blob: eecbd5f49a404af863e61d1f2abd288f1b19fb02 [file] [log] [blame]
Damjan Marion91f17dc2019-03-18 18:59:25 +01001/*
2 * Copyright (c) 2018 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16#include <stdbool.h>
17#include <vlib/vlib.h>
18#include <vnet/crypto/crypto.h>
19
20vnet_crypto_main_t crypto_main;
21
Damjan Marion085637f2019-04-03 18:39:27 +020022static_always_inline u32
23vnet_crypto_process_ops_call_handler (vlib_main_t * vm,
24 vnet_crypto_main_t * cm,
Damjan Marion060bfb92019-03-29 13:47:54 +010025 vnet_crypto_op_id_t opt,
Damjan Marion085637f2019-04-03 18:39:27 +020026 vnet_crypto_op_t * ops[], u32 n_ops)
27{
28 if (n_ops == 0)
29 return 0;
30
31 if (cm->ops_handlers[opt] == 0)
32 {
Damjan Marionba01f072019-04-05 11:11:04 +020033 while (n_ops--)
Damjan Marion085637f2019-04-03 18:39:27 +020034 {
35 ops[0]->status = VNET_CRYPTO_OP_STATUS_FAIL_NO_HANDLER;
36 ops++;
37 }
38 return 0;
39 }
40
41 return (cm->ops_handlers[opt]) (vm, ops, n_ops);
42}
43
44
Damjan Marion91f17dc2019-03-18 18:59:25 +010045u32
46vnet_crypto_process_ops (vlib_main_t * vm, vnet_crypto_op_t ops[], u32 n_ops)
47{
48 vnet_crypto_main_t *cm = &crypto_main;
Damjan Marion085637f2019-04-03 18:39:27 +020049 const int op_q_size = VLIB_FRAME_SIZE;
50 vnet_crypto_op_t *op_queue[op_q_size];
Damjan Marion060bfb92019-03-29 13:47:54 +010051 vnet_crypto_op_id_t opt, current_op_type = ~0;
Damjan Marion085637f2019-04-03 18:39:27 +020052 u32 n_op_queue = 0;
Damjan Marion91f17dc2019-03-18 18:59:25 +010053 u32 rv = 0, i;
54
Damjan Marion085637f2019-04-03 18:39:27 +020055 ASSERT (n_ops >= 1);
56
Damjan Marion91f17dc2019-03-18 18:59:25 +010057 for (i = 0; i < n_ops; i++)
58 {
Damjan Marion085637f2019-04-03 18:39:27 +020059 opt = ops[i].op;
Damjan Marion91f17dc2019-03-18 18:59:25 +010060
Damjan Marion085637f2019-04-03 18:39:27 +020061 if (current_op_type != opt || n_op_queue >= op_q_size)
62 {
63 rv += vnet_crypto_process_ops_call_handler (vm, cm, current_op_type,
64 op_queue, n_op_queue);
65 n_op_queue = 0;
66 current_op_type = opt;
67 }
68
69 op_queue[n_op_queue++] = &ops[i];
Damjan Marion91f17dc2019-03-18 18:59:25 +010070 }
71
Damjan Marion085637f2019-04-03 18:39:27 +020072 rv += vnet_crypto_process_ops_call_handler (vm, cm, current_op_type,
73 op_queue, n_op_queue);
Damjan Marion91f17dc2019-03-18 18:59:25 +010074 return rv;
75}
76
77u32
78vnet_crypto_register_engine (vlib_main_t * vm, char *name, int prio,
79 char *desc)
80{
81 vnet_crypto_main_t *cm = &crypto_main;
82 vnet_crypto_engine_t *p;
83
84 vec_add2 (cm->engines, p, 1);
85 p->name = name;
86 p->desc = desc;
87 p->priority = prio;
88
Filip Tehlar1469d542019-03-25 09:04:41 -070089 hash_set_mem (cm->engine_index_by_name, p->name, p - cm->engines);
90
Damjan Marion91f17dc2019-03-18 18:59:25 +010091 return p - cm->engines;
92}
93
Filip Tehlar1469d542019-03-25 09:04:41 -070094int
Damjan Marion060bfb92019-03-29 13:47:54 +010095vnet_crypto_set_handler (char *alg_name, char *engine)
Filip Tehlar1469d542019-03-25 09:04:41 -070096{
97 uword *p;
98 vnet_crypto_main_t *cm = &crypto_main;
Damjan Marion060bfb92019-03-29 13:47:54 +010099 vnet_crypto_alg_data_t *ad;
Filip Tehlar1469d542019-03-25 09:04:41 -0700100 vnet_crypto_engine_t *ce;
Damjan Marion060bfb92019-03-29 13:47:54 +0100101 int i;
Filip Tehlar1469d542019-03-25 09:04:41 -0700102
Damjan Marion060bfb92019-03-29 13:47:54 +0100103 p = hash_get_mem (cm->alg_index_by_name, alg_name);
Filip Tehlar1469d542019-03-25 09:04:41 -0700104 if (!p)
105 return -1;
106
Damjan Marion060bfb92019-03-29 13:47:54 +0100107 ad = vec_elt_at_index (cm->algs, p[0]);
Filip Tehlar1469d542019-03-25 09:04:41 -0700108
109 p = hash_get_mem (cm->engine_index_by_name, engine);
110 if (!p)
111 return -1;
112
Damjan Marion060bfb92019-03-29 13:47:54 +0100113 ce = vec_elt_at_index (cm->engines, p[0]);
114
115 for (i = 0; i < VNET_CRYPTO_OP_N_TYPES; i++)
116 {
117 vnet_crypto_op_data_t *od;
118 vnet_crypto_op_id_t id = ad->op_by_type[i];
119 if (id == 0)
120 continue;
121 od = vec_elt_at_index (cm->opt_data, id);
Neale Ranns21ada3b2019-04-11 08:18:34 +0000122 if (ce->ops_handlers[id])
123 {
124 od->active_engine_index = p[0];
125 cm->ops_handlers[id] = ce->ops_handlers[id];
126 }
Damjan Marion060bfb92019-03-29 13:47:54 +0100127 }
Filip Tehlar1469d542019-03-25 09:04:41 -0700128
129 return 0;
130}
131
Damjan Mariond1bed682019-04-24 15:20:35 +0200132void
Damjan Marion91f17dc2019-03-18 18:59:25 +0100133vnet_crypto_register_ops_handler (vlib_main_t * vm, u32 engine_index,
Damjan Marion060bfb92019-03-29 13:47:54 +0100134 vnet_crypto_op_id_t opt,
Damjan Marion91f17dc2019-03-18 18:59:25 +0100135 vnet_crypto_ops_handler_t * fn)
136{
137 vnet_crypto_main_t *cm = &crypto_main;
138 vnet_crypto_engine_t *ae, *e = vec_elt_at_index (cm->engines, engine_index);
Damjan Marion060bfb92019-03-29 13:47:54 +0100139 vnet_crypto_op_data_t *otd = cm->opt_data + opt;
140 vec_validate_aligned (cm->ops_handlers, VNET_CRYPTO_N_OP_IDS - 1,
Damjan Marion91f17dc2019-03-18 18:59:25 +0100141 CLIB_CACHE_LINE_BYTES);
142 e->ops_handlers[opt] = fn;
143
144 if (otd->active_engine_index == ~0)
145 {
146 otd->active_engine_index = engine_index;
147 cm->ops_handlers[opt] = fn;
Damjan Mariond1bed682019-04-24 15:20:35 +0200148 return;
Damjan Marion91f17dc2019-03-18 18:59:25 +0100149 }
150 ae = vec_elt_at_index (cm->engines, otd->active_engine_index);
151 if (ae->priority < e->priority)
152 {
153 otd->active_engine_index = engine_index;
154 cm->ops_handlers[opt] = fn;
155 }
156
Damjan Mariond1bed682019-04-24 15:20:35 +0200157 return;
158}
159
160void
161vnet_crypto_register_key_handler (vlib_main_t * vm, u32 engine_index,
162 vnet_crypto_key_handler_t * key_handler)
163{
164 vnet_crypto_main_t *cm = &crypto_main;
165 vnet_crypto_engine_t *e = vec_elt_at_index (cm->engines, engine_index);
166 e->key_op_handler = key_handler;
167 return;
168}
169
Benoît Gannebe954442019-04-29 16:05:46 +0200170static int
171vnet_crypto_key_len_check (vnet_crypto_alg_t alg, u16 length)
172{
173 switch (alg)
174 {
175 case VNET_CRYPTO_N_ALGS:
176 return 0;
177 case VNET_CRYPTO_ALG_NONE:
178 return 1;
179
180#define _(n, s, l) \
181 case VNET_CRYPTO_ALG_##n: \
182 if ((l) == length) \
183 return 1;
184 foreach_crypto_cipher_alg foreach_crypto_aead_alg
185#undef _
186 /* HMAC allows any key length */
187#define _(n, s) \
188 case VNET_CRYPTO_ALG_HMAC_##n: \
189 return 1;
190 foreach_crypto_hmac_alg
191#undef _
192 }
193
194 return 0;
195}
196
Damjan Mariond1bed682019-04-24 15:20:35 +0200197u32
198vnet_crypto_key_add (vlib_main_t * vm, vnet_crypto_alg_t alg, u8 * data,
199 u16 length)
200{
201 u32 index;
202 vnet_crypto_main_t *cm = &crypto_main;
203 vnet_crypto_engine_t *engine;
204 vnet_crypto_key_t *key;
Benoît Gannebe954442019-04-29 16:05:46 +0200205
206 ASSERT (vnet_crypto_key_len_check (alg, length));
207 if (!vnet_crypto_key_len_check (alg, length))
208 return ~0;
209
Damjan Mariond1bed682019-04-24 15:20:35 +0200210 pool_get_zero (cm->keys, key);
211 index = key - cm->keys;
212 key->alg = alg;
213 vec_validate_aligned (key->data, length - 1, CLIB_CACHE_LINE_BYTES);
214 clib_memcpy (key->data, data, length);
215
216 /* *INDENT-OFF* */
217 vec_foreach (engine, cm->engines)
218 if (engine->key_op_handler)
219 engine->key_op_handler (vm, VNET_CRYPTO_KEY_OP_ADD, index);
220 /* *INDENT-ON* */
221 return index;
222}
223
224void
225vnet_crypto_key_del (vlib_main_t * vm, vnet_crypto_key_index_t index)
226{
227 vnet_crypto_main_t *cm = &crypto_main;
228 vnet_crypto_engine_t *engine;
229 vnet_crypto_key_t *key = pool_elt_at_index (cm->keys, index);
230
231 /* *INDENT-OFF* */
232 vec_foreach (engine, cm->engines)
233 if (engine->key_op_handler)
234 engine->key_op_handler (vm, VNET_CRYPTO_KEY_OP_DEL, index);
235 /* *INDENT-ON* */
236
237 clib_memset (key->data, 0, vec_len (key->data));
238 vec_free (key->data);
239 pool_put (cm->keys, key);
240}
241
242void
243vnet_crypto_key_modify (vlib_main_t * vm, vnet_crypto_key_index_t index,
244 vnet_crypto_alg_t alg, u8 * data, u16 length)
245{
246 vnet_crypto_main_t *cm = &crypto_main;
247 vnet_crypto_engine_t *engine;
248 vnet_crypto_key_t *key = pool_elt_at_index (cm->keys, index);
249
250 if (vec_len (key->data))
251 clib_memset (key->data, 0, vec_len (key->data));
252 vec_free (key->data);
253 vec_validate_aligned (key->data, length - 1, CLIB_CACHE_LINE_BYTES);
254 clib_memcpy (key->data, data, length);
255 key->alg = alg;
256
257 /* *INDENT-OFF* */
258 vec_foreach (engine, cm->engines)
259 if (engine->key_op_handler)
260 engine->key_op_handler (vm, VNET_CRYPTO_KEY_OP_MODIFY, index);
261 /* *INDENT-ON* */
Damjan Marion91f17dc2019-03-18 18:59:25 +0100262}
263
Damjan Marion060bfb92019-03-29 13:47:54 +0100264static void
265vnet_crypto_init_cipher_data (vnet_crypto_alg_t alg, vnet_crypto_op_id_t eid,
266 vnet_crypto_op_id_t did, char *name, u8 is_aead)
267{
268 vnet_crypto_op_type_t eopt, dopt;
269 vnet_crypto_main_t *cm = &crypto_main;
270 cm->algs[alg].name = name;
271 cm->opt_data[eid].alg = cm->opt_data[did].alg = alg;
272 cm->opt_data[eid].active_engine_index = ~0;
273 cm->opt_data[did].active_engine_index = ~0;
274 if (is_aead)
275 {
276 eopt = VNET_CRYPTO_OP_TYPE_AEAD_ENCRYPT;
277 dopt = VNET_CRYPTO_OP_TYPE_AEAD_DECRYPT;
278 }
279 else
280 {
281 eopt = VNET_CRYPTO_OP_TYPE_ENCRYPT;
282 dopt = VNET_CRYPTO_OP_TYPE_DECRYPT;
283 }
284 cm->opt_data[eid].type = eopt;
285 cm->opt_data[did].type = dopt;
286 cm->algs[alg].op_by_type[eopt] = eid;
287 cm->algs[alg].op_by_type[dopt] = did;
288 hash_set_mem (cm->alg_index_by_name, name, alg);
289}
290
291static void
292vnet_crypto_init_hmac_data (vnet_crypto_alg_t alg,
293 vnet_crypto_op_id_t id, char *name)
294{
295 vnet_crypto_main_t *cm = &crypto_main;
296 cm->algs[alg].name = name;
297 cm->algs[alg].op_by_type[VNET_CRYPTO_OP_TYPE_HMAC] = id;
298 cm->opt_data[id].alg = alg;
299 cm->opt_data[id].active_engine_index = ~0;
300 cm->opt_data[id].type = VNET_CRYPTO_OP_TYPE_HMAC;
301 hash_set_mem (cm->alg_index_by_name, name, alg);
302}
303
Damjan Marion91f17dc2019-03-18 18:59:25 +0100304clib_error_t *
305vnet_crypto_init (vlib_main_t * vm)
306{
307 vnet_crypto_main_t *cm = &crypto_main;
308 vlib_thread_main_t *tm = vlib_get_thread_main ();
Filip Tehlar1469d542019-03-25 09:04:41 -0700309 cm->engine_index_by_name = hash_create_string ( /* size */ 0,
310 sizeof (uword));
Damjan Marion060bfb92019-03-29 13:47:54 +0100311 cm->alg_index_by_name = hash_create_string (0, sizeof (uword));
Damjan Marion91f17dc2019-03-18 18:59:25 +0100312 vec_validate_aligned (cm->threads, tm->n_vlib_mains, CLIB_CACHE_LINE_BYTES);
313 vec_validate (cm->algs, VNET_CRYPTO_N_ALGS);
Benoît Gannebe954442019-04-29 16:05:46 +0200314#define _(n, s, l) \
Damjan Marion060bfb92019-03-29 13:47:54 +0100315 vnet_crypto_init_cipher_data (VNET_CRYPTO_ALG_##n, \
316 VNET_CRYPTO_OP_##n##_ENC, \
317 VNET_CRYPTO_OP_##n##_DEC, s, 0);
318 foreach_crypto_cipher_alg;
Damjan Marion91f17dc2019-03-18 18:59:25 +0100319#undef _
Benoît Gannebe954442019-04-29 16:05:46 +0200320#define _(n, s, l) \
Damjan Marion060bfb92019-03-29 13:47:54 +0100321 vnet_crypto_init_cipher_data (VNET_CRYPTO_ALG_##n, \
322 VNET_CRYPTO_OP_##n##_ENC, \
323 VNET_CRYPTO_OP_##n##_DEC, s, 1);
324 foreach_crypto_aead_alg;
Damjan Marion91f17dc2019-03-18 18:59:25 +0100325#undef _
Damjan Marion060bfb92019-03-29 13:47:54 +0100326#define _(n, s) \
327 vnet_crypto_init_hmac_data (VNET_CRYPTO_ALG_HMAC_##n, \
328 VNET_CRYPTO_OP_##n##_HMAC, "hmac-" s);
329 foreach_crypto_hmac_alg;
330#undef _
Damjan Marion91f17dc2019-03-18 18:59:25 +0100331 return 0;
332}
333
334VLIB_INIT_FUNCTION (vnet_crypto_init);
335
336/*
337 * fd.io coding-style-patch-verification: ON
338 *
339 * Local Variables:
340 * eval: (c-set-style "gnu")
341 * End:
342 */