> -----Original Message-----
> From: Anoob Joseph <ano...@marvell.com>
> Sent: Friday, August 11, 2023 8:17 AM
> To: Thomas Monjalon <tho...@monjalon.net>; Akhil Goyal
> <gak...@marvell.com>; Jerin Jacob <jer...@marvell.com>; Konstantin Ananyev
> <konstantin.v.anan...@yandex.ru>
> Cc: Hemant Agrawal <hemant.agra...@nxp.com>; dev@dpdk.org; Matz,
> Olivier <olivier.m...@6wind.com>; Vidya Sagar Velumuri
> <vvelum...@marvell.com>
> Subject: [RFC PATCH 3/3] cryptodev: add details of datapath handling of TLS
> records
> 
> TLS/DTLS record processing requires content type to be provided per
> packet (for record write operation). Extend usage of
> rte_crypto_op.aux_flags for the same purpose.

I understand the goal to extend the usage of the aux_flags, but I do not 
understand
what data/structs/values I should use to set or error-check the aux-flags here.



> 
> Signed-off-by: Akhil Goyal <gak...@marvell.com>
> Signed-off-by: Anoob Joseph <ano...@marvell.com>
> Signed-off-by: Vidya Sagar Velumuri <vvelum...@marvell.com>
> ---
>  doc/guides/prog_guide/rte_security.rst | 10 ++++++++++
>  lib/cryptodev/rte_crypto.h             |  6 ++++++
>  2 files changed, 16 insertions(+)
> 
> diff --git a/doc/guides/prog_guide/rte_security.rst
> b/doc/guides/prog_guide/rte_security.rst
> index 7716d7239f..6cb69bc949 100644
> --- a/doc/guides/prog_guide/rte_security.rst
> +++ b/doc/guides/prog_guide/rte_security.rst
> @@ -451,6 +451,16 @@ Protocol. The TLS Record Protocol provides
> connection security that has two basi
>                    V                              V
>              TLSCiphertext                  TLSPlaintext
> 
> +TLS and DTLS header formation (in record write operation) would depend on
> the
> +type of content. It is a per packet variable and would need to be handled by
> +the same session. Application may pass this info to a cryptodev performing
> +lookaside protocol offload by passing the same in 
> ``rte_crypto_op.aux_flags``.
> +
> +In record read operation, application is required to preserve any info it may
> +need from the TLS/DTLS header (such as content type and sequence number)
> as the
> +cryptodev would remove the header and padding as part of the lookaside
> protocol
> +processing.
> +
>  Supported Versions
>  ^^^^^^^^^^^^^^^^^^
> 
> diff --git a/lib/cryptodev/rte_crypto.h b/lib/cryptodev/rte_crypto.h
> index 9b8d0331a4..7c12a2b705 100644
> --- a/lib/cryptodev/rte_crypto.h
> +++ b/lib/cryptodev/rte_crypto.h
> @@ -101,6 +101,12 @@ struct rte_crypto_op {
>                       /**< Operation specific auxiliary/additional flags.
>                        * These flags carry additional information from the
>                        * operation. Processing of the same is optional.

It says "processing is optional" here, but in TLS/DTLS, it is proposed that the
soft-error and hard-errors are returned to the user through this struct?
That is not optional, and failing to check that is a failure mode which can 
result
in IV-reuse, and hence decryption of payload by a malicious actor?

I see this part of the API as being critical to correct usage, and it does not 
seem
well defined or clear to me at this point. If I am mis-understanding, please 
clarify,
as likely other developers will likely mis-understand too. Example code 
snippets of
good hardened error-handling for soft-error and hard-error would help.


> +                      * With TLS record offload
> (RTE_SECURITY_PROTOCOL_TLS_RECORD),
> +                      * application would be required to provide the message
> +                      * type of the input provided. The 'aux_flags' field
> +                      * can be used for passing the same. Message types are
> +                      * listed as RTE_TLS_TYPE_* and RTE_DTLS_TYPE_*.
>                        */

Same comment as above the "aux_fields can be used" string does not explain to 
the user
*how* to use the field correctly. Examples (in rte_security.rst?) would help.

>                       uint8_t reserved[2];
>                       /**< Reserved bytes to fill 64 bits for
> --
> 2.25.1

Reply via email to