Feature flag in dev would be updated during config. On reconfigure, the
field need to be set again to original value.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev.c| 14 +-
drivers/crypto/cnxk/cn9k_cryptodev.c | 13 +
drivers/crypto/cnxk
Hi Ali, David,
Thanks for pointing it out. The suggestion from David should do. Should we
submit a patch with fix on master? How do you suggest we proceed?
Thanks,
Anoob
> -Original Message-
> From: dev On Behalf Of David Marchand
> Sent: Friday, July 9, 2021 1:46 AM
> To: Ali Alnubani
-off-by: Anoob Joseph
---
config/arm/arm64_octeontx2_linux_gcc | 1 +
drivers/crypto/cnxk/cn9k_cryptodev.c | 2 ++
2 files changed, 3 insertions(+)
diff --git a/config/arm/arm64_octeontx2_linux_gcc
b/config/arm/arm64_octeontx2_linux_gcc
index 9156ee5..8fbdd38 100644
--- a/config/arm
rchand
> Sent: Friday, July 9, 2021 12:13 PM
> To: Anoob Joseph
> Cc: Ali Alnubani ; Akhil Goyal
> ; NBU-Contact-Thomas Monjalon
> ; dev@dpdk.org; Tejasree Kondoj
>
> Subject: Re: [EXT] Re: [dpdk-dev] [pull-request] next-crypto 21.08 rc1
>
> On Fri, Jul 9, 2021 at 6:25 A
The member 'dir' should not overlap with 'ip'. Usage of union for all
members would mean dir would get corrupt.
Fixes: e91b4f45ff54 ("net/octeontx2: support anti-replay for security session")
Cc: adwiv...@marvell.com
Signed-off-by: Anoob Joseph
---
drivers/crypto/
Add locking for IPsec table updates.
Fixed error handling to clear SA entry if the SA
population functions encounters any error.
Signed-off-by: Anoob Joseph
---
drivers/net/octeontx2/otx2_ethdev.h | 2 +
drivers/net/octeontx2/otx2_ethdev_sec.c | 83 +
2
SA table entry would be reserved for inline inbound operations. Clear
valid bit of the SA so that CPT would treat SA entry as invalid. Also,
move setting of valid bit to the end in case of session_create() to
eliminate possibility of hardware seeing partial data.
Signed-off-by: Anoob Joseph
Reduce session private data size by allocating auth_key dynamically as
required. Added auth_key_iova to eliminate any impact on fastpath.
Signed-off-by: Anoob Joseph
---
drivers/common/cpt/cpt_mcode_defines.h | 3 ++-
drivers/common/cpt/cpt_ucode.h | 10
Reduce session private data size by allocating auth_key dynamically as
required.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_se.c | 6 +-
drivers/common/cnxk/roc_se.h | 2 +-
drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 11 +++
drivers/crypto/cnxk
renegotiation.
For cryptodevs which can track expiries, this operation can be offloaded.
This patchset introduces ABI breakages and is intended for 21.11 release
Anoob Joseph (2):
lib/security: add IV generation
lib/security: add SA lifetime configuration
examples/ipsec-secgw/ipsec.c | 2
Enable application to offload IV generation to PMD. In case of lookaside
protocol offload, IV would be provided by application in rte_crypto_op.
Allow offloading the same to PMD with such support.
Signed-off-by: Anoob Joseph
---
lib/security/rte_security.h | 14 ++
1 file changed
not be IPsec processed and
would result in error.
Signed-off-by: Anoob Joseph
---
examples/ipsec-secgw/ipsec.c | 2 +-
examples/ipsec-secgw/ipsec.h | 2 +-
lib/cryptodev/rte_crypto.h | 7 +++
lib/security/rte_security.h | 28 ++--
4 files changed, 35 insertions
4e9850171
[2] https://doc.dpdk.org/api/rte__crypto_8h_source.html
Thanks,
Anoob
> -Original Message-
> From: Anoob Joseph
> Sent: Tuesday, July 20, 2021 11:16 AM
> To: Akhil Goyal ; Declan Doherty
> ; Fan Zhang ;
> Konstantin Ananyev
> Cc: Anoob Joseph ; Jerin Jacob Ko
For soft expiry, warning would work fine.
Thanks,
Anoob
> -Original Message-
> From: Akhil Goyal
> Sent: Wednesday, July 28, 2021 6:29 PM
> To: Ananyev, Konstantin ; Anoob Joseph
> ; Doherty, Declan ;
> Zhang, Roy Fan ; hemant.agra...@nxp.com
> Cc: Jerin Jacob K
g PMDs
1. crypto_octeontx2
2. crypto_cn10k
Anoob Joseph (2):
test/crypto: add lookaside IPsec tests
test/crypto: add combined mode tests
Tejasree Kondoj (1):
test/crypto: add lookaside IPsec ICV corrupt test case
app/test/meson.build | 1 +
app/tes
Added test case for lookaside IPsec. Following tests are added,
1. Inbound known vector [AES-GCM 128, 192 & 256]
2. Outbound known vector [AES-GCM 128, 192 & 256]
Signed-off-by: Anoob Joseph
Signed-off-by: Tejasree Kondoj
---
app/test/meson.build |
Add framework to test IPsec features with all supported
combinations of ciphers.
Signed-off-by: Anoob Joseph
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c| 74 +++--
app/test/test_cryptodev_security_ipsec.c | 107
From: Tejasree Kondoj
Adding lookaside IPsec ICV corrupt test case.
Signed-off-by: Anoob Joseph
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c| 16
app/test/test_cryptodev_security_ipsec.c | 30 --
app/test
Hi Konstantin,
> Subject: [EXT] RE: [PATCH 2/2] lib/security: add SA lifetime configuration
>
> External Email
>
> --
> Hi Anoob,
>
> > Now that we have an agreement on bitfields (hoping no one else has an
> > objection), I wou
dev@dpdk.org
> Cc: Anoob Joseph ; radu.nico...@intel.com;
> declan.dohe...@intel.com; abhijits.si...@intel.com;
> daniel.m.buck...@intel.com; Archana Muniganti ;
> Tejasree Kondoj ; hemant.agra...@nxp.com;
> ma...@nvidia.com; konstantin.anan...@intel.com; Akhil Goyal
>
> Subject
One reserved byte in rte_crypto_op struct would be used to indicate
warnings and other information from the crypto/security operation. This
field will be used to communicate events such as soft expiry with IPsec
in lookaside mode.
Signed-off-by: Anoob Joseph
---
doc/guides/rel_notes
h a new structure to cover all lifetime cases with
support for specifying both soft and hard lifetimes.
ESN control introduced by:
http://patches.dpdk.org/project/dpdk/patch/20210713133542.3550525-4-radu.nico...@intel.com/
Signed-off-by: Anoob Joseph
---
doc/guides/rel_notes/deprecation.rst | 5 +
Hi Konstantin,
> Subject: [EXT] RE: [PATCH 2/2] lib/security: add SA lifetime configuration
>
> Hi Anoob,
>
> > > > Now that we have an agreement on bitfields (hoping no one else has
> > > > an objection), I would like to discuss one more topic. It is more
> > > > related to
> > > checksum offlo
; >``rte_security_get_userdata`` will be made inline functions and
> > > additional
> > >flags will be added in structure ``rte_security_ctx`` in DPDK 21.11.
> > > +
> > > +* security: Hide stucture ``rte_security_session`` and expose an opaque
> > > + pointer for the private data to the application which can be attached
> > > + to the packet while enqueuing.
> > > --
> >
> > Acked-by: Konstantin Ananyev
> Acked-by: Ajit Khaparde
Acked-by: Anoob Joseph
exposed
> + directly to application which can be attached to the ``rte_crypto_op``.
> +
> * security: The functions ``rte_security_set_pkt_metadata`` and
>``rte_security_get_userdata`` will be made inline functions and additional
>flags will be added in structure ``rte_security_ctx`` in DPDK 21.11.
> --
Acked-by: Anoob Joseph
structure that will hold the
> + source and destination port for UDP encapsulation, mss to specify the
> + IPsec payload Maximum Segment Size, esn structure for Extended
> Sequence Number.
> --
Acked-by: Anoob Joseph
Added test case for lookaside IPsec. Inbound known vector
tests are added.
Cipher list: AES-GCM 128, 192 & 256
Signed-off-by: Anoob Joseph
Signed-off-by: Tejasree Kondoj
---
app/test/meson.build | 1 +
app/test/test.h|
protocol would require IV
generated by PMD. The tests would be introduced with spec change to allow user
to specify IV.
- Added IV generation tests
- Minor fixes in combined mode tests to handle multiple packets
Anoob Joseph (2):
test/crypto: add lookaside IPsec tests
test/crypto: add combi
Add framework to test IPsec features with all supported
combinations of ciphers.
Signed-off-by: Anoob Joseph
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c| 73 +++--
app/test/test_cryptodev_security_ipsec.c | 107
From: Tejasree Kondoj
Adding lookaside IPsec ICV corrupt test case.
Signed-off-by: Anoob Joseph
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c| 16
app/test/test_cryptodev_security_ipsec.c | 30 --
app/test
From: Tejasree Kondoj
Add test cases to verify IV generated by PMD.
Signed-off-by: Anoob Joseph
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c| 19
app/test/test_cryptodev_security_ipsec.c | 52
app/test
Hi Pablo,
Thanks for the review. Please see inline.
Thanks,
Anoob
> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Wednesday, November 10, 2021 4:54 PM
> To: Anoob Joseph ; Akhil Goyal
> ; Doherty, Declan ;
> Zhang, Roy Fan
> Cc: Jerin Jacob Kollanukkara
-by: Anoob Joseph
---
Changes in v2:
- Made the skip applicable for in place also (comment from Pablo)
- Re-organized code as suggested by Pablo
- Made same change in test_mixed_auth_cipher_sgl (comment from Pablo)
app/test/test_cryptodev.c | 63 ++-
1 file c
st: add cryptodev unit and performance tests")
> Cc: declan.dohe...@intel.com
> Cc: sta...@dpdk.org
>
> Signed-off-by: Ciara Power
Acked-by: Anoob Joseph
Fix kasumi input len calculation to consider encr_offset.
Fixes: 546dff20a034 ("crypto/cnxk: add KASUMI decryption")
Cc: ktejas...@marvell.com
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cnxk_se.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/c
Fix kasumi input len calculation to consider encr_offset.
Fixes: da39e3eccd3d ("common/cpt: support KASUMI")
Cc: ssriniva...@caviumnetworks.com
Signed-off-by: Anoob Joseph
---
drivers/common/cpt/cpt_ucode.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/
Hi Gagandeep,
There is an option(dec_ttl) in 'struct rte_security_ipsec_sa_options' to
control this. Wouldn't that work?
http://code.dpdk.org/dpdk/latest/source/lib/security/rte_security.h#L166
Thanks,
Anoob
From: Gagandeep Singh
Sent: Thursday, November 18, 2021 9:41 AM
To: Akhil Goyal ; de
@marvell.com
> Cc: sta...@dpdk.org
>
> Signed-off-by: Nithin Dabilpuram
Acked-by: Anoob Joseph
.
* Tunnel mode tests
* IPv6 in IPv6
* IPv4 in IPv4
* IPv4 in IPv6
* IPv6 in IPv4
* IPv4 transport mode tests.
* Security stats tests.
* AES-CTR tests.
* set/copy DF tests.
Ankur Dwivedi (1):
test/crypto: add security stats cases
Anoob Joseph (5):
test/crypto: add IPsec aes-cbc known
Extend the framework to support chained operations and add
AES-CBC 128 known vector tests.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c | 62 ++--
app/test/test_cryptodev_security_ipsec.c | 51 ++
app/test
From: Tejasree Kondoj
Adding lookaside IPsec AES-CBC-HMAC-SHA256 test cases.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 12 ++-
app/test/test_cryptodev_security_ipsec.h | 3 +
.../test_cryptodev_security_ipsec_test_vectors.h | 109 +++
Extend lookaside IPsec combined mode cases to cover chained operations
also.
Currently covering combinations of,
Ciphers,
1. AES-128-CBC
Auth,
1. NULL
2. SHA2-256 [16B ICV]
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c| 11 +++--
app/test
From: Tejasree Kondoj
Add IPv6 known vector and combined mode tests.
Following modes are added:
Tunnel IPv6 in IPv6
Tunnel IPv4 in IPv4
Tunnel IPv4 in IPv6
Tunnel IPv6 in IPv4
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 102 ++-
app/test/tes
From: Tejasree Kondoj
Add lookaside IPsec HMAC-SHA384/512 known vectors.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 20 ++
app/test/test_cryptodev_security_ipsec.h | 14 +-
.../test_cryptodev_security_ipsec_test_vectors.h | 213 +++
From: Tejasree Kondoj
Add fragmented plain packet known vector test case in
IPsec outbound.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 22 +
app/test/test_cryptodev_security_ipsec.c | 10 ++
app/test/test_cryptodev_security_ipsec.h
Add transport mode tests with test cases for IPv4 packets.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c| 39 ++
app/test/test_cryptodev_security_ipsec.c | 71 +---
app/test/test_cryptodev_security_ipsec.h | 1 +
3 files
From: Ankur Dwivedi
Adds security stats test cases in IPSEC protocol testsuite.
Signed-off-by: Ankur Dwivedi
---
app/test/test_cryptodev.c| 21 +
app/test/test_cryptodev_security_ipsec.c | 29 +
app/test/test_cryptodev_security_ip
From: Tejasree Kondoj
Add known vectors for AES-CTR in lookaside IPsec mode.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev_security_ipsec.h | 15 +++
1 file changed, 15 insertions(+)
diff --git a/app/test/test_cryptodev_security_ipsec.h
b/app/test/test_cryptodev_secu
From: Tejasree Kondoj
Add fragmented plain packet test case in combined mode.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c| 16
app/test/test_cryptodev_security_ipsec.c | 7 +++
2 files changed, 23 insertions(+)
diff --git a/app/test/test_
From: Tejasree Kondoj
Skipping NULL auth in ICV corruption test case.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 5 +
1 file changed, 5 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 744eb9f..0f7885c 100644
--- a/app/test/test_cr
Add known vector test cases for NULL cipher + AES-XCBC. Also add both
algos to the combined mode list of algos.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c | 38 +++--
app/test/test_cryptodev_security_ipsec.c | 2 +
app/test
Add test cases to verify copy DF and set DF options with lookaside IPsec
offload.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c| 75
app/test/test_cryptodev_security_ipsec.c | 71 --
app/test
failure with last patch
Ankur Dwivedi (1):
test/crypto: add security stats cases
Anoob Joseph (5):
test/crypto: add IPsec aes-cbc known vectors
test/crypto: add chained operations in combined cases
test/crypto: add transport mode cases
test/crypto: add aes xcbc known vectors
test/crypto
Extend the framework to support chained operations and add
AES-CBC 128 known vector tests.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c | 62 ++--
app/test/test_cryptodev_security_ipsec.c | 51 ++
app/test
From: Tejasree Kondoj
Adding lookaside IPsec AES-CBC-HMAC-SHA256 test cases.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 12 ++-
app/test/test_cryptodev_security_ipsec.h | 3 +
.../test_cryptodev_security_ipsec_test_vectors.h | 109 +++
Extend lookaside IPsec combined mode cases to cover chained operations
also.
Currently covering combinations of,
Ciphers,
1. AES-128-CBC
Auth,
1. NULL
2. SHA2-256 [16B ICV]
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c| 11 +++--
app/test
From: Tejasree Kondoj
Add IPv6 known vector and combined mode tests.
Following modes are added:
Tunnel IPv6 in IPv6
Tunnel IPv4 in IPv4
Tunnel IPv4 in IPv6
Tunnel IPv6 in IPv4
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 102 ++-
app/test/tes
From: Tejasree Kondoj
Add lookaside IPsec HMAC-SHA384/512 known vectors.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 20 ++
app/test/test_cryptodev_security_ipsec.h | 14 +-
.../test_cryptodev_security_ipsec_test_vectors.h | 213 +++
From: Tejasree Kondoj
Add fragmented plain packet known vector test case in
IPsec outbound.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 22 +
app/test/test_cryptodev_security_ipsec.c | 10 ++
app/test/test_cryptodev_security_ipsec.h
Add transport mode tests with test cases for IPv4 packets.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c| 39 ++
app/test/test_cryptodev_security_ipsec.c | 71 +---
app/test/test_cryptodev_security_ipsec.h | 1 +
doc
From: Ankur Dwivedi
Adds security stats test cases in IPSEC protocol testsuite.
Signed-off-by: Ankur Dwivedi
---
app/test/test_cryptodev.c| 21 +
app/test/test_cryptodev_security_ipsec.c | 29 +
app/test/test_cryptodev_security_ip
From: Tejasree Kondoj
Add known vectors for AES-CTR in lookaside IPsec mode.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev_security_ipsec.h | 15 +++
doc/guides/rel_notes/release_22_03.rst | 1 +
2 files changed, 16 insertions(+)
diff --git a/app/test/test_cryptode
From: Tejasree Kondoj
Add fragmented plain packet test case in combined mode.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c| 16
app/test/test_cryptodev_security_ipsec.c | 7 +++
2 files changed, 23 insertions(+)
diff --git a/app/test/test_
From: Tejasree Kondoj
Skipping NULL auth in ICV corruption test case.
Signed-off-by: Tejasree Kondoj
---
app/test/test_cryptodev.c | 5 +
1 file changed, 5 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 9a8cced..0ab4ca7 100644
--- a/app/test/test_cr
Add known vector test cases for NULL cipher + AES-XCBC. Also add both
algos to the combined mode list of algos.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c | 38 +++--
app/test/test_cryptodev_security_ipsec.c | 2 +
app/test
Add test cases to verify copy DF and set DF options with lookaside IPsec
offload.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c| 75
app/test/test_cryptodev_security_ipsec.c | 71 --
app/test
MISC CPT instruction behaves differently based on minor opcode.
Define the missing minor opcodes for MISC major opcode.
Signed-off-by: Aakash Sasidharan
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_se.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/drivers
Add support for AES-XCBC key derivation.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/meson.build | 1 +
drivers/common/cnxk/roc_aes.c | 208
drivers/common/cnxk/roc_aes.h | 14 +++
drivers/common/cnxk/roc_api.h | 3 +
drivers/common
From: Tejasree Kondoj
Adding AES-CBC-HMAC-SHA256 support to lookaside IPsec PMD.
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/cnxk.rst| 39 +++
doc/guides/rel_notes/release_22_03.rst| 4 +++
drivers/common/cnxk/cnxk_security.c
Clear session data before populating fields to not have garbage data.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_ipsec.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/crypto/cnxk/cn10k_ipsec.c
b/drivers/crypto/cnxk/cn10k_ipsec.c
index 93eab1b..1bd127e 100644
Update the macro to include newly added ciphers. Updated the functions
populating caps to throw error when max is exceeded.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cnxk_cryptodev.h | 2 +-
drivers/crypto/cnxk/cnxk_cryptodev_capabilities.c | 8 ++--
2 files changed
From: Tejasree Kondoj
Adding support to write CPT CTX through microcode op(SET_CTX) for
cn10k lookaside PMD.
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn10k_ipsec.c | 121 --
1 file changed, 89 insertions(+), 32 deletions(-)
diff --git a/driver
From: Tejasree Kondoj
Adding HMAC-SHA384/512 support to cnxk lookaside IPsec.
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/cnxk.rst| 4 ++
doc/guides/rel_notes/release_22_03.rst| 2 +
drivers/common/cnxk/cnxk_security.c | 36 +
to differentiate s/w immutable and s/w
mutable portions.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 4 +--
drivers/crypto/cnxk/cn10k_ipsec.c | 60 ---
drivers/crypto/cnxk/cn10k_ipsec.h | 25 -
drivers/crypto
CTX writes only require the lengths are 8B aligned. Use the struct size
directly.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn10k_ipsec.c | 12
1 file changed, 4 insertions(+), 8 deletions(-)
diff --git a/drivers/crypto/cnxk/cn10k_ipsec.c
b/drivers/crypto/cnxk
From: Ankur Dwivedi
Adds the security session stats get op for cn10k.
Signed-off-by: Ankur Dwivedi
---
drivers/crypto/cnxk/cn10k_ipsec.c | 55 +++
drivers/crypto/cnxk/cnxk_cryptodev_capabilities.c | 1 +
drivers/crypto/cnxk/cnxk_cryptodev_sec.c |
Add skip for transport mode tests that are not supported. Also, updated the
transport mode path to configure IP version as v4.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn9k_ipsec.c | 53 +++-
1 file changed, 47 insertions(+), 6 deletions(-)
diff
New features and fixes to cnxk crypto PMDs
- Support for more algorithms in lookaside crypto & protocol
- Support for copy & set DF bit
- Support for CPT CTX update
- Support for security session stats in cn10k
Ankur Dwivedi (1):
crypto/cnxk: add security session stats get
Anoob Jo
From: Archana Muniganti
Added new structure with bit fields for params.
Signed-off-by: Archana Muniganti
---
drivers/common/cnxk/roc_ie_on.h | 30 +-
drivers/crypto/cnxk/cn9k_ipsec.c | 16 +---
2 files changed, 42 insertions(+), 4 deletions(-)
diff --
Copy DF/DSCP fields would get set based on ipsec_xform in the code
preceding this. Setting it again would cause the options to be reset.
Fixes: 78d03027f2cc ("common/cnxk: add IPsec common code")
Cc: scha...@marvell.com
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/cnxk_secu
Add input arg verification.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/hw/cpt.h | 2 ++
drivers/common/cnxk/roc_cpt.c | 4 +++-
2 files changed, 5 insertions(+), 1 deletion(-)
diff --git a/drivers/common/cnxk/hw/cpt.h b/drivers/common/cnxk/hw/cpt.h
index 919f842..ccc7af4 100644
--- a
From: Shijith Thotton
Only enable/disable queue pairs that are allocated during cryptodev
start/stop.
Fixes: 6a95dbc1a291 ("crypto/cnxk: add dev start and dev stop")
Signed-off-by: Shijith Thotton
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 13 +++--
1 file changed, 11 insertions(+
From: Tejasree Kondoj
Adding context reload in datapath for IV in debug mode.
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 7 ---
drivers/crypto/cnxk/cn10k_ipsec_la_ops.h | 10 --
2 files changed, 12 insertions(+), 5 deletions(-)
diff --git a/dr
Verification doesn't cover cases when NULL auth/cipher is provided as a
chain. Removed the separate function for verification and added a
replacement function which calls the appropriate downstream functions.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.c
Inflight count calculation is updated to cover wrap around cases where
head can become smaller than tail.
Reported-by: Kiran Kumar K
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/drivers/crypto
The memory would be updated by hardware. Use atomics to read the same..
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/hw/cpt.h | 2 ++
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 24
drivers/crypto/cnxk/cn9k_cryptodev_ops.c | 28
From: Tejasree Kondoj
Adding AES-CTR support to cnxk CPT in
lookaside IPsec mode.
Signed-off-by: Tejasree Kondoj
---
doc/guides/cryptodevs/cnxk.rst| 2 ++
doc/guides/rel_notes/release_22_03.rst| 1 +
drivers/common/cnxk/cnxk_security.c | 6 +
Print more info when command timeout happens. Print software and
hardware queue information.
Signed-off-by: Anoob Joseph
Signed-off-by: Tejasree Kondoj
---
drivers/common/cnxk/hw/cpt.h | 11
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 1 +
drivers/crypto/cnxk
arvell.com
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn9k_ipsec_la_ops.h | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/drivers/crypto/cnxk/cn9k_ipsec_la_ops.h
b/drivers/crypto/cnxk/cn9k_ipsec_la_ops.h
index 2dc8913..2b0261e 100644
--- a/drivers/c
Add support for AES XCBC and NULL cipher.
Signed-off-by: Anoob Joseph
---
doc/guides/cryptodevs/cnxk.rst| 4 +
doc/guides/rel_notes/release_22_03.rst| 2 +
drivers/common/cnxk/cnxk_security.c | 48
drivers/common/cnxk/roc_ie_on.h
Add support for copy and set DF bit.
Signed-off-by: Anoob Joseph
---
drivers/crypto/cnxk/cn9k_ipsec.c | 7 ++-
drivers/crypto/cnxk/cnxk_cryptodev_capabilities.c | 1 +
2 files changed, 7 insertions(+), 1 deletion(-)
diff --git a/drivers/crypto/cnxk/cn9k_ipsec.c b/drivers
Add support for AES CMAC auth algorithm.
Signed-off-by: Anoob Joseph
---
doc/guides/cryptodevs/cnxk.rst| 1 +
doc/guides/cryptodevs/features/cn10k.ini | 37 +++---
doc/guides/cryptodevs/features/cn9k.ini | 37 +++---
doc/guides/rel_notes
Hi Ciara,
+1 to the overall approach. Few comments inline.
Thanks,
Anoob
> -Original Message-
> From: Ciara Power
> Sent: Monday, December 13, 2021 8:34 PM
> To: dev@dpdk.org
> Cc: roy.fan.zh...@intel.com; Akhil Goyal ; Ciara
> Power ; Declan Doherty
> ; Ankur Dwi
t IV in cn9k
- Support for cn10k v1.19 microcode
Ankur Dwivedi (1):
crypto/cnxk: add security session stats get
Anoob Joseph (20):
common/cnxk: define minor opcodes for MISC opcode
common/cnxk: add aes-xcbc key derive
common/cnxk: fix reset of fields
common/cnxk: verify input args
common/
MISC CPT instruction behaves differently based on minor opcode.
Define the missing minor opcodes for MISC major opcode.
Signed-off-by: Aakash Sasidharan
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_se.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/drivers
Add support for AES-XCBC key derivation.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/meson.build | 1 +
drivers/common/cnxk/roc_aes.c | 208
drivers/common/cnxk/roc_aes.h | 14 +++
drivers/common/cnxk/roc_api.h | 3 +
drivers/common
From: Archana Muniganti
Added new structure with bit fields for params.
Signed-off-by: Archana Muniganti
---
drivers/common/cnxk/roc_ie_on.h | 30 +-
drivers/crypto/cnxk/cn9k_ipsec.c | 16 +---
2 files changed, 42 insertions(+), 4 deletions(-)
diff --g
Copy DF/DSCP fields would get set based on ipsec_xform in the code
preceding this. Setting it again would cause the options to be reset.
Fixes: 78d03027f2cc ("common/cnxk: add IPsec common code")
Cc: scha...@marvell.com
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/cnxk_secu
Add input arg verification.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/hw/cpt.h | 2 ++
drivers/common/cnxk/roc_cpt.c | 4 +++-
2 files changed, 5 insertions(+), 1 deletion(-)
diff --git a/drivers/common/cnxk/hw/cpt.h b/drivers/common/cnxk/hw/cpt.h
index 919f842..ccc7af4 100644
--- a
Update completion code to match v1.19 microcode release.
Signed-off-by: Anoob Joseph
---
drivers/common/cnxk/roc_ie_ot.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/common/cnxk/roc_ie_ot.h b/drivers/common/cnxk/roc_ie_ot.h
index 5b61902..923656f 100644
--- a
201 - 300 of 1921 matches
Mail list logo