[dpdk-dev] [PATCH v2 1/4] cryptodev: support ECDSA
Anoob Joseph
anoobj at marvell.com
Wed Jan 15 13:43:36 CET 2020
From: Ayuj Verma <ayverma at marvell.com>
Asymmetric crypto library is extended to add ECDSA. Elliptic curve
xform and ECDSA op params are introduced.
Signed-off-by: Anoob Joseph <anoobj at marvell.com>
Signed-off-by: Ayuj Verma <ayverma at marvell.com>
Signed-off-by: Sunila Sahu <ssahu at marvell.com>
---
doc/guides/cryptodevs/features/default.ini | 11 ++--
doc/guides/rel_notes/release_20_02.rst | 4 ++
lib/librte_cryptodev/rte_crypto_asym.h | 84 ++++++++++++++++++++++++++++++
lib/librte_cryptodev/rte_cryptodev.c | 1 +
4 files changed, 95 insertions(+), 5 deletions(-)
diff --git a/doc/guides/cryptodevs/features/default.ini b/doc/guides/cryptodevs/features/default.ini
index b7f9a0a..2f6c785 100644
--- a/doc/guides/cryptodevs/features/default.ini
+++ b/doc/guides/cryptodevs/features/default.ini
@@ -103,8 +103,9 @@ AES CCM (256) =
; Supported Asymmetric algorithms of a default crypto driver.
;
[Asymmetric]
-RSA =
-DSA =
-Modular Exponentiation =
-Modular Inversion =
-Diffie-hellman =
\ No newline at end of file
+RSA =
+DSA =
+Modular Exponentiation =
+Modular Inversion =
+Diffie-hellman =
+ECDSA =
diff --git a/doc/guides/rel_notes/release_20_02.rst b/doc/guides/rel_notes/release_20_02.rst
index 0eaa45a..2e97c60 100644
--- a/doc/guides/rel_notes/release_20_02.rst
+++ b/doc/guides/rel_notes/release_20_02.rst
@@ -56,6 +56,10 @@ New Features
Also, make sure to start the actual text at the margin.
=========================================================
+* **Added support for ECDSA.**
+
+ Added ECDSA(Elliptic Curve Digital Signature Algorithm) support to asymmetric
+ crypto library specifications.
Removed Items
-------------
diff --git a/lib/librte_cryptodev/rte_crypto_asym.h b/lib/librte_cryptodev/rte_crypto_asym.h
index 0d34ce8..e17614e 100644
--- a/lib/librte_cryptodev/rte_crypto_asym.h
+++ b/lib/librte_cryptodev/rte_crypto_asym.h
@@ -27,6 +27,13 @@ extern "C" {
#include "rte_crypto_sym.h"
+/**
+ * Buffer to hold crypto params required for asym operations.
+ *
+ * These buffers can be used for both input to PMD and output from PMD. When
+ * used for output from PMD, application has to ensure the buffer is large
+ * enough to hold the target data.
+ */
typedef struct rte_crypto_param_t {
uint8_t *data;
/**< pointer to buffer holding data */
@@ -81,6 +88,10 @@ enum rte_crypto_asym_xform_type {
/**< Modular Exponentiation
* Perform Modular Exponentiation b^e mod n
*/
+ RTE_CRYPTO_ASYM_XFORM_ECDSA,
+ /**< Elliptic Curve Digital Signature Algorithm
+ * Perform Signature Generation and Verification.
+ */
RTE_CRYPTO_ASYM_XFORM_TYPE_LIST_END
/**< End of list */
};
@@ -319,6 +330,40 @@ struct rte_crypto_dsa_xform {
};
/**
+ * TLS named curves
+ * https://tools.ietf.org/html/rfc8422
+ */
+enum rte_crypto_ec_group {
+ RTE_CRYPTO_EC_GROUP_UNKNOWN = 0,
+ RTE_CRYPTO_EC_GROUP_SECP192R1 = 19,
+ RTE_CRYPTO_EC_GROUP_SECP224R1 = 21,
+ RTE_CRYPTO_EC_GROUP_SECP256R1 = 23,
+ RTE_CRYPTO_EC_GROUP_SECP384R1 = 24,
+ RTE_CRYPTO_EC_GROUP_SECP521R1 = 25,
+};
+
+/**
+ * Structure for elliptic curve point
+ */
+struct rte_crypto_ec_point {
+ rte_crypto_param x;
+ /**< X coordinate */
+ rte_crypto_param y;
+ /**< Y coordinate */
+};
+
+/**
+ * Asymmetric elliptic curve transform data
+ *
+ * Structure describing all EC based xform params
+ *
+ */
+struct rte_crypto_ec_xform {
+ enum rte_crypto_ec_group curve_id;
+ /**< Pre-defined ec groups */
+};
+
+/**
* Operations params for modular operations:
* exponentiation and multiplicative inverse
*
@@ -372,6 +417,11 @@ struct rte_crypto_asym_xform {
struct rte_crypto_dsa_xform dsa;
/**< DSA xform parameters */
+
+ struct rte_crypto_ec_xform ec;
+ /**< EC xform parameters, used by elliptic curve based
+ * operations.
+ */
};
};
@@ -516,6 +566,39 @@ struct rte_crypto_dsa_op_param {
};
/**
+ * ECDSA operation params
+ */
+struct rte_crypto_ecdsa_op_param {
+ enum rte_crypto_asym_op_type op_type;
+ /**< Signature generation or verification */
+
+ rte_crypto_param pkey;
+ /**< Private key of the signer for signature generation */
+
+ struct rte_crypto_ec_point q;
+ /**< Public key of the signer for verification */
+
+ rte_crypto_param message;
+ /**< Input message digest to be signed or verified */
+
+ rte_crypto_param k;
+ /**< The ECDSA per-message secret number, which is an integer
+ * in the interval (1, n-1)
+ */
+
+ rte_crypto_param r;
+ /**< r component of elliptic curve signature
+ * output : for signature generation
+ * input : for signature verification
+ */
+ rte_crypto_param s;
+ /**< s component of elliptic curve signature
+ * output : for signature generation
+ * input : for signature verification
+ */
+};
+
+/**
* Asymmetric Cryptographic Operation.
*
* Structure describing asymmetric crypto operation params.
@@ -537,6 +620,7 @@ struct rte_crypto_asym_op {
struct rte_crypto_mod_op_param modinv;
struct rte_crypto_dh_op_param dh;
struct rte_crypto_dsa_op_param dsa;
+ struct rte_crypto_ecdsa_op_param ecdsa;
};
};
diff --git a/lib/librte_cryptodev/rte_cryptodev.c b/lib/librte_cryptodev/rte_cryptodev.c
index 89aa2ed..0d6babb 100644
--- a/lib/librte_cryptodev/rte_cryptodev.c
+++ b/lib/librte_cryptodev/rte_cryptodev.c
@@ -173,6 +173,7 @@ const char *rte_crypto_asym_xform_strings[] = {
[RTE_CRYPTO_ASYM_XFORM_MODINV] = "modinv",
[RTE_CRYPTO_ASYM_XFORM_DH] = "dh",
[RTE_CRYPTO_ASYM_XFORM_DSA] = "dsa",
+ [RTE_CRYPTO_ASYM_XFORM_ECDSA] = "ecdsa",
};
/**
--
2.7.4
More information about the dev
mailing list