Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1505798pxb; Fri, 22 Oct 2021 02:13:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwLTeKvuPfHxaSzSfYCMnx1xaNJ3YqWXvZs8bZn2tBr6++eYYlD3MC56yIe/h0Qm/tRvE/I X-Received: by 2002:a17:902:d50d:b0:13e:a44e:2d2a with SMTP id b13-20020a170902d50d00b0013ea44e2d2amr10103763plg.89.1634894010609; Fri, 22 Oct 2021 02:13:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634894010; cv=none; d=google.com; s=arc-20160816; b=B0iNbuny+V4IYy2pzjy72VwaL/Ff5b6/lCdPTS52OtM+85Nwh7T3GxUOIE22NeUm9u geskxNiWJ+81Yt3DqDChi2AQaeW4NVHDEn9VZND219/8C1X9HVWywrzRUhx0B5Y8JKzy medTWcrhnXDjjFD3qqkV6I6v9sorrQvtY6KDEbi/q3XvKBojUTzZJ1sFcAPADjBklLHz Cp9t1/TUH9w9dsMLDZ70jn4Fso1VBOhRzLvKbssZBrKifztG9r+1dvRwuQSwrh0BW/nw L5M5iG1arwb6H3jXo6RyBkp0nkfTdvD73ALePe6DPQIOFUMudanEODtU3MfDlpRaUPNz 76sg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=7dYmCE/YxHBPNlhH0ghmxviSpbD1eLZdjfVNOXL3opg=; b=sxa3bYbLwCWK2uzafNEvOgdfwtVtIlSWep0rRe0jyRYL5Rp7k+3BbUROhVDifJbfvK G9FUQiLr+EtTAQlFXOKrZT4z5CNXIz/a8Bw4RikiHp0bY+dmENalA61JeV4UljXXgBzf t/Bwj19GP927PsLz9Yr0EWSiLEqoRR/1CaL6rsS9U/FB+W5Q7a5rrBrqNqhWoNdU9hrN p75SVWelI+Y/P77TcmR2ZTeFHllFuYEaPYf0WUvpqdggC7NmlIH1Qtsg4hjLpIY0wX0H ncyHll+ntyH74Wci0dKLS2C9Tnpmw95Nrb6qhi7cpHYrHV0W6fenyfXzkwTjrsitKldf sPSA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j62si10431489pgd.75.2021.10.22.02.13.10; Fri, 22 Oct 2021 02:13:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232518AbhJVJPS (ORCPT + 99 others); Fri, 22 Oct 2021 05:15:18 -0400 Received: from szxga02-in.huawei.com ([45.249.212.188]:14847 "EHLO szxga02-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232526AbhJVJPM (ORCPT ); Fri, 22 Oct 2021 05:15:12 -0400 Received: from dggemv704-chm.china.huawei.com (unknown [172.30.72.54]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4HbJQz6D8Jz90GD; Fri, 22 Oct 2021 17:07:55 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggemv704-chm.china.huawei.com (10.3.19.47) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.15; Fri, 22 Oct 2021 17:12:50 +0800 Received: from huawei.com (10.69.192.56) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.15; Fri, 22 Oct 2021 17:12:50 +0800 From: Kai Ye To: CC: , , , , Subject: [PATCH v3 3/6] crypto: hisilicon/sec - support the larger packets for digest mode Date: Fri, 22 Oct 2021 17:10:52 +0800 Message-ID: <20211022091055.15369-4-yekai13@huawei.com> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20211022091055.15369-1-yekai13@huawei.com> References: <20211022091055.15369-1-yekai13@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.69.192.56] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Support the larger packets inputing for digest mode. By split the larger packet, the driver input one block size packet to the hardware every time. Setting one block size is PAGE_SIZE(4K). Based on the long hash feature, the soft waits until the previous packet is complete and then sends the next packet. Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/sec2/sec_crypto.c | 76 ++++++++++++++++++++++ 1 file changed, 76 insertions(+) diff --git a/drivers/crypto/hisilicon/sec2/sec_crypto.c b/drivers/crypto/hisilicon/sec2/sec_crypto.c index c2010995d4b8..3f95d7b598ea 100644 --- a/drivers/crypto/hisilicon/sec2/sec_crypto.c +++ b/drivers/crypto/hisilicon/sec2/sec_crypto.c @@ -2732,6 +2732,80 @@ static int sec_ahash_finup(struct ahash_request *req) return sec_ahash_process(req); } +static int digest_hardware_update(struct sec_req *sreq, struct scatterlist *src, + u32 start, u32 nbytes) +{ + struct sec_ahash_req *sareq = &sreq->hash_req; + struct scatterlist *pingpong_sg; + struct sec_ctx *ctx = sreq->ctx; + int nents = sg_nents(src); + int sid = sareq->sid; + u8 idx; + + idx = ctx->pingpong_idx[sid]; + pingpong_sg = ctx->pingpong_sg[sid][idx].sgl; + + sareq->op = SEC_SHA_UPDATE; + sareq->pp_sg = pingpong_sg; + + /* The pingpong buffer can hold the one block input of this request */ + sg_pcopy_to_buffer(src, nents, sg_virt(pingpong_sg), nbytes, start); + ctx->pingpong_sg[sid][idx].len = nbytes; + + sareq->req_data_len = 0; + sareq->pp_data_len = nbytes; + sareq->block_data_len = nbytes; + sareq->total_data_len += nbytes; + + return ctx->req_op->process(ctx, sreq); +} + +static int sec_ahash_larger_digest(struct ahash_request *req) +{ + struct sec_req *sreq = ahash_request_ctx(req); + struct sec_ahash_req *sareq = &sreq->hash_req; + u32 input_len = req->nbytes; + struct scatterlist *pingpong_sg; + struct sec_ctx *ctx = sreq->ctx; + u32 sid = sareq->sid; + u8 idx = ctx->pingpong_idx[sid]; + u32 start = 0; + int ret; + + while (input_len > SEC_SID_BUF_LEN) { + /* Setting one block size is PAGE_SIZE */ + req->nbytes = SEC_SID_BUF_LEN; + input_len -= SEC_SID_BUF_LEN; + + ret = digest_hardware_update(sreq, req->src, start, + req->nbytes); + if (unlikely(ret == -EINVAL)) { + pr_err("ahash digest: hardware update process is error!\n"); + return ret; + } + + stream_hash_wait(sareq); + + start += SEC_SID_BUF_LEN; + } + + /* Last packet send to the hardware */ + req->nbytes = input_len; + sareq->req_data_len = 0; + + pingpong_sg = ctx->pingpong_sg[sid][idx].sgl; + sg_pcopy_to_buffer(req->src, sg_nents(req->src), sg_virt(pingpong_sg), + input_len, start); + ctx->pingpong_sg[sid][idx].len = input_len; + sareq->pp_data_len = input_len; + sareq->block_data_len = input_len; + sareq->total_data_len += input_len; + + sareq->op = SEC_SHA_FINAL; + + return ctx->req_op->process(ctx, sreq); +} + static int sec_ahash_digest(struct ahash_request *req) { struct sec_req *sreq = ahash_request_ctx(req); @@ -2748,6 +2822,8 @@ static int sec_ahash_digest(struct ahash_request *req) ctx = sreq->ctx; a_ctx = &ctx->a_ctx; + if (req->nbytes > SEC_HW_MAX_LEN) + return sec_ahash_larger_digest(req); sareq->op = SEC_SHA_DIGEST; -- 2.33.0