> -----Original Message----- > From: dev <dev-boun...@dpdk.org> On Behalf Of Arek Kusztal > Sent: Monday, January 13, 2020 4:14 PM > To: dev@dpdk.org > Cc: akhil.go...@nxp.com; fiona.tr...@intel.com; Arek Kusztal > <arkadiuszx.kusz...@intel.com> > Subject: [dpdk-dev] [PATCH v3] cryptodev: add chacha20-poly1305 aead > algorithm > > This patch adds Chacha20-Poly1305 AEAD algorithm to Cryptodev. > > Signed-off-by: Arek Kusztal <arkadiuszx.kusz...@intel.com> > Acked-by: Fiona Trahe <fiona.tr...@intel.com>
Acked-by: Anoob Joseph <ano...@marvell.com> > --- > v2: > - moved release notes to 20.02 > v3: > - added algorithm strings > > doc/guides/cryptodevs/features/default.ini | 13 +++++++------ > doc/guides/rel_notes/release_20_02.rst | 4 ++++ > lib/librte_cryptodev/rte_crypto_sym.h | 9 +++++++++ > lib/librte_cryptodev/rte_cryptodev.c | 1 + > 4 files changed, 21 insertions(+), 6 deletions(-) > > diff --git a/doc/guides/cryptodevs/features/default.ini > b/doc/guides/cryptodevs/features/default.ini > index b7f9a0a..2a3ff48 100644 > --- a/doc/guides/cryptodevs/features/default.ini > +++ b/doc/guides/cryptodevs/features/default.ini > @@ -93,12 +93,13 @@ SHA3_512 HMAC = > ; Supported AEAD algorithms of a default crypto driver. > ; > [AEAD] > -AES GCM (128) = > -AES GCM (192) = > -AES GCM (256) = > -AES CCM (128) = > -AES CCM (192) = > -AES CCM (256) = > +AES GCM (128) = > +AES GCM (192) = > +AES GCM (256) = > +AES CCM (128) = > +AES CCM (192) = > +AES CCM (256) = > +CHACHA20-POLY1305 = > ; > ; Supported Asymmetric algorithms of a default crypto driver. > ; > diff --git a/doc/guides/rel_notes/release_20_02.rst > b/doc/guides/rel_notes/release_20_02.rst > index 0eaa45a..6b60f47 100644 > --- a/doc/guides/rel_notes/release_20_02.rst > +++ b/doc/guides/rel_notes/release_20_02.rst > @@ -56,6 +56,10 @@ New Features > Also, make sure to start the actual text at the margin. > ========================================================= > > +* **Added Chacha20-Poly1305 algorithm to Cryptodev API.** > + > + Chacha20-Poly1305 AEAD algorithm can now be supported in Cryptodev. > + > > Removed Items > ------------- > diff --git a/lib/librte_cryptodev/rte_crypto_sym.h > b/lib/librte_cryptodev/rte_crypto_sym.h > index ffa038d..bc356f6 100644 > --- a/lib/librte_cryptodev/rte_crypto_sym.h > +++ b/lib/librte_cryptodev/rte_crypto_sym.h > @@ -348,6 +348,8 @@ enum rte_crypto_aead_algorithm { > /**< AES algorithm in CCM mode. */ > RTE_CRYPTO_AEAD_AES_GCM, > /**< AES algorithm in GCM mode. */ > + RTE_CRYPTO_AEAD_CHACHA20_POLY1305, > + /**< Chacha20 cipher with poly1305 authenticator */ > RTE_CRYPTO_AEAD_LIST_END > }; > > @@ -391,6 +393,11 @@ struct rte_crypto_aead_xform { > * be allocated, even though the length field will > * have a value less than this. > * > + * - For Chacha20-Poly1305 it is 96-bit nonce. > + * PMD sets initial counter for Poly1305 key generation > + * part to 0 and for Chacha20 encryption to 1 as per > + * rfc8439 2.8. AEAD construction. > + * > * For optimum performance, the data pointed to SHOULD > * be 8-byte aligned. > */ > @@ -407,6 +414,8 @@ struct rte_crypto_aead_xform { > * > * - For CCM mode, this is the length of the nonce, > * which can be in the range 7 to 13 inclusive. > + * > + * - For Chacha20-Poly1305 this field is always 12. > */ > } iv; /**< Initialisation vector parameters */ > > diff --git a/lib/librte_cryptodev/rte_cryptodev.c > b/lib/librte_cryptodev/rte_cryptodev.c > index 89aa2ed..410520f 100644 > --- a/lib/librte_cryptodev/rte_cryptodev.c > +++ b/lib/librte_cryptodev/rte_cryptodev.c > @@ -151,6 +151,7 @@ const char * > rte_crypto_aead_algorithm_strings[] = { > [RTE_CRYPTO_AEAD_AES_CCM] = "aes-ccm", > [RTE_CRYPTO_AEAD_AES_GCM] = "aes-gcm", > + [RTE_CRYPTO_AEAD_CHACHA20_POLY1305] = "chacha20-poly1305" > }; > > /** > -- > 2.1.0