From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 1BFAAA04B6; Sun, 11 Oct 2020 23:34:18 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 693E01D57B; Sun, 11 Oct 2020 23:34:16 +0200 (CEST) Received: from inva021.nxp.com (inva021.nxp.com [92.121.34.21]) by dpdk.org (Postfix) with ESMTP id A7D011D577; Sun, 11 Oct 2020 23:34:14 +0200 (CEST) Received: from inva021.nxp.com (localhost [127.0.0.1]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 7AB0D200B4A; Sun, 11 Oct 2020 23:34:13 +0200 (CEST) Received: from invc005.ap-rdc01.nxp.com (invc005.ap-rdc01.nxp.com [165.114.16.14]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 18DC3200B3C; Sun, 11 Oct 2020 23:34:10 +0200 (CEST) Received: from lsv03273.swis.in-blr01.nxp.com (lsv03273.swis.in-blr01.nxp.com [92.120.147.113]) by invc005.ap-rdc01.nxp.com (Postfix) with ESMTP id DC6C1402BC; Sun, 11 Oct 2020 23:34:05 +0200 (CEST) From: Akhil Goyal To: dev@dpdk.org, techboard@dpdk.org Cc: thomas@monjalon.net, anoobj@marvell.com, hemant.agrawal@nxp.com, declan.doherty@intel.com, david.coyle@intel.com, Akhil Goyal Date: Mon, 12 Oct 2020 03:03:55 +0530 Message-Id: <20201011213403.21169-1-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200903160652.31654-1-akhil.goyal@nxp.com> References: <20200903160652.31654-1-akhil.goyal@nxp.com> X-Virus-Scanned: ClamAV using ClamSMTP Subject: [dpdk-dev] [PATCH v2 0/8] support PDCP-SDAP for dpaa2_sec X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" The SDAP is a protocol in the LTE stack on top of PDCP. It is dedicated to QoS. The difficulty of implementing this protocol is because the PDCP change behavior regarding encryption and authentication of the SDU it receives. In effect PDCP shall not encrypt the SDAP SDU but must authenticate it (when encryption and authentication is enabled). A new field is added in the PDCP xform to specify SDAP is enabled. The overall size of the xform is not changed, as hfn_ovrd is just a flag and does not need uint32. Hence, it is converted to uint8_t and a 16 bit reserved field is added for future. The corresponding test cases and test vectors are added in the test application. This patch need Techboard approval as there is a change in API without a deprecation notice from last release. This patch is required to support the upcoming development of 5GNR protocol - SDAP in near future. If the patch is not approved in the current release, we may not be able to support SDAP for next 1 year which is not accceptable for the customers. Changes in v2: - removed unnecessary API documentation from security guide. - fix clang build - updated release notes Akhil Goyal (4): security: modify PDCP xform to support SDAP doc: remove unnecessary API code from security guide crypto/dpaa2_sec: enable PDCP-SDAP sessions crypto/dpaa_sec: enable PDCP-SDAP sessions Franck LENORMAND (4): common/dpaax/caamflib: Support PDCP-SDAP test/crypto: Add test vectors for PDCP-SDAP test/crypto: Modify test_pdcp_proto to take parameters test/crypto: Add PDCP-SDAP cases app/test/test_cryptodev.c | 278 +- ...ryptodev_security_pdcp_sdap_test_vectors.h | 3619 +++++++++++++++++ doc/guides/prog_guide/rte_security.rst | 55 +- doc/guides/rel_notes/release_20_11.rst | 9 + drivers/common/dpaax/caamflib/desc/pdcp.h | 8 + drivers/common/dpaax/caamflib/desc/sdap.h | 1063 +++++ drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 30 +- drivers/crypto/dpaa_sec/dpaa_sec.c | 63 +- drivers/crypto/dpaa_sec/dpaa_sec.h | 3 +- lib/librte_security/rte_security.h | 12 +- 10 files changed, 4982 insertions(+), 158 deletions(-) create mode 100644 app/test/test_cryptodev_security_pdcp_sdap_test_vectors.h create mode 100644 drivers/common/dpaax/caamflib/desc/sdap.h -- 2.17.1