[PATCH 1/3] pdcp: add support for SDAP header

2023-09-08 Thread Aakash Sasidharan
SDAP header when enabled needs to be authenticated but not encrypted. Signed-off-by: Aakash Sasidharan --- lib/pdcp/pdcp_entity.h | 2 ++ lib/pdcp/pdcp_process.c | 22 -- 2 files changed, 18 insertions(+), 6 deletions(-) diff --git a/lib/pdcp/pdcp_entity.h b/lib/pdcp

[PATCH 2/3] test/pdcp: add SDAP test cases

2023-09-08 Thread Aakash Sasidharan
Add PDCP SDAP test cases. Signed-off-by: Aakash Sasidharan --- app/test/test_pdcp.c | 438 +++ 1 file changed, 397 insertions(+), 41 deletions(-) diff --git a/app/test/test_pdcp.c b/app/test/test_pdcp.c index 6c73c1db36..9c9e7a51fc 100644 --- a/app/test

[PATCH 3/3] test/pdcp: add SDAP combined mode tests

2023-09-08 Thread Aakash Sasidharan
Add PDCP SDAP combined mode tests. Signed-off-by: Aakash Sasidharan --- app/test/test_pdcp.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/app/test/test_pdcp.c b/app/test/test_pdcp.c index 9c9e7a51fc..5f8ec08e32 100644 --- a/app/test/test_pdcp.c +++ b/app/test/test_pdcp.c @@ -2275,6

[PATCH] test/pdcp: add data walkthrough test

2023-09-26 Thread Aakash Sasidharan
Enable data walkthrough test in combined mode. The test covers data size ranging from 0B to 9000B both inclusive. Signed-off-by: Aakash Sasidharan --- app/test/test_pdcp.c | 55 +--- 1 file changed, 52 insertions(+), 3 deletions(-) diff --git a/app/test

[PATCH] doc: announce rte_ipsec API changes

2024-07-23 Thread Aakash Sasidharan
to disable sequence number update inside IPsec library and the API rte_ipsec_pkt_crypto_prepare will be extended to include ``sqn`` as an additional parameter to specify sequence number to be used for IPsec from the application. Signed-off-by: Aakash Sasidharan Change-Id

[PATCH] doc: announce rte_ipsec API changes

2024-07-23 Thread Aakash Sasidharan
to disable sequence number update inside IPsec library and the API rte_ipsec_pkt_crypto_prepare will be extended to include ``sqn`` as an additional parameter to specify sequence number to be used for IPsec from the application. Signed-off-by: Aakash Sasidharan --- doc/guides/rel_notes

[PATCH v2] doc: announce rte_ipsec API changes

2024-07-23 Thread Aakash Sasidharan
to disable sequence number update inside IPsec library and the API rte_ipsec_pkt_crypto_prepare will be extended to include ``sqn`` as an additional parameter to specify sequence number to be used for IPsec from the application. Signed-off-by: Aakash Sasidharan --- doc/guides/rel_notes

RE: [PATCH v2] doc: announce rte_ipsec API changes

2024-07-24 Thread Aakash Sasidharan
> -Original Message- > From: Konstantin Ananyev > Sent: Tuesday, July 23, 2024 9:35 PM > To: Aakash Sasidharan > Cc: Akhil Goyal ; Jerin Jacob ; > Anoob Joseph ; Vidya Sagar Velumuri > ; dev@dpdk.org; konstantin.v.anan...@yandex.ru; > vladimir.medved...@intel.com

RE: [PATCH v2] doc: announce rte_ipsec API changes

2024-07-25 Thread Aakash Sasidharan
> -Original Message- > From: Konstantin Ananyev > Sent: Wednesday, July 24, 2024 10:39 PM > To: Aakash Sasidharan > Cc: Akhil Goyal ; Jerin Jacob ; > Anoob Joseph ; Vidya Sagar Velumuri > ; dev@dpdk.org; konstantin.v.anan...@yandex.ru; > vladimir.medved...@intel.

RE: [PATCH v2] doc: announce rte_ipsec API changes

2024-07-29 Thread Aakash Sasidharan
le cores can call rte_ipsec_sa_update_sqn() creating a race condition. > 2. Introduce new (extended) variants of ipsec_crypto_prepare/process that > would take SQN (might be something else ?) as extra parameter, something > like: > > rte_ipcec_xprepare(const struct rte_ipsec

[PATCH v3] doc: announce rte_ipsec API changes

2024-07-29 Thread Aakash Sasidharan
: Aakash Sasidharan --- doc/guides/rel_notes/deprecation.rst | 8 1 file changed, 8 insertions(+) diff --git a/doc/guides/rel_notes/deprecation.rst b/doc/guides/rel_notes/deprecation.rst index 6948641ff6..9be7b90b94 100644 --- a/doc/guides/rel_notes/deprecation.rst +++ b/doc/guides/rel_notes

[PATCH] app/testeventdev: add cipher alg option for cryptodev

2023-02-24 Thread Aakash Sasidharan
flect the actual crypto capabilities of the device. Extend the application to support non-NULL cipher algorithms. Signed-off-by: Aakash Sasidharan --- app/test-eventdev/evt_common.h | 7 +++ app/test-eventdev/evt_options.c | 68 app/test-eventdev/evt_opti

[PATCH 0/7] Improvements and new test cases

2024-06-16 Thread Aakash Sasidharan
Adding new test cases and improvements to test application. Aakash Sasidharan (4): test/crypto: add combined mode cases for TLS 1.3 test/security: add TLS 1.3 data walkthrough tests test/security: add out of place sgl tests for TLS test/security: use single session in data walkthrough

[PATCH 1/7] test/crypto: unit tests for padding for TLS-1.3

2024-06-16 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for TLS-1.3. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 31 +++ 1 file changed, 31 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 94438c

[PATCH 2/7] test/crypto: add combined mode cases for TLS 1.3

2024-06-16 Thread Aakash Sasidharan
Add cases to try TLS 1.3 record write(encrypt) + read(decrypt) operations. This is used for testing TLS 1.3 record features with all algorithms supported by the security device. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 17 + 1 file changed, 17 insertions

[PATCH 3/7] test/security: add TLS 1.3 data walkthrough tests

2024-06-16 Thread Aakash Sasidharan
Add combined mode data walkthrough test and multi-segmented packet data walkthrough test for TLS 1.3. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 41 +++ 1 file changed, 41 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test

[PATCH 4/7] test/crypto: verify padding corruption in TLS-1.2

2024-06-16 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify corrupted padding bytes in TLS-1.2 record Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 22 ++- app/test/test_cryptodev_security_tls_record.c | 7 ++ app/test/test_cryptodev_securi

[PATCH 5/7] test/crypto: verify padding corruption in DTLS-1.2

2024-06-16 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify corrupted padding bytes in DTLS-1.2 record Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 21 + 1 file changed, 21 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index

[PATCH 6/7] test/security: add out of place sgl tests for TLS

2024-06-16 Thread Aakash Sasidharan
Add multi segmented test for TLS 1.3 and multi segmented out of place tests for DTLS 1.2 and TLS 1.3. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 69 ++- 1 file changed, 39 insertions(+), 30 deletions(-) diff --git a/app/test

[PATCH 7/7] test/security: use single session in data walkthrough test

2024-06-16 Thread Aakash Sasidharan
Existing data walkthrough test creates a new session per each test packet size. Enhance the test to use single session instead. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 49 +-- app/test/test_cryptodev_security_tls_record.h | 1 + 2

[PATCH v2 0/7] Improvements and new test cases

2024-06-20 Thread Aakash Sasidharan
v2: * Remove unused variables from tests for padding corruption. Adding new test cases and improvements to test application. Aakash Sasidharan (4): test/crypto: add combined mode cases for TLS 1.3 test/security: add TLS 1.3 data walkthrough tests test/security: add out of place sgl tests

[PATCH v2 1/7] test/crypto: unit tests for padding for TLS-1.3

2024-06-20 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for TLS-1.3. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 31 +++ 1 file changed, 31 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 94438c

[PATCH v2 2/7] test/crypto: add combined mode cases for TLS 1.3

2024-06-20 Thread Aakash Sasidharan
Add cases to try TLS 1.3 record write(encrypt) + read(decrypt) operations. This is used for testing TLS 1.3 record features with all algorithms supported by the security device. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 17 + 1 file changed, 17 insertions

[PATCH v2 3/7] test/security: add TLS 1.3 data walkthrough tests

2024-06-20 Thread Aakash Sasidharan
Add combined mode data walkthrough test and multi-segmented packet data walkthrough test for TLS 1.3. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 41 +++ 1 file changed, 41 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test

[PATCH v2 4/7] test/crypto: verify padding corruption in TLS-1.2

2024-06-20 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify corrupted padding bytes in TLS-1.2 record Signed-off-by: Vidya Sagar Velumuri Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 18 +- app/test/test_cryptodev_security_tls_record.c | 7

[PATCH v2 5/7] test/crypto: verify padding corruption in DTLS-1.2

2024-06-20 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify corrupted padding bytes in DTLS-1.2 record Signed-off-by: Vidya Sagar Velumuri Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 17 + 1 file changed, 17 insertions(+) diff --git a/app/test/test_cryptodev.c b

[PATCH v2 6/7] test/security: add out of place sgl tests for TLS

2024-06-20 Thread Aakash Sasidharan
Add multi segmented test for TLS 1.3 and multi segmented out of place tests for DTLS 1.2 and TLS 1.3. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 69 ++- 1 file changed, 39 insertions(+), 30 deletions(-) diff --git a/app/test

[PATCH v2 7/7] test/security: use single session in data walkthrough test

2024-06-20 Thread Aakash Sasidharan
Existing data walkthrough test creates a new session per each test packet size. Enhance the test to use single session instead. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 49 +-- app/test/test_cryptodev_security_tls_record.h | 1 + 2

[PATCH 00/12] fixes and improvements to CNXK crypto PMD

2024-06-20 Thread Aakash Sasidharan
This series adds improvements to CNXK crypto PMD and fixes aes-gcm zero length input failure. Aakash Sasidharan (1): crypto/cnxk: fix aes-gcm zero len input cases Anoob Joseph (11): common/cnxk: add comments to denote skipped entries crypto/cnxk: update version map file with PMD APIs

[PATCH 01/12] common/cnxk: add comments to denote skipped entries

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Add comments to denote unused table entries. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_ae.c| 6 +++--- drivers/common/cnxk/roc_ae_fpm_tables.c | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/drivers/common/cnxk/roc_ae.c b/

[PATCH 02/12] crypto/cnxk: update version map file with PMD APIs

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Update version map with details of PMD APIs added. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/rte_pmd_cnxk_crypto.h | 2 ++ drivers/crypto/cnxk/version.map | 8 2 files changed, 10 insertions(+) diff --git a/drivers/crypto/cnxk/rte_pmd_cnxk_crypt

[PATCH 03/12] common/cnxk: make inline dev PF func get as idev API

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Inline PF FUNC would be required to set SSO_PF_FUNC in the instruction for cryptodev Rx inject. Move the API to idev to allow usage of the same. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_idev.c | 6 ++ drivers/common/cnxk/roc_idev.h | 2

[PATCH 04/12] crypto/cnxk: add flow control in Rx inject path

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Add flow control in Rx inject path to avoid over submission to CPT. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 16 +++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH 05/12] crypto/cnxk: use SSO PF func of inline device in inst

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph RVU PF FUNC of the CPT LF need not be set as the hardware would determine that. Instead SSO PF FUNC need to be set as inline device so that critical errors would reach inline device. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 2 +- drivers/cr

[PATCH 06/12] crypto/cnxk: use NEON for Rx inject inst preparation

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Use NEON instructions for Rx inject instruction preparation. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 57 +-- 1 file changed, 42 insertions(+), 15 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/d

[PATCH 07/12] crypto/cnxk: remove init of CPT result field in packet

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph The packet would be posted to CPT only when there is a valid result. Skip setting of the same. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 --- 1 file changed, 7 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH 08/12] crypto/cnxk: add dual submission in Rx inject

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Add dual submission to CPT in Rx inject path. Signed-off-by: Anoob Joseph Signed-off-by: Vidya Sagar Velumuri --- drivers/common/cnxk/roc_cpt.h | 43 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 70 +-- drivers/crypto/cnxk/cnxk_

[PATCH 09/12] crypto/cnxk: update sess pointer for next iteration

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Update sess pointer while working on next set of packets. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 13 - 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/drivers/crypto/c

[PATCH 10/12] crypto/cnxk: fix aes-gcm zero len input cases

2024-06-20 Thread Aakash Sasidharan
specific model. Fixes: 4d8166d64988 ("crypto/cnxk: enable digest for zero length input") Signed-off-by: Aakash Sasidharan --- drivers/crypto/cnxk/cnxk_se.h | 28 +--- 1 file changed, 17 insertions(+), 11 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h

[PATCH 11/12] crypto/cnxk: make pack IV variable as const

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Make 'pack_iv' variable as const to avoid multiple checks. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cnxk_se.h | 27 +-- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk

[PATCH 12/12] crypto/cnxk: enable dual submission to CPT

2024-06-20 Thread Aakash Sasidharan
From: Anoob Joseph Submit two instructions in one LMTLINE. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_cpt.c | 17 +- drivers/common/cnxk/roc_cpt.h | 8 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 182 +- drivers/crypto/cnxk/cn10k_c

[PATCH v2 00/12] fixes and improvements to CNXK crypto PMD

2024-06-23 Thread Aakash Sasidharan
v2: Fix compilation errors observed with arm gcc-13. This series adds improvements to CNXK crypto PMD and fixes aes-gcm zero length input failure. Aakash Sasidharan (1): crypto/cnxk: fix aes-gcm zero len input cases Anoob Joseph (11): common/cnxk: add comments to denote skipped entries

[PATCH v2 01/12] common/cnxk: add comments to denote skipped entries

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Add comments to denote unused table entries. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_ae.c| 6 +++--- drivers/common/cnxk/roc_ae_fpm_tables.c | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/drivers/common/cnxk/roc_ae.c b/

[PATCH v2 02/12] crypto/cnxk: update version map file with PMD APIs

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Update version map with details of PMD APIs added. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/rte_pmd_cnxk_crypto.h | 2 ++ drivers/crypto/cnxk/version.map | 8 2 files changed, 10 insertions(+) diff --git a/drivers/crypto/cnxk/rte_pmd_cnxk_crypt

[PATCH v2 03/12] common/cnxk: make inline dev PF func get as idev API

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Inline PF FUNC would be required to set SSO_PF_FUNC in the instruction for cryptodev Rx inject. Move the API to idev to allow usage of the same. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_idev.c | 6 ++ drivers/common/cnxk/roc_idev.h | 2

[PATCH v2 04/12] crypto/cnxk: add flow control in Rx inject path

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Add flow control in Rx inject path to avoid over submission to CPT. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 16 +++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH v2 05/12] crypto/cnxk: use SSO PF func of inline device in inst

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph RVU PF FUNC of the CPT LF need not be set as the hardware would determine that. Instead SSO PF FUNC need to be set as inline device so that critical errors would reach inline device. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 2 +- drivers/cr

[PATCH v2 06/12] crypto/cnxk: use NEON for Rx inject inst preparation

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Use NEON instructions for Rx inject instruction preparation. Signed-off-by: Anoob Joseph Signed-off-by: Aakash Sasidharan --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 62 +-- 1 file changed, 46 insertions(+), 16 deletions(-) diff --git a/drivers

[PATCH v2 07/12] crypto/cnxk: remove init of CPT result field in packet

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph The packet would be posted to CPT only when there is a valid result. Skip setting of the same. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 --- 1 file changed, 7 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH v2 08/12] crypto/cnxk: add dual submission in Rx inject

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Add dual submission to CPT in Rx inject path. Signed-off-by: Anoob Joseph Signed-off-by: Vidya Sagar Velumuri --- drivers/common/cnxk/roc_cpt.h | 43 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 70 +-- drivers/crypto/cnxk/cnxk_

[PATCH v2 09/12] crypto/cnxk: update sess pointer for next iteration

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Update sess pointer while working on next set of packets. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 13 - 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/drivers/crypto/c

[PATCH v2 10/12] crypto/cnxk: fix aes-gcm zero len input cases

2024-06-23 Thread Aakash Sasidharan
specific model. Fixes: 4d8166d64988 ("crypto/cnxk: enable digest for zero length input") Signed-off-by: Aakash Sasidharan --- drivers/crypto/cnxk/cnxk_se.h | 28 +--- 1 file changed, 17 insertions(+), 11 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h

[PATCH v2 11/12] crypto/cnxk: make pack IV variable as const

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Make 'pack_iv' variable as const to avoid multiple checks. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cnxk_se.h | 27 +-- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk

[PATCH v2 12/12] crypto/cnxk: enable dual submission to CPT

2024-06-23 Thread Aakash Sasidharan
From: Anoob Joseph Submit two instructions in one LMTLINE. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_cpt.c | 17 +- drivers/common/cnxk/roc_cpt.h | 8 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 182 +- drivers/crypto/cnxk/cn10k_c

[PATCH v3 00/12] Fixes and improvements to CNXK crypto PMD

2024-06-26 Thread Aakash Sasidharan
v3: * Fix compilation error by moving function meant for arm64 under "#if defined(RTE_ARCH_ARM64)" guard. v2: * Fix compilation errors observed with arm gcc-13. This series adds improvements to CNXK crypto PMD and fixes aes-gcm zero length input failure. Aakash Sasidharan (1): c

[PATCH v3 01/12] common/cnxk: add comments to denote skipped entries

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Add comments to denote unused table entries. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_ae.c| 6 +++--- drivers/common/cnxk/roc_ae_fpm_tables.c | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/drivers/common/cnxk/roc_ae.c b/

[PATCH v3 02/12] crypto/cnxk: update version map file with PMD APIs

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Update version map with details of PMD APIs added. Fixes: 26bb5c4de63e ("crypto/cnxk: add CPT raw submission PMD API") Cc: sta...@dpdk.org Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/rte_pmd_cnxk_crypto.h | 2 ++ drivers/crypto/cnxk/version.map | 8 +++

[PATCH v3 03/12] common/cnxk: make inline dev PF func get as idev API

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Inline PF FUNC would be required to set SSO_PF_FUNC in the instruction for cryptodev Rx inject. Move the API to idev to allow usage of the same. Signed-off-by: Anoob Joseph --- drivers/common/cnxk/roc_idev.c | 6 ++ drivers/common/cnxk/roc_idev.h | 2

[PATCH v3 04/12] crypto/cnxk: add flow control in Rx inject path

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Add flow control in Rx inject path to avoid over submission to CPT. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 16 +++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH v3 05/12] crypto/cnxk: use SSO PF func of inline device in inst

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph RVU PF FUNC of the CPT LF need not be set as the hardware would determine that. Instead SSO PF FUNC need to be set as inline device so that critical errors would reach inline device. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 2 +- drivers/cr

[PATCH v3 06/12] crypto/cnxk: use NEON for Rx inject inst preparation

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Use NEON instructions for Rx inject instruction preparation. Signed-off-by: Anoob Joseph Signed-off-by: Aakash Sasidharan --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 62 +-- 1 file changed, 46 insertions(+), 16 deletions(-) diff --git a/drivers

[PATCH v3 07/12] crypto/cnxk: remove init of CPT result field in packet

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph The packet would be posted to CPT only when there is a valid result. Skip setting of the same. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 --- 1 file changed, 7 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/dri

[PATCH v3 08/12] crypto/cnxk: add dual submission in Rx inject

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Add dual submission to CPT in Rx inject path. Signed-off-by: Anoob Joseph Signed-off-by: Vidya Sagar Velumuri Signed-off-by: Aakash Sasidharan --- drivers/common/cnxk/roc_cpt.h | 43 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 72

[PATCH v3 09/12] crypto/cnxk: update sess pointer for next iteration

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Update sess pointer while working on next set of packets. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 13 - 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/drivers/crypto/cnxk/cn10k_cryptodev_ops.c b/drivers/crypto/c

[PATCH v3 10/12] crypto/cnxk: fix aes-gcm zero len input cases

2024-06-26 Thread Aakash Sasidharan
specific model. Fixes: 4d8166d64988 ("crypto/cnxk: enable digest for zero length input") Cc: sta...@dpdk.org Signed-off-by: Aakash Sasidharan Acked-by: Anoob Joseph --- drivers/crypto/cnxk/cnxk_se.h | 28 +--- 1 file changed, 17 insertions(+), 11 deletions(-) di

[PATCH v3 11/12] crypto/cnxk: make pack IV variable as const

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Make 'pack_iv' variable as const to avoid multiple checks. Signed-off-by: Anoob Joseph --- drivers/crypto/cnxk/cnxk_se.h | 27 +-- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk

[PATCH v3 12/12] crypto/cnxk: enable dual submission to CPT

2024-06-26 Thread Aakash Sasidharan
From: Anoob Joseph Submit two instructions in one LMTLINE. Signed-off-by: Anoob Joseph Signed-off-by: Aakash Sasidharan --- drivers/common/cnxk/roc_cpt.c | 17 +- drivers/common/cnxk/roc_cpt.h | 8 +- drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 184

[PATCH] app/eventdev: increase default queue depth for cryptodev

2024-06-26 Thread Aakash Sasidharan
such use cases. Signed-off-by: Aakash Sasidharan --- app/test-eventdev/test_perf_common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/app/test-eventdev/test_perf_common.c b/app/test-eventdev/test_perf_common.c index db0f9c1f3b..66d22cd559 100644 --- a/app/test-eventdev

[PATCH 1/3] event/cnxk: fix return values for capability API

2023-08-22 Thread Aakash Sasidharan
crypto adapter capability now returns -ENOTSUP instead of -EINVAL when event_cnxk or crypto_cnxk device is not available. This would allow unit test to be skipped when the devices are not available. Fixes: 19f81cb59cb4 ("event/cnxk: add crypto adapter operations") Signed-off-

[PATCH 2/3] test/event_crypto_adapter: skip unsupported test

2023-08-22 Thread Aakash Sasidharan
Skip the test if rte_event_crypto_adapter_caps_get() returns -ENOTSUP. Signed-off-by: Aakash Sasidharan --- app/test/test_event_crypto_adapter.c | 17 + 1 file changed, 17 insertions(+) diff --git a/app/test/test_event_crypto_adapter.c b/app/test/test_event_crypto_adapter.c

[PATCH 3/3] test/event_crypto_adapter: fix crypto null dev creation

2023-08-22 Thread Aakash Sasidharan
Create crypto null device only if no other crypto devices were found. Fixes: 3c2c535ecfc0 ("test: add event crypto adapter auto-test") Cc: abhinandan.guj...@intel.com Signed-off-by: Aakash Sasidharan --- app/test/test_event_crypto_adapter.c | 7 +++ 1 file changed, 3 insert

RE: [PATCH 2/3] test/event_crypto_adapter: skip unsupported test

2023-08-23 Thread Aakash Sasidharan
Hi Abhinandan, Please see inline. > -Original Message- > From: Gujjar, Abhinandan S > Sent: Wednesday, August 23, 2023 10:04 AM > To: Aakash Sasidharan > Cc: Jerin Jacob Kollanukkaran ; Shijith Thotton > ; Anoob Joseph ; > dev@dpdk.org > Subject: [E

RE: [PATCH 2/3] test/event_crypto_adapter: skip unsupported test

2023-08-23 Thread Aakash Sasidharan
Hi Abhinandan, Please see inline. > -Original Message- > From: Aakash Sasidharan > Sent: Wednesday, August 23, 2023 1:18 PM > To: 'Gujjar, Abhinandan S' > Cc: Jerin Jacob Kollanukkaran ; Shijith Thotton > ; Anoob Joseph ; > dev@dpdk.org

[PATCH] test/crypto: add ext mbuf test for aes-gcm aead algo

2023-11-29 Thread Aakash Sasidharan
Add external mbuf test for AES GCM aead algo. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 335 app/test/test_cryptodev_aead_test_vectors.h | 5 +- 2 files changed, 202 insertions(+), 138 deletions(-) diff --git a/app/test

[PATCH 00/21] Improvements and new test cases

2024-03-04 Thread Aakash Sasidharan
Adding new test cases and improvements to test application. Aakash Sasidharan (7): test/security: enable AES-GCM in combined mode TLS test/security: add TLS 1.2 data walkthrough test test/security: add DTLS 1.2 data walkthrough test test/security: add TLS SG data walkthrough test test

[PATCH 01/21] test/security: enable AES-GCM in combined mode TLS

2024-03-04 Thread Aakash Sasidharan
Enable AES-GCM AEAD tests in combined mode TLS test suite. Coverity issue: 414888 Fixes: 9157ccb8f876 ("test/crypto: verify TLS headers") Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev_security_tls_record.c | 10 -- app/test/test_security_proto.h

[PATCH 02/21] test/security: add TLS 1.2 data walkthrough test

2024-03-04 Thread Aakash Sasidharan
Add data walkthrough test for TLS 1.2. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 90 +-- app/test/test_cryptodev.h | 12 ++- app/test/test_cryptodev_security_tls_record.c | 25 -- app/test

[PATCH 04/21] test/security: add TLS SG data walkthrough test

2024-03-04 Thread Aakash Sasidharan
Add multi segment packet data walkthrough test for TLS 1.2 and DTLS 1.2. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 42 +++ app/test/test_cryptodev_security_tls_record.h | 2 +- 2 files changed, 43 insertions(+), 1 deletion(-) diff

[PATCH 05/21] test/security: unit test for TLS packet corruption

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add test to verify the corrupted TLS packet header Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 27 +-- app/test/test_cryptodev_security_tls_record.c | 4 +++ app/test/test_cryptodev_security_tls_record.h |

[PATCH 06/21] test/security: unit test for custom content verification

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit test to verify the TLS header creation with custom content type Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 19 +++ app/test/test_cryptodev_security_tls_record.c | 3 +++ app/test/test_cryptodev_se

[PATCH 07/21] test/cryptodev: allow zero packet length buffers

2024-03-04 Thread Aakash Sasidharan
From: Anoob Joseph The function 'create_segmented_mbuf' is updated to support zero packet length mbufs. This allows testing of zero packet length payload with TLS record processing. Signed-off-by: Anoob Joseph --- app/test/test_cryptodev.h | 20 +++- 1 file changed, 7 insertion

[PATCH 08/21] test/security: unit test to verify zero TLS records

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the zero len TLS records. Zero len packets are allowed when content type is app data while zero packet length with other content type (such as handshake) would result in an error. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptode

[PATCH 09/21] test/security: add unit tests for DTLS-1.2

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify 1. DTLS record with zero length 2. DTLS record with header corruption 3. DTLS record with content type as custom Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 77 +++ 1 file changed, 7

[PATCH 03/21] test/security: add DTLS 1.2 data walkthrough test

2024-03-04 Thread Aakash Sasidharan
Add data walkthrough test for DTLS 1.2 Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 17 + app/test/test_cryptodev_security_tls_record.c | 5 - 2 files changed, 21 insertions(+), 1 deletion(-) diff --git a/app/test/test_cryptodev.c b

[PATCH 10/21] test/security: add TLS/DTLS 1.2 AES-256-SHA384 vectors

2024-03-04 Thread Aakash Sasidharan
From: Akhil Goyal Added vectors for TLS 1.2 and DTLS 1.2 using algos AES-256-CBC and HMAC-SHA384 Signed-off-by: Akhil Goyal --- app/test/test_cryptodev.c | 19 ++ app/test/test_cryptodev_security_tls_record.h | 2 + ...yptodev_security_tls_record_test_vectors.h | 200 +++

[PATCH 11/21] test/security: add DTLS 1.2 anti-replay tests

2024-03-04 Thread Aakash Sasidharan
Add anti-replay test for DTLS 1.2. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 115 ++- app/test/test_cryptodev_security_tls_record.c | 132 ++ app/test/test_cryptodev_security_tls_record.h | 11 +- 3 files changed, 188

[PATCH 12/21] test/security: add more DTLS anti-replay window sz

2024-03-04 Thread Aakash Sasidharan
Add anti-replay tests for window sizes 128, 256, 512, 1024, 2048 and 4096 window sizes in DTLS 1.2 suite. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 72 +-- 1 file changed, 69 insertions(+), 3 deletions(-) diff --git a/app/test

[PATCH 13/21] test/crypto: update verification of header

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri In TLS 1.3, the version in the header would be TLS 1.2 and the content type would be APP irrespective of the type of the payload. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev_security_tls_record.c | 20 +-- 1 file changed, 14 insert

[PATCH 14/21] test/crypto: add TLS 1.3 vectors

2024-03-04 Thread Aakash Sasidharan
From: Akhil Goyal Added vectors and test suite for TLS 1.3 AES-128-GCM, AES-256-GCM and CHACHA20-POLY1305 vectors. The vectors are generated using gnuTLS client server application. Signed-off-by: Akhil Goyal --- app/test/test_cryptodev.c | 35 +++ app/test/test_cryptodev_s

[PATCH 15/21] test/crypto: update framework to verify tls-1.3

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Update the fields in preparation of test descriptor. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 17 +--- app/test/test_cryptodev_security_tls_record.c | 43 --- app/test/test_cryptodev_security_tls_reco

[PATCH 16/21] test/crypto: test to verify hdr corruption in TLS

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify TLS-1.3 record with header corruption. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 19 ++- 1 file changed, 18 insertions(+), 1 deletion(-) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptod

[PATCH 17/21] test/crypto: test to verify custom content type in TLS

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify TLS-1.3 record with content type as custom. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 19 +++ 1 file changed, 19 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index

[PATCH 18/21] test/crypto: test to verify zero len record in TLS

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify TLS-1.3 record with zero length. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 39 +++ 1 file changed, 39 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptode

[PATCH 19/21] test/crypto: unit tests to verify padding in TLS

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for TLS-1.2. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 85 ++- app/test/test_cryptodev_security_tls_record.c | 28 -- app/test/test_cryptodev_security_tls_record.h

[PATCH 20/21] test/crypto: unit tests for padding in DTLS-1.2

2024-03-04 Thread Aakash Sasidharan
From: Vidya Sagar Velumuri Add unit tests to verify the padding for DTLS-1.2. Signed-off-by: Vidya Sagar Velumuri --- app/test/test_cryptodev.c | 60 +++ 1 file changed, 60 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c ind

[PATCH 21/21] test/security: add out of place sgl test case for TLS 1.2

2024-03-04 Thread Aakash Sasidharan
Add TLS 1.2 out-of-place multi-segmented packet test. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 52 ++- app/test/test_cryptodev_security_tls_record.h | 1 + 2 files changed, 51 insertions(+), 2 deletions(-) diff --git a/app/test

[PATCH v2 00/21] Improvements and new test cases

2024-03-12 Thread Aakash Sasidharan
Adding new test cases and improvements to test application. v2: * Rebased. Aakash Sasidharan (7): test/security: enable AES-GCM in combined mode TLS test/security: add TLS 1.2 data walkthrough test test/security: add DTLS 1.2 data walkthrough test test/security: add TLS SG data

[PATCH v2 01/21] test/security: enable AES-GCM in combined mode TLS

2024-03-12 Thread Aakash Sasidharan
Enable AES-GCM AEAD tests in combined mode TLS test suite. Coverity issue: 414888 Fixes: 9157ccb8f876 ("test/crypto: verify TLS headers") Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev_security_tls_record.c | 10 -- app/test/test_security_proto.h

[PATCH v2 02/21] test/security: add TLS 1.2 data walkthrough test

2024-03-12 Thread Aakash Sasidharan
Add data walkthrough test for TLS 1.2. Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 90 +-- app/test/test_cryptodev.h | 12 ++- app/test/test_cryptodev_security_tls_record.c | 25 -- app/test

[PATCH v2 03/21] test/security: add DTLS 1.2 data walkthrough test

2024-03-12 Thread Aakash Sasidharan
Add data walkthrough test for DTLS 1.2 Signed-off-by: Aakash Sasidharan --- app/test/test_cryptodev.c | 17 + app/test/test_cryptodev_security_tls_record.c | 5 - 2 files changed, 21 insertions(+), 1 deletion(-) diff --git a/app/test/test_cryptodev.c b

  1   2   >