Message ID | 1495018174-23937-1-git-send-email-balakrishna.garapati@linaro.org |
---|---|
State | Superseded |
Headers | show |
Balakrishna, On 17.05.2017 13:49, Balakrishna Garapati wrote: > dpdk pmd's require to minatain min, max, inc fields for all > crypto capabilitites. By making iv_len to feature like dpdk pmd's > it is easier to create cipher entires in odp based on key_len. Unless you'd like to express something more comlex than { .key_len = 128, .iv_len = 8 }, { .key_len = 128, .iv_len = 12 }, { .key_len = 192, .iv_len = 8 }, { .key_len = 192, .iv_len = 12 }, { .key_len = 256, .iv_len = 8 }, { .key_len = 256, .iv_len = 12 }, your suggestion adds more complexity. > Signed-off-by: Balakrishna Garapati <balakrishna.garapati@linaro.org> > --- > since v1: fixed comments from v1, > - updated the description about the patch > - Fixed the bug in crypto validation > since v2: if statement correction in validation "check_cipher_options" > > include/odp/api/spec/crypto.h | 12 +++- > platform/linux-generic/odp_crypto.c | 8 +-- > .../validation/api/crypto/odp_crypto_test_inp.c | 81 ++++++---------------- > 3 files changed, 37 insertions(+), 64 deletions(-) > > diff --git a/include/odp/api/spec/crypto.h b/include/odp/api/spec/crypto.h > index c47d314..a1b540a 100644 > --- a/include/odp/api/spec/crypto.h > +++ b/include/odp/api/spec/crypto.h > @@ -497,7 +497,17 @@ typedef struct odp_crypto_cipher_capability_t { > uint32_t key_len; > > /** IV length in bytes */ > - uint32_t iv_len; > + struct { > + /** Minimum iv length in bytes */ > + uint32_t min; > + > + /** Maximum iv length in bytes */ > + uint32_t max; > + > + /** Increment of supported lengths between min and max > + * (in bytes) */ > + uint32_t inc; > + } iv_len; > > } odp_crypto_cipher_capability_t; > > diff --git a/platform/linux-generic/odp_crypto.c b/platform/linux-generic/odp_crypto.c > index a0f3f7e..3e9b607 100644 > --- a/platform/linux-generic/odp_crypto.c > +++ b/platform/linux-generic/odp_crypto.c > @@ -35,16 +35,16 @@ > * Keep sorted: first by key length, then by IV length > */ > static const odp_crypto_cipher_capability_t cipher_capa_des[] = { > -{.key_len = 24, .iv_len = 8} }; > +{.key_len = 24, .iv_len = {.min = 8, .max = 8, .inc = 0} } }; > > static const odp_crypto_cipher_capability_t cipher_capa_trides_cbc[] = { > -{.key_len = 24, .iv_len = 8} }; > +{.key_len = 24, .iv_len = {.min = 8, .max = 8, .inc = 0} } }; > > static const odp_crypto_cipher_capability_t cipher_capa_aes_cbc[] = { > -{.key_len = 16, .iv_len = 16} }; > +{.key_len = 16, .iv_len = {.min = 16, .max = 16, .inc = 0} } }; > > static const odp_crypto_cipher_capability_t cipher_capa_aes_gcm[] = { > -{.key_len = 16, .iv_len = 12} }; > +{.key_len = 16, .iv_len = {.min = 12, .max = 12, .inc = 0} } }; > > /* > * Authentication algorithm capabilities > diff --git a/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c b/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c > index 24ea493..0f98fe5 100644 > --- a/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c > +++ b/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c > @@ -93,10 +93,6 @@ static void alg_test(odp_crypto_op_t op, > odp_crypto_op_param_t op_params; > uint8_t *data_addr; > int data_off; > - odp_crypto_cipher_capability_t cipher_capa[MAX_ALG_CAPA]; > - odp_crypto_auth_capability_t auth_capa[MAX_ALG_CAPA]; > - int num, i; > - int found; > > rc = odp_crypto_capability(&capa); > CU_ASSERT(!rc); > @@ -136,59 +132,6 @@ static void alg_test(odp_crypto_op_t op, > CU_ASSERT(!rc); > CU_ASSERT((~capa.auths.all_bits & capa.hw_auths.all_bits) == 0); > > - num = odp_crypto_cipher_capability(cipher_alg, cipher_capa, > - MAX_ALG_CAPA); > - > - if (cipher_alg != ODP_CIPHER_ALG_NULL) { > - CU_ASSERT(num > 0); > - found = 0; > - } else { > - CU_ASSERT(num == 0); > - found = 1; > - } > - > - CU_ASSERT(num <= MAX_ALG_CAPA); > - > - if (num > MAX_ALG_CAPA) > - num = MAX_ALG_CAPA; > - > - /* Search for the test case */ > - for (i = 0; i < num; i++) { > - if (cipher_capa[i].key_len == cipher_key.length && > - cipher_capa[i].iv_len == ses_iv.length) { > - found = 1; > - break; > - } > - } > - > - CU_ASSERT(found); > - > - num = odp_crypto_auth_capability(auth_alg, auth_capa, MAX_ALG_CAPA); > - > - if (auth_alg != ODP_AUTH_ALG_NULL) { > - CU_ASSERT(num > 0); > - found = 0; > - } else { > - CU_ASSERT(num == 0); > - found = 1; > - } > - > - CU_ASSERT(num <= MAX_ALG_CAPA); > - > - if (num > MAX_ALG_CAPA) > - num = MAX_ALG_CAPA; > - > - /* Search for the test case */ > - for (i = 0; i < num; i++) { > - if (auth_capa[i].digest_len == digest_len && > - auth_capa[i].key_len == auth_key.length) { > - found = 1; > - break; > - } > - } > - > - CU_ASSERT(found); > - Why did you remove auth checks? > /* Create a crypto session */ > odp_crypto_session_param_init(&ses_params); > ses_params.op = op; > @@ -379,14 +322,34 @@ static int check_cipher_options(odp_cipher_alg_t cipher, uint32_t key_len, > { > int i; > int num; > + int found = 0; > + > odp_crypto_cipher_capability_t cipher_capa[MAX_ALG_CAPA]; > > num = odp_crypto_cipher_capability(cipher, cipher_capa, MAX_ALG_CAPA); > CU_ASSERT_FATAL(num >= 1); > > for (i = 0; i < num; i++) { > - if (key_len == cipher_capa[i].key_len && > - iv_len == cipher_capa[i].iv_len) > + uint8_t inc = cipher_capa[i].iv_len.inc; > + uint8_t iv_min = cipher_capa[i].iv_len.min; > + uint8_t iv_max = cipher_capa[i].iv_len.max; > + > + if (inc == 0) { > + if (iv_len == iv_min && > + key_len == cipher_capa[i].key_len) { > + found = 1; > + } > + } else { > + for (uint8_t iv = iv_min; iv <= iv_max; iv = iv + inc) { > + if (iv_len == iv && > + key_len == cipher_capa[i].key_len) { > + found = 1; > + break; > + } > + } > + } > + > + if (found == 1) > break; > } Ugh. So where is actual skip/error if not found check? Also, see, here is added complexity. Instead of a single loop over iv/key lengths array, you now have two nested loops with an additional condition. Bad idea. -- With best wishes Dmitry
On 17 May 2017 at 22:29, Dmitry Eremin-Solenikov < dmitry.ereminsolenikov@linaro.org> wrote: > Balakrishna, > > On 17.05.2017 13:49, Balakrishna Garapati wrote: > > dpdk pmd's require to minatain min, max, inc fields for all > > crypto capabilitites. By making iv_len to feature like dpdk pmd's > > it is easier to create cipher entires in odp based on key_len. > > Unless you'd like to express something more comlex than > { .key_len = 128, .iv_len = 8 }, > { .key_len = 128, .iv_len = 12 }, > { .key_len = 192, .iv_len = 8 }, > { .key_len = 192, .iv_len = 12 }, > { .key_len = 256, .iv_len = 8 }, > { .key_len = 256, .iv_len = 12 }, > > your suggestion adds more complexity. > instead of duplicating key_len's for different iv's I like to make a key based array where the no.of entries can be limited by key_len index and also limit the need to validate key_len for each entry. > > > Signed-off-by: Balakrishna Garapati <balakrishna.garapati@linaro.org> > > --- > > since v1: fixed comments from v1, > > - updated the description about the patch > > - Fixed the bug in crypto validation > > since v2: if statement correction in validation "check_cipher_options" > > > > include/odp/api/spec/crypto.h | 12 +++- > > platform/linux-generic/odp_crypto.c | 8 +-- > > .../validation/api/crypto/odp_crypto_test_inp.c | 81 > ++++++---------------- > > 3 files changed, 37 insertions(+), 64 deletions(-) > > > > diff --git a/include/odp/api/spec/crypto.h > b/include/odp/api/spec/crypto.h > > index c47d314..a1b540a 100644 > > --- a/include/odp/api/spec/crypto.h > > +++ b/include/odp/api/spec/crypto.h > > @@ -497,7 +497,17 @@ typedef struct odp_crypto_cipher_capability_t { > > uint32_t key_len; > > > > /** IV length in bytes */ > > - uint32_t iv_len; > > + struct { > > + /** Minimum iv length in bytes */ > > + uint32_t min; > > + > > + /** Maximum iv length in bytes */ > > + uint32_t max; > > + > > + /** Increment of supported lengths between min and max > > + * (in bytes) */ > > + uint32_t inc; > > + } iv_len; > > > > } odp_crypto_cipher_capability_t; > > > > diff --git a/platform/linux-generic/odp_crypto.c > b/platform/linux-generic/odp_crypto.c > > index a0f3f7e..3e9b607 100644 > > --- a/platform/linux-generic/odp_crypto.c > > +++ b/platform/linux-generic/odp_crypto.c > > @@ -35,16 +35,16 @@ > > * Keep sorted: first by key length, then by IV length > > */ > > static const odp_crypto_cipher_capability_t cipher_capa_des[] = { > > -{.key_len = 24, .iv_len = 8} }; > > +{.key_len = 24, .iv_len = {.min = 8, .max = 8, .inc = 0} } }; > > > > static const odp_crypto_cipher_capability_t cipher_capa_trides_cbc[] = { > > -{.key_len = 24, .iv_len = 8} }; > > +{.key_len = 24, .iv_len = {.min = 8, .max = 8, .inc = 0} } }; > > > > static const odp_crypto_cipher_capability_t cipher_capa_aes_cbc[] = { > > -{.key_len = 16, .iv_len = 16} }; > > +{.key_len = 16, .iv_len = {.min = 16, .max = 16, .inc = 0} } }; > > > > static const odp_crypto_cipher_capability_t cipher_capa_aes_gcm[] = { > > -{.key_len = 16, .iv_len = 12} }; > > +{.key_len = 16, .iv_len = {.min = 12, .max = 12, .inc = 0} } }; > > > > /* > > * Authentication algorithm capabilities > > diff --git a/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c > b/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c > > index 24ea493..0f98fe5 100644 > > --- a/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c > > +++ b/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c > > @@ -93,10 +93,6 @@ static void alg_test(odp_crypto_op_t op, > > odp_crypto_op_param_t op_params; > > uint8_t *data_addr; > > int data_off; > > - odp_crypto_cipher_capability_t cipher_capa[MAX_ALG_CAPA]; > > - odp_crypto_auth_capability_t auth_capa[MAX_ALG_CAPA]; > > - int num, i; > > - int found; > > > > rc = odp_crypto_capability(&capa); > > CU_ASSERT(!rc); > > @@ -136,59 +132,6 @@ static void alg_test(odp_crypto_op_t op, > > CU_ASSERT(!rc); > > CU_ASSERT((~capa.auths.all_bits & capa.hw_auths.all_bits) == 0); > > > > - num = odp_crypto_cipher_capability(cipher_alg, cipher_capa, > > - MAX_ALG_CAPA); > > - > > - if (cipher_alg != ODP_CIPHER_ALG_NULL) { > > - CU_ASSERT(num > 0); > > - found = 0; > > - } else { > > - CU_ASSERT(num == 0); > > - found = 1; > > - } > > - > > - CU_ASSERT(num <= MAX_ALG_CAPA); > > - > > - if (num > MAX_ALG_CAPA) > > - num = MAX_ALG_CAPA; > > - > > - /* Search for the test case */ > > - for (i = 0; i < num; i++) { > > - if (cipher_capa[i].key_len == cipher_key.length && > > - cipher_capa[i].iv_len == ses_iv.length) { > > - found = 1; > > - break; > > - } > > - } > > - > > - CU_ASSERT(found); > > - > > - num = odp_crypto_auth_capability(auth_alg, auth_capa, > MAX_ALG_CAPA); > > - > > - if (auth_alg != ODP_AUTH_ALG_NULL) { > > - CU_ASSERT(num > 0); > > - found = 0; > > - } else { > > - CU_ASSERT(num == 0); > > - found = 1; > > - } > > - > > - CU_ASSERT(num <= MAX_ALG_CAPA); > > - > > - if (num > MAX_ALG_CAPA) > > - num = MAX_ALG_CAPA; > > - > > - /* Search for the test case */ > > - for (i = 0; i < num; i++) { > > - if (auth_capa[i].digest_len == digest_len && > > - auth_capa[i].key_len == auth_key.length) { > > - found = 1; > > - break; > > - } > > - } > > - > > - CU_ASSERT(found); > > - > > Why did you remove auth checks? > > > /* Create a crypto session */ > > odp_crypto_session_param_init(&ses_params); > > ses_params.op = op; > > @@ -379,14 +322,34 @@ static int check_cipher_options(odp_cipher_alg_t > cipher, uint32_t key_len, > > { > > int i; > > int num; > > + int found = 0; > > + > > odp_crypto_cipher_capability_t cipher_capa[MAX_ALG_CAPA]; > > > > num = odp_crypto_cipher_capability(cipher, cipher_capa, > MAX_ALG_CAPA); > > CU_ASSERT_FATAL(num >= 1); > > > > for (i = 0; i < num; i++) { > > - if (key_len == cipher_capa[i].key_len && > > - iv_len == cipher_capa[i].iv_len) > > + uint8_t inc = cipher_capa[i].iv_len.inc; > > + uint8_t iv_min = cipher_capa[i].iv_len.min; > > + uint8_t iv_max = cipher_capa[i].iv_len.max; > > + > > + if (inc == 0) { > > + if (iv_len == iv_min && > > + key_len == cipher_capa[i].key_len) { > > + found = 1; > > + } > > + } else { > > + for (uint8_t iv = iv_min; iv <= iv_max; iv = iv + > inc) { > > + if (iv_len == iv && > > + key_len == cipher_capa[i].key_len) { > > + found = 1; > > + break; > > + } > > + } > > + } > > + > > + if (found == 1) > > break; > > } > > Ugh. So where is actual skip/error if not found check? > it comes after the loop "if (i == num) and the test is skipped before calling alg_test() inside each individual test. > > Also, see, here is added complexity. Instead of a single loop over > iv/key lengths array, you now have two nested loops with an additional > condition. Bad idea. > I suppose you will have the nested loops while creating the entries otherwise. The above loop can be even more simplified by moving the key_len check outside of nested if's so it doesn't need to be checked for all iv entries. /Krishna > > -- > With best wishes > Dmitry >
diff --git a/include/odp/api/spec/crypto.h b/include/odp/api/spec/crypto.h index c47d314..a1b540a 100644 --- a/include/odp/api/spec/crypto.h +++ b/include/odp/api/spec/crypto.h @@ -497,7 +497,17 @@ typedef struct odp_crypto_cipher_capability_t { uint32_t key_len; /** IV length in bytes */ - uint32_t iv_len; + struct { + /** Minimum iv length in bytes */ + uint32_t min; + + /** Maximum iv length in bytes */ + uint32_t max; + + /** Increment of supported lengths between min and max + * (in bytes) */ + uint32_t inc; + } iv_len; } odp_crypto_cipher_capability_t; diff --git a/platform/linux-generic/odp_crypto.c b/platform/linux-generic/odp_crypto.c index a0f3f7e..3e9b607 100644 --- a/platform/linux-generic/odp_crypto.c +++ b/platform/linux-generic/odp_crypto.c @@ -35,16 +35,16 @@ * Keep sorted: first by key length, then by IV length */ static const odp_crypto_cipher_capability_t cipher_capa_des[] = { -{.key_len = 24, .iv_len = 8} }; +{.key_len = 24, .iv_len = {.min = 8, .max = 8, .inc = 0} } }; static const odp_crypto_cipher_capability_t cipher_capa_trides_cbc[] = { -{.key_len = 24, .iv_len = 8} }; +{.key_len = 24, .iv_len = {.min = 8, .max = 8, .inc = 0} } }; static const odp_crypto_cipher_capability_t cipher_capa_aes_cbc[] = { -{.key_len = 16, .iv_len = 16} }; +{.key_len = 16, .iv_len = {.min = 16, .max = 16, .inc = 0} } }; static const odp_crypto_cipher_capability_t cipher_capa_aes_gcm[] = { -{.key_len = 16, .iv_len = 12} }; +{.key_len = 16, .iv_len = {.min = 12, .max = 12, .inc = 0} } }; /* * Authentication algorithm capabilities diff --git a/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c b/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c index 24ea493..0f98fe5 100644 --- a/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c +++ b/test/common_plat/validation/api/crypto/odp_crypto_test_inp.c @@ -93,10 +93,6 @@ static void alg_test(odp_crypto_op_t op, odp_crypto_op_param_t op_params; uint8_t *data_addr; int data_off; - odp_crypto_cipher_capability_t cipher_capa[MAX_ALG_CAPA]; - odp_crypto_auth_capability_t auth_capa[MAX_ALG_CAPA]; - int num, i; - int found; rc = odp_crypto_capability(&capa); CU_ASSERT(!rc); @@ -136,59 +132,6 @@ static void alg_test(odp_crypto_op_t op, CU_ASSERT(!rc); CU_ASSERT((~capa.auths.all_bits & capa.hw_auths.all_bits) == 0); - num = odp_crypto_cipher_capability(cipher_alg, cipher_capa, - MAX_ALG_CAPA); - - if (cipher_alg != ODP_CIPHER_ALG_NULL) { - CU_ASSERT(num > 0); - found = 0; - } else { - CU_ASSERT(num == 0); - found = 1; - } - - CU_ASSERT(num <= MAX_ALG_CAPA); - - if (num > MAX_ALG_CAPA) - num = MAX_ALG_CAPA; - - /* Search for the test case */ - for (i = 0; i < num; i++) { - if (cipher_capa[i].key_len == cipher_key.length && - cipher_capa[i].iv_len == ses_iv.length) { - found = 1; - break; - } - } - - CU_ASSERT(found); - - num = odp_crypto_auth_capability(auth_alg, auth_capa, MAX_ALG_CAPA); - - if (auth_alg != ODP_AUTH_ALG_NULL) { - CU_ASSERT(num > 0); - found = 0; - } else { - CU_ASSERT(num == 0); - found = 1; - } - - CU_ASSERT(num <= MAX_ALG_CAPA); - - if (num > MAX_ALG_CAPA) - num = MAX_ALG_CAPA; - - /* Search for the test case */ - for (i = 0; i < num; i++) { - if (auth_capa[i].digest_len == digest_len && - auth_capa[i].key_len == auth_key.length) { - found = 1; - break; - } - } - - CU_ASSERT(found); - /* Create a crypto session */ odp_crypto_session_param_init(&ses_params); ses_params.op = op; @@ -379,14 +322,34 @@ static int check_cipher_options(odp_cipher_alg_t cipher, uint32_t key_len, { int i; int num; + int found = 0; + odp_crypto_cipher_capability_t cipher_capa[MAX_ALG_CAPA]; num = odp_crypto_cipher_capability(cipher, cipher_capa, MAX_ALG_CAPA); CU_ASSERT_FATAL(num >= 1); for (i = 0; i < num; i++) { - if (key_len == cipher_capa[i].key_len && - iv_len == cipher_capa[i].iv_len) + uint8_t inc = cipher_capa[i].iv_len.inc; + uint8_t iv_min = cipher_capa[i].iv_len.min; + uint8_t iv_max = cipher_capa[i].iv_len.max; + + if (inc == 0) { + if (iv_len == iv_min && + key_len == cipher_capa[i].key_len) { + found = 1; + } + } else { + for (uint8_t iv = iv_min; iv <= iv_max; iv = iv + inc) { + if (iv_len == iv && + key_len == cipher_capa[i].key_len) { + found = 1; + break; + } + } + } + + if (found == 1) break; }
dpdk pmd's require to minatain min, max, inc fields for all crypto capabilitites. By making iv_len to feature like dpdk pmd's it is easier to create cipher entires in odp based on key_len. Signed-off-by: Balakrishna Garapati <balakrishna.garapati@linaro.org> --- since v1: fixed comments from v1, - updated the description about the patch - Fixed the bug in crypto validation since v2: if statement correction in validation "check_cipher_options" include/odp/api/spec/crypto.h | 12 +++- platform/linux-generic/odp_crypto.c | 8 +-- .../validation/api/crypto/odp_crypto_test_inp.c | 81 ++++++---------------- 3 files changed, 37 insertions(+), 64 deletions(-) -- 1.9.1