Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1360730pxb; Wed, 20 Oct 2021 03:36:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx4Mmw4q0bRiZsiTmHdwzEkKEOXC0t2BdwHUcY4XL/DCD0lqaoEr/S2xSmVnrBKM07CvmgM X-Received: by 2002:aa7:9099:0:b0:44c:a3b5:ca52 with SMTP id i25-20020aa79099000000b0044ca3b5ca52mr5526928pfa.85.1634726201951; Wed, 20 Oct 2021 03:36:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634726201; cv=none; d=google.com; s=arc-20160816; b=qW0HdXyG6m6BQ9OT1zIgA6kylROiOHLdQONhpUhGtMkSaHl9X7NgF8CXUxOGEyzMdW P591cFQgx5hcd3Bir7JRnVp3C43EE7702vSmWaXsUOLoND8qvxQh8rnqKXx6P6P6/nc9 T6y2YMjr41idX4QweEjSX+mnHkPaIhI8rwTCUqSzNyOTeO21406trUIfTUtZO0g1xrww 1KYDngAkfsjnbaBy0Y+j1+bALBVFQx/N5rmq3iZRqu7t1dir1fTRzM+qyhuNI/hRz3GJ firSyns7oHxVqH+sBffl3Q7lBCnzB3lMvoUciZuokN8W+SxZC38pZRA0lJzpCKso7KIg XOjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=bc7+sjzxZG3ps45T8EgHPtFOuexGaT3uIcTN69uMl/4=; b=rbxM6zSLn8ZiyIMq+ySPR1PY1kVGE+LuyqYZSRKulRD+Ak3irvuhY+tIh5y96/z4QI CYFEY/k6WFohypQrb//40VUnnDB47Amr1Lfn2cP8HTxD9/bbdIFxCQAQvRor/EZY/rl1 t6xQ5vYboRn7tnpk1LF5XU/7x9JHiae23lK0vkUZEse9+9lAqx8387JAwrRR9SOMFlT9 wbl+J8SEUCMBhXTJjCFqo4njJAw7Kq0NmuQpzbS6Qpj30BuB+0Fsi1S6seJ2XMJJyJ7N ZDiPF+u4v7tS20kA12A77b3LwOvWbqQ9s2yMgTQnJIt+Cdu9EjibOvf97wPSYu8tjlvI fBIQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z2si2926440pfc.211.2021.10.20.03.35.52; Wed, 20 Oct 2021 03:36:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229900AbhJTKh6 (ORCPT + 99 others); Wed, 20 Oct 2021 06:37:58 -0400 Received: from mga09.intel.com ([134.134.136.24]:7379 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229639AbhJTKh6 (ORCPT ); Wed, 20 Oct 2021 06:37:58 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10142"; a="228622884" X-IronPort-AV: E=Sophos;i="5.87,166,1631602800"; d="scan'208";a="228622884" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Oct 2021 03:35:44 -0700 X-IronPort-AV: E=Sophos;i="5.87,166,1631602800"; d="scan'208";a="527005545" Received: from dhicke3x-mobl1.ger.corp.intel.com (HELO dalessan-mobl1.ir.intel.com) ([10.252.29.200]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Oct 2021 03:35:41 -0700 From: Daniele Alessandrelli To: linux-crypto@vger.kernel.org, Herbert Xu , "David S. Miller" Cc: devicetree@vger.kernel.org, Rob Herring , Daniele Alessandrelli , Mark Gross , Prabhjot Khurana , Elena Reshetova Subject: [PATCH 0/5] Keem Bay OCS ECC crypto driver Date: Wed, 20 Oct 2021 11:35:33 +0100 Message-Id: <20211020103538.360614-1-daniele.alessandrelli@linux.intel.com> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi, This patch series adds the Intel Keem Bay OCS ECC crypto driver, which enables hardware-accelerated 'ecdh-nist-p256' and 'ecdh-nist-p384' on the Intel Keem Bay SoC. The following changes to core crypto code are also done: - KPP support is added to the crypto engine (so that the new driver can use it). - 'crypto/ecc.h' is moved to 'include/crypto/internal' (so that this and other drivers can use the symbols exported by 'crypto/ecc.c'). - A few additional functions from 'crypto/ecc.c' are exported (so that this and other drivers can use them and avoid code duplication). The driver passes crypto manager self-tests. A previous version of this patch series was submitted as an RFC: https://lore.kernel.org/linux-crypto/20201217172101.381772-1-daniele.alessandrelli@linux.intel.com/ Changes from previous RFC submission (RFC-v1): - Switched to the new 'ecdh-nist-p256' and 'ecdh-nist-p384' algorithm names - Dropped the CONFIG_CRYPTO_DEV_KEEMBAY_OCS_ECDH_GEN_PRIV_KEY_SUPPORT Kconfig option Daniele Alessandrelli (2): crypto: ecc - Move ecc.h to include/crypto/internal crypto: ecc - Export additional helper functions Prabhjot Khurana (3): crypto: engine - Add KPP Support to Crypto Engine dt-bindings: crypto: Add Keem Bay ECC bindings crypto: keembay-ocs-ecc - Add Keem Bay OCS ECC Driver Documentation/crypto/crypto_engine.rst | 4 + .../crypto/intel,keembay-ocs-ecc.yaml | 47 + MAINTAINERS | 11 + crypto/crypto_engine.c | 26 + crypto/ecc.c | 14 +- crypto/ecdh.c | 2 +- crypto/ecdsa.c | 2 +- crypto/ecrdsa.c | 2 +- crypto/ecrdsa_defs.h | 2 +- drivers/crypto/keembay/Kconfig | 19 + drivers/crypto/keembay/Makefile | 2 + drivers/crypto/keembay/keembay-ocs-ecc.c | 1017 +++++++++++++++++ include/crypto/engine.h | 5 + {crypto => include/crypto/internal}/ecc.h | 36 + 14 files changed, 1180 insertions(+), 9 deletions(-) create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-ecc.yaml create mode 100644 drivers/crypto/keembay/keembay-ocs-ecc.c rename {crypto => include/crypto/internal}/ecc.h (90%) base-commit: 06f6e365e2ecf799c249bb464aa9d5f055e88b56 -- 2.31.1