blob: a768da7138a1cd4a0a79771ad99b2f5436f481c3 [file] [log] [blame]
Boris BREZILLONf63601f2015-06-18 15:46:20 +02001#ifndef __MARVELL_CESA_H__
2#define __MARVELL_CESA_H__
3
4#include <crypto/algapi.h>
5#include <crypto/hash.h>
6#include <crypto/internal/hash.h>
7
8#include <linux/crypto.h>
Boris BREZILLONdb509a42015-06-18 15:46:21 +02009#include <linux/dmapool.h>
Boris BREZILLONf63601f2015-06-18 15:46:20 +020010
11#define CESA_ENGINE_OFF(i) (((i) * 0x2000))
12
13#define CESA_TDMA_BYTE_CNT 0x800
14#define CESA_TDMA_SRC_ADDR 0x810
15#define CESA_TDMA_DST_ADDR 0x820
16#define CESA_TDMA_NEXT_ADDR 0x830
17
18#define CESA_TDMA_CONTROL 0x840
19#define CESA_TDMA_DST_BURST GENMASK(2, 0)
20#define CESA_TDMA_DST_BURST_32B 3
21#define CESA_TDMA_DST_BURST_128B 4
22#define CESA_TDMA_OUT_RD_EN BIT(4)
23#define CESA_TDMA_SRC_BURST GENMASK(8, 6)
24#define CESA_TDMA_SRC_BURST_32B (3 << 6)
25#define CESA_TDMA_SRC_BURST_128B (4 << 6)
26#define CESA_TDMA_CHAIN BIT(9)
27#define CESA_TDMA_BYTE_SWAP BIT(11)
28#define CESA_TDMA_NO_BYTE_SWAP BIT(11)
29#define CESA_TDMA_EN BIT(12)
30#define CESA_TDMA_FETCH_ND BIT(13)
31#define CESA_TDMA_ACT BIT(14)
32
33#define CESA_TDMA_CUR 0x870
34#define CESA_TDMA_ERROR_CAUSE 0x8c8
35#define CESA_TDMA_ERROR_MSK 0x8cc
36
37#define CESA_TDMA_WINDOW_BASE(x) (((x) * 0x8) + 0xa00)
38#define CESA_TDMA_WINDOW_CTRL(x) (((x) * 0x8) + 0xa04)
39
40#define CESA_IVDIG(x) (0xdd00 + ((x) * 4) + \
41 (((x) < 5) ? 0 : 0x14))
42
43#define CESA_SA_CMD 0xde00
44#define CESA_SA_CMD_EN_CESA_SA_ACCL0 BIT(0)
45#define CESA_SA_CMD_EN_CESA_SA_ACCL1 BIT(1)
46#define CESA_SA_CMD_DISABLE_SEC BIT(2)
47
48#define CESA_SA_DESC_P0 0xde04
49
50#define CESA_SA_DESC_P1 0xde14
51
52#define CESA_SA_CFG 0xde08
53#define CESA_SA_CFG_STOP_DIG_ERR GENMASK(1, 0)
54#define CESA_SA_CFG_DIG_ERR_CONT 0
55#define CESA_SA_CFG_DIG_ERR_SKIP 1
56#define CESA_SA_CFG_DIG_ERR_STOP 3
57#define CESA_SA_CFG_CH0_W_IDMA BIT(7)
58#define CESA_SA_CFG_CH1_W_IDMA BIT(8)
59#define CESA_SA_CFG_ACT_CH0_IDMA BIT(9)
60#define CESA_SA_CFG_ACT_CH1_IDMA BIT(10)
61#define CESA_SA_CFG_MULTI_PKT BIT(11)
62#define CESA_SA_CFG_PARA_DIS BIT(13)
63
64#define CESA_SA_ACCEL_STATUS 0xde0c
65#define CESA_SA_ST_ACT_0 BIT(0)
66#define CESA_SA_ST_ACT_1 BIT(1)
67
68/*
69 * CESA_SA_FPGA_INT_STATUS looks like a FPGA leftover and is documented only
70 * in Errata 4.12. It looks like that it was part of an IRQ-controller in FPGA
71 * and someone forgot to remove it while switching to the core and moving to
72 * CESA_SA_INT_STATUS.
73 */
74#define CESA_SA_FPGA_INT_STATUS 0xdd68
75#define CESA_SA_INT_STATUS 0xde20
76#define CESA_SA_INT_AUTH_DONE BIT(0)
77#define CESA_SA_INT_DES_E_DONE BIT(1)
78#define CESA_SA_INT_AES_E_DONE BIT(2)
79#define CESA_SA_INT_AES_D_DONE BIT(3)
80#define CESA_SA_INT_ENC_DONE BIT(4)
81#define CESA_SA_INT_ACCEL0_DONE BIT(5)
82#define CESA_SA_INT_ACCEL1_DONE BIT(6)
83#define CESA_SA_INT_ACC0_IDMA_DONE BIT(7)
84#define CESA_SA_INT_ACC1_IDMA_DONE BIT(8)
85#define CESA_SA_INT_IDMA_DONE BIT(9)
86#define CESA_SA_INT_IDMA_OWN_ERR BIT(10)
87
88#define CESA_SA_INT_MSK 0xde24
89
90#define CESA_SA_DESC_CFG_OP_MAC_ONLY 0
91#define CESA_SA_DESC_CFG_OP_CRYPT_ONLY 1
92#define CESA_SA_DESC_CFG_OP_MAC_CRYPT 2
93#define CESA_SA_DESC_CFG_OP_CRYPT_MAC 3
94#define CESA_SA_DESC_CFG_OP_MSK GENMASK(1, 0)
95#define CESA_SA_DESC_CFG_MACM_SHA256 (1 << 4)
96#define CESA_SA_DESC_CFG_MACM_HMAC_SHA256 (3 << 4)
97#define CESA_SA_DESC_CFG_MACM_MD5 (4 << 4)
98#define CESA_SA_DESC_CFG_MACM_SHA1 (5 << 4)
99#define CESA_SA_DESC_CFG_MACM_HMAC_MD5 (6 << 4)
100#define CESA_SA_DESC_CFG_MACM_HMAC_SHA1 (7 << 4)
101#define CESA_SA_DESC_CFG_MACM_MSK GENMASK(6, 4)
102#define CESA_SA_DESC_CFG_CRYPTM_DES (1 << 8)
103#define CESA_SA_DESC_CFG_CRYPTM_3DES (2 << 8)
104#define CESA_SA_DESC_CFG_CRYPTM_AES (3 << 8)
105#define CESA_SA_DESC_CFG_CRYPTM_MSK GENMASK(9, 8)
106#define CESA_SA_DESC_CFG_DIR_ENC (0 << 12)
107#define CESA_SA_DESC_CFG_DIR_DEC (1 << 12)
108#define CESA_SA_DESC_CFG_CRYPTCM_ECB (0 << 16)
109#define CESA_SA_DESC_CFG_CRYPTCM_CBC (1 << 16)
110#define CESA_SA_DESC_CFG_CRYPTCM_MSK BIT(16)
111#define CESA_SA_DESC_CFG_3DES_EEE (0 << 20)
112#define CESA_SA_DESC_CFG_3DES_EDE (1 << 20)
113#define CESA_SA_DESC_CFG_AES_LEN_128 (0 << 24)
114#define CESA_SA_DESC_CFG_AES_LEN_192 (1 << 24)
115#define CESA_SA_DESC_CFG_AES_LEN_256 (2 << 24)
116#define CESA_SA_DESC_CFG_AES_LEN_MSK GENMASK(25, 24)
117#define CESA_SA_DESC_CFG_NOT_FRAG (0 << 30)
118#define CESA_SA_DESC_CFG_FIRST_FRAG (1 << 30)
119#define CESA_SA_DESC_CFG_LAST_FRAG (2 << 30)
120#define CESA_SA_DESC_CFG_MID_FRAG (3 << 30)
121#define CESA_SA_DESC_CFG_FRAG_MSK GENMASK(31, 30)
122
123/*
124 * /-----------\ 0
125 * | ACCEL CFG | 4 * 8
126 * |-----------| 0x20
127 * | CRYPT KEY | 8 * 4
128 * |-----------| 0x40
129 * | IV IN | 4 * 4
130 * |-----------| 0x40 (inplace)
131 * | IV BUF | 4 * 4
132 * |-----------| 0x80
133 * | DATA IN | 16 * x (max ->max_req_size)
134 * |-----------| 0x80 (inplace operation)
135 * | DATA OUT | 16 * x (max ->max_req_size)
136 * \-----------/ SRAM size
137 */
138
139/*
140 * Hashing memory map:
141 * /-----------\ 0
142 * | ACCEL CFG | 4 * 8
143 * |-----------| 0x20
144 * | Inner IV | 8 * 4
145 * |-----------| 0x40
146 * | Outer IV | 8 * 4
147 * |-----------| 0x60
148 * | Output BUF| 8 * 4
149 * |-----------| 0x80
150 * | DATA IN | 64 * x (max ->max_req_size)
151 * \-----------/ SRAM size
152 */
153
154#define CESA_SA_CFG_SRAM_OFFSET 0x00
155#define CESA_SA_DATA_SRAM_OFFSET 0x80
156
157#define CESA_SA_CRYPT_KEY_SRAM_OFFSET 0x20
158#define CESA_SA_CRYPT_IV_SRAM_OFFSET 0x40
159
160#define CESA_SA_MAC_IIV_SRAM_OFFSET 0x20
161#define CESA_SA_MAC_OIV_SRAM_OFFSET 0x40
162#define CESA_SA_MAC_DIG_SRAM_OFFSET 0x60
163
164#define CESA_SA_DESC_CRYPT_DATA(offset) \
165 cpu_to_le32((CESA_SA_DATA_SRAM_OFFSET + (offset)) | \
166 ((CESA_SA_DATA_SRAM_OFFSET + (offset)) << 16))
167
168#define CESA_SA_DESC_CRYPT_IV(offset) \
169 cpu_to_le32((CESA_SA_CRYPT_IV_SRAM_OFFSET + (offset)) | \
170 ((CESA_SA_CRYPT_IV_SRAM_OFFSET + (offset)) << 16))
171
172#define CESA_SA_DESC_CRYPT_KEY(offset) \
173 cpu_to_le32(CESA_SA_CRYPT_KEY_SRAM_OFFSET + (offset))
174
175#define CESA_SA_DESC_MAC_DATA(offset) \
176 cpu_to_le32(CESA_SA_DATA_SRAM_OFFSET + (offset))
Russell King6de59d42015-10-18 18:31:26 +0100177#define CESA_SA_DESC_MAC_DATA_MSK cpu_to_le32(GENMASK(15, 0))
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200178
179#define CESA_SA_DESC_MAC_TOTAL_LEN(total_len) cpu_to_le32((total_len) << 16)
Russell King6de59d42015-10-18 18:31:26 +0100180#define CESA_SA_DESC_MAC_TOTAL_LEN_MSK cpu_to_le32(GENMASK(31, 16))
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200181
182#define CESA_SA_DESC_MAC_SRC_TOTAL_LEN_MAX 0xffff
183
184#define CESA_SA_DESC_MAC_DIGEST(offset) \
185 cpu_to_le32(CESA_SA_MAC_DIG_SRAM_OFFSET + (offset))
Russell King6de59d42015-10-18 18:31:26 +0100186#define CESA_SA_DESC_MAC_DIGEST_MSK cpu_to_le32(GENMASK(15, 0))
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200187
188#define CESA_SA_DESC_MAC_FRAG_LEN(frag_len) cpu_to_le32((frag_len) << 16)
Russell King6de59d42015-10-18 18:31:26 +0100189#define CESA_SA_DESC_MAC_FRAG_LEN_MSK cpu_to_le32(GENMASK(31, 16))
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200190
191#define CESA_SA_DESC_MAC_IV(offset) \
192 cpu_to_le32((CESA_SA_MAC_IIV_SRAM_OFFSET + (offset)) | \
193 ((CESA_SA_MAC_OIV_SRAM_OFFSET + (offset)) << 16))
194
195#define CESA_SA_SRAM_SIZE 2048
196#define CESA_SA_SRAM_PAYLOAD_SIZE (cesa_dev->sram_size - \
197 CESA_SA_DATA_SRAM_OFFSET)
198
199#define CESA_SA_DEFAULT_SRAM_SIZE 2048
200#define CESA_SA_MIN_SRAM_SIZE 1024
201
202#define CESA_SA_SRAM_MSK (2048 - 1)
203
204#define CESA_MAX_HASH_BLOCK_SIZE 64
205#define CESA_HASH_BLOCK_SIZE_MSK (CESA_MAX_HASH_BLOCK_SIZE - 1)
206
207/**
208 * struct mv_cesa_sec_accel_desc - security accelerator descriptor
209 * @config: engine config
210 * @enc_p: input and output data pointers for a cipher operation
211 * @enc_len: cipher operation length
212 * @enc_key_p: cipher key pointer
213 * @enc_iv: cipher IV pointers
214 * @mac_src_p: input pointer and total hash length
215 * @mac_digest: digest pointer and hash operation length
216 * @mac_iv: hmac IV pointers
217 *
218 * Structure passed to the CESA engine to describe the crypto operation
219 * to be executed.
220 */
221struct mv_cesa_sec_accel_desc {
Russell King6de59d42015-10-18 18:31:26 +0100222 __le32 config;
223 __le32 enc_p;
224 __le32 enc_len;
225 __le32 enc_key_p;
226 __le32 enc_iv;
227 __le32 mac_src_p;
228 __le32 mac_digest;
229 __le32 mac_iv;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200230};
231
232/**
233 * struct mv_cesa_blkcipher_op_ctx - cipher operation context
234 * @key: cipher key
235 * @iv: cipher IV
236 *
237 * Context associated to a cipher operation.
238 */
239struct mv_cesa_blkcipher_op_ctx {
240 u32 key[8];
241 u32 iv[4];
242};
243
244/**
245 * struct mv_cesa_hash_op_ctx - hash or hmac operation context
246 * @key: cipher key
247 * @iv: cipher IV
248 *
249 * Context associated to an hash or hmac operation.
250 */
251struct mv_cesa_hash_op_ctx {
252 u32 iv[16];
253 u32 hash[8];
254};
255
256/**
257 * struct mv_cesa_op_ctx - crypto operation context
258 * @desc: CESA descriptor
259 * @ctx: context associated to the crypto operation
260 *
261 * Context associated to a crypto operation.
262 */
263struct mv_cesa_op_ctx {
264 struct mv_cesa_sec_accel_desc desc;
265 union {
266 struct mv_cesa_blkcipher_op_ctx blkcipher;
267 struct mv_cesa_hash_op_ctx hash;
268 } ctx;
269};
270
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200271/* TDMA descriptor flags */
272#define CESA_TDMA_DST_IN_SRAM BIT(31)
273#define CESA_TDMA_SRC_IN_SRAM BIT(30)
Romain Perier85030c52016-06-21 10:08:39 +0200274#define CESA_TDMA_END_OF_REQ BIT(29)
275#define CESA_TDMA_BREAK_CHAIN BIT(28)
276#define CESA_TDMA_TYPE_MSK GENMASK(27, 0)
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200277#define CESA_TDMA_DUMMY 0
278#define CESA_TDMA_DATA 1
279#define CESA_TDMA_OP 2
Romain Perier0c996202016-10-05 09:56:32 +0200280#define CESA_TDMA_RESULT 3
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200281
282/**
283 * struct mv_cesa_tdma_desc - TDMA descriptor
284 * @byte_cnt: number of bytes to transfer
285 * @src: DMA address of the source
286 * @dst: DMA address of the destination
287 * @next_dma: DMA address of the next TDMA descriptor
288 * @cur_dma: DMA address of this TDMA descriptor
289 * @next: pointer to the next TDMA descriptor
290 * @op: CESA operation attached to this TDMA descriptor
291 * @data: raw data attached to this TDMA descriptor
292 * @flags: flags describing the TDMA transfer. See the
293 * "TDMA descriptor flags" section above
294 *
295 * TDMA descriptor used to create a transfer chain describing a crypto
296 * operation.
297 */
298struct mv_cesa_tdma_desc {
Russell King6de59d42015-10-18 18:31:26 +0100299 __le32 byte_cnt;
300 __le32 src;
301 __le32 dst;
302 __le32 next_dma;
Russell King5d754132015-10-18 18:31:05 +0100303
304 /* Software state */
305 dma_addr_t cur_dma;
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200306 struct mv_cesa_tdma_desc *next;
307 union {
308 struct mv_cesa_op_ctx *op;
309 void *data;
310 };
311 u32 flags;
312};
313
314/**
315 * struct mv_cesa_sg_dma_iter - scatter-gather iterator
316 * @dir: transfer direction
317 * @sg: scatter list
318 * @offset: current position in the scatter list
319 * @op_offset: current position in the crypto operation
320 *
321 * Iterator used to iterate over a scatterlist while creating a TDMA chain for
322 * a crypto operation.
323 */
324struct mv_cesa_sg_dma_iter {
325 enum dma_data_direction dir;
326 struct scatterlist *sg;
327 unsigned int offset;
328 unsigned int op_offset;
329};
330
331/**
332 * struct mv_cesa_dma_iter - crypto operation iterator
333 * @len: the crypto operation length
334 * @offset: current position in the crypto operation
335 * @op_len: sub-operation length (the crypto engine can only act on 2kb
336 * chunks)
337 *
338 * Iterator used to create a TDMA chain for a given crypto operation.
339 */
340struct mv_cesa_dma_iter {
341 unsigned int len;
342 unsigned int offset;
343 unsigned int op_len;
344};
345
346/**
347 * struct mv_cesa_tdma_chain - TDMA chain
348 * @first: first entry in the TDMA chain
349 * @last: last entry in the TDMA chain
350 *
351 * Stores a TDMA chain for a specific crypto operation.
352 */
353struct mv_cesa_tdma_chain {
354 struct mv_cesa_tdma_desc *first;
355 struct mv_cesa_tdma_desc *last;
356};
357
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200358struct mv_cesa_engine;
359
360/**
361 * struct mv_cesa_caps - CESA device capabilities
362 * @engines: number of engines
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200363 * @has_tdma: whether this device has a TDMA block
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200364 * @cipher_algs: supported cipher algorithms
365 * @ncipher_algs: number of supported cipher algorithms
366 * @ahash_algs: supported hash algorithms
367 * @nahash_algs: number of supported hash algorithms
368 *
369 * Structure used to describe CESA device capabilities.
370 */
371struct mv_cesa_caps {
372 int nengines;
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200373 bool has_tdma;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200374 struct crypto_alg **cipher_algs;
375 int ncipher_algs;
376 struct ahash_alg **ahash_algs;
377 int nahash_algs;
378};
379
380/**
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200381 * struct mv_cesa_dev_dma - DMA pools
382 * @tdma_desc_pool: TDMA desc pool
383 * @op_pool: crypto operation pool
384 * @cache_pool: data cache pool (used by hash implementation when the
385 * hash request is smaller than the hash block size)
386 * @padding_pool: padding pool (used by hash implementation when hardware
387 * padding cannot be used)
388 *
389 * Structure containing the different DMA pools used by this driver.
390 */
391struct mv_cesa_dev_dma {
392 struct dma_pool *tdma_desc_pool;
393 struct dma_pool *op_pool;
394 struct dma_pool *cache_pool;
395 struct dma_pool *padding_pool;
396};
397
398/**
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200399 * struct mv_cesa_dev - CESA device
400 * @caps: device capabilities
401 * @regs: device registers
402 * @sram_size: usable SRAM size
403 * @lock: device lock
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200404 * @engines: array of engines
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200405 * @dma: dma pools
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200406 *
407 * Structure storing CESA device information.
408 */
409struct mv_cesa_dev {
410 const struct mv_cesa_caps *caps;
411 void __iomem *regs;
412 struct device *dev;
413 unsigned int sram_size;
414 spinlock_t lock;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200415 struct mv_cesa_engine *engines;
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200416 struct mv_cesa_dev_dma *dma;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200417};
418
419/**
420 * struct mv_cesa_engine - CESA engine
421 * @id: engine id
422 * @regs: engine registers
423 * @sram: SRAM memory region
424 * @sram_dma: DMA address of the SRAM memory region
425 * @lock: engine lock
426 * @req: current crypto request
427 * @clk: engine clk
428 * @zclk: engine zclk
429 * @max_req_len: maximum chunk length (useful to create the TDMA chain)
430 * @int_mask: interrupt mask cache
431 * @pool: memory pool pointing to the memory region reserved in
432 * SRAM
Romain Perierbf8f91e2016-06-21 10:08:38 +0200433 * @queue: fifo of the pending crypto requests
434 * @load: engine load counter, useful for load balancing
Romain Perier85030c52016-06-21 10:08:39 +0200435 * @chain: list of the current tdma descriptors being processed
436 * by this engine.
437 * @complete_queue: fifo of the processed requests by the engine
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200438 *
439 * Structure storing CESA engine information.
440 */
441struct mv_cesa_engine {
442 int id;
443 void __iomem *regs;
444 void __iomem *sram;
445 dma_addr_t sram_dma;
446 spinlock_t lock;
447 struct crypto_async_request *req;
448 struct clk *clk;
449 struct clk *zclk;
450 size_t max_req_len;
451 u32 int_mask;
452 struct gen_pool *pool;
Romain Perierbf8f91e2016-06-21 10:08:38 +0200453 struct crypto_queue queue;
454 atomic_t load;
Romain Perier85030c52016-06-21 10:08:39 +0200455 struct mv_cesa_tdma_chain chain;
456 struct list_head complete_queue;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200457};
458
459/**
460 * struct mv_cesa_req_ops - CESA request operations
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200461 * @process: process a request chunk result (should return 0 if the
462 * operation, -EINPROGRESS if it needs more steps or an error
463 * code)
464 * @step: launch the crypto operation on the next chunk
465 * @cleanup: cleanup the crypto request (release associated data)
Romain Perier1bf66822016-06-21 10:08:36 +0200466 * @complete: complete the request, i.e copy result or context from sram when
467 * needed.
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200468 */
469struct mv_cesa_req_ops {
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200470 int (*process)(struct crypto_async_request *req, u32 status);
471 void (*step)(struct crypto_async_request *req);
472 void (*cleanup)(struct crypto_async_request *req);
Romain Perier1bf66822016-06-21 10:08:36 +0200473 void (*complete)(struct crypto_async_request *req);
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200474};
475
476/**
477 * struct mv_cesa_ctx - CESA operation context
478 * @ops: crypto operations
479 *
480 * Base context structure inherited by operation specific ones.
481 */
482struct mv_cesa_ctx {
483 const struct mv_cesa_req_ops *ops;
484};
485
486/**
487 * struct mv_cesa_hash_ctx - CESA hash operation context
488 * @base: base context structure
489 *
490 * Hash context structure.
491 */
492struct mv_cesa_hash_ctx {
493 struct mv_cesa_ctx base;
494};
495
496/**
497 * struct mv_cesa_hash_ctx - CESA hmac operation context
498 * @base: base context structure
499 * @iv: initialization vectors
500 *
501 * HMAC context structure.
502 */
503struct mv_cesa_hmac_ctx {
504 struct mv_cesa_ctx base;
505 u32 iv[16];
506};
507
508/**
509 * enum mv_cesa_req_type - request type definitions
510 * @CESA_STD_REQ: standard request
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200511 * @CESA_DMA_REQ: DMA request
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200512 */
513enum mv_cesa_req_type {
514 CESA_STD_REQ,
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200515 CESA_DMA_REQ,
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200516};
517
518/**
519 * struct mv_cesa_req - CESA request
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200520 * @engine: engine associated with this request
Romain Perier53da7402016-06-21 10:08:35 +0200521 * @chain: list of tdma descriptors associated with this request
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200522 */
523struct mv_cesa_req {
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200524 struct mv_cesa_engine *engine;
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200525 struct mv_cesa_tdma_chain chain;
526};
527
528/**
529 * struct mv_cesa_sg_std_iter - CESA scatter-gather iterator for standard
530 * requests
531 * @iter: sg mapping iterator
532 * @offset: current offset in the SG entry mapped in memory
533 */
534struct mv_cesa_sg_std_iter {
535 struct sg_mapping_iter iter;
536 unsigned int offset;
537};
538
539/**
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200540 * struct mv_cesa_ablkcipher_std_req - cipher standard request
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200541 * @op: operation context
542 * @offset: current operation offset
543 * @size: size of the crypto operation
544 */
545struct mv_cesa_ablkcipher_std_req {
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200546 struct mv_cesa_op_ctx op;
547 unsigned int offset;
548 unsigned int size;
549 bool skip_ctx;
550};
551
552/**
553 * struct mv_cesa_ablkcipher_req - cipher request
554 * @req: type specific request information
555 * @src_nents: number of entries in the src sg list
556 * @dst_nents: number of entries in the dest sg list
557 */
558struct mv_cesa_ablkcipher_req {
Romain Perier53da7402016-06-21 10:08:35 +0200559 struct mv_cesa_req base;
560 struct mv_cesa_ablkcipher_std_req std;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200561 int src_nents;
562 int dst_nents;
563};
564
565/**
566 * struct mv_cesa_ahash_std_req - standard hash request
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200567 * @offset: current operation offset
568 */
569struct mv_cesa_ahash_std_req {
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200570 unsigned int offset;
571};
572
573/**
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200574 * struct mv_cesa_ahash_dma_req - DMA hash request
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200575 * @padding: padding buffer
576 * @padding_dma: DMA address of the padding buffer
577 * @cache_dma: DMA address of the cache buffer
578 */
579struct mv_cesa_ahash_dma_req {
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200580 u8 *padding;
581 dma_addr_t padding_dma;
Boris BREZILLON7850c912016-03-17 10:21:34 +0100582 u8 *cache;
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200583 dma_addr_t cache_dma;
584};
585
586/**
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200587 * struct mv_cesa_ahash_req - hash request
588 * @req: type specific request information
589 * @cache: cache buffer
590 * @cache_ptr: write pointer in the cache buffer
591 * @len: hash total length
592 * @src_nents: number of entries in the scatterlist
593 * @last_req: define whether the current operation is the last one
594 * or not
595 * @state: hash state
596 */
597struct mv_cesa_ahash_req {
Romain Perier53da7402016-06-21 10:08:35 +0200598 struct mv_cesa_req base;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200599 union {
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200600 struct mv_cesa_ahash_dma_req dma;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200601 struct mv_cesa_ahash_std_req std;
602 } req;
603 struct mv_cesa_op_ctx op_tmpl;
Boris BREZILLON7850c912016-03-17 10:21:34 +0100604 u8 cache[CESA_MAX_HASH_BLOCK_SIZE];
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200605 unsigned int cache_ptr;
606 u64 len;
607 int src_nents;
608 bool last_req;
Russell Kinga9eb6782015-10-18 17:23:40 +0100609 bool algo_le;
Russell King4c2b1302015-10-18 17:23:35 +0100610 u32 state[8];
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200611};
612
613/* CESA functions */
614
615extern struct mv_cesa_dev *cesa_dev;
616
Romain Perier85030c52016-06-21 10:08:39 +0200617
618static inline void
619mv_cesa_engine_enqueue_complete_request(struct mv_cesa_engine *engine,
620 struct crypto_async_request *req)
621{
622 list_add_tail(&req->list, &engine->complete_queue);
623}
624
625static inline struct crypto_async_request *
626mv_cesa_engine_dequeue_complete_request(struct mv_cesa_engine *engine)
627{
628 struct crypto_async_request *req;
629
630 req = list_first_entry_or_null(&engine->complete_queue,
631 struct crypto_async_request,
632 list);
633 if (req)
634 list_del(&req->list);
635
636 return req;
637}
638
639
Romain Perier53da7402016-06-21 10:08:35 +0200640static inline enum mv_cesa_req_type
641mv_cesa_req_get_type(struct mv_cesa_req *req)
642{
643 return req->chain.first ? CESA_DMA_REQ : CESA_STD_REQ;
644}
645
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200646static inline void mv_cesa_update_op_cfg(struct mv_cesa_op_ctx *op,
647 u32 cfg, u32 mask)
648{
649 op->desc.config &= cpu_to_le32(~mask);
650 op->desc.config |= cpu_to_le32(cfg);
651}
652
Russell Kingc439e4e2015-10-18 17:23:56 +0100653static inline u32 mv_cesa_get_op_cfg(const struct mv_cesa_op_ctx *op)
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200654{
655 return le32_to_cpu(op->desc.config);
656}
657
658static inline void mv_cesa_set_op_cfg(struct mv_cesa_op_ctx *op, u32 cfg)
659{
660 op->desc.config = cpu_to_le32(cfg);
661}
662
663static inline void mv_cesa_adjust_op(struct mv_cesa_engine *engine,
664 struct mv_cesa_op_ctx *op)
665{
666 u32 offset = engine->sram_dma & CESA_SA_SRAM_MSK;
667
668 op->desc.enc_p = CESA_SA_DESC_CRYPT_DATA(offset);
669 op->desc.enc_key_p = CESA_SA_DESC_CRYPT_KEY(offset);
670 op->desc.enc_iv = CESA_SA_DESC_CRYPT_IV(offset);
671 op->desc.mac_src_p &= ~CESA_SA_DESC_MAC_DATA_MSK;
672 op->desc.mac_src_p |= CESA_SA_DESC_MAC_DATA(offset);
673 op->desc.mac_digest &= ~CESA_SA_DESC_MAC_DIGEST_MSK;
674 op->desc.mac_digest |= CESA_SA_DESC_MAC_DIGEST(offset);
675 op->desc.mac_iv = CESA_SA_DESC_MAC_IV(offset);
676}
677
678static inline void mv_cesa_set_crypt_op_len(struct mv_cesa_op_ctx *op, int len)
679{
680 op->desc.enc_len = cpu_to_le32(len);
681}
682
683static inline void mv_cesa_set_mac_op_total_len(struct mv_cesa_op_ctx *op,
684 int len)
685{
686 op->desc.mac_src_p &= ~CESA_SA_DESC_MAC_TOTAL_LEN_MSK;
687 op->desc.mac_src_p |= CESA_SA_DESC_MAC_TOTAL_LEN(len);
688}
689
690static inline void mv_cesa_set_mac_op_frag_len(struct mv_cesa_op_ctx *op,
691 int len)
692{
693 op->desc.mac_digest &= ~CESA_SA_DESC_MAC_FRAG_LEN_MSK;
694 op->desc.mac_digest |= CESA_SA_DESC_MAC_FRAG_LEN(len);
695}
696
697static inline void mv_cesa_set_int_mask(struct mv_cesa_engine *engine,
698 u32 int_mask)
699{
700 if (int_mask == engine->int_mask)
701 return;
702
Russell Kingb1508562015-10-18 18:31:00 +0100703 writel_relaxed(int_mask, engine->regs + CESA_SA_INT_MSK);
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200704 engine->int_mask = int_mask;
705}
706
707static inline u32 mv_cesa_get_int_mask(struct mv_cesa_engine *engine)
708{
709 return engine->int_mask;
710}
711
Russell King86517912015-10-18 17:24:01 +0100712static inline bool mv_cesa_mac_op_is_first_frag(const struct mv_cesa_op_ctx *op)
713{
714 return (mv_cesa_get_op_cfg(op) & CESA_SA_DESC_CFG_FRAG_MSK) ==
715 CESA_SA_DESC_CFG_FIRST_FRAG;
716}
717
Romain Perier53da7402016-06-21 10:08:35 +0200718int mv_cesa_queue_req(struct crypto_async_request *req,
719 struct mv_cesa_req *creq);
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200720
Romain Perier85030c52016-06-21 10:08:39 +0200721struct crypto_async_request *
722mv_cesa_dequeue_req_locked(struct mv_cesa_engine *engine,
723 struct crypto_async_request **backlog);
724
Romain Perierbf8f91e2016-06-21 10:08:38 +0200725static inline struct mv_cesa_engine *mv_cesa_select_engine(int weight)
726{
727 int i;
728 u32 min_load = U32_MAX;
729 struct mv_cesa_engine *selected = NULL;
730
731 for (i = 0; i < cesa_dev->caps->nengines; i++) {
732 struct mv_cesa_engine *engine = cesa_dev->engines + i;
733 u32 load = atomic_read(&engine->load);
734 if (load < min_load) {
735 min_load = load;
736 selected = engine;
737 }
738 }
739
740 atomic_add(weight, &selected->load);
741
742 return selected;
743}
744
Thomas Petazzonicfcd2272015-09-18 17:25:36 +0200745/*
746 * Helper function that indicates whether a crypto request needs to be
747 * cleaned up or not after being enqueued using mv_cesa_queue_req().
748 */
749static inline int mv_cesa_req_needs_cleanup(struct crypto_async_request *req,
750 int ret)
751{
752 /*
753 * The queue still had some space, the request was queued
754 * normally, so there's no need to clean it up.
755 */
756 if (ret == -EINPROGRESS)
757 return false;
758
759 /*
760 * The queue had not space left, but since the request is
761 * flagged with CRYPTO_TFM_REQ_MAY_BACKLOG, it was added to
762 * the backlog and will be processed later. There's no need to
763 * clean it up.
764 */
765 if (ret == -EBUSY && req->flags & CRYPTO_TFM_REQ_MAY_BACKLOG)
766 return false;
767
768 /* Request wasn't queued, we need to clean it up */
769 return true;
770}
771
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200772/* TDMA functions */
773
774static inline void mv_cesa_req_dma_iter_init(struct mv_cesa_dma_iter *iter,
775 unsigned int len)
776{
777 iter->len = len;
778 iter->op_len = min(len, CESA_SA_SRAM_PAYLOAD_SIZE);
779 iter->offset = 0;
780}
781
782static inline void mv_cesa_sg_dma_iter_init(struct mv_cesa_sg_dma_iter *iter,
783 struct scatterlist *sg,
784 enum dma_data_direction dir)
785{
786 iter->op_offset = 0;
787 iter->offset = 0;
788 iter->sg = sg;
789 iter->dir = dir;
790}
791
792static inline unsigned int
793mv_cesa_req_dma_iter_transfer_len(struct mv_cesa_dma_iter *iter,
794 struct mv_cesa_sg_dma_iter *sgiter)
795{
796 return min(iter->op_len - sgiter->op_offset,
797 sg_dma_len(sgiter->sg) - sgiter->offset);
798}
799
800bool mv_cesa_req_dma_iter_next_transfer(struct mv_cesa_dma_iter *chain,
801 struct mv_cesa_sg_dma_iter *sgiter,
802 unsigned int len);
803
804static inline bool mv_cesa_req_dma_iter_next_op(struct mv_cesa_dma_iter *iter)
805{
806 iter->offset += iter->op_len;
807 iter->op_len = min(iter->len - iter->offset,
808 CESA_SA_SRAM_PAYLOAD_SIZE);
809
810 return iter->op_len;
811}
812
Romain Perier53da7402016-06-21 10:08:35 +0200813void mv_cesa_dma_step(struct mv_cesa_req *dreq);
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200814
Romain Perier53da7402016-06-21 10:08:35 +0200815static inline int mv_cesa_dma_process(struct mv_cesa_req *dreq,
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200816 u32 status)
817{
818 if (!(status & CESA_SA_INT_ACC0_IDMA_DONE))
819 return -EINPROGRESS;
820
821 if (status & CESA_SA_INT_IDMA_OWN_ERR)
822 return -EINVAL;
823
824 return 0;
825}
826
Romain Perier53da7402016-06-21 10:08:35 +0200827void mv_cesa_dma_prepare(struct mv_cesa_req *dreq,
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200828 struct mv_cesa_engine *engine);
Romain Perier53da7402016-06-21 10:08:35 +0200829void mv_cesa_dma_cleanup(struct mv_cesa_req *dreq);
Romain Perier85030c52016-06-21 10:08:39 +0200830void mv_cesa_tdma_chain(struct mv_cesa_engine *engine,
831 struct mv_cesa_req *dreq);
832int mv_cesa_tdma_process(struct mv_cesa_engine *engine, u32 status);
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200833
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200834
835static inline void
836mv_cesa_tdma_desc_iter_init(struct mv_cesa_tdma_chain *chain)
837{
838 memset(chain, 0, sizeof(*chain));
839}
840
Romain Perier0c996202016-10-05 09:56:32 +0200841int mv_cesa_dma_add_result_op(struct mv_cesa_tdma_chain *chain, dma_addr_t src,
Romain Perierbac8e802016-06-21 10:08:34 +0200842 u32 size, u32 flags, gfp_t gfp_flags);
843
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200844struct mv_cesa_op_ctx *mv_cesa_dma_add_op(struct mv_cesa_tdma_chain *chain,
845 const struct mv_cesa_op_ctx *op_templ,
846 bool skip_ctx,
847 gfp_t flags);
848
849int mv_cesa_dma_add_data_transfer(struct mv_cesa_tdma_chain *chain,
850 dma_addr_t dst, dma_addr_t src, u32 size,
851 u32 flags, gfp_t gfp_flags);
852
Russell King35622ea2015-10-18 18:31:10 +0100853int mv_cesa_dma_add_dummy_launch(struct mv_cesa_tdma_chain *chain, gfp_t flags);
854int mv_cesa_dma_add_dummy_end(struct mv_cesa_tdma_chain *chain, gfp_t flags);
Boris BREZILLONdb509a42015-06-18 15:46:21 +0200855
856int mv_cesa_dma_add_op_transfers(struct mv_cesa_tdma_chain *chain,
857 struct mv_cesa_dma_iter *dma_iter,
858 struct mv_cesa_sg_dma_iter *sgiter,
859 gfp_t gfp_flags);
860
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200861/* Algorithm definitions */
862
Arnaud Ebalard7aeef692015-06-18 15:46:24 +0200863extern struct ahash_alg mv_md5_alg;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200864extern struct ahash_alg mv_sha1_alg;
Arnaud Ebalardf85a7622015-06-18 15:46:25 +0200865extern struct ahash_alg mv_sha256_alg;
Arnaud Ebalard7aeef692015-06-18 15:46:24 +0200866extern struct ahash_alg mv_ahmac_md5_alg;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200867extern struct ahash_alg mv_ahmac_sha1_alg;
Arnaud Ebalardf85a7622015-06-18 15:46:25 +0200868extern struct ahash_alg mv_ahmac_sha256_alg;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200869
Boris BREZILLON7b3aaaa2015-06-18 15:46:22 +0200870extern struct crypto_alg mv_cesa_ecb_des_alg;
871extern struct crypto_alg mv_cesa_cbc_des_alg;
Arnaud Ebalard4ada4832015-06-18 15:46:23 +0200872extern struct crypto_alg mv_cesa_ecb_des3_ede_alg;
873extern struct crypto_alg mv_cesa_cbc_des3_ede_alg;
Boris BREZILLONf63601f2015-06-18 15:46:20 +0200874extern struct crypto_alg mv_cesa_ecb_aes_alg;
875extern struct crypto_alg mv_cesa_cbc_aes_alg;
876
877#endif /* __MARVELL_CESA_H__ */