xref: /openbmc/linux/drivers/crypto/cavium/cpt/cptvf_algs.c (revision b8aa7dc5c7535f9abfca4bceb0ade9ee10cf5f54)
125763b3cSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only
2c694b233SGeorge Cherian 
3c694b233SGeorge Cherian /*
4c694b233SGeorge Cherian  * Copyright (C) 2016 Cavium, Inc.
5c694b233SGeorge Cherian  */
6c694b233SGeorge Cherian 
7c694b233SGeorge Cherian #include <crypto/aes.h>
8c694b233SGeorge Cherian #include <crypto/algapi.h>
9c694b233SGeorge Cherian #include <crypto/authenc.h>
100e1cbe97SArd Biesheuvel #include <crypto/internal/des.h>
11c694b233SGeorge Cherian #include <crypto/xts.h>
12c694b233SGeorge Cherian #include <linux/crypto.h>
13c694b233SGeorge Cherian #include <linux/err.h>
14c694b233SGeorge Cherian #include <linux/list.h>
15c694b233SGeorge Cherian #include <linux/scatterlist.h>
16c694b233SGeorge Cherian 
17c694b233SGeorge Cherian #include "cptvf.h"
18c694b233SGeorge Cherian #include "cptvf_algs.h"
19c694b233SGeorge Cherian 
20c694b233SGeorge Cherian struct cpt_device_handle {
21c694b233SGeorge Cherian 	void *cdev[MAX_DEVICES];
22c694b233SGeorge Cherian 	u32 dev_count;
23c694b233SGeorge Cherian };
24c694b233SGeorge Cherian 
25c694b233SGeorge Cherian static struct cpt_device_handle dev_handle;
26c694b233SGeorge Cherian 
27c694b233SGeorge Cherian static void cvm_callback(u32 status, void *arg)
28c694b233SGeorge Cherian {
29c694b233SGeorge Cherian 	struct crypto_async_request *req = (struct crypto_async_request *)arg;
30c694b233SGeorge Cherian 
31c694b233SGeorge Cherian 	req->complete(req, !status);
32c694b233SGeorge Cherian }
33c694b233SGeorge Cherian 
34c694b233SGeorge Cherian static inline void update_input_iv(struct cpt_request_info *req_info,
35c694b233SGeorge Cherian 				   u8 *iv, u32 enc_iv_len,
36c694b233SGeorge Cherian 				   u32 *argcnt)
37c694b233SGeorge Cherian {
38c694b233SGeorge Cherian 	/* Setting the iv information */
39c694b233SGeorge Cherian 	req_info->in[*argcnt].vptr = (void *)iv;
40c694b233SGeorge Cherian 	req_info->in[*argcnt].size = enc_iv_len;
41c694b233SGeorge Cherian 	req_info->req.dlen += enc_iv_len;
42c694b233SGeorge Cherian 
43c694b233SGeorge Cherian 	++(*argcnt);
44c694b233SGeorge Cherian }
45c694b233SGeorge Cherian 
46c694b233SGeorge Cherian static inline void update_output_iv(struct cpt_request_info *req_info,
47c694b233SGeorge Cherian 				    u8 *iv, u32 enc_iv_len,
48c694b233SGeorge Cherian 				    u32 *argcnt)
49c694b233SGeorge Cherian {
50c694b233SGeorge Cherian 	/* Setting the iv information */
51c694b233SGeorge Cherian 	req_info->out[*argcnt].vptr = (void *)iv;
52c694b233SGeorge Cherian 	req_info->out[*argcnt].size = enc_iv_len;
53c694b233SGeorge Cherian 	req_info->rlen += enc_iv_len;
54c694b233SGeorge Cherian 
55c694b233SGeorge Cherian 	++(*argcnt);
56c694b233SGeorge Cherian }
57c694b233SGeorge Cherian 
58c694b233SGeorge Cherian static inline void update_input_data(struct cpt_request_info *req_info,
59c694b233SGeorge Cherian 				     struct scatterlist *inp_sg,
60c694b233SGeorge Cherian 				     u32 nbytes, u32 *argcnt)
61c694b233SGeorge Cherian {
62c694b233SGeorge Cherian 	req_info->req.dlen += nbytes;
63c694b233SGeorge Cherian 
64c694b233SGeorge Cherian 	while (nbytes) {
65c694b233SGeorge Cherian 		u32 len = min(nbytes, inp_sg->length);
66c694b233SGeorge Cherian 		u8 *ptr = sg_virt(inp_sg);
67c694b233SGeorge Cherian 
68c694b233SGeorge Cherian 		req_info->in[*argcnt].vptr = (void *)ptr;
69c694b233SGeorge Cherian 		req_info->in[*argcnt].size = len;
70c694b233SGeorge Cherian 		nbytes -= len;
71c694b233SGeorge Cherian 
72c694b233SGeorge Cherian 		++(*argcnt);
73c694b233SGeorge Cherian 		++inp_sg;
74c694b233SGeorge Cherian 	}
75c694b233SGeorge Cherian }
76c694b233SGeorge Cherian 
77c694b233SGeorge Cherian static inline void update_output_data(struct cpt_request_info *req_info,
78c694b233SGeorge Cherian 				      struct scatterlist *outp_sg,
79c694b233SGeorge Cherian 				      u32 nbytes, u32 *argcnt)
80c694b233SGeorge Cherian {
81c694b233SGeorge Cherian 	req_info->rlen += nbytes;
82c694b233SGeorge Cherian 
83c694b233SGeorge Cherian 	while (nbytes) {
84c694b233SGeorge Cherian 		u32 len = min(nbytes, outp_sg->length);
85c694b233SGeorge Cherian 		u8 *ptr = sg_virt(outp_sg);
86c694b233SGeorge Cherian 
87c694b233SGeorge Cherian 		req_info->out[*argcnt].vptr = (void *)ptr;
88c694b233SGeorge Cherian 		req_info->out[*argcnt].size = len;
89c694b233SGeorge Cherian 		nbytes -= len;
90c694b233SGeorge Cherian 		++(*argcnt);
91c694b233SGeorge Cherian 		++outp_sg;
92c694b233SGeorge Cherian 	}
93c694b233SGeorge Cherian }
94c694b233SGeorge Cherian 
95ac0d3d13SArd Biesheuvel static inline u32 create_ctx_hdr(struct skcipher_request *req, u32 enc,
96c694b233SGeorge Cherian 				 u32 *argcnt)
97c694b233SGeorge Cherian {
98ac0d3d13SArd Biesheuvel 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
99ac0d3d13SArd Biesheuvel 	struct cvm_enc_ctx *ctx = crypto_skcipher_ctx(tfm);
100ac0d3d13SArd Biesheuvel 	struct cvm_req_ctx *rctx = skcipher_request_ctx(req);
101c694b233SGeorge Cherian 	struct fc_context *fctx = &rctx->fctx;
102ac0d3d13SArd Biesheuvel 	u32 enc_iv_len = crypto_skcipher_ivsize(tfm);
103c694b233SGeorge Cherian 	struct cpt_request_info *req_info = &rctx->cpt_req;
104c4149431SHerbert Xu 	__be64 *ctrl_flags = NULL;
105c4149431SHerbert Xu 	__be64 *offset_control;
106c694b233SGeorge Cherian 
107c694b233SGeorge Cherian 	req_info->ctrl.s.grp = 0;
108c694b233SGeorge Cherian 	req_info->ctrl.s.dma_mode = DMA_GATHER_SCATTER;
109c694b233SGeorge Cherian 	req_info->ctrl.s.se_req = SE_CORE_REQ;
110c694b233SGeorge Cherian 
111c694b233SGeorge Cherian 	req_info->req.opcode.s.major = MAJOR_OP_FC |
112c694b233SGeorge Cherian 					DMA_MODE_FLAG(DMA_GATHER_SCATTER);
113c694b233SGeorge Cherian 	if (enc)
114c694b233SGeorge Cherian 		req_info->req.opcode.s.minor = 2;
115c694b233SGeorge Cherian 	else
116c694b233SGeorge Cherian 		req_info->req.opcode.s.minor = 3;
117c694b233SGeorge Cherian 
118ac0d3d13SArd Biesheuvel 	req_info->req.param1 = req->cryptlen; /* Encryption Data length */
119c694b233SGeorge Cherian 	req_info->req.param2 = 0; /*Auth data length */
120c694b233SGeorge Cherian 
121e2eb769eSGeorge Cherian 	fctx->enc.enc_ctrl.e.enc_cipher = ctx->cipher_type;
122e2eb769eSGeorge Cherian 	fctx->enc.enc_ctrl.e.aes_key = ctx->key_type;
123c694b233SGeorge Cherian 	fctx->enc.enc_ctrl.e.iv_source = FROM_DPTR;
124c694b233SGeorge Cherian 
125e2eb769eSGeorge Cherian 	if (ctx->cipher_type == AES_XTS)
126c694b233SGeorge Cherian 		memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len * 2);
127c694b233SGeorge Cherian 	else
128c694b233SGeorge Cherian 		memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len);
129c4149431SHerbert Xu 	ctrl_flags = (__be64 *)&fctx->enc.enc_ctrl.flags;
130c4149431SHerbert Xu 	*ctrl_flags = cpu_to_be64(fctx->enc.enc_ctrl.flags);
131c694b233SGeorge Cherian 
132c4149431SHerbert Xu 	offset_control = (__be64 *)&rctx->control_word;
133c694b233SGeorge Cherian 	*offset_control = cpu_to_be64(((u64)(enc_iv_len) << 16));
134c694b233SGeorge Cherian 	/* Storing  Packet Data Information in offset
135c694b233SGeorge Cherian 	 * Control Word First 8 bytes
136c694b233SGeorge Cherian 	 */
137c694b233SGeorge Cherian 	req_info->in[*argcnt].vptr = (u8 *)offset_control;
138c694b233SGeorge Cherian 	req_info->in[*argcnt].size = CONTROL_WORD_LEN;
139c694b233SGeorge Cherian 	req_info->req.dlen += CONTROL_WORD_LEN;
140c694b233SGeorge Cherian 	++(*argcnt);
141c694b233SGeorge Cherian 
142c694b233SGeorge Cherian 	req_info->in[*argcnt].vptr = (u8 *)fctx;
143c694b233SGeorge Cherian 	req_info->in[*argcnt].size = sizeof(struct fc_context);
144c694b233SGeorge Cherian 	req_info->req.dlen += sizeof(struct fc_context);
145c694b233SGeorge Cherian 
146c694b233SGeorge Cherian 	++(*argcnt);
147c694b233SGeorge Cherian 
148c694b233SGeorge Cherian 	return 0;
149c694b233SGeorge Cherian }
150c694b233SGeorge Cherian 
151ac0d3d13SArd Biesheuvel static inline u32 create_input_list(struct skcipher_request  *req, u32 enc,
152c694b233SGeorge Cherian 				    u32 enc_iv_len)
153c694b233SGeorge Cherian {
154ac0d3d13SArd Biesheuvel 	struct cvm_req_ctx *rctx = skcipher_request_ctx(req);
155c694b233SGeorge Cherian 	struct cpt_request_info *req_info = &rctx->cpt_req;
156c694b233SGeorge Cherian 	u32 argcnt =  0;
157c694b233SGeorge Cherian 
158e2eb769eSGeorge Cherian 	create_ctx_hdr(req, enc, &argcnt);
159ac0d3d13SArd Biesheuvel 	update_input_iv(req_info, req->iv, enc_iv_len, &argcnt);
160ac0d3d13SArd Biesheuvel 	update_input_data(req_info, req->src, req->cryptlen, &argcnt);
161c694b233SGeorge Cherian 	req_info->incnt = argcnt;
162c694b233SGeorge Cherian 
163c694b233SGeorge Cherian 	return 0;
164c694b233SGeorge Cherian }
165c694b233SGeorge Cherian 
166ac0d3d13SArd Biesheuvel static inline void store_cb_info(struct skcipher_request *req,
167c694b233SGeorge Cherian 				 struct cpt_request_info *req_info)
168c694b233SGeorge Cherian {
169c694b233SGeorge Cherian 	req_info->callback = (void *)cvm_callback;
170c694b233SGeorge Cherian 	req_info->callback_arg = (void *)&req->base;
171c694b233SGeorge Cherian }
172c694b233SGeorge Cherian 
173ac0d3d13SArd Biesheuvel static inline void create_output_list(struct skcipher_request *req,
174c694b233SGeorge Cherian 				      u32 enc_iv_len)
175c694b233SGeorge Cherian {
176ac0d3d13SArd Biesheuvel 	struct cvm_req_ctx *rctx = skcipher_request_ctx(req);
177c694b233SGeorge Cherian 	struct cpt_request_info *req_info = &rctx->cpt_req;
178c694b233SGeorge Cherian 	u32 argcnt = 0;
179c694b233SGeorge Cherian 
180c694b233SGeorge Cherian 	/* OUTPUT Buffer Processing
181c694b233SGeorge Cherian 	 * AES encryption/decryption output would be
182c694b233SGeorge Cherian 	 * received in the following format
183c694b233SGeorge Cherian 	 *
184c694b233SGeorge Cherian 	 * ------IV--------|------ENCRYPTED/DECRYPTED DATA-----|
185c694b233SGeorge Cherian 	 * [ 16 Bytes/     [   Request Enc/Dec/ DATA Len AES CBC ]
186c694b233SGeorge Cherian 	 */
187c694b233SGeorge Cherian 	/* Reading IV information */
188ac0d3d13SArd Biesheuvel 	update_output_iv(req_info, req->iv, enc_iv_len, &argcnt);
189ac0d3d13SArd Biesheuvel 	update_output_data(req_info, req->dst, req->cryptlen, &argcnt);
190c694b233SGeorge Cherian 	req_info->outcnt = argcnt;
191c694b233SGeorge Cherian }
192c694b233SGeorge Cherian 
193ac0d3d13SArd Biesheuvel static inline int cvm_enc_dec(struct skcipher_request *req, u32 enc)
194c694b233SGeorge Cherian {
195ac0d3d13SArd Biesheuvel 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
196ac0d3d13SArd Biesheuvel 	struct cvm_req_ctx *rctx = skcipher_request_ctx(req);
197ac0d3d13SArd Biesheuvel 	u32 enc_iv_len = crypto_skcipher_ivsize(tfm);
198c694b233SGeorge Cherian 	struct fc_context *fctx = &rctx->fctx;
199c694b233SGeorge Cherian 	struct cpt_request_info *req_info = &rctx->cpt_req;
200c694b233SGeorge Cherian 	void *cdev = NULL;
201c694b233SGeorge Cherian 	int status;
202c694b233SGeorge Cherian 
203c694b233SGeorge Cherian 	memset(req_info, 0, sizeof(struct cpt_request_info));
2049e27c991SMikulas Patocka 	req_info->may_sleep = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) != 0;
205c694b233SGeorge Cherian 	memset(fctx, 0, sizeof(struct fc_context));
206e2eb769eSGeorge Cherian 	create_input_list(req, enc, enc_iv_len);
207e2eb769eSGeorge Cherian 	create_output_list(req, enc_iv_len);
208c694b233SGeorge Cherian 	store_cb_info(req, req_info);
209c694b233SGeorge Cherian 	cdev = dev_handle.cdev[smp_processor_id()];
210c694b233SGeorge Cherian 	status = cptvf_do_request(cdev, req_info);
211c694b233SGeorge Cherian 	/* We perform an asynchronous send and once
212c694b233SGeorge Cherian 	 * the request is completed the driver would
213c694b233SGeorge Cherian 	 * intimate through  registered call back functions
214c694b233SGeorge Cherian 	 */
215c694b233SGeorge Cherian 
216c694b233SGeorge Cherian 	if (status)
217c694b233SGeorge Cherian 		return status;
218c694b233SGeorge Cherian 	else
219c694b233SGeorge Cherian 		return -EINPROGRESS;
220c694b233SGeorge Cherian }
221c694b233SGeorge Cherian 
222ac0d3d13SArd Biesheuvel static int cvm_encrypt(struct skcipher_request *req)
223c694b233SGeorge Cherian {
224e2eb769eSGeorge Cherian 	return cvm_enc_dec(req, true);
225c694b233SGeorge Cherian }
226c694b233SGeorge Cherian 
227ac0d3d13SArd Biesheuvel static int cvm_decrypt(struct skcipher_request *req)
228c694b233SGeorge Cherian {
229e2eb769eSGeorge Cherian 	return cvm_enc_dec(req, false);
230c694b233SGeorge Cherian }
231c694b233SGeorge Cherian 
232ac0d3d13SArd Biesheuvel static int cvm_xts_setkey(struct crypto_skcipher *cipher, const u8 *key,
233c694b233SGeorge Cherian 		   u32 keylen)
234c694b233SGeorge Cherian {
235ac0d3d13SArd Biesheuvel 	struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher);
236c694b233SGeorge Cherian 	struct cvm_enc_ctx *ctx = crypto_tfm_ctx(tfm);
237c694b233SGeorge Cherian 	int err;
238c694b233SGeorge Cherian 	const u8 *key1 = key;
239c694b233SGeorge Cherian 	const u8 *key2 = key + (keylen / 2);
240c694b233SGeorge Cherian 
241c694b233SGeorge Cherian 	err = xts_check_key(tfm, key, keylen);
242c694b233SGeorge Cherian 	if (err)
243c694b233SGeorge Cherian 		return err;
244c694b233SGeorge Cherian 	ctx->key_len = keylen;
245c694b233SGeorge Cherian 	memcpy(ctx->enc_key, key1, keylen / 2);
246c694b233SGeorge Cherian 	memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2);
247e2eb769eSGeorge Cherian 	ctx->cipher_type = AES_XTS;
248e2eb769eSGeorge Cherian 	switch (ctx->key_len) {
249e2eb769eSGeorge Cherian 	case 32:
250e2eb769eSGeorge Cherian 		ctx->key_type = AES_128_BIT;
251e2eb769eSGeorge Cherian 		break;
252e2eb769eSGeorge Cherian 	case 64:
253e2eb769eSGeorge Cherian 		ctx->key_type = AES_256_BIT;
254e2eb769eSGeorge Cherian 		break;
255e2eb769eSGeorge Cherian 	default:
256e2eb769eSGeorge Cherian 		return -EINVAL;
257e2eb769eSGeorge Cherian 	}
258c694b233SGeorge Cherian 
259c694b233SGeorge Cherian 	return 0;
260c694b233SGeorge Cherian }
261c694b233SGeorge Cherian 
262e2eb769eSGeorge Cherian static int cvm_validate_keylen(struct cvm_enc_ctx *ctx, u32 keylen)
263e2eb769eSGeorge Cherian {
264e2eb769eSGeorge Cherian 	if ((keylen == 16) || (keylen == 24) || (keylen == 32)) {
265e2eb769eSGeorge Cherian 		ctx->key_len = keylen;
266e2eb769eSGeorge Cherian 		switch (ctx->key_len) {
267e2eb769eSGeorge Cherian 		case 16:
268e2eb769eSGeorge Cherian 			ctx->key_type = AES_128_BIT;
269e2eb769eSGeorge Cherian 			break;
270e2eb769eSGeorge Cherian 		case 24:
271e2eb769eSGeorge Cherian 			ctx->key_type = AES_192_BIT;
272e2eb769eSGeorge Cherian 			break;
273e2eb769eSGeorge Cherian 		case 32:
274e2eb769eSGeorge Cherian 			ctx->key_type = AES_256_BIT;
275e2eb769eSGeorge Cherian 			break;
276e2eb769eSGeorge Cherian 		default:
277e2eb769eSGeorge Cherian 			return -EINVAL;
278e2eb769eSGeorge Cherian 		}
279e2eb769eSGeorge Cherian 
280e2eb769eSGeorge Cherian 		if (ctx->cipher_type == DES3_CBC)
281e2eb769eSGeorge Cherian 			ctx->key_type = 0;
282e2eb769eSGeorge Cherian 
283e2eb769eSGeorge Cherian 		return 0;
284e2eb769eSGeorge Cherian 	}
285e2eb769eSGeorge Cherian 
286e2eb769eSGeorge Cherian 	return -EINVAL;
287e2eb769eSGeorge Cherian }
288e2eb769eSGeorge Cherian 
289ac0d3d13SArd Biesheuvel static int cvm_setkey(struct crypto_skcipher *cipher, const u8 *key,
290e2eb769eSGeorge Cherian 		      u32 keylen, u8 cipher_type)
291c694b233SGeorge Cherian {
292ac0d3d13SArd Biesheuvel 	struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher);
293c694b233SGeorge Cherian 	struct cvm_enc_ctx *ctx = crypto_tfm_ctx(tfm);
294c694b233SGeorge Cherian 
295e2eb769eSGeorge Cherian 	ctx->cipher_type = cipher_type;
296e2eb769eSGeorge Cherian 	if (!cvm_validate_keylen(ctx, keylen)) {
297c694b233SGeorge Cherian 		memcpy(ctx->enc_key, key, keylen);
298c694b233SGeorge Cherian 		return 0;
299e2eb769eSGeorge Cherian 	} else {
300c694b233SGeorge Cherian 		return -EINVAL;
301c694b233SGeorge Cherian 	}
302e2eb769eSGeorge Cherian }
303e2eb769eSGeorge Cherian 
304ac0d3d13SArd Biesheuvel static int cvm_cbc_aes_setkey(struct crypto_skcipher *cipher, const u8 *key,
305e2eb769eSGeorge Cherian 			      u32 keylen)
306e2eb769eSGeorge Cherian {
307e2eb769eSGeorge Cherian 	return cvm_setkey(cipher, key, keylen, AES_CBC);
308e2eb769eSGeorge Cherian }
309e2eb769eSGeorge Cherian 
310ac0d3d13SArd Biesheuvel static int cvm_ecb_aes_setkey(struct crypto_skcipher *cipher, const u8 *key,
31110d82222SGeorge Cherian 			      u32 keylen)
31210d82222SGeorge Cherian {
31310d82222SGeorge Cherian 	return cvm_setkey(cipher, key, keylen, AES_ECB);
31410d82222SGeorge Cherian }
31510d82222SGeorge Cherian 
316ac0d3d13SArd Biesheuvel static int cvm_cfb_aes_setkey(struct crypto_skcipher *cipher, const u8 *key,
31710d82222SGeorge Cherian 			      u32 keylen)
31810d82222SGeorge Cherian {
31910d82222SGeorge Cherian 	return cvm_setkey(cipher, key, keylen, AES_CFB);
32010d82222SGeorge Cherian }
32110d82222SGeorge Cherian 
322ac0d3d13SArd Biesheuvel static int cvm_cbc_des3_setkey(struct crypto_skcipher *cipher, const u8 *key,
323e2eb769eSGeorge Cherian 			       u32 keylen)
324e2eb769eSGeorge Cherian {
325ac0d3d13SArd Biesheuvel 	return verify_skcipher_des3_key(cipher, key) ?:
3260e1cbe97SArd Biesheuvel 	       cvm_setkey(cipher, key, keylen, DES3_CBC);
327e2eb769eSGeorge Cherian }
328c694b233SGeorge Cherian 
329ac0d3d13SArd Biesheuvel static int cvm_ecb_des3_setkey(struct crypto_skcipher *cipher, const u8 *key,
33010d82222SGeorge Cherian 			       u32 keylen)
33110d82222SGeorge Cherian {
332ac0d3d13SArd Biesheuvel 	return verify_skcipher_des3_key(cipher, key) ?:
3330e1cbe97SArd Biesheuvel 	       cvm_setkey(cipher, key, keylen, DES3_ECB);
33410d82222SGeorge Cherian }
33510d82222SGeorge Cherian 
336ac0d3d13SArd Biesheuvel static int cvm_enc_dec_init(struct crypto_skcipher *tfm)
337c694b233SGeorge Cherian {
338ac0d3d13SArd Biesheuvel 	crypto_skcipher_set_reqsize(tfm, sizeof(struct cvm_req_ctx));
339ac0d3d13SArd Biesheuvel 
340c694b233SGeorge Cherian 	return 0;
341c694b233SGeorge Cherian }
342c694b233SGeorge Cherian 
343ac0d3d13SArd Biesheuvel static struct skcipher_alg algs[] = { {
344*b8aa7dc5SMikulas Patocka 	.base.cra_flags		= CRYPTO_ALG_ASYNC |
345*b8aa7dc5SMikulas Patocka 				  CRYPTO_ALG_ALLOCATES_MEMORY,
346ac0d3d13SArd Biesheuvel 	.base.cra_blocksize	= AES_BLOCK_SIZE,
347ac0d3d13SArd Biesheuvel 	.base.cra_ctxsize	= sizeof(struct cvm_enc_ctx),
348ac0d3d13SArd Biesheuvel 	.base.cra_alignmask	= 7,
349ac0d3d13SArd Biesheuvel 	.base.cra_priority	= 4001,
350ac0d3d13SArd Biesheuvel 	.base.cra_name		= "xts(aes)",
351ac0d3d13SArd Biesheuvel 	.base.cra_driver_name	= "cavium-xts-aes",
352ac0d3d13SArd Biesheuvel 	.base.cra_module	= THIS_MODULE,
353ac0d3d13SArd Biesheuvel 
354c694b233SGeorge Cherian 	.ivsize			= AES_BLOCK_SIZE,
355c694b233SGeorge Cherian 	.min_keysize		= 2 * AES_MIN_KEY_SIZE,
356c694b233SGeorge Cherian 	.max_keysize		= 2 * AES_MAX_KEY_SIZE,
357c694b233SGeorge Cherian 	.setkey			= cvm_xts_setkey,
358e2eb769eSGeorge Cherian 	.encrypt		= cvm_encrypt,
359e2eb769eSGeorge Cherian 	.decrypt		= cvm_decrypt,
360ac0d3d13SArd Biesheuvel 	.init			= cvm_enc_dec_init,
361c694b233SGeorge Cherian }, {
362*b8aa7dc5SMikulas Patocka 	.base.cra_flags		= CRYPTO_ALG_ASYNC |
363*b8aa7dc5SMikulas Patocka 				  CRYPTO_ALG_ALLOCATES_MEMORY,
364ac0d3d13SArd Biesheuvel 	.base.cra_blocksize	= AES_BLOCK_SIZE,
365ac0d3d13SArd Biesheuvel 	.base.cra_ctxsize	= sizeof(struct cvm_enc_ctx),
366ac0d3d13SArd Biesheuvel 	.base.cra_alignmask	= 7,
367ac0d3d13SArd Biesheuvel 	.base.cra_priority	= 4001,
368ac0d3d13SArd Biesheuvel 	.base.cra_name		= "cbc(aes)",
369ac0d3d13SArd Biesheuvel 	.base.cra_driver_name	= "cavium-cbc-aes",
370ac0d3d13SArd Biesheuvel 	.base.cra_module	= THIS_MODULE,
371ac0d3d13SArd Biesheuvel 
372c694b233SGeorge Cherian 	.ivsize			= AES_BLOCK_SIZE,
373c694b233SGeorge Cherian 	.min_keysize		= AES_MIN_KEY_SIZE,
374c694b233SGeorge Cherian 	.max_keysize		= AES_MAX_KEY_SIZE,
375e2eb769eSGeorge Cherian 	.setkey			= cvm_cbc_aes_setkey,
376e2eb769eSGeorge Cherian 	.encrypt		= cvm_encrypt,
377e2eb769eSGeorge Cherian 	.decrypt		= cvm_decrypt,
378ac0d3d13SArd Biesheuvel 	.init			= cvm_enc_dec_init,
379c694b233SGeorge Cherian }, {
380*b8aa7dc5SMikulas Patocka 	.base.cra_flags		= CRYPTO_ALG_ASYNC |
381*b8aa7dc5SMikulas Patocka 				  CRYPTO_ALG_ALLOCATES_MEMORY,
382ac0d3d13SArd Biesheuvel 	.base.cra_blocksize	= AES_BLOCK_SIZE,
383ac0d3d13SArd Biesheuvel 	.base.cra_ctxsize	= sizeof(struct cvm_enc_ctx),
384ac0d3d13SArd Biesheuvel 	.base.cra_alignmask	= 7,
385ac0d3d13SArd Biesheuvel 	.base.cra_priority	= 4001,
386ac0d3d13SArd Biesheuvel 	.base.cra_name		= "ecb(aes)",
387ac0d3d13SArd Biesheuvel 	.base.cra_driver_name	= "cavium-ecb-aes",
388ac0d3d13SArd Biesheuvel 	.base.cra_module	= THIS_MODULE,
389ac0d3d13SArd Biesheuvel 
39010d82222SGeorge Cherian 	.min_keysize		= AES_MIN_KEY_SIZE,
39110d82222SGeorge Cherian 	.max_keysize		= AES_MAX_KEY_SIZE,
39210d82222SGeorge Cherian 	.setkey			= cvm_ecb_aes_setkey,
39310d82222SGeorge Cherian 	.encrypt		= cvm_encrypt,
39410d82222SGeorge Cherian 	.decrypt		= cvm_decrypt,
395ac0d3d13SArd Biesheuvel 	.init			= cvm_enc_dec_init,
39610d82222SGeorge Cherian }, {
397*b8aa7dc5SMikulas Patocka 	.base.cra_flags		= CRYPTO_ALG_ASYNC |
398*b8aa7dc5SMikulas Patocka 				  CRYPTO_ALG_ALLOCATES_MEMORY,
399ac0d3d13SArd Biesheuvel 	.base.cra_blocksize	= AES_BLOCK_SIZE,
400ac0d3d13SArd Biesheuvel 	.base.cra_ctxsize	= sizeof(struct cvm_enc_ctx),
401ac0d3d13SArd Biesheuvel 	.base.cra_alignmask	= 7,
402ac0d3d13SArd Biesheuvel 	.base.cra_priority	= 4001,
403ac0d3d13SArd Biesheuvel 	.base.cra_name		= "cfb(aes)",
404ac0d3d13SArd Biesheuvel 	.base.cra_driver_name	= "cavium-cfb-aes",
405ac0d3d13SArd Biesheuvel 	.base.cra_module	= THIS_MODULE,
406ac0d3d13SArd Biesheuvel 
40710d82222SGeorge Cherian 	.ivsize			= AES_BLOCK_SIZE,
40810d82222SGeorge Cherian 	.min_keysize		= AES_MIN_KEY_SIZE,
40910d82222SGeorge Cherian 	.max_keysize		= AES_MAX_KEY_SIZE,
41010d82222SGeorge Cherian 	.setkey			= cvm_cfb_aes_setkey,
41110d82222SGeorge Cherian 	.encrypt		= cvm_encrypt,
41210d82222SGeorge Cherian 	.decrypt		= cvm_decrypt,
413ac0d3d13SArd Biesheuvel 	.init			= cvm_enc_dec_init,
41410d82222SGeorge Cherian }, {
415*b8aa7dc5SMikulas Patocka 	.base.cra_flags		= CRYPTO_ALG_ASYNC |
416*b8aa7dc5SMikulas Patocka 				  CRYPTO_ALG_ALLOCATES_MEMORY,
417ac0d3d13SArd Biesheuvel 	.base.cra_blocksize	= DES3_EDE_BLOCK_SIZE,
418ac0d3d13SArd Biesheuvel 	.base.cra_ctxsize	= sizeof(struct cvm_des3_ctx),
419ac0d3d13SArd Biesheuvel 	.base.cra_alignmask	= 7,
420ac0d3d13SArd Biesheuvel 	.base.cra_priority	= 4001,
421ac0d3d13SArd Biesheuvel 	.base.cra_name		= "cbc(des3_ede)",
422ac0d3d13SArd Biesheuvel 	.base.cra_driver_name	= "cavium-cbc-des3_ede",
423ac0d3d13SArd Biesheuvel 	.base.cra_module	= THIS_MODULE,
424ac0d3d13SArd Biesheuvel 
425c694b233SGeorge Cherian 	.min_keysize		= DES3_EDE_KEY_SIZE,
426c694b233SGeorge Cherian 	.max_keysize		= DES3_EDE_KEY_SIZE,
427c694b233SGeorge Cherian 	.ivsize			= DES_BLOCK_SIZE,
428e2eb769eSGeorge Cherian 	.setkey			= cvm_cbc_des3_setkey,
429e2eb769eSGeorge Cherian 	.encrypt		= cvm_encrypt,
430e2eb769eSGeorge Cherian 	.decrypt		= cvm_decrypt,
431ac0d3d13SArd Biesheuvel 	.init			= cvm_enc_dec_init,
43210d82222SGeorge Cherian }, {
433*b8aa7dc5SMikulas Patocka 	.base.cra_flags		= CRYPTO_ALG_ASYNC |
434*b8aa7dc5SMikulas Patocka 				  CRYPTO_ALG_ALLOCATES_MEMORY,
435ac0d3d13SArd Biesheuvel 	.base.cra_blocksize	= DES3_EDE_BLOCK_SIZE,
436ac0d3d13SArd Biesheuvel 	.base.cra_ctxsize	= sizeof(struct cvm_des3_ctx),
437ac0d3d13SArd Biesheuvel 	.base.cra_alignmask	= 7,
438ac0d3d13SArd Biesheuvel 	.base.cra_priority	= 4001,
439ac0d3d13SArd Biesheuvel 	.base.cra_name		= "ecb(des3_ede)",
440ac0d3d13SArd Biesheuvel 	.base.cra_driver_name	= "cavium-ecb-des3_ede",
441ac0d3d13SArd Biesheuvel 	.base.cra_module	= THIS_MODULE,
442ac0d3d13SArd Biesheuvel 
44310d82222SGeorge Cherian 	.min_keysize		= DES3_EDE_KEY_SIZE,
44410d82222SGeorge Cherian 	.max_keysize		= DES3_EDE_KEY_SIZE,
44510d82222SGeorge Cherian 	.ivsize			= DES_BLOCK_SIZE,
44610d82222SGeorge Cherian 	.setkey			= cvm_ecb_des3_setkey,
44710d82222SGeorge Cherian 	.encrypt		= cvm_encrypt,
44810d82222SGeorge Cherian 	.decrypt		= cvm_decrypt,
449ac0d3d13SArd Biesheuvel 	.init			= cvm_enc_dec_init,
450c694b233SGeorge Cherian } };
451c694b233SGeorge Cherian 
452c694b233SGeorge Cherian static inline int cav_register_algs(void)
453c694b233SGeorge Cherian {
454c694b233SGeorge Cherian 	int err = 0;
455c694b233SGeorge Cherian 
456ac0d3d13SArd Biesheuvel 	err = crypto_register_skciphers(algs, ARRAY_SIZE(algs));
457c694b233SGeorge Cherian 	if (err)
458c694b233SGeorge Cherian 		return err;
459c694b233SGeorge Cherian 
460c694b233SGeorge Cherian 	return 0;
461c694b233SGeorge Cherian }
462c694b233SGeorge Cherian 
463c694b233SGeorge Cherian static inline void cav_unregister_algs(void)
464c694b233SGeorge Cherian {
465ac0d3d13SArd Biesheuvel 	crypto_unregister_skciphers(algs, ARRAY_SIZE(algs));
466c694b233SGeorge Cherian }
467c694b233SGeorge Cherian 
468c694b233SGeorge Cherian int cvm_crypto_init(struct cpt_vf *cptvf)
469c694b233SGeorge Cherian {
470c694b233SGeorge Cherian 	struct pci_dev *pdev = cptvf->pdev;
471c694b233SGeorge Cherian 	u32 dev_count;
472c694b233SGeorge Cherian 
473c694b233SGeorge Cherian 	dev_count = dev_handle.dev_count;
474c694b233SGeorge Cherian 	dev_handle.cdev[dev_count] = cptvf;
475c694b233SGeorge Cherian 	dev_handle.dev_count++;
476c694b233SGeorge Cherian 
477c694b233SGeorge Cherian 	if (dev_count == 3) {
478c694b233SGeorge Cherian 		if (cav_register_algs()) {
479c694b233SGeorge Cherian 			dev_err(&pdev->dev, "Error in registering crypto algorithms\n");
480c694b233SGeorge Cherian 			return -EINVAL;
481c694b233SGeorge Cherian 		}
482c694b233SGeorge Cherian 	}
483c694b233SGeorge Cherian 
484c694b233SGeorge Cherian 	return 0;
485c694b233SGeorge Cherian }
486c694b233SGeorge Cherian 
487c694b233SGeorge Cherian void cvm_crypto_exit(void)
488c694b233SGeorge Cherian {
489c694b233SGeorge Cherian 	u32 dev_count;
490c694b233SGeorge Cherian 
491c694b233SGeorge Cherian 	dev_count = --dev_handle.dev_count;
492c694b233SGeorge Cherian 	if (!dev_count)
493c694b233SGeorge Cherian 		cav_unregister_algs();
494c694b233SGeorge Cherian }
495