mirror of
				https://github.com/smaeul/u-boot.git
				synced 2025-11-04 05:50:17 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			302 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			302 lines
		
	
	
		
			7.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0+
 | 
						|
/*
 | 
						|
 * Copyright (c) 2021 Nuvoton Technology Corp.
 | 
						|
 */
 | 
						|
 | 
						|
#include <common.h>
 | 
						|
#include <dm.h>
 | 
						|
#include <uboot_aes.h>
 | 
						|
#include <asm/io.h>
 | 
						|
#include <asm/arch/aes.h>
 | 
						|
#include <asm/arch/otp.h>
 | 
						|
#include <malloc.h>
 | 
						|
 | 
						|
#define ONE_SECOND 0xC00000
 | 
						|
 | 
						|
struct npcm_aes_priv {
 | 
						|
	struct npcm_aes_regs *regs;
 | 
						|
};
 | 
						|
 | 
						|
static struct npcm_aes_priv *aes_priv;
 | 
						|
static u8 fkeyind_to_set = 0xff;
 | 
						|
 | 
						|
static int second_timeout(u32 *addr, u32 bitmask, u32 bitpol)
 | 
						|
{
 | 
						|
	ulong time, i = 0;
 | 
						|
 | 
						|
	time = get_timer(0);
 | 
						|
 | 
						|
	/* default 1 second timeout */
 | 
						|
	while (((readl(addr) & bitmask) == bitpol) && i < ONE_SECOND)
 | 
						|
		i++;
 | 
						|
 | 
						|
	if (i == ONE_SECOND) {
 | 
						|
		printf("%xms timeout: addr = %x, mask = %x\n", (u32)get_timer(time),
 | 
						|
		       *addr, bitmask);
 | 
						|
		return -1;
 | 
						|
	}
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
int npcm_aes_select_key(u8 fkeyind)
 | 
						|
{
 | 
						|
	if (npcm_otp_is_fuse_array_disabled(NPCM_KEY_SA)) {
 | 
						|
		printf("AES key access denied\n");
 | 
						|
		return -EACCES;
 | 
						|
	}
 | 
						|
 | 
						|
	if (fkeyind < 4)
 | 
						|
		fkeyind_to_set = fkeyind;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int npcm_aes_init(u8 dec_enc)
 | 
						|
{
 | 
						|
	struct npcm_aes_regs *regs = aes_priv->regs;
 | 
						|
	u32 ctrl, orgctrlval, wrtimeout;
 | 
						|
 | 
						|
	/* reset hw */
 | 
						|
	writel(readl(®s->aes_sw_reset) | SW_RESET_BIT, ®s->aes_sw_reset);
 | 
						|
	writel(readl(®s->aes_fifo_status) | DIN_FIFO_OVERFLOW, ®s->aes_fifo_status);
 | 
						|
	writel(readl(®s->aes_fifo_status) | DOUT_FIFO_UNDERFLOW, ®s->aes_fifo_status);
 | 
						|
 | 
						|
	/* Workaround to over come Errata #648 */
 | 
						|
	orgctrlval = readl(®s->aes_control);
 | 
						|
	ctrl = (0x00002004 | dec_enc);    /* AES256(CBC) */
 | 
						|
 | 
						|
	if (ctrl != orgctrlval) {
 | 
						|
		writel(ctrl, ®s->aes_control);
 | 
						|
 | 
						|
		if (ctrl != readl(®s->aes_control)) {
 | 
						|
			u32 read_ctrl;
 | 
						|
			int intwr;
 | 
						|
 | 
						|
			for (wrtimeout = 0; wrtimeout < 1000; wrtimeout++) {
 | 
						|
				for (intwr = 0 ; intwr < 10; intwr++) {
 | 
						|
					writel(ctrl, ®s->aes_control);
 | 
						|
					writew(ctrl, (u16 *)®s->aes_control + 1);
 | 
						|
					/* Write configurable info in a single write operation */
 | 
						|
					mb();
 | 
						|
				}
 | 
						|
 | 
						|
				read_ctrl = readl(®s->aes_control);
 | 
						|
				if (ctrl == read_ctrl)
 | 
						|
					break;
 | 
						|
			}
 | 
						|
 | 
						|
			if (wrtimeout == 1000) {
 | 
						|
				printf("\nTIMEOUT expected data=0x%x Actual AES_CONTROL data 0x%x\n\n",
 | 
						|
				       ctrl, read_ctrl);
 | 
						|
				return -EAGAIN;
 | 
						|
			}
 | 
						|
 | 
						|
			printf("Workaround success, wrtimeout = %d\n", wrtimeout);
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if (second_timeout(®s->aes_busy, AES_BUSY_BIT, AES_BUSY_BIT))
 | 
						|
		return -EAGAIN;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static inline void npcm_aes_load_iv(u8 *iv)
 | 
						|
{
 | 
						|
	struct npcm_aes_regs *regs = aes_priv->regs;
 | 
						|
	u32 *p = (u32 *)iv;
 | 
						|
	u32 i;
 | 
						|
 | 
						|
	/* Initialization Vector is loaded in 32-bit chunks */
 | 
						|
	for (i = 0; i < (SIZE_AES_BLOCK / sizeof(u32)); i++)
 | 
						|
		writel(p[i], ®s->aes_iv_0 + i);
 | 
						|
}
 | 
						|
 | 
						|
static inline void npcm_aes_load_key(u8 *key)
 | 
						|
{
 | 
						|
	struct npcm_aes_regs *regs = aes_priv->regs;
 | 
						|
	u32 *p = (u32 *)key;
 | 
						|
	u32 i;
 | 
						|
 | 
						|
	/* The key can be loaded either via the configuration or by using sideband
 | 
						|
	 *  key port (aes_select_key).
 | 
						|
	 *  If aes_select_key has been called ('fkeyind_to_set' was set to desired
 | 
						|
	 *  key index) and no key is specified (key is NULL), we should use the
 | 
						|
	 *  key index. Otherwise, we write the given key to the registers.
 | 
						|
	 */
 | 
						|
	if (!key && fkeyind_to_set < 4) {
 | 
						|
		npcm_otp_select_key(fkeyind_to_set);
 | 
						|
 | 
						|
		/* Sample the new key */
 | 
						|
		writel(readl(®s->aes_sk) | AES_SK_BIT, ®s->aes_sk);
 | 
						|
 | 
						|
	} else {
 | 
						|
		/* Initialization Vector is loaded in 32-bit chunks */
 | 
						|
		for (i = 0; i < (2 * SIZE_AES_BLOCK / sizeof(u32)); i++)
 | 
						|
			writel(p[i], ®s->aes_key_0 + i);
 | 
						|
 | 
						|
		fkeyind_to_set = 0xff;
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static inline void npcm_aes_write(u32 *in)
 | 
						|
{
 | 
						|
	struct npcm_aes_regs *regs = aes_priv->regs;
 | 
						|
	u32 i;
 | 
						|
 | 
						|
	/* 16 Byte AES Block is written in 32-bit chunks */
 | 
						|
	for (i = 0; i < (SIZE_AES_BLOCK / sizeof(u32)); i++)
 | 
						|
		writel(in[i], ®s->aes_fifo_data);
 | 
						|
}
 | 
						|
 | 
						|
static inline void npcm_aes_read(u32 *out)
 | 
						|
{
 | 
						|
	struct npcm_aes_regs *regs = aes_priv->regs;
 | 
						|
	u32 i;
 | 
						|
 | 
						|
	/* Data is read in 32-bit chunks */
 | 
						|
	for (i = 0; i < (SIZE_AES_BLOCK / sizeof(u32)); i++)
 | 
						|
		out[i] = readl(®s->aes_fifo_data);
 | 
						|
}
 | 
						|
 | 
						|
static void npcm_aes_feed(u32 num_aes_blocks, u32 *datain, u32 *dataout)
 | 
						|
{
 | 
						|
	struct npcm_aes_regs *regs = aes_priv->regs;
 | 
						|
	u32 aes_datablk;
 | 
						|
	u32 total_blocks = num_aes_blocks;
 | 
						|
	u32 blocks_left = num_aes_blocks;
 | 
						|
 | 
						|
	/* data mode */
 | 
						|
	writel(readl(®s->aes_busy) | AES_BUSY_BIT, ®s->aes_busy);
 | 
						|
 | 
						|
	/* Clear overflow and underflow */
 | 
						|
	writel(readl(®s->aes_fifo_status) | DIN_FIFO_OVERFLOW, ®s->aes_fifo_status);
 | 
						|
	writel(readl(®s->aes_fifo_status) | DOUT_FIFO_UNDERFLOW, ®s->aes_fifo_status);
 | 
						|
 | 
						|
	/* datain/dataout is advanced in 32-bit chunks */
 | 
						|
	aes_datablk = (SIZE_AES_BLOCK / sizeof(u32));
 | 
						|
 | 
						|
	/* Quit if there is no complete blocks */
 | 
						|
	if (total_blocks == 0)
 | 
						|
		return;
 | 
						|
 | 
						|
	/* Write the first block */
 | 
						|
	if (total_blocks > 1) {
 | 
						|
		npcm_aes_write(datain);
 | 
						|
		datain += aes_datablk;
 | 
						|
		blocks_left--;
 | 
						|
	}
 | 
						|
 | 
						|
	/* Write the second block */
 | 
						|
	if (total_blocks > 2) {
 | 
						|
		second_timeout(®s->aes_fifo_status, DIN_FIFO_EMPTY, 0);
 | 
						|
		npcm_aes_write(datain);
 | 
						|
		datain += aes_datablk;
 | 
						|
		blocks_left--;
 | 
						|
	}
 | 
						|
 | 
						|
	/* Write & read available blocks */
 | 
						|
	while (blocks_left > 0) {
 | 
						|
		second_timeout(®s->aes_fifo_status, DIN_FIFO_FULL, DIN_FIFO_FULL);
 | 
						|
 | 
						|
		/* Write next block */
 | 
						|
		npcm_aes_write(datain);
 | 
						|
		datain  += aes_datablk;
 | 
						|
 | 
						|
		/* Wait till DOUT FIFO is empty */
 | 
						|
		second_timeout(®s->aes_fifo_status, DOUT_FIFO_EMPTY, DOUT_FIFO_EMPTY);
 | 
						|
 | 
						|
		/* Read next block */
 | 
						|
		npcm_aes_read(dataout);
 | 
						|
		dataout += aes_datablk;
 | 
						|
 | 
						|
		blocks_left--;
 | 
						|
	}
 | 
						|
 | 
						|
	if (total_blocks > 2) {
 | 
						|
		second_timeout(®s->aes_fifo_status, DOUT_FIFO_FULL, 0);
 | 
						|
 | 
						|
		/* Read next block */
 | 
						|
		npcm_aes_read(dataout);
 | 
						|
		dataout += aes_datablk;
 | 
						|
 | 
						|
		second_timeout(®s->aes_fifo_status, DOUT_FIFO_FULL, 0);
 | 
						|
 | 
						|
		/* Read next block */
 | 
						|
		npcm_aes_read(dataout);
 | 
						|
		dataout += aes_datablk;
 | 
						|
	} else if (total_blocks > 1) {
 | 
						|
		second_timeout(®s->aes_fifo_status, DOUT_FIFO_FULL, 0);
 | 
						|
 | 
						|
		/* Read next block */
 | 
						|
		npcm_aes_read(dataout);
 | 
						|
		dataout += aes_datablk;
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
void aes_expand_key(u8 *key, u32 key_size, u8 *expkey)
 | 
						|
{
 | 
						|
	/* npcm hw expands the key automatically, just copy it */
 | 
						|
	memcpy(expkey, key, SIZE_AES_BLOCK * 2);
 | 
						|
}
 | 
						|
 | 
						|
void aes_cbc_encrypt_blocks(u32 key_size, u8 *key_exp, u8 *iv, u8 *src, u8 *dst,
 | 
						|
			    u32 num_aes_blocks)
 | 
						|
{
 | 
						|
	if (npcm_aes_init(AES_OP_ENCRYPT))
 | 
						|
		return;
 | 
						|
 | 
						|
	npcm_aes_load_iv(iv);
 | 
						|
 | 
						|
	npcm_aes_load_key(key_exp);
 | 
						|
 | 
						|
	npcm_aes_feed(num_aes_blocks, (u32 *)src, (u32 *)dst);
 | 
						|
}
 | 
						|
 | 
						|
void aes_cbc_decrypt_blocks(u32 key_size, u8 *key_exp, u8 *iv, u8 *src, u8 *dst,
 | 
						|
			    u32 num_aes_blocks)
 | 
						|
{
 | 
						|
	if (npcm_aes_init(AES_OP_DECRYPT))
 | 
						|
		return;
 | 
						|
 | 
						|
	npcm_aes_load_iv(iv);
 | 
						|
 | 
						|
	npcm_aes_load_key(key_exp);
 | 
						|
 | 
						|
	npcm_aes_feed(num_aes_blocks, (u32 *)src, (u32 *)dst);
 | 
						|
}
 | 
						|
 | 
						|
static int npcm_aes_bind(struct udevice *dev)
 | 
						|
{
 | 
						|
	aes_priv = calloc(1, sizeof(struct npcm_aes_priv));
 | 
						|
	if (!aes_priv) {
 | 
						|
		printf("%s: %d\n", __func__, __LINE__);
 | 
						|
		return -ENOMEM;
 | 
						|
	}
 | 
						|
 | 
						|
	aes_priv->regs = dev_read_addr_ptr(dev);
 | 
						|
	if (!aes_priv->regs) {
 | 
						|
		printf("Cannot find aes reg address, binding failed\n");
 | 
						|
		return -EINVAL;
 | 
						|
	}
 | 
						|
 | 
						|
	printf("AES: NPCM AES module bind OK\n");
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static const struct udevice_id npcm_aes_ids[] = {
 | 
						|
	{ .compatible = "nuvoton,npcm845-aes" },
 | 
						|
	{ .compatible = "nuvoton,npcm750-aes" },
 | 
						|
	{ }
 | 
						|
};
 | 
						|
 | 
						|
U_BOOT_DRIVER(npcm_aes) = {
 | 
						|
	.name = "npcm_aes",
 | 
						|
	.id = UCLASS_MISC,
 | 
						|
	.of_match = npcm_aes_ids,
 | 
						|
	.priv_auto = sizeof(struct npcm_aes_priv),
 | 
						|
	.bind = npcm_aes_bind,
 | 
						|
};
 |