the primary motive for adding "session_get" API.
Thanks,
Anoob
On 11/20/2017 05:42 PM, Radu Nicolau wrote:
Hi,
Why not have something similar to rte_security_set_pkt_metadata, for
example:
void *
rte_security_get_pkt_metadata(struct rte_security_ctx *instance,
Hi,
See inline.
Thanks,
Anoob
On 11/22/2017 04:59 PM, Radu Nicolau wrote:
On 11/22/2017 6:55 AM, Anoob Joseph wrote:
In case of inline protocol processed ingress traffic, the packet may not
have enough information to determine the security parameters with which
the packet was processed
Hi Nelio,
Which mode was attempted when you got the crash? Is it with inline-protocol?
Thanks,
Anoob
On 11/22/2017 05:51 PM, Nelio Laranjeiro wrote:
Hi Anoob,
I am facing a segfault in ipsec-secgw with this series when using MLX5
PMD, maybe you can help here, see the following gdb
Hi Nelio,
So you had attempted inline-crypto(not inline-protocol), right?
Can you give some more details on the test case which caused the issue?
Was it inbound or outbound?
And your PMD doesn't have "get_pkt_metadata" function pointer
registered, right?
Thanks,
Anoob
On 1
Hi Nelio,
Please ignore the previous mail. I'll check the issue and let you know.
Thanks,
Anoob
On 11/22/2017 07:08 PM, Anoob wrote:
Hi Nelio,
So you had attempted inline-crypto(not inline-protocol), right?
Can you give some more details on the test case which caused the
issue? W
Hi,
Please see inline.
On 11/22/2017 06:57 PM, Neil Horman wrote:
On Wed, Nov 22, 2017 at 06:55:15AM +, Anoob Joseph wrote:
In case of inline protocol processed ingress traffic, the packet may not
have enough information to determine the security parameters with which
the packet was
Hi Nelio,
The issue is probably because of a different patch titled, "[PATCH 2/3]
crypto: fix pedentic compilation errors". I was able to reproduce the
issue with that.
Hope this helps.
Thanks,
Anoob
On 11/22/2017 06:35 PM, Nelio Laranjeiro wrote:
On Wed, Nov 22, 2017 at 06:25:
Hi Akhil,
Please see inline.
Thanks,
Anoob
On 11/24/2017 02:58 PM, Akhil Goyal wrote:
Hi Anoob,
On 11/15/2017 3:11 PM, Anoob Joseph wrote:
When security offload is enabled, the packet should be forwarded on the
port configured in the SA. Security session will be configured on that
port
Hi Akhil, Radu
PLease see inline.
Thanks,
Anoob
On 11/24/2017 05:04 PM, Akhil Goyal wrote:
Hi Radu,
On 11/24/2017 4:47 PM, Radu Nicolau wrote:
On 11/24/2017 10:55 AM, Akhil Goyal wrote:
On 11/24/2017 3:09 PM, Radu Nicolau wrote:
Hi,
Comment inline
On 11/24/2017 8:50 AM, Akhil Goyal
Hi Akhil, Radu,
Is there any update on how we should approach this?
Thanks,
Anoob
On 11/24/2017 05:52 PM, Anoob wrote:
Hi Akhil, Radu
Please see inline.
Thanks,
Anoob
On 11/24/2017 05:04 PM, Akhil Goyal wrote:
Hi Radu,
On 11/24/2017 4:47 PM, Radu Nicolau wrote:
On 11/24/2017 10:55
flow action will have to be ignored in the driver. This wouldn't look
right from application's point of view. And also the PMD would need
application-specific logic to handle such cases, which may not scale well.
Thanks,
Anoob
On 11/23/2017 08:42 PM, Nelio Laranjeiro wrote:
Mell
Hi Nelio,
Please see inline.
Thanks,
Anoob
On 11/29/2017 06:20 PM, Nelio Laranjeiro wrote:
Hi Anoob,
On Wed, Nov 29, 2017 at 06:00:38PM +0530, Anoob wrote:
Hi Nelio,
Since support of RSS with inline crypto/protocol is hardware
implementation dependent, it would be better if
Hi Akhil,
See inline.
Thanks,
Anoob
On 12/04/2017 02:58 PM, Akhil Goyal wrote:
Hi Anoob,
On 11/24/2017 5:52 PM, Anoob wrote:
Hi Akhil, Radu
PLease see inline.
Thanks,
Anoob
On 11/24/2017 05:04 PM, Akhil Goyal wrote:
Hi Radu,
On 11/24/2017 4:47 PM, Radu Nicolau wrote:
On 11/24/2017
Hi Akhil, Radu,
Please see inline.
Thanks,
Anoob
On 11/24/2017 05:33 PM, Akhil Goyal wrote:
On 11/24/2017 5:29 PM, Radu Nicolau wrote:
On 11/24/2017 11:34 AM, Akhil Goyal wrote:
Hi Radu,
On 11/24/2017 4:47 PM, Radu Nicolau wrote:
On 11/24/2017 10:55 AM, Akhil Goyal wrote:
On 11/24
Hi Akhil,
On 12/04/2017 01:19 PM, Akhil Goyal wrote:
Hi Anoob,
On 11/29/2017 9:51 AM, Anoob Joseph wrote:
Hi Akhil,
On 24-11-2017 16:19, Akhil Goyal wrote:
Hi Anoob,
On 11/24/2017 3:28 PM, Anoob wrote:
static inline void
route4_pkts(struct rt_ctx *rt_ctx, struct rte_mbuf *pkts
Hi Nelio,
On 12/04/2017 07:41 PM, Nelio Laranjeiro wrote:
Mellanox INNOVA NIC needs to have final target queue actions to perform
inline crypto.
Signed-off-by: Nelio Laranjeiro
---
Changes in v2:
* Test the rule by PASSTHRU/RSS/QUEUE and apply the first one validated.
---
examples/ipse
Hi Nelio,
On 12/04/2017 07:41 PM, Nelio Laranjeiro wrote:
Mellanox INNOVA NIC needs to have final target queue actions to perform
inline crypto.
Signed-off-by: Nelio Laranjeiro
---
Changes in v2:
* Test the rule by PASSTHRU/RSS/QUEUE and apply the first one validated.
---
examples/ipse
Hi Akhil,
Can you confirm if you are fine with the approach explained inline.
Thanks,
Anoob
On 12/06/2017 03:13 PM, Radu Nicolau wrote:
Hi,
On 12/6/2017 7:30 AM, Anoob wrote:
Hi Akhil, Radu,
Please see inline.
Thanks,
Anoob
On 11/24/2017 05:33 PM, Akhil Goyal wrote:
On 11/24/2017 5
Hi Nelio,
On 12/11/2017 01:51 PM, Nelio Laranjeiro wrote:
Hi Anoob,
On Fri, Dec 08, 2017 at 10:10:28PM +0530, Anoob Joseph wrote:
HI Nelio,
On 08-12-2017 20:10, Nelio Laranjeiro wrote:
On Fri, Dec 08, 2017 at 07:30:03PM +0530, Anoob wrote:
Hi Nelio
ack in eth port & queue based
on rte_flow rules and packet parsing after security processing. The API
would behave like a loopback but with the additional security
processing.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
v2:
* Added a new API for configuring security d
with
the expectation.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c| 341 +++
app/test/test_cryptodev_security_ipsec.h | 1 +
2 files changed, 289 insertions(+), 53 deletions(-)
diff --git a/app/test
p; queue based
on rte_flow rules and packet parsing after security processing. The API
would behave like a loopback but with the additional security
processing.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
v3:
* Resolved compilation error with 32 bit build
v2:
* Added
with
the expectation.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
app/test/test_cryptodev.c| 340 +++
app/test/test_cryptodev_security_ipsec.h | 1 +
2 files changed, 288 insertions(+), 53 deletions(-)
diff --git a/app/test
From: Akhil Goyal
Added TLS and DTLS packet headers for L4 security applications.
Signed-off-by: Akhil Goyal
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
doc/api/doxy-api-index.md | 2 ++
lib/net/meson.build | 2 ++
lib/net/rte_dtls.h| 61
). TLS 1.3 has content type as
part of trailer which would be encrypted and would be removed by PMD.
- Updated documentation (Harry)
Akhil Goyal (1):
net: add headers for TLS/DTLS packets
Anoob Joseph (2):
security: add TLS record processing
security: support extra padding with TLS
Vidya Sag
1.2.
Signed-off-by: Akhil Goyal
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
doc/guides/prog_guide/rte_security.rst | 62 ++
lib/security/rte_security.c| 4 +
lib/security/rte_security.h| 110 +
3 files cha
allow users to
provide extra padding in units of 8B. It is an optional feature and any
device that supports the same can declare so by making use of
corresponding capability.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
lib/cryptodev/rte_crypto.h | 14 +-
lib
lifetime under the same.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
lib/cryptodev/rte_crypto.h | 11 ++-
lib/security/rte_security.h | 18 ++
2 files changed, 28 insertions(+), 1 deletion(-)
diff --git a/lib/cryptodev/rte_crypto.h b/lib/cryptodev
From: Vidya Sagar Velumuri
TLS/DTLS record processing requires content type to be provided per
packet (for record write operation). Extend usage of reserved fields in
rte_crypto_op for the same purpose.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
doc/guides/prog_guide
p; queue based
on rte_flow rules and packet parsing after security processing. The API
would behave like a loopback but with the additional security
processing.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
Acked-by: Akhil Goyal
---
v4:
Updated release notes
v3:
* Resolved com
with
the expectation.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
Acked-by: Akhil Goyal
---
app/test/test_cryptodev.c| 340 +++
app/test/test_cryptodev_security_ipsec.h | 1 +
2 files changed, 288 insertions(+), 53 deletions(-)
diff --git
r end */
> > + RTE_ETH_EVENT_IPSEC_PMD_ERROR_END = -1,
> > /** Unknown event type */
> > RTE_ETH_EVENT_IPSEC_UNKNOWN = 0,
> > /** Sequence number overflow */
> >
>
> I don't see any problem to extend event subtype with custom error range,
> @Akhil, @Anoob what do you think?
[Anoob] Thanks for looping in. I do not see an issue with the approach either.
Acked-by: Anoob Joseph
Thanks,
Anoob
core, the number of sessions would be evenly
distributed across all cores.
The application would test with all combinations of cipher & auth
algorithms supported by the PMD.
Signed-off-by: Aakash Sasidharan
Signed-off-by: Anoob Joseph
---
v2:
* Rebased on latest code. Made changes to accommodate
Fix compiler warning of uninitialized address.
Fixes: a7033a2fb2bf ("common/cnxk: support custom UDP port values")
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/cnxk_security.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/drivers/common/cnxk/cnxk_
be communicated to PDCP layer so that
* PDCP can drop the corresponding SDU
*/
}
}
Anoob Joseph (1):
lib: add pdcp protocol
doc/api/doxy-api-index.md | 3 +-
doc/api/doxy-api.conf.in | 1 +
lib/meson.build | 1 +
lib/pd
(rte_pdcp_pkt_pre_process()) and one after crypto processing
(rte_pdcp_pkt_post_process()). Since cryptodev dequeue can return crypto
operations belonging to multiple entities, rte_pdcp_pkt_crypto_group()
is added to help grouping crypto operations beloning to same entity.
Signed-off-by: Anoob Joseph
core, the number of sessions would be evenly
distributed across all cores.
The application would test with all combinations of cipher & auth
algorithms supported by the PMD.
Signed-off-by: Aakash Sasidharan
Signed-off-by: Anoob Joseph
---
v3:
* Rebased
v2:
* Rebased on latest code. Made ch
Hi Thomas,
Please see inline.
Thanks,
Anoob
> Subject: [EXT] Re: [PATCH 1/5] net: add PDCP header
>
> External Email
>
> --
> 22/12/2022 10:25, Anoob Joseph:
> > --- /dev/null
> > +++ b/lib/
Hi Thomas,
Please see inline.
Thanks,
Anoob
> Subject: Re: [EXT] Re: [PATCH 1/5] net: add PDCP header
>
> 18/01/2023 18:39, Anoob Joseph:
> > > 22/12/2022 10:25, Anoob Joseph:
> > > > --- /dev/null
> > > > +++ b/lib/net/rte_pdcp_hdr.h
> &g
Description for rte_cryptodev_get_sec_ctx is missing. Add the same.
Signed-off-by: Anoob Joseph
---
lib/cryptodev/rte_cryptodev.h | 9 +
1 file changed, 9 insertions(+)
diff --git a/lib/cryptodev/rte_cryptodev.h b/lib/cryptodev/rte_cryptodev.h
index ba730373fb..8876e0427f 100644
--- a
The API 'rte_cryptodev_get_sec_ctx' returns void *. Type cast is not
required.
Signed-off-by: Anoob Joseph
---
lib/security/rte_security.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/security/rte_security.c b/lib/security/rte_security.c
index c4d64bb8e9..
The API 'rte_cryptodev_get_sec_ctx' returns void *. Type cast is not
required.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c | 29 -
1 file changed, 12 insertions(+), 17 deletions(-)
diff --git a/app/test/test_cryptodev.c b/app/test/test_c
The API 'rte_cryptodev_get_sec_ctx' returns void *. Type cast is not
required.
Signed-off-by: Anoob Joseph
---
app/test-crypto-perf/cperf_ops.c | 12 ++--
app/test-crypto-perf/cperf_test_pmd_cyclecount.c | 4 +---
app/test-crypto-perf/cperf_test_throughput.
The API 'rte_cryptodev_get_sec_ctx' returns void *. Type cast is not
required.
Signed-off-by: Anoob Joseph
---
examples/ipsec-secgw/ipsec.c | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git a/examples/ipsec-secgw/ipsec.c b/examples/ipsec-secgw/ipsec.c
index
Description for rte_cryptodev_get_sec_ctx is missing. Add the same.
Fixes: eadb4fa1e1fe ("cryptodev: support security APIs")
Signed-off-by: Anoob Joseph
---
lib/cryptodev/rte_cryptodev.h | 9 +
1 file changed, 9 insertions(+)
diff --git a/lib/cryptodev/rte_cryptodev.h b/lib
Hi David,
Please see inline.
Thanks,
Anoob
> -Original Message-
> From: Coyle, David
> Sent: Monday, September 11, 2023 9:32 PM
> To: Anoob Joseph ; dev@dpdk.org
> Cc: Ji, Kai ; O'Sullivan, Kevin ;
> Jerin Jacob Kollanukkaran
> Subject: RE: [EXT] [PATCH v2
Hi David,
Thanks for updating the patches based on the comments provided on previous
version. Please see inline for some comments on code.
Thanks,
Anoob
> -Original Message-
> From: David Coyle
> Sent: Thursday, September 14, 2023 8:52 PM
> To: dev@dpdk.org
> Cc: k
Hi Amit,
Thanks for adding the feature. Please see inline.
With the mentioned fixes,
Acked-by: Anoob Joseph
Thanks,
Anoob
> -Original Message-
> From: Amit Prakash Shukla
> Sent: Thursday, September 7, 2023 1:41 PM
> To: Chengwen Feng ; Kevin Laatz
> ; Bruce Richar
Hi Amit,
Please see inline.
Thanks,
Anoob
> -Original Message-
> From: Amit Prakash Shukla
> Sent: Thursday, September 7, 2023 1:41 PM
> To: Chengwen Feng ; Kevin Laatz
> ; Bruce Richardson
> Cc: dev@dpdk.org; Jerin Jacob Kollanukkaran ;
> conor.wa...@intel.com; V
lative ease now that
> the framework is in place.
>
> v4:
> * Address review comments from Anoob
> * Remove unnecessary pointer type casting
> * Free capability and worker name memory if memory allocation fails
> during scheduler PMD creation
> * Use RTE_MAX when
Hi Harry,
Thanks for the review. Please see inline.
Thanks,
Anoob
> -Original Message-
> From: Van Haaren, Harry
> Sent: Wednesday, September 20, 2023 2:53 PM
> To: Anoob Joseph ; Thomas Monjalon
> ; Akhil Goyal ; Jerin Jacob
> Kollanukkaran ; Konstantin Ananyev
>
Hi Harry,
Please see inline.
Thanks,
Anoob
> -Original Message-
> From: Van Haaren, Harry
> Sent: Thursday, September 21, 2023 2:09 PM
> To: Anoob Joseph
> Cc: Hemant Agrawal ; dev@dpdk.org; Matz,
> Olivier ; Vidya Sagar Velumuri
> ; Thomas Monjalon ;
> A
>
> This series adds improvements and support for raw cryptodev API in cnxk
> crypto PMD.
>
> v2:
> * Updated feature file for cn10k
> * Updated commit message
>
> Aakash Sasidharan (1):
> crypto/cnxk: add support for packets with cipher len zero
>
> Anoo
>
> Enable data walkthrough test in combined mode.
> The test covers data size ranging from 0B to 9000B both inclusive.
>
> Signed-off-by: Aakash Sasidharan
Acked-by: Anoob Joseph
+-
> lib/dmadev/rte_dmadev.h | 27 +++
> 2 files changed, 192 insertions(+), 1 deletion(-)
>
> --
> 2.25.1
Series Acked-by: Anoob Joseph
> Signed-off-by: Amit Prakash Shukla
Acked-by: Anoob Joseph
Hi Akhil,
Please see inline.
Thanks,
Anoob
> -Original Message-
> From: Akhil Goyal
> Sent: Wednesday, June 16, 2021 4:36 PM
> To: Anoob Joseph ; Thomas Monjalon
>
> Cc: Ankur Dwivedi ; Jerin Jacob Kollanukkaran
> ; Tejasree Kondoj ;
> dev@dpdk.org; Anoob Jo
Hi Akhil,
Please see inline.
Thanks,
Anoob
> -Original Message-
> From: Akhil Goyal
> Sent: Thursday, June 17, 2021 1:41 AM
> To: Anoob Joseph ; Thomas Monjalon
>
> Cc: Tejasree Kondoj ; Jerin Jacob Kollanukkaran
> ; Ankur Dwivedi ;
> dev@dpdk.org; Anoob Jo
ne IPsec required mboxes and framework
- Added security common code
- Added plt_dp_* log based on Akhil's comment
Aakash Sasidharan (2):
common/cnxk: add CPT diagnostics
common/cnxk: add CPT LF flush
Ankur Dwivedi (1):
common/cnxk: add SE set key functions in roc
Anoob Joseph (3):
co
From: Vidya Sagar Velumuri
Add CPT hardware definitions. CPT is the hardware block on
cnxk family of processors, that can be used to offload
cryptographic operations.
Signed-off-by: Anoob Joseph
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/hw/cpt.h | 291
From: Srujana Challa
Updates Rx inline IPSEC mailbox message format to make it
sync with latest CPT PF driver.
Signed-off-by: Srujana Challa
---
drivers/common/cnxk/roc_mbox.h | 3 +++
1 file changed, 3 insertions(+)
diff --git a/drivers/common/cnxk/roc_mbox.h b/drivers/common/cnxk/roc_mbox.h
Add routines to init, fini, configure & clear CPT device.
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/meson.build| 1 +
drivers/common/cnxk/roc_api.h | 3 +
drivers/common/cnxk/roc_cpt.c |
Add APIs to set & get CPT device.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_cpt.c | 8
drivers/common/cnxk/roc_idev.c | 21 +
drivers/common/cnxk/roc_idev.h | 3 +++
drivers/common/cnxk/roc_idev_priv.h | 2 ++
drivers/common/
From: Vidya Sagar Velumuri
Add mailbox to configure tiemouts and thresholds in
CPT RXC unit.
Signed-off-by: Aakash Sasidharan
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/roc_cpt.c | 27 +++
drivers/common/cnxk/roc_cpt.h | 10 ++
drivers/com
From: Archana Muniganti
Add routines to init & fini CPT LFs. CPT LFs are
queues to the hardware enabling instruction submissions.
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/roc_cpt.c |
From: Aakash Sasidharan
Add routines to fetch and dump CPT statistics and states.
Signed-off-by: Aakash Sasidharan
Signed-off-by: Srujana Challa
---
drivers/common/cnxk/meson.build | 1 +
drivers/common/cnxk/roc_cpt.c | 29 +++
drivers/common/cnxk/roc_cpt.h | 3 +
dr
From: Aakash Sasidharan
Add routine to flush context from CPT context processor cache.
Signed-off-by: Aakash Sasidharan
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/roc_cpt.c | 18 ++
drivers/common/cnxk/roc_cpt.h | 1 +
drivers/common/cnxk/version.map |
From: Vidya Sagar Velumuri
Add mbox to configure inbound & outbound inline IPsec.
Signed-off-by: Tejasree Kondoj
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/roc_cpt.c | 61 ++
drivers/common/cnxk/roc_cpt.h | 5
drivers/common
From: Kiran Kumar Kokkilagadda
Microcode SE opcodes support symmetric operations. Add defines
and structs defined by microcode.
Signed-off-by: Anoob Joseph
Signed-off-by: Kiran Kumar Kokkilagadda
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/roc_api.h | 3 +
drivers/common
From: Srujana Challa
Microcode IE opcodes support IPsec operations. Add defines
and structs defined by microcode.
Signed-off-by: Anoob Joseph
Signed-off-by: Srujana Challa
Signed-off-by: Tejasree Kondoj
---
drivers/common/cnxk/roc_api.h | 2 +
drivers/common/cnxk/roc_ie.h | 19
From: Kiran Kumar Kokkilagadda
Microcode AE opcodes support asymmetric operations. Add defines
and structs defined by microcode.
Signed-off-by: Anoob Joseph
Signed-off-by: Kiran Kumar Kokkilagadda
---
drivers/common/cnxk/roc_ae.h | 56 +++
drivers
Add routine to initialize LMTLINE which facilitates instruction
submission to CPT. Add common macros required in the enqueue
operations.
Signed-off-by: Anoob Joseph
Signed-off-by: Ankur Dwivedi
---
drivers/common/cnxk/roc_cpt.c | 20
drivers/common/cnxk/roc_cpt.h | 32
From: Kiran Kumar Kokkilagadda
Add scalar FPM tables to be used for asymmetric operations.
Signed-off-by: Anoob Joseph
Signed-off-by: Kiran Kumar Kokkilagadda
---
drivers/common/cnxk/meson.build |1 +
drivers/common/cnxk/roc_ae_fpm_tables.c | 1140
From: Kiran Kumar Kokkilagadda
EC group static vectors are required for CPT asymmetric operations.
Signed-off-by: Anoob Joseph
Signed-off-by: Kiran Kumar Kokkilagadda
---
drivers/common/cnxk/meson.build | 1 +
drivers/common/cnxk/roc_ae.c| 142
From: Srujana Challa
Add code that can be leveraged across
lookaside and inline IPsec on cn10k.
Signed-off-by: Srujana Challa
Signed-off-by: Nithin Dabilpuram
Signed-off-by: Tejasree Kondoj
---
drivers/common/cnxk/cnxk_security.c | 468
drivers/common/cnx
From: Ankur Dwivedi
The set key functions are added in roc.
Signed-off-by: Ankur Dwivedi
---
drivers/common/cnxk/meson.build | 1 +
drivers/common/cnxk/roc_se.c| 342
drivers/common/cnxk/roc_se.h| 8 +
drivers/common/cnxk/version.map | 2 +
o/cnxk: add probe and remove
crypto/cnxk: add device control ops
crypto/cnxk: add queue pair ops
crypto/cnxk: add symmetric crypto capabilities
Anoob Joseph (5):
crypto/cnxk: add session ops framework
crypto/cnxk: add enqueue burst op
crypto/cnxk: add dequeue burst op
crypto/cnxk: add
From: Ankur Dwivedi
Add driver skeleton for crypto_cn9k & crypto_cn10k PMDs leveraging cnxk
common framework.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
MAINTAINERS | 9 +++
From: Ankur Dwivedi
Add probe & remove for cn9k & cn10k crypto PMDs.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph >
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn10k_cryptodev.c | 98 ++-
dri
From: Ankur Dwivedi
Add ops for
- dev_configure()
- dev_start()
- dev_stop()
- dev_close()
- dev_infos_get()
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 21
From: Ankur Dwivedi
Add ops for
- queue_pair_setup()
- queue_pair_release()
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 4 +-
drivers/crypto/cnxk
Add session ops
- sym_session_get_size
- sym_session_configure
- sym_session_clear
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 6 +-
drivers/crypto/cnxk
Add enqueue_burst op in cn9k & cn10k.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn10k_cryptodev.c | 2 +
drivers/crypto/cnxk/cn10k_cryptodev_ops.c |
Add dequeue_burst op in cn9k & cn10k.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/features/cn10k.ini | 3 +
doc/guides/cryptodevs/features/cn9k.ini | 3 +
drivers/crypto/
Add support for cipher operation in session.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 3 +
drivers/crypto/cnxk/cnxk_se.h| 106
Add support for auth operations in session.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 13 +++
drivers/crypto/cnxk/cnxk_se.h| 194
From: Archana Muniganti
Add support for AEAD operations in session.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 3 ++
drivers/crypto/cnxk/cnxk_se.h| 64
From: Archana Muniganti
Add support for chained operations in session.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/features/cn10k.ini | 2 ++
doc/guides/cryptodevs/features/cn9k.ini
From: Archana Muniganti
Add flexi crypto cipher encrypt in enqueue API. Flexi crypto
opcode covers a broad set of ciphers including variants of AES.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto
From: Archana Muniganti
Add flexi crypto cipher decrypt support in enqueue API. Flexi crypto
opcode covers a broad set of ciphers including variants of AES.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
doc
From: Archana Muniganti
Add PDCP opcode which handles ZUC and SNOW3G.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cnxk_se.h | 268 +-
1 file changed
From: Tejasree Kondoj
Add PDCP opcode which handles ZUC and SNOW3G.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/features/cn10k.ini | 2 +
doc/guides/cryptodevs/features/cn9k.ini | 2
From: Tejasree Kondoj
Add KASUMI encrypt support.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cnxk_se.h | 196 ++
1 file changed, 196 insertions
From: Tejasree Kondoj
Add KASUMI decrypt support.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/features/cn10k.ini | 1 +
doc/guides/cryptodevs/features/cn9k.ini | 1 +
drivers/crypto
From: Tejasree Kondoj
Add support for digest support for various algorithms.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/features/cn10k.ini | 17 ++
doc/guides/cryptodevs/features
From: Ankur Dwivedi
Add symmetric crypto capabilities for cn9k & cn10k.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/cnxk.rst| 46 ++
doc/guides/rel_n
From: Tejasree Kondoj
Enable tests for cn9k & cn10k crypto PMDs.
Signed-off-by: Ankur Dwivedi
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Tejasree Kondoj
---
app/test/meson.build | 2 ++
app/test/test_cryptodev.c | 14 ++
app/
tions).
Depends-on: series-17482 ("Add CPT in Marvell CNXK common driver")
Depends-on: series-17483 ("Add Marvell CNXK crypto PMDs")
Changes in v2:
- Rearranged capability additions & feature flag updates as suggested by Akhil
- Rebased on v2 of dependant series
Anoob J
From: Srujana Challa
Add security ctx in cn10k crypto PMD.
Signed-off-by: Anoob Joseph
Signed-off-by: Srujana Challa
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn10k_cryptodev.c| 9 ++
drivers/crypto/cnxk/cnxk_cryptodev_sec.c | 47
From: Tejasree Kondoj
Add security session ops in cn10k crypto PMD.
Signed-off-by: Anoob Joseph
Signed-off-by: Archana Muniganti
Signed-off-by: Srujana Challa
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn10k_cryptodev.c | 2 +
drivers/crypto/cnxk/cn10k_ipsec.c | 275
1 - 100 of 1935 matches
Mail list logo