From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on0044.outbound.protection.outlook.com [104.47.40.44]) by dpdk.org (Postfix) with ESMTP id 8F9B5567F for ; Fri, 12 May 2017 16:35:47 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=BRSJOhKNMfXXOrLOjXLYRJOxCHpt4es6DhS/VAc2JuY=; b=MGuFdhUE1ozbNrNv24vT+B2ytFSUI+tHCsq3JQhv190dgkeg7hsjHvbQn1iPbaDHRkvAhMPPHmvC0RK7bgSjlqYDBFL2Sr9lp1IV2we94QqiWCOXCTZQ5yaES2OBRk6GPB8TX5ViW2OIUT8G5vFXsN4/fuoPrBsIAJOH5RROZjs= Authentication-Results: tuxdriver.com; dkim=none (message not signed) header.d=none;tuxdriver.com; dmarc=none action=none header.from=caviumnetworks.com; Received: from ukw0rk.in.caveonetworks.com (14.140.2.178) by MWHPR07MB2767.namprd07.prod.outlook.com (10.169.237.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1084.16; Fri, 12 May 2017 14:35:42 +0000 Date: Fri, 12 May 2017 20:05:20 +0530 From: Umesh Kartha To: Neil Horman Cc: dev@dpdk.org, Jerin Jacob , Balasubramanian Manoharan , Ram Kumar , Murthy Nidadavolu , declan.doherty@intel.com, pablo.de.lara.guarch@intel.com, Fiona Trahe Message-ID: <20170512143519.GA1041@ukw0rk.in.caveonetworks.com> References: <1490177802-13398-1-git-send-email-Umesh.Kartha@caviumnetworks.com> <1494506132-23107-1-git-send-email-Umesh.Kartha@caviumnetworks.com> <20170512121557.GA12366@hmswarspite.think-freely.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170512121557.GA12366@hmswarspite.think-freely.org> User-Agent: Mutt/1.5.21 (2010-09-15) X-Originating-IP: [14.140.2.178] X-ClientProxiedBy: BM1PR01CA0103.INDPRD01.PROD.OUTLOOK.COM (10.174.208.19) To MWHPR07MB2767.namprd07.prod.outlook.com (10.169.237.15) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: cdfc4005-9622-40d2-63da-08d499442c7a X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(201703131423075)(201703031133081); SRVR:MWHPR07MB2767; X-Microsoft-Exchange-Diagnostics: 1; MWHPR07MB2767; 3:GyGUUtGiYUwM7I5oFUFa1L6/uJZylX4ReK4S/FPilFJ+4QGGkHIjfAM0LbK/OQKTP2/Kxg7b4xsKHuOOBg+143VPqrZoVdknPAKMLvehLzsJSLmSNxKf90fwBcmkL0cMOh67lfHZQGbWH7fMybxjU3K+SFrx7B3EGwg3/gaU3dkulOrj1IJETlnqC7GDrQ8FoGI9uB+QnQXfv6I7QtEAWVHCf880JdZoutNP42QGHB5CzzXx3xxCOlS+2qBI7aCQKGORnUiO7B7QEP2yv+Mqxx9W+1TW2syHHoztsZsxxOVDpO29sHSjOQF7jPj/NHA6Hekv8guDI+d5gkuX0k3/zQ==; 25:4JFQPiWmwzMWtkQ/dMwi7pTQQutQMPXUigrAf7nt7YX9bHWuWxpoax1z78SoJ3D9pEmDyNcGNpGewNEhNekVCsT8wviX+k1b+gO3DhZnI+SqSHnRXHE62VXs5v2TRz58IeQVJ74gJ+ufb2SkNiUf3/Bcc0vxz41V9B+QutJV7zlA9TJCgKXOAWnC8UU7RE/BIZIjYjSrAYbTOio7/cfqbxwXJgqKLE4pNi66i9Stf52W6+CieaeE+i5JwuAglO7tCtZEwQ6ieJ9xVxaK1Xn3bBlumyO/4BkEZvW7tEPJGbybsa+EJfMkhbyK5Ua0r0FSs1Xo6B01bwhqO4YfE/YsGgJTKeHVnK9Hmv8whdMgZdvZz2fVbhpVEZRXQaHs2FsNqjF9RAmqs6e7KcMZfnfha9UbECStOyDGRGwDlKudbWz2ZnnVm881sTmnxJhKEDCqp5nccoDnBSNnZwhVu9+yQEezlMt57oz3wr0RK27lh3s= X-Microsoft-Exchange-Diagnostics: 1; MWHPR07MB2767; 31:j/qq+bSnI4mnPpz+BVRFYcWgotAe/uLQK+SGBzgqbAIRg/j7c25/T9V9gCcuuC+JJmfUKCU428tl/mGFhg0Glxbx7Px/T4LbHO6FNHc8NljLJ1wMBCBtYAz9qtTkde7TjE74dCka5zro1u2Vbm/1bs9IhBek0DVkDUZ0TSCyxZRNidrnFoMV/YlguzFQpPgkhxTJey46NMlw1Xe3VOvkjAhTzKqJr7w+T0I96lNaH9s=; 20:4srdTIiNo76p/ftW+wwHuxvkwjn8ZyoTanr/LkYgaUOHMo965CYrr5Ky8FR0axHJl4n0IzZWTWWyjLTEwuy6vbepXaU3s4oS5hoIIS2cUqBLs9cVCRt2PkdvyfRLnOTIiYsyptaKDG3kWGLW6UHss0rlJT3sDmZ2tDO0X8AggBl29udvewdun51hSUe0oID5mw1GNXJKTVQ1ffuxppXxUBgAnPrIK0S01XH2b5fqnTK0QRcorNiB4BdFbpc8xTTcHlh2mVdSuk1Qg9NrZVW59q7Bq2x6dj8+q8oku/cqZWlNCHSNy6am4qaNniGgu3ieWT+6o+uCIdwezXNgmQiqFdtRcPnoqdNyv+HvMgysD65kIob9z1hZwVafEPkTBWEJOJxkSYefZLQFDmogj8bkPF4HWbT6Zl9PApl8Rdc3jnkB4mBFDxM62jXWnA2j1pq83bHLLh5ACyCAYgqO1j0c2aA8kS1jYCWVIDJVtdwnjjanYwihBHJEzhXJ24l5gfIegiXhDSZUoKbewtq1dmSqMJu50kIYgVdg1FsUXvtySf8XYXL1NzrjarlvQpb302CItWGy5HKRtZSpMonCVXm6/TNTB/vO+WGT/6Zo2pMQ6VQ= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(5005006)(8121501046)(10201501046)(93006095)(3002001)(6041248)(20161123564025)(20161123558100)(20161123555025)(20161123562025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(6072148); SRVR:MWHPR07MB2767; BCL:0; PCL:0; RULEID:; SRVR:MWHPR07MB2767; X-Microsoft-Exchange-Diagnostics: 1; MWHPR07MB2767; 4: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 X-Forefront-PRVS: 0305463112 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39400400002)(39450400003)(39840400002)(39410400002)(39850400002)(24454002)(81166006)(9686003)(8676002)(55016002)(5009440100003)(83506001)(6506006)(33656002)(47776003)(6306002)(25786009)(66066001)(54906002)(42186005)(1076002)(229853002)(189998001)(5660300001)(76176999)(50986999)(54356999)(4001350100001)(53936002)(72206003)(2950100002)(6666003)(42882006)(6916009)(6246003)(50466002)(110136004)(966004)(23726003)(305945005)(3846002)(7736002)(2906002)(6116002)(38730400002)(53376002)(4326008)(478600001)(110426004)(18370500001)(217873001); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR07MB2767; H:ukw0rk.in.caveonetworks.com; FPR:; SPF:None; MLV:nov; PTR:InfoNoRecords; LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; MWHPR07MB2767; 23:blGQAhF+sBZcYmOPk+HAf8r4eXb/U6ts03+30KGZy?= =?us-ascii?Q?HNyIFKqWydZoiNBGpZFkJ6dnW9//NbAQrK6iQTM4JMzpMNgFJD8SRYy8N+OA?= =?us-ascii?Q?ZZ6EdYJBZp6nscf+GedL3iDC8lAK1uH1SJdOMeVnnt4GLh3re8myFN5EqjDg?= =?us-ascii?Q?UQ6IXg6oewaE7BcvqvXEHPu0jnnPU64hRi26Xgri2Rgt0tfIEiFHvgAg19oD?= =?us-ascii?Q?hXn6G5AiYYvZX1f8GF7XkrzVLVKnGJhdKHWX6HxwFCmGAVqHtfU+GvIXASGP?= =?us-ascii?Q?LLCqnL/iHRlRMQOQXp3Uj3thu6qKNGwdCWiuNW0Qw+rEWe9AJuyozr2L5FEs?= =?us-ascii?Q?RRkfNFfB03i/8r1XZ572wREGLxnF01WODkJPzdFb0RqHNN1Nr8q0DNUSN+xt?= =?us-ascii?Q?9R9MKz/rk8rvQRAJneCeLUwq+lnmI0fT+6CaNLf95LzV5hEO/3IvSLylO55X?= =?us-ascii?Q?91jDBy0MAFa86QSR6WE2z7Fi12SoiVVW+0RrNdsBrR726o6GneIqWWRuSwJQ?= =?us-ascii?Q?c8Pn8xH8L1Up03mlm8jU0V+QBQNSnrNr29PEQAKlTACY3xVuCaIl+21OnjRn?= =?us-ascii?Q?JbtC1tjqryK9YG7MXRnAeR+Kesk8CFFI8N4iCbV76uvAZIgVST0QN++wCjtU?= =?us-ascii?Q?r0FcKJN51fkMYSg01uAeujLBRB+fCZwsenVriYrBjEP9ddutUnJpK69zbKhh?= =?us-ascii?Q?+ax/1S3wmscAVw7OKfjrroRc7QFRdzrhUqWEYI5YrvvSlUdnnkrDdSauvTIc?= =?us-ascii?Q?evZEHfH+ooXaq2K2x9/7sWwQurgwzMW+XKjzFJRgstBnT+GjjApicpYu796a?= =?us-ascii?Q?QUZg7R9cCR+txGk1XJ4yfD2SHow60CvFXeIDHJ9qSgfEzbjg4wF8vZbqg4Lw?= =?us-ascii?Q?qvoatZhzojKdMikAC+msaMktQCoDnrQeA7Mc2NkuCXbPUWEHqsbqQp3CV+Ww?= =?us-ascii?Q?9dTXkSHpNjbdmwMdgu+tCi5/iXgGF7J41qMUirxcA6xyz85KTz1vIs5THQIG?= =?us-ascii?Q?gwY9MxtW7cYfTLKSM08056b2bYIMXfPLnwQSFO/90nMz86c24EkmH4nzOelK?= =?us-ascii?Q?9VaFbZxLmYfUFpi5OpRGEjoh0HYFKfTkeUvZicjvKbeG01eZskmo6z48BRjr?= =?us-ascii?Q?gPyeRpfBtgDoTgYkGPxkEpS0hRX6z0pP/qJvIIaz7VgMQ20s3YlwO8dj9nq3?= =?us-ascii?Q?9RN1I17A0OUblO/45L4Gu97uAP3DDqAMXP/F5S7DKBpb1F/WORv3AARm650t?= =?us-ascii?Q?kc6Jz/G9Ce8Rblk3Exz3AHww2bThbM+ATcxRe9lKPOCNYicUluFdcgmeh2np?= =?us-ascii?Q?h9SLY6iN4TffaBj2dob4WM=3D?= X-Microsoft-Exchange-Diagnostics: 1; MWHPR07MB2767; 6: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; 5:M7/mGxuDk8P+e07yLPrOYhmA84fazt67spMn2FlCFHnb6DiQw+dwn5iNf+t+DaVuGSyhiN/4qRwJYlEuf+6o8APxugS/n6RAvkHMXpGnS6/ZDp5C/LY7skQ+Fx/15R3ab1hIpIKOp1fAEILP/qcvKg==; 24:ZPI2Irb5pVHtot02JAAr+OdX0EuyWJ2F1proXUBJzvkIRd2zYXUEonzcUggDpcS6GZvYiupevDU2Tl6F3RsMdRX7XdXNBIOhKqt1HDe2UAQ= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; MWHPR07MB2767; 7:U6PEth1zZtToVIO32U5D8O6yaWyflS8G35UHsTM3MIPL7//aR7pRwEdIIRXMd7teBLy3LXP7q1O1P8FExYG1A0D5KnIe9OjoLLlBdc5bn+7pWmBdOBl6aThNkbVbYnrrA+CGzf+Riji0sCVjssoVMG0+JlINF1fLXB582RC7qBLBRo0yyFRJV0CW6ZGDWcZx4jlGEOGhNJZODdcKk0cJ1UZ7do15JsZJLvTsgc49rO22w9jFbY1GU80ZEmnZ8GA51HsyLiIbqlF9z3iLV/+oZXKZE+8ryfKnYgFjaLWDs375oOhpBAb4ad63k0btEUldS1Noz64BCNIT29omQiVaYA== X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 May 2017 14:35:42.0853 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR07MB2767 Subject: Re: [dpdk-dev] [RFC PATCH v2 0/3] specifications for asymmetric crypto algorithms X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 12 May 2017 14:35:48 -0000 Hi Neil, On Fri, May 12, 2017 at 08:15:57AM -0400, Neil Horman wrote: > On Thu, May 11, 2017 at 06:05:29PM +0530, Umesh Kartha wrote: > > This RFC contains specifications for asymmetric crypto algorithms. > > Asymmetric crypto algorithms are essential part of protocols such as > > SSL/TLS. As the current DPDK crypto library lacks support for asymmetric > > crypto algorithms, this RFC is an attempt to address it. > > > > Cavium offers PCI hardware accelerators that supports symmetric and > > asymmetric crypto algorithms, of which a few are addressed in this RFC. > > Once specifications are agreed upon, I can submit a patch for the same. > > We will develop a poll mode driver which can offload to OpenSSL crypto > > library and to Cavium crypto accelerator. > > > > The asymmetric crypto algorithms supported in this version are: > > > This all appears to modify the cryptodev api, but I don't see where said > modification was announced. > > Additionally, I don't see modifications to a map file to export the api symbols. > Have you tested this in a shared library build? > > Neil > This is just an RFC for asymmetric crypto operation specifications. The specifications are not finalised. Once the specifications are finalised, support for asymmetric algorithms will be added to OpenSSL PMD. > > 1 RSA > > - RSA Sign > > - RSA Verify > > - RSA Public Encrypt > > - RSA Private Decrypt > > > > Padding schemes supported for RSA operations are > > * RSA PKCS#1 BT1 > > * RSA PKCS#1 BT2 > > * RSA PKCS#1 OAEP > > * RSA PKCS#1 PSS > > > > 2 DH > > - DH generate key > > - DH compute key > > > > 3 ECDH > > - ECDH generate key > > - ECDH check key > > - ECDH compute key > > > > 4 DSA > > - DSA Sign > > - DSA Verify > > > > 5 ECDSA > > - ECDSA Sign > > - ECDSA Verify > > > > 6 MODEXP > > > > 7 FUNDAMENTAL ECC > > - Point Addition > > - Point Multiplication > > - Point Doubling > > > > 8 MODULAR INVERSE > > > > > > Asymmetric crypto transform operations support both session oriented > > mode and session less mode. If the operation is sessionless, an > > asymmetric crypto transform structure, containing immutable parameters, > > is passed along with per-operation mutable parameters in the structure. > > Specific structures were written to contain immutable parameters > > depending on algorithm used for crypto transform operation. The > > parameters and type of transform is distinguished by the algorithm for > > which the transform structure is filled. For a particular asymmetric > > algorithm, not all parameters will be used and hence not required to be > > filled. > > > > Changes from RFC v1: > > > > Added additional algorithms : DH/ECDH/MODINVERSE/DSA > > Added additional curves for ECC operations: All cuves supported by libcrypto. > > As per the comments received for RFC v1: > > - removed mbufs from asymmetric crypto operation structure. > > - added separate queue pair in device structure to handle asymmetric crypto > > operations. > > - added APIs to start/stop/initialize queue pairs to handle asymmetric crypto > > operations. > > - added asymmetric session structure and related APIs to handle session > > operations (initialize/allocate/free) etc. > > > > RFC v1: http://dpdk.org/ml/archives/dev/2017-March/060869.html > > > > Umesh Kartha (3): > > cryptodev: added asymmetric algorithms > > cryptodev: asymmetric algorithm capability definitions > > cryptodev: added asym queue pair, session apis > > > > lib/librte_cryptodev/rte_crypto.h | 135 +++- > > lib/librte_cryptodev/rte_crypto_asym.h | 1124 ++++++++++++++++++++++++++++++ > > lib/librte_cryptodev/rte_cryptodev.c | 782 ++++++++++++++++++++- > > lib/librte_cryptodev/rte_cryptodev.h | 414 +++++++++++ > > lib/librte_cryptodev/rte_cryptodev_pmd.h | 113 +++ > > 5 files changed, 2564 insertions(+), 4 deletions(-) > > create mode 100644 lib/librte_cryptodev/rte_crypto_asym.h > > > > -- > > 1.8.3.1 > > > > Regards, Umesh