1*c694b233SGeorge Cherian 2*c694b233SGeorge Cherian /* 3*c694b233SGeorge Cherian * Copyright (C) 2016 Cavium, Inc. 4*c694b233SGeorge Cherian * 5*c694b233SGeorge Cherian * This program is free software; you can redistribute it and/or modify it 6*c694b233SGeorge Cherian * under the terms of version 2 of the GNU General Public License 7*c694b233SGeorge Cherian * as published by the Free Software Foundation. 8*c694b233SGeorge Cherian */ 9*c694b233SGeorge Cherian 10*c694b233SGeorge Cherian #include <crypto/aes.h> 11*c694b233SGeorge Cherian #include <crypto/algapi.h> 12*c694b233SGeorge Cherian #include <crypto/authenc.h> 13*c694b233SGeorge Cherian #include <crypto/cryptd.h> 14*c694b233SGeorge Cherian #include <crypto/crypto_wq.h> 15*c694b233SGeorge Cherian #include <crypto/des.h> 16*c694b233SGeorge Cherian #include <crypto/xts.h> 17*c694b233SGeorge Cherian #include <linux/crypto.h> 18*c694b233SGeorge Cherian #include <linux/err.h> 19*c694b233SGeorge Cherian #include <linux/list.h> 20*c694b233SGeorge Cherian #include <linux/scatterlist.h> 21*c694b233SGeorge Cherian 22*c694b233SGeorge Cherian #include "cptvf.h" 23*c694b233SGeorge Cherian #include "cptvf_algs.h" 24*c694b233SGeorge Cherian 25*c694b233SGeorge Cherian struct cpt_device_handle { 26*c694b233SGeorge Cherian void *cdev[MAX_DEVICES]; 27*c694b233SGeorge Cherian u32 dev_count; 28*c694b233SGeorge Cherian }; 29*c694b233SGeorge Cherian 30*c694b233SGeorge Cherian static struct cpt_device_handle dev_handle; 31*c694b233SGeorge Cherian 32*c694b233SGeorge Cherian static void cvm_callback(u32 status, void *arg) 33*c694b233SGeorge Cherian { 34*c694b233SGeorge Cherian struct crypto_async_request *req = (struct crypto_async_request *)arg; 35*c694b233SGeorge Cherian 36*c694b233SGeorge Cherian req->complete(req, !status); 37*c694b233SGeorge Cherian } 38*c694b233SGeorge Cherian 39*c694b233SGeorge Cherian static inline void update_input_iv(struct cpt_request_info *req_info, 40*c694b233SGeorge Cherian u8 *iv, u32 enc_iv_len, 41*c694b233SGeorge Cherian u32 *argcnt) 42*c694b233SGeorge Cherian { 43*c694b233SGeorge Cherian /* Setting the iv information */ 44*c694b233SGeorge Cherian req_info->in[*argcnt].vptr = (void *)iv; 45*c694b233SGeorge Cherian req_info->in[*argcnt].size = enc_iv_len; 46*c694b233SGeorge Cherian req_info->req.dlen += enc_iv_len; 47*c694b233SGeorge Cherian 48*c694b233SGeorge Cherian ++(*argcnt); 49*c694b233SGeorge Cherian } 50*c694b233SGeorge Cherian 51*c694b233SGeorge Cherian static inline void update_output_iv(struct cpt_request_info *req_info, 52*c694b233SGeorge Cherian u8 *iv, u32 enc_iv_len, 53*c694b233SGeorge Cherian u32 *argcnt) 54*c694b233SGeorge Cherian { 55*c694b233SGeorge Cherian /* Setting the iv information */ 56*c694b233SGeorge Cherian req_info->out[*argcnt].vptr = (void *)iv; 57*c694b233SGeorge Cherian req_info->out[*argcnt].size = enc_iv_len; 58*c694b233SGeorge Cherian req_info->rlen += enc_iv_len; 59*c694b233SGeorge Cherian 60*c694b233SGeorge Cherian ++(*argcnt); 61*c694b233SGeorge Cherian } 62*c694b233SGeorge Cherian 63*c694b233SGeorge Cherian static inline void update_input_data(struct cpt_request_info *req_info, 64*c694b233SGeorge Cherian struct scatterlist *inp_sg, 65*c694b233SGeorge Cherian u32 nbytes, u32 *argcnt) 66*c694b233SGeorge Cherian { 67*c694b233SGeorge Cherian req_info->req.dlen += nbytes; 68*c694b233SGeorge Cherian 69*c694b233SGeorge Cherian while (nbytes) { 70*c694b233SGeorge Cherian u32 len = min(nbytes, inp_sg->length); 71*c694b233SGeorge Cherian u8 *ptr = sg_virt(inp_sg); 72*c694b233SGeorge Cherian 73*c694b233SGeorge Cherian req_info->in[*argcnt].vptr = (void *)ptr; 74*c694b233SGeorge Cherian req_info->in[*argcnt].size = len; 75*c694b233SGeorge Cherian nbytes -= len; 76*c694b233SGeorge Cherian 77*c694b233SGeorge Cherian ++(*argcnt); 78*c694b233SGeorge Cherian ++inp_sg; 79*c694b233SGeorge Cherian } 80*c694b233SGeorge Cherian } 81*c694b233SGeorge Cherian 82*c694b233SGeorge Cherian static inline void update_output_data(struct cpt_request_info *req_info, 83*c694b233SGeorge Cherian struct scatterlist *outp_sg, 84*c694b233SGeorge Cherian u32 nbytes, u32 *argcnt) 85*c694b233SGeorge Cherian { 86*c694b233SGeorge Cherian req_info->rlen += nbytes; 87*c694b233SGeorge Cherian 88*c694b233SGeorge Cherian while (nbytes) { 89*c694b233SGeorge Cherian u32 len = min(nbytes, outp_sg->length); 90*c694b233SGeorge Cherian u8 *ptr = sg_virt(outp_sg); 91*c694b233SGeorge Cherian 92*c694b233SGeorge Cherian req_info->out[*argcnt].vptr = (void *)ptr; 93*c694b233SGeorge Cherian req_info->out[*argcnt].size = len; 94*c694b233SGeorge Cherian nbytes -= len; 95*c694b233SGeorge Cherian ++(*argcnt); 96*c694b233SGeorge Cherian ++outp_sg; 97*c694b233SGeorge Cherian } 98*c694b233SGeorge Cherian } 99*c694b233SGeorge Cherian 100*c694b233SGeorge Cherian static inline u32 create_ctx_hdr(struct ablkcipher_request *req, u32 enc, 101*c694b233SGeorge Cherian u32 cipher_type, u32 aes_key_type, 102*c694b233SGeorge Cherian u32 *argcnt) 103*c694b233SGeorge Cherian { 104*c694b233SGeorge Cherian struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(req); 105*c694b233SGeorge Cherian struct cvm_enc_ctx *ctx = crypto_ablkcipher_ctx(tfm); 106*c694b233SGeorge Cherian struct cvm_req_ctx *rctx = ablkcipher_request_ctx(req); 107*c694b233SGeorge Cherian struct fc_context *fctx = &rctx->fctx; 108*c694b233SGeorge Cherian u64 *offset_control = &rctx->control_word; 109*c694b233SGeorge Cherian u32 enc_iv_len = crypto_ablkcipher_ivsize(tfm); 110*c694b233SGeorge Cherian struct cpt_request_info *req_info = &rctx->cpt_req; 111*c694b233SGeorge Cherian u64 *ctrl_flags = NULL; 112*c694b233SGeorge Cherian 113*c694b233SGeorge Cherian req_info->ctrl.s.grp = 0; 114*c694b233SGeorge Cherian req_info->ctrl.s.dma_mode = DMA_GATHER_SCATTER; 115*c694b233SGeorge Cherian req_info->ctrl.s.se_req = SE_CORE_REQ; 116*c694b233SGeorge Cherian 117*c694b233SGeorge Cherian req_info->req.opcode.s.major = MAJOR_OP_FC | 118*c694b233SGeorge Cherian DMA_MODE_FLAG(DMA_GATHER_SCATTER); 119*c694b233SGeorge Cherian if (enc) 120*c694b233SGeorge Cherian req_info->req.opcode.s.minor = 2; 121*c694b233SGeorge Cherian else 122*c694b233SGeorge Cherian req_info->req.opcode.s.minor = 3; 123*c694b233SGeorge Cherian 124*c694b233SGeorge Cherian req_info->req.param1 = req->nbytes; /* Encryption Data length */ 125*c694b233SGeorge Cherian req_info->req.param2 = 0; /*Auth data length */ 126*c694b233SGeorge Cherian 127*c694b233SGeorge Cherian fctx->enc.enc_ctrl.e.enc_cipher = cipher_type; 128*c694b233SGeorge Cherian fctx->enc.enc_ctrl.e.aes_key = aes_key_type; 129*c694b233SGeorge Cherian fctx->enc.enc_ctrl.e.iv_source = FROM_DPTR; 130*c694b233SGeorge Cherian 131*c694b233SGeorge Cherian if (cipher_type == AES_XTS) 132*c694b233SGeorge Cherian memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len * 2); 133*c694b233SGeorge Cherian else 134*c694b233SGeorge Cherian memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len); 135*c694b233SGeorge Cherian ctrl_flags = (u64 *)&fctx->enc.enc_ctrl.flags; 136*c694b233SGeorge Cherian *ctrl_flags = cpu_to_be64(*ctrl_flags); 137*c694b233SGeorge Cherian 138*c694b233SGeorge Cherian *offset_control = cpu_to_be64(((u64)(enc_iv_len) << 16)); 139*c694b233SGeorge Cherian /* Storing Packet Data Information in offset 140*c694b233SGeorge Cherian * Control Word First 8 bytes 141*c694b233SGeorge Cherian */ 142*c694b233SGeorge Cherian req_info->in[*argcnt].vptr = (u8 *)offset_control; 143*c694b233SGeorge Cherian req_info->in[*argcnt].size = CONTROL_WORD_LEN; 144*c694b233SGeorge Cherian req_info->req.dlen += CONTROL_WORD_LEN; 145*c694b233SGeorge Cherian ++(*argcnt); 146*c694b233SGeorge Cherian 147*c694b233SGeorge Cherian req_info->in[*argcnt].vptr = (u8 *)fctx; 148*c694b233SGeorge Cherian req_info->in[*argcnt].size = sizeof(struct fc_context); 149*c694b233SGeorge Cherian req_info->req.dlen += sizeof(struct fc_context); 150*c694b233SGeorge Cherian 151*c694b233SGeorge Cherian ++(*argcnt); 152*c694b233SGeorge Cherian 153*c694b233SGeorge Cherian return 0; 154*c694b233SGeorge Cherian } 155*c694b233SGeorge Cherian 156*c694b233SGeorge Cherian static inline u32 create_input_list(struct ablkcipher_request *req, u32 enc, 157*c694b233SGeorge Cherian u32 cipher_type, u32 aes_key_type, 158*c694b233SGeorge Cherian u32 enc_iv_len) 159*c694b233SGeorge Cherian { 160*c694b233SGeorge Cherian struct cvm_req_ctx *rctx = ablkcipher_request_ctx(req); 161*c694b233SGeorge Cherian struct cpt_request_info *req_info = &rctx->cpt_req; 162*c694b233SGeorge Cherian u32 argcnt = 0; 163*c694b233SGeorge Cherian 164*c694b233SGeorge Cherian create_ctx_hdr(req, enc, cipher_type, aes_key_type, &argcnt); 165*c694b233SGeorge Cherian update_input_iv(req_info, req->info, enc_iv_len, &argcnt); 166*c694b233SGeorge Cherian update_input_data(req_info, req->src, req->nbytes, &argcnt); 167*c694b233SGeorge Cherian req_info->incnt = argcnt; 168*c694b233SGeorge Cherian 169*c694b233SGeorge Cherian return 0; 170*c694b233SGeorge Cherian } 171*c694b233SGeorge Cherian 172*c694b233SGeorge Cherian static inline void store_cb_info(struct ablkcipher_request *req, 173*c694b233SGeorge Cherian struct cpt_request_info *req_info) 174*c694b233SGeorge Cherian { 175*c694b233SGeorge Cherian req_info->callback = (void *)cvm_callback; 176*c694b233SGeorge Cherian req_info->callback_arg = (void *)&req->base; 177*c694b233SGeorge Cherian } 178*c694b233SGeorge Cherian 179*c694b233SGeorge Cherian static inline void create_output_list(struct ablkcipher_request *req, 180*c694b233SGeorge Cherian u32 cipher_type, 181*c694b233SGeorge Cherian u32 enc_iv_len) 182*c694b233SGeorge Cherian { 183*c694b233SGeorge Cherian struct cvm_req_ctx *rctx = ablkcipher_request_ctx(req); 184*c694b233SGeorge Cherian struct cpt_request_info *req_info = &rctx->cpt_req; 185*c694b233SGeorge Cherian u32 argcnt = 0; 186*c694b233SGeorge Cherian 187*c694b233SGeorge Cherian /* OUTPUT Buffer Processing 188*c694b233SGeorge Cherian * AES encryption/decryption output would be 189*c694b233SGeorge Cherian * received in the following format 190*c694b233SGeorge Cherian * 191*c694b233SGeorge Cherian * ------IV--------|------ENCRYPTED/DECRYPTED DATA-----| 192*c694b233SGeorge Cherian * [ 16 Bytes/ [ Request Enc/Dec/ DATA Len AES CBC ] 193*c694b233SGeorge Cherian */ 194*c694b233SGeorge Cherian /* Reading IV information */ 195*c694b233SGeorge Cherian update_output_iv(req_info, req->info, enc_iv_len, &argcnt); 196*c694b233SGeorge Cherian update_output_data(req_info, req->dst, req->nbytes, &argcnt); 197*c694b233SGeorge Cherian req_info->outcnt = argcnt; 198*c694b233SGeorge Cherian } 199*c694b233SGeorge Cherian 200*c694b233SGeorge Cherian static inline int cvm_enc_dec(struct ablkcipher_request *req, u32 enc, 201*c694b233SGeorge Cherian u32 cipher_type) 202*c694b233SGeorge Cherian { 203*c694b233SGeorge Cherian struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(req); 204*c694b233SGeorge Cherian struct cvm_enc_ctx *ctx = crypto_ablkcipher_ctx(tfm); 205*c694b233SGeorge Cherian u32 key_type = AES_128_BIT; 206*c694b233SGeorge Cherian struct cvm_req_ctx *rctx = ablkcipher_request_ctx(req); 207*c694b233SGeorge Cherian u32 enc_iv_len = crypto_ablkcipher_ivsize(tfm); 208*c694b233SGeorge Cherian struct fc_context *fctx = &rctx->fctx; 209*c694b233SGeorge Cherian struct cpt_request_info *req_info = &rctx->cpt_req; 210*c694b233SGeorge Cherian void *cdev = NULL; 211*c694b233SGeorge Cherian int status; 212*c694b233SGeorge Cherian 213*c694b233SGeorge Cherian switch (ctx->key_len) { 214*c694b233SGeorge Cherian case 16: 215*c694b233SGeorge Cherian key_type = AES_128_BIT; 216*c694b233SGeorge Cherian break; 217*c694b233SGeorge Cherian case 24: 218*c694b233SGeorge Cherian key_type = AES_192_BIT; 219*c694b233SGeorge Cherian break; 220*c694b233SGeorge Cherian case 32: 221*c694b233SGeorge Cherian if (cipher_type == AES_XTS) 222*c694b233SGeorge Cherian key_type = AES_128_BIT; 223*c694b233SGeorge Cherian else 224*c694b233SGeorge Cherian key_type = AES_256_BIT; 225*c694b233SGeorge Cherian break; 226*c694b233SGeorge Cherian case 64: 227*c694b233SGeorge Cherian if (cipher_type == AES_XTS) 228*c694b233SGeorge Cherian key_type = AES_256_BIT; 229*c694b233SGeorge Cherian else 230*c694b233SGeorge Cherian return -EINVAL; 231*c694b233SGeorge Cherian break; 232*c694b233SGeorge Cherian default: 233*c694b233SGeorge Cherian return -EINVAL; 234*c694b233SGeorge Cherian } 235*c694b233SGeorge Cherian 236*c694b233SGeorge Cherian if (cipher_type == DES3_CBC) 237*c694b233SGeorge Cherian key_type = 0; 238*c694b233SGeorge Cherian 239*c694b233SGeorge Cherian memset(req_info, 0, sizeof(struct cpt_request_info)); 240*c694b233SGeorge Cherian memset(fctx, 0, sizeof(struct fc_context)); 241*c694b233SGeorge Cherian create_input_list(req, enc, cipher_type, key_type, enc_iv_len); 242*c694b233SGeorge Cherian create_output_list(req, cipher_type, enc_iv_len); 243*c694b233SGeorge Cherian store_cb_info(req, req_info); 244*c694b233SGeorge Cherian cdev = dev_handle.cdev[smp_processor_id()]; 245*c694b233SGeorge Cherian status = cptvf_do_request(cdev, req_info); 246*c694b233SGeorge Cherian /* We perform an asynchronous send and once 247*c694b233SGeorge Cherian * the request is completed the driver would 248*c694b233SGeorge Cherian * intimate through registered call back functions 249*c694b233SGeorge Cherian */ 250*c694b233SGeorge Cherian 251*c694b233SGeorge Cherian if (status) 252*c694b233SGeorge Cherian return status; 253*c694b233SGeorge Cherian else 254*c694b233SGeorge Cherian return -EINPROGRESS; 255*c694b233SGeorge Cherian } 256*c694b233SGeorge Cherian 257*c694b233SGeorge Cherian int cvm_des3_encrypt_cbc(struct ablkcipher_request *req) 258*c694b233SGeorge Cherian { 259*c694b233SGeorge Cherian return cvm_enc_dec(req, true, DES3_CBC); 260*c694b233SGeorge Cherian } 261*c694b233SGeorge Cherian 262*c694b233SGeorge Cherian int cvm_des3_decrypt_cbc(struct ablkcipher_request *req) 263*c694b233SGeorge Cherian { 264*c694b233SGeorge Cherian return cvm_enc_dec(req, false, DES3_CBC); 265*c694b233SGeorge Cherian } 266*c694b233SGeorge Cherian 267*c694b233SGeorge Cherian int cvm_aes_encrypt_xts(struct ablkcipher_request *req) 268*c694b233SGeorge Cherian { 269*c694b233SGeorge Cherian return cvm_enc_dec(req, true, AES_XTS); 270*c694b233SGeorge Cherian } 271*c694b233SGeorge Cherian 272*c694b233SGeorge Cherian int cvm_aes_decrypt_xts(struct ablkcipher_request *req) 273*c694b233SGeorge Cherian { 274*c694b233SGeorge Cherian return cvm_enc_dec(req, false, AES_XTS); 275*c694b233SGeorge Cherian } 276*c694b233SGeorge Cherian 277*c694b233SGeorge Cherian int cvm_aes_encrypt_cbc(struct ablkcipher_request *req) 278*c694b233SGeorge Cherian { 279*c694b233SGeorge Cherian return cvm_enc_dec(req, true, AES_CBC); 280*c694b233SGeorge Cherian } 281*c694b233SGeorge Cherian 282*c694b233SGeorge Cherian int cvm_aes_decrypt_cbc(struct ablkcipher_request *req) 283*c694b233SGeorge Cherian { 284*c694b233SGeorge Cherian return cvm_enc_dec(req, false, AES_CBC); 285*c694b233SGeorge Cherian } 286*c694b233SGeorge Cherian 287*c694b233SGeorge Cherian int cvm_xts_setkey(struct crypto_ablkcipher *cipher, const u8 *key, 288*c694b233SGeorge Cherian u32 keylen) 289*c694b233SGeorge Cherian { 290*c694b233SGeorge Cherian struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); 291*c694b233SGeorge Cherian struct cvm_enc_ctx *ctx = crypto_tfm_ctx(tfm); 292*c694b233SGeorge Cherian int err; 293*c694b233SGeorge Cherian const u8 *key1 = key; 294*c694b233SGeorge Cherian const u8 *key2 = key + (keylen / 2); 295*c694b233SGeorge Cherian 296*c694b233SGeorge Cherian err = xts_check_key(tfm, key, keylen); 297*c694b233SGeorge Cherian if (err) 298*c694b233SGeorge Cherian return err; 299*c694b233SGeorge Cherian ctx->key_len = keylen; 300*c694b233SGeorge Cherian memcpy(ctx->enc_key, key1, keylen / 2); 301*c694b233SGeorge Cherian memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); 302*c694b233SGeorge Cherian 303*c694b233SGeorge Cherian return 0; 304*c694b233SGeorge Cherian } 305*c694b233SGeorge Cherian 306*c694b233SGeorge Cherian int cvm_enc_dec_setkey(struct crypto_ablkcipher *cipher, const u8 *key, 307*c694b233SGeorge Cherian u32 keylen) 308*c694b233SGeorge Cherian { 309*c694b233SGeorge Cherian struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); 310*c694b233SGeorge Cherian struct cvm_enc_ctx *ctx = crypto_tfm_ctx(tfm); 311*c694b233SGeorge Cherian 312*c694b233SGeorge Cherian if ((keylen == 16) || (keylen == 24) || (keylen == 32)) { 313*c694b233SGeorge Cherian ctx->key_len = keylen; 314*c694b233SGeorge Cherian memcpy(ctx->enc_key, key, keylen); 315*c694b233SGeorge Cherian return 0; 316*c694b233SGeorge Cherian } 317*c694b233SGeorge Cherian crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); 318*c694b233SGeorge Cherian 319*c694b233SGeorge Cherian return -EINVAL; 320*c694b233SGeorge Cherian } 321*c694b233SGeorge Cherian 322*c694b233SGeorge Cherian int cvm_enc_dec_init(struct crypto_tfm *tfm) 323*c694b233SGeorge Cherian { 324*c694b233SGeorge Cherian struct cvm_enc_ctx *ctx = crypto_tfm_ctx(tfm); 325*c694b233SGeorge Cherian 326*c694b233SGeorge Cherian memset(ctx, 0, sizeof(*ctx)); 327*c694b233SGeorge Cherian tfm->crt_ablkcipher.reqsize = sizeof(struct cvm_req_ctx) + 328*c694b233SGeorge Cherian sizeof(struct ablkcipher_request); 329*c694b233SGeorge Cherian /* Additional memory for ablkcipher_request is 330*c694b233SGeorge Cherian * allocated since the cryptd daemon uses 331*c694b233SGeorge Cherian * this memory for request_ctx information 332*c694b233SGeorge Cherian */ 333*c694b233SGeorge Cherian 334*c694b233SGeorge Cherian return 0; 335*c694b233SGeorge Cherian } 336*c694b233SGeorge Cherian 337*c694b233SGeorge Cherian struct crypto_alg algs[] = { { 338*c694b233SGeorge Cherian .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, 339*c694b233SGeorge Cherian .cra_blocksize = AES_BLOCK_SIZE, 340*c694b233SGeorge Cherian .cra_ctxsize = sizeof(struct cvm_enc_ctx), 341*c694b233SGeorge Cherian .cra_alignmask = 7, 342*c694b233SGeorge Cherian .cra_priority = 4001, 343*c694b233SGeorge Cherian .cra_name = "xts(aes)", 344*c694b233SGeorge Cherian .cra_driver_name = "cavium-xts-aes", 345*c694b233SGeorge Cherian .cra_type = &crypto_ablkcipher_type, 346*c694b233SGeorge Cherian .cra_u = { 347*c694b233SGeorge Cherian .ablkcipher = { 348*c694b233SGeorge Cherian .ivsize = AES_BLOCK_SIZE, 349*c694b233SGeorge Cherian .min_keysize = 2 * AES_MIN_KEY_SIZE, 350*c694b233SGeorge Cherian .max_keysize = 2 * AES_MAX_KEY_SIZE, 351*c694b233SGeorge Cherian .setkey = cvm_xts_setkey, 352*c694b233SGeorge Cherian .encrypt = cvm_aes_encrypt_xts, 353*c694b233SGeorge Cherian .decrypt = cvm_aes_decrypt_xts, 354*c694b233SGeorge Cherian }, 355*c694b233SGeorge Cherian }, 356*c694b233SGeorge Cherian .cra_init = cvm_enc_dec_init, 357*c694b233SGeorge Cherian .cra_module = THIS_MODULE, 358*c694b233SGeorge Cherian }, { 359*c694b233SGeorge Cherian .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, 360*c694b233SGeorge Cherian .cra_blocksize = AES_BLOCK_SIZE, 361*c694b233SGeorge Cherian .cra_ctxsize = sizeof(struct cvm_enc_ctx), 362*c694b233SGeorge Cherian .cra_alignmask = 7, 363*c694b233SGeorge Cherian .cra_priority = 4001, 364*c694b233SGeorge Cherian .cra_name = "cbc(aes)", 365*c694b233SGeorge Cherian .cra_driver_name = "cavium-cbc-aes", 366*c694b233SGeorge Cherian .cra_type = &crypto_ablkcipher_type, 367*c694b233SGeorge Cherian .cra_u = { 368*c694b233SGeorge Cherian .ablkcipher = { 369*c694b233SGeorge Cherian .ivsize = AES_BLOCK_SIZE, 370*c694b233SGeorge Cherian .min_keysize = AES_MIN_KEY_SIZE, 371*c694b233SGeorge Cherian .max_keysize = AES_MAX_KEY_SIZE, 372*c694b233SGeorge Cherian .setkey = cvm_enc_dec_setkey, 373*c694b233SGeorge Cherian .encrypt = cvm_aes_encrypt_cbc, 374*c694b233SGeorge Cherian .decrypt = cvm_aes_decrypt_cbc, 375*c694b233SGeorge Cherian }, 376*c694b233SGeorge Cherian }, 377*c694b233SGeorge Cherian .cra_init = cvm_enc_dec_init, 378*c694b233SGeorge Cherian .cra_module = THIS_MODULE, 379*c694b233SGeorge Cherian }, { 380*c694b233SGeorge Cherian .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER | CRYPTO_ALG_ASYNC, 381*c694b233SGeorge Cherian .cra_blocksize = DES3_EDE_BLOCK_SIZE, 382*c694b233SGeorge Cherian .cra_ctxsize = sizeof(struct cvm_des3_ctx), 383*c694b233SGeorge Cherian .cra_alignmask = 7, 384*c694b233SGeorge Cherian .cra_priority = 4001, 385*c694b233SGeorge Cherian .cra_name = "cbc(des3_ede)", 386*c694b233SGeorge Cherian .cra_driver_name = "cavium-cbc-des3_ede", 387*c694b233SGeorge Cherian .cra_type = &crypto_ablkcipher_type, 388*c694b233SGeorge Cherian .cra_u = { 389*c694b233SGeorge Cherian .ablkcipher = { 390*c694b233SGeorge Cherian .min_keysize = DES3_EDE_KEY_SIZE, 391*c694b233SGeorge Cherian .max_keysize = DES3_EDE_KEY_SIZE, 392*c694b233SGeorge Cherian .ivsize = DES_BLOCK_SIZE, 393*c694b233SGeorge Cherian .setkey = cvm_enc_dec_setkey, 394*c694b233SGeorge Cherian .encrypt = cvm_des3_encrypt_cbc, 395*c694b233SGeorge Cherian .decrypt = cvm_des3_decrypt_cbc, 396*c694b233SGeorge Cherian }, 397*c694b233SGeorge Cherian }, 398*c694b233SGeorge Cherian .cra_init = cvm_enc_dec_init, 399*c694b233SGeorge Cherian .cra_module = THIS_MODULE, 400*c694b233SGeorge Cherian } }; 401*c694b233SGeorge Cherian 402*c694b233SGeorge Cherian static inline int cav_register_algs(void) 403*c694b233SGeorge Cherian { 404*c694b233SGeorge Cherian int err = 0; 405*c694b233SGeorge Cherian 406*c694b233SGeorge Cherian err = crypto_register_algs(algs, ARRAY_SIZE(algs)); 407*c694b233SGeorge Cherian if (err) 408*c694b233SGeorge Cherian return err; 409*c694b233SGeorge Cherian 410*c694b233SGeorge Cherian return 0; 411*c694b233SGeorge Cherian } 412*c694b233SGeorge Cherian 413*c694b233SGeorge Cherian static inline void cav_unregister_algs(void) 414*c694b233SGeorge Cherian { 415*c694b233SGeorge Cherian crypto_unregister_algs(algs, ARRAY_SIZE(algs)); 416*c694b233SGeorge Cherian } 417*c694b233SGeorge Cherian 418*c694b233SGeorge Cherian int cvm_crypto_init(struct cpt_vf *cptvf) 419*c694b233SGeorge Cherian { 420*c694b233SGeorge Cherian struct pci_dev *pdev = cptvf->pdev; 421*c694b233SGeorge Cherian u32 dev_count; 422*c694b233SGeorge Cherian 423*c694b233SGeorge Cherian dev_count = dev_handle.dev_count; 424*c694b233SGeorge Cherian dev_handle.cdev[dev_count] = cptvf; 425*c694b233SGeorge Cherian dev_handle.dev_count++; 426*c694b233SGeorge Cherian 427*c694b233SGeorge Cherian if (dev_count == 3) { 428*c694b233SGeorge Cherian if (cav_register_algs()) { 429*c694b233SGeorge Cherian dev_err(&pdev->dev, "Error in registering crypto algorithms\n"); 430*c694b233SGeorge Cherian return -EINVAL; 431*c694b233SGeorge Cherian } 432*c694b233SGeorge Cherian } 433*c694b233SGeorge Cherian 434*c694b233SGeorge Cherian return 0; 435*c694b233SGeorge Cherian } 436*c694b233SGeorge Cherian 437*c694b233SGeorge Cherian void cvm_crypto_exit(void) 438*c694b233SGeorge Cherian { 439*c694b233SGeorge Cherian u32 dev_count; 440*c694b233SGeorge Cherian 441*c694b233SGeorge Cherian dev_count = --dev_handle.dev_count; 442*c694b233SGeorge Cherian if (!dev_count) 443*c694b233SGeorge Cherian cav_unregister_algs(); 444*c694b233SGeorge Cherian } 445