summaryrefslogtreecommitdiff
path: root/sys/dev/pci/aeon.c
diff options
context:
space:
mode:
Diffstat (limited to 'sys/dev/pci/aeon.c')
-rw-r--r--sys/dev/pci/aeon.c1096
1 files changed, 0 insertions, 1096 deletions
diff --git a/sys/dev/pci/aeon.c b/sys/dev/pci/aeon.c
deleted file mode 100644
index 015353a94cc..00000000000
--- a/sys/dev/pci/aeon.c
+++ /dev/null
@@ -1,1096 +0,0 @@
-/* $OpenBSD: aeon.c,v 1.9 2000/03/15 14:55:51 jason Exp $ */
-
-/*
- * Invertex AEON driver
- * Copyright (c) 1999 Invertex Inc. All rights reserved.
- * Copyright (c) 1999 Theo de Raadt
- *
- * This driver is based on a previous driver by Invertex, for which they
- * requested: Please send any comments, feedback, bug-fixes, or feature
- * requests to software@invertex.com.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- * 3. The name of the author may not be used to endorse or promote products
- * derived from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
- * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
- * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
- * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
- * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
- * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
- * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include <sys/param.h>
-#include <sys/systm.h>
-#include <sys/proc.h>
-#include <sys/errno.h>
-#include <sys/malloc.h>
-#include <sys/kernel.h>
-#include <sys/mbuf.h>
-#include <vm/vm.h>
-#include <vm/vm_extern.h>
-#include <vm/pmap.h>
-#include <machine/pmap.h>
-#include <sys/device.h>
-
-#include <dev/pci/pcireg.h>
-#include <dev/pci/pcivar.h>
-#include <dev/pci/pcidevs.h>
-
-#include <dev/pci/aeonvar.h>
-#include <dev/pci/aeonreg.h>
-
-#undef AEON_DEBUG
-
-/*
- * Prototypes and count for the pci_device structure
- */
-int aeon_probe __P((struct device *, void *, void *));
-void aeon_attach __P((struct device *, struct device *, void *));
-
-struct cfattach aeon_ca = {
- sizeof(struct aeon_softc), aeon_probe, aeon_attach,
-};
-
-struct cfdriver aeon_cd = {
- 0, "aeon", DV_DULL
-};
-
-void aeon_reset_board __P((struct aeon_softc *));
-int aeon_enable_crypto __P((struct aeon_softc *, pcireg_t));
-void aeon_init_dma __P((struct aeon_softc *));
-void aeon_init_pci_registers __P((struct aeon_softc *));
-int aeon_checkram __P((struct aeon_softc *));
-int aeon_intr __P((void *));
-u_int aeon_write_command __P((const struct aeon_command_buf_data *,
- u_int8_t *));
-int aeon_build_command __P((const struct aeon_command * cmd,
- struct aeon_command_buf_data *));
-int aeon_mbuf __P((struct mbuf *, int *np, long *pp, int *lp, int maxp,
- int *nicealign));
-u_int32_t aeon_next_signature __P((u_int a, u_int cnt));
-
-/*
- * Used for round robin crypto requests
- */
-int aeon_num_devices = 0;
-struct aeon_softc *aeon_devices[AEON_MAX_DEVICES];
-
-int
-aeon_probe(parent, match, aux)
- struct device *parent;
- void *match;
- void *aux;
-{
- struct pci_attach_args *pa = (struct pci_attach_args *) aux;
-
- if (PCI_VENDOR(pa->pa_id) == PCI_VENDOR_INVERTEX &&
- PCI_PRODUCT(pa->pa_id) == PCI_PRODUCT_INVERTEX_AEON)
- return (1);
- if (PCI_VENDOR(pa->pa_id) == PCI_VENDOR_HIFN &&
- PCI_PRODUCT(pa->pa_id) == PCI_PRODUCT_HIFN_7751)
- return (1);
- return (0);
-}
-
-void
-aeon_attach(parent, self, aux)
- struct device *parent, *self;
- void *aux;
-{
- struct aeon_softc *sc = (struct aeon_softc *)self;
- struct pci_attach_args *pa = aux;
- pci_chipset_tag_t pc = pa->pa_pc;
- pci_intr_handle_t ih;
- const char *intrstr = NULL;
- bus_addr_t iobase;
- bus_size_t iosize;
- u_int32_t cmd;
- bus_dma_segment_t seg;
- bus_dmamap_t dmamap;
- int rseg;
- caddr_t kva;
-
- cmd = pci_conf_read(pc, pa->pa_tag, PCI_COMMAND_STATUS_REG);
- cmd |= PCI_COMMAND_IO_ENABLE | PCI_COMMAND_MEM_ENABLE |
- PCI_COMMAND_MASTER_ENABLE;
- pci_conf_write(pc, pa->pa_tag, PCI_COMMAND_STATUS_REG, cmd);
- cmd = pci_conf_read(pc, pa->pa_tag, PCI_COMMAND_STATUS_REG);
-
- if (!(cmd & PCI_COMMAND_MEM_ENABLE)) {
- printf(": failed to enable memory mapping\n");
- return;
- }
-
- if (pci_mem_find(pc, pa->pa_tag, AEON_BAR0, &iobase, &iosize, NULL)) {
- printf(": can't find mem space\n");
- return;
- }
- if (bus_space_map(pa->pa_memt, iobase, iosize, 0, &sc->sc_sh0)) {
- printf(": can't map mem space\n");
- return;
- }
- sc->sc_st0 = pa->pa_memt;
-
- if (pci_mem_find(pc, pa->pa_tag, AEON_BAR1, &iobase, &iosize, NULL)) {
- printf(": can't find mem space\n");
- return;
- }
- if (bus_space_map(pa->pa_memt, iobase, iosize, 0, &sc->sc_sh1)) {
- printf(": can't map mem space\n");
- return;
- }
- sc->sc_st1 = pa->pa_memt;
-#ifdef AEON_DEBUG
- printf(" mem %x %x", sc->sc_sh0, sc->sc_sh1);
-#endif
-
- sc->sc_dmat = pa->pa_dmat;
- if (bus_dmamem_alloc(sc->sc_dmat, sizeof(*sc->sc_dma), PAGE_SIZE, 0,
- &seg, 1, &rseg, BUS_DMA_NOWAIT)) {
- printf(": can't alloc dma buffer\n", sc->sc_dv.dv_xname);
- return;
- }
- if (bus_dmamem_map(sc->sc_dmat, &seg, rseg, sizeof(*sc->sc_dma), &kva,
- BUS_DMA_NOWAIT)) {
- printf(": can't map dma buffers (%d bytes)\n",
- sc->sc_dv.dv_xname, sizeof(*sc->sc_dma));
- bus_dmamem_free(sc->sc_dmat, &seg, rseg);
- return;
- }
- if (bus_dmamap_create(sc->sc_dmat, sizeof(*sc->sc_dma), 1,
- sizeof(*sc->sc_dma), 0, BUS_DMA_NOWAIT, &dmamap)) {
- printf(": can't create dma map\n", sc->sc_dv.dv_xname);
- bus_dmamem_unmap(sc->sc_dmat, kva, sizeof(*sc->sc_dma));
- bus_dmamem_free(sc->sc_dmat, &seg, rseg);
- return;
- }
- if (bus_dmamap_load(sc->sc_dmat, dmamap, kva, sizeof(*sc->sc_dma),
- NULL, BUS_DMA_NOWAIT)) {
- printf(": can't load dma map\n", sc->sc_dv.dv_xname);
- bus_dmamap_destroy(sc->sc_dmat, dmamap);
- bus_dmamem_unmap(sc->sc_dmat, kva, sizeof(*sc->sc_dma));
- bus_dmamem_free(sc->sc_dmat, &seg, rseg);
- return;
- }
- sc->sc_dma = (struct aeon_dma *)kva;
- bzero(sc->sc_dma, sizeof(*sc->sc_dma));
-
- aeon_reset_board(sc);
-
- if (aeon_enable_crypto(sc, pa->pa_id) != 0) {
- printf("%s: crypto enabling failed\n", sc->sc_dv.dv_xname);
- return;
- }
-
- aeon_init_dma(sc);
- aeon_init_pci_registers(sc);
-
- if (aeon_checkram(sc) != 0)
- sc->sc_drammodel = 1;
-
- /*
- * Reinitialize again, since the DRAM/SRAM detection shifted our ring
- * pointers and may have changed the value we send to the RAM Config
- * Register.
- */
- aeon_reset_board(sc);
- aeon_init_dma(sc);
- aeon_init_pci_registers(sc);
-
- if (pci_intr_map(pc, pa->pa_intrtag, pa->pa_intrpin,
- pa->pa_intrline, &ih)) {
- printf(": couldn't map interrupt\n");
- return;
- }
- intrstr = pci_intr_string(pc, ih);
- sc->sc_ih = pci_intr_establish(pc, ih, IPL_NET, aeon_intr, sc,
- self->dv_xname);
- if (sc->sc_ih == NULL) {
- printf(": couldn't establish interrupt\n");
- if (intrstr != NULL)
- printf(" at %s", intrstr);
- printf("\n");
- return;
- }
-
- aeon_devices[aeon_num_devices] = sc;
- aeon_num_devices++;
-
- printf(", %s\n", intrstr);
-}
-
-/*
- * Resets the board. Values in the regesters are left as is
- * from the reset (i.e. initial values are assigned elsewhere).
- */
-void
-aeon_reset_board(sc)
- struct aeon_softc *sc;
-{
- /*
- * Set polling in the DMA configuration register to zero. 0x7 avoids
- * resetting the board and zeros out the other fields.
- */
- WRITE_REG_1(sc, AEON_1_DMA_CNFG, AEON_DMACNFG_MSTRESET |
- AEON_DMACNFG_DMARESET | AEON_DMACNFG_MODE);
-
- /*
- * Now that polling has been disabled, we have to wait 1 ms
- * before resetting the board.
- */
- DELAY(1000);
-
- /* Reset the board. We do this by writing zeros to the DMA reset
- * field, the BRD reset field, and the manditory 1 at position 2.
- * Every other field is set to zero.
- */
- WRITE_REG_1(sc, AEON_1_DMA_CNFG, AEON_DMACNFG_MODE);
-
- /*
- * Wait another millisecond for the board to reset.
- */
- DELAY(1000);
-
- /*
- * Turn off the reset! (No joke.)
- */
- WRITE_REG_1(sc, AEON_1_DMA_CNFG, AEON_DMACNFG_MSTRESET |
- AEON_DMACNFG_DMARESET | AEON_DMACNFG_MODE);
-}
-
-u_int32_t
-aeon_next_signature(a, cnt)
- u_int a, cnt;
-{
- int i, v;
-
- for (i = 0; i < cnt; i++) {
-
- /* get the parity */
- v = a & 0x80080125;
- v ^= v >> 16;
- v ^= v >> 8;
- v ^= v >> 4;
- v ^= v >> 2;
- v ^= v >> 1;
-
- a = (v & 1) ^ (a << 1);
- }
-
- return a;
-}
-
-struct pci2id {
- u_short pci_vendor;
- u_short pci_prod;
- char card_id[13];
-} pci2id[] = {
- {
- PCI_VENDOR_INVERTEX,
- PCI_PRODUCT_INVERTEX_AEON,
- { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00, 0x00 }
- }, {
- PCI_VENDOR_HIFN,
- PCI_PRODUCT_HIFN_7751,
- { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00, 0x00 }
- },
-};
-
-/*
- * Checks to see if crypto is already enabled. If crypto isn't enable,
- * "aeon_enable_crypto" is called to enable it. The check is important,
- * as enabling crypto twice will lock the board.
- */
-int
-aeon_enable_crypto(sc, pciid)
- struct aeon_softc *sc;
- pcireg_t pciid;
-{
- u_int32_t dmacfg, ramcfg, encl, addr, i;
- char *offtbl = NULL;
-
- for (i = 0; i < sizeof(pci2id)/sizeof(pci2id[0]); i++) {
- if (pci2id[i].pci_vendor == PCI_VENDOR(pciid) &&
- pci2id[i].pci_prod == PCI_PRODUCT(pciid)) {
- offtbl = pci2id[i].card_id;
- break;
- }
- }
-
- if (offtbl == NULL) {
-#ifdef AEON_DEBUG
- printf("%s: Unknown card!\n", sc->sc_dv.dv_xname);
-#endif
- return (1);
- }
-
- ramcfg = READ_REG_0(sc, AEON_0_PUCNFG);
- dmacfg = READ_REG_1(sc, AEON_1_DMA_CNFG);
-
- /*
- * The RAM config register's encrypt level bit needs to be set before
- * every read performed on the encryption level register.
- */
- WRITE_REG_0(sc, AEON_0_PUCNFG, ramcfg | AEON_PUCNFG_CHIPID);
-
- encl = READ_REG_0(sc, AEON_0_PUSTAT);
-
- /*
- * Make sure we don't re-unlock. Two unlocks kills chip until the
- * next reboot.
- */
- if (encl == 0x1020 || encl == 0x1120) {
-#ifdef AEON_DEBUG
- printf("%s: Strong Crypto already enabled!\n",
- sc->sc_dv.dv_xname);
-#endif
- WRITE_REG_0(sc, AEON_0_PUCNFG, ramcfg);
- WRITE_REG_1(sc, AEON_1_DMA_CNFG, dmacfg);
- return 0; /* success */
- }
-
- if (encl != 0 && encl != 0x3020) {
-#ifdef AEON_DEBUG
- printf("%: Unknown encryption level\n", sc->sc_dv.dv_xname);
-#endif
- return 1;
- }
-
- WRITE_REG_1(sc, AEON_1_DMA_CNFG, AEON_DMACNFG_UNLOCK |
- AEON_DMACNFG_MSTRESET | AEON_DMACNFG_DMARESET | AEON_DMACNFG_MODE);
- addr = READ_REG_1(sc, AEON_UNLOCK_SECRET1);
- WRITE_REG_1(sc, AEON_UNLOCK_SECRET2, 0);
-
- for (i = 0; i <= 12; i++) {
- addr = aeon_next_signature(addr, offtbl[i] + 0x101);
- WRITE_REG_1(sc, AEON_UNLOCK_SECRET2, addr);
-
- DELAY(1000);
- }
-
- WRITE_REG_0(sc, AEON_0_PUCNFG, ramcfg | AEON_PUCNFG_CHIPID);
- encl = READ_REG_0(sc, AEON_0_PUSTAT);
-
-#ifdef AEON_DEBUG
- if (encl != 0x1020 && encl != 0x1120)
- printf("Encryption engine is permanently locked until next system reset.");
- else
- printf("Encryption engine enabled successfully!");
-#endif
-
- WRITE_REG_0(sc, AEON_0_PUCNFG, ramcfg);
- WRITE_REG_1(sc, AEON_1_DMA_CNFG, dmacfg);
-
- switch(encl) {
- case 0x3020:
- printf(": no encr/auth");
- break;
- case 0x1020:
- printf(": DES enabled");
- break;
- case 0x1120:
- printf(": fully enabled");
- break;
- default:
- printf(": disabled");
- break;
- }
-
- return 0;
-}
-
-/*
- * Give initial values to the registers listed in the "Register Space"
- * section of the AEON Software Development reference manual.
- */
-void
-aeon_init_pci_registers(sc)
- struct aeon_softc *sc;
-{
- /* write fixed values needed by the Initialization registers */
- WRITE_REG_0(sc, AEON_0_PUCTRL, AEON_PUCTRL_DMAENA);
- WRITE_REG_0(sc, AEON_0_FIFOCNFG, AEON_FIFOCNFG_THRESHOLD);
- WRITE_REG_0(sc, AEON_0_PUIER, AEON_PUIER_DSTOVER);
-
- /* write all 4 ring address registers */
- WRITE_REG_1(sc, AEON_1_DMA_CRAR, vtophys(sc->sc_dma->cmdr));
- WRITE_REG_1(sc, AEON_1_DMA_SRAR, vtophys(sc->sc_dma->srcr));
- WRITE_REG_1(sc, AEON_1_DMA_DRAR, vtophys(sc->sc_dma->dstr));
- WRITE_REG_1(sc, AEON_1_DMA_RRAR, vtophys(sc->sc_dma->resr));
-
- /* write status register */
- WRITE_REG_1(sc, AEON_1_DMA_CSR, AEON_DMACSR_D_CTRL_ENA |
- AEON_DMACSR_R_CTRL_ENA | AEON_DMACSR_S_CTRL_ENA |
- AEON_DMACSR_C_CTRL_ENA);
- WRITE_REG_1(sc, AEON_1_DMA_IER, AEON_DMAIER_R_DONE);
-
-#if 0
-#if BYTE_ORDER == BIG_ENDIAN
- (0x1 << 7) |
-#endif
-#endif
- WRITE_REG_0(sc, AEON_0_PUCNFG, AEON_PUCNFG_COMPSING |
- AEON_PUCNFG_DRFR_128 | AEON_PUCNFG_TCALLPHASES |
- AEON_PUCNFG_TCDRVTOTEM | AEON_PUCNFG_BUS32 |
- (sc->sc_drammodel ? AEON_PUCNFG_DRAM : AEON_PUCNFG_SRAM));
-
- WRITE_REG_0(sc, AEON_0_PUISR, AEON_PUISR_DSTOVER);
- WRITE_REG_1(sc, AEON_1_DMA_CNFG, AEON_DMACNFG_MSTRESET |
- AEON_DMACNFG_DMARESET | AEON_DMACNFG_MODE |
- AEON_DMACNFG_LAST |
- ((AEON_POLL_FREQUENCY << 16 ) & AEON_DMACNFG_POLLFREQ) |
- ((AEON_POLL_SCALAR << 8) & AEON_DMACNFG_POLLINVAL));
-}
-
-/*
- * There are both DRAM and SRAM models of the aeon board.
- * A bit in the "ram configuration register" needs to be
- * set according to the model. The driver will guess one
- * way or the other -- and then call this routine to verify.
- *
- * 0: RAM setting okay, -1: Current RAM setting in error
- */
-int
-aeon_checkram(sc)
- struct aeon_softc *sc;
-{
- aeon_base_command_t write_command = {(0x3 << 13), 0, 8, 0};
- aeon_base_command_t read_command = {(0x2 << 13), 0, 0, 8};
- u_int8_t data[8] = {'1', '2', '3', '4', '5', '6', '7', '8'};
- u_int8_t *source_buf, *dest_buf;
- struct aeon_dma *dma = sc->sc_dma;
- const u_int32_t masks = AEON_D_VALID | AEON_D_LAST |
- AEON_D_MASKDONEIRQ;
-
-#if (AEON_D_RSIZE < 3)
-#error "descriptor ring size too small DRAM/SRAM check"
-#endif
-
- /*
- * We steal the 8 bytes needed for both the source and dest buffers
- * from the 3rd slot that the DRAM/SRAM test won't use.
- */
- source_buf = sc->sc_dma->command_bufs[2];
- dest_buf = sc->sc_dma->result_bufs[2];
-
- /* build write command */
- *(aeon_base_command_t *) sc->sc_dma->command_bufs[0] = write_command;
- bcopy(data, source_buf, sizeof(data));
-
- dma->srcr[0].p = vtophys(source_buf);
- dma->dstr[0].p = vtophys(dest_buf);
-
- dma->cmdr[0].l = 16 | masks;
- dma->srcr[0].l = 8 | masks;
- dma->dstr[0].l = 8 | masks;
- dma->resr[0].l = AEON_MAX_RESULT | masks;
-
- DELAY(1000); /* let write command execute */
- if (dma->resr[0].l & AEON_D_VALID)
- printf("%s: SRAM/DRAM detection error -- result[0] valid still set\n",
- sc->sc_dv.dv_xname);
-
- /* Build read command */
- *(aeon_base_command_t *) sc->sc_dma->command_bufs[1] = read_command;
-
- dma->srcr[1].p = vtophys(source_buf);
- dma->dstr[1].p = vtophys(dest_buf);
- dma->cmdr[1].l = 16 | masks;
- dma->srcr[1].l = 8 | masks;
- dma->dstr[1].l = 8 | masks;
- dma->resr[1].l = AEON_MAX_RESULT | masks;
-
- DELAY(1000); /* let read command execute */
- if (dma->resr[1].l & AEON_D_VALID)
- printf("%s: SRAM/DRAM detection error -- result[1] valid still set\n",
- sc->sc_dv.dv_xname);
- return (memcmp(dest_buf, data, sizeof(data)) == 0) ? 0 : -1;
-}
-
-/*
- * Initialize the descriptor rings.
- */
-void
-aeon_init_dma(sc)
- struct aeon_softc *sc;
-{
- struct aeon_dma *dma = sc->sc_dma;
- int i;
-
- /* initialize static pointer values */
- for (i = 0; i < AEON_D_CMD_RSIZE; i++)
- dma->cmdr[i].p = vtophys(dma->command_bufs[i]);
- for (i = 0; i < AEON_D_RES_RSIZE; i++)
- dma->resr[i].p = vtophys(dma->result_bufs[i]);
-
- dma->cmdr[AEON_D_CMD_RSIZE].p = vtophys(dma->cmdr);
- dma->srcr[AEON_D_SRC_RSIZE].p = vtophys(dma->srcr);
- dma->dstr[AEON_D_DST_RSIZE].p = vtophys(dma->dstr);
- dma->resr[AEON_D_RES_RSIZE].p = vtophys(dma->resr);
-}
-
-/*
- * Writes out the raw command buffer space. Returns the
- * command buffer size.
- */
-u_int
-aeon_write_command(const struct aeon_command_buf_data *cmd_data,
- u_int8_t *command_buf)
-{
- u_int8_t *command_buf_pos = command_buf;
- const aeon_base_command_t *base_cmd = &cmd_data->base_cmd;
- const aeon_mac_command_t *mac_cmd = &cmd_data->mac_cmd;
- const aeon_crypt_command_t *crypt_cmd = &cmd_data->crypt_cmd;
- int using_mac = base_cmd->masks & AEON_BASE_CMD_MAC;
- int using_crypt = base_cmd->masks & AEON_BASE_CMD_CRYPT;
-
- /* write base command structure */
- *((aeon_base_command_t *) command_buf_pos) = *base_cmd;
- command_buf_pos += sizeof(aeon_base_command_t);
-
- /* Write MAC command structure */
- if (using_mac) {
- *((aeon_mac_command_t *) command_buf_pos) = *mac_cmd;
- command_buf_pos += sizeof(aeon_mac_command_t);
- }
-
- /* Write encryption command structure */
- if (using_crypt) {
- *((aeon_crypt_command_t *) command_buf_pos) = *crypt_cmd;
- command_buf_pos += sizeof(aeon_crypt_command_t);
- }
-
- /* write MAC key */
- if (mac_cmd->masks & AEON_MAC_NEW_KEY) {
- bcopy(cmd_data->mac, command_buf_pos, AEON_MAC_KEY_LENGTH);
- command_buf_pos += AEON_MAC_KEY_LENGTH;
- }
-
- /* Write crypto key */
- if (crypt_cmd->masks & AEON_CRYPT_CMD_NEW_KEY) {
- u_int32_t alg = crypt_cmd->masks & AEON_CRYPT_CMD_ALG_MASK;
- u_int32_t key_len = (alg == AEON_CRYPT_CMD_ALG_DES) ?
- AEON_DES_KEY_LENGTH : AEON_3DES_KEY_LENGTH;
- bcopy(cmd_data->ck, command_buf_pos, key_len);
- command_buf_pos += key_len;
- }
-
- /* Write crypto iv */
- if (crypt_cmd->masks & AEON_CRYPT_CMD_NEW_IV) {
- bcopy(cmd_data->iv, command_buf_pos, AEON_IV_LENGTH);
- command_buf_pos += AEON_IV_LENGTH;
- }
-
- /* Write 8 zero bytes we're not sending crypt or MAC structures */
- if (!(base_cmd->masks & AEON_BASE_CMD_MAC) &&
- !(base_cmd->masks & AEON_BASE_CMD_CRYPT)) {
- *((u_int32_t *) command_buf_pos) = 0;
- command_buf_pos += 4;
- *((u_int32_t *) command_buf_pos) = 0;
- command_buf_pos += 4;
- }
-
- if ((command_buf_pos - command_buf) > AEON_MAX_COMMAND)
- printf("aeon: Internal Error -- Command buffer overflow.\n");
- return command_buf_pos - command_buf;
-}
-
-/*
- * Check command input and build up structure to write
- * the command buffer later. Returns 0 on success and
- * -1 if given bad command input was given.
- */
-int
-aeon_build_command(const struct aeon_command *cmd,
- struct aeon_command_buf_data * cmd_buf_data)
-{
-#define AEON_COMMAND_CHECKING
-
- u_int32_t flags = cmd->flags;
- aeon_base_command_t *base_cmd = &cmd_buf_data->base_cmd;
- aeon_mac_command_t *mac_cmd = &cmd_buf_data->mac_cmd;
- aeon_crypt_command_t *crypt_cmd = &cmd_buf_data->crypt_cmd;
- u_int mac_length;
-#ifdef AEON_COMMAND_CHECKING
- int dest_diff;
-#endif
-
- bzero(cmd_buf_data, sizeof(struct aeon_command_buf_data));
-
-#ifdef AEON_COMMAND_CHECKING
- if (!(!!(flags & AEON_DECODE) ^ !!(flags & AEON_ENCODE))) {
- printf("aeon: encode/decode setting error\n");
- return -1;
- }
- if ((flags & AEON_CRYPT_DES) && (flags & AEON_CRYPT_3DES)) {
- printf("aeon: Too many crypto algorithms set in command\n");
- return -1;
- }
- if ((flags & AEON_MAC_SHA1) && (flags & AEON_MAC_MD5)) {
- printf("aeon: Too many MAC algorithms set in command\n");
- return -1;
- }
-#endif
-
-
- /*
- * Compute the mac value length -- leave at zero if not MAC'ing
- */
- mac_length = 0;
- if (AEON_USING_MAC(flags)) {
- mac_length = (flags & AEON_MAC_TRUNC) ? AEON_MAC_TRUNC_LENGTH :
- ((flags & AEON_MAC_MD5) ? AEON_MD5_LENGTH : AEON_SHA1_LENGTH);
- }
-#ifdef AEON_COMMAND_CHECKING
- /*
- * Check for valid src/dest buf sizes
- */
-
- /*
- * XXX XXX We need to include header counts into all these
- * checks!!!!
- */
-
- if (cmd->src_npa <= mac_length) {
- printf("aeon: command source buffer has no data\n");
- return -1;
- }
- dest_diff = (flags & AEON_ENCODE) ? mac_length : -mac_length;
- if (cmd->dst_npa < cmd->dst_npa + dest_diff) {
- printf("aeon: command dest length %u too short -- needed %u\n",
- cmd->dst_npa, cmd->dst_npa + dest_diff);
- return -1;
- }
-#endif
-
- /*
- * Set MAC bit
- */
- if (AEON_USING_MAC(flags))
- base_cmd->masks |= AEON_BASE_CMD_MAC;
-
- /* Set Encrypt bit */
- if (AEON_USING_CRYPT(flags))
- base_cmd->masks |= AEON_BASE_CMD_CRYPT;
-
- /*
- * Set Decode bit
- */
- if (flags & AEON_DECODE)
- base_cmd->masks |= AEON_BASE_CMD_DECODE;
-
- /*
- * Set total source and dest counts. These values are the same as the
- * values set in the length field of the source and dest descriptor rings.
- */
- base_cmd->total_source_count = cmd->src_l;
- base_cmd->total_dest_count = cmd->dst_l;
-
- /*
- * XXX -- We need session number range checking...
- */
- base_cmd->session_num = cmd->session_num;
-
- /**
- ** Building up mac command
- **
- **/
- if (AEON_USING_MAC(flags)) {
-
- /*
- * Set the MAC algorithm and trunc setting
- */
- mac_cmd->masks |= (flags & AEON_MAC_MD5) ?
- AEON_MAC_CMD_ALG_MD5 : AEON_MAC_CMD_ALG_SHA1;
- if (flags & AEON_MAC_TRUNC)
- mac_cmd->masks |= AEON_MAC_CMD_TRUNC;
-
- /*
- * We always use HMAC mode, assume MAC values are appended to the
- * source buffer on decodes and we append them to the dest buffer
- * on encodes, and order auth/encryption engines as needed by
- * IPSEC
- */
- mac_cmd->masks |= AEON_MAC_CMD_MODE_HMAC | AEON_MAC_CMD_APPEND |
- AEON_MAC_CMD_POS_IPSEC;
-
- /*
- * Setup to send new MAC key if needed.
- */
- if (flags & AEON_MAC_NEW_KEY) {
- mac_cmd->masks |= AEON_MAC_CMD_NEW_KEY;
- cmd_buf_data->mac = cmd->mac;
- }
- /*
- * Set the mac header skip and source count.
- */
- mac_cmd->header_skip = cmd->mac_header_skip;
- mac_cmd->source_count = cmd->src_npa - cmd->mac_header_skip;
- if (flags & AEON_DECODE)
- mac_cmd->source_count -= mac_length;
- }
-
- if (AEON_USING_CRYPT(flags)) {
- /*
- * Set the encryption algorithm bits.
- */
- crypt_cmd->masks |= (flags & AEON_CRYPT_DES) ?
- AEON_CRYPT_CMD_ALG_DES : AEON_CRYPT_CMD_ALG_3DES;
-
- /* We always use CBC mode and send a new IV (as needed by
- * IPSec). */
- crypt_cmd->masks |= AEON_CRYPT_CMD_MODE_CBC | AEON_CRYPT_CMD_NEW_IV;
-
- /*
- * Setup to send new encrypt key if needed.
- */
- if (flags & AEON_CRYPT_CMD_NEW_KEY) {
- crypt_cmd->masks |= AEON_CRYPT_CMD_NEW_KEY;
- cmd_buf_data->ck = cmd->ck;
- }
- /*
- * Set the encrypt header skip and source count.
- */
- crypt_cmd->header_skip = cmd->crypt_header_skip;
- crypt_cmd->source_count = cmd->src_npa - cmd->crypt_header_skip;
- if (flags & AEON_DECODE)
- crypt_cmd->source_count -= mac_length;
-
-
-#ifdef AEON_COMMAND_CHECKING
- if (crypt_cmd->source_count % 8 != 0) {
- printf("aeon: Error -- encryption source %u not a multiple of 8!\n",
- crypt_cmd->source_count);
- return -1;
- }
-#endif
- }
- cmd_buf_data->iv = cmd->iv;
-
-
-#if 1
- printf("aeon: command parameters"
- " -- session num %u"
- " -- base t.s.c: %u"
- " -- base t.d.c: %u"
- " -- mac h.s. %u s.c. %u"
- " -- crypt h.s. %u s.c. %u\n",
- base_cmd->session_num, base_cmd->total_source_count,
- base_cmd->total_dest_count, mac_cmd->header_skip,
- mac_cmd->source_count, crypt_cmd->header_skip,
- crypt_cmd->source_count);
-#endif
-
- return 0; /* success */
-}
-
-int
-aeon_mbuf(m, np, pp, lp, maxp, nicep)
- struct mbuf *m;
- int *np;
- long *pp;
- int *lp;
- int maxp;
- int *nicep;
-{
- struct mbuf *m0;
- int npa = *np;
- int tlen = 0;
-
- /* generate a [pa,len] array from an mbuf */
- npa = 0;
- for (m0 = m; m; m = m->m_next) {
- void *va;
- long pg, npg;
- int len, off;
-
- va = m->m_data;
- len = m->m_len;
- tlen += len;
-
- lp[npa] = len;
- pp[npa] = vtophys(va);
- pg = pp[npa] & ~PAGE_MASK;
- off = (long)va & PAGE_MASK;
-
- while (len + off > PAGE_SIZE) {
- va = va + PAGE_SIZE - off;
- npg = vtophys(va);
- if (npg != pg) {
- /* FUCKED UP condition */
- npa++;
- continue;
- }
- lp[npa] = PAGE_SIZE - off;
- off = 0;
- ++npa;
- if (npa > maxp)
- return (0);
- lp[npa] = len - (PAGE_SIZE - off);
- len -= lp[npa];
- pp[npa] = vtophys(va);
- }
- }
-
- if (nicep) {
- int nice = 1;
- int i;
-
- /* see if each [pa,len] entry is long-word aligned */
- for (i = 0; i < npa; i++)
- if ((lp[i] & 3) || (pp[i] & 3))
- nice = 0;
- *nicep = nice;
- }
-
- *np = npa;
- return (tlen);
-}
-
-int
-aeon_crypto(struct aeon_command *cmd)
-{
- u_int32_t cmdlen;
- static u_int32_t current_device = 0;
- struct aeon_softc *sc;
- struct aeon_dma *dma;
- struct aeon_command_buf_data cmd_buf_data;
- int cmdi, srci, dsti, resi, nicealign = 0;
- int error, s, i;
-
- /* Pick the aeon board to send the data to. Right now we use a round
- * robin approach. */
- sc = aeon_devices[current_device++];
- if (current_device == aeon_num_devices)
- current_device = 0;
- dma = sc->sc_dma;
-
- if (cmd->src_npa == 0 && cmd->src_m)
- cmd->src_l = aeon_mbuf(cmd->src_m, &cmd->src_npa,
- cmd->src_packp, cmd->src_packl, MAX_SCATTER, &nicealign);
- if (cmd->src_l == 0)
- return (-1);
-
- if (nicealign == 0) {
- cmd->dst_l = cmd->src_l;
- MGETHDR(cmd->dst_m, M_DONTWAIT, MT_DATA);
- if (cmd->dst_m == NULL)
- return (-1);
- if (cmd->src_l > MHLEN) {
- MCLGET(cmd->dst_m, M_DONTWAIT);
- if ((cmd->dst_m->m_flags & M_EXT) == 0) {
- m_freem(cmd->dst_m);
- return (-1);
- }
- }
- } else
- cmd->dst_m = cmd->src_m;
-
- cmd->dst_l = aeon_mbuf(cmd->dst_m, &cmd->dst_npa,
- cmd->dst_packp, cmd->dst_packl, MAX_SCATTER, NULL);
- if (cmd->dst_l == 0)
- return (-1);
-
- if (aeon_build_command(cmd, &cmd_buf_data) != 0)
- return AEON_CRYPTO_BAD_INPUT;
-
- printf("%s: Entering cmd: stat %8x ien %8x u %d/%d/%d/%d n %d/%d\n",
- sc->sc_dv.dv_xname,
- READ_REG_1(sc, AEON_1_DMA_CSR), READ_REG_1(sc, AEON_1_DMA_IER),
- dma->cmdu, dma->srcu, dma->dstu, dma->resu, cmd->src_npa,
- cmd->dst_npa);
-
- s = splimp();
-
- /*
- * need 1 cmd, and 1 res
- * need N src, and N dst
- */
- while (dma->cmdu+1 > AEON_D_CMD_RSIZE ||
- dma->srcu+cmd->src_npa > AEON_D_SRC_RSIZE ||
- dma->dstu+cmd->dst_npa > AEON_D_DST_RSIZE ||
- dma->resu+1 > AEON_D_RES_RSIZE) {
- if (cmd->flags & AEON_DMA_FULL_NOBLOCK) {
- splx(s);
- return (AEON_CRYPTO_RINGS_FULL);
- }
- tsleep((caddr_t) dma, PZERO, "aeonring", 1);
- }
-
- if (dma->cmdi == AEON_D_CMD_RSIZE) {
- cmdi = 0, dma->cmdi = 1;
- dma->cmdr[AEON_D_CMD_RSIZE].l = AEON_D_VALID | AEON_D_LAST |
- AEON_D_MASKDONEIRQ | AEON_D_JUMP;
- } else
- cmdi = dma->cmdi++;
-
- if (dma->resi == AEON_D_RES_RSIZE) {
- resi = 0, dma->resi = 1;
- dma->resr[AEON_D_RES_RSIZE].l = AEON_D_VALID | AEON_D_LAST |
- AEON_D_MASKDONEIRQ | AEON_D_JUMP;
- } else
- resi = dma->resi++;
-
- cmdlen = aeon_write_command(&cmd_buf_data, dma->command_bufs[cmdi]);
- dma->aeon_commands[cmdi] = cmd;
- /* .p for command/result already set */
- dma->cmdr[cmdi].l = cmdlen | AEON_D_VALID | AEON_D_LAST |
- AEON_D_MASKDONEIRQ;
- dma->cmdu += 1;
-
- for (i = 0; i < cmd->src_npa; i++) {
- int last = 0;
-
- if (i == cmd->src_npa-1)
- last = AEON_D_LAST;
-
- if (dma->srci == AEON_D_SRC_RSIZE) {
- srci = 0, dma->srci = 1;
- dma->srcr[AEON_D_SRC_RSIZE].l = AEON_D_VALID |
- AEON_D_MASKDONEIRQ | AEON_D_JUMP;
- } else
- srci = dma->srci++;
- dma->srcr[srci].p = vtophys(cmd->src_packp[i]);
- dma->srcr[srci].l = cmd->src_packl[i] | AEON_D_VALID |
- AEON_D_MASKDONEIRQ | last;
- }
- dma->srcu += cmd->src_npa;
-
- for (i = 0; i < cmd->dst_npa; i++) {
- int last = 0;
-
- if (dma->dsti == AEON_D_DST_RSIZE) {
- dsti = 0, dma->dsti = 1;
- dma->dstr[AEON_D_DST_RSIZE].l = AEON_D_VALID |
- AEON_D_MASKDONEIRQ | AEON_D_JUMP;
- } else
- dsti = dma->dsti++;
- dma->dstr[dsti].p = vtophys(cmd->dst_packp[i]);
- dma->dstr[dsti].l = cmd->dst_packl[i] | AEON_D_VALID |
- AEON_D_MASKDONEIRQ | last;
- }
- dma->dstu += cmd->dst_npa;
-
- /*
- * Unlike other descriptors, we don't mask done interrupt from
- * result descriptor.
- */
- dma->resr[resi].l = AEON_MAX_RESULT | AEON_D_VALID | AEON_D_LAST;
- dma->resu += 1;
-
- /*
- * We don't worry about missing an interrupt (which a waiting
- * on command interrupt salvages us from), unless there is more
- * than one command in the queue.
- */
- if (dma->slots_in_use > 1) {
- WRITE_REG_1(sc, AEON_1_DMA_IER,
- AEON_DMAIER_R_DONE | AEON_DMAIER_C_WAIT);
- }
-
- /*
- * If not given a callback routine, we block until the dest data is
- * ready. (Setting interrupt timeout at 3 seconds.)
- */
- if (cmd->dest_ready_callback == NULL) {
- printf("%s: no callback -- we're sleeping\n",
- sc->sc_dv.dv_xname);
- error = tsleep((caddr_t) & dma->resr[resi], PZERO, "CRYPT",
- hz * 3);
- if (error != 0)
- printf("%s: timed out waiting for interrupt"
- " -- tsleep() exited with %d\n",
- sc->sc_dv.dv_xname, error);
- }
-
- printf("%s: command: stat %8x ier %8x\n",
- sc->sc_dv.dv_xname,
- READ_REG_1(sc, AEON_1_DMA_CSR), READ_REG_1(sc, AEON_1_DMA_IER));
-
- splx(s);
- return 0; /* success */
-}
-
-int
-aeon_intr(arg)
- void *arg;
-{
- struct aeon_softc *sc = arg;
- struct aeon_dma *dma = sc->sc_dma;
- u_int32_t dmacsr;
-
- dmacsr = READ_REG_1(sc, AEON_1_DMA_CSR);
-
- printf("%s: irq: stat %8x ien %8x u %d/%d/%d/%d\n",
- sc->sc_dv.dv_xname,
- dmacsr, READ_REG_1(sc, AEON_1_DMA_IER),
- dma->cmdu, dma->srcu, dma->dstu, dma->resu);
-
- if ((dmacsr & (AEON_DMACSR_C_WAIT|AEON_DMACSR_R_DONE)) == 0)
- return (0);
-
- if ((dma->slots_in_use == 0) && (dmacsr & AEON_DMACSR_C_WAIT)) {
- /*
- * If no slots to process and we received a "waiting on
- * result" interrupt, we disable the "waiting on result"
- * (by clearing it).
- */
- WRITE_REG_1(sc, AEON_1_DMA_IER, AEON_DMAIER_R_DONE);
- } else {
- if (dma->slots_in_use > AEON_D_RSIZE)
- printf("%s: Internal Error -- ring overflow\n",
- sc->sc_dv.dv_xname);
-
- while (dma->slots_in_use > 0) {
- u_int32_t wake_pos = dma->wakeup_rpos;
- struct aeon_command *cmd = dma->aeon_commands[wake_pos];
-
- /* if still valid, stop processing */
- if (dma->resr[wake_pos].l & AEON_D_VALID)
- break;
-
- if (AEON_USING_MAC(cmd->flags) && (cmd->flags & AEON_DECODE)) {
- u_int8_t *result_buf = dma->result_bufs[wake_pos];
-
- cmd->result_status = (result_buf[8] & 0x2) ?
- AEON_MAC_BAD : 0;
- printf("%s: byte index 8 of result 0x%02x\n",
- sc->sc_dv.dv_xname, (u_int32_t) result_buf[8]);
- }
-
- /* position is done, notify producer with wakup or callback */
- if (cmd->dest_ready_callback == NULL)
- wakeup((caddr_t) &dma->resr[wake_pos]);
- else
- cmd->dest_ready_callback(cmd);
-
- if (++dma->wakeup_rpos == AEON_D_RSIZE)
- dma->wakeup_rpos = 0;
- dma->slots_in_use--;
- }
- }
-
- /*
- * Clear "result done" and "waiting on command ring" flags in status
- * register. If we still have slots to process and we received a
- * waiting interrupt, this will interupt us again.
- */
- WRITE_REG_1(sc, AEON_1_DMA_CSR, AEON_DMACSR_R_DONE|AEON_DMACSR_C_WAIT);
- return (1);
-}