Received: by 2002:a25:d783:0:0:0:0:0 with SMTP id o125csp815912ybg; Thu, 19 Mar 2020 09:14:32 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvKpoffSk42VcyaPuzE1fVoBetvb7Eru0JQy6RatSNG3zijPK63vbenk/T6FD4fTfidXKxm X-Received: by 2002:aca:fd44:: with SMTP id b65mr2777820oii.119.1584634472262; Thu, 19 Mar 2020 09:14:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584634472; cv=none; d=google.com; s=arc-20160816; b=emWvwMFG6RsWIy2bJgceYW5UIHnVSnUai7OUAs1UCxL6TT62QHVfbqlXmEnZRt4GcZ 4K4c8Ouc41xkIeL0hf64JXA8nTASRlaAMq+Kem0WxkIXQreoe+sRF4yvjofDv5Oev6xg LmwHMQnmRpwBpuB00wDgGu4GdtyoZblkJE0NdU4QF+JMvS4RWKGIuT/D1sLPVYmM0z7N YCyrbw0EA1CpvqgOt54AAPAfJwaNtXcju4xpjDOhFg48jelyazW30iwk83/PNNEY3Jxt Ei/yCYTxmvzeaBXHmNt+ARUZ8CvyTEMu5C52nODmra7ZCepbSzErz+XjQnNXnewalkPd 6o4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=JqqHZc4mDxy3aXLOeDIjzEXKU4xYTgoxmYnKR8gehFo=; b=tjEiP7qkMQPGU77eAGyM/7tZbkTwPHktraRbbw0dcZWYo6tVTd06PC84IS1Etz0l/u CiLr/TMmCt0ke1xO2bdwr3VqmBLdVaFVUudfgK8CAqNsSoNCJKF0Iv2IpTOvjqXBvDKf +PmTKxxMJZYIZishoRF+fIn4LQglLiWESkJupZIEkXgBKwdV2hhHpJpKqH5Aq/HlCKFe 7l+PuoiQFStB/cR5G++SrRifqoVy5V/14C95yUoFFnWcPiuONeCuuZIfmZjN7AFhkYRA zYoU4CElXhdAiZDaXsyInunvupCic8WnKw7nnn/m/gSsEbVzU4lt2x0za2snqgtt0pJt cW/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="HjM+U9z/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t6si1436018otc.27.2020.03.19.09.14.19; Thu, 19 Mar 2020 09:14:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="HjM+U9z/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728470AbgCSQNR (ORCPT + 99 others); Thu, 19 Mar 2020 12:13:17 -0400 Received: from mail-pl1-f194.google.com ([209.85.214.194]:35945 "EHLO mail-pl1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728451AbgCSQNP (ORCPT ); Thu, 19 Mar 2020 12:13:15 -0400 Received: by mail-pl1-f194.google.com with SMTP id g2so1260669plo.3; Thu, 19 Mar 2020 09:13:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=JqqHZc4mDxy3aXLOeDIjzEXKU4xYTgoxmYnKR8gehFo=; b=HjM+U9z/XZTlYhdv3Sk+x3hZJ6CpC/cdHsB3IK2QTz6jfjPtDIXz0ab4FAVKVT9Wyr 3CiF5xRdQKogS/l6wsdAiysCwl7WImUBvRM4Uh8FnhgIxIfdd77NzfYVIWs0uH5txoKH f88ABy/7kIomD0XBZMCfGfxKTmLI+kFMZgLzG/PFDgZIX93J8nJGEn64AtE1m0yIkINl uaAx/nt3pGichXQm6rHsAszPiT7rOA4LJ4E97cuZvi9ZXqcMEbJIeTkxncLdLVKhqZ0J 5KSBYarfHTXkWd8bJY1U9zQqtbHaNcf463uTh/47OkVCZc2rg2796wrg1I9GD0XZpC7Z WLMQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=JqqHZc4mDxy3aXLOeDIjzEXKU4xYTgoxmYnKR8gehFo=; b=QEOr9nNbJMKZsB8mqhWyn3pxF69D+g8ptqRondKVaHayPEzioi5Ofh/iAfbcCYmNR9 Lp51AQdhrHrA/OVRGCviVamsxdrh1d9098CjhAhKG7o3Hj7o2eFTvTbsfm9VAQjk3Jee d1ikwyEbaq34qVC7wepO1Xb85BAJ5fEQrem15CuAYwqkEblBzZpaGA5QHNd1RI58jeDK 2zwy2RBrRi03VfrJZHsaH4NjHiHwJSg63ngjD8rDbemLP+7sCgENGpIEnAMeMwg+Vi2P nHoJyKf7teMLi22IW96CgmUpFcbq0SWMIHsitCIQOG+PaHcWs+mgUQn658lL1w3CFCjH wTew== X-Gm-Message-State: ANhLgQ0gQqXalqSgLUTt54llPrRr0cuN+htR2LO0pDFYsXybo6/fXz+j B7YCiK52GuO2W00jGK78h5+wz43l X-Received: by 2002:a17:90a:8403:: with SMTP id j3mr4685474pjn.8.1584634393466; Thu, 19 Mar 2020 09:13:13 -0700 (PDT) Received: from localhost.localdomain (c-67-165-113-11.hsd1.wa.comcast.net. [67.165.113.11]) by smtp.gmail.com with ESMTPSA id x189sm3000078pfb.1.2020.03.19.09.13.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 19 Mar 2020 09:13:12 -0700 (PDT) From: Andrey Smirnov To: linux-crypto@vger.kernel.org Cc: Andrey Smirnov , =?UTF-8?q?Horia=20Geant=C4=83?= , Chris Healy , Lucas Stach , Herbert Xu , Iuliana Prodan , linux-kernel@vger.kernel.org, linux-imx@nxp.com Subject: [PATCH v9 9/9] crypto: caam - limit single JD RNG output to maximum of 16 bytes Date: Thu, 19 Mar 2020 09:12:33 -0700 Message-Id: <20200319161233.8134-10-andrew.smirnov@gmail.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20200319161233.8134-1-andrew.smirnov@gmail.com> References: <20200319161233.8134-1-andrew.smirnov@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In order to follow recommendation in SP800-90C (section "9.4 The Oversampling-NRBG Construction") limit the output of "generate" JD submitted to CAAM. See https://lore.kernel.org/linux-crypto/VI1PR0402MB3485EF10976A4A69F90E5B0F98580@VI1PR0402MB3485.eurprd04.prod.outlook.com/ for more details. This change should make CAAM's hwrng driver good enough to have 1024 quality rating. Signed-off-by: Andrey Smirnov Reviewed-by: Horia Geantă Cc: Chris Healy Cc: Lucas Stach Cc: Horia Geantă Cc: Herbert Xu Cc: Iuliana Prodan Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: linux-imx@nxp.com --- drivers/crypto/caam/caamrng.c | 21 +++++++++++---------- 1 file changed, 11 insertions(+), 10 deletions(-) diff --git a/drivers/crypto/caam/caamrng.c b/drivers/crypto/caam/caamrng.c index 988bfddbadc6..77d048dfe5d0 100644 --- a/drivers/crypto/caam/caamrng.c +++ b/drivers/crypto/caam/caamrng.c @@ -22,9 +22,7 @@ #include "jr.h" #include "error.h" -#define CAAM_RNG_MAX_FIFO_STORE_SIZE U16_MAX - -#define CAAM_RNG_FIFO_LEN SZ_32K /* Must be a multiple of 2 */ +#define CAAM_RNG_MAX_FIFO_STORE_SIZE 16 /* * Length of used descriptors, see caam_init_desc() @@ -65,14 +63,15 @@ static void caam_rng_done(struct device *jrdev, u32 *desc, u32 err, complete(jctx->done); } -static u32 *caam_init_desc(u32 *desc, dma_addr_t dst_dma, int len) +static u32 *caam_init_desc(u32 *desc, dma_addr_t dst_dma) { init_job_desc(desc, 0); /* + 1 cmd_sz */ /* Generate random bytes: + 1 cmd_sz */ append_operation(desc, OP_ALG_ALGSEL_RNG | OP_TYPE_CLASS1_ALG | OP_ALG_PR_ON); /* Store bytes: + 1 cmd_sz + caam_ptr_sz */ - append_fifo_store(desc, dst_dma, len, FIFOST_TYPE_RNGSTORE); + append_fifo_store(desc, dst_dma, + CAAM_RNG_MAX_FIFO_STORE_SIZE, FIFOST_TYPE_RNGSTORE); print_hex_dump_debug("rng job desc@: ", DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1); @@ -92,7 +91,7 @@ static int caam_rng_read_one(struct device *jrdev, .err = &ret, }; - len = min_t(int, len, CAAM_RNG_MAX_FIFO_STORE_SIZE); + len = CAAM_RNG_MAX_FIFO_STORE_SIZE; dst_dma = dma_map_single(jrdev, dst, len, DMA_FROM_DEVICE); if (dma_mapping_error(jrdev, dst_dma)) { @@ -102,7 +101,7 @@ static int caam_rng_read_one(struct device *jrdev, init_completion(done); err = caam_jr_enqueue(jrdev, - caam_init_desc(desc, dst_dma, len), + caam_init_desc(desc, dst_dma), caam_rng_done, &jctx); if (err == -EINPROGRESS) { wait_for_completion(done); @@ -122,7 +121,7 @@ static void caam_rng_fill_async(struct caam_rng_ctx *ctx) sg_init_table(sg, ARRAY_SIZE(sg)); nents = kfifo_dma_in_prepare(&ctx->fifo, sg, ARRAY_SIZE(sg), - CAAM_RNG_FIFO_LEN); + CAAM_RNG_MAX_FIFO_STORE_SIZE); if (!nents) return; @@ -156,7 +155,7 @@ static int caam_read(struct hwrng *rng, void *dst, size_t max, bool wait) } out = kfifo_out(&ctx->fifo, dst, max); - if (kfifo_len(&ctx->fifo) <= CAAM_RNG_FIFO_LEN / 2) + if (kfifo_is_empty(&ctx->fifo)) schedule_work(&ctx->worker); return out; @@ -186,7 +185,8 @@ static int caam_init(struct hwrng *rng) if (!ctx->desc_async) return -ENOMEM; - if (kfifo_alloc(&ctx->fifo, CAAM_RNG_FIFO_LEN, GFP_DMA | GFP_KERNEL)) + if (kfifo_alloc(&ctx->fifo, CAAM_RNG_MAX_FIFO_STORE_SIZE, + GFP_DMA | GFP_KERNEL)) return -ENOMEM; INIT_WORK(&ctx->worker, caam_rng_worker); @@ -246,6 +246,7 @@ int caam_rng_init(struct device *ctrldev) ctx->rng.cleanup = caam_cleanup; ctx->rng.read = caam_read; ctx->rng.priv = (unsigned long)ctx; + ctx->rng.quality = 1024; dev_info(ctrldev, "registering rng-caam\n"); -- 2.21.0