1/* SPDX-License-Identifier: GPL-2.0-or-later */
2/*
3 * AMCC SoC PPC4xx Crypto Driver
4 *
5 * Copyright (c) 2008 Applied Micro Circuits Corporation.
6 * All rights reserved. James Hsiao <jhsiao@amcc.com>
7 *
8 * This is the header file for AMCC Crypto offload Linux device driver for
9 * use with Linux CryptoAPI.
10
11 */
12
13#ifndef __CRYPTO4XX_CORE_H__
14#define __CRYPTO4XX_CORE_H__
15
16#include <linux/ratelimit.h>
17#include <linux/mutex.h>
18#include <linux/scatterlist.h>
19#include <crypto/internal/hash.h>
20#include <crypto/internal/aead.h>
21#include <crypto/internal/rng.h>
22#include <crypto/internal/skcipher.h>
23#include "crypto4xx_reg_def.h"
24#include "crypto4xx_sa.h"
25
26#define PPC460SX_SDR0_SRST                      0x201
27#define PPC405EX_SDR0_SRST                      0x200
28#define PPC460EX_SDR0_SRST                      0x201
29#define PPC460EX_CE_RESET                       0x08000000
30#define PPC460SX_CE_RESET                       0x20000000
31#define PPC405EX_CE_RESET                       0x00000008
32
33#define CRYPTO4XX_CRYPTO_PRIORITY		300
34#define PPC4XX_NUM_PD				256
35#define PPC4XX_LAST_PD				(PPC4XX_NUM_PD - 1)
36#define PPC4XX_NUM_GD				1024
37#define PPC4XX_LAST_GD				(PPC4XX_NUM_GD - 1)
38#define PPC4XX_NUM_SD				256
39#define PPC4XX_LAST_SD				(PPC4XX_NUM_SD - 1)
40#define PPC4XX_SD_BUFFER_SIZE			2048
41
42#define PD_ENTRY_BUSY				BIT(1)
43#define PD_ENTRY_INUSE				BIT(0)
44#define PD_ENTRY_FREE				0
45#define ERING_WAS_FULL				0xffffffff
46
47struct crypto4xx_device;
48
49union shadow_sa_buf {
50	struct dynamic_sa_ctl sa;
51
52	/* alloc 256 bytes which is enough for any kind of dynamic sa */
53	u8 buf[256];
54} __packed;
55
56struct pd_uinfo {
57	struct crypto4xx_device *dev;
58	u32   state;
59	u32 first_gd;		/* first gather discriptor
60				used by this packet */
61	u32 num_gd;             /* number of gather discriptor
62				used by this packet */
63	u32 first_sd;		/* first scatter discriptor
64				used by this packet */
65	u32 num_sd;		/* number of scatter discriptors
66				used by this packet */
67	struct dynamic_sa_ctl *sa_va;	/* shadow sa */
68	struct sa_state_record *sr_va;	/* state record for shadow sa */
69	u32 sr_pa;
70	struct scatterlist *dest_va;
71	struct crypto_async_request *async_req; 	/* base crypto request
72							for this packet */
73};
74
75struct crypto4xx_device {
76	struct crypto4xx_core_device *core_dev;
77	void __iomem *ce_base;
78	void __iomem *trng_base;
79
80	struct ce_pd *pdr;	/* base address of packet descriptor ring */
81	dma_addr_t pdr_pa;	/* physical address of pdr_base_register */
82	struct ce_gd *gdr;	/* gather descriptor ring */
83	dma_addr_t gdr_pa;	/* physical address of gdr_base_register */
84	struct ce_sd *sdr;	/* scatter descriptor ring */
85	dma_addr_t sdr_pa;	/* physical address of sdr_base_register */
86	void *scatter_buffer_va;
87	dma_addr_t scatter_buffer_pa;
88
89	union shadow_sa_buf *shadow_sa_pool;
90	dma_addr_t shadow_sa_pool_pa;
91	struct sa_state_record *shadow_sr_pool;
92	dma_addr_t shadow_sr_pool_pa;
93	u32 pdr_tail;
94	u32 pdr_head;
95	u32 gdr_tail;
96	u32 gdr_head;
97	u32 sdr_tail;
98	u32 sdr_head;
99	struct pd_uinfo *pdr_uinfo;
100	struct list_head alg_list;	/* List of algorithm supported
101					by this device */
102	struct ratelimit_state aead_ratelimit;
103	bool is_revb;
104};
105
106struct crypto4xx_core_device {
107	struct device *device;
108	struct platform_device *ofdev;
109	struct crypto4xx_device *dev;
110	struct hwrng *trng;
111	u32 int_status;
112	u32 irq;
113	struct tasklet_struct tasklet;
114	spinlock_t lock;
115	struct mutex rng_lock;
116};
117
118struct crypto4xx_ctx {
119	struct crypto4xx_device *dev;
120	struct dynamic_sa_ctl *sa_in;
121	struct dynamic_sa_ctl *sa_out;
122	__le32 iv_nonce;
123	u32 sa_len;
124	union {
125		struct crypto_sync_skcipher *cipher;
126		struct crypto_aead *aead;
127	} sw_cipher;
128};
129
130struct crypto4xx_aead_reqctx {
131	struct scatterlist dst[2];
132};
133
134struct crypto4xx_alg_common {
135	u32 type;
136	union {
137		struct skcipher_alg cipher;
138		struct ahash_alg hash;
139		struct aead_alg aead;
140		struct rng_alg rng;
141	} u;
142};
143
144struct crypto4xx_alg {
145	struct list_head  entry;
146	struct crypto4xx_alg_common alg;
147	struct crypto4xx_device *dev;
148};
149
150int crypto4xx_alloc_sa(struct crypto4xx_ctx *ctx, u32 size);
151void crypto4xx_free_sa(struct crypto4xx_ctx *ctx);
152void crypto4xx_free_ctx(struct crypto4xx_ctx *ctx);
153int crypto4xx_build_pd(struct crypto_async_request *req,
154		       struct crypto4xx_ctx *ctx,
155		       struct scatterlist *src,
156		       struct scatterlist *dst,
157		       const unsigned int datalen,
158		       const __le32 *iv, const u32 iv_len,
159		       const struct dynamic_sa_ctl *sa,
160		       const unsigned int sa_len,
161		       const unsigned int assoclen,
162		       struct scatterlist *dst_tmp);
163int crypto4xx_setkey_aes_cbc(struct crypto_skcipher *cipher,
164			     const u8 *key, unsigned int keylen);
165int crypto4xx_setkey_aes_ctr(struct crypto_skcipher *cipher,
166			     const u8 *key, unsigned int keylen);
167int crypto4xx_setkey_aes_ecb(struct crypto_skcipher *cipher,
168			     const u8 *key, unsigned int keylen);
169int crypto4xx_setkey_rfc3686(struct crypto_skcipher *cipher,
170			     const u8 *key, unsigned int keylen);
171int crypto4xx_encrypt_ctr(struct skcipher_request *req);
172int crypto4xx_decrypt_ctr(struct skcipher_request *req);
173int crypto4xx_encrypt_iv_stream(struct skcipher_request *req);
174int crypto4xx_decrypt_iv_stream(struct skcipher_request *req);
175int crypto4xx_encrypt_iv_block(struct skcipher_request *req);
176int crypto4xx_decrypt_iv_block(struct skcipher_request *req);
177int crypto4xx_encrypt_noiv_block(struct skcipher_request *req);
178int crypto4xx_decrypt_noiv_block(struct skcipher_request *req);
179int crypto4xx_rfc3686_encrypt(struct skcipher_request *req);
180int crypto4xx_rfc3686_decrypt(struct skcipher_request *req);
181int crypto4xx_sha1_alg_init(struct crypto_tfm *tfm);
182int crypto4xx_hash_digest(struct ahash_request *req);
183int crypto4xx_hash_final(struct ahash_request *req);
184int crypto4xx_hash_update(struct ahash_request *req);
185int crypto4xx_hash_init(struct ahash_request *req);
186
187/*
188 * Note: Only use this function to copy items that is word aligned.
189 */
190static inline void crypto4xx_memcpy_swab32(u32 *dst, const void *buf,
191					   size_t len)
192{
193	for (; len >= 4; buf += 4, len -= 4)
194		*dst++ = __swab32p((u32 *) buf);
195
196	if (len) {
197		const u8 *tmp = (u8 *)buf;
198
199		switch (len) {
200		case 3:
201			*dst = (tmp[2] << 16) |
202			       (tmp[1] << 8) |
203			       tmp[0];
204			break;
205		case 2:
206			*dst = (tmp[1] << 8) |
207			       tmp[0];
208			break;
209		case 1:
210			*dst = tmp[0];
211			break;
212		default:
213			break;
214		}
215	}
216}
217
218static inline void crypto4xx_memcpy_from_le32(u32 *dst, const void *buf,
219					      size_t len)
220{
221	crypto4xx_memcpy_swab32(dst, buf, len);
222}
223
224static inline void crypto4xx_memcpy_to_le32(__le32 *dst, const void *buf,
225					    size_t len)
226{
227	crypto4xx_memcpy_swab32((u32 *)dst, buf, len);
228}
229
230int crypto4xx_setauthsize_aead(struct crypto_aead *ciper,
231			       unsigned int authsize);
232int crypto4xx_setkey_aes_ccm(struct crypto_aead *cipher,
233			     const u8 *key, unsigned int keylen);
234int crypto4xx_encrypt_aes_ccm(struct aead_request *req);
235int crypto4xx_decrypt_aes_ccm(struct aead_request *req);
236int crypto4xx_setkey_aes_gcm(struct crypto_aead *cipher,
237			     const u8 *key, unsigned int keylen);
238int crypto4xx_encrypt_aes_gcm(struct aead_request *req);
239int crypto4xx_decrypt_aes_gcm(struct aead_request *req);
240
241#endif
242