Enabling the SHA224 support in ipsec proto mode
for dpaax drivers.

Signed-off-by: Hemant Agrawal <hemant.agra...@nxp.com>
---
 drivers/common/dpaax/caamflib/desc.h             |  5 ++++-
 drivers/common/dpaax/caamflib/desc/ipsec.h       |  5 +++++
 drivers/common/dpaax/caamflib/rta/protocol_cmd.h |  5 ++++-
 drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c      | 10 +++++++++-
 drivers/crypto/dpaa_sec/dpaa_sec.c               | 10 +++++++++-
 5 files changed, 31 insertions(+), 4 deletions(-)

diff --git a/drivers/common/dpaax/caamflib/desc.h 
b/drivers/common/dpaax/caamflib/desc.h
index 635d6bad07..4a1285c4d4 100644
--- a/drivers/common/dpaax/caamflib/desc.h
+++ b/drivers/common/dpaax/caamflib/desc.h
@@ -1,7 +1,7 @@
 /* SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0)
  *
  * Copyright 2008-2016 Freescale Semiconductor Inc.
- * Copyright 2016, 2019 NXP
+ * Copyright 2016, 2019, 2023 NXP
  *
  */
 
@@ -662,6 +662,9 @@ extern enum rta_sec_era rta_sec_era;
 #define OP_PCL_IPSEC_HMAC_SHA2_256_128          0x000c
 #define OP_PCL_IPSEC_HMAC_SHA2_384_192          0x000d
 #define OP_PCL_IPSEC_HMAC_SHA2_512_256          0x000e
+#define OP_PCL_IPSEC_HMAC_SHA2_224_96           0x00f2
+#define OP_PCL_IPSEC_HMAC_SHA2_224_112          0x00f4
+#define OP_PCL_IPSEC_HMAC_SHA2_224_224          0x00f8
 
 /* For SRTP - OP_PCLID_SRTP */
 #define OP_PCL_SRTP_CIPHER_MASK                         0xff00
diff --git a/drivers/common/dpaax/caamflib/desc/ipsec.h 
b/drivers/common/dpaax/caamflib/desc/ipsec.h
index 14e80baf77..95fc3ea5ba 100644
--- a/drivers/common/dpaax/caamflib/desc/ipsec.h
+++ b/drivers/common/dpaax/caamflib/desc/ipsec.h
@@ -710,6 +710,11 @@ static inline void __gen_auth_key(struct program *program,
        case OP_PCL_IPSEC_HMAC_SHA2_512_256:
                dkp_protid = OP_PCLID_DKP_SHA512;
                break;
+       case OP_PCL_IPSEC_HMAC_SHA2_224_96:
+       case OP_PCL_IPSEC_HMAC_SHA2_224_112:
+       case OP_PCL_IPSEC_HMAC_SHA2_224_224:
+               dkp_protid = OP_PCLID_DKP_SHA224;
+               break;
        default:
                KEY(program, KEY2, authdata->key_enc_flags, authdata->key,
                    authdata->keylen, INLINE_KEY(authdata));
diff --git a/drivers/common/dpaax/caamflib/rta/protocol_cmd.h 
b/drivers/common/dpaax/caamflib/rta/protocol_cmd.h
index ac5c8af716..5b33f103be 100644
--- a/drivers/common/dpaax/caamflib/rta/protocol_cmd.h
+++ b/drivers/common/dpaax/caamflib/rta/protocol_cmd.h
@@ -1,7 +1,7 @@
 /* SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0)
  *
  * Copyright 2008-2016 Freescale Semiconductor Inc.
- * Copyright 2016,2019 NXP
+ * Copyright 2016,2019,2023 NXP
  *
  */
 
@@ -241,6 +241,9 @@ __rta_ipsec_proto(uint16_t protoinfo)
        case OP_PCL_IPSEC_HMAC_MD5_128:
        case OP_PCL_IPSEC_HMAC_SHA1_160:
        case OP_PCL_IPSEC_AES_CMAC_96:
+       case OP_PCL_IPSEC_HMAC_SHA2_224_96:
+       case OP_PCL_IPSEC_HMAC_SHA2_224_112:
+       case OP_PCL_IPSEC_HMAC_SHA2_224_224:
        case OP_PCL_IPSEC_HMAC_SHA2_256_128:
        case OP_PCL_IPSEC_HMAC_SHA2_384_192:
        case OP_PCL_IPSEC_HMAC_SHA2_512_256:
diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c 
b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c
index 77ed68ad6d..bb5a2c629e 100644
--- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c
+++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c
@@ -3005,6 +3005,15 @@ dpaa2_sec_ipsec_proto_init(struct 
rte_crypto_cipher_xform *cipher_xform,
                authdata->algtype = OP_PCL_IPSEC_HMAC_MD5_96;
                authdata->algmode = OP_ALG_AAI_HMAC;
                break;
+       case RTE_CRYPTO_AUTH_SHA224_HMAC:
+               authdata->algmode = OP_ALG_AAI_HMAC;
+               if (session->digest_length == 6)
+                       authdata->algtype = OP_PCL_IPSEC_HMAC_SHA2_224_96;
+               else if (session->digest_length == 14)
+                       authdata->algtype = OP_PCL_IPSEC_HMAC_SHA2_224_224;
+               else
+                       authdata->algtype = OP_PCL_IPSEC_HMAC_SHA2_224_112;
+               break;
        case RTE_CRYPTO_AUTH_SHA256_HMAC:
                authdata->algtype = OP_PCL_IPSEC_HMAC_SHA2_256_128;
                authdata->algmode = OP_ALG_AAI_HMAC;
@@ -3032,7 +3041,6 @@ dpaa2_sec_ipsec_proto_init(struct rte_crypto_cipher_xform 
*cipher_xform,
        case RTE_CRYPTO_AUTH_NULL:
                authdata->algtype = OP_PCL_IPSEC_HMAC_NULL;
                break;
-       case RTE_CRYPTO_AUTH_SHA224_HMAC:
        case RTE_CRYPTO_AUTH_SNOW3G_UIA2:
        case RTE_CRYPTO_AUTH_SHA1:
        case RTE_CRYPTO_AUTH_SHA256:
diff --git a/drivers/crypto/dpaa_sec/dpaa_sec.c 
b/drivers/crypto/dpaa_sec/dpaa_sec.c
index 0fcba95916..a301e8edb2 100644
--- a/drivers/crypto/dpaa_sec/dpaa_sec.c
+++ b/drivers/crypto/dpaa_sec/dpaa_sec.c
@@ -2817,6 +2817,15 @@ dpaa_sec_ipsec_proto_init(struct rte_crypto_cipher_xform 
*cipher_xform,
                        "+++Using sha256-hmac truncated len is non-standard,"
                        "it will not work with lookaside proto");
                break;
+       case RTE_CRYPTO_AUTH_SHA224_HMAC:
+               session->auth_key.algmode = OP_ALG_AAI_HMAC;
+               if (session->digest_length == 6)
+                       session->auth_key.alg = OP_PCL_IPSEC_HMAC_SHA2_224_96;
+               else if (session->digest_length == 14)
+                       session->auth_key.alg = OP_PCL_IPSEC_HMAC_SHA2_224_224;
+               else
+                       session->auth_key.alg = OP_PCL_IPSEC_HMAC_SHA2_224_112;
+               break;
        case RTE_CRYPTO_AUTH_SHA384_HMAC:
                session->auth_key.alg = OP_PCL_IPSEC_HMAC_SHA2_384_192;
                session->auth_key.algmode = OP_ALG_AAI_HMAC;
@@ -2836,7 +2845,6 @@ dpaa_sec_ipsec_proto_init(struct rte_crypto_cipher_xform 
*cipher_xform,
                session->auth_key.alg = OP_PCL_IPSEC_AES_XCBC_MAC_96;
                session->auth_key.algmode = OP_ALG_AAI_XCBC_MAC;
                break;
-       case RTE_CRYPTO_AUTH_SHA224_HMAC:
        case RTE_CRYPTO_AUTH_SNOW3G_UIA2:
        case RTE_CRYPTO_AUTH_SHA1:
        case RTE_CRYPTO_AUTH_SHA256:
-- 
2.17.1

Reply via email to