Loading...
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * This file is part of STM32 Crypto driver for Linux.
4 *
5 * Copyright (C) 2017, STMicroelectronics - All Rights Reserved
6 * Author(s): Lionel DEBIEVE <lionel.debieve@st.com> for STMicroelectronics.
7 */
8
9#include <crypto/engine.h>
10#include <crypto/internal/hash.h>
11#include <crypto/md5.h>
12#include <crypto/scatterwalk.h>
13#include <crypto/sha1.h>
14#include <crypto/sha2.h>
15#include <crypto/sha3.h>
16#include <linux/clk.h>
17#include <linux/delay.h>
18#include <linux/dma-mapping.h>
19#include <linux/dmaengine.h>
20#include <linux/interrupt.h>
21#include <linux/iopoll.h>
22#include <linux/kernel.h>
23#include <linux/module.h>
24#include <linux/of.h>
25#include <linux/platform_device.h>
26#include <linux/pm_runtime.h>
27#include <linux/reset.h>
28#include <linux/string.h>
29
30#define HASH_CR 0x00
31#define HASH_DIN 0x04
32#define HASH_STR 0x08
33#define HASH_UX500_HREG(x) (0x0c + ((x) * 0x04))
34#define HASH_IMR 0x20
35#define HASH_SR 0x24
36#define HASH_CSR(x) (0x0F8 + ((x) * 0x04))
37#define HASH_HREG(x) (0x310 + ((x) * 0x04))
38#define HASH_HWCFGR 0x3F0
39#define HASH_VER 0x3F4
40#define HASH_ID 0x3F8
41
42/* Control Register */
43#define HASH_CR_INIT BIT(2)
44#define HASH_CR_DMAE BIT(3)
45#define HASH_CR_DATATYPE_POS 4
46#define HASH_CR_MODE BIT(6)
47#define HASH_CR_ALGO_POS 7
48#define HASH_CR_MDMAT BIT(13)
49#define HASH_CR_DMAA BIT(14)
50#define HASH_CR_LKEY BIT(16)
51
52/* Interrupt */
53#define HASH_DINIE BIT(0)
54#define HASH_DCIE BIT(1)
55
56/* Interrupt Mask */
57#define HASH_MASK_CALC_COMPLETION BIT(0)
58#define HASH_MASK_DATA_INPUT BIT(1)
59
60/* Status Flags */
61#define HASH_SR_DATA_INPUT_READY BIT(0)
62#define HASH_SR_OUTPUT_READY BIT(1)
63#define HASH_SR_DMA_ACTIVE BIT(2)
64#define HASH_SR_BUSY BIT(3)
65
66/* STR Register */
67#define HASH_STR_NBLW_MASK GENMASK(4, 0)
68#define HASH_STR_DCAL BIT(8)
69
70/* HWCFGR Register */
71#define HASH_HWCFG_DMA_MASK GENMASK(3, 0)
72
73/* Context swap register */
74#define HASH_CSR_NB_SHA256_HMAC 54
75#define HASH_CSR_NB_SHA256 38
76#define HASH_CSR_NB_SHA512_HMAC 103
77#define HASH_CSR_NB_SHA512 91
78#define HASH_CSR_NB_SHA3_HMAC 88
79#define HASH_CSR_NB_SHA3 72
80#define HASH_CSR_NB_MAX HASH_CSR_NB_SHA512_HMAC
81
82#define HASH_FLAGS_INIT BIT(0)
83#define HASH_FLAGS_OUTPUT_READY BIT(1)
84#define HASH_FLAGS_CPU BIT(2)
85#define HASH_FLAGS_DMA_ACTIVE BIT(3)
86#define HASH_FLAGS_HMAC_INIT BIT(4)
87#define HASH_FLAGS_HMAC_FINAL BIT(5)
88#define HASH_FLAGS_HMAC_KEY BIT(6)
89#define HASH_FLAGS_SHA3_MODE BIT(7)
90#define HASH_FLAGS_FINAL BIT(15)
91#define HASH_FLAGS_FINUP BIT(16)
92#define HASH_FLAGS_ALGO_MASK GENMASK(20, 17)
93#define HASH_FLAGS_ALGO_SHIFT 17
94#define HASH_FLAGS_ERRORS BIT(21)
95#define HASH_FLAGS_EMPTY BIT(22)
96#define HASH_FLAGS_HMAC BIT(23)
97
98#define HASH_OP_UPDATE 1
99#define HASH_OP_FINAL 2
100
101#define HASH_BURST_LEVEL 4
102
103enum stm32_hash_data_format {
104 HASH_DATA_32_BITS = 0x0,
105 HASH_DATA_16_BITS = 0x1,
106 HASH_DATA_8_BITS = 0x2,
107 HASH_DATA_1_BIT = 0x3
108};
109
110#define HASH_BUFLEN (SHA3_224_BLOCK_SIZE + 4)
111#define HASH_MAX_KEY_SIZE (SHA512_BLOCK_SIZE * 8)
112
113enum stm32_hash_algo {
114 HASH_SHA1 = 0,
115 HASH_MD5 = 1,
116 HASH_SHA224 = 2,
117 HASH_SHA256 = 3,
118 HASH_SHA3_224 = 4,
119 HASH_SHA3_256 = 5,
120 HASH_SHA3_384 = 6,
121 HASH_SHA3_512 = 7,
122 HASH_SHA384 = 12,
123 HASH_SHA512 = 15,
124};
125
126enum ux500_hash_algo {
127 HASH_SHA256_UX500 = 0,
128 HASH_SHA1_UX500 = 1,
129};
130
131#define HASH_AUTOSUSPEND_DELAY 50
132
133struct stm32_hash_ctx {
134 struct stm32_hash_dev *hdev;
135 struct crypto_shash *xtfm;
136 unsigned long flags;
137
138 u8 key[HASH_MAX_KEY_SIZE];
139 int keylen;
140};
141
142struct stm32_hash_state {
143 u32 flags;
144
145 u16 bufcnt;
146 u16 blocklen;
147
148 u8 buffer[HASH_BUFLEN] __aligned(4);
149
150 /* hash state */
151 u32 hw_context[3 + HASH_CSR_NB_MAX];
152};
153
154struct stm32_hash_request_ctx {
155 struct stm32_hash_dev *hdev;
156 unsigned long op;
157
158 u8 digest[SHA512_DIGEST_SIZE] __aligned(sizeof(u32));
159 size_t digcnt;
160
161 /* DMA */
162 struct scatterlist *sg;
163 unsigned int offset;
164 unsigned int total;
165 struct scatterlist sg_key;
166
167 dma_addr_t dma_addr;
168 size_t dma_ct;
169 int nents;
170
171 u8 data_type;
172
173 struct stm32_hash_state state;
174};
175
176struct stm32_hash_algs_info {
177 struct ahash_engine_alg *algs_list;
178 size_t size;
179};
180
181struct stm32_hash_pdata {
182 const int alg_shift;
183 const struct stm32_hash_algs_info *algs_info;
184 size_t algs_info_size;
185 bool has_sr;
186 bool has_mdmat;
187 bool broken_emptymsg;
188 bool ux500;
189};
190
191struct stm32_hash_dev {
192 struct list_head list;
193 struct device *dev;
194 struct clk *clk;
195 struct reset_control *rst;
196 void __iomem *io_base;
197 phys_addr_t phys_base;
198 u32 dma_mode;
199 bool polled;
200
201 struct ahash_request *req;
202 struct crypto_engine *engine;
203
204 unsigned long flags;
205
206 struct dma_chan *dma_lch;
207 struct completion dma_completion;
208
209 const struct stm32_hash_pdata *pdata;
210};
211
212struct stm32_hash_drv {
213 struct list_head dev_list;
214 spinlock_t lock; /* List protection access */
215};
216
217static struct stm32_hash_drv stm32_hash = {
218 .dev_list = LIST_HEAD_INIT(stm32_hash.dev_list),
219 .lock = __SPIN_LOCK_UNLOCKED(stm32_hash.lock),
220};
221
222static void stm32_hash_dma_callback(void *param);
223
224static inline u32 stm32_hash_read(struct stm32_hash_dev *hdev, u32 offset)
225{
226 return readl_relaxed(hdev->io_base + offset);
227}
228
229static inline void stm32_hash_write(struct stm32_hash_dev *hdev,
230 u32 offset, u32 value)
231{
232 writel_relaxed(value, hdev->io_base + offset);
233}
234
235static inline int stm32_hash_wait_busy(struct stm32_hash_dev *hdev)
236{
237 u32 status;
238
239 /* The Ux500 lacks the special status register, we poll the DCAL bit instead */
240 if (!hdev->pdata->has_sr)
241 return readl_relaxed_poll_timeout(hdev->io_base + HASH_STR, status,
242 !(status & HASH_STR_DCAL), 10, 10000);
243
244 return readl_relaxed_poll_timeout(hdev->io_base + HASH_SR, status,
245 !(status & HASH_SR_BUSY), 10, 10000);
246}
247
248static void stm32_hash_set_nblw(struct stm32_hash_dev *hdev, int length)
249{
250 u32 reg;
251
252 reg = stm32_hash_read(hdev, HASH_STR);
253 reg &= ~(HASH_STR_NBLW_MASK);
254 reg |= (8U * ((length) % 4U));
255 stm32_hash_write(hdev, HASH_STR, reg);
256}
257
258static int stm32_hash_write_key(struct stm32_hash_dev *hdev)
259{
260 struct crypto_ahash *tfm = crypto_ahash_reqtfm(hdev->req);
261 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
262 u32 reg;
263 int keylen = ctx->keylen;
264 void *key = ctx->key;
265
266 if (keylen) {
267 stm32_hash_set_nblw(hdev, keylen);
268
269 while (keylen > 0) {
270 stm32_hash_write(hdev, HASH_DIN, *(u32 *)key);
271 keylen -= 4;
272 key += 4;
273 }
274
275 reg = stm32_hash_read(hdev, HASH_STR);
276 reg |= HASH_STR_DCAL;
277 stm32_hash_write(hdev, HASH_STR, reg);
278
279 return -EINPROGRESS;
280 }
281
282 return 0;
283}
284
285static void stm32_hash_write_ctrl(struct stm32_hash_dev *hdev)
286{
287 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
288 struct crypto_ahash *tfm = crypto_ahash_reqtfm(hdev->req);
289 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
290 struct stm32_hash_state *state = &rctx->state;
291 u32 alg = (state->flags & HASH_FLAGS_ALGO_MASK) >> HASH_FLAGS_ALGO_SHIFT;
292
293 u32 reg = HASH_CR_INIT;
294
295 if (!(hdev->flags & HASH_FLAGS_INIT)) {
296 if (hdev->pdata->ux500) {
297 reg |= ((alg & BIT(0)) << HASH_CR_ALGO_POS);
298 } else {
299 if (hdev->pdata->alg_shift == HASH_CR_ALGO_POS)
300 reg |= ((alg & BIT(1)) << 17) |
301 ((alg & BIT(0)) << HASH_CR_ALGO_POS);
302 else
303 reg |= alg << hdev->pdata->alg_shift;
304 }
305
306 reg |= (rctx->data_type << HASH_CR_DATATYPE_POS);
307
308 if (state->flags & HASH_FLAGS_HMAC) {
309 hdev->flags |= HASH_FLAGS_HMAC;
310 reg |= HASH_CR_MODE;
311 if (ctx->keylen > crypto_ahash_blocksize(tfm))
312 reg |= HASH_CR_LKEY;
313 }
314
315 if (!hdev->polled)
316 stm32_hash_write(hdev, HASH_IMR, HASH_DCIE);
317
318 stm32_hash_write(hdev, HASH_CR, reg);
319
320 hdev->flags |= HASH_FLAGS_INIT;
321
322 /*
323 * After first block + 1 words are fill up,
324 * we only need to fill 1 block to start partial computation
325 */
326 rctx->state.blocklen -= sizeof(u32);
327
328 dev_dbg(hdev->dev, "Write Control %x\n", reg);
329 }
330}
331
332static void stm32_hash_append_sg(struct stm32_hash_request_ctx *rctx)
333{
334 struct stm32_hash_state *state = &rctx->state;
335 size_t count;
336
337 while ((state->bufcnt < state->blocklen) && rctx->total) {
338 count = min(rctx->sg->length - rctx->offset, rctx->total);
339 count = min_t(size_t, count, state->blocklen - state->bufcnt);
340
341 if (count <= 0) {
342 if ((rctx->sg->length == 0) && !sg_is_last(rctx->sg)) {
343 rctx->sg = sg_next(rctx->sg);
344 continue;
345 } else {
346 break;
347 }
348 }
349
350 scatterwalk_map_and_copy(state->buffer + state->bufcnt,
351 rctx->sg, rctx->offset, count, 0);
352
353 state->bufcnt += count;
354 rctx->offset += count;
355 rctx->total -= count;
356
357 if (rctx->offset == rctx->sg->length) {
358 rctx->sg = sg_next(rctx->sg);
359 if (rctx->sg)
360 rctx->offset = 0;
361 else
362 rctx->total = 0;
363 }
364 }
365}
366
367static int stm32_hash_xmit_cpu(struct stm32_hash_dev *hdev,
368 const u8 *buf, size_t length, int final)
369{
370 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
371 struct stm32_hash_state *state = &rctx->state;
372 unsigned int count, len32;
373 const u32 *buffer = (const u32 *)buf;
374 u32 reg;
375
376 if (final) {
377 hdev->flags |= HASH_FLAGS_FINAL;
378
379 /* Do not process empty messages if hw is buggy. */
380 if (!(hdev->flags & HASH_FLAGS_INIT) && !length &&
381 hdev->pdata->broken_emptymsg) {
382 state->flags |= HASH_FLAGS_EMPTY;
383 return 0;
384 }
385 }
386
387 len32 = DIV_ROUND_UP(length, sizeof(u32));
388
389 dev_dbg(hdev->dev, "%s: length: %zd, final: %x len32 %i\n",
390 __func__, length, final, len32);
391
392 hdev->flags |= HASH_FLAGS_CPU;
393
394 stm32_hash_write_ctrl(hdev);
395
396 if (stm32_hash_wait_busy(hdev))
397 return -ETIMEDOUT;
398
399 if ((hdev->flags & HASH_FLAGS_HMAC) &&
400 (!(hdev->flags & HASH_FLAGS_HMAC_KEY))) {
401 hdev->flags |= HASH_FLAGS_HMAC_KEY;
402 stm32_hash_write_key(hdev);
403 if (stm32_hash_wait_busy(hdev))
404 return -ETIMEDOUT;
405 }
406
407 for (count = 0; count < len32; count++)
408 stm32_hash_write(hdev, HASH_DIN, buffer[count]);
409
410 if (final) {
411 if (stm32_hash_wait_busy(hdev))
412 return -ETIMEDOUT;
413
414 stm32_hash_set_nblw(hdev, length);
415 reg = stm32_hash_read(hdev, HASH_STR);
416 reg |= HASH_STR_DCAL;
417 stm32_hash_write(hdev, HASH_STR, reg);
418 if (hdev->flags & HASH_FLAGS_HMAC) {
419 if (stm32_hash_wait_busy(hdev))
420 return -ETIMEDOUT;
421 stm32_hash_write_key(hdev);
422 }
423 return -EINPROGRESS;
424 }
425
426 return 0;
427}
428
429static int hash_swap_reg(struct stm32_hash_request_ctx *rctx)
430{
431 struct stm32_hash_state *state = &rctx->state;
432
433 switch ((state->flags & HASH_FLAGS_ALGO_MASK) >>
434 HASH_FLAGS_ALGO_SHIFT) {
435 case HASH_MD5:
436 case HASH_SHA1:
437 case HASH_SHA224:
438 case HASH_SHA256:
439 if (state->flags & HASH_FLAGS_HMAC)
440 return HASH_CSR_NB_SHA256_HMAC;
441 else
442 return HASH_CSR_NB_SHA256;
443 break;
444
445 case HASH_SHA384:
446 case HASH_SHA512:
447 if (state->flags & HASH_FLAGS_HMAC)
448 return HASH_CSR_NB_SHA512_HMAC;
449 else
450 return HASH_CSR_NB_SHA512;
451 break;
452
453 case HASH_SHA3_224:
454 case HASH_SHA3_256:
455 case HASH_SHA3_384:
456 case HASH_SHA3_512:
457 if (state->flags & HASH_FLAGS_HMAC)
458 return HASH_CSR_NB_SHA3_HMAC;
459 else
460 return HASH_CSR_NB_SHA3;
461 break;
462
463 default:
464 return -EINVAL;
465 }
466}
467
468static int stm32_hash_update_cpu(struct stm32_hash_dev *hdev)
469{
470 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
471 struct stm32_hash_state *state = &rctx->state;
472 u32 *preg = state->hw_context;
473 int bufcnt, err = 0, final;
474 int i, swap_reg;
475
476 dev_dbg(hdev->dev, "%s flags %x\n", __func__, state->flags);
477
478 final = state->flags & HASH_FLAGS_FINAL;
479
480 while ((rctx->total >= state->blocklen) ||
481 (state->bufcnt + rctx->total >= state->blocklen)) {
482 stm32_hash_append_sg(rctx);
483 bufcnt = state->bufcnt;
484 state->bufcnt = 0;
485 err = stm32_hash_xmit_cpu(hdev, state->buffer, bufcnt, 0);
486 if (err)
487 return err;
488 }
489
490 stm32_hash_append_sg(rctx);
491
492 if (final) {
493 bufcnt = state->bufcnt;
494 state->bufcnt = 0;
495 return stm32_hash_xmit_cpu(hdev, state->buffer, bufcnt, 1);
496 }
497
498 if (!(hdev->flags & HASH_FLAGS_INIT))
499 return 0;
500
501 if (stm32_hash_wait_busy(hdev))
502 return -ETIMEDOUT;
503
504 swap_reg = hash_swap_reg(rctx);
505
506 if (!hdev->pdata->ux500)
507 *preg++ = stm32_hash_read(hdev, HASH_IMR);
508 *preg++ = stm32_hash_read(hdev, HASH_STR);
509 *preg++ = stm32_hash_read(hdev, HASH_CR);
510 for (i = 0; i < swap_reg; i++)
511 *preg++ = stm32_hash_read(hdev, HASH_CSR(i));
512
513 state->flags |= HASH_FLAGS_INIT;
514
515 return err;
516}
517
518static int stm32_hash_xmit_dma(struct stm32_hash_dev *hdev,
519 struct scatterlist *sg, int length, int mdma)
520{
521 struct dma_async_tx_descriptor *in_desc;
522 dma_cookie_t cookie;
523 u32 reg;
524 int err;
525
526 in_desc = dmaengine_prep_slave_sg(hdev->dma_lch, sg, 1,
527 DMA_MEM_TO_DEV, DMA_PREP_INTERRUPT |
528 DMA_CTRL_ACK);
529 if (!in_desc) {
530 dev_err(hdev->dev, "dmaengine_prep_slave error\n");
531 return -ENOMEM;
532 }
533
534 reinit_completion(&hdev->dma_completion);
535 in_desc->callback = stm32_hash_dma_callback;
536 in_desc->callback_param = hdev;
537
538 hdev->flags |= HASH_FLAGS_FINAL;
539 hdev->flags |= HASH_FLAGS_DMA_ACTIVE;
540
541 reg = stm32_hash_read(hdev, HASH_CR);
542
543 if (hdev->pdata->has_mdmat) {
544 if (mdma)
545 reg |= HASH_CR_MDMAT;
546 else
547 reg &= ~HASH_CR_MDMAT;
548 }
549 reg |= HASH_CR_DMAE;
550
551 stm32_hash_write(hdev, HASH_CR, reg);
552
553 stm32_hash_set_nblw(hdev, length);
554
555 cookie = dmaengine_submit(in_desc);
556 err = dma_submit_error(cookie);
557 if (err)
558 return -ENOMEM;
559
560 dma_async_issue_pending(hdev->dma_lch);
561
562 if (!wait_for_completion_timeout(&hdev->dma_completion,
563 msecs_to_jiffies(100)))
564 err = -ETIMEDOUT;
565
566 if (dma_async_is_tx_complete(hdev->dma_lch, cookie,
567 NULL, NULL) != DMA_COMPLETE)
568 err = -ETIMEDOUT;
569
570 if (err) {
571 dev_err(hdev->dev, "DMA Error %i\n", err);
572 dmaengine_terminate_all(hdev->dma_lch);
573 return err;
574 }
575
576 return -EINPROGRESS;
577}
578
579static void stm32_hash_dma_callback(void *param)
580{
581 struct stm32_hash_dev *hdev = param;
582
583 complete(&hdev->dma_completion);
584}
585
586static int stm32_hash_hmac_dma_send(struct stm32_hash_dev *hdev)
587{
588 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
589 struct crypto_ahash *tfm = crypto_ahash_reqtfm(hdev->req);
590 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
591 int err;
592
593 if (ctx->keylen < rctx->state.blocklen || hdev->dma_mode == 1) {
594 err = stm32_hash_write_key(hdev);
595 if (stm32_hash_wait_busy(hdev))
596 return -ETIMEDOUT;
597 } else {
598 if (!(hdev->flags & HASH_FLAGS_HMAC_KEY))
599 sg_init_one(&rctx->sg_key, ctx->key,
600 ALIGN(ctx->keylen, sizeof(u32)));
601
602 rctx->dma_ct = dma_map_sg(hdev->dev, &rctx->sg_key, 1,
603 DMA_TO_DEVICE);
604 if (rctx->dma_ct == 0) {
605 dev_err(hdev->dev, "dma_map_sg error\n");
606 return -ENOMEM;
607 }
608
609 err = stm32_hash_xmit_dma(hdev, &rctx->sg_key, ctx->keylen, 0);
610
611 dma_unmap_sg(hdev->dev, &rctx->sg_key, 1, DMA_TO_DEVICE);
612 }
613
614 return err;
615}
616
617static int stm32_hash_dma_init(struct stm32_hash_dev *hdev)
618{
619 struct dma_slave_config dma_conf;
620 struct dma_chan *chan;
621 int err;
622
623 memset(&dma_conf, 0, sizeof(dma_conf));
624
625 dma_conf.direction = DMA_MEM_TO_DEV;
626 dma_conf.dst_addr = hdev->phys_base + HASH_DIN;
627 dma_conf.dst_addr_width = DMA_SLAVE_BUSWIDTH_4_BYTES;
628 dma_conf.src_maxburst = HASH_BURST_LEVEL;
629 dma_conf.dst_maxburst = HASH_BURST_LEVEL;
630 dma_conf.device_fc = false;
631
632 chan = dma_request_chan(hdev->dev, "in");
633 if (IS_ERR(chan))
634 return PTR_ERR(chan);
635
636 hdev->dma_lch = chan;
637
638 err = dmaengine_slave_config(hdev->dma_lch, &dma_conf);
639 if (err) {
640 dma_release_channel(hdev->dma_lch);
641 hdev->dma_lch = NULL;
642 dev_err(hdev->dev, "Couldn't configure DMA slave.\n");
643 return err;
644 }
645
646 init_completion(&hdev->dma_completion);
647
648 return 0;
649}
650
651static int stm32_hash_dma_send(struct stm32_hash_dev *hdev)
652{
653 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
654 u32 *buffer = (void *)rctx->state.buffer;
655 struct scatterlist sg[1], *tsg;
656 int err = 0, reg, ncp = 0;
657 unsigned int i, len = 0, bufcnt = 0;
658 bool is_last = false;
659
660 rctx->sg = hdev->req->src;
661 rctx->total = hdev->req->nbytes;
662
663 rctx->nents = sg_nents(rctx->sg);
664 if (rctx->nents < 0)
665 return -EINVAL;
666
667 stm32_hash_write_ctrl(hdev);
668
669 if (hdev->flags & HASH_FLAGS_HMAC) {
670 err = stm32_hash_hmac_dma_send(hdev);
671 if (err != -EINPROGRESS)
672 return err;
673 }
674
675 for_each_sg(rctx->sg, tsg, rctx->nents, i) {
676 sg[0] = *tsg;
677 len = sg->length;
678
679 if (sg_is_last(sg) || (bufcnt + sg[0].length) >= rctx->total) {
680 sg->length = rctx->total - bufcnt;
681 is_last = true;
682 if (hdev->dma_mode == 1) {
683 len = (ALIGN(sg->length, 16) - 16);
684
685 ncp = sg_pcopy_to_buffer(
686 rctx->sg, rctx->nents,
687 rctx->state.buffer, sg->length - len,
688 rctx->total - sg->length + len);
689
690 sg->length = len;
691 } else {
692 if (!(IS_ALIGNED(sg->length, sizeof(u32)))) {
693 len = sg->length;
694 sg->length = ALIGN(sg->length,
695 sizeof(u32));
696 }
697 }
698 }
699
700 rctx->dma_ct = dma_map_sg(hdev->dev, sg, 1,
701 DMA_TO_DEVICE);
702 if (rctx->dma_ct == 0) {
703 dev_err(hdev->dev, "dma_map_sg error\n");
704 return -ENOMEM;
705 }
706
707 err = stm32_hash_xmit_dma(hdev, sg, len, !is_last);
708
709 bufcnt += sg[0].length;
710 dma_unmap_sg(hdev->dev, sg, 1, DMA_TO_DEVICE);
711
712 if (err == -ENOMEM)
713 return err;
714 if (is_last)
715 break;
716 }
717
718 if (hdev->dma_mode == 1) {
719 if (stm32_hash_wait_busy(hdev))
720 return -ETIMEDOUT;
721 reg = stm32_hash_read(hdev, HASH_CR);
722 reg &= ~HASH_CR_DMAE;
723 reg |= HASH_CR_DMAA;
724 stm32_hash_write(hdev, HASH_CR, reg);
725
726 if (ncp) {
727 memset(buffer + ncp, 0,
728 DIV_ROUND_UP(ncp, sizeof(u32)) - ncp);
729 writesl(hdev->io_base + HASH_DIN, buffer,
730 DIV_ROUND_UP(ncp, sizeof(u32)));
731 }
732 stm32_hash_set_nblw(hdev, ncp);
733 reg = stm32_hash_read(hdev, HASH_STR);
734 reg |= HASH_STR_DCAL;
735 stm32_hash_write(hdev, HASH_STR, reg);
736 err = -EINPROGRESS;
737 }
738
739 if (hdev->flags & HASH_FLAGS_HMAC) {
740 if (stm32_hash_wait_busy(hdev))
741 return -ETIMEDOUT;
742 err = stm32_hash_hmac_dma_send(hdev);
743 }
744
745 return err;
746}
747
748static struct stm32_hash_dev *stm32_hash_find_dev(struct stm32_hash_ctx *ctx)
749{
750 struct stm32_hash_dev *hdev = NULL, *tmp;
751
752 spin_lock_bh(&stm32_hash.lock);
753 if (!ctx->hdev) {
754 list_for_each_entry(tmp, &stm32_hash.dev_list, list) {
755 hdev = tmp;
756 break;
757 }
758 ctx->hdev = hdev;
759 } else {
760 hdev = ctx->hdev;
761 }
762
763 spin_unlock_bh(&stm32_hash.lock);
764
765 return hdev;
766}
767
768static bool stm32_hash_dma_aligned_data(struct ahash_request *req)
769{
770 struct scatterlist *sg;
771 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
772 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(crypto_ahash_reqtfm(req));
773 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
774 int i;
775
776 if (!hdev->dma_lch || req->nbytes <= rctx->state.blocklen)
777 return false;
778
779 if (sg_nents(req->src) > 1) {
780 if (hdev->dma_mode == 1)
781 return false;
782 for_each_sg(req->src, sg, sg_nents(req->src), i) {
783 if ((!IS_ALIGNED(sg->length, sizeof(u32))) &&
784 (!sg_is_last(sg)))
785 return false;
786 }
787 }
788
789 if (req->src->offset % 4)
790 return false;
791
792 return true;
793}
794
795static int stm32_hash_init(struct ahash_request *req)
796{
797 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
798 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
799 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
800 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
801 struct stm32_hash_state *state = &rctx->state;
802 bool sha3_mode = ctx->flags & HASH_FLAGS_SHA3_MODE;
803
804 rctx->hdev = hdev;
805
806 state->flags = HASH_FLAGS_CPU;
807
808 if (sha3_mode)
809 state->flags |= HASH_FLAGS_SHA3_MODE;
810
811 rctx->digcnt = crypto_ahash_digestsize(tfm);
812 switch (rctx->digcnt) {
813 case MD5_DIGEST_SIZE:
814 state->flags |= HASH_MD5 << HASH_FLAGS_ALGO_SHIFT;
815 break;
816 case SHA1_DIGEST_SIZE:
817 if (hdev->pdata->ux500)
818 state->flags |= HASH_SHA1_UX500 << HASH_FLAGS_ALGO_SHIFT;
819 else
820 state->flags |= HASH_SHA1 << HASH_FLAGS_ALGO_SHIFT;
821 break;
822 case SHA224_DIGEST_SIZE:
823 if (sha3_mode)
824 state->flags |= HASH_SHA3_224 << HASH_FLAGS_ALGO_SHIFT;
825 else
826 state->flags |= HASH_SHA224 << HASH_FLAGS_ALGO_SHIFT;
827 break;
828 case SHA256_DIGEST_SIZE:
829 if (sha3_mode) {
830 state->flags |= HASH_SHA3_256 << HASH_FLAGS_ALGO_SHIFT;
831 } else {
832 if (hdev->pdata->ux500)
833 state->flags |= HASH_SHA256_UX500 << HASH_FLAGS_ALGO_SHIFT;
834 else
835 state->flags |= HASH_SHA256 << HASH_FLAGS_ALGO_SHIFT;
836 }
837 break;
838 case SHA384_DIGEST_SIZE:
839 if (sha3_mode)
840 state->flags |= HASH_SHA3_384 << HASH_FLAGS_ALGO_SHIFT;
841 else
842 state->flags |= HASH_SHA384 << HASH_FLAGS_ALGO_SHIFT;
843 break;
844 case SHA512_DIGEST_SIZE:
845 if (sha3_mode)
846 state->flags |= HASH_SHA3_512 << HASH_FLAGS_ALGO_SHIFT;
847 else
848 state->flags |= HASH_SHA512 << HASH_FLAGS_ALGO_SHIFT;
849 break;
850 default:
851 return -EINVAL;
852 }
853
854 rctx->state.bufcnt = 0;
855 rctx->state.blocklen = crypto_ahash_blocksize(tfm) + sizeof(u32);
856 if (rctx->state.blocklen > HASH_BUFLEN) {
857 dev_err(hdev->dev, "Error, block too large");
858 return -EINVAL;
859 }
860 rctx->total = 0;
861 rctx->offset = 0;
862 rctx->data_type = HASH_DATA_8_BITS;
863
864 if (ctx->flags & HASH_FLAGS_HMAC)
865 state->flags |= HASH_FLAGS_HMAC;
866
867 dev_dbg(hdev->dev, "%s Flags %x\n", __func__, state->flags);
868
869 return 0;
870}
871
872static int stm32_hash_update_req(struct stm32_hash_dev *hdev)
873{
874 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
875 struct stm32_hash_state *state = &rctx->state;
876
877 if (!(state->flags & HASH_FLAGS_CPU))
878 return stm32_hash_dma_send(hdev);
879
880 return stm32_hash_update_cpu(hdev);
881}
882
883static int stm32_hash_final_req(struct stm32_hash_dev *hdev)
884{
885 struct ahash_request *req = hdev->req;
886 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
887 struct stm32_hash_state *state = &rctx->state;
888 int buflen = state->bufcnt;
889
890 if (state->flags & HASH_FLAGS_FINUP)
891 return stm32_hash_update_req(hdev);
892
893 state->bufcnt = 0;
894
895 return stm32_hash_xmit_cpu(hdev, state->buffer, buflen, 1);
896}
897
898static void stm32_hash_emptymsg_fallback(struct ahash_request *req)
899{
900 struct crypto_ahash *ahash = crypto_ahash_reqtfm(req);
901 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(ahash);
902 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
903 struct stm32_hash_dev *hdev = rctx->hdev;
904 int ret;
905
906 dev_dbg(hdev->dev, "use fallback message size 0 key size %d\n",
907 ctx->keylen);
908
909 if (!ctx->xtfm) {
910 dev_err(hdev->dev, "no fallback engine\n");
911 return;
912 }
913
914 if (ctx->keylen) {
915 ret = crypto_shash_setkey(ctx->xtfm, ctx->key, ctx->keylen);
916 if (ret) {
917 dev_err(hdev->dev, "failed to set key ret=%d\n", ret);
918 return;
919 }
920 }
921
922 ret = crypto_shash_tfm_digest(ctx->xtfm, NULL, 0, rctx->digest);
923 if (ret)
924 dev_err(hdev->dev, "shash digest error\n");
925}
926
927static void stm32_hash_copy_hash(struct ahash_request *req)
928{
929 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
930 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
931 struct stm32_hash_state *state = &rctx->state;
932 struct stm32_hash_dev *hdev = rctx->hdev;
933 __be32 *hash = (void *)rctx->digest;
934 unsigned int i, hashsize;
935
936 if (hdev->pdata->broken_emptymsg && (state->flags & HASH_FLAGS_EMPTY))
937 return stm32_hash_emptymsg_fallback(req);
938
939 hashsize = crypto_ahash_digestsize(tfm);
940
941 for (i = 0; i < hashsize / sizeof(u32); i++) {
942 if (hdev->pdata->ux500)
943 hash[i] = cpu_to_be32(stm32_hash_read(hdev,
944 HASH_UX500_HREG(i)));
945 else
946 hash[i] = cpu_to_be32(stm32_hash_read(hdev,
947 HASH_HREG(i)));
948 }
949}
950
951static int stm32_hash_finish(struct ahash_request *req)
952{
953 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
954 u32 reg;
955
956 reg = stm32_hash_read(rctx->hdev, HASH_SR);
957 reg &= ~HASH_SR_OUTPUT_READY;
958 stm32_hash_write(rctx->hdev, HASH_SR, reg);
959
960 if (!req->result)
961 return -EINVAL;
962
963 memcpy(req->result, rctx->digest, rctx->digcnt);
964
965 return 0;
966}
967
968static void stm32_hash_finish_req(struct ahash_request *req, int err)
969{
970 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
971 struct stm32_hash_dev *hdev = rctx->hdev;
972
973 if (!err && (HASH_FLAGS_FINAL & hdev->flags)) {
974 stm32_hash_copy_hash(req);
975 err = stm32_hash_finish(req);
976 }
977
978 pm_runtime_mark_last_busy(hdev->dev);
979 pm_runtime_put_autosuspend(hdev->dev);
980
981 crypto_finalize_hash_request(hdev->engine, req, err);
982}
983
984static int stm32_hash_handle_queue(struct stm32_hash_dev *hdev,
985 struct ahash_request *req)
986{
987 return crypto_transfer_hash_request_to_engine(hdev->engine, req);
988}
989
990static int stm32_hash_one_request(struct crypto_engine *engine, void *areq)
991{
992 struct ahash_request *req = container_of(areq, struct ahash_request,
993 base);
994 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(crypto_ahash_reqtfm(req));
995 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
996 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
997 struct stm32_hash_state *state = &rctx->state;
998 int swap_reg;
999 int err = 0;
1000
1001 if (!hdev)
1002 return -ENODEV;
1003
1004 dev_dbg(hdev->dev, "processing new req, op: %lu, nbytes %d\n",
1005 rctx->op, req->nbytes);
1006
1007 pm_runtime_get_sync(hdev->dev);
1008
1009 hdev->req = req;
1010 hdev->flags = 0;
1011 swap_reg = hash_swap_reg(rctx);
1012
1013 if (state->flags & HASH_FLAGS_INIT) {
1014 u32 *preg = rctx->state.hw_context;
1015 u32 reg;
1016 int i;
1017
1018 if (!hdev->pdata->ux500)
1019 stm32_hash_write(hdev, HASH_IMR, *preg++);
1020 stm32_hash_write(hdev, HASH_STR, *preg++);
1021 stm32_hash_write(hdev, HASH_CR, *preg);
1022 reg = *preg++ | HASH_CR_INIT;
1023 stm32_hash_write(hdev, HASH_CR, reg);
1024
1025 for (i = 0; i < swap_reg; i++)
1026 stm32_hash_write(hdev, HASH_CSR(i), *preg++);
1027
1028 hdev->flags |= HASH_FLAGS_INIT;
1029
1030 if (state->flags & HASH_FLAGS_HMAC)
1031 hdev->flags |= HASH_FLAGS_HMAC |
1032 HASH_FLAGS_HMAC_KEY;
1033 }
1034
1035 if (rctx->op == HASH_OP_UPDATE)
1036 err = stm32_hash_update_req(hdev);
1037 else if (rctx->op == HASH_OP_FINAL)
1038 err = stm32_hash_final_req(hdev);
1039
1040 /* If we have an IRQ, wait for that, else poll for completion */
1041 if (err == -EINPROGRESS && hdev->polled) {
1042 if (stm32_hash_wait_busy(hdev))
1043 err = -ETIMEDOUT;
1044 else {
1045 hdev->flags |= HASH_FLAGS_OUTPUT_READY;
1046 err = 0;
1047 }
1048 }
1049
1050 if (err != -EINPROGRESS)
1051 /* done task will not finish it, so do it here */
1052 stm32_hash_finish_req(req, err);
1053
1054 return 0;
1055}
1056
1057static int stm32_hash_enqueue(struct ahash_request *req, unsigned int op)
1058{
1059 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1060 struct stm32_hash_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
1061 struct stm32_hash_dev *hdev = ctx->hdev;
1062
1063 rctx->op = op;
1064
1065 return stm32_hash_handle_queue(hdev, req);
1066}
1067
1068static int stm32_hash_update(struct ahash_request *req)
1069{
1070 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1071 struct stm32_hash_state *state = &rctx->state;
1072
1073 if (!req->nbytes || !(state->flags & HASH_FLAGS_CPU))
1074 return 0;
1075
1076 rctx->total = req->nbytes;
1077 rctx->sg = req->src;
1078 rctx->offset = 0;
1079
1080 if ((state->bufcnt + rctx->total < state->blocklen)) {
1081 stm32_hash_append_sg(rctx);
1082 return 0;
1083 }
1084
1085 return stm32_hash_enqueue(req, HASH_OP_UPDATE);
1086}
1087
1088static int stm32_hash_final(struct ahash_request *req)
1089{
1090 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1091 struct stm32_hash_state *state = &rctx->state;
1092
1093 state->flags |= HASH_FLAGS_FINAL;
1094
1095 return stm32_hash_enqueue(req, HASH_OP_FINAL);
1096}
1097
1098static int stm32_hash_finup(struct ahash_request *req)
1099{
1100 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1101 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(crypto_ahash_reqtfm(req));
1102 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
1103 struct stm32_hash_state *state = &rctx->state;
1104
1105 if (!req->nbytes)
1106 goto out;
1107
1108 state->flags |= HASH_FLAGS_FINUP;
1109 rctx->total = req->nbytes;
1110 rctx->sg = req->src;
1111 rctx->offset = 0;
1112
1113 if (hdev->dma_lch && stm32_hash_dma_aligned_data(req))
1114 state->flags &= ~HASH_FLAGS_CPU;
1115
1116out:
1117 return stm32_hash_final(req);
1118}
1119
1120static int stm32_hash_digest(struct ahash_request *req)
1121{
1122 return stm32_hash_init(req) ?: stm32_hash_finup(req);
1123}
1124
1125static int stm32_hash_export(struct ahash_request *req, void *out)
1126{
1127 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1128
1129 memcpy(out, &rctx->state, sizeof(rctx->state));
1130
1131 return 0;
1132}
1133
1134static int stm32_hash_import(struct ahash_request *req, const void *in)
1135{
1136 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1137
1138 stm32_hash_init(req);
1139 memcpy(&rctx->state, in, sizeof(rctx->state));
1140
1141 return 0;
1142}
1143
1144static int stm32_hash_setkey(struct crypto_ahash *tfm,
1145 const u8 *key, unsigned int keylen)
1146{
1147 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
1148
1149 if (keylen <= HASH_MAX_KEY_SIZE) {
1150 memcpy(ctx->key, key, keylen);
1151 ctx->keylen = keylen;
1152 } else {
1153 return -ENOMEM;
1154 }
1155
1156 return 0;
1157}
1158
1159static int stm32_hash_init_fallback(struct crypto_tfm *tfm)
1160{
1161 struct stm32_hash_ctx *ctx = crypto_tfm_ctx(tfm);
1162 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
1163 const char *name = crypto_tfm_alg_name(tfm);
1164 struct crypto_shash *xtfm;
1165
1166 /* The fallback is only needed on Ux500 */
1167 if (!hdev->pdata->ux500)
1168 return 0;
1169
1170 xtfm = crypto_alloc_shash(name, 0, CRYPTO_ALG_NEED_FALLBACK);
1171 if (IS_ERR(xtfm)) {
1172 dev_err(hdev->dev, "failed to allocate %s fallback\n",
1173 name);
1174 return PTR_ERR(xtfm);
1175 }
1176 dev_info(hdev->dev, "allocated %s fallback\n", name);
1177 ctx->xtfm = xtfm;
1178
1179 return 0;
1180}
1181
1182static int stm32_hash_cra_init_algs(struct crypto_tfm *tfm, u32 algs_flags)
1183{
1184 struct stm32_hash_ctx *ctx = crypto_tfm_ctx(tfm);
1185
1186 crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
1187 sizeof(struct stm32_hash_request_ctx));
1188
1189 ctx->keylen = 0;
1190
1191 if (algs_flags)
1192 ctx->flags |= algs_flags;
1193
1194 return stm32_hash_init_fallback(tfm);
1195}
1196
1197static int stm32_hash_cra_init(struct crypto_tfm *tfm)
1198{
1199 return stm32_hash_cra_init_algs(tfm, 0);
1200}
1201
1202static int stm32_hash_cra_hmac_init(struct crypto_tfm *tfm)
1203{
1204 return stm32_hash_cra_init_algs(tfm, HASH_FLAGS_HMAC);
1205}
1206
1207static int stm32_hash_cra_sha3_init(struct crypto_tfm *tfm)
1208{
1209 return stm32_hash_cra_init_algs(tfm, HASH_FLAGS_SHA3_MODE);
1210}
1211
1212static int stm32_hash_cra_sha3_hmac_init(struct crypto_tfm *tfm)
1213{
1214 return stm32_hash_cra_init_algs(tfm, HASH_FLAGS_SHA3_MODE |
1215 HASH_FLAGS_HMAC);
1216}
1217
1218
1219static void stm32_hash_cra_exit(struct crypto_tfm *tfm)
1220{
1221 struct stm32_hash_ctx *ctx = crypto_tfm_ctx(tfm);
1222
1223 if (ctx->xtfm)
1224 crypto_free_shash(ctx->xtfm);
1225}
1226
1227static irqreturn_t stm32_hash_irq_thread(int irq, void *dev_id)
1228{
1229 struct stm32_hash_dev *hdev = dev_id;
1230
1231 if (HASH_FLAGS_CPU & hdev->flags) {
1232 if (HASH_FLAGS_OUTPUT_READY & hdev->flags) {
1233 hdev->flags &= ~HASH_FLAGS_OUTPUT_READY;
1234 goto finish;
1235 }
1236 } else if (HASH_FLAGS_DMA_ACTIVE & hdev->flags) {
1237 hdev->flags &= ~HASH_FLAGS_DMA_ACTIVE;
1238 goto finish;
1239 }
1240
1241 return IRQ_HANDLED;
1242
1243finish:
1244 /* Finish current request */
1245 stm32_hash_finish_req(hdev->req, 0);
1246
1247 return IRQ_HANDLED;
1248}
1249
1250static irqreturn_t stm32_hash_irq_handler(int irq, void *dev_id)
1251{
1252 struct stm32_hash_dev *hdev = dev_id;
1253 u32 reg;
1254
1255 reg = stm32_hash_read(hdev, HASH_SR);
1256 if (reg & HASH_SR_OUTPUT_READY) {
1257 hdev->flags |= HASH_FLAGS_OUTPUT_READY;
1258 /* Disable IT*/
1259 stm32_hash_write(hdev, HASH_IMR, 0);
1260 return IRQ_WAKE_THREAD;
1261 }
1262
1263 return IRQ_NONE;
1264}
1265
1266static struct ahash_engine_alg algs_md5[] = {
1267 {
1268 .base.init = stm32_hash_init,
1269 .base.update = stm32_hash_update,
1270 .base.final = stm32_hash_final,
1271 .base.finup = stm32_hash_finup,
1272 .base.digest = stm32_hash_digest,
1273 .base.export = stm32_hash_export,
1274 .base.import = stm32_hash_import,
1275 .base.halg = {
1276 .digestsize = MD5_DIGEST_SIZE,
1277 .statesize = sizeof(struct stm32_hash_state),
1278 .base = {
1279 .cra_name = "md5",
1280 .cra_driver_name = "stm32-md5",
1281 .cra_priority = 200,
1282 .cra_flags = CRYPTO_ALG_ASYNC |
1283 CRYPTO_ALG_KERN_DRIVER_ONLY,
1284 .cra_blocksize = MD5_HMAC_BLOCK_SIZE,
1285 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1286 .cra_init = stm32_hash_cra_init,
1287 .cra_exit = stm32_hash_cra_exit,
1288 .cra_module = THIS_MODULE,
1289 }
1290 },
1291 .op = {
1292 .do_one_request = stm32_hash_one_request,
1293 },
1294 },
1295 {
1296 .base.init = stm32_hash_init,
1297 .base.update = stm32_hash_update,
1298 .base.final = stm32_hash_final,
1299 .base.finup = stm32_hash_finup,
1300 .base.digest = stm32_hash_digest,
1301 .base.export = stm32_hash_export,
1302 .base.import = stm32_hash_import,
1303 .base.setkey = stm32_hash_setkey,
1304 .base.halg = {
1305 .digestsize = MD5_DIGEST_SIZE,
1306 .statesize = sizeof(struct stm32_hash_state),
1307 .base = {
1308 .cra_name = "hmac(md5)",
1309 .cra_driver_name = "stm32-hmac-md5",
1310 .cra_priority = 200,
1311 .cra_flags = CRYPTO_ALG_ASYNC |
1312 CRYPTO_ALG_KERN_DRIVER_ONLY,
1313 .cra_blocksize = MD5_HMAC_BLOCK_SIZE,
1314 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1315 .cra_init = stm32_hash_cra_hmac_init,
1316 .cra_exit = stm32_hash_cra_exit,
1317 .cra_module = THIS_MODULE,
1318 }
1319 },
1320 .op = {
1321 .do_one_request = stm32_hash_one_request,
1322 },
1323 }
1324};
1325
1326static struct ahash_engine_alg algs_sha1[] = {
1327 {
1328 .base.init = stm32_hash_init,
1329 .base.update = stm32_hash_update,
1330 .base.final = stm32_hash_final,
1331 .base.finup = stm32_hash_finup,
1332 .base.digest = stm32_hash_digest,
1333 .base.export = stm32_hash_export,
1334 .base.import = stm32_hash_import,
1335 .base.halg = {
1336 .digestsize = SHA1_DIGEST_SIZE,
1337 .statesize = sizeof(struct stm32_hash_state),
1338 .base = {
1339 .cra_name = "sha1",
1340 .cra_driver_name = "stm32-sha1",
1341 .cra_priority = 200,
1342 .cra_flags = CRYPTO_ALG_ASYNC |
1343 CRYPTO_ALG_KERN_DRIVER_ONLY,
1344 .cra_blocksize = SHA1_BLOCK_SIZE,
1345 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1346 .cra_init = stm32_hash_cra_init,
1347 .cra_exit = stm32_hash_cra_exit,
1348 .cra_module = THIS_MODULE,
1349 }
1350 },
1351 .op = {
1352 .do_one_request = stm32_hash_one_request,
1353 },
1354 },
1355 {
1356 .base.init = stm32_hash_init,
1357 .base.update = stm32_hash_update,
1358 .base.final = stm32_hash_final,
1359 .base.finup = stm32_hash_finup,
1360 .base.digest = stm32_hash_digest,
1361 .base.export = stm32_hash_export,
1362 .base.import = stm32_hash_import,
1363 .base.setkey = stm32_hash_setkey,
1364 .base.halg = {
1365 .digestsize = SHA1_DIGEST_SIZE,
1366 .statesize = sizeof(struct stm32_hash_state),
1367 .base = {
1368 .cra_name = "hmac(sha1)",
1369 .cra_driver_name = "stm32-hmac-sha1",
1370 .cra_priority = 200,
1371 .cra_flags = CRYPTO_ALG_ASYNC |
1372 CRYPTO_ALG_KERN_DRIVER_ONLY,
1373 .cra_blocksize = SHA1_BLOCK_SIZE,
1374 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1375 .cra_init = stm32_hash_cra_hmac_init,
1376 .cra_exit = stm32_hash_cra_exit,
1377 .cra_module = THIS_MODULE,
1378 }
1379 },
1380 .op = {
1381 .do_one_request = stm32_hash_one_request,
1382 },
1383 },
1384};
1385
1386static struct ahash_engine_alg algs_sha224[] = {
1387 {
1388 .base.init = stm32_hash_init,
1389 .base.update = stm32_hash_update,
1390 .base.final = stm32_hash_final,
1391 .base.finup = stm32_hash_finup,
1392 .base.digest = stm32_hash_digest,
1393 .base.export = stm32_hash_export,
1394 .base.import = stm32_hash_import,
1395 .base.halg = {
1396 .digestsize = SHA224_DIGEST_SIZE,
1397 .statesize = sizeof(struct stm32_hash_state),
1398 .base = {
1399 .cra_name = "sha224",
1400 .cra_driver_name = "stm32-sha224",
1401 .cra_priority = 200,
1402 .cra_flags = CRYPTO_ALG_ASYNC |
1403 CRYPTO_ALG_KERN_DRIVER_ONLY,
1404 .cra_blocksize = SHA224_BLOCK_SIZE,
1405 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1406 .cra_init = stm32_hash_cra_init,
1407 .cra_exit = stm32_hash_cra_exit,
1408 .cra_module = THIS_MODULE,
1409 }
1410 },
1411 .op = {
1412 .do_one_request = stm32_hash_one_request,
1413 },
1414 },
1415 {
1416 .base.init = stm32_hash_init,
1417 .base.update = stm32_hash_update,
1418 .base.final = stm32_hash_final,
1419 .base.finup = stm32_hash_finup,
1420 .base.digest = stm32_hash_digest,
1421 .base.setkey = stm32_hash_setkey,
1422 .base.export = stm32_hash_export,
1423 .base.import = stm32_hash_import,
1424 .base.halg = {
1425 .digestsize = SHA224_DIGEST_SIZE,
1426 .statesize = sizeof(struct stm32_hash_state),
1427 .base = {
1428 .cra_name = "hmac(sha224)",
1429 .cra_driver_name = "stm32-hmac-sha224",
1430 .cra_priority = 200,
1431 .cra_flags = CRYPTO_ALG_ASYNC |
1432 CRYPTO_ALG_KERN_DRIVER_ONLY,
1433 .cra_blocksize = SHA224_BLOCK_SIZE,
1434 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1435 .cra_init = stm32_hash_cra_hmac_init,
1436 .cra_exit = stm32_hash_cra_exit,
1437 .cra_module = THIS_MODULE,
1438 }
1439 },
1440 .op = {
1441 .do_one_request = stm32_hash_one_request,
1442 },
1443 },
1444};
1445
1446static struct ahash_engine_alg algs_sha256[] = {
1447 {
1448 .base.init = stm32_hash_init,
1449 .base.update = stm32_hash_update,
1450 .base.final = stm32_hash_final,
1451 .base.finup = stm32_hash_finup,
1452 .base.digest = stm32_hash_digest,
1453 .base.export = stm32_hash_export,
1454 .base.import = stm32_hash_import,
1455 .base.halg = {
1456 .digestsize = SHA256_DIGEST_SIZE,
1457 .statesize = sizeof(struct stm32_hash_state),
1458 .base = {
1459 .cra_name = "sha256",
1460 .cra_driver_name = "stm32-sha256",
1461 .cra_priority = 200,
1462 .cra_flags = CRYPTO_ALG_ASYNC |
1463 CRYPTO_ALG_KERN_DRIVER_ONLY,
1464 .cra_blocksize = SHA256_BLOCK_SIZE,
1465 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1466 .cra_init = stm32_hash_cra_init,
1467 .cra_exit = stm32_hash_cra_exit,
1468 .cra_module = THIS_MODULE,
1469 }
1470 },
1471 .op = {
1472 .do_one_request = stm32_hash_one_request,
1473 },
1474 },
1475 {
1476 .base.init = stm32_hash_init,
1477 .base.update = stm32_hash_update,
1478 .base.final = stm32_hash_final,
1479 .base.finup = stm32_hash_finup,
1480 .base.digest = stm32_hash_digest,
1481 .base.export = stm32_hash_export,
1482 .base.import = stm32_hash_import,
1483 .base.setkey = stm32_hash_setkey,
1484 .base.halg = {
1485 .digestsize = SHA256_DIGEST_SIZE,
1486 .statesize = sizeof(struct stm32_hash_state),
1487 .base = {
1488 .cra_name = "hmac(sha256)",
1489 .cra_driver_name = "stm32-hmac-sha256",
1490 .cra_priority = 200,
1491 .cra_flags = CRYPTO_ALG_ASYNC |
1492 CRYPTO_ALG_KERN_DRIVER_ONLY,
1493 .cra_blocksize = SHA256_BLOCK_SIZE,
1494 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1495 .cra_init = stm32_hash_cra_hmac_init,
1496 .cra_exit = stm32_hash_cra_exit,
1497 .cra_module = THIS_MODULE,
1498 }
1499 },
1500 .op = {
1501 .do_one_request = stm32_hash_one_request,
1502 },
1503 },
1504};
1505
1506static struct ahash_engine_alg algs_sha384_sha512[] = {
1507 {
1508 .base.init = stm32_hash_init,
1509 .base.update = stm32_hash_update,
1510 .base.final = stm32_hash_final,
1511 .base.finup = stm32_hash_finup,
1512 .base.digest = stm32_hash_digest,
1513 .base.export = stm32_hash_export,
1514 .base.import = stm32_hash_import,
1515 .base.halg = {
1516 .digestsize = SHA384_DIGEST_SIZE,
1517 .statesize = sizeof(struct stm32_hash_state),
1518 .base = {
1519 .cra_name = "sha384",
1520 .cra_driver_name = "stm32-sha384",
1521 .cra_priority = 200,
1522 .cra_flags = CRYPTO_ALG_ASYNC |
1523 CRYPTO_ALG_KERN_DRIVER_ONLY,
1524 .cra_blocksize = SHA384_BLOCK_SIZE,
1525 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1526 .cra_init = stm32_hash_cra_init,
1527 .cra_exit = stm32_hash_cra_exit,
1528 .cra_module = THIS_MODULE,
1529 }
1530 },
1531 .op = {
1532 .do_one_request = stm32_hash_one_request,
1533 },
1534 },
1535 {
1536 .base.init = stm32_hash_init,
1537 .base.update = stm32_hash_update,
1538 .base.final = stm32_hash_final,
1539 .base.finup = stm32_hash_finup,
1540 .base.digest = stm32_hash_digest,
1541 .base.setkey = stm32_hash_setkey,
1542 .base.export = stm32_hash_export,
1543 .base.import = stm32_hash_import,
1544 .base.halg = {
1545 .digestsize = SHA384_DIGEST_SIZE,
1546 .statesize = sizeof(struct stm32_hash_state),
1547 .base = {
1548 .cra_name = "hmac(sha384)",
1549 .cra_driver_name = "stm32-hmac-sha384",
1550 .cra_priority = 200,
1551 .cra_flags = CRYPTO_ALG_ASYNC |
1552 CRYPTO_ALG_KERN_DRIVER_ONLY,
1553 .cra_blocksize = SHA384_BLOCK_SIZE,
1554 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1555 .cra_init = stm32_hash_cra_hmac_init,
1556 .cra_exit = stm32_hash_cra_exit,
1557 .cra_module = THIS_MODULE,
1558 }
1559 },
1560 .op = {
1561 .do_one_request = stm32_hash_one_request,
1562 },
1563 },
1564 {
1565 .base.init = stm32_hash_init,
1566 .base.update = stm32_hash_update,
1567 .base.final = stm32_hash_final,
1568 .base.finup = stm32_hash_finup,
1569 .base.digest = stm32_hash_digest,
1570 .base.export = stm32_hash_export,
1571 .base.import = stm32_hash_import,
1572 .base.halg = {
1573 .digestsize = SHA512_DIGEST_SIZE,
1574 .statesize = sizeof(struct stm32_hash_state),
1575 .base = {
1576 .cra_name = "sha512",
1577 .cra_driver_name = "stm32-sha512",
1578 .cra_priority = 200,
1579 .cra_flags = CRYPTO_ALG_ASYNC |
1580 CRYPTO_ALG_KERN_DRIVER_ONLY,
1581 .cra_blocksize = SHA512_BLOCK_SIZE,
1582 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1583 .cra_init = stm32_hash_cra_init,
1584 .cra_exit = stm32_hash_cra_exit,
1585 .cra_module = THIS_MODULE,
1586 }
1587 },
1588 .op = {
1589 .do_one_request = stm32_hash_one_request,
1590 },
1591 },
1592 {
1593 .base.init = stm32_hash_init,
1594 .base.update = stm32_hash_update,
1595 .base.final = stm32_hash_final,
1596 .base.finup = stm32_hash_finup,
1597 .base.digest = stm32_hash_digest,
1598 .base.export = stm32_hash_export,
1599 .base.import = stm32_hash_import,
1600 .base.setkey = stm32_hash_setkey,
1601 .base.halg = {
1602 .digestsize = SHA512_DIGEST_SIZE,
1603 .statesize = sizeof(struct stm32_hash_state),
1604 .base = {
1605 .cra_name = "hmac(sha512)",
1606 .cra_driver_name = "stm32-hmac-sha512",
1607 .cra_priority = 200,
1608 .cra_flags = CRYPTO_ALG_ASYNC |
1609 CRYPTO_ALG_KERN_DRIVER_ONLY,
1610 .cra_blocksize = SHA512_BLOCK_SIZE,
1611 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1612 .cra_init = stm32_hash_cra_hmac_init,
1613 .cra_exit = stm32_hash_cra_exit,
1614 .cra_module = THIS_MODULE,
1615 }
1616 },
1617 .op = {
1618 .do_one_request = stm32_hash_one_request,
1619 },
1620 },
1621};
1622
1623static struct ahash_engine_alg algs_sha3[] = {
1624 {
1625 .base.init = stm32_hash_init,
1626 .base.update = stm32_hash_update,
1627 .base.final = stm32_hash_final,
1628 .base.finup = stm32_hash_finup,
1629 .base.digest = stm32_hash_digest,
1630 .base.export = stm32_hash_export,
1631 .base.import = stm32_hash_import,
1632 .base.halg = {
1633 .digestsize = SHA3_224_DIGEST_SIZE,
1634 .statesize = sizeof(struct stm32_hash_state),
1635 .base = {
1636 .cra_name = "sha3-224",
1637 .cra_driver_name = "stm32-sha3-224",
1638 .cra_priority = 200,
1639 .cra_flags = CRYPTO_ALG_ASYNC |
1640 CRYPTO_ALG_KERN_DRIVER_ONLY,
1641 .cra_blocksize = SHA3_224_BLOCK_SIZE,
1642 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1643 .cra_init = stm32_hash_cra_sha3_init,
1644 .cra_exit = stm32_hash_cra_exit,
1645 .cra_module = THIS_MODULE,
1646 }
1647 },
1648 .op = {
1649 .do_one_request = stm32_hash_one_request,
1650 },
1651 },
1652 {
1653 .base.init = stm32_hash_init,
1654 .base.update = stm32_hash_update,
1655 .base.final = stm32_hash_final,
1656 .base.finup = stm32_hash_finup,
1657 .base.digest = stm32_hash_digest,
1658 .base.export = stm32_hash_export,
1659 .base.import = stm32_hash_import,
1660 .base.setkey = stm32_hash_setkey,
1661 .base.halg = {
1662 .digestsize = SHA3_224_DIGEST_SIZE,
1663 .statesize = sizeof(struct stm32_hash_state),
1664 .base = {
1665 .cra_name = "hmac(sha3-224)",
1666 .cra_driver_name = "stm32-hmac-sha3-224",
1667 .cra_priority = 200,
1668 .cra_flags = CRYPTO_ALG_ASYNC |
1669 CRYPTO_ALG_KERN_DRIVER_ONLY,
1670 .cra_blocksize = SHA3_224_BLOCK_SIZE,
1671 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1672 .cra_init = stm32_hash_cra_sha3_hmac_init,
1673 .cra_exit = stm32_hash_cra_exit,
1674 .cra_module = THIS_MODULE,
1675 }
1676 },
1677 .op = {
1678 .do_one_request = stm32_hash_one_request,
1679 },
1680 },
1681 {
1682 .base.init = stm32_hash_init,
1683 .base.update = stm32_hash_update,
1684 .base.final = stm32_hash_final,
1685 .base.finup = stm32_hash_finup,
1686 .base.digest = stm32_hash_digest,
1687 .base.export = stm32_hash_export,
1688 .base.import = stm32_hash_import,
1689 .base.halg = {
1690 .digestsize = SHA3_256_DIGEST_SIZE,
1691 .statesize = sizeof(struct stm32_hash_state),
1692 .base = {
1693 .cra_name = "sha3-256",
1694 .cra_driver_name = "stm32-sha3-256",
1695 .cra_priority = 200,
1696 .cra_flags = CRYPTO_ALG_ASYNC |
1697 CRYPTO_ALG_KERN_DRIVER_ONLY,
1698 .cra_blocksize = SHA3_256_BLOCK_SIZE,
1699 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1700 .cra_init = stm32_hash_cra_sha3_init,
1701 .cra_exit = stm32_hash_cra_exit,
1702 .cra_module = THIS_MODULE,
1703 }
1704 },
1705 .op = {
1706 .do_one_request = stm32_hash_one_request,
1707 },
1708 },
1709 {
1710 .base.init = stm32_hash_init,
1711 .base.update = stm32_hash_update,
1712 .base.final = stm32_hash_final,
1713 .base.finup = stm32_hash_finup,
1714 .base.digest = stm32_hash_digest,
1715 .base.export = stm32_hash_export,
1716 .base.import = stm32_hash_import,
1717 .base.setkey = stm32_hash_setkey,
1718 .base.halg = {
1719 .digestsize = SHA3_256_DIGEST_SIZE,
1720 .statesize = sizeof(struct stm32_hash_state),
1721 .base = {
1722 .cra_name = "hmac(sha3-256)",
1723 .cra_driver_name = "stm32-hmac-sha3-256",
1724 .cra_priority = 200,
1725 .cra_flags = CRYPTO_ALG_ASYNC |
1726 CRYPTO_ALG_KERN_DRIVER_ONLY,
1727 .cra_blocksize = SHA3_256_BLOCK_SIZE,
1728 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1729 .cra_init = stm32_hash_cra_sha3_hmac_init,
1730 .cra_exit = stm32_hash_cra_exit,
1731 .cra_module = THIS_MODULE,
1732 }
1733 },
1734 .op = {
1735 .do_one_request = stm32_hash_one_request,
1736 },
1737 },
1738 {
1739 .base.init = stm32_hash_init,
1740 .base.update = stm32_hash_update,
1741 .base.final = stm32_hash_final,
1742 .base.finup = stm32_hash_finup,
1743 .base.digest = stm32_hash_digest,
1744 .base.export = stm32_hash_export,
1745 .base.import = stm32_hash_import,
1746 .base.halg = {
1747 .digestsize = SHA3_384_DIGEST_SIZE,
1748 .statesize = sizeof(struct stm32_hash_state),
1749 .base = {
1750 .cra_name = "sha3-384",
1751 .cra_driver_name = "stm32-sha3-384",
1752 .cra_priority = 200,
1753 .cra_flags = CRYPTO_ALG_ASYNC |
1754 CRYPTO_ALG_KERN_DRIVER_ONLY,
1755 .cra_blocksize = SHA3_384_BLOCK_SIZE,
1756 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1757 .cra_init = stm32_hash_cra_sha3_init,
1758 .cra_exit = stm32_hash_cra_exit,
1759 .cra_module = THIS_MODULE,
1760 }
1761 },
1762 .op = {
1763 .do_one_request = stm32_hash_one_request,
1764 },
1765 },
1766 {
1767 .base.init = stm32_hash_init,
1768 .base.update = stm32_hash_update,
1769 .base.final = stm32_hash_final,
1770 .base.finup = stm32_hash_finup,
1771 .base.digest = stm32_hash_digest,
1772 .base.export = stm32_hash_export,
1773 .base.import = stm32_hash_import,
1774 .base.setkey = stm32_hash_setkey,
1775 .base.halg = {
1776 .digestsize = SHA3_384_DIGEST_SIZE,
1777 .statesize = sizeof(struct stm32_hash_state),
1778 .base = {
1779 .cra_name = "hmac(sha3-384)",
1780 .cra_driver_name = "stm32-hmac-sha3-384",
1781 .cra_priority = 200,
1782 .cra_flags = CRYPTO_ALG_ASYNC |
1783 CRYPTO_ALG_KERN_DRIVER_ONLY,
1784 .cra_blocksize = SHA3_384_BLOCK_SIZE,
1785 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1786 .cra_init = stm32_hash_cra_sha3_hmac_init,
1787 .cra_exit = stm32_hash_cra_exit,
1788 .cra_module = THIS_MODULE,
1789 }
1790 },
1791 .op = {
1792 .do_one_request = stm32_hash_one_request,
1793 },
1794 },
1795 {
1796 .base.init = stm32_hash_init,
1797 .base.update = stm32_hash_update,
1798 .base.final = stm32_hash_final,
1799 .base.finup = stm32_hash_finup,
1800 .base.digest = stm32_hash_digest,
1801 .base.export = stm32_hash_export,
1802 .base.import = stm32_hash_import,
1803 .base.halg = {
1804 .digestsize = SHA3_512_DIGEST_SIZE,
1805 .statesize = sizeof(struct stm32_hash_state),
1806 .base = {
1807 .cra_name = "sha3-512",
1808 .cra_driver_name = "stm32-sha3-512",
1809 .cra_priority = 200,
1810 .cra_flags = CRYPTO_ALG_ASYNC |
1811 CRYPTO_ALG_KERN_DRIVER_ONLY,
1812 .cra_blocksize = SHA3_512_BLOCK_SIZE,
1813 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1814 .cra_init = stm32_hash_cra_sha3_init,
1815 .cra_exit = stm32_hash_cra_exit,
1816 .cra_module = THIS_MODULE,
1817 }
1818 },
1819 .op = {
1820 .do_one_request = stm32_hash_one_request,
1821 },
1822 },
1823 {
1824 .base.init = stm32_hash_init,
1825 .base.update = stm32_hash_update,
1826 .base.final = stm32_hash_final,
1827 .base.finup = stm32_hash_finup,
1828 .base.digest = stm32_hash_digest,
1829 .base.export = stm32_hash_export,
1830 .base.import = stm32_hash_import,
1831 .base.setkey = stm32_hash_setkey,
1832 .base.halg = {
1833 .digestsize = SHA3_512_DIGEST_SIZE,
1834 .statesize = sizeof(struct stm32_hash_state),
1835 .base = {
1836 .cra_name = "hmac(sha3-512)",
1837 .cra_driver_name = "stm32-hmac-sha3-512",
1838 .cra_priority = 200,
1839 .cra_flags = CRYPTO_ALG_ASYNC |
1840 CRYPTO_ALG_KERN_DRIVER_ONLY,
1841 .cra_blocksize = SHA3_512_BLOCK_SIZE,
1842 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1843 .cra_init = stm32_hash_cra_sha3_hmac_init,
1844 .cra_exit = stm32_hash_cra_exit,
1845 .cra_module = THIS_MODULE,
1846 }
1847 },
1848 .op = {
1849 .do_one_request = stm32_hash_one_request,
1850 },
1851 }
1852};
1853
1854static int stm32_hash_register_algs(struct stm32_hash_dev *hdev)
1855{
1856 unsigned int i, j;
1857 int err;
1858
1859 for (i = 0; i < hdev->pdata->algs_info_size; i++) {
1860 for (j = 0; j < hdev->pdata->algs_info[i].size; j++) {
1861 err = crypto_engine_register_ahash(
1862 &hdev->pdata->algs_info[i].algs_list[j]);
1863 if (err)
1864 goto err_algs;
1865 }
1866 }
1867
1868 return 0;
1869err_algs:
1870 dev_err(hdev->dev, "Algo %d : %d failed\n", i, j);
1871 for (; i--; ) {
1872 for (; j--;)
1873 crypto_engine_unregister_ahash(
1874 &hdev->pdata->algs_info[i].algs_list[j]);
1875 }
1876
1877 return err;
1878}
1879
1880static int stm32_hash_unregister_algs(struct stm32_hash_dev *hdev)
1881{
1882 unsigned int i, j;
1883
1884 for (i = 0; i < hdev->pdata->algs_info_size; i++) {
1885 for (j = 0; j < hdev->pdata->algs_info[i].size; j++)
1886 crypto_engine_unregister_ahash(
1887 &hdev->pdata->algs_info[i].algs_list[j]);
1888 }
1889
1890 return 0;
1891}
1892
1893static struct stm32_hash_algs_info stm32_hash_algs_info_ux500[] = {
1894 {
1895 .algs_list = algs_sha1,
1896 .size = ARRAY_SIZE(algs_sha1),
1897 },
1898 {
1899 .algs_list = algs_sha256,
1900 .size = ARRAY_SIZE(algs_sha256),
1901 },
1902};
1903
1904static const struct stm32_hash_pdata stm32_hash_pdata_ux500 = {
1905 .alg_shift = 7,
1906 .algs_info = stm32_hash_algs_info_ux500,
1907 .algs_info_size = ARRAY_SIZE(stm32_hash_algs_info_ux500),
1908 .broken_emptymsg = true,
1909 .ux500 = true,
1910};
1911
1912static struct stm32_hash_algs_info stm32_hash_algs_info_stm32f4[] = {
1913 {
1914 .algs_list = algs_md5,
1915 .size = ARRAY_SIZE(algs_md5),
1916 },
1917 {
1918 .algs_list = algs_sha1,
1919 .size = ARRAY_SIZE(algs_sha1),
1920 },
1921};
1922
1923static const struct stm32_hash_pdata stm32_hash_pdata_stm32f4 = {
1924 .alg_shift = 7,
1925 .algs_info = stm32_hash_algs_info_stm32f4,
1926 .algs_info_size = ARRAY_SIZE(stm32_hash_algs_info_stm32f4),
1927 .has_sr = true,
1928 .has_mdmat = true,
1929};
1930
1931static struct stm32_hash_algs_info stm32_hash_algs_info_stm32f7[] = {
1932 {
1933 .algs_list = algs_md5,
1934 .size = ARRAY_SIZE(algs_md5),
1935 },
1936 {
1937 .algs_list = algs_sha1,
1938 .size = ARRAY_SIZE(algs_sha1),
1939 },
1940 {
1941 .algs_list = algs_sha224,
1942 .size = ARRAY_SIZE(algs_sha224),
1943 },
1944 {
1945 .algs_list = algs_sha256,
1946 .size = ARRAY_SIZE(algs_sha256),
1947 },
1948};
1949
1950static const struct stm32_hash_pdata stm32_hash_pdata_stm32f7 = {
1951 .alg_shift = 7,
1952 .algs_info = stm32_hash_algs_info_stm32f7,
1953 .algs_info_size = ARRAY_SIZE(stm32_hash_algs_info_stm32f7),
1954 .has_sr = true,
1955 .has_mdmat = true,
1956};
1957
1958static struct stm32_hash_algs_info stm32_hash_algs_info_stm32mp13[] = {
1959 {
1960 .algs_list = algs_sha1,
1961 .size = ARRAY_SIZE(algs_sha1),
1962 },
1963 {
1964 .algs_list = algs_sha224,
1965 .size = ARRAY_SIZE(algs_sha224),
1966 },
1967 {
1968 .algs_list = algs_sha256,
1969 .size = ARRAY_SIZE(algs_sha256),
1970 },
1971 {
1972 .algs_list = algs_sha384_sha512,
1973 .size = ARRAY_SIZE(algs_sha384_sha512),
1974 },
1975 {
1976 .algs_list = algs_sha3,
1977 .size = ARRAY_SIZE(algs_sha3),
1978 },
1979};
1980
1981static const struct stm32_hash_pdata stm32_hash_pdata_stm32mp13 = {
1982 .alg_shift = 17,
1983 .algs_info = stm32_hash_algs_info_stm32mp13,
1984 .algs_info_size = ARRAY_SIZE(stm32_hash_algs_info_stm32mp13),
1985 .has_sr = true,
1986 .has_mdmat = true,
1987};
1988
1989static const struct of_device_id stm32_hash_of_match[] = {
1990 { .compatible = "stericsson,ux500-hash", .data = &stm32_hash_pdata_ux500 },
1991 { .compatible = "st,stm32f456-hash", .data = &stm32_hash_pdata_stm32f4 },
1992 { .compatible = "st,stm32f756-hash", .data = &stm32_hash_pdata_stm32f7 },
1993 { .compatible = "st,stm32mp13-hash", .data = &stm32_hash_pdata_stm32mp13 },
1994 {},
1995};
1996
1997MODULE_DEVICE_TABLE(of, stm32_hash_of_match);
1998
1999static int stm32_hash_get_of_match(struct stm32_hash_dev *hdev,
2000 struct device *dev)
2001{
2002 hdev->pdata = of_device_get_match_data(dev);
2003 if (!hdev->pdata) {
2004 dev_err(dev, "no compatible OF match\n");
2005 return -EINVAL;
2006 }
2007
2008 return 0;
2009}
2010
2011static int stm32_hash_probe(struct platform_device *pdev)
2012{
2013 struct stm32_hash_dev *hdev;
2014 struct device *dev = &pdev->dev;
2015 struct resource *res;
2016 int ret, irq;
2017
2018 hdev = devm_kzalloc(dev, sizeof(*hdev), GFP_KERNEL);
2019 if (!hdev)
2020 return -ENOMEM;
2021
2022 hdev->io_base = devm_platform_get_and_ioremap_resource(pdev, 0, &res);
2023 if (IS_ERR(hdev->io_base))
2024 return PTR_ERR(hdev->io_base);
2025
2026 hdev->phys_base = res->start;
2027
2028 ret = stm32_hash_get_of_match(hdev, dev);
2029 if (ret)
2030 return ret;
2031
2032 irq = platform_get_irq_optional(pdev, 0);
2033 if (irq < 0 && irq != -ENXIO)
2034 return irq;
2035
2036 if (irq > 0) {
2037 ret = devm_request_threaded_irq(dev, irq,
2038 stm32_hash_irq_handler,
2039 stm32_hash_irq_thread,
2040 IRQF_ONESHOT,
2041 dev_name(dev), hdev);
2042 if (ret) {
2043 dev_err(dev, "Cannot grab IRQ\n");
2044 return ret;
2045 }
2046 } else {
2047 dev_info(dev, "No IRQ, use polling mode\n");
2048 hdev->polled = true;
2049 }
2050
2051 hdev->clk = devm_clk_get(&pdev->dev, NULL);
2052 if (IS_ERR(hdev->clk))
2053 return dev_err_probe(dev, PTR_ERR(hdev->clk),
2054 "failed to get clock for hash\n");
2055
2056 ret = clk_prepare_enable(hdev->clk);
2057 if (ret) {
2058 dev_err(dev, "failed to enable hash clock (%d)\n", ret);
2059 return ret;
2060 }
2061
2062 pm_runtime_set_autosuspend_delay(dev, HASH_AUTOSUSPEND_DELAY);
2063 pm_runtime_use_autosuspend(dev);
2064
2065 pm_runtime_get_noresume(dev);
2066 pm_runtime_set_active(dev);
2067 pm_runtime_enable(dev);
2068
2069 hdev->rst = devm_reset_control_get(&pdev->dev, NULL);
2070 if (IS_ERR(hdev->rst)) {
2071 if (PTR_ERR(hdev->rst) == -EPROBE_DEFER) {
2072 ret = -EPROBE_DEFER;
2073 goto err_reset;
2074 }
2075 } else {
2076 reset_control_assert(hdev->rst);
2077 udelay(2);
2078 reset_control_deassert(hdev->rst);
2079 }
2080
2081 hdev->dev = dev;
2082
2083 platform_set_drvdata(pdev, hdev);
2084
2085 ret = stm32_hash_dma_init(hdev);
2086 switch (ret) {
2087 case 0:
2088 break;
2089 case -ENOENT:
2090 case -ENODEV:
2091 dev_info(dev, "DMA mode not available\n");
2092 break;
2093 default:
2094 dev_err(dev, "DMA init error %d\n", ret);
2095 goto err_dma;
2096 }
2097
2098 spin_lock(&stm32_hash.lock);
2099 list_add_tail(&hdev->list, &stm32_hash.dev_list);
2100 spin_unlock(&stm32_hash.lock);
2101
2102 /* Initialize crypto engine */
2103 hdev->engine = crypto_engine_alloc_init(dev, 1);
2104 if (!hdev->engine) {
2105 ret = -ENOMEM;
2106 goto err_engine;
2107 }
2108
2109 ret = crypto_engine_start(hdev->engine);
2110 if (ret)
2111 goto err_engine_start;
2112
2113 if (hdev->pdata->ux500)
2114 /* FIXME: implement DMA mode for Ux500 */
2115 hdev->dma_mode = 0;
2116 else
2117 hdev->dma_mode = stm32_hash_read(hdev, HASH_HWCFGR) & HASH_HWCFG_DMA_MASK;
2118
2119 /* Register algos */
2120 ret = stm32_hash_register_algs(hdev);
2121 if (ret)
2122 goto err_algs;
2123
2124 dev_info(dev, "Init HASH done HW ver %x DMA mode %u\n",
2125 stm32_hash_read(hdev, HASH_VER), hdev->dma_mode);
2126
2127 pm_runtime_put_sync(dev);
2128
2129 return 0;
2130
2131err_algs:
2132err_engine_start:
2133 crypto_engine_exit(hdev->engine);
2134err_engine:
2135 spin_lock(&stm32_hash.lock);
2136 list_del(&hdev->list);
2137 spin_unlock(&stm32_hash.lock);
2138err_dma:
2139 if (hdev->dma_lch)
2140 dma_release_channel(hdev->dma_lch);
2141err_reset:
2142 pm_runtime_disable(dev);
2143 pm_runtime_put_noidle(dev);
2144
2145 clk_disable_unprepare(hdev->clk);
2146
2147 return ret;
2148}
2149
2150static void stm32_hash_remove(struct platform_device *pdev)
2151{
2152 struct stm32_hash_dev *hdev = platform_get_drvdata(pdev);
2153 int ret;
2154
2155 ret = pm_runtime_get_sync(hdev->dev);
2156
2157 stm32_hash_unregister_algs(hdev);
2158
2159 crypto_engine_exit(hdev->engine);
2160
2161 spin_lock(&stm32_hash.lock);
2162 list_del(&hdev->list);
2163 spin_unlock(&stm32_hash.lock);
2164
2165 if (hdev->dma_lch)
2166 dma_release_channel(hdev->dma_lch);
2167
2168 pm_runtime_disable(hdev->dev);
2169 pm_runtime_put_noidle(hdev->dev);
2170
2171 if (ret >= 0)
2172 clk_disable_unprepare(hdev->clk);
2173}
2174
2175#ifdef CONFIG_PM
2176static int stm32_hash_runtime_suspend(struct device *dev)
2177{
2178 struct stm32_hash_dev *hdev = dev_get_drvdata(dev);
2179
2180 clk_disable_unprepare(hdev->clk);
2181
2182 return 0;
2183}
2184
2185static int stm32_hash_runtime_resume(struct device *dev)
2186{
2187 struct stm32_hash_dev *hdev = dev_get_drvdata(dev);
2188 int ret;
2189
2190 ret = clk_prepare_enable(hdev->clk);
2191 if (ret) {
2192 dev_err(hdev->dev, "Failed to prepare_enable clock\n");
2193 return ret;
2194 }
2195
2196 return 0;
2197}
2198#endif
2199
2200static const struct dev_pm_ops stm32_hash_pm_ops = {
2201 SET_SYSTEM_SLEEP_PM_OPS(pm_runtime_force_suspend,
2202 pm_runtime_force_resume)
2203 SET_RUNTIME_PM_OPS(stm32_hash_runtime_suspend,
2204 stm32_hash_runtime_resume, NULL)
2205};
2206
2207static struct platform_driver stm32_hash_driver = {
2208 .probe = stm32_hash_probe,
2209 .remove_new = stm32_hash_remove,
2210 .driver = {
2211 .name = "stm32-hash",
2212 .pm = &stm32_hash_pm_ops,
2213 .of_match_table = stm32_hash_of_match,
2214 }
2215};
2216
2217module_platform_driver(stm32_hash_driver);
2218
2219MODULE_DESCRIPTION("STM32 SHA1/SHA2/SHA3 & MD5 (HMAC) hw accelerator driver");
2220MODULE_AUTHOR("Lionel Debieve <lionel.debieve@st.com>");
2221MODULE_LICENSE("GPL v2");
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * This file is part of STM32 Crypto driver for Linux.
4 *
5 * Copyright (C) 2017, STMicroelectronics - All Rights Reserved
6 * Author(s): Lionel DEBIEVE <lionel.debieve@st.com> for STMicroelectronics.
7 */
8
9#include <crypto/engine.h>
10#include <crypto/internal/hash.h>
11#include <crypto/md5.h>
12#include <crypto/scatterwalk.h>
13#include <crypto/sha1.h>
14#include <crypto/sha2.h>
15#include <crypto/sha3.h>
16#include <linux/clk.h>
17#include <linux/delay.h>
18#include <linux/dma-mapping.h>
19#include <linux/dmaengine.h>
20#include <linux/interrupt.h>
21#include <linux/iopoll.h>
22#include <linux/kernel.h>
23#include <linux/module.h>
24#include <linux/of.h>
25#include <linux/platform_device.h>
26#include <linux/pm_runtime.h>
27#include <linux/reset.h>
28#include <linux/string.h>
29
30#define HASH_CR 0x00
31#define HASH_DIN 0x04
32#define HASH_STR 0x08
33#define HASH_UX500_HREG(x) (0x0c + ((x) * 0x04))
34#define HASH_IMR 0x20
35#define HASH_SR 0x24
36#define HASH_CSR(x) (0x0F8 + ((x) * 0x04))
37#define HASH_HREG(x) (0x310 + ((x) * 0x04))
38#define HASH_HWCFGR 0x3F0
39#define HASH_VER 0x3F4
40#define HASH_ID 0x3F8
41
42/* Control Register */
43#define HASH_CR_INIT BIT(2)
44#define HASH_CR_DMAE BIT(3)
45#define HASH_CR_DATATYPE_POS 4
46#define HASH_CR_MODE BIT(6)
47#define HASH_CR_ALGO_POS 7
48#define HASH_CR_MDMAT BIT(13)
49#define HASH_CR_DMAA BIT(14)
50#define HASH_CR_LKEY BIT(16)
51
52/* Interrupt */
53#define HASH_DINIE BIT(0)
54#define HASH_DCIE BIT(1)
55
56/* Interrupt Mask */
57#define HASH_MASK_CALC_COMPLETION BIT(0)
58#define HASH_MASK_DATA_INPUT BIT(1)
59
60/* Status Flags */
61#define HASH_SR_DATA_INPUT_READY BIT(0)
62#define HASH_SR_OUTPUT_READY BIT(1)
63#define HASH_SR_DMA_ACTIVE BIT(2)
64#define HASH_SR_BUSY BIT(3)
65
66/* STR Register */
67#define HASH_STR_NBLW_MASK GENMASK(4, 0)
68#define HASH_STR_DCAL BIT(8)
69
70/* HWCFGR Register */
71#define HASH_HWCFG_DMA_MASK GENMASK(3, 0)
72
73/* Context swap register */
74#define HASH_CSR_NB_SHA256_HMAC 54
75#define HASH_CSR_NB_SHA256 38
76#define HASH_CSR_NB_SHA512_HMAC 103
77#define HASH_CSR_NB_SHA512 91
78#define HASH_CSR_NB_SHA3_HMAC 88
79#define HASH_CSR_NB_SHA3 72
80#define HASH_CSR_NB_MAX HASH_CSR_NB_SHA512_HMAC
81
82#define HASH_FLAGS_INIT BIT(0)
83#define HASH_FLAGS_OUTPUT_READY BIT(1)
84#define HASH_FLAGS_CPU BIT(2)
85#define HASH_FLAGS_DMA_ACTIVE BIT(3)
86#define HASH_FLAGS_HMAC_INIT BIT(4)
87#define HASH_FLAGS_HMAC_FINAL BIT(5)
88#define HASH_FLAGS_HMAC_KEY BIT(6)
89#define HASH_FLAGS_SHA3_MODE BIT(7)
90#define HASH_FLAGS_FINAL BIT(15)
91#define HASH_FLAGS_FINUP BIT(16)
92#define HASH_FLAGS_ALGO_MASK GENMASK(20, 17)
93#define HASH_FLAGS_ALGO_SHIFT 17
94#define HASH_FLAGS_ERRORS BIT(21)
95#define HASH_FLAGS_EMPTY BIT(22)
96#define HASH_FLAGS_HMAC BIT(23)
97#define HASH_FLAGS_SGS_COPIED BIT(24)
98
99#define HASH_OP_UPDATE 1
100#define HASH_OP_FINAL 2
101
102#define HASH_BURST_LEVEL 4
103
104enum stm32_hash_data_format {
105 HASH_DATA_32_BITS = 0x0,
106 HASH_DATA_16_BITS = 0x1,
107 HASH_DATA_8_BITS = 0x2,
108 HASH_DATA_1_BIT = 0x3
109};
110
111#define HASH_BUFLEN (SHA3_224_BLOCK_SIZE + 4)
112#define HASH_MAX_KEY_SIZE (SHA512_BLOCK_SIZE * 8)
113
114enum stm32_hash_algo {
115 HASH_SHA1 = 0,
116 HASH_MD5 = 1,
117 HASH_SHA224 = 2,
118 HASH_SHA256 = 3,
119 HASH_SHA3_224 = 4,
120 HASH_SHA3_256 = 5,
121 HASH_SHA3_384 = 6,
122 HASH_SHA3_512 = 7,
123 HASH_SHA384 = 12,
124 HASH_SHA512 = 15,
125};
126
127enum ux500_hash_algo {
128 HASH_SHA256_UX500 = 0,
129 HASH_SHA1_UX500 = 1,
130};
131
132#define HASH_AUTOSUSPEND_DELAY 50
133
134struct stm32_hash_ctx {
135 struct stm32_hash_dev *hdev;
136 struct crypto_shash *xtfm;
137 unsigned long flags;
138
139 u8 key[HASH_MAX_KEY_SIZE];
140 int keylen;
141};
142
143struct stm32_hash_state {
144 u32 flags;
145
146 u16 bufcnt;
147 u16 blocklen;
148
149 u8 buffer[HASH_BUFLEN] __aligned(sizeof(u32));
150
151 /* hash state */
152 u32 hw_context[3 + HASH_CSR_NB_MAX];
153};
154
155struct stm32_hash_request_ctx {
156 struct stm32_hash_dev *hdev;
157 unsigned long op;
158
159 u8 digest[SHA512_DIGEST_SIZE] __aligned(sizeof(u32));
160 size_t digcnt;
161
162 struct scatterlist *sg;
163 struct scatterlist sgl[2]; /* scatterlist used to realize alignment */
164 unsigned int offset;
165 unsigned int total;
166 struct scatterlist sg_key;
167
168 dma_addr_t dma_addr;
169 size_t dma_ct;
170 int nents;
171
172 u8 data_type;
173
174 struct stm32_hash_state state;
175};
176
177struct stm32_hash_algs_info {
178 struct ahash_engine_alg *algs_list;
179 size_t size;
180};
181
182struct stm32_hash_pdata {
183 const int alg_shift;
184 const struct stm32_hash_algs_info *algs_info;
185 size_t algs_info_size;
186 bool has_sr;
187 bool has_mdmat;
188 bool context_secured;
189 bool broken_emptymsg;
190 bool ux500;
191};
192
193struct stm32_hash_dev {
194 struct list_head list;
195 struct device *dev;
196 struct clk *clk;
197 struct reset_control *rst;
198 void __iomem *io_base;
199 phys_addr_t phys_base;
200 u8 xmit_buf[HASH_BUFLEN] __aligned(sizeof(u32));
201 u32 dma_mode;
202 bool polled;
203
204 struct ahash_request *req;
205 struct crypto_engine *engine;
206
207 unsigned long flags;
208
209 struct dma_chan *dma_lch;
210 struct completion dma_completion;
211
212 const struct stm32_hash_pdata *pdata;
213};
214
215struct stm32_hash_drv {
216 struct list_head dev_list;
217 spinlock_t lock; /* List protection access */
218};
219
220static struct stm32_hash_drv stm32_hash = {
221 .dev_list = LIST_HEAD_INIT(stm32_hash.dev_list),
222 .lock = __SPIN_LOCK_UNLOCKED(stm32_hash.lock),
223};
224
225static void stm32_hash_dma_callback(void *param);
226static int stm32_hash_prepare_request(struct ahash_request *req);
227static void stm32_hash_unprepare_request(struct ahash_request *req);
228
229static inline u32 stm32_hash_read(struct stm32_hash_dev *hdev, u32 offset)
230{
231 return readl_relaxed(hdev->io_base + offset);
232}
233
234static inline void stm32_hash_write(struct stm32_hash_dev *hdev,
235 u32 offset, u32 value)
236{
237 writel_relaxed(value, hdev->io_base + offset);
238}
239
240/**
241 * stm32_hash_wait_busy - wait until hash processor is available. It return an
242 * error if the hash core is processing a block of data for more than 10 ms.
243 * @hdev: the stm32_hash_dev device.
244 */
245static inline int stm32_hash_wait_busy(struct stm32_hash_dev *hdev)
246{
247 u32 status;
248
249 /* The Ux500 lacks the special status register, we poll the DCAL bit instead */
250 if (!hdev->pdata->has_sr)
251 return readl_relaxed_poll_timeout(hdev->io_base + HASH_STR, status,
252 !(status & HASH_STR_DCAL), 10, 10000);
253
254 return readl_relaxed_poll_timeout(hdev->io_base + HASH_SR, status,
255 !(status & HASH_SR_BUSY), 10, 10000);
256}
257
258/**
259 * stm32_hash_set_nblw - set the number of valid bytes in the last word.
260 * @hdev: the stm32_hash_dev device.
261 * @length: the length of the final word.
262 */
263static void stm32_hash_set_nblw(struct stm32_hash_dev *hdev, int length)
264{
265 u32 reg;
266
267 reg = stm32_hash_read(hdev, HASH_STR);
268 reg &= ~(HASH_STR_NBLW_MASK);
269 reg |= (8U * ((length) % 4U));
270 stm32_hash_write(hdev, HASH_STR, reg);
271}
272
273static int stm32_hash_write_key(struct stm32_hash_dev *hdev)
274{
275 struct crypto_ahash *tfm = crypto_ahash_reqtfm(hdev->req);
276 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
277 u32 reg;
278 int keylen = ctx->keylen;
279 void *key = ctx->key;
280
281 if (keylen) {
282 stm32_hash_set_nblw(hdev, keylen);
283
284 while (keylen > 0) {
285 stm32_hash_write(hdev, HASH_DIN, *(u32 *)key);
286 keylen -= 4;
287 key += 4;
288 }
289
290 reg = stm32_hash_read(hdev, HASH_STR);
291 reg |= HASH_STR_DCAL;
292 stm32_hash_write(hdev, HASH_STR, reg);
293
294 return -EINPROGRESS;
295 }
296
297 return 0;
298}
299
300/**
301 * stm32_hash_write_ctrl - Initialize the hash processor, only if
302 * HASH_FLAGS_INIT is set.
303 * @hdev: the stm32_hash_dev device
304 */
305static void stm32_hash_write_ctrl(struct stm32_hash_dev *hdev)
306{
307 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
308 struct crypto_ahash *tfm = crypto_ahash_reqtfm(hdev->req);
309 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
310 struct stm32_hash_state *state = &rctx->state;
311 u32 alg = (state->flags & HASH_FLAGS_ALGO_MASK) >> HASH_FLAGS_ALGO_SHIFT;
312
313 u32 reg = HASH_CR_INIT;
314
315 if (!(hdev->flags & HASH_FLAGS_INIT)) {
316 if (hdev->pdata->ux500) {
317 reg |= ((alg & BIT(0)) << HASH_CR_ALGO_POS);
318 } else {
319 if (hdev->pdata->alg_shift == HASH_CR_ALGO_POS)
320 reg |= ((alg & BIT(1)) << 17) |
321 ((alg & BIT(0)) << HASH_CR_ALGO_POS);
322 else
323 reg |= alg << hdev->pdata->alg_shift;
324 }
325
326 reg |= (rctx->data_type << HASH_CR_DATATYPE_POS);
327
328 if (state->flags & HASH_FLAGS_HMAC) {
329 hdev->flags |= HASH_FLAGS_HMAC;
330 reg |= HASH_CR_MODE;
331 if (ctx->keylen > crypto_ahash_blocksize(tfm))
332 reg |= HASH_CR_LKEY;
333 }
334
335 if (!hdev->polled)
336 stm32_hash_write(hdev, HASH_IMR, HASH_DCIE);
337
338 stm32_hash_write(hdev, HASH_CR, reg);
339
340 hdev->flags |= HASH_FLAGS_INIT;
341
342 /*
343 * After first block + 1 words are fill up,
344 * we only need to fill 1 block to start partial computation
345 */
346 rctx->state.blocklen -= sizeof(u32);
347
348 dev_dbg(hdev->dev, "Write Control %x\n", reg);
349 }
350}
351
352static void stm32_hash_append_sg(struct stm32_hash_request_ctx *rctx)
353{
354 struct stm32_hash_state *state = &rctx->state;
355 size_t count;
356
357 while ((state->bufcnt < state->blocklen) && rctx->total) {
358 count = min(rctx->sg->length - rctx->offset, rctx->total);
359 count = min_t(size_t, count, state->blocklen - state->bufcnt);
360
361 if (count <= 0) {
362 if ((rctx->sg->length == 0) && !sg_is_last(rctx->sg)) {
363 rctx->sg = sg_next(rctx->sg);
364 continue;
365 } else {
366 break;
367 }
368 }
369
370 scatterwalk_map_and_copy(state->buffer + state->bufcnt,
371 rctx->sg, rctx->offset, count, 0);
372
373 state->bufcnt += count;
374 rctx->offset += count;
375 rctx->total -= count;
376
377 if (rctx->offset == rctx->sg->length) {
378 rctx->sg = sg_next(rctx->sg);
379 if (rctx->sg)
380 rctx->offset = 0;
381 else
382 rctx->total = 0;
383 }
384 }
385}
386
387static int stm32_hash_xmit_cpu(struct stm32_hash_dev *hdev,
388 const u8 *buf, size_t length, int final)
389{
390 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
391 struct stm32_hash_state *state = &rctx->state;
392 unsigned int count, len32;
393 const u32 *buffer = (const u32 *)buf;
394 u32 reg;
395
396 if (final) {
397 hdev->flags |= HASH_FLAGS_FINAL;
398
399 /* Do not process empty messages if hw is buggy. */
400 if (!(hdev->flags & HASH_FLAGS_INIT) && !length &&
401 hdev->pdata->broken_emptymsg) {
402 state->flags |= HASH_FLAGS_EMPTY;
403 return 0;
404 }
405 }
406
407 len32 = DIV_ROUND_UP(length, sizeof(u32));
408
409 dev_dbg(hdev->dev, "%s: length: %zd, final: %x len32 %i\n",
410 __func__, length, final, len32);
411
412 hdev->flags |= HASH_FLAGS_CPU;
413
414 stm32_hash_write_ctrl(hdev);
415
416 if (stm32_hash_wait_busy(hdev))
417 return -ETIMEDOUT;
418
419 if ((hdev->flags & HASH_FLAGS_HMAC) &&
420 (!(hdev->flags & HASH_FLAGS_HMAC_KEY))) {
421 hdev->flags |= HASH_FLAGS_HMAC_KEY;
422 stm32_hash_write_key(hdev);
423 if (stm32_hash_wait_busy(hdev))
424 return -ETIMEDOUT;
425 }
426
427 for (count = 0; count < len32; count++)
428 stm32_hash_write(hdev, HASH_DIN, buffer[count]);
429
430 if (final) {
431 if (stm32_hash_wait_busy(hdev))
432 return -ETIMEDOUT;
433
434 stm32_hash_set_nblw(hdev, length);
435 reg = stm32_hash_read(hdev, HASH_STR);
436 reg |= HASH_STR_DCAL;
437 stm32_hash_write(hdev, HASH_STR, reg);
438 if (hdev->flags & HASH_FLAGS_HMAC) {
439 if (stm32_hash_wait_busy(hdev))
440 return -ETIMEDOUT;
441 stm32_hash_write_key(hdev);
442 }
443 return -EINPROGRESS;
444 }
445
446 return 0;
447}
448
449static int hash_swap_reg(struct stm32_hash_request_ctx *rctx)
450{
451 struct stm32_hash_state *state = &rctx->state;
452
453 switch ((state->flags & HASH_FLAGS_ALGO_MASK) >>
454 HASH_FLAGS_ALGO_SHIFT) {
455 case HASH_MD5:
456 case HASH_SHA1:
457 case HASH_SHA224:
458 case HASH_SHA256:
459 if (state->flags & HASH_FLAGS_HMAC)
460 return HASH_CSR_NB_SHA256_HMAC;
461 else
462 return HASH_CSR_NB_SHA256;
463 break;
464
465 case HASH_SHA384:
466 case HASH_SHA512:
467 if (state->flags & HASH_FLAGS_HMAC)
468 return HASH_CSR_NB_SHA512_HMAC;
469 else
470 return HASH_CSR_NB_SHA512;
471 break;
472
473 case HASH_SHA3_224:
474 case HASH_SHA3_256:
475 case HASH_SHA3_384:
476 case HASH_SHA3_512:
477 if (state->flags & HASH_FLAGS_HMAC)
478 return HASH_CSR_NB_SHA3_HMAC;
479 else
480 return HASH_CSR_NB_SHA3;
481 break;
482
483 default:
484 return -EINVAL;
485 }
486}
487
488static int stm32_hash_update_cpu(struct stm32_hash_dev *hdev)
489{
490 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
491 struct stm32_hash_state *state = &rctx->state;
492 int bufcnt, err = 0, final;
493
494 dev_dbg(hdev->dev, "%s flags %x\n", __func__, state->flags);
495
496 final = state->flags & HASH_FLAGS_FINAL;
497
498 while ((rctx->total >= state->blocklen) ||
499 (state->bufcnt + rctx->total >= state->blocklen)) {
500 stm32_hash_append_sg(rctx);
501 bufcnt = state->bufcnt;
502 state->bufcnt = 0;
503 err = stm32_hash_xmit_cpu(hdev, state->buffer, bufcnt, 0);
504 if (err)
505 return err;
506 }
507
508 stm32_hash_append_sg(rctx);
509
510 if (final) {
511 bufcnt = state->bufcnt;
512 state->bufcnt = 0;
513 return stm32_hash_xmit_cpu(hdev, state->buffer, bufcnt, 1);
514 }
515
516 return err;
517}
518
519static int stm32_hash_xmit_dma(struct stm32_hash_dev *hdev,
520 struct scatterlist *sg, int length, int mdmat)
521{
522 struct dma_async_tx_descriptor *in_desc;
523 dma_cookie_t cookie;
524 u32 reg;
525 int err;
526
527 dev_dbg(hdev->dev, "%s mdmat: %x length: %d\n", __func__, mdmat, length);
528
529 /* do not use dma if there is no data to send */
530 if (length <= 0)
531 return 0;
532
533 in_desc = dmaengine_prep_slave_sg(hdev->dma_lch, sg, 1,
534 DMA_MEM_TO_DEV, DMA_PREP_INTERRUPT |
535 DMA_CTRL_ACK);
536 if (!in_desc) {
537 dev_err(hdev->dev, "dmaengine_prep_slave error\n");
538 return -ENOMEM;
539 }
540
541 reinit_completion(&hdev->dma_completion);
542 in_desc->callback = stm32_hash_dma_callback;
543 in_desc->callback_param = hdev;
544
545 hdev->flags |= HASH_FLAGS_DMA_ACTIVE;
546
547 reg = stm32_hash_read(hdev, HASH_CR);
548
549 if (hdev->pdata->has_mdmat) {
550 if (mdmat)
551 reg |= HASH_CR_MDMAT;
552 else
553 reg &= ~HASH_CR_MDMAT;
554 }
555 reg |= HASH_CR_DMAE;
556
557 stm32_hash_write(hdev, HASH_CR, reg);
558
559
560 cookie = dmaengine_submit(in_desc);
561 err = dma_submit_error(cookie);
562 if (err)
563 return -ENOMEM;
564
565 dma_async_issue_pending(hdev->dma_lch);
566
567 if (!wait_for_completion_timeout(&hdev->dma_completion,
568 msecs_to_jiffies(100)))
569 err = -ETIMEDOUT;
570
571 if (dma_async_is_tx_complete(hdev->dma_lch, cookie,
572 NULL, NULL) != DMA_COMPLETE)
573 err = -ETIMEDOUT;
574
575 if (err) {
576 dev_err(hdev->dev, "DMA Error %i\n", err);
577 dmaengine_terminate_all(hdev->dma_lch);
578 return err;
579 }
580
581 return -EINPROGRESS;
582}
583
584static void stm32_hash_dma_callback(void *param)
585{
586 struct stm32_hash_dev *hdev = param;
587
588 complete(&hdev->dma_completion);
589}
590
591static int stm32_hash_hmac_dma_send(struct stm32_hash_dev *hdev)
592{
593 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
594 struct crypto_ahash *tfm = crypto_ahash_reqtfm(hdev->req);
595 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
596 int err;
597
598 if (ctx->keylen < rctx->state.blocklen || hdev->dma_mode > 0) {
599 err = stm32_hash_write_key(hdev);
600 if (stm32_hash_wait_busy(hdev))
601 return -ETIMEDOUT;
602 } else {
603 if (!(hdev->flags & HASH_FLAGS_HMAC_KEY))
604 sg_init_one(&rctx->sg_key, ctx->key,
605 ALIGN(ctx->keylen, sizeof(u32)));
606
607 rctx->dma_ct = dma_map_sg(hdev->dev, &rctx->sg_key, 1,
608 DMA_TO_DEVICE);
609 if (rctx->dma_ct == 0) {
610 dev_err(hdev->dev, "dma_map_sg error\n");
611 return -ENOMEM;
612 }
613
614 err = stm32_hash_xmit_dma(hdev, &rctx->sg_key, ctx->keylen, 0);
615
616 dma_unmap_sg(hdev->dev, &rctx->sg_key, 1, DMA_TO_DEVICE);
617 }
618
619 return err;
620}
621
622static int stm32_hash_dma_init(struct stm32_hash_dev *hdev)
623{
624 struct dma_slave_config dma_conf;
625 struct dma_chan *chan;
626 int err;
627
628 memset(&dma_conf, 0, sizeof(dma_conf));
629
630 dma_conf.direction = DMA_MEM_TO_DEV;
631 dma_conf.dst_addr = hdev->phys_base + HASH_DIN;
632 dma_conf.dst_addr_width = DMA_SLAVE_BUSWIDTH_4_BYTES;
633 dma_conf.src_maxburst = HASH_BURST_LEVEL;
634 dma_conf.dst_maxburst = HASH_BURST_LEVEL;
635 dma_conf.device_fc = false;
636
637 chan = dma_request_chan(hdev->dev, "in");
638 if (IS_ERR(chan))
639 return PTR_ERR(chan);
640
641 hdev->dma_lch = chan;
642
643 err = dmaengine_slave_config(hdev->dma_lch, &dma_conf);
644 if (err) {
645 dma_release_channel(hdev->dma_lch);
646 hdev->dma_lch = NULL;
647 dev_err(hdev->dev, "Couldn't configure DMA slave.\n");
648 return err;
649 }
650
651 init_completion(&hdev->dma_completion);
652
653 return 0;
654}
655
656static int stm32_hash_dma_send(struct stm32_hash_dev *hdev)
657{
658 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
659 u32 *buffer = (void *)rctx->state.buffer;
660 struct scatterlist sg[1], *tsg;
661 int err = 0, reg, ncp = 0;
662 unsigned int i, len = 0, bufcnt = 0;
663 bool final = hdev->flags & HASH_FLAGS_FINAL;
664 bool is_last = false;
665 u32 last_word;
666
667 dev_dbg(hdev->dev, "%s total: %d bufcnt: %d final: %d\n",
668 __func__, rctx->total, rctx->state.bufcnt, final);
669
670 if (rctx->nents < 0)
671 return -EINVAL;
672
673 stm32_hash_write_ctrl(hdev);
674
675 if (hdev->flags & HASH_FLAGS_HMAC && (!(hdev->flags & HASH_FLAGS_HMAC_KEY))) {
676 hdev->flags |= HASH_FLAGS_HMAC_KEY;
677 err = stm32_hash_hmac_dma_send(hdev);
678 if (err != -EINPROGRESS)
679 return err;
680 }
681
682 for_each_sg(rctx->sg, tsg, rctx->nents, i) {
683 sg[0] = *tsg;
684 len = sg->length;
685
686 if (sg_is_last(sg) || (bufcnt + sg[0].length) >= rctx->total) {
687 if (!final) {
688 /* Always manually put the last word of a non-final transfer. */
689 len -= sizeof(u32);
690 sg_pcopy_to_buffer(rctx->sg, rctx->nents, &last_word, 4, len);
691 sg->length -= sizeof(u32);
692 } else {
693 /*
694 * In Multiple DMA mode, DMA must be aborted before the final
695 * transfer.
696 */
697 sg->length = rctx->total - bufcnt;
698 if (hdev->dma_mode > 0) {
699 len = (ALIGN(sg->length, 16) - 16);
700
701 ncp = sg_pcopy_to_buffer(rctx->sg, rctx->nents,
702 rctx->state.buffer,
703 sg->length - len,
704 rctx->total - sg->length + len);
705
706 if (!len)
707 break;
708
709 sg->length = len;
710 } else {
711 is_last = true;
712 if (!(IS_ALIGNED(sg->length, sizeof(u32)))) {
713 len = sg->length;
714 sg->length = ALIGN(sg->length,
715 sizeof(u32));
716 }
717 }
718 }
719 }
720
721 rctx->dma_ct = dma_map_sg(hdev->dev, sg, 1,
722 DMA_TO_DEVICE);
723 if (rctx->dma_ct == 0) {
724 dev_err(hdev->dev, "dma_map_sg error\n");
725 return -ENOMEM;
726 }
727
728 err = stm32_hash_xmit_dma(hdev, sg, len, !is_last);
729
730 /* The last word of a non final transfer is sent manually. */
731 if (!final) {
732 stm32_hash_write(hdev, HASH_DIN, last_word);
733 len += sizeof(u32);
734 }
735
736 rctx->total -= len;
737
738 bufcnt += sg[0].length;
739 dma_unmap_sg(hdev->dev, sg, 1, DMA_TO_DEVICE);
740
741 if (err == -ENOMEM || err == -ETIMEDOUT)
742 return err;
743 if (is_last)
744 break;
745 }
746
747 /*
748 * When the second last block transfer of 4 words is performed by the DMA,
749 * the software must set the DMA Abort bit (DMAA) to 1 before completing the
750 * last transfer of 4 words or less.
751 */
752 if (final) {
753 if (hdev->dma_mode > 0) {
754 if (stm32_hash_wait_busy(hdev))
755 return -ETIMEDOUT;
756 reg = stm32_hash_read(hdev, HASH_CR);
757 reg &= ~HASH_CR_DMAE;
758 reg |= HASH_CR_DMAA;
759 stm32_hash_write(hdev, HASH_CR, reg);
760
761 if (ncp) {
762 memset(buffer + ncp, 0, 4 - DIV_ROUND_UP(ncp, sizeof(u32)));
763 writesl(hdev->io_base + HASH_DIN, buffer,
764 DIV_ROUND_UP(ncp, sizeof(u32)));
765 }
766
767 stm32_hash_set_nblw(hdev, ncp);
768 reg = stm32_hash_read(hdev, HASH_STR);
769 reg |= HASH_STR_DCAL;
770 stm32_hash_write(hdev, HASH_STR, reg);
771 err = -EINPROGRESS;
772 }
773
774 /*
775 * The hash processor needs the key to be loaded a second time in order
776 * to process the HMAC.
777 */
778 if (hdev->flags & HASH_FLAGS_HMAC) {
779 if (stm32_hash_wait_busy(hdev))
780 return -ETIMEDOUT;
781 err = stm32_hash_hmac_dma_send(hdev);
782 }
783
784 return err;
785 }
786
787 if (err != -EINPROGRESS)
788 return err;
789
790 return 0;
791}
792
793static struct stm32_hash_dev *stm32_hash_find_dev(struct stm32_hash_ctx *ctx)
794{
795 struct stm32_hash_dev *hdev = NULL, *tmp;
796
797 spin_lock_bh(&stm32_hash.lock);
798 if (!ctx->hdev) {
799 list_for_each_entry(tmp, &stm32_hash.dev_list, list) {
800 hdev = tmp;
801 break;
802 }
803 ctx->hdev = hdev;
804 } else {
805 hdev = ctx->hdev;
806 }
807
808 spin_unlock_bh(&stm32_hash.lock);
809
810 return hdev;
811}
812
813static int stm32_hash_init(struct ahash_request *req)
814{
815 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
816 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
817 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
818 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
819 struct stm32_hash_state *state = &rctx->state;
820 bool sha3_mode = ctx->flags & HASH_FLAGS_SHA3_MODE;
821
822 rctx->hdev = hdev;
823 state->flags = 0;
824
825 if (!(hdev->dma_lch && hdev->pdata->has_mdmat))
826 state->flags |= HASH_FLAGS_CPU;
827
828 if (sha3_mode)
829 state->flags |= HASH_FLAGS_SHA3_MODE;
830
831 rctx->digcnt = crypto_ahash_digestsize(tfm);
832 switch (rctx->digcnt) {
833 case MD5_DIGEST_SIZE:
834 state->flags |= HASH_MD5 << HASH_FLAGS_ALGO_SHIFT;
835 break;
836 case SHA1_DIGEST_SIZE:
837 if (hdev->pdata->ux500)
838 state->flags |= HASH_SHA1_UX500 << HASH_FLAGS_ALGO_SHIFT;
839 else
840 state->flags |= HASH_SHA1 << HASH_FLAGS_ALGO_SHIFT;
841 break;
842 case SHA224_DIGEST_SIZE:
843 if (sha3_mode)
844 state->flags |= HASH_SHA3_224 << HASH_FLAGS_ALGO_SHIFT;
845 else
846 state->flags |= HASH_SHA224 << HASH_FLAGS_ALGO_SHIFT;
847 break;
848 case SHA256_DIGEST_SIZE:
849 if (sha3_mode) {
850 state->flags |= HASH_SHA3_256 << HASH_FLAGS_ALGO_SHIFT;
851 } else {
852 if (hdev->pdata->ux500)
853 state->flags |= HASH_SHA256_UX500 << HASH_FLAGS_ALGO_SHIFT;
854 else
855 state->flags |= HASH_SHA256 << HASH_FLAGS_ALGO_SHIFT;
856 }
857 break;
858 case SHA384_DIGEST_SIZE:
859 if (sha3_mode)
860 state->flags |= HASH_SHA3_384 << HASH_FLAGS_ALGO_SHIFT;
861 else
862 state->flags |= HASH_SHA384 << HASH_FLAGS_ALGO_SHIFT;
863 break;
864 case SHA512_DIGEST_SIZE:
865 if (sha3_mode)
866 state->flags |= HASH_SHA3_512 << HASH_FLAGS_ALGO_SHIFT;
867 else
868 state->flags |= HASH_SHA512 << HASH_FLAGS_ALGO_SHIFT;
869 break;
870 default:
871 return -EINVAL;
872 }
873
874 rctx->state.bufcnt = 0;
875 rctx->state.blocklen = crypto_ahash_blocksize(tfm) + sizeof(u32);
876 if (rctx->state.blocklen > HASH_BUFLEN) {
877 dev_err(hdev->dev, "Error, block too large");
878 return -EINVAL;
879 }
880 rctx->nents = 0;
881 rctx->total = 0;
882 rctx->offset = 0;
883 rctx->data_type = HASH_DATA_8_BITS;
884
885 if (ctx->flags & HASH_FLAGS_HMAC)
886 state->flags |= HASH_FLAGS_HMAC;
887
888 dev_dbg(hdev->dev, "%s Flags %x\n", __func__, state->flags);
889
890 return 0;
891}
892
893static int stm32_hash_update_req(struct stm32_hash_dev *hdev)
894{
895 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(hdev->req);
896 struct stm32_hash_state *state = &rctx->state;
897
898 dev_dbg(hdev->dev, "update_req: total: %u, digcnt: %zd, final: 0",
899 rctx->total, rctx->digcnt);
900
901 if (!(state->flags & HASH_FLAGS_CPU))
902 return stm32_hash_dma_send(hdev);
903
904 return stm32_hash_update_cpu(hdev);
905}
906
907static int stm32_hash_final_req(struct stm32_hash_dev *hdev)
908{
909 struct ahash_request *req = hdev->req;
910 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
911 struct stm32_hash_state *state = &rctx->state;
912 int buflen = state->bufcnt;
913
914 if (!(state->flags & HASH_FLAGS_CPU)) {
915 hdev->flags |= HASH_FLAGS_FINAL;
916 return stm32_hash_dma_send(hdev);
917 }
918
919 if (state->flags & HASH_FLAGS_FINUP)
920 return stm32_hash_update_req(hdev);
921
922 state->bufcnt = 0;
923
924 return stm32_hash_xmit_cpu(hdev, state->buffer, buflen, 1);
925}
926
927static void stm32_hash_emptymsg_fallback(struct ahash_request *req)
928{
929 struct crypto_ahash *ahash = crypto_ahash_reqtfm(req);
930 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(ahash);
931 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
932 struct stm32_hash_dev *hdev = rctx->hdev;
933 int ret;
934
935 dev_dbg(hdev->dev, "use fallback message size 0 key size %d\n",
936 ctx->keylen);
937
938 if (!ctx->xtfm) {
939 dev_err(hdev->dev, "no fallback engine\n");
940 return;
941 }
942
943 if (ctx->keylen) {
944 ret = crypto_shash_setkey(ctx->xtfm, ctx->key, ctx->keylen);
945 if (ret) {
946 dev_err(hdev->dev, "failed to set key ret=%d\n", ret);
947 return;
948 }
949 }
950
951 ret = crypto_shash_tfm_digest(ctx->xtfm, NULL, 0, rctx->digest);
952 if (ret)
953 dev_err(hdev->dev, "shash digest error\n");
954}
955
956static void stm32_hash_copy_hash(struct ahash_request *req)
957{
958 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
959 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
960 struct stm32_hash_state *state = &rctx->state;
961 struct stm32_hash_dev *hdev = rctx->hdev;
962 __be32 *hash = (void *)rctx->digest;
963 unsigned int i, hashsize;
964
965 if (hdev->pdata->broken_emptymsg && (state->flags & HASH_FLAGS_EMPTY))
966 return stm32_hash_emptymsg_fallback(req);
967
968 hashsize = crypto_ahash_digestsize(tfm);
969
970 for (i = 0; i < hashsize / sizeof(u32); i++) {
971 if (hdev->pdata->ux500)
972 hash[i] = cpu_to_be32(stm32_hash_read(hdev,
973 HASH_UX500_HREG(i)));
974 else
975 hash[i] = cpu_to_be32(stm32_hash_read(hdev,
976 HASH_HREG(i)));
977 }
978}
979
980static int stm32_hash_finish(struct ahash_request *req)
981{
982 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
983 u32 reg;
984
985 reg = stm32_hash_read(rctx->hdev, HASH_SR);
986 reg &= ~HASH_SR_OUTPUT_READY;
987 stm32_hash_write(rctx->hdev, HASH_SR, reg);
988
989 if (!req->result)
990 return -EINVAL;
991
992 memcpy(req->result, rctx->digest, rctx->digcnt);
993
994 return 0;
995}
996
997static void stm32_hash_finish_req(struct ahash_request *req, int err)
998{
999 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1000 struct stm32_hash_state *state = &rctx->state;
1001 struct stm32_hash_dev *hdev = rctx->hdev;
1002
1003 if (hdev->flags & HASH_FLAGS_DMA_ACTIVE)
1004 state->flags |= HASH_FLAGS_DMA_ACTIVE;
1005 else
1006 state->flags &= ~HASH_FLAGS_DMA_ACTIVE;
1007
1008 if (!err && (HASH_FLAGS_FINAL & hdev->flags)) {
1009 stm32_hash_copy_hash(req);
1010 err = stm32_hash_finish(req);
1011 }
1012
1013 /* Finalized request mist be unprepared here */
1014 stm32_hash_unprepare_request(req);
1015
1016 crypto_finalize_hash_request(hdev->engine, req, err);
1017}
1018
1019static int stm32_hash_handle_queue(struct stm32_hash_dev *hdev,
1020 struct ahash_request *req)
1021{
1022 return crypto_transfer_hash_request_to_engine(hdev->engine, req);
1023}
1024
1025static int stm32_hash_one_request(struct crypto_engine *engine, void *areq)
1026{
1027 struct ahash_request *req = container_of(areq, struct ahash_request,
1028 base);
1029 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(crypto_ahash_reqtfm(req));
1030 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1031 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
1032 struct stm32_hash_state *state = &rctx->state;
1033 int swap_reg;
1034 int err = 0;
1035
1036 if (!hdev)
1037 return -ENODEV;
1038
1039 dev_dbg(hdev->dev, "processing new req, op: %lu, nbytes %d\n",
1040 rctx->op, req->nbytes);
1041
1042 pm_runtime_get_sync(hdev->dev);
1043
1044 err = stm32_hash_prepare_request(req);
1045 if (err)
1046 return err;
1047
1048 hdev->req = req;
1049 hdev->flags = 0;
1050 swap_reg = hash_swap_reg(rctx);
1051
1052 if (state->flags & HASH_FLAGS_INIT) {
1053 u32 *preg = rctx->state.hw_context;
1054 u32 reg;
1055 int i;
1056
1057 if (!hdev->pdata->ux500)
1058 stm32_hash_write(hdev, HASH_IMR, *preg++);
1059 stm32_hash_write(hdev, HASH_STR, *preg++);
1060 stm32_hash_write(hdev, HASH_CR, *preg);
1061 reg = *preg++ | HASH_CR_INIT;
1062 stm32_hash_write(hdev, HASH_CR, reg);
1063
1064 for (i = 0; i < swap_reg; i++)
1065 stm32_hash_write(hdev, HASH_CSR(i), *preg++);
1066
1067 hdev->flags |= HASH_FLAGS_INIT;
1068
1069 if (state->flags & HASH_FLAGS_HMAC)
1070 hdev->flags |= HASH_FLAGS_HMAC |
1071 HASH_FLAGS_HMAC_KEY;
1072
1073 if (state->flags & HASH_FLAGS_CPU)
1074 hdev->flags |= HASH_FLAGS_CPU;
1075
1076 if (state->flags & HASH_FLAGS_DMA_ACTIVE)
1077 hdev->flags |= HASH_FLAGS_DMA_ACTIVE;
1078 }
1079
1080 if (rctx->op == HASH_OP_UPDATE)
1081 err = stm32_hash_update_req(hdev);
1082 else if (rctx->op == HASH_OP_FINAL)
1083 err = stm32_hash_final_req(hdev);
1084
1085 /* If we have an IRQ, wait for that, else poll for completion */
1086 if (err == -EINPROGRESS && hdev->polled) {
1087 if (stm32_hash_wait_busy(hdev))
1088 err = -ETIMEDOUT;
1089 else {
1090 hdev->flags |= HASH_FLAGS_OUTPUT_READY;
1091 err = 0;
1092 }
1093 }
1094
1095 if (err != -EINPROGRESS)
1096 /* done task will not finish it, so do it here */
1097 stm32_hash_finish_req(req, err);
1098
1099 return 0;
1100}
1101
1102static int stm32_hash_copy_sgs(struct stm32_hash_request_ctx *rctx,
1103 struct scatterlist *sg, int bs,
1104 unsigned int new_len)
1105{
1106 struct stm32_hash_state *state = &rctx->state;
1107 int pages;
1108 void *buf;
1109
1110 pages = get_order(new_len);
1111
1112 buf = (void *)__get_free_pages(GFP_ATOMIC, pages);
1113 if (!buf) {
1114 pr_err("Couldn't allocate pages for unaligned cases.\n");
1115 return -ENOMEM;
1116 }
1117
1118 if (state->bufcnt)
1119 memcpy(buf, rctx->hdev->xmit_buf, state->bufcnt);
1120
1121 scatterwalk_map_and_copy(buf + state->bufcnt, sg, rctx->offset,
1122 min(new_len, rctx->total) - state->bufcnt, 0);
1123 sg_init_table(rctx->sgl, 1);
1124 sg_set_buf(rctx->sgl, buf, new_len);
1125 rctx->sg = rctx->sgl;
1126 state->flags |= HASH_FLAGS_SGS_COPIED;
1127 rctx->nents = 1;
1128 rctx->offset += new_len - state->bufcnt;
1129 state->bufcnt = 0;
1130 rctx->total = new_len;
1131
1132 return 0;
1133}
1134
1135static int stm32_hash_align_sgs(struct scatterlist *sg,
1136 int nbytes, int bs, bool init, bool final,
1137 struct stm32_hash_request_ctx *rctx)
1138{
1139 struct stm32_hash_state *state = &rctx->state;
1140 struct stm32_hash_dev *hdev = rctx->hdev;
1141 struct scatterlist *sg_tmp = sg;
1142 int offset = rctx->offset;
1143 int new_len;
1144 int n = 0;
1145 int bufcnt = state->bufcnt;
1146 bool secure_ctx = hdev->pdata->context_secured;
1147 bool aligned = true;
1148
1149 if (!sg || !sg->length || !nbytes) {
1150 if (bufcnt) {
1151 bufcnt = DIV_ROUND_UP(bufcnt, bs) * bs;
1152 sg_init_table(rctx->sgl, 1);
1153 sg_set_buf(rctx->sgl, rctx->hdev->xmit_buf, bufcnt);
1154 rctx->sg = rctx->sgl;
1155 rctx->nents = 1;
1156 }
1157
1158 return 0;
1159 }
1160
1161 new_len = nbytes;
1162
1163 if (offset)
1164 aligned = false;
1165
1166 if (final) {
1167 new_len = DIV_ROUND_UP(new_len, bs) * bs;
1168 } else {
1169 new_len = (new_len - 1) / bs * bs; // return n block - 1 block
1170
1171 /*
1172 * Context save in some version of HASH IP can only be done when the
1173 * FIFO is ready to get a new block. This implies to send n block plus a
1174 * 32 bit word in the first DMA send.
1175 */
1176 if (init && secure_ctx) {
1177 new_len += sizeof(u32);
1178 if (unlikely(new_len > nbytes))
1179 new_len -= bs;
1180 }
1181 }
1182
1183 if (!new_len)
1184 return 0;
1185
1186 if (nbytes != new_len)
1187 aligned = false;
1188
1189 while (nbytes > 0 && sg_tmp) {
1190 n++;
1191
1192 if (bufcnt) {
1193 if (!IS_ALIGNED(bufcnt, bs)) {
1194 aligned = false;
1195 break;
1196 }
1197 nbytes -= bufcnt;
1198 bufcnt = 0;
1199 if (!nbytes)
1200 aligned = false;
1201
1202 continue;
1203 }
1204
1205 if (offset < sg_tmp->length) {
1206 if (!IS_ALIGNED(offset + sg_tmp->offset, 4)) {
1207 aligned = false;
1208 break;
1209 }
1210
1211 if (!IS_ALIGNED(sg_tmp->length - offset, bs)) {
1212 aligned = false;
1213 break;
1214 }
1215 }
1216
1217 if (offset) {
1218 offset -= sg_tmp->length;
1219 if (offset < 0) {
1220 nbytes += offset;
1221 offset = 0;
1222 }
1223 } else {
1224 nbytes -= sg_tmp->length;
1225 }
1226
1227 sg_tmp = sg_next(sg_tmp);
1228
1229 if (nbytes < 0) {
1230 aligned = false;
1231 break;
1232 }
1233 }
1234
1235 if (!aligned)
1236 return stm32_hash_copy_sgs(rctx, sg, bs, new_len);
1237
1238 rctx->total = new_len;
1239 rctx->offset += new_len;
1240 rctx->nents = n;
1241 if (state->bufcnt) {
1242 sg_init_table(rctx->sgl, 2);
1243 sg_set_buf(rctx->sgl, rctx->hdev->xmit_buf, state->bufcnt);
1244 sg_chain(rctx->sgl, 2, sg);
1245 rctx->sg = rctx->sgl;
1246 } else {
1247 rctx->sg = sg;
1248 }
1249
1250 return 0;
1251}
1252
1253static int stm32_hash_prepare_request(struct ahash_request *req)
1254{
1255 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
1256 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
1257 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1258 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
1259 struct stm32_hash_state *state = &rctx->state;
1260 unsigned int nbytes;
1261 int ret, hash_later, bs;
1262 bool update = rctx->op & HASH_OP_UPDATE;
1263 bool init = !(state->flags & HASH_FLAGS_INIT);
1264 bool finup = state->flags & HASH_FLAGS_FINUP;
1265 bool final = state->flags & HASH_FLAGS_FINAL;
1266
1267 if (!hdev->dma_lch || state->flags & HASH_FLAGS_CPU)
1268 return 0;
1269
1270 bs = crypto_ahash_blocksize(tfm);
1271
1272 nbytes = state->bufcnt;
1273
1274 /*
1275 * In case of update request nbytes must correspond to the content of the
1276 * buffer + the offset minus the content of the request already in the
1277 * buffer.
1278 */
1279 if (update || finup)
1280 nbytes += req->nbytes - rctx->offset;
1281
1282 dev_dbg(hdev->dev,
1283 "%s: nbytes=%d, bs=%d, total=%d, offset=%d, bufcnt=%d\n",
1284 __func__, nbytes, bs, rctx->total, rctx->offset, state->bufcnt);
1285
1286 if (!nbytes)
1287 return 0;
1288
1289 rctx->total = nbytes;
1290
1291 if (update && req->nbytes && (!IS_ALIGNED(state->bufcnt, bs))) {
1292 int len = bs - state->bufcnt % bs;
1293
1294 if (len > req->nbytes)
1295 len = req->nbytes;
1296 scatterwalk_map_and_copy(state->buffer + state->bufcnt, req->src,
1297 0, len, 0);
1298 state->bufcnt += len;
1299 rctx->offset = len;
1300 }
1301
1302 /* copy buffer in a temporary one that is used for sg alignment */
1303 if (state->bufcnt)
1304 memcpy(hdev->xmit_buf, state->buffer, state->bufcnt);
1305
1306 ret = stm32_hash_align_sgs(req->src, nbytes, bs, init, final, rctx);
1307 if (ret)
1308 return ret;
1309
1310 hash_later = nbytes - rctx->total;
1311 if (hash_later < 0)
1312 hash_later = 0;
1313
1314 if (hash_later && hash_later <= state->blocklen) {
1315 scatterwalk_map_and_copy(state->buffer,
1316 req->src,
1317 req->nbytes - hash_later,
1318 hash_later, 0);
1319
1320 state->bufcnt = hash_later;
1321 } else {
1322 state->bufcnt = 0;
1323 }
1324
1325 if (hash_later > state->blocklen) {
1326 /* FIXME: add support of this case */
1327 pr_err("Buffer contains more than one block.\n");
1328 return -ENOMEM;
1329 }
1330
1331 rctx->total = min(nbytes, rctx->total);
1332
1333 return 0;
1334}
1335
1336static void stm32_hash_unprepare_request(struct ahash_request *req)
1337{
1338 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1339 struct stm32_hash_state *state = &rctx->state;
1340 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(crypto_ahash_reqtfm(req));
1341 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
1342 u32 *preg = state->hw_context;
1343 int swap_reg, i;
1344
1345 if (hdev->dma_lch)
1346 dmaengine_terminate_sync(hdev->dma_lch);
1347
1348 if (state->flags & HASH_FLAGS_SGS_COPIED)
1349 free_pages((unsigned long)sg_virt(rctx->sg), get_order(rctx->sg->length));
1350
1351 rctx->sg = NULL;
1352 rctx->offset = 0;
1353
1354 state->flags &= ~(HASH_FLAGS_SGS_COPIED);
1355
1356 if (!(hdev->flags & HASH_FLAGS_INIT))
1357 goto pm_runtime;
1358
1359 state->flags |= HASH_FLAGS_INIT;
1360
1361 if (stm32_hash_wait_busy(hdev)) {
1362 dev_warn(hdev->dev, "Wait busy failed.");
1363 return;
1364 }
1365
1366 swap_reg = hash_swap_reg(rctx);
1367
1368 if (!hdev->pdata->ux500)
1369 *preg++ = stm32_hash_read(hdev, HASH_IMR);
1370 *preg++ = stm32_hash_read(hdev, HASH_STR);
1371 *preg++ = stm32_hash_read(hdev, HASH_CR);
1372 for (i = 0; i < swap_reg; i++)
1373 *preg++ = stm32_hash_read(hdev, HASH_CSR(i));
1374
1375pm_runtime:
1376 pm_runtime_mark_last_busy(hdev->dev);
1377 pm_runtime_put_autosuspend(hdev->dev);
1378}
1379
1380static int stm32_hash_enqueue(struct ahash_request *req, unsigned int op)
1381{
1382 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1383 struct stm32_hash_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
1384 struct stm32_hash_dev *hdev = ctx->hdev;
1385
1386 rctx->op = op;
1387
1388 return stm32_hash_handle_queue(hdev, req);
1389}
1390
1391static int stm32_hash_update(struct ahash_request *req)
1392{
1393 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1394 struct stm32_hash_state *state = &rctx->state;
1395
1396 if (!req->nbytes)
1397 return 0;
1398
1399
1400 if (state->flags & HASH_FLAGS_CPU) {
1401 rctx->total = req->nbytes;
1402 rctx->sg = req->src;
1403 rctx->offset = 0;
1404
1405 if ((state->bufcnt + rctx->total < state->blocklen)) {
1406 stm32_hash_append_sg(rctx);
1407 return 0;
1408 }
1409 } else { /* DMA mode */
1410 if (state->bufcnt + req->nbytes <= state->blocklen) {
1411 scatterwalk_map_and_copy(state->buffer + state->bufcnt, req->src,
1412 0, req->nbytes, 0);
1413 state->bufcnt += req->nbytes;
1414 return 0;
1415 }
1416 }
1417
1418 return stm32_hash_enqueue(req, HASH_OP_UPDATE);
1419}
1420
1421static int stm32_hash_final(struct ahash_request *req)
1422{
1423 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1424 struct stm32_hash_state *state = &rctx->state;
1425
1426 state->flags |= HASH_FLAGS_FINAL;
1427
1428 return stm32_hash_enqueue(req, HASH_OP_FINAL);
1429}
1430
1431static int stm32_hash_finup(struct ahash_request *req)
1432{
1433 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1434 struct stm32_hash_state *state = &rctx->state;
1435
1436 if (!req->nbytes)
1437 goto out;
1438
1439 state->flags |= HASH_FLAGS_FINUP;
1440
1441 if ((state->flags & HASH_FLAGS_CPU)) {
1442 rctx->total = req->nbytes;
1443 rctx->sg = req->src;
1444 rctx->offset = 0;
1445 }
1446
1447out:
1448 return stm32_hash_final(req);
1449}
1450
1451static int stm32_hash_digest(struct ahash_request *req)
1452{
1453 return stm32_hash_init(req) ?: stm32_hash_finup(req);
1454}
1455
1456static int stm32_hash_export(struct ahash_request *req, void *out)
1457{
1458 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1459
1460 memcpy(out, &rctx->state, sizeof(rctx->state));
1461
1462 return 0;
1463}
1464
1465static int stm32_hash_import(struct ahash_request *req, const void *in)
1466{
1467 struct stm32_hash_request_ctx *rctx = ahash_request_ctx(req);
1468
1469 stm32_hash_init(req);
1470 memcpy(&rctx->state, in, sizeof(rctx->state));
1471
1472 return 0;
1473}
1474
1475static int stm32_hash_setkey(struct crypto_ahash *tfm,
1476 const u8 *key, unsigned int keylen)
1477{
1478 struct stm32_hash_ctx *ctx = crypto_ahash_ctx(tfm);
1479
1480 if (keylen <= HASH_MAX_KEY_SIZE) {
1481 memcpy(ctx->key, key, keylen);
1482 ctx->keylen = keylen;
1483 } else {
1484 return -ENOMEM;
1485 }
1486
1487 return 0;
1488}
1489
1490static int stm32_hash_init_fallback(struct crypto_tfm *tfm)
1491{
1492 struct stm32_hash_ctx *ctx = crypto_tfm_ctx(tfm);
1493 struct stm32_hash_dev *hdev = stm32_hash_find_dev(ctx);
1494 const char *name = crypto_tfm_alg_name(tfm);
1495 struct crypto_shash *xtfm;
1496
1497 /* The fallback is only needed on Ux500 */
1498 if (!hdev->pdata->ux500)
1499 return 0;
1500
1501 xtfm = crypto_alloc_shash(name, 0, CRYPTO_ALG_NEED_FALLBACK);
1502 if (IS_ERR(xtfm)) {
1503 dev_err(hdev->dev, "failed to allocate %s fallback\n",
1504 name);
1505 return PTR_ERR(xtfm);
1506 }
1507 dev_info(hdev->dev, "allocated %s fallback\n", name);
1508 ctx->xtfm = xtfm;
1509
1510 return 0;
1511}
1512
1513static int stm32_hash_cra_init_algs(struct crypto_tfm *tfm, u32 algs_flags)
1514{
1515 struct stm32_hash_ctx *ctx = crypto_tfm_ctx(tfm);
1516
1517 crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
1518 sizeof(struct stm32_hash_request_ctx));
1519
1520 ctx->keylen = 0;
1521
1522 if (algs_flags)
1523 ctx->flags |= algs_flags;
1524
1525 return stm32_hash_init_fallback(tfm);
1526}
1527
1528static int stm32_hash_cra_init(struct crypto_tfm *tfm)
1529{
1530 return stm32_hash_cra_init_algs(tfm, 0);
1531}
1532
1533static int stm32_hash_cra_hmac_init(struct crypto_tfm *tfm)
1534{
1535 return stm32_hash_cra_init_algs(tfm, HASH_FLAGS_HMAC);
1536}
1537
1538static int stm32_hash_cra_sha3_init(struct crypto_tfm *tfm)
1539{
1540 return stm32_hash_cra_init_algs(tfm, HASH_FLAGS_SHA3_MODE);
1541}
1542
1543static int stm32_hash_cra_sha3_hmac_init(struct crypto_tfm *tfm)
1544{
1545 return stm32_hash_cra_init_algs(tfm, HASH_FLAGS_SHA3_MODE |
1546 HASH_FLAGS_HMAC);
1547}
1548
1549static void stm32_hash_cra_exit(struct crypto_tfm *tfm)
1550{
1551 struct stm32_hash_ctx *ctx = crypto_tfm_ctx(tfm);
1552
1553 if (ctx->xtfm)
1554 crypto_free_shash(ctx->xtfm);
1555}
1556
1557static irqreturn_t stm32_hash_irq_thread(int irq, void *dev_id)
1558{
1559 struct stm32_hash_dev *hdev = dev_id;
1560
1561 if (HASH_FLAGS_OUTPUT_READY & hdev->flags) {
1562 hdev->flags &= ~HASH_FLAGS_OUTPUT_READY;
1563 goto finish;
1564 }
1565
1566 return IRQ_HANDLED;
1567
1568finish:
1569 /* Finish current request */
1570 stm32_hash_finish_req(hdev->req, 0);
1571
1572 return IRQ_HANDLED;
1573}
1574
1575static irqreturn_t stm32_hash_irq_handler(int irq, void *dev_id)
1576{
1577 struct stm32_hash_dev *hdev = dev_id;
1578 u32 reg;
1579
1580 reg = stm32_hash_read(hdev, HASH_SR);
1581 if (reg & HASH_SR_OUTPUT_READY) {
1582 hdev->flags |= HASH_FLAGS_OUTPUT_READY;
1583 /* Disable IT*/
1584 stm32_hash_write(hdev, HASH_IMR, 0);
1585 return IRQ_WAKE_THREAD;
1586 }
1587
1588 return IRQ_NONE;
1589}
1590
1591static struct ahash_engine_alg algs_md5[] = {
1592 {
1593 .base.init = stm32_hash_init,
1594 .base.update = stm32_hash_update,
1595 .base.final = stm32_hash_final,
1596 .base.finup = stm32_hash_finup,
1597 .base.digest = stm32_hash_digest,
1598 .base.export = stm32_hash_export,
1599 .base.import = stm32_hash_import,
1600 .base.halg = {
1601 .digestsize = MD5_DIGEST_SIZE,
1602 .statesize = sizeof(struct stm32_hash_state),
1603 .base = {
1604 .cra_name = "md5",
1605 .cra_driver_name = "stm32-md5",
1606 .cra_priority = 200,
1607 .cra_flags = CRYPTO_ALG_ASYNC |
1608 CRYPTO_ALG_KERN_DRIVER_ONLY,
1609 .cra_blocksize = MD5_HMAC_BLOCK_SIZE,
1610 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1611 .cra_init = stm32_hash_cra_init,
1612 .cra_exit = stm32_hash_cra_exit,
1613 .cra_module = THIS_MODULE,
1614 }
1615 },
1616 .op = {
1617 .do_one_request = stm32_hash_one_request,
1618 },
1619 },
1620 {
1621 .base.init = stm32_hash_init,
1622 .base.update = stm32_hash_update,
1623 .base.final = stm32_hash_final,
1624 .base.finup = stm32_hash_finup,
1625 .base.digest = stm32_hash_digest,
1626 .base.export = stm32_hash_export,
1627 .base.import = stm32_hash_import,
1628 .base.setkey = stm32_hash_setkey,
1629 .base.halg = {
1630 .digestsize = MD5_DIGEST_SIZE,
1631 .statesize = sizeof(struct stm32_hash_state),
1632 .base = {
1633 .cra_name = "hmac(md5)",
1634 .cra_driver_name = "stm32-hmac-md5",
1635 .cra_priority = 200,
1636 .cra_flags = CRYPTO_ALG_ASYNC |
1637 CRYPTO_ALG_KERN_DRIVER_ONLY,
1638 .cra_blocksize = MD5_HMAC_BLOCK_SIZE,
1639 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1640 .cra_init = stm32_hash_cra_hmac_init,
1641 .cra_exit = stm32_hash_cra_exit,
1642 .cra_module = THIS_MODULE,
1643 }
1644 },
1645 .op = {
1646 .do_one_request = stm32_hash_one_request,
1647 },
1648 }
1649};
1650
1651static struct ahash_engine_alg algs_sha1[] = {
1652 {
1653 .base.init = stm32_hash_init,
1654 .base.update = stm32_hash_update,
1655 .base.final = stm32_hash_final,
1656 .base.finup = stm32_hash_finup,
1657 .base.digest = stm32_hash_digest,
1658 .base.export = stm32_hash_export,
1659 .base.import = stm32_hash_import,
1660 .base.halg = {
1661 .digestsize = SHA1_DIGEST_SIZE,
1662 .statesize = sizeof(struct stm32_hash_state),
1663 .base = {
1664 .cra_name = "sha1",
1665 .cra_driver_name = "stm32-sha1",
1666 .cra_priority = 200,
1667 .cra_flags = CRYPTO_ALG_ASYNC |
1668 CRYPTO_ALG_KERN_DRIVER_ONLY,
1669 .cra_blocksize = SHA1_BLOCK_SIZE,
1670 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1671 .cra_init = stm32_hash_cra_init,
1672 .cra_exit = stm32_hash_cra_exit,
1673 .cra_module = THIS_MODULE,
1674 }
1675 },
1676 .op = {
1677 .do_one_request = stm32_hash_one_request,
1678 },
1679 },
1680 {
1681 .base.init = stm32_hash_init,
1682 .base.update = stm32_hash_update,
1683 .base.final = stm32_hash_final,
1684 .base.finup = stm32_hash_finup,
1685 .base.digest = stm32_hash_digest,
1686 .base.export = stm32_hash_export,
1687 .base.import = stm32_hash_import,
1688 .base.setkey = stm32_hash_setkey,
1689 .base.halg = {
1690 .digestsize = SHA1_DIGEST_SIZE,
1691 .statesize = sizeof(struct stm32_hash_state),
1692 .base = {
1693 .cra_name = "hmac(sha1)",
1694 .cra_driver_name = "stm32-hmac-sha1",
1695 .cra_priority = 200,
1696 .cra_flags = CRYPTO_ALG_ASYNC |
1697 CRYPTO_ALG_KERN_DRIVER_ONLY,
1698 .cra_blocksize = SHA1_BLOCK_SIZE,
1699 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1700 .cra_init = stm32_hash_cra_hmac_init,
1701 .cra_exit = stm32_hash_cra_exit,
1702 .cra_module = THIS_MODULE,
1703 }
1704 },
1705 .op = {
1706 .do_one_request = stm32_hash_one_request,
1707 },
1708 },
1709};
1710
1711static struct ahash_engine_alg algs_sha224[] = {
1712 {
1713 .base.init = stm32_hash_init,
1714 .base.update = stm32_hash_update,
1715 .base.final = stm32_hash_final,
1716 .base.finup = stm32_hash_finup,
1717 .base.digest = stm32_hash_digest,
1718 .base.export = stm32_hash_export,
1719 .base.import = stm32_hash_import,
1720 .base.halg = {
1721 .digestsize = SHA224_DIGEST_SIZE,
1722 .statesize = sizeof(struct stm32_hash_state),
1723 .base = {
1724 .cra_name = "sha224",
1725 .cra_driver_name = "stm32-sha224",
1726 .cra_priority = 200,
1727 .cra_flags = CRYPTO_ALG_ASYNC |
1728 CRYPTO_ALG_KERN_DRIVER_ONLY,
1729 .cra_blocksize = SHA224_BLOCK_SIZE,
1730 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1731 .cra_init = stm32_hash_cra_init,
1732 .cra_exit = stm32_hash_cra_exit,
1733 .cra_module = THIS_MODULE,
1734 }
1735 },
1736 .op = {
1737 .do_one_request = stm32_hash_one_request,
1738 },
1739 },
1740 {
1741 .base.init = stm32_hash_init,
1742 .base.update = stm32_hash_update,
1743 .base.final = stm32_hash_final,
1744 .base.finup = stm32_hash_finup,
1745 .base.digest = stm32_hash_digest,
1746 .base.setkey = stm32_hash_setkey,
1747 .base.export = stm32_hash_export,
1748 .base.import = stm32_hash_import,
1749 .base.halg = {
1750 .digestsize = SHA224_DIGEST_SIZE,
1751 .statesize = sizeof(struct stm32_hash_state),
1752 .base = {
1753 .cra_name = "hmac(sha224)",
1754 .cra_driver_name = "stm32-hmac-sha224",
1755 .cra_priority = 200,
1756 .cra_flags = CRYPTO_ALG_ASYNC |
1757 CRYPTO_ALG_KERN_DRIVER_ONLY,
1758 .cra_blocksize = SHA224_BLOCK_SIZE,
1759 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1760 .cra_init = stm32_hash_cra_hmac_init,
1761 .cra_exit = stm32_hash_cra_exit,
1762 .cra_module = THIS_MODULE,
1763 }
1764 },
1765 .op = {
1766 .do_one_request = stm32_hash_one_request,
1767 },
1768 },
1769};
1770
1771static struct ahash_engine_alg algs_sha256[] = {
1772 {
1773 .base.init = stm32_hash_init,
1774 .base.update = stm32_hash_update,
1775 .base.final = stm32_hash_final,
1776 .base.finup = stm32_hash_finup,
1777 .base.digest = stm32_hash_digest,
1778 .base.export = stm32_hash_export,
1779 .base.import = stm32_hash_import,
1780 .base.halg = {
1781 .digestsize = SHA256_DIGEST_SIZE,
1782 .statesize = sizeof(struct stm32_hash_state),
1783 .base = {
1784 .cra_name = "sha256",
1785 .cra_driver_name = "stm32-sha256",
1786 .cra_priority = 200,
1787 .cra_flags = CRYPTO_ALG_ASYNC |
1788 CRYPTO_ALG_KERN_DRIVER_ONLY,
1789 .cra_blocksize = SHA256_BLOCK_SIZE,
1790 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1791 .cra_init = stm32_hash_cra_init,
1792 .cra_exit = stm32_hash_cra_exit,
1793 .cra_module = THIS_MODULE,
1794 }
1795 },
1796 .op = {
1797 .do_one_request = stm32_hash_one_request,
1798 },
1799 },
1800 {
1801 .base.init = stm32_hash_init,
1802 .base.update = stm32_hash_update,
1803 .base.final = stm32_hash_final,
1804 .base.finup = stm32_hash_finup,
1805 .base.digest = stm32_hash_digest,
1806 .base.export = stm32_hash_export,
1807 .base.import = stm32_hash_import,
1808 .base.setkey = stm32_hash_setkey,
1809 .base.halg = {
1810 .digestsize = SHA256_DIGEST_SIZE,
1811 .statesize = sizeof(struct stm32_hash_state),
1812 .base = {
1813 .cra_name = "hmac(sha256)",
1814 .cra_driver_name = "stm32-hmac-sha256",
1815 .cra_priority = 200,
1816 .cra_flags = CRYPTO_ALG_ASYNC |
1817 CRYPTO_ALG_KERN_DRIVER_ONLY,
1818 .cra_blocksize = SHA256_BLOCK_SIZE,
1819 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1820 .cra_init = stm32_hash_cra_hmac_init,
1821 .cra_exit = stm32_hash_cra_exit,
1822 .cra_module = THIS_MODULE,
1823 }
1824 },
1825 .op = {
1826 .do_one_request = stm32_hash_one_request,
1827 },
1828 },
1829};
1830
1831static struct ahash_engine_alg algs_sha384_sha512[] = {
1832 {
1833 .base.init = stm32_hash_init,
1834 .base.update = stm32_hash_update,
1835 .base.final = stm32_hash_final,
1836 .base.finup = stm32_hash_finup,
1837 .base.digest = stm32_hash_digest,
1838 .base.export = stm32_hash_export,
1839 .base.import = stm32_hash_import,
1840 .base.halg = {
1841 .digestsize = SHA384_DIGEST_SIZE,
1842 .statesize = sizeof(struct stm32_hash_state),
1843 .base = {
1844 .cra_name = "sha384",
1845 .cra_driver_name = "stm32-sha384",
1846 .cra_priority = 200,
1847 .cra_flags = CRYPTO_ALG_ASYNC |
1848 CRYPTO_ALG_KERN_DRIVER_ONLY,
1849 .cra_blocksize = SHA384_BLOCK_SIZE,
1850 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1851 .cra_init = stm32_hash_cra_init,
1852 .cra_exit = stm32_hash_cra_exit,
1853 .cra_module = THIS_MODULE,
1854 }
1855 },
1856 .op = {
1857 .do_one_request = stm32_hash_one_request,
1858 },
1859 },
1860 {
1861 .base.init = stm32_hash_init,
1862 .base.update = stm32_hash_update,
1863 .base.final = stm32_hash_final,
1864 .base.finup = stm32_hash_finup,
1865 .base.digest = stm32_hash_digest,
1866 .base.setkey = stm32_hash_setkey,
1867 .base.export = stm32_hash_export,
1868 .base.import = stm32_hash_import,
1869 .base.halg = {
1870 .digestsize = SHA384_DIGEST_SIZE,
1871 .statesize = sizeof(struct stm32_hash_state),
1872 .base = {
1873 .cra_name = "hmac(sha384)",
1874 .cra_driver_name = "stm32-hmac-sha384",
1875 .cra_priority = 200,
1876 .cra_flags = CRYPTO_ALG_ASYNC |
1877 CRYPTO_ALG_KERN_DRIVER_ONLY,
1878 .cra_blocksize = SHA384_BLOCK_SIZE,
1879 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1880 .cra_init = stm32_hash_cra_hmac_init,
1881 .cra_exit = stm32_hash_cra_exit,
1882 .cra_module = THIS_MODULE,
1883 }
1884 },
1885 .op = {
1886 .do_one_request = stm32_hash_one_request,
1887 },
1888 },
1889 {
1890 .base.init = stm32_hash_init,
1891 .base.update = stm32_hash_update,
1892 .base.final = stm32_hash_final,
1893 .base.finup = stm32_hash_finup,
1894 .base.digest = stm32_hash_digest,
1895 .base.export = stm32_hash_export,
1896 .base.import = stm32_hash_import,
1897 .base.halg = {
1898 .digestsize = SHA512_DIGEST_SIZE,
1899 .statesize = sizeof(struct stm32_hash_state),
1900 .base = {
1901 .cra_name = "sha512",
1902 .cra_driver_name = "stm32-sha512",
1903 .cra_priority = 200,
1904 .cra_flags = CRYPTO_ALG_ASYNC |
1905 CRYPTO_ALG_KERN_DRIVER_ONLY,
1906 .cra_blocksize = SHA512_BLOCK_SIZE,
1907 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1908 .cra_init = stm32_hash_cra_init,
1909 .cra_exit = stm32_hash_cra_exit,
1910 .cra_module = THIS_MODULE,
1911 }
1912 },
1913 .op = {
1914 .do_one_request = stm32_hash_one_request,
1915 },
1916 },
1917 {
1918 .base.init = stm32_hash_init,
1919 .base.update = stm32_hash_update,
1920 .base.final = stm32_hash_final,
1921 .base.finup = stm32_hash_finup,
1922 .base.digest = stm32_hash_digest,
1923 .base.export = stm32_hash_export,
1924 .base.import = stm32_hash_import,
1925 .base.setkey = stm32_hash_setkey,
1926 .base.halg = {
1927 .digestsize = SHA512_DIGEST_SIZE,
1928 .statesize = sizeof(struct stm32_hash_state),
1929 .base = {
1930 .cra_name = "hmac(sha512)",
1931 .cra_driver_name = "stm32-hmac-sha512",
1932 .cra_priority = 200,
1933 .cra_flags = CRYPTO_ALG_ASYNC |
1934 CRYPTO_ALG_KERN_DRIVER_ONLY,
1935 .cra_blocksize = SHA512_BLOCK_SIZE,
1936 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1937 .cra_init = stm32_hash_cra_hmac_init,
1938 .cra_exit = stm32_hash_cra_exit,
1939 .cra_module = THIS_MODULE,
1940 }
1941 },
1942 .op = {
1943 .do_one_request = stm32_hash_one_request,
1944 },
1945 },
1946};
1947
1948static struct ahash_engine_alg algs_sha3[] = {
1949 {
1950 .base.init = stm32_hash_init,
1951 .base.update = stm32_hash_update,
1952 .base.final = stm32_hash_final,
1953 .base.finup = stm32_hash_finup,
1954 .base.digest = stm32_hash_digest,
1955 .base.export = stm32_hash_export,
1956 .base.import = stm32_hash_import,
1957 .base.halg = {
1958 .digestsize = SHA3_224_DIGEST_SIZE,
1959 .statesize = sizeof(struct stm32_hash_state),
1960 .base = {
1961 .cra_name = "sha3-224",
1962 .cra_driver_name = "stm32-sha3-224",
1963 .cra_priority = 200,
1964 .cra_flags = CRYPTO_ALG_ASYNC |
1965 CRYPTO_ALG_KERN_DRIVER_ONLY,
1966 .cra_blocksize = SHA3_224_BLOCK_SIZE,
1967 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1968 .cra_init = stm32_hash_cra_sha3_init,
1969 .cra_exit = stm32_hash_cra_exit,
1970 .cra_module = THIS_MODULE,
1971 }
1972 },
1973 .op = {
1974 .do_one_request = stm32_hash_one_request,
1975 },
1976 },
1977 {
1978 .base.init = stm32_hash_init,
1979 .base.update = stm32_hash_update,
1980 .base.final = stm32_hash_final,
1981 .base.finup = stm32_hash_finup,
1982 .base.digest = stm32_hash_digest,
1983 .base.export = stm32_hash_export,
1984 .base.import = stm32_hash_import,
1985 .base.setkey = stm32_hash_setkey,
1986 .base.halg = {
1987 .digestsize = SHA3_224_DIGEST_SIZE,
1988 .statesize = sizeof(struct stm32_hash_state),
1989 .base = {
1990 .cra_name = "hmac(sha3-224)",
1991 .cra_driver_name = "stm32-hmac-sha3-224",
1992 .cra_priority = 200,
1993 .cra_flags = CRYPTO_ALG_ASYNC |
1994 CRYPTO_ALG_KERN_DRIVER_ONLY,
1995 .cra_blocksize = SHA3_224_BLOCK_SIZE,
1996 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
1997 .cra_init = stm32_hash_cra_sha3_hmac_init,
1998 .cra_exit = stm32_hash_cra_exit,
1999 .cra_module = THIS_MODULE,
2000 }
2001 },
2002 .op = {
2003 .do_one_request = stm32_hash_one_request,
2004 },
2005 },
2006 {
2007 .base.init = stm32_hash_init,
2008 .base.update = stm32_hash_update,
2009 .base.final = stm32_hash_final,
2010 .base.finup = stm32_hash_finup,
2011 .base.digest = stm32_hash_digest,
2012 .base.export = stm32_hash_export,
2013 .base.import = stm32_hash_import,
2014 .base.halg = {
2015 .digestsize = SHA3_256_DIGEST_SIZE,
2016 .statesize = sizeof(struct stm32_hash_state),
2017 .base = {
2018 .cra_name = "sha3-256",
2019 .cra_driver_name = "stm32-sha3-256",
2020 .cra_priority = 200,
2021 .cra_flags = CRYPTO_ALG_ASYNC |
2022 CRYPTO_ALG_KERN_DRIVER_ONLY,
2023 .cra_blocksize = SHA3_256_BLOCK_SIZE,
2024 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
2025 .cra_init = stm32_hash_cra_sha3_init,
2026 .cra_exit = stm32_hash_cra_exit,
2027 .cra_module = THIS_MODULE,
2028 }
2029 },
2030 .op = {
2031 .do_one_request = stm32_hash_one_request,
2032 },
2033 },
2034 {
2035 .base.init = stm32_hash_init,
2036 .base.update = stm32_hash_update,
2037 .base.final = stm32_hash_final,
2038 .base.finup = stm32_hash_finup,
2039 .base.digest = stm32_hash_digest,
2040 .base.export = stm32_hash_export,
2041 .base.import = stm32_hash_import,
2042 .base.setkey = stm32_hash_setkey,
2043 .base.halg = {
2044 .digestsize = SHA3_256_DIGEST_SIZE,
2045 .statesize = sizeof(struct stm32_hash_state),
2046 .base = {
2047 .cra_name = "hmac(sha3-256)",
2048 .cra_driver_name = "stm32-hmac-sha3-256",
2049 .cra_priority = 200,
2050 .cra_flags = CRYPTO_ALG_ASYNC |
2051 CRYPTO_ALG_KERN_DRIVER_ONLY,
2052 .cra_blocksize = SHA3_256_BLOCK_SIZE,
2053 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
2054 .cra_init = stm32_hash_cra_sha3_hmac_init,
2055 .cra_exit = stm32_hash_cra_exit,
2056 .cra_module = THIS_MODULE,
2057 }
2058 },
2059 .op = {
2060 .do_one_request = stm32_hash_one_request,
2061 },
2062 },
2063 {
2064 .base.init = stm32_hash_init,
2065 .base.update = stm32_hash_update,
2066 .base.final = stm32_hash_final,
2067 .base.finup = stm32_hash_finup,
2068 .base.digest = stm32_hash_digest,
2069 .base.export = stm32_hash_export,
2070 .base.import = stm32_hash_import,
2071 .base.halg = {
2072 .digestsize = SHA3_384_DIGEST_SIZE,
2073 .statesize = sizeof(struct stm32_hash_state),
2074 .base = {
2075 .cra_name = "sha3-384",
2076 .cra_driver_name = "stm32-sha3-384",
2077 .cra_priority = 200,
2078 .cra_flags = CRYPTO_ALG_ASYNC |
2079 CRYPTO_ALG_KERN_DRIVER_ONLY,
2080 .cra_blocksize = SHA3_384_BLOCK_SIZE,
2081 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
2082 .cra_init = stm32_hash_cra_sha3_init,
2083 .cra_exit = stm32_hash_cra_exit,
2084 .cra_module = THIS_MODULE,
2085 }
2086 },
2087 .op = {
2088 .do_one_request = stm32_hash_one_request,
2089 },
2090 },
2091 {
2092 .base.init = stm32_hash_init,
2093 .base.update = stm32_hash_update,
2094 .base.final = stm32_hash_final,
2095 .base.finup = stm32_hash_finup,
2096 .base.digest = stm32_hash_digest,
2097 .base.export = stm32_hash_export,
2098 .base.import = stm32_hash_import,
2099 .base.setkey = stm32_hash_setkey,
2100 .base.halg = {
2101 .digestsize = SHA3_384_DIGEST_SIZE,
2102 .statesize = sizeof(struct stm32_hash_state),
2103 .base = {
2104 .cra_name = "hmac(sha3-384)",
2105 .cra_driver_name = "stm32-hmac-sha3-384",
2106 .cra_priority = 200,
2107 .cra_flags = CRYPTO_ALG_ASYNC |
2108 CRYPTO_ALG_KERN_DRIVER_ONLY,
2109 .cra_blocksize = SHA3_384_BLOCK_SIZE,
2110 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
2111 .cra_init = stm32_hash_cra_sha3_hmac_init,
2112 .cra_exit = stm32_hash_cra_exit,
2113 .cra_module = THIS_MODULE,
2114 }
2115 },
2116 .op = {
2117 .do_one_request = stm32_hash_one_request,
2118 },
2119 },
2120 {
2121 .base.init = stm32_hash_init,
2122 .base.update = stm32_hash_update,
2123 .base.final = stm32_hash_final,
2124 .base.finup = stm32_hash_finup,
2125 .base.digest = stm32_hash_digest,
2126 .base.export = stm32_hash_export,
2127 .base.import = stm32_hash_import,
2128 .base.halg = {
2129 .digestsize = SHA3_512_DIGEST_SIZE,
2130 .statesize = sizeof(struct stm32_hash_state),
2131 .base = {
2132 .cra_name = "sha3-512",
2133 .cra_driver_name = "stm32-sha3-512",
2134 .cra_priority = 200,
2135 .cra_flags = CRYPTO_ALG_ASYNC |
2136 CRYPTO_ALG_KERN_DRIVER_ONLY,
2137 .cra_blocksize = SHA3_512_BLOCK_SIZE,
2138 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
2139 .cra_init = stm32_hash_cra_sha3_init,
2140 .cra_exit = stm32_hash_cra_exit,
2141 .cra_module = THIS_MODULE,
2142 }
2143 },
2144 .op = {
2145 .do_one_request = stm32_hash_one_request,
2146 },
2147 },
2148 {
2149 .base.init = stm32_hash_init,
2150 .base.update = stm32_hash_update,
2151 .base.final = stm32_hash_final,
2152 .base.finup = stm32_hash_finup,
2153 .base.digest = stm32_hash_digest,
2154 .base.export = stm32_hash_export,
2155 .base.import = stm32_hash_import,
2156 .base.setkey = stm32_hash_setkey,
2157 .base.halg = {
2158 .digestsize = SHA3_512_DIGEST_SIZE,
2159 .statesize = sizeof(struct stm32_hash_state),
2160 .base = {
2161 .cra_name = "hmac(sha3-512)",
2162 .cra_driver_name = "stm32-hmac-sha3-512",
2163 .cra_priority = 200,
2164 .cra_flags = CRYPTO_ALG_ASYNC |
2165 CRYPTO_ALG_KERN_DRIVER_ONLY,
2166 .cra_blocksize = SHA3_512_BLOCK_SIZE,
2167 .cra_ctxsize = sizeof(struct stm32_hash_ctx),
2168 .cra_init = stm32_hash_cra_sha3_hmac_init,
2169 .cra_exit = stm32_hash_cra_exit,
2170 .cra_module = THIS_MODULE,
2171 }
2172 },
2173 .op = {
2174 .do_one_request = stm32_hash_one_request,
2175 },
2176 }
2177};
2178
2179static int stm32_hash_register_algs(struct stm32_hash_dev *hdev)
2180{
2181 unsigned int i, j;
2182 int err;
2183
2184 for (i = 0; i < hdev->pdata->algs_info_size; i++) {
2185 for (j = 0; j < hdev->pdata->algs_info[i].size; j++) {
2186 err = crypto_engine_register_ahash(
2187 &hdev->pdata->algs_info[i].algs_list[j]);
2188 if (err)
2189 goto err_algs;
2190 }
2191 }
2192
2193 return 0;
2194err_algs:
2195 dev_err(hdev->dev, "Algo %d : %d failed\n", i, j);
2196 for (; i--; ) {
2197 for (; j--;)
2198 crypto_engine_unregister_ahash(
2199 &hdev->pdata->algs_info[i].algs_list[j]);
2200 }
2201
2202 return err;
2203}
2204
2205static int stm32_hash_unregister_algs(struct stm32_hash_dev *hdev)
2206{
2207 unsigned int i, j;
2208
2209 for (i = 0; i < hdev->pdata->algs_info_size; i++) {
2210 for (j = 0; j < hdev->pdata->algs_info[i].size; j++)
2211 crypto_engine_unregister_ahash(
2212 &hdev->pdata->algs_info[i].algs_list[j]);
2213 }
2214
2215 return 0;
2216}
2217
2218static struct stm32_hash_algs_info stm32_hash_algs_info_ux500[] = {
2219 {
2220 .algs_list = algs_sha1,
2221 .size = ARRAY_SIZE(algs_sha1),
2222 },
2223 {
2224 .algs_list = algs_sha256,
2225 .size = ARRAY_SIZE(algs_sha256),
2226 },
2227};
2228
2229static const struct stm32_hash_pdata stm32_hash_pdata_ux500 = {
2230 .alg_shift = 7,
2231 .algs_info = stm32_hash_algs_info_ux500,
2232 .algs_info_size = ARRAY_SIZE(stm32_hash_algs_info_ux500),
2233 .broken_emptymsg = true,
2234 .ux500 = true,
2235};
2236
2237static struct stm32_hash_algs_info stm32_hash_algs_info_stm32f4[] = {
2238 {
2239 .algs_list = algs_md5,
2240 .size = ARRAY_SIZE(algs_md5),
2241 },
2242 {
2243 .algs_list = algs_sha1,
2244 .size = ARRAY_SIZE(algs_sha1),
2245 },
2246};
2247
2248static const struct stm32_hash_pdata stm32_hash_pdata_stm32f4 = {
2249 .alg_shift = 7,
2250 .algs_info = stm32_hash_algs_info_stm32f4,
2251 .algs_info_size = ARRAY_SIZE(stm32_hash_algs_info_stm32f4),
2252 .has_sr = true,
2253 .has_mdmat = true,
2254};
2255
2256static struct stm32_hash_algs_info stm32_hash_algs_info_stm32f7[] = {
2257 {
2258 .algs_list = algs_md5,
2259 .size = ARRAY_SIZE(algs_md5),
2260 },
2261 {
2262 .algs_list = algs_sha1,
2263 .size = ARRAY_SIZE(algs_sha1),
2264 },
2265 {
2266 .algs_list = algs_sha224,
2267 .size = ARRAY_SIZE(algs_sha224),
2268 },
2269 {
2270 .algs_list = algs_sha256,
2271 .size = ARRAY_SIZE(algs_sha256),
2272 },
2273};
2274
2275static const struct stm32_hash_pdata stm32_hash_pdata_stm32f7 = {
2276 .alg_shift = 7,
2277 .algs_info = stm32_hash_algs_info_stm32f7,
2278 .algs_info_size = ARRAY_SIZE(stm32_hash_algs_info_stm32f7),
2279 .has_sr = true,
2280 .has_mdmat = true,
2281};
2282
2283static struct stm32_hash_algs_info stm32_hash_algs_info_stm32mp13[] = {
2284 {
2285 .algs_list = algs_sha1,
2286 .size = ARRAY_SIZE(algs_sha1),
2287 },
2288 {
2289 .algs_list = algs_sha224,
2290 .size = ARRAY_SIZE(algs_sha224),
2291 },
2292 {
2293 .algs_list = algs_sha256,
2294 .size = ARRAY_SIZE(algs_sha256),
2295 },
2296 {
2297 .algs_list = algs_sha384_sha512,
2298 .size = ARRAY_SIZE(algs_sha384_sha512),
2299 },
2300 {
2301 .algs_list = algs_sha3,
2302 .size = ARRAY_SIZE(algs_sha3),
2303 },
2304};
2305
2306static const struct stm32_hash_pdata stm32_hash_pdata_stm32mp13 = {
2307 .alg_shift = 17,
2308 .algs_info = stm32_hash_algs_info_stm32mp13,
2309 .algs_info_size = ARRAY_SIZE(stm32_hash_algs_info_stm32mp13),
2310 .has_sr = true,
2311 .has_mdmat = true,
2312 .context_secured = true,
2313};
2314
2315static const struct of_device_id stm32_hash_of_match[] = {
2316 { .compatible = "stericsson,ux500-hash", .data = &stm32_hash_pdata_ux500 },
2317 { .compatible = "st,stm32f456-hash", .data = &stm32_hash_pdata_stm32f4 },
2318 { .compatible = "st,stm32f756-hash", .data = &stm32_hash_pdata_stm32f7 },
2319 { .compatible = "st,stm32mp13-hash", .data = &stm32_hash_pdata_stm32mp13 },
2320 {},
2321};
2322
2323MODULE_DEVICE_TABLE(of, stm32_hash_of_match);
2324
2325static int stm32_hash_get_of_match(struct stm32_hash_dev *hdev,
2326 struct device *dev)
2327{
2328 hdev->pdata = of_device_get_match_data(dev);
2329 if (!hdev->pdata) {
2330 dev_err(dev, "no compatible OF match\n");
2331 return -EINVAL;
2332 }
2333
2334 return 0;
2335}
2336
2337static int stm32_hash_probe(struct platform_device *pdev)
2338{
2339 struct stm32_hash_dev *hdev;
2340 struct device *dev = &pdev->dev;
2341 struct resource *res;
2342 int ret, irq;
2343
2344 hdev = devm_kzalloc(dev, sizeof(*hdev), GFP_KERNEL);
2345 if (!hdev)
2346 return -ENOMEM;
2347
2348 hdev->io_base = devm_platform_get_and_ioremap_resource(pdev, 0, &res);
2349 if (IS_ERR(hdev->io_base))
2350 return PTR_ERR(hdev->io_base);
2351
2352 hdev->phys_base = res->start;
2353
2354 ret = stm32_hash_get_of_match(hdev, dev);
2355 if (ret)
2356 return ret;
2357
2358 irq = platform_get_irq_optional(pdev, 0);
2359 if (irq < 0 && irq != -ENXIO)
2360 return irq;
2361
2362 if (irq > 0) {
2363 ret = devm_request_threaded_irq(dev, irq,
2364 stm32_hash_irq_handler,
2365 stm32_hash_irq_thread,
2366 IRQF_ONESHOT,
2367 dev_name(dev), hdev);
2368 if (ret) {
2369 dev_err(dev, "Cannot grab IRQ\n");
2370 return ret;
2371 }
2372 } else {
2373 dev_info(dev, "No IRQ, use polling mode\n");
2374 hdev->polled = true;
2375 }
2376
2377 hdev->clk = devm_clk_get(&pdev->dev, NULL);
2378 if (IS_ERR(hdev->clk))
2379 return dev_err_probe(dev, PTR_ERR(hdev->clk),
2380 "failed to get clock for hash\n");
2381
2382 ret = clk_prepare_enable(hdev->clk);
2383 if (ret) {
2384 dev_err(dev, "failed to enable hash clock (%d)\n", ret);
2385 return ret;
2386 }
2387
2388 pm_runtime_set_autosuspend_delay(dev, HASH_AUTOSUSPEND_DELAY);
2389 pm_runtime_use_autosuspend(dev);
2390
2391 pm_runtime_get_noresume(dev);
2392 pm_runtime_set_active(dev);
2393 pm_runtime_enable(dev);
2394
2395 hdev->rst = devm_reset_control_get(&pdev->dev, NULL);
2396 if (IS_ERR(hdev->rst)) {
2397 if (PTR_ERR(hdev->rst) == -EPROBE_DEFER) {
2398 ret = -EPROBE_DEFER;
2399 goto err_reset;
2400 }
2401 } else {
2402 reset_control_assert(hdev->rst);
2403 udelay(2);
2404 reset_control_deassert(hdev->rst);
2405 }
2406
2407 hdev->dev = dev;
2408
2409 platform_set_drvdata(pdev, hdev);
2410
2411 ret = stm32_hash_dma_init(hdev);
2412 switch (ret) {
2413 case 0:
2414 break;
2415 case -ENOENT:
2416 case -ENODEV:
2417 dev_info(dev, "DMA mode not available\n");
2418 break;
2419 default:
2420 dev_err(dev, "DMA init error %d\n", ret);
2421 goto err_dma;
2422 }
2423
2424 spin_lock(&stm32_hash.lock);
2425 list_add_tail(&hdev->list, &stm32_hash.dev_list);
2426 spin_unlock(&stm32_hash.lock);
2427
2428 /* Initialize crypto engine */
2429 hdev->engine = crypto_engine_alloc_init(dev, 1);
2430 if (!hdev->engine) {
2431 ret = -ENOMEM;
2432 goto err_engine;
2433 }
2434
2435 ret = crypto_engine_start(hdev->engine);
2436 if (ret)
2437 goto err_engine_start;
2438
2439 if (hdev->pdata->ux500)
2440 /* FIXME: implement DMA mode for Ux500 */
2441 hdev->dma_mode = 0;
2442 else
2443 hdev->dma_mode = stm32_hash_read(hdev, HASH_HWCFGR) & HASH_HWCFG_DMA_MASK;
2444
2445 /* Register algos */
2446 ret = stm32_hash_register_algs(hdev);
2447 if (ret)
2448 goto err_algs;
2449
2450 dev_info(dev, "Init HASH done HW ver %x DMA mode %u\n",
2451 stm32_hash_read(hdev, HASH_VER), hdev->dma_mode);
2452
2453 pm_runtime_put_sync(dev);
2454
2455 return 0;
2456
2457err_algs:
2458err_engine_start:
2459 crypto_engine_exit(hdev->engine);
2460err_engine:
2461 spin_lock(&stm32_hash.lock);
2462 list_del(&hdev->list);
2463 spin_unlock(&stm32_hash.lock);
2464err_dma:
2465 if (hdev->dma_lch)
2466 dma_release_channel(hdev->dma_lch);
2467err_reset:
2468 pm_runtime_disable(dev);
2469 pm_runtime_put_noidle(dev);
2470
2471 clk_disable_unprepare(hdev->clk);
2472
2473 return ret;
2474}
2475
2476static void stm32_hash_remove(struct platform_device *pdev)
2477{
2478 struct stm32_hash_dev *hdev = platform_get_drvdata(pdev);
2479 int ret;
2480
2481 ret = pm_runtime_get_sync(hdev->dev);
2482
2483 stm32_hash_unregister_algs(hdev);
2484
2485 crypto_engine_exit(hdev->engine);
2486
2487 spin_lock(&stm32_hash.lock);
2488 list_del(&hdev->list);
2489 spin_unlock(&stm32_hash.lock);
2490
2491 if (hdev->dma_lch)
2492 dma_release_channel(hdev->dma_lch);
2493
2494 pm_runtime_disable(hdev->dev);
2495 pm_runtime_put_noidle(hdev->dev);
2496
2497 if (ret >= 0)
2498 clk_disable_unprepare(hdev->clk);
2499}
2500
2501#ifdef CONFIG_PM
2502static int stm32_hash_runtime_suspend(struct device *dev)
2503{
2504 struct stm32_hash_dev *hdev = dev_get_drvdata(dev);
2505
2506 clk_disable_unprepare(hdev->clk);
2507
2508 return 0;
2509}
2510
2511static int stm32_hash_runtime_resume(struct device *dev)
2512{
2513 struct stm32_hash_dev *hdev = dev_get_drvdata(dev);
2514 int ret;
2515
2516 ret = clk_prepare_enable(hdev->clk);
2517 if (ret) {
2518 dev_err(hdev->dev, "Failed to prepare_enable clock\n");
2519 return ret;
2520 }
2521
2522 return 0;
2523}
2524#endif
2525
2526static const struct dev_pm_ops stm32_hash_pm_ops = {
2527 SET_SYSTEM_SLEEP_PM_OPS(pm_runtime_force_suspend,
2528 pm_runtime_force_resume)
2529 SET_RUNTIME_PM_OPS(stm32_hash_runtime_suspend,
2530 stm32_hash_runtime_resume, NULL)
2531};
2532
2533static struct platform_driver stm32_hash_driver = {
2534 .probe = stm32_hash_probe,
2535 .remove = stm32_hash_remove,
2536 .driver = {
2537 .name = "stm32-hash",
2538 .pm = &stm32_hash_pm_ops,
2539 .of_match_table = stm32_hash_of_match,
2540 }
2541};
2542
2543module_platform_driver(stm32_hash_driver);
2544
2545MODULE_DESCRIPTION("STM32 SHA1/SHA2/SHA3 & MD5 (HMAC) hw accelerator driver");
2546MODULE_AUTHOR("Lionel Debieve <lionel.debieve@st.com>");
2547MODULE_LICENSE("GPL v2");