iBoot/drivers/apple/aes_s7002/aes_s7002.c

266 lines
7.3 KiB
C

/*
* Copyright (C) 2011-2013 Apple Inc. All rights reserved.
*
* This document is the property of Apple Inc.
* It is considered confidential and proprietary.
*
* This document may not be reproduced or transmitted in any form,
* in whole or in part, without the express written permission of
* Apple Inc.
*/
#include <debug.h>
#include <drivers/aes.h>
#include <drivers/dma.h>
#include <platform.h>
#include <platform/soc/hwclocks.h>
#include <platform/soc/hwdmachannels.h>
#include <sys/task.h>
#include "aes_s7002.h"
void _load_input_block(const uint32_t *src);
void _store_output_block(uint32_t *dst);
#if AES_USE_DMA
int
aes_execute_cmd(uint32_t cmd, void *addr, uint32_t length, bool block)
{
struct task_event event;
struct dma_segment seg;
void *fifo;
int32_t ret;
int dma_channel;
// build an SGL for the one segment
switch (cmd & DMA_CMD_DIR_MASK) {
case DMA_CMD_DIR_TX:
seg.paddr = (uintptr_t)addr;
fifo = (void*)0x47380040;
dma_channel = DMA_AES_WR;
break;
case DMA_CMD_DIR_RX:
seg.paddr = (uintptr_t)addr;
fifo = (void*)0x47380080;
dma_channel = DMA_AES_RD;
break;
default:
return -1;
}
seg.length = length;
if (block) {
// run the operation
event_init(&event, EVENT_FLAG_AUTO_UNSIGNAL, false);
ret = dma_execute_async(cmd, dma_channel, &seg, fifo, length, 0, 0,
(dma_completion_function)event_signal, (void *)&event);
if (!ret)
// and block waiting for it to complete
event_wait(&event);
} else {
ret = dma_execute_async(cmd, dma_channel, &seg, fifo, length, 0, 0,
NULL, NULL);
}
return ret;
}
#endif
int
aes_hw_crypto_cmd(u_int32_t cmd, void *src, void *dst, size_t len, u_int32_t opts, const void *key, void *iv)
{
uint32_t key_in_ctrl;
uint32_t blocks;
uint32_t *local_iv, *local_key;
dprintf(DEBUG_SPEW, "aes_hw_crypto_cmd: cmd: %08x, src: %p, dst: %p, len: %zx, opts: %08x, key: %p, iv: %p \n",
cmd, src, dst, len, opts, key, iv);
clock_gate(CLK_AES0, true);
ASSERT(src != NULL);
ASSERT(dst != NULL);
local_iv = (uint32_t *)iv;
local_key = (uint32_t *)key;
/* Make sure length is multiple of 16 bytes */
ASSERT((len > 0) && ((len & 0xf) == 0));
blocks = len / 16;
key_in_ctrl = 0;
switch (cmd & AES_CMD_MODE_MASK) {
case AES_CMD_ECB : key_in_ctrl |= KEY_IN_CTRL_MOD_ECB; break;
case AES_CMD_CBC : key_in_ctrl |= KEY_IN_CTRL_MOD_CBC; break;
default : goto fail;
}
switch (cmd & AES_CMD_DIR_MASK) {
case AES_CMD_ENC : key_in_ctrl |= KEY_IN_CTRL_DIR_ENC; break;
case AES_CMD_DEC : key_in_ctrl |= KEY_IN_CTRL_DIR_DEC; break;
default : goto fail;
}
/* Get the key length */
switch (opts & AES_KEY_SIZE_MASK) {
case AES_KEY_SIZE_128 : key_in_ctrl |= KEY_IN_CTRL_LEN_128; break;
case AES_KEY_SIZE_192 : key_in_ctrl |= KEY_IN_CTRL_LEN_192; break;
case AES_KEY_SIZE_256 : key_in_ctrl |= KEY_IN_CTRL_LEN_256; break;
default : goto fail;
}
bool key_disabled = false;
/* Set the key */
switch (opts & AES_KEY_TYPE_MASK) {
case AES_KEY_TYPE_USER :
key_in_ctrl |= KEY_IN_CTRL_SEL_SW;
switch (opts & AES_KEY_SIZE_MASK) {
default:
rAES_S7002_KEY_IN7 = local_key[7];
rAES_S7002_KEY_IN6 = local_key[6];
case AES_KEY_SIZE_192:
rAES_S7002_KEY_IN5 = local_key[5];
rAES_S7002_KEY_IN4 = local_key[4];
case AES_KEY_SIZE_128:
rAES_S7002_KEY_IN3 = local_key[3];
rAES_S7002_KEY_IN2 = local_key[2];
rAES_S7002_KEY_IN1 = local_key[1];
rAES_S7002_KEY_IN0 = local_key[0];
}
break;
case AES_KEY_TYPE_UID0 :
key_in_ctrl |= KEY_IN_CTRL_SEL_UID1;
key_disabled = platform_keys_disabled(0,1);
break;
case AES_KEY_TYPE_GID0 :
key_in_ctrl |= KEY_IN_CTRL_SEL_GID0;
key_disabled = platform_keys_disabled(1,0);
break;
case AES_KEY_TYPE_GID1 :
key_in_ctrl |= KEY_IN_CTRL_SEL_GID1;
key_disabled = platform_keys_disabled(1,0);
break;
}
if (key_disabled) {
dprintf(DEBUG_INFO, "SIO_AES: requested AES key has been disabled\n");
return -1;
}
/* Make sure AES block is not busy */
ASSERT(rAES_S7002_KEY_IN_STS & KEY_IN_STS_RDY);
ASSERT(rAES_S7002_TXT_IN_STS & TXT_IN_FIFO_SPACE_AVAIL);
ASSERT(!(rAES_S7002_TXT_OUT_STS & TXT_OUT_DATA_AVAIL));
/* Setup Key configurator, and load the context */
rAES_S7002_KEY_IN_CTRL = key_in_ctrl;
rAES_S7002_KEY_IN_CTRL |= KEY_IN_CTRL_VAL_SET;
dprintf(DEBUG_SPEW, "sio_aes: key_in_ctrl:0x%08x, rAES_S7002_KEY_IN_CTRL:0x%08x\n", key_in_ctrl, rAES_S7002_KEY_IN_CTRL);
/* Load IV */
if (iv != 0) {
rAES_S7002_IV_IN0 = local_iv[0];
rAES_S7002_IV_IN1 = local_iv[1];
rAES_S7002_IV_IN2 = local_iv[2];
rAES_S7002_IV_IN3 = local_iv[3];
} else {
rAES_S7002_IV_IN0 = 0;
rAES_S7002_IV_IN1 = 0;
rAES_S7002_IV_IN2 = 0;
rAES_S7002_IV_IN3 = 0;
}
rAES_S7002_IV_IN_CTRL = (0 << IV_IN_CTRL_CTX_SHIFT);
rAES_S7002_IV_IN_CTRL |= IV_IN_CTRL_VAL_SET;
/* Perform AES operation */
/* Load first block */
rAES_S7002_TXT_IN_CTRL = ((0 << TXT_IN_CTRL_IV_CTX_SHIFT) | (0 << TXT_IN_CTRL_KEY_CTX_SHIFT));
#if AES_USE_DMA
/* Do cache operations */
platform_cache_operation(CACHE_CLEAN | CACHE_INVALIDATE, (void *)((uint32_t)dst & ~(CPU_CACHELINE_SIZE-1)), ROUNDUP(len, CPU_CACHELINE_SIZE) + CPU_CACHELINE_SIZE);
/* start the operation */
aes_execute_cmd(DMA_CMD_DIR_RX, dst, len, false);
/* Do cache operations */
platform_cache_operation(CACHE_CLEAN, (void *)((uint32_t)src & ~(CPU_CACHELINE_SIZE-1)), ROUNDUP(len, CPU_CACHELINE_SIZE) + CPU_CACHELINE_SIZE);
/* start the operation */
aes_execute_cmd(DMA_CMD_DIR_TX, src, len, true);
#else
uint32_t *local_src = (uint32_t *)src;
uint32_t *local_dst = (uint32_t *)dst;
rAES_S7002_TXT_IN_CTRL = ((0 << TXT_IN_CTRL_IV_CTX_SHIFT) | (0 << TXT_IN_CTRL_KEY_CTX_SHIFT));
_load_input_block(local_src);
while(--blocks) {
/* Wait until we can shove next block in */
while ((rAES_S7002_TXT_IN_STS & TXT_IN_FIFO_SPACE_AVAIL) != TXT_IN_FIFO_SPACE_AVAIL);
/* Load next block */
local_src += 4;
rAES_S7002_TXT_IN_CTRL = ((0 << TXT_IN_CTRL_IV_CTX_SHIFT) | (0 << TXT_IN_CTRL_KEY_CTX_SHIFT));
_load_input_block(local_src);
/* Store result of the previous operation */
while ((rAES_S7002_TXT_OUT_STS & TXT_OUT_DATA_AVAIL) != TXT_OUT_DATA_AVAIL);
_store_output_block(local_dst);
local_dst += 4;
}
/* Store result of the last operation */
while ((rAES_S7002_TXT_OUT_STS & TXT_OUT_DATA_AVAIL) != TXT_OUT_DATA_AVAIL);
_store_output_block(local_dst);
#endif
/* Clear user key from the registers */
if ((opts & AES_KEY_TYPE_MASK) == AES_KEY_TYPE_USER) {
rAES_S7002_KEY_IN7 = 0;
rAES_S7002_KEY_IN6 = 0;
rAES_S7002_KEY_IN5 = 0;
rAES_S7002_KEY_IN4 = 0;
rAES_S7002_KEY_IN3 = 0;
rAES_S7002_KEY_IN2 = 0;
rAES_S7002_KEY_IN1 = 0;
rAES_S7002_KEY_IN0 = 0;
}
clock_gate(CLK_AES0, false);
return 0;
fail:
panic("AES_S7002: bad arguments\n");
}
void _load_input_block(const uint32_t *src)
{
dprintf(DEBUG_SPEW, "src: ");
for(int i = 0; i < 4; i++) dprintf(DEBUG_SPEW, "%08x ", src[i]);
dprintf(DEBUG_SPEW, "\n");
rAES_S7002_TXT_IN = src[0];
rAES_S7002_TXT_IN = src[1];
rAES_S7002_TXT_IN = src[2];
rAES_S7002_TXT_IN = src[3];
}
void _store_output_block(uint32_t *dst)
{
dst[0] = rAES_S7002_TXT_OUT;
dst[1] = rAES_S7002_TXT_OUT;
dst[2] = rAES_S7002_TXT_OUT;
dst[3] = rAES_S7002_TXT_OUT;
dprintf(DEBUG_SPEW, "dst: ");
for(int i = 0; i < 4; i++) dprintf(DEBUG_SPEW, "%08x ", dst[i]);
dprintf(DEBUG_SPEW, "\n");
}