sh_eth: fix EESIPR values for SH77{34|63}
[linux/fpc-iii.git] / drivers / crypto / chelsio / chcr_crypto.h
blobd5af7d64a763bc8ad4ce45d60bada6226059bff1
1 /*
2 * This file is part of the Chelsio T6 Crypto driver for Linux.
4 * Copyright (c) 2003-2016 Chelsio Communications, Inc. All rights reserved.
6 * This software is available to you under a choice of one of two
7 * licenses. You may choose to be licensed under the terms of the GNU
8 * General Public License (GPL) Version 2, available from the file
9 * COPYING in the main directory of this source tree, or the
10 * OpenIB.org BSD license below:
12 * Redistribution and use in source and binary forms, with or
13 * without modification, are permitted provided that the following
14 * conditions are met:
16 * - Redistributions of source code must retain the above
17 * copyright notice, this list of conditions and the following
18 * disclaimer.
20 * - Redistributions in binary form must reproduce the above
21 * copyright notice, this list of conditions and the following
22 * disclaimer in the documentation and/or other materials
23 * provided with the distribution.
25 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
26 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
27 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
28 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
29 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
30 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
31 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
32 * SOFTWARE.
36 #ifndef __CHCR_CRYPTO_H__
37 #define __CHCR_CRYPTO_H__
39 #define GHASH_BLOCK_SIZE 16
40 #define GHASH_DIGEST_SIZE 16
42 #define CCM_B0_SIZE 16
43 #define CCM_AAD_FIELD_SIZE 2
44 #define T5_MAX_AAD_SIZE 512
47 /* Define following if h/w is not dropping the AAD and IV data before
48 * giving the processed data
51 #define CHCR_CRA_PRIORITY 300
53 #define CHCR_AES_MAX_KEY_LEN (2 * (AES_MAX_KEY_SIZE)) /* consider xts */
54 #define CHCR_MAX_CRYPTO_IV_LEN 16 /* AES IV len */
56 #define CHCR_MAX_AUTHENC_AES_KEY_LEN 32 /* max aes key length*/
57 #define CHCR_MAX_AUTHENC_SHA_KEY_LEN 128 /* max sha key length*/
59 #define CHCR_GIVENCRYPT_OP 2
60 /* CPL/SCMD parameters */
62 #define CHCR_ENCRYPT_OP 0
63 #define CHCR_DECRYPT_OP 1
65 #define CHCR_SCMD_SEQ_NO_CTRL_32BIT 1
66 #define CHCR_SCMD_SEQ_NO_CTRL_48BIT 2
67 #define CHCR_SCMD_SEQ_NO_CTRL_64BIT 3
69 #define CHCR_SCMD_PROTO_VERSION_GENERIC 4
71 #define CHCR_SCMD_AUTH_CTRL_AUTH_CIPHER 0
72 #define CHCR_SCMD_AUTH_CTRL_CIPHER_AUTH 1
74 #define CHCR_SCMD_CIPHER_MODE_NOP 0
75 #define CHCR_SCMD_CIPHER_MODE_AES_CBC 1
76 #define CHCR_SCMD_CIPHER_MODE_AES_GCM 2
77 #define CHCR_SCMD_CIPHER_MODE_AES_CTR 3
78 #define CHCR_SCMD_CIPHER_MODE_GENERIC_AES 4
79 #define CHCR_SCMD_CIPHER_MODE_AES_XTS 6
80 #define CHCR_SCMD_CIPHER_MODE_AES_CCM 7
82 #define CHCR_SCMD_AUTH_MODE_NOP 0
83 #define CHCR_SCMD_AUTH_MODE_SHA1 1
84 #define CHCR_SCMD_AUTH_MODE_SHA224 2
85 #define CHCR_SCMD_AUTH_MODE_SHA256 3
86 #define CHCR_SCMD_AUTH_MODE_GHASH 4
87 #define CHCR_SCMD_AUTH_MODE_SHA512_224 5
88 #define CHCR_SCMD_AUTH_MODE_SHA512_256 6
89 #define CHCR_SCMD_AUTH_MODE_SHA512_384 7
90 #define CHCR_SCMD_AUTH_MODE_SHA512_512 8
91 #define CHCR_SCMD_AUTH_MODE_CBCMAC 9
92 #define CHCR_SCMD_AUTH_MODE_CMAC 10
94 #define CHCR_SCMD_HMAC_CTRL_NOP 0
95 #define CHCR_SCMD_HMAC_CTRL_NO_TRUNC 1
96 #define CHCR_SCMD_HMAC_CTRL_TRUNC_RFC4366 2
97 #define CHCR_SCMD_HMAC_CTRL_IPSEC_96BIT 3
98 #define CHCR_SCMD_HMAC_CTRL_PL1 4
99 #define CHCR_SCMD_HMAC_CTRL_PL2 5
100 #define CHCR_SCMD_HMAC_CTRL_PL3 6
101 #define CHCR_SCMD_HMAC_CTRL_DIV2 7
102 #define VERIFY_HW 0
103 #define VERIFY_SW 1
105 #define CHCR_SCMD_IVGEN_CTRL_HW 0
106 #define CHCR_SCMD_IVGEN_CTRL_SW 1
107 /* This are not really mac key size. They are intermediate values
108 * of sha engine and its size
110 #define CHCR_KEYCTX_MAC_KEY_SIZE_128 0
111 #define CHCR_KEYCTX_MAC_KEY_SIZE_160 1
112 #define CHCR_KEYCTX_MAC_KEY_SIZE_192 2
113 #define CHCR_KEYCTX_MAC_KEY_SIZE_256 3
114 #define CHCR_KEYCTX_MAC_KEY_SIZE_512 4
115 #define CHCR_KEYCTX_CIPHER_KEY_SIZE_128 0
116 #define CHCR_KEYCTX_CIPHER_KEY_SIZE_192 1
117 #define CHCR_KEYCTX_CIPHER_KEY_SIZE_256 2
118 #define CHCR_KEYCTX_NO_KEY 15
120 #define CHCR_CPL_FW4_PLD_IV_OFFSET (5 * 64) /* bytes. flt #5 and #6 */
121 #define CHCR_CPL_FW4_PLD_HASH_RESULT_OFFSET (7 * 64) /* bytes. flt #7 */
122 #define CHCR_CPL_FW4_PLD_DATA_SIZE (4 * 64) /* bytes. flt #4 to #7 */
124 #define KEY_CONTEXT_HDR_SALT_AND_PAD 16
125 #define flits_to_bytes(x) (x * 8)
127 #define IV_NOP 0
128 #define IV_IMMEDIATE 1
129 #define IV_DSGL 2
131 #define AEAD_H_SIZE 16
133 #define CRYPTO_ALG_SUB_TYPE_MASK 0x0f000000
134 #define CRYPTO_ALG_SUB_TYPE_HASH_HMAC 0x01000000
135 #define CRYPTO_ALG_SUB_TYPE_AEAD_RFC4106 0x02000000
136 #define CRYPTO_ALG_SUB_TYPE_AEAD_GCM 0x03000000
137 #define CRYPTO_ALG_SUB_TYPE_AEAD_AUTHENC 0x04000000
138 #define CRYPTO_ALG_SUB_TYPE_AEAD_CCM 0x05000000
139 #define CRYPTO_ALG_SUB_TYPE_AEAD_RFC4309 0x06000000
140 #define CRYPTO_ALG_SUB_TYPE_AEAD_NULL 0x07000000
141 #define CRYPTO_ALG_SUB_TYPE_CTR 0x08000000
142 #define CRYPTO_ALG_TYPE_HMAC (CRYPTO_ALG_TYPE_AHASH |\
143 CRYPTO_ALG_SUB_TYPE_HASH_HMAC)
145 #define MAX_SCRATCH_PAD_SIZE 32
147 #define CHCR_HASH_MAX_BLOCK_SIZE_64 64
148 #define CHCR_HASH_MAX_BLOCK_SIZE_128 128
150 /* Aligned to 128 bit boundary */
152 struct ablk_ctx {
153 __be32 key_ctx_hdr;
154 unsigned int enckey_len;
155 u8 key[CHCR_AES_MAX_KEY_LEN];
156 unsigned char ciph_mode;
157 u8 rrkey[AES_MAX_KEY_SIZE];
159 struct chcr_aead_reqctx {
160 struct sk_buff *skb;
161 short int dst_nents;
162 u16 verify;
163 u8 iv[CHCR_MAX_CRYPTO_IV_LEN];
164 unsigned char scratch_pad[MAX_SCRATCH_PAD_SIZE];
167 struct chcr_gcm_ctx {
168 u8 ghash_h[AEAD_H_SIZE];
171 struct chcr_authenc_ctx {
172 u8 dec_rrkey[AES_MAX_KEY_SIZE];
173 u8 h_iopad[2 * CHCR_HASH_MAX_DIGEST_SIZE];
174 unsigned char auth_mode;
177 struct __aead_ctx {
178 struct chcr_gcm_ctx gcm[0];
179 struct chcr_authenc_ctx authenc[0];
184 struct chcr_aead_ctx {
185 __be32 key_ctx_hdr;
186 unsigned int enckey_len;
187 struct crypto_skcipher *null;
188 u8 salt[MAX_SALT];
189 u8 key[CHCR_AES_MAX_KEY_LEN];
190 u16 hmac_ctrl;
191 u16 mayverify;
192 struct __aead_ctx ctx[0];
197 struct hmac_ctx {
198 struct crypto_shash *base_hash;
199 u8 ipad[CHCR_HASH_MAX_BLOCK_SIZE_128];
200 u8 opad[CHCR_HASH_MAX_BLOCK_SIZE_128];
203 struct __crypto_ctx {
204 struct hmac_ctx hmacctx[0];
205 struct ablk_ctx ablkctx[0];
206 struct chcr_aead_ctx aeadctx[0];
209 struct chcr_context {
210 struct chcr_dev *dev;
211 unsigned char tx_channel_id;
212 struct __crypto_ctx crypto_ctx[0];
215 struct chcr_ahash_req_ctx {
216 u32 result;
217 u8 bfr1[CHCR_HASH_MAX_BLOCK_SIZE_128];
218 u8 bfr2[CHCR_HASH_MAX_BLOCK_SIZE_128];
219 u8 *reqbfr;
220 u8 *skbfr;
221 u8 reqlen;
222 /* DMA the partial hash in it */
223 u8 partial_hash[CHCR_HASH_MAX_DIGEST_SIZE];
224 u64 data_len; /* Data len till time */
225 /* SKB which is being sent to the hardware for processing */
226 struct sk_buff *skb;
229 struct chcr_blkcipher_req_ctx {
230 struct sk_buff *skb;
231 unsigned int dst_nents;
232 u8 iv[CHCR_MAX_CRYPTO_IV_LEN];
235 struct chcr_alg_template {
236 u32 type;
237 u32 is_registered;
238 union {
239 struct crypto_alg crypto;
240 struct ahash_alg hash;
241 struct aead_alg aead;
242 } alg;
245 struct chcr_req_ctx {
246 union {
247 struct ahash_request *ahash_req;
248 struct aead_request *aead_req;
249 struct ablkcipher_request *ablk_req;
250 } req;
251 union {
252 struct chcr_ahash_req_ctx *ahash_ctx;
253 struct chcr_aead_reqctx *reqctx;
254 struct chcr_blkcipher_req_ctx *ablk_ctx;
255 } ctx;
258 struct sge_opaque_hdr {
259 void *dev;
260 dma_addr_t addr[MAX_SKB_FRAGS + 1];
263 typedef struct sk_buff *(*create_wr_t)(struct aead_request *req,
264 unsigned short qid,
265 int size,
266 unsigned short op_type);
268 static int chcr_aead_op(struct aead_request *req_base,
269 unsigned short op_type,
270 int size,
271 create_wr_t create_wr_fn);
272 static inline int get_aead_subtype(struct crypto_aead *aead);
274 #endif /* __CHCR_CRYPTO_H__ */