crypto: caam - add crypto_engine support for RSA algorithms
Add crypto_engine support for RSA algorithms, to make use of the engine queue. The requests, with backlog flag, will be listed into crypto-engine queue and processed by CAAM when free. In case the queue is empty, the request is directly sent to CAAM. Only the backlog request are sent to crypto-engine since the others can be handled by CAAM, if free, especially since JR has up to 1024 entries (more than the 10 entries from crypto-engine). Signed-off-by: Iuliana Prodan <iuliana.prodan@nxp.com> Reviewed-by: Horia Geantă <horia.geanta@nxp.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
parent
1c24022667
commit
bf53795025
|
@ -117,19 +117,28 @@ static void rsa_priv_f3_unmap(struct device *dev, struct rsa_edesc *edesc,
|
||||||
static void rsa_pub_done(struct device *dev, u32 *desc, u32 err, void *context)
|
static void rsa_pub_done(struct device *dev, u32 *desc, u32 err, void *context)
|
||||||
{
|
{
|
||||||
struct akcipher_request *req = context;
|
struct akcipher_request *req = context;
|
||||||
|
struct caam_rsa_req_ctx *req_ctx = akcipher_request_ctx(req);
|
||||||
|
struct caam_drv_private_jr *jrp = dev_get_drvdata(dev);
|
||||||
struct rsa_edesc *edesc;
|
struct rsa_edesc *edesc;
|
||||||
int ecode = 0;
|
int ecode = 0;
|
||||||
|
|
||||||
if (err)
|
if (err)
|
||||||
ecode = caam_jr_strstatus(dev, err);
|
ecode = caam_jr_strstatus(dev, err);
|
||||||
|
|
||||||
edesc = container_of(desc, struct rsa_edesc, hw_desc[0]);
|
edesc = req_ctx->edesc;
|
||||||
|
|
||||||
rsa_pub_unmap(dev, edesc, req);
|
rsa_pub_unmap(dev, edesc, req);
|
||||||
rsa_io_unmap(dev, edesc, req);
|
rsa_io_unmap(dev, edesc, req);
|
||||||
kfree(edesc);
|
kfree(edesc);
|
||||||
|
|
||||||
akcipher_request_complete(req, ecode);
|
/*
|
||||||
|
* If no backlog flag, the completion of the request is done
|
||||||
|
* by CAAM, not crypto engine.
|
||||||
|
*/
|
||||||
|
if (!edesc->bklog)
|
||||||
|
akcipher_request_complete(req, ecode);
|
||||||
|
else
|
||||||
|
crypto_finalize_akcipher_request(jrp->engine, req, ecode);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void rsa_priv_f_done(struct device *dev, u32 *desc, u32 err,
|
static void rsa_priv_f_done(struct device *dev, u32 *desc, u32 err,
|
||||||
|
@ -137,15 +146,17 @@ static void rsa_priv_f_done(struct device *dev, u32 *desc, u32 err,
|
||||||
{
|
{
|
||||||
struct akcipher_request *req = context;
|
struct akcipher_request *req = context;
|
||||||
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
|
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
|
||||||
|
struct caam_drv_private_jr *jrp = dev_get_drvdata(dev);
|
||||||
struct caam_rsa_ctx *ctx = akcipher_tfm_ctx(tfm);
|
struct caam_rsa_ctx *ctx = akcipher_tfm_ctx(tfm);
|
||||||
struct caam_rsa_key *key = &ctx->key;
|
struct caam_rsa_key *key = &ctx->key;
|
||||||
|
struct caam_rsa_req_ctx *req_ctx = akcipher_request_ctx(req);
|
||||||
struct rsa_edesc *edesc;
|
struct rsa_edesc *edesc;
|
||||||
int ecode = 0;
|
int ecode = 0;
|
||||||
|
|
||||||
if (err)
|
if (err)
|
||||||
ecode = caam_jr_strstatus(dev, err);
|
ecode = caam_jr_strstatus(dev, err);
|
||||||
|
|
||||||
edesc = container_of(desc, struct rsa_edesc, hw_desc[0]);
|
edesc = req_ctx->edesc;
|
||||||
|
|
||||||
switch (key->priv_form) {
|
switch (key->priv_form) {
|
||||||
case FORM1:
|
case FORM1:
|
||||||
|
@ -161,7 +172,14 @@ static void rsa_priv_f_done(struct device *dev, u32 *desc, u32 err,
|
||||||
rsa_io_unmap(dev, edesc, req);
|
rsa_io_unmap(dev, edesc, req);
|
||||||
kfree(edesc);
|
kfree(edesc);
|
||||||
|
|
||||||
akcipher_request_complete(req, ecode);
|
/*
|
||||||
|
* If no backlog flag, the completion of the request is done
|
||||||
|
* by CAAM, not crypto engine.
|
||||||
|
*/
|
||||||
|
if (!edesc->bklog)
|
||||||
|
akcipher_request_complete(req, ecode);
|
||||||
|
else
|
||||||
|
crypto_finalize_akcipher_request(jrp->engine, req, ecode);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -309,6 +327,8 @@ static struct rsa_edesc *rsa_edesc_alloc(struct akcipher_request *req,
|
||||||
edesc->src_nents = src_nents;
|
edesc->src_nents = src_nents;
|
||||||
edesc->dst_nents = dst_nents;
|
edesc->dst_nents = dst_nents;
|
||||||
|
|
||||||
|
req_ctx->edesc = edesc;
|
||||||
|
|
||||||
if (!sec4_sg_bytes)
|
if (!sec4_sg_bytes)
|
||||||
return edesc;
|
return edesc;
|
||||||
|
|
||||||
|
@ -339,6 +359,33 @@ src_fail:
|
||||||
return ERR_PTR(-ENOMEM);
|
return ERR_PTR(-ENOMEM);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int akcipher_do_one_req(struct crypto_engine *engine, void *areq)
|
||||||
|
{
|
||||||
|
struct akcipher_request *req = container_of(areq,
|
||||||
|
struct akcipher_request,
|
||||||
|
base);
|
||||||
|
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
|
||||||
|
struct caam_rsa_req_ctx *req_ctx = akcipher_request_ctx(req);
|
||||||
|
struct caam_rsa_ctx *ctx = akcipher_tfm_ctx(tfm);
|
||||||
|
struct device *jrdev = ctx->dev;
|
||||||
|
u32 *desc = req_ctx->edesc->hw_desc;
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
req_ctx->edesc->bklog = true;
|
||||||
|
|
||||||
|
ret = caam_jr_enqueue(jrdev, desc, req_ctx->akcipher_op_done, req);
|
||||||
|
|
||||||
|
if (ret != -EINPROGRESS) {
|
||||||
|
rsa_pub_unmap(jrdev, req_ctx->edesc, req);
|
||||||
|
rsa_io_unmap(jrdev, req_ctx->edesc, req);
|
||||||
|
kfree(req_ctx->edesc);
|
||||||
|
} else {
|
||||||
|
ret = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
static int set_rsa_pub_pdb(struct akcipher_request *req,
|
static int set_rsa_pub_pdb(struct akcipher_request *req,
|
||||||
struct rsa_edesc *edesc)
|
struct rsa_edesc *edesc)
|
||||||
{
|
{
|
||||||
|
@ -602,6 +649,53 @@ unmap_p:
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int akcipher_enqueue_req(struct device *jrdev,
|
||||||
|
void (*cbk)(struct device *jrdev, u32 *desc,
|
||||||
|
u32 err, void *context),
|
||||||
|
struct akcipher_request *req)
|
||||||
|
{
|
||||||
|
struct caam_drv_private_jr *jrpriv = dev_get_drvdata(jrdev);
|
||||||
|
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
|
||||||
|
struct caam_rsa_ctx *ctx = akcipher_tfm_ctx(tfm);
|
||||||
|
struct caam_rsa_key *key = &ctx->key;
|
||||||
|
struct caam_rsa_req_ctx *req_ctx = akcipher_request_ctx(req);
|
||||||
|
struct rsa_edesc *edesc = req_ctx->edesc;
|
||||||
|
u32 *desc = edesc->hw_desc;
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
req_ctx->akcipher_op_done = cbk;
|
||||||
|
/*
|
||||||
|
* Only the backlog request are sent to crypto-engine since the others
|
||||||
|
* can be handled by CAAM, if free, especially since JR has up to 1024
|
||||||
|
* entries (more than the 10 entries from crypto-engine).
|
||||||
|
*/
|
||||||
|
if (req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG)
|
||||||
|
ret = crypto_transfer_akcipher_request_to_engine(jrpriv->engine,
|
||||||
|
req);
|
||||||
|
else
|
||||||
|
ret = caam_jr_enqueue(jrdev, desc, cbk, req);
|
||||||
|
|
||||||
|
if ((ret != -EINPROGRESS) && (ret != -EBUSY)) {
|
||||||
|
switch (key->priv_form) {
|
||||||
|
case FORM1:
|
||||||
|
rsa_priv_f1_unmap(jrdev, edesc, req);
|
||||||
|
break;
|
||||||
|
case FORM2:
|
||||||
|
rsa_priv_f2_unmap(jrdev, edesc, req);
|
||||||
|
break;
|
||||||
|
case FORM3:
|
||||||
|
rsa_priv_f3_unmap(jrdev, edesc, req);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
rsa_pub_unmap(jrdev, edesc, req);
|
||||||
|
}
|
||||||
|
rsa_io_unmap(jrdev, edesc, req);
|
||||||
|
kfree(edesc);
|
||||||
|
}
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
static int caam_rsa_enc(struct akcipher_request *req)
|
static int caam_rsa_enc(struct akcipher_request *req)
|
||||||
{
|
{
|
||||||
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
|
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
|
||||||
|
@ -633,11 +727,7 @@ static int caam_rsa_enc(struct akcipher_request *req)
|
||||||
/* Initialize Job Descriptor */
|
/* Initialize Job Descriptor */
|
||||||
init_rsa_pub_desc(edesc->hw_desc, &edesc->pdb.pub);
|
init_rsa_pub_desc(edesc->hw_desc, &edesc->pdb.pub);
|
||||||
|
|
||||||
ret = caam_jr_enqueue(jrdev, edesc->hw_desc, rsa_pub_done, req);
|
return akcipher_enqueue_req(jrdev, rsa_pub_done, req);
|
||||||
if (ret == -EINPROGRESS)
|
|
||||||
return ret;
|
|
||||||
|
|
||||||
rsa_pub_unmap(jrdev, edesc, req);
|
|
||||||
|
|
||||||
init_fail:
|
init_fail:
|
||||||
rsa_io_unmap(jrdev, edesc, req);
|
rsa_io_unmap(jrdev, edesc, req);
|
||||||
|
@ -666,11 +756,7 @@ static int caam_rsa_dec_priv_f1(struct akcipher_request *req)
|
||||||
/* Initialize Job Descriptor */
|
/* Initialize Job Descriptor */
|
||||||
init_rsa_priv_f1_desc(edesc->hw_desc, &edesc->pdb.priv_f1);
|
init_rsa_priv_f1_desc(edesc->hw_desc, &edesc->pdb.priv_f1);
|
||||||
|
|
||||||
ret = caam_jr_enqueue(jrdev, edesc->hw_desc, rsa_priv_f_done, req);
|
return akcipher_enqueue_req(jrdev, rsa_priv_f_done, req);
|
||||||
if (ret == -EINPROGRESS)
|
|
||||||
return ret;
|
|
||||||
|
|
||||||
rsa_priv_f1_unmap(jrdev, edesc, req);
|
|
||||||
|
|
||||||
init_fail:
|
init_fail:
|
||||||
rsa_io_unmap(jrdev, edesc, req);
|
rsa_io_unmap(jrdev, edesc, req);
|
||||||
|
@ -699,11 +785,7 @@ static int caam_rsa_dec_priv_f2(struct akcipher_request *req)
|
||||||
/* Initialize Job Descriptor */
|
/* Initialize Job Descriptor */
|
||||||
init_rsa_priv_f2_desc(edesc->hw_desc, &edesc->pdb.priv_f2);
|
init_rsa_priv_f2_desc(edesc->hw_desc, &edesc->pdb.priv_f2);
|
||||||
|
|
||||||
ret = caam_jr_enqueue(jrdev, edesc->hw_desc, rsa_priv_f_done, req);
|
return akcipher_enqueue_req(jrdev, rsa_priv_f_done, req);
|
||||||
if (ret == -EINPROGRESS)
|
|
||||||
return ret;
|
|
||||||
|
|
||||||
rsa_priv_f2_unmap(jrdev, edesc, req);
|
|
||||||
|
|
||||||
init_fail:
|
init_fail:
|
||||||
rsa_io_unmap(jrdev, edesc, req);
|
rsa_io_unmap(jrdev, edesc, req);
|
||||||
|
@ -732,11 +814,7 @@ static int caam_rsa_dec_priv_f3(struct akcipher_request *req)
|
||||||
/* Initialize Job Descriptor */
|
/* Initialize Job Descriptor */
|
||||||
init_rsa_priv_f3_desc(edesc->hw_desc, &edesc->pdb.priv_f3);
|
init_rsa_priv_f3_desc(edesc->hw_desc, &edesc->pdb.priv_f3);
|
||||||
|
|
||||||
ret = caam_jr_enqueue(jrdev, edesc->hw_desc, rsa_priv_f_done, req);
|
return akcipher_enqueue_req(jrdev, rsa_priv_f_done, req);
|
||||||
if (ret == -EINPROGRESS)
|
|
||||||
return ret;
|
|
||||||
|
|
||||||
rsa_priv_f3_unmap(jrdev, edesc, req);
|
|
||||||
|
|
||||||
init_fail:
|
init_fail:
|
||||||
rsa_io_unmap(jrdev, edesc, req);
|
rsa_io_unmap(jrdev, edesc, req);
|
||||||
|
@ -1029,6 +1107,8 @@ static int caam_rsa_init_tfm(struct crypto_akcipher *tfm)
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ctx->enginectx.op.do_one_request = akcipher_do_one_req;
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -12,6 +12,7 @@
|
||||||
#define _PKC_DESC_H_
|
#define _PKC_DESC_H_
|
||||||
#include "compat.h"
|
#include "compat.h"
|
||||||
#include "pdb.h"
|
#include "pdb.h"
|
||||||
|
#include <crypto/engine.h>
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* caam_priv_key_form - CAAM RSA private key representation
|
* caam_priv_key_form - CAAM RSA private key representation
|
||||||
|
@ -87,11 +88,13 @@ struct caam_rsa_key {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* caam_rsa_ctx - per session context.
|
* caam_rsa_ctx - per session context.
|
||||||
|
* @enginectx : crypto engine context
|
||||||
* @key : RSA key in DMA zone
|
* @key : RSA key in DMA zone
|
||||||
* @dev : device structure
|
* @dev : device structure
|
||||||
* @padding_dma : dma address of padding, for adding it to the input
|
* @padding_dma : dma address of padding, for adding it to the input
|
||||||
*/
|
*/
|
||||||
struct caam_rsa_ctx {
|
struct caam_rsa_ctx {
|
||||||
|
struct crypto_engine_ctx enginectx;
|
||||||
struct caam_rsa_key key;
|
struct caam_rsa_key key;
|
||||||
struct device *dev;
|
struct device *dev;
|
||||||
dma_addr_t padding_dma;
|
dma_addr_t padding_dma;
|
||||||
|
@ -103,11 +106,16 @@ struct caam_rsa_ctx {
|
||||||
* @src : input scatterlist (stripped of leading zeros)
|
* @src : input scatterlist (stripped of leading zeros)
|
||||||
* @fixup_src : input scatterlist (that might be stripped of leading zeros)
|
* @fixup_src : input scatterlist (that might be stripped of leading zeros)
|
||||||
* @fixup_src_len : length of the fixup_src input scatterlist
|
* @fixup_src_len : length of the fixup_src input scatterlist
|
||||||
|
* @edesc : s/w-extended rsa descriptor
|
||||||
|
* @akcipher_op_done : callback used when operation is done
|
||||||
*/
|
*/
|
||||||
struct caam_rsa_req_ctx {
|
struct caam_rsa_req_ctx {
|
||||||
struct scatterlist src[2];
|
struct scatterlist src[2];
|
||||||
struct scatterlist *fixup_src;
|
struct scatterlist *fixup_src;
|
||||||
unsigned int fixup_src_len;
|
unsigned int fixup_src_len;
|
||||||
|
struct rsa_edesc *edesc;
|
||||||
|
void (*akcipher_op_done)(struct device *jrdev, u32 *desc, u32 err,
|
||||||
|
void *context);
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -117,6 +125,7 @@ struct caam_rsa_req_ctx {
|
||||||
* @mapped_src_nents: number of segments in input h/w link table
|
* @mapped_src_nents: number of segments in input h/w link table
|
||||||
* @mapped_dst_nents: number of segments in output h/w link table
|
* @mapped_dst_nents: number of segments in output h/w link table
|
||||||
* @sec4_sg_bytes : length of h/w link table
|
* @sec4_sg_bytes : length of h/w link table
|
||||||
|
* @bklog : stored to determine if the request needs backlog
|
||||||
* @sec4_sg_dma : dma address of h/w link table
|
* @sec4_sg_dma : dma address of h/w link table
|
||||||
* @sec4_sg : pointer to h/w link table
|
* @sec4_sg : pointer to h/w link table
|
||||||
* @pdb : specific RSA Protocol Data Block (PDB)
|
* @pdb : specific RSA Protocol Data Block (PDB)
|
||||||
|
@ -128,6 +137,7 @@ struct rsa_edesc {
|
||||||
int mapped_src_nents;
|
int mapped_src_nents;
|
||||||
int mapped_dst_nents;
|
int mapped_dst_nents;
|
||||||
int sec4_sg_bytes;
|
int sec4_sg_bytes;
|
||||||
|
bool bklog;
|
||||||
dma_addr_t sec4_sg_dma;
|
dma_addr_t sec4_sg_dma;
|
||||||
struct sec4_sg_entry *sec4_sg;
|
struct sec4_sg_entry *sec4_sg;
|
||||||
union {
|
union {
|
||||||
|
|
Loading…
Reference in New Issue