- crypto code moved to vppinfra for better testing and reuse - added 256-bit VAES support (Intel Client CPUs) - added AES_GMAC functions Change-Id: I960c8e14ca0a0126703e8f1589d86f32e2a98361 Type: improvement Signed-off-by: Damjan Marion <damarion@cisco.com>
158 lines
4.8 KiB
C
158 lines
4.8 KiB
C
/*
|
|
*------------------------------------------------------------------
|
|
* Copyright (c) 2019 Cisco and/or its affiliates.
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at:
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*------------------------------------------------------------------
|
|
*/
|
|
|
|
#include <vlib/vlib.h>
|
|
#include <vnet/plugin/plugin.h>
|
|
#include <vnet/crypto/crypto.h>
|
|
#include <crypto_native/crypto_native.h>
|
|
#include <vppinfra/crypto/aes_gcm.h>
|
|
|
|
#if __GNUC__ > 4 && !__clang__ && CLIB_DEBUG == 0
|
|
#pragma GCC optimize("O3")
|
|
#endif
|
|
|
|
static_always_inline u32
|
|
aes_ops_enc_aes_gcm (vlib_main_t *vm, vnet_crypto_op_t *ops[], u32 n_ops,
|
|
aes_key_size_t ks)
|
|
{
|
|
crypto_native_main_t *cm = &crypto_native_main;
|
|
vnet_crypto_op_t *op = ops[0];
|
|
aes_gcm_key_data_t *kd;
|
|
u32 n_left = n_ops;
|
|
|
|
next:
|
|
kd = (aes_gcm_key_data_t *) cm->key_data[op->key_index];
|
|
aes_gcm (op->src, op->dst, op->aad, (u8 *) op->iv, op->tag, op->len,
|
|
op->aad_len, op->tag_len, kd, AES_KEY_ROUNDS (ks),
|
|
AES_GCM_OP_ENCRYPT);
|
|
op->status = VNET_CRYPTO_OP_STATUS_COMPLETED;
|
|
|
|
if (--n_left)
|
|
{
|
|
op += 1;
|
|
goto next;
|
|
}
|
|
|
|
return n_ops;
|
|
}
|
|
|
|
static_always_inline u32
|
|
aes_ops_dec_aes_gcm (vlib_main_t *vm, vnet_crypto_op_t *ops[], u32 n_ops,
|
|
aes_key_size_t ks)
|
|
{
|
|
crypto_native_main_t *cm = &crypto_native_main;
|
|
vnet_crypto_op_t *op = ops[0];
|
|
aes_gcm_key_data_t *kd;
|
|
u32 n_left = n_ops;
|
|
int rv;
|
|
|
|
next:
|
|
kd = (aes_gcm_key_data_t *) cm->key_data[op->key_index];
|
|
rv = aes_gcm (op->src, op->dst, op->aad, (u8 *) op->iv, op->tag, op->len,
|
|
op->aad_len, op->tag_len, kd, AES_KEY_ROUNDS (ks),
|
|
AES_GCM_OP_DECRYPT);
|
|
|
|
if (rv)
|
|
{
|
|
op->status = VNET_CRYPTO_OP_STATUS_COMPLETED;
|
|
}
|
|
else
|
|
{
|
|
op->status = VNET_CRYPTO_OP_STATUS_FAIL_BAD_HMAC;
|
|
n_ops--;
|
|
}
|
|
|
|
if (--n_left)
|
|
{
|
|
op += 1;
|
|
goto next;
|
|
}
|
|
|
|
return n_ops;
|
|
}
|
|
|
|
static_always_inline void *
|
|
aes_gcm_key_exp (vnet_crypto_key_t *key, aes_key_size_t ks)
|
|
{
|
|
aes_gcm_key_data_t *kd;
|
|
|
|
kd = clib_mem_alloc_aligned (sizeof (*kd), CLIB_CACHE_LINE_BYTES);
|
|
|
|
clib_aes_gcm_key_expand (kd, key->data, ks);
|
|
|
|
return kd;
|
|
}
|
|
|
|
#define foreach_aes_gcm_handler_type _ (128) _ (192) _ (256)
|
|
|
|
#define _(x) \
|
|
static u32 aes_ops_dec_aes_gcm_##x (vlib_main_t *vm, \
|
|
vnet_crypto_op_t *ops[], u32 n_ops) \
|
|
{ \
|
|
return aes_ops_dec_aes_gcm (vm, ops, n_ops, AES_KEY_##x); \
|
|
} \
|
|
static u32 aes_ops_enc_aes_gcm_##x (vlib_main_t *vm, \
|
|
vnet_crypto_op_t *ops[], u32 n_ops) \
|
|
{ \
|
|
return aes_ops_enc_aes_gcm (vm, ops, n_ops, AES_KEY_##x); \
|
|
} \
|
|
static void *aes_gcm_key_exp_##x (vnet_crypto_key_t *key) \
|
|
{ \
|
|
return aes_gcm_key_exp (key, AES_KEY_##x); \
|
|
}
|
|
|
|
foreach_aes_gcm_handler_type;
|
|
#undef _
|
|
|
|
clib_error_t *
|
|
#if defined(__VAES__) && defined(__AVX512F__)
|
|
crypto_native_aes_gcm_init_icl (vlib_main_t *vm)
|
|
#elif defined(__VAES__)
|
|
crypto_native_aes_gcm_init_adl (vlib_main_t *vm)
|
|
#elif __AVX512F__
|
|
crypto_native_aes_gcm_init_skx (vlib_main_t *vm)
|
|
#elif __AVX2__
|
|
crypto_native_aes_gcm_init_hsw (vlib_main_t *vm)
|
|
#elif __aarch64__
|
|
crypto_native_aes_gcm_init_neon (vlib_main_t *vm)
|
|
#else
|
|
crypto_native_aes_gcm_init_slm (vlib_main_t *vm)
|
|
#endif
|
|
{
|
|
crypto_native_main_t *cm = &crypto_native_main;
|
|
|
|
#define _(x) \
|
|
vnet_crypto_register_ops_handler (vm, cm->crypto_engine_index, \
|
|
VNET_CRYPTO_OP_AES_##x##_GCM_ENC, \
|
|
aes_ops_enc_aes_gcm_##x); \
|
|
vnet_crypto_register_ops_handler (vm, cm->crypto_engine_index, \
|
|
VNET_CRYPTO_OP_AES_##x##_GCM_DEC, \
|
|
aes_ops_dec_aes_gcm_##x); \
|
|
cm->key_fn[VNET_CRYPTO_ALG_AES_##x##_GCM] = aes_gcm_key_exp_##x;
|
|
foreach_aes_gcm_handler_type;
|
|
#undef _
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* fd.io coding-style-patch-verification: ON
|
|
*
|
|
* Local Variables:
|
|
* eval: (c-set-style "gnu")
|
|
* End:
|
|
*/
|