mirror of
				https://source.denx.de/u-boot/u-boot.git
				synced 2025-10-31 16:31:25 +01:00 
			
		
		
		
	issue: CAAM fails with key error when perform Modular Exponentiation using PKHA Block in CAAM Fix: add flush and invalidate dcache for keys, signature and output decrypted data processed by CAAM. Fixes: 34276478f7 (DM: crypto/fsl - Add Freescale rsa DM driver) Signed-off-by: Ye Li <ye.li@nxp.com> Reviewed-by: Gaurav Jain <gaurav.jain@nxp.com> Acked-by: Peng Fan <peng.fan@nxp.com>
		
			
				
	
	
		
			71 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			71 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // SPDX-License-Identifier: GPL-2.0+
 | |
| /*
 | |
|  * (C) Copyright 2014 Freescale Semiconductor, Inc.
 | |
|  * Author: Ruchika Gupta <ruchika.gupta@freescale.com>
 | |
|  */
 | |
| 
 | |
| #include <config.h>
 | |
| #include <common.h>
 | |
| #include <cpu_func.h>
 | |
| #include <dm.h>
 | |
| #include <log.h>
 | |
| #include <asm/types.h>
 | |
| #include <malloc.h>
 | |
| #include "jobdesc.h"
 | |
| #include "desc.h"
 | |
| #include "jr.h"
 | |
| #include "rsa_caam.h"
 | |
| #include <u-boot/rsa-mod-exp.h>
 | |
| 
 | |
| int fsl_mod_exp(struct udevice *dev, const uint8_t *sig, uint32_t sig_len,
 | |
| 		struct key_prop *prop, uint8_t *out)
 | |
| {
 | |
| 	uint32_t keylen;
 | |
| 	struct pk_in_params pkin;
 | |
| 	uint32_t desc[MAX_CAAM_DESCSIZE];
 | |
| 	int ret;
 | |
| 
 | |
| 	/* Length in bytes */
 | |
| 	keylen = prop->num_bits / 8;
 | |
| 
 | |
| 	pkin.a = sig;
 | |
| 	pkin.a_siz = sig_len;
 | |
| 	pkin.n = prop->modulus;
 | |
| 	pkin.n_siz = keylen;
 | |
| 	pkin.e = prop->public_exponent;
 | |
| 	pkin.e_siz = prop->exp_len;
 | |
| 
 | |
| 	inline_cnstr_jobdesc_pkha_rsaexp(desc, &pkin, out, sig_len);
 | |
| 
 | |
| 	flush_dcache_range((ulong)sig, (ulong)sig + sig_len);
 | |
| 	flush_dcache_range((ulong)prop->modulus, (ulong)(prop->modulus) + keylen);
 | |
| 	flush_dcache_range((ulong)prop->public_exponent,
 | |
| 			   (ulong)(prop->public_exponent) + prop->exp_len);
 | |
| 	flush_dcache_range((ulong)desc, (ulong)desc + (sizeof(uint32_t) * MAX_CAAM_DESCSIZE));
 | |
| 	flush_dcache_range((ulong)out, (ulong)out + sig_len);
 | |
| 
 | |
| 	ret = run_descriptor_jr(desc);
 | |
| 	if (ret) {
 | |
| 		debug("%s: RSA failed to verify: %d\n", __func__, ret);
 | |
| 		return -EFAULT;
 | |
| 	}
 | |
| 
 | |
| 	invalidate_dcache_range((ulong)out, (ulong)out + sig_len);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static const struct mod_exp_ops fsl_mod_exp_ops = {
 | |
| 	.mod_exp	= fsl_mod_exp,
 | |
| };
 | |
| 
 | |
| U_BOOT_DRIVER(fsl_rsa_mod_exp) = {
 | |
| 	.name	= "fsl_rsa_mod_exp",
 | |
| 	.id	= UCLASS_MOD_EXP,
 | |
| 	.ops	= &fsl_mod_exp_ops,
 | |
| };
 | |
| 
 | |
| U_BOOT_DRVINFO(fsl_rsa) = {
 | |
| 	.name = "fsl_rsa_mod_exp",
 | |
| };
 |