Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v6.17-rc6 239 lines 7.0 kB view raw
1/* SPDX-License-Identifier: GPL-2.0-or-later */ 2/* 3 * AMCC SoC PPC4xx Crypto Driver 4 * 5 * Copyright (c) 2008 Applied Micro Circuits Corporation. 6 * All rights reserved. James Hsiao <jhsiao@amcc.com> 7 * 8 * This is the header file for AMCC Crypto offload Linux device driver for 9 * use with Linux CryptoAPI. 10 11 */ 12 13#ifndef __CRYPTO4XX_CORE_H__ 14#define __CRYPTO4XX_CORE_H__ 15 16#include <linux/ratelimit.h> 17#include <linux/mutex.h> 18#include <linux/scatterlist.h> 19#include <crypto/internal/aead.h> 20#include <crypto/internal/rng.h> 21#include <crypto/internal/skcipher.h> 22#include "crypto4xx_reg_def.h" 23#include "crypto4xx_sa.h" 24 25#define PPC460SX_SDR0_SRST 0x201 26#define PPC405EX_SDR0_SRST 0x200 27#define PPC460EX_SDR0_SRST 0x201 28#define PPC460EX_CE_RESET 0x08000000 29#define PPC460SX_CE_RESET 0x20000000 30#define PPC405EX_CE_RESET 0x00000008 31 32#define CRYPTO4XX_CRYPTO_PRIORITY 300 33#define PPC4XX_NUM_PD 256 34#define PPC4XX_LAST_PD (PPC4XX_NUM_PD - 1) 35#define PPC4XX_NUM_GD 1024 36#define PPC4XX_LAST_GD (PPC4XX_NUM_GD - 1) 37#define PPC4XX_NUM_SD 256 38#define PPC4XX_LAST_SD (PPC4XX_NUM_SD - 1) 39#define PPC4XX_SD_BUFFER_SIZE 2048 40 41#define PD_ENTRY_BUSY BIT(1) 42#define PD_ENTRY_INUSE BIT(0) 43#define PD_ENTRY_FREE 0 44#define ERING_WAS_FULL 0xffffffff 45 46struct crypto4xx_device; 47 48union shadow_sa_buf { 49 struct dynamic_sa_ctl sa; 50 51 /* alloc 256 bytes which is enough for any kind of dynamic sa */ 52 u8 buf[256]; 53} __packed; 54 55struct pd_uinfo { 56 struct crypto4xx_device *dev; 57 u32 state; 58 u32 first_gd; /* first gather discriptor 59 used by this packet */ 60 u32 num_gd; /* number of gather discriptor 61 used by this packet */ 62 u32 first_sd; /* first scatter discriptor 63 used by this packet */ 64 u32 num_sd; /* number of scatter discriptors 65 used by this packet */ 66 struct dynamic_sa_ctl *sa_va; /* shadow sa */ 67 struct sa_state_record *sr_va; /* state record for shadow sa */ 68 u32 sr_pa; 69 struct scatterlist *dest_va; 70 struct crypto_async_request *async_req; /* base crypto request 71 for this packet */ 72}; 73 74struct crypto4xx_device { 75 struct crypto4xx_core_device *core_dev; 76 void __iomem *ce_base; 77 void __iomem *trng_base; 78 79 struct ce_pd *pdr; /* base address of packet descriptor ring */ 80 dma_addr_t pdr_pa; /* physical address of pdr_base_register */ 81 struct ce_gd *gdr; /* gather descriptor ring */ 82 dma_addr_t gdr_pa; /* physical address of gdr_base_register */ 83 struct ce_sd *sdr; /* scatter descriptor ring */ 84 dma_addr_t sdr_pa; /* physical address of sdr_base_register */ 85 void *scatter_buffer_va; 86 dma_addr_t scatter_buffer_pa; 87 88 union shadow_sa_buf *shadow_sa_pool; 89 dma_addr_t shadow_sa_pool_pa; 90 struct sa_state_record *shadow_sr_pool; 91 dma_addr_t shadow_sr_pool_pa; 92 u32 pdr_tail; 93 u32 pdr_head; 94 u32 gdr_tail; 95 u32 gdr_head; 96 u32 sdr_tail; 97 u32 sdr_head; 98 struct pd_uinfo *pdr_uinfo; 99 struct list_head alg_list; /* List of algorithm supported 100 by this device */ 101 struct ratelimit_state aead_ratelimit; 102 bool is_revb; 103}; 104 105struct crypto4xx_core_device { 106 struct device *device; 107 struct platform_device *ofdev; 108 struct crypto4xx_device *dev; 109 struct hwrng *trng; 110 u32 int_status; 111 u32 irq; 112 struct tasklet_struct tasklet; 113 spinlock_t lock; 114 struct mutex rng_lock; 115}; 116 117struct crypto4xx_ctx { 118 struct crypto4xx_device *dev; 119 struct dynamic_sa_ctl *sa_in; 120 struct dynamic_sa_ctl *sa_out; 121 __le32 iv_nonce; 122 u32 sa_len; 123 union { 124 struct crypto_sync_skcipher *cipher; 125 struct crypto_aead *aead; 126 } sw_cipher; 127}; 128 129struct crypto4xx_aead_reqctx { 130 struct scatterlist dst[2]; 131}; 132 133struct crypto4xx_alg_common { 134 u32 type; 135 union { 136 struct skcipher_alg cipher; 137 struct aead_alg aead; 138 struct rng_alg rng; 139 } u; 140}; 141 142struct crypto4xx_alg { 143 struct list_head entry; 144 struct crypto4xx_alg_common alg; 145 struct crypto4xx_device *dev; 146}; 147 148#if IS_ENABLED(CONFIG_CC_IS_GCC) && CONFIG_GCC_VERSION >= 120000 149#define BUILD_PD_ACCESS __attribute__((access(read_only, 6, 7))) 150#else 151#define BUILD_PD_ACCESS 152#endif 153 154int crypto4xx_alloc_sa(struct crypto4xx_ctx *ctx, u32 size); 155void crypto4xx_free_sa(struct crypto4xx_ctx *ctx); 156int crypto4xx_build_pd(struct crypto_async_request *req, 157 struct crypto4xx_ctx *ctx, 158 struct scatterlist *src, 159 struct scatterlist *dst, 160 const unsigned int datalen, 161 const void *iv, const u32 iv_len, 162 const struct dynamic_sa_ctl *sa, 163 const unsigned int sa_len, 164 const unsigned int assoclen, 165 struct scatterlist *dst_tmp) BUILD_PD_ACCESS; 166int crypto4xx_setkey_aes_cbc(struct crypto_skcipher *cipher, 167 const u8 *key, unsigned int keylen); 168int crypto4xx_setkey_aes_ctr(struct crypto_skcipher *cipher, 169 const u8 *key, unsigned int keylen); 170int crypto4xx_setkey_aes_ecb(struct crypto_skcipher *cipher, 171 const u8 *key, unsigned int keylen); 172int crypto4xx_setkey_rfc3686(struct crypto_skcipher *cipher, 173 const u8 *key, unsigned int keylen); 174int crypto4xx_encrypt_ctr(struct skcipher_request *req); 175int crypto4xx_decrypt_ctr(struct skcipher_request *req); 176int crypto4xx_encrypt_iv_stream(struct skcipher_request *req); 177int crypto4xx_decrypt_iv_stream(struct skcipher_request *req); 178int crypto4xx_encrypt_iv_block(struct skcipher_request *req); 179int crypto4xx_decrypt_iv_block(struct skcipher_request *req); 180int crypto4xx_encrypt_noiv_block(struct skcipher_request *req); 181int crypto4xx_decrypt_noiv_block(struct skcipher_request *req); 182int crypto4xx_rfc3686_encrypt(struct skcipher_request *req); 183int crypto4xx_rfc3686_decrypt(struct skcipher_request *req); 184 185/* 186 * Note: Only use this function to copy items that is word aligned. 187 */ 188static inline void crypto4xx_memcpy_swab32(u32 *dst, const void *buf, 189 size_t len) 190{ 191 for (; len >= 4; buf += 4, len -= 4) 192 *dst++ = __swab32p((u32 *) buf); 193 194 if (len) { 195 const u8 *tmp = (u8 *)buf; 196 197 switch (len) { 198 case 3: 199 *dst = (tmp[2] << 16) | 200 (tmp[1] << 8) | 201 tmp[0]; 202 break; 203 case 2: 204 *dst = (tmp[1] << 8) | 205 tmp[0]; 206 break; 207 case 1: 208 *dst = tmp[0]; 209 break; 210 default: 211 break; 212 } 213 } 214} 215 216static inline void crypto4xx_memcpy_from_le32(u32 *dst, const void *buf, 217 size_t len) 218{ 219 crypto4xx_memcpy_swab32(dst, buf, len); 220} 221 222static inline void crypto4xx_memcpy_to_le32(__le32 *dst, const void *buf, 223 size_t len) 224{ 225 crypto4xx_memcpy_swab32((u32 *)dst, buf, len); 226} 227 228int crypto4xx_setauthsize_aead(struct crypto_aead *ciper, 229 unsigned int authsize); 230int crypto4xx_setkey_aes_ccm(struct crypto_aead *cipher, 231 const u8 *key, unsigned int keylen); 232int crypto4xx_encrypt_aes_ccm(struct aead_request *req); 233int crypto4xx_decrypt_aes_ccm(struct aead_request *req); 234int crypto4xx_setkey_aes_gcm(struct crypto_aead *cipher, 235 const u8 *key, unsigned int keylen); 236int crypto4xx_encrypt_aes_gcm(struct aead_request *req); 237int crypto4xx_decrypt_aes_gcm(struct aead_request *req); 238 239#endif