]> git.proxmox.com Git - ceph.git/blame - ceph/src/dpdk/examples/dpdk_qat/crypto.c
bump version to 12.2.12-pve1
[ceph.git] / ceph / src / dpdk / examples / dpdk_qat / crypto.c
CommitLineData
7c673cae
FG
1/*-
2 * BSD LICENSE
3 *
4 * Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 *
11 * * Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * * Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in
15 * the documentation and/or other materials provided with the
16 * distribution.
17 * * Neither the name of Intel Corporation nor the names of its
18 * contributors may be used to endorse or promote products derived
19 * from this software without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
24 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
25 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
26 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
27 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32 */
33
34#include <stdio.h>
35#include <stdlib.h>
36#include <strings.h>
37#include <string.h>
38#include <inttypes.h>
39#include <errno.h>
40#include <sys/queue.h>
41#include <stdarg.h>
42
43#include <rte_common.h>
44#include <rte_log.h>
45#include <rte_debug.h>
46#include <rte_memory.h>
47#include <rte_memzone.h>
48#include <rte_ether.h>
49#include <rte_malloc.h>
50#include <rte_launch.h>
51#include <rte_eal.h>
52#include <rte_per_lcore.h>
53#include <rte_lcore.h>
54#include <rte_atomic.h>
55#include <rte_branch_prediction.h>
56#include <rte_mempool.h>
57#include <rte_mbuf.h>
58#include <rte_string_fns.h>
59
60#define CPA_CY_SYM_DP_TMP_WORKAROUND 1
61
62#include "cpa.h"
63#include "cpa_types.h"
64#include "cpa_cy_sym_dp.h"
65#include "cpa_cy_common.h"
66#include "cpa_cy_im.h"
67#include "icp_sal_user.h"
68#include "icp_sal_poll.h"
69
70#include "crypto.h"
71
72/* CIPHER KEY LENGTHS */
73#define KEY_SIZE_64_IN_BYTES (64 / 8)
74#define KEY_SIZE_56_IN_BYTES (56 / 8)
75#define KEY_SIZE_128_IN_BYTES (128 / 8)
76#define KEY_SIZE_168_IN_BYTES (168 / 8)
77#define KEY_SIZE_192_IN_BYTES (192 / 8)
78#define KEY_SIZE_256_IN_BYTES (256 / 8)
79
80/* HMAC AUTH KEY LENGTHS */
81#define AES_XCBC_AUTH_KEY_LENGTH_IN_BYTES (128 / 8)
82#define SHA1_AUTH_KEY_LENGTH_IN_BYTES (160 / 8)
83#define SHA224_AUTH_KEY_LENGTH_IN_BYTES (224 / 8)
84#define SHA256_AUTH_KEY_LENGTH_IN_BYTES (256 / 8)
85#define SHA384_AUTH_KEY_LENGTH_IN_BYTES (384 / 8)
86#define SHA512_AUTH_KEY_LENGTH_IN_BYTES (512 / 8)
87#define MD5_AUTH_KEY_LENGTH_IN_BYTES (128 / 8)
88#define KASUMI_AUTH_KEY_LENGTH_IN_BYTES (128 / 8)
89
90/* HASH DIGEST LENGHTS */
91#define AES_XCBC_DIGEST_LENGTH_IN_BYTES (128 / 8)
92#define AES_XCBC_96_DIGEST_LENGTH_IN_BYTES (96 / 8)
93#define MD5_DIGEST_LENGTH_IN_BYTES (128 / 8)
94#define SHA1_DIGEST_LENGTH_IN_BYTES (160 / 8)
95#define SHA1_96_DIGEST_LENGTH_IN_BYTES (96 / 8)
96#define SHA224_DIGEST_LENGTH_IN_BYTES (224 / 8)
97#define SHA256_DIGEST_LENGTH_IN_BYTES (256 / 8)
98#define SHA384_DIGEST_LENGTH_IN_BYTES (384 / 8)
99#define SHA512_DIGEST_LENGTH_IN_BYTES (512 / 8)
100#define KASUMI_DIGEST_LENGTH_IN_BYTES (32 / 8)
101
102#define IV_LENGTH_16_BYTES (16)
103#define IV_LENGTH_8_BYTES (8)
104
105
106/*
107 * rte_memzone is used to allocate physically contiguous virtual memory.
108 * In this application we allocate a single block and divide between variables
109 * which require a virtual to physical mapping for use by the QAT driver.
110 * Virt2phys is only performed during initialisation and not on the data-path.
111 */
112
113#define LCORE_MEMZONE_SIZE (1 << 22)
114
115struct lcore_memzone
116{
117 const struct rte_memzone *memzone;
118 void *next_free_address;
119};
120
121/*
122 * Size the qa software response queue.
123 * Note: Head and Tail are 8 bit, therefore, the queue is
124 * fixed to 256 entries.
125 */
126#define CRYPTO_SOFTWARE_QUEUE_SIZE 256
127
128struct qa_callbackQueue {
129 uint8_t head;
130 uint8_t tail;
131 uint16_t numEntries;
132 struct rte_mbuf *qaCallbackRing[CRYPTO_SOFTWARE_QUEUE_SIZE];
133};
134
135struct qa_core_conf {
136 CpaCySymDpSessionCtx *encryptSessionHandleTbl[NUM_CRYPTO][NUM_HMAC];
137 CpaCySymDpSessionCtx *decryptSessionHandleTbl[NUM_CRYPTO][NUM_HMAC];
138 CpaInstanceHandle instanceHandle;
139 struct qa_callbackQueue callbackQueue;
140 uint64_t qaOutstandingRequests;
141 uint64_t numResponseAttempts;
142 uint8_t kickFreq;
143 void *pPacketIV;
144 CpaPhysicalAddr packetIVPhy;
145 struct lcore_memzone lcoreMemzone;
146} __rte_cache_aligned;
147
148#define MAX_CORES (RTE_MAX_LCORE)
149
150static struct qa_core_conf qaCoreConf[MAX_CORES];
151
152/*
153 *Create maximum possible key size,
154 *One for cipher and one for hash
155 */
156struct glob_keys {
157 uint8_t cipher_key[32];
158 uint8_t hash_key[64];
159 uint8_t iv[16];
160};
161
162struct glob_keys g_crypto_hash_keys = {
163 .cipher_key = {0x01,0x02,0x03,0x04,0x05,0x06,0x07,0x08,
164 0x09,0x0a,0x0b,0x0c,0x0d,0x0e,0x0f,0x10,
165 0x11,0x12,0x13,0x14,0x15,0x16,0x17,0x18,
166 0x19,0x1a,0x1b,0x1c,0x1d,0x1e,0x1f,0x20},
167 .hash_key = {0x01,0x02,0x03,0x04,0x05,0x06,0x07,0x08,
168 0x09,0x0a,0x0b,0x0c,0x0d,0x0e,0x0f,0x10,
169 0x11,0x12,0x13,0x14,0x15,0x16,0x17,0x18,
170 0x19,0x1a,0x1b,0x1c,0x1d,0x1e,0x1f,0x20,
171 0x21,0x22,0x23,0x24,0x25,0x26,0x27,0x28,
172 0x29,0x2a,0x2b,0x2c,0x2d,0x2e,0x2f,0x30,
173 0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,
174 0x39,0x4a,0x4b,0x4c,0x4d,0x4e,0x4f,0x50},
175 .iv = {0x01,0x02,0x03,0x04,0x05,0x06,0x07,0x08,
176 0x09,0x0a,0x0b,0x0c,0x0d,0x0e,0x0f,0x10}
177};
178
179/*
180 * Offsets from the start of the packet.
181 *
182 */
183#define PACKET_DATA_START_PHYS(p) \
184 ((p)->buf_physaddr + (p)->data_off)
185
186/*
187 * A fixed offset to where the crypto is to be performed, which is the first
188 * byte after the Ethernet(14 bytes) and IPv4 headers(20 bytes)
189 */
190#define CRYPTO_START_OFFSET (14+20)
191#define HASH_START_OFFSET (14+20)
192#define CIPHER_BLOCK_DEFAULT_SIZE (16)
193#define HASH_BLOCK_DEFAULT_SIZE (16)
194
195/*
196 * Offset to the opdata from the start of the data portion of packet.
197 * Assumption: The buffer is physically contiguous.
198 * +18 takes this to the next cache line.
199 */
200
201#define CRYPTO_OFFSET_TO_OPDATA (ETHER_MAX_LEN+18)
202
203/*
204 * Default number of requests to place on the hardware ring before kicking the
205 * ring pointers.
206 */
207#define CRYPTO_BURST_TX (16)
208
209/*
210 * Only call the qa poll function when the number responses in the software
211 * queue drops below this number.
212 */
213#define CRYPTO_QUEUED_RESP_POLL_THRESHOLD (32)
214
215/*
216 * Limit the number of polls per call to get_next_response.
217 */
218#define GET_NEXT_RESPONSE_FREQ (32)
219
220/*
221 * Max number of responses to pull from the qa in one poll.
222 */
223#define CRYPTO_MAX_RESPONSE_QUOTA \
224 (CRYPTO_SOFTWARE_QUEUE_SIZE-CRYPTO_QUEUED_RESP_POLL_THRESHOLD-1)
225
226#if (CRYPTO_QUEUED_RESP_POLL_THRESHOLD + CRYPTO_MAX_RESPONSE_QUOTA >= \
227 CRYPTO_SOFTWARE_QUEUE_SIZE)
228#error Its possible to overflow the qa response Q with current poll and \
229 response quota.
230#endif
231
232static void
233crypto_callback(CpaCySymDpOpData *pOpData,
234 __rte_unused CpaStatus status,
235 __rte_unused CpaBoolean verifyResult)
236{
237 uint32_t lcore_id;
238 lcore_id = rte_lcore_id();
239 struct qa_callbackQueue *callbackQ = &(qaCoreConf[lcore_id].callbackQueue);
240
241 /*
242 * Received a completion from the QA hardware.
243 * Place the response on the return queue.
244 */
245 callbackQ->qaCallbackRing[callbackQ->head] = pOpData->pCallbackTag;
246 callbackQ->head++;
247 callbackQ->numEntries++;
248 qaCoreConf[lcore_id].qaOutstandingRequests--;
249}
250
251static void
252qa_crypto_callback(CpaCySymDpOpData *pOpData, CpaStatus status,
253 CpaBoolean verifyResult)
254{
255 crypto_callback(pOpData, status, verifyResult);
256}
257
258/*
259 * Each allocation from a particular memzone lasts for the life-time of
260 * the application. No freeing of previous allocations will occur.
261 */
262static void *
263alloc_memzone_region(uint32_t length, uint32_t lcore_id)
264{
265 char *current_free_addr_ptr = NULL;
266 struct lcore_memzone *lcore_memzone = &(qaCoreConf[lcore_id].lcoreMemzone);
267
268 current_free_addr_ptr = lcore_memzone->next_free_address;
269
270 if (current_free_addr_ptr + length >=
271 (char *)lcore_memzone->memzone->addr + lcore_memzone->memzone->len) {
272 printf("Crypto: No memory available in memzone\n");
273 return NULL;
274 }
275 lcore_memzone->next_free_address = current_free_addr_ptr + length;
276
277 return (void *)current_free_addr_ptr;
278}
279
280/*
281 * Virtual to Physical Address translation is only executed during initialization
282 * and not on the data-path.
283 */
284static CpaPhysicalAddr
285qa_v2p(void *ptr)
286{
287 const struct rte_memzone *memzone = NULL;
288 uint32_t lcore_id = 0;
289 RTE_LCORE_FOREACH(lcore_id) {
290 memzone = qaCoreConf[lcore_id].lcoreMemzone.memzone;
291
292 if ((char*) ptr >= (char *) memzone->addr &&
293 (char*) ptr < ((char*) memzone->addr + memzone->len)) {
294 return (CpaPhysicalAddr)
295 (memzone->phys_addr + ((char *) ptr - (char*) memzone->addr));
296 }
297 }
298 printf("Crypto: Corresponding physical address not found in memzone\n");
299 return (CpaPhysicalAddr) 0;
300}
301
302static CpaStatus
303getCoreAffinity(Cpa32U *coreAffinity, const CpaInstanceHandle instanceHandle)
304{
305 CpaInstanceInfo2 info;
306 Cpa16U i = 0;
307 CpaStatus status = CPA_STATUS_SUCCESS;
308
309 memset(&info, 0, sizeof(CpaInstanceInfo2));
310
311 status = cpaCyInstanceGetInfo2(instanceHandle, &info);
312 if (CPA_STATUS_SUCCESS != status) {
313 printf("Crypto: Error getting instance info\n");
314 return CPA_STATUS_FAIL;
315 }
316 for (i = 0; i < MAX_CORES; i++) {
317 if (CPA_BITMAP_BIT_TEST(info.coreAffinity, i)) {
318 *coreAffinity = i;
319 return CPA_STATUS_SUCCESS;
320 }
321 }
322 return CPA_STATUS_FAIL;
323}
324
325static CpaStatus
326get_crypto_instance_on_core(CpaInstanceHandle *pInstanceHandle,
327 uint32_t lcore_id)
328{
329 Cpa16U numInstances = 0, i = 0;
330 CpaStatus status = CPA_STATUS_FAIL;
331 CpaInstanceHandle *pLocalInstanceHandles = NULL;
332 Cpa32U coreAffinity = 0;
333
334 status = cpaCyGetNumInstances(&numInstances);
335 if (CPA_STATUS_SUCCESS != status || numInstances == 0) {
336 return CPA_STATUS_FAIL;
337 }
338
339 pLocalInstanceHandles = rte_malloc("pLocalInstanceHandles",
340 sizeof(CpaInstanceHandle) * numInstances, RTE_CACHE_LINE_SIZE);
341
342 if (NULL == pLocalInstanceHandles) {
343 return CPA_STATUS_FAIL;
344 }
345 status = cpaCyGetInstances(numInstances, pLocalInstanceHandles);
346 if (CPA_STATUS_SUCCESS != status) {
347 printf("Crypto: cpaCyGetInstances failed with status: %"PRId32"\n", status);
348 rte_free((void *) pLocalInstanceHandles);
349 return CPA_STATUS_FAIL;
350 }
351
352 for (i = 0; i < numInstances; i++) {
353 status = getCoreAffinity(&coreAffinity, pLocalInstanceHandles[i]);
354 if (CPA_STATUS_SUCCESS != status) {
355 rte_free((void *) pLocalInstanceHandles);
356 return CPA_STATUS_FAIL;
357 }
358 if (coreAffinity == lcore_id) {
359 printf("Crypto: instance found on core %d\n", i);
360 *pInstanceHandle = pLocalInstanceHandles[i];
361 return CPA_STATUS_SUCCESS;
362 }
363 }
364 /* core affinity not found */
365 rte_free((void *) pLocalInstanceHandles);
366 return CPA_STATUS_FAIL;
367}
368
369static CpaStatus
370initCySymSession(const int pkt_cipher_alg,
371 const int pkt_hash_alg, const CpaCySymHashMode hashMode,
372 const CpaCySymCipherDirection crypto_direction,
373 CpaCySymSessionCtx **ppSessionCtx,
374 const CpaInstanceHandle cyInstanceHandle,
375 const uint32_t lcore_id)
376{
377 Cpa32U sessionCtxSizeInBytes = 0;
378 CpaStatus status = CPA_STATUS_FAIL;
379 CpaBoolean isCrypto = CPA_TRUE, isHmac = CPA_TRUE;
380 CpaCySymSessionSetupData sessionSetupData;
381
382 memset(&sessionSetupData, 0, sizeof(CpaCySymSessionSetupData));
383
384 /* Assumption: key length is set to each algorithm's max length */
385 switch (pkt_cipher_alg) {
386 case NO_CIPHER:
387 isCrypto = CPA_FALSE;
388 break;
389 case CIPHER_DES:
390 sessionSetupData.cipherSetupData.cipherAlgorithm =
391 CPA_CY_SYM_CIPHER_DES_ECB;
392 sessionSetupData.cipherSetupData.cipherKeyLenInBytes =
393 KEY_SIZE_64_IN_BYTES;
394 break;
395 case CIPHER_DES_CBC:
396 sessionSetupData.cipherSetupData.cipherAlgorithm =
397 CPA_CY_SYM_CIPHER_DES_CBC;
398 sessionSetupData.cipherSetupData.cipherKeyLenInBytes =
399 KEY_SIZE_64_IN_BYTES;
400 break;
401 case CIPHER_DES3:
402 sessionSetupData.cipherSetupData.cipherAlgorithm =
403 CPA_CY_SYM_CIPHER_3DES_ECB;
404 sessionSetupData.cipherSetupData.cipherKeyLenInBytes =
405 KEY_SIZE_192_IN_BYTES;
406 break;
407 case CIPHER_DES3_CBC:
408 sessionSetupData.cipherSetupData.cipherAlgorithm =
409 CPA_CY_SYM_CIPHER_3DES_CBC;
410 sessionSetupData.cipherSetupData.cipherKeyLenInBytes =
411 KEY_SIZE_192_IN_BYTES;
412 break;
413 case CIPHER_AES:
414 sessionSetupData.cipherSetupData.cipherAlgorithm =
415 CPA_CY_SYM_CIPHER_AES_ECB;
416 sessionSetupData.cipherSetupData.cipherKeyLenInBytes =
417 KEY_SIZE_128_IN_BYTES;
418 break;
419 case CIPHER_AES_CBC_128:
420 sessionSetupData.cipherSetupData.cipherAlgorithm =
421 CPA_CY_SYM_CIPHER_AES_CBC;
422 sessionSetupData.cipherSetupData.cipherKeyLenInBytes =
423 KEY_SIZE_128_IN_BYTES;
424 break;
425 case CIPHER_KASUMI_F8:
426 sessionSetupData.cipherSetupData.cipherAlgorithm =
427 CPA_CY_SYM_CIPHER_KASUMI_F8;
428 sessionSetupData.cipherSetupData.cipherKeyLenInBytes =
429 KEY_SIZE_128_IN_BYTES;
430 break;
431 default:
432 printf("Crypto: Undefined Cipher specified\n");
433 break;
434 }
435 /* Set the cipher direction */
436 if (isCrypto) {
437 sessionSetupData.cipherSetupData.cipherDirection = crypto_direction;
438 sessionSetupData.cipherSetupData.pCipherKey =
439 g_crypto_hash_keys.cipher_key;
440 sessionSetupData.symOperation = CPA_CY_SYM_OP_CIPHER;
441 }
442
443 /* Setup Hash common fields */
444 switch (pkt_hash_alg) {
445 case NO_HASH:
446 isHmac = CPA_FALSE;
447 break;
448 case HASH_AES_XCBC:
449 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_AES_XCBC;
450 sessionSetupData.hashSetupData.digestResultLenInBytes =
451 AES_XCBC_DIGEST_LENGTH_IN_BYTES;
452 break;
453 case HASH_AES_XCBC_96:
454 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_AES_XCBC;
455 sessionSetupData.hashSetupData.digestResultLenInBytes =
456 AES_XCBC_96_DIGEST_LENGTH_IN_BYTES;
457 break;
458 case HASH_MD5:
459 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_MD5;
460 sessionSetupData.hashSetupData.digestResultLenInBytes =
461 MD5_DIGEST_LENGTH_IN_BYTES;
462 break;
463 case HASH_SHA1:
464 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_SHA1;
465 sessionSetupData.hashSetupData.digestResultLenInBytes =
466 SHA1_DIGEST_LENGTH_IN_BYTES;
467 break;
468 case HASH_SHA1_96:
469 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_SHA1;
470 sessionSetupData.hashSetupData.digestResultLenInBytes =
471 SHA1_96_DIGEST_LENGTH_IN_BYTES;
472 break;
473 case HASH_SHA224:
474 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_SHA224;
475 sessionSetupData.hashSetupData.digestResultLenInBytes =
476 SHA224_DIGEST_LENGTH_IN_BYTES;
477 break;
478 case HASH_SHA256:
479 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_SHA256;
480 sessionSetupData.hashSetupData.digestResultLenInBytes =
481 SHA256_DIGEST_LENGTH_IN_BYTES;
482 break;
483 case HASH_SHA384:
484 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_SHA384;
485 sessionSetupData.hashSetupData.digestResultLenInBytes =
486 SHA384_DIGEST_LENGTH_IN_BYTES;
487 break;
488 case HASH_SHA512:
489 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_SHA512;
490 sessionSetupData.hashSetupData.digestResultLenInBytes =
491 SHA512_DIGEST_LENGTH_IN_BYTES;
492 break;
493 case HASH_KASUMI_F9:
494 sessionSetupData.hashSetupData.hashAlgorithm = CPA_CY_SYM_HASH_KASUMI_F9;
495 sessionSetupData.hashSetupData.digestResultLenInBytes =
496 KASUMI_DIGEST_LENGTH_IN_BYTES;
497 break;
498 default:
499 printf("Crypto: Undefined Hash specified\n");
500 break;
501 }
502 if (isHmac) {
503 sessionSetupData.hashSetupData.hashMode = hashMode;
504 sessionSetupData.symOperation = CPA_CY_SYM_OP_HASH;
505 /* If using authenticated hash setup key lengths */
506 if (CPA_CY_SYM_HASH_MODE_AUTH == hashMode) {
507 /* Use a common max length key */
508 sessionSetupData.hashSetupData.authModeSetupData.authKey =
509 g_crypto_hash_keys.hash_key;
510 switch (pkt_hash_alg) {
511 case HASH_AES_XCBC:
512 case HASH_AES_XCBC_96:
513 sessionSetupData.hashSetupData.authModeSetupData.authKeyLenInBytes =
514 AES_XCBC_AUTH_KEY_LENGTH_IN_BYTES;
515 break;
516 case HASH_MD5:
517 sessionSetupData.hashSetupData.authModeSetupData.authKeyLenInBytes =
518 SHA1_AUTH_KEY_LENGTH_IN_BYTES;
519 break;
520 case HASH_SHA1:
521 case HASH_SHA1_96:
522 sessionSetupData.hashSetupData.authModeSetupData.authKeyLenInBytes =
523 SHA1_AUTH_KEY_LENGTH_IN_BYTES;
524 break;
525 case HASH_SHA224:
526 sessionSetupData.hashSetupData.authModeSetupData.authKeyLenInBytes =
527 SHA224_AUTH_KEY_LENGTH_IN_BYTES;
528 break;
529 case HASH_SHA256:
530 sessionSetupData.hashSetupData.authModeSetupData.authKeyLenInBytes =
531 SHA256_AUTH_KEY_LENGTH_IN_BYTES;
532 break;
533 case HASH_SHA384:
534 sessionSetupData.hashSetupData.authModeSetupData.authKeyLenInBytes =
535 SHA384_AUTH_KEY_LENGTH_IN_BYTES;
536 break;
537 case HASH_SHA512:
538 sessionSetupData.hashSetupData.authModeSetupData.authKeyLenInBytes =
539 SHA512_AUTH_KEY_LENGTH_IN_BYTES;
540 break;
541 case HASH_KASUMI_F9:
542 sessionSetupData.hashSetupData.authModeSetupData.authKeyLenInBytes =
543 KASUMI_AUTH_KEY_LENGTH_IN_BYTES;
544 break;
545 default:
546 printf("Crypto: Undefined Hash specified\n");
547 return CPA_STATUS_FAIL;
548 }
549 }
550 }
551
552 /* Only high priority supported */
553 sessionSetupData.sessionPriority = CPA_CY_PRIORITY_HIGH;
554
555 /* If chaining algorithms */
556 if (isCrypto && isHmac) {
557 sessionSetupData.symOperation = CPA_CY_SYM_OP_ALGORITHM_CHAINING;
558 /* @assumption Alg Chain order is cipher then hash for encrypt
559 * and hash then cipher then has for decrypt*/
560 if (CPA_CY_SYM_CIPHER_DIRECTION_ENCRYPT == crypto_direction) {
561 sessionSetupData.algChainOrder =
562 CPA_CY_SYM_ALG_CHAIN_ORDER_CIPHER_THEN_HASH;
563 } else {
564 sessionSetupData.algChainOrder =
565 CPA_CY_SYM_ALG_CHAIN_ORDER_HASH_THEN_CIPHER;
566 }
567 }
568 if (!isCrypto && !isHmac) {
569 *ppSessionCtx = NULL;
570 return CPA_STATUS_SUCCESS;
571 }
572
573 /* Set flags for digest operations */
574 sessionSetupData.digestIsAppended = CPA_FALSE;
575 sessionSetupData.verifyDigest = CPA_TRUE;
576
577 /* Get the session context size based on the crypto and/or hash operations*/
578 status = cpaCySymDpSessionCtxGetSize(cyInstanceHandle, &sessionSetupData,
579 &sessionCtxSizeInBytes);
580 if (CPA_STATUS_SUCCESS != status) {
581 printf("Crypto: cpaCySymDpSessionCtxGetSize error, status: %"PRId32"\n",
582 status);
583 return CPA_STATUS_FAIL;
584 }
585
586 *ppSessionCtx = alloc_memzone_region(sessionCtxSizeInBytes, lcore_id);
587 if (NULL == *ppSessionCtx) {
588 printf("Crypto: Failed to allocate memory for Session Context\n");
589 return CPA_STATUS_FAIL;
590 }
591
592 status = cpaCySymDpInitSession(cyInstanceHandle, &sessionSetupData,
593 *ppSessionCtx);
594 if (CPA_STATUS_SUCCESS != status) {
595 printf("Crypto: cpaCySymDpInitSession failed with status %"PRId32"\n", status);
596 return CPA_STATUS_FAIL;
597 }
598 return CPA_STATUS_SUCCESS;
599}
600
601static CpaStatus
602initSessionDataTables(struct qa_core_conf *qaCoreConf,uint32_t lcore_id)
603{
604 Cpa32U i = 0, j = 0;
605 CpaStatus status = CPA_STATUS_FAIL;
606 for (i = 0; i < NUM_CRYPTO; i++) {
607 for (j = 0; j < NUM_HMAC; j++) {
608 if (((i == CIPHER_KASUMI_F8) && (j != NO_HASH) && (j != HASH_KASUMI_F9)) ||
609 ((i != NO_CIPHER) && (i != CIPHER_KASUMI_F8) && (j == HASH_KASUMI_F9)))
610 continue;
611 status = initCySymSession(i, j, CPA_CY_SYM_HASH_MODE_AUTH,
612 CPA_CY_SYM_CIPHER_DIRECTION_ENCRYPT,
613 &qaCoreConf->encryptSessionHandleTbl[i][j],
614 qaCoreConf->instanceHandle,
615 lcore_id);
616 if (CPA_STATUS_SUCCESS != status) {
617 printf("Crypto: Failed to initialize Encrypt sessions\n");
618 return CPA_STATUS_FAIL;
619 }
620 status = initCySymSession(i, j, CPA_CY_SYM_HASH_MODE_AUTH,
621 CPA_CY_SYM_CIPHER_DIRECTION_DECRYPT,
622 &qaCoreConf->decryptSessionHandleTbl[i][j],
623 qaCoreConf->instanceHandle,
624 lcore_id);
625 if (CPA_STATUS_SUCCESS != status) {
626 printf("Crypto: Failed to initialize Decrypt sessions\n");
627 return CPA_STATUS_FAIL;
628 }
629 }
630 }
631 return CPA_STATUS_SUCCESS;
632}
633
634int
635crypto_init(void)
636{
637 if (CPA_STATUS_SUCCESS != icp_sal_userStartMultiProcess("SSL",CPA_FALSE)) {
638 printf("Crypto: Could not start sal for user space\n");
639 return CPA_STATUS_FAIL;
640 }
641 printf("Crypto: icp_sal_userStartMultiProcess(\"SSL\",CPA_FALSE)\n");
642 return 0;
643}
644
645/*
646 * Per core initialisation
647 */
648int
649per_core_crypto_init(uint32_t lcore_id)
650{
651 CpaStatus status = CPA_STATUS_FAIL;
652 char memzone_name[RTE_MEMZONE_NAMESIZE];
653
654 int socketID = rte_lcore_to_socket_id(lcore_id);
655
656 /* Allocate software ring for response messages. */
657
658 qaCoreConf[lcore_id].callbackQueue.head = 0;
659 qaCoreConf[lcore_id].callbackQueue.tail = 0;
660 qaCoreConf[lcore_id].callbackQueue.numEntries = 0;
661 qaCoreConf[lcore_id].kickFreq = 0;
662 qaCoreConf[lcore_id].qaOutstandingRequests = 0;
663 qaCoreConf[lcore_id].numResponseAttempts = 0;
664
665 /* Initialise and reserve lcore memzone for virt2phys translation */
666 snprintf(memzone_name,
667 RTE_MEMZONE_NAMESIZE,
668 "lcore_%u",
669 lcore_id);
670
671 qaCoreConf[lcore_id].lcoreMemzone.memzone = rte_memzone_reserve(
672 memzone_name,
673 LCORE_MEMZONE_SIZE,
674 socketID,
675 0);
676 if (NULL == qaCoreConf[lcore_id].lcoreMemzone.memzone) {
677 printf("Crypto: Error allocating memzone on lcore %u\n",lcore_id);
678 return -1;
679 }
680 qaCoreConf[lcore_id].lcoreMemzone.next_free_address =
681 qaCoreConf[lcore_id].lcoreMemzone.memzone->addr;
682
683 qaCoreConf[lcore_id].pPacketIV = alloc_memzone_region(IV_LENGTH_16_BYTES,
684 lcore_id);
685
686 if (NULL == qaCoreConf[lcore_id].pPacketIV ) {
687 printf("Crypto: Failed to allocate memory for Initialization Vector\n");
688 return -1;
689 }
690
691 memcpy(qaCoreConf[lcore_id].pPacketIV, &g_crypto_hash_keys.iv,
692 IV_LENGTH_16_BYTES);
693
694 qaCoreConf[lcore_id].packetIVPhy = qa_v2p(qaCoreConf[lcore_id].pPacketIV);
695 if (0 == qaCoreConf[lcore_id].packetIVPhy) {
696 printf("Crypto: Invalid physical address for Initialization Vector\n");
697 return -1;
698 }
699
700 /*
701 * Obtain the instance handle that is mapped to the current lcore.
702 * This can fail if an instance is not mapped to a bank which has been
703 * affinitized to the current lcore.
704 */
705 status = get_crypto_instance_on_core(&(qaCoreConf[lcore_id].instanceHandle),
706 lcore_id);
707 if (CPA_STATUS_SUCCESS != status) {
708 printf("Crypto: get_crypto_instance_on_core failed with status: %"PRId32"\n",
709 status);
710 return -1;
711 }
712
713 status = cpaCySymDpRegCbFunc(qaCoreConf[lcore_id].instanceHandle,
714 (CpaCySymDpCbFunc) qa_crypto_callback);
715 if (CPA_STATUS_SUCCESS != status) {
716 printf("Crypto: cpaCySymDpRegCbFunc failed with status: %"PRId32"\n", status);
717 return -1;
718 }
719
720 /*
721 * Set the address translation callback for virtual to physcial address
722 * mapping. This will be called by the QAT driver during initialisation only.
723 */
724 status = cpaCySetAddressTranslation(qaCoreConf[lcore_id].instanceHandle,
725 (CpaVirtualToPhysical) qa_v2p);
726 if (CPA_STATUS_SUCCESS != status) {
727 printf("Crypto: cpaCySetAddressTranslation failed with status: %"PRId32"\n",
728 status);
729 return -1;
730 }
731
732 status = initSessionDataTables(&qaCoreConf[lcore_id],lcore_id);
733 if (CPA_STATUS_SUCCESS != status) {
734 printf("Crypto: Failed to allocate all session tables.");
735 return -1;
736 }
737 return 0;
738}
739
740static CpaStatus
741enqueueOp(CpaCySymDpOpData *opData, uint32_t lcore_id)
742{
743
744 CpaStatus status;
745
746 /*
747 * Assumption is there is no requirement to do load balancing between
748 * acceleration units - that is one acceleration unit is tied to a core.
749 */
750 opData->instanceHandle = qaCoreConf[lcore_id].instanceHandle;
751
752 if ((++qaCoreConf[lcore_id].kickFreq) % CRYPTO_BURST_TX == 0) {
753 status = cpaCySymDpEnqueueOp(opData, CPA_TRUE);
754 } else {
755 status = cpaCySymDpEnqueueOp(opData, CPA_FALSE);
756 }
757
758 qaCoreConf[lcore_id].qaOutstandingRequests++;
759
760 return status;
761}
762
763void
764crypto_flush_tx_queue(uint32_t lcore_id)
765{
766
767 cpaCySymDpPerformOpNow(qaCoreConf[lcore_id].instanceHandle);
768}
769
770enum crypto_result
771crypto_encrypt(struct rte_mbuf *rte_buff, enum cipher_alg c, enum hash_alg h)
772{
773 CpaCySymDpOpData *opData =
774 rte_pktmbuf_mtod_offset(rte_buff, CpaCySymDpOpData *,
775 CRYPTO_OFFSET_TO_OPDATA);
776 uint32_t lcore_id;
777
778 if (unlikely(c >= NUM_CRYPTO || h >= NUM_HMAC))
779 return CRYPTO_RESULT_FAIL;
780
781 lcore_id = rte_lcore_id();
782
783 memset(opData, 0, sizeof(CpaCySymDpOpData));
784
785 opData->srcBuffer = opData->dstBuffer = PACKET_DATA_START_PHYS(rte_buff);
786 opData->srcBufferLen = opData->dstBufferLen = rte_buff->data_len;
787 opData->sessionCtx = qaCoreConf[lcore_id].encryptSessionHandleTbl[c][h];
788 opData->thisPhys = PACKET_DATA_START_PHYS(rte_buff)
789 + CRYPTO_OFFSET_TO_OPDATA;
790 opData->pCallbackTag = rte_buff;
791
792 /* if no crypto or hash operations are specified return fail */
793 if (NO_CIPHER == c && NO_HASH == h)
794 return CRYPTO_RESULT_FAIL;
795
796 if (NO_CIPHER != c) {
797 opData->pIv = qaCoreConf[lcore_id].pPacketIV;
798 opData->iv = qaCoreConf[lcore_id].packetIVPhy;
799
800 if (CIPHER_AES_CBC_128 == c)
801 opData->ivLenInBytes = IV_LENGTH_16_BYTES;
802 else
803 opData->ivLenInBytes = IV_LENGTH_8_BYTES;
804
805 opData->cryptoStartSrcOffsetInBytes = CRYPTO_START_OFFSET;
806 opData->messageLenToCipherInBytes = rte_buff->data_len
807 - CRYPTO_START_OFFSET;
808 /*
809 * Work around for padding, message length has to be a multiple of
810 * block size.
811 */
812 opData->messageLenToCipherInBytes -= opData->messageLenToCipherInBytes
813 % CIPHER_BLOCK_DEFAULT_SIZE;
814 }
815
816 if (NO_HASH != h) {
817
818 opData->hashStartSrcOffsetInBytes = HASH_START_OFFSET;
819 opData->messageLenToHashInBytes = rte_buff->data_len
820 - HASH_START_OFFSET;
821 /*
822 * Work around for padding, message length has to be a multiple of block
823 * size.
824 */
825 opData->messageLenToHashInBytes -= opData->messageLenToHashInBytes
826 % HASH_BLOCK_DEFAULT_SIZE;
827
828 /*
829 * Assumption: Ok ignore the passed digest pointer and place HMAC at end
830 * of packet.
831 */
832 opData->digestResult = rte_buff->buf_physaddr + rte_buff->data_len;
833 }
834
835 if (CPA_STATUS_SUCCESS != enqueueOp(opData, lcore_id)) {
836 /*
837 * Failed to place a packet on the hardware queue.
838 * Most likely because the QA hardware is busy.
839 */
840 return CRYPTO_RESULT_FAIL;
841 }
842 return CRYPTO_RESULT_IN_PROGRESS;
843}
844
845enum crypto_result
846crypto_decrypt(struct rte_mbuf *rte_buff, enum cipher_alg c, enum hash_alg h)
847{
848
849 CpaCySymDpOpData *opData = rte_pktmbuf_mtod_offset(rte_buff, void *,
850 CRYPTO_OFFSET_TO_OPDATA);
851 uint32_t lcore_id;
852
853 if (unlikely(c >= NUM_CRYPTO || h >= NUM_HMAC))
854 return CRYPTO_RESULT_FAIL;
855
856 lcore_id = rte_lcore_id();
857
858 memset(opData, 0, sizeof(CpaCySymDpOpData));
859
860 opData->dstBuffer = opData->srcBuffer = PACKET_DATA_START_PHYS(rte_buff);
861 opData->dstBufferLen = opData->srcBufferLen = rte_buff->data_len;
862 opData->thisPhys = PACKET_DATA_START_PHYS(rte_buff)
863 + CRYPTO_OFFSET_TO_OPDATA;
864 opData->sessionCtx = qaCoreConf[lcore_id].decryptSessionHandleTbl[c][h];
865 opData->pCallbackTag = rte_buff;
866
867 /* if no crypto or hmac operations are specified return fail */
868 if (NO_CIPHER == c && NO_HASH == h)
869 return CRYPTO_RESULT_FAIL;
870
871 if (NO_CIPHER != c) {
872 opData->pIv = qaCoreConf[lcore_id].pPacketIV;
873 opData->iv = qaCoreConf[lcore_id].packetIVPhy;
874
875 if (CIPHER_AES_CBC_128 == c)
876 opData->ivLenInBytes = IV_LENGTH_16_BYTES;
877 else
878 opData->ivLenInBytes = IV_LENGTH_8_BYTES;
879
880 opData->cryptoStartSrcOffsetInBytes = CRYPTO_START_OFFSET;
881 opData->messageLenToCipherInBytes = rte_buff->data_len
882 - CRYPTO_START_OFFSET;
883
884 /*
885 * Work around for padding, message length has to be a multiple of block
886 * size.
887 */
888 opData->messageLenToCipherInBytes -= opData->messageLenToCipherInBytes
889 % CIPHER_BLOCK_DEFAULT_SIZE;
890 }
891 if (NO_HASH != h) {
892 opData->hashStartSrcOffsetInBytes = HASH_START_OFFSET;
893 opData->messageLenToHashInBytes = rte_buff->data_len
894 - HASH_START_OFFSET;
895 /*
896 * Work around for padding, message length has to be a multiple of block
897 * size.
898 */
899 opData->messageLenToHashInBytes -= opData->messageLenToHashInBytes
900 % HASH_BLOCK_DEFAULT_SIZE;
901 opData->digestResult = rte_buff->buf_physaddr + rte_buff->data_len;
902 }
903
904 if (CPA_STATUS_SUCCESS != enqueueOp(opData, lcore_id)) {
905 /*
906 * Failed to place a packet on the hardware queue.
907 * Most likely because the QA hardware is busy.
908 */
909 return CRYPTO_RESULT_FAIL;
910 }
911 return CRYPTO_RESULT_IN_PROGRESS;
912}
913
914void *
915crypto_get_next_response(void)
916{
917 uint32_t lcore_id;
918 lcore_id = rte_lcore_id();
919 struct qa_callbackQueue *callbackQ = &(qaCoreConf[lcore_id].callbackQueue);
920 void *entry = NULL;
921
922 if (callbackQ->numEntries) {
923 entry = callbackQ->qaCallbackRing[callbackQ->tail];
924 callbackQ->tail++;
925 callbackQ->numEntries--;
926 }
927
928 /* If there are no outstanding requests no need to poll, return entry */
929 if (qaCoreConf[lcore_id].qaOutstandingRequests == 0)
930 return entry;
931
932 if (callbackQ->numEntries < CRYPTO_QUEUED_RESP_POLL_THRESHOLD
933 && qaCoreConf[lcore_id].numResponseAttempts++
934 % GET_NEXT_RESPONSE_FREQ == 0) {
935 /*
936 * Only poll the hardware when there is less than
937 * CRYPTO_QUEUED_RESP_POLL_THRESHOLD elements in the software queue
938 */
939 icp_sal_CyPollDpInstance(qaCoreConf[lcore_id].instanceHandle,
940 CRYPTO_MAX_RESPONSE_QUOTA);
941 }
942 return entry;
943}