1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright(c) 2015-2016 Intel Corporation
5 #ifndef _RTE_AESNI_MB_PMD_PRIVATE_H_
6 #define _RTE_AESNI_MB_PMD_PRIVATE_H_
8 #include "aesni_mb_ops.h"
10 #define CRYPTODEV_NAME_AESNI_MB_PMD crypto_aesni_mb
11 /**< AES-NI Multi buffer PMD device name */
13 #define MB_LOG_ERR(fmt, args...) \
14 RTE_LOG(ERR, CRYPTODEV, "[%s] %s() line %u: " fmt "\n", \
15 RTE_STR(CRYPTODEV_NAME_AESNI_MB_PMD), \
16 __func__, __LINE__, ## args)
18 #ifdef RTE_LIBRTE_AESNI_MB_DEBUG
19 #define MB_LOG_INFO(fmt, args...) \
20 RTE_LOG(INFO, CRYPTODEV, "[%s] %s() line %u: " fmt "\n", \
21 CRYPTODEV_NAME_AESNI_MB_PMD, \
22 __func__, __LINE__, ## args)
24 #define MB_LOG_DBG(fmt, args...) \
25 RTE_LOG(DEBUG, CRYPTODEV, "[%s] %s() line %u: " fmt "\n", \
26 CRYPTODEV_NAME_AESNI_MB_PMD, \
27 __func__, __LINE__, ## args)
29 #define MB_LOG_INFO(fmt, args...)
30 #define MB_LOG_DBG(fmt, args...)
33 #define HMAC_IPAD_VALUE (0x36)
34 #define HMAC_OPAD_VALUE (0x5C)
36 /* Maximum length for digest (SHA-512 truncated needs 32 bytes) */
37 #define DIGEST_LENGTH_MAX 32
38 static const unsigned auth_blocksize[] = {
50 * Get the blocksize in bytes for a specified authentication algorithm
52 * @Note: this function will not return a valid value for a non-valid
53 * authentication algorithm
55 static inline unsigned
56 get_auth_algo_blocksize(JOB_HASH_ALG algo)
58 return auth_blocksize[algo];
61 static const unsigned auth_truncated_digest_byte_lengths[] = {
75 * Get the IPsec specified truncated length in bytes of the HMAC digest for a
76 * specified authentication algorithm
78 * @Note: this function will not return a valid value for a non-valid
79 * authentication algorithm
81 static inline unsigned
82 get_truncated_digest_byte_length(JOB_HASH_ALG algo)
84 return auth_truncated_digest_byte_lengths[algo];
87 static const unsigned auth_digest_byte_lengths[] = {
100 * Get the output digest size in bytes for a specified authentication algorithm
102 * @Note: this function will not return a valid value for a non-valid
103 * authentication algorithm
105 static inline unsigned
106 get_digest_byte_length(JOB_HASH_ALG algo)
108 return auth_digest_byte_lengths[algo];
111 enum aesni_mb_operation {
112 AESNI_MB_OP_HASH_CIPHER,
113 AESNI_MB_OP_CIPHER_HASH,
114 AESNI_MB_OP_HASH_ONLY,
115 AESNI_MB_OP_CIPHER_ONLY,
116 AESNI_MB_OP_AEAD_HASH_CIPHER,
117 AESNI_MB_OP_AEAD_CIPHER_HASH,
118 AESNI_MB_OP_NOT_SUPPORTED
121 /** private data structure for each virtual AESNI device */
122 struct aesni_mb_private {
123 enum aesni_mb_vector_mode vector_mode;
124 /**< CPU vector instruction set mode */
125 unsigned max_nb_queue_pairs;
126 /**< Max number of queue pairs supported by device */
127 unsigned max_nb_sessions;
128 /**< Max number of sessions supported by device */
131 /** AESNI Multi buffer queue pair */
134 /**< Queue Pair Identifier */
135 char name[RTE_CRYPTODEV_NAME_MAX_LEN];
136 /**< Unique Queue Pair Name */
137 const struct aesni_mb_op_fns *op_fns;
138 /**< Vector mode dependent pointer table of the multi-buffer APIs */
140 /**< Multi-buffer instance */
141 struct rte_ring *ingress_queue;
142 /**< Ring for placing operations ready for processing */
143 struct rte_mempool *sess_mp;
144 /**< Session Mempool */
145 struct rte_cryptodev_stats stats;
146 /**< Queue pair statistics */
148 /**< Index of the next slot to be used in temp_digests,
149 * to store the digest for a given operation
151 uint8_t temp_digests[MAX_JOBS][DIGEST_LENGTH_MAX];
152 /**< Buffers used to store the digest generated
153 * by the driver when verifying a digest provided
154 * by the user (using authentication verify operation)
156 } __rte_cache_aligned;
158 /** AES-NI multi-buffer private session structure */
159 struct aesni_mb_session {
160 JOB_CHAIN_ORDER chain_order;
165 /**< IV parameters */
167 /** Cipher Parameters */
169 /** Cipher direction - encrypt / decrypt */
170 JOB_CIPHER_DIRECTION direction;
171 /** Cipher mode - CBC / Counter */
172 JOB_CIPHER_MODE mode;
174 uint64_t key_length_in_bytes;
177 uint32_t encode[60] __rte_aligned(16);
179 uint32_t decode[60] __rte_aligned(16);
182 /**< Expanded AES keys - Allocating space to
183 * contain the maximum expanded key size which
184 * is 240 bytes for 256 bit AES, calculate by:
185 * ((key size (bytes)) *
186 * ((number of rounds) + 1))
190 /** Authentication Parameters */
192 JOB_HASH_ALG algo; /**< Authentication Algorithm */
193 enum rte_crypto_auth_operation operation;
194 /**< auth operation generate or verify */
197 uint8_t inner[128] __rte_aligned(16);
199 uint8_t outer[128] __rte_aligned(16);
202 /**< HMAC Authentication pads -
203 * allocating space for the maximum pad
204 * size supported which is 128 bytes for
209 uint32_t k1_expanded[44] __rte_aligned(16);
210 /**< k1 (expanded key). */
211 uint8_t k2[16] __rte_aligned(16);
213 uint8_t k3[16] __rte_aligned(16);
218 uint32_t expkey[60] __rte_aligned(16);
219 /**< k1 (expanded key). */
220 uint32_t skey1[4] __rte_aligned(16);
222 uint32_t skey2[4] __rte_aligned(16);
225 /**< Expanded XCBC authentication keys */
232 /** AAD data length */
235 } __rte_cache_aligned;
242 aesni_mb_set_session_parameters(const struct aesni_mb_op_fns *mb_ops,
243 struct aesni_mb_session *sess,
244 const struct rte_crypto_sym_xform *xform);
247 /** device specific operations function pointer structure */
248 extern struct rte_cryptodev_ops *rte_aesni_mb_pmd_ops;
252 #endif /* _RTE_AESNI_MB_PMD_PRIVATE_H_ */