Commit 551ce72a authored by Andrey Smirnov's avatar Andrey Smirnov Committed by Herbert Xu

crypto: caam - invalidate entropy register during RNG initialization

In order to make sure that we always use non-stale entropy data, change
the code to invalidate entropy register during RNG initialization.
Signed-off-by: default avatarAymen Sghaier <aymen.sghaier@nxp.com>
Signed-off-by: default avatarVipul Kumar <vipul_kumar@mentor.com>
[andrew.smirnov@gmail.com ported to upstream kernel, rewrote commit msg]
Signed-off-by: default avatarAndrey Smirnov <andrew.smirnov@gmail.com>
Reviewed-by: default avatarHoria Geantă <horia.geanta@nxp.com>
Cc: Chris Healy <cphealy@gmail.com>
Cc: Lucas Stach <l.stach@pengutronix.de>
Cc: Horia Geantă <horia.geanta@nxp.com>
Cc: Herbert Xu <herbert@gondor.apana.org.au>
Cc: Iuliana Prodan <iuliana.prodan@nxp.com>
Cc: linux-crypto@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Cc: linux-imx@nxp.com
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 32107e43
...@@ -341,8 +341,12 @@ static void kick_trng(struct platform_device *pdev, int ent_delay) ...@@ -341,8 +341,12 @@ static void kick_trng(struct platform_device *pdev, int ent_delay)
ctrl = (struct caam_ctrl __iomem *)ctrlpriv->ctrl; ctrl = (struct caam_ctrl __iomem *)ctrlpriv->ctrl;
r4tst = &ctrl->r4tst[0]; r4tst = &ctrl->r4tst[0];
/* put RNG4 into program mode */ /*
clrsetbits_32(&r4tst->rtmctl, 0, RTMCTL_PRGM); * Setting both RTMCTL:PRGM and RTMCTL:TRNG_ACC causes TRNG to
* properly invalidate the entropy in the entropy register and
* force re-generation.
*/
clrsetbits_32(&r4tst->rtmctl, 0, RTMCTL_PRGM | RTMCTL_ACC);
/* /*
* Performance-wise, it does not make sense to * Performance-wise, it does not make sense to
...@@ -372,7 +376,8 @@ static void kick_trng(struct platform_device *pdev, int ent_delay) ...@@ -372,7 +376,8 @@ static void kick_trng(struct platform_device *pdev, int ent_delay)
* select raw sampling in both entropy shifter * select raw sampling in both entropy shifter
* and statistical checker; ; put RNG4 into run mode * and statistical checker; ; put RNG4 into run mode
*/ */
clrsetbits_32(&r4tst->rtmctl, RTMCTL_PRGM, RTMCTL_SAMP_MODE_RAW_ES_SC); clrsetbits_32(&r4tst->rtmctl, RTMCTL_PRGM | RTMCTL_ACC,
RTMCTL_SAMP_MODE_RAW_ES_SC);
} }
static int caam_get_era_from_hw(struct caam_ctrl __iomem *ctrl) static int caam_get_era_from_hw(struct caam_ctrl __iomem *ctrl)
......
...@@ -487,7 +487,8 @@ struct rngtst { ...@@ -487,7 +487,8 @@ struct rngtst {
/* RNG4 TRNG test registers */ /* RNG4 TRNG test registers */
struct rng4tst { struct rng4tst {
#define RTMCTL_PRGM 0x00010000 /* 1 -> program mode, 0 -> run mode */ #define RTMCTL_ACC BIT(5) /* TRNG access mode */
#define RTMCTL_PRGM BIT(16) /* 1 -> program mode, 0 -> run mode */
#define RTMCTL_SAMP_MODE_VON_NEUMANN_ES_SC 0 /* use von Neumann data in #define RTMCTL_SAMP_MODE_VON_NEUMANN_ES_SC 0 /* use von Neumann data in
both entropy shifter and both entropy shifter and
statistical checker */ statistical checker */
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment