Add maintainer for ISA-L PMD, as I maintain
the ISA-L library now.
Signed-off-by: Pablo de Lara
---
MAINTAINERS | 1 +
1 file changed, 1 insertion(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index 9291439421..09d447c9e0 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -1213,6 +1213,7 @@ F: drivers
..@intel.com
Signed-off-by: Pablo de Lara
---
v2: reworded the commit message
---
drivers/crypto/qat/qat_sym_session.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/crypto/qat/qat_sym_session.c
b/drivers/crypto/qat/qat_sym_session.c
index 978ee49dce..7f18e9875d 100644
---
ned-off-by: Pablo de Lara
---
drivers/crypto/qat/qat_sym_session.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/crypto/qat/qat_sym_session.c
b/drivers/crypto/qat/qat_sym_session.c
index 978ee49dce..7f18e9875d 100644
--- a/drivers/crypto/qat/qat_sym_session.c
+++ b/drivers/
Updated AESNI MB and AESNI GCM, KASUMI, ZUC, SNOW3G
and CHACHA20_POLY1305 PMD documentation guides
with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
Acked-by: Ciara Power
Acked-by: Brian Dooley
---
-v4: Added information on
Updated AESNI MB and AESNI GCM, KASUMI, ZUC and SNOW3G PMD documentation
guides with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
Acked-by: Ciara Power
---
-v3: Fixed library version from 1.2 to 1.3 in one line
-v2: Removed repeated word
Updated AESNI MB and AESNI GCM, KASUMI, ZUC and SNOW3G PMD documentation
guides with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
- v2: Removed repeated word 'the'
---
doc/guides/cryptodevs/aesni_gcm.rst | 8
Updated AESNI MB and AESNI GCM, KASUMI, ZUC and SNOW3G PMD documentation
guides with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_gcm.rst | 8
doc/guides/cryptodevs/aesni_mb.rst | 18
Digest length is being printed out, not IV length.
Fixes: ac026f4668d0 ("examples/fips_validation: support CMAC parsing")
Fixes: f64adb6714e0 ("examples/fips_validation: support HMAC parsing")
Cc: marko.kovace...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
--
Digest length is being printed out, not IV length.
Fixes: ac026f4668d0 ("examples/fips_validation: support CMAC parsing")
Fixes: f64adb6714e0 ("examples/fips_validation: support HMAC parsing")
Cc: marko.kovace...@intel.com
Cc: sta...@dpdk.org
---
examples/fips_validation/main.c | 4 ++--
1 file c
Add support for 8-byte and 16-byte tags for ZUC-EIA3-256.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_mb.rst | 1 -
doc/guides/rel_notes/release_22_11.rst | 4
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 22 ++---
drivers/crypto/ipsec_mb
AES-GMAC requires plaintext length to be 0 when using AES-GCM,
so only AAD data is used.
Fixes: a501609ea646 ("crypto/ipsec_mb: fix length and offset settings")
Cc: pablo.de.lara.gua...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
drivers/crypto/ipsec_mb/pmd_aesni
@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
Acked-by: Yipeng Wang
---
-v3: Fixed RHEL build
-v2: Fixed typo in commit message
---
lib/efd/rte_efd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/efd/rte_efd.c b/lib/efd/rte_efd.c
index 560cd78961..
.@dpdk.org
Signed-off-by: Pablo de Lara
Acked-by: Yipeng Wang
---
app/test/test_efd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/app/test/test_efd.c b/app/test/test_efd.c
index 7bea674086..fa29e8f97a 100644
--- a/app/test/test_efd.c
+++ b/app/test/test_efd.c
@@ -107,7 +107,7
@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
-v2: Fixed typo in commit message
---
lib/efd/rte_efd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/efd/rte_efd.c b/lib/efd/rte_efd.c
index 560cd78961..86910e587c 100644
--- a/lib/efd/rte_efd.c
+++
.@dpdk.org
Signed-off-by: Pablo de Lara
---
app/test/test_efd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/app/test/test_efd.c b/app/test/test_efd.c
index 7bea674086..fa29e8f97a 100644
--- a/app/test/test_efd.c
+++ b/app/test/test_efd.c
@@ -107,7 +107,7 @@ static inlin
@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
lib/efd/rte_efd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/efd/rte_efd.c b/lib/efd/rte_efd.c
index 560cd78961..86910e587c 100644
--- a/lib/efd/rte_efd.c
+++ b/lib/efd/rte_efd.c
@@ -1162
.@dpdk.org
Signed-off-by: Pablo de Lara
---
app/test/test_efd.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/app/test/test_efd.c b/app/test/test_efd.c
index 7bea674086..fa29e8f97a 100644
--- a/app/test/test_efd.c
+++ b/app/test/test_efd.c
@@ -107,7 +107,7 @@ static inlin
Updated AESNI MB and AESNI GCM, KASUMI, ZUC and SNOW3G PMD documentation
guides with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_gcm.rst | 8
doc/guides/cryptodevs/aesni_mb.rst | 8
doc
crypto/aesni_mb: support SNOW3G-UEA2/UIA2")
Fixes: fd8df85487c4 ("crypto/aesni_mb: support ZUC-EEA3/EIA3")
Fixes: 8c835018de84 ("crypto/ipsec_mb: support ZUC-256 for aesni_mb")
Cc: pablo.de.lara.gua...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
driv
ned-off-by: Pablo de Lara
---
drivers/crypto/ipsec_mb/pmd_zuc.c | 13 +++--
1 file changed, 7 insertions(+), 6 deletions(-)
diff --git a/drivers/crypto/ipsec_mb/pmd_zuc.c
b/drivers/crypto/ipsec_mb/pmd_zuc.c
index 07cf1462d2..e36c7092d6 100644
--- a/drivers/crypto/ipsec_mb/pmd_zuc.c
+++
operation.
Fixes: 0b133c36ad7d ("crypto/zuc: support IPsec Multi-buffer lib v0.54")
Cc: pablo.de.lara.gua...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
drivers/crypto/ipsec_mb/pmd_zuc.c | 2 +-
drivers/crypto/ipsec_mb/pmd_zuc_priv.h | 2 +-
2 files changed, 2 insert
@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
drivers/crypto/ipsec_mb/pmd_zuc.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/ipsec_mb/pmd_zuc.c
b/drivers/crypto/ipsec_mb/pmd_zuc.c
index 2eae1d1ec7..ec83d96dfc 100644
--- a/driv
This patchset fixes various issues affecting ZUC and AESNI MB PMD,
when ZUC algorithm is used.
-v2: rebased on main branch
Pablo de Lara (4):
crypto/ipsec_mb: check for missing operation types
crypto/ipsec_mb: fix ZUC authentication verify
crypto/ipsec_mb: fix crypto operation overwrite
crypto/aesni_mb: support SNOW3G-UEA2/UIA2")
Fixes: fd8df85487c4 ("crypto/aesni_mb: support ZUC-EEA3/EIA3")
Fixes: 8c835018de84 ("crypto/ipsec_mb: support ZUC-256 for aesni_mb")
Cc: pablo.de.lara.gua...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
driv
ned-off-by: Pablo de Lara
---
drivers/crypto/ipsec_mb/pmd_zuc.c | 13 +++--
1 file changed, 7 insertions(+), 6 deletions(-)
diff --git a/drivers/crypto/ipsec_mb/pmd_zuc.c
b/drivers/crypto/ipsec_mb/pmd_zuc.c
index 07cf1462d2..e36c7092d6 100644
--- a/drivers/crypto/ipsec_mb/pmd_zuc.c
+++
operation.
Fixes: 0b133c36ad7d ("crypto/zuc: support IPsec Multi-buffer lib v0.54")
Cc: pablo.de.lara.gua...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
drivers/crypto/ipsec_mb/pmd_zuc.c | 2 +-
drivers/crypto/ipsec_mb/pmd_zuc_priv.h | 2 +-
2 files changed, 2 insert
@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
drivers/crypto/ipsec_mb/pmd_zuc.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/ipsec_mb/pmd_zuc.c
b/drivers/crypto/ipsec_mb/pmd_zuc.c
index 2eae1d1ec7..ec83d96dfc 100644
--- a/driv
This patchset fixes various issues affecting ZUC and AESNI MB PMD,
when ZUC algorithm is used.
Pablo de Lara (4):
crypto/ipsec_mb: check for missing operation types
crypto/ipsec_mb: fix ZUC authentication verify
crypto/ipsec_mb: fix crypto operation overwrite
crypto/ipsec_mb: fix length
ec_mb: support ZUC-256 for aesni_mb")
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h
b/drivers/crypto/ipsec_mb/pmd_aesni_mb_pr
ctr
--cipher-key-sz 16 --cipher-iv-sz 16
Fixes: ae8e085c608d ("crypto/aesni_mb: support KASUMI F8/F9")
Fixes: 6c42e0cf4d12 ("crypto/aesni_mb: support SNOW3G-UEA2/UIA2")
Fixes: fd8df85487c4 ("crypto/aesni_mb: support ZUC-EEA3/EIA3")
Cc: sta...@dpdk.org
Signed-o
Updated AESNI MB and AESNI GCM, KASUMI, ZUC and SNOW3G PMD documentation
guides with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_gcm.rst | 8
doc/guides/cryptodevs/aesni_mb.rst | 8
doc
Fix the IV for ZUC-256 test vectors
Fixes: 216125c62d28 ("test/crypto: add ZUC-256 vectors")
Signed-off-by: Pablo de Lara
---
app/test/test_cryptodev_zuc_test_vectors.h | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/app/test/test_cryptodev_zuc_test_ve
Flow Distributor library")
Signed-off-by: Pablo de Lara
Acked-by: John McNamara
---
v4: Set socket id in EFD tests
v3: Fixed commit message
v2: Fixed EFD tests
---
app/test/test_efd.c | 5 +++--
app/test/test_efd_perf.c | 4 ++--
lib/efd/rte_efd.c| 2 +-
lib/efd/rte_efd.h
butor library")
Signed-off-by: Pablo de Lara
Acked-by: John McNamara
---
v3: Fixed commit message
v2: Fixed EFD tests
---
app/test/test_efd.c | 4 ++--
app/test/test_efd_perf.c | 4 ++--
lib/efd/rte_efd.c| 2 +-
lib/efd/rte_efd.h| 2 +-
4 files changed, 6 insert
Flow Distributor library")
Signed-off-by: Pablo de Lara
Acked-by: John McNamara
---
v2: Fixed EFD tests
app/test/test_efd.c | 4 ++--
app/test/test_efd_perf.c | 4 ++--
lib/efd/rte_efd.c| 2 +-
lib/efd/rte_efd.h| 2 +-
4 files changed, 6 insertions(+), 6 deletions(-)
diff -
Flow Distributor library")
Signed-off-by: Pablo de Lara
---
This fix requires an API breakage and therefore it is not
a good candidate for backporting (besides, it is a very low impact bug).
Hence, I am not CC'ing stable.
---
lib/efd/rte_efd.c | 2 +-
lib/efd/rte_efd.h | 2 +-
2 files change
Add support for ZUC-EEA3-256 and ZUC-EIA3-256
(only 4-byte tags supported for now).
Signed-off-by: Pablo de Lara
---
This patch depends on patchset
https://patches.dpdk.org/project/dpdk/list/?series=18470
---
doc/guides/cryptodevs/aesni_mb.rst | 1 +
doc/guides/rel_notes/release_21_11
Signed-off-by: Pablo de Lara
---
doc/guides/rel_notes/deprecation.rst | 4
1 file changed, 4 insertions(+)
diff --git a/doc/guides/rel_notes/deprecation.rst
b/doc/guides/rel_notes/deprecation.rst
index 76a4abfd6b..e9fdbd1cdd 100644
--- a/doc/guides/rel_notes/deprecation.rst
+++ b/doc
Updated AESNI MB and AESNI GCM, KASUMI, ZUC and SNOW3G PMD documentation
guides with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_gcm.rst | 6 +++---
doc/guides/cryptodevs/aesni_mb.rst | 6 +++---
doc
Updated AESNI MB and AESNI GCM PMD documentation guides
with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_gcm.rst| 6 +++---
doc/guides/cryptodevs/aesni_mb.rst | 6 +++---
doc/guides/rel_notes
Add support for Chacha20-Poly1305 in the crypto symmetric API.
Signed-off-by: Pablo de Lara
---
drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c | 21 +++--
1 file changed, 15 insertions(+), 6 deletions(-)
diff --git a/drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c
b/drivers/crypto
2 ("crypto/aesni_mb: support SNOW3G-UEA2/UIA2")
Fixes: fd8df85487c4 ("crypto/aesni_mb: support ZUC-EEA3/EIA3")
Signed-off-by: Pablo de Lara
---
app/test/test_cryptodev.c | 78 +++
1 file changed, 78 insertions(+)
diff --git a/app/te
Add Scatter-Gather List tests for AES-GMAC.
Signed-off-by: Pablo de Lara
---
Changes:
- v6: Fixed coding style issues
- v5: Modified GMAC test cases, so mbuf size remains the same size (2KB),
reducing the vector length to make it compatible with QAT PMD.
- v4: Rebased on top of crypto
Add Scatter-gather list support for AES-GMAC.
Signed-off-by: Pablo de Lara
Tested-by: Fan Zhang
Acked-by: Fan Zhang
---
Changes:
- v4/v5/v6: Rebased on top of crypto subtree
- v2/v3: no change
---
doc/guides/cryptodevs/aesni_gcm.rst | 2 -
doc/guides/rel_notes/release_20_11.rst
Add Scatter-Gather List tests for AES-GMAC.
Signed-off-by: Pablo de Lara
---
Changes:
- v5: Modified GMAC test cases, so mbuf size remains the same size (2KB),
reducing the vector length to make it compatible with QAT PMD.
- v4: Rebased on top of crypto subtree
- v3: Fixed checkpatch
Add Scatter-gather list support for AES-GMAC.
Signed-off-by: Pablo de Lara
Tested-by: Fan Zhang
Acked-by: Fan Zhang
---
Changes:
- v4/v5: Rebased on top of crypto subtree
- v2/v3: no change
---
doc/guides/cryptodevs/aesni_gcm.rst | 2 -
doc/guides/rel_notes/release_20_11.rst | 1
This patch adds support for AES-CCM-256 when using AESNI-MB
Signed-off-by: Pablo de Lara
---
This patch depends on series
http://patches.dpdk.org/project/dpdk/list/?series=12822.
Changes:
v2 :
- Fixed session creation
- Rebased on top of crypto subtree
---
doc/guides/cryptodevs
GCM digest sizes should be between 1 and 16 bytes.
Fixes: 7b2d4706c90e ("crypto/aesni_mb: support newer library version only")
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
Changes:
This patchset depends on series
http://patches.dpdk.org/project/dpdk/list/?series=12820.
-v2
Add support for Chacha20-Poly1305 AEAD algorithm.
Signed-off-by: Pablo de Lara
---
Changes:
This patchset depends on series
http://patches.dpdk.org/project/dpdk/list/?series=12820.
-v2 : rebased on top of crypto subtree
---
doc/guides/cryptodevs/aesni_mb.rst| 1 +
doc/guides
Digest size for CCM was being checked for other algorithms
apart from CCM.
Fixes: c4c0c312a823 ("crypto/aesni_mb: check for invalid digest size")
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
Changes:
This patchset depends on series
http://patches.dpdk.org/project/dpdk/li
Add Scatter-Gather List tests for AES-GMAC.
Signed-off-by: Pablo de Lara
---
This patchset depends on series
http://patches.dpdk.org/project/dpdk/list/?series=12819
Changes:
- v4: Rebased on top of crypto subtree
- v3: Fixed checkpatch issues
- v2: Modified segment size to make reduce
Add Scatter-gather list support for AES-GMAC.
Signed-off-by: Pablo de Lara
---
This patchset depends on series
http://patches.dpdk.org/project/dpdk/list/?series=12819
Changes:
- v4: Rebased on top of crypto subtree
- v2/v3: no change
---
doc/guides/cryptodevs/aesni_gcm.rst | 2
Add support for SNOW3G-UEA2/UIA2 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v5:
- Rebased on top of crypto subtree
v3/v4:
- Fixed compilation when intel-ipsec-mb version is lower than 0.54
v2:
- Added
Add support for KASUMI-F8/F9 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v5:
- Rebased on top of crypto subtree
v3/v4:
- Fixed compilation when intel-ipsec-mb version is lower than 0.54
v2:
- Added commit
Add support for ZUC-EEA3/EIA3 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v5:
- Added NON_BYTE_ALIGNED feature flag
- Rebased on top of crypto subtree
v3/v4:
- No changes
v2:
- Added commit description
Add support for Chacha20-Poly1305 AEAD algorithm.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_mb.rst| 1 +
doc/guides/cryptodevs/features/aesni_mb.ini | 10 +--
doc/guides/rel_notes/release_20_11.rst| 3 +
drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c
GCM digest sizes should be between 1 and 16 bytes.
Fixes: 7b2d4706c90e ("crypto/aesni_mb: support newer library version only")
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
.../crypto/aesni_mb/aesni_mb_pmd_private.h| 4 ++--
drivers/crypto/aesni_mb/rte_aesni_mb_pmd
Digest size for CCM was being checked for other algorithms
apart from CCM.
Fixes: c4c0c312a823 ("crypto/aesni_mb: check for invalid digest size")
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c | 29 +++---
1 file c
This patch adds support for AES-CCM-256 when using AESNI-MB
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/features/aesni_mb.ini| 1 +
doc/guides/rel_notes/release_20_11.rst | 4
drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c | 5 +
3 files changed, 10 insertions
Add Scatter-Gather List tests for AES-GMAC.
Signed-off-by: Pablo de Lara
---
Changes:
v3:
- Fixed checkpatch issues
v2:
- Modified segment size to make reduce maximum number of segments needed
---
app/test/test_cryptodev.c | 216 ++
app/test
Add Scatter-gather list support for AES-GMAC.
Signed-off-by: Pablo de Lara
---
Changes:
- v2/v3: no change
---
doc/guides/cryptodevs/aesni_gcm.rst | 2 -
doc/guides/rel_notes/release_20_11.rst | 4 ++
drivers/crypto/aesni_gcm/aesni_gcm_ops.h | 27
drivers/crypto/aesni_gcm
---
Changes:
v2:
- Modified segment size to make reduce maximum number of segments needed
---
app/test/test_cryptodev.c | 220 +-
app/test/test_cryptodev.h | 4 +-
2 files changed, 220 insertions(+), 4 deletions(-)
diff --git a/app/test/test_cryptodev.c b
Add Scatter-gather list support for AES-GMAC.
Signed-off-by: Pablo de Lara
---
Changes:
- v2: no change
---
doc/guides/cryptodevs/aesni_gcm.rst | 2 -
doc/guides/rel_notes/release_20_11.rst | 4 ++
drivers/crypto/aesni_gcm/aesni_gcm_ops.h | 27
drivers/crypto/aesni_gcm
Add support for KASUMI-F8/F9 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v3/v4:
- Fixed compilation when intel-ipsec-mb version is lower than 0.54
v2:
- Added commit description
---
doc/guides/cryptodevs
Add support for SNOW3G-UEA2/UIA2 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v3/v4:
- Fixed compilation when intel-ipsec-mb version is lower than 0.54
v2:
- Added commit description
---
doc/guides
Add support for ZUC-EEA3/EIA3 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v3/v4:
- No changes
v2:
- Added commit description
- Fixed checkpatch issues
---
doc/guides/cryptodevs/aesni_mb.rst
Add support for ZUC-EEA3/EIA3 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v3:
- No changes
v2:
- Added commit description
- Fixed checkpatch issues
---
doc/guides/cryptodevs/aesni_mb.rst| 36
Add support for SNOW3G-UEA2/UIA2 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v3:
- Fixed compilation
v2:
- Added commit description
---
doc/guides/cryptodevs/aesni_mb.rst| 2 +
doc/guides
Add support for KASUMI-F8/F9 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v3:
- Fixed compilation
v2:
- Added commit description
---
doc/guides/cryptodevs/aesni_mb.rst| 2 +
doc/guides
Add Scatter-gather list support for AES-GMAC.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_gcm.rst | 2 -
doc/guides/rel_notes/release_20_11.rst | 4 ++
drivers/crypto/aesni_gcm/aesni_gcm_ops.h | 27
drivers/crypto/aesni_gcm/aesni_gcm_pmd.c | 88
Add Scatter-Gather List tests for AES-GMAC.
Signed-off-by: Pablo de Lara
---
app/test/test_cryptodev.c | 220 +-
1 file changed, 218 insertions(+), 2 deletions(-)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 70bf6fe2c..1d61aaac7
Add support for KASUMI-F8/F9 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v2:
- Added commit description
---
doc/guides/cryptodevs/aesni_mb.rst| 2 +
doc/guides/cryptodevs/features/aesni_mb.ini
Add support for SNOW3G-UEA2/UIA2 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v2:
- Added commit description
---
doc/guides/cryptodevs/aesni_mb.rst| 2 +
doc/guides/cryptodevs/features
Add support for ZUC-EEA3/EIA3 algorithms through the intel-ipsec-mb
job API, allowing the mix of these algorithms with others.
Signed-off-by: Pablo de Lara
---
v2:
- Added commit description
- Fixed checkpatch issues
---
doc/guides/cryptodevs/aesni_mb.rst| 36 ++---
doc/guides
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_mb.rst| 2 +
doc/guides/cryptodevs/features/aesni_mb.ini | 2 +
doc/guides/rel_notes/release_20_11.rst| 1 +
.../crypto/aesni_mb/aesni_mb_pmd_private.h| 13 +++--
drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_mb.rst| 2 +
doc/guides/cryptodevs/features/aesni_mb.ini | 2 +
doc/guides/rel_notes/release_20_11.rst| 1 +
.../crypto/aesni_mb/aesni_mb_pmd_private.h| 13 --
drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_mb.rst| 36 ++---
doc/guides/cryptodevs/features/aesni_mb.ini | 2 +
doc/guides/rel_notes/release_20_11.rst| 4 +
.../crypto/aesni_mb/aesni_mb_pmd_private.h| 127 ++
drivers/crypto
ZUC, SNOW3G and KASUMI PMDs support Out-of-place operations,
but their feature flags did not reflect this.
Fixes: 2717246ecd7d ("cryptodev: replace mbuf scatter gather flag")
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/features/kasumi.ini | 1 +
The intel-ipsec-mb library requires NASM as a dependency.
Steps on how to get and install NASM are added on the documentation
of the crypto PMDs which requires the library.
Bugzilla ID: 417
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
v2:
- Added Bugzilla ID
- Modified links to fix
The intel-ipsec-mb library requires NASM as a dependency.
Steps on how to get and install NASM are added on the documentation
of the crypto PMDs which requires the library.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_gcm.rst | 14 ++
doc/guides/cryptodevs
The latest version of the Intel IPSec Multi-buffer library
adds an API to authenticate multiple buffers in parallel.
The PMD is modified to use this API, improving
performance of the ZUC-EIA3 algorithm.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/zuc.rst | 6 +--
doc/guides
Updated SNOW3G and KASUMI PMD documentation guides
with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/kasumi.rst | 6 +++---
doc/guides/cryptodevs/snow3g.rst | 6 +++---
doc/guides/rel_notes
Updated SNOW3G and KASUMI PMD documentation guides
with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/kasumi.rst | 6 +++---
doc/guides/cryptodevs/snow3g.rst | 6 +++---
doc/guides/rel_notes
The latest version of the Intel IPSec Multi-buffer library
adds an API to authenticate multiple buffers in parallel.
The PMD is modified to use this API, improving
performance of the ZUC-EIA3 algorithm.
Signed-off-by: Pablo de Lara
---
v2:
- Simplified logic in process_hash_op per Akhil
When adding support for DOCSIS AES-256,
when setting the cipher parameters, all key sizes
were accepted, but only 128-bit and 256-bit keys
are supported.
Fixes: 124d04b43743 ("crypto/aesni_mb: support DOCSIS AES-256")
Signed-off-by: Pablo de Lara
Acked-by: Mairtin o Loingsigh
---
v
The latest version of the Intel IPSec Multi-buffer library
adds an API to authenticate multiple buffers in parallel.
The PMD is modified to use this API, improving
performance of the ZUC-EIA3 algorithm.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/zuc.rst | 6 +--
doc/guides
Updated SNOW3G and KASUMI PMD documentation guides
with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/kasumi.rst | 6 +++---
doc/guides/cryptodevs/snow3g.rst | 6 +++---
doc/guides/rel_notes
When adding support for DOCSIS AES-256,
when setting the cipher parameters, all key sizes
were accepted, but only 128-bit and 256-bit keys
are.
Fixes: 124d04b43743 ("crypto/aesni_mb: support DOCSIS AES-256")
Signed-off-by: Pablo de Lara
---
drivers/crypto/aesni_mb/rte_aesni_mb_
Check if session is valid after getting operation
out of the internal IPSec MB manager, in case the
session has been freed while the operation was still
inside the manager.
Signed-off-by: Pablo de Lara
---
drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c | 4
1 file changed, 4 insertions
Updated AESNI MB and AESNI GCM PMD documentation guides
with information about the latest Intel IPSec Multi-buffer
library supported.
Signed-off-by: Pablo de Lara
---
doc/guides/cryptodevs/aesni_gcm.rst| 6 +++---
doc/guides/cryptodevs/aesni_mb.rst | 6 +++---
doc/guides/rel_notes
with "&" in an if statament
Pablo de Lara (2):
test/crypto: add capability check
test/crypto: do not check for internal PMD information
app/test/test_cryptodev_blockcipher.c | 56 +
app/test/test_cryptodev_hash_test_vectors.h | 25 --
Now that capabilities are checked to see if an algorithm
is supported by a device, there is no need to check
for a specific version of a library used in a PMD.
Signed-off-by: Pablo de Lara
Acked-by: Adam Dybkowski
Tested-by: Ruifeng Wang
---
app/test/test_cryptodev_hash_test_vectors.h | 25
Check if test case is supported by the crypto device,
including algorithm and some of its parameter, such as key length,
IV length, etc, using the capabilities API.
If it is not supported, test case is skipped.
Signed-off-by: Pablo de Lara
Acked-by: Adam Dybkowski
Tested-by: Ruifeng Wang
An incorrect flag check was done, using "&&" instead of "&".
Fixes: 2717246ecd7d ("cryptodev: replace mbuf scatter gather flag")
Cc: sta...@dpdk.org
Signed-off-by: Pablo de Lara
---
app/test/test_cryptodev_blockcipher.c | 2 +-
1 file changed, 1 ins
Before running any out-of-place test cases,
check if device supports this mode.
Signed-off-by: Pablo de Lara
---
app/test/test_cryptodev_blockcipher.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/app/test/test_cryptodev_blockcipher.c
b/app/test
Remove PMD bitmask, which selects the PMD to be tested
for each test case. Instead, all PMDs are eligible
to run all tests, and capability checking discards
the PMDs which do not support each test case.
Signed-off-by: Pablo de Lara
Acked-by: Adam Dybkowski
---
app/test/test_cryptodev.c
Before running any sessionless test cases,
check if device supports this mode.
Signed-off-by: Pablo de Lara
Acked-by: Adam Dybkowski
---
app/test/test_cryptodev_blockcipher.c | 11 ++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/app/test/test_cryptodev_blockcipher.c
Add feature flag for symmetric sessionless support,
so it can be checked by applications.
Signed-off-by: Pablo de Lara
Acked-by: Adam Dybkowski
---
doc/guides/cryptodevs/features/aesni_gcm.ini | 1 +
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
doc/guides/cryptodevs/features/armv8.ini
d new commit, adding a check for out-of-place operations
Pablo de Lara (4):
cryptodev: add sessionless support feature flag
test/crypto: check if device supports sessionless
test/crypto: check if device supports out-of-place ops
test/crypto: do not check for PMD in tests
app/test/test_crypto
Now that capabilities are checked to see if an algorithm
is supported by a device, there is no need to check
for a specific version of a library used in a PMD.
Signed-off-by: Pablo de Lara
Acked-by: Adam Dybkowski
---
app/test/test_cryptodev_hash_test_vectors.h | 25
1 - 100 of 1651 matches
Mail list logo