From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-bn3nam01on0072.outbound.protection.outlook.com [104.47.33.72]) by dpdk.org (Postfix) with ESMTP id 8CFB11B152 for ; Fri, 5 Oct 2018 15:01:39 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5Fc4Ega6j6WavlONKl19gt4LcZcE4MtYq7gkZLulJvE=; b=H4Uhv9z1b2Cy2UPlJcqGIlhhAaPOjv72UppLYGMyZaT71ROfY9n1BaOYKMqFDMe3pz10m/u2fjk/lBoCTGmTwjHnNN7reMOCDMJtvyOo4joLh0C2u0CFSyqesIGAN5uS0DX4FixedxhIV2FJyJ6M2Z6Jdiqp6KvBkH024Gpk+xs= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Anoob.Joseph@cavium.com; Received: from ajoseph83.caveonetworks.com.com (115.113.156.2) by SN6PR07MB4910.namprd07.prod.outlook.com (2603:10b6:805:39::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1207.21; Fri, 5 Oct 2018 13:01:34 +0000 From: Anoob Joseph To: Akhil Goyal , Pablo de Lara , Thomas Monjalon Cc: Nithin Dabilpuram , Jerin Jacob , Narayana Prasad , dev@dpdk.org, Ankur Dwivedi , Anoob Joseph , Murthy NSSR , Ragothaman Jayaraman , Srisivasubramanian S , Tejasree Kondoj Date: Fri, 5 Oct 2018 18:29:09 +0530 Message-Id: <1538744363-30340-19-git-send-email-anoob.joseph@caviumnetworks.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1538744363-30340-1-git-send-email-anoob.joseph@caviumnetworks.com> References: <1536033560-21541-1-git-send-email-ajoseph@caviumnetworks.com> <1538744363-30340-1-git-send-email-anoob.joseph@caviumnetworks.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [115.113.156.2] X-ClientProxiedBy: MA1PR0101CA0036.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:22::22) To SN6PR07MB4910.namprd07.prod.outlook.com (2603:10b6:805:39::16) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 15c28644-c3e9-4281-7380-08d62ac2b00b X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:SN6PR07MB4910; X-Microsoft-Exchange-Diagnostics: 1; SN6PR07MB4910; 3:JCtgMzvUGbqaTQWo97L4kQxSK64A05/E8N0oP0PPaPd3zTv/PyZ4tcw3/HcM5ydKGAZ8VL3jPmlDD77HKojysn73BVXgGIk//XnieLSw3dYF+T1WYdxRK2yZeAA51ify4E4vgq+/N/nVw4q66+cxbG/tFn/58yqHIPrqRAr5rBexCmaSh4OWo5vJDCO63DfS5Nl/ef6+8pFCPDXFa518LJYxUVpE+SBAwVC4acRwLRgcP+/ekNfSrxvtAud1dEVr; 25:7kdAJ2vrsZ5VaLIC0cfMpWCtLPT1jLXvRTRdGGr8n0TIG5b473WUM+EetCAl0cwCPxmOnc1gViESP3XLAj+/tshQyOB3G7cUDDSdmN4RqN411iAf01u0HAC05wpocf38/z6AKlHuq7AzzoKWxiZwnDObaGd2fsXoTe+c3W8jlDFVqlESG5NDHDTSBhxm0cBwdumuyV60jl/0Q0oMoCTUnB/RRFrSoDiwlgAzYrNFBDBCe0VgFfsUtBYufnJKHCKR7VZ86kb/FeusfVxX11rsxI4GmDCyFk4hgpehI1o2foxXam0LhiMNjm/zKIrUNaL7CHjcGT7/CuVIBk6W2AP0/A==; 31:77OpNr7OXrLUR6xqTWAOgG3akmTADZ9BcKERT5a2GhF3h91p2rAYoGK9SsmMIrwQiZzXS0V0VhIwOgzlG783ne9qbPbzZOHISTq4q62Rwb/o0f0U9RyauxyW7fQ2Vc+QAaAmiG4mJM8xeEihSDruuB1VegXDFnn0sZhbx6WGiyeEQ1QAcHicpKsfHGOem5dCao+S/e+25vspJ5b+TE7GWKTVPUhVhHvzryv5pD8vP1c= X-MS-TrafficTypeDiagnostic: SN6PR07MB4910: X-Microsoft-Exchange-Diagnostics: 1; SN6PR07MB4910; 20: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; 4:oWvx0VqrhkqTsvafj4g3jtKNm+jzK0wR6kjrHTAALk4WyUmZV+N3t5OgbewbSAEO2RiODoNX96z/EPhWkW6ccepJ7K2KKYdAXuzQ++YWknLKkPjipNZry+Y3ZE2EP/3CYuQBeQ4xXQkhESpUnbSwZo4SYAzedSvekG8rGqfhlRM9xg+5USYYcFb3a+Xf2/jLMcIrGHoV1OLoJKs8xYiKZBzpgI3O+FRl275T4gz96urcb0wlme6G38oEeEQm1K95MKugbYrBcAbCaAIvLtQXgg== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3002001)(3231355)(944501410)(52105095)(10201501046)(93006095)(149066)(150057)(6041310)(20161123564045)(20161123558120)(20161123560045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699051); SRVR:SN6PR07MB4910; BCL:0; PCL:0; RULEID:; SRVR:SN6PR07MB4910; X-Forefront-PRVS: 0816F1D86E X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(39860400002)(346002)(136003)(396003)(366004)(199004)(189003)(51416003)(76176011)(11346002)(50226002)(25786009)(8936002)(48376002)(305945005)(186003)(16526019)(110136005)(6486002)(3846002)(446003)(52116002)(6116002)(81156014)(8676002)(97736004)(5660300001)(50466002)(4326008)(956004)(42882007)(2616005)(68736007)(478600001)(54906003)(7736002)(81166006)(6666003)(16586007)(107886003)(26005)(55236004)(66066001)(386003)(47776003)(6512007)(72206003)(44832011)(476003)(316002)(36756003)(105586002)(106356001)(486006)(6506007)(2906002)(53936002); DIR:OUT; SFP:1101; SCL:1; SRVR:SN6PR07MB4910; H:ajoseph83.caveonetworks.com.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: None (protection.outlook.com: cavium.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN6PR07MB4910; 23:ooSY2ji0jbjPWLO7HUXUhDgo7t18xbQTK/buWuTmF?= =?us-ascii?Q?ZnwNGC0Ovfp3iZyUQk08ovDXuwkQ5AwHDAT4RYNdZGibVksMCgm7bkTFu0ZA?= =?us-ascii?Q?yf15cXX4HZ9rJp+fqq7EVyAW9h4t1j+XCE8mmy6Y5NZH67drpjgdQPoFbfbT?= =?us-ascii?Q?utWP1qXoTukYHbHIMZoBCkGZOUUpAAp4d4i+i5SrVJ2BFCpIy7n72B7BMemN?= =?us-ascii?Q?9zI7spP3KUjqh+0nKKOXQkHdmqb/ILr3/wxcCAuO06Q8+jxaJv601eI8zvCE?= =?us-ascii?Q?rrVLPp/Zdf5csgb/YCHtOFgD5yDH9MtXDFCRjUVSEAqZVo4ejkKO5dKgLB93?= =?us-ascii?Q?gZvanK1QhtYiX9PPCe35tNtscpznYUMMnJyulN6Zrm2mXZWzPymJNs+o7JPE?= =?us-ascii?Q?OqDyaagS9DLW0E4GOb0YbNGtAgFcsag8efntc1X7Wq7ZfyQjt+TozxW4RrKx?= =?us-ascii?Q?cm/ugxKgaZPwqJqkzD+ANs5Mc3xKqnxgzmgXFdUc4Sn2iPWmwpzNGyxT8Wxc?= =?us-ascii?Q?stjdlo2XCdYeQlY63lj1GUTnKLAOgn/pCC8PGsT9XPT3ztKo/Ae5z1c4CMQs?= =?us-ascii?Q?FGNtVqJhb9OMNaEAV4uKAG65dWCTgZTEuZI4c1DX8L1kiN2cFN8X6uLujLq1?= =?us-ascii?Q?YqW9TtHFu3N54WEyM4QYw3XREVGY+OLWH9yWvHXORIj+LdTGMdM8Fbesy2pD?= =?us-ascii?Q?YTc6Kp75I7n8fBAVt/rbhKPuT6jTXrhgFH4MP5Lmzc8PWfV9wWwHdlGt5D5K?= =?us-ascii?Q?jUhwmVbXLExD1ywpszuZqBKWSJqWi8moTV24+aWwYVZvUcz4/B2mAs07xMJu?= =?us-ascii?Q?UesN3PsMGpgqQzJQx6DGFzsPYH7VZ2KVKr6JBBBIK5YbubyDsdr968Z+aovP?= =?us-ascii?Q?07bC1udn/Dv0ZFEQp4uTGeTwUz5wdWD22PPeauX9kxLmFVl5iuSb4cB5pyfy?= =?us-ascii?Q?G6ZtLrzCURaI148v0Fp5nfNSNm5A159PZa4DENcOLXwJtJEYDpyApn5Axsjt?= =?us-ascii?Q?vE3los76/hvibMNaqGWAI/zOUwWuIEi+jNt4F+oy4h/ALEHsSaKdkHeh4kXn?= =?us-ascii?Q?c+dJhlm0C8yx9/gXgH5A3e8Adw8Cih1Pq2E3IbD8GmFJ1901ZWD1E7B9f63W?= =?us-ascii?Q?NNbFE3m51adyXP9KRUJJy/D+tMaZi+CaQy97LlRe2fY/LiApidHVOaPly176?= =?us-ascii?Q?i7xVF8aUZO5UODcoNgQCBNGnxIhpjWB7oDfe8L0Hcxg65fNFuWwxMIgXR+AY?= =?us-ascii?Q?mARAG4Y9NKlqaoupVCE4VymoduzZLvAjFhgfA9m?= X-Microsoft-Antispam-Message-Info: rjy3nv4BUcSFEssnKwT07ro1HSAKVSrr9oJ/foMmiBgCYj5DExDFVKa429/aeYgX7RSCaH96fgFtJ4YVem4cjVPI/ilBB1KtZdq50AUPygazgn/t7U/mlLebJjBBj9kgI65/u1GOHE5Tx53Qdje9eitBxErEqxM6Cf8Nsm1aLyRioJD3gIkUZ4WtE8FoDk1plNLsdlYnCc7dO8y/jv97B3YAEjYgKV9CTyWdFqDJtIW5FU21Qln6W1TrnjMYeONSb0QkGM/aFryEJwy6C9FbX0AIFvQEg+vUSy9WpHWpG551DlBYmxqp30jOjJkaxrbVKBki9RZvidLBiDi/mB0kNbFHoVJSI+wo/I3UTi85+S4= X-Microsoft-Exchange-Diagnostics: 1; SN6PR07MB4910; 6:M4iDjq2gnjCQG6mVQktzGZQpcS0QU9/RINu8ngJxEtzvq1trfYv0NBZLI1W+FJ8nJ2fyXVbhetbsXTnhnO1jLay+zFJPpI3EnLX2xziqfuydCaSc8ua/TxnZy6Z+lYY6Dxlaqi3hRHi1E19Of7xhp/rJEDR0WaaWZEEzBT98YB79AmO0TmMlJ6Nb1Hl6FRBLqEPJmvYhQOpRgh6KyabEdCtPFtv3N6jSQol2IICOqXI63qyMXT/6zcjb1aoudY10Wcf0FyT3DyLJZP1SJeiBcT+lMZ/hhtuEOnztC93o2RvOY7DNYQFgSjybrnHuyIOlf96K87pMFCVMvK/V6r/wgPXtIQGIusGA25cyyXUH12geiZs8DvYXPBZVG+A9tO9kBq6jtZriWA1IgQWpEj2jiy+n/dGftgDIAZ71uVSQHLEwueI2SzGyhD5ootwDNYZ0UO3+VLwEvbibXb7liPsaNw==; 5:Tr1qoZKtDpSVxkAO+jHqwKW3ro75np4UQfgJjOoDEbr0T8T/2ysCy8LjYWE67UKwbu+0NGSBensOn3bncm1Gyb7MdCwaX/VFcr7Z/7ufLqQkymRcWjRPcNaMRyPgl7JJP3xqowxSa2i4dpiTJPlVMlNlbXRb3gTfBGUjLPDx+Ls=; 7:OvJtBLHul56sWd1YnVK3iggXBoQJwI/z5ovd0uFaL9/78DQm1KA473uKolHRYU+C6jH7FrR7LpcN2gRQoF//rPIIK8nswgzZp1g6MrgptlZF+Ns9OYIygbcovH2k6CzuVmwD2FkCbUH5i6XaD+7VnB9EdowMrIRK8a4rj6euiYivNFAy7sPIzSY73Gjg89xVZhirFbI2OwluDpLM9qhsLSkdVJIXheS/dGneaqtdO4xmkQjSMPJLgVlWwRgsjziw SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Oct 2018 13:01:34.3986 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 15c28644-c3e9-4281-7380-08d62ac2b00b X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 711e4ccf-2e9b-4bcf-a551-4094005b6194 X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR07MB4910 Subject: [dpdk-dev] [PATCH v3 18/32] crypto/octeontx: add supported sessions X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 Oct 2018 13:01:40 -0000 From: Nithin Dabilpuram Adding AEAD, cipher & auth sessions support. Signed-off-by: Ankur Dwivedi Signed-off-by: Anoob Joseph Signed-off-by: Murthy NSSR Signed-off-by: Nithin Dabilpuram Signed-off-by: Ragothaman Jayaraman Signed-off-by: Srisivasubramanian S Signed-off-by: Tejasree Kondoj --- drivers/crypto/octeontx/otx_cryptodev_ops.c | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) diff --git a/drivers/crypto/octeontx/otx_cryptodev_ops.c b/drivers/crypto/octeontx/otx_cryptodev_ops.c index 653f372..16fad49 100644 --- a/drivers/crypto/octeontx/otx_cryptodev_ops.c +++ b/drivers/crypto/octeontx/otx_cryptodev_ops.c @@ -293,6 +293,23 @@ otx_cpt_session_cfg(struct rte_cryptodev *dev, chain = xform; while (chain) { switch (chain->type) { + case RTE_CRYPTO_SYM_XFORM_AEAD: + if (fill_sess_aead(chain, sess_private_data)) + goto err; + break; + case RTE_CRYPTO_SYM_XFORM_CIPHER: + if (fill_sess_cipher(chain, sess_private_data)) + goto err; + break; + case RTE_CRYPTO_SYM_XFORM_AUTH: + if (chain->auth.algo == RTE_CRYPTO_AUTH_AES_GMAC) { + if (fill_sess_gmac(chain, sess_private_data)) + goto err; + } else { + if (fill_sess_auth(chain, sess_private_data)) + goto err; + } + break; default: CPT_LOG_ERR("Invalid crypto xform type"); break; -- 2.7.4