[PATCH v4 2/2] test/ipsec: add unit test for stateless processing

2024-10-03 Thread Aakash Sasidharan
Add unit test for IPsec stateless processing. Signed-off-by: Aakash Sasidharan --- app/test/test_ipsec.c | 113 -- 1 file changed, 99 insertions(+), 14 deletions(-) diff --git a/app/test/test_ipsec.c b/app/test/test_ipsec.c index 6cb1bac1e7..ac63c3b6d3

[PATCH v4 1/2] ipsec: allow stateless IPsec processing

2024-10-03 Thread Aakash Sasidharan
. Signed-off-by: Aakash Sasidharan --- doc/guides/prog_guide/ipsec_lib.rst| 6 ++ doc/guides/rel_notes/release_24_11.rst | 6 ++ lib/ipsec/esp_outb.c | 101 + lib/ipsec/rte_ipsec.h | 84 lib/ipsec/sa.c

[PATCH v3 2/2] test/ipsec: add unit test for stateless processing

2024-10-03 Thread Aakash Sasidharan
Add unit test for IPsec stateless processing. Signed-off-by: Aakash Sasidharan --- app/test/test_ipsec.c | 111 +- 1 file changed, 98 insertions(+), 13 deletions(-) diff --git a/app/test/test_ipsec.c b/app/test/test_ipsec.c index 6cb1bac1e7..f65b3eedc5

[PATCH v3 1/2] ipsec: allow stateless IPsec processing

2024-10-03 Thread Aakash Sasidharan
. Signed-off-by: Aakash Sasidharan --- doc/guides/prog_guide/ipsec_lib.rst| 6 ++ doc/guides/rel_notes/release_24_11.rst | 6 ++ lib/ipsec/esp_outb.c | 101 + lib/ipsec/rte_ipsec.h | 84 lib/ipsec/sa.c

RE: [PATCH v2] ipsec: allow stateless IPsec processing

2024-09-25 Thread Aakash Sasidharan
t; > As a generic one - we need to add a use-case/test-case for it. > > > Without it I think the patch is incomplete. > > > > Ack. Will add test-case with v3. > > > > > > > > > > > > > Signed-off

RE: [PATCH v2] ipsec: allow stateless IPsec processing

2024-09-19 Thread Aakash Sasidharan
s user to provide > > > sequence number to be used for the IPsec operation. > > > > Few questions/nits below. > > As a generic one - we need to add a use-case/test-case for it. > > Without it I think the patch is incomplete. > > Ack. Will add test-case with

RE: [PATCH v2] ipsec: allow stateless IPsec processing

2024-09-19 Thread Aakash Sasidharan
> sequence number to be used for the IPsec operation. > > Few questions/nits below. > As a generic one - we need to add a use-case/test-case for it. > Without it I think the patch is incomplete. Ack. Will add test-case with v3. > > > > > Signed-off

[PATCH v2] ipsec: allow stateless IPsec processing

2024-09-08 Thread Aakash Sasidharan
. Signed-off-by: Aakash Sasidharan --- lib/ipsec/esp_outb.c | 85 +++ lib/ipsec/rte_ipsec.h | 68 ++ lib/ipsec/sa.c| 4 +- lib/ipsec/sa.h| 8 4 files changed, 140 insertions(+), 25 deletions(-) diff --git a

[PATCH] ipsec: allow stateless IPsec processing

2024-09-07 Thread Aakash Sasidharan
. Signed-off-by: Aakash Sasidharan --- lib/ipsec/esp_outb.c | 85 +++ lib/ipsec/rte_ipsec.h | 68 ++ lib/ipsec/sa.c| 2 + lib/ipsec/sa.h| 8 4 files changed, 139 insertions(+), 24 deletions(-) diff --git a

[PATCH v3] doc: announce rte_ipsec API changes

2024-07-29 Thread Aakash Sasidharan
: Aakash Sasidharan --- doc/guides/rel_notes/deprecation.rst | 8 1 file changed, 8 insertions(+) diff --git a/doc/guides/rel_notes/deprecation.rst b/doc/guides/rel_notes/deprecation.rst index 6948641ff6..9be7b90b94 100644 --- a/doc/guides/rel_notes/deprecation.rst +++ b/doc/guides/rel_notes

RE: [PATCH v2] doc: announce rte_ipsec API changes

2024-07-29 Thread Aakash Sasidharan
le cores can call rte_ipsec_sa_update_sqn() creating a race condition. > 2. Introduce new (extended) variants of ipsec_crypto_prepare/process that > would take SQN (might be something else ?) as extra parameter, something > like: > > rte_ipcec_xprepare(const struct rte_ipsec

RE: [PATCH v2] doc: announce rte_ipsec API changes

2024-07-25 Thread Aakash Sasidharan
> -Original Message- > From: Konstantin Ananyev > Sent: Wednesday, July 24, 2024 10:39 PM > To: Aakash Sasidharan > Cc: Akhil Goyal ; Jerin Jacob ; > Anoob Joseph ; Vidya Sagar Velumuri > ; dev@dpdk.org; konstantin.v.anan...@yandex.ru; > vladimir.medved...@intel.

RE: [PATCH v2] doc: announce rte_ipsec API changes

2024-07-24 Thread Aakash Sasidharan
> -Original Message- > From: Konstantin Ananyev > Sent: Tuesday, July 23, 2024 9:35 PM > To: Aakash Sasidharan > Cc: Akhil Goyal ; Jerin Jacob ; > Anoob Joseph ; Vidya Sagar Velumuri > ; dev@dpdk.org; konstantin.v.anan...@yandex.ru; > vladimir.medved...@intel.com

[PATCH v2] doc: announce rte_ipsec API changes

2024-07-23 Thread Aakash Sasidharan
to disable sequence number update inside IPsec library and the API rte_ipsec_pkt_crypto_prepare will be extended to include ``sqn`` as an additional parameter to specify sequence number to be used for IPsec from the application. Signed-off-by: Aakash Sasidharan --- doc/guides/rel_notes

[PATCH] doc: announce rte_ipsec API changes

2024-07-23 Thread Aakash Sasidharan
to disable sequence number update inside IPsec library and the API rte_ipsec_pkt_crypto_prepare will be extended to include ``sqn`` as an additional parameter to specify sequence number to be used for IPsec from the application. Signed-off-by: Aakash Sasidharan --- doc/guides/rel_notes

[PATCH] doc: announce rte_ipsec API changes

2024-07-23 Thread Aakash Sasidharan
to disable sequence number update inside IPsec library and the API rte_ipsec_pkt_crypto_prepare will be extended to include ``sqn`` as an additional parameter to specify sequence number to be used for IPsec from the application. Signed-off-by: Aakash Sasidharan Change-Id

[PATCH] app/eventdev: increase default queue depth for cryptodev

2024-06-26 Thread Aakash Sasidharan
such use cases. Signed-off-by: Aakash Sasidharan --- app/test-eventdev/test_perf_common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/app/test-eventdev/test_perf_common.c b/app/test-eventdev/test_perf_common.c index db0f9c1f3b..66d22cd559 100644 --- a/app/test-eventdev

[PATCH v3 12/12] crypto/cnxk: enable dual submission to CPT

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Submit two instructions in one LMTLINE. Signed-off-by: Anoob Joseph Signed-off-by: Aakash Sasidharan --- drivers/common/cnxk/roc_cpt.c | 17 +- drivers/common/cnxk/roc_cpt.h | 8 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 184

[PATCH v3 11/12] crypto/cnxk: make pack IV variable as const

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Make 'pack_iv' variable as const to avoid multiple checks. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cnxk_se.h | 27 +-- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk

[PATCH v3 10/12] crypto/cnxk: fix aes-gcm zero len input cases

2024-06-26 Thread Aakash Sasidharan
specific model. Fixes: 4d8166d64988 ("crypto/cnxk: enable digest for zero length input") Cc: sta...@dpdk.org Signed-off-by: Aakash Sasidharan Acked-by: Anoob Joseph --- drivers/crypto/cnxk/cnxk_se.h | 28 +--- 1 file changed, 17 insertions(+), 11 deletions(-) di

[PATCH v3 09/12] crypto/cnxk: update sess pointer for next iteration

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Update sess pointer while working on next set of packets. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 13 - 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/drivers/crypto/c

[PATCH v3 08/12] crypto/cnxk: add dual submission in Rx inject

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Add dual submission to CPT in Rx inject path. Signed-off-by: Anoob Joseph Signed-off-by: Vidya Sagar Velumuri Signed-off-by: Aakash Sasidharan --- drivers/common/cnxk/roc_cpt.h | 43 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 72

[PATCH v3 07/12] crypto/cnxk: remove init of CPT result field in packet

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph The packet would be posted to CPT only when there is a valid result. Skip setting of the same. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 --- 1 file changed, 7 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH v3 06/12] crypto/cnxk: use NEON for Rx inject inst preparation

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Use NEON instructions for Rx inject instruction preparation. Signed-off-by: Anoob Joseph Signed-off-by: Aakash Sasidharan --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 62 +-- 1 file changed, 46 insertions(+), 16 deletions(-) diff --git a/drivers

[PATCH v3 05/12] crypto/cnxk: use SSO PF func of inline device in inst

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph RVU PF FUNC of the CPT LF need not be set as the hardware would determine that. Instead SSO PF FUNC need to be set as inline device so that critical errors would reach inline device. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 2 +- drivers/cr

[PATCH v3 04/12] crypto/cnxk: add flow control in Rx inject path

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Add flow control in Rx inject path to avoid over submission to CPT. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 16 +++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH v3 03/12] common/cnxk: make inline dev PF func get as idev API

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Inline PF FUNC would be required to set SSO_PF_FUNC in the instruction for cryptodev Rx inject. Move the API to idev to allow usage of the same. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_idev.c | 6 ++ drivers/common/cnxk/roc_idev.h | 2

[PATCH v3 02/12] crypto/cnxk: update version map file with PMD APIs

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Update version map with details of PMD APIs added. Fixes: 26bb5c4de63e ("crypto/cnxk: add CPT raw submission PMD API") Cc: sta...@dpdk.org Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/rte_pmd_cnxk_crypto.h | 2 ++ drivers/crypto/cnxk/version.map | 8 +++

[PATCH v3 01/12] common/cnxk: add comments to denote skipped entries

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Add comments to denote unused table entries. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_ae.c| 6 +++--- drivers/common/cnxk/roc_ae_fpm_tables.c | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/drivers/common/cnxk/roc_ae.c b/

[PATCH v3 00/12] Fixes and improvements to CNXK crypto PMD

2024-06-26 Thread Aakash Sasidharan
v3: * Fix compilation error by moving function meant for arm64 under "#if defined(RTE_ARCH_ARM64)" guard. v2: * Fix compilation errors observed with arm gcc-13. This series adds improvements to CNXK crypto PMD and fixes aes-gcm zero length input failure. Aakash Sasidharan (1): c

[PATCH v2 12/12] crypto/cnxk: enable dual submission to CPT

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Submit two instructions in one LMTLINE. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_cpt.c | 17 +- drivers/common/cnxk/roc_cpt.h | 8 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 182 +- drivers/crypto/cnxk/cn10k_c

[PATCH v2 11/12] crypto/cnxk: make pack IV variable as const

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Make 'pack_iv' variable as const to avoid multiple checks. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cnxk_se.h | 27 +-- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk

[PATCH v2 10/12] crypto/cnxk: fix aes-gcm zero len input cases

2024-06-23 Thread Aakash Sasidharan
specific model. Fixes: 4d8166d64988 ("crypto/cnxk: enable digest for zero length input") Signed-off-by: Aakash Sasidharan --- drivers/crypto/cnxk/cnxk_se.h | 28 +--- 1 file changed, 17 insertions(+), 11 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h

[PATCH v2 08/12] crypto/cnxk: add dual submission in Rx inject

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Add dual submission to CPT in Rx inject path. Signed-off-by: Anoob Joseph Signed-off-by: Vidya Sagar Velumuri --- drivers/common/cnxk/roc_cpt.h | 43 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 70 +-- drivers/crypto/cnxk/cnxk_

[PATCH v2 09/12] crypto/cnxk: update sess pointer for next iteration

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Update sess pointer while working on next set of packets. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 13 - 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/drivers/crypto/c

[PATCH v2 07/12] crypto/cnxk: remove init of CPT result field in packet

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph The packet would be posted to CPT only when there is a valid result. Skip setting of the same. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 --- 1 file changed, 7 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH v2 06/12] crypto/cnxk: use NEON for Rx inject inst preparation

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Use NEON instructions for Rx inject instruction preparation. Signed-off-by: Anoob Joseph Signed-off-by: Aakash Sasidharan --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 62 +-- 1 file changed, 46 insertions(+), 16 deletions(-) diff --git a/drivers

[PATCH v2 05/12] crypto/cnxk: use SSO PF func of inline device in inst

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph RVU PF FUNC of the CPT LF need not be set as the hardware would determine that. Instead SSO PF FUNC need to be set as inline device so that critical errors would reach inline device. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 2 +- drivers/cr

[PATCH v2 04/12] crypto/cnxk: add flow control in Rx inject path

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Add flow control in Rx inject path to avoid over submission to CPT. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 16 +++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH v2 03/12] common/cnxk: make inline dev PF func get as idev API

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Inline PF FUNC would be required to set SSO_PF_FUNC in the instruction for cryptodev Rx inject. Move the API to idev to allow usage of the same. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_idev.c | 6 ++ drivers/common/cnxk/roc_idev.h | 2

[PATCH v2 02/12] crypto/cnxk: update version map file with PMD APIs

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Update version map with details of PMD APIs added. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/rte_pmd_cnxk_crypto.h | 2 ++ drivers/crypto/cnxk/version.map | 8 2 files changed, 10 insertions(+) diff --git a/drivers/crypto/cnxk/rte_pmd_cnxk_crypt

[PATCH v2 01/12] common/cnxk: add comments to denote skipped entries

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Add comments to denote unused table entries. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_ae.c| 6 +++--- drivers/common/cnxk/roc_ae_fpm_tables.c | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/drivers/common/cnxk/roc_ae.c b/

[PATCH v2 00/12] fixes and improvements to CNXK crypto PMD

2024-06-23 Thread Aakash Sasidharan
v2: Fix compilation errors observed with arm gcc-13. This series adds improvements to CNXK crypto PMD and fixes aes-gcm zero length input failure. Aakash Sasidharan (1): crypto/cnxk: fix aes-gcm zero len input cases Anoob Joseph (11): common/cnxk: add comments to denote skipped entries

[PATCH 12/12] crypto/cnxk: enable dual submission to CPT

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Submit two instructions in one LMTLINE. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_cpt.c | 17 +- drivers/common/cnxk/roc_cpt.h | 8 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 182 +- drivers/crypto/cnxk/cn10k_c

[PATCH 11/12] crypto/cnxk: make pack IV variable as const

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Make 'pack_iv' variable as const to avoid multiple checks. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cnxk_se.h | 27 +-- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk

[PATCH 10/12] crypto/cnxk: fix aes-gcm zero len input cases

2024-06-20 Thread Aakash Sasidharan
specific model. Fixes: 4d8166d64988 ("crypto/cnxk: enable digest for zero length input") Signed-off-by: Aakash Sasidharan --- drivers/crypto/cnxk/cnxk_se.h | 28 +--- 1 file changed, 17 insertions(+), 11 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h

[PATCH 09/12] crypto/cnxk: update sess pointer for next iteration

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Update sess pointer while working on next set of packets. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 13 - 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/drivers/crypto/c

[PATCH 08/12] crypto/cnxk: add dual submission in Rx inject

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Add dual submission to CPT in Rx inject path. Signed-off-by: Anoob Joseph Signed-off-by: Vidya Sagar Velumuri --- drivers/common/cnxk/roc_cpt.h | 43 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 70 +-- drivers/crypto/cnxk/cnxk_

[PATCH 07/12] crypto/cnxk: remove init of CPT result field in packet

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph The packet would be posted to CPT only when there is a valid result. Skip setting of the same. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 --- 1 file changed, 7 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH 06/12] crypto/cnxk: use NEON for Rx inject inst preparation

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Use NEON instructions for Rx inject instruction preparation. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 57 +-- 1 file changed, 42 insertions(+), 15 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/d

[PATCH 05/12] crypto/cnxk: use SSO PF func of inline device in inst

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph RVU PF FUNC of the CPT LF need not be set as the hardware would determine that. Instead SSO PF FUNC need to be set as inline device so that critical errors would reach inline device. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 2 +- drivers/cr

[PATCH 04/12] crypto/cnxk: add flow control in Rx inject path

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Add flow control in Rx inject path to avoid over submission to CPT. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 16 +++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH 03/12] common/cnxk: make inline dev PF func get as idev API

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Inline PF FUNC would be required to set SSO_PF_FUNC in the instruction for cryptodev Rx inject. Move the API to idev to allow usage of the same. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_idev.c | 6 ++ drivers/common/cnxk/roc_idev.h | 2

[PATCH 01/12] common/cnxk: add comments to denote skipped entries

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Add comments to denote unused table entries. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_ae.c| 6 +++--- drivers/common/cnxk/roc_ae_fpm_tables.c | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/drivers/common/cnxk/roc_ae.c b/

[PATCH 02/12] crypto/cnxk: update version map file with PMD APIs

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Update version map with details of PMD APIs added. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/rte_pmd_cnxk_crypto.h | 2 ++ drivers/crypto/cnxk/version.map | 8 2 files changed, 10 insertions(+) diff --git a/drivers/crypto/cnxk/rte_pmd_cnxk_crypt

[PATCH 00/12] fixes and improvements to CNXK crypto PMD

2024-06-20 Thread Aakash Sasidharan
This series adds improvements to CNXK crypto PMD and fixes aes-gcm zero length input failure. Aakash Sasidharan (1): crypto/cnxk: fix aes-gcm zero len input cases Anoob Joseph (11): common/cnxk: add comments to denote skipped entries crypto/cnxk: update version map file with PMD APIs

[PATCH v2 7/7] test/security: use single session in data walkthrough test

2024-06-20 Thread Aakash Sasidharan
Existing data walkthrough test creates a new session per each test packet size. Enhance the test to use single session instead. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 49 +-- app/test/test_cryptodev_security_tls_record.h | 1 + 2

[PATCH v2 6/7] test/security: add out of place sgl tests for TLS

2024-06-20 Thread Aakash Sasidharan
Add multi segmented test for TLS 1.3 and multi segmented out of place tests for DTLS 1.2 and TLS 1.3. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 69 ++- 1 file changed, 39 insertions(+), 30 deletions(-) diff --git a/app/test

[PATCH v2 5/7] test/crypto: verify padding corruption in DTLS-1.2

2024-06-20 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify corrupted padding bytes in DTLS-1.2 record Signed-off-by: Vidya Sagar Velumuri Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 17 + 1 file changed, 17 insertions(+) diff --git a/app/test/test_cryptodev.c b

[PATCH v2 4/7] test/crypto: verify padding corruption in TLS-1.2

2024-06-20 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify corrupted padding bytes in TLS-1.2 record Signed-off-by: Vidya Sagar Velumuri Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 18 +- app/test/test_cryptodev_security_tls_record.c | 7

[PATCH v2 3/7] test/security: add TLS 1.3 data walkthrough tests

2024-06-20 Thread Aakash Sasidharan
Add combined mode data walkthrough test and multi-segmented packet data walkthrough test for TLS 1.3. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 41 +++ 1 file changed, 41 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test

[PATCH v2 2/7] test/crypto: add combined mode cases for TLS 1.3

2024-06-20 Thread Aakash Sasidharan
Add cases to try TLS 1.3 record write(encrypt) + read(decrypt) operations. This is used for testing TLS 1.3 record features with all algorithms supported by the security device. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 17 + 1 file changed, 17 insertions

[PATCH v2 0/7] Improvements and new test cases

2024-06-20 Thread Aakash Sasidharan
v2: * Remove unused variables from tests for padding corruption. Adding new test cases and improvements to test application. Aakash Sasidharan (4): test/crypto: add combined mode cases for TLS 1.3 test/security: add TLS 1.3 data walkthrough tests test/security: add out of place sgl tests

[PATCH v2 1/7] test/crypto: unit tests for padding for TLS-1.3

2024-06-20 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for TLS-1.3. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 31 +++ 1 file changed, 31 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 94438c

[PATCH 7/7] test/security: use single session in data walkthrough test

2024-06-16 Thread Aakash Sasidharan
Existing data walkthrough test creates a new session per each test packet size. Enhance the test to use single session instead. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 49 +-- app/test/test_cryptodev_security_tls_record.h | 1 + 2

[PATCH 6/7] test/security: add out of place sgl tests for TLS

2024-06-16 Thread Aakash Sasidharan
Add multi segmented test for TLS 1.3 and multi segmented out of place tests for DTLS 1.2 and TLS 1.3. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 69 ++- 1 file changed, 39 insertions(+), 30 deletions(-) diff --git a/app/test

[PATCH 5/7] test/crypto: verify padding corruption in DTLS-1.2

2024-06-16 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify corrupted padding bytes in DTLS-1.2 record Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 21 + 1 file changed, 21 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index

[PATCH 4/7] test/crypto: verify padding corruption in TLS-1.2

2024-06-16 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify corrupted padding bytes in TLS-1.2 record Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 22 ++- app/test/test_cryptodev_security_tls_record.c | 7 ++ app/test/test_cryptodev_securi

[PATCH 2/7] test/crypto: add combined mode cases for TLS 1.3

2024-06-16 Thread Aakash Sasidharan
Add cases to try TLS 1.3 record write(encrypt) + read(decrypt) operations. This is used for testing TLS 1.3 record features with all algorithms supported by the security device. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 17 + 1 file changed, 17 insertions

[PATCH 3/7] test/security: add TLS 1.3 data walkthrough tests

2024-06-16 Thread Aakash Sasidharan
Add combined mode data walkthrough test and multi-segmented packet data walkthrough test for TLS 1.3. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 41 +++ 1 file changed, 41 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test

[PATCH 1/7] test/crypto: unit tests for padding for TLS-1.3

2024-06-16 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for TLS-1.3. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 31 +++ 1 file changed, 31 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 94438c

[PATCH 0/7] Improvements and new test cases

2024-06-16 Thread Aakash Sasidharan
Adding new test cases and improvements to test application. Aakash Sasidharan (4): test/crypto: add combined mode cases for TLS 1.3 test/security: add TLS 1.3 data walkthrough tests test/security: add out of place sgl tests for TLS test/security: use single session in data walkthrough

[PATCH v5 21/21] test/security: add out of place sgl test case for TLS 1.2

2024-03-13 Thread Aakash Sasidharan
Add TLS 1.2 out-of-place multi-segmented packet test. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 52 ++- app/test/test_cryptodev_security_tls_record.h | 1 + 2 files changed, 51 insertions(+), 2 deletions(-) diff --git a/app/test

[PATCH v5 15/21] test/crypto: update framework to verify tls-1.3

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Update the fields in preparation of test descriptor. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 17 +--- app/test/test_cryptodev_security_tls_record.c | 43 --- app/test/test_cryptodev_security_tls_reco

[PATCH v5 20/21] test/crypto: unit tests for padding in DTLS-1.2

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for DTLS-1.2. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 60 +++ 1 file changed, 60 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c ind

[PATCH v5 19/21] test/crypto: unit tests to verify padding in TLS

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for TLS-1.2. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 85 ++- app/test/test_cryptodev_security_tls_record.c | 28 -- app/test/test_cryptodev_security_tls_record.h

[PATCH v5 18/21] test/crypto: test to verify zero len record in TLS

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify TLS-1.3 record with zero length. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 39 +++ 1 file changed, 39 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptode

[PATCH v5 17/21] test/crypto: test to verify custom content type in TLS

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify TLS-1.3 record with content type as custom. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 19 +++ 1 file changed, 19 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index

[PATCH v5 16/21] test/crypto: test to verify hdr corruption in TLS

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify TLS-1.3 record with header corruption. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 19 ++- 1 file changed, 18 insertions(+), 1 deletion(-) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptod

[PATCH v5 14/21] test/crypto: add TLS 1.3 vectors

2024-03-13 Thread Aakash Sasidharan
From: Akhil Goyal Added vectors and test suite for TLS 1.3 AES-128-GCM, AES-256-GCM and CHACHA20-POLY1305 vectors. The vectors are generated using gnuTLS client server application. Signed-off-by: Akhil Goyal --- app/test/test_cryptodev.c | 35 +++ app/test/test_cryptodev_s

[PATCH v5 13/21] test/crypto: update verification of header

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri In TLS 1.3, the version in the header would be TLS 1.2 and the content type would be APP irrespective of the type of the payload. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev_security_tls_record.c | 20 +-- 1 file changed, 14 insert

[PATCH v5 12/21] test/security: add more DTLS anti-replay window sz

2024-03-13 Thread Aakash Sasidharan
Add anti-replay tests for window sizes 128, 256, 512, 1024, 2048 and 4096 window sizes in DTLS 1.2 suite. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 72 +-- 1 file changed, 69 insertions(+), 3 deletions(-) diff --git a/app/test

[PATCH v5 11/21] test/security: add DTLS 1.2 anti-replay tests

2024-03-13 Thread Aakash Sasidharan
Add anti-replay test for DTLS 1.2. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 115 ++- app/test/test_cryptodev_security_tls_record.c | 132 ++ app/test/test_cryptodev_security_tls_record.h | 11 +- 3 files changed, 188

[PATCH v5 10/21] test/security: add TLS/DTLS 1.2 AES-256-SHA384 vectors

2024-03-13 Thread Aakash Sasidharan
From: Akhil Goyal Added vectors for TLS 1.2 and DTLS 1.2 using algos AES-256-CBC and HMAC-SHA384 Signed-off-by: Akhil Goyal --- app/test/test_cryptodev.c | 19 ++ app/test/test_cryptodev_security_tls_record.h | 2 + ...yptodev_security_tls_record_test_vectors.h | 200 +++

[PATCH v5 09/21] test/security: add unit tests for DTLS-1.2

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify 1. DTLS record with zero length 2. DTLS record with header corruption 3. DTLS record with content type as custom Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 77 +++ 1 file changed, 7

[PATCH v5 08/21] test/security: unit test to verify zero TLS records

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the zero len TLS records. Zero len packets are allowed when content type is app data while zero packet length with other content type (such as handshake) would result in an error. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptode

[PATCH v5 06/21] test/security: unit test for custom content verification

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify the TLS header creation with custom content type Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 19 +++ app/test/test_cryptodev_security_tls_record.c | 3 +++ app/test/test_cryptodev_se

[PATCH v5 07/21] test/cryptodev: allow zero packet length buffers

2024-03-13 Thread Aakash Sasidharan
From: Anoob Joseph The function 'create_segmented_mbuf' is updated to support zero packet length mbufs. This allows testing of zero packet length payload with TLS record processing. Signed-off-by: Anoob Joseph --- app/test/test_cryptodev.h | 20 +++- 1 file changed, 7 insertion

[PATCH v5 05/21] test/security: unit test for TLS packet corruption

2024-03-13 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add test to verify the corrupted TLS packet header Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 27 +-- app/test/test_cryptodev_security_tls_record.c | 4 +++ app/test/test_cryptodev_security_tls_record.h |

[PATCH v5 04/21] test/security: add TLS SG data walkthrough test

2024-03-13 Thread Aakash Sasidharan
Add multi segment packet data walkthrough test for TLS 1.2 and DTLS 1.2. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 42 +++ app/test/test_cryptodev_security_tls_record.h | 2 +- 2 files changed, 43 insertions(+), 1 deletion(-) diff

[PATCH v5 03/21] test/security: add DTLS 1.2 data walkthrough test

2024-03-13 Thread Aakash Sasidharan
Add data walkthrough test for DTLS 1.2 Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 17 + app/test/test_cryptodev_security_tls_record.c | 5 - 2 files changed, 21 insertions(+), 1 deletion(-) diff --git a/app/test/test_cryptodev.c b

[PATCH v5 02/21] test/security: add TLS 1.2 data walkthrough test

2024-03-13 Thread Aakash Sasidharan
Add data walkthrough test for TLS 1.2. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 90 +-- app/test/test_cryptodev_security_tls_record.c | 25 -- app/test/test_cryptodev_security_tls_record.h | 41 - app/test

[PATCH v5 01/21] test/security: enable AES-GCM in combined mode TLS

2024-03-13 Thread Aakash Sasidharan
Enable AES-GCM AEAD tests in combined mode TLS test suite. Coverity issue: 414888 Fixes: 9157ccb8f876 ("test/crypto: verify TLS headers") Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev_security_tls_record.c | 10 -- app/test/test_security_proto.h

[PATCH v5 00/21] Improvements and new test cases

2024-03-13 Thread Aakash Sasidharan
v5: * Define TEST_SEC_CIPHERTEXT_MAX_LEN based on existing MBUF_DATAPAYLOAD_SIZE macro. v4: * Set max ciphertext length for data walkthrough tests to 4k. v3: * Set max packet length for data walkthrough tests to 8k. v2: * Rebased. Aakash Sasidharan (7): test/security: enable AES-GCM in

[PATCH v4 21/21] test/security: add out of place sgl test case for TLS 1.2

2024-03-12 Thread Aakash Sasidharan
Add TLS 1.2 out-of-place multi-segmented packet test. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 52 ++- app/test/test_cryptodev_security_tls_record.h | 1 + 2 files changed, 51 insertions(+), 2 deletions(-) diff --git a/app/test

[PATCH v4 20/21] test/crypto: unit tests for padding in DTLS-1.2

2024-03-12 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for DTLS-1.2. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 60 +++ 1 file changed, 60 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c ind

[PATCH v4 19/21] test/crypto: unit tests to verify padding in TLS

2024-03-12 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for TLS-1.2. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 85 ++- app/test/test_cryptodev_security_tls_record.c | 28 -- app/test/test_cryptodev_security_tls_record.h

[PATCH v4 18/21] test/crypto: test to verify zero len record in TLS

2024-03-12 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify TLS-1.3 record with zero length. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 39 +++ 1 file changed, 39 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptode

[PATCH v4 17/21] test/crypto: test to verify custom content type in TLS

2024-03-12 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify TLS-1.3 record with content type as custom. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 19 +++ 1 file changed, 19 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index

[PATCH v4 16/21] test/crypto: test to verify hdr corruption in TLS

2024-03-12 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify TLS-1.3 record with header corruption. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 19 ++- 1 file changed, 18 insertions(+), 1 deletion(-) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptod

  1   2   >