d6946fe9d4
Add support for CPU crypto mode by introducing required handler. Authenticated encryption and decryption are supported with tag generation/verification. CPU crypto support include both AES-GCM and GMAC algorithms. Signed-off-by: Marcin Smoczynski <marcinx.smoczynski@intel.com> Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Fan Zhang <roy.fan.zhang@intel.com> Tested-by: Konstantin Ananyev <konstantin.ananyev@intel.com> Acked-by: Konstantin Ananyev <konstantin.ananyev@intel.com>
78 lines
2.0 KiB
C
78 lines
2.0 KiB
C
/* SPDX-License-Identifier: BSD-3-Clause
|
|
* Copyright(c) 2016-2020 Intel Corporation
|
|
*/
|
|
|
|
#ifndef _AESNI_GCM_OPS_H_
|
|
#define _AESNI_GCM_OPS_H_
|
|
|
|
#ifndef LINUX
|
|
#define LINUX
|
|
#endif
|
|
|
|
#include <intel-ipsec-mb.h>
|
|
|
|
/** Supported vector modes */
|
|
enum aesni_gcm_vector_mode {
|
|
RTE_AESNI_GCM_NOT_SUPPORTED = 0,
|
|
RTE_AESNI_GCM_SSE,
|
|
RTE_AESNI_GCM_AVX,
|
|
RTE_AESNI_GCM_AVX2,
|
|
RTE_AESNI_GCM_AVX512,
|
|
RTE_AESNI_GCM_VECTOR_NUM
|
|
};
|
|
|
|
enum aesni_gcm_key {
|
|
GCM_KEY_128 = 0,
|
|
GCM_KEY_192,
|
|
GCM_KEY_256,
|
|
GCM_KEY_NUM
|
|
};
|
|
|
|
typedef void (*aesni_gcm_t)(const struct gcm_key_data *gcm_key_data,
|
|
struct gcm_context_data *gcm_ctx_data, uint8_t *out,
|
|
const uint8_t *in, uint64_t plaintext_len, const uint8_t *iv,
|
|
const uint8_t *aad, uint64_t aad_len,
|
|
uint8_t *auth_tag, uint64_t auth_tag_len);
|
|
|
|
typedef void (*aesni_gcm_pre_t)(const void *key, struct gcm_key_data *gcm_data);
|
|
|
|
typedef void (*aesni_gcm_init_t)(const struct gcm_key_data *gcm_key_data,
|
|
struct gcm_context_data *gcm_ctx_data,
|
|
const uint8_t *iv,
|
|
uint8_t const *aad,
|
|
uint64_t aad_len);
|
|
|
|
typedef void (*aesni_gcm_update_t)(const struct gcm_key_data *gcm_key_data,
|
|
struct gcm_context_data *gcm_ctx_data,
|
|
uint8_t *out,
|
|
const uint8_t *in,
|
|
uint64_t plaintext_len);
|
|
|
|
typedef void (*aesni_gcm_finalize_t)(const struct gcm_key_data *gcm_key_data,
|
|
struct gcm_context_data *gcm_ctx_data,
|
|
uint8_t *auth_tag,
|
|
uint64_t auth_tag_len);
|
|
|
|
/** GCM library function pointer table */
|
|
struct aesni_gcm_ops {
|
|
aesni_gcm_t enc; /**< GCM encode function pointer */
|
|
aesni_gcm_t dec; /**< GCM decode function pointer */
|
|
aesni_gcm_pre_t pre; /**< GCM pre-compute */
|
|
aesni_gcm_init_t init;
|
|
aesni_gcm_update_t update_enc;
|
|
aesni_gcm_update_t update_dec;
|
|
aesni_gcm_finalize_t finalize_enc;
|
|
aesni_gcm_finalize_t finalize_dec;
|
|
};
|
|
|
|
/** GCM per-session operation handlers */
|
|
struct aesni_gcm_session_ops {
|
|
aesni_gcm_t cipher;
|
|
aesni_gcm_pre_t pre;
|
|
aesni_gcm_init_t init;
|
|
aesni_gcm_update_t update;
|
|
aesni_gcm_finalize_t finalize;
|
|
};
|
|
|
|
#endif /* _AESNI_GCM_OPS_H_ */
|