Hi Adam, Anoob,
> > > >
> > > > > -----Original Message-----
> > > > > From: dev <dev-boun...@dpdk.org> On Behalf Of Adam Dybkowski
> > > > > Sent: Monday, May 18, 2020 7:54 PM
> > > > > To: dev@dpdk.org; fiona.tr...@intel.com; akhil.go...@nxp.com
> > > > > Cc: Adam Dybkowski <adamx.dybkow...@intel.com>; sta...@dpdk.org
> > > > > Subject: [dpdk-dev] [PATCH] cryptodev: fix SHA-1 digest enum
> > > > > comment
> > > > >
> > > > > This patch fixes improper SHA-1 digest size in the enum comment.
> > > > >
> > > > > Fixes: 1bd407fac80b ("cryptodev: extract symmetric operations")
> > > > > Cc: sta...@dpdk.org
> > > > >
> > > > > Signed-off-by: Adam Dybkowski <adamx.dybkow...@intel.com>
> > > > > ---
> > > > >  lib/librte_cryptodev/rte_crypto_sym.h | 4 ++--
> > > > >  1 file changed, 2 insertions(+), 2 deletions(-)
> > > > >
> > > > > diff --git a/lib/librte_cryptodev/rte_crypto_sym.h
> > > > > b/lib/librte_cryptodev/rte_crypto_sym.h
> > > > > index d9585ecd6..9cea4e5f0 100644
> > > > > --- a/lib/librte_cryptodev/rte_crypto_sym.h
> > > > > +++ b/lib/librte_cryptodev/rte_crypto_sym.h
> > > > > @@ -269,9 +269,9 @@ enum rte_crypto_auth_algorithm {
> > > > >       /**< HMAC using MD5 algorithm */
> > > > >
> > > > >       RTE_CRYPTO_AUTH_SHA1,
> > > > > -     /**< 128 bit SHA algorithm. */
> > > > > +     /**< 160 bit SHA algorithm. */
> > > > >       RTE_CRYPTO_AUTH_SHA1_HMAC,
> > > > > -     /**< HMAC using 128 bit SHA algorithm. */
> > > > > +     /**< HMAC using 160 bit SHA algorithm. */
> > > >
> > > > [Anoob] This raises one interesting question. Is HMAC-SHA-1-96
> > > > (https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org
> > > > _h
> > > >
> > >
> > tml_rfc2404&d=DwIFAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=jPfB8rwwviRSxyL
> > Ws2
> > > n6B-
> > >
> > WYLn1v9SyTMrT5EQqh2TU&m=pgqB2BfFosCF_7l1SdoodgXcipf7G1ofht68ZK
> > Mt
> > > oW0&s=hxzUN2QfRJGaR7NQ7VKGm5oQvOZez6Z70mqOyg7gKTY&e= )
> > treated as a
> > > separate algorithm or is it a digest size variant of
> > > RTE_CRYPTO_AUTH_SHA1_HMAC? I assume the later.
> > >
> > > [Adam] DPDK doesn't have separate enums for such variations. According
> > > to RFC 2104, chapter "5. Truncated output", the calculation of
> > > HMAC-SHA-1-96 is done using ordinary HMAC-SHA-1, but the calculation
> > > result is then truncated to 96 bits, or any other digest size provided in 
> > > auth
> > xform.
> >
> > [Anoob] So it is allowed to support digest sizes 12 & 20, right? Can you
> > update the above comment in that case?
> 
> [Adam] This depends on a particular PMD and its capabilities so we cannot 
> write here in this public
> header file. For example, have a look in the capabilities structure of QAT 
> PMD:
> 
>       {       /* SHA1 */                                              \
>               .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC,                     \
>               {.sym = {                                               \
>                       .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH,        \
>                       {.auth = {                                      \
>                               .algo = RTE_CRYPTO_AUTH_SHA1,           \
>                               .block_size = 64,                       \
>                               .key_size = {                           \
>                                       .min = 0,                       \
>                                       .max = 0,                       \
>                                       .increment = 0                  \
>                               },                                      \
>                               .digest_size = {                        \
>                                       .min = 1,                       \
>                                       .max = 20,                      \
>                                       .increment = 1                  \
>                               },                                      \
>                               .iv_size = { 0 }                        \
>                       }, }                                            \
>               }, }                                                    \
>       },                                                              \
> 
> It shows QAT PMD is able to truncate the output digest to any size from 1 to 
> 20 bytes (160 bits).
> 
> This can be different in other PMDs, for example OpenSSL and CCP PMDs allow 
> only 20-byte digests
> here while Marvell MVSAM allows 12-20 bytes.
> 
> Adam
[Fiona] True. But as 96 bits is a standard variant described in the spec, how 
about adding

/**< HMAC using 160 bit SHA algorithm. 
HMAC-SHA-1-96 can be generated by setting digest_size to 12 */

This doesn't imply that all PMDs must support that - same as for any other 
feature, the capabilities can vary.

Reply via email to