From patchwork Wed Jul 21 07:39:20 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Hemant Agrawal X-Patchwork-Id: 96135 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id F199AA0C4D; Wed, 21 Jul 2021 09:42:48 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 2CFB741124; Wed, 21 Jul 2021 09:42:27 +0200 (CEST) Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2077.outbound.protection.outlook.com [40.107.21.77]) by mails.dpdk.org (Postfix) with ESMTP id 077AB410FD for ; Wed, 21 Jul 2021 09:42:25 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SJcP5FffhcfhB33sZqzu3+WP637IuD+YyLgsJHFl5eGq7jQGmCKaNrbrZnXyqHK3L58biYROumFDheSGV+k2ol55uPyiWOjkUT93KDBqyS87BqqVSxY3Q0ZzfChda4df0XUoTS22rDkOoI+TcGOa+F4EGzNLFakFCJKjXXNkEm3PBQngyiQCCZ7qPu8P4rR/WItibSfynqeo7gjGzqtafzDcyugW3MwVt0icIej7DTQFc6xfz9A9T86xFPe0zNS0lg4gc11DMBmih+BBReRDwilLQCpmfmdt4gW8qSvDMMZ8jW4iWdMQxKpIYenhFv5Ghnxm2Ypjez1gdC5xdGUqQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=D2Sihn/D4snwDxbTTbeY9N8tUdHGfXDTExhtlH+QKD0=; b=mnz7PQ+0qYxwf0aGCH/3Rmqpc4ZwJgEWDrqFDMkNMxOw1/vSRMiYw78lCPqCTiNRtX6PNhfpsQeQJjyuhA/6r7JYqSi65XcuDKlx50/4Tmh0Fn+E5Omr/dsNKHzOsRsqUMXFmCxthE0j6bvRw247Mcfm8x+3wWeDiMU3ywp8vuZYqeBgynPqWk79OjhDIU320m/ZwWRJGtmwnQq2iwIFZPHTAVoQ2W9wBDQSau8S37/ciiBDRSdJJ7+BRrVodlChpBO21igw29wzFVkB/pPnwkmTiMEbt5A6YNpNmesNMyDTOjhv/mfC9bBJnYApSZClYqAjrPU5ar5j7lfleHGBnA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=D2Sihn/D4snwDxbTTbeY9N8tUdHGfXDTExhtlH+QKD0=; b=quliEqXgzXCdVTpevakHpBxoYV3EAhujLIzNkaGZQEhcWsP2rMh7+xgyij/1mnayrN5s9VDxrflqRtgeUnp0kqRKOBlOe22Omfz4EcwE8NJsppv3lBqsCgP71TF+Sot4illxF7k32OZXXJpXwkk41uFK7H1qZGkRDUVu7Fz04jE= Authentication-Results: dpdk.org; dkim=none (message not signed) header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com; Received: from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15) by DU2PR04MB8823.eurprd04.prod.outlook.com (2603:10a6:10:2e2::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.24; Wed, 21 Jul 2021 07:42:24 +0000 Received: from DU2PR04MB8630.eurprd04.prod.outlook.com ([fe80::f483:9bb1:cde3:8a28]) by DU2PR04MB8630.eurprd04.prod.outlook.com ([fe80::f483:9bb1:cde3:8a28%6]) with mapi id 15.20.4331.034; Wed, 21 Jul 2021 07:42:24 +0000 From: Hemant Agrawal To: dev@dpdk.org Cc: gakhil@marvell.com, Gagandeep Singh Date: Wed, 21 Jul 2021 13:09:20 +0530 Message-Id: <20210721073920.21893-5-hemant.agrawal@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210721073920.21893-1-hemant.agrawal@nxp.com> References: <20210721073920.21893-1-hemant.agrawal@nxp.com> X-ClientProxiedBy: SG2PR06CA0240.apcprd06.prod.outlook.com (2603:1096:4:ac::24) To DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from dpdk-xeon.ap.freescale.net (92.120.0.67) by SG2PR06CA0240.apcprd06.prod.outlook.com (2603:1096:4:ac::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4331.21 via Frontend Transport; Wed, 21 Jul 2021 07:42:22 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: e137608c-c5a2-4cb6-3379-08d94c1b1452 X-MS-TrafficTypeDiagnostic: DU2PR04MB8823: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:569; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(136003)(366004)(346002)(39860400002)(376002)(26005)(5660300002)(83380400001)(6506007)(2906002)(8676002)(956004)(44832011)(186003)(4326008)(2616005)(478600001)(38100700002)(38350700002)(36756003)(6512007)(52116002)(316002)(6486002)(8936002)(86362001)(66946007)(66476007)(66556008)(6916009)(1076003); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: wSm7STp+t4AjtcV/IpIVuAd4Yw3KAtTOF9OrlVJ6uSJ1aRiHwSXkixgcJFFYXwtYD/fbllBN64qQa8sPCfCKB5H/eZSK15hEkxqk7705gyc+pE1e3fxd4rIm7TqDDRu0fePpD/oFhnxZpZ2KnhJ7tQwdROjI7u59xATYc3l/Qnj7ZZPF7Z6IEQJSSrLlaVpEIQAgDD+KfNMd7MxPR1GQx/+Rt5S/CL3bS0UJOThQ6CBZ7qP7xP14zA9feay2TPtPBEV78/baulXm3gFBPF/3qcP+yKhqXhGZl16tCq8uwoMst0VhWtk9sbKpoeqCL1N9/fEuWBoZCUZaTLjZRzgKO/BId1Mf7lauIg0j/S7q6VHuuB8LDFX7Mavov2bxMl5yLa995GWCcIANTp10ctfwseDpIYHMyiwWNqlK+Cy/x9dnv7dMqv/Yrb+IoSUk38+5JDP+ys2icE93o/gDtbHFPCKzoGK1Bl2qsrkY0R6yJeoqtRFDhI2pfe6NP9fyv9SdBzYVOUsi+9Zp+yIOdSeYIawPpwPztc1JU0SkOxJAY0u4NQwILnp9Bqs1xbASWSImlMz6/trnI6wk0J2n/x/vURYIhClAhzy30g9KuPXp3GeBk7sYhKe5yZqnnlWEvzGQapvMNxM5ufN+xlO09oo3C98wlnfLzyX8UgDG8tzA7PfMyQH94hK+NsimZ1iPneIZWI5mk+UVROZJiCrhwzYDAPrck9Jg105HyjeEfjJJoJmnc0NdZnk0pHAoxlcKacrM8rK/Z0SCWGPy3IDAbZbo5cvj7pjHbfpP4AUSLsJs1YEzVS3/C8bwceXorvx7v6Ex2VPaKWUpJm0sc2ymih5ovvVHL2OZmZzbNte9Z7LDskVvg/GkvOB1O8c9ZZTudM/SnocB9doYZRIysSA3PMcEABDAA0iUpifOv/RWrzLGUlvDQl9zAg3nSbjXgh4jIhcBJV1EckL9vOgVwrkdJiU9avTUOgYzjOyPUPC7ztNUKWSQImOWlEjtJ/tFtgkjf+aymeofxKP2un7zsSmQfJ0QW9NSa6rraIixRHDDV9kYbFCKqGtKVFUzmN7KN6+qb/wpHwNeN6adxh3ey4rAIDIym4peuGw1sIv0BusSXYPr3cFhSL6Y9/mSCYXWHw8qT9h2snGMfi0beOOIRtUhrvYgeNFNy+dXzgMjKOdqbJU9v0FIWpwCmphAEntVfE+lKeYUIwHYBqevZp/71en07H6yYKFeMHw3frdkShWUTOtrqGbDdeui5VionKrpxW+su4GUdshJxCL79NoGrcKkZD0z3DxSoXtDMCiZYYeMEOYJiXcPfo5idLxmv2RzLyjP/48l X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: e137608c-c5a2-4cb6-3379-08d94c1b1452 X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8630.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Jul 2021 07:42:24.1332 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: GiqEKeZ29UqYTdeUbGBZF5h12NqDOOXvDy2voaCm0cFHvJ21yHsygUm071DI33ndv5iQmLBkw/gPN/H69Eb35g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR04MB8823 Subject: [dpdk-dev] [PATCH 5/5] crypto/dpaa_sec: add support for AES CMAC integrity check X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Gagandeep Singh This patch adds support for AES_CMAC integrity in non-security mode. This patch modifies the camm flib to handles the AES CMAC without conflicting the proto ALG operations. i.e. by creating another ALG operation routine. Signed-off-by: Gagandeep Singh --- doc/guides/cryptodevs/features/dpaa_sec.ini | 1 + drivers/crypto/dpaa_sec/dpaa_sec.c | 10 +++++ drivers/crypto/dpaa_sec/dpaa_sec.h | 43 +++++++++++++++++++++ 3 files changed, 54 insertions(+) diff --git a/doc/guides/cryptodevs/features/dpaa_sec.ini b/doc/guides/cryptodevs/features/dpaa_sec.ini index d7bc319373..6a8f77fb1d 100644 --- a/doc/guides/cryptodevs/features/dpaa_sec.ini +++ b/doc/guides/cryptodevs/features/dpaa_sec.ini @@ -48,6 +48,7 @@ SHA512 HMAC = Y SNOW3G UIA2 = Y ZUC EIA3 = Y AES XCBC MAC = Y +AES CMAC (128) = Y ; ; Supported AEAD algorithms of the 'dpaa_sec' crypto driver. diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c b/drivers/crypto/dpaa_sec/dpaa_sec.c index fc9c3a4c2c..c5416df726 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.c +++ b/drivers/crypto/dpaa_sec/dpaa_sec.c @@ -528,6 +528,7 @@ dpaa_sec_prep_cdb(dpaa_sec_session *ses) ses->digest_length); break; case RTE_CRYPTO_AUTH_AES_XCBC_MAC: + case RTE_CRYPTO_AUTH_AES_CMAC: shared_desc_len = cnstr_shdsc_aes_mac( cdb->sh_desc, true, swap, SHR_NEVER, @@ -2180,6 +2181,10 @@ dpaa_sec_auth_init(struct rte_cryptodev *dev __rte_unused, session->auth_key.alg = OP_ALG_ALGSEL_AES; session->auth_key.algmode = OP_ALG_AAI_XCBC_MAC; break; + case RTE_CRYPTO_AUTH_AES_CMAC: + session->auth_key.alg = OP_ALG_ALGSEL_AES; + session->auth_key.algmode = OP_ALG_AAI_CMAC; + break; default: DPAA_SEC_ERR("Crypto: Unsupported Auth specified %u", xform->auth.algo); @@ -2265,6 +2270,10 @@ dpaa_sec_chain_init(struct rte_cryptodev *dev __rte_unused, session->auth_key.alg = OP_ALG_ALGSEL_AES; session->auth_key.algmode = OP_ALG_AAI_XCBC_MAC; break; + case RTE_CRYPTO_AUTH_AES_CMAC: + session->auth_key.alg = OP_ALG_ALGSEL_AES; + session->auth_key.algmode = OP_ALG_AAI_CMAC; + break; default: DPAA_SEC_ERR("Crypto: Unsupported Auth specified %u", auth_xform->algo); @@ -2700,6 +2709,7 @@ dpaa_sec_ipsec_proto_init(struct rte_crypto_cipher_xform *cipher_xform, break; case RTE_CRYPTO_AUTH_AES_CMAC: session->auth_key.alg = OP_PCL_IPSEC_AES_CMAC_96; + session->auth_key.algmode = OP_ALG_AAI_CMAC; break; case RTE_CRYPTO_AUTH_NULL: session->auth_key.alg = OP_PCL_IPSEC_HMAC_NULL; diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.h b/drivers/crypto/dpaa_sec/dpaa_sec.h index d500a4c246..c94d78e046 100644 --- a/drivers/crypto/dpaa_sec/dpaa_sec.h +++ b/drivers/crypto/dpaa_sec/dpaa_sec.h @@ -712,6 +712,49 @@ static const struct rte_cryptodev_capabilities dpaa_sec_capabilities[] = { }, } }, } }, + { /* AES CMAC */ + .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, + {.sym = { + .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH, + {.auth = { + .algo = RTE_CRYPTO_AUTH_AES_CMAC, + .block_size = 16, + .key_size = { + .min = 1, + .max = 16, + .increment = 1 + }, + .digest_size = { + .min = 12, + .max = 16, + .increment = 4 + }, + .iv_size = { 0 } + }, } + }, } + }, + { /* AES XCBC HMAC */ + .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, + {.sym = { + .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH, + {.auth = { + .algo = RTE_CRYPTO_AUTH_AES_XCBC_MAC, + .block_size = 16, + .key_size = { + .min = 1, + .max = 16, + .increment = 1 + }, + .digest_size = { + .min = 12, + .max = 16, + .increment = 4 + }, + .aad_size = { 0 }, + .iv_size = { 0 } + }, } + }, } + }, RTE_CRYPTODEV_END_OF_CAPABILITIES_LIST() };