| /* |
| * Copyright (C) 2016 Pengutronix, Steffen Trumtrar <kernel@pengutronix.de> |
| * |
| * The driver is based on information gathered from |
| * drivers/mxc/security/mxc_scc.c which can be found in |
| * the Freescale linux-2.6-imx.git in the imx_2.6.35_maintain branch. |
| * |
| * This program is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU General Public License |
| * version 2, as published by the Free Software Foundation. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| */ |
| #include <linux/clk.h> |
| #include <linux/crypto.h> |
| #include <linux/interrupt.h> |
| #include <linux/io.h> |
| #include <linux/irq.h> |
| #include <linux/kernel.h> |
| #include <linux/module.h> |
| #include <linux/mutex.h> |
| #include <linux/of.h> |
| #include <linux/of_device.h> |
| #include <linux/platform_device.h> |
| |
| #include <crypto/algapi.h> |
| #include <crypto/des.h> |
| |
| /* Secure Memory (SCM) registers */ |
| #define SCC_SCM_RED_START 0x0000 |
| #define SCC_SCM_BLACK_START 0x0004 |
| #define SCC_SCM_LENGTH 0x0008 |
| #define SCC_SCM_CTRL 0x000C |
| #define SCC_SCM_STATUS 0x0010 |
| #define SCC_SCM_ERROR_STATUS 0x0014 |
| #define SCC_SCM_INTR_CTRL 0x0018 |
| #define SCC_SCM_CFG 0x001C |
| #define SCC_SCM_INIT_VECTOR_0 0x0020 |
| #define SCC_SCM_INIT_VECTOR_1 0x0024 |
| #define SCC_SCM_RED_MEMORY 0x0400 |
| #define SCC_SCM_BLACK_MEMORY 0x0800 |
| |
| /* Security Monitor (SMN) Registers */ |
| #define SCC_SMN_STATUS 0x1000 |
| #define SCC_SMN_COMMAND 0x1004 |
| #define SCC_SMN_SEQ_START 0x1008 |
| #define SCC_SMN_SEQ_END 0x100C |
| #define SCC_SMN_SEQ_CHECK 0x1010 |
| #define SCC_SMN_BIT_COUNT 0x1014 |
| #define SCC_SMN_BITBANK_INC_SIZE 0x1018 |
| #define SCC_SMN_BITBANK_DECREMENT 0x101C |
| #define SCC_SMN_COMPARE_SIZE 0x1020 |
| #define SCC_SMN_PLAINTEXT_CHECK 0x1024 |
| #define SCC_SMN_CIPHERTEXT_CHECK 0x1028 |
| #define SCC_SMN_TIMER_IV 0x102C |
| #define SCC_SMN_TIMER_CONTROL 0x1030 |
| #define SCC_SMN_DEBUG_DETECT_STAT 0x1034 |
| #define SCC_SMN_TIMER 0x1038 |
| |
| #define SCC_SCM_CTRL_START_CIPHER BIT(2) |
| #define SCC_SCM_CTRL_CBC_MODE BIT(1) |
| #define SCC_SCM_CTRL_DECRYPT_MODE BIT(0) |
| |
| #define SCC_SCM_STATUS_LEN_ERR BIT(12) |
| #define SCC_SCM_STATUS_SMN_UNBLOCKED BIT(11) |
| #define SCC_SCM_STATUS_CIPHERING_DONE BIT(10) |
| #define SCC_SCM_STATUS_ZEROIZING_DONE BIT(9) |
| #define SCC_SCM_STATUS_INTR_STATUS BIT(8) |
| #define SCC_SCM_STATUS_SEC_KEY BIT(7) |
| #define SCC_SCM_STATUS_INTERNAL_ERR BIT(6) |
| #define SCC_SCM_STATUS_BAD_SEC_KEY BIT(5) |
| #define SCC_SCM_STATUS_ZEROIZE_FAIL BIT(4) |
| #define SCC_SCM_STATUS_SMN_BLOCKED BIT(3) |
| #define SCC_SCM_STATUS_CIPHERING BIT(2) |
| #define SCC_SCM_STATUS_ZEROIZING BIT(1) |
| #define SCC_SCM_STATUS_BUSY BIT(0) |
| |
| #define SCC_SMN_STATUS_STATE_MASK 0x0000001F |
| #define SCC_SMN_STATE_START 0x0 |
| /* The SMN is zeroizing its RAM during reset */ |
| #define SCC_SMN_STATE_ZEROIZE_RAM 0x5 |
| /* SMN has passed internal checks */ |
| #define SCC_SMN_STATE_HEALTH_CHECK 0x6 |
| /* Fatal Security Violation. SMN is locked, SCM is inoperative. */ |
| #define SCC_SMN_STATE_FAIL 0x9 |
| /* SCC is in secure state. SCM is using secret key. */ |
| #define SCC_SMN_STATE_SECURE 0xA |
| /* SCC is not secure. SCM is using default key. */ |
| #define SCC_SMN_STATE_NON_SECURE 0xC |
| |
| #define SCC_SCM_INTR_CTRL_ZEROIZE_MEM BIT(2) |
| #define SCC_SCM_INTR_CTRL_CLR_INTR BIT(1) |
| #define SCC_SCM_INTR_CTRL_MASK_INTR BIT(0) |
| |
| /* Size, in blocks, of Red memory. */ |
| #define SCC_SCM_CFG_BLACK_SIZE_MASK 0x07fe0000 |
| #define SCC_SCM_CFG_BLACK_SIZE_SHIFT 17 |
| /* Size, in blocks, of Black memory. */ |
| #define SCC_SCM_CFG_RED_SIZE_MASK 0x0001ff80 |
| #define SCC_SCM_CFG_RED_SIZE_SHIFT 7 |
| /* Number of bytes per block. */ |
| #define SCC_SCM_CFG_BLOCK_SIZE_MASK 0x0000007f |
| |
| #define SCC_SMN_COMMAND_TAMPER_LOCK BIT(4) |
| #define SCC_SMN_COMMAND_CLR_INTR BIT(3) |
| #define SCC_SMN_COMMAND_CLR_BIT_BANK BIT(2) |
| #define SCC_SMN_COMMAND_EN_INTR BIT(1) |
| #define SCC_SMN_COMMAND_SET_SOFTWARE_ALARM BIT(0) |
| |
| #define SCC_KEY_SLOTS 20 |
| #define SCC_MAX_KEY_SIZE 32 |
| #define SCC_KEY_SLOT_SIZE 32 |
| |
| #define SCC_CRC_CCITT_START 0xFFFF |
| |
| /* |
| * Offset into each RAM of the base of the area which is not |
| * used for Stored Keys. |
| */ |
| #define SCC_NON_RESERVED_OFFSET (SCC_KEY_SLOTS * SCC_KEY_SLOT_SIZE) |
| |
| /* Fixed padding for appending to plaintext to fill out a block */ |
| static char scc_block_padding[8] = { 0x80, 0, 0, 0, 0, 0, 0, 0 }; |
| |
| enum mxc_scc_state { |
| SCC_STATE_OK, |
| SCC_STATE_UNIMPLEMENTED, |
| SCC_STATE_FAILED |
| }; |
| |
| struct mxc_scc { |
| struct device *dev; |
| void __iomem *base; |
| struct clk *clk; |
| bool hw_busy; |
| spinlock_t lock; |
| struct crypto_queue queue; |
| struct crypto_async_request *req; |
| int block_size_bytes; |
| int black_ram_size_blocks; |
| int memory_size_bytes; |
| int bytes_remaining; |
| |
| void __iomem *red_memory; |
| void __iomem *black_memory; |
| }; |
| |
| struct mxc_scc_ctx { |
| struct mxc_scc *scc; |
| struct scatterlist *sg_src; |
| size_t src_nents; |
| struct scatterlist *sg_dst; |
| size_t dst_nents; |
| unsigned int offset; |
| unsigned int size; |
| unsigned int ctrl; |
| }; |
| |
| struct mxc_scc_crypto_tmpl { |
| struct mxc_scc *scc; |
| struct crypto_alg alg; |
| }; |
| |
| static int mxc_scc_get_data(struct mxc_scc_ctx *ctx, |
| struct crypto_async_request *req) |
| { |
| struct ablkcipher_request *ablkreq = ablkcipher_request_cast(req); |
| struct mxc_scc *scc = ctx->scc; |
| size_t len; |
| void __iomem *from; |
| |
| if (ctx->ctrl & SCC_SCM_CTRL_DECRYPT_MODE) |
| from = scc->red_memory; |
| else |
| from = scc->black_memory; |
| |
| dev_dbg(scc->dev, "pcopy: from 0x%p %zu bytes\n", from, |
| ctx->dst_nents * 8); |
| len = sg_pcopy_from_buffer(ablkreq->dst, ctx->dst_nents, |
| from, ctx->size, ctx->offset); |
| if (!len) { |
| dev_err(scc->dev, "pcopy err from 0x%p (len=%zu)\n", from, len); |
| return -EINVAL; |
| } |
| |
| #ifdef DEBUG |
| print_hex_dump(KERN_ERR, |
| "red memory@"__stringify(__LINE__)": ", |
| DUMP_PREFIX_ADDRESS, 16, 4, |
| scc->red_memory, ctx->size, 1); |
| print_hex_dump(KERN_ERR, |
| "black memory@"__stringify(__LINE__)": ", |
| DUMP_PREFIX_ADDRESS, 16, 4, |
| scc->black_memory, ctx->size, 1); |
| #endif |
| |
| ctx->offset += len; |
| |
| if (ctx->offset < ablkreq->nbytes) |
| return -EINPROGRESS; |
| |
| return 0; |
| } |
| |
| static int mxc_scc_ablkcipher_req_init(struct ablkcipher_request *req, |
| struct mxc_scc_ctx *ctx) |
| { |
| struct mxc_scc *scc = ctx->scc; |
| int nents; |
| |
| nents = sg_nents_for_len(req->src, req->nbytes); |
| if (nents < 0) { |
| dev_err(scc->dev, "Invalid number of src SC"); |
| return nents; |
| } |
| ctx->src_nents = nents; |
| |
| nents = sg_nents_for_len(req->dst, req->nbytes); |
| if (nents < 0) { |
| dev_err(scc->dev, "Invalid number of dst SC"); |
| return nents; |
| } |
| ctx->dst_nents = nents; |
| |
| ctx->size = 0; |
| ctx->offset = 0; |
| |
| return 0; |
| } |
| |
| static int mxc_scc_ablkcipher_req_complete(struct crypto_async_request *req, |
| struct mxc_scc_ctx *ctx, |
| int result) |
| { |
| struct ablkcipher_request *ablkreq = ablkcipher_request_cast(req); |
| struct mxc_scc *scc = ctx->scc; |
| |
| scc->req = NULL; |
| scc->bytes_remaining = scc->memory_size_bytes; |
| |
| if (ctx->ctrl & SCC_SCM_CTRL_CBC_MODE) |
| memcpy(ablkreq->info, scc->base + SCC_SCM_INIT_VECTOR_0, |
| scc->block_size_bytes); |
| |
| req->complete(req, result); |
| scc->hw_busy = false; |
| |
| return 0; |
| } |
| |
| static int mxc_scc_put_data(struct mxc_scc_ctx *ctx, |
| struct ablkcipher_request *req) |
| { |
| u8 padding_buffer[sizeof(u16) + sizeof(scc_block_padding)]; |
| size_t len = min_t(size_t, req->nbytes - ctx->offset, |
| ctx->scc->bytes_remaining); |
| unsigned int padding_byte_count = 0; |
| struct mxc_scc *scc = ctx->scc; |
| void __iomem *to; |
| |
| if (ctx->ctrl & SCC_SCM_CTRL_DECRYPT_MODE) |
| to = scc->black_memory; |
| else |
| to = scc->red_memory; |
| |
| if (ctx->ctrl & SCC_SCM_CTRL_CBC_MODE && req->info) |
| memcpy(scc->base + SCC_SCM_INIT_VECTOR_0, req->info, |
| scc->block_size_bytes); |
| |
| len = sg_pcopy_to_buffer(req->src, ctx->src_nents, |
| to, len, ctx->offset); |
| if (!len) { |
| dev_err(scc->dev, "pcopy err to 0x%p (len=%zu)\n", to, len); |
| return -EINVAL; |
| } |
| |
| ctx->size = len; |
| |
| #ifdef DEBUG |
| dev_dbg(scc->dev, "copied %d bytes to 0x%p\n", len, to); |
| print_hex_dump(KERN_ERR, |
| "init vector0@"__stringify(__LINE__)": ", |
| DUMP_PREFIX_ADDRESS, 16, 4, |
| scc->base + SCC_SCM_INIT_VECTOR_0, scc->block_size_bytes, |
| 1); |
| print_hex_dump(KERN_ERR, |
| "red memory@"__stringify(__LINE__)": ", |
| DUMP_PREFIX_ADDRESS, 16, 4, |
| scc->red_memory, ctx->size, 1); |
| print_hex_dump(KERN_ERR, |
| "black memory@"__stringify(__LINE__)": ", |
| DUMP_PREFIX_ADDRESS, 16, 4, |
| scc->black_memory, ctx->size, 1); |
| #endif |
| |
| scc->bytes_remaining -= len; |
| |
| padding_byte_count = len % scc->block_size_bytes; |
| |
| if (padding_byte_count) { |
| memcpy(padding_buffer, scc_block_padding, padding_byte_count); |
| memcpy(to + len, padding_buffer, padding_byte_count); |
| ctx->size += padding_byte_count; |
| } |
| |
| #ifdef DEBUG |
| print_hex_dump(KERN_ERR, |
| "data to encrypt@"__stringify(__LINE__)": ", |
| DUMP_PREFIX_ADDRESS, 16, 4, |
| to, ctx->size, 1); |
| #endif |
| |
| return 0; |
| } |
| |
| static void mxc_scc_ablkcipher_next(struct mxc_scc_ctx *ctx, |
| struct crypto_async_request *req) |
| { |
| struct ablkcipher_request *ablkreq = ablkcipher_request_cast(req); |
| struct mxc_scc *scc = ctx->scc; |
| int err; |
| |
| dev_dbg(scc->dev, "dispatch request (nbytes=%d, src=%p, dst=%p)\n", |
| ablkreq->nbytes, ablkreq->src, ablkreq->dst); |
| |
| writel(0, scc->base + SCC_SCM_ERROR_STATUS); |
| |
| err = mxc_scc_put_data(ctx, ablkreq); |
| if (err) { |
| mxc_scc_ablkcipher_req_complete(req, ctx, err); |
| return; |
| } |
| |
| dev_dbg(scc->dev, "Start encryption (0x%x/0x%x)\n", |
| readl(scc->base + SCC_SCM_RED_START), |
| readl(scc->base + SCC_SCM_BLACK_START)); |
| |
| /* clear interrupt control registers */ |
| writel(SCC_SCM_INTR_CTRL_CLR_INTR, |
| scc->base + SCC_SCM_INTR_CTRL); |
| |
| writel((ctx->size / ctx->scc->block_size_bytes) - 1, |
| scc->base + SCC_SCM_LENGTH); |
| |
| dev_dbg(scc->dev, "Process %d block(s) in 0x%p\n", |
| ctx->size / ctx->scc->block_size_bytes, |
| (ctx->ctrl & SCC_SCM_CTRL_DECRYPT_MODE) ? scc->black_memory : |
| scc->red_memory); |
| |
| writel(ctx->ctrl, scc->base + SCC_SCM_CTRL); |
| } |
| |
| static irqreturn_t mxc_scc_int(int irq, void *priv) |
| { |
| struct crypto_async_request *req; |
| struct mxc_scc_ctx *ctx; |
| struct mxc_scc *scc = priv; |
| int status; |
| int ret; |
| |
| status = readl(scc->base + SCC_SCM_STATUS); |
| |
| /* clear interrupt control registers */ |
| writel(SCC_SCM_INTR_CTRL_CLR_INTR, scc->base + SCC_SCM_INTR_CTRL); |
| |
| if (status & SCC_SCM_STATUS_BUSY) |
| return IRQ_NONE; |
| |
| req = scc->req; |
| if (req) { |
| ctx = crypto_tfm_ctx(req->tfm); |
| ret = mxc_scc_get_data(ctx, req); |
| if (ret != -EINPROGRESS) |
| mxc_scc_ablkcipher_req_complete(req, ctx, ret); |
| else |
| mxc_scc_ablkcipher_next(ctx, req); |
| } |
| |
| return IRQ_HANDLED; |
| } |
| |
| static int mxc_scc_cra_init(struct crypto_tfm *tfm) |
| { |
| struct mxc_scc_ctx *ctx = crypto_tfm_ctx(tfm); |
| struct crypto_alg *alg = tfm->__crt_alg; |
| struct mxc_scc_crypto_tmpl *algt; |
| |
| algt = container_of(alg, struct mxc_scc_crypto_tmpl, alg); |
| |
| ctx->scc = algt->scc; |
| return 0; |
| } |
| |
| static void mxc_scc_dequeue_req_unlocked(struct mxc_scc_ctx *ctx) |
| { |
| struct crypto_async_request *req, *backlog; |
| |
| if (ctx->scc->hw_busy) |
| return; |
| |
| spin_lock_bh(&ctx->scc->lock); |
| backlog = crypto_get_backlog(&ctx->scc->queue); |
| req = crypto_dequeue_request(&ctx->scc->queue); |
| ctx->scc->req = req; |
| ctx->scc->hw_busy = true; |
| spin_unlock_bh(&ctx->scc->lock); |
| |
| if (!req) |
| return; |
| |
| if (backlog) |
| backlog->complete(backlog, -EINPROGRESS); |
| |
| mxc_scc_ablkcipher_next(ctx, req); |
| } |
| |
| static int mxc_scc_queue_req(struct mxc_scc_ctx *ctx, |
| struct crypto_async_request *req) |
| { |
| int ret; |
| |
| spin_lock_bh(&ctx->scc->lock); |
| ret = crypto_enqueue_request(&ctx->scc->queue, req); |
| spin_unlock_bh(&ctx->scc->lock); |
| |
| if (ret != -EINPROGRESS) |
| return ret; |
| |
| mxc_scc_dequeue_req_unlocked(ctx); |
| |
| return -EINPROGRESS; |
| } |
| |
| static int mxc_scc_des3_op(struct mxc_scc_ctx *ctx, |
| struct ablkcipher_request *req) |
| { |
| int err; |
| |
| err = mxc_scc_ablkcipher_req_init(req, ctx); |
| if (err) |
| return err; |
| |
| return mxc_scc_queue_req(ctx, &req->base); |
| } |
| |
| static int mxc_scc_ecb_des_encrypt(struct ablkcipher_request *req) |
| { |
| struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); |
| struct mxc_scc_ctx *ctx = crypto_ablkcipher_ctx(cipher); |
| |
| ctx->ctrl = SCC_SCM_CTRL_START_CIPHER; |
| |
| return mxc_scc_des3_op(ctx, req); |
| } |
| |
| static int mxc_scc_ecb_des_decrypt(struct ablkcipher_request *req) |
| { |
| struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); |
| struct mxc_scc_ctx *ctx = crypto_ablkcipher_ctx(cipher); |
| |
| ctx->ctrl = SCC_SCM_CTRL_START_CIPHER; |
| ctx->ctrl |= SCC_SCM_CTRL_DECRYPT_MODE; |
| |
| return mxc_scc_des3_op(ctx, req); |
| } |
| |
| static int mxc_scc_cbc_des_encrypt(struct ablkcipher_request *req) |
| { |
| struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); |
| struct mxc_scc_ctx *ctx = crypto_ablkcipher_ctx(cipher); |
| |
| ctx->ctrl = SCC_SCM_CTRL_START_CIPHER; |
| ctx->ctrl |= SCC_SCM_CTRL_CBC_MODE; |
| |
| return mxc_scc_des3_op(ctx, req); |
| } |
| |
| static int mxc_scc_cbc_des_decrypt(struct ablkcipher_request *req) |
| { |
| struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); |
| struct mxc_scc_ctx *ctx = crypto_ablkcipher_ctx(cipher); |
| |
| ctx->ctrl = SCC_SCM_CTRL_START_CIPHER; |
| ctx->ctrl |= SCC_SCM_CTRL_CBC_MODE; |
| ctx->ctrl |= SCC_SCM_CTRL_DECRYPT_MODE; |
| |
| return mxc_scc_des3_op(ctx, req); |
| } |
| |
| static void mxc_scc_hw_init(struct mxc_scc *scc) |
| { |
| int offset; |
| |
| offset = SCC_NON_RESERVED_OFFSET / scc->block_size_bytes; |
| |
| /* Fill the RED_START register */ |
| writel(offset, scc->base + SCC_SCM_RED_START); |
| |
| /* Fill the BLACK_START register */ |
| writel(offset, scc->base + SCC_SCM_BLACK_START); |
| |
| scc->red_memory = scc->base + SCC_SCM_RED_MEMORY + |
| SCC_NON_RESERVED_OFFSET; |
| |
| scc->black_memory = scc->base + SCC_SCM_BLACK_MEMORY + |
| SCC_NON_RESERVED_OFFSET; |
| |
| scc->bytes_remaining = scc->memory_size_bytes; |
| } |
| |
| static int mxc_scc_get_config(struct mxc_scc *scc) |
| { |
| int config; |
| |
| config = readl(scc->base + SCC_SCM_CFG); |
| |
| scc->block_size_bytes = config & SCC_SCM_CFG_BLOCK_SIZE_MASK; |
| |
| scc->black_ram_size_blocks = config & SCC_SCM_CFG_BLACK_SIZE_MASK; |
| |
| scc->memory_size_bytes = (scc->block_size_bytes * |
| scc->black_ram_size_blocks) - |
| SCC_NON_RESERVED_OFFSET; |
| |
| return 0; |
| } |
| |
| static enum mxc_scc_state mxc_scc_get_state(struct mxc_scc *scc) |
| { |
| enum mxc_scc_state state; |
| int status; |
| |
| status = readl(scc->base + SCC_SMN_STATUS) & |
| SCC_SMN_STATUS_STATE_MASK; |
| |
| /* If in Health Check, try to bringup to secure state */ |
| if (status & SCC_SMN_STATE_HEALTH_CHECK) { |
| /* |
| * Write a simple algorithm to the Algorithm Sequence |
| * Checker (ASC) |
| */ |
| writel(0xaaaa, scc->base + SCC_SMN_SEQ_START); |
| writel(0x5555, scc->base + SCC_SMN_SEQ_END); |
| writel(0x5555, scc->base + SCC_SMN_SEQ_CHECK); |
| |
| status = readl(scc->base + SCC_SMN_STATUS) & |
| SCC_SMN_STATUS_STATE_MASK; |
| } |
| |
| switch (status) { |
| case SCC_SMN_STATE_NON_SECURE: |
| case SCC_SMN_STATE_SECURE: |
| state = SCC_STATE_OK; |
| break; |
| case SCC_SMN_STATE_FAIL: |
| state = SCC_STATE_FAILED; |
| break; |
| default: |
| state = SCC_STATE_UNIMPLEMENTED; |
| break; |
| } |
| |
| return state; |
| } |
| |
| static struct mxc_scc_crypto_tmpl scc_ecb_des = { |
| .alg = { |
| .cra_name = "ecb(des3_ede)", |
| .cra_driver_name = "ecb-des3-scc", |
| .cra_priority = 300, |
| .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER, |
| .cra_blocksize = DES3_EDE_BLOCK_SIZE, |
| .cra_ctxsize = sizeof(struct mxc_scc_ctx), |
| .cra_alignmask = 0, |
| .cra_type = &crypto_ablkcipher_type, |
| .cra_module = THIS_MODULE, |
| .cra_init = mxc_scc_cra_init, |
| .cra_u.ablkcipher = { |
| .min_keysize = DES3_EDE_KEY_SIZE, |
| .max_keysize = DES3_EDE_KEY_SIZE, |
| .encrypt = mxc_scc_ecb_des_encrypt, |
| .decrypt = mxc_scc_ecb_des_decrypt, |
| } |
| } |
| }; |
| |
| static struct mxc_scc_crypto_tmpl scc_cbc_des = { |
| .alg = { |
| .cra_name = "cbc(des3_ede)", |
| .cra_driver_name = "cbc-des3-scc", |
| .cra_priority = 300, |
| .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER, |
| .cra_blocksize = DES3_EDE_BLOCK_SIZE, |
| .cra_ctxsize = sizeof(struct mxc_scc_ctx), |
| .cra_alignmask = 0, |
| .cra_type = &crypto_ablkcipher_type, |
| .cra_module = THIS_MODULE, |
| .cra_init = mxc_scc_cra_init, |
| .cra_u.ablkcipher = { |
| .min_keysize = DES3_EDE_KEY_SIZE, |
| .max_keysize = DES3_EDE_KEY_SIZE, |
| .encrypt = mxc_scc_cbc_des_encrypt, |
| .decrypt = mxc_scc_cbc_des_decrypt, |
| } |
| } |
| }; |
| |
| static struct mxc_scc_crypto_tmpl *scc_crypto_algs[] = { |
| &scc_ecb_des, |
| &scc_cbc_des, |
| }; |
| |
| static int mxc_scc_crypto_register(struct mxc_scc *scc) |
| { |
| int i; |
| int err = 0; |
| |
| for (i = 0; i < ARRAY_SIZE(scc_crypto_algs); i++) { |
| scc_crypto_algs[i]->scc = scc; |
| err = crypto_register_alg(&scc_crypto_algs[i]->alg); |
| if (err) |
| goto err_out; |
| } |
| |
| return 0; |
| |
| err_out: |
| while (--i >= 0) |
| crypto_unregister_alg(&scc_crypto_algs[i]->alg); |
| |
| return err; |
| } |
| |
| static void mxc_scc_crypto_unregister(void) |
| { |
| unsigned int i; |
| |
| for (i = 0; i < ARRAY_SIZE(scc_crypto_algs); i++) |
| crypto_unregister_alg(&scc_crypto_algs[i]->alg); |
| } |
| |
| static int mxc_scc_probe(struct platform_device *pdev) |
| { |
| struct device *dev = &pdev->dev; |
| struct resource *res; |
| struct mxc_scc *scc; |
| enum mxc_scc_state state; |
| int irq; |
| int ret; |
| int i; |
| |
| scc = devm_kzalloc(dev, sizeof(*scc), GFP_KERNEL); |
| if (!scc) |
| return -ENOMEM; |
| |
| res = platform_get_resource(pdev, IORESOURCE_MEM, 0); |
| scc->base = devm_ioremap_resource(dev, res); |
| if (IS_ERR(scc->base)) |
| return PTR_ERR(scc->base); |
| |
| scc->clk = devm_clk_get(&pdev->dev, "ipg"); |
| if (IS_ERR(scc->clk)) { |
| dev_err(dev, "Could not get ipg clock\n"); |
| return PTR_ERR(scc->clk); |
| } |
| |
| ret = clk_prepare_enable(scc->clk); |
| if (ret) |
| return ret; |
| |
| /* clear error status register */ |
| writel(0x0, scc->base + SCC_SCM_ERROR_STATUS); |
| |
| /* clear interrupt control registers */ |
| writel(SCC_SCM_INTR_CTRL_CLR_INTR | |
| SCC_SCM_INTR_CTRL_MASK_INTR, |
| scc->base + SCC_SCM_INTR_CTRL); |
| |
| writel(SCC_SMN_COMMAND_CLR_INTR | |
| SCC_SMN_COMMAND_EN_INTR, |
| scc->base + SCC_SMN_COMMAND); |
| |
| scc->dev = dev; |
| platform_set_drvdata(pdev, scc); |
| |
| ret = mxc_scc_get_config(scc); |
| if (ret) |
| goto err_out; |
| |
| state = mxc_scc_get_state(scc); |
| |
| if (state != SCC_STATE_OK) { |
| dev_err(dev, "SCC in unusable state %d\n", state); |
| ret = -EINVAL; |
| goto err_out; |
| } |
| |
| mxc_scc_hw_init(scc); |
| |
| spin_lock_init(&scc->lock); |
| /* FIXME: calculate queue from RAM slots */ |
| crypto_init_queue(&scc->queue, 50); |
| |
| for (i = 0; i < 2; i++) { |
| irq = platform_get_irq(pdev, i); |
| if (irq < 0) { |
| dev_err(dev, "failed to get irq resource\n"); |
| ret = -EINVAL; |
| goto err_out; |
| } |
| |
| ret = devm_request_threaded_irq(dev, irq, NULL, mxc_scc_int, |
| IRQF_ONESHOT, dev_name(dev), scc); |
| if (ret) |
| goto err_out; |
| } |
| |
| ret = mxc_scc_crypto_register(scc); |
| if (ret) { |
| dev_err(dev, "could not register algorithms"); |
| goto err_out; |
| } |
| |
| dev_info(dev, "registered successfully.\n"); |
| |
| return 0; |
| |
| err_out: |
| clk_disable_unprepare(scc->clk); |
| |
| return ret; |
| } |
| |
| static int mxc_scc_remove(struct platform_device *pdev) |
| { |
| struct mxc_scc *scc = platform_get_drvdata(pdev); |
| |
| mxc_scc_crypto_unregister(); |
| |
| clk_disable_unprepare(scc->clk); |
| |
| return 0; |
| } |
| |
| static const struct of_device_id mxc_scc_dt_ids[] = { |
| { .compatible = "fsl,imx25-scc", .data = NULL, }, |
| { /* sentinel */ } |
| }; |
| MODULE_DEVICE_TABLE(of, mxc_scc_dt_ids); |
| |
| static struct platform_driver mxc_scc_driver = { |
| .probe = mxc_scc_probe, |
| .remove = mxc_scc_remove, |
| .driver = { |
| .name = "mxc-scc", |
| .of_match_table = mxc_scc_dt_ids, |
| }, |
| }; |
| |
| module_platform_driver(mxc_scc_driver); |
| MODULE_AUTHOR("Steffen Trumtrar <kernel@pengutronix.de>"); |
| MODULE_DESCRIPTION("Freescale i.MX25 SCC Crypto driver"); |
| MODULE_LICENSE("GPL v2"); |