Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp2978138ybc; Mon, 18 Nov 2019 07:39:46 -0800 (PST) X-Google-Smtp-Source: APXvYqzkenXhnbCarWk2cgqo+/o8DTRwEmPc0xponY/cOKyKsX07q/2ePDp1s7B+IB0+4uE+YBbp X-Received: by 2002:a17:906:25cb:: with SMTP id n11mr26341455ejb.239.1574091586639; Mon, 18 Nov 2019 07:39:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574091586; cv=none; d=google.com; s=arc-20160816; b=Wzb+qAFu1OHkKY5zbc8EQsk3qngctScESbmJBG2kjy8ZfczTiU3L1VGAzkz0biZyo0 kyTUaYMnaWZ+CRmh0RYe1QsRBJzNTHgdH45omBTR9bmPCNgViEP0Wl7TY7A9QRPLCeOV 15EQTHlqoV3hkAJGDoliMOpVYv/yf9NTNtPGcj96Y4nLSdmhY6I6IExCFDHrId0lyWDs aaL7iP3Cd2ickej+wYmDEGS/k/KNDM1LMbpj0YLbBqYai+uPwqgeM41zAyhBH2tu/sax BSwyVQGnMSiABoG/S23bmkjyO3ggH+/9u764UiWuEWLfXTmZTZy34tltPGlmOhxwcGsu kJGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=1DtsNhw9v1gDBQhovceUYU94x/2uJ8teNAnS6FI6Te8=; b=lowJEN2kQ9m5x4aezs/GiA6EAnoGwvCgBlME0Lj8JsQWJjK1FNMgWNFvUNBmdidGYl zLNcobZj22lIySeHCrMvkRHgKsJGRaZK0T84s3PZNGWpZVNLxDVkfLUx1r4utEzAGBJd K8iubnf4RhZB1vP1KL770zCHG+0PAeMBoqgSg1eaZV6wE+doJoDzvyqslTIbJSJy7vTQ QRov0QHPm/iyyVuDG/ELS0mLbWPtxrVeQNh7B2jOZPMyPtYYQdUYb7zm5AaGRNuz2BAJ JAF66UbDzVyCT1MpA6EWfuR87/wNimt34MF5wUJ/DsTt/OvxLtOcbYR+owN/SIvlBR7Q MgRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="YX/opi9X"; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t17si13584728edc.426.2019.11.18.07.39.22; Mon, 18 Nov 2019 07:39:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="YX/opi9X"; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727315AbfKRPjM (ORCPT + 99 others); Mon, 18 Nov 2019 10:39:12 -0500 Received: from mail-pf1-f196.google.com ([209.85.210.196]:44687 "EHLO mail-pf1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727178AbfKRPjM (ORCPT ); Mon, 18 Nov 2019 10:39:12 -0500 Received: by mail-pf1-f196.google.com with SMTP id q26so10541644pfn.11; Mon, 18 Nov 2019 07:39:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=1DtsNhw9v1gDBQhovceUYU94x/2uJ8teNAnS6FI6Te8=; b=YX/opi9XbQozDOHj8iix34o7GnRefRa8T4hAmQXBDBnSCfrTzVw5FyVg4cMNrksXv7 gQ05gy3X5hjvb91Fut8SZ0tWJdC5onxl/plTkTuPCgHeHfv7/BYaFJVbuKMTWiaf/luv C5w0fAAtxIHGppNpYcmISXiC8oFO3AfgbDJYUk8iXmwNzJX2wdhgF6PoXaXEm1vNyjQD Qe1KuxigDF4g7PoCxVis71KcPRm8lerkZeQUuPMqkYvX1CM1o+c+6mzpMXMoN6zSwrzL /RsZdWGoKNeGVg1hjk8nucrpwViRH+V9neXKzU+5Tvn5Sa56NJzqFYrVWozN4N941U11 suKA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=1DtsNhw9v1gDBQhovceUYU94x/2uJ8teNAnS6FI6Te8=; b=b0qtSbNAHebNRSQ4bjqYRBHaGnxYLgfSMc0m8P8NQUnUPqeW2rWYMBFAhgYrI3g83H XND53ElwQ6NTKfY7/4VxKqcWW3mN+SBJcCtCx8Mm/0gBSvmRDRxstzO/BuWb4+HxTqCM Or0ARNR+9vE3Lz9xS+eOvJGXhkNUe7JRSUvtotxtqkjtR6IviMEFAAPOtI0/Cm9UEY3U GGcSk2oAMiImlx607S+SNxpv4RlUWKI/befUF4vaCG7k+1IKC6isK0mqUgs2wnrmKP5H 2pVzd7sdhPm0eoS9nFcRo1zCXgznTgX4uD6RHoOorEz+vghgqiDJ9iPTpA6Qc350xA5Z X7tA== X-Gm-Message-State: APjAAAWXsUlIiJh71Xs+/w/dhXgu1mPSnLkTvhDTY3oi6/5aVs4E+5du AW6EaOtjFRsNxPjGCh9gc6vHlxiH X-Received: by 2002:a63:a34d:: with SMTP id v13mr6588285pgn.343.1574091549118; Mon, 18 Nov 2019 07:39:09 -0800 (PST) Received: from localhost.hsd1.wa.comcast.net ([2601:602:847f:811f:babe:8e8d:b27e:e6d7]) by smtp.gmail.com with ESMTPSA id z7sm23573732pfr.165.2019.11.18.07.39.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 Nov 2019 07:39:08 -0800 (PST) From: Andrey Smirnov To: linux-crypto@vger.kernel.org Cc: Andrey Smirnov , Chris Healy , Lucas Stach , =?UTF-8?q?Horia=20Geant=C4=83?= , Herbert Xu , Iuliana Prodan , linux-kernel@vger.kernel.org, linux-imx@nxp.com Subject: [PATCH v2 2/6] crypto: caam - enable prediction resistance in HRWNG Date: Mon, 18 Nov 2019 07:38:39 -0800 Message-Id: <20191118153843.28136-3-andrew.smirnov@gmail.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20191118153843.28136-1-andrew.smirnov@gmail.com> References: <20191118153843.28136-1-andrew.smirnov@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Instantiate CAAM RNG with prediction resistance enabled to improve its quality. Signed-off-by: Andrey Smirnov Cc: Chris Healy Cc: Lucas Stach Cc: Horia Geantă Cc: Herbert Xu Cc: Iuliana Prodan Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: linux-imx@nxp.com --- drivers/crypto/caam/caamrng.c | 3 ++- drivers/crypto/caam/ctrl.c | 8 +++++--- drivers/crypto/caam/desc.h | 2 ++ drivers/crypto/caam/regs.h | 4 +++- 4 files changed, 12 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/caam/caamrng.c b/drivers/crypto/caam/caamrng.c index e8baacaabe07..6dde8ae3cd9b 100644 --- a/drivers/crypto/caam/caamrng.c +++ b/drivers/crypto/caam/caamrng.c @@ -202,7 +202,8 @@ static inline int rng_create_sh_desc(struct caam_rng_ctx *ctx) init_sh_desc(desc, HDR_SHARE_SERIAL); /* Generate random bytes */ - append_operation(desc, OP_ALG_ALGSEL_RNG | OP_TYPE_CLASS1_ALG); + append_operation(desc, OP_ALG_ALGSEL_RNG | OP_TYPE_CLASS1_ALG | + OP_ALG_PR_ON); /* Store bytes */ append_seq_fifo_store(desc, RN_BUF_SIZE, FIFOST_TYPE_RNGSTORE); diff --git a/drivers/crypto/caam/ctrl.c b/drivers/crypto/caam/ctrl.c index df4db10e9fca..a1c879820286 100644 --- a/drivers/crypto/caam/ctrl.c +++ b/drivers/crypto/caam/ctrl.c @@ -36,7 +36,8 @@ static void build_instantiation_desc(u32 *desc, int handle, int do_sk) init_job_desc(desc, 0); op_flags = OP_TYPE_CLASS1_ALG | OP_ALG_ALGSEL_RNG | - (handle << OP_ALG_AAI_SHIFT) | OP_ALG_AS_INIT; + (handle << OP_ALG_AAI_SHIFT) | OP_ALG_AS_INIT | + OP_ALG_PR_ON; /* INIT RNG in non-test mode */ append_operation(desc, op_flags); @@ -275,11 +276,12 @@ static int instantiate_rng(struct device *ctrldev, int state_handle_mask, return -ENOMEM; for (sh_idx = 0; sh_idx < RNG4_MAX_HANDLES; sh_idx++) { + const u32 rdsta_mask = (RDSTA_PR0 | RDSTA_IF0) << sh_idx; /* * If the corresponding bit is set, this state handle * was initialized by somebody else, so it's left alone. */ - if ((1 << sh_idx) & state_handle_mask) + if (rdsta_mask & state_handle_mask) continue; /* Create the descriptor for instantiating RNG State Handle */ @@ -302,7 +304,7 @@ static int instantiate_rng(struct device *ctrldev, int state_handle_mask, rdsta_val = rd_reg32(&ctrl->r4tst[0].rdsta) & RDSTA_IFMASK; if ((status && status != JRSTA_SSRC_JUMP_HALT_CC) || - !(rdsta_val & (1 << sh_idx))) { + (rdsta_val & rdsta_mask) != rdsta_mask) { ret = -EAGAIN; break; } diff --git a/drivers/crypto/caam/desc.h b/drivers/crypto/caam/desc.h index 4b6854bf896a..e796d3cb9be8 100644 --- a/drivers/crypto/caam/desc.h +++ b/drivers/crypto/caam/desc.h @@ -1254,6 +1254,8 @@ #define OP_ALG_ICV_OFF (0 << OP_ALG_ICV_SHIFT) #define OP_ALG_ICV_ON (1 << OP_ALG_ICV_SHIFT) +#define OP_ALG_PR_ON BIT(1) + #define OP_ALG_DIR_SHIFT 0 #define OP_ALG_DIR_MASK 1 #define OP_ALG_DECRYPT 0 diff --git a/drivers/crypto/caam/regs.h b/drivers/crypto/caam/regs.h index c191e8fd0fa7..fe1f8c1409fd 100644 --- a/drivers/crypto/caam/regs.h +++ b/drivers/crypto/caam/regs.h @@ -524,9 +524,11 @@ struct rng4tst { u32 rsvd1[40]; #define RDSTA_SKVT 0x80000000 #define RDSTA_SKVN 0x40000000 +#define RDSTA_PR0 BIT(4) +#define RDSTA_PR1 BIT(5) #define RDSTA_IF0 0x00000001 #define RDSTA_IF1 0x00000002 -#define RDSTA_IFMASK (RDSTA_IF1 | RDSTA_IF0) +#define RDSTA_IFMASK (RDSTA_PR1 | RDSTA_PR0 | RDSTA_IF1 | RDSTA_IF0) u32 rdsta; u32 rsvd2[15]; }; -- 2.21.0