On Wed, Mar 13, 2024 at 04:45:36PM -0700, Stephen Hemminger wrote:
> On Fri, 2 Feb 2024 13:58:19 -0700
> Ashish Sadanandan wrote:
>
> > > I think just having the extern "C" guard in all files is the safest
> > > choice,
> > > because it's immediately obvious in each and every file that it is
>
From: Shihong Wang
The SA salt of struct ipsec_sa is a CPU-endian u32 variable, but it’s
value is stored in an array of encryption or authentication keys
according to big-endian. So it maybe need to convert the endianness
order to ensure that the value assigned to the SA salt is CPU-endian.
Fixe
On the latest ice kernel driver, renegotiating VIRTCHNL_OP_GET_VF_RESOURCES
will fail without hardware reset when using dcf.
This commit will send VIRTCHNL_OP_RESET_VF to pf before dpdk resets vf.
Fixes: 7a93cd3575eb ("net/iavf: add VF reset check")
Cc: sta...@dpdk.org
Signed-off-by: Kaiwen Deng
> > Subject: [EXTERNAL] [PATCH 1/2] examples/ipsec-secgw: fix SA salt
> > endianness problem
> > From: Shihong Wang
> >
> > The SA salt of struct ipsec_sa is a CPU-endian u32 variable, but it’s
> > value is stored in an array of encryption or authentication keys
> > according to big-endian. So it
On 3/13/2024 5:20 PM, David Marchand wrote:
> On Wed, Mar 13, 2024 at 5:51 PM David Marchand
> wrote:
>>>
+ { TESTPMD_OPT_ETH_PEERS_CONFIGFILE, 1, NULL,
TESTPMD_OPT_ETH_PEERS_CONFIGFILE_NUM },
+ { TESTPMD_OPT_ETH_PEER, 1, NULL, TESTPMD_OPT_ETH_PEER_NUM },
>>>
>>> These
On 3/13/2024 4:51 PM, David Marchand wrote:
<...>
>>
>> And just after while loop, there is "if (optind != argc)" check, I don't
>> see when this check will be hit, so it looks useless.
> But this part actually looks correct to me.
> We could still hit this part with non handled trailing strings:
> -Original Message-
> From: Akhil Goyal
> Sent: Wednesday, March 13, 2024 7:22 PM
> To: Kusztal, ArkadiuszX ; dev@dpdk.org
> Cc: Power, Ciara
> Subject: RE: [EXTERNAL] [PATCH] app/crypto-perf-test: fix unset crc algorithm
>
> > Because net crc api is not thread-safe, setting crc algo
On Wed, Mar 13, 2024 at 2:45 PM Thomas Monjalon wrote:
> 13/03/2024 21:26, Ashish Sadanandan:
> > On Mon, Feb 12, 2024 at 9:02 AM Morten Brørup
> > wrote:
> >
> > > > From: Ferruh Yigit [mailto:ferruh.yi...@amd.com]
> > > > Sent: Monday, 12 February 2024 16.43
> > > >
> > > > On 2/5/2024 9:07 PM
Add a required version for mingw. The version is selected is
the version available for Debian oldstable (Bullseye) as listed on:
https://www.mingw-w64.org/downloads/
The 10.0 version was released in 4/4/2022,
The current upstream version 11.0.
Also drop note about Ubuntu 16.04 because that rele
On Tue, 12 Mar 2024 15:01:27 -0700
Stephen Hemminger wrote:
> The existing verbose levels 1..3 provide a messy multi-line
> output per packet. This is unhelpful when diagnosing many
> types of problems like packet flow.
>
> This patch adds two new levels:
> 4: one line per packet is printed in a
13/03/2024 21:26, Ashish Sadanandan:
> On Mon, Feb 12, 2024 at 9:02 AM Morten Brørup
> wrote:
>
> > > From: Ferruh Yigit [mailto:ferruh.yi...@amd.com]
> > > Sent: Monday, 12 February 2024 16.43
> > >
> > > On 2/5/2024 9:07 PM, Morten Brørup wrote:
> > > >> From: Tyler Retzlaff [mailto:roret...@li
On Mon, Feb 12, 2024 at 9:02 AM Morten Brørup
wrote:
> > From: Ferruh Yigit [mailto:ferruh.yi...@amd.com]
> > Sent: Monday, 12 February 2024 16.43
> >
> > On 2/5/2024 9:07 PM, Morten Brørup wrote:
> > >> From: Tyler Retzlaff [mailto:roret...@linux.microsoft.com]
> > >> Sent: Monday, 5 February 20
Recheck-request: iol-broadcom-Performance
I am seeing some increased throughput variance on this NIC recently
(may be related to upgrading device firmware). The Community Lab team
will look. This fail can be ignored of course, and should be
overwritten once the retest is picked up.
> Subject: [EXTERNAL] [PATCH 1/2] examples/ipsec-secgw: fix SA salt endianness
> problem
> From: Shihong Wang
>
> The SA salt of struct ipsec_sa is a CPU-endian u32 variable, but it’s
> value is stored in an array of encryption or authentication keys
> according to big-endian. So it maybe need to
> Because net crc api is not thread-safe, setting crc algorithm
> by the application will prevent race condition in the calc function.
> Race condition still may occur when any of the threads will call this
> function again. Function is called with the highest possible SIMD
> extension, which is AV
On 3/12/2024 8:02 AM, Chaoyong He wrote:
> This patch series fix some problems exist in the flow steering logic.
>
> Long Wu (2):
> net/nfp: fix IP flow rule failed
> net/nfp: fix incorrect queue index
>
Series applied to dpdk-next-net/main, thanks.
Hi Ganapati,
>> Is it not possible to use rte_event_crypto_adapter_enqueue
>> if you want to send the event context to cryptodev?
> [Ganapati] No, event crypto adapter sends only ev::event_ptr as rte_crypto_op
> to cryptodev and not event context.
>> While using rte_cryptodev_enqueue() all pre
> Subject: [PATCH v3 1/1] net/mana: add vlan tagging support
>
> For tx path, use LONG_PACKET_FORMAT if vlan tag is present. For rx, extract
> vlan
> id from oob, put into mbuf and set the vlan flags in mbuf.
>
> Signed-off-by: Wei Hu
Acked-by: Long Li
> ---
>
> v3:
> - Adjust the pkt_idx p
On Wed, Mar 13, 2024 at 5:51 PM David Marchand
wrote:
> >
> > > + { TESTPMD_OPT_ETH_PEERS_CONFIGFILE, 1, NULL,
> > > TESTPMD_OPT_ETH_PEERS_CONFIGFILE_NUM },
> > > + { TESTPMD_OPT_ETH_PEER, 1, NULL, TESTPMD_OPT_ETH_PEER_NUM },
> > >
> >
> > These long options are within "#ifdef RTE_LIB_CMD
Thank you Ferruh, I know it was last minute patchset. We appreciate your effort!
All the best, Shai
בתאריך 13 במרץ 2024 18:00, Ferruh Yigit כתב:
CAUTION: This email originated from outside of the organization. Do not click
links or open attachments unless you can confirm the sender and know the
Gvnic's DQO format allows offloading IPv4 checksum.
Made changes to Tx and Rx path to translate DPDK flags
to descriptor for offloading (and vice-versa).
Add ptype adminq support to only add this flags for
supported L3/L4 packet-types.
Signed-off-by: Rushil Gupta
Reviewed-by: Joshua Washington
-
Gvnic's DQO format allows offloading IPv4 checksum.
Made changes to Tx and Rx path to translate DPDK flags
to descriptor for offloading (and vice-versa).
Add ptype adminq support to only add this flags for
supported L3/L4 packet-types.
Signed-off-by: Rushil Gupta
Reviewed-by: Joshua Washington
-
On Tue, Mar 12, 2024 at 6:03 PM Ferruh Yigit wrote:
>
> On 3/8/2024 2:48 PM, David Marchand wrote:
> > This is a cleanup similar to previous ones in EAL and examples.
> > Instead of using strcmp for every long options while getopt_long already
> > did such parsing, rely on getopt_long return value
On Wed, 13 Mar 2024 12:09:01 +
Ferruh Yigit wrote:
> > Which is really close to the existing log message.
> >
> > if (rec_nb_pkts == 0)
> > rte_exit(EXIT_FAILURE,
> >
On 3/7/2024 8:01 AM, Artemy Kovalyov wrote:
The initialization of the Memzone file-backed array ensures its
uniqueness by employing an exclusive lock. This is crucial because only
one primary process can exist per specific shm_id, which is further
protected by the exclusive EAL runtime configurat
On 3/7/2024 8:01 AM, Artemy Kovalyov wrote:
If the configuration file is absent, the autodetection function should
generate and secure it. Otherwise, multiple simultaneous openings could
erroneously identify themselves as primary instances.
Fixes: af75078fece3 ("first public release")
Cc: sta...
On 3/7/2024 8:01 AM, Artemy Kovalyov wrote:
This commit addresses an issue related to the cleanup of the
multiprocess channel. Previously, when closing the channel, there was a
risk of losing trailing messages. This issue was particularly noticeable
when broadcast message from primary to secondar
On 3/7/2024 8:01 AM, Artemy Kovalyov wrote:
There exists a time gap between the creation of the multiprocess channel
and the registration of request action handlers. Within this window, a
secondary process that receives an eal_dev_mp_request broadcast
notification might respond with ENOTSUP. This
On 3/7/2024 8:01 AM, Artemy Kovalyov wrote:
This commit adds a test scenario that initiates multiple processes
concurrently. These processes attach to the same shared heap, with an
automatic detection mechanism to identify the primary process.
Signed-off-by: Artemy Kovalyov
---
Acked-by: Anato
> -Original Message-
> From: Kusztal, ArkadiuszX
> Sent: Wednesday, March 13, 2024 9:14 AM
> To: dev@dpdk.org
> Cc: gak...@marvell.com; Power, Ciara ; Kusztal,
> ArkadiuszX ; sta...@dpdk.org
> Subject: [PATCH v2] app/test: fix rsa tests in qat suite
>
> This commit fixes incorrectly se
On 3/12/2024 6:06 PM, shaib...@amazon.com wrote:
> From: Shai Brandes
>
> Hi all, the ena v2.9.0 release introduces:
> 1. HAL upgrade:
>- renamed the 'base' folder to be 'hal'
>- separated the HAL patches instead of a bulk update.
> 2. Restructured ena stats and metrics.
> 3. Restructured
On 3/12/2024 6:06 PM, shaib...@amazon.com wrote:
> From: Shai Brandes
>
> Depending on its acceleration support, the device updates
> a different statistic when an ingress packet is dropped
> because no buffers are available to hold it.
> - In AWS instance types from later generations
> 'rx_overr
On 3/12/2024 6:06 PM, shaib...@amazon.com wrote:
> From: Shai Brandes
>
> Add a new driver supported feature bit for TX IPv6 checksum offload.
>
> Signed-off-by: Shai Brandes
> Reviewed-by: Amit Bernstein
>
updated patch title as:
net/ena/base: add IPv6 checksum offload feature
On 3/12/2024 6:06 PM, shaib...@amazon.com wrote:
> From: Shai Brandes
>
> Limit the value of the exponent used for this backoff
> at (1<<16) to prevent it from reaching to an excessive
> value (1<<32) or potentially even overflowing.
> In addition, for uniformity and readability purposes,
> the m
On 3/12/2024 6:07 PM, shaib...@amazon.com wrote:
> From: Shai Brandes
>
> This patch makes several changes to improve
> the style and readability of the code.
>
> Signed-off-by: Shai Brandes
> Reviewed-by: Amit Bernstein
Updated patch title while merging, as:
net/ena: improve style and reada
On 3/12/2024 6:06 PM, shaib...@amazon.com wrote:
> From: Shai Brandes
>
> In case the application enables fast mbuf release optimization,
> the driver releases 256 TX mbufs in bulk upon reaching the
> TX free threshold.
> The existing implementation utilizes rte_mempool_put_bulk for bulk
> freein
On 3/12/2024 6:07 PM, shaib...@amazon.com wrote:
> From: Shai Brandes
>
> When invoking an admin command, in interrupt mode, if the interrupt
> is received after timeout and also after the calling function finished
> running, the response will be written into a memory that is no longer
> valid.
>
On 3/12/2024 6:06 PM, shaib...@amazon.com wrote:
> From: Shai Brandes
>
> Adding ENA_REGS_RESET_TX_DESCRIPTOR_MALFORMED to identify
> cases where the returned TX completion descriptors are
> corrupted.
>
"error reason"? Or "reset reason"?
Updating title as:
"net/ena/base: add malformed Tx desc
https://bugs.dpdk.org/show_bug.cgi?id=1400
Bug ID: 1400
Summary: net/ena: Failed to initialize ENA device
Product: DPDK
Version: 23.11
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: major
When configuring a port, the configured MTU will
not include VLAN tag size, but the physical
function driver will add it automatically if the
port has VLAN filtering configured, which may
result in seemingly valid MTU to be rejected by
the PF.
Document the limitation.
Signed-off-by: Anatoly Burak
On 3/11/2024 2:49 AM, Chaoyong He wrote:
> From: Shihong Wang
>
> The algorithm key of the security framework is stored in the u8
> array according to big-endian, and the driver algorithm key is
> CPU-endian of u32, so it maybe need to convert the endianness order
> to ensure that the value assig
Because net crc api is not thread-safe, setting crc algorithm
by the application will prevent race condition in the calc function.
Race condition still may occur when any of the threads will call this
function again. Function is called with the highest possible SIMD
extension, which is AVX512, but
> > Subject: [PATCH] crypto/qat: fix ccm null aad pointer segfault
> >
> > This commit fixes a segfault, that occurs when NULL pointer is being set to
> > the
> > aad pointer field.
> >
> > Fixes: a815a04cea05 ("crypto/qat: support symmetric build op request")
> > Cc: sta...@dpdk.org
> >
> > Signe
> > Subject: [PATCH] common/qat: fix null dereference in release function
> >
> > This commit fixes NULL dereference in the release function, and three
> additional
> > coverity issues related to NULL check.
> >
> > Coverity issue: 415038
> > Coverity issue: 415050
> > Coverity issue: 415052
> > Co
> Subject: [PATCH] compress/nitrox: fix dereference after null check
>
> In nitrox_check_comp_req() while updating the last byte during FINAL
> flush there is possibility of accessing null mbuf in two rare cases.
> First case is when the application changes the dst mbuf between
> enqueue and deque
On Wed, Mar 13, 2024 at 1:59 PM Maxime Coquelin
wrote:
>
> While investigating vhost-vdpa initialization issue with mlx5
> vDPA, we found two issues fixed by following patches.
>
> In this v2, the control queue issue mentioned in v1 is
> fixed. It turned out to the control queue being enabled
> on
On Thu, Mar 7, 2024 at 11:36 AM David Marchand
wrote:
>
> As the vhost library may receive a request for an unsupported request,
> it is necessary to check msg_handler before checking if locking queue
> pairs is requested.
>
> Coverity issue: 415049
> Fixes: 5e8fcc60b59d ("vhost: enhance virtqueue
On Thu, Mar 7, 2024 at 11:35 AM David Marchand
wrote:
>
> For vDPA devices, vq are not locked once the device has been configured
> at runtime.
>
> On the other hand, we need to hold the vq lock to evaluate vq->access_ok,
> invalidate vring addresses and translate them.
>
> Move vring address upda
On Tue, Mar 12, 2024 at 8:55 PM Stephen Hemminger
wrote:
>
> The DPDK style of indentation uses tabs not spaces.
> This file had mix of both. Convert it.
>
> Signed-off-by: Stephen Hemminger
Applied to dpdk-next-net-mrvl/for-main. Thanks
> ---
> v2 - fix resulting checkpatch warnings
>
> driv
> > There are use cases where a SA should be able to use different cryptodevs on
> > different lcores, for example there can be cryptodevs with just 1 qp per VF.
> > For this purpose this patch relaxes the check in create lookaside session
> > function.
> > Also add a check to verify that a CQP is
> Subject: [PATCH v5 00/21] Improvements and new test cases
>
> v5:
> * Define TEST_SEC_CIPHERTEXT_MAX_LEN based on existing
> MBUF_DATAPAYLOAD_SIZE macro.
>
> v4:
> * Set max ciphertext length for data walkthrough tests to 4k.
>
> v3:
> * Set max packet length for data walkthrough tests to 8k
On Wed, Mar 13, 2024 at 1:59 PM Maxime Coquelin
wrote:
>
> If the vDPA device advertises control queue support, but
> the user neither passes "cq=1" as devarg nor requests
> multiple queues, the initialization fails because the
> driver tries to setup the control queue without negotiating
> relate
> -Original Message-
> From: Ferruh Yigit
> Sent: Wednesday, March 13, 2024 1:28 PM
> To: Brandes, Shai
> Cc: dev@dpdk.org
> Subject: RE: [EXTERNAL] [PATCH v3 00/33] net/ena: v2.9.0 driver release
>
> CAUTION: This email originated from outside of the organization. Do not click
> links
On Tue, Mar 12, 2024 at 8:10 PM Amit Prakash Shukla
wrote:
>
> Added performance test support for DMA adapter.
>
> Signed-off-by: Amit Prakash Shukla
> Acked-by: Pavan Nikhilesh
> ---
> v4:
> - Updated release notes.
>
> v3:
> - Resolved review comments.
>
> v2:
> - Fixed intel compilation error
Notification area is a Virtio feature that requires to be
negotiated because not all devices support it. Currently,
it is tried to be initialized as soon as the backend
implements the callback, so it assumes all Vhost-vDPA
devices support it.
This patch skips calling the notification area map call
If the vDPA device advertises control queue support, but
the user neither passes "cq=1" as devarg nor requests
multiple queues, the initialization fails because the
driver tries to setup the control queue without negotiating
related feature.
This patch enables the control queue at driver level as
While investigating vhost-vdpa initialization issue with mlx5
vDPA, we found two issues fixed by following patches.
In this v2, the control queue issue mentioned in v1 is
fixed. It turned out to the control queue being enabled
only if multiqueue was negotiated. It is fixed by enabling
it at device
On 3/13/2024 11:10 AM, David Marchand wrote:
> On Wed, Mar 13, 2024 at 11:52 AM Ferruh Yigit wrote:
>>
>> On 3/13/2024 7:37 AM, David Marchand wrote:
>>> On Tue, Mar 12, 2024 at 5:59 PM Ferruh Yigit wrote:
On 3/8/2024 2:48 PM, David Marchand wrote:
> Checking the number of rxq/txq i
On Tue, Mar 12, 2024 at 3:53 PM Aaron Conole wrote:
>
> GitHub recently started using newer Ubuntu 22.04 LTS container images,
> versioned 20240310.1.0 which use 32-bit entropy for ASLR:
>
> $ sudo sysctl -a | grep vm.mmap.rnd
> vm.mmap_rnd_bits = 32
> vm.mmap_rnd_compat_bits = 16
>
> This b
On 3/13/2024 11:13 AM, David Marchand wrote:
> On Wed, Mar 13, 2024 at 11:37 AM Ferruh Yigit wrote:
>>
>> On 3/13/2024 7:24 AM, David Marchand wrote:
>>> On Tue, Mar 12, 2024 at 5:47 PM Ferruh Yigit wrote:
On 3/8/2024 2:48 PM, David Marchand wrote:
> rte_eth_dev_info_get() is not su
On 3/10/2024 2:58 PM, Brandes, Shai wrote:
>
>
>> -Original Message-
>> From: Ferruh Yigit
>> Sent: Friday, March 8, 2024 7:23 PM
>> To: Brandes, Shai
>> Cc: dev@dpdk.org; sta...@dpdk.org
>> Subject: RE: [EXTERNAL] [PATCH v3 05/33] net/ena: fix fast mbuf free
>>
>> CAUTION: This email o
On 3/10/2024 2:21 PM, Brandes, Shai wrote:
>
>
>> -Original Message-
>> From: Brandes, Shai
>> Sent: Friday, March 8, 2024 10:27 PM
>> To: Ferruh Yigit
>> Cc: dev@dpdk.org
>> Subject: RE: [PATCH v3 00/33] net/ena: v2.9.0 driver release
>>
>> Sure, will upload a new seried, thanks!
>>
>>
On 3/10/2024 3:08 PM, Brandes, Shai wrote:
>
>
>> -Original Message-
>> From: Ferruh Yigit
>> Sent: Friday, March 8, 2024 7:25 PM
>> To: Brandes, Shai
>> Cc: dev@dpdk.org
>> Subject: RE: [EXTERNAL] [PATCH v3 10/33] net/ena/hal: added a bus
>> parameter to ena memcpy macro
>>
>> CAUTION:
On 3/12/2024 4:53 PM, Brandes, Shai wrote:
>
>
>> -Original Message-
>> From: Brandes, Shai
>> Sent: Sunday, March 10, 2024 4:54 PM
>> To: 'Ferruh Yigit'
>> Cc: dev@dpdk.org
>> Subject: RE: [EXTERNAL] [PATCH v3 08/33] net/ena/hal: exponential backoff
>> exp limit
>>
>>
>>
>>> -Origin
On 3/10/2024 2:29 PM, Brandes, Shai wrote:
>
>
>> -Original Message-
>> From: Ferruh Yigit
>> Sent: Friday, March 8, 2024 7:24 PM
>> To: Brandes, Shai
>> Cc: dev@dpdk.org
>> Subject: RE: [EXTERNAL] [PATCH v3 07/33] net/ena: restructure the llq policy
>> setting process
>>
>> CAUTION: Th
On 3/10/2024 2:43 PM, Brandes, Shai wrote:
>
>
>> -Original Message-
>> From: Ferruh Yigit
>> Sent: Friday, March 8, 2024 7:23 PM
>> To: Brandes, Shai
>> Cc: dev@dpdk.org
>> Subject: RE: [EXTERNAL] [PATCH v3 04/33] net/ena: sub-optimal
>> configuration notifications support
>>
>> CAUTIO
On Wed, Mar 13, 2024 at 11:37 AM Ferruh Yigit wrote:
>
> On 3/13/2024 7:24 AM, David Marchand wrote:
> > On Tue, Mar 12, 2024 at 5:47 PM Ferruh Yigit wrote:
> >>
> >> On 3/8/2024 2:48 PM, David Marchand wrote:
> >>> rte_eth_dev_info_get() is not supposed to fail for a valid port_id, but
> >>> for
On Wed, Mar 13, 2024 at 11:52 AM Ferruh Yigit wrote:
>
> On 3/13/2024 7:37 AM, David Marchand wrote:
> > On Tue, Mar 12, 2024 at 5:59 PM Ferruh Yigit wrote:
> >>
> >> On 3/8/2024 2:48 PM, David Marchand wrote:
> >>> Checking the number of rxq/txq in the middle of option parsing is
> >>> confusing
Add TLS 1.2 out-of-place multi-segmented packet test.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 52 ++-
app/test/test_cryptodev_security_tls_record.h | 1 +
2 files changed, 51 insertions(+), 2 deletions(-)
diff --git a/app/test/test_c
From: Vidya Sagar Velumuri
Update the fields in preparation of test descriptor.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 17 +---
app/test/test_cryptodev_security_tls_record.c | 43 ---
app/test/test_cryptodev_security_tls_reco
From: Vidya Sagar Velumuri
Add unit tests to verify the padding for DTLS-1.2.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 60 +++
1 file changed, 60 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
ind
From: Vidya Sagar Velumuri
Add unit tests to verify the padding for TLS-1.2.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 85 ++-
app/test/test_cryptodev_security_tls_record.c | 28 --
app/test/test_cryptodev_security_tls_record.h
From: Vidya Sagar Velumuri
Add unit tests to verify TLS-1.3 record with zero length.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 39 +++
1 file changed, 39 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptode
From: Vidya Sagar Velumuri
Add unit tests to verify TLS-1.3 record with content type as custom.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 19 +++
1 file changed, 19 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index
From: Vidya Sagar Velumuri
Add unit tests to verify TLS-1.3 record with header corruption.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 19 ++-
1 file changed, 18 insertions(+), 1 deletion(-)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptod
From: Akhil Goyal
Added vectors and test suite for TLS 1.3
AES-128-GCM, AES-256-GCM and CHACHA20-POLY1305
vectors. The vectors are generated using gnuTLS
client server application.
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 35 +++
app/test/test_cryptodev_s
From: Vidya Sagar Velumuri
In TLS 1.3, the version in the header would be TLS 1.2 and the content
type would be APP irrespective of the type of the payload.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev_security_tls_record.c | 20 +--
1 file changed, 14 insert
Add anti-replay tests for window sizes 128, 256, 512, 1024,
2048 and 4096 window sizes in DTLS 1.2 suite.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 72 +--
1 file changed, 69 insertions(+), 3 deletions(-)
diff --git a/app/test/test_cryp
Add anti-replay test for DTLS 1.2.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 115 ++-
app/test/test_cryptodev_security_tls_record.c | 132 ++
app/test/test_cryptodev_security_tls_record.h | 11 +-
3 files changed, 188 insert
From: Akhil Goyal
Added vectors for TLS 1.2 and DTLS 1.2 using algos
AES-256-CBC and HMAC-SHA384
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 19 ++
app/test/test_cryptodev_security_tls_record.h | 2 +
...yptodev_security_tls_record_test_vectors.h | 200 +++
From: Vidya Sagar Velumuri
Add unit tests to verify
1. DTLS record with zero length
2. DTLS record with header corruption
3. DTLS record with content type as custom
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 77 +++
1 file changed, 7
From: Vidya Sagar Velumuri
Add unit tests to verify the zero len TLS records. Zero len packets are
allowed when content type is app data while zero packet length with
other content type (such as handshake) would result in an error.
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptode
From: Vidya Sagar Velumuri
Add unit test to verify the TLS header creation with
custom content type
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 19 +++
app/test/test_cryptodev_security_tls_record.c | 3 +++
app/test/test_cryptodev_se
From: Anoob Joseph
The function 'create_segmented_mbuf' is updated to support zero packet
length mbufs. This allows testing of zero packet length payload with TLS
record processing.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.h | 20 +++-
1 file changed, 7 insertion
From: Vidya Sagar Velumuri
Add test to verify the corrupted TLS packet header
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c | 27 +--
app/test/test_cryptodev_security_tls_record.c | 4 +++
app/test/test_cryptodev_security_tls_record.h |
Add multi segment packet data walkthrough test for TLS 1.2
and DTLS 1.2.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 42 +++
app/test/test_cryptodev_security_tls_record.h | 2 +-
2 files changed, 43 insertions(+), 1 deletion(-)
diff --gi
Add data walkthrough test for DTLS 1.2
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 17 +
app/test/test_cryptodev_security_tls_record.c | 5 -
2 files changed, 21 insertions(+), 1 deletion(-)
diff --git a/app/test/test_cryptodev.c b/a
Add data walkthrough test for TLS 1.2.
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev.c | 90 +--
app/test/test_cryptodev_security_tls_record.c | 25 --
app/test/test_cryptodev_security_tls_record.h | 41 -
app/test/test_security_prot
Enable AES-GCM AEAD tests in combined mode TLS test suite.
Coverity issue: 414888
Fixes: 9157ccb8f876 ("test/crypto: verify TLS headers")
Signed-off-by: Aakash Sasidharan
---
app/test/test_cryptodev_security_tls_record.c | 10 --
app/test/test_security_proto.h| 3 +++
2
v5:
* Define TEST_SEC_CIPHERTEXT_MAX_LEN based on existing
MBUF_DATAPAYLOAD_SIZE macro.
v4:
* Set max ciphertext length for data walkthrough tests to 4k.
v3:
* Set max packet length for data walkthrough tests to 8k.
v2:
* Rebased.
Aakash Sasidharan (7):
test/security: enable AES-GCM in comb
On 3/13/2024 7:37 AM, David Marchand wrote:
> On Tue, Mar 12, 2024 at 5:59 PM Ferruh Yigit wrote:
>>
>> On 3/8/2024 2:48 PM, David Marchand wrote:
>>> Checking the number of rxq/txq in the middle of option parsing is
>>> confusing. Move the check where nb_rxq / nb_txq are modified.
>>>
>>> Signed-
On 3/13/2024 7:24 AM, David Marchand wrote:
> On Tue, Mar 12, 2024 at 5:47 PM Ferruh Yigit wrote:
>>
>> On 3/8/2024 2:48 PM, David Marchand wrote:
>>> rte_eth_dev_info_get() is not supposed to fail for a valid port_id, but
>>> for the theoretical case when it would fail, raise an error rather than
Hi Team,
Gentle reminder! Can somebody please help us on this query.
We are validating the fdir with test-pmd tool. We are getting below error
while trying to add the flow create rule for the same.
Syntax:
testpmd> flow create 0 ingress pattern eth / ipv4 src is ipv4 dst is
/ tcp src is d
For tx path, use LONG_PACKET_FORMAT if vlan tag is present. For rx,
extract vlan id from oob, put into mbuf and set the vlan flags in
mbuf.
Signed-off-by: Wei Hu
---
v3:
- Adjust the pkt_idx position in the code so it will be executed even when
adding vlan header fails.
v2:
- Use existing vlan
> This commit fixes incorrectly set keys in the
> QAT testsuite for the RSA algorithm.
>
> Fixes: 9b5465867fb8 ("test/crypto: add RSA none padding cases")
> Cc: sta...@dpdk.org
>
> Signed-off-by: Arkadiusz Kusztal
> ---
> v2:
> - removed camel case
Removing camel case should be a separate patch
Hi,
> -Original Message-
> From: Morten Brørup
> Sent: Monday, January 16, 2023 3:07 PM
> To: dev@dpdk.org; roret...@linux.microsoft.com; rm...@marvell.com;
> timothy.mcdan...@intel.com; Matan Azrad ; Slava
> Ovsiienko
> Cc: ruifeng.w...@arm.com; zhou...@loongson.cn;
> d...@linux.vnet.ibm
>Ok, the naming convention used by me is `CamelCase`. One suggested from your
>end is `snake_case`.
>Does DPDK has a constrain it can not use CamelCase.
Please refer to:
https://doc.dpdk.org/guides/contributing/coding_style.html
In particular:
1.5.4. Variable Declarations
In declarations, do
Hi,
> -Original Message-
> From: Thomas Monjalon
> Sent: Tuesday, March 5, 2024 3:13 PM
> To: dev@dpdk.org
> Cc: Dariusz Sosnowski ; Slava Ovsiienko
> ; Ori Kam ; Suanming Mou
> ; Matan Azrad
> Subject: [PATCH 1/2] net/mlx5: update speed capabilities parsing on Linux
>
> Ease maintenanc
[AMD Official Use Only - General]
Hi,
> -Original Message-
> From: David Marchand
> Sent: Thursday, March 7, 2024 2:04 PM
> To: Tummala, Sivaprasad
> Cc: david.h...@intel.com; anatoly.bura...@intel.com; jer...@marvell.com;
> radu.nico...@intel.com; gak...@marvell.com; cristian.dumitre..
This commit fixes incorrectly set keys in the
QAT testsuite for the RSA algorithm.
Fixes: 9b5465867fb8 ("test/crypto: add RSA none padding cases")
Cc: sta...@dpdk.org
Signed-off-by: Arkadiusz Kusztal
---
v2:
- removed camel case
app/test/test_cryptodev_asym.c | 102 ++--
1 - 100 of 112 matches
Mail list logo