Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp4080582pxb; Mon, 1 Feb 2021 11:53:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJyEXJSUcyvNEeBoiyHjU1zv1FVrBTuKEvGJ4+2Tn0yFiTxyRhcZCHyCoNwQAdMCTigMJUXf X-Received: by 2002:a17:906:128e:: with SMTP id k14mr18934610ejb.427.1612209197846; Mon, 01 Feb 2021 11:53:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612209197; cv=none; d=google.com; s=arc-20160816; b=zIEg0vO+nZRL4FJiKsD7yXwXmhMX3q2Xr18k9gaMXXSjRcbO1FRx5r/fNQPOq6uyYB 1zgJhLSUkHkvyKpDw/TNP7fTPdkLq6Yk8lfAe8lRGl1T2jRpR73tom8UjXHgTijWpEOD z7awifNu8Ika/MC+jPcaYncQdJHNjalG6EU8Rc75Z+eSuseMSlwqcwaLMkVYDeWbjTPK k98psVE9FGvab49jRFOV0kDTF3bRFPTDnW3fL9CyL+BstT6fZN9byetKG5bGiF+l4Mb4 sT4c9kR/0svJ51j9C0kdc7x9m1S/CDHsZhgPIMGCWjaKNVzLIN/i1MmF+neFUBznqqVI ngMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:from:subject; bh=gBMjs96Da1CAfm9LcTkToSpWgHkFOZ7fOg7UMGp89as=; b=Wab1ifaHM/878GUK4hzIrAM6In5gOAfPgmm8xQ7H51cadKiwovecT7NQ0y40KODnSV CzEaXHZa4VUHL+DkflNU6N0a3mHzyFUYIJC/MSX3EBTeaaM12Sf3+Hs3FRexU+PPcEgO a2EgCCNNh/zTwUZ7P/k2b9ZhmcVosTXKP92ikr0lEvOwUTIo8C5yxgXK6MLAKBJZ+iav 8vk+7nRRfYrDbciW99dEHupWwjhCWeuJRWFz0fKFHNs+VadFILescmOqlvMV7v7/PGey ULRRySsMFWaosEAZcqldC5xP/fH4i+LzbJDRzaDPvUZbXFZY1K6bxowtFskWWBaDObST 1zjw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l13si964518ejx.754.2021.02.01.11.52.46; Mon, 01 Feb 2021 11:53:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232146AbhBATwg (ORCPT + 99 others); Mon, 1 Feb 2021 14:52:36 -0500 Received: from 5.mo179.mail-out.ovh.net ([46.105.43.140]:53354 "EHLO 5.mo179.mail-out.ovh.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232747AbhBATv0 (ORCPT ); Mon, 1 Feb 2021 14:51:26 -0500 X-Greylist: delayed 3220 seconds by postgrey-1.27 at vger.kernel.org; Mon, 01 Feb 2021 14:51:26 EST Received: from player738.ha.ovh.net (unknown [10.108.35.103]) by mo179.mail-out.ovh.net (Postfix) with ESMTP id 12866184AC5 for ; Mon, 1 Feb 2021 19:57:02 +0100 (CET) Received: from 3mdeb.com (85-222-117-222.dynamic.chello.pl [85.222.117.222]) (Authenticated sender: maciej.pijanowski@3mdeb.com) by player738.ha.ovh.net (Postfix) with ESMTPSA id 782691ABC6B7F; Mon, 1 Feb 2021 18:56:59 +0000 (UTC) Authentication-Results: garm.ovh; auth=pass (GARM-104R00576929ea7-fcdd-4d42-a833-2bb3b8c411a5, ACE63DF45BB0D0C5B239E883FB7766019137A65F) smtp.auth=maciej.pijanowski@3mdeb.com X-OVh-ClientIp: 85.222.117.222 Subject: Re: safexcel driver for EIP197 and mini firmware features From: Maciej Pijanowski To: linux-crypto@vger.kernel.org Cc: atenart@kernel.org, pascalvanl@gmail.com, =?UTF-8?Q?Piotr_Kr=c3=b3l?= References: Message-ID: <7f954208-e2a4-937a-a2c7-16634d6aa431@3mdeb.com> Date: Mon, 1 Feb 2021 19:56:58 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Ovh-Tracer-Id: 5691986981401145036 X-VR-SPAMSTATE: OK X-VR-SPAMSCORE: -83 X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeduledrfeekgdduudelucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuqfggjfdpvefjgfevmfevgfenuceurghilhhouhhtmecuhedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmnegfrhhlucfvnfffucdludejmdenucfjughrpefuhffvfhfkffgfgggjtgfgsehtjeertddtfeejnecuhfhrohhmpeforggtihgvjhcurfhijhgrnhhofihskhhiuceomhgrtghivghjrdhpihhjrghnohifshhkihesfehmuggvsgdrtghomheqnecuggftrfgrthhtvghrnhepffejudduvddtheejieegheevtdelleeuffdukeekleejgffgteetudehveekjeetnecuffhomhgrihhnpehsohhlihguqdhruhhnrdgtohhmpdhsohhlihguqdgsuhhilhgurdighiiipdhkvghrnhgvlhdrohhrghdpfehmuggvsgdrtghomhenucfkpheptddrtddrtddrtddpkeehrddvvddvrdduudejrddvvddvnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmohguvgepshhmthhpqdhouhhtpdhhvghlohepphhlrgihvghrjeefkedrhhgrrdhovhhhrdhnvghtpdhinhgvtheptddrtddrtddrtddpmhgrihhlfhhrohhmpehmrggtihgvjhdrphhijhgrnhhofihskhhiseefmhguvggsrdgtohhmpdhrtghpthhtoheplhhinhhugidqtghrhihpthhosehvghgvrhdrkhgvrhhnvghlrdhorhhg Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Add Antoine correct e-mail. On 01.02.2021 19:52, Maciej Pijanowski wrote: > Hello, > > I am interested in using the EIP197 crypto accelerator. I am aware > that it requires an NDA > to obtain the firmware for it, but I found out that there is some kind > of "minifw" as well > in the linux-firmware tree [3]. I found no description of it - I would > like to learn what > are the features and limitations of this "minifw". > > I started with using it on the Debian image from board vendor [2]. The > kernel here is > 5.1.0. The firmware is loaded, but the ALG tests are all failing: > > [14785.750246] crypto-safexcel f2800000.crypto: firmware: > direct-loading firmware inside-secure/eip197b/ifpp.bin > [14785.762765] crypto-safexcel f2800000.crypto: firmware: > direct-loading firmware inside-secure/eip197b/ipue.bin > [14785.777978] alg: skcipher: safexcel-cbc-des encryption test failed > (wrong output IV) on test vector 0, cfg="in-place" > [14785.788661] 00000000: fe dc ba 98 76 54 32 10 > [14785.800606] alg: skcipher: safexcel-cbc-des3_ede encryption test > failed (wrong output IV) on test vector 0, cfg="in-place" > [14785.811720] 00000000: 7d 33 88 93 0f 93 b2 42 > [14785.823734] alg: skcipher: safexcel-cbc-aes encryption test failed > (wrong output IV) on test vector 0, cfg="in-place" > [14785.834439] 00000000: 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 > [14785.884568] alg: hash: safexcel-hmac-sha224 test failed (wrong > result) on test vector 3, cfg="init+update+update+final two even splits" > [14785.901836] alg: hash: safexcel-hmac-sha256 test failed (wrong > result) on test vector 2, cfg="import/export" > [14785.926693] alg: aead: safexcel-authenc-hmac-sha1-cbc-aes > encryption test failed (wrong result) on test vector 0, > cfg="misaligned splits crossing pages, inplace" > [14785.944430] alg: No test for authenc(hmac(sha224),cbc(aes)) > (safexcel-authenc-hmac-sha224-cbc-aes) > [14785.956978] alg: aead: safexcel-authenc-hmac-sha256-cbc-aes > encryption test failed (wrong result) on test vector 0, cfg="two even > aligned splits" > [14785.973472] alg: No test for authenc(hmac(sha384),cbc(aes)) > (safexcel-authenc-hmac-sha384-cbc-aes) > [14785.986103] alg: aead: safexcel-authenc-hmac-sha512-cbc-aes > encryption test failed (wrong result) on test vector 0, cfg="two even > aligned splits" > > > I am going to test it with more recent, mainline kernel as well, but > it would be still nice to learn > a little bit more about this "minifw", it's features, and what could > be possibly achieved on this > board without proprietary (and behind NDA) crypto firmware. > > Thank you, > > > [1] > https://www.solid-run.com/embedded-networking/marvell-armada-family/clearfog-gt-8k/ > [2] https://images.solid-build.xyz/8040/Debian/ > [3] > https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/inside-secure/eip197_minifw/ifpp.bin?id=eefb5f7410150c00d0ab5c41c5d817ae9bf449b3 > -- Maciej Pijanowski Embedded Systems Engineer GPG: 9963C36AAC3B2B46 https://3mdeb.com | @3mdeb_com