From 7bb4ea324628662f845b610524f20a75fb93dd5e Mon Sep 17 00:00:00 2001 From: Ayuj Verma Date: Wed, 15 Jan 2020 18:13:36 +0530 Subject: [PATCH] cryptodev: support ECDSA Asymmetric crypto library is extended to add ECDSA. Elliptic curve xform and ECDSA op params are introduced. Signed-off-by: Anoob Joseph Signed-off-by: Ayuj Verma Signed-off-by: Sunila Sahu Acked-by: Akhil Goyal --- doc/guides/cryptodevs/features/default.ini | 11 +-- doc/guides/rel_notes/release_20_02.rst | 2 + lib/librte_cryptodev/rte_crypto_asym.h | 84 ++++++++++++++++++++++ lib/librte_cryptodev/rte_cryptodev.c | 1 + 4 files changed, 93 insertions(+), 5 deletions(-) diff --git a/doc/guides/cryptodevs/features/default.ini b/doc/guides/cryptodevs/features/default.ini index 2a3ff48061..440233d7ea 100644 --- a/doc/guides/cryptodevs/features/default.ini +++ b/doc/guides/cryptodevs/features/default.ini @@ -104,8 +104,9 @@ CHACHA20-POLY1305 = ; Supported Asymmetric algorithms of a default crypto driver. ; [Asymmetric] -RSA = -DSA = -Modular Exponentiation = -Modular Inversion = -Diffie-hellman = \ No newline at end of file +RSA = +DSA = +Modular Exponentiation = +Modular Inversion = +Diffie-hellman = +ECDSA = diff --git a/doc/guides/rel_notes/release_20_02.rst b/doc/guides/rel_notes/release_20_02.rst index 96a077515a..af8384214c 100644 --- a/doc/guides/rel_notes/release_20_02.rst +++ b/doc/guides/rel_notes/release_20_02.rst @@ -64,6 +64,8 @@ New Features * **Added algorithms to cryptodev API.** * Chacha20-Poly1305 AEAD algorithm can now be supported in cryptodev. + * ECDSA (Elliptic Curve Digital Signature Algorithm) is added to + asymmetric crypto library specifications. Removed Items diff --git a/lib/librte_cryptodev/rte_crypto_asym.h b/lib/librte_cryptodev/rte_crypto_asym.h index 0d34ce8dfd..e17614e972 100644 --- a/lib/librte_cryptodev/rte_crypto_asym.h +++ b/lib/librte_cryptodev/rte_crypto_asym.h @@ -27,6 +27,13 @@ extern "C" { #include "rte_crypto_sym.h" +/** + * Buffer to hold crypto params required for asym operations. + * + * These buffers can be used for both input to PMD and output from PMD. When + * used for output from PMD, application has to ensure the buffer is large + * enough to hold the target data. + */ typedef struct rte_crypto_param_t { uint8_t *data; /**< pointer to buffer holding data */ @@ -81,6 +88,10 @@ enum rte_crypto_asym_xform_type { /**< Modular Exponentiation * Perform Modular Exponentiation b^e mod n */ + RTE_CRYPTO_ASYM_XFORM_ECDSA, + /**< Elliptic Curve Digital Signature Algorithm + * Perform Signature Generation and Verification. + */ RTE_CRYPTO_ASYM_XFORM_TYPE_LIST_END /**< End of list */ }; @@ -318,6 +329,40 @@ struct rte_crypto_dsa_xform { */ }; +/** + * TLS named curves + * https://tools.ietf.org/html/rfc8422 + */ +enum rte_crypto_ec_group { + RTE_CRYPTO_EC_GROUP_UNKNOWN = 0, + RTE_CRYPTO_EC_GROUP_SECP192R1 = 19, + RTE_CRYPTO_EC_GROUP_SECP224R1 = 21, + RTE_CRYPTO_EC_GROUP_SECP256R1 = 23, + RTE_CRYPTO_EC_GROUP_SECP384R1 = 24, + RTE_CRYPTO_EC_GROUP_SECP521R1 = 25, +}; + +/** + * Structure for elliptic curve point + */ +struct rte_crypto_ec_point { + rte_crypto_param x; + /**< X coordinate */ + rte_crypto_param y; + /**< Y coordinate */ +}; + +/** + * Asymmetric elliptic curve transform data + * + * Structure describing all EC based xform params + * + */ +struct rte_crypto_ec_xform { + enum rte_crypto_ec_group curve_id; + /**< Pre-defined ec groups */ +}; + /** * Operations params for modular operations: * exponentiation and multiplicative inverse @@ -372,6 +417,11 @@ struct rte_crypto_asym_xform { struct rte_crypto_dsa_xform dsa; /**< DSA xform parameters */ + + struct rte_crypto_ec_xform ec; + /**< EC xform parameters, used by elliptic curve based + * operations. + */ }; }; @@ -515,6 +565,39 @@ struct rte_crypto_dsa_op_param { */ }; +/** + * ECDSA operation params + */ +struct rte_crypto_ecdsa_op_param { + enum rte_crypto_asym_op_type op_type; + /**< Signature generation or verification */ + + rte_crypto_param pkey; + /**< Private key of the signer for signature generation */ + + struct rte_crypto_ec_point q; + /**< Public key of the signer for verification */ + + rte_crypto_param message; + /**< Input message digest to be signed or verified */ + + rte_crypto_param k; + /**< The ECDSA per-message secret number, which is an integer + * in the interval (1, n-1) + */ + + rte_crypto_param r; + /**< r component of elliptic curve signature + * output : for signature generation + * input : for signature verification + */ + rte_crypto_param s; + /**< s component of elliptic curve signature + * output : for signature generation + * input : for signature verification + */ +}; + /** * Asymmetric Cryptographic Operation. * @@ -537,6 +620,7 @@ struct rte_crypto_asym_op { struct rte_crypto_mod_op_param modinv; struct rte_crypto_dh_op_param dh; struct rte_crypto_dsa_op_param dsa; + struct rte_crypto_ecdsa_op_param ecdsa; }; }; diff --git a/lib/librte_cryptodev/rte_cryptodev.c b/lib/librte_cryptodev/rte_cryptodev.c index 410520f991..2ab2c3aba2 100644 --- a/lib/librte_cryptodev/rte_cryptodev.c +++ b/lib/librte_cryptodev/rte_cryptodev.c @@ -174,6 +174,7 @@ const char *rte_crypto_asym_xform_strings[] = { [RTE_CRYPTO_ASYM_XFORM_MODINV] = "modinv", [RTE_CRYPTO_ASYM_XFORM_DH] = "dh", [RTE_CRYPTO_ASYM_XFORM_DSA] = "dsa", + [RTE_CRYPTO_ASYM_XFORM_ECDSA] = "ecdsa", }; /** -- 2.20.1