhiyun }
250*4882a593Smuzhiyun
rk_crypto_enable_clk(struct udevice * dev)251*4882a593Smuzhiyun static int rk_crypto_enable_clk(struct udevice *dev)
252*4882a593Smuzhiyun {
253*4882a593Smuzhiyun return rk_crypto_do_enable_clk(dev, 1);
254*4882a593Smuzhiyun }
255*4882a593Smuzhiyun
rk_crypto_disable_clk(struct udevice * dev)256*4882a593Smuzhiyun static int rk_crypto_disable_clk(struct udevice *dev)
257*4882a593Smuzhiyun {
258*4882a593Smuzhiyun return rk_crypto_do_enable_clk(dev, 0);
259*4882a593Smuzhiyun }
260*4882a593Smuzhiyun
crypto_v3_dynamic_cap(void)261*4882a593Smuzhiyun static u32 crypto_v3_dynamic_cap(void)
262*4882a593Smuzhiyun {
263*4882a593Smuzhiyun u32 capability = 0;
264*4882a593Smuzhiyun u32 ver_reg, i;
265*4882a593Smuzhiyun struct cap_map {
266*4882a593Smuzhiyun u32 ver_offset;
267*4882a593Smuzhiyun u32 mask;
268*4882a593Smuzhiyun u32 cap_bit;
269*4882a593Smuzhiyun };
270*4882a593Smuzhiyun const struct cap_map cap_tbl[] = {
271*4882a593Smuzhiyun {CRYPTO_HASH_VERSION, CRYPTO_HASH_MD5_FLAG, CRYPTO_MD5},
272*4882a593Smuzhiyun {CRYPTO_HASH_VERSION, CRYPTO_HASH_SHA1_FLAG, CRYPTO_SHA1},
273*4882a593Smuzhiyun {CRYPTO_HASH_VERSION, CRYPTO_HASH_SHA256_FLAG, CRYPTO_SHA256},
274*4882a593Smuzhiyun {CRYPTO_HASH_VERSION, CRYPTO_HASH_SHA512_FLAG, CRYPTO_SHA512},
275*4882a593Smuzhiyun {CRYPTO_HASH_VERSION, CRYPTO_HASH_SM3_FLAG, CRYPTO_SM3},
276*4882a593Smuzhiyun
277*4882a593Smuzhiyun {CRYPTO_HMAC_VERSION, CRYPTO_HMAC_MD5_FLAG, CRYPTO_HMAC_MD5},
278*4882a593Smuzhiyun {CRYPTO_HMAC_VERSION, CRYPTO_HMAC_SHA1_FLAG, CRYPTO_HMAC_SHA1},
279*4882a593Smuzhiyun {CRYPTO_HMAC_VERSION, CRYPTO_HMAC_SHA256_FLAG, CRYPTO_HMAC_SHA256},
280*4882a593Smuzhiyun {CRYPTO_HMAC_VERSION, CRYPTO_HMAC_SHA512_FLAG, CRYPTO_HMAC_SHA512},
281*4882a593Smuzhiyun {CRYPTO_HMAC_VERSION, CRYPTO_HMAC_SM3_FLAG, CRYPTO_HMAC_SM3},
282*4882a593Smuzhiyun
283*4882a593Smuzhiyun {CRYPTO_AES_VERSION, CRYPTO_AES256_FLAG, CRYPTO_AES},
284*4882a593Smuzhiyun {CRYPTO_DES_VERSION, CRYPTO_TDES_FLAG, CRYPTO_DES},
285*4882a593Smuzhiyun {CRYPTO_SM4_VERSION, CRYPTO_ECB_FLAG, CRYPTO_SM4},
286*4882a593Smuzhiyun };
287*4882a593Smuzhiyun
288*4882a593Smuzhiyun /* rsa */
289*4882a593Smuzhiyun capability = CRYPTO_RSA512 |
290*4882a593Smuzhiyun CRYPTO_RSA1024 |
291*4882a593Smuzhiyun CRYPTO_RSA2048 |
292*4882a593Smuzhiyun CRYPTO_RSA3072 |
293*4882a593Smuzhiyun CRYPTO_RSA4096;
294*4882a593Smuzhiyun
295*4882a593Smuzhiyun for (i = 0; i < ARRAY_SIZE(cap_tbl); i++) {
296*4882a593Smuzhiyun ver_reg = crypto_read(cap_tbl[i].ver_offset);
297*4882a593Smuzhiyun
298*4882a593Smuzhiyun if ((ver_reg & cap_tbl[i].mask) == cap_tbl[i].mask)
299*4882a593Smuzhiyun capability |= cap_tbl[i].cap_bit;
300*4882a593Smuzhiyun }
301*4882a593Smuzhiyun
302*4882a593Smuzhiyun return capability;
303*4882a593Smuzhiyun }
304*4882a593Smuzhiyun
hw_crypto_reset(void)305*4882a593Smuzhiyun static int hw_crypto_reset(void)
306*4882a593Smuzhiyun {
307*4882a593Smuzhiyun u32 val = 0, mask = 0;
308*4882a593Smuzhiyun int ret;
309*4882a593Smuzhiyun
310*4882a593Smuzhiyun val = CRYPTO_SW_PKA_RESET | CRYPTO_SW_CC_RESET;
311*4882a593Smuzhiyun mask = val << CRYPTO_WRITE_MASK_SHIFT;
312*4882a593Smuzhiyun
313*4882a593Smuzhiyun /* reset pka and crypto modules*/
314*4882a593Smuzhiyun crypto_write(val | mask, CRYPTO_RST_CTL);
315*4882a593Smuzhiyun
316*4882a593Smuzhiyun /* wait reset compelete */
317*4882a593Smuzhiyun ret = RK_POLL_TIMEOUT(crypto_read(CRYPTO_RST_CTL), RK_CRYPTO_TIMEOUT);
318*4882a593Smuzhiyun
319*4882a593Smuzhiyun return ret;
320*4882a593Smuzhiyun }
321*4882a593Smuzhiyun
hw_hash_clean_ctx(struct rk_hash_ctx * ctx)322*4882a593Smuzhiyun static void hw_hash_clean_ctx(struct rk_hash_ctx *ctx)
323*4882a593Smuzhiyun {
324*4882a593Smuzhiyun /* clear hash status */
325*4882a593Smuzhiyun crypto_write(CRYPTO_WRITE_MASK_ALL | 0, CRYPTO_HASH_CTL);
326*4882a593Smuzhiyun
327*4882a593Smuzhiyun assert(ctx);
328*4882a593Smuzhiyun assert(ctx->magic == RK_HASH_CTX_MAGIC);
329*4882a593Smuzhiyun
330*4882a593Smuzhiyun crypto_hash_cache_free(ctx->hash_cache);
331*4882a593Smuzhiyun
332*4882a593Smuzhiyun memset(ctx, 0x00, sizeof(*ctx));
333*4882a593Smuzhiyun }
334*4882a593Smuzhiyun
rk_hash_init(void * hw_ctx,u32 algo)335*4882a593Smuzhiyun static int rk_hash_init(void *hw_ctx, u32 algo)
336*4882a593Smuzhiyun {
337*4882a593Smuzhiyun struct rk_hash_ctx *tmp_ctx = (struct rk_hash_ctx *)hw_ctx;
338*4882a593Smuzhiyun u32 reg_ctrl = 0;
339*4882a593Smuzhiyun int ret;
340*4882a593Smuzhiyun
341*4882a593Smuzhiyun if (!tmp_ctx)
342*4882a593Smuzhiyun return -EINVAL;
343*4882a593Smuzhiyun
344*4882a593Smuzhiyun reg_ctrl = CRYPTO_SW_CC_RESET;
345*4882a593Smuzhiyun crypto_write(reg_ctrl | (reg_ctrl << CRYPTO_WRITE_MASK_SHIFT),
346*4882a593Smuzhiyun CRYPTO_RST_CTL);
347*4882a593Smuzhiyun
348*4882a593Smuzhiyun /* wait reset compelete */
349*4882a593Smuzhiyun ret = RK_POLL_TIMEOUT(crypto_read(CRYPTO_RST_CTL),
350*4882a593Smuzhiyun RK_CRYPTO_TIMEOUT);
351*4882a593Smuzhiyun
352*4882a593Smuzhiyun reg_ctrl = 0;
353*4882a593Smuzhiyun tmp_ctx->algo = algo;
354*4882a593Smuzhiyun switch (algo) {
355*4882a593Smuzhiyun case CRYPTO_MD5:
356*4882a593Smuzhiyun case CRYPTO_HMAC_MD5:
357*4882a593Smuzhiyun reg_ctrl |= CRYPTO_MODE_MD5;
358*4882a593Smuzhiyun tmp_ctx->digest_size = 16;
359*4882a593Smuzhiyun break;
360*4882a593Smuzhiyun case CRYPTO_SHA1:
361*4882a593Smuzhiyun case CRYPTO_HMAC_SHA1:
362*4882a593Smuzhiyun reg_ctrl |= CRYPTO_MODE_SHA1;
363*4882a593Smuzhiyun tmp_ctx->digest_size = 20;
364*4882a593Smuzhiyun break;
365*4882a593Smuzhiyun case CRYPTO_SHA256:
366*4882a593Smuzhiyun case CRYPTO_HMAC_SHA256:
367*4882a593Smuzhiyun reg_ctrl |= CRYPTO_MODE_SHA256;
368*4882a593Smuzhiyun tmp_ctx->digest_size = 32;
369*4882a593Smuzhiyun break;
370*4882a593Smuzhiyun case CRYPTO_SHA512:
371*4882a593Smuzhiyun case CRYPTO_HMAC_SHA512:
372*4882a593Smuzhiyun reg_ctrl |= CRYPTO_MODE_SHA512;
373*4882a593Smuzhiyun tmp_ctx->digest_size = 64;
374*4882a593Smuzhiyun break;
375*4882a593Smuzhiyun case CRYPTO_SM3:
376*4882a593Smuzhiyun case CRYPTO_HMAC_SM3:
377*4882a593Smuzhiyun reg_ctrl |= CRYPTO_MODE_SM3;
378*4882a593Smuzhiyun tmp_ctx->digest_size = 32;
379*4882a593Smuzhiyun break;
380*4882a593Smuzhiyun default:
381*4882a593Smuzhiyun ret = -EINVAL;
382*4882a593Smuzhiyun goto exit;
383*4882a593Smuzhiyun }
384*4882a593Smuzhiyun
385*4882a593Smuzhiyun clear_hash_out_reg();
386*4882a593Smuzhiyun
387*4882a593Smuzhiyun /* enable hardware padding */
388*4882a593Smuzhiyun reg_ctrl |= CRYPTO_HW_PAD_ENABLE;
389*4882a593Smuzhiyun crypto_write(reg_ctrl | CRYPTO_WRITE_MASK_ALL, CRYPTO_HASH_CTL);
390*4882a593Smuzhiyun
391*4882a593Smuzhiyun /* FIFO input and output data byte swap */
392*4882a593Smuzhiyun /* such as B0, B1, B2, B3 -> B3, B2, B1, B0 */
393*4882a593Smuzhiyun reg_ctrl = CRYPTO_DOUT_BYTESWAP | CRYPTO_DOIN_BYTESWAP;
394*4882a593Smuzhiyun crypto_write(reg_ctrl | CRYPTO_WRITE_MASK_ALL, CRYPTO_FIFO_CTL);
395*4882a593Smuzhiyun
396*4882a593Smuzhiyun /* enable src_item_done interrupt */
397*4882a593Smuzhiyun crypto_write(0, CRYPTO_DMA_INT_EN);
398*4882a593Smuzhiyun
399*4882a593Smuzhiyun tmp_ctx->magic = RK_HASH_CTX_MAGIC;
400*4882a593Smuzhiyun
401*4882a593Smuzhiyun return 0;
402*4882a593Smuzhiyun exit:
403*4882a593Smuzhiyun /* clear hash setting if init failed */
404*4882a593Smuzhiyun crypto_write(CRYPTO_WRITE_MASK_ALL | 0, CRYPTO_HASH_CTL);
405*4882a593Smuzhiyun
406*4882a593Smuzhiyun return ret;
407*4882a593Smuzhiyun }
408*4882a593Smuzhiyun
rk_hash_direct_calc(void * hw_data,const u8 * data,u32 data_len,u8 * started_flag,u8 is_last)409*4882a593Smuzhiyun static int rk_hash_direct_calc(void *hw_data, const u8 *data,
410*4882a593Smuzhiyun u32 data_len, u8 *started_flag, u8 is_last)
411*4882a593Smuzhiyun {
412*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = hw_data;
413*4882a593Smuzhiyun struct rk_hash_ctx *hash_ctx = priv->hw_ctx;
414*4882a593Smuzhiyun struct crypto_lli_desc *lli = &hash_ctx->data_lli;
415*4882a593Smuzhiyun int ret = -EINVAL;
416*4882a593Smuzhiyun u32 tmp = 0, mask = 0;
417*4882a593Smuzhiyun
418*4882a593Smuzhiyun assert(IS_ALIGNED((ulong)data, DATA_ADDR_ALIGN_SIZE));
419*4882a593Smuzhiyun assert(is_last || IS_ALIGNED(data_len, DATA_LEN_ALIGN_SIZE));
420*4882a593Smuzhiyun
421*4882a593Smuzhiyun debug("%s: data = %p, len = %u, s = %x, l = %x\n",
422*4882a593Smuzhiyun __func__, data, data_len, *started_flag, is_last);
423*4882a593Smuzhiyun
424*4882a593Smuzhiyun memset(lli, 0x00, sizeof(*lli));
425*4882a593Smuzhiyun lli->src_addr = (u32)virt_to_phys(data);
426*4882a593Smuzhiyun lli->src_len = data_len;
427*4882a593Smuzhiyun lli->dma_ctrl = LLI_DMA_CTRL_SRC_DONE;
428*4882a593Smuzhiyun
429*4882a593Smuzhiyun if (is_last) {
430*4882a593Smuzhiyun lli->user_define |= LLI_USER_STRING_LAST;
431*4882a593Smuzhiyun lli->dma_ctrl |= LLI_DMA_CTRL_LAST;
432*4882a593Smuzhiyun } else {
433*4882a593Smuzhiyun lli->next_addr = (u32)virt_to_phys(lli);
434*4882a593Smuzhiyun lli->dma_ctrl |= LLI_DMA_CTRL_PAUSE;
435*4882a593Smuzhiyun }
436*4882a593Smuzhiyun
437*4882a593Smuzhiyun if (!(*started_flag)) {
438*4882a593Smuzhiyun lli->user_define |=
439*4882a593Smuzhiyun (LLI_USER_STRING_START | LLI_USER_CIPHER_START);
440*4882a593Smuzhiyun crypto_write((u32)virt_to_phys(lli), CRYPTO_DMA_LLI_ADDR);
441*4882a593Smuzhiyun crypto_write((CRYPTO_HASH_ENABLE << CRYPTO_WRITE_MASK_SHIFT) |
442*4882a593Smuzhiyun CRYPTO_HASH_ENABLE, CRYPTO_HASH_CTL);
443*4882a593Smuzhiyun tmp = CRYPTO_DMA_START;
444*4882a593Smuzhiyun *started_flag = 1;
445*4882a593Smuzhiyun } else {
446*4882a593Smuzhiyun tmp = CRYPTO_DMA_RESTART;
447*4882a593Smuzhiyun }
448*4882a593Smuzhiyun
449*4882a593Smuzhiyun /* flush cache */
450*4882a593Smuzhiyun crypto_flush_cacheline((ulong)lli, sizeof(*lli));
451*4882a593Smuzhiyun crypto_flush_cacheline((ulong)data, data_len);
452*4882a593Smuzhiyun
453*4882a593Smuzhiyun /* start calculate */
454*4882a593Smuzhiyun crypto_write(tmp << CRYPTO_WRITE_MASK_SHIFT | tmp,
455*4882a593Smuzhiyun CRYPTO_DMA_CTL);
456*4882a593Smuzhiyun
457*4882a593Smuzhiyun /* mask CRYPTO_SYNC_LOCKSTEP_INT_ST flag */
458*4882a593Smuzhiyun mask = ~(mask | CRYPTO_SYNC_LOCKSTEP_INT_ST);
459*4882a593Smuzhiyun
460*4882a593Smuzhiyun /* wait calc ok */
461*4882a593Smuzhiyun ret = RK_POLL_TIMEOUT(!(crypto_read(CRYPTO_DMA_INT_ST) & mask),
462*4882a593Smuzhiyun RK_CRYPTO_TIMEOUT);
463*4882a593Smuzhiyun
464*4882a593Smuzhiyun /* clear interrupt status */
465*4882a593Smuzhiyun tmp = crypto_read(CRYPTO_DMA_INT_ST);
466*4882a593Smuzhiyun crypto_write(tmp, CRYPTO_DMA_INT_ST);
467*4882a593Smuzhiyun
468*4882a593Smuzhiyun if ((tmp & mask) != CRYPTO_SRC_ITEM_DONE_INT_ST &&
469*4882a593Smuzhiyun (tmp & mask) != CRYPTO_ZERO_LEN_INT_ST) {
470*4882a593Smuzhiyun ret = -EFAULT;
471*4882a593Smuzhiyun debug("[%s] %d: CRYPTO_DMA_INT_ST = 0x%x\n",
472*4882a593Smuzhiyun __func__, __LINE__, tmp);
473*4882a593Smuzhiyun goto exit;
474*4882a593Smuzhiyun }
475*4882a593Smuzhiyun
476*4882a593Smuzhiyun priv->length += data_len;
477*4882a593Smuzhiyun exit:
478*4882a593Smuzhiyun return ret;
479*4882a593Smuzhiyun }
480*4882a593Smuzhiyun
rk_hash_update(void * ctx,const u8 * data,u32 data_len)481*4882a593Smuzhiyun int rk_hash_update(void *ctx, const u8 *data, u32 data_len)
482*4882a593Smuzhiyun {
483*4882a593Smuzhiyun struct rk_hash_ctx *tmp_ctx = (struct rk_hash_ctx *)ctx;
484*4882a593Smuzhiyun int ret = -EINVAL;
485*4882a593Smuzhiyun
486*4882a593Smuzhiyun debug("\n");
487*4882a593Smuzhiyun if (!tmp_ctx || !data)
488*4882a593Smuzhiyun goto exit;
489*4882a593Smuzhiyun
490*4882a593Smuzhiyun if (tmp_ctx->digest_size == 0 || tmp_ctx->magic != RK_HASH_CTX_MAGIC)
491*4882a593Smuzhiyun goto exit;
492*4882a593Smuzhiyun
493*4882a593Smuzhiyun ret = crypto_hash_update_with_cache(tmp_ctx->hash_cache,
494*4882a593Smuzhiyun data, data_len);
495*4882a593Smuzhiyun
496*4882a593Smuzhiyun exit:
497*4882a593Smuzhiyun /* free lli list */
498*4882a593Smuzhiyun if (ret)
499*4882a593Smuzhiyun hw_hash_clean_ctx(tmp_ctx);
500*4882a593Smuzhiyun
501*4882a593Smuzhiyun return ret;
502*4882a593Smuzhiyun }
503*4882a593Smuzhiyun
rk_hash_final(void * ctx,u8 * digest,size_t len)504*4882a593Smuzhiyun int rk_hash_final(void *ctx, u8 *digest, size_t len)
505*4882a593Smuzhiyun {
506*4882a593Smuzhiyun struct rk_hash_ctx *tmp_ctx = (struct rk_hash_ctx *)ctx;
507*4882a593Smuzhiyun int ret = -EINVAL;
508*4882a593Smuzhiyun
509*4882a593Smuzhiyun if (!digest)
510*4882a593Smuzhiyun goto exit;
511*4882a593Smuzhiyun
512*4882a593Smuzhiyun if (!tmp_ctx ||
513*4882a593Smuzhiyun tmp_ctx->digest_size == 0 ||
514*4882a593Smuzhiyun len > tmp_ctx->digest_size ||
515*4882a593Smuzhiyun tmp_ctx->magic != RK_HASH_CTX_MAGIC) {
516*4882a593Smuzhiyun goto exit;
517*4882a593Smuzhiyun }
518*4882a593Smuzhiyun
519*4882a593Smuzhiyun /* wait hash value ok */
520*4882a593Smuzhiyun ret = RK_POLL_TIMEOUT(!crypto_read(CRYPTO_HASH_VALID),
521*4882a593Smuzhiyun RK_CRYPTO_TIMEOUT);
522*4882a593Smuzhiyun
523*4882a593Smuzhiyun read_regs(CRYPTO_HASH_DOUT_0, digest, len);
524*4882a593Smuzhiyun
525*4882a593Smuzhiyun /* clear hash status */
526*4882a593Smuzhiyun crypto_write(CRYPTO_HASH_IS_VALID, CRYPTO_HASH_VALID);
527*4882a593Smuzhiyun crypto_write(CRYPTO_WRITE_MASK_ALL | 0, CRYPTO_HASH_CTL);
528*4882a593Smuzhiyun
529*4882a593Smuzhiyun exit:
530*4882a593Smuzhiyun
531*4882a593Smuzhiyun return ret;
532*4882a593Smuzhiyun }
533*4882a593Smuzhiyun
rockchip_crypto_capability(struct udevice * dev)534*4882a593Smuzhiyun static u32 rockchip_crypto_capability(struct udevice *dev)
535*4882a593Smuzhiyun {
536*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = dev_get_priv(dev);
537*4882a593Smuzhiyun u32 capability, mask = 0;
538*4882a593Smuzhiyun
539*4882a593Smuzhiyun capability = priv->soc_data->capability;
540*4882a593Smuzhiyun
541*4882a593Smuzhiyun #if !(CONFIG_IS_ENABLED(ROCKCHIP_CIPHER))
542*4882a593Smuzhiyun mask |= (CRYPTO_DES | CRYPTO_AES | CRYPTO_SM4);
543*4882a593Smuzhiyun #endif
544*4882a593Smuzhiyun
545*4882a593Smuzhiyun #if !(CONFIG_IS_ENABLED(ROCKCHIP_HMAC))
546*4882a593Smuzhiyun mask |= (CRYPTO_HMAC_MD5 | CRYPTO_HMAC_SHA1 | CRYPTO_HMAC_SHA256 |
547*4882a593Smuzhiyun CRYPTO_HMAC_SHA512 | CRYPTO_HMAC_SM3);
548*4882a593Smuzhiyun #endif
549*4882a593Smuzhiyun
550*4882a593Smuzhiyun #if !(CONFIG_IS_ENABLED(ROCKCHIP_RSA))
551*4882a593Smuzhiyun mask |= (CRYPTO_RSA512 | CRYPTO_RSA1024 | CRYPTO_RSA2048 |
552*4882a593Smuzhiyun CRYPTO_RSA3072 | CRYPTO_RSA4096);
553*4882a593Smuzhiyun #endif
554*4882a593Smuzhiyun
555*4882a593Smuzhiyun return capability & (~mask);
556*4882a593Smuzhiyun }
557*4882a593Smuzhiyun
rockchip_crypto_sha_init(struct udevice * dev,sha_context * ctx)558*4882a593Smuzhiyun static int rockchip_crypto_sha_init(struct udevice *dev, sha_context *ctx)
559*4882a593Smuzhiyun {
560*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = dev_get_priv(dev);
561*4882a593Smuzhiyun struct rk_hash_ctx *hash_ctx = priv->hw_ctx;
562*4882a593Smuzhiyun int ret = 0;
563*4882a593Smuzhiyun
564*4882a593Smuzhiyun if (!ctx)
565*4882a593Smuzhiyun return -EINVAL;
566*4882a593Smuzhiyun
567*4882a593Smuzhiyun memset(hash_ctx, 0x00, sizeof(*hash_ctx));
568*4882a593Smuzhiyun
569*4882a593Smuzhiyun priv->length = 0;
570*4882a593Smuzhiyun
571*4882a593Smuzhiyun hash_ctx->hash_cache = crypto_hash_cache_alloc(rk_hash_direct_calc,
572*4882a593Smuzhiyun priv, ctx->length,
573*4882a593Smuzhiyun DATA_ADDR_ALIGN_SIZE,
574*4882a593Smuzhiyun DATA_LEN_ALIGN_SIZE);
575*4882a593Smuzhiyun if (!hash_ctx->hash_cache)
576*4882a593Smuzhiyun return -EFAULT;
577*4882a593Smuzhiyun
578*4882a593Smuzhiyun rk_crypto_enable_clk(dev);
579*4882a593Smuzhiyun ret = rk_hash_init(hash_ctx, ctx->algo);
580*4882a593Smuzhiyun if (ret)
581*4882a593Smuzhiyun rk_crypto_disable_clk(dev);
582*4882a593Smuzhiyun
583*4882a593Smuzhiyun return ret;
584*4882a593Smuzhiyun }
585*4882a593Smuzhiyun
rockchip_crypto_sha_update(struct udevice * dev,u32 * input,u32 len)586*4882a593Smuzhiyun static int rockchip_crypto_sha_update(struct udevice *dev,
587*4882a593Smuzhiyun u32 *input, u32 len)
588*4882a593Smuzhiyun {
589*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = dev_get_priv(dev);
590*4882a593Smuzhiyun int ret, i;
591*4882a593Smuzhiyun u8 *p;
592*4882a593Smuzhiyun
593*4882a593Smuzhiyun if (!len) {
594*4882a593Smuzhiyun ret = -EINVAL;
595*4882a593Smuzhiyun goto exit;
596*4882a593Smuzhiyun }
597*4882a593Smuzhiyun
598*4882a593Smuzhiyun p = (u8 *)input;
599*4882a593Smuzhiyun
600*4882a593Smuzhiyun for (i = 0; i < len / HASH_UPDATE_LIMIT; i++, p += HASH_UPDATE_LIMIT) {
601*4882a593Smuzhiyun ret = rk_hash_update(priv->hw_ctx, p, HASH_UPDATE_LIMIT);
602*4882a593Smuzhiyun if (ret)
603*4882a593Smuzhiyun goto exit;
604*4882a593Smuzhiyun }
605*4882a593Smuzhiyun
606*4882a593Smuzhiyun if (len % HASH_UPDATE_LIMIT)
607*4882a593Smuzhiyun ret = rk_hash_update(priv->hw_ctx, p, len % HASH_UPDATE_LIMIT);
608*4882a593Smuzhiyun
609*4882a593Smuzhiyun exit:
610*4882a593Smuzhiyun if (ret)
611*4882a593Smuzhiyun rk_crypto_disable_clk(dev);
612*4882a593Smuzhiyun
613*4882a593Smuzhiyun return ret;
614*4882a593Smuzhiyun }
615*4882a593Smuzhiyun
rockchip_crypto_sha_final(struct udevice * dev,sha_context * ctx,u8 * output)616*4882a593Smuzhiyun static int rockchip_crypto_sha_final(struct udevice *dev,
617*4882a593Smuzhiyun sha_context *ctx, u8 *output)
618*4882a593Smuzhiyun {
619*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = dev_get_priv(dev);
620*4882a593Smuzhiyun u32 nbits;
621*4882a593Smuzhiyun int ret;
622*4882a593Smuzhiyun
623*4882a593Smuzhiyun nbits = crypto_algo_nbits(ctx->algo);
624*4882a593Smuzhiyun
625*4882a593Smuzhiyun if (priv->length != ctx->length) {
626*4882a593Smuzhiyun printf("total length(0x%08x) != init length(0x%08x)!\n",
627*4882a593Smuzhiyun priv->length, ctx->length);
628*4882a593Smuzhiyun ret = -EIO;
629*4882a593Smuzhiyun goto exit;
630*4882a593Smuzhiyun }
631*4882a593Smuzhiyun
632*4882a593Smuzhiyun ret = rk_hash_final(priv->hw_ctx, (u8 *)output, BITS2BYTE(nbits));
633*4882a593Smuzhiyun
634*4882a593Smuzhiyun exit:
635*4882a593Smuzhiyun hw_hash_clean_ctx(priv->hw_ctx);
636*4882a593Smuzhiyun rk_crypto_disable_clk(dev);
637*4882a593Smuzhiyun
638*4882a593Smuzhiyun return ret;
639*4882a593Smuzhiyun }
640*4882a593Smuzhiyun
641*4882a593Smuzhiyun #if CONFIG_IS_ENABLED(ROCKCHIP_HMAC)
rk_hmac_init(void * hw_ctx,u32 algo,u8 * key,u32 key_len)642*4882a593Smuzhiyun int rk_hmac_init(void *hw_ctx, u32 algo, u8 *key, u32 key_len)
643*4882a593Smuzhiyun {
644*4882a593Smuzhiyun u32 reg_ctrl = 0;
645*4882a593Smuzhiyun int ret;
646*4882a593Smuzhiyun
647*4882a593Smuzhiyun if (!key || !key_len || key_len > 64)
648*4882a593Smuzhiyun return -EINVAL;
649*4882a593Smuzhiyun
650*4882a593Smuzhiyun clear_key_regs();
651*4882a593Smuzhiyun
652*4882a593Smuzhiyun write_key_reg(0, key, key_len);
653*4882a593Smuzhiyun
654*4882a593Smuzhiyun ret = rk_hash_init(hw_ctx, algo);
655*4882a593Smuzhiyun if (ret)
656*4882a593Smuzhiyun return ret;
657*4882a593Smuzhiyun
658*4882a593Smuzhiyun reg_ctrl = crypto_read(CRYPTO_HASH_CTL) | CRYPTO_HMAC_ENABLE;
659*4882a593Smuzhiyun crypto_write(reg_ctrl | CRYPTO_WRITE_MASK_ALL, CRYPTO_HASH_CTL);
660*4882a593Smuzhiyun
661*4882a593Smuzhiyun return ret;
662*4882a593Smuzhiyun }
663*4882a593Smuzhiyun
rockchip_crypto_hmac_init(struct udevice * dev,sha_context * ctx,u8 * key,u32 key_len)664*4882a593Smuzhiyun static int rockchip_crypto_hmac_init(struct udevice *dev,
665*4882a593Smuzhiyun sha_context *ctx, u8 *key, u32 key_len)
666*4882a593Smuzhiyun {
667*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = dev_get_priv(dev);
668*4882a593Smuzhiyun struct rk_hash_ctx *hash_ctx = priv->hw_ctx;
669*4882a593Smuzhiyun int ret = 0;
670*4882a593Smuzhiyun
671*4882a593Smuzhiyun if (!ctx)
672*4882a593Smuzhiyun return -EINVAL;
673*4882a593Smuzhiyun
674*4882a593Smuzhiyun memset(hash_ctx, 0x00, sizeof(*hash_ctx));
675*4882a593Smuzhiyun
676*4882a593Smuzhiyun priv->length = 0;
677*4882a593Smuzhiyun
678*4882a593Smuzhiyun hash_ctx->hash_cache = crypto_hash_cache_alloc(rk_hash_direct_calc,
679*4882a593Smuzhiyun priv, ctx->length,
680*4882a593Smuzhiyun DATA_ADDR_ALIGN_SIZE,
681*4882a593Smuzhiyun DATA_LEN_ALIGN_SIZE);
682*4882a593Smuzhiyun if (!hash_ctx->hash_cache)
683*4882a593Smuzhiyun return -EFAULT;
684*4882a593Smuzhiyun
685*4882a593Smuzhiyun rk_crypto_enable_clk(dev);
686*4882a593Smuzhiyun ret = rk_hmac_init(priv->hw_ctx, ctx->algo, key, key_len);
687*4882a593Smuzhiyun if (ret)
688*4882a593Smuzhiyun rk_crypto_disable_clk(dev);
689*4882a593Smuzhiyun
690*4882a593Smuzhiyun return ret;
691*4882a593Smuzhiyun }
692*4882a593Smuzhiyun
rockchip_crypto_hmac_update(struct udevice * dev,u32 * input,u32 len)693*4882a593Smuzhiyun static int rockchip_crypto_hmac_update(struct udevice *dev,
694*4882a593Smuzhiyun u32 *input, u32 len)
695*4882a593Smuzhiyun {
696*4882a593Smuzhiyun return rockchip_crypto_sha_update(dev, input, len);
697*4882a593Smuzhiyun }
698*4882a593Smuzhiyun
rockchip_crypto_hmac_final(struct udevice * dev,sha_context * ctx,u8 * output)699*4882a593Smuzhiyun static int rockchip_crypto_hmac_final(struct udevice *dev,
700*4882a593Smuzhiyun sha_context *ctx, u8 *output)
701*4882a593Smuzhiyun {
702*4882a593Smuzhiyun return rockchip_crypto_sha_final(dev, ctx, output);
703*4882a593Smuzhiyun }
704*4882a593Smuzhiyun
705*4882a593Smuzhiyun #endif
706*4882a593Smuzhiyun
707*4882a593Smuzhiyun #if CONFIG_IS_ENABLED(ROCKCHIP_CIPHER)
708*4882a593Smuzhiyun static u8 g_key_chn;
709*4882a593Smuzhiyun
710*4882a593Smuzhiyun static const u32 rk_mode2bc_mode[RK_MODE_MAX] = {
711*4882a593Smuzhiyun [RK_MODE_ECB] = CRYPTO_BC_ECB,
712*4882a593Smuzhiyun [RK_MODE_CBC] = CRYPTO_BC_CBC,
713*4882a593Smuzhiyun [RK_MODE_CTS] = CRYPTO_BC_CTS,
714*4882a593Smuzhiyun [RK_MODE_CTR] = CRYPTO_BC_CTR,
715*4882a593Smuzhiyun [RK_MODE_CFB] = CRYPTO_BC_CFB,
716*4882a593Smuzhiyun [RK_MODE_OFB] = CRYPTO_BC_OFB,
717*4882a593Smuzhiyun [RK_MODE_XTS] = CRYPTO_BC_XTS,
718*4882a593Smuzhiyun [RK_MODE_CCM] = CRYPTO_BC_CCM,
719*4882a593Smuzhiyun [RK_MODE_GCM] = CRYPTO_BC_GCM,
720*4882a593Smuzhiyun [RK_MODE_CMAC] = CRYPTO_BC_CMAC,
721*4882a593Smuzhiyun [RK_MODE_CBC_MAC] = CRYPTO_BC_CBC_MAC,
722*4882a593Smuzhiyun };
723*4882a593Smuzhiyun
set_pc_len_reg(u32 chn,u64 pc_len)724*4882a593Smuzhiyun static inline void set_pc_len_reg(u32 chn, u64 pc_len)
725*4882a593Smuzhiyun {
726*4882a593Smuzhiyun u32 chn_base = CRYPTO_CH0_PC_LEN_0 + chn * 0x08;
727*4882a593Smuzhiyun
728*4882a593Smuzhiyun crypto_write(pc_len & 0xffffffff, chn_base);
729*4882a593Smuzhiyun crypto_write(pc_len >> 32, chn_base + 4);
730*4882a593Smuzhiyun }
731*4882a593Smuzhiyun
set_aad_len_reg(u32 chn,u64 pc_len)732*4882a593Smuzhiyun static inline void set_aad_len_reg(u32 chn, u64 pc_len)
733*4882a593Smuzhiyun {
734*4882a593Smuzhiyun u32 chn_base = CRYPTO_CH0_AAD_LEN_0 + chn * 0x08;
735*4882a593Smuzhiyun
736*4882a593Smuzhiyun crypto_write(pc_len & 0xffffffff, chn_base);
737*4882a593Smuzhiyun crypto_write(pc_len >> 32, chn_base + 4);
738*4882a593Smuzhiyun }
739*4882a593Smuzhiyun
is_des_mode(u32 rk_mode)740*4882a593Smuzhiyun static inline bool is_des_mode(u32 rk_mode)
741*4882a593Smuzhiyun {
742*4882a593Smuzhiyun return (rk_mode == RK_MODE_ECB ||
743*4882a593Smuzhiyun rk_mode == RK_MODE_CBC ||
744*4882a593Smuzhiyun rk_mode == RK_MODE_CFB ||
745*4882a593Smuzhiyun rk_mode == RK_MODE_OFB);
746*4882a593Smuzhiyun }
747*4882a593Smuzhiyun
dump_crypto_state(struct crypto_lli_desc * desc,u32 tmp,u32 expt_int,const u8 * in,const u8 * out,u32 len,int ret)748*4882a593Smuzhiyun static void dump_crypto_state(struct crypto_lli_desc *desc,
749*4882a593Smuzhiyun u32 tmp, u32 expt_int,
750*4882a593Smuzhiyun const u8 *in, const u8 *out,
751*4882a593Smuzhiyun u32 len, int ret)
752*4882a593Smuzhiyun {
753*4882a593Smuzhiyun IMSG("%s\n", ret == -ETIME ? "timeout" : "dismatch");
754*4882a593Smuzhiyun
755*4882a593Smuzhiyun IMSG("CRYPTO_DMA_INT_ST = %08x, expect_int = %08x\n",
756*4882a593Smuzhiyun tmp, expt_int);
757*4882a593Smuzhiyun IMSG("data desc = %p\n", desc);
758*4882a593Smuzhiyun IMSG("\taddr_in = [%08x <=> %08x]\n",
759*4882a593Smuzhiyun desc->src_addr, (u32)virt_to_phys(in));
760*4882a593Smuzhiyun IMSG("\taddr_out = [%08x <=> %08x]\n",
761*4882a593Smuzhiyun desc->dst_addr, (u32)virt_to_phys(out));
762*4882a593Smuzhiyun IMSG("\tsrc_len = [%08x <=> %08x]\n",
763*4882a593Smuzhiyun desc->src_len, (u32)len);
764*4882a593Smuzhiyun IMSG("\tdst_len = %08x\n", desc->dst_len);
765*4882a593Smuzhiyun IMSG("\tdma_ctl = %08x\n", desc->dma_ctrl);
766*4882a593Smuzhiyun IMSG("\tuser_define = %08x\n", desc->user_define);
767*4882a593Smuzhiyun
768*4882a593Smuzhiyun IMSG("\n\nDMA CRYPTO_DMA_LLI_ADDR status = %08x\n",
769*4882a593Smuzhiyun crypto_read(CRYPTO_DMA_LLI_ADDR));
770*4882a593Smuzhiyun IMSG("DMA CRYPTO_DMA_ST status = %08x\n",
771*4882a593Smuzhiyun crypto_read(CRYPTO_DMA_ST));
772*4882a593Smuzhiyun IMSG("DMA CRYPTO_DMA_STATE status = %08x\n",
773*4882a593Smuzhiyun crypto_read(CRYPTO_DMA_STATE));
774*4882a593Smuzhiyun IMSG("DMA CRYPTO_DMA_LLI_RADDR status = %08x\n",
775*4882a593Smuzhiyun crypto_read(CRYPTO_DMA_LLI_RADDR));
776*4882a593Smuzhiyun IMSG("DMA CRYPTO_DMA_SRC_RADDR status = %08x\n",
777*4882a593Smuzhiyun crypto_read(CRYPTO_DMA_SRC_RADDR));
778*4882a593Smuzhiyun IMSG("DMA CRYPTO_DMA_DST_RADDR status = %08x\n",
779*4882a593Smuzhiyun crypto_read(CRYPTO_DMA_DST_RADDR));
780*4882a593Smuzhiyun IMSG("DMA CRYPTO_CIPHER_ST status = %08x\n",
781*4882a593Smuzhiyun crypto_read(CRYPTO_CIPHER_ST));
782*4882a593Smuzhiyun IMSG("DMA CRYPTO_CIPHER_STATE status = %08x\n",
783*4882a593Smuzhiyun crypto_read(CRYPTO_CIPHER_STATE));
784*4882a593Smuzhiyun IMSG("DMA CRYPTO_TAG_VALID status = %08x\n",
785*4882a593Smuzhiyun crypto_read(CRYPTO_TAG_VALID));
786*4882a593Smuzhiyun IMSG("LOCKSTEP status = %08x\n\n",
787*4882a593Smuzhiyun crypto_read(0x618));
788*4882a593Smuzhiyun
789*4882a593Smuzhiyun IMSG("dst %dbyte not transferred\n",
790*4882a593Smuzhiyun desc->dst_addr + desc->dst_len -
791*4882a593Smuzhiyun crypto_read(CRYPTO_DMA_DST_RADDR));
792*4882a593Smuzhiyun }
793*4882a593Smuzhiyun
ccm128_set_iv_reg(u32 chn,const u8 * nonce,u32 nlen)794*4882a593Smuzhiyun static int ccm128_set_iv_reg(u32 chn, const u8 *nonce, u32 nlen)
795*4882a593Smuzhiyun {
796*4882a593Smuzhiyun u8 iv_buf[AES_BLOCK_SIZE];
797*4882a593Smuzhiyun u32 L;
798*4882a593Smuzhiyun
799*4882a593Smuzhiyun memset(iv_buf, 0x00, sizeof(iv_buf));
800*4882a593Smuzhiyun
801*4882a593Smuzhiyun L = 15 - nlen;
802*4882a593Smuzhiyun iv_buf[0] = ((u8)(L - 1) & 7);
803*4882a593Smuzhiyun
804*4882a593Smuzhiyun /* the L parameter */
805*4882a593Smuzhiyun L = iv_buf[0] & 7;
806*4882a593Smuzhiyun
807*4882a593Smuzhiyun /* nonce is too short */
808*4882a593Smuzhiyun if (nlen < (14 - L))
809*4882a593Smuzhiyun return -EINVAL;
810*4882a593Smuzhiyun
811*4882a593Smuzhiyun /* clear aad flag */
812*4882a593Smuzhiyun iv_buf[0] &= ~0x40;
813*4882a593Smuzhiyun memcpy(&iv_buf[1], nonce, 14 - L);
814*4882a593Smuzhiyun
815*4882a593Smuzhiyun set_iv_reg(chn, iv_buf, AES_BLOCK_SIZE);
816*4882a593Smuzhiyun
817*4882a593Smuzhiyun return 0;
818*4882a593Smuzhiyun }
819*4882a593Smuzhiyun
ccm_aad_padding(u32 aad_len,u8 * padding,u32 * padding_size)820*4882a593Smuzhiyun static void ccm_aad_padding(u32 aad_len, u8 *padding, u32 *padding_size)
821*4882a593Smuzhiyun {
822*4882a593Smuzhiyun u32 i;
823*4882a593Smuzhiyun
824*4882a593Smuzhiyun if (aad_len == 0) {
825*4882a593Smuzhiyun *padding_size = 0;
826*4882a593Smuzhiyun return;
827*4882a593Smuzhiyun }
828*4882a593Smuzhiyun
829*4882a593Smuzhiyun i = aad_len < (0x10000 - 0x100) ? 2 : 6;
830*4882a593Smuzhiyun
831*4882a593Smuzhiyun if (i == 2) {
832*4882a593Smuzhiyun padding[0] = (u8)(aad_len >> 8);
833*4882a593Smuzhiyun padding[1] = (u8)aad_len;
834*4882a593Smuzhiyun } else {
835*4882a593Smuzhiyun padding[0] = 0xFF;
836*4882a593Smuzhiyun padding[1] = 0xFE;
837*4882a593Smuzhiyun padding[2] = (u8)(aad_len >> 24);
838*4882a593Smuzhiyun padding[3] = (u8)(aad_len >> 16);
839*4882a593Smuzhiyun padding[4] = (u8)(aad_len >> 8);
840*4882a593Smuzhiyun }
841*4882a593Smuzhiyun
842*4882a593Smuzhiyun *padding_size = i;
843*4882a593Smuzhiyun }
844*4882a593Smuzhiyun
ccm_compose_aad_iv(u8 * aad_iv,u32 data_len,u32 aad_len,u32 tag_size)845*4882a593Smuzhiyun static int ccm_compose_aad_iv(u8 *aad_iv, u32 data_len, u32 aad_len, u32 tag_size)
846*4882a593Smuzhiyun {
847*4882a593Smuzhiyun aad_iv[0] |= ((u8)(((tag_size - 2) / 2) & 7) << 3);
848*4882a593Smuzhiyun
849*4882a593Smuzhiyun aad_iv[12] = (u8)(data_len >> 24);
850*4882a593Smuzhiyun aad_iv[13] = (u8)(data_len >> 16);
851*4882a593Smuzhiyun aad_iv[14] = (u8)(data_len >> 8);
852*4882a593Smuzhiyun aad_iv[15] = (u8)data_len;
853*4882a593Smuzhiyun
854*4882a593Smuzhiyun if (aad_len)
855*4882a593Smuzhiyun aad_iv[0] |= 0x40; //set aad flag
856*4882a593Smuzhiyun
857*4882a593Smuzhiyun return 0;
858*4882a593Smuzhiyun }
859*4882a593Smuzhiyun
hw_cipher_init(u32 chn,const u8 * key,const u8 * twk_key,u32 key_len,const u8 * iv,u32 iv_len,u32 algo,u32 mode,bool enc)860*4882a593Smuzhiyun static int hw_cipher_init(u32 chn, const u8 *key, const u8 *twk_key,
861*4882a593Smuzhiyun u32 key_len, const u8 *iv, u32 iv_len,
862*4882a593Smuzhiyun u32 algo, u32 mode, bool enc)
863*4882a593Smuzhiyun {
864*4882a593Smuzhiyun u32 rk_mode = RK_GET_RK_MODE(mode);
865*4882a593Smuzhiyun u32 key_chn_sel = chn;
866*4882a593Smuzhiyun u32 reg_ctrl = 0;
867*4882a593Smuzhiyun
868*4882a593Smuzhiyun IMSG("%s: key addr is %p, key_len is %d, iv addr is %p",
869*4882a593Smuzhiyun __func__, key, key_len, iv);
870*4882a593Smuzhiyun if (rk_mode >= RK_MODE_MAX)
871*4882a593Smuzhiyun return -EINVAL;
872*4882a593Smuzhiyun
873*4882a593Smuzhiyun switch (algo) {
874*4882a593Smuzhiyun case CRYPTO_DES:
875*4882a593Smuzhiyun if (key_len > DES_BLOCK_SIZE)
876*4882a593Smuzhiyun reg_ctrl |= CRYPTO_BC_TDES;
877*4882a593Smuzhiyun else
878*4882a593Smuzhiyun reg_ctrl |= CRYPTO_BC_DES;
879*4882a593Smuzhiyun break;
880*4882a593Smuzhiyun case CRYPTO_AES:
881*4882a593Smuzhiyun reg_ctrl |= CRYPTO_BC_AES;
882*4882a593Smuzhiyun break;
883*4882a593Smuzhiyun case CRYPTO_SM4:
884*4882a593Smuzhiyun reg_ctrl |= CRYPTO_BC_SM4;
885*4882a593Smuzhiyun break;
886*4882a593Smuzhiyun default:
887*4882a593Smuzhiyun return -EINVAL;
888*4882a593Smuzhiyun }
889*4882a593Smuzhiyun
890*4882a593Smuzhiyun if (algo == CRYPTO_AES || algo == CRYPTO_SM4) {
891*4882a593Smuzhiyun switch (key_len) {
892*4882a593Smuzhiyun case AES_KEYSIZE_128:
893*4882a593Smuzhiyun reg_ctrl |= CRYPTO_BC_128_bit_key;
894*4882a593Smuzhiyun break;
895*4882a593Smuzhiyun case AES_KEYSIZE_192:
896*4882a593Smuzhiyun reg_ctrl |= CRYPTO_BC_192_bit_key;
897*4882a593Smuzhiyun break;
898*4882a593Smuzhiyun case AES_KEYSIZE_256:
899*4882a593Smuzhiyun reg_ctrl |= CRYPTO_BC_256_bit_key;
900*4882a593Smuzhiyun break;
901*4882a593Smuzhiyun default:
902*4882a593Smuzhiyun return -EINVAL;
903*4882a593Smuzhiyun }
904*4882a593Smuzhiyun }
905*4882a593Smuzhiyun
906*4882a593Smuzhiyun reg_ctrl |= rk_mode2bc_mode[rk_mode];
907*4882a593Smuzhiyun if (!enc)
908*4882a593Smuzhiyun reg_ctrl |= CRYPTO_BC_DECRYPT;
909*4882a593Smuzhiyun
910*4882a593Smuzhiyun /* write key data to reg */
911*4882a593Smuzhiyun write_key_reg(key_chn_sel, key, key_len);
912*4882a593Smuzhiyun
913*4882a593Smuzhiyun /* write twk key for xts mode */
914*4882a593Smuzhiyun if (rk_mode == RK_MODE_XTS)
915*4882a593Smuzhiyun write_key_reg(key_chn_sel + 4, twk_key, key_len);
916*4882a593Smuzhiyun
917*4882a593Smuzhiyun /* set iv reg */
918*4882a593Smuzhiyun if (rk_mode == RK_MODE_CCM)
919*4882a593Smuzhiyun ccm128_set_iv_reg(chn, iv, iv_len);
920*4882a593Smuzhiyun else
921*4882a593Smuzhiyun set_iv_reg(chn, iv, iv_len);
922*4882a593Smuzhiyun
923*4882a593Smuzhiyun /* din_swap set 1, dout_swap set 1, default 1. */
924*4882a593Smuzhiyun crypto_write(0x00030003, CRYPTO_FIFO_CTL);
925*4882a593Smuzhiyun crypto_write(0, CRYPTO_DMA_INT_EN);
926*4882a593Smuzhiyun
927*4882a593Smuzhiyun crypto_write(reg_ctrl | CRYPTO_WRITE_MASK_ALL, CRYPTO_BC_CTL);
928*4882a593Smuzhiyun
929*4882a593Smuzhiyun return 0;
930*4882a593Smuzhiyun }
931*4882a593Smuzhiyun
hw_cipher_crypt(const u8 * in,u8 * out,u64 len,const u8 * aad,u32 aad_len,u8 * tag,u32 tag_len,u32 mode)932*4882a593Smuzhiyun static int hw_cipher_crypt(const u8 *in, u8 *out, u64 len,
933*4882a593Smuzhiyun const u8 *aad, u32 aad_len,
934*4882a593Smuzhiyun u8 *tag, u32 tag_len, u32 mode)
935*4882a593Smuzhiyun {
936*4882a593Smuzhiyun struct crypto_lli_desc *data_desc = NULL, *aad_desc = NULL;
937*4882a593Smuzhiyun u8 *dma_in = NULL, *dma_out = NULL, *aad_tmp = NULL;
938*4882a593Smuzhiyun u32 rk_mode = RK_GET_RK_MODE(mode);
939*4882a593Smuzhiyun u32 reg_ctrl = 0, tmp_len = 0;
940*4882a593Smuzhiyun u32 expt_int = 0, mask = 0;
941*4882a593Smuzhiyun u32 key_chn = g_key_chn;
942*4882a593Smuzhiyun u32 tmp, dst_len = 0;
943*4882a593Smuzhiyun int ret = -1;
944*4882a593Smuzhiyun
945*4882a593Smuzhiyun if (rk_mode == RK_MODE_CTS && len <= AES_BLOCK_SIZE) {
946*4882a593Smuzhiyun printf("CTS mode length %u < 16Byte\n", (u32)len);
947*4882a593Smuzhiyun return -EINVAL;
948*4882a593Smuzhiyun }
949*4882a593Smuzhiyun
950*4882a593Smuzhiyun tmp_len = (rk_mode == RK_MODE_CTR) ? ROUNDUP(len, AES_BLOCK_SIZE) : len;
951*4882a593Smuzhiyun
952*4882a593Smuzhiyun data_desc = align_malloc(sizeof(*data_desc), LLI_ADDR_ALIGN_SIZE);
953*4882a593Smuzhiyun if (!data_desc)
954*4882a593Smuzhiyun goto exit;
955*4882a593Smuzhiyun
956*4882a593Smuzhiyun if (IS_ALIGNED((ulong)in, DATA_ADDR_ALIGN_SIZE) && tmp_len == len)
957*4882a593Smuzhiyun dma_in = (void *)in;
958*4882a593Smuzhiyun else
959*4882a593Smuzhiyun dma_in = align_malloc(tmp_len, DATA_ADDR_ALIGN_SIZE);
960*4882a593Smuzhiyun if (!dma_in)
961*4882a593Smuzhiyun goto exit;
962*4882a593Smuzhiyun
963*4882a593Smuzhiyun if (out) {
964*4882a593Smuzhiyun if (IS_ALIGNED((ulong)out, DATA_ADDR_ALIGN_SIZE) &&
965*4882a593Smuzhiyun tmp_len == len)
966*4882a593Smuzhiyun dma_out = out;
967*4882a593Smuzhiyun else
968*4882a593Smuzhiyun dma_out = align_malloc(tmp_len, DATA_ADDR_ALIGN_SIZE);
969*4882a593Smuzhiyun if (!dma_out)
970*4882a593Smuzhiyun goto exit;
971*4882a593Smuzhiyun dst_len = tmp_len;
972*4882a593Smuzhiyun }
973*4882a593Smuzhiyun
974*4882a593Smuzhiyun memset(data_desc, 0x00, sizeof(*data_desc));
975*4882a593Smuzhiyun if (dma_in != in)
976*4882a593Smuzhiyun memcpy(dma_in, in, len);
977*4882a593Smuzhiyun
978*4882a593Smuzhiyun data_desc->src_addr = (u32)virt_to_phys(dma_in);
979*4882a593Smuzhiyun data_desc->src_len = tmp_len;
980*4882a593Smuzhiyun data_desc->dst_addr = (u32)virt_to_phys(dma_out);
981*4882a593Smuzhiyun data_desc->dst_len = dst_len;
982*4882a593Smuzhiyun data_desc->dma_ctrl = LLI_DMA_CTRL_LAST;
983*4882a593Smuzhiyun
984*4882a593Smuzhiyun if (IS_MAC_MODE(rk_mode)) {
985*4882a593Smuzhiyun expt_int = CRYPTO_LIST_DONE_INT_ST;
986*4882a593Smuzhiyun data_desc->dma_ctrl |= LLI_DMA_CTRL_LIST_DONE;
987*4882a593Smuzhiyun } else {
988*4882a593Smuzhiyun expt_int = CRYPTO_DST_ITEM_DONE_INT_ST;
989*4882a593Smuzhiyun data_desc->dma_ctrl |= LLI_DMA_CTRL_DST_DONE;
990*4882a593Smuzhiyun }
991*4882a593Smuzhiyun
992*4882a593Smuzhiyun data_desc->user_define = LLI_USER_CIPHER_START |
993*4882a593Smuzhiyun LLI_USER_STRING_START |
994*4882a593Smuzhiyun LLI_USER_STRING_LAST |
995*4882a593Smuzhiyun (key_chn << 4);
996*4882a593Smuzhiyun crypto_write((u32)virt_to_phys(data_desc), CRYPTO_DMA_LLI_ADDR);
997*4882a593Smuzhiyun
998*4882a593Smuzhiyun if (rk_mode == RK_MODE_CCM || rk_mode == RK_MODE_GCM) {
999*4882a593Smuzhiyun u32 aad_tmp_len = 0;
1000*4882a593Smuzhiyun
1001*4882a593Smuzhiyun aad_desc = align_malloc(sizeof(*aad_desc), LLI_ADDR_ALIGN_SIZE);
1002*4882a593Smuzhiyun if (!aad_desc)
1003*4882a593Smuzhiyun goto exit;
1004*4882a593Smuzhiyun
1005*4882a593Smuzhiyun memset(aad_desc, 0x00, sizeof(*aad_desc));
1006*4882a593Smuzhiyun aad_desc->next_addr = (u32)virt_to_phys(data_desc);
1007*4882a593Smuzhiyun aad_desc->user_define = LLI_USER_CIPHER_START |
1008*4882a593Smuzhiyun LLI_USER_STRING_START |
1009*4882a593Smuzhiyun LLI_USER_STRING_LAST |
1010*4882a593Smuzhiyun LLI_USER_STRING_AAD |
1011*4882a593Smuzhiyun (key_chn << 4);
1012*4882a593Smuzhiyun
1013*4882a593Smuzhiyun if (rk_mode == RK_MODE_CCM) {
1014*4882a593Smuzhiyun u8 padding[AES_BLOCK_SIZE];
1015*4882a593Smuzhiyun u32 padding_size = 0;
1016*4882a593Smuzhiyun
1017*4882a593Smuzhiyun memset(padding, 0x00, sizeof(padding));
1018*4882a593Smuzhiyun ccm_aad_padding(aad_len, padding, &padding_size);
1019*4882a593Smuzhiyun
1020*4882a593Smuzhiyun aad_tmp_len = aad_len + AES_BLOCK_SIZE + padding_size;
1021*4882a593Smuzhiyun aad_tmp_len = ROUNDUP(aad_tmp_len, AES_BLOCK_SIZE);
1022*4882a593Smuzhiyun aad_tmp = align_malloc(aad_tmp_len,
1023*4882a593Smuzhiyun DATA_ADDR_ALIGN_SIZE);
1024*4882a593Smuzhiyun if (!aad_tmp)
1025*4882a593Smuzhiyun goto exit;
1026*4882a593Smuzhiyun
1027*4882a593Smuzhiyun /* clear last block */
1028*4882a593Smuzhiyun memset(aad_tmp + aad_tmp_len - AES_BLOCK_SIZE,
1029*4882a593Smuzhiyun 0x00, AES_BLOCK_SIZE);
1030*4882a593Smuzhiyun
1031*4882a593Smuzhiyun /* read iv data from reg */
1032*4882a593Smuzhiyun get_iv_reg(key_chn, aad_tmp, AES_BLOCK_SIZE);
1033*4882a593Smuzhiyun ccm_compose_aad_iv(aad_tmp, tmp_len, aad_len, tag_len);
1034*4882a593Smuzhiyun memcpy(aad_tmp + AES_BLOCK_SIZE, padding, padding_size);
1035*4882a593Smuzhiyun
1036*4882a593Smuzhiyun memcpy(aad_tmp + AES_BLOCK_SIZE + padding_size,
1037*4882a593Smuzhiyun aad, aad_len);
1038*4882a593Smuzhiyun } else {
1039*4882a593Smuzhiyun aad_tmp_len = aad_len;
1040*4882a593Smuzhiyun if (IS_ALIGNED((ulong)aad, DATA_ADDR_ALIGN_SIZE)) {
1041*4882a593Smuzhiyun aad_tmp = (void *)aad;
1042*4882a593Smuzhiyun } else {
1043*4882a593Smuzhiyun aad_tmp = align_malloc(aad_tmp_len,
1044*4882a593Smuzhiyun DATA_ADDR_ALIGN_SIZE);
1045*4882a593Smuzhiyun if (!aad_tmp)
1046*4882a593Smuzhiyun goto exit;
1047*4882a593Smuzhiyun
1048*4882a593Smuzhiyun memcpy(aad_tmp, aad, aad_tmp_len);
1049*4882a593Smuzhiyun }
1050*4882a593Smuzhiyun
1051*4882a593Smuzhiyun set_aad_len_reg(key_chn, aad_tmp_len);
1052*4882a593Smuzhiyun set_pc_len_reg(key_chn, tmp_len);
1053*4882a593Smuzhiyun }
1054*4882a593Smuzhiyun
1055*4882a593Smuzhiyun aad_desc->src_addr = (u32)virt_to_phys(aad_tmp);
1056*4882a593Smuzhiyun aad_desc->src_len = aad_tmp_len;
1057*4882a593Smuzhiyun
1058*4882a593Smuzhiyun if (aad_tmp_len) {
1059*4882a593Smuzhiyun data_desc->user_define = LLI_USER_STRING_START |
1060*4882a593Smuzhiyun LLI_USER_STRING_LAST |
1061*4882a593Smuzhiyun (key_chn << 4);
1062*4882a593Smuzhiyun crypto_write((u32)virt_to_phys(aad_desc), CRYPTO_DMA_LLI_ADDR);
1063*4882a593Smuzhiyun cache_op_inner(DCACHE_AREA_CLEAN, aad_tmp, aad_tmp_len);
1064*4882a593Smuzhiyun cache_op_inner(DCACHE_AREA_CLEAN, aad_desc, sizeof(*aad_desc));
1065*4882a593Smuzhiyun }
1066*4882a593Smuzhiyun }
1067*4882a593Smuzhiyun
1068*4882a593Smuzhiyun cache_op_inner(DCACHE_AREA_CLEAN, data_desc, sizeof(*data_desc));
1069*4882a593Smuzhiyun cache_op_inner(DCACHE_AREA_CLEAN, dma_in, tmp_len);
1070*4882a593Smuzhiyun cache_op_inner(DCACHE_AREA_INVALIDATE, dma_out, tmp_len);
1071*4882a593Smuzhiyun
1072*4882a593Smuzhiyun /* din_swap set 1, dout_swap set 1, default 1. */
1073*4882a593Smuzhiyun crypto_write(0x00030003, CRYPTO_FIFO_CTL);
1074*4882a593Smuzhiyun crypto_write(0, CRYPTO_DMA_INT_EN);
1075*4882a593Smuzhiyun
1076*4882a593Smuzhiyun reg_ctrl = crypto_read(CRYPTO_BC_CTL) | CRYPTO_BC_ENABLE;
1077*4882a593Smuzhiyun crypto_write(reg_ctrl | CRYPTO_WRITE_MASK_ALL, CRYPTO_BC_CTL);
1078*4882a593Smuzhiyun crypto_write(0x00010001, CRYPTO_DMA_CTL);//start
1079*4882a593Smuzhiyun
1080*4882a593Smuzhiyun mask = ~(mask | CRYPTO_SYNC_LOCKSTEP_INT_ST);
1081*4882a593Smuzhiyun
1082*4882a593Smuzhiyun /* wait calc ok */
1083*4882a593Smuzhiyun ret = RK_POLL_TIMEOUT(!(crypto_read(CRYPTO_DMA_INT_ST) & mask),
1084*4882a593Smuzhiyun RK_CRYPTO_TIMEOUT);
1085*4882a593Smuzhiyun tmp = crypto_read(CRYPTO_DMA_INT_ST);
1086*4882a593Smuzhiyun crypto_write(tmp, CRYPTO_DMA_INT_ST);
1087*4882a593Smuzhiyun
1088*4882a593Smuzhiyun if ((tmp & mask) == expt_int) {
1089*4882a593Smuzhiyun if (out && out != dma_out)
1090*4882a593Smuzhiyun memcpy(out, dma_out, len);
1091*4882a593Smuzhiyun
1092*4882a593Smuzhiyun if (IS_NEED_TAG(rk_mode)) {
1093*4882a593Smuzhiyun ret = WAIT_TAG_VALID(key_chn, RK_CRYPTO_TIMEOUT);
1094*4882a593Smuzhiyun get_tag_from_reg(key_chn, tag, AES_BLOCK_SIZE);
1095*4882a593Smuzhiyun }
1096*4882a593Smuzhiyun } else {
1097*4882a593Smuzhiyun dump_crypto_state(data_desc, tmp, expt_int, in, out, len, ret);
1098*4882a593Smuzhiyun ret = -1;
1099*4882a593Smuzhiyun }
1100*4882a593Smuzhiyun
1101*4882a593Smuzhiyun exit:
1102*4882a593Smuzhiyun crypto_write(0xffff0000, CRYPTO_BC_CTL);//bc_ctl disable
1103*4882a593Smuzhiyun align_free(data_desc);
1104*4882a593Smuzhiyun align_free(aad_desc);
1105*4882a593Smuzhiyun if (dma_in != in)
1106*4882a593Smuzhiyun align_free(dma_in);
1107*4882a593Smuzhiyun if (out && dma_out != out)
1108*4882a593Smuzhiyun align_free(dma_out);
1109*4882a593Smuzhiyun if (aad && aad != aad_tmp)
1110*4882a593Smuzhiyun align_free(aad_tmp);
1111*4882a593Smuzhiyun
1112*4882a593Smuzhiyun return ret;
1113*4882a593Smuzhiyun }
1114*4882a593Smuzhiyun
hw_aes_init(u32 chn,const u8 * key,const u8 * twk_key,u32 key_len,const u8 * iv,u32 iv_len,u32 mode,bool enc)1115*4882a593Smuzhiyun static int hw_aes_init(u32 chn, const u8 *key, const u8 *twk_key, u32 key_len,
1116*4882a593Smuzhiyun const u8 *iv, u32 iv_len, u32 mode, bool enc)
1117*4882a593Smuzhiyun {
1118*4882a593Smuzhiyun u32 rk_mode = RK_GET_RK_MODE(mode);
1119*4882a593Smuzhiyun
1120*4882a593Smuzhiyun if (rk_mode > RK_MODE_XTS)
1121*4882a593Smuzhiyun return -EINVAL;
1122*4882a593Smuzhiyun
1123*4882a593Smuzhiyun if (iv_len > AES_BLOCK_SIZE)
1124*4882a593Smuzhiyun return -EINVAL;
1125*4882a593Smuzhiyun
1126*4882a593Smuzhiyun if (IS_NEED_IV(rk_mode)) {
1127*4882a593Smuzhiyun if (!iv || iv_len != AES_BLOCK_SIZE)
1128*4882a593Smuzhiyun return -EINVAL;
1129*4882a593Smuzhiyun } else {
1130*4882a593Smuzhiyun iv_len = 0;
1131*4882a593Smuzhiyun }
1132*4882a593Smuzhiyun
1133*4882a593Smuzhiyun if (rk_mode == RK_MODE_XTS) {
1134*4882a593Smuzhiyun if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_256)
1135*4882a593Smuzhiyun return -EINVAL;
1136*4882a593Smuzhiyun
1137*4882a593Smuzhiyun if (!key || !twk_key)
1138*4882a593Smuzhiyun return -EINVAL;
1139*4882a593Smuzhiyun } else {
1140*4882a593Smuzhiyun if (key_len != AES_KEYSIZE_128 &&
1141*4882a593Smuzhiyun key_len != AES_KEYSIZE_192 &&
1142*4882a593Smuzhiyun key_len != AES_KEYSIZE_256)
1143*4882a593Smuzhiyun return -EINVAL;
1144*4882a593Smuzhiyun }
1145*4882a593Smuzhiyun
1146*4882a593Smuzhiyun return hw_cipher_init(chn, key, twk_key, key_len, iv, iv_len,
1147*4882a593Smuzhiyun CRYPTO_AES, mode, enc);
1148*4882a593Smuzhiyun }
1149*4882a593Smuzhiyun
hw_sm4_init(u32 chn,const u8 * key,const u8 * twk_key,u32 key_len,const u8 * iv,u32 iv_len,u32 mode,bool enc)1150*4882a593Smuzhiyun static int hw_sm4_init(u32 chn, const u8 *key, const u8 *twk_key, u32 key_len,
1151*4882a593Smuzhiyun const u8 *iv, u32 iv_len, u32 mode, bool enc)
1152*4882a593Smuzhiyun {
1153*4882a593Smuzhiyun u32 rk_mode = RK_GET_RK_MODE(mode);
1154*4882a593Smuzhiyun
1155*4882a593Smuzhiyun if (rk_mode > RK_MODE_XTS)
1156*4882a593Smuzhiyun return -EINVAL;
1157*4882a593Smuzhiyun
1158*4882a593Smuzhiyun if (iv_len > SM4_BLOCK_SIZE || key_len != SM4_KEYSIZE)
1159*4882a593Smuzhiyun return -EINVAL;
1160*4882a593Smuzhiyun
1161*4882a593Smuzhiyun if (IS_NEED_IV(rk_mode)) {
1162*4882a593Smuzhiyun if (!iv || iv_len != SM4_BLOCK_SIZE)
1163*4882a593Smuzhiyun return -EINVAL;
1164*4882a593Smuzhiyun } else {
1165*4882a593Smuzhiyun iv_len = 0;
1166*4882a593Smuzhiyun }
1167*4882a593Smuzhiyun
1168*4882a593Smuzhiyun if (rk_mode == RK_MODE_XTS) {
1169*4882a593Smuzhiyun if (!key || !twk_key)
1170*4882a593Smuzhiyun return -EINVAL;
1171*4882a593Smuzhiyun }
1172*4882a593Smuzhiyun
1173*4882a593Smuzhiyun return hw_cipher_init(chn, key, twk_key, key_len, iv, iv_len,
1174*4882a593Smuzhiyun CRYPTO_SM4, mode, enc);
1175*4882a593Smuzhiyun }
1176*4882a593Smuzhiyun
rk_crypto_des(struct udevice * dev,u32 mode,const u8 * key,u32 key_len,const u8 * iv,const u8 * in,u8 * out,u32 len,bool enc)1177*4882a593Smuzhiyun int rk_crypto_des(struct udevice *dev, u32 mode, const u8 *key, u32 key_len,
1178*4882a593Smuzhiyun const u8 *iv, const u8 *in, u8 *out, u32 len, bool enc)
1179*4882a593Smuzhiyun {
1180*4882a593Smuzhiyun u32 rk_mode = RK_GET_RK_MODE(mode);
1181*4882a593Smuzhiyun u8 tmp_key[24];
1182*4882a593Smuzhiyun int ret;
1183*4882a593Smuzhiyun
1184*4882a593Smuzhiyun if (!is_des_mode(rk_mode))
1185*4882a593Smuzhiyun return -EINVAL;
1186*4882a593Smuzhiyun
1187*4882a593Smuzhiyun if (key_len == DES_BLOCK_SIZE || key_len == 3 * DES_BLOCK_SIZE) {
1188*4882a593Smuzhiyun memcpy(tmp_key, key, key_len);
1189*4882a593Smuzhiyun } else if (key_len == 2 * DES_BLOCK_SIZE) {
1190*4882a593Smuzhiyun memcpy(tmp_key, key, 16);
1191*4882a593Smuzhiyun memcpy(tmp_key + 16, key, 8);
1192*4882a593Smuzhiyun key_len = 3 * DES_BLOCK_SIZE;
1193*4882a593Smuzhiyun } else {
1194*4882a593Smuzhiyun return -EINVAL;
1195*4882a593Smuzhiyun }
1196*4882a593Smuzhiyun
1197*4882a593Smuzhiyun ret = hw_cipher_init(0, tmp_key, NULL, key_len, iv, DES_BLOCK_SIZE,
1198*4882a593Smuzhiyun CRYPTO_DES, mode, enc);
1199*4882a593Smuzhiyun if (ret)
1200*4882a593Smuzhiyun goto exit;
1201*4882a593Smuzhiyun
1202*4882a593Smuzhiyun ret = hw_cipher_crypt(in, out, len, NULL, 0,
1203*4882a593Smuzhiyun NULL, 0, mode);
1204*4882a593Smuzhiyun
1205*4882a593Smuzhiyun exit:
1206*4882a593Smuzhiyun return ret;
1207*4882a593Smuzhiyun }
1208*4882a593Smuzhiyun
rk_crypto_aes(struct udevice * dev,u32 mode,const u8 * key,const u8 * twk_key,u32 key_len,const u8 * iv,u32 iv_len,const u8 * in,u8 * out,u32 len,bool enc)1209*4882a593Smuzhiyun int rk_crypto_aes(struct udevice *dev, u32 mode,
1210*4882a593Smuzhiyun const u8 *key, const u8 *twk_key, u32 key_len,
1211*4882a593Smuzhiyun const u8 *iv, u32 iv_len,
1212*4882a593Smuzhiyun const u8 *in, u8 *out, u32 len, bool enc)
1213*4882a593Smuzhiyun {
1214*4882a593Smuzhiyun int ret;
1215*4882a593Smuzhiyun
1216*4882a593Smuzhiyun /* RV1126/RV1109 do not support aes-192 */
1217*4882a593Smuzhiyun #if defined(CONFIG_ROCKCHIP_RV1126)
1218*4882a593Smuzhiyun if (key_len == AES_KEYSIZE_192)
1219*4882a593Smuzhiyun return -EINVAL;
1220*4882a593Smuzhiyun #endif
1221*4882a593Smuzhiyun
1222*4882a593Smuzhiyun ret = hw_aes_init(0, key, twk_key, key_len, iv, iv_len, mode, enc);
1223*4882a593Smuzhiyun if (ret)
1224*4882a593Smuzhiyun return ret;
1225*4882a593Smuzhiyun
1226*4882a593Smuzhiyun return hw_cipher_crypt(in, out, len, NULL, 0,
1227*4882a593Smuzhiyun NULL, 0, mode);
1228*4882a593Smuzhiyun }
1229*4882a593Smuzhiyun
rk_crypto_sm4(struct udevice * dev,u32 mode,const u8 * key,const u8 * twk_key,u32 key_len,const u8 * iv,u32 iv_len,const u8 * in,u8 * out,u32 len,bool enc)1230*4882a593Smuzhiyun int rk_crypto_sm4(struct udevice *dev, u32 mode,
1231*4882a593Smuzhiyun const u8 *key, const u8 *twk_key, u32 key_len,
1232*4882a593Smuzhiyun const u8 *iv, u32 iv_len,
1233*4882a593Smuzhiyun const u8 *in, u8 *out, u32 len, bool enc)
1234*4882a593Smuzhiyun {
1235*4882a593Smuzhiyun int ret;
1236*4882a593Smuzhiyun
1237*4882a593Smuzhiyun ret = hw_sm4_init(0, key, twk_key, key_len, iv, iv_len, mode, enc);
1238*4882a593Smuzhiyun if (ret)
1239*4882a593Smuzhiyun return ret;
1240*4882a593Smuzhiyun
1241*4882a593Smuzhiyun return hw_cipher_crypt(in, out, len, NULL, 0, NULL, 0, mode);
1242*4882a593Smuzhiyun }
1243*4882a593Smuzhiyun
rockchip_crypto_cipher(struct udevice * dev,cipher_context * ctx,const u8 * in,u8 * out,u32 len,bool enc)1244*4882a593Smuzhiyun int rockchip_crypto_cipher(struct udevice *dev, cipher_context *ctx,
1245*4882a593Smuzhiyun const u8 *in, u8 *out, u32 len, bool enc)
1246*4882a593Smuzhiyun {
1247*4882a593Smuzhiyun int ret;
1248*4882a593Smuzhiyun
1249*4882a593Smuzhiyun rk_crypto_enable_clk(dev);
1250*4882a593Smuzhiyun
1251*4882a593Smuzhiyun switch (ctx->algo) {
1252*4882a593Smuzhiyun case CRYPTO_DES:
1253*4882a593Smuzhiyun ret = rk_crypto_des(dev, ctx->mode, ctx->key, ctx->key_len,
1254*4882a593Smuzhiyun ctx->iv, in, out, len, enc);
1255*4882a593Smuzhiyun case CRYPTO_AES:
1256*4882a593Smuzhiyun ret = rk_crypto_aes(dev, ctx->mode,
1257*4882a593Smuzhiyun ctx->key, ctx->twk_key, ctx->key_len,
1258*4882a593Smuzhiyun ctx->iv, ctx->iv_len, in, out, len, enc);
1259*4882a593Smuzhiyun case CRYPTO_SM4:
1260*4882a593Smuzhiyun ret = rk_crypto_sm4(dev, ctx->mode,
1261*4882a593Smuzhiyun ctx->key, ctx->twk_key, ctx->key_len,
1262*4882a593Smuzhiyun ctx->iv, ctx->iv_len, in, out, len, enc);
1263*4882a593Smuzhiyun default:
1264*4882a593Smuzhiyun ret = -EINVAL;
1265*4882a593Smuzhiyun }
1266*4882a593Smuzhiyun
1267*4882a593Smuzhiyun rk_crypto_disable_clk(dev);
1268*4882a593Smuzhiyun
1269*4882a593Smuzhiyun return ret;
1270*4882a593Smuzhiyun }
1271*4882a593Smuzhiyun
rk_crypto_mac(struct udevice * dev,u32 algo,u32 mode,const u8 * key,u32 key_len,const u8 * in,u32 len,u8 * tag)1272*4882a593Smuzhiyun int rk_crypto_mac(struct udevice *dev, u32 algo, u32 mode,
1273*4882a593Smuzhiyun const u8 *key, u32 key_len,
1274*4882a593Smuzhiyun const u8 *in, u32 len, u8 *tag)
1275*4882a593Smuzhiyun {
1276*4882a593Smuzhiyun u32 rk_mode = RK_GET_RK_MODE(mode);
1277*4882a593Smuzhiyun int ret;
1278*4882a593Smuzhiyun
1279*4882a593Smuzhiyun if (!IS_MAC_MODE(rk_mode))
1280*4882a593Smuzhiyun return -EINVAL;
1281*4882a593Smuzhiyun
1282*4882a593Smuzhiyun if (algo != CRYPTO_AES && algo != CRYPTO_SM4)
1283*4882a593Smuzhiyun return -EINVAL;
1284*4882a593Smuzhiyun
1285*4882a593Smuzhiyun /* RV1126/RV1109 do not support aes-192 */
1286*4882a593Smuzhiyun #if defined(CONFIG_ROCKCHIP_RV1126)
1287*4882a593Smuzhiyun if (algo == CRYPTO_AES && key_len == AES_KEYSIZE_192)
1288*4882a593Smuzhiyun return -EINVAL;
1289*4882a593Smuzhiyun #endif
1290*4882a593Smuzhiyun
1291*4882a593Smuzhiyun ret = hw_cipher_init(g_key_chn, key, NULL, key_len, NULL, 0,
1292*4882a593Smuzhiyun algo, mode, true);
1293*4882a593Smuzhiyun if (ret)
1294*4882a593Smuzhiyun return ret;
1295*4882a593Smuzhiyun
1296*4882a593Smuzhiyun return hw_cipher_crypt(in, NULL, len, NULL, 0,
1297*4882a593Smuzhiyun tag, AES_BLOCK_SIZE, mode);
1298*4882a593Smuzhiyun }
1299*4882a593Smuzhiyun
rockchip_crypto_mac(struct udevice * dev,cipher_context * ctx,const u8 * in,u32 len,u8 * tag)1300*4882a593Smuzhiyun int rockchip_crypto_mac(struct udevice *dev, cipher_context *ctx,
1301*4882a593Smuzhiyun const u8 *in, u32 len, u8 *tag)
1302*4882a593Smuzhiyun {
1303*4882a593Smuzhiyun int ret = 0;
1304*4882a593Smuzhiyun
1305*4882a593Smuzhiyun rk_crypto_enable_clk(dev);
1306*4882a593Smuzhiyun
1307*4882a593Smuzhiyun ret = rk_crypto_mac(dev, ctx->algo, ctx->mode,
1308*4882a593Smuzhiyun ctx->key, ctx->key_len, in, len, tag);
1309*4882a593Smuzhiyun
1310*4882a593Smuzhiyun rk_crypto_disable_clk(dev);
1311*4882a593Smuzhiyun
1312*4882a593Smuzhiyun return ret;
1313*4882a593Smuzhiyun }
1314*4882a593Smuzhiyun
rk_crypto_ae(struct udevice * dev,u32 algo,u32 mode,const u8 * key,u32 key_len,const u8 * nonce,u32 nonce_len,const u8 * in,u32 len,const u8 * aad,u32 aad_len,u8 * out,u8 * tag)1315*4882a593Smuzhiyun int rk_crypto_ae(struct udevice *dev, u32 algo, u32 mode,
1316*4882a593Smuzhiyun const u8 *key, u32 key_len, const u8 *nonce, u32 nonce_len,
1317*4882a593Smuzhiyun const u8 *in, u32 len, const u8 *aad, u32 aad_len,
1318*4882a593Smuzhiyun u8 *out, u8 *tag)
1319*4882a593Smuzhiyun {
1320*4882a593Smuzhiyun u32 rk_mode = RK_GET_RK_MODE(mode);
1321*4882a593Smuzhiyun int ret;
1322*4882a593Smuzhiyun
1323*4882a593Smuzhiyun if (!IS_AE_MODE(rk_mode))
1324*4882a593Smuzhiyun return -EINVAL;
1325*4882a593Smuzhiyun
1326*4882a593Smuzhiyun if (len == 0)
1327*4882a593Smuzhiyun return -EINVAL;
1328*4882a593Smuzhiyun
1329*4882a593Smuzhiyun if (algo != CRYPTO_AES && algo != CRYPTO_SM4)
1330*4882a593Smuzhiyun return -EINVAL;
1331*4882a593Smuzhiyun
1332*4882a593Smuzhiyun /* RV1126/RV1109 do not support aes-192 */
1333*4882a593Smuzhiyun #if defined(CONFIG_ROCKCHIP_RV1126)
1334*4882a593Smuzhiyun if (algo == CRYPTO_AES && key_len == AES_KEYSIZE_192)
1335*4882a593Smuzhiyun return -EINVAL;
1336*4882a593Smuzhiyun #endif
1337*4882a593Smuzhiyun
1338*4882a593Smuzhiyun ret = hw_cipher_init(g_key_chn, key, NULL, key_len, nonce, nonce_len,
1339*4882a593Smuzhiyun algo, mode, true);
1340*4882a593Smuzhiyun if (ret)
1341*4882a593Smuzhiyun return ret;
1342*4882a593Smuzhiyun
1343*4882a593Smuzhiyun return hw_cipher_crypt(in, out, len, aad, aad_len,
1344*4882a593Smuzhiyun tag, AES_BLOCK_SIZE, mode);
1345*4882a593Smuzhiyun }
1346*4882a593Smuzhiyun
rockchip_crypto_ae(struct udevice * dev,cipher_context * ctx,const u8 * in,u32 len,const u8 * aad,u32 aad_len,u8 * out,u8 * tag)1347*4882a593Smuzhiyun int rockchip_crypto_ae(struct udevice *dev, cipher_context *ctx,
1348*4882a593Smuzhiyun const u8 *in, u32 len, const u8 *aad, u32 aad_len,
1349*4882a593Smuzhiyun u8 *out, u8 *tag)
1350*4882a593Smuzhiyun
1351*4882a593Smuzhiyun {
1352*4882a593Smuzhiyun int ret = 0;
1353*4882a593Smuzhiyun
1354*4882a593Smuzhiyun rk_crypto_enable_clk(dev);
1355*4882a593Smuzhiyun
1356*4882a593Smuzhiyun ret = rk_crypto_ae(dev, ctx->algo, ctx->mode, ctx->key, ctx->key_len,
1357*4882a593Smuzhiyun ctx->iv, ctx->iv_len, in, len,
1358*4882a593Smuzhiyun aad, aad_len, out, tag);
1359*4882a593Smuzhiyun
1360*4882a593Smuzhiyun rk_crypto_disable_clk(dev);
1361*4882a593Smuzhiyun
1362*4882a593Smuzhiyun return ret;
1363*4882a593Smuzhiyun }
1364*4882a593Smuzhiyun
1365*4882a593Smuzhiyun #endif
1366*4882a593Smuzhiyun
1367*4882a593Smuzhiyun #if CONFIG_IS_ENABLED(ROCKCHIP_RSA)
rockchip_crypto_rsa_verify(struct udevice * dev,rsa_key * ctx,u8 * sign,u8 * output)1368*4882a593Smuzhiyun static int rockchip_crypto_rsa_verify(struct udevice *dev, rsa_key *ctx,
1369*4882a593Smuzhiyun u8 *sign, u8 *output)
1370*4882a593Smuzhiyun {
1371*4882a593Smuzhiyun struct mpa_num *mpa_m = NULL, *mpa_e = NULL, *mpa_n = NULL;
1372*4882a593Smuzhiyun struct mpa_num *mpa_c = NULL, *mpa_result = NULL;
1373*4882a593Smuzhiyun u32 n_bits, n_words;
1374*4882a593Smuzhiyun int ret;
1375*4882a593Smuzhiyun
1376*4882a593Smuzhiyun if (!ctx)
1377*4882a593Smuzhiyun return -EINVAL;
1378*4882a593Smuzhiyun
1379*4882a593Smuzhiyun if (ctx->algo != CRYPTO_RSA512 &&
1380*4882a593Smuzhiyun ctx->algo != CRYPTO_RSA1024 &&
1381*4882a593Smuzhiyun ctx->algo != CRYPTO_RSA2048 &&
1382*4882a593Smuzhiyun ctx->algo != CRYPTO_RSA3072 &&
1383*4882a593Smuzhiyun ctx->algo != CRYPTO_RSA4096)
1384*4882a593Smuzhiyun return -EINVAL;
1385*4882a593Smuzhiyun
1386*4882a593Smuzhiyun n_bits = crypto_algo_nbits(ctx->algo);
1387*4882a593Smuzhiyun n_words = BITS2WORD(n_bits);
1388*4882a593Smuzhiyun
1389*4882a593Smuzhiyun ret = rk_mpa_alloc(&mpa_m, sign, n_words);
1390*4882a593Smuzhiyun if (ret)
1391*4882a593Smuzhiyun goto exit;
1392*4882a593Smuzhiyun
1393*4882a593Smuzhiyun ret = rk_mpa_alloc(&mpa_e, ctx->e, n_words);
1394*4882a593Smuzhiyun if (ret)
1395*4882a593Smuzhiyun goto exit;
1396*4882a593Smuzhiyun
1397*4882a593Smuzhiyun ret = rk_mpa_alloc(&mpa_n, ctx->n, n_words);
1398*4882a593Smuzhiyun if (ret)
1399*4882a593Smuzhiyun goto exit;
1400*4882a593Smuzhiyun
1401*4882a593Smuzhiyun if (ctx->c) {
1402*4882a593Smuzhiyun ret = rk_mpa_alloc(&mpa_c, ctx->c, n_words);
1403*4882a593Smuzhiyun if (ret)
1404*4882a593Smuzhiyun goto exit;
1405*4882a593Smuzhiyun }
1406*4882a593Smuzhiyun
1407*4882a593Smuzhiyun ret = rk_mpa_alloc(&mpa_result, NULL, n_words);
1408*4882a593Smuzhiyun if (ret)
1409*4882a593Smuzhiyun goto exit;
1410*4882a593Smuzhiyun
1411*4882a593Smuzhiyun rk_crypto_enable_clk(dev);
1412*4882a593Smuzhiyun ret = rk_exptmod_np(mpa_m, mpa_e, mpa_n, mpa_c, mpa_result);
1413*4882a593Smuzhiyun if (!ret)
1414*4882a593Smuzhiyun memcpy(output, mpa_result->d, BITS2BYTE(n_bits));
1415*4882a593Smuzhiyun rk_crypto_disable_clk(dev);
1416*4882a593Smuzhiyun
1417*4882a593Smuzhiyun exit:
1418*4882a593Smuzhiyun rk_mpa_free(&mpa_m);
1419*4882a593Smuzhiyun rk_mpa_free(&mpa_e);
1420*4882a593Smuzhiyun rk_mpa_free(&mpa_n);
1421*4882a593Smuzhiyun rk_mpa_free(&mpa_c);
1422*4882a593Smuzhiyun rk_mpa_free(&mpa_result);
1423*4882a593Smuzhiyun
1424*4882a593Smuzhiyun return ret;
1425*4882a593Smuzhiyun }
1426*4882a593Smuzhiyun #endif
1427*4882a593Smuzhiyun
1428*4882a593Smuzhiyun static const struct dm_crypto_ops rockchip_crypto_ops = {
1429*4882a593Smuzhiyun .capability = rockchip_crypto_capability,
1430*4882a593Smuzhiyun .sha_init = rockchip_crypto_sha_init,
1431*4882a593Smuzhiyun .sha_update = rockchip_crypto_sha_update,
1432*4882a593Smuzhiyun .sha_final = rockchip_crypto_sha_final,
1433*4882a593Smuzhiyun #if CONFIG_IS_ENABLED(ROCKCHIP_RSA)
1434*4882a593Smuzhiyun .rsa_verify = rockchip_crypto_rsa_verify,
1435*4882a593Smuzhiyun #endif
1436*4882a593Smuzhiyun #if CONFIG_IS_ENABLED(ROCKCHIP_HMAC)
1437*4882a593Smuzhiyun .hmac_init = rockchip_crypto_hmac_init,
1438*4882a593Smuzhiyun .hmac_update = rockchip_crypto_hmac_update,
1439*4882a593Smuzhiyun .hmac_final = rockchip_crypto_hmac_final,
1440*4882a593Smuzhiyun #endif
1441*4882a593Smuzhiyun #if CONFIG_IS_ENABLED(ROCKCHIP_CIPHER)
1442*4882a593Smuzhiyun .cipher_crypt = rockchip_crypto_cipher,
1443*4882a593Smuzhiyun .cipher_mac = rockchip_crypto_mac,
1444*4882a593Smuzhiyun .cipher_ae = rockchip_crypto_ae,
1445*4882a593Smuzhiyun #endif
1446*4882a593Smuzhiyun };
1447*4882a593Smuzhiyun
1448*4882a593Smuzhiyun /*
1449*4882a593Smuzhiyun * Only use "clocks" to parse crypto clock id and use rockchip_get_clk().
1450*4882a593Smuzhiyun * Because we always add crypto node in U-Boot dts, when kernel dtb enabled :
1451*4882a593Smuzhiyun *
1452*4882a593Smuzhiyun * 1. There is cru phandle mismatch between U-Boot and kernel dtb;
1453*4882a593Smuzhiyun * 2. CONFIG_OF_SPL_REMOVE_PROPS removes clock property;
1454*4882a593Smuzhiyun */
rockchip_crypto_ofdata_to_platdata(struct udevice * dev)1455*4882a593Smuzhiyun static int rockchip_crypto_ofdata_to_platdata(struct udevice *dev)
1456*4882a593Smuzhiyun {
1457*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = dev_get_priv(dev);
1458*4882a593Smuzhiyun int len, ret = -EINVAL;
1459*4882a593Smuzhiyun
1460*4882a593Smuzhiyun memset(priv, 0x00, sizeof(*priv));
1461*4882a593Smuzhiyun
1462*4882a593Smuzhiyun priv->reg = (fdt_addr_t)dev_read_addr_ptr(dev);
1463*4882a593Smuzhiyun if (priv->reg == FDT_ADDR_T_NONE)
1464*4882a593Smuzhiyun return -EINVAL;
1465*4882a593Smuzhiyun
1466*4882a593Smuzhiyun crypto_base = priv->reg;
1467*4882a593Smuzhiyun
1468*4882a593Smuzhiyun /* if there is no clocks in dts, just skip it */
1469*4882a593Smuzhiyun if (!dev_read_prop(dev, "clocks", &len)) {
1470*4882a593Smuzhiyun printf("Can't find \"clocks\" property\n");
1471*4882a593Smuzhiyun return 0;
1472*4882a593Smuzhiyun }
1473*4882a593Smuzhiyun
1474*4882a593Smuzhiyun memset(priv, 0x00, sizeof(*priv));
1475*4882a593Smuzhiyun priv->clocks = malloc(len);
1476*4882a593Smuzhiyun if (!priv->clocks)
1477*4882a593Smuzhiyun return -ENOMEM;
1478*4882a593Smuzhiyun
1479*4882a593Smuzhiyun priv->nclocks = len / (2 * sizeof(u32));
1480*4882a593Smuzhiyun if (dev_read_u32_array(dev, "clocks", (u32 *)priv->clocks,
1481*4882a593Smuzhiyun priv->nclocks)) {
1482*4882a593Smuzhiyun printf("Can't read \"clocks\" property\n");
1483*4882a593Smuzhiyun ret = -EINVAL;
1484*4882a593Smuzhiyun goto exit;
1485*4882a593Smuzhiyun }
1486*4882a593Smuzhiyun
1487*4882a593Smuzhiyun if (dev_read_prop(dev, "clock-frequency", &len)) {
1488*4882a593Smuzhiyun priv->frequencies = malloc(len);
1489*4882a593Smuzhiyun if (!priv->frequencies) {
1490*4882a593Smuzhiyun ret = -ENOMEM;
1491*4882a593Smuzhiyun goto exit;
1492*4882a593Smuzhiyun }
1493*4882a593Smuzhiyun priv->freq_nclocks = len / sizeof(u32);
1494*4882a593Smuzhiyun if (dev_read_u32_array(dev, "clock-frequency", priv->frequencies,
1495*4882a593Smuzhiyun priv->freq_nclocks)) {
1496*4882a593Smuzhiyun printf("Can't read \"clock-frequency\" property\n");
1497*4882a593Smuzhiyun ret = -EINVAL;
1498*4882a593Smuzhiyun goto exit;
1499*4882a593Smuzhiyun }
1500*4882a593Smuzhiyun }
1501*4882a593Smuzhiyun
1502*4882a593Smuzhiyun return 0;
1503*4882a593Smuzhiyun exit:
1504*4882a593Smuzhiyun if (priv->clocks)
1505*4882a593Smuzhiyun free(priv->clocks);
1506*4882a593Smuzhiyun
1507*4882a593Smuzhiyun if (priv->frequencies)
1508*4882a593Smuzhiyun free(priv->frequencies);
1509*4882a593Smuzhiyun
1510*4882a593Smuzhiyun return ret;
1511*4882a593Smuzhiyun }
1512*4882a593Smuzhiyun
rk_crypto_set_clk(struct udevice * dev)1513*4882a593Smuzhiyun static int rk_crypto_set_clk(struct udevice *dev)
1514*4882a593Smuzhiyun {
1515*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = dev_get_priv(dev);
1516*4882a593Smuzhiyun struct clk clk;
1517*4882a593Smuzhiyun int i, ret;
1518*4882a593Smuzhiyun
1519*4882a593Smuzhiyun /* use standard "assigned-clock-rates" props */
1520*4882a593Smuzhiyun if (dev_read_size(dev, "assigned-clock-rates") > 0)
1521*4882a593Smuzhiyun return clk_set_defaults(dev);
1522*4882a593Smuzhiyun
1523*4882a593Smuzhiyun /* use "clock-frequency" props */
1524*4882a593Smuzhiyun if (priv->freq_nclocks == 0)
1525*4882a593Smuzhiyun return 0;
1526*4882a593Smuzhiyun
1527*4882a593Smuzhiyun for (i = 0; i < priv->freq_nclocks; i++) {
1528*4882a593Smuzhiyun ret = clk_get_by_index(dev, i, &clk);
1529*4882a593Smuzhiyun if (ret < 0) {
1530*4882a593Smuzhiyun printf("Failed to get clk index %d, ret=%d\n", i, ret);
1531*4882a593Smuzhiyun return ret;
1532*4882a593Smuzhiyun }
1533*4882a593Smuzhiyun ret = clk_set_rate(&clk, priv->frequencies[i]);
1534*4882a593Smuzhiyun if (ret < 0) {
1535*4882a593Smuzhiyun printf("%s: Failed to set clk(%ld): ret=%d\n",
1536*4882a593Smuzhiyun __func__, clk.id, ret);
1537*4882a593Smuzhiyun return ret;
1538*4882a593Smuzhiyun }
1539*4882a593Smuzhiyun }
1540*4882a593Smuzhiyun
1541*4882a593Smuzhiyun return 0;
1542*4882a593Smuzhiyun }
1543*4882a593Smuzhiyun
rockchip_crypto_probe(struct udevice * dev)1544*4882a593Smuzhiyun static int rockchip_crypto_probe(struct udevice *dev)
1545*4882a593Smuzhiyun {
1546*4882a593Smuzhiyun struct rockchip_crypto_priv *priv = dev_get_priv(dev);
1547*4882a593Smuzhiyun struct rk_crypto_soc_data *sdata;
1548*4882a593Smuzhiyun int ret = 0;
1549*4882a593Smuzhiyun
1550*4882a593Smuzhiyun sdata = (struct rk_crypto_soc_data *)dev_get_driver_data(dev);
1551*4882a593Smuzhiyun
1552*4882a593Smuzhiyun if (sdata->dynamic_cap)
1553*4882a593Smuzhiyun sdata->capability = sdata->dynamic_cap();
1554*4882a593Smuzhiyun
1555*4882a593Smuzhiyun priv->soc_data = sdata;
1556*4882a593Smuzhiyun
1557*4882a593Smuzhiyun priv->hw_ctx = memalign(LLI_ADDR_ALIGN_SIZE,
1558*4882a593Smuzhiyun sizeof(struct rk_hash_ctx));
1559*4882a593Smuzhiyun if (!priv->hw_ctx)
1560*4882a593Smuzhiyun return -ENOMEM;
1561*4882a593Smuzhiyun
1562*4882a593Smuzhiyun ret = rk_crypto_set_clk(dev);
1563*4882a593Smuzhiyun if (ret)
1564*4882a593Smuzhiyun return ret;
1565*4882a593Smuzhiyun
1566*4882a593Smuzhiyun rk_crypto_enable_clk(dev);
1567*4882a593Smuzhiyun
1568*4882a593Smuzhiyun hw_crypto_reset();
1569*4882a593Smuzhiyun
1570*4882a593Smuzhiyun rk_crypto_disable_clk(dev);
1571*4882a593Smuzhiyun
1572*4882a593Smuzhiyun return 0;
1573*4882a593Smuzhiyun }
1574*4882a593Smuzhiyun
1575*4882a593Smuzhiyun static const struct rk_crypto_soc_data soc_data_base = {
1576*4882a593Smuzhiyun .capability = CRYPTO_MD5 |
1577*4882a593Smuzhiyun CRYPTO_SHA1 |
1578*4882a593Smuzhiyun CRYPTO_SHA256 |
1579*4882a593Smuzhiyun CRYPTO_SHA512 |
1580*4882a593Smuzhiyun CRYPTO_HMAC_MD5 |
1581*4882a593Smuzhiyun CRYPTO_HMAC_SHA1 |
1582*4882a593Smuzhiyun CRYPTO_HMAC_SHA256 |
1583*4882a593Smuzhiyun CRYPTO_HMAC_SHA512 |
1584*4882a593Smuzhiyun CRYPTO_RSA512 |
1585*4882a593Smuzhiyun CRYPTO_RSA1024 |
1586*4882a593Smuzhiyun CRYPTO_RSA2048 |
1587*4882a593Smuzhiyun CRYPTO_RSA3072 |
1588*4882a593Smuzhiyun CRYPTO_RSA4096 |
1589*4882a593Smuzhiyun CRYPTO_DES |
1590*4882a593Smuzhiyun CRYPTO_AES,
1591*4882a593Smuzhiyun };
1592*4882a593Smuzhiyun
1593*4882a593Smuzhiyun static const struct rk_crypto_soc_data soc_data_base_sm = {
1594*4882a593Smuzhiyun .capability = CRYPTO_MD5 |
1595*4882a593Smuzhiyun CRYPTO_SHA1 |
1596*4882a593Smuzhiyun CRYPTO_SHA256 |
1597*4882a593Smuzhiyun CRYPTO_SHA512 |
1598*4882a593Smuzhiyun CRYPTO_SM3 |
1599*4882a593Smuzhiyun CRYPTO_HMAC_MD5 |
1600*4882a593Smuzhiyun CRYPTO_HMAC_SHA1 |
1601*4882a593Smuzhiyun CRYPTO_HMAC_SHA256 |
1602*4882a593Smuzhiyun CRYPTO_HMAC_SHA512 |
1603*4882a593Smuzhiyun CRYPTO_HMAC_SM3 |
1604*4882a593Smuzhiyun CRYPTO_RSA512 |
1605*4882a593Smuzhiyun CRYPTO_RSA1024 |
1606*4882a593Smuzhiyun CRYPTO_RSA2048 |
1607*4882a593Smuzhiyun CRYPTO_RSA3072 |
1608*4882a593Smuzhiyun CRYPTO_RSA4096 |
1609*4882a593Smuzhiyun CRYPTO_DES |
1610*4882a593Smuzhiyun CRYPTO_AES |
1611*4882a593Smuzhiyun CRYPTO_SM4,
1612*4882a593Smuzhiyun };
1613*4882a593Smuzhiyun
1614*4882a593Smuzhiyun static const struct rk_crypto_soc_data soc_data_rk1808 = {
1615*4882a593Smuzhiyun .capability = CRYPTO_MD5 |
1616*4882a593Smuzhiyun CRYPTO_SHA1 |
1617*4882a593Smuzhiyun CRYPTO_SHA256 |
1618*4882a593Smuzhiyun CRYPTO_HMAC_MD5 |
1619*4882a593Smuzhiyun CRYPTO_HMAC_SHA1 |
1620*4882a593Smuzhiyun CRYPTO_HMAC_SHA256 |
1621*4882a593Smuzhiyun CRYPTO_RSA512 |
1622*4882a593Smuzhiyun CRYPTO_RSA1024 |
1623*4882a593Smuzhiyun CRYPTO_RSA2048 |
1624*4882a593Smuzhiyun CRYPTO_RSA3072 |
1625*4882a593Smuzhiyun CRYPTO_RSA4096,
1626*4882a593Smuzhiyun };
1627*4882a593Smuzhiyun
1628*4882a593Smuzhiyun static const struct rk_crypto_soc_data soc_data_cryptov3 = {
1629*4882a593Smuzhiyun .capability = 0,
1630*4882a593Smuzhiyun .dynamic_cap = crypto_v3_dynamic_cap,
1631*4882a593Smuzhiyun };
1632*4882a593Smuzhiyun
1633*4882a593Smuzhiyun static const struct udevice_id rockchip_crypto_ids[] = {
1634*4882a593Smuzhiyun {
1635*4882a593Smuzhiyun .compatible = "rockchip,px30-crypto",
1636*4882a593Smuzhiyun .data = (ulong)&soc_data_base
1637*4882a593Smuzhiyun },
1638*4882a593Smuzhiyun {
1639*4882a593Smuzhiyun .compatible = "rockchip,rk1808-crypto",
1640*4882a593Smuzhiyun .data = (ulong)&soc_data_rk1808
1641*4882a593Smuzhiyun },
1642*4882a593Smuzhiyun {
1643*4882a593Smuzhiyun .compatible = "rockchip,rk3308-crypto",
1644*4882a593Smuzhiyun .data = (ulong)&soc_data_base
1645*4882a593Smuzhiyun },
1646*4882a593Smuzhiyun {
1647*4882a593Smuzhiyun .compatible = "rockchip,rv1126-crypto",
1648*4882a593Smuzhiyun .data = (ulong)&soc_data_base_sm
1649*4882a593Smuzhiyun },
1650*4882a593Smuzhiyun {
1651*4882a593Smuzhiyun .compatible = "rockchip,rk3568-crypto",
1652*4882a593Smuzhiyun .data = (ulong)&soc_data_base_sm
1653*4882a593Smuzhiyun },
1654*4882a593Smuzhiyun {
1655*4882a593Smuzhiyun .compatible = "rockchip,rk3588-crypto",
1656*4882a593Smuzhiyun .data = (ulong)&soc_data_base_sm
1657*4882a593Smuzhiyun },
1658*4882a593Smuzhiyun {
1659*4882a593Smuzhiyun .compatible = "rockchip,crypto-v3",
1660*4882a593Smuzhiyun .data = (ulong)&soc_data_cryptov3
1661*4882a593Smuzhiyun },
1662*4882a593Smuzhiyun {
1663*4882a593Smuzhiyun .compatible = "rockchip,crypto-v4",
1664*4882a593Smuzhiyun .data = (ulong)&soc_data_cryptov3 /* reuse crypto v3 config */
1665*4882a593Smuzhiyun },
1666*4882a593Smuzhiyun { }
1667*4882a593Smuzhiyun };
1668*4882a593Smuzhiyun
1669*4882a593Smuzhiyun U_BOOT_DRIVER(rockchip_crypto_v2) = {
1670*4882a593Smuzhiyun .name = "rockchip_crypto_v2",
1671*4882a593Smuzhiyun .id = UCLASS_CRYPTO,
1672*4882a593Smuzhiyun .of_match = rockchip_crypto_ids,
1673*4882a593Smuzhiyun .ops = &rockchip_crypto_ops,
1674*4882a593Smuzhiyun .probe = rockchip_crypto_probe,
1675*4882a593Smuzhiyun .ofdata_to_platdata = rockchip_crypto_ofdata_to_platdata,
1676*4882a593Smuzhiyun .priv_auto_alloc_size = sizeof(struct rockchip_crypto_priv),
1677*4882a593Smuzhiyun };
1678