From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id D98A442C44; Tue, 6 Jun 2023 22:01:19 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 8BB174067B; Tue, 6 Jun 2023 22:01:19 +0200 (CEST) Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mails.dpdk.org (Postfix) with ESMTP id 5358D40223 for ; Tue, 6 Jun 2023 22:01:17 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1686081677; x=1717617677; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=PV40aCt4h9fScOECR75dC4d1qCs4SOTc/G4P9JU4DLU=; b=gPHe4txDq9fV76EJwLbAMpx09AekWwnyDMH3ZzksivghfDM/5IZVIxFI jXbli0Qv74JteV3YaKma1GmWpMDrmHYzDxjCmcrn54MtF29HCGvv4PLBr SdGeMJP11XQp/DQ6tVCVegp0t3jHhbIXLikXent4QqF19NhEJhu6JX/qz zPGLrarboUo0xQqpVBKJbCOUAyudupreu4Y+CtnSqF8iZro1PpuyqGzR3 DhrwSTb0IjY8515ZslTGkHAC6Wd/4Kl2eZSJRCgnF9LuS0YHZS9rKOxw9 zr4N6xkyno19c3mlNIjorlbDNKDtTKBtp7i+3gFTRb6ZkuNnPsbEQ2V48 Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10733"; a="360109163" X-IronPort-AV: E=Sophos;i="6.00,221,1681196400"; d="scan'208";a="360109163" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Jun 2023 13:01:16 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10733"; a="686664536" X-IronPort-AV: E=Sophos;i="6.00,221,1681196400"; d="scan'208";a="686664536" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga006.jf.intel.com with ESMTP; 06 Jun 2023 13:01:16 -0700 Received: from orsmsx612.amr.corp.intel.com (10.22.229.25) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Tue, 6 Jun 2023 13:01:16 -0700 Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX612.amr.corp.intel.com (10.22.229.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Tue, 6 Jun 2023 13:01:15 -0700 Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23 via Frontend Transport; Tue, 6 Jun 2023 13:01:15 -0700 Received: from NAM02-DM3-obe.outbound.protection.outlook.com (104.47.56.42) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.23; Tue, 6 Jun 2023 13:01:14 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=W1CZCyViHhTQfbbXTSPMyv8mBmcCeP74ZjhVdPcgKhvsNoVDrcENZtRxrwVyMllc+HIOc4ir4iC6ctsyrFZQVMbSLlSiySnFrw8ngY3S1qGGNDJxkh/gRSfYnX5bwYbJm40arS/t2GZYAdZf+/5vxfGl03tPMTRGPf6XP7tLYadCEd2zGQUTyKouMY3dkKLerX/sHtnrC/rKuceuj6KuGrQeBaoRXl2aonC7QSS+vsJjujuVr/5hEceDiJNFhlVbb3+UzpiFSG8j0QKZRV+9dv2mrF076YBgNh9FdqBQpkEpqCMnguYZ2v+uRw2Ed+y+9Lq3qTBuDZA/PV5qgFyY7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cQzwwDojlDZEYfC516Ku+772TlyR2NwyS1RTzNO4TaE=; b=HEOaLAttkYyjgHBLxeXJSdHwJWOthwDAO3MrJP16V2XFV+08wE4qTbOrfa47LtnyrhPCv+0pnVJDByvjL6+aNLop8/fb1guRZCsfYghNOcm1raUIQpN5XMHToV5soE3CevYqkviebxV01SBnZSkjeXYXtjY6VSujAhURWKOE2l5WMEKp8zH0DR+iW7VL3296aE0Xgiz2Sh9vADEX+1/z+7k2goq0yhp/fMQNpMvomNZKhizSY9lESaFVnRP6BeDNbuFOeRPt8n23tMZLBcU6sxVnBEYW2cieYORUi7em6HwP4+oY0J8niQLWs+yWvfTgt3iH+BicIG2I6fxIfGauWA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from PH0PR11MB5013.namprd11.prod.outlook.com (2603:10b6:510:30::21) by SN7PR11MB6602.namprd11.prod.outlook.com (2603:10b6:806:272::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6455.33; Tue, 6 Jun 2023 20:01:12 +0000 Received: from PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::fcef:c262:ba36:c42f]) by PH0PR11MB5013.namprd11.prod.outlook.com ([fe80::fcef:c262:ba36:c42f%4]) with mapi id 15.20.6455.030; Tue, 6 Jun 2023 20:01:11 +0000 From: "Kusztal, ArkadiuszX" To: Gowrishankar Muthukrishnan , "dev@dpdk.org" CC: "anoobj@marvell.com" , Akhil Goyal , Fan Zhang , "Ji, Kai" Subject: RE: [PATCH v3 1/3] cryptodev: add SM2 asymmetric crypto algorithm Thread-Topic: [PATCH v3 1/3] cryptodev: add SM2 asymmetric crypto algorithm Thread-Index: AQHZlsj6f7hZOzsh302meBW20Jtlp69+LY3Q Date: Tue, 6 Jun 2023 20:01:11 +0000 Message-ID: References: <87bbd8b9642bf20513448c3747f9e6f28eef0561.1685870993.git.gmuthukrishn@marvell.com> In-Reply-To: <87bbd8b9642bf20513448c3747f9e6f28eef0561.1685870993.git.gmuthukrishn@marvell.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PH0PR11MB5013:EE_|SN7PR11MB6602:EE_ x-ms-office365-filtering-correlation-id: 27fa3880-ad14-4107-136f-08db66c8c68b x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB5013.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(396003)(366004)(39860400002)(346002)(376002)(136003)(451199021)(316002)(41300700001)(38070700005)(478600001)(55016003)(2906002)(33656002)(8936002)(76116006)(66476007)(64756008)(66946007)(66446008)(5660300002)(66556008)(86362001)(122000001)(38100700002)(52536014)(82960400001)(4326008)(8676002)(7696005)(110136005)(54906003)(186003)(966005)(71200400001)(83380400001)(53546011)(26005)(9686003)(6506007)(107886003); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?j+dDkddOer786MZpxDImGGtfSw+UnFEEqioqIikrspALicM5Pztj5J5h18BJ?= =?us-ascii?Q?pZgOzkiQHRdk6IHv/Jyn0ZDsq+vqgI7QeWPvAt2MwCmRdb4rS4UXwwyvp2wE?= =?us-ascii?Q?wuvAXZP7MX3jRO2Y6OpgWFTzRvuipcNOrg4sFRDB3OxJkOrGBwjN/3W7OQ+o?= =?us-ascii?Q?hLuwYNViDfMoAxyy8vtJCO+vXSvRW2n1v++xMZZnlYikuPB8hxFlpsSR7Xu1?= =?us-ascii?Q?NtpK8Q5CQXtqf3k1eS27dLzKTUB2Xs/Ei0AnAzh8xmBasEwn1T3RmsKWEUYx?= =?us-ascii?Q?4geGFhzzMVEySodGug8e4mNakXguF3CuUbyQ6OUBNXC2hK90l/6ukFeZQKD5?= =?us-ascii?Q?pE4kJMofdrsKl9FC6bzcbyIaNVMh7Rf6aQAXhKiRRb7jNz4Mz1KLonz72KA0?= =?us-ascii?Q?+PX43IIGAqXddJgBDrZSY4tdaW80W1vybS7W3Z7YDluYgVMDTez350e/hdZW?= =?us-ascii?Q?7TEdWylAUBKWRS9di20dqQiqop5P0r3ZgKd1W77pXw8GmzNtRvFVnxc4MDcf?= =?us-ascii?Q?j5YJ7cvPOXRAD7Nzn76ImokG1ILj1NcnjtUFBQ18VZfXki87NiZNCHj3fGgx?= =?us-ascii?Q?Y789ujO1XRFTcmkRR3KreeDiUK0D4JUH5Tefxl0+7KAj/6lkanPbqmAVXLK1?= =?us-ascii?Q?qJOqPW/MMFE8Sn1FvEx/jVVDfD78azqvcnDGgGOBr/MNUwjMjxjqwWntyLFF?= =?us-ascii?Q?3AzDj+l1vrruXsGJHF36ndu/2AKflhOjSIQlfX9e1Zdwt0UqkgYo+hAVdonW?= =?us-ascii?Q?GPyQvVzT9TRkmKBmaV/v8fKk5Q4o0p55tCKogh4VjC0sgnv0JTtuYgP/08QD?= =?us-ascii?Q?2KaOK3SkZPdfMb7oHQy1/Qv6G0iP6O8Daqs40IcYrUZqen1wOczlyqwCjp0T?= =?us-ascii?Q?e0Fz0XM6RIwHshwuw6LSDXW1imMe0BQ1uFyiWBsxdQflHs4L1NvxQr3xifSR?= =?us-ascii?Q?evB2hjIxv8rvTdMHBKr8p9yraxadPnvwoza7YZ04iaoW4m7DhKZQX4CXL9HQ?= =?us-ascii?Q?4Z1LE9FciintrdZoh6y/wL60jcpr8+yVXRm08tQGV0L9QDe71vnE2+Mto+vo?= =?us-ascii?Q?Arg8nfRGOA9VsX+TbD4GeQ0mtYb7r7ROvGxysjPgy7l/5ErDGABD0mzqszqC?= =?us-ascii?Q?vLn8292PcAy4XvBOKjE6zJXlcd8IouRTDpJo1R6P8QfsT8oqAvtgS6ZbANFQ?= =?us-ascii?Q?et1b8NK5elcyDK2o6YGXMMhsoiZ8vgWJrxiwJLasezeUU+6CoDePbaZ4MWpo?= =?us-ascii?Q?pUl6yy2lWUo+lP/sHOr/bX1eGI34p83JTn3XOIoLPBvMk4ZLG/WEJRhZSe8I?= =?us-ascii?Q?IzD+mHEsRVm+WKg1oVykEENs/KkoKa3Wkqme8K38cgGKEYDh+4nm9YzZJCRR?= =?us-ascii?Q?eyNNZG0cP1miBFzkMy7XKow9qsc47yre4RwekrYmIO8pyHPIGZ50E7B/3wAf?= =?us-ascii?Q?ORZfx+28Wi49RAGftIEE3AykpDtzPzgigQRAv8hEquXlUppDjm14Auuduk2l?= =?us-ascii?Q?qFdBSSbHTOWZuiqplwD2heLG91JY7uax4QMrAw+uPpPa2Yt6An8JXyo6aVCM?= =?us-ascii?Q?MCvZOhWg7Aq2SxSdNido7UxFvHaTMimlAMSml0bdGyNiqg8J91jLuCMVfL6w?= =?us-ascii?Q?5Q=3D=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5013.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 27fa3880-ad14-4107-136f-08db66c8c68b X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jun 2023 20:01:11.3187 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: g3Q7bFQJ+8Ahl/XOY4RPx1CkJJXoabw4suC2qCNZMVMUqxqOqnCxthAT4vgAkvHU91lCJGAa2VpYb1HdDYOAS/yNPNi0Z4tYcGMjh4IfT4g= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR11MB6602 X-OriginatorOrg: intel.com X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Acked-by: Arek Kusztal Some things will need to be changed before the next release (few of them I = described below), but I will ack it. Especially that other algorithms have = similar issues. > -----Original Message----- > From: Gowrishankar Muthukrishnan > Sent: Sunday, June 4, 2023 11:43 AM > To: dev@dpdk.org > Cc: anoobj@marvell.com; Akhil Goyal ; Kusztal, > ArkadiuszX ; Fan Zhang > ; Ji, Kai ; Gowrishankar > Muthukrishnan > Subject: [PATCH v3 1/3] cryptodev: add SM2 asymmetric crypto algorithm >=20 > ShangMi 2 (SM2) is set of public-key cryptography algorithms based on ell= iptic > curves. >=20 > Added support for asymmetric SM2 in cryptodev along with prime field curv= e, as > referenced in RFC: > https://datatracker.ietf.org/doc/html/draft-shen-sm2-ecdsa-02 >=20 > Signed-off-by: Gowrishankar Muthukrishnan > --- > doc/guides/cryptodevs/features/default.ini | 1 + > doc/guides/rel_notes/release_23_07.rst | 5 ++ > lib/cryptodev/rte_crypto_asym.h | 87 ++++++++++++++++++++++ > lib/cryptodev/rte_cryptodev.c | 1 + > 4 files changed, 94 insertions(+) >=20 > diff --git a/doc/guides/cryptodevs/features/default.ini > b/doc/guides/cryptodevs/features/default.ini > index 523da0cfa8..a69967bb9e 100644 > --- a/doc/guides/cryptodevs/features/default.ini > +++ b/doc/guides/cryptodevs/features/default.ini > @@ -125,6 +125,7 @@ Diffie-hellman =3D > ECDSA =3D > ECPM =3D > ECDH =3D > +SM2 =3D >=20 > ; > ; Supported Operating systems of a default crypto driver. > diff --git a/doc/guides/rel_notes/release_23_07.rst > b/doc/guides/rel_notes/release_23_07.rst > index a9b1293689..8b8e69d619 100644 > --- a/doc/guides/rel_notes/release_23_07.rst > +++ b/doc/guides/rel_notes/release_23_07.rst > @@ -55,6 +55,11 @@ New Features > Also, make sure to start the actual text at the margin. > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D >=20 > +* **Added SM2 asymmetric algorithm in cryptodev.** > + > + Added support for ShamMi 2 (SM2) asymmetric crypto algorithm along > + with prime field curve support. > + >=20 > Removed Items > ------------- > diff --git a/lib/cryptodev/rte_crypto_asym.h b/lib/cryptodev/rte_crypto_a= sym.h > index 989f38323f..ab0b4abea7 100644 > --- a/lib/cryptodev/rte_crypto_asym.h > +++ b/lib/cryptodev/rte_crypto_asym.h > @@ -119,6 +119,11 @@ enum rte_crypto_asym_xform_type { > /**< Elliptic Curve Point Multiplication */ > RTE_CRYPTO_ASYM_XFORM_ECFPM, > /**< Elliptic Curve Fixed Point Multiplication */ > + RTE_CRYPTO_ASYM_XFORM_SM2, > + /**< ShangMi 2 > + * Performs Encrypt, Decrypt, Sign and Verify. > + * Refer to rte_crypto_asym_op_type. > + */ > RTE_CRYPTO_ASYM_XFORM_TYPE_LIST_END > /**< End of list */ > }; > @@ -382,6 +387,17 @@ struct rte_crypto_ec_xform { > /**< Pre-defined ec groups */ > }; >=20 > +/** > + * Asymmetric SM2 transform data > + * > + * Structure describing SM2 xform params > + * > + */ > +struct rte_crypto_sm2_xform { > + enum rte_crypto_auth_algorithm hash; > + /**< Hash algorithm used in SM2 op. */ }; > + > /** > * Operations params for modular operations: > * exponentiation and multiplicative inverse @@ -637,9 +653,79 @@ struct > rte_crypto_asym_xform { > /**< EC xform parameters, used by elliptic curve based > * operations. > */ > + > + struct rte_crypto_sm2_xform sm2; > + /**< SM2 xform parameters */ > }; > }; >=20 > +/** > + * SM2 operation params > + */ > +struct rte_crypto_sm2_op_param { > + enum rte_crypto_asym_op_type op_type; > + /**< Signature generation or verification */ > + > + rte_crypto_uint pkey; > + /**< Private key for encryption or sign generation */ > + > + struct rte_crypto_ec_point q; > + /**< Public key for decryption or verification */ > + > + rte_crypto_param message; > + /**< > + * Pointer to input data > + * - to be encrypted for SM2 public encrypt. > + * - to be signed for SM2 sign generation. > + * - to be authenticated for SM2 sign verification. > + * This repeats problems known to dsa/ecdsa. What will work on OpenSSL PMD wil= l not work on the HW. Ironically, test will pass for both... We can extend this before the next release. > + * Pointer to output data > + * - for SM2 private decrypt. > + * In this case the underlying array should have been > + * allocated with enough memory to hold plaintext output > + * (at least encrypted text length). The message.length field > + * will be overwritten by the PMD with the decrypted length. > + */ > + > + rte_crypto_param cipher; > + /**< > + * Pointer to input data > + * - to be decrypted for SM2 private decrypt. > + * > + * Pointer to output data > + * - for SM2 public encrypt. > + * In this case the underlying array should have been allocated > + * with enough memory to hold ciphertext output (at least X bytes > + * for prime field curve of N bytes and for message M bytes, > + * where X =3D (C1 + C2 + C3) and computed based on SM2 RFC as > + * C1 (1 + N + N), C2 =3D M, C3 =3D N. The cipher.length field will > + * be overwritten by the PMD with the encrypted length. > + */ I thought it was concatenation, not addition. > + > + rte_crypto_uint id; > + /**< The SM2 id used by signer and verifier and is in interval (1, > +n-1). */ Where does the (1,n-1) limitation comes from? As it is a hashed prefix, sho= uld it have any mathematical interpretation at all? > + > + rte_crypto_uint k; > + /**< The SM2 per-message secret number, which is an integer > + * in the interval (1, n-1). > + * If the random number is generated by the PMD, > + * the 'rte_crypto_param.data' parameter should be set to NULL. > + */ > + > + rte_crypto_uint r; > + /**< r component of elliptic curve signature > + * output : for signature generation (of at least N bytes > + * where prime field length is N bytes) > + * input : for signature verification > + */ > + rte_crypto_uint s; > + /**< s component of elliptic curve signature > + * output : for signature generation (of at least N bytes > + * where prime field length is N bytes) > + * input : for signature verification > + */ > +}; > + > /** > * Asymmetric Cryptographic Operation. > * > @@ -665,6 +751,7 @@ struct rte_crypto_asym_op { > struct rte_crypto_dsa_op_param dsa; > struct rte_crypto_ecdsa_op_param ecdsa; > struct rte_crypto_ecpm_op_param ecpm; > + struct rte_crypto_sm2_op_param sm2; > }; > uint16_t flags; > /**< > diff --git a/lib/cryptodev/rte_cryptodev.c b/lib/cryptodev/rte_cryptodev.= c index > a96114b2da..21cabc3ffd 100644 > --- a/lib/cryptodev/rte_cryptodev.c > +++ b/lib/cryptodev/rte_cryptodev.c > @@ -299,6 +299,7 @@ crypto_asym_xform_strings[] =3D { > [RTE_CRYPTO_ASYM_XFORM_DSA] =3D "dsa", > [RTE_CRYPTO_ASYM_XFORM_ECDSA] =3D "ecdsa", > [RTE_CRYPTO_ASYM_XFORM_ECPM] =3D "ecpm", > + [RTE_CRYPTO_ASYM_XFORM_SM2] =3D "sm2", > }; >=20 > /** > -- > 2.25.1