162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * K3 SA2UL crypto accelerator driver
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (C) 2018-2020 Texas Instruments Incorporated - http://www.ti.com
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Authors:	Keerthy
862306a36Sopenharmony_ci *		Vitaly Andrianov
962306a36Sopenharmony_ci *		Tero Kristo
1062306a36Sopenharmony_ci */
1162306a36Sopenharmony_ci#include <linux/bitfield.h>
1262306a36Sopenharmony_ci#include <linux/clk.h>
1362306a36Sopenharmony_ci#include <linux/dma-mapping.h>
1462306a36Sopenharmony_ci#include <linux/dmaengine.h>
1562306a36Sopenharmony_ci#include <linux/dmapool.h>
1662306a36Sopenharmony_ci#include <linux/kernel.h>
1762306a36Sopenharmony_ci#include <linux/module.h>
1862306a36Sopenharmony_ci#include <linux/of.h>
1962306a36Sopenharmony_ci#include <linux/of_platform.h>
2062306a36Sopenharmony_ci#include <linux/platform_device.h>
2162306a36Sopenharmony_ci#include <linux/pm_runtime.h>
2262306a36Sopenharmony_ci
2362306a36Sopenharmony_ci#include <crypto/aes.h>
2462306a36Sopenharmony_ci#include <crypto/authenc.h>
2562306a36Sopenharmony_ci#include <crypto/des.h>
2662306a36Sopenharmony_ci#include <crypto/internal/aead.h>
2762306a36Sopenharmony_ci#include <crypto/internal/hash.h>
2862306a36Sopenharmony_ci#include <crypto/internal/skcipher.h>
2962306a36Sopenharmony_ci#include <crypto/scatterwalk.h>
3062306a36Sopenharmony_ci#include <crypto/sha1.h>
3162306a36Sopenharmony_ci#include <crypto/sha2.h>
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_ci#include "sa2ul.h"
3462306a36Sopenharmony_ci
3562306a36Sopenharmony_ci/* Byte offset for key in encryption security context */
3662306a36Sopenharmony_ci#define SC_ENC_KEY_OFFSET (1 + 27 + 4)
3762306a36Sopenharmony_ci/* Byte offset for Aux-1 in encryption security context */
3862306a36Sopenharmony_ci#define SC_ENC_AUX1_OFFSET (1 + 27 + 4 + 32)
3962306a36Sopenharmony_ci
4062306a36Sopenharmony_ci#define SA_CMDL_UPD_ENC         0x0001
4162306a36Sopenharmony_ci#define SA_CMDL_UPD_AUTH        0x0002
4262306a36Sopenharmony_ci#define SA_CMDL_UPD_ENC_IV      0x0004
4362306a36Sopenharmony_ci#define SA_CMDL_UPD_AUTH_IV     0x0008
4462306a36Sopenharmony_ci#define SA_CMDL_UPD_AUX_KEY     0x0010
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_ci#define SA_AUTH_SUBKEY_LEN	16
4762306a36Sopenharmony_ci#define SA_CMDL_PAYLOAD_LENGTH_MASK	0xFFFF
4862306a36Sopenharmony_ci#define SA_CMDL_SOP_BYPASS_LEN_MASK	0xFF000000
4962306a36Sopenharmony_ci
5062306a36Sopenharmony_ci#define MODE_CONTROL_BYTES	27
5162306a36Sopenharmony_ci#define SA_HASH_PROCESSING	0
5262306a36Sopenharmony_ci#define SA_CRYPTO_PROCESSING	0
5362306a36Sopenharmony_ci#define SA_UPLOAD_HASH_TO_TLR	BIT(6)
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_ci#define SA_SW0_FLAGS_MASK	0xF0000
5662306a36Sopenharmony_ci#define SA_SW0_CMDL_INFO_MASK	0x1F00000
5762306a36Sopenharmony_ci#define SA_SW0_CMDL_PRESENT	BIT(4)
5862306a36Sopenharmony_ci#define SA_SW0_ENG_ID_MASK	0x3E000000
5962306a36Sopenharmony_ci#define SA_SW0_DEST_INFO_PRESENT	BIT(30)
6062306a36Sopenharmony_ci#define SA_SW2_EGRESS_LENGTH		0xFF000000
6162306a36Sopenharmony_ci#define SA_BASIC_HASH		0x10
6262306a36Sopenharmony_ci
6362306a36Sopenharmony_ci#define SHA256_DIGEST_WORDS    8
6462306a36Sopenharmony_ci/* Make 32-bit word from 4 bytes */
6562306a36Sopenharmony_ci#define SA_MK_U32(b0, b1, b2, b3) (((b0) << 24) | ((b1) << 16) | \
6662306a36Sopenharmony_ci				   ((b2) << 8) | (b3))
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_ci/* size of SCCTL structure in bytes */
6962306a36Sopenharmony_ci#define SA_SCCTL_SZ 16
7062306a36Sopenharmony_ci
7162306a36Sopenharmony_ci/* Max Authentication tag size */
7262306a36Sopenharmony_ci#define SA_MAX_AUTH_TAG_SZ 64
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_cienum sa_algo_id {
7562306a36Sopenharmony_ci	SA_ALG_CBC_AES = 0,
7662306a36Sopenharmony_ci	SA_ALG_EBC_AES,
7762306a36Sopenharmony_ci	SA_ALG_CBC_DES3,
7862306a36Sopenharmony_ci	SA_ALG_ECB_DES3,
7962306a36Sopenharmony_ci	SA_ALG_SHA1,
8062306a36Sopenharmony_ci	SA_ALG_SHA256,
8162306a36Sopenharmony_ci	SA_ALG_SHA512,
8262306a36Sopenharmony_ci	SA_ALG_AUTHENC_SHA1_AES,
8362306a36Sopenharmony_ci	SA_ALG_AUTHENC_SHA256_AES,
8462306a36Sopenharmony_ci};
8562306a36Sopenharmony_ci
8662306a36Sopenharmony_cistruct sa_match_data {
8762306a36Sopenharmony_ci	u8 priv;
8862306a36Sopenharmony_ci	u8 priv_id;
8962306a36Sopenharmony_ci	u32 supported_algos;
9062306a36Sopenharmony_ci};
9162306a36Sopenharmony_ci
9262306a36Sopenharmony_cistatic struct device *sa_k3_dev;
9362306a36Sopenharmony_ci
9462306a36Sopenharmony_ci/**
9562306a36Sopenharmony_ci * struct sa_cmdl_cfg - Command label configuration descriptor
9662306a36Sopenharmony_ci * @aalg: authentication algorithm ID
9762306a36Sopenharmony_ci * @enc_eng_id: Encryption Engine ID supported by the SA hardware
9862306a36Sopenharmony_ci * @auth_eng_id: Authentication Engine ID
9962306a36Sopenharmony_ci * @iv_size: Initialization Vector size
10062306a36Sopenharmony_ci * @akey: Authentication key
10162306a36Sopenharmony_ci * @akey_len: Authentication key length
10262306a36Sopenharmony_ci * @enc: True, if this is an encode request
10362306a36Sopenharmony_ci */
10462306a36Sopenharmony_cistruct sa_cmdl_cfg {
10562306a36Sopenharmony_ci	int aalg;
10662306a36Sopenharmony_ci	u8 enc_eng_id;
10762306a36Sopenharmony_ci	u8 auth_eng_id;
10862306a36Sopenharmony_ci	u8 iv_size;
10962306a36Sopenharmony_ci	const u8 *akey;
11062306a36Sopenharmony_ci	u16 akey_len;
11162306a36Sopenharmony_ci	bool enc;
11262306a36Sopenharmony_ci};
11362306a36Sopenharmony_ci
11462306a36Sopenharmony_ci/**
11562306a36Sopenharmony_ci * struct algo_data - Crypto algorithm specific data
11662306a36Sopenharmony_ci * @enc_eng: Encryption engine info structure
11762306a36Sopenharmony_ci * @auth_eng: Authentication engine info structure
11862306a36Sopenharmony_ci * @auth_ctrl: Authentication control word
11962306a36Sopenharmony_ci * @hash_size: Size of digest
12062306a36Sopenharmony_ci * @iv_idx: iv index in psdata
12162306a36Sopenharmony_ci * @iv_out_size: iv out size
12262306a36Sopenharmony_ci * @ealg_id: Encryption Algorithm ID
12362306a36Sopenharmony_ci * @aalg_id: Authentication algorithm ID
12462306a36Sopenharmony_ci * @mci_enc: Mode Control Instruction for Encryption algorithm
12562306a36Sopenharmony_ci * @mci_dec: Mode Control Instruction for Decryption
12662306a36Sopenharmony_ci * @inv_key: Whether the encryption algorithm demands key inversion
12762306a36Sopenharmony_ci * @ctx: Pointer to the algorithm context
12862306a36Sopenharmony_ci * @keyed_mac: Whether the authentication algorithm has key
12962306a36Sopenharmony_ci * @prep_iopad: Function pointer to generate intermediate ipad/opad
13062306a36Sopenharmony_ci */
13162306a36Sopenharmony_cistruct algo_data {
13262306a36Sopenharmony_ci	struct sa_eng_info enc_eng;
13362306a36Sopenharmony_ci	struct sa_eng_info auth_eng;
13462306a36Sopenharmony_ci	u8 auth_ctrl;
13562306a36Sopenharmony_ci	u8 hash_size;
13662306a36Sopenharmony_ci	u8 iv_idx;
13762306a36Sopenharmony_ci	u8 iv_out_size;
13862306a36Sopenharmony_ci	u8 ealg_id;
13962306a36Sopenharmony_ci	u8 aalg_id;
14062306a36Sopenharmony_ci	u8 *mci_enc;
14162306a36Sopenharmony_ci	u8 *mci_dec;
14262306a36Sopenharmony_ci	bool inv_key;
14362306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx;
14462306a36Sopenharmony_ci	bool keyed_mac;
14562306a36Sopenharmony_ci	void (*prep_iopad)(struct algo_data *algo, const u8 *key,
14662306a36Sopenharmony_ci			   u16 key_sz, __be32 *ipad, __be32 *opad);
14762306a36Sopenharmony_ci};
14862306a36Sopenharmony_ci
14962306a36Sopenharmony_ci/**
15062306a36Sopenharmony_ci * struct sa_alg_tmpl: A generic template encompassing crypto/aead algorithms
15162306a36Sopenharmony_ci * @type: Type of the crypto algorithm.
15262306a36Sopenharmony_ci * @alg: Union of crypto algorithm definitions.
15362306a36Sopenharmony_ci * @registered: Flag indicating if the crypto algorithm is already registered
15462306a36Sopenharmony_ci */
15562306a36Sopenharmony_cistruct sa_alg_tmpl {
15662306a36Sopenharmony_ci	u32 type;		/* CRYPTO_ALG_TYPE from <linux/crypto.h> */
15762306a36Sopenharmony_ci	union {
15862306a36Sopenharmony_ci		struct skcipher_alg skcipher;
15962306a36Sopenharmony_ci		struct ahash_alg ahash;
16062306a36Sopenharmony_ci		struct aead_alg aead;
16162306a36Sopenharmony_ci	} alg;
16262306a36Sopenharmony_ci	bool registered;
16362306a36Sopenharmony_ci};
16462306a36Sopenharmony_ci
16562306a36Sopenharmony_ci/**
16662306a36Sopenharmony_ci * struct sa_mapped_sg: scatterlist information for tx and rx
16762306a36Sopenharmony_ci * @mapped: Set to true if the @sgt is mapped
16862306a36Sopenharmony_ci * @dir: mapping direction used for @sgt
16962306a36Sopenharmony_ci * @split_sg: Set if the sg is split and needs to be freed up
17062306a36Sopenharmony_ci * @static_sg: Static scatterlist entry for overriding data
17162306a36Sopenharmony_ci * @sgt: scatterlist table for DMA API use
17262306a36Sopenharmony_ci */
17362306a36Sopenharmony_cistruct sa_mapped_sg {
17462306a36Sopenharmony_ci	bool mapped;
17562306a36Sopenharmony_ci	enum dma_data_direction dir;
17662306a36Sopenharmony_ci	struct scatterlist static_sg;
17762306a36Sopenharmony_ci	struct scatterlist *split_sg;
17862306a36Sopenharmony_ci	struct sg_table sgt;
17962306a36Sopenharmony_ci};
18062306a36Sopenharmony_ci/**
18162306a36Sopenharmony_ci * struct sa_rx_data: RX Packet miscellaneous data place holder
18262306a36Sopenharmony_ci * @req: crypto request data pointer
18362306a36Sopenharmony_ci * @ddev: pointer to the DMA device
18462306a36Sopenharmony_ci * @tx_in: dma_async_tx_descriptor pointer for rx channel
18562306a36Sopenharmony_ci * @mapped_sg: Information on tx (0) and rx (1) scatterlist DMA mapping
18662306a36Sopenharmony_ci * @enc: Flag indicating either encryption or decryption
18762306a36Sopenharmony_ci * @enc_iv_size: Initialisation vector size
18862306a36Sopenharmony_ci * @iv_idx: Initialisation vector index
18962306a36Sopenharmony_ci */
19062306a36Sopenharmony_cistruct sa_rx_data {
19162306a36Sopenharmony_ci	void *req;
19262306a36Sopenharmony_ci	struct device *ddev;
19362306a36Sopenharmony_ci	struct dma_async_tx_descriptor *tx_in;
19462306a36Sopenharmony_ci	struct sa_mapped_sg mapped_sg[2];
19562306a36Sopenharmony_ci	u8 enc;
19662306a36Sopenharmony_ci	u8 enc_iv_size;
19762306a36Sopenharmony_ci	u8 iv_idx;
19862306a36Sopenharmony_ci};
19962306a36Sopenharmony_ci
20062306a36Sopenharmony_ci/**
20162306a36Sopenharmony_ci * struct sa_req: SA request definition
20262306a36Sopenharmony_ci * @dev: device for the request
20362306a36Sopenharmony_ci * @size: total data to the xmitted via DMA
20462306a36Sopenharmony_ci * @enc_offset: offset of cipher data
20562306a36Sopenharmony_ci * @enc_size: data to be passed to cipher engine
20662306a36Sopenharmony_ci * @enc_iv: cipher IV
20762306a36Sopenharmony_ci * @auth_offset: offset of the authentication data
20862306a36Sopenharmony_ci * @auth_size: size of the authentication data
20962306a36Sopenharmony_ci * @auth_iv: authentication IV
21062306a36Sopenharmony_ci * @type: algorithm type for the request
21162306a36Sopenharmony_ci * @cmdl: command label pointer
21262306a36Sopenharmony_ci * @base: pointer to the base request
21362306a36Sopenharmony_ci * @ctx: pointer to the algorithm context data
21462306a36Sopenharmony_ci * @enc: true if this is an encode request
21562306a36Sopenharmony_ci * @src: source data
21662306a36Sopenharmony_ci * @dst: destination data
21762306a36Sopenharmony_ci * @callback: DMA callback for the request
21862306a36Sopenharmony_ci * @mdata_size: metadata size passed to DMA
21962306a36Sopenharmony_ci */
22062306a36Sopenharmony_cistruct sa_req {
22162306a36Sopenharmony_ci	struct device *dev;
22262306a36Sopenharmony_ci	u16 size;
22362306a36Sopenharmony_ci	u8 enc_offset;
22462306a36Sopenharmony_ci	u16 enc_size;
22562306a36Sopenharmony_ci	u8 *enc_iv;
22662306a36Sopenharmony_ci	u8 auth_offset;
22762306a36Sopenharmony_ci	u16 auth_size;
22862306a36Sopenharmony_ci	u8 *auth_iv;
22962306a36Sopenharmony_ci	u32 type;
23062306a36Sopenharmony_ci	u32 *cmdl;
23162306a36Sopenharmony_ci	struct crypto_async_request *base;
23262306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx;
23362306a36Sopenharmony_ci	bool enc;
23462306a36Sopenharmony_ci	struct scatterlist *src;
23562306a36Sopenharmony_ci	struct scatterlist *dst;
23662306a36Sopenharmony_ci	dma_async_tx_callback callback;
23762306a36Sopenharmony_ci	u16 mdata_size;
23862306a36Sopenharmony_ci};
23962306a36Sopenharmony_ci
24062306a36Sopenharmony_ci/*
24162306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256
24262306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode for encryption
24362306a36Sopenharmony_ci */
24462306a36Sopenharmony_cistatic u8 mci_cbc_enc_array[3][MODE_CONTROL_BYTES] = {
24562306a36Sopenharmony_ci	{	0x61, 0x00, 0x00, 0x18, 0x88, 0x0a, 0xaa, 0x4b, 0x7e, 0x00,
24662306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
24762306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
24862306a36Sopenharmony_ci	{	0x61, 0x00, 0x00, 0x18, 0x88, 0x4a, 0xaa, 0x4b, 0x7e, 0x00,
24962306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
25062306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
25162306a36Sopenharmony_ci	{	0x61, 0x00, 0x00, 0x18, 0x88, 0x8a, 0xaa, 0x4b, 0x7e, 0x00,
25262306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
25362306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
25462306a36Sopenharmony_ci};
25562306a36Sopenharmony_ci
25662306a36Sopenharmony_ci/*
25762306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256
25862306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode for decryption
25962306a36Sopenharmony_ci */
26062306a36Sopenharmony_cistatic u8 mci_cbc_dec_array[3][MODE_CONTROL_BYTES] = {
26162306a36Sopenharmony_ci	{	0x71, 0x00, 0x00, 0x80, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0,
26262306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
26362306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
26462306a36Sopenharmony_ci	{	0x71, 0x00, 0x00, 0x84, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0,
26562306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
26662306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
26762306a36Sopenharmony_ci	{	0x71, 0x00, 0x00, 0x88, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0,
26862306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
26962306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
27062306a36Sopenharmony_ci};
27162306a36Sopenharmony_ci
27262306a36Sopenharmony_ci/*
27362306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256
27462306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode for encryption
27562306a36Sopenharmony_ci */
27662306a36Sopenharmony_cistatic u8 mci_cbc_enc_no_iv_array[3][MODE_CONTROL_BYTES] = {
27762306a36Sopenharmony_ci	{	0x21, 0x00, 0x00, 0x18, 0x88, 0x0a, 0xaa, 0x4b, 0x7e, 0x00,
27862306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
27962306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
28062306a36Sopenharmony_ci	{	0x21, 0x00, 0x00, 0x18, 0x88, 0x4a, 0xaa, 0x4b, 0x7e, 0x00,
28162306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
28262306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
28362306a36Sopenharmony_ci	{	0x21, 0x00, 0x00, 0x18, 0x88, 0x8a, 0xaa, 0x4b, 0x7e, 0x00,
28462306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
28562306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
28662306a36Sopenharmony_ci};
28762306a36Sopenharmony_ci
28862306a36Sopenharmony_ci/*
28962306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256
29062306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode for decryption
29162306a36Sopenharmony_ci */
29262306a36Sopenharmony_cistatic u8 mci_cbc_dec_no_iv_array[3][MODE_CONTROL_BYTES] = {
29362306a36Sopenharmony_ci	{	0x31, 0x00, 0x00, 0x80, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0,
29462306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
29562306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
29662306a36Sopenharmony_ci	{	0x31, 0x00, 0x00, 0x84, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0,
29762306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
29862306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
29962306a36Sopenharmony_ci	{	0x31, 0x00, 0x00, 0x88, 0x8a, 0xca, 0x98, 0xf4, 0x40, 0xc0,
30062306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
30162306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
30262306a36Sopenharmony_ci};
30362306a36Sopenharmony_ci
30462306a36Sopenharmony_ci/*
30562306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256
30662306a36Sopenharmony_ci * For ECB (Electronic Code Book) mode for encryption
30762306a36Sopenharmony_ci */
30862306a36Sopenharmony_cistatic u8 mci_ecb_enc_array[3][27] = {
30962306a36Sopenharmony_ci	{	0x21, 0x00, 0x00, 0x80, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00,
31062306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
31162306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
31262306a36Sopenharmony_ci	{	0x21, 0x00, 0x00, 0x84, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00,
31362306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
31462306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
31562306a36Sopenharmony_ci	{	0x21, 0x00, 0x00, 0x88, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00,
31662306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
31762306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
31862306a36Sopenharmony_ci};
31962306a36Sopenharmony_ci
32062306a36Sopenharmony_ci/*
32162306a36Sopenharmony_ci * Mode Control Instructions for various Key lengths 128, 192, 256
32262306a36Sopenharmony_ci * For ECB (Electronic Code Book) mode for decryption
32362306a36Sopenharmony_ci */
32462306a36Sopenharmony_cistatic u8 mci_ecb_dec_array[3][27] = {
32562306a36Sopenharmony_ci	{	0x31, 0x00, 0x00, 0x80, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00,
32662306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
32762306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
32862306a36Sopenharmony_ci	{	0x31, 0x00, 0x00, 0x84, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00,
32962306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
33062306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
33162306a36Sopenharmony_ci	{	0x31, 0x00, 0x00, 0x88, 0x8a, 0x04, 0xb7, 0x90, 0x00, 0x00,
33262306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
33362306a36Sopenharmony_ci		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00	},
33462306a36Sopenharmony_ci};
33562306a36Sopenharmony_ci
33662306a36Sopenharmony_ci/*
33762306a36Sopenharmony_ci * Mode Control Instructions for DES algorithm
33862306a36Sopenharmony_ci * For CBC (Cipher Block Chaining) mode and ECB mode
33962306a36Sopenharmony_ci * encryption and for decryption respectively
34062306a36Sopenharmony_ci */
34162306a36Sopenharmony_cistatic u8 mci_cbc_3des_enc_array[MODE_CONTROL_BYTES] = {
34262306a36Sopenharmony_ci	0x60, 0x00, 0x00, 0x18, 0x88, 0x52, 0xaa, 0x4b, 0x7e, 0x00, 0x00, 0x00,
34362306a36Sopenharmony_ci	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
34462306a36Sopenharmony_ci	0x00, 0x00, 0x00,
34562306a36Sopenharmony_ci};
34662306a36Sopenharmony_ci
34762306a36Sopenharmony_cistatic u8 mci_cbc_3des_dec_array[MODE_CONTROL_BYTES] = {
34862306a36Sopenharmony_ci	0x70, 0x00, 0x00, 0x85, 0x0a, 0xca, 0x98, 0xf4, 0x40, 0xc0, 0x00, 0x00,
34962306a36Sopenharmony_ci	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
35062306a36Sopenharmony_ci	0x00, 0x00, 0x00,
35162306a36Sopenharmony_ci};
35262306a36Sopenharmony_ci
35362306a36Sopenharmony_cistatic u8 mci_ecb_3des_enc_array[MODE_CONTROL_BYTES] = {
35462306a36Sopenharmony_ci	0x20, 0x00, 0x00, 0x85, 0x0a, 0x04, 0xb7, 0x90, 0x00, 0x00, 0x00, 0x00,
35562306a36Sopenharmony_ci	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
35662306a36Sopenharmony_ci	0x00, 0x00, 0x00,
35762306a36Sopenharmony_ci};
35862306a36Sopenharmony_ci
35962306a36Sopenharmony_cistatic u8 mci_ecb_3des_dec_array[MODE_CONTROL_BYTES] = {
36062306a36Sopenharmony_ci	0x30, 0x00, 0x00, 0x85, 0x0a, 0x04, 0xb7, 0x90, 0x00, 0x00, 0x00, 0x00,
36162306a36Sopenharmony_ci	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
36262306a36Sopenharmony_ci	0x00, 0x00, 0x00,
36362306a36Sopenharmony_ci};
36462306a36Sopenharmony_ci
36562306a36Sopenharmony_ci/*
36662306a36Sopenharmony_ci * Perform 16 byte or 128 bit swizzling
36762306a36Sopenharmony_ci * The SA2UL Expects the security context to
36862306a36Sopenharmony_ci * be in little Endian and the bus width is 128 bits or 16 bytes
36962306a36Sopenharmony_ci * Hence swap 16 bytes at a time from higher to lower address
37062306a36Sopenharmony_ci */
37162306a36Sopenharmony_cistatic void sa_swiz_128(u8 *in, u16 len)
37262306a36Sopenharmony_ci{
37362306a36Sopenharmony_ci	u8 data[16];
37462306a36Sopenharmony_ci	int i, j;
37562306a36Sopenharmony_ci
37662306a36Sopenharmony_ci	for (i = 0; i < len; i += 16) {
37762306a36Sopenharmony_ci		memcpy(data, &in[i], 16);
37862306a36Sopenharmony_ci		for (j = 0; j < 16; j++)
37962306a36Sopenharmony_ci			in[i + j] = data[15 - j];
38062306a36Sopenharmony_ci	}
38162306a36Sopenharmony_ci}
38262306a36Sopenharmony_ci
38362306a36Sopenharmony_ci/* Prepare the ipad and opad from key as per SHA algorithm step 1*/
38462306a36Sopenharmony_cistatic void prepare_kipad(u8 *k_ipad, const u8 *key, u16 key_sz)
38562306a36Sopenharmony_ci{
38662306a36Sopenharmony_ci	int i;
38762306a36Sopenharmony_ci
38862306a36Sopenharmony_ci	for (i = 0; i < key_sz; i++)
38962306a36Sopenharmony_ci		k_ipad[i] = key[i] ^ 0x36;
39062306a36Sopenharmony_ci
39162306a36Sopenharmony_ci	/* Instead of XOR with 0 */
39262306a36Sopenharmony_ci	for (; i < SHA1_BLOCK_SIZE; i++)
39362306a36Sopenharmony_ci		k_ipad[i] = 0x36;
39462306a36Sopenharmony_ci}
39562306a36Sopenharmony_ci
39662306a36Sopenharmony_cistatic void prepare_kopad(u8 *k_opad, const u8 *key, u16 key_sz)
39762306a36Sopenharmony_ci{
39862306a36Sopenharmony_ci	int i;
39962306a36Sopenharmony_ci
40062306a36Sopenharmony_ci	for (i = 0; i < key_sz; i++)
40162306a36Sopenharmony_ci		k_opad[i] = key[i] ^ 0x5c;
40262306a36Sopenharmony_ci
40362306a36Sopenharmony_ci	/* Instead of XOR with 0 */
40462306a36Sopenharmony_ci	for (; i < SHA1_BLOCK_SIZE; i++)
40562306a36Sopenharmony_ci		k_opad[i] = 0x5c;
40662306a36Sopenharmony_ci}
40762306a36Sopenharmony_ci
40862306a36Sopenharmony_cistatic void sa_export_shash(void *state, struct shash_desc *hash,
40962306a36Sopenharmony_ci			    int digest_size, __be32 *out)
41062306a36Sopenharmony_ci{
41162306a36Sopenharmony_ci	struct sha1_state *sha1;
41262306a36Sopenharmony_ci	struct sha256_state *sha256;
41362306a36Sopenharmony_ci	u32 *result;
41462306a36Sopenharmony_ci
41562306a36Sopenharmony_ci	switch (digest_size) {
41662306a36Sopenharmony_ci	case SHA1_DIGEST_SIZE:
41762306a36Sopenharmony_ci		sha1 = state;
41862306a36Sopenharmony_ci		result = sha1->state;
41962306a36Sopenharmony_ci		break;
42062306a36Sopenharmony_ci	case SHA256_DIGEST_SIZE:
42162306a36Sopenharmony_ci		sha256 = state;
42262306a36Sopenharmony_ci		result = sha256->state;
42362306a36Sopenharmony_ci		break;
42462306a36Sopenharmony_ci	default:
42562306a36Sopenharmony_ci		dev_err(sa_k3_dev, "%s: bad digest_size=%d\n", __func__,
42662306a36Sopenharmony_ci			digest_size);
42762306a36Sopenharmony_ci		return;
42862306a36Sopenharmony_ci	}
42962306a36Sopenharmony_ci
43062306a36Sopenharmony_ci	crypto_shash_export(hash, state);
43162306a36Sopenharmony_ci
43262306a36Sopenharmony_ci	cpu_to_be32_array(out, result, digest_size / 4);
43362306a36Sopenharmony_ci}
43462306a36Sopenharmony_ci
43562306a36Sopenharmony_cistatic void sa_prepare_iopads(struct algo_data *data, const u8 *key,
43662306a36Sopenharmony_ci			      u16 key_sz, __be32 *ipad, __be32 *opad)
43762306a36Sopenharmony_ci{
43862306a36Sopenharmony_ci	SHASH_DESC_ON_STACK(shash, data->ctx->shash);
43962306a36Sopenharmony_ci	int block_size = crypto_shash_blocksize(data->ctx->shash);
44062306a36Sopenharmony_ci	int digest_size = crypto_shash_digestsize(data->ctx->shash);
44162306a36Sopenharmony_ci	union {
44262306a36Sopenharmony_ci		struct sha1_state sha1;
44362306a36Sopenharmony_ci		struct sha256_state sha256;
44462306a36Sopenharmony_ci		u8 k_pad[SHA1_BLOCK_SIZE];
44562306a36Sopenharmony_ci	} sha;
44662306a36Sopenharmony_ci
44762306a36Sopenharmony_ci	shash->tfm = data->ctx->shash;
44862306a36Sopenharmony_ci
44962306a36Sopenharmony_ci	prepare_kipad(sha.k_pad, key, key_sz);
45062306a36Sopenharmony_ci
45162306a36Sopenharmony_ci	crypto_shash_init(shash);
45262306a36Sopenharmony_ci	crypto_shash_update(shash, sha.k_pad, block_size);
45362306a36Sopenharmony_ci	sa_export_shash(&sha, shash, digest_size, ipad);
45462306a36Sopenharmony_ci
45562306a36Sopenharmony_ci	prepare_kopad(sha.k_pad, key, key_sz);
45662306a36Sopenharmony_ci
45762306a36Sopenharmony_ci	crypto_shash_init(shash);
45862306a36Sopenharmony_ci	crypto_shash_update(shash, sha.k_pad, block_size);
45962306a36Sopenharmony_ci
46062306a36Sopenharmony_ci	sa_export_shash(&sha, shash, digest_size, opad);
46162306a36Sopenharmony_ci
46262306a36Sopenharmony_ci	memzero_explicit(&sha, sizeof(sha));
46362306a36Sopenharmony_ci}
46462306a36Sopenharmony_ci
46562306a36Sopenharmony_ci/* Derive the inverse key used in AES-CBC decryption operation */
46662306a36Sopenharmony_cistatic inline int sa_aes_inv_key(u8 *inv_key, const u8 *key, u16 key_sz)
46762306a36Sopenharmony_ci{
46862306a36Sopenharmony_ci	struct crypto_aes_ctx ctx;
46962306a36Sopenharmony_ci	int key_pos;
47062306a36Sopenharmony_ci
47162306a36Sopenharmony_ci	if (aes_expandkey(&ctx, key, key_sz)) {
47262306a36Sopenharmony_ci		dev_err(sa_k3_dev, "%s: bad key len(%d)\n", __func__, key_sz);
47362306a36Sopenharmony_ci		return -EINVAL;
47462306a36Sopenharmony_ci	}
47562306a36Sopenharmony_ci
47662306a36Sopenharmony_ci	/* work around to get the right inverse for AES_KEYSIZE_192 size keys */
47762306a36Sopenharmony_ci	if (key_sz == AES_KEYSIZE_192) {
47862306a36Sopenharmony_ci		ctx.key_enc[52] = ctx.key_enc[51] ^ ctx.key_enc[46];
47962306a36Sopenharmony_ci		ctx.key_enc[53] = ctx.key_enc[52] ^ ctx.key_enc[47];
48062306a36Sopenharmony_ci	}
48162306a36Sopenharmony_ci
48262306a36Sopenharmony_ci	/* Based crypto_aes_expand_key logic */
48362306a36Sopenharmony_ci	switch (key_sz) {
48462306a36Sopenharmony_ci	case AES_KEYSIZE_128:
48562306a36Sopenharmony_ci	case AES_KEYSIZE_192:
48662306a36Sopenharmony_ci		key_pos = key_sz + 24;
48762306a36Sopenharmony_ci		break;
48862306a36Sopenharmony_ci
48962306a36Sopenharmony_ci	case AES_KEYSIZE_256:
49062306a36Sopenharmony_ci		key_pos = key_sz + 24 - 4;
49162306a36Sopenharmony_ci		break;
49262306a36Sopenharmony_ci
49362306a36Sopenharmony_ci	default:
49462306a36Sopenharmony_ci		dev_err(sa_k3_dev, "%s: bad key len(%d)\n", __func__, key_sz);
49562306a36Sopenharmony_ci		return -EINVAL;
49662306a36Sopenharmony_ci	}
49762306a36Sopenharmony_ci
49862306a36Sopenharmony_ci	memcpy(inv_key, &ctx.key_enc[key_pos], key_sz);
49962306a36Sopenharmony_ci	return 0;
50062306a36Sopenharmony_ci}
50162306a36Sopenharmony_ci
50262306a36Sopenharmony_ci/* Set Security context for the encryption engine */
50362306a36Sopenharmony_cistatic int sa_set_sc_enc(struct algo_data *ad, const u8 *key, u16 key_sz,
50462306a36Sopenharmony_ci			 u8 enc, u8 *sc_buf)
50562306a36Sopenharmony_ci{
50662306a36Sopenharmony_ci	const u8 *mci = NULL;
50762306a36Sopenharmony_ci
50862306a36Sopenharmony_ci	/* Set Encryption mode selector to crypto processing */
50962306a36Sopenharmony_ci	sc_buf[0] = SA_CRYPTO_PROCESSING;
51062306a36Sopenharmony_ci
51162306a36Sopenharmony_ci	if (enc)
51262306a36Sopenharmony_ci		mci = ad->mci_enc;
51362306a36Sopenharmony_ci	else
51462306a36Sopenharmony_ci		mci = ad->mci_dec;
51562306a36Sopenharmony_ci	/* Set the mode control instructions in security context */
51662306a36Sopenharmony_ci	if (mci)
51762306a36Sopenharmony_ci		memcpy(&sc_buf[1], mci, MODE_CONTROL_BYTES);
51862306a36Sopenharmony_ci
51962306a36Sopenharmony_ci	/* For AES-CBC decryption get the inverse key */
52062306a36Sopenharmony_ci	if (ad->inv_key && !enc) {
52162306a36Sopenharmony_ci		if (sa_aes_inv_key(&sc_buf[SC_ENC_KEY_OFFSET], key, key_sz))
52262306a36Sopenharmony_ci			return -EINVAL;
52362306a36Sopenharmony_ci	/* For all other cases: key is used */
52462306a36Sopenharmony_ci	} else {
52562306a36Sopenharmony_ci		memcpy(&sc_buf[SC_ENC_KEY_OFFSET], key, key_sz);
52662306a36Sopenharmony_ci	}
52762306a36Sopenharmony_ci
52862306a36Sopenharmony_ci	return 0;
52962306a36Sopenharmony_ci}
53062306a36Sopenharmony_ci
53162306a36Sopenharmony_ci/* Set Security context for the authentication engine */
53262306a36Sopenharmony_cistatic void sa_set_sc_auth(struct algo_data *ad, const u8 *key, u16 key_sz,
53362306a36Sopenharmony_ci			   u8 *sc_buf)
53462306a36Sopenharmony_ci{
53562306a36Sopenharmony_ci	__be32 *ipad = (void *)(sc_buf + 32);
53662306a36Sopenharmony_ci	__be32 *opad = (void *)(sc_buf + 64);
53762306a36Sopenharmony_ci
53862306a36Sopenharmony_ci	/* Set Authentication mode selector to hash processing */
53962306a36Sopenharmony_ci	sc_buf[0] = SA_HASH_PROCESSING;
54062306a36Sopenharmony_ci	/* Auth SW ctrl word: bit[6]=1 (upload computed hash to TLR section) */
54162306a36Sopenharmony_ci	sc_buf[1] = SA_UPLOAD_HASH_TO_TLR;
54262306a36Sopenharmony_ci	sc_buf[1] |= ad->auth_ctrl;
54362306a36Sopenharmony_ci
54462306a36Sopenharmony_ci	/* Copy the keys or ipad/opad */
54562306a36Sopenharmony_ci	if (ad->keyed_mac)
54662306a36Sopenharmony_ci		ad->prep_iopad(ad, key, key_sz, ipad, opad);
54762306a36Sopenharmony_ci	else {
54862306a36Sopenharmony_ci		/* basic hash */
54962306a36Sopenharmony_ci		sc_buf[1] |= SA_BASIC_HASH;
55062306a36Sopenharmony_ci	}
55162306a36Sopenharmony_ci}
55262306a36Sopenharmony_ci
55362306a36Sopenharmony_cistatic inline void sa_copy_iv(__be32 *out, const u8 *iv, bool size16)
55462306a36Sopenharmony_ci{
55562306a36Sopenharmony_ci	int j;
55662306a36Sopenharmony_ci
55762306a36Sopenharmony_ci	for (j = 0; j < ((size16) ? 4 : 2); j++) {
55862306a36Sopenharmony_ci		*out = cpu_to_be32(*((u32 *)iv));
55962306a36Sopenharmony_ci		iv += 4;
56062306a36Sopenharmony_ci		out++;
56162306a36Sopenharmony_ci	}
56262306a36Sopenharmony_ci}
56362306a36Sopenharmony_ci
56462306a36Sopenharmony_ci/* Format general command label */
56562306a36Sopenharmony_cistatic int sa_format_cmdl_gen(struct sa_cmdl_cfg *cfg, u8 *cmdl,
56662306a36Sopenharmony_ci			      struct sa_cmdl_upd_info *upd_info)
56762306a36Sopenharmony_ci{
56862306a36Sopenharmony_ci	u8 enc_offset = 0, auth_offset = 0, total = 0;
56962306a36Sopenharmony_ci	u8 enc_next_eng = SA_ENG_ID_OUTPORT2;
57062306a36Sopenharmony_ci	u8 auth_next_eng = SA_ENG_ID_OUTPORT2;
57162306a36Sopenharmony_ci	u32 *word_ptr = (u32 *)cmdl;
57262306a36Sopenharmony_ci	int i;
57362306a36Sopenharmony_ci
57462306a36Sopenharmony_ci	/* Clear the command label */
57562306a36Sopenharmony_ci	memzero_explicit(cmdl, (SA_MAX_CMDL_WORDS * sizeof(u32)));
57662306a36Sopenharmony_ci
57762306a36Sopenharmony_ci	/* Iniialize the command update structure */
57862306a36Sopenharmony_ci	memzero_explicit(upd_info, sizeof(*upd_info));
57962306a36Sopenharmony_ci
58062306a36Sopenharmony_ci	if (cfg->enc_eng_id && cfg->auth_eng_id) {
58162306a36Sopenharmony_ci		if (cfg->enc) {
58262306a36Sopenharmony_ci			auth_offset = SA_CMDL_HEADER_SIZE_BYTES;
58362306a36Sopenharmony_ci			enc_next_eng = cfg->auth_eng_id;
58462306a36Sopenharmony_ci
58562306a36Sopenharmony_ci			if (cfg->iv_size)
58662306a36Sopenharmony_ci				auth_offset += cfg->iv_size;
58762306a36Sopenharmony_ci		} else {
58862306a36Sopenharmony_ci			enc_offset = SA_CMDL_HEADER_SIZE_BYTES;
58962306a36Sopenharmony_ci			auth_next_eng = cfg->enc_eng_id;
59062306a36Sopenharmony_ci		}
59162306a36Sopenharmony_ci	}
59262306a36Sopenharmony_ci
59362306a36Sopenharmony_ci	if (cfg->enc_eng_id) {
59462306a36Sopenharmony_ci		upd_info->flags |= SA_CMDL_UPD_ENC;
59562306a36Sopenharmony_ci		upd_info->enc_size.index = enc_offset >> 2;
59662306a36Sopenharmony_ci		upd_info->enc_offset.index = upd_info->enc_size.index + 1;
59762306a36Sopenharmony_ci		/* Encryption command label */
59862306a36Sopenharmony_ci		cmdl[enc_offset + SA_CMDL_OFFSET_NESC] = enc_next_eng;
59962306a36Sopenharmony_ci
60062306a36Sopenharmony_ci		/* Encryption modes requiring IV */
60162306a36Sopenharmony_ci		if (cfg->iv_size) {
60262306a36Sopenharmony_ci			upd_info->flags |= SA_CMDL_UPD_ENC_IV;
60362306a36Sopenharmony_ci			upd_info->enc_iv.index =
60462306a36Sopenharmony_ci				(enc_offset + SA_CMDL_HEADER_SIZE_BYTES) >> 2;
60562306a36Sopenharmony_ci			upd_info->enc_iv.size = cfg->iv_size;
60662306a36Sopenharmony_ci
60762306a36Sopenharmony_ci			cmdl[enc_offset + SA_CMDL_OFFSET_LABEL_LEN] =
60862306a36Sopenharmony_ci				SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size;
60962306a36Sopenharmony_ci
61062306a36Sopenharmony_ci			cmdl[enc_offset + SA_CMDL_OFFSET_OPTION_CTRL1] =
61162306a36Sopenharmony_ci				(SA_CTX_ENC_AUX2_OFFSET | (cfg->iv_size >> 3));
61262306a36Sopenharmony_ci			total += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size;
61362306a36Sopenharmony_ci		} else {
61462306a36Sopenharmony_ci			cmdl[enc_offset + SA_CMDL_OFFSET_LABEL_LEN] =
61562306a36Sopenharmony_ci						SA_CMDL_HEADER_SIZE_BYTES;
61662306a36Sopenharmony_ci			total += SA_CMDL_HEADER_SIZE_BYTES;
61762306a36Sopenharmony_ci		}
61862306a36Sopenharmony_ci	}
61962306a36Sopenharmony_ci
62062306a36Sopenharmony_ci	if (cfg->auth_eng_id) {
62162306a36Sopenharmony_ci		upd_info->flags |= SA_CMDL_UPD_AUTH;
62262306a36Sopenharmony_ci		upd_info->auth_size.index = auth_offset >> 2;
62362306a36Sopenharmony_ci		upd_info->auth_offset.index = upd_info->auth_size.index + 1;
62462306a36Sopenharmony_ci		cmdl[auth_offset + SA_CMDL_OFFSET_NESC] = auth_next_eng;
62562306a36Sopenharmony_ci		cmdl[auth_offset + SA_CMDL_OFFSET_LABEL_LEN] =
62662306a36Sopenharmony_ci			SA_CMDL_HEADER_SIZE_BYTES;
62762306a36Sopenharmony_ci		total += SA_CMDL_HEADER_SIZE_BYTES;
62862306a36Sopenharmony_ci	}
62962306a36Sopenharmony_ci
63062306a36Sopenharmony_ci	total = roundup(total, 8);
63162306a36Sopenharmony_ci
63262306a36Sopenharmony_ci	for (i = 0; i < total / 4; i++)
63362306a36Sopenharmony_ci		word_ptr[i] = swab32(word_ptr[i]);
63462306a36Sopenharmony_ci
63562306a36Sopenharmony_ci	return total;
63662306a36Sopenharmony_ci}
63762306a36Sopenharmony_ci
63862306a36Sopenharmony_ci/* Update Command label */
63962306a36Sopenharmony_cistatic inline void sa_update_cmdl(struct sa_req *req, u32 *cmdl,
64062306a36Sopenharmony_ci				  struct sa_cmdl_upd_info *upd_info)
64162306a36Sopenharmony_ci{
64262306a36Sopenharmony_ci	int i = 0, j;
64362306a36Sopenharmony_ci
64462306a36Sopenharmony_ci	if (likely(upd_info->flags & SA_CMDL_UPD_ENC)) {
64562306a36Sopenharmony_ci		cmdl[upd_info->enc_size.index] &= ~SA_CMDL_PAYLOAD_LENGTH_MASK;
64662306a36Sopenharmony_ci		cmdl[upd_info->enc_size.index] |= req->enc_size;
64762306a36Sopenharmony_ci		cmdl[upd_info->enc_offset.index] &=
64862306a36Sopenharmony_ci						~SA_CMDL_SOP_BYPASS_LEN_MASK;
64962306a36Sopenharmony_ci		cmdl[upd_info->enc_offset.index] |=
65062306a36Sopenharmony_ci			FIELD_PREP(SA_CMDL_SOP_BYPASS_LEN_MASK,
65162306a36Sopenharmony_ci				   req->enc_offset);
65262306a36Sopenharmony_ci
65362306a36Sopenharmony_ci		if (likely(upd_info->flags & SA_CMDL_UPD_ENC_IV)) {
65462306a36Sopenharmony_ci			__be32 *data = (__be32 *)&cmdl[upd_info->enc_iv.index];
65562306a36Sopenharmony_ci			u32 *enc_iv = (u32 *)req->enc_iv;
65662306a36Sopenharmony_ci
65762306a36Sopenharmony_ci			for (j = 0; i < upd_info->enc_iv.size; i += 4, j++) {
65862306a36Sopenharmony_ci				data[j] = cpu_to_be32(*enc_iv);
65962306a36Sopenharmony_ci				enc_iv++;
66062306a36Sopenharmony_ci			}
66162306a36Sopenharmony_ci		}
66262306a36Sopenharmony_ci	}
66362306a36Sopenharmony_ci
66462306a36Sopenharmony_ci	if (likely(upd_info->flags & SA_CMDL_UPD_AUTH)) {
66562306a36Sopenharmony_ci		cmdl[upd_info->auth_size.index] &= ~SA_CMDL_PAYLOAD_LENGTH_MASK;
66662306a36Sopenharmony_ci		cmdl[upd_info->auth_size.index] |= req->auth_size;
66762306a36Sopenharmony_ci		cmdl[upd_info->auth_offset.index] &=
66862306a36Sopenharmony_ci			~SA_CMDL_SOP_BYPASS_LEN_MASK;
66962306a36Sopenharmony_ci		cmdl[upd_info->auth_offset.index] |=
67062306a36Sopenharmony_ci			FIELD_PREP(SA_CMDL_SOP_BYPASS_LEN_MASK,
67162306a36Sopenharmony_ci				   req->auth_offset);
67262306a36Sopenharmony_ci		if (upd_info->flags & SA_CMDL_UPD_AUTH_IV) {
67362306a36Sopenharmony_ci			sa_copy_iv((void *)&cmdl[upd_info->auth_iv.index],
67462306a36Sopenharmony_ci				   req->auth_iv,
67562306a36Sopenharmony_ci				   (upd_info->auth_iv.size > 8));
67662306a36Sopenharmony_ci		}
67762306a36Sopenharmony_ci		if (upd_info->flags & SA_CMDL_UPD_AUX_KEY) {
67862306a36Sopenharmony_ci			int offset = (req->auth_size & 0xF) ? 4 : 0;
67962306a36Sopenharmony_ci
68062306a36Sopenharmony_ci			memcpy(&cmdl[upd_info->aux_key_info.index],
68162306a36Sopenharmony_ci			       &upd_info->aux_key[offset], 16);
68262306a36Sopenharmony_ci		}
68362306a36Sopenharmony_ci	}
68462306a36Sopenharmony_ci}
68562306a36Sopenharmony_ci
68662306a36Sopenharmony_ci/* Format SWINFO words to be sent to SA */
68762306a36Sopenharmony_cistatic
68862306a36Sopenharmony_civoid sa_set_swinfo(u8 eng_id, u16 sc_id, dma_addr_t sc_phys,
68962306a36Sopenharmony_ci		   u8 cmdl_present, u8 cmdl_offset, u8 flags,
69062306a36Sopenharmony_ci		   u8 hash_size, u32 *swinfo)
69162306a36Sopenharmony_ci{
69262306a36Sopenharmony_ci	swinfo[0] = sc_id;
69362306a36Sopenharmony_ci	swinfo[0] |= FIELD_PREP(SA_SW0_FLAGS_MASK, flags);
69462306a36Sopenharmony_ci	if (likely(cmdl_present))
69562306a36Sopenharmony_ci		swinfo[0] |= FIELD_PREP(SA_SW0_CMDL_INFO_MASK,
69662306a36Sopenharmony_ci					cmdl_offset | SA_SW0_CMDL_PRESENT);
69762306a36Sopenharmony_ci	swinfo[0] |= FIELD_PREP(SA_SW0_ENG_ID_MASK, eng_id);
69862306a36Sopenharmony_ci
69962306a36Sopenharmony_ci	swinfo[0] |= SA_SW0_DEST_INFO_PRESENT;
70062306a36Sopenharmony_ci	swinfo[1] = (u32)(sc_phys & 0xFFFFFFFFULL);
70162306a36Sopenharmony_ci	swinfo[2] = (u32)((sc_phys & 0xFFFFFFFF00000000ULL) >> 32);
70262306a36Sopenharmony_ci	swinfo[2] |= FIELD_PREP(SA_SW2_EGRESS_LENGTH, hash_size);
70362306a36Sopenharmony_ci}
70462306a36Sopenharmony_ci
70562306a36Sopenharmony_ci/* Dump the security context */
70662306a36Sopenharmony_cistatic void sa_dump_sc(u8 *buf, dma_addr_t dma_addr)
70762306a36Sopenharmony_ci{
70862306a36Sopenharmony_ci#ifdef DEBUG
70962306a36Sopenharmony_ci	dev_info(sa_k3_dev, "Security context dump:: 0x%pad\n", &dma_addr);
71062306a36Sopenharmony_ci	print_hex_dump(KERN_CONT, "", DUMP_PREFIX_OFFSET,
71162306a36Sopenharmony_ci		       16, 1, buf, SA_CTX_MAX_SZ, false);
71262306a36Sopenharmony_ci#endif
71362306a36Sopenharmony_ci}
71462306a36Sopenharmony_ci
71562306a36Sopenharmony_cistatic
71662306a36Sopenharmony_ciint sa_init_sc(struct sa_ctx_info *ctx, const struct sa_match_data *match_data,
71762306a36Sopenharmony_ci	       const u8 *enc_key, u16 enc_key_sz,
71862306a36Sopenharmony_ci	       const u8 *auth_key, u16 auth_key_sz,
71962306a36Sopenharmony_ci	       struct algo_data *ad, u8 enc, u32 *swinfo)
72062306a36Sopenharmony_ci{
72162306a36Sopenharmony_ci	int enc_sc_offset = 0;
72262306a36Sopenharmony_ci	int auth_sc_offset = 0;
72362306a36Sopenharmony_ci	u8 *sc_buf = ctx->sc;
72462306a36Sopenharmony_ci	u16 sc_id = ctx->sc_id;
72562306a36Sopenharmony_ci	u8 first_engine = 0;
72662306a36Sopenharmony_ci
72762306a36Sopenharmony_ci	memzero_explicit(sc_buf, SA_CTX_MAX_SZ);
72862306a36Sopenharmony_ci
72962306a36Sopenharmony_ci	if (ad->auth_eng.eng_id) {
73062306a36Sopenharmony_ci		if (enc)
73162306a36Sopenharmony_ci			first_engine = ad->enc_eng.eng_id;
73262306a36Sopenharmony_ci		else
73362306a36Sopenharmony_ci			first_engine = ad->auth_eng.eng_id;
73462306a36Sopenharmony_ci
73562306a36Sopenharmony_ci		enc_sc_offset = SA_CTX_PHP_PE_CTX_SZ;
73662306a36Sopenharmony_ci		auth_sc_offset = enc_sc_offset + ad->enc_eng.sc_size;
73762306a36Sopenharmony_ci		sc_buf[1] = SA_SCCTL_FE_AUTH_ENC;
73862306a36Sopenharmony_ci		if (!ad->hash_size)
73962306a36Sopenharmony_ci			return -EINVAL;
74062306a36Sopenharmony_ci		ad->hash_size = roundup(ad->hash_size, 8);
74162306a36Sopenharmony_ci
74262306a36Sopenharmony_ci	} else if (ad->enc_eng.eng_id && !ad->auth_eng.eng_id) {
74362306a36Sopenharmony_ci		enc_sc_offset = SA_CTX_PHP_PE_CTX_SZ;
74462306a36Sopenharmony_ci		first_engine = ad->enc_eng.eng_id;
74562306a36Sopenharmony_ci		sc_buf[1] = SA_SCCTL_FE_ENC;
74662306a36Sopenharmony_ci		ad->hash_size = ad->iv_out_size;
74762306a36Sopenharmony_ci	}
74862306a36Sopenharmony_ci
74962306a36Sopenharmony_ci	/* SCCTL Owner info: 0=host, 1=CP_ACE */
75062306a36Sopenharmony_ci	sc_buf[SA_CTX_SCCTL_OWNER_OFFSET] = 0;
75162306a36Sopenharmony_ci	memcpy(&sc_buf[2], &sc_id, 2);
75262306a36Sopenharmony_ci	sc_buf[4] = 0x0;
75362306a36Sopenharmony_ci	sc_buf[5] = match_data->priv_id;
75462306a36Sopenharmony_ci	sc_buf[6] = match_data->priv;
75562306a36Sopenharmony_ci	sc_buf[7] = 0x0;
75662306a36Sopenharmony_ci
75762306a36Sopenharmony_ci	/* Prepare context for encryption engine */
75862306a36Sopenharmony_ci	if (ad->enc_eng.sc_size) {
75962306a36Sopenharmony_ci		if (sa_set_sc_enc(ad, enc_key, enc_key_sz, enc,
76062306a36Sopenharmony_ci				  &sc_buf[enc_sc_offset]))
76162306a36Sopenharmony_ci			return -EINVAL;
76262306a36Sopenharmony_ci	}
76362306a36Sopenharmony_ci
76462306a36Sopenharmony_ci	/* Prepare context for authentication engine */
76562306a36Sopenharmony_ci	if (ad->auth_eng.sc_size)
76662306a36Sopenharmony_ci		sa_set_sc_auth(ad, auth_key, auth_key_sz,
76762306a36Sopenharmony_ci			       &sc_buf[auth_sc_offset]);
76862306a36Sopenharmony_ci
76962306a36Sopenharmony_ci	/* Set the ownership of context to CP_ACE */
77062306a36Sopenharmony_ci	sc_buf[SA_CTX_SCCTL_OWNER_OFFSET] = 0x80;
77162306a36Sopenharmony_ci
77262306a36Sopenharmony_ci	/* swizzle the security context */
77362306a36Sopenharmony_ci	sa_swiz_128(sc_buf, SA_CTX_MAX_SZ);
77462306a36Sopenharmony_ci
77562306a36Sopenharmony_ci	sa_set_swinfo(first_engine, ctx->sc_id, ctx->sc_phys, 1, 0,
77662306a36Sopenharmony_ci		      SA_SW_INFO_FLAG_EVICT, ad->hash_size, swinfo);
77762306a36Sopenharmony_ci
77862306a36Sopenharmony_ci	sa_dump_sc(sc_buf, ctx->sc_phys);
77962306a36Sopenharmony_ci
78062306a36Sopenharmony_ci	return 0;
78162306a36Sopenharmony_ci}
78262306a36Sopenharmony_ci
78362306a36Sopenharmony_ci/* Free the per direction context memory */
78462306a36Sopenharmony_cistatic void sa_free_ctx_info(struct sa_ctx_info *ctx,
78562306a36Sopenharmony_ci			     struct sa_crypto_data *data)
78662306a36Sopenharmony_ci{
78762306a36Sopenharmony_ci	unsigned long bn;
78862306a36Sopenharmony_ci
78962306a36Sopenharmony_ci	bn = ctx->sc_id - data->sc_id_start;
79062306a36Sopenharmony_ci	spin_lock(&data->scid_lock);
79162306a36Sopenharmony_ci	__clear_bit(bn, data->ctx_bm);
79262306a36Sopenharmony_ci	data->sc_id--;
79362306a36Sopenharmony_ci	spin_unlock(&data->scid_lock);
79462306a36Sopenharmony_ci
79562306a36Sopenharmony_ci	if (ctx->sc) {
79662306a36Sopenharmony_ci		dma_pool_free(data->sc_pool, ctx->sc, ctx->sc_phys);
79762306a36Sopenharmony_ci		ctx->sc = NULL;
79862306a36Sopenharmony_ci	}
79962306a36Sopenharmony_ci}
80062306a36Sopenharmony_ci
80162306a36Sopenharmony_cistatic int sa_init_ctx_info(struct sa_ctx_info *ctx,
80262306a36Sopenharmony_ci			    struct sa_crypto_data *data)
80362306a36Sopenharmony_ci{
80462306a36Sopenharmony_ci	unsigned long bn;
80562306a36Sopenharmony_ci	int err;
80662306a36Sopenharmony_ci
80762306a36Sopenharmony_ci	spin_lock(&data->scid_lock);
80862306a36Sopenharmony_ci	bn = find_first_zero_bit(data->ctx_bm, SA_MAX_NUM_CTX);
80962306a36Sopenharmony_ci	__set_bit(bn, data->ctx_bm);
81062306a36Sopenharmony_ci	data->sc_id++;
81162306a36Sopenharmony_ci	spin_unlock(&data->scid_lock);
81262306a36Sopenharmony_ci
81362306a36Sopenharmony_ci	ctx->sc_id = (u16)(data->sc_id_start + bn);
81462306a36Sopenharmony_ci
81562306a36Sopenharmony_ci	ctx->sc = dma_pool_alloc(data->sc_pool, GFP_KERNEL, &ctx->sc_phys);
81662306a36Sopenharmony_ci	if (!ctx->sc) {
81762306a36Sopenharmony_ci		dev_err(&data->pdev->dev, "Failed to allocate SC memory\n");
81862306a36Sopenharmony_ci		err = -ENOMEM;
81962306a36Sopenharmony_ci		goto scid_rollback;
82062306a36Sopenharmony_ci	}
82162306a36Sopenharmony_ci
82262306a36Sopenharmony_ci	return 0;
82362306a36Sopenharmony_ci
82462306a36Sopenharmony_ciscid_rollback:
82562306a36Sopenharmony_ci	spin_lock(&data->scid_lock);
82662306a36Sopenharmony_ci	__clear_bit(bn, data->ctx_bm);
82762306a36Sopenharmony_ci	data->sc_id--;
82862306a36Sopenharmony_ci	spin_unlock(&data->scid_lock);
82962306a36Sopenharmony_ci
83062306a36Sopenharmony_ci	return err;
83162306a36Sopenharmony_ci}
83262306a36Sopenharmony_ci
83362306a36Sopenharmony_cistatic void sa_cipher_cra_exit(struct crypto_skcipher *tfm)
83462306a36Sopenharmony_ci{
83562306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_skcipher_ctx(tfm);
83662306a36Sopenharmony_ci	struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev);
83762306a36Sopenharmony_ci
83862306a36Sopenharmony_ci	dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n",
83962306a36Sopenharmony_ci		__func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys,
84062306a36Sopenharmony_ci		ctx->dec.sc_id, &ctx->dec.sc_phys);
84162306a36Sopenharmony_ci
84262306a36Sopenharmony_ci	sa_free_ctx_info(&ctx->enc, data);
84362306a36Sopenharmony_ci	sa_free_ctx_info(&ctx->dec, data);
84462306a36Sopenharmony_ci
84562306a36Sopenharmony_ci	crypto_free_skcipher(ctx->fallback.skcipher);
84662306a36Sopenharmony_ci}
84762306a36Sopenharmony_ci
84862306a36Sopenharmony_cistatic int sa_cipher_cra_init(struct crypto_skcipher *tfm)
84962306a36Sopenharmony_ci{
85062306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_skcipher_ctx(tfm);
85162306a36Sopenharmony_ci	struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev);
85262306a36Sopenharmony_ci	const char *name = crypto_tfm_alg_name(&tfm->base);
85362306a36Sopenharmony_ci	struct crypto_skcipher *child;
85462306a36Sopenharmony_ci	int ret;
85562306a36Sopenharmony_ci
85662306a36Sopenharmony_ci	memzero_explicit(ctx, sizeof(*ctx));
85762306a36Sopenharmony_ci	ctx->dev_data = data;
85862306a36Sopenharmony_ci
85962306a36Sopenharmony_ci	ret = sa_init_ctx_info(&ctx->enc, data);
86062306a36Sopenharmony_ci	if (ret)
86162306a36Sopenharmony_ci		return ret;
86262306a36Sopenharmony_ci	ret = sa_init_ctx_info(&ctx->dec, data);
86362306a36Sopenharmony_ci	if (ret) {
86462306a36Sopenharmony_ci		sa_free_ctx_info(&ctx->enc, data);
86562306a36Sopenharmony_ci		return ret;
86662306a36Sopenharmony_ci	}
86762306a36Sopenharmony_ci
86862306a36Sopenharmony_ci	child = crypto_alloc_skcipher(name, 0, CRYPTO_ALG_NEED_FALLBACK);
86962306a36Sopenharmony_ci
87062306a36Sopenharmony_ci	if (IS_ERR(child)) {
87162306a36Sopenharmony_ci		dev_err(sa_k3_dev, "Error allocating fallback algo %s\n", name);
87262306a36Sopenharmony_ci		return PTR_ERR(child);
87362306a36Sopenharmony_ci	}
87462306a36Sopenharmony_ci
87562306a36Sopenharmony_ci	ctx->fallback.skcipher = child;
87662306a36Sopenharmony_ci	crypto_skcipher_set_reqsize(tfm, crypto_skcipher_reqsize(child) +
87762306a36Sopenharmony_ci					 sizeof(struct skcipher_request));
87862306a36Sopenharmony_ci
87962306a36Sopenharmony_ci	dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n",
88062306a36Sopenharmony_ci		__func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys,
88162306a36Sopenharmony_ci		ctx->dec.sc_id, &ctx->dec.sc_phys);
88262306a36Sopenharmony_ci	return 0;
88362306a36Sopenharmony_ci}
88462306a36Sopenharmony_ci
88562306a36Sopenharmony_cistatic int sa_cipher_setkey(struct crypto_skcipher *tfm, const u8 *key,
88662306a36Sopenharmony_ci			    unsigned int keylen, struct algo_data *ad)
88762306a36Sopenharmony_ci{
88862306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_skcipher_ctx(tfm);
88962306a36Sopenharmony_ci	struct crypto_skcipher *child = ctx->fallback.skcipher;
89062306a36Sopenharmony_ci	int cmdl_len;
89162306a36Sopenharmony_ci	struct sa_cmdl_cfg cfg;
89262306a36Sopenharmony_ci	int ret;
89362306a36Sopenharmony_ci
89462306a36Sopenharmony_ci	if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
89562306a36Sopenharmony_ci	    keylen != AES_KEYSIZE_256)
89662306a36Sopenharmony_ci		return -EINVAL;
89762306a36Sopenharmony_ci
89862306a36Sopenharmony_ci	ad->enc_eng.eng_id = SA_ENG_ID_EM1;
89962306a36Sopenharmony_ci	ad->enc_eng.sc_size = SA_CTX_ENC_TYPE1_SZ;
90062306a36Sopenharmony_ci
90162306a36Sopenharmony_ci	memzero_explicit(&cfg, sizeof(cfg));
90262306a36Sopenharmony_ci	cfg.enc_eng_id = ad->enc_eng.eng_id;
90362306a36Sopenharmony_ci	cfg.iv_size = crypto_skcipher_ivsize(tfm);
90462306a36Sopenharmony_ci
90562306a36Sopenharmony_ci	crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK);
90662306a36Sopenharmony_ci	crypto_skcipher_set_flags(child, tfm->base.crt_flags &
90762306a36Sopenharmony_ci					 CRYPTO_TFM_REQ_MASK);
90862306a36Sopenharmony_ci	ret = crypto_skcipher_setkey(child, key, keylen);
90962306a36Sopenharmony_ci	if (ret)
91062306a36Sopenharmony_ci		return ret;
91162306a36Sopenharmony_ci
91262306a36Sopenharmony_ci	/* Setup Encryption Security Context & Command label template */
91362306a36Sopenharmony_ci	if (sa_init_sc(&ctx->enc, ctx->dev_data->match_data, key, keylen, NULL, 0,
91462306a36Sopenharmony_ci		       ad, 1, &ctx->enc.epib[1]))
91562306a36Sopenharmony_ci		goto badkey;
91662306a36Sopenharmony_ci
91762306a36Sopenharmony_ci	cmdl_len = sa_format_cmdl_gen(&cfg,
91862306a36Sopenharmony_ci				      (u8 *)ctx->enc.cmdl,
91962306a36Sopenharmony_ci				      &ctx->enc.cmdl_upd_info);
92062306a36Sopenharmony_ci	if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32)))
92162306a36Sopenharmony_ci		goto badkey;
92262306a36Sopenharmony_ci
92362306a36Sopenharmony_ci	ctx->enc.cmdl_size = cmdl_len;
92462306a36Sopenharmony_ci
92562306a36Sopenharmony_ci	/* Setup Decryption Security Context & Command label template */
92662306a36Sopenharmony_ci	if (sa_init_sc(&ctx->dec, ctx->dev_data->match_data, key, keylen, NULL, 0,
92762306a36Sopenharmony_ci		       ad, 0, &ctx->dec.epib[1]))
92862306a36Sopenharmony_ci		goto badkey;
92962306a36Sopenharmony_ci
93062306a36Sopenharmony_ci	cfg.enc_eng_id = ad->enc_eng.eng_id;
93162306a36Sopenharmony_ci	cmdl_len = sa_format_cmdl_gen(&cfg, (u8 *)ctx->dec.cmdl,
93262306a36Sopenharmony_ci				      &ctx->dec.cmdl_upd_info);
93362306a36Sopenharmony_ci
93462306a36Sopenharmony_ci	if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32)))
93562306a36Sopenharmony_ci		goto badkey;
93662306a36Sopenharmony_ci
93762306a36Sopenharmony_ci	ctx->dec.cmdl_size = cmdl_len;
93862306a36Sopenharmony_ci	ctx->iv_idx = ad->iv_idx;
93962306a36Sopenharmony_ci
94062306a36Sopenharmony_ci	return 0;
94162306a36Sopenharmony_ci
94262306a36Sopenharmony_cibadkey:
94362306a36Sopenharmony_ci	dev_err(sa_k3_dev, "%s: badkey\n", __func__);
94462306a36Sopenharmony_ci	return -EINVAL;
94562306a36Sopenharmony_ci}
94662306a36Sopenharmony_ci
94762306a36Sopenharmony_cistatic int sa_aes_cbc_setkey(struct crypto_skcipher *tfm, const u8 *key,
94862306a36Sopenharmony_ci			     unsigned int keylen)
94962306a36Sopenharmony_ci{
95062306a36Sopenharmony_ci	struct algo_data ad = { 0 };
95162306a36Sopenharmony_ci	/* Convert the key size (16/24/32) to the key size index (0/1/2) */
95262306a36Sopenharmony_ci	int key_idx = (keylen >> 3) - 2;
95362306a36Sopenharmony_ci
95462306a36Sopenharmony_ci	if (key_idx >= 3)
95562306a36Sopenharmony_ci		return -EINVAL;
95662306a36Sopenharmony_ci
95762306a36Sopenharmony_ci	ad.mci_enc = mci_cbc_enc_array[key_idx];
95862306a36Sopenharmony_ci	ad.mci_dec = mci_cbc_dec_array[key_idx];
95962306a36Sopenharmony_ci	ad.inv_key = true;
96062306a36Sopenharmony_ci	ad.ealg_id = SA_EALG_ID_AES_CBC;
96162306a36Sopenharmony_ci	ad.iv_idx = 4;
96262306a36Sopenharmony_ci	ad.iv_out_size = 16;
96362306a36Sopenharmony_ci
96462306a36Sopenharmony_ci	return sa_cipher_setkey(tfm, key, keylen, &ad);
96562306a36Sopenharmony_ci}
96662306a36Sopenharmony_ci
96762306a36Sopenharmony_cistatic int sa_aes_ecb_setkey(struct crypto_skcipher *tfm, const u8 *key,
96862306a36Sopenharmony_ci			     unsigned int keylen)
96962306a36Sopenharmony_ci{
97062306a36Sopenharmony_ci	struct algo_data ad = { 0 };
97162306a36Sopenharmony_ci	/* Convert the key size (16/24/32) to the key size index (0/1/2) */
97262306a36Sopenharmony_ci	int key_idx = (keylen >> 3) - 2;
97362306a36Sopenharmony_ci
97462306a36Sopenharmony_ci	if (key_idx >= 3)
97562306a36Sopenharmony_ci		return -EINVAL;
97662306a36Sopenharmony_ci
97762306a36Sopenharmony_ci	ad.mci_enc = mci_ecb_enc_array[key_idx];
97862306a36Sopenharmony_ci	ad.mci_dec = mci_ecb_dec_array[key_idx];
97962306a36Sopenharmony_ci	ad.inv_key = true;
98062306a36Sopenharmony_ci	ad.ealg_id = SA_EALG_ID_AES_ECB;
98162306a36Sopenharmony_ci
98262306a36Sopenharmony_ci	return sa_cipher_setkey(tfm, key, keylen, &ad);
98362306a36Sopenharmony_ci}
98462306a36Sopenharmony_ci
98562306a36Sopenharmony_cistatic int sa_3des_cbc_setkey(struct crypto_skcipher *tfm, const u8 *key,
98662306a36Sopenharmony_ci			      unsigned int keylen)
98762306a36Sopenharmony_ci{
98862306a36Sopenharmony_ci	struct algo_data ad = { 0 };
98962306a36Sopenharmony_ci
99062306a36Sopenharmony_ci	ad.mci_enc = mci_cbc_3des_enc_array;
99162306a36Sopenharmony_ci	ad.mci_dec = mci_cbc_3des_dec_array;
99262306a36Sopenharmony_ci	ad.ealg_id = SA_EALG_ID_3DES_CBC;
99362306a36Sopenharmony_ci	ad.iv_idx = 6;
99462306a36Sopenharmony_ci	ad.iv_out_size = 8;
99562306a36Sopenharmony_ci
99662306a36Sopenharmony_ci	return sa_cipher_setkey(tfm, key, keylen, &ad);
99762306a36Sopenharmony_ci}
99862306a36Sopenharmony_ci
99962306a36Sopenharmony_cistatic int sa_3des_ecb_setkey(struct crypto_skcipher *tfm, const u8 *key,
100062306a36Sopenharmony_ci			      unsigned int keylen)
100162306a36Sopenharmony_ci{
100262306a36Sopenharmony_ci	struct algo_data ad = { 0 };
100362306a36Sopenharmony_ci
100462306a36Sopenharmony_ci	ad.mci_enc = mci_ecb_3des_enc_array;
100562306a36Sopenharmony_ci	ad.mci_dec = mci_ecb_3des_dec_array;
100662306a36Sopenharmony_ci
100762306a36Sopenharmony_ci	return sa_cipher_setkey(tfm, key, keylen, &ad);
100862306a36Sopenharmony_ci}
100962306a36Sopenharmony_ci
101062306a36Sopenharmony_cistatic void sa_sync_from_device(struct sa_rx_data *rxd)
101162306a36Sopenharmony_ci{
101262306a36Sopenharmony_ci	struct sg_table *sgt;
101362306a36Sopenharmony_ci
101462306a36Sopenharmony_ci	if (rxd->mapped_sg[0].dir == DMA_BIDIRECTIONAL)
101562306a36Sopenharmony_ci		sgt = &rxd->mapped_sg[0].sgt;
101662306a36Sopenharmony_ci	else
101762306a36Sopenharmony_ci		sgt = &rxd->mapped_sg[1].sgt;
101862306a36Sopenharmony_ci
101962306a36Sopenharmony_ci	dma_sync_sgtable_for_cpu(rxd->ddev, sgt, DMA_FROM_DEVICE);
102062306a36Sopenharmony_ci}
102162306a36Sopenharmony_ci
102262306a36Sopenharmony_cistatic void sa_free_sa_rx_data(struct sa_rx_data *rxd)
102362306a36Sopenharmony_ci{
102462306a36Sopenharmony_ci	int i;
102562306a36Sopenharmony_ci
102662306a36Sopenharmony_ci	for (i = 0; i < ARRAY_SIZE(rxd->mapped_sg); i++) {
102762306a36Sopenharmony_ci		struct sa_mapped_sg *mapped_sg = &rxd->mapped_sg[i];
102862306a36Sopenharmony_ci
102962306a36Sopenharmony_ci		if (mapped_sg->mapped) {
103062306a36Sopenharmony_ci			dma_unmap_sgtable(rxd->ddev, &mapped_sg->sgt,
103162306a36Sopenharmony_ci					  mapped_sg->dir, 0);
103262306a36Sopenharmony_ci			kfree(mapped_sg->split_sg);
103362306a36Sopenharmony_ci		}
103462306a36Sopenharmony_ci	}
103562306a36Sopenharmony_ci
103662306a36Sopenharmony_ci	kfree(rxd);
103762306a36Sopenharmony_ci}
103862306a36Sopenharmony_ci
103962306a36Sopenharmony_cistatic void sa_aes_dma_in_callback(void *data)
104062306a36Sopenharmony_ci{
104162306a36Sopenharmony_ci	struct sa_rx_data *rxd = data;
104262306a36Sopenharmony_ci	struct skcipher_request *req;
104362306a36Sopenharmony_ci	u32 *result;
104462306a36Sopenharmony_ci	__be32 *mdptr;
104562306a36Sopenharmony_ci	size_t ml, pl;
104662306a36Sopenharmony_ci	int i;
104762306a36Sopenharmony_ci
104862306a36Sopenharmony_ci	sa_sync_from_device(rxd);
104962306a36Sopenharmony_ci	req = container_of(rxd->req, struct skcipher_request, base);
105062306a36Sopenharmony_ci
105162306a36Sopenharmony_ci	if (req->iv) {
105262306a36Sopenharmony_ci		mdptr = (__be32 *)dmaengine_desc_get_metadata_ptr(rxd->tx_in, &pl,
105362306a36Sopenharmony_ci							       &ml);
105462306a36Sopenharmony_ci		result = (u32 *)req->iv;
105562306a36Sopenharmony_ci
105662306a36Sopenharmony_ci		for (i = 0; i < (rxd->enc_iv_size / 4); i++)
105762306a36Sopenharmony_ci			result[i] = be32_to_cpu(mdptr[i + rxd->iv_idx]);
105862306a36Sopenharmony_ci	}
105962306a36Sopenharmony_ci
106062306a36Sopenharmony_ci	sa_free_sa_rx_data(rxd);
106162306a36Sopenharmony_ci
106262306a36Sopenharmony_ci	skcipher_request_complete(req, 0);
106362306a36Sopenharmony_ci}
106462306a36Sopenharmony_ci
106562306a36Sopenharmony_cistatic void
106662306a36Sopenharmony_cisa_prepare_tx_desc(u32 *mdptr, u32 pslen, u32 *psdata, u32 epiblen, u32 *epib)
106762306a36Sopenharmony_ci{
106862306a36Sopenharmony_ci	u32 *out, *in;
106962306a36Sopenharmony_ci	int i;
107062306a36Sopenharmony_ci
107162306a36Sopenharmony_ci	for (out = mdptr, in = epib, i = 0; i < epiblen / sizeof(u32); i++)
107262306a36Sopenharmony_ci		*out++ = *in++;
107362306a36Sopenharmony_ci
107462306a36Sopenharmony_ci	mdptr[4] = (0xFFFF << 16);
107562306a36Sopenharmony_ci	for (out = &mdptr[5], in = psdata, i = 0;
107662306a36Sopenharmony_ci	     i < pslen / sizeof(u32); i++)
107762306a36Sopenharmony_ci		*out++ = *in++;
107862306a36Sopenharmony_ci}
107962306a36Sopenharmony_ci
108062306a36Sopenharmony_cistatic int sa_run(struct sa_req *req)
108162306a36Sopenharmony_ci{
108262306a36Sopenharmony_ci	struct sa_rx_data *rxd;
108362306a36Sopenharmony_ci	gfp_t gfp_flags;
108462306a36Sopenharmony_ci	u32 cmdl[SA_MAX_CMDL_WORDS];
108562306a36Sopenharmony_ci	struct sa_crypto_data *pdata = dev_get_drvdata(sa_k3_dev);
108662306a36Sopenharmony_ci	struct device *ddev;
108762306a36Sopenharmony_ci	struct dma_chan *dma_rx;
108862306a36Sopenharmony_ci	int sg_nents, src_nents, dst_nents;
108962306a36Sopenharmony_ci	struct scatterlist *src, *dst;
109062306a36Sopenharmony_ci	size_t pl, ml, split_size;
109162306a36Sopenharmony_ci	struct sa_ctx_info *sa_ctx = req->enc ? &req->ctx->enc : &req->ctx->dec;
109262306a36Sopenharmony_ci	int ret;
109362306a36Sopenharmony_ci	struct dma_async_tx_descriptor *tx_out;
109462306a36Sopenharmony_ci	u32 *mdptr;
109562306a36Sopenharmony_ci	bool diff_dst;
109662306a36Sopenharmony_ci	enum dma_data_direction dir_src;
109762306a36Sopenharmony_ci	struct sa_mapped_sg *mapped_sg;
109862306a36Sopenharmony_ci
109962306a36Sopenharmony_ci	gfp_flags = req->base->flags & CRYPTO_TFM_REQ_MAY_SLEEP ?
110062306a36Sopenharmony_ci		GFP_KERNEL : GFP_ATOMIC;
110162306a36Sopenharmony_ci
110262306a36Sopenharmony_ci	rxd = kzalloc(sizeof(*rxd), gfp_flags);
110362306a36Sopenharmony_ci	if (!rxd)
110462306a36Sopenharmony_ci		return -ENOMEM;
110562306a36Sopenharmony_ci
110662306a36Sopenharmony_ci	if (req->src != req->dst) {
110762306a36Sopenharmony_ci		diff_dst = true;
110862306a36Sopenharmony_ci		dir_src = DMA_TO_DEVICE;
110962306a36Sopenharmony_ci	} else {
111062306a36Sopenharmony_ci		diff_dst = false;
111162306a36Sopenharmony_ci		dir_src = DMA_BIDIRECTIONAL;
111262306a36Sopenharmony_ci	}
111362306a36Sopenharmony_ci
111462306a36Sopenharmony_ci	/*
111562306a36Sopenharmony_ci	 * SA2UL has an interesting feature where the receive DMA channel
111662306a36Sopenharmony_ci	 * is selected based on the data passed to the engine. Within the
111762306a36Sopenharmony_ci	 * transition range, there is also a space where it is impossible
111862306a36Sopenharmony_ci	 * to determine where the data will end up, and this should be
111962306a36Sopenharmony_ci	 * avoided. This will be handled by the SW fallback mechanism by
112062306a36Sopenharmony_ci	 * the individual algorithm implementations.
112162306a36Sopenharmony_ci	 */
112262306a36Sopenharmony_ci	if (req->size >= 256)
112362306a36Sopenharmony_ci		dma_rx = pdata->dma_rx2;
112462306a36Sopenharmony_ci	else
112562306a36Sopenharmony_ci		dma_rx = pdata->dma_rx1;
112662306a36Sopenharmony_ci
112762306a36Sopenharmony_ci	ddev = dmaengine_get_dma_device(pdata->dma_tx);
112862306a36Sopenharmony_ci	rxd->ddev = ddev;
112962306a36Sopenharmony_ci
113062306a36Sopenharmony_ci	memcpy(cmdl, sa_ctx->cmdl, sa_ctx->cmdl_size);
113162306a36Sopenharmony_ci
113262306a36Sopenharmony_ci	sa_update_cmdl(req, cmdl, &sa_ctx->cmdl_upd_info);
113362306a36Sopenharmony_ci
113462306a36Sopenharmony_ci	if (req->type != CRYPTO_ALG_TYPE_AHASH) {
113562306a36Sopenharmony_ci		if (req->enc)
113662306a36Sopenharmony_ci			req->type |=
113762306a36Sopenharmony_ci				(SA_REQ_SUBTYPE_ENC << SA_REQ_SUBTYPE_SHIFT);
113862306a36Sopenharmony_ci		else
113962306a36Sopenharmony_ci			req->type |=
114062306a36Sopenharmony_ci				(SA_REQ_SUBTYPE_DEC << SA_REQ_SUBTYPE_SHIFT);
114162306a36Sopenharmony_ci	}
114262306a36Sopenharmony_ci
114362306a36Sopenharmony_ci	cmdl[sa_ctx->cmdl_size / sizeof(u32)] = req->type;
114462306a36Sopenharmony_ci
114562306a36Sopenharmony_ci	/*
114662306a36Sopenharmony_ci	 * Map the packets, first we check if the data fits into a single
114762306a36Sopenharmony_ci	 * sg entry and use that if possible. If it does not fit, we check
114862306a36Sopenharmony_ci	 * if we need to do sg_split to align the scatterlist data on the
114962306a36Sopenharmony_ci	 * actual data size being processed by the crypto engine.
115062306a36Sopenharmony_ci	 */
115162306a36Sopenharmony_ci	src = req->src;
115262306a36Sopenharmony_ci	sg_nents = sg_nents_for_len(src, req->size);
115362306a36Sopenharmony_ci
115462306a36Sopenharmony_ci	split_size = req->size;
115562306a36Sopenharmony_ci
115662306a36Sopenharmony_ci	mapped_sg = &rxd->mapped_sg[0];
115762306a36Sopenharmony_ci	if (sg_nents == 1 && split_size <= req->src->length) {
115862306a36Sopenharmony_ci		src = &mapped_sg->static_sg;
115962306a36Sopenharmony_ci		src_nents = 1;
116062306a36Sopenharmony_ci		sg_init_table(src, 1);
116162306a36Sopenharmony_ci		sg_set_page(src, sg_page(req->src), split_size,
116262306a36Sopenharmony_ci			    req->src->offset);
116362306a36Sopenharmony_ci
116462306a36Sopenharmony_ci		mapped_sg->sgt.sgl = src;
116562306a36Sopenharmony_ci		mapped_sg->sgt.orig_nents = src_nents;
116662306a36Sopenharmony_ci		ret = dma_map_sgtable(ddev, &mapped_sg->sgt, dir_src, 0);
116762306a36Sopenharmony_ci		if (ret) {
116862306a36Sopenharmony_ci			kfree(rxd);
116962306a36Sopenharmony_ci			return ret;
117062306a36Sopenharmony_ci		}
117162306a36Sopenharmony_ci
117262306a36Sopenharmony_ci		mapped_sg->dir = dir_src;
117362306a36Sopenharmony_ci		mapped_sg->mapped = true;
117462306a36Sopenharmony_ci	} else {
117562306a36Sopenharmony_ci		mapped_sg->sgt.sgl = req->src;
117662306a36Sopenharmony_ci		mapped_sg->sgt.orig_nents = sg_nents;
117762306a36Sopenharmony_ci		ret = dma_map_sgtable(ddev, &mapped_sg->sgt, dir_src, 0);
117862306a36Sopenharmony_ci		if (ret) {
117962306a36Sopenharmony_ci			kfree(rxd);
118062306a36Sopenharmony_ci			return ret;
118162306a36Sopenharmony_ci		}
118262306a36Sopenharmony_ci
118362306a36Sopenharmony_ci		mapped_sg->dir = dir_src;
118462306a36Sopenharmony_ci		mapped_sg->mapped = true;
118562306a36Sopenharmony_ci
118662306a36Sopenharmony_ci		ret = sg_split(mapped_sg->sgt.sgl, mapped_sg->sgt.nents, 0, 1,
118762306a36Sopenharmony_ci			       &split_size, &src, &src_nents, gfp_flags);
118862306a36Sopenharmony_ci		if (ret) {
118962306a36Sopenharmony_ci			src_nents = mapped_sg->sgt.nents;
119062306a36Sopenharmony_ci			src = mapped_sg->sgt.sgl;
119162306a36Sopenharmony_ci		} else {
119262306a36Sopenharmony_ci			mapped_sg->split_sg = src;
119362306a36Sopenharmony_ci		}
119462306a36Sopenharmony_ci	}
119562306a36Sopenharmony_ci
119662306a36Sopenharmony_ci	dma_sync_sgtable_for_device(ddev, &mapped_sg->sgt, DMA_TO_DEVICE);
119762306a36Sopenharmony_ci
119862306a36Sopenharmony_ci	if (!diff_dst) {
119962306a36Sopenharmony_ci		dst_nents = src_nents;
120062306a36Sopenharmony_ci		dst = src;
120162306a36Sopenharmony_ci	} else {
120262306a36Sopenharmony_ci		dst_nents = sg_nents_for_len(req->dst, req->size);
120362306a36Sopenharmony_ci		mapped_sg = &rxd->mapped_sg[1];
120462306a36Sopenharmony_ci
120562306a36Sopenharmony_ci		if (dst_nents == 1 && split_size <= req->dst->length) {
120662306a36Sopenharmony_ci			dst = &mapped_sg->static_sg;
120762306a36Sopenharmony_ci			dst_nents = 1;
120862306a36Sopenharmony_ci			sg_init_table(dst, 1);
120962306a36Sopenharmony_ci			sg_set_page(dst, sg_page(req->dst), split_size,
121062306a36Sopenharmony_ci				    req->dst->offset);
121162306a36Sopenharmony_ci
121262306a36Sopenharmony_ci			mapped_sg->sgt.sgl = dst;
121362306a36Sopenharmony_ci			mapped_sg->sgt.orig_nents = dst_nents;
121462306a36Sopenharmony_ci			ret = dma_map_sgtable(ddev, &mapped_sg->sgt,
121562306a36Sopenharmony_ci					      DMA_FROM_DEVICE, 0);
121662306a36Sopenharmony_ci			if (ret)
121762306a36Sopenharmony_ci				goto err_cleanup;
121862306a36Sopenharmony_ci
121962306a36Sopenharmony_ci			mapped_sg->dir = DMA_FROM_DEVICE;
122062306a36Sopenharmony_ci			mapped_sg->mapped = true;
122162306a36Sopenharmony_ci		} else {
122262306a36Sopenharmony_ci			mapped_sg->sgt.sgl = req->dst;
122362306a36Sopenharmony_ci			mapped_sg->sgt.orig_nents = dst_nents;
122462306a36Sopenharmony_ci			ret = dma_map_sgtable(ddev, &mapped_sg->sgt,
122562306a36Sopenharmony_ci					      DMA_FROM_DEVICE, 0);
122662306a36Sopenharmony_ci			if (ret)
122762306a36Sopenharmony_ci				goto err_cleanup;
122862306a36Sopenharmony_ci
122962306a36Sopenharmony_ci			mapped_sg->dir = DMA_FROM_DEVICE;
123062306a36Sopenharmony_ci			mapped_sg->mapped = true;
123162306a36Sopenharmony_ci
123262306a36Sopenharmony_ci			ret = sg_split(mapped_sg->sgt.sgl, mapped_sg->sgt.nents,
123362306a36Sopenharmony_ci				       0, 1, &split_size, &dst, &dst_nents,
123462306a36Sopenharmony_ci				       gfp_flags);
123562306a36Sopenharmony_ci			if (ret) {
123662306a36Sopenharmony_ci				dst_nents = mapped_sg->sgt.nents;
123762306a36Sopenharmony_ci				dst = mapped_sg->sgt.sgl;
123862306a36Sopenharmony_ci			} else {
123962306a36Sopenharmony_ci				mapped_sg->split_sg = dst;
124062306a36Sopenharmony_ci			}
124162306a36Sopenharmony_ci		}
124262306a36Sopenharmony_ci	}
124362306a36Sopenharmony_ci
124462306a36Sopenharmony_ci	rxd->tx_in = dmaengine_prep_slave_sg(dma_rx, dst, dst_nents,
124562306a36Sopenharmony_ci					     DMA_DEV_TO_MEM,
124662306a36Sopenharmony_ci					     DMA_PREP_INTERRUPT | DMA_CTRL_ACK);
124762306a36Sopenharmony_ci	if (!rxd->tx_in) {
124862306a36Sopenharmony_ci		dev_err(pdata->dev, "IN prep_slave_sg() failed\n");
124962306a36Sopenharmony_ci		ret = -EINVAL;
125062306a36Sopenharmony_ci		goto err_cleanup;
125162306a36Sopenharmony_ci	}
125262306a36Sopenharmony_ci
125362306a36Sopenharmony_ci	rxd->req = (void *)req->base;
125462306a36Sopenharmony_ci	rxd->enc = req->enc;
125562306a36Sopenharmony_ci	rxd->iv_idx = req->ctx->iv_idx;
125662306a36Sopenharmony_ci	rxd->enc_iv_size = sa_ctx->cmdl_upd_info.enc_iv.size;
125762306a36Sopenharmony_ci	rxd->tx_in->callback = req->callback;
125862306a36Sopenharmony_ci	rxd->tx_in->callback_param = rxd;
125962306a36Sopenharmony_ci
126062306a36Sopenharmony_ci	tx_out = dmaengine_prep_slave_sg(pdata->dma_tx, src,
126162306a36Sopenharmony_ci					 src_nents, DMA_MEM_TO_DEV,
126262306a36Sopenharmony_ci					 DMA_PREP_INTERRUPT | DMA_CTRL_ACK);
126362306a36Sopenharmony_ci
126462306a36Sopenharmony_ci	if (!tx_out) {
126562306a36Sopenharmony_ci		dev_err(pdata->dev, "OUT prep_slave_sg() failed\n");
126662306a36Sopenharmony_ci		ret = -EINVAL;
126762306a36Sopenharmony_ci		goto err_cleanup;
126862306a36Sopenharmony_ci	}
126962306a36Sopenharmony_ci
127062306a36Sopenharmony_ci	/*
127162306a36Sopenharmony_ci	 * Prepare metadata for DMA engine. This essentially describes the
127262306a36Sopenharmony_ci	 * crypto algorithm to be used, data sizes, different keys etc.
127362306a36Sopenharmony_ci	 */
127462306a36Sopenharmony_ci	mdptr = (u32 *)dmaengine_desc_get_metadata_ptr(tx_out, &pl, &ml);
127562306a36Sopenharmony_ci
127662306a36Sopenharmony_ci	sa_prepare_tx_desc(mdptr, (sa_ctx->cmdl_size + (SA_PSDATA_CTX_WORDS *
127762306a36Sopenharmony_ci				   sizeof(u32))), cmdl, sizeof(sa_ctx->epib),
127862306a36Sopenharmony_ci			   sa_ctx->epib);
127962306a36Sopenharmony_ci
128062306a36Sopenharmony_ci	ml = sa_ctx->cmdl_size + (SA_PSDATA_CTX_WORDS * sizeof(u32));
128162306a36Sopenharmony_ci	dmaengine_desc_set_metadata_len(tx_out, req->mdata_size);
128262306a36Sopenharmony_ci
128362306a36Sopenharmony_ci	dmaengine_submit(tx_out);
128462306a36Sopenharmony_ci	dmaengine_submit(rxd->tx_in);
128562306a36Sopenharmony_ci
128662306a36Sopenharmony_ci	dma_async_issue_pending(dma_rx);
128762306a36Sopenharmony_ci	dma_async_issue_pending(pdata->dma_tx);
128862306a36Sopenharmony_ci
128962306a36Sopenharmony_ci	return -EINPROGRESS;
129062306a36Sopenharmony_ci
129162306a36Sopenharmony_cierr_cleanup:
129262306a36Sopenharmony_ci	sa_free_sa_rx_data(rxd);
129362306a36Sopenharmony_ci
129462306a36Sopenharmony_ci	return ret;
129562306a36Sopenharmony_ci}
129662306a36Sopenharmony_ci
129762306a36Sopenharmony_cistatic int sa_cipher_run(struct skcipher_request *req, u8 *iv, int enc)
129862306a36Sopenharmony_ci{
129962306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx =
130062306a36Sopenharmony_ci	    crypto_skcipher_ctx(crypto_skcipher_reqtfm(req));
130162306a36Sopenharmony_ci	struct crypto_alg *alg = req->base.tfm->__crt_alg;
130262306a36Sopenharmony_ci	struct sa_req sa_req = { 0 };
130362306a36Sopenharmony_ci
130462306a36Sopenharmony_ci	if (!req->cryptlen)
130562306a36Sopenharmony_ci		return 0;
130662306a36Sopenharmony_ci
130762306a36Sopenharmony_ci	if (req->cryptlen % alg->cra_blocksize)
130862306a36Sopenharmony_ci		return -EINVAL;
130962306a36Sopenharmony_ci
131062306a36Sopenharmony_ci	/* Use SW fallback if the data size is not supported */
131162306a36Sopenharmony_ci	if (req->cryptlen > SA_MAX_DATA_SZ ||
131262306a36Sopenharmony_ci	    (req->cryptlen >= SA_UNSAFE_DATA_SZ_MIN &&
131362306a36Sopenharmony_ci	     req->cryptlen <= SA_UNSAFE_DATA_SZ_MAX)) {
131462306a36Sopenharmony_ci		struct skcipher_request *subreq = skcipher_request_ctx(req);
131562306a36Sopenharmony_ci
131662306a36Sopenharmony_ci		skcipher_request_set_tfm(subreq, ctx->fallback.skcipher);
131762306a36Sopenharmony_ci		skcipher_request_set_callback(subreq, req->base.flags,
131862306a36Sopenharmony_ci					      req->base.complete,
131962306a36Sopenharmony_ci					      req->base.data);
132062306a36Sopenharmony_ci		skcipher_request_set_crypt(subreq, req->src, req->dst,
132162306a36Sopenharmony_ci					   req->cryptlen, req->iv);
132262306a36Sopenharmony_ci		if (enc)
132362306a36Sopenharmony_ci			return crypto_skcipher_encrypt(subreq);
132462306a36Sopenharmony_ci		else
132562306a36Sopenharmony_ci			return crypto_skcipher_decrypt(subreq);
132662306a36Sopenharmony_ci	}
132762306a36Sopenharmony_ci
132862306a36Sopenharmony_ci	sa_req.size = req->cryptlen;
132962306a36Sopenharmony_ci	sa_req.enc_size = req->cryptlen;
133062306a36Sopenharmony_ci	sa_req.src = req->src;
133162306a36Sopenharmony_ci	sa_req.dst = req->dst;
133262306a36Sopenharmony_ci	sa_req.enc_iv = iv;
133362306a36Sopenharmony_ci	sa_req.type = CRYPTO_ALG_TYPE_SKCIPHER;
133462306a36Sopenharmony_ci	sa_req.enc = enc;
133562306a36Sopenharmony_ci	sa_req.callback = sa_aes_dma_in_callback;
133662306a36Sopenharmony_ci	sa_req.mdata_size = 44;
133762306a36Sopenharmony_ci	sa_req.base = &req->base;
133862306a36Sopenharmony_ci	sa_req.ctx = ctx;
133962306a36Sopenharmony_ci
134062306a36Sopenharmony_ci	return sa_run(&sa_req);
134162306a36Sopenharmony_ci}
134262306a36Sopenharmony_ci
134362306a36Sopenharmony_cistatic int sa_encrypt(struct skcipher_request *req)
134462306a36Sopenharmony_ci{
134562306a36Sopenharmony_ci	return sa_cipher_run(req, req->iv, 1);
134662306a36Sopenharmony_ci}
134762306a36Sopenharmony_ci
134862306a36Sopenharmony_cistatic int sa_decrypt(struct skcipher_request *req)
134962306a36Sopenharmony_ci{
135062306a36Sopenharmony_ci	return sa_cipher_run(req, req->iv, 0);
135162306a36Sopenharmony_ci}
135262306a36Sopenharmony_ci
135362306a36Sopenharmony_cistatic void sa_sha_dma_in_callback(void *data)
135462306a36Sopenharmony_ci{
135562306a36Sopenharmony_ci	struct sa_rx_data *rxd = data;
135662306a36Sopenharmony_ci	struct ahash_request *req;
135762306a36Sopenharmony_ci	struct crypto_ahash *tfm;
135862306a36Sopenharmony_ci	unsigned int authsize;
135962306a36Sopenharmony_ci	int i;
136062306a36Sopenharmony_ci	size_t ml, pl;
136162306a36Sopenharmony_ci	u32 *result;
136262306a36Sopenharmony_ci	__be32 *mdptr;
136362306a36Sopenharmony_ci
136462306a36Sopenharmony_ci	sa_sync_from_device(rxd);
136562306a36Sopenharmony_ci	req = container_of(rxd->req, struct ahash_request, base);
136662306a36Sopenharmony_ci	tfm = crypto_ahash_reqtfm(req);
136762306a36Sopenharmony_ci	authsize = crypto_ahash_digestsize(tfm);
136862306a36Sopenharmony_ci
136962306a36Sopenharmony_ci	mdptr = (__be32 *)dmaengine_desc_get_metadata_ptr(rxd->tx_in, &pl, &ml);
137062306a36Sopenharmony_ci	result = (u32 *)req->result;
137162306a36Sopenharmony_ci
137262306a36Sopenharmony_ci	for (i = 0; i < (authsize / 4); i++)
137362306a36Sopenharmony_ci		result[i] = be32_to_cpu(mdptr[i + 4]);
137462306a36Sopenharmony_ci
137562306a36Sopenharmony_ci	sa_free_sa_rx_data(rxd);
137662306a36Sopenharmony_ci
137762306a36Sopenharmony_ci	ahash_request_complete(req, 0);
137862306a36Sopenharmony_ci}
137962306a36Sopenharmony_ci
138062306a36Sopenharmony_cistatic int zero_message_process(struct ahash_request *req)
138162306a36Sopenharmony_ci{
138262306a36Sopenharmony_ci	struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
138362306a36Sopenharmony_ci	int sa_digest_size = crypto_ahash_digestsize(tfm);
138462306a36Sopenharmony_ci
138562306a36Sopenharmony_ci	switch (sa_digest_size) {
138662306a36Sopenharmony_ci	case SHA1_DIGEST_SIZE:
138762306a36Sopenharmony_ci		memcpy(req->result, sha1_zero_message_hash, sa_digest_size);
138862306a36Sopenharmony_ci		break;
138962306a36Sopenharmony_ci	case SHA256_DIGEST_SIZE:
139062306a36Sopenharmony_ci		memcpy(req->result, sha256_zero_message_hash, sa_digest_size);
139162306a36Sopenharmony_ci		break;
139262306a36Sopenharmony_ci	case SHA512_DIGEST_SIZE:
139362306a36Sopenharmony_ci		memcpy(req->result, sha512_zero_message_hash, sa_digest_size);
139462306a36Sopenharmony_ci		break;
139562306a36Sopenharmony_ci	default:
139662306a36Sopenharmony_ci		return -EINVAL;
139762306a36Sopenharmony_ci	}
139862306a36Sopenharmony_ci
139962306a36Sopenharmony_ci	return 0;
140062306a36Sopenharmony_ci}
140162306a36Sopenharmony_ci
140262306a36Sopenharmony_cistatic int sa_sha_run(struct ahash_request *req)
140362306a36Sopenharmony_ci{
140462306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_ahash_ctx(crypto_ahash_reqtfm(req));
140562306a36Sopenharmony_ci	struct sa_sha_req_ctx *rctx = ahash_request_ctx(req);
140662306a36Sopenharmony_ci	struct sa_req sa_req = { 0 };
140762306a36Sopenharmony_ci	size_t auth_len;
140862306a36Sopenharmony_ci
140962306a36Sopenharmony_ci	auth_len = req->nbytes;
141062306a36Sopenharmony_ci
141162306a36Sopenharmony_ci	if (!auth_len)
141262306a36Sopenharmony_ci		return zero_message_process(req);
141362306a36Sopenharmony_ci
141462306a36Sopenharmony_ci	if (auth_len > SA_MAX_DATA_SZ ||
141562306a36Sopenharmony_ci	    (auth_len >= SA_UNSAFE_DATA_SZ_MIN &&
141662306a36Sopenharmony_ci	     auth_len <= SA_UNSAFE_DATA_SZ_MAX)) {
141762306a36Sopenharmony_ci		struct ahash_request *subreq = &rctx->fallback_req;
141862306a36Sopenharmony_ci		int ret = 0;
141962306a36Sopenharmony_ci
142062306a36Sopenharmony_ci		ahash_request_set_tfm(subreq, ctx->fallback.ahash);
142162306a36Sopenharmony_ci		subreq->base.flags = req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP;
142262306a36Sopenharmony_ci
142362306a36Sopenharmony_ci		crypto_ahash_init(subreq);
142462306a36Sopenharmony_ci
142562306a36Sopenharmony_ci		subreq->nbytes = auth_len;
142662306a36Sopenharmony_ci		subreq->src = req->src;
142762306a36Sopenharmony_ci		subreq->result = req->result;
142862306a36Sopenharmony_ci
142962306a36Sopenharmony_ci		ret |= crypto_ahash_update(subreq);
143062306a36Sopenharmony_ci
143162306a36Sopenharmony_ci		subreq->nbytes = 0;
143262306a36Sopenharmony_ci
143362306a36Sopenharmony_ci		ret |= crypto_ahash_final(subreq);
143462306a36Sopenharmony_ci
143562306a36Sopenharmony_ci		return ret;
143662306a36Sopenharmony_ci	}
143762306a36Sopenharmony_ci
143862306a36Sopenharmony_ci	sa_req.size = auth_len;
143962306a36Sopenharmony_ci	sa_req.auth_size = auth_len;
144062306a36Sopenharmony_ci	sa_req.src = req->src;
144162306a36Sopenharmony_ci	sa_req.dst = req->src;
144262306a36Sopenharmony_ci	sa_req.enc = true;
144362306a36Sopenharmony_ci	sa_req.type = CRYPTO_ALG_TYPE_AHASH;
144462306a36Sopenharmony_ci	sa_req.callback = sa_sha_dma_in_callback;
144562306a36Sopenharmony_ci	sa_req.mdata_size = 28;
144662306a36Sopenharmony_ci	sa_req.ctx = ctx;
144762306a36Sopenharmony_ci	sa_req.base = &req->base;
144862306a36Sopenharmony_ci
144962306a36Sopenharmony_ci	return sa_run(&sa_req);
145062306a36Sopenharmony_ci}
145162306a36Sopenharmony_ci
145262306a36Sopenharmony_cistatic int sa_sha_setup(struct sa_tfm_ctx *ctx, struct  algo_data *ad)
145362306a36Sopenharmony_ci{
145462306a36Sopenharmony_ci	int bs = crypto_shash_blocksize(ctx->shash);
145562306a36Sopenharmony_ci	int cmdl_len;
145662306a36Sopenharmony_ci	struct sa_cmdl_cfg cfg;
145762306a36Sopenharmony_ci
145862306a36Sopenharmony_ci	ad->enc_eng.sc_size = SA_CTX_ENC_TYPE1_SZ;
145962306a36Sopenharmony_ci	ad->auth_eng.eng_id = SA_ENG_ID_AM1;
146062306a36Sopenharmony_ci	ad->auth_eng.sc_size = SA_CTX_AUTH_TYPE2_SZ;
146162306a36Sopenharmony_ci
146262306a36Sopenharmony_ci	memset(ctx->authkey, 0, bs);
146362306a36Sopenharmony_ci	memset(&cfg, 0, sizeof(cfg));
146462306a36Sopenharmony_ci	cfg.aalg = ad->aalg_id;
146562306a36Sopenharmony_ci	cfg.enc_eng_id = ad->enc_eng.eng_id;
146662306a36Sopenharmony_ci	cfg.auth_eng_id = ad->auth_eng.eng_id;
146762306a36Sopenharmony_ci	cfg.iv_size = 0;
146862306a36Sopenharmony_ci	cfg.akey = NULL;
146962306a36Sopenharmony_ci	cfg.akey_len = 0;
147062306a36Sopenharmony_ci
147162306a36Sopenharmony_ci	ctx->dev_data = dev_get_drvdata(sa_k3_dev);
147262306a36Sopenharmony_ci	/* Setup Encryption Security Context & Command label template */
147362306a36Sopenharmony_ci	if (sa_init_sc(&ctx->enc, ctx->dev_data->match_data, NULL, 0, NULL, 0,
147462306a36Sopenharmony_ci		       ad, 0, &ctx->enc.epib[1]))
147562306a36Sopenharmony_ci		goto badkey;
147662306a36Sopenharmony_ci
147762306a36Sopenharmony_ci	cmdl_len = sa_format_cmdl_gen(&cfg,
147862306a36Sopenharmony_ci				      (u8 *)ctx->enc.cmdl,
147962306a36Sopenharmony_ci				      &ctx->enc.cmdl_upd_info);
148062306a36Sopenharmony_ci	if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32)))
148162306a36Sopenharmony_ci		goto badkey;
148262306a36Sopenharmony_ci
148362306a36Sopenharmony_ci	ctx->enc.cmdl_size = cmdl_len;
148462306a36Sopenharmony_ci
148562306a36Sopenharmony_ci	return 0;
148662306a36Sopenharmony_ci
148762306a36Sopenharmony_cibadkey:
148862306a36Sopenharmony_ci	dev_err(sa_k3_dev, "%s: badkey\n", __func__);
148962306a36Sopenharmony_ci	return -EINVAL;
149062306a36Sopenharmony_ci}
149162306a36Sopenharmony_ci
149262306a36Sopenharmony_cistatic int sa_sha_cra_init_alg(struct crypto_tfm *tfm, const char *alg_base)
149362306a36Sopenharmony_ci{
149462306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm);
149562306a36Sopenharmony_ci	struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev);
149662306a36Sopenharmony_ci	int ret;
149762306a36Sopenharmony_ci
149862306a36Sopenharmony_ci	memset(ctx, 0, sizeof(*ctx));
149962306a36Sopenharmony_ci	ctx->dev_data = data;
150062306a36Sopenharmony_ci	ret = sa_init_ctx_info(&ctx->enc, data);
150162306a36Sopenharmony_ci	if (ret)
150262306a36Sopenharmony_ci		return ret;
150362306a36Sopenharmony_ci
150462306a36Sopenharmony_ci	if (alg_base) {
150562306a36Sopenharmony_ci		ctx->shash = crypto_alloc_shash(alg_base, 0,
150662306a36Sopenharmony_ci						CRYPTO_ALG_NEED_FALLBACK);
150762306a36Sopenharmony_ci		if (IS_ERR(ctx->shash)) {
150862306a36Sopenharmony_ci			dev_err(sa_k3_dev, "base driver %s couldn't be loaded\n",
150962306a36Sopenharmony_ci				alg_base);
151062306a36Sopenharmony_ci			return PTR_ERR(ctx->shash);
151162306a36Sopenharmony_ci		}
151262306a36Sopenharmony_ci		/* for fallback */
151362306a36Sopenharmony_ci		ctx->fallback.ahash =
151462306a36Sopenharmony_ci			crypto_alloc_ahash(alg_base, 0,
151562306a36Sopenharmony_ci					   CRYPTO_ALG_NEED_FALLBACK);
151662306a36Sopenharmony_ci		if (IS_ERR(ctx->fallback.ahash)) {
151762306a36Sopenharmony_ci			dev_err(ctx->dev_data->dev,
151862306a36Sopenharmony_ci				"Could not load fallback driver\n");
151962306a36Sopenharmony_ci			return PTR_ERR(ctx->fallback.ahash);
152062306a36Sopenharmony_ci		}
152162306a36Sopenharmony_ci	}
152262306a36Sopenharmony_ci
152362306a36Sopenharmony_ci	dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n",
152462306a36Sopenharmony_ci		__func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys,
152562306a36Sopenharmony_ci		ctx->dec.sc_id, &ctx->dec.sc_phys);
152662306a36Sopenharmony_ci
152762306a36Sopenharmony_ci	crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
152862306a36Sopenharmony_ci				 sizeof(struct sa_sha_req_ctx) +
152962306a36Sopenharmony_ci				 crypto_ahash_reqsize(ctx->fallback.ahash));
153062306a36Sopenharmony_ci
153162306a36Sopenharmony_ci	return 0;
153262306a36Sopenharmony_ci}
153362306a36Sopenharmony_ci
153462306a36Sopenharmony_cistatic int sa_sha_digest(struct ahash_request *req)
153562306a36Sopenharmony_ci{
153662306a36Sopenharmony_ci	return sa_sha_run(req);
153762306a36Sopenharmony_ci}
153862306a36Sopenharmony_ci
153962306a36Sopenharmony_cistatic int sa_sha_init(struct ahash_request *req)
154062306a36Sopenharmony_ci{
154162306a36Sopenharmony_ci	struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
154262306a36Sopenharmony_ci	struct sa_sha_req_ctx *rctx = ahash_request_ctx(req);
154362306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm);
154462306a36Sopenharmony_ci
154562306a36Sopenharmony_ci	dev_dbg(sa_k3_dev, "init: digest size: %u, rctx=%p\n",
154662306a36Sopenharmony_ci		crypto_ahash_digestsize(tfm), rctx);
154762306a36Sopenharmony_ci
154862306a36Sopenharmony_ci	ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
154962306a36Sopenharmony_ci	rctx->fallback_req.base.flags =
155062306a36Sopenharmony_ci		req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP;
155162306a36Sopenharmony_ci
155262306a36Sopenharmony_ci	return crypto_ahash_init(&rctx->fallback_req);
155362306a36Sopenharmony_ci}
155462306a36Sopenharmony_ci
155562306a36Sopenharmony_cistatic int sa_sha_update(struct ahash_request *req)
155662306a36Sopenharmony_ci{
155762306a36Sopenharmony_ci	struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
155862306a36Sopenharmony_ci	struct sa_sha_req_ctx *rctx = ahash_request_ctx(req);
155962306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm);
156062306a36Sopenharmony_ci
156162306a36Sopenharmony_ci	ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
156262306a36Sopenharmony_ci	rctx->fallback_req.base.flags =
156362306a36Sopenharmony_ci		req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP;
156462306a36Sopenharmony_ci	rctx->fallback_req.nbytes = req->nbytes;
156562306a36Sopenharmony_ci	rctx->fallback_req.src = req->src;
156662306a36Sopenharmony_ci
156762306a36Sopenharmony_ci	return crypto_ahash_update(&rctx->fallback_req);
156862306a36Sopenharmony_ci}
156962306a36Sopenharmony_ci
157062306a36Sopenharmony_cistatic int sa_sha_final(struct ahash_request *req)
157162306a36Sopenharmony_ci{
157262306a36Sopenharmony_ci	struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
157362306a36Sopenharmony_ci	struct sa_sha_req_ctx *rctx = ahash_request_ctx(req);
157462306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm);
157562306a36Sopenharmony_ci
157662306a36Sopenharmony_ci	ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
157762306a36Sopenharmony_ci	rctx->fallback_req.base.flags =
157862306a36Sopenharmony_ci		req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP;
157962306a36Sopenharmony_ci	rctx->fallback_req.result = req->result;
158062306a36Sopenharmony_ci
158162306a36Sopenharmony_ci	return crypto_ahash_final(&rctx->fallback_req);
158262306a36Sopenharmony_ci}
158362306a36Sopenharmony_ci
158462306a36Sopenharmony_cistatic int sa_sha_finup(struct ahash_request *req)
158562306a36Sopenharmony_ci{
158662306a36Sopenharmony_ci	struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
158762306a36Sopenharmony_ci	struct sa_sha_req_ctx *rctx = ahash_request_ctx(req);
158862306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm);
158962306a36Sopenharmony_ci
159062306a36Sopenharmony_ci	ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
159162306a36Sopenharmony_ci	rctx->fallback_req.base.flags =
159262306a36Sopenharmony_ci		req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP;
159362306a36Sopenharmony_ci
159462306a36Sopenharmony_ci	rctx->fallback_req.nbytes = req->nbytes;
159562306a36Sopenharmony_ci	rctx->fallback_req.src = req->src;
159662306a36Sopenharmony_ci	rctx->fallback_req.result = req->result;
159762306a36Sopenharmony_ci
159862306a36Sopenharmony_ci	return crypto_ahash_finup(&rctx->fallback_req);
159962306a36Sopenharmony_ci}
160062306a36Sopenharmony_ci
160162306a36Sopenharmony_cistatic int sa_sha_import(struct ahash_request *req, const void *in)
160262306a36Sopenharmony_ci{
160362306a36Sopenharmony_ci	struct sa_sha_req_ctx *rctx = ahash_request_ctx(req);
160462306a36Sopenharmony_ci	struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
160562306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm);
160662306a36Sopenharmony_ci
160762306a36Sopenharmony_ci	ahash_request_set_tfm(&rctx->fallback_req, ctx->fallback.ahash);
160862306a36Sopenharmony_ci	rctx->fallback_req.base.flags = req->base.flags &
160962306a36Sopenharmony_ci		CRYPTO_TFM_REQ_MAY_SLEEP;
161062306a36Sopenharmony_ci
161162306a36Sopenharmony_ci	return crypto_ahash_import(&rctx->fallback_req, in);
161262306a36Sopenharmony_ci}
161362306a36Sopenharmony_ci
161462306a36Sopenharmony_cistatic int sa_sha_export(struct ahash_request *req, void *out)
161562306a36Sopenharmony_ci{
161662306a36Sopenharmony_ci	struct sa_sha_req_ctx *rctx = ahash_request_ctx(req);
161762306a36Sopenharmony_ci	struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
161862306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_ahash_ctx(tfm);
161962306a36Sopenharmony_ci	struct ahash_request *subreq = &rctx->fallback_req;
162062306a36Sopenharmony_ci
162162306a36Sopenharmony_ci	ahash_request_set_tfm(subreq, ctx->fallback.ahash);
162262306a36Sopenharmony_ci	subreq->base.flags = req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP;
162362306a36Sopenharmony_ci
162462306a36Sopenharmony_ci	return crypto_ahash_export(subreq, out);
162562306a36Sopenharmony_ci}
162662306a36Sopenharmony_ci
162762306a36Sopenharmony_cistatic int sa_sha1_cra_init(struct crypto_tfm *tfm)
162862306a36Sopenharmony_ci{
162962306a36Sopenharmony_ci	struct algo_data ad = { 0 };
163062306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm);
163162306a36Sopenharmony_ci
163262306a36Sopenharmony_ci	sa_sha_cra_init_alg(tfm, "sha1");
163362306a36Sopenharmony_ci
163462306a36Sopenharmony_ci	ad.aalg_id = SA_AALG_ID_SHA1;
163562306a36Sopenharmony_ci	ad.hash_size = SHA1_DIGEST_SIZE;
163662306a36Sopenharmony_ci	ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA1;
163762306a36Sopenharmony_ci
163862306a36Sopenharmony_ci	sa_sha_setup(ctx, &ad);
163962306a36Sopenharmony_ci
164062306a36Sopenharmony_ci	return 0;
164162306a36Sopenharmony_ci}
164262306a36Sopenharmony_ci
164362306a36Sopenharmony_cistatic int sa_sha256_cra_init(struct crypto_tfm *tfm)
164462306a36Sopenharmony_ci{
164562306a36Sopenharmony_ci	struct algo_data ad = { 0 };
164662306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm);
164762306a36Sopenharmony_ci
164862306a36Sopenharmony_ci	sa_sha_cra_init_alg(tfm, "sha256");
164962306a36Sopenharmony_ci
165062306a36Sopenharmony_ci	ad.aalg_id = SA_AALG_ID_SHA2_256;
165162306a36Sopenharmony_ci	ad.hash_size = SHA256_DIGEST_SIZE;
165262306a36Sopenharmony_ci	ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA256;
165362306a36Sopenharmony_ci
165462306a36Sopenharmony_ci	sa_sha_setup(ctx, &ad);
165562306a36Sopenharmony_ci
165662306a36Sopenharmony_ci	return 0;
165762306a36Sopenharmony_ci}
165862306a36Sopenharmony_ci
165962306a36Sopenharmony_cistatic int sa_sha512_cra_init(struct crypto_tfm *tfm)
166062306a36Sopenharmony_ci{
166162306a36Sopenharmony_ci	struct algo_data ad = { 0 };
166262306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm);
166362306a36Sopenharmony_ci
166462306a36Sopenharmony_ci	sa_sha_cra_init_alg(tfm, "sha512");
166562306a36Sopenharmony_ci
166662306a36Sopenharmony_ci	ad.aalg_id = SA_AALG_ID_SHA2_512;
166762306a36Sopenharmony_ci	ad.hash_size = SHA512_DIGEST_SIZE;
166862306a36Sopenharmony_ci	ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA512;
166962306a36Sopenharmony_ci
167062306a36Sopenharmony_ci	sa_sha_setup(ctx, &ad);
167162306a36Sopenharmony_ci
167262306a36Sopenharmony_ci	return 0;
167362306a36Sopenharmony_ci}
167462306a36Sopenharmony_ci
167562306a36Sopenharmony_cistatic void sa_sha_cra_exit(struct crypto_tfm *tfm)
167662306a36Sopenharmony_ci{
167762306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_tfm_ctx(tfm);
167862306a36Sopenharmony_ci	struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev);
167962306a36Sopenharmony_ci
168062306a36Sopenharmony_ci	dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n",
168162306a36Sopenharmony_ci		__func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys,
168262306a36Sopenharmony_ci		ctx->dec.sc_id, &ctx->dec.sc_phys);
168362306a36Sopenharmony_ci
168462306a36Sopenharmony_ci	if (crypto_tfm_alg_type(tfm) == CRYPTO_ALG_TYPE_AHASH)
168562306a36Sopenharmony_ci		sa_free_ctx_info(&ctx->enc, data);
168662306a36Sopenharmony_ci
168762306a36Sopenharmony_ci	crypto_free_shash(ctx->shash);
168862306a36Sopenharmony_ci	crypto_free_ahash(ctx->fallback.ahash);
168962306a36Sopenharmony_ci}
169062306a36Sopenharmony_ci
169162306a36Sopenharmony_cistatic void sa_aead_dma_in_callback(void *data)
169262306a36Sopenharmony_ci{
169362306a36Sopenharmony_ci	struct sa_rx_data *rxd = data;
169462306a36Sopenharmony_ci	struct aead_request *req;
169562306a36Sopenharmony_ci	struct crypto_aead *tfm;
169662306a36Sopenharmony_ci	unsigned int start;
169762306a36Sopenharmony_ci	unsigned int authsize;
169862306a36Sopenharmony_ci	u8 auth_tag[SA_MAX_AUTH_TAG_SZ];
169962306a36Sopenharmony_ci	size_t pl, ml;
170062306a36Sopenharmony_ci	int i;
170162306a36Sopenharmony_ci	int err = 0;
170262306a36Sopenharmony_ci	u32 *mdptr;
170362306a36Sopenharmony_ci
170462306a36Sopenharmony_ci	sa_sync_from_device(rxd);
170562306a36Sopenharmony_ci	req = container_of(rxd->req, struct aead_request, base);
170662306a36Sopenharmony_ci	tfm = crypto_aead_reqtfm(req);
170762306a36Sopenharmony_ci	start = req->assoclen + req->cryptlen;
170862306a36Sopenharmony_ci	authsize = crypto_aead_authsize(tfm);
170962306a36Sopenharmony_ci
171062306a36Sopenharmony_ci	mdptr = (u32 *)dmaengine_desc_get_metadata_ptr(rxd->tx_in, &pl, &ml);
171162306a36Sopenharmony_ci	for (i = 0; i < (authsize / 4); i++)
171262306a36Sopenharmony_ci		mdptr[i + 4] = swab32(mdptr[i + 4]);
171362306a36Sopenharmony_ci
171462306a36Sopenharmony_ci	if (rxd->enc) {
171562306a36Sopenharmony_ci		scatterwalk_map_and_copy(&mdptr[4], req->dst, start, authsize,
171662306a36Sopenharmony_ci					 1);
171762306a36Sopenharmony_ci	} else {
171862306a36Sopenharmony_ci		start -= authsize;
171962306a36Sopenharmony_ci		scatterwalk_map_and_copy(auth_tag, req->src, start, authsize,
172062306a36Sopenharmony_ci					 0);
172162306a36Sopenharmony_ci
172262306a36Sopenharmony_ci		err = memcmp(&mdptr[4], auth_tag, authsize) ? -EBADMSG : 0;
172362306a36Sopenharmony_ci	}
172462306a36Sopenharmony_ci
172562306a36Sopenharmony_ci	sa_free_sa_rx_data(rxd);
172662306a36Sopenharmony_ci
172762306a36Sopenharmony_ci	aead_request_complete(req, err);
172862306a36Sopenharmony_ci}
172962306a36Sopenharmony_ci
173062306a36Sopenharmony_cistatic int sa_cra_init_aead(struct crypto_aead *tfm, const char *hash,
173162306a36Sopenharmony_ci			    const char *fallback)
173262306a36Sopenharmony_ci{
173362306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_aead_ctx(tfm);
173462306a36Sopenharmony_ci	struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev);
173562306a36Sopenharmony_ci	int ret;
173662306a36Sopenharmony_ci
173762306a36Sopenharmony_ci	memzero_explicit(ctx, sizeof(*ctx));
173862306a36Sopenharmony_ci	ctx->dev_data = data;
173962306a36Sopenharmony_ci
174062306a36Sopenharmony_ci	ctx->shash = crypto_alloc_shash(hash, 0, CRYPTO_ALG_NEED_FALLBACK);
174162306a36Sopenharmony_ci	if (IS_ERR(ctx->shash)) {
174262306a36Sopenharmony_ci		dev_err(sa_k3_dev, "base driver %s couldn't be loaded\n", hash);
174362306a36Sopenharmony_ci		return PTR_ERR(ctx->shash);
174462306a36Sopenharmony_ci	}
174562306a36Sopenharmony_ci
174662306a36Sopenharmony_ci	ctx->fallback.aead = crypto_alloc_aead(fallback, 0,
174762306a36Sopenharmony_ci					       CRYPTO_ALG_NEED_FALLBACK);
174862306a36Sopenharmony_ci
174962306a36Sopenharmony_ci	if (IS_ERR(ctx->fallback.aead)) {
175062306a36Sopenharmony_ci		dev_err(sa_k3_dev, "fallback driver %s couldn't be loaded\n",
175162306a36Sopenharmony_ci			fallback);
175262306a36Sopenharmony_ci		return PTR_ERR(ctx->fallback.aead);
175362306a36Sopenharmony_ci	}
175462306a36Sopenharmony_ci
175562306a36Sopenharmony_ci	crypto_aead_set_reqsize(tfm, sizeof(struct aead_request) +
175662306a36Sopenharmony_ci				crypto_aead_reqsize(ctx->fallback.aead));
175762306a36Sopenharmony_ci
175862306a36Sopenharmony_ci	ret = sa_init_ctx_info(&ctx->enc, data);
175962306a36Sopenharmony_ci	if (ret)
176062306a36Sopenharmony_ci		return ret;
176162306a36Sopenharmony_ci
176262306a36Sopenharmony_ci	ret = sa_init_ctx_info(&ctx->dec, data);
176362306a36Sopenharmony_ci	if (ret) {
176462306a36Sopenharmony_ci		sa_free_ctx_info(&ctx->enc, data);
176562306a36Sopenharmony_ci		return ret;
176662306a36Sopenharmony_ci	}
176762306a36Sopenharmony_ci
176862306a36Sopenharmony_ci	dev_dbg(sa_k3_dev, "%s(0x%p) sc-ids(0x%x(0x%pad), 0x%x(0x%pad))\n",
176962306a36Sopenharmony_ci		__func__, tfm, ctx->enc.sc_id, &ctx->enc.sc_phys,
177062306a36Sopenharmony_ci		ctx->dec.sc_id, &ctx->dec.sc_phys);
177162306a36Sopenharmony_ci
177262306a36Sopenharmony_ci	return ret;
177362306a36Sopenharmony_ci}
177462306a36Sopenharmony_ci
177562306a36Sopenharmony_cistatic int sa_cra_init_aead_sha1(struct crypto_aead *tfm)
177662306a36Sopenharmony_ci{
177762306a36Sopenharmony_ci	return sa_cra_init_aead(tfm, "sha1",
177862306a36Sopenharmony_ci				"authenc(hmac(sha1-ce),cbc(aes-ce))");
177962306a36Sopenharmony_ci}
178062306a36Sopenharmony_ci
178162306a36Sopenharmony_cistatic int sa_cra_init_aead_sha256(struct crypto_aead *tfm)
178262306a36Sopenharmony_ci{
178362306a36Sopenharmony_ci	return sa_cra_init_aead(tfm, "sha256",
178462306a36Sopenharmony_ci				"authenc(hmac(sha256-ce),cbc(aes-ce))");
178562306a36Sopenharmony_ci}
178662306a36Sopenharmony_ci
178762306a36Sopenharmony_cistatic void sa_exit_tfm_aead(struct crypto_aead *tfm)
178862306a36Sopenharmony_ci{
178962306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_aead_ctx(tfm);
179062306a36Sopenharmony_ci	struct sa_crypto_data *data = dev_get_drvdata(sa_k3_dev);
179162306a36Sopenharmony_ci
179262306a36Sopenharmony_ci	crypto_free_shash(ctx->shash);
179362306a36Sopenharmony_ci	crypto_free_aead(ctx->fallback.aead);
179462306a36Sopenharmony_ci
179562306a36Sopenharmony_ci	sa_free_ctx_info(&ctx->enc, data);
179662306a36Sopenharmony_ci	sa_free_ctx_info(&ctx->dec, data);
179762306a36Sopenharmony_ci}
179862306a36Sopenharmony_ci
179962306a36Sopenharmony_ci/* AEAD algorithm configuration interface function */
180062306a36Sopenharmony_cistatic int sa_aead_setkey(struct crypto_aead *authenc,
180162306a36Sopenharmony_ci			  const u8 *key, unsigned int keylen,
180262306a36Sopenharmony_ci			  struct algo_data *ad)
180362306a36Sopenharmony_ci{
180462306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_aead_ctx(authenc);
180562306a36Sopenharmony_ci	struct crypto_authenc_keys keys;
180662306a36Sopenharmony_ci	int cmdl_len;
180762306a36Sopenharmony_ci	struct sa_cmdl_cfg cfg;
180862306a36Sopenharmony_ci	int key_idx;
180962306a36Sopenharmony_ci
181062306a36Sopenharmony_ci	if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
181162306a36Sopenharmony_ci		return -EINVAL;
181262306a36Sopenharmony_ci
181362306a36Sopenharmony_ci	/* Convert the key size (16/24/32) to the key size index (0/1/2) */
181462306a36Sopenharmony_ci	key_idx = (keys.enckeylen >> 3) - 2;
181562306a36Sopenharmony_ci	if (key_idx >= 3)
181662306a36Sopenharmony_ci		return -EINVAL;
181762306a36Sopenharmony_ci
181862306a36Sopenharmony_ci	ad->ctx = ctx;
181962306a36Sopenharmony_ci	ad->enc_eng.eng_id = SA_ENG_ID_EM1;
182062306a36Sopenharmony_ci	ad->enc_eng.sc_size = SA_CTX_ENC_TYPE1_SZ;
182162306a36Sopenharmony_ci	ad->auth_eng.eng_id = SA_ENG_ID_AM1;
182262306a36Sopenharmony_ci	ad->auth_eng.sc_size = SA_CTX_AUTH_TYPE2_SZ;
182362306a36Sopenharmony_ci	ad->mci_enc = mci_cbc_enc_no_iv_array[key_idx];
182462306a36Sopenharmony_ci	ad->mci_dec = mci_cbc_dec_no_iv_array[key_idx];
182562306a36Sopenharmony_ci	ad->inv_key = true;
182662306a36Sopenharmony_ci	ad->keyed_mac = true;
182762306a36Sopenharmony_ci	ad->ealg_id = SA_EALG_ID_AES_CBC;
182862306a36Sopenharmony_ci	ad->prep_iopad = sa_prepare_iopads;
182962306a36Sopenharmony_ci
183062306a36Sopenharmony_ci	memset(&cfg, 0, sizeof(cfg));
183162306a36Sopenharmony_ci	cfg.enc = true;
183262306a36Sopenharmony_ci	cfg.aalg = ad->aalg_id;
183362306a36Sopenharmony_ci	cfg.enc_eng_id = ad->enc_eng.eng_id;
183462306a36Sopenharmony_ci	cfg.auth_eng_id = ad->auth_eng.eng_id;
183562306a36Sopenharmony_ci	cfg.iv_size = crypto_aead_ivsize(authenc);
183662306a36Sopenharmony_ci	cfg.akey = keys.authkey;
183762306a36Sopenharmony_ci	cfg.akey_len = keys.authkeylen;
183862306a36Sopenharmony_ci
183962306a36Sopenharmony_ci	/* Setup Encryption Security Context & Command label template */
184062306a36Sopenharmony_ci	if (sa_init_sc(&ctx->enc, ctx->dev_data->match_data, keys.enckey,
184162306a36Sopenharmony_ci		       keys.enckeylen, keys.authkey, keys.authkeylen,
184262306a36Sopenharmony_ci		       ad, 1, &ctx->enc.epib[1]))
184362306a36Sopenharmony_ci		return -EINVAL;
184462306a36Sopenharmony_ci
184562306a36Sopenharmony_ci	cmdl_len = sa_format_cmdl_gen(&cfg,
184662306a36Sopenharmony_ci				      (u8 *)ctx->enc.cmdl,
184762306a36Sopenharmony_ci				      &ctx->enc.cmdl_upd_info);
184862306a36Sopenharmony_ci	if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32)))
184962306a36Sopenharmony_ci		return -EINVAL;
185062306a36Sopenharmony_ci
185162306a36Sopenharmony_ci	ctx->enc.cmdl_size = cmdl_len;
185262306a36Sopenharmony_ci
185362306a36Sopenharmony_ci	/* Setup Decryption Security Context & Command label template */
185462306a36Sopenharmony_ci	if (sa_init_sc(&ctx->dec, ctx->dev_data->match_data, keys.enckey,
185562306a36Sopenharmony_ci		       keys.enckeylen, keys.authkey, keys.authkeylen,
185662306a36Sopenharmony_ci		       ad, 0, &ctx->dec.epib[1]))
185762306a36Sopenharmony_ci		return -EINVAL;
185862306a36Sopenharmony_ci
185962306a36Sopenharmony_ci	cfg.enc = false;
186062306a36Sopenharmony_ci	cmdl_len = sa_format_cmdl_gen(&cfg, (u8 *)ctx->dec.cmdl,
186162306a36Sopenharmony_ci				      &ctx->dec.cmdl_upd_info);
186262306a36Sopenharmony_ci
186362306a36Sopenharmony_ci	if (cmdl_len <= 0 || (cmdl_len > SA_MAX_CMDL_WORDS * sizeof(u32)))
186462306a36Sopenharmony_ci		return -EINVAL;
186562306a36Sopenharmony_ci
186662306a36Sopenharmony_ci	ctx->dec.cmdl_size = cmdl_len;
186762306a36Sopenharmony_ci
186862306a36Sopenharmony_ci	crypto_aead_clear_flags(ctx->fallback.aead, CRYPTO_TFM_REQ_MASK);
186962306a36Sopenharmony_ci	crypto_aead_set_flags(ctx->fallback.aead,
187062306a36Sopenharmony_ci			      crypto_aead_get_flags(authenc) &
187162306a36Sopenharmony_ci			      CRYPTO_TFM_REQ_MASK);
187262306a36Sopenharmony_ci
187362306a36Sopenharmony_ci	return crypto_aead_setkey(ctx->fallback.aead, key, keylen);
187462306a36Sopenharmony_ci}
187562306a36Sopenharmony_ci
187662306a36Sopenharmony_cistatic int sa_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize)
187762306a36Sopenharmony_ci{
187862306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_tfm_ctx(crypto_aead_tfm(tfm));
187962306a36Sopenharmony_ci
188062306a36Sopenharmony_ci	return crypto_aead_setauthsize(ctx->fallback.aead, authsize);
188162306a36Sopenharmony_ci}
188262306a36Sopenharmony_ci
188362306a36Sopenharmony_cistatic int sa_aead_cbc_sha1_setkey(struct crypto_aead *authenc,
188462306a36Sopenharmony_ci				   const u8 *key, unsigned int keylen)
188562306a36Sopenharmony_ci{
188662306a36Sopenharmony_ci	struct algo_data ad = { 0 };
188762306a36Sopenharmony_ci
188862306a36Sopenharmony_ci	ad.ealg_id = SA_EALG_ID_AES_CBC;
188962306a36Sopenharmony_ci	ad.aalg_id = SA_AALG_ID_HMAC_SHA1;
189062306a36Sopenharmony_ci	ad.hash_size = SHA1_DIGEST_SIZE;
189162306a36Sopenharmony_ci	ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA1;
189262306a36Sopenharmony_ci
189362306a36Sopenharmony_ci	return sa_aead_setkey(authenc, key, keylen, &ad);
189462306a36Sopenharmony_ci}
189562306a36Sopenharmony_ci
189662306a36Sopenharmony_cistatic int sa_aead_cbc_sha256_setkey(struct crypto_aead *authenc,
189762306a36Sopenharmony_ci				     const u8 *key, unsigned int keylen)
189862306a36Sopenharmony_ci{
189962306a36Sopenharmony_ci	struct algo_data ad = { 0 };
190062306a36Sopenharmony_ci
190162306a36Sopenharmony_ci	ad.ealg_id = SA_EALG_ID_AES_CBC;
190262306a36Sopenharmony_ci	ad.aalg_id = SA_AALG_ID_HMAC_SHA2_256;
190362306a36Sopenharmony_ci	ad.hash_size = SHA256_DIGEST_SIZE;
190462306a36Sopenharmony_ci	ad.auth_ctrl = SA_AUTH_SW_CTRL_SHA256;
190562306a36Sopenharmony_ci
190662306a36Sopenharmony_ci	return sa_aead_setkey(authenc, key, keylen, &ad);
190762306a36Sopenharmony_ci}
190862306a36Sopenharmony_ci
190962306a36Sopenharmony_cistatic int sa_aead_run(struct aead_request *req, u8 *iv, int enc)
191062306a36Sopenharmony_ci{
191162306a36Sopenharmony_ci	struct crypto_aead *tfm = crypto_aead_reqtfm(req);
191262306a36Sopenharmony_ci	struct sa_tfm_ctx *ctx = crypto_aead_ctx(tfm);
191362306a36Sopenharmony_ci	struct sa_req sa_req = { 0 };
191462306a36Sopenharmony_ci	size_t auth_size, enc_size;
191562306a36Sopenharmony_ci
191662306a36Sopenharmony_ci	enc_size = req->cryptlen;
191762306a36Sopenharmony_ci	auth_size = req->assoclen + req->cryptlen;
191862306a36Sopenharmony_ci
191962306a36Sopenharmony_ci	if (!enc) {
192062306a36Sopenharmony_ci		enc_size -= crypto_aead_authsize(tfm);
192162306a36Sopenharmony_ci		auth_size -= crypto_aead_authsize(tfm);
192262306a36Sopenharmony_ci	}
192362306a36Sopenharmony_ci
192462306a36Sopenharmony_ci	if (auth_size > SA_MAX_DATA_SZ ||
192562306a36Sopenharmony_ci	    (auth_size >= SA_UNSAFE_DATA_SZ_MIN &&
192662306a36Sopenharmony_ci	     auth_size <= SA_UNSAFE_DATA_SZ_MAX)) {
192762306a36Sopenharmony_ci		struct aead_request *subreq = aead_request_ctx(req);
192862306a36Sopenharmony_ci		int ret;
192962306a36Sopenharmony_ci
193062306a36Sopenharmony_ci		aead_request_set_tfm(subreq, ctx->fallback.aead);
193162306a36Sopenharmony_ci		aead_request_set_callback(subreq, req->base.flags,
193262306a36Sopenharmony_ci					  req->base.complete, req->base.data);
193362306a36Sopenharmony_ci		aead_request_set_crypt(subreq, req->src, req->dst,
193462306a36Sopenharmony_ci				       req->cryptlen, req->iv);
193562306a36Sopenharmony_ci		aead_request_set_ad(subreq, req->assoclen);
193662306a36Sopenharmony_ci
193762306a36Sopenharmony_ci		ret = enc ? crypto_aead_encrypt(subreq) :
193862306a36Sopenharmony_ci			crypto_aead_decrypt(subreq);
193962306a36Sopenharmony_ci		return ret;
194062306a36Sopenharmony_ci	}
194162306a36Sopenharmony_ci
194262306a36Sopenharmony_ci	sa_req.enc_offset = req->assoclen;
194362306a36Sopenharmony_ci	sa_req.enc_size = enc_size;
194462306a36Sopenharmony_ci	sa_req.auth_size = auth_size;
194562306a36Sopenharmony_ci	sa_req.size = auth_size;
194662306a36Sopenharmony_ci	sa_req.enc_iv = iv;
194762306a36Sopenharmony_ci	sa_req.type = CRYPTO_ALG_TYPE_AEAD;
194862306a36Sopenharmony_ci	sa_req.enc = enc;
194962306a36Sopenharmony_ci	sa_req.callback = sa_aead_dma_in_callback;
195062306a36Sopenharmony_ci	sa_req.mdata_size = 52;
195162306a36Sopenharmony_ci	sa_req.base = &req->base;
195262306a36Sopenharmony_ci	sa_req.ctx = ctx;
195362306a36Sopenharmony_ci	sa_req.src = req->src;
195462306a36Sopenharmony_ci	sa_req.dst = req->dst;
195562306a36Sopenharmony_ci
195662306a36Sopenharmony_ci	return sa_run(&sa_req);
195762306a36Sopenharmony_ci}
195862306a36Sopenharmony_ci
195962306a36Sopenharmony_ci/* AEAD algorithm encrypt interface function */
196062306a36Sopenharmony_cistatic int sa_aead_encrypt(struct aead_request *req)
196162306a36Sopenharmony_ci{
196262306a36Sopenharmony_ci	return sa_aead_run(req, req->iv, 1);
196362306a36Sopenharmony_ci}
196462306a36Sopenharmony_ci
196562306a36Sopenharmony_ci/* AEAD algorithm decrypt interface function */
196662306a36Sopenharmony_cistatic int sa_aead_decrypt(struct aead_request *req)
196762306a36Sopenharmony_ci{
196862306a36Sopenharmony_ci	return sa_aead_run(req, req->iv, 0);
196962306a36Sopenharmony_ci}
197062306a36Sopenharmony_ci
197162306a36Sopenharmony_cistatic struct sa_alg_tmpl sa_algs[] = {
197262306a36Sopenharmony_ci	[SA_ALG_CBC_AES] = {
197362306a36Sopenharmony_ci		.type = CRYPTO_ALG_TYPE_SKCIPHER,
197462306a36Sopenharmony_ci		.alg.skcipher = {
197562306a36Sopenharmony_ci			.base.cra_name		= "cbc(aes)",
197662306a36Sopenharmony_ci			.base.cra_driver_name	= "cbc-aes-sa2ul",
197762306a36Sopenharmony_ci			.base.cra_priority	= 30000,
197862306a36Sopenharmony_ci			.base.cra_flags		= CRYPTO_ALG_TYPE_SKCIPHER |
197962306a36Sopenharmony_ci						  CRYPTO_ALG_KERN_DRIVER_ONLY |
198062306a36Sopenharmony_ci						  CRYPTO_ALG_ASYNC |
198162306a36Sopenharmony_ci						  CRYPTO_ALG_NEED_FALLBACK,
198262306a36Sopenharmony_ci			.base.cra_blocksize	= AES_BLOCK_SIZE,
198362306a36Sopenharmony_ci			.base.cra_ctxsize	= sizeof(struct sa_tfm_ctx),
198462306a36Sopenharmony_ci			.base.cra_module	= THIS_MODULE,
198562306a36Sopenharmony_ci			.init			= sa_cipher_cra_init,
198662306a36Sopenharmony_ci			.exit			= sa_cipher_cra_exit,
198762306a36Sopenharmony_ci			.min_keysize		= AES_MIN_KEY_SIZE,
198862306a36Sopenharmony_ci			.max_keysize		= AES_MAX_KEY_SIZE,
198962306a36Sopenharmony_ci			.ivsize			= AES_BLOCK_SIZE,
199062306a36Sopenharmony_ci			.setkey			= sa_aes_cbc_setkey,
199162306a36Sopenharmony_ci			.encrypt		= sa_encrypt,
199262306a36Sopenharmony_ci			.decrypt		= sa_decrypt,
199362306a36Sopenharmony_ci		}
199462306a36Sopenharmony_ci	},
199562306a36Sopenharmony_ci	[SA_ALG_EBC_AES] = {
199662306a36Sopenharmony_ci		.type = CRYPTO_ALG_TYPE_SKCIPHER,
199762306a36Sopenharmony_ci		.alg.skcipher = {
199862306a36Sopenharmony_ci			.base.cra_name		= "ecb(aes)",
199962306a36Sopenharmony_ci			.base.cra_driver_name	= "ecb-aes-sa2ul",
200062306a36Sopenharmony_ci			.base.cra_priority	= 30000,
200162306a36Sopenharmony_ci			.base.cra_flags		= CRYPTO_ALG_TYPE_SKCIPHER |
200262306a36Sopenharmony_ci						  CRYPTO_ALG_KERN_DRIVER_ONLY |
200362306a36Sopenharmony_ci						  CRYPTO_ALG_ASYNC |
200462306a36Sopenharmony_ci						  CRYPTO_ALG_NEED_FALLBACK,
200562306a36Sopenharmony_ci			.base.cra_blocksize	= AES_BLOCK_SIZE,
200662306a36Sopenharmony_ci			.base.cra_ctxsize	= sizeof(struct sa_tfm_ctx),
200762306a36Sopenharmony_ci			.base.cra_module	= THIS_MODULE,
200862306a36Sopenharmony_ci			.init			= sa_cipher_cra_init,
200962306a36Sopenharmony_ci			.exit			= sa_cipher_cra_exit,
201062306a36Sopenharmony_ci			.min_keysize		= AES_MIN_KEY_SIZE,
201162306a36Sopenharmony_ci			.max_keysize		= AES_MAX_KEY_SIZE,
201262306a36Sopenharmony_ci			.setkey			= sa_aes_ecb_setkey,
201362306a36Sopenharmony_ci			.encrypt		= sa_encrypt,
201462306a36Sopenharmony_ci			.decrypt		= sa_decrypt,
201562306a36Sopenharmony_ci		}
201662306a36Sopenharmony_ci	},
201762306a36Sopenharmony_ci	[SA_ALG_CBC_DES3] = {
201862306a36Sopenharmony_ci		.type = CRYPTO_ALG_TYPE_SKCIPHER,
201962306a36Sopenharmony_ci		.alg.skcipher = {
202062306a36Sopenharmony_ci			.base.cra_name		= "cbc(des3_ede)",
202162306a36Sopenharmony_ci			.base.cra_driver_name	= "cbc-des3-sa2ul",
202262306a36Sopenharmony_ci			.base.cra_priority	= 30000,
202362306a36Sopenharmony_ci			.base.cra_flags		= CRYPTO_ALG_TYPE_SKCIPHER |
202462306a36Sopenharmony_ci						  CRYPTO_ALG_KERN_DRIVER_ONLY |
202562306a36Sopenharmony_ci						  CRYPTO_ALG_ASYNC |
202662306a36Sopenharmony_ci						  CRYPTO_ALG_NEED_FALLBACK,
202762306a36Sopenharmony_ci			.base.cra_blocksize	= DES_BLOCK_SIZE,
202862306a36Sopenharmony_ci			.base.cra_ctxsize	= sizeof(struct sa_tfm_ctx),
202962306a36Sopenharmony_ci			.base.cra_module	= THIS_MODULE,
203062306a36Sopenharmony_ci			.init			= sa_cipher_cra_init,
203162306a36Sopenharmony_ci			.exit			= sa_cipher_cra_exit,
203262306a36Sopenharmony_ci			.min_keysize		= 3 * DES_KEY_SIZE,
203362306a36Sopenharmony_ci			.max_keysize		= 3 * DES_KEY_SIZE,
203462306a36Sopenharmony_ci			.ivsize			= DES_BLOCK_SIZE,
203562306a36Sopenharmony_ci			.setkey			= sa_3des_cbc_setkey,
203662306a36Sopenharmony_ci			.encrypt		= sa_encrypt,
203762306a36Sopenharmony_ci			.decrypt		= sa_decrypt,
203862306a36Sopenharmony_ci		}
203962306a36Sopenharmony_ci	},
204062306a36Sopenharmony_ci	[SA_ALG_ECB_DES3] = {
204162306a36Sopenharmony_ci		.type = CRYPTO_ALG_TYPE_SKCIPHER,
204262306a36Sopenharmony_ci		.alg.skcipher = {
204362306a36Sopenharmony_ci			.base.cra_name		= "ecb(des3_ede)",
204462306a36Sopenharmony_ci			.base.cra_driver_name	= "ecb-des3-sa2ul",
204562306a36Sopenharmony_ci			.base.cra_priority	= 30000,
204662306a36Sopenharmony_ci			.base.cra_flags		= CRYPTO_ALG_TYPE_SKCIPHER |
204762306a36Sopenharmony_ci						  CRYPTO_ALG_KERN_DRIVER_ONLY |
204862306a36Sopenharmony_ci						  CRYPTO_ALG_ASYNC |
204962306a36Sopenharmony_ci						  CRYPTO_ALG_NEED_FALLBACK,
205062306a36Sopenharmony_ci			.base.cra_blocksize	= DES_BLOCK_SIZE,
205162306a36Sopenharmony_ci			.base.cra_ctxsize	= sizeof(struct sa_tfm_ctx),
205262306a36Sopenharmony_ci			.base.cra_module	= THIS_MODULE,
205362306a36Sopenharmony_ci			.init			= sa_cipher_cra_init,
205462306a36Sopenharmony_ci			.exit			= sa_cipher_cra_exit,
205562306a36Sopenharmony_ci			.min_keysize		= 3 * DES_KEY_SIZE,
205662306a36Sopenharmony_ci			.max_keysize		= 3 * DES_KEY_SIZE,
205762306a36Sopenharmony_ci			.setkey			= sa_3des_ecb_setkey,
205862306a36Sopenharmony_ci			.encrypt		= sa_encrypt,
205962306a36Sopenharmony_ci			.decrypt		= sa_decrypt,
206062306a36Sopenharmony_ci		}
206162306a36Sopenharmony_ci	},
206262306a36Sopenharmony_ci	[SA_ALG_SHA1] = {
206362306a36Sopenharmony_ci		.type = CRYPTO_ALG_TYPE_AHASH,
206462306a36Sopenharmony_ci		.alg.ahash = {
206562306a36Sopenharmony_ci			.halg.base = {
206662306a36Sopenharmony_ci				.cra_name	= "sha1",
206762306a36Sopenharmony_ci				.cra_driver_name	= "sha1-sa2ul",
206862306a36Sopenharmony_ci				.cra_priority	= 400,
206962306a36Sopenharmony_ci				.cra_flags	= CRYPTO_ALG_TYPE_AHASH |
207062306a36Sopenharmony_ci						  CRYPTO_ALG_ASYNC |
207162306a36Sopenharmony_ci						  CRYPTO_ALG_KERN_DRIVER_ONLY |
207262306a36Sopenharmony_ci						  CRYPTO_ALG_NEED_FALLBACK,
207362306a36Sopenharmony_ci				.cra_blocksize	= SHA1_BLOCK_SIZE,
207462306a36Sopenharmony_ci				.cra_ctxsize	= sizeof(struct sa_tfm_ctx),
207562306a36Sopenharmony_ci				.cra_module	= THIS_MODULE,
207662306a36Sopenharmony_ci				.cra_init	= sa_sha1_cra_init,
207762306a36Sopenharmony_ci				.cra_exit	= sa_sha_cra_exit,
207862306a36Sopenharmony_ci			},
207962306a36Sopenharmony_ci			.halg.digestsize	= SHA1_DIGEST_SIZE,
208062306a36Sopenharmony_ci			.halg.statesize		= sizeof(struct sa_sha_req_ctx) +
208162306a36Sopenharmony_ci						  sizeof(struct sha1_state),
208262306a36Sopenharmony_ci			.init			= sa_sha_init,
208362306a36Sopenharmony_ci			.update			= sa_sha_update,
208462306a36Sopenharmony_ci			.final			= sa_sha_final,
208562306a36Sopenharmony_ci			.finup			= sa_sha_finup,
208662306a36Sopenharmony_ci			.digest			= sa_sha_digest,
208762306a36Sopenharmony_ci			.export			= sa_sha_export,
208862306a36Sopenharmony_ci			.import			= sa_sha_import,
208962306a36Sopenharmony_ci		},
209062306a36Sopenharmony_ci	},
209162306a36Sopenharmony_ci	[SA_ALG_SHA256] = {
209262306a36Sopenharmony_ci		.type = CRYPTO_ALG_TYPE_AHASH,
209362306a36Sopenharmony_ci		.alg.ahash = {
209462306a36Sopenharmony_ci			.halg.base = {
209562306a36Sopenharmony_ci				.cra_name	= "sha256",
209662306a36Sopenharmony_ci				.cra_driver_name	= "sha256-sa2ul",
209762306a36Sopenharmony_ci				.cra_priority	= 400,
209862306a36Sopenharmony_ci				.cra_flags	= CRYPTO_ALG_TYPE_AHASH |
209962306a36Sopenharmony_ci						  CRYPTO_ALG_ASYNC |
210062306a36Sopenharmony_ci						  CRYPTO_ALG_KERN_DRIVER_ONLY |
210162306a36Sopenharmony_ci						  CRYPTO_ALG_NEED_FALLBACK,
210262306a36Sopenharmony_ci				.cra_blocksize	= SHA256_BLOCK_SIZE,
210362306a36Sopenharmony_ci				.cra_ctxsize	= sizeof(struct sa_tfm_ctx),
210462306a36Sopenharmony_ci				.cra_module	= THIS_MODULE,
210562306a36Sopenharmony_ci				.cra_init	= sa_sha256_cra_init,
210662306a36Sopenharmony_ci				.cra_exit	= sa_sha_cra_exit,
210762306a36Sopenharmony_ci			},
210862306a36Sopenharmony_ci			.halg.digestsize	= SHA256_DIGEST_SIZE,
210962306a36Sopenharmony_ci			.halg.statesize		= sizeof(struct sa_sha_req_ctx) +
211062306a36Sopenharmony_ci						  sizeof(struct sha256_state),
211162306a36Sopenharmony_ci			.init			= sa_sha_init,
211262306a36Sopenharmony_ci			.update			= sa_sha_update,
211362306a36Sopenharmony_ci			.final			= sa_sha_final,
211462306a36Sopenharmony_ci			.finup			= sa_sha_finup,
211562306a36Sopenharmony_ci			.digest			= sa_sha_digest,
211662306a36Sopenharmony_ci			.export			= sa_sha_export,
211762306a36Sopenharmony_ci			.import			= sa_sha_import,
211862306a36Sopenharmony_ci		},
211962306a36Sopenharmony_ci	},
212062306a36Sopenharmony_ci	[SA_ALG_SHA512] = {
212162306a36Sopenharmony_ci		.type = CRYPTO_ALG_TYPE_AHASH,
212262306a36Sopenharmony_ci		.alg.ahash = {
212362306a36Sopenharmony_ci			.halg.base = {
212462306a36Sopenharmony_ci				.cra_name	= "sha512",
212562306a36Sopenharmony_ci				.cra_driver_name	= "sha512-sa2ul",
212662306a36Sopenharmony_ci				.cra_priority	= 400,
212762306a36Sopenharmony_ci				.cra_flags	= CRYPTO_ALG_TYPE_AHASH |
212862306a36Sopenharmony_ci						  CRYPTO_ALG_ASYNC |
212962306a36Sopenharmony_ci						  CRYPTO_ALG_KERN_DRIVER_ONLY |
213062306a36Sopenharmony_ci						  CRYPTO_ALG_NEED_FALLBACK,
213162306a36Sopenharmony_ci				.cra_blocksize	= SHA512_BLOCK_SIZE,
213262306a36Sopenharmony_ci				.cra_ctxsize	= sizeof(struct sa_tfm_ctx),
213362306a36Sopenharmony_ci				.cra_module	= THIS_MODULE,
213462306a36Sopenharmony_ci				.cra_init	= sa_sha512_cra_init,
213562306a36Sopenharmony_ci				.cra_exit	= sa_sha_cra_exit,
213662306a36Sopenharmony_ci			},
213762306a36Sopenharmony_ci			.halg.digestsize	= SHA512_DIGEST_SIZE,
213862306a36Sopenharmony_ci			.halg.statesize		= sizeof(struct sa_sha_req_ctx) +
213962306a36Sopenharmony_ci						  sizeof(struct sha512_state),
214062306a36Sopenharmony_ci			.init			= sa_sha_init,
214162306a36Sopenharmony_ci			.update			= sa_sha_update,
214262306a36Sopenharmony_ci			.final			= sa_sha_final,
214362306a36Sopenharmony_ci			.finup			= sa_sha_finup,
214462306a36Sopenharmony_ci			.digest			= sa_sha_digest,
214562306a36Sopenharmony_ci			.export			= sa_sha_export,
214662306a36Sopenharmony_ci			.import			= sa_sha_import,
214762306a36Sopenharmony_ci		},
214862306a36Sopenharmony_ci	},
214962306a36Sopenharmony_ci	[SA_ALG_AUTHENC_SHA1_AES] = {
215062306a36Sopenharmony_ci		.type	= CRYPTO_ALG_TYPE_AEAD,
215162306a36Sopenharmony_ci		.alg.aead = {
215262306a36Sopenharmony_ci			.base = {
215362306a36Sopenharmony_ci				.cra_name = "authenc(hmac(sha1),cbc(aes))",
215462306a36Sopenharmony_ci				.cra_driver_name =
215562306a36Sopenharmony_ci					"authenc(hmac(sha1),cbc(aes))-sa2ul",
215662306a36Sopenharmony_ci				.cra_blocksize = AES_BLOCK_SIZE,
215762306a36Sopenharmony_ci				.cra_flags = CRYPTO_ALG_TYPE_AEAD |
215862306a36Sopenharmony_ci					CRYPTO_ALG_KERN_DRIVER_ONLY |
215962306a36Sopenharmony_ci					CRYPTO_ALG_ASYNC |
216062306a36Sopenharmony_ci					CRYPTO_ALG_NEED_FALLBACK,
216162306a36Sopenharmony_ci				.cra_ctxsize = sizeof(struct sa_tfm_ctx),
216262306a36Sopenharmony_ci				.cra_module = THIS_MODULE,
216362306a36Sopenharmony_ci				.cra_priority = 3000,
216462306a36Sopenharmony_ci			},
216562306a36Sopenharmony_ci			.ivsize = AES_BLOCK_SIZE,
216662306a36Sopenharmony_ci			.maxauthsize = SHA1_DIGEST_SIZE,
216762306a36Sopenharmony_ci
216862306a36Sopenharmony_ci			.init = sa_cra_init_aead_sha1,
216962306a36Sopenharmony_ci			.exit = sa_exit_tfm_aead,
217062306a36Sopenharmony_ci			.setkey = sa_aead_cbc_sha1_setkey,
217162306a36Sopenharmony_ci			.setauthsize = sa_aead_setauthsize,
217262306a36Sopenharmony_ci			.encrypt = sa_aead_encrypt,
217362306a36Sopenharmony_ci			.decrypt = sa_aead_decrypt,
217462306a36Sopenharmony_ci		},
217562306a36Sopenharmony_ci	},
217662306a36Sopenharmony_ci	[SA_ALG_AUTHENC_SHA256_AES] = {
217762306a36Sopenharmony_ci		.type	= CRYPTO_ALG_TYPE_AEAD,
217862306a36Sopenharmony_ci		.alg.aead = {
217962306a36Sopenharmony_ci			.base = {
218062306a36Sopenharmony_ci				.cra_name = "authenc(hmac(sha256),cbc(aes))",
218162306a36Sopenharmony_ci				.cra_driver_name =
218262306a36Sopenharmony_ci					"authenc(hmac(sha256),cbc(aes))-sa2ul",
218362306a36Sopenharmony_ci				.cra_blocksize = AES_BLOCK_SIZE,
218462306a36Sopenharmony_ci				.cra_flags = CRYPTO_ALG_TYPE_AEAD |
218562306a36Sopenharmony_ci					CRYPTO_ALG_KERN_DRIVER_ONLY |
218662306a36Sopenharmony_ci					CRYPTO_ALG_ASYNC |
218762306a36Sopenharmony_ci					CRYPTO_ALG_NEED_FALLBACK,
218862306a36Sopenharmony_ci				.cra_ctxsize = sizeof(struct sa_tfm_ctx),
218962306a36Sopenharmony_ci				.cra_module = THIS_MODULE,
219062306a36Sopenharmony_ci				.cra_alignmask = 0,
219162306a36Sopenharmony_ci				.cra_priority = 3000,
219262306a36Sopenharmony_ci			},
219362306a36Sopenharmony_ci			.ivsize = AES_BLOCK_SIZE,
219462306a36Sopenharmony_ci			.maxauthsize = SHA256_DIGEST_SIZE,
219562306a36Sopenharmony_ci
219662306a36Sopenharmony_ci			.init = sa_cra_init_aead_sha256,
219762306a36Sopenharmony_ci			.exit = sa_exit_tfm_aead,
219862306a36Sopenharmony_ci			.setkey = sa_aead_cbc_sha256_setkey,
219962306a36Sopenharmony_ci			.setauthsize = sa_aead_setauthsize,
220062306a36Sopenharmony_ci			.encrypt = sa_aead_encrypt,
220162306a36Sopenharmony_ci			.decrypt = sa_aead_decrypt,
220262306a36Sopenharmony_ci		},
220362306a36Sopenharmony_ci	},
220462306a36Sopenharmony_ci};
220562306a36Sopenharmony_ci
220662306a36Sopenharmony_ci/* Register the algorithms in crypto framework */
220762306a36Sopenharmony_cistatic void sa_register_algos(struct sa_crypto_data *dev_data)
220862306a36Sopenharmony_ci{
220962306a36Sopenharmony_ci	const struct sa_match_data *match_data = dev_data->match_data;
221062306a36Sopenharmony_ci	struct device *dev = dev_data->dev;
221162306a36Sopenharmony_ci	char *alg_name;
221262306a36Sopenharmony_ci	u32 type;
221362306a36Sopenharmony_ci	int i, err;
221462306a36Sopenharmony_ci
221562306a36Sopenharmony_ci	for (i = 0; i < ARRAY_SIZE(sa_algs); i++) {
221662306a36Sopenharmony_ci		/* Skip unsupported algos */
221762306a36Sopenharmony_ci		if (!(match_data->supported_algos & BIT(i)))
221862306a36Sopenharmony_ci			continue;
221962306a36Sopenharmony_ci
222062306a36Sopenharmony_ci		type = sa_algs[i].type;
222162306a36Sopenharmony_ci		if (type == CRYPTO_ALG_TYPE_SKCIPHER) {
222262306a36Sopenharmony_ci			alg_name = sa_algs[i].alg.skcipher.base.cra_name;
222362306a36Sopenharmony_ci			err = crypto_register_skcipher(&sa_algs[i].alg.skcipher);
222462306a36Sopenharmony_ci		} else if (type == CRYPTO_ALG_TYPE_AHASH) {
222562306a36Sopenharmony_ci			alg_name = sa_algs[i].alg.ahash.halg.base.cra_name;
222662306a36Sopenharmony_ci			err = crypto_register_ahash(&sa_algs[i].alg.ahash);
222762306a36Sopenharmony_ci		} else if (type == CRYPTO_ALG_TYPE_AEAD) {
222862306a36Sopenharmony_ci			alg_name = sa_algs[i].alg.aead.base.cra_name;
222962306a36Sopenharmony_ci			err = crypto_register_aead(&sa_algs[i].alg.aead);
223062306a36Sopenharmony_ci		} else {
223162306a36Sopenharmony_ci			dev_err(dev,
223262306a36Sopenharmony_ci				"un-supported crypto algorithm (%d)",
223362306a36Sopenharmony_ci				sa_algs[i].type);
223462306a36Sopenharmony_ci			continue;
223562306a36Sopenharmony_ci		}
223662306a36Sopenharmony_ci
223762306a36Sopenharmony_ci		if (err)
223862306a36Sopenharmony_ci			dev_err(dev, "Failed to register '%s'\n", alg_name);
223962306a36Sopenharmony_ci		else
224062306a36Sopenharmony_ci			sa_algs[i].registered = true;
224162306a36Sopenharmony_ci	}
224262306a36Sopenharmony_ci}
224362306a36Sopenharmony_ci
224462306a36Sopenharmony_ci/* Unregister the algorithms in crypto framework */
224562306a36Sopenharmony_cistatic void sa_unregister_algos(const struct device *dev)
224662306a36Sopenharmony_ci{
224762306a36Sopenharmony_ci	u32 type;
224862306a36Sopenharmony_ci	int i;
224962306a36Sopenharmony_ci
225062306a36Sopenharmony_ci	for (i = 0; i < ARRAY_SIZE(sa_algs); i++) {
225162306a36Sopenharmony_ci		type = sa_algs[i].type;
225262306a36Sopenharmony_ci		if (!sa_algs[i].registered)
225362306a36Sopenharmony_ci			continue;
225462306a36Sopenharmony_ci		if (type == CRYPTO_ALG_TYPE_SKCIPHER)
225562306a36Sopenharmony_ci			crypto_unregister_skcipher(&sa_algs[i].alg.skcipher);
225662306a36Sopenharmony_ci		else if (type == CRYPTO_ALG_TYPE_AHASH)
225762306a36Sopenharmony_ci			crypto_unregister_ahash(&sa_algs[i].alg.ahash);
225862306a36Sopenharmony_ci		else if (type == CRYPTO_ALG_TYPE_AEAD)
225962306a36Sopenharmony_ci			crypto_unregister_aead(&sa_algs[i].alg.aead);
226062306a36Sopenharmony_ci
226162306a36Sopenharmony_ci		sa_algs[i].registered = false;
226262306a36Sopenharmony_ci	}
226362306a36Sopenharmony_ci}
226462306a36Sopenharmony_ci
226562306a36Sopenharmony_cistatic int sa_init_mem(struct sa_crypto_data *dev_data)
226662306a36Sopenharmony_ci{
226762306a36Sopenharmony_ci	struct device *dev = &dev_data->pdev->dev;
226862306a36Sopenharmony_ci	/* Setup dma pool for security context buffers */
226962306a36Sopenharmony_ci	dev_data->sc_pool = dma_pool_create("keystone-sc", dev,
227062306a36Sopenharmony_ci					    SA_CTX_MAX_SZ, 64, 0);
227162306a36Sopenharmony_ci	if (!dev_data->sc_pool) {
227262306a36Sopenharmony_ci		dev_err(dev, "Failed to create dma pool");
227362306a36Sopenharmony_ci		return -ENOMEM;
227462306a36Sopenharmony_ci	}
227562306a36Sopenharmony_ci
227662306a36Sopenharmony_ci	return 0;
227762306a36Sopenharmony_ci}
227862306a36Sopenharmony_ci
227962306a36Sopenharmony_cistatic int sa_dma_init(struct sa_crypto_data *dd)
228062306a36Sopenharmony_ci{
228162306a36Sopenharmony_ci	int ret;
228262306a36Sopenharmony_ci	struct dma_slave_config cfg;
228362306a36Sopenharmony_ci
228462306a36Sopenharmony_ci	dd->dma_rx1 = NULL;
228562306a36Sopenharmony_ci	dd->dma_tx = NULL;
228662306a36Sopenharmony_ci	dd->dma_rx2 = NULL;
228762306a36Sopenharmony_ci
228862306a36Sopenharmony_ci	ret = dma_coerce_mask_and_coherent(dd->dev, DMA_BIT_MASK(48));
228962306a36Sopenharmony_ci	if (ret)
229062306a36Sopenharmony_ci		return ret;
229162306a36Sopenharmony_ci
229262306a36Sopenharmony_ci	dd->dma_rx1 = dma_request_chan(dd->dev, "rx1");
229362306a36Sopenharmony_ci	if (IS_ERR(dd->dma_rx1))
229462306a36Sopenharmony_ci		return dev_err_probe(dd->dev, PTR_ERR(dd->dma_rx1),
229562306a36Sopenharmony_ci				     "Unable to request rx1 DMA channel\n");
229662306a36Sopenharmony_ci
229762306a36Sopenharmony_ci	dd->dma_rx2 = dma_request_chan(dd->dev, "rx2");
229862306a36Sopenharmony_ci	if (IS_ERR(dd->dma_rx2)) {
229962306a36Sopenharmony_ci		ret = dev_err_probe(dd->dev, PTR_ERR(dd->dma_rx2),
230062306a36Sopenharmony_ci				    "Unable to request rx2 DMA channel\n");
230162306a36Sopenharmony_ci		goto err_dma_rx2;
230262306a36Sopenharmony_ci	}
230362306a36Sopenharmony_ci
230462306a36Sopenharmony_ci	dd->dma_tx = dma_request_chan(dd->dev, "tx");
230562306a36Sopenharmony_ci	if (IS_ERR(dd->dma_tx)) {
230662306a36Sopenharmony_ci		ret = dev_err_probe(dd->dev, PTR_ERR(dd->dma_tx),
230762306a36Sopenharmony_ci				    "Unable to request tx DMA channel\n");
230862306a36Sopenharmony_ci		goto err_dma_tx;
230962306a36Sopenharmony_ci	}
231062306a36Sopenharmony_ci
231162306a36Sopenharmony_ci	memzero_explicit(&cfg, sizeof(cfg));
231262306a36Sopenharmony_ci
231362306a36Sopenharmony_ci	cfg.src_addr_width = DMA_SLAVE_BUSWIDTH_4_BYTES;
231462306a36Sopenharmony_ci	cfg.dst_addr_width = DMA_SLAVE_BUSWIDTH_4_BYTES;
231562306a36Sopenharmony_ci	cfg.src_maxburst = 4;
231662306a36Sopenharmony_ci	cfg.dst_maxburst = 4;
231762306a36Sopenharmony_ci
231862306a36Sopenharmony_ci	ret = dmaengine_slave_config(dd->dma_rx1, &cfg);
231962306a36Sopenharmony_ci	if (ret) {
232062306a36Sopenharmony_ci		dev_err(dd->dev, "can't configure IN dmaengine slave: %d\n",
232162306a36Sopenharmony_ci			ret);
232262306a36Sopenharmony_ci		goto err_dma_config;
232362306a36Sopenharmony_ci	}
232462306a36Sopenharmony_ci
232562306a36Sopenharmony_ci	ret = dmaengine_slave_config(dd->dma_rx2, &cfg);
232662306a36Sopenharmony_ci	if (ret) {
232762306a36Sopenharmony_ci		dev_err(dd->dev, "can't configure IN dmaengine slave: %d\n",
232862306a36Sopenharmony_ci			ret);
232962306a36Sopenharmony_ci		goto err_dma_config;
233062306a36Sopenharmony_ci	}
233162306a36Sopenharmony_ci
233262306a36Sopenharmony_ci	ret = dmaengine_slave_config(dd->dma_tx, &cfg);
233362306a36Sopenharmony_ci	if (ret) {
233462306a36Sopenharmony_ci		dev_err(dd->dev, "can't configure OUT dmaengine slave: %d\n",
233562306a36Sopenharmony_ci			ret);
233662306a36Sopenharmony_ci		goto err_dma_config;
233762306a36Sopenharmony_ci	}
233862306a36Sopenharmony_ci
233962306a36Sopenharmony_ci	return 0;
234062306a36Sopenharmony_ci
234162306a36Sopenharmony_cierr_dma_config:
234262306a36Sopenharmony_ci	dma_release_channel(dd->dma_tx);
234362306a36Sopenharmony_cierr_dma_tx:
234462306a36Sopenharmony_ci	dma_release_channel(dd->dma_rx2);
234562306a36Sopenharmony_cierr_dma_rx2:
234662306a36Sopenharmony_ci	dma_release_channel(dd->dma_rx1);
234762306a36Sopenharmony_ci
234862306a36Sopenharmony_ci	return ret;
234962306a36Sopenharmony_ci}
235062306a36Sopenharmony_ci
235162306a36Sopenharmony_cistatic int sa_link_child(struct device *dev, void *data)
235262306a36Sopenharmony_ci{
235362306a36Sopenharmony_ci	struct device *parent = data;
235462306a36Sopenharmony_ci
235562306a36Sopenharmony_ci	device_link_add(dev, parent, DL_FLAG_AUTOPROBE_CONSUMER);
235662306a36Sopenharmony_ci
235762306a36Sopenharmony_ci	return 0;
235862306a36Sopenharmony_ci}
235962306a36Sopenharmony_ci
236062306a36Sopenharmony_cistatic struct sa_match_data am654_match_data = {
236162306a36Sopenharmony_ci	.priv = 1,
236262306a36Sopenharmony_ci	.priv_id = 1,
236362306a36Sopenharmony_ci	.supported_algos = BIT(SA_ALG_CBC_AES) |
236462306a36Sopenharmony_ci			   BIT(SA_ALG_EBC_AES) |
236562306a36Sopenharmony_ci			   BIT(SA_ALG_CBC_DES3) |
236662306a36Sopenharmony_ci			   BIT(SA_ALG_ECB_DES3) |
236762306a36Sopenharmony_ci			   BIT(SA_ALG_SHA1) |
236862306a36Sopenharmony_ci			   BIT(SA_ALG_SHA256) |
236962306a36Sopenharmony_ci			   BIT(SA_ALG_SHA512) |
237062306a36Sopenharmony_ci			   BIT(SA_ALG_AUTHENC_SHA1_AES) |
237162306a36Sopenharmony_ci			   BIT(SA_ALG_AUTHENC_SHA256_AES),
237262306a36Sopenharmony_ci};
237362306a36Sopenharmony_ci
237462306a36Sopenharmony_cistatic struct sa_match_data am64_match_data = {
237562306a36Sopenharmony_ci	.priv = 0,
237662306a36Sopenharmony_ci	.priv_id = 0,
237762306a36Sopenharmony_ci	.supported_algos = BIT(SA_ALG_CBC_AES) |
237862306a36Sopenharmony_ci			   BIT(SA_ALG_EBC_AES) |
237962306a36Sopenharmony_ci			   BIT(SA_ALG_SHA256) |
238062306a36Sopenharmony_ci			   BIT(SA_ALG_SHA512) |
238162306a36Sopenharmony_ci			   BIT(SA_ALG_AUTHENC_SHA256_AES),
238262306a36Sopenharmony_ci};
238362306a36Sopenharmony_ci
238462306a36Sopenharmony_cistatic const struct of_device_id of_match[] = {
238562306a36Sopenharmony_ci	{ .compatible = "ti,j721e-sa2ul", .data = &am654_match_data, },
238662306a36Sopenharmony_ci	{ .compatible = "ti,am654-sa2ul", .data = &am654_match_data, },
238762306a36Sopenharmony_ci	{ .compatible = "ti,am64-sa2ul", .data = &am64_match_data, },
238862306a36Sopenharmony_ci	{ .compatible = "ti,am62-sa3ul", .data = &am64_match_data, },
238962306a36Sopenharmony_ci	{},
239062306a36Sopenharmony_ci};
239162306a36Sopenharmony_ciMODULE_DEVICE_TABLE(of, of_match);
239262306a36Sopenharmony_ci
239362306a36Sopenharmony_cistatic int sa_ul_probe(struct platform_device *pdev)
239462306a36Sopenharmony_ci{
239562306a36Sopenharmony_ci	struct device *dev = &pdev->dev;
239662306a36Sopenharmony_ci	struct device_node *node = dev->of_node;
239762306a36Sopenharmony_ci	static void __iomem *saul_base;
239862306a36Sopenharmony_ci	struct sa_crypto_data *dev_data;
239962306a36Sopenharmony_ci	u32 status, val;
240062306a36Sopenharmony_ci	int ret;
240162306a36Sopenharmony_ci
240262306a36Sopenharmony_ci	dev_data = devm_kzalloc(dev, sizeof(*dev_data), GFP_KERNEL);
240362306a36Sopenharmony_ci	if (!dev_data)
240462306a36Sopenharmony_ci		return -ENOMEM;
240562306a36Sopenharmony_ci
240662306a36Sopenharmony_ci	dev_data->match_data = of_device_get_match_data(dev);
240762306a36Sopenharmony_ci	if (!dev_data->match_data)
240862306a36Sopenharmony_ci		return -ENODEV;
240962306a36Sopenharmony_ci
241062306a36Sopenharmony_ci	saul_base = devm_platform_ioremap_resource(pdev, 0);
241162306a36Sopenharmony_ci	if (IS_ERR(saul_base))
241262306a36Sopenharmony_ci		return PTR_ERR(saul_base);
241362306a36Sopenharmony_ci
241462306a36Sopenharmony_ci	sa_k3_dev = dev;
241562306a36Sopenharmony_ci	dev_data->dev = dev;
241662306a36Sopenharmony_ci	dev_data->pdev = pdev;
241762306a36Sopenharmony_ci	dev_data->base = saul_base;
241862306a36Sopenharmony_ci	platform_set_drvdata(pdev, dev_data);
241962306a36Sopenharmony_ci	dev_set_drvdata(sa_k3_dev, dev_data);
242062306a36Sopenharmony_ci
242162306a36Sopenharmony_ci	pm_runtime_enable(dev);
242262306a36Sopenharmony_ci	ret = pm_runtime_resume_and_get(dev);
242362306a36Sopenharmony_ci	if (ret < 0) {
242462306a36Sopenharmony_ci		dev_err(dev, "%s: failed to get sync: %d\n", __func__, ret);
242562306a36Sopenharmony_ci		pm_runtime_disable(dev);
242662306a36Sopenharmony_ci		return ret;
242762306a36Sopenharmony_ci	}
242862306a36Sopenharmony_ci
242962306a36Sopenharmony_ci	sa_init_mem(dev_data);
243062306a36Sopenharmony_ci	ret = sa_dma_init(dev_data);
243162306a36Sopenharmony_ci	if (ret)
243262306a36Sopenharmony_ci		goto destroy_dma_pool;
243362306a36Sopenharmony_ci
243462306a36Sopenharmony_ci	spin_lock_init(&dev_data->scid_lock);
243562306a36Sopenharmony_ci
243662306a36Sopenharmony_ci	val = SA_EEC_ENCSS_EN | SA_EEC_AUTHSS_EN | SA_EEC_CTXCACH_EN |
243762306a36Sopenharmony_ci	      SA_EEC_CPPI_PORT_IN_EN | SA_EEC_CPPI_PORT_OUT_EN |
243862306a36Sopenharmony_ci	      SA_EEC_TRNG_EN;
243962306a36Sopenharmony_ci	status = readl_relaxed(saul_base + SA_ENGINE_STATUS);
244062306a36Sopenharmony_ci	/* Only enable engines if all are not already enabled */
244162306a36Sopenharmony_ci	if (val & ~status)
244262306a36Sopenharmony_ci		writel_relaxed(val, saul_base + SA_ENGINE_ENABLE_CONTROL);
244362306a36Sopenharmony_ci
244462306a36Sopenharmony_ci	sa_register_algos(dev_data);
244562306a36Sopenharmony_ci
244662306a36Sopenharmony_ci	ret = of_platform_populate(node, NULL, NULL, dev);
244762306a36Sopenharmony_ci	if (ret)
244862306a36Sopenharmony_ci		goto release_dma;
244962306a36Sopenharmony_ci
245062306a36Sopenharmony_ci	device_for_each_child(dev, dev, sa_link_child);
245162306a36Sopenharmony_ci
245262306a36Sopenharmony_ci	return 0;
245362306a36Sopenharmony_ci
245462306a36Sopenharmony_cirelease_dma:
245562306a36Sopenharmony_ci	sa_unregister_algos(dev);
245662306a36Sopenharmony_ci
245762306a36Sopenharmony_ci	dma_release_channel(dev_data->dma_rx2);
245862306a36Sopenharmony_ci	dma_release_channel(dev_data->dma_rx1);
245962306a36Sopenharmony_ci	dma_release_channel(dev_data->dma_tx);
246062306a36Sopenharmony_ci
246162306a36Sopenharmony_cidestroy_dma_pool:
246262306a36Sopenharmony_ci	dma_pool_destroy(dev_data->sc_pool);
246362306a36Sopenharmony_ci
246462306a36Sopenharmony_ci	pm_runtime_put_sync(dev);
246562306a36Sopenharmony_ci	pm_runtime_disable(dev);
246662306a36Sopenharmony_ci
246762306a36Sopenharmony_ci	return ret;
246862306a36Sopenharmony_ci}
246962306a36Sopenharmony_ci
247062306a36Sopenharmony_cistatic int sa_ul_remove(struct platform_device *pdev)
247162306a36Sopenharmony_ci{
247262306a36Sopenharmony_ci	struct sa_crypto_data *dev_data = platform_get_drvdata(pdev);
247362306a36Sopenharmony_ci
247462306a36Sopenharmony_ci	of_platform_depopulate(&pdev->dev);
247562306a36Sopenharmony_ci
247662306a36Sopenharmony_ci	sa_unregister_algos(&pdev->dev);
247762306a36Sopenharmony_ci
247862306a36Sopenharmony_ci	dma_release_channel(dev_data->dma_rx2);
247962306a36Sopenharmony_ci	dma_release_channel(dev_data->dma_rx1);
248062306a36Sopenharmony_ci	dma_release_channel(dev_data->dma_tx);
248162306a36Sopenharmony_ci
248262306a36Sopenharmony_ci	dma_pool_destroy(dev_data->sc_pool);
248362306a36Sopenharmony_ci
248462306a36Sopenharmony_ci	platform_set_drvdata(pdev, NULL);
248562306a36Sopenharmony_ci
248662306a36Sopenharmony_ci	pm_runtime_put_sync(&pdev->dev);
248762306a36Sopenharmony_ci	pm_runtime_disable(&pdev->dev);
248862306a36Sopenharmony_ci
248962306a36Sopenharmony_ci	return 0;
249062306a36Sopenharmony_ci}
249162306a36Sopenharmony_ci
249262306a36Sopenharmony_cistatic struct platform_driver sa_ul_driver = {
249362306a36Sopenharmony_ci	.probe = sa_ul_probe,
249462306a36Sopenharmony_ci	.remove = sa_ul_remove,
249562306a36Sopenharmony_ci	.driver = {
249662306a36Sopenharmony_ci		   .name = "saul-crypto",
249762306a36Sopenharmony_ci		   .of_match_table = of_match,
249862306a36Sopenharmony_ci		   },
249962306a36Sopenharmony_ci};
250062306a36Sopenharmony_cimodule_platform_driver(sa_ul_driver);
250162306a36Sopenharmony_ciMODULE_LICENSE("GPL v2");
2502