Added SM4-GCM tests for the AESNI MB PMD.
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev.c | 158 +
app/test/test_cryptodev_aead_test_vectors.h | 708
2 files changed, 866 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test
This patch introduces SM4 GCM algorithm support to the AESNI_MB PMD.
SM4 GCM is available in the v2.0 release of Intel IPsec MB.
Signed-off-by: Brian Dooley
---
v2:
Added aad to cpu job params
Added ipsec mb version checks
v3:
Fix naming for patchwork
---
doc/guides
Added SM4-GCM tests for the AESNI MB PMD.
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev.c | 158 +
app/test/test_cryptodev_aead_test_vectors.h | 708
2 files changed, 866 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test
This patch introduces SM4 GCM algorithm support to the AESNI_MB PMD.
SM4 GCM is available in the v2.0 release of Intel IPsec MB.
Signed-off-by: Brian Dooley
---
v2:
Added aad to cpu job params
Added ipsec mb version checks
---
doc/guides/cryptodevs/aesni_mb.rst | 1
Added SM4-GCM tests for the AESNI MB PMD.
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev.c | 158 +
app/test/test_cryptodev_aead_test_vectors.h | 708
2 files changed, 866 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test
This patch introduces SM4 GCM algorithm support to the AESNI_MB PMD.
SM4 GCM is available in the v2.0 release of Intel IPsec MB.
Signed-off-by: Brian Dooley
---
doc/guides/cryptodevs/aesni_mb.rst | 1 +
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
doc/guides/cryptodevs/features
For the synchronous API the enqueue/dequeue burst functions are not
called. Skip these tests when calling the synchronous API.
Fixes: 4ad17a1c8fb3 ("test/crypto: fix enqueue/dequeue callback case")
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
app/test/test_crypto
AESNI_MB SW PMDs increment Intel IPsec MB version to 1.4.
A minimum IPsec Multi-buffer version of 1.4 or greater is now required
for the 24.11 LTS release.
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Pablo de Lara
---
This patch relates to a deprecation notice sent in the 24.03
AESNI_MB SW PMDs increment Intel IPsec MB version to 1.4.
A minimum IPsec Multi-buffer version of 1.4 or greater is now required
for the 24.11 LTS release.
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Pablo de Lara
---
This patch relates to a deprecation notice sent in the 24.03
AESNI_MB SW PMDs increment Intel IPsec MB version to 1.4.
A minimum IPsec Multi-buffer version of 1.4 or greater is now required
for the 24.11 LTS release.
Signed-off-by: Brian Dooley
---
This patch relates to a deprecation notice sent in the 24.03 release.
Intel IPsec MB minimum version being
This patch introduces SM4 CBC, SM4 ECB and SM4 CTR algorithm support to
the AESNI_MB PMD. SM4 CTR is available in the v2.0 release of
Intel IPsec MB.
Signed-off-by: Brian Dooley
---
v2:
Add Intel IPsec MB version check to capabilities
Add SM4 CTR algorithm support
v3:
Fix
This patch introduces HMAC SM3 algorithm support to the AESNI_MB PMD.
Signed-off-by: Brian Dooley
---
v3:
Add documentation
---
doc/guides/cryptodevs/aesni_mb.rst | 1 +
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
doc/guides/rel_notes/release_24_11.rst | 1
This patch introduces SM3 algorithm support to the AESNI_MB PMD.
Signed-off-by: Brian Dooley
---
v3:
Add ipsec mb version check
Add documentation
---
doc/guides/cryptodevs/aesni_mb.rst | 1 +
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
doc/guides/rel_notes
Added support to the AESNI MB PMD feature matrix for SM3, SM3 HMAC,
SM4 CBC, SM4 ECB, SM4 CTR. Updated release notes with same.
Signed-off-by: Brian Dooley
---
doc/guides/cryptodevs/features/aesni_mb.ini | 5 +
doc/guides/rel_notes/release_24_11.rst | 4
2 files changed, 9
This patch introduces SM4 algorithm support for SM4 CBC, SM4 ECB
and SM4 CTR to the AESNI_MB PMD.
Signed-off-by: Brian Dooley
---
v2:
Add Intel IPsec MB version check to capabilities
Add SM4 CTR algorithm support
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 26
This patch introduces HMAC SM3 algorithm support to the AESNI_MB PMD.
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 3 +++
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 24 -
2 files changed, 26 insertions(+), 1 deletion(-)
diff --git a
This patch introduces SM3 algorithm support to the AESNI_MB PMD.
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 5
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 26 -
2 files changed, 30 insertions(+), 1 deletion(-)
diff --git a/drivers
This patch introduces SM4 algorithm support to the AESNI_MB PMD.
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 22 ++
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 47 +
2 files changed, 69 insertions(+)
diff --git a/drivers/crypto
This patch introduces HMAC SM3 algorithm support to the AESNI_MB PMD.
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 3 +++
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 24 -
2 files changed, 26 insertions(+), 1 deletion(-)
diff --git a
This patch introduces SM3 algorithm support to the AESNI_MB PMD.
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 5
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 26 -
2 files changed, 30 insertions(+), 1 deletion(-)
diff --git a/drivers
om
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
drivers/crypto/qat/dev/qat_crypto_pmd_gen4.c | 121 ++-
drivers/crypto/qat/dev/qat_crypto_pmd_gens.h | 6 +
2 files changed, 123 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/qat/dev/qat_crypto_pmd_gen4.c
b/driv
IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
v2:
* fix doc indentation
---
doc/guides/rel_notes/release_24_07.rst| 5 +
drivers/crypto/ipsec_mb/pmd_aesni_mb.c| 10 +-
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 15 +-
drivers/crypto/ipsec_mb
Unifying some PMDs in the ipsec_mb crypto driver
As discussed previously on the mailing list:
https://patches.dpdk.org/project/dpdk/patch/20240228113301.934291-1-brian.doo...@intel.com/
v2:
* fix doc indentation
Brian Dooley (1):
crypto/ipsec_mb: unify some IPsec MB PMDs
doc/guides/rel_notes
IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
doc/guides/rel_notes/release_24_07.rst| 3 +
drivers/crypto/ipsec_mb/pmd_aesni_mb.c| 10 +-
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 15 +-
drivers/crypto/ipsec_mb/pmd_chacha_poly.c | 340
Unifying some PMDs in the ipsec_mb crypto driver
As discussed previously on the mailing list:
https://patches.dpdk.org/project/dpdk/patch/20240228113301.934291-1-brian.doo...@intel.com/
Brian Dooley (1):
crypto/ipsec_mb: unify some IPsec MB PMDs
doc/guides/rel_notes/release_24_07.rst
From: Pablo de Lara
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 34 +-
1 file changed, 33 insertions(+), 1
The Intel IPsec Multi-buffer version is set to be bumped to a minimum
version of 1.4 for the 24.11 LTS release.
Signed-off-by: Brian Dooley
---
doc/guides/rel_notes/deprecation.rst | 4
1 file changed, 4 insertions(+)
diff --git a/doc/guides/rel_notes/deprecation.rst
b/doc/guides
SW PMDs documentation is updated to remove details of unsupported IPsec
Multi-buffer versions. DPDK older than 20.11 is end of life. So, older
DPDK versions are removed from the Crypto library version table.
Signed-off-by: Sivaramakrishnan Venkat
Signed-off-by: Brian Dooley
Acked-by: Pablo de
IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Acked-by: Wathsala Vithanage
---
v6:
- Reintroduce SNOW3G and ZUC PMDs
v5:
- Rebased and added patchset
v4:
- Keep AES GCM PMD and fix extern issue
v3:
- Remove session configure pointer for each PMD
v2:
- Fix
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Acked-by: Wathsala Vithanage
---
v5:
- Rebased and added to patchset
v2:
- Remove ipsec mb version checks
From: Sivaramakrishnan Venkat
SW PMDs documentation is updated to remove details of unsupported IPsec
Multi-buffer versions.DPDK older than 20.11 is end of life. So, older
DPDK versions are removed from the Crypto library version table.
Signed-off-by: Sivaramakrishnan Venkat
Acked-by: Pablo de
From: Sivaramakrishnan Venkat
SW PMDs increment IPsec Multi-buffer version to 1.4.
A minimum IPsec Multi-buffer version of 1.4 or greater is now required.
Signed-off-by: Sivaramakrishnan Venkat
Acked-by: Ciara Power
Acked-by: Pablo de Lara
Acked-by: Wathsala Vithanage
---
v5:
- Rebase
From: Ciara Power
The IPsec-mb version that is available through current package
managers is 1.2.
This release moves the minimum required IPsec-mb version for IPsec-mb
based SW PMDs to 1.4.
To compile these PMDs, a manual step is added to install IPsec-mb v1.4
using dpkg.
Signed-off-by: Ciara Po
use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Acked-by: Wathsala Vithanage
---
v5:
- Rebased and added patchset
v4:
- Keep AES GCM PMD and fix extern issue
v3:
- Remove session configure pointer for each PMD
v2:
- Fix compilation failure
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Acked-by: Wathsala Vithanage
---
v5:
- Rebased and added to patchset
v2:
- Remove ipsec mb version checks
From: Sivaramakrishnan Venkat
SW PMDs documentation is updated to remove details of unsupported IPsec
Multi-buffer versions.DPDK older than 20.11 is end of life. So, older
DPDK versions are removed from the Crypto library version table.
Signed-off-by: Sivaramakrishnan Venkat
Acked-by: Pablo de
From: Sivaramakrishnan Venkat
SW PMDs increment IPsec Multi-buffer version to 1.4.
A minimum IPsec Multi-buffer version of 1.4 or greater is now required.
Signed-off-by: Sivaramakrishnan Venkat
Acked-by: Ciara Power
Acked-by: Pablo de Lara
Acked-by: Wathsala Vithanage
---
v5:
- Rebase
use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
v2:
- Fix compilation failure
v3:
- Remove session configure pointer for each PMD
v4:
- Keep AES GCM PMD and fix extern issue
---
doc/guides/rel_notes/release_24_03.rst| 6 +
drivers/crypto/ipsec_mb
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Depends-on: series-30989 ("crypto/ipsec_mb: bump minimum IPsec Multi-buffer
version")
v2:
- Remov
remove all use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
v2:
- Fix compilation failure
v3:
- Remove session configure pointer for each PMD
---
drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 757 +-
drivers/crypto/ipsec_mb/pmd_aesni_gcm_priv.h
Currently the QAT sym and asym drivers can only be disabled together
when building. Add an option to disable the QAT asym driver.
Signed-off-by: Brian Dooley
---
drivers/common/qat/meson.build | 22 +---
drivers/crypto/qat/dev/qat_crypto_pmd_gen2.c | 2 ++
drivers
From: Pablo de Lara
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 34 +-
1 file changed, 33 insertions(+), 1
remove all use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
v2:
- Fix compilation failure
---
drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 758 +---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 8 +-
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h
remove all use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 758 +-
drivers/crypto/ipsec_mb/pmd_aesni_gcm_priv.h | 21 -
drivers/crypto/ipsec_mb/pmd_aesni_mb.c| 6 +-
drivers/crypto/ipsec_mb
From: Ciara Power
When the legacy capability flag was enabled for QAT GEN3,
in the case of the last legacy capability in the list being SM3 or SM4,
when no slice is on the device, the loop continues instead of checking
if the end of the legacy capbilities list has been met.
To fix this, the chec
.@dpdk.org
Signed-off-by: Brian Dooley
---
examples/ipsec-secgw/ipsec.h | 10 ++
1 file changed, 10 insertions(+)
diff --git a/examples/ipsec-secgw/ipsec.h b/examples/ipsec-secgw/ipsec.h
index 5059418456..10e7fc179b 100644
--- a/examples/ipsec-secgw/ipsec.h
+++ b/examples/ipsec-secgw/ipsec.h
The Kernel Module entry for 2.0 devices was incorrect in the doc table.
Updated table with Kernel Module qat_4xxx.
Fixes: f4eac3a09c51 ("common/qat: enable GEN4 b devices")
Cc: arkadiuszx.kusz...@intel.com
Signed-off-by: Brian Dooley
---
v2:
Correct Fixes tag
---
doc/guides/cryptode
The Kernel Module entry for 2.0 devices was incorrect in the doc table.
Updated table with Kernel Module qat_4xxx.
Fixes: 83ce3b393176 ("doc: update QAT device support")
Signed-off-by: Brian Dooley
---
doc/guides/cryptodevs/qat.rst | 4 ++--
1 file changed, 2 insertions(+), 2
Some synchronous tests are not supported for cpu crypto and need to be
skipped. This commit adds in extra skips for these tests.
Fixes: 55ab4a8c4fb5 ("test/crypto: disable wireless cases for CPU crypto API")
Cc: pablo.de.lara.gua...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Br
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
---
v9:
Added release notes
v7:
Separate synchronous fix into separate commit
v6:
Add skipping tests for synchronous crypto
v5:
Fix checkpatch
v6:
Add skipping tests for synchronous crypto
v5:
Fix checkpatch warnings
v4:
Add comments and small refactor
v3:
Add Digest encrypted support to docs
v2:
Fixed CHECKPATCH warning
Brian Dooley (3):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
test/crypto
Signed-off-by: Brian Dooley
---
v8:
Reword commit and add cc stable
---
app/test/test_cryptodev.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 956268bfcd..70f6b7ece1 100644
--- a/app/test/test_cryptodev.c
+++
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Cc: sta...@dpdk.org
Acked-by: Ciara Power
Signed-off-by: Brian Dooley
--
v8:
Add cc stable
---
app/test/test_cryptodev_mixed_test_vec
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Acked-by: Ciara Power
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
Add comments and small refactor
v5:
Fix checkpatch warnings
v6
checkpatch warnings
v6:
Add skipping tests for synchronous crypto
v7:
Separate synchronous fix into separate commit
v8:
Reword commit and add stable
Brian Dooley (3):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
test/crypto: fix failing synchronous tests
Some synchronous tests do not support digest encrypted and need to be
skipped. This commit adds in extra skips for these tests.
Fixes: 55ab4a8c4fb5 ("test/crypto: disable wireless cases for CPU crypto API")
Cc: pablo.de.lara.gua...@intel.com
Acked-by: Ciara Power
Signed-off-by: Br
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Acked-by: Ciara Power
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++--
1 file changed, 6
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Acked-by: Ciara Power
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
Add comments and small refactor
v5:
Fix checkpatch warnings
v6
checkpatch warnings
v6:
Add skipping tests for synchronous crypto
v7:
Separate synchronous fix into separate commit
Brian Dooley (3):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
test/crypto: fix failing synchronous tests
app/test/test_cryptodev.c
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++--
1 file changed, 6 insertions(+), 2 deletion
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
Add comments and small refactor
v5:
Fix checkpatch warnings
v6:
Add skipping tests for
checkpatch warnings
v6:
Add skipping tests for synchronous crypto
Brian Dooley (2):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
app/test/test_cryptodev_mixed_test_vectors.h | 8 +-
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
drivers/crypto
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++--
1 file changed, 6 insertions(+), 2 deletion
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
Add comments and small refactor
v5:
Fix checkpatch warnings
---
doc/guides/cryptodevs
checkpatch warnings
Brian Dooley (2):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
app/test/test_cryptodev_mixed_test_vectors.h | 8 +-
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 107
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++--
1 file changed, 6 insertions(+), 2 deletion
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
add comments and refactor
---
doc/guides/cryptodevs/features/aesni_mb.ini | 1
This series adds the Digest Encrypted feature to the AESNI_MB PMD.
It also fixes an issue where IV data in SNOW3G and ZUC algorithms
were incorrect and are required to be non-zero length.
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
add comments and refactor
Brian
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
---
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
drivers/crypto/ipsec_mb
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 107 +++--
1 file changed, 102 insertions(+), 5 deletions(-)
diff
AESNI_MB PMD does not support Digest Encrypted. This patch adds support
for this feature.
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 107 +++--
1 file changed, 102 insertions(+), 5 deletions(-)
diff --git a/drivers/crypto/ipsec_mb
change define from RTE_LIB_SECURITY to BUILD_QAT_SYM as
RTE_ETHER_CRC_LEN value is protected by BUILD_QAT_SYM.
Fixes: ce7a737c8f02 ("crypto/qat: support cipher-CRC offload")
Cc: kevin.osulli...@intel.com
Signed-off-by: Brian Dooley
---
drivers/common/qat/qat_qp.c | 2 +-
1 file
removed AESNI_MB_DOCSIS_SEC_ENABLED defines as they are no longer used.
Fixes: 798f9d134519 ("crypto/ipsec_mb: remove security lib presence checks")
Cc: maxime.coque...@redhat.com
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/ipsec_mb_private.c | 4
drivers/crypt
This series removes some unused defines throughout common qat drivers
and crypto ipsec mb drivers. It also removes some defines that should
have been removed previously.
v3:
Incorrect fixline
v2:
more defines removed in additional patch and changed fixline
Brian Dooley (2):
crypto/ipsec_mb
change define from RTE_LIB_SECURITY to BUILD_QAT_SYM as
RTE_ETHER_CRC_LEN value is protected by BUILD_QAT_SYM.
Fixes: ce7a737c8f02 ("crypto/qat: support cipher-CRC offload")
Cc: kevin.osulli...@intel.com
Signed-off-by: Brian Dooley
---
drivers/common/qat/qat_qp.c | 2 +-
1 file
removed AESNI_MB_DOCSIS_SEC_ENABLED defines as they are no longer used.
Fixes: 66a9d8d0bc6d ("crypto/qat: remove security library presence checks")
Cc: maxime.coque...@redhat.com
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/ipsec_mb_private.c | 4
drivers/crypt
This series removes some unused defines throughout common qat drivers
and crypto ipsec mb drivers. It also removes some defines that should
have been removed previously.
v2:
more defines removed in additional patch and changed fixline
Brian Dooley (2):
crypto/ipsec_mb: remove unused defines
removed AESNI_MB_DOCSIS_SEC_ENABLED defines as they are no longer used.
Fixes: fda5216fba55 ("crypto/aesni_mb: support DOCSIS protocol")
Cc: david.co...@intel.com
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/ipsec_mb_private.c | 4
drivers/crypto/ipsec_mb/pmd_
The qat_sym_session struct variable alignment was causing a segfault.
AES expansion keys require 16-byte alignment. Added __rte_aligned to
the expansion keys.
Fixes: ca0ba0e48129 ("crypto/qat: default to IPsec MB for computations")
Signed-off-by: Brian Dooley
---
drivers/
IPsec MB does not support the necessary algorithms.
Added version checks for libipsecmb and libcrypto into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Pablo de Lara
Acked-by: Ciara Power
---
v7:
Rebase for-main
v6:
Fix
IPsec MB does not support the necessary algorithms.
Added version checks for libipsecmb and libcrypto into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Pablo de Lara
---
v6:
Fix for arm support and add extra wrappers for
into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Pablo de Lara
---
v5:
Remove ipsec mb define and add previous ack
v4:
Rebase and fix conflicts
v3:
Fix checkpatch warnings by replacing return with goto
v2:
OpenSSL code
into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
---
v4:
Rebase and fix conflicts
v3:
Fix checkpatch warnings by replacing return with goto
v2:
OpenSSL code reintroduced as a fallback feature if Intel IPsec MB 1.4
not available
---
doc/guides
into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
---
v3:
Fix checkpatch warnings by replacing return with goto
v2:
OpenSSL code reintroduced as a fallback feature if Intel IPsec MB 1.4
not available
---
doc/guides/cryptodevs/qat.rst
into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
---
v2:
OpenSSL code reintroduced as a fallback feature if Intel IPsec MB 1.4
not available
---
doc/guides/cryptodevs/qat.rst| 14 +-
drivers/common/qat/meson.build
AESNI_MB PMD does not support Digest Encrypted. This patch adds partial
support for this feature.
Signed-off-by: Brian Dooley
---
Some out-of-place tests are still failing.
Only some in-place tests are passing.
Working on adding support for this feature in v2.
---
app/test/1.diff
v1.4.
Signed-off-by: Brian Dooley
---
A fallback feature is planned for v2 where IPsec MB v1.4 is the default
option and the fallback option is to use OpenSSL. The code removed in this
patch will be added back in for the fallback feature.
IPsec MB is v1.4 is not yet released.
---
doc/guides
Update what drivers and devices are supported for Asymmetric Crypto
Service on QAT
Signed-off-by: Brian Dooley
---
doc/guides/cryptodevs/qat.rst | 17 ++---
1 file changed, 14 insertions(+), 3 deletions(-)
diff --git a/doc/guides/cryptodevs/qat.rst b/doc/guides/cryptodevs/qat.rst
Update Asymmetric Crypto Service on QAT devices.
Signed-off-by: Brian Dooley
---
doc/guides/cryptodevs/qat.rst | 1 -
1 file changed, 1 deletion(-)
diff --git a/doc/guides/cryptodevs/qat.rst b/doc/guides/cryptodevs/qat.rst
index 2d895e61ac..9a5a4e6203 100644
--- a/doc/guides/cryptodevs/qat.rst
Replace rand() call in fips validation example with rte_rand().
Coverity issue: 381668
Fixes: e27268bd2103 ("examples/fips_validation: add parsing for AES-GMAC")
Signed-off-by: Brian Dooley
---
examples/fips_validation/main.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
Move the ossl_legacy_provider_unload() into the right place for secure
protocol for QAT. Remove unnecessary unload from session destroy.
Fixes: 52d59b92b06d ("crypto/qat: enable OpenSSL legacy provider in session")
Cc: kai...@intel.com
CC: sta...@dpdk.org
Signed-off-by: Brian Dool
Move the ossl_legacy_provider_unload() into the right place for secure
protocol for QAT. Remove unnecessary unload from session destroy.
Fixes: 52d59b92b06d ("crypto/qat: enable OpenSSL legacy provider in session")
Cc: kai...@intel.com
CC: sta...@dpdk.org
Signed-off-by: Brian Dooley
--
Add check for null hash algorithm digest size. Digest size should be 4B
or request will be rejected.
Fixes: 1703e94ac5ce ("qat: add driver for QuickAssist devices")
Cc: declan.dohe...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
drivers/crypto/qat/qat_sym_sess
When parsing request files check for file type. This fix will remove
dependence on command line parameter for using libjansson
Fixes: 0f42f3d6034c ("examples/fips_validation: share callback with multiple
keys")
Cc: gmuthukri...@marvell.com
Signed-off-by: Brian Dooley
---
Added functionality to parse algorithm for AES CTR test
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Gowrishankar Muthukrishnan
---
v2: fix clang warning for int-in-bool-context
---
v3: in reply to fix and patchwork CI
---
v4: missing acks
---
v5: add documentation
---
doc/guides
This patch reallocates the openssl version check from
qat_session_configure() to a proper qat_security_session_create()
routine
Fixes: 3227bc7138f5 ("crypto/qat: use intel-ipsec-mb for partial hash and AES")
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
v2: rebase on main
--
This patch reallocates the openssl version check from
qat_session_configure() to a proper qat_security_session_create()
routine
Fixes: 3227bc7138f5 ("crypto/qat: use intel-ipsec-mb for partial hash and AES")
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
drivers/
Added functionality to parse algorithm for AES CTR test
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Gowrishankar Muthukrishnan
---
v2: fix clang warning for int-in-bool-context
---
v3: in reply to fix and patchwork CI
---
v4: missing acks
---
examples/fips_validation
Added functionality to parse algorithm for AES CTR test
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
---
v2: fix clang warning for int-in-bool-context
---
v3: in reply to fix and patchwork CI
---
examples/fips_validation/fips_validation.c | 2 ++
examples/fips_validation/fips_validation.h
1 - 100 of 134 matches
Mail list logo