/** * AMCC SoC PPC4xx Crypto Driver * * Copyright (c) 2008 Applied Micro Circuits Corporation. * All rights reserved. James Hsiao <jhsiao@amcc.com> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * @file crypto4xx_sa.c * * This file implements the security context * associate format. */ #include <linux/kernel.h> #include <linux/module.h> #include <linux/moduleparam.h> #include <linux/mod_devicetable.h> #include <linux/interrupt.h> #include <linux/spinlock_types.h> #include <linux/highmem.h> #include <linux/scatterlist.h> #include <linux/crypto.h> #include <crypto/algapi.h> #include <crypto/des.h> #include "crypto4xx_reg_def.h" #include "crypto4xx_sa.h" #include "crypto4xx_core.h" u32 get_dynamic_sa_offset_iv_field(struct crypto4xx_ctx *ctx) { u32 offset; union dynamic_sa_contents cts; if (ctx->direction == DIR_INBOUND) cts.w = ((struct dynamic_sa_ctl *)(ctx->sa_in))->sa_contents; else cts.w = ((struct dynamic_sa_ctl *)(ctx->sa_out))->sa_contents; offset = cts.bf.key_size + cts.bf.inner_size + cts.bf.outer_size + cts.bf.spi + cts.bf.seq_num0 + cts.bf.seq_num1 + cts.bf.seq_num_mask0 + cts.bf.seq_num_mask1 + cts.bf.seq_num_mask2 + cts.bf.seq_num_mask3; return sizeof(struct dynamic_sa_ctl) + offset * 4; } u32 get_dynamic_sa_offset_state_ptr_field(struct crypto4xx_ctx *ctx) { u32 offset; union dynamic_sa_contents cts; if (ctx->direction == DIR_INBOUND) cts.w = ((struct dynamic_sa_ctl *) ctx->sa_in)->sa_contents; else cts.w = ((struct dynamic_sa_ctl *) ctx->sa_out)->sa_contents; offset = cts.bf.key_size + cts.bf.inner_size + cts.bf.outer_size + cts.bf.spi + cts.bf.seq_num0 + cts.bf.seq_num1 + cts.bf.seq_num_mask0 + cts.bf.seq_num_mask1 + cts.bf.seq_num_mask2 + cts.bf.seq_num_mask3 + cts.bf.iv0 + cts.bf.iv1 + cts.bf.iv2 + cts.bf.iv3; return sizeof(struct dynamic_sa_ctl) + offset * 4; } u32 get_dynamic_sa_iv_size(struct crypto4xx_ctx *ctx) { union dynamic_sa_contents cts; if (ctx->direction == DIR_INBOUND) cts.w = ((struct dynamic_sa_ctl *) ctx->sa_in)->sa_contents; else cts.w = ((struct dynamic_sa_ctl *) ctx->sa_out)->sa_contents; return (cts.bf.iv0 + cts.bf.iv1 + cts.bf.iv2 + cts.bf.iv3) * 4; } u32 get_dynamic_sa_offset_key_field(struct crypto4xx_ctx *ctx) { union dynamic_sa_contents cts; if (ctx->direction == DIR_INBOUND) cts.w = ((struct dynamic_sa_ctl *) ctx->sa_in)->sa_contents; else cts.w = ((struct dynamic_sa_ctl *) ctx->sa_out)->sa_contents; return sizeof(struct dynamic_sa_ctl); }