cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

sa2ul.h (12207B)


      1/* SPDX-License-Identifier: GPL-2.0 */
      2/*
      3 * K3 SA2UL crypto accelerator driver
      4 *
      5 * Copyright (C) 2018-2020 Texas Instruments Incorporated - http://www.ti.com
      6 *
      7 * Authors:	Keerthy
      8 *		Vitaly Andrianov
      9 *		Tero Kristo
     10 */
     11
     12#ifndef _K3_SA2UL_
     13#define _K3_SA2UL_
     14
     15#include <crypto/aes.h>
     16#include <crypto/sha1.h>
     17#include <crypto/sha2.h>
     18
     19#define SA_ENGINE_ENABLE_CONTROL	0x1000
     20
     21struct sa_tfm_ctx;
     22/*
     23 * SA_ENGINE_ENABLE_CONTROL register bits
     24 */
     25#define SA_EEC_ENCSS_EN			0x00000001
     26#define SA_EEC_AUTHSS_EN		0x00000002
     27#define SA_EEC_TRNG_EN			0x00000008
     28#define SA_EEC_PKA_EN			0x00000010
     29#define SA_EEC_CTXCACH_EN		0x00000080
     30#define SA_EEC_CPPI_PORT_IN_EN		0x00000200
     31#define SA_EEC_CPPI_PORT_OUT_EN		0x00000800
     32
     33/*
     34 * Encoding used to identify the typo of crypto operation
     35 * performed on the packet when the packet is returned
     36 * by SA
     37 */
     38#define SA_REQ_SUBTYPE_ENC	0x0001
     39#define SA_REQ_SUBTYPE_DEC	0x0002
     40#define SA_REQ_SUBTYPE_SHIFT	16
     41#define SA_REQ_SUBTYPE_MASK	0xffff
     42
     43/* Number of 32 bit words in EPIB  */
     44#define SA_DMA_NUM_EPIB_WORDS   4
     45
     46/* Number of 32 bit words in PS data  */
     47#define SA_DMA_NUM_PS_WORDS     16
     48#define NKEY_SZ			3
     49#define MCI_SZ			27
     50
     51/*
     52 * Maximum number of simultaeneous security contexts
     53 * supported by the driver
     54 */
     55#define SA_MAX_NUM_CTX	512
     56
     57/*
     58 * Assumption: CTX size is multiple of 32
     59 */
     60#define SA_CTX_SIZE_TO_DMA_SIZE(ctx_sz) \
     61		((ctx_sz) ? ((ctx_sz) / 32 - 1) : 0)
     62
     63#define SA_CTX_ENC_KEY_OFFSET   32
     64#define SA_CTX_ENC_AUX1_OFFSET  64
     65#define SA_CTX_ENC_AUX2_OFFSET  96
     66#define SA_CTX_ENC_AUX3_OFFSET  112
     67#define SA_CTX_ENC_AUX4_OFFSET  128
     68
     69/* Next Engine Select code in CP_ACE */
     70#define SA_ENG_ID_EM1   2       /* Enc/Dec engine with AES/DEC core */
     71#define SA_ENG_ID_EM2   3       /* Encryption/Decryption enginefor pass 2 */
     72#define SA_ENG_ID_AM1   4       /* Auth. engine with SHA1/MD5/SHA2 core */
     73#define SA_ENG_ID_AM2   5       /*  Authentication engine for pass 2 */
     74#define SA_ENG_ID_OUTPORT2 20   /*  Egress module 2  */
     75
     76/*
     77 * Command Label Definitions
     78 */
     79#define SA_CMDL_OFFSET_NESC           0      /* Next Engine Select Code */
     80#define SA_CMDL_OFFSET_LABEL_LEN      1      /* Engine Command Label Length */
     81/* 16-bit Length of Data to be processed */
     82#define SA_CMDL_OFFSET_DATA_LEN       2
     83#define SA_CMDL_OFFSET_DATA_OFFSET    4      /* Stat Data Offset */
     84#define SA_CMDL_OFFSET_OPTION_CTRL1   5      /* Option Control Byte 1 */
     85#define SA_CMDL_OFFSET_OPTION_CTRL2   6      /* Option Control Byte 2 */
     86#define SA_CMDL_OFFSET_OPTION_CTRL3   7      /* Option Control Byte 3 */
     87#define SA_CMDL_OFFSET_OPTION_BYTE    8
     88
     89#define SA_CMDL_HEADER_SIZE_BYTES	8
     90
     91#define SA_CMDL_OPTION_BYTES_MAX_SIZE     72
     92#define SA_CMDL_MAX_SIZE_BYTES (SA_CMDL_HEADER_SIZE_BYTES + \
     93				SA_CMDL_OPTION_BYTES_MAX_SIZE)
     94
     95/* SWINFO word-0 flags */
     96#define SA_SW_INFO_FLAG_EVICT   0x0001
     97#define SA_SW_INFO_FLAG_TEAR    0x0002
     98#define SA_SW_INFO_FLAG_NOPD    0x0004
     99
    100/*
    101 * This type represents the various packet types to be processed
    102 * by the PHP engine in SA.
    103 * It is used to identify the corresponding PHP processing function.
    104 */
    105#define SA_CTX_PE_PKT_TYPE_3GPP_AIR    0    /* 3GPP Air Cipher */
    106#define SA_CTX_PE_PKT_TYPE_SRTP        1    /* SRTP */
    107#define SA_CTX_PE_PKT_TYPE_IPSEC_AH    2    /* IPSec Authentication Header */
    108/* IPSec Encapsulating Security Payload */
    109#define SA_CTX_PE_PKT_TYPE_IPSEC_ESP   3
    110/* Indicates that it is in data mode, It may not be used by PHP */
    111#define SA_CTX_PE_PKT_TYPE_NONE        4
    112#define SA_CTX_ENC_TYPE1_SZ     64      /* Encryption SC with Key only */
    113#define SA_CTX_ENC_TYPE2_SZ     96      /* Encryption SC with Key and Aux1 */
    114
    115#define SA_CTX_AUTH_TYPE1_SZ    64      /* Auth SC with Key only */
    116#define SA_CTX_AUTH_TYPE2_SZ    96      /* Auth SC with Key and Aux1 */
    117/* Size of security context for PHP engine */
    118#define SA_CTX_PHP_PE_CTX_SZ    64
    119
    120#define SA_CTX_MAX_SZ (64 + SA_CTX_ENC_TYPE2_SZ + SA_CTX_AUTH_TYPE2_SZ)
    121
    122/*
    123 * Encoding of F/E control in SCCTL
    124 *  Bit 0-1: Fetch PHP Bytes
    125 *  Bit 2-3: Fetch Encryption/Air Ciphering Bytes
    126 *  Bit 4-5: Fetch Authentication Bytes or Encr pass 2
    127 *  Bit 6-7: Evict PHP Bytes
    128 *
    129 *  where   00 = 0 bytes
    130 *          01 = 64 bytes
    131 *          10 = 96 bytes
    132 *          11 = 128 bytes
    133 */
    134#define SA_CTX_DMA_SIZE_0       0
    135#define SA_CTX_DMA_SIZE_64      1
    136#define SA_CTX_DMA_SIZE_96      2
    137#define SA_CTX_DMA_SIZE_128     3
    138
    139/*
    140 * Byte offset of the owner word in SCCTL
    141 * in the security context
    142 */
    143#define SA_CTX_SCCTL_OWNER_OFFSET 0
    144
    145#define SA_CTX_ENC_KEY_OFFSET   32
    146#define SA_CTX_ENC_AUX1_OFFSET  64
    147#define SA_CTX_ENC_AUX2_OFFSET  96
    148#define SA_CTX_ENC_AUX3_OFFSET  112
    149#define SA_CTX_ENC_AUX4_OFFSET  128
    150
    151#define SA_SCCTL_FE_AUTH_ENC	0x65
    152#define SA_SCCTL_FE_ENC		0x8D
    153
    154#define SA_ALIGN_MASK		(sizeof(u32) - 1)
    155#define SA_ALIGNED		__aligned(32)
    156
    157#define SA_AUTH_SW_CTRL_MD5	1
    158#define SA_AUTH_SW_CTRL_SHA1	2
    159#define SA_AUTH_SW_CTRL_SHA224	3
    160#define SA_AUTH_SW_CTRL_SHA256	4
    161#define SA_AUTH_SW_CTRL_SHA384	5
    162#define SA_AUTH_SW_CTRL_SHA512	6
    163
    164/* SA2UL can only handle maximum data size of 64KB */
    165#define SA_MAX_DATA_SZ		U16_MAX
    166
    167/*
    168 * SA2UL can provide unpredictable results with packet sizes that fall
    169 * the following range, so avoid using it.
    170 */
    171#define SA_UNSAFE_DATA_SZ_MIN	240
    172#define SA_UNSAFE_DATA_SZ_MAX	256
    173
    174struct sa_match_data;
    175
    176/**
    177 * struct sa_crypto_data - Crypto driver instance data
    178 * @base: Base address of the register space
    179 * @soc_data: Pointer to SoC specific data
    180 * @pdev: Platform device pointer
    181 * @sc_pool: security context pool
    182 * @dev: Device pointer
    183 * @scid_lock: secure context ID lock
    184 * @sc_id_start: starting index for SC ID
    185 * @sc_id_end: Ending index for SC ID
    186 * @sc_id: Security Context ID
    187 * @ctx_bm: Bitmap to keep track of Security context ID's
    188 * @ctx: SA tfm context pointer
    189 * @dma_rx1: Pointer to DMA rx channel for sizes < 256 Bytes
    190 * @dma_rx2: Pointer to DMA rx channel for sizes > 256 Bytes
    191 * @dma_tx: Pointer to DMA TX channel
    192 */
    193struct sa_crypto_data {
    194	void __iomem *base;
    195	const struct sa_match_data *match_data;
    196	struct platform_device	*pdev;
    197	struct dma_pool		*sc_pool;
    198	struct device *dev;
    199	spinlock_t	scid_lock; /* lock for SC-ID allocation */
    200	/* Security context data */
    201	u16		sc_id_start;
    202	u16		sc_id_end;
    203	u16		sc_id;
    204	unsigned long	ctx_bm[DIV_ROUND_UP(SA_MAX_NUM_CTX,
    205				BITS_PER_LONG)];
    206	struct sa_tfm_ctx	*ctx;
    207	struct dma_chan		*dma_rx1;
    208	struct dma_chan		*dma_rx2;
    209	struct dma_chan		*dma_tx;
    210};
    211
    212/**
    213 * struct sa_cmdl_param_info: Command label parameters info
    214 * @index: Index of the parameter in the command label format
    215 * @offset: the offset of the parameter
    216 * @size: Size of the parameter
    217 */
    218struct sa_cmdl_param_info {
    219	u16	index;
    220	u16	offset;
    221	u16	size;
    222};
    223
    224/* Maximum length of Auxiliary data in 32bit words */
    225#define SA_MAX_AUX_DATA_WORDS	8
    226
    227/**
    228 * struct sa_cmdl_upd_info: Command label updation info
    229 * @flags: flags in command label
    230 * @submode: Encryption submodes
    231 * @enc_size: Size of first pass encryption size
    232 * @enc_size2: Size of second pass encryption size
    233 * @enc_offset: Encryption payload offset in the packet
    234 * @enc_iv: Encryption initialization vector for pass2
    235 * @enc_iv2: Encryption initialization vector for pass2
    236 * @aad: Associated data
    237 * @payload: Payload info
    238 * @auth_size: Authentication size for pass 1
    239 * @auth_size2: Authentication size for pass 2
    240 * @auth_offset: Authentication payload offset
    241 * @auth_iv: Authentication initialization vector
    242 * @aux_key_info: Authentication aux key information
    243 * @aux_key: Aux key for authentication
    244 */
    245struct sa_cmdl_upd_info {
    246	u16	flags;
    247	u16	submode;
    248	struct sa_cmdl_param_info	enc_size;
    249	struct sa_cmdl_param_info	enc_size2;
    250	struct sa_cmdl_param_info	enc_offset;
    251	struct sa_cmdl_param_info	enc_iv;
    252	struct sa_cmdl_param_info	enc_iv2;
    253	struct sa_cmdl_param_info	aad;
    254	struct sa_cmdl_param_info	payload;
    255	struct sa_cmdl_param_info	auth_size;
    256	struct sa_cmdl_param_info	auth_size2;
    257	struct sa_cmdl_param_info	auth_offset;
    258	struct sa_cmdl_param_info	auth_iv;
    259	struct sa_cmdl_param_info	aux_key_info;
    260	u32				aux_key[SA_MAX_AUX_DATA_WORDS];
    261};
    262
    263/*
    264 * Number of 32bit words appended after the command label
    265 * in PSDATA to identify the crypto request context.
    266 * word-0: Request type
    267 * word-1: pointer to request
    268 */
    269#define SA_PSDATA_CTX_WORDS 4
    270
    271/* Maximum size of Command label in 32 words */
    272#define SA_MAX_CMDL_WORDS (SA_DMA_NUM_PS_WORDS - SA_PSDATA_CTX_WORDS)
    273
    274/**
    275 * struct sa_ctx_info: SA context information
    276 * @sc: Pointer to security context
    277 * @sc_phys: Security context physical address that is passed on to SA2UL
    278 * @sc_id: Security context ID
    279 * @cmdl_size: Command label size
    280 * @cmdl: Command label for a particular iteration
    281 * @cmdl_upd_info: structure holding command label updation info
    282 * @epib: Extended protocol information block words
    283 */
    284struct sa_ctx_info {
    285	u8		*sc;
    286	dma_addr_t	sc_phys;
    287	u16		sc_id;
    288	u16		cmdl_size;
    289	u32		cmdl[SA_MAX_CMDL_WORDS];
    290	struct sa_cmdl_upd_info cmdl_upd_info;
    291	/* Store Auxiliary data such as K2/K3 subkeys in AES-XCBC */
    292	u32		epib[SA_DMA_NUM_EPIB_WORDS];
    293};
    294
    295/**
    296 * struct sa_tfm_ctx: TFM context structure
    297 * @dev_data: struct sa_crypto_data pointer
    298 * @enc: struct sa_ctx_info for encryption
    299 * @dec: struct sa_ctx_info for decryption
    300 * @keylen: encrption/decryption keylength
    301 * @iv_idx: Initialization vector index
    302 * @key: encryption key
    303 * @fallback: SW fallback algorithm
    304 */
    305struct sa_tfm_ctx {
    306	struct sa_crypto_data *dev_data;
    307	struct sa_ctx_info enc;
    308	struct sa_ctx_info dec;
    309	struct sa_ctx_info auth;
    310	int keylen;
    311	int iv_idx;
    312	u32 key[AES_KEYSIZE_256 / sizeof(u32)];
    313	u8 authkey[SHA512_BLOCK_SIZE];
    314	struct crypto_shash	*shash;
    315	/* for fallback */
    316	union {
    317		struct crypto_skcipher		*skcipher;
    318		struct crypto_ahash		*ahash;
    319		struct crypto_aead		*aead;
    320	} fallback;
    321};
    322
    323/**
    324 * struct sa_sha_req_ctx: Structure used for sha request
    325 * @dev_data: struct sa_crypto_data pointer
    326 * @cmdl: Complete command label with psdata and epib included
    327 * @fallback_req: SW fallback request container
    328 */
    329struct sa_sha_req_ctx {
    330	struct sa_crypto_data	*dev_data;
    331	u32			cmdl[SA_MAX_CMDL_WORDS + SA_PSDATA_CTX_WORDS];
    332	struct ahash_request	fallback_req;
    333};
    334
    335enum sa_submode {
    336	SA_MODE_GEN = 0,
    337	SA_MODE_CCM,
    338	SA_MODE_GCM,
    339	SA_MODE_GMAC
    340};
    341
    342/* Encryption algorithms */
    343enum sa_ealg_id {
    344	SA_EALG_ID_NONE = 0,        /* No encryption */
    345	SA_EALG_ID_NULL,            /* NULL encryption */
    346	SA_EALG_ID_AES_CTR,         /* AES Counter mode */
    347	SA_EALG_ID_AES_F8,          /* AES F8 mode */
    348	SA_EALG_ID_AES_CBC,         /* AES CBC mode */
    349	SA_EALG_ID_DES_CBC,         /* DES CBC mode */
    350	SA_EALG_ID_3DES_CBC,        /* 3DES CBC mode */
    351	SA_EALG_ID_CCM,             /* Counter with CBC-MAC mode */
    352	SA_EALG_ID_GCM,             /* Galois Counter mode */
    353	SA_EALG_ID_AES_ECB,
    354	SA_EALG_ID_LAST
    355};
    356
    357/* Authentication algorithms */
    358enum sa_aalg_id {
    359	SA_AALG_ID_NONE = 0,      /* No Authentication  */
    360	SA_AALG_ID_NULL = SA_EALG_ID_LAST, /* NULL Authentication  */
    361	SA_AALG_ID_MD5,           /* MD5 mode */
    362	SA_AALG_ID_SHA1,          /* SHA1 mode */
    363	SA_AALG_ID_SHA2_224,      /* 224-bit SHA2 mode */
    364	SA_AALG_ID_SHA2_256,      /* 256-bit SHA2 mode */
    365	SA_AALG_ID_SHA2_512,      /* 512-bit SHA2 mode */
    366	SA_AALG_ID_HMAC_MD5,      /* HMAC with MD5 mode */
    367	SA_AALG_ID_HMAC_SHA1,     /* HMAC with SHA1 mode */
    368	SA_AALG_ID_HMAC_SHA2_224, /* HMAC with 224-bit SHA2 mode */
    369	SA_AALG_ID_HMAC_SHA2_256, /* HMAC with 256-bit SHA2 mode */
    370	SA_AALG_ID_GMAC,          /* Galois Message Auth. Code mode */
    371	SA_AALG_ID_CMAC,          /* Cipher-based Mes. Auth. Code mode */
    372	SA_AALG_ID_CBC_MAC,       /* Cipher Block Chaining */
    373	SA_AALG_ID_AES_XCBC       /* AES Extended Cipher Block Chaining */
    374};
    375
    376/*
    377 * Mode control engine algorithms used to index the
    378 * mode control instruction tables
    379 */
    380enum sa_eng_algo_id {
    381	SA_ENG_ALGO_ECB = 0,
    382	SA_ENG_ALGO_CBC,
    383	SA_ENG_ALGO_CFB,
    384	SA_ENG_ALGO_OFB,
    385	SA_ENG_ALGO_CTR,
    386	SA_ENG_ALGO_F8,
    387	SA_ENG_ALGO_F8F9,
    388	SA_ENG_ALGO_GCM,
    389	SA_ENG_ALGO_GMAC,
    390	SA_ENG_ALGO_CCM,
    391	SA_ENG_ALGO_CMAC,
    392	SA_ENG_ALGO_CBCMAC,
    393	SA_NUM_ENG_ALGOS
    394};
    395
    396/**
    397 * struct sa_eng_info: Security accelerator engine info
    398 * @eng_id: Engine ID
    399 * @sc_size: security context size
    400 */
    401struct sa_eng_info {
    402	u8	eng_id;
    403	u16	sc_size;
    404};
    405
    406#endif /* _K3_SA2UL_ */