NIST GCM decrypt result vectors expects to have following print
for zero length payload instead of having no print.
"pt" = ""
Fixes: b09aac2d6e2b ("examples/fips_validation: add JSON to GCM test")
Signed-off-by: Archana Muniganti
---
examples/fips_validation/fi
Hi Akhil,
Please see inline.
Thanks,
Archana
> -Original Message-
> From: Akhil Goyal
> Sent: Friday, April 29, 2022 11:31 AM
> To: Archana Muniganti ; ciara.po...@intel.com;
> declan.dohe...@intel.com
> Cc: Archana Muniganti ; Anoob Joseph
> ; dev@dpdk.org
>
Added test vector file for AES-128-GCM for
64B and 512B length buffers.
Signed-off-by: Archana Muniganti
---
app/test-crypto-perf/data/aes_gcm_128.data | 97 ++
1 file changed, 97 insertions(+)
create mode 100644 app/test-crypto-perf/data/aes_gcm_128.data
diff --git a/app
For decrypt, ICV mismatch can come as data is dummy and
latency will be calculated for error path. Hence populate
mbuf with test vector data.
Signed-off-by: Archana Muniganti
---
app/test-crypto-perf/cperf_ops.c | 3 +-
app/test-crypto-perf/cperf_test_common.c | 36
For decrypt, ICV mismatch can come as data is dummy and
latency will be calculated for error path. Hence populate
mbuf with test vector data.
Archana Muniganti (2):
app/crypto-perf: populate mbuf in latency test
app/crypto-perf: add vector file for AES-GCM
app/test-crypto-perf/cperf_ops.c
Added AES_GMAC test vectors along with combined mode support.
Signed-off-by: Archana Muniganti
---
app/test/test_cryptodev.c | 26 +++-
app/test/test_cryptodev_security_ipsec.c | 12 ++
app/test/test_cryptodev_security_ipsec.h | 9
Added tunnel and transport AH known test vectors for
SHA256 HMAC.
Signed-off-by: Archana Muniganti
---
app/test/test_cryptodev.c | 33 ++-
...st_cryptodev_security_ipsec_test_vectors.h | 210 ++
doc/guides/rel_notes/release_22_03.rst| 1 +
3 files
Added auth only and null cipher + auth under combined mode
for following combinations.
1. Tunnel IPv4
2. Transport IPv4
Signed-off-by: Archana Muniganti
---
app/test/test_cryptodev.c| 97
app/test/test_cryptodev_security_ipsec.c | 74
Add IPsec AH known test vectors including combined
mode support.
Archana Muniganti (3):
test/crypto: add AH under combined mode UT
test/crypto: add AH test vectors
test/crypto: add AH AES-GMAC test vectors
app/test/test_cryptodev.c | 150 +++-
app/test
Adds IPv6 mixed tunnel mode support for cn9k.
Signed-off-by: Archana Muniganti
---
drivers/crypto/cnxk/cn9k_ipsec.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/drivers/crypto/cnxk/cn9k_ipsec.c b/drivers/crypto/cnxk/cn9k_ipsec.c
index ca26d9289c..a81130b244 100644
Update auth key size for SHA256_HMAC for cn9k.
Signed-off-by: Archana Muniganti
---
.../crypto/cnxk/cnxk_cryptodev_capabilities.c | 22 +++
1 file changed, 22 insertions(+)
diff --git a/drivers/crypto/cnxk/cnxk_cryptodev_capabilities.c
b/drivers/crypto/cnxk
Updated feature list supported with cn9k.
Signed-off-by: Archana Muniganti
---
doc/guides/cryptodevs/cnxk.rst | 4
1 file changed, 4 insertions(+)
diff --git a/doc/guides/cryptodevs/cnxk.rst b/doc/guides/cryptodevs/cnxk.rst
index faad6a499d..23cc823e03 100644
--- a/doc/guides/cryptodevs
Adds ESN and anti-replay support for lookaside IPsec.
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/cnxk.rst | 2 +
doc/guides/rel_notes/release_21_11.rst | 1 +
drivers/common/cnxk/cnxk_security_ar.h | 21 +
drivers/crypto/cnxk
From: Anoob Joseph
Add null auth support with lookaside IPsec on cn10k crypto PMDs.
Signed-off-by: Anoob Joseph
---
doc/guides/cryptodevs/cnxk.rst| 1 +
doc/guides/rel_notes/release_21_11.rst| 1 +
drivers/crypto/cnxk/cn9k_ipsec.c | 6 +++--
.../crypto/c
From: Anoob Joseph
Add support for null auth with IPsec operations on cn10k.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/cnxk_security.c | 18 ++
1 file changed, 10 insertions(+), 8 deletions(-)
diff --git a/drivers/common/cnxk/cnxk_security.c
b/drivers/common/cnxk/cn
/cnxk: add null auth with IPsec
crypto/cnxk: add null auth
Archana Muniganti (4):
crypto/cnxk: add cn9k ESN and anti-replay support
doc/guides: update feature list supported with cn9k
crypto/cnxk: update auth key size
crypto/cnxk: support IPv6 mixed tunnel mode
doc/guides/cryptodevs
For current pkt, previous seqhi is used instead of its
guessed seqhi. Fixed it.
Fixes: 5be562bc5b78 ("crypto/octeontx2: support IPsec ESN and anti-replay")
Cc: sta...@dpdk.org
Signed-off-by: Archana Muniganti
---
drivers/crypto/octeontx2/otx2_cryptodev_ops.c | 16 --
-op encrypt --aead-key-sz 32 --aead-iv-sz 12 --aead-aad-sz 16
--digest-sz 16 --total-ops 1000 --burst-sz 32
--buffer-sz 64,128,256,512,1024,1280,2048
Signed-off-by: Akhil Goyal
Signed-off-by: Archana Muniganti
---
v3: fixed mbuf to have IP data instead of plain data.
v2: added release notes
Use IE engine group for cn9k IPsec.
Signed-off-by: Archana Muniganti
---
drivers/crypto/cnxk/cn9k_ipsec.c | 9 ++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/drivers/crypto/cnxk/cn9k_ipsec.c b/drivers/crypto/cnxk/cn9k_ipsec.c
index 63ae025030..9ca4d20c62 100644
--- a
This patch adds tests for inner IP and inner L4 checksum
in IPsec mode.
Signed-off-by: Archana Muniganti
---
app/test/test_cryptodev.c | 34 +++
app/test/test_cryptodev_security_ipsec.c | 195 ++
app/test/test_cryptodev_security_ipsec.h | 2
Add inner checksum support for cn10k.
Signed-off-by: Archana Muniganti
---
doc/guides/cryptodevs/features/cn10k.ini | 1 +
doc/guides/rel_notes/release_21_11.rst| 1 +
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 65 +++
drivers/crypto/cnxk/cn10k_ipsec.c
Add inner packet IPv4 hdr and L4 checksum enable options
in conf. These will be used in case of protocol offload.
Per SA, application could specify whether the
checksum(compute/verify) can be offloaded to security device.
Signed-off-by: Archana Muniganti
---
doc/guides/cryptodevs/features
checksum(comment from Konstantin)
Changes in v3:
- Removed code unrelated to this series.
Changes in v2:
- Fixed release notes
- Added feature flag in default.ini and cn10k.ini
- Fixed test patch subject
Archana Muniganti (3):
security: add SA config option for inner pkt csum
crypto/cnxk: add inner
This patch adds tests for inner IP and inner L4 checksum
in IPsec mode.
Signed-off-by: Archana Muniganti
---
app/test/test_cryptodev.c | 34 +++
app/test/test_cryptodev_security_ipsec.c | 195 ++
app/test/test_cryptodev_security_ipsec.h | 2
Add inner checksum support for cn10k.
Signed-off-by: Archana Muniganti
---
doc/guides/cryptodevs/features/cn10k.ini | 1 +
doc/guides/rel_notes/release_21_11.rst| 1 +
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 65 +++
drivers/crypto/cnxk/cn10k_ipsec.c
Add inner packet IPv4 hdr and L4 checksum enable options
in conf. These will be used in case of protocol offload.
Per SA, application could specify whether the
checksum(compute/verify) can be offloaded to security device.
Signed-off-by: Archana Muniganti
---
doc/guides/cryptodevs/features
Changes in v3:
- Removed code unrelated to this series.
Changes in v2:
- Fixed release notes
- Added feature flag in default.ini and cn10k.ini
- Fixed test patch subject
Archana Muniganti (3):
security: add SA config option for inner pkt csum
crypto/cnxk: add inner checksum
test/crypto: add inner
This patch adds tests for inner IP and inner L4 checksum
in IPsec mode.
Signed-off-by: Archana Muniganti
---
app/test/test_cryptodev.c | 34 +++
app/test/test_cryptodev_security_ipsec.c | 195 ++
app/test/test_cryptodev_security_ipsec.h | 2
Add inner checksum support for cn10k.
Signed-off-by: Archana Muniganti
---
doc/guides/cryptodevs/features/cn10k.ini | 1 +
doc/guides/rel_notes/release_21_11.rst| 1 +
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 65 +++
drivers/crypto/cnxk/cn10k_ipsec.c
Add inner packet IPv4 hdr and L4 checksum enable options
in conf. These will be used in case of protocol offload.
Per SA, application could specify whether the
checksum(compute/verify) can be offloaded to security device.
Signed-off-by: Archana Muniganti
---
doc/guides/cryptodevs/features
Changes in v2:
- Fixed release notes
- Added feature flag in default.ini and cn10k.ini
- Fixed test patch subject
Archana Muniganti (3):
security: add SA config option for inner pkt csum
crypto/cnxk: add inner checksum
test/crypto: add inner checksum cases
app/test/test_cryptodev.c
This patch adds tests for inner IP and inner L4 checksum
in IPsec mode.
Signed-off-by: Archana Muniganti
---
app/test/test_cryptodev.c | 34 +++
app/test/test_cryptodev_security_ipsec.c | 195 ++
app/test/test_cryptodev_security_ipsec.h | 2
Add inner checksum support for cn10k
Signed-off-by: Archana Muniganti
---
doc/guides/rel_notes/release_21_11.rst| 1 +
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 65 +++
drivers/crypto/cnxk/cn10k_ipsec.c | 49 +-
drivers/crypto/cnxk
Add inner packet IPv4 hdr and L4 checksum enable options
in conf. These will be used in case of protocol offload.
Per SA, application could specify whether the
checksum(compute/verify) can be offloaded to security device.
Signed-off-by: Archana Muniganti
---
doc/guides/rel_notes/deprecation.rst
Archana Muniganti (3):
security: add SA config option for inner pkt csum
crypto/cnxk: add inner checksum
app/test: add inner checksum tests
app/test/test_cryptodev.c | 34 +++
app/test/test_cryptodev_security_ipsec.c | 195 ++
app/test
Update device feature flag to support lookaside IPsec for
cn9k.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
doc/guides/cryptodevs/cnxk.rst | 14 --
doc/guides/cryptodevs/features/cn9k.ini
Update min tailroom to reflect IPsec additions.
PMD crypto_cn9k & crypto_cn10k would have packet
grow into tailroom post IPsec processing.
Signed-off-by: Archana Muniganti
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 2 +-
drivers/crypto/cnxk/cnxk_cryptodev_ops.h | 1 +
2 files change
Adds support for cn9k lookaside enqueue and dequeue
operations.
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
drivers/crypto/cnxk/cn9k_cryptodev_ops.c | 78 +++-
drivers/crypto/cnxk/cn9k_ipsec_la_ops.h | 90
Add security session ops.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
drivers/crypto/cnxk/cn9k_cryptodev.c | 2 +
drivers/crypto/cnxk/cn9k_ipsec.c | 610 +++
drivers/crypto/cnxk
Microcode IE opcodes support IPsec operations. Add defines
and structs defined by microcode.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
drivers/common/cnxk/roc_cpt.h | 1 +
drivers/common/cnxk/roc_ie_on.h
Add security ctx in cn9k crypto PMD.
Signed-off-by: Archana Muniganti
Signed-off-by: Vamsi Attunuru
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn9k_cryptodev.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/drivers/crypto/cnxk/cn9k_cryptodev.c
b/drivers/crypto/cnxk
This series adds lookaside IPsec support in cnxk crypto PMD
for Marvell CN9K SOC.
Changes in v2:
- Fixed release notes
- Squashed patches and reduced no of patches from 8 to 6
Archana Muniganti (6):
crypto/cnxk: add cn9k security ctx
common/cnxk: add cn9k IPsec microcode defines
crypto
Update device feature flag to support lookaside IPsec for
cn9k.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
doc/guides/cryptodevs/cnxk.rst | 14 --
doc/guides/cryptodevs/features/cn9k.ini
Update min tailroom to reflect IPsec additions.
PMD crypto_cn9k & crypto_cn10k would have packet
grow into tailroom post IPsec processing.
Signed-off-by: Archana Muniganti
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 2 +-
drivers/crypto/cnxk/cnxk_cryptodev_ops.h | 1 +
2 files change
Adds support for cn9k lookaside enqueue and dequeue
operations.
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
drivers/crypto/cnxk/cn9k_cryptodev_ops.c | 78 +++-
drivers/crypto/cnxk/cn9k_ipsec_la_ops.h | 90
Adding logic for IPsec inbound session creation.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
drivers/crypto/cnxk/cn9k_ipsec.c | 64 +---
1 file changed, 59 insertions(+), 5
Adding logic for IPsec outbound session creation.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
drivers/crypto/cnxk/cn9k_ipsec.c | 143 +--
drivers/crypto/cnxk/cn9k_ipsec.h | 17
Add helper functions useful in implementing IPsec outbound
and inbound session create apis.
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
drivers/crypto/cnxk/cn9k_cryptodev.c | 2 +
drivers/crypto/cnxk/cn9k_ipsec.c | 425
Microcode IE opcodes support IPsec operations. Add defines
and structs defined by microcode.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vamsi Attunuru
---
drivers/common/cnxk/roc_cpt.h | 1 +
drivers/common/cnxk/roc_ie_on.h
Add security ctx in cn9k crypto PMD.
Signed-off-by: Archana Muniganti
Signed-off-by: Vamsi Attunuru
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn9k_cryptodev.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/drivers/crypto/cnxk/cn9k_cryptodev.c
b/drivers/crypto/cnxk
This series adds lookaside IPsec support in crypto_cn9k PMD.
Depends on:
http://patches.dpdk.org/project/dpdk/list/?series=18628
Archana Muniganti (8):
crypto/cnxk: add cn9k security ctx
common/cnxk: add cn9k IPsec microcode defines
crypto/cnxk: add cn9k IPsec session related functions
to the
security device.
https://mails.dpdk.org/archives/dev/2021-June/212977.html
Signed-off-by: Archana Muniganti
---
doc/guides/rel_notes/deprecation.rst | 4
1 file changed, 4 insertions(+)
diff --git a/doc/guides/rel_notes/deprecation.rst
b/doc/guides/rel_notes/deprecation.rst
index
Add inner packet IPv4 hdr and L4 checksum enable options
in conf. These will be used in case of protocol offload.
Per SA, application could specify whether the
checksum(compute/verify) can be offloaded to security device.
Signed-off-by: Archana Muniganti
---
lib/cryptodev/rte_crypto.h| 9
Replace redundant macro ROUNDUP* with predefined macros.
Signed-off-by: Archana Muniganti
---
drivers/common/cpt/cpt_common.h | 12
drivers/common/cpt/cpt_pmd_ops_helper.c | 5 +++--
drivers/common/cpt/cpt_ucode.h| 11 +++
drivers/common
Replaced structure 'rid' which has single field with its
field itself.
Signed-off-by: Archana Muniganti
---
drivers/common/cpt/cpt_common.h | 7 +--
drivers/crypto/octeontx/otx_cryptodev_hw_access.c | 10 +-
drivers/crypto/octeontx/otx_cryptodev_ops.c
This series has code cleanup and improvements for
OCTEON TX and OCTEON TX2 crypto PMDs
Archana Muniganti (4):
common/cpt: prepopulate word7 in sess
common/cpt: remove temporary variable
common/cpt: use predefined macros
common/cpt: remove redundant structure
drivers/common/cpt
Remove temporary variable used in datapath.
Signed-off-by: Archana Muniganti
---
drivers/common/cpt/cpt_hw_types.h | 10 ++-
drivers/common/cpt/cpt_mcode_defines.h| 8 --
drivers/common/cpt/cpt_ucode.h| 79 ++-
drivers/common/cpt
CPT inst word7 is an immutable data for a session.
This data can be populated in a session.
Signed-off-by: Archana Muniganti
---
drivers/common/cpt/cpt_common.h | 1 -
drivers/common/cpt/cpt_mcode_defines.h| 13 ++-
drivers/common/cpt/cpt_ucode.h| 109
> -Original Message-
> From: Fan Zhang
> Sent: Thursday, October 22, 2020 3:29 PM
> To: dev@dpdk.org
> Cc: akhil.go...@nxp.com; Fan Zhang ; Archana
> Muniganti
> Subject: [EXT] [dpdk-dev 1/2] fips_validation: fix missed version lin
Hi Fan,
Could you please review the changes?
Thanks,
Archana
> -Original Message-
> From: Archana Muniganti
> Sent: Wednesday, September 9, 2020 9:57 PM
> To: roy.fan.zh...@intel.com; marko.kovace...@intel.com;
> akhil.go...@nxp.com
> Cc: Archana Muniganti ; Anoob Jos
Bypass the test vectors of unsupported crypto transform
for SHA.
Signed-off-by: Archana Muniganti
---
examples/fips_validation/main.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/examples/fips_validation/main.c b/examples/fips_validation/main.c
index efd32a8..bde779c
HMAC/HASH opcode algorithms supports fixed mac length.
Allowed session creation to fail when requested for
unsupported MAC length for HMAC/HASH-only use cases.
Signed-off-by: Archana Muniganti
---
drivers/common/cpt/cpt_mcode_defines.h| 3 ++
drivers/common/cpt/cpt_ucode.h
The macros can be replaced with actual constants.
Signed-off-by: Archana Muniganti
---
drivers/common/cpt/cpt_mcode_defines.h | 3 ---
drivers/common/cpt/cpt_ucode.h | 14 +++---
2 files changed, 7 insertions(+), 10 deletions(-)
diff --git a/drivers/common/cpt
Separate out CAVS request file version 21.4 code to support
lower versions.
Fixes: 32440cdf2af9 ("examples/fips_validation: fix parsing of TDES vectors")
Fixes: 2b84d2bd47df ("examples/fips_validation: fix count overwrite for TDES")
Signed-off-by: Archana Muniganti
---
exam
then parses each with their respective
callbacks.
Fixes: 3d0fad56b74a ("examples/fips_validation: add crypto FIPS application")
Signed-off-by: Archana Muniganti
Signed-off-by: Ayuj Verma
---
examples/fips_validation/fips_validation.c | 21 +++--
examples/
Fix missing callback registration and the incorrect
callback definition for interim NK_STR. The callback
should compare input key against the interim.
Fixes: 527cbf3d5ee3 ("examples/fips_validation: support TDES parsing")
Signed-off-by: Archana Muniganti
---
examples/fips_
validation: support TDES parsing")
Signed-off-by: Archana Muniganti
Signed-off-by: Kanaka Durga Kotamarthy
---
examples/fips_validation/fips_validation.c | 8
examples/fips_validation/main.c| 5 -
2 files changed, 12 insertions(+), 1 deletion(-)
diff --git a/examples/
Few of the NIST TDES test files don't contain TDES string.
Added indicators to identify such files. These indicators
are part of only NIST TDES test vector files.
Fixes: 527cbf3d5ee3 ("examples/fips_validation: support TDES parsing")
Signed-off-by: Archana Muniganti
Signed-off
From: Sucharitha Sarananaga
AES XTS support is added to fips application. Parse test-vectors
from input files, populate AES XTS tests and prepare AES XTS
operations for fips validation.
Signed-off-by: Abed Kamaluddin
Signed-off-by: Archana Muniganti
Signed-off-by: Sucharitha Sarananaga
Hi Akhil,
Please see inline.
Thanks,
Archana
> -Original Message-
> From: Akhil Goyal
> Sent: Monday, January 6, 2020 3:09 PM
> To: Archana Muniganti ;
> marko.kovace...@intel.com; roy.fan.zh...@intel.com
> Cc: Sucharitha Sarananaga ; Anoob Joseph
> ; Abed Mohammad
From: Sucharitha Sarananaga
Cipher length need to be updated in case of AES-GCM decryption.
Fixes: 4aaad2995e13 ("examples/fips_validation: support GCM parsing")
Signed-off-by: Archana Muniganti
Signed-off-by: Sucharitha Sarananaga
---
examples/fips_validation/fips_validation
In AEAD decrypt(verify mode), test data should point to
cipher text instead of plain text
Fixes: 5b2b0a740fba ("app/crypto-perf: overwrite mbuf when verifying")
Signed-off-by: Archana Muniganti
---
app/test-crypto-perf/cperf_test_verify.c | 14 +++---
1 file changed, 11
72 matches
Mail list logo