Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3413054ybi; Mon, 17 Jun 2019 23:59:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqwZ3vGlTY4kQlEGd0OewU0DnhdVKKRwvDL8WwKiisAoeppelOlt0An642Ulq17ZZnrLSwOY X-Received: by 2002:a63:f817:: with SMTP id n23mr1269327pgh.35.1560841154411; Mon, 17 Jun 2019 23:59:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560841154; cv=none; d=google.com; s=arc-20160816; b=NmoqpPkxLEPU5isbbq0owuc2wPwTMl5/wJ8ZousuSe7j+Tj2aNw+GWXrnj/QXzs7Hw /7VN6Wudf2VQ5OYVjnLH2ckrN8NCSnCLkUGs6dTeQGkKZLjpy94HpU6O7WqB+Rz3glND M5q5LBdA62YXf2sntfvQ7E3Kwe3mK9IiB8kHFQbxLnVnMI0Xu+//lBjufuN+u8oD+GaZ yHqfV1Xeut8n9/w3ls21tCP1FWhaWFpLlKpSsqaAoSGK3vo57phCa4KlFtW/MWxsdCQ7 EKf1AfftTwWw0vb09nvNWlGheztEUMEYFCP+JW/4yvQ85YbsMjuJp/VnbR4r7a/3efAU uaMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=x33f+0NIrmIewXwhkH22a/5YnyzCPmNiHgFDHQGNfMw=; b=b1yn/ZnjDYXL7Xz8HUhVk02OmP50+At15d9S0S/qhVS0vxzI4htF4aKKdGLS0UWlfN x1iKkm4SlaQfaIz2B2vwdJZiIj55q3OLb+kiDXF+g9d9tr4s7Ewa6qkO90UbegUVdPAJ Isifh4WYjTj9j+EFB6IPQkSfmuv3S57kVJXhheHsrWjbyjfEcuZ0WAtf+zm2//A9KUeD x8kbNjsdetL4fYI4LX5JV8XASznQXK7D4H96Bo4ZBg4M5EFF5oNUIyEN7Yxo07jjQUKK OPYc8SVOoQrw1FCu1oe+z2P2tbM8fk90MINZyVmqQyxHkJC9qjINSTU43qW3o3tK1B8f JDow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=MU8UR8hf; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c3si12492975pfr.27.2019.06.17.23.59.01; Mon, 17 Jun 2019 23:59:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=MU8UR8hf; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726723AbfFRG65 (ORCPT + 99 others); Tue, 18 Jun 2019 02:58:57 -0400 Received: from mail-ed1-f68.google.com ([209.85.208.68]:35905 "EHLO mail-ed1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726330AbfFRG65 (ORCPT ); Tue, 18 Jun 2019 02:58:57 -0400 Received: by mail-ed1-f68.google.com with SMTP id k21so20050314edq.3 for ; Mon, 17 Jun 2019 23:58:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=x33f+0NIrmIewXwhkH22a/5YnyzCPmNiHgFDHQGNfMw=; b=MU8UR8hfQMRY5DR+ktKI+wekwVUUepLsmN1Qa0HiSfZLCpcxoHVERkgFwo4ZxAKI1y dB58pBqT2JvCxYloddoS6/rSaRd1a61QIc4M3PN/PpFQUWEOcTbbuCGH/WAZoLKuTVM5 lWaZaHmcccQ4mGZnHpVYt1STGttQa2JUaSnifmghRDBPpEl/fbTGJlRQPu13vDudLIYx WIPfCMP535eMfL2q9PHS4ySZnE/E5Xnpepq2c3g9FgL6sPTVXyNzm4wpw7Gs9MKEzkWa QYLXT30GY6oWj+Zp0PpSA/aP8BVNSLXKuRpoaG2eV6IazHbAYF4jx92Kc/C9zc9carDe xkxA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=x33f+0NIrmIewXwhkH22a/5YnyzCPmNiHgFDHQGNfMw=; b=OalsJMHkBw5qK22wnOmAmAV4wXIOaQBh3tAlXEEpduLzeQbD9n7CzR7FyN/PpxlNwR NFHZoYX19/CeKJI1sI49HWm+C6w+AKQV/tFY9MQSp6CuJInuvv3uEIyCM8552syDFhwx zlo2XV6GGHDti3kaZbxzMNqv+5eJwdddcC4xpTiDdts9CFr+7mP8JSByujZ924djo1Nq 4MUHJQfSjn0w98aHMTnwpHgTwEyJK6Y7CdMmwfKGjtzGmjKQ/m4Ryem4L8EXllXDzvsv 77KFuLry7jmO6LrLvaFKsZ++81IQ53FGcwMM0YSZOJUwiytC8pPGqPOJH3H8OQvQERre Ws1g== X-Gm-Message-State: APjAAAUs4W4QZcpeHTlcP523hobJkAEsp5UAo+G/Xoxo3yqY2w7yMpi9 AFkNTIOnNkg8A/EagbX5CFr4ghFJ X-Received: by 2002:a17:906:2347:: with SMTP id m7mr39663872eja.275.1560841136102; Mon, 17 Jun 2019 23:58:56 -0700 (PDT) Received: from localhost.localdomain.com ([188.204.2.113]) by smtp.gmail.com with ESMTPSA id q2sm2602291ejk.46.2019.06.17.23.58.55 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 17 Jun 2019 23:58:55 -0700 (PDT) From: Pascal van Leeuwen X-Google-Original-From: Pascal van Leeuwen To: linux-crypto@vger.kernel.org Cc: antoine.tenart@bootlin.com, herbert@gondor.apana.org.au, davem@davemloft.net, Pascal van Leeuwen Subject: [PATCH 1/3] crypto: inside-secure - make driver selectable for non-Marvell hardware Date: Tue, 18 Jun 2019 07:56:22 +0200 Message-Id: <1560837384-29814-2-git-send-email-pvanleeuwen@insidesecure.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1560837384-29814-1-git-send-email-pvanleeuwen@insidesecure.com> References: <1560837384-29814-1-git-send-email-pvanleeuwen@insidesecure.com> Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org While being a generic EIP97/EIP197 driver, the driver was only selectable for Marvell Armada hardware. This fix makes the driver selectable for any Device Tree supporting kernel configuration, allowing it to be used for other compatible hardware by just adding the correct device tree entry. It also allows the driver to be selected for PCI(E) supporting kernel con- figurations, to be able to use it with PCIE based FPGA development boards for pre-silicon driver development by both Inside Secure and its IP custo- mers. Signed-off-by: Pascal van Leeuwen --- drivers/crypto/Kconfig | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig index 67af688..0d9f67d 100644 --- a/drivers/crypto/Kconfig +++ b/drivers/crypto/Kconfig @@ -716,8 +716,7 @@ source "drivers/crypto/stm32/Kconfig" config CRYPTO_DEV_SAFEXCEL tristate "Inside Secure's SafeXcel cryptographic engine driver" - depends on OF - depends on (ARM64 && ARCH_MVEBU) || (COMPILE_TEST && 64BIT) + depends on OF || PCI || COMPILE_TEST select CRYPTO_AES select CRYPTO_AUTHENC select CRYPTO_BLKCIPHER @@ -729,10 +728,11 @@ config CRYPTO_DEV_SAFEXCEL select CRYPTO_SHA256 select CRYPTO_SHA512 help - This driver interfaces with the SafeXcel EIP-197 cryptographic engine - designed by Inside Secure. Select this if you want to use CBC/ECB - chain mode, AES cipher mode and SHA1/SHA224/SHA256/SHA512 hash - algorithms. + This driver interfaces with the SafeXcel EIP-97 and EIP-197 cryptographic + engines designed by Inside Secure. It currently accelerates DES, 3DES and + AES block ciphers in ECB and CBC mode, as well as SHA1, SHA224, SHA256, + SHA384 and SHA512 hash algorithms for both basic hash and HMAC. + Additionally, it accelerates combined AES-CBC/HMAC-SHA AEAD operations. config CRYPTO_DEV_ARTPEC6 tristate "Support for Axis ARTPEC-6/7 hardware crypto acceleration." -- 1.8.3.1