From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-cys01nam02on0089.outbound.protection.outlook.com [104.47.37.89]) by dpdk.org (Postfix) with ESMTP id 4539F5F25 for ; Tue, 4 Sep 2018 06:03:26 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kDAP7hMsj/+uHYt27kIYSZIL8fH1fQEdPxCUSK/8SBg=; b=BRG+LHpZmeA/7Ri0KcUfCzNilvnTVBMVxuZfWLfed9BQGWNn/jx3mkI8+Ky162oxO1OzbjlWnhTRNrkaJ30MIBK+u6vPqQWxZpFqsNB7b6U8KGf6ANQJtYOEtxJQMS/dTNqClrDi+kkAoru055aaF4+lirTOXr3NMoaDm1xsdgI= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Anoob.Joseph@cavium.com; Received: from ajoseph83.caveonetworks.com.com (115.113.156.2) by BYAPR07MB4902.namprd07.prod.outlook.com (2603:10b6:a02:ef::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1101.15; Tue, 4 Sep 2018 04:03:20 +0000 From: Anoob Joseph To: Akhil Goyal , Pablo de Lara , Thomas Monjalon Cc: Ragothaman Jayaraman , Jerin Jacob , Narayana Prasad , dev@dpdk.org, Ankur Dwivedi , Anoob Joseph , Murthy NSSR , Nithin Dabilpuram , Srisivasubramanian S , Tejasree Kondoj Date: Tue, 4 Sep 2018 09:29:09 +0530 Message-Id: <1536033560-21541-23-git-send-email-ajoseph@caviumnetworks.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1536033560-21541-1-git-send-email-ajoseph@caviumnetworks.com> References: <1528476325-15585-1-git-send-email-anoob.joseph@caviumnetworks.com> <1536033560-21541-1-git-send-email-ajoseph@caviumnetworks.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [115.113.156.2] X-ClientProxiedBy: BMXPR01CA0023.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:d::33) To BYAPR07MB4902.namprd07.prod.outlook.com (2603:10b6:a02:ef::25) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 10c71837-f632-44a5-6976-08d6121b5cac X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:BYAPR07MB4902; X-Microsoft-Exchange-Diagnostics: 1; BYAPR07MB4902; 3:s5PkuGO1GY5hqHxIp8zfSHzxd0c0LKsBXP/11nmXcI1I/SH/3UM2KZm7twx63C4uFrGpHDfjNIcixFIocH8WCW3JWwiQm4J9pLg7S8a8P2aF1acodOh5/9I40vSnFaI8KFw2h5uBtmYMwTmQcb/Z2waxX36rm7P/zgMpc9251Lcpn+A5SBqCFS7Myj+6pt7We36tvmziGpBbDyScAddBYMmVjIlJkk8jMqEt2cBSqFCg61NQD8/Y+DIhfCl5vOzs; 25:QAdX/ZRrGHgUyKdd5N5TgexxGqOGgDvvmkc+9esYrqHFiYi/tYBvfztO5Vq1WgEvYw9RdKrCRZQlHlbURUan0VsCOykpMkhbSONS4oSdVR7cMZmu6DL1s6grwsa8k+MXMwDtuCIhIEfjPsoZihd8Hrb3vLb/mGibeng3mvus9kjNcLFQJll8ED9kH64R8DfV9h6P7aFatd6MsmljXbLd7Rd+lPT0cXc/h4+QNV2db5reVvb6TML4cTSOTY1kGsyqgviWuTt0O8DA1+xrqAw3wiCgsyBKS3d9HTlgafEC1F6SOCZDEIVsGFBUnsLkg2w9kVgOd+w7lEAEiKt2Rr5vkw==; 31:pXYn1qIrUSpUFJ9GnT2aojLC/R2P6fCtBiR4K1nl4K2EIlxzTEchJKugzkVbmYMinh8L7M0QhQXMsAxkhG7SSiXinpf7MIa3zcth1jDLtOMB3uShfFow4byfM4R9Aey+RJK9L41ocLkQcIiqudMNQoBGMDJJmAaeCYFBWofmGnnSO4Rn+kePNI+5qfbjxqlP8NEHzP9OuVHJRSn1/FUdQbFSmPaQZCDpsk6Rlu0M1gk= X-MS-TrafficTypeDiagnostic: BYAPR07MB4902: X-Microsoft-Exchange-Diagnostics: 1; BYAPR07MB4902; 20:9gIW1vOqjyoy5ryFeW0t0TvlBbn29aDiQXt/SvkiB4B2uqVVXZXL4f9C5AqCfoiBc/Ve3+Kr72116/zE3DJVUZtDEnkDB9B5kBm/EKFMpg5Gxjh0mQFF8qZmboxd4MADkLMsQzD3H3OxopXMiYBvDjM/nz6vFMuuJW1ruAQmYrp2YSF87pIss8R3wgLC96P7CSfW86r4nQ6a7VndLW2UatslJOaXH8Vlrvy480fj8HNFrHGOjuwD0nDeOUHaDAz1iNcUJRcNjMQrBpkKCrgxuIOC2gquZwOhP+eW8BwnLbfFR17JjEDjvxpym+TtdWvGq6Asof0LfG43hk047IlsuzgMBkt3V2wh78EllWbPOOx9+pRHOC7RRnJ58ITJN9rUncBOkmA+RBneHvoDSWasxn77wb4Bk9WFNRR75MLWWKech1xIzQlqv9CTFL1zIJzn6q10s9gvD32Xq9eukeRmml68DBBS58it/kxovNF1MaEB1rvrZHjpCO/WVcbOhOeZSAd6vOc0w9b/WBHlDH/ObGsQbK4WVx21GR7o2ZiuFtsBGkdBIMHQxCC212gjAlqR6KHDol8Bj3IG3iF3OU87YBhod+vxl7G7FSuaWJjSg44=; 4:Zj0yNEtn1z9muATA02Pt/ZeGYUfjIpASHM8svVUyWRF8rze8tskyxsa79wrohRbwENDyhODqCViO+Hf6cZ3YHwyF6/S7l4WdZ20DjBW4Rp4OcyZ3+BdjH5lR4bIgwcIhl2ymG9wXuRL+tP0oYsX9LLQMxum1W4EvboqKmJ36+kP/Vq5bk1a3zEG5C2DU7Y3U3/9DFYW0UUQmbKj5L+xkv2BWnPFYJLyC7kwAloy1wgYLfsze5tikCd8rqNgWeAZNSSY5LV02o+y7+hCyN7hgKA== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(93006095)(3231311)(944501410)(52105095)(3002001)(149027)(150027)(6041310)(20161123562045)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(201708071742011)(7699016); SRVR:BYAPR07MB4902; BCL:0; PCL:0; RULEID:; SRVR:BYAPR07MB4902; X-Forefront-PRVS: 0785459C39 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(366004)(396003)(136003)(346002)(376002)(39860400002)(199004)(189003)(26005)(51416003)(52116002)(76176011)(81166006)(305945005)(81156014)(7736002)(105586002)(316002)(6506007)(106356001)(6512007)(8936002)(446003)(54906003)(25786009)(6666003)(68736007)(50226002)(110136005)(53936002)(16586007)(42882007)(386003)(5660300001)(2906002)(72206003)(50466002)(6486002)(36756003)(6116002)(107886003)(2616005)(14444005)(186003)(3846002)(478600001)(66066001)(476003)(8676002)(47776003)(486006)(956004)(48376002)(11346002)(4326008)(97736004)(16526019); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR07MB4902; H:ajoseph83.caveonetworks.com.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: None (protection.outlook.com: cavium.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BYAPR07MB4902; 23:FU8s38U0pnEntb5o6MJYi5mJWcXaWsngRmAS6tkhU?= =?us-ascii?Q?oxwO9vIwWZmfDiSvCc+/MngggfvyXPLC19cH871YyK8mojrQ2+OzmJTcsxjz?= =?us-ascii?Q?zCZHc2kiPdfH7mmJt2xpyb5+R5tmurN8fbjJT5Gq+W5fA/XgpnnuzsVinn7i?= =?us-ascii?Q?+WgcsHrm1OY88F/xv4yGH8G02G7QPCm9VqO2k01mmritVqo6AHE0+5ZCXOJ0?= =?us-ascii?Q?JGW9V2aZKk6UGJo3Rn4PEaSqIlT5iIiuynuPovScEcKNssEj3v0IAjaM/MVs?= =?us-ascii?Q?+lO2z8HZFCHhm1YhXevj1BuJwVopnqADxcQs8GlptLUSvx0g38tqr2+LevZb?= =?us-ascii?Q?Pl4brQUyVTxNKQ5D6y1wn5aY/oz7/jEMR4Dxn1dO5Fc9F+JBcGvhEqYGVEh3?= =?us-ascii?Q?J/u/aqZfvQPzPeJKVcwEOnZi8jrb4Yi3C3WdJDqfppiKGLYyndtaSdE2KmAM?= =?us-ascii?Q?Jcds2j5Y8j7ROslvfdl4ZAptZ5BlWdAUWIbd04ECfxK77YQ76VaIdXm31cr1?= =?us-ascii?Q?OvQe1POxQBrRB8oi4P4sGH/y8UDAwv+TOhESXBKzQh1b+sNwQJH23ixewiyD?= =?us-ascii?Q?zK30hsepSjxj9pFi8HusuXB4i/3WuXMrMLML6MOoCjnbeT5vdYN0eEL8Fmcn?= =?us-ascii?Q?vc30hYyYotCkh/xIaIDEuZDg7jhdFWhKyI6J8G3m7vs8mTLbQ25d/q2qTAY4?= =?us-ascii?Q?f5okifiCCpfy8l05+cvmnH0YI2jSqbffI8/3O273mvDVOAa6OAEknt0BDNwN?= =?us-ascii?Q?05e0M+O8ysw7Q5MnKxlsuRz4W5Tpi1QpvPG9cergPT8O2i86d+i8GEL3LX8b?= =?us-ascii?Q?kZaFjtVNIAyYUA/0jlpRrCuQVlMKqAEdcMX/ua3+FbD9YsnmIQ+YfVD7gOmK?= =?us-ascii?Q?ywA+OK/RJOAhv9BMaOUKNq9sf9XvKjLxR0sFGBAUTZRV0ZQaIinXU1zUnUGM?= =?us-ascii?Q?dTbpb9g3vn19MBulmOncZn6f53lSUVVcijVQVpuKApId5w6voUHx1MekUYvI?= =?us-ascii?Q?3jsZCUH2BYmDRJatBn/sY2K/ZdwkIcxHDlURG1hBvFVcZt5gJTOnez2CjQiE?= =?us-ascii?Q?5bdkaUXxrbBwdBBRzs6ozAAdWXwh2ThVBArmN1PhQ/9E+v9HSuBt4wsN8us1?= =?us-ascii?Q?roAu0/1SjpcxmUk/E0ZCyXkeKZqs5WTwUnS33fFbYdhxypjtxSfD3Zqni/L6?= =?us-ascii?Q?Sf3qPF7kqytkYjcJfoy0PGxVASwPU45GKasX6YXw0vO8vVwORb6Y2A1coyZJ?= =?us-ascii?Q?XOEQwI7wob9sv+f0g4=3D?= X-Microsoft-Antispam-Message-Info: BIPT9aFOnyr3SCpE0FbPeXGEy02Np8i7afPTv08Cf/RqbBYDbYAATET0pM55Bfpd+B+MBm0a51r6AuY2FmTIsqmR4Vz6U8zq+mNIBGTe/29eYKaI3cysWOCNbIpnuAiJeU2r++a9NrCXKlsWGgAYw2/wy5ZXwjgoj/I3LAgyDYPTHeFh02ZwC3RfY4fDzMjmczB8CPaYHynJmNxYGcDgi/NZWoo/+porSHm04qj87aZl+riZoWVTHIegz5E4BLCSeWovecSAr3to7k3gAt3sRurq8da1NtWk5oKdGzEV6IXzt5//Ic6sMyx/3HN/nl3q60/W4a/bBu/7paBM3amkJc+JbQdK3HJl7Ydooq3yXZw= X-Microsoft-Exchange-Diagnostics: 1; BYAPR07MB4902; 6:epRUXfhpdTjwHzS50/h815BuoYbKdPlnHxhPFvPj04RHqV/pYj6jAcrNTsJOVOKjXfdHxjrplWOMQHFUZ7NO3be7vV61Kd+nrSfoyHQTMke06SIazXgffmTq1aKf++vYrgxwh/pCsFX/X4IZV1/jnQt9a6E+eBf65JjF2EoPlqXhCd0Aa34i71Dic3MG2bBk/5azz/nJ3iJ/pRNDo8WwRkGPmmk6cyR4JCs8Jo0gK6wqk75eM6fa3uQXFfkS4bVmILMV6bfGECNOK4qx6g6fA0X15t+2xyyETy5s6nG7W9DcJLVHeNAIGTJGcbSpxpn8iNX6DkdQ8JB01JJyxxrVdonSVxLAhxODYOcThyLyV4FKtrUSJ2kAsK2awdgTTcf09JaIA6vtk9rCJX/BqeXepXl3znHiAHzd6wpjDZD671Gq8HkI110D5Q2wPgtUgYU4FWAme54CrtemaDP8owftDQ==; 5:fhHdG+SIaon7UDycQA5nqkFCLgy1lFSkNwoBP13xS0pUJ5GVKCelZ1G2g2c1epGbwFGs3KeTj8XpwMoEgj0IvOzylcxllKuk0h1+ITKEHJQYw12fb2Qpjdi/aKJDgUdOqnBSJriH7IW0x6ZMuCv20u9p/oxuQPWVBorMEGfGOk8=; 7:jXjMqXuzVDyALg6MB4kTZ5vkurs2qb8Hdi8mZ1af3uzJdzXXbqoAYZvYAdVnaANghIHqHhdwDQbI+6JLqb3qlN+OO4QLIeLfoa7fiXjW7FHMhS/B5zkKq6QgI2T0oUN8dTvII11FG5mbVjvw4Z2+Fsb2z+Vqh1MkrZhrmGx2JFuSbPYmU7HECKk3b4Zj0Zh0sKgnff0j4/Kxy7lsKdTqs8oJbUguJjaAdhP8iTtvL/XTt7XrAfV+CF1Y/cr0ozE8 SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Sep 2018 04:03:20.9286 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 10c71837-f632-44a5-6976-08d6121b5cac X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 711e4ccf-2e9b-4bcf-a551-4094005b6194 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR07MB4902 Subject: [dpdk-dev] [PATCH v2 22/33] common/cpt: add microcode interface for decryption X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Sep 2018 04:03:27 -0000 From: Ragothaman Jayaraman Adding microcode interface additions for supporting decryption. Signed-off-by: Ankur Dwivedi Signed-off-by: Anoob Joseph Signed-off-by: Murthy NSSR Signed-off-by: Nithin Dabilpuram Signed-off-by: Ragothaman Jayaraman Signed-off-by: Srisivasubramanian S Signed-off-by: Tejasree Kondoj --- drivers/common/cpt/cpt_ucode.h | 436 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 436 insertions(+) diff --git a/drivers/common/cpt/cpt_ucode.h b/drivers/common/cpt/cpt_ucode.h index add5f95..e14d9c3 100644 --- a/drivers/common/cpt/cpt_ucode.h +++ b/drivers/common/cpt/cpt_ucode.h @@ -763,6 +763,439 @@ cpt_enc_hmac_prep(uint32_t flags, return 0; } +static __rte_always_inline int +cpt_dec_hmac_prep(uint32_t flags, + uint64_t d_offs, + uint64_t d_lens, + fc_params_t *fc_params, + void *op, + void **prep_req) +{ + uint32_t iv_offset = 0, size; + int32_t inputlen, outputlen, enc_dlen, auth_dlen; + struct cpt_ctx *cpt_ctx; + int32_t hash_type, mac_len, m_size; + uint8_t iv_len = 16; + struct cpt_request_info *req; + buf_ptr_t *meta_p, *aad_buf = NULL; + uint32_t encr_offset, auth_offset; + uint32_t encr_data_len, auth_data_len, aad_len = 0; + uint32_t passthrough_len = 0; + void *m_vaddr, *offset_vaddr; + uint64_t m_dma, offset_dma, ctx_dma; + opcode_info_t opcode; + vq_cmd_word0_t vq_cmd_w0; + vq_cmd_word3_t vq_cmd_w3; + void *c_vaddr; + uint64_t c_dma; + + meta_p = &fc_params->meta_buf; + m_vaddr = meta_p->vaddr; + m_dma = meta_p->dma_addr; + m_size = meta_p->size; + + encr_offset = ENCR_OFFSET(d_offs); + auth_offset = AUTH_OFFSET(d_offs); + encr_data_len = ENCR_DLEN(d_lens); + auth_data_len = AUTH_DLEN(d_lens); + + if (unlikely(flags & VALID_AAD_BUF)) { + /* + * We dont support both aad + * and auth data separately + */ + auth_data_len = 0; + auth_offset = 0; + aad_len = fc_params->aad_buf.size; + aad_buf = &fc_params->aad_buf; + } + + cpt_ctx = fc_params->ctx_buf.vaddr; + hash_type = cpt_ctx->hash_type; + mac_len = cpt_ctx->mac_len; + + if (hash_type == GMAC_TYPE) + encr_data_len = 0; + + if (unlikely(!(flags & VALID_IV_BUF))) { + iv_len = 0; + iv_offset = ENCR_IV_OFFSET(d_offs); + } + + if (unlikely(flags & VALID_AAD_BUF)) { + /* + * When AAD is given, data above encr_offset is pass through + * Since AAD is given as separate pointer and not as offset, + * this is a special case as we need to fragment input data + * into passthrough + encr_data and then insert AAD in between. + */ + if (hash_type != GMAC_TYPE) { + passthrough_len = encr_offset; + auth_offset = passthrough_len + iv_len; + encr_offset = passthrough_len + aad_len + iv_len; + auth_data_len = aad_len + encr_data_len; + } else { + passthrough_len = 16 + aad_len; + auth_offset = passthrough_len + iv_len; + auth_data_len = aad_len; + } + } else { + encr_offset += iv_len; + auth_offset += iv_len; + } + + /* + * Save initial space that followed app data for completion code & + * alternate completion code to fall in same cache line as app data + */ + m_vaddr = (uint8_t *)m_vaddr + COMPLETION_CODE_SIZE; + m_dma += COMPLETION_CODE_SIZE; + size = (uint8_t *)RTE_PTR_ALIGN((uint8_t *)m_vaddr, 16) - + (uint8_t *)m_vaddr; + c_vaddr = (uint8_t *)m_vaddr + size; + c_dma = m_dma + size; + size += sizeof(cpt_res_s_t); + + m_vaddr = (uint8_t *)m_vaddr + size; + m_dma += size; + m_size -= size; + + /* start cpt request info structure at 8 byte alignment */ + size = (uint8_t *)RTE_PTR_ALIGN(m_vaddr, 8) - + (uint8_t *)m_vaddr; + + req = (struct cpt_request_info *)((uint8_t *)m_vaddr + size); + + size += sizeof(struct cpt_request_info); + m_vaddr = (uint8_t *)m_vaddr + size; + m_dma += size; + m_size -= size; + + /* Initialising ctrl and opcode + * fields in cpt request structure + */ + + req->se_req = SE_CORE_REQ; + /* + * We are using DMA mode but indicate that + * SGIO list is already populated. + */ + req->dma_mode = CTRL_DMA_MODE_SGIO; + + /* Decryption */ + opcode.s.major = CPT_MAJOR_OP_FC; + opcode.s.minor = 1; + + enc_dlen = encr_offset + encr_data_len; + auth_dlen = auth_offset + auth_data_len; + + if (auth_dlen > enc_dlen) { + inputlen = auth_dlen + mac_len; + outputlen = auth_dlen; + } else { + inputlen = enc_dlen + mac_len; + outputlen = enc_dlen; + } + + if (hash_type == GMAC_TYPE) + encr_offset = inputlen; + + vq_cmd_w0.u64 = 0; + vq_cmd_w0.s.param1 = rte_cpu_to_be_16(encr_data_len); + vq_cmd_w0.s.param2 = rte_cpu_to_be_16(auth_data_len); + + /* + * In 83XX since we have a limitation of + * IV & Offset control word not part of instruction + * and need to be part of Data Buffer, we check if + * head room is there and then only do the Direct mode processing + */ + if (likely((flags & SINGLE_BUF_INPLACE) && + (flags & SINGLE_BUF_HEADTAILROOM))) { + void *dm_vaddr = fc_params->bufs[0].vaddr; + uint64_t dm_dma_addr = fc_params->bufs[0].dma_addr; + /* + * This flag indicates that there is 24 bytes head room and + * 8 bytes tail room available, so that we get to do + * DIRECT MODE with limitation + */ + + offset_vaddr = (uint8_t *)dm_vaddr - OFF_CTRL_LEN - iv_len; + offset_dma = dm_dma_addr - OFF_CTRL_LEN - iv_len; + req->ist.ei1 = offset_dma; + + /* RPTR should just exclude offset control word */ + req->ist.ei2 = dm_dma_addr - iv_len; + + /* In direct mode,changing the alternate completion code address + * to start of rptr,the assumption is that most auth iv failure + * are reported at first byte only.This will not give the + * correct alternate completion code the auth iv fail is + * reported after some bytes. + * FIXME + */ + req->alternate_caddr = (uint64_t *)((uint8_t *)dm_vaddr - + iv_len); + /* since this is decryption, + * don't touch the content of + * alternate ccode space as it contains + * hmac. + */ + + vq_cmd_w0.s.dlen = rte_cpu_to_be_16(inputlen + OFF_CTRL_LEN); + + vq_cmd_w0.s.opcode = rte_cpu_to_be_16(opcode.flags); + + if (likely(iv_len)) { + uint64_t *dest = (uint64_t *)((uint8_t *)offset_vaddr + + OFF_CTRL_LEN); + uint64_t *src = fc_params->iv_buf; + dest[0] = src[0]; + dest[1] = src[1]; + } + + *(uint64_t *)offset_vaddr = + rte_cpu_to_be_64(((uint64_t)encr_offset << 16) | + ((uint64_t)iv_offset << 8) | + ((uint64_t)auth_offset)); + + } else { + uint64_t dptr_dma, rptr_dma; + uint32_t g_size_bytes, s_size_bytes; + sg_comp_t *gather_comp; + sg_comp_t *scatter_comp; + uint8_t *in_buffer; + uint8_t i = 0; + + /* This falls under strict SG mode */ + offset_vaddr = m_vaddr; + offset_dma = m_dma; + size = OFF_CTRL_LEN + iv_len; + + m_vaddr = (uint8_t *)m_vaddr + size; + m_dma += size; + m_size -= size; + + opcode.s.major |= CPT_DMA_MODE; + + vq_cmd_w0.s.opcode = rte_cpu_to_be_16(opcode.flags); + + if (likely(iv_len)) { + uint64_t *dest = (uint64_t *)((uint8_t *)offset_vaddr + + OFF_CTRL_LEN); + uint64_t *src = fc_params->iv_buf; + dest[0] = src[0]; + dest[1] = src[1]; + } + + *(uint64_t *)offset_vaddr = + rte_cpu_to_be_64(((uint64_t)encr_offset << 16) | + ((uint64_t)iv_offset << 8) | + ((uint64_t)auth_offset)); + + + /* DPTR has SG list */ + in_buffer = m_vaddr; + dptr_dma = m_dma; + + ((uint16_t *)in_buffer)[0] = 0; + ((uint16_t *)in_buffer)[1] = 0; + + /* TODO Add error check if space will be sufficient */ + gather_comp = (sg_comp_t *)((uint8_t *)m_vaddr + 8); + + /* + * Input Gather List + */ + i = 0; + + /* Offset control word that includes iv */ + i = fill_sg_comp(gather_comp, i, offset_dma, + offset_vaddr, OFF_CTRL_LEN + iv_len); + + /* Add input data */ + if (flags & VALID_MAC_BUF) { + size = inputlen - iv_len - mac_len; + if (size) { + /* input data only */ + if (unlikely(flags & SINGLE_BUF_INPLACE)) { + i = fill_sg_comp_from_buf_min( + gather_comp, i, + fc_params->bufs, + &size); + } else { + uint32_t aad_offset = aad_len ? + passthrough_len : 0; + + i = fill_sg_comp_from_iov(gather_comp, + i, + fc_params->src_iov, + 0, &size, + aad_buf, + aad_offset); + } + if (size) + return ERR_BAD_INPUT_ARG; + } + + /* mac data */ + if (mac_len) { + i = fill_sg_comp_from_buf(gather_comp, i, + &fc_params->mac_buf); + } + } else { + /* input data + mac */ + size = inputlen - iv_len; + if (size) { + if (unlikely(flags & SINGLE_BUF_INPLACE)) { + i = fill_sg_comp_from_buf_min( + gather_comp, i, + fc_params->bufs, + &size); + } else { + uint32_t aad_offset = aad_len ? + passthrough_len : 0; + + if (!fc_params->src_iov) + return ERR_BAD_INPUT_ARG; + + i = fill_sg_comp_from_iov(gather_comp, i, + fc_params->src_iov, + 0, &size, + aad_buf, + aad_offset); + } + + if (size) + return ERR_BAD_INPUT_ARG; + } + } + ((uint16_t *)in_buffer)[2] = rte_cpu_to_be_16(i); + g_size_bytes = ((i + 3) / 4) * sizeof(sg_comp_t); + + /* + * Output Scatter List + */ + + i = 0; + scatter_comp = + (sg_comp_t *)((uint8_t *)gather_comp + g_size_bytes); + + /* Add iv */ + if (iv_len) { + i = fill_sg_comp(scatter_comp, i, + offset_dma + OFF_CTRL_LEN, + (uint8_t *)offset_vaddr + OFF_CTRL_LEN, + iv_len); + } + + /* Add output data */ + size = outputlen - iv_len; + if (size) { + if (unlikely(flags & SINGLE_BUF_INPLACE)) { + /* handle single buffer here */ + i = fill_sg_comp_from_buf_min(scatter_comp, i, + fc_params->bufs, + &size); + } else { + uint32_t aad_offset = aad_len ? + passthrough_len : 0; + + if (!fc_params->dst_iov) + return ERR_BAD_INPUT_ARG; + + i = fill_sg_comp_from_iov(scatter_comp, i, + fc_params->dst_iov, 0, + &size, aad_buf, + aad_offset); + } + + if (unlikely(size)) + return ERR_BAD_INPUT_ARG; + } + + ((uint16_t *)in_buffer)[3] = rte_cpu_to_be_16(i); + s_size_bytes = ((i + 3) / 4) * sizeof(sg_comp_t); + + size = g_size_bytes + s_size_bytes + SG_LIST_HDR_SIZE; + + /* This is DPTR len incase of SG mode */ + vq_cmd_w0.s.dlen = rte_cpu_to_be_16(size); + + m_vaddr = (uint8_t *)m_vaddr + size; + m_dma += size; + m_size -= size; + + /* cpt alternate completion address saved earlier */ + req->alternate_caddr = (uint64_t *)((uint8_t *)c_vaddr - 8); + *req->alternate_caddr = ~((uint64_t)COMPLETION_CODE_INIT); + rptr_dma = c_dma - 8; + size += COMPLETION_CODE_SIZE; + + req->ist.ei1 = dptr_dma; + req->ist.ei2 = rptr_dma; + } + + /* First 16-bit swap then 64-bit swap */ + /* TODO: HACK: Reverse the vq_cmd and cpt_req bit field definitions + * to eliminate all the swapping + */ + vq_cmd_w0.u64 = rte_cpu_to_be_64(vq_cmd_w0.u64); + + ctx_dma = fc_params->ctx_buf.dma_addr + + offsetof(struct cpt_ctx, fctx); + /* vq command w3 */ + vq_cmd_w3.u64 = 0; + vq_cmd_w3.s.grp = 0; + vq_cmd_w3.s.cptr = ctx_dma; + + /* 16 byte aligned cpt res address */ + req->completion_addr = (uint64_t *)((uint8_t *)c_vaddr); + *req->completion_addr = COMPLETION_CODE_INIT; + req->comp_baddr = c_dma; + + /* Fill microcode part of instruction */ + req->ist.ei0 = vq_cmd_w0.u64; + req->ist.ei3 = vq_cmd_w3.u64; + + req->op = op; + + *prep_req = req; + return 0; +} + +static __rte_always_inline void * +cpt_fc_dec_hmac_prep(uint32_t flags, + uint64_t d_offs, + uint64_t d_lens, + fc_params_t *fc_params, + void *op, int *ret_val) +{ + struct cpt_ctx *ctx = fc_params->ctx_buf.vaddr; + uint8_t fc_type; + void *prep_req = NULL; + int ret; + + fc_type = ctx->fc_type; + + if (likely(fc_type == FC_GEN)) { + ret = cpt_dec_hmac_prep(flags, d_offs, d_lens, + fc_params, op, &prep_req); + } else { + /* + * For AUTH_ONLY case, + * MC only supports digest generation and verification + * should be done in software by memcmp() + */ + + ret = ERR_EIO; + } + + if (unlikely(!prep_req)) + *ret_val = ret; + return prep_req; +} + static __rte_always_inline void *__hot cpt_fc_enc_hmac_prep(uint32_t flags, uint64_t d_offs, uint64_t d_lens, fc_params_t *fc_params, void *op, int *ret_val) @@ -1614,6 +2047,9 @@ fill_fc_params(struct rte_crypto_op *cop, if (cpt_op & CPT_OP_ENCODE) prep_req = cpt_fc_enc_hmac_prep(flags, d_offs, d_lens, &fc_params, op, op_ret); + else + prep_req = cpt_fc_dec_hmac_prep(flags, d_offs, d_lens, + &fc_params, op, op_ret); if (unlikely(!prep_req)) free_op_meta(mdata, cpt_m_info->cptvf_meta_pool); -- 2.7.4