From patchwork Thu Aug 30 17:15:34 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Krzysztof Kozlowski X-Patchwork-Id: 10582369 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 9233917DB for ; Thu, 30 Aug 2018 17:18:18 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 74BED2C204 for ; Thu, 30 Aug 2018 17:18:18 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 67EF92C22A; Thu, 30 Aug 2018 17:18:18 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id D0D102C204 for ; Thu, 30 Aug 2018 17:18:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:MIME-Version:List-Subscribe:List-Help: List-Post:List-Archive:List-Unsubscribe:List-Id:References:In-Reply-To: Message-Id:Date:Subject:To:From:Reply-To:Cc:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=gt/07H5eAlk7GhWXIOkIBD7M6S6CNGpHnlyruOJTovM=; b=gIFT/8ufw7BM4U 33j6JylAm6sia4nf7Lssm9VPUgb+OE17vcSIdi8BbMKkUmK+Tpgv5xSCsvtB+82PNCr+xmCD1he2S i6k/+S2Wf/59B0r0PUoKWkVqbEZj8Wq/ADFmM9/kufAPGtSKShOYEJf3CVuZkxgPgNr4kks75eTAY vUPbX0m/XhJrXXfTFK44v5FCI2dbj1tc3AxrxsA0fCzSrPVMRfrpbzpzfPskO03Ys9O5zw1x419wU Bo51FGOXp/XPxthv0/MOa1cB1rUPQ7q3X6ZXvYfjh7L8d+3BbgAH0VvZhdYyW0byOZjyHk7/8RPcs +MRfwhdooJEf66T4y4Ww==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQa6-0004PV-Ca; Thu, 30 Aug 2018 17:18:06 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQYV-0003ji-3l for linux-arm-kernel@lists.infradead.org; Thu, 30 Aug 2018 17:16:30 +0000 Received: from localhost.localdomain (xdsl-188-155-58-14.adslplus.ch [188.155.58.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D9FDF20837; Thu, 30 Aug 2018 17:16:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1535649380; bh=wdtKmOXaY4WjtXrllkSL4FAoAX5EMhJB0CJTALyH6gg=; h=From:To:Subject:Date:In-Reply-To:References:From; b=QCrUtyh4G6xhSiTciFgi2GYLviXCeSRyeAU+lMrvHYQ57a2TdgW1R7tYx820Vxmql jFGLXcWIgicnsi+VSZi4uKSMdUaijHEntDFldaGbCIoi48v2yqH3Hclaa65or/4gE+ UXu0RbkD6MmkkRCCX8jtxqqp3CjfaYbg8x012coo= From: Krzysztof Kozlowski To: Krzysztof Kozlowski , Herbert Xu , "David S. Miller" , Rob Herring , Mark Rutland , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Stefan Agner , Fabio Estevam , NXP Linux Team , Michael Turquette , Stephen Boyd , linux-crypto@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-clk@vger.kernel.org Subject: [PATCH 1/6] dt-bindings: crypto: Add Freescale Vybrid CRC Date: Thu, 30 Aug 2018 19:15:34 +0200 Message-Id: <20180830171539.20008-2-krzk@kernel.org> X-Mailer: git-send-email 2.14.1 In-Reply-To: <20180830171539.20008-1-krzk@kernel.org> References: <20180830171539.20008-1-krzk@kernel.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20180830_101627_210172_5291D86B X-CRM114-Status: GOOD ( 13.28 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Virus-Scanned: ClamAV using ClamSMTP Add bindings for Freescale/NXP Vybrid CRC HW accelerator. Signed-off-by: Krzysztof Kozlowski Reviewed-by: Rob Herring --- .../devicetree/bindings/crypto/fsl-vf610-crc.txt | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 Documentation/devicetree/bindings/crypto/fsl-vf610-crc.txt diff --git a/Documentation/devicetree/bindings/crypto/fsl-vf610-crc.txt b/Documentation/devicetree/bindings/crypto/fsl-vf610-crc.txt new file mode 100644 index 000000000000..cdd7e26baeac --- /dev/null +++ b/Documentation/devicetree/bindings/crypto/fsl-vf610-crc.txt @@ -0,0 +1,16 @@ +Freescale/NXP Vybrid VF500/VF610 CRC HW accelerator + +Required properties: +- compatible : Should be "fsl,vf610-crc" +- reg : Should contain register location and length. +- clocks : Should contain the clock driving the CRC block. +- clock-names : Should be set to "crc". + +Example: + +crc@40033000 { + compatible = "fsl,vf610-crc"; + reg = <0x40033000 0x10>; + clocks = <&clks VF610_CLK_CRC>; + clock-names = "crc"; +}; From patchwork Thu Aug 30 17:15:35 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Krzysztof Kozlowski X-Patchwork-Id: 10582351 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id E259B175A for ; Thu, 30 Aug 2018 17:16:50 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id C395D286A8 for ; Thu, 30 Aug 2018 17:16:50 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id B73BF2870D; Thu, 30 Aug 2018 17:16:50 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 31489286A8 for ; Thu, 30 Aug 2018 17:16:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:MIME-Version:List-Subscribe:List-Help: List-Post:List-Archive:List-Unsubscribe:List-Id:References:In-Reply-To: Message-Id:Date:Subject:To:From:Reply-To:Cc:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=7c+KL0sdMVgFvJapi8dujVadnWjc7uvRoTQ8pG/HeUU=; b=XLeQfFnpZq2Wbt 3ZxzEuslamrlVJ6k5EJ/ZKlpJV89+7XcwxSLvBIyfcQLMTFcf+zb3UIzQLWEVwFNuyQjVwnHyHyy6 JFQog4CGV3HhCJUhuU77gq/VdPcxqePg20l8LdRnGCZbSgYzaVBJZHF4jrvh6xZt6uSJkfg0KpXvU xYf2bp0kLCM8CDGN2ML+uQBnzf/fO6/g+eTa5LsQV742z1mE0sf/1rIQO8BVGJ9wx3QCGhwT4+sUo jIwRFP4RQETxkLGUBbzXAssO5dpv/wTVZW1NtFnmo4DD/8QGWWt6hTs7mHChGTblGW4ld3ogs8cLD 2TmxptYqVT2cmiixZh2w==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQYY-0003m6-4m; Thu, 30 Aug 2018 17:16:30 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQYV-0003kP-3o for linux-arm-kernel@lists.infradead.org; Thu, 30 Aug 2018 17:16:28 +0000 Received: from localhost.localdomain (xdsl-188-155-58-14.adslplus.ch [188.155.58.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 67D2F20838; Thu, 30 Aug 2018 17:16:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1535649383; bh=OV1qyjanQYsQN++8ifF4j+w1X66MYRMfhYNwp0RBeQU=; h=From:To:Subject:Date:In-Reply-To:References:From; b=Bdm5Awhtz37Tjs6lu4ERSAegSvkzIiw5K9RqbJ8T/RgfydOe5KtSaR14oWhDHIQO7 39yWMXnTgmE6IhC0PBTfkLdGDev8+LcYRTmLbSVGhjNKei3FDS2kdgT2QqrDqLg8DI esn9scKpaubafXmoKAK7WQEPXO92iobGNerAtTbk= From: Krzysztof Kozlowski To: Krzysztof Kozlowski , Herbert Xu , "David S. Miller" , Rob Herring , Mark Rutland , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Stefan Agner , Fabio Estevam , NXP Linux Team , Michael Turquette , Stephen Boyd , linux-crypto@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-clk@vger.kernel.org Subject: [PATCH 2/6] clk: imx: vf610: Add CRC clock Date: Thu, 30 Aug 2018 19:15:35 +0200 Message-Id: <20180830171539.20008-3-krzk@kernel.org> X-Mailer: git-send-email 2.14.1 In-Reply-To: <20180830171539.20008-1-krzk@kernel.org> References: <20180830171539.20008-1-krzk@kernel.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20180830_101627_175035_74DFBD9D X-CRM114-Status: GOOD ( 13.63 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Virus-Scanned: ClamAV using ClamSMTP Add the clock for CRC block allowing it to be enabled by HW CRC driver. Signed-off-by: Krzysztof Kozlowski Acked-by: Stephen Boyd Reviewed-by: Rob Herring --- drivers/clk/imx/clk-vf610.c | 1 + include/dt-bindings/clock/vf610-clock.h | 3 ++- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/clk/imx/clk-vf610.c b/drivers/clk/imx/clk-vf610.c index 6dae54325a91..78f2602c81ad 100644 --- a/drivers/clk/imx/clk-vf610.c +++ b/drivers/clk/imx/clk-vf610.c @@ -332,6 +332,7 @@ static void __init vf610_clocks_init(struct device_node *ccm_node) clk[VF610_CLK_DSPI2] = imx_clk_gate2("dspi2", "ipg_bus", CCM_CCGR6, CCM_CCGRx_CGn(12)); clk[VF610_CLK_DSPI3] = imx_clk_gate2("dspi3", "ipg_bus", CCM_CCGR6, CCM_CCGRx_CGn(13)); + clk[VF610_CLK_CRC] = imx_clk_gate2("crc", "ipg_bus", CCM_CCGR1, CCM_CCGRx_CGn(3)); clk[VF610_CLK_WDT] = imx_clk_gate2("wdt", "ipg_bus", CCM_CCGR1, CCM_CCGRx_CGn(14)); clk[VF610_CLK_ESDHC0_SEL] = imx_clk_mux("esdhc0_sel", CCM_CSCMR1, 16, 2, esdhc_sels, 4); diff --git a/include/dt-bindings/clock/vf610-clock.h b/include/dt-bindings/clock/vf610-clock.h index 45997750c8a0..03f0731c5a69 100644 --- a/include/dt-bindings/clock/vf610-clock.h +++ b/include/dt-bindings/clock/vf610-clock.h @@ -199,6 +199,7 @@ #define VF610_CLK_WKPU 186 #define VF610_CLK_TCON0 187 #define VF610_CLK_TCON1 188 -#define VF610_CLK_END 189 +#define VF610_CLK_CRC 189 +#define VF610_CLK_END 190 #endif /* __DT_BINDINGS_CLOCK_VF610_H */ From patchwork Thu Aug 30 17:15:36 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Krzysztof Kozlowski X-Patchwork-Id: 10582371 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 84EC5920 for ; Thu, 30 Aug 2018 17:18:57 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 69EA42C240 for ; Thu, 30 Aug 2018 17:18:57 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 5E00D2C263; Thu, 30 Aug 2018 17:18:57 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id E789C2C240 for ; Thu, 30 Aug 2018 17:18:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:MIME-Version:List-Subscribe:List-Help: List-Post:List-Archive:List-Unsubscribe:List-Id:References:In-Reply-To: Message-Id:Date:Subject:To:From:Reply-To:Cc:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=+JMZ4qPKlqqvobZa563mcRO6ev+s5NJSIUQjlJlJWA4=; b=ZSyWMRW4kF00/B VwjTnKcmaMl13keVNyf+5jEvn8cE0BGInlmXBk8Eugsw2yTIOdG+NgARJzFgccWMvC7qg7dWjP/Xb qocfzY+ZaUcs5zNd+Te+TrPJUbjSzWNuruK2ZU3LsDoyuYmflZy0hcPB24ny+/c1f1z6dzKflPVnf bKK1xA6PTF1PaRk+iQLw4KBvpM0SF9s29vVO/RT5LMYw6fKcOr378coUmpqlzRToRlZSsnXCj0sYT UG7cFk2YvlByBzMAAdy3ZeSFyYHiBxsphBY0vh/ZqJ0Gyx4SDFqCYQx+99w8G2X4Ai1FdfMcWo0E4 XQZNAwp666ZauT2VIHKw==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQal-0004ga-Er; Thu, 30 Aug 2018 17:18:47 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQYV-0003l4-BA for linux-arm-kernel@lists.infradead.org; Thu, 30 Aug 2018 17:16:30 +0000 Received: from localhost.localdomain (xdsl-188-155-58-14.adslplus.ch [188.155.58.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E7B7120839; Thu, 30 Aug 2018 17:16:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1535649387; bh=AYT+tlMLbLnMs5G9xn7bAHdPUM2XlEciB1aMR6XRHvU=; h=From:To:Subject:Date:In-Reply-To:References:From; b=vZ6i4p0HL9lrqUOQOonjsRuO5D9LZUbUukflm4A4wejpTEVR0mwz4Ze2J6aTK92Vs ZZY0+j+75+BvZ806oLH+gIp1chZTcsM1qY4qAcY3V6om3WYajlcbdnn3hIxqp511Nc 6KrX4276A1jtobo333/Bktp4ujm+jTw3/1ccTYmM= From: Krzysztof Kozlowski To: Krzysztof Kozlowski , Herbert Xu , "David S. Miller" , Rob Herring , Mark Rutland , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Stefan Agner , Fabio Estevam , NXP Linux Team , Michael Turquette , Stephen Boyd , linux-crypto@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-clk@vger.kernel.org Subject: [PATCH 3/6] ARM: dts: vfxxx: Add node for CRC hardware block Date: Thu, 30 Aug 2018 19:15:36 +0200 Message-Id: <20180830171539.20008-4-krzk@kernel.org> X-Mailer: git-send-email 2.14.1 In-Reply-To: <20180830171539.20008-1-krzk@kernel.org> References: <20180830171539.20008-1-krzk@kernel.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20180830_101627_435760_FC6FD5BE X-CRM114-Status: GOOD ( 12.31 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Virus-Scanned: ClamAV using ClamSMTP Add node for HW CRC16/CRC32 accelerator present on VF500 and VF610 SoCs. Signed-off-by: Krzysztof Kozlowski --- arch/arm/boot/dts/vfxxx.dtsi | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/arch/arm/boot/dts/vfxxx.dtsi b/arch/arm/boot/dts/vfxxx.dtsi index d392794d9c13..d6d0eca02939 100644 --- a/arch/arm/boot/dts/vfxxx.dtsi +++ b/arch/arm/boot/dts/vfxxx.dtsi @@ -276,6 +276,13 @@ status = "disabled"; }; + crc: crc@40033000 { + compatible = "fsl,vf610-crc"; + reg = <0x40033000 0x10>; + clocks = <&clks VF610_CLK_CRC>; + clock-names = "crc"; + }; + pit: pit@40037000 { compatible = "fsl,vf610-pit"; reg = <0x40037000 0x1000>; From patchwork Thu Aug 30 17:15:37 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Krzysztof Kozlowski X-Patchwork-Id: 10582379 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 9FE14920 for ; Thu, 30 Aug 2018 17:21:11 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 7FC8A2C355 for ; Thu, 30 Aug 2018 17:21:11 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 7994E2C295; Thu, 30 Aug 2018 17:21:11 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=unavailable version=3.3.1 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 762612C363 for ; Thu, 30 Aug 2018 17:21:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:MIME-Version:List-Subscribe:List-Help: List-Post:List-Archive:List-Unsubscribe:List-Id:References:In-Reply-To: Message-Id:Date:Subject:To:From:Reply-To:Cc:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=fiBi4UEytPIEaSstu5n3fLJN0IjRcV7iYF5B0CwudQ0=; b=ivn9MONdVH0V8o 9cK0GYIFkaHhGuez3SAELI5WE4X1Hb5TLjD7N8Btj0qVDgSwTWZsJ+8u4kh23GotoMbdhAfWstJ3X ttElDanASVrAC2SheV08WQLbrRG1ED5trr4/BMUKzXKshGf+A+SVAIo4n6ZGvZG9mrYYHez9Luv81 CE3mN1v3T3EgSqF805dj5KG7+sr+6O0J/JneRNOcK1fne+DNJNAEbiMNNYrVYUb1j57+c6nDiNqRW G8/l6aLf6v/47p1+nYCmKQJENJaYoLU2/HnX693kEBZZbwwZ3zmqO/bBrcuf2RKn4aSDrKJ75d1dL 7pYhHnvTo6Ykd2T/imoQ==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQcw-0006mh-IX; Thu, 30 Aug 2018 17:21:02 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQYj-0003mT-8O for linux-arm-kernel@lists.infradead.org; Thu, 30 Aug 2018 17:16:44 +0000 Received: from localhost.localdomain (xdsl-188-155-58-14.adslplus.ch [188.155.58.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7977A2083A; Thu, 30 Aug 2018 17:16:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1535649390; bh=AjE2ugpEgtWXCeZJa6fUq8aClTuX/tl6iiuR0m/royQ=; h=From:To:Subject:Date:In-Reply-To:References:From; b=xM5a0Q0CW8voOIzo4VLE2oJL0+Akef+hleeeA++oQhW/0Z1cJcAMG3A0vxa9IAu6I /GsNt1V6/fyiWc5yhj64d67736PxkTpIA7d4419XTXwdOwoFXcU5RxRPYx1ex2lwb6 CmrdTKpj9qXlDDTc9N3TtkYAm/8+7Sipg9wQTE9o= From: Krzysztof Kozlowski To: Krzysztof Kozlowski , Herbert Xu , "David S. Miller" , Rob Herring , Mark Rutland , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Stefan Agner , Fabio Estevam , NXP Linux Team , Michael Turquette , Stephen Boyd , linux-crypto@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-clk@vger.kernel.org Subject: [PATCH 4/6] crypto: testmgr - Add CRC16 test tables Date: Thu, 30 Aug 2018 19:15:37 +0200 Message-Id: <20180830171539.20008-5-krzk@kernel.org> X-Mailer: git-send-email 2.14.1 In-Reply-To: <20180830171539.20008-1-krzk@kernel.org> References: <20180830171539.20008-1-krzk@kernel.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20180830_101641_459811_89F3405E X-CRM114-Status: GOOD ( 12.61 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Virus-Scanned: ClamAV using ClamSMTP Add test tables for CRC16. Use similar input data as for existing CRC32 test vectors. Signed-off-by: Krzysztof Kozlowski --- crypto/testmgr.c | 6 + crypto/testmgr.h | 386 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 392 insertions(+) diff --git a/crypto/testmgr.c b/crypto/testmgr.c index a1d42245082a..aa04218aa019 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c @@ -2707,6 +2707,12 @@ static const struct alg_test_desc alg_test_descs[] = { }, { .alg = "compress_null", .test = alg_test_null, + }, { + .alg = "crc16", + .test = alg_test_hash, + .suite = { + .hash = __VECS(crc16_tv_template) + } }, { .alg = "crc32", .test = alg_test_hash, diff --git a/crypto/testmgr.h b/crypto/testmgr.h index 173111c70746..88282968eb67 100644 --- a/crypto/testmgr.h +++ b/crypto/testmgr.h @@ -31806,6 +31806,392 @@ static const struct hash_testvec michael_mic_tv_template[] = { } }; +/* + * CRC16 test vectors + */ +static const struct hash_testvec crc16_tv_template[] = { + { + .psize = 0, + .digest = "\x00\x00", + }, + { + .plaintext = "abcdefg", + .psize = 7, + .digest = "\x0c\xf9", + }, + { + .key = "\x87\xa9", + .ksize = 2, + .psize = 0, + .digest = "\x87\xa9", + }, + { + .key = "\xff\xff", + .ksize = 2, + .plaintext = "\x01\x02\x03\x04\x05\x06\x07\x08" + "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" + "\x11\x12\x13\x14\x15\x16\x17\x18" + "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20" + "\x21\x22\x23\x24\x25\x26\x27\x28", + .psize = 40, + .digest = "\xd5\x98", + }, + { + .key = "\xff\xff", + .ksize = 2, + .plaintext = "\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30" + "\x31\x32\x33\x34\x35\x36\x37\x38" + "\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40" + "\x41\x42\x43\x44\x45\x46\x47\x48" + "\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50", + .psize = 40, + .digest = "\x3b\x46", + }, + { + .key = "\xff\xff", + .ksize = 2, + .plaintext = "\x51\x52\x53\x54\x55\x56\x57\x58" + "\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60" + "\x61\x62\x63\x64\x65\x66\x67\x68" + "\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70" + "\x71\x72\x73\x74\x75\x76\x77\x78", + .psize = 40, + .digest = "\x7e\x3c", + }, + { + .key = "\xff\xff", + .ksize = 2, + .plaintext = "\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80" + "\x81\x82\x83\x84\x85\x86\x87\x88" + "\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90" + "\x91\x92\x93\x94\x95\x96\x97\x98" + "\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0", + .psize = 40, + .digest = "\x96\xf0", + }, + { + .key = "\xff\xff", + .ksize = 2, + .plaintext = "\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8" + "\xa9\xaa\xab\xac\xad\xae\xaf\xb0" + "\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8" + "\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0" + "\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8", + .psize = 40, + .digest = "\x5c\x73", + }, + { + .key = "\xff\xff", + .ksize = 2, + .plaintext = "\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0" + "\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8" + "\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0" + "\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8" + "\xe9\xea\xeb\xec\xed\xee\xef\xf0", + .psize = 40, + .digest = "\x7e\xf7", + }, + { + .key = "\xff\xff", + .ksize = 2, + .plaintext = "\x01\x02\x03\x04\x05\x06\x07\x08" + "\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10" + "\x11\x12\x13\x14\x15\x16\x17\x18" + "\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20" + "\x21\x22\x23\x24\x25\x26\x27\x28" + "\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30" + "\x31\x32\x33\x34\x35\x36\x37\x38" + "\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40" + "\x41\x42\x43\x44\x45\x46\x47\x48" + "\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50" + "\x51\x52\x53\x54\x55\x56\x57\x58" + "\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60" + "\x61\x62\x63\x64\x65\x66\x67\x68" + "\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70" + "\x71\x72\x73\x74\x75\x76\x77\x78" + "\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80" + "\x81\x82\x83\x84\x85\x86\x87\x88" + "\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90" + "\x91\x92\x93\x94\x95\x96\x97\x98" + "\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0" + "\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8" + "\xa9\xaa\xab\xac\xad\xae\xaf\xb0" + "\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8" + "\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0" + "\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8" + "\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0" + "\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8" + "\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0" + "\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8" + "\xe9\xea\xeb\xec\xed\xee\xef\xf0", + .psize = 240, + .digest = "\x07\xab", + .np = 2, + .tap = { 31, 209 } + }, { + .key = "\xff\xff", + .ksize = 2, + .plaintext = "\x6e\x05\x79\x10\xa7\x1b\xb2\x49" + "\xe0\x54\xeb\x82\x19\x8d\x24\xbb" + "\x2f\xc6\x5d\xf4\x68\xff\x96\x0a" + "\xa1\x38\xcf\x43\xda\x71\x08\x7c" + "\x13\xaa\x1e\xb5\x4c\xe3\x57\xee" + "\x85\x1c\x90\x27\xbe\x32\xc9\x60" + "\xf7\x6b\x02\x99\x0d\xa4\x3b\xd2" + "\x46\xdd\x74\x0b\x7f\x16\xad\x21" + "\xb8\x4f\xe6\x5a\xf1\x88\x1f\x93" + "\x2a\xc1\x35\xcc\x63\xfa\x6e\x05" + "\x9c\x10\xa7\x3e\xd5\x49\xe0\x77" + "\x0e\x82\x19\xb0\x24\xbb\x52\xe9" + "\x5d\xf4\x8b\x22\x96\x2d\xc4\x38" + "\xcf\x66\xfd\x71\x08\x9f\x13\xaa" + "\x41\xd8\x4c\xe3\x7a\x11\x85\x1c" + "\xb3\x27\xbe\x55\xec\x60\xf7\x8e" + "\x02\x99\x30\xc7\x3b\xd2\x69\x00" + "\x74\x0b\xa2\x16\xad\x44\xdb\x4f" + "\xe6\x7d\x14\x88\x1f\xb6\x2a\xc1" + "\x58\xef\x63\xfa\x91\x05\x9c\x33" + "\xca\x3e\xd5\x6c\x03\x77\x0e\xa5" + "\x19\xb0\x47\xde\x52\xe9\x80\x17" + "\x8b\x22\xb9\x2d\xc4\x5b\xf2\x66" + "\xfd\x94\x08\x9f\x36\xcd\x41\xd8" + "\x6f\x06\x7a\x11\xa8\x1c\xb3\x4a" + "\xe1\x55\xec\x83\x1a\x8e\x25\xbc" + "\x30\xc7\x5e\xf5\x69\x00\x97\x0b" + "\xa2\x39\xd0\x44\xdb\x72\x09\x7d" + "\x14\xab\x1f\xb6\x4d\xe4\x58\xef" + "\x86\x1d\x91\x28\xbf\x33\xca\x61" + "\xf8\x6c\x03\x9a\x0e\xa5\x3c\xd3" + "\x47\xde\x75\x0c\x80\x17\xae\x22" + "\xb9\x50\xe7\x5b\xf2\x89\x20\x94" + "\x2b\xc2\x36\xcd\x64\xfb\x6f\x06" + "\x9d\x11\xa8\x3f\xd6\x4a\xe1\x78" + "\x0f\x83\x1a\xb1\x25\xbc\x53\xea" + "\x5e\xf5\x8c\x00\x97\x2e\xc5\x39" + "\xd0\x67\xfe\x72\x09\xa0\x14\xab" + "\x42\xd9\x4d\xe4\x7b\x12\x86\x1d" + "\xb4\x28\xbf\x56\xed\x61\xf8\x8f" + "\x03\x9a\x31\xc8\x3c\xd3\x6a\x01" + "\x75\x0c\xa3\x17\xae\x45\xdc\x50" + "\xe7\x7e\x15\x89\x20\xb7\x2b\xc2" + "\x59\xf0\x64\xfb\x92\x06\x9d\x34" + "\xcb\x3f\xd6\x6d\x04\x78\x0f\xa6" + "\x1a\xb1\x48\xdf\x53\xea\x81\x18" + "\x8c\x23\xba\x2e\xc5\x5c\xf3\x67" + "\xfe\x95\x09\xa0\x37\xce\x42\xd9" + "\x70\x07\x7b\x12\xa9\x1d\xb4\x4b" + "\xe2\x56\xed\x84\x1b\x8f\x26\xbd" + "\x31\xc8\x5f\xf6\x6a\x01\x98\x0c" + "\xa3\x3a\xd1\x45\xdc\x73\x0a\x7e" + "\x15\xac\x20\xb7\x4e\xe5\x59\xf0" + "\x87\x1e\x92\x29\xc0\x34\xcb\x62" + "\xf9\x6d\x04\x9b\x0f\xa6\x3d\xd4" + "\x48\xdf\x76\x0d\x81\x18\xaf\x23" + "\xba\x51\xe8\x5c\xf3\x8a\x21\x95" + "\x2c\xc3\x37\xce\x65\xfc\x70\x07" + "\x9e\x12\xa9\x40\xd7\x4b\xe2\x79" + "\x10\x84\x1b\xb2\x26\xbd\x54\xeb" + "\x5f\xf6\x8d\x01\x98\x2f\xc6\x3a" + "\xd1\x68\xff\x73\x0a\xa1\x15\xac" + "\x43\xda\x4e\xe5\x7c\x13\x87\x1e" + "\xb5\x29\xc0\x57\xee\x62\xf9\x90" + "\x04\x9b\x32\xc9\x3d\xd4\x6b\x02" + "\x76\x0d\xa4\x18\xaf\x46\xdd\x51" + "\xe8\x7f\x16\x8a\x21\xb8\x2c\xc3" + "\x5a\xf1\x65\xfc\x93\x07\x9e\x35" + "\xcc\x40\xd7\x6e\x05\x79\x10\xa7" + "\x1b\xb2\x49\xe0\x54\xeb\x82\x19" + "\x8d\x24\xbb\x2f\xc6\x5d\xf4\x68" + "\xff\x96\x0a\xa1\x38\xcf\x43\xda" + "\x71\x08\x7c\x13\xaa\x1e\xb5\x4c" + "\xe3\x57\xee\x85\x1c\x90\x27\xbe" + "\x32\xc9\x60\xf7\x6b\x02\x99\x0d" + "\xa4\x3b\xd2\x46\xdd\x74\x0b\x7f" + "\x16\xad\x21\xb8\x4f\xe6\x5a\xf1" + "\x88\x1f\x93\x2a\xc1\x35\xcc\x63" + "\xfa\x6e\x05\x9c\x10\xa7\x3e\xd5" + "\x49\xe0\x77\x0e\x82\x19\xb0\x24" + "\xbb\x52\xe9\x5d\xf4\x8b\x22\x96" + "\x2d\xc4\x38\xcf\x66\xfd\x71\x08" + "\x9f\x13\xaa\x41\xd8\x4c\xe3\x7a" + "\x11\x85\x1c\xb3\x27\xbe\x55\xec" + "\x60\xf7\x8e\x02\x99\x30\xc7\x3b" + "\xd2\x69\x00\x74\x0b\xa2\x16\xad" + "\x44\xdb\x4f\xe6\x7d\x14\x88\x1f" + "\xb6\x2a\xc1\x58\xef\x63\xfa\x91" + "\x05\x9c\x33\xca\x3e\xd5\x6c\x03" + "\x77\x0e\xa5\x19\xb0\x47\xde\x52" + "\xe9\x80\x17\x8b\x22\xb9\x2d\xc4" + "\x5b\xf2\x66\xfd\x94\x08\x9f\x36" + "\xcd\x41\xd8\x6f\x06\x7a\x11\xa8" + "\x1c\xb3\x4a\xe1\x55\xec\x83\x1a" + "\x8e\x25\xbc\x30\xc7\x5e\xf5\x69" + "\x00\x97\x0b\xa2\x39\xd0\x44\xdb" + "\x72\x09\x7d\x14\xab\x1f\xb6\x4d" + "\xe4\x58\xef\x86\x1d\x91\x28\xbf" + "\x33\xca\x61\xf8\x6c\x03\x9a\x0e" + "\xa5\x3c\xd3\x47\xde\x75\x0c\x80" + "\x17\xae\x22\xb9\x50\xe7\x5b\xf2" + "\x89\x20\x94\x2b\xc2\x36\xcd\x64" + "\xfb\x6f\x06\x9d\x11\xa8\x3f\xd6" + "\x4a\xe1\x78\x0f\x83\x1a\xb1\x25" + "\xbc\x53\xea\x5e\xf5\x8c\x00\x97" + "\x2e\xc5\x39\xd0\x67\xfe\x72\x09" + "\xa0\x14\xab\x42\xd9\x4d\xe4\x7b" + "\x12\x86\x1d\xb4\x28\xbf\x56\xed" + "\x61\xf8\x8f\x03\x9a\x31\xc8\x3c" + "\xd3\x6a\x01\x75\x0c\xa3\x17\xae" + "\x45\xdc\x50\xe7\x7e\x15\x89\x20" + "\xb7\x2b\xc2\x59\xf0\x64\xfb\x92" + "\x06\x9d\x34\xcb\x3f\xd6\x6d\x04" + "\x78\x0f\xa6\x1a\xb1\x48\xdf\x53" + "\xea\x81\x18\x8c\x23\xba\x2e\xc5" + "\x5c\xf3\x67\xfe\x95\x09\xa0\x37" + "\xce\x42\xd9\x70\x07\x7b\x12\xa9" + "\x1d\xb4\x4b\xe2\x56\xed\x84\x1b" + "\x8f\x26\xbd\x31\xc8\x5f\xf6\x6a" + "\x01\x98\x0c\xa3\x3a\xd1\x45\xdc" + "\x73\x0a\x7e\x15\xac\x20\xb7\x4e" + "\xe5\x59\xf0\x87\x1e\x92\x29\xc0" + "\x34\xcb\x62\xf9\x6d\x04\x9b\x0f" + "\xa6\x3d\xd4\x48\xdf\x76\x0d\x81" + "\x18\xaf\x23\xba\x51\xe8\x5c\xf3" + "\x8a\x21\x95\x2c\xc3\x37\xce\x65" + "\xfc\x70\x07\x9e\x12\xa9\x40\xd7" + "\x4b\xe2\x79\x10\x84\x1b\xb2\x26" + "\xbd\x54\xeb\x5f\xf6\x8d\x01\x98" + "\x2f\xc6\x3a\xd1\x68\xff\x73\x0a" + "\xa1\x15\xac\x43\xda\x4e\xe5\x7c" + "\x13\x87\x1e\xb5\x29\xc0\x57\xee" + "\x62\xf9\x90\x04\x9b\x32\xc9\x3d" + "\xd4\x6b\x02\x76\x0d\xa4\x18\xaf" + "\x46\xdd\x51\xe8\x7f\x16\x8a\x21" + "\xb8\x2c\xc3\x5a\xf1\x65\xfc\x93" + "\x07\x9e\x35\xcc\x40\xd7\x6e\x05" + "\x79\x10\xa7\x1b\xb2\x49\xe0\x54" + "\xeb\x82\x19\x8d\x24\xbb\x2f\xc6" + "\x5d\xf4\x68\xff\x96\x0a\xa1\x38" + "\xcf\x43\xda\x71\x08\x7c\x13\xaa" + "\x1e\xb5\x4c\xe3\x57\xee\x85\x1c" + "\x90\x27\xbe\x32\xc9\x60\xf7\x6b" + "\x02\x99\x0d\xa4\x3b\xd2\x46\xdd" + "\x74\x0b\x7f\x16\xad\x21\xb8\x4f" + "\xe6\x5a\xf1\x88\x1f\x93\x2a\xc1" + "\x35\xcc\x63\xfa\x6e\x05\x9c\x10" + "\xa7\x3e\xd5\x49\xe0\x77\x0e\x82" + "\x19\xb0\x24\xbb\x52\xe9\x5d\xf4" + "\x8b\x22\x96\x2d\xc4\x38\xcf\x66" + "\xfd\x71\x08\x9f\x13\xaa\x41\xd8" + "\x4c\xe3\x7a\x11\x85\x1c\xb3\x27" + "\xbe\x55\xec\x60\xf7\x8e\x02\x99" + "\x30\xc7\x3b\xd2\x69\x00\x74\x0b" + "\xa2\x16\xad\x44\xdb\x4f\xe6\x7d" + "\x14\x88\x1f\xb6\x2a\xc1\x58\xef" + "\x63\xfa\x91\x05\x9c\x33\xca\x3e" + "\xd5\x6c\x03\x77\x0e\xa5\x19\xb0" + "\x47\xde\x52\xe9\x80\x17\x8b\x22" + "\xb9\x2d\xc4\x5b\xf2\x66\xfd\x94" + "\x08\x9f\x36\xcd\x41\xd8\x6f\x06" + "\x7a\x11\xa8\x1c\xb3\x4a\xe1\x55" + "\xec\x83\x1a\x8e\x25\xbc\x30\xc7" + "\x5e\xf5\x69\x00\x97\x0b\xa2\x39" + "\xd0\x44\xdb\x72\x09\x7d\x14\xab" + "\x1f\xb6\x4d\xe4\x58\xef\x86\x1d" + "\x91\x28\xbf\x33\xca\x61\xf8\x6c" + "\x03\x9a\x0e\xa5\x3c\xd3\x47\xde" + "\x75\x0c\x80\x17\xae\x22\xb9\x50" + "\xe7\x5b\xf2\x89\x20\x94\x2b\xc2" + "\x36\xcd\x64\xfb\x6f\x06\x9d\x11" + "\xa8\x3f\xd6\x4a\xe1\x78\x0f\x83" + "\x1a\xb1\x25\xbc\x53\xea\x5e\xf5" + "\x8c\x00\x97\x2e\xc5\x39\xd0\x67" + "\xfe\x72\x09\xa0\x14\xab\x42\xd9" + "\x4d\xe4\x7b\x12\x86\x1d\xb4\x28" + "\xbf\x56\xed\x61\xf8\x8f\x03\x9a" + "\x31\xc8\x3c\xd3\x6a\x01\x75\x0c" + "\xa3\x17\xae\x45\xdc\x50\xe7\x7e" + "\x15\x89\x20\xb7\x2b\xc2\x59\xf0" + "\x64\xfb\x92\x06\x9d\x34\xcb\x3f" + "\xd6\x6d\x04\x78\x0f\xa6\x1a\xb1" + "\x48\xdf\x53\xea\x81\x18\x8c\x23" + "\xba\x2e\xc5\x5c\xf3\x67\xfe\x95" + "\x09\xa0\x37\xce\x42\xd9\x70\x07" + "\x7b\x12\xa9\x1d\xb4\x4b\xe2\x56" + "\xed\x84\x1b\x8f\x26\xbd\x31\xc8" + "\x5f\xf6\x6a\x01\x98\x0c\xa3\x3a" + "\xd1\x45\xdc\x73\x0a\x7e\x15\xac" + "\x20\xb7\x4e\xe5\x59\xf0\x87\x1e" + "\x92\x29\xc0\x34\xcb\x62\xf9\x6d" + "\x04\x9b\x0f\xa6\x3d\xd4\x48\xdf" + "\x76\x0d\x81\x18\xaf\x23\xba\x51" + "\xe8\x5c\xf3\x8a\x21\x95\x2c\xc3" + "\x37\xce\x65\xfc\x70\x07\x9e\x12" + "\xa9\x40\xd7\x4b\xe2\x79\x10\x84" + "\x1b\xb2\x26\xbd\x54\xeb\x5f\xf6" + "\x8d\x01\x98\x2f\xc6\x3a\xd1\x68" + "\xff\x73\x0a\xa1\x15\xac\x43\xda" + "\x4e\xe5\x7c\x13\x87\x1e\xb5\x29" + "\xc0\x57\xee\x62\xf9\x90\x04\x9b" + "\x32\xc9\x3d\xd4\x6b\x02\x76\x0d" + "\xa4\x18\xaf\x46\xdd\x51\xe8\x7f" + "\x16\x8a\x21\xb8\x2c\xc3\x5a\xf1" + "\x65\xfc\x93\x07\x9e\x35\xcc\x40" + "\xd7\x6e\x05\x79\x10\xa7\x1b\xb2" + "\x49\xe0\x54\xeb\x82\x19\x8d\x24" + "\xbb\x2f\xc6\x5d\xf4\x68\xff\x96" + "\x0a\xa1\x38\xcf\x43\xda\x71\x08" + "\x7c\x13\xaa\x1e\xb5\x4c\xe3\x57" + "\xee\x85\x1c\x90\x27\xbe\x32\xc9" + "\x60\xf7\x6b\x02\x99\x0d\xa4\x3b" + "\xd2\x46\xdd\x74\x0b\x7f\x16\xad" + "\x21\xb8\x4f\xe6\x5a\xf1\x88\x1f" + "\x93\x2a\xc1\x35\xcc\x63\xfa\x6e" + "\x05\x9c\x10\xa7\x3e\xd5\x49\xe0" + "\x77\x0e\x82\x19\xb0\x24\xbb\x52" + "\xe9\x5d\xf4\x8b\x22\x96\x2d\xc4" + "\x38\xcf\x66\xfd\x71\x08\x9f\x13" + "\xaa\x41\xd8\x4c\xe3\x7a\x11\x85" + "\x1c\xb3\x27\xbe\x55\xec\x60\xf7" + "\x8e\x02\x99\x30\xc7\x3b\xd2\x69" + "\x00\x74\x0b\xa2\x16\xad\x44\xdb" + "\x4f\xe6\x7d\x14\x88\x1f\xb6\x2a" + "\xc1\x58\xef\x63\xfa\x91\x05\x9c" + "\x33\xca\x3e\xd5\x6c\x03\x77\x0e" + "\xa5\x19\xb0\x47\xde\x52\xe9\x80" + "\x17\x8b\x22\xb9\x2d\xc4\x5b\xf2" + "\x66\xfd\x94\x08\x9f\x36\xcd\x41" + "\xd8\x6f\x06\x7a\x11\xa8\x1c\xb3" + "\x4a\xe1\x55\xec\x83\x1a\x8e\x25" + "\xbc\x30\xc7\x5e\xf5\x69\x00\x97" + "\x0b\xa2\x39\xd0\x44\xdb\x72\x09" + "\x7d\x14\xab\x1f\xb6\x4d\xe4\x58" + "\xef\x86\x1d\x91\x28\xbf\x33\xca" + "\x61\xf8\x6c\x03\x9a\x0e\xa5\x3c" + "\xd3\x47\xde\x75\x0c\x80\x17\xae" + "\x22\xb9\x50\xe7\x5b\xf2\x89\x20" + "\x94\x2b\xc2\x36\xcd\x64\xfb\x6f" + "\x06\x9d\x11\xa8\x3f\xd6\x4a\xe1" + "\x78\x0f\x83\x1a\xb1\x25\xbc\x53" + "\xea\x5e\xf5\x8c\x00\x97\x2e\xc5" + "\x39\xd0\x67\xfe\x72\x09\xa0\x14" + "\xab\x42\xd9\x4d\xe4\x7b\x12\x86" + "\x1d\xb4\x28\xbf\x56\xed\x61\xf8" + "\x8f\x03\x9a\x31\xc8\x3c\xd3\x6a" + "\x01\x75\x0c\xa3\x17\xae\x45\xdc" + "\x50\xe7\x7e\x15\x89\x20\xb7\x2b" + "\xc2\x59\xf0\x64\xfb\x92\x06\x9d" + "\x34\xcb\x3f\xd6\x6d\x04\x78\x0f" + "\xa6\x1a\xb1\x48\xdf\x53\xea\x81" + "\x18\x8c\x23\xba\x2e\xc5\x5c\xf3" + "\x67\xfe\x95\x09\xa0\x37\xce\x42" + "\xd9\x70\x07\x7b\x12\xa9\x1d\xb4" + "\x4b\xe2\x56\xed\x84\x1b\x8f\x26" + "\xbd\x31\xc8\x5f\xf6\x6a\x01\x98", + .psize = 2048, + .digest = "\xf7\xe3", + } +}; + /* * CRC32 test vectors */ From patchwork Thu Aug 30 17:15:38 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Krzysztof Kozlowski X-Patchwork-Id: 10582373 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 709F017DE for ; Thu, 30 Aug 2018 17:19:43 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 565072C27F for ; Thu, 30 Aug 2018 17:19:43 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 449512C2A8; Thu, 30 Aug 2018 17:19:43 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 14A732C27F for ; Thu, 30 Aug 2018 17:19:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:MIME-Version:List-Subscribe:List-Help: List-Post:List-Archive:List-Unsubscribe:List-Id:References:In-Reply-To: Message-Id:Date:Subject:To:From:Reply-To:Cc:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=l6gbHmu/6K7id1rl4Vv4Y1hFz208R/j5KTMvhWSzsvE=; b=D1Lqb7RmOfmJp5 U4MyNo3+qjORDMFufZ7nyIGvvJte2NKiIxZvFi/ilYp1EydO0s4zy/w8MomPGTMhAQ2+BLjc4/lyJ fWbGr6T7mWSixN0umz8RFvHrfmbGD1Ci4bf51xtLS92wzJ1pl89Q4yO8fDaIFisP6fBUmHVI5KpgX 4kn9ZNgsCFAw78QMymQAQ0sPX7wfM9vaYDo39nLUq2LezE21HTRANLFoTImJLK0a0b4FjEvGuK8aV Sv5ekM3MjZUjAuWERjiEIhS5Fkbw4tc99zbIciBgTCSUUQkcz1HsOLYNSogeKuhzBHbv4hGdFhly1 mRJRiZOWzHRXiJkQ1duw==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQbS-0004z6-LL; Thu, 30 Aug 2018 17:19:30 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQYj-0003o7-8N for linux-arm-kernel@lists.infradead.org; Thu, 30 Aug 2018 17:16:43 +0000 Received: from localhost.localdomain (xdsl-188-155-58-14.adslplus.ch [188.155.58.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 381DD20658; Thu, 30 Aug 2018 17:16:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1535649394; bh=PNN87A65UfxHviIwzInsOFxL5QQ0ihIMedvB7HJZ5fw=; h=From:To:Subject:Date:In-Reply-To:References:From; b=eyQq/Rh6W5MppnhkymAOBwNQu7ZVxf7wLMdADdOstzN1F4ZlHUhFC5xTioaTmayov jA+Bv9L2dxlj5Fgp+Z78hQWyZKOTyxdVO4M7a0c10kPZcHLdHZodZCzjyReGirtSTL yOU8msJai0kFzScLQXKZgZvnOZPCI5NKFjrOpoos= From: Krzysztof Kozlowski To: Krzysztof Kozlowski , Herbert Xu , "David S. Miller" , Rob Herring , Mark Rutland , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Stefan Agner , Fabio Estevam , NXP Linux Team , Michael Turquette , Stephen Boyd , linux-crypto@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-clk@vger.kernel.org Subject: [PATCH 5/6] crypto - Group Freescale/NXP ARM architecture Kconfig entires together Date: Thu, 30 Aug 2018 19:15:38 +0200 Message-Id: <20180830171539.20008-6-krzk@kernel.org> X-Mailer: git-send-email 2.14.1 In-Reply-To: <20180830171539.20008-1-krzk@kernel.org> References: <20180830171539.20008-1-krzk@kernel.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20180830_101641_428860_B5B7965A X-CRM114-Status: GOOD ( 12.77 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Virus-Scanned: ClamAV using ClamSMTP Group Freescale/NXP Kconfig entires for ARM architecture CPUs/SoCs together to make it more consistent and easy to read. Signed-off-by: Krzysztof Kozlowski --- drivers/crypto/Kconfig | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig index a8c4ce07fc9d..20314d7a7b58 100644 --- a/drivers/crypto/Kconfig +++ b/drivers/crypto/Kconfig @@ -402,6 +402,22 @@ config CRYPTO_DEV_MXC_SCC This option enables support for the Security Controller (SCC) found in Freescale i.MX25 chips. +config CRYPTO_DEV_MXS_DCP + tristate "Support for Freescale MXS DCP" + depends on (ARCH_MXS || ARCH_MXC) + select STMP_DEVICE + select CRYPTO_CBC + select CRYPTO_ECB + select CRYPTO_AES + select CRYPTO_BLKCIPHER + select CRYPTO_HASH + help + The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB + co-processor on the die. + + To compile this driver as a module, choose M here: the module + will be called mxs-dcp. + config CRYPTO_DEV_EXYNOS_RNG tristate "EXYNOS HW pseudo random number generator support" depends on ARCH_EXYNOS || COMPILE_TEST @@ -542,22 +558,6 @@ if CRYPTO_DEV_CCP source "drivers/crypto/ccp/Kconfig" endif -config CRYPTO_DEV_MXS_DCP - tristate "Support for Freescale MXS DCP" - depends on (ARCH_MXS || ARCH_MXC) - select STMP_DEVICE - select CRYPTO_CBC - select CRYPTO_ECB - select CRYPTO_AES - select CRYPTO_BLKCIPHER - select CRYPTO_HASH - help - The Freescale i.MX23/i.MX28 has SHA1/SHA256 and AES128 CBC/ECB - co-processor on the die. - - To compile this driver as a module, choose M here: the module - will be called mxs-dcp. - source "drivers/crypto/qat/Kconfig" source "drivers/crypto/cavium/cpt/Kconfig" source "drivers/crypto/cavium/nitrox/Kconfig" From patchwork Thu Aug 30 17:15:39 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Krzysztof Kozlowski X-Patchwork-Id: 10582375 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 3EE43920 for ; Thu, 30 Aug 2018 17:20:26 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 205202C2A9 for ; Thu, 30 Aug 2018 17:20:26 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 1DEE82C2EB; Thu, 30 Aug 2018 17:20:26 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=unavailable version=3.3.1 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id E522A2C2A9 for ; Thu, 30 Aug 2018 17:20:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:MIME-Version:List-Subscribe:List-Help: List-Post:List-Archive:List-Unsubscribe:List-Id:References:In-Reply-To: Message-Id:Date:Subject:To:From:Reply-To:Cc:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=QdM+RLlDMtAsbky+M/PakAa4nyN66R/VYco5e9gVZVM=; b=TgbQ9ti/5f3cuv rFveGvHLO7QSkRSUOnuUWj7sQPsvrqmcE9hJzVp9C525hAyn/YMWelitgvDIywNL4382r/K+26/TV 6s9KL+zG3IpjUGzI5F0EqWJhIiV3oZLCLvbUJiTk1tGUluRDDKq/SVc7+mx551Yz3+VMVAPr7yBk+ Cu6qbA8M7hHD4UCJueIbeFmtrGv6wYpdZI8Pfx40YyrU6jBcGHlDuy0DNBPo4ePiKt94yMvSCWQur ZuCLigaE9D9OHyDlvU3f1Fs5d9dbg/4BCc869zwPEtqZaiELsz+LocAHGv8Q3AljdsUgP5CsLwbgi fmFcK8XBv1vJf14lvn3w==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQcC-0005aN-Ow; Thu, 30 Aug 2018 17:20:17 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.90_1 #2 (Red Hat Linux)) id 1fvQYj-0003pQ-9S for linux-arm-kernel@lists.infradead.org; Thu, 30 Aug 2018 17:16:45 +0000 Received: from localhost.localdomain (xdsl-188-155-58-14.adslplus.ch [188.155.58.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C89FE20837; Thu, 30 Aug 2018 17:16:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1535649398; bh=0kQh9su+l+W4PmE8UbW4r3rSH609tuwPuGzb0usQpEE=; h=From:To:Subject:Date:In-Reply-To:References:From; b=QAAXPNeGieh0IMsBkJCqTypTrZ2TWzUf6iXrNlTr0II9FoaBvXyWPcZJGW1b1WKDZ XqGvng3Lj9SKK5eSHxmvZpEGaaWojpSQfFr6nJhJcHHbgkioQPIcV/dkc9Qq5GO+uk UtQ/ItVbaUeZkDRPywzXcE+A6nIMo5Gdx39DS57o= From: Krzysztof Kozlowski To: Krzysztof Kozlowski , Herbert Xu , "David S. Miller" , Rob Herring , Mark Rutland , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Stefan Agner , Fabio Estevam , NXP Linux Team , Michael Turquette , Stephen Boyd , linux-crypto@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-clk@vger.kernel.org Subject: [PATCH 6/6] crypto: vf-crc - Add new driver for Freescale Vybrid CRC Date: Thu, 30 Aug 2018 19:15:39 +0200 Message-Id: <20180830171539.20008-7-krzk@kernel.org> X-Mailer: git-send-email 2.14.1 In-Reply-To: <20180830171539.20008-1-krzk@kernel.org> References: <20180830171539.20008-1-krzk@kernel.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20180830_101641_477729_ABC58F4C X-CRM114-Status: GOOD ( 23.68 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Virus-Scanned: ClamAV using ClamSMTP Add driver for using the Freescale/NXP Vybrid processor CRC block for CRC16 and CRC32 offloading. The driver implements shash_alg and was tested using internal testmgr tests and libkcapi. Signed-off-by: Krzysztof Kozlowski --- MAINTAINERS | 7 + drivers/crypto/Kconfig | 10 ++ drivers/crypto/Makefile | 1 + drivers/crypto/vf-crc.c | 387 ++++++++++++++++++++++++++++++++++++++++++++++ include/linux/crc32poly.h | 7 + 5 files changed, 412 insertions(+) create mode 100644 drivers/crypto/vf-crc.c diff --git a/MAINTAINERS b/MAINTAINERS index 0a340f680230..e84fa829a4e4 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -15388,6 +15388,13 @@ S: Maintained F: Documentation/fb/uvesafb.txt F: drivers/video/fbdev/uvesafb.* +VF500/VF610 HW CRC DRIVER +M: Krzysztof Kozlowski +L: linux-crypto@vger.kernel.org +S: Maintained +F: drivers/crypto/vf-crc.c +F: Documentation/devicetree/bindings/crypto/fsl-vf610-crc.txt + VF610 NAND DRIVER M: Stefan Agner L: linux-mtd@lists.infradead.org diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig index 20314d7a7b58..0ade940ac79c 100644 --- a/drivers/crypto/Kconfig +++ b/drivers/crypto/Kconfig @@ -418,6 +418,16 @@ config CRYPTO_DEV_MXS_DCP To compile this driver as a module, choose M here: the module will be called mxs-dcp. +config CRYPTO_DEV_VF_CRC + tristate "Support for Freescale/NXP Vybrid CRC HW accelerator" + select CRYPTO_HASH + help + This option enables support for the CRC16/32 hardware accelerator + on Freescale/NXP Vybrid VF500/VF610 SoCs. + + To compile this driver as a module, choose M here: the module + will be called vf-crc. + config CRYPTO_DEV_EXYNOS_RNG tristate "EXYNOS HW pseudo random number generator support" depends on ARCH_EXYNOS || COMPILE_TEST diff --git a/drivers/crypto/Makefile b/drivers/crypto/Makefile index c23396f32c8a..418c08bdc19c 100644 --- a/drivers/crypto/Makefile +++ b/drivers/crypto/Makefile @@ -41,6 +41,7 @@ obj-$(CONFIG_ARCH_STM32) += stm32/ obj-$(CONFIG_CRYPTO_DEV_SUN4I_SS) += sunxi-ss/ obj-$(CONFIG_CRYPTO_DEV_TALITOS) += talitos.o obj-$(CONFIG_CRYPTO_DEV_UX500) += ux500/ +obj-$(CONFIG_CRYPTO_DEV_VF_CRC) += vf-crc.o obj-$(CONFIG_CRYPTO_DEV_VIRTIO) += virtio/ obj-$(CONFIG_CRYPTO_DEV_VMX) += vmx/ obj-$(CONFIG_CRYPTO_DEV_BCM_SPU) += bcm/ diff --git a/drivers/crypto/vf-crc.c b/drivers/crypto/vf-crc.c new file mode 100644 index 000000000000..2223b2e0f014 --- /dev/null +++ b/drivers/crypto/vf-crc.c @@ -0,0 +1,387 @@ +// SPDX-License-Identifier: GPL-2.0 +// +// Freescale/NXP VF500/VF610 hardware CRC driver +// +// Copyright (c) 2018 Krzysztof Kozlowski + +#include +#include +#include +#include +#include +#include +#include + +#include + +#include + +#define DRIVER_NAME "vf-crc" +#define CHKSUM_DIGEST_SIZE 4 +#define CHKSUM_BLOCK_SIZE 1 + +/* Register offsets */ +#define CRC_DATA 0x00 +#define CRC_POLY 0x04 +#define CRC_CTRL 0x08 + +/* CTRL bit fields */ +/* Width of CRC (0 - 16 bit, 1 - 32 bit) */ +#define CRC_CTRL_TCRC BIT(24) +/* Write CRC Data register as Seed (0 - data, 1 - seed) */ +#define CRC_CTRL_WAS BIT(25) +/* Final XOR on checksum */ +#define CRC_CTRL_FXOR BIT(26) + +#define CRC_INIT_DEFAULT 0x0 + +struct vf_crc { + struct clk *clk; + struct device *dev; + void __iomem *iobase; + + /* + * Request currently processed in HW so consecutive update() and final() + * will not need to reinit the HW. + */ + struct vf_crc_desc_ctx *processed_desc; + + /* Lock protecting access to HW registers and processed_desc. */ + struct mutex lock; +}; + +struct vf_crc_desc_ctx { + struct vf_crc *crc; + /* + * Current state of computed CRC (used for re-init on subsequent + * requests). + */ + u32 state; +}; + +struct vf_crc_tfm_ctx { + unsigned int align; + u32 ctrl_init; + bool is_16_bit; + u32 key; + u32 poly; +}; + +static struct vf_crc *vf_crc_data; + +static int vf_crc_cra_init32(struct crypto_tfm *tfm) +{ + struct vf_crc_tfm_ctx *mctx = crypto_tfm_ctx(tfm); + + mctx->align = sizeof(u32); + /* 32 bit, no XOR */ + mctx->ctrl_init = CRC_CTRL_TCRC; + mctx->is_16_bit = false; + mctx->key = CRC_INIT_DEFAULT; + mctx->poly = CRC32_POLY_BE; + + return 0; +} + +static int vf_crc_cra_init16(struct crypto_tfm *tfm) +{ + struct vf_crc_tfm_ctx *mctx = crypto_tfm_ctx(tfm); + + mctx->align = sizeof(u16); + /* 16 bit, no XOR */ + mctx->ctrl_init = 0; + mctx->is_16_bit = true; + mctx->key = CRC_INIT_DEFAULT; + mctx->poly = CRC16_POLY_BE; + + return 0; +} + +static int vf_crc_setkey(struct crypto_shash *tfm, const u8 *key, + unsigned int keylen) +{ + struct vf_crc_tfm_ctx *mctx = crypto_shash_ctx(tfm); + + if (keylen != mctx->align) { + crypto_shash_set_flags(tfm, CRYPTO_TFM_RES_BAD_KEY_LEN); + return -EINVAL; + } + + if (mctx->is_16_bit) + mctx->key = bitrev16(get_unaligned_le16(key)); + else + mctx->key = bitrev32(get_unaligned_le32(key)); + + return 0; +} + +static int vf_crc_init(struct shash_desc *desc) +{ + struct vf_crc_desc_ctx *desc_ctx = shash_desc_ctx(desc); + struct vf_crc_tfm_ctx *mctx = crypto_shash_ctx(desc->tfm); + + desc_ctx->crc = vf_crc_data; + desc_ctx->state = mctx->key; + + return 0; +} + +static void vf_crc_initialize_regs(struct vf_crc_tfm_ctx *mctx, + struct vf_crc_desc_ctx *desc_ctx) +{ + struct vf_crc *crc = desc_ctx->crc; + + /* Init and write-as-seed (next data write will be the seed) */ + writel(mctx->ctrl_init, crc->iobase + CRC_CTRL); + writel(mctx->poly, crc->iobase + CRC_POLY); + writel(mctx->ctrl_init | CRC_CTRL_WAS, crc->iobase + CRC_CTRL); + + /* Initialize engine with either key or state from previous rounds */ + writel(desc_ctx->state, crc->iobase + CRC_DATA); + + /* Clear write-as-seed */ + writel(mctx->ctrl_init, crc->iobase + CRC_CTRL); +} + +static void vf_crc_write_bytes(void __iomem *addr, const u8 *data, + unsigned int len) +{ + unsigned int i; + u8 value; + + for (i = 0; i < len; i++) { + value = bitrev8(data[i]); + writeb(value, addr); + } +} + +static int vf_crc_update_prepare(struct vf_crc_tfm_ctx *mctx, + struct vf_crc_desc_ctx *desc_ctx) +{ + struct vf_crc *crc = desc_ctx->crc; + int ret; + + ret = clk_prepare_enable(crc->clk); + if (ret) { + dev_err(crc->dev, "Failed to enable clock\n"); + return ret; + } + + mutex_lock(&crc->lock); + + /* + * Check if we are continuing to process request already configured + * in HW. HW has to be re-initialized only on first update() for given + * request or if new request was processed after last call to update(). + */ + if (crc->processed_desc == desc_ctx) + return 0; + + vf_crc_initialize_regs(mctx, desc_ctx); + + return 0; +} + +static void vf_crc_update_unprepare(struct vf_crc_tfm_ctx *mctx, + struct vf_crc_desc_ctx *desc_ctx) +{ + struct vf_crc *crc = desc_ctx->crc; + + if (mctx->is_16_bit) + desc_ctx->state = readw(crc->iobase + CRC_DATA); + else + desc_ctx->state = readl(crc->iobase + CRC_DATA); + + mutex_unlock(&crc->lock); + + clk_disable_unprepare(crc->clk); +} + +static int vf_crc_update(struct shash_desc *desc, const u8 *data, + unsigned int len) +{ + struct vf_crc_desc_ctx *desc_ctx = shash_desc_ctx(desc); + struct vf_crc_tfm_ctx *mctx = crypto_shash_ctx(desc->tfm); + unsigned int i, len_align; + int ret; + + ret = vf_crc_update_prepare(mctx, desc_ctx); + if (ret) + return ret; + + len_align = ALIGN_DOWN(len, mctx->align); + if (mctx->is_16_bit) { + u16 value; + + for (i = 0; i < len_align; i += mctx->align) { + value = bitrev16(get_unaligned_le16(data + i)); + writew(value, desc_ctx->crc->iobase + CRC_DATA); + } + } else { + u32 value; + + for (i = 0; i < len_align; i += mctx->align) { + value = bitrev32(get_unaligned_le32(data + i)); + writel(value, desc_ctx->crc->iobase + CRC_DATA); + } + } + + if (len != len_align) + vf_crc_write_bytes(desc_ctx->crc->iobase + CRC_DATA, + &data[len_align], len - len_align); + + vf_crc_update_unprepare(mctx, desc_ctx); + + return 0; +} + +static int vf_crc_final(struct shash_desc *desc, u8 *out) +{ + struct vf_crc_desc_ctx *desc_ctx = shash_desc_ctx(desc); + struct vf_crc_tfm_ctx *mctx = crypto_shash_ctx(desc->tfm); + + if (mctx->is_16_bit) + put_unaligned_le16(bitrev16(desc_ctx->state), out); + else + put_unaligned_le32(bitrev32(desc_ctx->state), out); + + mutex_lock(&desc_ctx->crc->lock); + /* No more processing of this request */ + desc_ctx->crc->processed_desc = NULL; + mutex_unlock(&desc_ctx->crc->lock); + + return 0; +} + +static int vf_crc_finup(struct shash_desc *desc, const u8 *data, + unsigned int len, u8 *out) +{ + return vf_crc_update(desc, data, len) ?: + vf_crc_final(desc, out); +} + +static int vf_crc_digest(struct shash_desc *desc, const u8 *data, + unsigned int leng, u8 *out) +{ + return vf_crc_init(desc) ?: vf_crc_finup(desc, data, leng, out); +} + +static struct shash_alg algs[] = { + { + .setkey = vf_crc_setkey, + .init = vf_crc_init, + .update = vf_crc_update, + .final = vf_crc_final, + .finup = vf_crc_finup, + .digest = vf_crc_digest, + .descsize = sizeof(struct vf_crc_desc_ctx), + .digestsize = CHKSUM_DIGEST_SIZE, + .base = { + .cra_name = "crc32", + .cra_driver_name = DRIVER_NAME, + .cra_priority = 200, + .cra_flags = CRYPTO_ALG_OPTIONAL_KEY, + .cra_blocksize = CHKSUM_BLOCK_SIZE, + .cra_ctxsize = sizeof(struct vf_crc_tfm_ctx), + .cra_module = THIS_MODULE, + .cra_init = vf_crc_cra_init32, + } + }, + { + .setkey = vf_crc_setkey, + .init = vf_crc_init, + .update = vf_crc_update, + .final = vf_crc_final, + .finup = vf_crc_finup, + .digest = vf_crc_digest, + .descsize = sizeof(struct vf_crc_desc_ctx), + .digestsize = (CHKSUM_DIGEST_SIZE / 2), + .base = { + .cra_name = "crc16", + .cra_driver_name = DRIVER_NAME, + .cra_priority = 200, + .cra_flags = CRYPTO_ALG_OPTIONAL_KEY, + .cra_blocksize = CHKSUM_BLOCK_SIZE, + .cra_ctxsize = sizeof(struct vf_crc_tfm_ctx), + .cra_module = THIS_MODULE, + .cra_init = vf_crc_cra_init16, + } + } +}; + +static int vf_crc_probe(struct platform_device *pdev) +{ + struct device *dev = &pdev->dev; + struct resource *res; + struct vf_crc *crc; + int ret; + + if (vf_crc_data) { + dev_err(dev, "Device already registered (only one instance allowed)\n"); + return -EINVAL; + } + + crc = devm_kzalloc(dev, sizeof(*crc), GFP_KERNEL); + if (!crc) + return -ENOMEM; + + crc->dev = dev; + + res = platform_get_resource(pdev, IORESOURCE_MEM, 0); + crc->iobase = devm_ioremap_resource(dev, res); + if (IS_ERR(crc->iobase)) + return PTR_ERR(crc->iobase); + + crc->clk = devm_clk_get(dev, "crc"); + if (IS_ERR(crc->clk)) { + dev_err(dev, "Could not get clock\n"); + return PTR_ERR(crc->clk); + } + + vf_crc_data = crc; + + ret = crypto_register_shashes(algs, ARRAY_SIZE(algs)); + if (ret) { + dev_err(dev, "Failed to register crypto algorithms\n"); + goto err; + } + + mutex_init(&crc->lock); + dev_dbg(dev, "HW CRC accelerator initialized\n"); + + return 0; + +err: + vf_crc_data = NULL; + + return ret; +} + +static int vf_crc_remove(struct platform_device *pdev) +{ + crypto_unregister_shashes(algs, ARRAY_SIZE(algs)); + vf_crc_data = NULL; + + return 0; +} + +static const struct of_device_id vf_crc_dt_match[] = { + { .compatible = "fsl,vf610-crc", }, + {}, +}; +MODULE_DEVICE_TABLE(of, vf_crc_dt_match); + +static struct platform_driver vf_crc_driver = { + .probe = vf_crc_probe, + .remove = vf_crc_remove, + .driver = { + .name = DRIVER_NAME, + .of_match_table = vf_crc_dt_match, + }, +}; + +module_platform_driver(vf_crc_driver); + +MODULE_AUTHOR("Krzysztof Kozlowski "); +MODULE_DESCRIPTION("Freescale/NXP Vybrid CRC32 hardware driver"); +MODULE_LICENSE("GPL v2"); diff --git a/include/linux/crc32poly.h b/include/linux/crc32poly.h index 62c4b7790a28..ca06942ba75b 100644 --- a/include/linux/crc32poly.h +++ b/include/linux/crc32poly.h @@ -17,4 +17,11 @@ */ #define CRC32C_POLY_LE 0x82F63B78 +/* + * CRC16 polynomial as defined by ITU-T V.41 (ITU Telecommunication + * Standardization Sector recommendations) + * x^16 + x^12 + x^5 + x^0 + */ +#define CRC16_POLY_BE 0x1021 + #endif /* _LINUX_CRC32_POLY_H */