1 /* SPDX-License-Identifier: GPL-2.0 */
3 * K3 SA2UL crypto accelerator driver
5 * Copyright (C) 2018-2020 Texas Instruments Incorporated - http://www.ti.com
15 #include <crypto/aes.h>
16 #include <crypto/sha1.h>
17 #include <crypto/sha2.h>
19 #define SA_ENGINE_STATUS 0x0008
20 #define SA_ENGINE_ENABLE_CONTROL 0x1000
24 * SA_ENGINE_ENABLE_CONTROL register bits
26 #define SA_EEC_ENCSS_EN 0x00000001
27 #define SA_EEC_AUTHSS_EN 0x00000002
28 #define SA_EEC_TRNG_EN 0x00000008
29 #define SA_EEC_PKA_EN 0x00000010
30 #define SA_EEC_CTXCACH_EN 0x00000080
31 #define SA_EEC_CPPI_PORT_IN_EN 0x00000200
32 #define SA_EEC_CPPI_PORT_OUT_EN 0x00000800
35 * Encoding used to identify the typo of crypto operation
36 * performed on the packet when the packet is returned
39 #define SA_REQ_SUBTYPE_ENC 0x0001
40 #define SA_REQ_SUBTYPE_DEC 0x0002
41 #define SA_REQ_SUBTYPE_SHIFT 16
42 #define SA_REQ_SUBTYPE_MASK 0xffff
44 /* Number of 32 bit words in EPIB */
45 #define SA_DMA_NUM_EPIB_WORDS 4
47 /* Number of 32 bit words in PS data */
48 #define SA_DMA_NUM_PS_WORDS 16
53 * Maximum number of simultaeneous security contexts
54 * supported by the driver
56 #define SA_MAX_NUM_CTX 512
59 * Assumption: CTX size is multiple of 32
61 #define SA_CTX_SIZE_TO_DMA_SIZE(ctx_sz) \
62 ((ctx_sz) ? ((ctx_sz) / 32 - 1) : 0)
64 #define SA_CTX_ENC_KEY_OFFSET 32
65 #define SA_CTX_ENC_AUX1_OFFSET 64
66 #define SA_CTX_ENC_AUX2_OFFSET 96
67 #define SA_CTX_ENC_AUX3_OFFSET 112
68 #define SA_CTX_ENC_AUX4_OFFSET 128
70 /* Next Engine Select code in CP_ACE */
71 #define SA_ENG_ID_EM1 2 /* Enc/Dec engine with AES/DEC core */
72 #define SA_ENG_ID_EM2 3 /* Encryption/Decryption enginefor pass 2 */
73 #define SA_ENG_ID_AM1 4 /* Auth. engine with SHA1/MD5/SHA2 core */
74 #define SA_ENG_ID_AM2 5 /* Authentication engine for pass 2 */
75 #define SA_ENG_ID_OUTPORT2 20 /* Egress module 2 */
78 * Command Label Definitions
80 #define SA_CMDL_OFFSET_NESC 0 /* Next Engine Select Code */
81 #define SA_CMDL_OFFSET_LABEL_LEN 1 /* Engine Command Label Length */
82 /* 16-bit Length of Data to be processed */
83 #define SA_CMDL_OFFSET_DATA_LEN 2
84 #define SA_CMDL_OFFSET_DATA_OFFSET 4 /* Stat Data Offset */
85 #define SA_CMDL_OFFSET_OPTION_CTRL1 5 /* Option Control Byte 1 */
86 #define SA_CMDL_OFFSET_OPTION_CTRL2 6 /* Option Control Byte 2 */
87 #define SA_CMDL_OFFSET_OPTION_CTRL3 7 /* Option Control Byte 3 */
88 #define SA_CMDL_OFFSET_OPTION_BYTE 8
90 #define SA_CMDL_HEADER_SIZE_BYTES 8
92 #define SA_CMDL_OPTION_BYTES_MAX_SIZE 72
93 #define SA_CMDL_MAX_SIZE_BYTES (SA_CMDL_HEADER_SIZE_BYTES + \
94 SA_CMDL_OPTION_BYTES_MAX_SIZE)
96 /* SWINFO word-0 flags */
97 #define SA_SW_INFO_FLAG_EVICT 0x0001
98 #define SA_SW_INFO_FLAG_TEAR 0x0002
99 #define SA_SW_INFO_FLAG_NOPD 0x0004
102 * This type represents the various packet types to be processed
103 * by the PHP engine in SA.
104 * It is used to identify the corresponding PHP processing function.
106 #define SA_CTX_PE_PKT_TYPE_3GPP_AIR 0 /* 3GPP Air Cipher */
107 #define SA_CTX_PE_PKT_TYPE_SRTP 1 /* SRTP */
108 #define SA_CTX_PE_PKT_TYPE_IPSEC_AH 2 /* IPSec Authentication Header */
109 /* IPSec Encapsulating Security Payload */
110 #define SA_CTX_PE_PKT_TYPE_IPSEC_ESP 3
111 /* Indicates that it is in data mode, It may not be used by PHP */
112 #define SA_CTX_PE_PKT_TYPE_NONE 4
113 #define SA_CTX_ENC_TYPE1_SZ 64 /* Encryption SC with Key only */
114 #define SA_CTX_ENC_TYPE2_SZ 96 /* Encryption SC with Key and Aux1 */
116 #define SA_CTX_AUTH_TYPE1_SZ 64 /* Auth SC with Key only */
117 #define SA_CTX_AUTH_TYPE2_SZ 96 /* Auth SC with Key and Aux1 */
118 /* Size of security context for PHP engine */
119 #define SA_CTX_PHP_PE_CTX_SZ 64
121 #define SA_CTX_MAX_SZ (64 + SA_CTX_ENC_TYPE2_SZ + SA_CTX_AUTH_TYPE2_SZ)
124 * Encoding of F/E control in SCCTL
125 * Bit 0-1: Fetch PHP Bytes
126 * Bit 2-3: Fetch Encryption/Air Ciphering Bytes
127 * Bit 4-5: Fetch Authentication Bytes or Encr pass 2
128 * Bit 6-7: Evict PHP Bytes
135 #define SA_CTX_DMA_SIZE_0 0
136 #define SA_CTX_DMA_SIZE_64 1
137 #define SA_CTX_DMA_SIZE_96 2
138 #define SA_CTX_DMA_SIZE_128 3
141 * Byte offset of the owner word in SCCTL
142 * in the security context
144 #define SA_CTX_SCCTL_OWNER_OFFSET 0
146 #define SA_CTX_ENC_KEY_OFFSET 32
147 #define SA_CTX_ENC_AUX1_OFFSET 64
148 #define SA_CTX_ENC_AUX2_OFFSET 96
149 #define SA_CTX_ENC_AUX3_OFFSET 112
150 #define SA_CTX_ENC_AUX4_OFFSET 128
152 #define SA_SCCTL_FE_AUTH_ENC 0x65
153 #define SA_SCCTL_FE_ENC 0x8D
155 #define SA_ALIGN_MASK (sizeof(u32) - 1)
156 #define SA_ALIGNED __aligned(32)
158 #define SA_AUTH_SW_CTRL_MD5 1
159 #define SA_AUTH_SW_CTRL_SHA1 2
160 #define SA_AUTH_SW_CTRL_SHA224 3
161 #define SA_AUTH_SW_CTRL_SHA256 4
162 #define SA_AUTH_SW_CTRL_SHA384 5
163 #define SA_AUTH_SW_CTRL_SHA512 6
165 /* SA2UL can only handle maximum data size of 64KB */
166 #define SA_MAX_DATA_SZ U16_MAX
169 * SA2UL can provide unpredictable results with packet sizes that fall
170 * the following range, so avoid using it.
172 #define SA_UNSAFE_DATA_SZ_MIN 240
173 #define SA_UNSAFE_DATA_SZ_MAX 255
175 struct sa_match_data
;
178 * struct sa_crypto_data - Crypto driver instance data
179 * @base: Base address of the register space
180 * @soc_data: Pointer to SoC specific data
181 * @pdev: Platform device pointer
182 * @sc_pool: security context pool
183 * @dev: Device pointer
184 * @scid_lock: secure context ID lock
185 * @sc_id_start: starting index for SC ID
186 * @sc_id_end: Ending index for SC ID
187 * @sc_id: Security Context ID
188 * @ctx_bm: Bitmap to keep track of Security context ID's
189 * @ctx: SA tfm context pointer
190 * @dma_rx1: Pointer to DMA rx channel for sizes < 256 Bytes
191 * @dma_rx2: Pointer to DMA rx channel for sizes > 256 Bytes
192 * @dma_tx: Pointer to DMA TX channel
194 struct sa_crypto_data
{
196 const struct sa_match_data
*match_data
;
197 struct platform_device
*pdev
;
198 struct dma_pool
*sc_pool
;
200 spinlock_t scid_lock
; /* lock for SC-ID allocation */
201 /* Security context data */
205 unsigned long ctx_bm
[DIV_ROUND_UP(SA_MAX_NUM_CTX
,
207 struct sa_tfm_ctx
*ctx
;
208 struct dma_chan
*dma_rx1
;
209 struct dma_chan
*dma_rx2
;
210 struct dma_chan
*dma_tx
;
214 * struct sa_cmdl_param_info: Command label parameters info
215 * @index: Index of the parameter in the command label format
216 * @offset: the offset of the parameter
217 * @size: Size of the parameter
219 struct sa_cmdl_param_info
{
225 /* Maximum length of Auxiliary data in 32bit words */
226 #define SA_MAX_AUX_DATA_WORDS 8
229 * struct sa_cmdl_upd_info: Command label updation info
230 * @flags: flags in command label
231 * @submode: Encryption submodes
232 * @enc_size: Size of first pass encryption size
233 * @enc_size2: Size of second pass encryption size
234 * @enc_offset: Encryption payload offset in the packet
235 * @enc_iv: Encryption initialization vector for pass2
236 * @enc_iv2: Encryption initialization vector for pass2
237 * @aad: Associated data
238 * @payload: Payload info
239 * @auth_size: Authentication size for pass 1
240 * @auth_size2: Authentication size for pass 2
241 * @auth_offset: Authentication payload offset
242 * @auth_iv: Authentication initialization vector
243 * @aux_key_info: Authentication aux key information
244 * @aux_key: Aux key for authentication
246 struct sa_cmdl_upd_info
{
249 struct sa_cmdl_param_info enc_size
;
250 struct sa_cmdl_param_info enc_size2
;
251 struct sa_cmdl_param_info enc_offset
;
252 struct sa_cmdl_param_info enc_iv
;
253 struct sa_cmdl_param_info enc_iv2
;
254 struct sa_cmdl_param_info aad
;
255 struct sa_cmdl_param_info payload
;
256 struct sa_cmdl_param_info auth_size
;
257 struct sa_cmdl_param_info auth_size2
;
258 struct sa_cmdl_param_info auth_offset
;
259 struct sa_cmdl_param_info auth_iv
;
260 struct sa_cmdl_param_info aux_key_info
;
261 u32 aux_key
[SA_MAX_AUX_DATA_WORDS
];
265 * Number of 32bit words appended after the command label
266 * in PSDATA to identify the crypto request context.
267 * word-0: Request type
268 * word-1: pointer to request
270 #define SA_PSDATA_CTX_WORDS 4
272 /* Maximum size of Command label in 32 words */
273 #define SA_MAX_CMDL_WORDS (SA_DMA_NUM_PS_WORDS - SA_PSDATA_CTX_WORDS)
276 * struct sa_ctx_info: SA context information
277 * @sc: Pointer to security context
278 * @sc_phys: Security context physical address that is passed on to SA2UL
279 * @sc_id: Security context ID
280 * @cmdl_size: Command label size
281 * @cmdl: Command label for a particular iteration
282 * @cmdl_upd_info: structure holding command label updation info
283 * @epib: Extended protocol information block words
290 u32 cmdl
[SA_MAX_CMDL_WORDS
];
291 struct sa_cmdl_upd_info cmdl_upd_info
;
292 /* Store Auxiliary data such as K2/K3 subkeys in AES-XCBC */
293 u32 epib
[SA_DMA_NUM_EPIB_WORDS
];
297 * struct sa_tfm_ctx: TFM context structure
298 * @dev_data: struct sa_crypto_data pointer
299 * @enc: struct sa_ctx_info for encryption
300 * @dec: struct sa_ctx_info for decryption
301 * @keylen: encrption/decryption keylength
302 * @iv_idx: Initialization vector index
303 * @key: encryption key
304 * @fallback: SW fallback algorithm
307 struct sa_crypto_data
*dev_data
;
308 struct sa_ctx_info enc
;
309 struct sa_ctx_info dec
;
310 struct sa_ctx_info auth
;
313 u32 key
[AES_KEYSIZE_256
/ sizeof(u32
)];
314 u8 authkey
[SHA512_BLOCK_SIZE
];
315 struct crypto_shash
*shash
;
318 struct crypto_skcipher
*skcipher
;
319 struct crypto_ahash
*ahash
;
320 struct crypto_aead
*aead
;
325 * struct sa_sha_req_ctx: Structure used for sha request
326 * @dev_data: struct sa_crypto_data pointer
327 * @cmdl: Complete command label with psdata and epib included
328 * @fallback_req: SW fallback request container
330 struct sa_sha_req_ctx
{
331 struct sa_crypto_data
*dev_data
;
332 u32 cmdl
[SA_MAX_CMDL_WORDS
+ SA_PSDATA_CTX_WORDS
];
333 struct ahash_request fallback_req
;
343 /* Encryption algorithms */
345 SA_EALG_ID_NONE
= 0, /* No encryption */
346 SA_EALG_ID_NULL
, /* NULL encryption */
347 SA_EALG_ID_AES_CTR
, /* AES Counter mode */
348 SA_EALG_ID_AES_F8
, /* AES F8 mode */
349 SA_EALG_ID_AES_CBC
, /* AES CBC mode */
350 SA_EALG_ID_DES_CBC
, /* DES CBC mode */
351 SA_EALG_ID_3DES_CBC
, /* 3DES CBC mode */
352 SA_EALG_ID_CCM
, /* Counter with CBC-MAC mode */
353 SA_EALG_ID_GCM
, /* Galois Counter mode */
358 /* Authentication algorithms */
360 SA_AALG_ID_NONE
= 0, /* No Authentication */
361 SA_AALG_ID_NULL
= SA_EALG_ID_LAST
, /* NULL Authentication */
362 SA_AALG_ID_MD5
, /* MD5 mode */
363 SA_AALG_ID_SHA1
, /* SHA1 mode */
364 SA_AALG_ID_SHA2_224
, /* 224-bit SHA2 mode */
365 SA_AALG_ID_SHA2_256
, /* 256-bit SHA2 mode */
366 SA_AALG_ID_SHA2_512
, /* 512-bit SHA2 mode */
367 SA_AALG_ID_HMAC_MD5
, /* HMAC with MD5 mode */
368 SA_AALG_ID_HMAC_SHA1
, /* HMAC with SHA1 mode */
369 SA_AALG_ID_HMAC_SHA2_224
, /* HMAC with 224-bit SHA2 mode */
370 SA_AALG_ID_HMAC_SHA2_256
, /* HMAC with 256-bit SHA2 mode */
371 SA_AALG_ID_GMAC
, /* Galois Message Auth. Code mode */
372 SA_AALG_ID_CMAC
, /* Cipher-based Mes. Auth. Code mode */
373 SA_AALG_ID_CBC_MAC
, /* Cipher Block Chaining */
374 SA_AALG_ID_AES_XCBC
/* AES Extended Cipher Block Chaining */
378 * Mode control engine algorithms used to index the
379 * mode control instruction tables
381 enum sa_eng_algo_id
{
398 * struct sa_eng_info: Security accelerator engine info
400 * @sc_size: security context size
407 #endif /* _K3_SA2UL_ */