1 /* SPDX-License-Identifier: GPL-2.0-only */ 2 /* 3 * AMD Cryptographic Coprocessor (CCP) driver 4 * 5 * Copyright (C) 2013,2017 Advanced Micro Devices, Inc. 6 * 7 * Author: Tom Lendacky <thomas.lendacky@amd.com> 8 * Author: Gary R Hook <gary.hook@amd.com> 9 */ 10 11 #ifndef __CCP_H__ 12 #define __CCP_H__ 13 14 #include <linux/scatterlist.h> 15 #include <linux/workqueue.h> 16 #include <linux/list.h> 17 #include <crypto/aes.h> 18 #include <crypto/sha.h> 19 20 struct ccp_device; 21 struct ccp_cmd; 22 23 #if defined(CONFIG_CRYPTO_DEV_SP_CCP) 24 25 /** 26 * ccp_present - check if a CCP device is present 27 * 28 * Returns zero if a CCP device is present, -ENODEV otherwise. 29 */ 30 int ccp_present(void); 31 32 #define CCP_VSIZE 16 33 #define CCP_VMASK ((unsigned int)((1 << CCP_VSIZE) - 1)) 34 #define CCP_VERSION(v, r) ((unsigned int)((v << CCP_VSIZE) \ 35 | (r & CCP_VMASK))) 36 37 /** 38 * ccp_version - get the version of the CCP 39 * 40 * Returns a positive version number, or zero if no CCP 41 */ 42 unsigned int ccp_version(void); 43 44 /** 45 * ccp_enqueue_cmd - queue an operation for processing by the CCP 46 * 47 * @cmd: ccp_cmd struct to be processed 48 * 49 * Refer to the ccp_cmd struct below for required fields. 50 * 51 * Queue a cmd to be processed by the CCP. If queueing the cmd 52 * would exceed the defined length of the cmd queue the cmd will 53 * only be queued if the CCP_CMD_MAY_BACKLOG flag is set and will 54 * result in a return code of -EBUSY. 55 * 56 * The callback routine specified in the ccp_cmd struct will be 57 * called to notify the caller of completion (if the cmd was not 58 * backlogged) or advancement out of the backlog. If the cmd has 59 * advanced out of the backlog the "err" value of the callback 60 * will be -EINPROGRESS. Any other "err" value during callback is 61 * the result of the operation. 62 * 63 * The cmd has been successfully queued if: 64 * the return code is -EINPROGRESS or 65 * the return code is -EBUSY and CCP_CMD_MAY_BACKLOG flag is set 66 */ 67 int ccp_enqueue_cmd(struct ccp_cmd *cmd); 68 69 #else /* CONFIG_CRYPTO_DEV_CCP_SP_DEV is not enabled */ 70 71 static inline int ccp_present(void) 72 { 73 return -ENODEV; 74 } 75 76 static inline unsigned int ccp_version(void) 77 { 78 return 0; 79 } 80 81 static inline int ccp_enqueue_cmd(struct ccp_cmd *cmd) 82 { 83 return -ENODEV; 84 } 85 86 #endif /* CONFIG_CRYPTO_DEV_SP_CCP */ 87 88 89 /***** AES engine *****/ 90 /** 91 * ccp_aes_type - AES key size 92 * 93 * @CCP_AES_TYPE_128: 128-bit key 94 * @CCP_AES_TYPE_192: 192-bit key 95 * @CCP_AES_TYPE_256: 256-bit key 96 */ 97 enum ccp_aes_type { 98 CCP_AES_TYPE_128 = 0, 99 CCP_AES_TYPE_192, 100 CCP_AES_TYPE_256, 101 CCP_AES_TYPE__LAST, 102 }; 103 104 /** 105 * ccp_aes_mode - AES operation mode 106 * 107 * @CCP_AES_MODE_ECB: ECB mode 108 * @CCP_AES_MODE_CBC: CBC mode 109 * @CCP_AES_MODE_OFB: OFB mode 110 * @CCP_AES_MODE_CFB: CFB mode 111 * @CCP_AES_MODE_CTR: CTR mode 112 * @CCP_AES_MODE_CMAC: CMAC mode 113 */ 114 enum ccp_aes_mode { 115 CCP_AES_MODE_ECB = 0, 116 CCP_AES_MODE_CBC, 117 CCP_AES_MODE_OFB, 118 CCP_AES_MODE_CFB, 119 CCP_AES_MODE_CTR, 120 CCP_AES_MODE_CMAC, 121 CCP_AES_MODE_GHASH, 122 CCP_AES_MODE_GCTR, 123 CCP_AES_MODE_GCM, 124 CCP_AES_MODE_GMAC, 125 CCP_AES_MODE__LAST, 126 }; 127 128 /** 129 * ccp_aes_mode - AES operation mode 130 * 131 * @CCP_AES_ACTION_DECRYPT: AES decrypt operation 132 * @CCP_AES_ACTION_ENCRYPT: AES encrypt operation 133 */ 134 enum ccp_aes_action { 135 CCP_AES_ACTION_DECRYPT = 0, 136 CCP_AES_ACTION_ENCRYPT, 137 CCP_AES_ACTION__LAST, 138 }; 139 /* Overloaded field */ 140 #define CCP_AES_GHASHAAD CCP_AES_ACTION_DECRYPT 141 #define CCP_AES_GHASHFINAL CCP_AES_ACTION_ENCRYPT 142 143 /** 144 * struct ccp_aes_engine - CCP AES operation 145 * @type: AES operation key size 146 * @mode: AES operation mode 147 * @action: AES operation (decrypt/encrypt) 148 * @key: key to be used for this AES operation 149 * @key_len: length in bytes of key 150 * @iv: IV to be used for this AES operation 151 * @iv_len: length in bytes of iv 152 * @src: data to be used for this operation 153 * @dst: data produced by this operation 154 * @src_len: length in bytes of data used for this operation 155 * @cmac_final: indicates final operation when running in CMAC mode 156 * @cmac_key: K1/K2 key used in final CMAC operation 157 * @cmac_key_len: length in bytes of cmac_key 158 * 159 * Variables required to be set when calling ccp_enqueue_cmd(): 160 * - type, mode, action, key, key_len, src, dst, src_len 161 * - iv, iv_len for any mode other than ECB 162 * - cmac_final for CMAC mode 163 * - cmac_key, cmac_key_len for CMAC mode if cmac_final is non-zero 164 * 165 * The iv variable is used as both input and output. On completion of the 166 * AES operation the new IV overwrites the old IV. 167 */ 168 struct ccp_aes_engine { 169 enum ccp_aes_type type; 170 enum ccp_aes_mode mode; 171 enum ccp_aes_action action; 172 173 u32 authsize; 174 175 struct scatterlist *key; 176 u32 key_len; /* In bytes */ 177 178 struct scatterlist *iv; 179 u32 iv_len; /* In bytes */ 180 181 struct scatterlist *src, *dst; 182 u64 src_len; /* In bytes */ 183 184 u32 cmac_final; /* Indicates final cmac cmd */ 185 struct scatterlist *cmac_key; /* K1/K2 cmac key required for 186 * final cmac cmd */ 187 u32 cmac_key_len; /* In bytes */ 188 189 u32 aad_len; /* In bytes */ 190 }; 191 192 /***** XTS-AES engine *****/ 193 /** 194 * ccp_xts_aes_unit_size - XTS unit size 195 * 196 * @CCP_XTS_AES_UNIT_SIZE_16: Unit size of 16 bytes 197 * @CCP_XTS_AES_UNIT_SIZE_512: Unit size of 512 bytes 198 * @CCP_XTS_AES_UNIT_SIZE_1024: Unit size of 1024 bytes 199 * @CCP_XTS_AES_UNIT_SIZE_2048: Unit size of 2048 bytes 200 * @CCP_XTS_AES_UNIT_SIZE_4096: Unit size of 4096 bytes 201 */ 202 enum ccp_xts_aes_unit_size { 203 CCP_XTS_AES_UNIT_SIZE_16 = 0, 204 CCP_XTS_AES_UNIT_SIZE_512, 205 CCP_XTS_AES_UNIT_SIZE_1024, 206 CCP_XTS_AES_UNIT_SIZE_2048, 207 CCP_XTS_AES_UNIT_SIZE_4096, 208 CCP_XTS_AES_UNIT_SIZE__LAST, 209 }; 210 211 /** 212 * struct ccp_xts_aes_engine - CCP XTS AES operation 213 * @action: AES operation (decrypt/encrypt) 214 * @unit_size: unit size of the XTS operation 215 * @key: key to be used for this XTS AES operation 216 * @key_len: length in bytes of key 217 * @iv: IV to be used for this XTS AES operation 218 * @iv_len: length in bytes of iv 219 * @src: data to be used for this operation 220 * @dst: data produced by this operation 221 * @src_len: length in bytes of data used for this operation 222 * @final: indicates final XTS operation 223 * 224 * Variables required to be set when calling ccp_enqueue_cmd(): 225 * - action, unit_size, key, key_len, iv, iv_len, src, dst, src_len, final 226 * 227 * The iv variable is used as both input and output. On completion of the 228 * AES operation the new IV overwrites the old IV. 229 */ 230 struct ccp_xts_aes_engine { 231 enum ccp_aes_type type; 232 enum ccp_aes_action action; 233 enum ccp_xts_aes_unit_size unit_size; 234 235 struct scatterlist *key; 236 u32 key_len; /* In bytes */ 237 238 struct scatterlist *iv; 239 u32 iv_len; /* In bytes */ 240 241 struct scatterlist *src, *dst; 242 u64 src_len; /* In bytes */ 243 244 u32 final; 245 }; 246 247 /***** SHA engine *****/ 248 /** 249 * ccp_sha_type - type of SHA operation 250 * 251 * @CCP_SHA_TYPE_1: SHA-1 operation 252 * @CCP_SHA_TYPE_224: SHA-224 operation 253 * @CCP_SHA_TYPE_256: SHA-256 operation 254 */ 255 enum ccp_sha_type { 256 CCP_SHA_TYPE_1 = 1, 257 CCP_SHA_TYPE_224, 258 CCP_SHA_TYPE_256, 259 CCP_SHA_TYPE_384, 260 CCP_SHA_TYPE_512, 261 CCP_SHA_TYPE__LAST, 262 }; 263 264 /** 265 * struct ccp_sha_engine - CCP SHA operation 266 * @type: Type of SHA operation 267 * @ctx: current hash value 268 * @ctx_len: length in bytes of hash value 269 * @src: data to be used for this operation 270 * @src_len: length in bytes of data used for this operation 271 * @opad: data to be used for final HMAC operation 272 * @opad_len: length in bytes of data used for final HMAC operation 273 * @first: indicates first SHA operation 274 * @final: indicates final SHA operation 275 * @msg_bits: total length of the message in bits used in final SHA operation 276 * 277 * Variables required to be set when calling ccp_enqueue_cmd(): 278 * - type, ctx, ctx_len, src, src_len, final 279 * - msg_bits if final is non-zero 280 * 281 * The ctx variable is used as both input and output. On completion of the 282 * SHA operation the new hash value overwrites the old hash value. 283 */ 284 struct ccp_sha_engine { 285 enum ccp_sha_type type; 286 287 struct scatterlist *ctx; 288 u32 ctx_len; /* In bytes */ 289 290 struct scatterlist *src; 291 u64 src_len; /* In bytes */ 292 293 struct scatterlist *opad; 294 u32 opad_len; /* In bytes */ 295 296 u32 first; /* Indicates first sha cmd */ 297 u32 final; /* Indicates final sha cmd */ 298 u64 msg_bits; /* Message length in bits required for 299 * final sha cmd */ 300 }; 301 302 /***** 3DES engine *****/ 303 enum ccp_des3_mode { 304 CCP_DES3_MODE_ECB = 0, 305 CCP_DES3_MODE_CBC, 306 CCP_DES3_MODE_CFB, 307 CCP_DES3_MODE__LAST, 308 }; 309 310 enum ccp_des3_type { 311 CCP_DES3_TYPE_168 = 1, 312 CCP_DES3_TYPE__LAST, 313 }; 314 315 enum ccp_des3_action { 316 CCP_DES3_ACTION_DECRYPT = 0, 317 CCP_DES3_ACTION_ENCRYPT, 318 CCP_DES3_ACTION__LAST, 319 }; 320 321 /** 322 * struct ccp_des3_engine - CCP SHA operation 323 * @type: Type of 3DES operation 324 * @mode: cipher mode 325 * @action: 3DES operation (decrypt/encrypt) 326 * @key: key to be used for this 3DES operation 327 * @key_len: length of key (in bytes) 328 * @iv: IV to be used for this AES operation 329 * @iv_len: length in bytes of iv 330 * @src: input data to be used for this operation 331 * @src_len: length of input data used for this operation (in bytes) 332 * @dst: output data produced by this operation 333 * 334 * Variables required to be set when calling ccp_enqueue_cmd(): 335 * - type, mode, action, key, key_len, src, dst, src_len 336 * - iv, iv_len for any mode other than ECB 337 * 338 * The iv variable is used as both input and output. On completion of the 339 * 3DES operation the new IV overwrites the old IV. 340 */ 341 struct ccp_des3_engine { 342 enum ccp_des3_type type; 343 enum ccp_des3_mode mode; 344 enum ccp_des3_action action; 345 346 struct scatterlist *key; 347 u32 key_len; /* In bytes */ 348 349 struct scatterlist *iv; 350 u32 iv_len; /* In bytes */ 351 352 struct scatterlist *src, *dst; 353 u64 src_len; /* In bytes */ 354 }; 355 356 /***** RSA engine *****/ 357 /** 358 * struct ccp_rsa_engine - CCP RSA operation 359 * @key_size: length in bits of RSA key 360 * @exp: RSA exponent 361 * @exp_len: length in bytes of exponent 362 * @mod: RSA modulus 363 * @mod_len: length in bytes of modulus 364 * @src: data to be used for this operation 365 * @dst: data produced by this operation 366 * @src_len: length in bytes of data used for this operation 367 * 368 * Variables required to be set when calling ccp_enqueue_cmd(): 369 * - key_size, exp, exp_len, mod, mod_len, src, dst, src_len 370 */ 371 struct ccp_rsa_engine { 372 u32 key_size; /* In bits */ 373 374 struct scatterlist *exp; 375 u32 exp_len; /* In bytes */ 376 377 struct scatterlist *mod; 378 u32 mod_len; /* In bytes */ 379 380 struct scatterlist *src, *dst; 381 u32 src_len; /* In bytes */ 382 }; 383 384 /***** Passthru engine *****/ 385 /** 386 * ccp_passthru_bitwise - type of bitwise passthru operation 387 * 388 * @CCP_PASSTHRU_BITWISE_NOOP: no bitwise operation performed 389 * @CCP_PASSTHRU_BITWISE_AND: perform bitwise AND of src with mask 390 * @CCP_PASSTHRU_BITWISE_OR: perform bitwise OR of src with mask 391 * @CCP_PASSTHRU_BITWISE_XOR: perform bitwise XOR of src with mask 392 * @CCP_PASSTHRU_BITWISE_MASK: overwrite with mask 393 */ 394 enum ccp_passthru_bitwise { 395 CCP_PASSTHRU_BITWISE_NOOP = 0, 396 CCP_PASSTHRU_BITWISE_AND, 397 CCP_PASSTHRU_BITWISE_OR, 398 CCP_PASSTHRU_BITWISE_XOR, 399 CCP_PASSTHRU_BITWISE_MASK, 400 CCP_PASSTHRU_BITWISE__LAST, 401 }; 402 403 /** 404 * ccp_passthru_byteswap - type of byteswap passthru operation 405 * 406 * @CCP_PASSTHRU_BYTESWAP_NOOP: no byte swapping performed 407 * @CCP_PASSTHRU_BYTESWAP_32BIT: swap bytes within 32-bit words 408 * @CCP_PASSTHRU_BYTESWAP_256BIT: swap bytes within 256-bit words 409 */ 410 enum ccp_passthru_byteswap { 411 CCP_PASSTHRU_BYTESWAP_NOOP = 0, 412 CCP_PASSTHRU_BYTESWAP_32BIT, 413 CCP_PASSTHRU_BYTESWAP_256BIT, 414 CCP_PASSTHRU_BYTESWAP__LAST, 415 }; 416 417 /** 418 * struct ccp_passthru_engine - CCP pass-through operation 419 * @bit_mod: bitwise operation to perform 420 * @byte_swap: byteswap operation to perform 421 * @mask: mask to be applied to data 422 * @mask_len: length in bytes of mask 423 * @src: data to be used for this operation 424 * @dst: data produced by this operation 425 * @src_len: length in bytes of data used for this operation 426 * @final: indicate final pass-through operation 427 * 428 * Variables required to be set when calling ccp_enqueue_cmd(): 429 * - bit_mod, byte_swap, src, dst, src_len 430 * - mask, mask_len if bit_mod is not CCP_PASSTHRU_BITWISE_NOOP 431 */ 432 struct ccp_passthru_engine { 433 enum ccp_passthru_bitwise bit_mod; 434 enum ccp_passthru_byteswap byte_swap; 435 436 struct scatterlist *mask; 437 u32 mask_len; /* In bytes */ 438 439 struct scatterlist *src, *dst; 440 u64 src_len; /* In bytes */ 441 442 u32 final; 443 }; 444 445 /** 446 * struct ccp_passthru_nomap_engine - CCP pass-through operation 447 * without performing DMA mapping 448 * @bit_mod: bitwise operation to perform 449 * @byte_swap: byteswap operation to perform 450 * @mask: mask to be applied to data 451 * @mask_len: length in bytes of mask 452 * @src: data to be used for this operation 453 * @dst: data produced by this operation 454 * @src_len: length in bytes of data used for this operation 455 * @final: indicate final pass-through operation 456 * 457 * Variables required to be set when calling ccp_enqueue_cmd(): 458 * - bit_mod, byte_swap, src, dst, src_len 459 * - mask, mask_len if bit_mod is not CCP_PASSTHRU_BITWISE_NOOP 460 */ 461 struct ccp_passthru_nomap_engine { 462 enum ccp_passthru_bitwise bit_mod; 463 enum ccp_passthru_byteswap byte_swap; 464 465 dma_addr_t mask; 466 u32 mask_len; /* In bytes */ 467 468 dma_addr_t src_dma, dst_dma; 469 u64 src_len; /* In bytes */ 470 471 u32 final; 472 }; 473 474 /***** ECC engine *****/ 475 #define CCP_ECC_MODULUS_BYTES 48 /* 384-bits */ 476 #define CCP_ECC_MAX_OPERANDS 6 477 #define CCP_ECC_MAX_OUTPUTS 3 478 479 /** 480 * ccp_ecc_function - type of ECC function 481 * 482 * @CCP_ECC_FUNCTION_MMUL_384BIT: 384-bit modular multiplication 483 * @CCP_ECC_FUNCTION_MADD_384BIT: 384-bit modular addition 484 * @CCP_ECC_FUNCTION_MINV_384BIT: 384-bit multiplicative inverse 485 * @CCP_ECC_FUNCTION_PADD_384BIT: 384-bit point addition 486 * @CCP_ECC_FUNCTION_PMUL_384BIT: 384-bit point multiplication 487 * @CCP_ECC_FUNCTION_PDBL_384BIT: 384-bit point doubling 488 */ 489 enum ccp_ecc_function { 490 CCP_ECC_FUNCTION_MMUL_384BIT = 0, 491 CCP_ECC_FUNCTION_MADD_384BIT, 492 CCP_ECC_FUNCTION_MINV_384BIT, 493 CCP_ECC_FUNCTION_PADD_384BIT, 494 CCP_ECC_FUNCTION_PMUL_384BIT, 495 CCP_ECC_FUNCTION_PDBL_384BIT, 496 }; 497 498 /** 499 * struct ccp_ecc_modular_math - CCP ECC modular math parameters 500 * @operand_1: first operand for the modular math operation 501 * @operand_1_len: length of the first operand 502 * @operand_2: second operand for the modular math operation 503 * (not used for CCP_ECC_FUNCTION_MINV_384BIT) 504 * @operand_2_len: length of the second operand 505 * (not used for CCP_ECC_FUNCTION_MINV_384BIT) 506 * @result: result of the modular math operation 507 * @result_len: length of the supplied result buffer 508 */ 509 struct ccp_ecc_modular_math { 510 struct scatterlist *operand_1; 511 unsigned int operand_1_len; /* In bytes */ 512 513 struct scatterlist *operand_2; 514 unsigned int operand_2_len; /* In bytes */ 515 516 struct scatterlist *result; 517 unsigned int result_len; /* In bytes */ 518 }; 519 520 /** 521 * struct ccp_ecc_point - CCP ECC point definition 522 * @x: the x coordinate of the ECC point 523 * @x_len: the length of the x coordinate 524 * @y: the y coordinate of the ECC point 525 * @y_len: the length of the y coordinate 526 */ 527 struct ccp_ecc_point { 528 struct scatterlist *x; 529 unsigned int x_len; /* In bytes */ 530 531 struct scatterlist *y; 532 unsigned int y_len; /* In bytes */ 533 }; 534 535 /** 536 * struct ccp_ecc_point_math - CCP ECC point math parameters 537 * @point_1: the first point of the ECC point math operation 538 * @point_2: the second point of the ECC point math operation 539 * (only used for CCP_ECC_FUNCTION_PADD_384BIT) 540 * @domain_a: the a parameter of the ECC curve 541 * @domain_a_len: the length of the a parameter 542 * @scalar: the scalar parameter for the point match operation 543 * (only used for CCP_ECC_FUNCTION_PMUL_384BIT) 544 * @scalar_len: the length of the scalar parameter 545 * (only used for CCP_ECC_FUNCTION_PMUL_384BIT) 546 * @result: the point resulting from the point math operation 547 */ 548 struct ccp_ecc_point_math { 549 struct ccp_ecc_point point_1; 550 struct ccp_ecc_point point_2; 551 552 struct scatterlist *domain_a; 553 unsigned int domain_a_len; /* In bytes */ 554 555 struct scatterlist *scalar; 556 unsigned int scalar_len; /* In bytes */ 557 558 struct ccp_ecc_point result; 559 }; 560 561 /** 562 * struct ccp_ecc_engine - CCP ECC operation 563 * @function: ECC function to perform 564 * @mod: ECC modulus 565 * @mod_len: length in bytes of modulus 566 * @mm: module math parameters 567 * @pm: point math parameters 568 * @ecc_result: result of the ECC operation 569 * 570 * Variables required to be set when calling ccp_enqueue_cmd(): 571 * - function, mod, mod_len 572 * - operand, operand_len, operand_count, output, output_len, output_count 573 * - ecc_result 574 */ 575 struct ccp_ecc_engine { 576 enum ccp_ecc_function function; 577 578 struct scatterlist *mod; 579 u32 mod_len; /* In bytes */ 580 581 union { 582 struct ccp_ecc_modular_math mm; 583 struct ccp_ecc_point_math pm; 584 } u; 585 586 u16 ecc_result; 587 }; 588 589 590 /** 591 * ccp_engine - CCP operation identifiers 592 * 593 * @CCP_ENGINE_AES: AES operation 594 * @CCP_ENGINE_XTS_AES: 128-bit XTS AES operation 595 * @CCP_ENGINE_RSVD1: unused 596 * @CCP_ENGINE_SHA: SHA operation 597 * @CCP_ENGINE_RSA: RSA operation 598 * @CCP_ENGINE_PASSTHRU: pass-through operation 599 * @CCP_ENGINE_ZLIB_DECOMPRESS: unused 600 * @CCP_ENGINE_ECC: ECC operation 601 */ 602 enum ccp_engine { 603 CCP_ENGINE_AES = 0, 604 CCP_ENGINE_XTS_AES_128, 605 CCP_ENGINE_DES3, 606 CCP_ENGINE_SHA, 607 CCP_ENGINE_RSA, 608 CCP_ENGINE_PASSTHRU, 609 CCP_ENGINE_ZLIB_DECOMPRESS, 610 CCP_ENGINE_ECC, 611 CCP_ENGINE__LAST, 612 }; 613 614 /* Flag values for flags member of ccp_cmd */ 615 #define CCP_CMD_MAY_BACKLOG 0x00000001 616 #define CCP_CMD_PASSTHRU_NO_DMA_MAP 0x00000002 617 618 /** 619 * struct ccp_cmd - CCP operation request 620 * @entry: list element (ccp driver use only) 621 * @work: work element used for callbacks (ccp driver use only) 622 * @ccp: CCP device to be run on 623 * @ret: operation return code (ccp driver use only) 624 * @flags: cmd processing flags 625 * @engine: CCP operation to perform 626 * @engine_error: CCP engine return code 627 * @u: engine specific structures, refer to specific engine struct below 628 * @callback: operation completion callback function 629 * @data: parameter value to be supplied to the callback function 630 * 631 * Variables required to be set when calling ccp_enqueue_cmd(): 632 * - engine, callback 633 * - See the operation structures below for what is required for each 634 * operation. 635 */ 636 struct ccp_cmd { 637 /* The list_head, work_struct, ccp and ret variables are for use 638 * by the CCP driver only. 639 */ 640 struct list_head entry; 641 struct work_struct work; 642 struct ccp_device *ccp; 643 int ret; 644 645 u32 flags; 646 647 enum ccp_engine engine; 648 u32 engine_error; 649 650 union { 651 struct ccp_aes_engine aes; 652 struct ccp_xts_aes_engine xts; 653 struct ccp_des3_engine des3; 654 struct ccp_sha_engine sha; 655 struct ccp_rsa_engine rsa; 656 struct ccp_passthru_engine passthru; 657 struct ccp_passthru_nomap_engine passthru_nomap; 658 struct ccp_ecc_engine ecc; 659 } u; 660 661 /* Completion callback support */ 662 void (*callback)(void *data, int err); 663 void *data; 664 }; 665 666 #endif 667