xref: /openbmc/linux/drivers/crypto/caam/pdb.h (revision e0d07278)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 /*
3  * CAAM Protocol Data Block (PDB) definition header file
4  *
5  * Copyright 2008-2016 Freescale Semiconductor, Inc.
6  *
7  */
8 
9 #ifndef CAAM_PDB_H
10 #define CAAM_PDB_H
11 #include "compat.h"
12 
13 /*
14  * PDB- IPSec ESP Header Modification Options
15  */
16 #define PDBHMO_ESP_DECAP_SHIFT	28
17 #define PDBHMO_ESP_ENCAP_SHIFT	28
18 /*
19  * Encap and Decap - Decrement TTL (Hop Limit) - Based on the value of the
20  * Options Byte IP version (IPvsn) field:
21  * if IPv4, decrement the inner IP header TTL field (byte 8);
22  * if IPv6 decrement the inner IP header Hop Limit field (byte 7).
23 */
24 #define PDBHMO_ESP_DECAP_DEC_TTL	(0x02 << PDBHMO_ESP_DECAP_SHIFT)
25 #define PDBHMO_ESP_ENCAP_DEC_TTL	(0x02 << PDBHMO_ESP_ENCAP_SHIFT)
26 /*
27  * Decap - DiffServ Copy - Copy the IPv4 TOS or IPv6 Traffic Class byte
28  * from the outer IP header to the inner IP header.
29  */
30 #define PDBHMO_ESP_DIFFSERV		(0x01 << PDBHMO_ESP_DECAP_SHIFT)
31 /*
32  * Encap- Copy DF bit -if an IPv4 tunnel mode outer IP header is coming from
33  * the PDB, copy the DF bit from the inner IP header to the outer IP header.
34  */
35 #define PDBHMO_ESP_DFBIT		(0x04 << PDBHMO_ESP_ENCAP_SHIFT)
36 
37 #define PDBNH_ESP_ENCAP_SHIFT		16
38 #define PDBNH_ESP_ENCAP_MASK		(0xff << PDBNH_ESP_ENCAP_SHIFT)
39 
40 #define PDBHDRLEN_ESP_DECAP_SHIFT	16
41 #define PDBHDRLEN_MASK			(0x0fff << PDBHDRLEN_ESP_DECAP_SHIFT)
42 
43 #define PDB_NH_OFFSET_SHIFT		8
44 #define PDB_NH_OFFSET_MASK		(0xff << PDB_NH_OFFSET_SHIFT)
45 
46 /*
47  * PDB - IPSec ESP Encap/Decap Options
48  */
49 #define PDBOPTS_ESP_ARSNONE	0x00 /* no antireplay window */
50 #define PDBOPTS_ESP_ARS32	0x40 /* 32-entry antireplay window */
51 #define PDBOPTS_ESP_ARS128	0x80 /* 128-entry antireplay window */
52 #define PDBOPTS_ESP_ARS64	0xc0 /* 64-entry antireplay window */
53 #define PDBOPTS_ESP_ARS_MASK	0xc0 /* antireplay window mask */
54 #define PDBOPTS_ESP_IVSRC	0x20 /* IV comes from internal random gen */
55 #define PDBOPTS_ESP_ESN		0x10 /* extended sequence included */
56 #define PDBOPTS_ESP_OUTFMT	0x08 /* output only decapsulation (decap) */
57 #define PDBOPTS_ESP_IPHDRSRC	0x08 /* IP header comes from PDB (encap) */
58 #define PDBOPTS_ESP_INCIPHDR	0x04 /* Prepend IP header to output frame */
59 #define PDBOPTS_ESP_IPVSN	0x02 /* process IPv6 header */
60 #define PDBOPTS_ESP_AOFL	0x04 /* adjust out frame len (decap, SEC>=5.3)*/
61 #define PDBOPTS_ESP_TUNNEL	0x01 /* tunnel mode next-header byte */
62 #define PDBOPTS_ESP_IPV6	0x02 /* ip header version is V6 */
63 #define PDBOPTS_ESP_DIFFSERV	0x40 /* copy TOS/TC from inner iphdr */
64 #define PDBOPTS_ESP_UPDATE_CSUM 0x80 /* encap-update ip header checksum */
65 #define PDBOPTS_ESP_VERIFY_CSUM 0x20 /* decap-validate ip header checksum */
66 
67 /*
68  * General IPSec encap/decap PDB definitions
69  */
70 
71 /**
72  * ipsec_encap_cbc - PDB part for IPsec CBC encapsulation
73  * @iv: 16-byte array initialization vector
74  */
75 struct ipsec_encap_cbc {
76 	u8 iv[16];
77 };
78 
79 /**
80  * ipsec_encap_ctr - PDB part for IPsec CTR encapsulation
81  * @ctr_nonce: 4-byte array nonce
82  * @ctr_initial: initial count constant
83  * @iv: initialization vector
84  */
85 struct ipsec_encap_ctr {
86 	u8 ctr_nonce[4];
87 	u32 ctr_initial;
88 	u64 iv;
89 };
90 
91 /**
92  * ipsec_encap_ccm - PDB part for IPsec CCM encapsulation
93  * @salt: 3-byte array salt (lower 24 bits)
94  * @ccm_opt: CCM algorithm options - MSB-LSB description:
95  *  b0_flags (8b) - CCM B0; use 0x5B for 8-byte ICV, 0x6B for 12-byte ICV,
96  *    0x7B for 16-byte ICV (cf. RFC4309, RFC3610)
97  *  ctr_flags (8b) - counter flags; constant equal to 0x3
98  *  ctr_initial (16b) - initial count constant
99  * @iv: initialization vector
100  */
101 struct ipsec_encap_ccm {
102 	u8 salt[4];
103 	u32 ccm_opt;
104 	u64 iv;
105 };
106 
107 /**
108  * ipsec_encap_gcm - PDB part for IPsec GCM encapsulation
109  * @salt: 3-byte array salt (lower 24 bits)
110  * @rsvd: reserved, do not use
111  * @iv: initialization vector
112  */
113 struct ipsec_encap_gcm {
114 	u8 salt[4];
115 	u32 rsvd1;
116 	u64 iv;
117 };
118 
119 /**
120  * ipsec_encap_pdb - PDB for IPsec encapsulation
121  * @options: MSB-LSB description
122  *  hmo (header manipulation options) - 4b
123  *  reserved - 4b
124  *  next header - 8b
125  *  next header offset - 8b
126  *  option flags (depend on selected algorithm) - 8b
127  * @seq_num_ext_hi: (optional) IPsec Extended Sequence Number (ESN)
128  * @seq_num: IPsec sequence number
129  * @spi: IPsec SPI (Security Parameters Index)
130  * @ip_hdr_len: optional IP Header length (in bytes)
131  *  reserved - 16b
132  *  Opt. IP Hdr Len - 16b
133  * @ip_hdr: optional IP Header content
134  */
135 struct ipsec_encap_pdb {
136 	u32 options;
137 	u32 seq_num_ext_hi;
138 	u32 seq_num;
139 	union {
140 		struct ipsec_encap_cbc cbc;
141 		struct ipsec_encap_ctr ctr;
142 		struct ipsec_encap_ccm ccm;
143 		struct ipsec_encap_gcm gcm;
144 	};
145 	u32 spi;
146 	u32 ip_hdr_len;
147 	u32 ip_hdr[0];
148 };
149 
150 /**
151  * ipsec_decap_cbc - PDB part for IPsec CBC decapsulation
152  * @rsvd: reserved, do not use
153  */
154 struct ipsec_decap_cbc {
155 	u32 rsvd[2];
156 };
157 
158 /**
159  * ipsec_decap_ctr - PDB part for IPsec CTR decapsulation
160  * @ctr_nonce: 4-byte array nonce
161  * @ctr_initial: initial count constant
162  */
163 struct ipsec_decap_ctr {
164 	u8 ctr_nonce[4];
165 	u32 ctr_initial;
166 };
167 
168 /**
169  * ipsec_decap_ccm - PDB part for IPsec CCM decapsulation
170  * @salt: 3-byte salt (lower 24 bits)
171  * @ccm_opt: CCM algorithm options - MSB-LSB description:
172  *  b0_flags (8b) - CCM B0; use 0x5B for 8-byte ICV, 0x6B for 12-byte ICV,
173  *    0x7B for 16-byte ICV (cf. RFC4309, RFC3610)
174  *  ctr_flags (8b) - counter flags; constant equal to 0x3
175  *  ctr_initial (16b) - initial count constant
176  */
177 struct ipsec_decap_ccm {
178 	u8 salt[4];
179 	u32 ccm_opt;
180 };
181 
182 /**
183  * ipsec_decap_gcm - PDB part for IPsec GCN decapsulation
184  * @salt: 4-byte salt
185  * @rsvd: reserved, do not use
186  */
187 struct ipsec_decap_gcm {
188 	u8 salt[4];
189 	u32 resvd;
190 };
191 
192 /**
193  * ipsec_decap_pdb - PDB for IPsec decapsulation
194  * @options: MSB-LSB description
195  *  hmo (header manipulation options) - 4b
196  *  IP header length - 12b
197  *  next header offset - 8b
198  *  option flags (depend on selected algorithm) - 8b
199  * @seq_num_ext_hi: (optional) IPsec Extended Sequence Number (ESN)
200  * @seq_num: IPsec sequence number
201  * @anti_replay: Anti-replay window; size depends on ARS (option flags)
202  */
203 struct ipsec_decap_pdb {
204 	u32 options;
205 	union {
206 		struct ipsec_decap_cbc cbc;
207 		struct ipsec_decap_ctr ctr;
208 		struct ipsec_decap_ccm ccm;
209 		struct ipsec_decap_gcm gcm;
210 	};
211 	u32 seq_num_ext_hi;
212 	u32 seq_num;
213 	__be32 anti_replay[4];
214 };
215 
216 /*
217  * IPSec ESP Datapath Protocol Override Register (DPOVRD)
218  */
219 struct ipsec_deco_dpovrd {
220 #define IPSEC_ENCAP_DECO_DPOVRD_USE 0x80
221 	u8 ovrd_ecn;
222 	u8 ip_hdr_len;
223 	u8 nh_offset;
224 	u8 next_header; /* reserved if decap */
225 };
226 
227 /*
228  * IEEE 802.11i WiFi Protocol Data Block
229  */
230 #define WIFI_PDBOPTS_FCS	0x01
231 #define WIFI_PDBOPTS_AR		0x40
232 
233 struct wifi_encap_pdb {
234 	u16 mac_hdr_len;
235 	u8 rsvd;
236 	u8 options;
237 	u8 iv_flags;
238 	u8 pri;
239 	u16 pn1;
240 	u32 pn2;
241 	u16 frm_ctrl_mask;
242 	u16 seq_ctrl_mask;
243 	u8 rsvd1[2];
244 	u8 cnst;
245 	u8 key_id;
246 	u8 ctr_flags;
247 	u8 rsvd2;
248 	u16 ctr_init;
249 };
250 
251 struct wifi_decap_pdb {
252 	u16 mac_hdr_len;
253 	u8 rsvd;
254 	u8 options;
255 	u8 iv_flags;
256 	u8 pri;
257 	u16 pn1;
258 	u32 pn2;
259 	u16 frm_ctrl_mask;
260 	u16 seq_ctrl_mask;
261 	u8 rsvd1[4];
262 	u8 ctr_flags;
263 	u8 rsvd2;
264 	u16 ctr_init;
265 };
266 
267 /*
268  * IEEE 802.16 WiMAX Protocol Data Block
269  */
270 #define WIMAX_PDBOPTS_FCS	0x01
271 #define WIMAX_PDBOPTS_AR	0x40 /* decap only */
272 
273 struct wimax_encap_pdb {
274 	u8 rsvd[3];
275 	u8 options;
276 	u32 nonce;
277 	u8 b0_flags;
278 	u8 ctr_flags;
279 	u16 ctr_init;
280 	/* begin DECO writeback region */
281 	u32 pn;
282 	/* end DECO writeback region */
283 };
284 
285 struct wimax_decap_pdb {
286 	u8 rsvd[3];
287 	u8 options;
288 	u32 nonce;
289 	u8 iv_flags;
290 	u8 ctr_flags;
291 	u16 ctr_init;
292 	/* begin DECO writeback region */
293 	u32 pn;
294 	u8 rsvd1[2];
295 	u16 antireplay_len;
296 	u64 antireplay_scorecard;
297 	/* end DECO writeback region */
298 };
299 
300 /*
301  * IEEE 801.AE MacSEC Protocol Data Block
302  */
303 #define MACSEC_PDBOPTS_FCS	0x01
304 #define MACSEC_PDBOPTS_AR	0x40 /* used in decap only */
305 
306 struct macsec_encap_pdb {
307 	u16 aad_len;
308 	u8 rsvd;
309 	u8 options;
310 	u64 sci;
311 	u16 ethertype;
312 	u8 tci_an;
313 	u8 rsvd1;
314 	/* begin DECO writeback region */
315 	u32 pn;
316 	/* end DECO writeback region */
317 };
318 
319 struct macsec_decap_pdb {
320 	u16 aad_len;
321 	u8 rsvd;
322 	u8 options;
323 	u64 sci;
324 	u8 rsvd1[3];
325 	/* begin DECO writeback region */
326 	u8 antireplay_len;
327 	u32 pn;
328 	u64 antireplay_scorecard;
329 	/* end DECO writeback region */
330 };
331 
332 /*
333  * SSL/TLS/DTLS Protocol Data Blocks
334  */
335 
336 #define TLS_PDBOPTS_ARS32	0x40
337 #define TLS_PDBOPTS_ARS64	0xc0
338 #define TLS_PDBOPTS_OUTFMT	0x08
339 #define TLS_PDBOPTS_IV_WRTBK	0x02 /* 1.1/1.2/DTLS only */
340 #define TLS_PDBOPTS_EXP_RND_IV	0x01 /* 1.1/1.2/DTLS only */
341 
342 struct tls_block_encap_pdb {
343 	u8 type;
344 	u8 version[2];
345 	u8 options;
346 	u64 seq_num;
347 	u32 iv[4];
348 };
349 
350 struct tls_stream_encap_pdb {
351 	u8 type;
352 	u8 version[2];
353 	u8 options;
354 	u64 seq_num;
355 	u8 i;
356 	u8 j;
357 	u8 rsvd1[2];
358 };
359 
360 struct dtls_block_encap_pdb {
361 	u8 type;
362 	u8 version[2];
363 	u8 options;
364 	u16 epoch;
365 	u16 seq_num[3];
366 	u32 iv[4];
367 };
368 
369 struct tls_block_decap_pdb {
370 	u8 rsvd[3];
371 	u8 options;
372 	u64 seq_num;
373 	u32 iv[4];
374 };
375 
376 struct tls_stream_decap_pdb {
377 	u8 rsvd[3];
378 	u8 options;
379 	u64 seq_num;
380 	u8 i;
381 	u8 j;
382 	u8 rsvd1[2];
383 };
384 
385 struct dtls_block_decap_pdb {
386 	u8 rsvd[3];
387 	u8 options;
388 	u16 epoch;
389 	u16 seq_num[3];
390 	u32 iv[4];
391 	u64 antireplay_scorecard;
392 };
393 
394 /*
395  * SRTP Protocol Data Blocks
396  */
397 #define SRTP_PDBOPTS_MKI	0x08
398 #define SRTP_PDBOPTS_AR		0x40
399 
400 struct srtp_encap_pdb {
401 	u8 x_len;
402 	u8 mki_len;
403 	u8 n_tag;
404 	u8 options;
405 	u32 cnst0;
406 	u8 rsvd[2];
407 	u16 cnst1;
408 	u16 salt[7];
409 	u16 cnst2;
410 	u32 rsvd1;
411 	u32 roc;
412 	u32 opt_mki;
413 };
414 
415 struct srtp_decap_pdb {
416 	u8 x_len;
417 	u8 mki_len;
418 	u8 n_tag;
419 	u8 options;
420 	u32 cnst0;
421 	u8 rsvd[2];
422 	u16 cnst1;
423 	u16 salt[7];
424 	u16 cnst2;
425 	u16 rsvd1;
426 	u16 seq_num;
427 	u32 roc;
428 	u64 antireplay_scorecard;
429 };
430 
431 /*
432  * DSA/ECDSA Protocol Data Blocks
433  * Two of these exist: DSA-SIGN, and DSA-VERIFY. They are similar
434  * except for the treatment of "w" for verify, "s" for sign,
435  * and the placement of "a,b".
436  */
437 #define DSA_PDB_SGF_SHIFT	24
438 #define DSA_PDB_SGF_MASK	(0xff << DSA_PDB_SGF_SHIFT)
439 #define DSA_PDB_SGF_Q		(0x80 << DSA_PDB_SGF_SHIFT)
440 #define DSA_PDB_SGF_R		(0x40 << DSA_PDB_SGF_SHIFT)
441 #define DSA_PDB_SGF_G		(0x20 << DSA_PDB_SGF_SHIFT)
442 #define DSA_PDB_SGF_W		(0x10 << DSA_PDB_SGF_SHIFT)
443 #define DSA_PDB_SGF_S		(0x10 << DSA_PDB_SGF_SHIFT)
444 #define DSA_PDB_SGF_F		(0x08 << DSA_PDB_SGF_SHIFT)
445 #define DSA_PDB_SGF_C		(0x04 << DSA_PDB_SGF_SHIFT)
446 #define DSA_PDB_SGF_D		(0x02 << DSA_PDB_SGF_SHIFT)
447 #define DSA_PDB_SGF_AB_SIGN	(0x02 << DSA_PDB_SGF_SHIFT)
448 #define DSA_PDB_SGF_AB_VERIFY	(0x01 << DSA_PDB_SGF_SHIFT)
449 
450 #define DSA_PDB_L_SHIFT		7
451 #define DSA_PDB_L_MASK		(0x3ff << DSA_PDB_L_SHIFT)
452 
453 #define DSA_PDB_N_MASK		0x7f
454 
455 struct dsa_sign_pdb {
456 	u32 sgf_ln; /* Use DSA_PDB_ definitions per above */
457 	u8 *q;
458 	u8 *r;
459 	u8 *g;	/* or Gx,y */
460 	u8 *s;
461 	u8 *f;
462 	u8 *c;
463 	u8 *d;
464 	u8 *ab; /* ECC only */
465 	u8 *u;
466 };
467 
468 struct dsa_verify_pdb {
469 	u32 sgf_ln;
470 	u8 *q;
471 	u8 *r;
472 	u8 *g;	/* or Gx,y */
473 	u8 *w; /* or Wx,y */
474 	u8 *f;
475 	u8 *c;
476 	u8 *d;
477 	u8 *tmp; /* temporary data block */
478 	u8 *ab; /* only used if ECC processing */
479 };
480 
481 /* RSA Protocol Data Block */
482 #define RSA_PDB_SGF_SHIFT       28
483 #define RSA_PDB_E_SHIFT         12
484 #define RSA_PDB_E_MASK          (0xFFF << RSA_PDB_E_SHIFT)
485 #define RSA_PDB_D_SHIFT         12
486 #define RSA_PDB_D_MASK          (0xFFF << RSA_PDB_D_SHIFT)
487 #define RSA_PDB_Q_SHIFT         12
488 #define RSA_PDB_Q_MASK          (0xFFF << RSA_PDB_Q_SHIFT)
489 
490 #define RSA_PDB_SGF_F           (0x8 << RSA_PDB_SGF_SHIFT)
491 #define RSA_PDB_SGF_G           (0x4 << RSA_PDB_SGF_SHIFT)
492 #define RSA_PRIV_PDB_SGF_F      (0x4 << RSA_PDB_SGF_SHIFT)
493 #define RSA_PRIV_PDB_SGF_G      (0x8 << RSA_PDB_SGF_SHIFT)
494 
495 #define RSA_PRIV_KEY_FRM_1      0
496 #define RSA_PRIV_KEY_FRM_2      1
497 #define RSA_PRIV_KEY_FRM_3      2
498 
499 /**
500  * RSA Encrypt Protocol Data Block
501  * @sgf: scatter-gather field
502  * @f_dma: dma address of input data
503  * @g_dma: dma address of encrypted output data
504  * @n_dma: dma address of RSA modulus
505  * @e_dma: dma address of RSA public exponent
506  * @f_len: length in octets of the input data
507  */
508 struct rsa_pub_pdb {
509 	u32		sgf;
510 	dma_addr_t	f_dma;
511 	dma_addr_t	g_dma;
512 	dma_addr_t	n_dma;
513 	dma_addr_t	e_dma;
514 	u32		f_len;
515 };
516 
517 #define SIZEOF_RSA_PUB_PDB	(2 * sizeof(u32) + 4 * caam_ptr_sz)
518 
519 /**
520  * RSA Decrypt PDB - Private Key Form #1
521  * @sgf: scatter-gather field
522  * @g_dma: dma address of encrypted input data
523  * @f_dma: dma address of output data
524  * @n_dma: dma address of RSA modulus
525  * @d_dma: dma address of RSA private exponent
526  */
527 struct rsa_priv_f1_pdb {
528 	u32		sgf;
529 	dma_addr_t	g_dma;
530 	dma_addr_t	f_dma;
531 	dma_addr_t	n_dma;
532 	dma_addr_t	d_dma;
533 };
534 
535 #define SIZEOF_RSA_PRIV_F1_PDB	(sizeof(u32) + 4 * caam_ptr_sz)
536 
537 /**
538  * RSA Decrypt PDB - Private Key Form #2
539  * @sgf     : scatter-gather field
540  * @g_dma   : dma address of encrypted input data
541  * @f_dma   : dma address of output data
542  * @d_dma   : dma address of RSA private exponent
543  * @p_dma   : dma address of RSA prime factor p of RSA modulus n
544  * @q_dma   : dma address of RSA prime factor q of RSA modulus n
545  * @tmp1_dma: dma address of temporary buffer. CAAM uses this temporary buffer
546  *            as internal state buffer. It is assumed to be as long as p.
547  * @tmp2_dma: dma address of temporary buffer. CAAM uses this temporary buffer
548  *            as internal state buffer. It is assumed to be as long as q.
549  * @p_q_len : length in bytes of first two prime factors of the RSA modulus n
550  */
551 struct rsa_priv_f2_pdb {
552 	u32		sgf;
553 	dma_addr_t	g_dma;
554 	dma_addr_t	f_dma;
555 	dma_addr_t	d_dma;
556 	dma_addr_t	p_dma;
557 	dma_addr_t	q_dma;
558 	dma_addr_t	tmp1_dma;
559 	dma_addr_t	tmp2_dma;
560 	u32		p_q_len;
561 };
562 
563 #define SIZEOF_RSA_PRIV_F2_PDB	(2 * sizeof(u32) + 7 * caam_ptr_sz)
564 
565 /**
566  * RSA Decrypt PDB - Private Key Form #3
567  * This is the RSA Chinese Reminder Theorem (CRT) form for two prime factors of
568  * the RSA modulus.
569  * @sgf     : scatter-gather field
570  * @g_dma   : dma address of encrypted input data
571  * @f_dma   : dma address of output data
572  * @c_dma   : dma address of RSA CRT coefficient
573  * @p_dma   : dma address of RSA prime factor p of RSA modulus n
574  * @q_dma   : dma address of RSA prime factor q of RSA modulus n
575  * @dp_dma  : dma address of RSA CRT exponent of RSA prime factor p
576  * @dp_dma  : dma address of RSA CRT exponent of RSA prime factor q
577  * @tmp1_dma: dma address of temporary buffer. CAAM uses this temporary buffer
578  *            as internal state buffer. It is assumed to be as long as p.
579  * @tmp2_dma: dma address of temporary buffer. CAAM uses this temporary buffer
580  *            as internal state buffer. It is assumed to be as long as q.
581  * @p_q_len : length in bytes of first two prime factors of the RSA modulus n
582  */
583 struct rsa_priv_f3_pdb {
584 	u32		sgf;
585 	dma_addr_t	g_dma;
586 	dma_addr_t	f_dma;
587 	dma_addr_t	c_dma;
588 	dma_addr_t	p_dma;
589 	dma_addr_t	q_dma;
590 	dma_addr_t	dp_dma;
591 	dma_addr_t	dq_dma;
592 	dma_addr_t	tmp1_dma;
593 	dma_addr_t	tmp2_dma;
594 	u32		p_q_len;
595 };
596 
597 #define SIZEOF_RSA_PRIV_F3_PDB	(2 * sizeof(u32) + 9 * caam_ptr_sz)
598 
599 #endif
600