diff options
Diffstat (limited to '')
-rw-r--r-- | src/spdk/intel-ipsec-mb/gcm.c | 225 |
1 files changed, 225 insertions, 0 deletions
diff --git a/src/spdk/intel-ipsec-mb/gcm.c b/src/spdk/intel-ipsec-mb/gcm.c new file mode 100644 index 000000000..2b8d706a2 --- /dev/null +++ b/src/spdk/intel-ipsec-mb/gcm.c @@ -0,0 +1,225 @@ +/******************************************************************************* + Copyright (c) 2018, Intel Corporation + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions are met: + + * Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + * Neither the name of Intel Corporation nor the names of its contributors + may be used to endorse or promote products derived from this software + without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" + AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE + FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +*******************************************************************************/ + +#include <stdint.h> +#include "intel-ipsec-mb.h" +#include "gcm.h" +#include "noaesni.h" + +/** + * @brief Pre-processes GCM key data + * + * Prefills the gcm key data with key values for each round and + * the initial sub hash key for tag encoding + * + * @param key pointer to key data + * @param key_data GCM expanded key data + * + */ + +void aes_gcm_pre_128_sse(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_128_enc_sse(key, key_data->expanded_keys); + aes_gcm_precomp_128_sse(key_data); +} + +void aes_gcm_pre_128_sse_no_aesni(const void *key, + struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_128_enc_sse_no_aesni(key, key_data->expanded_keys); + aes_gcm_precomp_128_sse_no_aesni(key_data); +} + +void aes_gcm_pre_128_avx_gen2(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_128_enc_avx(key, key_data->expanded_keys); + aes_gcm_precomp_128_avx_gen2(key_data); +} + +void aes_gcm_pre_128_avx_gen4(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_128_enc_avx2(key, key_data->expanded_keys); + aes_gcm_precomp_128_avx_gen4(key_data); +} + +void aes_gcm_pre_128_avx512(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_128_enc_avx2(key, key_data->expanded_keys); + aes_gcm_precomp_128_avx512(key_data); +} + +void aes_gcm_pre_128_vaes_avx512(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_128_enc_avx2(key, key_data->expanded_keys); + aes_gcm_precomp_128_vaes_avx512(key_data); +} + +void aes_gcm_pre_192_sse(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_192_enc_sse(key, key_data->expanded_keys); + aes_gcm_precomp_192_sse(key_data); +} + +void aes_gcm_pre_192_sse_no_aesni(const void *key, + struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_192_enc_sse_no_aesni(key, key_data->expanded_keys); + aes_gcm_precomp_192_sse_no_aesni(key_data); +} + +void aes_gcm_pre_192_avx_gen2(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_192_enc_avx(key, key_data->expanded_keys); + aes_gcm_precomp_192_avx_gen2(key_data); +} + +void aes_gcm_pre_192_avx_gen4(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_192_enc_avx2(key, key_data->expanded_keys); + aes_gcm_precomp_192_avx_gen4(key_data); +} + +void aes_gcm_pre_192_avx512(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_192_enc_avx2(key, key_data->expanded_keys); + aes_gcm_precomp_192_avx512(key_data); +} + +void aes_gcm_pre_192_vaes_avx512(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_192_enc_avx2(key, key_data->expanded_keys); + aes_gcm_precomp_192_vaes_avx512(key_data); +} + +void aes_gcm_pre_256_sse(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_256_enc_sse(key, key_data->expanded_keys); + aes_gcm_precomp_256_sse(key_data); +} + +void aes_gcm_pre_256_sse_no_aesni(const void *key, + struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_256_enc_sse_no_aesni(key, key_data->expanded_keys); + aes_gcm_precomp_256_sse_no_aesni(key_data); +} + +void aes_gcm_pre_256_avx_gen2(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_256_enc_avx(key, key_data->expanded_keys); + aes_gcm_precomp_256_avx_gen2(key_data); +} + +void aes_gcm_pre_256_avx_gen4(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_256_enc_avx2(key, key_data->expanded_keys); + aes_gcm_precomp_256_avx_gen4(key_data); +} + +void aes_gcm_pre_256_avx512(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_256_enc_avx2(key, key_data->expanded_keys); + aes_gcm_precomp_256_avx512(key_data); +} + +void aes_gcm_pre_256_vaes_avx512(const void *key, struct gcm_key_data *key_data) +{ +#ifdef SAFE_PARAM + if (key == NULL || key_data == NULL) + return; +#endif + aes_keyexp_256_enc_avx2(key, key_data->expanded_keys); + aes_gcm_precomp_256_vaes_avx512(key_data); +} |