Lines Matching refs:hba

20 static int ufshcd_program_key(struct ufs_hba *hba,
24 u32 slot_offset = hba->crypto_cfg_register + slot * sizeof(*cfg);
27 ufshcd_hold(hba);
29 if (hba->vops && hba->vops->program_key) {
30 err = hba->vops->program_key(hba, cfg, slot);
35 ufshcd_writel(hba, 0, slot_offset + 16 * sizeof(cfg->reg_val[0]));
37 ufshcd_writel(hba, le32_to_cpu(cfg->reg_val[i]),
41 ufshcd_writel(hba, le32_to_cpu(cfg->reg_val[17]),
44 ufshcd_writel(hba, le32_to_cpu(cfg->reg_val[16]),
47 ufshcd_release(hba);
55 struct ufs_hba *hba =
57 const union ufs_crypto_cap_entry *ccap_array = hba->crypto_cap_array;
67 for (i = 0; i < hba->crypto_capabilities.num_crypto_cap; i++) {
92 err = ufshcd_program_key(hba, &cfg, slot);
98 static int ufshcd_clear_keyslot(struct ufs_hba *hba, int slot)
106 return ufshcd_program_key(hba, &cfg, slot);
113 struct ufs_hba *hba =
116 return ufshcd_clear_keyslot(hba, slot);
119 bool ufshcd_crypto_enable(struct ufs_hba *hba)
121 if (!(hba->caps & UFSHCD_CAP_CRYPTO))
125 blk_crypto_reprogram_all_keys(&hba->crypto_profile);
151 * fields in hba
152 * @hba: Per adapter instance
156 int ufshcd_hba_init_crypto_capabilities(struct ufs_hba *hba)
167 if (!(hba->capabilities & MASK_CRYPTO_SUPPORT) ||
168 !(hba->caps & UFSHCD_CAP_CRYPTO))
171 hba->crypto_capabilities.reg_val =
172 cpu_to_le32(ufshcd_readl(hba, REG_UFS_CCAP));
173 hba->crypto_cfg_register =
174 (u32)hba->crypto_capabilities.config_array_ptr * 0x100;
175 hba->crypto_cap_array =
176 devm_kcalloc(hba->dev, hba->crypto_capabilities.num_crypto_cap,
177 sizeof(hba->crypto_cap_array[0]), GFP_KERNEL);
178 if (!hba->crypto_cap_array) {
185 hba->dev, &hba->crypto_profile,
186 hba->crypto_capabilities.config_count + 1);
190 hba->crypto_profile.ll_ops = ufshcd_crypto_ops;
192 hba->crypto_profile.max_dun_bytes_supported = 8;
193 hba->crypto_profile.dev = hba->dev;
199 for (cap_idx = 0; cap_idx < hba->crypto_capabilities.num_crypto_cap;
201 hba->crypto_cap_array[cap_idx].reg_val =
202 cpu_to_le32(ufshcd_readl(hba,
206 hba->crypto_cap_array[cap_idx]);
208 hba->crypto_profile.modes_supported[blk_mode_num] |=
209 hba->crypto_cap_array[cap_idx].sdus_mask * 512;
216 hba->caps &= ~UFSHCD_CAP_CRYPTO;
222 * @hba: Per adapter instance
224 void ufshcd_init_crypto(struct ufs_hba *hba)
228 if (!(hba->caps & UFSHCD_CAP_CRYPTO))
232 for (slot = 0; slot < hba->crypto_capabilities.config_count + 1; slot++)
233 ufshcd_clear_keyslot(hba, slot);
236 void ufshcd_crypto_register(struct ufs_hba *hba, struct request_queue *q)
238 if (hba->caps & UFSHCD_CAP_CRYPTO)
239 blk_crypto_register(&hba->crypto_profile, q);