Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   1) /* SPDX-License-Identifier: GPL-2.0-only */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   3)  * Copyright 2016 Broadcom
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   4)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   5) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   6) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   7)  * This file contains SPU message definitions specific to SPU2.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   8)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   9) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  10) #ifndef _SPU2_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  11) #define _SPU2_H
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  12) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  13) enum spu2_cipher_type {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  14) 	SPU2_CIPHER_TYPE_NONE = 0x0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  15) 	SPU2_CIPHER_TYPE_AES128 = 0x1,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  16) 	SPU2_CIPHER_TYPE_AES192 = 0x2,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  17) 	SPU2_CIPHER_TYPE_AES256 = 0x3,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  18) 	SPU2_CIPHER_TYPE_DES = 0x4,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  19) 	SPU2_CIPHER_TYPE_3DES = 0x5,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  20) 	SPU2_CIPHER_TYPE_LAST
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  21) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  22) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  23) enum spu2_cipher_mode {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  24) 	SPU2_CIPHER_MODE_ECB = 0x0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  25) 	SPU2_CIPHER_MODE_CBC = 0x1,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  26) 	SPU2_CIPHER_MODE_CTR = 0x2,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  27) 	SPU2_CIPHER_MODE_CFB = 0x3,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  28) 	SPU2_CIPHER_MODE_OFB = 0x4,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  29) 	SPU2_CIPHER_MODE_XTS = 0x5,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  30) 	SPU2_CIPHER_MODE_CCM = 0x6,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  31) 	SPU2_CIPHER_MODE_GCM = 0x7,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  32) 	SPU2_CIPHER_MODE_LAST
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  33) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  34) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  35) enum spu2_hash_type {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  36) 	SPU2_HASH_TYPE_NONE = 0x0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  37) 	SPU2_HASH_TYPE_AES128 = 0x1,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  38) 	SPU2_HASH_TYPE_AES192 = 0x2,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  39) 	SPU2_HASH_TYPE_AES256 = 0x3,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  40) 	SPU2_HASH_TYPE_MD5 = 0x6,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  41) 	SPU2_HASH_TYPE_SHA1 = 0x7,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  42) 	SPU2_HASH_TYPE_SHA224 = 0x8,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  43) 	SPU2_HASH_TYPE_SHA256 = 0x9,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  44) 	SPU2_HASH_TYPE_SHA384 = 0xa,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  45) 	SPU2_HASH_TYPE_SHA512 = 0xb,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  46) 	SPU2_HASH_TYPE_SHA512_224 = 0xc,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  47) 	SPU2_HASH_TYPE_SHA512_256 = 0xd,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  48) 	SPU2_HASH_TYPE_SHA3_224 = 0xe,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  49) 	SPU2_HASH_TYPE_SHA3_256 = 0xf,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  50) 	SPU2_HASH_TYPE_SHA3_384 = 0x10,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  51) 	SPU2_HASH_TYPE_SHA3_512 = 0x11,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  52) 	SPU2_HASH_TYPE_LAST
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  53) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  54) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  55) enum spu2_hash_mode {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  56) 	SPU2_HASH_MODE_CMAC = 0x0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  57) 	SPU2_HASH_MODE_CBC_MAC = 0x1,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  58) 	SPU2_HASH_MODE_XCBC_MAC = 0x2,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  59) 	SPU2_HASH_MODE_HMAC = 0x3,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  60) 	SPU2_HASH_MODE_RABIN = 0x4,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  61) 	SPU2_HASH_MODE_CCM = 0x5,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  62) 	SPU2_HASH_MODE_GCM = 0x6,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  63) 	SPU2_HASH_MODE_RESERVED = 0x7,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  64) 	SPU2_HASH_MODE_LAST
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  65) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  66) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  67) enum spu2_ret_md_opts {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  68) 	SPU2_RET_NO_MD = 0,	/* return no metadata */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  69) 	SPU2_RET_FMD_OMD = 1,	/* return both FMD and OMD */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  70) 	SPU2_RET_FMD_ONLY = 2,	/* return only FMD */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  71) 	SPU2_RET_FMD_OMD_IV = 3,	/* return FMD and OMD with just IVs */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  72) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  73) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  74) /* Fixed Metadata format */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  75) struct SPU2_FMD {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  76) 	u64 ctrl0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  77) 	u64 ctrl1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  78) 	u64 ctrl2;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  79) 	u64 ctrl3;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  80) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  81) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  82) #define FMD_SIZE  sizeof(struct SPU2_FMD)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  83) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  84) /* Fixed part of request message header length in bytes. Just FMD. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  85) #define SPU2_REQ_FIXED_LEN FMD_SIZE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  86) #define SPU2_HEADER_ALLOC_LEN (SPU_REQ_FIXED_LEN + \
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  87) 				2 * MAX_KEY_SIZE + 2 * MAX_IV_SIZE)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  88) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  89) /* FMD ctrl0 field masks */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  90) #define SPU2_CIPH_ENCRYPT_EN            0x1 /* 0: decrypt, 1: encrypt */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  91) #define SPU2_CIPH_TYPE                 0xF0 /* one of spu2_cipher_type */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  92) #define SPU2_CIPH_TYPE_SHIFT              4
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  93) #define SPU2_CIPH_MODE                0xF00 /* one of spu2_cipher_mode */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  94) #define SPU2_CIPH_MODE_SHIFT              8
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  95) #define SPU2_CFB_MASK                0x7000 /* cipher feedback mask */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  96) #define SPU2_CFB_MASK_SHIFT              12
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  97) #define SPU2_PROTO_SEL             0xF00000 /* MACsec, IPsec, TLS... */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  98) #define SPU2_PROTO_SEL_SHIFT             20
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  99) #define SPU2_HASH_FIRST           0x1000000 /* 1: hash input is input pkt
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) 					     * data
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) 					     */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) #define SPU2_CHK_TAG              0x2000000 /* 1: check digest provided */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) #define SPU2_HASH_TYPE          0x1F0000000 /* one of spu2_hash_type */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) #define SPU2_HASH_TYPE_SHIFT             28
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) #define SPU2_HASH_MODE         0xF000000000 /* one of spu2_hash_mode */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) #define SPU2_HASH_MODE_SHIFT             36
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) #define SPU2_CIPH_PAD_EN     0x100000000000 /* 1: Add pad to end of payload for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) 					     *    enc
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) 					     */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) #define SPU2_CIPH_PAD      0xFF000000000000 /* cipher pad value */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) #define SPU2_CIPH_PAD_SHIFT              48
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) /* FMD ctrl1 field masks */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) #define SPU2_TAG_LOC                    0x1 /* 1: end of payload, 0: undef */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) #define SPU2_HAS_FR_DATA                0x2 /* 1: msg has frame data */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) #define SPU2_HAS_AAD1                   0x4 /* 1: msg has AAD1 field */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) #define SPU2_HAS_NAAD                   0x8 /* 1: msg has NAAD field */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) #define SPU2_HAS_AAD2                  0x10 /* 1: msg has AAD2 field */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) #define SPU2_HAS_ESN                   0x20 /* 1: msg has ESN field */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) #define SPU2_HASH_KEY_LEN            0xFF00 /* len of hash key in bytes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) 					     * HMAC only.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) 					     */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) #define SPU2_HASH_KEY_LEN_SHIFT           8
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) #define SPU2_CIPH_KEY_LEN         0xFF00000 /* len of cipher key in bytes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) #define SPU2_CIPH_KEY_LEN_SHIFT          20
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) #define SPU2_GENIV               0x10000000 /* 1: hw generates IV */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) #define SPU2_HASH_IV             0x20000000 /* 1: IV incl in hash */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) #define SPU2_RET_IV              0x40000000 /* 1: return IV in output msg
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) 					     *    b4 payload
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) 					     */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) #define SPU2_RET_IV_LEN         0xF00000000 /* length in bytes of IV returned.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) 					     * 0 = 16 bytes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) 					     */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) #define SPU2_RET_IV_LEN_SHIFT            32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) #define SPU2_IV_OFFSET         0xF000000000 /* gen IV offset */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) #define SPU2_IV_OFFSET_SHIFT             36
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) #define SPU2_IV_LEN          0x1F0000000000 /* length of input IV in bytes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) #define SPU2_IV_LEN_SHIFT                40
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139) #define SPU2_HASH_TAG_LEN  0x7F000000000000 /* hash tag length in bytes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) #define SPU2_HASH_TAG_LEN_SHIFT          48
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) #define SPU2_RETURN_MD    0x300000000000000 /* return metadata */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) #define SPU2_RETURN_MD_SHIFT             56
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) #define SPU2_RETURN_FD    0x400000000000000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) #define SPU2_RETURN_AAD1  0x800000000000000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) #define SPU2_RETURN_NAAD 0x1000000000000000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) #define SPU2_RETURN_AAD2 0x2000000000000000
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) #define SPU2_RETURN_PAY  0x4000000000000000 /* return payload */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) /* FMD ctrl2 field masks */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) #define SPU2_AAD1_OFFSET              0xFFF /* byte offset of AAD1 field */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) #define SPU2_AAD1_LEN               0xFF000 /* length of AAD1 in bytes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) #define SPU2_AAD1_LEN_SHIFT              12
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) #define SPU2_AAD2_OFFSET         0xFFF00000 /* byte offset of AAD2 field */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) #define SPU2_AAD2_OFFSET_SHIFT           20
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) #define SPU2_PL_OFFSET   0xFFFFFFFF00000000 /* payload offset from AAD2 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156) #define SPU2_PL_OFFSET_SHIFT             32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) /* FMD ctrl3 field masks */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) #define SPU2_PL_LEN              0xFFFFFFFF /* payload length in bytes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) #define SPU2_TLS_LEN         0xFFFF00000000 /* TLS encrypt: cipher len
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) 					     * TLS decrypt: compressed len
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) 					     */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) #define SPU2_TLS_LEN_SHIFT               32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166)  * Max value that can be represented in the Payload Length field of the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167)  * ctrl3 word of FMD.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) #define SPU2_MAX_PAYLOAD  SPU2_PL_LEN
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) /* Error values returned in STATUS field of response messages */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) #define SPU2_INVALID_ICV  1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) void spu2_dump_msg_hdr(u8 *buf, unsigned int buf_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) u32 spu2_ctx_max_payload(enum spu_cipher_alg cipher_alg,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) 			 enum spu_cipher_mode cipher_mode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) 			 unsigned int blocksize);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) u32 spu2_payload_length(u8 *spu_hdr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) u16 spu2_response_hdr_len(u16 auth_key_len, u16 enc_key_len, bool is_hash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) u16 spu2_hash_pad_len(enum hash_alg hash_alg, enum hash_mode hash_mode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) 		      u32 chunksize, u16 hash_block_size);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182) u32 spu2_gcm_ccm_pad_len(enum spu_cipher_mode cipher_mode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) 			 unsigned int data_size);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) u32 spu2_assoc_resp_len(enum spu_cipher_mode cipher_mode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) 			unsigned int assoc_len, unsigned int iv_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) 			bool is_encrypt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) u8 spu2_aead_ivlen(enum spu_cipher_mode cipher_mode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) 		   u16 iv_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) enum hash_type spu2_hash_type(u32 src_sent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) u32 spu2_digest_size(u32 alg_digest_size, enum hash_alg alg,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) 		     enum hash_type htype);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) u32 spu2_create_request(u8 *spu_hdr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) 			struct spu_request_opts *req_opts,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) 			struct spu_cipher_parms *cipher_parms,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) 			struct spu_hash_parms *hash_parms,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) 			struct spu_aead_parms *aead_parms,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) 			unsigned int data_size);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) u16 spu2_cipher_req_init(u8 *spu_hdr, struct spu_cipher_parms *cipher_parms);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) void spu2_cipher_req_finish(u8 *spu_hdr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200) 			    u16 spu_req_hdr_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) 			    unsigned int is_inbound,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) 			    struct spu_cipher_parms *cipher_parms,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) 			    unsigned int data_size);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) void spu2_request_pad(u8 *pad_start, u32 gcm_padding, u32 hash_pad_len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) 		      enum hash_alg auth_alg, enum hash_mode auth_mode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) 		      unsigned int total_sent, u32 status_padding);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) u8 spu2_xts_tweak_in_payload(void);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208) u8 spu2_tx_status_len(void);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) u8 spu2_rx_status_len(void);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) int spu2_status_process(u8 *statp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) void spu2_ccm_update_iv(unsigned int digestsize,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) 			struct spu_cipher_parms *cipher_parms,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 213) 			unsigned int assoclen, unsigned int chunksize,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 214) 			bool is_encrypt, bool is_esp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 215) u32 spu2_wordalign_padlen(u32 data_size);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 216) #endif