mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
synced 2025-09-02 16:44:59 +00:00
crypto: sun8i-ss - add hmac(sha1)
Even if sun8i-ss does not handle hmac(sha1) directly, we can provide one which use the already supported acceleration of sha1. Signed-off-by: Corentin Labbe <clabbe@baylibre.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
parent
e76ee4db9e
commit
801b7d572c
@ -409,6 +409,37 @@ static struct sun8i_ss_alg_template ss_algs[] = {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
{ .type = CRYPTO_ALG_TYPE_AHASH,
|
||||||
|
.ss_algo_id = SS_ID_HASH_SHA1,
|
||||||
|
.alg.hash = {
|
||||||
|
.init = sun8i_ss_hash_init,
|
||||||
|
.update = sun8i_ss_hash_update,
|
||||||
|
.final = sun8i_ss_hash_final,
|
||||||
|
.finup = sun8i_ss_hash_finup,
|
||||||
|
.digest = sun8i_ss_hash_digest,
|
||||||
|
.export = sun8i_ss_hash_export,
|
||||||
|
.import = sun8i_ss_hash_import,
|
||||||
|
.setkey = sun8i_ss_hmac_setkey,
|
||||||
|
.halg = {
|
||||||
|
.digestsize = SHA1_DIGEST_SIZE,
|
||||||
|
.statesize = sizeof(struct sha1_state),
|
||||||
|
.base = {
|
||||||
|
.cra_name = "hmac(sha1)",
|
||||||
|
.cra_driver_name = "hmac-sha1-sun8i-ss",
|
||||||
|
.cra_priority = 300,
|
||||||
|
.cra_alignmask = 3,
|
||||||
|
.cra_flags = CRYPTO_ALG_TYPE_AHASH |
|
||||||
|
CRYPTO_ALG_ASYNC |
|
||||||
|
CRYPTO_ALG_NEED_FALLBACK,
|
||||||
|
.cra_blocksize = SHA1_BLOCK_SIZE,
|
||||||
|
.cra_ctxsize = sizeof(struct sun8i_ss_hash_tfm_ctx),
|
||||||
|
.cra_module = THIS_MODULE,
|
||||||
|
.cra_init = sun8i_ss_hash_crainit,
|
||||||
|
.cra_exit = sun8i_ss_hash_craexit,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
#endif
|
#endif
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -14,12 +14,99 @@
|
|||||||
#include <linux/pm_runtime.h>
|
#include <linux/pm_runtime.h>
|
||||||
#include <linux/scatterlist.h>
|
#include <linux/scatterlist.h>
|
||||||
#include <crypto/internal/hash.h>
|
#include <crypto/internal/hash.h>
|
||||||
|
#include <crypto/hmac.h>
|
||||||
#include <crypto/scatterwalk.h>
|
#include <crypto/scatterwalk.h>
|
||||||
#include <crypto/sha1.h>
|
#include <crypto/sha1.h>
|
||||||
#include <crypto/sha2.h>
|
#include <crypto/sha2.h>
|
||||||
#include <crypto/md5.h>
|
#include <crypto/md5.h>
|
||||||
#include "sun8i-ss.h"
|
#include "sun8i-ss.h"
|
||||||
|
|
||||||
|
static int sun8i_ss_hashkey(struct sun8i_ss_hash_tfm_ctx *tfmctx, const u8 *key,
|
||||||
|
unsigned int keylen)
|
||||||
|
{
|
||||||
|
struct crypto_shash *xtfm;
|
||||||
|
struct shash_desc *sdesc;
|
||||||
|
size_t len;
|
||||||
|
int ret = 0;
|
||||||
|
|
||||||
|
xtfm = crypto_alloc_shash("sha1", 0, CRYPTO_ALG_NEED_FALLBACK);
|
||||||
|
if (!xtfm)
|
||||||
|
return -ENOMEM;
|
||||||
|
|
||||||
|
len = sizeof(*sdesc) + crypto_shash_descsize(xtfm);
|
||||||
|
sdesc = kmalloc(len, GFP_KERNEL);
|
||||||
|
if (!sdesc) {
|
||||||
|
ret = -ENOMEM;
|
||||||
|
goto err_hashkey_sdesc;
|
||||||
|
}
|
||||||
|
sdesc->tfm = xtfm;
|
||||||
|
|
||||||
|
ret = crypto_shash_init(sdesc);
|
||||||
|
if (ret) {
|
||||||
|
dev_err(tfmctx->ss->dev, "shash init error ret=%d\n", ret);
|
||||||
|
goto err_hashkey;
|
||||||
|
}
|
||||||
|
ret = crypto_shash_finup(sdesc, key, keylen, tfmctx->key);
|
||||||
|
if (ret)
|
||||||
|
dev_err(tfmctx->ss->dev, "shash finup error\n");
|
||||||
|
err_hashkey:
|
||||||
|
kfree(sdesc);
|
||||||
|
err_hashkey_sdesc:
|
||||||
|
crypto_free_shash(xtfm);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
int sun8i_ss_hmac_setkey(struct crypto_ahash *ahash, const u8 *key,
|
||||||
|
unsigned int keylen)
|
||||||
|
{
|
||||||
|
struct sun8i_ss_hash_tfm_ctx *tfmctx = crypto_ahash_ctx(ahash);
|
||||||
|
struct ahash_alg *alg = __crypto_ahash_alg(ahash->base.__crt_alg);
|
||||||
|
struct sun8i_ss_alg_template *algt;
|
||||||
|
int digestsize, i;
|
||||||
|
int bs = crypto_ahash_blocksize(ahash);
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
algt = container_of(alg, struct sun8i_ss_alg_template, alg.hash);
|
||||||
|
digestsize = algt->alg.hash.halg.digestsize;
|
||||||
|
|
||||||
|
if (keylen > bs) {
|
||||||
|
ret = sun8i_ss_hashkey(tfmctx, key, keylen);
|
||||||
|
if (ret)
|
||||||
|
return ret;
|
||||||
|
tfmctx->keylen = digestsize;
|
||||||
|
} else {
|
||||||
|
tfmctx->keylen = keylen;
|
||||||
|
memcpy(tfmctx->key, key, keylen);
|
||||||
|
}
|
||||||
|
|
||||||
|
tfmctx->ipad = kzalloc(bs, GFP_KERNEL | GFP_DMA);
|
||||||
|
if (!tfmctx->ipad)
|
||||||
|
return -ENOMEM;
|
||||||
|
tfmctx->opad = kzalloc(bs, GFP_KERNEL | GFP_DMA);
|
||||||
|
if (!tfmctx->opad) {
|
||||||
|
ret = -ENOMEM;
|
||||||
|
goto err_opad;
|
||||||
|
}
|
||||||
|
|
||||||
|
memset(tfmctx->key + tfmctx->keylen, 0, bs - tfmctx->keylen);
|
||||||
|
memcpy(tfmctx->ipad, tfmctx->key, tfmctx->keylen);
|
||||||
|
memcpy(tfmctx->opad, tfmctx->key, tfmctx->keylen);
|
||||||
|
for (i = 0; i < bs; i++) {
|
||||||
|
tfmctx->ipad[i] ^= HMAC_IPAD_VALUE;
|
||||||
|
tfmctx->opad[i] ^= HMAC_OPAD_VALUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = crypto_ahash_setkey(tfmctx->fallback_tfm, key, keylen);
|
||||||
|
if (!ret)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
memzero_explicit(tfmctx->key, keylen);
|
||||||
|
kfree_sensitive(tfmctx->opad);
|
||||||
|
err_opad:
|
||||||
|
kfree_sensitive(tfmctx->ipad);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
int sun8i_ss_hash_crainit(struct crypto_tfm *tfm)
|
int sun8i_ss_hash_crainit(struct crypto_tfm *tfm)
|
||||||
{
|
{
|
||||||
struct sun8i_ss_hash_tfm_ctx *op = crypto_tfm_ctx(tfm);
|
struct sun8i_ss_hash_tfm_ctx *op = crypto_tfm_ctx(tfm);
|
||||||
@ -67,6 +154,9 @@ void sun8i_ss_hash_craexit(struct crypto_tfm *tfm)
|
|||||||
{
|
{
|
||||||
struct sun8i_ss_hash_tfm_ctx *tfmctx = crypto_tfm_ctx(tfm);
|
struct sun8i_ss_hash_tfm_ctx *tfmctx = crypto_tfm_ctx(tfm);
|
||||||
|
|
||||||
|
kfree_sensitive(tfmctx->ipad);
|
||||||
|
kfree_sensitive(tfmctx->opad);
|
||||||
|
|
||||||
crypto_free_ahash(tfmctx->fallback_tfm);
|
crypto_free_ahash(tfmctx->fallback_tfm);
|
||||||
pm_runtime_put_sync_suspend(tfmctx->ss->dev);
|
pm_runtime_put_sync_suspend(tfmctx->ss->dev);
|
||||||
}
|
}
|
||||||
@ -393,18 +483,26 @@ int sun8i_ss_hash_run(struct crypto_engine *engine, void *breq)
|
|||||||
{
|
{
|
||||||
struct ahash_request *areq = container_of(breq, struct ahash_request, base);
|
struct ahash_request *areq = container_of(breq, struct ahash_request, base);
|
||||||
struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq);
|
struct crypto_ahash *tfm = crypto_ahash_reqtfm(areq);
|
||||||
|
struct sun8i_ss_hash_tfm_ctx *tfmctx = crypto_ahash_ctx(tfm);
|
||||||
struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg);
|
struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg);
|
||||||
struct sun8i_ss_hash_reqctx *rctx = ahash_request_ctx(areq);
|
struct sun8i_ss_hash_reqctx *rctx = ahash_request_ctx(areq);
|
||||||
struct sun8i_ss_alg_template *algt;
|
struct sun8i_ss_alg_template *algt;
|
||||||
struct sun8i_ss_dev *ss;
|
struct sun8i_ss_dev *ss;
|
||||||
struct scatterlist *sg;
|
struct scatterlist *sg;
|
||||||
|
int bs = crypto_ahash_blocksize(tfm);
|
||||||
int nr_sgs, err, digestsize;
|
int nr_sgs, err, digestsize;
|
||||||
unsigned int len;
|
unsigned int len;
|
||||||
u64 byte_count;
|
u64 byte_count;
|
||||||
void *pad, *result;
|
void *pad, *result;
|
||||||
int j, i, k, todo;
|
int j, i, k, todo;
|
||||||
dma_addr_t addr_res, addr_pad;
|
dma_addr_t addr_res, addr_pad, addr_xpad;
|
||||||
__le32 *bf;
|
__le32 *bf;
|
||||||
|
/* HMAC step:
|
||||||
|
* 0: normal hashing
|
||||||
|
* 1: IPAD
|
||||||
|
* 2: OPAD
|
||||||
|
*/
|
||||||
|
int hmac = 0;
|
||||||
|
|
||||||
algt = container_of(alg, struct sun8i_ss_alg_template, alg.hash);
|
algt = container_of(alg, struct sun8i_ss_alg_template, alg.hash);
|
||||||
ss = algt->ss;
|
ss = algt->ss;
|
||||||
@ -439,7 +537,7 @@ int sun8i_ss_hash_run(struct crypto_engine *engine, void *breq)
|
|||||||
if (dma_mapping_error(ss->dev, addr_res)) {
|
if (dma_mapping_error(ss->dev, addr_res)) {
|
||||||
dev_err(ss->dev, "DMA map dest\n");
|
dev_err(ss->dev, "DMA map dest\n");
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
goto theend;
|
goto err_dma_result;
|
||||||
}
|
}
|
||||||
|
|
||||||
j = 0;
|
j = 0;
|
||||||
@ -476,7 +574,60 @@ int sun8i_ss_hash_run(struct crypto_engine *engine, void *breq)
|
|||||||
if (j > 0)
|
if (j > 0)
|
||||||
i--;
|
i--;
|
||||||
|
|
||||||
|
retry:
|
||||||
byte_count = areq->nbytes;
|
byte_count = areq->nbytes;
|
||||||
|
if (tfmctx->keylen && hmac == 0) {
|
||||||
|
hmac = 1;
|
||||||
|
/* shift all SG one slot up, to free slot 0 for IPAD */
|
||||||
|
for (k = 6; k >= 0; k--) {
|
||||||
|
rctx->t_src[k + 1].addr = rctx->t_src[k].addr;
|
||||||
|
rctx->t_src[k + 1].len = rctx->t_src[k].len;
|
||||||
|
rctx->t_dst[k + 1].addr = rctx->t_dst[k].addr;
|
||||||
|
rctx->t_dst[k + 1].len = rctx->t_dst[k].len;
|
||||||
|
}
|
||||||
|
addr_xpad = dma_map_single(ss->dev, tfmctx->ipad, bs, DMA_TO_DEVICE);
|
||||||
|
if (dma_mapping_error(ss->dev, addr_xpad)) {
|
||||||
|
dev_err(ss->dev, "Fail to create DMA mapping of ipad\n");
|
||||||
|
goto err_dma_xpad;
|
||||||
|
}
|
||||||
|
rctx->t_src[0].addr = addr_xpad;
|
||||||
|
rctx->t_src[0].len = bs / 4;
|
||||||
|
rctx->t_dst[0].addr = addr_res;
|
||||||
|
rctx->t_dst[0].len = digestsize / 4;
|
||||||
|
i++;
|
||||||
|
byte_count = areq->nbytes + bs;
|
||||||
|
}
|
||||||
|
if (tfmctx->keylen && hmac == 2) {
|
||||||
|
for (i = 0; i < MAX_SG; i++) {
|
||||||
|
rctx->t_src[i].addr = 0;
|
||||||
|
rctx->t_src[i].len = 0;
|
||||||
|
rctx->t_dst[i].addr = 0;
|
||||||
|
rctx->t_dst[i].len = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
addr_res = dma_map_single(ss->dev, result, digestsize, DMA_FROM_DEVICE);
|
||||||
|
if (dma_mapping_error(ss->dev, addr_res)) {
|
||||||
|
dev_err(ss->dev, "Fail to create DMA mapping of result\n");
|
||||||
|
err = -EINVAL;
|
||||||
|
goto err_dma_result;
|
||||||
|
}
|
||||||
|
addr_xpad = dma_map_single(ss->dev, tfmctx->opad, bs, DMA_TO_DEVICE);
|
||||||
|
if (dma_mapping_error(ss->dev, addr_xpad)) {
|
||||||
|
dev_err(ss->dev, "Fail to create DMA mapping of opad\n");
|
||||||
|
goto err_dma_xpad;
|
||||||
|
}
|
||||||
|
rctx->t_src[0].addr = addr_xpad;
|
||||||
|
rctx->t_src[0].len = bs / 4;
|
||||||
|
|
||||||
|
memcpy(bf, result, digestsize);
|
||||||
|
j = digestsize / 4;
|
||||||
|
i = 1;
|
||||||
|
byte_count = digestsize + bs;
|
||||||
|
|
||||||
|
rctx->t_dst[0].addr = addr_res;
|
||||||
|
rctx->t_dst[0].len = digestsize / 4;
|
||||||
|
}
|
||||||
|
|
||||||
switch (algt->ss_algo_id) {
|
switch (algt->ss_algo_id) {
|
||||||
case SS_ID_HASH_MD5:
|
case SS_ID_HASH_MD5:
|
||||||
j = hash_pad(bf, 4096, j, byte_count, true, bs);
|
j = hash_pad(bf, 4096, j, byte_count, true, bs);
|
||||||
@ -496,7 +647,7 @@ int sun8i_ss_hash_run(struct crypto_engine *engine, void *breq)
|
|||||||
if (dma_mapping_error(ss->dev, addr_pad)) {
|
if (dma_mapping_error(ss->dev, addr_pad)) {
|
||||||
dev_err(ss->dev, "DMA error on padding SG\n");
|
dev_err(ss->dev, "DMA error on padding SG\n");
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
goto theend;
|
goto err_dma_pad;
|
||||||
}
|
}
|
||||||
rctx->t_src[i].addr = addr_pad;
|
rctx->t_src[i].addr = addr_pad;
|
||||||
rctx->t_src[i].len = j;
|
rctx->t_src[i].len = j;
|
||||||
@ -505,12 +656,49 @@ int sun8i_ss_hash_run(struct crypto_engine *engine, void *breq)
|
|||||||
|
|
||||||
err = sun8i_ss_run_hash_task(ss, rctx, crypto_tfm_alg_name(areq->base.tfm));
|
err = sun8i_ss_run_hash_task(ss, rctx, crypto_tfm_alg_name(areq->base.tfm));
|
||||||
|
|
||||||
dma_unmap_single(ss->dev, addr_pad, j * 4, DMA_TO_DEVICE);
|
/*
|
||||||
dma_unmap_sg(ss->dev, areq->src, sg_nents(areq->src),
|
* mini helper for checking dma map/unmap
|
||||||
DMA_TO_DEVICE);
|
* flow start for hmac = 0 (and HMAC = 1)
|
||||||
dma_unmap_single(ss->dev, addr_res, digestsize, DMA_FROM_DEVICE);
|
* HMAC = 0
|
||||||
|
* MAP src
|
||||||
|
* MAP res
|
||||||
|
*
|
||||||
|
* retry:
|
||||||
|
* if hmac then hmac = 1
|
||||||
|
* MAP xpad (ipad)
|
||||||
|
* if hmac == 2
|
||||||
|
* MAP res
|
||||||
|
* MAP xpad (opad)
|
||||||
|
* MAP pad
|
||||||
|
* ACTION!
|
||||||
|
* UNMAP pad
|
||||||
|
* if hmac
|
||||||
|
* UNMAP xpad
|
||||||
|
* UNMAP res
|
||||||
|
* if hmac < 2
|
||||||
|
* UNMAP SRC
|
||||||
|
*
|
||||||
|
* if hmac = 1 then hmac = 2 goto retry
|
||||||
|
*/
|
||||||
|
|
||||||
memcpy(areq->result, result, algt->alg.hash.halg.digestsize);
|
dma_unmap_single(ss->dev, addr_pad, j * 4, DMA_TO_DEVICE);
|
||||||
|
|
||||||
|
err_dma_pad:
|
||||||
|
if (hmac > 0)
|
||||||
|
dma_unmap_single(ss->dev, addr_xpad, bs, DMA_TO_DEVICE);
|
||||||
|
err_dma_xpad:
|
||||||
|
dma_unmap_single(ss->dev, addr_res, digestsize, DMA_FROM_DEVICE);
|
||||||
|
err_dma_result:
|
||||||
|
if (hmac < 2)
|
||||||
|
dma_unmap_sg(ss->dev, areq->src, sg_nents(areq->src),
|
||||||
|
DMA_TO_DEVICE);
|
||||||
|
if (hmac == 1 && !err) {
|
||||||
|
hmac = 2;
|
||||||
|
goto retry;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!err)
|
||||||
|
memcpy(areq->result, result, algt->alg.hash.halg.digestsize);
|
||||||
theend:
|
theend:
|
||||||
local_bh_disable();
|
local_bh_disable();
|
||||||
crypto_finalize_hash_request(engine, breq, err);
|
crypto_finalize_hash_request(engine, breq, err);
|
||||||
|
@ -239,6 +239,10 @@ struct sun8i_ss_hash_tfm_ctx {
|
|||||||
struct crypto_engine_ctx enginectx;
|
struct crypto_engine_ctx enginectx;
|
||||||
struct crypto_ahash *fallback_tfm;
|
struct crypto_ahash *fallback_tfm;
|
||||||
struct sun8i_ss_dev *ss;
|
struct sun8i_ss_dev *ss;
|
||||||
|
u8 *ipad;
|
||||||
|
u8 *opad;
|
||||||
|
u8 key[SHA256_BLOCK_SIZE];
|
||||||
|
int keylen;
|
||||||
};
|
};
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -319,3 +323,5 @@ int sun8i_ss_hash_update(struct ahash_request *areq);
|
|||||||
int sun8i_ss_hash_finup(struct ahash_request *areq);
|
int sun8i_ss_hash_finup(struct ahash_request *areq);
|
||||||
int sun8i_ss_hash_digest(struct ahash_request *areq);
|
int sun8i_ss_hash_digest(struct ahash_request *areq);
|
||||||
int sun8i_ss_hash_run(struct crypto_engine *engine, void *breq);
|
int sun8i_ss_hash_run(struct crypto_engine *engine, void *breq);
|
||||||
|
int sun8i_ss_hmac_setkey(struct crypto_ahash *ahash, const u8 *key,
|
||||||
|
unsigned int keylen);
|
||||||
|
Loading…
Reference in New Issue
Block a user