.. | .. |
---|
86 | 86 | KEY_CONTEXT_OPAD_PRESENT_M) |
---|
87 | 87 | #define KEY_CONTEXT_OPAD_PRESENT_F KEY_CONTEXT_OPAD_PRESENT_V(1U) |
---|
88 | 88 | |
---|
89 | | -#define TLS_KEYCTX_RXFLIT_CNT_S 24 |
---|
90 | | -#define TLS_KEYCTX_RXFLIT_CNT_V(x) ((x) << TLS_KEYCTX_RXFLIT_CNT_S) |
---|
91 | | - |
---|
92 | | -#define TLS_KEYCTX_RXPROT_VER_S 20 |
---|
93 | | -#define TLS_KEYCTX_RXPROT_VER_M 0xf |
---|
94 | | -#define TLS_KEYCTX_RXPROT_VER_V(x) ((x) << TLS_KEYCTX_RXPROT_VER_S) |
---|
95 | | - |
---|
96 | | -#define TLS_KEYCTX_RXCIPH_MODE_S 16 |
---|
97 | | -#define TLS_KEYCTX_RXCIPH_MODE_M 0xf |
---|
98 | | -#define TLS_KEYCTX_RXCIPH_MODE_V(x) ((x) << TLS_KEYCTX_RXCIPH_MODE_S) |
---|
99 | | - |
---|
100 | | -#define TLS_KEYCTX_RXAUTH_MODE_S 12 |
---|
101 | | -#define TLS_KEYCTX_RXAUTH_MODE_M 0xf |
---|
102 | | -#define TLS_KEYCTX_RXAUTH_MODE_V(x) ((x) << TLS_KEYCTX_RXAUTH_MODE_S) |
---|
103 | | - |
---|
104 | | -#define TLS_KEYCTX_RXCIAU_CTRL_S 11 |
---|
105 | | -#define TLS_KEYCTX_RXCIAU_CTRL_V(x) ((x) << TLS_KEYCTX_RXCIAU_CTRL_S) |
---|
106 | | - |
---|
107 | | -#define TLS_KEYCTX_RX_SEQCTR_S 9 |
---|
108 | | -#define TLS_KEYCTX_RX_SEQCTR_M 0x3 |
---|
109 | | -#define TLS_KEYCTX_RX_SEQCTR_V(x) ((x) << TLS_KEYCTX_RX_SEQCTR_S) |
---|
110 | | - |
---|
111 | | -#define TLS_KEYCTX_RX_VALID_S 8 |
---|
112 | | -#define TLS_KEYCTX_RX_VALID_V(x) ((x) << TLS_KEYCTX_RX_VALID_S) |
---|
113 | | - |
---|
114 | | -#define TLS_KEYCTX_RXCK_SIZE_S 3 |
---|
115 | | -#define TLS_KEYCTX_RXCK_SIZE_M 0x7 |
---|
116 | | -#define TLS_KEYCTX_RXCK_SIZE_V(x) ((x) << TLS_KEYCTX_RXCK_SIZE_S) |
---|
117 | | - |
---|
118 | | -#define TLS_KEYCTX_RXMK_SIZE_S 0 |
---|
119 | | -#define TLS_KEYCTX_RXMK_SIZE_M 0x7 |
---|
120 | | -#define TLS_KEYCTX_RXMK_SIZE_V(x) ((x) << TLS_KEYCTX_RXMK_SIZE_S) |
---|
121 | | - |
---|
122 | 89 | #define CHCR_HASH_MAX_DIGEST_SIZE 64 |
---|
123 | 90 | #define CHCR_MAX_SHA_DIGEST_SIZE 64 |
---|
124 | 91 | |
---|
.. | .. |
---|
262 | 229 | #define MIN_AUTH_SG 1 /* IV */ |
---|
263 | 230 | #define MIN_GCM_SG 1 /* IV */ |
---|
264 | 231 | #define MIN_DIGEST_SG 1 /*Partial Buffer*/ |
---|
265 | | -#define MIN_CCM_SG 2 /*IV+B0*/ |
---|
| 232 | +#define MIN_CCM_SG 1 /*IV+B0*/ |
---|
266 | 233 | #define CIP_SPACE_LEFT(len) \ |
---|
267 | 234 | ((SGE_MAX_WR_LEN - CIP_WR_MIN_LEN - (len))) |
---|
268 | 235 | #define HASH_SPACE_LEFT(len) \ |
---|
.. | .. |
---|
287 | 254 | }; |
---|
288 | 255 | |
---|
289 | 256 | struct cipher_wr_param { |
---|
290 | | - struct ablkcipher_request *req; |
---|
| 257 | + struct skcipher_request *req; |
---|
291 | 258 | char *iv; |
---|
292 | 259 | int bytes; |
---|
293 | 260 | unsigned short qid; |
---|
.. | .. |
---|
333 | 300 | }; |
---|
334 | 301 | |
---|
335 | 302 | |
---|
336 | | -static const u32 sha1_init[SHA1_DIGEST_SIZE / 4] = { |
---|
| 303 | +static const u32 chcr_sha1_init[SHA1_DIGEST_SIZE / 4] = { |
---|
337 | 304 | SHA1_H0, SHA1_H1, SHA1_H2, SHA1_H3, SHA1_H4, |
---|
338 | 305 | }; |
---|
339 | 306 | |
---|
340 | | -static const u32 sha224_init[SHA256_DIGEST_SIZE / 4] = { |
---|
| 307 | +static const u32 chcr_sha224_init[SHA256_DIGEST_SIZE / 4] = { |
---|
341 | 308 | SHA224_H0, SHA224_H1, SHA224_H2, SHA224_H3, |
---|
342 | 309 | SHA224_H4, SHA224_H5, SHA224_H6, SHA224_H7, |
---|
343 | 310 | }; |
---|
344 | 311 | |
---|
345 | | -static const u32 sha256_init[SHA256_DIGEST_SIZE / 4] = { |
---|
| 312 | +static const u32 chcr_sha256_init[SHA256_DIGEST_SIZE / 4] = { |
---|
346 | 313 | SHA256_H0, SHA256_H1, SHA256_H2, SHA256_H3, |
---|
347 | 314 | SHA256_H4, SHA256_H5, SHA256_H6, SHA256_H7, |
---|
348 | 315 | }; |
---|
349 | 316 | |
---|
350 | | -static const u64 sha384_init[SHA512_DIGEST_SIZE / 8] = { |
---|
| 317 | +static const u64 chcr_sha384_init[SHA512_DIGEST_SIZE / 8] = { |
---|
351 | 318 | SHA384_H0, SHA384_H1, SHA384_H2, SHA384_H3, |
---|
352 | 319 | SHA384_H4, SHA384_H5, SHA384_H6, SHA384_H7, |
---|
353 | 320 | }; |
---|
354 | 321 | |
---|
355 | | -static const u64 sha512_init[SHA512_DIGEST_SIZE / 8] = { |
---|
| 322 | +static const u64 chcr_sha512_init[SHA512_DIGEST_SIZE / 8] = { |
---|
356 | 323 | SHA512_H0, SHA512_H1, SHA512_H2, SHA512_H3, |
---|
357 | 324 | SHA512_H4, SHA512_H5, SHA512_H6, SHA512_H7, |
---|
358 | 325 | }; |
---|
.. | .. |
---|
362 | 329 | u8 i; |
---|
363 | 330 | __be32 *dkey = (__be32 *)key; |
---|
364 | 331 | u64 *ldkey = (u64 *)key; |
---|
365 | | - __be64 *sha384 = (__be64 *)sha384_init; |
---|
366 | | - __be64 *sha512 = (__be64 *)sha512_init; |
---|
| 332 | + __be64 *sha384 = (__be64 *)chcr_sha384_init; |
---|
| 333 | + __be64 *sha512 = (__be64 *)chcr_sha512_init; |
---|
367 | 334 | |
---|
368 | 335 | switch (digestsize) { |
---|
369 | 336 | case SHA1_DIGEST_SIZE: |
---|
370 | 337 | for (i = 0; i < SHA1_INIT_STATE; i++) |
---|
371 | | - dkey[i] = cpu_to_be32(sha1_init[i]); |
---|
| 338 | + dkey[i] = cpu_to_be32(chcr_sha1_init[i]); |
---|
372 | 339 | break; |
---|
373 | 340 | case SHA224_DIGEST_SIZE: |
---|
374 | 341 | for (i = 0; i < SHA224_INIT_STATE; i++) |
---|
375 | | - dkey[i] = cpu_to_be32(sha224_init[i]); |
---|
| 342 | + dkey[i] = cpu_to_be32(chcr_sha224_init[i]); |
---|
376 | 343 | break; |
---|
377 | 344 | case SHA256_DIGEST_SIZE: |
---|
378 | 345 | for (i = 0; i < SHA256_INIT_STATE; i++) |
---|
379 | | - dkey[i] = cpu_to_be32(sha256_init[i]); |
---|
| 346 | + dkey[i] = cpu_to_be32(chcr_sha256_init[i]); |
---|
380 | 347 | break; |
---|
381 | 348 | case SHA384_DIGEST_SIZE: |
---|
382 | 349 | for (i = 0; i < SHA384_INIT_STATE; i++) |
---|
.. | .. |
---|
388 | 355 | break; |
---|
389 | 356 | } |
---|
390 | 357 | } |
---|
391 | | - |
---|
392 | | -static const u8 sgl_lengths[20] = { |
---|
393 | | - 0, 1, 2, 3, 4, 4, 5, 6, 7, 7, 8, 9, 10, 10, 11, 12, 13, 13, 14, 15 |
---|
394 | | -}; |
---|
395 | 358 | |
---|
396 | 359 | /* Number of len fields(8) * size of one addr field */ |
---|
397 | 360 | #define PHYSDSGL_MAX_LEN_SIZE 16 |
---|