]> git.droids-corp.org - dpdk.git/commitdiff
cryptodev: move DH type from xform to DH op
authorArek Kusztal <arkadiuszx.kusztal@intel.com>
Wed, 1 Jun 2022 09:02:42 +0000 (10:02 +0100)
committerAkhil Goyal <gakhil@marvell.com>
Wed, 1 Jun 2022 17:10:54 +0000 (19:10 +0200)
- Moved DH operation type to DH operation struct.
Operation type (PUBLIC_KEY_GENERATION, SHARED_SECRET) should
be free to choose for any operation. One xform/session should
be enough to perform both DH operations, if op_type would be xform
member, session would have to be created twice for the same
group. Similar problem would be observed in sessionless case.
Additionally, it will help extend DH to support Elliptic Curves.
- Changed order of Diffie-Hellman operation phases.
Now it corresponds with the order of operations.

Signed-off-by: Arek Kusztal <arkadiuszx.kusztal@intel.com>
Acked-by: Fan Zhang <roy.fan.zhang@intel.com>
Acked-by: Akhil Goyal <gakhil@marvell.com>
app/test/test_cryptodev_asym.c
drivers/crypto/openssl/rte_openssl_pmd.c
drivers/crypto/openssl/rte_openssl_pmd_ops.c
lib/cryptodev/rte_crypto_asym.h

index 491ba2c1b93aea2fb00aade243237988dea3ca9b..9d044c65b2487f40d963309265ce8b38c996268c 100644 (file)
@@ -1067,8 +1067,8 @@ test_dh_gen_shared_sec(struct rte_crypto_asym_xform *xfrm)
        asym_op = op->asym;
 
        /* Setup a xform and op to generate private key only */
-       xform.dh.ke_type = RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE;
        xform.next = NULL;
+       asym_op->dh.ke_type = RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE;
        asym_op->dh.priv_key.data = dh_test_params.priv_key.data;
        asym_op->dh.priv_key.length = dh_test_params.priv_key.length;
        asym_op->dh.pub_key.data = (uint8_t *)peer;
@@ -1149,8 +1149,8 @@ test_dh_gen_priv_key(struct rte_crypto_asym_xform *xfrm)
        asym_op = op->asym;
 
        /* Setup a xform and op to generate private key only */
-       xform.dh.ke_type = RTE_CRYPTO_ASYM_KE_PRIV_KEY_GENERATE;
        xform.next = NULL;
+       asym_op->dh.ke_type = RTE_CRYPTO_ASYM_KE_PRIV_KEY_GENERATE;
        asym_op->dh.priv_key.data = output;
        asym_op->dh.priv_key.length = sizeof(output);
 
@@ -1232,9 +1232,9 @@ test_dh_gen_pub_key(struct rte_crypto_asym_xform *xfrm)
         * using test private key
         *
         */
-       xform.dh.ke_type = RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE;
        xform.next = NULL;
 
+       asym_op->dh.ke_type = RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE;
        asym_op->dh.pub_key.data = output;
        asym_op->dh.pub_key.length = sizeof(output);
        /* load pre-defined private key */
@@ -1323,15 +1323,14 @@ test_dh_gen_kp(struct rte_crypto_asym_xform *xfrm)
         * private key first followed by
         * public key
         */
-       xform.dh.ke_type = RTE_CRYPTO_ASYM_KE_PRIV_KEY_GENERATE;
        pub_key_xform.xform_type = RTE_CRYPTO_ASYM_XFORM_DH;
-       pub_key_xform.dh.ke_type = RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE;
        xform.next = &pub_key_xform;
 
+       asym_op->dh.ke_type = RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE;
        asym_op->dh.pub_key.data = out_pub_key;
        asym_op->dh.pub_key.length = sizeof(out_pub_key);
        asym_op->dh.priv_key.data = out_prv_key;
-       asym_op->dh.priv_key.length = sizeof(out_prv_key);
+       asym_op->dh.priv_key.length = 0;
 
        ret = rte_cryptodev_asym_session_create(dev_id, &xform, sess_mpool, &sess);
        if (ret < 0) {
index 1a2bb0c34efc7a882799b676b7196086b5eaa9f4..8270b01517b94ffc4040c3e7ad6dd70f6aec8a63 100644 (file)
@@ -1694,12 +1694,12 @@ process_openssl_dh_op(struct rte_crypto_op *cop,
                struct openssl_asym_session *sess)
 {
        struct rte_crypto_dh_op_param *op = &cop->asym->dh;
+       struct rte_crypto_asym_op *asym_op = cop->asym;
        DH *dh_key = sess->u.dh.dh_key;
        BIGNUM *priv_key = NULL;
        int ret = 0;
 
-       if (sess->u.dh.key_op &
-                       (1 << RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE)) {
+       if (asym_op->dh.ke_type == RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE) {
                /* compute shared secret using peer public key
                 * and current private key
                 * shared secret = peer_key ^ priv_key mod p
@@ -1755,10 +1755,8 @@ process_openssl_dh_op(struct rte_crypto_op *cop,
         * if user provides private key,
         * then first set DH with user provided private key
         */
-       if ((sess->u.dh.key_op &
-                       (1 << RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE)) &&
-                       !(sess->u.dh.key_op &
-                       (1 << RTE_CRYPTO_ASYM_KE_PRIV_KEY_GENERATE))) {
+       if (asym_op->dh.ke_type == RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE &&
+                       op->priv_key.length) {
                /* generate public key using user-provided private key
                 * pub_key = g ^ priv_key mod p
                 */
@@ -1792,7 +1790,7 @@ process_openssl_dh_op(struct rte_crypto_op *cop,
                return 0;
        }
 
-       if (sess->u.dh.key_op & (1 << RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE)) {
+       if (asym_op->dh.ke_type == RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE) {
                const BIGNUM *pub_key = NULL;
 
                OPENSSL_LOG(DEBUG, "%s:%d update public key\n",
@@ -1806,8 +1804,7 @@ process_openssl_dh_op(struct rte_crypto_op *cop,
                                op->pub_key.data);
        }
 
-       if (sess->u.dh.key_op &
-                       (1 << RTE_CRYPTO_ASYM_KE_PRIV_KEY_GENERATE)) {
+       if (asym_op->dh.ke_type == RTE_CRYPTO_ASYM_KE_PRIV_KEY_GENERATE) {
                const BIGNUM *priv_key = NULL;
 
                OPENSSL_LOG(DEBUG, "%s:%d updated priv key\n",
index 182111424d16a53c4c2fa0fba3a4b553af12d30f..7d0da52a3393454fa793cf04c65baedc065c8e41 100644 (file)
@@ -1001,33 +1001,6 @@ err_rsa:
                        DH_free(dh);
                        goto err_dh;
                }
-
-               /*
-                * setup xfrom for
-                * public key generate, or
-                * DH Priv key generate, or both
-                * public and private key generate
-                */
-               asym_session->u.dh.key_op = (1 << xform->dh.ke_type);
-
-               if (xform->dh.ke_type ==
-                       RTE_CRYPTO_ASYM_KE_PRIV_KEY_GENERATE) {
-                       /* check if next is pubkey */
-                       if ((xform->next != NULL) &&
-                               (xform->next->xform_type ==
-                               RTE_CRYPTO_ASYM_XFORM_DH) &&
-                               (xform->next->dh.ke_type ==
-                               RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE)
-                               ) {
-                               /*
-                                * setup op as pub/priv key
-                                * pair generationi
-                                */
-                               asym_session->u.dh.key_op |=
-                               (1 <<
-                               RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE);
-                       }
-               }
                asym_session->u.dh.dh_key = dh;
                asym_session->xfrm_type = RTE_CRYPTO_ASYM_XFORM_DH;
                break;
index ecf4e376b5e4dbd318d03d9638a4b457691884d7..15dc657098a7b1cf6b6520ba13572adf0054567a 100644 (file)
@@ -270,8 +270,6 @@ struct rte_crypto_modinv_xform {
  *
  */
 struct rte_crypto_dh_xform {
-       enum rte_crypto_asym_ke_type ke_type;
-       /**< Setup xform for key generate or shared secret compute */
        rte_crypto_uint p;
        /**< Prime modulus data */
        rte_crypto_uint g;
@@ -399,33 +397,33 @@ struct rte_crypto_rsa_op_param {
  * @note:
  */
 struct rte_crypto_dh_op_param {
-       rte_crypto_uint pub_key;
-       /**<
-        * Output - generated public key, when dh xform ke_type is
-        * RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE.
-        *
-        * Input - peer's public key, when dh xform ke_type is
-        * RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE.
-        */
-
+       enum rte_crypto_asym_ke_type ke_type;
+       /**< Key exchange operation type */
        rte_crypto_uint priv_key;
        /**<
-        * Output - generated private key, when dh xform ke_type is
+        * Output - generated private key when ke_type is
         * RTE_CRYPTO_ASYM_KE_PRIV_KEY_GENERATE.
         *
-        * Input - private key, when dh xform ke_type is one of:
+        * Input - private key when ke_type is one of:
         * RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE,
         * RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE.
         *
-        * In case priv_key.length is 0 and xform type is set with
+        * In case priv_key.length is 0 and ke_type is set with
         * RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE, CSRNG capable
         * device will generate a private key and use it for public
         * key generation.
         */
-
+       rte_crypto_uint pub_key;
+       /**<
+        * Output - generated public key when ke_type is
+        * RTE_CRYPTO_ASYM_KE_PUB_KEY_GENERATE.
+        *
+        * Input - peer's public key when ke_type is
+        * RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE.
+        */
        rte_crypto_uint shared_secret;
        /**<
-        * Output - calculated shared secret when dh xform ke_type is
+        * Output - calculated shared secret when ke_type is
         * RTE_CRYPTO_ASYM_KE_SHARED_SECRET_COMPUTE.
         */
 };