From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on0054.outbound.protection.outlook.com [104.47.40.54]) by dpdk.org (Postfix) with ESMTP id 280152B9B for ; Fri, 20 Jan 2017 09:39:29 +0100 (CET) Received: from BN6PR03CA0032.namprd03.prod.outlook.com (10.175.124.18) by CY1PR0301MB0745.namprd03.prod.outlook.com (10.160.159.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.845.12; Fri, 20 Jan 2017 08:39:28 +0000 Received: from BN1BFFO11FD017.protection.gbl (2a01:111:f400:7c10::1:161) by BN6PR03CA0032.outlook.office365.com (2603:10b6:404:10c::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.860.13 via Frontend Transport; Fri, 20 Jan 2017 08:39:28 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com;nxp.com; dkim=none (message not signed) header.d=none; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1BFFO11FD017.mail.protection.outlook.com (10.58.144.80) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.803.8 via Frontend Transport; Fri, 20 Jan 2017 08:39:27 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v0K8dNV7021447; Fri, 20 Jan 2017 01:39:24 -0700 From: To: CC: , , , , , Akhil Goyal Date: Fri, 20 Jan 2017 19:34:59 +0530 Message-ID: <20170120140509.4495-1-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20161222201700.20020-1-akhil.goyal@nxp.com> References: <20161222201700.20020-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131293751679233058; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(7916002)(336005)(39400400002)(39850400002)(39380400002)(39840400002)(39450400003)(39410400002)(39860400002)(2980300002)(1110001)(1109001)(339900001)(189002)(199003)(97736004)(92566002)(86152003)(36756003)(77096006)(6306002)(81156014)(104016004)(5003940100001)(8656002)(81166006)(8676002)(50226002)(8936002)(38730400001)(54906002)(85426001)(47776003)(356003)(2906002)(626004)(1076002)(2876002)(50986999)(76176999)(305945005)(110136003)(5660300001)(4326007)(53936002)(50466002)(48376002)(68736007)(189998001)(15395725005)(33646002)(6666003)(2351001)(106466001)(105606002)(2950100002)(6916009)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:CY1PR0301MB0745; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1BFFO11FD017; 1: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 MIME-Version: 1.0 Content-Type: text/plain X-MS-Office365-Filtering-Correlation-Id: 0efff71d-31ba-42fc-4ac7-08d4410fd886 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001); SRVR:CY1PR0301MB0745; X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0745; 3:4lx85qfi3ampoz6pF4dqe/KoyMuZwe1XuSSK0Zy6R3UgepbNSYIOcllRfk7oQLPCTsgSGAIf4sJ+qDxSRugO4cmfYWbbCN5SBY4HriPpm6xgcuDJkhKsqiztmn3oPDkk/znFsn1Lt5KH3XIB6E7lszFnRFi2vU0pdrHVCSE87+tNA2atiKnOYKAM7hNsoQsE9gehM59He12zG4CRvku5T5q1/RdkEE0INgL2Ov0mcVbV6Yr/ToyczpPWF5DcOyd5OV+tc+8CCM4OlIGWAfBgjvrqZSDWXpHIe51udZHLRNs5LRYbxBcKXm8NpHS+ZXlbfYhVrEfeJGM1LES0/t5xr44GVKOkD768O1oXCnDyTEzgKFCbK2VkArvjo4AeiPv4; 25:kUYV9XIX8rDTKyx9QhrWgn0hyTblTf/8a62klHhzjMbxQHm7b+ykDdo1C6trHqwP5yPMm+N9XTXvip6NyXdeQ+olbxOkNo5C1sA5YNd444XiwLmkfyfub9F14bOzM3491rbNgamSCIaaTAzOsPnai1CqexQdzz65WwIi0phipl5s32MLE1EZQEVGdxNutTgNKEqj2aE5Gx8PhtWaOt+IVHIzgNM7hEAgxW6qKiPqXpXEOxAtlnS2HY0qfgvlNX5a+pg+m+u6k1Z+zNPb17It0luR4O0kYXSxjcafXOubzYawMB1RAbSmW+iKQDRLKBkJKM4aCmYYix1FkxWvGBxVUUwCg/gObcC63cq5Sb/Zr2+w8TTwHaicbupISUurLJOw8NPLRVdplK6zgj/8jLco7eslEI0KkO1aJwwSHgsaMrgPIFLRR2Xyq/ANIbvbWQEsyqErzLMsq3SpI6BjL2TkRw== X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0745; 31:B7kde5yJK8fHngkZnNFuhtahhrZj1dNnkybLl1KY/U5G2r5Ec7GDlIkblsTl5EAtwlpdcH/NIL0UzGwqefAOIzuSsWP+K8euwTgGh5JENYukM6Zt3R0buDiMXBYw5Asv1UY6ZiRU47IgbZ56pjjiQkozSz0BFm0DFZGMc+z7Ig6JirRgcovDg+3oBBpH0woeMARTVvKi2sb03urrcXo0dbyYKg9en8eAR0Nmo1Uoz9txPzejlPLh+Zrm0vsfj+JHsIBYvR4o5NPWkhZwl/rzUw== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(185117386973197)(275809806118684); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095060)(601004)(2401047)(8121501046)(5005006)(13023025)(13017025)(13015025)(13024025)(13018025)(10201501046)(3002001)(6055026)(6096035)(20161123565025)(20161123563025)(20161123556025)(20161123559025)(20161123561025); SRVR:CY1PR0301MB0745; BCL:0; PCL:0; RULEID:(400006); SRVR:CY1PR0301MB0745; X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0745; 4: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 X-Forefront-PRVS: 01930B2BA8 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY1PR0301MB0745; 23:KBggBSfdEILZTnCE+xOkDBNWM/btf17d+xeJUVl?= =?us-ascii?Q?KLSRwP6imp0tk/SnKj7RvNeh2R+fa+I6/MSWpb9Px2l2HTzgr3l4K4hKt5Vp?= =?us-ascii?Q?kO/kjU6NsW6bOW/FT9woq0shBjRfs6VRHjmr3LX2b9+m1tU2jjPQ7sfFgqmt?= =?us-ascii?Q?Oq/muCu+Rn4fo5SX+pHJOzX2mdjXZprrfcvXXH1kV/6G0zG5wK4Eh2nAOcgN?= =?us-ascii?Q?TzLUlsB2sgtLB46nmNA5PJtodPLsPihP0YGi/uK/MnTYozbmMwGCLU/mXhfV?= =?us-ascii?Q?cX/PQ0OttkUjm9RkHj81jPSA8GbBqfSp33sGWbBCRoqj0zBet5jWzoMgX3qi?= =?us-ascii?Q?2lI31aXkla+2d8FxqqUc0UU36CZdDn5NAJ6KKjQg/6Gh2SnTWBluadUQ3yx9?= =?us-ascii?Q?u1/2/iHu1PNLjxzdS+KiyswCbBqgG3KK7dgvDDED3g8473C6AHSgvH+rWpiJ?= =?us-ascii?Q?bfobUqq4wCPRI3jJW+GC6xOxOvjaxDcn4yL2txmKI9PyamPtPCzPBbb6Df3e?= =?us-ascii?Q?x+KomAx/LlBdpmuv5Kao6KaskfjNMe2kjIM0XUidKN+os/nqAPkS4A2XvIWH?= =?us-ascii?Q?KjhzLfGaXlRT97hGosSjrEx11Z9nA3BKTE5R1db9yMU6fTuifcxgpdRueix8?= =?us-ascii?Q?hQza0tgvj7GAt3yx+OcZ3V2DtXq07DugedJu16bsPPB2eXushodYjJTRXUGn?= =?us-ascii?Q?HKMex277rDEEC8ZbR4I8oH4KJuIsSoi93dxSaAwx8R0iN9PD26KFVSeNv7dr?= =?us-ascii?Q?3vvBiQebx2i89uJ9g4gypSzZNOX8H0RfWg3d2RLRQn6YiYe9FcjFzBmItJWS?= =?us-ascii?Q?xSXTCMvPzhR44olp8QQIF3gdMZzGRBD65x7nZN50yXcV0QPKzfKpIv7XqOR+?= =?us-ascii?Q?Q1f8mwIKmhAdZjn/qi8eHzqsAUbgM9ktUfMB2Uq7bVqM0/qTalf40kDz3Tt/?= =?us-ascii?Q?O9tRARajIazDM3gQW2vOI8dIoSzqSo/hIcYkgQLNF9oUqe8ELObxQAxEL0mm?= =?us-ascii?Q?GxX8mvTBNlcXKEAwdJuy+INbs3jbvoEHx5O/KC90ce2iS/3Ee5VjkMy4JKtB?= =?us-ascii?Q?qJkRWaH3gSDK97BJyqKNMtdZvZBN2N101UKeuEbzFn5kKCXaDhhKn4acab9k?= =?us-ascii?Q?XZeGthhzavqsfDq3X0WOZBU2ObYdnWQS273fITbW/x8Ejm90C92vLuOoJSWV?= =?us-ascii?Q?0O2f4YKI1XbE4rYElTIXFPe5Tf2ECpcOT9HaxN0YvkLZ8yg5L5W7xXeTcfHl?= =?us-ascii?Q?AsLqqYeP+2yTUpZVSvkcUOpT0/hoeqQfiiHgZetyyK/UKlsZdsUwyDrREvYN?= =?us-ascii?Q?4QMX10/OMkrwSoFu9RW3koMKK/Hwo7+WrwJmu/IXiFoVNr0ovw+BI1fHUXo1?= =?us-ascii?Q?aIAOlaRH21MAZXFzyIu50+7Y1eA83V/ky3xY16jRYc/re9a0WszPSVqyS1w7?= =?us-ascii?Q?l1klx617sTg=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0745; 6:IMOpAh7o+lmyC6t/bZD679kdvyZFTfsHLfDbQopxezevJCAWuKRbb1m5m7fkG5+l4oqXzEMGBROniAfzDw6Q3+leMxHTOIzJeanBx1zmYUVpbfFPZVSpPoqH88+mJYqTZll0nR2Sir378Z/40vpHe9ld8FkLfE3Z57F5SxweahrWn7Ev2eunyVdUf0FSGS9AXcTp30Od4kBC88fmavkgo2DA9eW42DX4L48Xqqc2w05QzC69xwwY5Sldqg/ItztBy71bDWMQjemXcEtBbyb8k7XCwOzD6M+cwcFDKlYBS2OobfQNrG+F5Umb599JscCnrUY7+Opi23GPiIFa0uOciQcAS+USWyvMjmttFivFDlWSQ3uAThA/vywS8lC/rgnkhJKSiOxhIeSFlonPs/zzxt8nkw/2GKl/tXeux3MPN+OhafAOzNimreMVc4gJdFT/; 5:zEw0GXba9P4cR76NOs3/GY1VaylmOruT8M7VZVB6zP+ABZcjyPR6wRQv9nWnmZXO9g1mSPoJ87WeMnmn3kxuz1/FfvDo47NvgLK/0Sh/dzFNqNrA/QyTSLDdVK+AUq9U0ta/7cRcteOzOK9l2pMNoEY4KdTUG29qy/WWroI2Dgn+muKt+UHFOSdOz+8LYwu8; 24:pLY/VLRcu20mpsO559L7UsArhqUQJ/X0jtoPzjZtwO0fa0rxAN6RoNUp0WpsxgpAx/zr5nWCIPyPJYHG6a9xW6O9w7s+a+I93Lxwc9itJkI= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CY1PR0301MB0745; 7:NWqkCGlnVIh6OfSbej6g+Show7tYf8GP/4ea5aLrgJ2HWW5SH/IA1m+ShUUYWDNnJsSwe1dO5yNuWh8fQZ4LUYVXytFuGBnhRIDOemZrDmhs8g9BQfYp/HtuKUkihIBy2NtVfbGbe+C4WoPhpy+rj3fAJYcXxLwOK+8ImloL4yBoKmrZP0oTOnSgIe3kAS25bOx27kN1/ogI1Buqj1Qft8O2XyEmGAcqzMxmOawPx7kaeSyjXHvphHEFyAejlCuZDxh6/4dCNI4ThIUKaH6qCfyi2iXChbCK07qtHGDyYuJE4NvSjH4t4UoSfbj7YAgurjPZVR+wwISx3V9hLJg6fa14BJNWEdysQu9nNQe+hio07Ft6O5kp089hlXj4UMbUHQYAxF4dcvuthd69kpJrvOwaa7AO/m7gX7/bQTjqZ5LnFeoY88Bop7vtHKltBdiGpGloYj+3ZZWpboA+v8fXQA== X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jan 2017 08:39:27.7205 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0301MB0745 Subject: [dpdk-dev] [PATCH v3 00/10] Introducing NXP dpaa2_sec based cryptodev pmd X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Jan 2017 08:39:30 -0000 From: Akhil Goyal Based over the DPAA2 PMD driver [1], this series of patches introduces the DPAA2_SEC PMD which provides DPDK crypto driver for NXP's DPAA2 CAAM Hardware accelerator. SEC is NXP DPAA2 SoC's security engine for cryptographic acceleration and offloading. It implements block encryption, stream cipher, hashing and public key algorithms. It also supports run-time integrity checking, and a hardware random number generator. Besides the objects exposed in [1], another key object has been added through this patch: - DPSECI, refers to SEC block interface This patch set depends on http://dpdk.org/dev/patchwork/patch/19692/ :: Patch Layout :: 0001 : Documentation 0002~0003: Cryptodev PMD 0004~0005: Run Time Assembler(RTA) common headers for CAAM hardware 0006~0007: Crytodev PMD ops 0008 : MAINTAINERS 0009~0010: Performance and Functional tests :: Future Work To Do :: - More functionality and algorithms are still work in progress -- Hash followed by Cipher mode -- session-less API -- Chained mbufs changes in v3: - Added functional test cases - Incorporated comments from Pablo :: References :: [1] http://dpdk.org/ml/archives/dev/2016-December/051364.html Akhil Goyal (10): doc: add NXP dpaa2_sec in cryptodev cryptodev: add cryptodev type for dpaa2_sec crypto/dpaa2_sec: add dpaa2_sec poll mode driver crypto/dpaa2_sec: add run time assembler for descriptor formation crypto/dpaa2_sec: add sample descriptors for NXP dpaa2_sec operations. crypto/dpaa2_sec: add crypto operation support crypto/dpaa2_sec: statistics support crypto/dpaa2_sec: update MAINTAINERS entry for dpaa2_sec pmd app/test: add dpaa2_sec crypto performance test app/test: add dpaa2_sec crypto functional test MAINTAINERS | 6 + app/test/test_cryptodev.c | 106 + app/test/test_cryptodev_blockcipher.c | 3 + app/test/test_cryptodev_blockcipher.h | 1 + app/test/test_cryptodev_perf.c | 23 + config/common_base | 8 + config/defconfig_arm64-dpaa2-linuxapp-gcc | 12 + doc/guides/cryptodevs/dpaa2_sec.rst | 233 ++ doc/guides/cryptodevs/index.rst | 1 + drivers/bus/Makefile | 3 + drivers/bus/fslmc/portal/dpaa2_hw_pvt.h | 25 + drivers/common/Makefile | 3 + drivers/crypto/Makefile | 1 + drivers/crypto/dpaa2_sec/Makefile | 77 + drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 1660 +++++++++++++ drivers/crypto/dpaa2_sec/dpaa2_sec_logs.h | 70 + drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 368 +++ drivers/crypto/dpaa2_sec/hw/compat.h | 123 + drivers/crypto/dpaa2_sec/hw/desc.h | 2570 ++++++++++++++++++++ drivers/crypto/dpaa2_sec/hw/desc/algo.h | 431 ++++ drivers/crypto/dpaa2_sec/hw/desc/common.h | 97 + drivers/crypto/dpaa2_sec/hw/desc/ipsec.h | 1513 ++++++++++++ drivers/crypto/dpaa2_sec/hw/rta.h | 920 +++++++ .../crypto/dpaa2_sec/hw/rta/fifo_load_store_cmd.h | 312 +++ drivers/crypto/dpaa2_sec/hw/rta/header_cmd.h | 217 ++ drivers/crypto/dpaa2_sec/hw/rta/jump_cmd.h | 173 ++ drivers/crypto/dpaa2_sec/hw/rta/key_cmd.h | 188 ++ drivers/crypto/dpaa2_sec/hw/rta/load_cmd.h | 301 +++ drivers/crypto/dpaa2_sec/hw/rta/math_cmd.h | 368 +++ drivers/crypto/dpaa2_sec/hw/rta/move_cmd.h | 411 ++++ drivers/crypto/dpaa2_sec/hw/rta/nfifo_cmd.h | 162 ++ drivers/crypto/dpaa2_sec/hw/rta/operation_cmd.h | 565 +++++ drivers/crypto/dpaa2_sec/hw/rta/protocol_cmd.h | 698 ++++++ drivers/crypto/dpaa2_sec/hw/rta/sec_run_time_asm.h | 789 ++++++ .../crypto/dpaa2_sec/hw/rta/seq_in_out_ptr_cmd.h | 174 ++ drivers/crypto/dpaa2_sec/hw/rta/signature_cmd.h | 41 + drivers/crypto/dpaa2_sec/hw/rta/store_cmd.h | 151 ++ .../crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map | 4 + drivers/net/dpaa2/Makefile | 1 + drivers/pool/Makefile | 4 + lib/librte_cryptodev/rte_cryptodev.h | 3 + mk/rte.app.mk | 6 + 42 files changed, 12822 insertions(+) create mode 100644 doc/guides/cryptodevs/dpaa2_sec.rst create mode 100644 drivers/crypto/dpaa2_sec/Makefile create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_logs.h create mode 100644 drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h create mode 100644 drivers/crypto/dpaa2_sec/hw/compat.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc/algo.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc/common.h create mode 100644 drivers/crypto/dpaa2_sec/hw/desc/ipsec.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/fifo_load_store_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/header_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/jump_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/key_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/load_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/math_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/move_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/nfifo_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/operation_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/protocol_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/sec_run_time_asm.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/seq_in_out_ptr_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/signature_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/hw/rta/store_cmd.h create mode 100644 drivers/crypto/dpaa2_sec/rte_pmd_dpaa2_sec_version.map -- 2.9.3