From: Akhil Goyal <gakhil@marvell.com>
To: <dev@dpdk.org>
Cc: <jerinj@marvell.com>, <adwivedi@marvell.com>, <vattunuru@marvell.com>
Subject: [PATCH 2/3] net/cnxk: add MACsec capability
Date: Mon, 31 Jul 2023 09:14:46 +0530 [thread overview]
Message-ID: <20230731034447.929506-2-gakhil@marvell.com> (raw)
In-Reply-To: <20230731034447.929506-1-gakhil@marvell.com>
From: Ankur Dwivedi <adwivedi@marvell.com>
Adds the MACsec capability for CN10K-B.
The ethernet security capability structure is populated based on the
feature supported by the device.
Signed-off-by: Ankur Dwivedi <adwivedi@marvell.com>
---
drivers/common/cnxk/roc_features.h | 6 ++
drivers/common/cnxk/roc_mcs.h | 3 +
drivers/net/cnxk/cn10k_ethdev_sec.c | 120 +++++++++++++++++++++++++++-
3 files changed, 125 insertions(+), 4 deletions(-)
diff --git a/drivers/common/cnxk/roc_features.h b/drivers/common/cnxk/roc_features.h
index 815f800e7a..d5d0c0c901 100644
--- a/drivers/common/cnxk/roc_features.h
+++ b/drivers/common/cnxk/roc_features.h
@@ -71,4 +71,10 @@ roc_feature_bphy_has_macsec(void)
{
return roc_model_is_cnf10kb();
}
+
+static inline bool
+roc_feature_nix_has_inl_ipsec(void)
+{
+ return !roc_model_is_cnf10kb();
+}
#endif
diff --git a/drivers/common/cnxk/roc_mcs.h b/drivers/common/cnxk/roc_mcs.h
index afac6c92e2..602f1cae1d 100644
--- a/drivers/common/cnxk/roc_mcs.h
+++ b/drivers/common/cnxk/roc_mcs.h
@@ -7,6 +7,9 @@
#define MCS_AES_GCM_256_KEYLEN 32
+#define ROC_MCS_MAX_AR_WINSZ BIT_ULL(31)
+#define ROC_MCS_MAX_MTU (BIT_ULL(16) - 1)
+
struct roc_mcs_alloc_rsrc_req {
uint8_t rsrc_type;
uint8_t rsrc_cnt; /* Resources count */
diff --git a/drivers/net/cnxk/cn10k_ethdev_sec.c b/drivers/net/cnxk/cn10k_ethdev_sec.c
index b98fc9378e..a7473922af 100644
--- a/drivers/net/cnxk/cn10k_ethdev_sec.c
+++ b/drivers/net/cnxk/cn10k_ethdev_sec.c
@@ -303,7 +303,7 @@ static struct rte_cryptodev_capabilities cn10k_eth_sec_crypto_caps[] = {
RTE_CRYPTODEV_END_OF_CAPABILITIES_LIST()
};
-static const struct rte_security_capability cn10k_eth_sec_capabilities[] = {
+static const struct rte_security_capability cn10k_eth_sec_ipsec_capabilities[] = {
{ /* IPsec Inline Protocol ESP Tunnel Ingress */
.action = RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL,
.protocol = RTE_SECURITY_PROTOCOL_IPSEC,
@@ -401,11 +401,100 @@ static const struct rte_security_capability cn10k_eth_sec_capabilities[] = {
.crypto_capabilities = cn10k_eth_sec_crypto_caps,
.ol_flags = RTE_SECURITY_TX_OLOAD_NEED_MDATA
},
- {
- .action = RTE_SECURITY_ACTION_TYPE_NONE
- }
};
+static const struct rte_security_capability cn10k_eth_sec_macsec_capabilities[] = {
+ { /* MACsec Inline Protocol, AES-GCM-128 algo */
+ .action = RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL,
+ .protocol = RTE_SECURITY_PROTOCOL_MACSEC,
+ .macsec = {
+ .mtu = ROC_MCS_MAX_MTU,
+ .alg = RTE_SECURITY_MACSEC_ALG_GCM_128,
+ .max_nb_sc = 128,
+ .max_nb_sa = 256,
+ .max_nb_sess = 256,
+ .replay_win_sz = ROC_MCS_MAX_AR_WINSZ,
+ .relative_sectag_insert = 1,
+ .fixed_sectag_insert = 1,
+ .icv_include_da_sa = 1,
+ .ctrl_port_enable = 1,
+ .preserve_sectag = 1,
+ .preserve_icv = 1,
+ .validate_frames = 1,
+ .re_key = 1,
+ .anti_replay = 1,
+ },
+ },
+ { /* MACsec Inline Protocol, AES-GCM-256 algo */
+ .action = RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL,
+ .protocol = RTE_SECURITY_PROTOCOL_MACSEC,
+ .macsec = {
+ .mtu = ROC_MCS_MAX_MTU,
+ .alg = RTE_SECURITY_MACSEC_ALG_GCM_256,
+ .max_nb_sc = 128,
+ .max_nb_sa = 256,
+ .max_nb_sess = 256,
+ .replay_win_sz = ROC_MCS_MAX_AR_WINSZ,
+ .relative_sectag_insert = 1,
+ .fixed_sectag_insert = 1,
+ .icv_include_da_sa = 1,
+ .ctrl_port_enable = 1,
+ .preserve_sectag = 1,
+ .preserve_icv = 1,
+ .validate_frames = 1,
+ .re_key = 1,
+ .anti_replay = 1,
+ },
+ },
+ { /* MACsec Inline Protocol, AES-GCM-XPN-128 algo */
+ .action = RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL,
+ .protocol = RTE_SECURITY_PROTOCOL_MACSEC,
+ .macsec = {
+ .mtu = ROC_MCS_MAX_MTU,
+ .alg = RTE_SECURITY_MACSEC_ALG_GCM_XPN_128,
+ .max_nb_sc = 128,
+ .max_nb_sa = 256,
+ .max_nb_sess = 256,
+ .replay_win_sz = ROC_MCS_MAX_AR_WINSZ,
+ .relative_sectag_insert = 1,
+ .fixed_sectag_insert = 1,
+ .icv_include_da_sa = 1,
+ .ctrl_port_enable = 1,
+ .preserve_sectag = 1,
+ .preserve_icv = 1,
+ .validate_frames = 1,
+ .re_key = 1,
+ .anti_replay = 1,
+ },
+ },
+ { /* MACsec Inline Protocol, AES-GCM-XPN-256 algo */
+ .action = RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL,
+ .protocol = RTE_SECURITY_PROTOCOL_MACSEC,
+ .macsec = {
+ .mtu = ROC_MCS_MAX_MTU,
+ .alg = RTE_SECURITY_MACSEC_ALG_GCM_XPN_256,
+ .max_nb_sc = 128,
+ .max_nb_sa = 256,
+ .max_nb_sess = 256,
+ .replay_win_sz = ROC_MCS_MAX_AR_WINSZ,
+ .relative_sectag_insert = 1,
+ .fixed_sectag_insert = 1,
+ .icv_include_da_sa = 1,
+ .ctrl_port_enable = 1,
+ .preserve_sectag = 1,
+ .preserve_icv = 1,
+ .validate_frames = 1,
+ .re_key = 1,
+ .anti_replay = 1,
+ },
+ },
+};
+
+#define SEC_CAPS_LEN (RTE_DIM(cn10k_eth_sec_ipsec_capabilities) + \
+ RTE_DIM(cn10k_eth_sec_macsec_capabilities) + 1)
+
+static struct rte_security_capability cn10k_eth_sec_capabilities[SEC_CAPS_LEN];
+
static inline void
cnxk_pktmbuf_free_no_cache(struct rte_mbuf *mbuf)
{
@@ -1093,15 +1182,38 @@ cn10k_eth_sec_session_stats_get(void *device, struct rte_security_session *sess,
return 0;
}
+static void
+eth_sec_caps_add(struct rte_security_capability eth_sec_caps[], uint32_t *idx,
+ const struct rte_security_capability *caps, uint32_t nb_caps)
+{
+ PLT_VERIFY(*idx + nb_caps < SEC_CAPS_LEN);
+
+ rte_memcpy(ð_sec_caps[*idx], caps, nb_caps * sizeof(caps[0]));
+ *idx += nb_caps;
+}
+
void
cn10k_eth_sec_ops_override(void)
{
static int init_once;
+ uint32_t idx = 0;
if (init_once)
return;
init_once = 1;
+ if (roc_feature_nix_has_inl_ipsec())
+ eth_sec_caps_add(cn10k_eth_sec_capabilities, &idx,
+ cn10k_eth_sec_ipsec_capabilities,
+ RTE_DIM(cn10k_eth_sec_ipsec_capabilities));
+
+ if (roc_feature_nix_has_macsec())
+ eth_sec_caps_add(cn10k_eth_sec_capabilities, &idx,
+ cn10k_eth_sec_macsec_capabilities,
+ RTE_DIM(cn10k_eth_sec_macsec_capabilities));
+
+ cn10k_eth_sec_capabilities[idx].action = RTE_SECURITY_ACTION_TYPE_NONE;
+
/* Update platform specific ops */
cnxk_eth_sec_ops.macsec_sa_create = cnxk_eth_macsec_sa_create;
cnxk_eth_sec_ops.macsec_sc_create = cnxk_eth_macsec_sc_create;
--
2.25.1
next prev parent reply other threads:[~2023-07-31 3:45 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-07-31 3:44 [PATCH 1/3] security: add MACsec algo in capability index Akhil Goyal
2023-07-31 3:44 ` Akhil Goyal [this message]
2023-07-31 3:44 ` [PATCH 3/3] test/security: add capability verification for MACsec Akhil Goyal
2023-09-19 13:54 ` [PATCH v2 0/3] MACsec capability verification Akhil Goyal
2023-09-19 13:54 ` [PATCH v2 1/3] security: add MACsec algo in capability index Akhil Goyal
2023-09-19 13:54 ` [PATCH v2 2/3] net/cnxk: add MACsec capability Akhil Goyal
2023-09-19 13:54 ` [PATCH v2 3/3] test/security: add capability verification for MACsec Akhil Goyal
2023-09-19 19:17 ` [PATCH v2 0/3] MACsec capability verification Akhil Goyal
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230731034447.929506-2-gakhil@marvell.com \
--to=gakhil@marvell.com \
--cc=adwivedi@marvell.com \
--cc=dev@dpdk.org \
--cc=jerinj@marvell.com \
--cc=vattunuru@marvell.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).