Home | History | Annotate | Line # | Download | only in sunxi
sun8i_crypto.c revision 1.14
      1  1.14      maxv /*	$NetBSD: sun8i_crypto.c,v 1.14 2020/05/15 19:28:09 maxv Exp $	*/
      2   1.1  riastrad 
      3   1.1  riastrad /*-
      4   1.1  riastrad  * Copyright (c) 2019 The NetBSD Foundation, Inc.
      5   1.1  riastrad  * All rights reserved.
      6   1.1  riastrad  *
      7   1.1  riastrad  * This code is derived from software contributed to The NetBSD Foundation
      8   1.1  riastrad  * by Taylor R. Campbell.
      9   1.1  riastrad  *
     10   1.1  riastrad  * Redistribution and use in source and binary forms, with or without
     11   1.1  riastrad  * modification, are permitted provided that the following conditions
     12   1.1  riastrad  * are met:
     13   1.1  riastrad  * 1. Redistributions of source code must retain the above copyright
     14   1.1  riastrad  *    notice, this list of conditions and the following disclaimer.
     15   1.1  riastrad  * 2. Redistributions in binary form must reproduce the above copyright
     16   1.1  riastrad  *    notice, this list of conditions and the following disclaimer in the
     17   1.1  riastrad  *    documentation and/or other materials provided with the distribution.
     18   1.1  riastrad  *
     19   1.1  riastrad  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20   1.1  riastrad  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21   1.1  riastrad  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22   1.1  riastrad  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23   1.1  riastrad  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24   1.1  riastrad  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25   1.1  riastrad  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26   1.1  riastrad  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27   1.1  riastrad  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28   1.1  riastrad  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29   1.1  riastrad  * POSSIBILITY OF SUCH DAMAGE.
     30   1.1  riastrad  */
     31   1.1  riastrad 
     32   1.1  riastrad /*
     33   1.1  riastrad  * sun8i_crypto -- Allwinner Crypto Engine driver
     34   1.1  riastrad  *
     35   1.1  riastrad  * The Crypto Engine is documented in Sec. 3.15 of the Allwinner A64
     36   1.1  riastrad  * User Manual v1.1, on pp. 230--241.  We only use it for the TRNG at
     37   1.1  riastrad  * the moment, but in principle it could be wired up with opencrypto(9)
     38   1.1  riastrad  * to compute AES, DES, 3DES, MD5, SHA-1, SHA-224, SHA-256, HMAC-SHA1,
     39   1.1  riastrad  * HMAC-HA256, RSA, and an undocumented PRNG.  It also seems to support
     40   1.1  riastrad  * AES keys in SRAM (for some kind of HDMI HDCP stuff?).
     41   1.1  riastrad  *
     42   1.1  riastrad  * https://linux-sunxi.org/images/b/b4/Allwinner_A64_User_Manual_V1.1.pdf
     43   1.1  riastrad  */
     44   1.1  riastrad 
     45   1.1  riastrad #include <sys/cdefs.h>
     46  1.14      maxv __KERNEL_RCSID(1, "$NetBSD: sun8i_crypto.c,v 1.14 2020/05/15 19:28:09 maxv Exp $");
     47   1.1  riastrad 
     48   1.1  riastrad #include <sys/types.h>
     49   1.1  riastrad #include <sys/param.h>
     50   1.1  riastrad #include <sys/atomic.h>
     51   1.1  riastrad #include <sys/bus.h>
     52   1.1  riastrad #include <sys/callout.h>
     53   1.1  riastrad #include <sys/conf.h>
     54   1.1  riastrad #include <sys/device.h>
     55   1.1  riastrad #include <sys/kernel.h>
     56   1.1  riastrad #include <sys/kmem.h>
     57   1.1  riastrad #include <sys/mutex.h>
     58   1.1  riastrad #include <sys/rndsource.h>
     59   1.1  riastrad #include <sys/sysctl.h>
     60   1.1  riastrad #include <sys/workqueue.h>
     61   1.1  riastrad 
     62   1.1  riastrad #include <dev/fdt/fdtvar.h>
     63   1.1  riastrad 
     64   1.1  riastrad #include <arm/sunxi/sun8i_crypto.h>
     65   1.1  riastrad 
     66   1.1  riastrad #define	SUN8I_CRYPTO_TIMEOUT	hz
     67   1.9  riastrad #define	SUN8I_CRYPTO_RNGENTROPY	100 /* estimated bits per bit of entropy */
     68   1.9  riastrad #define	SUN8I_CRYPTO_RNGBYTES	PAGE_SIZE
     69   1.1  riastrad 
     70   1.1  riastrad struct sun8i_crypto_task;
     71   1.1  riastrad 
     72   1.1  riastrad struct sun8i_crypto_buf {
     73   1.1  riastrad 	bus_dma_segment_t	cb_seg[1];
     74   1.1  riastrad 	int			cb_nsegs;
     75   1.1  riastrad 	bus_dmamap_t		cb_map;
     76   1.1  riastrad 	void			*cb_kva;
     77   1.1  riastrad };
     78   1.1  riastrad 
     79   1.1  riastrad struct sun8i_crypto_softc {
     80   1.1  riastrad 	device_t			sc_dev;
     81   1.1  riastrad 	bus_space_tag_t			sc_bst;
     82   1.1  riastrad 	bus_space_handle_t		sc_bsh;
     83   1.1  riastrad 	bus_dma_tag_t			sc_dmat;
     84   1.1  riastrad 	kmutex_t			sc_lock;
     85   1.1  riastrad 	struct sun8i_crypto_chan {
     86   1.1  riastrad 		struct sun8i_crypto_task	*cc_task;
     87   1.1  riastrad 		unsigned			cc_starttime;
     88   1.1  riastrad 	}				sc_chan[SUN8I_CRYPTO_NCHAN];
     89   1.1  riastrad 	struct callout			sc_timeout;
     90   1.1  riastrad 	struct workqueue		*sc_wq;
     91   1.1  riastrad 	struct work			sc_work;
     92   1.1  riastrad 	void				*sc_ih;
     93   1.1  riastrad 	uint32_t			sc_done;
     94   1.1  riastrad 	uint32_t			sc_esr;
     95   1.1  riastrad 	bool				sc_work_pending;
     96   1.1  riastrad 	struct sun8i_crypto_rng {
     97   1.1  riastrad 		struct sun8i_crypto_buf		cr_buf;
     98   1.1  riastrad 		struct sun8i_crypto_task	*cr_task;
     99   1.1  riastrad 		struct krndsource		cr_rndsource;
    100   1.1  riastrad 		bool				cr_pending;
    101   1.1  riastrad 	}				sc_rng;
    102   1.1  riastrad 	struct sun8i_crypto_selftest {
    103   1.1  riastrad 		struct sun8i_crypto_buf		cs_in;
    104   1.1  riastrad 		struct sun8i_crypto_buf		cs_key;
    105   1.1  riastrad 		struct sun8i_crypto_buf		cs_out;
    106   1.1  riastrad 		struct sun8i_crypto_task	*cs_task;
    107   1.1  riastrad 	}				sc_selftest;
    108   1.1  riastrad 	struct sun8i_crypto_sysctl {
    109   1.1  riastrad 		struct sysctllog		*cy_log;
    110   1.1  riastrad 		const struct sysctlnode		*cy_root_node;
    111   1.1  riastrad 		const struct sysctlnode		*cy_trng_node;
    112   1.1  riastrad 	}				sc_sysctl;
    113   1.1  riastrad };
    114   1.1  riastrad 
    115   1.1  riastrad struct sun8i_crypto_task {
    116   1.2  riastrad 	struct sun8i_crypto_buf	ct_buf;
    117   1.1  riastrad 	struct sun8i_crypto_taskdesc *ct_desc;
    118   1.1  riastrad 	void			(*ct_callback)(struct sun8i_crypto_softc *,
    119   1.1  riastrad 				    struct sun8i_crypto_task *, void *, int);
    120   1.1  riastrad 	void			*ct_cookie;
    121   1.1  riastrad };
    122   1.1  riastrad 
    123   1.1  riastrad /*
    124   1.1  riastrad  * Forward declarations
    125   1.1  riastrad  */
    126   1.1  riastrad 
    127   1.1  riastrad static int	sun8i_crypto_match(device_t, cfdata_t, void *);
    128   1.1  riastrad static void	sun8i_crypto_attach(device_t, device_t, void *);
    129   1.1  riastrad 
    130   1.1  riastrad static struct sun8i_crypto_task *
    131   1.1  riastrad 		sun8i_crypto_task_get(struct sun8i_crypto_softc *,
    132   1.1  riastrad 		    void (*)(struct sun8i_crypto_softc *,
    133   1.1  riastrad 			struct sun8i_crypto_task *, void *, int),
    134   1.1  riastrad 		    void *);
    135   1.1  riastrad static void	sun8i_crypto_task_put(struct sun8i_crypto_softc *,
    136   1.1  riastrad 		    struct sun8i_crypto_task *);
    137   1.1  riastrad static void	sun8i_crypto_task_reset(struct sun8i_crypto_task *);
    138   1.1  riastrad 
    139   1.1  riastrad static void	sun8i_crypto_task_set_key(struct sun8i_crypto_task *,
    140   1.1  riastrad 		    bus_dmamap_t);
    141   1.1  riastrad static void	sun8i_crypto_task_set_iv(struct sun8i_crypto_task *,
    142   1.1  riastrad 		    bus_dmamap_t);
    143   1.1  riastrad static void	sun8i_crypto_task_set_ctr(struct sun8i_crypto_task *,
    144   1.1  riastrad 		    bus_dmamap_t);
    145   1.1  riastrad static void	sun8i_crypto_task_set_input(struct sun8i_crypto_task *,
    146   1.1  riastrad 		    bus_dmamap_t);
    147   1.1  riastrad static void	sun8i_crypto_task_set_output(struct sun8i_crypto_task *,
    148   1.1  riastrad 		    bus_dmamap_t);
    149   1.1  riastrad 
    150   1.1  riastrad static void	sun8i_crypto_task_scatter(struct sun8i_crypto_adrlen *,
    151   1.1  riastrad 		    bus_dmamap_t);
    152   1.1  riastrad 
    153   1.1  riastrad static int	sun8i_crypto_submit_trng(struct sun8i_crypto_softc *,
    154   1.1  riastrad 		    struct sun8i_crypto_task *, uint32_t);
    155   1.1  riastrad static int	sun8i_crypto_submit_aesecb(struct sun8i_crypto_softc *,
    156   1.1  riastrad 		    struct sun8i_crypto_task *, uint32_t, uint32_t, uint32_t);
    157   1.1  riastrad static int	sun8i_crypto_submit(struct sun8i_crypto_softc *,
    158   1.1  riastrad 		    struct sun8i_crypto_task *);
    159   1.1  riastrad 
    160   1.1  riastrad static void	sun8i_crypto_timeout(void *);
    161   1.1  riastrad static int	sun8i_crypto_intr(void *);
    162   1.1  riastrad static void	sun8i_crypto_schedule_worker(struct sun8i_crypto_softc *);
    163   1.1  riastrad static void	sun8i_crypto_worker(struct work *, void *);
    164   1.1  riastrad static void	sun8i_crypto_chan_done(struct sun8i_crypto_softc *, unsigned,
    165   1.1  riastrad 		    int);
    166   1.1  riastrad 
    167   1.1  riastrad static int	sun8i_crypto_allocbuf(struct sun8i_crypto_softc *, size_t,
    168   1.1  riastrad 		    struct sun8i_crypto_buf *);
    169   1.1  riastrad static void	sun8i_crypto_freebuf(struct sun8i_crypto_softc *, size_t,
    170   1.1  riastrad 		    struct sun8i_crypto_buf *);
    171   1.1  riastrad 
    172   1.1  riastrad static void	sun8i_crypto_rng_attach(struct sun8i_crypto_softc *);
    173   1.1  riastrad static void	sun8i_crypto_rng_get(size_t, void *);
    174   1.1  riastrad static void	sun8i_crypto_rng_done(struct sun8i_crypto_softc *,
    175   1.1  riastrad 		    struct sun8i_crypto_task *, void *, int);
    176   1.1  riastrad 
    177   1.1  riastrad static void	sun8i_crypto_selftest(device_t);
    178   1.1  riastrad static void	sun8i_crypto_selftest_done(struct sun8i_crypto_softc *,
    179   1.1  riastrad 		    struct sun8i_crypto_task *, void *, int);
    180   1.1  riastrad 
    181   1.1  riastrad static void	sun8i_crypto_sysctl_attach(struct sun8i_crypto_softc *);
    182   1.1  riastrad static int	sun8i_crypto_sysctl_rng(SYSCTLFN_ARGS);
    183   1.1  riastrad static void	sun8i_crypto_sysctl_rng_done(struct sun8i_crypto_softc *,
    184   1.1  riastrad 		    struct sun8i_crypto_task *, void *, int);
    185   1.1  riastrad 
    186   1.1  riastrad /*
    187   1.1  riastrad  * Register access
    188   1.1  riastrad  */
    189   1.1  riastrad 
    190   1.1  riastrad static uint32_t
    191   1.1  riastrad sun8i_crypto_read(struct sun8i_crypto_softc *sc, bus_addr_t reg)
    192   1.1  riastrad {
    193   1.1  riastrad 	return bus_space_read_4(sc->sc_bst, sc->sc_bsh, reg);
    194   1.1  riastrad }
    195   1.1  riastrad 
    196   1.1  riastrad static void
    197   1.1  riastrad sun8i_crypto_write(struct sun8i_crypto_softc *sc, bus_addr_t reg, uint32_t v)
    198   1.1  riastrad {
    199   1.1  riastrad 	bus_space_write_4(sc->sc_bst, sc->sc_bsh, reg, v);
    200   1.1  riastrad }
    201   1.1  riastrad 
    202   1.1  riastrad /*
    203   1.1  riastrad  * Autoconf goo
    204   1.1  riastrad  */
    205   1.1  riastrad 
    206   1.1  riastrad CFATTACH_DECL_NEW(sun8i_crypto, sizeof(struct sun8i_crypto_softc),
    207   1.1  riastrad     sun8i_crypto_match, sun8i_crypto_attach, NULL, NULL);
    208   1.1  riastrad 
    209   1.1  riastrad static const struct of_compat_data compat_data[] = {
    210   1.1  riastrad 	{"allwinner,sun50i-a64-crypto", 0},
    211   1.1  riastrad 	{NULL}
    212   1.1  riastrad };
    213   1.1  riastrad 
    214   1.1  riastrad static int
    215   1.1  riastrad sun8i_crypto_match(device_t parent, cfdata_t cf, void *aux)
    216   1.1  riastrad {
    217   1.1  riastrad 	const struct fdt_attach_args *const faa = aux;
    218   1.1  riastrad 
    219   1.1  riastrad 	return of_match_compat_data(faa->faa_phandle, compat_data);
    220   1.1  riastrad }
    221   1.1  riastrad 
    222   1.1  riastrad static void
    223   1.1  riastrad sun8i_crypto_attach(device_t parent, device_t self, void *aux)
    224   1.1  riastrad {
    225   1.1  riastrad 	struct sun8i_crypto_softc *const sc = device_private(self);
    226   1.1  riastrad 	const struct fdt_attach_args *const faa = aux;
    227   1.1  riastrad 	bus_addr_t addr;
    228   1.1  riastrad 	bus_size_t size;
    229   1.1  riastrad 	const int phandle = faa->faa_phandle;
    230   1.1  riastrad 	char intrstr[128];
    231   1.1  riastrad 	struct clk *clk;
    232   1.1  riastrad 	struct fdtbus_reset *rst;
    233   1.1  riastrad 
    234   1.1  riastrad 	sc->sc_dev = self;
    235   1.1  riastrad 	sc->sc_dmat = faa->faa_dmat;
    236   1.1  riastrad 	sc->sc_bst = faa->faa_bst;
    237   1.1  riastrad 	mutex_init(&sc->sc_lock, MUTEX_DEFAULT, IPL_VM);
    238   1.1  riastrad 	callout_init(&sc->sc_timeout, CALLOUT_MPSAFE);
    239   1.1  riastrad 	callout_setfunc(&sc->sc_timeout, &sun8i_crypto_timeout, sc);
    240   1.1  riastrad 	if (workqueue_create(&sc->sc_wq, device_xname(self),
    241   1.1  riastrad 		&sun8i_crypto_worker, sc, PRI_NONE, IPL_VM, WQ_MPSAFE) != 0) {
    242   1.1  riastrad 		aprint_error(": couldn't create workqueue\n");
    243   1.1  riastrad 		return;
    244   1.1  riastrad 	}
    245   1.1  riastrad 
    246   1.1  riastrad 	/* Get and map device registers.  */
    247   1.1  riastrad 	if (fdtbus_get_reg(phandle, 0, &addr, &size) != 0) {
    248   1.1  riastrad 		aprint_error(": couldn't get registers\n");
    249   1.1  riastrad 		return;
    250   1.1  riastrad 	}
    251   1.1  riastrad 	if (bus_space_map(sc->sc_bst, addr, size, 0, &sc->sc_bsh) != 0) {
    252   1.1  riastrad 		aprint_error(": couldn't map registers\n");
    253   1.1  riastrad 		return;
    254   1.1  riastrad 	}
    255   1.1  riastrad 
    256   1.1  riastrad 	/* Get an interrupt handle.  */
    257   1.1  riastrad 	if (!fdtbus_intr_str(phandle, 0, intrstr, sizeof(intrstr))) {
    258   1.1  riastrad 		aprint_error(": failed to decode interrupt\n");
    259   1.1  riastrad 		return;
    260   1.1  riastrad 	}
    261   1.1  riastrad 
    262   1.1  riastrad 	/* Enable the bus clock.  */
    263   1.1  riastrad 	if (fdtbus_clock_enable(phandle, "bus", true) != 0) {
    264   1.1  riastrad 		aprint_error(": couldn't enable bus clock\n");
    265   1.1  riastrad 		return;
    266   1.1  riastrad 	}
    267   1.1  riastrad 
    268   1.1  riastrad 	/* Get the module clock and set it to 300 MHz.  */
    269   1.1  riastrad 	if ((clk = fdtbus_clock_get(phandle, "mod")) != NULL) {
    270   1.1  riastrad 		if (clk_enable(clk) != 0) {
    271   1.1  riastrad 			aprint_error(": couldn't enable CE clock\n");
    272   1.1  riastrad 			return;
    273   1.1  riastrad 		}
    274   1.1  riastrad 		if (clk_set_rate(clk, 300*1000*1000) != 0) {
    275   1.1  riastrad 			aprint_error(": couldn't set CE clock to 300MHz\n");
    276   1.1  riastrad 			return;
    277   1.1  riastrad 		}
    278   1.1  riastrad 	}
    279   1.1  riastrad 
    280   1.1  riastrad 	/* Get a reset handle if we need and try to deassert it.  */
    281   1.1  riastrad 	if ((rst = fdtbus_reset_get_index(phandle, 0)) != NULL) {
    282   1.1  riastrad 		if (fdtbus_reset_deassert(rst) != 0) {
    283   1.1  riastrad 			aprint_error(": couldn't de-assert reset\n");
    284   1.1  riastrad 			return;
    285   1.1  riastrad 		}
    286   1.1  riastrad 	}
    287   1.1  riastrad 
    288   1.1  riastrad 	aprint_naive("\n");
    289   1.1  riastrad 	aprint_normal(": Crypto Engine\n");
    290   1.1  riastrad 	aprint_debug_dev(self, ": clock freq %d\n", clk_get_rate(clk));
    291   1.1  riastrad 
    292   1.1  riastrad 	/* Disable and clear interrupts.  */
    293   1.1  riastrad 	sun8i_crypto_write(sc, SUN8I_CRYPTO_ICR, 0);
    294   1.1  riastrad 	sun8i_crypto_write(sc, SUN8I_CRYPTO_ISR, 0);
    295   1.1  riastrad 
    296   1.1  riastrad 	/* Establish an interrupt handler.  */
    297   1.1  riastrad 	sc->sc_ih = fdtbus_intr_establish(phandle, 0, IPL_VM, FDT_INTR_MPSAFE,
    298   1.1  riastrad 	    &sun8i_crypto_intr, sc);
    299   1.1  riastrad 	if (sc->sc_ih == NULL) {
    300   1.1  riastrad 		aprint_error_dev(self, "failed to establish interrupt on %s\n",
    301   1.1  riastrad 		    intrstr);
    302   1.1  riastrad 		return;
    303   1.1  riastrad 	}
    304   1.1  riastrad 	aprint_normal_dev(self, "interrupting on %s\n", intrstr);
    305   1.1  riastrad 
    306   1.1  riastrad 	/* Set up the RNG.  */
    307   1.1  riastrad 	sun8i_crypto_rng_attach(sc);
    308   1.1  riastrad 
    309   1.1  riastrad 	/* Attach the sysctl.  */
    310   1.1  riastrad 	sun8i_crypto_sysctl_attach(sc);
    311   1.1  riastrad 
    312   1.1  riastrad 	/* Perform self-tests.  */
    313   1.1  riastrad 	config_interrupts(self, sun8i_crypto_selftest);
    314   1.1  riastrad }
    315   1.1  riastrad 
    316   1.1  riastrad /*
    317   1.1  riastrad  * Task allocation
    318   1.1  riastrad  */
    319   1.1  riastrad 
    320   1.1  riastrad static struct sun8i_crypto_task *
    321   1.1  riastrad sun8i_crypto_task_get(struct sun8i_crypto_softc *sc,
    322   1.1  riastrad     void (*callback)(struct sun8i_crypto_softc *, struct sun8i_crypto_task *,
    323   1.1  riastrad 	void *, int),
    324   1.1  riastrad     void *cookie)
    325   1.1  riastrad {
    326   1.1  riastrad 	struct sun8i_crypto_task *task;
    327   1.1  riastrad 	int error;
    328   1.1  riastrad 
    329   1.2  riastrad 	/* Allocate a task.  */
    330   1.1  riastrad 	task = kmem_zalloc(sizeof(*task), KM_SLEEP);
    331   1.1  riastrad 
    332   1.2  riastrad 	/* Allocate a buffer for the descriptor.  */
    333   1.2  riastrad 	error = sun8i_crypto_allocbuf(sc, sizeof(*task->ct_desc),
    334   1.2  riastrad 	    &task->ct_buf);
    335   1.1  riastrad 	if (error)
    336   1.1  riastrad 		goto fail0;
    337   1.1  riastrad 
    338   1.2  riastrad 	/* Initialize the task object and return it.  */
    339   1.2  riastrad 	task->ct_desc = task->ct_buf.cb_kva;
    340   1.1  riastrad 	task->ct_callback = callback;
    341   1.1  riastrad 	task->ct_cookie = cookie;
    342   1.1  riastrad 	return task;
    343   1.1  riastrad 
    344   1.2  riastrad fail1: __unused
    345   1.2  riastrad 	sun8i_crypto_freebuf(sc, sizeof(*task->ct_desc), &task->ct_buf);
    346   1.1  riastrad fail0:	kmem_free(task, sizeof(*task));
    347   1.1  riastrad 	return NULL;
    348   1.1  riastrad }
    349   1.1  riastrad 
    350   1.1  riastrad static void
    351   1.1  riastrad sun8i_crypto_task_put(struct sun8i_crypto_softc *sc,
    352   1.1  riastrad     struct sun8i_crypto_task *task)
    353   1.1  riastrad {
    354   1.1  riastrad 
    355   1.2  riastrad 	sun8i_crypto_freebuf(sc, sizeof(*task->ct_desc), &task->ct_buf);
    356   1.1  riastrad 	kmem_free(task, sizeof(*task));
    357   1.1  riastrad }
    358   1.1  riastrad 
    359   1.1  riastrad /*
    360   1.1  riastrad  * Task descriptor setup
    361   1.1  riastrad  *
    362   1.1  riastrad  * WARNING: Task descriptor fields are little-endian, not host-endian.
    363   1.1  riastrad  */
    364   1.1  riastrad 
    365   1.1  riastrad static void
    366   1.1  riastrad sun8i_crypto_task_reset(struct sun8i_crypto_task *task)
    367   1.1  riastrad {
    368   1.1  riastrad 
    369   1.1  riastrad 	memset(task->ct_desc, 0, sizeof(*task->ct_desc));
    370   1.1  riastrad }
    371   1.1  riastrad 
    372   1.1  riastrad static void
    373   1.1  riastrad sun8i_crypto_task_set_key(struct sun8i_crypto_task *task, bus_dmamap_t map)
    374   1.1  riastrad {
    375   1.1  riastrad 
    376   1.1  riastrad 	KASSERT(map->dm_nsegs == 1);
    377   1.1  riastrad 	task->ct_desc->td_keydesc = htole32(map->dm_segs[0].ds_addr);
    378   1.1  riastrad }
    379   1.1  riastrad 
    380   1.1  riastrad static void __unused		/* XXX opencrypto(9) */
    381   1.1  riastrad sun8i_crypto_task_set_iv(struct sun8i_crypto_task *task, bus_dmamap_t map)
    382   1.1  riastrad {
    383   1.1  riastrad 
    384   1.1  riastrad 	KASSERT(map->dm_nsegs == 1);
    385   1.1  riastrad 	task->ct_desc->td_ivdesc = htole32(map->dm_segs[0].ds_addr);
    386   1.1  riastrad }
    387   1.1  riastrad 
    388   1.1  riastrad static void __unused		/* XXX opencrypto(9) */
    389   1.1  riastrad sun8i_crypto_task_set_ctr(struct sun8i_crypto_task *task, bus_dmamap_t map)
    390   1.1  riastrad {
    391   1.1  riastrad 
    392   1.1  riastrad 	KASSERT(map->dm_nsegs == 1);
    393   1.1  riastrad 	task->ct_desc->td_ctrdesc = htole32(map->dm_segs[0].ds_addr);
    394   1.1  riastrad }
    395   1.1  riastrad 
    396   1.1  riastrad static void
    397   1.1  riastrad sun8i_crypto_task_set_input(struct sun8i_crypto_task *task, bus_dmamap_t map)
    398   1.1  riastrad {
    399   1.1  riastrad 
    400   1.1  riastrad 	sun8i_crypto_task_scatter(task->ct_desc->td_src, map);
    401   1.1  riastrad }
    402   1.1  riastrad 
    403   1.1  riastrad static void
    404   1.1  riastrad sun8i_crypto_task_set_output(struct sun8i_crypto_task *task, bus_dmamap_t map)
    405   1.1  riastrad {
    406   1.1  riastrad 
    407   1.1  riastrad 	sun8i_crypto_task_scatter(task->ct_desc->td_dst, map);
    408   1.1  riastrad }
    409   1.1  riastrad 
    410   1.1  riastrad static void
    411   1.1  riastrad sun8i_crypto_task_scatter(struct sun8i_crypto_adrlen *adrlen, bus_dmamap_t map)
    412   1.1  riastrad {
    413   1.1  riastrad 	uint32_t total __diagused = 0;
    414   1.1  riastrad 	unsigned i;
    415   1.1  riastrad 
    416   1.1  riastrad 	KASSERT(map->dm_nsegs <= SUN8I_CRYPTO_MAXSEGS);
    417   1.1  riastrad 	for (i = 0; i < map->dm_nsegs; i++) {
    418   1.1  riastrad 		KASSERT((map->dm_segs[i].ds_addr % 4) == 0);
    419   1.1  riastrad 		KASSERT(map->dm_segs[i].ds_addr <= UINT32_MAX);
    420   1.1  riastrad 		KASSERT(map->dm_segs[i].ds_len <= UINT32_MAX - total);
    421   1.1  riastrad 		adrlen[i].adr = htole32(map->dm_segs[i].ds_addr);
    422   1.1  riastrad 		adrlen[i].len = htole32(map->dm_segs[i].ds_len/4);
    423   1.1  riastrad 		total += map->dm_segs[i].ds_len;
    424   1.1  riastrad 	}
    425   1.1  riastrad 
    426   1.1  riastrad 	/* Verify the remainder are zero.  */
    427   1.1  riastrad 	for (; i < SUN8I_CRYPTO_MAXSEGS; i++) {
    428   1.1  riastrad 		KASSERT(adrlen[i].adr == 0);
    429   1.1  riastrad 		KASSERT(adrlen[i].len == 0);
    430   1.1  riastrad 	}
    431   1.1  riastrad 
    432   1.1  riastrad 	/* Verify the total size matches the DMA map.  */
    433   1.1  riastrad 	KASSERT(total == map->dm_mapsize);
    434   1.1  riastrad }
    435   1.1  riastrad 
    436   1.1  riastrad /*
    437   1.1  riastrad  * Task submission
    438   1.1  riastrad  *
    439   1.1  riastrad  * WARNING: Task descriptor fields are little-endian, not host-endian.
    440   1.1  riastrad  */
    441   1.1  riastrad 
    442   1.1  riastrad static int
    443   1.1  riastrad sun8i_crypto_submit_trng(struct sun8i_crypto_softc *sc,
    444   1.1  riastrad     struct sun8i_crypto_task *task, uint32_t datalen)
    445   1.1  riastrad {
    446   1.1  riastrad 	struct sun8i_crypto_taskdesc *desc = task->ct_desc;
    447   1.1  riastrad 	uint32_t tdqc = 0;
    448   1.1  riastrad 	uint32_t total __diagused;
    449   1.1  riastrad 	unsigned i __diagused;
    450   1.1  riastrad 
    451   1.1  riastrad 	/* Data length must be a multiple of 4 because...reasons.  */
    452   1.1  riastrad 	KASSERT((datalen % 4) == 0);
    453   1.1  riastrad 
    454   1.1  riastrad 	/* All of the sources should be empty.  */
    455   1.1  riastrad 	for (total = 0, i = 0; i < SUN8I_CRYPTO_MAXSEGS; i++)
    456   1.1  riastrad 		KASSERT(le32toh(task->ct_desc->td_src[i].len) == 0);
    457   1.1  riastrad 
    458   1.1  riastrad 	/* Verify the total output length -- should be datalen/4.  */
    459   1.1  riastrad 	for (total = 0, i = 0; i < SUN8I_CRYPTO_MAXSEGS; i++) {
    460   1.1  riastrad 		uint32_t len = le32toh(task->ct_desc->td_dst[i].len);
    461   1.1  riastrad 		KASSERT(len <= UINT32_MAX - total);
    462   1.1  riastrad 		total += len;
    463   1.1  riastrad 	}
    464   1.1  riastrad 	KASSERT(total == datalen/4);
    465   1.1  riastrad 
    466   1.1  riastrad 	/* Verify the key, IV, and CTR are unset.  */
    467   1.1  riastrad 	KASSERT(desc->td_keydesc == 0);
    468   1.1  riastrad 	KASSERT(desc->td_ivdesc == 0);
    469   1.1  riastrad 	KASSERT(desc->td_ctrdesc == 0);
    470   1.1  riastrad 
    471   1.1  riastrad 	/* Set up the task descriptor queue control words.  */
    472   1.1  riastrad 	tdqc |= SUN8I_CRYPTO_TDQC_INTR_EN;
    473   1.1  riastrad 	tdqc |= __SHIFTIN(SUN8I_CRYPTO_TDQC_METHOD_TRNG,
    474   1.1  riastrad 	    SUN8I_CRYPTO_TDQC_METHOD);
    475   1.1  riastrad 	desc->td_tdqc = htole32(tdqc);
    476   1.1  riastrad 	desc->td_tdqs = 0;	/* no symmetric crypto */
    477   1.1  riastrad 	desc->td_tdqa = 0;	/* no asymmetric crypto */
    478   1.1  riastrad 
    479   1.1  riastrad 	/* Set the data length for the output.  */
    480   1.1  riastrad 	desc->td_datalen = htole32(datalen/4);
    481   1.1  riastrad 
    482   1.1  riastrad 	/* Submit!  */
    483   1.1  riastrad 	return sun8i_crypto_submit(sc, task);
    484   1.1  riastrad }
    485   1.1  riastrad 
    486   1.1  riastrad static int
    487   1.1  riastrad sun8i_crypto_submit_aesecb(struct sun8i_crypto_softc *sc,
    488   1.1  riastrad     struct sun8i_crypto_task *task,
    489   1.1  riastrad     uint32_t datalen, uint32_t keysize, uint32_t dir)
    490   1.1  riastrad {
    491   1.1  riastrad 	struct sun8i_crypto_taskdesc *desc = task->ct_desc;
    492   1.1  riastrad 	uint32_t tdqc = 0, tdqs = 0;
    493   1.1  riastrad 	uint32_t total __diagused;
    494   1.1  riastrad 	unsigned i __diagused;
    495   1.1  riastrad 
    496   1.1  riastrad 	/*
    497   1.1  riastrad 	 * Data length must be a multiple of 4 because...reasons.
    498   1.1  riastrad 	 *
    499   1.1  riastrad 	 * WARNING: For `AES-CTS' (maybe that means AES-XTS?), datalen
    500   1.1  riastrad 	 * is in units of bytes, not units of words -- but everything
    501   1.1  riastrad 	 * _else_ is in units of words.  This routine applies only to
    502   1.1  riastrad 	 * AES-ECB for the self-test.
    503   1.1  riastrad 	 */
    504   1.1  riastrad 	KASSERT((datalen % 4) == 0);
    505   1.1  riastrad 
    506   1.1  riastrad 	/* Verify the total input length -- should be datalen/4.  */
    507   1.1  riastrad 	for (total = 0, i = 0; i < SUN8I_CRYPTO_MAXSEGS; i++) {
    508   1.1  riastrad 		uint32_t len = le32toh(task->ct_desc->td_src[i].len);
    509   1.1  riastrad 		KASSERT(len <= UINT32_MAX - total);
    510   1.1  riastrad 		total += len;
    511   1.1  riastrad 	}
    512   1.1  riastrad 	KASSERT(total == datalen/4);
    513   1.1  riastrad 
    514   1.1  riastrad 	/* Verify the total output length -- should be datalen/4.  */
    515   1.1  riastrad 	for (total = 0, i = 0; i < SUN8I_CRYPTO_MAXSEGS; i++) {
    516   1.1  riastrad 		uint32_t len = le32toh(task->ct_desc->td_dst[i].len);
    517   1.1  riastrad 		KASSERT(len <= UINT32_MAX - total);
    518   1.1  riastrad 		total += len;
    519   1.1  riastrad 	}
    520   1.1  riastrad 	KASSERT(total == datalen/4);
    521   1.1  riastrad 
    522   1.1  riastrad 	/* Set up the task descriptor queue control word.  */
    523   1.1  riastrad 	tdqc |= SUN8I_CRYPTO_TDQC_INTR_EN;
    524   1.1  riastrad 	tdqc |= __SHIFTIN(SUN8I_CRYPTO_TDQC_METHOD_AES,
    525   1.1  riastrad 	    SUN8I_CRYPTO_TDQC_METHOD);
    526   1.1  riastrad 	desc->td_tdqc = htole32(tdqc);
    527   1.1  riastrad 
    528   1.1  riastrad 	/* Set up the symmetric control word.  */
    529   1.1  riastrad 	tdqs |= __SHIFTIN(SUN8I_CRYPTO_TDQS_SKEY_SELECT_SS_KEYx,
    530   1.1  riastrad 	    SUN8I_CRYPTO_TDQS_SKEY_SELECT);
    531   1.1  riastrad 	tdqs |= __SHIFTIN(SUN8I_CRYPTO_TDQS_OP_MODE_ECB,
    532   1.1  riastrad 	    SUN8I_CRYPTO_TDQS_OP_MODE);
    533   1.1  riastrad 	tdqs |= __SHIFTIN(SUN8I_CRYPTO_TDQS_AES_KEYSIZE_128,
    534   1.1  riastrad 	    SUN8I_CRYPTO_TDQS_AES_KEYSIZE);
    535   1.1  riastrad 	desc->td_tdqs = htole32(tdqs);
    536   1.1  riastrad 
    537   1.1  riastrad 	desc->td_tdqa = 0;	/* no asymmetric crypto */
    538   1.1  riastrad 
    539   1.1  riastrad 	/* Set the data length for the output.  */
    540   1.1  riastrad 	desc->td_datalen = htole32(datalen/4);
    541   1.1  riastrad 
    542   1.1  riastrad 	/* Submit!  */
    543   1.1  riastrad 	return sun8i_crypto_submit(sc, task);
    544   1.1  riastrad }
    545   1.1  riastrad 
    546   1.1  riastrad static int
    547   1.1  riastrad sun8i_crypto_submit(struct sun8i_crypto_softc *sc,
    548   1.1  riastrad     struct sun8i_crypto_task *task)
    549   1.1  riastrad {
    550   1.1  riastrad 	unsigned i, retries = 0;
    551   1.1  riastrad 	uint32_t icr;
    552   1.1  riastrad 	int error = 0;
    553   1.1  riastrad 
    554   1.1  riastrad 	/* One at a time at the device registers, please.  */
    555   1.1  riastrad 	mutex_enter(&sc->sc_lock);
    556   1.1  riastrad 
    557   1.1  riastrad 	/* Find a channel.  */
    558   1.1  riastrad 	for (i = 0; i < SUN8I_CRYPTO_NCHAN; i++) {
    559   1.1  riastrad 		if (sc->sc_chan[i].cc_task == NULL)
    560   1.1  riastrad 			break;
    561   1.1  riastrad 	}
    562   1.1  riastrad 	if (i == SUN8I_CRYPTO_NCHAN) {
    563   1.1  riastrad 		device_printf(sc->sc_dev, "no free channels\n");
    564   1.1  riastrad 		error = ERESTART;
    565   1.1  riastrad 		goto out;
    566   1.1  riastrad 	}
    567   1.1  riastrad 
    568   1.1  riastrad 	/*
    569   1.1  riastrad 	 * Set the channel id.  Caller is responsible for setting up
    570   1.1  riastrad 	 * all other parts of the descriptor.
    571   1.1  riastrad 	 */
    572   1.1  riastrad 	task->ct_desc->td_cid = htole32(i);
    573   1.1  riastrad 
    574   1.1  riastrad 	/* Prepare to send the descriptor to the device by DMA.  */
    575   1.2  riastrad 	bus_dmamap_sync(sc->sc_dmat, task->ct_buf.cb_map, 0,
    576   1.1  riastrad 	    sizeof(*task->ct_desc), BUS_DMASYNC_PREWRITE);
    577   1.1  riastrad 
    578   1.1  riastrad 	/* Confirm we're ready to go.  */
    579   1.1  riastrad 	if (sun8i_crypto_read(sc, SUN8I_CRYPTO_TLR) & SUN8I_CRYPTO_TLR_LOAD) {
    580   1.1  riastrad 		device_printf(sc->sc_dev, "TLR not clear\n");
    581   1.1  riastrad 		error = EIO;
    582   1.1  riastrad 		goto out;
    583   1.1  riastrad 	}
    584   1.1  riastrad 
    585   1.1  riastrad 	/* Enable interrupts for this channel.  */
    586   1.1  riastrad 	icr = sun8i_crypto_read(sc, SUN8I_CRYPTO_ICR);
    587   1.1  riastrad 	icr |= __SHIFTIN(SUN8I_CRYPTO_ICR_INTR_EN_CHAN(i),
    588   1.1  riastrad 	    SUN8I_CRYPTO_ICR_INTR_EN);
    589   1.1  riastrad 	sun8i_crypto_write(sc, SUN8I_CRYPTO_ICR, icr);
    590   1.1  riastrad 
    591   1.1  riastrad 	/* Set the task descriptor queue address.  */
    592   1.1  riastrad 	sun8i_crypto_write(sc, SUN8I_CRYPTO_TDQ,
    593   1.2  riastrad 	    task->ct_buf.cb_map->dm_segs[0].ds_addr);
    594   1.1  riastrad 
    595   1.1  riastrad 	/* Notify the engine to load it, and wait for acknowledgement.  */
    596   1.1  riastrad 	sun8i_crypto_write(sc, SUN8I_CRYPTO_TLR, SUN8I_CRYPTO_TLR_LOAD);
    597   1.1  riastrad 	while (sun8i_crypto_read(sc, SUN8I_CRYPTO_TLR) & SUN8I_CRYPTO_TLR_LOAD)
    598   1.1  riastrad 	{
    599   1.1  riastrad 		/*
    600   1.1  riastrad 		 * XXX Timeout pulled from arse.  Is it even important
    601   1.1  riastrad 		 * to wait here?
    602   1.1  riastrad 		 */
    603   1.1  riastrad 		if (++retries == 1000) {
    604   1.1  riastrad 			device_printf(sc->sc_dev, "TLR didn't clear: %08x\n",
    605   1.1  riastrad 			    sun8i_crypto_read(sc, SUN8I_CRYPTO_TLR));
    606   1.1  riastrad 			/*
    607   1.1  riastrad 			 * Hope it clears eventually; if not, we'll
    608   1.1  riastrad 			 * time out.
    609   1.1  riastrad 			 */
    610   1.1  riastrad 			break;
    611   1.1  riastrad 		}
    612   1.1  riastrad 		DELAY(1);
    613   1.1  riastrad 	}
    614   1.1  riastrad 
    615   1.1  riastrad 	/* Loaded up and ready to go.  Start a timer ticking.  */
    616   1.1  riastrad 	sc->sc_chan[i].cc_task = task;
    617  1.14      maxv 	sc->sc_chan[i].cc_starttime = getticks();
    618   1.1  riastrad 	callout_schedule(&sc->sc_timeout, SUN8I_CRYPTO_TIMEOUT);
    619   1.1  riastrad 
    620   1.1  riastrad 	/* XXX Consider polling if cold to get entropy earlier.  */
    621   1.1  riastrad 
    622   1.1  riastrad out:	/* Done!  */
    623   1.1  riastrad 	mutex_exit(&sc->sc_lock);
    624   1.1  riastrad 	return error;
    625   1.1  riastrad }
    626   1.1  riastrad 
    627   1.1  riastrad static void
    628   1.1  riastrad sun8i_crypto_timeout(void *cookie)
    629   1.1  riastrad {
    630   1.1  riastrad 	struct sun8i_crypto_softc *sc = cookie;
    631   1.1  riastrad 	unsigned i;
    632   1.1  riastrad 
    633   1.1  riastrad 	mutex_enter(&sc->sc_lock);
    634   1.1  riastrad 
    635   1.1  riastrad 	/* Check whether there are any tasks pending.  */
    636   1.1  riastrad 	for (i = 0; i < SUN8I_CRYPTO_NCHAN; i++) {
    637   1.1  riastrad 		if (sc->sc_chan[i].cc_task)
    638   1.1  riastrad 			break;
    639   1.1  riastrad 	}
    640   1.1  riastrad 	if (i == SUN8I_CRYPTO_NCHAN)
    641   1.1  riastrad 		/* None pending, so nothing to do.  */
    642   1.1  riastrad 		goto out;
    643   1.1  riastrad 
    644   1.1  riastrad 	/*
    645   1.1  riastrad 	 * Schedule the worker to check for timeouts, and schedule
    646   1.1  riastrad 	 * another timeout in case we need it.
    647   1.1  riastrad 	 */
    648   1.1  riastrad 	sun8i_crypto_schedule_worker(sc);
    649   1.1  riastrad 	callout_schedule(&sc->sc_timeout, SUN8I_CRYPTO_TIMEOUT);
    650   1.1  riastrad 
    651   1.1  riastrad out:	mutex_exit(&sc->sc_lock);
    652   1.1  riastrad }
    653   1.1  riastrad 
    654   1.1  riastrad static int
    655   1.1  riastrad sun8i_crypto_intr(void *cookie)
    656   1.1  riastrad {
    657   1.1  riastrad 	struct sun8i_crypto_softc *sc = cookie;
    658   1.1  riastrad 	uint32_t isr, esr;
    659   1.1  riastrad 
    660   1.1  riastrad 	mutex_enter(&sc->sc_lock);
    661   1.1  riastrad 
    662   1.1  riastrad 	/*
    663   1.1  riastrad 	 * Get and acknowledge the interrupts and error status.
    664   1.1  riastrad 	 *
    665   1.1  riastrad 	 * XXX Data sheet says the error status register is read-only,
    666   1.1  riastrad 	 * but then advises writing 1 to bit x1xx (keysram access error
    667   1.1  riastrad 	 * for AES, SUN8I_CRYPTO_ESR_KEYSRAMERR) to clear it.  What do?
    668   1.1  riastrad 	 */
    669   1.1  riastrad 	isr = sun8i_crypto_read(sc, SUN8I_CRYPTO_ISR);
    670   1.1  riastrad 	esr = sun8i_crypto_read(sc, SUN8I_CRYPTO_ESR);
    671   1.1  riastrad 	sun8i_crypto_write(sc, SUN8I_CRYPTO_ISR, isr);
    672   1.8  riastrad 	sun8i_crypto_write(sc, SUN8I_CRYPTO_ESR, esr);
    673   1.1  riastrad 
    674   1.1  riastrad 	/* Start the worker if necessary.  */
    675   1.1  riastrad 	sun8i_crypto_schedule_worker(sc);
    676   1.1  riastrad 
    677   1.1  riastrad 	/* Tell the worker what to do.  */
    678   1.1  riastrad 	sc->sc_done |= __SHIFTOUT(isr, SUN8I_CRYPTO_ISR_DONE);
    679   1.1  riastrad 	sc->sc_esr |= esr;
    680   1.1  riastrad 
    681   1.1  riastrad 	mutex_exit(&sc->sc_lock);
    682   1.1  riastrad 
    683   1.1  riastrad 	return __SHIFTOUT(isr, SUN8I_CRYPTO_ISR_DONE) != 0;
    684   1.1  riastrad }
    685   1.1  riastrad 
    686   1.1  riastrad static void
    687   1.1  riastrad sun8i_crypto_schedule_worker(struct sun8i_crypto_softc *sc)
    688   1.1  riastrad {
    689   1.1  riastrad 
    690   1.1  riastrad 	KASSERT(mutex_owned(&sc->sc_lock));
    691   1.1  riastrad 
    692   1.1  riastrad 	/* Start the worker if necessary.  */
    693   1.1  riastrad 	if (!sc->sc_work_pending) {
    694   1.1  riastrad 		workqueue_enqueue(sc->sc_wq, &sc->sc_work, NULL);
    695   1.1  riastrad 		sc->sc_work_pending = true;
    696   1.1  riastrad 	}
    697   1.1  riastrad }
    698   1.1  riastrad 
    699   1.1  riastrad static void
    700   1.1  riastrad sun8i_crypto_worker(struct work *wk, void *cookie)
    701   1.1  riastrad {
    702   1.1  riastrad 	struct sun8i_crypto_softc *sc = cookie;
    703   1.1  riastrad 	uint32_t done, esr, esr_chan;
    704   1.1  riastrad 	unsigned i, now;
    705   1.1  riastrad 	int error;
    706   1.1  riastrad 
    707   1.1  riastrad 	/*
    708   1.1  riastrad 	 * Acquire the lock.  Note: We will be releasing and
    709   1.1  riastrad 	 * reacquiring it throughout the loop.
    710   1.1  riastrad 	 */
    711   1.1  riastrad 	mutex_enter(&sc->sc_lock);
    712   1.1  riastrad 
    713   1.1  riastrad 	/* Acknowledge the work.  */
    714   1.1  riastrad 	KASSERT(sc->sc_work_pending);
    715   1.1  riastrad 	sc->sc_work_pending = false;
    716   1.1  riastrad 
    717   1.1  riastrad 	/*
    718   1.1  riastrad 	 * Claim the done mask and error status once; we will be
    719   1.1  riastrad 	 * releasing and reacquiring the lock for the callbacks, so
    720   1.1  riastrad 	 * they may change.
    721   1.1  riastrad 	 */
    722   1.1  riastrad 	done = sc->sc_done;
    723   1.1  riastrad 	esr = sc->sc_esr;
    724   1.1  riastrad 	sc->sc_done = 0;
    725   1.1  riastrad 	sc->sc_esr = 0;
    726   1.1  riastrad 
    727   1.1  riastrad 	/* Check the time to determine what's timed out.  */
    728  1.14      maxv 	now = getticks();
    729   1.1  riastrad 
    730   1.1  riastrad 	/* Process the channels.  */
    731   1.1  riastrad 	for (i = 0; i < SUN8I_CRYPTO_NCHAN; i++) {
    732   1.6  riastrad 		/* Check whether the channel is done.  */
    733   1.1  riastrad 		if (!ISSET(done, SUN8I_CRYPTO_ISR_DONE_CHAN(i))) {
    734   1.6  riastrad 			/* Nope.  Do we have a task to time out?  */
    735   1.1  riastrad 			if ((sc->sc_chan[i].cc_task != NULL) &&
    736   1.1  riastrad 			    ((now - sc->sc_chan[i].cc_starttime) >=
    737   1.1  riastrad 				SUN8I_CRYPTO_TIMEOUT))
    738   1.1  riastrad 				sun8i_crypto_chan_done(sc, i, ETIMEDOUT);
    739   1.1  riastrad 			continue;
    740   1.1  riastrad 		}
    741   1.6  riastrad 
    742   1.6  riastrad 		/* Channel is done.  Interpret the error if any.  */
    743   1.1  riastrad 		esr_chan = __SHIFTOUT(esr, SUN8I_CRYPTO_ESR_CHAN(i));
    744   1.1  riastrad 		if (esr_chan & SUN8I_CRYPTO_ESR_CHAN_ALGNOTSUP) {
    745   1.1  riastrad 			device_printf(sc->sc_dev, "channel %u:"
    746   1.1  riastrad 			    " alg not supported\n", i);
    747   1.1  riastrad 			error = ENODEV;
    748   1.1  riastrad 		} else if (esr_chan & SUN8I_CRYPTO_ESR_CHAN_DATALENERR) {
    749   1.1  riastrad 			device_printf(sc->sc_dev, "channel %u:"
    750   1.1  riastrad 			    " data length error\n", i);
    751   1.1  riastrad 			error = EIO;	/* XXX */
    752   1.1  riastrad 		} else if (esr_chan & SUN8I_CRYPTO_ESR_CHAN_KEYSRAMERR) {
    753   1.1  riastrad 			device_printf(sc->sc_dev, "channel %u:"
    754   1.1  riastrad 			    " key sram error\n", i);
    755   1.1  riastrad 			error = EIO;	/* XXX */
    756   1.1  riastrad 		} else if (esr_chan != 0) {
    757   1.1  riastrad 			error = EIO;	/* generic I/O error */
    758   1.1  riastrad 		} else {
    759   1.1  riastrad 			error = 0;
    760   1.1  riastrad 		}
    761   1.1  riastrad 
    762   1.6  riastrad 		/*
    763   1.6  riastrad 		 * Notify the task of completion.  May release the lock
    764   1.6  riastrad 		 * to invoke a callback.
    765   1.6  riastrad 		 */
    766   1.1  riastrad 		sun8i_crypto_chan_done(sc, i, error);
    767   1.1  riastrad 	}
    768   1.1  riastrad 
    769   1.1  riastrad 	/* All one; release the lock one last time.  */
    770   1.1  riastrad 	mutex_exit(&sc->sc_lock);
    771   1.1  riastrad }
    772   1.1  riastrad 
    773   1.1  riastrad static void
    774   1.1  riastrad sun8i_crypto_chan_done(struct sun8i_crypto_softc *sc, unsigned i, int error)
    775   1.1  riastrad {
    776   1.1  riastrad 	struct sun8i_crypto_task *task;
    777   1.1  riastrad 	uint32_t icr;
    778   1.1  riastrad 
    779   1.1  riastrad 	KASSERT(mutex_owned(&sc->sc_lock));
    780   1.1  riastrad 
    781   1.1  riastrad 	/* Claim the task if there is one; bail if not.  */
    782   1.1  riastrad 	if ((task = sc->sc_chan[i].cc_task) == NULL) {
    783   1.1  riastrad 		device_printf(sc->sc_dev, "channel %u: no task but error=%d\n",
    784   1.1  riastrad 		    i, error);
    785   1.1  riastrad 		return;
    786   1.1  riastrad 	}
    787   1.1  riastrad 	sc->sc_chan[i].cc_task = NULL;
    788   1.1  riastrad 
    789   1.1  riastrad 	/* Disable interrupts on this channel.  */
    790   1.1  riastrad 	icr = sun8i_crypto_read(sc, SUN8I_CRYPTO_ICR);
    791   1.1  riastrad 	icr &= ~__SHIFTIN(SUN8I_CRYPTO_ICR_INTR_EN_CHAN(i),
    792   1.1  riastrad 	    SUN8I_CRYPTO_ICR_INTR_EN);
    793   1.1  riastrad 	sun8i_crypto_write(sc, SUN8I_CRYPTO_ICR, icr);
    794   1.1  riastrad 
    795   1.1  riastrad 	/* Finished sending the descriptor to the device by DMA.  */
    796   1.2  riastrad 	bus_dmamap_sync(sc->sc_dmat, task->ct_buf.cb_map, 0,
    797   1.1  riastrad 	    sizeof(*task->ct_desc), BUS_DMASYNC_POSTWRITE);
    798   1.1  riastrad 
    799   1.1  riastrad 	/* Temporarily release the lock to invoke the callback.  */
    800   1.1  riastrad 	mutex_exit(&sc->sc_lock);
    801   1.1  riastrad 	(*task->ct_callback)(sc, task, task->ct_cookie, error);
    802   1.1  riastrad 	mutex_enter(&sc->sc_lock);
    803   1.1  riastrad }
    804   1.1  riastrad 
    805   1.1  riastrad /*
    806   1.1  riastrad  * DMA buffers
    807   1.1  riastrad  */
    808   1.1  riastrad 
    809   1.1  riastrad static int
    810   1.1  riastrad sun8i_crypto_allocbuf(struct sun8i_crypto_softc *sc, size_t size,
    811   1.1  riastrad     struct sun8i_crypto_buf *buf)
    812   1.1  riastrad {
    813   1.1  riastrad 	int error;
    814   1.1  riastrad 
    815   1.1  riastrad 	/* Allocate a DMA-safe buffer.  */
    816   1.1  riastrad 	error = bus_dmamem_alloc(sc->sc_dmat, size, 0, 0, buf->cb_seg,
    817   1.1  riastrad 	    __arraycount(buf->cb_seg), &buf->cb_nsegs, BUS_DMA_WAITOK);
    818   1.1  riastrad 	if (error)
    819   1.1  riastrad 		goto fail0;
    820   1.1  riastrad 
    821   1.1  riastrad 	/* Map the buffer into kernel virtual address space.  */
    822   1.1  riastrad 	error = bus_dmamem_map(sc->sc_dmat, buf->cb_seg, buf->cb_nsegs,
    823   1.1  riastrad 	    size, &buf->cb_kva, BUS_DMA_WAITOK);
    824   1.1  riastrad 	if (error)
    825   1.1  riastrad 		goto fail1;
    826   1.1  riastrad 
    827   1.1  riastrad 	/* Create a DMA map for the buffer.   */
    828   1.1  riastrad 	error = bus_dmamap_create(sc->sc_dmat, size, 1, size, 0,
    829   1.1  riastrad 	    BUS_DMA_WAITOK, &buf->cb_map);
    830   1.1  riastrad 	if (error)
    831   1.1  riastrad 		goto fail2;
    832   1.1  riastrad 
    833   1.1  riastrad 	/* Load the buffer into the DMA map.  */
    834   1.1  riastrad 	error = bus_dmamap_load(sc->sc_dmat, buf->cb_map, buf->cb_kva, size,
    835   1.1  riastrad 	    NULL, BUS_DMA_WAITOK);
    836   1.1  riastrad 	if (error)
    837   1.1  riastrad 		goto fail3;
    838   1.1  riastrad 
    839   1.1  riastrad 	/* Success!  */
    840   1.1  riastrad 	return 0;
    841   1.1  riastrad 
    842   1.1  riastrad fail4: __unused
    843   1.1  riastrad 	bus_dmamap_unload(sc->sc_dmat, buf->cb_map);
    844   1.1  riastrad fail3:	bus_dmamap_destroy(sc->sc_dmat, buf->cb_map);
    845   1.1  riastrad fail2:	bus_dmamem_unmap(sc->sc_dmat, buf->cb_kva, size);
    846   1.1  riastrad fail1:	bus_dmamem_free(sc->sc_dmat, buf->cb_seg, buf->cb_nsegs);
    847   1.1  riastrad fail0:	return error;
    848   1.1  riastrad }
    849   1.1  riastrad 
    850   1.1  riastrad static void
    851   1.1  riastrad sun8i_crypto_freebuf(struct sun8i_crypto_softc *sc, size_t size,
    852   1.1  riastrad     struct sun8i_crypto_buf *buf)
    853   1.1  riastrad {
    854   1.1  riastrad 
    855   1.1  riastrad 	bus_dmamap_unload(sc->sc_dmat, buf->cb_map);
    856   1.1  riastrad 	bus_dmamap_destroy(sc->sc_dmat, buf->cb_map);
    857   1.1  riastrad 	bus_dmamem_unmap(sc->sc_dmat, buf->cb_kva, size);
    858   1.1  riastrad 	bus_dmamem_free(sc->sc_dmat, buf->cb_seg, buf->cb_nsegs);
    859   1.1  riastrad }
    860   1.1  riastrad 
    861   1.1  riastrad /*
    862   1.1  riastrad  * Crypto Engine - TRNG
    863   1.1  riastrad  */
    864   1.1  riastrad 
    865   1.1  riastrad static void
    866   1.1  riastrad sun8i_crypto_rng_attach(struct sun8i_crypto_softc *sc)
    867   1.1  riastrad {
    868   1.1  riastrad 	device_t self = sc->sc_dev;
    869   1.1  riastrad 	struct sun8i_crypto_rng *rng = &sc->sc_rng;
    870   1.1  riastrad 	int error;
    871   1.1  riastrad 
    872   1.1  riastrad 	/* Preallocate a buffer to reuse.  */
    873   1.1  riastrad 	error = sun8i_crypto_allocbuf(sc, SUN8I_CRYPTO_RNGBYTES, &rng->cr_buf);
    874   1.1  riastrad 	if (error)
    875   1.1  riastrad 		goto fail0;
    876   1.1  riastrad 
    877   1.1  riastrad 	/* Create a task to reuse.  */
    878   1.1  riastrad 	rng->cr_task = sun8i_crypto_task_get(sc, sun8i_crypto_rng_done, rng);
    879   1.1  riastrad 	if (rng->cr_task == NULL)
    880   1.1  riastrad 		goto fail1;
    881   1.1  riastrad 
    882   1.1  riastrad 	/*
    883   1.1  riastrad 	 * Attach the rndsource.  This is _not_ marked as RND_TYPE_RNG
    884   1.1  riastrad 	 * because the output is not uniformly distributed.  The bits
    885   1.1  riastrad 	 * are heavily weighted toward 0 or 1, at different times, and
    886   1.1  riastrad 	 * I haven't scienced a satisfactory story out of it yet.
    887   1.1  riastrad 	 */
    888   1.1  riastrad 	rndsource_setcb(&rng->cr_rndsource, sun8i_crypto_rng_get, sc);
    889   1.1  riastrad 	rnd_attach_source(&rng->cr_rndsource, device_xname(self),
    890   1.1  riastrad 	    RND_TYPE_UNKNOWN,
    891   1.1  riastrad 	    RND_FLAG_COLLECT_VALUE|RND_FLAG_ESTIMATE_VALUE|RND_FLAG_HASCB);
    892   1.1  riastrad 
    893   1.1  riastrad 	/* Success!  */
    894   1.1  riastrad 	return;
    895   1.1  riastrad 
    896   1.1  riastrad fail2: __unused
    897   1.1  riastrad 	sun8i_crypto_task_put(sc, rng->cr_task);
    898   1.1  riastrad fail1:	sun8i_crypto_freebuf(sc, SUN8I_CRYPTO_RNGBYTES, &rng->cr_buf);
    899   1.1  riastrad fail0:	aprint_error_dev(self, "failed to set up RNG, error=%d\n", error);
    900   1.1  riastrad }
    901   1.1  riastrad 
    902   1.1  riastrad static void
    903   1.1  riastrad sun8i_crypto_rng_get(size_t nbytes, void *cookie)
    904   1.1  riastrad {
    905   1.1  riastrad 	struct sun8i_crypto_softc *sc = cookie;
    906   1.1  riastrad 	struct sun8i_crypto_rng *rng = &sc->sc_rng;
    907   1.1  riastrad 	bool pending;
    908   1.1  riastrad 	int error;
    909   1.1  riastrad 
    910   1.1  riastrad 	/*
    911   1.1  riastrad 	 * Test and set the RNG-pending flag.  If it's already in
    912   1.1  riastrad 	 * progress, nothing to do here.
    913   1.1  riastrad 	 */
    914   1.1  riastrad 	mutex_enter(&sc->sc_lock);
    915   1.1  riastrad 	pending = rng->cr_pending;
    916   1.1  riastrad 	rng->cr_pending = true;
    917   1.1  riastrad 	mutex_exit(&sc->sc_lock);
    918   1.1  riastrad 	if (pending)
    919   1.1  riastrad 		return;
    920   1.1  riastrad 
    921   1.1  riastrad 	/* Prepare for a DMA read into the buffer.  */
    922   1.1  riastrad 	bus_dmamap_sync(sc->sc_dmat, rng->cr_buf.cb_map,
    923   1.1  riastrad 	    0, SUN8I_CRYPTO_RNGBYTES, BUS_DMASYNC_PREREAD);
    924   1.1  riastrad 
    925   1.1  riastrad 	/* Set the task up for TRNG to our buffer.  */
    926   1.1  riastrad 	sun8i_crypto_task_reset(rng->cr_task);
    927   1.1  riastrad 	sun8i_crypto_task_set_output(rng->cr_task, rng->cr_buf.cb_map);
    928   1.1  riastrad 
    929   1.1  riastrad 	/* Submit the TRNG task.  */
    930   1.1  riastrad 	error = sun8i_crypto_submit_trng(sc, rng->cr_task,
    931   1.1  riastrad 	    SUN8I_CRYPTO_RNGBYTES);
    932   1.1  riastrad 	if (error)
    933   1.1  riastrad 		goto fail;
    934   1.1  riastrad 
    935   1.1  riastrad 	/* All done!  */
    936   1.1  riastrad 	return;
    937   1.1  riastrad 
    938   1.1  riastrad fail:	mutex_enter(&sc->sc_lock);
    939   1.1  riastrad 	rng->cr_pending = false;
    940   1.1  riastrad 	mutex_exit(&sc->sc_lock);
    941   1.1  riastrad }
    942   1.1  riastrad 
    943   1.1  riastrad static void
    944   1.1  riastrad sun8i_crypto_rng_done(struct sun8i_crypto_softc *sc,
    945   1.1  riastrad     struct sun8i_crypto_task *task, void *cookie, int error)
    946   1.1  riastrad {
    947   1.1  riastrad 	struct sun8i_crypto_rng *rng = cookie;
    948   1.1  riastrad 	uint8_t *buf = rng->cr_buf.cb_kva;
    949   1.1  riastrad 	uint32_t entropybits;
    950   1.1  riastrad 
    951   1.1  riastrad 	KASSERT(rng == &sc->sc_rng);
    952   1.1  riastrad 
    953   1.1  riastrad 	/* Finished the DMA read into the buffer.  */
    954   1.1  riastrad 	bus_dmamap_sync(sc->sc_dmat, rng->cr_buf.cb_map,
    955   1.1  riastrad 	    0, SUN8I_CRYPTO_RNGBYTES, BUS_DMASYNC_POSTREAD);
    956   1.1  riastrad 
    957   1.1  riastrad 	/* If anything went wrong, forget about it.  */
    958   1.1  riastrad 	if (error)
    959   1.1  riastrad 		goto out;
    960   1.1  riastrad 
    961   1.1  riastrad 	/*
    962   1.1  riastrad 	 * This TRNG has quite low entropy at best.  But if it fails a
    963   1.1  riastrad 	 * repeated output test, then assume it's busted.
    964   1.1  riastrad 	 */
    965   1.9  riastrad 	CTASSERT(SUN8I_CRYPTO_RNGBYTES <= UINT32_MAX/NBBY);
    966   1.9  riastrad 	entropybits = (NBBY*SUN8I_CRYPTO_RNGBYTES)/SUN8I_CRYPTO_RNGENTROPY;
    967   1.1  riastrad 	if (consttime_memequal(buf, buf + SUN8I_CRYPTO_RNGBYTES/2,
    968   1.1  riastrad 		SUN8I_CRYPTO_RNGBYTES/2)) {
    969   1.1  riastrad 		device_printf(sc->sc_dev, "failed repeated output test\n");
    970   1.1  riastrad 		entropybits = 0;
    971   1.1  riastrad 	}
    972   1.1  riastrad 
    973  1.10  riastrad 	/*
    974  1.10  riastrad 	 * Actually we don't believe in any of the entropy until this
    975  1.10  riastrad 	 * device has had more scrutiny.
    976  1.10  riastrad 	 */
    977  1.10  riastrad 	entropybits = 0;
    978  1.10  riastrad 
    979   1.1  riastrad 	/* Success!  Enter and erase the data.  */
    980   1.1  riastrad 	rnd_add_data(&rng->cr_rndsource, buf, SUN8I_CRYPTO_RNGBYTES,
    981   1.1  riastrad 	    entropybits);
    982   1.1  riastrad 	explicit_memset(buf, 0, SUN8I_CRYPTO_RNGBYTES);
    983   1.1  riastrad 
    984   1.1  riastrad out:	/* Done -- clear the RNG-pending flag.  */
    985   1.1  riastrad 	mutex_enter(&sc->sc_lock);
    986   1.1  riastrad 	rng->cr_pending = false;
    987   1.1  riastrad 	mutex_exit(&sc->sc_lock);
    988   1.1  riastrad }
    989   1.1  riastrad 
    990   1.1  riastrad /*
    991   1.1  riastrad  * Self-test
    992   1.1  riastrad  */
    993   1.1  riastrad 
    994   1.3  riastrad static const uint8_t selftest_input[16];
    995   1.3  riastrad static const uint8_t selftest_key[16];
    996   1.3  riastrad static const uint8_t selftest_output[16] = {
    997   1.1  riastrad 	0x66,0xe9,0x4b,0xd4,0xef,0x8a,0x2c,0x3b,
    998   1.1  riastrad 	0x88,0x4c,0xfa,0x59,0xca,0x34,0x2b,0x2e,
    999   1.1  riastrad };
   1000   1.1  riastrad 
   1001   1.1  riastrad static void
   1002   1.1  riastrad sun8i_crypto_selftest(device_t self)
   1003   1.1  riastrad {
   1004   1.1  riastrad 	const size_t datalen = sizeof selftest_input;
   1005   1.1  riastrad 	struct sun8i_crypto_softc *sc = device_private(self);
   1006   1.1  riastrad 	struct sun8i_crypto_selftest *selftest = &sc->sc_selftest;
   1007   1.1  riastrad 	int error;
   1008   1.1  riastrad 
   1009   1.1  riastrad 	CTASSERT(sizeof selftest_input == sizeof selftest_output);
   1010   1.1  riastrad 
   1011   1.1  riastrad 	/* Allocate an input buffer.  */
   1012   1.1  riastrad 	error = sun8i_crypto_allocbuf(sc, sizeof selftest_input,
   1013   1.1  riastrad 	    &selftest->cs_in);
   1014   1.1  riastrad 	if (error)
   1015   1.1  riastrad 		goto fail0;
   1016   1.1  riastrad 
   1017   1.1  riastrad 	/* Allocate a key buffer.  */
   1018   1.1  riastrad 	error = sun8i_crypto_allocbuf(sc, sizeof selftest_key,
   1019   1.1  riastrad 	    &selftest->cs_key);
   1020   1.1  riastrad 	if (error)
   1021   1.1  riastrad 		goto fail1;
   1022   1.1  riastrad 
   1023   1.1  riastrad 	/* Allocate an output buffer.  */
   1024   1.1  riastrad 	error = sun8i_crypto_allocbuf(sc, sizeof selftest_output,
   1025   1.1  riastrad 	    &selftest->cs_out);
   1026   1.1  riastrad 	if (error)
   1027   1.1  riastrad 		goto fail2;
   1028   1.1  riastrad 
   1029   1.1  riastrad 	/* Allocate a task descriptor.  */
   1030   1.1  riastrad 	selftest->cs_task = sun8i_crypto_task_get(sc,
   1031   1.1  riastrad 	    sun8i_crypto_selftest_done, selftest);
   1032   1.1  riastrad 	if (selftest->cs_task == NULL)
   1033   1.1  riastrad 		goto fail3;
   1034   1.1  riastrad 
   1035   1.1  riastrad 	/* Copy the input and key into their buffers.  */
   1036   1.1  riastrad 	memcpy(selftest->cs_in.cb_kva, selftest_input, sizeof selftest_input);
   1037   1.1  riastrad 	memcpy(selftest->cs_key.cb_kva, selftest_key, sizeof selftest_key);
   1038   1.1  riastrad 
   1039   1.1  riastrad 	/* Prepare for a DMA write from the input and key buffers.  */
   1040   1.1  riastrad 	bus_dmamap_sync(sc->sc_dmat, selftest->cs_in.cb_map, 0,
   1041   1.1  riastrad 	    sizeof selftest_input, BUS_DMASYNC_PREWRITE);
   1042   1.1  riastrad 	bus_dmamap_sync(sc->sc_dmat, selftest->cs_key.cb_map, 0,
   1043   1.1  riastrad 	    sizeof selftest_key, BUS_DMASYNC_PREWRITE);
   1044   1.1  riastrad 
   1045   1.1  riastrad 	/* Prepare for a DMA read into the output buffer.  */
   1046   1.1  riastrad 	bus_dmamap_sync(sc->sc_dmat, selftest->cs_out.cb_map, 0,
   1047   1.1  riastrad 	    sizeof selftest_output, BUS_DMASYNC_PREREAD);
   1048   1.1  riastrad 
   1049   1.1  riastrad 	/* Set up the task descriptor.  */
   1050   1.1  riastrad 	sun8i_crypto_task_reset(selftest->cs_task);
   1051   1.1  riastrad 	sun8i_crypto_task_set_key(selftest->cs_task, selftest->cs_key.cb_map);
   1052   1.1  riastrad 	sun8i_crypto_task_set_input(selftest->cs_task, selftest->cs_in.cb_map);
   1053   1.1  riastrad 	sun8i_crypto_task_set_output(selftest->cs_task,
   1054   1.1  riastrad 	    selftest->cs_out.cb_map);
   1055   1.1  riastrad 
   1056   1.1  riastrad 	/* Submit the AES-128 ECB task.  */
   1057   1.1  riastrad 	error = sun8i_crypto_submit_aesecb(sc, selftest->cs_task, datalen,
   1058   1.1  riastrad 	    SUN8I_CRYPTO_TDQS_AES_KEYSIZE_128, SUN8I_CRYPTO_TDQC_OP_DIR_ENC);
   1059   1.1  riastrad 	if (error)
   1060   1.1  riastrad 		goto fail4;
   1061   1.1  riastrad 
   1062   1.1  riastrad 	device_printf(sc->sc_dev, "AES-128 self-test initiated\n");
   1063   1.1  riastrad 
   1064   1.1  riastrad 	/* Success!  */
   1065   1.1  riastrad 	return;
   1066   1.1  riastrad 
   1067   1.1  riastrad fail4:	sun8i_crypto_task_put(sc, selftest->cs_task);
   1068   1.1  riastrad fail3:	sun8i_crypto_freebuf(sc, sizeof selftest_output, &selftest->cs_out);
   1069   1.1  riastrad fail2:	sun8i_crypto_freebuf(sc, sizeof selftest_key, &selftest->cs_key);
   1070   1.1  riastrad fail1:	sun8i_crypto_freebuf(sc, sizeof selftest_input, &selftest->cs_in);
   1071   1.1  riastrad fail0:	aprint_error_dev(self, "failed to run self-test, error=%d\n", error);
   1072   1.1  riastrad }
   1073   1.1  riastrad 
   1074   1.3  riastrad static bool
   1075   1.3  riastrad sun8i_crypto_selftest_check(struct sun8i_crypto_softc *sc, const char *title,
   1076   1.3  riastrad     size_t n, const void *expected, const void *actual)
   1077   1.3  riastrad {
   1078   1.3  riastrad 	const uint8_t *e = expected;
   1079   1.3  riastrad 	const uint8_t *a = actual;
   1080   1.3  riastrad 	size_t i;
   1081   1.3  riastrad 
   1082   1.3  riastrad 	if (memcmp(e, a, n) == 0)
   1083   1.3  riastrad 		return true;
   1084   1.3  riastrad 
   1085   1.3  riastrad 	device_printf(sc->sc_dev, "self-test: %s\n", title);
   1086   1.3  riastrad 	printf("expected: ");
   1087   1.3  riastrad 	for (i = 0; i < n; i++)
   1088   1.3  riastrad 		printf("%02hhx", e[i]);
   1089   1.3  riastrad 	printf("\n");
   1090   1.3  riastrad 	printf("actual:   ");
   1091   1.3  riastrad 	for (i = 0; i < n; i++)
   1092   1.3  riastrad 		printf("%02hhx", a[i]);
   1093   1.3  riastrad 	printf("\n");
   1094   1.3  riastrad 	return false;
   1095   1.3  riastrad }
   1096   1.3  riastrad 
   1097   1.1  riastrad static void
   1098   1.1  riastrad sun8i_crypto_selftest_done(struct sun8i_crypto_softc *sc,
   1099   1.1  riastrad     struct sun8i_crypto_task *task, void *cookie, int error)
   1100   1.1  riastrad {
   1101   1.1  riastrad 	struct sun8i_crypto_selftest *selftest = cookie;
   1102   1.1  riastrad 	bool ok = true;
   1103   1.1  riastrad 
   1104   1.1  riastrad 	KASSERT(selftest == &sc->sc_selftest);
   1105   1.1  riastrad 
   1106   1.3  riastrad 	/*
   1107   1.3  riastrad 	 * Finished the DMA read into the output buffer, and finished
   1108   1.3  riastrad 	 * the DMA writes from the key buffer and input buffer.
   1109   1.3  riastrad 	 */
   1110   1.1  riastrad 	bus_dmamap_sync(sc->sc_dmat, selftest->cs_out.cb_map, 0,
   1111   1.1  riastrad 	    sizeof selftest_output, BUS_DMASYNC_POSTREAD);
   1112   1.3  riastrad 	bus_dmamap_sync(sc->sc_dmat, selftest->cs_key.cb_map, 0,
   1113   1.3  riastrad 	    sizeof selftest_key, BUS_DMASYNC_POSTWRITE);
   1114   1.1  riastrad 	bus_dmamap_sync(sc->sc_dmat, selftest->cs_in.cb_map, 0,
   1115   1.1  riastrad 	    sizeof selftest_input, BUS_DMASYNC_POSTWRITE);
   1116   1.1  riastrad 
   1117   1.3  riastrad 	/* If anything went wrong, fail now.  */
   1118   1.1  riastrad 	if (error) {
   1119   1.1  riastrad 		device_printf(sc->sc_dev, "self-test error=%d\n", error);
   1120   1.1  riastrad 		goto out;
   1121   1.1  riastrad 	}
   1122   1.1  riastrad 
   1123   1.3  riastrad 	/*
   1124   1.3  riastrad 	 * Verify the input and key weren't clobbered, and verify the
   1125   1.3  riastrad 	 * output matches what we expect.
   1126   1.3  riastrad 	 */
   1127   1.3  riastrad 	ok &= sun8i_crypto_selftest_check(sc, "input clobbered",
   1128   1.3  riastrad 	    sizeof selftest_input, selftest_input, selftest->cs_in.cb_kva);
   1129   1.3  riastrad 	ok &= sun8i_crypto_selftest_check(sc, "key clobbered",
   1130   1.3  riastrad 	    sizeof selftest_key, selftest_key, selftest->cs_key.cb_kva);
   1131   1.3  riastrad 	ok &= sun8i_crypto_selftest_check(sc, "output mismatch",
   1132   1.3  riastrad 	    sizeof selftest_output, selftest_output, selftest->cs_out.cb_kva);
   1133   1.1  riastrad 
   1134   1.1  riastrad 	/* XXX Disable the RNG and other stuff if this fails...  */
   1135   1.1  riastrad 	if (ok)
   1136   1.1  riastrad 		device_printf(sc->sc_dev, "AES-128 self-test passed\n");
   1137   1.1  riastrad 
   1138   1.1  riastrad out:	sun8i_crypto_task_put(sc, task);
   1139   1.1  riastrad 	sun8i_crypto_freebuf(sc, sizeof selftest_output, &selftest->cs_out);
   1140   1.1  riastrad 	sun8i_crypto_freebuf(sc, sizeof selftest_key, &selftest->cs_key);
   1141   1.1  riastrad 	sun8i_crypto_freebuf(sc, sizeof selftest_input, &selftest->cs_in);
   1142   1.1  riastrad }
   1143   1.1  riastrad 
   1144   1.1  riastrad /*
   1145   1.1  riastrad  * Sysctl for testing
   1146   1.1  riastrad  */
   1147   1.1  riastrad 
   1148   1.1  riastrad struct sun8i_crypto_userreq {
   1149   1.1  riastrad 	kmutex_t			cu_lock;
   1150   1.1  riastrad 	kcondvar_t			cu_cv;
   1151   1.1  riastrad 	size_t				cu_size;
   1152   1.1  riastrad 	struct sun8i_crypto_buf		cu_buf;
   1153   1.1  riastrad 	struct sun8i_crypto_task	*cu_task;
   1154   1.1  riastrad 	int				cu_error;
   1155   1.1  riastrad 	bool				cu_done;
   1156   1.1  riastrad 	bool				cu_cancel;
   1157   1.1  riastrad };
   1158   1.1  riastrad 
   1159   1.1  riastrad static void
   1160   1.1  riastrad sun8i_crypto_sysctl_attach(struct sun8i_crypto_softc *sc)
   1161   1.1  riastrad {
   1162   1.1  riastrad 	struct sun8i_crypto_sysctl *cy = &sc->sc_sysctl;
   1163   1.1  riastrad 	int error;
   1164   1.1  riastrad 
   1165   1.6  riastrad 	/* hw.sun8icryptoN (node) */
   1166   1.1  riastrad 	error = sysctl_createv(&cy->cy_log, 0, NULL, &cy->cy_root_node,
   1167   1.1  riastrad 	    CTLFLAG_PERMANENT, CTLTYPE_NODE, device_xname(sc->sc_dev),
   1168   1.1  riastrad 	    SYSCTL_DESCR("sun8i crypto engine knobs"),
   1169   1.1  riastrad 	    NULL, 0, NULL, 0,
   1170   1.1  riastrad 	    CTL_HW, CTL_CREATE, CTL_EOL);
   1171   1.1  riastrad 	if (error) {
   1172   1.1  riastrad 		aprint_error_dev(sc->sc_dev,
   1173   1.1  riastrad 		    "failed to set up sysctl hw.%s: %d\n",
   1174   1.1  riastrad 		    device_xname(sc->sc_dev), error);
   1175   1.1  riastrad 		return;
   1176   1.1  riastrad 	}
   1177   1.1  riastrad 
   1178   1.9  riastrad 	/* hw.sun8icryptoN.rng (`struct', 4096-byte array) */
   1179  1.12  riastrad 	sysctl_createv(&cy->cy_log, 0, &cy->cy_root_node, &cy->cy_trng_node,
   1180   1.1  riastrad 	    CTLFLAG_PERMANENT|CTLFLAG_READONLY|CTLFLAG_PRIVATE, CTLTYPE_STRUCT,
   1181   1.9  riastrad 	    "rng", SYSCTL_DESCR("Read up to 4096 bytes out of the TRNG"),
   1182   1.1  riastrad 	    &sun8i_crypto_sysctl_rng, 0, sc, 0, CTL_CREATE, CTL_EOL);
   1183   1.1  riastrad 	if (error) {
   1184   1.1  riastrad 		aprint_error_dev(sc->sc_dev,
   1185   1.1  riastrad 		    "failed to set up sysctl hw.%s.rng: %d\n",
   1186   1.1  riastrad 		    device_xname(sc->sc_dev), error);
   1187   1.1  riastrad 		return;
   1188   1.1  riastrad 	}
   1189   1.1  riastrad }
   1190   1.1  riastrad 
   1191   1.1  riastrad static int
   1192   1.1  riastrad sun8i_crypto_sysctl_rng(SYSCTLFN_ARGS)
   1193   1.1  riastrad {
   1194   1.1  riastrad 	struct sysctlnode node = *rnode;
   1195   1.1  riastrad 	struct sun8i_crypto_softc *sc = node.sysctl_data;
   1196   1.1  riastrad 	struct sun8i_crypto_userreq *req;
   1197   1.1  riastrad 	size_t size;
   1198   1.1  riastrad 	int error;
   1199   1.1  riastrad 
   1200   1.1  riastrad 	/* If oldp == NULL, the caller wants to learn the size.  */
   1201   1.1  riastrad 	if (oldp == NULL) {
   1202   1.9  riastrad 		*oldlenp = 4096;
   1203   1.1  riastrad 		return 0;
   1204   1.1  riastrad 	}
   1205   1.1  riastrad 
   1206   1.1  riastrad 	/* Verify the output buffer size is reasonable.  */
   1207   1.1  riastrad 	size = *oldlenp;
   1208   1.9  riastrad 	if (size > 4096)	/* size_t, so never negative */
   1209   1.1  riastrad 		return E2BIG;
   1210   1.1  riastrad 	if (size == 0)
   1211   1.1  riastrad 		return 0;	/* nothing to do */
   1212   1.1  riastrad 
   1213   1.1  riastrad 	/* Allocate a request context.  */
   1214   1.1  riastrad 	req = kmem_alloc(sizeof(*req), KM_NOSLEEP);
   1215   1.1  riastrad 	if (req == NULL)
   1216   1.1  riastrad 		return ENOMEM;
   1217   1.1  riastrad 
   1218   1.1  riastrad 	/* Initialize the request context.  */
   1219   1.1  riastrad 	mutex_init(&req->cu_lock, MUTEX_DEFAULT, IPL_NONE);
   1220   1.1  riastrad 	cv_init(&req->cu_cv, "sun8isy");
   1221   1.1  riastrad 	req->cu_size = size;
   1222   1.1  riastrad 	req->cu_error = EIO;
   1223   1.1  riastrad 	req->cu_done = false;
   1224   1.1  riastrad 	req->cu_cancel = false;
   1225   1.1  riastrad 
   1226   1.1  riastrad 	/* Allocate a buffer for the RNG output.  */
   1227   1.1  riastrad 	error = sun8i_crypto_allocbuf(sc, size, &req->cu_buf);
   1228   1.1  riastrad 	if (error)
   1229   1.1  riastrad 		goto out0;
   1230   1.1  riastrad 
   1231   1.1  riastrad 	/* Allocate a task.  */
   1232   1.1  riastrad 	req->cu_task = sun8i_crypto_task_get(sc, sun8i_crypto_sysctl_rng_done,
   1233   1.1  riastrad 	    req);
   1234   1.1  riastrad 	if (req->cu_task == NULL)
   1235   1.1  riastrad 		goto out1;
   1236   1.1  riastrad 
   1237   1.1  riastrad 	/* Prepare for a DMA read into the buffer.  */
   1238   1.1  riastrad 	bus_dmamap_sync(sc->sc_dmat, req->cu_buf.cb_map, 0, size,
   1239   1.1  riastrad 	    BUS_DMASYNC_PREREAD);
   1240   1.1  riastrad 
   1241   1.1  riastrad 	/* Set the task up for TRNG to our buffer.  */
   1242   1.1  riastrad 	sun8i_crypto_task_reset(req->cu_task);
   1243   1.1  riastrad 	sun8i_crypto_task_set_output(req->cu_task, req->cu_buf.cb_map);
   1244   1.1  riastrad 
   1245   1.1  riastrad 	/* Submit the TRNG task.  */
   1246   1.1  riastrad 	error = sun8i_crypto_submit_trng(sc, req->cu_task, size);
   1247   1.4  riastrad 	if (error) {
   1248   1.4  riastrad 		if (error == ERESTART)
   1249   1.4  riastrad 			error = EBUSY;
   1250   1.1  riastrad 		goto out2;
   1251   1.4  riastrad 	}
   1252   1.1  riastrad 
   1253   1.1  riastrad 	/* Wait for the request to complete.  */
   1254   1.1  riastrad 	mutex_enter(&req->cu_lock);
   1255   1.1  riastrad 	while (!req->cu_done) {
   1256   1.1  riastrad 		error = cv_wait_sig(&req->cu_cv, &req->cu_lock);
   1257   1.1  riastrad 		if (error) {
   1258   1.1  riastrad 			/*
   1259   1.5  riastrad 			 * If we finished while waiting to acquire the
   1260   1.5  riastrad 			 * lock, ignore the error and just return now.
   1261   1.5  riastrad 			 * Otherwise, notify the callback that it has
   1262   1.5  riastrad 			 * to clean up after us.
   1263   1.1  riastrad 			 */
   1264   1.5  riastrad 			if (req->cu_done)
   1265   1.5  riastrad 				error = 0;
   1266   1.5  riastrad 			else
   1267   1.5  riastrad 				req->cu_cancel = true;
   1268   1.1  riastrad 			break;
   1269   1.1  riastrad 		}
   1270   1.1  riastrad 	}
   1271   1.1  riastrad 	mutex_exit(&req->cu_lock);
   1272   1.1  riastrad 
   1273   1.1  riastrad 	/*
   1274   1.1  riastrad 	 * Return early on error from cv_wait_sig, which means
   1275   1.1  riastrad 	 * interruption; the callback will clean up instead.
   1276   1.1  riastrad 	 */
   1277   1.1  riastrad 	if (error)
   1278   1.1  riastrad 		return error;
   1279   1.1  riastrad 
   1280   1.1  riastrad 	/* Check for error from the device.  */
   1281   1.1  riastrad 	error = req->cu_error;
   1282   1.1  riastrad 	if (error)
   1283   1.1  riastrad 		goto out2;
   1284   1.1  riastrad 
   1285   1.1  riastrad 	/* Finished the DMA read into the buffer.  */
   1286   1.1  riastrad 	bus_dmamap_sync(sc->sc_dmat, req->cu_buf.cb_map, 0, req->cu_size,
   1287   1.1  riastrad 	    BUS_DMASYNC_POSTREAD);
   1288   1.1  riastrad 
   1289   1.1  riastrad 	/* Copy out the data.  */
   1290   1.1  riastrad 	node.sysctl_data = req->cu_buf.cb_kva;
   1291   1.1  riastrad 	node.sysctl_size = size;
   1292   1.1  riastrad 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1293   1.1  riastrad 
   1294   1.1  riastrad 	/* Clear the buffer.  */
   1295   1.1  riastrad 	explicit_memset(req->cu_buf.cb_kva, 0, size);
   1296   1.1  riastrad 
   1297   1.5  riastrad 	/* Clean up.  */
   1298   1.1  riastrad out2:	sun8i_crypto_task_put(sc, req->cu_task);
   1299   1.1  riastrad out1:	sun8i_crypto_freebuf(sc, req->cu_size, &req->cu_buf);
   1300   1.1  riastrad out0:	cv_destroy(&req->cu_cv);
   1301   1.1  riastrad 	mutex_destroy(&req->cu_lock);
   1302   1.7  riastrad 	kmem_free(req, sizeof(*req));
   1303   1.1  riastrad 	return error;
   1304   1.1  riastrad }
   1305   1.1  riastrad 
   1306   1.1  riastrad static void
   1307   1.1  riastrad sun8i_crypto_sysctl_rng_done(struct sun8i_crypto_softc *sc,
   1308   1.1  riastrad     struct sun8i_crypto_task *task, void *cookie, int error)
   1309   1.1  riastrad {
   1310   1.1  riastrad 	struct sun8i_crypto_userreq *req = cookie;
   1311   1.1  riastrad 	bool cancel;
   1312   1.1  riastrad 
   1313   1.1  riastrad 	/*
   1314   1.1  riastrad 	 * Notify the waiting thread of the error, and find out whether
   1315   1.1  riastrad 	 * that thread cancelled.
   1316   1.1  riastrad 	 */
   1317   1.1  riastrad 	mutex_enter(&req->cu_lock);
   1318   1.1  riastrad 	cancel = req->cu_cancel;
   1319   1.1  riastrad 	req->cu_error = error;
   1320   1.1  riastrad 	req->cu_done = true;
   1321   1.1  riastrad 	cv_broadcast(&req->cu_cv);
   1322   1.1  riastrad 	mutex_exit(&req->cu_lock);
   1323   1.1  riastrad 
   1324   1.1  riastrad 	/*
   1325   1.1  riastrad 	 * If it wasn't cancelled, we're done -- the main thread will
   1326   1.1  riastrad 	 * clean up after itself.
   1327   1.1  riastrad 	 */
   1328   1.1  riastrad 	if (!cancel)
   1329   1.1  riastrad 		return;
   1330   1.1  riastrad 
   1331   1.5  riastrad 	/* Clean up after the main thread cancelled.  */
   1332   1.1  riastrad 	sun8i_crypto_task_put(sc, req->cu_task);
   1333   1.1  riastrad 	sun8i_crypto_freebuf(sc, req->cu_size, &req->cu_buf);
   1334   1.1  riastrad 	cv_destroy(&req->cu_cv);
   1335   1.1  riastrad 	mutex_destroy(&req->cu_lock);
   1336   1.7  riastrad 	kmem_free(req, sizeof(*req));
   1337   1.1  riastrad }
   1338