/* SPDX-License-Identifier: BSD-3-Clause * Copyright(c) 2015 Intel Corporation */ #ifndef _AESNI_MB_OPS_H_ #define _AESNI_MB_OPS_H_ #ifndef LINUX #define LINUX #endif #include /* * IMB_VERSION_NUM macro was introduced in version Multi-buffer 0.50, * so if macro is not defined, it means that the version is 0.49. */ #if !defined(IMB_VERSION_NUM) #define IMB_VERSION(a, b, c) (((a) << 16) + ((b) << 8) + (c)) #define IMB_VERSION_NUM IMB_VERSION(0, 49, 0) #endif enum aesni_mb_vector_mode { RTE_AESNI_MB_NOT_SUPPORTED = 0, RTE_AESNI_MB_SSE, RTE_AESNI_MB_AVX, RTE_AESNI_MB_AVX2, RTE_AESNI_MB_AVX512 }; typedef void (*md5_one_block_t)(const void *data, void *digest); typedef void (*sha1_one_block_t)(const void *data, void *digest); typedef void (*sha224_one_block_t)(const void *data, void *digest); typedef void (*sha256_one_block_t)(const void *data, void *digest); typedef void (*sha384_one_block_t)(const void *data, void *digest); typedef void (*sha512_one_block_t)(const void *data, void *digest); typedef void (*aes_keyexp_128_t) (const void *key, void *enc_exp_keys, void *dec_exp_keys); typedef void (*aes_keyexp_192_t) (const void *key, void *enc_exp_keys, void *dec_exp_keys); typedef void (*aes_keyexp_256_t) (const void *key, void *enc_exp_keys, void *dec_exp_keys); typedef void (*aes_xcbc_expand_key_t) (const void *key, void *exp_k1, void *k2, void *k3); typedef void (*aes_cmac_sub_key_gen_t) (const void *exp_key, void *k2, void *k3); typedef void (*aes_cmac_keyexp_t) (const void *key, void *keyexp); typedef void (*aes_gcm_keyexp_t) (const void *key, struct gcm_key_data *keyexp); /** Multi-buffer library function pointer table */ struct aesni_mb_op_fns { struct { init_mb_mgr_t init_mgr; /**< Initialise scheduler */ get_next_job_t get_next; /**< Get next free job structure */ submit_job_t submit; /**< Submit job to scheduler */ get_completed_job_t get_completed_job; /**< Get completed job */ flush_job_t flush_job; /**< flush jobs from manager */ } job; /**< multi buffer manager functions */ struct { struct { md5_one_block_t md5; /**< MD5 one block hash */ sha1_one_block_t sha1; /**< SHA1 one block hash */ sha224_one_block_t sha224; /**< SHA224 one block hash */ sha256_one_block_t sha256; /**< SHA256 one block hash */ sha384_one_block_t sha384; /**< SHA384 one block hash */ sha512_one_block_t sha512; /**< SHA512 one block hash */ } one_block; /**< one block hash functions */ struct { aes_keyexp_128_t aes128; /**< AES128 key expansions */ aes_keyexp_192_t aes192; /**< AES192 key expansions */ aes_keyexp_256_t aes256; /**< AES256 key expansions */ aes_xcbc_expand_key_t aes_xcbc; /**< AES XCBC key epansions */ aes_cmac_sub_key_gen_t aes_cmac_subkey; /**< AES CMAC subkey expansions */ aes_cmac_keyexp_t aes_cmac_expkey; /**< AES CMAC key expansions */ aes_gcm_keyexp_t aes_gcm_128; /**< AES GCM 128 key expansions */ aes_gcm_keyexp_t aes_gcm_192; /**< AES GCM 192 key expansions */ aes_gcm_keyexp_t aes_gcm_256; /**< AES GCM 256 key expansions */ } keyexp; /**< Key expansion functions */ #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0) struct { hash_fn_t sha1; hash_fn_t sha224; hash_fn_t sha256; hash_fn_t sha384; hash_fn_t sha512; } multi_block; /** multi block hash functions */ #endif } aux; /**< Auxiliary functions */ }; static const struct aesni_mb_op_fns job_ops[] = { [RTE_AESNI_MB_NOT_SUPPORTED] = { .job = { NULL }, .aux = { .one_block = { NULL }, .keyexp = { NULL }, #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0) .multi_block = { NULL } #endif } }, [RTE_AESNI_MB_SSE] = { .job = { init_mb_mgr_sse, get_next_job_sse, submit_job_sse, get_completed_job_sse, flush_job_sse }, .aux = { .one_block = { md5_one_block_sse, sha1_one_block_sse, sha224_one_block_sse, sha256_one_block_sse, sha384_one_block_sse, sha512_one_block_sse }, .keyexp = { aes_keyexp_128_sse, aes_keyexp_192_sse, aes_keyexp_256_sse, aes_xcbc_expand_key_sse, aes_cmac_subkey_gen_sse, aes_keyexp_128_enc_sse, aes_gcm_pre_128_sse, aes_gcm_pre_192_sse, aes_gcm_pre_256_sse }, #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0) .multi_block = { sha1_sse, sha224_sse, sha256_sse, sha384_sse, sha512_sse } #endif } }, [RTE_AESNI_MB_AVX] = { .job = { init_mb_mgr_avx, get_next_job_avx, submit_job_avx, get_completed_job_avx, flush_job_avx }, .aux = { .one_block = { md5_one_block_avx, sha1_one_block_avx, sha224_one_block_avx, sha256_one_block_avx, sha384_one_block_avx, sha512_one_block_avx }, .keyexp = { aes_keyexp_128_avx, aes_keyexp_192_avx, aes_keyexp_256_avx, aes_xcbc_expand_key_avx, aes_cmac_subkey_gen_avx, aes_keyexp_128_enc_avx, aes_gcm_pre_128_avx_gen2, aes_gcm_pre_192_avx_gen2, aes_gcm_pre_256_avx_gen2 }, #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0) .multi_block = { sha1_avx, sha224_avx, sha256_avx, sha384_avx, sha512_avx } #endif } }, [RTE_AESNI_MB_AVX2] = { .job = { init_mb_mgr_avx2, get_next_job_avx2, submit_job_avx2, get_completed_job_avx2, flush_job_avx2 }, .aux = { .one_block = { md5_one_block_avx2, sha1_one_block_avx2, sha224_one_block_avx2, sha256_one_block_avx2, sha384_one_block_avx2, sha512_one_block_avx2 }, .keyexp = { aes_keyexp_128_avx2, aes_keyexp_192_avx2, aes_keyexp_256_avx2, aes_xcbc_expand_key_avx2, aes_cmac_subkey_gen_avx2, aes_keyexp_128_enc_avx2, aes_gcm_pre_128_avx_gen4, aes_gcm_pre_192_avx_gen4, aes_gcm_pre_256_avx_gen4 }, #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0) .multi_block = { sha1_avx2, sha224_avx2, sha256_avx2, sha384_avx2, sha512_avx2 } #endif } }, [RTE_AESNI_MB_AVX512] = { .job = { init_mb_mgr_avx512, get_next_job_avx512, submit_job_avx512, get_completed_job_avx512, flush_job_avx512 }, .aux = { .one_block = { md5_one_block_avx512, sha1_one_block_avx512, sha224_one_block_avx512, sha256_one_block_avx512, sha384_one_block_avx512, sha512_one_block_avx512 }, .keyexp = { aes_keyexp_128_avx512, aes_keyexp_192_avx512, aes_keyexp_256_avx512, aes_xcbc_expand_key_avx512, aes_cmac_subkey_gen_avx512, aes_keyexp_128_enc_avx512, aes_gcm_pre_128_avx_gen4, aes_gcm_pre_192_avx_gen4, aes_gcm_pre_256_avx_gen4 }, #if IMB_VERSION_NUM >= IMB_VERSION(0, 50, 0) .multi_block = { sha1_avx512, sha224_avx512, sha256_avx512, sha384_avx512, sha512_avx512 } #endif } } }; #endif /* _AESNI_MB_OPS_H_ */