[dpdk-dev] [v2] telemetry: fix json output buffer size

2021-09-21 Thread Gowrishankar Muthukrishnan
Fix json output buffer size for a single largest value. Fixes: 52af6ccb2b39 ("telemetry: add utility functions for creating JSON") v2: - split from series 18768 ("cnxk: enable telemetry endpoints"). Signed-off-by: Gowrishankar Muthukrishnan --- lib/telemetry/telemetry_j

[dpdk-dev] [v2] crypto/cnxk: add telemetry endpoints to cryptodev

2021-09-21 Thread Gowrishankar Muthukrishnan
Add telemetry endpoints to cryptodev. Signed-off-by: Gowrishankar Muthukrishnan --- Depends-on: series-19052 ("cnxk: enable telemetry endpoints for mempool and ethdev") Depends-on: patch-19054 ("telemetry: fix json output buffer size") v2: - split from series 18768 (&qu

Re: [dpdk-dev] [v2] telemetry: fix json output buffer size

2021-09-22 Thread Gowrishankar Muthukrishnan
ot it. Yeah, "len" is actual available space. I ll send next version based on this. Also, I propose if we can have platform defined upper limits (esp MAX_CMD_LEN, MAX_SINGLE_STRING_LEN etc) so that, we need not revisit lib/telemetry for platform needs (and I don't think one size fits all platform, may be excess too). Thoughts ? Thanks, Gowrishankar > > Thanks, > Ciara

[dpdk-dev] [v3] telemetry: fix json output buffer size

2021-09-22 Thread Gowrishankar Muthukrishnan
Fix json output buffer size for a single largest value. Also fix compile assertion for the size of output buffer. Fixes: 52af6ccb2b39 ("telemetry: add utility functions for creating JSON") Signed-off-by: Gowrishankar Muthukrishnan --- v3: - use "len" param as buffer size.

[dpdk-dev] [v4] telemetry: fix json output buffer size

2021-09-22 Thread Gowrishankar Muthukrishnan
Fix json output buffer size for a single largest value. Fixes: 52af6ccb2b39 ("telemetry: add utility functions for creating JSON") Signed-off-by: Gowrishankar Muthukrishnan --- v4: - corrected typo in commit message. v3: - use "len" param as buffer size. --- lib/teleme

[dpdk-dev] [v1, 0/3] common/cnxk: enable npa telemetry

2021-07-29 Thread Gowrishankar Muthukrishnan
This patch series enables telemetry in NPA LF of cnxk. Gowrishankar Muthukrishnan (3): telemetry: enable storing pointer value test/telemetry: add unit tests for pointer value common/cnxk: add telemetry endpoints to npa app/test/test_telemetry_data.c | 124 + app

[dpdk-dev] [v1, 1/3] telemetry: enable storing pointer value

2021-07-29 Thread Gowrishankar Muthukrishnan
At present, value of pointer variable or address can only be stored in u64 type which is slightly not human readable, hence this patch is. It adds telemetry support to store pointer value, which is stringified. Signed-off-by: Gowrishankar Muthukrishnan --- lib/telemetry/rte_telemetry.h | 37

[dpdk-dev] [v1, 2/3] test/telemetry: add unit tests for pointer value

2021-07-29 Thread Gowrishankar Muthukrishnan
Adding tests to evaluate pointer value in array and dict. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_telemetry_data.c | 124 + app/test/test_telemetry_json.c | 28 ++-- 2 files changed, 145 insertions(+), 7 deletions(-) diff --git a/app

[dpdk-dev] [v1, 3/3] common/cnxk: add telemetry endpoints to npa

2021-07-29 Thread Gowrishankar Muthukrishnan
Add telemetry endpoints to npa. Signed-off-by: Gowrishankar Muthukrishnan --- drivers/common/cnxk/cnxk_telemetry.h | 23 +++ drivers/common/cnxk/cnxk_telemetry_npa.c | 227 +++ drivers/common/cnxk/meson.build | 4 + drivers/common/cnxk/roc_platform.h

Re: [dpdk-dev] [EXT] Re: [v1, 1/3] telemetry: enable storing pointer value

2021-07-30 Thread Gowrishankar Muthukrishnan
though it is up to user to choose. 3. Also while debugging telemetry date using script like usertools/dpdk-telemetry.py, perceiving address as hex is quicker than same as u64. Answering on returned data, user needs to convert stringified hex to pointer value. Regards, Gowrishankar

[dpdk-dev] [v2, 0/3] common/cnxk: enable npa telemetry

2021-08-01 Thread Gowrishankar Muthukrishnan
This patch series enables telemetry in NPA LF of cnxk. v2: * using uintptr_t to encode pointer value in json. *** BLURB HERE *** Gowrishankar Muthukrishnan (3): telemetry: enable storing pointer value test/telemetry: add unit tests for pointer value common/cnxk: add telemetry endpoints

[dpdk-dev] [v2, 1/3] telemetry: enable storing pointer value

2021-08-01 Thread Gowrishankar Muthukrishnan
available at JSON clients, hex value of address can be encoded instead of uintptr_t. Signed-off-by: Gowrishankar Muthukrishnan --- lib/telemetry/rte_telemetry.h | 37 ++- lib/telemetry/telemetry.c | 21 -- lib/telemetry/telemetry_data.c | 40

[dpdk-dev] [v2, 2/3] test/telemetry: add unit tests for pointer value

2021-08-01 Thread Gowrishankar Muthukrishnan
Adding tests to evaluate pointer value in array and dict. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_telemetry_data.c | 124 + app/test/test_telemetry_json.c | 28 ++-- 2 files changed, 145 insertions(+), 7 deletions(-) diff --git a/app

[dpdk-dev] [v2, 3/3] common/cnxk: add telemetry endpoints to npa

2021-08-01 Thread Gowrishankar Muthukrishnan
Add telemetry endpoints to npa. Signed-off-by: Gowrishankar Muthukrishnan --- drivers/common/cnxk/cnxk_telemetry.h | 26 +++ drivers/common/cnxk/cnxk_telemetry_npa.c | 227 +++ drivers/common/cnxk/meson.build | 4 + drivers/common/cnxk/roc_platform.h

Re: [dpdk-dev] [EXT] Re: [v1, 1/3] telemetry: enable storing pointer value

2021-08-01 Thread Gowrishankar Muthukrishnan
> -Original Message- > From: Gowrishankar Muthukrishnan > Sent: Friday, July 30, 2021 5:38 PM > To: Bruce Richardson > Cc: dev@dpdk.org; ciara.po...@intel.com; Jerin Jacob Kollanukkaran > ; Kiran Kumar Kokkilagadda ; > Nithin Kumar Dabilpuram ; Sunil Kumar Kori &g

[dpdk-dev] [v3, 0/3] common/cnxk: enable npa telemetry

2021-08-03 Thread Gowrishankar Muthukrishnan
This patch series enables telemetry in NPA LF of cnxk. v3: - fixed format specifier for uintptr_t Gowrishankar Muthukrishnan (3): telemetry: enable storing pointer value test/telemetry: add unit tests for pointer value common/cnxk: add telemetry endpoints to npa app/test

[dpdk-dev] [v3, 1/3] telemetry: enable storing pointer value

2021-08-03 Thread Gowrishankar Muthukrishnan
available at JSON clients, hex value of address can be encoded instead of uintptr_t. Signed-off-by: Gowrishankar Muthukrishnan --- lib/telemetry/rte_telemetry.h | 37 ++- lib/telemetry/telemetry.c | 21 -- lib/telemetry/telemetry_data.c | 40

[dpdk-dev] [v3, 2/3] test/telemetry: add unit tests for pointer value

2021-08-03 Thread Gowrishankar Muthukrishnan
Adding tests to evaluate pointer value in array and dict. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_telemetry_data.c | 125 + app/test/test_telemetry_json.c | 29 ++-- 2 files changed, 147 insertions(+), 7 deletions(-) diff --git a/app

[dpdk-dev] [v3, 3/3] common/cnxk: add telemetry endpoints to npa

2021-08-03 Thread Gowrishankar Muthukrishnan
Add telemetry endpoints to npa. Signed-off-by: Gowrishankar Muthukrishnan --- drivers/common/cnxk/cnxk_telemetry.h | 26 +++ drivers/common/cnxk/cnxk_telemetry_npa.c | 227 +++ drivers/common/cnxk/meson.build | 4 + drivers/common/cnxk/roc_platform.h

Re: [dpdk-dev] [v3, 0/3] common/cnxk: enable npa telemetry

2021-08-11 Thread Gowrishankar Muthukrishnan
Hi Ciara, > -Original Message- > From: Power, Ciara > Sent: Wednesday, August 11, 2021 9:30 PM > To: Gowrishankar Muthukrishnan ; dev@dpdk.org > Cc: Richardson, Bruce ; Jerin Jacob Kollanukkaran > ; Kiran Kumar Kokkilagadda ; > Nithin Kumar Dabilpuram ; Sunil

[v2, 00/10] fips_validation application improvements

2023-02-28 Thread Gowrishankar Muthukrishnan
This patch series adds support for SHA3, SHAKE, AES-CCM JSON test vectors and fixes existing algorithms to support NIST test vectors. v2: - fixed type punning SHAKE test function. Gowrishankar Muthukrishnan (10): examples/fips_validation: fix MCT output for SHA examples/fips_validation: add

[v2, 01/10] examples/fips_validation: fix MCT output for SHA

2023-02-28 Thread Gowrishankar Muthukrishnan
MCT test for SHA need not print message string along with digest value. Fixes: d5c247145c2 ("examples/fips_validation: add parsing for SHA") Signed-off-by: Gowrishankar Muthukrishnan --- examples/fips_validation/fips_validation_sha.c | 8 ++-- examples/fips_validat

[v2, 02/10] examples/fips_validation: add SHA3 validation

2023-02-28 Thread Gowrishankar Muthukrishnan
Add support in fips_validation to parse SHA3 algorithms. Signed-off-by: Gowrishankar Muthukrishnan --- doc/guides/sample_app_ug/fips_validation.rst | 5 +- examples/fips_validation/fips_validation.h| 1 + .../fips_validation/fips_validation_hmac.c| 8 ++ .../fips_validation

[v2, 03/10] examples/fips_validation: fix integer parse in test case

2023-02-28 Thread Gowrishankar Muthukrishnan
Parsing integer value in test case vector does not store it because only string was expected. This patch adds handling for integer value as well. Fixes: 58cc98801eb ("examples/fips_validation: add JSON parsing") Signed-off-by: Gowrishankar Muthukrishnan --- examples/fips_

[v2, 04/10] examples/fips_validation: add SHAKE validation

2023-02-28 Thread Gowrishankar Muthukrishnan
Add support in fips_validation to parse SHAKE algorithms. Signed-off-by: Gowrishankar Muthukrishnan --- v2: - fixed type punning reported in CI. --- doc/guides/sample_app_ug/fips_validation.rst | 1 + examples/fips_validation/fips_validation.h| 4 +- .../fips_validation

[v2, 05/10] examples/fips_validation: add CCM JSON validation

2023-02-28 Thread Gowrishankar Muthukrishnan
Add support in fips_validation to parse CCM JSON vectors. Signed-off-by: Gowrishankar Muthukrishnan --- doc/guides/sample_app_ug/fips_validation.rst | 1 + examples/fips_validation/fips_validation.c| 2 + examples/fips_validation/fips_validation.h| 3 + .../fips_validation

[v2, 06/10] examples/fips_validation: add ECDSA keygen support

2023-02-28 Thread Gowrishankar Muthukrishnan
Add support to validate ECDSA keygen mode tests. Signed-off-by: Gowrishankar Muthukrishnan --- .../fips_validation/fips_validation_ecdsa.c | 52 +++ examples/fips_validation/main.c | 13 + 2 files changed, 65 insertions(+) diff --git a/examples

[v2, 07/10] examples/fips_validation: add SHA3 algorithms in ECDSA test

2023-02-28 Thread Gowrishankar Muthukrishnan
Add SHA3 algorithms in ECDSA as supported. Signed-off-by: Gowrishankar Muthukrishnan --- examples/fips_validation/fips_validation_ecdsa.c | 4 1 file changed, 4 insertions(+) diff --git a/examples/fips_validation/fips_validation_ecdsa.c b/examples/fips_validation/fips_validation_ecdsa.c

[v2, 08/10] examples/fips_validation: fix AES GCM validation tests

2023-02-28 Thread Gowrishankar Muthukrishnan
AES GCM validation tests fail in FIPS validation due to incorrect fields populated in response file. This patch fixes them. Fixes: 5b540bebac8e ("examples/fips_validation: fix GMAC decryption output") Signed-off-by: Gowrishankar Muthukrishnan --- examples/fips_validation/fips_valida

[v2, 09/10] examples/fips_validation: fix AES XTS to read seq number

2023-02-28 Thread Gowrishankar Muthukrishnan
Fix AES XTS test to read sequence number correctly. Fixes: f8e431ed8f6 ("examples/fips_validation: add parsing for AES-XTS") Signed-off-by: Gowrishankar Muthukrishnan --- examples/fips_validation/fips_validation_xts.c | 13 + 1 file changed, 9 insertions(+), 4 deletion

[v2, 10/10] examples/fips_validation: add extra space in JSON buffer

2023-02-28 Thread Gowrishankar Muthukrishnan
JSON buffer size") Signed-off-by: Gowrishankar Muthukrishnan --- examples/fips_validation/fips_validation.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/examples/fips_validation/fips_validation.h b/examples/fips_validation/fips_validation.h index c4988053c1..abc1d64

RE: [v1, 00/10] fips_validation application improvements

2023-02-28 Thread Gowrishankar Muthukrishnan
I have fixed it in v2 and CI passed. http://mails.dpdk.org/archives/test-report/2023-February/360464.html Thanks, Gowrishankar > -Original Message- > From: Akhil Goyal > Sent: Tuesday, February 28, 2023 1:09 PM > To: Akhil Goyal ; Dooley, Brian > ; Gowrishankar Muthuk

[v1, 0/3] SM2 crypto algorithm support

2023-04-28 Thread Gowrishankar Muthukrishnan
This patch series adds SM2 crypto algorithm support, along with tests verified using Openssl. Gowrishankar Muthukrishnan (3): cryptodev: add SM2 asymmetric crypto algorithm test/test_cryptodev_asym: add SM2 tests crypto/openssl: add SM2 asymmetric crypto support app/test

[v1, 1/3] cryptodev: add SM2 asymmetric crypto algorithm

2023-04-28 Thread Gowrishankar Muthukrishnan
ShangMi 2 (SM2) is a encryption and digital signatture algorithm used in the Chinese National Standard. Signed-off-by: Gowrishankar Muthukrishnan --- doc/guides/cryptodevs/features/default.ini | 1 + doc/guides/rel_notes/release_23_07.rst | 3 + lib/cryptodev/rte_crypto_asym.h

[v1, 2/3] test/test_cryptodev_asym: add SM2 tests

2023-04-28 Thread Gowrishankar Muthukrishnan
Add SM2 tests. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 506 + app/test/test_cryptodev_sm2_test_vectors.h | 120 + 2 files changed, 626 insertions(+) create mode 100644 app/test/test_cryptodev_sm2_test_vectors.h diff

[v1, 3/3] crypto/openssl: add SM2 asymmetric crypto support

2023-04-28 Thread Gowrishankar Muthukrishnan
Add SM2 asymmetric algorithm support in openssl PMD. Signed-off-by: Gowrishankar Muthukrishnan --- doc/guides/cryptodevs/features/openssl.ini | 1 + doc/guides/cryptodevs/openssl.rst| 1 + doc/guides/rel_notes/release_23_07.rst | 4 + drivers/crypto/openssl

RE: [v1, 3/3] crypto/openssl: add SM2 asymmetric crypto support

2023-04-28 Thread Gowrishankar Muthukrishnan
++ Kai Ji Thanks, Gowrishankar

[PATCH] crypto/openssl: fix memory leak

2023-05-17 Thread Gowrishankar Muthukrishnan
Memory allocated through OPENSSL_malloc should be freed only through OPENSSL_free. Signed-off-by: Gowrishankar Muthukrishnan --- drivers/crypto/openssl/rte_openssl_pmd.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/crypto/openssl/rte_openssl_pmd.c b/drivers

[PATCH] lib/cryptodev: set minimal output buffer size for RSA op

2023-05-17 Thread Gowrishankar Muthukrishnan
Depending on RSA op, the output buffer size could be set minimal expected memory, rather than 0 as today. This will allow PMD to do any validation on the size, in case an application did not create enough memory or even in case of any memory fault. Signed-off-by: Gowrishankar Muthukrishnan

[PATCH] lib/cryptodev: move RSA padding information into xform

2023-05-17 Thread Gowrishankar Muthukrishnan
creation. Hence, moving this info from crypto op into xform structure. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 6 +-- app/test/test_cryptodev_rsa_test_vectors.h | 2 + drivers/common/cpt/cpt_ucode_asym.h | 4 +- drivers/crypto/cnxk

RE: [v1, 2/3] test/test_cryptodev_asym: add SM2 tests

2023-05-26 Thread Gowrishankar Muthukrishnan
c/html/draft-shen-sm2-ecdsa-02 > > > > Signed-off-by: Gowrishankar Muthukrishnan > > --- > > app/test/test_cryptodev_asym.c | 506 + > > app/test/test_cryptodev_sm2_test_vectors.h | 120 + > > 2 files changed, 62

[PATCH v2 0/3] SM2 crypto algorithm support

2023-05-26 Thread Gowrishankar Muthukrishnan
This patch series adds SM2 crypto algorithm support, along with tests verified using Openssl. v2: - addressed suggestions in v1. Gowrishankar Muthukrishnan (3): cryptodev: add SM2 asymmetric crypto algorithm test/crypto: add asymmetric SM2 test cases crypto/openssl: add SM2 asymmetric

[PATCH v2 1/3] cryptodev: add SM2 asymmetric crypto algorithm

2023-05-26 Thread Gowrishankar Muthukrishnan
ShangMi 2 (SM2) is a encryption and digital signature algorithm used in the Chinese National Standard. Added support for asymmetric SM2 in cryptodev along with prime field curve, as referenced in RFC: https://datatracker.ietf.org/doc/html/draft-shen-sm2-ecdsa-02 Signed-off-by: Gowrishankar

[PATCH v2 2/3] test/crypto: add asymmetric SM2 test cases

2023-05-26 Thread Gowrishankar Muthukrishnan
Added test cases and test vectors for asymmetric SM2 crypto verification. Cases are added for sign/verify/encrypt/decrypt. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 504 + app/test/test_cryptodev_sm2_test_vectors.h | 120

[PATCH v2 3/3] crypto/openssl: add SM2 asymmetric crypto support

2023-05-26 Thread Gowrishankar Muthukrishnan
Add SM2 asymmetric algorithm support in openssl PMD. Signed-off-by: Gowrishankar Muthukrishnan --- doc/guides/cryptodevs/features/openssl.ini | 1 + doc/guides/cryptodevs/openssl.rst| 1 + doc/guides/rel_notes/release_23_07.rst | 4 + drivers/crypto/openssl

RE: [PATCH v2 1/3] cryptodev: add SM2 asymmetric crypto algorithm

2023-05-29 Thread Gowrishankar Muthukrishnan
is N bytes) > > +* input : for signature verification > > +*/ > > + rte_crypto_uint s; > > + /**< s component of elliptic curve signature > > +* output : for signature generation (of at least N bytes > > +* where prime field length is N bytes) > > +* input : for signature verification > > +*/ > > +}; > > + > > /** > > * Asymmetric Cryptographic Operation. > > * > > @@ -665,6 +741,7 @@ struct rte_crypto_asym_op { > > struct rte_crypto_dsa_op_param dsa; > > struct rte_crypto_ecdsa_op_param ecdsa; > > struct rte_crypto_ecpm_op_param ecpm; > > + struct rte_crypto_sm2_op_param sm2; > > }; > > uint16_t flags; > > /**< > > diff --git a/lib/cryptodev/rte_cryptodev.c > > b/lib/cryptodev/rte_cryptodev.c index a96114b2da..21cabc3ffd 100644 > > --- a/lib/cryptodev/rte_cryptodev.c > > +++ b/lib/cryptodev/rte_cryptodev.c > > @@ -299,6 +299,7 @@ crypto_asym_xform_strings[] = { > > [RTE_CRYPTO_ASYM_XFORM_DSA] = "dsa", > > [RTE_CRYPTO_ASYM_XFORM_ECDSA] = "ecdsa", > > [RTE_CRYPTO_ASYM_XFORM_ECPM]= "ecpm", > > + [RTE_CRYPTO_ASYM_XFORM_SM2] = "sm2", > > }; > > > > /** > > -- > > 2.25.1 Thanks for the review, Gowrishankar

[PATCH v3 0/3] SM2 crypto algorithm support

2023-06-04 Thread Gowrishankar Muthukrishnan
This patch series adds SM2 crypto algorithm support, along with tests verified using Openssl. v3: - sm2 xform contains hash param and key pair info moved into op. Gowrishankar Muthukrishnan (3): cryptodev: add SM2 asymmetric crypto algorithm test/crypto: add asymmetric SM2 test cases

[PATCH v3 1/3] cryptodev: add SM2 asymmetric crypto algorithm

2023-06-04 Thread Gowrishankar Muthukrishnan
ShangMi 2 (SM2) is set of public-key cryptography algorithms based on elliptic curves. Added support for asymmetric SM2 in cryptodev along with prime field curve, as referenced in RFC: https://datatracker.ietf.org/doc/html/draft-shen-sm2-ecdsa-02 Signed-off-by: Gowrishankar Muthukrishnan

[PATCH v3 2/3] test/crypto: add asymmetric SM2 test cases

2023-06-04 Thread Gowrishankar Muthukrishnan
Added test cases for asymmetric SM2 crypto validation. Test cases are added for sign/verify/encrypt/decrypt. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 581 + app/test/test_cryptodev_sm2_test_vectors.h | 129 + 2 files

[PATCH v3 3/3] crypto/openssl: add SM2 asymmetric crypto support

2023-06-04 Thread Gowrishankar Muthukrishnan
Add SM2 asymmetric algorithm support in openssl PMD. Signed-off-by: Gowrishankar Muthukrishnan --- doc/guides/cryptodevs/features/openssl.ini | 1 + doc/guides/cryptodevs/openssl.rst| 1 + doc/guides/rel_notes/release_23_07.rst | 4 + drivers/crypto/openssl

RE: [PATCH v2 1/3] cryptodev: add SM2 asymmetric crypto algorithm

2023-06-04 Thread Gowrishankar Muthukrishnan
, but v3 is good to go for openSSL pmd. Thanks, Gowrishankar

RE: [PATCH v8 0/3] test/dma: add vchan reconfig and SG tests

2024-02-05 Thread Gowrishankar Muthukrishnan
Hi, Could this series be merged as the patches are acked. Thanks, Gowrishankar

RE: [PATCH v8 0/4] PCI Dev and SG copy support

2024-02-05 Thread Gowrishankar Muthukrishnan
Hi, Could this series be merged as the patches are acked. Thanks, Gowrishankar

RE: [EXT] Re: [PATCH v8 4/4] app/dma-perf: add SG copy support

2024-02-27 Thread Gowrishankar Muthukrishnan
I have named variables dma_src_sge and dma_dst_sge to fit context. Please check https://patches.dpdk.org/project/dpdk/patch/20240227160031.3931694-5-amitpraka...@marvell.com/ . Thanks, Gowrishankar

RE: [EXT] Re: [PATCH v10 3/4] app/dma-perf: validate copied memory

2024-02-28 Thread Gowrishankar Muthukrishnan
ransfer_dir == RTE_DMA_DIR_MEM_TO_MEM). Would you still need it in this patch only ?. Thanks, Gowrishankar > So pls restrict it only mem2mem, or drop this commit. > > Thanks

RE: [EXT] Re: [PATCH v10 4/4] app/dma-perf: add SG copy support

2024-02-29 Thread Gowrishankar Muthukrishnan
Hi Fengcheng, > -Original Message- > From: fengchengwen > Sent: Wednesday, February 28, 2024 3:02 PM > To: Amit Prakash Shukla ; Cheng Jiang > > Cc: dev@dpdk.org; Jerin Jacob ; Anoob Joseph > ; Kevin Laatz ; Bruce > Richardson ; Pavan Nikhilesh Bhagavatula > ;

[v11 0/4] PCI Dev and SG copy support

2024-02-29 Thread Gowrishankar Muthukrishnan
Improve dma-perf application to support PCI dev and SG copy, along with additional supports as below: - validate copied memory - skip tests if not opted. v11: - Review suggestions. Gowrishankar Muthukrishnan (4): app/dma-perf: add skip support app/dma-perf: add PCI device support app/dma

[v11 2/4] app/dma-perf: add PCI device support

2024-02-29 Thread Gowrishankar Muthukrishnan
Add support to test performance for "device to memory" and "memory to device" data transfer. Signed-off-by: Amit Prakash Shukla Acked-by: Anoob Joseph Acked-by: Chengwen Feng --- v11: - config file formatting. app/test-dma-perf/benchmark.c | 119 ++ app/test-d

[v11 1/4] app/dma-perf: add skip support

2024-02-29 Thread Gowrishankar Muthukrishnan
Add support to skip running a dma-perf test-case. Signed-off-by: Amit Prakash Shukla Acked-by: Anoob Joseph Acked-by: Chengwen Feng --- v11: - config file formatting app/test-dma-perf/config.ini | 2 ++ app/test-dma-perf/main.c | 48 ++-- app/test-dma-per

[v11 3/4] app/dma-perf: validate copied memory

2024-02-29 Thread Gowrishankar Muthukrishnan
Validate copied memory to ensure DMA copy did not fail. Signed-off-by: Gowrishankar Muthukrishnan Acked-by: Anoob Joseph Acked-by: Chengwen Feng --- app/test-dma-perf/benchmark.c | 23 ++- app/test-dma-perf/main.c | 16 +++- app/test-dma-perf/main.h

[v11 4/4] app/dma-perf: add SG copy support

2024-02-29 Thread Gowrishankar Muthukrishnan
Add SG copy support. Signed-off-by: Gowrishankar Muthukrishnan Acked-by: Anoob Joseph Acked-by: Chengwen Feng --- v11: - using struct for SGE config. app/test-dma-perf/benchmark.c | 283 ++ app/test-dma-perf/config.ini | 25 ++- app/test-dma-perf/main.c

RE: [EXTERNAL] Re: [EXT] Re: [PATCH v10 4/4] app/dma-perf: add SG copy support

2024-03-01 Thread Gowrishankar Muthukrishnan
rte_mbuf_data_iova(dsts[i]), buf_size, 0); > if (unlikely(ret < 0)) { > if (ret == -ENOSPC) { > do_dma_submit_and_poll(dev_id, > &async_cnt, worker_info); > goto dma_copy; > } else > error_exit(dev_id); > } > async_cnt++; > > if ((async_cnt % kick_batch) == 0) > do_dma_submit_and_poll(dev_id, > &async_cnt, worker_info); > } > > if (unlikely(work_info->verify)) { > ret = verify(); > if (ret != 0) { > // error trace, > break; > } > } > > if (worker_info->stop_flag) // if don't stop, it will do many > round copies. > break; > } > > and make this verify as a config entry I believe there is a difference in understanding of what this is intended to do. Intention here is not to validate every operation done by DMA, and that is already taken care by UT. Is it possible that we are we misreporting numbers if the application is buggy or PMD is misbehaving for the scenario under test and the copies are not actually performed? Yes. Think about a scenario where PMD is buggy when trying bursts of more than 1. Checking last set of buffers is more like testing a sample from the perf test to make sure perf test was indeed performing what it is claiming to do. If you think it is unnecessary to do so, we can drop this from upstream. But adding complete verification in performance app would be repeating what a unit test is expected to do. I would suggest not to do that. Thanks, Gowrishankar

RE: [EXT] [RFC PATCH] cryptodev: add sm2 key exchange and encryption for HW

2024-01-04 Thread Gowrishankar Muthukrishnan
t sounds better for an op. Also, this op capability check could be done once for the session. If you are also aligned, I can send an RFC for capab check. > + /* Similar applies to the key exchange in the HW. The second phase of > KE, most likely, > + * will go as far as to obtain xU,yU(xV,

[PATCH] examples/fips_validation: fix coverity issues

2024-06-15 Thread Gowrishankar Muthukrishnan
Fix NULL dereference, out-of-bound, bad bit shift issues reported by coverity scan. Coverity issue: 384440, 384435, 384433, 384429 Fixes: 36128a67c27 ("examples/fips_validation: add asymmetric validation") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan ---

[PATCH] crypto/cnxk: fix coverity issues

2024-06-15 Thread Gowrishankar Muthukrishnan
vate and public keys in EC session") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan --- drivers/common/cnxk/roc_ae.h | 16 +--- drivers/crypto/cnxk/cnxk_ae.h | 24 +++- 2 files changed, 28 insertions(+), 12 deletions(-) diff --git a/drivers/co

[PATCH] crypto/cnxk: fix ECDH pubkey verify

2024-06-15 Thread Gowrishankar Muthukrishnan
Fix dequeue operation for ECDH pubkey verify. Fixes: baae0994fa96 ("crypto/cnxk: support ECDH") Fixes: 5c9025583167 ("crypto/cnxk: fix CN9K ECDH public key verification") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan --- drivers/crypto/cnxk/cn10k_

[PATCH v1 0/6] app/crypto-perf: add asymmetric crypto tests

2024-06-15 Thread Gowrishankar Muthukrishnan
This patch series adds below asymmetric tests in crypto-perf tool: * MODEX group tests (RFC 3526) * SM2 tests * ECDSA P256R1 tests Akhil Goyal (1): app/crypto-perf: support SM2 Gowrishankar Muthukrishnan (5): app/crypto-perf: add modex groups test app/crypto-perf: remove redundant

[PATCH v1 1/6] app/crypto-perf: add modex groups test

2024-06-15 Thread Gowrishankar Muthukrishnan
Add perf tests for modex groups 5, 14, 15, 16, 17 and 18 based on RFC 3526. Signed-off-by: Gowrishankar Muthukrishnan --- app/test-crypto-perf/cperf_test_vectors.c | 570 +- app/test-crypto-perf/cperf_test_vectors.h | 4 +- 2 files changed, 571 insertions(+), 3 deletions

[PATCH v1 2/6] app/crypto-perf: remove redundant local varriable

2024-06-15 Thread Gowrishankar Muthukrishnan
Remove redundant local variable used for asym session. Fixes: a29bb248988 ("cryptodev: hide asymmetric session structure") Fixes: 2973dbf93b4 ("security: hide session structure") Signed-off-by: Gowrishankar Muthukrishnan --- app/test-crypto-perf/cperf_ops.c | 9 +++-

[PATCH v1 3/6] app/crypto-perf: fix result location for asymmetric test

2024-06-15 Thread Gowrishankar Muthukrishnan
For asymmetric op, private test data should be stored after rte_crypto_asym_op struct. Fixes: a538d1d2d01e ("test/crypto-perf: extend asymmetric crypto throughput test") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan --- app/test-crypto-perf/cperf_test_comm

[PATCH v1 4/6] app/crypto-perf: add function to check asymmetric operation

2024-06-15 Thread Gowrishankar Muthukrishnan
Replace checking input option for every asymmetric test case by a function. Signed-off-by: Gowrishankar Muthukrishnan --- app/test-crypto-perf/cperf_test_common.c | 12 +++- app/test-crypto-perf/cperf_test_common.h | 2 ++ app/test-crypto-perf/cperf_test_latency.c| 7

[PATCH v1 5/6] app/crypto-perf: support SM2

2024-06-15 Thread Gowrishankar Muthukrishnan
From: Akhil Goyal Added support for SM2 asymmetric crypto performance. A new command line option is added to specify asymmetric operation type `--asym-op Type`. Type can be sign/verify/encrypt/decrypt. Example command: ./dpdk-test-crypto-perf --vdev crypto_openssl -c 0x30 -- \ --devtype crypto_

[PATCH v1 6/6] app/crypto-perf: support ECDSA

2024-06-15 Thread Gowrishankar Muthukrishnan
Added support for ECDSA SECP256R1 curve SIGN and VERIFY operations. Signed-off-by: Gowrishankar Muthukrishnan --- app/test-crypto-perf/cperf_ops.c | 57 ++ app/test-crypto-perf/cperf_options.h | 2 + app/test-crypto-perf/cperf_options_parsing.c | 10 ++- app

[PATCH v1 0/4] test/crypto: enhance modex tests

2024-06-15 Thread Gowrishankar Muthukrishnan
This patch series enhances modex tests to: * use common test function in existing test vectors * add test for zero padded operands Gowrishankar Muthukrishnan (4): test/crypto: validate modex result from first nonzero value test/crypto: remove unused variable in modex test data test/crypto

[PATCH v1 1/4] test/crypto: validate modex result from first nonzero value

2024-06-15 Thread Gowrishankar Muthukrishnan
: 1ffefe00f1 ("test/crypto: add modexp and modinv functions") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 25 +++-- 1 file changed, 23 insertions(+), 2 deletions(-) diff --git a/app/test/test_cryptodev_asym.c

[PATCH v1 2/4] test/crypto: remove unused variable in modex test data

2024-06-15 Thread Gowrishankar Muthukrishnan
Remove unused result_len from modex test data. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_mod_test_vectors.h | 10 -- 1 file changed, 10 deletions(-) diff --git a/app/test/test_cryptodev_mod_test_vectors.h b/app/test/test_cryptodev_mod_test_vectors.h index

[PATCH v1 3/4] test/crypto: use common test function for mod tests

2024-06-15 Thread Gowrishankar Muthukrishnan
Use common test function for modex and modinv tests. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 238 ++--- app/test/test_cryptodev_asym_util.h| 18 -- app/test/test_cryptodev_mod_test_vectors.h | 206 ++ 3

[PATCH v1 4/4] test/crypto: add modex tests for zero padded operands

2024-06-15 Thread Gowrishankar Muthukrishnan
Add modex tests for zero padded operands, as in ASN encoding. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 16 + app/test/test_cryptodev_mod_test_vectors.h | 71 ++ 2 files changed, 87 insertions(+) diff --git a/app/test

[PATCH v2 0/4] test/crypto: enhance modex tests

2024-06-20 Thread Gowrishankar Muthukrishnan
This patch series enhances modex tests to: * use common test function in existing test vectors * add test for zero padded operands v2: - Retain old modex test functions to avoid doc updates. Gowrishankar Muthukrishnan (4): test/crypto: validate modex result from first nonzero value test

[PATCH v2 1/4] test/crypto: validate modex result from first nonzero value

2024-06-20 Thread Gowrishankar Muthukrishnan
: 1ffefe00f1 ("test/crypto: add modexp and modinv functions") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 25 +++-- 1 file changed, 23 insertions(+), 2 deletions(-) diff --git a/app/test/test_cryptodev_asym.c

[PATCH v2 2/4] test/crypto: remove unused variable in modex test data

2024-06-20 Thread Gowrishankar Muthukrishnan
Remove unused result_len from modex test data. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_mod_test_vectors.h | 10 -- 1 file changed, 10 deletions(-) diff --git a/app/test/test_cryptodev_mod_test_vectors.h b/app/test/test_cryptodev_mod_test_vectors.h index

[PATCH v2 3/4] test/crypto: use common test function for mod tests

2024-06-20 Thread Gowrishankar Muthukrishnan
Use common test function for modex and modinv tests. Signed-off-by: Gowrishankar Muthukrishnan --- v2: - Old functions not removed. --- app/test/test_cryptodev_asym.c | 21 +++- app/test/test_cryptodev_mod_test_vectors.h | 124 + 2 files changed, 140 insertions

[PATCH v2 4/4] test/crypto: add modex tests for zero padded operands

2024-06-20 Thread Gowrishankar Muthukrishnan
Add modex tests for zero padded operands, as in ASN encoding. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 16 + app/test/test_cryptodev_mod_test_vectors.h | 71 ++ 2 files changed, 87 insertions(+) diff --git a/app/test

[PATCH v2 0/6] app/crypto-perf: add asymmetric crypto tests

2024-06-26 Thread Gowrishankar Muthukrishnan
This patch series adds below asymmetric tests in crypto-perf tool: * MODEX group tests (RFC 3526) * SM2 tests * ECDSA P256R1 tests Akhil Goyal (1): app/crypto-perf: support SM2 Gowrishankar Muthukrishnan (5): app/crypto-perf: add modex groups test app/crypto-perf: remove redundant

[PATCH v2 1/6] app/crypto-perf: add modex groups test

2024-06-26 Thread Gowrishankar Muthukrishnan
Add perf tests for modex groups 5, 14, 15, 16, 17 and 18 based on RFC 3526. Signed-off-by: Gowrishankar Muthukrishnan --- app/test-crypto-perf/cperf_test_vectors.c | 570 +- app/test-crypto-perf/cperf_test_vectors.h | 4 +- 2 files changed, 571 insertions(+), 3 deletions

[PATCH v2 2/6] app/crypto-perf: remove redundant local varriable

2024-06-26 Thread Gowrishankar Muthukrishnan
Remove redundant local variable used for asym session. Fixes: a29bb248988 ("cryptodev: hide asymmetric session structure") Fixes: 2973dbf93b4 ("security: hide session structure") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan --- app/test-crypto-perf/cperf_op

[PATCH v2 3/6] app/crypto-perf: fix result location for asymmetric test

2024-06-26 Thread Gowrishankar Muthukrishnan
For asymmetric op, private test data should be stored after rte_crypto_asym_op struct. Fixes: a538d1d2d01e ("test/crypto-perf: extend asymmetric crypto throughput test") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan --- app/test-crypto-perf/cperf_test_comm

[PATCH v2 4/6] app/crypto-perf: add function to check asymmetric operation

2024-06-26 Thread Gowrishankar Muthukrishnan
Replace checking input option for every asymmetric test case by a function. Signed-off-by: Gowrishankar Muthukrishnan --- v2: - cperf_is_asym_test is fixed to check only modex in this patch. --- app/test-crypto-perf/cperf_test_common.c | 11 ++- app/test-crypto-perf

[PATCH v2 5/6] app/crypto-perf: support SM2

2024-06-26 Thread Gowrishankar Muthukrishnan
From: Akhil Goyal Added support for SM2 asymmetric crypto performance. A new command line option is added to specify asymmetric operation type `--asym-op Type`. Type can be sign/verify/encrypt/decrypt. Example command: ./dpdk-test-crypto-perf --vdev crypto_openssl -c 0x30 -- \ --devtype crypto_

[PATCH v2 6/6] app/crypto-perf: support ECDSA

2024-06-26 Thread Gowrishankar Muthukrishnan
Added support for ECDSA SECP256R1 curve SIGN and VERIFY operations. Signed-off-by: Gowrishankar Muthukrishnan --- app/test-crypto-perf/cperf_ops.c | 57 ++ app/test-crypto-perf/cperf_options.h | 2 + app/test-crypto-perf/cperf_options_parsing.c | 10 ++- app

[PATCH v3 0/3] test/crypto: add modex test for zero padding

2024-06-26 Thread Gowrishankar Muthukrishnan
This patch series add modex test for zero padded operands v3: - removed patch to use common test function which will be addressed seperately due to document conflict. Gowrishankar Muthukrishnan (3): test/crypto: validate modex result from first nonzero value test/crypto: remove unused

[PATCH v3 1/3] test/crypto: validate modex result from first nonzero value

2024-06-26 Thread Gowrishankar Muthukrishnan
: 1ffefe00f1 ("test/crypto: add modexp and modinv functions") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 25 +++-- 1 file changed, 23 insertions(+), 2 deletions(-) diff --git a/app/test/test_cryptodev_asym.c

[PATCH v3 2/3] test/crypto: remove unused variable in modex test data

2024-06-26 Thread Gowrishankar Muthukrishnan
Remove unused result_len from modex test data. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_mod_test_vectors.h | 10 -- 1 file changed, 10 deletions(-) diff --git a/app/test/test_cryptodev_mod_test_vectors.h b/app/test/test_cryptodev_mod_test_vectors.h index

[PATCH v3 3/3] test/crypto: add modex tests for zero padded operands

2024-06-26 Thread Gowrishankar Muthukrishnan
Add modex tests for zero padded operands, as in ASN encoding. Signed-off-by: Gowrishankar Muthukrishnan --- app/test/test_cryptodev_asym.c | 16 + app/test/test_cryptodev_mod_test_vectors.h | 75 ++ 2 files changed, 91 insertions(+) diff --git a/app/test

[PATCH v1] crypto/cnxk: minimal normalization on input

2024-06-26 Thread Gowrishankar Muthukrishnan
Fix modex to nomalize input only when MSW is zero. Fixes: 5a3513caeb45 ("crypto/cnxk: add asymmetric session") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan --- drivers/crypto/cnxk/cnxk_ae.h | 30 +- 1 file changed, 21 insertions(+), 9

[PATCH v2] examples/fips_validation: fix coverity issues

2024-06-26 Thread Gowrishankar Muthukrishnan
Fix NULL dereference, out-of-bound, bad bit shift issues reported by coverity scan. Coverity issue: 384440, 384435, 384433, 384429 Fixes: 36128a67c27 ("examples/fips_validation: add asymmetric validation") Cc: sta...@dpdk.org Signed-off-by: Gowrishankar Muthukrishnan Acked-by: Br

[v1 0/6] cryptodev: support digest message in SM2

2023-08-10 Thread Gowrishankar Muthukrishnan
This patch series fixes SM2 algorithm implementation to support digest message as input along with plain message as today. Gowrishankar Muthukrishnan (6): crypto/openssl: include SM2 in asymmetric capabilities cryptodev: add RNG capability in EC based xform cryptodev: add hash support in

[v1 2/6] cryptodev: add RNG capability in EC based xform

2023-08-10 Thread Gowrishankar Muthukrishnan
Elliptic curve based asymmetric operations use cryptographically secure random number in its computation. If PMD supports RNG for such ops, the application could skip computing on its own. This patch adds new field in asymmetric capability to declare this capability. Signed-off-by: Gowrishankar

[v1 1/6] crypto/openssl: include SM2 in asymmetric capabilities

2023-08-10 Thread Gowrishankar Muthukrishnan
Include SM2 algorithm in the asymmetric capabilities supported by OpenSSL PMD. Fixes: 3b7d638fb11f ("crypto/openssl: support asymmetric SM2") Signed-off-by: Gowrishankar Muthukrishnan --- drivers/crypto/openssl/rte_openssl_pmd_ops.c | 14 ++ 1 file changed, 14 insertion

[v1 3/6] cryptodev: add hash support in asymmetric capability

2023-08-10 Thread Gowrishankar Muthukrishnan
Most of the asymmetric operations start with hash of the input. Add a new field in asymmetric capability to declare support for hash operations that PMD can support for the asymmetric operations. Application can skip computing hash if PMD already supports it. Signed-off-by: Gowrishankar

<    1   2   3   4   5   6   7   8   9   >