216 lines
4.3 KiB
C
216 lines
4.3 KiB
C
|
/*
|
||
|
* AMD Cryptographic Coprocessor (CCP) crypto API support
|
||
|
*
|
||
|
* Copyright (C) 2013 Advanced Micro Devices, Inc.
|
||
|
*
|
||
|
* Author: Tom Lendacky <thomas.lendacky@amd.com>
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify
|
||
|
* it under the terms of the GNU General Public License version 2 as
|
||
|
* published by the Free Software Foundation.
|
||
|
*/
|
||
|
|
||
|
#ifndef __CCP_CRYPTO_H__
|
||
|
#define __CCP_CRYPTO_H__
|
||
|
|
||
|
#include <linux/list.h>
|
||
|
#include <linux/wait.h>
|
||
|
#include <linux/pci.h>
|
||
|
#include <linux/ccp.h>
|
||
|
#include <crypto/algapi.h>
|
||
|
#include <crypto/aes.h>
|
||
|
#include <crypto/ctr.h>
|
||
|
#include <crypto/hash.h>
|
||
|
#include <crypto/sha.h>
|
||
|
|
||
|
#define CCP_CRA_PRIORITY 300
|
||
|
|
||
|
struct ccp_crypto_ablkcipher_alg {
|
||
|
struct list_head entry;
|
||
|
|
||
|
u32 mode;
|
||
|
|
||
|
struct crypto_alg alg;
|
||
|
};
|
||
|
|
||
|
struct ccp_crypto_ahash_alg {
|
||
|
struct list_head entry;
|
||
|
|
||
|
const __be32 *init;
|
||
|
u32 type;
|
||
|
u32 mode;
|
||
|
|
||
|
/* Child algorithm used for HMAC, CMAC, etc */
|
||
|
char child_alg[CRYPTO_MAX_ALG_NAME];
|
||
|
|
||
|
struct ahash_alg alg;
|
||
|
};
|
||
|
|
||
|
static inline struct ccp_crypto_ablkcipher_alg *
|
||
|
ccp_crypto_ablkcipher_alg(struct crypto_tfm *tfm)
|
||
|
{
|
||
|
struct crypto_alg *alg = tfm->__crt_alg;
|
||
|
|
||
|
return container_of(alg, struct ccp_crypto_ablkcipher_alg, alg);
|
||
|
}
|
||
|
|
||
|
static inline struct ccp_crypto_ahash_alg *
|
||
|
ccp_crypto_ahash_alg(struct crypto_tfm *tfm)
|
||
|
{
|
||
|
struct crypto_alg *alg = tfm->__crt_alg;
|
||
|
struct ahash_alg *ahash_alg;
|
||
|
|
||
|
ahash_alg = container_of(alg, struct ahash_alg, halg.base);
|
||
|
|
||
|
return container_of(ahash_alg, struct ccp_crypto_ahash_alg, alg);
|
||
|
}
|
||
|
|
||
|
/***** AES related defines *****/
|
||
|
struct ccp_aes_ctx {
|
||
|
/* Fallback cipher for XTS with unsupported unit sizes */
|
||
|
struct crypto_skcipher *tfm_skcipher;
|
||
|
|
||
|
/* Cipher used to generate CMAC K1/K2 keys */
|
||
|
struct crypto_cipher *tfm_cipher;
|
||
|
|
||
|
enum ccp_engine engine;
|
||
|
enum ccp_aes_type type;
|
||
|
enum ccp_aes_mode mode;
|
||
|
|
||
|
struct scatterlist key_sg;
|
||
|
unsigned int key_len;
|
||
|
u8 key[AES_MAX_KEY_SIZE];
|
||
|
|
||
|
u8 nonce[CTR_RFC3686_NONCE_SIZE];
|
||
|
|
||
|
/* CMAC key structures */
|
||
|
struct scatterlist k1_sg;
|
||
|
struct scatterlist k2_sg;
|
||
|
unsigned int kn_len;
|
||
|
u8 k1[AES_BLOCK_SIZE];
|
||
|
u8 k2[AES_BLOCK_SIZE];
|
||
|
};
|
||
|
|
||
|
struct ccp_aes_req_ctx {
|
||
|
struct scatterlist iv_sg;
|
||
|
u8 iv[AES_BLOCK_SIZE];
|
||
|
|
||
|
/* Fields used for RFC3686 requests */
|
||
|
u8 *rfc3686_info;
|
||
|
u8 rfc3686_iv[AES_BLOCK_SIZE];
|
||
|
|
||
|
struct ccp_cmd cmd;
|
||
|
};
|
||
|
|
||
|
struct ccp_aes_cmac_req_ctx {
|
||
|
unsigned int null_msg;
|
||
|
unsigned int final;
|
||
|
|
||
|
struct scatterlist *src;
|
||
|
unsigned int nbytes;
|
||
|
|
||
|
u64 hash_cnt;
|
||
|
unsigned int hash_rem;
|
||
|
|
||
|
struct sg_table data_sg;
|
||
|
|
||
|
struct scatterlist iv_sg;
|
||
|
u8 iv[AES_BLOCK_SIZE];
|
||
|
|
||
|
struct scatterlist buf_sg;
|
||
|
unsigned int buf_count;
|
||
|
u8 buf[AES_BLOCK_SIZE];
|
||
|
|
||
|
struct scatterlist pad_sg;
|
||
|
unsigned int pad_count;
|
||
|
u8 pad[AES_BLOCK_SIZE];
|
||
|
|
||
|
struct ccp_cmd cmd;
|
||
|
};
|
||
|
|
||
|
struct ccp_aes_cmac_exp_ctx {
|
||
|
unsigned int null_msg;
|
||
|
|
||
|
u8 iv[AES_BLOCK_SIZE];
|
||
|
|
||
|
unsigned int buf_count;
|
||
|
u8 buf[AES_BLOCK_SIZE];
|
||
|
};
|
||
|
|
||
|
/***** SHA related defines *****/
|
||
|
#define MAX_SHA_CONTEXT_SIZE SHA256_DIGEST_SIZE
|
||
|
#define MAX_SHA_BLOCK_SIZE SHA256_BLOCK_SIZE
|
||
|
|
||
|
struct ccp_sha_ctx {
|
||
|
struct scatterlist opad_sg;
|
||
|
unsigned int opad_count;
|
||
|
|
||
|
unsigned int key_len;
|
||
|
u8 key[MAX_SHA_BLOCK_SIZE];
|
||
|
u8 ipad[MAX_SHA_BLOCK_SIZE];
|
||
|
u8 opad[MAX_SHA_BLOCK_SIZE];
|
||
|
struct crypto_shash *hmac_tfm;
|
||
|
};
|
||
|
|
||
|
struct ccp_sha_req_ctx {
|
||
|
enum ccp_sha_type type;
|
||
|
|
||
|
u64 msg_bits;
|
||
|
|
||
|
unsigned int first;
|
||
|
unsigned int final;
|
||
|
|
||
|
struct scatterlist *src;
|
||
|
unsigned int nbytes;
|
||
|
|
||
|
u64 hash_cnt;
|
||
|
unsigned int hash_rem;
|
||
|
|
||
|
struct sg_table data_sg;
|
||
|
|
||
|
struct scatterlist ctx_sg;
|
||
|
u8 ctx[MAX_SHA_CONTEXT_SIZE];
|
||
|
|
||
|
struct scatterlist buf_sg;
|
||
|
unsigned int buf_count;
|
||
|
u8 buf[MAX_SHA_BLOCK_SIZE];
|
||
|
|
||
|
/* CCP driver command */
|
||
|
struct ccp_cmd cmd;
|
||
|
};
|
||
|
|
||
|
struct ccp_sha_exp_ctx {
|
||
|
enum ccp_sha_type type;
|
||
|
|
||
|
u64 msg_bits;
|
||
|
|
||
|
unsigned int first;
|
||
|
|
||
|
u8 ctx[MAX_SHA_CONTEXT_SIZE];
|
||
|
|
||
|
unsigned int buf_count;
|
||
|
u8 buf[MAX_SHA_BLOCK_SIZE];
|
||
|
};
|
||
|
|
||
|
/***** Common Context Structure *****/
|
||
|
struct ccp_ctx {
|
||
|
int (*complete)(struct crypto_async_request *req, int ret);
|
||
|
|
||
|
union {
|
||
|
struct ccp_aes_ctx aes;
|
||
|
struct ccp_sha_ctx sha;
|
||
|
} u;
|
||
|
};
|
||
|
|
||
|
int ccp_crypto_enqueue_request(struct crypto_async_request *req,
|
||
|
struct ccp_cmd *cmd);
|
||
|
struct scatterlist *ccp_crypto_sg_table_add(struct sg_table *table,
|
||
|
struct scatterlist *sg_add);
|
||
|
|
||
|
int ccp_register_aes_algs(struct list_head *head);
|
||
|
int ccp_register_aes_cmac_algs(struct list_head *head);
|
||
|
int ccp_register_aes_xts_algs(struct list_head *head);
|
||
|
int ccp_register_sha_algs(struct list_head *head);
|
||
|
|
||
|
#endif
|