blob: 96a089b955be41836dc6b965187e5a7c2a48aba9 [file] [log] [blame]
Angel Ponsbbc99cf2020-04-04 18:51:23 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Julius Werner33df4952014-12-16 22:48:26 -08002
Kyösti Mälkki13f66502019-03-03 08:01:05 +02003#include <device/mmio.h>
Julius Werner33df4952014-12-16 22:48:26 -08004#include <assert.h>
Elyes HAOUAS20eaef02019-03-29 17:45:28 +01005#include <console/console.h>
Julius Werner33df4952014-12-16 22:48:26 -08006#include <delay.h>
7#include <soc/addressmap.h>
8#include <soc/soc.h>
9#include <types.h>
10#include <vb2_api.h>
11
12enum rk3288_crypto_interrupt_bits {
13 PKA_DONE = 1 << 5,
14 HASH_DONE = 1 << 4,
15 HRDMA_ERR = 1 << 3,
16 HRDMA_DONE = 1 << 2,
17 BCDMA_ERR = 1 << 1,
18 BCDMA_DONE = 1 << 0,
19};
20
21struct rk3288_crypto {
22 u32 intsts;
23 u32 intena;
24 u32 ctrl;
25 u32 conf;
26 u32 brdmas;
27 u32 btdmas;
28 u32 btdmal;
29 u32 hrdmas;
30 u32 hrdmal;
31 u8 _res0[0x80 - 0x24];
32 u32 aes_ctrl;
33 u32 aes_sts;
34 u32 aes_din[4];
35 u32 aes_dout[4];
36 u32 aes_iv[4];
37 u32 aes_key[8];
38 u32 aes_cnt[4];
39 u8 _res1[0x100 - 0xe8];
40 u32 tdes_ctrl;
41 u32 tdes_sts;
42 u32 tdes_din[2];
43 u32 tdes_dout[2];
44 u32 tdes_iv[2];
45 u32 tdes_key[3][2];
46 u8 _res2[0x180 - 0x138];
47 u32 hash_ctrl;
48 u32 hash_sts;
49 u32 hash_msg_len;
50 u32 hash_dout[8];
51 u32 hash_seed[5];
52 u8 _res3[0x200 - 0x1c0];
53 u32 trng_ctrl;
54 u32 trng_dout[8];
55} *crypto = (void *)CRYPTO_BASE;
56check_member(rk3288_crypto, trng_dout[7], 0x220);
57
Joel Kitching220ac042019-07-31 14:19:00 +080058vb2_error_t vb2ex_hwcrypto_digest_init(enum vb2_hash_algorithm hash_alg,
59 uint32_t data_size)
Julius Werner33df4952014-12-16 22:48:26 -080060{
61 if (hash_alg != VB2_HASH_SHA256) {
62 printk(BIOS_INFO, "RK3288 doesn't support hash_alg %d!\n",
63 hash_alg);
64 return VB2_ERROR_EX_HWCRYPTO_UNSUPPORTED;
65 }
66
Julius Werner2f37bd62015-02-19 14:51:15 -080067 write32(&crypto->ctrl, RK_SETBITS(1 << 6)); /* Assert HASH_FLUSH */
Julius Werner33df4952014-12-16 22:48:26 -080068 udelay(1); /* for 10+ cycles to */
Julius Werner2f37bd62015-02-19 14:51:15 -080069 write32(&crypto->ctrl, RK_CLRBITS(1 << 6)); /* clear out old hash */
Julius Werner33df4952014-12-16 22:48:26 -080070
71 /* Enable DMA byte swapping for little-endian bus (Byteswap_??FIFO) */
Julius Werner2f37bd62015-02-19 14:51:15 -080072 write32(&crypto->conf, 1 << 5 | 1 << 4 | 1 << 3);
Julius Werner33df4952014-12-16 22:48:26 -080073
Julius Werner2f37bd62015-02-19 14:51:15 -080074 write32(&crypto->intena, HRDMA_ERR | HRDMA_DONE); /* enable interrupt */
Julius Werner33df4952014-12-16 22:48:26 -080075
Julius Werner2f37bd62015-02-19 14:51:15 -080076 write32(&crypto->hash_msg_len, data_size); /* program total size */
77 write32(&crypto->hash_ctrl, 1 << 3 | 0x2); /* swap DOUT, SHA256 */
Julius Werner33df4952014-12-16 22:48:26 -080078
79 printk(BIOS_DEBUG, "Initialized RK3288 HW crypto for %u byte SHA256\n",
80 data_size);
81 return VB2_SUCCESS;
82}
83
Joel Kitching220ac042019-07-31 14:19:00 +080084vb2_error_t vb2ex_hwcrypto_digest_extend(const uint8_t *buf, uint32_t size)
Julius Werner33df4952014-12-16 22:48:26 -080085{
86 uint32_t intsts;
87
Julius Werner2f37bd62015-02-19 14:51:15 -080088 write32(&crypto->intsts, HRDMA_ERR | HRDMA_DONE); /* clear interrupts */
Julius Werner33df4952014-12-16 22:48:26 -080089
90 /* NOTE: This assumes that the DMA is reading from uncached SRAM. */
Julius Werner2f37bd62015-02-19 14:51:15 -080091 write32(&crypto->hrdmas, (uint32_t)buf);
92 write32(&crypto->hrdmal, size / sizeof(uint32_t));
93 write32(&crypto->ctrl, RK_SETBITS(1 << 3)); /* Set HASH_START */
Julius Werner33df4952014-12-16 22:48:26 -080094 do {
95 intsts = read32(&crypto->intsts);
96 if (intsts & HRDMA_ERR) {
97 printk(BIOS_ERR, "ERROR: DMA error during HW crypto\n");
98 return VB2_ERROR_UNKNOWN;
99 }
100 } while (!(intsts & HRDMA_DONE)); /* wait for DMA to finish */
101
102 return VB2_SUCCESS;
103}
104
Joel Kitching220ac042019-07-31 14:19:00 +0800105vb2_error_t vb2ex_hwcrypto_digest_finalize(uint8_t *digest,
106 uint32_t digest_size)
Julius Werner33df4952014-12-16 22:48:26 -0800107{
108 uint32_t *dest = (uint32_t *)digest;
109 uint32_t *src = crypto->hash_dout;
110 assert(digest_size == sizeof(crypto->hash_dout));
111
112 while (!(read32(&crypto->hash_sts) & 0x1))
113 /* wait for crypto engine to set HASH_DONE bit */;
114
115 while ((uint8_t *)dest < digest + digest_size)
116 *dest++ = read32(src++);
117
118 return VB2_SUCCESS;
119}