Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/93818/?format=api
http://patches.dpdk.org/api/patches/93818/?format=api", "web_url": "http://patches.dpdk.org/project/dpdk/patch/1622652221-22732-11-git-send-email-anoobj@marvell.com/", "project": { "id": 1, "url": "http://patches.dpdk.org/api/projects/1/?format=api", "name": "DPDK", "link_name": "dpdk", "list_id": "dev.dpdk.org", "list_email": "dev@dpdk.org", "web_url": "http://core.dpdk.org", "scm_url": "git://dpdk.org/dpdk", "webscm_url": "http://git.dpdk.org/dpdk", "list_archive_url": "https://inbox.dpdk.org/dev", "list_archive_url_format": "https://inbox.dpdk.org/dev/{}", "commit_url_format": "" }, "msgid": "<1622652221-22732-11-git-send-email-anoobj@marvell.com>", "list_archive_url": "https://inbox.dpdk.org/dev/1622652221-22732-11-git-send-email-anoobj@marvell.com", "date": "2021-06-02T16:43:31", "name": "[10/20] crypto/cnxk: add auth operation in session", "commit_ref": null, "pull_url": null, "state": "superseded", "archived": true, "hash": "4747cdcd815feea740329f27779a4400a570847f", "submitter": { "id": 1205, "url": "http://patches.dpdk.org/api/people/1205/?format=api", "name": "Anoob Joseph", "email": "anoobj@marvell.com" }, "delegate": { "id": 6690, "url": "http://patches.dpdk.org/api/users/6690/?format=api", "username": "akhil", "first_name": "akhil", "last_name": "goyal", "email": "gakhil@marvell.com" }, "mbox": "http://patches.dpdk.org/project/dpdk/patch/1622652221-22732-11-git-send-email-anoobj@marvell.com/mbox/", "series": [ { "id": 17213, "url": "http://patches.dpdk.org/api/series/17213/?format=api", "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=17213", "date": "2021-06-02T16:43:21", "name": "Add Marvell CNXK crypto PMDs", "version": 1, "mbox": "http://patches.dpdk.org/series/17213/mbox/" } ], "comments": "http://patches.dpdk.org/api/patches/93818/comments/", "check": "success", "checks": "http://patches.dpdk.org/api/patches/93818/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dev-bounces@dpdk.org>", "X-Original-To": "patchwork@inbox.dpdk.org", "Delivered-To": "patchwork@inbox.dpdk.org", "Received": [ "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 94113A0524;\n\tWed, 2 Jun 2021 18:45:38 +0200 (CEST)", "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 22334410E0;\n\tWed, 2 Jun 2021 18:45:07 +0200 (CEST)", "from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com\n [67.231.148.174])\n by mails.dpdk.org (Postfix) with ESMTP id 4376E410D7\n for <dev@dpdk.org>; Wed, 2 Jun 2021 18:45:05 +0200 (CEST)", "from pps.filterd (m0045849.ppops.net [127.0.0.1])\n by mx0a-0016f401.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id\n 152Gaseb016164; Wed, 2 Jun 2021 09:45:04 -0700", "from dc5-exch01.marvell.com ([199.233.59.181])\n by mx0a-0016f401.pphosted.com with ESMTP id 38wug73v60-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT);\n Wed, 02 Jun 2021 09:45:04 -0700", "from DC5-EXCH01.marvell.com (10.69.176.38) by DC5-EXCH01.marvell.com\n (10.69.176.38) with Microsoft SMTP Server (TLS) id 15.0.1497.2;\n Wed, 2 Jun 2021 09:45:02 -0700", "from maili.marvell.com (10.69.176.80) by DC5-EXCH01.marvell.com\n (10.69.176.38) with Microsoft SMTP Server id 15.0.1497.2 via Frontend\n Transport; Wed, 2 Jun 2021 09:45:02 -0700", "from HY-LT1002.marvell.com (unknown [10.193.70.1])\n by maili.marvell.com (Postfix) with ESMTP id 733A63F7041;\n Wed, 2 Jun 2021 09:44:56 -0700 (PDT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com;\n h=from : to : cc :\n subject : date : message-id : in-reply-to : references : mime-version :\n content-transfer-encoding : content-type; s=pfpt0220;\n bh=O07zY0OmQv55hEo2VOciZT+EaHdvlzu2gueRux9JHPA=;\n b=Xi4clyPJNb0vOXZ+uBjuYExL16deZ+OpJc3WmXfCOhhAC4yx3a0Il2nHD/dayVxNg5lw\n tHaK+K14OWVcZgt2j9YEvf6vB52jol+Ba8/oQFaPunJInmgteuokDOipbjb7kkpiHcFl\n 2iiNDJbS2pT52T+jwIakg2Ag5VI3ZvuHCB6GwKU5/h//k+VGNdUaF16IiyHjfKYSUa0k\n CbDM82BUfEa5oIpFCae5hh9ArgOJG2G2h5uGx/7+O2ul1+d+9M/tBvT6IMSCCjcHD3Hg\n 4dCCSj8690mnRSWLWrEkS+tbit7Mi8sXC3tR1lwqDeUHP3CByFk66gcxEs62hDnFhqu6 bA==", "From": "Anoob Joseph <anoobj@marvell.com>", "To": "Akhil Goyal <gakhil@marvell.com>, Thomas Monjalon <thomas@monjalon.net>", "CC": "Anoob Joseph <anoobj@marvell.com>, Jerin Jacob <jerinj@marvell.com>,\n \"Ankur Dwivedi\" <adwivedi@marvell.com>, Tejasree Kondoj\n <ktejasree@marvell.com>, <dev@dpdk.org>, Archana Muniganti\n <marchana@marvell.com>", "Date": "Wed, 2 Jun 2021 22:13:31 +0530", "Message-ID": "<1622652221-22732-11-git-send-email-anoobj@marvell.com>", "X-Mailer": "git-send-email 2.7.4", "In-Reply-To": "<1622652221-22732-1-git-send-email-anoobj@marvell.com>", "References": "<1622652221-22732-1-git-send-email-anoobj@marvell.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-Proofpoint-ORIG-GUID": "_wpyUvqyTOuF_tH9aMnMiD5Bntmxgf3N", "X-Proofpoint-GUID": "_wpyUvqyTOuF_tH9aMnMiD5Bntmxgf3N", "X-Proofpoint-Virus-Version": "vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761\n definitions=2021-06-02_09:2021-06-02,\n 2021-06-02 signatures=0", "Subject": "[dpdk-dev] [PATCH 10/20] crypto/cnxk: add auth operation in session", "X-BeenThere": "dev@dpdk.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "DPDK patches and discussions <dev.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dev/>", "List-Post": "<mailto:dev@dpdk.org>", "List-Help": "<mailto:dev-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>", "Errors-To": "dev-bounces@dpdk.org", "Sender": "\"dev\" <dev-bounces@dpdk.org>" }, "content": "Add support for auth operations in session.\n\nSigned-off-by: Ankur Dwivedi <adwivedi@marvell.com>\nSigned-off-by: Anoob Joseph <anoobj@marvell.com>\nSigned-off-by: Archana Muniganti <marchana@marvell.com>\nSigned-off-by: Tejasree Kondoj <ktejasree@marvell.com>\n---\n drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 13 ++\n drivers/crypto/cnxk/cnxk_se.h | 283 +++++++++++++++++++++++++++++++\n 2 files changed, 296 insertions(+)", "diff": "diff --git a/drivers/crypto/cnxk/cnxk_cryptodev_ops.c b/drivers/crypto/cnxk/cnxk_cryptodev_ops.c\nindex 4e29396..f060763 100644\n--- a/drivers/crypto/cnxk/cnxk_cryptodev_ops.c\n+++ b/drivers/crypto/cnxk/cnxk_cryptodev_ops.c\n@@ -444,6 +444,12 @@ sym_session_configure(struct roc_cpt *roc_cpt, int driver_id,\n \tcase CNXK_CPT_CIPHER:\n \t\tret = fill_sess_cipher(xform, sess_priv);\n \t\tbreak;\n+\tcase CNXK_CPT_AUTH:\n+\t\tif (xform->auth.algo == RTE_CRYPTO_AUTH_AES_GMAC)\n+\t\t\tret = fill_sess_gmac(xform, sess_priv);\n+\t\telse\n+\t\t\tret = fill_sess_auth(xform, sess_priv);\n+\t\tbreak;\n \tdefault:\n \t\tret = -1;\n \t}\n@@ -451,6 +457,13 @@ sym_session_configure(struct roc_cpt *roc_cpt, int driver_id,\n \tif (ret)\n \t\tgoto priv_put;\n \n+\tif ((sess_priv->roc_se_ctx.fc_type == ROC_SE_HASH_HMAC) &&\n+\t cpt_mac_len_verify(&xform->auth)) {\n+\t\tCPT_LOG_DP_ERR(\"MAC length is not supported\");\n+\t\tret = -ENOTSUP;\n+\t\tgoto priv_put;\n+\t}\n+\n \tsess_priv->cpt_inst_w7 = cnxk_cpt_inst_w7_get(sess_priv, roc_cpt);\n \n \tset_sym_session_private_data(sess, driver_id, sess_priv);\ndiff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk_se.h\nindex f14016c..2f406f6 100644\n--- a/drivers/crypto/cnxk/cnxk_se.h\n+++ b/drivers/crypto/cnxk/cnxk_se.h\n@@ -46,6 +46,47 @@ gen_key_snow3g(const uint8_t *ck, uint32_t *keyx)\n \t}\n }\n \n+static __rte_always_inline int\n+cpt_mac_len_verify(struct rte_crypto_auth_xform *auth)\n+{\n+\tuint16_t mac_len = auth->digest_length;\n+\tint ret;\n+\n+\tswitch (auth->algo) {\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n+\t\tret = (mac_len == 16) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n+\t\tret = (mac_len == 20) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\t\tret = (mac_len == 28) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n+\t\tret = (mac_len == 32) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n+\t\tret = (mac_len == 48) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n+\t\tret = (mac_len == 64) ? 0 : -1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_NULL:\n+\t\tret = 0;\n+\t\tbreak;\n+\tdefault:\n+\t\tret = -1;\n+\t}\n+\n+\treturn ret;\n+}\n+\n static __rte_always_inline void\n cpt_fc_salt_update(struct roc_se_ctx *se_ctx, uint8_t *salt)\n {\n@@ -308,6 +349,95 @@ cpt_fc_ciph_set_key(struct roc_se_ctx *se_ctx, roc_se_cipher_type type,\n }\n \n static __rte_always_inline int\n+cpt_fc_auth_set_key(struct roc_se_ctx *se_ctx, roc_se_auth_type type,\n+\t\t const uint8_t *key, uint16_t key_len, uint16_t mac_len)\n+{\n+\tstruct roc_se_zuc_snow3g_ctx *zs_ctx;\n+\tstruct roc_se_kasumi_ctx *k_ctx;\n+\tstruct roc_se_context *fctx;\n+\n+\tif (se_ctx == NULL)\n+\t\treturn -1;\n+\n+\tzs_ctx = &se_ctx->se_ctx.zs_ctx;\n+\tk_ctx = &se_ctx->se_ctx.k_ctx;\n+\tfctx = &se_ctx->se_ctx.fctx;\n+\n+\tif ((type >= ROC_SE_ZUC_EIA3) && (type <= ROC_SE_KASUMI_F9_ECB)) {\n+\t\tuint32_t keyx[4];\n+\n+\t\tif (key_len != 16)\n+\t\t\treturn -1;\n+\t\t/* No support for AEAD yet */\n+\t\tif (se_ctx->enc_cipher)\n+\t\t\treturn -1;\n+\t\t/* For ZUC/SNOW3G/Kasumi */\n+\t\tswitch (type) {\n+\t\tcase ROC_SE_SNOW3G_UIA2:\n+\t\t\tse_ctx->pdcp_alg_type = ROC_SE_PDCP_ALG_TYPE_SNOW3G;\n+\t\t\tgen_key_snow3g(key, keyx);\n+\t\t\tmemcpy(zs_ctx->ci_key, keyx, key_len);\n+\t\t\tse_ctx->fc_type = ROC_SE_PDCP;\n+\t\t\tse_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase ROC_SE_ZUC_EIA3:\n+\t\t\tse_ctx->pdcp_alg_type = ROC_SE_PDCP_ALG_TYPE_ZUC;\n+\t\t\tmemcpy(zs_ctx->ci_key, key, key_len);\n+\t\t\tmemcpy(zs_ctx->zuc_const, zuc_d, 32);\n+\t\t\tse_ctx->fc_type = ROC_SE_PDCP;\n+\t\t\tse_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase ROC_SE_KASUMI_F9_ECB:\n+\t\t\t/* Kasumi ECB mode */\n+\t\t\tse_ctx->k_ecb = 1;\n+\t\t\tmemcpy(k_ctx->ci_key, key, key_len);\n+\t\t\tse_ctx->fc_type = ROC_SE_KASUMI;\n+\t\t\tse_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tcase ROC_SE_KASUMI_F9_CBC:\n+\t\t\tmemcpy(k_ctx->ci_key, key, key_len);\n+\t\t\tse_ctx->fc_type = ROC_SE_KASUMI;\n+\t\t\tse_ctx->zsk_flags = 0x1;\n+\t\t\tbreak;\n+\t\tdefault:\n+\t\t\treturn -1;\n+\t\t}\n+\t\tse_ctx->mac_len = 4;\n+\t\tse_ctx->hash_type = type;\n+\t\treturn 0;\n+\t}\n+\n+\tif (!(se_ctx->fc_type == ROC_SE_FC_GEN && !type)) {\n+\t\tif (!se_ctx->fc_type || !se_ctx->enc_cipher)\n+\t\t\tse_ctx->fc_type = ROC_SE_HASH_HMAC;\n+\t}\n+\n+\tif (se_ctx->fc_type == ROC_SE_FC_GEN && key_len > 64)\n+\t\treturn -1;\n+\n+\t/* For GMAC auth, cipher must be NULL */\n+\tif (type == ROC_SE_GMAC_TYPE)\n+\t\tfctx->enc.enc_cipher = 0;\n+\n+\tfctx->enc.hash_type = se_ctx->hash_type = type;\n+\tfctx->enc.mac_len = se_ctx->mac_len = mac_len;\n+\n+\tif (key_len) {\n+\t\tse_ctx->hmac = 1;\n+\t\tmemset(se_ctx->auth_key, 0, sizeof(se_ctx->auth_key));\n+\t\tmemcpy(se_ctx->auth_key, key, key_len);\n+\t\tse_ctx->auth_key_len = key_len;\n+\t\tmemset(fctx->hmac.ipad, 0, sizeof(fctx->hmac.ipad));\n+\t\tmemset(fctx->hmac.opad, 0, sizeof(fctx->hmac.opad));\n+\n+\t\tif (key_len <= 64)\n+\t\t\tmemcpy(fctx->hmac.opad, key, key_len);\n+\t\tfctx->enc.auth_input_type = 1;\n+\t}\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n fill_sess_cipher(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)\n {\n \tstruct rte_crypto_cipher_xform *c_form;\n@@ -414,4 +544,157 @@ fill_sess_cipher(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)\n \n \treturn 0;\n }\n+\n+static __rte_always_inline int\n+fill_sess_auth(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\troc_se_auth_type auth_type = 0; /* NULL Auth type */\n+\tuint8_t zsk_flag = 0, aes_gcm = 0, is_null = 0;\n+\n+\tif (xform->next != NULL &&\n+\t xform->next->type == RTE_CRYPTO_SYM_XFORM_CIPHER &&\n+\t xform->next->cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {\n+\t\t/* Perform auth followed by encryption */\n+\t\tsess->roc_se_ctx.template_w4.s.opcode_minor =\n+\t\t\tROC_SE_FC_MINOR_OP_HMAC_FIRST;\n+\t}\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= ROC_SE_OP_AUTH_VERIFY;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= ROC_SE_OP_AUTH_GENERATE;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown auth operation\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_SHA1_HMAC:\n+\t\t/* Fall through */\n+\tcase RTE_CRYPTO_AUTH_SHA1:\n+\t\tauth_type = ROC_SE_SHA1_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA256_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA256:\n+\t\tauth_type = ROC_SE_SHA2_SHA256;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA512_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA512:\n+\t\tauth_type = ROC_SE_SHA2_SHA512;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tauth_type = ROC_SE_GMAC_TYPE;\n+\t\taes_gcm = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA224_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA224:\n+\t\tauth_type = ROC_SE_SHA2_SHA224;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SHA384_HMAC:\n+\tcase RTE_CRYPTO_AUTH_SHA384:\n+\t\tauth_type = ROC_SE_SHA2_SHA384;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_MD5_HMAC:\n+\tcase RTE_CRYPTO_AUTH_MD5:\n+\t\tauth_type = ROC_SE_MD5_TYPE;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_KASUMI_F9:\n+\t\tauth_type = ROC_SE_KASUMI_F9_ECB;\n+\t\t/*\n+\t\t * Indicate that direction needs to be taken out\n+\t\t * from end of src\n+\t\t */\n+\t\tzsk_flag = ROC_SE_K_F9;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_SNOW3G_UIA2:\n+\t\tauth_type = ROC_SE_SNOW3G_UIA2;\n+\t\tzsk_flag = ROC_SE_ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_ZUC_EIA3:\n+\t\tauth_type = ROC_SE_ZUC_EIA3;\n+\t\tzsk_flag = ROC_SE_ZS_IA;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_NULL:\n+\t\tauth_type = 0;\n+\t\tis_null = 1;\n+\t\tbreak;\n+\tcase RTE_CRYPTO_AUTH_AES_XCBC_MAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CMAC:\n+\tcase RTE_CRYPTO_AUTH_AES_CBC_MAC:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Unsupported hash algo %u\",\n+\t\t\t a_form->algo);\n+\t\treturn -1;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined Hash algo %u specified\",\n+\t\t\t a_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = zsk_flag;\n+\tsess->aes_gcm = aes_gcm;\n+\tsess->mac_len = a_form->digest_length;\n+\tsess->is_null = is_null;\n+\tif (zsk_flag) {\n+\t\tsess->auth_iv_offset = a_form->iv.offset;\n+\t\tsess->auth_iv_length = a_form->iv.length;\n+\t}\n+\tif (unlikely(cpt_fc_auth_set_key(&sess->roc_se_ctx, auth_type,\n+\t\t\t\t\t a_form->key.data, a_form->key.length,\n+\t\t\t\t\t a_form->digest_length)))\n+\t\treturn -1;\n+\n+\treturn 0;\n+}\n+\n+static __rte_always_inline int\n+fill_sess_gmac(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)\n+{\n+\tstruct rte_crypto_auth_xform *a_form;\n+\troc_se_cipher_type enc_type = 0; /* NULL Cipher type */\n+\troc_se_auth_type auth_type = 0;\t /* NULL Auth type */\n+\n+\ta_form = &xform->auth;\n+\n+\tif (a_form->op == RTE_CRYPTO_AUTH_OP_GENERATE)\n+\t\tsess->cpt_op |= ROC_SE_OP_ENCODE;\n+\telse if (a_form->op == RTE_CRYPTO_AUTH_OP_VERIFY)\n+\t\tsess->cpt_op |= ROC_SE_OP_DECODE;\n+\telse {\n+\t\tCPT_LOG_DP_ERR(\"Unknown auth operation\");\n+\t\treturn -1;\n+\t}\n+\n+\tswitch (a_form->algo) {\n+\tcase RTE_CRYPTO_AUTH_AES_GMAC:\n+\t\tenc_type = ROC_SE_AES_GCM;\n+\t\tauth_type = ROC_SE_GMAC_TYPE;\n+\t\tbreak;\n+\tdefault:\n+\t\tCPT_LOG_DP_ERR(\"Crypto: Undefined cipher algo %u specified\",\n+\t\t\t a_form->algo);\n+\t\treturn -1;\n+\t}\n+\n+\tsess->zsk_flag = 0;\n+\tsess->aes_gcm = 0;\n+\tsess->is_gmac = 1;\n+\tsess->iv_offset = a_form->iv.offset;\n+\tsess->iv_length = a_form->iv.length;\n+\tsess->mac_len = a_form->digest_length;\n+\n+\tif (unlikely(cpt_fc_ciph_set_key(&sess->roc_se_ctx, enc_type,\n+\t\t\t\t\t a_form->key.data, a_form->key.length,\n+\t\t\t\t\t NULL)))\n+\t\treturn -1;\n+\n+\tif (unlikely(cpt_fc_auth_set_key(&sess->roc_se_ctx, auth_type, NULL, 0,\n+\t\t\t\t\t a_form->digest_length)))\n+\t\treturn -1;\n+\n+\treturn 0;\n+}\n+\n #endif /*_CNXK_SE_H_ */\n", "prefixes": [ "10/20" ] }{ "id": 93818, "url": "