xref: /openbmc/linux/drivers/crypto/cavium/cpt/cptvf_algs.c (revision c694b233295b99c33dd5ac28aede9f171f5a6862)
1*c694b233SGeorge Cherian 
2*c694b233SGeorge Cherian /*
3*c694b233SGeorge Cherian  * Copyright (C) 2016 Cavium, Inc.
4*c694b233SGeorge Cherian  *
5*c694b233SGeorge Cherian  * This program is free software; you can redistribute it and/or modify it
6*c694b233SGeorge Cherian  * under the terms of version 2 of the GNU General Public License
7*c694b233SGeorge Cherian  * as published by the Free Software Foundation.
8*c694b233SGeorge Cherian  */
9*c694b233SGeorge Cherian 
10*c694b233SGeorge Cherian #include <crypto/aes.h>
11*c694b233SGeorge Cherian #include <crypto/algapi.h>
12*c694b233SGeorge Cherian #include <crypto/authenc.h>
13*c694b233SGeorge Cherian #include <crypto/cryptd.h>
14*c694b233SGeorge Cherian #include <crypto/crypto_wq.h>
15*c694b233SGeorge Cherian #include <crypto/des.h>
16*c694b233SGeorge Cherian #include <crypto/xts.h>
17*c694b233SGeorge Cherian #include <linux/crypto.h>
18*c694b233SGeorge Cherian #include <linux/err.h>
19*c694b233SGeorge Cherian #include <linux/list.h>
20*c694b233SGeorge Cherian #include <linux/scatterlist.h>
21*c694b233SGeorge Cherian 
22*c694b233SGeorge Cherian #include "cptvf.h"
23*c694b233SGeorge Cherian #include "cptvf_algs.h"
24*c694b233SGeorge Cherian 
25*c694b233SGeorge Cherian struct cpt_device_handle {
26*c694b233SGeorge Cherian 	void *cdev[MAX_DEVICES];
27*c694b233SGeorge Cherian 	u32 dev_count;
28*c694b233SGeorge Cherian };
29*c694b233SGeorge Cherian 
30*c694b233SGeorge Cherian static struct cpt_device_handle dev_handle;
31*c694b233SGeorge Cherian 
32*c694b233SGeorge Cherian static void cvm_callback(u32 status, void *arg)
33*c694b233SGeorge Cherian {
34*c694b233SGeorge Cherian 	struct crypto_async_request *req = (struct crypto_async_request *)arg;
35*c694b233SGeorge Cherian 
36*c694b233SGeorge Cherian 	req->complete(req, !status);
37*c694b233SGeorge Cherian }
38*c694b233SGeorge Cherian 
39*c694b233SGeorge Cherian static inline void update_input_iv(struct cpt_request_info *req_info,
40*c694b233SGeorge Cherian 				   u8 *iv, u32 enc_iv_len,
41*c694b233SGeorge Cherian 				   u32 *argcnt)
42*c694b233SGeorge Cherian {
43*c694b233SGeorge Cherian 	/* Setting the iv information */
44*c694b233SGeorge Cherian 	req_info->in[*argcnt].vptr = (void *)iv;
45*c694b233SGeorge Cherian 	req_info->in[*argcnt].size = enc_iv_len;
46*c694b233SGeorge Cherian 	req_info->req.dlen += enc_iv_len;
47*c694b233SGeorge Cherian 
48*c694b233SGeorge Cherian 	++(*argcnt);
49*c694b233SGeorge Cherian }
50*c694b233SGeorge Cherian 
51*c694b233SGeorge Cherian static inline void update_output_iv(struct cpt_request_info *req_info,
52*c694b233SGeorge Cherian 				    u8 *iv, u32 enc_iv_len,
53*c694b233SGeorge Cherian 				    u32 *argcnt)
54*c694b233SGeorge Cherian {
55*c694b233SGeorge Cherian 	/* Setting the iv information */
56*c694b233SGeorge Cherian 	req_info->out[*argcnt].vptr = (void *)iv;
57*c694b233SGeorge Cherian 	req_info->out[*argcnt].size = enc_iv_len;
58*c694b233SGeorge Cherian 	req_info->rlen += enc_iv_len;
59*c694b233SGeorge Cherian 
60*c694b233SGeorge Cherian 	++(*argcnt);
61*c694b233SGeorge Cherian }
62*c694b233SGeorge Cherian 
63*c694b233SGeorge Cherian static inline void update_input_data(struct cpt_request_info *req_info,
64*c694b233SGeorge Cherian 				     struct scatterlist *inp_sg,
65*c694b233SGeorge Cherian 				     u32 nbytes, u32 *argcnt)
66*c694b233SGeorge Cherian {
67*c694b233SGeorge Cherian 	req_info->req.dlen += nbytes;
68*c694b233SGeorge Cherian 
69*c694b233SGeorge Cherian 	while (nbytes) {
70*c694b233SGeorge Cherian 		u32 len = min(nbytes, inp_sg->length);
71*c694b233SGeorge Cherian 		u8 *ptr = sg_virt(inp_sg);
72*c694b233SGeorge Cherian 
73*c694b233SGeorge Cherian 		req_info->in[*argcnt].vptr = (void *)ptr;
74*c694b233SGeorge Cherian 		req_info->in[*argcnt].size = len;
75*c694b233SGeorge Cherian 		nbytes -= len;
76*c694b233SGeorge Cherian 
77*c694b233SGeorge Cherian 		++(*argcnt);
78*c694b233SGeorge Cherian 		++inp_sg;
79*c694b233SGeorge Cherian 	}
80*c694b233SGeorge Cherian }
81*c694b233SGeorge Cherian 
82*c694b233SGeorge Cherian static inline void update_output_data(struct cpt_request_info *req_info,
83*c694b233SGeorge Cherian 				      struct scatterlist *outp_sg,
84*c694b233SGeorge Cherian 				      u32 nbytes, u32 *argcnt)
85*c694b233SGeorge Cherian {
86*c694b233SGeorge Cherian 	req_info->rlen += nbytes;
87*c694b233SGeorge Cherian 
88*c694b233SGeorge Cherian 	while (nbytes) {
89*c694b233SGeorge Cherian 		u32 len = min(nbytes, outp_sg->length);
90*c694b233SGeorge Cherian 		u8 *ptr = sg_virt(outp_sg);
91*c694b233SGeorge Cherian 
92*c694b233SGeorge Cherian 		req_info->out[*argcnt].vptr = (void *)ptr;
93*c694b233SGeorge Cherian 		req_info->out[*argcnt].size = len;
94*c694b233SGeorge Cherian 		nbytes -= len;
95*c694b233SGeorge Cherian 		++(*argcnt);
96*c694b233SGeorge Cherian 		++outp_sg;
97*c694b233SGeorge Cherian 	}
98*c694b233SGeorge Cherian }
99*c694b233SGeorge Cherian 
100*c694b233SGeorge Cherian static inline u32 create_ctx_hdr(struct ablkcipher_request *req, u32 enc,
101*c694b233SGeorge Cherian 				 u32 cipher_type, u32 aes_key_type,
102*c694b233SGeorge Cherian 				 u32 *argcnt)
103*c694b233SGeorge Cherian {
104*c694b233SGeorge Cherian 	struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(req);
105*c694b233SGeorge Cherian 	struct cvm_enc_ctx *ctx = crypto_ablkcipher_ctx(tfm);
106*c694b233SGeorge Cherian 	struct cvm_req_ctx *rctx = ablkcipher_request_ctx(req);
107*c694b233SGeorge Cherian 	struct fc_context *fctx = &rctx->fctx;
108*c694b233SGeorge Cherian 	u64 *offset_control = &rctx->control_word;
109*c694b233SGeorge Cherian 	u32 enc_iv_len = crypto_ablkcipher_ivsize(tfm);
110*c694b233SGeorge Cherian 	struct cpt_request_info *req_info = &rctx->cpt_req;
111*c694b233SGeorge Cherian 	u64 *ctrl_flags = NULL;
112*c694b233SGeorge Cherian 
113*c694b233SGeorge Cherian 	req_info->ctrl.s.grp = 0;
114*c694b233SGeorge Cherian 	req_info->ctrl.s.dma_mode = DMA_GATHER_SCATTER;
115*c694b233SGeorge Cherian 	req_info->ctrl.s.se_req = SE_CORE_REQ;
116*c694b233SGeorge Cherian 
117*c694b233SGeorge Cherian 	req_info->req.opcode.s.major = MAJOR_OP_FC |
118*c694b233SGeorge Cherian 					DMA_MODE_FLAG(DMA_GATHER_SCATTER);
119*c694b233SGeorge Cherian 	if (enc)
120*c694b233SGeorge Cherian 		req_info->req.opcode.s.minor = 2;
121*c694b233SGeorge Cherian 	else
122*c694b233SGeorge Cherian 		req_info->req.opcode.s.minor = 3;
123*c694b233SGeorge Cherian 
124*c694b233SGeorge Cherian 	req_info->req.param1 = req->nbytes; /* Encryption Data length */
125*c694b233SGeorge Cherian 	req_info->req.param2 = 0; /*Auth data length */
126*c694b233SGeorge Cherian 
127*c694b233SGeorge Cherian 	fctx->enc.enc_ctrl.e.enc_cipher = cipher_type;
128*c694b233SGeorge Cherian 	fctx->enc.enc_ctrl.e.aes_key = aes_key_type;
129*c694b233SGeorge Cherian 	fctx->enc.enc_ctrl.e.iv_source = FROM_DPTR;
130*c694b233SGeorge Cherian 
131*c694b233SGeorge Cherian 	if (cipher_type == AES_XTS)
132*c694b233SGeorge Cherian 		memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len * 2);
133*c694b233SGeorge Cherian 	else
134*c694b233SGeorge Cherian 		memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len);
135*c694b233SGeorge Cherian 	ctrl_flags = (u64 *)&fctx->enc.enc_ctrl.flags;
136*c694b233SGeorge Cherian 	*ctrl_flags = cpu_to_be64(*ctrl_flags);
137*c694b233SGeorge Cherian 
138*c694b233SGeorge Cherian 	*offset_control = cpu_to_be64(((u64)(enc_iv_len) << 16));
139*c694b233SGeorge Cherian 	/* Storing  Packet Data Information in offset
140*c694b233SGeorge Cherian 	 * Control Word First 8 bytes
141*c694b233SGeorge Cherian 	 */
142*c694b233SGeorge Cherian 	req_info->in[*argcnt].vptr = (u8 *)offset_control;
143*c694b233SGeorge Cherian 	req_info->in[*argcnt].size = CONTROL_WORD_LEN;
144*c694b233SGeorge Cherian 	req_info->req.dlen += CONTROL_WORD_LEN;
145*c694b233SGeorge Cherian 	++(*argcnt);
146*c694b233SGeorge Cherian 
147*c694b233SGeorge Cherian 	req_info->in[*argcnt].vptr = (u8 *)fctx;
148*c694b233SGeorge Cherian 	req_info->in[*argcnt].size = sizeof(struct fc_context);
149*c694b233SGeorge Cherian 	req_info->req.dlen += sizeof(struct fc_context);
150*c694b233SGeorge Cherian 
151*c694b233SGeorge Cherian 	++(*argcnt);
152*c694b233SGeorge Cherian 
153*c694b233SGeorge Cherian 	return 0;
154*c694b233SGeorge Cherian }
155*c694b233SGeorge Cherian 
156*c694b233SGeorge Cherian static inline u32 create_input_list(struct ablkcipher_request  *req, u32 enc,
157*c694b233SGeorge Cherian 				    u32 cipher_type, u32 aes_key_type,
158*c694b233SGeorge Cherian 				    u32 enc_iv_len)
159*c694b233SGeorge Cherian {
160*c694b233SGeorge Cherian 	struct cvm_req_ctx *rctx = ablkcipher_request_ctx(req);
161*c694b233SGeorge Cherian 	struct cpt_request_info *req_info = &rctx->cpt_req;
162*c694b233SGeorge Cherian 	u32 argcnt =  0;
163*c694b233SGeorge Cherian 
164*c694b233SGeorge Cherian 	create_ctx_hdr(req, enc, cipher_type, aes_key_type, &argcnt);
165*c694b233SGeorge Cherian 	update_input_iv(req_info, req->info, enc_iv_len, &argcnt);
166*c694b233SGeorge Cherian 	update_input_data(req_info, req->src, req->nbytes, &argcnt);
167*c694b233SGeorge Cherian 	req_info->incnt = argcnt;
168*c694b233SGeorge Cherian 
169*c694b233SGeorge Cherian 	return 0;
170*c694b233SGeorge Cherian }
171*c694b233SGeorge Cherian 
172*c694b233SGeorge Cherian static inline void store_cb_info(struct ablkcipher_request *req,
173*c694b233SGeorge Cherian 				 struct cpt_request_info *req_info)
174*c694b233SGeorge Cherian {
175*c694b233SGeorge Cherian 	req_info->callback = (void *)cvm_callback;
176*c694b233SGeorge Cherian 	req_info->callback_arg = (void *)&req->base;
177*c694b233SGeorge Cherian }
178*c694b233SGeorge Cherian 
179*c694b233SGeorge Cherian static inline void create_output_list(struct ablkcipher_request *req,
180*c694b233SGeorge Cherian 				      u32 cipher_type,
181*c694b233SGeorge Cherian 				      u32 enc_iv_len)
182*c694b233SGeorge Cherian {
183*c694b233SGeorge Cherian 	struct cvm_req_ctx *rctx = ablkcipher_request_ctx(req);
184*c694b233SGeorge Cherian 	struct cpt_request_info *req_info = &rctx->cpt_req;
185*c694b233SGeorge Cherian 	u32 argcnt = 0;
186*c694b233SGeorge Cherian 
187*c694b233SGeorge Cherian 	/* OUTPUT Buffer Processing
188*c694b233SGeorge Cherian 	 * AES encryption/decryption output would be
189*c694b233SGeorge Cherian 	 * received in the following format
190*c694b233SGeorge Cherian 	 *
191*c694b233SGeorge Cherian 	 * ------IV--------|------ENCRYPTED/DECRYPTED DATA-----|
192*c694b233SGeorge Cherian 	 * [ 16 Bytes/     [   Request Enc/Dec/ DATA Len AES CBC ]
193*c694b233SGeorge Cherian 	 */
194*c694b233SGeorge Cherian 	/* Reading IV information */
195*c694b233SGeorge Cherian 	update_output_iv(req_info, req->info, enc_iv_len, &argcnt);
196*c694b233SGeorge Cherian 	update_output_data(req_info, req->dst, req->nbytes, &argcnt);
197*c694b233SGeorge Cherian 	req_info->outcnt = argcnt;
198*c694b233SGeorge Cherian }
199*c694b233SGeorge Cherian 
200*c694b233SGeorge Cherian static inline int cvm_enc_dec(struct ablkcipher_request *req, u32 enc,
201*c694b233SGeorge Cherian 			      u32 cipher_type)
202*c694b233SGeorge Cherian {
203*c694b233SGeorge Cherian 	struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(req);
204*c694b233SGeorge Cherian 	struct cvm_enc_ctx *ctx = crypto_ablkcipher_ctx(tfm);
205*c694b233SGeorge Cherian 	u32 key_type = AES_128_BIT;
206*c694b233SGeorge Cherian 	struct cvm_req_ctx *rctx = ablkcipher_request_ctx(req);
207*c694b233SGeorge Cherian 	u32 enc_iv_len = crypto_ablkcipher_ivsize(tfm);
208*c694b233SGeorge Cherian 	struct fc_context *fctx = &rctx->fctx;
209*c694b233SGeorge Cherian 	struct cpt_request_info *req_info = &rctx->cpt_req;
210*c694b233SGeorge Cherian 	void *cdev = NULL;
211*c694b233SGeorge Cherian 	int status;
212*c694b233SGeorge Cherian 
213*c694b233SGeorge Cherian 	switch (ctx->key_len) {
214*c694b233SGeorge Cherian 	case 16:
215*c694b233SGeorge Cherian 		key_type = AES_128_BIT;
216*c694b233SGeorge Cherian 		break;
217*c694b233SGeorge Cherian 	case 24:
218*c694b233SGeorge Cherian 		key_type = AES_192_BIT;
219*c694b233SGeorge Cherian 		break;
220*c694b233SGeorge Cherian 	case 32:
221*c694b233SGeorge Cherian 		if (cipher_type == AES_XTS)
222*c694b233SGeorge Cherian 			key_type = AES_128_BIT;
223*c694b233SGeorge Cherian 		else
224*c694b233SGeorge Cherian 			key_type = AES_256_BIT;
225*c694b233SGeorge Cherian 		break;
226*c694b233SGeorge Cherian 	case 64:
227*c694b233SGeorge Cherian 		if (cipher_type == AES_XTS)
228*c694b233SGeorge Cherian 			key_type = AES_256_BIT;
229*c694b233SGeorge Cherian 		else
230*c694b233SGeorge Cherian 			return -EINVAL;
231*c694b233SGeorge Cherian 		break;
232*c694b233SGeorge Cherian 	default:
233*c694b233SGeorge Cherian 		return -EINVAL;
234*c694b233SGeorge Cherian 	}
235*c694b233SGeorge Cherian 
236*c694b233SGeorge Cherian 	if (cipher_type == DES3_CBC)
237*c694b233SGeorge Cherian 		key_type = 0;
238*c694b233SGeorge Cherian 
239*c694b233SGeorge Cherian 	memset(req_info, 0, sizeof(struct cpt_request_info));
240*c694b233SGeorge Cherian 	memset(fctx, 0, sizeof(struct fc_context));
241*c694b233SGeorge Cherian 	create_input_list(req, enc, cipher_type, key_type, enc_iv_len);
242*c694b233SGeorge Cherian 	create_output_list(req, cipher_type, enc_iv_len);
243*c694b233SGeorge Cherian 	store_cb_info(req, req_info);
244*c694b233SGeorge Cherian 	cdev = dev_handle.cdev[smp_processor_id()];
245*c694b233SGeorge Cherian 	status = cptvf_do_request(cdev, req_info);
246*c694b233SGeorge Cherian 	/* We perform an asynchronous send and once
247*c694b233SGeorge Cherian 	 * the request is completed the driver would
248*c694b233SGeorge Cherian 	 * intimate through  registered call back functions
249*c694b233SGeorge Cherian 	 */
250*c694b233SGeorge Cherian 
251*c694b233SGeorge Cherian 	if (status)
252*c694b233SGeorge Cherian 		return status;
253*c694b233SGeorge Cherian 	else
254*c694b233SGeorge Cherian 		return -EINPROGRESS;
255*c694b233SGeorge Cherian }
256*c694b233SGeorge Cherian 
257*c694b233SGeorge Cherian int cvm_des3_encrypt_cbc(struct ablkcipher_request *req)
258*c694b233SGeorge Cherian {
259*c694b233SGeorge Cherian 	return cvm_enc_dec(req, true, DES3_CBC);
260*c694b233SGeorge Cherian }
261*c694b233SGeorge Cherian 
262*c694b233SGeorge Cherian int cvm_des3_decrypt_cbc(struct ablkcipher_request *req)
263*c694b233SGeorge Cherian {
264*c694b233SGeorge Cherian 	return cvm_enc_dec(req, false, DES3_CBC);
265*c694b233SGeorge Cherian }
266*c694b233SGeorge Cherian 
267*c694b233SGeorge Cherian int cvm_aes_encrypt_xts(struct ablkcipher_request *req)
268*c694b233SGeorge Cherian {
269*c694b233SGeorge Cherian 	return cvm_enc_dec(req, true, AES_XTS);
270*c694b233SGeorge Cherian }
271*c694b233SGeorge Cherian 
272*c694b233SGeorge Cherian int cvm_aes_decrypt_xts(struct ablkcipher_request *req)
273*c694b233SGeorge Cherian {
274*c694b233SGeorge Cherian 	return cvm_enc_dec(req, false, AES_XTS);
275*c694b233SGeorge Cherian }
276*c694b233SGeorge Cherian 
277*c694b233SGeorge Cherian int cvm_aes_encrypt_cbc(struct ablkcipher_request *req)
278*c694b233SGeorge Cherian {
279*c694b233SGeorge Cherian 	return cvm_enc_dec(req, true, AES_CBC);
280*c694b233SGeorge Cherian }
281*c694b233SGeorge Cherian 
282*c694b233SGeorge Cherian int cvm_aes_decrypt_cbc(struct ablkcipher_request *req)
283*c694b233SGeorge Cherian {
284*c694b233SGeorge Cherian 	return cvm_enc_dec(req, false, AES_CBC);
285*c694b233SGeorge Cherian }
286*c694b233SGeorge Cherian 
287*c694b233SGeorge Cherian int cvm_xts_setkey(struct crypto_ablkcipher *cipher, const u8 *key,
288*c694b233SGeorge Cherian 		   u32 keylen)
289*c694b233SGeorge Cherian {
290*c694b233SGeorge Cherian 	struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher);
291*c694b233SGeorge Cherian 	struct cvm_enc_ctx *ctx = crypto_tfm_ctx(tfm);
292*c694b233SGeorge Cherian 	int err;
293*c694b233SGeorge Cherian 	const u8 *key1 = key;
294*c694b233SGeorge Cherian 	const u8 *key2 = key + (keylen / 2);
295*c694b233SGeorge Cherian 
296*c694b233SGeorge Cherian 	err = xts_check_key(tfm, key, keylen);
297*c694b233SGeorge Cherian 	if (err)
298*c694b233SGeorge Cherian 		return err;
299*c694b233SGeorge Cherian 	ctx->key_len = keylen;
300*c694b233SGeorge Cherian 	memcpy(ctx->enc_key, key1, keylen / 2);
301*c694b233SGeorge Cherian 	memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2);
302*c694b233SGeorge Cherian 
303*c694b233SGeorge Cherian 	return 0;
304*c694b233SGeorge Cherian }
305*c694b233SGeorge Cherian 
306*c694b233SGeorge Cherian int cvm_enc_dec_setkey(struct crypto_ablkcipher *cipher, const u8 *key,
307*c694b233SGeorge Cherian 		       u32 keylen)
308*c694b233SGeorge Cherian {
309*c694b233SGeorge Cherian 	struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher);
310*c694b233SGeorge Cherian 	struct cvm_enc_ctx *ctx = crypto_tfm_ctx(tfm);
311*c694b233SGeorge Cherian 
312*c694b233SGeorge Cherian 	if ((keylen == 16) || (keylen == 24) || (keylen == 32)) {
313*c694b233SGeorge Cherian 		ctx->key_len = keylen;
314*c694b233SGeorge Cherian 		memcpy(ctx->enc_key, key, keylen);
315*c694b233SGeorge Cherian 		return 0;
316*c694b233SGeorge Cherian 	}
317*c694b233SGeorge Cherian 	crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN);
318*c694b233SGeorge Cherian 
319*c694b233SGeorge Cherian 	return -EINVAL;
320*c694b233SGeorge Cherian }
321*c694b233SGeorge Cherian 
322*c694b233SGeorge Cherian int cvm_enc_dec_init(struct crypto_tfm *tfm)
323*c694b233SGeorge Cherian {
324*c694b233SGeorge Cherian 	struct cvm_enc_ctx *ctx = crypto_tfm_ctx(tfm);
325*c694b233SGeorge Cherian 
326*c694b233SGeorge Cherian 	memset(ctx, 0, sizeof(*ctx));
327*c694b233SGeorge Cherian 	tfm->crt_ablkcipher.reqsize = sizeof(struct cvm_req_ctx) +
328*c694b233SGeorge Cherian 					sizeof(struct ablkcipher_request);
329*c694b233SGeorge Cherian 	/* Additional memory for ablkcipher_request is
330*c694b233SGeorge Cherian 	 * allocated since the cryptd daemon uses
331*c694b233SGeorge Cherian 	 * this memory for request_ctx information
332*c694b233SGeorge Cherian 	 */
333*c694b233SGeorge Cherian 
334*c694b233SGeorge Cherian 	return 0;
335*c694b233SGeorge Cherian }
336*c694b233SGeorge Cherian 
337*c694b233SGeorge Cherian struct crypto_alg algs[] = { {
338*c694b233SGeorge Cherian 	.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
339*c694b233SGeorge Cherian 	.cra_blocksize = AES_BLOCK_SIZE,
340*c694b233SGeorge Cherian 	.cra_ctxsize = sizeof(struct cvm_enc_ctx),
341*c694b233SGeorge Cherian 	.cra_alignmask = 7,
342*c694b233SGeorge Cherian 	.cra_priority = 4001,
343*c694b233SGeorge Cherian 	.cra_name = "xts(aes)",
344*c694b233SGeorge Cherian 	.cra_driver_name = "cavium-xts-aes",
345*c694b233SGeorge Cherian 	.cra_type = &crypto_ablkcipher_type,
346*c694b233SGeorge Cherian 	.cra_u = {
347*c694b233SGeorge Cherian 		.ablkcipher = {
348*c694b233SGeorge Cherian 			.ivsize = AES_BLOCK_SIZE,
349*c694b233SGeorge Cherian 			.min_keysize = 2 * AES_MIN_KEY_SIZE,
350*c694b233SGeorge Cherian 			.max_keysize = 2 * AES_MAX_KEY_SIZE,
351*c694b233SGeorge Cherian 			.setkey = cvm_xts_setkey,
352*c694b233SGeorge Cherian 			.encrypt = cvm_aes_encrypt_xts,
353*c694b233SGeorge Cherian 			.decrypt = cvm_aes_decrypt_xts,
354*c694b233SGeorge Cherian 		},
355*c694b233SGeorge Cherian 	},
356*c694b233SGeorge Cherian 	.cra_init = cvm_enc_dec_init,
357*c694b233SGeorge Cherian 	.cra_module = THIS_MODULE,
358*c694b233SGeorge Cherian }, {
359*c694b233SGeorge Cherian 	.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
360*c694b233SGeorge Cherian 	.cra_blocksize = AES_BLOCK_SIZE,
361*c694b233SGeorge Cherian 	.cra_ctxsize = sizeof(struct cvm_enc_ctx),
362*c694b233SGeorge Cherian 	.cra_alignmask = 7,
363*c694b233SGeorge Cherian 	.cra_priority = 4001,
364*c694b233SGeorge Cherian 	.cra_name = "cbc(aes)",
365*c694b233SGeorge Cherian 	.cra_driver_name = "cavium-cbc-aes",
366*c694b233SGeorge Cherian 	.cra_type = &crypto_ablkcipher_type,
367*c694b233SGeorge Cherian 	.cra_u = {
368*c694b233SGeorge Cherian 		.ablkcipher = {
369*c694b233SGeorge Cherian 			.ivsize = AES_BLOCK_SIZE,
370*c694b233SGeorge Cherian 			.min_keysize = AES_MIN_KEY_SIZE,
371*c694b233SGeorge Cherian 			.max_keysize = AES_MAX_KEY_SIZE,
372*c694b233SGeorge Cherian 			.setkey = cvm_enc_dec_setkey,
373*c694b233SGeorge Cherian 			.encrypt = cvm_aes_encrypt_cbc,
374*c694b233SGeorge Cherian 			.decrypt = cvm_aes_decrypt_cbc,
375*c694b233SGeorge Cherian 		},
376*c694b233SGeorge Cherian 	},
377*c694b233SGeorge Cherian 	.cra_init = cvm_enc_dec_init,
378*c694b233SGeorge Cherian 	.cra_module = THIS_MODULE,
379*c694b233SGeorge Cherian }, {
380*c694b233SGeorge Cherian 	.cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC,
381*c694b233SGeorge Cherian 	.cra_blocksize = DES3_EDE_BLOCK_SIZE,
382*c694b233SGeorge Cherian 	.cra_ctxsize = sizeof(struct cvm_des3_ctx),
383*c694b233SGeorge Cherian 	.cra_alignmask = 7,
384*c694b233SGeorge Cherian 	.cra_priority = 4001,
385*c694b233SGeorge Cherian 	.cra_name = "cbc(des3_ede)",
386*c694b233SGeorge Cherian 	.cra_driver_name = "cavium-cbc-des3_ede",
387*c694b233SGeorge Cherian 	.cra_type = &crypto_ablkcipher_type,
388*c694b233SGeorge Cherian 	.cra_u = {
389*c694b233SGeorge Cherian 		.ablkcipher = {
390*c694b233SGeorge Cherian 			.min_keysize = DES3_EDE_KEY_SIZE,
391*c694b233SGeorge Cherian 			.max_keysize = DES3_EDE_KEY_SIZE,
392*c694b233SGeorge Cherian 			.ivsize = DES_BLOCK_SIZE,
393*c694b233SGeorge Cherian 			.setkey = cvm_enc_dec_setkey,
394*c694b233SGeorge Cherian 			.encrypt = cvm_des3_encrypt_cbc,
395*c694b233SGeorge Cherian 			.decrypt = cvm_des3_decrypt_cbc,
396*c694b233SGeorge Cherian 		},
397*c694b233SGeorge Cherian 	},
398*c694b233SGeorge Cherian 	.cra_init = cvm_enc_dec_init,
399*c694b233SGeorge Cherian 	.cra_module = THIS_MODULE,
400*c694b233SGeorge Cherian } };
401*c694b233SGeorge Cherian 
402*c694b233SGeorge Cherian static inline int cav_register_algs(void)
403*c694b233SGeorge Cherian {
404*c694b233SGeorge Cherian 	int err = 0;
405*c694b233SGeorge Cherian 
406*c694b233SGeorge Cherian 	err = crypto_register_algs(algs, ARRAY_SIZE(algs));
407*c694b233SGeorge Cherian 	if (err)
408*c694b233SGeorge Cherian 		return err;
409*c694b233SGeorge Cherian 
410*c694b233SGeorge Cherian 	return 0;
411*c694b233SGeorge Cherian }
412*c694b233SGeorge Cherian 
413*c694b233SGeorge Cherian static inline void cav_unregister_algs(void)
414*c694b233SGeorge Cherian {
415*c694b233SGeorge Cherian 	crypto_unregister_algs(algs, ARRAY_SIZE(algs));
416*c694b233SGeorge Cherian }
417*c694b233SGeorge Cherian 
418*c694b233SGeorge Cherian int cvm_crypto_init(struct cpt_vf *cptvf)
419*c694b233SGeorge Cherian {
420*c694b233SGeorge Cherian 	struct pci_dev *pdev = cptvf->pdev;
421*c694b233SGeorge Cherian 	u32 dev_count;
422*c694b233SGeorge Cherian 
423*c694b233SGeorge Cherian 	dev_count = dev_handle.dev_count;
424*c694b233SGeorge Cherian 	dev_handle.cdev[dev_count] = cptvf;
425*c694b233SGeorge Cherian 	dev_handle.dev_count++;
426*c694b233SGeorge Cherian 
427*c694b233SGeorge Cherian 	if (dev_count == 3) {
428*c694b233SGeorge Cherian 		if (cav_register_algs()) {
429*c694b233SGeorge Cherian 			dev_err(&pdev->dev, "Error in registering crypto algorithms\n");
430*c694b233SGeorge Cherian 			return -EINVAL;
431*c694b233SGeorge Cherian 		}
432*c694b233SGeorge Cherian 	}
433*c694b233SGeorge Cherian 
434*c694b233SGeorge Cherian 	return 0;
435*c694b233SGeorge Cherian }
436*c694b233SGeorge Cherian 
437*c694b233SGeorge Cherian void cvm_crypto_exit(void)
438*c694b233SGeorge Cherian {
439*c694b233SGeorge Cherian 	u32 dev_count;
440*c694b233SGeorge Cherian 
441*c694b233SGeorge Cherian 	dev_count = --dev_handle.dev_count;
442*c694b233SGeorge Cherian 	if (!dev_count)
443*c694b233SGeorge Cherian 		cav_unregister_algs();
444*c694b233SGeorge Cherian }
445