From: Chia-Wei Wang <chiawei_wang@aspeedtech.com>
To: <lukma@denx.de>, <maxims@google.com>, <sjg@chromium.org>,
<u-boot@lists.denx.de>
Cc: <ryan_chen@aspeedtech.com>
Subject: [PATCH 08/14] crypto: aspeed: Add AST2600 ARCY support
Date: Tue, 13 Jul 2021 17:00:10 +0800 [thread overview]
Message-ID: <20210713090016.2729-9-chiawei_wang@aspeedtech.com> (raw)
In-Reply-To: <20210713090016.2729-1-chiawei_wang@aspeedtech.com>
ARCY is deisnged to accerlerate ECC/RSA digital signature
generation and verification.
Signed-off-by: Chia-Wei Wang <chiawei_wang@aspeedtech.com>
---
drivers/crypto/aspeed/Kconfig | 10 ++
drivers/crypto/aspeed/Makefile | 1 +
drivers/crypto/aspeed/aspeed_arcy.c | 182 ++++++++++++++++++++++++++++
lib/rsa/Kconfig | 10 +-
4 files changed, 202 insertions(+), 1 deletion(-)
create mode 100644 drivers/crypto/aspeed/aspeed_arcy.c
diff --git a/drivers/crypto/aspeed/Kconfig b/drivers/crypto/aspeed/Kconfig
index 299efc223f..9d896afa8a 100644
--- a/drivers/crypto/aspeed/Kconfig
+++ b/drivers/crypto/aspeed/Kconfig
@@ -10,3 +10,13 @@ config ASPEED_HACE
Enabling this allows the use of SHA operations in hardware without requiring the
SHA software implementations. It also improves performance and saves code size.
+
+config ASPEED_ARCY
+ bool "ASPEED RSA and ECC Engine"
+ depends on ASPEED_AST2600
+ help
+ Select this option to enable a driver for using the RSA/ECC engine in
+ the ASPEED BMC SoCs.
+
+ Enabling this allows the use of RSA/ECC operations in hardware without requiring the
+ software implementations. It also improves performance and saves code size.
diff --git a/drivers/crypto/aspeed/Makefile b/drivers/crypto/aspeed/Makefile
index 84e6bfe82a..8de95eef7e 100644
--- a/drivers/crypto/aspeed/Makefile
+++ b/drivers/crypto/aspeed/Makefile
@@ -1 +1,2 @@
obj-$(CONFIG_ASPEED_HACE) += aspeed_hace.o
+obj-$(CONFIG_ASPEED_ARCY) += aspeed_arcy.o
diff --git a/drivers/crypto/aspeed/aspeed_arcy.c b/drivers/crypto/aspeed/aspeed_arcy.c
new file mode 100644
index 0000000000..d3da869f83
--- /dev/null
+++ b/drivers/crypto/aspeed/aspeed_arcy.c
@@ -0,0 +1,182 @@
+// SPDX-License-Identifier: GPL-2.0-or-later
+/*
+ * Copyright 2021 ASPEED Technology Inc.
+ */
+#include <config.h>
+#include <common.h>
+#include <clk.h>
+#include <dm.h>
+#include <asm/types.h>
+#include <asm/io.h>
+#include <dm/device.h>
+#include <dm/fdtaddr.h>
+#include <linux/delay.h>
+#include <u-boot/rsa-mod-exp.h>
+
+/* ARCY register offsets */
+#define ARCY_CTRL1 0x00
+#define ARCY_CTRL1_RSA_DMA BIT(1)
+#define ARCY_CTRL1_RSA_START BIT(0)
+#define ARCY_CTRL2 0x44
+#define ARCY_CTRL3 0x48
+#define ARCY_CTRL3_SRAM_AHB_ACCESS BIT(8)
+#define ARCY_CTRL3_ECC_RSA_MODE_MASK GENMASK(5, 4)
+#define ARCY_CTRL3_ECC_RSA_MODE_SHIFT 4
+#define ARCY_DMA_DRAM_SADDR 0x4c
+#define ARCY_DMA_DMEM_TADDR 0x50
+#define ARCY_DMA_DMEM_TADDR_LEN_MASK GENMASK(15, 0)
+#define ARCY_DMA_DMEM_TADDR_LEN_SHIFT 0
+#define ARCY_RSA_PARAM 0x58
+#define ARCY_RSA_PARAM_EXP_MASK GENMASK(31, 16)
+#define ARCY_RSA_PARAM_EXP_SHIFT 16
+#define ARCY_RSA_PARAM_MOD_MASK GENMASK(15, 0)
+#define ARCY_RSA_PARAM_MOD_SHIFT 0
+#define ARCY_RSA_INT_EN 0x3f8
+#define ARCY_RSA_INT_EN_RSA_READY BIT(2)
+#define ARCY_RSA_INT_EN_RSA_CMPLT BIT(1)
+#define ARCY_RSA_INT_STS 0x3fc
+#define ARCY_RSA_INT_STS_RSA_READY BIT(2)
+#define ARCY_RSA_INT_STS_RSA_CMPLT BIT(1)
+
+/* misc. constant */
+#define ARCY_ECC_MODE 2
+#define ARCY_RSA_MODE 3
+#define ARCY_CTX_BUFSZ 0x600
+
+struct aspeed_arcy {
+ phys_addr_t base;
+ phys_addr_t sram_base; /* internal sram */
+ struct clk clk;
+};
+
+static int aspeed_arcy_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len,
+ struct key_prop *prop, uint8_t *out)
+{
+ int i, j;
+ u8 *ctx;
+ u8 *ptr;
+ u32 reg;
+ struct aspeed_arcy *arcy = dev_get_priv(dev);
+
+ ctx = memalign(16, ARCY_CTX_BUFSZ);
+ if (!ctx)
+ return -ENOMEM;
+
+ memset(ctx, 0, ARCY_CTX_BUFSZ);
+
+ ptr = (u8 *)prop->public_exponent;
+ for (i = prop->exp_len - 1, j = 0; i >= 0; --i) {
+ ctx[j] = ptr[i];
+ j++;
+ j = (j % 16) ? j : j + 32;
+ }
+
+ ptr = (u8 *)prop->modulus;
+ for (i = (prop->num_bits >> 3) - 1, j = 0; i >= 0; --i) {
+ ctx[j + 16] = ptr[i];
+ j++;
+ j = (j % 16) ? j : j + 32;
+ }
+
+ ptr = (u8 *)sig;
+ for (i = sig_len - 1, j = 0; i >= 0; --i) {
+ ctx[j + 32] = ptr[i];
+ j++;
+ j = (j % 16) ? j : j + 32;
+ }
+
+ writel((u32)ctx, arcy->base + ARCY_DMA_DRAM_SADDR);
+
+ reg = (((prop->exp_len << 3) << ARCY_RSA_PARAM_EXP_SHIFT) & ARCY_RSA_PARAM_EXP_MASK) |
+ ((prop->num_bits << ARCY_RSA_PARAM_MOD_SHIFT) & ARCY_RSA_PARAM_MOD_MASK);
+ writel(reg, arcy->base + ARCY_RSA_PARAM);
+
+ reg = (ARCY_CTX_BUFSZ << ARCY_DMA_DMEM_TADDR_LEN_SHIFT) & ARCY_DMA_DMEM_TADDR_LEN_MASK;
+ writel(reg, arcy->base + ARCY_DMA_DMEM_TADDR);
+
+ reg = (ARCY_RSA_MODE << ARCY_CTRL3_ECC_RSA_MODE_SHIFT) & ARCY_CTRL3_ECC_RSA_MODE_MASK;
+ writel(reg, arcy->base + ARCY_CTRL3);
+
+ writel(ARCY_CTRL1_RSA_DMA | ARCY_CTRL1_RSA_START, arcy->base + ARCY_CTRL1);
+
+ /* polling RSA status */
+ while (1) {
+ reg = readl(arcy->base + ARCY_RSA_INT_STS);
+ if ((reg & ARCY_RSA_INT_STS_RSA_READY) && (reg & ARCY_RSA_INT_STS_RSA_CMPLT))
+ break;
+ udelay(20);
+ }
+
+ writel(0x0, arcy->base + ARCY_CTRL1);
+ writel(ARCY_CTRL3_SRAM_AHB_ACCESS, arcy->base + ARCY_CTRL3);
+ udelay(20);
+
+ for (i = (prop->num_bits / 8) - 1, j = 0; i >= 0; --i) {
+ out[i] = readb(arcy->sram_base + (j + 32));
+ j++;
+ j = (j % 16) ? j : j + 32;
+ }
+
+ return 0;
+}
+
+static int aspeed_arcy_probe(struct udevice *dev)
+{
+ struct aspeed_arcy *arcy = dev_get_priv(dev);
+ int ret;
+
+ ret = clk_get_by_index(dev, 0, &arcy->clk);
+ if (ret < 0) {
+ debug("Can't get clock for %s: %d\n", dev->name, ret);
+ return ret;
+ }
+
+ ret = clk_enable(&arcy->clk);
+ if (ret) {
+ debug("Failed to enable arcy clock (%d)\n", ret);
+ return ret;
+ }
+
+ arcy->base = devfdt_get_addr_index(dev, 0);
+ if (arcy->base == FDT_ADDR_T_NONE) {
+ debug("Failed to get arcy base\n");
+ return arcy->base;
+ }
+
+ arcy->sram_base = devfdt_get_addr_index(dev, 1);
+ if (arcy->sram_base == FDT_ADDR_T_NONE) {
+ debug("Failed to get arcy SRAM base\n");
+ return arcy->sram_base;
+ }
+
+ return ret;
+}
+
+static int aspeed_arcy_remove(struct udevice *dev)
+{
+ struct aspeed_arcy *arcy = dev_get_priv(dev);
+
+ clk_disable(&arcy->clk);
+
+ return 0;
+}
+
+static const struct mod_exp_ops aspeed_arcy_ops = {
+ .mod_exp = aspeed_arcy_mod_exp,
+};
+
+static const struct udevice_id aspeed_arcy_ids[] = {
+ { .compatible = "aspeed,ast2600-arcy" },
+ { }
+};
+
+U_BOOT_DRIVER(aspeed_arcy) = {
+ .name = "aspeed_arcy",
+ .id = UCLASS_MOD_EXP,
+ .of_match = aspeed_arcy_ids,
+ .probe = aspeed_arcy_probe,
+ .remove = aspeed_arcy_remove,
+ .priv_auto = sizeof(struct aspeed_arcy),
+ .ops = &aspeed_arcy_ops,
+ .flags = DM_FLAG_PRE_RELOC,
+};
diff --git a/lib/rsa/Kconfig b/lib/rsa/Kconfig
index a90d67e5a8..81c0936e58 100644
--- a/lib/rsa/Kconfig
+++ b/lib/rsa/Kconfig
@@ -1,7 +1,8 @@
config RSA
bool "Use RSA Library"
select RSA_FREESCALE_EXP if FSL_CAAM && !ARCH_MX7 && !ARCH_MX6 && !ARCH_MX5
- select RSA_SOFTWARE_EXP if !RSA_FREESCALE_EXP
+ select RSA_ASPEED_EXP if ASPEED_ARCY
+ select RSA_SOFTWARE_EXP if !RSA_FREESCALE_EXP && !RSA_ASPEED_EXP
help
RSA support. This enables the RSA algorithm used for FIT image
verification in U-Boot.
@@ -61,4 +62,11 @@ config RSA_FREESCALE_EXP
Enables driver for RSA modular exponentiation using Freescale cryptographic
accelerator - CAAM.
+config RSA_ASPEED_EXP
+ bool "Enable RSA Modular Exponentiation with ASPEED crypto accelerator"
+ depends on DM && ASPEED_ARCY
+ help
+ Enables driver for RSA modular exponentiation using ASPEED cryptographic
+ accelerator - ARCY
+
endif
--
2.17.1
next prev parent reply other threads:[~2021-07-13 9:01 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-07-13 9:00 [PATCH 00/14] aspeed: Support secure boot chain with FIT image verification Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 01/14] aspeed: ast2600: Enlarge SRAM size Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 02/14] clk: ast2600: Add YCLK control for HACE Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 03/14] crypto: aspeed: Add AST2600 HACE support Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 04/14] ast2600: spl: Add HACE probing Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 05/14] ARM: dts: ast2600: Add HACE to device tree Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 06/14] common: fit: Use hash.c to call CRC/SHA function Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 07/14] clk: ast2600: Add RSACLK control for ARCY Chia-Wei Wang
2021-07-13 9:00 ` Chia-Wei Wang [this message]
2021-07-13 9:00 ` [PATCH 09/14] ast2600: spl: Add ARCY probing Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 10/14] ARM: dts: ast2600: Add ARCY to device tree Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 11/14] ast2600: spl: Locate load buffer in DRAM space Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 12/14] configs: ast2600-evb: Enable SPL FIT support Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 13/14] configs: aspeed: Make EXTRA_ENV_SETTINGS board specific Chia-Wei Wang
2021-07-13 9:00 ` [PATCH 14/14] configs: ast2600: Boot kernel FIT in DRAM Chia-Wei Wang
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210713090016.2729-9-chiawei_wang@aspeedtech.com \
--to=chiawei_wang@aspeedtech.com \
--cc=lukma@denx.de \
--cc=maxims@google.com \
--cc=ryan_chen@aspeedtech.com \
--cc=sjg@chromium.org \
--cc=u-boot@lists.denx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox