From patchwork Fri May 26 03:14:21 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suanming Mou X-Patchwork-Id: 127530 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 4C0A342BA3; Fri, 26 May 2023 05:16:48 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 2970342D49; Fri, 26 May 2023 05:16:02 +0200 (CEST) Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2077.outbound.protection.outlook.com [40.107.244.77]) by mails.dpdk.org (Postfix) with ESMTP id 1568442D49 for ; Fri, 26 May 2023 05:16:01 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UoGD3bnztp0A2HDCyU21Lv/J457G1bM52/NQaSHyPvb2/E7UG93RR3t6cBx39tGdwmZ+WKYAvl8OsWQ58YCz7VoQbGKd6uwtxELORLFJF9IzXVb4cctNxQO5KANJYpDR0Pu6cc9ES2yjiUWU8Rg/KK6CgyGygRcaNWm0IBCeKjASpbYtcU7aa8ezElTyYpHvlYmCdd07dj5uZX/+PJXs+hiBLtXvuSGZNUD9xgmC0qoeMW/sEFY+H0FWKayg/sal5xQMaOAXGT9jz77mcrJEvkQKsiTuLW6AryhuPtoiQBwoWE6PjCPsnSnd0R09G1GNDXC/0lYp3wfhKG3IznUeBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NTDCrjejpt4yEfoJhjy239WryMRnasR5EOc0z5tVWOY=; b=gA06zjXafmcVKYgpk1fuq8XcEYITPzEK3Bo9pdlnCQcRFa5fM1Hpy6V3TUxvY7EnoYvAk8gvnSCMebFa+PZ9ck36/ALHCjEZAYDKP6iXX5MNEYACJLAI0WxUz462zYfVjrrH7ys2q9esMRIFSAX74zkKGJX62KlkzuNW3x5/XTzz32LQxPlX0p7hqz/MOB5oY00k0HaB0Rm45zwpIxyittplQWM98yW2A5LKUsvvxHtLPnpiCYcl+zcHRnh5Kl+rwIfLQeIIl3kuT4iF6zETaSFluBT11ZBfjaLbsEstfavBhGa0AIuxx0GbNdC1ec1PHWhxSdr0L9sNrXUQ/9inlA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=dpdk.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NTDCrjejpt4yEfoJhjy239WryMRnasR5EOc0z5tVWOY=; b=KxFdpc46i5j6bP+4CJEhamHVENGdsJ1fpOJbhumPWHarWxpi6z9lAZ68FPCx1hE6btzZa1GEV173Pe86cky3JSmOJbGA0EYJoB7ArG7UAPz21sRpO2T6Zl1Js9ReMi0WUGmzBgUaWIZHetjEIAs21UL6ouwx9tp/eFXSYLBzHAmp+2OdCgeh3gSFHXwMMmaN9leUHkZlmjS3NJm5zQwqHxAKbrcZSUP03FMjWQ+hIHCEoajMF37ArHvmlWEMldyxqzb+9ekkrc8xq/5qhcIU+46/w3MUggYjFWJa3sZoL0VyU1ToCKHQ4NV/sQp+p3wxZBg0ltIAUMlLH6egTTU++w== Received: from BN0PR10CA0003.namprd10.prod.outlook.com (2603:10b6:408:143::35) by SJ1PR12MB6266.namprd12.prod.outlook.com (2603:10b6:a03:457::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6433.17; Fri, 26 May 2023 03:15:59 +0000 Received: from BN8NAM11FT091.eop-nam11.prod.protection.outlook.com (2603:10b6:408:143:cafe::c8) by BN0PR10CA0003.outlook.office365.com (2603:10b6:408:143::35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6433.18 via Frontend Transport; Fri, 26 May 2023 03:15:58 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.161) by BN8NAM11FT091.mail.protection.outlook.com (10.13.176.134) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6433.18 via Frontend Transport; Fri, 26 May 2023 03:15:58 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Thu, 25 May 2023 20:15:43 -0700 Received: from nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Thu, 25 May 2023 20:15:41 -0700 From: Suanming Mou To: Matan Azrad CC: , Subject: [PATCH v2 9/9] crypto/mlx5: enable AES-GCM capability Date: Fri, 26 May 2023 06:14:21 +0300 Message-ID: <20230526031422.913377-10-suanmingm@nvidia.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230526031422.913377-1-suanmingm@nvidia.com> References: <20230418092325.2578712-1-suanmingm@nvidia.com> <20230526031422.913377-1-suanmingm@nvidia.com> MIME-Version: 1.0 X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail201.nvidia.com (10.129.68.8) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT091:EE_|SJ1PR12MB6266:EE_ X-MS-Office365-Filtering-Correlation-Id: f20c8e25-96ce-4441-7f4c-08db5d9786f8 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(376002)(346002)(136003)(39860400002)(396003)(451199021)(46966006)(36840700001)(40470700004)(478600001)(2906002)(40460700003)(30864003)(37006003)(54906003)(26005)(186003)(1076003)(6286002)(16526019)(36756003)(7636003)(356005)(7696005)(36860700001)(107886003)(47076005)(82310400005)(83380400001)(336012)(2616005)(426003)(40480700001)(82740400003)(6666004)(86362001)(55016003)(5660300002)(316002)(8936002)(8676002)(70586007)(70206006)(6636002)(6862004)(4326008)(41300700001); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 May 2023 03:15:58.7059 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f20c8e25-96ce-4441-7f4c-08db5d9786f8 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT091.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ1PR12MB6266 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org This commit generates AES-GCM capability based on the NIC attributes and enables AES-GCM algo. An new devarg "algo" is added to identify if the crypto PMD will be initialized as AES-GCM(algo=1) or AES-XTS(algo=0, default). Signed-off-by: Suanming Mou --- doc/guides/cryptodevs/mlx5.rst | 48 +++++++++++++++++++- doc/guides/rel_notes/release_23_07.rst | 1 + drivers/crypto/mlx5/mlx5_crypto.c | 26 +++++++++-- drivers/crypto/mlx5/mlx5_crypto.h | 1 + drivers/crypto/mlx5/mlx5_crypto_gcm.c | 63 ++++++++++++++++++++++++++ 5 files changed, 134 insertions(+), 5 deletions(-) diff --git a/doc/guides/cryptodevs/mlx5.rst b/doc/guides/cryptodevs/mlx5.rst index b35ac5f5f2..9a0ae8b0d2 100644 --- a/doc/guides/cryptodevs/mlx5.rst +++ b/doc/guides/cryptodevs/mlx5.rst @@ -21,6 +21,11 @@ and **NVIDIA BlueField-3** family adapters. Overview -------- +Nvidia MLX5 crypto driver supports AES-XTs and AES-GCM cryption. + +AES-XTS +------- + The device can provide disk encryption services, allowing data encryption and decryption towards a disk. Having all encryption/decryption operations done in a single device @@ -38,13 +43,19 @@ The encryption does not require text to be aligned to the AES block size (128b). See :doc:`../../platform/mlx5` guide for more design details. +AES-GCM +------- +The encryption and decryption processes the traffic as standard RTE crypto +API defines. The supported AAD/digest/key size can be read from dev_info. + + Configuration ------------- See the :ref:`mlx5 common configuration `. A device comes out of NVIDIA factory with pre-defined import methods. -There are two possible import methods: wrapped or plaintext. +There are two possible import methods: wrapped or plaintext(valid to AES-XTS only). In case the device is in wrapped mode, it needs to be moved to crypto operational mode. In order to move the device to crypto operational mode, credential and KEK @@ -120,24 +131,36 @@ Driver options Please refer to :ref:`mlx5 common options ` for an additional list of options shared with other mlx5 drivers. +- ``algo`` parameter [int] + + - 0. AES-XTS crypto. + + - 1. AES-GCM crypto. + + Set to zero(AES-XTS) by default. + - ``wcs_file`` parameter [string] - mandatory in wrapped mode File path including only the wrapped credential in string format of hexadecimal numbers, represent 48 bytes (8 bytes IV added by the AES key wrap algorithm). + This option is valid only to AES-XTS. - ``import_kek_id`` parameter [int] The identifier of the KEK, default value is 0 represents the operational register import_kek.. + This option is valid only to AES-XTS. - ``credential_id`` parameter [int] The identifier of the credential, default value is 0 represents the operational register credential. + This option is valid only to AES-XTS. - ``keytag`` parameter [int] The plaintext of the keytag appended to the AES-XTS keys, default value is 0. + This option is valid only to AES-XTS. - ``max_segs_num`` parameter [int] @@ -161,6 +184,8 @@ Limitations - The supported data-unit lengths are 512B and 4KB and 1MB. In case the `dataunit_len` is not provided in the cipher xform, the OP length is limited to the above values. +- AES-GCM is only supported on BlueField-3. +- AES-GCM only supported key import plaintext mode. Prerequisites @@ -172,6 +197,7 @@ FW Prerequisites - xx.31.0328 for ConnectX-6. - xx.32.0108 for ConnectX-6 Dx and BlueField-2. - xx.36.xxxx for ConnectX-7 and BlueField-3. +- xx.37.3010 for BlueField-3 and newer for AES-GCM. Linux Prerequisites ~~~~~~~~~~~~~~~~~~~ @@ -186,3 +212,23 @@ Windows Prerequisites - NVIDIA WINOF-2 version: **2.60** or higher. See :ref:`mlx5 common prerequisites ` for more details. + + +Notes for rte_crypto AES-GCM +---------------------------- + +In AES-GCM mode, the HW requires continuous input and output of Additional +Authenticated Data (AAD), payload, and digest (if needed). However, the RTE +API only provides a single AAD input, which means that in the out-of-place +mode, the AAD will be used in both input and output. This reuse of AAD in the +out-of-place mode breaks the continuous output, which degrades the performance +and introduces extra UMR WQE. If digest is not continuous after payload will +also lead to that extra UMR WQE. + +To address this issue, current RTE API provides min_mbuf_headroom_req and +min_mbuf_tailroom_req in rte_cryptodev_info as a hint to the PMD. It +indicates the PMD can use the buffer before and after the mbuf payload as AAD +and digest space. With this hint, the PMD will use the buffer before and +after the mbuf payload directly via copying AAD and digest. However, the +application must ensure that there is enough headroom and tailroom reserved +for the mbuf. Or, for non-continuous operations, extra UMR WQE will be used. diff --git a/doc/guides/rel_notes/release_23_07.rst b/doc/guides/rel_notes/release_23_07.rst index 946f89e83b..fbbdceab0b 100644 --- a/doc/guides/rel_notes/release_23_07.rst +++ b/doc/guides/rel_notes/release_23_07.rst @@ -29,6 +29,7 @@ New Features * Added support for multi-packet RQ on Windows. * Added support for CQE compression on Windows. * Added support for enhanced multi-packet write on Windows. + * Added support for AES-GCM crypto. * **Added flow matching of tx queue.** diff --git a/drivers/crypto/mlx5/mlx5_crypto.c b/drivers/crypto/mlx5/mlx5_crypto.c index 4d7d3ef2a3..081e96ad4d 100644 --- a/drivers/crypto/mlx5/mlx5_crypto.c +++ b/drivers/crypto/mlx5/mlx5_crypto.c @@ -269,6 +269,14 @@ mlx5_crypto_args_check_handler(const char *key, const char *val, void *opaque) attr->credential_pointer = (uint32_t)tmp; } else if (strcmp(key, "keytag") == 0) { devarg_prms->keytag = tmp; + } else if (strcmp(key, "algo") == 0) { + if (tmp == 1) { + devarg_prms->is_aes_gcm = 1; + } else if (tmp > 1) { + DRV_LOG(ERR, "Invalid algo."); + rte_errno = EINVAL; + return -rte_errno; + } } return 0; } @@ -285,6 +293,7 @@ mlx5_crypto_parse_devargs(struct mlx5_kvargs_ctrl *mkvlist, "keytag", "max_segs_num", "wcs_file", + "algo", NULL, }; @@ -370,10 +379,19 @@ mlx5_crypto_dev_probe(struct mlx5_common_device *cdev, priv->crypto_dev = crypto_dev; priv->is_wrapped_mode = wrapped_mode; priv->max_segs_num = devarg_prms.max_segs_num; - ret = mlx5_crypto_xts_init(priv); - if (ret) { - DRV_LOG(ERR, "Failed to init AES-XTS crypto."); - return -ENOTSUP; + /* Init and override AES-GCM configuration. */ + if (devarg_prms.is_aes_gcm) { + ret = mlx5_crypto_gcm_init(priv); + if (ret) { + DRV_LOG(ERR, "Failed to init AES-GCM crypto."); + return -ENOTSUP; + } + } else { + ret = mlx5_crypto_xts_init(priv); + if (ret) { + DRV_LOG(ERR, "Failed to init AES-XTS crypto."); + return -ENOTSUP; + } } if (mlx5_devx_uar_prepare(cdev, &priv->uar) != 0) { rte_cryptodev_pmd_destroy(priv->crypto_dev); diff --git a/drivers/crypto/mlx5/mlx5_crypto.h b/drivers/crypto/mlx5/mlx5_crypto.h index 6dcb41b27c..36dacdcda4 100644 --- a/drivers/crypto/mlx5/mlx5_crypto.h +++ b/drivers/crypto/mlx5/mlx5_crypto.h @@ -92,6 +92,7 @@ struct mlx5_crypto_devarg_params { struct mlx5_devx_crypto_login_attr login_attr; uint64_t keytag; uint32_t max_segs_num; + uint32_t is_aes_gcm:1; }; struct mlx5_crypto_session { diff --git a/drivers/crypto/mlx5/mlx5_crypto_gcm.c b/drivers/crypto/mlx5/mlx5_crypto_gcm.c index 2231bcbe6f..d481cd0716 100644 --- a/drivers/crypto/mlx5/mlx5_crypto_gcm.c +++ b/drivers/crypto/mlx5/mlx5_crypto_gcm.c @@ -107,6 +107,60 @@ mlx5_crypto_dek_fill_gcm_attr(struct mlx5_crypto_dek *dek, return 0; } +static int +mlx5_crypto_generate_gcm_cap(struct mlx5_hca_crypto_mmo_attr *mmo_attr, + struct rte_cryptodev_capabilities *cap) +{ + /* Init key size. */ + if (mmo_attr->gcm_128_encrypt && mmo_attr->gcm_128_decrypt && + mmo_attr->gcm_256_encrypt && mmo_attr->gcm_256_decrypt) { + cap->sym.aead.key_size.min = 16; + cap->sym.aead.key_size.max = 32; + cap->sym.aead.key_size.increment = 16; + } else if (mmo_attr->gcm_256_encrypt && mmo_attr->gcm_256_decrypt) { + cap->sym.aead.key_size.min = 32; + cap->sym.aead.key_size.max = 32; + cap->sym.aead.key_size.increment = 0; + } else if (mmo_attr->gcm_128_encrypt && mmo_attr->gcm_128_decrypt) { + cap->sym.aead.key_size.min = 16; + cap->sym.aead.key_size.max = 16; + cap->sym.aead.key_size.increment = 0; + } else { + DRV_LOG(ERR, "No available AES-GCM encryption/decryption supported."); + return -1; + } + /* Init tag size. */ + if (mmo_attr->gcm_auth_tag_128 && mmo_attr->gcm_auth_tag_96) { + cap->sym.aead.digest_size.min = 12; + cap->sym.aead.digest_size.max = 16; + cap->sym.aead.digest_size.increment = 4; + } else if (mmo_attr->gcm_auth_tag_96) { + cap->sym.aead.digest_size.min = 12; + cap->sym.aead.digest_size.max = 12; + cap->sym.aead.digest_size.increment = 0; + } else if (mmo_attr->gcm_auth_tag_128) { + cap->sym.aead.digest_size.min = 16; + cap->sym.aead.digest_size.max = 16; + cap->sym.aead.digest_size.increment = 0; + } else { + DRV_LOG(ERR, "No available AES-GCM tag size supported."); + return -1; + } + /* Init AAD size. */ + cap->sym.aead.aad_size.min = 0; + cap->sym.aead.aad_size.max = UINT16_MAX; + cap->sym.aead.aad_size.increment = 1; + /* Init IV size. */ + cap->sym.aead.iv_size.min = 12; + cap->sym.aead.iv_size.max = 12; + cap->sym.aead.iv_size.increment = 0; + /* Init left items. */ + cap->op = RTE_CRYPTO_OP_TYPE_SYMMETRIC; + cap->sym.xform_type = RTE_CRYPTO_SYM_XFORM_AEAD; + cap->sym.aead.algo = RTE_CRYPTO_AEAD_AES_GCM; + return 0; +} + static int mlx5_crypto_sym_gcm_session_configure(struct rte_cryptodev *dev, struct rte_crypto_sym_xform *xform, @@ -915,8 +969,10 @@ mlx5_crypto_gcm_dequeue_burst(void *queue_pair, int mlx5_crypto_gcm_init(struct mlx5_crypto_priv *priv) { + struct mlx5_common_device *cdev = priv->cdev; struct rte_cryptodev *crypto_dev = priv->crypto_dev; struct rte_cryptodev_ops *dev_ops = crypto_dev->dev_ops; + int ret; /* Override AES-GCM specified ops. */ dev_ops->sym_session_configure = mlx5_crypto_sym_gcm_session_configure; @@ -926,6 +982,13 @@ mlx5_crypto_gcm_init(struct mlx5_crypto_priv *priv) crypto_dev->dequeue_burst = mlx5_crypto_gcm_dequeue_burst; crypto_dev->enqueue_burst = mlx5_crypto_gcm_enqueue_burst; priv->max_klm_num = RTE_ALIGN((priv->max_segs_num + 1) * 2 + 1, MLX5_UMR_KLM_NUM_ALIGN); + /* Generate GCM capability. */ + ret = mlx5_crypto_generate_gcm_cap(&cdev->config.hca_attr.crypto_mmo, + mlx5_crypto_gcm_caps); + if (ret) { + DRV_LOG(ERR, "No enough AES-GCM cap."); + return -1; + } priv->caps = mlx5_crypto_gcm_caps; return 0; }