Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3054718pxj; Mon, 14 Jun 2021 13:18:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwDA+HoVWl5J0oOns9Pn06Dt/mdNsY5wMZEp9312bKo57agBqT7ZRhn++L8fV81eSSd9ZRj X-Received: by 2002:a50:fd81:: with SMTP id o1mr18890180edt.382.1623701911675; Mon, 14 Jun 2021 13:18:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623701911; cv=none; d=google.com; s=arc-20160816; b=Abtg89edoxyUgTiWwoOpJ3fUuuX8E6mo8FvHFRgQ9Da+OksS96oKtvioQw7GfYO3GF X41hw92xhQEDkUjJ3DQ9MdQDEI6F93+j+9f+dLwWB2ctyLq9Ny8hd8QVfA2TXGf+darj u04YW1vvU2nO/CxKtVchrbYVwg5D/ph4HzHVQ5M3y/JLBS91faYeVGz+9CLHMB71qOF5 cc9+RWw2McL5QEBJPhgTRghs8plseUglgtmxb4NAVe1DJoJLxIZhX+8VbrInUXBcSbxp oJXXHL3jMFj23D+20Lr8WhKSS0OyiERIFlrjjVb6TXlRjd4TI9upSztUsY6QGsbqor9B TBZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=9EgVoIzSPTic7CbhE4o9NPE3LbMIqVNJBfv/wdD/7ow=; b=pJAwT1UmYF9kEx7BOlN4OJ1i5CQfRCVc3tl/VYjtr+z7ayOEPfG3o107MVtv8sq6SA Ldiu7CXKgUPqB17g+F6+QMvBQVp4hDawlEiX2agF2w4FZR4J25pkJsLd+w3F7MNrA1rl akbBZJXNw+J74oMskg54TgqXs2vHTSjinbWG0XlrpiEZMKRYIF52Yvu8CKSLd6MvnrMa 7bjGMCijBHB5gxZgznjeggzn5rOFSbPORfpwPo8eqV/MPAeb/6Id1Q2/L+a9H5xHtpDQ uFXKamHcS/eFFCNj74XGp4/OXRIGhspHGVqaMV4VjCRkgyi46CRAswAVGWXKlk7DvWQo QiYg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e3si12118706eds.41.2021.06.14.13.18.09; Mon, 14 Jun 2021 13:18:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234510AbhFNUSs (ORCPT + 99 others); Mon, 14 Jun 2021 16:18:48 -0400 Received: from lilium.sigma-star.at ([109.75.188.150]:59108 "EHLO lilium.sigma-star.at" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233244AbhFNUSo (ORCPT ); Mon, 14 Jun 2021 16:18:44 -0400 Received: from localhost (localhost [127.0.0.1]) by lilium.sigma-star.at (Postfix) with ESMTP id 093011817A0CF; Mon, 14 Jun 2021 22:16:37 +0200 (CEST) Received: from lilium.sigma-star.at ([127.0.0.1]) by localhost (lilium.sigma-star.at [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id 3etoU-Nb0K0y; Mon, 14 Jun 2021 22:16:35 +0200 (CEST) Received: from lilium.sigma-star.at ([127.0.0.1]) by localhost (lilium.sigma-star.at [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id YZRu3oErkG0w; Mon, 14 Jun 2021 22:16:35 +0200 (CEST) From: Richard Weinberger To: keyrings@vger.kernel.org Cc: Richard Weinberger , Ahmad Fatoum , David Gstir , David Howells , "David S. Miller" , Fabio Estevam , Herbert Xu , James Bottomley , James Morris , Jarkko Sakkinen , Jonathan Corbet , linux-arm-kernel@lists.infradead.org, linux-crypto@vger.kernel.org, linux-doc@vger.kernel.org, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, Mimi Zohar , NXP Linux Team , Pengutronix Kernel Team , Sascha Hauer , "Serge E. Hallyn" , Shawn Guo Subject: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys Date: Mon, 14 Jun 2021 22:16:18 +0200 Message-Id: <20210614201620.30451-2-richard@nod.at> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20210614201620.30451-1-richard@nod.at> References: <20210614201620.30451-1-richard@nod.at> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org DCP is capable to performing AES with hardware-bound keys. These keys are not stored in main memory and are therefore not directly accessible by the operating system. So instead of feeding the key into DCP, we need to place a reference to such a key before initiating the crypto operation. Keys are referenced by a one byte identifiers. DCP supports 6 different keys: 4 slots in the secure memory area, a one time programmable key which can be burnt via on-chip fuses and an unique device key. Using these keys is restricted to in-kernel users that use them as buildi= ng block for other crypto tools such as trusted keys. Allowing userspace (e.g. via AF_ALG) to use these keys to crypt or decrypt data is a securit= y risk, because there is no access control mechanism. Cc: Ahmad Fatoum Cc: David Gstir Cc: David Howells Cc: "David S. Miller" Cc: Fabio Estevam Cc: Herbert Xu Cc: James Bottomley Cc: James Morris Cc: Jarkko Sakkinen Cc: Jonathan Corbet Cc: keyrings@vger.kernel.org Cc: linux-arm-kernel@lists.infradead.org Cc: linux-crypto@vger.kernel.org Cc: linux-doc@vger.kernel.org Cc: linux-integrity@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: linux-security-module@vger.kernel.org Cc: Mimi Zohar Cc: NXP Linux Team Cc: Pengutronix Kernel Team Cc: Richard Weinberger Cc: Sascha Hauer Cc: "Serge E. Hallyn" Cc: Shawn Guo Co-developed-by: David Gstir Signed-off-by: David Gstir Signed-off-by: Richard Weinberger --- drivers/crypto/mxs-dcp.c | 110 ++++++++++++++++++++++++++++++++++----- include/linux/mxs-dcp.h | 19 +++++++ 2 files changed, 117 insertions(+), 12 deletions(-) create mode 100644 include/linux/mxs-dcp.h diff --git a/drivers/crypto/mxs-dcp.c b/drivers/crypto/mxs-dcp.c index d6a7784d2988..c3e0c0ccbc20 100644 --- a/drivers/crypto/mxs-dcp.c +++ b/drivers/crypto/mxs-dcp.c @@ -15,6 +15,7 @@ #include #include #include +#include =20 #include #include @@ -101,6 +102,7 @@ struct dcp_async_ctx { struct crypto_skcipher *fallback; unsigned int key_len; uint8_t key[AES_KEYSIZE_128]; + bool refkey; }; =20 struct dcp_aes_req_ctx { @@ -155,6 +157,7 @@ static struct dcp *global_sdcp; #define MXS_DCP_CONTROL0_HASH_TERM (1 << 13) #define MXS_DCP_CONTROL0_HASH_INIT (1 << 12) #define MXS_DCP_CONTROL0_PAYLOAD_KEY (1 << 11) +#define MXS_DCP_CONTROL0_OTP_KEY (1 << 10) #define MXS_DCP_CONTROL0_CIPHER_ENCRYPT (1 << 8) #define MXS_DCP_CONTROL0_CIPHER_INIT (1 << 9) #define MXS_DCP_CONTROL0_ENABLE_HASH (1 << 6) @@ -168,6 +171,8 @@ static struct dcp *global_sdcp; #define MXS_DCP_CONTROL1_CIPHER_MODE_ECB (0 << 4) #define MXS_DCP_CONTROL1_CIPHER_SELECT_AES128 (0 << 0) =20 +#define MXS_DCP_CONTROL1_KEY_SELECT_SHIFT 8 + static int mxs_dcp_start_dma(struct dcp_async_ctx *actx) { struct dcp *sdcp =3D global_sdcp; @@ -219,15 +224,18 @@ static int mxs_dcp_run_aes(struct dcp_async_ctx *ac= tx, struct dcp *sdcp =3D global_sdcp; struct dcp_dma_desc *desc =3D &sdcp->coh->desc[actx->chan]; struct dcp_aes_req_ctx *rctx =3D skcipher_request_ctx(req); + dma_addr_t src_phys, dst_phys, key_phys =3D {0}; + bool key_referenced =3D actx->refkey; int ret; =20 - dma_addr_t key_phys =3D dma_map_single(sdcp->dev, sdcp->coh->aes_key, - 2 * AES_KEYSIZE_128, - DMA_TO_DEVICE); - dma_addr_t src_phys =3D dma_map_single(sdcp->dev, sdcp->coh->aes_in_buf= , - DCP_BUF_SZ, DMA_TO_DEVICE); - dma_addr_t dst_phys =3D dma_map_single(sdcp->dev, sdcp->coh->aes_out_bu= f, - DCP_BUF_SZ, DMA_FROM_DEVICE); + if (!key_referenced) { + key_phys =3D dma_map_single(sdcp->dev, sdcp->coh->aes_key, + 2 * AES_KEYSIZE_128, DMA_TO_DEVICE); + } + src_phys =3D dma_map_single(sdcp->dev, sdcp->coh->aes_in_buf, DCP_BUF_S= Z, + DMA_TO_DEVICE); + dst_phys =3D dma_map_single(sdcp->dev, sdcp->coh->aes_out_buf, DCP_BUF_= SZ, + DMA_FROM_DEVICE); =20 if (actx->fill % AES_BLOCK_SIZE) { dev_err(sdcp->dev, "Invalid block size!\n"); @@ -240,8 +248,13 @@ static int mxs_dcp_run_aes(struct dcp_async_ctx *act= x, MXS_DCP_CONTROL0_INTERRUPT | MXS_DCP_CONTROL0_ENABLE_CIPHER; =20 - /* Payload contains the key. */ - desc->control0 |=3D MXS_DCP_CONTROL0_PAYLOAD_KEY; + if (key_referenced) { + /* Set OTP key bit to select the key via KEY_SELECT. */ + desc->control0 |=3D MXS_DCP_CONTROL0_OTP_KEY; + } else { + /* Payload contains the key. */ + desc->control0 |=3D MXS_DCP_CONTROL0_PAYLOAD_KEY; + } =20 if (rctx->enc) desc->control0 |=3D MXS_DCP_CONTROL0_CIPHER_ENCRYPT; @@ -255,6 +268,9 @@ static int mxs_dcp_run_aes(struct dcp_async_ctx *actx= , else desc->control1 |=3D MXS_DCP_CONTROL1_CIPHER_MODE_CBC; =20 + if (key_referenced) + desc->control1 |=3D sdcp->coh->aes_key[0] << MXS_DCP_CONTROL1_KEY_SELE= CT_SHIFT; + desc->next_cmd_addr =3D 0; desc->source =3D src_phys; desc->destination =3D dst_phys; @@ -265,8 +281,10 @@ static int mxs_dcp_run_aes(struct dcp_async_ctx *act= x, ret =3D mxs_dcp_start_dma(actx); =20 aes_done_run: - dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, - DMA_TO_DEVICE); + if (!key_referenced) { + dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, + DMA_TO_DEVICE); + } dma_unmap_single(sdcp->dev, src_phys, DCP_BUF_SZ, DMA_TO_DEVICE); dma_unmap_single(sdcp->dev, dst_phys, DCP_BUF_SZ, DMA_FROM_DEVICE); =20 @@ -454,7 +472,7 @@ static int mxs_dcp_aes_enqueue(struct skcipher_reques= t *req, int enc, int ecb) struct dcp_aes_req_ctx *rctx =3D skcipher_request_ctx(req); int ret; =20 - if (unlikely(actx->key_len !=3D AES_KEYSIZE_128)) + if (unlikely(actx->key_len !=3D AES_KEYSIZE_128 && !actx->refkey)) return mxs_dcp_block_fallback(req, enc); =20 rctx->enc =3D enc; @@ -501,6 +519,7 @@ static int mxs_dcp_aes_setkey(struct crypto_skcipher = *tfm, const u8 *key, * there can still be an operation in progress. */ actx->key_len =3D len; + actx->refkey =3D false; if (len =3D=3D AES_KEYSIZE_128) { memcpy(actx->key, key, len); return 0; @@ -517,6 +536,33 @@ static int mxs_dcp_aes_setkey(struct crypto_skcipher= *tfm, const u8 *key, return crypto_skcipher_setkey(actx->fallback, key, len); } =20 +static int mxs_dcp_aes_setrefkey(struct crypto_skcipher *tfm, const u8 *= key, + unsigned int len) +{ + struct dcp_async_ctx *actx =3D crypto_skcipher_ctx(tfm); + int ret =3D -EINVAL; + + if (len !=3D DCP_PAES_KEYSIZE) + goto out; + + actx->key_len =3D len; + actx->refkey =3D true; + + switch (key[0]) { + case DCP_PAES_KEY_SLOT0: + case DCP_PAES_KEY_SLOT1: + case DCP_PAES_KEY_SLOT2: + case DCP_PAES_KEY_SLOT3: + case DCP_PAES_KEY_UNIQUE: + case DCP_PAES_KEY_OTP: + memcpy(actx->key, key, len); + ret =3D 0; + } + +out: + return ret; +} + static int mxs_dcp_aes_fallback_init_tfm(struct crypto_skcipher *tfm) { const char *name =3D crypto_tfm_alg_name(crypto_skcipher_tfm(tfm)); @@ -540,6 +586,13 @@ static void mxs_dcp_aes_fallback_exit_tfm(struct cry= pto_skcipher *tfm) crypto_free_skcipher(actx->fallback); } =20 +static int mxs_dcp_paes_init_tfm(struct crypto_skcipher *tfm) +{ + crypto_skcipher_set_reqsize(tfm, sizeof(struct dcp_aes_req_ctx)); + + return 0; +} + /* * Hashing (SHA1/SHA256) */ @@ -882,6 +935,39 @@ static struct skcipher_alg dcp_aes_algs[] =3D { .ivsize =3D AES_BLOCK_SIZE, .init =3D mxs_dcp_aes_fallback_init_tfm, .exit =3D mxs_dcp_aes_fallback_exit_tfm, + }, { + .base.cra_name =3D "ecb(paes)", + .base.cra_driver_name =3D "ecb-paes-dcp", + .base.cra_priority =3D 401, + .base.cra_alignmask =3D 15, + .base.cra_flags =3D CRYPTO_ALG_ASYNC | CRYPTO_ALG_INTERNAL, + .base.cra_blocksize =3D AES_BLOCK_SIZE, + .base.cra_ctxsize =3D sizeof(struct dcp_async_ctx), + .base.cra_module =3D THIS_MODULE, + + .min_keysize =3D DCP_PAES_KEYSIZE, + .max_keysize =3D DCP_PAES_KEYSIZE, + .setkey =3D mxs_dcp_aes_setrefkey, + .encrypt =3D mxs_dcp_aes_ecb_encrypt, + .decrypt =3D mxs_dcp_aes_ecb_decrypt, + .init =3D mxs_dcp_paes_init_tfm, + }, { + .base.cra_name =3D "cbc(paes)", + .base.cra_driver_name =3D "cbc-paes-dcp", + .base.cra_priority =3D 401, + .base.cra_alignmask =3D 15, + .base.cra_flags =3D CRYPTO_ALG_ASYNC | CRYPTO_ALG_INTERNAL, + .base.cra_blocksize =3D AES_BLOCK_SIZE, + .base.cra_ctxsize =3D sizeof(struct dcp_async_ctx), + .base.cra_module =3D THIS_MODULE, + + .min_keysize =3D DCP_PAES_KEYSIZE, + .max_keysize =3D DCP_PAES_KEYSIZE, + .setkey =3D mxs_dcp_aes_setrefkey, + .encrypt =3D mxs_dcp_aes_cbc_encrypt, + .decrypt =3D mxs_dcp_aes_cbc_decrypt, + .ivsize =3D AES_BLOCK_SIZE, + .init =3D mxs_dcp_paes_init_tfm, }, }; =20 diff --git a/include/linux/mxs-dcp.h b/include/linux/mxs-dcp.h new file mode 100644 index 000000000000..df6678ee10a1 --- /dev/null +++ b/include/linux/mxs-dcp.h @@ -0,0 +1,19 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Copyright (C) 2021 sigma star gmbh + * Authors: David Gstir + * Richard Weinberger + */ + +#ifndef MXS_DCP_H +#define MXS_DCP_H + +#define DCP_PAES_KEYSIZE 1 +#define DCP_PAES_KEY_SLOT0 0x00 +#define DCP_PAES_KEY_SLOT1 0x01 +#define DCP_PAES_KEY_SLOT2 0x02 +#define DCP_PAES_KEY_SLOT3 0x03 +#define DCP_PAES_KEY_UNIQUE 0xfe +#define DCP_PAES_KEY_OTP 0xff + +#endif /* MXS_DCP_H */ --=20 2.26.2