mirror of
https://github.com/torvalds/linux.git
synced 2024-11-24 05:02:12 +00:00
d7f01649f4
RSA text data uses variable length buffer allocated in software stack. Calling kfree on it causes undefined behaviour in subsequent operations. Cc: <stable@vger.kernel.org> #6.7+ Signed-off-by: Jia Jie Ho <jiajie.ho@starfivetech.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
592 lines
14 KiB
C
592 lines
14 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* StarFive Public Key Algo acceleration driver
|
|
*
|
|
* Copyright (c) 2022 StarFive Technology
|
|
*/
|
|
|
|
#include <linux/crypto.h>
|
|
#include <linux/iopoll.h>
|
|
#include <crypto/akcipher.h>
|
|
#include <crypto/algapi.h>
|
|
#include <crypto/internal/akcipher.h>
|
|
#include <crypto/internal/rsa.h>
|
|
#include <crypto/scatterwalk.h>
|
|
|
|
#include "jh7110-cryp.h"
|
|
|
|
#define STARFIVE_PKA_REGS_OFFSET 0x400
|
|
#define STARFIVE_PKA_CACR_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x0)
|
|
#define STARFIVE_PKA_CASR_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x4)
|
|
#define STARFIVE_PKA_CAAR_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x8)
|
|
#define STARFIVE_PKA_CAER_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x108)
|
|
#define STARFIVE_PKA_CANR_OFFSET (STARFIVE_PKA_REGS_OFFSET + 0x208)
|
|
|
|
/* R ^ 2 mod N and N0' */
|
|
#define CRYPTO_CMD_PRE 0x0
|
|
/* A * R mod N ==> A */
|
|
#define CRYPTO_CMD_ARN 0x5
|
|
/* A * E * R mod N ==> A */
|
|
#define CRYPTO_CMD_AERN 0x6
|
|
/* A * A * R mod N ==> A */
|
|
#define CRYPTO_CMD_AARN 0x7
|
|
|
|
#define STARFIVE_RSA_MAX_KEYSZ 256
|
|
#define STARFIVE_RSA_RESET 0x2
|
|
|
|
static inline int starfive_pka_wait_done(struct starfive_cryp_ctx *ctx)
|
|
{
|
|
struct starfive_cryp_dev *cryp = ctx->cryp;
|
|
u32 status;
|
|
|
|
return readl_relaxed_poll_timeout(cryp->base + STARFIVE_PKA_CASR_OFFSET, status,
|
|
status & STARFIVE_PKA_DONE, 10, 100000);
|
|
}
|
|
|
|
static void starfive_rsa_free_key(struct starfive_rsa_key *key)
|
|
{
|
|
if (!key->key_sz)
|
|
return;
|
|
|
|
kfree_sensitive(key->d);
|
|
kfree_sensitive(key->e);
|
|
kfree_sensitive(key->n);
|
|
memset(key, 0, sizeof(*key));
|
|
}
|
|
|
|
static unsigned int starfive_rsa_get_nbit(u8 *pa, u32 snum, int key_sz)
|
|
{
|
|
u32 i;
|
|
u8 value;
|
|
|
|
i = snum >> 3;
|
|
|
|
value = pa[key_sz - i - 1];
|
|
value >>= snum & 0x7;
|
|
value &= 0x1;
|
|
|
|
return value;
|
|
}
|
|
|
|
static int starfive_rsa_montgomery_form(struct starfive_cryp_ctx *ctx,
|
|
u32 *out, u32 *in, u8 mont,
|
|
u32 *mod, int bit_len)
|
|
{
|
|
struct starfive_cryp_dev *cryp = ctx->cryp;
|
|
struct starfive_cryp_request_ctx *rctx = ctx->rctx;
|
|
int count = rctx->total / sizeof(u32) - 1;
|
|
int loop;
|
|
u32 temp;
|
|
u8 opsize;
|
|
|
|
opsize = (bit_len - 1) >> 5;
|
|
rctx->csr.pka.v = 0;
|
|
|
|
writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
|
|
|
|
for (loop = 0; loop <= opsize; loop++)
|
|
writel(mod[opsize - loop], cryp->base + STARFIVE_PKA_CANR_OFFSET + loop * 4);
|
|
|
|
if (mont) {
|
|
rctx->csr.pka.v = 0;
|
|
rctx->csr.pka.cln_done = 1;
|
|
rctx->csr.pka.opsize = opsize;
|
|
rctx->csr.pka.exposize = opsize;
|
|
rctx->csr.pka.cmd = CRYPTO_CMD_PRE;
|
|
rctx->csr.pka.start = 1;
|
|
rctx->csr.pka.not_r2 = 1;
|
|
rctx->csr.pka.ie = 1;
|
|
|
|
writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
|
|
|
|
if (starfive_pka_wait_done(ctx))
|
|
return -ETIMEDOUT;
|
|
|
|
for (loop = 0; loop <= opsize; loop++)
|
|
writel(in[opsize - loop], cryp->base + STARFIVE_PKA_CAAR_OFFSET + loop * 4);
|
|
|
|
writel(0x1000000, cryp->base + STARFIVE_PKA_CAER_OFFSET);
|
|
|
|
for (loop = 1; loop <= opsize; loop++)
|
|
writel(0, cryp->base + STARFIVE_PKA_CAER_OFFSET + loop * 4);
|
|
|
|
rctx->csr.pka.v = 0;
|
|
rctx->csr.pka.cln_done = 1;
|
|
rctx->csr.pka.opsize = opsize;
|
|
rctx->csr.pka.exposize = opsize;
|
|
rctx->csr.pka.cmd = CRYPTO_CMD_AERN;
|
|
rctx->csr.pka.start = 1;
|
|
rctx->csr.pka.ie = 1;
|
|
|
|
writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
|
|
|
|
if (starfive_pka_wait_done(ctx))
|
|
return -ETIMEDOUT;
|
|
} else {
|
|
rctx->csr.pka.v = 0;
|
|
rctx->csr.pka.cln_done = 1;
|
|
rctx->csr.pka.opsize = opsize;
|
|
rctx->csr.pka.exposize = opsize;
|
|
rctx->csr.pka.cmd = CRYPTO_CMD_PRE;
|
|
rctx->csr.pka.start = 1;
|
|
rctx->csr.pka.pre_expf = 1;
|
|
rctx->csr.pka.ie = 1;
|
|
|
|
writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
|
|
|
|
if (starfive_pka_wait_done(ctx))
|
|
return -ETIMEDOUT;
|
|
|
|
for (loop = 0; loop <= count; loop++)
|
|
writel(in[count - loop], cryp->base + STARFIVE_PKA_CAER_OFFSET + loop * 4);
|
|
|
|
/*pad with 0 up to opsize*/
|
|
for (loop = count + 1; loop <= opsize; loop++)
|
|
writel(0, cryp->base + STARFIVE_PKA_CAER_OFFSET + loop * 4);
|
|
|
|
rctx->csr.pka.v = 0;
|
|
rctx->csr.pka.cln_done = 1;
|
|
rctx->csr.pka.opsize = opsize;
|
|
rctx->csr.pka.exposize = opsize;
|
|
rctx->csr.pka.cmd = CRYPTO_CMD_ARN;
|
|
rctx->csr.pka.start = 1;
|
|
rctx->csr.pka.ie = 1;
|
|
|
|
writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
|
|
|
|
if (starfive_pka_wait_done(ctx))
|
|
return -ETIMEDOUT;
|
|
}
|
|
|
|
for (loop = 0; loop <= opsize; loop++) {
|
|
temp = readl(cryp->base + STARFIVE_PKA_CAAR_OFFSET + 0x4 * loop);
|
|
out[opsize - loop] = temp;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int starfive_rsa_cpu_start(struct starfive_cryp_ctx *ctx, u32 *result,
|
|
u8 *de, u32 *n, int key_sz)
|
|
{
|
|
struct starfive_cryp_dev *cryp = ctx->cryp;
|
|
struct starfive_cryp_request_ctx *rctx = ctx->rctx;
|
|
struct starfive_rsa_key *key = &ctx->rsa_key;
|
|
u32 temp;
|
|
int ret = 0;
|
|
int opsize, mlen, loop;
|
|
unsigned int *mta;
|
|
|
|
opsize = (key_sz - 1) >> 2;
|
|
|
|
mta = kmalloc(key_sz, GFP_KERNEL);
|
|
if (!mta)
|
|
return -ENOMEM;
|
|
|
|
ret = starfive_rsa_montgomery_form(ctx, mta, (u32 *)rctx->rsa_data,
|
|
0, n, key_sz << 3);
|
|
if (ret) {
|
|
dev_err_probe(cryp->dev, ret, "Conversion to Montgomery failed");
|
|
goto rsa_err;
|
|
}
|
|
|
|
for (loop = 0; loop <= opsize; loop++)
|
|
writel(mta[opsize - loop],
|
|
cryp->base + STARFIVE_PKA_CAER_OFFSET + loop * 4);
|
|
|
|
for (loop = key->bitlen - 1; loop > 0; loop--) {
|
|
mlen = starfive_rsa_get_nbit(de, loop - 1, key_sz);
|
|
|
|
rctx->csr.pka.v = 0;
|
|
rctx->csr.pka.cln_done = 1;
|
|
rctx->csr.pka.opsize = opsize;
|
|
rctx->csr.pka.exposize = opsize;
|
|
rctx->csr.pka.cmd = CRYPTO_CMD_AARN;
|
|
rctx->csr.pka.start = 1;
|
|
rctx->csr.pka.ie = 1;
|
|
|
|
writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
|
|
|
|
ret = -ETIMEDOUT;
|
|
if (starfive_pka_wait_done(ctx))
|
|
goto rsa_err;
|
|
|
|
if (mlen) {
|
|
rctx->csr.pka.v = 0;
|
|
rctx->csr.pka.cln_done = 1;
|
|
rctx->csr.pka.opsize = opsize;
|
|
rctx->csr.pka.exposize = opsize;
|
|
rctx->csr.pka.cmd = CRYPTO_CMD_AERN;
|
|
rctx->csr.pka.start = 1;
|
|
rctx->csr.pka.ie = 1;
|
|
|
|
writel(rctx->csr.pka.v, cryp->base + STARFIVE_PKA_CACR_OFFSET);
|
|
|
|
if (starfive_pka_wait_done(ctx))
|
|
goto rsa_err;
|
|
}
|
|
}
|
|
|
|
for (loop = 0; loop <= opsize; loop++) {
|
|
temp = readl(cryp->base + STARFIVE_PKA_CAAR_OFFSET + 0x4 * loop);
|
|
result[opsize - loop] = temp;
|
|
}
|
|
|
|
ret = starfive_rsa_montgomery_form(ctx, result, result, 1, n, key_sz << 3);
|
|
if (ret)
|
|
dev_err_probe(cryp->dev, ret, "Conversion from Montgomery failed");
|
|
rsa_err:
|
|
kfree(mta);
|
|
return ret;
|
|
}
|
|
|
|
static int starfive_rsa_start(struct starfive_cryp_ctx *ctx, u8 *result,
|
|
u8 *de, u8 *n, int key_sz)
|
|
{
|
|
return starfive_rsa_cpu_start(ctx, (u32 *)result, de, (u32 *)n, key_sz);
|
|
}
|
|
|
|
static int starfive_rsa_enc_core(struct starfive_cryp_ctx *ctx, int enc)
|
|
{
|
|
struct starfive_cryp_dev *cryp = ctx->cryp;
|
|
struct starfive_cryp_request_ctx *rctx = ctx->rctx;
|
|
struct starfive_rsa_key *key = &ctx->rsa_key;
|
|
int ret = 0;
|
|
|
|
writel(STARFIVE_RSA_RESET, cryp->base + STARFIVE_PKA_CACR_OFFSET);
|
|
|
|
rctx->total = sg_copy_to_buffer(rctx->in_sg, rctx->nents,
|
|
rctx->rsa_data, rctx->total);
|
|
|
|
if (enc) {
|
|
key->bitlen = key->e_bitlen;
|
|
ret = starfive_rsa_start(ctx, rctx->rsa_data, key->e,
|
|
key->n, key->key_sz);
|
|
} else {
|
|
key->bitlen = key->d_bitlen;
|
|
ret = starfive_rsa_start(ctx, rctx->rsa_data, key->d,
|
|
key->n, key->key_sz);
|
|
}
|
|
|
|
if (ret)
|
|
goto err_rsa_crypt;
|
|
|
|
sg_copy_buffer(rctx->out_sg, sg_nents(rctx->out_sg),
|
|
rctx->rsa_data, key->key_sz, 0, 0);
|
|
|
|
err_rsa_crypt:
|
|
writel(STARFIVE_RSA_RESET, cryp->base + STARFIVE_PKA_CACR_OFFSET);
|
|
return ret;
|
|
}
|
|
|
|
static int starfive_rsa_enc(struct akcipher_request *req)
|
|
{
|
|
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
|
|
struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
|
|
struct starfive_cryp_dev *cryp = ctx->cryp;
|
|
struct starfive_rsa_key *key = &ctx->rsa_key;
|
|
struct starfive_cryp_request_ctx *rctx = akcipher_request_ctx(req);
|
|
int ret;
|
|
|
|
if (!key->key_sz) {
|
|
akcipher_request_set_tfm(req, ctx->akcipher_fbk);
|
|
ret = crypto_akcipher_encrypt(req);
|
|
akcipher_request_set_tfm(req, tfm);
|
|
return ret;
|
|
}
|
|
|
|
if (unlikely(!key->n || !key->e))
|
|
return -EINVAL;
|
|
|
|
if (req->dst_len < key->key_sz)
|
|
return dev_err_probe(cryp->dev, -EOVERFLOW,
|
|
"Output buffer length less than parameter n\n");
|
|
|
|
rctx->in_sg = req->src;
|
|
rctx->out_sg = req->dst;
|
|
rctx->total = req->src_len;
|
|
rctx->nents = sg_nents(rctx->in_sg);
|
|
ctx->rctx = rctx;
|
|
|
|
return starfive_rsa_enc_core(ctx, 1);
|
|
}
|
|
|
|
static int starfive_rsa_dec(struct akcipher_request *req)
|
|
{
|
|
struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
|
|
struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
|
|
struct starfive_cryp_dev *cryp = ctx->cryp;
|
|
struct starfive_rsa_key *key = &ctx->rsa_key;
|
|
struct starfive_cryp_request_ctx *rctx = akcipher_request_ctx(req);
|
|
int ret;
|
|
|
|
if (!key->key_sz) {
|
|
akcipher_request_set_tfm(req, ctx->akcipher_fbk);
|
|
ret = crypto_akcipher_decrypt(req);
|
|
akcipher_request_set_tfm(req, tfm);
|
|
return ret;
|
|
}
|
|
|
|
if (unlikely(!key->n || !key->d))
|
|
return -EINVAL;
|
|
|
|
if (req->dst_len < key->key_sz)
|
|
return dev_err_probe(cryp->dev, -EOVERFLOW,
|
|
"Output buffer length less than parameter n\n");
|
|
|
|
rctx->in_sg = req->src;
|
|
rctx->out_sg = req->dst;
|
|
ctx->rctx = rctx;
|
|
rctx->total = req->src_len;
|
|
|
|
return starfive_rsa_enc_core(ctx, 0);
|
|
}
|
|
|
|
static int starfive_rsa_set_n(struct starfive_rsa_key *rsa_key,
|
|
const char *value, size_t vlen)
|
|
{
|
|
const char *ptr = value;
|
|
unsigned int bitslen;
|
|
int ret;
|
|
|
|
while (!*ptr && vlen) {
|
|
ptr++;
|
|
vlen--;
|
|
}
|
|
rsa_key->key_sz = vlen;
|
|
bitslen = rsa_key->key_sz << 3;
|
|
|
|
/* check valid key size */
|
|
if (bitslen & 0x1f)
|
|
return -EINVAL;
|
|
|
|
ret = -ENOMEM;
|
|
rsa_key->n = kmemdup(ptr, rsa_key->key_sz, GFP_KERNEL);
|
|
if (!rsa_key->n)
|
|
goto err;
|
|
|
|
return 0;
|
|
err:
|
|
rsa_key->key_sz = 0;
|
|
rsa_key->n = NULL;
|
|
starfive_rsa_free_key(rsa_key);
|
|
return ret;
|
|
}
|
|
|
|
static int starfive_rsa_set_e(struct starfive_rsa_key *rsa_key,
|
|
const char *value, size_t vlen)
|
|
{
|
|
const char *ptr = value;
|
|
unsigned char pt;
|
|
int loop;
|
|
|
|
while (!*ptr && vlen) {
|
|
ptr++;
|
|
vlen--;
|
|
}
|
|
pt = *ptr;
|
|
|
|
if (!rsa_key->key_sz || !vlen || vlen > rsa_key->key_sz) {
|
|
rsa_key->e = NULL;
|
|
return -EINVAL;
|
|
}
|
|
|
|
rsa_key->e = kzalloc(rsa_key->key_sz, GFP_KERNEL);
|
|
if (!rsa_key->e)
|
|
return -ENOMEM;
|
|
|
|
for (loop = 8; loop > 0; loop--) {
|
|
if (pt >> (loop - 1))
|
|
break;
|
|
}
|
|
|
|
rsa_key->e_bitlen = (vlen - 1) * 8 + loop;
|
|
|
|
memcpy(rsa_key->e + (rsa_key->key_sz - vlen), ptr, vlen);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int starfive_rsa_set_d(struct starfive_rsa_key *rsa_key,
|
|
const char *value, size_t vlen)
|
|
{
|
|
const char *ptr = value;
|
|
unsigned char pt;
|
|
int loop;
|
|
int ret;
|
|
|
|
while (!*ptr && vlen) {
|
|
ptr++;
|
|
vlen--;
|
|
}
|
|
pt = *ptr;
|
|
|
|
ret = -EINVAL;
|
|
if (!rsa_key->key_sz || !vlen || vlen > rsa_key->key_sz)
|
|
goto err;
|
|
|
|
ret = -ENOMEM;
|
|
rsa_key->d = kzalloc(rsa_key->key_sz, GFP_KERNEL);
|
|
if (!rsa_key->d)
|
|
goto err;
|
|
|
|
for (loop = 8; loop > 0; loop--) {
|
|
if (pt >> (loop - 1))
|
|
break;
|
|
}
|
|
|
|
rsa_key->d_bitlen = (vlen - 1) * 8 + loop;
|
|
|
|
memcpy(rsa_key->d + (rsa_key->key_sz - vlen), ptr, vlen);
|
|
|
|
return 0;
|
|
err:
|
|
rsa_key->d = NULL;
|
|
return ret;
|
|
}
|
|
|
|
static int starfive_rsa_setkey(struct crypto_akcipher *tfm, const void *key,
|
|
unsigned int keylen, bool private)
|
|
{
|
|
struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
|
|
struct rsa_key raw_key = {NULL};
|
|
struct starfive_rsa_key *rsa_key = &ctx->rsa_key;
|
|
int ret;
|
|
|
|
if (private)
|
|
ret = rsa_parse_priv_key(&raw_key, key, keylen);
|
|
else
|
|
ret = rsa_parse_pub_key(&raw_key, key, keylen);
|
|
if (ret < 0)
|
|
goto err;
|
|
|
|
starfive_rsa_free_key(rsa_key);
|
|
|
|
/* Use fallback for mod > 256 + 1 byte prefix */
|
|
if (raw_key.n_sz > STARFIVE_RSA_MAX_KEYSZ + 1)
|
|
return 0;
|
|
|
|
ret = starfive_rsa_set_n(rsa_key, raw_key.n, raw_key.n_sz);
|
|
if (ret)
|
|
return ret;
|
|
|
|
ret = starfive_rsa_set_e(rsa_key, raw_key.e, raw_key.e_sz);
|
|
if (ret)
|
|
goto err;
|
|
|
|
if (private) {
|
|
ret = starfive_rsa_set_d(rsa_key, raw_key.d, raw_key.d_sz);
|
|
if (ret)
|
|
goto err;
|
|
}
|
|
|
|
if (!rsa_key->n || !rsa_key->e) {
|
|
ret = -EINVAL;
|
|
goto err;
|
|
}
|
|
|
|
if (private && !rsa_key->d) {
|
|
ret = -EINVAL;
|
|
goto err;
|
|
}
|
|
|
|
return 0;
|
|
err:
|
|
starfive_rsa_free_key(rsa_key);
|
|
return ret;
|
|
}
|
|
|
|
static int starfive_rsa_set_pub_key(struct crypto_akcipher *tfm, const void *key,
|
|
unsigned int keylen)
|
|
{
|
|
struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
|
|
int ret;
|
|
|
|
ret = crypto_akcipher_set_pub_key(ctx->akcipher_fbk, key, keylen);
|
|
if (ret)
|
|
return ret;
|
|
|
|
return starfive_rsa_setkey(tfm, key, keylen, false);
|
|
}
|
|
|
|
static int starfive_rsa_set_priv_key(struct crypto_akcipher *tfm, const void *key,
|
|
unsigned int keylen)
|
|
{
|
|
struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
|
|
int ret;
|
|
|
|
ret = crypto_akcipher_set_priv_key(ctx->akcipher_fbk, key, keylen);
|
|
if (ret)
|
|
return ret;
|
|
|
|
return starfive_rsa_setkey(tfm, key, keylen, true);
|
|
}
|
|
|
|
static unsigned int starfive_rsa_max_size(struct crypto_akcipher *tfm)
|
|
{
|
|
struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
|
|
|
|
if (ctx->rsa_key.key_sz)
|
|
return ctx->rsa_key.key_sz;
|
|
|
|
return crypto_akcipher_maxsize(ctx->akcipher_fbk);
|
|
}
|
|
|
|
static int starfive_rsa_init_tfm(struct crypto_akcipher *tfm)
|
|
{
|
|
struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
|
|
|
|
ctx->cryp = starfive_cryp_find_dev(ctx);
|
|
if (!ctx->cryp)
|
|
return -ENODEV;
|
|
|
|
ctx->akcipher_fbk = crypto_alloc_akcipher("rsa-generic", 0, 0);
|
|
if (IS_ERR(ctx->akcipher_fbk))
|
|
return PTR_ERR(ctx->akcipher_fbk);
|
|
|
|
akcipher_set_reqsize(tfm, sizeof(struct starfive_cryp_request_ctx) +
|
|
sizeof(struct crypto_akcipher) + 32);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void starfive_rsa_exit_tfm(struct crypto_akcipher *tfm)
|
|
{
|
|
struct starfive_cryp_ctx *ctx = akcipher_tfm_ctx(tfm);
|
|
struct starfive_rsa_key *key = (struct starfive_rsa_key *)&ctx->rsa_key;
|
|
|
|
crypto_free_akcipher(ctx->akcipher_fbk);
|
|
starfive_rsa_free_key(key);
|
|
}
|
|
|
|
static struct akcipher_alg starfive_rsa = {
|
|
.encrypt = starfive_rsa_enc,
|
|
.decrypt = starfive_rsa_dec,
|
|
.sign = starfive_rsa_dec,
|
|
.verify = starfive_rsa_enc,
|
|
.set_pub_key = starfive_rsa_set_pub_key,
|
|
.set_priv_key = starfive_rsa_set_priv_key,
|
|
.max_size = starfive_rsa_max_size,
|
|
.init = starfive_rsa_init_tfm,
|
|
.exit = starfive_rsa_exit_tfm,
|
|
.base = {
|
|
.cra_name = "rsa",
|
|
.cra_driver_name = "starfive-rsa",
|
|
.cra_flags = CRYPTO_ALG_TYPE_AKCIPHER |
|
|
CRYPTO_ALG_NEED_FALLBACK,
|
|
.cra_priority = 3000,
|
|
.cra_module = THIS_MODULE,
|
|
.cra_ctxsize = sizeof(struct starfive_cryp_ctx),
|
|
},
|
|
};
|
|
|
|
int starfive_rsa_register_algs(void)
|
|
{
|
|
return crypto_register_akcipher(&starfive_rsa);
|
|
}
|
|
|
|
void starfive_rsa_unregister_algs(void)
|
|
{
|
|
crypto_unregister_akcipher(&starfive_rsa);
|
|
}
|