From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 87309A0547; Wed, 8 Sep 2021 14:52:00 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id DB38B41213; Wed, 8 Sep 2021 14:51:54 +0200 (CEST) Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80057.outbound.protection.outlook.com [40.107.8.57]) by mails.dpdk.org (Postfix) with ESMTP id BBB364120F for ; Wed, 8 Sep 2021 14:51:52 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c4U+wc4ONiBQV3VhDtHAiLZsqzHFqcHt93DPxzRHGV5b5ChHqhz2n9BK6gq5gCo8tBowgSc589ux92HwF8WgariYNAjYSakhrc9GQukR463zKnv4WL0qItFM0YG4+3AYqct4VaXqhFAHO5fZ6FFqkvJweE6dEOl07FBLfTvNruoMjE7PAkRBkfbW7ZF8UVw8GKc7fiIyzXaKH2i68Fi91cyiN9Sr07CdwYlWy6nJ8rx50wXy7tl7z9ETG4x6SQKRn7Va3fWJalbfsD/Jq6J/EaDNfOmT2hrTQQerxFDZzga8eKP0akUGBC1wEU+wGnDCh3y1eJZWLRKkX26vPRqXdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=l54jMJ+R6Zx9mKAjXnvf5/oWFNs176HATRN56MxaXQs=; b=Nb9l+0ZWyTPZfShRyzQtrEnhEkXqZU9Zz8o7cJCAymqDxMPVOtAszDOGAuCDo0qiAMgB/e0k4ImT9rEg/YXLa/iZnsrMi1M/OBA16zPIEm/dqgS1HCi+ZzVGi8wK729YX7L49/CRD6WN/5u21ZW6kM7N/Et2dnu+Tq6snFmMffZ+ntGkEvLPSHDHs3+o2TMXOfEWgW5Vv4unX3l8hXk5ddkjm5y0LvkGMe2FXeob2H9UEfxs/qYd1l7cZUJ8TqWtEx/vLnYveinPgatkknIcpnU/fUMTE/8seL3KxBAUgQubLuUXKk4b8kXG34fUA3NBGpRD/Df3zKFCfmHlfHG77w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l54jMJ+R6Zx9mKAjXnvf5/oWFNs176HATRN56MxaXQs=; b=FET7yqanO7VYuWHaFr4O6xDNyBnzLXlFo4eMD624Rw8LwTnbhZLnSyP8pGpiHLmrJBTS+T2kRUiPk8kIOXChIX2rhbXc3MhbQVTX8art2JoJxuu45Y5yJWI5Pc/DCVCmPPF8y8wuBT1iIIujxI81rMv9EeyY1OOzB3EzVX1Jrdg= Authentication-Results: marvell.com; dkim=none (message not signed) header.d=none;marvell.com; dmarc=none action=none header.from=nxp.com; Received: from VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) by VI1PR04MB3024.eurprd04.prod.outlook.com (2603:10a6:802:d::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.24; Wed, 8 Sep 2021 12:51:51 +0000 Received: from VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7]) by VI1PR04MB6960.eurprd04.prod.outlook.com ([fe80::d496:fcce:f667:7aa7%8]) with mapi id 15.20.4500.015; Wed, 8 Sep 2021 12:51:51 +0000 From: Gagandeep Singh To: gakhil@marvell.com, dev@dpdk.org Cc: thomas@monjalon.net, Hemant Agrawal , Gagandeep Singh Date: Wed, 8 Sep 2021 18:21:24 +0530 Message-Id: <20210908125127.3566886-3-g.singh@nxp.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210908125127.3566886-1-g.singh@nxp.com> References: <20210908120115.3548009-2-g.singh@nxp.com> <20210908125127.3566886-1-g.singh@nxp.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: SG2PR03CA0144.apcprd03.prod.outlook.com (2603:1096:4:c8::17) To VI1PR04MB6960.eurprd04.prod.outlook.com (2603:10a6:803:12d::10) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from lsv03457.swis.in-blr01.nxp.com (14.142.151.118) by SG2PR03CA0144.apcprd03.prod.outlook.com (2603:1096:4:c8::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14 via Frontend Transport; Wed, 8 Sep 2021 12:51:49 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 555d1703-3d29-4a58-1c3c-08d972c76d6e X-MS-TrafficTypeDiagnostic: VI1PR04MB3024: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:3276; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: nDT0l2BQZaOXD0OVd0ue6bhTkj7Gs4Z43j5SA3BsjE9QZ+hv8sFWhsNcwP27s5fv42jmF/v4pBiIU3f8F7RTkEPjRt07sP2ZdOC6zhObaLbIQ79fDh16JpQNINI0/HQPDeiwwZcCiQAkNWbt4jhuk+XxvlQSYv1F298MjL/KolzJvgJj9T4f7E5HqJeIoE/d9mYd6bftkvFStvqBoCNrCGaPYv/gwWTpQEUkOeehyRX687iWyuspkZbTKaBkER+4fFx3x+SOLav65haALhGNoJXFvPfg4ubSyYv6lUN9bNtww9xnP8gKN5m/TTcZnU/mFESdmCf6EdTayKDH4m3h66YutQCTVFEwjiqUnu4akskmsXcBethO7bQxDqKRAtz4pG/TqE0hfeF4dTQLKDcKxH9cGkrD15np/sqGWhtbJo1jQUBNbLgp8uy/1gtDrTuPo+Mjc4csJ57avREpZBM5AHFQlm2T1gh+MB+I9yusUHpqq6t55cW2MAo0xYurE4gX/csEr7y3N/1wj4EnIuPZobD+17EZ08ryFKDlKcIJZ0VPRhFbnyPC6YMIT3fiyGCpwz38Z3k8lfgzjWxZXx9AUH69zPPcZj2yxNSlADwcwBL+hwZNDSRfwWCuURALs4hU3PJiuEKxvyeFZuxVyiWB6K8/QuYONZoeitFhQ7E9shmZFNMIAv5Y7hGJhkn0r/H164/0/FjXOkQiM7nxTSYfoOW+8K978PJhBcRPum7xX34= X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR04MB6960.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(376002)(396003)(346002)(366004)(136003)(38350700002)(5660300002)(8676002)(38100700002)(55236004)(66556008)(66946007)(186003)(478600001)(52116002)(7696005)(1076003)(26005)(316002)(66476007)(8936002)(1006002)(6666004)(36756003)(86362001)(2906002)(4326008)(6486002)(956004)(15650500001)(54906003)(83380400001)(2616005)(110426009); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?8l/zLGGGhGqx/I/SgEToLVfa62JyDPb5rbdTU5nNUDK5k4Dzc/euo2NEaRld?= =?us-ascii?Q?LRbGKRxNCh1m9ccKrd4WdKcLUOv9TFqa1RDJTVtVQc495K8L/OH5v30xYfoT?= =?us-ascii?Q?w3F7IX9Ka+YL86ep+w3SjdsIYjBwYTft9ncrYNSPo1xfDXkC0ZcPOwBMSmuy?= =?us-ascii?Q?sybKa+A48NliYMJcoQW0uemRRoCXwCv9m5fzML3a9mR17k/0XIJ0ew0jqqI3?= =?us-ascii?Q?poGm1JfbGi5nXxYFVXYgiMWz1TnSbYLl4i8qHTHIWXD1tcek3/auCU2hoHHD?= =?us-ascii?Q?zP7qNCuZbnfs1pn3HU2GZFptSSWebUPkXMVhsshOt5SynLfkv53Yh1RrKd7+?= =?us-ascii?Q?lq83zAlrQyYPVGcM0kvMnYNzbVHiD1Tt7vLkzRHTpEymsNF3xeeRMoVR59Pi?= =?us-ascii?Q?Xl3+tFnTyT6v6qsCgb3Cx94P5zzxq1+wbOubnlEPDKeyXXdXEcit46Si6Ym+?= =?us-ascii?Q?urcII25vRh9VwisIyevlNt8W2R9+m+JAhLZvwz20DfLWOoDQDNsJfj11AJaZ?= =?us-ascii?Q?A8MqVFq3+VvSp1lOE8SJ84ZTE9+P1fFq+PyNzDfxDGEm88mI4OcvjK77Euoe?= =?us-ascii?Q?qs2u2zxFplMFQqN+ra6uBHfE1Fqx1LLe4C6OdL/pW+KOmY59as0dykRQXdu4?= =?us-ascii?Q?tBt5+Qa6Xe7zwDCeljnCBeQnHuuFgExd35LsZr3IUZOCqudVMaglw1p2L903?= =?us-ascii?Q?LxpRaE6mHtPeO5Dz8H3Xldyk9cDK9f9X7OOl/zxDjY9GepYW4o9M8tvzGK3x?= =?us-ascii?Q?/D9lwWF5X/QT3Yr2LP0EILWtaUFG0doguY9eJmPHQIWpnxnw/NQ1eqzBgJGX?= =?us-ascii?Q?wFj2H5HnyvftoiS0Hjw2QTxhPKjDi/uzcmiBgbBjPaL9VaUnFat3N1xrEv19?= =?us-ascii?Q?w58/K6b7foeGvmK5zpAFXvnYOeQoePetooFh//FnE6ggyjxPtVMPF9us55ee?= =?us-ascii?Q?4V0V09o+UVR6aI/+Afmja8Wek2PRiaxbH2YCMV5syg6DYB9xn+LewNDTSjNl?= =?us-ascii?Q?owvLemyJeDzzLMGy9VUww+s2/ADdnNVBxelXp/EU1eJFRODgLHIbETXAPAT8?= =?us-ascii?Q?Xammns6oRbSumyJtxWPLAgnGhuZQb6U+i1ZetG5dBFSt+dYXZAz9jPGxWd+Z?= =?us-ascii?Q?tpb/tUASOeCepY7lXxT5kc+aKFMkpTfbKhjPVwsm6n4pZO5pzKx8lSJr+yP5?= =?us-ascii?Q?9p66hVaE5uGzGqYrwqpgD/VymD2tGLLzLhPqnv5p+Huwch0kdbPZOMRyyPus?= =?us-ascii?Q?cC6I6a+lOQYmMO21qW40MW8fd9X/IxO8N1yG8V3WfpanzY0ePLlJmAoArsc1?= =?us-ascii?Q?cb5QrdugTy142SfSvlXbhBqo?= X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 555d1703-3d29-4a58-1c3c-08d972c76d6e X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB6960.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Sep 2021 12:51:51.3629 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: /6KNtFDc9O6soxVlPVbYbTrLuWoR0TIkvfxFpXqb3fyUUUgaQmnpVNApnvYYNZ5U X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB3024 Subject: [dpdk-dev] [PATCH v4 2/5] security: add pdcp short MAC-I support X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Hemant Agrawal This patch add support to handle PDCP short MAC-I domain along with standard control and data domains as it has to be treaty as special case with PDCP protocol offload support. ShortMAC-I is the 16 least significant bits of calculated MAC-I. Usually when a RRC message is exchanged between UE and eNodeB it is integrity & ciphered protected. MAC-I = f(key, varShortMAC-I, count, bearer, direction). Here varShortMAC-I is prepared by using (current cellId, pci of source cell and C-RNTI of old cell). Other parameters like count, bearer and direction set to all 1. Signed-off-by: Gagandeep Singh Signed-off-by: Hemant Agrawal --- app/test-crypto-perf/cperf_options_parsing.c | 8 +++++++- doc/guides/prog_guide/rte_security.rst | 11 ++++++++++- doc/guides/tools/cryptoperf.rst | 2 +- lib/security/rte_security.h | 1 + 4 files changed, 19 insertions(+), 3 deletions(-) diff --git a/app/test-crypto-perf/cperf_options_parsing.c b/app/test-crypto-perf/cperf_options_parsing.c index e84f56cfaa..0348972c85 100644 --- a/app/test-crypto-perf/cperf_options_parsing.c +++ b/app/test-crypto-perf/cperf_options_parsing.c @@ -662,7 +662,8 @@ parse_pdcp_sn_sz(struct cperf_options *opts, const char *arg) const char *cperf_pdcp_domain_strs[] = { [RTE_SECURITY_PDCP_MODE_CONTROL] = "control", - [RTE_SECURITY_PDCP_MODE_DATA] = "data" + [RTE_SECURITY_PDCP_MODE_DATA] = "data", + [RTE_SECURITY_PDCP_MODE_SHORT_MAC] = "short_mac" }; static int @@ -677,6 +678,11 @@ parse_pdcp_domain(struct cperf_options *opts, const char *arg) cperf_pdcp_domain_strs [RTE_SECURITY_PDCP_MODE_DATA], RTE_SECURITY_PDCP_MODE_DATA + }, + { + cperf_pdcp_domain_strs + [RTE_SECURITY_PDCP_MODE_SHORT_MAC], + RTE_SECURITY_PDCP_MODE_SHORT_MAC } }; diff --git a/doc/guides/prog_guide/rte_security.rst b/doc/guides/prog_guide/rte_security.rst index f72bc8a78f..ad92c16868 100644 --- a/doc/guides/prog_guide/rte_security.rst +++ b/doc/guides/prog_guide/rte_security.rst @@ -1,5 +1,5 @@ .. SPDX-License-Identifier: BSD-3-Clause - Copyright 2017,2020 NXP + Copyright 2017,2020-2021 NXP @@ -408,6 +408,15 @@ PMD which supports the IPsec and PDCP protocol. }, .crypto_capabilities = pmd_capabilities }, + { /* PDCP Lookaside Protocol offload short MAC-I */ + .action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL, + .protocol = RTE_SECURITY_PROTOCOL_PDCP, + .pdcp = { + .domain = RTE_SECURITY_PDCP_MODE_SHORT_MAC, + .capa_flags = 0 + }, + .crypto_capabilities = pmd_capabilities + }, { .action = RTE_SECURITY_ACTION_TYPE_NONE } diff --git a/doc/guides/tools/cryptoperf.rst b/doc/guides/tools/cryptoperf.rst index be3109054d..9a7b990596 100644 --- a/doc/guides/tools/cryptoperf.rst +++ b/doc/guides/tools/cryptoperf.rst @@ -318,7 +318,7 @@ The following are the application command-line options: * ``--pdcp-domain `` - Set PDCP domain to specify Control/user plane. + Set PDCP domain to specify short_mac/control/user plane. * ``--docsis-hdr-sz `` diff --git a/lib/security/rte_security.h b/lib/security/rte_security.h index 88d31de0a6..2e136d7929 100644 --- a/lib/security/rte_security.h +++ b/lib/security/rte_security.h @@ -233,6 +233,7 @@ struct rte_security_macsec_xform { enum rte_security_pdcp_domain { RTE_SECURITY_PDCP_MODE_CONTROL, /**< PDCP control plane */ RTE_SECURITY_PDCP_MODE_DATA, /**< PDCP data plane */ + RTE_SECURITY_PDCP_MODE_SHORT_MAC, /**< PDCP short mac */ }; /** PDCP Frame direction */ -- 2.25.1