2 * Copyright (c) 2015 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
18 #include <vnet/ip/ip.h>
19 #include <vnet/crypto/crypto.h>
20 #include <vnet/ipsec/ipsec.h>
40 typedef CLIB_PACKED (struct {
43 }) ip4_and_esp_header_t;
47 typedef CLIB_PACKED (struct {
51 }) ip4_and_udp_and_esp_header_t;
55 typedef CLIB_PACKED (struct {
58 }) ip6_and_esp_header_t;
62 * AES GCM Additional Authentication data
64 typedef struct esp_aead_t_
67 * for GCM: when using ESN it's:
68 * SPI, seq-hi, seg-low
73 } __clib_packed esp_aead_t;
75 #define ESP_SEQ_MAX (4294967295UL)
76 #define ESP_MAX_BLOCK_SIZE (16)
77 #define ESP_MAX_IV_SIZE (16)
78 #define ESP_MAX_ICV_SIZE (32)
80 u8 *format_esp_header (u8 * s, va_list * args);
82 /* TODO seq increment should be atomic to be accessed by multiple workers */
84 esp_seq_advance (ipsec_sa_t * sa)
86 if (PREDICT_TRUE (ipsec_sa_is_set_USE_ESN (sa)))
88 if (PREDICT_FALSE (sa->seq == ESP_SEQ_MAX))
90 if (PREDICT_FALSE (ipsec_sa_is_set_USE_ANTI_REPLAY (sa) &&
91 sa->seq_hi == ESP_SEQ_MAX))
99 if (PREDICT_FALSE (ipsec_sa_is_set_USE_ANTI_REPLAY (sa) &&
100 sa->seq == ESP_SEQ_MAX))
109 esp_aad_fill (u8 * data, const esp_header_t * esp, const ipsec_sa_t * sa)
113 aad = (esp_aead_t *) data;
114 aad->data[0] = esp->spi;
116 if (ipsec_sa_is_set_USE_ESN (sa))
118 /* SPI, seq-hi, seq-low */
119 aad->data[1] = (u32) clib_host_to_net_u32 (sa->seq_hi);
120 aad->data[2] = esp->seq;
126 aad->data[1] = esp->seq;
132 * The post data structure to for esp_encrypt/decrypt_inline to write to
133 * vib_buffer_t opaque unused field, and for post nodes to pick up after
144 ipsec_sa_flags_t flags;
156 } esp_decrypt_packet_data_t;
158 STATIC_ASSERT_SIZEOF (esp_decrypt_packet_data_t, 3 * sizeof (u64));
160 /* we are forced to store the decrypt post data into 2 separate places -
161 vlib_opaque and opaque2. */
165 u32 free_buffer_index;
167 } esp_decrypt_packet_data2_t;
172 esp_decrypt_packet_data_t decrypt_data;
175 STATIC_ASSERT (sizeof (esp_post_data_t) <=
176 STRUCT_SIZE_OF (vnet_buffer_opaque_t, unused),
177 "Custom meta-data too large for vnet_buffer_opaque_t");
179 #define esp_post_data(b) \
180 ((esp_post_data_t *)((u8 *)((b)->opaque) \
181 + STRUCT_OFFSET_OF (vnet_buffer_opaque_t, unused)))
183 STATIC_ASSERT (sizeof (esp_decrypt_packet_data2_t) <=
184 STRUCT_SIZE_OF (vnet_buffer_opaque2_t, unused),
185 "Custom meta-data too large for vnet_buffer_opaque2_t");
187 #define esp_post_data2(b) \
188 ((esp_decrypt_packet_data2_t *)((u8 *)((b)->opaque2) \
189 + STRUCT_OFFSET_OF (vnet_buffer_opaque2_t, unused)))
193 /* esp post node index for async crypto */
196 u32 esp4_tun_post_next;
197 u32 esp6_tun_post_next;
198 } esp_async_post_next_t;
200 extern esp_async_post_next_t esp_encrypt_async_next;
201 extern esp_async_post_next_t esp_decrypt_async_next;
203 #endif /* __ESP_H__ */
206 * fd.io coding-style-patch-verification: ON
209 * eval: (c-set-style "gnu")