X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=src%2Fvnet%2Fipsec%2Fesp.h;h=2ab7299d7c8f32b1166d16e35d84fbcb01aac621;hb=4c16d80067b35973ebc5a86d685db52fea2fd052;hp=cc12785aaa4078910b8623114cb27f6ffa25747d;hpb=1f4e1cbf576fc6ab4e871ba0603028112074b43b;p=vpp.git diff --git a/src/vnet/ipsec/esp.h b/src/vnet/ipsec/esp.h index cc12785aaa4..2ab7299d7c8 100644 --- a/src/vnet/ipsec/esp.h +++ b/src/vnet/ipsec/esp.h @@ -21,7 +21,11 @@ typedef struct { - u32 spi; + union + { + u32 spi; + u8 spi_bytes[4]; + }; u32 seq; u8 data[0]; } esp_header_t; @@ -54,9 +58,24 @@ typedef CLIB_PACKED (struct { }) ip6_and_esp_header_t; /* *INDENT-ON* */ +/** + * AES GCM Additional Authentication data + */ +typedef struct esp_aead_t_ +{ + /** + * for GCM: when using ESN it's: + * SPI, seq-hi, seg-low + * else + * SPI, seq-low + */ + u32 data[3]; +} __clib_packed esp_aead_t; + #define ESP_SEQ_MAX (4294967295UL) #define ESP_MAX_BLOCK_SIZE (16) -#define ESP_MAX_ICV_SIZE (16) +#define ESP_MAX_IV_SIZE (16) +#define ESP_MAX_ICV_SIZE (32) u8 *format_esp_header (u8 * s, va_list * args); @@ -64,7 +83,7 @@ u8 *format_esp_header (u8 * s, va_list * args); always_inline int esp_seq_advance (ipsec_sa_t * sa) { - if (PREDICT_TRUE (ipsec_sa_is_set_USE_EXTENDED_SEQ_NUM (sa))) + if (PREDICT_TRUE (ipsec_sa_is_set_USE_ESN (sa))) { if (PREDICT_FALSE (sa->seq == ESP_SEQ_MAX)) { @@ -93,18 +112,17 @@ hmac_calc (vlib_main_t * vm, ipsec_sa_t * sa, u8 * data, int data_len, { vnet_crypto_op_t _op, *op = &_op; - if (PREDICT_FALSE (sa->integ_op_type == 0)) + if (PREDICT_FALSE (sa->integ_op_id == 0)) return 0; - op->op = sa->integ_op_type; - op->key = sa->integ_key.data; - op->key_len = sa->integ_key.len; + vnet_crypto_op_init (op, sa->integ_op_id); + op->key_index = sa->integ_key_index; op->src = data; op->len = data_len; - op->dst = signature; - op->hmac_trunc_len = sa->integ_trunc_size; + op->digest = signature; + op->digest_len = sa->integ_icv_size; - if (ipsec_sa_is_set_USE_EXTENDED_SEQ_NUM (sa)) + if (ipsec_sa_is_set_USE_ESN (sa)) { u32 seq_hi = clib_host_to_net_u32 (sa->seq_hi); @@ -113,9 +131,32 @@ hmac_calc (vlib_main_t * vm, ipsec_sa_t * sa, u8 * data, int data_len, } vnet_crypto_process_ops (vm, op, 1); - return sa->integ_trunc_size; + return sa->integ_icv_size; } +always_inline void +esp_aad_fill (vnet_crypto_op_t * op, + const esp_header_t * esp, const ipsec_sa_t * sa) +{ + esp_aead_t *aad; + + aad = (esp_aead_t *) op->aad; + aad->data[0] = esp->spi; + + if (ipsec_sa_is_set_USE_ESN (sa)) + { + /* SPI, seq-hi, seq-low */ + aad->data[1] = clib_host_to_net_u32 (sa->seq_hi); + aad->data[2] = esp->seq; + op->aad_len = 12; + } + else + { + /* SPI, seq-low */ + aad->data[1] = esp->seq; + op->aad_len = 8; + } +} #endif /* __ESP_H__ */ /*