From: Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>
To: dev@dpdk.org
Cc: gakhil@marvell.com, kai.ji@intel.com,
Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>
Subject: [PATCH] crypto/qat: add caching of the asym config
Date: Wed, 14 May 2025 08:09:46 +0000 [thread overview]
Message-ID: <20250514080946.1633268-1-arkadiuszx.kusztal@intel.com> (raw)
Added caching option of asymmetric crypto parameters.
This helps to avoid cleaning of unused data and allows
introducing the options to reuse the previous setup.
Signed-off-by: Arkadiusz Kusztal <arkadiuszx.kusztal@intel.com>
---
drivers/crypto/qat/qat_asym.c | 125 ++++++++++++++++++----------------
drivers/crypto/qat/qat_asym.h | 13 ++++
2 files changed, 81 insertions(+), 57 deletions(-)
diff --git a/drivers/crypto/qat/qat_asym.c b/drivers/crypto/qat/qat_asym.c
index f5b56b2f71..f91ad82fba 100644
--- a/drivers/crypto/qat/qat_asym.c
+++ b/drivers/crypto/qat/qat_asym.c
@@ -79,15 +79,23 @@ static const struct rte_driver cryptodev_qat_asym_driver = {
} while (0)
#define SET_PKE_LN(what, how, idx) \
- rte_memcpy(cookie->input_array[idx] + how - \
- what.length, \
- what.data, \
- what.length)
+ do { \
+ rte_memcpy(cookie->input_array[idx] + how - \
+ what.length, \
+ what.data, \
+ what.length); \
+ cookie->cache.info_in[idx].length = what.length; \
+ cookie->cache.info_in[idx].offset = how - what.length; \
+ } while (0)
#define SET_PKE_LN_EC(curve, p, idx) \
- rte_memcpy(cookie->input_array[idx] + \
- qat_func_alignsize - curve.bytesize, \
- curve.p.data, curve.bytesize)
+ do { \
+ rte_memcpy(cookie->input_array[idx] + \
+ qat_func_alignsize - curve.bytesize, \
+ curve.p.data, curve.bytesize); \
+ cookie->cache.info_in[idx].length = curve.bytesize; \
+ cookie->cache.info_in[idx].offset = qat_func_alignsize - curve.bytesize; \
+ } while (0)
#define SET_PKE_9A_IN(what, idx) \
rte_memcpy(&cookie->input_buffer[idx * \
@@ -118,54 +126,35 @@ request_init(struct icp_qat_fw_pke_request *qat_req)
}
static void
-cleanup_arrays(struct qat_asym_op_cookie *cookie,
- int in_count, int out_count, int alg_size)
+cleanup(struct qat_asym_op_cookie *cookie,
+ const struct rte_crypto_asym_xform __rte_unused *xform)
{
int i;
- for (i = 0; i < in_count; i++)
- memset(cookie->input_array[i], 0x0, alg_size);
- for (i = 0; i < out_count; i++)
- memset(cookie->output_array[i], 0x0, alg_size);
-}
+ cookie->cache.curve_id = 0;
+ if (cookie->cache.bytes) {
+ memset(&cookie->input_buffer[0], 0, cookie->cache.bytes);
+ cookie->cache.bytes = 0;
+ return;
+ }
-static void
-cleanup_crt(struct qat_asym_op_cookie *cookie,
- int alg_size)
-{
- int i;
+ for (i = 0; i < MAX_PKE_PARAMS; i++) {
+ const uint16_t offset = cookie->cache.info_in[i].offset;
+ const uint16_t length = cookie->cache.info_in[i].length;
- memset(cookie->input_array[0], 0x0, alg_size);
- for (i = 1; i < QAT_ASYM_RSA_QT_NUM_IN_PARAMS; i++)
- memset(cookie->input_array[i], 0x0, alg_size / 2);
- for (i = 0; i < QAT_ASYM_RSA_NUM_OUT_PARAMS; i++)
- memset(cookie->output_array[i], 0x0, alg_size);
-}
+ if (length == 0)
+ break;
+ memset(&cookie->input_array[i][offset], 0, length);
+ cookie->cache.info_in[i].length = 0;
+ cookie->cache.info_in[i].offset = 0;
+ }
+ for (i = 0; i < MAX_PKE_PARAMS; i++) {
+ const uint16_t length = cookie->cache.info_out[i].length;
-static void
-cleanup(struct qat_asym_op_cookie *cookie,
- const struct rte_crypto_asym_xform *xform)
-{
- if (xform->xform_type == RTE_CRYPTO_ASYM_XFORM_MODEX)
- cleanup_arrays(cookie, QAT_ASYM_MODEXP_NUM_IN_PARAMS,
- QAT_ASYM_MODEXP_NUM_OUT_PARAMS,
- cookie->alg_bytesize);
- else if (xform->xform_type == RTE_CRYPTO_ASYM_XFORM_MODINV)
- cleanup_arrays(cookie, QAT_ASYM_MODINV_NUM_IN_PARAMS,
- QAT_ASYM_MODINV_NUM_OUT_PARAMS,
- cookie->alg_bytesize);
- else if (xform->xform_type == RTE_CRYPTO_ASYM_XFORM_RSA) {
- if (xform->rsa.key_type == RTE_RSA_KEY_TYPE_QT)
- cleanup_crt(cookie, cookie->alg_bytesize);
- else {
- cleanup_arrays(cookie, QAT_ASYM_RSA_NUM_IN_PARAMS,
- QAT_ASYM_RSA_NUM_OUT_PARAMS,
- cookie->alg_bytesize);
- }
- } else {
- cleanup_arrays(cookie, QAT_ASYM_MAX_PARAMS,
- QAT_ASYM_MAX_PARAMS,
- QAT_PKE_MAX_LN_SIZE);
+ if (length == 0)
+ break;
+ memset(&cookie->output_array[i], 0, length);
+ cookie->cache.info_out[i].length = 0;
}
}
@@ -263,7 +252,7 @@ modexp_set_input(struct icp_qat_fw_pke_request *qat_req,
static uint8_t
modexp_collect(struct rte_crypto_asym_op *asym_op,
- const struct qat_asym_op_cookie *cookie,
+ struct qat_asym_op_cookie *cookie,
const struct rte_crypto_asym_xform *xform)
{
rte_crypto_param n = xform->modex.modulus;
@@ -277,6 +266,7 @@ modexp_collect(struct rte_crypto_asym_op *asym_op,
rte_memcpy(modexp_result,
cookie->output_array[0] + alg_bytesize
- n.length, n.length);
+ cookie->cache.info_out[0].length = alg_bytesize;
asym_op->modex.result.length = alg_bytesize;
HEXDUMP("ModExp result", cookie->output_array[0],
alg_bytesize);
@@ -324,7 +314,7 @@ modinv_set_input(struct icp_qat_fw_pke_request *qat_req,
static uint8_t
modinv_collect(struct rte_crypto_asym_op *asym_op,
- const struct qat_asym_op_cookie *cookie,
+ struct qat_asym_op_cookie *cookie,
const struct rte_crypto_asym_xform *xform)
{
rte_crypto_param n = xform->modinv.modulus;
@@ -340,6 +330,7 @@ modinv_collect(struct rte_crypto_asym_op *asym_op,
cookie->output_array[0] + alg_bytesize
- n.length, n.length);
asym_op->modinv.result.length = alg_bytesize;
+ cookie->cache.info_out[0].length = alg_bytesize;
HEXDUMP("ModInv result", cookie->output_array[0],
alg_bytesize);
return RTE_CRYPTO_OP_STATUS_SUCCESS;
@@ -391,6 +382,9 @@ rsa_set_pub_input(struct icp_qat_fw_pke_request *qat_req,
SET_PKE_LN(xform->rsa.e, alg_bytesize, 1);
SET_PKE_LN(xform->rsa.n, alg_bytesize, 2);
+ cookie->cache.info_out[0].length = alg_bytesize;
+ cookie->cache.info_out[1].length = alg_bytesize;
+ cookie->cache.info_out[2].length = alg_bytesize;
cookie->alg_bytesize = alg_bytesize;
qat_req->pke_hdr.cd_pars.func_id = func_id;
@@ -516,7 +510,7 @@ rsa_set_input(struct icp_qat_fw_pke_request *qat_req,
static uint8_t
rsa_collect(struct rte_crypto_asym_op *asym_op,
- const struct qat_asym_op_cookie *cookie,
+ struct qat_asym_op_cookie *cookie,
const struct rte_crypto_asym_xform *xform)
{
uint32_t alg_bytesize = cookie->alg_bytesize;
@@ -572,7 +566,8 @@ rsa_collect(struct rte_crypto_asym_op *asym_op,
HEXDUMP("RSA Signature", cookie->output_array[0],
alg_bytesize);
}
- }
+ }
+ cookie->cache.info_out[0].length = alg_bytesize;
return RTE_CRYPTO_OP_STATUS_SUCCESS;
}
@@ -612,6 +607,9 @@ ecdsa_set_input(struct icp_qat_fw_pke_request *qat_req,
SET_PKE_9A_EC(curve[curve_id], n, 6);
SET_PKE_9A_EC(curve[curve_id], y, 7);
SET_PKE_9A_EC(curve[curve_id], x, 8);
+ cookie->cache.bytes = QAT_ASYM_ECDSA_RS_SIGN_IN_PARAMS_NO *
+ qat_func_alignsize;
+ cookie->cache.curve_id = curve_id;
cookie->alg_bytesize = curve[curve_id].bytesize;
cookie->qat_func_alignsize = qat_func_alignsize;
@@ -650,6 +648,9 @@ ecdsa_set_input(struct icp_qat_fw_pke_request *qat_req,
SET_PKE_9A_EC(curve[curve_id], a, 2);
SET_PKE_9A_EC(curve[curve_id], b, 1);
SET_PKE_9A_EC(curve[curve_id], p, 0);
+ cookie->cache.bytes = QAT_ASYM_ECDSA_RS_VERIFY_IN_PARAMS_NO *
+ qat_func_alignsize;
+ cookie->cache.curve_id = curve_id;
cookie->alg_bytesize = curve[curve_id].bytesize;
cookie->qat_func_alignsize = qat_func_alignsize;
@@ -680,7 +681,7 @@ ecdsa_set_input(struct icp_qat_fw_pke_request *qat_req,
static uint8_t
ecdsa_collect(struct rte_crypto_asym_op *asym_op,
- const struct qat_asym_op_cookie *cookie)
+ struct qat_asym_op_cookie *cookie)
{
uint32_t alg_bytesize = cookie->alg_bytesize;
uint32_t qat_func_alignsize = cookie->qat_func_alignsize;
@@ -700,6 +701,8 @@ ecdsa_collect(struct rte_crypto_asym_op *asym_op,
HEXDUMP("S", cookie->output_array[1],
qat_func_alignsize);
}
+ cookie->cache.info_out[0].length = alg_bytesize;
+ cookie->cache.info_out[1].length = alg_bytesize;
return RTE_CRYPTO_OP_STATUS_SUCCESS;
}
@@ -734,6 +737,7 @@ ecpm_set_input(struct icp_qat_fw_pke_request *qat_req,
SET_PKE_LN_EC(curve[curve_id], b, 4);
SET_PKE_LN_EC(curve[curve_id], p, 5);
SET_PKE_LN_EC(curve[curve_id], h, 6);
+ cookie->cache.curve_id = curve_id;
cookie->alg_bytesize = curve[curve_id].bytesize;
cookie->qat_func_alignsize = qat_func_alignsize;
@@ -756,7 +760,7 @@ ecpm_set_input(struct icp_qat_fw_pke_request *qat_req,
static uint8_t
ecpm_collect(struct rte_crypto_asym_op *asym_op,
- const struct qat_asym_op_cookie *cookie)
+ struct qat_asym_op_cookie *cookie)
{
uint8_t *x = asym_op->ecpm.r.x.data;
uint8_t *y = asym_op->ecpm.r.y.data;
@@ -768,6 +772,8 @@ ecpm_collect(struct rte_crypto_asym_op *asym_op,
asym_op->ecpm.r.y.length = alg_bytesize;
rte_memcpy(x, &cookie->output_array[0][ltrim], alg_bytesize);
rte_memcpy(y, &cookie->output_array[1][ltrim], alg_bytesize);
+ cookie->cache.info_out[0].length = alg_bytesize;
+ cookie->cache.info_out[1].length = alg_bytesize;
HEXDUMP("rX", cookie->output_array[0],
qat_func_alignsize);
@@ -813,6 +819,7 @@ ecdh_set_input(struct icp_qat_fw_pke_request *qat_req,
SET_PKE_LN_EC(curve[curve_id], b, 4);
SET_PKE_LN_EC(curve[curve_id], p, 5);
SET_PKE_LN_EC(curve[curve_id], h, 6);
+ cookie->cache.curve_id = curve_id;
cookie->alg_bytesize = curve[curve_id].bytesize;
cookie->qat_func_alignsize = qat_func_alignsize;
@@ -882,7 +889,7 @@ ecdh_verify_set_input(struct icp_qat_fw_pke_request *qat_req,
static uint8_t
ecdh_collect(struct rte_crypto_asym_op *asym_op,
- const struct qat_asym_op_cookie *cookie)
+ struct qat_asym_op_cookie *cookie)
{
uint8_t *x, *y;
uint32_t alg_bytesize = cookie->alg_bytesize;
@@ -906,6 +913,8 @@ ecdh_collect(struct rte_crypto_asym_op *asym_op,
rte_memcpy(x, &cookie->output_array[0][ltrim], alg_bytesize);
rte_memcpy(y, &cookie->output_array[1][ltrim], alg_bytesize);
+ cookie->cache.info_out[0].length = alg_bytesize;
+ cookie->cache.info_out[1].length = alg_bytesize;
HEXDUMP("X", cookie->output_array[0],
qat_func_alignsize);
@@ -966,7 +975,7 @@ sm2_ecdsa_verify_set_input(struct icp_qat_fw_pke_request *qat_req,
static uint8_t
sm2_ecdsa_sign_collect(struct rte_crypto_asym_op *asym_op,
- const struct qat_asym_op_cookie *cookie)
+ struct qat_asym_op_cookie *cookie)
{
uint32_t alg_bytesize = cookie->alg_bytesize;
@@ -977,6 +986,8 @@ sm2_ecdsa_sign_collect(struct rte_crypto_asym_op *asym_op,
rte_memcpy(asym_op->sm2.s.data, cookie->output_array[1], alg_bytesize);
asym_op->sm2.r.length = alg_bytesize;
asym_op->sm2.s.length = alg_bytesize;
+ cookie->cache.info_out[0].length = alg_bytesize;
+ cookie->cache.info_out[1].length = alg_bytesize;
HEXDUMP("SM2 R", cookie->output_array[0],
alg_bytesize);
diff --git a/drivers/crypto/qat/qat_asym.h b/drivers/crypto/qat/qat_asym.h
index 00275fa3b9..ddd0035ceb 100644
--- a/drivers/crypto/qat/qat_asym.h
+++ b/drivers/crypto/qat/qat_asym.h
@@ -28,7 +28,9 @@ typedef uint64_t large_int_ptr;
#define QAT_ASYM_RSA_NUM_OUT_PARAMS 1
#define QAT_ASYM_RSA_QT_NUM_IN_PARAMS 6
#define QAT_ASYM_ECDSA_RS_SIGN_IN_PARAMS 1
+#define QAT_ASYM_ECDSA_RS_SIGN_IN_PARAMS_NO 9
#define QAT_ASYM_ECDSA_RS_SIGN_OUT_PARAMS 2
+#define QAT_ASYM_ECDSA_RS_VERIFY_IN_PARAMS_NO 10
#define QAT_ASYM_ECDSA_RS_VERIFY_IN_PARAMS 1
#define QAT_ASYM_ECDSA_RS_VERIFY_OUT_PARAMS 0
#define QAT_ASYM_ECPM_IN_PARAMS 7
@@ -69,6 +71,17 @@ struct __rte_aligned(8) qat_asym_op_cookie {
uint8_t input_buffer[MAX_PKE_PARAMS * QAT_PKE_MAX_LN_SIZE];
};
alignas(8) uint8_t output_array[MAX_PKE_PARAMS][QAT_PKE_MAX_LN_SIZE];
+ struct {
+ uint16_t bytes;
+ struct {
+ uint16_t offset;
+ uint16_t length;
+ } info_in [MAX_PKE_PARAMS];
+ struct {
+ uint16_t length;
+ } info_out [MAX_PKE_PARAMS];
+ int curve_id;
+ } cache;
};
struct qat_asym_session {
--
2.34.1
reply other threads:[~2025-05-14 8:09 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250514080946.1633268-1-arkadiuszx.kusztal@intel.com \
--to=arkadiuszx.kusztal@intel.com \
--cc=dev@dpdk.org \
--cc=gakhil@marvell.com \
--cc=kai.ji@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).