Skip to content

Commit

Permalink
Merge branch 'fix/aes_mpi_interrupt_allocation_workflow_v4.4' into 'r…
Browse files Browse the repository at this point in the history
…elease/v4.4'

fix(mbedtls): move interrupt allocation during initialization phase (v4.4)

See merge request espressif/esp-idf!27443
  • Loading branch information
AdityaHPatwardhan committed Dec 15, 2023
2 parents 3192aca + 00919c3 commit b92c24a
Show file tree
Hide file tree
Showing 4 changed files with 50 additions and 36 deletions.
30 changes: 17 additions & 13 deletions components/mbedtls/port/aes/dma/esp_aes.c
Expand Up @@ -169,24 +169,28 @@ static IRAM_ATTR void esp_aes_complete_isr(void *arg)
}
}

static esp_err_t esp_aes_isr_initialise( void )
void esp_aes_intr_alloc(void)
{
aes_hal_interrupt_clear();
aes_hal_interrupt_enable(true);
if (op_complete_sem == NULL) {
op_complete_sem = xSemaphoreCreateBinary();

if (op_complete_sem == NULL) {
ESP_LOGE(TAG, "Failed to create intr semaphore");
return ESP_FAIL;
}

esp_err_t ret = esp_intr_alloc(ETS_AES_INTR_SOURCE, 0, esp_aes_complete_isr, NULL, NULL);
if (ret != ESP_OK) {
return ret;
ESP_LOGE(TAG, "Failed to allocate AES interrupt %d", ret);
// This should be treated as fatal error as this API would mostly
// be invoked within mbedTLS interface. There is no way for the system
// to proceed if the AES interrupt allocation fails here.
abort();
}
static StaticSemaphore_t op_sem_buf;
op_complete_sem = xSemaphoreCreateBinaryStatic(&op_sem_buf);
// Static semaphore creation is unlikley to fail but still basic sanity
assert(op_complete_sem != NULL);
}
}

static esp_err_t esp_aes_isr_initialise( void )
{
aes_hal_interrupt_clear();
aes_hal_interrupt_enable(true);
/* AES is clocked proportionally to CPU clock, take power management lock */
#ifdef CONFIG_PM_ENABLE
if (s_pm_cpu_lock == NULL) {
Expand Down Expand Up @@ -423,7 +427,7 @@ static int esp_aes_process_dma(esp_aes_context *ctx, const unsigned char *input,
/* Only use interrupt for long AES operations */
if (len > AES_DMA_INTR_TRIG_LEN) {
use_intr = true;
if (esp_aes_isr_initialise() == ESP_FAIL) {
if (esp_aes_isr_initialise() != ESP_OK) {
ESP_LOGE(TAG, "ESP-AES ISR initialisation failed");
ret = -1;
goto cleanup;
Expand Down Expand Up @@ -561,7 +565,7 @@ int esp_aes_process_dma_gcm(esp_aes_context *ctx, const unsigned char *input, un
/* Only use interrupt for long AES operations */
if (len > AES_DMA_INTR_TRIG_LEN) {
use_intr = true;
if (esp_aes_isr_initialise() == ESP_FAIL) {
if (esp_aes_isr_initialise() != ESP_OK) {
ESP_LOGE(TAG, "ESP-AES ISR initialisation failed");
ret = -1;
goto cleanup;
Expand Down
23 changes: 10 additions & 13 deletions components/mbedtls/port/aes/dma/include/esp_aes_dma_priv.h
@@ -1,16 +1,8 @@
// Copyright 2020 Espressif Systems (Shanghai) PTE LTD
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
/*
* SPDX-FileCopyrightText: 2020-2023 Espressif Systems (Shanghai) CO LTD
*
* SPDX-License-Identifier: Apache-2.0
*/

#pragma once

Expand Down Expand Up @@ -43,6 +35,11 @@ esp_err_t esp_aes_dma_start(const lldesc_t *input, const lldesc_t *output);
*/
bool esp_aes_dma_done(const lldesc_t *output);

/**
* @brief Allocate AES peripheral interrupt handler
*/
void esp_aes_intr_alloc(void);

#ifdef __cplusplus
}
#endif
10 changes: 7 additions & 3 deletions components/mbedtls/port/aes/esp_aes_common.c
Expand Up @@ -26,6 +26,7 @@
* http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
*/

#include "sdkconfig.h"
#include "aes/esp_aes_internal.h"
#include "mbedtls/aes.h"
#include "hal/aes_hal.h"
Expand All @@ -35,7 +36,7 @@
#include <string.h>
#include "mbedtls/platform.h"

#if SOC_AES_GDMA
#if SOC_AES_SUPPORT_DMA
#include "esp_aes_dma_priv.h"
#endif

Expand All @@ -51,9 +52,12 @@ bool valid_key_length(const esp_aes_context *ctx)
}


void esp_aes_init( esp_aes_context *ctx )
void esp_aes_init(esp_aes_context *ctx)
{
bzero( ctx, sizeof( esp_aes_context ) );
bzero(ctx, sizeof(esp_aes_context));
#if SOC_AES_SUPPORT_DMA && CONFIG_MBEDTLS_AES_USE_INTERRUPT
esp_aes_intr_alloc();
#endif
}

void esp_aes_free( esp_aes_context *ctx )
Expand Down
23 changes: 16 additions & 7 deletions components/mbedtls/port/aes/esp_aes_gcm.c
Expand Up @@ -25,23 +25,28 @@
* http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf
* http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
*/

#include "soc/soc_caps.h"

#include <string.h>

#include "aes/esp_aes.h"
#include "aes/esp_aes_gcm.h"
#include "aes/esp_aes_internal.h"
#include "hal/aes_hal.h"

#include "esp_log.h"
#include "mbedtls/aes.h"
#include "mbedtls/error.h"
#include "mbedtls/gcm.h"
#include "mbedtls/platform.h"

#include "esp_heap_caps.h"
#include "esp_log.h"
#include "soc/soc_caps.h"
#include "soc/soc_memory_layout.h"

#include "mbedtls/error.h"
#include "mbedtls/platform.h"
#include <string.h>
#include "sdkconfig.h"

#if SOC_AES_SUPPORT_DMA
#include "esp_aes_dma_priv.h"
#endif

#define ESP_PUT_BE64(a, val) \
do { \
Expand Down Expand Up @@ -326,6 +331,10 @@ void esp_aes_gcm_init( esp_gcm_context *ctx)

bzero(ctx, sizeof(esp_gcm_context));

#if SOC_AES_SUPPORT_DMA && CONFIG_MBEDTLS_AES_USE_INTERRUPT
esp_aes_intr_alloc();
#endif

ctx->gcm_state = ESP_AES_GCM_STATE_INIT;
}

Expand Down

0 comments on commit b92c24a

Please sign in to comment.