/*      $NetBSD: ubsecreg.h,v 1.5 2015/04/13 15:43:43 riastradh Exp $   */
/*      $OpenBSD: ubsecreg.h,v 1.29 2009/03/25 12:17:30 reyk Exp $      */

/*
* Copyright (c) 2000 Theo de Raadt
* Copyright (c) 2001 Patrik Lindergren ([email protected])
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
*    notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
*    notice, this list of conditions and the following disclaimer in the
*    documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
* Effort sponsored in part by the Defense Advanced Research Projects
* Agency (DARPA) and Air Force Research Laboratory, Air Force
* Materiel Command, USAF, under agreement number F30602-01-2-0537.
*
*/

#ifndef _DEV_PCI_UBSECREG_H
#define _DEV_PCI_UBSECREG_H

/*
* Register definitions for 5601 BlueSteel Networks Ubiquitous Broadband
* Security "uBSec" chip.  Definitions from revision 2.8 of the product
* datasheet.
*/

#define BS_BAR                  0x10    /* DMA base address register */
#define BS_TRDY_TIMEOUT         0x40    /* TRDY timeout */
#define BS_RETRY_TIMEOUT        0x41    /* DMA retry timeout */

#define UBS_PCI_RTY_SHIFT                       8
#define UBS_PCI_RTY_MASK                        0xff
#define UBS_PCI_RTY(misc) \
   (((misc) >> UBS_PCI_RTY_SHIFT) & UBS_PCI_RTY_MASK)

#define UBS_PCI_TOUT_SHIFT                      0
#define UBS_PCI_TOUT_MASK                       0xff
#define UBS_PCI_TOUT(misc) \
   (((misc) >> PCI_TOUT_SHIFT) & PCI_TOUT_MASK)

/*
* DMA Control & Status Registers (offset from BS_BAR)
*/
#define BS_MCR1         0x00    /* DMA Master Command Record 1 */
#define BS_CTRL         0x04    /* DMA Control */
#define BS_STAT         0x08    /* DMA Status */
#define BS_ERR          0x0c    /* DMA Error Address */
#define BS_MCR2         0x10    /* DMA Master Command Record 2 */
#define BS_MCR3         0x0014  /* 5827+, DMA Master Command Record 3 */
#define BS_MCR4         0x001c  /* 5827+, DMA Master Command Record 4 */
#define BS_CFG          0x0700  /* 5827+, Configuration Register */
#define BS_INT          0x0f00  /* 5827+, Interrupt Register */

/* BS_CTRL - DMA Control */
#define BS_CTRL_RESET           0x80000000      /* hardware reset, 5805/5820 */
#define BS_CTRL_MCR2INT         0x40000000      /* enable intr MCR for MCR2 */
#define BS_CTRL_MCR1INT         0x20000000      /* enable intr MCR for MCR1 */
#define BS_CTRL_OFM             0x10000000      /* Output fragment mode */
#define BS_CTRL_BE32            0x08000000      /* big-endian, 32bit bytes */
#define BS_CTRL_BE64            0x04000000      /* big-endian, 64bit bytes */
#define BS_CTRL_DMAERR          0x02000000      /* enable intr DMA error */
#define BS_CTRL_RNG_M           0x01800000      /* RNG mode */
#define BS_CTRL_RNG_1           0x00000000      /* 1bit rn/one slow clock */
#define BS_CTRL_RNG_4           0x00800000      /* 1bit rn/four slow clocks */
#define BS_CTRL_RNG_8           0x01000000      /* 1bit rn/eight slow clocks */
#define BS_CTRL_RNG_16          0x01800000      /* 1bit rn/16 slow clocks */
#define BS_CTRL_SWNORM          0x00400000      /* 582[01], sw normalization */
#define BS_CTRL_MCR3INT         0x00400000      /* 5827+, intr for MCR3 */
#define BS_CTRL_MCR4INT         0x00200000      /* 5827+, intr for MCR4 */
#define BS_CTRL_BSIZE240        0x000f0000      /* 5827+, burst size 240 */
#define BS_CTRL_FRAG_M          0x0000ffff      /* output fragment size mask */
#define BS_CTRL_LITTLE_ENDIAN   (BS_CTRL_BE32 | BS_CTRL_BE64)

/* BS_STAT - DMA Status */
#define BS_STAT_MCR1_BUSY       0x80000000      /* MCR1 is busy */
#define BS_STAT_MCR1_FULL       0x40000000      /* MCR1 is full */
#define BS_STAT_MCR1_DONE       0x20000000      /* MCR1 is done */
#define BS_STAT_DMAERR          0x10000000      /* DMA error */
#define BS_STAT_MCR2_FULL       0x08000000      /* MCR2 is full */
#define BS_STAT_MCR2_DONE       0x04000000      /* MCR2 is done */
#define BS_STAT_MCR1_ALLEMPTY   0x02000000      /* 5821, MCR1 is empty */
#define BS_STAT_MCR2_ALLEMPTY   0x01000000      /* 5821, MCR2 is empty */
#define BS_STAT_MCR3_ALLEMPTY   0x00800000      /* 5827+, MCR3 is empty */
#define BS_STAT_MCR4_ALLEMPTY   0x00400000      /* 5827+, MCR4 is empty */
#define BS_STAT_MCR3_FULL       0x00080000      /* 5827+, MCR3 is full */
#define BS_STAT_MCR3_DONE       0x00040000      /* 5827+, MCR3 is done */
#define BS_STAT_MCR4_FULL       0x00020000      /* 5827+, MCR4 is full */
#define BS_STAT_MCR4_DONE       0x00010000      /* 5827+, MCR4 is done */

/* BS_ERR - DMA Error Address */
#define BS_ERR_ADDR             0xfffffffc      /* error address mask */
#define BS_ERR_READ             0x00000002      /* fault was on read */

/* BS_CFG */
#define BS_CFG_RNG              0x00000001      /* 5827+, enable RNG */

/* BS_INT */
#define BS_INT_DMAINT           0x80000000      /* 5827+, enable DMA intr */

/* DES/3DES */
struct ubsec_pktctx {
       u_int32_t       pc_deskey[6];           /* 3DES key */
       u_int32_t       pc_hminner[5];          /* hmac inner state */
       u_int32_t       pc_hmouter[5];          /* hmac outer state */
       u_int32_t       pc_iv[2];               /* [3]DES iv */
       u_int16_t       pc_flags;               /* flags, below */
       u_int16_t       pc_offset;              /* crypto offset */
};
#define UBS_PKTCTX_ENC_3DES     0x8000          /* use 3des */
#define UBS_PKTCTX_ENC_NONE     0x0000          /* no encryption */
#define UBS_PKTCTX_INBOUND      0x4000          /* inbound packet */
#define UBS_PKTCTX_AUTH         0x3000          /* authentication mask */
#define UBS_PKTCTX_AUTH_NONE    0x0000          /* no authentication */
#define UBS_PKTCTX_AUTH_MD5     0x1000          /* use hmac-md5 */
#define UBS_PKTCTX_AUTH_SHA1    0x2000          /* use hmac-sha1 */

/* "Long" cryptographic operations on newer chipsets */
#define UBS_PKTCTX_TYPE_IPSEC_3DES      0x0000
#define UBS_PKTCTX_TYPE_IPSEC_AES       0x0040

struct ubsec_pktctx_hdr {
       volatile u_int16_t      ph_len;         /* length of ctx struct */
       volatile u_int16_t      ph_type;        /* context type, 0 */
       volatile u_int16_t      ph_flags;       /* flags, same as above */
       volatile u_int16_t      ph_offset;      /* crypto/auth offset */
};

/* Long version of DES/3DES */
struct ubsec_pktctx_3des {
       struct ubsec_pktctx_hdr pc_hdr;         /* Common header */
       volatile u_int32_t      pc_deskey[6];   /* 3DES key */
       volatile u_int32_t      pc_iv[2];       /* [3]DES iv */
       volatile u_int32_t      pc_hminner[5];  /* hmac inner state */
       volatile u_int32_t      pc_hmouter[5];  /* hmac outer state */
};

/* AES uses different structures for each supported key size */
struct ubsec_pktctx_aes128 {
       struct ubsec_pktctx_hdr pc_hdr;         /* Common header */
       volatile u_int32_t      pc_aeskey[4];   /* AES128 key */
       volatile u_int32_t      pc_iv[4];       /* AES iv/ucv */
       volatile u_int32_t      pc_hminner[5];  /* hmac inner state */
       volatile u_int32_t      pc_hmouter[5];  /* hmac outer state */
};

struct ubsec_pktctx_aes192 {
       struct ubsec_pktctx_hdr pc_hdr;         /* Common header */
       volatile u_int32_t      pc_aeskey[6];   /* AES192 key */
       volatile u_int32_t      pc_iv[4];       /* AES iv/icv */
       volatile u_int32_t      pc_hminner[5];  /* hmac inner state */
       volatile u_int32_t      pc_hmouter[5];  /* hmac outer state */
};

struct ubsec_pktctx_aes256 {
       struct ubsec_pktctx_hdr pc_hdr;         /* Common header */
       volatile u_int32_t      pc_aeskey[8];   /* AES256 key */
       volatile u_int32_t      pc_iv[4];       /* AES iv/icv */
       volatile u_int32_t      pc_hminner[5];  /* hmac inner state */
       volatile u_int32_t      pc_hmouter[5];  /* hmac outer state */
};
#define UBS_PKTCTX_ENC_AES      0x8000          /* use aes */
#define UBS_PKTCTX_MODE_CBC     0x0000          /* Cipher Block Chaining mode */
#define UBS_PKTCTX_MODE_CTR     0x0400          /* Counter mode */
#define UBS_PKTCTX_KEYSIZE_128  0x0000          /* AES128 */
#define UBS_PKTCTX_KEYSIZE_192  0x0100          /* AES192 */
#define UBS_PKTCTX_KEYSIZE_256  0x0200          /* AES256 */

struct ubsec_pktbuf {
       volatile u_int32_t      pb_addr;        /* address of buffer start */
       volatile u_int32_t      pb_next;        /* pointer to next pktbuf */
       volatile u_int32_t      pb_len;         /* packet length */
};
#define UBS_PKTBUF_LEN          0x0000ffff      /* length mask */

struct ubsec_mcr {
       volatile u_int16_t      mcr_pkts;       /* #pkts in this mcr */
       volatile u_int16_t      mcr_flags;      /* mcr flags (below) */
       volatile u_int32_t      mcr_cmdctxp;    /* command ctx pointer */
       struct ubsec_pktbuf     mcr_ipktbuf;    /* input chain header */
       volatile u_int16_t      mcr_reserved;
       volatile u_int16_t      mcr_pktlen;
       struct ubsec_pktbuf     mcr_opktbuf;    /* output chain header */
};

struct ubsec_mcr_add {
       volatile u_int32_t      mcr_cmdctxp;    /* command ctx pointer */
       struct ubsec_pktbuf     mcr_ipktbuf;    /* input chain header */
       volatile u_int16_t      mcr_reserved;
       volatile u_int16_t      mcr_pktlen;
       struct ubsec_pktbuf     mcr_opktbuf;    /* output chain header */
};

#define UBS_MCR_DONE            0x0001          /* mcr has been processed */
#define UBS_MCR_ERROR           0x0002          /* error in processing */
#define UBS_MCR_ERRORCODE       0xff00          /* error type */

struct ubsec_ctx_keyop {
       volatile u_int16_t      ctx_len;        /* command length */
       volatile u_int16_t      ctx_op;         /* operation code */
       volatile u_int8_t       ctx_pad[60];    /* padding */
};
#define UBS_CTXOP_DHPKGEN       0x01            /* dh public key generation */
#define UBS_CTXOP_DHSSGEN       0x02            /* dh shared secret gen. */
#define UBS_CTXOP_RSAPUB        0x03            /* rsa public key op */
#define UBS_CTXOP_RSAPRIV       0x04            /* rsa private key op */
#define UBS_CTXOP_DSASIGN       0x05            /* dsa signing op */
#define UBS_CTXOP_DSAVRFY       0x06            /* dsa verification */
#define UBS_CTXOP_RNGBYPASS     0x41            /* rng direct test mode */
#define UBS_CTXOP_RNGSHA1       0x42            /* rng sha1 test mode */
#define UBS_CTXOP_MODADD        0x43            /* modular addition */
#define UBS_CTXOP_MODSUB        0x44            /* modular subtraction */
#define UBS_CTXOP_MODMUL        0x45            /* modular multiplication */
#define UBS_CTXOP_MODRED        0x46            /* modular reduction */
#define UBS_CTXOP_MODEXP        0x47            /* modular exponentiation */
#define UBS_CTXOP_MODINV        0x48            /* modular inverse */

struct ubsec_ctx_rngbypass {
       volatile u_int16_t      rbp_len;        /* command length, 64 */
       volatile u_int16_t      rbp_op;         /* rng bypass, 0x41 */
       volatile u_int8_t       rbp_pad[60];    /* padding */
};

/* modexp: C = (M ^ E) mod N */
struct ubsec_ctx_modexp {
       volatile u_int16_t      me_len;         /* command length */
       volatile u_int16_t      me_op;          /* modexp, 0x47 */
       volatile u_int16_t      me_E_len;       /* E (bits) */
       volatile u_int16_t      me_N_len;       /* N (bits) */
       u_int8_t                me_N[2048/8];   /* N */
};

struct ubsec_ctx_rsapriv {
       volatile u_int16_t      rpr_len;        /* command length */
       volatile u_int16_t      rpr_op;         /* rsaprivate, 0x04 */
       volatile u_int16_t      rpr_q_len;      /* q (bits) */
       volatile u_int16_t      rpr_p_len;      /* p (bits) */
       u_int8_t                rpr_buf[5 * 1024 / 8];  /* parameters: */
                                               /* p, q, dp, dq, pinv */
};

#endif  /* _DEV_PCI_UBSECREG_H */