From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by dpdk.org (Postfix) with ESMTP id 074D758EC for ; Mon, 18 Feb 2019 17:33:44 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Feb 2019 08:33:43 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,385,1544515200"; d="scan'208";a="321348931" Received: from silpixa00398673.ir.intel.com (HELO silpixa00398673.ger.corp.intel.com) ([10.237.223.136]) by fmsmga005.fm.intel.com with ESMTP; 18 Feb 2019 08:33:42 -0800 From: Fan Zhang To: dev@dpdk.org Cc: akhil.goyal@nxp.com, konstantin.ananyev@intel.com, roy.fan.zhang@intel.com Date: Mon, 18 Feb 2019 16:32:50 +0000 Message-Id: <20190218163254.56905-1-roy.fan.zhang@intel.com> X-Mailer: git-send-email 2.14.5 Subject: [dpdk-dev] [PATCH 0/4] ipsec: add AES-CTR and 3DES-CBC support X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 18 Feb 2019 16:33:45 -0000 This patchset adds the AES-CTR and 3DES-CBC cipher algorithms support to ipsec library. The test scripts for ipsec-secgw sample application are added too. Fan Zhang (4): ipsec: add AES-CTR algorithm support ipsec-secgw: add test scripts for aes ctr ipsec: add 3DES-CBC algorithm support ipsec-secgw: add 3des test files examples/ipsec-secgw/test/common_defs.sh | 4 +- examples/ipsec-secgw/test/run_test.sh | 18 ++- .../test/trs_3descbc_sha1_common_defs.sh | 73 +++++++++++ examples/ipsec-secgw/test/trs_3descbc_sha1_defs.sh | 67 ++++++++++ .../test/trs_3descbc_sha1_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/trs_3descbc_sha1_esn_defs.sh | 66 ++++++++++ .../ipsec-secgw/test/trs_3descbc_sha1_old_defs.sh | 5 + .../test/trs_aesctr_sha1_common_defs.sh | 69 ++++++++++ examples/ipsec-secgw/test/trs_aesctr_sha1_defs.sh | 67 ++++++++++ .../test/trs_aesctr_sha1_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/trs_aesctr_sha1_esn_defs.sh | 66 ++++++++++ .../ipsec-secgw/test/trs_aesctr_sha1_old_defs.sh | 5 + .../test/tun_3descbc_sha1_common_defs.sh | 72 +++++++++++ examples/ipsec-secgw/test/tun_3descbc_sha1_defs.sh | 70 ++++++++++ .../test/tun_3descbc_sha1_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/tun_3descbc_sha1_esn_defs.sh | 70 ++++++++++ .../ipsec-secgw/test/tun_3descbc_sha1_old_defs.sh | 5 + .../test/tun_aesctr_sha1_common_defs.sh | 68 ++++++++++ examples/ipsec-secgw/test/tun_aesctr_sha1_defs.sh | 70 ++++++++++ .../test/tun_aesctr_sha1_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/tun_aesctr_sha1_esn_defs.sh | 70 ++++++++++ .../ipsec-secgw/test/tun_aesctr_sha1_old_defs.sh | 5 + lib/librte_ipsec/crypto.h | 17 +++ lib/librte_ipsec/sa.c | 143 ++++++++++++++++++--- lib/librte_ipsec/sa.h | 24 ++++ 25 files changed, 1050 insertions(+), 24 deletions(-) create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_old_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_old_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_old_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_old_defs.sh -- 2.14.5