From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0048.outbound.protection.outlook.com [104.47.42.48]) by dpdk.org (Postfix) with ESMTP id DBACFD1BB for ; Fri, 24 Mar 2017 22:58:34 +0100 (CET) Received: from BY2PR03CA073.namprd03.prod.outlook.com (10.141.249.46) by MWHPR03MB2799.namprd03.prod.outlook.com (10.168.208.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.977.11; Fri, 24 Mar 2017 21:58:33 +0000 Received: from BY2FFO11FD034.protection.gbl (2a01:111:f400:7c0c::188) by BY2PR03CA073.outlook.office365.com (2a01:111:e400:2c5d::46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.991.14 via Frontend Transport; Fri, 24 Mar 2017 21:58:33 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BY2FFO11FD034.mail.protection.outlook.com (10.1.14.219) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.977.7 via Frontend Transport; Fri, 24 Mar 2017 21:58:32 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v2OLwRmd007000; Fri, 24 Mar 2017 14:58:28 -0700 From: To: CC: , , , , , , Akhil Goyal Date: Sat, 25 Mar 2017 03:27:41 +0530 Message-ID: <20170324215754.21751-1-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20170303194935.30831-1-akhil.goyal@nxp.com> References: <20170303194935.30831-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131348663128864602; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39410400002)(39380400002)(39450400003)(39860400002)(39400400002)(39850400002)(39840400002)(2980300002)(1110001)(1109001)(339900001)(199003)(189002)(9170700003)(105606002)(189998001)(2876002)(33646002)(5003940100001)(6666003)(76176999)(5660300001)(8656002)(86362001)(106466001)(966004)(53936002)(50986999)(2906002)(77096006)(1076002)(2351001)(110136004)(8676002)(86152003)(36756003)(50466002)(81166006)(6306002)(54906002)(6916009)(104016004)(8936002)(50226002)(38730400002)(85426001)(305945005)(53376002)(4326008)(2950100002)(356003)(47776003)(48376002); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR03MB2799; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; A:1; MX:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BY2FFO11FD034; 1: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 MIME-Version: 1.0 Content-Type: text/plain X-MS-Office365-Filtering-Correlation-Id: e63182de-7620-482e-e990-08d47300e9e3 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:MWHPR03MB2799; X-Microsoft-Exchange-Diagnostics: 1; MWHPR03MB2799; 3:IY5ungoMI21o6qLp41x0EhJWLxKwZGJ6ptpSyFbT6rHylaICrS8TBKFsqAVZGzdf1QbncRv8EOSnqK/QWWLhteHo4u5nKM3vr/TX5gCKNesFDfyU8cWRzMuiHeuoiqueDnJhpZM7ekW9yJ8b6n9u71ZNki9PyhaYaOjI3nIsowU1LVARZgp3OgXObZRTQtvffIulO0ou4PupTYo2KN5XXg2pKiNQ9S4DFtR1mVS/UWhhd+0ppMJTvsRNPTD0J80MY/H8KHBpsOC30G/GJW5Inuhsfhul7J4N9TYYbJcBYkb0gkJYbbRiR1VkeWCNs+/lgB1aZpbhxt9ZG2eSHi1308Sbk1mobRRmw7jFSEPBZ38tsNWVLadAtA0qvgfUd5bR; 25:0RmGB+hXRH4tym6Az5Zaebz1esYRttdYpEk9Ml0vPXakfgI0cXzMRAhLm4yv89/5EsqZFHzk55IKJyREftS1Y5WcatVt9lYGcWMGL65p+Srn8CNb2ac0ltzrmLG474A9z2GnRH0XC0BgpY9uBVAWf1Vuk+RSay1dekno3Ae8i3a/Nc3oyYerjFnpBITZMjUuwNuLiRuaTe+pRvN7cTv93MROEEkFBHgXnr0atavQQSy5GPrCwGTl3grcjIpdgi4xnlt2j2p4MdkMdI38xKMkV4ifqNe1TxSlaj1RGNuEwyVpK0amjar71E0ax+lKsUspWRo4sce8WCokKGZ85aVJZlIdW/638p7ktBw8QVReqltcMeviok078eNMGJemsIDhYF0wdpyGYd3xU0FcM3VuwD0E2/c1oZhCdYH5v/UZ5kFlb3OHCwbOeelDPvvg9KuW4t7DKn1JcaBVNQByErnmpg== X-Microsoft-Exchange-Diagnostics: 1; MWHPR03MB2799; 31:YAIJOPbg6jt3kDbo4DnomuY8FlHdIcvzu2qUx20YAKUYeA+K7BUl0bpYUhJSdBvCbITX/5oVlfNgiHuYgYZVqczQFs4kmQZRI7xGnRTWJ0iazbPxV3lteLDb+HHv3b8nz+YoV7U5VEX+a+Tsk+q+v9cb1l1ewyncItrZ3sMCq/eRNVl7Bh0M7n3NuMF583g1SKLneda6zj68tH9I9vvh8S+I9AQUl0gzHUXTSPP4lBGZBU41xkSXLEO0eXkd6MGIaAtHY9q9hCAn1Q3F/hLvtjESwg+Mfd5Ylxz1VugZn84= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(185117386973197)(275809806118684); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095060)(601004)(2401047)(13017025)(13018025)(5005006)(8121501046)(13023025)(13015025)(13024025)(10201501046)(3002001)(6055026)(6096035)(20161123556025)(20161123565025)(20161123559025)(20161123563025)(20161123561025); SRVR:MWHPR03MB2799; BCL:0; PCL:0; RULEID:(400006); SRVR:MWHPR03MB2799; X-Microsoft-Exchange-Diagnostics: 1; MWHPR03MB2799; 4:2knHSvs3RQmlBghtPTOrz11fn0Xet4uQA3hsAS07YYBeIZRMMVoT0Isptobwn33sVOwj0t8HqC1xv/BR1HujAh+eDMa+OGZ5Nx7JZ9aZE38aPNJvM+lMSMc8d530DjON0+nsWJOq2aO19YctNe1k1aLcHL7F23Xkqn5X/4pbnABHJkwZRZStZlWDOvfDynb3S572AL5mLZDYDzsDtsJdRrplFIJDb/Wv9Pp8H93//MAlQ3Bae+WWCEMpzWnKGJKcfENQ575dwUJNh+Gvvp1EsUyZEr3YkfPtILctHmIeI9wUVV0DmVMOYRORR+IlTY20rCpPgZQNA+GR0rSMBAqxr4loPtnb6FXSL5g3ICkzMhtUZbJBK95zJOEQTQ311FcsA/haJ7yjg6PPLc0Xjxh2WneWm9xPuyetn9vVxYRBcrUGEImxjVhN8cvW87JfqMEqOLYwgXfdJDQZrtOYBFgDSm8v0ChKhcN244Z0bqTWX1HYflRV8ULreSA0swl6gVu8vSRGUattPb1d2xzuGnU9Ee6HhhOuMzaD+3EbRrNvK0oRdru4vkSkk8d12Zyysm6Aqlmxs0lpvtFBUqjiprfsN/CIomBo8f7OMiWSFcxu3pfo2pCYSyKhQeuw7vPWIaJ4LE6BsNaGLYcLoX0KDpAhA0ZoRauqwRS82Fempxfi/ESwgIozUfqF9/vgSq5GEC0jUcBJXgw02E9kBBI1A69RHp1m0SbQYmTLeEIkl4gZdGdGFIZH5q1ZWYXATx68zfDO3R8m8jup0kXzK1jsIuhBZCHBdHnaKalTHAH43DOELYSdPY351UDsZqQGFVTJCJ5g X-Forefront-PRVS: 0256C18696 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; MWHPR03MB2799; 23:MPIJyUSp+SbW7EPnw3y67755Vq7atznjk7KN8XYRS?= =?us-ascii?Q?mDsFYXS/EeBGlOBywF/q0Wen39S1Iv/+jDGEIMDpN9fdZVoBc0eJYZkl2ekV?= =?us-ascii?Q?0n9Nz6WEyDVwcTtdAU9XpdQeQD3pdKit9nwYhYiTCaBQvqtMgdIzz2fj1U1b?= =?us-ascii?Q?dWGd7llZsV8mLpjZSQrQYAaXYCO2Rk5baEYWD8xm74623eDSZ4nTVmJGG5Qe?= =?us-ascii?Q?S9mHlICF+aPElHbTM3vUvJXGkafLv6vJpG77Jy0PPiPX6A6EA5TGxl82au8q?= =?us-ascii?Q?dIZwb0QVLjHqR1P+/su4r0BXjqIQzJHX+zaVb14eNRaYBqKHeJnRep+WshRS?= =?us-ascii?Q?1u7gkKhEke7E8z0/AMaI7iKAKkFcHCzUDEBs8AYSE32F+i9g9WKD5k4kTrop?= =?us-ascii?Q?SRIleQFv91+8XtHk3z8yAVVudKQ82altNc6ms8ktUeOnJwMBQAs7Bi1jaX0H?= =?us-ascii?Q?aE3N2xvwCDMTO793QLrp0DzBy62kiGd10LErQgsEgmhvkg73sFkC+7l00AQ+?= =?us-ascii?Q?oeM1hfVJBR+8x9EWLxa2iTwfZra7ROi34aiQa7vjwWE7RIilVor5LQDQYQ2a?= =?us-ascii?Q?ihC1PRAsf8/03j2ehqHCzXuhYZEnl4ADagkCShXwQUJtePvm7qmkeZY0Ah2I?= =?us-ascii?Q?K5YfY/2VvCOKGHqPGqDdWHVcZfmzYKVg80MWbWp60+YXydb54YKn0ikYoWug?= =?us-ascii?Q?lTtafFgWZah4M7lTtbEA00ids6KA3Yad1QeLhrQNEimJBD4f9GlqmZ3L94g8?= =?us-ascii?Q?3/m0s7fE8QtoUpn6NcSl4n+vIEF93bKdoDeLIgZBZ+kAZNOMXgoTFOVVWN5p?= =?us-ascii?Q?iuifgo0dmS3MZPgMDCreYIl5KSPOdW+SlFWd2H2ORNzyu0/0sU/bYAtgNwHD?= =?us-ascii?Q?580A7QUs5GHTh0iIFR7L3IR7kfC7qW+0qKU4x8oFlCNVhV41Kv9+4poxQvdr?= =?us-ascii?Q?UKO0Db95enSPNa/3xeuVeSiQ3GF8cQWc7lFI0Mp4OrDbUJxB62ZYECOZjg8P?= =?us-ascii?Q?0UIblDkkw/VS+6ibLLzZA7GGn0K2eMfbtqLaQzw5I+9wejGpxiQvgn7+NlT+?= =?us-ascii?Q?TyKOzMXquDNi3sZBeicS8JQC8aGp0HDm7mu8kDG84RQXoQ/GAqqs/xo/NWP2?= =?us-ascii?Q?3kLxEWjWn5jxBTGYHficuRXiHRHy89g3lfmLq9IyWn5DnkWY6ZrHGjkXW/PQ?= =?us-ascii?Q?hC7wrrA1/RP85yEYW6dvke/GH896Zl7jF87qXSCPWsauhD2ZNjozuE8qabNq?= =?us-ascii?Q?p4uDtFNxYdq5tXvxp68bW0mInAXA1ukmKd5WuyMw+4zgXj2u8/sTezaUIqhT?= =?us-ascii?Q?/AykSO0IcTAuaTn2MkYeEm0Yw1RQOzh/10k6S76nqg9?= X-Microsoft-Exchange-Diagnostics: 1; MWHPR03MB2799; 6:YYN0X1wSaoNw4LKwRmoB+nyUUZ473eaxGgVS08hwDL90FX+xyvy0NmsToYGUmUpM3jYwYcPd4G48XfZNPlfmtYmRsDc/ABpYpKNBTyUqYq9jvyp5263bjVhgx+VqR8ZKZuaORxlYaGoJJLGRL1FoyMMwbPXgEhM/eoYJoAe+JW0nbi6uCPvdVP+jifXg92Ng/JVkKW98O7yhiStsgSljCtFRcc92SSkY8Kfk4hJgXkxmQVyIkGS8BlD+azxkgYCiuq/3Uht2O3faNzRpMrTRxe7VZ3G4Av6gODp/vWnRy/asvaxyiN6RvTxZMWEomh+5WluIi2OnfU9KTFXWPhwcmUyntkjFXs2JmdjYGMIb0go0TvTG2IW0FpqsII/8eUpGpIU6dzPmYbg4tlHhwfhZBN0ADGdU6VM1pZnGIDs9VQA=; 5:VlfifrG/zVL47odnYiehN9FjUz6ANfaXsUZeuEmYbkx8owMzlnk2rKKoUjV2nHc9n3B4EYeofiKNTnNBwNt+9rQGpcMOW+2Q+uhQQ3rmWtb96NxOZjNbRPGw+KEMD+7EEA0rIxJyOEM+CQD+O/TwGpUyuIPDJs9xA42FjSNIOfb6LLuN8iqHzezhPfXzLB2A; 24:pvPGeZF0EKwvAZRbudxkuSBi7uUfhMbWuHmx2tvqHfmZLBaSL7SSBA8BNJ8a0YccgEiIsulHO9lLsfl5MFUxRuQyPdx8btEWta7fUwG+c80= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; MWHPR03MB2799; 7:vnhr2Edq7FAIf7/wtH3HGFhwiIqR1CIFCZ6v8kV+XhgQrchxWUBa/l0p21oApsY4+dNRL0g6/m8I53LqgEawt9fckopcmDPsvjAjkeSwzUVuVPBVO4nVaE7rFNLLr7aFvfXcuTNw39yJaofCaMkmJX4AHWcvzQuPUqvtjHI0nouMJmUpNifS1+xmCXNiE3HqrKg07Sd1ErZ+zrOOwSrtIHFIVC+lBS+eh5MfjLIlDY6r3/SYeLqEXrGkceQ9sHzxsVoEUnV0l3xotJcfbbPtqpK1mb3/5PR67ust6odQyc6E4LV7AiOP6hdPy05jqboCN8dXpHkSCnYInlJoceVGzA== X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2017 21:58:32.5432 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2799 Subject: [dpdk-dev] [PATCH v6 00/13] Introducing NXP dpaa2_sec based cryptodev pmd X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Mar 2017 21:58:35 -0000 From: Akhil Goyal Based over the DPAA2 PMD driver [1], this series of patches introduces the DPAA2_SEC PMD which provides DPDK crypto driver for NXP's DPAA2 CAAM Hardware accelerator. SEC is NXP DPAA2 SoC's security engine for cryptographic acceleration and offloading. It implements block encryption, stream cipher, hashing and public key algorithms. It also supports run-time integrity checking, and a hardware random number generator. Besides the objects exposed in [1], another key object has been added through this patch: - DPSECI, refers to SEC block interface :: Patch Layout :: 0001~0002: Cryptodev PMD 0003 : MC dpseci object 0004 : Crytodev PMD basic ops 0005~0006: Run Time Assembler(RTA) common headers for CAAM hardware 0007~0009: Crytodev PMD ops 0010 : Documentation 0011 : MAINTAINERS 0012~0013: Performance and Functional tests :: Future Work To Do :: - More functionality and algorithms are still work in progress -- Hash followed by Cipher mode -- session-less API -- Chained mbufs changes in v6: - Rebased over latest DPAA2 PMD and over crypto-next - Handled comments from Pablo and John - split one patch for correcting check-git-log.sh changes in v5: - v4 discarded because of incorrect patchset changes in v4: - Moved patch for documentation in the end - Moved MC object DPSECI from base DPAA2 series to this patch set for better understanding - updated documentation to remove confusion about external libs. changes in v3: - Added functional test cases - Incorporated comments from Pablo :: References :: [1] http://dpdk.org/ml/archives/dev/2017-March/061288.html Akhil Goyal (13): cryptodev: add cryptodev type for dpaa2 sec crypto/dpaa2_sec: add dpaa2 sec poll mode driver crypto/dpaa2_sec: add mc dpseci object support crypto/dpaa2_sec: add basic crypto operations crypto/dpaa2_sec: add run time assembler for descriptor formation crypto/dpaa2_sec: add sample descriptors for NXP dpaa2 sec ops bus/fslmc: add packet frame list entry definitions crypto/dpaa2_sec: add crypto operation support crypto/dpaa2_sec: statistics support doc: add NXP dpaa2 sec in cryptodev maintainers: claim responsibility for dpaa2 sec pmd test/test: add dpaa2 sec crypto performance test test/test: add dpaa2 sec crypto functional test MAINTAINERS | 6 + config/common_base | 8 + config/defconfig_arm64-dpaa2-linuxapp-gcc | 12 + doc/guides/cryptodevs/dpaa2_sec.rst | 232 ++ doc/guides/cryptodevs/features/dpaa2_sec.ini | 34 + doc/guides/cryptodevs/index.rst | 1 + doc/guides/nics/dpaa2.rst | 2 + drivers/bus/Makefile | 4 + drivers/bus/fslmc/Makefile | 4 + drivers/bus/fslmc/portal/dpaa2_hw_pvt.h | 25 + drivers/bus/fslmc/rte_bus_fslmc_version.map | 1 + drivers/crypto/Makefile | 1 + drivers/crypto/dpaa2_sec/Makefile | 82 + drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 1661 +++++++++++++ drivers/crypto/dpaa2_sec/dpaa2_sec_logs.h | 70 + drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 368 +++ drivers/crypto/dpaa2_sec/hw/compat.h | 123 + drivers/crypto/dpaa2_sec/hw/desc.h | 2570 ++++++++++++++++++++ drivers/crypto/dpaa2_sec/hw/desc/algo.h | 431 ++++ drivers/crypto/dpaa2_sec/hw/desc/common.h | 97 + drivers/crypto/dpaa2_sec/hw/desc/ipsec.h | 1513 ++++++++++++ drivers/crypto/dpaa2_sec/hw/rta.h | 920 +++++++ .../crypto/dpaa2_sec/hw/rta/fifo_load_store_cmd.h | 312 +++ drivers/crypto/dpaa2_sec/hw/rta/header_cmd.h | 217 ++ drivers/crypto/dpaa2_sec/hw/rta/jump_cmd.h | 173 ++ drivers/crypto/dpaa2_sec/hw/rta/key_cmd.h | 188 ++ drivers/crypto/dpaa2_sec/hw/rta/load_cmd.h | 301 +++ drivers/crypto/dpaa2_sec/hw/rta/math_cmd.h | 368 +++ drivers/crypto/dpaa2_sec/hw/rta/move_cmd.h | 411 ++++ drivers/crypto/dpaa2_sec/hw/rta/nfifo_cmd.h | 162 ++ drivers/crypto/dpaa2_sec/hw/rta/operation_cmd.h | 565 +++++ drivers/crypto/dpaa2_sec/hw/rta/protocol_cmd.h | 698 ++++++ drivers/crypto/dpaa2_sec/hw/rta/sec_run_time_asm.h | 789 ++++++ .../crypto/dpaa2_sec/hw/rta/seq_in_out_ptr_cmd.h | 174 ++ drivers/crypto/dpaa2_sec/hw/rta/signature_cmd.h | 41 + drivers/crypto/dpaa2_sec/hw/rta/store_cmd.h | 151 ++ drivers/crypto/dpaa2_sec/mc/dpseci.c | 551 +++++ drivers/crypto/dpaa2_sec/mc/fsl_dpseci.h | 738 ++++++ drivers/crypto/dpaa2_sec/mc/fsl_dpseci_cmd.h | 249 ++ .../crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map | 4 + drivers/mempool/Makefile | 4 + drivers/mempool/dpaa2/Makefile | 4 + lib/librte_cryptodev/rte_cryptodev.h | 3 + mk/rte.app.mk | 5 + test/test/test_cryptodev.c | 106 + test/test/test_cryptodev_blockcipher.c | 3 + test/test/test_cryptodev_blockcipher.h | 1 + test/test/test_cryptodev_perf.c | 23 + 48 files changed, 14406 insertions(+) create mode 100644 doc/guides/cryptodevs/dpaa2_sec.rst create mode 100644 doc/guides/cryptodevs/features/dpaa2_sec.ini create mode 100644 drivers/crypto/dpaa2_sec/Makefile create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_logs.h create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h create mode 100644 drivers/crypto/dpaa2_sec/hw/compat.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc/algo.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc/common.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc/ipsec.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/fifo_load_store_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/header_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/jump_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/key_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/load_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/math_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/move_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/nfifo_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/operation_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/protocol_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/sec_run_time_asm.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/seq_in_out_ptr_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/signature_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/store_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/mc/dpseci.c create mode 100644 drivers/crypto/dpaa2_sec/mc/fsl_dpseci.h create mode 100644 drivers/crypto/dpaa2_sec/mc/fsl_dpseci_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map -- 2.9.3