This patch contains two changes in UFS for wrapped keys.
1. Implements the blk_crypto_profile ops for generate, import
   and prepare key apis.
2. Defines UFS vops for generate, import and prepare keys so
   that vendors can hook into them.

Signed-off-by: Gaurav Kashyap <[email protected]>
---
 drivers/ufs/core/ufshcd-crypto.c | 41 ++++++++++++++++++++++++++++++++
 include/ufs/ufshcd.h             | 11 +++++++++
 2 files changed, 52 insertions(+)

diff --git a/drivers/ufs/core/ufshcd-crypto.c b/drivers/ufs/core/ufshcd-crypto.c
index 3edbca87c322..cf34f4a9cda8 100644
--- a/drivers/ufs/core/ufshcd-crypto.c
+++ b/drivers/ufs/core/ufshcd-crypto.c
@@ -143,10 +143,51 @@ static int ufshcd_crypto_derive_sw_secret(struct 
blk_crypto_profile *profile,
        return -EOPNOTSUPP;
 }
 
+static int ufshcd_crypto_generate_key(struct blk_crypto_profile *profile,
+                                     u8 
lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE])
+{
+       struct ufs_hba *hba =
+               container_of(profile, struct ufs_hba, crypto_profile);
+
+       if (hba->vops && hba->vops->generate_key)
+               return  hba->vops->generate_key(hba, lt_key);
+
+       return -EOPNOTSUPP;
+}
+
+static int ufshcd_crypto_prepare_key(struct blk_crypto_profile *profile,
+                                    const u8 *lt_key, size_t lt_key_size,
+                                    u8 
eph_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE])
+{
+       struct ufs_hba *hba =
+               container_of(profile, struct ufs_hba, crypto_profile);
+
+       if (hba->vops && hba->vops->prepare_key)
+               return  hba->vops->prepare_key(hba, lt_key, lt_key_size, 
eph_key);
+
+       return -EOPNOTSUPP;
+}
+
+static int ufshcd_crypto_import_key(struct blk_crypto_profile *profile,
+                                   const u8 *imp_key, size_t imp_key_size,
+                                   u8 
lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE])
+{
+       struct ufs_hba *hba =
+               container_of(profile, struct ufs_hba, crypto_profile);
+
+       if (hba->vops && hba->vops->import_key)
+               return  hba->vops->import_key(hba, imp_key, imp_key_size, 
lt_key);
+
+       return -EOPNOTSUPP;
+}
+
 static const struct blk_crypto_ll_ops ufshcd_crypto_ops = {
        .keyslot_program        = ufshcd_crypto_keyslot_program,
        .keyslot_evict          = ufshcd_crypto_keyslot_evict,
        .derive_sw_secret       = ufshcd_crypto_derive_sw_secret,
+       .generate_key           = ufshcd_crypto_generate_key,
+       .prepare_key            = ufshcd_crypto_prepare_key,
+       .import_key             = ufshcd_crypto_import_key,
 };
 
 static enum blk_crypto_mode_num
diff --git a/include/ufs/ufshcd.h b/include/ufs/ufshcd.h
index 86677788b5bd..49657a5d1e34 100644
--- a/include/ufs/ufshcd.h
+++ b/include/ufs/ufshcd.h
@@ -321,6 +321,9 @@ struct ufs_pwr_mode_info {
  * @config_scaling_param: called to configure clock scaling parameters
  * @program_key: program or evict an inline encryption key
  * @derive_sw_secret: derive sw secret from a wrapped key
+ * @generate_key: generate a storage key and return longterm wrapped key
+ * @prepare_key: unwrap longterm key and return ephemeral wrapped key
+ * @import_key: import sw storage key and return longterm wrapped key
  * @event_notify: called to notify important events
  * @reinit_notify: called to notify reinit of UFSHCD during max gear switch
  * @mcq_config_resource: called to configure MCQ platform resources
@@ -368,6 +371,14 @@ struct ufs_hba_variant_ops {
        int     (*derive_sw_secret)(struct ufs_hba *hba, const u8 wkey[],
                                    unsigned int wkey_size,
                                    u8 sw_secret[BLK_CRYPTO_SW_SECRET_SIZE]);
+       int     (*generate_key)(struct ufs_hba *hba,
+                               u8 lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]);
+       int     (*prepare_key)(struct ufs_hba *hba,
+                              const u8 *lt_key, size_t lt_key_size,
+                              u8 eph_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]);
+       int     (*import_key)(struct ufs_hba *hba,
+                             const u8 *imp_key, size_t imp_key_size,
+                             u8 lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]);
        void    (*event_notify)(struct ufs_hba *hba,
                                enum ufs_event_type evt, void *data);
        void    (*reinit_notify)(struct ufs_hba *);
-- 
2.25.1


Reply via email to