mirror of
https://github.com/openssl/openssl.git
synced 2024-12-27 06:21:43 +08:00
86c69fe841
In RISC-V we have multiple extensions, that can be used to accelerate processing. The known extensions are defined in riscv_arch.def. From that file test functions of the following form are generated: RISCV_HAS_$ext(). In recent commits new ways to define the availability of these test macros have been defined. E.g.: #define RV32I_ZKND_ZKNE_CAPABLE \ (RISCV_HAS_ZKND() && RISCV_HAS_ZKNE()) [...] #define RV64I_ZKND_ZKNE_CAPABLE \ (RISCV_HAS_ZKND() && RISCV_HAS_ZKNE()) This leaves us with two different APIs to test capabilities. Further, creating the same macros for RV32 and RV64 results in duplicated code (see example above). This inconsistent situation makes it hard to integrate further code. So let's clean this up with the following steps: * Replace RV32I_* and RV64I_* macros by RICSV_HAS_* macros * Move all test macros into riscv_arch.h * Use "AND" and "OR" to combine tests with more than one extension * Rename include files for accelerated processing (remove extension postfix). We end up with compile time tests for RV32/RV64 and run-time tests for available extensions. Adding new routines (e.g. for vector crypto instructions) should be straightforward. Testing showed no regressions. Signed-off-by: Christoph Müllner <christoph.muellner@vrull.eu> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20078)
74 lines
2.2 KiB
C
74 lines
2.2 KiB
C
/*
|
|
* Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
/* AES CCM mode */
|
|
|
|
/*
|
|
* This file uses the low level AES functions (which are deprecated for
|
|
* non-internal use) in order to implement provider AES ciphers.
|
|
*/
|
|
#include "internal/deprecated.h"
|
|
|
|
#include "cipher_aes_ccm.h"
|
|
|
|
#define AES_HW_CCM_SET_KEY_FN(fn_set_enc_key, fn_blk, fn_ccm_enc, fn_ccm_dec) \
|
|
fn_set_enc_key(key, keylen * 8, &actx->ccm.ks.ks); \
|
|
CRYPTO_ccm128_init(&ctx->ccm_ctx, ctx->m, ctx->l, &actx->ccm.ks.ks, \
|
|
(block128_f)fn_blk); \
|
|
ctx->str = ctx->enc ? (ccm128_f)fn_ccm_enc : (ccm128_f)fn_ccm_dec; \
|
|
ctx->key_set = 1;
|
|
|
|
static int ccm_generic_aes_initkey(PROV_CCM_CTX *ctx, const unsigned char *key,
|
|
size_t keylen)
|
|
{
|
|
PROV_AES_CCM_CTX *actx = (PROV_AES_CCM_CTX *)ctx;
|
|
|
|
#ifdef HWAES_CAPABLE
|
|
if (HWAES_CAPABLE) {
|
|
AES_HW_CCM_SET_KEY_FN(HWAES_set_encrypt_key, HWAES_encrypt, NULL, NULL);
|
|
} else
|
|
#endif /* HWAES_CAPABLE */
|
|
|
|
#ifdef VPAES_CAPABLE
|
|
if (VPAES_CAPABLE) {
|
|
AES_HW_CCM_SET_KEY_FN(vpaes_set_encrypt_key, vpaes_encrypt, NULL, NULL);
|
|
} else
|
|
#endif
|
|
{
|
|
AES_HW_CCM_SET_KEY_FN(AES_set_encrypt_key, AES_encrypt, NULL, NULL)
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
static const PROV_CCM_HW aes_ccm = {
|
|
ccm_generic_aes_initkey,
|
|
ossl_ccm_generic_setiv,
|
|
ossl_ccm_generic_setaad,
|
|
ossl_ccm_generic_auth_encrypt,
|
|
ossl_ccm_generic_auth_decrypt,
|
|
ossl_ccm_generic_gettag
|
|
};
|
|
|
|
#if defined(S390X_aes_128_CAPABLE)
|
|
# include "cipher_aes_ccm_hw_s390x.inc"
|
|
#elif defined(AESNI_CAPABLE)
|
|
# include "cipher_aes_ccm_hw_aesni.inc"
|
|
#elif defined(SPARC_AES_CAPABLE)
|
|
# include "cipher_aes_ccm_hw_t4.inc"
|
|
#elif defined(__riscv) && __riscv_xlen == 64
|
|
# include "cipher_aes_ccm_hw_rv64i.inc"
|
|
#elif defined(__riscv) && __riscv_xlen == 32
|
|
# include "cipher_aes_ccm_hw_rv32i.inc"
|
|
#else
|
|
const PROV_CCM_HW *ossl_prov_aes_hw_ccm(size_t keybits)
|
|
{
|
|
return &aes_ccm;
|
|
}
|
|
#endif
|