From patchwork Wed Sep 8 12:01:12 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 98349 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 928DFA0C56; Wed, 8 Sep 2021 14:01:48 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 9E967411DC; Wed, 8 Sep 2021 14:01:42 +0200 (CEST) Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70089.outbound.protection.outlook.com [40.107.7.89]) by mails.dpdk.org (Postfix) with ESMTP id 67D36411A2 for ; Wed, 8 Sep 2021 14:01:41 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=T/tW+SurLK+2S3aYz3bdV3d/kUSvonqvVz6cwrmY5GScsC5vWte5+VgQJ/4/03ymbYI3dhdjQSb4aVVD5f4EwONreenqt+SQXRc04hLE5FCGorc5cvHrbG97QW9y/fQkWG52BIQ8DGtIvb1k+sEQ43zsqqffVgQJsZlJskBi7HSDD47xHBRhROCdn0myfZYCerQ/w+hwoEIxThEe0E/ATP0ASJtRFFLAiHgdjGwCWGpbkKfoZstnQDk+Fcon7OikhSWB6784wuM3kOxniUmFxxHl65tHmN6C8QuCFnVr+1/1g8wPYSe7PWlhs5D3ex8iu95rVnmPCxxKmEJpuV0sEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=JlmYNYqeHVZgViTc55q4RPpxP/+VzgI/Lv8kIAg2QgQ=; b=IgFuYXVvcDR7dBglv1cx9Coaczst2uKo75M4yzUWe4jxdKqFkXWnX96jWpU3Gj3xRy7FjFN3bq7KgoaUPw/jcX/RuXksn3wTC56eRprf59oBnggJrbAeiq1GFihMKUCL1f0XvKxEeg/pK/BvIbF2CCb8vZr0N0VOvMZ9Yh0Ptwwqs+1udUX4VZT6t+Ze0OPTOW4nQySB5h+QuIXPqewLGv94VrDmqt7f/sfKI6RgNfDrQ73bGSm80HbTcqxdHiiSqjqWc2Rg55kIfh1BEG6bZHU+2NE1Wv8yoeU2A1utadljrg9csjg3dur2cDt+O7WWBjC6td2gqDd/aL7jkjvSmg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JlmYNYqeHVZgViTc55q4RPpxP/+VzgI/Lv8kIAg2QgQ=; b=aZxq+29rb4T5+EGhkK6OwueqCuRoQGH3IObkx/rJUGNLQQ03nQXzRvUyEheRZv74pFrYyuzvZrueeIq0PkTj77+fMy/6lfqxUqcsfsNBpY/EY7QFRpm8tgVBK4NQCHKA+/KDD8XRheTJcZzWTfpwlitn3PD71lnlW+iSgULlsOo= Authentication-Results: marvell.com; dkim=none (message not signed) header.d=none;marvell.com; dmarc=none action=none header.from=nxp.com; Received: from VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) by VI1PR04MB6958.eurprd04.prod.outlook.com (2603:10a6:803:137::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.22; Wed, 8 Sep 2021 12:01:40 +0000 Received: from VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7]) by VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7%8]) with mapi id 15.20.4500.015; Wed, 8 Sep 2021 12:01:40 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: thomas@monjalon.net, Hemant Agrawal , Gagandeep Singh Date: Wed, 8 Sep 2021 17:31:12 +0530 Message-Id: <20210908120115.3548009-2-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210908120115.3548009-1-g.singh@nxp.com> References: <20210907085605.3010882-2-g.singh@nxp.com> <20210908120115.3548009-1-g.singh@nxp.com> X-ClientProxiedBy: SG2PR06CA0108.apcprd06.prod.outlook.com (2603:1096:3:14::34) To VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from lsv03457.swis.in-blr01.nxp.com (14.142.151.118) by SG2PR06CA0108.apcprd06.prod.outlook.com (2603:1096:3:14::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14 via Frontend Transport; Wed, 8 Sep 2021 12:01:38 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 8f7be110-c770-4b44-a841-08d972c06aa5 X-MS-TrafficTypeDiagnostic: VI1PR04MB6958: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:7691; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR04MB6960.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(376002)(346002)(366004)(136003)(39860400002)(15650500001)(6486002)(55236004)(86362001)(1006002)(6666004)(38100700002)(38350700002)(26005)(478600001)(66476007)(2906002)(8936002)(956004)(66946007)(54906003)(8676002)(316002)(83380400001)(1076003)(66556008)(5660300002)(4326008)(2616005)(52116002)(7696005)(186003)(36756003)(110426009); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8f7be110-c770-4b44-a841-08d972c06aa5 X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB6960.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Sep 2021 12:01:40.2973 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: SxoWY3jvpYjx55qGAbrTUOpm8XyasyNPNmB9Tg7NGR0muasNt0t0szdpbDkL+sS6 X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB6958 Subject: [dpdk-dev] [PATCH v3 1/4] security: support PDCP short MAC-I X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Hemant Agrawal This patch add support to handle PDCP short MAC-I domain along with standard control and data domains as it has to be treated as special case with PDCP protocol offload support. ShortMAC-I is the 16 least significant bits of calculated MAC-I. Usually when a RRC message is exchanged between UE and eNodeB it is integrity & ciphered protected. MAC-I = f(key, varShortMAC-I, count, bearer, direction). Here varShortMAC-I is prepared by using (current cellId, pci of source cell and C-RNTI of old cell). Other parameters like count, bearer and direction set to all 1. Signed-off-by: Gagandeep Singh Signed-off-by: Hemant Agrawal --- app/test-crypto-perf/cperf_options_parsing.c | 8 ++++++- doc/guides/prog_guide/rte_security.rst | 11 ++++++++- doc/guides/tools/cryptoperf.rst | 4 ++-- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 25 ++++++++++---------- lib/security/rte_security.h | 1 + 5 files changed, 33 insertions(+), 16 deletions(-) diff --git a/app/test-crypto-perf/cperf_options_parsing.c b/app/test-crypto-perf/cperf_options_parsing.c index e84f56cfaa..0348972c85 100644 --- a/app/test-crypto-perf/cperf_options_parsing.c +++ b/app/test-crypto-perf/cperf_options_parsing.c @@ -662,7 +662,8 @@ parse_pdcp_sn_sz(struct cperf_options *opts, const char *arg) const char *cperf_pdcp_domain_strs[] = { [RTE_SECURITY_PDCP_MODE_CONTROL] = "control", - [RTE_SECURITY_PDCP_MODE_DATA] = "data" + [RTE_SECURITY_PDCP_MODE_DATA] = "data", + [RTE_SECURITY_PDCP_MODE_SHORT_MAC] = "short_mac" }; static int @@ -677,6 +678,11 @@ parse_pdcp_domain(struct cperf_options *opts, const char *arg) cperf_pdcp_domain_strs [RTE_SECURITY_PDCP_MODE_DATA], RTE_SECURITY_PDCP_MODE_DATA + }, + { + cperf_pdcp_domain_strs + [RTE_SECURITY_PDCP_MODE_SHORT_MAC], + RTE_SECURITY_PDCP_MODE_SHORT_MAC } }; diff --git a/doc/guides/prog_guide/rte_security.rst b/doc/guides/prog_guide/rte_security.rst index f72bc8a78f..ad92c16868 100644 --- a/doc/guides/prog_guide/rte_security.rst +++ b/doc/guides/prog_guide/rte_security.rst @@ -1,5 +1,5 @@ .. SPDX-License-Identifier: BSD-3-Clause - Copyright 2017,2020 NXP + Copyright 2017,2020-2021 NXP @@ -408,6 +408,15 @@ PMD which supports the IPsec and PDCP protocol. }, .crypto_capabilities = pmd_capabilities }, + { /* PDCP Lookaside Protocol offload short MAC-I */ + .action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL, + .protocol = RTE_SECURITY_PROTOCOL_PDCP, + .pdcp = { + .domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC, + .capa_flags = 0 + }, + .crypto_capabilities = pmd_capabilities + }, { .action = RTE_SECURITY_ACTION_TYPE_NONE } diff --git a/doc/guides/tools/cryptoperf.rst b/doc/guides/tools/cryptoperf.rst index be3109054d..d3963f23e3 100644 --- a/doc/guides/tools/cryptoperf.rst +++ b/doc/guides/tools/cryptoperf.rst @@ -316,9 +316,9 @@ The following are the application command-line options: Set PDCP sequence number size(n) in bits. Valid values of n will be 5/7/12/15/18. -* ``--pdcp-domain `` +* ``--pdcp-domain `` - Set PDCP domain to specify Control/user plane. + Set PDCP domain to specify short_mac/control/user plane. * ``--docsis-hdr-sz `` diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index d6a101499a..b8d57c2b22 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -3104,7 +3104,7 @@ dpaa2_sec_set_pdcp_session(struct rte_cryptodev *dev, struct rte_security_pdcp_xform *pdcp_xform = &conf->pdcp; struct rte_crypto_sym_xform *xform = conf->crypto_xform; struct rte_crypto_auth_xform *auth_xform = NULL; - struct rte_crypto_cipher_xform *cipher_xform; + struct rte_crypto_cipher_xform *cipher_xform = NULL; dpaa2_sec_session *session = (dpaa2_sec_session *)sess; struct ctxt_priv *priv; struct dpaa2_sec_dev_private *dev_priv = dev->data->dev_private; @@ -3136,18 +3136,18 @@ dpaa2_sec_set_pdcp_session(struct rte_cryptodev *dev, flc = &priv->flc_desc[0].flc; /* find xfrm types */ - if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER && xform->next == NULL) { - cipher_xform = &xform->cipher; - } else if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER && - xform->next->type == RTE_CRYPTO_SYM_XFORM_AUTH) { - session->ext_params.aead_ctxt.auth_cipher_text = true; + if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER) { cipher_xform = &xform->cipher; - auth_xform = &xform->next->auth; - } else if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH && - xform->next->type == RTE_CRYPTO_SYM_XFORM_CIPHER) { - session->ext_params.aead_ctxt.auth_cipher_text = false; - cipher_xform = &xform->next->cipher; + if (xform->next != NULL) { + session->ext_params.aead_ctxt.auth_cipher_text = true; + auth_xform = &xform->next->auth; + } + } else if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH) { auth_xform = &xform->auth; + if (xform->next != NULL) { + session->ext_params.aead_ctxt.auth_cipher_text = false; + cipher_xform = &xform->next->cipher; + } } else { DPAA2_SEC_ERR("Invalid crypto type"); return -EINVAL; @@ -3186,7 +3186,8 @@ dpaa2_sec_set_pdcp_session(struct rte_cryptodev *dev, session->pdcp.hfn_threshold = pdcp_xform->hfn_threshold; session->pdcp.hfn_ovd = pdcp_xform->hfn_ovrd; /* hfv ovd offset location is stored in iv.offset value*/ - session->pdcp.hfn_ovd_offset = cipher_xform->iv.offset; + if (cipher_xform) + session->pdcp.hfn_ovd_offset = cipher_xform->iv.offset; cipherdata.key = (size_t)session->cipher_key.data; cipherdata.keylen = session->cipher_key.length; diff --git a/lib/security/rte_security.h b/lib/security/rte_security.h index 88d31de0a6..2e136d7929 100644 --- a/lib/security/rte_security.h +++ b/lib/security/rte_security.h @@ -233,6 +233,7 @@ struct rte_security_macsec_xform { enum rte_security_pdcp_domain { RTE_SECURITY_PDCP_MODE_CONTROL, /**< PDCP control plane */ RTE_SECURITY_PDCP_MODE_DATA, /**< PDCP data plane */ + RTE_SECURITY_PDCP_MODE_SHORT_MAC, /**< PDCP short mac */ }; /** PDCP Frame direction */ From patchwork Wed Sep 8 12:01:13 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 98350 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 83C49A0C56; Wed, 8 Sep 2021 14:01:55 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id D75C4411E9; Wed, 8 Sep 2021 14:01:45 +0200 (CEST) Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80051.outbound.protection.outlook.com [40.107.8.51]) by mails.dpdk.org (Postfix) with ESMTP id 742A54118B for ; Wed, 8 Sep 2021 14:01:44 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gBkiHGajZKesF0N+rhAhdyEE84F1lMf3JbX91O2zKvyBkGb2bKd+TDuX28GdcDT8eSsoSRkiiMQ6GxNSWUJE8GNy519ko2Y5PgCmKSOGiTq+9XhSZ64bYP8+6ZuudzkpXc4pPcCvpPwgwXAzpoNu5eO6uHMDpo/nZEEgs/bDNf3YjCtK9j3s4RXAJTF+zGXrQ/kxgICPEznJg8sdgcDz/3yzZBgOdP6TAgYPbKqlg5cX5MQTVWtRwiXVy8Edoq+/w+sh10TbtM68a/Pl9ftxHEbyo59WifmV8GQ+Q9kBAZIuZHh3hfs/iSYmrvroGDMv0nmvKzAZf0BPxjSD9Gipzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=ov+ZI7Rea0+sTinuL2DIdxiX59moI1ezRA7y9Esdqcw=; b=et5fa19B7FiN8SzygTtF0FkatDtaGEoZYx1g26ctUiYWw5EN0WDUSVjJPy/pzGf/dcOaPtDmNBzJqwOFIUbgdU4m7v96mKFNpOds0yp+Pc51V3LBBoJpdrkDOSYuW85FSVcU/wxYmRM7L5tGaDS4dM+S+CdeOzbL4v44j9xdY8vF1pH2FYCMKBkUMR/rCJFVq4C2cVXv9hjXoOE9e921u6kZzzXbXNEhOHI8anxVDCOWH1MTGm3xRM5X+1EVK6lmh76wQM+xE9R0bdNUF0MuhFyO/UFBADw+Mh/PoLOfVkfCGEzvpsI7xv3QJv1feLVwYIMrw/H2FKL4rQ0Wf/r+vA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ov+ZI7Rea0+sTinuL2DIdxiX59moI1ezRA7y9Esdqcw=; b=Lv+AXS5YFTxwtpXzhuJ0ivT/ShDthMlKTPwUs42lSfZ+Y7/dh+gPqTe0YQLMy8p0hVaeN96gYgV6XldIureKpjsBKeyLVr2xrlZoRJ9uktzPDdqjUL9+k5ZJkTvpX5EEcSMd5M4AFXZCBvBkS8mGxu6tzMM8MbrUPQEVFDNJ6rw= Authentication-Results: marvell.com; dkim=none (message not signed) header.d=none;marvell.com; dmarc=none action=none header.from=nxp.com; Received: from VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) by VI1PR04MB5631.eurprd04.prod.outlook.com (2603:10a6:803:dd::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.19; Wed, 8 Sep 2021 12:01:42 +0000 Received: from VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7]) by VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7%8]) with mapi id 15.20.4500.015; Wed, 8 Sep 2021 12:01:42 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: thomas@monjalon.net, Gagandeep Singh Date: Wed, 8 Sep 2021 17:31:13 +0530 Message-Id: <20210908120115.3548009-3-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210908120115.3548009-1-g.singh@nxp.com> References: <20210907085605.3010882-2-g.singh@nxp.com> <20210908120115.3548009-1-g.singh@nxp.com> X-ClientProxiedBy: SG2PR06CA0108.apcprd06.prod.outlook.com (2603:1096:3:14::34) To VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from lsv03457.swis.in-blr01.nxp.com (14.142.151.118) by SG2PR06CA0108.apcprd06.prod.outlook.com (2603:1096:3:14::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14 via Frontend Transport; Wed, 8 Sep 2021 12:01:40 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 671be98f-e0b4-4914-72e1-08d972c06bf1 X-MS-TrafficTypeDiagnostic: VI1PR04MB5631: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:321; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR04MB6960.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(38350700002)(83380400001)(52116002)(316002)(508600001)(8676002)(66556008)(4326008)(956004)(7696005)(66476007)(66946007)(36756003)(86362001)(8936002)(1006002)(15650500001)(55236004)(5660300002)(2906002)(1076003)(6666004)(38100700002)(26005)(6486002)(2616005)(186003)(110426009); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 671be98f-e0b4-4914-72e1-08d972c06bf1 X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB6960.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Sep 2021 12:01:42.4389 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: zarZ4b3Xu1mfsERqESk6illCg6DdWakLr5QINNXWIou7ePkBRTJoVUx7XP0IWGR4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5631 Subject: [dpdk-dev] [PATCH v3 2/4] test/crypto: add pdcp security short MAC-I support X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" This patch add support to test the pdcp short mac packets support in crypto. Signed-off-by: Gagandeep Singh --- app/test/test_cryptodev.c | 48 ++++++++ ...est_cryptodev_security_pdcp_test_vectors.h | 105 +++++++++++++++++- 2 files changed, 152 insertions(+), 1 deletion(-) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 9e823db1e6..16d770a17f 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -8767,6 +8767,50 @@ test_PDCP_SDAP_PROTO_encap_all(void) return (all_err == TEST_SUCCESS) ? TEST_SUCCESS : TEST_FAILED; } +static int +test_PDCP_PROTO_short_mac(void) +{ + int i = 0, size = 0; + int err, all_err = TEST_SUCCESS; + const struct pdcp_short_mac_test *cur_test; + + size = RTE_DIM(list_pdcp_smac_tests); + + for (i = 0; i < size; i++) { + cur_test = &list_pdcp_smac_tests[i]; + err = test_pdcp_proto( + i, 0, RTE_CRYPTO_CIPHER_OP_ENCRYPT, + RTE_CRYPTO_AUTH_OP_GENERATE, cur_test->data_in, + cur_test->in_len, cur_test->data_out, + cur_test->in_len + ((cur_test->auth_key) ? 4 : 0), + RTE_CRYPTO_CIPHER_NULL, NULL, + 0, cur_test->param.auth_alg, + cur_test->auth_key, cur_test->param.auth_key_len, + 0, cur_test->param.domain, 0, 0, + 0, 0, 0); + if (err) { + printf("\t%d) %s: Short MAC test failed\n", + cur_test->test_idx, + cur_test->param.name); + err = TEST_FAILED; + } else { + printf("\t%d) %s: Short MAC test PASS\n", + cur_test->test_idx, + cur_test->param.name); + rte_hexdump(stdout, "MAC I", + cur_test->data_out + cur_test->in_len + 2, + 2); + err = TEST_SUCCESS; + } + all_err += err; + } + + printf("Success: %d, Failure: %d\n", size + all_err, -all_err); + + return (all_err == TEST_SUCCESS) ? TEST_SUCCESS : TEST_FAILED; + +} + static int test_PDCP_SDAP_PROTO_decap_all(void) { @@ -14039,6 +14083,8 @@ static struct unit_test_suite cryptodev_snow3g_testsuite = { TEST_CASE_ST(ut_setup, ut_teardown, test_snow3g_encryption_test_case_5), + TEST_CASE_ST(ut_setup, ut_teardown, + test_PDCP_PROTO_short_mac), TEST_CASE_ST(ut_setup, ut_teardown, test_snow3g_encryption_test_case_1_oop), TEST_CASE_ST(ut_setup, ut_teardown, @@ -14279,6 +14325,8 @@ static struct unit_test_suite cryptodev_kasumi_testsuite = { TEST_CASE_ST(ut_setup, ut_teardown, test_kasumi_decryption_test_case_1_oop), + TEST_CASE_ST(ut_setup, ut_teardown, + test_PDCP_PROTO_short_mac), TEST_CASE_ST(ut_setup, ut_teardown, test_kasumi_cipher_auth_test_case_1), diff --git a/app/test/test_cryptodev_security_pdcp_test_vectors.h b/app/test/test_cryptodev_security_pdcp_test_vectors.h index 703076479d..81fd6e606b 100644 --- a/app/test/test_cryptodev_security_pdcp_test_vectors.h +++ b/app/test/test_cryptodev_security_pdcp_test_vectors.h @@ -1,7 +1,7 @@ /* SPDX-License-Identifier: BSD-3-Clause * * Copyright (C) 2015-2016 Freescale Semiconductor,Inc. - * Copyright 2018-2019 NXP + * Copyright 2018-2021 NXP */ #ifndef SECURITY_PDCP_TEST_VECTOR_H_ @@ -28,6 +28,109 @@ struct pdcp_test_param { const char *name; }; +struct pdcp_short_mac_test { + uint32_t test_idx; + struct pdcp_short_mac_test_param { + enum rte_security_pdcp_domain domain; + enum rte_crypto_auth_algorithm auth_alg; + uint8_t auth_key_len; + const char *name; + } param; + const uint8_t *auth_key; + const uint8_t *data_in; + uint32_t in_len; + const uint8_t *data_out; +}; + +static const struct pdcp_short_mac_test list_pdcp_smac_tests[] = { + { + .test_idx = 1, + .param = {.name = "PDCP-SMAC SNOW3G UIA2", + .auth_alg = RTE_CRYPTO_AUTH_SNOW3G_UIA2, + .domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC, + .auth_key_len = 16, + }, + .auth_key = (uint8_t[]){ 0x2b, 0xd6, 0x45, 0x9f, 0x82, 0xc5, + 0xb3, 0x00, 0x95, 0x2c, 0x49, 0x10, + 0x48, 0x81, 0xff, 0x48 }, + .data_in = (uint8_t[]){ 0x33, 0x32, 0x34, 0x62, 0x63, 0x39, + 0x38 }, + .in_len = 7, + .data_out = (uint8_t[]){ 0x33, 0x32, 0x34, 0x62, 0x63, 0x39, + 0x38, 0x56, 0xd2, 0x09, 0xae }, + }, + + { + .test_idx = 2, + .param = {.name = "PDCP-SMAC AES CMAC 1", + .auth_alg = RTE_CRYPTO_AUTH_AES_CMAC, + .domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC, + .auth_key_len = 16, + }, + .auth_key = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x00, 0x00, 0x00 }, + .data_in = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00 }, + .in_len = 7, + .data_out = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x13, 0xf8, 0x4b, 0xea }, + }, + + { + .test_idx = 3, + .param = {.name = "PDCP-SMAC AES CMAC 2", + .auth_alg = RTE_CRYPTO_AUTH_AES_CMAC, + .domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC, + .auth_key_len = 16, + }, + .auth_key = (uint8_t[]){ 0x16, 0xc1, 0x98, 0x14, 0x9a, 0x2c, + 0xf4, 0x12, 0x4f, 0xd4, 0x14, 0xec, + 0x72, 0x43, 0x29, 0x04 }, + .data_in = (uint8_t[]){ 0x00, 0xc0, 0x00, 0x00, 0x00, 0x05, + 0x09, 0xe4 }, + .in_len = 8, + .data_out = (uint8_t[]){ 0x00, 0xc0, 0x00, 0x00, 0x00, 0x05, + 0x09, 0xe4, 0xdd, 0xff, 0xde, 0xa9 }, + }, + + { + .test_idx = 4, + .param = {.name = "PDCP-SMAC AES CMAC 3", + .auth_alg = RTE_CRYPTO_AUTH_AES_CMAC, + .domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC, + .auth_key_len = 16, + }, + .auth_key = (uint8_t[]){ 0xD3, 0xC5, 0xD5, 0x92, 0x32, 0x7F, + 0xB1, 0x1C, 0x40, 0x35, 0xC6, 0x68, + 0x0A, 0xF8, 0xC6, 0xD3 }, + .data_in = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00 }, + .in_len = 7, + .data_out = (uint8_t[]){ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0x00, 0x23, 0xea, 0x95, 0xb0 }, + }, + + { + .test_idx = 5, + .param = {.name = "PDCP-SMAC NULL", + .auth_alg = RTE_CRYPTO_AUTH_NULL, + .domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC, + .auth_key_len = 16, + }, + .auth_key = (uint8_t[]){ 0x2B, 0xD6, 0x45, 0x9F, 0x82, 0xC5, + 0xB3, 0x00, 0x95, 0x2C, 0x49, 0x10, + 0x48, 0x81, 0xFF, 0x48 + }, + .data_in = (uint8_t[]){ 0x33, 0x32, 0x34, 0x62, 0x63, 0x39, + 0x38 }, + .in_len = 7, + .data_out = (uint8_t[]){ 0x33, 0x32, 0x34, 0x62, 0x63, 0x39, + 0x38, 0x00, 0x00, 0x00, 0x00 }, + }, + +}; + static struct pdcp_test_param pdcp_test_params[] = { { .name = From patchwork Wed Sep 8 12:01:14 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 98351 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id BEE59A0C56; Wed, 8 Sep 2021 14:02:01 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 48B7B411F4; Wed, 8 Sep 2021 14:01:47 +0200 (CEST) Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70042.outbound.protection.outlook.com [40.107.7.42]) by mails.dpdk.org (Postfix) with ESMTP id C6F804118B for ; Wed, 8 Sep 2021 14:01:45 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IJii2aRJ9bw2VGVCBDTcyyHQvlqsSfKgbCSeq9EXt+pQ5ldPO7u4cznJVkXld17IqYDeEKBeSmLnzqj+kRddVhx3Pod8YNSJHq/xKvoe55dwkGMKcO+2JY7qz47sjIJcUIhxgIVTYOshFoN3V3dPcbewZqO41OzgSf3OtWdbVybZ2wbmPAccj6A05im2I3xR1XX3jMdVaGHnN1AR59hnazP3B8CCKISKDrYVUywwbd+N8iGxi9tF0PMm1qqEsOog0neexr/IHnOzORHYdf4LZzlwXHqkL/bJg8beO8eRvcnep04YJTh/8hN5HxdoocsUiN7uS5Vp+H0h8Qne6Yuakg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=rbxb10810qsG1i1jLWpshTYn+bUduU96EX+94uXlgkc=; b=VIj4HUoG2ujEieh0CD6wehJK2PqlH7+4ztqrLrLWbqVo4Pmw0KaRsbJb1SupSQeku4OMbvlLRa02H4Wv9uOSHUxBMWX5o7BIID+VFYpPCXAF+wJMlXC+zPg7PEazsLMMQB3cS0NRcU2T0BRMg2yKDPallIXHDbp3pGSNqJt5Y9RHI6Q5iNhpZKcgJdd43pt27Lyt7LriCPObxzDwUH11H+U/8YksHhnGgJEWtyM6PFA2ILkXn7xIoj8QQpNTgwOixz/jZjPLu3MvTYhliH9qBudua2RB1QJhhjlzcZT6huV6nNY0it4Vn//xs5cNW8emxqRPKSj4b/JAthICdNJVWw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rbxb10810qsG1i1jLWpshTYn+bUduU96EX+94uXlgkc=; b=RkgE49yE0X5BZeqYWdyfxU9mvAaXtwQzX7kSmdAfzy54kpY/qMQsxOvsMfpBGciTzHEM3Jctb/sAFr+SF4Xv0p8pfkYC1Tb1HkMk/ZIGd/V2UVdVAjyQc1jyNcDAiK8guyhd7cpeQXryOFps8ntLsfrysI7qfg/kcW3INAuEHvI= Authentication-Results: marvell.com; dkim=none (message not signed) header.d=none;marvell.com; dmarc=none action=none header.from=nxp.com; Received: from VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) by VI1PR04MB6958.eurprd04.prod.outlook.com (2603:10a6:803:137::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.22; Wed, 8 Sep 2021 12:01:44 +0000 Received: from VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7]) by VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7%8]) with mapi id 15.20.4500.015; Wed, 8 Sep 2021 12:01:44 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: thomas@monjalon.net, Gagandeep Singh Date: Wed, 8 Sep 2021 17:31:14 +0530 Message-Id: <20210908120115.3548009-4-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210908120115.3548009-1-g.singh@nxp.com> References: <20210907085605.3010882-2-g.singh@nxp.com> <20210908120115.3548009-1-g.singh@nxp.com> X-ClientProxiedBy: SG2PR06CA0108.apcprd06.prod.outlook.com (2603:1096:3:14::34) To VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from lsv03457.swis.in-blr01.nxp.com (14.142.151.118) by SG2PR06CA0108.apcprd06.prod.outlook.com (2603:1096:3:14::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14 via Frontend Transport; Wed, 8 Sep 2021 12:01:42 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: db542d5b-cc53-4fc4-e5e1-08d972c06d39 X-MS-TrafficTypeDiagnostic: VI1PR04MB6958: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:1122; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR04MB6960.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(376002)(346002)(366004)(136003)(39860400002)(6486002)(55236004)(86362001)(1006002)(6666004)(38100700002)(38350700002)(26005)(478600001)(66476007)(2906002)(8936002)(956004)(66946007)(8676002)(316002)(83380400001)(1076003)(66556008)(5660300002)(4326008)(2616005)(52116002)(7696005)(186003)(36756003)(110426009); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: mlcNBa1DVOWWR3ods/Uhzv4qsxn7PV116Jm2fe43nWEG7miKkQv+ymm2og46BWVgYDyURP3sELEQ4l+nh7Sv1LaqQPxR0258LJm1q14YS2oSm0R1JFvbU3epaeBiaQQwOduGxhVGRWllMG4Kpcvg0w1kNlQG8y6SBvLHCko0ZRaYMcPSwZbPePoh612JgLi2Mtw15wP/MoIIukTGwomCqiHkAbJl9DUd2CVIQ5MDdG79ijS6MJfpRnD2jSsYHoJjvTMOhaVz9+D1dd2t67E4b4fmDHCsnY+4AINDtfahTyBbu7ZGV4DXGd4EyAJ/5fnUb74/AZLzxGHgXwLvU+pkkCgZJ1+4n0oju5CKCPToeacGrxEJXk9TXgj20/kEf8j2IA2NtmY1v9rTqsylj1YnqXxLS2zRegeyyraFd8QTM9Drz3l4XRXqPRhAiNA3AqBTpiZn3Av9bYYAHKBOl6EwBvrXrJNFpH7pBbgjPXZxHNbI4rh1BvNg5JN7tinY4L0U0CP5aBsAearEX5wmo3azRk1XE7CaXuwrBaYA4piTnUnlbkyR+LWWOWfG38AtAvvPdgVLFSsXuI6QPtekOWoykf8I8vTbszbk0Eny5EXkI8A5UskfumA9YAWgop8qZzHAxEdjnbO8Lav8yEzI2rxNIFBiSxOBD0YpdNPt2gDqL/mEu4oBAmdc76k5YO9P6mi5DMK8bXYC1ffZDnUx7OAvKI2NdSlV1zelNqoy1u6Wa+HDmQK0L/G2dRT7j+ZBNE/6j5vpLfElHju58M6z3TthHMcOA773zM9oWkbit+Su1GWoNJgZjPzCxezqhHKCwBPWwLL9gKbzBj6L5e/JchdaDsudv08k0DdzilT8aoLs67dSUIiaHSvVUb3Xs+mYT55EeRimuchCxyF6TPpOU/scQpzOX1fGbKsV3MIggNP37nnlqqWlbgRixCxQeWjCgCsITF3f1bynWlfxltd5kgnyFal1wVK9ySy9LFHZTZwoXAVxCklplo+v8kzhsJX38asF7mGv0JgAbvFZwLObJ7o0jqa1ZXKOUOJ/NNZEN2zy5dv1Oe7bRloK2EIM3PulX3DbMD0YcC2/xkFuPikagcpz2wVXSYAWfW8F9UalYVVzoeBmHuaeR/hgPzh8IKOe/ebxPClJyRTedoPfXFXuiyevGlB5HLoex6RWHnON0QSO0UYLxVgsZeUeixOlan1P+tAbFIVSgBtPhcLHCWgNzb74quNxo+EM8rNe+MXVtDxNS/mF/JmJQ9tc8Ci/9ANqyuAhXiqDHFxUO0gVWZFPPF5APGyHJVkVn3xlMHww1+LhdzBZKZvzkK7CjvAG7FI5dY65 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: db542d5b-cc53-4fc4-e5e1-08d972c06d39 X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB6960.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Sep 2021 12:01:44.5615 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Lj9Mov+4h1DgZYIbUHBtoFEo58eNw+FYglGW+zAqirm9+KmNGQVSXGJwe2rVbVPv X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB6958 Subject: [dpdk-dev] [PATCH v3 3/4] crypto/dpaa2_sec: add PDCP short MAC-I support X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" This patch add PDCP short mac support in dpaa2_sec driver. Signed-off-by: Gagandeep Singh --- doc/guides/rel_notes/release_21_11.rst | 4 ++++ drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 4 ++++ drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 9 +++++++++ 3 files changed, 17 insertions(+) diff --git a/doc/guides/rel_notes/release_21_11.rst b/doc/guides/rel_notes/release_21_11.rst index 50e4fb1205..b7e5128be5 100644 --- a/doc/guides/rel_notes/release_21_11.rst +++ b/doc/guides/rel_notes/release_21_11.rst @@ -77,6 +77,10 @@ New Features * Added DES-CBC, AES-XCBC-MAC, AES-CMAC and non-HMAC algo support. +* **Updated NXP dpaa2_sec crypto PMD.** + + * Added PDCP short MAC-I support. + Removed Items ------------- diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index b8d57c2b22..dfa72f3f93 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -3309,6 +3309,10 @@ dpaa2_sec_set_pdcp_session(struct rte_cryptodev *dev, pdcp_xform->hfn_threshold, &cipherdata, &authdata, 0); + + } else if (pdcp_xform->domain == RTE_SECURITY_PDCP_MODE_SHORT_MAC) { + bufsize = cnstr_shdsc_pdcp_short_mac(priv->flc_desc[0].desc, + 1, swap, &authdata); } else { if (session->dir == DIR_ENC) { if (pdcp_xform->sdap_enabled) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h index 7dbc69f6cb..8dee0a4bda 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h @@ -941,6 +941,15 @@ static const struct rte_security_capability dpaa2_sec_security_cap[] = { }, .crypto_capabilities = dpaa2_pdcp_capabilities }, + { /* PDCP Lookaside Protocol offload Short MAC */ + .action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL, + .protocol = RTE_SECURITY_PROTOCOL_PDCP, + .pdcp = { + .domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC, + .capa_flags = 0 + }, + .crypto_capabilities = dpaa2_pdcp_capabilities + }, { .action = RTE_SECURITY_ACTION_TYPE_NONE } From patchwork Wed Sep 8 12:01:15 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gagandeep Singh X-Patchwork-Id: 98352 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id A683FA0C56; Wed, 8 Sep 2021 14:02:09 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id E4A5B41207; Wed, 8 Sep 2021 14:01:48 +0200 (CEST) Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2044.outbound.protection.outlook.com [40.107.21.44]) by mails.dpdk.org (Postfix) with ESMTP id A137F411FD for ; Wed, 8 Sep 2021 14:01:47 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=R4FC9qdXl0MnjpurEtkLTLL54btZwroJCeXW3ve/iFLuV1TCKt2EouiymdRR2ln0TWJnk/bpW8FMdi+yBWuLuVEzKh0QXspbkETnxEgHXKZag5G9pbqhn/+q9BXetLp/fdvBYjibZ51hVgZQGtkUE2K6DD3hbrMJux8yJlKXrWHkrluwd/vV7DJK65lqWmBEnLJwUdP8xy8DATapCnL+5x4R2Bq+u1JfxlFxLUhOmvEFOIWWxTxpHEpHZVFYa3dk+wLKnDcyTGOJ81KJbzCzOEA0+3SyjU5jgrzQvmiWt7VK1BZo84dp9Lu3ortc/E570MmjG3D8ImzfFoq4Vo1A1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=qrVIQAvXwa2dpLj2R6b9fF9mMYv7T75UqPV4gem1zz8=; b=fmEPeuJTM5MsBIjL51/IUMKprRPaMcraA/rZnXQdYWGLdy+K0NZrheqPMoE5ynPJ3hGHFIdZaxbJZ9PML0sLMeHpjMYZFfpTykJ/niqEcgbccVuqaRX8A9bSa4Qd3+HBeqdJUMUlJEQQTjT6xgd6AtA4EwERcBYx2xVhMCn4BnIuJ/vBhmA1rtYDeoN/DkcneQSWSyp5Vl19uu3uXCC641FF12rMBbvGORXAEdUaUSp2ae18r9vdW7OvZSAPGpy4HlmgltGSSjcOdcE6RCC8wjCsnkyQR5bjJJbybguojokmF2uSpTDkfZcWPJiHh0LLxGP/FE/ngsugbUsoGMAbng== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qrVIQAvXwa2dpLj2R6b9fF9mMYv7T75UqPV4gem1zz8=; b=l8zJYVQreaoaAj6VhFTHBYyjTDVt7mFsfDVM6nY4dsUxDYAClW2gXAvWQiV2bwN4fHxDibVbVrAJJdPC7IM4Vtf+6T3orsPfLl6fVyK2Mm6Cvj5dr3wLZFcAKs4XF0OrMAGPal3SNwM8CzMLYzxd23VGxJVl9GXw/8iIVdZVyxk= Authentication-Results: marvell.com; dkim=none (message not signed) header.d=none;marvell.com; dmarc=none action=none header.from=nxp.com; Received: from VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) by VI1PR04MB6958.eurprd04.prod.outlook.com (2603:10a6:803:137::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.22; Wed, 8 Sep 2021 12:01:46 +0000 Received: from VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7]) by VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7%8]) with mapi id 15.20.4500.015; Wed, 8 Sep 2021 12:01:46 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: thomas@monjalon.net, Gagandeep Singh Date: Wed, 8 Sep 2021 17:31:15 +0530 Message-Id: <20210908120115.3548009-5-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210908120115.3548009-1-g.singh@nxp.com> References: <20210907085605.3010882-2-g.singh@nxp.com> <20210908120115.3548009-1-g.singh@nxp.com> X-ClientProxiedBy: SG2PR06CA0108.apcprd06.prod.outlook.com (2603:1096:3:14::34) To VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from lsv03457.swis.in-blr01.nxp.com (14.142.151.118) by SG2PR06CA0108.apcprd06.prod.outlook.com (2603:1096:3:14::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14 via Frontend Transport; Wed, 8 Sep 2021 12:01:44 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: dc268f32-36e5-4912-4538-08d972c06e7c X-MS-TrafficTypeDiagnostic: VI1PR04MB6958: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:1417; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR04MB6960.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(376002)(346002)(366004)(136003)(39860400002)(6486002)(55236004)(86362001)(1006002)(6666004)(38100700002)(38350700002)(26005)(478600001)(66476007)(2906002)(8936002)(956004)(66946007)(8676002)(316002)(83380400001)(1076003)(66556008)(5660300002)(4326008)(2616005)(52116002)(7696005)(186003)(36756003)(110426009); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: fhXCl0vkf6LQ1owfVyLBl/hzYVmxnhMHLY2zSKf9PM7rk1QT7w2KDPmYze2ap4NaCSgdhjcsz5EP3kHZBm2yaObWhCUoMmvWSmCJzx2UzawrFjBZt+m1rea3Lj952z2ANgIHFLwDeiQRnCFQAqlslyJcvx/qcQmVJqQIgquB6L/5yuOyZ6oAhHKl+r0vhjalepQ+4ejWj8MQ/nm9qXUckRnm7wneVOfX1ywL2/3wbUnFh+GbHkHU++2n65gexzzB5zDGQiDAfZDByan850Mm6KyMRsVegUxVAyAJeqTIEXttxaPeNbfkKJzAiWkFBGUNMiu5C/5rsrFqdxcYDIWylA8rZeRcEoMeXU7snucuDqXsGMLcnuiCf5+mJktICQpukXqOd6e57ab/Ow/Bw94hmMlTKRUp3x12qzzGiMsFXmHrnmG3AR0mDF6U3IDwnTGg/D7y/XHPolraz4SP3vMLZerLwEplrv27xfYWjSn2H3zodPOjqN7+m38aEqz3mPs4PTMecunjV5TKwZ4S0MtM0K9LonwcZC0swZ3U1alk43aefxuoMLM1iWJrG39KNeaiPz6kI7aG9leqtFEM859AXMBDTht8rYXroRA7UobUlE3G7Nd2nYv2Sadbqpvrj1vJNeZ03eNeokV36Z3Tw7NO/RndqTzOOOoxg9OwYQdnxTOLs3L3VYP8CUK4Qyfm+QFUk2fm0/fE7dEzH2RFlABJprHlKrer1LtWzzwm1DbzFT50sFqy8F0ibx3W8m75VziEIaCmwyN8ZQmHFmmcjE4oaEPcFTivJwlu5Dm37YEamQsk8/fZTdmMYvHmJH36hwhaQprq94ntIUS/xp4OZNJsshVirLs+1FbvmM57Up+0h9DA67TL1EvGEZkOLvdT8ORQU14yv/Gunqi4SvbUNNhM+/6xoyH6JVZJh/7K+jkNYLYEEr6A5QNvRFaFjm9e72T3Q3hm21zuO/ALaNvyLuu8tR2hVO7sKWOe7HcnizWpJRIYi6Hir80KzPOrpysK3j3UHo88VCFvKHIqdoMJPNXlG0xRRTCdJe7cm8RgKLshFpJ64WBSm/FNkLrjDuhQCKiZZn8T1aM9mu/Hkxwn/6G82AgRLbyqG/LwQEmh8YIj2oKA0sqaH9WyREHaS72k/fsYvf/xB5gWlpY6tfYVdnf2IxKY0pIiMbGpq8+nx3ux2k4uEvR8MiveLEZ5lGAZZo31E7BDHy9OMScwHszmWgdxTsi+xICJhAvCXpE+qgxinESL/URwC5os4brYJhJSGfBBJq9Ab2qbmClsTRJtJomUwoJdCbA6ooY4vwB2Lcmb1nePg4CO/KzZ23xLIUQ4ivpN X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: dc268f32-36e5-4912-4538-08d972c06e7c X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB6960.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Sep 2021 12:01:46.7121 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: JnBRaKDNkYNJtgxvLz+mSftwPyaLsRU2tJGR6OcyUleN8hNz6tfeogr2E/StVUPM X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB6958 Subject: [dpdk-dev] [PATCH v3 4/4] crypto/dpaa_sec: add pdcp short MAC-I support X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" This patch add pdcp security short MAC-I support for dpaa_sec driver. Signed-off-by: Gagandeep Singh --- doc/guides/rel_notes/release_21_11.rst | 4 ++++ drivers/crypto/dpaa_sec/dpaa_sec.c | 3 +++ drivers/crypto/dpaa_sec/dpaa_sec.h | 11 ++++++++++- 3 files changed, 17 insertions(+), 1 deletion(-) diff --git a/doc/guides/rel_notes/release_21_11.rst b/doc/guides/rel_notes/release_21_11.rst index b7e5128be5..7a07161f9d 100644 --- a/doc/guides/rel_notes/release_21_11.rst +++ b/doc/guides/rel_notes/release_21_11.rst @@ -81,6 +81,10 @@ New Features * Added PDCP short MAC-I support. +* **Updated NXP dpaa_sec crypto PMD.** + + * Added PDCP short MAC-I support. + Removed Items ------------- diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c index fa4d276ead..d5aa2748d6 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec.c @@ -311,6 +311,9 @@ dpaa_sec_prep_pdcp_cdb(dpaa_sec_session *ses) ses->pdcp.hfn_threshold, &cipherdata, &authdata, 0); + } else if (ses->pdcp.domain == RTE_SECURITY_PDCP_MODE_SHORT_MAC) { + shared_desc_len = cnstr_shdsc_pdcp_short_mac(cdb->sh_desc, + 1, swap, &authdata); } else { if (ses->dir == DIR_ENC) { if (ses->pdcp.sdap_enabled) diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h index c94d78e046..503047879e 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.h +++ b/drivers/crypto/dpaa_sec/dpaa_sec.h @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: BSD-3-Clause * - * Copyright 2016-2020 NXP + * Copyright 2016-2021 NXP * */ @@ -958,6 +958,15 @@ static const struct rte_security_capability dpaa_sec_security_cap[] = { }, .crypto_capabilities = dpaa_pdcp_capabilities }, + { /* PDCP Lookaside Protocol offload Short MAC */ + .action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL, + .protocol = RTE_SECURITY_PROTOCOL_PDCP, + .pdcp = { + .domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC, + .capa_flags = 0 + }, + .crypto_capabilities = dpaa_pdcp_capabilities + }, { .action = RTE_SECURITY_ACTION_TYPE_NONE }