From: Dmitry Eremin-Solenikov <dmitry.ereminsoleni...@linaro.org>

GMAC auth algorithm requires IV to work. Instead of hacking the
ODP_CIPHER_ALG_NULL iv to include value for ODP_AUTH_ALG_GMAC, provide
separate iv (in auth capability, session params and operation params).

Signed-off-by: Dmitry Eremin-Solenikov <dmitry.ereminsoleni...@linaro.org>
---
/** Email created from pull request 352 (lumag:crypto_gmac_iv)
 ** https://github.com/Linaro/odp/pull/352
 ** Patch: https://github.com/Linaro/odp/pull/352.patch
 ** Base sha: 6303c7d0e98fafe0f14c8c4dd9989b3b7633ebf4
 ** Merge commit sha: 8b925492ef06bf633b8767bba97bd6ec68547618
 **/
 include/odp/api/spec/crypto.h | 12 ++++++++++++
 1 file changed, 12 insertions(+)

diff --git a/include/odp/api/spec/crypto.h b/include/odp/api/spec/crypto.h
index e44892fbf..ea2a14d65 100644
--- a/include/odp/api/spec/crypto.h
+++ b/include/odp/api/spec/crypto.h
@@ -333,6 +333,9 @@ typedef struct odp_crypto_session_param_t {
         */
        odp_crypto_key_t auth_key;
 
+       /** Authentication Initialization Vector (IV) */
+       odp_crypto_iv_t auth_iv;
+
        /** Authentication digest length in bytes
         *
         *  Use odp_crypto_auth_capability() for supported digest lengths.
@@ -408,6 +411,9 @@ typedef struct odp_crypto_op_param_t {
                uint8_t *cipher_iv_ptr;
        };
 
+       /** Override session authentication IV pointer */
+       uint8_t *auth_iv_ptr;
+
        /** Offset from start of packet for hash result
         *
         *  Specifies the offset where the hash result is to be stored. In case
@@ -449,6 +455,9 @@ typedef struct odp_crypto_packet_op_param_t {
                uint8_t *cipher_iv_ptr;
        };
 
+       /** Override session IV pointer for authentication */
+       uint8_t *auth_iv_ptr;
+
        /** Offset from start of packet for hash result
         *
         *  Specifies the offset where the hash result is to be stored. In case
@@ -614,6 +623,9 @@ typedef struct odp_crypto_auth_capability_t {
        /** Key length in bytes */
        uint32_t key_len;
 
+       /** IV length in bytes */
+       uint32_t iv_len;
+
        /** Additional Authenticated Data (AAD) lengths */
        struct {
                /** Minimum AAD length in bytes */

Reply via email to