typedef struct
{
- u32 spi;
+ union
+ {
+ u32 spi;
+ u8 spi_bytes[4];
+ };
u32 seq;
u8 data[0];
} esp_header_t;
}) ip6_and_esp_header_t;
/* *INDENT-ON* */
+/**
+ * AES GCM Additional Authentication data
+ */
+typedef struct esp_aead_t_
+{
+ /**
+ * for GCM: when using ESN it's:
+ * SPI, seq-hi, seg-low
+ * else
+ * SPI, seq-low
+ */
+ u32 data[3];
+} __clib_packed esp_aead_t;
+
#define ESP_SEQ_MAX (4294967295UL)
#define ESP_MAX_BLOCK_SIZE (16)
-#define ESP_MAX_ICV_SIZE (16)
+#define ESP_MAX_IV_SIZE (16)
+#define ESP_MAX_ICV_SIZE (32)
u8 *format_esp_header (u8 * s, va_list * args);
return 0;
}
-
-always_inline unsigned int
-hmac_calc (vlib_main_t * vm, ipsec_sa_t * sa, u8 * data, int data_len,
- u8 * signature)
+always_inline void
+esp_aad_fill (vnet_crypto_op_t * op,
+ const esp_header_t * esp, const ipsec_sa_t * sa)
{
- vnet_crypto_op_t _op, *op = &_op;
-
- if (PREDICT_FALSE (sa->integ_op_type == 0))
- return 0;
+ esp_aead_t *aad;
- op->op = sa->integ_op_type;
- op->key = sa->integ_key.data;
- op->key_len = sa->integ_key.len;
- op->src = data;
- op->len = data_len;
- op->dst = signature;
- op->hmac_trunc_len = sa->integ_trunc_size;
+ aad = (esp_aead_t *) op->aad;
+ aad->data[0] = esp->spi;
if (ipsec_sa_is_set_USE_ESN (sa))
{
- u32 seq_hi = clib_host_to_net_u32 (sa->seq_hi);
-
- op->len += 4;
- clib_memcpy (data + data_len, &seq_hi, 4);
+ /* SPI, seq-hi, seq-low */
+ aad->data[1] = clib_host_to_net_u32 (sa->seq_hi);
+ aad->data[2] = esp->seq;
+ op->aad_len = 12;
+ }
+ else
+ {
+ /* SPI, seq-low */
+ aad->data[1] = esp->seq;
+ op->aad_len = 8;
}
-
- vnet_crypto_process_ops (vm, op, 1);
- return sa->integ_trunc_size;
}
-
#endif /* __ESP_H__ */
/*