crypto: caam - add crypto_engine support for RSA algorithms

Add crypto_engine support for RSA algorithms, to make use of
the engine queue.
The requests, with backlog flag, will be listed into crypto-engine
queue and processed by CAAM when free. In case the queue is empty,
the request is directly sent to CAAM.
Only the backlog request are sent to crypto-engine since the others
can be handled by CAAM, if free, especially since JR has up to 1024
entries (more than the 10 entries from crypto-engine).

Signed-off-by: Iuliana Prodan <iuliana.prodan@nxp.com>
Reviewed-by: Horia Geantă <horia.geanta@nxp.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
Iuliana Prodan 2020-02-12 19:55:23 +02:00 committed by Herbert Xu
parent 1c24022667
commit bf53795025
2 changed files with 114 additions and 24 deletions

View File

@ -117,19 +117,28 @@ static void rsa_priv_f3_unmap(struct device *dev, struct rsa_edesc *edesc,
static void rsa_pub_done(struct device *dev, u32 *desc, u32 err, void *context) static void rsa_pub_done(struct device *dev, u32 *desc, u32 err, void *context)
{ {
struct akcipher_request *req = context; struct akcipher_request *req = context;
struct caam_rsa_req_ctx *req_ctx = akcipher_request_ctx(req);
struct caam_drv_private_jr *jrp = dev_get_drvdata(dev);
struct rsa_edesc *edesc; struct rsa_edesc *edesc;
int ecode = 0; int ecode = 0;
if (err) if (err)
ecode = caam_jr_strstatus(dev, err); ecode = caam_jr_strstatus(dev, err);
edesc = container_of(desc, struct rsa_edesc, hw_desc[0]); edesc = req_ctx->edesc;
rsa_pub_unmap(dev, edesc, req); rsa_pub_unmap(dev, edesc, req);
rsa_io_unmap(dev, edesc, req); rsa_io_unmap(dev, edesc, req);
kfree(edesc); kfree(edesc);
akcipher_request_complete(req, ecode); /*
* If no backlog flag, the completion of the request is done
* by CAAM, not crypto engine.
*/
if (!edesc->bklog)
akcipher_request_complete(req, ecode);
else
crypto_finalize_akcipher_request(jrp->engine, req, ecode);
} }
static void rsa_priv_f_done(struct device *dev, u32 *desc, u32 err, static void rsa_priv_f_done(struct device *dev, u32 *desc, u32 err,
@ -137,15 +146,17 @@ static void rsa_priv_f_done(struct device *dev, u32 *desc, u32 err,
{ {
struct akcipher_request *req = context; struct akcipher_request *req = context;
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
struct caam_drv_private_jr *jrp = dev_get_drvdata(dev);
struct caam_rsa_ctx *ctx = akcipher_tfm_ctx(tfm); struct caam_rsa_ctx *ctx = akcipher_tfm_ctx(tfm);
struct caam_rsa_key *key = &ctx->key; struct caam_rsa_key *key = &ctx->key;
struct caam_rsa_req_ctx *req_ctx = akcipher_request_ctx(req);
struct rsa_edesc *edesc; struct rsa_edesc *edesc;
int ecode = 0; int ecode = 0;
if (err) if (err)
ecode = caam_jr_strstatus(dev, err); ecode = caam_jr_strstatus(dev, err);
edesc = container_of(desc, struct rsa_edesc, hw_desc[0]); edesc = req_ctx->edesc;
switch (key->priv_form) { switch (key->priv_form) {
case FORM1: case FORM1:
@ -161,7 +172,14 @@ static void rsa_priv_f_done(struct device *dev, u32 *desc, u32 err,
rsa_io_unmap(dev, edesc, req); rsa_io_unmap(dev, edesc, req);
kfree(edesc); kfree(edesc);
akcipher_request_complete(req, ecode); /*
* If no backlog flag, the completion of the request is done
* by CAAM, not crypto engine.
*/
if (!edesc->bklog)
akcipher_request_complete(req, ecode);
else
crypto_finalize_akcipher_request(jrp->engine, req, ecode);
} }
/** /**
@ -309,6 +327,8 @@ static struct rsa_edesc *rsa_edesc_alloc(struct akcipher_request *req,
edesc->src_nents = src_nents; edesc->src_nents = src_nents;
edesc->dst_nents = dst_nents; edesc->dst_nents = dst_nents;
req_ctx->edesc = edesc;
if (!sec4_sg_bytes) if (!sec4_sg_bytes)
return edesc; return edesc;
@ -339,6 +359,33 @@ src_fail:
return ERR_PTR(-ENOMEM); return ERR_PTR(-ENOMEM);
} }
static int akcipher_do_one_req(struct crypto_engine *engine, void *areq)
{
struct akcipher_request *req = container_of(areq,
struct akcipher_request,
base);
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
struct caam_rsa_req_ctx *req_ctx = akcipher_request_ctx(req);
struct caam_rsa_ctx *ctx = akcipher_tfm_ctx(tfm);
struct device *jrdev = ctx->dev;
u32 *desc = req_ctx->edesc->hw_desc;
int ret;
req_ctx->edesc->bklog = true;
ret = caam_jr_enqueue(jrdev, desc, req_ctx->akcipher_op_done, req);
if (ret != -EINPROGRESS) {
rsa_pub_unmap(jrdev, req_ctx->edesc, req);
rsa_io_unmap(jrdev, req_ctx->edesc, req);
kfree(req_ctx->edesc);
} else {
ret = 0;
}
return ret;
}
static int set_rsa_pub_pdb(struct akcipher_request *req, static int set_rsa_pub_pdb(struct akcipher_request *req,
struct rsa_edesc *edesc) struct rsa_edesc *edesc)
{ {
@ -602,6 +649,53 @@ unmap_p:
return -ENOMEM; return -ENOMEM;
} }
static int akcipher_enqueue_req(struct device *jrdev,
void (*cbk)(struct device *jrdev, u32 *desc,
u32 err, void *context),
struct akcipher_request *req)
{
struct caam_drv_private_jr *jrpriv = dev_get_drvdata(jrdev);
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
struct caam_rsa_ctx *ctx = akcipher_tfm_ctx(tfm);
struct caam_rsa_key *key = &ctx->key;
struct caam_rsa_req_ctx *req_ctx = akcipher_request_ctx(req);
struct rsa_edesc *edesc = req_ctx->edesc;
u32 *desc = edesc->hw_desc;
int ret;
req_ctx->akcipher_op_done = cbk;
/*
* Only the backlog request are sent to crypto-engine since the others
* can be handled by CAAM, if free, especially since JR has up to 1024
* entries (more than the 10 entries from crypto-engine).
*/
if (req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG)
ret = crypto_transfer_akcipher_request_to_engine(jrpriv->engine,
req);
else
ret = caam_jr_enqueue(jrdev, desc, cbk, req);
if ((ret != -EINPROGRESS) && (ret != -EBUSY)) {
switch (key->priv_form) {
case FORM1:
rsa_priv_f1_unmap(jrdev, edesc, req);
break;
case FORM2:
rsa_priv_f2_unmap(jrdev, edesc, req);
break;
case FORM3:
rsa_priv_f3_unmap(jrdev, edesc, req);
break;
default:
rsa_pub_unmap(jrdev, edesc, req);
}
rsa_io_unmap(jrdev, edesc, req);
kfree(edesc);
}
return ret;
}
static int caam_rsa_enc(struct akcipher_request *req) static int caam_rsa_enc(struct akcipher_request *req)
{ {
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
@ -633,11 +727,7 @@ static int caam_rsa_enc(struct akcipher_request *req)
/* Initialize Job Descriptor */ /* Initialize Job Descriptor */
init_rsa_pub_desc(edesc->hw_desc, &edesc->pdb.pub); init_rsa_pub_desc(edesc->hw_desc, &edesc->pdb.pub);
ret = caam_jr_enqueue(jrdev, edesc->hw_desc, rsa_pub_done, req); return akcipher_enqueue_req(jrdev, rsa_pub_done, req);
if (ret == -EINPROGRESS)
return ret;
rsa_pub_unmap(jrdev, edesc, req);
init_fail: init_fail:
rsa_io_unmap(jrdev, edesc, req); rsa_io_unmap(jrdev, edesc, req);
@ -666,11 +756,7 @@ static int caam_rsa_dec_priv_f1(struct akcipher_request *req)
/* Initialize Job Descriptor */ /* Initialize Job Descriptor */
init_rsa_priv_f1_desc(edesc->hw_desc, &edesc->pdb.priv_f1); init_rsa_priv_f1_desc(edesc->hw_desc, &edesc->pdb.priv_f1);
ret = caam_jr_enqueue(jrdev, edesc->hw_desc, rsa_priv_f_done, req); return akcipher_enqueue_req(jrdev, rsa_priv_f_done, req);
if (ret == -EINPROGRESS)
return ret;
rsa_priv_f1_unmap(jrdev, edesc, req);
init_fail: init_fail:
rsa_io_unmap(jrdev, edesc, req); rsa_io_unmap(jrdev, edesc, req);
@ -699,11 +785,7 @@ static int caam_rsa_dec_priv_f2(struct akcipher_request *req)
/* Initialize Job Descriptor */ /* Initialize Job Descriptor */
init_rsa_priv_f2_desc(edesc->hw_desc, &edesc->pdb.priv_f2); init_rsa_priv_f2_desc(edesc->hw_desc, &edesc->pdb.priv_f2);
ret = caam_jr_enqueue(jrdev, edesc->hw_desc, rsa_priv_f_done, req); return akcipher_enqueue_req(jrdev, rsa_priv_f_done, req);
if (ret == -EINPROGRESS)
return ret;
rsa_priv_f2_unmap(jrdev, edesc, req);
init_fail: init_fail:
rsa_io_unmap(jrdev, edesc, req); rsa_io_unmap(jrdev, edesc, req);
@ -732,11 +814,7 @@ static int caam_rsa_dec_priv_f3(struct akcipher_request *req)
/* Initialize Job Descriptor */ /* Initialize Job Descriptor */
init_rsa_priv_f3_desc(edesc->hw_desc, &edesc->pdb.priv_f3); init_rsa_priv_f3_desc(edesc->hw_desc, &edesc->pdb.priv_f3);
ret = caam_jr_enqueue(jrdev, edesc->hw_desc, rsa_priv_f_done, req); return akcipher_enqueue_req(jrdev, rsa_priv_f_done, req);
if (ret == -EINPROGRESS)
return ret;
rsa_priv_f3_unmap(jrdev, edesc, req);
init_fail: init_fail:
rsa_io_unmap(jrdev, edesc, req); rsa_io_unmap(jrdev, edesc, req);
@ -1029,6 +1107,8 @@ static int caam_rsa_init_tfm(struct crypto_akcipher *tfm)
return -ENOMEM; return -ENOMEM;
} }
ctx->enginectx.op.do_one_request = akcipher_do_one_req;
return 0; return 0;
} }

View File

@ -12,6 +12,7 @@
#define _PKC_DESC_H_ #define _PKC_DESC_H_
#include "compat.h" #include "compat.h"
#include "pdb.h" #include "pdb.h"
#include <crypto/engine.h>
/** /**
* caam_priv_key_form - CAAM RSA private key representation * caam_priv_key_form - CAAM RSA private key representation
@ -87,11 +88,13 @@ struct caam_rsa_key {
/** /**
* caam_rsa_ctx - per session context. * caam_rsa_ctx - per session context.
* @enginectx : crypto engine context
* @key : RSA key in DMA zone * @key : RSA key in DMA zone
* @dev : device structure * @dev : device structure
* @padding_dma : dma address of padding, for adding it to the input * @padding_dma : dma address of padding, for adding it to the input
*/ */
struct caam_rsa_ctx { struct caam_rsa_ctx {
struct crypto_engine_ctx enginectx;
struct caam_rsa_key key; struct caam_rsa_key key;
struct device *dev; struct device *dev;
dma_addr_t padding_dma; dma_addr_t padding_dma;
@ -103,11 +106,16 @@ struct caam_rsa_ctx {
* @src : input scatterlist (stripped of leading zeros) * @src : input scatterlist (stripped of leading zeros)
* @fixup_src : input scatterlist (that might be stripped of leading zeros) * @fixup_src : input scatterlist (that might be stripped of leading zeros)
* @fixup_src_len : length of the fixup_src input scatterlist * @fixup_src_len : length of the fixup_src input scatterlist
* @edesc : s/w-extended rsa descriptor
* @akcipher_op_done : callback used when operation is done
*/ */
struct caam_rsa_req_ctx { struct caam_rsa_req_ctx {
struct scatterlist src[2]; struct scatterlist src[2];
struct scatterlist *fixup_src; struct scatterlist *fixup_src;
unsigned int fixup_src_len; unsigned int fixup_src_len;
struct rsa_edesc *edesc;
void (*akcipher_op_done)(struct device *jrdev, u32 *desc, u32 err,
void *context);
}; };
/** /**
@ -117,6 +125,7 @@ struct caam_rsa_req_ctx {
* @mapped_src_nents: number of segments in input h/w link table * @mapped_src_nents: number of segments in input h/w link table
* @mapped_dst_nents: number of segments in output h/w link table * @mapped_dst_nents: number of segments in output h/w link table
* @sec4_sg_bytes : length of h/w link table * @sec4_sg_bytes : length of h/w link table
* @bklog : stored to determine if the request needs backlog
* @sec4_sg_dma : dma address of h/w link table * @sec4_sg_dma : dma address of h/w link table
* @sec4_sg : pointer to h/w link table * @sec4_sg : pointer to h/w link table
* @pdb : specific RSA Protocol Data Block (PDB) * @pdb : specific RSA Protocol Data Block (PDB)
@ -128,6 +137,7 @@ struct rsa_edesc {
int mapped_src_nents; int mapped_src_nents;
int mapped_dst_nents; int mapped_dst_nents;
int sec4_sg_bytes; int sec4_sg_bytes;
bool bklog;
dma_addr_t sec4_sg_dma; dma_addr_t sec4_sg_dma;
struct sec4_sg_entry *sec4_sg; struct sec4_sg_entry *sec4_sg;
union { union {