Add unit test for IPsec stateless processing.
Signed-off-by: Aakash Sasidharan
---
app/test/test_ipsec.c | 113 --
1 file changed, 99 insertions(+), 14 deletions(-)
diff --git a/app/test/test_ipsec.c b/app/test/test_ipsec.c
index 6cb1bac1e7..ac63c3b6d3
.
Signed-off-by: Aakash Sasidharan
---
doc/guides/prog_guide/ipsec_lib.rst| 6 ++
doc/guides/rel_notes/release_24_11.rst | 6 ++
lib/ipsec/esp_outb.c | 101 +
lib/ipsec/rte_ipsec.h | 84
lib/ipsec/sa.c
Add unit test for IPsec stateless processing.
Signed-off-by: Aakash Sasidharan
---
app/test/test_ipsec.c | 111 +-
1 file changed, 98 insertions(+), 13 deletions(-)
diff --git a/app/test/test_ipsec.c b/app/test/test_ipsec.c
index 6cb1bac1e7..f65b3eedc5
.
Signed-off-by: Aakash Sasidharan
---
doc/guides/prog_guide/ipsec_lib.rst| 6 ++
doc/guides/rel_notes/release_24_11.rst | 6 ++
lib/ipsec/esp_outb.c | 101 +
lib/ipsec/rte_ipsec.h | 84
lib/ipsec/sa.c
t; > As a generic one - we need to add a use-case/test-case for it.
> > > Without it I think the patch is incomplete.
> >
> > Ack. Will add test-case with v3.
> >
> > >
> > > >
> > > > Signed-off
s user to provide
> > > sequence number to be used for the IPsec operation.
> >
> > Few questions/nits below.
> > As a generic one - we need to add a use-case/test-case for it.
> > Without it I think the patch is incomplete.
>
> Ack. Will add test-case with
> sequence number to be used for the IPsec operation.
>
> Few questions/nits below.
> As a generic one - we need to add a use-case/test-case for it.
> Without it I think the patch is incomplete.
Ack. Will add test-case with v3.
>
> >
> > Signed-off
.
Signed-off-by: Aakash Sasidharan
---
lib/ipsec/esp_outb.c | 85 +++
lib/ipsec/rte_ipsec.h | 68 ++
lib/ipsec/sa.c| 4 +-
lib/ipsec/sa.h| 8
4 files changed, 140 insertions(+), 25 deletions(-)
diff --git a
.
Signed-off-by: Aakash Sasidharan
---
lib/ipsec/esp_outb.c | 85 +++
lib/ipsec/rte_ipsec.h | 68 ++
lib/ipsec/sa.c| 2 +
lib/ipsec/sa.h| 8
4 files changed, 139 insertions(+), 24 deletions(-)
diff --git a
: Aakash Sasidharan
---
doc/guides/rel_notes/deprecation.rst | 8
1 file changed, 8 insertions(+)
diff --git a/doc/guides/rel_notes/deprecation.rst
b/doc/guides/rel_notes/deprecation.rst
index 6948641ff6..9be7b90b94 100644
--- a/doc/guides/rel_notes/deprecation.rst
+++ b/doc/guides/rel_notes
le cores can
call rte_ipsec_sa_update_sqn() creating a race condition.
> 2. Introduce new (extended) variants of ipsec_crypto_prepare/process that
> would take SQN (might be something else ?) as extra parameter, something
> like:
>
> rte_ipcec_xprepare(const struct rte_ipsec
> -Original Message-
> From: Konstantin Ananyev
> Sent: Wednesday, July 24, 2024 10:39 PM
> To: Aakash Sasidharan
> Cc: Akhil Goyal ; Jerin Jacob ;
> Anoob Joseph ; Vidya Sagar Velumuri
> ; dev@dpdk.org; konstantin.v.anan...@yandex.ru;
> vladimir.medved...@intel.
> -Original Message-
> From: Konstantin Ananyev
> Sent: Tuesday, July 23, 2024 9:35 PM
> To: Aakash Sasidharan
> Cc: Akhil Goyal ; Jerin Jacob ;
> Anoob Joseph ; Vidya Sagar Velumuri
> ; dev@dpdk.org; konstantin.v.anan...@yandex.ru;
> vladimir.medved...@intel.com
to disable sequence number update inside IPsec library and
the API rte_ipsec_pkt_crypto_prepare will be extended to include ``sqn``
as an additional parameter to specify sequence number to be used for
IPsec from the application.
Signed-off-by: Aakash Sasidharan
---
doc/guides/rel_notes
to disable sequence number update inside IPsec library and the API
rte_ipsec_pkt_crypto_prepare will be extended to include ``sqn`` as an
additional
parameter to specify sequence number to be used for IPsec from the application.
Signed-off-by: Aakash Sasidharan
---
doc/guides/rel_notes
to disable sequence number update inside IPsec library and the API
rte_ipsec_pkt_crypto_prepare will be extended to include ``sqn`` as an
additional
parameter to specify sequence number to be used for IPsec from the application.
Signed-off-by: Aakash Sasidharan
Change-Id
such use cases.
Signed-off-by: Aakash Sasidharan
---
app/test-eventdev/test_perf_common.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/app/test-eventdev/test_perf_common.c
b/app/test-eventdev/test_perf_common.c
index db0f9c1f3b..66d22cd559 100644
--- a/app/test-eventdev
From: Anoob Joseph
Submit two instructions in one LMTLINE.
Signed-off-by: Anoob Joseph
Signed-off-by: Aakash Sasidharan
---
drivers/common/cnxk/roc_cpt.c | 17 +-
drivers/common/cnxk/roc_cpt.h | 8 +-
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 184
From: Anoob Joseph
Make 'pack_iv' variable as const to avoid multiple checks.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cnxk_se.h | 27 +--
1 file changed, 13 insertions(+), 14 deletions(-)
diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk
specific model.
Fixes: 4d8166d64988 ("crypto/cnxk: enable digest for zero length input")
Cc: sta...@dpdk.org
Signed-off-by: Aakash Sasidharan
Acked-by: Anoob Joseph
---
drivers/crypto/cnxk/cnxk_se.h | 28 +---
1 file changed, 17 insertions(+), 11 deletions(-)
di
From: Anoob Joseph
Update sess pointer while working on next set of packets.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 13 -
1 file changed, 8 insertions(+), 5 deletions(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/drivers/crypto/c
From: Anoob Joseph
Add dual submission to CPT in Rx inject path.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
Signed-off-by: Aakash Sasidharan
---
drivers/common/cnxk/roc_cpt.h | 43 +-
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 72
From: Anoob Joseph
The packet would be posted to CPT only when there is a valid result.
Skip setting of the same.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 ---
1 file changed, 7 deletions(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/dri
From: Anoob Joseph
Use NEON instructions for Rx inject instruction preparation.
Signed-off-by: Anoob Joseph
Signed-off-by: Aakash Sasidharan
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 62 +--
1 file changed, 46 insertions(+), 16 deletions(-)
diff --git a/drivers
From: Anoob Joseph
RVU PF FUNC of the CPT LF need not be set as the hardware would
determine that. Instead SSO PF FUNC need to be set as inline device so
that critical errors would reach inline device.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 2 +-
drivers/cr
From: Anoob Joseph
Add flow control in Rx inject path to avoid over submission to CPT.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/dri
From: Anoob Joseph
Inline PF FUNC would be required to set SSO_PF_FUNC in the instruction
for cryptodev Rx inject. Move the API to idev to allow usage of the
same.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_idev.c | 6 ++
drivers/common/cnxk/roc_idev.h | 2
From: Anoob Joseph
Update version map with details of PMD APIs added.
Fixes: 26bb5c4de63e ("crypto/cnxk: add CPT raw submission PMD API")
Cc: sta...@dpdk.org
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/rte_pmd_cnxk_crypto.h | 2 ++
drivers/crypto/cnxk/version.map | 8 +++
From: Anoob Joseph
Add comments to denote unused table entries.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_ae.c| 6 +++---
drivers/common/cnxk/roc_ae_fpm_tables.c | 6 +++---
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/drivers/common/cnxk/roc_ae.c b/
v3:
* Fix compilation error by moving function meant for arm64 under
"#if defined(RTE_ARCH_ARM64)" guard.
v2:
* Fix compilation errors observed with arm gcc-13.
This series adds improvements to CNXK crypto PMD and fixes aes-gcm zero
length input failure.
Aakash Sasidharan (1):
c
From: Anoob Joseph
Submit two instructions in one LMTLINE.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_cpt.c | 17 +-
drivers/common/cnxk/roc_cpt.h | 8 +-
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 182 +-
drivers/crypto/cnxk/cn10k_c
From: Anoob Joseph
Make 'pack_iv' variable as const to avoid multiple checks.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cnxk_se.h | 27 +--
1 file changed, 13 insertions(+), 14 deletions(-)
diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk
specific model.
Fixes: 4d8166d64988 ("crypto/cnxk: enable digest for zero length input")
Signed-off-by: Aakash Sasidharan
---
drivers/crypto/cnxk/cnxk_se.h | 28 +---
1 file changed, 17 insertions(+), 11 deletions(-)
diff --git a/drivers/crypto/cnxk/cnxk_se.h
From: Anoob Joseph
Add dual submission to CPT in Rx inject path.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/roc_cpt.h | 43 +-
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 70 +--
drivers/crypto/cnxk/cnxk_
From: Anoob Joseph
Update sess pointer while working on next set of packets.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 13 -
1 file changed, 8 insertions(+), 5 deletions(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/drivers/crypto/c
From: Anoob Joseph
The packet would be posted to CPT only when there is a valid result.
Skip setting of the same.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 ---
1 file changed, 7 deletions(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/dri
From: Anoob Joseph
Use NEON instructions for Rx inject instruction preparation.
Signed-off-by: Anoob Joseph
Signed-off-by: Aakash Sasidharan
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 62 +--
1 file changed, 46 insertions(+), 16 deletions(-)
diff --git a/drivers
From: Anoob Joseph
RVU PF FUNC of the CPT LF need not be set as the hardware would
determine that. Instead SSO PF FUNC need to be set as inline device so
that critical errors would reach inline device.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 2 +-
drivers/cr
From: Anoob Joseph
Add flow control in Rx inject path to avoid over submission to CPT.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/dri
From: Anoob Joseph
Inline PF FUNC would be required to set SSO_PF_FUNC in the instruction
for cryptodev Rx inject. Move the API to idev to allow usage of the
same.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_idev.c | 6 ++
drivers/common/cnxk/roc_idev.h | 2
From: Anoob Joseph
Update version map with details of PMD APIs added.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/rte_pmd_cnxk_crypto.h | 2 ++
drivers/crypto/cnxk/version.map | 8
2 files changed, 10 insertions(+)
diff --git a/drivers/crypto/cnxk/rte_pmd_cnxk_crypt
From: Anoob Joseph
Add comments to denote unused table entries.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_ae.c| 6 +++---
drivers/common/cnxk/roc_ae_fpm_tables.c | 6 +++---
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/drivers/common/cnxk/roc_ae.c b/
v2:
Fix compilation errors observed with arm gcc-13.
This series adds improvements to CNXK crypto PMD and fixes aes-gcm zero
length input failure.
Aakash Sasidharan (1):
crypto/cnxk: fix aes-gcm zero len input cases
Anoob Joseph (11):
common/cnxk: add comments to denote skipped entries
From: Anoob Joseph
Submit two instructions in one LMTLINE.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_cpt.c | 17 +-
drivers/common/cnxk/roc_cpt.h | 8 +-
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 182 +-
drivers/crypto/cnxk/cn10k_c
From: Anoob Joseph
Make 'pack_iv' variable as const to avoid multiple checks.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cnxk_se.h | 27 +--
1 file changed, 13 insertions(+), 14 deletions(-)
diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk
specific model.
Fixes: 4d8166d64988 ("crypto/cnxk: enable digest for zero length input")
Signed-off-by: Aakash Sasidharan
---
drivers/crypto/cnxk/cnxk_se.h | 28 +---
1 file changed, 17 insertions(+), 11 deletions(-)
diff --git a/drivers/crypto/cnxk/cnxk_se.h
From: Anoob Joseph
Update sess pointer while working on next set of packets.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 13 -
1 file changed, 8 insertions(+), 5 deletions(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/drivers/crypto/c
From: Anoob Joseph
Add dual submission to CPT in Rx inject path.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/roc_cpt.h | 43 +-
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 70 +--
drivers/crypto/cnxk/cnxk_
From: Anoob Joseph
The packet would be posted to CPT only when there is a valid result.
Skip setting of the same.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 ---
1 file changed, 7 deletions(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/dri
From: Anoob Joseph
Use NEON instructions for Rx inject instruction preparation.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 57 +--
1 file changed, 42 insertions(+), 15 deletions(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/d
From: Anoob Joseph
RVU PF FUNC of the CPT LF need not be set as the hardware would
determine that. Instead SSO PF FUNC need to be set as inline device so
that critical errors would reach inline device.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 2 +-
drivers/cr
From: Anoob Joseph
Add flow control in Rx inject path to avoid over submission to CPT.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c
b/dri
From: Anoob Joseph
Inline PF FUNC would be required to set SSO_PF_FUNC in the instruction
for cryptodev Rx inject. Move the API to idev to allow usage of the
same.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_idev.c | 6 ++
drivers/common/cnxk/roc_idev.h | 2
From: Anoob Joseph
Add comments to denote unused table entries.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_ae.c| 6 +++---
drivers/common/cnxk/roc_ae_fpm_tables.c | 6 +++---
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/drivers/common/cnxk/roc_ae.c b/
From: Anoob Joseph
Update version map with details of PMD APIs added.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/rte_pmd_cnxk_crypto.h | 2 ++
drivers/crypto/cnxk/version.map | 8
2 files changed, 10 insertions(+)
diff --git a/drivers/crypto/cnxk/rte_pmd_cnxk_crypt
This series adds improvements to CNXK crypto PMD and fixes aes-gcm zero
length input failure.
Aakash Sasidharan (1):
crypto/cnxk: fix aes-gcm zero len input cases
Anoob Joseph (11):
common/cnxk: add comments to denote skipped entries
crypto/cnxk: update version map file with PMD APIs
Existing data walkthrough test creates a new session
per each test packet size. Enhance the test to use single
session instead.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 49 +--
app/test/test_cryptodev_security_tls_record.h | 1 +
2
Add multi segmented test for TLS 1.3 and multi segmented out of place
tests for DTLS 1.2 and TLS 1.3.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 69 ++-
1 file changed, 39 insertions(+), 30 deletions(-)
diff --git a/app/test
From: Vidya Sagar Velumuri
Add unit test to verify corrupted padding bytes in DTLS-1.2 record
Signed-off-by: Vidya Sagar Velumuri
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 17 +
1 file changed, 17 insertions(+)
diff --git a/app/test/test_cryptodev.c b
From: Vidya Sagar Velumuri
Add unit test to verify corrupted padding bytes in TLS-1.2 record
Signed-off-by: Vidya Sagar Velumuri
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 18 +-
app/test/test_cryptodev_security_tls_record.c | 7
Add combined mode data walkthrough test and multi-segmented
packet data walkthrough test for TLS 1.3.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 41 +++
1 file changed, 41 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test
Add cases to try TLS 1.3 record write(encrypt) + read(decrypt)
operations. This is used for testing TLS 1.3 record features with
all algorithms supported by the security device.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 17 +
1 file changed, 17 insertions
v2:
* Remove unused variables from tests for padding corruption.
Adding new test cases and improvements to test application.
Aakash Sasidharan (4):
test/crypto: add combined mode cases for TLS 1.3
test/security: add TLS 1.3 data walkthrough tests
test/security: add out of place sgl tests
From: Vidya Sagar Velumuri
Add unit tests to verify the padding for TLS-1.3.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 31 +++
1 file changed, 31 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 94438c
Existing data walkthrough test creates a new session
per each test packet size. Enhance the test to use single
session instead.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 49 +--
app/test/test_cryptodev_security_tls_record.h | 1 +
2
Add multi segmented test for TLS 1.3 and multi segmented out of place
tests for DTLS 1.2 and TLS 1.3.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 69 ++-
1 file changed, 39 insertions(+), 30 deletions(-)
diff --git a/app/test
From: Vidya Sagar Velumuri
Add unit test to verify corrupted padding bytes in DTLS-1.2 record
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 21 +
1 file changed, 21 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index
From: Vidya Sagar Velumuri
Add unit test to verify corrupted padding bytes in TLS-1.2 record
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 22 ++-
app/test/test_cryptodev_security_tls_record.c | 7 ++
app/test/test_cryptodev_securi
Add cases to try TLS 1.3 record write(encrypt) + read(decrypt)
operations. This is used for testing TLS 1.3 record features with
all algorithms supported by the security device.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 17 +
1 file changed, 17 insertions
Add combined mode data walkthrough test and multi-segmented
packet data walkthrough test for TLS 1.3.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 41 +++
1 file changed, 41 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test
From: Vidya Sagar Velumuri
Add unit tests to verify the padding for TLS-1.3.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 31 +++
1 file changed, 31 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 94438c
Adding new test cases and improvements to test application.
Aakash Sasidharan (4):
test/crypto: add combined mode cases for TLS 1.3
test/security: add TLS 1.3 data walkthrough tests
test/security: add out of place sgl tests for TLS
test/security: use single session in data walkthrough
Add TLS 1.2 out-of-place multi-segmented packet test.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 52 ++-
app/test/test_cryptodev_security_tls_record.h | 1 +
2 files changed, 51 insertions(+), 2 deletions(-)
diff --git a/app/test
From: Vidya Sagar Velumuri
Update the fields in preparation of test descriptor.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 17 +---
app/test/test_cryptodev_security_tls_record.c | 43 ---
app/test/test_cryptodev_security_tls_reco
From: Vidya Sagar Velumuri
Add unit tests to verify the padding for DTLS-1.2.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 60 +++
1 file changed, 60 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
ind
From: Vidya Sagar Velumuri
Add unit tests to verify the padding for TLS-1.2.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 85 ++-
app/test/test_cryptodev_security_tls_record.c | 28 --
app/test/test_cryptodev_security_tls_record.h
From: Vidya Sagar Velumuri
Add unit tests to verify TLS-1.3 record with zero length.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 39 +++
1 file changed, 39 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptode
From: Vidya Sagar Velumuri
Add unit tests to verify TLS-1.3 record with content type as custom.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 19 +++
1 file changed, 19 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index
From: Vidya Sagar Velumuri
Add unit tests to verify TLS-1.3 record with header corruption.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 19 ++-
1 file changed, 18 insertions(+), 1 deletion(-)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptod
From: Akhil Goyal
Added vectors and test suite for TLS 1.3
AES-128-GCM, AES-256-GCM and CHACHA20-POLY1305
vectors. The vectors are generated using gnuTLS
client server application.
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 35 +++
app/test/test_cryptodev_s
From: Vidya Sagar Velumuri
In TLS 1.3, the version in the header would be TLS 1.2 and the content
type would be APP irrespective of the type of the payload.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev_security_tls_record.c | 20 +--
1 file changed, 14 insert
Add anti-replay tests for window sizes 128, 256, 512, 1024,
2048 and 4096 window sizes in DTLS 1.2 suite.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 72 +--
1 file changed, 69 insertions(+), 3 deletions(-)
diff --git a/app/test
Add anti-replay test for DTLS 1.2.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 115 ++-
app/test/test_cryptodev_security_tls_record.c | 132 ++
app/test/test_cryptodev_security_tls_record.h | 11 +-
3 files changed, 188
From: Akhil Goyal
Added vectors for TLS 1.2 and DTLS 1.2 using algos
AES-256-CBC and HMAC-SHA384
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 19 ++
app/test/test_cryptodev_security_tls_record.h | 2 +
...yptodev_security_tls_record_test_vectors.h | 200 +++
From: Vidya Sagar Velumuri
Add unit tests to verify
1. DTLS record with zero length
2. DTLS record with header corruption
3. DTLS record with content type as custom
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 77 +++
1 file changed, 7
From: Vidya Sagar Velumuri
Add unit tests to verify the zero len TLS records. Zero len packets are
allowed when content type is app data while zero packet length with
other content type (such as handshake) would result in an error.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptode
From: Vidya Sagar Velumuri
Add unit test to verify the TLS header creation with
custom content type
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 19 +++
app/test/test_cryptodev_security_tls_record.c | 3 +++
app/test/test_cryptodev_se
From: Anoob Joseph
The function 'create_segmented_mbuf' is updated to support zero packet
length mbufs. This allows testing of zero packet length payload with TLS
record processing.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.h | 20 +++-
1 file changed, 7 insertion
From: Vidya Sagar Velumuri
Add test to verify the corrupted TLS packet header
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 27 +--
app/test/test_cryptodev_security_tls_record.c | 4 +++
app/test/test_cryptodev_security_tls_record.h |
Add multi segment packet data walkthrough test for TLS 1.2
and DTLS 1.2.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 42 +++
app/test/test_cryptodev_security_tls_record.h | 2 +-
2 files changed, 43 insertions(+), 1 deletion(-)
diff
Add data walkthrough test for DTLS 1.2
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 17 +
app/test/test_cryptodev_security_tls_record.c | 5 -
2 files changed, 21 insertions(+), 1 deletion(-)
diff --git a/app/test/test_cryptodev.c b
Add data walkthrough test for TLS 1.2.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 90 +--
app/test/test_cryptodev_security_tls_record.c | 25 --
app/test/test_cryptodev_security_tls_record.h | 41 -
app/test
Enable AES-GCM AEAD tests in combined mode TLS test suite.
Coverity issue: 414888
Fixes: 9157ccb8f876 ("test/crypto: verify TLS headers")
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev_security_tls_record.c | 10 --
app/test/test_security_proto.h
v5:
* Define TEST_SEC_CIPHERTEXT_MAX_LEN based on existing
MBUF_DATAPAYLOAD_SIZE macro.
v4:
* Set max ciphertext length for data walkthrough tests to 4k.
v3:
* Set max packet length for data walkthrough tests to 8k.
v2:
* Rebased.
Aakash Sasidharan (7):
test/security: enable AES-GCM in
Add TLS 1.2 out-of-place multi-segmented packet test.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 52 ++-
app/test/test_cryptodev_security_tls_record.h | 1 +
2 files changed, 51 insertions(+), 2 deletions(-)
diff --git a/app/test
From: Vidya Sagar Velumuri
Add unit tests to verify the padding for DTLS-1.2.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 60 +++
1 file changed, 60 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
ind
From: Vidya Sagar Velumuri
Add unit tests to verify the padding for TLS-1.2.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 85 ++-
app/test/test_cryptodev_security_tls_record.c | 28 --
app/test/test_cryptodev_security_tls_record.h
From: Vidya Sagar Velumuri
Add unit tests to verify TLS-1.3 record with zero length.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 39 +++
1 file changed, 39 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptode
From: Vidya Sagar Velumuri
Add unit tests to verify TLS-1.3 record with content type as custom.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 19 +++
1 file changed, 19 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index
From: Vidya Sagar Velumuri
Add unit tests to verify TLS-1.3 record with header corruption.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 19 ++-
1 file changed, 18 insertions(+), 1 deletion(-)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptod
1 - 100 of 197 matches
Mail list logo