From: Zhang, Roy Fan <roy.fan.zhang@intel.com>
Sent: Thursday, December 16, 2021 4:05 PM
To: Akhil Goyal <gakhil@marvell.com>; Kusztal, ArkadiuszX <arkadiuszx.kusztal@intel.com>; Anoob Joseph <anoobj@marvell.com>
Cc: dev@dpdk.org; Ramkumar Balu <rbalu@marvell.com>
Subject: RE: [RFC] Cryptodev: use rte_crypto_vec, group big-endian constraints
Hi,
From: Akhil Goyal <gakhil@marvell.com>
Sent: Monday, December 13, 2021 9:36 AM
To: Kusztal, ArkadiuszX <arkadiuszx.kusztal@intel.com>; Anoob Joseph <anoobj@marvell.com>; Zhang, Roy Fan <roy.fan.zhang@intel.com>
Cc: dev@dpdk.org; Ramkumar Balu <rbalu@marvell.com>
Subject: RE: [RFC] Cryptodev: use rte_crypto_vec, group big-endian constraints
Hi,
since DPDK 21.11 is out, we should start discussion to make asymmetric API stable.
- Struct rte_crypto_vec vs struct rte_crypto_param_t
We have two almost identical functionally structs, one in _sym.h another in asym.h so we probably should pick one of them.
“rte_crypto_vec” additionally contains total length which will be useful information as PMD will overwrite “len” in many cases.
Unfortunately as “rte_crypto.h” includes “_sym.h” and “_asym.h” not other way around we cannot move it to “rte_crypto.h” but asymmetric will include symmetric anyway so it probably will not be that big of an issue.
[Akhil ] +1
[Fan] +1
- Network byte order
rte_crypto_param dP; /**<
/**< dP - Private CRT component
* Private CRT component of RSA parameter required for CRT method
* RSA private key operations in Octet-string network byte order
* format.
* dP = d mod ( p - 1 )
*/
We have plenty of these (sometimes in places where should not be, and not in places where should). Every member that contains this comment here is a big integer in big-endian format.
We could simplify it to:
/** Big integer in big-endian format */
typedef struct rte_crypto_vec rte_crypto_bigint;
rte_crypto_bigint dP; /**< d mod ( p - 1 ) */
ED related algorithms like (EDDSA) will use little-endian bit integers so it will have to use different approach.
[Akhil] Using different approaches for endianness may not be a good idea. Why can’t we use rte_crypto_vec for LE? It has a void * data. Right?
[Fan] Akhil, do you believe a comment before the param is enough?
[Arek] – Yes, for me it would be rte_crypto_vec for LE and rte_crypto_bigint for BE, which would correspond to what other crypto libraries propose.