From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0076.outbound.protection.outlook.com [104.47.32.76]) by dpdk.org (Postfix) with ESMTP id BF5EF5699 for ; Mon, 3 Jul 2017 14:33:06 +0200 (CEST) Received: from CY4PR03CA0017.namprd03.prod.outlook.com (10.168.162.27) by BLUPR03MB471.namprd03.prod.outlook.com (10.141.78.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1220.11; Mon, 3 Jul 2017 12:33:05 +0000 Received: from BY2FFO11FD009.protection.gbl (2a01:111:f400:7c0c::168) by CY4PR03CA0017.outlook.office365.com (2603:10b6:903:33::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1220.11 via Frontend Transport; Mon, 3 Jul 2017 12:33:05 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BY2FFO11FD009.mail.protection.outlook.com (10.1.14.73) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1199.9 via Frontend Transport; Mon, 3 Jul 2017 12:33:04 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id v63CWqgr001316; Mon, 3 Jul 2017 05:33:02 -0700 From: Akhil Goyal To: CC: , , , , Akhil Goyal Date: Mon, 3 Jul 2017 18:01:37 +0530 Message-ID: <20170703123139.15148-4-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20170703123139.15148-1-akhil.goyal@nxp.com> References: <20170630074322.30661-1-akhil.goyal@nxp.com> <20170703123139.15148-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131435587845705835; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39860400002)(39450400003)(39400400002)(39850400002)(39840400002)(39410400002)(39380400002)(2980300002)(1110001)(1109001)(339900001)(199003)(189002)(9170700003)(36756003)(8936002)(5003940100001)(47776003)(189998001)(50466002)(50986999)(76176999)(33646002)(81166006)(5660300001)(305945005)(48376002)(2906002)(8676002)(356003)(626005)(2351001)(77096006)(104016004)(53936002)(8656002)(6666003)(6916009)(2950100002)(54906002)(106466001)(50226002)(1076002)(38730400002)(110136004)(105606002)(575784001)(4326008)(86362001)(85426001)(498600001); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUPR03MB471; H:az84smr01.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; A:1; MX:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2FFO11FD009; 1:+P+9JnDARqzSGzsY6Ph9ZVEMWsa7biRBMue8bz8FO1?= =?us-ascii?Q?FysPWnvJ1KP7BkQJdB6zzQuoJOTd4GzsoFLuEmv0osIlZ2aQGyE9fspn24xK?= =?us-ascii?Q?atRQxYJFAcq56mOT3PIssQspBzu1jrQi3Fv07BR2xCX7RVOFXDqQgpJJqPH1?= =?us-ascii?Q?0ntsCU2ZuCrQeTBmAfsTvQzwFJ6p+vAD6bKvDWg695Fh5/5HyMd0t9yVHJCG?= =?us-ascii?Q?oEAYa4rUKcTPZXssbKewIoiXWkGDS39L64ZQB3lOYibdTxJtnYyug1kB0TjA?= =?us-ascii?Q?YVqcIpGZxgNrClqK8n8CPg3pjvbj9ribR5a9sbP6lWt7aGGzjMB7Ra6Gz5Xz?= =?us-ascii?Q?LTLdjmd7z2zQ4T+ANAYA2et0g7fhIl4NdUANg8NTqwPgGqpXnmdJ8Mg8T7hL?= =?us-ascii?Q?/GzH9hGFHOEwk2KJxaPFAFK9XBcm8okBAv9VnKfhpefr2r+GIttSH8AW7pvT?= =?us-ascii?Q?evNNPN8moZyrGr1owa1blWegLZRhFLcTppUFstA7iqyh3Rr5sZiXtgDRrqWq?= =?us-ascii?Q?DuDmT91DOHZiYjLp5iNyLmN1VIhTxu02vWux3egzgUCodOvXhsZLzIW67fEf?= =?us-ascii?Q?0vN2q6ClXSotUuxYR43yGkb9o/J2ZPKDXKt/GGd9bemidMW3ojcQCUngDqsa?= =?us-ascii?Q?mdco+z3AMXEm9pMBgWD4QoSgR9iP186Eb7GmHZtGhgmbZu21EYMMEkS9yUyr?= =?us-ascii?Q?5KXvcylTO7ShJzo71Ascp67B1KthjcOdBEiQnPtRpaxV7QUNUzIantIGqbJH?= =?us-ascii?Q?hsi/RzbBCN82kBjekPur7fKQhPfrQujLIyUaW0K47sNyX4YX3r/wDkNM5RNv?= =?us-ascii?Q?IEGu266oOEZyv6MX5SAQ8HVCI+Yzd9IceD/RnrGVzFJrV5E0cw+Le2rlRSIu?= =?us-ascii?Q?HorrgZb8majRfw8Vp8DrItMiHkjzXrOngRnTTjfBCQ4IhtbGmJ2uE4PC18SC?= =?us-ascii?Q?moBMCodFzGUGGytzQhFxylRitGvoo8gLNOPN1kfbvdUwwUOWnCJF0vkv7SjD?= =?us-ascii?Q?DZlAdUSpaNiXf/RTsSDfrwcNGaKSysswOFv+MONUCOcNAdSbmu4zg7wmPNjM?= =?us-ascii?Q?4czPyOeCN8fB43/IhGyqmlqq3WXMuJl5xA6j951Y2CF5Wx5A=3D=3D?= MIME-Version: 1.0 Content-Type: text/plain X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 28b745e7-a2d8-4e76-506b-08d4c20fa6da X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603031)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BLUPR03MB471; X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 3: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 X-MS-TrafficTypeDiagnostic: BLUPR03MB471: X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 25: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 X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 31: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(133145235818549)(236129657087228)(185117386973197)(247924648384137); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(5005006)(13016025)(13018025)(8121501046)(3002001)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(6055026)(6096035)(20161123559100)(20161123556025)(201703131430075)(201703131433075)(201703131448075)(201703161259150)(201703151042153)(20161123561025)(20161123565025)(20161123563025)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BLUPR03MB471; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BLUPR03MB471; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BLUPR03MB471; 4:2/mRvo2XBUUQAEZu3Y8s5HU8qAZ8OoGoBOrs7drvnFW?= =?us-ascii?Q?O95j+r0xbaA3A0G7qjF4VbI7GRcKQt6s02fbut31ibjpKxMmD2C7uX3FiQxR?= =?us-ascii?Q?h3v0BpEsWFZJNGc9E0Ah1+P95+eyrZ6C5fBVqPt1IapOlMn6NWT3jXfhPc47?= =?us-ascii?Q?sUxLveqNxj+2gX16YZCXuSMHI0thIAqp5PO1jdn2RFhUINmx0YLH7UmXBF8C?= =?us-ascii?Q?Ygvl5Msj6bPmJK7Aoghxhj0EHS9GQfpMndUUEVmdMuylmy6xWyVBXaID3Qb5?= =?us-ascii?Q?TnLcymHyQD+TsPDBmhaPV87NSIDd7TEi0Muq/YWHPj9t3fF3kiBYgFq8kSBX?= =?us-ascii?Q?BROFZfwxVLvnIjCp30pw66EbymBnPHzVFRHFUjadWt5srMS8GimNq5YXJ5jD?= =?us-ascii?Q?3bynav/bcVf/DQFm2tYlSXOTNyzJPdUEYxVm8y94itm+FD6Lb/ULyaBdBJV0?= =?us-ascii?Q?HyJ+ZKhOk8SA7NnUBog94XcPmROTZxs2hAqKkVWcT2SHk0ERyC5kMP7odM0d?= =?us-ascii?Q?vr4fTjoaUwjCRKUkDvJ/DqybpDvWsbpI6tLv6GLcuxQgX3HFrf18vuDAr0TU?= =?us-ascii?Q?6BGG5ynQQGQN5Nb5Vi9dOP4/Nr3OgPLSWxFXKFqOEXhFMul59XqadXTVueWa?= =?us-ascii?Q?RH5txbjfPkdAukGNgIhnsH7FeuOXk8f3FfS17rcbc6TUY6vzXuoQXm20Q0Ep?= =?us-ascii?Q?y1x/o7ToNzK6rODneJ4nk/+blz6yXjBY2891Wv/PU8t9ZqjAugDmM1e176T1?= =?us-ascii?Q?TVb7lRTgcqoYjR24ktOxSK4wU8YNhPZCifXmSxe5vpMGfoftl8ZaWJOeWuky?= =?us-ascii?Q?UkFEEgSWvUtlJbqvhnBIqjilxZVosdHa4LqCeAovWtD0yKpXYC1TACv1pf8m?= =?us-ascii?Q?I4oEHU0TmFK7oMsOine1y4elewNwoKovqlGBlSUV4vUDN6l7XUnMFjngqoxl?= =?us-ascii?Q?huhF+TpTPXueiMAR49CIVErKb5oGHG1KzUcaDn3cB+QPtO9BuhSWjy38HXOc?= =?us-ascii?Q?k1G1WPODo/d/auHaQwXcP2i9ppe/cpmjlR4IssavASTf7VaySNY5Qq2Op9RV?= =?us-ascii?Q?fQqdE0nLUNdqftcy2+9XFXeFVl9sMHH87OTSHzENBpXL8rc+AE/zf+JvCbch?= =?us-ascii?Q?+tzfD5vYVIOSISPfeu0rGjy5NSb/NksXeTRL4KAdKqsMFkKy6iatJVVF+HB9?= =?us-ascii?Q?I4KaSQX/YltlE15thvBVg23fxBQcqm4sX1thDbmTl6yeGLgaLsL2iIh3vMg4?= =?us-ascii?Q?znUytQHmuGzdluR6sAh7rd8naM7Oid+fw2tj7n9bXeSO09SEAxvwRHq0lMbw?= =?us-ascii?Q?K5/EzVA0RzVPgtW8wVmRxZnuiq8shrxKw5SqsQxA1mj/vaVYwe0IwalqxAQ9?= =?us-ascii?Q?L87GchNx88bBWdTGGiAk/0E8=3D?= X-Forefront-PRVS: 035748864E X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BLUPR03MB471; 23:MLMTJ8S72clpypvPX15kDXNnPV8Zb8NAWfEljzIyap?= =?us-ascii?Q?Xl6EUyMVUtJ5wEPh4XMBzKUJcNyLoxgyBhLqra1dw5qEzQED4WgI7oNgoVNB?= =?us-ascii?Q?HCMslF8bHtTPl1HyLmTSJg4M/QJBEq4oWMnuU1cf2W+xuzO27Rlj+t3cZV38?= =?us-ascii?Q?Ej6qvFePpby2StVyRcdCZ2f+jJBxN1LwE+vdbVUNBFqKSUlAXzcq4p8wvXhr?= =?us-ascii?Q?9xpxV7sGE7RbYIqZTNE/5wyi2H93BIaUKuI0fUQL0tOzjKgPBSDaSLPvC67/?= =?us-ascii?Q?+DT3owyv4Jr+WzFp08lqWfiZlW6TCTYmcdhvSNR33GmKozyNEMrRoOMXMnz6?= =?us-ascii?Q?7hER1JASU2o9/ZwOygCXFXJypu83AaMyMgDUOYkKyuiu7LzCmIKD1eYsWFN4?= =?us-ascii?Q?CJLN4JdQHcjuk09eEdV/vzgyFh2MqZ3mf25jM1Omf4HYLQMXVBK1a2vURjXr?= =?us-ascii?Q?G+1NYGsUzGQsmabUKVWVr5XuBK4F97LKGQ5qRZp+hmh+501YCms2YqL10oLK?= =?us-ascii?Q?3tIwRHsFIipooQ/C0FFxiEPy2ucaoLUeWmiUdQKZJ04BdBgX0rBM4SgeWqVZ?= =?us-ascii?Q?3w7WWOkGHC3OoRFaXogLBBsdM6rkNdeZt+iA+fCrewt9hwEh50jYwDnjcqgT?= =?us-ascii?Q?/9bYszj1IR+JDurbsUEF530aJ+xYzWxg0BDmYVUSGzkybBWc2IGFUZX0ip8x?= =?us-ascii?Q?E/e3ebQqEmPMisWkMtyWcL4qHosvWkdRff3bmpYcHcY6wlKEKVa8PSTjJpN4?= =?us-ascii?Q?fWS3sQ829yH60OCCiVnxD5Z714jWhzEbYY28V8hTmGIXugQFBr7t5RLDXPyQ?= =?us-ascii?Q?vG14zkgBsWtBHoYy+O3B3KTzQUMcsfLRBA9hNtW9p/7yTsy3XaFQ6H6vSTWB?= =?us-ascii?Q?CeYXbzdqOnCATGBAu4Rr0y55GTZhldXOCkoAqlfPUoOln530o2wJdwl9lBwO?= =?us-ascii?Q?2h57ID1o8qQaBKf8TN84v0f1uOYsVPZJYXG9adQfvJ9SowTU1Jj1MhAjdf4+?= =?us-ascii?Q?9TRUMiWmZ1K/1XIaBUPtwsKc6jAGy3tV1fO9K9YKegWeusM3jqtatSGOpoWp?= =?us-ascii?Q?cxc8mJUhZvuxOcGKTqCWHjqVru7INSfLC3Ye7Af/uOTI1tlsc5AfUU1a4XEc?= =?us-ascii?Q?ESZZrEHfTkcSSdiCXfdFknvZAfOSGbIEhrsgwEjoqv+XwRF+5Yll0uoXp/bV?= =?us-ascii?Q?ceI2t6qcup/zS2PkPpQZzBnWF7KryKvPwdVK6UP++PCCvC7HCsFuXac+pgav?= =?us-ascii?Q?CDYg8mB7FXj8Sy3WLFRbV/BSMbZN0YdNMh67HuAQchf9YbOkvuJfyy5M0yGg?= =?us-ascii?Q?=3D=3D?= X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BLUPR03MB471; 6:zeNWNbJwnH7vYpckqheEA59nOlk5RWmYgcbPO4OimVL?= =?us-ascii?Q?OX35esUoxDPcDy9iM8HSOpA92WrGPzIw8t0iJSIMAEumAPr0lYkP+LmkAJHZ?= =?us-ascii?Q?HCjS406q1PudynmKQvP+Jcm5e1wv53Kig2p+pkgfannpmyhiJYbrl7mVO0/G?= =?us-ascii?Q?q+drkJ/D4VnnFgZZqHmiRUeyfLoYbAZxByABr8lu65k+sQZsKyGUm+yzl5OW?= =?us-ascii?Q?DaYixlaMEIt5AOQ31wvbY1D+68Sk/42nIX8Nh6saq9le57C7rrjwmYlWE+2+?= =?us-ascii?Q?AxrrwrNv/1A9IhEyBPeXHwZNIdzT3oIfV67QciMhCsZ8hNfPrEgtsA/g8v+6?= =?us-ascii?Q?ew7VgL+uuWXy1GFsSyF62lySD3FantQFYdXp3Qv3NbWV/cKigyd9fsj6DUcg?= =?us-ascii?Q?dCyehTjHr0KXZ8U8H+KRspcMEq89IrBV8jaupJAN4MU4Ox3z3pxbUbw47aA7?= =?us-ascii?Q?wavNXLlJwxiX5qkGmq31tcdjVMdAdNyIQ12q4ukBAcOi0IkNOoPChvkSNXov?= =?us-ascii?Q?O30tBHNGmfLeslcLN5slhaQ/yJ1EekKRFzptbLygFyjcaenOYPMu/LtFmYM/?= =?us-ascii?Q?NAuIdt5I5JwFJdKko40ZYKOWcGziHnIklyyCRyH9v12VnHgPZIzj2DEqjJwK?= =?us-ascii?Q?43kiEuzI4rBAESdzEctwbWO/nNJo74mg+VVjKScnmrw27H432Jf2jG+LI05s?= =?us-ascii?Q?7G34l/XvHGhi873lxuxReE7+Uv0S58pKLgFg1y8U3uMyjMKZU8AjsXrYM7D7?= =?us-ascii?Q?JMa/flGYUJde45VbPKE9CqGkyM7x+3hlqKOyZKuXNgA3b/EKZcoiyqhWdLVa?= =?us-ascii?Q?B/+3utn22jdoVWuGrP6e6F91qv6WQ7gG0Ucr51Mhemk2/gF+ZReiTybj69FU?= =?us-ascii?Q?buWQzmcDOGDIeaT/0wrCSWXXyoSbjzKbvqv7/op+j/zAMFnI4wfhS/c3QWYv?= =?us-ascii?Q?Agjg9n+q4bnJaRG8m1KBEHdeZBXF5r16RWcXPSABIt93dKMPlRV/6SM69JSM?= =?us-ascii?Q?=3D?= X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 5:O7eRg9v9wKIQ+wLbJtg7TJW/KXlGciTdAkIa42OuEiEg7OH9X0as/6KlHVjOjk/a7CASJur1TiCP/q/R1QOy71udHdULcYgLzhiQkhXHyDN753XKjPZc8S/VyQAyfNx8DEq+BVt2fup8HFlzt8n3kOwQN6FrwFpyv29sNgavHzuo9QaQWx1WMDMIHUpV+pFJ2twNGGNGGt4dq+wFMHa9uVW43uMUuxsvrYDdykErof4u0DdepI+ivCmX/Dt8Nvpn5YJsOzj2fC1LTqemhcqQ/rKOtQLqo7sUaZxeu1dwjEJX4lg3b4TXfQrP96so8Pq84/1Nm3x1Q/zbuIBwIs+sp+gUr1SnpX9NhUeM+d8C40/mZlkPOJJVo5LsMhOj3Q39uhawpvn/98oBXHVF/vsmWlcYZ09a34gIpfMB962wqmT5vCmqFwEydv7z4VHyCsYt6DkwMd+CXeG1Y2B6TPTtWA47d47CYO+6y1/kMNpot1jXMOIoIWGk15UJt3pUVPP2jn+FH7QFAPaBAYIHZ64aGQ==; 24:YBEF6ytLqG8n5MXbsxYKftdjNOTSvssOAqgS67thRPKKrK6eyoosyLx1XXyqLvS1E9W+W/1NCsCPKyun02e5qUgwdWpH/jVEegy2wVQSTmA= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BLUPR03MB471; 7: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 X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Jul 2017 12:33:04.4613 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR03MB471 Subject: [dpdk-dev] [PATCH v3 3/5] crypto/dpaa2_sec: add HW desc support for ctr X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jul 2017 12:33:07 -0000 Signed-off-by: Akhil Goyal --- drivers/crypto/dpaa2_sec/hw/desc/algo.h | 23 ++++++++++++++++------- drivers/crypto/dpaa2_sec/hw/desc/ipsec.h | 19 +++++++++++++------ 2 files changed, 29 insertions(+), 13 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/hw/desc/algo.h b/drivers/crypto/dpaa2_sec/hw/desc/algo.h index c71ada0..166bc3a 100644 --- a/drivers/crypto/dpaa2_sec/hw/desc/algo.h +++ b/drivers/crypto/dpaa2_sec/hw/desc/algo.h @@ -159,6 +159,10 @@ cnstr_shdsc_snow_f9(uint32_t *descbuf, bool ps, bool swap, * @ps: if 36/40bit addressing is desired, this parameter must be true * @swap: must be true when core endianness doesn't match SEC endianness * @cipherdata: pointer to block cipher transform definitions + * Valid algorithm values one of OP_ALG_ALGSEL_* {DES, 3DES, AES} + * Valid modes for: + * AES: OP_ALG_AAI_* {CBC, CTR} + * DES, 3DES: OP_ALG_AAI_CBC * @iv: IV data; if NULL, "ivlen" bytes from the input frame will be read as IV * @ivlen: IV length * @dir: DIR_ENC/DIR_DEC @@ -172,8 +176,10 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, { struct program prg; struct program *p = &prg; - const bool is_aes_dec = (dir == DIR_DEC) && - (cipherdata->algtype == OP_ALG_ALGSEL_AES); + uint32_t iv_off = 0; + const bool need_dk = (dir == DIR_DEC) && + (cipherdata->algtype == OP_ALG_ALGSEL_AES) && + (cipherdata->algmode == OP_ALG_AAI_CBC); LABEL(keyjmp); LABEL(skipdk); REFERENCE(pkeyjmp); @@ -191,7 +197,7 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, cipherdata->keylen, INLINE_KEY(cipherdata)); - if (is_aes_dec) { + if (need_dk) { ALG_OPERATION(p, cipherdata->algtype, cipherdata->algmode, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); @@ -199,7 +205,7 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, } SET_LABEL(p, keyjmp); - if (is_aes_dec) { + if (need_dk) { ALG_OPERATION(p, OP_ALG_ALGSEL_AES, cipherdata->algmode | OP_ALG_AAI_DK, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); @@ -209,12 +215,15 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); } + if (cipherdata->algmode == OP_ALG_AAI_CTR) + iv_off = 16; + if (iv) /* IV load, convert size */ - LOAD(p, (uintptr_t)iv, CONTEXT1, 0, ivlen, IMMED | COPY); + LOAD(p, (uintptr_t)iv, CONTEXT1, iv_off, ivlen, IMMED | COPY); else /* IV is present first before the actual message */ - SEQLOAD(p, CONTEXT1, 0, ivlen, 0); + SEQLOAD(p, CONTEXT1, iv_off, ivlen, 0); MATHB(p, SEQINSZ, SUB, MATH2, VSEQINSZ, 4, 0); MATHB(p, SEQINSZ, SUB, MATH2, VSEQOUTSZ, 4, 0); @@ -224,7 +233,7 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, SEQFIFOSTORE(p, MSG, 0, 0, VLF); PATCH_JUMP(p, pkeyjmp, keyjmp); - if (is_aes_dec) + if (need_dk) PATCH_JUMP(p, pskipdk, skipdk); return PROGRAM_FINALIZE(p); diff --git a/drivers/crypto/dpaa2_sec/hw/desc/ipsec.h b/drivers/crypto/dpaa2_sec/hw/desc/ipsec.h index c63d0da..5954055 100644 --- a/drivers/crypto/dpaa2_sec/hw/desc/ipsec.h +++ b/drivers/crypto/dpaa2_sec/hw/desc/ipsec.h @@ -1311,8 +1311,11 @@ cnstr_shdsc_ipsec_new_decap(uint32_t *descbuf, bool ps, * @descbuf: pointer to buffer used for descriptor construction * @ps: if 36/40bit addressing is desired, this parameter must be true * @swap: if true, perform descriptor byte swapping on a 4-byte boundary - * @cipherdata: ointer to block cipher transform definitions. + * @cipherdata: pointer to block cipher transform definitions. * Valid algorithm values one of OP_ALG_ALGSEL_* {DES, 3DES, AES} + * Valid modes for: + * AES: OP_ALG_AAI_* {CBC, CTR} + * DES, 3DES: OP_ALG_AAI_CBC * @authdata: pointer to authentication transform definitions. * Valid algorithm values - one of OP_ALG_ALGSEL_* {MD5, SHA1, * SHA224, SHA256, SHA384, SHA512} @@ -1379,8 +1382,9 @@ cnstr_shdsc_authenc(uint32_t *descbuf, bool ps, bool swap, { struct program prg; struct program *p = &prg; - const bool is_aes_dec = (dir == DIR_DEC) && - (cipherdata->algtype == OP_ALG_ALGSEL_AES); + const bool need_dk = (dir == DIR_DEC) && + (cipherdata->algtype == OP_ALG_ALGSEL_AES) && + (cipherdata->algmode == OP_ALG_AAI_CBC); LABEL(skip_patch_len); LABEL(keyjmp); @@ -1466,7 +1470,7 @@ cnstr_shdsc_authenc(uint32_t *descbuf, bool ps, bool swap, dir == DIR_ENC ? ICV_CHECK_DISABLE : ICV_CHECK_ENABLE, dir); - if (is_aes_dec) + if (need_dk) ALG_OPERATION(p, OP_ALG_ALGSEL_AES, cipherdata->algmode, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); pskipkeys = JUMP(p, skipkeys, LOCAL_JUMP, ALL_TRUE, 0); @@ -1478,7 +1482,7 @@ cnstr_shdsc_authenc(uint32_t *descbuf, bool ps, bool swap, dir == DIR_ENC ? ICV_CHECK_DISABLE : ICV_CHECK_ENABLE, dir); - if (is_aes_dec) { + if (need_dk) { ALG_OPERATION(p, OP_ALG_ALGSEL_AES, cipherdata->algmode | OP_ALG_AAI_DK, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); @@ -1503,7 +1507,10 @@ cnstr_shdsc_authenc(uint32_t *descbuf, bool ps, bool swap, SET_LABEL(p, aonly_len_offset); /* Read IV */ - SEQLOAD(p, CONTEXT1, 0, ivlen, 0); + if (cipherdata->algmode == OP_ALG_AAI_CTR) + SEQLOAD(p, CONTEXT1, 16, ivlen, 0); + else + SEQLOAD(p, CONTEXT1, 0, ivlen, 0); /* * Read data needed only for authentication. This is overwritten above -- 2.9.3