From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 1FBFA42649; Tue, 26 Sep 2023 22:03:11 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id E82A940269; Tue, 26 Sep 2023 22:03:10 +0200 (CEST) Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.120]) by mails.dpdk.org (Postfix) with ESMTP id A08AB400D5 for ; Tue, 26 Sep 2023 22:03:09 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1695758589; x=1727294589; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=d4nM15BM+72m8faHyMB2IizmWIgfgVCzsHGIyY8HFbA=; b=gPo8geCJ/ZC7DXTcnteZwN0wD6DfrZnZDyekxxSuBnYSP6j9kDTvvhMT BkbV4pJ2Uj6EnlZvLy2qY0b4EQX0F0KbHHW2HF4TuAjFard1jC0Ikf8J9 4Odo0lCTOR+dFruJp7BnlbPMdKBbWL5ktL97hxWTaw5uvLeMhfoymIG7v txEHZCet7ZbFcJF9L0V9c5Z+angbYJCgtnWTxCXZZ4CfV43dd8n/MKd4x ZU0RkLDFwvDSwsfN7KrN1La/NO6Yj+econ86plz/SZ7wuOrf/2qrtWulF F7Cl0UJdsEmQIuld25QvwIJtDWKdImwy26818NZ4++zMpMMebF1utY3sB A==; X-IronPort-AV: E=McAfee;i="6600,9927,10845"; a="380527388" X-IronPort-AV: E=Sophos;i="6.03,178,1694761200"; d="scan'208";a="380527388" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Sep 2023 13:03:08 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10845"; a="1079838305" X-IronPort-AV: E=Sophos;i="6.03,178,1694761200"; d="scan'208";a="1079838305" Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by fmsmga005.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 26 Sep 2023 13:03:08 -0700 Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Tue, 26 Sep 2023 13:03:07 -0700 Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32 via Frontend Transport; Tue, 26 Sep 2023 13:03:07 -0700 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.168) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.32; Tue, 26 Sep 2023 13:03:07 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KeE9Dx0L8o9PaFVse7yGNnGNTwlxpTjt/37nS47k8RcVTjHEZb8ZHOyt/x0nc0ojJwv6KOZ4CgUfamXn8gOWiaHcMiKjJaC5FEclFTQMtPCAZei5kO1frZiZ5nFqFLpTgvY0PyTYbUOhEn4x10kLpxM7NvF78+yWyr/Ln5iu2LicdoucjNWoxTjh5IgSJJRX6WBZxeF0PkGDLzYIGFj9dZKdh1F23M16iF+jibm/UO8IteUSQhy3ysArlirNCksH5r0HUsGc4RiX1JjM0fzcLrx9VZQnRlDMyMdRKeFmcatpJX9Oak40ClJyAn2mIBXnwQ3JuGN2fzarSq5z63F6Cw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+zO0ZFqlcsaalSPEq/63OUwYwwFAr0MGFPIjXKq+hrE=; b=XyTGbKJTL8yQ2l508QuCDuvC1ACpgtp546p2mlXcjuk4kpAlp23lxfUFFTHbayZfP5Wqh91Hul7y18zzOBMVHEVt/74RN74W0JcYuoAS8ySRhvvSJogs/2MRDwxBHTzGhkK3+mmv5WaCtNQfppJmfPRqHIyHmzL9Bw8+LITbpEldj9IAnLUlugT/Q2IYygwZxK5nITqOeHDrlK5lE9d/giFArwiW79WbPFxyeFlpccYk5oPrlRpovGd2EsJ9YcVCI9xymXjroAKAdLWDIVgd/tBE3ST68zyL/Ka0JY7xnJuzn3H1Js5BNrxSbdrzKKkwDP7eTd05n8QYKpW/4m/+IA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from PH0PR11MB5013.namprd11.prod.outlook.com (2603:10b6:510:30::21) by SJ0PR11MB6718.namprd11.prod.outlook.com (2603:10b6:a03:477::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6813.28; Tue, 26 Sep 2023 20:03:04 +0000 Received: from PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::88e9:812b:618b:1fd3]) by PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::88e9:812b:618b:1fd3%5]) with mapi id 15.20.6813.017; Tue, 26 Sep 2023 20:03:04 +0000 From: "Kusztal, ArkadiuszX" To: Gowrishankar Muthukrishnan , "dev@dpdk.org" CC: "anoobj@marvell.com" , Akhil Goyal , Fan Zhang , "Ji, Kai" Subject: RE: [v1 3/6] cryptodev: add hash support in asymmetric capability Thread-Topic: [v1 3/6] cryptodev: add hash support in asymmetric capability Thread-Index: AQHZy24ppd6qcx7mwkal4qzbKndCb7Atz7nw Date: Tue, 26 Sep 2023 20:03:04 +0000 Message-ID: References: <086351e84370ce65dcf947dba12a46f9c62ae79b.1691658879.git.gmuthukrishn@marvell.com> In-Reply-To: <086351e84370ce65dcf947dba12a46f9c62ae79b.1691658879.git.gmuthukrishn@marvell.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PH0PR11MB5013:EE_|SJ0PR11MB6718:EE_ x-ms-office365-filtering-correlation-id: 3b7f561d-5dbb-4b21-76ed-08dbbecb9853 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB5013.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(136003)(396003)(346002)(39860400002)(376002)(366004)(230922051799003)(451199024)(1800799009)(186009)(316002)(5660300002)(8936002)(41300700001)(4326008)(8676002)(110136005)(64756008)(66446008)(54906003)(66476007)(66556008)(52536014)(66946007)(76116006)(478600001)(2906002)(55016003)(33656002)(7696005)(53546011)(9686003)(6506007)(86362001)(107886003)(83380400001)(71200400001)(38100700002)(82960400001)(38070700005)(26005)(122000001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?kCS4kaoupTLScbJ1WKC7znsvEb745UlO8VyijYUqffsdYvnVmtT9iFZuZ0HW?= =?us-ascii?Q?QK7hSsreG5ety7sfhTRdb9U6hfoM7BE6zCIhAoZe05t0wdkO8gBNiNXXBkhP?= =?us-ascii?Q?x+n/t+6X+n1Ns7uxDZ/V/FomRkbD5qKqqCTjsppGUNE1K4SttrbTvR0W33TG?= =?us-ascii?Q?FwaCFMBBhgDj5Cl9c2yjVdjd4ICnk/guDejBbJyq7Os8aCWMpbxl3h3T1Au5?= =?us-ascii?Q?CWBUe6U7ZRPCHKacwnabzchrn3A9q24TDeIsJL0h6RAp1wohP+ftGW3tyO3A?= =?us-ascii?Q?6J4jDDVBa/CfZfebuh8cYGuAtwpkFEe23WfgsuR5PeJvN0JHW+P5U1G36bgk?= =?us-ascii?Q?G06hENmjwaek5gRjImAfupxN5aS/Xnum679Xaw5DaE3CqLLhGADA+bwGpwqT?= =?us-ascii?Q?htM9sGNVjRg07j4r2JY/q1UexKOFDwCMhUklSPrvkjsZz6n1WvDuOhLhkM36?= =?us-ascii?Q?eY9Lm0fJ0aVdIAQcGR9TpUdBlKhjAnU+hrv7jmSpXafx9TMoD2+jH3Wlp24q?= =?us-ascii?Q?bRro/NZkA04tDnpSew/rlqsPZISsucl9AF0FOhlXA32DlKq93qMuCPatzfVL?= =?us-ascii?Q?Q+TcCcSwE0pl+nvJv21wxH/asrpfiobtQBHfaQbDc8B19Hv4VqbsQ5AIsOsZ?= =?us-ascii?Q?9Vi1m8U4yTElLDnpiSgPJB1mV0UD0QptDOiYh+GRJJ7e/XDchPh9GtA5IXMK?= =?us-ascii?Q?dhp7EsLD6/OxF0KAmzBrU7HsZFRrg1VA5KFvTAAYiWMLgp/Yx3371J1veAqR?= =?us-ascii?Q?ZLxQ0BzTAvds11/XiYCjCu1w+XQGpApa0FOynVOE14F7xg6jF0ehWRR6zbhd?= =?us-ascii?Q?t6Tv+QKGGBYGjwkKLOMPJz0ejVqrbWV13wlBemxg9piqTi7ZxaLWThfNUrI+?= =?us-ascii?Q?YVDFIXyrGsLYAF799ejUW9sjkE9T3ghoUo2qTNleGfOtSOTh7/LJjQ51F65J?= =?us-ascii?Q?GBCcIb8Xydsk9O9XmvSKeAh4gGRTtDsGcrCX39sI5VFISP9lD6FYSJVXtpe8?= =?us-ascii?Q?OOLxhfq+plhzoE7VszrHEETWjPRLmDLYlVCXjmrATpAsMoU0K+ajuF1YBT2S?= =?us-ascii?Q?3aom/aOiEPVM3lriko4wWIPFqbHry5XeedGa3oQYL8V6l2YnDhsiEJbBKBV/?= =?us-ascii?Q?XG7CzMOZwqEyJ3JfZiMspbJvewks1ttf9ATAG8r1YjX8vvJR0iCnaYsWIKL8?= =?us-ascii?Q?vtvCZzCXhYTQB0bfPB8tNdi4Mj0c691Hzwg8wudWiAFLtlMAL6xB9gw25B1Q?= =?us-ascii?Q?xCzOT5dNxzSl8ewVZKQzByncCcqKEhgq46Lxz8mUL1WRf5dUaLyOnv2FYBal?= =?us-ascii?Q?LcJr46tlyvWhbp23wMNP819gtpnA0KfjR/izaZvXTqLErWjjEtZTB+SSzcxT?= =?us-ascii?Q?bbFqEDkbxYQdNHOs+FfkPYzjYl7bEev54eBRskoEG1kJeE9wqI6qcWQ9ZsSq?= =?us-ascii?Q?7/8x+nT+SINk1P3W+vlqhjkol4JfU+w+xoPQtdk8OdtJAdJotHWkNjzhPDoZ?= =?us-ascii?Q?mkfgry00Bj2CrIzEhgof1y0Ye+8IzUfdlNUB9BWOAoq564tV1bUsJTJCKa8t?= =?us-ascii?Q?eqF1Jqk0U6/OzdtDWi0rR6/IgaJIAS9USLI3YFJqkGB2eOxIfq0WRducZZlE?= =?us-ascii?Q?4Q=3D=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5013.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3b7f561d-5dbb-4b21-76ed-08dbbecb9853 X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Sep 2023 20:03:04.6168 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: BOQ/7BfaAILuNzxPtiPSvpFM2rc4GO1IDrs/m5q3xM33WF/PjxfZ/nTFR1bND7/6nvqeEkT22xF8hHcDsuvAvi8d4nHsnUiew7EOQwVtL5Q= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB6718 X-OriginatorOrg: intel.com X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Gowrishankar, > -----Original Message----- > From: Gowrishankar Muthukrishnan > Sent: Thursday, August 10, 2023 11:35 AM > To: dev@dpdk.org > Cc: anoobj@marvell.com; Akhil Goyal ; Fan Zhang > ; Ji, Kai ; Gowrishankar > Muthukrishnan > Subject: [v1 3/6] cryptodev: add hash support in asymmetric capability >=20 > Most of the asymmetric operations start with hash of the input. > Add a new field in asymmetric capability to declare support for hash oper= ations > that PMD can support for the asymmetric operations. Application can skip > computing hash if PMD already supports it. >=20 > Signed-off-by: Gowrishankar Muthukrishnan > --- > drivers/crypto/openssl/rte_openssl_pmd_ops.c | 1 + > lib/cryptodev/cryptodev_trace.h | 9 +++++++++ > lib/cryptodev/cryptodev_trace_points.c | 3 +++ > lib/cryptodev/rte_crypto_asym.h | 3 +++ > lib/cryptodev/rte_cryptodev.c | 16 ++++++++++++++++ > lib/cryptodev/rte_cryptodev.h | 19 +++++++++++++++++++ > lib/cryptodev/version.map | 1 + > 7 files changed, 52 insertions(+) >=20 > diff --git a/drivers/crypto/openssl/rte_openssl_pmd_ops.c > b/drivers/crypto/openssl/rte_openssl_pmd_ops.c > index 0f88669f41..0b3601db40 100644 > --- a/drivers/crypto/openssl/rte_openssl_pmd_ops.c > +++ b/drivers/crypto/openssl/rte_openssl_pmd_ops.c > @@ -598,6 +598,7 @@ static const struct rte_cryptodev_capabilities > openssl_pmd_capabilities[] =3D { > {.asym =3D { > .xform_capa =3D { > .xform_type =3D > RTE_CRYPTO_ASYM_XFORM_SM2, > + .hash_algos =3D (1 << RTE_CRYPTO_AUTH_SM3), > .op_types =3D > ((1< (1 << RTE_CRYPTO_ASYM_OP_VERIFY) | diff -- > git a/lib/cryptodev/cryptodev_trace.h b/lib/cryptodev/cryptodev_trace.h i= ndex > aab44af96b..935f0d564b 100644 > --- a/lib/cryptodev/cryptodev_trace.h > +++ b/lib/cryptodev/cryptodev_trace.h > @@ -520,6 +520,15 @@ RTE_TRACE_POINT( > rte_trace_point_emit_int(ret); > ) >=20 > +RTE_TRACE_POINT( > + rte_cryptodev_trace_asym_xform_capability_check_hash, > + RTE_TRACE_POINT_ARGS(uint64_t hash_algos, > + enum rte_crypto_auth_algorithm hash, int ret), > + rte_trace_point_emit_u64(hash_algos); > + rte_trace_point_emit_int(hash); > + rte_trace_point_emit_int(ret); > +) > + > RTE_TRACE_POINT( > rte_cryptodev_trace_count, > RTE_TRACE_POINT_ARGS(uint8_t nb_devs), diff --git > a/lib/cryptodev/cryptodev_trace_points.c > b/lib/cryptodev/cryptodev_trace_points.c > index e2303fdb52..8c47ab1e78 100644 > --- a/lib/cryptodev/cryptodev_trace_points.c > +++ b/lib/cryptodev/cryptodev_trace_points.c > @@ -144,6 +144,9 @@ > RTE_TRACE_POINT_REGISTER(rte_cryptodev_trace_asym_xform_capability_ch > eck_modlen, >=20 > RTE_TRACE_POINT_REGISTER(rte_cryptodev_trace_asym_xform_capability_ch > eck_optype, > lib.cryptodev.asym.xform.capability.check.optype) >=20 > +RTE_TRACE_POINT_REGISTER(rte_cryptodev_trace_asym_xform_capability_c > heck_hash, > + lib.cryptodev.asym.xform.capability.check.hash) > + > RTE_TRACE_POINT_REGISTER(rte_cryptodev_trace_sym_cpu_crypto_process, > lib.cryptodev.sym.cpu.crypto.process) >=20 > diff --git a/lib/cryptodev/rte_crypto_asym.h b/lib/cryptodev/rte_crypto_a= sym.h > index 8b5794fb7c..51f5476c6e 100644 > --- a/lib/cryptodev/rte_crypto_asym.h > +++ b/lib/cryptodev/rte_crypto_asym.h > @@ -377,6 +377,9 @@ struct rte_crypto_dsa_xform { struct > rte_crypto_ec_xform { > enum rte_crypto_curve_id curve_id; > /**< Pre-defined ec groups */ > + > + enum rte_crypto_auth_algorithm hash; [Arek] I think that session should only contain information that are consta= nt across its lifetime. Here we decided to have a curve id, but this could = be curve + key. But hash may be different for any op, additionally this xfo= rm is used for key exchange; multiplication or potentially encryption/decry= ption., which usually does not need any hash. I would have it in the op. > + /**< Hash algorithm used in EC op. */ > }; >=20 > /** > diff --git a/lib/cryptodev/rte_cryptodev.c b/lib/cryptodev/rte_cryptodev.= c index > c49d342b17..041d3074db 100644 > --- a/lib/cryptodev/rte_cryptodev.c > +++ b/lib/cryptodev/rte_cryptodev.c > @@ -718,6 +718,22 @@ rte_cryptodev_asym_xform_capability_check_modlen( > return ret; > } >=20 > +bool > +rte_cryptodev_asym_xform_capability_check_hash( > + const struct rte_cryptodev_asymmetric_xform_capability *capability, > + enum rte_crypto_auth_algorithm hash) > +{ > + bool ret =3D false; > + > + if (capability->hash_algos & (1 << hash)) > + ret =3D true; > + > + rte_cryptodev_trace_asym_xform_capability_check_hash( > + capability->hash_algos, hash, ret); > + > + return ret; > +} > + > /* spinlock for crypto device enq callbacks */ static rte_spinlock_t > rte_cryptodev_callback_lock =3D RTE_SPINLOCK_INITIALIZER; >=20 > diff --git a/lib/cryptodev/rte_cryptodev.h b/lib/cryptodev/rte_cryptodev.= h index > 64810c9ec4..536e082244 100644 > --- a/lib/cryptodev/rte_cryptodev.h > +++ b/lib/cryptodev/rte_cryptodev.h > @@ -189,6 +189,9 @@ struct rte_cryptodev_asymmetric_xform_capability { > * random value. Otherwise, PMD would internally compute the > random number. > */ > }; > + > + uint64_t hash_algos; > + /**< Bitmask of hash algorithms supported for op_type. */ > }; >=20 > /** > @@ -348,6 +351,22 @@ rte_cryptodev_asym_xform_capability_check_modlen( > const struct rte_cryptodev_asymmetric_xform_capability *capability, > uint16_t modlen); >=20 > +/** > + * Check if hash algorithm is supported. > + * > + * @param capability Asymmetric crypto capability. > + * @param hash Hash algorithm. > + * > + * @return > + * - Return true if the hash algorithm is supported. > + * - Return false if the hash algorithm is not supported. > + */ > +__rte_experimental > +bool > +rte_cryptodev_asym_xform_capability_check_hash( > + const struct rte_cryptodev_asymmetric_xform_capability *capability, > + enum rte_crypto_auth_algorithm hash); > + > /** > * Provide the cipher algorithm enum, given an algorithm string > * > diff --git a/lib/cryptodev/version.map b/lib/cryptodev/version.map index > ae8d9327b4..3c2d1780e0 100644 > --- a/lib/cryptodev/version.map > +++ b/lib/cryptodev/version.map > @@ -54,6 +54,7 @@ EXPERIMENTAL { > rte_cryptodev_asym_get_xform_enum; > rte_cryptodev_asym_session_create; > rte_cryptodev_asym_session_free; > + rte_cryptodev_asym_xform_capability_check_hash; > rte_cryptodev_asym_xform_capability_check_modlen; > rte_cryptodev_asym_xform_capability_check_optype; > rte_cryptodev_sym_cpu_crypto_process; > -- > 2.25.1