123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276 |
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/Kconfig
- @@ -0,0 +1,64 @@
- +# SPDX-License-Identifier: GPL-2.0
- +config CRYPTO_DEV_EIP93_SKCIPHER
- + tristate
- +
- +config CRYPTO_DEV_EIP93_HMAC
- + tristate
- +
- +config CRYPTO_DEV_EIP93
- + tristate "Support for EIP93 crypto HW accelerators"
- + depends on SOC_MT7621 || COMPILE_TEST
- + help
- + EIP93 have various crypto HW accelerators. Select this if
- + you want to use the EIP93 modules for any of the crypto algorithms.
- +
- +if CRYPTO_DEV_EIP93
- +
- +config CRYPTO_DEV_EIP93_AES
- + bool "Register AES algorithm implementations with the Crypto API"
- + default y
- + select CRYPTO_DEV_EIP93_SKCIPHER
- + select CRYPTO_LIB_AES
- + select CRYPTO_SKCIPHER
- + help
- + Selecting this will offload AES - ECB, CBC and CTR crypto
- + to the EIP-93 crypto engine.
- +
- +config CRYPTO_DEV_EIP93_DES
- + bool "Register legacy DES / 3DES algorithm with the Crypto API"
- + default y
- + select CRYPTO_DEV_EIP93_SKCIPHER
- + select CRYPTO_LIB_DES
- + select CRYPTO_SKCIPHER
- + help
- + Selecting this will offload DES and 3DES ECB and CBC
- + crypto to the EIP-93 crypto engine.
- +
- +config CRYPTO_DEV_EIP93_AEAD
- + bool "Register AEAD algorithm with the Crypto API"
- + default y
- + select CRYPTO_DEV_EIP93_HMAC
- + select CRYPTO_AEAD
- + select CRYPTO_AUTHENC
- + select CRYPTO_MD5
- + select CRYPTO_SHA1
- + select CRYPTO_SHA256
- + help
- + Selecting this will offload AEAD authenc(hmac(x), cipher(y))
- + crypto to the EIP-93 crypto engine.
- +
- +config CRYPTO_DEV_EIP93_GENERIC_SW_MAX_LEN
- + int "Max skcipher software fallback length"
- + default 256
- + help
- + Max length of crypt request which
- + will fallback to software crypt of skcipher *except* AES-128.
- +
- +config CRYPTO_DEV_EIP93_AES_128_SW_MAX_LEN
- + int "Max AES-128 skcipher software fallback length"
- + default 512
- + help
- + Max length of crypt request which
- + will fallback to software crypt of AES-128 skcipher.
- +
- +endif
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/Makefile
- @@ -0,0 +1,7 @@
- +obj-$(CONFIG_CRYPTO_DEV_EIP93) += crypto-hw-eip93.o
- +
- +crypto-hw-eip93-y += eip93-main.o eip93-common.o
- +
- +crypto-hw-eip93-$(CONFIG_CRYPTO_DEV_EIP93_SKCIPHER) += eip93-cipher.o
- +crypto-hw-eip93-$(CONFIG_CRYPTO_DEV_EIP93_AEAD) += eip93-aead.o
- +
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-aead.c
- @@ -0,0 +1,768 @@
- +// SPDX-License-Identifier: GPL-2.0
- +/*
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +
- +#include <crypto/aead.h>
- +#include <crypto/aes.h>
- +#include <crypto/authenc.h>
- +#include <crypto/ctr.h>
- +#include <crypto/hmac.h>
- +#include <crypto/internal/aead.h>
- +#include <crypto/md5.h>
- +#include <crypto/null.h>
- +#include <crypto/sha1.h>
- +#include <crypto/sha2.h>
- +
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- +#include <crypto/internal/des.h>
- +#endif
- +
- +#include <linux/crypto.h>
- +#include <linux/dma-mapping.h>
- +
- +#include "eip93-aead.h"
- +#include "eip93-cipher.h"
- +#include "eip93-common.h"
- +#include "eip93-regs.h"
- +
- +void mtk_aead_handle_result(struct crypto_async_request *async, int err)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(async->tfm);
- + struct mtk_device *mtk = ctx->mtk;
- + struct aead_request *req = aead_request_cast(async);
- + struct mtk_cipher_reqctx *rctx = aead_request_ctx(req);
- +
- + mtk_unmap_dma(mtk, rctx, req->src, req->dst);
- + mtk_handle_result(mtk, rctx, req->iv);
- +
- + if (err == 1)
- + err = -EBADMSG;
- + /* let software handle anti-replay errors */
- + if (err == 4)
- + err = 0;
- +
- + aead_request_complete(req, err);
- +}
- +
- +static int mtk_aead_send_req(struct crypto_async_request *async)
- +{
- + struct aead_request *req = aead_request_cast(async);
- + struct mtk_cipher_reqctx *rctx = aead_request_ctx(req);
- + int err;
- +
- + err = check_valid_request(rctx);
- + if (err) {
- + aead_request_complete(req, err);
- + return err;
- + }
- +
- + return mtk_send_req(async, req->iv, rctx);
- +}
- +
- +/* Crypto aead API functions */
- +static int mtk_aead_cra_init(struct crypto_tfm *tfm)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(tfm);
- + struct mtk_alg_template *tmpl = container_of(tfm->__crt_alg,
- + struct mtk_alg_template, alg.aead.base);
- + u32 flags = tmpl->flags;
- + char *alg_base;
- +
- + crypto_aead_set_reqsize(__crypto_aead_cast(tfm),
- + sizeof(struct mtk_cipher_reqctx));
- +
- + ctx->mtk = tmpl->mtk;
- + ctx->in_first = true;
- + ctx->out_first = true;
- +
- + ctx->sa_in = kzalloc(sizeof(struct saRecord_s), GFP_KERNEL);
- + if (!ctx->sa_in)
- + return -ENOMEM;
- +
- + ctx->sa_base_in = dma_map_single(ctx->mtk->dev, ctx->sa_in,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- +
- + ctx->sa_out = kzalloc(sizeof(struct saRecord_s), GFP_KERNEL);
- + if (!ctx->sa_out)
- + return -ENOMEM;
- +
- + ctx->sa_base_out = dma_map_single(ctx->mtk->dev, ctx->sa_out,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- +
- + /* software workaround for now */
- + if (IS_HASH_MD5(flags))
- + alg_base = "md5";
- + if (IS_HASH_SHA1(flags))
- + alg_base = "sha1";
- + if (IS_HASH_SHA224(flags))
- + alg_base = "sha224";
- + if (IS_HASH_SHA256(flags))
- + alg_base = "sha256";
- +
- + ctx->shash = crypto_alloc_shash(alg_base, 0, CRYPTO_ALG_NEED_FALLBACK);
- +
- + if (IS_ERR(ctx->shash)) {
- + dev_err(ctx->mtk->dev, "base driver %s could not be loaded.\n",
- + alg_base);
- + return PTR_ERR(ctx->shash);
- + }
- +
- + return 0;
- +}
- +
- +static void mtk_aead_cra_exit(struct crypto_tfm *tfm)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(tfm);
- +
- + if (ctx->shash)
- + crypto_free_shash(ctx->shash);
- +
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_in,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_out,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + kfree(ctx->sa_in);
- + kfree(ctx->sa_out);
- +}
- +
- +static int mtk_aead_setkey(struct crypto_aead *ctfm, const u8 *key,
- + unsigned int len)
- +{
- + struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(tfm);
- + struct mtk_alg_template *tmpl = container_of(tfm->__crt_alg,
- + struct mtk_alg_template, alg.skcipher.base);
- + u32 flags = tmpl->flags;
- + u32 nonce = 0;
- + struct crypto_authenc_keys keys;
- + struct crypto_aes_ctx aes;
- + struct saRecord_s *saRecord = ctx->sa_out;
- + int sa_size = sizeof(struct saRecord_s);
- + int err = -EINVAL;
- +
- +
- + if (crypto_authenc_extractkeys(&keys, key, len))
- + return err;
- +
- + if (IS_RFC3686(flags)) {
- + if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE)
- + return err;
- +
- + keys.enckeylen -= CTR_RFC3686_NONCE_SIZE;
- + memcpy(&nonce, keys.enckey + keys.enckeylen,
- + CTR_RFC3686_NONCE_SIZE);
- + }
- +
- + switch ((flags & MTK_ALG_MASK)) {
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- + case MTK_ALG_DES:
- + err = verify_aead_des_key(ctfm, keys.enckey, keys.enckeylen);
- + break;
- + case MTK_ALG_3DES:
- + if (keys.enckeylen != DES3_EDE_KEY_SIZE)
- + return -EINVAL;
- +
- + err = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen);
- + break;
- +#endif
- + case MTK_ALG_AES:
- + err = aes_expandkey(&aes, keys.enckey, keys.enckeylen);
- + }
- + if (err)
- + return err;
- +
- + ctx->blksize = crypto_aead_blocksize(ctfm);
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_in, sa_size,
- + DMA_TO_DEVICE);
- +
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_out, sa_size,
- + DMA_TO_DEVICE);
- + /* Encryption key */
- + mtk_set_saRecord(saRecord, keys.enckeylen, flags);
- + saRecord->saCmd0.bits.opCode = 1;
- + saRecord->saCmd0.bits.digestLength = ctx->authsize >> 2;
- +
- + memcpy(saRecord->saKey, keys.enckey, keys.enckeylen);
- + ctx->saNonce = nonce;
- + saRecord->saNonce = nonce;
- +
- + /* authentication key */
- + err = mtk_authenc_setkey(ctx->shash, saRecord, keys.authkey,
- + keys.authkeylen);
- +
- + saRecord->saCmd0.bits.direction = 0;
- + memcpy(ctx->sa_in, saRecord, sa_size);
- + ctx->sa_in->saCmd0.bits.direction = 1;
- + ctx->sa_in->saCmd1.bits.copyDigest = 0;
- +
- + ctx->sa_base_out = dma_map_single(ctx->mtk->dev, ctx->sa_out, sa_size,
- + DMA_TO_DEVICE);
- + ctx->sa_base_in = dma_map_single(ctx->mtk->dev, ctx->sa_in, sa_size,
- + DMA_TO_DEVICE);
- + ctx->in_first = true;
- + ctx->out_first = true;
- +
- + return err;
- +}
- +
- +static int mtk_aead_setauthsize(struct crypto_aead *ctfm,
- + unsigned int authsize)
- +{
- + struct crypto_tfm *tfm = crypto_aead_tfm(ctfm);
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(tfm);
- +
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_in,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- +
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_out,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- +
- + ctx->authsize = authsize;
- + ctx->sa_in->saCmd0.bits.digestLength = ctx->authsize >> 2;
- + ctx->sa_out->saCmd0.bits.digestLength = ctx->authsize >> 2;
- +
- + ctx->sa_base_out = dma_map_single(ctx->mtk->dev, ctx->sa_out,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + ctx->sa_base_in = dma_map_single(ctx->mtk->dev, ctx->sa_in,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + return 0;
- +}
- +
- +static void mtk_aead_setassoc(struct mtk_crypto_ctx *ctx,
- + struct aead_request *req, bool in)
- +{
- + struct saRecord_s *saRecord;
- +
- + if (in) {
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_in,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + saRecord = ctx->sa_in;
- + saRecord->saCmd1.bits.hashCryptOffset = req->assoclen >> 2;
- +
- + ctx->sa_base_in = dma_map_single(ctx->mtk->dev, ctx->sa_in,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + ctx->assoclen_in = req->assoclen;
- + } else {
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_out,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + saRecord = ctx->sa_out;
- + saRecord->saCmd1.bits.hashCryptOffset = req->assoclen >> 2;
- +
- + ctx->sa_base_out = dma_map_single(ctx->mtk->dev, ctx->sa_out,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + ctx->assoclen_out = req->assoclen;
- + }
- +}
- +
- +static int mtk_aead_crypt(struct aead_request *req)
- +{
- + struct mtk_cipher_reqctx *rctx = aead_request_ctx(req);
- + struct crypto_async_request *async = &req->base;
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
- + struct crypto_aead *aead = crypto_aead_reqtfm(req);
- +
- + rctx->textsize = req->cryptlen;
- + rctx->blksize = ctx->blksize;
- + rctx->assoclen = req->assoclen;
- + rctx->authsize = ctx->authsize;
- + rctx->sg_src = req->src;
- + rctx->sg_dst = req->dst;
- + rctx->ivsize = crypto_aead_ivsize(aead);
- + rctx->flags |= MTK_DESC_AEAD;
- +
- + if IS_DECRYPT(rctx->flags)
- + rctx->textsize -= rctx->authsize;
- +
- + return mtk_aead_send_req(async);
- +}
- +
- +static int mtk_aead_encrypt(struct aead_request *req)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
- + struct mtk_cipher_reqctx *rctx = aead_request_ctx(req);
- + struct mtk_alg_template *tmpl = container_of(req->base.tfm->__crt_alg,
- + struct mtk_alg_template, alg.aead.base);
- +
- + rctx->flags = tmpl->flags;
- + rctx->flags |= MTK_ENCRYPT;
- + if (ctx->out_first) {
- + mtk_aead_setassoc(ctx, req, false);
- + ctx->out_first = false;
- + }
- +
- + if (req->assoclen != ctx->assoclen_out) {
- + dev_err(ctx->mtk->dev, "Request AAD length error\n");
- + return -EINVAL;
- + }
- +
- + rctx->saRecord_base = ctx->sa_base_out;
- +
- + return mtk_aead_crypt(req);
- +}
- +
- +static int mtk_aead_decrypt(struct aead_request *req)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
- + struct mtk_cipher_reqctx *rctx = aead_request_ctx(req);
- + struct mtk_alg_template *tmpl = container_of(req->base.tfm->__crt_alg,
- + struct mtk_alg_template, alg.aead.base);
- +
- + rctx->flags = tmpl->flags;
- + rctx->flags |= MTK_DECRYPT;
- + if (ctx->in_first) {
- + mtk_aead_setassoc(ctx, req, true);
- + ctx->in_first = false;
- + }
- +
- + if (req->assoclen != ctx->assoclen_in) {
- + dev_err(ctx->mtk->dev, "Request AAD length error\n");
- + return -EINVAL;
- + }
- +
- + rctx->saRecord_base = ctx->sa_base_in;
- +
- + return mtk_aead_crypt(req);
- +}
- +
- +/* Available authenc algorithms in this module */
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AES)
- +struct mtk_alg_template mtk_alg_authenc_hmac_md5_cbc_aes = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_MD5 | MTK_MODE_CBC | MTK_ALG_AES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = AES_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = MD5_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(md5),cbc(aes))",
- + .cra_driver_name =
- + "authenc(hmac(md5-eip93), cbc(aes-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = AES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha1_cbc_aes = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA1 | MTK_MODE_CBC | MTK_ALG_AES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = AES_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA1_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha1),cbc(aes))",
- + .cra_driver_name =
- + "authenc(hmac(sha1-eip93),cbc(aes-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = AES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha224_cbc_aes = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA224 | MTK_MODE_CBC | MTK_ALG_AES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = AES_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA224_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha224),cbc(aes))",
- + .cra_driver_name =
- + "authenc(hmac(sha224-eip93),cbc(aes-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = AES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha256_cbc_aes = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA256 | MTK_MODE_CBC | MTK_ALG_AES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = AES_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA256_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha256),cbc(aes))",
- + .cra_driver_name =
- + "authenc(hmac(sha256-eip93),cbc(aes-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = AES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_md5_rfc3686_aes = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_MD5 |
- + MTK_MODE_CTR | MTK_MODE_RFC3686 | MTK_ALG_AES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = CTR_RFC3686_IV_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = MD5_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(md5),rfc3686(ctr(aes)))",
- + .cra_driver_name =
- + "authenc(hmac(md5-eip93),rfc3686(ctr(aes-eip93)))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = 1,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha1_rfc3686_aes = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA1 |
- + MTK_MODE_CTR | MTK_MODE_RFC3686 | MTK_ALG_AES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = CTR_RFC3686_IV_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA1_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha1),rfc3686(ctr(aes)))",
- + .cra_driver_name =
- + "authenc(hmac(sha1-eip93),rfc3686(ctr(aes-eip93)))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = 1,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha224_rfc3686_aes = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA224 |
- + MTK_MODE_CTR | MTK_MODE_RFC3686 | MTK_ALG_AES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = CTR_RFC3686_IV_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA224_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha224),rfc3686(ctr(aes)))",
- + .cra_driver_name =
- + "authenc(hmac(sha224-eip93),rfc3686(ctr(aes-eip93)))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = 1,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha256_rfc3686_aes = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA256 |
- + MTK_MODE_CTR | MTK_MODE_RFC3686 | MTK_ALG_AES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = CTR_RFC3686_IV_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA256_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha256),rfc3686(ctr(aes)))",
- + .cra_driver_name =
- + "authenc(hmac(sha256-eip93),rfc3686(ctr(aes-eip93)))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = 1,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- +struct mtk_alg_template mtk_alg_authenc_hmac_md5_cbc_des = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_MD5 | MTK_MODE_CBC | MTK_ALG_DES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = DES_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = MD5_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(md5),cbc(des))",
- + .cra_driver_name =
- + "authenc(hmac(md5-eip93),cbc(des-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha1_cbc_des = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA1 | MTK_MODE_CBC | MTK_ALG_DES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = DES_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA1_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha1),cbc(des))",
- + .cra_driver_name =
- + "authenc(hmac(sha1-eip93),cbc(des-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha224_cbc_des = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA224 | MTK_MODE_CBC | MTK_ALG_DES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = DES_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA224_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha224),cbc(des))",
- + .cra_driver_name =
- + "authenc(hmac(sha224-eip93),cbc(des-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha256_cbc_des = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA256 | MTK_MODE_CBC | MTK_ALG_DES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = DES_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA256_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha256),cbc(des))",
- + .cra_driver_name =
- + "authenc(hmac(sha256-eip93),cbc(des-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_md5_cbc_des3_ede = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_MD5 | MTK_MODE_CBC | MTK_ALG_3DES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = DES3_EDE_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = MD5_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(md5),cbc(des3_ede))",
- + .cra_driver_name =
- + "authenc(hmac(md5-eip93),cbc(des3_ede-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES3_EDE_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0x0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha1_cbc_des3_ede = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA1 | MTK_MODE_CBC | MTK_ALG_3DES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = DES3_EDE_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA1_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha1),cbc(des3_ede))",
- + .cra_driver_name =
- + "authenc(hmac(sha1-eip93),cbc(des3_ede-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES3_EDE_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0x0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha224_cbc_des3_ede = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA224 | MTK_MODE_CBC | MTK_ALG_3DES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = DES3_EDE_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA224_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha224),cbc(des3_ede))",
- + .cra_driver_name =
- + "authenc(hmac(sha224-eip93),cbc(des3_ede-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES3_EDE_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0x0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_authenc_hmac_sha256_cbc_des3_ede = {
- + .type = MTK_ALG_TYPE_AEAD,
- + .flags = MTK_HASH_HMAC | MTK_HASH_SHA256 | MTK_MODE_CBC | MTK_ALG_3DES,
- + .alg.aead = {
- + .setkey = mtk_aead_setkey,
- + .encrypt = mtk_aead_encrypt,
- + .decrypt = mtk_aead_decrypt,
- + .ivsize = DES3_EDE_BLOCK_SIZE,
- + .setauthsize = mtk_aead_setauthsize,
- + .maxauthsize = SHA256_DIGEST_SIZE,
- + .base = {
- + .cra_name = "authenc(hmac(sha256),cbc(des3_ede))",
- + .cra_driver_name =
- + "authenc(hmac(sha256-eip93),cbc(des3_ede-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES3_EDE_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0x0,
- + .cra_init = mtk_aead_cra_init,
- + .cra_exit = mtk_aead_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +#endif
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-aead.h
- @@ -0,0 +1,31 @@
- +/* SPDX-License-Identifier: GPL-2.0
- + *
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +#ifndef _EIP93_AEAD_H_
- +#define _EIP93_AEAD_H_
- +
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_md5_cbc_aes;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha1_cbc_aes;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha224_cbc_aes;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha256_cbc_aes;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_md5_rfc3686_aes;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha1_rfc3686_aes;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha224_rfc3686_aes;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha256_rfc3686_aes;
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_md5_cbc_des;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha1_cbc_des;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha224_cbc_des;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha256_cbc_des;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_md5_cbc_des3_ede;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha1_cbc_des3_ede;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha224_cbc_des3_ede;
- +extern struct mtk_alg_template mtk_alg_authenc_hmac_sha256_cbc_des3_ede;
- +#endif
- +
- +void mtk_aead_handle_result(struct crypto_async_request *async, int err);
- +
- +#endif /* _EIP93_AEAD_H_ */
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-aes.h
- @@ -0,0 +1,15 @@
- +/* SPDX-License-Identifier: GPL-2.0
- + *
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +#ifndef _EIP93_AES_H_
- +#define _EIP93_AES_H_
- +
- +extern struct mtk_alg_template mtk_alg_ecb_aes;
- +extern struct mtk_alg_template mtk_alg_cbc_aes;
- +extern struct mtk_alg_template mtk_alg_ctr_aes;
- +extern struct mtk_alg_template mtk_alg_rfc3686_aes;
- +
- +#endif /* _EIP93_AES_H_ */
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-cipher.c
- @@ -0,0 +1,483 @@
- +// SPDX-License-Identifier: GPL-2.0
- +/*
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AES)
- +#include <crypto/aes.h>
- +#include <crypto/ctr.h>
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- +#include <crypto/internal/des.h>
- +#endif
- +#include <linux/dma-mapping.h>
- +
- +#include "eip93-cipher.h"
- +#include "eip93-common.h"
- +#include "eip93-regs.h"
- +
- +void mtk_skcipher_handle_result(struct crypto_async_request *async, int err)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(async->tfm);
- + struct mtk_device *mtk = ctx->mtk;
- + struct skcipher_request *req = skcipher_request_cast(async);
- + struct mtk_cipher_reqctx *rctx = skcipher_request_ctx(req);
- +
- + mtk_unmap_dma(mtk, rctx, req->src, req->dst);
- + mtk_handle_result(mtk, rctx, req->iv);
- +
- + skcipher_request_complete(req, err);
- +}
- +
- +static inline bool mtk_skcipher_is_fallback(const struct crypto_tfm *tfm,
- + u32 flags)
- +{
- + return (tfm->__crt_alg->cra_flags & CRYPTO_ALG_NEED_FALLBACK) &&
- + !IS_RFC3686(flags);
- +}
- +
- +static int mtk_skcipher_send_req(struct crypto_async_request *async)
- +{
- + struct skcipher_request *req = skcipher_request_cast(async);
- + struct mtk_cipher_reqctx *rctx = skcipher_request_ctx(req);
- + int err;
- +
- + err = check_valid_request(rctx);
- +
- + if (err) {
- + skcipher_request_complete(req, err);
- + return err;
- + }
- +
- + return mtk_send_req(async, req->iv, rctx);
- +}
- +
- +/* Crypto skcipher API functions */
- +static int mtk_skcipher_cra_init(struct crypto_tfm *tfm)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(tfm);
- + struct mtk_alg_template *tmpl = container_of(tfm->__crt_alg,
- + struct mtk_alg_template, alg.skcipher.base);
- + bool fallback = mtk_skcipher_is_fallback(tfm, tmpl->flags);
- +
- + if (fallback) {
- + ctx->fallback = crypto_alloc_skcipher(
- + crypto_tfm_alg_name(tfm), 0, CRYPTO_ALG_NEED_FALLBACK);
- + if (IS_ERR(ctx->fallback))
- + return PTR_ERR(ctx->fallback);
- + }
- +
- + crypto_skcipher_set_reqsize(
- + __crypto_skcipher_cast(tfm),
- + sizeof(struct mtk_cipher_reqctx) +
- + (fallback ? crypto_skcipher_reqsize(ctx->fallback) :
- + 0));
- +
- + ctx->mtk = tmpl->mtk;
- +
- + ctx->sa_in = kzalloc(sizeof(struct saRecord_s), GFP_KERNEL);
- + if (!ctx->sa_in)
- + return -ENOMEM;
- +
- + ctx->sa_base_in = dma_map_single(ctx->mtk->dev, ctx->sa_in,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- +
- + ctx->sa_out = kzalloc(sizeof(struct saRecord_s), GFP_KERNEL);
- + if (!ctx->sa_out)
- + return -ENOMEM;
- +
- + ctx->sa_base_out = dma_map_single(ctx->mtk->dev, ctx->sa_out,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + return 0;
- +}
- +
- +static void mtk_skcipher_cra_exit(struct crypto_tfm *tfm)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(tfm);
- +
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_in,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_out,
- + sizeof(struct saRecord_s), DMA_TO_DEVICE);
- + kfree(ctx->sa_in);
- + kfree(ctx->sa_out);
- +
- + crypto_free_skcipher(ctx->fallback);
- +}
- +
- +static int mtk_skcipher_setkey(struct crypto_skcipher *ctfm, const u8 *key,
- + unsigned int len)
- +{
- + struct crypto_tfm *tfm = crypto_skcipher_tfm(ctfm);
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(tfm);
- + struct mtk_alg_template *tmpl = container_of(tfm->__crt_alg,
- + struct mtk_alg_template, alg.skcipher.base);
- + struct saRecord_s *saRecord = ctx->sa_out;
- + u32 flags = tmpl->flags;
- + u32 nonce = 0;
- + unsigned int keylen = len;
- + int sa_size = sizeof(struct saRecord_s);
- + int err = -EINVAL;
- +
- + if (!key || !keylen)
- + return err;
- +
- + ctx->keylen = keylen;
- +
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AES)
- + if (IS_RFC3686(flags)) {
- + if (len < CTR_RFC3686_NONCE_SIZE)
- + return err;
- +
- + keylen = len - CTR_RFC3686_NONCE_SIZE;
- + memcpy(&nonce, key + keylen, CTR_RFC3686_NONCE_SIZE);
- + }
- +#endif
- +
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- + if (flags & MTK_ALG_DES) {
- + ctx->blksize = DES_BLOCK_SIZE;
- + err = verify_skcipher_des_key(ctfm, key);
- + }
- + if (flags & MTK_ALG_3DES) {
- + ctx->blksize = DES3_EDE_BLOCK_SIZE;
- + err = verify_skcipher_des3_key(ctfm, key);
- + }
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AES)
- + if (flags & MTK_ALG_AES) {
- + struct crypto_aes_ctx aes;
- + bool fallback = mtk_skcipher_is_fallback(tfm, flags);
- +
- + if (fallback && !IS_RFC3686(flags)) {
- + err = crypto_skcipher_setkey(ctx->fallback, key,
- + keylen);
- + if (err)
- + return err;
- + }
- +
- + ctx->blksize = AES_BLOCK_SIZE;
- + err = aes_expandkey(&aes, key, keylen);
- + }
- +#endif
- + if (err)
- + return err;
- +
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_in, sa_size,
- + DMA_TO_DEVICE);
- +
- + dma_unmap_single(ctx->mtk->dev, ctx->sa_base_out, sa_size,
- + DMA_TO_DEVICE);
- +
- + mtk_set_saRecord(saRecord, keylen, flags);
- +
- + memcpy(saRecord->saKey, key, keylen);
- + ctx->saNonce = nonce;
- + saRecord->saNonce = nonce;
- + saRecord->saCmd0.bits.direction = 0;
- +
- + memcpy(ctx->sa_in, saRecord, sa_size);
- + ctx->sa_in->saCmd0.bits.direction = 1;
- +
- + ctx->sa_base_out = dma_map_single(ctx->mtk->dev, ctx->sa_out, sa_size,
- + DMA_TO_DEVICE);
- +
- + ctx->sa_base_in = dma_map_single(ctx->mtk->dev, ctx->sa_in, sa_size,
- + DMA_TO_DEVICE);
- + return err;
- +}
- +
- +static int mtk_skcipher_crypt(struct skcipher_request *req, bool encrypt)
- +{
- + struct mtk_cipher_reqctx *rctx = skcipher_request_ctx(req);
- + struct crypto_async_request *async = &req->base;
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
- + struct crypto_skcipher *skcipher = crypto_skcipher_reqtfm(req);
- + bool fallback = mtk_skcipher_is_fallback(req->base.tfm, rctx->flags);
- +
- + if (!req->cryptlen)
- + return 0;
- +
- + /*
- + * ECB and CBC algorithms require message lengths to be
- + * multiples of block size.
- + */
- + if (IS_ECB(rctx->flags) || IS_CBC(rctx->flags))
- + if (!IS_ALIGNED(req->cryptlen,
- + crypto_skcipher_blocksize(skcipher)))
- + return -EINVAL;
- +
- + if (fallback &&
- + req->cryptlen <= (AES_KEYSIZE_128 ?
- + CONFIG_CRYPTO_DEV_EIP93_AES_128_SW_MAX_LEN :
- + CONFIG_CRYPTO_DEV_EIP93_GENERIC_SW_MAX_LEN)) {
- + skcipher_request_set_tfm(&rctx->fallback_req, ctx->fallback);
- + skcipher_request_set_callback(&rctx->fallback_req,
- + req->base.flags,
- + req->base.complete,
- + req->base.data);
- + skcipher_request_set_crypt(&rctx->fallback_req, req->src,
- + req->dst, req->cryptlen, req->iv);
- + return encrypt ? crypto_skcipher_encrypt(&rctx->fallback_req) :
- + crypto_skcipher_decrypt(&rctx->fallback_req);
- + }
- +
- + rctx->assoclen = 0;
- + rctx->textsize = req->cryptlen;
- + rctx->authsize = 0;
- + rctx->sg_src = req->src;
- + rctx->sg_dst = req->dst;
- + rctx->ivsize = crypto_skcipher_ivsize(skcipher);
- + rctx->blksize = ctx->blksize;
- + rctx->flags |= MTK_DESC_SKCIPHER;
- + if (!IS_ECB(rctx->flags))
- + rctx->flags |= MTK_DESC_DMA_IV;
- +
- + return mtk_skcipher_send_req(async);
- +}
- +
- +static int mtk_skcipher_encrypt(struct skcipher_request *req)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
- + struct mtk_cipher_reqctx *rctx = skcipher_request_ctx(req);
- + struct mtk_alg_template *tmpl = container_of(req->base.tfm->__crt_alg,
- + struct mtk_alg_template, alg.skcipher.base);
- +
- + rctx->flags = tmpl->flags;
- + rctx->flags |= MTK_ENCRYPT;
- + rctx->saRecord_base = ctx->sa_base_out;
- +
- + return mtk_skcipher_crypt(req, true);
- +}
- +
- +static int mtk_skcipher_decrypt(struct skcipher_request *req)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
- + struct mtk_cipher_reqctx *rctx = skcipher_request_ctx(req);
- + struct mtk_alg_template *tmpl = container_of(req->base.tfm->__crt_alg,
- + struct mtk_alg_template, alg.skcipher.base);
- +
- + rctx->flags = tmpl->flags;
- + rctx->flags |= MTK_DECRYPT;
- + rctx->saRecord_base = ctx->sa_base_in;
- +
- + return mtk_skcipher_crypt(req, false);
- +}
- +
- +/* Available algorithms in this module */
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AES)
- +struct mtk_alg_template mtk_alg_ecb_aes = {
- + .type = MTK_ALG_TYPE_SKCIPHER,
- + .flags = MTK_MODE_ECB | MTK_ALG_AES,
- + .alg.skcipher = {
- + .setkey = mtk_skcipher_setkey,
- + .encrypt = mtk_skcipher_encrypt,
- + .decrypt = mtk_skcipher_decrypt,
- + .min_keysize = AES_MIN_KEY_SIZE,
- + .max_keysize = AES_MAX_KEY_SIZE,
- + .ivsize = 0,
- + .base = {
- + .cra_name = "ecb(aes)",
- + .cra_driver_name = "ecb(aes-eip93)",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_NEED_FALLBACK |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = AES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0xf,
- + .cra_init = mtk_skcipher_cra_init,
- + .cra_exit = mtk_skcipher_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_cbc_aes = {
- + .type = MTK_ALG_TYPE_SKCIPHER,
- + .flags = MTK_MODE_CBC | MTK_ALG_AES,
- + .alg.skcipher = {
- + .setkey = mtk_skcipher_setkey,
- + .encrypt = mtk_skcipher_encrypt,
- + .decrypt = mtk_skcipher_decrypt,
- + .min_keysize = AES_MIN_KEY_SIZE,
- + .max_keysize = AES_MAX_KEY_SIZE,
- + .ivsize = AES_BLOCK_SIZE,
- + .base = {
- + .cra_name = "cbc(aes)",
- + .cra_driver_name = "cbc(aes-eip93)",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_NEED_FALLBACK |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = AES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0xf,
- + .cra_init = mtk_skcipher_cra_init,
- + .cra_exit = mtk_skcipher_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_ctr_aes = {
- + .type = MTK_ALG_TYPE_SKCIPHER,
- + .flags = MTK_MODE_CTR | MTK_ALG_AES,
- + .alg.skcipher = {
- + .setkey = mtk_skcipher_setkey,
- + .encrypt = mtk_skcipher_encrypt,
- + .decrypt = mtk_skcipher_decrypt,
- + .min_keysize = AES_MIN_KEY_SIZE,
- + .max_keysize = AES_MAX_KEY_SIZE,
- + .ivsize = AES_BLOCK_SIZE,
- + .base = {
- + .cra_name = "ctr(aes)",
- + .cra_driver_name = "ctr(aes-eip93)",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_NEED_FALLBACK |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = 1,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0xf,
- + .cra_init = mtk_skcipher_cra_init,
- + .cra_exit = mtk_skcipher_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_rfc3686_aes = {
- + .type = MTK_ALG_TYPE_SKCIPHER,
- + .flags = MTK_MODE_CTR | MTK_MODE_RFC3686 | MTK_ALG_AES,
- + .alg.skcipher = {
- + .setkey = mtk_skcipher_setkey,
- + .encrypt = mtk_skcipher_encrypt,
- + .decrypt = mtk_skcipher_decrypt,
- + .min_keysize = AES_MIN_KEY_SIZE + CTR_RFC3686_NONCE_SIZE,
- + .max_keysize = AES_MAX_KEY_SIZE + CTR_RFC3686_NONCE_SIZE,
- + .ivsize = CTR_RFC3686_IV_SIZE,
- + .base = {
- + .cra_name = "rfc3686(ctr(aes))",
- + .cra_driver_name = "rfc3686(ctr(aes-eip93))",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_NEED_FALLBACK |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = 1,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0xf,
- + .cra_init = mtk_skcipher_cra_init,
- + .cra_exit = mtk_skcipher_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- +struct mtk_alg_template mtk_alg_ecb_des = {
- + .type = MTK_ALG_TYPE_SKCIPHER,
- + .flags = MTK_MODE_ECB | MTK_ALG_DES,
- + .alg.skcipher = {
- + .setkey = mtk_skcipher_setkey,
- + .encrypt = mtk_skcipher_encrypt,
- + .decrypt = mtk_skcipher_decrypt,
- + .min_keysize = DES_KEY_SIZE,
- + .max_keysize = DES_KEY_SIZE,
- + .ivsize = 0,
- + .base = {
- + .cra_name = "ecb(des)",
- + .cra_driver_name = "ebc(des-eip93)",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_skcipher_cra_init,
- + .cra_exit = mtk_skcipher_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_cbc_des = {
- + .type = MTK_ALG_TYPE_SKCIPHER,
- + .flags = MTK_MODE_CBC | MTK_ALG_DES,
- + .alg.skcipher = {
- + .setkey = mtk_skcipher_setkey,
- + .encrypt = mtk_skcipher_encrypt,
- + .decrypt = mtk_skcipher_decrypt,
- + .min_keysize = DES_KEY_SIZE,
- + .max_keysize = DES_KEY_SIZE,
- + .ivsize = DES_BLOCK_SIZE,
- + .base = {
- + .cra_name = "cbc(des)",
- + .cra_driver_name = "cbc(des-eip93)",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_skcipher_cra_init,
- + .cra_exit = mtk_skcipher_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_ecb_des3_ede = {
- + .type = MTK_ALG_TYPE_SKCIPHER,
- + .flags = MTK_MODE_ECB | MTK_ALG_3DES,
- + .alg.skcipher = {
- + .setkey = mtk_skcipher_setkey,
- + .encrypt = mtk_skcipher_encrypt,
- + .decrypt = mtk_skcipher_decrypt,
- + .min_keysize = DES3_EDE_KEY_SIZE,
- + .max_keysize = DES3_EDE_KEY_SIZE,
- + .ivsize = 0,
- + .base = {
- + .cra_name = "ecb(des3_ede)",
- + .cra_driver_name = "ecb(des3_ede-eip93)",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES3_EDE_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_skcipher_cra_init,
- + .cra_exit = mtk_skcipher_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +
- +struct mtk_alg_template mtk_alg_cbc_des3_ede = {
- + .type = MTK_ALG_TYPE_SKCIPHER,
- + .flags = MTK_MODE_CBC | MTK_ALG_3DES,
- + .alg.skcipher = {
- + .setkey = mtk_skcipher_setkey,
- + .encrypt = mtk_skcipher_encrypt,
- + .decrypt = mtk_skcipher_decrypt,
- + .min_keysize = DES3_EDE_KEY_SIZE,
- + .max_keysize = DES3_EDE_KEY_SIZE,
- + .ivsize = DES3_EDE_BLOCK_SIZE,
- + .base = {
- + .cra_name = "cbc(des3_ede)",
- + .cra_driver_name = "cbc(des3_ede-eip93)",
- + .cra_priority = MTK_CRA_PRIORITY,
- + .cra_flags = CRYPTO_ALG_ASYNC |
- + CRYPTO_ALG_KERN_DRIVER_ONLY,
- + .cra_blocksize = DES3_EDE_BLOCK_SIZE,
- + .cra_ctxsize = sizeof(struct mtk_crypto_ctx),
- + .cra_alignmask = 0,
- + .cra_init = mtk_skcipher_cra_init,
- + .cra_exit = mtk_skcipher_cra_exit,
- + .cra_module = THIS_MODULE,
- + },
- + },
- +};
- +#endif
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-cipher.h
- @@ -0,0 +1,66 @@
- +/* SPDX-License-Identifier: GPL-2.0
- + *
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +#ifndef _EIP93_CIPHER_H_
- +#define _EIP93_CIPHER_H_
- +
- +#include "eip93-main.h"
- +
- +struct mtk_crypto_ctx {
- + struct mtk_device *mtk;
- + struct saRecord_s *sa_in;
- + dma_addr_t sa_base_in;
- + struct saRecord_s *sa_out;
- + dma_addr_t sa_base_out;
- + uint32_t saNonce;
- + int blksize;
- + /* AEAD specific */
- + unsigned int authsize;
- + unsigned int assoclen_in;
- + unsigned int assoclen_out;
- + bool in_first;
- + bool out_first;
- + struct crypto_shash *shash;
- + unsigned int keylen;
- + struct crypto_skcipher *fallback;
- +};
- +
- +struct mtk_cipher_reqctx {
- + unsigned long flags;
- + unsigned int blksize;
- + unsigned int ivsize;
- + unsigned int textsize;
- + unsigned int assoclen;
- + unsigned int authsize;
- + dma_addr_t saRecord_base;
- + struct saState_s *saState;
- + dma_addr_t saState_base;
- + uint32_t saState_idx;
- + struct eip93_descriptor_s *cdesc;
- + struct scatterlist *sg_src;
- + struct scatterlist *sg_dst;
- + int src_nents;
- + int dst_nents;
- + struct saState_s *saState_ctr;
- + dma_addr_t saState_base_ctr;
- + uint32_t saState_ctr_idx;
- + struct skcipher_request fallback_req; // keep at the end
- +};
- +
- +int check_valid_request(struct mtk_cipher_reqctx *rctx);
- +
- +void mtk_unmap_dma(struct mtk_device *mtk, struct mtk_cipher_reqctx *rctx,
- + struct scatterlist *reqsrc, struct scatterlist *reqdst);
- +
- +void mtk_skcipher_handle_result(struct crypto_async_request *async, int err);
- +
- +int mtk_send_req(struct crypto_async_request *async,
- + const u8 *reqiv, struct mtk_cipher_reqctx *rctx);
- +
- +void mtk_handle_result(struct mtk_device *mtk, struct mtk_cipher_reqctx *rctx,
- + u8 *reqiv);
- +
- +#endif /* _EIP93_CIPHER_H_ */
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-common.c
- @@ -0,0 +1,749 @@
- +// SPDX-License-Identifier: GPL-2.0
- +/*
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +
- +#include <crypto/aes.h>
- +#include <crypto/ctr.h>
- +#include <crypto/hmac.h>
- +#include <crypto/sha1.h>
- +#include <crypto/sha2.h>
- +#include <linux/delay.h>
- +#include <linux/dma-mapping.h>
- +#include <linux/scatterlist.h>
- +
- +#include "eip93-cipher.h"
- +#include "eip93-common.h"
- +#include "eip93-main.h"
- +#include "eip93-regs.h"
- +
- +inline void *mtk_ring_next_wptr(struct mtk_device *mtk,
- + struct mtk_desc_ring *ring)
- +{
- + void *ptr = ring->write;
- +
- + if ((ring->write == ring->read - ring->offset) ||
- + (ring->read == ring->base && ring->write == ring->base_end))
- + return ERR_PTR(-ENOMEM);
- +
- + if (ring->write == ring->base_end)
- + ring->write = ring->base;
- + else
- + ring->write += ring->offset;
- +
- + return ptr;
- +}
- +
- +inline void *mtk_ring_next_rptr(struct mtk_device *mtk,
- + struct mtk_desc_ring *ring)
- +{
- + void *ptr = ring->read;
- +
- + if (ring->write == ring->read)
- + return ERR_PTR(-ENOENT);
- +
- + if (ring->read == ring->base_end)
- + ring->read = ring->base;
- + else
- + ring->read += ring->offset;
- +
- + return ptr;
- +}
- +
- +inline int mtk_put_descriptor(struct mtk_device *mtk,
- + struct eip93_descriptor_s *desc)
- +{
- + struct eip93_descriptor_s *cdesc;
- + struct eip93_descriptor_s *rdesc;
- + unsigned long irqflags;
- +
- + spin_lock_irqsave(&mtk->ring->write_lock, irqflags);
- +
- + rdesc = mtk_ring_next_wptr(mtk, &mtk->ring->rdr);
- +
- + if (IS_ERR(rdesc)) {
- + spin_unlock_irqrestore(&mtk->ring->write_lock, irqflags);
- + return -ENOENT;
- + }
- +
- + cdesc = mtk_ring_next_wptr(mtk, &mtk->ring->cdr);
- +
- + if (IS_ERR(cdesc)) {
- + spin_unlock_irqrestore(&mtk->ring->write_lock, irqflags);
- + return -ENOENT;
- + }
- +
- + memset(rdesc, 0, sizeof(struct eip93_descriptor_s));
- + memcpy(cdesc, desc, sizeof(struct eip93_descriptor_s));
- +
- + atomic_dec(&mtk->ring->free);
- + spin_unlock_irqrestore(&mtk->ring->write_lock, irqflags);
- +
- + return 0;
- +}
- +
- +inline void *mtk_get_descriptor(struct mtk_device *mtk)
- +{
- + struct eip93_descriptor_s *cdesc;
- + void *ptr;
- + unsigned long irqflags;
- +
- + spin_lock_irqsave(&mtk->ring->read_lock, irqflags);
- +
- + cdesc = mtk_ring_next_rptr(mtk, &mtk->ring->cdr);
- +
- + if (IS_ERR(cdesc)) {
- + spin_unlock_irqrestore(&mtk->ring->read_lock, irqflags);
- + return ERR_PTR(-ENOENT);
- + }
- +
- + memset(cdesc, 0, sizeof(struct eip93_descriptor_s));
- +
- + ptr = mtk_ring_next_rptr(mtk, &mtk->ring->rdr);
- + if (IS_ERR(ptr)) {
- + spin_unlock_irqrestore(&mtk->ring->read_lock, irqflags);
- + return ERR_PTR(-ENOENT);
- + }
- +
- + atomic_inc(&mtk->ring->free);
- + spin_unlock_irqrestore(&mtk->ring->read_lock, irqflags);
- +
- + return ptr;
- +}
- +
- +inline int mtk_get_free_saState(struct mtk_device *mtk)
- +{
- + struct mtk_state_pool *saState_pool;
- + int i;
- +
- + for (i = 0; i < MTK_RING_SIZE; i++) {
- + saState_pool = &mtk->ring->saState_pool[i];
- + if (saState_pool->in_use == false) {
- + saState_pool->in_use = true;
- + return i;
- + }
- +
- + }
- +
- + return -ENOENT;
- +}
- +
- +static inline void mtk_free_sg_copy(const int len, struct scatterlist **sg)
- +{
- + if (!*sg || !len)
- + return;
- +
- + free_pages((unsigned long)sg_virt(*sg), get_order(len));
- + kfree(*sg);
- + *sg = NULL;
- +}
- +
- +static inline int mtk_make_sg_copy(struct scatterlist *src,
- + struct scatterlist **dst,
- + const uint32_t len, const bool copy)
- +{
- + void *pages;
- +
- + *dst = kmalloc(sizeof(**dst), GFP_KERNEL);
- + if (!*dst)
- + return -ENOMEM;
- +
- +
- + pages = (void *)__get_free_pages(GFP_KERNEL | GFP_DMA,
- + get_order(len));
- +
- + if (!pages) {
- + kfree(*dst);
- + *dst = NULL;
- + return -ENOMEM;
- + }
- +
- + sg_init_table(*dst, 1);
- + sg_set_buf(*dst, pages, len);
- +
- + /* copy only as requested */
- + if (copy)
- + sg_copy_to_buffer(src, sg_nents(src), pages, len);
- +
- + return 0;
- +}
- +
- +static inline bool mtk_is_sg_aligned(struct scatterlist *sg, u32 len,
- + const int blksize)
- +{
- + int nents;
- +
- + for (nents = 0; sg; sg = sg_next(sg), ++nents) {
- + if (!IS_ALIGNED(sg->offset, 4))
- + return false;
- +
- + if (len <= sg->length) {
- + if (!IS_ALIGNED(len, blksize))
- + return false;
- +
- + return true;
- + }
- +
- + if (!IS_ALIGNED(sg->length, blksize))
- + return false;
- +
- + len -= sg->length;
- + }
- + return false;
- +}
- +
- +int check_valid_request(struct mtk_cipher_reqctx *rctx)
- +{
- + struct scatterlist *src = rctx->sg_src;
- + struct scatterlist *dst = rctx->sg_dst;
- + uint32_t src_nents, dst_nents;
- + u32 textsize = rctx->textsize;
- + u32 authsize = rctx->authsize;
- + u32 blksize = rctx->blksize;
- + u32 totlen_src = rctx->assoclen + rctx->textsize;
- + u32 totlen_dst = rctx->assoclen + rctx->textsize;
- + u32 copy_len;
- + bool src_align, dst_align;
- + int err = -EINVAL;
- +
- + if (!IS_CTR(rctx->flags)) {
- + if (!IS_ALIGNED(textsize, blksize))
- + return err;
- + }
- +
- + if (authsize) {
- + if (IS_ENCRYPT(rctx->flags))
- + totlen_dst += authsize;
- + else
- + totlen_src += authsize;
- + }
- +
- + src_nents = sg_nents_for_len(src, totlen_src);
- + dst_nents = sg_nents_for_len(dst, totlen_dst);
- +
- + if (src == dst) {
- + src_nents = max(src_nents, dst_nents);
- + dst_nents = src_nents;
- + if (unlikely((totlen_src || totlen_dst) && (src_nents <= 0)))
- + return err;
- +
- + } else {
- + if (unlikely(totlen_src && (src_nents <= 0)))
- + return err;
- +
- + if (unlikely(totlen_dst && (dst_nents <= 0)))
- + return err;
- + }
- +
- + if (authsize) {
- + if (dst_nents == 1 && src_nents == 1) {
- + src_align = mtk_is_sg_aligned(src, totlen_src, blksize);
- + if (src == dst)
- + dst_align = src_align;
- + else
- + dst_align = mtk_is_sg_aligned(dst,
- + totlen_dst, blksize);
- + } else {
- + src_align = false;
- + dst_align = false;
- + }
- + } else {
- + src_align = mtk_is_sg_aligned(src, totlen_src, blksize);
- + if (src == dst)
- + dst_align = src_align;
- + else
- + dst_align = mtk_is_sg_aligned(dst, totlen_dst, blksize);
- + }
- +
- + copy_len = max(totlen_src, totlen_dst);
- + if (!src_align) {
- + err = mtk_make_sg_copy(src, &rctx->sg_src, copy_len, true);
- + if (err)
- + return err;
- + }
- +
- + if (!dst_align) {
- + err = mtk_make_sg_copy(dst, &rctx->sg_dst, copy_len, false);
- + if (err)
- + return err;
- + }
- +
- + rctx->src_nents = sg_nents_for_len(rctx->sg_src, totlen_src);
- + rctx->dst_nents = sg_nents_for_len(rctx->sg_dst, totlen_dst);
- +
- + return 0;
- +}
- +/*
- + * Set saRecord function:
- + * Even saRecord is set to "0", keep " = 0" for readability.
- + */
- +void mtk_set_saRecord(struct saRecord_s *saRecord, const unsigned int keylen,
- + const u32 flags)
- +{
- + saRecord->saCmd0.bits.ivSource = 2;
- + if (IS_ECB(flags))
- + saRecord->saCmd0.bits.saveIv = 0;
- + else
- + saRecord->saCmd0.bits.saveIv = 1;
- +
- + saRecord->saCmd0.bits.opGroup = 0;
- + saRecord->saCmd0.bits.opCode = 0;
- +
- + switch ((flags & MTK_ALG_MASK)) {
- + case MTK_ALG_AES:
- + saRecord->saCmd0.bits.cipher = 3;
- + saRecord->saCmd1.bits.aesKeyLen = keylen >> 3;
- + break;
- + case MTK_ALG_3DES:
- + saRecord->saCmd0.bits.cipher = 1;
- + break;
- + case MTK_ALG_DES:
- + saRecord->saCmd0.bits.cipher = 0;
- + break;
- + default:
- + saRecord->saCmd0.bits.cipher = 15;
- + }
- +
- + switch ((flags & MTK_HASH_MASK)) {
- + case MTK_HASH_SHA256:
- + saRecord->saCmd0.bits.hash = 3;
- + break;
- + case MTK_HASH_SHA224:
- + saRecord->saCmd0.bits.hash = 2;
- + break;
- + case MTK_HASH_SHA1:
- + saRecord->saCmd0.bits.hash = 1;
- + break;
- + case MTK_HASH_MD5:
- + saRecord->saCmd0.bits.hash = 0;
- + break;
- + default:
- + saRecord->saCmd0.bits.hash = 15;
- + }
- +
- + saRecord->saCmd0.bits.hdrProc = 0;
- + saRecord->saCmd0.bits.padType = 3;
- + saRecord->saCmd0.bits.extPad = 0;
- + saRecord->saCmd0.bits.scPad = 0;
- +
- + switch ((flags & MTK_MODE_MASK)) {
- + case MTK_MODE_CBC:
- + saRecord->saCmd1.bits.cipherMode = 1;
- + break;
- + case MTK_MODE_CTR:
- + saRecord->saCmd1.bits.cipherMode = 2;
- + break;
- + case MTK_MODE_ECB:
- + saRecord->saCmd1.bits.cipherMode = 0;
- + break;
- + }
- +
- + saRecord->saCmd1.bits.byteOffset = 0;
- + saRecord->saCmd1.bits.hashCryptOffset = 0;
- + saRecord->saCmd0.bits.digestLength = 0;
- + saRecord->saCmd1.bits.copyPayload = 0;
- +
- + if (IS_HMAC(flags)) {
- + saRecord->saCmd1.bits.hmac = 1;
- + saRecord->saCmd1.bits.copyDigest = 1;
- + saRecord->saCmd1.bits.copyHeader = 1;
- + } else {
- + saRecord->saCmd1.bits.hmac = 0;
- + saRecord->saCmd1.bits.copyDigest = 0;
- + saRecord->saCmd1.bits.copyHeader = 0;
- + }
- +
- + saRecord->saCmd1.bits.seqNumCheck = 0;
- + saRecord->saSpi = 0x0;
- + saRecord->saSeqNumMask[0] = 0xFFFFFFFF;
- + saRecord->saSeqNumMask[1] = 0x0;
- +}
- +
- +/*
- + * Poor mans Scatter/gather function:
- + * Create a Descriptor for every segment to avoid copying buffers.
- + * For performance better to wait for hardware to perform multiple DMA
- + *
- + */
- +static inline int mtk_scatter_combine(struct mtk_device *mtk,
- + struct mtk_cipher_reqctx *rctx,
- + u32 datalen, u32 split, int offsetin)
- +{
- + struct eip93_descriptor_s *cdesc = rctx->cdesc;
- + struct scatterlist *sgsrc = rctx->sg_src;
- + struct scatterlist *sgdst = rctx->sg_dst;
- + unsigned int remainin = sg_dma_len(sgsrc);
- + unsigned int remainout = sg_dma_len(sgdst);
- + dma_addr_t saddr = sg_dma_address(sgsrc);
- + dma_addr_t daddr = sg_dma_address(sgdst);
- + dma_addr_t stateAddr;
- + u32 srcAddr, dstAddr, len, n;
- + bool nextin = false;
- + bool nextout = false;
- + int offsetout = 0;
- + int ndesc_cdr = 0, err;
- +
- + if (IS_ECB(rctx->flags))
- + rctx->saState_base = 0;
- +
- + if (split < datalen) {
- + stateAddr = rctx->saState_base_ctr;
- + n = split;
- + } else {
- + stateAddr = rctx->saState_base;
- + n = datalen;
- + }
- +
- + do {
- + if (nextin) {
- + sgsrc = sg_next(sgsrc);
- + remainin = sg_dma_len(sgsrc);
- + if (remainin == 0)
- + continue;
- +
- + saddr = sg_dma_address(sgsrc);
- + offsetin = 0;
- + nextin = false;
- + }
- +
- + if (nextout) {
- + sgdst = sg_next(sgdst);
- + remainout = sg_dma_len(sgdst);
- + if (remainout == 0)
- + continue;
- +
- + daddr = sg_dma_address(sgdst);
- + offsetout = 0;
- + nextout = false;
- + }
- + srcAddr = saddr + offsetin;
- + dstAddr = daddr + offsetout;
- +
- + if (remainin == remainout) {
- + len = remainin;
- + if (len > n) {
- + len = n;
- + remainin -= n;
- + remainout -= n;
- + offsetin += n;
- + offsetout += n;
- + } else {
- + nextin = true;
- + nextout = true;
- + }
- + } else if (remainin < remainout) {
- + len = remainin;
- + if (len > n) {
- + len = n;
- + remainin -= n;
- + remainout -= n;
- + offsetin += n;
- + offsetout += n;
- + } else {
- + offsetout += len;
- + remainout -= len;
- + nextin = true;
- + }
- + } else {
- + len = remainout;
- + if (len > n) {
- + len = n;
- + remainin -= n;
- + remainout -= n;
- + offsetin += n;
- + offsetout += n;
- + } else {
- + offsetin += len;
- + remainin -= len;
- + nextout = true;
- + }
- + }
- + n -= len;
- +
- + cdesc->srcAddr = srcAddr;
- + cdesc->dstAddr = dstAddr;
- + cdesc->stateAddr = stateAddr;
- + cdesc->peLength.bits.peReady = 0;
- + cdesc->peLength.bits.byPass = 0;
- + cdesc->peLength.bits.length = len;
- + cdesc->peLength.bits.hostReady = 1;
- +
- + if (n == 0) {
- + n = datalen - split;
- + split = datalen;
- + stateAddr = rctx->saState_base;
- + }
- +
- + if (n == 0)
- + cdesc->userId |= MTK_DESC_LAST;
- +
- + /* Loop - Delay - No need to rollback
- + * Maybe refine by slowing down at MTK_RING_BUSY
- + */
- +again:
- + err = mtk_put_descriptor(mtk, cdesc);
- + if (err) {
- + udelay(500);
- + goto again;
- + }
- + /* Writing new descriptor count starts DMA action */
- + writel(1, mtk->base + EIP93_REG_PE_CD_COUNT);
- +
- + ndesc_cdr++;
- + } while (n);
- +
- + return -EINPROGRESS;
- +}
- +
- +int mtk_send_req(struct crypto_async_request *async,
- + const u8 *reqiv, struct mtk_cipher_reqctx *rctx)
- +{
- + struct mtk_crypto_ctx *ctx = crypto_tfm_ctx(async->tfm);
- + struct mtk_device *mtk = ctx->mtk;
- + struct scatterlist *src = rctx->sg_src;
- + struct scatterlist *dst = rctx->sg_dst;
- + struct saState_s *saState;
- + struct mtk_state_pool *saState_pool;
- + struct eip93_descriptor_s cdesc;
- + u32 flags = rctx->flags;
- + int idx;
- + int offsetin = 0, err = -ENOMEM;
- + u32 datalen = rctx->assoclen + rctx->textsize;
- + u32 split = datalen;
- + u32 start, end, ctr, blocks;
- + u32 iv[AES_BLOCK_SIZE / sizeof(u32)];
- +
- + rctx->saState_ctr = NULL;
- + rctx->saState = NULL;
- +
- + if (IS_ECB(flags))
- + goto skip_iv;
- +
- + memcpy(iv, reqiv, rctx->ivsize);
- +
- + if (!IS_ALIGNED((u32)reqiv, rctx->ivsize) || IS_RFC3686(flags)) {
- + rctx->flags &= ~MTK_DESC_DMA_IV;
- + flags = rctx->flags;
- + }
- +
- + if (IS_DMA_IV(flags)) {
- + rctx->saState = (void *)reqiv;
- + } else {
- + idx = mtk_get_free_saState(mtk);
- + if (idx < 0)
- + goto send_err;
- + saState_pool = &mtk->ring->saState_pool[idx];
- + rctx->saState_idx = idx;
- + rctx->saState = saState_pool->base;
- + rctx->saState_base = saState_pool->base_dma;
- + memcpy(rctx->saState->stateIv, iv, rctx->ivsize);
- + }
- +
- + saState = rctx->saState;
- +
- + if (IS_RFC3686(flags)) {
- + saState->stateIv[0] = ctx->saNonce;
- + saState->stateIv[1] = iv[0];
- + saState->stateIv[2] = iv[1];
- + saState->stateIv[3] = cpu_to_be32(1);
- + } else if (!IS_HMAC(flags) && IS_CTR(flags)) {
- + /* Compute data length. */
- + blocks = DIV_ROUND_UP(rctx->textsize, AES_BLOCK_SIZE);
- + ctr = be32_to_cpu(iv[3]);
- + /* Check 32bit counter overflow. */
- + start = ctr;
- + end = start + blocks - 1;
- + if (end < start) {
- + split = AES_BLOCK_SIZE * -start;
- + /*
- + * Increment the counter manually to cope with
- + * the hardware counter overflow.
- + */
- + iv[3] = 0xffffffff;
- + crypto_inc((u8 *)iv, AES_BLOCK_SIZE);
- + idx = mtk_get_free_saState(mtk);
- + if (idx < 0)
- + goto free_state;
- + saState_pool = &mtk->ring->saState_pool[idx];
- + rctx->saState_ctr_idx = idx;
- + rctx->saState_ctr = saState_pool->base;
- + rctx->saState_base_ctr = saState_pool->base_dma;
- +
- + memcpy(rctx->saState_ctr->stateIv, reqiv, rctx->ivsize);
- + memcpy(saState->stateIv, iv, rctx->ivsize);
- + }
- + }
- +
- + if (IS_DMA_IV(flags)) {
- + rctx->saState_base = dma_map_single(mtk->dev, (void *)reqiv,
- + rctx->ivsize, DMA_TO_DEVICE);
- + if (dma_mapping_error(mtk->dev, rctx->saState_base))
- + goto free_state;
- + }
- +skip_iv:
- + cdesc.peCrtlStat.bits.hostReady = 1;
- + cdesc.peCrtlStat.bits.prngMode = 0;
- + cdesc.peCrtlStat.bits.hashFinal = 0;
- + cdesc.peCrtlStat.bits.padCrtlStat = 0;
- + cdesc.peCrtlStat.bits.peReady = 0;
- + cdesc.saAddr = rctx->saRecord_base;
- + cdesc.arc4Addr = (uint32_t)async;
- + cdesc.userId = flags;
- + rctx->cdesc = &cdesc;
- +
- + /* map DMA_BIDIRECTIONAL to invalidate cache on destination
- + * implies __dma_cache_wback_inv
- + */
- + dma_map_sg(mtk->dev, dst, rctx->dst_nents, DMA_BIDIRECTIONAL);
- + if (src != dst)
- + dma_map_sg(mtk->dev, src, rctx->src_nents, DMA_TO_DEVICE);
- +
- + err = mtk_scatter_combine(mtk, rctx, datalen, split, offsetin);
- +
- + return err;
- +
- +free_state:
- + if (rctx->saState) {
- + saState_pool = &mtk->ring->saState_pool[rctx->saState_idx];
- + saState_pool->in_use = false;
- + }
- +
- + if (rctx->saState_ctr) {
- + saState_pool = &mtk->ring->saState_pool[rctx->saState_ctr_idx];
- + saState_pool->in_use = false;
- + }
- +send_err:
- + return err;
- +}
- +
- +void mtk_unmap_dma(struct mtk_device *mtk, struct mtk_cipher_reqctx *rctx,
- + struct scatterlist *reqsrc, struct scatterlist *reqdst)
- +{
- + u32 len = rctx->assoclen + rctx->textsize;
- + u32 authsize = rctx->authsize;
- + u32 flags = rctx->flags;
- + u32 *otag;
- + int i;
- +
- + if (rctx->sg_src == rctx->sg_dst) {
- + dma_unmap_sg(mtk->dev, rctx->sg_dst, rctx->dst_nents,
- + DMA_BIDIRECTIONAL);
- + goto process_tag;
- + }
- +
- + dma_unmap_sg(mtk->dev, rctx->sg_src, rctx->src_nents,
- + DMA_TO_DEVICE);
- +
- + if (rctx->sg_src != reqsrc)
- + mtk_free_sg_copy(len + rctx->authsize, &rctx->sg_src);
- +
- + dma_unmap_sg(mtk->dev, rctx->sg_dst, rctx->dst_nents,
- + DMA_BIDIRECTIONAL);
- +
- + /* SHA tags need conversion from net-to-host */
- +process_tag:
- + if (IS_DECRYPT(flags))
- + authsize = 0;
- +
- + if (authsize) {
- + if (!IS_HASH_MD5(flags)) {
- + otag = sg_virt(rctx->sg_dst) + len;
- + for (i = 0; i < (authsize / 4); i++)
- + otag[i] = ntohl(otag[i]);
- + }
- + }
- +
- + if (rctx->sg_dst != reqdst) {
- + sg_copy_from_buffer(reqdst, sg_nents(reqdst),
- + sg_virt(rctx->sg_dst), len + authsize);
- + mtk_free_sg_copy(len + rctx->authsize, &rctx->sg_dst);
- + }
- +}
- +
- +void mtk_handle_result(struct mtk_device *mtk, struct mtk_cipher_reqctx *rctx,
- + u8 *reqiv)
- +{
- + struct mtk_state_pool *saState_pool;
- +
- + if (IS_DMA_IV(rctx->flags))
- + dma_unmap_single(mtk->dev, rctx->saState_base, rctx->ivsize,
- + DMA_TO_DEVICE);
- +
- + if (!IS_ECB(rctx->flags))
- + memcpy(reqiv, rctx->saState->stateIv, rctx->ivsize);
- +
- + if ((rctx->saState) && !(IS_DMA_IV(rctx->flags))) {
- + saState_pool = &mtk->ring->saState_pool[rctx->saState_idx];
- + saState_pool->in_use = false;
- + }
- +
- + if (rctx->saState_ctr) {
- + saState_pool = &mtk->ring->saState_pool[rctx->saState_ctr_idx];
- + saState_pool->in_use = false;
- + }
- +}
- +
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_HMAC)
- +/* basically this is set hmac - key */
- +int mtk_authenc_setkey(struct crypto_shash *cshash, struct saRecord_s *sa,
- + const u8 *authkey, unsigned int authkeylen)
- +{
- + int bs = crypto_shash_blocksize(cshash);
- + int ds = crypto_shash_digestsize(cshash);
- + int ss = crypto_shash_statesize(cshash);
- + u8 *ipad, *opad;
- + unsigned int i, err;
- +
- + SHASH_DESC_ON_STACK(shash, cshash);
- +
- + shash->tfm = cshash;
- +
- + /* auth key
- + *
- + * EIP93 can only authenticate with hash of the key
- + * do software shash until EIP93 hash function complete.
- + */
- + ipad = kcalloc(2, SHA256_BLOCK_SIZE + ss, GFP_KERNEL);
- + if (!ipad)
- + return -ENOMEM;
- +
- + opad = ipad + SHA256_BLOCK_SIZE + ss;
- +
- + if (authkeylen > bs) {
- + err = crypto_shash_digest(shash, authkey,
- + authkeylen, ipad);
- + if (err)
- + return err;
- +
- + authkeylen = ds;
- + } else
- + memcpy(ipad, authkey, authkeylen);
- +
- + memset(ipad + authkeylen, 0, bs - authkeylen);
- + memcpy(opad, ipad, bs);
- +
- + for (i = 0; i < bs; i++) {
- + ipad[i] ^= HMAC_IPAD_VALUE;
- + opad[i] ^= HMAC_OPAD_VALUE;
- + }
- +
- + err = crypto_shash_init(shash) ?:
- + crypto_shash_update(shash, ipad, bs) ?:
- + crypto_shash_export(shash, ipad) ?:
- + crypto_shash_init(shash) ?:
- + crypto_shash_update(shash, opad, bs) ?:
- + crypto_shash_export(shash, opad);
- +
- + if (err)
- + return err;
- +
- + /* add auth key */
- + memcpy(&sa->saIDigest, ipad, SHA256_DIGEST_SIZE);
- + memcpy(&sa->saODigest, opad, SHA256_DIGEST_SIZE);
- +
- + kfree(ipad);
- + return 0;
- +}
- +#endif
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-common.h
- @@ -0,0 +1,28 @@
- +/* SPDX-License-Identifier: GPL-2.0
- + *
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +
- +#ifndef _EIP93_COMMON_H_
- +#define _EIP93_COMMON_H_
- +
- +#include "eip93-main.h"
- +
- +inline int mtk_put_descriptor(struct mtk_device *mtk,
- + struct eip93_descriptor_s *desc);
- +
- +inline void *mtk_get_descriptor(struct mtk_device *mtk);
- +
- +inline int mtk_get_free_saState(struct mtk_device *mtk);
- +
- +void mtk_set_saRecord(struct saRecord_s *saRecord, const unsigned int keylen,
- + const u32 flags);
- +
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_HMAC)
- +int mtk_authenc_setkey(struct crypto_shash *cshash, struct saRecord_s *sa,
- + const u8 *authkey, unsigned int authkeylen);
- +#endif
- +
- +#endif /* _EIP93_COMMON_H_ */
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-des.h
- @@ -0,0 +1,15 @@
- +/* SPDX-License-Identifier: GPL-2.0
- + *
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +#ifndef _EIP93_DES_H_
- +#define _EIP93_DES_H_
- +
- +extern struct mtk_alg_template mtk_alg_ecb_des;
- +extern struct mtk_alg_template mtk_alg_cbc_des;
- +extern struct mtk_alg_template mtk_alg_ecb_des3_ede;
- +extern struct mtk_alg_template mtk_alg_cbc_des3_ede;
- +
- +#endif /* _EIP93_DES_H_ */
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-main.c
- @@ -0,0 +1,467 @@
- +// SPDX-License-Identifier: GPL-2.0
- +/*
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +
- +#include <linux/atomic.h>
- +#include <linux/clk.h>
- +#include <linux/delay.h>
- +#include <linux/dma-mapping.h>
- +#include <linux/interrupt.h>
- +#include <linux/module.h>
- +#include <linux/of_device.h>
- +#include <linux/platform_device.h>
- +#include <linux/spinlock.h>
- +
- +#include "eip93-main.h"
- +#include "eip93-regs.h"
- +#include "eip93-common.h"
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_SKCIPHER)
- +#include "eip93-cipher.h"
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AES)
- +#include "eip93-aes.h"
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- +#include "eip93-des.h"
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AEAD)
- +#include "eip93-aead.h"
- +#endif
- +
- +static struct mtk_alg_template *mtk_algs[] = {
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- + &mtk_alg_ecb_des,
- + &mtk_alg_cbc_des,
- + &mtk_alg_ecb_des3_ede,
- + &mtk_alg_cbc_des3_ede,
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AES)
- + &mtk_alg_ecb_aes,
- + &mtk_alg_cbc_aes,
- + &mtk_alg_ctr_aes,
- + &mtk_alg_rfc3686_aes,
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AEAD)
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- + &mtk_alg_authenc_hmac_md5_cbc_des,
- + &mtk_alg_authenc_hmac_sha1_cbc_des,
- + &mtk_alg_authenc_hmac_sha224_cbc_des,
- + &mtk_alg_authenc_hmac_sha256_cbc_des,
- + &mtk_alg_authenc_hmac_md5_cbc_des3_ede,
- + &mtk_alg_authenc_hmac_sha1_cbc_des3_ede,
- + &mtk_alg_authenc_hmac_sha224_cbc_des3_ede,
- + &mtk_alg_authenc_hmac_sha256_cbc_des3_ede,
- +#endif
- + &mtk_alg_authenc_hmac_md5_cbc_aes,
- + &mtk_alg_authenc_hmac_sha1_cbc_aes,
- + &mtk_alg_authenc_hmac_sha224_cbc_aes,
- + &mtk_alg_authenc_hmac_sha256_cbc_aes,
- + &mtk_alg_authenc_hmac_md5_rfc3686_aes,
- + &mtk_alg_authenc_hmac_sha1_rfc3686_aes,
- + &mtk_alg_authenc_hmac_sha224_rfc3686_aes,
- + &mtk_alg_authenc_hmac_sha256_rfc3686_aes,
- +#endif
- +};
- +
- +inline void mtk_irq_disable(struct mtk_device *mtk, u32 mask)
- +{
- + __raw_writel(mask, mtk->base + EIP93_REG_MASK_DISABLE);
- +}
- +
- +inline void mtk_irq_enable(struct mtk_device *mtk, u32 mask)
- +{
- + __raw_writel(mask, mtk->base + EIP93_REG_MASK_ENABLE);
- +}
- +
- +inline void mtk_irq_clear(struct mtk_device *mtk, u32 mask)
- +{
- + __raw_writel(mask, mtk->base + EIP93_REG_INT_CLR);
- +}
- +
- +static void mtk_unregister_algs(unsigned int i)
- +{
- + unsigned int j;
- +
- + for (j = 0; j < i; j++) {
- + switch (mtk_algs[j]->type) {
- + case MTK_ALG_TYPE_SKCIPHER:
- + crypto_unregister_skcipher(&mtk_algs[j]->alg.skcipher);
- + break;
- + case MTK_ALG_TYPE_AEAD:
- + crypto_unregister_aead(&mtk_algs[j]->alg.aead);
- + break;
- + }
- + }
- +}
- +
- +static int mtk_register_algs(struct mtk_device *mtk)
- +{
- + unsigned int i;
- + int err = 0;
- +
- + for (i = 0; i < ARRAY_SIZE(mtk_algs); i++) {
- + mtk_algs[i]->mtk = mtk;
- +
- + switch (mtk_algs[i]->type) {
- + case MTK_ALG_TYPE_SKCIPHER:
- + err = crypto_register_skcipher(&mtk_algs[i]->alg.skcipher);
- + break;
- + case MTK_ALG_TYPE_AEAD:
- + err = crypto_register_aead(&mtk_algs[i]->alg.aead);
- + break;
- + }
- + if (err)
- + goto fail;
- + }
- +
- + return 0;
- +
- +fail:
- + mtk_unregister_algs(i);
- +
- + return err;
- +}
- +
- +static void mtk_handle_result_descriptor(struct mtk_device *mtk)
- +{
- + struct crypto_async_request *async;
- + struct eip93_descriptor_s *rdesc;
- + bool last_entry;
- + u32 flags;
- + int handled, ready, err;
- + union peCrtlStat_w done1;
- + union peLength_w done2;
- +
- +get_more:
- + handled = 0;
- +
- + ready = readl(mtk->base + EIP93_REG_PE_RD_COUNT) & GENMASK(10, 0);
- +
- + if (!ready) {
- + mtk_irq_clear(mtk, EIP93_INT_PE_RDRTHRESH_REQ);
- + mtk_irq_enable(mtk, EIP93_INT_PE_RDRTHRESH_REQ);
- + return;
- + }
- +
- + last_entry = false;
- +
- + while (ready) {
- + rdesc = mtk_get_descriptor(mtk);
- + if (IS_ERR(rdesc)) {
- + dev_err(mtk->dev, "Ndesc: %d nreq: %d\n",
- + handled, ready);
- + err = -EIO;
- + break;
- + }
- + /* make sure DMA is finished writing */
- + do {
- + done1.word = READ_ONCE(rdesc->peCrtlStat.word);
- + done2.word = READ_ONCE(rdesc->peLength.word);
- + } while ((!done1.bits.peReady) || (!done2.bits.peReady));
- +
- + err = rdesc->peCrtlStat.bits.errStatus;
- +
- + flags = rdesc->userId;
- + async = (struct crypto_async_request *)rdesc->arc4Addr;
- +
- + writel(1, mtk->base + EIP93_REG_PE_RD_COUNT);
- + mtk_irq_clear(mtk, EIP93_INT_PE_RDRTHRESH_REQ);
- +
- + handled++;
- + ready--;
- +
- + if (flags & MTK_DESC_LAST) {
- + last_entry = true;
- + break;
- + }
- + }
- +
- + if (!last_entry)
- + goto get_more;
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_SKCIPHER)
- + if (flags & MTK_DESC_SKCIPHER)
- + mtk_skcipher_handle_result(async, err);
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AEAD)
- + if (flags & MTK_DESC_AEAD)
- + mtk_aead_handle_result(async, err);
- +#endif
- + goto get_more;
- +}
- +
- +static void mtk_done_task(unsigned long data)
- +{
- + struct mtk_device *mtk = (struct mtk_device *)data;
- +
- + mtk_handle_result_descriptor(mtk);
- +}
- +
- +static irqreturn_t mtk_irq_handler(int irq, void *dev_id)
- +{
- + struct mtk_device *mtk = (struct mtk_device *)dev_id;
- + u32 irq_status;
- +
- + irq_status = readl(mtk->base + EIP93_REG_INT_MASK_STAT);
- +
- + if (irq_status & EIP93_INT_PE_RDRTHRESH_REQ) {
- + mtk_irq_disable(mtk, EIP93_INT_PE_RDRTHRESH_REQ);
- + tasklet_schedule(&mtk->ring->done_task);
- + return IRQ_HANDLED;
- + }
- +
- + mtk_irq_clear(mtk, irq_status);
- + if (irq_status)
- + mtk_irq_disable(mtk, irq_status);
- +
- + return IRQ_NONE;
- +}
- +
- +static void mtk_initialize(struct mtk_device *mtk)
- +{
- + union peConfig_w peConfig;
- + union peEndianCfg_w peEndianCfg;
- + union peIntCfg_w peIntCfg;
- + union peClockCfg_w peClockCfg;
- + union peBufThresh_w peBufThresh;
- + union peRingThresh_w peRingThresh;
- +
- + /* Reset Engine and setup Mode */
- + peConfig.word = 0;
- + peConfig.bits.resetPE = 1;
- + peConfig.bits.resetRing = 1;
- + peConfig.bits.peMode = 3;
- + peConfig.bits.enCDRupdate = 1;
- +
- + writel(peConfig.word, mtk->base + EIP93_REG_PE_CONFIG);
- +
- + udelay(10);
- +
- + peConfig.bits.resetPE = 0;
- + peConfig.bits.resetRing = 0;
- +
- + writel(peConfig.word, mtk->base + EIP93_REG_PE_CONFIG);
- +
- + /* Initialize the BYTE_ORDER_CFG register */
- + peEndianCfg.word = 0;
- + writel(peEndianCfg.word, mtk->base + EIP93_REG_PE_ENDIAN_CONFIG);
- +
- + /* Initialize the INT_CFG register */
- + peIntCfg.word = 0;
- + writel(peIntCfg.word, mtk->base + EIP93_REG_INT_CFG);
- +
- + /* Config Clocks */
- + peClockCfg.word = 0;
- + peClockCfg.bits.enPEclk = 1;
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_DES)
- + peClockCfg.bits.enDESclk = 1;
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_AES)
- + peClockCfg.bits.enAESclk = 1;
- +#endif
- +#if IS_ENABLED(CONFIG_CRYPTO_DEV_EIP93_HMAC)
- + peClockCfg.bits.enHASHclk = 1;
- +#endif
- + writel(peClockCfg.word, mtk->base + EIP93_REG_PE_CLOCK_CTRL);
- +
- + /* Config DMA thresholds */
- + peBufThresh.word = 0;
- + peBufThresh.bits.inputBuffer = 128;
- + peBufThresh.bits.outputBuffer = 128;
- +
- + writel(peBufThresh.word, mtk->base + EIP93_REG_PE_BUF_THRESH);
- +
- + /* Clear/ack all interrupts before disable all */
- + mtk_irq_clear(mtk, 0xFFFFFFFF);
- + mtk_irq_disable(mtk, 0xFFFFFFFF);
- +
- + /* Config Ring Threshold */
- + peRingThresh.word = 0;
- + peRingThresh.bits.CDRThresh = MTK_RING_SIZE - MTK_RING_BUSY;
- + peRingThresh.bits.RDRThresh = 0;
- + peRingThresh.bits.RDTimeout = 5;
- + peRingThresh.bits.enTimeout = 1;
- +
- + writel(peRingThresh.word, mtk->base + EIP93_REG_PE_RING_THRESH);
- +}
- +
- +static void mtk_desc_free(struct mtk_device *mtk)
- +{
- + writel(0, mtk->base + EIP93_REG_PE_RING_CONFIG);
- + writel(0, mtk->base + EIP93_REG_PE_CDR_BASE);
- + writel(0, mtk->base + EIP93_REG_PE_RDR_BASE);
- +}
- +
- +static int mtk_set_ring(struct mtk_device *mtk, struct mtk_desc_ring *ring,
- + int Offset)
- +{
- + ring->offset = Offset;
- + ring->base = dmam_alloc_coherent(mtk->dev, Offset * MTK_RING_SIZE,
- + &ring->base_dma, GFP_KERNEL);
- + if (!ring->base)
- + return -ENOMEM;
- +
- + ring->write = ring->base;
- + ring->base_end = ring->base + Offset * (MTK_RING_SIZE - 1);
- + ring->read = ring->base;
- +
- + return 0;
- +}
- +
- +static int mtk_desc_init(struct mtk_device *mtk)
- +{
- + struct mtk_state_pool *saState_pool;
- + struct mtk_desc_ring *cdr = &mtk->ring->cdr;
- + struct mtk_desc_ring *rdr = &mtk->ring->rdr;
- + union peRingCfg_w peRingCfg;
- + int RingOffset, err, i;
- +
- + RingOffset = sizeof(struct eip93_descriptor_s);
- +
- + err = mtk_set_ring(mtk, cdr, RingOffset);
- + if (err)
- + return err;
- +
- + err = mtk_set_ring(mtk, rdr, RingOffset);
- + if (err)
- + return err;
- +
- + writel((u32)cdr->base_dma, mtk->base + EIP93_REG_PE_CDR_BASE);
- + writel((u32)rdr->base_dma, mtk->base + EIP93_REG_PE_RDR_BASE);
- +
- + peRingCfg.word = 0;
- + peRingCfg.bits.ringSize = MTK_RING_SIZE - 1;
- + peRingCfg.bits.ringOffset = RingOffset / 4;
- +
- + writel(peRingCfg.word, mtk->base + EIP93_REG_PE_RING_CONFIG);
- +
- + atomic_set(&mtk->ring->free, MTK_RING_SIZE - 1);
- + /* Create State record DMA pool */
- + RingOffset = sizeof(struct saState_s);
- + mtk->ring->saState = dmam_alloc_coherent(mtk->dev,
- + RingOffset * MTK_RING_SIZE,
- + &mtk->ring->saState_dma, GFP_KERNEL);
- + if (!mtk->ring->saState)
- + return -ENOMEM;
- +
- + mtk->ring->saState_pool = devm_kcalloc(mtk->dev, 1,
- + sizeof(struct mtk_state_pool) * MTK_RING_SIZE,
- + GFP_KERNEL);
- +
- + for (i = 0; i < MTK_RING_SIZE; i++) {
- + saState_pool = &mtk->ring->saState_pool[i];
- + saState_pool->base = mtk->ring->saState + (i * RingOffset);
- + saState_pool->base_dma = mtk->ring->saState_dma + (i * RingOffset);
- + saState_pool->in_use = false;
- + }
- +
- + return 0;
- +}
- +
- +static void mtk_cleanup(struct mtk_device *mtk)
- +{
- + tasklet_kill(&mtk->ring->done_task);
- +
- + /* Clear/ack all interrupts before disable all */
- + mtk_irq_clear(mtk, 0xFFFFFFFF);
- + mtk_irq_disable(mtk, 0xFFFFFFFF);
- +
- + writel(0, mtk->base + EIP93_REG_PE_CLOCK_CTRL);
- +
- + mtk_desc_free(mtk);
- +}
- +
- +static int mtk_crypto_probe(struct platform_device *pdev)
- +{
- + struct device *dev = &pdev->dev;
- + struct mtk_device *mtk;
- + struct resource *res;
- + int err;
- +
- + mtk = devm_kzalloc(dev, sizeof(*mtk), GFP_KERNEL);
- + if (!mtk)
- + return -ENOMEM;
- +
- + mtk->dev = dev;
- + platform_set_drvdata(pdev, mtk);
- +
- + res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
- + mtk->base = devm_ioremap_resource(&pdev->dev, res);
- +
- + if (IS_ERR(mtk->base))
- + return PTR_ERR(mtk->base);
- +
- + mtk->irq = platform_get_irq(pdev, 0);
- +
- + if (mtk->irq < 0)
- + return mtk->irq;
- +
- + err = devm_request_threaded_irq(mtk->dev, mtk->irq, mtk_irq_handler,
- + NULL, IRQF_ONESHOT,
- + dev_name(mtk->dev), mtk);
- +
- + mtk->ring = devm_kcalloc(mtk->dev, 1, sizeof(*mtk->ring), GFP_KERNEL);
- +
- + if (!mtk->ring)
- + return -ENOMEM;
- +
- + err = mtk_desc_init(mtk);
- + if (err)
- + return err;
- +
- + tasklet_init(&mtk->ring->done_task, mtk_done_task, (unsigned long)mtk);
- +
- + spin_lock_init(&mtk->ring->read_lock);
- + spin_lock_init(&mtk->ring->write_lock);
- +
- + mtk_initialize(mtk);
- +
- + /* Init. finished, enable RDR interupt */
- + mtk_irq_enable(mtk, EIP93_INT_PE_RDRTHRESH_REQ);
- +
- + err = mtk_register_algs(mtk);
- + if (err) {
- + mtk_cleanup(mtk);
- + return err;
- + }
- +
- + dev_info(mtk->dev, "EIP93 Crypto Engine Initialized.");
- +
- + return 0;
- +}
- +
- +static int mtk_crypto_remove(struct platform_device *pdev)
- +{
- + struct mtk_device *mtk = platform_get_drvdata(pdev);
- +
- + mtk_unregister_algs(ARRAY_SIZE(mtk_algs));
- + mtk_cleanup(mtk);
- + dev_info(mtk->dev, "EIP93 removed.\n");
- +
- + return 0;
- +}
- +
- +#if defined(CONFIG_OF)
- +static const struct of_device_id mtk_crypto_of_match[] = {
- + { .compatible = "mediatek,mtk-eip93", },
- + {}
- +};
- +MODULE_DEVICE_TABLE(of, mtk_crypto_of_match);
- +#endif
- +
- +static struct platform_driver mtk_crypto_driver = {
- + .probe = mtk_crypto_probe,
- + .remove = mtk_crypto_remove,
- + .driver = {
- + .name = "mtk-eip93",
- + .of_match_table = of_match_ptr(mtk_crypto_of_match),
- + },
- +};
- +module_platform_driver(mtk_crypto_driver);
- +
- +MODULE_AUTHOR("Richard van Schagen <[email protected]>");
- +MODULE_ALIAS("platform:" KBUILD_MODNAME);
- +MODULE_DESCRIPTION("Mediatek EIP-93 crypto engine driver");
- +MODULE_LICENSE("GPL v2");
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-main.h
- @@ -0,0 +1,146 @@
- +/* SPDX-License-Identifier: GPL-2.0
- + *
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +#ifndef _EIP93_MAIN_H_
- +#define _EIP93_MAIN_H_
- +
- +#include <crypto/internal/aead.h>
- +#include <crypto/internal/hash.h>
- +#include <crypto/internal/rng.h>
- +#include <crypto/internal/skcipher.h>
- +#include <linux/device.h>
- +#include <linux/interrupt.h>
- +
- +#define MTK_RING_SIZE 512
- +#define MTK_RING_BUSY 32
- +#define MTK_CRA_PRIORITY 1500
- +
- +/* cipher algorithms */
- +#define MTK_ALG_DES BIT(0)
- +#define MTK_ALG_3DES BIT(1)
- +#define MTK_ALG_AES BIT(2)
- +#define MTK_ALG_MASK GENMASK(2, 0)
- +/* hash and hmac algorithms */
- +#define MTK_HASH_MD5 BIT(3)
- +#define MTK_HASH_SHA1 BIT(4)
- +#define MTK_HASH_SHA224 BIT(5)
- +#define MTK_HASH_SHA256 BIT(6)
- +#define MTK_HASH_HMAC BIT(7)
- +#define MTK_HASH_MASK GENMASK(6, 3)
- +/* cipher modes */
- +#define MTK_MODE_CBC BIT(8)
- +#define MTK_MODE_ECB BIT(9)
- +#define MTK_MODE_CTR BIT(10)
- +#define MTK_MODE_RFC3686 BIT(11)
- +#define MTK_MODE_MASK GENMASK(10, 8)
- +
- +/* cipher encryption/decryption operations */
- +#define MTK_ENCRYPT BIT(12)
- +#define MTK_DECRYPT BIT(13)
- +
- +#define MTK_BUSY BIT(14)
- +
- +/* descriptor flags */
- +#define MTK_DESC_ASYNC BIT(31)
- +#define MTK_DESC_SKCIPHER BIT(30)
- +#define MTK_DESC_AEAD BIT(29)
- +#define MTK_DESC_AHASH BIT(28)
- +#define MTK_DESC_PRNG BIT(27)
- +#define MTK_DESC_FAKE_HMAC BIT(26)
- +#define MTK_DESC_LAST BIT(25)
- +#define MTK_DESC_FINISH BIT(24)
- +#define MTK_DESC_IPSEC BIT(23)
- +#define MTK_DESC_DMA_IV BIT(22)
- +
- +#define IS_DES(flags) (flags & MTK_ALG_DES)
- +#define IS_3DES(flags) (flags & MTK_ALG_3DES)
- +#define IS_AES(flags) (flags & MTK_ALG_AES)
- +
- +#define IS_HASH_MD5(flags) (flags & MTK_HASH_MD5)
- +#define IS_HASH_SHA1(flags) (flags & MTK_HASH_SHA1)
- +#define IS_HASH_SHA224(flags) (flags & MTK_HASH_SHA224)
- +#define IS_HASH_SHA256(flags) (flags & MTK_HASH_SHA256)
- +#define IS_HMAC(flags) (flags & MTK_HASH_HMAC)
- +
- +#define IS_CBC(mode) (mode & MTK_MODE_CBC)
- +#define IS_ECB(mode) (mode & MTK_MODE_ECB)
- +#define IS_CTR(mode) (mode & MTK_MODE_CTR)
- +#define IS_RFC3686(mode) (mode & MTK_MODE_RFC3686)
- +
- +#define IS_BUSY(flags) (flags & MTK_BUSY)
- +#define IS_DMA_IV(flags) (flags & MTK_DESC_DMA_IV)
- +
- +#define IS_ENCRYPT(dir) (dir & MTK_ENCRYPT)
- +#define IS_DECRYPT(dir) (dir & MTK_DECRYPT)
- +
- +#define IS_CIPHER(flags) (flags & (MTK_ALG_DES || \
- + MTK_ALG_3DES || \
- + MTK_ALG_AES))
- +
- +#define IS_HASH(flags) (flags & (MTK_HASH_MD5 || \
- + MTK_HASH_SHA1 || \
- + MTK_HASH_SHA224 || \
- + MTK_HASH_SHA256))
- +
- +/**
- + * struct mtk_device - crypto engine device structure
- + */
- +struct mtk_device {
- + void __iomem *base;
- + struct device *dev;
- + struct clk *clk;
- + int irq;
- + struct mtk_ring *ring;
- + struct mtk_state_pool *saState_pool;
- +};
- +
- +struct mtk_desc_ring {
- + void *base;
- + void *base_end;
- + dma_addr_t base_dma;
- + /* write and read pointers */
- + void *read;
- + void *write;
- + /* descriptor element offset */
- + u32 offset;
- +};
- +
- +struct mtk_state_pool {
- + void *base;
- + dma_addr_t base_dma;
- + bool in_use;
- +};
- +
- +struct mtk_ring {
- + struct tasklet_struct done_task;
- + /* command/result rings */
- + struct mtk_desc_ring cdr;
- + struct mtk_desc_ring rdr;
- + spinlock_t write_lock;
- + spinlock_t read_lock;
- + atomic_t free;
- + /* saState */
- + struct mtk_state_pool *saState_pool;
- + void *saState;
- + dma_addr_t saState_dma;
- +};
- +
- +enum mtk_alg_type {
- + MTK_ALG_TYPE_AEAD,
- + MTK_ALG_TYPE_SKCIPHER,
- +};
- +
- +struct mtk_alg_template {
- + struct mtk_device *mtk;
- + enum mtk_alg_type type;
- + u32 flags;
- + union {
- + struct aead_alg aead;
- + struct skcipher_alg skcipher;
- + } alg;
- +};
- +
- +#endif /* _EIP93_MAIN_H_ */
- --- /dev/null
- +++ b/drivers/crypto/mtk-eip93/eip93-regs.h
- @@ -0,0 +1,382 @@
- +/* SPDX-License-Identifier: GPL-2.0 */
- +/*
- + * Copyright (C) 2019 - 2021
- + *
- + * Richard van Schagen <[email protected]>
- + */
- +#ifndef REG_EIP93_H
- +#define REG_EIP93_H
- +
- +#define EIP93_REG_WIDTH 4
- +/*-----------------------------------------------------------------------------
- + * Register Map
- + */
- +#define DESP_BASE 0x0000000
- +#define EIP93_REG_PE_CTRL_STAT ((DESP_BASE)+(0x00 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_SOURCE_ADDR ((DESP_BASE)+(0x01 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_DEST_ADDR ((DESP_BASE)+(0x02 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_SA_ADDR ((DESP_BASE)+(0x03 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_ADDR ((DESP_BASE)+(0x04 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_USER_ID ((DESP_BASE)+(0x06 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_LENGTH ((DESP_BASE)+(0x07 * EIP93_REG_WIDTH))
- +
- +//PACKET ENGINE RING configuration registers
- +#define PE_RNG_BASE 0x0000080
- +
- +#define EIP93_REG_PE_CDR_BASE ((PE_RNG_BASE)+(0x00 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_RDR_BASE ((PE_RNG_BASE)+(0x01 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_RING_CONFIG ((PE_RNG_BASE)+(0x02 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_RING_THRESH ((PE_RNG_BASE)+(0x03 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_CD_COUNT ((PE_RNG_BASE)+(0x04 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_RD_COUNT ((PE_RNG_BASE)+(0x05 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_RING_RW_PNTR ((PE_RNG_BASE)+(0x06 * EIP93_REG_WIDTH))
- +
- +//PACKET ENGINE configuration registers
- +#define PE_CFG_BASE 0x0000100
- +#define EIP93_REG_PE_CONFIG ((PE_CFG_BASE)+(0x00 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_STATUS ((PE_CFG_BASE)+(0x01 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_BUF_THRESH ((PE_CFG_BASE)+(0x03 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_INBUF_COUNT ((PE_CFG_BASE)+(0x04 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_OUTBUF_COUNT ((PE_CFG_BASE)+(0x05 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_BUF_RW_PNTR ((PE_CFG_BASE)+(0x06 * EIP93_REG_WIDTH))
- +
- +//PACKET ENGINE endian config
- +#define EN_CFG_BASE 0x00001CC
- +#define EIP93_REG_PE_ENDIAN_CONFIG ((EN_CFG_BASE)+(0x00 * EIP93_REG_WIDTH))
- +
- +//EIP93 CLOCK control registers
- +#define CLOCK_BASE 0x01E8
- +#define EIP93_REG_PE_CLOCK_CTRL ((CLOCK_BASE)+(0x00 * EIP93_REG_WIDTH))
- +
- +//EIP93 Device Option and Revision Register
- +#define REV_BASE 0x01F4
- +#define EIP93_REG_PE_OPTION_1 ((REV_BASE)+(0x00 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_OPTION_0 ((REV_BASE)+(0x01 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PE_REVISION ((REV_BASE)+(0x02 * EIP93_REG_WIDTH))
- +
- +//EIP93 Interrupt Control Register
- +#define INT_BASE 0x0200
- +#define EIP93_REG_INT_UNMASK_STAT ((INT_BASE)+(0x00 * EIP93_REG_WIDTH))
- +#define EIP93_REG_INT_MASK_STAT ((INT_BASE)+(0x01 * EIP93_REG_WIDTH))
- +#define EIP93_REG_INT_CLR ((INT_BASE)+(0x01 * EIP93_REG_WIDTH))
- +#define EIP93_REG_INT_MASK ((INT_BASE)+(0x02 * EIP93_REG_WIDTH))
- +#define EIP93_REG_INT_CFG ((INT_BASE)+(0x03 * EIP93_REG_WIDTH))
- +#define EIP93_REG_MASK_ENABLE ((INT_BASE)+(0X04 * EIP93_REG_WIDTH))
- +#define EIP93_REG_MASK_DISABLE ((INT_BASE)+(0X05 * EIP93_REG_WIDTH))
- +
- +//EIP93 SA Record register
- +#define SA_BASE 0x0400
- +#define EIP93_REG_SA_CMD_0 ((SA_BASE)+(0x00 * EIP93_REG_WIDTH))
- +#define EIP93_REG_SA_CMD_1 ((SA_BASE)+(0x01 * EIP93_REG_WIDTH))
- +
- +//#define EIP93_REG_SA_READY ((SA_BASE)+(31 * EIP93_REG_WIDTH))
- +
- +//State save register
- +#define STATE_BASE 0x0500
- +#define EIP93_REG_STATE_IV_0 ((STATE_BASE)+(0x00 * EIP93_REG_WIDTH))
- +#define EIP93_REG_STATE_IV_1 ((STATE_BASE)+(0x01 * EIP93_REG_WIDTH))
- +
- +#define EIP93_PE_ARC4STATE_BASEADDR_REG 0x0700
- +
- +//RAM buffer start address
- +#define EIP93_INPUT_BUFFER 0x0800
- +#define EIP93_OUTPUT_BUFFER 0x0800
- +
- +//EIP93 PRNG Configuration Register
- +#define PRNG_BASE 0x0300
- +#define EIP93_REG_PRNG_STAT ((PRNG_BASE)+(0x00 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_CTRL ((PRNG_BASE)+(0x01 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_SEED_0 ((PRNG_BASE)+(0x02 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_SEED_1 ((PRNG_BASE)+(0x03 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_SEED_2 ((PRNG_BASE)+(0x04 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_SEED_3 ((PRNG_BASE)+(0x05 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_KEY_0 ((PRNG_BASE)+(0x06 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_KEY_1 ((PRNG_BASE)+(0x07 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_KEY_2 ((PRNG_BASE)+(0x08 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_KEY_3 ((PRNG_BASE)+(0x09 * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_RES_0 ((PRNG_BASE)+(0x0A * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_RES_1 ((PRNG_BASE)+(0x0B * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_RES_2 ((PRNG_BASE)+(0x0C * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_RES_3 ((PRNG_BASE)+(0x0D * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_LFSR_0 ((PRNG_BASE)+(0x0E * EIP93_REG_WIDTH))
- +#define EIP93_REG_PRNG_LFSR_1 ((PRNG_BASE)+(0x0F * EIP93_REG_WIDTH))
- +
- +/*-----------------------------------------------------------------------------
- + * Constants & masks
- + */
- +
- +#define EIP93_SUPPORTED_INTERRUPTS_MASK 0xffff7f00
- +#define EIP93_PRNG_DT_TEXT_LOWERHALF 0xDEAD
- +#define EIP93_PRNG_DT_TEXT_UPPERHALF 0xC0DE
- +#define EIP93_10BITS_MASK 0X3FF
- +#define EIP93_12BITS_MASK 0XFFF
- +#define EIP93_4BITS_MASK 0X04
- +#define EIP93_20BITS_MASK 0xFFFFF
- +
- +#define EIP93_MIN_DESC_DONE_COUNT 0
- +#define EIP93_MAX_DESC_DONE_COUNT 15
- +
- +#define EIP93_MIN_DESC_PENDING_COUNT 0
- +#define EIP93_MAX_DESC_PENDING_COUNT 1023
- +
- +#define EIP93_MIN_TIMEOUT_COUNT 0
- +#define EIP93_MAX_TIMEOUT_COUNT 15
- +
- +#define EIP93_MIN_PE_INPUT_THRESHOLD 1
- +#define EIP93_MAX_PE_INPUT_THRESHOLD 511
- +
- +#define EIP93_MIN_PE_OUTPUT_THRESHOLD 1
- +#define EIP93_MAX_PE_OUTPUT_THRESHOLD 432
- +
- +#define EIP93_MIN_PE_RING_SIZE 1
- +#define EIP93_MAX_PE_RING_SIZE 1023
- +
- +#define EIP93_MIN_PE_DESCRIPTOR_SIZE 7
- +#define EIP93_MAX_PE_DESCRIPTOR_SIZE 15
- +
- +//3DES keys,seed,known data and its result
- +#define EIP93_KEY_0 0x133b3454
- +#define EIP93_KEY_1 0x5e5b890b
- +#define EIP93_KEY_2 0x5eb30757
- +#define EIP93_KEY_3 0x93ab15f7
- +#define EIP93_SEED_0 0x62c4bf5e
- +#define EIP93_SEED_1 0x972667c8
- +#define EIP93_SEED_2 0x6345bf67
- +#define EIP93_SEED_3 0xcb3482bf
- +#define EIP93_LFSR_0 0xDEADC0DE
- +#define EIP93_LFSR_1 0xBEEFF00D
- +
- +/*-----------------------------------------------------------------------------
- + * EIP93 device initialization specifics
- + */
- +
- +/*----------------------------------------------------------------------------
- + * Byte Order Reversal Mechanisms Supported in EIP93
- + * EIP93_BO_REVERSE_HALF_WORD : reverse the byte order within a half-word
- + * EIP93_BO_REVERSE_WORD : reverse the byte order within a word
- + * EIP93_BO_REVERSE_DUAL_WORD : reverse the byte order within a dual-word
- + * EIP93_BO_REVERSE_QUAD_WORD : reverse the byte order within a quad-word
- + */
- +enum EIP93_Byte_Order_Value_t {
- + EIP93_BO_REVERSE_HALF_WORD = 1,
- + EIP93_BO_REVERSE_WORD = 2,
- + EIP93_BO_REVERSE_DUAL_WORD = 4,
- + EIP93_BO_REVERSE_QUAD_WORD = 8,
- +};
- +
- +/*----------------------------------------------------------------------------
- + * Byte Order Reversal Mechanisms Supported in EIP93 for Target Data
- + * EIP93_BO_REVERSE_HALF_WORD : reverse the byte order within a half-word
- + * EIP93_BO_REVERSE_WORD : reverse the byte order within a word
- + */
- +enum EIP93_Byte_Order_Value_TD_t {
- + EIP93_BO_REVERSE_HALF_WORD_TD = 1,
- + EIP93_BO_REVERSE_WORD_TD = 2,
- +};
- +
- +// BYTE_ORDER_CFG register values
- +#define EIP93_BYTE_ORDER_PD EIP93_BO_REVERSE_WORD
- +#define EIP93_BYTE_ORDER_SA EIP93_BO_REVERSE_WORD
- +#define EIP93_BYTE_ORDER_DATA EIP93_BO_REVERSE_WORD
- +#define EIP93_BYTE_ORDER_TD EIP93_BO_REVERSE_WORD_TD
- +
- +// INT_CFG register values
- +#define EIP93_INT_HOST_OUTPUT_TYPE 0
- +#define EIP93_INT_PULSE_CLEAR 0
- +
- +/*
- + * Interrupts of EIP93
- + */
- +
- +enum EIP93_InterruptSource_t {
- + EIP93_INT_PE_CDRTHRESH_REQ = BIT(0),
- + EIP93_INT_PE_RDRTHRESH_REQ = BIT(1),
- + EIP93_INT_PE_OPERATION_DONE = BIT(9),
- + EIP93_INT_PE_INBUFTHRESH_REQ = BIT(10),
- + EIP93_INT_PE_OUTBURTHRSH_REQ = BIT(11),
- + EIP93_INT_PE_PRNG_IRQ = BIT(12),
- + EIP93_INT_PE_ERR_REG = BIT(13),
- + EIP93_INT_PE_RD_DONE_IRQ = BIT(16),
- +};
- +
- +union peConfig_w {
- + u32 word;
- + struct {
- + u32 resetPE :1;
- + u32 resetRing :1;
- + u32 reserved :6;
- + u32 peMode :2;
- + u32 enCDRupdate :1;
- + u32 reserved2 :5;
- + u32 swapCDRD :1;
- + u32 swapSA :1;
- + u32 swapData :1;
- + u32 reserved3 :13;
- + } bits;
- +} __packed;
- +
- +union peEndianCfg_w {
- + u32 word;
- + struct {
- + u32 masterByteSwap :8;
- + u32 reserved :8;
- + u32 targetByteSwap :8;
- + u32 reserved2 :8;
- + } bits;
- +} __packed;
- +
- +union peIntCfg_w {
- + u32 word;
- + struct {
- + u32 PulseClear :1;
- + u32 IntType :1;
- + u32 reserved :30;
- + } bits;
- +} __packed;
- +
- +union peClockCfg_w {
- + u32 word;
- + struct {
- + u32 enPEclk :1;
- + u32 enDESclk :1;
- + u32 enAESclk :1;
- + u32 reserved :1;
- + u32 enHASHclk :1;
- + u32 reserved2 :27;
- + } bits;
- +} __packed;
- +
- +union peBufThresh_w {
- + u32 word;
- + struct {
- + u32 inputBuffer :8;
- + u32 reserved :8;
- + u32 outputBuffer :8;
- + u32 reserved2 :8;
- + } bits;
- +} __packed;
- +
- +union peRingThresh_w {
- + u32 word;
- + struct {
- + u32 CDRThresh :10;
- + u32 reserved :6;
- + u32 RDRThresh :10;
- + u32 RDTimeout :4;
- + u32 reserved2 :1;
- + u32 enTimeout :1;
- + } bits;
- +} __packed;
- +
- +union peRingCfg_w {
- + u32 word;
- + struct {
- + u32 ringSize :10;
- + u32 reserved :6;
- + u32 ringOffset :8;
- + u32 reserved2 :8;
- + } bits;
- +} __packed;
- +
- +union saCmd0 {
- + u32 word;
- + struct {
- + u32 opCode :3;
- + u32 direction :1;
- + u32 opGroup :2;
- + u32 padType :2;
- + u32 cipher :4;
- + u32 hash :4;
- + u32 reserved2 :1;
- + u32 scPad :1;
- + u32 extPad :1;
- + u32 hdrProc :1;
- + u32 digestLength :4;
- + u32 ivSource :2;
- + u32 hashSource :2;
- + u32 saveIv :1;
- + u32 saveHash :1;
- + u32 reserved1 :2;
- + } bits;
- +} __packed;
- +
- +union saCmd1 {
- + u32 word;
- + struct {
- + u32 copyDigest :1;
- + u32 copyHeader :1;
- + u32 copyPayload :1;
- + u32 copyPad :1;
- + u32 reserved4 :4;
- + u32 cipherMode :2;
- + u32 reserved3 :1;
- + u32 sslMac :1;
- + u32 hmac :1;
- + u32 byteOffset :1;
- + u32 reserved2 :2;
- + u32 hashCryptOffset :8;
- + u32 aesKeyLen :3;
- + u32 reserved1 :1;
- + u32 aesDecKey :1;
- + u32 seqNumCheck :1;
- + u32 reserved0 :2;
- + } bits;
- +} __packed;
- +
- +struct saRecord_s {
- + union saCmd0 saCmd0;
- + union saCmd1 saCmd1;
- + u32 saKey[8];
- + u32 saIDigest[8];
- + u32 saODigest[8];
- + u32 saSpi;
- + u32 saSeqNum[2];
- + u32 saSeqNumMask[2];
- + u32 saNonce;
- +} __packed;
- +
- +struct saState_s {
- + u32 stateIv[4];
- + u32 stateByteCnt[2];
- + u32 stateIDigest[8];
- +} __packed;
- +
- +union peCrtlStat_w {
- + u32 word;
- + struct {
- + u32 hostReady :1;
- + u32 peReady :1;
- + u32 reserved :1;
- + u32 initArc4 :1;
- + u32 hashFinal :1;
- + u32 haltMode :1;
- + u32 prngMode :2;
- + u32 padValue :8;
- + u32 errStatus :8;
- + u32 padCrtlStat :8;
- + } bits;
- +} __packed;
- +
- +union peLength_w {
- + u32 word;
- + struct {
- + u32 length :20;
- + u32 reserved :2;
- + u32 hostReady :1;
- + u32 peReady :1;
- + u32 byPass :8;
- + } bits;
- +} __packed;
- +
- +struct eip93_descriptor_s {
- + union peCrtlStat_w peCrtlStat;
- + u32 srcAddr;
- + u32 dstAddr;
- + u32 saAddr;
- + u32 stateAddr;
- + u32 arc4Addr;
- + u32 userId;
- + union peLength_w peLength;
- +} __packed;
- +
- +#endif
- --- a/drivers/crypto/Kconfig
- +++ b/drivers/crypto/Kconfig
- @@ -797,4 +797,6 @@ config CRYPTO_DEV_SA2UL
- source "drivers/crypto/aspeed/Kconfig"
- source "drivers/crypto/starfive/Kconfig"
-
- +source "drivers/crypto/mtk-eip93/Kconfig"
- +
- endif # CRYPTO_HW
- --- a/drivers/crypto/Makefile
- +++ b/drivers/crypto/Makefile
- @@ -51,3 +51,4 @@ obj-y += hisilicon/
- obj-$(CONFIG_CRYPTO_DEV_AMLOGIC_GXL) += amlogic/
- obj-y += intel/
- obj-y += starfive/
- +obj-$(CONFIG_CRYPTO_DEV_EIP93) += mtk-eip93/
|