From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0064.outbound.protection.outlook.com [104.47.32.64]) by dpdk.org (Postfix) with ESMTP id 1CD8D7D82 for ; Thu, 24 Aug 2017 02:03:15 +0200 (CEST) Received: from BN3PR03CA0051.namprd03.prod.outlook.com (10.167.1.139) by BN6PR03MB3313.namprd03.prod.outlook.com (10.174.233.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1385.9; Thu, 24 Aug 2017 00:03:14 +0000 Received: from BL2FFO11FD056.protection.gbl (2a01:111:f400:7c09::194) by BN3PR03CA0051.outlook.office365.com (2a01:111:e400:7a4d::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1385.9 via Frontend Transport; Thu, 24 Aug 2017 00:03:14 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BL2FFO11FD056.mail.protection.outlook.com (10.173.161.184) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1341.15 via Frontend Transport; Thu, 24 Aug 2017 00:03:14 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v7O03B0g026464; Wed, 23 Aug 2017 17:03:11 -0700 From: Akhil Goyal To: , CC: , , , Akhil Goyal Date: Thu, 24 Aug 2017 05:31:13 +0530 Message-ID: <20170824000117.32186-1-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 X-EOPAttributedMessage: 0 X-Matching-Connectors: 131480065947026919; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39380400002)(39860400002)(2980300002)(1109001)(1110001)(339900001)(189002)(199003)(77096006)(1076002)(53936002)(50466002)(50986999)(8656003)(48376002)(5660300001)(97736004)(104016004)(86362001)(36756003)(305945005)(356003)(33646002)(2906002)(54906002)(105606002)(68736007)(106466001)(85426001)(47776003)(50226002)(8676002)(5003940100001)(81156014)(498600001)(81166006)(4326008)(626005)(8936002)(189998001); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR03MB3313; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BL2FFO11FD056; 1:v6boCvBqErMgV6yqgcoKluzx/4e3RsEElzRIjYJ6emgqVi49271i1348f/9D7Er8DBIJ+ivBtdtJDDlfUWFjn36nDrQG5x6iyJWbskFxnCNeOMs5WfsJ2SifuSSdsFcy MIME-Version: 1.0 Content-Type: text/plain X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 72628d3d-3d11-4874-e488-08d4ea838445 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603031)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BN6PR03MB3313; X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB3313; 3:fVHGmFhi77nWlXtZc1WpZlNo9VvVo4Wra3VmJ4eSnrzgzwrk/8gGCGoBLppr1B6ZheBUx7DydFSqG8Cr0itKhLiOMsgKEEi7ZurPSBiH2g5kD53biKMssGUVIy235Xx0F/mv9/t6n/c1gkPSGth6uKNQnVr8bxZWZmS5I+Fn511ALLIok1AAs5yH1D+/9yImnKLxAuuRz9u8gzVT2Eqeg70uCP3DiPgzxI9wlM9lhI5gClZlmh16NpobTcVI8PfQrNc1L8h7EVBzCHCKapVrPZZN6yQxYEmI81mJDK/OrJgrBjVowFIRfpT5vzQ4hWoKfESsUMuIKGf72fqXV+9ugd2ZA58JYAEs+66q4Q5Z18E=; 25:bCA+ySTLtPt7DpB9NkEeB2S00LE2g6auUJuCOi6R23aV5y+yzjmNx61Fd3UMOMvpp9HS2a+yMunsFcgzD5WEjW0uILtZtOIxEGyvF2EZ8hnXsfjynZiqBizaAvJzt2Jflgm+Lk15oyZEIExc43tBDeU+LsqNDg0nKKKh2wSw2RUUfBcRMKD7pBR1KUXQCgnZKY1l13bOxjI3/13kRrdS5d3+S3tg8JYMbfISK8qHNsev1a2TjK7mfScA8sxe/ZQErkvLq0ZO50GlKoxBwHXxe85Q8OyQcM7vpSjwX2pDxRn+khIgfmJy3dff4ICNtqEGj1VL+EQ2hMj+nhlHpcqTBA== X-MS-TrafficTypeDiagnostic: BN6PR03MB3313: X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB3313; 31:7LKRzuTJswKG3VPH/OwTrFs2TKmWfqArxchIIsm01fb2dDPaDsd9uwj2FtYGo4ZwPDlRCPdSAUiGT+lJo00GIv9SDUuMCBndAWuGL4H1U5wUS1Pn05PClWPzRxhGi0Um9GVdWDZvBZbGcnmseH3Icq5BTK0/MGvX62+flV4Hyiw9BaxQzscHgYfHUwzRNtE+84rsVllMD1n+uFjbkmKoI3NytkM+OHDyH2YIH/Jv3N0=; 4:mX3p/wUYRWXeqNNg+khlDyFFdXpuyHsU4QDos6+9okXLqsKf4eiU5vr7mzN3k7qF2JA0GaPRk/jjxkifSZ+bGtXI+98Yp2CXpO/2T+thjTn976RKCmZuTiCh/aDoq8TqFsSSgp+Ef3rwCSJ7Mh8nJF47gLw6Acqsziwmosy86s9MY1y/6J2MjfM9fgmGjqMtBERgh11qxM+uQNodsGBv62GD18xAueSjqwVceAcsmAVLkw/VQGmZz8lqAfqY654Rrq21bS9hZtJlsKJNs7S04f3hE7vPMlWKAs+XX3vxhlY= X-Exchange-Antispam-Report-Test: UriScan:(192374486261705); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(8121501046)(5005006)(13016025)(13018025)(100000703101)(100105400095)(3002001)(10201501046)(93006095)(93001095)(6055026)(6096035)(201703131430075)(201703131433075)(201703131441075)(201703131448075)(201703161259150)(20161123556025)(20161123559100)(20161123565025)(20161123563025)(20161123561025)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BN6PR03MB3313; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BN6PR03MB3313; X-Forefront-PRVS: 04097B7F7F X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN6PR03MB3313; 23:2rM0ohCb/+EPVYhFGXVtYbf3AXPOVKsZYit9A+ZD2?= =?us-ascii?Q?g5LTrJkC6cLXGVO0b3Xkqa7iz+gMZDydLZt7O8KIJhm+qHfc4A2Aj95uKLh4?= =?us-ascii?Q?4sSqBlSIj6hojhYaKCdJ4ZckbQgL8BtbwCkTNvQbxmAjljw1QHUz2nZBo0oH?= =?us-ascii?Q?z6j7KCjCmrx+4Dn4E9sjGQKQcr6nAV1Msdm1mMHJMGr6WvQqm+KsMgoYVcZ2?= =?us-ascii?Q?yBQ6O1bN3vOtqd5lNEfECfgzEKWDsx+CFZUzhBkCWr3HZRmvom4KSCisoki6?= =?us-ascii?Q?0QgloaMgv5FAioiGGSJCqFfhcKijItXHj8f9RaRY4ljV8Jn7kGpH6OSl/MwC?= =?us-ascii?Q?nj9mhcfWiwibKRQwfe5R69F0vwIFb6l4boBnyIUysdd8My7Gkfhwy2k07l5p?= =?us-ascii?Q?37OuxT7X2FtQhKiJfh/0MhqXZ8zzn+6kCBOX/YYwVBa+1TSB9kc/0+EgG+CJ?= =?us-ascii?Q?x9eCo77SnUKhupC7CrtBtXzivPXJYBUzpaUDr2VtvFkD9FhEl2f0LLhMeMB5?= =?us-ascii?Q?PBoR4MNjYTPcoAEPLGVMwk1xobrE6uVqw2sW7QhnQb5p6CNbUWfhcL1fkcDQ?= =?us-ascii?Q?F2cKVIwwBkZl95TScbKIlLgQd+WKsYsDPa09jJPdAtvj9c8pUZkTmKW4F8FQ?= =?us-ascii?Q?3sgFgGi2UPwu4mb0xgkJryATSm78oWQ8Xa7TezsQRdzM/M9xcqzABFhSXVDS?= =?us-ascii?Q?x/6NPmNgEgEU6V4y4cN93ax7HfZU/ZfKHiEa+uHLTnYpMQtcIvmfar6CPooi?= =?us-ascii?Q?oM8SG8BNLVFogaSY/BnrbXU9Szl9NZbvVOO5mF+adpcIuo6FS/4mldfcSPXN?= =?us-ascii?Q?lbBxzGbSY5BDO7dvjNS2+aMOazWrbXHkveXyyCU0ULxOKFhQcw5BeJ8W/HKc?= =?us-ascii?Q?upVYGLa5bRkA5e5uvQACaEZLxpGpm7qvQhMIpxozCujHdUcRWRFfs7gJTA5D?= =?us-ascii?Q?E6voPfAYJdvwUuOvIY7zBnKzqjlr1rZDtbB//qzm60ieL1W1g5tp4yIjNDus?= =?us-ascii?Q?28DkzskKeNKqhNA23iWC8lQqJfqKP7Vi9LkN2k6B6oAwA=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB3313; 6:oXoIOg1ngd5dmzSxNblXsV8djbv0271FLkqjuP8T8XQudksx1sxj2Dh8jIsJX+EPthHhyVyTt8su1Yv2aNnAWnfiu5wne7qqa5uyFgWzpSkzXYkvwzE8Q+vFb6FB6ZdMIrWyU/W0xPafuppmBFsKXlswwDgxCbJIhEmEuGrtrx+dXY0qunb5nsTvwijU9DY7Zv+hi4sJ83QB79TtEcGh5CCgVULiakpH/gWqF472l5GOHB96tGDHMoUBVP6lgyLhWVI9SWBCt9ZHiMiQm8LzphFBgKvzEoYmUqR68yB3SelmD8CQBea4zWkrpWwhul6YdxD2PDMRIP+6OA862u2Wew==; 5:5qQ1blro916KCoN5dweJR7ZBrWHfne7jb1FKYGM3nzX+CiyVpJMruP5Mqhq4RU08zz5HSHWplFszQPlNqylMAQSCLsrTscewexUp7y7O0Cn2EUJYGKp4FnNdspBFhoLQeuYgBsOG2D0CU98myAtqFw==; 24:8ZAmdt8ublKvcl6QU0CTihjt1P3S+IJkB4TEq05O9s3GO+4UOhO62zUDmGKLmkpS1L1LQ0vhObcU1VU2ULRz7NfWc5LDCTV6ZQdQ9P1vkic=; 7:fdysoQ2NJPWe0wdMn03uDDYWGcCeI87+2lhkRSARu77vp3pcV+zddIb+LDuCCWKUyB3IUB4xFCLaN0NdZuD+zvBjtx5Y2C3sbz1DPQ+q23E+QfSYf0LstL0q5iBDuX0FlAejg4O0TP6mvM2cNrjDMMptERzssD3zR+/Mabi2A0NMIE3Pq1kfJzWTAbZN0fFnZwvGR7ODRI3swwdBsvMeqFTdEbUTlqBrNFL0zTO8GXU= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Aug 2017 00:03:14.5154 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB3313 Subject: [dpdk-dev] [PATCH 0/4] Introducing NXP dpaa_sec based cryptodev pmd X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 Aug 2017 00:03:16 -0000 Based over the DPAA PMD driver [1], this series of patches introduces the DPAA_SEC PMD which provides DPDK crypto driver for NXP's DPAA CAAM Hardware accelerator. SEC is NXP DPAA SoC's security engine for cryptographic acceleration and offloading. It implements block encryption, stream cipher, hashing and public key algorithms. It also supports run-time integrity checking, and a hardware random number generator. :: Patch Layout :: 0001 : Bus scan for dpaa sec device 0002 : Cryptodev PMD 0003 : Performance and Functional tests 0004 : Documentation :: Future Work To Do :: - More functionality and algorithms are still work in progress -- Hash followed by Cipher mode -- session-less API -- Chained mbufs Akhil Goyal (4): bus/dpaa: scan for DPAA Crypto devices crypto/dpaa_sec: add crypto driver for NXP DPAA platform test/crypto: add dpaa crypto test cases doc: add NXP DPAA SEC MAINTAINERS | 7 + config/common_base | 8 + config/defconfig_arm64-dpaa-linuxapp-gcc | 17 + doc/guides/cryptodevs/dpaa_sec.rst | 182 +++ doc/guides/cryptodevs/features/dpaa_sec.ini | 40 + doc/guides/cryptodevs/index.rst | 1 + doc/guides/rel_notes/release_17_11.rst | 6 + drivers/Makefile | 2 +- drivers/bus/dpaa/dpaa_bus.c | 51 + drivers/crypto/Makefile | 2 + drivers/crypto/dpaa_sec/Makefile | 71 + drivers/crypto/dpaa_sec/dpaa_sec.c | 1552 ++++++++++++++++++++ drivers/crypto/dpaa_sec/dpaa_sec.h | 403 +++++ drivers/crypto/dpaa_sec/dpaa_sec_log.h | 70 + .../crypto/dpaa_sec/rte_pmd_dpaa_sec_version.map | 4 + mk/rte.app.mk | 6 + test/test/test_cryptodev.c | 203 ++- test/test/test_cryptodev_aes_test_vectors.h | 78 +- test/test/test_cryptodev_blockcipher.c | 7 + test/test/test_cryptodev_blockcipher.h | 1 + test/test/test_cryptodev_des_test_vectors.h | 24 +- test/test/test_cryptodev_hash_test_vectors.h | 12 + test/test/test_cryptodev_perf.c | 37 +- 23 files changed, 2746 insertions(+), 38 deletions(-) create mode 100644 doc/guides/cryptodevs/dpaa_sec.rst create mode 100644 doc/guides/cryptodevs/features/dpaa_sec.ini create mode 100644 drivers/crypto/dpaa_sec/Makefile create mode 100644 drivers/crypto/dpaa_sec/dpaa_sec.c create mode 100644 drivers/crypto/dpaa_sec/dpaa_sec.h create mode 100644 drivers/crypto/dpaa_sec/dpaa_sec_log.h create mode 100644 drivers/crypto/dpaa_sec/rte_pmd_dpaa_sec_version.map -- 2.9.3