From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id A602C41D9B; Tue, 28 Feb 2023 09:02:56 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 42353410D4; Tue, 28 Feb 2023 09:02:56 +0100 (CET) Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) by mails.dpdk.org (Postfix) with ESMTP id 0563040EE4 for ; Tue, 28 Feb 2023 09:02:54 +0100 (CET) Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 31S5h1Al025141; Tue, 28 Feb 2023 00:02:54 -0800 Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2104.outbound.protection.outlook.com [104.47.70.104]) by mx0b-0016f401.pphosted.com (PPS) with ESMTPS id 3nyjqtvj6x-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 28 Feb 2023 00:02:54 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UFPWd5D9PSsiNgPZm7TXfw+ZAYCf/8awIbGrCgNr5hWMMEET5LO1JV7d5AxmKIiD4TysbTRjlBGswxaTJvZabmcnVPdv6LQ3vn29xWIFfqwg3LzhZFYsPTSnRqFm1lJz2GWVtSCQglbl5YukMqWvKOGJ61ULGRPuTzn9NKxxKdi/jq8Yh4FcrAH2vnL9+eRFhx1jE9fijXkqQSwne3zjwihFisXsmphnts29VLQfdTnsg+xCCI90tRqCtDsDuiHogMlN689nJ2zs4GWABJS9rmLrXwS/M3qI+ygnwg1Ua+ripKaBktOq5te5h+kscZ6nAY5Vw9PW5q4aivkaJG2WCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dRybauGWywUmLnxCF3D4lGiI+WPIX+k50ulJWbrdfdA=; b=QcRQzS4C0SYn6X3nCxu1+ffsj76GBZkGKWih+BOATJwtAIee1JAHiw0bq0vxnxdA5d3Dn5S6qmEdlHEu+3qzDaP7VsrUd+QJP99J7VxSp3oJPWLAIZTx3wwXGdiMhR1nnm4WNXJiQSQH+MXyWfHA9RTxKB9i/Hdfzfcn0QYn9KzqG9Ub3nyXsxk0yytubby2F0bvmm8XW0yFZGh4CUUr0+TIBKxDCZiIfUVSJuQr3hmQHWzrq/xn4GlfraEm8hr4PatUuqIO+6ZWqwchTsuKeIVsor73rwHKnm+VZNQYZ5pobY+MZcpPnwULDrG9rg8+ppq/wwbtXYB/rnKAwxYBZA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.onmicrosoft.com; s=selector1-marvell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dRybauGWywUmLnxCF3D4lGiI+WPIX+k50ulJWbrdfdA=; b=FFFDXkf9pJsDfdDCupcbOuiGDyIjfUjXvd9f9ZozXJlicQpINW1NaQWAkzUCYv54+iRFGaTzQgQmefjZw3AqjUNOTJBErY1l1hoNI/kI97VYyuWorv2R4q5mmtFgVMqJByyAcsgGBbGMBya7aDiRXLA13nBdkFKjRTUOOphlC5U= Received: from CO6PR18MB4484.namprd18.prod.outlook.com (2603:10b6:5:359::9) by PH0PR18MB5190.namprd18.prod.outlook.com (2603:10b6:510:161::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6134.21; Tue, 28 Feb 2023 08:02:51 +0000 Received: from CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::8bf2:df15:70ef:88eb]) by CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::8bf2:df15:70ef:88eb%5]) with mapi id 15.20.6134.030; Tue, 28 Feb 2023 08:02:51 +0000 From: Akhil Goyal To: Sunyang Wu , "dev@dpdk.org" CC: "kai.ji@intel.com" Subject: RE: [EXT] [PATCH] crypto/openssl: support SM3/SM4 in openssl Thread-Topic: [EXT] [PATCH] crypto/openssl: support SM3/SM4 in openssl Thread-Index: AQHZS0p8iSxJlw9mLEak6yRruUbr467j/uQg Date: Tue, 28 Feb 2023 08:02:51 +0000 Message-ID: References: <20230228075827.15008-1-sunyang.wu@jaguarmicro.com> In-Reply-To: <20230228075827.15008-1-sunyang.wu@jaguarmicro.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-dg-rorf: true x-dg-ref: =?us-ascii?Q?PG1ldGE+PGF0IG5tPSJib2R5LnR4dCIgcD0iYzpcdXNlcnNcZ2FraGlsXGFw?= =?us-ascii?Q?cGRhdGFccm9hbWluZ1wwOWQ4NDliNi0zMmQzLTRhNDAtODVlZS02Yjg0YmEy?= =?us-ascii?Q?OWUzNWJcbXNnc1xtc2ctNDlmYjljZWQtYjczZS0xMWVkLWEwOGUtOTRlNmY3?= =?us-ascii?Q?NjYxOTA3XGFtZS10ZXN0XDQ5ZmI5Y2VmLWI3M2UtMTFlZC1hMDhlLTk0ZTZm?= =?us-ascii?Q?NzY2MTkwN2JvZHkudHh0IiBzej0iODI1MCIgdD0iMTMzMjIwNDQ5Njg1Njgw?= =?us-ascii?Q?Mjc0IiBoPSJ0WGFCMHplZENKSUNhVVlMSE81S2VqUzRKUUk9IiBpZD0iIiBi?= =?us-ascii?Q?bD0iMCIgYm89IjEiIGNpPSJjQUFBQUVSSFUxUlNSVUZOQ2dVQUFIWUlBQUNT?= =?us-ascii?Q?TUZVTVMwdlpBY3BaYXhQNDF2QW15bGxyRS9qVzhDWU5BQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBSEFBQUFBR0NBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?RUFBUUFCQUFBQTFGSDNhQUFBQUFBQUFBQUFBQUFBQUo0QUFBQmhBR1FBWkFC?= =?us-ascii?Q?eUFHVUFjd0J6QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFF?= =?us-ascii?Q?QUFBQUFBQUFBQWdBQUFBQUFuZ0FBQUdNQWRRQnpBSFFBYndCdEFGOEFjQUJs?= =?us-ascii?Q?QUhJQWN3QnZBRzRBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBUUFBQUFBQUFBQUNBQUFB?= =?us-ascii?Q?QUFDZUFBQUFZd0IxQUhNQWRBQnZBRzBBWHdCd0FHZ0Fid0J1QUdVQWJnQjFB?= =?us-ascii?Q?RzBBWWdCbEFISUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQkFBQUFBQUFBQUFJQUFBQUFBSjRBQUFCakFIVUFj?= =?us-ascii?Q?d0IwQUc4QWJRQmZBSE1BY3dCdUFGOEFaQUJoQUhNQWFBQmZBSFlBTUFBeUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-refone: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUVBQUFBQUFBQUFBZ0FBQUFBQW5nQUFBR01B?= =?us-ascii?Q?ZFFCekFIUUFid0J0QUY4QWN3QnpBRzRBWHdCckFHVUFlUUIzQUc4QWNnQmtB?= =?us-ascii?Q?SE1BQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFRQUFBQUFBQUFBQ0FBQUFBQUNlQUFBQVl3QjFBSE1BZEFCdkFHMEFY?= =?us-ascii?Q?d0J6QUhNQWJnQmZBRzRBYndCa0FHVUFiQUJwQUcwQWFRQjBBR1VBY2dCZkFI?= =?us-ascii?Q?WUFNQUF5QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFCQUFBQUFBQUFB?= =?us-ascii?Q?QUlBQUFBQUFKNEFBQUJqQUhVQWN3QjBBRzhBYlFCZkFITUFjd0J1QUY4QWN3?= =?us-ascii?Q?QndBR0VBWXdCbEFGOEFkZ0F3QURJQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBRUFBQUFBQUFBQUFnQUFBQUFBbmdBQUFH?= =?us-ascii?Q?UUFiQUJ3QUY4QWN3QnJBSGtBY0FCbEFGOEFZd0JvQUdFQWRBQmZBRzBBWlFC?= =?us-ascii?Q?ekFITUFZUUJuQUdVQVh3QjJBREFBTWdBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQVFBQUFBQUFBQUFDQUFBQUFBQ2VBQUFBWkFCc0FIQUFYd0J6QUd3?= =?us-ascii?Q?QVlRQmpBR3NBWHdCakFHZ0FZUUIwQUY4QWJRQmxBSE1BY3dCaEFHY0FaUUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-reftwo: =?us-ascii?Q?QUFBQUFBQUFBQUJBQUFBQUFBQUFBSUFBQUFBQUo0QUFBQmtBR3dBY0FCZkFI?= =?us-ascii?Q?UUFaUUJoQUcwQWN3QmZBRzhBYmdCbEFHUUFjZ0JwQUhZQVpRQmZBR1lBYVFC?= =?us-ascii?Q?c0FHVUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFFQUFB?= =?us-ascii?Q?QUFBQUFBQWdBQUFBQUFuZ0FBQUdVQWJRQmhBR2tBYkFCZkFHRUFaQUJrQUhJ?= =?us-ascii?Q?QVpRQnpBSE1BQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFRQUFBQUFBQUFBQUFBQUFBUUFBQUFBQUFBQUNBQUFBQUFD?= =?us-ascii?Q?ZUFBQUFiUUJoQUhJQWRnQmxBR3dBYkFCZkFIQUFjZ0J2QUdvQVpRQmpBSFFB?= =?us-ascii?Q?WHdCakFHOEFaQUJsQUhNQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQkFBQUFBQUFBQUFJQUFBQUFBSjRBQUFCdEFHRUFjZ0Iy?= =?us-ascii?Q?QUdVQWJBQnNBRjhBZEFCbEFISUFiUUJwQUc0QWRRQnpBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUVB?= =?us-ascii?Q?QUFBQUFBQUFBZ0FBQUFBQSIvPjwvbWV0YT4=3D?= x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO6PR18MB4484:EE_|PH0PR18MB5190:EE_ x-ms-office365-filtering-correlation-id: d6798094-687f-427b-c9b0-08db19623094 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO6PR18MB4484.namprd18.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(4636009)(346002)(136003)(366004)(376002)(396003)(39860400002)(451199018)(71200400001)(66476007)(4326008)(66946007)(66446008)(478600001)(64756008)(83380400001)(52536014)(5660300002)(8676002)(76116006)(316002)(6506007)(8936002)(9686003)(26005)(7696005)(110136005)(186003)(41300700001)(33656002)(55236004)(66556008)(38070700005)(2906002)(122000001)(55016003)(38100700002)(86362001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?LsroKlWgMbgwIpqtULVZ36Hv/7W7KA1Un/MPCJjim0HfVQE34eUHYAFje/BU?= =?us-ascii?Q?2lmABUgwTeaUKqQQtOBr/Qw0A7n9RsSGbb1jdNnXKl6MevsrqE9OrXwUr5q3?= =?us-ascii?Q?Ff4Se21V17HyiMR1UbehgVgMt7SLA349GslhJTAKERd4L0/9HYOgE286P2zw?= =?us-ascii?Q?3X+6ZrziVRNqpwHbitlBh/z3tnWGsFT4FwParKJ/X96dq/JFzlSoXJQU17IQ?= =?us-ascii?Q?f2FKZHU2qTTRBLxlFbm1CEXG9s9El0Pag0M88uFrTWoncs/KoSB+Ji+vDHJ1?= =?us-ascii?Q?Slb3MyJ9gDfUVJvxuZFuCjZ/34j8C3v4+l7E0iCkxb3IiE5G4ePjECxkzL91?= =?us-ascii?Q?vggHg30dJ/OTWGi1vnhRnLeNFtMyMU68F1NeRnkw9Ve3pA0LGoeYVJjPYCK4?= =?us-ascii?Q?KYg7vW758JKeAcO+Y+AbJSV967O6w3MFk9eoH7SonXZyO8LYOVWi8JjyPNdG?= =?us-ascii?Q?wsUB0HCREKQ0Kyn5C+LvxwU3lM6gGwuS5zws9fFQdqqLBGA1WKLPkLc+gW/h?= =?us-ascii?Q?gYf6jrv3wSHMukDLr5FjHvl8u3hAb4Xf71CWbuLGEa8LI10rtfo8JUNYL2w+?= =?us-ascii?Q?PUn4N1RfKWK9Wi7eiRMNaZimLoRgEXg8mhbXYnvguMVlLH95V1i9swIjSf5G?= =?us-ascii?Q?K2TWMEBn4dK9ysmCBTCDltqsIQamBk2GVTzZBHyV349FC1xHQL7kegvuonZR?= =?us-ascii?Q?9pluY9tw3Xv70tY3QeA6nuoyS+27XATK57YS6c/cmkOBjc0WAR37rhleepFF?= =?us-ascii?Q?tic6bUQ5mzlo1fXuCxl+lUm60S7lt9nRHKhZmuMSgcbmWf7WjorzrKZUXvvG?= =?us-ascii?Q?hXFmwOXe5/VOfFW18mFtyGxlT5D0cwWdIk+0Q3K++xQod24kPWAUJXJ3YZtM?= =?us-ascii?Q?eHvrhfiq3RA/4v3cfAUoOF8Mr4graFB97ctoqwZWalkGhGMI1h7kLA7PzVYk?= =?us-ascii?Q?J75OnNkMO5HxHIdXT47efrFNea3M+yhtErnOLaFbv53Cfx8UjjFuUjfqYX6X?= =?us-ascii?Q?a0x73mswl1PNhmVUaYyAaOCgoTRrhnqQQ0qcYYxuXsYKpWmr/rlHahlQuZbi?= =?us-ascii?Q?TjRD7MM0cYQfOlphmfIMqhNr/RR0jlPK3zjHh2LI+TKWaZgcRX5ZU3YlXt2A?= =?us-ascii?Q?yz9uCAbyUwLyvY4Iub92eckzaHreNf7eu5PA0mggfgm9szWmxnidFtgrYO9p?= =?us-ascii?Q?3kpReBhwCohFVW07GJnxcTmZCA5DjFBTrb9K7VVOZXwlevuYtYcyEvUo4Xzn?= =?us-ascii?Q?U0WpmpApuSCu14sSfIL61C0WpOtNKifCXLQbAYkIEfGcz0B6CEys0JafAgmV?= =?us-ascii?Q?WhFowgSLOR04wRGCF5ZFe91cCvT0GCgcfPdB0U0ZYURU1HPT3NEo8S57cuAM?= =?us-ascii?Q?qtSId7nvy/F0i7zJMYhDXWOCuL/zXFGULws9AvFbBqTqNF0SY56iwfNyoKNK?= =?us-ascii?Q?w9ccXz5CCD6ba8F+m2CKEc442lW7puPZaiQ9HfA1+GivjkWjLug10oCIRjeU?= =?us-ascii?Q?1irZDJcsHvpjXd8+6pGnfgnQ3VmplDWF7i2N/qRZbSmmFn6y/PEH/W0nJDsc?= =?us-ascii?Q?Uiq+QnZcADfssykSuqOCPZmNAZI/rwZwfqWHHzOQ?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: marvell.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO6PR18MB4484.namprd18.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d6798094-687f-427b-c9b0-08db19623094 X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2023 08:02:51.4979 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: lM2REEU7puEe4GOX4U10uJVXzVtM6mA5uZyOvzHGglooHMR4+PqoFPeZeWesfJXiwv1zH1McsR5yQ995/OvqUQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR18MB5190 X-Proofpoint-ORIG-GUID: xIkXHyNsdfK2Z8z_TJdH3U1vFNWrrcs4 X-Proofpoint-GUID: xIkXHyNsdfK2Z8z_TJdH3U1vFNWrrcs4 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.930,Hydra:6.0.562,FMLib:17.11.170.22 definitions=2023-02-28_04,2023-02-27_01,2023-02-09_01 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org > Added SM3/SM4 support in openssl >=20 > --- > We wrote a test program to test it, this is the test result: > + SM4 Chain : 24/24 passed, > 0/24 skipped, 0/24 failed, 0/24 unsupported > + SM4 Cipher Only : 10/10 passed, > 0/10 skipped, 0/10 failed, 0/10 unsupported >=20 > Signed-off-by: Sunyang Wu > --- > drivers/crypto/openssl/rte_openssl_pmd.c | 24 ++++ > drivers/crypto/openssl/rte_openssl_pmd_ops.c | 144 +++++++++++++++++++ > lib/cryptodev/rte_crypto_sym.h | 8 +- You should split the patch into 2 - one for library changes and the other f= or PMD. Also these patches cannot be part of DPDK 23.03 as library changes are acce= pted in RC1 only. Also add documentation changes for the new algos added. > 3 files changed, 175 insertions(+), 1 deletion(-) >=20 > diff --git a/drivers/crypto/openssl/rte_openssl_pmd.c > b/drivers/crypto/openssl/rte_openssl_pmd.c > index abcb641a44..865cf03ff1 100644 > --- a/drivers/crypto/openssl/rte_openssl_pmd.c > +++ b/drivers/crypto/openssl/rte_openssl_pmd.c > @@ -239,6 +239,19 @@ get_cipher_algo(enum rte_crypto_cipher_algorithm > sess_algo, size_t keylen, > default: > res =3D -EINVAL; > } > + case RTE_CRYPTO_CIPHER_SM4_ECB: > + *algo =3D EVP_sm4_ecb(); > + break; > + case RTE_CRYPTO_CIPHER_SM4_CBC: > + *algo =3D EVP_sm4_cbc(); > + break; > + case RTE_CRYPTO_CIPHER_SM4_CTR: > + *algo =3D EVP_sm4_ctr(); > + case RTE_CRYPTO_CIPHER_SM4_OFB: > + *algo =3D EVP_sm4_ofb(); > + break; > + case RTE_CRYPTO_CIPHER_SM4_CFB: > + *algo =3D EVP_sm4_cfb(); > break; > default: > res =3D -EINVAL; > @@ -284,6 +297,10 @@ get_auth_algo(enum rte_crypto_auth_algorithm > sessalgo, > case RTE_CRYPTO_AUTH_SHA512_HMAC: > *algo =3D EVP_sha512(); > break; > + case RTE_CRYPTO_AUTH_SM3: > + case RTE_CRYPTO_AUTH_SM3_HMAC: > + *algo =3D EVP_sm3(); > + break; > default: > res =3D -EINVAL; > break; > @@ -483,6 +500,11 @@ openssl_set_session_cipher_parameters(struct > openssl_session *sess, > case RTE_CRYPTO_CIPHER_3DES_CBC: > case RTE_CRYPTO_CIPHER_AES_CBC: > case RTE_CRYPTO_CIPHER_AES_CTR: > + case RTE_CRYPTO_CIPHER_SM4_ECB: > + case RTE_CRYPTO_CIPHER_SM4_CBC: > + case RTE_CRYPTO_CIPHER_SM4_CTR: > + case RTE_CRYPTO_CIPHER_SM4_CFB: > + case RTE_CRYPTO_CIPHER_SM4_OFB: > sess->cipher.mode =3D OPENSSL_CIPHER_LIB; > sess->cipher.algo =3D xform->cipher.algo; > sess->cipher.ctx =3D EVP_CIPHER_CTX_new(); > @@ -636,6 +658,7 @@ openssl_set_session_auth_parameters(struct > openssl_session *sess, > case RTE_CRYPTO_AUTH_SHA256: > case RTE_CRYPTO_AUTH_SHA384: > case RTE_CRYPTO_AUTH_SHA512: > + case RTE_CRYPTO_AUTH_SM3: > sess->auth.mode =3D OPENSSL_AUTH_AS_AUTH; > if (get_auth_algo(xform->auth.algo, > &sess->auth.auth.evp_algo) !=3D 0) > @@ -721,6 +744,7 @@ openssl_set_session_auth_parameters(struct > openssl_session *sess, > case RTE_CRYPTO_AUTH_SHA256_HMAC: > case RTE_CRYPTO_AUTH_SHA384_HMAC: > case RTE_CRYPTO_AUTH_SHA512_HMAC: > + case RTE_CRYPTO_AUTH_SM3_HMAC: > sess->auth.mode =3D OPENSSL_AUTH_AS_HMAC; > sess->auth.hmac.ctx =3D HMAC_CTX_new(); > if (get_auth_algo(xform->auth.algo, > diff --git a/drivers/crypto/openssl/rte_openssl_pmd_ops.c > b/drivers/crypto/openssl/rte_openssl_pmd_ops.c > index 29ad1b9505..b9f5c6f034 100644 > --- a/drivers/crypto/openssl/rte_openssl_pmd_ops.c > +++ b/drivers/crypto/openssl/rte_openssl_pmd_ops.c > @@ -269,6 +269,50 @@ static const struct rte_cryptodev_capabilities > openssl_pmd_capabilities[] =3D { > }, } > }, } > }, > + { > + /* SM3 */ > + .op =3D RTE_CRYPTO_OP_TYPE_SYMMETRIC, > + {.sym =3D { > + .xform_type =3D RTE_CRYPTO_SYM_XFORM_AUTH, > + {.auth =3D { > + .algo =3D RTE_CRYPTO_AUTH_SM3, > + .block_size =3D 64, > + .key_size =3D { > + .min =3D 0, > + .max =3D 0, > + .increment =3D 0 > + }, > + .digest_size =3D { > + .min =3D 32, > + .max =3D 32, > + .increment =3D 0 > + }, > + .aad_size =3D { 0 } > + }, } > + }, } > + }, > + { > + /* SM3 HMAC */ > + .op =3D RTE_CRYPTO_OP_TYPE_SYMMETRIC, > + {.sym =3D { > + .xform_type =3D RTE_CRYPTO_SYM_XFORM_AUTH, > + {.auth =3D { > + .algo =3D RTE_CRYPTO_AUTH_SM3_HMAC, > + .block_size =3D 64, > + .key_size =3D { > + .min =3D 1, > + .max =3D 64, > + .increment =3D 1 > + }, > + .digest_size =3D { > + .min =3D 32, > + .max =3D 32, > + .increment =3D 0 > + }, > + .aad_size =3D { 0 } > + }, } > + }, } > + }, > { /* AES CBC */ > .op =3D RTE_CRYPTO_OP_TYPE_SYMMETRIC, > {.sym =3D { > @@ -494,6 +538,106 @@ static const struct rte_cryptodev_capabilities > openssl_pmd_capabilities[] =3D { > }, } > }, } > }, > + { /* SM4 ECB */ > + .op =3D RTE_CRYPTO_OP_TYPE_SYMMETRIC, > + {.sym =3D { > + .xform_type =3D RTE_CRYPTO_SYM_XFORM_CIPHER, > + {.cipher =3D { > + .algo =3D RTE_CRYPTO_CIPHER_SM4_ECB, > + .block_size =3D 16, > + .key_size =3D { > + .min =3D 16, > + .max =3D 16, > + .increment =3D 0 > + }, > + .iv_size =3D { > + .min =3D 0, > + .max =3D 0, > + .increment =3D 0 > + } > + }, } > + }, } > + }, > + { /* SM4 CBC */ > + .op =3D RTE_CRYPTO_OP_TYPE_SYMMETRIC, > + {.sym =3D { > + .xform_type =3D RTE_CRYPTO_SYM_XFORM_CIPHER, > + {.cipher =3D { > + .algo =3D RTE_CRYPTO_CIPHER_SM4_CBC, > + .block_size =3D 16, > + .key_size =3D { > + .min =3D 16, > + .max =3D 16, > + .increment =3D 0 > + }, > + .iv_size =3D { > + .min =3D 16, > + .max =3D 16, > + .increment =3D 0 > + } > + }, } > + }, } > + }, > + { /* SM4 CTR */ > + .op =3D RTE_CRYPTO_OP_TYPE_SYMMETRIC, > + {.sym =3D { > + .xform_type =3D RTE_CRYPTO_SYM_XFORM_CIPHER, > + {.cipher =3D { > + .algo =3D RTE_CRYPTO_CIPHER_SM4_CTR, > + .block_size =3D 16, > + .key_size =3D { > + .min =3D 16, > + .max =3D 16, > + .increment =3D 0 > + }, > + .iv_size =3D { > + .min =3D 16, > + .max =3D 16, > + .increment =3D 0 > + } > + }, } > + }, } > + }, > + { /* SM4 OFB */ > + .op =3D RTE_CRYPTO_OP_TYPE_SYMMETRIC, > + {.sym =3D { > + .xform_type =3D RTE_CRYPTO_SYM_XFORM_CIPHER, > + {.cipher =3D { > + .algo =3D RTE_CRYPTO_CIPHER_SM4_OFB, > + .block_size =3D 16, > + .key_size =3D { > + .min =3D 16, > + .max =3D 16, > + .increment =3D 0 > + }, > + .iv_size =3D { > + .min =3D 16, > + .max =3D 16, > + .increment =3D 0 > + } > + }, } > + }, } > + }, > + { /* SM4 CFB */ > + .op =3D RTE_CRYPTO_OP_TYPE_SYMMETRIC, > + {.sym =3D { > + .xform_type =3D RTE_CRYPTO_SYM_XFORM_CIPHER, > + {.cipher =3D { > + .algo =3D RTE_CRYPTO_CIPHER_SM4_CFB, > + .block_size =3D 16, > + .key_size =3D { > + .min =3D 16, > + .max =3D 16, > + .increment =3D 0 > + }, > + .iv_size =3D { > + .min =3D 16, > + .max =3D 16, > + .increment =3D 0 > + } > + }, } > + }, } > + }, > { /* RSA */ > .op =3D RTE_CRYPTO_OP_TYPE_ASYMMETRIC, > {.asym =3D { > diff --git a/lib/cryptodev/rte_crypto_sym.h b/lib/cryptodev/rte_crypto_sy= m.h > index 2cfe66530c..b5c6d87740 100644 > --- a/lib/cryptodev/rte_crypto_sym.h > +++ b/lib/cryptodev/rte_crypto_sym.h > @@ -172,8 +172,12 @@ enum rte_crypto_cipher_algorithm { > /**< ShangMi 4 (SM4) algorithm in ECB mode */ > RTE_CRYPTO_CIPHER_SM4_CBC, > /**< ShangMi 4 (SM4) algorithm in CBC mode */ > - RTE_CRYPTO_CIPHER_SM4_CTR > + RTE_CRYPTO_CIPHER_SM4_CTR, > /**< ShangMi 4 (SM4) algorithm in CTR mode */ > + RTE_CRYPTO_CIPHER_SM4_CFB, > + /**< ShangMi 4 (SM4) algorithm in CFB mode */ > + RTE_CRYPTO_CIPHER_SM4_OFB > + /**< ShangMi 4 (SM4) algorithm in OFB mode */ > }; >=20 > /** Cipher algorithm name strings */ > @@ -376,6 +380,8 @@ enum rte_crypto_auth_algorithm { > /**< HMAC using 512 bit SHA3 algorithm. */ > RTE_CRYPTO_AUTH_SM3, > /**< ShangMi 3 (SM3) algorithm */ > + RTE_CRYPTO_AUTH_SM3_HMAC, > + /**< HMAC using ShangMi 3 (SM3) algorithm */ >=20 > RTE_CRYPTO_AUTH_SHAKE_128, > /**< 128 bit SHAKE algorithm. */ > -- > 2.19.0.rc0.windows.1