Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git...
[linux-2.6-block.git] / drivers / crypto / marvell / cesa.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
f63601fd
BB
2#ifndef __MARVELL_CESA_H__
3#define __MARVELL_CESA_H__
4
5#include <crypto/algapi.h>
6#include <crypto/hash.h>
7#include <crypto/internal/hash.h>
e6cd5bf6 8#include <crypto/internal/skcipher.h>
f63601fd
BB
9
10#include <linux/crypto.h>
db509a45 11#include <linux/dmapool.h>
f63601fd
BB
12
13#define CESA_ENGINE_OFF(i) (((i) * 0x2000))
14
15#define CESA_TDMA_BYTE_CNT 0x800
16#define CESA_TDMA_SRC_ADDR 0x810
17#define CESA_TDMA_DST_ADDR 0x820
18#define CESA_TDMA_NEXT_ADDR 0x830
19
20#define CESA_TDMA_CONTROL 0x840
21#define CESA_TDMA_DST_BURST GENMASK(2, 0)
22#define CESA_TDMA_DST_BURST_32B 3
23#define CESA_TDMA_DST_BURST_128B 4
24#define CESA_TDMA_OUT_RD_EN BIT(4)
25#define CESA_TDMA_SRC_BURST GENMASK(8, 6)
26#define CESA_TDMA_SRC_BURST_32B (3 << 6)
27#define CESA_TDMA_SRC_BURST_128B (4 << 6)
28#define CESA_TDMA_CHAIN BIT(9)
29#define CESA_TDMA_BYTE_SWAP BIT(11)
30#define CESA_TDMA_NO_BYTE_SWAP BIT(11)
31#define CESA_TDMA_EN BIT(12)
32#define CESA_TDMA_FETCH_ND BIT(13)
33#define CESA_TDMA_ACT BIT(14)
34
35#define CESA_TDMA_CUR 0x870
36#define CESA_TDMA_ERROR_CAUSE 0x8c8
37#define CESA_TDMA_ERROR_MSK 0x8cc
38
39#define CESA_TDMA_WINDOW_BASE(x) (((x) * 0x8) + 0xa00)
40#define CESA_TDMA_WINDOW_CTRL(x) (((x) * 0x8) + 0xa04)
41
42#define CESA_IVDIG(x) (0xdd00 + ((x) * 4) + \
43 (((x) < 5) ? 0 : 0x14))
44
45#define CESA_SA_CMD 0xde00
46#define CESA_SA_CMD_EN_CESA_SA_ACCL0 BIT(0)
47#define CESA_SA_CMD_EN_CESA_SA_ACCL1 BIT(1)
48#define CESA_SA_CMD_DISABLE_SEC BIT(2)
49
50#define CESA_SA_DESC_P0 0xde04
51
52#define CESA_SA_DESC_P1 0xde14
53
54#define CESA_SA_CFG 0xde08
55#define CESA_SA_CFG_STOP_DIG_ERR GENMASK(1, 0)
56#define CESA_SA_CFG_DIG_ERR_CONT 0
57#define CESA_SA_CFG_DIG_ERR_SKIP 1
58#define CESA_SA_CFG_DIG_ERR_STOP 3
59#define CESA_SA_CFG_CH0_W_IDMA BIT(7)
60#define CESA_SA_CFG_CH1_W_IDMA BIT(8)
61#define CESA_SA_CFG_ACT_CH0_IDMA BIT(9)
62#define CESA_SA_CFG_ACT_CH1_IDMA BIT(10)
63#define CESA_SA_CFG_MULTI_PKT BIT(11)
64#define CESA_SA_CFG_PARA_DIS BIT(13)
65
66#define CESA_SA_ACCEL_STATUS 0xde0c
67#define CESA_SA_ST_ACT_0 BIT(0)
68#define CESA_SA_ST_ACT_1 BIT(1)
69
70/*
71 * CESA_SA_FPGA_INT_STATUS looks like a FPGA leftover and is documented only
72 * in Errata 4.12. It looks like that it was part of an IRQ-controller in FPGA
73 * and someone forgot to remove it while switching to the core and moving to
74 * CESA_SA_INT_STATUS.
75 */
76#define CESA_SA_FPGA_INT_STATUS 0xdd68
77#define CESA_SA_INT_STATUS 0xde20
78#define CESA_SA_INT_AUTH_DONE BIT(0)
79#define CESA_SA_INT_DES_E_DONE BIT(1)
80#define CESA_SA_INT_AES_E_DONE BIT(2)
81#define CESA_SA_INT_AES_D_DONE BIT(3)
82#define CESA_SA_INT_ENC_DONE BIT(4)
83#define CESA_SA_INT_ACCEL0_DONE BIT(5)
84#define CESA_SA_INT_ACCEL1_DONE BIT(6)
85#define CESA_SA_INT_ACC0_IDMA_DONE BIT(7)
86#define CESA_SA_INT_ACC1_IDMA_DONE BIT(8)
87#define CESA_SA_INT_IDMA_DONE BIT(9)
88#define CESA_SA_INT_IDMA_OWN_ERR BIT(10)
89
90#define CESA_SA_INT_MSK 0xde24
91
92#define CESA_SA_DESC_CFG_OP_MAC_ONLY 0
93#define CESA_SA_DESC_CFG_OP_CRYPT_ONLY 1
94#define CESA_SA_DESC_CFG_OP_MAC_CRYPT 2
95#define CESA_SA_DESC_CFG_OP_CRYPT_MAC 3
96#define CESA_SA_DESC_CFG_OP_MSK GENMASK(1, 0)
97#define CESA_SA_DESC_CFG_MACM_SHA256 (1 << 4)
98#define CESA_SA_DESC_CFG_MACM_HMAC_SHA256 (3 << 4)
99#define CESA_SA_DESC_CFG_MACM_MD5 (4 << 4)
100#define CESA_SA_DESC_CFG_MACM_SHA1 (5 << 4)
101#define CESA_SA_DESC_CFG_MACM_HMAC_MD5 (6 << 4)
102#define CESA_SA_DESC_CFG_MACM_HMAC_SHA1 (7 << 4)
103#define CESA_SA_DESC_CFG_MACM_MSK GENMASK(6, 4)
104#define CESA_SA_DESC_CFG_CRYPTM_DES (1 << 8)
105#define CESA_SA_DESC_CFG_CRYPTM_3DES (2 << 8)
106#define CESA_SA_DESC_CFG_CRYPTM_AES (3 << 8)
107#define CESA_SA_DESC_CFG_CRYPTM_MSK GENMASK(9, 8)
108#define CESA_SA_DESC_CFG_DIR_ENC (0 << 12)
109#define CESA_SA_DESC_CFG_DIR_DEC (1 << 12)
110#define CESA_SA_DESC_CFG_CRYPTCM_ECB (0 << 16)
111#define CESA_SA_DESC_CFG_CRYPTCM_CBC (1 << 16)
112#define CESA_SA_DESC_CFG_CRYPTCM_MSK BIT(16)
113#define CESA_SA_DESC_CFG_3DES_EEE (0 << 20)
114#define CESA_SA_DESC_CFG_3DES_EDE (1 << 20)
115#define CESA_SA_DESC_CFG_AES_LEN_128 (0 << 24)
116#define CESA_SA_DESC_CFG_AES_LEN_192 (1 << 24)
117#define CESA_SA_DESC_CFG_AES_LEN_256 (2 << 24)
118#define CESA_SA_DESC_CFG_AES_LEN_MSK GENMASK(25, 24)
119#define CESA_SA_DESC_CFG_NOT_FRAG (0 << 30)
120#define CESA_SA_DESC_CFG_FIRST_FRAG (1 << 30)
121#define CESA_SA_DESC_CFG_LAST_FRAG (2 << 30)
122#define CESA_SA_DESC_CFG_MID_FRAG (3 << 30)
123#define CESA_SA_DESC_CFG_FRAG_MSK GENMASK(31, 30)
124
125/*
126 * /-----------\ 0
127 * | ACCEL CFG | 4 * 8
128 * |-----------| 0x20
129 * | CRYPT KEY | 8 * 4
130 * |-----------| 0x40
131 * | IV IN | 4 * 4
132 * |-----------| 0x40 (inplace)
133 * | IV BUF | 4 * 4
134 * |-----------| 0x80
135 * | DATA IN | 16 * x (max ->max_req_size)
136 * |-----------| 0x80 (inplace operation)
137 * | DATA OUT | 16 * x (max ->max_req_size)
138 * \-----------/ SRAM size
139 */
140
141/*
142 * Hashing memory map:
143 * /-----------\ 0
144 * | ACCEL CFG | 4 * 8
145 * |-----------| 0x20
146 * | Inner IV | 8 * 4
147 * |-----------| 0x40
148 * | Outer IV | 8 * 4
149 * |-----------| 0x60
150 * | Output BUF| 8 * 4
151 * |-----------| 0x80
152 * | DATA IN | 64 * x (max ->max_req_size)
153 * \-----------/ SRAM size
154 */
155
156#define CESA_SA_CFG_SRAM_OFFSET 0x00
157#define CESA_SA_DATA_SRAM_OFFSET 0x80
158
159#define CESA_SA_CRYPT_KEY_SRAM_OFFSET 0x20
160#define CESA_SA_CRYPT_IV_SRAM_OFFSET 0x40
161
162#define CESA_SA_MAC_IIV_SRAM_OFFSET 0x20
163#define CESA_SA_MAC_OIV_SRAM_OFFSET 0x40
164#define CESA_SA_MAC_DIG_SRAM_OFFSET 0x60
165
166#define CESA_SA_DESC_CRYPT_DATA(offset) \
167 cpu_to_le32((CESA_SA_DATA_SRAM_OFFSET + (offset)) | \
168 ((CESA_SA_DATA_SRAM_OFFSET + (offset)) << 16))
169
170#define CESA_SA_DESC_CRYPT_IV(offset) \
171 cpu_to_le32((CESA_SA_CRYPT_IV_SRAM_OFFSET + (offset)) | \
172 ((CESA_SA_CRYPT_IV_SRAM_OFFSET + (offset)) << 16))
173
174#define CESA_SA_DESC_CRYPT_KEY(offset) \
175 cpu_to_le32(CESA_SA_CRYPT_KEY_SRAM_OFFSET + (offset))
176
177#define CESA_SA_DESC_MAC_DATA(offset) \
178 cpu_to_le32(CESA_SA_DATA_SRAM_OFFSET + (offset))
6de59d45 179#define CESA_SA_DESC_MAC_DATA_MSK cpu_to_le32(GENMASK(15, 0))
f63601fd
BB
180
181#define CESA_SA_DESC_MAC_TOTAL_LEN(total_len) cpu_to_le32((total_len) << 16)
6de59d45 182#define CESA_SA_DESC_MAC_TOTAL_LEN_MSK cpu_to_le32(GENMASK(31, 16))
f63601fd
BB
183
184#define CESA_SA_DESC_MAC_SRC_TOTAL_LEN_MAX 0xffff
185
186#define CESA_SA_DESC_MAC_DIGEST(offset) \
187 cpu_to_le32(CESA_SA_MAC_DIG_SRAM_OFFSET + (offset))
6de59d45 188#define CESA_SA_DESC_MAC_DIGEST_MSK cpu_to_le32(GENMASK(15, 0))
f63601fd
BB
189
190#define CESA_SA_DESC_MAC_FRAG_LEN(frag_len) cpu_to_le32((frag_len) << 16)
6de59d45 191#define CESA_SA_DESC_MAC_FRAG_LEN_MSK cpu_to_le32(GENMASK(31, 16))
f63601fd
BB
192
193#define CESA_SA_DESC_MAC_IV(offset) \
194 cpu_to_le32((CESA_SA_MAC_IIV_SRAM_OFFSET + (offset)) | \
195 ((CESA_SA_MAC_OIV_SRAM_OFFSET + (offset)) << 16))
196
197#define CESA_SA_SRAM_SIZE 2048
198#define CESA_SA_SRAM_PAYLOAD_SIZE (cesa_dev->sram_size - \
199 CESA_SA_DATA_SRAM_OFFSET)
200
201#define CESA_SA_DEFAULT_SRAM_SIZE 2048
202#define CESA_SA_MIN_SRAM_SIZE 1024
203
204#define CESA_SA_SRAM_MSK (2048 - 1)
205
206#define CESA_MAX_HASH_BLOCK_SIZE 64
207#define CESA_HASH_BLOCK_SIZE_MSK (CESA_MAX_HASH_BLOCK_SIZE - 1)
208
209/**
210 * struct mv_cesa_sec_accel_desc - security accelerator descriptor
211 * @config: engine config
212 * @enc_p: input and output data pointers for a cipher operation
213 * @enc_len: cipher operation length
214 * @enc_key_p: cipher key pointer
215 * @enc_iv: cipher IV pointers
216 * @mac_src_p: input pointer and total hash length
217 * @mac_digest: digest pointer and hash operation length
218 * @mac_iv: hmac IV pointers
219 *
220 * Structure passed to the CESA engine to describe the crypto operation
221 * to be executed.
222 */
223struct mv_cesa_sec_accel_desc {
6de59d45
RK
224 __le32 config;
225 __le32 enc_p;
226 __le32 enc_len;
227 __le32 enc_key_p;
228 __le32 enc_iv;
229 __le32 mac_src_p;
230 __le32 mac_digest;
231 __le32 mac_iv;
f63601fd
BB
232};
233
234/**
8160ee7e 235 * struct mv_cesa_skcipher_op_ctx - cipher operation context
f63601fd
BB
236 * @key: cipher key
237 * @iv: cipher IV
238 *
239 * Context associated to a cipher operation.
240 */
8160ee7e 241struct mv_cesa_skcipher_op_ctx {
f63601fd
BB
242 u32 key[8];
243 u32 iv[4];
244};
245
246/**
247 * struct mv_cesa_hash_op_ctx - hash or hmac operation context
248 * @key: cipher key
249 * @iv: cipher IV
250 *
251 * Context associated to an hash or hmac operation.
252 */
253struct mv_cesa_hash_op_ctx {
254 u32 iv[16];
255 u32 hash[8];
256};
257
258/**
259 * struct mv_cesa_op_ctx - crypto operation context
260 * @desc: CESA descriptor
261 * @ctx: context associated to the crypto operation
262 *
263 * Context associated to a crypto operation.
264 */
265struct mv_cesa_op_ctx {
266 struct mv_cesa_sec_accel_desc desc;
267 union {
8160ee7e 268 struct mv_cesa_skcipher_op_ctx skcipher;
f63601fd
BB
269 struct mv_cesa_hash_op_ctx hash;
270 } ctx;
271};
272
db509a45
BB
273/* TDMA descriptor flags */
274#define CESA_TDMA_DST_IN_SRAM BIT(31)
275#define CESA_TDMA_SRC_IN_SRAM BIT(30)
85030c51
RP
276#define CESA_TDMA_END_OF_REQ BIT(29)
277#define CESA_TDMA_BREAK_CHAIN BIT(28)
8759fec4
RP
278#define CESA_TDMA_SET_STATE BIT(27)
279#define CESA_TDMA_TYPE_MSK GENMASK(26, 0)
db509a45
BB
280#define CESA_TDMA_DUMMY 0
281#define CESA_TDMA_DATA 1
282#define CESA_TDMA_OP 2
0c99620f 283#define CESA_TDMA_RESULT 3
db509a45
BB
284
285/**
286 * struct mv_cesa_tdma_desc - TDMA descriptor
287 * @byte_cnt: number of bytes to transfer
288 * @src: DMA address of the source
289 * @dst: DMA address of the destination
290 * @next_dma: DMA address of the next TDMA descriptor
291 * @cur_dma: DMA address of this TDMA descriptor
292 * @next: pointer to the next TDMA descriptor
293 * @op: CESA operation attached to this TDMA descriptor
294 * @data: raw data attached to this TDMA descriptor
295 * @flags: flags describing the TDMA transfer. See the
296 * "TDMA descriptor flags" section above
297 *
298 * TDMA descriptor used to create a transfer chain describing a crypto
299 * operation.
300 */
301struct mv_cesa_tdma_desc {
6de59d45
RK
302 __le32 byte_cnt;
303 __le32 src;
304 __le32 dst;
305 __le32 next_dma;
5d754137
RK
306
307 /* Software state */
308 dma_addr_t cur_dma;
db509a45
BB
309 struct mv_cesa_tdma_desc *next;
310 union {
311 struct mv_cesa_op_ctx *op;
312 void *data;
313 };
314 u32 flags;
315};
316
317/**
318 * struct mv_cesa_sg_dma_iter - scatter-gather iterator
319 * @dir: transfer direction
320 * @sg: scatter list
321 * @offset: current position in the scatter list
322 * @op_offset: current position in the crypto operation
323 *
324 * Iterator used to iterate over a scatterlist while creating a TDMA chain for
325 * a crypto operation.
326 */
327struct mv_cesa_sg_dma_iter {
328 enum dma_data_direction dir;
329 struct scatterlist *sg;
330 unsigned int offset;
331 unsigned int op_offset;
332};
333
334/**
335 * struct mv_cesa_dma_iter - crypto operation iterator
336 * @len: the crypto operation length
337 * @offset: current position in the crypto operation
338 * @op_len: sub-operation length (the crypto engine can only act on 2kb
339 * chunks)
340 *
341 * Iterator used to create a TDMA chain for a given crypto operation.
342 */
343struct mv_cesa_dma_iter {
344 unsigned int len;
345 unsigned int offset;
346 unsigned int op_len;
347};
348
349/**
350 * struct mv_cesa_tdma_chain - TDMA chain
351 * @first: first entry in the TDMA chain
352 * @last: last entry in the TDMA chain
353 *
354 * Stores a TDMA chain for a specific crypto operation.
355 */
356struct mv_cesa_tdma_chain {
357 struct mv_cesa_tdma_desc *first;
358 struct mv_cesa_tdma_desc *last;
359};
360
f63601fd
BB
361struct mv_cesa_engine;
362
363/**
364 * struct mv_cesa_caps - CESA device capabilities
365 * @engines: number of engines
db509a45 366 * @has_tdma: whether this device has a TDMA block
f63601fd
BB
367 * @cipher_algs: supported cipher algorithms
368 * @ncipher_algs: number of supported cipher algorithms
369 * @ahash_algs: supported hash algorithms
370 * @nahash_algs: number of supported hash algorithms
371 *
372 * Structure used to describe CESA device capabilities.
373 */
374struct mv_cesa_caps {
375 int nengines;
db509a45 376 bool has_tdma;
e6cd5bf6 377 struct skcipher_alg **cipher_algs;
f63601fd
BB
378 int ncipher_algs;
379 struct ahash_alg **ahash_algs;
380 int nahash_algs;
381};
382
db509a45
BB
383/**
384 * struct mv_cesa_dev_dma - DMA pools
385 * @tdma_desc_pool: TDMA desc pool
386 * @op_pool: crypto operation pool
387 * @cache_pool: data cache pool (used by hash implementation when the
388 * hash request is smaller than the hash block size)
389 * @padding_pool: padding pool (used by hash implementation when hardware
390 * padding cannot be used)
391 *
392 * Structure containing the different DMA pools used by this driver.
393 */
394struct mv_cesa_dev_dma {
395 struct dma_pool *tdma_desc_pool;
396 struct dma_pool *op_pool;
397 struct dma_pool *cache_pool;
398 struct dma_pool *padding_pool;
399};
400
f63601fd
BB
401/**
402 * struct mv_cesa_dev - CESA device
403 * @caps: device capabilities
404 * @regs: device registers
405 * @sram_size: usable SRAM size
406 * @lock: device lock
f63601fd 407 * @engines: array of engines
db509a45 408 * @dma: dma pools
f63601fd
BB
409 *
410 * Structure storing CESA device information.
411 */
412struct mv_cesa_dev {
413 const struct mv_cesa_caps *caps;
414 void __iomem *regs;
415 struct device *dev;
416 unsigned int sram_size;
417 spinlock_t lock;
f63601fd 418 struct mv_cesa_engine *engines;
db509a45 419 struct mv_cesa_dev_dma *dma;
f63601fd
BB
420};
421
422/**
423 * struct mv_cesa_engine - CESA engine
424 * @id: engine id
425 * @regs: engine registers
426 * @sram: SRAM memory region
427 * @sram_dma: DMA address of the SRAM memory region
428 * @lock: engine lock
429 * @req: current crypto request
430 * @clk: engine clk
431 * @zclk: engine zclk
432 * @max_req_len: maximum chunk length (useful to create the TDMA chain)
433 * @int_mask: interrupt mask cache
434 * @pool: memory pool pointing to the memory region reserved in
435 * SRAM
bf8f91e7
RP
436 * @queue: fifo of the pending crypto requests
437 * @load: engine load counter, useful for load balancing
85030c51
RP
438 * @chain: list of the current tdma descriptors being processed
439 * by this engine.
440 * @complete_queue: fifo of the processed requests by the engine
f63601fd
BB
441 *
442 * Structure storing CESA engine information.
443 */
444struct mv_cesa_engine {
445 int id;
446 void __iomem *regs;
447 void __iomem *sram;
448 dma_addr_t sram_dma;
449 spinlock_t lock;
450 struct crypto_async_request *req;
451 struct clk *clk;
452 struct clk *zclk;
453 size_t max_req_len;
454 u32 int_mask;
455 struct gen_pool *pool;
bf8f91e7
RP
456 struct crypto_queue queue;
457 atomic_t load;
85030c51
RP
458 struct mv_cesa_tdma_chain chain;
459 struct list_head complete_queue;
f63601fd
BB
460};
461
462/**
463 * struct mv_cesa_req_ops - CESA request operations
f63601fd
BB
464 * @process: process a request chunk result (should return 0 if the
465 * operation, -EINPROGRESS if it needs more steps or an error
466 * code)
467 * @step: launch the crypto operation on the next chunk
468 * @cleanup: cleanup the crypto request (release associated data)
1bf6682c
RP
469 * @complete: complete the request, i.e copy result or context from sram when
470 * needed.
f63601fd
BB
471 */
472struct mv_cesa_req_ops {
f63601fd
BB
473 int (*process)(struct crypto_async_request *req, u32 status);
474 void (*step)(struct crypto_async_request *req);
475 void (*cleanup)(struct crypto_async_request *req);
1bf6682c 476 void (*complete)(struct crypto_async_request *req);
f63601fd
BB
477};
478
479/**
480 * struct mv_cesa_ctx - CESA operation context
481 * @ops: crypto operations
482 *
483 * Base context structure inherited by operation specific ones.
484 */
485struct mv_cesa_ctx {
486 const struct mv_cesa_req_ops *ops;
487};
488
489/**
490 * struct mv_cesa_hash_ctx - CESA hash operation context
491 * @base: base context structure
492 *
493 * Hash context structure.
494 */
495struct mv_cesa_hash_ctx {
496 struct mv_cesa_ctx base;
497};
498
499/**
500 * struct mv_cesa_hash_ctx - CESA hmac operation context
501 * @base: base context structure
502 * @iv: initialization vectors
503 *
504 * HMAC context structure.
505 */
506struct mv_cesa_hmac_ctx {
507 struct mv_cesa_ctx base;
508 u32 iv[16];
509};
510
511/**
512 * enum mv_cesa_req_type - request type definitions
513 * @CESA_STD_REQ: standard request
db509a45 514 * @CESA_DMA_REQ: DMA request
f63601fd
BB
515 */
516enum mv_cesa_req_type {
517 CESA_STD_REQ,
db509a45 518 CESA_DMA_REQ,
f63601fd
BB
519};
520
521/**
522 * struct mv_cesa_req - CESA request
f63601fd 523 * @engine: engine associated with this request
53da740f 524 * @chain: list of tdma descriptors associated with this request
f63601fd
BB
525 */
526struct mv_cesa_req {
f63601fd 527 struct mv_cesa_engine *engine;
db509a45
BB
528 struct mv_cesa_tdma_chain chain;
529};
530
531/**
532 * struct mv_cesa_sg_std_iter - CESA scatter-gather iterator for standard
533 * requests
534 * @iter: sg mapping iterator
535 * @offset: current offset in the SG entry mapped in memory
536 */
537struct mv_cesa_sg_std_iter {
538 struct sg_mapping_iter iter;
539 unsigned int offset;
540};
541
f63601fd 542/**
e6cd5bf6 543 * struct mv_cesa_skcipher_std_req - cipher standard request
f63601fd
BB
544 * @op: operation context
545 * @offset: current operation offset
546 * @size: size of the crypto operation
547 */
e6cd5bf6 548struct mv_cesa_skcipher_std_req {
f63601fd
BB
549 struct mv_cesa_op_ctx op;
550 unsigned int offset;
551 unsigned int size;
552 bool skip_ctx;
553};
554
555/**
e6cd5bf6 556 * struct mv_cesa_skcipher_req - cipher request
f63601fd
BB
557 * @req: type specific request information
558 * @src_nents: number of entries in the src sg list
559 * @dst_nents: number of entries in the dest sg list
560 */
e6cd5bf6 561struct mv_cesa_skcipher_req {
53da740f 562 struct mv_cesa_req base;
e6cd5bf6 563 struct mv_cesa_skcipher_std_req std;
f63601fd
BB
564 int src_nents;
565 int dst_nents;
566};
567
568/**
569 * struct mv_cesa_ahash_std_req - standard hash request
f63601fd
BB
570 * @offset: current operation offset
571 */
572struct mv_cesa_ahash_std_req {
f63601fd
BB
573 unsigned int offset;
574};
575
db509a45
BB
576/**
577 * struct mv_cesa_ahash_dma_req - DMA hash request
db509a45
BB
578 * @padding: padding buffer
579 * @padding_dma: DMA address of the padding buffer
580 * @cache_dma: DMA address of the cache buffer
581 */
582struct mv_cesa_ahash_dma_req {
db509a45
BB
583 u8 *padding;
584 dma_addr_t padding_dma;
7850c91b 585 u8 *cache;
db509a45
BB
586 dma_addr_t cache_dma;
587};
588
f63601fd
BB
589/**
590 * struct mv_cesa_ahash_req - hash request
591 * @req: type specific request information
592 * @cache: cache buffer
593 * @cache_ptr: write pointer in the cache buffer
594 * @len: hash total length
595 * @src_nents: number of entries in the scatterlist
596 * @last_req: define whether the current operation is the last one
597 * or not
598 * @state: hash state
599 */
600struct mv_cesa_ahash_req {
53da740f 601 struct mv_cesa_req base;
f63601fd 602 union {
db509a45 603 struct mv_cesa_ahash_dma_req dma;
f63601fd
BB
604 struct mv_cesa_ahash_std_req std;
605 } req;
606 struct mv_cesa_op_ctx op_tmpl;
7850c91b 607 u8 cache[CESA_MAX_HASH_BLOCK_SIZE];
f63601fd
BB
608 unsigned int cache_ptr;
609 u64 len;
610 int src_nents;
611 bool last_req;
a9eb678f 612 bool algo_le;
4c2b130c 613 u32 state[8];
f63601fd
BB
614};
615
616/* CESA functions */
617
618extern struct mv_cesa_dev *cesa_dev;
619
85030c51
RP
620
621static inline void
622mv_cesa_engine_enqueue_complete_request(struct mv_cesa_engine *engine,
623 struct crypto_async_request *req)
624{
625 list_add_tail(&req->list, &engine->complete_queue);
626}
627
628static inline struct crypto_async_request *
629mv_cesa_engine_dequeue_complete_request(struct mv_cesa_engine *engine)
630{
631 struct crypto_async_request *req;
632
633 req = list_first_entry_or_null(&engine->complete_queue,
634 struct crypto_async_request,
635 list);
636 if (req)
637 list_del(&req->list);
638
639 return req;
640}
641
642
53da740f
RP
643static inline enum mv_cesa_req_type
644mv_cesa_req_get_type(struct mv_cesa_req *req)
645{
646 return req->chain.first ? CESA_DMA_REQ : CESA_STD_REQ;
647}
648
f63601fd
BB
649static inline void mv_cesa_update_op_cfg(struct mv_cesa_op_ctx *op,
650 u32 cfg, u32 mask)
651{
652 op->desc.config &= cpu_to_le32(~mask);
653 op->desc.config |= cpu_to_le32(cfg);
654}
655
c439e4ee 656static inline u32 mv_cesa_get_op_cfg(const struct mv_cesa_op_ctx *op)
f63601fd
BB
657{
658 return le32_to_cpu(op->desc.config);
659}
660
661static inline void mv_cesa_set_op_cfg(struct mv_cesa_op_ctx *op, u32 cfg)
662{
663 op->desc.config = cpu_to_le32(cfg);
664}
665
666static inline void mv_cesa_adjust_op(struct mv_cesa_engine *engine,
667 struct mv_cesa_op_ctx *op)
668{
669 u32 offset = engine->sram_dma & CESA_SA_SRAM_MSK;
670
671 op->desc.enc_p = CESA_SA_DESC_CRYPT_DATA(offset);
672 op->desc.enc_key_p = CESA_SA_DESC_CRYPT_KEY(offset);
673 op->desc.enc_iv = CESA_SA_DESC_CRYPT_IV(offset);
674 op->desc.mac_src_p &= ~CESA_SA_DESC_MAC_DATA_MSK;
675 op->desc.mac_src_p |= CESA_SA_DESC_MAC_DATA(offset);
676 op->desc.mac_digest &= ~CESA_SA_DESC_MAC_DIGEST_MSK;
677 op->desc.mac_digest |= CESA_SA_DESC_MAC_DIGEST(offset);
678 op->desc.mac_iv = CESA_SA_DESC_MAC_IV(offset);
679}
680
681static inline void mv_cesa_set_crypt_op_len(struct mv_cesa_op_ctx *op, int len)
682{
683 op->desc.enc_len = cpu_to_le32(len);
684}
685
686static inline void mv_cesa_set_mac_op_total_len(struct mv_cesa_op_ctx *op,
687 int len)
688{
689 op->desc.mac_src_p &= ~CESA_SA_DESC_MAC_TOTAL_LEN_MSK;
690 op->desc.mac_src_p |= CESA_SA_DESC_MAC_TOTAL_LEN(len);
691}
692
693static inline void mv_cesa_set_mac_op_frag_len(struct mv_cesa_op_ctx *op,
694 int len)
695{
696 op->desc.mac_digest &= ~CESA_SA_DESC_MAC_FRAG_LEN_MSK;
697 op->desc.mac_digest |= CESA_SA_DESC_MAC_FRAG_LEN(len);
698}
699
700static inline void mv_cesa_set_int_mask(struct mv_cesa_engine *engine,
701 u32 int_mask)
702{
703 if (int_mask == engine->int_mask)
704 return;
705
b1508561 706 writel_relaxed(int_mask, engine->regs + CESA_SA_INT_MSK);
f63601fd
BB
707 engine->int_mask = int_mask;
708}
709
710static inline u32 mv_cesa_get_int_mask(struct mv_cesa_engine *engine)
711{
712 return engine->int_mask;
713}
714
8651791e
RK
715static inline bool mv_cesa_mac_op_is_first_frag(const struct mv_cesa_op_ctx *op)
716{
717 return (mv_cesa_get_op_cfg(op) & CESA_SA_DESC_CFG_FRAG_MSK) ==
718 CESA_SA_DESC_CFG_FIRST_FRAG;
719}
720
53da740f
RP
721int mv_cesa_queue_req(struct crypto_async_request *req,
722 struct mv_cesa_req *creq);
f63601fd 723
85030c51
RP
724struct crypto_async_request *
725mv_cesa_dequeue_req_locked(struct mv_cesa_engine *engine,
726 struct crypto_async_request **backlog);
727
bf8f91e7
RP
728static inline struct mv_cesa_engine *mv_cesa_select_engine(int weight)
729{
730 int i;
731 u32 min_load = U32_MAX;
732 struct mv_cesa_engine *selected = NULL;
733
734 for (i = 0; i < cesa_dev->caps->nengines; i++) {
735 struct mv_cesa_engine *engine = cesa_dev->engines + i;
736 u32 load = atomic_read(&engine->load);
737 if (load < min_load) {
738 min_load = load;
739 selected = engine;
740 }
741 }
742
743 atomic_add(weight, &selected->load);
744
745 return selected;
746}
747
cfcd2271
TP
748/*
749 * Helper function that indicates whether a crypto request needs to be
750 * cleaned up or not after being enqueued using mv_cesa_queue_req().
751 */
752static inline int mv_cesa_req_needs_cleanup(struct crypto_async_request *req,
753 int ret)
754{
755 /*
756 * The queue still had some space, the request was queued
757 * normally, so there's no need to clean it up.
758 */
759 if (ret == -EINPROGRESS)
760 return false;
761
762 /*
763 * The queue had not space left, but since the request is
764 * flagged with CRYPTO_TFM_REQ_MAY_BACKLOG, it was added to
765 * the backlog and will be processed later. There's no need to
766 * clean it up.
767 */
3d549e32 768 if (ret == -EBUSY)
cfcd2271
TP
769 return false;
770
771 /* Request wasn't queued, we need to clean it up */
772 return true;
773}
774
db509a45
BB
775/* TDMA functions */
776
777static inline void mv_cesa_req_dma_iter_init(struct mv_cesa_dma_iter *iter,
778 unsigned int len)
779{
780 iter->len = len;
781 iter->op_len = min(len, CESA_SA_SRAM_PAYLOAD_SIZE);
782 iter->offset = 0;
783}
784
785static inline void mv_cesa_sg_dma_iter_init(struct mv_cesa_sg_dma_iter *iter,
786 struct scatterlist *sg,
787 enum dma_data_direction dir)
788{
789 iter->op_offset = 0;
790 iter->offset = 0;
791 iter->sg = sg;
792 iter->dir = dir;
793}
794
795static inline unsigned int
796mv_cesa_req_dma_iter_transfer_len(struct mv_cesa_dma_iter *iter,
797 struct mv_cesa_sg_dma_iter *sgiter)
798{
799 return min(iter->op_len - sgiter->op_offset,
800 sg_dma_len(sgiter->sg) - sgiter->offset);
801}
802
803bool mv_cesa_req_dma_iter_next_transfer(struct mv_cesa_dma_iter *chain,
804 struct mv_cesa_sg_dma_iter *sgiter,
805 unsigned int len);
806
807static inline bool mv_cesa_req_dma_iter_next_op(struct mv_cesa_dma_iter *iter)
808{
809 iter->offset += iter->op_len;
810 iter->op_len = min(iter->len - iter->offset,
811 CESA_SA_SRAM_PAYLOAD_SIZE);
812
813 return iter->op_len;
814}
815
53da740f 816void mv_cesa_dma_step(struct mv_cesa_req *dreq);
db509a45 817
53da740f 818static inline int mv_cesa_dma_process(struct mv_cesa_req *dreq,
db509a45
BB
819 u32 status)
820{
821 if (!(status & CESA_SA_INT_ACC0_IDMA_DONE))
822 return -EINPROGRESS;
823
824 if (status & CESA_SA_INT_IDMA_OWN_ERR)
825 return -EINVAL;
826
827 return 0;
828}
829
53da740f 830void mv_cesa_dma_prepare(struct mv_cesa_req *dreq,
db509a45 831 struct mv_cesa_engine *engine);
53da740f 832void mv_cesa_dma_cleanup(struct mv_cesa_req *dreq);
85030c51
RP
833void mv_cesa_tdma_chain(struct mv_cesa_engine *engine,
834 struct mv_cesa_req *dreq);
835int mv_cesa_tdma_process(struct mv_cesa_engine *engine, u32 status);
db509a45 836
db509a45
BB
837
838static inline void
839mv_cesa_tdma_desc_iter_init(struct mv_cesa_tdma_chain *chain)
840{
841 memset(chain, 0, sizeof(*chain));
842}
843
0c99620f 844int mv_cesa_dma_add_result_op(struct mv_cesa_tdma_chain *chain, dma_addr_t src,
bac8e805
RP
845 u32 size, u32 flags, gfp_t gfp_flags);
846
db509a45
BB
847struct mv_cesa_op_ctx *mv_cesa_dma_add_op(struct mv_cesa_tdma_chain *chain,
848 const struct mv_cesa_op_ctx *op_templ,
849 bool skip_ctx,
850 gfp_t flags);
851
852int mv_cesa_dma_add_data_transfer(struct mv_cesa_tdma_chain *chain,
853 dma_addr_t dst, dma_addr_t src, u32 size,
854 u32 flags, gfp_t gfp_flags);
855
35622eae
RK
856int mv_cesa_dma_add_dummy_launch(struct mv_cesa_tdma_chain *chain, gfp_t flags);
857int mv_cesa_dma_add_dummy_end(struct mv_cesa_tdma_chain *chain, gfp_t flags);
db509a45
BB
858
859int mv_cesa_dma_add_op_transfers(struct mv_cesa_tdma_chain *chain,
860 struct mv_cesa_dma_iter *dma_iter,
861 struct mv_cesa_sg_dma_iter *sgiter,
862 gfp_t gfp_flags);
863
f63601fd
BB
864/* Algorithm definitions */
865
7aeef693 866extern struct ahash_alg mv_md5_alg;
f63601fd 867extern struct ahash_alg mv_sha1_alg;
f85a762e 868extern struct ahash_alg mv_sha256_alg;
7aeef693 869extern struct ahash_alg mv_ahmac_md5_alg;
f63601fd 870extern struct ahash_alg mv_ahmac_sha1_alg;
f85a762e 871extern struct ahash_alg mv_ahmac_sha256_alg;
f63601fd 872
e6cd5bf6
BB
873extern struct skcipher_alg mv_cesa_ecb_des_alg;
874extern struct skcipher_alg mv_cesa_cbc_des_alg;
875extern struct skcipher_alg mv_cesa_ecb_des3_ede_alg;
876extern struct skcipher_alg mv_cesa_cbc_des3_ede_alg;
877extern struct skcipher_alg mv_cesa_ecb_aes_alg;
878extern struct skcipher_alg mv_cesa_cbc_aes_alg;
f63601fd
BB
879
880#endif /* __MARVELL_CESA_H__ */