On 11/22/2023 11:08 AM, Gaurav Kashyap wrote:
This patch contains two changes in UFS for wrapped keys.
1. Implements the blk_crypto_profile ops for generate, import
    and prepare key apis.
2. Defines UFS vops for generate, import and prepare keys so
    that vendors can hook into them.

re-write commit message as it is single change.
using numbering in commit message is indication of making multiple independent changes in single patch, which should be avoided.


Signed-off-by: Gaurav Kashyap <quic_gaurk...@quicinc.com>
---
  drivers/ufs/core/ufshcd-crypto.c | 41 ++++++++++++++++++++++++++++++++
  include/ufs/ufshcd.h             | 11 +++++++++
  2 files changed, 52 insertions(+)

diff --git a/drivers/ufs/core/ufshcd-crypto.c b/drivers/ufs/core/ufshcd-crypto.c
index 3edbca87c322..cf34f4a9cda8 100644
--- a/drivers/ufs/core/ufshcd-crypto.c
+++ b/drivers/ufs/core/ufshcd-crypto.c
@@ -143,10 +143,51 @@ static int ufshcd_crypto_derive_sw_secret(struct 
blk_crypto_profile *profile,
        return -EOPNOTSUPP;
  }
+static int ufshcd_crypto_generate_key(struct blk_crypto_profile *profile,
+                                     u8 
lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE])
+{
+       struct ufs_hba *hba =
+               container_of(profile, struct ufs_hba, crypto_profile);
+
+       if (hba->vops && hba->vops->generate_key)
+               return  hba->vops->generate_key(hba, lt_key);
Please fix double space.
+
+       return -EOPNOTSUPP;
+}
+
+static int ufshcd_crypto_prepare_key(struct blk_crypto_profile *profile,
+                                    const u8 *lt_key, size_t lt_key_size,
+                                    u8 
eph_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE])
+{
+       struct ufs_hba *hba =
+               container_of(profile, struct ufs_hba, crypto_profile);
+
+       if (hba->vops && hba->vops->prepare_key)
+               return  hba->vops->prepare_key(hba, lt_key, lt_key_size, 
eph_key);
Please fix double space.
+
+       return -EOPNOTSUPP;
+}
+
+static int ufshcd_crypto_import_key(struct blk_crypto_profile *profile,
+                                   const u8 *imp_key, size_t imp_key_size,
+                                   u8 
lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE])
+{
+       struct ufs_hba *hba =
+               container_of(profile, struct ufs_hba, crypto_profile);
+
+       if (hba->vops && hba->vops->import_key)
+               return  hba->vops->import_key(hba, imp_key, imp_key_size, 
lt_key);
Please fix double space.
+
+       return -EOPNOTSUPP;
+}
+
  static const struct blk_crypto_ll_ops ufshcd_crypto_ops = {
        .keyslot_program        = ufshcd_crypto_keyslot_program,
        .keyslot_evict          = ufshcd_crypto_keyslot_evict,
        .derive_sw_secret       = ufshcd_crypto_derive_sw_secret,
+       .generate_key           = ufshcd_crypto_generate_key,
+       .prepare_key            = ufshcd_crypto_prepare_key,
+       .import_key             = ufshcd_crypto_import_key,
  };
static enum blk_crypto_mode_num
diff --git a/include/ufs/ufshcd.h b/include/ufs/ufshcd.h
index 86677788b5bd..49657a5d1e34 100644
--- a/include/ufs/ufshcd.h
+++ b/include/ufs/ufshcd.h
@@ -321,6 +321,9 @@ struct ufs_pwr_mode_info {
   * @config_scaling_param: called to configure clock scaling parameters
   * @program_key: program or evict an inline encryption key
   * @derive_sw_secret: derive sw secret from a wrapped key
+ * @generate_key: generate a storage key and return longterm wrapped key
+ * @prepare_key: unwrap longterm key and return ephemeral wrapped key
+ * @import_key: import sw storage key and return longterm wrapped key
   * @event_notify: called to notify important events
   * @reinit_notify: called to notify reinit of UFSHCD during max gear switch
   * @mcq_config_resource: called to configure MCQ platform resources
@@ -368,6 +371,14 @@ struct ufs_hba_variant_ops {
        int     (*derive_sw_secret)(struct ufs_hba *hba, const u8 wkey[],
                                    unsigned int wkey_size,
                                    u8 sw_secret[BLK_CRYPTO_SW_SECRET_SIZE]);
+       int     (*generate_key)(struct ufs_hba *hba,
+                               u8 lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]);
+       int     (*prepare_key)(struct ufs_hba *hba,
+                              const u8 *lt_key, size_t lt_key_size,
+                              u8 eph_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]);
+       int     (*import_key)(struct ufs_hba *hba,
+                             const u8 *imp_key, size_t imp_key_size,
+                             u8 lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]);
        void    (*event_notify)(struct ufs_hba *hba,
                                enum ufs_event_type evt, void *data);
        void    (*reinit_notify)(struct ufs_hba *);

Reply via email to