safe.c 61 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288
  1. /*-
  2. * Linux port done by David McCullough <[email protected]>
  3. * Copyright (C) 2004-2010 David McCullough
  4. * The license and original author are listed below.
  5. *
  6. * Copyright (c) 2003 Sam Leffler, Errno Consulting
  7. * Copyright (c) 2003 Global Technology Associates, Inc.
  8. * All rights reserved.
  9. *
  10. * Redistribution and use in source and binary forms, with or without
  11. * modification, are permitted provided that the following conditions
  12. * are met:
  13. * 1. Redistributions of source code must retain the above copyright
  14. * notice, this list of conditions and the following disclaimer.
  15. * 2. Redistributions in binary form must reproduce the above copyright
  16. * notice, this list of conditions and the following disclaimer in the
  17. * documentation and/or other materials provided with the distribution.
  18. *
  19. * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
  20. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  21. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  22. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  23. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  24. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  25. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  26. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  27. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  28. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  29. * SUCH DAMAGE.
  30. *
  31. __FBSDID("$FreeBSD: src/sys/dev/safe/safe.c,v 1.18 2007/03/21 03:42:50 sam Exp $");
  32. */
  33. #ifndef AUTOCONF_INCLUDED
  34. #include <linux/config.h>
  35. #endif
  36. #include <linux/module.h>
  37. #include <linux/kernel.h>
  38. #include <linux/init.h>
  39. #include <linux/list.h>
  40. #include <linux/slab.h>
  41. #include <linux/wait.h>
  42. #include <linux/sched.h>
  43. #include <linux/pci.h>
  44. #include <linux/delay.h>
  45. #include <linux/interrupt.h>
  46. #include <linux/spinlock.h>
  47. #include <linux/random.h>
  48. #include <linux/version.h>
  49. #include <linux/skbuff.h>
  50. #include <asm/io.h>
  51. /*
  52. * SafeNet SafeXcel-1141 hardware crypto accelerator
  53. */
  54. #include <cryptodev.h>
  55. #include <uio.h>
  56. #include <safe/safereg.h>
  57. #include <safe/safevar.h>
  58. #if 1
  59. #define DPRINTF(a) do { \
  60. if (debug) { \
  61. printk("%s: ", sc ? \
  62. device_get_nameunit(sc->sc_dev) : "safe"); \
  63. printk a; \
  64. } \
  65. } while (0)
  66. #else
  67. #define DPRINTF(a)
  68. #endif
  69. /*
  70. * until we find a cleaner way, include the BSD md5/sha1 code
  71. * here
  72. */
  73. #define HMAC_HACK 1
  74. #ifdef HMAC_HACK
  75. #define LITTLE_ENDIAN 1234
  76. #define BIG_ENDIAN 4321
  77. #ifdef __LITTLE_ENDIAN
  78. #define BYTE_ORDER LITTLE_ENDIAN
  79. #endif
  80. #ifdef __BIG_ENDIAN
  81. #define BYTE_ORDER BIG_ENDIAN
  82. #endif
  83. #include <safe/md5.h>
  84. #include <safe/md5.c>
  85. #include <safe/sha1.h>
  86. #include <safe/sha1.c>
  87. u_int8_t hmac_ipad_buffer[64] = {
  88. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  89. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  90. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  91. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  92. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  93. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  94. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36,
  95. 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36, 0x36
  96. };
  97. u_int8_t hmac_opad_buffer[64] = {
  98. 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
  99. 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
  100. 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
  101. 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
  102. 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
  103. 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
  104. 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C,
  105. 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C, 0x5C
  106. };
  107. #endif /* HMAC_HACK */
  108. /* add proc entry for this */
  109. struct safe_stats safestats;
  110. #define debug safe_debug
  111. int safe_debug = 0;
  112. module_param(safe_debug, int, 0644);
  113. MODULE_PARM_DESC(safe_debug, "Enable debug");
  114. static void safe_callback(struct safe_softc *, struct safe_ringentry *);
  115. static void safe_feed(struct safe_softc *, struct safe_ringentry *);
  116. #if defined(CONFIG_OCF_RANDOMHARVEST) && !defined(SAFE_NO_RNG)
  117. static void safe_rng_init(struct safe_softc *);
  118. int safe_rngbufsize = 8; /* 32 bytes each read */
  119. module_param(safe_rngbufsize, int, 0644);
  120. MODULE_PARM_DESC(safe_rngbufsize, "RNG polling buffer size (32-bit words)");
  121. int safe_rngmaxalarm = 8; /* max alarms before reset */
  122. module_param(safe_rngmaxalarm, int, 0644);
  123. MODULE_PARM_DESC(safe_rngmaxalarm, "RNG max alarms before reset");
  124. #endif /* SAFE_NO_RNG */
  125. static void safe_totalreset(struct safe_softc *sc);
  126. static int safe_dmamap_aligned(struct safe_softc *sc, const struct safe_operand *op);
  127. static int safe_dmamap_uniform(struct safe_softc *sc, const struct safe_operand *op);
  128. static int safe_free_entry(struct safe_softc *sc, struct safe_ringentry *re);
  129. static int safe_kprocess(device_t dev, struct cryptkop *krp, int hint);
  130. static int safe_kstart(struct safe_softc *sc);
  131. static int safe_ksigbits(struct safe_softc *sc, struct crparam *cr);
  132. static void safe_kfeed(struct safe_softc *sc);
  133. static void safe_kpoll(unsigned long arg);
  134. static void safe_kload_reg(struct safe_softc *sc, u_int32_t off,
  135. u_int32_t len, struct crparam *n);
  136. static int safe_newsession(device_t, u_int32_t *, struct cryptoini *);
  137. static int safe_freesession(device_t, u_int64_t);
  138. static int safe_process(device_t, struct cryptop *, int);
  139. static device_method_t safe_methods = {
  140. /* crypto device methods */
  141. DEVMETHOD(cryptodev_newsession, safe_newsession),
  142. DEVMETHOD(cryptodev_freesession,safe_freesession),
  143. DEVMETHOD(cryptodev_process, safe_process),
  144. DEVMETHOD(cryptodev_kprocess, safe_kprocess),
  145. };
  146. #define READ_REG(sc,r) readl((sc)->sc_base_addr + (r))
  147. #define WRITE_REG(sc,r,val) writel((val), (sc)->sc_base_addr + (r))
  148. #define SAFE_MAX_CHIPS 8
  149. static struct safe_softc *safe_chip_idx[SAFE_MAX_CHIPS];
  150. /*
  151. * split our buffers up into safe DMAable byte fragments to avoid lockup
  152. * bug in 1141 HW on rev 1.0.
  153. */
  154. static int
  155. pci_map_linear(
  156. struct safe_softc *sc,
  157. struct safe_operand *buf,
  158. void *addr,
  159. int len)
  160. {
  161. dma_addr_t tmp;
  162. int chunk, tlen = len;
  163. tmp = pci_map_single(sc->sc_pcidev, addr, len, PCI_DMA_BIDIRECTIONAL);
  164. buf->mapsize += len;
  165. while (len > 0) {
  166. chunk = (len > sc->sc_max_dsize) ? sc->sc_max_dsize : len;
  167. buf->segs[buf->nsegs].ds_addr = tmp;
  168. buf->segs[buf->nsegs].ds_len = chunk;
  169. buf->segs[buf->nsegs].ds_tlen = tlen;
  170. buf->nsegs++;
  171. tmp += chunk;
  172. len -= chunk;
  173. tlen = 0;
  174. }
  175. return 0;
  176. }
  177. /*
  178. * map in a given uio buffer (great on some arches :-)
  179. */
  180. static int
  181. pci_map_uio(struct safe_softc *sc, struct safe_operand *buf, struct uio *uio)
  182. {
  183. struct iovec *iov = uio->uio_iov;
  184. int n;
  185. DPRINTF(("%s()\n", __FUNCTION__));
  186. buf->mapsize = 0;
  187. buf->nsegs = 0;
  188. for (n = 0; n < uio->uio_iovcnt; n++) {
  189. pci_map_linear(sc, buf, iov->iov_base, iov->iov_len);
  190. iov++;
  191. }
  192. /* identify this buffer by the first segment */
  193. buf->map = (void *) buf->segs[0].ds_addr;
  194. return(0);
  195. }
  196. /*
  197. * map in a given sk_buff
  198. */
  199. static int
  200. pci_map_skb(struct safe_softc *sc,struct safe_operand *buf,struct sk_buff *skb)
  201. {
  202. int i;
  203. DPRINTF(("%s()\n", __FUNCTION__));
  204. buf->mapsize = 0;
  205. buf->nsegs = 0;
  206. pci_map_linear(sc, buf, skb->data, skb_headlen(skb));
  207. for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
  208. pci_map_linear(sc, buf,
  209. page_address(skb_shinfo(skb)->frags[i].page) +
  210. skb_shinfo(skb)->frags[i].page_offset,
  211. skb_shinfo(skb)->frags[i].size);
  212. }
  213. /* identify this buffer by the first segment */
  214. buf->map = (void *) buf->segs[0].ds_addr;
  215. return(0);
  216. }
  217. #if 0 /* not needed at this time */
  218. static void
  219. pci_sync_operand(struct safe_softc *sc, struct safe_operand *buf)
  220. {
  221. int i;
  222. DPRINTF(("%s()\n", __FUNCTION__));
  223. for (i = 0; i < buf->nsegs; i++)
  224. pci_dma_sync_single_for_cpu(sc->sc_pcidev, buf->segs[i].ds_addr,
  225. buf->segs[i].ds_len, PCI_DMA_BIDIRECTIONAL);
  226. }
  227. #endif
  228. static void
  229. pci_unmap_operand(struct safe_softc *sc, struct safe_operand *buf)
  230. {
  231. int i;
  232. DPRINTF(("%s()\n", __FUNCTION__));
  233. for (i = 0; i < buf->nsegs; i++) {
  234. if (buf->segs[i].ds_tlen) {
  235. DPRINTF(("%s - unmap %d 0x%x %d\n", __FUNCTION__, i, buf->segs[i].ds_addr, buf->segs[i].ds_tlen));
  236. pci_unmap_single(sc->sc_pcidev, buf->segs[i].ds_addr,
  237. buf->segs[i].ds_tlen, PCI_DMA_BIDIRECTIONAL);
  238. DPRINTF(("%s - unmap %d 0x%x %d done\n", __FUNCTION__, i, buf->segs[i].ds_addr, buf->segs[i].ds_tlen));
  239. }
  240. buf->segs[i].ds_addr = 0;
  241. buf->segs[i].ds_len = 0;
  242. buf->segs[i].ds_tlen = 0;
  243. }
  244. buf->nsegs = 0;
  245. buf->mapsize = 0;
  246. buf->map = 0;
  247. }
  248. /*
  249. * SafeXcel Interrupt routine
  250. */
  251. static irqreturn_t
  252. #if LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,19)
  253. safe_intr(int irq, void *arg)
  254. #else
  255. safe_intr(int irq, void *arg, struct pt_regs *regs)
  256. #endif
  257. {
  258. struct safe_softc *sc = arg;
  259. int stat;
  260. unsigned long flags;
  261. stat = READ_REG(sc, SAFE_HM_STAT);
  262. DPRINTF(("%s(stat=0x%x)\n", __FUNCTION__, stat));
  263. if (stat == 0) /* shared irq, not for us */
  264. return IRQ_NONE;
  265. WRITE_REG(sc, SAFE_HI_CLR, stat); /* IACK */
  266. if ((stat & SAFE_INT_PE_DDONE)) {
  267. /*
  268. * Descriptor(s) done; scan the ring and
  269. * process completed operations.
  270. */
  271. spin_lock_irqsave(&sc->sc_ringmtx, flags);
  272. while (sc->sc_back != sc->sc_front) {
  273. struct safe_ringentry *re = sc->sc_back;
  274. #ifdef SAFE_DEBUG
  275. if (debug) {
  276. safe_dump_ringstate(sc, __func__);
  277. safe_dump_request(sc, __func__, re);
  278. }
  279. #endif
  280. /*
  281. * safe_process marks ring entries that were allocated
  282. * but not used with a csr of zero. This insures the
  283. * ring front pointer never needs to be set backwards
  284. * in the event that an entry is allocated but not used
  285. * because of a setup error.
  286. */
  287. DPRINTF(("%s re->re_desc.d_csr=0x%x\n", __FUNCTION__, re->re_desc.d_csr));
  288. if (re->re_desc.d_csr != 0) {
  289. if (!SAFE_PE_CSR_IS_DONE(re->re_desc.d_csr)) {
  290. DPRINTF(("%s !CSR_IS_DONE\n", __FUNCTION__));
  291. break;
  292. }
  293. if (!SAFE_PE_LEN_IS_DONE(re->re_desc.d_len)) {
  294. DPRINTF(("%s !LEN_IS_DONE\n", __FUNCTION__));
  295. break;
  296. }
  297. sc->sc_nqchip--;
  298. safe_callback(sc, re);
  299. }
  300. if (++(sc->sc_back) == sc->sc_ringtop)
  301. sc->sc_back = sc->sc_ring;
  302. }
  303. spin_unlock_irqrestore(&sc->sc_ringmtx, flags);
  304. }
  305. /*
  306. * Check to see if we got any DMA Error
  307. */
  308. if (stat & SAFE_INT_PE_ERROR) {
  309. printk("%s: dmaerr dmastat %08x\n", device_get_nameunit(sc->sc_dev),
  310. (int)READ_REG(sc, SAFE_PE_DMASTAT));
  311. safestats.st_dmaerr++;
  312. safe_totalreset(sc);
  313. #if 0
  314. safe_feed(sc);
  315. #endif
  316. }
  317. if (sc->sc_needwakeup) { /* XXX check high watermark */
  318. int wakeup = sc->sc_needwakeup & (CRYPTO_SYMQ|CRYPTO_ASYMQ);
  319. DPRINTF(("%s: wakeup crypto %x\n", __func__,
  320. sc->sc_needwakeup));
  321. sc->sc_needwakeup &= ~wakeup;
  322. crypto_unblock(sc->sc_cid, wakeup);
  323. }
  324. return IRQ_HANDLED;
  325. }
  326. /*
  327. * safe_feed() - post a request to chip
  328. */
  329. static void
  330. safe_feed(struct safe_softc *sc, struct safe_ringentry *re)
  331. {
  332. DPRINTF(("%s()\n", __FUNCTION__));
  333. #ifdef SAFE_DEBUG
  334. if (debug) {
  335. safe_dump_ringstate(sc, __func__);
  336. safe_dump_request(sc, __func__, re);
  337. }
  338. #endif
  339. sc->sc_nqchip++;
  340. if (sc->sc_nqchip > safestats.st_maxqchip)
  341. safestats.st_maxqchip = sc->sc_nqchip;
  342. /* poke h/w to check descriptor ring, any value can be written */
  343. WRITE_REG(sc, SAFE_HI_RD_DESCR, 0);
  344. }
  345. #define N(a) (sizeof(a) / sizeof (a[0]))
  346. static void
  347. safe_setup_enckey(struct safe_session *ses, caddr_t key)
  348. {
  349. int i;
  350. bcopy(key, ses->ses_key, ses->ses_klen / 8);
  351. /* PE is little-endian, insure proper byte order */
  352. for (i = 0; i < N(ses->ses_key); i++)
  353. ses->ses_key[i] = htole32(ses->ses_key[i]);
  354. }
  355. static void
  356. safe_setup_mackey(struct safe_session *ses, int algo, caddr_t key, int klen)
  357. {
  358. #ifdef HMAC_HACK
  359. MD5_CTX md5ctx;
  360. SHA1_CTX sha1ctx;
  361. int i;
  362. for (i = 0; i < klen; i++)
  363. key[i] ^= HMAC_IPAD_VAL;
  364. if (algo == CRYPTO_MD5_HMAC) {
  365. MD5Init(&md5ctx);
  366. MD5Update(&md5ctx, key, klen);
  367. MD5Update(&md5ctx, hmac_ipad_buffer, MD5_HMAC_BLOCK_LEN - klen);
  368. bcopy(md5ctx.md5_st8, ses->ses_hminner, sizeof(md5ctx.md5_st8));
  369. } else {
  370. SHA1Init(&sha1ctx);
  371. SHA1Update(&sha1ctx, key, klen);
  372. SHA1Update(&sha1ctx, hmac_ipad_buffer,
  373. SHA1_HMAC_BLOCK_LEN - klen);
  374. bcopy(sha1ctx.h.b32, ses->ses_hminner, sizeof(sha1ctx.h.b32));
  375. }
  376. for (i = 0; i < klen; i++)
  377. key[i] ^= (HMAC_IPAD_VAL ^ HMAC_OPAD_VAL);
  378. if (algo == CRYPTO_MD5_HMAC) {
  379. MD5Init(&md5ctx);
  380. MD5Update(&md5ctx, key, klen);
  381. MD5Update(&md5ctx, hmac_opad_buffer, MD5_HMAC_BLOCK_LEN - klen);
  382. bcopy(md5ctx.md5_st8, ses->ses_hmouter, sizeof(md5ctx.md5_st8));
  383. } else {
  384. SHA1Init(&sha1ctx);
  385. SHA1Update(&sha1ctx, key, klen);
  386. SHA1Update(&sha1ctx, hmac_opad_buffer,
  387. SHA1_HMAC_BLOCK_LEN - klen);
  388. bcopy(sha1ctx.h.b32, ses->ses_hmouter, sizeof(sha1ctx.h.b32));
  389. }
  390. for (i = 0; i < klen; i++)
  391. key[i] ^= HMAC_OPAD_VAL;
  392. #if 0
  393. /*
  394. * this code prevents SHA working on a BE host,
  395. * so it is obviously wrong. I think the byte
  396. * swap setup we do with the chip fixes this for us
  397. */
  398. /* PE is little-endian, insure proper byte order */
  399. for (i = 0; i < N(ses->ses_hminner); i++) {
  400. ses->ses_hminner[i] = htole32(ses->ses_hminner[i]);
  401. ses->ses_hmouter[i] = htole32(ses->ses_hmouter[i]);
  402. }
  403. #endif
  404. #else /* HMAC_HACK */
  405. printk("safe: md5/sha not implemented\n");
  406. #endif /* HMAC_HACK */
  407. }
  408. #undef N
  409. /*
  410. * Allocate a new 'session' and return an encoded session id. 'sidp'
  411. * contains our registration id, and should contain an encoded session
  412. * id on successful allocation.
  413. */
  414. static int
  415. safe_newsession(device_t dev, u_int32_t *sidp, struct cryptoini *cri)
  416. {
  417. struct safe_softc *sc = device_get_softc(dev);
  418. struct cryptoini *c, *encini = NULL, *macini = NULL;
  419. struct safe_session *ses = NULL;
  420. int sesn;
  421. DPRINTF(("%s()\n", __FUNCTION__));
  422. if (sidp == NULL || cri == NULL || sc == NULL)
  423. return (EINVAL);
  424. for (c = cri; c != NULL; c = c->cri_next) {
  425. if (c->cri_alg == CRYPTO_MD5_HMAC ||
  426. c->cri_alg == CRYPTO_SHA1_HMAC ||
  427. c->cri_alg == CRYPTO_NULL_HMAC) {
  428. if (macini)
  429. return (EINVAL);
  430. macini = c;
  431. } else if (c->cri_alg == CRYPTO_DES_CBC ||
  432. c->cri_alg == CRYPTO_3DES_CBC ||
  433. c->cri_alg == CRYPTO_AES_CBC ||
  434. c->cri_alg == CRYPTO_NULL_CBC) {
  435. if (encini)
  436. return (EINVAL);
  437. encini = c;
  438. } else
  439. return (EINVAL);
  440. }
  441. if (encini == NULL && macini == NULL)
  442. return (EINVAL);
  443. if (encini) { /* validate key length */
  444. switch (encini->cri_alg) {
  445. case CRYPTO_DES_CBC:
  446. if (encini->cri_klen != 64)
  447. return (EINVAL);
  448. break;
  449. case CRYPTO_3DES_CBC:
  450. if (encini->cri_klen != 192)
  451. return (EINVAL);
  452. break;
  453. case CRYPTO_AES_CBC:
  454. if (encini->cri_klen != 128 &&
  455. encini->cri_klen != 192 &&
  456. encini->cri_klen != 256)
  457. return (EINVAL);
  458. break;
  459. }
  460. }
  461. if (sc->sc_sessions == NULL) {
  462. ses = sc->sc_sessions = (struct safe_session *)
  463. kmalloc(sizeof(struct safe_session), SLAB_ATOMIC);
  464. if (ses == NULL)
  465. return (ENOMEM);
  466. memset(ses, 0, sizeof(struct safe_session));
  467. sesn = 0;
  468. sc->sc_nsessions = 1;
  469. } else {
  470. for (sesn = 0; sesn < sc->sc_nsessions; sesn++) {
  471. if (sc->sc_sessions[sesn].ses_used == 0) {
  472. ses = &sc->sc_sessions[sesn];
  473. break;
  474. }
  475. }
  476. if (ses == NULL) {
  477. sesn = sc->sc_nsessions;
  478. ses = (struct safe_session *)
  479. kmalloc((sesn + 1) * sizeof(struct safe_session), SLAB_ATOMIC);
  480. if (ses == NULL)
  481. return (ENOMEM);
  482. memset(ses, 0, (sesn + 1) * sizeof(struct safe_session));
  483. bcopy(sc->sc_sessions, ses, sesn *
  484. sizeof(struct safe_session));
  485. bzero(sc->sc_sessions, sesn *
  486. sizeof(struct safe_session));
  487. kfree(sc->sc_sessions);
  488. sc->sc_sessions = ses;
  489. ses = &sc->sc_sessions[sesn];
  490. sc->sc_nsessions++;
  491. }
  492. }
  493. bzero(ses, sizeof(struct safe_session));
  494. ses->ses_used = 1;
  495. if (encini) {
  496. /* get an IV */
  497. /* XXX may read fewer than requested */
  498. read_random(ses->ses_iv, sizeof(ses->ses_iv));
  499. ses->ses_klen = encini->cri_klen;
  500. if (encini->cri_key != NULL)
  501. safe_setup_enckey(ses, encini->cri_key);
  502. }
  503. if (macini) {
  504. ses->ses_mlen = macini->cri_mlen;
  505. if (ses->ses_mlen == 0) {
  506. if (macini->cri_alg == CRYPTO_MD5_HMAC)
  507. ses->ses_mlen = MD5_HASH_LEN;
  508. else
  509. ses->ses_mlen = SHA1_HASH_LEN;
  510. }
  511. if (macini->cri_key != NULL) {
  512. safe_setup_mackey(ses, macini->cri_alg, macini->cri_key,
  513. macini->cri_klen / 8);
  514. }
  515. }
  516. *sidp = SAFE_SID(device_get_unit(sc->sc_dev), sesn);
  517. return (0);
  518. }
  519. /*
  520. * Deallocate a session.
  521. */
  522. static int
  523. safe_freesession(device_t dev, u_int64_t tid)
  524. {
  525. struct safe_softc *sc = device_get_softc(dev);
  526. int session, ret;
  527. u_int32_t sid = ((u_int32_t) tid) & 0xffffffff;
  528. DPRINTF(("%s()\n", __FUNCTION__));
  529. if (sc == NULL)
  530. return (EINVAL);
  531. session = SAFE_SESSION(sid);
  532. if (session < sc->sc_nsessions) {
  533. bzero(&sc->sc_sessions[session], sizeof(sc->sc_sessions[session]));
  534. ret = 0;
  535. } else
  536. ret = EINVAL;
  537. return (ret);
  538. }
  539. static int
  540. safe_process(device_t dev, struct cryptop *crp, int hint)
  541. {
  542. struct safe_softc *sc = device_get_softc(dev);
  543. int err = 0, i, nicealign, uniform;
  544. struct cryptodesc *crd1, *crd2, *maccrd, *enccrd;
  545. int bypass, oplen, ivsize;
  546. caddr_t iv;
  547. int16_t coffset;
  548. struct safe_session *ses;
  549. struct safe_ringentry *re;
  550. struct safe_sarec *sa;
  551. struct safe_pdesc *pd;
  552. u_int32_t cmd0, cmd1, staterec;
  553. unsigned long flags;
  554. DPRINTF(("%s()\n", __FUNCTION__));
  555. if (crp == NULL || crp->crp_callback == NULL || sc == NULL) {
  556. safestats.st_invalid++;
  557. return (EINVAL);
  558. }
  559. if (SAFE_SESSION(crp->crp_sid) >= sc->sc_nsessions) {
  560. safestats.st_badsession++;
  561. return (EINVAL);
  562. }
  563. spin_lock_irqsave(&sc->sc_ringmtx, flags);
  564. if (sc->sc_front == sc->sc_back && sc->sc_nqchip != 0) {
  565. safestats.st_ringfull++;
  566. sc->sc_needwakeup |= CRYPTO_SYMQ;
  567. spin_unlock_irqrestore(&sc->sc_ringmtx, flags);
  568. return (ERESTART);
  569. }
  570. re = sc->sc_front;
  571. staterec = re->re_sa.sa_staterec; /* save */
  572. /* NB: zero everything but the PE descriptor */
  573. bzero(&re->re_sa, sizeof(struct safe_ringentry) - sizeof(re->re_desc));
  574. re->re_sa.sa_staterec = staterec; /* restore */
  575. re->re_crp = crp;
  576. re->re_sesn = SAFE_SESSION(crp->crp_sid);
  577. re->re_src.nsegs = 0;
  578. re->re_dst.nsegs = 0;
  579. if (crp->crp_flags & CRYPTO_F_SKBUF) {
  580. re->re_src_skb = (struct sk_buff *)crp->crp_buf;
  581. re->re_dst_skb = (struct sk_buff *)crp->crp_buf;
  582. } else if (crp->crp_flags & CRYPTO_F_IOV) {
  583. re->re_src_io = (struct uio *)crp->crp_buf;
  584. re->re_dst_io = (struct uio *)crp->crp_buf;
  585. } else {
  586. safestats.st_badflags++;
  587. err = EINVAL;
  588. goto errout; /* XXX we don't handle contiguous blocks! */
  589. }
  590. sa = &re->re_sa;
  591. ses = &sc->sc_sessions[re->re_sesn];
  592. crd1 = crp->crp_desc;
  593. if (crd1 == NULL) {
  594. safestats.st_nodesc++;
  595. err = EINVAL;
  596. goto errout;
  597. }
  598. crd2 = crd1->crd_next;
  599. cmd0 = SAFE_SA_CMD0_BASIC; /* basic group operation */
  600. cmd1 = 0;
  601. if (crd2 == NULL) {
  602. if (crd1->crd_alg == CRYPTO_MD5_HMAC ||
  603. crd1->crd_alg == CRYPTO_SHA1_HMAC ||
  604. crd1->crd_alg == CRYPTO_NULL_HMAC) {
  605. maccrd = crd1;
  606. enccrd = NULL;
  607. cmd0 |= SAFE_SA_CMD0_OP_HASH;
  608. } else if (crd1->crd_alg == CRYPTO_DES_CBC ||
  609. crd1->crd_alg == CRYPTO_3DES_CBC ||
  610. crd1->crd_alg == CRYPTO_AES_CBC ||
  611. crd1->crd_alg == CRYPTO_NULL_CBC) {
  612. maccrd = NULL;
  613. enccrd = crd1;
  614. cmd0 |= SAFE_SA_CMD0_OP_CRYPT;
  615. } else {
  616. safestats.st_badalg++;
  617. err = EINVAL;
  618. goto errout;
  619. }
  620. } else {
  621. if ((crd1->crd_alg == CRYPTO_MD5_HMAC ||
  622. crd1->crd_alg == CRYPTO_SHA1_HMAC ||
  623. crd1->crd_alg == CRYPTO_NULL_HMAC) &&
  624. (crd2->crd_alg == CRYPTO_DES_CBC ||
  625. crd2->crd_alg == CRYPTO_3DES_CBC ||
  626. crd2->crd_alg == CRYPTO_AES_CBC ||
  627. crd2->crd_alg == CRYPTO_NULL_CBC) &&
  628. ((crd2->crd_flags & CRD_F_ENCRYPT) == 0)) {
  629. maccrd = crd1;
  630. enccrd = crd2;
  631. } else if ((crd1->crd_alg == CRYPTO_DES_CBC ||
  632. crd1->crd_alg == CRYPTO_3DES_CBC ||
  633. crd1->crd_alg == CRYPTO_AES_CBC ||
  634. crd1->crd_alg == CRYPTO_NULL_CBC) &&
  635. (crd2->crd_alg == CRYPTO_MD5_HMAC ||
  636. crd2->crd_alg == CRYPTO_SHA1_HMAC ||
  637. crd2->crd_alg == CRYPTO_NULL_HMAC) &&
  638. (crd1->crd_flags & CRD_F_ENCRYPT)) {
  639. enccrd = crd1;
  640. maccrd = crd2;
  641. } else {
  642. safestats.st_badalg++;
  643. err = EINVAL;
  644. goto errout;
  645. }
  646. cmd0 |= SAFE_SA_CMD0_OP_BOTH;
  647. }
  648. if (enccrd) {
  649. if (enccrd->crd_flags & CRD_F_KEY_EXPLICIT)
  650. safe_setup_enckey(ses, enccrd->crd_key);
  651. if (enccrd->crd_alg == CRYPTO_DES_CBC) {
  652. cmd0 |= SAFE_SA_CMD0_DES;
  653. cmd1 |= SAFE_SA_CMD1_CBC;
  654. ivsize = 2*sizeof(u_int32_t);
  655. } else if (enccrd->crd_alg == CRYPTO_3DES_CBC) {
  656. cmd0 |= SAFE_SA_CMD0_3DES;
  657. cmd1 |= SAFE_SA_CMD1_CBC;
  658. ivsize = 2*sizeof(u_int32_t);
  659. } else if (enccrd->crd_alg == CRYPTO_AES_CBC) {
  660. cmd0 |= SAFE_SA_CMD0_AES;
  661. cmd1 |= SAFE_SA_CMD1_CBC;
  662. if (ses->ses_klen == 128)
  663. cmd1 |= SAFE_SA_CMD1_AES128;
  664. else if (ses->ses_klen == 192)
  665. cmd1 |= SAFE_SA_CMD1_AES192;
  666. else
  667. cmd1 |= SAFE_SA_CMD1_AES256;
  668. ivsize = 4*sizeof(u_int32_t);
  669. } else {
  670. cmd0 |= SAFE_SA_CMD0_CRYPT_NULL;
  671. ivsize = 0;
  672. }
  673. /*
  674. * Setup encrypt/decrypt state. When using basic ops
  675. * we can't use an inline IV because hash/crypt offset
  676. * must be from the end of the IV to the start of the
  677. * crypt data and this leaves out the preceding header
  678. * from the hash calculation. Instead we place the IV
  679. * in the state record and set the hash/crypt offset to
  680. * copy both the header+IV.
  681. */
  682. if (enccrd->crd_flags & CRD_F_ENCRYPT) {
  683. cmd0 |= SAFE_SA_CMD0_OUTBOUND;
  684. if (enccrd->crd_flags & CRD_F_IV_EXPLICIT)
  685. iv = enccrd->crd_iv;
  686. else
  687. iv = (caddr_t) ses->ses_iv;
  688. if ((enccrd->crd_flags & CRD_F_IV_PRESENT) == 0) {
  689. crypto_copyback(crp->crp_flags, crp->crp_buf,
  690. enccrd->crd_inject, ivsize, iv);
  691. }
  692. bcopy(iv, re->re_sastate.sa_saved_iv, ivsize);
  693. /* make iv LE */
  694. for (i = 0; i < ivsize/sizeof(re->re_sastate.sa_saved_iv[0]); i++)
  695. re->re_sastate.sa_saved_iv[i] =
  696. cpu_to_le32(re->re_sastate.sa_saved_iv[i]);
  697. cmd0 |= SAFE_SA_CMD0_IVLD_STATE | SAFE_SA_CMD0_SAVEIV;
  698. re->re_flags |= SAFE_QFLAGS_COPYOUTIV;
  699. } else {
  700. cmd0 |= SAFE_SA_CMD0_INBOUND;
  701. if (enccrd->crd_flags & CRD_F_IV_EXPLICIT) {
  702. bcopy(enccrd->crd_iv,
  703. re->re_sastate.sa_saved_iv, ivsize);
  704. } else {
  705. crypto_copydata(crp->crp_flags, crp->crp_buf,
  706. enccrd->crd_inject, ivsize,
  707. (caddr_t)re->re_sastate.sa_saved_iv);
  708. }
  709. /* make iv LE */
  710. for (i = 0; i < ivsize/sizeof(re->re_sastate.sa_saved_iv[0]); i++)
  711. re->re_sastate.sa_saved_iv[i] =
  712. cpu_to_le32(re->re_sastate.sa_saved_iv[i]);
  713. cmd0 |= SAFE_SA_CMD0_IVLD_STATE;
  714. }
  715. /*
  716. * For basic encryption use the zero pad algorithm.
  717. * This pads results to an 8-byte boundary and
  718. * suppresses padding verification for inbound (i.e.
  719. * decrypt) operations.
  720. *
  721. * NB: Not sure if the 8-byte pad boundary is a problem.
  722. */
  723. cmd0 |= SAFE_SA_CMD0_PAD_ZERO;
  724. /* XXX assert key bufs have the same size */
  725. bcopy(ses->ses_key, sa->sa_key, sizeof(sa->sa_key));
  726. }
  727. if (maccrd) {
  728. if (maccrd->crd_flags & CRD_F_KEY_EXPLICIT) {
  729. safe_setup_mackey(ses, maccrd->crd_alg,
  730. maccrd->crd_key, maccrd->crd_klen / 8);
  731. }
  732. if (maccrd->crd_alg == CRYPTO_MD5_HMAC) {
  733. cmd0 |= SAFE_SA_CMD0_MD5;
  734. cmd1 |= SAFE_SA_CMD1_HMAC; /* NB: enable HMAC */
  735. } else if (maccrd->crd_alg == CRYPTO_SHA1_HMAC) {
  736. cmd0 |= SAFE_SA_CMD0_SHA1;
  737. cmd1 |= SAFE_SA_CMD1_HMAC; /* NB: enable HMAC */
  738. } else {
  739. cmd0 |= SAFE_SA_CMD0_HASH_NULL;
  740. }
  741. /*
  742. * Digest data is loaded from the SA and the hash
  743. * result is saved to the state block where we
  744. * retrieve it for return to the caller.
  745. */
  746. /* XXX assert digest bufs have the same size */
  747. bcopy(ses->ses_hminner, sa->sa_indigest,
  748. sizeof(sa->sa_indigest));
  749. bcopy(ses->ses_hmouter, sa->sa_outdigest,
  750. sizeof(sa->sa_outdigest));
  751. cmd0 |= SAFE_SA_CMD0_HSLD_SA | SAFE_SA_CMD0_SAVEHASH;
  752. re->re_flags |= SAFE_QFLAGS_COPYOUTICV;
  753. }
  754. if (enccrd && maccrd) {
  755. /*
  756. * The offset from hash data to the start of
  757. * crypt data is the difference in the skips.
  758. */
  759. bypass = maccrd->crd_skip;
  760. coffset = enccrd->crd_skip - maccrd->crd_skip;
  761. if (coffset < 0) {
  762. DPRINTF(("%s: hash does not precede crypt; "
  763. "mac skip %u enc skip %u\n",
  764. __func__, maccrd->crd_skip, enccrd->crd_skip));
  765. safestats.st_skipmismatch++;
  766. err = EINVAL;
  767. goto errout;
  768. }
  769. oplen = enccrd->crd_skip + enccrd->crd_len;
  770. if (maccrd->crd_skip + maccrd->crd_len != oplen) {
  771. DPRINTF(("%s: hash amount %u != crypt amount %u\n",
  772. __func__, maccrd->crd_skip + maccrd->crd_len,
  773. oplen));
  774. safestats.st_lenmismatch++;
  775. err = EINVAL;
  776. goto errout;
  777. }
  778. #ifdef SAFE_DEBUG
  779. if (debug) {
  780. printf("mac: skip %d, len %d, inject %d\n",
  781. maccrd->crd_skip, maccrd->crd_len,
  782. maccrd->crd_inject);
  783. printf("enc: skip %d, len %d, inject %d\n",
  784. enccrd->crd_skip, enccrd->crd_len,
  785. enccrd->crd_inject);
  786. printf("bypass %d coffset %d oplen %d\n",
  787. bypass, coffset, oplen);
  788. }
  789. #endif
  790. if (coffset & 3) { /* offset must be 32-bit aligned */
  791. DPRINTF(("%s: coffset %u misaligned\n",
  792. __func__, coffset));
  793. safestats.st_coffmisaligned++;
  794. err = EINVAL;
  795. goto errout;
  796. }
  797. coffset >>= 2;
  798. if (coffset > 255) { /* offset must be <256 dwords */
  799. DPRINTF(("%s: coffset %u too big\n",
  800. __func__, coffset));
  801. safestats.st_cofftoobig++;
  802. err = EINVAL;
  803. goto errout;
  804. }
  805. /*
  806. * Tell the hardware to copy the header to the output.
  807. * The header is defined as the data from the end of
  808. * the bypass to the start of data to be encrypted.
  809. * Typically this is the inline IV. Note that you need
  810. * to do this even if src+dst are the same; it appears
  811. * that w/o this bit the crypted data is written
  812. * immediately after the bypass data.
  813. */
  814. cmd1 |= SAFE_SA_CMD1_HDRCOPY;
  815. /*
  816. * Disable IP header mutable bit handling. This is
  817. * needed to get correct HMAC calculations.
  818. */
  819. cmd1 |= SAFE_SA_CMD1_MUTABLE;
  820. } else {
  821. if (enccrd) {
  822. bypass = enccrd->crd_skip;
  823. oplen = bypass + enccrd->crd_len;
  824. } else {
  825. bypass = maccrd->crd_skip;
  826. oplen = bypass + maccrd->crd_len;
  827. }
  828. coffset = 0;
  829. }
  830. /* XXX verify multiple of 4 when using s/g */
  831. if (bypass > 96) { /* bypass offset must be <= 96 bytes */
  832. DPRINTF(("%s: bypass %u too big\n", __func__, bypass));
  833. safestats.st_bypasstoobig++;
  834. err = EINVAL;
  835. goto errout;
  836. }
  837. if (crp->crp_flags & CRYPTO_F_SKBUF) {
  838. if (pci_map_skb(sc, &re->re_src, re->re_src_skb)) {
  839. safestats.st_noload++;
  840. err = ENOMEM;
  841. goto errout;
  842. }
  843. } else if (crp->crp_flags & CRYPTO_F_IOV) {
  844. if (pci_map_uio(sc, &re->re_src, re->re_src_io)) {
  845. safestats.st_noload++;
  846. err = ENOMEM;
  847. goto errout;
  848. }
  849. }
  850. nicealign = safe_dmamap_aligned(sc, &re->re_src);
  851. uniform = safe_dmamap_uniform(sc, &re->re_src);
  852. DPRINTF(("src nicealign %u uniform %u nsegs %u\n",
  853. nicealign, uniform, re->re_src.nsegs));
  854. if (re->re_src.nsegs > 1) {
  855. re->re_desc.d_src = sc->sc_spalloc.dma_paddr +
  856. ((caddr_t) sc->sc_spfree - (caddr_t) sc->sc_spring);
  857. for (i = 0; i < re->re_src_nsegs; i++) {
  858. /* NB: no need to check if there's space */
  859. pd = sc->sc_spfree;
  860. if (++(sc->sc_spfree) == sc->sc_springtop)
  861. sc->sc_spfree = sc->sc_spring;
  862. KASSERT((pd->pd_flags&3) == 0 ||
  863. (pd->pd_flags&3) == SAFE_PD_DONE,
  864. ("bogus source particle descriptor; flags %x",
  865. pd->pd_flags));
  866. pd->pd_addr = re->re_src_segs[i].ds_addr;
  867. pd->pd_size = re->re_src_segs[i].ds_len;
  868. pd->pd_flags = SAFE_PD_READY;
  869. }
  870. cmd0 |= SAFE_SA_CMD0_IGATHER;
  871. } else {
  872. /*
  873. * No need for gather, reference the operand directly.
  874. */
  875. re->re_desc.d_src = re->re_src_segs[0].ds_addr;
  876. }
  877. if (enccrd == NULL && maccrd != NULL) {
  878. /*
  879. * Hash op; no destination needed.
  880. */
  881. } else {
  882. if (crp->crp_flags & (CRYPTO_F_IOV|CRYPTO_F_SKBUF)) {
  883. if (!nicealign) {
  884. safestats.st_iovmisaligned++;
  885. err = EINVAL;
  886. goto errout;
  887. }
  888. if (uniform != 1) {
  889. device_printf(sc->sc_dev, "!uniform source\n");
  890. if (!uniform) {
  891. /*
  892. * There's no way to handle the DMA
  893. * requirements with this uio. We
  894. * could create a separate DMA area for
  895. * the result and then copy it back,
  896. * but for now we just bail and return
  897. * an error. Note that uio requests
  898. * > SAFE_MAX_DSIZE are handled because
  899. * the DMA map and segment list for the
  900. * destination wil result in a
  901. * destination particle list that does
  902. * the necessary scatter DMA.
  903. */
  904. safestats.st_iovnotuniform++;
  905. err = EINVAL;
  906. goto errout;
  907. }
  908. } else
  909. re->re_dst = re->re_src;
  910. } else {
  911. safestats.st_badflags++;
  912. err = EINVAL;
  913. goto errout;
  914. }
  915. if (re->re_dst.nsegs > 1) {
  916. re->re_desc.d_dst = sc->sc_dpalloc.dma_paddr +
  917. ((caddr_t) sc->sc_dpfree - (caddr_t) sc->sc_dpring);
  918. for (i = 0; i < re->re_dst_nsegs; i++) {
  919. pd = sc->sc_dpfree;
  920. KASSERT((pd->pd_flags&3) == 0 ||
  921. (pd->pd_flags&3) == SAFE_PD_DONE,
  922. ("bogus dest particle descriptor; flags %x",
  923. pd->pd_flags));
  924. if (++(sc->sc_dpfree) == sc->sc_dpringtop)
  925. sc->sc_dpfree = sc->sc_dpring;
  926. pd->pd_addr = re->re_dst_segs[i].ds_addr;
  927. pd->pd_flags = SAFE_PD_READY;
  928. }
  929. cmd0 |= SAFE_SA_CMD0_OSCATTER;
  930. } else {
  931. /*
  932. * No need for scatter, reference the operand directly.
  933. */
  934. re->re_desc.d_dst = re->re_dst_segs[0].ds_addr;
  935. }
  936. }
  937. /*
  938. * All done with setup; fillin the SA command words
  939. * and the packet engine descriptor. The operation
  940. * is now ready for submission to the hardware.
  941. */
  942. sa->sa_cmd0 = cmd0 | SAFE_SA_CMD0_IPCI | SAFE_SA_CMD0_OPCI;
  943. sa->sa_cmd1 = cmd1
  944. | (coffset << SAFE_SA_CMD1_OFFSET_S)
  945. | SAFE_SA_CMD1_SAREV1 /* Rev 1 SA data structure */
  946. | SAFE_SA_CMD1_SRPCI
  947. ;
  948. /*
  949. * NB: the order of writes is important here. In case the
  950. * chip is scanning the ring because of an outstanding request
  951. * it might nab this one too. In that case we need to make
  952. * sure the setup is complete before we write the length
  953. * field of the descriptor as it signals the descriptor is
  954. * ready for processing.
  955. */
  956. re->re_desc.d_csr = SAFE_PE_CSR_READY | SAFE_PE_CSR_SAPCI;
  957. if (maccrd)
  958. re->re_desc.d_csr |= SAFE_PE_CSR_LOADSA | SAFE_PE_CSR_HASHFINAL;
  959. wmb();
  960. re->re_desc.d_len = oplen
  961. | SAFE_PE_LEN_READY
  962. | (bypass << SAFE_PE_LEN_BYPASS_S)
  963. ;
  964. safestats.st_ipackets++;
  965. safestats.st_ibytes += oplen;
  966. if (++(sc->sc_front) == sc->sc_ringtop)
  967. sc->sc_front = sc->sc_ring;
  968. /* XXX honor batching */
  969. safe_feed(sc, re);
  970. spin_unlock_irqrestore(&sc->sc_ringmtx, flags);
  971. return (0);
  972. errout:
  973. if (re->re_src.map != re->re_dst.map)
  974. pci_unmap_operand(sc, &re->re_dst);
  975. if (re->re_src.map)
  976. pci_unmap_operand(sc, &re->re_src);
  977. spin_unlock_irqrestore(&sc->sc_ringmtx, flags);
  978. if (err != ERESTART) {
  979. crp->crp_etype = err;
  980. crypto_done(crp);
  981. } else {
  982. sc->sc_needwakeup |= CRYPTO_SYMQ;
  983. }
  984. return (err);
  985. }
  986. static void
  987. safe_callback(struct safe_softc *sc, struct safe_ringentry *re)
  988. {
  989. struct cryptop *crp = (struct cryptop *)re->re_crp;
  990. struct cryptodesc *crd;
  991. DPRINTF(("%s()\n", __FUNCTION__));
  992. safestats.st_opackets++;
  993. safestats.st_obytes += re->re_dst.mapsize;
  994. if (re->re_desc.d_csr & SAFE_PE_CSR_STATUS) {
  995. device_printf(sc->sc_dev, "csr 0x%x cmd0 0x%x cmd1 0x%x\n",
  996. re->re_desc.d_csr,
  997. re->re_sa.sa_cmd0, re->re_sa.sa_cmd1);
  998. safestats.st_peoperr++;
  999. crp->crp_etype = EIO; /* something more meaningful? */
  1000. }
  1001. if (re->re_dst.map != NULL && re->re_dst.map != re->re_src.map)
  1002. pci_unmap_operand(sc, &re->re_dst);
  1003. pci_unmap_operand(sc, &re->re_src);
  1004. /*
  1005. * If result was written to a differet mbuf chain, swap
  1006. * it in as the return value and reclaim the original.
  1007. */
  1008. if ((crp->crp_flags & CRYPTO_F_SKBUF) && re->re_src_skb != re->re_dst_skb) {
  1009. device_printf(sc->sc_dev, "no CRYPTO_F_SKBUF swapping support\n");
  1010. /* kfree_skb(skb) */
  1011. /* crp->crp_buf = (caddr_t)re->re_dst_skb */
  1012. return;
  1013. }
  1014. if (re->re_flags & SAFE_QFLAGS_COPYOUTIV) {
  1015. /* copy out IV for future use */
  1016. for (crd = crp->crp_desc; crd; crd = crd->crd_next) {
  1017. int i;
  1018. int ivsize;
  1019. if (crd->crd_alg == CRYPTO_DES_CBC ||
  1020. crd->crd_alg == CRYPTO_3DES_CBC) {
  1021. ivsize = 2*sizeof(u_int32_t);
  1022. } else if (crd->crd_alg == CRYPTO_AES_CBC) {
  1023. ivsize = 4*sizeof(u_int32_t);
  1024. } else
  1025. continue;
  1026. crypto_copydata(crp->crp_flags, crp->crp_buf,
  1027. crd->crd_skip + crd->crd_len - ivsize, ivsize,
  1028. (caddr_t)sc->sc_sessions[re->re_sesn].ses_iv);
  1029. for (i = 0;
  1030. i < ivsize/sizeof(sc->sc_sessions[re->re_sesn].ses_iv[0]);
  1031. i++)
  1032. sc->sc_sessions[re->re_sesn].ses_iv[i] =
  1033. cpu_to_le32(sc->sc_sessions[re->re_sesn].ses_iv[i]);
  1034. break;
  1035. }
  1036. }
  1037. if (re->re_flags & SAFE_QFLAGS_COPYOUTICV) {
  1038. /* copy out ICV result */
  1039. for (crd = crp->crp_desc; crd; crd = crd->crd_next) {
  1040. if (!(crd->crd_alg == CRYPTO_MD5_HMAC ||
  1041. crd->crd_alg == CRYPTO_SHA1_HMAC ||
  1042. crd->crd_alg == CRYPTO_NULL_HMAC))
  1043. continue;
  1044. if (crd->crd_alg == CRYPTO_SHA1_HMAC) {
  1045. /*
  1046. * SHA-1 ICV's are byte-swapped; fix 'em up
  1047. * before copy them to their destination.
  1048. */
  1049. re->re_sastate.sa_saved_indigest[0] =
  1050. cpu_to_be32(re->re_sastate.sa_saved_indigest[0]);
  1051. re->re_sastate.sa_saved_indigest[1] =
  1052. cpu_to_be32(re->re_sastate.sa_saved_indigest[1]);
  1053. re->re_sastate.sa_saved_indigest[2] =
  1054. cpu_to_be32(re->re_sastate.sa_saved_indigest[2]);
  1055. } else {
  1056. re->re_sastate.sa_saved_indigest[0] =
  1057. cpu_to_le32(re->re_sastate.sa_saved_indigest[0]);
  1058. re->re_sastate.sa_saved_indigest[1] =
  1059. cpu_to_le32(re->re_sastate.sa_saved_indigest[1]);
  1060. re->re_sastate.sa_saved_indigest[2] =
  1061. cpu_to_le32(re->re_sastate.sa_saved_indigest[2]);
  1062. }
  1063. crypto_copyback(crp->crp_flags, crp->crp_buf,
  1064. crd->crd_inject,
  1065. sc->sc_sessions[re->re_sesn].ses_mlen,
  1066. (caddr_t)re->re_sastate.sa_saved_indigest);
  1067. break;
  1068. }
  1069. }
  1070. crypto_done(crp);
  1071. }
  1072. #if defined(CONFIG_OCF_RANDOMHARVEST) && !defined(SAFE_NO_RNG)
  1073. #define SAFE_RNG_MAXWAIT 1000
  1074. static void
  1075. safe_rng_init(struct safe_softc *sc)
  1076. {
  1077. u_int32_t w, v;
  1078. int i;
  1079. DPRINTF(("%s()\n", __FUNCTION__));
  1080. WRITE_REG(sc, SAFE_RNG_CTRL, 0);
  1081. /* use default value according to the manual */
  1082. WRITE_REG(sc, SAFE_RNG_CNFG, 0x834); /* magic from SafeNet */
  1083. WRITE_REG(sc, SAFE_RNG_ALM_CNT, 0);
  1084. /*
  1085. * There is a bug in rev 1.0 of the 1140 that when the RNG
  1086. * is brought out of reset the ready status flag does not
  1087. * work until the RNG has finished its internal initialization.
  1088. *
  1089. * So in order to determine the device is through its
  1090. * initialization we must read the data register, using the
  1091. * status reg in the read in case it is initialized. Then read
  1092. * the data register until it changes from the first read.
  1093. * Once it changes read the data register until it changes
  1094. * again. At this time the RNG is considered initialized.
  1095. * This could take between 750ms - 1000ms in time.
  1096. */
  1097. i = 0;
  1098. w = READ_REG(sc, SAFE_RNG_OUT);
  1099. do {
  1100. v = READ_REG(sc, SAFE_RNG_OUT);
  1101. if (v != w) {
  1102. w = v;
  1103. break;
  1104. }
  1105. DELAY(10);
  1106. } while (++i < SAFE_RNG_MAXWAIT);
  1107. /* Wait Until data changes again */
  1108. i = 0;
  1109. do {
  1110. v = READ_REG(sc, SAFE_RNG_OUT);
  1111. if (v != w)
  1112. break;
  1113. DELAY(10);
  1114. } while (++i < SAFE_RNG_MAXWAIT);
  1115. }
  1116. static __inline void
  1117. safe_rng_disable_short_cycle(struct safe_softc *sc)
  1118. {
  1119. DPRINTF(("%s()\n", __FUNCTION__));
  1120. WRITE_REG(sc, SAFE_RNG_CTRL,
  1121. READ_REG(sc, SAFE_RNG_CTRL) &~ SAFE_RNG_CTRL_SHORTEN);
  1122. }
  1123. static __inline void
  1124. safe_rng_enable_short_cycle(struct safe_softc *sc)
  1125. {
  1126. DPRINTF(("%s()\n", __FUNCTION__));
  1127. WRITE_REG(sc, SAFE_RNG_CTRL,
  1128. READ_REG(sc, SAFE_RNG_CTRL) | SAFE_RNG_CTRL_SHORTEN);
  1129. }
  1130. static __inline u_int32_t
  1131. safe_rng_read(struct safe_softc *sc)
  1132. {
  1133. int i;
  1134. i = 0;
  1135. while (READ_REG(sc, SAFE_RNG_STAT) != 0 && ++i < SAFE_RNG_MAXWAIT)
  1136. ;
  1137. return READ_REG(sc, SAFE_RNG_OUT);
  1138. }
  1139. static int
  1140. safe_read_random(void *arg, u_int32_t *buf, int maxwords)
  1141. {
  1142. struct safe_softc *sc = (struct safe_softc *) arg;
  1143. int i, rc;
  1144. DPRINTF(("%s()\n", __FUNCTION__));
  1145. safestats.st_rng++;
  1146. /*
  1147. * Fetch the next block of data.
  1148. */
  1149. if (maxwords > safe_rngbufsize)
  1150. maxwords = safe_rngbufsize;
  1151. if (maxwords > SAFE_RNG_MAXBUFSIZ)
  1152. maxwords = SAFE_RNG_MAXBUFSIZ;
  1153. retry:
  1154. /* read as much as we can */
  1155. for (rc = 0; rc < maxwords; rc++) {
  1156. if (READ_REG(sc, SAFE_RNG_STAT) != 0)
  1157. break;
  1158. buf[rc] = READ_REG(sc, SAFE_RNG_OUT);
  1159. }
  1160. if (rc == 0)
  1161. return 0;
  1162. /*
  1163. * Check the comparator alarm count and reset the h/w if
  1164. * it exceeds our threshold. This guards against the
  1165. * hardware oscillators resonating with external signals.
  1166. */
  1167. if (READ_REG(sc, SAFE_RNG_ALM_CNT) > safe_rngmaxalarm) {
  1168. u_int32_t freq_inc, w;
  1169. DPRINTF(("%s: alarm count %u exceeds threshold %u\n", __func__,
  1170. (unsigned)READ_REG(sc, SAFE_RNG_ALM_CNT), safe_rngmaxalarm));
  1171. safestats.st_rngalarm++;
  1172. safe_rng_enable_short_cycle(sc);
  1173. freq_inc = 18;
  1174. for (i = 0; i < 64; i++) {
  1175. w = READ_REG(sc, SAFE_RNG_CNFG);
  1176. freq_inc = ((w + freq_inc) & 0x3fL);
  1177. w = ((w & ~0x3fL) | freq_inc);
  1178. WRITE_REG(sc, SAFE_RNG_CNFG, w);
  1179. WRITE_REG(sc, SAFE_RNG_ALM_CNT, 0);
  1180. (void) safe_rng_read(sc);
  1181. DELAY(25);
  1182. if (READ_REG(sc, SAFE_RNG_ALM_CNT) == 0) {
  1183. safe_rng_disable_short_cycle(sc);
  1184. goto retry;
  1185. }
  1186. freq_inc = 1;
  1187. }
  1188. safe_rng_disable_short_cycle(sc);
  1189. } else
  1190. WRITE_REG(sc, SAFE_RNG_ALM_CNT, 0);
  1191. return(rc);
  1192. }
  1193. #endif /* defined(CONFIG_OCF_RANDOMHARVEST) && !defined(SAFE_NO_RNG) */
  1194. /*
  1195. * Resets the board. Values in the regesters are left as is
  1196. * from the reset (i.e. initial values are assigned elsewhere).
  1197. */
  1198. static void
  1199. safe_reset_board(struct safe_softc *sc)
  1200. {
  1201. u_int32_t v;
  1202. /*
  1203. * Reset the device. The manual says no delay
  1204. * is needed between marking and clearing reset.
  1205. */
  1206. DPRINTF(("%s()\n", __FUNCTION__));
  1207. v = READ_REG(sc, SAFE_PE_DMACFG) &~
  1208. (SAFE_PE_DMACFG_PERESET | SAFE_PE_DMACFG_PDRRESET |
  1209. SAFE_PE_DMACFG_SGRESET);
  1210. WRITE_REG(sc, SAFE_PE_DMACFG, v
  1211. | SAFE_PE_DMACFG_PERESET
  1212. | SAFE_PE_DMACFG_PDRRESET
  1213. | SAFE_PE_DMACFG_SGRESET);
  1214. WRITE_REG(sc, SAFE_PE_DMACFG, v);
  1215. }
  1216. /*
  1217. * Initialize registers we need to touch only once.
  1218. */
  1219. static void
  1220. safe_init_board(struct safe_softc *sc)
  1221. {
  1222. u_int32_t v, dwords;
  1223. DPRINTF(("%s()\n", __FUNCTION__));
  1224. v = READ_REG(sc, SAFE_PE_DMACFG);
  1225. v &=~ ( SAFE_PE_DMACFG_PEMODE
  1226. | SAFE_PE_DMACFG_FSENA /* failsafe enable */
  1227. | SAFE_PE_DMACFG_GPRPCI /* gather ring on PCI */
  1228. | SAFE_PE_DMACFG_SPRPCI /* scatter ring on PCI */
  1229. | SAFE_PE_DMACFG_ESDESC /* endian-swap descriptors */
  1230. | SAFE_PE_DMACFG_ESPDESC /* endian-swap part. desc's */
  1231. | SAFE_PE_DMACFG_ESSA /* endian-swap SA's */
  1232. | SAFE_PE_DMACFG_ESPACKET /* swap the packet data */
  1233. );
  1234. v |= SAFE_PE_DMACFG_FSENA /* failsafe enable */
  1235. | SAFE_PE_DMACFG_GPRPCI /* gather ring on PCI */
  1236. | SAFE_PE_DMACFG_SPRPCI /* scatter ring on PCI */
  1237. | SAFE_PE_DMACFG_ESDESC /* endian-swap descriptors */
  1238. | SAFE_PE_DMACFG_ESPDESC /* endian-swap part. desc's */
  1239. | SAFE_PE_DMACFG_ESSA /* endian-swap SA's */
  1240. #if 0
  1241. | SAFE_PE_DMACFG_ESPACKET /* swap the packet data */
  1242. #endif
  1243. ;
  1244. WRITE_REG(sc, SAFE_PE_DMACFG, v);
  1245. #ifdef __BIG_ENDIAN
  1246. /* tell the safenet that we are 4321 and not 1234 */
  1247. WRITE_REG(sc, SAFE_ENDIAN, 0xe4e41b1b);
  1248. #endif
  1249. if (sc->sc_chiprev == SAFE_REV(1,0)) {
  1250. /*
  1251. * Avoid large PCI DMA transfers. Rev 1.0 has a bug where
  1252. * "target mode transfers" done while the chip is DMA'ing
  1253. * >1020 bytes cause the hardware to lockup. To avoid this
  1254. * we reduce the max PCI transfer size and use small source
  1255. * particle descriptors (<= 256 bytes).
  1256. */
  1257. WRITE_REG(sc, SAFE_DMA_CFG, 256);
  1258. device_printf(sc->sc_dev,
  1259. "Reduce max DMA size to %u words for rev %u.%u WAR\n",
  1260. (unsigned) ((READ_REG(sc, SAFE_DMA_CFG)>>2) & 0xff),
  1261. (unsigned) SAFE_REV_MAJ(sc->sc_chiprev),
  1262. (unsigned) SAFE_REV_MIN(sc->sc_chiprev));
  1263. sc->sc_max_dsize = 256;
  1264. } else {
  1265. sc->sc_max_dsize = SAFE_MAX_DSIZE;
  1266. }
  1267. /* NB: operands+results are overlaid */
  1268. WRITE_REG(sc, SAFE_PE_PDRBASE, sc->sc_ringalloc.dma_paddr);
  1269. WRITE_REG(sc, SAFE_PE_RDRBASE, sc->sc_ringalloc.dma_paddr);
  1270. /*
  1271. * Configure ring entry size and number of items in the ring.
  1272. */
  1273. KASSERT((sizeof(struct safe_ringentry) % sizeof(u_int32_t)) == 0,
  1274. ("PE ring entry not 32-bit aligned!"));
  1275. dwords = sizeof(struct safe_ringentry) / sizeof(u_int32_t);
  1276. WRITE_REG(sc, SAFE_PE_RINGCFG,
  1277. (dwords << SAFE_PE_RINGCFG_OFFSET_S) | SAFE_MAX_NQUEUE);
  1278. WRITE_REG(sc, SAFE_PE_RINGPOLL, 0); /* disable polling */
  1279. WRITE_REG(sc, SAFE_PE_GRNGBASE, sc->sc_spalloc.dma_paddr);
  1280. WRITE_REG(sc, SAFE_PE_SRNGBASE, sc->sc_dpalloc.dma_paddr);
  1281. WRITE_REG(sc, SAFE_PE_PARTSIZE,
  1282. (SAFE_TOTAL_DPART<<16) | SAFE_TOTAL_SPART);
  1283. /*
  1284. * NB: destination particles are fixed size. We use
  1285. * an mbuf cluster and require all results go to
  1286. * clusters or smaller.
  1287. */
  1288. WRITE_REG(sc, SAFE_PE_PARTCFG, sc->sc_max_dsize);
  1289. /* it's now safe to enable PE mode, do it */
  1290. WRITE_REG(sc, SAFE_PE_DMACFG, v | SAFE_PE_DMACFG_PEMODE);
  1291. /*
  1292. * Configure hardware to use level-triggered interrupts and
  1293. * to interrupt after each descriptor is processed.
  1294. */
  1295. WRITE_REG(sc, SAFE_HI_CFG, SAFE_HI_CFG_LEVEL);
  1296. WRITE_REG(sc, SAFE_HI_CLR, 0xffffffff);
  1297. WRITE_REG(sc, SAFE_HI_DESC_CNT, 1);
  1298. WRITE_REG(sc, SAFE_HI_MASK, SAFE_INT_PE_DDONE | SAFE_INT_PE_ERROR);
  1299. }
  1300. /*
  1301. * Clean up after a chip crash.
  1302. * It is assumed that the caller in splimp()
  1303. */
  1304. static void
  1305. safe_cleanchip(struct safe_softc *sc)
  1306. {
  1307. DPRINTF(("%s()\n", __FUNCTION__));
  1308. if (sc->sc_nqchip != 0) {
  1309. struct safe_ringentry *re = sc->sc_back;
  1310. while (re != sc->sc_front) {
  1311. if (re->re_desc.d_csr != 0)
  1312. safe_free_entry(sc, re);
  1313. if (++re == sc->sc_ringtop)
  1314. re = sc->sc_ring;
  1315. }
  1316. sc->sc_back = re;
  1317. sc->sc_nqchip = 0;
  1318. }
  1319. }
  1320. /*
  1321. * free a safe_q
  1322. * It is assumed that the caller is within splimp().
  1323. */
  1324. static int
  1325. safe_free_entry(struct safe_softc *sc, struct safe_ringentry *re)
  1326. {
  1327. struct cryptop *crp;
  1328. DPRINTF(("%s()\n", __FUNCTION__));
  1329. /*
  1330. * Free header MCR
  1331. */
  1332. if ((re->re_dst_skb != NULL) && (re->re_src_skb != re->re_dst_skb))
  1333. #ifdef NOTYET
  1334. m_freem(re->re_dst_m);
  1335. #else
  1336. printk("%s,%d: SKB not supported\n", __FILE__, __LINE__);
  1337. #endif
  1338. crp = (struct cryptop *)re->re_crp;
  1339. re->re_desc.d_csr = 0;
  1340. crp->crp_etype = EFAULT;
  1341. crypto_done(crp);
  1342. return(0);
  1343. }
  1344. /*
  1345. * Routine to reset the chip and clean up.
  1346. * It is assumed that the caller is in splimp()
  1347. */
  1348. static void
  1349. safe_totalreset(struct safe_softc *sc)
  1350. {
  1351. DPRINTF(("%s()\n", __FUNCTION__));
  1352. safe_reset_board(sc);
  1353. safe_init_board(sc);
  1354. safe_cleanchip(sc);
  1355. }
  1356. /*
  1357. * Is the operand suitable aligned for direct DMA. Each
  1358. * segment must be aligned on a 32-bit boundary and all
  1359. * but the last segment must be a multiple of 4 bytes.
  1360. */
  1361. static int
  1362. safe_dmamap_aligned(struct safe_softc *sc, const struct safe_operand *op)
  1363. {
  1364. int i;
  1365. DPRINTF(("%s()\n", __FUNCTION__));
  1366. for (i = 0; i < op->nsegs; i++) {
  1367. if (op->segs[i].ds_addr & 3)
  1368. return (0);
  1369. if (i != (op->nsegs - 1) && (op->segs[i].ds_len & 3))
  1370. return (0);
  1371. }
  1372. return (1);
  1373. }
  1374. /*
  1375. * Is the operand suitable for direct DMA as the destination
  1376. * of an operation. The hardware requires that each ``particle''
  1377. * but the last in an operation result have the same size. We
  1378. * fix that size at SAFE_MAX_DSIZE bytes. This routine returns
  1379. * 0 if some segment is not a multiple of of this size, 1 if all
  1380. * segments are exactly this size, or 2 if segments are at worst
  1381. * a multple of this size.
  1382. */
  1383. static int
  1384. safe_dmamap_uniform(struct safe_softc *sc, const struct safe_operand *op)
  1385. {
  1386. int result = 1;
  1387. DPRINTF(("%s()\n", __FUNCTION__));
  1388. if (op->nsegs > 0) {
  1389. int i;
  1390. for (i = 0; i < op->nsegs-1; i++) {
  1391. if (op->segs[i].ds_len % sc->sc_max_dsize)
  1392. return (0);
  1393. if (op->segs[i].ds_len != sc->sc_max_dsize)
  1394. result = 2;
  1395. }
  1396. }
  1397. return (result);
  1398. }
  1399. static int
  1400. safe_kprocess(device_t dev, struct cryptkop *krp, int hint)
  1401. {
  1402. struct safe_softc *sc = device_get_softc(dev);
  1403. struct safe_pkq *q;
  1404. unsigned long flags;
  1405. DPRINTF(("%s()\n", __FUNCTION__));
  1406. if (sc == NULL) {
  1407. krp->krp_status = EINVAL;
  1408. goto err;
  1409. }
  1410. if (krp->krp_op != CRK_MOD_EXP) {
  1411. krp->krp_status = EOPNOTSUPP;
  1412. goto err;
  1413. }
  1414. q = (struct safe_pkq *) kmalloc(sizeof(*q), GFP_KERNEL);
  1415. if (q == NULL) {
  1416. krp->krp_status = ENOMEM;
  1417. goto err;
  1418. }
  1419. memset(q, 0, sizeof(*q));
  1420. q->pkq_krp = krp;
  1421. INIT_LIST_HEAD(&q->pkq_list);
  1422. spin_lock_irqsave(&sc->sc_pkmtx, flags);
  1423. list_add_tail(&q->pkq_list, &sc->sc_pkq);
  1424. safe_kfeed(sc);
  1425. spin_unlock_irqrestore(&sc->sc_pkmtx, flags);
  1426. return (0);
  1427. err:
  1428. crypto_kdone(krp);
  1429. return (0);
  1430. }
  1431. #define SAFE_CRK_PARAM_BASE 0
  1432. #define SAFE_CRK_PARAM_EXP 1
  1433. #define SAFE_CRK_PARAM_MOD 2
  1434. static int
  1435. safe_kstart(struct safe_softc *sc)
  1436. {
  1437. struct cryptkop *krp = sc->sc_pkq_cur->pkq_krp;
  1438. int exp_bits, mod_bits, base_bits;
  1439. u_int32_t op, a_off, b_off, c_off, d_off;
  1440. DPRINTF(("%s()\n", __FUNCTION__));
  1441. if (krp->krp_iparams < 3 || krp->krp_oparams != 1) {
  1442. krp->krp_status = EINVAL;
  1443. return (1);
  1444. }
  1445. base_bits = safe_ksigbits(sc, &krp->krp_param[SAFE_CRK_PARAM_BASE]);
  1446. if (base_bits > 2048)
  1447. goto too_big;
  1448. if (base_bits <= 0) /* 5. base not zero */
  1449. goto too_small;
  1450. exp_bits = safe_ksigbits(sc, &krp->krp_param[SAFE_CRK_PARAM_EXP]);
  1451. if (exp_bits > 2048)
  1452. goto too_big;
  1453. if (exp_bits <= 0) /* 1. exponent word length > 0 */
  1454. goto too_small; /* 4. exponent not zero */
  1455. mod_bits = safe_ksigbits(sc, &krp->krp_param[SAFE_CRK_PARAM_MOD]);
  1456. if (mod_bits > 2048)
  1457. goto too_big;
  1458. if (mod_bits <= 32) /* 2. modulus word length > 1 */
  1459. goto too_small; /* 8. MSW of modulus != zero */
  1460. if (mod_bits < exp_bits) /* 3 modulus len >= exponent len */
  1461. goto too_small;
  1462. if ((krp->krp_param[SAFE_CRK_PARAM_MOD].crp_p[0] & 1) == 0)
  1463. goto bad_domain; /* 6. modulus is odd */
  1464. if (mod_bits > krp->krp_param[krp->krp_iparams].crp_nbits)
  1465. goto too_small; /* make sure result will fit */
  1466. /* 7. modulus > base */
  1467. if (mod_bits < base_bits)
  1468. goto too_small;
  1469. if (mod_bits == base_bits) {
  1470. u_int8_t *basep, *modp;
  1471. int i;
  1472. basep = krp->krp_param[SAFE_CRK_PARAM_BASE].crp_p +
  1473. ((base_bits + 7) / 8) - 1;
  1474. modp = krp->krp_param[SAFE_CRK_PARAM_MOD].crp_p +
  1475. ((mod_bits + 7) / 8) - 1;
  1476. for (i = 0; i < (mod_bits + 7) / 8; i++, basep--, modp--) {
  1477. if (*modp < *basep)
  1478. goto too_small;
  1479. if (*modp > *basep)
  1480. break;
  1481. }
  1482. }
  1483. /* And on the 9th step, he rested. */
  1484. WRITE_REG(sc, SAFE_PK_A_LEN, (exp_bits + 31) / 32);
  1485. WRITE_REG(sc, SAFE_PK_B_LEN, (mod_bits + 31) / 32);
  1486. if (mod_bits > 1024) {
  1487. op = SAFE_PK_FUNC_EXP4;
  1488. a_off = 0x000;
  1489. b_off = 0x100;
  1490. c_off = 0x200;
  1491. d_off = 0x300;
  1492. } else {
  1493. op = SAFE_PK_FUNC_EXP16;
  1494. a_off = 0x000;
  1495. b_off = 0x080;
  1496. c_off = 0x100;
  1497. d_off = 0x180;
  1498. }
  1499. sc->sc_pk_reslen = b_off - a_off;
  1500. sc->sc_pk_resoff = d_off;
  1501. /* A is exponent, B is modulus, C is base, D is result */
  1502. safe_kload_reg(sc, a_off, b_off - a_off,
  1503. &krp->krp_param[SAFE_CRK_PARAM_EXP]);
  1504. WRITE_REG(sc, SAFE_PK_A_ADDR, a_off >> 2);
  1505. safe_kload_reg(sc, b_off, b_off - a_off,
  1506. &krp->krp_param[SAFE_CRK_PARAM_MOD]);
  1507. WRITE_REG(sc, SAFE_PK_B_ADDR, b_off >> 2);
  1508. safe_kload_reg(sc, c_off, b_off - a_off,
  1509. &krp->krp_param[SAFE_CRK_PARAM_BASE]);
  1510. WRITE_REG(sc, SAFE_PK_C_ADDR, c_off >> 2);
  1511. WRITE_REG(sc, SAFE_PK_D_ADDR, d_off >> 2);
  1512. WRITE_REG(sc, SAFE_PK_FUNC, op | SAFE_PK_FUNC_RUN);
  1513. return (0);
  1514. too_big:
  1515. krp->krp_status = E2BIG;
  1516. return (1);
  1517. too_small:
  1518. krp->krp_status = ERANGE;
  1519. return (1);
  1520. bad_domain:
  1521. krp->krp_status = EDOM;
  1522. return (1);
  1523. }
  1524. static int
  1525. safe_ksigbits(struct safe_softc *sc, struct crparam *cr)
  1526. {
  1527. u_int plen = (cr->crp_nbits + 7) / 8;
  1528. int i, sig = plen * 8;
  1529. u_int8_t c, *p = cr->crp_p;
  1530. DPRINTF(("%s()\n", __FUNCTION__));
  1531. for (i = plen - 1; i >= 0; i--) {
  1532. c = p[i];
  1533. if (c != 0) {
  1534. while ((c & 0x80) == 0) {
  1535. sig--;
  1536. c <<= 1;
  1537. }
  1538. break;
  1539. }
  1540. sig -= 8;
  1541. }
  1542. return (sig);
  1543. }
  1544. static void
  1545. safe_kfeed(struct safe_softc *sc)
  1546. {
  1547. struct safe_pkq *q, *tmp;
  1548. DPRINTF(("%s()\n", __FUNCTION__));
  1549. if (list_empty(&sc->sc_pkq) && sc->sc_pkq_cur == NULL)
  1550. return;
  1551. if (sc->sc_pkq_cur != NULL)
  1552. return;
  1553. list_for_each_entry_safe(q, tmp, &sc->sc_pkq, pkq_list) {
  1554. sc->sc_pkq_cur = q;
  1555. list_del(&q->pkq_list);
  1556. if (safe_kstart(sc) != 0) {
  1557. crypto_kdone(q->pkq_krp);
  1558. kfree(q);
  1559. sc->sc_pkq_cur = NULL;
  1560. } else {
  1561. /* op started, start polling */
  1562. mod_timer(&sc->sc_pkto, jiffies + 1);
  1563. break;
  1564. }
  1565. }
  1566. }
  1567. static void
  1568. safe_kpoll(unsigned long arg)
  1569. {
  1570. struct safe_softc *sc = NULL;
  1571. struct safe_pkq *q;
  1572. struct crparam *res;
  1573. int i;
  1574. u_int32_t buf[64];
  1575. unsigned long flags;
  1576. DPRINTF(("%s()\n", __FUNCTION__));
  1577. if (arg >= SAFE_MAX_CHIPS)
  1578. return;
  1579. sc = safe_chip_idx[arg];
  1580. if (!sc) {
  1581. DPRINTF(("%s() - bad callback\n", __FUNCTION__));
  1582. return;
  1583. }
  1584. spin_lock_irqsave(&sc->sc_pkmtx, flags);
  1585. if (sc->sc_pkq_cur == NULL)
  1586. goto out;
  1587. if (READ_REG(sc, SAFE_PK_FUNC) & SAFE_PK_FUNC_RUN) {
  1588. /* still running, check back later */
  1589. mod_timer(&sc->sc_pkto, jiffies + 1);
  1590. goto out;
  1591. }
  1592. q = sc->sc_pkq_cur;
  1593. res = &q->pkq_krp->krp_param[q->pkq_krp->krp_iparams];
  1594. bzero(buf, sizeof(buf));
  1595. bzero(res->crp_p, (res->crp_nbits + 7) / 8);
  1596. for (i = 0; i < sc->sc_pk_reslen >> 2; i++)
  1597. buf[i] = le32_to_cpu(READ_REG(sc, SAFE_PK_RAM_START +
  1598. sc->sc_pk_resoff + (i << 2)));
  1599. bcopy(buf, res->crp_p, (res->crp_nbits + 7) / 8);
  1600. /*
  1601. * reduce the bits that need copying if possible
  1602. */
  1603. res->crp_nbits = min(res->crp_nbits,sc->sc_pk_reslen * 8);
  1604. res->crp_nbits = safe_ksigbits(sc, res);
  1605. for (i = SAFE_PK_RAM_START; i < SAFE_PK_RAM_END; i += 4)
  1606. WRITE_REG(sc, i, 0);
  1607. crypto_kdone(q->pkq_krp);
  1608. kfree(q);
  1609. sc->sc_pkq_cur = NULL;
  1610. safe_kfeed(sc);
  1611. out:
  1612. spin_unlock_irqrestore(&sc->sc_pkmtx, flags);
  1613. }
  1614. static void
  1615. safe_kload_reg(struct safe_softc *sc, u_int32_t off, u_int32_t len,
  1616. struct crparam *n)
  1617. {
  1618. u_int32_t buf[64], i;
  1619. DPRINTF(("%s()\n", __FUNCTION__));
  1620. bzero(buf, sizeof(buf));
  1621. bcopy(n->crp_p, buf, (n->crp_nbits + 7) / 8);
  1622. for (i = 0; i < len >> 2; i++)
  1623. WRITE_REG(sc, SAFE_PK_RAM_START + off + (i << 2),
  1624. cpu_to_le32(buf[i]));
  1625. }
  1626. #ifdef SAFE_DEBUG
  1627. static void
  1628. safe_dump_dmastatus(struct safe_softc *sc, const char *tag)
  1629. {
  1630. printf("%s: ENDIAN 0x%x SRC 0x%x DST 0x%x STAT 0x%x\n"
  1631. , tag
  1632. , READ_REG(sc, SAFE_DMA_ENDIAN)
  1633. , READ_REG(sc, SAFE_DMA_SRCADDR)
  1634. , READ_REG(sc, SAFE_DMA_DSTADDR)
  1635. , READ_REG(sc, SAFE_DMA_STAT)
  1636. );
  1637. }
  1638. static void
  1639. safe_dump_intrstate(struct safe_softc *sc, const char *tag)
  1640. {
  1641. printf("%s: HI_CFG 0x%x HI_MASK 0x%x HI_DESC_CNT 0x%x HU_STAT 0x%x HM_STAT 0x%x\n"
  1642. , tag
  1643. , READ_REG(sc, SAFE_HI_CFG)
  1644. , READ_REG(sc, SAFE_HI_MASK)
  1645. , READ_REG(sc, SAFE_HI_DESC_CNT)
  1646. , READ_REG(sc, SAFE_HU_STAT)
  1647. , READ_REG(sc, SAFE_HM_STAT)
  1648. );
  1649. }
  1650. static void
  1651. safe_dump_ringstate(struct safe_softc *sc, const char *tag)
  1652. {
  1653. u_int32_t estat = READ_REG(sc, SAFE_PE_ERNGSTAT);
  1654. /* NB: assume caller has lock on ring */
  1655. printf("%s: ERNGSTAT %x (next %u) back %lu front %lu\n",
  1656. tag,
  1657. estat, (estat >> SAFE_PE_ERNGSTAT_NEXT_S),
  1658. (unsigned long)(sc->sc_back - sc->sc_ring),
  1659. (unsigned long)(sc->sc_front - sc->sc_ring));
  1660. }
  1661. static void
  1662. safe_dump_request(struct safe_softc *sc, const char* tag, struct safe_ringentry *re)
  1663. {
  1664. int ix, nsegs;
  1665. ix = re - sc->sc_ring;
  1666. printf("%s: %p (%u): csr %x src %x dst %x sa %x len %x\n"
  1667. , tag
  1668. , re, ix
  1669. , re->re_desc.d_csr
  1670. , re->re_desc.d_src
  1671. , re->re_desc.d_dst
  1672. , re->re_desc.d_sa
  1673. , re->re_desc.d_len
  1674. );
  1675. if (re->re_src.nsegs > 1) {
  1676. ix = (re->re_desc.d_src - sc->sc_spalloc.dma_paddr) /
  1677. sizeof(struct safe_pdesc);
  1678. for (nsegs = re->re_src.nsegs; nsegs; nsegs--) {
  1679. printf(" spd[%u] %p: %p size %u flags %x"
  1680. , ix, &sc->sc_spring[ix]
  1681. , (caddr_t)(uintptr_t) sc->sc_spring[ix].pd_addr
  1682. , sc->sc_spring[ix].pd_size
  1683. , sc->sc_spring[ix].pd_flags
  1684. );
  1685. if (sc->sc_spring[ix].pd_size == 0)
  1686. printf(" (zero!)");
  1687. printf("\n");
  1688. if (++ix == SAFE_TOTAL_SPART)
  1689. ix = 0;
  1690. }
  1691. }
  1692. if (re->re_dst.nsegs > 1) {
  1693. ix = (re->re_desc.d_dst - sc->sc_dpalloc.dma_paddr) /
  1694. sizeof(struct safe_pdesc);
  1695. for (nsegs = re->re_dst.nsegs; nsegs; nsegs--) {
  1696. printf(" dpd[%u] %p: %p flags %x\n"
  1697. , ix, &sc->sc_dpring[ix]
  1698. , (caddr_t)(uintptr_t) sc->sc_dpring[ix].pd_addr
  1699. , sc->sc_dpring[ix].pd_flags
  1700. );
  1701. if (++ix == SAFE_TOTAL_DPART)
  1702. ix = 0;
  1703. }
  1704. }
  1705. printf("sa: cmd0 %08x cmd1 %08x staterec %x\n",
  1706. re->re_sa.sa_cmd0, re->re_sa.sa_cmd1, re->re_sa.sa_staterec);
  1707. printf("sa: key %x %x %x %x %x %x %x %x\n"
  1708. , re->re_sa.sa_key[0]
  1709. , re->re_sa.sa_key[1]
  1710. , re->re_sa.sa_key[2]
  1711. , re->re_sa.sa_key[3]
  1712. , re->re_sa.sa_key[4]
  1713. , re->re_sa.sa_key[5]
  1714. , re->re_sa.sa_key[6]
  1715. , re->re_sa.sa_key[7]
  1716. );
  1717. printf("sa: indigest %x %x %x %x %x\n"
  1718. , re->re_sa.sa_indigest[0]
  1719. , re->re_sa.sa_indigest[1]
  1720. , re->re_sa.sa_indigest[2]
  1721. , re->re_sa.sa_indigest[3]
  1722. , re->re_sa.sa_indigest[4]
  1723. );
  1724. printf("sa: outdigest %x %x %x %x %x\n"
  1725. , re->re_sa.sa_outdigest[0]
  1726. , re->re_sa.sa_outdigest[1]
  1727. , re->re_sa.sa_outdigest[2]
  1728. , re->re_sa.sa_outdigest[3]
  1729. , re->re_sa.sa_outdigest[4]
  1730. );
  1731. printf("sr: iv %x %x %x %x\n"
  1732. , re->re_sastate.sa_saved_iv[0]
  1733. , re->re_sastate.sa_saved_iv[1]
  1734. , re->re_sastate.sa_saved_iv[2]
  1735. , re->re_sastate.sa_saved_iv[3]
  1736. );
  1737. printf("sr: hashbc %u indigest %x %x %x %x %x\n"
  1738. , re->re_sastate.sa_saved_hashbc
  1739. , re->re_sastate.sa_saved_indigest[0]
  1740. , re->re_sastate.sa_saved_indigest[1]
  1741. , re->re_sastate.sa_saved_indigest[2]
  1742. , re->re_sastate.sa_saved_indigest[3]
  1743. , re->re_sastate.sa_saved_indigest[4]
  1744. );
  1745. }
  1746. static void
  1747. safe_dump_ring(struct safe_softc *sc, const char *tag)
  1748. {
  1749. unsigned long flags;
  1750. spin_lock_irqsave(&sc->sc_ringmtx, flags);
  1751. printf("\nSafeNet Ring State:\n");
  1752. safe_dump_intrstate(sc, tag);
  1753. safe_dump_dmastatus(sc, tag);
  1754. safe_dump_ringstate(sc, tag);
  1755. if (sc->sc_nqchip) {
  1756. struct safe_ringentry *re = sc->sc_back;
  1757. do {
  1758. safe_dump_request(sc, tag, re);
  1759. if (++re == sc->sc_ringtop)
  1760. re = sc->sc_ring;
  1761. } while (re != sc->sc_front);
  1762. }
  1763. spin_unlock_irqrestore(&sc->sc_ringmtx, flags);
  1764. }
  1765. #endif /* SAFE_DEBUG */
  1766. static int safe_probe(struct pci_dev *dev, const struct pci_device_id *ent)
  1767. {
  1768. struct safe_softc *sc = NULL;
  1769. u32 mem_start, mem_len, cmd;
  1770. int i, rc, devinfo;
  1771. dma_addr_t raddr;
  1772. static int num_chips = 0;
  1773. DPRINTF(("%s()\n", __FUNCTION__));
  1774. if (pci_enable_device(dev) < 0)
  1775. return(-ENODEV);
  1776. if (!dev->irq) {
  1777. printk("safe: found device with no IRQ assigned. check BIOS settings!");
  1778. pci_disable_device(dev);
  1779. return(-ENODEV);
  1780. }
  1781. if (pci_set_mwi(dev)) {
  1782. printk("safe: pci_set_mwi failed!");
  1783. return(-ENODEV);
  1784. }
  1785. sc = (struct safe_softc *) kmalloc(sizeof(*sc), GFP_KERNEL);
  1786. if (!sc)
  1787. return(-ENOMEM);
  1788. memset(sc, 0, sizeof(*sc));
  1789. softc_device_init(sc, "safe", num_chips, safe_methods);
  1790. sc->sc_irq = -1;
  1791. sc->sc_cid = -1;
  1792. sc->sc_pcidev = dev;
  1793. if (num_chips < SAFE_MAX_CHIPS) {
  1794. safe_chip_idx[device_get_unit(sc->sc_dev)] = sc;
  1795. num_chips++;
  1796. }
  1797. INIT_LIST_HEAD(&sc->sc_pkq);
  1798. spin_lock_init(&sc->sc_pkmtx);
  1799. pci_set_drvdata(sc->sc_pcidev, sc);
  1800. /* we read its hardware registers as memory */
  1801. mem_start = pci_resource_start(sc->sc_pcidev, 0);
  1802. mem_len = pci_resource_len(sc->sc_pcidev, 0);
  1803. sc->sc_base_addr = (ocf_iomem_t) ioremap(mem_start, mem_len);
  1804. if (!sc->sc_base_addr) {
  1805. device_printf(sc->sc_dev, "failed to ioremap 0x%x-0x%x\n",
  1806. mem_start, mem_start + mem_len - 1);
  1807. goto out;
  1808. }
  1809. /* fix up the bus size */
  1810. if (pci_set_dma_mask(sc->sc_pcidev, DMA_32BIT_MASK)) {
  1811. device_printf(sc->sc_dev, "No usable DMA configuration, aborting.\n");
  1812. goto out;
  1813. }
  1814. if (pci_set_consistent_dma_mask(sc->sc_pcidev, DMA_32BIT_MASK)) {
  1815. device_printf(sc->sc_dev, "No usable consistent DMA configuration, aborting.\n");
  1816. goto out;
  1817. }
  1818. pci_set_master(sc->sc_pcidev);
  1819. pci_read_config_dword(sc->sc_pcidev, PCI_COMMAND, &cmd);
  1820. if (!(cmd & PCI_COMMAND_MEMORY)) {
  1821. device_printf(sc->sc_dev, "failed to enable memory mapping\n");
  1822. goto out;
  1823. }
  1824. if (!(cmd & PCI_COMMAND_MASTER)) {
  1825. device_printf(sc->sc_dev, "failed to enable bus mastering\n");
  1826. goto out;
  1827. }
  1828. rc = request_irq(dev->irq, safe_intr, IRQF_SHARED, "safe", sc);
  1829. if (rc) {
  1830. device_printf(sc->sc_dev, "failed to hook irq %d\n", sc->sc_irq);
  1831. goto out;
  1832. }
  1833. sc->sc_irq = dev->irq;
  1834. sc->sc_chiprev = READ_REG(sc, SAFE_DEVINFO) &
  1835. (SAFE_DEVINFO_REV_MAJ | SAFE_DEVINFO_REV_MIN);
  1836. /*
  1837. * Allocate packet engine descriptors.
  1838. */
  1839. sc->sc_ringalloc.dma_vaddr = pci_alloc_consistent(sc->sc_pcidev,
  1840. SAFE_MAX_NQUEUE * sizeof (struct safe_ringentry),
  1841. &sc->sc_ringalloc.dma_paddr);
  1842. if (!sc->sc_ringalloc.dma_vaddr) {
  1843. device_printf(sc->sc_dev, "cannot allocate PE descriptor ring\n");
  1844. goto out;
  1845. }
  1846. /*
  1847. * Hookup the static portion of all our data structures.
  1848. */
  1849. sc->sc_ring = (struct safe_ringentry *) sc->sc_ringalloc.dma_vaddr;
  1850. sc->sc_ringtop = sc->sc_ring + SAFE_MAX_NQUEUE;
  1851. sc->sc_front = sc->sc_ring;
  1852. sc->sc_back = sc->sc_ring;
  1853. raddr = sc->sc_ringalloc.dma_paddr;
  1854. bzero(sc->sc_ring, SAFE_MAX_NQUEUE * sizeof(struct safe_ringentry));
  1855. for (i = 0; i < SAFE_MAX_NQUEUE; i++) {
  1856. struct safe_ringentry *re = &sc->sc_ring[i];
  1857. re->re_desc.d_sa = raddr +
  1858. offsetof(struct safe_ringentry, re_sa);
  1859. re->re_sa.sa_staterec = raddr +
  1860. offsetof(struct safe_ringentry, re_sastate);
  1861. raddr += sizeof (struct safe_ringentry);
  1862. }
  1863. spin_lock_init(&sc->sc_ringmtx);
  1864. /*
  1865. * Allocate scatter and gather particle descriptors.
  1866. */
  1867. sc->sc_spalloc.dma_vaddr = pci_alloc_consistent(sc->sc_pcidev,
  1868. SAFE_TOTAL_SPART * sizeof (struct safe_pdesc),
  1869. &sc->sc_spalloc.dma_paddr);
  1870. if (!sc->sc_spalloc.dma_vaddr) {
  1871. device_printf(sc->sc_dev, "cannot allocate source particle descriptor ring\n");
  1872. goto out;
  1873. }
  1874. sc->sc_spring = (struct safe_pdesc *) sc->sc_spalloc.dma_vaddr;
  1875. sc->sc_springtop = sc->sc_spring + SAFE_TOTAL_SPART;
  1876. sc->sc_spfree = sc->sc_spring;
  1877. bzero(sc->sc_spring, SAFE_TOTAL_SPART * sizeof(struct safe_pdesc));
  1878. sc->sc_dpalloc.dma_vaddr = pci_alloc_consistent(sc->sc_pcidev,
  1879. SAFE_TOTAL_DPART * sizeof (struct safe_pdesc),
  1880. &sc->sc_dpalloc.dma_paddr);
  1881. if (!sc->sc_dpalloc.dma_vaddr) {
  1882. device_printf(sc->sc_dev, "cannot allocate destination particle descriptor ring\n");
  1883. goto out;
  1884. }
  1885. sc->sc_dpring = (struct safe_pdesc *) sc->sc_dpalloc.dma_vaddr;
  1886. sc->sc_dpringtop = sc->sc_dpring + SAFE_TOTAL_DPART;
  1887. sc->sc_dpfree = sc->sc_dpring;
  1888. bzero(sc->sc_dpring, SAFE_TOTAL_DPART * sizeof(struct safe_pdesc));
  1889. sc->sc_cid = crypto_get_driverid(softc_get_device(sc), CRYPTOCAP_F_HARDWARE);
  1890. if (sc->sc_cid < 0) {
  1891. device_printf(sc->sc_dev, "could not get crypto driver id\n");
  1892. goto out;
  1893. }
  1894. printf("%s:", device_get_nameunit(sc->sc_dev));
  1895. devinfo = READ_REG(sc, SAFE_DEVINFO);
  1896. if (devinfo & SAFE_DEVINFO_RNG) {
  1897. sc->sc_flags |= SAFE_FLAGS_RNG;
  1898. printf(" rng");
  1899. }
  1900. if (devinfo & SAFE_DEVINFO_PKEY) {
  1901. printf(" key");
  1902. sc->sc_flags |= SAFE_FLAGS_KEY;
  1903. crypto_kregister(sc->sc_cid, CRK_MOD_EXP, 0);
  1904. #if 0
  1905. crypto_kregister(sc->sc_cid, CRK_MOD_EXP_CRT, 0);
  1906. #endif
  1907. init_timer(&sc->sc_pkto);
  1908. sc->sc_pkto.function = safe_kpoll;
  1909. sc->sc_pkto.data = (unsigned long) device_get_unit(sc->sc_dev);
  1910. }
  1911. if (devinfo & SAFE_DEVINFO_DES) {
  1912. printf(" des/3des");
  1913. crypto_register(sc->sc_cid, CRYPTO_3DES_CBC, 0, 0);
  1914. crypto_register(sc->sc_cid, CRYPTO_DES_CBC, 0, 0);
  1915. }
  1916. if (devinfo & SAFE_DEVINFO_AES) {
  1917. printf(" aes");
  1918. crypto_register(sc->sc_cid, CRYPTO_AES_CBC, 0, 0);
  1919. }
  1920. if (devinfo & SAFE_DEVINFO_MD5) {
  1921. printf(" md5");
  1922. crypto_register(sc->sc_cid, CRYPTO_MD5_HMAC, 0, 0);
  1923. }
  1924. if (devinfo & SAFE_DEVINFO_SHA1) {
  1925. printf(" sha1");
  1926. crypto_register(sc->sc_cid, CRYPTO_SHA1_HMAC, 0, 0);
  1927. }
  1928. printf(" null");
  1929. crypto_register(sc->sc_cid, CRYPTO_NULL_CBC, 0, 0);
  1930. crypto_register(sc->sc_cid, CRYPTO_NULL_HMAC, 0, 0);
  1931. /* XXX other supported algorithms */
  1932. printf("\n");
  1933. safe_reset_board(sc); /* reset h/w */
  1934. safe_init_board(sc); /* init h/w */
  1935. #if defined(CONFIG_OCF_RANDOMHARVEST) && !defined(SAFE_NO_RNG)
  1936. if (sc->sc_flags & SAFE_FLAGS_RNG) {
  1937. safe_rng_init(sc);
  1938. crypto_rregister(sc->sc_cid, safe_read_random, sc);
  1939. }
  1940. #endif /* SAFE_NO_RNG */
  1941. return (0);
  1942. out:
  1943. if (sc->sc_cid >= 0)
  1944. crypto_unregister_all(sc->sc_cid);
  1945. if (sc->sc_irq != -1)
  1946. free_irq(sc->sc_irq, sc);
  1947. if (sc->sc_ringalloc.dma_vaddr)
  1948. pci_free_consistent(sc->sc_pcidev,
  1949. SAFE_MAX_NQUEUE * sizeof (struct safe_ringentry),
  1950. sc->sc_ringalloc.dma_vaddr, sc->sc_ringalloc.dma_paddr);
  1951. if (sc->sc_spalloc.dma_vaddr)
  1952. pci_free_consistent(sc->sc_pcidev,
  1953. SAFE_TOTAL_DPART * sizeof (struct safe_pdesc),
  1954. sc->sc_spalloc.dma_vaddr, sc->sc_spalloc.dma_paddr);
  1955. if (sc->sc_dpalloc.dma_vaddr)
  1956. pci_free_consistent(sc->sc_pcidev,
  1957. SAFE_TOTAL_DPART * sizeof (struct safe_pdesc),
  1958. sc->sc_dpalloc.dma_vaddr, sc->sc_dpalloc.dma_paddr);
  1959. kfree(sc);
  1960. return(-ENODEV);
  1961. }
  1962. static void safe_remove(struct pci_dev *dev)
  1963. {
  1964. struct safe_softc *sc = pci_get_drvdata(dev);
  1965. DPRINTF(("%s()\n", __FUNCTION__));
  1966. /* XXX wait/abort active ops */
  1967. WRITE_REG(sc, SAFE_HI_MASK, 0); /* disable interrupts */
  1968. del_timer_sync(&sc->sc_pkto);
  1969. crypto_unregister_all(sc->sc_cid);
  1970. safe_cleanchip(sc);
  1971. if (sc->sc_irq != -1)
  1972. free_irq(sc->sc_irq, sc);
  1973. if (sc->sc_ringalloc.dma_vaddr)
  1974. pci_free_consistent(sc->sc_pcidev,
  1975. SAFE_MAX_NQUEUE * sizeof (struct safe_ringentry),
  1976. sc->sc_ringalloc.dma_vaddr, sc->sc_ringalloc.dma_paddr);
  1977. if (sc->sc_spalloc.dma_vaddr)
  1978. pci_free_consistent(sc->sc_pcidev,
  1979. SAFE_TOTAL_DPART * sizeof (struct safe_pdesc),
  1980. sc->sc_spalloc.dma_vaddr, sc->sc_spalloc.dma_paddr);
  1981. if (sc->sc_dpalloc.dma_vaddr)
  1982. pci_free_consistent(sc->sc_pcidev,
  1983. SAFE_TOTAL_DPART * sizeof (struct safe_pdesc),
  1984. sc->sc_dpalloc.dma_vaddr, sc->sc_dpalloc.dma_paddr);
  1985. sc->sc_irq = -1;
  1986. sc->sc_ringalloc.dma_vaddr = NULL;
  1987. sc->sc_spalloc.dma_vaddr = NULL;
  1988. sc->sc_dpalloc.dma_vaddr = NULL;
  1989. }
  1990. static struct pci_device_id safe_pci_tbl[] = {
  1991. { PCI_VENDOR_SAFENET, PCI_PRODUCT_SAFEXCEL,
  1992. PCI_ANY_ID, PCI_ANY_ID, 0, 0, },
  1993. { },
  1994. };
  1995. MODULE_DEVICE_TABLE(pci, safe_pci_tbl);
  1996. static struct pci_driver safe_driver = {
  1997. .name = "safe",
  1998. .id_table = safe_pci_tbl,
  1999. .probe = safe_probe,
  2000. .remove = safe_remove,
  2001. /* add PM stuff here one day */
  2002. };
  2003. static int __init safe_init (void)
  2004. {
  2005. struct safe_softc *sc = NULL;
  2006. int rc;
  2007. DPRINTF(("%s(%p)\n", __FUNCTION__, safe_init));
  2008. rc = pci_register_driver(&safe_driver);
  2009. pci_register_driver_compat(&safe_driver, rc);
  2010. return rc;
  2011. }
  2012. static void __exit safe_exit (void)
  2013. {
  2014. pci_unregister_driver(&safe_driver);
  2015. }
  2016. module_init(safe_init);
  2017. module_exit(safe_exit);
  2018. MODULE_LICENSE("BSD");
  2019. MODULE_AUTHOR("David McCullough <[email protected]>");
  2020. MODULE_DESCRIPTION("OCF driver for safenet PCI crypto devices");