Back to home page

OSCL-LXR

 
 

    


0001 // SPDX-License-Identifier: GPL-2.0
0002 /*
0003  * CAAM/SEC 4.x functions for handling key-generation jobs
0004  *
0005  * Copyright 2008-2011 Freescale Semiconductor, Inc.
0006  *
0007  */
0008 #include "compat.h"
0009 #include "jr.h"
0010 #include "error.h"
0011 #include "desc_constr.h"
0012 #include "key_gen.h"
0013 
0014 void split_key_done(struct device *dev, u32 *desc, u32 err,
0015                void *context)
0016 {
0017     struct split_key_result *res = context;
0018     int ecode = 0;
0019 
0020     dev_dbg(dev, "%s %d: err 0x%x\n", __func__, __LINE__, err);
0021 
0022     if (err)
0023         ecode = caam_jr_strstatus(dev, err);
0024 
0025     res->err = ecode;
0026 
0027     complete(&res->completion);
0028 }
0029 EXPORT_SYMBOL(split_key_done);
0030 /*
0031 get a split ipad/opad key
0032 
0033 Split key generation-----------------------------------------------
0034 
0035 [00] 0xb0810008    jobdesc: stidx=1 share=never len=8
0036 [01] 0x04000014        key: class2->keyreg len=20
0037             @0xffe01000
0038 [03] 0x84410014  operation: cls2-op sha1 hmac init dec
0039 [04] 0x24940000     fifold: class2 msgdata-last2 len=0 imm
0040 [05] 0xa4000001       jump: class2 local all ->1 [06]
0041 [06] 0x64260028    fifostr: class2 mdsplit-jdk len=40
0042             @0xffe04000
0043 */
0044 int gen_split_key(struct device *jrdev, u8 *key_out,
0045           struct alginfo * const adata, const u8 *key_in, u32 keylen,
0046           int max_keylen)
0047 {
0048     u32 *desc;
0049     struct split_key_result result;
0050     dma_addr_t dma_addr;
0051     unsigned int local_max;
0052     int ret = -ENOMEM;
0053 
0054     adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK);
0055     adata->keylen_pad = split_key_pad_len(adata->algtype &
0056                           OP_ALG_ALGSEL_MASK);
0057     local_max = max(keylen, adata->keylen_pad);
0058 
0059     dev_dbg(jrdev, "split keylen %d split keylen padded %d\n",
0060         adata->keylen, adata->keylen_pad);
0061     print_hex_dump_debug("ctx.key@" __stringify(__LINE__)": ",
0062                  DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1);
0063 
0064     if (local_max > max_keylen)
0065         return -EINVAL;
0066 
0067     desc = kmalloc(CAAM_CMD_SZ * 6 + CAAM_PTR_SZ * 2, GFP_KERNEL | GFP_DMA);
0068     if (!desc) {
0069         dev_err(jrdev, "unable to allocate key input memory\n");
0070         return ret;
0071     }
0072 
0073     memcpy(key_out, key_in, keylen);
0074 
0075     dma_addr = dma_map_single(jrdev, key_out, local_max, DMA_BIDIRECTIONAL);
0076     if (dma_mapping_error(jrdev, dma_addr)) {
0077         dev_err(jrdev, "unable to map key memory\n");
0078         goto out_free;
0079     }
0080 
0081     init_job_desc(desc, 0);
0082     append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG);
0083 
0084     /* Sets MDHA up into an HMAC-INIT */
0085     append_operation(desc, (adata->algtype & OP_ALG_ALGSEL_MASK) |
0086              OP_ALG_AAI_HMAC | OP_TYPE_CLASS2_ALG | OP_ALG_DECRYPT |
0087              OP_ALG_AS_INIT);
0088 
0089     /*
0090      * do a FIFO_LOAD of zero, this will trigger the internal key expansion
0091      * into both pads inside MDHA
0092      */
0093     append_fifo_load_as_imm(desc, NULL, 0, LDST_CLASS_2_CCB |
0094                 FIFOLD_TYPE_MSG | FIFOLD_TYPE_LAST2);
0095 
0096     /*
0097      * FIFO_STORE with the explicit split-key content store
0098      * (0x26 output type)
0099      */
0100     append_fifo_store(desc, dma_addr, adata->keylen,
0101               LDST_CLASS_2_CCB | FIFOST_TYPE_SPLIT_KEK);
0102 
0103     print_hex_dump_debug("jobdesc@"__stringify(__LINE__)": ",
0104                  DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc),
0105                  1);
0106 
0107     result.err = 0;
0108     init_completion(&result.completion);
0109 
0110     ret = caam_jr_enqueue(jrdev, desc, split_key_done, &result);
0111     if (ret == -EINPROGRESS) {
0112         /* in progress */
0113         wait_for_completion(&result.completion);
0114         ret = result.err;
0115 
0116         print_hex_dump_debug("ctx.key@"__stringify(__LINE__)": ",
0117                      DUMP_PREFIX_ADDRESS, 16, 4, key_out,
0118                      adata->keylen_pad, 1);
0119     }
0120 
0121     dma_unmap_single(jrdev, dma_addr, local_max, DMA_BIDIRECTIONAL);
0122 out_free:
0123     kfree(desc);
0124     return ret;
0125 }
0126 EXPORT_SYMBOL(gen_split_key);