blob: 7e7a8f01ea6b543fd41385e32f222db52be7af4c [file] [log] [blame]
Thomas Gleixnerc942fdd2019-05-27 08:55:06 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002/*
3 * 2007+ Copyright (c) Evgeniy Polyakov <johnpol@2ka.mipt.ru>
4 * All rights reserved.
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08005 */
6
7#include <linux/kernel.h>
8#include <linux/module.h>
Patrick McHardy37a80232007-11-21 12:47:13 +08009#include <linux/moduleparam.h>
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +080010#include <linux/mod_devicetable.h>
11#include <linux/interrupt.h>
12#include <linux/pci.h>
13#include <linux/slab.h>
14#include <linux/delay.h>
15#include <linux/mm.h>
Andrew Morton102d49d2007-11-13 21:55:28 +080016#include <linux/dma-mapping.h>
17#include <linux/scatterlist.h>
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +080018#include <linux/highmem.h>
19#include <linux/crypto.h>
Patrick McHardyfcd06752007-11-21 12:51:52 +080020#include <linux/hw_random.h>
21#include <linux/ktime.h>
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +080022
23#include <crypto/algapi.h>
Ard Biesheuvelf4ed6862019-08-15 12:00:53 +030024#include <crypto/internal/des.h>
Ard Biesheuvelb462973a2019-11-09 18:09:39 +010025#include <crypto/internal/skcipher.h>
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +080026
Patrick McHardy37a80232007-11-21 12:47:13 +080027static char hifn_pll_ref[sizeof("extNNN")] = "ext";
28module_param_string(hifn_pll_ref, hifn_pll_ref, sizeof(hifn_pll_ref), 0444);
29MODULE_PARM_DESC(hifn_pll_ref,
30 "PLL reference clock (pci[freq] or ext[freq], default ext)");
31
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +080032static atomic_t hifn_dev_number;
33
34#define ACRYPTO_OP_DECRYPT 0
35#define ACRYPTO_OP_ENCRYPT 1
36#define ACRYPTO_OP_HMAC 2
37#define ACRYPTO_OP_RNG 3
38
39#define ACRYPTO_MODE_ECB 0
40#define ACRYPTO_MODE_CBC 1
41#define ACRYPTO_MODE_CFB 2
42#define ACRYPTO_MODE_OFB 3
43
44#define ACRYPTO_TYPE_AES_128 0
45#define ACRYPTO_TYPE_AES_192 1
46#define ACRYPTO_TYPE_AES_256 2
47#define ACRYPTO_TYPE_3DES 3
48#define ACRYPTO_TYPE_DES 4
49
50#define PCI_VENDOR_ID_HIFN 0x13A3
51#define PCI_DEVICE_ID_HIFN_7955 0x0020
52#define PCI_DEVICE_ID_HIFN_7956 0x001d
53
54/* I/O region sizes */
55
56#define HIFN_BAR0_SIZE 0x1000
57#define HIFN_BAR1_SIZE 0x2000
58#define HIFN_BAR2_SIZE 0x8000
59
60/* DMA registres */
61
LABBE Corentin16f56e82015-10-22 08:51:52 +020062#define HIFN_DMA_CRA 0x0C /* DMA Command Ring Address */
63#define HIFN_DMA_SDRA 0x1C /* DMA Source Data Ring Address */
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +080064#define HIFN_DMA_RRA 0x2C /* DMA Result Ring Address */
65#define HIFN_DMA_DDRA 0x3C /* DMA Destination Data Ring Address */
66#define HIFN_DMA_STCTL 0x40 /* DMA Status and Control */
LABBE Corentin16f56e82015-10-22 08:51:52 +020067#define HIFN_DMA_INTREN 0x44 /* DMA Interrupt Enable */
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +080068#define HIFN_DMA_CFG1 0x48 /* DMA Configuration #1 */
69#define HIFN_DMA_CFG2 0x6C /* DMA Configuration #2 */
70#define HIFN_CHIP_ID 0x98 /* Chip ID */
71
72/*
73 * Processing Unit Registers (offset from BASEREG0)
74 */
75#define HIFN_0_PUDATA 0x00 /* Processing Unit Data */
76#define HIFN_0_PUCTRL 0x04 /* Processing Unit Control */
77#define HIFN_0_PUISR 0x08 /* Processing Unit Interrupt Status */
78#define HIFN_0_PUCNFG 0x0c /* Processing Unit Configuration */
79#define HIFN_0_PUIER 0x10 /* Processing Unit Interrupt Enable */
80#define HIFN_0_PUSTAT 0x14 /* Processing Unit Status/Chip ID */
81#define HIFN_0_FIFOSTAT 0x18 /* FIFO Status */
82#define HIFN_0_FIFOCNFG 0x1c /* FIFO Configuration */
83#define HIFN_0_SPACESIZE 0x20 /* Register space size */
84
85/* Processing Unit Control Register (HIFN_0_PUCTRL) */
86#define HIFN_PUCTRL_CLRSRCFIFO 0x0010 /* clear source fifo */
87#define HIFN_PUCTRL_STOP 0x0008 /* stop pu */
88#define HIFN_PUCTRL_LOCKRAM 0x0004 /* lock ram */
89#define HIFN_PUCTRL_DMAENA 0x0002 /* enable dma */
90#define HIFN_PUCTRL_RESET 0x0001 /* Reset processing unit */
91
92/* Processing Unit Interrupt Status Register (HIFN_0_PUISR) */
93#define HIFN_PUISR_CMDINVAL 0x8000 /* Invalid command interrupt */
94#define HIFN_PUISR_DATAERR 0x4000 /* Data error interrupt */
95#define HIFN_PUISR_SRCFIFO 0x2000 /* Source FIFO ready interrupt */
96#define HIFN_PUISR_DSTFIFO 0x1000 /* Destination FIFO ready interrupt */
97#define HIFN_PUISR_DSTOVER 0x0200 /* Destination overrun interrupt */
98#define HIFN_PUISR_SRCCMD 0x0080 /* Source command interrupt */
99#define HIFN_PUISR_SRCCTX 0x0040 /* Source context interrupt */
100#define HIFN_PUISR_SRCDATA 0x0020 /* Source data interrupt */
101#define HIFN_PUISR_DSTDATA 0x0010 /* Destination data interrupt */
102#define HIFN_PUISR_DSTRESULT 0x0004 /* Destination result interrupt */
103
104/* Processing Unit Configuration Register (HIFN_0_PUCNFG) */
105#define HIFN_PUCNFG_DRAMMASK 0xe000 /* DRAM size mask */
106#define HIFN_PUCNFG_DSZ_256K 0x0000 /* 256k dram */
107#define HIFN_PUCNFG_DSZ_512K 0x2000 /* 512k dram */
108#define HIFN_PUCNFG_DSZ_1M 0x4000 /* 1m dram */
109#define HIFN_PUCNFG_DSZ_2M 0x6000 /* 2m dram */
110#define HIFN_PUCNFG_DSZ_4M 0x8000 /* 4m dram */
111#define HIFN_PUCNFG_DSZ_8M 0xa000 /* 8m dram */
112#define HIFN_PUNCFG_DSZ_16M 0xc000 /* 16m dram */
113#define HIFN_PUCNFG_DSZ_32M 0xe000 /* 32m dram */
114#define HIFN_PUCNFG_DRAMREFRESH 0x1800 /* DRAM refresh rate mask */
115#define HIFN_PUCNFG_DRFR_512 0x0000 /* 512 divisor of ECLK */
116#define HIFN_PUCNFG_DRFR_256 0x0800 /* 256 divisor of ECLK */
117#define HIFN_PUCNFG_DRFR_128 0x1000 /* 128 divisor of ECLK */
118#define HIFN_PUCNFG_TCALLPHASES 0x0200 /* your guess is as good as mine... */
119#define HIFN_PUCNFG_TCDRVTOTEM 0x0100 /* your guess is as good as mine... */
120#define HIFN_PUCNFG_BIGENDIAN 0x0080 /* DMA big endian mode */
121#define HIFN_PUCNFG_BUS32 0x0040 /* Bus width 32bits */
122#define HIFN_PUCNFG_BUS16 0x0000 /* Bus width 16 bits */
123#define HIFN_PUCNFG_CHIPID 0x0020 /* Allow chipid from PUSTAT */
124#define HIFN_PUCNFG_DRAM 0x0010 /* Context RAM is DRAM */
125#define HIFN_PUCNFG_SRAM 0x0000 /* Context RAM is SRAM */
126#define HIFN_PUCNFG_COMPSING 0x0004 /* Enable single compression context */
127#define HIFN_PUCNFG_ENCCNFG 0x0002 /* Encryption configuration */
128
129/* Processing Unit Interrupt Enable Register (HIFN_0_PUIER) */
130#define HIFN_PUIER_CMDINVAL 0x8000 /* Invalid command interrupt */
131#define HIFN_PUIER_DATAERR 0x4000 /* Data error interrupt */
132#define HIFN_PUIER_SRCFIFO 0x2000 /* Source FIFO ready interrupt */
133#define HIFN_PUIER_DSTFIFO 0x1000 /* Destination FIFO ready interrupt */
134#define HIFN_PUIER_DSTOVER 0x0200 /* Destination overrun interrupt */
135#define HIFN_PUIER_SRCCMD 0x0080 /* Source command interrupt */
136#define HIFN_PUIER_SRCCTX 0x0040 /* Source context interrupt */
137#define HIFN_PUIER_SRCDATA 0x0020 /* Source data interrupt */
138#define HIFN_PUIER_DSTDATA 0x0010 /* Destination data interrupt */
139#define HIFN_PUIER_DSTRESULT 0x0004 /* Destination result interrupt */
140
141/* Processing Unit Status Register/Chip ID (HIFN_0_PUSTAT) */
142#define HIFN_PUSTAT_CMDINVAL 0x8000 /* Invalid command interrupt */
143#define HIFN_PUSTAT_DATAERR 0x4000 /* Data error interrupt */
144#define HIFN_PUSTAT_SRCFIFO 0x2000 /* Source FIFO ready interrupt */
145#define HIFN_PUSTAT_DSTFIFO 0x1000 /* Destination FIFO ready interrupt */
146#define HIFN_PUSTAT_DSTOVER 0x0200 /* Destination overrun interrupt */
147#define HIFN_PUSTAT_SRCCMD 0x0080 /* Source command interrupt */
148#define HIFN_PUSTAT_SRCCTX 0x0040 /* Source context interrupt */
149#define HIFN_PUSTAT_SRCDATA 0x0020 /* Source data interrupt */
150#define HIFN_PUSTAT_DSTDATA 0x0010 /* Destination data interrupt */
151#define HIFN_PUSTAT_DSTRESULT 0x0004 /* Destination result interrupt */
152#define HIFN_PUSTAT_CHIPREV 0x00ff /* Chip revision mask */
153#define HIFN_PUSTAT_CHIPENA 0xff00 /* Chip enabled mask */
154#define HIFN_PUSTAT_ENA_2 0x1100 /* Level 2 enabled */
155#define HIFN_PUSTAT_ENA_1 0x1000 /* Level 1 enabled */
156#define HIFN_PUSTAT_ENA_0 0x3000 /* Level 0 enabled */
157#define HIFN_PUSTAT_REV_2 0x0020 /* 7751 PT6/2 */
158#define HIFN_PUSTAT_REV_3 0x0030 /* 7751 PT6/3 */
159
160/* FIFO Status Register (HIFN_0_FIFOSTAT) */
161#define HIFN_FIFOSTAT_SRC 0x7f00 /* Source FIFO available */
162#define HIFN_FIFOSTAT_DST 0x007f /* Destination FIFO available */
163
164/* FIFO Configuration Register (HIFN_0_FIFOCNFG) */
165#define HIFN_FIFOCNFG_THRESHOLD 0x0400 /* must be written as 1 */
166
167/*
168 * DMA Interface Registers (offset from BASEREG1)
169 */
170#define HIFN_1_DMA_CRAR 0x0c /* DMA Command Ring Address */
171#define HIFN_1_DMA_SRAR 0x1c /* DMA Source Ring Address */
172#define HIFN_1_DMA_RRAR 0x2c /* DMA Result Ring Address */
173#define HIFN_1_DMA_DRAR 0x3c /* DMA Destination Ring Address */
174#define HIFN_1_DMA_CSR 0x40 /* DMA Status and Control */
175#define HIFN_1_DMA_IER 0x44 /* DMA Interrupt Enable */
176#define HIFN_1_DMA_CNFG 0x48 /* DMA Configuration */
177#define HIFN_1_PLL 0x4c /* 795x: PLL config */
178#define HIFN_1_7811_RNGENA 0x60 /* 7811: rng enable */
179#define HIFN_1_7811_RNGCFG 0x64 /* 7811: rng config */
180#define HIFN_1_7811_RNGDAT 0x68 /* 7811: rng data */
181#define HIFN_1_7811_RNGSTS 0x6c /* 7811: rng status */
182#define HIFN_1_7811_MIPSRST 0x94 /* 7811: MIPS reset */
183#define HIFN_1_REVID 0x98 /* Revision ID */
184#define HIFN_1_UNLOCK_SECRET1 0xf4
185#define HIFN_1_UNLOCK_SECRET2 0xfc
186#define HIFN_1_PUB_RESET 0x204 /* Public/RNG Reset */
187#define HIFN_1_PUB_BASE 0x300 /* Public Base Address */
188#define HIFN_1_PUB_OPLEN 0x304 /* Public Operand Length */
189#define HIFN_1_PUB_OP 0x308 /* Public Operand */
190#define HIFN_1_PUB_STATUS 0x30c /* Public Status */
191#define HIFN_1_PUB_IEN 0x310 /* Public Interrupt enable */
192#define HIFN_1_RNG_CONFIG 0x314 /* RNG config */
193#define HIFN_1_RNG_DATA 0x318 /* RNG data */
194#define HIFN_1_PUB_MEM 0x400 /* start of Public key memory */
195#define HIFN_1_PUB_MEMEND 0xbff /* end of Public key memory */
196
197/* DMA Status and Control Register (HIFN_1_DMA_CSR) */
198#define HIFN_DMACSR_D_CTRLMASK 0xc0000000 /* Destinition Ring Control */
199#define HIFN_DMACSR_D_CTRL_NOP 0x00000000 /* Dest. Control: no-op */
200#define HIFN_DMACSR_D_CTRL_DIS 0x40000000 /* Dest. Control: disable */
201#define HIFN_DMACSR_D_CTRL_ENA 0x80000000 /* Dest. Control: enable */
202#define HIFN_DMACSR_D_ABORT 0x20000000 /* Destinition Ring PCIAbort */
203#define HIFN_DMACSR_D_DONE 0x10000000 /* Destinition Ring Done */
204#define HIFN_DMACSR_D_LAST 0x08000000 /* Destinition Ring Last */
205#define HIFN_DMACSR_D_WAIT 0x04000000 /* Destinition Ring Waiting */
206#define HIFN_DMACSR_D_OVER 0x02000000 /* Destinition Ring Overflow */
207#define HIFN_DMACSR_R_CTRL 0x00c00000 /* Result Ring Control */
208#define HIFN_DMACSR_R_CTRL_NOP 0x00000000 /* Result Control: no-op */
209#define HIFN_DMACSR_R_CTRL_DIS 0x00400000 /* Result Control: disable */
210#define HIFN_DMACSR_R_CTRL_ENA 0x00800000 /* Result Control: enable */
211#define HIFN_DMACSR_R_ABORT 0x00200000 /* Result Ring PCI Abort */
212#define HIFN_DMACSR_R_DONE 0x00100000 /* Result Ring Done */
213#define HIFN_DMACSR_R_LAST 0x00080000 /* Result Ring Last */
214#define HIFN_DMACSR_R_WAIT 0x00040000 /* Result Ring Waiting */
215#define HIFN_DMACSR_R_OVER 0x00020000 /* Result Ring Overflow */
216#define HIFN_DMACSR_S_CTRL 0x0000c000 /* Source Ring Control */
217#define HIFN_DMACSR_S_CTRL_NOP 0x00000000 /* Source Control: no-op */
218#define HIFN_DMACSR_S_CTRL_DIS 0x00004000 /* Source Control: disable */
219#define HIFN_DMACSR_S_CTRL_ENA 0x00008000 /* Source Control: enable */
220#define HIFN_DMACSR_S_ABORT 0x00002000 /* Source Ring PCI Abort */
221#define HIFN_DMACSR_S_DONE 0x00001000 /* Source Ring Done */
222#define HIFN_DMACSR_S_LAST 0x00000800 /* Source Ring Last */
223#define HIFN_DMACSR_S_WAIT 0x00000400 /* Source Ring Waiting */
224#define HIFN_DMACSR_ILLW 0x00000200 /* Illegal write (7811 only) */
225#define HIFN_DMACSR_ILLR 0x00000100 /* Illegal read (7811 only) */
226#define HIFN_DMACSR_C_CTRL 0x000000c0 /* Command Ring Control */
227#define HIFN_DMACSR_C_CTRL_NOP 0x00000000 /* Command Control: no-op */
228#define HIFN_DMACSR_C_CTRL_DIS 0x00000040 /* Command Control: disable */
229#define HIFN_DMACSR_C_CTRL_ENA 0x00000080 /* Command Control: enable */
230#define HIFN_DMACSR_C_ABORT 0x00000020 /* Command Ring PCI Abort */
231#define HIFN_DMACSR_C_DONE 0x00000010 /* Command Ring Done */
232#define HIFN_DMACSR_C_LAST 0x00000008 /* Command Ring Last */
233#define HIFN_DMACSR_C_WAIT 0x00000004 /* Command Ring Waiting */
234#define HIFN_DMACSR_PUBDONE 0x00000002 /* Public op done (7951 only) */
235#define HIFN_DMACSR_ENGINE 0x00000001 /* Command Ring Engine IRQ */
236
237/* DMA Interrupt Enable Register (HIFN_1_DMA_IER) */
238#define HIFN_DMAIER_D_ABORT 0x20000000 /* Destination Ring PCIAbort */
239#define HIFN_DMAIER_D_DONE 0x10000000 /* Destination Ring Done */
240#define HIFN_DMAIER_D_LAST 0x08000000 /* Destination Ring Last */
241#define HIFN_DMAIER_D_WAIT 0x04000000 /* Destination Ring Waiting */
242#define HIFN_DMAIER_D_OVER 0x02000000 /* Destination Ring Overflow */
243#define HIFN_DMAIER_R_ABORT 0x00200000 /* Result Ring PCI Abort */
244#define HIFN_DMAIER_R_DONE 0x00100000 /* Result Ring Done */
245#define HIFN_DMAIER_R_LAST 0x00080000 /* Result Ring Last */
246#define HIFN_DMAIER_R_WAIT 0x00040000 /* Result Ring Waiting */
247#define HIFN_DMAIER_R_OVER 0x00020000 /* Result Ring Overflow */
248#define HIFN_DMAIER_S_ABORT 0x00002000 /* Source Ring PCI Abort */
249#define HIFN_DMAIER_S_DONE 0x00001000 /* Source Ring Done */
250#define HIFN_DMAIER_S_LAST 0x00000800 /* Source Ring Last */
251#define HIFN_DMAIER_S_WAIT 0x00000400 /* Source Ring Waiting */
252#define HIFN_DMAIER_ILLW 0x00000200 /* Illegal write (7811 only) */
253#define HIFN_DMAIER_ILLR 0x00000100 /* Illegal read (7811 only) */
254#define HIFN_DMAIER_C_ABORT 0x00000020 /* Command Ring PCI Abort */
255#define HIFN_DMAIER_C_DONE 0x00000010 /* Command Ring Done */
256#define HIFN_DMAIER_C_LAST 0x00000008 /* Command Ring Last */
257#define HIFN_DMAIER_C_WAIT 0x00000004 /* Command Ring Waiting */
258#define HIFN_DMAIER_PUBDONE 0x00000002 /* public op done (7951 only) */
259#define HIFN_DMAIER_ENGINE 0x00000001 /* Engine IRQ */
260
261/* DMA Configuration Register (HIFN_1_DMA_CNFG) */
262#define HIFN_DMACNFG_BIGENDIAN 0x10000000 /* big endian mode */
263#define HIFN_DMACNFG_POLLFREQ 0x00ff0000 /* Poll frequency mask */
264#define HIFN_DMACNFG_UNLOCK 0x00000800
265#define HIFN_DMACNFG_POLLINVAL 0x00000700 /* Invalid Poll Scalar */
266#define HIFN_DMACNFG_LAST 0x00000010 /* Host control LAST bit */
267#define HIFN_DMACNFG_MODE 0x00000004 /* DMA mode */
268#define HIFN_DMACNFG_DMARESET 0x00000002 /* DMA Reset # */
269#define HIFN_DMACNFG_MSTRESET 0x00000001 /* Master Reset # */
270
Patrick McHardy37a80232007-11-21 12:47:13 +0800271/* PLL configuration register */
272#define HIFN_PLL_REF_CLK_HBI 0x00000000 /* HBI reference clock */
273#define HIFN_PLL_REF_CLK_PLL 0x00000001 /* PLL reference clock */
274#define HIFN_PLL_BP 0x00000002 /* Reference clock bypass */
275#define HIFN_PLL_PK_CLK_HBI 0x00000000 /* PK engine HBI clock */
276#define HIFN_PLL_PK_CLK_PLL 0x00000008 /* PK engine PLL clock */
277#define HIFN_PLL_PE_CLK_HBI 0x00000000 /* PE engine HBI clock */
278#define HIFN_PLL_PE_CLK_PLL 0x00000010 /* PE engine PLL clock */
279#define HIFN_PLL_RESERVED_1 0x00000400 /* Reserved bit, must be 1 */
280#define HIFN_PLL_ND_SHIFT 11 /* Clock multiplier shift */
281#define HIFN_PLL_ND_MULT_2 0x00000000 /* PLL clock multiplier 2 */
282#define HIFN_PLL_ND_MULT_4 0x00000800 /* PLL clock multiplier 4 */
283#define HIFN_PLL_ND_MULT_6 0x00001000 /* PLL clock multiplier 6 */
284#define HIFN_PLL_ND_MULT_8 0x00001800 /* PLL clock multiplier 8 */
285#define HIFN_PLL_ND_MULT_10 0x00002000 /* PLL clock multiplier 10 */
286#define HIFN_PLL_ND_MULT_12 0x00002800 /* PLL clock multiplier 12 */
287#define HIFN_PLL_IS_1_8 0x00000000 /* charge pump (mult. 1-8) */
288#define HIFN_PLL_IS_9_12 0x00010000 /* charge pump (mult. 9-12) */
289
290#define HIFN_PLL_FCK_MAX 266 /* Maximum PLL frequency */
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800291
292/* Public key reset register (HIFN_1_PUB_RESET) */
293#define HIFN_PUBRST_RESET 0x00000001 /* reset public/rng unit */
294
295/* Public base address register (HIFN_1_PUB_BASE) */
296#define HIFN_PUBBASE_ADDR 0x00003fff /* base address */
297
298/* Public operand length register (HIFN_1_PUB_OPLEN) */
299#define HIFN_PUBOPLEN_MOD_M 0x0000007f /* modulus length mask */
300#define HIFN_PUBOPLEN_MOD_S 0 /* modulus length shift */
301#define HIFN_PUBOPLEN_EXP_M 0x0003ff80 /* exponent length mask */
Daniel Mack1537a362010-01-29 15:57:49 +0800302#define HIFN_PUBOPLEN_EXP_S 7 /* exponent length shift */
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800303#define HIFN_PUBOPLEN_RED_M 0x003c0000 /* reducend length mask */
304#define HIFN_PUBOPLEN_RED_S 18 /* reducend length shift */
305
306/* Public operation register (HIFN_1_PUB_OP) */
307#define HIFN_PUBOP_AOFFSET_M 0x0000007f /* A offset mask */
308#define HIFN_PUBOP_AOFFSET_S 0 /* A offset shift */
309#define HIFN_PUBOP_BOFFSET_M 0x00000f80 /* B offset mask */
310#define HIFN_PUBOP_BOFFSET_S 7 /* B offset shift */
311#define HIFN_PUBOP_MOFFSET_M 0x0003f000 /* M offset mask */
312#define HIFN_PUBOP_MOFFSET_S 12 /* M offset shift */
313#define HIFN_PUBOP_OP_MASK 0x003c0000 /* Opcode: */
314#define HIFN_PUBOP_OP_NOP 0x00000000 /* NOP */
315#define HIFN_PUBOP_OP_ADD 0x00040000 /* ADD */
316#define HIFN_PUBOP_OP_ADDC 0x00080000 /* ADD w/carry */
317#define HIFN_PUBOP_OP_SUB 0x000c0000 /* SUB */
318#define HIFN_PUBOP_OP_SUBC 0x00100000 /* SUB w/carry */
319#define HIFN_PUBOP_OP_MODADD 0x00140000 /* Modular ADD */
320#define HIFN_PUBOP_OP_MODSUB 0x00180000 /* Modular SUB */
321#define HIFN_PUBOP_OP_INCA 0x001c0000 /* INC A */
322#define HIFN_PUBOP_OP_DECA 0x00200000 /* DEC A */
323#define HIFN_PUBOP_OP_MULT 0x00240000 /* MULT */
324#define HIFN_PUBOP_OP_MODMULT 0x00280000 /* Modular MULT */
325#define HIFN_PUBOP_OP_MODRED 0x002c0000 /* Modular RED */
326#define HIFN_PUBOP_OP_MODEXP 0x00300000 /* Modular EXP */
327
328/* Public status register (HIFN_1_PUB_STATUS) */
329#define HIFN_PUBSTS_DONE 0x00000001 /* operation done */
330#define HIFN_PUBSTS_CARRY 0x00000002 /* carry */
331
332/* Public interrupt enable register (HIFN_1_PUB_IEN) */
333#define HIFN_PUBIEN_DONE 0x00000001 /* operation done interrupt */
334
335/* Random number generator config register (HIFN_1_RNG_CONFIG) */
336#define HIFN_RNGCFG_ENA 0x00000001 /* enable rng */
337
338#define HIFN_NAMESIZE 32
339#define HIFN_MAX_RESULT_ORDER 5
340
LABBE Corentin16f56e82015-10-22 08:51:52 +0200341#define HIFN_D_CMD_RSIZE (24 * 1)
342#define HIFN_D_SRC_RSIZE (80 * 1)
343#define HIFN_D_DST_RSIZE (80 * 1)
344#define HIFN_D_RES_RSIZE (24 * 1)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800345
Patrick McHardyd0690332008-05-07 22:33:37 +0800346#define HIFN_D_DST_DALIGN 4
347
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +0800348#define HIFN_QUEUE_LENGTH (HIFN_D_CMD_RSIZE - 1)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800349
350#define AES_MIN_KEY_SIZE 16
351#define AES_MAX_KEY_SIZE 32
352
353#define HIFN_DES_KEY_LENGTH 8
354#define HIFN_3DES_KEY_LENGTH 24
355#define HIFN_MAX_CRYPT_KEY_LENGTH AES_MAX_KEY_SIZE
356#define HIFN_IV_LENGTH 8
357#define HIFN_AES_IV_LENGTH 16
358#define HIFN_MAX_IV_LENGTH HIFN_AES_IV_LENGTH
359
360#define HIFN_MAC_KEY_LENGTH 64
361#define HIFN_MD5_LENGTH 16
362#define HIFN_SHA1_LENGTH 20
363#define HIFN_MAC_TRUNC_LENGTH 12
364
365#define HIFN_MAX_COMMAND (8 + 8 + 8 + 64 + 260)
366#define HIFN_MAX_RESULT (8 + 4 + 4 + 20 + 4)
367#define HIFN_USED_RESULT 12
368
LABBE Corentin16f56e82015-10-22 08:51:52 +0200369struct hifn_desc {
Al Viroe68970c2008-03-29 03:09:58 +0000370 volatile __le32 l;
371 volatile __le32 p;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800372};
373
374struct hifn_dma {
LABBE Corentin16f56e82015-10-22 08:51:52 +0200375 struct hifn_desc cmdr[HIFN_D_CMD_RSIZE + 1];
376 struct hifn_desc srcr[HIFN_D_SRC_RSIZE + 1];
377 struct hifn_desc dstr[HIFN_D_DST_RSIZE + 1];
378 struct hifn_desc resr[HIFN_D_RES_RSIZE + 1];
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800379
380 u8 command_bufs[HIFN_D_CMD_RSIZE][HIFN_MAX_COMMAND];
381 u8 result_bufs[HIFN_D_CMD_RSIZE][HIFN_MAX_RESULT];
382
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800383 /*
384 * Our current positions for insertion and removal from the descriptor
385 * rings.
386 */
387 volatile int cmdi, srci, dsti, resi;
388 volatile int cmdu, srcu, dstu, resu;
389 int cmdk, srck, dstk, resk;
390};
391
LABBE Corentin16f56e82015-10-22 08:51:52 +0200392#define HIFN_FLAG_CMD_BUSY (1 << 0)
393#define HIFN_FLAG_SRC_BUSY (1 << 1)
394#define HIFN_FLAG_DST_BUSY (1 << 2)
395#define HIFN_FLAG_RES_BUSY (1 << 3)
396#define HIFN_FLAG_OLD_KEY (1 << 4)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800397
398#define HIFN_DEFAULT_ACTIVE_NUM 5
399
LABBE Corentin16f56e82015-10-22 08:51:52 +0200400struct hifn_device {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800401 char name[HIFN_NAMESIZE];
402
403 int irq;
404
405 struct pci_dev *pdev;
406 void __iomem *bar[3];
407
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800408 void *desc_virt;
409 dma_addr_t desc_dma;
410
411 u32 dmareg;
412
LABBE Corentin16f56e82015-10-22 08:51:52 +0200413 void *sa[HIFN_D_RES_RSIZE];
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800414
415 spinlock_t lock;
416
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800417 u32 flags;
418 int active, started;
419 struct delayed_work work;
420 unsigned long reset;
421 unsigned long success;
422 unsigned long prev_success;
423
424 u8 snum;
425
Evgeniy Polyakova1e6ef22007-11-10 20:24:18 +0800426 struct tasklet_struct tasklet;
427
LABBE Corentin16f56e82015-10-22 08:51:52 +0200428 struct crypto_queue queue;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800429 struct list_head alg_list;
Patrick McHardyfcd06752007-11-21 12:51:52 +0800430
431 unsigned int pk_clk_freq;
432
Patrick McHardyf881d822008-02-15 19:15:05 +0800433#ifdef CONFIG_CRYPTO_DEV_HIFN_795X_RNG
Patrick McHardyfcd06752007-11-21 12:51:52 +0800434 unsigned int rng_wait_time;
435 ktime_t rngtime;
436 struct hwrng rng;
437#endif
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800438};
439
440#define HIFN_D_LENGTH 0x0000ffff
441#define HIFN_D_NOINVALID 0x01000000
442#define HIFN_D_MASKDONEIRQ 0x02000000
443#define HIFN_D_DESTOVER 0x04000000
444#define HIFN_D_OVER 0x08000000
445#define HIFN_D_LAST 0x20000000
446#define HIFN_D_JUMP 0x40000000
447#define HIFN_D_VALID 0x80000000
448
LABBE Corentin16f56e82015-10-22 08:51:52 +0200449struct hifn_base_command {
Al Viroe68970c2008-03-29 03:09:58 +0000450 volatile __le16 masks;
451 volatile __le16 session_num;
452 volatile __le16 total_source_count;
453 volatile __le16 total_dest_count;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800454};
455
456#define HIFN_BASE_CMD_COMP 0x0100 /* enable compression engine */
457#define HIFN_BASE_CMD_PAD 0x0200 /* enable padding engine */
458#define HIFN_BASE_CMD_MAC 0x0400 /* enable MAC engine */
459#define HIFN_BASE_CMD_CRYPT 0x0800 /* enable crypt engine */
460#define HIFN_BASE_CMD_DECODE 0x2000
461#define HIFN_BASE_CMD_SRCLEN_M 0xc000
462#define HIFN_BASE_CMD_SRCLEN_S 14
463#define HIFN_BASE_CMD_DSTLEN_M 0x3000
464#define HIFN_BASE_CMD_DSTLEN_S 12
465#define HIFN_BASE_CMD_LENMASK_HI 0x30000
466#define HIFN_BASE_CMD_LENMASK_LO 0x0ffff
467
468/*
469 * Structure to help build up the command data structure.
470 */
LABBE Corentin16f56e82015-10-22 08:51:52 +0200471struct hifn_crypt_command {
472 volatile __le16 masks;
473 volatile __le16 header_skip;
474 volatile __le16 source_count;
475 volatile __le16 reserved;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800476};
477
478#define HIFN_CRYPT_CMD_ALG_MASK 0x0003 /* algorithm: */
479#define HIFN_CRYPT_CMD_ALG_DES 0x0000 /* DES */
480#define HIFN_CRYPT_CMD_ALG_3DES 0x0001 /* 3DES */
481#define HIFN_CRYPT_CMD_ALG_RC4 0x0002 /* RC4 */
482#define HIFN_CRYPT_CMD_ALG_AES 0x0003 /* AES */
483#define HIFN_CRYPT_CMD_MODE_MASK 0x0018 /* Encrypt mode: */
484#define HIFN_CRYPT_CMD_MODE_ECB 0x0000 /* ECB */
485#define HIFN_CRYPT_CMD_MODE_CBC 0x0008 /* CBC */
486#define HIFN_CRYPT_CMD_MODE_CFB 0x0010 /* CFB */
487#define HIFN_CRYPT_CMD_MODE_OFB 0x0018 /* OFB */
488#define HIFN_CRYPT_CMD_CLR_CTX 0x0040 /* clear context */
489#define HIFN_CRYPT_CMD_KSZ_MASK 0x0600 /* AES key size: */
490#define HIFN_CRYPT_CMD_KSZ_128 0x0000 /* 128 bit */
491#define HIFN_CRYPT_CMD_KSZ_192 0x0200 /* 192 bit */
492#define HIFN_CRYPT_CMD_KSZ_256 0x0400 /* 256 bit */
493#define HIFN_CRYPT_CMD_NEW_KEY 0x0800 /* expect new key */
494#define HIFN_CRYPT_CMD_NEW_IV 0x1000 /* expect new iv */
495#define HIFN_CRYPT_CMD_SRCLEN_M 0xc000
496#define HIFN_CRYPT_CMD_SRCLEN_S 14
497
498/*
499 * Structure to help build up the command data structure.
500 */
LABBE Corentin16f56e82015-10-22 08:51:52 +0200501struct hifn_mac_command {
502 volatile __le16 masks;
503 volatile __le16 header_skip;
504 volatile __le16 source_count;
505 volatile __le16 reserved;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800506};
507
508#define HIFN_MAC_CMD_ALG_MASK 0x0001
509#define HIFN_MAC_CMD_ALG_SHA1 0x0000
510#define HIFN_MAC_CMD_ALG_MD5 0x0001
511#define HIFN_MAC_CMD_MODE_MASK 0x000c
512#define HIFN_MAC_CMD_MODE_HMAC 0x0000
513#define HIFN_MAC_CMD_MODE_SSL_MAC 0x0004
514#define HIFN_MAC_CMD_MODE_HASH 0x0008
515#define HIFN_MAC_CMD_MODE_FULL 0x0004
516#define HIFN_MAC_CMD_TRUNC 0x0010
517#define HIFN_MAC_CMD_RESULT 0x0020
518#define HIFN_MAC_CMD_APPEND 0x0040
519#define HIFN_MAC_CMD_SRCLEN_M 0xc000
520#define HIFN_MAC_CMD_SRCLEN_S 14
521
522/*
523 * MAC POS IPsec initiates authentication after encryption on encodes
524 * and before decryption on decodes.
525 */
526#define HIFN_MAC_CMD_POS_IPSEC 0x0200
527#define HIFN_MAC_CMD_NEW_KEY 0x0800
528
LABBE Corentin16f56e82015-10-22 08:51:52 +0200529struct hifn_comp_command {
530 volatile __le16 masks;
531 volatile __le16 header_skip;
532 volatile __le16 source_count;
533 volatile __le16 reserved;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800534};
535
536#define HIFN_COMP_CMD_SRCLEN_M 0xc000
537#define HIFN_COMP_CMD_SRCLEN_S 14
538#define HIFN_COMP_CMD_ONE 0x0100 /* must be one */
539#define HIFN_COMP_CMD_CLEARHIST 0x0010 /* clear history */
540#define HIFN_COMP_CMD_UPDATEHIST 0x0008 /* update history */
541#define HIFN_COMP_CMD_LZS_STRIP0 0x0004 /* LZS: strip zero */
542#define HIFN_COMP_CMD_MPPC_RESTART 0x0004 /* MPPC: restart */
543#define HIFN_COMP_CMD_ALG_MASK 0x0001 /* compression mode: */
544#define HIFN_COMP_CMD_ALG_MPPC 0x0001 /* MPPC */
545#define HIFN_COMP_CMD_ALG_LZS 0x0000 /* LZS */
546
LABBE Corentin16f56e82015-10-22 08:51:52 +0200547struct hifn_base_result {
548 volatile __le16 flags;
549 volatile __le16 session;
550 volatile __le16 src_cnt; /* 15:0 of source count */
551 volatile __le16 dst_cnt; /* 15:0 of dest count */
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800552};
553
554#define HIFN_BASE_RES_DSTOVERRUN 0x0200 /* destination overrun */
555#define HIFN_BASE_RES_SRCLEN_M 0xc000 /* 17:16 of source count */
556#define HIFN_BASE_RES_SRCLEN_S 14
557#define HIFN_BASE_RES_DSTLEN_M 0x3000 /* 17:16 of dest count */
558#define HIFN_BASE_RES_DSTLEN_S 12
559
LABBE Corentin16f56e82015-10-22 08:51:52 +0200560struct hifn_comp_result {
Patrick McHardy3c42cbc2008-05-07 22:28:27 +0800561 volatile __le16 flags;
562 volatile __le16 crc;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800563};
564
565#define HIFN_COMP_RES_LCB_M 0xff00 /* longitudinal check byte */
566#define HIFN_COMP_RES_LCB_S 8
567#define HIFN_COMP_RES_RESTART 0x0004 /* MPPC: restart */
568#define HIFN_COMP_RES_ENDMARKER 0x0002 /* LZS: end marker seen */
569#define HIFN_COMP_RES_SRC_NOTZERO 0x0001 /* source expired */
570
LABBE Corentin16f56e82015-10-22 08:51:52 +0200571struct hifn_mac_result {
572 volatile __le16 flags;
573 volatile __le16 reserved;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800574 /* followed by 0, 6, 8, or 10 u16's of the MAC, then crypt */
575};
576
577#define HIFN_MAC_RES_MISCOMPARE 0x0002 /* compare failed */
578#define HIFN_MAC_RES_SRC_NOTZERO 0x0001 /* source expired */
579
LABBE Corentin16f56e82015-10-22 08:51:52 +0200580struct hifn_crypt_result {
Patrick McHardy3c42cbc2008-05-07 22:28:27 +0800581 volatile __le16 flags;
582 volatile __le16 reserved;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800583};
584
585#define HIFN_CRYPT_RES_SRC_NOTZERO 0x0001 /* source expired */
586
587#ifndef HIFN_POLL_FREQUENCY
588#define HIFN_POLL_FREQUENCY 0x1
589#endif
590
591#ifndef HIFN_POLL_SCALAR
592#define HIFN_POLL_SCALAR 0x0
593#endif
594
LABBE Corentin16f56e82015-10-22 08:51:52 +0200595#define HIFN_MAX_SEGLEN 0xffff /* maximum dma segment len */
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800596#define HIFN_MAX_DMALEN 0x3ffff /* maximum dma length */
597
LABBE Corentin16f56e82015-10-22 08:51:52 +0200598struct hifn_crypto_alg {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800599 struct list_head entry;
Ard Biesheuvelb462973a2019-11-09 18:09:39 +0100600 struct skcipher_alg alg;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800601 struct hifn_device *dev;
602};
603
604#define ASYNC_SCATTERLIST_CACHE 16
605
LABBE Corentin16f56e82015-10-22 08:51:52 +0200606#define ASYNC_FLAGS_MISALIGNED (1 << 0)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800607
LABBE Corentin16f56e82015-10-22 08:51:52 +0200608struct hifn_cipher_walk {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800609 struct scatterlist cache[ASYNC_SCATTERLIST_CACHE];
610 u32 flags;
611 int num;
612};
613
LABBE Corentin16f56e82015-10-22 08:51:52 +0200614struct hifn_context {
Patrick McHardy5df4c0c2008-11-24 22:01:42 +0800615 u8 key[HIFN_MAX_CRYPT_KEY_LENGTH];
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800616 struct hifn_device *dev;
Patrick McHardy5df4c0c2008-11-24 22:01:42 +0800617 unsigned int keysize;
618};
619
LABBE Corentin16f56e82015-10-22 08:51:52 +0200620struct hifn_request_context {
Patrick McHardy5df4c0c2008-11-24 22:01:42 +0800621 u8 *iv;
622 unsigned int ivsize;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800623 u8 op, type, mode, unused;
David S. Miller33853292010-05-19 13:56:37 +1000624 struct hifn_cipher_walk walk;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800625};
626
Alexey Dobriyanb966b542008-01-08 21:36:34 +1100627#define crypto_alg_to_hifn(a) container_of(a, struct hifn_crypto_alg, alg)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800628
629static inline u32 hifn_read_0(struct hifn_device *dev, u32 reg)
630{
Masahiro Yamada36e09e12016-09-13 04:27:54 +0900631 return readl(dev->bar[0] + reg);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800632}
633
634static inline u32 hifn_read_1(struct hifn_device *dev, u32 reg)
635{
Masahiro Yamada36e09e12016-09-13 04:27:54 +0900636 return readl(dev->bar[1] + reg);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800637}
638
639static inline void hifn_write_0(struct hifn_device *dev, u32 reg, u32 val)
640{
Patrick McHardy3c42cbc2008-05-07 22:28:27 +0800641 writel((__force u32)cpu_to_le32(val), dev->bar[0] + reg);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800642}
643
644static inline void hifn_write_1(struct hifn_device *dev, u32 reg, u32 val)
645{
Patrick McHardy3c42cbc2008-05-07 22:28:27 +0800646 writel((__force u32)cpu_to_le32(val), dev->bar[1] + reg);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800647}
648
649static void hifn_wait_puc(struct hifn_device *dev)
650{
651 int i;
652 u32 ret;
653
LABBE Corentin16f56e82015-10-22 08:51:52 +0200654 for (i = 10000; i > 0; --i) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800655 ret = hifn_read_0(dev, HIFN_0_PUCTRL);
656 if (!(ret & HIFN_PUCTRL_RESET))
657 break;
658
659 udelay(1);
660 }
661
662 if (!i)
LABBE Corentincfeecab2015-10-22 08:51:51 +0200663 dev_err(&dev->pdev->dev, "Failed to reset PUC unit.\n");
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800664}
665
666static void hifn_reset_puc(struct hifn_device *dev)
667{
668 hifn_write_0(dev, HIFN_0_PUCTRL, HIFN_PUCTRL_DMAENA);
669 hifn_wait_puc(dev);
670}
671
672static void hifn_stop_device(struct hifn_device *dev)
673{
674 hifn_write_1(dev, HIFN_1_DMA_CSR,
675 HIFN_DMACSR_D_CTRL_DIS | HIFN_DMACSR_R_CTRL_DIS |
676 HIFN_DMACSR_S_CTRL_DIS | HIFN_DMACSR_C_CTRL_DIS);
677 hifn_write_0(dev, HIFN_0_PUIER, 0);
678 hifn_write_1(dev, HIFN_1_DMA_IER, 0);
679}
680
681static void hifn_reset_dma(struct hifn_device *dev, int full)
682{
683 hifn_stop_device(dev);
684
685 /*
686 * Setting poll frequency and others to 0.
687 */
688 hifn_write_1(dev, HIFN_1_DMA_CNFG, HIFN_DMACNFG_MSTRESET |
689 HIFN_DMACNFG_DMARESET | HIFN_DMACNFG_MODE);
690 mdelay(1);
691
692 /*
693 * Reset DMA.
694 */
695 if (full) {
696 hifn_write_1(dev, HIFN_1_DMA_CNFG, HIFN_DMACNFG_MODE);
697 mdelay(1);
698 } else {
699 hifn_write_1(dev, HIFN_1_DMA_CNFG, HIFN_DMACNFG_MODE |
700 HIFN_DMACNFG_MSTRESET);
701 hifn_reset_puc(dev);
702 }
703
704 hifn_write_1(dev, HIFN_1_DMA_CNFG, HIFN_DMACNFG_MSTRESET |
705 HIFN_DMACNFG_DMARESET | HIFN_DMACNFG_MODE);
706
707 hifn_reset_puc(dev);
708}
709
LABBE Corentin16f56e82015-10-22 08:51:52 +0200710static u32 hifn_next_signature(u32 a, u_int cnt)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800711{
712 int i;
713 u32 v;
714
715 for (i = 0; i < cnt; i++) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800716 /* get the parity */
717 v = a & 0x80080125;
718 v ^= v >> 16;
719 v ^= v >> 8;
720 v ^= v >> 4;
721 v ^= v >> 2;
722 v ^= v >> 1;
723
724 a = (v & 1) ^ (a << 1);
725 }
726
727 return a;
728}
729
730static struct pci2id {
731 u_short pci_vendor;
732 u_short pci_prod;
733 char card_id[13];
734} pci2id[] = {
735 {
736 PCI_VENDOR_ID_HIFN,
737 PCI_DEVICE_ID_HIFN_7955,
738 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
739 0x00, 0x00, 0x00, 0x00, 0x00 }
740 },
741 {
742 PCI_VENDOR_ID_HIFN,
743 PCI_DEVICE_ID_HIFN_7956,
744 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
745 0x00, 0x00, 0x00, 0x00, 0x00 }
746 }
747};
748
Patrick McHardyf881d822008-02-15 19:15:05 +0800749#ifdef CONFIG_CRYPTO_DEV_HIFN_795X_RNG
Patrick McHardyfcd06752007-11-21 12:51:52 +0800750static int hifn_rng_data_present(struct hwrng *rng, int wait)
751{
752 struct hifn_device *dev = (struct hifn_device *)rng->priv;
753 s64 nsec;
754
755 nsec = ktime_to_ns(ktime_sub(ktime_get(), dev->rngtime));
756 nsec -= dev->rng_wait_time;
757 if (nsec <= 0)
758 return 1;
759 if (!wait)
760 return 0;
761 ndelay(nsec);
762 return 1;
763}
764
765static int hifn_rng_data_read(struct hwrng *rng, u32 *data)
766{
767 struct hifn_device *dev = (struct hifn_device *)rng->priv;
768
769 *data = hifn_read_1(dev, HIFN_1_RNG_DATA);
770 dev->rngtime = ktime_get();
771 return 4;
772}
773
774static int hifn_register_rng(struct hifn_device *dev)
775{
776 /*
777 * We must wait at least 256 Pk_clk cycles between two reads of the rng.
778 */
Jussi Kivilinna76f16f82012-07-30 15:42:36 +0800779 dev->rng_wait_time = DIV_ROUND_UP_ULL(NSEC_PER_SEC,
780 dev->pk_clk_freq) * 256;
Patrick McHardyfcd06752007-11-21 12:51:52 +0800781
782 dev->rng.name = dev->name;
Julia Lawall77450fd2020-09-27 21:12:23 +0200783 dev->rng.data_present = hifn_rng_data_present;
784 dev->rng.data_read = hifn_rng_data_read;
Patrick McHardyfcd06752007-11-21 12:51:52 +0800785 dev->rng.priv = (unsigned long)dev;
786
787 return hwrng_register(&dev->rng);
788}
789
790static void hifn_unregister_rng(struct hifn_device *dev)
791{
792 hwrng_unregister(&dev->rng);
793}
794#else
795#define hifn_register_rng(dev) 0
796#define hifn_unregister_rng(dev)
797#endif
798
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800799static int hifn_init_pubrng(struct hifn_device *dev)
800{
801 int i;
802
803 hifn_write_1(dev, HIFN_1_PUB_RESET, hifn_read_1(dev, HIFN_1_PUB_RESET) |
804 HIFN_PUBRST_RESET);
805
LABBE Corentin16f56e82015-10-22 08:51:52 +0200806 for (i = 100; i > 0; --i) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800807 mdelay(1);
808
809 if ((hifn_read_1(dev, HIFN_1_PUB_RESET) & HIFN_PUBRST_RESET) == 0)
810 break;
811 }
812
LABBE Corentin16f56e82015-10-22 08:51:52 +0200813 if (!i) {
LABBE Corentincfeecab2015-10-22 08:51:51 +0200814 dev_err(&dev->pdev->dev, "Failed to initialise public key engine.\n");
LABBE Corentin16f56e82015-10-22 08:51:52 +0200815 } else {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800816 hifn_write_1(dev, HIFN_1_PUB_IEN, HIFN_PUBIEN_DONE);
817 dev->dmareg |= HIFN_DMAIER_PUBDONE;
818 hifn_write_1(dev, HIFN_1_DMA_IER, dev->dmareg);
819
LABBE Corentincfeecab2015-10-22 08:51:51 +0200820 dev_dbg(&dev->pdev->dev, "Public key engine has been successfully initialised.\n");
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800821 }
822
LABBE Corentin16f56e82015-10-22 08:51:52 +0200823 /* Enable RNG engine. */
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800824
825 hifn_write_1(dev, HIFN_1_RNG_CONFIG,
826 hifn_read_1(dev, HIFN_1_RNG_CONFIG) | HIFN_RNGCFG_ENA);
LABBE Corentincfeecab2015-10-22 08:51:51 +0200827 dev_dbg(&dev->pdev->dev, "RNG engine has been successfully initialised.\n");
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800828
Patrick McHardyf881d822008-02-15 19:15:05 +0800829#ifdef CONFIG_CRYPTO_DEV_HIFN_795X_RNG
Patrick McHardyfcd06752007-11-21 12:51:52 +0800830 /* First value must be discarded */
831 hifn_read_1(dev, HIFN_1_RNG_DATA);
832 dev->rngtime = ktime_get();
833#endif
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800834 return 0;
835}
836
837static int hifn_enable_crypto(struct hifn_device *dev)
838{
839 u32 dmacfg, addr;
840 char *offtbl = NULL;
841 int i;
842
Robert P. J. Day0936a942008-05-26 21:21:07 +1000843 for (i = 0; i < ARRAY_SIZE(pci2id); i++) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800844 if (pci2id[i].pci_vendor == dev->pdev->vendor &&
845 pci2id[i].pci_prod == dev->pdev->device) {
846 offtbl = pci2id[i].card_id;
847 break;
848 }
849 }
850
LABBE Corentin16f56e82015-10-22 08:51:52 +0200851 if (!offtbl) {
LABBE Corentincfeecab2015-10-22 08:51:51 +0200852 dev_err(&dev->pdev->dev, "Unknown card!\n");
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800853 return -ENODEV;
854 }
855
856 dmacfg = hifn_read_1(dev, HIFN_1_DMA_CNFG);
857
858 hifn_write_1(dev, HIFN_1_DMA_CNFG,
859 HIFN_DMACNFG_UNLOCK | HIFN_DMACNFG_MSTRESET |
860 HIFN_DMACNFG_DMARESET | HIFN_DMACNFG_MODE);
861 mdelay(1);
862 addr = hifn_read_1(dev, HIFN_1_UNLOCK_SECRET1);
863 mdelay(1);
864 hifn_write_1(dev, HIFN_1_UNLOCK_SECRET2, 0);
865 mdelay(1);
866
LABBE Corentin16f56e82015-10-22 08:51:52 +0200867 for (i = 0; i < 12; ++i) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800868 addr = hifn_next_signature(addr, offtbl[i] + 0x101);
869 hifn_write_1(dev, HIFN_1_UNLOCK_SECRET2, addr);
870
871 mdelay(1);
872 }
873 hifn_write_1(dev, HIFN_1_DMA_CNFG, dmacfg);
874
LABBE Corentincfeecab2015-10-22 08:51:51 +0200875 dev_dbg(&dev->pdev->dev, "%s %s.\n", dev->name, pci_name(dev->pdev));
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800876
877 return 0;
878}
879
880static void hifn_init_dma(struct hifn_device *dev)
881{
882 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
883 u32 dptr = dev->desc_dma;
884 int i;
885
LABBE Corentin16f56e82015-10-22 08:51:52 +0200886 for (i = 0; i < HIFN_D_CMD_RSIZE; ++i)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800887 dma->cmdr[i].p = __cpu_to_le32(dptr +
888 offsetof(struct hifn_dma, command_bufs[i][0]));
LABBE Corentin16f56e82015-10-22 08:51:52 +0200889 for (i = 0; i < HIFN_D_RES_RSIZE; ++i)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800890 dma->resr[i].p = __cpu_to_le32(dptr +
891 offsetof(struct hifn_dma, result_bufs[i][0]));
892
LABBE Corentin16f56e82015-10-22 08:51:52 +0200893 /* Setup LAST descriptors. */
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800894 dma->cmdr[HIFN_D_CMD_RSIZE].p = __cpu_to_le32(dptr +
895 offsetof(struct hifn_dma, cmdr[0]));
896 dma->srcr[HIFN_D_SRC_RSIZE].p = __cpu_to_le32(dptr +
897 offsetof(struct hifn_dma, srcr[0]));
898 dma->dstr[HIFN_D_DST_RSIZE].p = __cpu_to_le32(dptr +
899 offsetof(struct hifn_dma, dstr[0]));
900 dma->resr[HIFN_D_RES_RSIZE].p = __cpu_to_le32(dptr +
901 offsetof(struct hifn_dma, resr[0]));
902
903 dma->cmdu = dma->srcu = dma->dstu = dma->resu = 0;
904 dma->cmdi = dma->srci = dma->dsti = dma->resi = 0;
905 dma->cmdk = dma->srck = dma->dstk = dma->resk = 0;
906}
907
Patrick McHardy37a80232007-11-21 12:47:13 +0800908/*
909 * Initialize the PLL. We need to know the frequency of the reference clock
910 * to calculate the optimal multiplier. For PCI we assume 66MHz, since that
911 * allows us to operate without the risk of overclocking the chip. If it
912 * actually uses 33MHz, the chip will operate at half the speed, this can be
LABBE Corentin16f56e82015-10-22 08:51:52 +0200913 * overridden by specifying the frequency as module parameter (pci33).
Patrick McHardy37a80232007-11-21 12:47:13 +0800914 *
915 * Unfortunately the PCI clock is not very suitable since the HIFN needs a
916 * stable clock and the PCI clock frequency may vary, so the default is the
917 * external clock. There is no way to find out its frequency, we default to
918 * 66MHz since according to Mike Ham of HiFn, almost every board in existence
919 * has an external crystal populated at 66MHz.
920 */
921static void hifn_init_pll(struct hifn_device *dev)
922{
923 unsigned int freq, m;
924 u32 pllcfg;
925
926 pllcfg = HIFN_1_PLL | HIFN_PLL_RESERVED_1;
927
928 if (strncmp(hifn_pll_ref, "ext", 3) == 0)
929 pllcfg |= HIFN_PLL_REF_CLK_PLL;
930 else
931 pllcfg |= HIFN_PLL_REF_CLK_HBI;
932
933 if (hifn_pll_ref[3] != '\0')
934 freq = simple_strtoul(hifn_pll_ref + 3, NULL, 10);
935 else {
936 freq = 66;
LABBE Corentincfeecab2015-10-22 08:51:51 +0200937 dev_info(&dev->pdev->dev, "assuming %uMHz clock speed, override with hifn_pll_ref=%.3s<frequency>\n",
938 freq, hifn_pll_ref);
Patrick McHardy37a80232007-11-21 12:47:13 +0800939 }
940
941 m = HIFN_PLL_FCK_MAX / freq;
942
943 pllcfg |= (m / 2 - 1) << HIFN_PLL_ND_SHIFT;
944 if (m <= 8)
945 pllcfg |= HIFN_PLL_IS_1_8;
946 else
947 pllcfg |= HIFN_PLL_IS_9_12;
948
949 /* Select clock source and enable clock bypass */
950 hifn_write_1(dev, HIFN_1_PLL, pllcfg |
951 HIFN_PLL_PK_CLK_HBI | HIFN_PLL_PE_CLK_HBI | HIFN_PLL_BP);
952
953 /* Let the chip lock to the input clock */
954 mdelay(10);
955
956 /* Disable clock bypass */
957 hifn_write_1(dev, HIFN_1_PLL, pllcfg |
958 HIFN_PLL_PK_CLK_HBI | HIFN_PLL_PE_CLK_HBI);
959
960 /* Switch the engines to the PLL */
961 hifn_write_1(dev, HIFN_1_PLL, pllcfg |
962 HIFN_PLL_PK_CLK_PLL | HIFN_PLL_PE_CLK_PLL);
Patrick McHardyfcd06752007-11-21 12:51:52 +0800963
964 /*
965 * The Fpk_clk runs at half the total speed. Its frequency is needed to
966 * calculate the minimum time between two reads of the rng. Since 33MHz
967 * is actually 33.333... we overestimate the frequency here, resulting
968 * in slightly larger intervals.
969 */
970 dev->pk_clk_freq = 1000000 * (freq + 1) * m / 2;
Patrick McHardy37a80232007-11-21 12:47:13 +0800971}
972
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800973static void hifn_init_registers(struct hifn_device *dev)
974{
975 u32 dptr = dev->desc_dma;
976
977 /* Initialization magic... */
978 hifn_write_0(dev, HIFN_0_PUCTRL, HIFN_PUCTRL_DMAENA);
979 hifn_write_0(dev, HIFN_0_FIFOCNFG, HIFN_FIFOCNFG_THRESHOLD);
980 hifn_write_0(dev, HIFN_0_PUIER, HIFN_PUIER_DSTOVER);
981
982 /* write all 4 ring address registers */
Patrick McHardy3c42cbc2008-05-07 22:28:27 +0800983 hifn_write_1(dev, HIFN_1_DMA_CRAR, dptr +
984 offsetof(struct hifn_dma, cmdr[0]));
985 hifn_write_1(dev, HIFN_1_DMA_SRAR, dptr +
986 offsetof(struct hifn_dma, srcr[0]));
987 hifn_write_1(dev, HIFN_1_DMA_DRAR, dptr +
988 offsetof(struct hifn_dma, dstr[0]));
989 hifn_write_1(dev, HIFN_1_DMA_RRAR, dptr +
990 offsetof(struct hifn_dma, resr[0]));
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +0800991
992 mdelay(2);
993#if 0
994 hifn_write_1(dev, HIFN_1_DMA_CSR,
995 HIFN_DMACSR_D_CTRL_DIS | HIFN_DMACSR_R_CTRL_DIS |
996 HIFN_DMACSR_S_CTRL_DIS | HIFN_DMACSR_C_CTRL_DIS |
997 HIFN_DMACSR_D_ABORT | HIFN_DMACSR_D_DONE | HIFN_DMACSR_D_LAST |
998 HIFN_DMACSR_D_WAIT | HIFN_DMACSR_D_OVER |
999 HIFN_DMACSR_R_ABORT | HIFN_DMACSR_R_DONE | HIFN_DMACSR_R_LAST |
1000 HIFN_DMACSR_R_WAIT | HIFN_DMACSR_R_OVER |
1001 HIFN_DMACSR_S_ABORT | HIFN_DMACSR_S_DONE | HIFN_DMACSR_S_LAST |
1002 HIFN_DMACSR_S_WAIT |
1003 HIFN_DMACSR_C_ABORT | HIFN_DMACSR_C_DONE | HIFN_DMACSR_C_LAST |
1004 HIFN_DMACSR_C_WAIT |
1005 HIFN_DMACSR_ENGINE |
1006 HIFN_DMACSR_PUBDONE);
1007#else
1008 hifn_write_1(dev, HIFN_1_DMA_CSR,
1009 HIFN_DMACSR_C_CTRL_ENA | HIFN_DMACSR_S_CTRL_ENA |
1010 HIFN_DMACSR_D_CTRL_ENA | HIFN_DMACSR_R_CTRL_ENA |
1011 HIFN_DMACSR_D_ABORT | HIFN_DMACSR_D_DONE | HIFN_DMACSR_D_LAST |
1012 HIFN_DMACSR_D_WAIT | HIFN_DMACSR_D_OVER |
1013 HIFN_DMACSR_R_ABORT | HIFN_DMACSR_R_DONE | HIFN_DMACSR_R_LAST |
1014 HIFN_DMACSR_R_WAIT | HIFN_DMACSR_R_OVER |
1015 HIFN_DMACSR_S_ABORT | HIFN_DMACSR_S_DONE | HIFN_DMACSR_S_LAST |
1016 HIFN_DMACSR_S_WAIT |
1017 HIFN_DMACSR_C_ABORT | HIFN_DMACSR_C_DONE | HIFN_DMACSR_C_LAST |
1018 HIFN_DMACSR_C_WAIT |
1019 HIFN_DMACSR_ENGINE |
1020 HIFN_DMACSR_PUBDONE);
1021#endif
1022 hifn_read_1(dev, HIFN_1_DMA_CSR);
1023
1024 dev->dmareg |= HIFN_DMAIER_R_DONE | HIFN_DMAIER_C_ABORT |
1025 HIFN_DMAIER_D_OVER | HIFN_DMAIER_R_OVER |
1026 HIFN_DMAIER_S_ABORT | HIFN_DMAIER_D_ABORT | HIFN_DMAIER_R_ABORT |
1027 HIFN_DMAIER_ENGINE;
1028 dev->dmareg &= ~HIFN_DMAIER_C_WAIT;
1029
1030 hifn_write_1(dev, HIFN_1_DMA_IER, dev->dmareg);
1031 hifn_read_1(dev, HIFN_1_DMA_IER);
1032#if 0
1033 hifn_write_0(dev, HIFN_0_PUCNFG, HIFN_PUCNFG_ENCCNFG |
1034 HIFN_PUCNFG_DRFR_128 | HIFN_PUCNFG_TCALLPHASES |
1035 HIFN_PUCNFG_TCDRVTOTEM | HIFN_PUCNFG_BUS32 |
1036 HIFN_PUCNFG_DRAM);
1037#else
1038 hifn_write_0(dev, HIFN_0_PUCNFG, 0x10342);
1039#endif
Patrick McHardy37a80232007-11-21 12:47:13 +08001040 hifn_init_pll(dev);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001041
1042 hifn_write_0(dev, HIFN_0_PUISR, HIFN_PUISR_DSTOVER);
1043 hifn_write_1(dev, HIFN_1_DMA_CNFG, HIFN_DMACNFG_MSTRESET |
1044 HIFN_DMACNFG_DMARESET | HIFN_DMACNFG_MODE | HIFN_DMACNFG_LAST |
1045 ((HIFN_POLL_FREQUENCY << 16 ) & HIFN_DMACNFG_POLLFREQ) |
1046 ((HIFN_POLL_SCALAR << 8) & HIFN_DMACNFG_POLLINVAL));
1047}
1048
1049static int hifn_setup_base_command(struct hifn_device *dev, u8 *buf,
1050 unsigned dlen, unsigned slen, u16 mask, u8 snum)
1051{
1052 struct hifn_base_command *base_cmd;
1053 u8 *buf_pos = buf;
1054
1055 base_cmd = (struct hifn_base_command *)buf_pos;
1056 base_cmd->masks = __cpu_to_le16(mask);
1057 base_cmd->total_source_count =
1058 __cpu_to_le16(slen & HIFN_BASE_CMD_LENMASK_LO);
1059 base_cmd->total_dest_count =
1060 __cpu_to_le16(dlen & HIFN_BASE_CMD_LENMASK_LO);
1061
1062 dlen >>= 16;
1063 slen >>= 16;
1064 base_cmd->session_num = __cpu_to_le16(snum |
1065 ((slen << HIFN_BASE_CMD_SRCLEN_S) & HIFN_BASE_CMD_SRCLEN_M) |
1066 ((dlen << HIFN_BASE_CMD_DSTLEN_S) & HIFN_BASE_CMD_DSTLEN_M));
1067
1068 return sizeof(struct hifn_base_command);
1069}
1070
1071static int hifn_setup_crypto_command(struct hifn_device *dev,
1072 u8 *buf, unsigned dlen, unsigned slen,
1073 u8 *key, int keylen, u8 *iv, int ivsize, u16 mode)
1074{
1075 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1076 struct hifn_crypt_command *cry_cmd;
1077 u8 *buf_pos = buf;
1078 u16 cmd_len;
1079
1080 cry_cmd = (struct hifn_crypt_command *)buf_pos;
1081
1082 cry_cmd->source_count = __cpu_to_le16(dlen & 0xffff);
1083 dlen >>= 16;
1084 cry_cmd->masks = __cpu_to_le16(mode |
1085 ((dlen << HIFN_CRYPT_CMD_SRCLEN_S) &
1086 HIFN_CRYPT_CMD_SRCLEN_M));
1087 cry_cmd->header_skip = 0;
1088 cry_cmd->reserved = 0;
1089
1090 buf_pos += sizeof(struct hifn_crypt_command);
1091
1092 dma->cmdu++;
1093 if (dma->cmdu > 1) {
1094 dev->dmareg |= HIFN_DMAIER_C_WAIT;
1095 hifn_write_1(dev, HIFN_1_DMA_IER, dev->dmareg);
1096 }
1097
1098 if (keylen) {
1099 memcpy(buf_pos, key, keylen);
1100 buf_pos += keylen;
1101 }
1102 if (ivsize) {
1103 memcpy(buf_pos, iv, ivsize);
1104 buf_pos += ivsize;
1105 }
1106
1107 cmd_len = buf_pos - buf;
1108
1109 return cmd_len;
1110}
1111
Patrick McHardy85e7e602008-05-07 22:36:54 +08001112static int hifn_setup_cmd_desc(struct hifn_device *dev,
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001113 struct hifn_context *ctx, struct hifn_request_context *rctx,
1114 void *priv, unsigned int nbytes)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001115{
1116 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1117 int cmd_len, sa_idx;
1118 u8 *buf, *buf_pos;
1119 u16 mask;
1120
Patrick McHardy85e7e602008-05-07 22:36:54 +08001121 sa_idx = dma->cmdi;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001122 buf_pos = buf = dma->command_bufs[dma->cmdi];
1123
1124 mask = 0;
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001125 switch (rctx->op) {
LABBE Corentin16f56e82015-10-22 08:51:52 +02001126 case ACRYPTO_OP_DECRYPT:
1127 mask = HIFN_BASE_CMD_CRYPT | HIFN_BASE_CMD_DECODE;
1128 break;
1129 case ACRYPTO_OP_ENCRYPT:
1130 mask = HIFN_BASE_CMD_CRYPT;
1131 break;
1132 case ACRYPTO_OP_HMAC:
1133 mask = HIFN_BASE_CMD_MAC;
1134 break;
1135 default:
1136 goto err_out;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001137 }
1138
1139 buf_pos += hifn_setup_base_command(dev, buf_pos, nbytes,
1140 nbytes, mask, dev->snum);
1141
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001142 if (rctx->op == ACRYPTO_OP_ENCRYPT || rctx->op == ACRYPTO_OP_DECRYPT) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001143 u16 md = 0;
1144
1145 if (ctx->keysize)
1146 md |= HIFN_CRYPT_CMD_NEW_KEY;
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001147 if (rctx->iv && rctx->mode != ACRYPTO_MODE_ECB)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001148 md |= HIFN_CRYPT_CMD_NEW_IV;
1149
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001150 switch (rctx->mode) {
LABBE Corentin16f56e82015-10-22 08:51:52 +02001151 case ACRYPTO_MODE_ECB:
1152 md |= HIFN_CRYPT_CMD_MODE_ECB;
1153 break;
1154 case ACRYPTO_MODE_CBC:
1155 md |= HIFN_CRYPT_CMD_MODE_CBC;
1156 break;
1157 case ACRYPTO_MODE_CFB:
1158 md |= HIFN_CRYPT_CMD_MODE_CFB;
1159 break;
1160 case ACRYPTO_MODE_OFB:
1161 md |= HIFN_CRYPT_CMD_MODE_OFB;
1162 break;
1163 default:
1164 goto err_out;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001165 }
1166
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001167 switch (rctx->type) {
LABBE Corentin16f56e82015-10-22 08:51:52 +02001168 case ACRYPTO_TYPE_AES_128:
1169 if (ctx->keysize != 16)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001170 goto err_out;
LABBE Corentin16f56e82015-10-22 08:51:52 +02001171 md |= HIFN_CRYPT_CMD_KSZ_128 |
1172 HIFN_CRYPT_CMD_ALG_AES;
1173 break;
1174 case ACRYPTO_TYPE_AES_192:
1175 if (ctx->keysize != 24)
1176 goto err_out;
1177 md |= HIFN_CRYPT_CMD_KSZ_192 |
1178 HIFN_CRYPT_CMD_ALG_AES;
1179 break;
1180 case ACRYPTO_TYPE_AES_256:
1181 if (ctx->keysize != 32)
1182 goto err_out;
1183 md |= HIFN_CRYPT_CMD_KSZ_256 |
1184 HIFN_CRYPT_CMD_ALG_AES;
1185 break;
1186 case ACRYPTO_TYPE_3DES:
1187 if (ctx->keysize != 24)
1188 goto err_out;
1189 md |= HIFN_CRYPT_CMD_ALG_3DES;
1190 break;
1191 case ACRYPTO_TYPE_DES:
1192 if (ctx->keysize != 8)
1193 goto err_out;
1194 md |= HIFN_CRYPT_CMD_ALG_DES;
1195 break;
1196 default:
1197 goto err_out;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001198 }
1199
1200 buf_pos += hifn_setup_crypto_command(dev, buf_pos,
1201 nbytes, nbytes, ctx->key, ctx->keysize,
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001202 rctx->iv, rctx->ivsize, md);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001203 }
1204
1205 dev->sa[sa_idx] = priv;
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001206 dev->started++;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001207
1208 cmd_len = buf_pos - buf;
1209 dma->cmdr[dma->cmdi].l = __cpu_to_le32(cmd_len | HIFN_D_VALID |
1210 HIFN_D_LAST | HIFN_D_MASKDONEIRQ);
1211
1212 if (++dma->cmdi == HIFN_D_CMD_RSIZE) {
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001213 dma->cmdr[dma->cmdi].l = __cpu_to_le32(
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001214 HIFN_D_VALID | HIFN_D_LAST |
1215 HIFN_D_MASKDONEIRQ | HIFN_D_JUMP);
1216 dma->cmdi = 0;
LABBE Corentin16f56e82015-10-22 08:51:52 +02001217 } else {
1218 dma->cmdr[dma->cmdi - 1].l |= __cpu_to_le32(HIFN_D_VALID);
1219 }
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001220
1221 if (!(dev->flags & HIFN_FLAG_CMD_BUSY)) {
1222 hifn_write_1(dev, HIFN_1_DMA_CSR, HIFN_DMACSR_C_CTRL_ENA);
1223 dev->flags |= HIFN_FLAG_CMD_BUSY;
1224 }
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001225 return 0;
1226
1227err_out:
1228 return -EINVAL;
1229}
1230
Patrick McHardy85e7e602008-05-07 22:36:54 +08001231static int hifn_setup_src_desc(struct hifn_device *dev, struct page *page,
Patrick McHardy75741a02008-11-24 21:59:25 +08001232 unsigned int offset, unsigned int size, int last)
Patrick McHardy85e7e602008-05-07 22:36:54 +08001233{
1234 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1235 int idx;
1236 dma_addr_t addr;
1237
Christophe JAILLET0a772f32020-07-27 11:30:27 +02001238 addr = dma_map_page(&dev->pdev->dev, page, offset, size,
1239 DMA_TO_DEVICE);
Patrick McHardy85e7e602008-05-07 22:36:54 +08001240
1241 idx = dma->srci;
1242
1243 dma->srcr[idx].p = __cpu_to_le32(addr);
1244 dma->srcr[idx].l = __cpu_to_le32(size | HIFN_D_VALID |
Patrick McHardy75741a02008-11-24 21:59:25 +08001245 HIFN_D_MASKDONEIRQ | (last ? HIFN_D_LAST : 0));
Patrick McHardy85e7e602008-05-07 22:36:54 +08001246
1247 if (++idx == HIFN_D_SRC_RSIZE) {
1248 dma->srcr[idx].l = __cpu_to_le32(HIFN_D_VALID |
Patrick McHardy75741a02008-11-24 21:59:25 +08001249 HIFN_D_JUMP | HIFN_D_MASKDONEIRQ |
1250 (last ? HIFN_D_LAST : 0));
Patrick McHardy85e7e602008-05-07 22:36:54 +08001251 idx = 0;
1252 }
1253
1254 dma->srci = idx;
1255 dma->srcu++;
1256
1257 if (!(dev->flags & HIFN_FLAG_SRC_BUSY)) {
1258 hifn_write_1(dev, HIFN_1_DMA_CSR, HIFN_DMACSR_S_CTRL_ENA);
1259 dev->flags |= HIFN_FLAG_SRC_BUSY;
1260 }
1261
1262 return size;
1263}
1264
1265static void hifn_setup_res_desc(struct hifn_device *dev)
1266{
1267 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1268
1269 dma->resr[dma->resi].l = __cpu_to_le32(HIFN_USED_RESULT |
1270 HIFN_D_VALID | HIFN_D_LAST);
1271 /*
1272 * dma->resr[dma->resi].l = __cpu_to_le32(HIFN_MAX_RESULT | HIFN_D_VALID |
Patrick McHardy692af5d2008-05-07 22:37:29 +08001273 * HIFN_D_LAST);
Patrick McHardy85e7e602008-05-07 22:36:54 +08001274 */
1275
1276 if (++dma->resi == HIFN_D_RES_RSIZE) {
1277 dma->resr[HIFN_D_RES_RSIZE].l = __cpu_to_le32(HIFN_D_VALID |
1278 HIFN_D_JUMP | HIFN_D_MASKDONEIRQ | HIFN_D_LAST);
1279 dma->resi = 0;
1280 }
1281
1282 dma->resu++;
1283
1284 if (!(dev->flags & HIFN_FLAG_RES_BUSY)) {
1285 hifn_write_1(dev, HIFN_1_DMA_CSR, HIFN_DMACSR_R_CTRL_ENA);
1286 dev->flags |= HIFN_FLAG_RES_BUSY;
1287 }
1288}
1289
1290static void hifn_setup_dst_desc(struct hifn_device *dev, struct page *page,
Patrick McHardy75741a02008-11-24 21:59:25 +08001291 unsigned offset, unsigned size, int last)
Patrick McHardy85e7e602008-05-07 22:36:54 +08001292{
1293 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1294 int idx;
1295 dma_addr_t addr;
1296
Christophe JAILLET0a772f32020-07-27 11:30:27 +02001297 addr = dma_map_page(&dev->pdev->dev, page, offset, size,
1298 DMA_FROM_DEVICE);
Patrick McHardy85e7e602008-05-07 22:36:54 +08001299
1300 idx = dma->dsti;
1301 dma->dstr[idx].p = __cpu_to_le32(addr);
1302 dma->dstr[idx].l = __cpu_to_le32(size | HIFN_D_VALID |
Patrick McHardy75741a02008-11-24 21:59:25 +08001303 HIFN_D_MASKDONEIRQ | (last ? HIFN_D_LAST : 0));
Patrick McHardy85e7e602008-05-07 22:36:54 +08001304
1305 if (++idx == HIFN_D_DST_RSIZE) {
1306 dma->dstr[idx].l = __cpu_to_le32(HIFN_D_VALID |
1307 HIFN_D_JUMP | HIFN_D_MASKDONEIRQ |
Patrick McHardy75741a02008-11-24 21:59:25 +08001308 (last ? HIFN_D_LAST : 0));
Patrick McHardy85e7e602008-05-07 22:36:54 +08001309 idx = 0;
1310 }
1311 dma->dsti = idx;
1312 dma->dstu++;
1313
1314 if (!(dev->flags & HIFN_FLAG_DST_BUSY)) {
1315 hifn_write_1(dev, HIFN_1_DMA_CSR, HIFN_DMACSR_D_CTRL_ENA);
1316 dev->flags |= HIFN_FLAG_DST_BUSY;
1317 }
1318}
1319
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001320static int hifn_setup_dma(struct hifn_device *dev,
1321 struct hifn_context *ctx, struct hifn_request_context *rctx,
Patrick McHardy75741a02008-11-24 21:59:25 +08001322 struct scatterlist *src, struct scatterlist *dst,
1323 unsigned int nbytes, void *priv)
Patrick McHardy85e7e602008-05-07 22:36:54 +08001324{
Patrick McHardy75741a02008-11-24 21:59:25 +08001325 struct scatterlist *t;
1326 struct page *spage, *dpage;
1327 unsigned int soff, doff;
1328 unsigned int n, len;
1329
Patrick McHardy34161582008-11-24 22:00:49 +08001330 n = nbytes;
1331 while (n) {
1332 spage = sg_page(src);
1333 soff = src->offset;
1334 len = min(src->length, n);
1335
Patrick McHardy34161582008-11-24 22:00:49 +08001336 hifn_setup_src_desc(dev, spage, soff, len, n - len == 0);
1337
1338 src++;
1339 n -= len;
1340 }
1341
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001342 t = &rctx->walk.cache[0];
Patrick McHardy75741a02008-11-24 21:59:25 +08001343 n = nbytes;
1344 while (n) {
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001345 if (t->length && rctx->walk.flags & ASYNC_FLAGS_MISALIGNED) {
Evgeniy Polyakov5f459f02008-11-25 23:17:10 +08001346 BUG_ON(!sg_page(t));
Patrick McHardy34161582008-11-24 22:00:49 +08001347 dpage = sg_page(t);
1348 doff = 0;
Patrick McHardy75741a02008-11-24 21:59:25 +08001349 len = t->length;
1350 } else {
Evgeniy Polyakov5f459f02008-11-25 23:17:10 +08001351 BUG_ON(!sg_page(dst));
Patrick McHardy75741a02008-11-24 21:59:25 +08001352 dpage = sg_page(dst);
1353 doff = dst->offset;
Patrick McHardy75741a02008-11-24 21:59:25 +08001354 len = dst->length;
1355 }
1356 len = min(len, n);
1357
Patrick McHardy75741a02008-11-24 21:59:25 +08001358 hifn_setup_dst_desc(dev, dpage, doff, len, n - len == 0);
1359
Patrick McHardy75741a02008-11-24 21:59:25 +08001360 dst++;
1361 t++;
1362 n -= len;
1363 }
1364
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001365 hifn_setup_cmd_desc(dev, ctx, rctx, priv, nbytes);
Patrick McHardy85e7e602008-05-07 22:36:54 +08001366 hifn_setup_res_desc(dev);
1367 return 0;
1368}
1369
David S. Miller33853292010-05-19 13:56:37 +10001370static int hifn_cipher_walk_init(struct hifn_cipher_walk *w,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001371 int num, gfp_t gfp_flags)
1372{
1373 int i;
1374
1375 num = min(ASYNC_SCATTERLIST_CACHE, num);
1376 sg_init_table(w->cache, num);
1377
1378 w->num = 0;
LABBE Corentin16f56e82015-10-22 08:51:52 +02001379 for (i = 0; i < num; ++i) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001380 struct page *page = alloc_page(gfp_flags);
1381 struct scatterlist *s;
1382
1383 if (!page)
1384 break;
1385
1386 s = &w->cache[i];
1387
1388 sg_set_page(s, page, PAGE_SIZE, 0);
1389 w->num++;
1390 }
1391
1392 return i;
1393}
1394
David S. Miller33853292010-05-19 13:56:37 +10001395static void hifn_cipher_walk_exit(struct hifn_cipher_walk *w)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001396{
1397 int i;
1398
LABBE Corentin16f56e82015-10-22 08:51:52 +02001399 for (i = 0; i < w->num; ++i) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001400 struct scatterlist *s = &w->cache[i];
1401
1402 __free_page(sg_page(s));
1403
1404 s->length = 0;
1405 }
1406
1407 w->num = 0;
1408}
1409
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001410static int skcipher_add(unsigned int *drestp, struct scatterlist *dst,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001411 unsigned int size, unsigned int *nbytesp)
1412{
1413 unsigned int copy, drest = *drestp, nbytes = *nbytesp;
1414 int idx = 0;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001415
1416 if (drest < size || size > nbytes)
1417 return -EINVAL;
1418
1419 while (size) {
Hagen Paul Pfeifer732eacc2010-10-26 14:22:23 -07001420 copy = min3(drest, size, dst->length);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001421
1422 size -= copy;
1423 drest -= copy;
1424 nbytes -= copy;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001425
LABBE Corentincfeecab2015-10-22 08:51:51 +02001426 pr_debug("%s: copy: %u, size: %u, drest: %u, nbytes: %u.\n",
1427 __func__, copy, size, drest, nbytes);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001428
Patrick McHardy34161582008-11-24 22:00:49 +08001429 dst++;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001430 idx++;
1431 }
1432
1433 *nbytesp = nbytes;
1434 *drestp = drest;
1435
1436 return idx;
1437}
1438
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001439static int hifn_cipher_walk(struct skcipher_request *req,
David S. Miller33853292010-05-19 13:56:37 +10001440 struct hifn_cipher_walk *w)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001441{
Patrick McHardy34161582008-11-24 22:00:49 +08001442 struct scatterlist *dst, *t;
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001443 unsigned int nbytes = req->cryptlen, offset, copy, diff;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001444 int idx, tidx, err;
1445
1446 tidx = idx = 0;
1447 offset = 0;
1448 while (nbytes) {
1449 if (idx >= w->num && (w->flags & ASYNC_FLAGS_MISALIGNED))
1450 return -EINVAL;
1451
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001452 dst = &req->dst[idx];
1453
LABBE Corentincfeecab2015-10-22 08:51:51 +02001454 pr_debug("\n%s: dlen: %u, doff: %u, offset: %u, nbytes: %u.\n",
1455 __func__, dst->length, dst->offset, offset, nbytes);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001456
Patrick McHardyd0690332008-05-07 22:33:37 +08001457 if (!IS_ALIGNED(dst->offset, HIFN_D_DST_DALIGN) ||
1458 !IS_ALIGNED(dst->length, HIFN_D_DST_DALIGN) ||
1459 offset) {
Patrick McHardy34161582008-11-24 22:00:49 +08001460 unsigned slen = min(dst->length - offset, nbytes);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001461 unsigned dlen = PAGE_SIZE;
1462
1463 t = &w->cache[idx];
1464
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001465 err = skcipher_add(&dlen, dst, slen, &nbytes);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001466 if (err < 0)
Patrick McHardy34161582008-11-24 22:00:49 +08001467 return err;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001468
1469 idx += err;
1470
Patrick McHardyd0690332008-05-07 22:33:37 +08001471 copy = slen & ~(HIFN_D_DST_DALIGN - 1);
1472 diff = slen & (HIFN_D_DST_DALIGN - 1);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001473
1474 if (dlen < nbytes) {
1475 /*
1476 * Destination page does not have enough space
1477 * to put there additional blocksized chunk,
1478 * so we mark that page as containing only
1479 * blocksize aligned chunks:
LABBE Corentin16f56e82015-10-22 08:51:52 +02001480 * t->length = (slen & ~(HIFN_D_DST_DALIGN - 1));
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001481 * and increase number of bytes to be processed
1482 * in next chunk:
LABBE Corentin16f56e82015-10-22 08:51:52 +02001483 * nbytes += diff;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001484 */
1485 nbytes += diff;
1486
1487 /*
1488 * Temporary of course...
1489 * Kick author if you will catch this one.
1490 */
LABBE Corentincfeecab2015-10-22 08:51:51 +02001491 pr_err("%s: dlen: %u, nbytes: %u, slen: %u, offset: %u.\n",
1492 __func__, dlen, nbytes, slen, offset);
1493 pr_err("%s: please contact author to fix this "
1494 "issue, generally you should not catch "
1495 "this path under any condition but who "
1496 "knows how did you use crypto code.\n"
1497 "Thank you.\n", __func__);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001498 BUG();
1499 } else {
1500 copy += diff + nbytes;
1501
Patrick McHardy34161582008-11-24 22:00:49 +08001502 dst = &req->dst[idx];
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001503
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001504 err = skcipher_add(&dlen, dst, nbytes, &nbytes);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001505 if (err < 0)
Patrick McHardy34161582008-11-24 22:00:49 +08001506 return err;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001507
1508 idx += err;
1509 }
1510
1511 t->length = copy;
1512 t->offset = offset;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001513 } else {
Patrick McHardy34161582008-11-24 22:00:49 +08001514 nbytes -= min(dst->length, nbytes);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001515 idx++;
1516 }
1517
1518 tidx++;
1519 }
1520
1521 return tidx;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001522}
1523
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001524static int hifn_setup_session(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001525{
1526 struct hifn_context *ctx = crypto_tfm_ctx(req->base.tfm);
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001527 struct hifn_request_context *rctx = skcipher_request_ctx(req);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001528 struct hifn_device *dev = ctx->dev;
Patrick McHardy75741a02008-11-24 21:59:25 +08001529 unsigned long dlen, flags;
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001530 unsigned int nbytes = req->cryptlen, idx = 0;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001531 int err = -EINVAL, sg_num;
Patrick McHardy75741a02008-11-24 21:59:25 +08001532 struct scatterlist *dst;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001533
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001534 if (rctx->iv && !rctx->ivsize && rctx->mode != ACRYPTO_MODE_ECB)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001535 goto err_out_exit;
1536
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001537 rctx->walk.flags = 0;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001538
1539 while (nbytes) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001540 dst = &req->dst[idx];
Patrick McHardy136f7022008-05-07 22:34:27 +08001541 dlen = min(dst->length, nbytes);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001542
Patrick McHardyd0690332008-05-07 22:33:37 +08001543 if (!IS_ALIGNED(dst->offset, HIFN_D_DST_DALIGN) ||
Patrick McHardy136f7022008-05-07 22:34:27 +08001544 !IS_ALIGNED(dlen, HIFN_D_DST_DALIGN))
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001545 rctx->walk.flags |= ASYNC_FLAGS_MISALIGNED;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001546
Patrick McHardy136f7022008-05-07 22:34:27 +08001547 nbytes -= dlen;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001548 idx++;
1549 }
1550
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001551 if (rctx->walk.flags & ASYNC_FLAGS_MISALIGNED) {
David S. Miller33853292010-05-19 13:56:37 +10001552 err = hifn_cipher_walk_init(&rctx->walk, idx, GFP_ATOMIC);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001553 if (err < 0)
1554 return err;
1555 }
1556
David S. Miller33853292010-05-19 13:56:37 +10001557 sg_num = hifn_cipher_walk(req, &rctx->walk);
Patrick McHardy94eaa1b2008-05-07 22:32:28 +08001558 if (sg_num < 0) {
1559 err = sg_num;
1560 goto err_out_exit;
1561 }
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001562
1563 spin_lock_irqsave(&dev->lock, flags);
1564 if (dev->started + sg_num > HIFN_QUEUE_LENGTH) {
1565 err = -EAGAIN;
1566 goto err_out;
1567 }
1568
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001569 err = hifn_setup_dma(dev, ctx, rctx, req->src, req->dst, req->cryptlen, req);
Patrick McHardy75741a02008-11-24 21:59:25 +08001570 if (err)
1571 goto err_out;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001572
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001573 dev->snum++;
1574
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001575 dev->active = HIFN_DEFAULT_ACTIVE_NUM;
1576 spin_unlock_irqrestore(&dev->lock, flags);
1577
1578 return 0;
1579
1580err_out:
1581 spin_unlock_irqrestore(&dev->lock, flags);
1582err_out_exit:
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001583 if (err) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02001584 dev_info(&dev->pdev->dev, "iv: %p [%d], key: %p [%d], mode: %u, op: %u, "
1585 "type: %u, err: %d.\n",
1586 rctx->iv, rctx->ivsize,
1587 ctx->key, ctx->keysize,
1588 rctx->mode, rctx->op, rctx->type, err);
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001589 }
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001590
1591 return err;
1592}
1593
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001594static int hifn_start_device(struct hifn_device *dev)
1595{
1596 int err;
1597
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001598 dev->started = dev->active = 0;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001599 hifn_reset_dma(dev, 1);
1600
1601 err = hifn_enable_crypto(dev);
1602 if (err)
1603 return err;
1604
1605 hifn_reset_puc(dev);
1606
1607 hifn_init_dma(dev);
1608
1609 hifn_init_registers(dev);
1610
1611 hifn_init_pubrng(dev);
1612
1613 return 0;
1614}
1615
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001616static int skcipher_get(void *saddr, unsigned int *srestp, unsigned int offset,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001617 struct scatterlist *dst, unsigned int size, unsigned int *nbytesp)
1618{
1619 unsigned int srest = *srestp, nbytes = *nbytesp, copy;
1620 void *daddr;
1621 int idx = 0;
1622
1623 if (srest < size || size > nbytes)
1624 return -EINVAL;
1625
1626 while (size) {
Hagen Paul Pfeifer732eacc2010-10-26 14:22:23 -07001627 copy = min3(srest, dst->length, size);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001628
Cong Wang237f2592011-11-25 23:14:19 +08001629 daddr = kmap_atomic(sg_page(dst));
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001630 memcpy(daddr + dst->offset + offset, saddr, copy);
Cong Wang237f2592011-11-25 23:14:19 +08001631 kunmap_atomic(daddr);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001632
1633 nbytes -= copy;
1634 size -= copy;
1635 srest -= copy;
1636 saddr += copy;
1637 offset = 0;
1638
LABBE Corentincfeecab2015-10-22 08:51:51 +02001639 pr_debug("%s: copy: %u, size: %u, srest: %u, nbytes: %u.\n",
1640 __func__, copy, size, srest, nbytes);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001641
1642 dst++;
1643 idx++;
1644 }
1645
1646 *nbytesp = nbytes;
1647 *srestp = srest;
1648
1649 return idx;
1650}
1651
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001652static inline void hifn_complete_sa(struct hifn_device *dev, int i)
1653{
1654 unsigned long flags;
1655
1656 spin_lock_irqsave(&dev->lock, flags);
1657 dev->sa[i] = NULL;
1658 dev->started--;
1659 if (dev->started < 0)
LABBE Corentincfeecab2015-10-22 08:51:51 +02001660 dev_info(&dev->pdev->dev, "%s: started: %d.\n", __func__,
1661 dev->started);
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001662 spin_unlock_irqrestore(&dev->lock, flags);
1663 BUG_ON(dev->started < 0);
1664}
1665
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001666static void hifn_process_ready(struct skcipher_request *req, int error)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001667{
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001668 struct hifn_request_context *rctx = skcipher_request_ctx(req);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001669
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001670 if (rctx->walk.flags & ASYNC_FLAGS_MISALIGNED) {
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001671 unsigned int nbytes = req->cryptlen;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001672 int idx = 0, err;
1673 struct scatterlist *dst, *t;
1674 void *saddr;
1675
Patrick McHardy75741a02008-11-24 21:59:25 +08001676 while (nbytes) {
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08001677 t = &rctx->walk.cache[idx];
Patrick McHardy75741a02008-11-24 21:59:25 +08001678 dst = &req->dst[idx];
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001679
LABBE Corentincfeecab2015-10-22 08:51:51 +02001680 pr_debug("\n%s: sg_page(t): %p, t->length: %u, "
Patrick McHardy75741a02008-11-24 21:59:25 +08001681 "sg_page(dst): %p, dst->length: %u, "
1682 "nbytes: %u.\n",
1683 __func__, sg_page(t), t->length,
1684 sg_page(dst), dst->length, nbytes);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001685
Patrick McHardy75741a02008-11-24 21:59:25 +08001686 if (!t->length) {
1687 nbytes -= min(dst->length, nbytes);
1688 idx++;
1689 continue;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001690 }
1691
Cong Wang237f2592011-11-25 23:14:19 +08001692 saddr = kmap_atomic(sg_page(t));
Patrick McHardy75741a02008-11-24 21:59:25 +08001693
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001694 err = skcipher_get(saddr, &t->length, t->offset,
Patrick McHardy75741a02008-11-24 21:59:25 +08001695 dst, nbytes, &nbytes);
1696 if (err < 0) {
Cong Wang237f2592011-11-25 23:14:19 +08001697 kunmap_atomic(saddr);
Patrick McHardy75741a02008-11-24 21:59:25 +08001698 break;
1699 }
1700
1701 idx += err;
Cong Wang237f2592011-11-25 23:14:19 +08001702 kunmap_atomic(saddr);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001703 }
1704
David S. Miller33853292010-05-19 13:56:37 +10001705 hifn_cipher_walk_exit(&rctx->walk);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001706 }
Patrick McHardy75741a02008-11-24 21:59:25 +08001707
1708 req->base.complete(&req->base, error);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001709}
1710
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001711static void hifn_clear_rings(struct hifn_device *dev, int error)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001712{
1713 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1714 int i, u;
1715
LABBE Corentincfeecab2015-10-22 08:51:51 +02001716 dev_dbg(&dev->pdev->dev, "ring cleanup 1: i: %d.%d.%d.%d, u: %d.%d.%d.%d, "
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001717 "k: %d.%d.%d.%d.\n",
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001718 dma->cmdi, dma->srci, dma->dsti, dma->resi,
1719 dma->cmdu, dma->srcu, dma->dstu, dma->resu,
1720 dma->cmdk, dma->srck, dma->dstk, dma->resk);
1721
1722 i = dma->resk; u = dma->resu;
1723 while (u != 0) {
1724 if (dma->resr[i].l & __cpu_to_le32(HIFN_D_VALID))
1725 break;
1726
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001727 if (dev->sa[i]) {
1728 dev->success++;
1729 dev->reset = 0;
1730 hifn_process_ready(dev->sa[i], error);
1731 hifn_complete_sa(dev, i);
1732 }
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001733
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001734 if (++i == HIFN_D_RES_RSIZE)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001735 i = 0;
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001736 u--;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001737 }
1738 dma->resk = i; dma->resu = u;
1739
1740 i = dma->srck; u = dma->srcu;
1741 while (u != 0) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001742 if (dma->srcr[i].l & __cpu_to_le32(HIFN_D_VALID))
1743 break;
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001744 if (++i == HIFN_D_SRC_RSIZE)
1745 i = 0;
1746 u--;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001747 }
1748 dma->srck = i; dma->srcu = u;
1749
1750 i = dma->cmdk; u = dma->cmdu;
1751 while (u != 0) {
1752 if (dma->cmdr[i].l & __cpu_to_le32(HIFN_D_VALID))
1753 break;
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001754 if (++i == HIFN_D_CMD_RSIZE)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001755 i = 0;
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001756 u--;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001757 }
1758 dma->cmdk = i; dma->cmdu = u;
1759
1760 i = dma->dstk; u = dma->dstu;
1761 while (u != 0) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001762 if (dma->dstr[i].l & __cpu_to_le32(HIFN_D_VALID))
1763 break;
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001764 if (++i == HIFN_D_DST_RSIZE)
1765 i = 0;
1766 u--;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001767 }
1768 dma->dstk = i; dma->dstu = u;
1769
LABBE Corentincfeecab2015-10-22 08:51:51 +02001770 dev_dbg(&dev->pdev->dev, "ring cleanup 2: i: %d.%d.%d.%d, u: %d.%d.%d.%d, "
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001771 "k: %d.%d.%d.%d.\n",
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001772 dma->cmdi, dma->srci, dma->dsti, dma->resi,
1773 dma->cmdu, dma->srcu, dma->dstu, dma->resu,
1774 dma->cmdk, dma->srck, dma->dstk, dma->resk);
1775}
1776
1777static void hifn_work(struct work_struct *work)
1778{
Jean Delvarebf6aede2009-04-02 16:56:54 -07001779 struct delayed_work *dw = to_delayed_work(work);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001780 struct hifn_device *dev = container_of(dw, struct hifn_device, work);
1781 unsigned long flags;
1782 int reset = 0;
1783 u32 r = 0;
1784
1785 spin_lock_irqsave(&dev->lock, flags);
1786 if (dev->active == 0) {
1787 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1788
1789 if (dma->cmdu == 0 && (dev->flags & HIFN_FLAG_CMD_BUSY)) {
1790 dev->flags &= ~HIFN_FLAG_CMD_BUSY;
1791 r |= HIFN_DMACSR_C_CTRL_DIS;
1792 }
1793 if (dma->srcu == 0 && (dev->flags & HIFN_FLAG_SRC_BUSY)) {
1794 dev->flags &= ~HIFN_FLAG_SRC_BUSY;
1795 r |= HIFN_DMACSR_S_CTRL_DIS;
1796 }
1797 if (dma->dstu == 0 && (dev->flags & HIFN_FLAG_DST_BUSY)) {
1798 dev->flags &= ~HIFN_FLAG_DST_BUSY;
1799 r |= HIFN_DMACSR_D_CTRL_DIS;
1800 }
1801 if (dma->resu == 0 && (dev->flags & HIFN_FLAG_RES_BUSY)) {
1802 dev->flags &= ~HIFN_FLAG_RES_BUSY;
1803 r |= HIFN_DMACSR_R_CTRL_DIS;
1804 }
1805 if (r)
1806 hifn_write_1(dev, HIFN_1_DMA_CSR, r);
1807 } else
1808 dev->active--;
1809
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001810 if ((dev->prev_success == dev->success) && dev->started)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001811 reset = 1;
1812 dev->prev_success = dev->success;
1813 spin_unlock_irqrestore(&dev->lock, flags);
1814
1815 if (reset) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001816 if (++dev->reset >= 5) {
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001817 int i;
1818 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1819
LABBE Corentincfeecab2015-10-22 08:51:51 +02001820 dev_info(&dev->pdev->dev,
1821 "r: %08x, active: %d, started: %d, "
1822 "success: %lu: qlen: %u/%u, reset: %d.\n",
1823 r, dev->active, dev->started,
1824 dev->success, dev->queue.qlen, dev->queue.max_qlen,
1825 reset);
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001826
LABBE Corentincfeecab2015-10-22 08:51:51 +02001827 dev_info(&dev->pdev->dev, "%s: res: ", __func__);
LABBE Corentin16f56e82015-10-22 08:51:52 +02001828 for (i = 0; i < HIFN_D_RES_RSIZE; ++i) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02001829 pr_info("%x.%p ", dma->resr[i].l, dev->sa[i]);
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001830 if (dev->sa[i]) {
1831 hifn_process_ready(dev->sa[i], -ENODEV);
1832 hifn_complete_sa(dev, i);
1833 }
1834 }
LABBE Corentincfeecab2015-10-22 08:51:51 +02001835 pr_info("\n");
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001836
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001837 hifn_reset_dma(dev, 1);
1838 hifn_stop_device(dev);
1839 hifn_start_device(dev);
1840 dev->reset = 0;
1841 }
1842
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001843 tasklet_schedule(&dev->tasklet);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001844 }
1845
1846 schedule_delayed_work(&dev->work, HZ);
1847}
1848
1849static irqreturn_t hifn_interrupt(int irq, void *data)
1850{
1851 struct hifn_device *dev = (struct hifn_device *)data;
1852 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1853 u32 dmacsr, restart;
1854
1855 dmacsr = hifn_read_1(dev, HIFN_1_DMA_CSR);
1856
LABBE Corentincfeecab2015-10-22 08:51:51 +02001857 dev_dbg(&dev->pdev->dev, "1 dmacsr: %08x, dmareg: %08x, res: %08x [%d], "
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001858 "i: %d.%d.%d.%d, u: %d.%d.%d.%d.\n",
LABBE Corentincfeecab2015-10-22 08:51:51 +02001859 dmacsr, dev->dmareg, dmacsr & dev->dmareg, dma->cmdi,
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001860 dma->cmdi, dma->srci, dma->dsti, dma->resi,
1861 dma->cmdu, dma->srcu, dma->dstu, dma->resu);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001862
1863 if ((dmacsr & dev->dmareg) == 0)
1864 return IRQ_NONE;
1865
1866 hifn_write_1(dev, HIFN_1_DMA_CSR, dmacsr & dev->dmareg);
1867
1868 if (dmacsr & HIFN_DMACSR_ENGINE)
1869 hifn_write_0(dev, HIFN_0_PUISR, hifn_read_0(dev, HIFN_0_PUISR));
1870 if (dmacsr & HIFN_DMACSR_PUBDONE)
1871 hifn_write_1(dev, HIFN_1_PUB_STATUS,
1872 hifn_read_1(dev, HIFN_1_PUB_STATUS) | HIFN_PUBSTS_DONE);
1873
1874 restart = dmacsr & (HIFN_DMACSR_R_OVER | HIFN_DMACSR_D_OVER);
1875 if (restart) {
1876 u32 puisr = hifn_read_0(dev, HIFN_0_PUISR);
1877
LABBE Corentincfeecab2015-10-22 08:51:51 +02001878 dev_warn(&dev->pdev->dev, "overflow: r: %d, d: %d, puisr: %08x, d: %u.\n",
1879 !!(dmacsr & HIFN_DMACSR_R_OVER),
1880 !!(dmacsr & HIFN_DMACSR_D_OVER),
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001881 puisr, !!(puisr & HIFN_PUISR_DSTOVER));
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001882 if (!!(puisr & HIFN_PUISR_DSTOVER))
1883 hifn_write_0(dev, HIFN_0_PUISR, HIFN_PUISR_DSTOVER);
1884 hifn_write_1(dev, HIFN_1_DMA_CSR, dmacsr & (HIFN_DMACSR_R_OVER |
1885 HIFN_DMACSR_D_OVER));
1886 }
1887
1888 restart = dmacsr & (HIFN_DMACSR_C_ABORT | HIFN_DMACSR_S_ABORT |
1889 HIFN_DMACSR_D_ABORT | HIFN_DMACSR_R_ABORT);
1890 if (restart) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02001891 dev_warn(&dev->pdev->dev, "abort: c: %d, s: %d, d: %d, r: %d.\n",
1892 !!(dmacsr & HIFN_DMACSR_C_ABORT),
1893 !!(dmacsr & HIFN_DMACSR_S_ABORT),
1894 !!(dmacsr & HIFN_DMACSR_D_ABORT),
1895 !!(dmacsr & HIFN_DMACSR_R_ABORT));
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001896 hifn_reset_dma(dev, 1);
1897 hifn_init_dma(dev);
1898 hifn_init_registers(dev);
1899 }
1900
1901 if ((dmacsr & HIFN_DMACSR_C_WAIT) && (dma->cmdu == 0)) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02001902 dev_dbg(&dev->pdev->dev, "wait on command.\n");
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001903 dev->dmareg &= ~(HIFN_DMAIER_C_WAIT);
1904 hifn_write_1(dev, HIFN_1_DMA_IER, dev->dmareg);
1905 }
1906
Evgeniy Polyakova1e6ef22007-11-10 20:24:18 +08001907 tasklet_schedule(&dev->tasklet);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001908
1909 return IRQ_HANDLED;
1910}
1911
1912static void hifn_flush(struct hifn_device *dev)
1913{
1914 unsigned long flags;
1915 struct crypto_async_request *async_req;
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001916 struct skcipher_request *req;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001917 struct hifn_dma *dma = (struct hifn_dma *)dev->desc_virt;
1918 int i;
1919
LABBE Corentin16f56e82015-10-22 08:51:52 +02001920 for (i = 0; i < HIFN_D_RES_RSIZE; ++i) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001921 struct hifn_desc *d = &dma->resr[i];
1922
1923 if (dev->sa[i]) {
1924 hifn_process_ready(dev->sa[i],
LABBE Corentin16f56e82015-10-22 08:51:52 +02001925 (d->l & __cpu_to_le32(HIFN_D_VALID)) ? -ENODEV : 0);
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001926 hifn_complete_sa(dev, i);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001927 }
1928 }
1929
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001930 spin_lock_irqsave(&dev->lock, flags);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001931 while ((async_req = crypto_dequeue_request(&dev->queue))) {
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001932 req = skcipher_request_cast(async_req);
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001933 spin_unlock_irqrestore(&dev->lock, flags);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001934
1935 hifn_process_ready(req, -ENODEV);
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08001936
1937 spin_lock_irqsave(&dev->lock, flags);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001938 }
1939 spin_unlock_irqrestore(&dev->lock, flags);
1940}
1941
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001942static int hifn_setkey(struct crypto_skcipher *cipher, const u8 *key,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001943 unsigned int len)
1944{
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001945 struct hifn_context *ctx = crypto_skcipher_ctx(cipher);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001946 struct hifn_device *dev = ctx->dev;
Ard Biesheuvelf4ed6862019-08-15 12:00:53 +03001947 int err;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001948
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001949 err = verify_skcipher_des_key(cipher, key);
Ard Biesheuvelf4ed6862019-08-15 12:00:53 +03001950 if (err)
1951 return err;
Evgeniy Polyakovc3041f92007-10-11 19:58:16 +08001952
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001953 dev->flags &= ~HIFN_FLAG_OLD_KEY;
1954
1955 memcpy(ctx->key, key, len);
1956 ctx->keysize = len;
1957
1958 return 0;
1959}
1960
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001961static int hifn_des3_setkey(struct crypto_skcipher *cipher, const u8 *key,
Herbert Xu270e21d2019-04-11 16:51:07 +08001962 unsigned int len)
1963{
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001964 struct hifn_context *ctx = crypto_skcipher_ctx(cipher);
Herbert Xu270e21d2019-04-11 16:51:07 +08001965 struct hifn_device *dev = ctx->dev;
Herbert Xu270e21d2019-04-11 16:51:07 +08001966 int err;
1967
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001968 err = verify_skcipher_des3_key(cipher, key);
Ard Biesheuvelf4ed6862019-08-15 12:00:53 +03001969 if (err)
Herbert Xu270e21d2019-04-11 16:51:07 +08001970 return err;
Herbert Xu270e21d2019-04-11 16:51:07 +08001971
1972 dev->flags &= ~HIFN_FLAG_OLD_KEY;
1973
1974 memcpy(ctx->key, key, len);
1975 ctx->keysize = len;
1976
1977 return 0;
1978}
1979
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001980static int hifn_handle_req(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001981{
1982 struct hifn_context *ctx = crypto_tfm_ctx(req->base.tfm);
1983 struct hifn_device *dev = ctx->dev;
1984 int err = -EAGAIN;
1985
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001986 if (dev->started + DIV_ROUND_UP(req->cryptlen, PAGE_SIZE) <= HIFN_QUEUE_LENGTH)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001987 err = hifn_setup_session(req);
1988
1989 if (err == -EAGAIN) {
1990 unsigned long flags;
1991
1992 spin_lock_irqsave(&dev->lock, flags);
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01001993 err = crypto_enqueue_request(&dev->queue, &req->base);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08001994 spin_unlock_irqrestore(&dev->lock, flags);
1995 }
1996
1997 return err;
1998}
1999
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002000static int hifn_setup_crypto_req(struct skcipher_request *req, u8 op,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002001 u8 type, u8 mode)
2002{
2003 struct hifn_context *ctx = crypto_tfm_ctx(req->base.tfm);
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002004 struct hifn_request_context *rctx = skcipher_request_ctx(req);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002005 unsigned ivsize;
2006
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002007 ivsize = crypto_skcipher_ivsize(crypto_skcipher_reqtfm(req));
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002008
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002009 if (req->iv && mode != ACRYPTO_MODE_ECB) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002010 if (type == ACRYPTO_TYPE_AES_128)
2011 ivsize = HIFN_AES_IV_LENGTH;
2012 else if (type == ACRYPTO_TYPE_DES)
2013 ivsize = HIFN_DES_KEY_LENGTH;
2014 else if (type == ACRYPTO_TYPE_3DES)
2015 ivsize = HIFN_3DES_KEY_LENGTH;
2016 }
2017
2018 if (ctx->keysize != 16 && type == ACRYPTO_TYPE_AES_128) {
2019 if (ctx->keysize == 24)
2020 type = ACRYPTO_TYPE_AES_192;
2021 else if (ctx->keysize == 32)
2022 type = ACRYPTO_TYPE_AES_256;
2023 }
2024
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08002025 rctx->op = op;
2026 rctx->mode = mode;
2027 rctx->type = type;
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002028 rctx->iv = req->iv;
Patrick McHardy5df4c0c2008-11-24 22:01:42 +08002029 rctx->ivsize = ivsize;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002030
2031 /*
2032 * HEAVY TODO: needs to kick Herbert XU to write documentation.
2033 * HEAVY TODO: needs to kick Herbert XU to write documentation.
2034 * HEAVY TODO: needs to kick Herbert XU to write documentation.
2035 */
2036
2037 return hifn_handle_req(req);
2038}
2039
2040static int hifn_process_queue(struct hifn_device *dev)
2041{
Patrick McHardyed4f92e2008-11-24 22:02:55 +08002042 struct crypto_async_request *async_req, *backlog;
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002043 struct skcipher_request *req;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002044 unsigned long flags;
2045 int err = 0;
2046
2047 while (dev->started < HIFN_QUEUE_LENGTH) {
2048 spin_lock_irqsave(&dev->lock, flags);
Patrick McHardyed4f92e2008-11-24 22:02:55 +08002049 backlog = crypto_get_backlog(&dev->queue);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002050 async_req = crypto_dequeue_request(&dev->queue);
2051 spin_unlock_irqrestore(&dev->lock, flags);
2052
2053 if (!async_req)
2054 break;
2055
Patrick McHardyed4f92e2008-11-24 22:02:55 +08002056 if (backlog)
2057 backlog->complete(backlog, -EINPROGRESS);
2058
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002059 req = skcipher_request_cast(async_req);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002060
2061 err = hifn_handle_req(req);
2062 if (err)
2063 break;
2064 }
2065
2066 return err;
2067}
2068
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002069static int hifn_setup_crypto(struct skcipher_request *req, u8 op,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002070 u8 type, u8 mode)
2071{
2072 int err;
2073 struct hifn_context *ctx = crypto_tfm_ctx(req->base.tfm);
2074 struct hifn_device *dev = ctx->dev;
2075
2076 err = hifn_setup_crypto_req(req, op, type, mode);
2077 if (err)
2078 return err;
2079
2080 if (dev->started < HIFN_QUEUE_LENGTH && dev->queue.qlen)
Patrick McHardy9e70a402008-05-07 22:31:35 +08002081 hifn_process_queue(dev);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002082
Patrick McHardy9e70a402008-05-07 22:31:35 +08002083 return -EINPROGRESS;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002084}
2085
2086/*
2087 * AES ecryption functions.
2088 */
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002089static inline int hifn_encrypt_aes_ecb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002090{
2091 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2092 ACRYPTO_TYPE_AES_128, ACRYPTO_MODE_ECB);
2093}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002094static inline int hifn_encrypt_aes_cbc(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002095{
2096 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2097 ACRYPTO_TYPE_AES_128, ACRYPTO_MODE_CBC);
2098}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002099static inline int hifn_encrypt_aes_cfb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002100{
2101 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2102 ACRYPTO_TYPE_AES_128, ACRYPTO_MODE_CFB);
2103}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002104static inline int hifn_encrypt_aes_ofb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002105{
2106 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2107 ACRYPTO_TYPE_AES_128, ACRYPTO_MODE_OFB);
2108}
2109
2110/*
2111 * AES decryption functions.
2112 */
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002113static inline int hifn_decrypt_aes_ecb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002114{
2115 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2116 ACRYPTO_TYPE_AES_128, ACRYPTO_MODE_ECB);
2117}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002118static inline int hifn_decrypt_aes_cbc(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002119{
2120 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2121 ACRYPTO_TYPE_AES_128, ACRYPTO_MODE_CBC);
2122}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002123static inline int hifn_decrypt_aes_cfb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002124{
2125 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2126 ACRYPTO_TYPE_AES_128, ACRYPTO_MODE_CFB);
2127}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002128static inline int hifn_decrypt_aes_ofb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002129{
2130 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2131 ACRYPTO_TYPE_AES_128, ACRYPTO_MODE_OFB);
2132}
2133
2134/*
2135 * DES ecryption functions.
2136 */
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002137static inline int hifn_encrypt_des_ecb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002138{
2139 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2140 ACRYPTO_TYPE_DES, ACRYPTO_MODE_ECB);
2141}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002142static inline int hifn_encrypt_des_cbc(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002143{
2144 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2145 ACRYPTO_TYPE_DES, ACRYPTO_MODE_CBC);
2146}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002147static inline int hifn_encrypt_des_cfb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002148{
2149 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2150 ACRYPTO_TYPE_DES, ACRYPTO_MODE_CFB);
2151}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002152static inline int hifn_encrypt_des_ofb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002153{
2154 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2155 ACRYPTO_TYPE_DES, ACRYPTO_MODE_OFB);
2156}
2157
2158/*
2159 * DES decryption functions.
2160 */
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002161static inline int hifn_decrypt_des_ecb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002162{
2163 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2164 ACRYPTO_TYPE_DES, ACRYPTO_MODE_ECB);
2165}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002166static inline int hifn_decrypt_des_cbc(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002167{
2168 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2169 ACRYPTO_TYPE_DES, ACRYPTO_MODE_CBC);
2170}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002171static inline int hifn_decrypt_des_cfb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002172{
2173 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2174 ACRYPTO_TYPE_DES, ACRYPTO_MODE_CFB);
2175}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002176static inline int hifn_decrypt_des_ofb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002177{
2178 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2179 ACRYPTO_TYPE_DES, ACRYPTO_MODE_OFB);
2180}
2181
2182/*
2183 * 3DES ecryption functions.
2184 */
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002185static inline int hifn_encrypt_3des_ecb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002186{
2187 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2188 ACRYPTO_TYPE_3DES, ACRYPTO_MODE_ECB);
2189}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002190static inline int hifn_encrypt_3des_cbc(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002191{
2192 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2193 ACRYPTO_TYPE_3DES, ACRYPTO_MODE_CBC);
2194}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002195static inline int hifn_encrypt_3des_cfb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002196{
2197 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2198 ACRYPTO_TYPE_3DES, ACRYPTO_MODE_CFB);
2199}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002200static inline int hifn_encrypt_3des_ofb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002201{
2202 return hifn_setup_crypto(req, ACRYPTO_OP_ENCRYPT,
2203 ACRYPTO_TYPE_3DES, ACRYPTO_MODE_OFB);
2204}
2205
LABBE Corentin16f56e82015-10-22 08:51:52 +02002206/* 3DES decryption functions. */
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002207static inline int hifn_decrypt_3des_ecb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002208{
2209 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2210 ACRYPTO_TYPE_3DES, ACRYPTO_MODE_ECB);
2211}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002212static inline int hifn_decrypt_3des_cbc(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002213{
2214 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2215 ACRYPTO_TYPE_3DES, ACRYPTO_MODE_CBC);
2216}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002217static inline int hifn_decrypt_3des_cfb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002218{
2219 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2220 ACRYPTO_TYPE_3DES, ACRYPTO_MODE_CFB);
2221}
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002222static inline int hifn_decrypt_3des_ofb(struct skcipher_request *req)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002223{
2224 return hifn_setup_crypto(req, ACRYPTO_OP_DECRYPT,
2225 ACRYPTO_TYPE_3DES, ACRYPTO_MODE_OFB);
2226}
2227
LABBE Corentin16f56e82015-10-22 08:51:52 +02002228struct hifn_alg_template {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002229 char name[CRYPTO_MAX_ALG_NAME];
2230 char drv_name[CRYPTO_MAX_ALG_NAME];
2231 unsigned int bsize;
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002232 struct skcipher_alg skcipher;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002233};
2234
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002235static const struct hifn_alg_template hifn_alg_templates[] = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002236 /*
2237 * 3DES ECB, CBC, CFB and OFB modes.
2238 */
2239 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002240 .name = "cfb(des3_ede)", .drv_name = "cfb-3des", .bsize = 8,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002241 .skcipher = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002242 .min_keysize = HIFN_3DES_KEY_LENGTH,
2243 .max_keysize = HIFN_3DES_KEY_LENGTH,
Herbert Xu270e21d2019-04-11 16:51:07 +08002244 .setkey = hifn_des3_setkey,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002245 .encrypt = hifn_encrypt_3des_cfb,
2246 .decrypt = hifn_decrypt_3des_cfb,
2247 },
2248 },
2249 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002250 .name = "ofb(des3_ede)", .drv_name = "ofb-3des", .bsize = 8,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002251 .skcipher = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002252 .min_keysize = HIFN_3DES_KEY_LENGTH,
2253 .max_keysize = HIFN_3DES_KEY_LENGTH,
Herbert Xu270e21d2019-04-11 16:51:07 +08002254 .setkey = hifn_des3_setkey,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002255 .encrypt = hifn_encrypt_3des_ofb,
2256 .decrypt = hifn_decrypt_3des_ofb,
2257 },
2258 },
2259 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002260 .name = "cbc(des3_ede)", .drv_name = "cbc-3des", .bsize = 8,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002261 .skcipher = {
Patrick McHardy4b804b52008-05-07 22:35:47 +08002262 .ivsize = HIFN_IV_LENGTH,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002263 .min_keysize = HIFN_3DES_KEY_LENGTH,
2264 .max_keysize = HIFN_3DES_KEY_LENGTH,
Herbert Xu270e21d2019-04-11 16:51:07 +08002265 .setkey = hifn_des3_setkey,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002266 .encrypt = hifn_encrypt_3des_cbc,
2267 .decrypt = hifn_decrypt_3des_cbc,
2268 },
2269 },
2270 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002271 .name = "ecb(des3_ede)", .drv_name = "ecb-3des", .bsize = 8,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002272 .skcipher = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002273 .min_keysize = HIFN_3DES_KEY_LENGTH,
2274 .max_keysize = HIFN_3DES_KEY_LENGTH,
Herbert Xu270e21d2019-04-11 16:51:07 +08002275 .setkey = hifn_des3_setkey,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002276 .encrypt = hifn_encrypt_3des_ecb,
2277 .decrypt = hifn_decrypt_3des_ecb,
2278 },
2279 },
2280
2281 /*
2282 * DES ECB, CBC, CFB and OFB modes.
2283 */
2284 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002285 .name = "cfb(des)", .drv_name = "cfb-des", .bsize = 8,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002286 .skcipher = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002287 .min_keysize = HIFN_DES_KEY_LENGTH,
2288 .max_keysize = HIFN_DES_KEY_LENGTH,
2289 .setkey = hifn_setkey,
2290 .encrypt = hifn_encrypt_des_cfb,
2291 .decrypt = hifn_decrypt_des_cfb,
2292 },
2293 },
2294 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002295 .name = "ofb(des)", .drv_name = "ofb-des", .bsize = 8,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002296 .skcipher = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002297 .min_keysize = HIFN_DES_KEY_LENGTH,
2298 .max_keysize = HIFN_DES_KEY_LENGTH,
2299 .setkey = hifn_setkey,
2300 .encrypt = hifn_encrypt_des_ofb,
2301 .decrypt = hifn_decrypt_des_ofb,
2302 },
2303 },
2304 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002305 .name = "cbc(des)", .drv_name = "cbc-des", .bsize = 8,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002306 .skcipher = {
Patrick McHardy4b804b52008-05-07 22:35:47 +08002307 .ivsize = HIFN_IV_LENGTH,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002308 .min_keysize = HIFN_DES_KEY_LENGTH,
2309 .max_keysize = HIFN_DES_KEY_LENGTH,
2310 .setkey = hifn_setkey,
2311 .encrypt = hifn_encrypt_des_cbc,
2312 .decrypt = hifn_decrypt_des_cbc,
2313 },
2314 },
2315 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002316 .name = "ecb(des)", .drv_name = "ecb-des", .bsize = 8,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002317 .skcipher = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002318 .min_keysize = HIFN_DES_KEY_LENGTH,
2319 .max_keysize = HIFN_DES_KEY_LENGTH,
2320 .setkey = hifn_setkey,
2321 .encrypt = hifn_encrypt_des_ecb,
2322 .decrypt = hifn_decrypt_des_ecb,
2323 },
2324 },
2325
2326 /*
2327 * AES ECB, CBC, CFB and OFB modes.
2328 */
2329 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002330 .name = "ecb(aes)", .drv_name = "ecb-aes", .bsize = 16,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002331 .skcipher = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002332 .min_keysize = AES_MIN_KEY_SIZE,
2333 .max_keysize = AES_MAX_KEY_SIZE,
2334 .setkey = hifn_setkey,
2335 .encrypt = hifn_encrypt_aes_ecb,
2336 .decrypt = hifn_decrypt_aes_ecb,
2337 },
2338 },
2339 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002340 .name = "cbc(aes)", .drv_name = "cbc-aes", .bsize = 16,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002341 .skcipher = {
Patrick McHardy4b804b52008-05-07 22:35:47 +08002342 .ivsize = HIFN_AES_IV_LENGTH,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002343 .min_keysize = AES_MIN_KEY_SIZE,
2344 .max_keysize = AES_MAX_KEY_SIZE,
2345 .setkey = hifn_setkey,
2346 .encrypt = hifn_encrypt_aes_cbc,
2347 .decrypt = hifn_decrypt_aes_cbc,
2348 },
2349 },
2350 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002351 .name = "cfb(aes)", .drv_name = "cfb-aes", .bsize = 16,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002352 .skcipher = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002353 .min_keysize = AES_MIN_KEY_SIZE,
2354 .max_keysize = AES_MAX_KEY_SIZE,
2355 .setkey = hifn_setkey,
2356 .encrypt = hifn_encrypt_aes_cfb,
2357 .decrypt = hifn_decrypt_aes_cfb,
2358 },
2359 },
2360 {
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002361 .name = "ofb(aes)", .drv_name = "ofb-aes", .bsize = 16,
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002362 .skcipher = {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002363 .min_keysize = AES_MIN_KEY_SIZE,
2364 .max_keysize = AES_MAX_KEY_SIZE,
2365 .setkey = hifn_setkey,
2366 .encrypt = hifn_encrypt_aes_ofb,
2367 .decrypt = hifn_decrypt_aes_ofb,
2368 },
2369 },
2370};
2371
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002372static int hifn_init_tfm(struct crypto_skcipher *tfm)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002373{
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002374 struct skcipher_alg *alg = crypto_skcipher_alg(tfm);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002375 struct hifn_crypto_alg *ha = crypto_alg_to_hifn(alg);
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002376 struct hifn_context *ctx = crypto_skcipher_ctx(tfm);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002377
2378 ctx->dev = ha->dev;
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002379 crypto_skcipher_set_reqsize(tfm, sizeof(struct hifn_request_context));
2380
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002381 return 0;
2382}
2383
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002384static int hifn_alg_alloc(struct hifn_device *dev, const struct hifn_alg_template *t)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002385{
2386 struct hifn_crypto_alg *alg;
2387 int err;
2388
LABBE Corentin16f56e82015-10-22 08:51:52 +02002389 alg = kzalloc(sizeof(*alg), GFP_KERNEL);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002390 if (!alg)
2391 return -ENOMEM;
2392
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002393 alg->alg = t->skcipher;
2394 alg->alg.init = hifn_init_tfm;
2395
2396 snprintf(alg->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", t->name);
2397 snprintf(alg->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s-%s",
Patrick McHardy281d6bd2008-05-07 22:35:07 +08002398 t->drv_name, dev->name);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002399
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002400 alg->alg.base.cra_priority = 300;
2401 alg->alg.base.cra_flags = CRYPTO_ALG_KERN_DRIVER_ONLY | CRYPTO_ALG_ASYNC;
2402 alg->alg.base.cra_blocksize = t->bsize;
2403 alg->alg.base.cra_ctxsize = sizeof(struct hifn_context);
2404 alg->alg.base.cra_alignmask = 0;
2405 alg->alg.base.cra_module = THIS_MODULE;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002406
2407 alg->dev = dev;
2408
2409 list_add_tail(&alg->entry, &dev->alg_list);
2410
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002411 err = crypto_register_skcipher(&alg->alg);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002412 if (err) {
2413 list_del(&alg->entry);
2414 kfree(alg);
2415 }
2416
2417 return err;
2418}
2419
2420static void hifn_unregister_alg(struct hifn_device *dev)
2421{
2422 struct hifn_crypto_alg *a, *n;
2423
2424 list_for_each_entry_safe(a, n, &dev->alg_list, entry) {
2425 list_del(&a->entry);
Ard Biesheuvelb462973a2019-11-09 18:09:39 +01002426 crypto_unregister_skcipher(&a->alg);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002427 kfree(a);
2428 }
2429}
2430
2431static int hifn_register_alg(struct hifn_device *dev)
2432{
2433 int i, err;
2434
LABBE Corentin16f56e82015-10-22 08:51:52 +02002435 for (i = 0; i < ARRAY_SIZE(hifn_alg_templates); ++i) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002436 err = hifn_alg_alloc(dev, &hifn_alg_templates[i]);
2437 if (err)
2438 goto err_out_exit;
2439 }
2440
2441 return 0;
2442
2443err_out_exit:
2444 hifn_unregister_alg(dev);
2445 return err;
2446}
2447
Evgeniy Polyakova1e6ef22007-11-10 20:24:18 +08002448static void hifn_tasklet_callback(unsigned long data)
2449{
2450 struct hifn_device *dev = (struct hifn_device *)data;
2451
2452 /*
2453 * This is ok to call this without lock being held,
2454 * althogh it modifies some parameters used in parallel,
2455 * (like dev->success), but they are used in process
2456 * context or update is atomic (like setting dev->sa[i] to NULL).
2457 */
Evgeniy Polyakovd6a10c82008-11-24 22:04:39 +08002458 hifn_clear_rings(dev, 0);
Patrick McHardyed4f92e2008-11-24 22:02:55 +08002459
2460 if (dev->started < HIFN_QUEUE_LENGTH && dev->queue.qlen)
2461 hifn_process_queue(dev);
Evgeniy Polyakova1e6ef22007-11-10 20:24:18 +08002462}
2463
Greg Kroah-Hartman49cfe4d2012-12-21 13:14:09 -08002464static int hifn_probe(struct pci_dev *pdev, const struct pci_device_id *id)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002465{
2466 int err, i;
2467 struct hifn_device *dev;
2468 char name[8];
2469
2470 err = pci_enable_device(pdev);
2471 if (err)
2472 return err;
2473 pci_set_master(pdev);
2474
Christophe JAILLET0a772f32020-07-27 11:30:27 +02002475 err = dma_set_mask(&pdev->dev, DMA_BIT_MASK(32));
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002476 if (err)
2477 goto err_out_disable_pci_device;
2478
2479 snprintf(name, sizeof(name), "hifn%d",
LABBE Corentin16f56e82015-10-22 08:51:52 +02002480 atomic_inc_return(&hifn_dev_number) - 1);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002481
2482 err = pci_request_regions(pdev, name);
2483 if (err)
2484 goto err_out_disable_pci_device;
2485
2486 if (pci_resource_len(pdev, 0) < HIFN_BAR0_SIZE ||
2487 pci_resource_len(pdev, 1) < HIFN_BAR1_SIZE ||
2488 pci_resource_len(pdev, 2) < HIFN_BAR2_SIZE) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02002489 dev_err(&pdev->dev, "Broken hardware - I/O regions are too small.\n");
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002490 err = -ENODEV;
2491 goto err_out_free_regions;
2492 }
2493
2494 dev = kzalloc(sizeof(struct hifn_device) + sizeof(struct crypto_alg),
2495 GFP_KERNEL);
2496 if (!dev) {
2497 err = -ENOMEM;
2498 goto err_out_free_regions;
2499 }
2500
2501 INIT_LIST_HEAD(&dev->alg_list);
2502
2503 snprintf(dev->name, sizeof(dev->name), "%s", name);
2504 spin_lock_init(&dev->lock);
2505
LABBE Corentin16f56e82015-10-22 08:51:52 +02002506 for (i = 0; i < 3; ++i) {
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002507 unsigned long addr, size;
2508
2509 addr = pci_resource_start(pdev, i);
2510 size = pci_resource_len(pdev, i);
2511
Christoph Hellwig4bdc0d62020-01-06 09:43:50 +01002512 dev->bar[i] = ioremap(addr, size);
Peter Senna Tschudinc2ff8612012-09-17 19:28:26 +02002513 if (!dev->bar[i]) {
2514 err = -ENOMEM;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002515 goto err_out_unmap_bars;
Peter Senna Tschudinc2ff8612012-09-17 19:28:26 +02002516 }
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002517 }
2518
Christophe JAILLET0a772f32020-07-27 11:30:27 +02002519 dev->desc_virt = dma_alloc_coherent(&pdev->dev,
2520 sizeof(struct hifn_dma),
2521 &dev->desc_dma, GFP_KERNEL);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002522 if (!dev->desc_virt) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02002523 dev_err(&pdev->dev, "Failed to allocate descriptor rings.\n");
Peter Senna Tschudinc2ff8612012-09-17 19:28:26 +02002524 err = -ENOMEM;
Patrick McHardy3ec858d2008-11-24 22:03:37 +08002525 goto err_out_unmap_bars;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002526 }
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002527
2528 dev->pdev = pdev;
2529 dev->irq = pdev->irq;
2530
LABBE Corentin16f56e82015-10-22 08:51:52 +02002531 for (i = 0; i < HIFN_D_RES_RSIZE; ++i)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002532 dev->sa[i] = NULL;
2533
2534 pci_set_drvdata(pdev, dev);
2535
Evgeniy Polyakova1e6ef22007-11-10 20:24:18 +08002536 tasklet_init(&dev->tasklet, hifn_tasklet_callback, (unsigned long)dev);
2537
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002538 crypto_init_queue(&dev->queue, 1);
2539
2540 err = request_irq(dev->irq, hifn_interrupt, IRQF_SHARED, dev->name, dev);
2541 if (err) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02002542 dev_err(&pdev->dev, "Failed to request IRQ%d: err: %d.\n",
2543 dev->irq, err);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002544 dev->irq = 0;
2545 goto err_out_free_desc;
2546 }
2547
2548 err = hifn_start_device(dev);
2549 if (err)
2550 goto err_out_free_irq;
2551
Patrick McHardyfcd06752007-11-21 12:51:52 +08002552 err = hifn_register_rng(dev);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002553 if (err)
2554 goto err_out_stop_device;
2555
Patrick McHardyfcd06752007-11-21 12:51:52 +08002556 err = hifn_register_alg(dev);
2557 if (err)
2558 goto err_out_unregister_rng;
2559
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002560 INIT_DELAYED_WORK(&dev->work, hifn_work);
2561 schedule_delayed_work(&dev->work, HZ);
2562
LABBE Corentincfeecab2015-10-22 08:51:51 +02002563 dev_dbg(&pdev->dev, "HIFN crypto accelerator card at %s has been "
2564 "successfully registered as %s.\n",
2565 pci_name(pdev), dev->name);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002566
2567 return 0;
2568
Patrick McHardyfcd06752007-11-21 12:51:52 +08002569err_out_unregister_rng:
2570 hifn_unregister_rng(dev);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002571err_out_stop_device:
2572 hifn_reset_dma(dev, 1);
2573 hifn_stop_device(dev);
2574err_out_free_irq:
Lars-Peter Clausenb0226652013-05-20 19:14:50 +02002575 free_irq(dev->irq, dev);
Evgeniy Polyakova1e6ef22007-11-10 20:24:18 +08002576 tasklet_kill(&dev->tasklet);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002577err_out_free_desc:
Christophe JAILLET0a772f32020-07-27 11:30:27 +02002578 dma_free_coherent(&pdev->dev, sizeof(struct hifn_dma), dev->desc_virt,
2579 dev->desc_dma);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002580
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002581err_out_unmap_bars:
LABBE Corentin16f56e82015-10-22 08:51:52 +02002582 for (i = 0; i < 3; ++i)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002583 if (dev->bar[i])
2584 iounmap(dev->bar[i]);
Christophe Jaillet1964e332017-11-18 14:45:45 +01002585 kfree(dev);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002586
2587err_out_free_regions:
2588 pci_release_regions(pdev);
2589
2590err_out_disable_pci_device:
2591 pci_disable_device(pdev);
2592
2593 return err;
2594}
2595
Greg Kroah-Hartman49cfe4d2012-12-21 13:14:09 -08002596static void hifn_remove(struct pci_dev *pdev)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002597{
2598 int i;
2599 struct hifn_device *dev;
2600
2601 dev = pci_get_drvdata(pdev);
2602
2603 if (dev) {
Tejun Heof4e523f2010-10-19 20:50:23 +08002604 cancel_delayed_work_sync(&dev->work);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002605
Patrick McHardyfcd06752007-11-21 12:51:52 +08002606 hifn_unregister_rng(dev);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002607 hifn_unregister_alg(dev);
2608 hifn_reset_dma(dev, 1);
2609 hifn_stop_device(dev);
2610
Lars-Peter Clausenb0226652013-05-20 19:14:50 +02002611 free_irq(dev->irq, dev);
Evgeniy Polyakova1e6ef22007-11-10 20:24:18 +08002612 tasklet_kill(&dev->tasklet);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002613
2614 hifn_flush(dev);
2615
Christophe JAILLET0a772f32020-07-27 11:30:27 +02002616 dma_free_coherent(&pdev->dev, sizeof(struct hifn_dma),
2617 dev->desc_virt, dev->desc_dma);
LABBE Corentin16f56e82015-10-22 08:51:52 +02002618 for (i = 0; i < 3; ++i)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002619 if (dev->bar[i])
2620 iounmap(dev->bar[i]);
2621
2622 kfree(dev);
2623 }
2624
2625 pci_release_regions(pdev);
2626 pci_disable_device(pdev);
2627}
2628
2629static struct pci_device_id hifn_pci_tbl[] = {
2630 { PCI_DEVICE(PCI_VENDOR_ID_HIFN, PCI_DEVICE_ID_HIFN_7955) },
2631 { PCI_DEVICE(PCI_VENDOR_ID_HIFN, PCI_DEVICE_ID_HIFN_7956) },
2632 { 0 }
2633};
2634MODULE_DEVICE_TABLE(pci, hifn_pci_tbl);
2635
2636static struct pci_driver hifn_pci_driver = {
2637 .name = "hifn795x",
2638 .id_table = hifn_pci_tbl,
2639 .probe = hifn_probe,
Greg Kroah-Hartman49cfe4d2012-12-21 13:14:09 -08002640 .remove = hifn_remove,
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002641};
2642
Mike Frysingerf3d8fe42009-05-27 15:16:21 +10002643static int __init hifn_init(void)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002644{
Patrick McHardy37a80232007-11-21 12:47:13 +08002645 unsigned int freq;
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002646 int err;
2647
Patrick McHardy37a80232007-11-21 12:47:13 +08002648 if (strncmp(hifn_pll_ref, "ext", 3) &&
2649 strncmp(hifn_pll_ref, "pci", 3)) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02002650 pr_err("hifn795x: invalid hifn_pll_ref clock, must be pci or ext");
Patrick McHardy37a80232007-11-21 12:47:13 +08002651 return -EINVAL;
2652 }
2653
2654 /*
2655 * For the 7955/7956 the reference clock frequency must be in the
2656 * range of 20MHz-100MHz. For the 7954 the upper bound is 66.67MHz,
2657 * but this chip is currently not supported.
2658 */
2659 if (hifn_pll_ref[3] != '\0') {
2660 freq = simple_strtoul(hifn_pll_ref + 3, NULL, 10);
2661 if (freq < 20 || freq > 100) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02002662 pr_err("hifn795x: invalid hifn_pll_ref frequency, must"
2663 "be in the range of 20-100");
Patrick McHardy37a80232007-11-21 12:47:13 +08002664 return -EINVAL;
2665 }
2666 }
2667
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002668 err = pci_register_driver(&hifn_pci_driver);
2669 if (err < 0) {
LABBE Corentincfeecab2015-10-22 08:51:51 +02002670 pr_err("Failed to register PCI driver for %s device.\n",
2671 hifn_pci_driver.name);
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002672 return -ENODEV;
2673 }
2674
LABBE Corentincfeecab2015-10-22 08:51:51 +02002675 pr_info("Driver for HIFN 795x crypto accelerator chip "
2676 "has been successfully registered.\n");
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002677
2678 return 0;
2679}
2680
Mike Frysingerf3d8fe42009-05-27 15:16:21 +10002681static void __exit hifn_fini(void)
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002682{
2683 pci_unregister_driver(&hifn_pci_driver);
2684
LABBE Corentincfeecab2015-10-22 08:51:51 +02002685 pr_info("Driver for HIFN 795x crypto accelerator chip "
2686 "has been successfully unregistered.\n");
Evgeniy Polyakovf7d05612007-10-26 21:31:14 +08002687}
2688
2689module_init(hifn_init);
2690module_exit(hifn_fini);
2691
2692MODULE_LICENSE("GPL");
2693MODULE_AUTHOR("Evgeniy Polyakov <johnpol@2ka.mipt.ru>");
2694MODULE_DESCRIPTION("Driver for HIFN 795x crypto accelerator chip.");