jh7110-rsa.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * StarFive Public Key Algo acceleration driver
  4. *
  5. * Copyright (c) 2022 StarFive Technology
  6. */
  7. #include <linux/crypto.h>
  8. #include <linux/iopoll.h>
  9. #include <crypto/akcipher.h>
  10. #include <crypto/algapi.h>
  11. #include <crypto/internal/akcipher.h>
  12. #include <crypto/internal/rsa.h>
  13. #include <crypto/scatterwalk.h>
  14. #include "jh7110-cryp.h"
  15. #define STARFIVE_PKA_REGS_OFFSET 0x400
  16. #define STARFIVE_PKA_CACR_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x0)
  17. #define STARFIVE_PKA_CASR_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x4)
  18. #define STARFIVE_PKA_CAAR_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x8)
  19. #define STARFIVE_PKA_CAER_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x108)
  20. #define STARFIVE_PKA_CANR_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x208)
  21. /* R ^ 2 mod N and N0' */
  22. #define CRYPTO_CMD_PRE 0x0
  23. /* A * R mod N ==> A */
  24. #define CRYPTO_CMD_ARN 0x5
  25. /* A * E * R mod N ==> A */
  26. #define CRYPTO_CMD_AERN 0x6
  27. /* A * A * R mod N ==> A */
  28. #define CRYPTO_CMD_AARN 0x7
  29. #define STARFIVE_RSA_RESET 0x2
  30. static inline int starfive_pka_wait_done(struct starfive_cryp_ctx *ctx)
  31. {
  32. struct starfive_cryp_dev *cryp = ctx->cryp;
  33. u32 status;
  34. return readl_relaxed_poll_timeout(cryp->base + STARFIVE_PKA_CASR_OFFSET, status,
  35. status & STARFIVE_PKA_DONE, 10, 100000);
  36. }
  37. static void starfive_rsa_free_key(struct starfive_rsa_key *key)
  38. {
  39. if (!key->key_sz)
  40. return;
  41. kfree_sensitive(key->d);
  42. kfree_sensitive(key->e);
  43. kfree_sensitive(key->n);
  44. memset(key, 0, sizeof(*key));
  45. }
  46. static unsigned int starfive_rsa_get_nbit(u8 *pa, u32 snum, int key_sz)
  47. {
  48. u32 i;
  49. u8 value;
  50. i = snum >> 3;
  51. value = pa[key_sz - i - 1];
  52. value >>= snum & 0x7;
  53. value &= 0x1;
  54. return value;
  55. }
  56. static int starfive_rsa_montgomery_form(struct starfive_cryp_ctx *ctx,
  57. u32 *out, u32 *in, u8 mont,
  58. u32 *mod, int bit_len)
  59. {
  60. struct starfive_cryp_dev *cryp = ctx->cryp;
  61. struct starfive_cryp_request_ctx *rctx = ctx->rctx;
  62. int count = (ALIGN(rctx->total, 4) / 4) - 1;
  63. int loop;
  64. u32 temp;
  65. u8 opsize;
  66. opsize = (bit_len - 1) >> 5;
  67. rctx->csr.pka.v = 0;
  68. writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
  69. for (loop = 0; loop <= opsize; loop++)
  70. writel(mod[opsize - loop], cryp->base + STARFIVE_PKA_CANR_OFFSET + loop * 4);
  71. if (mont) {
  72. rctx->csr.pka.v = 0;
  73. rctx->csr.pka.cln_done = 1;
  74. rctx->csr.pka.opsize = opsize;
  75. rctx->csr.pka.exposize = opsize;
  76. rctx->csr.pka.cmd = CRYPTO_CMD_PRE;
  77. rctx->csr.pka.start = 1;
  78. rctx->csr.pka.not_r2 = 1;
  79. rctx->csr.pka.ie = 1;
  80. writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
  81. if (starfive_pka_wait_done(ctx))
  82. return -ETIMEDOUT;
  83. for (loop = 0; loop <= opsize; loop++)
  84. writel(in[opsize - loop], cryp->base + STARFIVE_PKA_CAAR_OFFSET + loop * 4);
  85. writel(0x1000000, cryp->base + STARFIVE_PKA_CAER_OFFSET);
  86. for (loop = 1; loop <= opsize; loop++)
  87. writel(0, cryp->base + STARFIVE_PKA_CAER_OFFSET + loop * 4);
  88. rctx->csr.pka.v = 0;
  89. rctx->csr.pka.cln_done = 1;
  90. rctx->csr.pka.opsize = opsize;
  91. rctx->csr.pka.exposize = opsize;
  92. rctx->csr.pka.cmd = CRYPTO_CMD_AERN;
  93. rctx->csr.pka.start = 1;
  94. rctx->csr.pka.ie = 1;
  95. writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
  96. if (starfive_pka_wait_done(ctx))
  97. return -ETIMEDOUT;
  98. } else {
  99. rctx->csr.pka.v = 0;
  100. rctx->csr.pka.cln_done = 1;
  101. rctx->csr.pka.opsize = opsize;
  102. rctx->csr.pka.exposize = opsize;
  103. rctx->csr.pka.cmd = CRYPTO_CMD_PRE;
  104. rctx->csr.pka.start = 1;
  105. rctx->csr.pka.pre_expf = 1;
  106. rctx->csr.pka.ie = 1;
  107. writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
  108. if (starfive_pka_wait_done(ctx))
  109. return -ETIMEDOUT;
  110. for (loop = 0; loop <= count; loop++)
  111. writel(in[count - loop], cryp->base + STARFIVE_PKA_CAER_OFFSET + loop * 4);
  112. /*pad with 0 up to opsize*/
  113. for (loop = count + 1; loop <= opsize; loop++)
  114. writel(0, cryp->base + STARFIVE_PKA_CAER_OFFSET + loop * 4);
  115. rctx->csr.pka.v = 0;
  116. rctx->csr.pka.cln_done = 1;
  117. rctx->csr.pka.opsize = opsize;
  118. rctx->csr.pka.exposize = opsize;
  119. rctx->csr.pka.cmd = CRYPTO_CMD_ARN;
  120. rctx->csr.pka.start = 1;
  121. rctx->csr.pka.ie = 1;
  122. writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
  123. if (starfive_pka_wait_done(ctx))
  124. return -ETIMEDOUT;
  125. }
  126. for (loop = 0; loop <= opsize; loop++) {
  127. temp = readl(cryp->base + STARFIVE_PKA_CAAR_OFFSET + 0x4 * loop);
  128. out[opsize - loop] = temp;
  129. }
  130. return 0;
  131. }
  132. static int starfive_rsa_cpu_start(struct starfive_cryp_ctx *ctx, u32 *result,
  133. u8 *de, u32 *n, int key_sz)
  134. {
  135. struct starfive_cryp_dev *cryp = ctx->cryp;
  136. struct starfive_cryp_request_ctx *rctx = ctx->rctx;
  137. struct starfive_rsa_key *key = &ctx->rsa_key;
  138. u32 temp;
  139. int ret = 0;
  140. int opsize, mlen, loop;
  141. unsigned int *mta;
  142. opsize = (key_sz - 1) >> 2;
  143. mta = kmalloc(key_sz, GFP_KERNEL);
  144. if (!mta)
  145. return -ENOMEM;
  146. ret = starfive_rsa_montgomery_form(ctx, mta, (u32 *)rctx->rsa_data,
  147. 0, n, key_sz << 3);
  148. if (ret) {
  149. dev_err_probe(cryp->dev, ret, "Conversion to Montgomery failed");
  150. goto rsa_err;
  151. }
  152. for (loop = 0; loop <= opsize; loop++)
  153. writel(mta[opsize - loop],
  154. cryp->base + STARFIVE_PKA_CAER_OFFSET + loop * 4);
  155. for (loop = key->bitlen - 1; loop > 0; loop--) {
  156. mlen = starfive_rsa_get_nbit(de, loop - 1, key_sz);
  157. rctx->csr.pka.v = 0;
  158. rctx->csr.pka.cln_done = 1;
  159. rctx->csr.pka.opsize = opsize;
  160. rctx->csr.pka.exposize = opsize;
  161. rctx->csr.pka.cmd = CRYPTO_CMD_AARN;
  162. rctx->csr.pka.start = 1;
  163. rctx->csr.pka.ie = 1;
  164. writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
  165. ret = -ETIMEDOUT;
  166. if (starfive_pka_wait_done(ctx))
  167. goto rsa_err;
  168. if (mlen) {
  169. rctx->csr.pka.v = 0;
  170. rctx->csr.pka.cln_done = 1;
  171. rctx->csr.pka.opsize = opsize;
  172. rctx->csr.pka.exposize = opsize;
  173. rctx->csr.pka.cmd = CRYPTO_CMD_AERN;
  174. rctx->csr.pka.start = 1;
  175. rctx->csr.pka.ie = 1;
  176. writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
  177. if (starfive_pka_wait_done(ctx))
  178. goto rsa_err;
  179. }
  180. }
  181. for (loop = 0; loop <= opsize; loop++) {
  182. temp = readl(cryp->base + STARFIVE_PKA_CAAR_OFFSET + 0x4 * loop);
  183. result[opsize - loop] = temp;
  184. }
  185. ret = starfive_rsa_montgomery_form(ctx, result, result, 1, n, key_sz << 3);
  186. if (ret)
  187. dev_err_probe(cryp->dev, ret, "Conversion from Montgomery failed");
  188. rsa_err:
  189. kfree(mta);
  190. return ret;
  191. }
  192. static int starfive_rsa_start(struct starfive_cryp_ctx *ctx, u8 *result,
  193. u8 *de, u8 *n, int key_sz)
  194. {
  195. return starfive_rsa_cpu_start(ctx, (u32 *)result, de, (u32 *)n, key_sz);
  196. }
  197. static int starfive_rsa_enc_core(struct starfive_cryp_ctx *ctx, int enc)
  198. {
  199. struct starfive_cryp_dev *cryp = ctx->cryp;
  200. struct starfive_cryp_request_ctx *rctx = ctx->rctx;
  201. struct starfive_rsa_key *key = &ctx->rsa_key;
  202. int ret = 0, shift = 0;
  203. writel(STARFIVE_RSA_RESET, cryp->base + STARFIVE_PKA_CACR_OFFSET);
  204. if (!IS_ALIGNED(rctx->total, sizeof(u32))) {
  205. shift = sizeof(u32) - (rctx->total & 0x3);
  206. memset(rctx->rsa_data, 0, shift);
  207. }
  208. rctx->total = sg_copy_to_buffer(rctx->in_sg, sg_nents(rctx->in_sg),
  209. rctx->rsa_data + shift, rctx->total);
  210. if (enc) {
  211. key->bitlen = key->e_bitlen;
  212. ret = starfive_rsa_start(ctx, rctx->rsa_data, key->e,
  213. key->n, key->key_sz);
  214. } else {
  215. key->bitlen = key->d_bitlen;
  216. ret = starfive_rsa_start(ctx, rctx->rsa_data, key->d,
  217. key->n, key->key_sz);
  218. }
  219. if (ret)
  220. goto err_rsa_crypt;
  221. sg_copy_buffer(rctx->out_sg, sg_nents(rctx->out_sg),
  222. rctx->rsa_data, key->key_sz, 0, 0);
  223. err_rsa_crypt:
  224. writel(STARFIVE_RSA_RESET, cryp->base + STARFIVE_PKA_CACR_OFFSET);
  225. return ret;
  226. }
  227. static int starfive_rsa_enc(struct akcipher_request *req)
  228. {
  229. struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
  230. struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
  231. struct starfive_cryp_dev *cryp = ctx->cryp;
  232. struct starfive_rsa_key *key = &ctx->rsa_key;
  233. struct starfive_cryp_request_ctx *rctx = akcipher_request_ctx(req);
  234. int ret;
  235. if (!key->key_sz) {
  236. akcipher_request_set_tfm(req, ctx->akcipher_fbk);
  237. ret = crypto_akcipher_encrypt(req);
  238. akcipher_request_set_tfm(req, tfm);
  239. return ret;
  240. }
  241. if (unlikely(!key->n || !key->e))
  242. return -EINVAL;
  243. if (req->dst_len < key->key_sz)
  244. return dev_err_probe(cryp->dev, -EOVERFLOW,
  245. "Output buffer length less than parameter n\n");
  246. rctx->in_sg = req->src;
  247. rctx->out_sg = req->dst;
  248. rctx->total = req->src_len;
  249. ctx->rctx = rctx;
  250. return starfive_rsa_enc_core(ctx, 1);
  251. }
  252. static int starfive_rsa_dec(struct akcipher_request *req)
  253. {
  254. struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
  255. struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
  256. struct starfive_cryp_dev *cryp = ctx->cryp;
  257. struct starfive_rsa_key *key = &ctx->rsa_key;
  258. struct starfive_cryp_request_ctx *rctx = akcipher_request_ctx(req);
  259. int ret;
  260. if (!key->key_sz) {
  261. akcipher_request_set_tfm(req, ctx->akcipher_fbk);
  262. ret = crypto_akcipher_decrypt(req);
  263. akcipher_request_set_tfm(req, tfm);
  264. return ret;
  265. }
  266. if (unlikely(!key->n || !key->d))
  267. return -EINVAL;
  268. if (req->dst_len < key->key_sz)
  269. return dev_err_probe(cryp->dev, -EOVERFLOW,
  270. "Output buffer length less than parameter n\n");
  271. rctx->in_sg = req->src;
  272. rctx->out_sg = req->dst;
  273. ctx->rctx = rctx;
  274. rctx->total = req->src_len;
  275. return starfive_rsa_enc_core(ctx, 0);
  276. }
  277. static int starfive_rsa_set_n(struct starfive_rsa_key *rsa_key,
  278. const char *value, size_t vlen)
  279. {
  280. const char *ptr = value;
  281. unsigned int bitslen;
  282. int ret;
  283. while (!*ptr && vlen) {
  284. ptr++;
  285. vlen--;
  286. }
  287. rsa_key->key_sz = vlen;
  288. bitslen = rsa_key->key_sz << 3;
  289. /* check valid key size */
  290. if (bitslen & 0x1f)
  291. return -EINVAL;
  292. ret = -ENOMEM;
  293. rsa_key->n = kmemdup(ptr, rsa_key->key_sz, GFP_KERNEL);
  294. if (!rsa_key->n)
  295. goto err;
  296. return 0;
  297. err:
  298. rsa_key->key_sz = 0;
  299. rsa_key->n = NULL;
  300. starfive_rsa_free_key(rsa_key);
  301. return ret;
  302. }
  303. static int starfive_rsa_set_e(struct starfive_rsa_key *rsa_key,
  304. const char *value, size_t vlen)
  305. {
  306. const char *ptr = value;
  307. unsigned char pt;
  308. int loop;
  309. while (!*ptr && vlen) {
  310. ptr++;
  311. vlen--;
  312. }
  313. pt = *ptr;
  314. if (!rsa_key->key_sz || !vlen || vlen > rsa_key->key_sz) {
  315. rsa_key->e = NULL;
  316. return -EINVAL;
  317. }
  318. rsa_key->e = kzalloc(rsa_key->key_sz, GFP_KERNEL);
  319. if (!rsa_key->e)
  320. return -ENOMEM;
  321. for (loop = 8; loop > 0; loop--) {
  322. if (pt >> (loop - 1))
  323. break;
  324. }
  325. rsa_key->e_bitlen = (vlen - 1) * 8 + loop;
  326. memcpy(rsa_key->e + (rsa_key->key_sz - vlen), ptr, vlen);
  327. return 0;
  328. }
  329. static int starfive_rsa_set_d(struct starfive_rsa_key *rsa_key,
  330. const char *value, size_t vlen)
  331. {
  332. const char *ptr = value;
  333. unsigned char pt;
  334. int loop;
  335. int ret;
  336. while (!*ptr && vlen) {
  337. ptr++;
  338. vlen--;
  339. }
  340. pt = *ptr;
  341. ret = -EINVAL;
  342. if (!rsa_key->key_sz || !vlen || vlen > rsa_key->key_sz)
  343. goto err;
  344. ret = -ENOMEM;
  345. rsa_key->d = kzalloc(rsa_key->key_sz, GFP_KERNEL);
  346. if (!rsa_key->d)
  347. goto err;
  348. for (loop = 8; loop > 0; loop--) {
  349. if (pt >> (loop - 1))
  350. break;
  351. }
  352. rsa_key->d_bitlen = (vlen - 1) * 8 + loop;
  353. memcpy(rsa_key->d + (rsa_key->key_sz - vlen), ptr, vlen);
  354. return 0;
  355. err:
  356. rsa_key->d = NULL;
  357. return ret;
  358. }
  359. static int starfive_rsa_setkey(struct crypto_akcipher *tfm, const void *key,
  360. unsigned int keylen, bool private)
  361. {
  362. struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
  363. struct rsa_key raw_key = {NULL};
  364. struct starfive_rsa_key *rsa_key = &ctx->rsa_key;
  365. int ret;
  366. if (private)
  367. ret = rsa_parse_priv_key(&raw_key, key, keylen);
  368. else
  369. ret = rsa_parse_pub_key(&raw_key, key, keylen);
  370. if (ret < 0)
  371. goto err;
  372. starfive_rsa_free_key(rsa_key);
  373. /* Use fallback for mod > 256 + 1 byte prefix */
  374. if (raw_key.n_sz > STARFIVE_RSA_MAX_KEYSZ + 1)
  375. return 0;
  376. ret = starfive_rsa_set_n(rsa_key, raw_key.n, raw_key.n_sz);
  377. if (ret)
  378. return ret;
  379. ret = starfive_rsa_set_e(rsa_key, raw_key.e, raw_key.e_sz);
  380. if (ret)
  381. goto err;
  382. if (private) {
  383. ret = starfive_rsa_set_d(rsa_key, raw_key.d, raw_key.d_sz);
  384. if (ret)
  385. goto err;
  386. }
  387. if (!rsa_key->n || !rsa_key->e) {
  388. ret = -EINVAL;
  389. goto err;
  390. }
  391. if (private && !rsa_key->d) {
  392. ret = -EINVAL;
  393. goto err;
  394. }
  395. return 0;
  396. err:
  397. starfive_rsa_free_key(rsa_key);
  398. return ret;
  399. }
  400. static int starfive_rsa_set_pub_key(struct crypto_akcipher *tfm, const void *key,
  401. unsigned int keylen)
  402. {
  403. struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
  404. int ret;
  405. ret = crypto_akcipher_set_pub_key(ctx->akcipher_fbk, key, keylen);
  406. if (ret)
  407. return ret;
  408. return starfive_rsa_setkey(tfm, key, keylen, false);
  409. }
  410. static int starfive_rsa_set_priv_key(struct crypto_akcipher *tfm, const void *key,
  411. unsigned int keylen)
  412. {
  413. struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
  414. int ret;
  415. ret = crypto_akcipher_set_priv_key(ctx->akcipher_fbk, key, keylen);
  416. if (ret)
  417. return ret;
  418. return starfive_rsa_setkey(tfm, key, keylen, true);
  419. }
  420. static unsigned int starfive_rsa_max_size(struct crypto_akcipher *tfm)
  421. {
  422. struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
  423. if (ctx->rsa_key.key_sz)
  424. return ctx->rsa_key.key_sz;
  425. return crypto_akcipher_maxsize(ctx->akcipher_fbk);
  426. }
  427. static int starfive_rsa_init_tfm(struct crypto_akcipher *tfm)
  428. {
  429. struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
  430. ctx->cryp = starfive_cryp_find_dev(ctx);
  431. if (!ctx->cryp)
  432. return -ENODEV;
  433. ctx->akcipher_fbk = crypto_alloc_akcipher("rsa-generic", 0, 0);
  434. if (IS_ERR(ctx->akcipher_fbk))
  435. return PTR_ERR(ctx->akcipher_fbk);
  436. akcipher_set_reqsize(tfm, sizeof(struct starfive_cryp_request_ctx) +
  437. sizeof(struct crypto_akcipher) + 32);
  438. return 0;
  439. }
  440. static void starfive_rsa_exit_tfm(struct crypto_akcipher *tfm)
  441. {
  442. struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
  443. struct starfive_rsa_key *key = (struct starfive_rsa_key *)&ctx->rsa_key;
  444. crypto_free_akcipher(ctx->akcipher_fbk);
  445. starfive_rsa_free_key(key);
  446. }
  447. static struct akcipher_alg starfive_rsa = {
  448. .encrypt = starfive_rsa_enc,
  449. .decrypt = starfive_rsa_dec,
  450. .sign = starfive_rsa_dec,
  451. .verify = starfive_rsa_enc,
  452. .set_pub_key = starfive_rsa_set_pub_key,
  453. .set_priv_key = starfive_rsa_set_priv_key,
  454. .max_size = starfive_rsa_max_size,
  455. .init = starfive_rsa_init_tfm,
  456. .exit = starfive_rsa_exit_tfm,
  457. .base = {
  458. .cra_name = "rsa",
  459. .cra_driver_name = "starfive-rsa",
  460. .cra_flags = CRYPTO_ALG_TYPE_AKCIPHER |
  461. CRYPTO_ALG_NEED_FALLBACK,
  462. .cra_priority = 3000,
  463. .cra_module = THIS_MODULE,
  464. .cra_ctxsize = sizeof(struct starfive_cryp_ctx),
  465. },
  466. };
  467. int starfive_rsa_register_algs(void)
  468. {
  469. return crypto_register_akcipher(&starfive_rsa);
  470. }
  471. void starfive_rsa_unregister_algs(void)
  472. {
  473. crypto_unregister_akcipher(&starfive_rsa);
  474. }