[v3,RESEND,0/9] Drivers for Alibaba YCC (Yitian Cryptography Complex) cryptographic accelerator
Message ID | 1667461243-48652-1-git-send-email-guanjun@linux.alibaba.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp374844wru; Thu, 3 Nov 2022 00:41:34 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6QyLpdQqG8OeAj2+PaAkTvyExrLkHG5wV+ZYrenZzKc8SqSUeI1h/1B7HmUKEslcwQcMgR X-Received: by 2002:a17:902:c1cb:b0:188:51c0:6cb with SMTP id c11-20020a170902c1cb00b0018851c006cbmr2571852plc.113.1667461294423; Thu, 03 Nov 2022 00:41:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667461294; cv=none; d=google.com; s=arc-20160816; b=AyPP6ovMO0wtQsIOGgegcdpTfkUzy3NbrYIf2B2ETM7qqxl1kS2HzRMsBLMvXZNrf1 GjY8Vv2AWHXFUiGAWUOt1mlx+R0qdnEE54NwxTDvM2eW2z0JSw4JO84ngpHhrTSWvRjd aQDsA+RqXpb6p5NYCPjjx1CoLDt4sSodRPWIZK/HfaYCEuGn+Sg9+ehlVMCxkNP7Z2ZR aJY1OIoNC96oaT3nFNupsk/GUCVlDvHqkitTBV1I1Lcjy8gmxaKjJL9SLaSVZwXdWuck W+pMXn63GUOFv33y/WMSVrWQ8wQ/EWqbNhEjTwf2+NrWQAts0eDJKyiFxCrgdgXrLt6M XUJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=H+KUEei3Deq+QWgtNoY/MwiPQG8GQXr0SQIdmD3auLg=; b=UuSWXh3K/urD4721ZVUZxk2pbQeHLWo+D8vSnz9J89IWzaqhjlNluSaMKWJbeIyce1 7UT5BG5m47F/Zh38Nqk9MoNzxodwfxvktzkpbyAXm7I44at3voEkIfxudlV46b7ONzKm 35SDzsNP9vgCCTghHfAtXYWrplzPCGYXgm1J+WCcxeKU+RanJUkNIewfb3mvk6+x2K8y QMLCPSWGdYXIrzrd2B0c1T0uPFudRJ25mOkHfDUR9am8CZmYWVmrc1BsnGsfm54K0LcB 11HnGtCLEU2V74C4GoU088G+l2Wpf8eNDrD16GYBb+f4trc+t7F5XZKqzFOS9RM0gIyo vaKQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e10-20020a170902cf4a00b0017857e4e6easi18502151plg.343.2022.11.03.00.41.21; Thu, 03 Nov 2022 00:41:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230426AbiKCHkw (ORCPT <rfc822;yves.mi.zy@gmail.com> + 99 others); Thu, 3 Nov 2022 03:40:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37922 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230013AbiKCHkt (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 3 Nov 2022 03:40:49 -0400 Received: from out30-131.freemail.mail.aliyun.com (out30-131.freemail.mail.aliyun.com [115.124.30.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AEF5D10A2; Thu, 3 Nov 2022 00:40:47 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R161e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046059;MF=guanjun@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0VTrcGFd_1667461243; Received: from localhost(mailfrom:guanjun@linux.alibaba.com fp:SMTPD_---0VTrcGFd_1667461243) by smtp.aliyun-inc.com; Thu, 03 Nov 2022 15:40:45 +0800 From: 'Guanjun' <guanjun@linux.alibaba.com> To: herbert@gondor.apana.org.au, elliott@hpe.com Cc: zelin.deng@linux.alibaba.com, artie.ding@linux.alibaba.com, guanjun@linux.alibaba.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, xuchun.shang@linux.alibaba.com Subject: [PATCH v3 RESEND 0/9] Drivers for Alibaba YCC (Yitian Cryptography Complex) cryptographic accelerator Date: Thu, 3 Nov 2022 15:40:34 +0800 Message-Id: <1667461243-48652-1-git-send-email-guanjun@linux.alibaba.com> X-Mailer: git-send-email 1.8.3.1 X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748459894349295062?= X-GMAIL-MSGID: =?utf-8?q?1748459894349295062?= |
Series |
Drivers for Alibaba YCC (Yitian Cryptography Complex) cryptographic accelerator
|
|
Message
guanjun
Nov. 3, 2022, 7:40 a.m. UTC
From: Guanjun <guanjun@linux.alibaba.com>
Hi,
This patch series aims to add drivers for Alibaba YCC (Yitian Cryptography Complex)
cryptographic accelerator. Enables the on-chip cryptographic accelerator of
Alibaba Yitian SoCs which is based on ARMv9 architecture.
It includes PCIe enabling, skcipher, aead, rsa, sm2 support.
Please help to review.
Thanks,
Guanjun.
Change log:
v3 -> v3 RESEND:
- [*/09] Fix compile warnings when sparse turned on
v2 -> v3:
- [01/09] Fix the lost "$" in Makefile
- [08/09] Fix compile warnings when both CONFIG_CRYPTO_SM2 and CONFIG_CRYPTO_DEV_YCC are enabled
v1 RESEND -> v2:
- [01/09] Remove char device that is not used now.
v1 -> v1 RESEND:
- [01/09] Adjust the Kconfig entry in alphabetical order
- [05/09][07/09][08/09] Adjust the format of algorithm names
v2: https://lore.kernel.org/all/1664350687-47330-1-git-send-email-guanjun@linux.alibaba.com/
v1: https://lore.kernel.org/all/1661334621-44413-1-git-send-email-guanjun@linux.alibaba.com/
v1 RESEND: https://lore.kernel.org/all/1662435353-114812-1-git-send-email-guanjun@linux.alibaba.com/
Guanjun (3):
crypto/ycc: Add skcipher algorithm support
crypto/ycc: Add aead algorithm support
crypto/ycc: Add rsa algorithm support
Xuchun Shang (1):
crypto/ycc: Add sm2 algorithm support
Zelin Deng (5):
crypto/ycc: Add YCC (Yitian Cryptography Complex) accelerator driver
crypto/ycc: Add ycc ring configuration
crypto/ycc: Add irq support for ycc kernel rings
crypto/ycc: Add device error handling support for ycc hw errors
MAINTAINERS: Add Yitian Cryptography Complex (YCC) driver maintainer
entry
MAINTAINERS | 8 +
drivers/crypto/Kconfig | 2 +
drivers/crypto/Makefile | 1 +
drivers/crypto/ycc/Kconfig | 18 +
drivers/crypto/ycc/Makefile | 7 +
drivers/crypto/ycc/sm2signature_asn1.c | 38 ++
drivers/crypto/ycc/sm2signature_asn1.h | 13 +
drivers/crypto/ycc/ycc_aead.c | 646 ++++++++++++++++++++++
drivers/crypto/ycc/ycc_algs.h | 176 ++++++
drivers/crypto/ycc/ycc_dev.h | 157 ++++++
drivers/crypto/ycc/ycc_drv.c | 567 ++++++++++++++++++++
drivers/crypto/ycc/ycc_isr.c | 276 ++++++++++
drivers/crypto/ycc/ycc_isr.h | 13 +
drivers/crypto/ycc/ycc_pke.c | 946 +++++++++++++++++++++++++++++++++
drivers/crypto/ycc/ycc_ring.c | 649 ++++++++++++++++++++++
drivers/crypto/ycc/ycc_ring.h | 170 ++++++
drivers/crypto/ycc/ycc_ske.c | 925 ++++++++++++++++++++++++++++++++
17 files changed, 4612 insertions(+)
create mode 100644 drivers/crypto/ycc/Kconfig
create mode 100644 drivers/crypto/ycc/Makefile
create mode 100644 drivers/crypto/ycc/sm2signature_asn1.c
create mode 100644 drivers/crypto/ycc/sm2signature_asn1.h
create mode 100644 drivers/crypto/ycc/ycc_aead.c
create mode 100644 drivers/crypto/ycc/ycc_algs.h
create mode 100644 drivers/crypto/ycc/ycc_dev.h
create mode 100644 drivers/crypto/ycc/ycc_drv.c
create mode 100644 drivers/crypto/ycc/ycc_isr.c
create mode 100644 drivers/crypto/ycc/ycc_isr.h
create mode 100644 drivers/crypto/ycc/ycc_pke.c
create mode 100644 drivers/crypto/ycc/ycc_ring.c
create mode 100644 drivers/crypto/ycc/ycc_ring.h
create mode 100644 drivers/crypto/ycc/ycc_ske.c