f-stack/dpdk/drivers/crypto/cnxk/cnxk_ipsec.h

203 lines
5.2 KiB
C
Raw Normal View History

2022-09-06 04:00:10 +00:00
/* SPDX-License-Identifier: BSD-3-Clause
* Copyright(C) 2021 Marvell.
*/
#ifndef __CNXK_IPSEC_H__
#define __CNXK_IPSEC_H__
#include <rte_security.h>
#include <rte_security_driver.h>
#include "roc_api.h"
extern struct rte_security_ops cnxk_sec_ops;
struct cnxk_cpt_inst_tmpl {
uint64_t w2;
uint64_t w4;
uint64_t w7;
};
static inline int
ipsec_xform_cipher_verify(struct rte_crypto_sym_xform *crypto_xform)
{
2023-09-13 12:21:49 +00:00
if (crypto_xform->cipher.algo == RTE_CRYPTO_CIPHER_NULL)
return 0;
if (crypto_xform->cipher.algo == RTE_CRYPTO_CIPHER_DES_CBC &&
crypto_xform->cipher.key.length == 8)
return 0;
if (crypto_xform->cipher.algo == RTE_CRYPTO_CIPHER_AES_CBC ||
crypto_xform->cipher.algo == RTE_CRYPTO_CIPHER_AES_CTR) {
2022-09-06 04:00:10 +00:00
switch (crypto_xform->cipher.key.length) {
case 16:
case 24:
case 32:
break;
default:
return -ENOTSUP;
}
return 0;
}
2023-09-13 12:21:49 +00:00
if (crypto_xform->cipher.algo == RTE_CRYPTO_CIPHER_3DES_CBC &&
crypto_xform->cipher.key.length == 24)
return 0;
2022-09-06 04:00:10 +00:00
return -ENOTSUP;
}
static inline int
ipsec_xform_auth_verify(struct rte_crypto_sym_xform *crypto_xform)
{
uint16_t keylen = crypto_xform->auth.key.length;
if (crypto_xform->auth.algo == RTE_CRYPTO_AUTH_NULL)
return 0;
2023-09-13 12:21:49 +00:00
if (crypto_xform->auth.algo == RTE_CRYPTO_AUTH_MD5_HMAC) {
if (keylen == 16)
return 0;
}
2022-09-06 04:00:10 +00:00
if (crypto_xform->auth.algo == RTE_CRYPTO_AUTH_SHA1_HMAC) {
if (keylen >= 20 && keylen <= 64)
return 0;
2023-09-13 12:21:49 +00:00
} else if (crypto_xform->auth.algo == RTE_CRYPTO_AUTH_SHA256_HMAC) {
2022-09-06 04:00:10 +00:00
if (keylen >= 32 && keylen <= 64)
return 0;
2023-09-13 12:21:49 +00:00
} else if (crypto_xform->auth.algo == RTE_CRYPTO_AUTH_SHA384_HMAC) {
if (keylen == 48)
return 0;
} else if (crypto_xform->auth.algo == RTE_CRYPTO_AUTH_SHA512_HMAC) {
if (keylen == 64)
return 0;
} else if (crypto_xform->auth.algo == RTE_CRYPTO_AUTH_AES_GMAC) {
if (keylen >= 16 && keylen <= 32)
return 0;
2022-09-06 04:00:10 +00:00
}
2023-09-13 12:21:49 +00:00
if (crypto_xform->auth.algo == RTE_CRYPTO_AUTH_AES_XCBC_MAC &&
keylen == ROC_CPT_AES_XCBC_KEY_LENGTH)
return 0;
2022-09-06 04:00:10 +00:00
return -ENOTSUP;
}
static inline int
ipsec_xform_aead_verify(struct rte_security_ipsec_xform *ipsec_xform,
struct rte_crypto_sym_xform *crypto_xform)
{
if (ipsec_xform->direction == RTE_SECURITY_IPSEC_SA_DIR_EGRESS &&
crypto_xform->aead.op != RTE_CRYPTO_AEAD_OP_ENCRYPT)
return -EINVAL;
if (ipsec_xform->direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS &&
crypto_xform->aead.op != RTE_CRYPTO_AEAD_OP_DECRYPT)
return -EINVAL;
2023-09-13 12:21:49 +00:00
if (crypto_xform->aead.algo == RTE_CRYPTO_AEAD_AES_GCM ||
crypto_xform->aead.algo == RTE_CRYPTO_AEAD_AES_CCM) {
2022-09-06 04:00:10 +00:00
switch (crypto_xform->aead.key.length) {
case 16:
case 24:
case 32:
break;
default:
return -EINVAL;
}
return 0;
}
return -ENOTSUP;
}
static inline int
cnxk_ipsec_xform_verify(struct rte_security_ipsec_xform *ipsec_xform,
struct rte_crypto_sym_xform *crypto_xform)
{
struct rte_crypto_sym_xform *auth_xform, *cipher_xform;
int ret;
if ((ipsec_xform->direction != RTE_SECURITY_IPSEC_SA_DIR_INGRESS) &&
(ipsec_xform->direction != RTE_SECURITY_IPSEC_SA_DIR_EGRESS))
return -EINVAL;
if ((ipsec_xform->proto != RTE_SECURITY_IPSEC_SA_PROTO_ESP) &&
(ipsec_xform->proto != RTE_SECURITY_IPSEC_SA_PROTO_AH))
return -EINVAL;
if ((ipsec_xform->mode != RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT) &&
(ipsec_xform->mode != RTE_SECURITY_IPSEC_SA_MODE_TUNNEL))
return -EINVAL;
if ((ipsec_xform->mode == RTE_SECURITY_IPSEC_SA_MODE_TUNNEL) &&
(ipsec_xform->tunnel.type != RTE_SECURITY_IPSEC_TUNNEL_IPV4) &&
(ipsec_xform->tunnel.type != RTE_SECURITY_IPSEC_TUNNEL_IPV6))
return -EINVAL;
if (crypto_xform->type == RTE_CRYPTO_SYM_XFORM_AEAD)
return ipsec_xform_aead_verify(ipsec_xform, crypto_xform);
2023-09-13 12:21:49 +00:00
if (ipsec_xform->proto == RTE_SECURITY_IPSEC_SA_PROTO_AH) {
if (ipsec_xform->direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS) {
/* Ingress */
auth_xform = crypto_xform;
cipher_xform = crypto_xform->next;
if (crypto_xform->type != RTE_CRYPTO_SYM_XFORM_AUTH)
return -EINVAL;
if ((cipher_xform != NULL) && ((cipher_xform->type !=
RTE_CRYPTO_SYM_XFORM_CIPHER) ||
(cipher_xform->cipher.algo !=
RTE_CRYPTO_CIPHER_NULL)))
return -EINVAL;
} else {
/* Egress */
if (crypto_xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER) {
cipher_xform = crypto_xform;
auth_xform = crypto_xform->next;
if (auth_xform == NULL ||
cipher_xform->cipher.algo !=
RTE_CRYPTO_CIPHER_NULL)
return -EINVAL;
} else if (crypto_xform->type ==
RTE_CRYPTO_SYM_XFORM_AUTH)
auth_xform = crypto_xform;
else
return -EINVAL;
}
2022-09-06 04:00:10 +00:00
} else {
2023-09-13 12:21:49 +00:00
if (crypto_xform->next == NULL)
2022-09-06 04:00:10 +00:00
return -EINVAL;
2023-09-13 12:21:49 +00:00
if (ipsec_xform->direction ==
RTE_SECURITY_IPSEC_SA_DIR_INGRESS) {
/* Ingress */
if (crypto_xform->type != RTE_CRYPTO_SYM_XFORM_AUTH ||
crypto_xform->next->type !=
RTE_CRYPTO_SYM_XFORM_CIPHER)
return -EINVAL;
auth_xform = crypto_xform;
cipher_xform = crypto_xform->next;
} else {
/* Egress */
if (crypto_xform->type != RTE_CRYPTO_SYM_XFORM_CIPHER ||
crypto_xform->next->type !=
RTE_CRYPTO_SYM_XFORM_AUTH)
return -EINVAL;
cipher_xform = crypto_xform;
auth_xform = crypto_xform->next;
}
ret = ipsec_xform_cipher_verify(cipher_xform);
if (ret)
return ret;
}
2022-09-06 04:00:10 +00:00
return ipsec_xform_auth_verify(auth_xform);
}
#endif /* __CNXK_IPSEC_H__ */