From: Corentin Labbe <cla...@baylibre.com>

commit b756f1c8fc9d84e3f546d7ffe056c5352f4aab05 upstream.

Allwinner A10 and A13 SoC have a version of the SS which produce
invalid IV in IVx register.

Instead of adding a variant for those, let's convert SS to produce IV
directly from data.
Fixes: 6298e948215f2 ("crypto: sunxi-ss - Add Allwinner Security System crypto 
accelerator")
Cc: <sta...@vger.kernel.org>
Signed-off-by: Corentin Labbe <cla...@baylibre.com>
Signed-off-by: Herbert Xu <herb...@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
---
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c |   34 ++++++++++++++++----
 1 file changed, 28 insertions(+), 6 deletions(-)

--- a/drivers/crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c
+++ b/drivers/crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c
@@ -20,6 +20,7 @@ static int noinline_for_stack sun4i_ss_o
        unsigned int ivsize = crypto_skcipher_ivsize(tfm);
        struct sun4i_cipher_req_ctx *ctx = skcipher_request_ctx(areq);
        u32 mode = ctx->mode;
+       void *backup_iv = NULL;
        /* when activating SS, the default FIFO space is SS_RX_DEFAULT(32) */
        u32 rx_cnt = SS_RX_DEFAULT;
        u32 tx_cnt = 0;
@@ -44,6 +45,13 @@ static int noinline_for_stack sun4i_ss_o
                return -EINVAL;
        }
 
+       if (areq->iv && ivsize > 0 && mode & SS_DECRYPTION) {
+               backup_iv = kzalloc(ivsize, GFP_KERNEL);
+               if (!backup_iv)
+                       return -ENOMEM;
+               scatterwalk_map_and_copy(backup_iv, areq->src, areq->cryptlen - 
ivsize, ivsize, 0);
+       }
+
        spin_lock_irqsave(&ss->slock, flags);
 
        for (i = 0; i < op->keylen; i += 4)
@@ -117,9 +125,12 @@ static int noinline_for_stack sun4i_ss_o
        } while (oleft);
 
        if (areq->iv) {
-               for (i = 0; i < 4 && i < ivsize / 4; i++) {
-                       v = readl(ss->base + SS_IV0 + i * 4);
-                       *(u32 *)(areq->iv + i * 4) = v;
+               if (mode & SS_DECRYPTION) {
+                       memcpy(areq->iv, backup_iv, ivsize);
+                       kfree_sensitive(backup_iv);
+               } else {
+                       scatterwalk_map_and_copy(areq->iv, areq->dst, 
areq->cryptlen - ivsize,
+                                                ivsize, 0);
                }
        }
 
@@ -174,6 +185,7 @@ static int sun4i_ss_cipher_poll(struct s
        unsigned int ileft = areq->cryptlen;
        unsigned int oleft = areq->cryptlen;
        unsigned int todo;
+       void *backup_iv = NULL;
        struct sg_mapping_iter mi, mo;
        unsigned long pi = 0, po = 0; /* progress for in and out */
        bool miter_err;
@@ -217,6 +229,13 @@ static int sun4i_ss_cipher_poll(struct s
        if (need_fallback)
                return sun4i_ss_cipher_poll_fallback(areq);
 
+       if (areq->iv && ivsize > 0 && mode & SS_DECRYPTION) {
+               backup_iv = kzalloc(ivsize, GFP_KERNEL);
+               if (!backup_iv)
+                       return -ENOMEM;
+               scatterwalk_map_and_copy(backup_iv, areq->src, areq->cryptlen - 
ivsize, ivsize, 0);
+       }
+
        spin_lock_irqsave(&ss->slock, flags);
 
        for (i = 0; i < op->keylen; i += 4)
@@ -345,9 +364,12 @@ static int sun4i_ss_cipher_poll(struct s
                sg_miter_stop(&mo);
        }
        if (areq->iv) {
-               for (i = 0; i < 4 && i < ivsize / 4; i++) {
-                       v = readl(ss->base + SS_IV0 + i * 4);
-                       *(u32 *)(areq->iv + i * 4) = v;
+               if (mode & SS_DECRYPTION) {
+                       memcpy(areq->iv, backup_iv, ivsize);
+                       kfree_sensitive(backup_iv);
+               } else {
+                       scatterwalk_map_and_copy(areq->iv, areq->dst, 
areq->cryptlen - ivsize,
+                                                ivsize, 0);
                }
        }
 


Reply via email to