From: Hemant Agrawal <hemant.agrawal@nxp.com>
To: <zbigniew.bodek@caviumnetworks.com>, <dev@dpdk.org>
Cc: <pablo.de.lara.guarch@intel.com>, <declan.doherty@intel.com>,
<jerin.jacob@caviumnetworks.com>
Subject: Re: [dpdk-dev] [PATCH v3 8/8] app/test: add ARMv8 crypto tests and test vectors
Date: Fri, 13 Jan 2017 14:58:53 +0530 [thread overview]
Message-ID: <5378dc5b-63c7-c662-4452-b700304077e8@nxp.com> (raw)
In-Reply-To: <1483551207-18236-9-git-send-email-zbigniew.bodek@caviumnetworks.com>
On 1/4/2017 11:03 PM, zbigniew.bodek@caviumnetworks.com wrote:
> From: Zbigniew Bodek <zbigniew.bodek@caviumnetworks.com>
>
> Introduce unit tests for ARMv8 crypto PMD.
> Add test vectors for short cases such as 160 bytes.
> These test cases are ARMv8 specific since the code provides
> different processing paths for different input data sizes.
>
> User can validate correctness of algorithms' implementation using:
> * cryptodev_sw_armv8_autotest
> For performance test one can use:
> * cryptodev_sw_armv8_perftest
>
> Signed-off-by: Zbigniew Bodek <zbigniew.bodek@caviumnetworks.com>
> ---
> app/test/test_cryptodev.c | 63 ++++
> app/test/test_cryptodev_aes_test_vectors.h | 144 ++++++++-
> app/test/test_cryptodev_blockcipher.c | 4 +
> app/test/test_cryptodev_blockcipher.h | 1 +
> app/test/test_cryptodev_perf.c | 480 +++++++++++++++++++++++++++++
> 5 files changed, 684 insertions(+), 8 deletions(-)
>
> diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
> index 872f8b4..a0540d6 100644
> --- a/app/test/test_cryptodev.c
> +++ b/app/test/test_cryptodev.c
............
> @@ -2422,6 +2449,136 @@ struct crypto_data_params aes_cbc_hmac_sha256_output[MAX_PACKET_SIZE_INDEX] = {
> return TEST_SUCCESS;
> }
>
> +static int
> +test_perf_armv8_optimise_cyclecount(struct perf_test_params *pparams)
> +{
> + uint32_t num_to_submit = pparams->total_operations;
> + struct rte_crypto_op *c_ops[num_to_submit];
> + struct rte_crypto_op *proc_ops[num_to_submit];
> + uint64_t failed_polls, retries, start_cycles, end_cycles,
> + total_cycles = 0;
> + uint32_t burst_sent = 0, burst_received = 0;
> + uint32_t i, burst_size, num_sent, num_ops_received;
> +
> + struct crypto_testsuite_params *ts_params = &testsuite_params;
> +
> + static struct rte_cryptodev_sym_session *sess;
> +
> + unsigned int digest_length = get_auth_digest_length(pparams->auth_algo);
> +
> + if (rte_cryptodev_count() == 0) {
> + printf("\nNo crypto devices found. Is PMD build configured?\n");
> + return TEST_FAILED;
> + }
> +
> + /* Create Crypto session*/
> + sess = test_perf_create_armv8_session(ts_params->dev_id,
> + pparams->chain, pparams->cipher_algo,
> + pparams->cipher_key_length, pparams->auth_algo);
> + TEST_ASSERT_NOT_NULL(sess, "Session creation failed");
> +
> + /* Generate Crypto op data structure(s)*/
> + for (i = 0; i < num_to_submit ; i++) {
> + struct rte_mbuf *m = test_perf_create_pktmbuf(
> + ts_params->mbuf_mp,
> + pparams->buf_size);
> + TEST_ASSERT_NOT_NULL(m, "Failed to allocate tx_buf");
> +
> + struct rte_crypto_op *op =
> + rte_crypto_op_alloc(ts_params->op_mpool,
> + RTE_CRYPTO_OP_TYPE_SYMMETRIC);
> + TEST_ASSERT_NOT_NULL(op, "Failed to allocate op");
> +
> + op = test_perf_set_crypto_op_aes(op, m, sess, pparams->buf_size,
> + digest_length);
> + TEST_ASSERT_NOT_NULL(op, "Failed to attach op to session");
> +
> + c_ops[i] = op;
> + }
> +
> + printf("\nOn %s dev%u qp%u, %s, cipher algo:%s, cipher key length:%u, "
> + "auth_algo:%s, Packet Size %u bytes",
> + pmd_name(gbl_cryptodev_perftest_devtype),
> + ts_params->dev_id, 0,
> + chain_mode_name(pparams->chain),
> + cipher_algo_name(pparams->cipher_algo),
> + pparams->cipher_key_length,
> + auth_algo_name(pparams->auth_algo),
> + pparams->buf_size);
> + printf("\nOps Tx\tOps Rx\tOps/burst ");
> + printf("Retries "
> + "EmptyPolls\tIACycles/CyOp\tIACycles/Burst\tIACycles/Byte");
> +
> + for (i = 2; i <= 128 ; i *= 2) {
> + num_sent = 0;
> + num_ops_received = 0;
> + retries = 0;
> + failed_polls = 0;
> + burst_size = i;
> + total_cycles = 0;
> + while (num_sent < num_to_submit) {
> + start_cycles = rte_rdtsc_precise();
> + burst_sent = rte_cryptodev_enqueue_burst(
> + ts_params->dev_id,
> + 0, &c_ops[num_sent],
> + ((num_to_submit - num_sent) < burst_size) ?
> + num_to_submit - num_sent : burst_size);
> + end_cycles = rte_rdtsc_precise();
> + if (burst_sent == 0)
> + retries++;
> + num_sent += burst_sent;
> + total_cycles += (end_cycles - start_cycles);
> +
> + /* Wait until requests have been sent. */
> + rte_delay_ms(1);
> +
you may remove this delay.
> + start_cycles = rte_rdtsc_precise();
> + burst_received = rte_cryptodev_dequeue_burst(
> + ts_params->dev_id, 0, proc_ops,
> + burst_size);
> + end_cycles = rte_rdtsc_precise();
> + if (burst_received < burst_sent)
> + failed_polls++;
> + num_ops_received += burst_received;
> +
> + total_cycles += end_cycles - start_cycles;
> + }
> +
> + while (num_ops_received != num_to_submit) {
> + /* Sending 0 length burst to flush sw crypto device */
> + rte_cryptodev_enqueue_burst(
> + ts_params->dev_id, 0, NULL, 0);
> +
> + start_cycles = rte_rdtsc_precise();
> + burst_received = rte_cryptodev_dequeue_burst(
> + ts_params->dev_id, 0, proc_ops, burst_size);
> + end_cycles = rte_rdtsc_precise();
> +
> + total_cycles += end_cycles - start_cycles;
> + if (burst_received == 0)
> + failed_polls++;
> + num_ops_received += burst_received;
> + }
> +
> + printf("\n%u\t%u\t%u", num_sent, num_ops_received, burst_size);
> + printf("\t\t%"PRIu64, retries);
> + printf("\t%"PRIu64, failed_polls);
> + printf("\t\t%"PRIu64, total_cycles/num_ops_received);
> + printf("\t\t%"PRIu64,
> + (total_cycles/num_ops_received)*burst_size);
> + printf("\t\t%"PRIu64,
> + total_cycles/(num_ops_received*pparams->buf_size));
> + }
> + printf("\n");
> +
> + for (i = 0; i < num_to_submit ; i++) {
> + rte_pktmbuf_free(c_ops[i]->sym->m_src);
> + rte_crypto_op_free(c_ops[i]);
> + }
> +
> + return TEST_SUCCESS;
> +}
> +
> static uint32_t get_auth_key_max_length(enum rte_crypto_auth_algorithm algo)
> {
> switch (algo) {
> @@ -2683,6 +2840,56 @@ static uint32_t get_auth_digest_length(enum rte_crypto_auth_algorithm algo)
> }
> }
>
> +static struct rte_cryptodev_sym_session *
> +test_perf_create_armv8_session(uint8_t dev_id, enum chain_mode chain,
> + enum rte_crypto_cipher_algorithm cipher_algo,
> + unsigned int cipher_key_len,
> + enum rte_crypto_auth_algorithm auth_algo)
> +{
> + struct rte_crypto_sym_xform cipher_xform = { 0 };
> + struct rte_crypto_sym_xform auth_xform = { 0 };
> +
> + /* Setup Cipher Parameters */
> + cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
> + cipher_xform.cipher.algo = cipher_algo;
> +
> + switch (cipher_algo) {
> + case RTE_CRYPTO_CIPHER_AES_CBC:
> + cipher_xform.cipher.key.data = aes_cbc_128_key;
> + break;
> + default:
> + return NULL;
> + }
> +
> + cipher_xform.cipher.key.length = cipher_key_len;
> +
> + /* Setup Auth Parameters */
> + auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
> + auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
> + auth_xform.auth.algo = auth_algo;
> +
> + auth_xform.auth.digest_length = get_auth_digest_length(auth_algo);
> +
> + switch (chain) {
> + case CIPHER_HASH:
> + cipher_xform.next = &auth_xform;
> + auth_xform.next = NULL;
> + /* Encrypt and hash the result */
> + cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
> + /* Create Crypto session*/
> + return rte_cryptodev_sym_session_create(dev_id, &cipher_xform);
> + case HASH_CIPHER:
> + auth_xform.next = &cipher_xform;
> + cipher_xform.next = NULL;
> + /* Hash encrypted message and decrypt */
> + cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_DECRYPT;
> + /* Create Crypto session*/
> + return rte_cryptodev_sym_session_create(dev_id, &auth_xform);
> + default:
> + return NULL;
> + }
> +}
> +
> #define AES_BLOCK_SIZE 16
> #define AES_CIPHER_IV_LENGTH 16
>
> @@ -3356,6 +3563,138 @@ static uint32_t get_auth_digest_length(enum rte_crypto_auth_algorithm algo)
> return TEST_SUCCESS;
> }
>
> +static int
> +test_perf_armv8(uint8_t dev_id, uint16_t queue_id,
> + struct perf_test_params *pparams)
> +{
> + uint16_t i, k, l, m;
> + uint16_t j = 0;
> + uint16_t ops_unused = 0;
> + uint16_t burst_size;
> + uint16_t ops_needed;
> +
> + uint64_t burst_enqueued = 0, total_enqueued = 0, burst_dequeued = 0;
> + uint64_t processed = 0, failed_polls = 0, retries = 0;
> + uint64_t tsc_start = 0, tsc_end = 0;
> +
> + unsigned int digest_length = get_auth_digest_length(pparams->auth_algo);
> +
> + struct rte_crypto_op *ops[pparams->burst_size];
> + struct rte_crypto_op *proc_ops[pparams->burst_size];
> +
> + struct rte_mbuf *mbufs[pparams->burst_size * NUM_MBUF_SETS];
> +
> + struct crypto_testsuite_params *ts_params = &testsuite_params;
> +
> + static struct rte_cryptodev_sym_session *sess;
> +
> + if (rte_cryptodev_count() == 0) {
> + printf("\nNo crypto devices found. Is PMD build configured?\n");
> + return TEST_FAILED;
> + }
> +
> + /* Create Crypto session*/
> + sess = test_perf_create_armv8_session(ts_params->dev_id,
> + pparams->chain, pparams->cipher_algo,
> + pparams->cipher_key_length, pparams->auth_algo);
> + TEST_ASSERT_NOT_NULL(sess, "Session creation failed");
> +
> + /* Generate a burst of crypto operations */
> + for (i = 0; i < (pparams->burst_size * NUM_MBUF_SETS); i++) {
> + mbufs[i] = test_perf_create_pktmbuf(
> + ts_params->mbuf_mp,
> + pparams->buf_size);
> +
> + if (mbufs[i] == NULL) {
> + printf("\nFailed to get mbuf - freeing the rest.\n");
> + for (k = 0; k < i; k++)
> + rte_pktmbuf_free(mbufs[k]);
> + return -1;
> + }
> + }
> +
> + tsc_start = rte_rdtsc_precise();
> +
> + while (total_enqueued < pparams->total_operations) {
> + if ((total_enqueued + pparams->burst_size) <=
> + pparams->total_operations)
> + burst_size = pparams->burst_size;
> + else
> + burst_size = pparams->total_operations - total_enqueued;
> +
> + ops_needed = burst_size - ops_unused;
> +
> + if (ops_needed != rte_crypto_op_bulk_alloc(ts_params->op_mpool,
> + RTE_CRYPTO_OP_TYPE_SYMMETRIC, ops, ops_needed)){
> + printf("\nFailed to alloc enough ops, finish dequeuing "
> + "and free ops below.");
> + } else {
> + for (i = 0; i < ops_needed; i++)
> + ops[i] = test_perf_set_crypto_op_aes(ops[i],
> + mbufs[i + (pparams->burst_size *
> + (j % NUM_MBUF_SETS))],
> + sess, pparams->buf_size, digest_length);
> +
> + /* enqueue burst */
> + burst_enqueued = rte_cryptodev_enqueue_burst(dev_id,
> + queue_id, ops, burst_size);
> +
> + if (burst_enqueued < burst_size)
> + retries++;
> +
> + ops_unused = burst_size - burst_enqueued;
> + total_enqueued += burst_enqueued;
> + }
> +
> + /* dequeue burst */
> + burst_dequeued = rte_cryptodev_dequeue_burst(dev_id, queue_id,
> + proc_ops, pparams->burst_size);
> + if (burst_dequeued == 0)
> + failed_polls++;
> + else {
> + processed += burst_dequeued;
> +
> + for (l = 0; l < burst_dequeued; l++)
> + rte_crypto_op_free(proc_ops[l]);
> + }
> + j++;
> + }
> +
> + /* Dequeue any operations still in the crypto device */
> + while (processed < pparams->total_operations) {
> + /* Sending 0 length burst to flush sw crypto device */
> + rte_cryptodev_enqueue_burst(dev_id, queue_id, NULL, 0);
> +
> + /* dequeue burst */
> + burst_dequeued = rte_cryptodev_dequeue_burst(dev_id, queue_id,
> + proc_ops, pparams->burst_size);
> + if (burst_dequeued == 0)
> + failed_polls++;
> + else {
> + processed += burst_dequeued;
> +
> + for (m = 0; m < burst_dequeued; m++)
> + rte_crypto_op_free(proc_ops[m]);
> + }
> + }
> +
> + tsc_end = rte_rdtsc_precise();
> +
> + double ops_s = ((double)processed / (tsc_end - tsc_start))
> + * rte_get_tsc_hz();
> + double throughput = (ops_s * pparams->buf_size * NUM_MBUF_SETS)
> + / 1000000000;
> +
> + printf("\t%u\t%6.2f\t%10.2f\t%8"PRIu64"\t%8"PRIu64, pparams->buf_size,
> + ops_s / 1000000, throughput, retries, failed_polls);
> +
> + for (i = 0; i < pparams->burst_size * NUM_MBUF_SETS; i++)
> + rte_pktmbuf_free(mbufs[i]);
> +
> + printf("\n");
> + return TEST_SUCCESS;
> +}
> +
> /*
>
> perf_test_aes_sha("avx2", HASH_CIPHER, 16, CBC, SHA1);
> @@ -3664,6 +4003,125 @@ static uint32_t get_auth_digest_length(enum rte_crypto_auth_algorithm algo)
> }
>
> static int
> +test_perf_armv8_vary_pkt_size(void)
> +{
> + unsigned int total_operations = 100000;
> + unsigned int burst_size = { 64 };
> + unsigned int buf_lengths[] = { 64, 128, 256, 512, 768, 1024, 1280, 1536,
> + 1792, 2048 };
> + uint8_t i, j;
> +
> + struct perf_test_params params_set[] = {
> + {
> + .chain = CIPHER_HASH,
> +
> + .cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
> + .cipher_key_length = 16,
> + .auth_algo = RTE_CRYPTO_AUTH_SHA1_HMAC
> + },
> + {
> + .chain = HASH_CIPHER,
> +
> + .cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
> + .cipher_key_length = 16,
> + .auth_algo = RTE_CRYPTO_AUTH_SHA1_HMAC
> + },
> + {
> + .chain = CIPHER_HASH,
> +
> + .cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
> + .cipher_key_length = 16,
> + .auth_algo = RTE_CRYPTO_AUTH_SHA256_HMAC
> + },
> + {
> + .chain = HASH_CIPHER,
> +
> + .cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
> + .cipher_key_length = 16,
> + .auth_algo = RTE_CRYPTO_AUTH_SHA256_HMAC
> + },
> + };
> +
> + for (i = 0; i < RTE_DIM(params_set); i++) {
> + params_set[i].total_operations = total_operations;
> + params_set[i].burst_size = burst_size;
> + printf("\n%s. cipher algo: %s auth algo: %s cipher key size=%u."
> + " burst_size: %d ops\n",
> + chain_mode_name(params_set[i].chain),
> + cipher_algo_name(params_set[i].cipher_algo),
> + auth_algo_name(params_set[i].auth_algo),
> + params_set[i].cipher_key_length,
> + burst_size);
> + printf("\nBuffer Size(B)\tOPS(M)\tThroughput(Gbps)\tRetries\t"
> + "EmptyPolls\n");
> + for (j = 0; j < RTE_DIM(buf_lengths); j++) {
> + params_set[i].buf_size = buf_lengths[j];
> + test_perf_armv8(testsuite_params.dev_id, 0,
> + ¶ms_set[i]);
> + }
> + }
> +
> + return 0;
> +}
> +
> +static int
> +test_perf_armv8_vary_burst_size(void)
> +{
> + unsigned int total_operations = 4096;
> + uint16_t buf_lengths[] = { 64 };
> + uint8_t i, j;
> +
> + struct perf_test_params params_set[] = {
> + {
> + .chain = CIPHER_HASH,
> +
> + .cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
> + .cipher_key_length = 16,
> + .auth_algo = RTE_CRYPTO_AUTH_SHA1_HMAC
> + },
> + {
> + .chain = HASH_CIPHER,
> +
> + .cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
> + .cipher_key_length = 16,
> + .auth_algo = RTE_CRYPTO_AUTH_SHA1_HMAC
> + },
> + {
> + .chain = CIPHER_HASH,
> +
> + .cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
> + .cipher_key_length = 16,
> + .auth_algo = RTE_CRYPTO_AUTH_SHA256_HMAC
> + },
> + {
> + .chain = HASH_CIPHER,
> +
> + .cipher_algo = RTE_CRYPTO_CIPHER_AES_CBC,
> + .cipher_key_length = 16,
> + .auth_algo = RTE_CRYPTO_AUTH_SHA256_HMAC
> + },
> + };
> +
> + printf("\n\nStart %s.", __func__);
> + printf("\nThis Test measures the average IA cycle cost using a "
> + "constant request(packet) size. ");
> + printf("Cycle cost is only valid when indicators show device is "
> + "not busy, i.e. Retries and EmptyPolls = 0");
> +
> + for (i = 0; i < RTE_DIM(params_set); i++) {
> + printf("\n");
> + params_set[i].total_operations = total_operations;
> +
> + for (j = 0; j < RTE_DIM(buf_lengths); j++) {
> + params_set[i].buf_size = buf_lengths[j];
> + test_perf_armv8_optimise_cyclecount(¶ms_set[i]);
> + }
> + }
> +
> + return 0;
> +}
> +
> +static int
> test_perf_aes_cbc_vary_burst_size(void)
> {
> return test_perf_crypto_qp_vary_burst_size(testsuite_params.dev_id);
> @@ -4214,6 +4672,19 @@ static int test_continual_perf_AES_GCM(void)
> }
> };
>
> +static struct unit_test_suite cryptodev_armv8_testsuite = {
> + .suite_name = "Crypto Device ARMv8 Unit Test Suite",
> + .setup = testsuite_setup,
> + .teardown = testsuite_teardown,
> + .unit_test_cases = {
> + TEST_CASE_ST(ut_setup, ut_teardown,
> + test_perf_armv8_vary_pkt_size),
> + TEST_CASE_ST(ut_setup, ut_teardown,
> + test_perf_armv8_vary_burst_size),
> + TEST_CASES_END() /**< NULL terminate unit test array */
> + }
> +};
> +
> static int
> perftest_aesni_gcm_cryptodev(void)
> {
> @@ -4270,6 +4741,14 @@ static int test_continual_perf_AES_GCM(void)
> return unit_test_suite_runner(&cryptodev_qat_continual_testsuite);
> }
>
> +static int
> +perftest_sw_armv8_cryptodev(void /*argv __rte_unused, int argc __rte_unused*/)
> +{
> + gbl_cryptodev_perftest_devtype = RTE_CRYPTODEV_ARMV8_PMD;
> +
> + return unit_test_suite_runner(&cryptodev_armv8_testsuite);
> +}
> +
> REGISTER_TEST_COMMAND(cryptodev_aesni_mb_perftest, perftest_aesni_mb_cryptodev);
> REGISTER_TEST_COMMAND(cryptodev_qat_perftest, perftest_qat_cryptodev);
> REGISTER_TEST_COMMAND(cryptodev_sw_snow3g_perftest, perftest_sw_snow3g_cryptodev);
> @@ -4279,3 +4758,4 @@ static int test_continual_perf_AES_GCM(void)
> perftest_openssl_cryptodev);
> REGISTER_TEST_COMMAND(cryptodev_qat_continual_perftest,
> perftest_qat_continual_cryptodev);
> +REGISTER_TEST_COMMAND(cryptodev_sw_armv8_perftest, perftest_sw_armv8_cryptodev);
>
next prev parent reply other threads:[~2017-01-13 9:29 UTC|newest]
Thread overview: 100+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-12-04 11:33 [dpdk-dev] [PATCH] Add crypto PMD optimized for ARMv8 zbigniew.bodek
2016-12-04 11:33 ` [dpdk-dev] [PATCH 1/3] mk: fix build of assembly files for ARM64 zbigniew.bodek
2016-12-04 11:33 ` [dpdk-dev] [PATCH 2/3] crypto/armv8: add PMD optimized for ARMv8 processors zbigniew.bodek
2016-12-04 11:33 ` [dpdk-dev] [PATCH 3/3] app/test: add ARMv8 crypto tests and test vectors zbigniew.bodek
2016-12-07 2:32 ` [dpdk-dev] [PATCH v2 00/12] Add crypto PMD optimized for ARMv8 zbigniew.bodek
2016-12-07 2:32 ` [dpdk-dev] [PATCH v2 01/12] mk: fix build of assembly files for ARM64 zbigniew.bodek
2016-12-21 14:46 ` De Lara Guarch, Pablo
2017-01-04 17:33 ` [dpdk-dev] [PATCH v3 0/8] Add crypto PMD optimized for ARMv8 zbigniew.bodek
2017-01-04 17:33 ` [dpdk-dev] [PATCH v3 1/8] mk: fix build of assembly files for ARM64 zbigniew.bodek
2017-01-13 8:13 ` Hemant Agrawal
2017-01-04 17:33 ` [dpdk-dev] [PATCH v3 2/8] lib: add cryptodev type for the upcoming ARMv8 PMD zbigniew.bodek
2017-01-13 8:16 ` Hemant Agrawal
2017-01-13 15:50 ` Zbigniew Bodek
2017-01-16 5:57 ` Jianbo Liu
2017-01-04 17:33 ` [dpdk-dev] [PATCH v3 3/8] crypto/armv8: add PMD optimized for ARMv8 processors zbigniew.bodek
2017-01-06 2:45 ` Jianbo Liu
2017-01-12 13:12 ` Zbigniew Bodek
2017-01-13 7:41 ` Jianbo Liu
2017-01-13 19:09 ` Zbigniew Bodek
2017-01-13 7:57 ` Hemant Agrawal
2017-01-13 19:15 ` Zbigniew Bodek
2017-01-17 15:48 ` [dpdk-dev] [PATCH v4 0/7] Add crypto PMD optimized for ARMv8 zbigniew.bodek
2017-01-17 15:48 ` [dpdk-dev] [PATCH v4 1/7] lib: add cryptodev type for the upcoming ARMv8 PMD zbigniew.bodek
2017-01-18 2:24 ` Jerin Jacob
2017-01-17 15:48 ` [dpdk-dev] [PATCH v4 2/7] crypto/armv8: add PMD optimized for ARMv8 processors zbigniew.bodek
2017-01-18 14:27 ` [dpdk-dev] [PATCH v5 0/7] Add crypto PMD optimized for ARMv8 zbigniew.bodek
2017-01-18 14:27 ` [dpdk-dev] [PATCH v5 1/7] cryptodev: add cryptodev type for the ARMv8 PMD zbigniew.bodek
2017-01-18 14:27 ` [dpdk-dev] [PATCH v5 2/7] crypto/armv8: add PMD optimized for ARMv8 processors zbigniew.bodek
2017-01-18 20:01 ` [dpdk-dev] [PATCH v6 0/8] Add crypto PMD optimized for ARMv8 zbigniew.bodek
2017-01-18 20:01 ` [dpdk-dev] [PATCH v6 1/8] cryptodev: add cryptodev type for the ARMv8 PMD zbigniew.bodek
2017-01-18 20:01 ` [dpdk-dev] [PATCH v6 2/8] crypto/armv8: add PMD optimized for ARMv8 processors zbigniew.bodek
2017-01-18 20:01 ` [dpdk-dev] [PATCH v6 3/8] mk: add PMD to the build system zbigniew.bodek
2017-01-18 20:01 ` [dpdk-dev] [PATCH v6 4/8] cryptodev/armv8: introduce ARM-specific feature flags zbigniew.bodek
2017-01-18 20:01 ` [dpdk-dev] [PATCH v6 5/8] doc: update documentation about ARMv8 crypto PMD zbigniew.bodek
2017-01-18 20:01 ` [dpdk-dev] [PATCH v6 6/8] crypto/armv8: enable ARMv8 PMD in the configuration zbigniew.bodek
2017-01-18 20:02 ` [dpdk-dev] [PATCH v6 7/8] MAINTAINERS: update MAINTAINERS entry for ARMv8 crypto zbigniew.bodek
2017-01-18 20:02 ` [dpdk-dev] [PATCH v6 8/8] app/test: add ARMv8 crypto tests and test vectors zbigniew.bodek
2017-01-18 21:14 ` [dpdk-dev] [PATCH v6 0/8] Add crypto PMD optimized for ARMv8 De Lara Guarch, Pablo
2017-01-19 10:36 ` Zbigniew Bodek
2017-01-18 14:27 ` [dpdk-dev] [PATCH v5 3/7] mk: add PMD to the build system zbigniew.bodek
2017-01-18 14:27 ` [dpdk-dev] [PATCH v5 4/7] doc: update documentation about ARMv8 crypto PMD zbigniew.bodek
2017-01-18 17:05 ` De Lara Guarch, Pablo
2017-01-18 19:52 ` Zbigniew Bodek
2017-01-18 19:54 ` De Lara Guarch, Pablo
2017-01-18 14:27 ` [dpdk-dev] [PATCH v5 5/7] crypto/armv8: enable ARMv8 PMD in the configuration zbigniew.bodek
2017-01-18 14:27 ` [dpdk-dev] [PATCH v5 6/7] MAINTAINERS: update MAINTAINERS entry for ARMv8 crypto zbigniew.bodek
2017-01-18 14:27 ` [dpdk-dev] [PATCH v5 7/7] app/test: add ARMv8 crypto tests and test vectors zbigniew.bodek
2017-01-18 15:23 ` [dpdk-dev] [PATCH v5 0/7] Add crypto PMD optimized for ARMv8 Jerin Jacob
2017-01-17 15:48 ` [dpdk-dev] [PATCH v4 3/7] mk: add PMD to the build system zbigniew.bodek
2017-01-17 15:49 ` [dpdk-dev] [PATCH v4 4/7] doc: update documentation about ARMv8 crypto PMD zbigniew.bodek
2017-01-17 15:49 ` [dpdk-dev] [PATCH v4 5/7] crypto/armv8: enable ARMv8 PMD in the configuration zbigniew.bodek
2017-01-17 15:49 ` [dpdk-dev] [PATCH v4 6/7] MAINTAINERS: update MAINTAINERS entry for ARMv8 crypto zbigniew.bodek
2017-01-17 15:49 ` [dpdk-dev] [PATCH v4 7/7] app/test: add ARMv8 crypto tests and test vectors zbigniew.bodek
2017-01-18 2:26 ` Jerin Jacob
2017-01-04 17:33 ` [dpdk-dev] [PATCH v3 4/8] mk/crypto/armv8: add PMD to the build system zbigniew.bodek
2017-01-04 17:33 ` [dpdk-dev] [PATCH v3 5/8] doc/armv8: update documentation about crypto PMD zbigniew.bodek
2017-01-04 17:33 ` [dpdk-dev] [PATCH v3 6/8] crypto/armv8: enable ARMv8 PMD in the configuration zbigniew.bodek
2017-01-04 17:33 ` [dpdk-dev] [PATCH v3 7/8] crypto/armv8: update MAINTAINERS entry for ARMv8 crypto zbigniew.bodek
2017-01-04 17:33 ` [dpdk-dev] [PATCH v3 8/8] app/test: add ARMv8 crypto tests and test vectors zbigniew.bodek
2017-01-12 10:48 ` De Lara Guarch, Pablo
2017-01-12 11:50 ` Zbigniew Bodek
2017-01-12 12:07 ` De Lara Guarch, Pablo
2017-01-13 9:28 ` Hemant Agrawal [this message]
2017-01-10 17:11 ` [dpdk-dev] [PATCH v3 0/8] Add crypto PMD optimized for ARMv8 De Lara Guarch, Pablo
2017-01-10 17:50 ` Zbigniew Bodek
2017-01-13 8:07 ` Hemant Agrawal
2017-01-13 18:59 ` Zbigniew Bodek
2017-01-16 6:57 ` Hemant Agrawal
2017-01-16 8:02 ` Jerin Jacob
2016-12-07 2:32 ` [dpdk-dev] [PATCH v2 02/12] lib: add cryptodev type for the upcoming ARMv8 PMD zbigniew.bodek
2016-12-06 20:27 ` Thomas Monjalon
2016-12-07 19:04 ` Zbigniew Bodek
2016-12-07 20:09 ` Thomas Monjalon
2016-12-09 12:06 ` Declan Doherty
2016-12-07 2:32 ` [dpdk-dev] [PATCH v2 03/12] crypto/armv8: Add core crypto operations for ARMv8 zbigniew.bodek
2016-12-06 20:29 ` Thomas Monjalon
2016-12-06 21:18 ` Jerin Jacob
2016-12-06 21:42 ` Thomas Monjalon
2016-12-06 22:05 ` Jerin Jacob
2016-12-06 22:41 ` Thomas Monjalon
2016-12-06 23:24 ` Jerin Jacob
2016-12-07 15:00 ` Thomas Monjalon
2016-12-07 16:30 ` Jerin Jacob
2016-12-07 2:32 ` [dpdk-dev] [PATCH v2 04/12] crypto/armv8: Add AES+SHA256 " zbigniew.bodek
2016-12-07 2:32 ` [dpdk-dev] [PATCH v2 05/12] crypto/armv8: Add AES+SHA1 " zbigniew.bodek
2016-12-07 2:32 ` [dpdk-dev] [PATCH v2 06/12] crypto/armv8: add PMD optimized for ARMv8 processors zbigniew.bodek
2016-12-21 14:55 ` De Lara Guarch, Pablo
2016-12-07 2:33 ` [dpdk-dev] [PATCH v2 07/12] crypto/armv8: generate ASM symbols automatically zbigniew.bodek
2016-12-07 2:33 ` [dpdk-dev] [PATCH v2 08/12] mk/crypto/armv8: add PMD to the build system zbigniew.bodek
2016-12-21 15:01 ` De Lara Guarch, Pablo
2016-12-07 2:33 ` [dpdk-dev] [PATCH v2 09/12] doc/armv8: update documentation about crypto PMD zbigniew.bodek
2016-12-07 21:13 ` Mcnamara, John
2016-12-07 2:33 ` [dpdk-dev] [PATCH v2 10/12] crypto/armv8: enable ARMv8 PMD in the configuration zbigniew.bodek
2016-12-08 10:24 ` [dpdk-dev] [PATCH v2 00/12] Add crypto PMD optimized for ARMv8 Bruce Richardson
2016-12-08 11:32 ` Zbigniew Bodek
2016-12-08 17:45 ` Jerin Jacob
2016-12-21 15:34 ` Declan Doherty
2016-12-22 4:57 ` Jerin Jacob
2016-12-07 2:36 ` [dpdk-dev] [PATCH v2 11/12] crypto/armv8: update MAINTAINERS entry for ARMv8 crypto zbigniew.bodek
2016-12-07 2:37 ` [dpdk-dev] [PATCH v2 12/12] app/test: add ARMv8 crypto tests and test vectors zbigniew.bodek
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5378dc5b-63c7-c662-4452-b700304077e8@nxp.com \
--to=hemant.agrawal@nxp.com \
--cc=declan.doherty@intel.com \
--cc=dev@dpdk.org \
--cc=jerin.jacob@caviumnetworks.com \
--cc=pablo.de.lara.guarch@intel.com \
--cc=zbigniew.bodek@caviumnetworks.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).