From patchwork Sun Jul 30 11:23:00 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jerin Jacob X-Patchwork-Id: 27267 Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [IPv6:::1]) by dpdk.org (Postfix) with ESMTP id 9E3BF99A8; Sun, 30 Jul 2017 13:23:49 +0200 (CEST) Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0053.outbound.protection.outlook.com [104.47.36.53]) by dpdk.org (Postfix) with ESMTP id AB4E099A1; Sun, 30 Jul 2017 13:23:47 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=KEqZXt4ImkSw9KT6aYNYVPSgbfdEyJSszUBp8wehPp0=; b=VdXyRAK0AWDlExRWQDIDyisXxUeZtR7WuTpq7dMTBAzq2HeXPF4Ah6O0aa5O/8qA/QPc8QAzUGR4bwIT5WiCh1ssZeSvPSKSHQkZvCkcVdY5VyVu5KItYBsATCkJKNsJrD36/7ygQVYU2zKcKdiYmd5xzOO2AI7w6lsGMRq/F00= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Jerin.JacobKollanukkaran@cavium.com; Received: from jerin.domain.name (111.93.218.67) by BL2PR07MB2436.namprd07.prod.outlook.com (2a01:111:e400:c754::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1304.22; Sun, 30 Jul 2017 11:23:42 +0000 From: Jerin Jacob To: dev@dpdk.org Cc: pablo.de.lara.guarch@intel.com, thomas@monjalon.net, hemant.agrawal@nxp.com, akhil.goyal@nxp.com, Srisivasubramanian S , stable@dpdk.org Date: Sun, 30 Jul 2017 16:53:00 +0530 Message-Id: <20170730112301.12512-1-jerin.jacob@caviumnetworks.com> X-Mailer: git-send-email 2.13.3 MIME-Version: 1.0 X-Originating-IP: [111.93.218.67] X-ClientProxiedBy: MA1PR01CA0110.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:1::26) To BL2PR07MB2436.namprd07.prod.outlook.com (2a01:111:e400:c754::20) X-MS-Office365-Filtering-Correlation-Id: eec601ab-8bbb-4e89-9dc8-08d4d73d70b6 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(300000503095)(300135400095)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BL2PR07MB2436; X-Microsoft-Exchange-Diagnostics: 1; BL2PR07MB2436; 3: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 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL2PR07MB2436: X-Microsoft-Exchange-Diagnostics: 1; BL2PR07MB2436; 25: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 X-Microsoft-Exchange-Diagnostics: 1; BL2PR07MB2436; 31:HDz8KVI61EU3gvLemhGxV/gsyqv3OZE9ynhNruWog37MnP/91wUanwqbl20vpc4rlWDtkf+9Wu0grRzkSoDYoR4KFKpwlyeCPY2Whq6onP6xR/EochsSIRSiE5n0R27aDIJ9XkNWg3fB/eVWyKTjE3XAWJ9hEq0tAuwPy+rW3Yoa+oOEHyJSgEGd/7jVOT9mLdSk4oEvrnExXKBzLJgRgwTnAI/zhP8D3A24Li7WOU0FxenIKbSI4P3i6iXPNc5xgx7DBBB6M8aoMTtj556zblKePwZoDYy7IKyaYPUFWVQfz95a2AQE6FpZ0b/aar/KJ/AdmJcS7Zg1pDs/5bEB8sMrswpPpkKduX+pXe+JCARKBxwSzD35KNMAmn1ILsVXsTyfgctzkZaFmZuT4iPZm2QEuMYhmehB8eMm3JOqHR71FioktuJV1EMYFUBKlCeBgdpujtdl85M09+vFfP8XOs8zeRBvsUEpY2uPkvQQSqCP23yoF92tUO3Ws9e0hcK2MatgIFTfSfcwpXzhZPf4GHD6lOQdwXAOoFLo0VuljiA71z/EbNLQJ5duwWoBdbR2Q7iQ3lWcz7f3RezfXhiUKYN9Rb/HwnCXFrzXgIfCj6DU4RfFRyGUBPMgtw8ChF2X5vnWqyYPGzSQpmdpsQvNxhez/jrRMYjlRJW0J4etr2c= X-Microsoft-Exchange-Diagnostics: 1; BL2PR07MB2436; 20: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 X-Exchange-Antispam-Report-Test: UriScan:; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(93006095)(100000703101)(100105400095)(3002001)(10201501046)(6041248)(20161123564025)(20161123555025)(20161123560025)(20161123562025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BL2PR07MB2436; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BL2PR07MB2436; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BL2PR07MB2436; 4:nZ3zkPVclJyPFjW8350E3KgZimsgYgD1dlCW0Tz8m7?= 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 X-Forefront-PRVS: 0384275935 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(7370300001)(6009001)(39840400002)(39450400003)(39410400002)(39400400002)(39850400002)(199003)(189002)(7350300001)(42186005)(42882006)(6916009)(2351001)(2906002)(53416004)(106356001)(50986999)(68736007)(2361001)(101416001)(105586002)(66066001)(47776003)(97736004)(189998001)(33646002)(36756003)(5660300001)(50466002)(72206003)(48376002)(50226002)(5009440100003)(6506006)(53936002)(5003940100001)(6116002)(8676002)(3846002)(81156014)(81166006)(110136004)(38730400002)(478600001)(4326008)(69596002)(6512007)(25786009)(6486002)(305945005)(7736002)(6666003)(8656003)(1076002); DIR:OUT; SFP:1101; SCL:1; SRVR:BL2PR07MB2436; H:jerin.domain.name; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; Received-SPF: None (protection.outlook.com: cavium.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BL2PR07MB2436; 23:cC8q46vGTjJl7H74V8EWhDVW0oCsJ61M6dvN1Txvz?= eoWV0YnCToU0b0VE9Cn7uxPcPz3l+nbGAORGqSV+B3AqoYI7hIyXwY2XdYB9gNPN+cNRebDbEQ0554EP9Qx6q2XJ9u9ftmON3Sj2wlw9xyhkrRs+vUXOp+p+ebMN2B8quv7pvUl4CmYVg65CDUevudZdBmyy37DWXnZd2XPaThhDRSfp2I7cBRKC7SEO3BUDhZfkRtOD55GDfSdjLqSh7QdXjf8r2F5wi1zR/Y7R4EuA8VNr6rWP9mhB6a581rVVV4FL4ygPkPS4rGvVNBzGMaIKcKfUljG+C+Y2/SGqLlbMCm3JFy+YAk+6hGmzSwZN2JjVBBuht35rl8BtURjBG4ggtuuveyBinUCw6bE4aSlvGUcGuGxWsQJDT7F8jyipx4g1xXbfgBNlYZ3xPLIF9G+wlmIp7PiltXkJO8GgAjF8zVDDN6CoHFeS4d0HIqGXokQWYTHYM4/8VGMF5L43f0diHOcJUsEFDSNnTa1QhfmLuQe8h0GbCU1dJFE/UBH3U0j2+pb7LPIMcBMPkTTFYSCKoOZ2JvoCRB+JRaStbmAcr0toBOgfDeE2XZxo3RLQVTs2rtxAeEx62w7iqoAiGC+kJRdoiscuvX3oFb3jIG2bN/k9ora8AHbRN9I4q741j5tqkwO1Q9jx+37OF1YahDi5tqV0Zxmlj8NLhKycox7j+y8phOq1qlK1Jz3hKVZHaJXnaUuPG0xWK+JuNSYtAjBhKJpO4oyEH7MrV1C0ySv8M2erPgD2nO7VtpzGzggy1efHnnNk1gfMxB5QDhcwNhXTnN7rMXF8T7+rRbRIuXbqX7nBt/KSk8RPpZYTEyozXjRaofZ6QuCMyXhYmQ4mKTrNGMXLjIaxXSMCEGpjJ9tO2zc+m+L5GsskHerl1yRyX4UH8GA6rndM89dyHkd6OVcMFr133EVpIkmp9TrdB18KqBC189MD8ircQb5wvR30ly/7S0uuV7pM61Wzhpz+M6bgTC3Dx4CDX20Ie+L0zi9wRpwOSAif5655Lbi5QeUw5y3NHn6D+xdWlCCHd7kht+Jq6rDkVdn9PJPHYpeDPbQOcdJ/OsD9cfDWiW10M5bGHn3AMUc4tHEtIk1LrQ9XnZce/Yy/IfqqS477gt4dLNLWewqZytVH70VDV5Te+pzT/s3+B7Lgdv2yye6Jc+T3mFPkNzOMSzo3p98V43VHAPkgENxeXuvBkw3RKo6mENCjOu+BWf7GXTxI/TIFjWfqKn2md2WKTA38VnhWpR7AP1pwISZgscERkIdqS9MGZYMV4arcN+M6pt34avaYkui2pbqr5xlGhs0tyD+Eepyg41koeskAhnVTwM1KjeiW4ZdpPA= X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BL2PR07MB2436; 6:EL8RwX+NtqZ36ErJshqs3dp92e85SdA/Xs8INr2UvJ?= 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 X-Microsoft-Exchange-Diagnostics: 1; BL2PR07MB2436; 5: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; 24:+0/c7VPIyIz57Ec6P7Hk6il5Q1lj4CLVF+ggFEohA+5ZtkVs4piEQndfImD8U/qcGBR5c687qEVy9olYHKHBsd7XHaN6Iq8Ga+tp9omB5Io= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BL2PR07MB2436; 7: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 X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jul 2017 11:23:42.3043 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR07MB2436 Subject: [dpdk-dev] [PATCH 1/2] crypto/armv8: fix authentication session configuration X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Srisivasubramanian S For key sizes greater than digest length, pad with zero rather than computing hash of the key itself. Fixes: 169ca3db550c ("crypto/armv8: add PMD optimized for ARMv8 processors") Cc: stable@dpdk.org Signed-off-by: Srisivasubramanian S --- drivers/crypto/armv8/rte_armv8_pmd.c | 54 ++++++++-------------------- drivers/crypto/armv8/rte_armv8_pmd_private.h | 4 +-- 2 files changed, 16 insertions(+), 42 deletions(-) diff --git a/drivers/crypto/armv8/rte_armv8_pmd.c b/drivers/crypto/armv8/rte_armv8_pmd.c index c3ba439fc..a5c39c9b7 100644 --- a/drivers/crypto/armv8/rte_armv8_pmd.c +++ b/drivers/crypto/armv8/rte_armv8_pmd.c @@ -291,27 +291,14 @@ auth_set_prerequisites(struct armv8_crypto_session *sess, * Generate authentication key, i_key_pad and o_key_pad. */ /* Zero memory under key */ - memset(sess->auth.hmac.key, 0, SHA1_AUTH_KEY_LENGTH); + memset(sess->auth.hmac.key, 0, SHA1_BLOCK_SIZE); - if (xform->auth.key.length > SHA1_AUTH_KEY_LENGTH) { - /* - * In case the key is longer than 160 bits - * the algorithm will use SHA1(key) instead. - */ - error = sha1_block(NULL, xform->auth.key.data, - sess->auth.hmac.key, xform->auth.key.length); - if (error != 0) - return -1; - } else { - /* - * Now copy the given authentication key to the session - * key assuming that the session key is zeroed there is - * no need for additional zero padding if the key is - * shorter than SHA1_AUTH_KEY_LENGTH. - */ - rte_memcpy(sess->auth.hmac.key, xform->auth.key.data, - xform->auth.key.length); - } + /* + * Now copy the given authentication key to the session + * key. + */ + rte_memcpy(sess->auth.hmac.key, xform->auth.key.data, + xform->auth.key.length); /* Prepare HMAC padding: key|pattern */ auth_hmac_pad_prepare(sess, xform); @@ -337,27 +324,14 @@ auth_set_prerequisites(struct armv8_crypto_session *sess, * Generate authentication key, i_key_pad and o_key_pad. */ /* Zero memory under key */ - memset(sess->auth.hmac.key, 0, SHA256_AUTH_KEY_LENGTH); + memset(sess->auth.hmac.key, 0, SHA256_BLOCK_SIZE); - if (xform->auth.key.length > SHA256_AUTH_KEY_LENGTH) { - /* - * In case the key is longer than 256 bits - * the algorithm will use SHA256(key) instead. - */ - error = sha256_block(NULL, xform->auth.key.data, - sess->auth.hmac.key, xform->auth.key.length); - if (error != 0) - return -1; - } else { - /* - * Now copy the given authentication key to the session - * key assuming that the session key is zeroed there is - * no need for additional zero padding if the key is - * shorter than SHA256_AUTH_KEY_LENGTH. - */ - rte_memcpy(sess->auth.hmac.key, xform->auth.key.data, - xform->auth.key.length); - } + /* + * Now copy the given authentication key to the session + * key. + */ + rte_memcpy(sess->auth.hmac.key, xform->auth.key.data, + xform->auth.key.length); /* Prepare HMAC padding: key|pattern */ auth_hmac_pad_prepare(sess, xform); diff --git a/drivers/crypto/armv8/rte_armv8_pmd_private.h b/drivers/crypto/armv8/rte_armv8_pmd_private.h index 679a71af3..d02992a64 100644 --- a/drivers/crypto/armv8/rte_armv8_pmd_private.h +++ b/drivers/crypto/armv8/rte_armv8_pmd_private.h @@ -198,8 +198,8 @@ struct armv8_crypto_session { uint8_t o_key_pad[SHA_BLOCK_MAX] __rte_cache_aligned; /**< outer pad (max supported block length) */ - uint8_t key[SHA_AUTH_KEY_MAX]; - /**< HMAC key (max supported length)*/ + uint8_t key[SHA_BLOCK_MAX]; + /**< HMAC key (max supported block length)*/ } hmac; }; uint16_t digest_length;