From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 979DF42602; Thu, 21 Sep 2023 06:26:51 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 8380F4026D; Thu, 21 Sep 2023 06:26:51 +0200 (CEST) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by mails.dpdk.org (Postfix) with ESMTP id E2D404014F for ; Thu, 21 Sep 2023 06:26:48 +0200 (CEST) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 38KILa8U001328; Wed, 20 Sep 2023 21:26:48 -0700 Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2168.outbound.protection.outlook.com [104.47.58.168]) by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3t7u4dcmuh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 20 Sep 2023 21:26:47 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XjtV9UrVRcqhnjih3u0ZR4RtP+8xWY53G8X8T4jVaLFWHjGdJ+1nLBif0Ug7pCfb5/Khu1THXC+PzJuSKqhRWPEuQ+Wg3ssZLL8B+7Zb5byXUvXOAtRUPyddH9+I798bPalCi4ULfwpywl4b7NXbAQ+a6sltwzkRDZ74ePAcLiKYfJox/2R4mSm2pjl6Z4iuwLYSmJubH0r6U5u0EN9NtTwT4ufWgAlXkUTMvBUAKtQjUo3SigspIZqb/rbTVomPHytpyvvgwK6EkjAhCgD+CT4nVIr5343LFUj34XIL9siO8qdh5cHuQAG1dOqXANx0tQ7l5XteaTyKZzXgLk0dyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=X4hLilyewxAGYO1MnJ1Fs4Pw815t7qOfB+yqGZvfnho=; b=Ge1BHML8hGdemX+pyxaKphYt9jQKO9c3YIKjp3/Lr8qUdPPH4/flOw7Mg3T7uKLjXDWZvPHYYdYRw8XkuCg9r/SGlNIX6nV52MpxbFHVWR45b7pyJVHUkUlBNIEmDDPWLdDMWMF+BLXrAo742uNE4naDeXBgrTM0blq3DgSH8heEbX+UQwLeC9r4b4Y5vX49bxt2tJetmK9oIEhPNB/S+dqOfgHZ7sBd2Vd/VTOIXkMNYBy1HQuaPpc8FS0r+ZrO7MaVhF0KXR7ownlCxkMBUsbdzekx7nuBCb4lhPGotCm6dLfj3K7VgjMVUJOKbY+BJG8r/BMOm1rAgMD02TX04w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.onmicrosoft.com; s=selector1-marvell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=X4hLilyewxAGYO1MnJ1Fs4Pw815t7qOfB+yqGZvfnho=; b=i/A4cKB0LfvM6QFLVd8am3paTOq3QHJ4kkX2GvndN2VSDPBgwmOznf/+GYDtpWAMAloWkLmb1YGd8/hkBm678L2tETru3zbxRdJ8Do8yHYMusWpreedE/bH2a0Mu3Ydu6j+ozhCUuJKWzqNLyMTk+VwVmphcRFGMFl+Nf9fjVFU= Received: from CO1PR18MB4714.namprd18.prod.outlook.com (2603:10b6:303:e9::18) by SN4PR18MB4872.namprd18.prod.outlook.com (2603:10b6:806:210::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6768.31; Thu, 21 Sep 2023 04:26:44 +0000 Received: from CO1PR18MB4714.namprd18.prod.outlook.com ([fe80::19a:75f1:ff79:f17b]) by CO1PR18MB4714.namprd18.prod.outlook.com ([fe80::19a:75f1:ff79:f17b%5]) with mapi id 15.20.6813.017; Thu, 21 Sep 2023 04:26:44 +0000 From: Gowrishankar Muthukrishnan To: "Kusztal, ArkadiuszX" , "dev@dpdk.org" CC: Akhil Goyal , "Ji, Kai" , "Power, Ciara" Subject: RE: [EXT] [RFC] cryptodev: refactor sm2, add plain message flag Thread-Topic: [EXT] [RFC] cryptodev: refactor sm2, add plain message flag Thread-Index: AQHZzHrZ6xu92KoDjUKOY1OFaOWhBa/pYxCggDYD84CABD7moA== Date: Thu, 21 Sep 2023 04:26:44 +0000 Message-ID: References: <20230811173944.2550303-1-arkadiuszx.kusztal@intel.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-dg-ref: =?us-ascii?Q?PG1ldGE+PGF0IG5tPSJib2R5LnR4dCIgcD0iYzpcdXNlcnNcZ211dGh1a3Jp?= =?us-ascii?Q?c2huXGFwcGRhdGFccm9hbWluZ1wwOWQ4NDliNi0zMmQzLTRhNDAtODVlZS02?= =?us-ascii?Q?Yjg0YmEyOWUzNWJcbXNnc1xtc2ctMGYwODBlMmEtNTgzNy0xMWVlLWEwYWEt?= =?us-ascii?Q?NTQ4ZDVhZTlkZGUxXGFtZS10ZXN0XDBmMDgwZTJiLTU4MzctMTFlZS1hMGFh?= =?us-ascii?Q?LTU0OGQ1YWU5ZGRlMWJvZHkudHh0IiBzej0iNzE1OCIgdD0iMTMzMzk3NDQw?= =?us-ascii?Q?MDA1MTY0NTIwIiBoPSJOKy94ZnZ2Ui9EcHVJNWw0OG5SOXJFbHQzSW89IiBp?= =?us-ascii?Q?ZD0iIiBibD0iMCIgYm89IjEiIGNpPSJjQUFBQUVSSFUxUlNSVUZOQ2dVQUFO?= =?us-ascii?Q?NFBBQURvVFhUUlErelpBWmdES2tNc1kwWlptQU1xUXl4alJsa1pBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBSEFBQUFCdUR3QUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBRUFBUUVCQUFBQTlSZW5Md0NBQVFBQUFBQUFBQUFBQUo0QUFBQmhB?= =?us-ascii?Q?R1FBWkFCeUFHVUFjd0J6QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFFQUFBQUFBQUFBQWdBQUFBQUFuZ0FBQUdNQWRRQnpBSFFBYndCdEFG?= =?us-ascii?Q?OEFjQUJsQUhJQWN3QnZBRzRBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBUUFBQUFBQUFB?= =?us-ascii?Q?QUNBQUFBQUFDZUFBQUFZd0IxQUhNQWRBQnZBRzBBWHdCd0FHZ0Fid0J1QUdV?= =?us-ascii?Q?QWJnQjFBRzBBWWdCbEFISUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQkFBQUFBQUFBQUFJQUFBQUFBSjRBQUFC?= =?us-ascii?Q?akFIVUFjd0IwQUc4QWJRQmZBSE1BY3dCdUFGOEFaQUJoQUhNQWFBQmZBSFlB?= =?us-ascii?Q?TUFBeUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-refone: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUVBQUFBQUFBQUFBZ0FBQUFBQW5n?= =?us-ascii?Q?QUFBR01BZFFCekFIUUFid0J0QUY4QWN3QnpBRzRBWHdCckFHVUFlUUIzQUc4?= =?us-ascii?Q?QWNnQmtBSE1BQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFRQUFBQUFBQUFBQ0FBQUFBQUNlQUFBQVl3QjFBSE1BZEFC?= =?us-ascii?Q?dkFHMEFYd0J6QUhNQWJnQmZBRzRBYndCa0FHVUFiQUJwQUcwQWFRQjBBR1VB?= =?us-ascii?Q?Y2dCZkFIWUFNQUF5QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFCQUFB?= =?us-ascii?Q?QUFBQUFBQUlBQUFBQUFKNEFBQUJqQUhVQWN3QjBBRzhBYlFCZkFITUFjd0J1?= =?us-ascii?Q?QUY4QWN3QndBR0VBWXdCbEFGOEFkZ0F3QURJQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBRUFBQUFBQUFBQUFnQUFBQUFB?= =?us-ascii?Q?bmdBQUFHUUFiQUJ3QUY4QWN3QnJBSGtBY0FCbEFGOEFZd0JvQUdFQWRBQmZB?= =?us-ascii?Q?RzBBWlFCekFITUFZUUJuQUdVQVh3QjJBREFBTWdBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQVFBQUFBQUFBQUFDQUFBQUFBQ2VBQUFBWkFCc0FIQUFY?= =?us-ascii?Q?d0J6QUd3QVlRQmpBR3NBWHdCakFHZ0FZUUIwQUY4QWJRQmxBSE1BY3dCaEFH?= =?us-ascii?Q?Y0FaUUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-reftwo: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUJBQUFBQUFBQUFBSUFBQUFBQUo0QUFBQmtBR3dB?= =?us-ascii?Q?Y0FCZkFIUUFaUUJoQUcwQWN3QmZBRzhBYmdCbEFHUUFjZ0JwQUhZQVpRQmZB?= =?us-ascii?Q?R1lBYVFCc0FHVUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFFQUFBQUFBQUFBQWdBQUFBQUFuZ0FBQUdVQWJRQmhBR2tBYkFCZkFHRUFa?= =?us-ascii?Q?QUJrQUhJQVpRQnpBSE1BQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFRQUFBQUFBQUFBQUFBQUFBUUFBQUFBQUFBQUNB?= =?us-ascii?Q?QUFBQUFDZUFBQUFiUUJoQUhJQWRnQmxBR3dBWHdCd0FISUFid0JxQUdVQVl3?= =?us-ascii?Q?QjBBRjhBYmdCaEFHMEFaUUJ6QUY4QVl3QnZBRzRBWmdCcEFHUUFaUUJ1QUhR?= =?us-ascii?Q?QWFRQmhBR3dBWHdCaEFHd0Fid0J1QUdVQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQkFBQUFBQUFBQUFJQUFBQUFBSjRBQUFCdEFH?= =?us-ascii?Q?RUFjZ0IyQUdVQWJBQmZBSEFBY2dCdkFHb0FaUUJqQUhRQVh3QnVBR0VBYlFC?= =?us-ascii?Q?bEFITUFYd0J5QUdVQWN3QjBBSElBYVFCakFIUUFaUUJrQUY4QVlRQnNBRzhB?= =?us-ascii?Q?YmdCbEFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUVBQUFBQUFBQUFBZ0FBQUFBQW5nQUFBRzBBWVFCeUFIWUFaUUJzQUY4?= =?us-ascii?Q?QWNBQnlBRzhBYWdCbEFHTUFkQUJmQUc0QVlRQnRBR1VBY3dCZkFISUFaUUJ6?= =?us-ascii?Q?QUhRQWNnQnBBR01BZEFCbEFHUUFYd0JvQUdVQWVBQmpBRzhBWkFCbEFITUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFRQUFBQUFBQUFB?= =?us-ascii?Q?Q0FBQUFBQUNlQUFBQWJRQmhBSElBZGdCbEFHd0FiQUJmQUdFQWNnQnRBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-rorf: true x-dg-refthree: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFCQUFBQUFB?= =?us-ascii?Q?QUFBQUlBQUFBQUFKNEFBQUJ0QUdFQWNnQjJBR1VBYkFCc0FGOEFad0J2QUc4?= =?us-ascii?Q?QVp3QnNBR1VBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBRUFBQUFBQUFBQUFnQUFBQUFBbmdB?= =?us-ascii?Q?QUFHMEFZUUJ5QUhZQVpRQnNBR3dBWHdCd0FISUFid0JxQUdVQVl3QjBBRjhB?= =?us-ascii?Q?WXdCdkFHUUFaUUJ6QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQVFBQUFBQUFBQUFDQUFBQUFBQ2VBQUFBYlFCaEFISUFkZ0Js?= =?us-ascii?Q?QUd3QWJBQmZBSEFBY2dCdkFHb0FaUUJqQUhRQVh3QmpBRzhBWkFCbEFITUFY?= =?us-ascii?Q?d0JrQUdrQVl3QjBBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUJBQUFB?= =?us-ascii?Q?QUFBQUFBSUFBQUFBQUo0QUFBQnRBR0VBY2dCMkFHVUFiQUJzQUY4QWNBQnlB?= =?us-ascii?Q?RzhBYWdCbEFHTUFkQUJmQUc0QVlRQnRBR1VBY3dCZkFHTUFid0J1QUdZQWFR?= =?us-ascii?Q?QmtBR1VBYmdCMEFHa0FZUUJzQUY4QWJRQmhBSElBZGdCbEFHd0FiQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFFQUFBQUFBQUFBQWdBQUFBQUFu?= =?us-ascii?Q?Z0FBQUcwQVlRQnlBSFlBWlFCc0FHd0FYd0J3QUhJQWJ3QnFBR1VBWXdCMEFG?= =?us-ascii?Q?OEFiZ0JoQUcwQVpRQnpBRjhBWXdCdkFHNEFaZ0JwQUdRQVpRQnVBSFFBYVFC?= =?us-ascii?Q?aEFHd0FYd0J0QUdFQWNnQjJBR1VBYkFCc0FGOEFid0J5QUY4QVlRQnlBRzBB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-reffour: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFRQUFBQUFBQUFBQUFBQUFBUUFBQUFBQUFBQUNBQUFB?= =?us-ascii?Q?QUFDZUFBQUFiUUJoQUhJQWRnQmxBR3dBYkFCZkFIQUFjZ0J2QUdvQVpRQmpB?= =?us-ascii?Q?SFFBWHdCdUFHRUFiUUJsQUhNQVh3QmpBRzhBYmdCbUFHa0FaQUJsQUc0QWRB?= =?us-ascii?Q?QnBBR0VBYkFCZkFHMEFZUUJ5QUhZQVpRQnNBR3dBWHdCdkFISUFYd0JuQUc4?= =?us-ascii?Q?QWJ3Qm5BR3dBWlFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQkFBQUFBQUFBQUFJQUFBQUFBSjRBQUFCdEFHRUFj?= =?us-ascii?Q?Z0IyQUdVQWJBQnNBRjhBY0FCeUFHOEFhZ0JsQUdNQWRBQmZBRzRBWVFCdEFH?= =?us-ascii?Q?VUFjd0JmQUhJQVpRQnpBSFFBY2dCcEFHTUFkQUJsQUdRQVh3QnRBR0VBY2dC?= =?us-ascii?Q?MkFHVUFiQUJzQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUVBQUFBQUFBQUFBZ0FBQUFBQW5nQUFBRzBBWVFCeUFIWUFaUUJzQUd3QVh3?= =?us-ascii?Q?QndBSElBYndCcUFHVUFZd0IwQUY4QWJnQmhBRzBBWlFCekFGOEFjZ0JsQUhN?= =?us-ascii?Q?QWRBQnlBR2tBWXdCMEFHVUFaQUJmQUcwQVlRQnlBSFlBWlFCc0FHd0FYd0J2?= =?us-ascii?Q?QUhJQVh3QmhBSElBYlFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFRQUFBQUFBQUFBQ0FB?= =?us-ascii?Q?QUFBQUNlQUFBQWJRQmhBSElBZGdCbEFHd0FiQUJmQUhRQVpRQnlBRzBBYVFC?= =?us-ascii?Q?dUFIVUFjd0FBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFCQUFBQUFBQUFBQUlBQUFBQUFKNEFBQUJ0QUdF?= =?us-ascii?Q?QWNnQjJBR1VBYkFCc0FGOEFkd0J2QUhJQVpBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBRUFBQUFBQUFBQUFnQUFBQUFBIi8+PC9tZXRhPg=3D=3D?= x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO1PR18MB4714:EE_|SN4PR18MB4872:EE_ x-ms-office365-filtering-correlation-id: 703f3fbf-29d7-40d8-0534-08dbba5af66f x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR18MB4714.namprd18.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(39860400002)(366004)(396003)(346002)(136003)(376002)(186009)(1800799009)(451199024)(9686003)(6506007)(7696005)(19627235002)(966005)(83380400001)(71200400001)(478600001)(26005)(15650500001)(2906002)(64756008)(8936002)(52536014)(66556008)(66446008)(66476007)(66946007)(76116006)(54906003)(5660300002)(316002)(8676002)(4326008)(110136005)(41300700001)(86362001)(33656002)(55016003)(122000001)(38070700005)(38100700002); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?ocvPTMXQGS0F1wyNCSMKrk9kl3MR4AeyGo1Ud9SI4n8/5ONNAch9jMqj8Kdn?= =?us-ascii?Q?TS5rcwu6LSDJvVVlNZRWqh4PLtCfXlrmlZU9nJ1VO2wTfCiUQBI89XN1YIdg?= =?us-ascii?Q?yLkslXbACl40u6VI7dnmE/dsRM8VkLCTFxXFJxhcXmATYoxlnrAFY8w9A3pk?= =?us-ascii?Q?3sLXfL3wlZqtaUi51j19mZ4coV+UqT09gxc1uiG8hJwn8Ic1UOy5wykaaDps?= =?us-ascii?Q?3+IzkWfuo4+EVogrPAbVEevFxKQNY0HX0k16rHORPzLhkAsWhuqm4ffWkA9R?= =?us-ascii?Q?lG8POWLPPXbWKCuDKNBV7BK8gln78HpN2me0972Jec+N9ehljfkVYYIJIV3Y?= =?us-ascii?Q?CrClOBsklrlZ+OTTtCVFhxjapRRhLe0l4g2j+qEsgKcDRFFrMz4JBPr2jjnB?= =?us-ascii?Q?2R8dp61xHvB6MkFg3oDnDRc77EgcwN3TK8n/dauGWjIv0Qw772ukwOaPhLEP?= =?us-ascii?Q?GjVZRLQWdnepQ2CXxUYQ7x6fAlmRwo7MMcBTjk/TG0VNif3AP8GcSRIghBxw?= =?us-ascii?Q?T0jjiRXRdVZvPi5r/Hj8Fut1yvNlN296RcFm+uTwVZmT6URs2quAzRouEJes?= =?us-ascii?Q?SWAVnrA8rZj2WwOziqGxtPiVtEhuw5NE5kMIdace7FJlDHntggH8uZTNf/Gf?= =?us-ascii?Q?t37Vm94tq0YoA8bvZ1k10n3Dv4aoj9fMoSc0jf2cVoCgK0MnsNAYYbGtXUJC?= =?us-ascii?Q?V2c78Q6RwgD9zmaXQT1UDYqdwxPcBtHjCtq0RqbM1J1LZs4t4JUheQQHVuCO?= =?us-ascii?Q?wEG4wzVOIWhoiAkzr7vKVjIaTnuFTkHLs+AwcLfD0JUIkI31PPrvM3MlrGZd?= =?us-ascii?Q?50uD/XRRgwbqQiccX0J7hB8TZOeknktD8Bss/odqnqI1P/boayJrq4pdgtrN?= =?us-ascii?Q?aAvp5O0peSZgcKj3bN4qG1qX8KF7vWXdOZVntWsCbWjmlhtb2ty0VPjZyVk7?= =?us-ascii?Q?gHn+sydaC7hlU2q9AMmxM3W/KMcy2NeOQffCY2dMFVSd5N9AS9hPHzBZta66?= =?us-ascii?Q?YI82TRjJgMbthHdg2qL/edr/KvPxs1KPI6roUPFqMe7nPOWtrt7KcnqySVW2?= =?us-ascii?Q?F31emvz9gdC5XobFJAlc5T8TTr45MEv6XHEoqWpigpKxIp/c8xIugu8qyog1?= =?us-ascii?Q?mY+0fyEY0WhfBi8N5j6HAuANvVeqfCV/NryP+KPwf/GcEOtdOt6+VTzlGk1Z?= =?us-ascii?Q?aUKzuh1+oQA5BpHMD7BYa5dbx+9+LomzX1orq5IKlEQPP+LmO8T2bvMnfU2A?= =?us-ascii?Q?aI4qsul0Qdwur6VCfAHglf5EvY9qnloL/xGwMV/yHW8Fe/A9PeJv5w4vmQiH?= =?us-ascii?Q?XYCVgUwFikhHm4/qs1SWqBxsxlU0CpJ4NIkKknyxgCXCPgzU/CSgHeuAAeQA?= =?us-ascii?Q?beUVvTn7UBZdV4QeKHxxKNRCzO6nBbZMwwboLoHMtX/DvVDOc2YF4m4rYoRU?= =?us-ascii?Q?kx8moMhM/FmhvEdtCEcCEer0Rvj2vGfRUYKjqR+8Otgle1ppEcbz8q4yiDXB?= =?us-ascii?Q?byjunn+jFtkkojLd1aUJBCCy1bES5/HnMGPwdBgSlLLC1sQLvBjtAefC5xiV?= =?us-ascii?Q?PWUHat4TEV6Zds9oGbfxDDNCox7wW2aSkoRvvJ5M?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: marvell.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO1PR18MB4714.namprd18.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 703f3fbf-29d7-40d8-0534-08dbba5af66f X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Sep 2023 04:26:44.7123 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: QZC7PRzXDibThRHw++4Z7nZuXAJpoInxHb//0dvyaUVM7q+2oyh4HS78NIwQFf0eECtOxbf+SN+nrz+gu0qIFmv8yImQ6G2rI+dNF3OVpd4= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR18MB4872 X-Proofpoint-ORIG-GUID: lVnKU7N0E0LRtsclDaolItX0MB3jrwjh X-Proofpoint-GUID: lVnKU7N0E0LRtsclDaolItX0MB3jrwjh X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.267,Aquarius:18.0.980,Hydra:6.0.601,FMLib:17.11.176.26 definitions=2023-09-21_02,2023-09-20_01,2023-05-22_02 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi, > Actually hash should be moved outside of xform, we do not want to have a > session per hash I think. > Session should be per key, eventually per private key only. > > If a hardware does not support hashing plain input before any SM2 op, It has to be first hashed in a separate session (based on hash alg), then f= orward the digest into current op. To support these two possible kind of inputs, capability check as proposed can help the application. OpenSSL PMD for eg t= akes only plain text input (and it does internal hashing). Would you think hash algo can change in the mid of session ? If not, it cou= ld be a session attribute still. > > To note, more than one hash algorithm needs to be supported as in > > ECDSA for eg. so I made it bitmask of hash algorithms supported by PMD. > > For SM2, today we set only SM3. > > > > With this, the application can check the xform capability and set op > > params as shown in : > > https://urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__patches.dpdk.org= _ > > > project_dpdk_patch_f3be0a425170ee26a1396d34f52a&d=3DDwIFAg&c=3DnKjWec2 > b6R0 > > mOyPaz7xtfQ&r=3DEAtr-g7yUFhtOio8r2Rtm13Aqe4WVp_S_gHpcu6KFVo&m=3DPH- > nP4_D0b > > HFdQJbLclZO68l2- > LQCCcvOX3vuHeUdkYYZe3kXzKWxsZ9bJa_SKww&s=3D88sPzV8cxNP2j > > qfXzX1RjUhuU1U_jE8PB55ZFEG-SP4&e=3D > > 8e07941f7ce5.1691658879.git.gmuthukrishn@marvell.com/ > > > > > rte_crypto_uint k; > > > /**< Per-message secret number, which is an integer > > > * in the interval (1, q-1). > > > @@ -579,7 +575,12 @@ struct rte_crypto_ecdsa_op_param { > > > /**< Public key of the signer for verification */ > > > > > > rte_crypto_param message; > > > - /**< Input message digest to be signed or verified */ > > > + /**< > > > + * Pointer to the input data > > > + * In case RTE_CRYPTO_ASYM_FLAG_PLAIN_INPUT flag is set in the > > > op flags field, > > > + * it is a message to be signed by the PMD. > > > + * Otherwise, it is a message hash. > > > + */ > > > > > Please find above my comments for this flag. > > > > > rte_crypto_uint k; > > > /**< The ECDSA per-message secret number, which is an integer @@ > > > -652,52 +653,20 @@ struct rte_crypto_asym_xform { > > > }; > > > }; > > > > > > -/** > > > - * SM2 operation params. > > > - */ > > > -struct rte_crypto_sm2_op_param { > > > +struct rte_crypto_sm2_signature { > > > > Yeah, it will help picking params for the application easily. > > Just a suggestion: could we retain _param suffix. Say > > rte_crypto_sm2_sign_param. > > > > > enum rte_crypto_asym_op_type op_type; > > > /**< Signature generation or verification. */ > > > > Now op_type can either be sign/verify here. > > > - > > > - rte_crypto_uint pkey; > > > - /**< Private key for encryption or sign generation. */ > > > - > > > - struct rte_crypto_ec_point q; > > > - /**< Public key for decryption or verification. */ > > > - > > > rte_crypto_param message; > > > /**< > > > - * Pointer to input data > > > - * - to be encrypted for SM2 public encrypt. > > > - * - to be signed for SM2 sign generation. > > > - * - to be authenticated for SM2 sign verification. > > > - * > > > - * Pointer to output data > > > - * - for SM2 private decrypt. > > > - * In this case the underlying array should have been > > > - * allocated with enough memory to hold plaintext output > > > - * (at least encrypted text length). The message.length field > > > - * will be overwritten by the PMD with the decrypted length. > > > - */ > > > - > > > - rte_crypto_param cipher; > > > - /**< > > > - * Pointer to input data > > > - * - to be decrypted for SM2 private decrypt. > > > - * > > > - * Pointer to output data > > > - * - for SM2 public encrypt. > > > - * In this case the underlying array should have been allocated > > > - * with enough memory to hold ciphertext output (at least X bytes > > > - * for prime field curve of N bytes and for message M bytes, > > > - * where X =3D (C1 || C2 || C3) and computed based on SM2 RFC as > > > - * C1 (1 + N + N), C2 =3D M, C3 =3D N. The cipher.length field will > > > - * be overwritten by the PMD with the encrypted length. > > > + * Pointer to the input data > > > + * In case RTE_CRYPTO_ASYM_FLAG_PLAIN_INPUT flag is set in the > > > op flags field, > > > + * it is a message to be signed by the PMD. > > > + * Otherwise, it is a message hash. > > > */ > > Please find above my comments for this flag. > > > > > - > > > rte_crypto_uint id; > > > - /**< The SM2 id used by signer and verifier. */ > > > - > > > + /**< The SM2 id used by signer and verifier. > > > + * In case RTE_CRYPTO_ASYM_FLAG_PLAIN_INPUT flag is set this > > > field is unused. > > > + */ > > > rte_crypto_uint k; > > > /**< The SM2 per-message secret number, which is an integer > > > * in the interval (1, n-1). > > > @@ -719,6 +688,46 @@ struct rte_crypto_sm2_op_param { > > > */ > > > }; > > > > > > +struct rte_crypto_sm2_cipher { > > > + enum rte_crypto_asym_op_type op_type; > > > + /**< Ecryption or decryption. */ > > > + rte_crypto_param message; > > > + /**< > > > + * Pointer to input data > > > + * - to be encrypted for SM2 public encrypt. * > > > + * Pointer to output data > > > + * - for SM2 private decrypt. > > > + */ > > > + rte_crypto_param cipher; > > > + /**< > > > + * Pointer to input data > > > + * - to be decrypted for SM2 private decrypt. > > > + * > > > + * Pointer to output data > > > + * - for SM2 public encrypt. > > > + */ > > > + rte_crypto_uint k; > > > + /**< The SM2 per-message secret number, which is an integer > > > + * in the interval (1, n-1). > > > + * If the random number is generated by the PMD, > > > + * the 'rte_crypto_param.data' parameter should be set to NULL. > > > + */ > > > +}; > > > + > > > +/* > > > + * Asymmetric SM2 transform data. > > > + * > > > + * Structure describing SM2 xform params. > > > + */ > > > +struct rte_crypto_sm2_xform { > > > + enum rte_crypto_auth_algorithm hash; > > > + /**< Hash algorithm used in SM2 op. */ > > > + rte_crypto_uint dA; > > > + /**< Private key. */ > > > + struct rte_crypto_ec_point PA; > > > + /**< Public key. */ > > > +}; > > > + > > > > sm2_xform is no more required, but ec_xform can be reused as I had > > proposed > > in: > > [v1,4/6] cryptodev: use generic EC xform params for SM2 > > > > So, to summarize, may I request below of this patch to go above my > > patch series If you agree. > > > > (1). Splitting sm2 op params into sign and cipher ops. > > (2). Move private and public keys from op param into EC xform. > > For DSA , should we move public key into xform as a session para= m ? > Regardless which way we would go, it should be consistent across the API.= I > would say that private key should always be in session, public key eventu= ally. > Except for the key exchange, of course. Ack. Could you get a chance to review my patch series as well ? Thanks, Gowrishankar