omap-sham.c 54 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Cryptographic API.
  4. *
  5. * Support for OMAP SHA1/MD5 HW acceleration.
  6. *
  7. * Copyright (c) 2010 Nokia Corporation
  8. * Author: Dmitry Kasatkin <dmitry.kasatkin@nokia.com>
  9. * Copyright (c) 2011 Texas Instruments Incorporated
  10. *
  11. * Some ideas are from old omap-sha1-md5.c driver.
  12. */
  13. #define pr_fmt(fmt) "%s: " fmt, __func__
  14. #include <crypto/engine.h>
  15. #include <crypto/hmac.h>
  16. #include <crypto/internal/hash.h>
  17. #include <crypto/scatterwalk.h>
  18. #include <crypto/sha1.h>
  19. #include <crypto/sha2.h>
  20. #include <linux/err.h>
  21. #include <linux/device.h>
  22. #include <linux/dma-mapping.h>
  23. #include <linux/dmaengine.h>
  24. #include <linux/init.h>
  25. #include <linux/interrupt.h>
  26. #include <linux/io.h>
  27. #include <linux/irq.h>
  28. #include <linux/kernel.h>
  29. #include <linux/module.h>
  30. #include <linux/of.h>
  31. #include <linux/of_address.h>
  32. #include <linux/of_irq.h>
  33. #include <linux/platform_device.h>
  34. #include <linux/pm_runtime.h>
  35. #include <linux/scatterlist.h>
  36. #include <linux/slab.h>
  37. #include <linux/string.h>
  38. #define MD5_DIGEST_SIZE 16
  39. #define SHA_REG_IDIGEST(dd, x) ((dd)->pdata->idigest_ofs + ((x)*0x04))
  40. #define SHA_REG_DIN(dd, x) ((dd)->pdata->din_ofs + ((x) * 0x04))
  41. #define SHA_REG_DIGCNT(dd) ((dd)->pdata->digcnt_ofs)
  42. #define SHA_REG_ODIGEST(dd, x) ((dd)->pdata->odigest_ofs + (x * 0x04))
  43. #define SHA_REG_CTRL 0x18
  44. #define SHA_REG_CTRL_LENGTH (0xFFFFFFFF << 5)
  45. #define SHA_REG_CTRL_CLOSE_HASH (1 << 4)
  46. #define SHA_REG_CTRL_ALGO_CONST (1 << 3)
  47. #define SHA_REG_CTRL_ALGO (1 << 2)
  48. #define SHA_REG_CTRL_INPUT_READY (1 << 1)
  49. #define SHA_REG_CTRL_OUTPUT_READY (1 << 0)
  50. #define SHA_REG_REV(dd) ((dd)->pdata->rev_ofs)
  51. #define SHA_REG_MASK(dd) ((dd)->pdata->mask_ofs)
  52. #define SHA_REG_MASK_DMA_EN (1 << 3)
  53. #define SHA_REG_MASK_IT_EN (1 << 2)
  54. #define SHA_REG_MASK_SOFTRESET (1 << 1)
  55. #define SHA_REG_AUTOIDLE (1 << 0)
  56. #define SHA_REG_SYSSTATUS(dd) ((dd)->pdata->sysstatus_ofs)
  57. #define SHA_REG_SYSSTATUS_RESETDONE (1 << 0)
  58. #define SHA_REG_MODE(dd) ((dd)->pdata->mode_ofs)
  59. #define SHA_REG_MODE_HMAC_OUTER_HASH (1 << 7)
  60. #define SHA_REG_MODE_HMAC_KEY_PROC (1 << 5)
  61. #define SHA_REG_MODE_CLOSE_HASH (1 << 4)
  62. #define SHA_REG_MODE_ALGO_CONSTANT (1 << 3)
  63. #define SHA_REG_MODE_ALGO_MASK (7 << 0)
  64. #define SHA_REG_MODE_ALGO_MD5_128 (0 << 1)
  65. #define SHA_REG_MODE_ALGO_SHA1_160 (1 << 1)
  66. #define SHA_REG_MODE_ALGO_SHA2_224 (2 << 1)
  67. #define SHA_REG_MODE_ALGO_SHA2_256 (3 << 1)
  68. #define SHA_REG_MODE_ALGO_SHA2_384 (1 << 0)
  69. #define SHA_REG_MODE_ALGO_SHA2_512 (3 << 0)
  70. #define SHA_REG_LENGTH(dd) ((dd)->pdata->length_ofs)
  71. #define SHA_REG_IRQSTATUS 0x118
  72. #define SHA_REG_IRQSTATUS_CTX_RDY (1 << 3)
  73. #define SHA_REG_IRQSTATUS_PARTHASH_RDY (1 << 2)
  74. #define SHA_REG_IRQSTATUS_INPUT_RDY (1 << 1)
  75. #define SHA_REG_IRQSTATUS_OUTPUT_RDY (1 << 0)
  76. #define SHA_REG_IRQENA 0x11C
  77. #define SHA_REG_IRQENA_CTX_RDY (1 << 3)
  78. #define SHA_REG_IRQENA_PARTHASH_RDY (1 << 2)
  79. #define SHA_REG_IRQENA_INPUT_RDY (1 << 1)
  80. #define SHA_REG_IRQENA_OUTPUT_RDY (1 << 0)
  81. #define DEFAULT_TIMEOUT_INTERVAL HZ
  82. #define DEFAULT_AUTOSUSPEND_DELAY 1000
  83. /* mostly device flags */
  84. #define FLAGS_FINAL 1
  85. #define FLAGS_DMA_ACTIVE 2
  86. #define FLAGS_OUTPUT_READY 3
  87. #define FLAGS_CPU 5
  88. #define FLAGS_DMA_READY 6
  89. #define FLAGS_AUTO_XOR 7
  90. #define FLAGS_BE32_SHA1 8
  91. #define FLAGS_SGS_COPIED 9
  92. #define FLAGS_SGS_ALLOCED 10
  93. #define FLAGS_HUGE 11
  94. /* context flags */
  95. #define FLAGS_FINUP 16
  96. #define FLAGS_MODE_SHIFT 18
  97. #define FLAGS_MODE_MASK (SHA_REG_MODE_ALGO_MASK << FLAGS_MODE_SHIFT)
  98. #define FLAGS_MODE_MD5 (SHA_REG_MODE_ALGO_MD5_128 << FLAGS_MODE_SHIFT)
  99. #define FLAGS_MODE_SHA1 (SHA_REG_MODE_ALGO_SHA1_160 << FLAGS_MODE_SHIFT)
  100. #define FLAGS_MODE_SHA224 (SHA_REG_MODE_ALGO_SHA2_224 << FLAGS_MODE_SHIFT)
  101. #define FLAGS_MODE_SHA256 (SHA_REG_MODE_ALGO_SHA2_256 << FLAGS_MODE_SHIFT)
  102. #define FLAGS_MODE_SHA384 (SHA_REG_MODE_ALGO_SHA2_384 << FLAGS_MODE_SHIFT)
  103. #define FLAGS_MODE_SHA512 (SHA_REG_MODE_ALGO_SHA2_512 << FLAGS_MODE_SHIFT)
  104. #define FLAGS_HMAC 21
  105. #define FLAGS_ERROR 22
  106. #define OP_UPDATE 1
  107. #define OP_FINAL 2
  108. #define OMAP_ALIGN_MASK (sizeof(u32)-1)
  109. #define OMAP_ALIGNED __attribute__((aligned(sizeof(u32))))
  110. #define BUFLEN SHA512_BLOCK_SIZE
  111. #define OMAP_SHA_DMA_THRESHOLD 256
  112. #define OMAP_SHA_MAX_DMA_LEN (1024 * 2048)
  113. struct omap_sham_dev;
  114. struct omap_sham_reqctx {
  115. struct omap_sham_dev *dd;
  116. unsigned long flags;
  117. u8 op;
  118. u8 digest[SHA512_DIGEST_SIZE] OMAP_ALIGNED;
  119. size_t digcnt;
  120. size_t bufcnt;
  121. size_t buflen;
  122. /* walk state */
  123. struct scatterlist *sg;
  124. struct scatterlist sgl[2];
  125. int offset; /* offset in current sg */
  126. int sg_len;
  127. unsigned int total; /* total request */
  128. u8 buffer[] OMAP_ALIGNED;
  129. };
  130. struct omap_sham_hmac_ctx {
  131. struct crypto_shash *shash;
  132. u8 ipad[SHA512_BLOCK_SIZE] OMAP_ALIGNED;
  133. u8 opad[SHA512_BLOCK_SIZE] OMAP_ALIGNED;
  134. };
  135. struct omap_sham_ctx {
  136. unsigned long flags;
  137. /* fallback stuff */
  138. struct crypto_shash *fallback;
  139. struct omap_sham_hmac_ctx base[];
  140. };
  141. #define OMAP_SHAM_QUEUE_LENGTH 10
  142. struct omap_sham_algs_info {
  143. struct ahash_engine_alg *algs_list;
  144. unsigned int size;
  145. unsigned int registered;
  146. };
  147. struct omap_sham_pdata {
  148. struct omap_sham_algs_info *algs_info;
  149. unsigned int algs_info_size;
  150. unsigned long flags;
  151. int digest_size;
  152. void (*copy_hash)(struct ahash_request *req, int out);
  153. void (*write_ctrl)(struct omap_sham_dev *dd, size_t length,
  154. int final, int dma);
  155. void (*trigger)(struct omap_sham_dev *dd, size_t length);
  156. int (*poll_irq)(struct omap_sham_dev *dd);
  157. irqreturn_t (*intr_hdlr)(int irq, void *dev_id);
  158. u32 odigest_ofs;
  159. u32 idigest_ofs;
  160. u32 din_ofs;
  161. u32 digcnt_ofs;
  162. u32 rev_ofs;
  163. u32 mask_ofs;
  164. u32 sysstatus_ofs;
  165. u32 mode_ofs;
  166. u32 length_ofs;
  167. u32 major_mask;
  168. u32 major_shift;
  169. u32 minor_mask;
  170. u32 minor_shift;
  171. };
  172. struct omap_sham_dev {
  173. struct list_head list;
  174. unsigned long phys_base;
  175. struct device *dev;
  176. void __iomem *io_base;
  177. int irq;
  178. int err;
  179. struct dma_chan *dma_lch;
  180. struct tasklet_struct done_task;
  181. u8 polling_mode;
  182. u8 xmit_buf[BUFLEN] OMAP_ALIGNED;
  183. unsigned long flags;
  184. int fallback_sz;
  185. struct crypto_queue queue;
  186. struct ahash_request *req;
  187. struct crypto_engine *engine;
  188. const struct omap_sham_pdata *pdata;
  189. };
  190. struct omap_sham_drv {
  191. struct list_head dev_list;
  192. spinlock_t lock;
  193. unsigned long flags;
  194. };
  195. static struct omap_sham_drv sham = {
  196. .dev_list = LIST_HEAD_INIT(sham.dev_list),
  197. .lock = __SPIN_LOCK_UNLOCKED(sham.lock),
  198. };
  199. static int omap_sham_enqueue(struct ahash_request *req, unsigned int op);
  200. static void omap_sham_finish_req(struct ahash_request *req, int err);
  201. static inline u32 omap_sham_read(struct omap_sham_dev *dd, u32 offset)
  202. {
  203. return __raw_readl(dd->io_base + offset);
  204. }
  205. static inline void omap_sham_write(struct omap_sham_dev *dd,
  206. u32 offset, u32 value)
  207. {
  208. __raw_writel(value, dd->io_base + offset);
  209. }
  210. static inline void omap_sham_write_mask(struct omap_sham_dev *dd, u32 address,
  211. u32 value, u32 mask)
  212. {
  213. u32 val;
  214. val = omap_sham_read(dd, address);
  215. val &= ~mask;
  216. val |= value;
  217. omap_sham_write(dd, address, val);
  218. }
  219. static inline int omap_sham_wait(struct omap_sham_dev *dd, u32 offset, u32 bit)
  220. {
  221. unsigned long timeout = jiffies + DEFAULT_TIMEOUT_INTERVAL;
  222. while (!(omap_sham_read(dd, offset) & bit)) {
  223. if (time_is_before_jiffies(timeout))
  224. return -ETIMEDOUT;
  225. }
  226. return 0;
  227. }
  228. static void omap_sham_copy_hash_omap2(struct ahash_request *req, int out)
  229. {
  230. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  231. struct omap_sham_dev *dd = ctx->dd;
  232. u32 *hash = (u32 *)ctx->digest;
  233. int i;
  234. for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) {
  235. if (out)
  236. hash[i] = omap_sham_read(dd, SHA_REG_IDIGEST(dd, i));
  237. else
  238. omap_sham_write(dd, SHA_REG_IDIGEST(dd, i), hash[i]);
  239. }
  240. }
  241. static void omap_sham_copy_hash_omap4(struct ahash_request *req, int out)
  242. {
  243. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  244. struct omap_sham_dev *dd = ctx->dd;
  245. int i;
  246. if (ctx->flags & BIT(FLAGS_HMAC)) {
  247. struct crypto_ahash *tfm = crypto_ahash_reqtfm(dd->req);
  248. struct omap_sham_ctx *tctx = crypto_ahash_ctx(tfm);
  249. struct omap_sham_hmac_ctx *bctx = tctx->base;
  250. u32 *opad = (u32 *)bctx->opad;
  251. for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) {
  252. if (out)
  253. opad[i] = omap_sham_read(dd,
  254. SHA_REG_ODIGEST(dd, i));
  255. else
  256. omap_sham_write(dd, SHA_REG_ODIGEST(dd, i),
  257. opad[i]);
  258. }
  259. }
  260. omap_sham_copy_hash_omap2(req, out);
  261. }
  262. static void omap_sham_copy_ready_hash(struct ahash_request *req)
  263. {
  264. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  265. u32 *in = (u32 *)ctx->digest;
  266. u32 *hash = (u32 *)req->result;
  267. int i, d, big_endian = 0;
  268. if (!hash)
  269. return;
  270. switch (ctx->flags & FLAGS_MODE_MASK) {
  271. case FLAGS_MODE_MD5:
  272. d = MD5_DIGEST_SIZE / sizeof(u32);
  273. break;
  274. case FLAGS_MODE_SHA1:
  275. /* OMAP2 SHA1 is big endian */
  276. if (test_bit(FLAGS_BE32_SHA1, &ctx->dd->flags))
  277. big_endian = 1;
  278. d = SHA1_DIGEST_SIZE / sizeof(u32);
  279. break;
  280. case FLAGS_MODE_SHA224:
  281. d = SHA224_DIGEST_SIZE / sizeof(u32);
  282. break;
  283. case FLAGS_MODE_SHA256:
  284. d = SHA256_DIGEST_SIZE / sizeof(u32);
  285. break;
  286. case FLAGS_MODE_SHA384:
  287. d = SHA384_DIGEST_SIZE / sizeof(u32);
  288. break;
  289. case FLAGS_MODE_SHA512:
  290. d = SHA512_DIGEST_SIZE / sizeof(u32);
  291. break;
  292. default:
  293. d = 0;
  294. }
  295. if (big_endian)
  296. for (i = 0; i < d; i++)
  297. put_unaligned(be32_to_cpup((__be32 *)in + i), &hash[i]);
  298. else
  299. for (i = 0; i < d; i++)
  300. put_unaligned(le32_to_cpup((__le32 *)in + i), &hash[i]);
  301. }
  302. static void omap_sham_write_ctrl_omap2(struct omap_sham_dev *dd, size_t length,
  303. int final, int dma)
  304. {
  305. struct omap_sham_reqctx *ctx = ahash_request_ctx(dd->req);
  306. u32 val = length << 5, mask;
  307. if (likely(ctx->digcnt))
  308. omap_sham_write(dd, SHA_REG_DIGCNT(dd), ctx->digcnt);
  309. omap_sham_write_mask(dd, SHA_REG_MASK(dd),
  310. SHA_REG_MASK_IT_EN | (dma ? SHA_REG_MASK_DMA_EN : 0),
  311. SHA_REG_MASK_IT_EN | SHA_REG_MASK_DMA_EN);
  312. /*
  313. * Setting ALGO_CONST only for the first iteration
  314. * and CLOSE_HASH only for the last one.
  315. */
  316. if ((ctx->flags & FLAGS_MODE_MASK) == FLAGS_MODE_SHA1)
  317. val |= SHA_REG_CTRL_ALGO;
  318. if (!ctx->digcnt)
  319. val |= SHA_REG_CTRL_ALGO_CONST;
  320. if (final)
  321. val |= SHA_REG_CTRL_CLOSE_HASH;
  322. mask = SHA_REG_CTRL_ALGO_CONST | SHA_REG_CTRL_CLOSE_HASH |
  323. SHA_REG_CTRL_ALGO | SHA_REG_CTRL_LENGTH;
  324. omap_sham_write_mask(dd, SHA_REG_CTRL, val, mask);
  325. }
  326. static void omap_sham_trigger_omap2(struct omap_sham_dev *dd, size_t length)
  327. {
  328. }
  329. static int omap_sham_poll_irq_omap2(struct omap_sham_dev *dd)
  330. {
  331. return omap_sham_wait(dd, SHA_REG_CTRL, SHA_REG_CTRL_INPUT_READY);
  332. }
  333. static int get_block_size(struct omap_sham_reqctx *ctx)
  334. {
  335. int d;
  336. switch (ctx->flags & FLAGS_MODE_MASK) {
  337. case FLAGS_MODE_MD5:
  338. case FLAGS_MODE_SHA1:
  339. d = SHA1_BLOCK_SIZE;
  340. break;
  341. case FLAGS_MODE_SHA224:
  342. case FLAGS_MODE_SHA256:
  343. d = SHA256_BLOCK_SIZE;
  344. break;
  345. case FLAGS_MODE_SHA384:
  346. case FLAGS_MODE_SHA512:
  347. d = SHA512_BLOCK_SIZE;
  348. break;
  349. default:
  350. d = 0;
  351. }
  352. return d;
  353. }
  354. static void omap_sham_write_n(struct omap_sham_dev *dd, u32 offset,
  355. u32 *value, int count)
  356. {
  357. for (; count--; value++, offset += 4)
  358. omap_sham_write(dd, offset, *value);
  359. }
  360. static void omap_sham_write_ctrl_omap4(struct omap_sham_dev *dd, size_t length,
  361. int final, int dma)
  362. {
  363. struct omap_sham_reqctx *ctx = ahash_request_ctx(dd->req);
  364. u32 val, mask;
  365. if (likely(ctx->digcnt))
  366. omap_sham_write(dd, SHA_REG_DIGCNT(dd), ctx->digcnt);
  367. /*
  368. * Setting ALGO_CONST only for the first iteration and
  369. * CLOSE_HASH only for the last one. Note that flags mode bits
  370. * correspond to algorithm encoding in mode register.
  371. */
  372. val = (ctx->flags & FLAGS_MODE_MASK) >> (FLAGS_MODE_SHIFT);
  373. if (!ctx->digcnt) {
  374. struct crypto_ahash *tfm = crypto_ahash_reqtfm(dd->req);
  375. struct omap_sham_ctx *tctx = crypto_ahash_ctx(tfm);
  376. struct omap_sham_hmac_ctx *bctx = tctx->base;
  377. int bs, nr_dr;
  378. val |= SHA_REG_MODE_ALGO_CONSTANT;
  379. if (ctx->flags & BIT(FLAGS_HMAC)) {
  380. bs = get_block_size(ctx);
  381. nr_dr = bs / (2 * sizeof(u32));
  382. val |= SHA_REG_MODE_HMAC_KEY_PROC;
  383. omap_sham_write_n(dd, SHA_REG_ODIGEST(dd, 0),
  384. (u32 *)bctx->ipad, nr_dr);
  385. omap_sham_write_n(dd, SHA_REG_IDIGEST(dd, 0),
  386. (u32 *)bctx->ipad + nr_dr, nr_dr);
  387. ctx->digcnt += bs;
  388. }
  389. }
  390. if (final) {
  391. val |= SHA_REG_MODE_CLOSE_HASH;
  392. if (ctx->flags & BIT(FLAGS_HMAC))
  393. val |= SHA_REG_MODE_HMAC_OUTER_HASH;
  394. }
  395. mask = SHA_REG_MODE_ALGO_CONSTANT | SHA_REG_MODE_CLOSE_HASH |
  396. SHA_REG_MODE_ALGO_MASK | SHA_REG_MODE_HMAC_OUTER_HASH |
  397. SHA_REG_MODE_HMAC_KEY_PROC;
  398. dev_dbg(dd->dev, "ctrl: %08x, flags: %08lx\n", val, ctx->flags);
  399. omap_sham_write_mask(dd, SHA_REG_MODE(dd), val, mask);
  400. omap_sham_write(dd, SHA_REG_IRQENA, SHA_REG_IRQENA_OUTPUT_RDY);
  401. omap_sham_write_mask(dd, SHA_REG_MASK(dd),
  402. SHA_REG_MASK_IT_EN |
  403. (dma ? SHA_REG_MASK_DMA_EN : 0),
  404. SHA_REG_MASK_IT_EN | SHA_REG_MASK_DMA_EN);
  405. }
  406. static void omap_sham_trigger_omap4(struct omap_sham_dev *dd, size_t length)
  407. {
  408. omap_sham_write(dd, SHA_REG_LENGTH(dd), length);
  409. }
  410. static int omap_sham_poll_irq_omap4(struct omap_sham_dev *dd)
  411. {
  412. return omap_sham_wait(dd, SHA_REG_IRQSTATUS,
  413. SHA_REG_IRQSTATUS_INPUT_RDY);
  414. }
  415. static int omap_sham_xmit_cpu(struct omap_sham_dev *dd, size_t length,
  416. int final)
  417. {
  418. struct omap_sham_reqctx *ctx = ahash_request_ctx(dd->req);
  419. int count, len32, bs32, offset = 0;
  420. const u32 *buffer;
  421. int mlen;
  422. struct sg_mapping_iter mi;
  423. dev_dbg(dd->dev, "xmit_cpu: digcnt: %zd, length: %zd, final: %d\n",
  424. ctx->digcnt, length, final);
  425. dd->pdata->write_ctrl(dd, length, final, 0);
  426. dd->pdata->trigger(dd, length);
  427. /* should be non-zero before next lines to disable clocks later */
  428. ctx->digcnt += length;
  429. ctx->total -= length;
  430. if (final)
  431. set_bit(FLAGS_FINAL, &dd->flags); /* catch last interrupt */
  432. set_bit(FLAGS_CPU, &dd->flags);
  433. len32 = DIV_ROUND_UP(length, sizeof(u32));
  434. bs32 = get_block_size(ctx) / sizeof(u32);
  435. sg_miter_start(&mi, ctx->sg, ctx->sg_len,
  436. SG_MITER_FROM_SG | SG_MITER_ATOMIC);
  437. mlen = 0;
  438. while (len32) {
  439. if (dd->pdata->poll_irq(dd))
  440. return -ETIMEDOUT;
  441. for (count = 0; count < min(len32, bs32); count++, offset++) {
  442. if (!mlen) {
  443. sg_miter_next(&mi);
  444. mlen = mi.length;
  445. if (!mlen) {
  446. pr_err("sg miter failure.\n");
  447. return -EINVAL;
  448. }
  449. offset = 0;
  450. buffer = mi.addr;
  451. }
  452. omap_sham_write(dd, SHA_REG_DIN(dd, count),
  453. buffer[offset]);
  454. mlen -= 4;
  455. }
  456. len32 -= min(len32, bs32);
  457. }
  458. sg_miter_stop(&mi);
  459. return -EINPROGRESS;
  460. }
  461. static void omap_sham_dma_callback(void *param)
  462. {
  463. struct omap_sham_dev *dd = param;
  464. set_bit(FLAGS_DMA_READY, &dd->flags);
  465. tasklet_schedule(&dd->done_task);
  466. }
  467. static int omap_sham_xmit_dma(struct omap_sham_dev *dd, size_t length,
  468. int final)
  469. {
  470. struct omap_sham_reqctx *ctx = ahash_request_ctx(dd->req);
  471. struct dma_async_tx_descriptor *tx;
  472. struct dma_slave_config cfg;
  473. int ret;
  474. dev_dbg(dd->dev, "xmit_dma: digcnt: %zd, length: %zd, final: %d\n",
  475. ctx->digcnt, length, final);
  476. if (!dma_map_sg(dd->dev, ctx->sg, ctx->sg_len, DMA_TO_DEVICE)) {
  477. dev_err(dd->dev, "dma_map_sg error\n");
  478. return -EINVAL;
  479. }
  480. memset(&cfg, 0, sizeof(cfg));
  481. cfg.dst_addr = dd->phys_base + SHA_REG_DIN(dd, 0);
  482. cfg.dst_addr_width = DMA_SLAVE_BUSWIDTH_4_BYTES;
  483. cfg.dst_maxburst = get_block_size(ctx) / DMA_SLAVE_BUSWIDTH_4_BYTES;
  484. ret = dmaengine_slave_config(dd->dma_lch, &cfg);
  485. if (ret) {
  486. pr_err("omap-sham: can't configure dmaengine slave: %d\n", ret);
  487. return ret;
  488. }
  489. tx = dmaengine_prep_slave_sg(dd->dma_lch, ctx->sg, ctx->sg_len,
  490. DMA_MEM_TO_DEV,
  491. DMA_PREP_INTERRUPT | DMA_CTRL_ACK);
  492. if (!tx) {
  493. dev_err(dd->dev, "prep_slave_sg failed\n");
  494. return -EINVAL;
  495. }
  496. tx->callback = omap_sham_dma_callback;
  497. tx->callback_param = dd;
  498. dd->pdata->write_ctrl(dd, length, final, 1);
  499. ctx->digcnt += length;
  500. ctx->total -= length;
  501. if (final)
  502. set_bit(FLAGS_FINAL, &dd->flags); /* catch last interrupt */
  503. set_bit(FLAGS_DMA_ACTIVE, &dd->flags);
  504. dmaengine_submit(tx);
  505. dma_async_issue_pending(dd->dma_lch);
  506. dd->pdata->trigger(dd, length);
  507. return -EINPROGRESS;
  508. }
  509. static int omap_sham_copy_sg_lists(struct omap_sham_reqctx *ctx,
  510. struct scatterlist *sg, int bs, int new_len)
  511. {
  512. int n = sg_nents(sg);
  513. struct scatterlist *tmp;
  514. int offset = ctx->offset;
  515. ctx->total = new_len;
  516. if (ctx->bufcnt)
  517. n++;
  518. ctx->sg = kmalloc_array(n, sizeof(*sg), GFP_KERNEL);
  519. if (!ctx->sg)
  520. return -ENOMEM;
  521. sg_init_table(ctx->sg, n);
  522. tmp = ctx->sg;
  523. ctx->sg_len = 0;
  524. if (ctx->bufcnt) {
  525. sg_set_buf(tmp, ctx->dd->xmit_buf, ctx->bufcnt);
  526. tmp = sg_next(tmp);
  527. ctx->sg_len++;
  528. new_len -= ctx->bufcnt;
  529. }
  530. while (sg && new_len) {
  531. int len = sg->length - offset;
  532. if (len <= 0) {
  533. offset -= sg->length;
  534. sg = sg_next(sg);
  535. continue;
  536. }
  537. if (new_len < len)
  538. len = new_len;
  539. if (len > 0) {
  540. new_len -= len;
  541. sg_set_page(tmp, sg_page(sg), len, sg->offset + offset);
  542. offset = 0;
  543. ctx->offset = 0;
  544. ctx->sg_len++;
  545. if (new_len <= 0)
  546. break;
  547. tmp = sg_next(tmp);
  548. }
  549. sg = sg_next(sg);
  550. }
  551. if (tmp)
  552. sg_mark_end(tmp);
  553. set_bit(FLAGS_SGS_ALLOCED, &ctx->dd->flags);
  554. ctx->offset += new_len - ctx->bufcnt;
  555. ctx->bufcnt = 0;
  556. return 0;
  557. }
  558. static int omap_sham_copy_sgs(struct omap_sham_reqctx *ctx,
  559. struct scatterlist *sg, int bs,
  560. unsigned int new_len)
  561. {
  562. int pages;
  563. void *buf;
  564. pages = get_order(new_len);
  565. buf = (void *)__get_free_pages(GFP_ATOMIC, pages);
  566. if (!buf) {
  567. pr_err("Couldn't allocate pages for unaligned cases.\n");
  568. return -ENOMEM;
  569. }
  570. if (ctx->bufcnt)
  571. memcpy(buf, ctx->dd->xmit_buf, ctx->bufcnt);
  572. scatterwalk_map_and_copy(buf + ctx->bufcnt, sg, ctx->offset,
  573. min(new_len, ctx->total) - ctx->bufcnt, 0);
  574. sg_init_table(ctx->sgl, 1);
  575. sg_set_buf(ctx->sgl, buf, new_len);
  576. ctx->sg = ctx->sgl;
  577. set_bit(FLAGS_SGS_COPIED, &ctx->dd->flags);
  578. ctx->sg_len = 1;
  579. ctx->offset += new_len - ctx->bufcnt;
  580. ctx->bufcnt = 0;
  581. ctx->total = new_len;
  582. return 0;
  583. }
  584. static int omap_sham_align_sgs(struct scatterlist *sg,
  585. int nbytes, int bs, bool final,
  586. struct omap_sham_reqctx *rctx)
  587. {
  588. int n = 0;
  589. bool aligned = true;
  590. bool list_ok = true;
  591. struct scatterlist *sg_tmp = sg;
  592. int new_len;
  593. int offset = rctx->offset;
  594. int bufcnt = rctx->bufcnt;
  595. if (!sg || !sg->length || !nbytes) {
  596. if (bufcnt) {
  597. bufcnt = DIV_ROUND_UP(bufcnt, bs) * bs;
  598. sg_init_table(rctx->sgl, 1);
  599. sg_set_buf(rctx->sgl, rctx->dd->xmit_buf, bufcnt);
  600. rctx->sg = rctx->sgl;
  601. rctx->sg_len = 1;
  602. }
  603. return 0;
  604. }
  605. new_len = nbytes;
  606. if (offset)
  607. list_ok = false;
  608. if (final)
  609. new_len = DIV_ROUND_UP(new_len, bs) * bs;
  610. else
  611. new_len = (new_len - 1) / bs * bs;
  612. if (!new_len)
  613. return 0;
  614. if (nbytes != new_len)
  615. list_ok = false;
  616. while (nbytes > 0 && sg_tmp) {
  617. n++;
  618. if (bufcnt) {
  619. if (!IS_ALIGNED(bufcnt, bs)) {
  620. aligned = false;
  621. break;
  622. }
  623. nbytes -= bufcnt;
  624. bufcnt = 0;
  625. if (!nbytes)
  626. list_ok = false;
  627. continue;
  628. }
  629. #ifdef CONFIG_ZONE_DMA
  630. if (page_zonenum(sg_page(sg_tmp)) != ZONE_DMA) {
  631. aligned = false;
  632. break;
  633. }
  634. #endif
  635. if (offset < sg_tmp->length) {
  636. if (!IS_ALIGNED(offset + sg_tmp->offset, 4)) {
  637. aligned = false;
  638. break;
  639. }
  640. if (!IS_ALIGNED(sg_tmp->length - offset, bs)) {
  641. aligned = false;
  642. break;
  643. }
  644. }
  645. if (offset) {
  646. offset -= sg_tmp->length;
  647. if (offset < 0) {
  648. nbytes += offset;
  649. offset = 0;
  650. }
  651. } else {
  652. nbytes -= sg_tmp->length;
  653. }
  654. sg_tmp = sg_next(sg_tmp);
  655. if (nbytes < 0) {
  656. list_ok = false;
  657. break;
  658. }
  659. }
  660. if (new_len > OMAP_SHA_MAX_DMA_LEN) {
  661. new_len = OMAP_SHA_MAX_DMA_LEN;
  662. aligned = false;
  663. }
  664. if (!aligned)
  665. return omap_sham_copy_sgs(rctx, sg, bs, new_len);
  666. else if (!list_ok)
  667. return omap_sham_copy_sg_lists(rctx, sg, bs, new_len);
  668. rctx->total = new_len;
  669. rctx->offset += new_len;
  670. rctx->sg_len = n;
  671. if (rctx->bufcnt) {
  672. sg_init_table(rctx->sgl, 2);
  673. sg_set_buf(rctx->sgl, rctx->dd->xmit_buf, rctx->bufcnt);
  674. sg_chain(rctx->sgl, 2, sg);
  675. rctx->sg = rctx->sgl;
  676. } else {
  677. rctx->sg = sg;
  678. }
  679. return 0;
  680. }
  681. static int omap_sham_prepare_request(struct crypto_engine *engine, void *areq)
  682. {
  683. struct ahash_request *req = container_of(areq, struct ahash_request,
  684. base);
  685. struct omap_sham_reqctx *rctx = ahash_request_ctx(req);
  686. int bs;
  687. int ret;
  688. unsigned int nbytes;
  689. bool final = rctx->flags & BIT(FLAGS_FINUP);
  690. bool update = rctx->op == OP_UPDATE;
  691. int hash_later;
  692. bs = get_block_size(rctx);
  693. nbytes = rctx->bufcnt;
  694. if (update)
  695. nbytes += req->nbytes - rctx->offset;
  696. dev_dbg(rctx->dd->dev,
  697. "%s: nbytes=%d, bs=%d, total=%d, offset=%d, bufcnt=%zd\n",
  698. __func__, nbytes, bs, rctx->total, rctx->offset,
  699. rctx->bufcnt);
  700. if (!nbytes)
  701. return 0;
  702. rctx->total = nbytes;
  703. if (update && req->nbytes && (!IS_ALIGNED(rctx->bufcnt, bs))) {
  704. int len = bs - rctx->bufcnt % bs;
  705. if (len > req->nbytes)
  706. len = req->nbytes;
  707. scatterwalk_map_and_copy(rctx->buffer + rctx->bufcnt, req->src,
  708. 0, len, 0);
  709. rctx->bufcnt += len;
  710. rctx->offset = len;
  711. }
  712. if (rctx->bufcnt)
  713. memcpy(rctx->dd->xmit_buf, rctx->buffer, rctx->bufcnt);
  714. ret = omap_sham_align_sgs(req->src, nbytes, bs, final, rctx);
  715. if (ret)
  716. return ret;
  717. hash_later = nbytes - rctx->total;
  718. if (hash_later < 0)
  719. hash_later = 0;
  720. if (hash_later && hash_later <= rctx->buflen) {
  721. scatterwalk_map_and_copy(rctx->buffer,
  722. req->src,
  723. req->nbytes - hash_later,
  724. hash_later, 0);
  725. rctx->bufcnt = hash_later;
  726. } else {
  727. rctx->bufcnt = 0;
  728. }
  729. if (hash_later > rctx->buflen)
  730. set_bit(FLAGS_HUGE, &rctx->dd->flags);
  731. rctx->total = min(nbytes, rctx->total);
  732. return 0;
  733. }
  734. static int omap_sham_update_dma_stop(struct omap_sham_dev *dd)
  735. {
  736. struct omap_sham_reqctx *ctx = ahash_request_ctx(dd->req);
  737. dma_unmap_sg(dd->dev, ctx->sg, ctx->sg_len, DMA_TO_DEVICE);
  738. clear_bit(FLAGS_DMA_ACTIVE, &dd->flags);
  739. return 0;
  740. }
  741. static struct omap_sham_dev *omap_sham_find_dev(struct omap_sham_reqctx *ctx)
  742. {
  743. struct omap_sham_dev *dd;
  744. if (ctx->dd)
  745. return ctx->dd;
  746. spin_lock_bh(&sham.lock);
  747. dd = list_first_entry(&sham.dev_list, struct omap_sham_dev, list);
  748. list_move_tail(&dd->list, &sham.dev_list);
  749. ctx->dd = dd;
  750. spin_unlock_bh(&sham.lock);
  751. return dd;
  752. }
  753. static int omap_sham_init(struct ahash_request *req)
  754. {
  755. struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
  756. struct omap_sham_ctx *tctx = crypto_ahash_ctx(tfm);
  757. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  758. struct omap_sham_dev *dd;
  759. int bs = 0;
  760. ctx->dd = NULL;
  761. dd = omap_sham_find_dev(ctx);
  762. if (!dd)
  763. return -ENODEV;
  764. ctx->flags = 0;
  765. dev_dbg(dd->dev, "init: digest size: %d\n",
  766. crypto_ahash_digestsize(tfm));
  767. switch (crypto_ahash_digestsize(tfm)) {
  768. case MD5_DIGEST_SIZE:
  769. ctx->flags |= FLAGS_MODE_MD5;
  770. bs = SHA1_BLOCK_SIZE;
  771. break;
  772. case SHA1_DIGEST_SIZE:
  773. ctx->flags |= FLAGS_MODE_SHA1;
  774. bs = SHA1_BLOCK_SIZE;
  775. break;
  776. case SHA224_DIGEST_SIZE:
  777. ctx->flags |= FLAGS_MODE_SHA224;
  778. bs = SHA224_BLOCK_SIZE;
  779. break;
  780. case SHA256_DIGEST_SIZE:
  781. ctx->flags |= FLAGS_MODE_SHA256;
  782. bs = SHA256_BLOCK_SIZE;
  783. break;
  784. case SHA384_DIGEST_SIZE:
  785. ctx->flags |= FLAGS_MODE_SHA384;
  786. bs = SHA384_BLOCK_SIZE;
  787. break;
  788. case SHA512_DIGEST_SIZE:
  789. ctx->flags |= FLAGS_MODE_SHA512;
  790. bs = SHA512_BLOCK_SIZE;
  791. break;
  792. }
  793. ctx->bufcnt = 0;
  794. ctx->digcnt = 0;
  795. ctx->total = 0;
  796. ctx->offset = 0;
  797. ctx->buflen = BUFLEN;
  798. if (tctx->flags & BIT(FLAGS_HMAC)) {
  799. if (!test_bit(FLAGS_AUTO_XOR, &dd->flags)) {
  800. struct omap_sham_hmac_ctx *bctx = tctx->base;
  801. memcpy(ctx->buffer, bctx->ipad, bs);
  802. ctx->bufcnt = bs;
  803. }
  804. ctx->flags |= BIT(FLAGS_HMAC);
  805. }
  806. return 0;
  807. }
  808. static int omap_sham_update_req(struct omap_sham_dev *dd)
  809. {
  810. struct ahash_request *req = dd->req;
  811. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  812. int err;
  813. bool final = (ctx->flags & BIT(FLAGS_FINUP)) &&
  814. !(dd->flags & BIT(FLAGS_HUGE));
  815. dev_dbg(dd->dev, "update_req: total: %u, digcnt: %zd, final: %d",
  816. ctx->total, ctx->digcnt, final);
  817. if (ctx->total < get_block_size(ctx) ||
  818. ctx->total < dd->fallback_sz)
  819. ctx->flags |= BIT(FLAGS_CPU);
  820. if (ctx->flags & BIT(FLAGS_CPU))
  821. err = omap_sham_xmit_cpu(dd, ctx->total, final);
  822. else
  823. err = omap_sham_xmit_dma(dd, ctx->total, final);
  824. /* wait for dma completion before can take more data */
  825. dev_dbg(dd->dev, "update: err: %d, digcnt: %zd\n", err, ctx->digcnt);
  826. return err;
  827. }
  828. static int omap_sham_final_req(struct omap_sham_dev *dd)
  829. {
  830. struct ahash_request *req = dd->req;
  831. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  832. int err = 0, use_dma = 1;
  833. if (dd->flags & BIT(FLAGS_HUGE))
  834. return 0;
  835. if ((ctx->total <= get_block_size(ctx)) || dd->polling_mode)
  836. /*
  837. * faster to handle last block with cpu or
  838. * use cpu when dma is not present.
  839. */
  840. use_dma = 0;
  841. if (use_dma)
  842. err = omap_sham_xmit_dma(dd, ctx->total, 1);
  843. else
  844. err = omap_sham_xmit_cpu(dd, ctx->total, 1);
  845. ctx->bufcnt = 0;
  846. dev_dbg(dd->dev, "final_req: err: %d\n", err);
  847. return err;
  848. }
  849. static int omap_sham_hash_one_req(struct crypto_engine *engine, void *areq)
  850. {
  851. struct ahash_request *req = container_of(areq, struct ahash_request,
  852. base);
  853. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  854. struct omap_sham_dev *dd = ctx->dd;
  855. int err;
  856. bool final = (ctx->flags & BIT(FLAGS_FINUP)) &&
  857. !(dd->flags & BIT(FLAGS_HUGE));
  858. dev_dbg(dd->dev, "hash-one: op: %u, total: %u, digcnt: %zd, final: %d",
  859. ctx->op, ctx->total, ctx->digcnt, final);
  860. err = omap_sham_prepare_request(engine, areq);
  861. if (err)
  862. return err;
  863. err = pm_runtime_resume_and_get(dd->dev);
  864. if (err < 0) {
  865. dev_err(dd->dev, "failed to get sync: %d\n", err);
  866. return err;
  867. }
  868. dd->err = 0;
  869. dd->req = req;
  870. if (ctx->digcnt)
  871. dd->pdata->copy_hash(req, 0);
  872. if (ctx->op == OP_UPDATE)
  873. err = omap_sham_update_req(dd);
  874. else if (ctx->op == OP_FINAL)
  875. err = omap_sham_final_req(dd);
  876. if (err != -EINPROGRESS)
  877. omap_sham_finish_req(req, err);
  878. return 0;
  879. }
  880. static int omap_sham_finish_hmac(struct ahash_request *req)
  881. {
  882. struct omap_sham_ctx *tctx = crypto_tfm_ctx(req->base.tfm);
  883. struct omap_sham_hmac_ctx *bctx = tctx->base;
  884. int bs = crypto_shash_blocksize(bctx->shash);
  885. int ds = crypto_shash_digestsize(bctx->shash);
  886. SHASH_DESC_ON_STACK(shash, bctx->shash);
  887. shash->tfm = bctx->shash;
  888. return crypto_shash_init(shash) ?:
  889. crypto_shash_update(shash, bctx->opad, bs) ?:
  890. crypto_shash_finup(shash, req->result, ds, req->result);
  891. }
  892. static int omap_sham_finish(struct ahash_request *req)
  893. {
  894. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  895. struct omap_sham_dev *dd = ctx->dd;
  896. int err = 0;
  897. if (ctx->digcnt) {
  898. omap_sham_copy_ready_hash(req);
  899. if ((ctx->flags & BIT(FLAGS_HMAC)) &&
  900. !test_bit(FLAGS_AUTO_XOR, &dd->flags))
  901. err = omap_sham_finish_hmac(req);
  902. }
  903. dev_dbg(dd->dev, "digcnt: %zd, bufcnt: %zd\n", ctx->digcnt, ctx->bufcnt);
  904. return err;
  905. }
  906. static void omap_sham_finish_req(struct ahash_request *req, int err)
  907. {
  908. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  909. struct omap_sham_dev *dd = ctx->dd;
  910. if (test_bit(FLAGS_SGS_COPIED, &dd->flags))
  911. free_pages((unsigned long)sg_virt(ctx->sg),
  912. get_order(ctx->sg->length));
  913. if (test_bit(FLAGS_SGS_ALLOCED, &dd->flags))
  914. kfree(ctx->sg);
  915. ctx->sg = NULL;
  916. dd->flags &= ~(BIT(FLAGS_SGS_ALLOCED) | BIT(FLAGS_SGS_COPIED) |
  917. BIT(FLAGS_CPU) | BIT(FLAGS_DMA_READY) |
  918. BIT(FLAGS_OUTPUT_READY));
  919. if (!err)
  920. dd->pdata->copy_hash(req, 1);
  921. if (dd->flags & BIT(FLAGS_HUGE)) {
  922. /* Re-enqueue the request */
  923. omap_sham_enqueue(req, ctx->op);
  924. return;
  925. }
  926. if (!err) {
  927. if (test_bit(FLAGS_FINAL, &dd->flags))
  928. err = omap_sham_finish(req);
  929. } else {
  930. ctx->flags |= BIT(FLAGS_ERROR);
  931. }
  932. /* atomic operation is not needed here */
  933. dd->flags &= ~(BIT(FLAGS_FINAL) | BIT(FLAGS_CPU) |
  934. BIT(FLAGS_DMA_READY) | BIT(FLAGS_OUTPUT_READY));
  935. pm_runtime_mark_last_busy(dd->dev);
  936. pm_runtime_put_autosuspend(dd->dev);
  937. ctx->offset = 0;
  938. crypto_finalize_hash_request(dd->engine, req, err);
  939. }
  940. static int omap_sham_handle_queue(struct omap_sham_dev *dd,
  941. struct ahash_request *req)
  942. {
  943. return crypto_transfer_hash_request_to_engine(dd->engine, req);
  944. }
  945. static int omap_sham_enqueue(struct ahash_request *req, unsigned int op)
  946. {
  947. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  948. struct omap_sham_dev *dd = ctx->dd;
  949. ctx->op = op;
  950. return omap_sham_handle_queue(dd, req);
  951. }
  952. static int omap_sham_update(struct ahash_request *req)
  953. {
  954. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  955. struct omap_sham_dev *dd = omap_sham_find_dev(ctx);
  956. if (!req->nbytes)
  957. return 0;
  958. if (ctx->bufcnt + req->nbytes <= ctx->buflen) {
  959. scatterwalk_map_and_copy(ctx->buffer + ctx->bufcnt, req->src,
  960. 0, req->nbytes, 0);
  961. ctx->bufcnt += req->nbytes;
  962. return 0;
  963. }
  964. if (dd->polling_mode)
  965. ctx->flags |= BIT(FLAGS_CPU);
  966. return omap_sham_enqueue(req, OP_UPDATE);
  967. }
  968. static int omap_sham_final_shash(struct ahash_request *req)
  969. {
  970. struct omap_sham_ctx *tctx = crypto_tfm_ctx(req->base.tfm);
  971. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  972. int offset = 0;
  973. /*
  974. * If we are running HMAC on limited hardware support, skip
  975. * the ipad in the beginning of the buffer if we are going for
  976. * software fallback algorithm.
  977. */
  978. if (test_bit(FLAGS_HMAC, &ctx->flags) &&
  979. !test_bit(FLAGS_AUTO_XOR, &ctx->dd->flags))
  980. offset = get_block_size(ctx);
  981. return crypto_shash_tfm_digest(tctx->fallback, ctx->buffer + offset,
  982. ctx->bufcnt - offset, req->result);
  983. }
  984. static int omap_sham_final(struct ahash_request *req)
  985. {
  986. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  987. ctx->flags |= BIT(FLAGS_FINUP);
  988. if (ctx->flags & BIT(FLAGS_ERROR))
  989. return 0; /* uncompleted hash is not needed */
  990. /*
  991. * OMAP HW accel works only with buffers >= 9.
  992. * HMAC is always >= 9 because ipad == block size.
  993. * If buffersize is less than fallback_sz, we use fallback
  994. * SW encoding, as using DMA + HW in this case doesn't provide
  995. * any benefit.
  996. */
  997. if (!ctx->digcnt && ctx->bufcnt < ctx->dd->fallback_sz)
  998. return omap_sham_final_shash(req);
  999. else if (ctx->bufcnt)
  1000. return omap_sham_enqueue(req, OP_FINAL);
  1001. /* copy ready hash (+ finalize hmac) */
  1002. return omap_sham_finish(req);
  1003. }
  1004. static int omap_sham_finup(struct ahash_request *req)
  1005. {
  1006. struct omap_sham_reqctx *ctx = ahash_request_ctx(req);
  1007. int err1, err2;
  1008. ctx->flags |= BIT(FLAGS_FINUP);
  1009. err1 = omap_sham_update(req);
  1010. if (err1 == -EINPROGRESS || err1 == -EBUSY)
  1011. return err1;
  1012. /*
  1013. * final() has to be always called to cleanup resources
  1014. * even if udpate() failed, except EINPROGRESS
  1015. */
  1016. err2 = omap_sham_final(req);
  1017. return err1 ?: err2;
  1018. }
  1019. static int omap_sham_digest(struct ahash_request *req)
  1020. {
  1021. return omap_sham_init(req) ?: omap_sham_finup(req);
  1022. }
  1023. static int omap_sham_setkey(struct crypto_ahash *tfm, const u8 *key,
  1024. unsigned int keylen)
  1025. {
  1026. struct omap_sham_ctx *tctx = crypto_ahash_ctx(tfm);
  1027. struct omap_sham_hmac_ctx *bctx = tctx->base;
  1028. int bs = crypto_shash_blocksize(bctx->shash);
  1029. int ds = crypto_shash_digestsize(bctx->shash);
  1030. int err, i;
  1031. err = crypto_shash_setkey(tctx->fallback, key, keylen);
  1032. if (err)
  1033. return err;
  1034. if (keylen > bs) {
  1035. err = crypto_shash_tfm_digest(bctx->shash, key, keylen,
  1036. bctx->ipad);
  1037. if (err)
  1038. return err;
  1039. keylen = ds;
  1040. } else {
  1041. memcpy(bctx->ipad, key, keylen);
  1042. }
  1043. memset(bctx->ipad + keylen, 0, bs - keylen);
  1044. if (!test_bit(FLAGS_AUTO_XOR, &sham.flags)) {
  1045. memcpy(bctx->opad, bctx->ipad, bs);
  1046. for (i = 0; i < bs; i++) {
  1047. bctx->ipad[i] ^= HMAC_IPAD_VALUE;
  1048. bctx->opad[i] ^= HMAC_OPAD_VALUE;
  1049. }
  1050. }
  1051. return err;
  1052. }
  1053. static int omap_sham_cra_init_alg(struct crypto_tfm *tfm, const char *alg_base)
  1054. {
  1055. struct omap_sham_ctx *tctx = crypto_tfm_ctx(tfm);
  1056. const char *alg_name = crypto_tfm_alg_name(tfm);
  1057. /* Allocate a fallback and abort if it failed. */
  1058. tctx->fallback = crypto_alloc_shash(alg_name, 0,
  1059. CRYPTO_ALG_NEED_FALLBACK);
  1060. if (IS_ERR(tctx->fallback)) {
  1061. pr_err("omap-sham: fallback driver '%s' "
  1062. "could not be loaded.\n", alg_name);
  1063. return PTR_ERR(tctx->fallback);
  1064. }
  1065. crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
  1066. sizeof(struct omap_sham_reqctx) + BUFLEN);
  1067. if (alg_base) {
  1068. struct omap_sham_hmac_ctx *bctx = tctx->base;
  1069. tctx->flags |= BIT(FLAGS_HMAC);
  1070. bctx->shash = crypto_alloc_shash(alg_base, 0,
  1071. CRYPTO_ALG_NEED_FALLBACK);
  1072. if (IS_ERR(bctx->shash)) {
  1073. pr_err("omap-sham: base driver '%s' "
  1074. "could not be loaded.\n", alg_base);
  1075. crypto_free_shash(tctx->fallback);
  1076. return PTR_ERR(bctx->shash);
  1077. }
  1078. }
  1079. return 0;
  1080. }
  1081. static int omap_sham_cra_init(struct crypto_tfm *tfm)
  1082. {
  1083. return omap_sham_cra_init_alg(tfm, NULL);
  1084. }
  1085. static int omap_sham_cra_sha1_init(struct crypto_tfm *tfm)
  1086. {
  1087. return omap_sham_cra_init_alg(tfm, "sha1");
  1088. }
  1089. static int omap_sham_cra_sha224_init(struct crypto_tfm *tfm)
  1090. {
  1091. return omap_sham_cra_init_alg(tfm, "sha224");
  1092. }
  1093. static int omap_sham_cra_sha256_init(struct crypto_tfm *tfm)
  1094. {
  1095. return omap_sham_cra_init_alg(tfm, "sha256");
  1096. }
  1097. static int omap_sham_cra_md5_init(struct crypto_tfm *tfm)
  1098. {
  1099. return omap_sham_cra_init_alg(tfm, "md5");
  1100. }
  1101. static int omap_sham_cra_sha384_init(struct crypto_tfm *tfm)
  1102. {
  1103. return omap_sham_cra_init_alg(tfm, "sha384");
  1104. }
  1105. static int omap_sham_cra_sha512_init(struct crypto_tfm *tfm)
  1106. {
  1107. return omap_sham_cra_init_alg(tfm, "sha512");
  1108. }
  1109. static void omap_sham_cra_exit(struct crypto_tfm *tfm)
  1110. {
  1111. struct omap_sham_ctx *tctx = crypto_tfm_ctx(tfm);
  1112. crypto_free_shash(tctx->fallback);
  1113. tctx->fallback = NULL;
  1114. if (tctx->flags & BIT(FLAGS_HMAC)) {
  1115. struct omap_sham_hmac_ctx *bctx = tctx->base;
  1116. crypto_free_shash(bctx->shash);
  1117. }
  1118. }
  1119. static int omap_sham_export(struct ahash_request *req, void *out)
  1120. {
  1121. struct omap_sham_reqctx *rctx = ahash_request_ctx(req);
  1122. memcpy(out, rctx, sizeof(*rctx) + rctx->bufcnt);
  1123. return 0;
  1124. }
  1125. static int omap_sham_import(struct ahash_request *req, const void *in)
  1126. {
  1127. struct omap_sham_reqctx *rctx = ahash_request_ctx(req);
  1128. const struct omap_sham_reqctx *ctx_in = in;
  1129. memcpy(rctx, in, sizeof(*rctx) + ctx_in->bufcnt);
  1130. return 0;
  1131. }
  1132. static struct ahash_engine_alg algs_sha1_md5[] = {
  1133. {
  1134. .base.init = omap_sham_init,
  1135. .base.update = omap_sham_update,
  1136. .base.final = omap_sham_final,
  1137. .base.finup = omap_sham_finup,
  1138. .base.digest = omap_sham_digest,
  1139. .base.halg.digestsize = SHA1_DIGEST_SIZE,
  1140. .base.halg.base = {
  1141. .cra_name = "sha1",
  1142. .cra_driver_name = "omap-sha1",
  1143. .cra_priority = 400,
  1144. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1145. CRYPTO_ALG_ASYNC |
  1146. CRYPTO_ALG_NEED_FALLBACK,
  1147. .cra_blocksize = SHA1_BLOCK_SIZE,
  1148. .cra_ctxsize = sizeof(struct omap_sham_ctx),
  1149. .cra_module = THIS_MODULE,
  1150. .cra_init = omap_sham_cra_init,
  1151. .cra_exit = omap_sham_cra_exit,
  1152. },
  1153. .op.do_one_request = omap_sham_hash_one_req,
  1154. },
  1155. {
  1156. .base.init = omap_sham_init,
  1157. .base.update = omap_sham_update,
  1158. .base.final = omap_sham_final,
  1159. .base.finup = omap_sham_finup,
  1160. .base.digest = omap_sham_digest,
  1161. .base.halg.digestsize = MD5_DIGEST_SIZE,
  1162. .base.halg.base = {
  1163. .cra_name = "md5",
  1164. .cra_driver_name = "omap-md5",
  1165. .cra_priority = 400,
  1166. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1167. CRYPTO_ALG_ASYNC |
  1168. CRYPTO_ALG_NEED_FALLBACK,
  1169. .cra_blocksize = SHA1_BLOCK_SIZE,
  1170. .cra_ctxsize = sizeof(struct omap_sham_ctx),
  1171. .cra_module = THIS_MODULE,
  1172. .cra_init = omap_sham_cra_init,
  1173. .cra_exit = omap_sham_cra_exit,
  1174. },
  1175. .op.do_one_request = omap_sham_hash_one_req,
  1176. },
  1177. {
  1178. .base.init = omap_sham_init,
  1179. .base.update = omap_sham_update,
  1180. .base.final = omap_sham_final,
  1181. .base.finup = omap_sham_finup,
  1182. .base.digest = omap_sham_digest,
  1183. .base.setkey = omap_sham_setkey,
  1184. .base.halg.digestsize = SHA1_DIGEST_SIZE,
  1185. .base.halg.base = {
  1186. .cra_name = "hmac(sha1)",
  1187. .cra_driver_name = "omap-hmac-sha1",
  1188. .cra_priority = 400,
  1189. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1190. CRYPTO_ALG_ASYNC |
  1191. CRYPTO_ALG_NEED_FALLBACK,
  1192. .cra_blocksize = SHA1_BLOCK_SIZE,
  1193. .cra_ctxsize = sizeof(struct omap_sham_ctx) +
  1194. sizeof(struct omap_sham_hmac_ctx),
  1195. .cra_module = THIS_MODULE,
  1196. .cra_init = omap_sham_cra_sha1_init,
  1197. .cra_exit = omap_sham_cra_exit,
  1198. },
  1199. .op.do_one_request = omap_sham_hash_one_req,
  1200. },
  1201. {
  1202. .base.init = omap_sham_init,
  1203. .base.update = omap_sham_update,
  1204. .base.final = omap_sham_final,
  1205. .base.finup = omap_sham_finup,
  1206. .base.digest = omap_sham_digest,
  1207. .base.setkey = omap_sham_setkey,
  1208. .base.halg.digestsize = MD5_DIGEST_SIZE,
  1209. .base.halg.base = {
  1210. .cra_name = "hmac(md5)",
  1211. .cra_driver_name = "omap-hmac-md5",
  1212. .cra_priority = 400,
  1213. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1214. CRYPTO_ALG_ASYNC |
  1215. CRYPTO_ALG_NEED_FALLBACK,
  1216. .cra_blocksize = SHA1_BLOCK_SIZE,
  1217. .cra_ctxsize = sizeof(struct omap_sham_ctx) +
  1218. sizeof(struct omap_sham_hmac_ctx),
  1219. .cra_module = THIS_MODULE,
  1220. .cra_init = omap_sham_cra_md5_init,
  1221. .cra_exit = omap_sham_cra_exit,
  1222. },
  1223. .op.do_one_request = omap_sham_hash_one_req,
  1224. }
  1225. };
  1226. /* OMAP4 has some algs in addition to what OMAP2 has */
  1227. static struct ahash_engine_alg algs_sha224_sha256[] = {
  1228. {
  1229. .base.init = omap_sham_init,
  1230. .base.update = omap_sham_update,
  1231. .base.final = omap_sham_final,
  1232. .base.finup = omap_sham_finup,
  1233. .base.digest = omap_sham_digest,
  1234. .base.halg.digestsize = SHA224_DIGEST_SIZE,
  1235. .base.halg.base = {
  1236. .cra_name = "sha224",
  1237. .cra_driver_name = "omap-sha224",
  1238. .cra_priority = 400,
  1239. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1240. CRYPTO_ALG_ASYNC |
  1241. CRYPTO_ALG_NEED_FALLBACK,
  1242. .cra_blocksize = SHA224_BLOCK_SIZE,
  1243. .cra_ctxsize = sizeof(struct omap_sham_ctx),
  1244. .cra_module = THIS_MODULE,
  1245. .cra_init = omap_sham_cra_init,
  1246. .cra_exit = omap_sham_cra_exit,
  1247. },
  1248. .op.do_one_request = omap_sham_hash_one_req,
  1249. },
  1250. {
  1251. .base.init = omap_sham_init,
  1252. .base.update = omap_sham_update,
  1253. .base.final = omap_sham_final,
  1254. .base.finup = omap_sham_finup,
  1255. .base.digest = omap_sham_digest,
  1256. .base.halg.digestsize = SHA256_DIGEST_SIZE,
  1257. .base.halg.base = {
  1258. .cra_name = "sha256",
  1259. .cra_driver_name = "omap-sha256",
  1260. .cra_priority = 400,
  1261. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1262. CRYPTO_ALG_ASYNC |
  1263. CRYPTO_ALG_NEED_FALLBACK,
  1264. .cra_blocksize = SHA256_BLOCK_SIZE,
  1265. .cra_ctxsize = sizeof(struct omap_sham_ctx),
  1266. .cra_module = THIS_MODULE,
  1267. .cra_init = omap_sham_cra_init,
  1268. .cra_exit = omap_sham_cra_exit,
  1269. },
  1270. .op.do_one_request = omap_sham_hash_one_req,
  1271. },
  1272. {
  1273. .base.init = omap_sham_init,
  1274. .base.update = omap_sham_update,
  1275. .base.final = omap_sham_final,
  1276. .base.finup = omap_sham_finup,
  1277. .base.digest = omap_sham_digest,
  1278. .base.setkey = omap_sham_setkey,
  1279. .base.halg.digestsize = SHA224_DIGEST_SIZE,
  1280. .base.halg.base = {
  1281. .cra_name = "hmac(sha224)",
  1282. .cra_driver_name = "omap-hmac-sha224",
  1283. .cra_priority = 400,
  1284. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1285. CRYPTO_ALG_ASYNC |
  1286. CRYPTO_ALG_NEED_FALLBACK,
  1287. .cra_blocksize = SHA224_BLOCK_SIZE,
  1288. .cra_ctxsize = sizeof(struct omap_sham_ctx) +
  1289. sizeof(struct omap_sham_hmac_ctx),
  1290. .cra_module = THIS_MODULE,
  1291. .cra_init = omap_sham_cra_sha224_init,
  1292. .cra_exit = omap_sham_cra_exit,
  1293. },
  1294. .op.do_one_request = omap_sham_hash_one_req,
  1295. },
  1296. {
  1297. .base.init = omap_sham_init,
  1298. .base.update = omap_sham_update,
  1299. .base.final = omap_sham_final,
  1300. .base.finup = omap_sham_finup,
  1301. .base.digest = omap_sham_digest,
  1302. .base.setkey = omap_sham_setkey,
  1303. .base.halg.digestsize = SHA256_DIGEST_SIZE,
  1304. .base.halg.base = {
  1305. .cra_name = "hmac(sha256)",
  1306. .cra_driver_name = "omap-hmac-sha256",
  1307. .cra_priority = 400,
  1308. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1309. CRYPTO_ALG_ASYNC |
  1310. CRYPTO_ALG_NEED_FALLBACK,
  1311. .cra_blocksize = SHA256_BLOCK_SIZE,
  1312. .cra_ctxsize = sizeof(struct omap_sham_ctx) +
  1313. sizeof(struct omap_sham_hmac_ctx),
  1314. .cra_module = THIS_MODULE,
  1315. .cra_init = omap_sham_cra_sha256_init,
  1316. .cra_exit = omap_sham_cra_exit,
  1317. },
  1318. .op.do_one_request = omap_sham_hash_one_req,
  1319. },
  1320. };
  1321. static struct ahash_engine_alg algs_sha384_sha512[] = {
  1322. {
  1323. .base.init = omap_sham_init,
  1324. .base.update = omap_sham_update,
  1325. .base.final = omap_sham_final,
  1326. .base.finup = omap_sham_finup,
  1327. .base.digest = omap_sham_digest,
  1328. .base.halg.digestsize = SHA384_DIGEST_SIZE,
  1329. .base.halg.base = {
  1330. .cra_name = "sha384",
  1331. .cra_driver_name = "omap-sha384",
  1332. .cra_priority = 400,
  1333. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1334. CRYPTO_ALG_ASYNC |
  1335. CRYPTO_ALG_NEED_FALLBACK,
  1336. .cra_blocksize = SHA384_BLOCK_SIZE,
  1337. .cra_ctxsize = sizeof(struct omap_sham_ctx),
  1338. .cra_module = THIS_MODULE,
  1339. .cra_init = omap_sham_cra_init,
  1340. .cra_exit = omap_sham_cra_exit,
  1341. },
  1342. .op.do_one_request = omap_sham_hash_one_req,
  1343. },
  1344. {
  1345. .base.init = omap_sham_init,
  1346. .base.update = omap_sham_update,
  1347. .base.final = omap_sham_final,
  1348. .base.finup = omap_sham_finup,
  1349. .base.digest = omap_sham_digest,
  1350. .base.halg.digestsize = SHA512_DIGEST_SIZE,
  1351. .base.halg.base = {
  1352. .cra_name = "sha512",
  1353. .cra_driver_name = "omap-sha512",
  1354. .cra_priority = 400,
  1355. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1356. CRYPTO_ALG_ASYNC |
  1357. CRYPTO_ALG_NEED_FALLBACK,
  1358. .cra_blocksize = SHA512_BLOCK_SIZE,
  1359. .cra_ctxsize = sizeof(struct omap_sham_ctx),
  1360. .cra_module = THIS_MODULE,
  1361. .cra_init = omap_sham_cra_init,
  1362. .cra_exit = omap_sham_cra_exit,
  1363. },
  1364. .op.do_one_request = omap_sham_hash_one_req,
  1365. },
  1366. {
  1367. .base.init = omap_sham_init,
  1368. .base.update = omap_sham_update,
  1369. .base.final = omap_sham_final,
  1370. .base.finup = omap_sham_finup,
  1371. .base.digest = omap_sham_digest,
  1372. .base.setkey = omap_sham_setkey,
  1373. .base.halg.digestsize = SHA384_DIGEST_SIZE,
  1374. .base.halg.base = {
  1375. .cra_name = "hmac(sha384)",
  1376. .cra_driver_name = "omap-hmac-sha384",
  1377. .cra_priority = 400,
  1378. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1379. CRYPTO_ALG_ASYNC |
  1380. CRYPTO_ALG_NEED_FALLBACK,
  1381. .cra_blocksize = SHA384_BLOCK_SIZE,
  1382. .cra_ctxsize = sizeof(struct omap_sham_ctx) +
  1383. sizeof(struct omap_sham_hmac_ctx),
  1384. .cra_module = THIS_MODULE,
  1385. .cra_init = omap_sham_cra_sha384_init,
  1386. .cra_exit = omap_sham_cra_exit,
  1387. },
  1388. .op.do_one_request = omap_sham_hash_one_req,
  1389. },
  1390. {
  1391. .base.init = omap_sham_init,
  1392. .base.update = omap_sham_update,
  1393. .base.final = omap_sham_final,
  1394. .base.finup = omap_sham_finup,
  1395. .base.digest = omap_sham_digest,
  1396. .base.setkey = omap_sham_setkey,
  1397. .base.halg.digestsize = SHA512_DIGEST_SIZE,
  1398. .base.halg.base = {
  1399. .cra_name = "hmac(sha512)",
  1400. .cra_driver_name = "omap-hmac-sha512",
  1401. .cra_priority = 400,
  1402. .cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY |
  1403. CRYPTO_ALG_ASYNC |
  1404. CRYPTO_ALG_NEED_FALLBACK,
  1405. .cra_blocksize = SHA512_BLOCK_SIZE,
  1406. .cra_ctxsize = sizeof(struct omap_sham_ctx) +
  1407. sizeof(struct omap_sham_hmac_ctx),
  1408. .cra_module = THIS_MODULE,
  1409. .cra_init = omap_sham_cra_sha512_init,
  1410. .cra_exit = omap_sham_cra_exit,
  1411. },
  1412. .op.do_one_request = omap_sham_hash_one_req,
  1413. },
  1414. };
  1415. static void omap_sham_done_task(unsigned long data)
  1416. {
  1417. struct omap_sham_dev *dd = (struct omap_sham_dev *)data;
  1418. int err = 0;
  1419. dev_dbg(dd->dev, "%s: flags=%lx\n", __func__, dd->flags);
  1420. if (test_bit(FLAGS_CPU, &dd->flags)) {
  1421. if (test_and_clear_bit(FLAGS_OUTPUT_READY, &dd->flags))
  1422. goto finish;
  1423. } else if (test_bit(FLAGS_DMA_READY, &dd->flags)) {
  1424. if (test_bit(FLAGS_DMA_ACTIVE, &dd->flags)) {
  1425. omap_sham_update_dma_stop(dd);
  1426. if (dd->err) {
  1427. err = dd->err;
  1428. goto finish;
  1429. }
  1430. }
  1431. if (test_and_clear_bit(FLAGS_OUTPUT_READY, &dd->flags)) {
  1432. /* hash or semi-hash ready */
  1433. clear_bit(FLAGS_DMA_READY, &dd->flags);
  1434. goto finish;
  1435. }
  1436. }
  1437. return;
  1438. finish:
  1439. dev_dbg(dd->dev, "update done: err: %d\n", err);
  1440. /* finish curent request */
  1441. omap_sham_finish_req(dd->req, err);
  1442. }
  1443. static irqreturn_t omap_sham_irq_common(struct omap_sham_dev *dd)
  1444. {
  1445. set_bit(FLAGS_OUTPUT_READY, &dd->flags);
  1446. tasklet_schedule(&dd->done_task);
  1447. return IRQ_HANDLED;
  1448. }
  1449. static irqreturn_t omap_sham_irq_omap2(int irq, void *dev_id)
  1450. {
  1451. struct omap_sham_dev *dd = dev_id;
  1452. if (unlikely(test_bit(FLAGS_FINAL, &dd->flags)))
  1453. /* final -> allow device to go to power-saving mode */
  1454. omap_sham_write_mask(dd, SHA_REG_CTRL, 0, SHA_REG_CTRL_LENGTH);
  1455. omap_sham_write_mask(dd, SHA_REG_CTRL, SHA_REG_CTRL_OUTPUT_READY,
  1456. SHA_REG_CTRL_OUTPUT_READY);
  1457. omap_sham_read(dd, SHA_REG_CTRL);
  1458. return omap_sham_irq_common(dd);
  1459. }
  1460. static irqreturn_t omap_sham_irq_omap4(int irq, void *dev_id)
  1461. {
  1462. struct omap_sham_dev *dd = dev_id;
  1463. omap_sham_write_mask(dd, SHA_REG_MASK(dd), 0, SHA_REG_MASK_IT_EN);
  1464. return omap_sham_irq_common(dd);
  1465. }
  1466. static struct omap_sham_algs_info omap_sham_algs_info_omap2[] = {
  1467. {
  1468. .algs_list = algs_sha1_md5,
  1469. .size = ARRAY_SIZE(algs_sha1_md5),
  1470. },
  1471. };
  1472. static const struct omap_sham_pdata omap_sham_pdata_omap2 = {
  1473. .algs_info = omap_sham_algs_info_omap2,
  1474. .algs_info_size = ARRAY_SIZE(omap_sham_algs_info_omap2),
  1475. .flags = BIT(FLAGS_BE32_SHA1),
  1476. .digest_size = SHA1_DIGEST_SIZE,
  1477. .copy_hash = omap_sham_copy_hash_omap2,
  1478. .write_ctrl = omap_sham_write_ctrl_omap2,
  1479. .trigger = omap_sham_trigger_omap2,
  1480. .poll_irq = omap_sham_poll_irq_omap2,
  1481. .intr_hdlr = omap_sham_irq_omap2,
  1482. .idigest_ofs = 0x00,
  1483. .din_ofs = 0x1c,
  1484. .digcnt_ofs = 0x14,
  1485. .rev_ofs = 0x5c,
  1486. .mask_ofs = 0x60,
  1487. .sysstatus_ofs = 0x64,
  1488. .major_mask = 0xf0,
  1489. .major_shift = 4,
  1490. .minor_mask = 0x0f,
  1491. .minor_shift = 0,
  1492. };
  1493. #ifdef CONFIG_OF
  1494. static struct omap_sham_algs_info omap_sham_algs_info_omap4[] = {
  1495. {
  1496. .algs_list = algs_sha1_md5,
  1497. .size = ARRAY_SIZE(algs_sha1_md5),
  1498. },
  1499. {
  1500. .algs_list = algs_sha224_sha256,
  1501. .size = ARRAY_SIZE(algs_sha224_sha256),
  1502. },
  1503. };
  1504. static const struct omap_sham_pdata omap_sham_pdata_omap4 = {
  1505. .algs_info = omap_sham_algs_info_omap4,
  1506. .algs_info_size = ARRAY_SIZE(omap_sham_algs_info_omap4),
  1507. .flags = BIT(FLAGS_AUTO_XOR),
  1508. .digest_size = SHA256_DIGEST_SIZE,
  1509. .copy_hash = omap_sham_copy_hash_omap4,
  1510. .write_ctrl = omap_sham_write_ctrl_omap4,
  1511. .trigger = omap_sham_trigger_omap4,
  1512. .poll_irq = omap_sham_poll_irq_omap4,
  1513. .intr_hdlr = omap_sham_irq_omap4,
  1514. .idigest_ofs = 0x020,
  1515. .odigest_ofs = 0x0,
  1516. .din_ofs = 0x080,
  1517. .digcnt_ofs = 0x040,
  1518. .rev_ofs = 0x100,
  1519. .mask_ofs = 0x110,
  1520. .sysstatus_ofs = 0x114,
  1521. .mode_ofs = 0x44,
  1522. .length_ofs = 0x48,
  1523. .major_mask = 0x0700,
  1524. .major_shift = 8,
  1525. .minor_mask = 0x003f,
  1526. .minor_shift = 0,
  1527. };
  1528. static struct omap_sham_algs_info omap_sham_algs_info_omap5[] = {
  1529. {
  1530. .algs_list = algs_sha1_md5,
  1531. .size = ARRAY_SIZE(algs_sha1_md5),
  1532. },
  1533. {
  1534. .algs_list = algs_sha224_sha256,
  1535. .size = ARRAY_SIZE(algs_sha224_sha256),
  1536. },
  1537. {
  1538. .algs_list = algs_sha384_sha512,
  1539. .size = ARRAY_SIZE(algs_sha384_sha512),
  1540. },
  1541. };
  1542. static const struct omap_sham_pdata omap_sham_pdata_omap5 = {
  1543. .algs_info = omap_sham_algs_info_omap5,
  1544. .algs_info_size = ARRAY_SIZE(omap_sham_algs_info_omap5),
  1545. .flags = BIT(FLAGS_AUTO_XOR),
  1546. .digest_size = SHA512_DIGEST_SIZE,
  1547. .copy_hash = omap_sham_copy_hash_omap4,
  1548. .write_ctrl = omap_sham_write_ctrl_omap4,
  1549. .trigger = omap_sham_trigger_omap4,
  1550. .poll_irq = omap_sham_poll_irq_omap4,
  1551. .intr_hdlr = omap_sham_irq_omap4,
  1552. .idigest_ofs = 0x240,
  1553. .odigest_ofs = 0x200,
  1554. .din_ofs = 0x080,
  1555. .digcnt_ofs = 0x280,
  1556. .rev_ofs = 0x100,
  1557. .mask_ofs = 0x110,
  1558. .sysstatus_ofs = 0x114,
  1559. .mode_ofs = 0x284,
  1560. .length_ofs = 0x288,
  1561. .major_mask = 0x0700,
  1562. .major_shift = 8,
  1563. .minor_mask = 0x003f,
  1564. .minor_shift = 0,
  1565. };
  1566. static const struct of_device_id omap_sham_of_match[] = {
  1567. {
  1568. .compatible = "ti,omap2-sham",
  1569. .data = &omap_sham_pdata_omap2,
  1570. },
  1571. {
  1572. .compatible = "ti,omap3-sham",
  1573. .data = &omap_sham_pdata_omap2,
  1574. },
  1575. {
  1576. .compatible = "ti,omap4-sham",
  1577. .data = &omap_sham_pdata_omap4,
  1578. },
  1579. {
  1580. .compatible = "ti,omap5-sham",
  1581. .data = &omap_sham_pdata_omap5,
  1582. },
  1583. {},
  1584. };
  1585. MODULE_DEVICE_TABLE(of, omap_sham_of_match);
  1586. static int omap_sham_get_res_of(struct omap_sham_dev *dd,
  1587. struct device *dev, struct resource *res)
  1588. {
  1589. struct device_node *node = dev->of_node;
  1590. int err = 0;
  1591. dd->pdata = of_device_get_match_data(dev);
  1592. if (!dd->pdata) {
  1593. dev_err(dev, "no compatible OF match\n");
  1594. err = -EINVAL;
  1595. goto err;
  1596. }
  1597. err = of_address_to_resource(node, 0, res);
  1598. if (err < 0) {
  1599. dev_err(dev, "can't translate OF node address\n");
  1600. err = -EINVAL;
  1601. goto err;
  1602. }
  1603. dd->irq = irq_of_parse_and_map(node, 0);
  1604. if (!dd->irq) {
  1605. dev_err(dev, "can't translate OF irq value\n");
  1606. err = -EINVAL;
  1607. goto err;
  1608. }
  1609. err:
  1610. return err;
  1611. }
  1612. #else
  1613. static const struct of_device_id omap_sham_of_match[] = {
  1614. {},
  1615. };
  1616. static int omap_sham_get_res_of(struct omap_sham_dev *dd,
  1617. struct device *dev, struct resource *res)
  1618. {
  1619. return -EINVAL;
  1620. }
  1621. #endif
  1622. static int omap_sham_get_res_pdev(struct omap_sham_dev *dd,
  1623. struct platform_device *pdev, struct resource *res)
  1624. {
  1625. struct device *dev = &pdev->dev;
  1626. struct resource *r;
  1627. int err = 0;
  1628. /* Get the base address */
  1629. r = platform_get_resource(pdev, IORESOURCE_MEM, 0);
  1630. if (!r) {
  1631. dev_err(dev, "no MEM resource info\n");
  1632. err = -ENODEV;
  1633. goto err;
  1634. }
  1635. memcpy(res, r, sizeof(*res));
  1636. /* Get the IRQ */
  1637. dd->irq = platform_get_irq(pdev, 0);
  1638. if (dd->irq < 0) {
  1639. err = dd->irq;
  1640. goto err;
  1641. }
  1642. /* Only OMAP2/3 can be non-DT */
  1643. dd->pdata = &omap_sham_pdata_omap2;
  1644. err:
  1645. return err;
  1646. }
  1647. static ssize_t fallback_show(struct device *dev, struct device_attribute *attr,
  1648. char *buf)
  1649. {
  1650. struct omap_sham_dev *dd = dev_get_drvdata(dev);
  1651. return sprintf(buf, "%d\n", dd->fallback_sz);
  1652. }
  1653. static ssize_t fallback_store(struct device *dev, struct device_attribute *attr,
  1654. const char *buf, size_t size)
  1655. {
  1656. struct omap_sham_dev *dd = dev_get_drvdata(dev);
  1657. ssize_t status;
  1658. long value;
  1659. status = kstrtol(buf, 0, &value);
  1660. if (status)
  1661. return status;
  1662. /* HW accelerator only works with buffers > 9 */
  1663. if (value < 9) {
  1664. dev_err(dev, "minimum fallback size 9\n");
  1665. return -EINVAL;
  1666. }
  1667. dd->fallback_sz = value;
  1668. return size;
  1669. }
  1670. static ssize_t queue_len_show(struct device *dev, struct device_attribute *attr,
  1671. char *buf)
  1672. {
  1673. struct omap_sham_dev *dd = dev_get_drvdata(dev);
  1674. return sprintf(buf, "%d\n", dd->queue.max_qlen);
  1675. }
  1676. static ssize_t queue_len_store(struct device *dev,
  1677. struct device_attribute *attr, const char *buf,
  1678. size_t size)
  1679. {
  1680. struct omap_sham_dev *dd = dev_get_drvdata(dev);
  1681. ssize_t status;
  1682. long value;
  1683. status = kstrtol(buf, 0, &value);
  1684. if (status)
  1685. return status;
  1686. if (value < 1)
  1687. return -EINVAL;
  1688. /*
  1689. * Changing the queue size in fly is safe, if size becomes smaller
  1690. * than current size, it will just not accept new entries until
  1691. * it has shrank enough.
  1692. */
  1693. dd->queue.max_qlen = value;
  1694. return size;
  1695. }
  1696. static DEVICE_ATTR_RW(queue_len);
  1697. static DEVICE_ATTR_RW(fallback);
  1698. static struct attribute *omap_sham_attrs[] = {
  1699. &dev_attr_queue_len.attr,
  1700. &dev_attr_fallback.attr,
  1701. NULL,
  1702. };
  1703. static const struct attribute_group omap_sham_attr_group = {
  1704. .attrs = omap_sham_attrs,
  1705. };
  1706. static int omap_sham_probe(struct platform_device *pdev)
  1707. {
  1708. struct omap_sham_dev *dd;
  1709. struct device *dev = &pdev->dev;
  1710. struct resource res;
  1711. dma_cap_mask_t mask;
  1712. int err, i, j;
  1713. u32 rev;
  1714. dd = devm_kzalloc(dev, sizeof(struct omap_sham_dev), GFP_KERNEL);
  1715. if (dd == NULL) {
  1716. dev_err(dev, "unable to alloc data struct.\n");
  1717. err = -ENOMEM;
  1718. goto data_err;
  1719. }
  1720. dd->dev = dev;
  1721. platform_set_drvdata(pdev, dd);
  1722. INIT_LIST_HEAD(&dd->list);
  1723. tasklet_init(&dd->done_task, omap_sham_done_task, (unsigned long)dd);
  1724. crypto_init_queue(&dd->queue, OMAP_SHAM_QUEUE_LENGTH);
  1725. err = (dev->of_node) ? omap_sham_get_res_of(dd, dev, &res) :
  1726. omap_sham_get_res_pdev(dd, pdev, &res);
  1727. if (err)
  1728. goto data_err;
  1729. dd->io_base = devm_ioremap_resource(dev, &res);
  1730. if (IS_ERR(dd->io_base)) {
  1731. err = PTR_ERR(dd->io_base);
  1732. goto data_err;
  1733. }
  1734. dd->phys_base = res.start;
  1735. err = devm_request_irq(dev, dd->irq, dd->pdata->intr_hdlr,
  1736. IRQF_TRIGGER_NONE, dev_name(dev), dd);
  1737. if (err) {
  1738. dev_err(dev, "unable to request irq %d, err = %d\n",
  1739. dd->irq, err);
  1740. goto data_err;
  1741. }
  1742. dma_cap_zero(mask);
  1743. dma_cap_set(DMA_SLAVE, mask);
  1744. dd->dma_lch = dma_request_chan(dev, "rx");
  1745. if (IS_ERR(dd->dma_lch)) {
  1746. err = PTR_ERR(dd->dma_lch);
  1747. if (err == -EPROBE_DEFER)
  1748. goto data_err;
  1749. dd->polling_mode = 1;
  1750. dev_dbg(dev, "using polling mode instead of dma\n");
  1751. }
  1752. dd->flags |= dd->pdata->flags;
  1753. sham.flags |= dd->pdata->flags;
  1754. pm_runtime_use_autosuspend(dev);
  1755. pm_runtime_set_autosuspend_delay(dev, DEFAULT_AUTOSUSPEND_DELAY);
  1756. dd->fallback_sz = OMAP_SHA_DMA_THRESHOLD;
  1757. pm_runtime_enable(dev);
  1758. err = pm_runtime_resume_and_get(dev);
  1759. if (err < 0) {
  1760. dev_err(dev, "failed to get sync: %d\n", err);
  1761. goto err_pm;
  1762. }
  1763. rev = omap_sham_read(dd, SHA_REG_REV(dd));
  1764. pm_runtime_put_sync(&pdev->dev);
  1765. dev_info(dev, "hw accel on OMAP rev %u.%u\n",
  1766. (rev & dd->pdata->major_mask) >> dd->pdata->major_shift,
  1767. (rev & dd->pdata->minor_mask) >> dd->pdata->minor_shift);
  1768. spin_lock_bh(&sham.lock);
  1769. list_add_tail(&dd->list, &sham.dev_list);
  1770. spin_unlock_bh(&sham.lock);
  1771. dd->engine = crypto_engine_alloc_init(dev, 1);
  1772. if (!dd->engine) {
  1773. err = -ENOMEM;
  1774. goto err_engine;
  1775. }
  1776. err = crypto_engine_start(dd->engine);
  1777. if (err)
  1778. goto err_engine_start;
  1779. for (i = 0; i < dd->pdata->algs_info_size; i++) {
  1780. if (dd->pdata->algs_info[i].registered)
  1781. break;
  1782. for (j = 0; j < dd->pdata->algs_info[i].size; j++) {
  1783. struct ahash_engine_alg *ealg;
  1784. struct ahash_alg *alg;
  1785. ealg = &dd->pdata->algs_info[i].algs_list[j];
  1786. alg = &ealg->base;
  1787. alg->export = omap_sham_export;
  1788. alg->import = omap_sham_import;
  1789. alg->halg.statesize = sizeof(struct omap_sham_reqctx) +
  1790. BUFLEN;
  1791. err = crypto_engine_register_ahash(ealg);
  1792. if (err)
  1793. goto err_algs;
  1794. dd->pdata->algs_info[i].registered++;
  1795. }
  1796. }
  1797. err = sysfs_create_group(&dev->kobj, &omap_sham_attr_group);
  1798. if (err) {
  1799. dev_err(dev, "could not create sysfs device attrs\n");
  1800. goto err_algs;
  1801. }
  1802. return 0;
  1803. err_algs:
  1804. for (i = dd->pdata->algs_info_size - 1; i >= 0; i--)
  1805. for (j = dd->pdata->algs_info[i].registered - 1; j >= 0; j--)
  1806. crypto_engine_unregister_ahash(
  1807. &dd->pdata->algs_info[i].algs_list[j]);
  1808. err_engine_start:
  1809. crypto_engine_exit(dd->engine);
  1810. err_engine:
  1811. spin_lock_bh(&sham.lock);
  1812. list_del(&dd->list);
  1813. spin_unlock_bh(&sham.lock);
  1814. err_pm:
  1815. pm_runtime_dont_use_autosuspend(dev);
  1816. pm_runtime_disable(dev);
  1817. if (!dd->polling_mode)
  1818. dma_release_channel(dd->dma_lch);
  1819. data_err:
  1820. dev_err(dev, "initialization failed.\n");
  1821. return err;
  1822. }
  1823. static void omap_sham_remove(struct platform_device *pdev)
  1824. {
  1825. struct omap_sham_dev *dd;
  1826. int i, j;
  1827. dd = platform_get_drvdata(pdev);
  1828. spin_lock_bh(&sham.lock);
  1829. list_del(&dd->list);
  1830. spin_unlock_bh(&sham.lock);
  1831. for (i = dd->pdata->algs_info_size - 1; i >= 0; i--)
  1832. for (j = dd->pdata->algs_info[i].registered - 1; j >= 0; j--) {
  1833. crypto_engine_unregister_ahash(
  1834. &dd->pdata->algs_info[i].algs_list[j]);
  1835. dd->pdata->algs_info[i].registered--;
  1836. }
  1837. tasklet_kill(&dd->done_task);
  1838. pm_runtime_dont_use_autosuspend(&pdev->dev);
  1839. pm_runtime_disable(&pdev->dev);
  1840. if (!dd->polling_mode)
  1841. dma_release_channel(dd->dma_lch);
  1842. sysfs_remove_group(&dd->dev->kobj, &omap_sham_attr_group);
  1843. }
  1844. static struct platform_driver omap_sham_driver = {
  1845. .probe = omap_sham_probe,
  1846. .remove_new = omap_sham_remove,
  1847. .driver = {
  1848. .name = "omap-sham",
  1849. .of_match_table = omap_sham_of_match,
  1850. },
  1851. };
  1852. module_platform_driver(omap_sham_driver);
  1853. MODULE_DESCRIPTION("OMAP SHA1/MD5 hw acceleration support.");
  1854. MODULE_LICENSE("GPL v2");
  1855. MODULE_AUTHOR("Dmitry Kasatkin");
  1856. MODULE_ALIAS("platform:omap-sham");