Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp2694949ybh; Mon, 16 Mar 2020 08:02:05 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvhR40vroRooATKi4bsSdarMdd0JS10P0PDWeFo2CSacud37hdQROA72BdlJI99lwSlXvJE X-Received: by 2002:a9d:6358:: with SMTP id y24mr20653913otk.49.1584370925047; Mon, 16 Mar 2020 08:02:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584370925; cv=none; d=google.com; s=arc-20160816; b=JME6YL+Jgj98t7Ua+lgsJ/2SKn1ZsU7BNqnKlhVRz809m8eR6wgaH7BgBeVQbczS6K DB9ZkxCgaBkwgydyOB4XiMLONOVXBOQh7wgjQa+Bx8bz1jKyE69dQQ+HTs4eXaYZIo/h uk4Az8samZecC2t1uJ9f3ux3WNlJKVJuX+H28ZAhIKj6WfMXATEHGch3q0/hsCJ9CNtn ksX2LgwDeUsvTbotiH69x4HpkjbAmN1dNXm+vlQYkWkJCg2Nc/bIKRYgf3/4bQUHU4f4 yrk0uHXFpYofhp2IySqLdiT/XQOlSXJYsaNc5sIJDP8AMIOJXzuw8zcmrOsc3oDTNGfP mOIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=6FSGRqvWIrV1AnR+eNOcmfjvZaVEwGuCJbbdcQTrqeA=; b=aV+Kv6LDaxMD3lSE470EEqN6fgls+6myJrm32yd8P5vb0gy2NIB2ZbJIUzWXJ/D9f1 w5zsHUsd57US76goj5A7Q+VAPEm8HpvxP+t4amAqxL3zIG/Bnr/+l0A8zpiPjSVXrSdG YIblA1Sc0vr902WEzBDjnmUxr+qDXdwu0WAbtb5njTxJibxiPQt+60Q4vGZ1kSAar/WK P/nos374tultKknqx5IWWQ0LzER2rjVqYWt4kdFF5guYPUaQbg554XSd3v9w7GTs4vRw w+jT11EiBv1FCYfnpTlSP48KntakF364cBOIgRRpZDJaOy2Hs3DvyDE84e//AtBSXbDT wtNQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=SCifVSsX; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d5si86178otc.161.2020.03.16.08.01.42; Mon, 16 Mar 2020 08:02:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=SCifVSsX; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731807AbgCPPBY (ORCPT + 99 others); Mon, 16 Mar 2020 11:01:24 -0400 Received: from mail-pf1-f193.google.com ([209.85.210.193]:39527 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731823AbgCPPBS (ORCPT ); Mon, 16 Mar 2020 11:01:18 -0400 Received: by mail-pf1-f193.google.com with SMTP id d25so2081990pfn.6; Mon, 16 Mar 2020 08:01:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=6FSGRqvWIrV1AnR+eNOcmfjvZaVEwGuCJbbdcQTrqeA=; b=SCifVSsXYGYFePDAubNpRPpOOD5WkSnD9w88D/7K+mYZNxj+5Zwm4drhBTnVdWA8HV Sh3abG8AvOaX/Vv5iLPRSXKGUxTKluBGEmJDmxCUNGkwyw0NZ1+LeGioYh2yD9wAwSAB AQ4YzbGplhRBFA2AbhnwKXPq5eTLxmLYA0GvdIrPu3znAFa6qNIkEwelLFz/DwHDeQDf zn8gRXC64aae5ZRQzJoonYy211eEXAOsKObw8cjTBSaW0ZVVMI+yQbx20+l2SRxjWM9S TspP+r9pWqRmAjwKNfRsWvFwgwn6RrjRYs0fdZUD8glo3BBDaZy7ZLs2UCylLclDh2tr KsUQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=6FSGRqvWIrV1AnR+eNOcmfjvZaVEwGuCJbbdcQTrqeA=; b=R4xNfiMV2FFNEFUmhkYqkjgKT/Or17NWtUzZWgx+1Ro1/ugvpwG+2EghYBsCU8vA4O 9FYlTfcOI1NUz8i451LfXb0gSBJO5GKPJZDJIDwMtogcg64kMiLlTgluGWK+LM9PTqfd K0pWhu1giQR53dBpxIHNlHaGYIYwG2KmQMPMTJFejbQXZKVosGHrOoNeMYzuH0FMYbXx XsC+8xHgKvsgC92Cwj2aO9ZrpOuho6W2Shijpi6EeIrQtYl6QhFr7L3LNjR9LUi82l9c AIwx2tuzRm3h36g3wuvDfz0Gs8yB1Iqvy+xqajGW33wHzO8NtnkUy9D+jnN4rJTmBN5+ 3yBg== X-Gm-Message-State: ANhLgQ0buPVgFiROAAfIq87hmiaRsHFL8RqcpMaZrClK9cAySY55Ioec CRrsv6VtcZ303DyK0mcB9t6mKgWm X-Received: by 2002:a65:5181:: with SMTP id h1mr323912pgq.62.1584370875444; Mon, 16 Mar 2020 08:01:15 -0700 (PDT) Received: from localhost.localdomain (c-67-165-113-11.hsd1.wa.comcast.net. [67.165.113.11]) by smtp.gmail.com with ESMTPSA id o128sm256354pfg.5.2020.03.16.08.01.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Mar 2020 08:01:14 -0700 (PDT) From: Andrey Smirnov To: linux-crypto@vger.kernel.org Cc: Andrey Smirnov , Chris Healy , Lucas Stach , =?UTF-8?q?Horia=20Geant=C4=83?= , Herbert Xu , Iuliana Prodan , linux-kernel@vger.kernel.org, linux-imx@nxp.com Subject: [PATCH v8 8/8] crypto: caam - limit single JD RNG output to maximum of 16 bytes Date: Mon, 16 Mar 2020 08:00:47 -0700 Message-Id: <20200316150047.30828-9-andrew.smirnov@gmail.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20200316150047.30828-1-andrew.smirnov@gmail.com> References: <20200316150047.30828-1-andrew.smirnov@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org In order to follow recommendation in SP800-90C (section "9.4 The Oversampling-NRBG Construction") limit the output of "generate" JD submitted to CAAM. See https://lore.kernel.org/linux-crypto/VI1PR0402MB3485EF10976A4A69F90E5B0F98580@VI1PR0402MB3485.eurprd04.prod.outlook.com/ for more details. This change should make CAAM's hwrng driver good enough to have 1024 quality rating. Signed-off-by: Andrey Smirnov Cc: Chris Healy Cc: Lucas Stach Cc: Horia Geantă Cc: Herbert Xu Cc: Iuliana Prodan Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: linux-imx@nxp.com --- drivers/crypto/caam/caamrng.c | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/drivers/crypto/caam/caamrng.c b/drivers/crypto/caam/caamrng.c index cffa6604f726..77d048dfe5d0 100644 --- a/drivers/crypto/caam/caamrng.c +++ b/drivers/crypto/caam/caamrng.c @@ -22,9 +22,7 @@ #include "jr.h" #include "error.h" -#define CAAM_RNG_MAX_FIFO_STORE_SIZE U16_MAX - -#define CAAM_RNG_FIFO_LEN SZ_32K /* Must be a multiple of 2 */ +#define CAAM_RNG_MAX_FIFO_STORE_SIZE 16 /* * Length of used descriptors, see caam_init_desc() @@ -65,14 +63,15 @@ static void caam_rng_done(struct device *jrdev, u32 *desc, u32 err, complete(jctx->done); } -static u32 *caam_init_desc(u32 *desc, dma_addr_t dst_dma, int len) +static u32 *caam_init_desc(u32 *desc, dma_addr_t dst_dma) { init_job_desc(desc, 0); /* + 1 cmd_sz */ /* Generate random bytes: + 1 cmd_sz */ append_operation(desc, OP_ALG_ALGSEL_RNG | OP_TYPE_CLASS1_ALG | OP_ALG_PR_ON); /* Store bytes: + 1 cmd_sz + caam_ptr_sz */ - append_fifo_store(desc, dst_dma, len, FIFOST_TYPE_RNGSTORE); + append_fifo_store(desc, dst_dma, + CAAM_RNG_MAX_FIFO_STORE_SIZE, FIFOST_TYPE_RNGSTORE); print_hex_dump_debug("rng job desc@: ", DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1); @@ -92,7 +91,7 @@ static int caam_rng_read_one(struct device *jrdev, .err = &ret, }; - len = min_t(int, len, CAAM_RNG_MAX_FIFO_STORE_SIZE); + len = CAAM_RNG_MAX_FIFO_STORE_SIZE; dst_dma = dma_map_single(jrdev, dst, len, DMA_FROM_DEVICE); if (dma_mapping_error(jrdev, dst_dma)) { @@ -102,7 +101,7 @@ static int caam_rng_read_one(struct device *jrdev, init_completion(done); err = caam_jr_enqueue(jrdev, - caam_init_desc(desc, dst_dma, len), + caam_init_desc(desc, dst_dma), caam_rng_done, &jctx); if (err == -EINPROGRESS) { wait_for_completion(done); @@ -122,7 +121,7 @@ static void caam_rng_fill_async(struct caam_rng_ctx *ctx) sg_init_table(sg, ARRAY_SIZE(sg)); nents = kfifo_dma_in_prepare(&ctx->fifo, sg, ARRAY_SIZE(sg), - CAAM_RNG_FIFO_LEN); + CAAM_RNG_MAX_FIFO_STORE_SIZE); if (!nents) return; @@ -156,7 +155,7 @@ static int caam_read(struct hwrng *rng, void *dst, size_t max, bool wait) } out = kfifo_out(&ctx->fifo, dst, max); - if (kfifo_len(&ctx->fifo) <= CAAM_RNG_FIFO_LEN / 2) + if (kfifo_is_empty(&ctx->fifo)) schedule_work(&ctx->worker); return out; @@ -186,7 +185,8 @@ static int caam_init(struct hwrng *rng) if (!ctx->desc_async) return -ENOMEM; - if (kfifo_alloc(&ctx->fifo, CAAM_RNG_FIFO_LEN, GFP_DMA | GFP_KERNEL)) + if (kfifo_alloc(&ctx->fifo, CAAM_RNG_MAX_FIFO_STORE_SIZE, + GFP_DMA | GFP_KERNEL)) return -ENOMEM; INIT_WORK(&ctx->worker, caam_rng_worker); -- 2.21.0