blob: 4ee14ac11009557347e0f7a4a122088a40636e22 [file] [log] [blame]
/*
* Copyright (c) 2019 Cisco and/or its affiliates.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <stdbool.h>
#include <vlib/vlib.h>
#include <vnet/crypto/crypto.h>
static clib_error_t *
show_crypto_engines_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
vnet_crypto_main_t *cm = &crypto_main;
vnet_crypto_engine_t *p;
if (unformat_user (input, unformat_line_input, line_input))
unformat_free (line_input);
if (vec_len (cm->engines) == 0)
{
vlib_cli_output (vm, "No crypto engines registered");
return 0;
}
vlib_cli_output (vm, "%-20s%-8s%s", "Name", "Prio", "Description");
/* *INDENT-OFF* */
vec_foreach (p, cm->engines)
{
vlib_cli_output (vm, "%-20s%-8u%s", p->name, p->priority, p->desc);
}
/* *INDENT-ON* */
return 0;
}
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (show_crypto_engines_command, static) =
{
.path = "show crypto engines",
.short_help = "show crypto engines",
.function = show_crypto_engines_command_fn,
};
static u8 *
format_vnet_crypto_engine_candidates (u8 * s, va_list * args)
{
vnet_crypto_engine_t *e;
vnet_crypto_main_t *cm = &crypto_main;
u32 id = va_arg (*args, u32);
u32 ei = va_arg (*args, u32);
int is_chained = va_arg (*args, int);
int is_async = va_arg (*args, int);
if (is_async)
{
vec_foreach (e, cm->engines)
{
if (e->enqueue_handlers[id] && e->dequeue_handler)
{
s = format (s, "%U", format_vnet_crypto_engine, e - cm->engines);
if (ei == e - cm->engines)
s = format (s, "%c ", '*');
else
s = format (s, " ");
}
}
return s;
}
else
{
vec_foreach (e, cm->engines)
{
void * h = is_chained ? (void *) e->chained_ops_handlers[id]
: (void *) e->ops_handlers[id];
if (h)
{
s = format (s, "%U", format_vnet_crypto_engine, e - cm->engines);
if (ei == e - cm->engines)
s = format (s, "%c ", '*');
else
s = format (s, " ");
}
}
return s;
}
}
static u8 *
format_vnet_crypto_handlers (u8 * s, va_list * args)
{
vnet_crypto_alg_t alg = va_arg (*args, vnet_crypto_alg_t);
vnet_crypto_main_t *cm = &crypto_main;
vnet_crypto_alg_data_t *d = vec_elt_at_index (cm->algs, alg);
u32 indent = format_get_indent (s);
int i, first = 1;
for (i = 0; i < VNET_CRYPTO_OP_N_TYPES; i++)
{
vnet_crypto_op_data_t *od;
vnet_crypto_op_id_t id = d->op_by_type[i];
if (id == 0)
continue;
od = cm->opt_data + id;
if (first == 0)
s = format (s, "\n%U", format_white_space, indent);
s = format (s, "%-16U", format_vnet_crypto_op_type, od->type);
s = format (s, "%-28U", format_vnet_crypto_engine_candidates, id,
od->active_engine_index_simple, 0, 0);
s = format (s, "%U", format_vnet_crypto_engine_candidates, id,
od->active_engine_index_chained, 1, 0);
first = 0;
}
return s;
}
static clib_error_t *
show_crypto_handlers_command_fn (vlib_main_t * vm,
unformat_input_t * input, vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
int i;
if (unformat_user (input, unformat_line_input, line_input))
unformat_free (line_input);
vlib_cli_output (vm, "%-16s%-16s%-28s%s", "Algo", "Type", "Simple",
"Chained");
for (i = 0; i < VNET_CRYPTO_N_ALGS; i++)
vlib_cli_output (vm, "%-16U%U", format_vnet_crypto_alg, i,
format_vnet_crypto_handlers, i);
return 0;
}
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (show_crypto_handlers_command, static) =
{
.path = "show crypto handlers",
.short_help = "show crypto handlers",
.function = show_crypto_handlers_command_fn,
};
/* *INDENT-ON* */
static clib_error_t *
set_crypto_handler_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
vnet_crypto_main_t *cm = &crypto_main;
int rc = 0;
char **args = 0, *s, **arg, *engine = 0;
int all = 0;
clib_error_t *error = 0;
crypto_op_class_type_t oct = CRYPTO_OP_BOTH;
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "all"))
all = 1;
else if (unformat (line_input, "simple"))
oct = CRYPTO_OP_SIMPLE;
else if (unformat (line_input, "chained"))
oct = CRYPTO_OP_CHAINED;
else if (unformat (line_input, "both"))
oct = CRYPTO_OP_BOTH;
else if (unformat (line_input, "%s", &s))
vec_add1 (args, s);
else
{
error = clib_error_return (0, "invalid params");
goto done;
}
}
if ((vec_len (args) < 2 && !all) || (vec_len (args) == 0 && all))
{
error = clib_error_return (0, "missing cipher or engine!");
goto done;
}
engine = vec_elt_at_index (args, vec_len (args) - 1)[0];
vec_del1 (args, vec_len (args) - 1);
if (all)
{
char *key;
u8 *value;
/* *INDENT-OFF* */
hash_foreach_mem (key, value, cm->alg_index_by_name,
({
(void) value;
rc += vnet_crypto_set_handler2 (key, engine, oct);
}));
/* *INDENT-ON* */
if (rc)
vlib_cli_output (vm, "failed to set crypto engine!");
}
else
{
vec_foreach (arg, args)
{
rc = vnet_crypto_set_handler2 (arg[0], engine, oct);
if (rc)
{
vlib_cli_output (vm, "failed to set engine %s for %s!",
engine, arg[0]);
}
}
}
done:
vec_free (engine);
vec_foreach (arg, args) vec_free (arg[0]);
vec_free (args);
unformat_free (line_input);
return error;
}
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (set_crypto_handler_command, static) =
{
.path = "set crypto handler",
.short_help = "set crypto handler cipher [cipher2 cipher3 ...] engine"
" [simple|chained]",
.function = set_crypto_handler_command_fn,
};
/* *INDENT-ON* */
static u8 *
format_vnet_crypto_async_handlers (u8 * s, va_list * args)
{
vnet_crypto_async_alg_t alg = va_arg (*args, vnet_crypto_async_alg_t);
vnet_crypto_main_t *cm = &crypto_main;
vnet_crypto_async_alg_data_t *d = vec_elt_at_index (cm->async_algs, alg);
u32 indent = format_get_indent (s);
int i, first = 1;
for (i = 0; i < VNET_CRYPTO_ASYNC_OP_N_TYPES; i++)
{
vnet_crypto_async_op_data_t *od;
vnet_crypto_async_op_id_t id = d->op_by_type[i];
if (id == 0)
continue;
od = cm->async_opt_data + id;
if (first == 0)
s = format (s, "\n%U", format_white_space, indent);
s = format (s, "%-16U", format_vnet_crypto_async_op_type, od->type);
s = format (s, "%U", format_vnet_crypto_engine_candidates, id,
od->active_engine_index_async, 0, 1);
first = 0;
}
return s;
}
static clib_error_t *
show_crypto_async_handlers_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
int i;
if (unformat_user (input, unformat_line_input, line_input))
unformat_free (line_input);
vlib_cli_output (vm, "%-28s%-16s%s", "Algo", "Type", "Handler");
for (i = 0; i < VNET_CRYPTO_N_ASYNC_ALGS; i++)
vlib_cli_output (vm, "%-28U%U", format_vnet_crypto_async_alg, i,
format_vnet_crypto_async_handlers, i);
return 0;
}
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (show_crypto_async_handlers_command, static) =
{
.path = "show crypto async handlers",
.short_help = "show crypto async handlers",
.function = show_crypto_async_handlers_command_fn,
};
/* *INDENT-ON* */
static clib_error_t *
show_crypto_async_status_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
vnet_crypto_main_t *cm = &crypto_main;
u32 skip_master = vlib_num_workers () > 0;
vlib_thread_main_t *tm = vlib_get_thread_main ();
unformat_input_t _line_input, *line_input = &_line_input;
int i;
if (unformat_user (input, unformat_line_input, line_input))
unformat_free (line_input);
vlib_cli_output (vm, "Crypto async dispatch mode: %s",
cm->dispatch_mode ==
VNET_CRYPTO_ASYNC_DISPATCH_POLLING ? "POLLING" :
"INTERRUPT");
for (i = skip_master; i < tm->n_vlib_mains; i++)
{
vlib_node_state_t state = vlib_node_get_state (
vlib_get_main_by_index (i), cm->crypto_node_index);
if (state == VLIB_NODE_STATE_POLLING)
vlib_cli_output (vm, "threadId: %-6d POLLING", i);
if (state == VLIB_NODE_STATE_INTERRUPT)
vlib_cli_output (vm, "threadId: %-6d INTERRUPT", i);
if (state == VLIB_NODE_STATE_DISABLED)
vlib_cli_output (vm, "threadId: %-6d DISABLED", i);
}
return 0;
}
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (show_crypto_async_status_command, static) =
{
.path = "show crypto async status",
.short_help = "show crypto async status",
.function = show_crypto_async_status_command_fn,
};
/* *INDENT-ON* */
static clib_error_t *
set_crypto_async_handler_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
unformat_input_t _line_input, *line_input = &_line_input;
vnet_crypto_main_t *cm = &crypto_main;
int rc = 0;
char **args = 0, *s, **arg, *engine = 0;
int all = 0;
clib_error_t *error = 0;
if (!unformat_user (input, unformat_line_input, line_input))
return 0;
while (unformat_check_input (line_input) != UNFORMAT_END_OF_INPUT)
{
if (unformat (line_input, "all"))
all = 1;
else if (unformat (line_input, "%s", &s))
vec_add1 (args, s);
else
{
error = clib_error_return (0, "invalid params");
goto done;
}
}
if ((vec_len (args) < 2 && !all) || (vec_len (args) == 0 && all))
{
error = clib_error_return (0, "missing cipher or engine!");
goto done;
}
engine = vec_elt_at_index (args, vec_len (args) - 1)[0];
vec_del1 (args, vec_len (args) - 1);
if (all)
{
char *key;
u8 *value;
/* *INDENT-OFF* */
hash_foreach_mem (key, value, cm->async_alg_index_by_name,
({
(void) value;
rc += vnet_crypto_set_async_handler2 (key, engine);
}));
/* *INDENT-ON* */
if (rc)
vlib_cli_output (vm, "failed to set crypto engine!");
}
else
{
vec_foreach (arg, args)
{
rc = vnet_crypto_set_async_handler2 (arg[0], engine);
if (rc)
{
vlib_cli_output (vm, "failed to set engine %s for %s!",
engine, arg[0]);
}
}
}
done:
vec_free (engine);
vec_foreach (arg, args) vec_free (arg[0]);
vec_free (args);
unformat_free (line_input);
return error;
}
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (set_crypto_async_handler_command, static) =
{
.path = "set crypto async handler",
.short_help = "set crypto async handler type [type2 type3 ...] engine",
.function = set_crypto_async_handler_command_fn,
};
/* *INDENT-ON* */
static inline void
print_crypto_async_dispatch_warning ()
{
clib_warning ("Switching dispatch mode might not work is some situations.");
clib_warning
("Use 'show crypto async status' to verify that the nodes' states were set");
clib_warning ("and if not, set 'crypto async dispatch' mode again.");
}
static clib_error_t *
set_crypto_async_dispatch_polling_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
print_crypto_async_dispatch_warning ();
vnet_crypto_set_async_dispatch_mode (VNET_CRYPTO_ASYNC_DISPATCH_POLLING);
return 0;
}
static clib_error_t *
set_crypto_async_dispatch_interrupt_command_fn (vlib_main_t * vm,
unformat_input_t * input,
vlib_cli_command_t * cmd)
{
print_crypto_async_dispatch_warning ();
vnet_crypto_set_async_dispatch_mode (VNET_CRYPTO_ASYNC_DISPATCH_INTERRUPT);
return 0;
}
/* *INDENT-OFF* */
VLIB_CLI_COMMAND (set_crypto_async_dispatch_polling_command, static) =
{
.path = "set crypto async dispatch polling",
.short_help = "set crypto async dispatch polling|interrupt",
.function = set_crypto_async_dispatch_polling_command_fn,
};
VLIB_CLI_COMMAND (set_crypto_async_dispatch_interrupt_command, static) =
{
.path = "set crypto async dispatch interrupt",
.short_help = "set crypto async dispatch polling|interrupt",
.function = set_crypto_async_dispatch_interrupt_command_fn,
};
/*
* fd.io coding-style-patch-verification: ON
*
* Local Variables:
* eval: (c-set-style "gnu")
* End:
*/