From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 2D25EA04B6; Mon, 12 Oct 2020 16:10:22 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 8AC801D6E5; Mon, 12 Oct 2020 16:10:19 +0200 (CEST) Received: from inva020.nxp.com (inva020.nxp.com [92.121.34.13]) by dpdk.org (Postfix) with ESMTP id D972E1D6D1; Mon, 12 Oct 2020 16:10:17 +0200 (CEST) Received: from inva020.nxp.com (localhost [127.0.0.1]) by inva020.eu-rdc02.nxp.com (Postfix) with ESMTP id 9D1FA1A13B8; Mon, 12 Oct 2020 16:10:16 +0200 (CEST) Received: from invc005.ap-rdc01.nxp.com (invc005.ap-rdc01.nxp.com [165.114.16.14]) by inva020.eu-rdc02.nxp.com (Postfix) with ESMTP id 41CE21A1008; Mon, 12 Oct 2020 16:10:13 +0200 (CEST) Received: from lsv03273.swis.in-blr01.nxp.com (lsv03273.swis.in-blr01.nxp.com [92.120.147.113]) by invc005.ap-rdc01.nxp.com (Postfix) with ESMTP id 102CF402BB; Mon, 12 Oct 2020 16:10:09 +0200 (CEST) From: Akhil Goyal To: dev@dpdk.org, techboard@dpdk.org Cc: thomas@monjalon.net, anoobj@marvell.com, hemant.agrawal@nxp.com, declan.doherty@intel.com, david.coyle@intel.com, Akhil Goyal Date: Mon, 12 Oct 2020 19:39:58 +0530 Message-Id: <20201012141006.31463-1-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20201011213403.21169-1-akhil.goyal@nxp.com> References: <20201011213403.21169-1-akhil.goyal@nxp.com> X-Virus-Scanned: ClamAV using ClamSMTP Subject: [dpdk-dev] [PATCH v3 0/8] support PDCP-SDAP for dpaa2_sec X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" The SDAP is a protocol in the LTE stack on top of PDCP. It is dedicated to QoS. The difficulty of implementing this protocol is because the PDCP change behavior regarding encryption and authentication of the SDU it receives. In effect PDCP shall not encrypt the SDAP SDU but must authenticate it (when encryption and authentication is enabled). A new field is added in the PDCP xform to specify SDAP is enabled. The overall size of the xform is not changed, as hfn_ovrd is just a flag and does not need uint32. Hence, it is converted to uint8_t and a 16 bit reserved field is added for future. The corresponding test cases and test vectors are added in the test application. This patch need Techboard approval as there is a change in API without a deprecation notice from last release. This patch is required to support the upcoming development of 5GNR protocol - SDAP in near future. If the patch is not approved in the current release, we may not be able to support SDAP for next 1 year which is not accceptable for the customers. changed in v3: - fixed signoff - fixed typo in 1/8 Changes in v2: - removed unnecessary API documentation from security guide. - fix clang build - updated release notes Akhil Goyal (4): security: modify PDCP xform to support SDAP doc: remove unnecessary API code from security guide crypto/dpaa2_sec: enable PDCP-SDAP sessions crypto/dpaa_sec: enable PDCP-SDAP sessions Franck Lenormand (4): common/dpaax/caamflib: Support PDCP-SDAP test/crypto: Add test vectors for PDCP-SDAP test/crypto: Modify test_pdcp_proto to take parameters test/crypto: Add PDCP-SDAP cases app/test/test_cryptodev.c | 278 +- ...ryptodev_security_pdcp_sdap_test_vectors.h | 3619 +++++++++++++++++ doc/guides/prog_guide/rte_security.rst | 55 +- doc/guides/rel_notes/release_20_11.rst | 9 + drivers/common/dpaax/caamflib/desc/pdcp.h | 8 + drivers/common/dpaax/caamflib/desc/sdap.h | 1063 +++++ drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 30 +- drivers/crypto/dpaa_sec/dpaa_sec.c | 63 +- drivers/crypto/dpaa_sec/dpaa_sec.h | 3 +- lib/librte_security/rte_security.h | 12 +- 10 files changed, 4982 insertions(+), 158 deletions(-) create mode 100644 app/test/test_cryptodev_security_pdcp_sdap_test_vectors.h create mode 100644 drivers/common/dpaax/caamflib/desc/sdap.h -- 2.17.1