The patchset adds support for wqe configuration<br />of encrypto and decrypto, preliminary verification of results<br />and preparation of checksums.<br /> <br />Signed-off-by: Hanxiao Li <li.hanxiao@zte.com.cn> <br />---<br /> drivers/common/zsda/meson.build |   2 +-<br /> drivers/crypto/zsda/zsda_sym.c  | 273 ++++++++++++++++++++++++++++++++<br /> drivers/crypto/zsda/zsda_sym.h  |  50 ++++++<br /> 3 files changed, 324 insertions(+), 1 deletion(-)<br /> create mode 100644 drivers/crypto/zsda/zsda_sym.c<br /> create mode 100644 drivers/crypto/zsda/zsda_sym.h<br /> <br />diff --git a/drivers/common/zsda/meson.build b/drivers/common/zsda/meson.build<br />index 7030b5f05a..59fd7a12ae 100644<br />--- a/drivers/common/zsda/meson.build<br />+++ b/drivers/common/zsda/meson.build<br />@@ -30,7 +30,7 @@ zsda_crypto_path = 'crypto/zsda' <br /> zsda_crypto_relpath = '../../' + zsda_crypto_path<br /> if zsda_crypto<br />     libcrypto = dependency('libcrypto', required: false, method: 'pkg-config')<br />-    foreach f: ['zsda_sym_session.c']<br />+    foreach f: ['zsda_sym_session.c', 'zsda_sym.c']<br />         sources += files(join_paths(zsda_crypto_relpath, f))<br />     endforeach<br />     deps += ['security']<br />diff --git a/drivers/crypto/zsda/zsda_sym.c b/drivers/crypto/zsda/zsda_sym.c<br />new file mode 100644<br />index 0000000000..a27234eb4e<br />--- /dev/null<br />+++ b/drivers/crypto/zsda/zsda_sym.c<br />@@ -0,0 +1,273 @@<br />+/* SPDX-License-Identifier: BSD-3-Clause<br />+ * Copyright(c) 2024 ZTE Corporation<br />+ */<br />+<br />+#include "cryptodev_pmd.h" <br />+<br />+#include "zsda_logs.h" <br />+#include "zsda_sym.h" <br />+<br />+#define choose_dst_mbuf(mbuf_src, mbuf_dst) ((mbuf_dst) == NULL ? (mbuf_src) : (mbuf_dst))<br />+#define LBADS_MAX_REMAINDER (16 - 1)<br />+<br />+static uint8_t<br />+zsda_get_opcode_hash(struct zsda_sym_session *sess)<br />+{<br />+    switch (sess->auth.algo) {<br />+    case RTE_CRYPTO_AUTH_SHA1:<br />+        return ZSDA_OPC_HASH_SHA1;<br />+<br />+    case RTE_CRYPTO_AUTH_SHA224:<br />+        return ZSDA_OPC_HASH_SHA2_224;<br />+<br />+    case RTE_CRYPTO_AUTH_SHA256:<br />+        return ZSDA_OPC_HASH_SHA2_256;<br />+<br />+    case RTE_CRYPTO_AUTH_SHA384:<br />+        return ZSDA_OPC_HASH_SHA2_384;<br />+<br />+    case RTE_CRYPTO_AUTH_SHA512:<br />+        return ZSDA_OPC_HASH_SHA2_512;<br />+<br />+    case RTE_CRYPTO_AUTH_SM3:<br />+        return ZSDA_OPC_HASH_SM3;<br />+    default:<br />+        break;<br />+    }<br />+<br />+    return ZSDA_OPC_INVALID;<br />+}<br />+<br />+static uint8_t<br />+zsda_get_opcode_crypto(struct zsda_sym_session *sess)<br />+{<br />+    if (sess->cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {<br />+        if (sess->cipher.algo == RTE_CRYPTO_CIPHER_AES_XTS && <br />+            sess->cipher.key_encry.length == 32)<br />+            return ZSDA_OPC_EC_AES_XTS_256;<br />+        else if (sess->cipher.algo == RTE_CRYPTO_CIPHER_AES_XTS && <br />+             sess->cipher.key_encry.length == 64)<br />+            return ZSDA_OPC_EC_AES_XTS_512;<br />+        else if (sess->cipher.algo == RTE_CRYPTO_CIPHER_SM4_XTS)<br />+            return ZSDA_OPC_EC_SM4_XTS_256;<br />+    } else if (sess->cipher.op == RTE_CRYPTO_CIPHER_OP_DECRYPT) {<br />+        if (sess->cipher.algo == RTE_CRYPTO_CIPHER_AES_XTS && <br />+            sess->cipher.key_decry.length == 32)<br />+            return ZSDA_OPC_DC_AES_XTS_256;<br />+        else if (sess->cipher.algo == RTE_CRYPTO_CIPHER_AES_XTS && <br />+             sess->cipher.key_decry.length == 64)<br />+            return ZSDA_OPC_DC_AES_XTS_512;<br />+        else if (sess->cipher.algo == RTE_CRYPTO_CIPHER_SM4_XTS)<br />+            return ZSDA_OPC_DC_SM4_XTS_256;<br />+    }<br />+    return ZSDA_OPC_INVALID;<br />+}<br />+<br />+int<br />+zsda_encry_match(const void *op_in)<br />+{<br />+    const struct rte_crypto_op *op = op_in;<br />+    struct rte_cryptodev_sym_session *session = op->sym->session;<br />+    struct zsda_sym_session *sess =<br />+        (struct zsda_sym_session *)session->driver_priv_data;<br />+<br />+    if (sess->chain_order == ZSDA_SYM_CHAIN_ONLY_CIPHER && <br />+        sess->cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT)<br />+        return 1;<br />+    else<br />+        return 0;<br />+}<br />+<br />+int<br />+zsda_decry_match(const void *op_in)<br />+{<br />+    const struct rte_crypto_op *op = op_in;<br />+    struct rte_cryptodev_sym_session *session = op->sym->session;<br />+    struct zsda_sym_session *sess =<br />+        (struct zsda_sym_session *)session->driver_priv_data;<br />+<br />+    if (sess->chain_order == ZSDA_SYM_CHAIN_ONLY_CIPHER && <br />+        sess->cipher.op == RTE_CRYPTO_CIPHER_OP_DECRYPT)<br />+        return 1;<br />+    else<br />+        return 0;<br />+}<br />+<br />+int<br />+zsda_hash_match(const void *op_in)<br />+{<br />+    const struct rte_crypto_op *op = op_in;<br />+    struct rte_cryptodev_sym_session *session = op->sym->session;<br />+    struct zsda_sym_session *sess =<br />+        (struct zsda_sym_session *)session->driver_priv_data;<br />+<br />+    if (sess->chain_order == ZSDA_SYM_CHAIN_ONLY_AUTH)<br />+        return 1;<br />+    else<br />+        return 0;<br />+}<br />+<br />+static int<br />+zsda_check_len_lbads(uint32_t data_len, uint32_t lbads_size)<br />+{<br />+    if (data_len < 16) {<br />+        ZSDA_LOG(ERR, "data_len wrong!");<br />+        return ZSDA_FAILED;<br />+    }<br />+    if (lbads_size != 0) {<br />+        if (!(((data_len % lbads_size) == 0) ||<br />+              ((data_len % lbads_size) > LBADS_MAX_REMAINDER))) {<br />+            ZSDA_LOG(ERR, "data_len wrong!");<br />+            return ZSDA_FAILED;<br />+        }<br />+    }<br />+<br />+    return 0;<br />+}<br />+<br />+int<br />+zsda_build_cipher_request(void *op_in, const struct zsda_queue *queue,<br />+             void **op_cookies, const uint16_t new_tail)<br />+{<br />+    struct rte_crypto_op *op = op_in;<br />+<br />+    struct rte_cryptodev_sym_session *session = op->sym->session;<br />+    struct zsda_sym_session *sess =<br />+        (struct zsda_sym_session *)session->driver_priv_data;<br />+<br />+    struct zsda_wqe_crpt *wqe =<br />+        (struct zsda_wqe_crpt *)(queue->base_addr +<br />+                     (new_tail * queue->msg_size));<br />+    struct zsda_op_cookie *cookie = op_cookies[new_tail];<br />+    struct zsda_sgl *sgl_src = (struct zsda_sgl *)&cookie->sgl_src;<br />+    struct zsda_sgl *sgl_dst = (struct zsda_sgl *)&cookie->sgl_dst;<br />+    struct rte_mbuf *mbuf;<br />+<br />+    int ret = 0;<br />+    uint32_t op_offset;<br />+    uint32_t op_src_len;<br />+    uint32_t op_dst_len;<br />+    const uint8_t *iv_addr = NULL;<br />+    uint8_t iv_len = 0;<br />+<br />+    ret = zsda_check_len_lbads(op->sym->cipher.data.length,<br />+                   sess->cipher.dataunit_len);<br />+    if (ret)<br />+        return ZSDA_FAILED;<br />+<br />+    op_offset = op->sym->cipher.data.offset;<br />+    op_src_len = op->sym->cipher.data.length;<br />+    mbuf = op->sym->m_src;<br />+    ret = zsda_fill_sgl(mbuf, op_offset, sgl_src, cookie->sgl_src_phys_addr,<br />+                op_src_len, NULL);<br />+<br />+    mbuf = choose_dst_mbuf(op->sym->m_src, op->sym->m_dst);<br />+    op_dst_len = mbuf->pkt_len - op_offset;<br />+    ret |= zsda_fill_sgl(mbuf, op_offset, sgl_dst,<br />+                 cookie->sgl_dst_phys_addr, op_dst_len, NULL);<br />+<br />+    if (ret) {<br />+        ZSDA_LOG(ERR, E_FUNC);<br />+        return ret;<br />+    }<br />+<br />+    cookie->used = true;<br />+    cookie->sid = new_tail;<br />+    cookie->op = op;<br />+<br />+    memset(wqe, 0, sizeof(struct zsda_wqe_crpt));<br />+    wqe->rx_length = op_src_len;<br />+    wqe->tx_length = op_dst_len;<br />+    wqe->valid = queue->valid;<br />+    wqe->op_code = zsda_get_opcode_crypto(sess);<br />+    wqe->sid = cookie->sid;<br />+    wqe->rx_sgl_type = SGL_ELM_TYPE_LIST;<br />+    wqe->tx_sgl_type = SGL_ELM_TYPE_LIST;<br />+    wqe->rx_addr = cookie->sgl_src_phys_addr;<br />+    wqe->tx_addr = cookie->sgl_dst_phys_addr;<br />+    wqe->cfg.lbads = sess->cipher.lbads;<br />+<br />+    if (sess->cipher.op == RTE_CRYPTO_CIPHER_OP_ENCRYPT)<br />+        memcpy((uint8_t *)wqe->cfg.key, sess->cipher.key_encry.data,<br />+               ZSDA_CIPHER_KEY_MAX_LEN);<br />+    else<br />+        memcpy((uint8_t *)wqe->cfg.key, sess->cipher.key_decry.data,<br />+               ZSDA_CIPHER_KEY_MAX_LEN);<br />+<br />+    iv_addr = (const uint8_t *)rte_crypto_op_ctod_offset(<br />+                   op, char *, sess->cipher.iv.offset);<br />+    iv_len = sess->cipher.iv.length;<br />+    zsda_reverse_memcpy((uint8_t *)wqe->cfg.slba_H, iv_addr, iv_len / 2);<br />+    zsda_reverse_memcpy((uint8_t *)wqe->cfg.slba_L, iv_addr + 8, iv_len / 2);<br />+<br />+    return ret;<br />+}<br />+<br />+int<br />+zsda_build_hash_request(void *op_in, const struct zsda_queue *queue,<br />+           void **op_cookies, const uint16_t new_tail)<br />+{<br />+    struct rte_crypto_op *op = op_in;<br />+<br />+    struct rte_cryptodev_sym_session *session = op->sym->session;<br />+    struct zsda_sym_session *sess =<br />+        (struct zsda_sym_session *)session->driver_priv_data;<br />+<br />+    struct zsda_wqe_crpt *wqe =<br />+        (struct zsda_wqe_crpt *)(queue->base_addr +<br />+                     (new_tail * queue->msg_size));<br />+    struct zsda_op_cookie *cookie = op_cookies[new_tail];<br />+    struct zsda_sgl *sgl_src = &cookie->sgl_src;<br />+    uint8_t opcode;<br />+    uint32_t op_offset;<br />+    uint32_t op_src_len;<br />+    int ret = 0;<br />+<br />+    memset(wqe, 0, sizeof(struct zsda_wqe_crpt));<br />+    wqe->rx_length = op->sym->auth.data.length;<br />+    wqe->tx_length = sess->auth.digest_length;<br />+<br />+    opcode = zsda_get_opcode_hash(sess);<br />+    if (opcode == ZSDA_OPC_INVALID) {<br />+        ZSDA_LOG(ERR, E_FUNC);<br />+        return ZSDA_FAILED;<br />+    }<br />+<br />+    op_offset = op->sym->auth.data.offset;<br />+    op_src_len = op->sym->auth.data.length;<br />+    ret = zsda_fill_sgl(op->sym->m_src, op_offset, sgl_src,<br />+                   cookie->sgl_src_phys_addr, op_src_len, NULL);<br />+    if (ret) {<br />+        ZSDA_LOG(ERR, E_FUNC);<br />+        return ret;<br />+    }<br />+<br />+    cookie->used = true;<br />+    cookie->sid = new_tail;<br />+    cookie->op = op;<br />+    wqe->valid = queue->valid;<br />+    wqe->op_code = opcode;<br />+    wqe->sid = cookie->sid;<br />+    wqe->rx_sgl_type = SGL_ELM_TYPE_LIST;<br />+    wqe->tx_sgl_type = SGL_ELM_TYPE_PHYS_ADDR;<br />+    wqe->rx_addr = cookie->sgl_src_phys_addr;<br />+    wqe->tx_addr = op->sym->auth.digest.phys_addr;<br />+<br />+    return ret;<br />+}<br />+<br />+int<br />+zsda_crypto_callback(void *cookie_in, struct zsda_cqe *cqe)<br />+{<br />+    struct zsda_op_cookie *tmp_cookie = cookie_in;<br />+    struct rte_crypto_op *op = tmp_cookie->op;<br />+<br />+    if (!(CQE_ERR0(cqe->err0) || CQE_ERR1(cqe->err1)))<br />+        op->status = RTE_CRYPTO_OP_STATUS_SUCCESS;<br />+    else {<br />+        op->status = RTE_CRYPTO_OP_STATUS_ERROR;<br />+        return ZSDA_FAILED;<br />+    }<br />+<br />+    return ZSDA_SUCCESS;<br />+}<br />diff --git a/drivers/crypto/zsda/zsda_sym.h b/drivers/crypto/zsda/zsda_sym.h<br />new file mode 100644<br />index 0000000000..252adf2256<br />--- /dev/null<br />+++ b/drivers/crypto/zsda/zsda_sym.h<br />@@ -0,0 +1,50 @@<br />+/* SPDX-License-Identifier: BSD-3-Clause<br />+ * Copyright(c) 2024 ZTE Corporation<br />+ */<br />+<br />+#ifndef _ZSDA_SYM_H_<br />+#define _ZSDA_SYM_H_<br />+<br />+#include "zsda_common.h" <br />+#include "zsda_qp.h" <br />+<br />+#include "zsda_sym_session.h" <br />+<br />+struct crypto_cfg {<br />+    uint8_t slba_L[8];<br />+    uint8_t key[ZSDA_CIPHER_KEY_MAX_LEN];<br />+    uint8_t lbads : 4;<br />+    uint8_t resv1 : 4;<br />+    uint8_t resv2[7];<br />+    uint8_t slba_H[8];<br />+    uint8_t resv3[8];<br />+} __rte_packed;<br />+<br />+struct zsda_wqe_crpt {<br />+    uint8_t valid;<br />+    uint8_t op_code;<br />+    uint16_t sid;<br />+    uint8_t resv[3];<br />+    uint8_t rx_sgl_type : 4;<br />+    uint8_t tx_sgl_type : 4;<br />+    uint64_t rx_addr;<br />+    uint32_t rx_length;<br />+    uint64_t tx_addr;<br />+    uint32_t tx_length;<br />+    struct crypto_cfg cfg;<br />+} __rte_packed;<br />+<br />+int zsda_build_cipher_request(void *op_in, const struct zsda_queue *queue,<br />+             void **op_cookies, const uint16_t new_tail);<br />+<br />+int zsda_build_hash_request(void *op_in, const struct zsda_queue *queue,<br />+               void **op_cookies, const uint16_t new_tail);<br />+<br />+int zsda_encry_match(const void *op_in);<br />+int zsda_decry_match(const void *op_in);<br />+int zsda_hash_match(const void *op_in);<br />+<br />+<br />+int zsda_crypto_callback(void *cookie_in, struct zsda_cqe *cqe);<br />+<br />+#endif /* _ZSDA_SYM_H_ */<br />--  <br />2.27.0<br />