The Kernel Module entry for 2.0 devices was incorrect in the doc table.
Updated table with Kernel Module qat_4xxx.
Fixes: 83ce3b393176 ("doc: update QAT device support")
Signed-off-by: Brian Dooley
---
doc/guides/cryptodevs/qat.rst | 4 ++--
1 file changed, 2 insertions(+), 2
The Kernel Module entry for 2.0 devices was incorrect in the doc table.
Updated table with Kernel Module qat_4xxx.
Fixes: f4eac3a09c51 ("common/qat: enable GEN4 b devices")
Cc: arkadiuszx.kusz...@intel.com
Signed-off-by: Brian Dooley
---
v2:
Correct Fixes tag
---
doc/guides/cryptode
When parsing request files check for file type. This fix will remove
dependence on command line parameter for using libjansson
Fixes: 0f42f3d6034c ("examples/fips_validation: share callback with multiple
keys")
Cc: gmuthukri...@marvell.com
Signed-off-by: Brian Dooley
---
Add check for null hash algorithm digest size. Digest size should be 4B
or request will be rejected.
Fixes: 1703e94ac5ce ("qat: add driver for QuickAssist devices")
Cc: declan.dohe...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
drivers/crypto/qat/qat_sym_sess
Move the ossl_legacy_provider_unload() into the right place for secure
protocol for QAT. Remove unnecessary unload from session destroy.
Fixes: 52d59b92b06d ("crypto/qat: enable OpenSSL legacy provider in session")
Cc: kai...@intel.com
CC: sta...@dpdk.org
Signed-off-by: Brian Dooley
--
Move the ossl_legacy_provider_unload() into the right place for secure
protocol for QAT. Remove unnecessary unload from session destroy.
Fixes: 52d59b92b06d ("crypto/qat: enable OpenSSL legacy provider in session")
Cc: kai...@intel.com
CC: sta...@dpdk.org
Signed-off-by: Brian Dool
Replace rand() call in fips validation example with rte_rand().
Coverity issue: 381668
Fixes: e27268bd2103 ("examples/fips_validation: add parsing for AES-GMAC")
Signed-off-by: Brian Dooley
---
examples/fips_validation/main.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
This series adds the Digest Encrypted feature to the AESNI_MB PMD.
It also fixes an issue where IV data in SNOW3G and ZUC algorithms
were incorrect and are required to be non-zero length.
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
add comments and refactor
Brian
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
add comments and refactor
---
doc/guides/cryptodevs/features/aesni_mb.ini | 1
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++--
1 file changed, 6 insertions(+), 2 deletion
checkpatch warnings
Brian Dooley (2):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
app/test/test_cryptodev_mixed_test_vectors.h | 8 +-
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 107
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
Add comments and small refactor
v5:
Fix checkpatch warnings
---
doc/guides/cryptodevs
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++--
1 file changed, 6 insertions(+), 2 deletion
checkpatch warnings
v6:
Add skipping tests for synchronous crypto
Brian Dooley (2):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
app/test/test_cryptodev_mixed_test_vectors.h | 8 +-
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
drivers/crypto
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
Add comments and small refactor
v5:
Fix checkpatch warnings
v6:
Add skipping tests for
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++--
1 file changed, 6 insertions(+), 2 deletion
checkpatch warnings
v6:
Add skipping tests for synchronous crypto
v7:
Separate synchronous fix into separate commit
Brian Dooley (3):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
test/crypto: fix failing synchronous tests
app/test/test_cryptodev.c
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Acked-by: Ciara Power
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
Add comments and small refactor
v5:
Fix checkpatch warnings
v6
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Acked-by: Ciara Power
Signed-off-by: Brian Dooley
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++--
1 file changed, 6
Some synchronous tests do not support digest encrypted and need to be
skipped. This commit adds in extra skips for these tests.
Fixes: 55ab4a8c4fb5 ("test/crypto: disable wireless cases for CPU crypto API")
Cc: pablo.de.lara.gua...@intel.com
Acked-by: Ciara Power
Signed-off-by: Br
checkpatch warnings
v6:
Add skipping tests for synchronous crypto
v7:
Separate synchronous fix into separate commit
v8:
Reword commit and add stable
Brian Dooley (3):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
test/crypto: fix failing synchronous tests
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Acked-by: Ciara Power
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
v4:
Add comments and small refactor
v5:
Fix checkpatch warnings
v6
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Cc: sta...@dpdk.org
Acked-by: Ciara Power
Signed-off-by: Brian Dooley
--
v8:
Add cc stable
---
app/test/test_cryptodev_mixed_test_vec
Signed-off-by: Brian Dooley
---
v8:
Reword commit and add cc stable
---
app/test/test_cryptodev.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 956268bfcd..70f6b7ece1 100644
--- a/app/test/test_cryptodev.c
+++
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
---
v9:
Added release notes
v7:
Separate synchronous fix into separate commit
v6:
Add skipping tests for synchronous crypto
v5:
Fix checkpatch
v6:
Add skipping tests for synchronous crypto
v5:
Fix checkpatch warnings
v4:
Add comments and small refactor
v3:
Add Digest encrypted support to docs
v2:
Fixed CHECKPATCH warning
Brian Dooley (3):
crypto/ipsec_mb: add digest encrypted feature
test/crypto: fix IV in some vectors
test/crypto
SNOW3G and ZUC algorithms require non-zero length IVs.
Fixes: c6c267a00a92 ("test/crypto: add mixed encypted-digest")
Cc: adamx.dybkow...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
---
app/test/test_cryptodev_mixed_test_vectors.h | 8 ++
Some synchronous tests are not supported for cpu crypto and need to be
skipped. This commit adds in extra skips for these tests.
Fixes: 55ab4a8c4fb5 ("test/crypto: disable wireless cases for CPU crypto API")
Cc: pablo.de.lara.gua...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Br
om
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
drivers/crypto/qat/dev/qat_crypto_pmd_gen4.c | 121 ++-
drivers/crypto/qat/dev/qat_crypto_pmd_gens.h | 6 +
2 files changed, 123 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/qat/dev/qat_crypto_pmd_gen4.c
b/driv
rect result set as the IV update part has yet to be implemented.
This will be addressed in next revision.
Signed-off-by: Brian Dooley
---
examples/fips_validation/fips_test_acvp.c | 183 +
examples/fips_validation/fips_validation.h | 34
examples/fips_validation/ma
into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
---
v2:
OpenSSL code reintroduced as a fallback feature if Intel IPsec MB 1.4
not available
---
doc/guides/cryptodevs/qat.rst| 14 +-
drivers/common/qat/meson.build
into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
---
v3:
Fix checkpatch warnings by replacing return with goto
v2:
OpenSSL code reintroduced as a fallback feature if Intel IPsec MB 1.4
not available
---
doc/guides/cryptodevs/qat.rst
into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
---
v4:
Rebase and fix conflicts
v3:
Fix checkpatch warnings by replacing return with goto
v2:
OpenSSL code reintroduced as a fallback feature if Intel IPsec MB 1.4
not available
---
doc/guides
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Depends-on: series-30989 ("crypto/ipsec_mb: bump minimum IPsec Multi-buffer
version")
v2:
- Remov
use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
v2:
- Fix compilation failure
v3:
- Remove session configure pointer for each PMD
v4:
- Keep AES GCM PMD and fix extern issue
---
doc/guides/rel_notes/release_24_03.rst| 6 +
drivers/crypto/ipsec_mb
remove all use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 758 +-
drivers/crypto/ipsec_mb/pmd_aesni_gcm_priv.h | 21 -
drivers/crypto/ipsec_mb/pmd_aesni_mb.c| 6 +-
drivers/crypto/ipsec_mb
remove all use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
v2:
- Fix compilation failure
---
drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 758 +---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 8 +-
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h
From: Pablo de Lara
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 34 +-
1 file changed, 33 insertions(+), 1
Currently the QAT sym and asym drivers can only be disabled together
when building. Add an option to disable the QAT asym driver.
Signed-off-by: Brian Dooley
---
drivers/common/qat/meson.build | 22 +---
drivers/crypto/qat/dev/qat_crypto_pmd_gen2.c | 2 ++
drivers
remove all use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
v2:
- Fix compilation failure
v3:
- Remove session configure pointer for each PMD
---
drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 757 +-
drivers/crypto/ipsec_mb/pmd_aesni_gcm_priv.h
From: Pablo de Lara
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 34 +-
1 file changed, 33 insertions(+), 1
Unifying some PMDs in the ipsec_mb crypto driver
As discussed previously on the mailing list:
https://patches.dpdk.org/project/dpdk/patch/20240228113301.934291-1-brian.doo...@intel.com/
Brian Dooley (1):
crypto/ipsec_mb: unify some IPsec MB PMDs
doc/guides/rel_notes/release_24_07.rst
IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
doc/guides/rel_notes/release_24_07.rst| 3 +
drivers/crypto/ipsec_mb/pmd_aesni_mb.c| 10 +-
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 15 +-
drivers/crypto/ipsec_mb/pmd_chacha_poly.c | 340
Unifying some PMDs in the ipsec_mb crypto driver
As discussed previously on the mailing list:
https://patches.dpdk.org/project/dpdk/patch/20240228113301.934291-1-brian.doo...@intel.com/
v2:
* fix doc indentation
Brian Dooley (1):
crypto/ipsec_mb: unify some IPsec MB PMDs
doc/guides/rel_notes
IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
---
v2:
* fix doc indentation
---
doc/guides/rel_notes/release_24_07.rst| 5 +
drivers/crypto/ipsec_mb/pmd_aesni_mb.c| 10 +-
drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 15 +-
drivers/crypto/ipsec_mb
AESNI_MB PMD does not support Digest Encrypted. This patch adds support
for this feature.
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 107 +++--
1 file changed, 102 insertions(+), 5 deletions(-)
diff --git a/drivers/crypto/ipsec_mb
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
---
drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 107 +++--
1 file changed, 102 insertions(+), 5 deletions(-)
diff
AESNI_MB PMD does not support Digest Encrypted. This patch adds a check and
support for this feature.
Signed-off-by: Brian Dooley
---
v2:
Fixed CHECKPATCH warning
v3:
Add Digest encrypted support to docs
---
doc/guides/cryptodevs/features/aesni_mb.ini | 1 +
drivers/crypto/ipsec_mb
.@dpdk.org
Signed-off-by: Brian Dooley
---
examples/ipsec-secgw/ipsec.h | 10 ++
1 file changed, 10 insertions(+)
diff --git a/examples/ipsec-secgw/ipsec.h b/examples/ipsec-secgw/ipsec.h
index 5059418456..10e7fc179b 100644
--- a/examples/ipsec-secgw/ipsec.h
+++ b/examples/ipsec-secgw/ipsec.h
From: Ciara Power
When the legacy capability flag was enabled for QAT GEN3,
in the case of the last legacy capability in the list being SM3 or SM4,
when no slice is on the device, the loop continues instead of checking
if the end of the legacy capbilities list has been met.
To fix this, the chec
From: Sivaramakrishnan Venkat
SW PMDs increment IPsec Multi-buffer version to 1.4.
A minimum IPsec Multi-buffer version of 1.4 or greater is now required.
Signed-off-by: Sivaramakrishnan Venkat
Acked-by: Ciara Power
Acked-by: Pablo de Lara
Acked-by: Wathsala Vithanage
---
v5:
- Rebase
From: Sivaramakrishnan Venkat
SW PMDs documentation is updated to remove details of unsupported IPsec
Multi-buffer versions.DPDK older than 20.11 is end of life. So, older
DPDK versions are removed from the Crypto library version table.
Signed-off-by: Sivaramakrishnan Venkat
Acked-by: Pablo de
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Acked-by: Wathsala Vithanage
---
v5:
- Rebased and added to patchset
v2:
- Remove ipsec mb version checks
use of the IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Acked-by: Wathsala Vithanage
---
v5:
- Rebased and added patchset
v4:
- Keep AES GCM PMD and fix extern issue
v3:
- Remove session configure pointer for each PMD
v2:
- Fix compilation failure
From: Ciara Power
The IPsec-mb version that is available through current package
managers is 1.2.
This release moves the minimum required IPsec-mb version for IPsec-mb
based SW PMDs to 1.4.
To compile these PMDs, a manual step is added to install IPsec-mb v1.4
using dpkg.
Signed-off-by: Ciara Po
From: Sivaramakrishnan Venkat
SW PMDs increment IPsec Multi-buffer version to 1.4.
A minimum IPsec Multi-buffer version of 1.4 or greater is now required.
Signed-off-by: Sivaramakrishnan Venkat
Acked-by: Ciara Power
Acked-by: Pablo de Lara
Acked-by: Wathsala Vithanage
---
v5:
- Rebase
From: Sivaramakrishnan Venkat
SW PMDs documentation is updated to remove details of unsupported IPsec
Multi-buffer versions.DPDK older than 20.11 is end of life. So, older
DPDK versions are removed from the Crypto library version table.
Signed-off-by: Sivaramakrishnan Venkat
Acked-by: Pablo de
IPSec Multi-buffer library v1.4 added a new API to
calculate inner/outer padding for HMAC-SHAx/MD5.
Signed-off-by: Pablo de Lara
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Acked-by: Wathsala Vithanage
---
v5:
- Rebased and added to patchset
v2:
- Remove ipsec mb version checks
IPsec MB
direct API for these PMDs.
Signed-off-by: Brian Dooley
Acked-by: Ciara Power
Acked-by: Wathsala Vithanage
---
v6:
- Reintroduce SNOW3G and ZUC PMDs
v5:
- Rebased and added patchset
v4:
- Keep AES GCM PMD and fix extern issue
v3:
- Remove session configure pointer for each PMD
v2:
- Fix
The Intel IPsec Multi-buffer version is set to be bumped to a minimum
version of 1.4 for the 24.11 LTS release.
Signed-off-by: Brian Dooley
---
doc/guides/rel_notes/deprecation.rst | 4
1 file changed, 4 insertions(+)
diff --git a/doc/guides/rel_notes/deprecation.rst
b/doc/guides
SW PMDs documentation is updated to remove details of unsupported IPsec
Multi-buffer versions. DPDK older than 20.11 is end of life. So, older
DPDK versions are removed from the Crypto library version table.
Signed-off-by: Sivaramakrishnan Venkat
Signed-off-by: Brian Dooley
Acked-by: Pablo de
v1.4.
Signed-off-by: Brian Dooley
---
A fallback feature is planned for v2 where IPsec MB v1.4 is the default
option and the fallback option is to use OpenSSL. The code removed in this
patch will be added back in for the fallback feature.
IPsec MB is v1.4 is not yet released.
---
doc/guides
AESNI_MB PMD does not support Digest Encrypted. This patch adds partial
support for this feature.
Signed-off-by: Brian Dooley
---
Some out-of-place tests are still failing.
Only some in-place tests are passing.
Working on adding support for this feature in v2.
---
app/test/1.diff
into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Pablo de Lara
---
v5:
Remove ipsec mb define and add previous ack
v4:
Rebase and fix conflicts
v3:
Fix checkpatch warnings by replacing return with goto
v2:
OpenSSL code
IPsec MB does not support the necessary algorithms.
Added version checks for libipsecmb and libcrypto into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Pablo de Lara
---
v6:
Fix for arm support and add extra wrappers for
IPsec MB does not support the necessary algorithms.
Added version checks for libipsecmb and libcrypto into meson build.
Added directives for detecting IPsec MB or OpenSSL.
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Pablo de Lara
Acked-by: Ciara Power
---
v7:
Rebase for-main
v6:
Fix
The qat_sym_session struct variable alignment was causing a segfault.
AES expansion keys require 16-byte alignment. Added __rte_aligned to
the expansion keys.
Fixes: ca0ba0e48129 ("crypto/qat: default to IPsec MB for computations")
Signed-off-by: Brian Dooley
---
drivers/
removed AESNI_MB_DOCSIS_SEC_ENABLED defines as they are no longer used.
Fixes: fda5216fba55 ("crypto/aesni_mb: support DOCSIS protocol")
Cc: david.co...@intel.com
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/ipsec_mb_private.c | 4
drivers/crypto/ipsec_mb/pmd_
This series removes some unused defines throughout common qat drivers
and crypto ipsec mb drivers. It also removes some defines that should
have been removed previously.
v2:
more defines removed in additional patch and changed fixline
Brian Dooley (2):
crypto/ipsec_mb: remove unused defines
removed AESNI_MB_DOCSIS_SEC_ENABLED defines as they are no longer used.
Fixes: 66a9d8d0bc6d ("crypto/qat: remove security library presence checks")
Cc: maxime.coque...@redhat.com
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/ipsec_mb_private.c | 4
drivers/crypt
change define from RTE_LIB_SECURITY to BUILD_QAT_SYM as
RTE_ETHER_CRC_LEN value is protected by BUILD_QAT_SYM.
Fixes: ce7a737c8f02 ("crypto/qat: support cipher-CRC offload")
Cc: kevin.osulli...@intel.com
Signed-off-by: Brian Dooley
---
drivers/common/qat/qat_qp.c | 2 +-
1 file
This series removes some unused defines throughout common qat drivers
and crypto ipsec mb drivers. It also removes some defines that should
have been removed previously.
v3:
Incorrect fixline
v2:
more defines removed in additional patch and changed fixline
Brian Dooley (2):
crypto/ipsec_mb
removed AESNI_MB_DOCSIS_SEC_ENABLED defines as they are no longer used.
Fixes: 798f9d134519 ("crypto/ipsec_mb: remove security lib presence checks")
Cc: maxime.coque...@redhat.com
Signed-off-by: Brian Dooley
---
drivers/crypto/ipsec_mb/ipsec_mb_private.c | 4
drivers/crypt
change define from RTE_LIB_SECURITY to BUILD_QAT_SYM as
RTE_ETHER_CRC_LEN value is protected by BUILD_QAT_SYM.
Fixes: ce7a737c8f02 ("crypto/qat: support cipher-CRC offload")
Cc: kevin.osulli...@intel.com
Signed-off-by: Brian Dooley
---
drivers/common/qat/qat_qp.c | 2 +-
1 file
Added functionality to parse algorithm for AES GMAC test
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
---
v2: add random internal iv generation
---
v3: in reply to fix and patchwork CI
---
examples/fips_validation/fips_validation.c| 2 ++
examples/fips_validation/fips_validation.h| 1
Added functionality to parse algorithm for AES CTR test
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
---
v2: fix clang warning for int-in-bool-context
---
v3: in reply to fix and patchwork CI
---
examples/fips_validation/fips_validation.c | 2 ++
examples/fips_validation/fips_validation.h
Added functionality to parse algorithm for AES CTR test
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Gowrishankar Muthukrishnan
---
v2: fix clang warning for int-in-bool-context
---
v3: in reply to fix and patchwork CI
---
v4: missing acks
---
examples/fips_validation
This patch reallocates the openssl version check from
qat_session_configure() to a proper qat_security_session_create()
routine
Fixes: 3227bc7138f5 ("crypto/qat: use intel-ipsec-mb for partial hash and AES")
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
drivers/
This patch reallocates the openssl version check from
qat_session_configure() to a proper qat_security_session_create()
routine
Fixes: 3227bc7138f5 ("crypto/qat: use intel-ipsec-mb for partial hash and AES")
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
v2: rebase on main
--
Added functionality to parse algorithm for AES CTR test
Signed-off-by: Brian Dooley
Acked-by: Kai Ji
Acked-by: Gowrishankar Muthukrishnan
---
v2: fix clang warning for int-in-bool-context
---
v3: in reply to fix and patchwork CI
---
v4: missing acks
---
v5: add documentation
---
doc/guides
Update Asymmetric Crypto Service on QAT devices.
Signed-off-by: Brian Dooley
---
doc/guides/cryptodevs/qat.rst | 1 -
1 file changed, 1 deletion(-)
diff --git a/doc/guides/cryptodevs/qat.rst b/doc/guides/cryptodevs/qat.rst
index 2d895e61ac..9a5a4e6203 100644
--- a/doc/guides/cryptodevs/qat.rst
Update what drivers and devices are supported for Asymmetric Crypto
Service on QAT
Signed-off-by: Brian Dooley
---
doc/guides/cryptodevs/qat.rst | 17 ++---
1 file changed, 14 insertions(+), 3 deletions(-)
diff --git a/doc/guides/cryptodevs/qat.rst b/doc/guides/cryptodevs/qat.rst
Added functionality to parse algorithm for AES CTR test
Signed-off-by: Brian Dooley
---
examples/fips_validation/fips_validation.c | 2 ++
examples/fips_validation/fips_validation.h | 2 ++
examples/fips_validation/fips_validation_aes.c | 5 +
examples/fips_validation/main.c
Added functionality to parse algorithm for AES GMAC test
Signed-off-by: Brian Dooley
---
examples/fips_validation/fips_validation.c | 2 ++
examples/fips_validation/fips_validation.h | 1 +
examples/fips_validation/main.c| 6 ++
3 files changed, 9 insertions(+)
diff --git a
Added functionality to parse algorithm for AES CTR test
Signed-off-by: Brian Dooley
---
v2: fix clang warning for int-in-bool-context
---
examples/fips_validation/fips_validation.c | 2 ++
examples/fips_validation/fips_validation.h | 2 ++
examples/fips_validation/fips_validation_aes.c
Added functionality to parse algorithm for AES GMAC test
Signed-off-by: Brian Dooley
---
v2: add random internal iv generation
---
examples/fips_validation/fips_validation.c| 2 ++
examples/fips_validation/fips_validation.h| 1 +
.../fips_validation/fips_validation_gcm.c | 13
Public header files were missing 'extern "C"' guards.
This set adds them in.
Brian Dooley (11):
eal: fix missing C++ guards
telemetry: fix missing C++ guards
ethdev: fix missing C++ guards
metrics: fix missing C++ guards
acl: fix missing C++ guards
compressdev: fi
dd missing include dependencies")
Fixes: f58880682c81 ("trace: implement register API")
Fixes: 428eb983f5f7 ("eal: add OS specific header file")
Cc: joyce.k...@arm.com
Cc: nhor...@tuxdriver.com
Cc: tho...@monjalon.net
Cc: anatoly.bura...@intel.com
Cc: adrien.mazarg...@6wind.c
Some public header files were missing 'extern "C"' C++ guards,
and couldnt be used by C++ applications. Add the missing guards.
Fixes: 8877ac688b52 ("telemetry: introduce infrastructure")
Cc: ciara.po...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Br
s: 7f0a669e7b04 ("ethdev: add allocation helper for virtual drivers")
Fixes: 7a3357205755 ("lib: remove C++ include guard from private headers")
Cc: liang-min.w...@intel.com
Cc: jblu...@infradead.org
Cc: ferruh.yi...@intel.com
Cc: tho...@monjalon.net
Cc: sta...@dpdk.org
Sign
Some public header files were missing 'extern "C"' C++ guards,
and couldnt be used by C++ applications. Add the missing guards.
Fixes: c5b7197f662e ("telemetry: move some functions to metrics library")
Cc: ciara.po...@intel.com
Cc: sta...@dpdk.org
Signed-off-by:
Some public header files were missing 'extern "C"' C++ guards,
and couldnt be used by C++ applications. Add the missing guards.
Fixes: dc276b5780c2 ("acl: new library")
Cc: konstantin.anan...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
lib/acl/r
Some public header files were missing 'extern "C"' C++ guards,
and couldnt be used by C++ applications. Add the missing guards.
Fixes: ed7dd94f7f66 ("compressdev: add basic device management")
Cc: fiona.tr...@intel.com
Cc: sta...@dpdk.org
Signed-off-by: Bria
rs")
Cc: bruce.richard...@intel.com
Cc: tho...@monjalon.net
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
lib/eventdev/eventdev_pmd.h | 8
lib/eventdev/eventdev_pmd_pci.h | 8
lib/eventdev/eventdev_pmd_vdev.h | 8
lib/eventdev/rte_event_ring.h| 9 +
Some public header files were missing 'extern "C"' C++ guards,
and couldnt be used by C++ applications. Add the missing guards.
Fixes: 3fc5ca2f6352 ("kni: initial import")
Cc: sta...@dpdk.org
Signed-off-by: Brian Dooley
---
lib/kni/rte_kni_common.h | 8
Fixes: 3bb595ecd682 ("vhost/crypto: add request handler")
Fixes: 94c16e89d779 ("vhost: mark vDPA driver API as internal")
Cc: zhihong.w...@intel.com
Cc: patrick...@intel.com
Cc: roy.fan.zh...@intel.com
Cc: maxime.coque...@redhat.com
Cc: sta...@dpdk.org
Signed-off-by: Brian
Some public header files were missing 'extern "C"' C++ guards,
and couldnt be used by C++ applications. Add the missing guards.
Fixes: 7a3357205755 ("lib: remove C++ include guard from private headers")
Cc: tho...@monjalon.net
Cc: sta...@dpdk.org
Signed-off-
Some public header files were missing 'extern "C"' C++ guards,
and couldnt be used by C++ applications. Add the missing guards.
Fixes: 7a3357205755 ("lib: remove C++ include guard from private headers")
Cc: tho...@monjalon.net
Cc: sta...@dpdk.org
Signed-off-by: Br
Public header files were missing 'extern "C"' guards.
This set adds them in.
v2:
- Fixed checkpatch errors
Brian Dooley (11):
eal: fix missing C++ guards
telemetry: fix missing C++ guards
ethdev: fix missing C++ guards
metrics: fix missing C++ guards
acl: fi
ib: add missing include dependencies")
Fixes: f58880682c81 ("trace: implement register API")
Fixes: 428eb983f5f7 ("eal: add OS specific header file")
Cc: joyce.k...@arm.com
Cc: nhor...@tuxdriver.com
Cc: tho...@monjalon.net
Cc: anatoly.bura...@intel.com
Cc: adrien.mazarg...
1 - 100 of 142 matches
Mail list logo