]> git.karo-electronics.de Git - karo-tx-uboot.git/blobdiff - drivers/crypto/fsl/jobdesc.c
crypto/fsl: Add command for encapsulating/decapsulating blobs
[karo-tx-uboot.git] / drivers / crypto / fsl / jobdesc.c
index cbe5c3020e0d81f4a53016d5bccb71a76d859243..1386baec0fda45a54e7d9664a92cef90d3c6e150 100644 (file)
@@ -12,6 +12,9 @@
 #include "desc_constr.h"
 #include "jobdesc.h"
 
+#define KEY_BLOB_SIZE                  32
+#define MAC_SIZE                       16
+
 void inline_cnstr_jobdesc_hash(uint32_t *desc,
                          const uint8_t *msg, uint32_t msgsz, uint8_t *digest,
                          u32 alg_type, uint32_t alg_size, int sg_tbl)
@@ -43,3 +46,80 @@ void inline_cnstr_jobdesc_hash(uint32_t *desc,
        append_store(desc, dma_addr_out, storelen,
                     LDST_CLASS_2_CCB | LDST_SRCDST_BYTE_CONTEXT);
 }
+
+void inline_cnstr_jobdesc_blob_encap(uint32_t *desc, uint8_t *key_idnfr,
+                                    uint8_t *plain_txt, uint8_t *enc_blob,
+                                    uint32_t in_sz)
+{
+       dma_addr_t dma_addr_key_idnfr, dma_addr_in, dma_addr_out;
+       uint32_t key_sz = KEY_IDNFR_SZ_BYTES;
+       /* output blob will have 32 bytes key blob in beginning and
+        * 16 byte HMAC identifier at end of data blob */
+       uint32_t out_sz = in_sz + KEY_BLOB_SIZE + MAC_SIZE;
+
+       dma_addr_key_idnfr = virt_to_phys((void *)key_idnfr);
+       dma_addr_in     = virt_to_phys((void *)plain_txt);
+       dma_addr_out    = virt_to_phys((void *)enc_blob);
+
+       init_job_desc(desc, 0);
+
+       append_key(desc, dma_addr_key_idnfr, key_sz, CLASS_2);
+
+       append_seq_in_ptr(desc, dma_addr_in, in_sz, 0);
+
+       append_seq_out_ptr(desc, dma_addr_out, out_sz, 0);
+
+       append_operation(desc, OP_TYPE_ENCAP_PROTOCOL | OP_PCLID_BLOB);
+}
+
+void inline_cnstr_jobdesc_blob_decap(uint32_t *desc, uint8_t *key_idnfr,
+                                    uint8_t *enc_blob, uint8_t *plain_txt,
+                                    uint32_t out_sz)
+{
+       dma_addr_t dma_addr_key_idnfr, dma_addr_in, dma_addr_out;
+       uint32_t key_sz = KEY_IDNFR_SZ_BYTES;
+       uint32_t in_sz = out_sz + KEY_BLOB_SIZE + MAC_SIZE;
+
+       dma_addr_key_idnfr = virt_to_phys((void *)key_idnfr);
+       dma_addr_in     = virt_to_phys((void *)enc_blob);
+       dma_addr_out    = virt_to_phys((void *)plain_txt);
+
+       init_job_desc(desc, 0);
+
+       append_key(desc, dma_addr_key_idnfr, key_sz, CLASS_2);
+
+       append_seq_in_ptr(desc, dma_addr_in, in_sz, 0);
+
+       append_seq_out_ptr(desc, dma_addr_out, out_sz, 0);
+
+       append_operation(desc, OP_TYPE_DECAP_PROTOCOL | OP_PCLID_BLOB);
+}
+
+/*
+ * Descriptor to instantiate RNG State Handle 0 in normal mode and
+ * load the JDKEK, TDKEK and TDSK registers
+ */
+void inline_cnstr_jobdesc_rng_instantiation(uint32_t *desc)
+{
+       u32 *jump_cmd;
+
+       init_job_desc(desc, 0);
+
+       /* INIT RNG in non-test mode */
+       append_operation(desc, OP_TYPE_CLASS1_ALG | OP_ALG_ALGSEL_RNG |
+                        OP_ALG_AS_INIT);
+
+       /* wait for done */
+       jump_cmd = append_jump(desc, JUMP_CLASS_CLASS1);
+       set_jump_tgt_here(desc, jump_cmd);
+
+       /*
+        * load 1 to clear written reg:
+        * resets the done interrrupt and returns the RNG to idle.
+        */
+       append_load_imm_u32(desc, 1, LDST_SRCDST_WORD_CLRW);
+
+       /* generate secure keys (non-test) */
+       append_operation(desc, OP_TYPE_CLASS1_ALG | OP_ALG_ALGSEL_RNG |
+                        OP_ALG_RNG4_SK);
+}