Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1520929ybl; Tue, 3 Dec 2019 08:24:38 -0800 (PST) X-Google-Smtp-Source: APXvYqwy0zXfDNZAvJ1nC5LZ3IcQb5t957P3PxvI/xT1vbbnKGdcJIPp3EFFU78lId4HaxFUqJ7O X-Received: by 2002:aca:3c1:: with SMTP id 184mr4104158oid.70.1575390278684; Tue, 03 Dec 2019 08:24:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575390278; cv=none; d=google.com; s=arc-20160816; b=QreTAlsPfve6O2TLaFsvM5FKWyRSGdt3fwr9uorfRugc8lu75kJlI17Ydsj3CnmNXD v7Dgro/188pl/CBDtJ0W0ILqrYLJJbB8XKD8c+ubuwxYMPq4syM8ifTsJly+VPsKgrD+ JhUaGTCTXLzUdWJ52f9NMoA2IqN3JXbc449mkvJagdTG2pmUapZlnVlGF8a+wlGlSNsw NZRTzm1kGhXIVyGeqit1jXxnuYdHDNPhna3LRdDwn/99i+RmALPPrpr4u6fzqS2qfaYV 7l4swu9fUA8SkgK77WwAo6BFXOS/eRyf9JYCeknW/8qhVv09A9lQryPZaIHNfoSCX3o6 9BVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=UF68x/KuCHKog45NJwPbUxi85MNam/g/8jmiTNyQvwE=; b=AVybnpmYMnbJUmZ6o1HIQHO/6/CWRmpS/h4mJcXhyqa3/jT5XEQK6tSbRVAWPbkjeS EqfTyN9tv4nVhxXedGyU/rV3JRPMC2pCv5XIXSADRDhBnKGD54NXmb4voQG8ZR3CP4Hx yaA1yzmSdTEqROYzQoY7EIJsLgSBADFYoWGRGQgLeFIffsVF3vrcyKHrkkBzw6JEvEhW mZs7RgdsN7hrL98L6zXzaEH18Rf0bXnI5q+7eH00ChyYH4W/B2vWgREBDAhDGeVjBc33 4swjpLHhqCCwiWeMna9UfC8UQZPomq6s2oBUqFdUi/A2uciwxwLCjci36z3iRM1V+xiA xcFw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Ocaq0D2M; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h200si1527334oib.258.2019.12.03.08.24.16; Tue, 03 Dec 2019 08:24:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Ocaq0D2M; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726186AbfLCQYO (ORCPT + 99 others); Tue, 3 Dec 2019 11:24:14 -0500 Received: from mail-pf1-f193.google.com ([209.85.210.193]:36520 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725848AbfLCQYO (ORCPT ); Tue, 3 Dec 2019 11:24:14 -0500 Received: by mail-pf1-f193.google.com with SMTP id b19so2100387pfd.3; Tue, 03 Dec 2019 08:24:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=UF68x/KuCHKog45NJwPbUxi85MNam/g/8jmiTNyQvwE=; b=Ocaq0D2M6Zm1TRioVqqndRLyX8n+8aHCZRA7WPMFkKTdAb1BpVM9vr30wU5X3bsfKU wJN+srOBZsZVj6I/npeZo3nofRj9nWyz0wUHJlUvYv0ic3hqz2ak6bvdOwvf52E5Nnv9 xp3hRHxCSWM5vj1Nwko8cGUUdfN4nNsnUIazQJtG5Vb82RsnnWIhRj7Uclnrh1zWBzuD BP8mFsmoCHd0fWn7UJCQKouvJ7CYi37tG+dI4ydDv26GTi52rp0PHrk0TuFrjV7hybYk u05dbMhPY3sgREdA4ptcbuQLwywlOpLPjPdcukjxcmtW+esMAsrF8LzdIFYYmIAzKc2Y m4uA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=UF68x/KuCHKog45NJwPbUxi85MNam/g/8jmiTNyQvwE=; b=Ole5VYjCXNXP7M/vj2Is41ZEA+ZiZcGlmwlyaDX3OW3LOZj2ZL97eCYP2ckjBFkhlK 0MZVfRA/qquIqG6uQdNetfGtrz79bzQ1Cp7KlkiSDS0xQBg91gHyPGeKGeamxvszKrfM 8zZHsbVuFd/MLlj96fH9Ep3lY5ACjNu6kKnKM8w7l8hc+M+wSXwgNJEcdJqquQu1joD5 jDujcacxKgyNF/bM+rJ2l8XX5gzriF0Hjz+5LaOA8W/CXHDm59d2Q0udj+GOdeh4SUt2 590xqKqrc2gTRAe+ARbL/U5MoQdP8Sn7EUhSsLEWtuoSYrI3LbpG/flpGOyo1FhvS/Yv yrXg== X-Gm-Message-State: APjAAAVsUa7ey/6q9ubm76Qdy24Kg7IKkGI2twx66eF2akNHs5QDMKMv +L6vT2Sj/IopjOLZF7LjatX9pg2BdpY= X-Received: by 2002:a63:e145:: with SMTP id h5mr5918290pgk.387.1575390252701; Tue, 03 Dec 2019 08:24:12 -0800 (PST) Received: from localhost.hsd1.wa.comcast.net ([2601:602:847f:811f:babe:8e8d:b27e:e6d7]) by smtp.gmail.com with ESMTPSA id g10sm4052093pgh.35.2019.12.03.08.24.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Dec 2019 08:24:11 -0800 (PST) From: Andrey Smirnov To: linux-crypto@vger.kernel.org Cc: Andrey Smirnov , Chris Healy , Lucas Stach , =?UTF-8?q?Horia=20Geant=C4=83?= , Herbert Xu , Iuliana Prodan , linux-kernel@vger.kernel.org, linux-imx@nxp.com Subject: [PATCH v5 0/4] enable CAAM's HWRNG as default Date: Tue, 3 Dec 2019 08:23:53 -0800 Message-Id: <20191203162357.21942-1-andrew.smirnov@gmail.com> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Everyone: This series is a continuation of original [discussion]. I don't know if what's in the series is enough to use CAAMs HWRNG system wide, but I am hoping that with enough iterations and feedback it will be. Changes since [v1]: - Original hw_random replaced with the one using output of TRNG directly - SEC4 DRNG IP block exposed via crypto API - Small fix regarding use of GFP_DMA added to the series Chagnes since [v2]: - msleep in polling loop to avoid wasting CPU cycles - caam_trng_read() bails out early if 'wait' is set to 'false' - fixed typo in ZII's name Changes since [v3]: - DRNG's .cra_name is now "stdrng" - collected Reviewd-by tag from Lucas - typo fixes in commit messages of the series Changes since [v4]: - Dropped "crypto: caam - RNG4 TRNG errata" and "crypto: caam - enable prediction resistance in HRWNG" to limit the scope of the series. Those two patches are not yet ready and can be submitted separately later. - Collected Tested-by from Chris Feedback is welcome! Thanks, Andrey Smirnov [discussion] https://patchwork.kernel.org/patch/9850669/ [v1] https://lore.kernel.org/lkml/20191029162916.26579-1-andrew.smirnov@gmail.com [v2] https://lore.kernel.org/lkml/20191118153843.28136-1-andrew.smirnov@gmail.com [v3] https://lore.kernel.org/lkml/20191120165341.32669-1-andrew.smirnov@gmail.com [v4] https://lore.kernel.org/lkml/20191121155554.1227-1-andrew.smirnov@gmail.com Andrey Smirnov (4): crypto: caam - allocate RNG instantiation descriptor with GFP_DMA crypto: caam - move RNG presence check into a shared function crypto: caam - replace DRNG with TRNG for use with hw_random crypto: caam - expose SEC4 DRNG via crypto RNG API drivers/crypto/caam/Kconfig | 15 +- drivers/crypto/caam/Makefile | 3 +- drivers/crypto/caam/caamrng.c | 358 ---------------------------------- drivers/crypto/caam/ctrl.c | 10 +- drivers/crypto/caam/drng.c | 174 +++++++++++++++++ drivers/crypto/caam/intern.h | 32 ++- drivers/crypto/caam/jr.c | 3 +- drivers/crypto/caam/regs.h | 11 +- drivers/crypto/caam/trng.c | 89 +++++++++ 9 files changed, 320 insertions(+), 375 deletions(-) delete mode 100644 drivers/crypto/caam/caamrng.c create mode 100644 drivers/crypto/caam/drng.c create mode 100644 drivers/crypto/caam/trng.c -- 2.21.0