From patchwork Fri Jun 30 07:43:19 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akhil Goyal X-Patchwork-Id: 26054 X-Patchwork-Delegate: pablo.de.lara.guarch@intel.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [IPv6:::1]) by dpdk.org (Postfix) with ESMTP id 5CB9B58CB; Fri, 30 Jun 2017 09:44:50 +0200 (CEST) Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0067.outbound.protection.outlook.com [104.47.42.67]) by dpdk.org (Postfix) with ESMTP id 4F9F24C57 for ; Fri, 30 Jun 2017 09:44:43 +0200 (CEST) Received: from CY1PR03CA0041.namprd03.prod.outlook.com (10.174.128.51) by BN1PR0301MB0595.namprd03.prod.outlook.com (10.160.170.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1220.11; Fri, 30 Jun 2017 07:44:41 +0000 Received: from BY2FFO11FD001.protection.gbl (2a01:111:f400:7c0c::112) by CY1PR03CA0041.outlook.office365.com (2603:10b6:600::51) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1220.11 via Frontend Transport; Fri, 30 Jun 2017 07:44:41 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BY2FFO11FD001.mail.protection.outlook.com (10.1.14.123) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1199.9 via Frontend Transport; Fri, 30 Jun 2017 07:44:40 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v5U7iWIV022821; Fri, 30 Jun 2017 00:44:38 -0700 From: To: CC: , , , Akhil Goyal Date: Fri, 30 Jun 2017 13:13:19 +0530 Message-ID: <20170630074322.30661-3-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20170630074322.30661-1-akhil.goyal@nxp.com> References: <20170629204904.23684-1-akhil.goyal@nxp.com> <20170630074322.30661-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131432822812270224; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39850400002)(39860400002)(39400400002)(39380400002)(39840400002)(39410400002)(39450400003)(2980300002)(1109001)(1110001)(339900001)(189002)(199003)(9170700003)(77096006)(47776003)(189998001)(305945005)(86362001)(8676002)(50466002)(5660300001)(33646002)(48376002)(105606002)(106466001)(6916009)(50986999)(2351001)(4326008)(53936002)(5003940100001)(575784001)(1076002)(76176999)(81166006)(8656002)(2950100002)(6666003)(86152003)(50226002)(2876002)(38730400002)(85426001)(110136004)(8936002)(54906002)(498600001)(356003)(36756003)(2906002)(104016004); DIR:OUT; SFP:1101; SCL:1; SRVR:BN1PR0301MB0595; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; MX:1; A:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2FFO11FD001; 1:s3nncsQ2zKST/AUiDxATCq16yMmyiEmNcJQHBetTEq?= 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 MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: d188c327-f729-4d05-5e90-08d4bf8bde04 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603031)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BN1PR0301MB0595; X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0595; 3:1wLCJQSqznqolPJFcUYaatjwh1KVBhpXHjeT1YfZxBmR1iEQHu5kbruigBesTaY3Wnk8Qyb+Ns8btZq6CciX68dHIfGnM/F51UeOdWPeI5ZRfpVspKcdMPtdVAYRF64MNAUmM3hiplLnMuWYs2S9kIhHYtfe/vST74D4j9g2Iz1OZpYM6M7KJqakPhnWJtrVUaOz5fm4GcZGIYFWoU3fMq9RUYRufp4gbgCuOtQK7fAroAfXnAtNsXKNAJK8yXrlVFTI92KqjrMUXoSXdXubFw2Pf6ZaX72gp5q9m385D2vOAFyYj0SauJ2Z+rDoPMvAK5lNlyoeZZ/R/iGfBC7bnva9KlIqTFevnRPiGZwsRRdSw97MzUDGLByRlkEjJSoIWWSgW6Sb2HGL5W/AiY69JFYsJf/G04WgLbQgTx+x3n/2wC1IhpFIJauz0ThYs38z8TFNeJyEjM5JKAJfxkQ39B1QePaGbUqbXg9p7rcdJEpxWJbwQxkneINdYDeffu2dwgqW4bGWvAvuW3RP8Ezvdg9XU5rwB2e6KNWrwOY+RJ59kuiMLLVpU7s/yUcHynb7jM8jQZ+SFp8mfmp/Q3o7P2V7OVP6P1cFpBlESF4BvSZiQ3ca0DYCAWwCSYUx0wTuuD5XSTgrZ31vQd/8DBoSPlb2l+oiCyjqV6FHbBInH1ITDVxlwHcl1HSa4HhlYfyqdfsZTs8PvX2tAde4DjhXMXLuVMH9Xpl9gLJHyDS4hdO7rvxydslS5B0rxsAaIGngVAp27JHMVc7TF4z1D8zDZnkwjjHYANnjFzxYyWWAYidAbhJY8ardS4UlcnGKe5vkMr/lOR4Yu0pLASGbubqQoM/DHnxvrVx8nbto7Vxh1BFXzbHDlnuWOw/i6u0QFoOX X-MS-TrafficTypeDiagnostic: BN1PR0301MB0595: X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0595; 25: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 X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0595; 31:yJn/MOKwS9kBJejTUJWCTKN9IPtonyrfxhmqdsUxFOxfi1TTZLeZgkV8/3/J/ER4ScJaWqSNZ2fGakNBPGnMzOmCWv6vOHO+nzkQuNsMk5KseGHX2VoNXQlhB+LH9R7ob5EU8vHI2fcyC5g/rjd3K1GYHVNKoEY1G3h7UyjLKZEfZrudS51FdVDANypAxDkofEBbdLg1tZSZJPeg4SRLnyqTCW2rLtR//PPsfRMT/WdmDfjZbf3/xKYNnAZBPi2OugbDdN7RhSxL/Ik/tUZvcuVmreYSqFFaLxYng+OhFYhVeJsgSF4w2byqVaVcbE20+Qn0qFAePGZBmw3D8V9R8Iix/icA6eG12bvdYOXuNCmnB4m6QfALxdEH3MineHX13mHBzF006iefTOsk+3SN/bGP8aJaFnZLBHFSQpzp+75aY/x7IBi8pxObIFKSWPVyKNqZcToLp14KNC+wiFPWSCrmcbrIq7ImD9uMt8G34XGcxqAcLv5oPXOBnD9ViKDjG0NgpBM0Jp1+tkothPT7iDIq6Dq+bD1nDcpEd0vaMMuzh9iJl881f4LgZIEVKpnGG07LbuvZdT2wD72nHp3J7sKZm/9feqZsrFyg5frZDKufuJJZDqnvqvqcNpXTUcjrS4J3VIz1FS1pd1zqJWRwZH5p7Eo6BriwtGnElyLEknBwSN7v/F8qEL/Z/3DwnXLVN369BGjH/SWJHVEDBp50Kw== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(133145235818549)(236129657087228)(185117386973197)(247924648384137); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(5005006)(13016025)(13018025)(8121501046)(3002001)(10201501046)(100000703101)(100105400095)(93006095)(93001095)(6055026)(6096035)(20161123561025)(20161123563025)(20161123565025)(20161123556025)(201703131430075)(201703131433075)(201703131441075)(201703131448075)(201703161259150)(20161123559100)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BN1PR0301MB0595; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BN1PR0301MB0595; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN1PR0301MB0595; 4:OwVkYWQUH9INrWEKFubp7MuHFYve5IB0WtJMMbB4?= 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 X-Forefront-PRVS: 0354B4BED2 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN1PR0301MB0595; 23:/U/B9Z7qV+HuEdXT0gcFInBsbxUIhEXPHIYnNzs?= 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 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN1PR0301MB0595; 6:ELYLJL8zRNoNbyVH9q9z3f/IN2ibt1ks/0gAH5No?= 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 X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0595; 5: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; 24:ntkdl/jLbplXSFt4Gn6ZgTcOAkzEWR0qYAwSh6w6hkXVhn3HJSQzhQivWzWE6AMb4/IH1AdGRSRz7qZk3+tCIJbOL4HjypD64j82Bn8IDYQ= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0595; 7: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 X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jun 2017 07:44:40.9930 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1PR0301MB0595 Subject: [dpdk-dev] [PATCH v2 2/5] crypto/dpaa2_sec: add hw desc support for CTR X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Akhil Goyal Signed-off-by: Akhil Goyal --- drivers/crypto/dpaa2_sec/hw/desc/algo.h | 23 ++++++++++++++++------- drivers/crypto/dpaa2_sec/hw/desc/ipsec.h | 19 +++++++++++++------ 2 files changed, 29 insertions(+), 13 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/hw/desc/algo.h b/drivers/crypto/dpaa2_sec/hw/desc/algo.h index c71ada0..166bc3a 100644 --- a/drivers/crypto/dpaa2_sec/hw/desc/algo.h +++ b/drivers/crypto/dpaa2_sec/hw/desc/algo.h @@ -159,6 +159,10 @@ cnstr_shdsc_snow_f9(uint32_t *descbuf, bool ps, bool swap, * @ps: if 36/40bit addressing is desired, this parameter must be true * @swap: must be true when core endianness doesn't match SEC endianness * @cipherdata: pointer to block cipher transform definitions + * Valid algorithm values one of OP_ALG_ALGSEL_* {DES, 3DES, AES} + * Valid modes for: + * AES: OP_ALG_AAI_* {CBC, CTR} + * DES, 3DES: OP_ALG_AAI_CBC * @iv: IV data; if NULL, "ivlen" bytes from the input frame will be read as IV * @ivlen: IV length * @dir: DIR_ENC/DIR_DEC @@ -172,8 +176,10 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, { struct program prg; struct program *p = &prg; - const bool is_aes_dec = (dir == DIR_DEC) && - (cipherdata->algtype == OP_ALG_ALGSEL_AES); + uint32_t iv_off = 0; + const bool need_dk = (dir == DIR_DEC) && + (cipherdata->algtype == OP_ALG_ALGSEL_AES) && + (cipherdata->algmode == OP_ALG_AAI_CBC); LABEL(keyjmp); LABEL(skipdk); REFERENCE(pkeyjmp); @@ -191,7 +197,7 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, cipherdata->keylen, INLINE_KEY(cipherdata)); - if (is_aes_dec) { + if (need_dk) { ALG_OPERATION(p, cipherdata->algtype, cipherdata->algmode, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); @@ -199,7 +205,7 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, } SET_LABEL(p, keyjmp); - if (is_aes_dec) { + if (need_dk) { ALG_OPERATION(p, OP_ALG_ALGSEL_AES, cipherdata->algmode | OP_ALG_AAI_DK, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); @@ -209,12 +215,15 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); } + if (cipherdata->algmode == OP_ALG_AAI_CTR) + iv_off = 16; + if (iv) /* IV load, convert size */ - LOAD(p, (uintptr_t)iv, CONTEXT1, 0, ivlen, IMMED | COPY); + LOAD(p, (uintptr_t)iv, CONTEXT1, iv_off, ivlen, IMMED | COPY); else /* IV is present first before the actual message */ - SEQLOAD(p, CONTEXT1, 0, ivlen, 0); + SEQLOAD(p, CONTEXT1, iv_off, ivlen, 0); MATHB(p, SEQINSZ, SUB, MATH2, VSEQINSZ, 4, 0); MATHB(p, SEQINSZ, SUB, MATH2, VSEQOUTSZ, 4, 0); @@ -224,7 +233,7 @@ cnstr_shdsc_blkcipher(uint32_t *descbuf, bool ps, bool swap, SEQFIFOSTORE(p, MSG, 0, 0, VLF); PATCH_JUMP(p, pkeyjmp, keyjmp); - if (is_aes_dec) + if (need_dk) PATCH_JUMP(p, pskipdk, skipdk); return PROGRAM_FINALIZE(p); diff --git a/drivers/crypto/dpaa2_sec/hw/desc/ipsec.h b/drivers/crypto/dpaa2_sec/hw/desc/ipsec.h index c63d0da..5954055 100644 --- a/drivers/crypto/dpaa2_sec/hw/desc/ipsec.h +++ b/drivers/crypto/dpaa2_sec/hw/desc/ipsec.h @@ -1311,8 +1311,11 @@ cnstr_shdsc_ipsec_new_decap(uint32_t *descbuf, bool ps, * @descbuf: pointer to buffer used for descriptor construction * @ps: if 36/40bit addressing is desired, this parameter must be true * @swap: if true, perform descriptor byte swapping on a 4-byte boundary - * @cipherdata: ointer to block cipher transform definitions. + * @cipherdata: pointer to block cipher transform definitions. * Valid algorithm values one of OP_ALG_ALGSEL_* {DES, 3DES, AES} + * Valid modes for: + * AES: OP_ALG_AAI_* {CBC, CTR} + * DES, 3DES: OP_ALG_AAI_CBC * @authdata: pointer to authentication transform definitions. * Valid algorithm values - one of OP_ALG_ALGSEL_* {MD5, SHA1, * SHA224, SHA256, SHA384, SHA512} @@ -1379,8 +1382,9 @@ cnstr_shdsc_authenc(uint32_t *descbuf, bool ps, bool swap, { struct program prg; struct program *p = &prg; - const bool is_aes_dec = (dir == DIR_DEC) && - (cipherdata->algtype == OP_ALG_ALGSEL_AES); + const bool need_dk = (dir == DIR_DEC) && + (cipherdata->algtype == OP_ALG_ALGSEL_AES) && + (cipherdata->algmode == OP_ALG_AAI_CBC); LABEL(skip_patch_len); LABEL(keyjmp); @@ -1466,7 +1470,7 @@ cnstr_shdsc_authenc(uint32_t *descbuf, bool ps, bool swap, dir == DIR_ENC ? ICV_CHECK_DISABLE : ICV_CHECK_ENABLE, dir); - if (is_aes_dec) + if (need_dk) ALG_OPERATION(p, OP_ALG_ALGSEL_AES, cipherdata->algmode, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); pskipkeys = JUMP(p, skipkeys, LOCAL_JUMP, ALL_TRUE, 0); @@ -1478,7 +1482,7 @@ cnstr_shdsc_authenc(uint32_t *descbuf, bool ps, bool swap, dir == DIR_ENC ? ICV_CHECK_DISABLE : ICV_CHECK_ENABLE, dir); - if (is_aes_dec) { + if (need_dk) { ALG_OPERATION(p, OP_ALG_ALGSEL_AES, cipherdata->algmode | OP_ALG_AAI_DK, OP_ALG_AS_INITFINAL, ICV_CHECK_DISABLE, dir); @@ -1503,7 +1507,10 @@ cnstr_shdsc_authenc(uint32_t *descbuf, bool ps, bool swap, SET_LABEL(p, aonly_len_offset); /* Read IV */ - SEQLOAD(p, CONTEXT1, 0, ivlen, 0); + if (cipherdata->algmode == OP_ALG_AAI_CTR) + SEQLOAD(p, CONTEXT1, 16, ivlen, 0); + else + SEQLOAD(p, CONTEXT1, 0, ivlen, 0); /* * Read data needed only for authentication. This is overwritten above