crypto/qat: fix smaller modulus cases for mod exp
[dpdk.git] / drivers / crypto / qat / qat_sym_session.c
index 432ff04..9d6a19c 100644 (file)
@@ -1,5 +1,5 @@
 /* SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0)
- * Copyright(c) 2015-2019 Intel Corporation
+ * Copyright(c) 2015-2022 Intel Corporation
  */
 
 #include <openssl/sha.h>       /* Needed to calculate pre-compute values */
@@ -20,7 +20,7 @@
 
 #include "qat_logs.h"
 #include "qat_sym_session.h"
-#include "qat_sym_pmd.h"
+#include "qat_sym.h"
 
 /* SHA1 - 20 bytes - Initialiser state can be found in FIPS stds 180-2 */
 static const uint8_t sha1InitialState[] = {
@@ -131,7 +131,7 @@ ctx_init_err:
 
 static int
 qat_is_cipher_alg_supported(enum rte_crypto_cipher_algorithm algo,
-               struct qat_sym_dev_private *internals)
+               struct qat_cryptodev_private *internals)
 {
        int i = 0;
        const struct rte_cryptodev_capabilities *capability;
@@ -152,7 +152,7 @@ qat_is_cipher_alg_supported(enum rte_crypto_cipher_algorithm algo,
 
 static int
 qat_is_auth_alg_supported(enum rte_crypto_auth_algorithm algo,
-               struct qat_sym_dev_private *internals)
+               struct qat_cryptodev_private *internals)
 {
        int i = 0;
        const struct rte_cryptodev_capabilities *capability;
@@ -267,7 +267,7 @@ qat_sym_session_configure_cipher(struct rte_cryptodev *dev,
                struct rte_crypto_sym_xform *xform,
                struct qat_sym_session *session)
 {
-       struct qat_sym_dev_private *internals = dev->data->dev_private;
+       struct qat_cryptodev_private *internals = dev->data->dev_private;
        struct rte_crypto_cipher_xform *cipher_xform = NULL;
        enum qat_device_gen qat_dev_gen =
                                internals->qat_dev->qat_dev_gen;
@@ -486,89 +486,15 @@ qat_sym_session_configure(struct rte_cryptodev *dev,
        return 0;
 }
 
-static void
-qat_sym_session_set_ext_hash_flags(struct qat_sym_session *session,
-               uint8_t hash_flag)
-{
-       struct icp_qat_fw_comn_req_hdr *header = &session->fw_req.comn_hdr;
-       struct icp_qat_fw_cipher_auth_cd_ctrl_hdr *cd_ctrl =
-                       (struct icp_qat_fw_cipher_auth_cd_ctrl_hdr *)
-                       session->fw_req.cd_ctrl.content_desc_ctrl_lw;
-
-       /* Set the Use Extended Protocol Flags bit in LW 1 */
-       QAT_FIELD_SET(header->comn_req_flags,
-                       QAT_COMN_EXT_FLAGS_USED,
-                       QAT_COMN_EXT_FLAGS_BITPOS,
-                       QAT_COMN_EXT_FLAGS_MASK);
-
-       /* Set Hash Flags in LW 28 */
-       cd_ctrl->hash_flags |= hash_flag;
-
-       /* Set proto flags in LW 1 */
-       switch (session->qat_cipher_alg) {
-       case ICP_QAT_HW_CIPHER_ALGO_SNOW_3G_UEA2:
-               ICP_QAT_FW_LA_PROTO_SET(header->serv_specif_flags,
-                               ICP_QAT_FW_LA_SNOW_3G_PROTO);
-               ICP_QAT_FW_LA_ZUC_3G_PROTO_FLAG_SET(
-                               header->serv_specif_flags, 0);
-               break;
-       case ICP_QAT_HW_CIPHER_ALGO_ZUC_3G_128_EEA3:
-               ICP_QAT_FW_LA_PROTO_SET(header->serv_specif_flags,
-                               ICP_QAT_FW_LA_NO_PROTO);
-               ICP_QAT_FW_LA_ZUC_3G_PROTO_FLAG_SET(
-                               header->serv_specif_flags,
-                               ICP_QAT_FW_LA_ZUC_3G_PROTO);
-               break;
-       default:
-               ICP_QAT_FW_LA_PROTO_SET(header->serv_specif_flags,
-                               ICP_QAT_FW_LA_NO_PROTO);
-               ICP_QAT_FW_LA_ZUC_3G_PROTO_FLAG_SET(
-                               header->serv_specif_flags, 0);
-               break;
-       }
-}
-
-static void
-qat_sym_session_handle_mixed(const struct rte_cryptodev *dev,
-               struct qat_sym_session *session)
-{
-       const struct qat_sym_dev_private *qat_private = dev->data->dev_private;
-       enum qat_device_gen min_dev_gen = (qat_private->internal_capabilities &
-                       QAT_SYM_CAP_MIXED_CRYPTO) ? QAT_GEN2 : QAT_GEN3;
-
-       if (session->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_ZUC_3G_128_EIA3 &&
-                       session->qat_cipher_alg !=
-                       ICP_QAT_HW_CIPHER_ALGO_ZUC_3G_128_EEA3) {
-               session->min_qat_dev_gen = min_dev_gen;
-               qat_sym_session_set_ext_hash_flags(session,
-                       1 << ICP_QAT_FW_AUTH_HDR_FLAG_ZUC_EIA3_BITPOS);
-       } else if (session->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_SNOW_3G_UIA2 &&
-                       session->qat_cipher_alg !=
-                       ICP_QAT_HW_CIPHER_ALGO_SNOW_3G_UEA2) {
-               session->min_qat_dev_gen = min_dev_gen;
-               qat_sym_session_set_ext_hash_flags(session,
-                       1 << ICP_QAT_FW_AUTH_HDR_FLAG_SNOW3G_UIA2_BITPOS);
-       } else if ((session->aes_cmac ||
-                       session->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_NULL) &&
-                       (session->qat_cipher_alg ==
-                       ICP_QAT_HW_CIPHER_ALGO_SNOW_3G_UEA2 ||
-                       session->qat_cipher_alg ==
-                       ICP_QAT_HW_CIPHER_ALGO_ZUC_3G_128_EEA3)) {
-               session->min_qat_dev_gen = min_dev_gen;
-               qat_sym_session_set_ext_hash_flags(session, 0);
-       }
-}
-
 int
 qat_sym_session_set_parameters(struct rte_cryptodev *dev,
                struct rte_crypto_sym_xform *xform, void *session_private)
 {
        struct qat_sym_session *session = session_private;
-       struct qat_sym_dev_private *internals = dev->data->dev_private;
+       struct qat_cryptodev_private *internals = dev->data->dev_private;
        enum qat_device_gen qat_dev_gen = internals->qat_dev->qat_dev_gen;
        int ret;
        int qat_cmd_id;
-       int handle_mixed = 0;
 
        /* Verify the session physical address is known */
        rte_iova_t session_paddr = rte_mempool_virt2iova(session);
@@ -583,7 +509,7 @@ qat_sym_session_set_parameters(struct rte_cryptodev *dev,
        session->cd_paddr = session_paddr +
                        offsetof(struct qat_sym_session, cd);
 
-       session->min_qat_dev_gen = QAT_GEN1;
+       session->dev_id = internals->dev_id;
        session->qat_proto_flag = QAT_CRYPTO_PROTO_FLAG_NONE;
        session->is_ucs = 0;
 
@@ -624,7 +550,6 @@ qat_sym_session_set_parameters(struct rte_cryptodev *dev,
                                        xform, session);
                        if (ret < 0)
                                return ret;
-                       handle_mixed = 1;
                }
                break;
        case ICP_QAT_FW_LA_CMD_HASH_CIPHER:
@@ -642,7 +567,6 @@ qat_sym_session_set_parameters(struct rte_cryptodev *dev,
                                        xform, session);
                        if (ret < 0)
                                return ret;
-                       handle_mixed = 1;
                }
                break;
        case ICP_QAT_FW_LA_CMD_TRNG_GET_RANDOM:
@@ -663,12 +587,9 @@ qat_sym_session_set_parameters(struct rte_cryptodev *dev,
                return -ENOTSUP;
        }
        qat_sym_session_finalize(session);
-       if (handle_mixed) {
-               /* Special handling of mixed hash+cipher algorithms */
-               qat_sym_session_handle_mixed(dev, session);
-       }
 
-       return 0;
+       return qat_sym_gen_dev_ops[qat_dev_gen].set_session((void *)dev,
+                       (void *)session);
 }
 
 static int
@@ -677,14 +598,13 @@ qat_sym_session_handle_single_pass(struct qat_sym_session *session,
 {
        session->is_single_pass = 1;
        session->is_auth = 1;
-       session->min_qat_dev_gen = QAT_GEN3;
        session->qat_cmd = ICP_QAT_FW_LA_CMD_CIPHER;
        /* Chacha-Poly is special case that use QAT CTR mode */
-       if (aead_xform->algo == RTE_CRYPTO_AEAD_AES_GCM) {
+       if (aead_xform->algo == RTE_CRYPTO_AEAD_AES_GCM)
                session->qat_mode = ICP_QAT_HW_CIPHER_AEAD_MODE;
-       } else {
+       else
                session->qat_mode = ICP_QAT_HW_CIPHER_CTR_MODE;
-       }
+
        session->cipher_iv.offset = aead_xform->iv.offset;
        session->cipher_iv.length = aead_xform->iv.length;
        session->aad_len = aead_xform->aad_length;
@@ -707,9 +627,11 @@ qat_sym_session_configure_auth(struct rte_cryptodev *dev,
                                struct qat_sym_session *session)
 {
        struct rte_crypto_auth_xform *auth_xform = qat_get_auth_xform(xform);
-       struct qat_sym_dev_private *internals = dev->data->dev_private;
+       struct qat_cryptodev_private *internals = dev->data->dev_private;
        const uint8_t *key_data = auth_xform->key.data;
        uint8_t key_length = auth_xform->key.length;
+       enum qat_device_gen qat_dev_gen =
+                       internals->qat_dev->qat_dev_gen;
 
        session->aes_cmac = 0;
        session->auth_key_length = auth_xform->key.length;
@@ -717,6 +639,7 @@ qat_sym_session_configure_auth(struct rte_cryptodev *dev,
        session->auth_iv.length = auth_xform->iv.length;
        session->auth_mode = ICP_QAT_HW_AUTH_MODE1;
        session->is_auth = 1;
+       session->digest_length = auth_xform->digest_length;
 
        switch (auth_xform->algo) {
        case RTE_CRYPTO_AUTH_SHA1:
@@ -773,6 +696,10 @@ qat_sym_session_configure_auth(struct rte_cryptodev *dev,
                        session->auth_iv.length = AES_GCM_J0_LEN;
                else
                        session->is_iv12B = 1;
+               if (qat_dev_gen == QAT_GEN4) {
+                       session->is_cnt_zero = 1;
+                       session->is_ucs = 1;
+               }
                break;
        case RTE_CRYPTO_AUTH_SNOW3G_UIA2:
                session->qat_hash_alg = ICP_QAT_HW_AUTH_ALGO_SNOW_3G_UIA2;
@@ -858,7 +785,6 @@ qat_sym_session_configure_auth(struct rte_cryptodev *dev,
                        return -EINVAL;
        }
 
-       session->digest_length = auth_xform->digest_length;
        return 0;
 }
 
@@ -869,7 +795,7 @@ qat_sym_session_configure_aead(struct rte_cryptodev *dev,
 {
        struct rte_crypto_aead_xform *aead_xform = &xform->aead;
        enum rte_crypto_auth_operation crypto_operation;
-       struct qat_sym_dev_private *internals =
+       struct qat_cryptodev_private *internals =
                        dev->data->dev_private;
        enum qat_device_gen qat_dev_gen =
                        internals->qat_dev->qat_dev_gen;
@@ -898,16 +824,15 @@ qat_sym_session_configure_aead(struct rte_cryptodev *dev,
 
                if (qat_dev_gen == QAT_GEN4)
                        session->is_ucs = 1;
-
                if (session->cipher_iv.length == 0) {
                        session->cipher_iv.length = AES_GCM_J0_LEN;
                        break;
                }
                session->is_iv12B = 1;
-               if (qat_dev_gen == QAT_GEN3) {
-                       qat_sym_session_handle_single_pass(session,
-                                       aead_xform);
-               }
+               if (qat_dev_gen < QAT_GEN3)
+                       break;
+               qat_sym_session_handle_single_pass(session,
+                               aead_xform);
                break;
        case RTE_CRYPTO_AEAD_AES_CCM:
                if (qat_sym_validate_aes_key(aead_xform->key.length,
@@ -923,6 +848,8 @@ qat_sym_session_configure_aead(struct rte_cryptodev *dev,
        case RTE_CRYPTO_AEAD_CHACHA20_POLY1305:
                if (aead_xform->key.length != ICP_QAT_HW_CHACHAPOLY_KEY_SZ)
                        return -EINVAL;
+               if (qat_dev_gen == QAT_GEN4)
+                       session->is_ucs = 1;
                session->qat_cipher_alg =
                                ICP_QAT_HW_CIPHER_ALGO_CHACHA20_POLY1305;
                qat_sym_session_handle_single_pass(session,
@@ -1197,9 +1124,9 @@ static int partial_hash_md5(uint8_t *data_in, uint8_t *data_out)
        return 0;
 }
 
-static int partial_hash_compute(enum icp_qat_hw_auth_algo hash_alg,
-                       uint8_t *data_in,
-                       uint8_t *data_out)
+static int
+partial_hash_compute(enum icp_qat_hw_auth_algo hash_alg,
+               uint8_t *data_in, uint8_t *data_out)
 {
        int digest_size;
        uint8_t digest[qat_hash_get_digest_size(
@@ -1646,7 +1573,6 @@ int qat_sym_cd_cipher_set(struct qat_sym_session *cdesc,
                cipher_cd_ctrl->cipher_state_sz =
                        ICP_QAT_HW_ZUC_3G_EEA3_IV_SZ >> 3;
                cdesc->qat_proto_flag = QAT_CRYPTO_PROTO_FLAG_ZUC;
-               cdesc->min_qat_dev_gen = QAT_GEN2;
        } else {
                total_key_size = cipherkeylen;
                cipher_cd_ctrl->cipher_state_sz = ICP_QAT_HW_AES_BLK_SZ >> 3;
@@ -1813,6 +1739,7 @@ int qat_sym_cd_auth_set(struct qat_sym_session *cdesc,
                || cdesc->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_AES_XCBC_MAC
                || cdesc->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_AES_CBC_MAC
                || cdesc->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_NULL
+               || cdesc->is_cnt_zero
                        )
                hash->auth_counter.counter = 0;
        else {
@@ -1993,7 +1920,6 @@ int qat_sym_cd_auth_set(struct qat_sym_session *cdesc,
                memcpy(cdesc->cd_cur_ptr + state1_size, authkey, authkeylen);
                cd_extra_size += ICP_QAT_HW_ZUC_3G_EEA3_IV_SZ;
                auth_param->hash_state_sz = ICP_QAT_HW_ZUC_3G_EEA3_IV_SZ >> 3;
-               cdesc->min_qat_dev_gen = QAT_GEN2;
 
                break;
        case ICP_QAT_HW_AUTH_ALGO_MD5:
@@ -2254,8 +2180,6 @@ qat_sec_session_set_docsis_parameters(struct rte_cryptodev *dev,
        session->cd_paddr = session_paddr +
                        offsetof(struct qat_sym_session, cd);
 
-       session->min_qat_dev_gen = QAT_GEN1;
-
        /* Get requested QAT command id - should be cipher */
        qat_cmd_id = qat_get_cmd_id(xform);
        if (qat_cmd_id != ICP_QAT_FW_LA_CMD_CIPHER) {
@@ -2280,6 +2204,9 @@ qat_security_session_create(void *dev,
 {
        void *sess_private_data;
        struct rte_cryptodev *cdev = (struct rte_cryptodev *)dev;
+       struct qat_cryptodev_private *internals = cdev->data->dev_private;
+       enum qat_device_gen qat_dev_gen = internals->qat_dev->qat_dev_gen;
+       struct qat_sym_session *sym_session = NULL;
        int ret;
 
        if (conf->action_type != RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL ||
@@ -2303,8 +2230,11 @@ qat_security_session_create(void *dev,
        }
 
        set_sec_session_private_data(sess, sess_private_data);
+       sym_session = (struct qat_sym_session *)sess_private_data;
+       sym_session->dev_id = internals->dev_id;
 
-       return ret;
+       return qat_sym_gen_dev_ops[qat_dev_gen].set_session((void *)cdev,
+                       sess_private_data);
 }
 
 int