[dpdk-stable] [dpdk-dev] [PATCH] cryptodev: fix SHA-1 digest enum comment
Trahe, Fiona
fiona.trahe at intel.com
Tue May 19 12:29:24 CEST 2020
Hi Adam, Anoob,
> > > >
> > > > > -----Original Message-----
> > > > > From: dev <dev-bounces at dpdk.org> On Behalf Of Adam Dybkowski
> > > > > Sent: Monday, May 18, 2020 7:54 PM
> > > > > To: dev at dpdk.org; fiona.trahe at intel.com; akhil.goyal at nxp.com
> > > > > Cc: Adam Dybkowski <adamx.dybkowski at intel.com>; stable at dpdk.org
> > > > > Subject: [dpdk-dev] [PATCH] cryptodev: fix SHA-1 digest enum
> > > > > comment
> > > > >
> > > > > This patch fixes improper SHA-1 digest size in the enum comment.
> > > > >
> > > > > Fixes: 1bd407fac80b ("cryptodev: extract symmetric operations")
> > > > > Cc: stable at dpdk.org
> > > > >
> > > > > Signed-off-by: Adam Dybkowski <adamx.dybkowski at intel.com>
> > > > > ---
> > > > > lib/librte_cryptodev/rte_crypto_sym.h | 4 ++--
> > > > > 1 file changed, 2 insertions(+), 2 deletions(-)
> > > > >
> > > > > diff --git a/lib/librte_cryptodev/rte_crypto_sym.h
> > > > > b/lib/librte_cryptodev/rte_crypto_sym.h
> > > > > index d9585ecd6..9cea4e5f0 100644
> > > > > --- a/lib/librte_cryptodev/rte_crypto_sym.h
> > > > > +++ b/lib/librte_cryptodev/rte_crypto_sym.h
> > > > > @@ -269,9 +269,9 @@ enum rte_crypto_auth_algorithm {
> > > > > /**< HMAC using MD5 algorithm */
> > > > >
> > > > > RTE_CRYPTO_AUTH_SHA1,
> > > > > - /**< 128 bit SHA algorithm. */
> > > > > + /**< 160 bit SHA algorithm. */
> > > > > RTE_CRYPTO_AUTH_SHA1_HMAC,
> > > > > - /**< HMAC using 128 bit SHA algorithm. */
> > > > > + /**< HMAC using 160 bit SHA algorithm. */
> > > >
> > > > [Anoob] This raises one interesting question. Is HMAC-SHA-1-96
> > > > (https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org
> > > > _h
> > > >
> > >
> > tml_rfc2404&d=DwIFAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=jPfB8rwwviRSxyL
> > Ws2
> > > n6B-
> > >
> > WYLn1v9SyTMrT5EQqh2TU&m=pgqB2BfFosCF_7l1SdoodgXcipf7G1ofht68ZK
> > Mt
> > > oW0&s=hxzUN2QfRJGaR7NQ7VKGm5oQvOZez6Z70mqOyg7gKTY&e= )
> > treated as a
> > > separate algorithm or is it a digest size variant of
> > > RTE_CRYPTO_AUTH_SHA1_HMAC? I assume the later.
> > >
> > > [Adam] DPDK doesn't have separate enums for such variations. According
> > > to RFC 2104, chapter "5. Truncated output", the calculation of
> > > HMAC-SHA-1-96 is done using ordinary HMAC-SHA-1, but the calculation
> > > result is then truncated to 96 bits, or any other digest size provided in auth
> > xform.
> >
> > [Anoob] So it is allowed to support digest sizes 12 & 20, right? Can you
> > update the above comment in that case?
>
> [Adam] This depends on a particular PMD and its capabilities so we cannot write here in this public
> header file. For example, have a look in the capabilities structure of QAT PMD:
>
> { /* SHA1 */ \
> .op = RTE_CRYPTO_OP_TYPE_SYMMETRIC, \
> {.sym = { \
> .xform_type = RTE_CRYPTO_SYM_XFORM_AUTH, \
> {.auth = { \
> .algo = RTE_CRYPTO_AUTH_SHA1, \
> .block_size = 64, \
> .key_size = { \
> .min = 0, \
> .max = 0, \
> .increment = 0 \
> }, \
> .digest_size = { \
> .min = 1, \
> .max = 20, \
> .increment = 1 \
> }, \
> .iv_size = { 0 } \
> }, } \
> }, } \
> }, \
>
> It shows QAT PMD is able to truncate the output digest to any size from 1 to 20 bytes (160 bits).
>
> This can be different in other PMDs, for example OpenSSL and CCP PMDs allow only 20-byte digests
> here while Marvell MVSAM allows 12-20 bytes.
>
> Adam
[Fiona] True. But as 96 bits is a standard variant described in the spec, how about adding
/**< HMAC using 160 bit SHA algorithm.
HMAC-SHA-1-96 can be generated by setting digest_size to 12 */
This doesn't imply that all PMDs must support that - same as for any other feature, the capabilities can vary.
More information about the stable
mailing list