DPDK patches and discussions
 help / color / mirror / Atom feed
From: Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>
To: dev@dpdk.org
Cc: gakhil@marvell.com, kai.ji@intel.com,
	Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>
Subject: [PATCH] crypto/qat: add caching of the asym config
Date: Wed, 14 May 2025 08:09:46 +0000	[thread overview]
Message-ID: <20250514080946.1633268-1-arkadiuszx.kusztal@intel.com> (raw)

Added caching option of asymmetric crypto parameters.
This helps to avoid cleaning of unused data and allows
introducing the options to reuse the previous setup.

Signed-off-by: Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>
---
 drivers/crypto/qat/qat_asym.c | 125 ++++++++++++++++++----------------
 drivers/crypto/qat/qat_asym.h |  13 ++++
 2 files changed, 81 insertions(+), 57 deletions(-)

diff --git a/drivers/crypto/qat/qat_asym.c b/drivers/crypto/qat/qat_asym.c
index f5b56b2f71..f91ad82fba 100644
--- a/drivers/crypto/qat/qat_asym.c
+++ b/drivers/crypto/qat/qat_asym.c
@@ -79,15 +79,23 @@ static const struct rte_driver cryptodev_qat_asym_driver = {
 	} while (0)
 
 #define SET_PKE_LN(what, how, idx) \
-	rte_memcpy(cookie->input_array[idx] + how - \
-		what.length, \
-		what.data, \
-		what.length)
+	do { \
+		rte_memcpy(cookie->input_array[idx] + how - \
+			what.length, \
+			what.data, \
+			what.length);	\
+		cookie->cache.info_in[idx].length = what.length; \
+		cookie->cache.info_in[idx].offset = how - what.length; \
+	} while (0)
 
 #define SET_PKE_LN_EC(curve, p, idx) \
-	rte_memcpy(cookie->input_array[idx] + \
-		qat_func_alignsize - curve.bytesize, \
-		curve.p.data, curve.bytesize)
+	do { \
+		rte_memcpy(cookie->input_array[idx] + \
+			qat_func_alignsize - curve.bytesize, \
+			curve.p.data, curve.bytesize); \
+		cookie->cache.info_in[idx].length = curve.bytesize; \
+		cookie->cache.info_in[idx].offset = qat_func_alignsize - curve.bytesize; \
+	} while (0)
 
 #define SET_PKE_9A_IN(what, idx) \
 	rte_memcpy(&cookie->input_buffer[idx * \
@@ -118,54 +126,35 @@ request_init(struct icp_qat_fw_pke_request *qat_req)
 }
 
 static void
-cleanup_arrays(struct qat_asym_op_cookie *cookie,
-		int in_count, int out_count, int alg_size)
+cleanup(struct qat_asym_op_cookie *cookie,
+	const struct rte_crypto_asym_xform __rte_unused *xform)
 {
 	int i;
 
-	for (i = 0; i < in_count; i++)
-		memset(cookie->input_array[i], 0x0, alg_size);
-	for (i = 0; i < out_count; i++)
-		memset(cookie->output_array[i], 0x0, alg_size);
-}
+	cookie->cache.curve_id = 0;
+	if (cookie->cache.bytes) {
+		memset(&cookie->input_buffer[0], 0, cookie->cache.bytes);
+		cookie->cache.bytes = 0;
+		return;
+	}
 
-static void
-cleanup_crt(struct qat_asym_op_cookie *cookie,
-		int alg_size)
-{
-	int i;
+	for (i = 0; i < MAX_PKE_PARAMS; i++) {
+		const uint16_t offset = cookie->cache.info_in[i].offset;
+		const uint16_t length = cookie->cache.info_in[i].length;
 
-	memset(cookie->input_array[0], 0x0, alg_size);
-	for (i = 1; i < QAT_ASYM_RSA_QT_NUM_IN_PARAMS; i++)
-		memset(cookie->input_array[i], 0x0, alg_size / 2);
-	for (i = 0; i < QAT_ASYM_RSA_NUM_OUT_PARAMS; i++)
-		memset(cookie->output_array[i], 0x0, alg_size);
-}
+		if (length == 0)
+			break;
+		memset(&cookie->input_array[i][offset], 0, length);
+		cookie->cache.info_in[i].length = 0;
+		cookie->cache.info_in[i].offset = 0;
+	}
+	for (i = 0; i < MAX_PKE_PARAMS; i++) {
+		const uint16_t length = cookie->cache.info_out[i].length;
 
-static void
-cleanup(struct qat_asym_op_cookie *cookie,
-		const struct rte_crypto_asym_xform *xform)
-{
-	if (xform->xform_type == RTE_CRYPTO_ASYM_XFORM_MODEX)
-		cleanup_arrays(cookie, QAT_ASYM_MODEXP_NUM_IN_PARAMS,
-				QAT_ASYM_MODEXP_NUM_OUT_PARAMS,
-				cookie->alg_bytesize);
-	else if (xform->xform_type == RTE_CRYPTO_ASYM_XFORM_MODINV)
-		cleanup_arrays(cookie, QAT_ASYM_MODINV_NUM_IN_PARAMS,
-				QAT_ASYM_MODINV_NUM_OUT_PARAMS,
-				cookie->alg_bytesize);
-	else if (xform->xform_type == RTE_CRYPTO_ASYM_XFORM_RSA) {
-		if (xform->rsa.key_type == RTE_RSA_KEY_TYPE_QT)
-			cleanup_crt(cookie, cookie->alg_bytesize);
-		else {
-			cleanup_arrays(cookie, QAT_ASYM_RSA_NUM_IN_PARAMS,
-				QAT_ASYM_RSA_NUM_OUT_PARAMS,
-				cookie->alg_bytesize);
-		}
-	} else {
-		cleanup_arrays(cookie, QAT_ASYM_MAX_PARAMS,
-				QAT_ASYM_MAX_PARAMS,
-				QAT_PKE_MAX_LN_SIZE);
+		if (length == 0)
+			break;
+		memset(&cookie->output_array[i], 0, length);
+		cookie->cache.info_out[i].length = 0;
 	}
 }
 
@@ -263,7 +252,7 @@ modexp_set_input(struct icp_qat_fw_pke_request *qat_req,
 
 static uint8_t
 modexp_collect(struct rte_crypto_asym_op *asym_op,
-		const struct qat_asym_op_cookie *cookie,
+		struct qat_asym_op_cookie *cookie,
 		const struct rte_crypto_asym_xform *xform)
 {
 	rte_crypto_param n = xform->modex.modulus;
@@ -277,6 +266,7 @@ modexp_collect(struct rte_crypto_asym_op *asym_op,
 	rte_memcpy(modexp_result,
 		cookie->output_array[0] + alg_bytesize
 		- n.length, n.length);
+	cookie->cache.info_out[0].length = alg_bytesize;
 	asym_op->modex.result.length = alg_bytesize;
 	HEXDUMP("ModExp result", cookie->output_array[0],
 			alg_bytesize);
@@ -324,7 +314,7 @@ modinv_set_input(struct icp_qat_fw_pke_request *qat_req,
 
 static uint8_t
 modinv_collect(struct rte_crypto_asym_op *asym_op,
-		const struct qat_asym_op_cookie *cookie,
+		struct qat_asym_op_cookie *cookie,
 		const struct rte_crypto_asym_xform *xform)
 {
 	rte_crypto_param n = xform->modinv.modulus;
@@ -340,6 +330,7 @@ modinv_collect(struct rte_crypto_asym_op *asym_op,
 		cookie->output_array[0] + alg_bytesize
 		- n.length, n.length);
 	asym_op->modinv.result.length = alg_bytesize;
+	cookie->cache.info_out[0].length = alg_bytesize;
 	HEXDUMP("ModInv result", cookie->output_array[0],
 			alg_bytesize);
 	return RTE_CRYPTO_OP_STATUS_SUCCESS;
@@ -391,6 +382,9 @@ rsa_set_pub_input(struct icp_qat_fw_pke_request *qat_req,
 
 	SET_PKE_LN(xform->rsa.e, alg_bytesize, 1);
 	SET_PKE_LN(xform->rsa.n, alg_bytesize, 2);
+	cookie->cache.info_out[0].length = alg_bytesize;
+	cookie->cache.info_out[1].length = alg_bytesize;
+	cookie->cache.info_out[2].length = alg_bytesize;
 
 	cookie->alg_bytesize = alg_bytesize;
 	qat_req->pke_hdr.cd_pars.func_id = func_id;
@@ -516,7 +510,7 @@ rsa_set_input(struct icp_qat_fw_pke_request *qat_req,
 
 static uint8_t
 rsa_collect(struct rte_crypto_asym_op *asym_op,
-		const struct qat_asym_op_cookie *cookie,
+		struct qat_asym_op_cookie *cookie,
 		const struct rte_crypto_asym_xform *xform)
 {
 	uint32_t alg_bytesize = cookie->alg_bytesize;
@@ -572,7 +566,8 @@ rsa_collect(struct rte_crypto_asym_op *asym_op,
 			HEXDUMP("RSA Signature", cookie->output_array[0],
 				alg_bytesize);
 		}
-	}
+	}	
+	cookie->cache.info_out[0].length = alg_bytesize;
 	return RTE_CRYPTO_OP_STATUS_SUCCESS;
 }
 
@@ -612,6 +607,9 @@ ecdsa_set_input(struct icp_qat_fw_pke_request *qat_req,
 		SET_PKE_9A_EC(curve[curve_id], n, 6);
 		SET_PKE_9A_EC(curve[curve_id], y, 7);
 		SET_PKE_9A_EC(curve[curve_id], x, 8);
+		cookie->cache.bytes = QAT_ASYM_ECDSA_RS_SIGN_IN_PARAMS_NO *
+			qat_func_alignsize;
+		cookie->cache.curve_id = curve_id;
 
 		cookie->alg_bytesize = curve[curve_id].bytesize;
 		cookie->qat_func_alignsize = qat_func_alignsize;
@@ -650,6 +648,9 @@ ecdsa_set_input(struct icp_qat_fw_pke_request *qat_req,
 		SET_PKE_9A_EC(curve[curve_id], a, 2);
 		SET_PKE_9A_EC(curve[curve_id], b, 1);
 		SET_PKE_9A_EC(curve[curve_id], p, 0);
+		cookie->cache.bytes = QAT_ASYM_ECDSA_RS_VERIFY_IN_PARAMS_NO *
+			qat_func_alignsize;
+		cookie->cache.curve_id = curve_id;
 
 		cookie->alg_bytesize = curve[curve_id].bytesize;
 		cookie->qat_func_alignsize = qat_func_alignsize;
@@ -680,7 +681,7 @@ ecdsa_set_input(struct icp_qat_fw_pke_request *qat_req,
 
 static uint8_t
 ecdsa_collect(struct rte_crypto_asym_op *asym_op,
-		const struct qat_asym_op_cookie *cookie)
+		struct qat_asym_op_cookie *cookie)
 {
 	uint32_t alg_bytesize = cookie->alg_bytesize;
 	uint32_t qat_func_alignsize = cookie->qat_func_alignsize;
@@ -700,6 +701,8 @@ ecdsa_collect(struct rte_crypto_asym_op *asym_op,
 		HEXDUMP("S", cookie->output_array[1],
 			qat_func_alignsize);
 	}
+	cookie->cache.info_out[0].length = alg_bytesize;
+	cookie->cache.info_out[1].length = alg_bytesize;
 	return RTE_CRYPTO_OP_STATUS_SUCCESS;
 }
 
@@ -734,6 +737,7 @@ ecpm_set_input(struct icp_qat_fw_pke_request *qat_req,
 	SET_PKE_LN_EC(curve[curve_id], b, 4);
 	SET_PKE_LN_EC(curve[curve_id], p, 5);
 	SET_PKE_LN_EC(curve[curve_id], h, 6);
+	cookie->cache.curve_id = curve_id;
 
 	cookie->alg_bytesize = curve[curve_id].bytesize;
 	cookie->qat_func_alignsize = qat_func_alignsize;
@@ -756,7 +760,7 @@ ecpm_set_input(struct icp_qat_fw_pke_request *qat_req,
 
 static uint8_t
 ecpm_collect(struct rte_crypto_asym_op *asym_op,
-		const struct qat_asym_op_cookie *cookie)
+		struct qat_asym_op_cookie *cookie)
 {
 	uint8_t *x = asym_op->ecpm.r.x.data;
 	uint8_t *y = asym_op->ecpm.r.y.data;
@@ -768,6 +772,8 @@ ecpm_collect(struct rte_crypto_asym_op *asym_op,
 	asym_op->ecpm.r.y.length = alg_bytesize;
 	rte_memcpy(x, &cookie->output_array[0][ltrim], alg_bytesize);
 	rte_memcpy(y, &cookie->output_array[1][ltrim], alg_bytesize);
+	cookie->cache.info_out[0].length = alg_bytesize;
+	cookie->cache.info_out[1].length = alg_bytesize;
 
 	HEXDUMP("rX", cookie->output_array[0],
 		qat_func_alignsize);
@@ -813,6 +819,7 @@ ecdh_set_input(struct icp_qat_fw_pke_request *qat_req,
 	SET_PKE_LN_EC(curve[curve_id], b, 4);
 	SET_PKE_LN_EC(curve[curve_id], p, 5);
 	SET_PKE_LN_EC(curve[curve_id], h, 6);
+	cookie->cache.curve_id = curve_id;
 
 	cookie->alg_bytesize = curve[curve_id].bytesize;
 	cookie->qat_func_alignsize = qat_func_alignsize;
@@ -882,7 +889,7 @@ ecdh_verify_set_input(struct icp_qat_fw_pke_request *qat_req,
 
 static uint8_t
 ecdh_collect(struct rte_crypto_asym_op *asym_op,
-		const struct qat_asym_op_cookie *cookie)
+		struct qat_asym_op_cookie *cookie)
 {
 	uint8_t *x, *y;
 	uint32_t alg_bytesize = cookie->alg_bytesize;
@@ -906,6 +913,8 @@ ecdh_collect(struct rte_crypto_asym_op *asym_op,
 
 	rte_memcpy(x, &cookie->output_array[0][ltrim], alg_bytesize);
 	rte_memcpy(y, &cookie->output_array[1][ltrim], alg_bytesize);
+	cookie->cache.info_out[0].length = alg_bytesize;
+	cookie->cache.info_out[1].length = alg_bytesize;
 
 	HEXDUMP("X", cookie->output_array[0],
 		qat_func_alignsize);
@@ -966,7 +975,7 @@ sm2_ecdsa_verify_set_input(struct icp_qat_fw_pke_request *qat_req,
 
 static uint8_t
 sm2_ecdsa_sign_collect(struct rte_crypto_asym_op *asym_op,
-		const struct qat_asym_op_cookie *cookie)
+		struct qat_asym_op_cookie *cookie)
 {
 	uint32_t alg_bytesize = cookie->alg_bytesize;
 
@@ -977,6 +986,8 @@ sm2_ecdsa_sign_collect(struct rte_crypto_asym_op *asym_op,
 	rte_memcpy(asym_op->sm2.s.data, cookie->output_array[1], alg_bytesize);
 	asym_op->sm2.r.length = alg_bytesize;
 	asym_op->sm2.s.length = alg_bytesize;
+	cookie->cache.info_out[0].length = alg_bytesize;
+	cookie->cache.info_out[1].length = alg_bytesize;
 
 	HEXDUMP("SM2 R", cookie->output_array[0],
 		alg_bytesize);
diff --git a/drivers/crypto/qat/qat_asym.h b/drivers/crypto/qat/qat_asym.h
index 00275fa3b9..ddd0035ceb 100644
--- a/drivers/crypto/qat/qat_asym.h
+++ b/drivers/crypto/qat/qat_asym.h
@@ -28,7 +28,9 @@ typedef uint64_t large_int_ptr;
 #define QAT_ASYM_RSA_NUM_OUT_PARAMS		1
 #define QAT_ASYM_RSA_QT_NUM_IN_PARAMS		6
 #define QAT_ASYM_ECDSA_RS_SIGN_IN_PARAMS	1
+#define QAT_ASYM_ECDSA_RS_SIGN_IN_PARAMS_NO	9
 #define QAT_ASYM_ECDSA_RS_SIGN_OUT_PARAMS	2
+#define QAT_ASYM_ECDSA_RS_VERIFY_IN_PARAMS_NO	10
 #define QAT_ASYM_ECDSA_RS_VERIFY_IN_PARAMS	1
 #define QAT_ASYM_ECDSA_RS_VERIFY_OUT_PARAMS	0
 #define QAT_ASYM_ECPM_IN_PARAMS			7
@@ -69,6 +71,17 @@ struct __rte_aligned(8) qat_asym_op_cookie {
 		uint8_t input_buffer[MAX_PKE_PARAMS * QAT_PKE_MAX_LN_SIZE];
 	};
 	alignas(8) uint8_t output_array[MAX_PKE_PARAMS][QAT_PKE_MAX_LN_SIZE];
+	struct {
+		uint16_t bytes;
+		struct {
+			uint16_t offset;
+			uint16_t length;
+		} info_in [MAX_PKE_PARAMS];
+		struct {
+			uint16_t length;
+		} info_out [MAX_PKE_PARAMS];
+		int curve_id;
+	} cache;
 };
 
 struct qat_asym_session {
-- 
2.34.1


                 reply	other threads:[~2025-05-14  8:09 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250514080946.1633268-1-arkadiuszx.kusztal@intel.com \
    --to=arkadiuszx.kusztal@intel.com \
    --cc=dev@dpdk.org \
    --cc=gakhil@marvell.com \
    --cc=kai.ji@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).