caamalg_desc.c 46 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371
  1. /*
  2. * Shared descriptors for aead, ablkcipher algorithms
  3. *
  4. * Copyright 2016 NXP
  5. */
  6. #include "compat.h"
  7. #include "desc_constr.h"
  8. #include "caamalg_desc.h"
  9. /*
  10. * For aead functions, read payload and write payload,
  11. * both of which are specified in req->src and req->dst
  12. */
  13. static inline void aead_append_src_dst(u32 *desc, u32 msg_type)
  14. {
  15. append_seq_fifo_store(desc, 0, FIFOST_TYPE_MESSAGE_DATA | KEY_VLF);
  16. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_BOTH |
  17. KEY_VLF | msg_type | FIFOLD_TYPE_LASTBOTH);
  18. }
  19. /* Set DK bit in class 1 operation if shared */
  20. static inline void append_dec_op1(u32 *desc, u32 type)
  21. {
  22. u32 *jump_cmd, *uncond_jump_cmd;
  23. /* DK bit is valid only for AES */
  24. if ((type & OP_ALG_ALGSEL_MASK) != OP_ALG_ALGSEL_AES) {
  25. append_operation(desc, type | OP_ALG_AS_INITFINAL |
  26. OP_ALG_DECRYPT);
  27. return;
  28. }
  29. jump_cmd = append_jump(desc, JUMP_TEST_ALL | JUMP_COND_SHRD);
  30. append_operation(desc, type | OP_ALG_AS_INITFINAL |
  31. OP_ALG_DECRYPT);
  32. uncond_jump_cmd = append_jump(desc, JUMP_TEST_ALL);
  33. set_jump_tgt_here(desc, jump_cmd);
  34. append_operation(desc, type | OP_ALG_AS_INITFINAL |
  35. OP_ALG_DECRYPT | OP_ALG_AAI_DK);
  36. set_jump_tgt_here(desc, uncond_jump_cmd);
  37. }
  38. /**
  39. * cnstr_shdsc_aead_null_encap - IPSec ESP encapsulation shared descriptor
  40. * (non-protocol) with no (null) encryption.
  41. * @desc: pointer to buffer used for descriptor construction
  42. * @adata: pointer to authentication transform definitions. Note that since a
  43. * split key is to be used, the size of the split key itself is
  44. * specified. Valid algorithm values - one of OP_ALG_ALGSEL_{MD5, SHA1,
  45. * SHA224, SHA256, SHA384, SHA512} ANDed with OP_ALG_AAI_HMAC_PRECOMP.
  46. * @icvsize: integrity check value (ICV) size (truncated or full)
  47. *
  48. * Note: Requires an MDHA split key.
  49. */
  50. void cnstr_shdsc_aead_null_encap(u32 * const desc, struct alginfo *adata,
  51. unsigned int icvsize)
  52. {
  53. u32 *key_jump_cmd, *read_move_cmd, *write_move_cmd;
  54. init_sh_desc(desc, HDR_SHARE_SERIAL);
  55. /* Skip if already shared */
  56. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  57. JUMP_COND_SHRD);
  58. if (adata->key_inline)
  59. append_key_as_imm(desc, adata->key_virt, adata->keylen_pad,
  60. adata->keylen, CLASS_2 | KEY_DEST_MDHA_SPLIT |
  61. KEY_ENC);
  62. else
  63. append_key(desc, adata->key_dma, adata->keylen, CLASS_2 |
  64. KEY_DEST_MDHA_SPLIT | KEY_ENC);
  65. set_jump_tgt_here(desc, key_jump_cmd);
  66. /* assoclen + cryptlen = seqinlen */
  67. append_math_sub(desc, REG3, SEQINLEN, REG0, CAAM_CMD_SZ);
  68. /* Prepare to read and write cryptlen + assoclen bytes */
  69. append_math_add(desc, VARSEQINLEN, ZERO, REG3, CAAM_CMD_SZ);
  70. append_math_add(desc, VARSEQOUTLEN, ZERO, REG3, CAAM_CMD_SZ);
  71. /*
  72. * MOVE_LEN opcode is not available in all SEC HW revisions,
  73. * thus need to do some magic, i.e. self-patch the descriptor
  74. * buffer.
  75. */
  76. read_move_cmd = append_move(desc, MOVE_SRC_DESCBUF |
  77. MOVE_DEST_MATH3 |
  78. (0x6 << MOVE_LEN_SHIFT));
  79. write_move_cmd = append_move(desc, MOVE_SRC_MATH3 |
  80. MOVE_DEST_DESCBUF |
  81. MOVE_WAITCOMP |
  82. (0x8 << MOVE_LEN_SHIFT));
  83. /* Class 2 operation */
  84. append_operation(desc, adata->algtype | OP_ALG_AS_INITFINAL |
  85. OP_ALG_ENCRYPT);
  86. /* Read and write cryptlen bytes */
  87. aead_append_src_dst(desc, FIFOLD_TYPE_MSG | FIFOLD_TYPE_FLUSH1);
  88. set_move_tgt_here(desc, read_move_cmd);
  89. set_move_tgt_here(desc, write_move_cmd);
  90. append_cmd(desc, CMD_LOAD | DISABLE_AUTO_INFO_FIFO);
  91. append_move(desc, MOVE_SRC_INFIFO_CL | MOVE_DEST_OUTFIFO |
  92. MOVE_AUX_LS);
  93. /* Write ICV */
  94. append_seq_store(desc, icvsize, LDST_CLASS_2_CCB |
  95. LDST_SRCDST_BYTE_CONTEXT);
  96. #ifdef DEBUG
  97. print_hex_dump(KERN_ERR,
  98. "aead null enc shdesc@" __stringify(__LINE__)": ",
  99. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  100. #endif
  101. }
  102. EXPORT_SYMBOL(cnstr_shdsc_aead_null_encap);
  103. /**
  104. * cnstr_shdsc_aead_null_decap - IPSec ESP decapsulation shared descriptor
  105. * (non-protocol) with no (null) decryption.
  106. * @desc: pointer to buffer used for descriptor construction
  107. * @adata: pointer to authentication transform definitions. Note that since a
  108. * split key is to be used, the size of the split key itself is
  109. * specified. Valid algorithm values - one of OP_ALG_ALGSEL_{MD5, SHA1,
  110. * SHA224, SHA256, SHA384, SHA512} ANDed with OP_ALG_AAI_HMAC_PRECOMP.
  111. * @icvsize: integrity check value (ICV) size (truncated or full)
  112. *
  113. * Note: Requires an MDHA split key.
  114. */
  115. void cnstr_shdsc_aead_null_decap(u32 * const desc, struct alginfo *adata,
  116. unsigned int icvsize)
  117. {
  118. u32 *key_jump_cmd, *read_move_cmd, *write_move_cmd, *jump_cmd;
  119. init_sh_desc(desc, HDR_SHARE_SERIAL);
  120. /* Skip if already shared */
  121. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  122. JUMP_COND_SHRD);
  123. if (adata->key_inline)
  124. append_key_as_imm(desc, adata->key_virt, adata->keylen_pad,
  125. adata->keylen, CLASS_2 |
  126. KEY_DEST_MDHA_SPLIT | KEY_ENC);
  127. else
  128. append_key(desc, adata->key_dma, adata->keylen, CLASS_2 |
  129. KEY_DEST_MDHA_SPLIT | KEY_ENC);
  130. set_jump_tgt_here(desc, key_jump_cmd);
  131. /* Class 2 operation */
  132. append_operation(desc, adata->algtype | OP_ALG_AS_INITFINAL |
  133. OP_ALG_DECRYPT | OP_ALG_ICV_ON);
  134. /* assoclen + cryptlen = seqoutlen */
  135. append_math_sub(desc, REG2, SEQOUTLEN, REG0, CAAM_CMD_SZ);
  136. /* Prepare to read and write cryptlen + assoclen bytes */
  137. append_math_add(desc, VARSEQINLEN, ZERO, REG2, CAAM_CMD_SZ);
  138. append_math_add(desc, VARSEQOUTLEN, ZERO, REG2, CAAM_CMD_SZ);
  139. /*
  140. * MOVE_LEN opcode is not available in all SEC HW revisions,
  141. * thus need to do some magic, i.e. self-patch the descriptor
  142. * buffer.
  143. */
  144. read_move_cmd = append_move(desc, MOVE_SRC_DESCBUF |
  145. MOVE_DEST_MATH2 |
  146. (0x6 << MOVE_LEN_SHIFT));
  147. write_move_cmd = append_move(desc, MOVE_SRC_MATH2 |
  148. MOVE_DEST_DESCBUF |
  149. MOVE_WAITCOMP |
  150. (0x8 << MOVE_LEN_SHIFT));
  151. /* Read and write cryptlen bytes */
  152. aead_append_src_dst(desc, FIFOLD_TYPE_MSG | FIFOLD_TYPE_FLUSH1);
  153. /*
  154. * Insert a NOP here, since we need at least 4 instructions between
  155. * code patching the descriptor buffer and the location being patched.
  156. */
  157. jump_cmd = append_jump(desc, JUMP_TEST_ALL);
  158. set_jump_tgt_here(desc, jump_cmd);
  159. set_move_tgt_here(desc, read_move_cmd);
  160. set_move_tgt_here(desc, write_move_cmd);
  161. append_cmd(desc, CMD_LOAD | DISABLE_AUTO_INFO_FIFO);
  162. append_move(desc, MOVE_SRC_INFIFO_CL | MOVE_DEST_OUTFIFO |
  163. MOVE_AUX_LS);
  164. append_cmd(desc, CMD_LOAD | ENABLE_AUTO_INFO_FIFO);
  165. /* Load ICV */
  166. append_seq_fifo_load(desc, icvsize, FIFOLD_CLASS_CLASS2 |
  167. FIFOLD_TYPE_LAST2 | FIFOLD_TYPE_ICV);
  168. #ifdef DEBUG
  169. print_hex_dump(KERN_ERR,
  170. "aead null dec shdesc@" __stringify(__LINE__)": ",
  171. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  172. #endif
  173. }
  174. EXPORT_SYMBOL(cnstr_shdsc_aead_null_decap);
  175. static void init_sh_desc_key_aead(u32 * const desc,
  176. struct alginfo * const cdata,
  177. struct alginfo * const adata,
  178. const bool is_rfc3686, u32 *nonce)
  179. {
  180. u32 *key_jump_cmd;
  181. unsigned int enckeylen = cdata->keylen;
  182. /* Note: Context registers are saved. */
  183. init_sh_desc(desc, HDR_SHARE_SERIAL | HDR_SAVECTX);
  184. /* Skip if already shared */
  185. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  186. JUMP_COND_SHRD);
  187. /*
  188. * RFC3686 specific:
  189. * | key = {AUTH_KEY, ENC_KEY, NONCE}
  190. * | enckeylen = encryption key size + nonce size
  191. */
  192. if (is_rfc3686)
  193. enckeylen -= CTR_RFC3686_NONCE_SIZE;
  194. if (adata->key_inline)
  195. append_key_as_imm(desc, adata->key_virt, adata->keylen_pad,
  196. adata->keylen, CLASS_2 |
  197. KEY_DEST_MDHA_SPLIT | KEY_ENC);
  198. else
  199. append_key(desc, adata->key_dma, adata->keylen, CLASS_2 |
  200. KEY_DEST_MDHA_SPLIT | KEY_ENC);
  201. if (cdata->key_inline)
  202. append_key_as_imm(desc, cdata->key_virt, enckeylen,
  203. enckeylen, CLASS_1 | KEY_DEST_CLASS_REG);
  204. else
  205. append_key(desc, cdata->key_dma, enckeylen, CLASS_1 |
  206. KEY_DEST_CLASS_REG);
  207. /* Load Counter into CONTEXT1 reg */
  208. if (is_rfc3686) {
  209. append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE,
  210. LDST_CLASS_IND_CCB |
  211. LDST_SRCDST_BYTE_OUTFIFO | LDST_IMM);
  212. append_move(desc,
  213. MOVE_SRC_OUTFIFO |
  214. MOVE_DEST_CLASS1CTX |
  215. (16 << MOVE_OFFSET_SHIFT) |
  216. (CTR_RFC3686_NONCE_SIZE << MOVE_LEN_SHIFT));
  217. }
  218. set_jump_tgt_here(desc, key_jump_cmd);
  219. }
  220. /**
  221. * cnstr_shdsc_aead_encap - IPSec ESP encapsulation shared descriptor
  222. * (non-protocol).
  223. * @desc: pointer to buffer used for descriptor construction
  224. * @cdata: pointer to block cipher transform definitions
  225. * Valid algorithm values - one of OP_ALG_ALGSEL_{AES, DES, 3DES} ANDed
  226. * with OP_ALG_AAI_CBC or OP_ALG_AAI_CTR_MOD128.
  227. * @adata: pointer to authentication transform definitions. Note that since a
  228. * split key is to be used, the size of the split key itself is
  229. * specified. Valid algorithm values - one of OP_ALG_ALGSEL_{MD5, SHA1,
  230. * SHA224, SHA256, SHA384, SHA512} ANDed with OP_ALG_AAI_HMAC_PRECOMP.
  231. * @ivsize: initialization vector size
  232. * @icvsize: integrity check value (ICV) size (truncated or full)
  233. * @is_rfc3686: true when ctr(aes) is wrapped by rfc3686 template
  234. * @nonce: pointer to rfc3686 nonce
  235. * @ctx1_iv_off: IV offset in CONTEXT1 register
  236. * @is_qi: true when called from caam/qi
  237. *
  238. * Note: Requires an MDHA split key.
  239. */
  240. void cnstr_shdsc_aead_encap(u32 * const desc, struct alginfo *cdata,
  241. struct alginfo *adata, unsigned int ivsize,
  242. unsigned int icvsize, const bool is_rfc3686,
  243. u32 *nonce, const u32 ctx1_iv_off, const bool is_qi)
  244. {
  245. /* Note: Context registers are saved. */
  246. init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce);
  247. /* Class 2 operation */
  248. append_operation(desc, adata->algtype | OP_ALG_AS_INITFINAL |
  249. OP_ALG_ENCRYPT);
  250. if (is_qi) {
  251. u32 *wait_load_cmd;
  252. /* REG3 = assoclen */
  253. append_seq_load(desc, 4, LDST_CLASS_DECO |
  254. LDST_SRCDST_WORD_DECO_MATH3 |
  255. (4 << LDST_OFFSET_SHIFT));
  256. wait_load_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  257. JUMP_COND_CALM | JUMP_COND_NCP |
  258. JUMP_COND_NOP | JUMP_COND_NIP |
  259. JUMP_COND_NIFP);
  260. set_jump_tgt_here(desc, wait_load_cmd);
  261. append_seq_load(desc, ivsize, LDST_CLASS_1_CCB |
  262. LDST_SRCDST_BYTE_CONTEXT |
  263. (ctx1_iv_off << LDST_OFFSET_SHIFT));
  264. }
  265. /* Read and write assoclen bytes */
  266. append_math_add(desc, VARSEQINLEN, ZERO, REG3, CAAM_CMD_SZ);
  267. append_math_add(desc, VARSEQOUTLEN, ZERO, REG3, CAAM_CMD_SZ);
  268. /* Skip assoc data */
  269. append_seq_fifo_store(desc, 0, FIFOST_TYPE_SKIP | FIFOLDST_VLF);
  270. /* read assoc before reading payload */
  271. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS2 | FIFOLD_TYPE_MSG |
  272. FIFOLDST_VLF);
  273. /* Load Counter into CONTEXT1 reg */
  274. if (is_rfc3686)
  275. append_load_imm_be32(desc, 1, LDST_IMM | LDST_CLASS_1_CCB |
  276. LDST_SRCDST_BYTE_CONTEXT |
  277. ((ctx1_iv_off + CTR_RFC3686_IV_SIZE) <<
  278. LDST_OFFSET_SHIFT));
  279. /* Class 1 operation */
  280. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  281. OP_ALG_ENCRYPT);
  282. /* Read and write cryptlen bytes */
  283. append_math_add(desc, VARSEQINLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  284. append_math_add(desc, VARSEQOUTLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  285. aead_append_src_dst(desc, FIFOLD_TYPE_MSG1OUT2);
  286. /* Write ICV */
  287. append_seq_store(desc, icvsize, LDST_CLASS_2_CCB |
  288. LDST_SRCDST_BYTE_CONTEXT);
  289. #ifdef DEBUG
  290. print_hex_dump(KERN_ERR, "aead enc shdesc@" __stringify(__LINE__)": ",
  291. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  292. #endif
  293. }
  294. EXPORT_SYMBOL(cnstr_shdsc_aead_encap);
  295. /**
  296. * cnstr_shdsc_aead_decap - IPSec ESP decapsulation shared descriptor
  297. * (non-protocol).
  298. * @desc: pointer to buffer used for descriptor construction
  299. * @cdata: pointer to block cipher transform definitions
  300. * Valid algorithm values - one of OP_ALG_ALGSEL_{AES, DES, 3DES} ANDed
  301. * with OP_ALG_AAI_CBC or OP_ALG_AAI_CTR_MOD128.
  302. * @adata: pointer to authentication transform definitions. Note that since a
  303. * split key is to be used, the size of the split key itself is
  304. * specified. Valid algorithm values - one of OP_ALG_ALGSEL_{MD5, SHA1,
  305. * SHA224, SHA256, SHA384, SHA512} ANDed with OP_ALG_AAI_HMAC_PRECOMP.
  306. * @ivsize: initialization vector size
  307. * @icvsize: integrity check value (ICV) size (truncated or full)
  308. * @is_rfc3686: true when ctr(aes) is wrapped by rfc3686 template
  309. * @nonce: pointer to rfc3686 nonce
  310. * @ctx1_iv_off: IV offset in CONTEXT1 register
  311. * @is_qi: true when called from caam/qi
  312. *
  313. * Note: Requires an MDHA split key.
  314. */
  315. void cnstr_shdsc_aead_decap(u32 * const desc, struct alginfo *cdata,
  316. struct alginfo *adata, unsigned int ivsize,
  317. unsigned int icvsize, const bool geniv,
  318. const bool is_rfc3686, u32 *nonce,
  319. const u32 ctx1_iv_off, const bool is_qi)
  320. {
  321. /* Note: Context registers are saved. */
  322. init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce);
  323. /* Class 2 operation */
  324. append_operation(desc, adata->algtype | OP_ALG_AS_INITFINAL |
  325. OP_ALG_DECRYPT | OP_ALG_ICV_ON);
  326. if (is_qi) {
  327. u32 *wait_load_cmd;
  328. /* REG3 = assoclen */
  329. append_seq_load(desc, 4, LDST_CLASS_DECO |
  330. LDST_SRCDST_WORD_DECO_MATH3 |
  331. (4 << LDST_OFFSET_SHIFT));
  332. wait_load_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  333. JUMP_COND_CALM | JUMP_COND_NCP |
  334. JUMP_COND_NOP | JUMP_COND_NIP |
  335. JUMP_COND_NIFP);
  336. set_jump_tgt_here(desc, wait_load_cmd);
  337. if (!geniv)
  338. append_seq_load(desc, ivsize, LDST_CLASS_1_CCB |
  339. LDST_SRCDST_BYTE_CONTEXT |
  340. (ctx1_iv_off << LDST_OFFSET_SHIFT));
  341. }
  342. /* Read and write assoclen bytes */
  343. append_math_add(desc, VARSEQINLEN, ZERO, REG3, CAAM_CMD_SZ);
  344. if (geniv)
  345. append_math_add_imm_u32(desc, VARSEQOUTLEN, REG3, IMM, ivsize);
  346. else
  347. append_math_add(desc, VARSEQOUTLEN, ZERO, REG3, CAAM_CMD_SZ);
  348. /* Skip assoc data */
  349. append_seq_fifo_store(desc, 0, FIFOST_TYPE_SKIP | FIFOLDST_VLF);
  350. /* read assoc before reading payload */
  351. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS2 | FIFOLD_TYPE_MSG |
  352. KEY_VLF);
  353. if (geniv) {
  354. append_seq_load(desc, ivsize, LDST_CLASS_1_CCB |
  355. LDST_SRCDST_BYTE_CONTEXT |
  356. (ctx1_iv_off << LDST_OFFSET_SHIFT));
  357. append_move(desc, MOVE_SRC_CLASS1CTX | MOVE_DEST_CLASS2INFIFO |
  358. (ctx1_iv_off << MOVE_OFFSET_SHIFT) | ivsize);
  359. }
  360. /* Load Counter into CONTEXT1 reg */
  361. if (is_rfc3686)
  362. append_load_imm_be32(desc, 1, LDST_IMM | LDST_CLASS_1_CCB |
  363. LDST_SRCDST_BYTE_CONTEXT |
  364. ((ctx1_iv_off + CTR_RFC3686_IV_SIZE) <<
  365. LDST_OFFSET_SHIFT));
  366. /* Choose operation */
  367. if (ctx1_iv_off)
  368. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  369. OP_ALG_DECRYPT);
  370. else
  371. append_dec_op1(desc, cdata->algtype);
  372. /* Read and write cryptlen bytes */
  373. append_math_add(desc, VARSEQINLEN, SEQOUTLEN, REG0, CAAM_CMD_SZ);
  374. append_math_add(desc, VARSEQOUTLEN, SEQOUTLEN, REG0, CAAM_CMD_SZ);
  375. aead_append_src_dst(desc, FIFOLD_TYPE_MSG);
  376. /* Load ICV */
  377. append_seq_fifo_load(desc, icvsize, FIFOLD_CLASS_CLASS2 |
  378. FIFOLD_TYPE_LAST2 | FIFOLD_TYPE_ICV);
  379. #ifdef DEBUG
  380. print_hex_dump(KERN_ERR, "aead dec shdesc@" __stringify(__LINE__)": ",
  381. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  382. #endif
  383. }
  384. EXPORT_SYMBOL(cnstr_shdsc_aead_decap);
  385. /**
  386. * cnstr_shdsc_aead_givencap - IPSec ESP encapsulation shared descriptor
  387. * (non-protocol) with HW-generated initialization
  388. * vector.
  389. * @desc: pointer to buffer used for descriptor construction
  390. * @cdata: pointer to block cipher transform definitions
  391. * Valid algorithm values - one of OP_ALG_ALGSEL_{AES, DES, 3DES} ANDed
  392. * with OP_ALG_AAI_CBC or OP_ALG_AAI_CTR_MOD128.
  393. * @adata: pointer to authentication transform definitions. Note that since a
  394. * split key is to be used, the size of the split key itself is
  395. * specified. Valid algorithm values - one of OP_ALG_ALGSEL_{MD5, SHA1,
  396. * SHA224, SHA256, SHA384, SHA512} ANDed with OP_ALG_AAI_HMAC_PRECOMP.
  397. * @ivsize: initialization vector size
  398. * @icvsize: integrity check value (ICV) size (truncated or full)
  399. * @is_rfc3686: true when ctr(aes) is wrapped by rfc3686 template
  400. * @nonce: pointer to rfc3686 nonce
  401. * @ctx1_iv_off: IV offset in CONTEXT1 register
  402. * @is_qi: true when called from caam/qi
  403. *
  404. * Note: Requires an MDHA split key.
  405. */
  406. void cnstr_shdsc_aead_givencap(u32 * const desc, struct alginfo *cdata,
  407. struct alginfo *adata, unsigned int ivsize,
  408. unsigned int icvsize, const bool is_rfc3686,
  409. u32 *nonce, const u32 ctx1_iv_off,
  410. const bool is_qi)
  411. {
  412. u32 geniv, moveiv;
  413. /* Note: Context registers are saved. */
  414. init_sh_desc_key_aead(desc, cdata, adata, is_rfc3686, nonce);
  415. if (is_qi) {
  416. u32 *wait_load_cmd;
  417. /* REG3 = assoclen */
  418. append_seq_load(desc, 4, LDST_CLASS_DECO |
  419. LDST_SRCDST_WORD_DECO_MATH3 |
  420. (4 << LDST_OFFSET_SHIFT));
  421. wait_load_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  422. JUMP_COND_CALM | JUMP_COND_NCP |
  423. JUMP_COND_NOP | JUMP_COND_NIP |
  424. JUMP_COND_NIFP);
  425. set_jump_tgt_here(desc, wait_load_cmd);
  426. }
  427. if (is_rfc3686) {
  428. if (is_qi)
  429. append_seq_load(desc, ivsize, LDST_CLASS_1_CCB |
  430. LDST_SRCDST_BYTE_CONTEXT |
  431. (ctx1_iv_off << LDST_OFFSET_SHIFT));
  432. goto copy_iv;
  433. }
  434. /* Generate IV */
  435. geniv = NFIFOENTRY_STYPE_PAD | NFIFOENTRY_DEST_DECO |
  436. NFIFOENTRY_DTYPE_MSG | NFIFOENTRY_LC1 |
  437. NFIFOENTRY_PTYPE_RND | (ivsize << NFIFOENTRY_DLEN_SHIFT);
  438. append_load_imm_u32(desc, geniv, LDST_CLASS_IND_CCB |
  439. LDST_SRCDST_WORD_INFO_FIFO | LDST_IMM);
  440. append_cmd(desc, CMD_LOAD | DISABLE_AUTO_INFO_FIFO);
  441. append_move(desc, MOVE_WAITCOMP |
  442. MOVE_SRC_INFIFO | MOVE_DEST_CLASS1CTX |
  443. (ctx1_iv_off << MOVE_OFFSET_SHIFT) |
  444. (ivsize << MOVE_LEN_SHIFT));
  445. append_cmd(desc, CMD_LOAD | ENABLE_AUTO_INFO_FIFO);
  446. copy_iv:
  447. /* Copy IV to class 1 context */
  448. append_move(desc, MOVE_SRC_CLASS1CTX | MOVE_DEST_OUTFIFO |
  449. (ctx1_iv_off << MOVE_OFFSET_SHIFT) |
  450. (ivsize << MOVE_LEN_SHIFT));
  451. /* Return to encryption */
  452. append_operation(desc, adata->algtype | OP_ALG_AS_INITFINAL |
  453. OP_ALG_ENCRYPT);
  454. /* Read and write assoclen bytes */
  455. append_math_add(desc, VARSEQINLEN, ZERO, REG3, CAAM_CMD_SZ);
  456. append_math_add(desc, VARSEQOUTLEN, ZERO, REG3, CAAM_CMD_SZ);
  457. /* Skip assoc data */
  458. append_seq_fifo_store(desc, 0, FIFOST_TYPE_SKIP | FIFOLDST_VLF);
  459. /* read assoc before reading payload */
  460. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS2 | FIFOLD_TYPE_MSG |
  461. KEY_VLF);
  462. /* Copy iv from outfifo to class 2 fifo */
  463. moveiv = NFIFOENTRY_STYPE_OFIFO | NFIFOENTRY_DEST_CLASS2 |
  464. NFIFOENTRY_DTYPE_MSG | (ivsize << NFIFOENTRY_DLEN_SHIFT);
  465. append_load_imm_u32(desc, moveiv, LDST_CLASS_IND_CCB |
  466. LDST_SRCDST_WORD_INFO_FIFO | LDST_IMM);
  467. append_load_imm_u32(desc, ivsize, LDST_CLASS_2_CCB |
  468. LDST_SRCDST_WORD_DATASZ_REG | LDST_IMM);
  469. /* Load Counter into CONTEXT1 reg */
  470. if (is_rfc3686)
  471. append_load_imm_be32(desc, 1, LDST_IMM | LDST_CLASS_1_CCB |
  472. LDST_SRCDST_BYTE_CONTEXT |
  473. ((ctx1_iv_off + CTR_RFC3686_IV_SIZE) <<
  474. LDST_OFFSET_SHIFT));
  475. /* Class 1 operation */
  476. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  477. OP_ALG_ENCRYPT);
  478. /* Will write ivsize + cryptlen */
  479. append_math_add(desc, VARSEQOUTLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  480. /* Not need to reload iv */
  481. append_seq_fifo_load(desc, ivsize,
  482. FIFOLD_CLASS_SKIP);
  483. /* Will read cryptlen */
  484. append_math_add(desc, VARSEQINLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  485. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_BOTH | KEY_VLF |
  486. FIFOLD_TYPE_MSG1OUT2 | FIFOLD_TYPE_LASTBOTH);
  487. append_seq_fifo_store(desc, 0, FIFOST_TYPE_MESSAGE_DATA | KEY_VLF);
  488. /* Write ICV */
  489. append_seq_store(desc, icvsize, LDST_CLASS_2_CCB |
  490. LDST_SRCDST_BYTE_CONTEXT);
  491. #ifdef DEBUG
  492. print_hex_dump(KERN_ERR,
  493. "aead givenc shdesc@" __stringify(__LINE__)": ",
  494. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  495. #endif
  496. }
  497. EXPORT_SYMBOL(cnstr_shdsc_aead_givencap);
  498. /**
  499. * cnstr_shdsc_gcm_encap - gcm encapsulation shared descriptor
  500. * @desc: pointer to buffer used for descriptor construction
  501. * @cdata: pointer to block cipher transform definitions
  502. * Valid algorithm values - OP_ALG_ALGSEL_AES ANDed with OP_ALG_AAI_GCM.
  503. * @icvsize: integrity check value (ICV) size (truncated or full)
  504. */
  505. void cnstr_shdsc_gcm_encap(u32 * const desc, struct alginfo *cdata,
  506. unsigned int icvsize)
  507. {
  508. u32 *key_jump_cmd, *zero_payload_jump_cmd, *zero_assoc_jump_cmd1,
  509. *zero_assoc_jump_cmd2;
  510. init_sh_desc(desc, HDR_SHARE_SERIAL);
  511. /* skip key loading if they are loaded due to sharing */
  512. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  513. JUMP_COND_SHRD | JUMP_COND_SELF);
  514. if (cdata->key_inline)
  515. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  516. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  517. else
  518. append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 |
  519. KEY_DEST_CLASS_REG);
  520. set_jump_tgt_here(desc, key_jump_cmd);
  521. /* class 1 operation */
  522. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  523. OP_ALG_ENCRYPT);
  524. /* if assoclen + cryptlen is ZERO, skip to ICV write */
  525. append_math_sub(desc, VARSEQOUTLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  526. zero_assoc_jump_cmd2 = append_jump(desc, JUMP_TEST_ALL |
  527. JUMP_COND_MATH_Z);
  528. /* if assoclen is ZERO, skip reading the assoc data */
  529. append_math_add(desc, VARSEQINLEN, ZERO, REG3, CAAM_CMD_SZ);
  530. zero_assoc_jump_cmd1 = append_jump(desc, JUMP_TEST_ALL |
  531. JUMP_COND_MATH_Z);
  532. append_math_add(desc, VARSEQOUTLEN, ZERO, REG3, CAAM_CMD_SZ);
  533. /* skip assoc data */
  534. append_seq_fifo_store(desc, 0, FIFOST_TYPE_SKIP | FIFOLDST_VLF);
  535. /* cryptlen = seqinlen - assoclen */
  536. append_math_sub(desc, VARSEQOUTLEN, SEQINLEN, REG3, CAAM_CMD_SZ);
  537. /* if cryptlen is ZERO jump to zero-payload commands */
  538. zero_payload_jump_cmd = append_jump(desc, JUMP_TEST_ALL |
  539. JUMP_COND_MATH_Z);
  540. /* read assoc data */
  541. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLDST_VLF |
  542. FIFOLD_TYPE_AAD | FIFOLD_TYPE_FLUSH1);
  543. set_jump_tgt_here(desc, zero_assoc_jump_cmd1);
  544. append_math_sub(desc, VARSEQINLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  545. /* write encrypted data */
  546. append_seq_fifo_store(desc, 0, FIFOST_TYPE_MESSAGE_DATA | FIFOLDST_VLF);
  547. /* read payload data */
  548. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLDST_VLF |
  549. FIFOLD_TYPE_MSG | FIFOLD_TYPE_LAST1);
  550. /* jump the zero-payload commands */
  551. append_jump(desc, JUMP_TEST_ALL | 2);
  552. /* zero-payload commands */
  553. set_jump_tgt_here(desc, zero_payload_jump_cmd);
  554. /* read assoc data */
  555. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLDST_VLF |
  556. FIFOLD_TYPE_AAD | FIFOLD_TYPE_LAST1);
  557. /* There is no input data */
  558. set_jump_tgt_here(desc, zero_assoc_jump_cmd2);
  559. /* write ICV */
  560. append_seq_store(desc, icvsize, LDST_CLASS_1_CCB |
  561. LDST_SRCDST_BYTE_CONTEXT);
  562. #ifdef DEBUG
  563. print_hex_dump(KERN_ERR, "gcm enc shdesc@" __stringify(__LINE__)": ",
  564. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  565. #endif
  566. }
  567. EXPORT_SYMBOL(cnstr_shdsc_gcm_encap);
  568. /**
  569. * cnstr_shdsc_gcm_decap - gcm decapsulation shared descriptor
  570. * @desc: pointer to buffer used for descriptor construction
  571. * @cdata: pointer to block cipher transform definitions
  572. * Valid algorithm values - OP_ALG_ALGSEL_AES ANDed with OP_ALG_AAI_GCM.
  573. * @icvsize: integrity check value (ICV) size (truncated or full)
  574. */
  575. void cnstr_shdsc_gcm_decap(u32 * const desc, struct alginfo *cdata,
  576. unsigned int icvsize)
  577. {
  578. u32 *key_jump_cmd, *zero_payload_jump_cmd, *zero_assoc_jump_cmd1;
  579. init_sh_desc(desc, HDR_SHARE_SERIAL);
  580. /* skip key loading if they are loaded due to sharing */
  581. key_jump_cmd = append_jump(desc, JUMP_JSL |
  582. JUMP_TEST_ALL | JUMP_COND_SHRD |
  583. JUMP_COND_SELF);
  584. if (cdata->key_inline)
  585. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  586. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  587. else
  588. append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 |
  589. KEY_DEST_CLASS_REG);
  590. set_jump_tgt_here(desc, key_jump_cmd);
  591. /* class 1 operation */
  592. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  593. OP_ALG_DECRYPT | OP_ALG_ICV_ON);
  594. /* if assoclen is ZERO, skip reading the assoc data */
  595. append_math_add(desc, VARSEQINLEN, ZERO, REG3, CAAM_CMD_SZ);
  596. zero_assoc_jump_cmd1 = append_jump(desc, JUMP_TEST_ALL |
  597. JUMP_COND_MATH_Z);
  598. append_math_add(desc, VARSEQOUTLEN, ZERO, REG3, CAAM_CMD_SZ);
  599. /* skip assoc data */
  600. append_seq_fifo_store(desc, 0, FIFOST_TYPE_SKIP | FIFOLDST_VLF);
  601. /* read assoc data */
  602. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLDST_VLF |
  603. FIFOLD_TYPE_AAD | FIFOLD_TYPE_FLUSH1);
  604. set_jump_tgt_here(desc, zero_assoc_jump_cmd1);
  605. /* cryptlen = seqoutlen - assoclen */
  606. append_math_sub(desc, VARSEQINLEN, SEQOUTLEN, REG0, CAAM_CMD_SZ);
  607. /* jump to zero-payload command if cryptlen is zero */
  608. zero_payload_jump_cmd = append_jump(desc, JUMP_TEST_ALL |
  609. JUMP_COND_MATH_Z);
  610. append_math_sub(desc, VARSEQOUTLEN, SEQOUTLEN, REG0, CAAM_CMD_SZ);
  611. /* store encrypted data */
  612. append_seq_fifo_store(desc, 0, FIFOST_TYPE_MESSAGE_DATA | FIFOLDST_VLF);
  613. /* read payload data */
  614. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLDST_VLF |
  615. FIFOLD_TYPE_MSG | FIFOLD_TYPE_FLUSH1);
  616. /* zero-payload command */
  617. set_jump_tgt_here(desc, zero_payload_jump_cmd);
  618. /* read ICV */
  619. append_seq_fifo_load(desc, icvsize, FIFOLD_CLASS_CLASS1 |
  620. FIFOLD_TYPE_ICV | FIFOLD_TYPE_LAST1);
  621. #ifdef DEBUG
  622. print_hex_dump(KERN_ERR, "gcm dec shdesc@" __stringify(__LINE__)": ",
  623. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  624. #endif
  625. }
  626. EXPORT_SYMBOL(cnstr_shdsc_gcm_decap);
  627. /**
  628. * cnstr_shdsc_rfc4106_encap - IPSec ESP gcm encapsulation shared descriptor
  629. * (non-protocol).
  630. * @desc: pointer to buffer used for descriptor construction
  631. * @cdata: pointer to block cipher transform definitions
  632. * Valid algorithm values - OP_ALG_ALGSEL_AES ANDed with OP_ALG_AAI_GCM.
  633. * @icvsize: integrity check value (ICV) size (truncated or full)
  634. */
  635. void cnstr_shdsc_rfc4106_encap(u32 * const desc, struct alginfo *cdata,
  636. unsigned int icvsize)
  637. {
  638. u32 *key_jump_cmd;
  639. init_sh_desc(desc, HDR_SHARE_SERIAL);
  640. /* Skip key loading if it is loaded due to sharing */
  641. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  642. JUMP_COND_SHRD);
  643. if (cdata->key_inline)
  644. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  645. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  646. else
  647. append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 |
  648. KEY_DEST_CLASS_REG);
  649. set_jump_tgt_here(desc, key_jump_cmd);
  650. /* Class 1 operation */
  651. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  652. OP_ALG_ENCRYPT);
  653. append_math_sub_imm_u32(desc, VARSEQINLEN, REG3, IMM, 8);
  654. append_math_add(desc, VARSEQOUTLEN, ZERO, REG3, CAAM_CMD_SZ);
  655. /* Read assoc data */
  656. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLDST_VLF |
  657. FIFOLD_TYPE_AAD | FIFOLD_TYPE_FLUSH1);
  658. /* Skip IV */
  659. append_seq_fifo_load(desc, 8, FIFOLD_CLASS_SKIP);
  660. /* Will read cryptlen bytes */
  661. append_math_sub(desc, VARSEQINLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  662. /* Workaround for erratum A-005473 (simultaneous SEQ FIFO skips) */
  663. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLD_TYPE_MSG);
  664. /* Skip assoc data */
  665. append_seq_fifo_store(desc, 0, FIFOST_TYPE_SKIP | FIFOLDST_VLF);
  666. /* cryptlen = seqoutlen - assoclen */
  667. append_math_sub(desc, VARSEQOUTLEN, VARSEQINLEN, REG0, CAAM_CMD_SZ);
  668. /* Write encrypted data */
  669. append_seq_fifo_store(desc, 0, FIFOST_TYPE_MESSAGE_DATA | FIFOLDST_VLF);
  670. /* Read payload data */
  671. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLDST_VLF |
  672. FIFOLD_TYPE_MSG | FIFOLD_TYPE_LAST1);
  673. /* Write ICV */
  674. append_seq_store(desc, icvsize, LDST_CLASS_1_CCB |
  675. LDST_SRCDST_BYTE_CONTEXT);
  676. #ifdef DEBUG
  677. print_hex_dump(KERN_ERR,
  678. "rfc4106 enc shdesc@" __stringify(__LINE__)": ",
  679. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  680. #endif
  681. }
  682. EXPORT_SYMBOL(cnstr_shdsc_rfc4106_encap);
  683. /**
  684. * cnstr_shdsc_rfc4106_decap - IPSec ESP gcm decapsulation shared descriptor
  685. * (non-protocol).
  686. * @desc: pointer to buffer used for descriptor construction
  687. * @cdata: pointer to block cipher transform definitions
  688. * Valid algorithm values - OP_ALG_ALGSEL_AES ANDed with OP_ALG_AAI_GCM.
  689. * @icvsize: integrity check value (ICV) size (truncated or full)
  690. */
  691. void cnstr_shdsc_rfc4106_decap(u32 * const desc, struct alginfo *cdata,
  692. unsigned int icvsize)
  693. {
  694. u32 *key_jump_cmd;
  695. init_sh_desc(desc, HDR_SHARE_SERIAL);
  696. /* Skip key loading if it is loaded due to sharing */
  697. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  698. JUMP_COND_SHRD);
  699. if (cdata->key_inline)
  700. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  701. cdata->keylen, CLASS_1 |
  702. KEY_DEST_CLASS_REG);
  703. else
  704. append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 |
  705. KEY_DEST_CLASS_REG);
  706. set_jump_tgt_here(desc, key_jump_cmd);
  707. /* Class 1 operation */
  708. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  709. OP_ALG_DECRYPT | OP_ALG_ICV_ON);
  710. append_math_sub_imm_u32(desc, VARSEQINLEN, REG3, IMM, 8);
  711. append_math_add(desc, VARSEQOUTLEN, ZERO, REG3, CAAM_CMD_SZ);
  712. /* Read assoc data */
  713. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLDST_VLF |
  714. FIFOLD_TYPE_AAD | FIFOLD_TYPE_FLUSH1);
  715. /* Skip IV */
  716. append_seq_fifo_load(desc, 8, FIFOLD_CLASS_SKIP);
  717. /* Will read cryptlen bytes */
  718. append_math_sub(desc, VARSEQINLEN, SEQOUTLEN, REG3, CAAM_CMD_SZ);
  719. /* Workaround for erratum A-005473 (simultaneous SEQ FIFO skips) */
  720. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLD_TYPE_MSG);
  721. /* Skip assoc data */
  722. append_seq_fifo_store(desc, 0, FIFOST_TYPE_SKIP | FIFOLDST_VLF);
  723. /* Will write cryptlen bytes */
  724. append_math_sub(desc, VARSEQOUTLEN, SEQOUTLEN, REG0, CAAM_CMD_SZ);
  725. /* Store payload data */
  726. append_seq_fifo_store(desc, 0, FIFOST_TYPE_MESSAGE_DATA | FIFOLDST_VLF);
  727. /* Read encrypted data */
  728. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 | FIFOLDST_VLF |
  729. FIFOLD_TYPE_MSG | FIFOLD_TYPE_FLUSH1);
  730. /* Read ICV */
  731. append_seq_fifo_load(desc, icvsize, FIFOLD_CLASS_CLASS1 |
  732. FIFOLD_TYPE_ICV | FIFOLD_TYPE_LAST1);
  733. #ifdef DEBUG
  734. print_hex_dump(KERN_ERR,
  735. "rfc4106 dec shdesc@" __stringify(__LINE__)": ",
  736. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  737. #endif
  738. }
  739. EXPORT_SYMBOL(cnstr_shdsc_rfc4106_decap);
  740. /**
  741. * cnstr_shdsc_rfc4543_encap - IPSec ESP gmac encapsulation shared descriptor
  742. * (non-protocol).
  743. * @desc: pointer to buffer used for descriptor construction
  744. * @cdata: pointer to block cipher transform definitions
  745. * Valid algorithm values - OP_ALG_ALGSEL_AES ANDed with OP_ALG_AAI_GCM.
  746. * @icvsize: integrity check value (ICV) size (truncated or full)
  747. */
  748. void cnstr_shdsc_rfc4543_encap(u32 * const desc, struct alginfo *cdata,
  749. unsigned int icvsize)
  750. {
  751. u32 *key_jump_cmd, *read_move_cmd, *write_move_cmd;
  752. init_sh_desc(desc, HDR_SHARE_SERIAL);
  753. /* Skip key loading if it is loaded due to sharing */
  754. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  755. JUMP_COND_SHRD);
  756. if (cdata->key_inline)
  757. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  758. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  759. else
  760. append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 |
  761. KEY_DEST_CLASS_REG);
  762. set_jump_tgt_here(desc, key_jump_cmd);
  763. /* Class 1 operation */
  764. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  765. OP_ALG_ENCRYPT);
  766. /* assoclen + cryptlen = seqinlen */
  767. append_math_sub(desc, REG3, SEQINLEN, REG0, CAAM_CMD_SZ);
  768. /*
  769. * MOVE_LEN opcode is not available in all SEC HW revisions,
  770. * thus need to do some magic, i.e. self-patch the descriptor
  771. * buffer.
  772. */
  773. read_move_cmd = append_move(desc, MOVE_SRC_DESCBUF | MOVE_DEST_MATH3 |
  774. (0x6 << MOVE_LEN_SHIFT));
  775. write_move_cmd = append_move(desc, MOVE_SRC_MATH3 | MOVE_DEST_DESCBUF |
  776. (0x8 << MOVE_LEN_SHIFT));
  777. /* Will read assoclen + cryptlen bytes */
  778. append_math_sub(desc, VARSEQINLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  779. /* Will write assoclen + cryptlen bytes */
  780. append_math_sub(desc, VARSEQOUTLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  781. /* Read and write assoclen + cryptlen bytes */
  782. aead_append_src_dst(desc, FIFOLD_TYPE_AAD);
  783. set_move_tgt_here(desc, read_move_cmd);
  784. set_move_tgt_here(desc, write_move_cmd);
  785. append_cmd(desc, CMD_LOAD | DISABLE_AUTO_INFO_FIFO);
  786. /* Move payload data to OFIFO */
  787. append_move(desc, MOVE_SRC_INFIFO_CL | MOVE_DEST_OUTFIFO);
  788. /* Write ICV */
  789. append_seq_store(desc, icvsize, LDST_CLASS_1_CCB |
  790. LDST_SRCDST_BYTE_CONTEXT);
  791. #ifdef DEBUG
  792. print_hex_dump(KERN_ERR,
  793. "rfc4543 enc shdesc@" __stringify(__LINE__)": ",
  794. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  795. #endif
  796. }
  797. EXPORT_SYMBOL(cnstr_shdsc_rfc4543_encap);
  798. /**
  799. * cnstr_shdsc_rfc4543_decap - IPSec ESP gmac decapsulation shared descriptor
  800. * (non-protocol).
  801. * @desc: pointer to buffer used for descriptor construction
  802. * @cdata: pointer to block cipher transform definitions
  803. * Valid algorithm values - OP_ALG_ALGSEL_AES ANDed with OP_ALG_AAI_GCM.
  804. * @icvsize: integrity check value (ICV) size (truncated or full)
  805. */
  806. void cnstr_shdsc_rfc4543_decap(u32 * const desc, struct alginfo *cdata,
  807. unsigned int icvsize)
  808. {
  809. u32 *key_jump_cmd, *read_move_cmd, *write_move_cmd;
  810. init_sh_desc(desc, HDR_SHARE_SERIAL);
  811. /* Skip key loading if it is loaded due to sharing */
  812. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  813. JUMP_COND_SHRD);
  814. if (cdata->key_inline)
  815. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  816. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  817. else
  818. append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 |
  819. KEY_DEST_CLASS_REG);
  820. set_jump_tgt_here(desc, key_jump_cmd);
  821. /* Class 1 operation */
  822. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  823. OP_ALG_DECRYPT | OP_ALG_ICV_ON);
  824. /* assoclen + cryptlen = seqoutlen */
  825. append_math_sub(desc, REG3, SEQOUTLEN, REG0, CAAM_CMD_SZ);
  826. /*
  827. * MOVE_LEN opcode is not available in all SEC HW revisions,
  828. * thus need to do some magic, i.e. self-patch the descriptor
  829. * buffer.
  830. */
  831. read_move_cmd = append_move(desc, MOVE_SRC_DESCBUF | MOVE_DEST_MATH3 |
  832. (0x6 << MOVE_LEN_SHIFT));
  833. write_move_cmd = append_move(desc, MOVE_SRC_MATH3 | MOVE_DEST_DESCBUF |
  834. (0x8 << MOVE_LEN_SHIFT));
  835. /* Will read assoclen + cryptlen bytes */
  836. append_math_sub(desc, VARSEQINLEN, SEQOUTLEN, REG0, CAAM_CMD_SZ);
  837. /* Will write assoclen + cryptlen bytes */
  838. append_math_sub(desc, VARSEQOUTLEN, SEQOUTLEN, REG0, CAAM_CMD_SZ);
  839. /* Store payload data */
  840. append_seq_fifo_store(desc, 0, FIFOST_TYPE_MESSAGE_DATA | FIFOLDST_VLF);
  841. /* In-snoop assoclen + cryptlen data */
  842. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_BOTH | FIFOLDST_VLF |
  843. FIFOLD_TYPE_AAD | FIFOLD_TYPE_LAST2FLUSH1);
  844. set_move_tgt_here(desc, read_move_cmd);
  845. set_move_tgt_here(desc, write_move_cmd);
  846. append_cmd(desc, CMD_LOAD | DISABLE_AUTO_INFO_FIFO);
  847. /* Move payload data to OFIFO */
  848. append_move(desc, MOVE_SRC_INFIFO_CL | MOVE_DEST_OUTFIFO);
  849. append_cmd(desc, CMD_LOAD | ENABLE_AUTO_INFO_FIFO);
  850. /* Read ICV */
  851. append_seq_fifo_load(desc, icvsize, FIFOLD_CLASS_CLASS1 |
  852. FIFOLD_TYPE_ICV | FIFOLD_TYPE_LAST1);
  853. #ifdef DEBUG
  854. print_hex_dump(KERN_ERR,
  855. "rfc4543 dec shdesc@" __stringify(__LINE__)": ",
  856. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  857. #endif
  858. }
  859. EXPORT_SYMBOL(cnstr_shdsc_rfc4543_decap);
  860. /*
  861. * For ablkcipher encrypt and decrypt, read from req->src and
  862. * write to req->dst
  863. */
  864. static inline void ablkcipher_append_src_dst(u32 *desc)
  865. {
  866. append_math_add(desc, VARSEQOUTLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  867. append_math_add(desc, VARSEQINLEN, SEQINLEN, REG0, CAAM_CMD_SZ);
  868. append_seq_fifo_load(desc, 0, FIFOLD_CLASS_CLASS1 |
  869. KEY_VLF | FIFOLD_TYPE_MSG | FIFOLD_TYPE_LAST1);
  870. append_seq_fifo_store(desc, 0, FIFOST_TYPE_MESSAGE_DATA | KEY_VLF);
  871. }
  872. /**
  873. * cnstr_shdsc_ablkcipher_encap - ablkcipher encapsulation shared descriptor
  874. * @desc: pointer to buffer used for descriptor construction
  875. * @cdata: pointer to block cipher transform definitions
  876. * Valid algorithm values - one of OP_ALG_ALGSEL_{AES, DES, 3DES} ANDed
  877. * with OP_ALG_AAI_CBC or OP_ALG_AAI_CTR_MOD128.
  878. * @ivsize: initialization vector size
  879. * @is_rfc3686: true when ctr(aes) is wrapped by rfc3686 template
  880. * @ctx1_iv_off: IV offset in CONTEXT1 register
  881. */
  882. void cnstr_shdsc_ablkcipher_encap(u32 * const desc, struct alginfo *cdata,
  883. unsigned int ivsize, const bool is_rfc3686,
  884. const u32 ctx1_iv_off)
  885. {
  886. u32 *key_jump_cmd;
  887. init_sh_desc(desc, HDR_SHARE_SERIAL | HDR_SAVECTX);
  888. /* Skip if already shared */
  889. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  890. JUMP_COND_SHRD);
  891. /* Load class1 key only */
  892. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  893. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  894. /* Load nonce into CONTEXT1 reg */
  895. if (is_rfc3686) {
  896. u8 *nonce = cdata->key_virt + cdata->keylen;
  897. append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE,
  898. LDST_CLASS_IND_CCB |
  899. LDST_SRCDST_BYTE_OUTFIFO | LDST_IMM);
  900. append_move(desc, MOVE_WAITCOMP | MOVE_SRC_OUTFIFO |
  901. MOVE_DEST_CLASS1CTX | (16 << MOVE_OFFSET_SHIFT) |
  902. (CTR_RFC3686_NONCE_SIZE << MOVE_LEN_SHIFT));
  903. }
  904. set_jump_tgt_here(desc, key_jump_cmd);
  905. /* Load iv */
  906. append_seq_load(desc, ivsize, LDST_SRCDST_BYTE_CONTEXT |
  907. LDST_CLASS_1_CCB | (ctx1_iv_off << LDST_OFFSET_SHIFT));
  908. /* Load counter into CONTEXT1 reg */
  909. if (is_rfc3686)
  910. append_load_imm_be32(desc, 1, LDST_IMM | LDST_CLASS_1_CCB |
  911. LDST_SRCDST_BYTE_CONTEXT |
  912. ((ctx1_iv_off + CTR_RFC3686_IV_SIZE) <<
  913. LDST_OFFSET_SHIFT));
  914. /* Load operation */
  915. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  916. OP_ALG_ENCRYPT);
  917. /* Perform operation */
  918. ablkcipher_append_src_dst(desc);
  919. #ifdef DEBUG
  920. print_hex_dump(KERN_ERR,
  921. "ablkcipher enc shdesc@" __stringify(__LINE__)": ",
  922. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  923. #endif
  924. }
  925. EXPORT_SYMBOL(cnstr_shdsc_ablkcipher_encap);
  926. /**
  927. * cnstr_shdsc_ablkcipher_decap - ablkcipher decapsulation shared descriptor
  928. * @desc: pointer to buffer used for descriptor construction
  929. * @cdata: pointer to block cipher transform definitions
  930. * Valid algorithm values - one of OP_ALG_ALGSEL_{AES, DES, 3DES} ANDed
  931. * with OP_ALG_AAI_CBC or OP_ALG_AAI_CTR_MOD128.
  932. * @ivsize: initialization vector size
  933. * @is_rfc3686: true when ctr(aes) is wrapped by rfc3686 template
  934. * @ctx1_iv_off: IV offset in CONTEXT1 register
  935. */
  936. void cnstr_shdsc_ablkcipher_decap(u32 * const desc, struct alginfo *cdata,
  937. unsigned int ivsize, const bool is_rfc3686,
  938. const u32 ctx1_iv_off)
  939. {
  940. u32 *key_jump_cmd;
  941. init_sh_desc(desc, HDR_SHARE_SERIAL | HDR_SAVECTX);
  942. /* Skip if already shared */
  943. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  944. JUMP_COND_SHRD);
  945. /* Load class1 key only */
  946. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  947. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  948. /* Load nonce into CONTEXT1 reg */
  949. if (is_rfc3686) {
  950. u8 *nonce = cdata->key_virt + cdata->keylen;
  951. append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE,
  952. LDST_CLASS_IND_CCB |
  953. LDST_SRCDST_BYTE_OUTFIFO | LDST_IMM);
  954. append_move(desc, MOVE_WAITCOMP | MOVE_SRC_OUTFIFO |
  955. MOVE_DEST_CLASS1CTX | (16 << MOVE_OFFSET_SHIFT) |
  956. (CTR_RFC3686_NONCE_SIZE << MOVE_LEN_SHIFT));
  957. }
  958. set_jump_tgt_here(desc, key_jump_cmd);
  959. /* load IV */
  960. append_seq_load(desc, ivsize, LDST_SRCDST_BYTE_CONTEXT |
  961. LDST_CLASS_1_CCB | (ctx1_iv_off << LDST_OFFSET_SHIFT));
  962. /* Load counter into CONTEXT1 reg */
  963. if (is_rfc3686)
  964. append_load_imm_be32(desc, 1, LDST_IMM | LDST_CLASS_1_CCB |
  965. LDST_SRCDST_BYTE_CONTEXT |
  966. ((ctx1_iv_off + CTR_RFC3686_IV_SIZE) <<
  967. LDST_OFFSET_SHIFT));
  968. /* Choose operation */
  969. if (ctx1_iv_off)
  970. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  971. OP_ALG_DECRYPT);
  972. else
  973. append_dec_op1(desc, cdata->algtype);
  974. /* Perform operation */
  975. ablkcipher_append_src_dst(desc);
  976. #ifdef DEBUG
  977. print_hex_dump(KERN_ERR,
  978. "ablkcipher dec shdesc@" __stringify(__LINE__)": ",
  979. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  980. #endif
  981. }
  982. EXPORT_SYMBOL(cnstr_shdsc_ablkcipher_decap);
  983. /**
  984. * cnstr_shdsc_ablkcipher_givencap - ablkcipher encapsulation shared descriptor
  985. * with HW-generated initialization vector.
  986. * @desc: pointer to buffer used for descriptor construction
  987. * @cdata: pointer to block cipher transform definitions
  988. * Valid algorithm values - one of OP_ALG_ALGSEL_{AES, DES, 3DES} ANDed
  989. * with OP_ALG_AAI_CBC.
  990. * @ivsize: initialization vector size
  991. * @is_rfc3686: true when ctr(aes) is wrapped by rfc3686 template
  992. * @ctx1_iv_off: IV offset in CONTEXT1 register
  993. */
  994. void cnstr_shdsc_ablkcipher_givencap(u32 * const desc, struct alginfo *cdata,
  995. unsigned int ivsize, const bool is_rfc3686,
  996. const u32 ctx1_iv_off)
  997. {
  998. u32 *key_jump_cmd, geniv;
  999. init_sh_desc(desc, HDR_SHARE_SERIAL | HDR_SAVECTX);
  1000. /* Skip if already shared */
  1001. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  1002. JUMP_COND_SHRD);
  1003. /* Load class1 key only */
  1004. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  1005. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  1006. /* Load Nonce into CONTEXT1 reg */
  1007. if (is_rfc3686) {
  1008. u8 *nonce = cdata->key_virt + cdata->keylen;
  1009. append_load_as_imm(desc, nonce, CTR_RFC3686_NONCE_SIZE,
  1010. LDST_CLASS_IND_CCB |
  1011. LDST_SRCDST_BYTE_OUTFIFO | LDST_IMM);
  1012. append_move(desc, MOVE_WAITCOMP | MOVE_SRC_OUTFIFO |
  1013. MOVE_DEST_CLASS1CTX | (16 << MOVE_OFFSET_SHIFT) |
  1014. (CTR_RFC3686_NONCE_SIZE << MOVE_LEN_SHIFT));
  1015. }
  1016. set_jump_tgt_here(desc, key_jump_cmd);
  1017. /* Generate IV */
  1018. geniv = NFIFOENTRY_STYPE_PAD | NFIFOENTRY_DEST_DECO |
  1019. NFIFOENTRY_DTYPE_MSG | NFIFOENTRY_LC1 | NFIFOENTRY_PTYPE_RND |
  1020. (ivsize << NFIFOENTRY_DLEN_SHIFT);
  1021. append_load_imm_u32(desc, geniv, LDST_CLASS_IND_CCB |
  1022. LDST_SRCDST_WORD_INFO_FIFO | LDST_IMM);
  1023. append_cmd(desc, CMD_LOAD | DISABLE_AUTO_INFO_FIFO);
  1024. append_move(desc, MOVE_WAITCOMP | MOVE_SRC_INFIFO |
  1025. MOVE_DEST_CLASS1CTX | (ivsize << MOVE_LEN_SHIFT) |
  1026. (ctx1_iv_off << MOVE_OFFSET_SHIFT));
  1027. append_cmd(desc, CMD_LOAD | ENABLE_AUTO_INFO_FIFO);
  1028. /* Copy generated IV to memory */
  1029. append_seq_store(desc, ivsize, LDST_SRCDST_BYTE_CONTEXT |
  1030. LDST_CLASS_1_CCB | (ctx1_iv_off << LDST_OFFSET_SHIFT));
  1031. /* Load Counter into CONTEXT1 reg */
  1032. if (is_rfc3686)
  1033. append_load_imm_be32(desc, 1, LDST_IMM | LDST_CLASS_1_CCB |
  1034. LDST_SRCDST_BYTE_CONTEXT |
  1035. ((ctx1_iv_off + CTR_RFC3686_IV_SIZE) <<
  1036. LDST_OFFSET_SHIFT));
  1037. if (ctx1_iv_off)
  1038. append_jump(desc, JUMP_JSL | JUMP_TEST_ALL | JUMP_COND_NCP |
  1039. (1 << JUMP_OFFSET_SHIFT));
  1040. /* Load operation */
  1041. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  1042. OP_ALG_ENCRYPT);
  1043. /* Perform operation */
  1044. ablkcipher_append_src_dst(desc);
  1045. #ifdef DEBUG
  1046. print_hex_dump(KERN_ERR,
  1047. "ablkcipher givenc shdesc@" __stringify(__LINE__) ": ",
  1048. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  1049. #endif
  1050. }
  1051. EXPORT_SYMBOL(cnstr_shdsc_ablkcipher_givencap);
  1052. /**
  1053. * cnstr_shdsc_xts_ablkcipher_encap - xts ablkcipher encapsulation shared
  1054. * descriptor
  1055. * @desc: pointer to buffer used for descriptor construction
  1056. * @cdata: pointer to block cipher transform definitions
  1057. * Valid algorithm values - OP_ALG_ALGSEL_AES ANDed with OP_ALG_AAI_XTS.
  1058. */
  1059. void cnstr_shdsc_xts_ablkcipher_encap(u32 * const desc, struct alginfo *cdata)
  1060. {
  1061. __be64 sector_size = cpu_to_be64(512);
  1062. u32 *key_jump_cmd;
  1063. init_sh_desc(desc, HDR_SHARE_SERIAL | HDR_SAVECTX);
  1064. /* Skip if already shared */
  1065. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  1066. JUMP_COND_SHRD);
  1067. /* Load class1 keys only */
  1068. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  1069. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  1070. /* Load sector size with index 40 bytes (0x28) */
  1071. append_load_as_imm(desc, (void *)&sector_size, 8, LDST_CLASS_1_CCB |
  1072. LDST_SRCDST_BYTE_CONTEXT |
  1073. (0x28 << LDST_OFFSET_SHIFT));
  1074. set_jump_tgt_here(desc, key_jump_cmd);
  1075. /*
  1076. * create sequence for loading the sector index
  1077. * Upper 8B of IV - will be used as sector index
  1078. * Lower 8B of IV - will be discarded
  1079. */
  1080. append_seq_load(desc, 8, LDST_SRCDST_BYTE_CONTEXT | LDST_CLASS_1_CCB |
  1081. (0x20 << LDST_OFFSET_SHIFT));
  1082. append_seq_fifo_load(desc, 8, FIFOLD_CLASS_SKIP);
  1083. /* Load operation */
  1084. append_operation(desc, cdata->algtype | OP_ALG_AS_INITFINAL |
  1085. OP_ALG_ENCRYPT);
  1086. /* Perform operation */
  1087. ablkcipher_append_src_dst(desc);
  1088. #ifdef DEBUG
  1089. print_hex_dump(KERN_ERR,
  1090. "xts ablkcipher enc shdesc@" __stringify(__LINE__) ": ",
  1091. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  1092. #endif
  1093. }
  1094. EXPORT_SYMBOL(cnstr_shdsc_xts_ablkcipher_encap);
  1095. /**
  1096. * cnstr_shdsc_xts_ablkcipher_decap - xts ablkcipher decapsulation shared
  1097. * descriptor
  1098. * @desc: pointer to buffer used for descriptor construction
  1099. * @cdata: pointer to block cipher transform definitions
  1100. * Valid algorithm values - OP_ALG_ALGSEL_AES ANDed with OP_ALG_AAI_XTS.
  1101. */
  1102. void cnstr_shdsc_xts_ablkcipher_decap(u32 * const desc, struct alginfo *cdata)
  1103. {
  1104. __be64 sector_size = cpu_to_be64(512);
  1105. u32 *key_jump_cmd;
  1106. init_sh_desc(desc, HDR_SHARE_SERIAL | HDR_SAVECTX);
  1107. /* Skip if already shared */
  1108. key_jump_cmd = append_jump(desc, JUMP_JSL | JUMP_TEST_ALL |
  1109. JUMP_COND_SHRD);
  1110. /* Load class1 key only */
  1111. append_key_as_imm(desc, cdata->key_virt, cdata->keylen,
  1112. cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG);
  1113. /* Load sector size with index 40 bytes (0x28) */
  1114. append_load_as_imm(desc, (void *)&sector_size, 8, LDST_CLASS_1_CCB |
  1115. LDST_SRCDST_BYTE_CONTEXT |
  1116. (0x28 << LDST_OFFSET_SHIFT));
  1117. set_jump_tgt_here(desc, key_jump_cmd);
  1118. /*
  1119. * create sequence for loading the sector index
  1120. * Upper 8B of IV - will be used as sector index
  1121. * Lower 8B of IV - will be discarded
  1122. */
  1123. append_seq_load(desc, 8, LDST_SRCDST_BYTE_CONTEXT | LDST_CLASS_1_CCB |
  1124. (0x20 << LDST_OFFSET_SHIFT));
  1125. append_seq_fifo_load(desc, 8, FIFOLD_CLASS_SKIP);
  1126. /* Load operation */
  1127. append_dec_op1(desc, cdata->algtype);
  1128. /* Perform operation */
  1129. ablkcipher_append_src_dst(desc);
  1130. #ifdef DEBUG
  1131. print_hex_dump(KERN_ERR,
  1132. "xts ablkcipher dec shdesc@" __stringify(__LINE__) ": ",
  1133. DUMP_PREFIX_ADDRESS, 16, 4, desc, desc_bytes(desc), 1);
  1134. #endif
  1135. }
  1136. EXPORT_SYMBOL(cnstr_shdsc_xts_ablkcipher_decap);
  1137. MODULE_LICENSE("GPL");
  1138. MODULE_DESCRIPTION("FSL CAAM descriptor support");
  1139. MODULE_AUTHOR("Freescale Semiconductor - NMG/STC");