summaryrefslogtreecommitdiffstats
path: root/src/plugins/crypto_native/main.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/plugins/crypto_native/main.c')
-rw-r--r--src/plugins/crypto_native/main.c135
1 files changed, 135 insertions, 0 deletions
diff --git a/src/plugins/crypto_native/main.c b/src/plugins/crypto_native/main.c
new file mode 100644
index 00000000000..2c03ee20309
--- /dev/null
+++ b/src/plugins/crypto_native/main.c
@@ -0,0 +1,135 @@
+/*
+ *------------------------------------------------------------------
+ * Copyright (c) 2019 Cisco and/or its affiliates.
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ *------------------------------------------------------------------
+ */
+
+#include <vlib/vlib.h>
+#include <vnet/plugin/plugin.h>
+#include <vnet/crypto/crypto.h>
+#include <crypto_native/crypto_native.h>
+
+crypto_native_main_t crypto_native_main;
+
+static void
+crypto_native_key_handler (vlib_main_t * vm, vnet_crypto_key_op_t kop,
+ vnet_crypto_key_index_t idx)
+{
+ vnet_crypto_key_t *key = vnet_crypto_get_key (idx);
+ crypto_native_main_t *cm = &crypto_native_main;
+
+ if (cm->key_fn[key->alg] == 0)
+ return;
+
+ if (kop == VNET_CRYPTO_KEY_OP_DEL)
+ {
+ if (idx >= vec_len (cm->key_data))
+ return;
+
+ if (cm->key_data[idx] == 0)
+ return;
+
+ clib_mem_free_s (cm->key_data[idx]);
+ cm->key_data[idx] = 0;
+ return;
+ }
+
+ vec_validate_aligned (cm->key_data, idx, CLIB_CACHE_LINE_BYTES);
+
+ if (kop == VNET_CRYPTO_KEY_OP_MODIFY && cm->key_data[idx])
+ {
+ clib_mem_free_s (cm->key_data[idx]);
+ }
+
+ cm->key_data[idx] = cm->key_fn[key->alg] (key);
+}
+
+clib_error_t *
+crypto_native_init (vlib_main_t * vm)
+{
+ crypto_native_main_t *cm = &crypto_native_main;
+ vlib_thread_main_t *tm = vlib_get_thread_main ();
+ clib_error_t *error = 0;
+
+ if (clib_cpu_supports_x86_aes () == 0)
+ return 0;
+
+ vec_validate_aligned (cm->per_thread_data, tm->n_vlib_mains - 1,
+ CLIB_CACHE_LINE_BYTES);
+
+ cm->crypto_engine_index =
+ vnet_crypto_register_engine (vm, "native", 100,
+ "Native ISA Optimized Crypto");
+
+ if (clib_cpu_supports_vaes ())
+ error = crypto_native_aes_cbc_init_vaes (vm);
+ else if (clib_cpu_supports_avx512f ())
+ error = crypto_native_aes_cbc_init_avx512 (vm);
+ else if (clib_cpu_supports_avx2 ())
+ error = crypto_native_aes_cbc_init_avx2 (vm);
+ else
+ error = crypto_native_aes_cbc_init_sse42 (vm);
+
+ if (error)
+ goto error;
+
+ if (clib_cpu_supports_pclmulqdq ())
+ {
+ if (clib_cpu_supports_vaes ())
+ error = crypto_native_aes_gcm_init_vaes (vm);
+ else if (clib_cpu_supports_avx512f ())
+ error = crypto_native_aes_gcm_init_avx512 (vm);
+ else if (clib_cpu_supports_avx2 ())
+ error = crypto_native_aes_gcm_init_avx2 (vm);
+ else
+ error = crypto_native_aes_gcm_init_sse42 (vm);
+
+ if (error)
+ goto error;
+ }
+
+ vnet_crypto_register_key_handler (vm, cm->crypto_engine_index,
+ crypto_native_key_handler);
+
+
+error:
+ if (error)
+ vec_free (cm->per_thread_data);
+
+ return error;
+}
+
+/* *INDENT-OFF* */
+VLIB_INIT_FUNCTION (crypto_native_init) =
+{
+ .runs_after = VLIB_INITS ("vnet_crypto_init"),
+};
+/* *INDENT-ON* */
+
+#include <vpp/app/version.h>
+
+/* *INDENT-OFF* */
+VLIB_PLUGIN_REGISTER () = {
+ .version = VPP_BUILD_VER,
+ .description = "Intel IA32 Software Crypto Engine",
+};
+/* *INDENT-ON* */
+
+/*
+ * fd.io coding-style-patch-verification: ON
+ *
+ * Local Variables:
+ * eval: (c-set-style "gnu")
+ * End:
+ */