source: trunk/target/linux/ifxmips/files-2.6.33/drivers/crypto/ifxmips/ifxmips_sha1_hmac.c @ 21159

Last change on this file since 21159 was 21159, checked in by ralph, 6 years ago

[ifxmips] refresh 2.6.33 patches, add more mach support, add crypto support, tbd. mach/board detection

  • Property svn:executable set to *
File size: 8.1 KB
Line 
1/*
2 *   This program is free software; you can redistribute it and/or modify
3 *   it under the terms of the GNU General Public License as published by
4 *   the Free Software Foundation; either version 2 of the License, or
5 *   (at your option) any later version.
6 *
7 *   This program is distributed in the hope that it will be useful,
8 *   but WITHOUT ANY WARRANTY; without even the implied warranty of
9 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
10 *   GNU General Public License for more details.
11 *
12 *   You should have received a copy of the GNU General Public License
13 *   along with this program; if not, write to the Free Software
14 *   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307, USA.
15 *
16 *   Copyright (C) 2010 Ralph Hempel <ralph.hempel@lantiq.com>
17 *   Copyright (C) 2009 Mohammad Firdaus
18 */
19
20/*!
21  \defgroup IFX_DEU IFX_DEU_DRIVERS
22  \ingroup API
23  \brief ifx deu driver module
24*/
25
26/*!
27  \file ifxmips_sha1_hmac.c
28  \ingroup IFX_DEU
29  \brief SHA1-HMAC deu driver file
30*/
31
32/*!
33  \defgroup IFX_SHA1_HMAC_FUNCTIONS IFX_SHA1_HMAC_FUNCTIONS
34  \ingroup IFX_DEU
35  \brief ifx sha1 hmac functions
36*/
37
38
39/* Project header */
40#include <linux/init.h>
41#include <linux/module.h>
42#include <linux/mm.h>
43#include <linux/crypto.h>
44#include <linux/cryptohash.h>
45#include <linux/types.h>
46#include <asm/scatterlist.h>
47#include <asm/byteorder.h>
48#include <linux/delay.h>
49#include "ifxmips_deu.h"
50
51#ifdef CONFIG_CRYPTO_DEV_IFXMIPS_SHA1_HMAC
52
53#define SHA1_DIGEST_SIZE    20
54#define SHA1_HMAC_BLOCK_SIZE    64
55#define SHA1_HMAC_DBN_TEMP_SIZE 1024 // size in dword, needed for dbn workaround
56#define HASH_START   IFX_HASH_CON
57
58static spinlock_t lock;
59#define CRTCL_SECT_INIT        spin_lock_init(&lock)
60#define CRTCL_SECT_START       spin_lock_irqsave(&lock, flag)
61#define CRTCL_SECT_END         spin_unlock_irqrestore(&lock, flag)
62
63struct sha1_hmac_ctx {
64        u64 count;
65        u32 state[5];
66        u8 buffer[64];
67    u32 dbn;
68    u32 temp[SHA1_HMAC_DBN_TEMP_SIZE];
69};
70
71extern int disable_deudma;
72
73/*! \fn static void sha1_hmac_transform(struct crypto_tfm *tfm, u32 const *in)
74 *  \ingroup IFX_SHA1_HMAC_FUNCTIONS
75 *  \brief save input block to context
76 *  \param tfm linux crypto algo transform
77 *  \param in 64-byte block of input
78*/
79static void sha1_hmac_transform(struct crypto_tfm *tfm, u32 const *in)
80{
81    struct sha1_hmac_ctx *sctx = crypto_tfm_ctx(tfm);
82
83    memcpy(&sctx->temp[sctx->dbn<<4], in, 64); //dbn workaround
84    sctx->dbn += 1;
85
86    if ( (sctx->dbn<<4) > SHA1_HMAC_DBN_TEMP_SIZE )
87    {
88        printk("SHA1_HMAC_DBN_TEMP_SIZE exceeded\n");
89    }
90
91}
92
93/*! \fn int sha1_hmac_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen)
94 *  \ingroup IFX_SHA1_HMAC_FUNCTIONS
95 *  \brief sets sha1 hmac key
96 *  \param tfm linux crypto algo transform
97 *  \param key input key
98 *  \param keylen key length greater than 64 bytes IS NOT SUPPORTED
99*/
100int sha1_hmac_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen)
101{
102    volatile struct deu_hash_t *hash = (struct deu_hash_t *) HASH_START;
103    int i, j;
104    u32 *in_key = (u32 *)key;
105
106    hash->KIDX = 0x80000000; // reset all 16 words of the key to '0'
107    asm("sync");
108
109    j = 0;
110    for (i = 0; i < keylen; i+=4)
111    {
112         hash->KIDX = j;
113         asm("sync");
114         hash->KEY = *((u32 *) in_key + j);
115         j++;
116    }
117
118    return 0;
119}
120
121/*! \fn void sha1_hmac_init(struct crypto_tfm *tfm)
122 *  \ingroup IFX_SHA1_HMAC_FUNCTIONS
123 *  \brief initialize sha1 hmac context
124 *  \param tfm linux crypto algo transform
125*/
126void sha1_hmac_init(struct crypto_tfm *tfm)
127{
128    struct sha1_hmac_ctx *sctx = crypto_tfm_ctx(tfm);
129
130        memset(sctx, 0, sizeof(struct sha1_hmac_ctx));
131    sctx->dbn = 0; //dbn workaround
132}
133
134/*! \fn static void sha1_hmac_update(struct crypto_tfm *tfm, const u8 *data, unsigned int len)
135 *  \ingroup IFX_SHA1_HMAC_FUNCTIONS
136 *  \brief on-the-fly sha1 hmac computation
137 *  \param tfm linux crypto algo transform
138 *  \param data input data
139 *  \param len size of input data
140*/
141static void sha1_hmac_update(struct crypto_tfm *tfm, const u8 *data,
142            unsigned int len)
143{
144    struct sha1_hmac_ctx *sctx = crypto_tfm_ctx(tfm);
145    unsigned int i, j;
146
147    j = (sctx->count >> 3) & 0x3f;
148    sctx->count += len << 3;
149    //printk("sctx->count = %d\n", (sctx->count >> 3));
150
151    if ((j + len) > 63) {
152        memcpy (&sctx->buffer[j], data, (i = 64 - j));
153        sha1_hmac_transform (tfm, (const u32 *)sctx->buffer);
154        for (; i + 63 < len; i += 64) {
155            sha1_hmac_transform (tfm, (const u32 *)&data[i]);
156        }
157
158        j = 0;
159    }
160    else
161        i = 0;
162
163    memcpy (&sctx->buffer[j], &data[i], len - i);
164}
165
166/*! \fn static void sha1_hmac_final(struct crypto_tfm *tfm, u8 *out)
167 *  \ingroup IFX_SHA1_HMAC_FUNCTIONS
168 *  \brief ompute final sha1 hmac value
169 *  \param tfm linux crypto algo transform
170 *  \param out final sha1 hmac output value
171*/
172static void sha1_hmac_final(struct crypto_tfm *tfm, u8 *out)
173{
174        struct sha1_hmac_ctx *sctx = crypto_tfm_ctx(tfm);
175    u32 index, padlen;
176    u64 t;
177    u8 bits[8] = { 0, };
178    static const u8 padding[64] = { 0x80, };
179    volatile struct deu_hash_t *hashs = (struct deu_hash_t *) HASH_START;
180    ulong flag;
181    int i = 0;
182    int dbn;
183    u32 *in = &sctx->temp[0];
184
185    t = sctx->count + 512; // need to add 512 bit of the IPAD operation
186    bits[7] = 0xff & t;
187    t >>= 8;
188    bits[6] = 0xff & t;
189    t >>= 8;
190    bits[5] = 0xff & t;
191    t >>= 8;
192    bits[4] = 0xff & t;
193    t >>= 8;
194    bits[3] = 0xff & t;
195    t >>= 8;
196    bits[2] = 0xff & t;
197    t >>= 8;
198    bits[1] = 0xff & t;
199    t >>= 8;
200    bits[0] = 0xff & t;
201
202    /* Pad out to 56 mod 64 */
203    index = (sctx->count >> 3) & 0x3f;
204    padlen = (index < 56) ? (56 - index) : ((64 + 56) - index);
205    sha1_hmac_update (tfm, padding, padlen);
206
207    /* Append length */
208    sha1_hmac_update (tfm, bits, sizeof bits);
209
210    CRTCL_SECT_START;
211
212    hashs->DBN = sctx->dbn;
213
214    //for vr9 change, ENDI = 1
215    *IFX_HASH_CON = HASH_CON_VALUE;
216
217    //wait for processing
218    while (hashs->controlr.BSY) {
219        // this will not take long
220    }
221
222    for (dbn = 0; dbn < sctx->dbn; dbn++)
223    {
224    for (i = 0; i < 16; i++) {
225        hashs->MR = in[i];
226    };
227
228    hashs->controlr.GO = 1;
229    asm("sync");
230
231    //wait for processing
232    while (hashs->controlr.BSY) {
233            // this will not take long
234    }
235
236    in += 16;
237}
238
239
240#if 1
241    //wait for digest ready
242    while (! hashs->controlr.DGRY) {
243        // this will not take long
244    }
245#endif
246
247    *((u32 *) out + 0) = hashs->D1R;
248    *((u32 *) out + 1) = hashs->D2R;
249    *((u32 *) out + 2) = hashs->D3R;
250    *((u32 *) out + 3) = hashs->D4R;
251    *((u32 *) out + 4) = hashs->D5R;
252
253    CRTCL_SECT_END;
254}
255
256/*
257 * \brief SHA1-HMAC function mappings
258*/
259
260struct crypto_alg ifxdeu_sha1_hmac_alg = {
261        .cra_name       =       "hmac(sha1)",
262        .cra_driver_name=       "ifxdeu-sha1_hmac",
263        .cra_flags      =       CRYPTO_ALG_TYPE_DIGEST,
264        .cra_blocksize  =       SHA1_HMAC_BLOCK_SIZE,
265        .cra_ctxsize    =       sizeof(struct sha1_hmac_ctx),
266        .cra_module   =         THIS_MODULE,
267        .cra_alignmask  =       3,
268        .cra_list       =       LIST_HEAD_INIT(ifxdeu_sha1_hmac_alg.cra_list),
269        .cra_u          =       { .digest = {
270        .dia_digestsize =       SHA1_DIGEST_SIZE,
271        .dia_setkey     =       sha1_hmac_setkey,
272        .dia_init       =       sha1_hmac_init,
273        .dia_update     =       sha1_hmac_update,
274        .dia_final      =       sha1_hmac_final } }
275};
276
277
278/*! \fn int __init ifxdeu_init_sha1_hmac (void)
279 *  \ingroup IFX_SHA1_HMAC_FUNCTIONS
280 *  \brief initialize sha1 hmac driver
281*/
282int __init ifxdeu_init_sha1_hmac (void)
283{
284    int ret;
285
286    if ((ret = crypto_register_alg(&ifxdeu_sha1_hmac_alg)))
287        goto sha1_err;
288
289    CRTCL_SECT_INIT;
290
291    printk (KERN_NOTICE "IFX DEU SHA1_HMAC initialized%s.\n", disable_deudma ? "" : " (DMA)");
292    return ret;
293
294sha1_err:
295    printk(KERN_ERR "IFX DEU SHA1_HMAC initialization failed!\n");
296    return ret;
297}
298
299/*! \fn void __exit ifxdeu_fini_sha1_hmac (void)
300 *  \ingroup IFX_SHA1_HMAC_FUNCTIONS
301 *  \brief unregister sha1 hmac driver
302*/
303void __exit ifxdeu_fini_sha1_hmac (void)
304{
305    crypto_unregister_alg (&ifxdeu_sha1_hmac_alg);
306}
307
308#endif
Note: See TracBrowser for help on using the repository browser.