From patchwork Wed Aug 25 08:18:29 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hemant Agrawal X-Patchwork-Id: 502251 Delivered-To: patch@linaro.org Received: by 2002:a02:6f15:0:0:0:0:0 with SMTP id x21csp382267jab; Wed, 25 Aug 2021 01:22:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzVSzan108l4kHaYm2A5id/0wFLosUZ9FmGfdfxPr5HEMOg6jes1w9TF0JMGDqxQ/u+TYq/ X-Received: by 2002:a17:906:150c:: with SMTP id b12mr45135596ejd.275.1629879749841; Wed, 25 Aug 2021 01:22:29 -0700 (PDT) Return-Path: Received: from mails.dpdk.org (mails.dpdk.org. [217.70.189.124]) by mx.google.com with ESMTP id g17si10954703edb.536.2021.08.25.01.22.29; Wed, 25 Aug 2021 01:22:29 -0700 (PDT) Received-SPF: pass (google.com: domain of dev-bounces@dpdk.org designates 217.70.189.124 as permitted sender) client-ip=217.70.189.124; Authentication-Results: mx.google.com; dkim=fail header.i=@nxp.com header.s=selector2 header.b=TWj2A5Sj; arc=fail (signature failed); spf=pass (google.com: domain of dev-bounces@dpdk.org designates 217.70.189.124 as permitted sender) smtp.mailfrom=dev-bounces@dpdk.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 0B8E0411E0; Wed, 25 Aug 2021 10:22:18 +0200 (CEST) Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20041.outbound.protection.outlook.com [40.107.2.41]) by mails.dpdk.org (Postfix) with ESMTP id 08CAD40140 for ; Wed, 25 Aug 2021 10:22:17 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=iZppBtIZtrYuIPQUgYVoAqW4qT5gHkrwa437UbqwcoFUMJ4gREbxqda9ox7ZeXY9N+rdY74kmmNPR1vKkueRalvnMXg/Wv/nAPJisxw58bwHLcIaEFZtALX4irtURIRYnJTAe/z495B2OUD0YAn0fYOb2m0viVqLPgi9xtqXdrEw1e6fPXp1m655SBUCHhTn8k5f2yeOGlPVnsnRZmn7C1PoJkUxFEXy5ezJ0+pYhFHTdlL+AL0CAVclzCvr8ed/3yJRDtiClP6m6Kyez7AZWu/PsJ8EYho7JqoL8NiOPAtBNzNu996o+HB2Mu8kDW8UZgYdPw3Bj7iAXdd1S4HBPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=szKEFX7wKRy9JNlscyzSYNe8o6r5Ua52+9HEk7MCQUI=; b=Je8+iFs6loJhgt4HLQ5FRBHUgKHgkFWzhNpbqzsFXXmvOhmO8bQt9WgziQ9FHeUwQuDGrgGPvGZsSoQoWdKDAbe5TR60S2ObpuLYG6wT4SLooUPVlS9xRyLiUDRCIi37lIPreNq8sebp+0N4maWpQFNVFfppMI/dCz7F09BpwlR1Ytubg46Lds4aRkVNW8TWKGXg4hOZrtJiKKM5JiiVMr1TBjcyBDBWQKIrl6cKN+JBAez/AivX0sOMA20GvjG7FD+eSFP7JJ+iw1nN/2HiJrSGLZ1FIoTUqtKipZur7ZXfQARALMVJpGYItI3FplDvYOHS7wsTqIMcGs3m76MXUg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=szKEFX7wKRy9JNlscyzSYNe8o6r5Ua52+9HEk7MCQUI=; b=TWj2A5SjIB4Wk3CtmoLNQgDTDyJr7vEZgQuAGgaRbHvmd/qa1SFzhk37bmiIfZgIwrYXEeQFAfk2zTk3yZoERVU2oUzjb6pqm22/64+UtyHm0l3cz8ZcjIbwGOMtX6g9epFSs3KyFJ2d+STL3A+tk9d0TYaeykoA6KYRjr6ffFU= Authentication-Results: dpdk.org; dkim=none (message not signed) header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com; Received: from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15) by DU2PR04MB8584.eurprd04.prod.outlook.com (2603:10a6:10:2db::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.17; Wed, 25 Aug 2021 08:22:15 +0000 Received: from DU2PR04MB8630.eurprd04.prod.outlook.com ([fe80::2590:514a:df1f:a793]) by DU2PR04MB8630.eurprd04.prod.outlook.com ([fe80::2590:514a:df1f:a793%8]) with mapi id 15.20.4436.025; Wed, 25 Aug 2021 08:22:15 +0000 From: Hemant Agrawal To: dev@dpdk.org, gakhil@marvell.com Cc: Gagandeep Singh Date: Wed, 25 Aug 2021 13:48:29 +0530 Message-Id: <20210825081837.23830-3-hemant.agrawal@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210825081837.23830-1-hemant.agrawal@nxp.com> References: <20210721073920.21893-1-hemant.agrawal@nxp.com> <20210825081837.23830-1-hemant.agrawal@nxp.com> X-ClientProxiedBy: SG2PR02CA0106.apcprd02.prod.outlook.com (2603:1096:4:92::22) To DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from dpdk-xeon.ap.freescale.net (92.120.0.67) by SG2PR02CA0106.apcprd02.prod.outlook.com (2603:1096:4:92::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.17 via Frontend Transport; Wed, 25 Aug 2021 08:22:13 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 3d668bcd-ed96-4f55-0fd3-08d967a1720c X-MS-TrafficTypeDiagnostic: DU2PR04MB8584: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:4502; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(366004)(376002)(39860400002)(346002)(396003)(6666004)(66556008)(66476007)(1076003)(26005)(8936002)(186003)(52116002)(6486002)(66946007)(6506007)(316002)(5660300002)(2906002)(44832011)(4326008)(36756003)(956004)(8676002)(478600001)(38100700002)(83380400001)(6512007)(38350700002)(2616005)(86362001); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3d668bcd-ed96-4f55-0fd3-08d967a1720c X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8630.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Aug 2021 08:22:15.3446 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: TMAzu9TBjYHD5F/LOeIOtoGswIjt58qw6zIQi6OTLioXpAUvsJJRHXEuWfBi03/EPCSTVo0C+9518fCrxJATVQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR04MB8584 Subject: [dpdk-dev] [PATCH v2 03/11] crypto/dpaa_sec: support non-HMAC auth algos X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Gagandeep Singh This patch add support for non-HMAC, md5, shax algos. Signed-off-by: Gagandeep Singh --- doc/guides/cryptodevs/features/dpaa_sec.ini | 8 +- drivers/crypto/dpaa_sec/dpaa_sec.c | 55 +++++++-- drivers/crypto/dpaa_sec/dpaa_sec.h | 126 ++++++++++++++++++++ 3 files changed, 180 insertions(+), 9 deletions(-) -- 2.17.1 diff --git a/doc/guides/cryptodevs/features/dpaa_sec.ini b/doc/guides/cryptodevs/features/dpaa_sec.ini index 5d0d04d601..eab14da96c 100644 --- a/doc/guides/cryptodevs/features/dpaa_sec.ini +++ b/doc/guides/cryptodevs/features/dpaa_sec.ini @@ -33,11 +33,17 @@ ZUC EEA3 = Y ; Supported authentication algorithms of the 'dpaa_sec' crypto driver. ; [Auth] +MD5 = Y MD5 HMAC = Y +SHA1 = Y SHA1 HMAC = Y +SHA224 = Y SHA224 HMAC = Y +SHA256 = Y SHA256 HMAC = Y +SHA384 = Y SHA384 HMAC = Y +SHA512 = Y SHA512 HMAC = Y SNOW3G UIA2 = Y ZUC EIA3 = Y @@ -53,4 +59,4 @@ AES GCM (256) = Y ; ; Supported Asymmetric algorithms of the 'dpaa_sec' crypto driver. ; -[Asymmetric] \ No newline at end of file +[Asymmetric] diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c index 0a58f4e917..4f5d9d7f49 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec.c @@ -486,6 +486,18 @@ dpaa_sec_prep_cdb(dpaa_sec_session *ses) alginfo_a.algtype = ses->auth_key.alg; alginfo_a.algmode = ses->auth_key.algmode; switch (ses->auth_alg) { + case RTE_CRYPTO_AUTH_MD5: + case RTE_CRYPTO_AUTH_SHA1: + case RTE_CRYPTO_AUTH_SHA224: + case RTE_CRYPTO_AUTH_SHA256: + case RTE_CRYPTO_AUTH_SHA384: + case RTE_CRYPTO_AUTH_SHA512: + shared_desc_len = cnstr_shdsc_hash( + cdb->sh_desc, true, + swap, SHR_NEVER, &alginfo_a, + !ses->dir, + ses->digest_length); + break; case RTE_CRYPTO_AUTH_MD5_HMAC: case RTE_CRYPTO_AUTH_SHA1_HMAC: case RTE_CRYPTO_AUTH_SHA224_HMAC: @@ -2077,43 +2089,70 @@ dpaa_sec_auth_init(struct rte_cryptodev *dev __rte_unused, { session->ctxt = DPAA_SEC_AUTH; session->auth_alg = xform->auth.algo; - session->auth_key.data = rte_zmalloc(NULL, xform->auth.key.length, + session->auth_key.length = xform->auth.key.length; + if (xform->auth.key.length) { + session->auth_key.data = + rte_zmalloc(NULL, xform->auth.key.length, RTE_CACHE_LINE_SIZE); - if (session->auth_key.data == NULL && xform->auth.key.length > 0) { - DPAA_SEC_ERR("No Memory for auth key"); - return -ENOMEM; + if (session->auth_key.data == NULL) { + DPAA_SEC_ERR("No Memory for auth key"); + return -ENOMEM; + } + memcpy(session->auth_key.data, xform->auth.key.data, + xform->auth.key.length); + } - session->auth_key.length = xform->auth.key.length; session->digest_length = xform->auth.digest_length; if (session->cipher_alg == RTE_CRYPTO_CIPHER_NULL) { session->iv.offset = xform->auth.iv.offset; session->iv.length = xform->auth.iv.length; } - memcpy(session->auth_key.data, xform->auth.key.data, - xform->auth.key.length); - switch (xform->auth.algo) { + case RTE_CRYPTO_AUTH_SHA1: + session->auth_key.alg = OP_ALG_ALGSEL_SHA1; + session->auth_key.algmode = OP_ALG_AAI_HASH; + break; case RTE_CRYPTO_AUTH_SHA1_HMAC: session->auth_key.alg = OP_ALG_ALGSEL_SHA1; session->auth_key.algmode = OP_ALG_AAI_HMAC; break; + case RTE_CRYPTO_AUTH_MD5: + session->auth_key.alg = OP_ALG_ALGSEL_MD5; + session->auth_key.algmode = OP_ALG_AAI_HASH; + break; case RTE_CRYPTO_AUTH_MD5_HMAC: session->auth_key.alg = OP_ALG_ALGSEL_MD5; session->auth_key.algmode = OP_ALG_AAI_HMAC; break; + case RTE_CRYPTO_AUTH_SHA224: + session->auth_key.alg = OP_ALG_ALGSEL_SHA224; + session->auth_key.algmode = OP_ALG_AAI_HASH; + break; case RTE_CRYPTO_AUTH_SHA224_HMAC: session->auth_key.alg = OP_ALG_ALGSEL_SHA224; session->auth_key.algmode = OP_ALG_AAI_HMAC; break; + case RTE_CRYPTO_AUTH_SHA256: + session->auth_key.alg = OP_ALG_ALGSEL_SHA256; + session->auth_key.algmode = OP_ALG_AAI_HASH; + break; case RTE_CRYPTO_AUTH_SHA256_HMAC: session->auth_key.alg = OP_ALG_ALGSEL_SHA256; session->auth_key.algmode = OP_ALG_AAI_HMAC; break; + case RTE_CRYPTO_AUTH_SHA384: + session->auth_key.alg = OP_ALG_ALGSEL_SHA384; + session->auth_key.algmode = OP_ALG_AAI_HASH; + break; case RTE_CRYPTO_AUTH_SHA384_HMAC: session->auth_key.alg = OP_ALG_ALGSEL_SHA384; session->auth_key.algmode = OP_ALG_AAI_HMAC; break; + case RTE_CRYPTO_AUTH_SHA512: + session->auth_key.alg = OP_ALG_ALGSEL_SHA512; + session->auth_key.algmode = OP_ALG_AAI_HASH; + break; case RTE_CRYPTO_AUTH_SHA512_HMAC: session->auth_key.alg = OP_ALG_ALGSEL_SHA512; session->auth_key.algmode = OP_ALG_AAI_HMAC; diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h index 9685010f3f..153747c87c 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.h +++ b/drivers/crypto/dpaa_sec/dpaa_sec.h @@ -266,6 +266,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = { }, }, }, }, }, + { /* MD5 */ + .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, + {.sym = { + .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH, + {.auth = { + .algo = RTE_CRYPTO_AUTH_MD5, + .block_size = 64, + .key_size = { + .min = 0, + .max = 0, + .increment = 0 + }, + .digest_size = { + .min = 16, + .max = 16, + .increment = 0 + }, + .iv_size = { 0 } + }, } + }, } + }, { /* MD5 HMAC */ .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, {.sym = { @@ -287,6 +308,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = { }, } }, } }, + { /* SHA1 */ + .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, + {.sym = { + .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH, + {.auth = { + .algo = RTE_CRYPTO_AUTH_SHA1, + .block_size = 64, + .key_size = { + .min = 0, + .max = 0, + .increment = 0 + }, + .digest_size = { + .min = 20, + .max = 20, + .increment = 0 + }, + .iv_size = { 0 } + }, } + }, } + }, { /* SHA1 HMAC */ .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, {.sym = { @@ -308,6 +350,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = { }, } }, } }, + { /* SHA224 */ + .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, + {.sym = { + .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH, + {.auth = { + .algo = RTE_CRYPTO_AUTH_SHA224, + .block_size = 64, + .key_size = { + .min = 0, + .max = 0, + .increment = 0 + }, + .digest_size = { + .min = 28, + .max = 28, + .increment = 0 + }, + .iv_size = { 0 } + }, } + }, } + }, { /* SHA224 HMAC */ .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, {.sym = { @@ -329,6 +392,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = { }, } }, } }, + { /* SHA256 */ + .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, + {.sym = { + .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH, + {.auth = { + .algo = RTE_CRYPTO_AUTH_SHA256, + .block_size = 64, + .key_size = { + .min = 0, + .max = 0, + .increment = 0 + }, + .digest_size = { + .min = 32, + .max = 32, + .increment = 0 + }, + .iv_size = { 0 } + }, } + }, } + }, { /* SHA256 HMAC */ .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, {.sym = { @@ -350,6 +434,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = { }, } }, } }, + { /* SHA384 */ + .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, + {.sym = { + .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH, + {.auth = { + .algo = RTE_CRYPTO_AUTH_SHA384, + .block_size = 64, + .key_size = { + .min = 0, + .max = 0, + .increment = 0 + }, + .digest_size = { + .min = 48, + .max = 48, + .increment = 0 + }, + .iv_size = { 0 } + }, } + }, } + }, { /* SHA384 HMAC */ .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, {.sym = { @@ -371,6 +476,27 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = { }, } }, } }, + { /* SHA512 */ + .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, + {.sym = { + .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH, + {.auth = { + .algo = RTE_CRYPTO_AUTH_SHA512, + .block_size = 128, + .key_size = { + .min = 0, + .max = 0, + .increment = 0 + }, + .digest_size = { + .min = 64, + .max = 64, + .increment = 0 + }, + .iv_size = { 0 } + }, } + }, } + }, { /* SHA512 HMAC */ .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, {.sym = {