Sessions are used in symmetric transformations in order to prepare
objects and data for packet processing stage.

A mlx5 session includes iv_offset, pointer to mlx5_crypto_dek struct,
bsf_size, bsf_p_type, encryption_order and encryption standard.

Implement the next session operations:
        mlx5_crypto_sym_session_get_size- returns the size of the mlx5
        session struct.
        mlx5_crypto_sym_session_configure- prepares the DEK hash-list
        and saves all the session data.
        mlx5_crypto_sym_session_clear - destroys the DEK hash-list.

Signed-off-by: Shiri Kuzin <shi...@nvidia.com>
Acked-by: Matan Azrad <ma...@nvidia.com>
---
 drivers/crypto/mlx5/mlx5_crypto.c | 92 ++++++++++++++++++++++++++++++-
 1 file changed, 89 insertions(+), 3 deletions(-)

diff --git a/drivers/crypto/mlx5/mlx5_crypto.c 
b/drivers/crypto/mlx5/mlx5_crypto.c
index 17aaaaa53d..b0242afec4 100644
--- a/drivers/crypto/mlx5/mlx5_crypto.c
+++ b/drivers/crypto/mlx5/mlx5_crypto.c
@@ -3,6 +3,7 @@
  */
 
 #include <rte_malloc.h>
+#include <rte_mempool.h>
 #include <rte_errno.h>
 #include <rte_log.h>
 #include <rte_pci.h>
@@ -36,6 +37,23 @@ static const struct rte_driver mlx5_drv = {
 
 static struct cryptodev_driver mlx5_cryptodev_driver;
 
+struct mlx5_crypto_session {
+       uint32_t bs_bpt_eo_es;
+       /*
+        * bsf_size, bsf_p_type, encryption_order and encryption standard,
+        * saved in big endian format.
+        */
+       uint32_t iv_offset:16;
+       /* Starting point for Initialisation Vector. */
+       struct mlx5_crypto_dek *dek; /* Pointer to dek struct. */
+} __rte_packed;
+
+static unsigned int
+mlx5_crypto_sym_session_get_size(struct rte_cryptodev *dev __rte_unused)
+{
+       return sizeof(struct mlx5_crypto_session);
+}
+
 static int
 mlx5_crypto_dev_configure(struct rte_cryptodev *dev,
                struct rte_cryptodev_config *config __rte_unused)
@@ -58,6 +76,74 @@ mlx5_crypto_dev_close(struct rte_cryptodev *dev)
        return 0;
 }
 
+static int
+mlx5_crypto_sym_session_configure(struct rte_cryptodev *dev,
+                                 struct rte_crypto_sym_xform *xform,
+                                 struct rte_cryptodev_sym_session *session,
+                                 struct rte_mempool *mp)
+{
+       struct mlx5_crypto_priv *priv = dev->data->dev_private;
+       struct mlx5_crypto_session *sess_private_data;
+       struct rte_crypto_cipher_xform *cipher;
+       uint8_t encryption_order;
+       int ret;
+
+       if (unlikely(xform->next != NULL)) {
+               DRV_LOG(ERR, "Xform next is not supported.");
+               return -ENOTSUP;
+       }
+       if (unlikely((xform->type != RTE_CRYPTO_SYM_XFORM_CIPHER) ||
+                    (xform->cipher.algo != RTE_CRYPTO_CIPHER_AES_XTS))) {
+               DRV_LOG(ERR, "Only AES-XTS algorithm is supported.");
+               return -ENOTSUP;
+       }
+       ret = rte_mempool_get(mp, (void *)&sess_private_data);
+       if (ret != 0) {
+               DRV_LOG(ERR,
+                       "Failed to get session %p private data from mempool.",
+                       sess_private_data);
+               return -ENOMEM;
+       }
+       cipher = &xform->cipher;
+       sess_private_data->dek = mlx5_crypto_dek_prepare(priv, cipher);
+       if (sess_private_data->dek == NULL) {
+               rte_mempool_put(mp, sess_private_data);
+               DRV_LOG(ERR, "Failed to prepare dek.");
+               return -ENOMEM;
+       }
+       if (cipher->op == RTE_CRYPTO_CIPHER_OP_ENCRYPT)
+               encryption_order = MLX5_ENCRYPTION_ORDER_ENCRYPTED_RAW_MEMORY;
+       else
+               encryption_order = MLX5_ENCRYPTION_ORDER_ENCRYPTED_RAW_WIRE;
+       sess_private_data->bs_bpt_eo_es = rte_cpu_to_be_32
+                       (MLX5_BSF_SIZE_64B << MLX5_BSF_SIZE_OFFSET |
+                        MLX5_BSF_P_TYPE_CRYPTO << MLX5_BSF_P_TYPE_OFFSET |
+                        encryption_order << MLX5_ENCRYPTION_ORDER_OFFSET |
+                        MLX5_ENCRYPTION_STANDARD_AES_XTS);
+       sess_private_data->iv_offset = cipher->iv.offset;
+       set_sym_session_private_data(session, dev->driver_id,
+                                    sess_private_data);
+       DRV_LOG(DEBUG, "Session %p was configured.", sess_private_data);
+       return 0;
+}
+
+static void
+mlx5_crypto_sym_session_clear(struct rte_cryptodev *dev,
+                             struct rte_cryptodev_sym_session *sess)
+{
+       struct mlx5_crypto_priv *priv = dev->data->dev_private;
+       struct mlx5_crypto_session *sess_private_data =
+                       get_sym_session_private_data(sess, dev->driver_id);
+
+       if (unlikely(sess_private_data == NULL)) {
+               DRV_LOG(ERR, "Failed to get session %p private data.",
+                               sess_private_data);
+               return;
+       }
+       mlx5_crypto_dek_destroy(priv, sess_private_data->dek);
+       DRV_LOG(DEBUG, "Session %p was cleared.", sess_private_data);
+}
+
 static struct rte_cryptodev_ops mlx5_crypto_ops = {
        .dev_configure                  = mlx5_crypto_dev_configure,
        .dev_start                      = NULL,
@@ -68,9 +154,9 @@ static struct rte_cryptodev_ops mlx5_crypto_ops = {
        .stats_reset                    = NULL,
        .queue_pair_setup               = NULL,
        .queue_pair_release             = NULL,
-       .sym_session_get_size           = NULL,
-       .sym_session_configure          = NULL,
-       .sym_session_clear              = NULL,
+       .sym_session_get_size           = mlx5_crypto_sym_session_get_size,
+       .sym_session_configure          = mlx5_crypto_sym_session_configure,
+       .sym_session_clear              = mlx5_crypto_sym_session_clear,
        .sym_get_raw_dp_ctx_size        = NULL,
        .sym_configure_raw_dp_ctx       = NULL,
 };
-- 
2.21.0

Reply via email to