Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp497609pxu; Thu, 26 Nov 2020 04:15:59 -0800 (PST) X-Google-Smtp-Source: ABdhPJwmg/uTXb+oqc7rKk8+G3va1wT6J1MwoKCRgTxCgJ36SRdqbeyy2pZkZiF8FNZJA/pxuiEl X-Received: by 2002:a17:906:55c1:: with SMTP id z1mr2297327ejp.131.1606392958856; Thu, 26 Nov 2020 04:15:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606392958; cv=none; d=google.com; s=arc-20160816; b=SgGDSqVTvd4asxHZScuhRCaW6YzjfgFKeaQ4af4UqRhZKKoEWMNBW+NOv1+9YHJr37 w/w96/orJbHKPFZINeIj4nHH7PzfjTxlhPYbgpQwNq23lkWPf5x/0yJNwk2Y8QH1Mtgd 1T8Ozt1GVCAIoIqGAnLsQQqbx2RkV1WFXYtQ2HrL7hvzZMsh9pZRoDBd+YPMx8mIRGol +MRSjDVHYUK9BsdsToIi9IMvvSa/V6rAkBdiApctRFy2hQx5iSqyrNiPVeWxZIvIq0ac 0YsYqPRL6+x4sFCJba4CbnPV30rCCwCacfBKHA0awivb+BaPK8N8A7pPlCEzQj+gqi9Q 4VaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=/engABpcn0JTb9m45lDcQ1lMi5djF69rLxKun3tn3Vg=; b=nzXwpB4zpmJnhXP1+B5dPSj3/4St+FnHdU/XHagwi8MVgTO455G4bbHet4SlaUxJjg B7QSNWpftjtELYeArM7l0+yYNLddFJvfi6a5F4eWcSFE7jJLFol/xnNX+7qsBfNDSD+U 3Z2ght+JpwjXtypPhSux0bEHs26HtEvemILhyYKkSH0MqRmLqyGcdZUxbFHDlRq3X8yG l89/ODphIlhnbZHiPkjz1j0Vhqczi2iNN1kcC+8+HBkl8PF4gcH9vdjJpbNEkdwgQm0v TJQ7WVDyeCLyJJfmCxlfNpbFvTXdqHt3KSe/cBzDCV3bsvrPUSuiMB3VNYtmTdDjgCE0 Q5QQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i23si2909701edg.60.2020.11.26.04.15.26; Thu, 26 Nov 2020 04:15:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388143AbgKZL5f (ORCPT + 99 others); Thu, 26 Nov 2020 06:57:35 -0500 Received: from mga18.intel.com ([134.134.136.126]:7383 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387979AbgKZL5f (ORCPT ); Thu, 26 Nov 2020 06:57:35 -0500 IronPort-SDR: aXxzvWBuvMMB8HszVPUfSZH2JKS26+vhP3IRepXdn/OQD9cgN+B/Bf/Crq78CxLjzSh88lPJ30 PjoD2BMcLgkQ== X-IronPort-AV: E=McAfee;i="6000,8403,9816"; a="160048307" X-IronPort-AV: E=Sophos;i="5.78,372,1599548400"; d="scan'208";a="160048307" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Nov 2020 03:52:09 -0800 IronPort-SDR: A1rdn4mptNgb2ms/3ml6yti9bF3yh+2w+OyEM0u6ulsmPG0vtjYetEODCsXvyjBatTHq7tZYAK KeO8UAX1K5dw== X-IronPort-AV: E=Sophos;i="5.78,372,1599548400"; d="scan'208";a="362781569" Received: from smaciag-mobl2.ger.corp.intel.com (HELO dalessan-mobl1.ir.intel.com) ([10.251.85.7]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Nov 2020 03:52:07 -0800 From: Daniele Alessandrelli To: linux-crypto@vger.kernel.org, Herbert Xu , "David S. Miller" Cc: devicetree@vger.kernel.org, Rob Herring , Daniele Alessandrelli , Mark Gross Subject: [PATCH 1/2] dt-bindings: Add Keem Bay OCS AES bindings Date: Thu, 26 Nov 2020 11:51:47 +0000 Message-Id: <20201126115148.68039-2-daniele.alessandrelli@linux.intel.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201126115148.68039-1-daniele.alessandrelli@linux.intel.com> References: <20201126115148.68039-1-daniele.alessandrelli@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Daniele Alessandrelli Add device-tree bindings for Intel Keem Bay Offload and Crypto Subsystem (OCS) AES crypto driver. Signed-off-by: Daniele Alessandrelli Acked-by: Mark Gross --- .../crypto/intel,keembay-ocs-aes.yaml | 45 +++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-aes.yaml diff --git a/Documentation/devicetree/bindings/crypto/intel,keembay-ocs-aes.yaml b/Documentation/devicetree/bindings/crypto/intel,keembay-ocs-aes.yaml new file mode 100644 index 000000000000..ee2c099981b2 --- /dev/null +++ b/Documentation/devicetree/bindings/crypto/intel,keembay-ocs-aes.yaml @@ -0,0 +1,45 @@ +# SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) +%YAML 1.2 +--- +$id: http://devicetree.org/schemas/crypto/intel,keembay-ocs-aes.yaml# +$schema: http://devicetree.org/meta-schemas/core.yaml# + +title: Intel Keem Bay OCS AES Device Tree Bindings + +maintainers: + - Daniele Alessandrelli + +description: + The Intel Keem Bay Offload and Crypto Subsystem (OCS) AES engine provides + hardware-accelerated AES/SM4 encryption/decryption. + +properties: + compatible: + const: intel,keembay-ocs-aes + + reg: + maxItems: 1 + + interrupts: + maxItems: 1 + + clocks: + maxItems: 1 + +required: + - compatible + - reg + - interrupts + - clocks + +additionalProperties: false + +examples: + - | + #include + crypto@30008000 { + compatible = "intel,keembay-ocs-aes"; + reg = <0x30008000 0x1000>; + interrupts = ; + clocks = <&scmi_clk 95>; + }; -- 2.26.2