> -----Original Message----- > From: Anoob Joseph <ano...@marvell.com> > Sent: Friday, August 11, 2023 8:17 AM > To: Thomas Monjalon <tho...@monjalon.net>; Akhil Goyal > <gak...@marvell.com>; Jerin Jacob <jer...@marvell.com>; Konstantin Ananyev > <konstantin.v.anan...@yandex.ru> > Cc: Hemant Agrawal <hemant.agra...@nxp.com>; dev@dpdk.org; Matz, > Olivier <olivier.m...@6wind.com>; Vidya Sagar Velumuri > <vvelum...@marvell.com> > Subject: [RFC PATCH 1/3] net: add headers for TLS/DTLS packets > > From: Akhil Goyal <gak...@marvell.com> > > Added TLS and DTLS packet headers for L4 security applications. > > Signed-off-by: Akhil Goyal <gak...@marvell.com> > Signed-off-by: Anoob Joseph <ano...@marvell.com> > Signed-off-by: Vidya Sagar Velumuri <vvelum...@marvell.com> > --- > doc/api/doxy-api-index.md | 2 ++ > lib/net/meson.build | 2 ++ > lib/net/rte_dtls.h | 61 +++++++++++++++++++++++++++++++++++++++ > lib/net/rte_tls.h | 48 ++++++++++++++++++++++++++++++ > 4 files changed, 113 insertions(+) > create mode 100644 lib/net/rte_dtls.h > create mode 100644 lib/net/rte_tls.h > > diff --git a/doc/api/doxy-api-index.md b/doc/api/doxy-api-index.md > index fdeda13932..03e2445bb1 100644 > --- a/doc/api/doxy-api-index.md > +++ b/doc/api/doxy-api-index.md > @@ -128,6 +128,8 @@ The public API headers are grouped by topics: > [eCPRI](@ref rte_ecpri.h), > [PDCP hdr](@ref rte_pdcp_hdr.h), > [PDCP](@ref rte_pdcp.h), > + [TLS](@ref rte_tls.h), > + [DTLS](@ref rte_dtls.h), > [L2TPv2](@ref rte_l2tpv2.h), > [PPP](@ref rte_ppp.h), > [IB](@ref rte_ib.h) > diff --git a/lib/net/meson.build b/lib/net/meson.build > index b1bc27bad5..0b69138949 100644 > --- a/lib/net/meson.build > +++ b/lib/net/meson.build > @@ -5,6 +5,8 @@ headers = files( > 'rte_ip.h', > 'rte_tcp.h', > 'rte_udp.h', > + 'rte_tls.h', > + 'rte_dtls.h', > 'rte_esp.h', > 'rte_sctp.h', > 'rte_icmp.h', > diff --git a/lib/net/rte_dtls.h b/lib/net/rte_dtls.h > new file mode 100644 > index 0000000000..1455c07a92 > --- /dev/null > +++ b/lib/net/rte_dtls.h > @@ -0,0 +1,61 @@ > +/* SPDX-License-Identifier: BSD-3-Clause > + * Copyright(C) 2023 Marvell. > + */ > + > +#ifndef RTE_DTLS_H > +#define RTE_DTLS_H > + > +/** > + * @file > + * > + * Datagram transport layer security(DTLS) related defines. > + */ > + > +#include <rte_byteorder.h> > + > +#ifdef __cplusplus > +extern "C" { > +#endif > + > +#define RTE_DTLS_TYPE_INVALID 0 /**< Invalid DTLS message type. */ > +#define RTE_DTLS_TYPE_CCS 20 /**< Change cipher message. */
I don't see the "CCS" acronym in the RFC, suggest to make more accurate/verbose; - Rename to RTE_DTLS_TYPE_CHANGE_CIPHER (or RTE_DTLS_TYPE_CHANGE_CIPHER_SPEC if preferred) - Reword description to "change cipher" to "change cipher spec message." > +#define RTE_DTLS_TYPE_ALERT 21 /**< Alert message. */ > +#define RTE_DTLS_TYPE_HANDSHAKE 22 /**< Handshake message for > DTLS. */ > +#define RTE_DTLS_TYPE_APPDATA 23 /**< DTLS application data message. > */ > +#define RTE_DTLS_TYPE_HEARTBEAT 24 /**< DTLS 1.3 heartbeat message. */ > +#define RTE_DTLS_TYPE_CIPHERTEXT_WITH_CID 25 /**< DTLS 1.3 > ciphertext with CID message. */ > +#define RTE_DTLS_TYPE_ACK 26 /**< DTLS 1.3 ACK message. */ > +#define RTE_DTLS_TYPE_MAX 255 /**< Maximum value as DTLS > content type. */ > + > +#define RTE_DTLS_VERSION_1_2 0xFEFD /**< DTLS 1.2 version. 1's > complement of 1.2. */ > +#define RTE_DTLS_VERSION_1_3 0xFEFC /**< DTLS 1.3 version. 1's > complement of 1.3. */ > > + > +/** > + * DTLS Header > + */ > +__extension__ > +struct rte_dtls_hdr { > + /** Content type of DTLS packet. Defined as RTE_DTLS_TYPE_*. */ > + uint8_t type; > + /** DTLS Version defined as RTE_DTLS_VERSION*. */ > + rte_be16_t version; (same comment on be16_t vs struct as in TLS version below, no rework needed) > +#if RTE_BYTE_ORDER == RTE_LITTLE_ENDIAN > + /** The sequence number for the DTLS record. */ > + uint64_t sequence_number : 48; > + /** A counter value that is incremented on every cipher state change. > */ > + uint64_t epoch : 16; > +#elif RTE_BYTE_ORDER == RTE_BIG_ENDIAN > + /** A counter value that is incremented on every cipher state change. > */ > + uint64_t epoch : 16; > + /** The sequence number for the DTLS record. */ > + uint64_t sequence_number : 48; > +#endif > + /** The length (in bytes) of the following DTLS packet. */ > + rte_be16_t length; > +} __rte_packed; > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* RTE_DTLS_H */ > diff --git a/lib/net/rte_tls.h b/lib/net/rte_tls.h > new file mode 100644 > index 0000000000..d708d06014 > --- /dev/null > +++ b/lib/net/rte_tls.h > @@ -0,0 +1,48 @@ > +/* SPDX-License-Identifier: BSD-3-Clause > + * Copyright(C) 2023 Marvell. > + */ > + > +#ifndef RTE_TLS_H > +#define RTE_TLS_H > + > +/** > + * @file > + * > + * Transport layer security(TLS) related defines. > + */ > + > +#include <rte_byteorder.h> > + > +#ifdef __cplusplus > +extern "C" { > +#endif > + > +#define RTE_TLS_TYPE_INVALID 0 /**< Invalid TLS message type. */ > +#define RTE_TLS_TYPE_CCS 20 /**< Change cipher message. */ > +#define RTE_TLS_TYPE_ALERT 21 /**< Alert message. */ > +#define RTE_TLS_TYPE_HANDSHAKE 22 /**< Handshake message for TLS. */ > +#define RTE_TLS_TYPE_APPDATA 23 /**< TLS application data message. */ > +#define RTE_TLS_TYPE_HEARTBEAT 24 /**< TLS 1.3 heartbeat message. */ > +#define RTE_TLS_TYPE_MAX 255 /**< Maximum value as TLS content type. > */ > + > +#define RTE_TLS_VERSION_1_2 0x0303 /**< TLS 1.2 version. */ > +#define RTE_TLS_VERSION_1_3 0x0304 /**< TLS 1.3 version. */ > + > +/** > + * TLS Header > + */ > +__extension__ > +struct rte_tls_hdr { > + /** Content type of TLS packet. Defined as RTE_TLS_TYPE_*. */ > + uint8_t type; > + /** TLS Version defined as RTE_TLS_VERSION*. */ > + rte_be16_t version; In the RFC, version is defined as "struct ProtocolVersion" with two uint8's? https://www.rfc-editor.org/rfc/rfc5246.html#appendix-A.1 With correct endianness handling this is the same, but the struct with is simpler to RFC, while rte_be16_t is easier to ensure single load/store at code level. No need to change, just pointing out the different impl (but same effect) as RFC. > + /** The length (in bytes) of the following TLS packet. */ > + rte_be16_t length; > +} __rte_packed; > + > +#ifdef __cplusplus > +} > +#endif > + > +#endif /* RTE_TLS_H */ > -- > 2.25.1