From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0059.outbound.protection.outlook.com [104.47.34.59]) by dpdk.org (Postfix) with ESMTP id ABE067D82 for ; Thu, 24 Aug 2017 02:08:57 +0200 (CEST) Received: from MWHPR03CA0031.namprd03.prod.outlook.com (10.174.173.148) by CY4PR03MB3317.namprd03.prod.outlook.com (10.171.246.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1362.18; Thu, 24 Aug 2017 00:08:56 +0000 Received: from BN1AFFO11FD016.protection.gbl (2a01:111:f400:7c10::177) by MWHPR03CA0031.outlook.office365.com (2603:10b6:301:3b::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1385.9 via Frontend Transport; Thu, 24 Aug 2017 00:08:56 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; dpdk.org; dkim=none (message not signed) header.d=none;dpdk.org; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1AFFO11FD016.mail.protection.outlook.com (10.58.52.76) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1341.15 via Frontend Transport; Thu, 24 Aug 2017 00:08:55 +0000 Received: from [10.214.86.67] ([10.214.86.67]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v7O08qbr031381; Wed, 23 Aug 2017 17:08:53 -0700 To: , CC: , , References: <20170824000117.32186-1-akhil.goyal@nxp.com> From: Akhil Goyal Message-ID: <93200477-f9d1-8940-34ec-3ae2477d873a@nxp.com> Date: Thu, 24 Aug 2017 05:38:51 +0530 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20170824000117.32186-1-akhil.goyal@nxp.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-EOPAttributedMessage: 0 X-Matching-Connectors: 131480069360193828; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39860400002)(39380400002)(2980300002)(1110001)(1109001)(339900001)(377454003)(24454002)(199003)(189002)(2950100002)(8676002)(106466001)(31686004)(86362001)(31696002)(966005)(104016004)(189998001)(65826007)(76176999)(50986999)(8936002)(54356999)(105606002)(65806001)(81156014)(5660300001)(47776003)(498600001)(36756003)(81166006)(8656003)(65956001)(50466002)(6246003)(83506001)(33646002)(626005)(64126003)(53376002)(230700001)(53936002)(54906002)(356003)(4326008)(77096006)(4001350100001)(6306002)(68736007)(97736004)(2906002)(23676002)(85426001)(305945005)(229853002)(53546010); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR03MB3317; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1AFFO11FD016; 1:vN6wqkYWp7uPFKKnqzhnRMOrVhRvN/0/aBcAvRBWmbyiB0Qj6AwIrnRoEGyw1tbsQUl0/IpWESv/SY0lk4715kN2dpQ5+SFTWFRhXwrHUi24GbOq9QUQmTNpnKDX0LW6 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: c8cb7d7a-4af6-403a-061c-08d4ea844fa6 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603191)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:CY4PR03MB3317; X-Microsoft-Exchange-Diagnostics: 1; CY4PR03MB3317; 3:jhmQOeB4bEdTpn7iRFt1QCmm6TKXDOD3BOONMUhrA0TnhJtXbkBxwuu+DCGjCvpycUvhXWi0Hu1TZ6caVuHbQJ7vSK7AQB/r2nXtgBTw4bnO73Y78VcrOH0/d1GsiKxcbWn5+bDQQwG/dzgbljbuOIF1uEKXTUcZpFVJgZc/2td3IBoJeSNaBtRWZue3tZip4D4okH/O+3e98czEvykDP+/33bY2lMHGt+iHrjoxHn+u7B7Yp2+PJHZzPd44e0KOqoHmgZDxsc9wbPbBEW7sMq5zPWq/W8QGsw91sttfHSR/P2H8CvGUVvT45zXuUTiIc460CUc41SnCRwciOovSURMJbWOReZiHHKOo8UMg184=; 25:/9R/NTnyOI6l7hENWjETtH70yPPV18jd/YDvR8uMjhbK+jgUmuzV6lz4BNsnCcFVFW2mG3/3FubES/tddQscG2n+XqPitAfpMRnJQmF97dYf965D1f9cZtgoJ38rZSlZmnUIaOCUAyTEVgHEML2sQ5ZYNhB5stI/geLYLcIhHketyWFWhk1Pwl+BTIDS92iM3ENCs3qWTikY3BIiXGC9D9+vEK1Oi3UpNXrmpgXAqJc/pa8DXT71VT5VCx/4FnAZ5gF63yhPdC01C0bxRVA2F+hst89MQW1/Snzgcxw2J7/p4aSRvDdwjWWEhdIa+9J7eUmtU9Zqn+QPnsHq2QMGzA== X-MS-TrafficTypeDiagnostic: CY4PR03MB3317: X-Microsoft-Exchange-Diagnostics: 1; CY4PR03MB3317; 31:WGauYRINQ7DpuZW3m6y0KYWd4F5WVGlF9ce6PibiGz8Ttgv9hg7NR5n3bSxfhX9odgNfsmGiR31Ni4ZXQi9p+JRfVmPeYBulpkffRcebQtDBiU6j1OpcwwPL/A3wUOvoLK6Cr01uq2rOLXQfw7ntLG93vm1LM0U4VaE1FiN2/kylavTeGxylpSbkoDFL66+s6g0gQEmsbJAoS1Hs2x9eZffV2FW7GkHrkzs/Js+p508=; 4:/vrXRKWZAockG2Byfq8sMni37kvxcTcCYkeuMcupEASzEaYXaXqsF/DAFHTGF/JEWGGZoMvNXrZakHWABHHs7YkLmIYCIyAGoFcaOOtlFeXuihEZfFzxPDUUMz4zg45xEQpNlZIVhncX48TpvpT9IdLdtO4zdC3Y6202uU8qMsz7W9CfTxghdHDl3x29LLDy+vyX2CKiug+h4ZWel9ZK8WyFowv9ONyKsw6eecQtl5HzH2IgYckmp8tTJ0RjseFmPqktaKacHZ59aPSC2I81FdMG1WM7vM/gpduBMTif5NU= X-Exchange-Antispam-Report-Test: UriScan:(192374486261705); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(8121501046)(5005006)(13016025)(13018025)(100000703101)(100105400095)(10201501046)(3002001)(93006095)(93001095)(6055026)(6096035)(20161123563025)(20161123561025)(201703131430075)(201703131448075)(201703131433075)(201703161259150)(201703151042153)(20161123559100)(20161123556025)(20161123565025)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CY4PR03MB3317; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CY4PR03MB3317; X-Forefront-PRVS: 04097B7F7F X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDWTRQUjAzTUIzMzE3OzIzOnJCczN0bmcwVXhleGhEbkxNQk16QWp1b1M1?= =?utf-8?B?ajV4eFM1NGxTMlozMXYyakM3b0tSdTllb0NkOW4zZ08vd1lwZWc2Z093Ym9h?= =?utf-8?B?NjVmUkFHVHdWbGVwbHV2L0FhRVBYcHdJbmxZYVJsQis2NWxhWXh3Qyt6Q21l?= =?utf-8?B?LzdkRnZ0RjJxVVFneXBkc2R2SjV3K1owZ2oxL0lrWHJHSlhPMkRSRzBUbE1o?= =?utf-8?B?QmtHVk1lR1MxSUhkT01ucUNUR2gyUHJaTmE5andiZGdKemFvUC9WTlNQTjJB?= =?utf-8?B?dCtOMURIUi93eE4xYi9kVlJiaGVuQndEdDRLUncraUZ3cVRvekZvaWVvZ3k2?= =?utf-8?B?V2JnclBoUGVPMUVUZkxPMjRxUU0xL05XM2xIL3pybWZtQVpRNU1MVlBCYTNl?= =?utf-8?B?bW02enBQMnhjV3lUc3dROW1ZKzk2aE9OZzRBR0k0UVhPcjRMcEhaeHJ2azVI?= =?utf-8?B?dWFQa09vTmVUSDAzWXBIMVltNzEvd2w4RzAwWU14ZFk0U2xxTmk1ZmpXZnRH?= =?utf-8?B?MW9yd3R3NUhnY012QXNpVlJ2WG51cGRLVnRJbXZwTjV0TktJeHRxMW1QYitG?= =?utf-8?B?dEh2U1czZ0o3RVBBajRmK2IwbFUzRXQ1SmZZNVRMa2JwaWxXSG10Tll0bVM3?= =?utf-8?B?bmRydWY3V3FKbCtHdlg5Y3RiQk1HaFN4L0VMdTRNaStmTEN4Vk40NHYyRnIv?= =?utf-8?B?cXJxaE5HRHEvYTB3ZzdtaTkvVGk1V1pVU1NZK0JoU0N4VU1qa1NJSDdzdEps?= =?utf-8?B?RnF1SC9sZ1RVMllySTNzZmUrWHdWblVENkpveVVaTHkzY2VOeFJubVlnY0pT?= =?utf-8?B?K3lxMjRMelRscDJuczZyK0ZlbFYxcCtWeUo0cVJZNk1iT0ZjZGQ0V25GWEh3?= =?utf-8?B?K3ZpNWY0TklXbmVjRXBtQm9rS2pxS1lYYm5EL0JzNFVzKzFyN1ZvMjJFbGFo?= =?utf-8?B?YURDQmJEbnloc1FxU2NEUFAwVG9vcUswR2VlRWttS2xJRHlEazVwU2dBUmdY?= =?utf-8?B?TUdibEhKZWlVdWJmL2Ryczg3STAraTh3R05WTmJKbmxrK2hvSWVHcU8vS09C?= =?utf-8?B?RU9oNWY3aFVDaEs2WTl2YW9EZm9VRDRYWUQvQkRJZ2dBZ1FxaUpUenM3Vlcv?= =?utf-8?B?SjFSdStXWDBkSXJLaHN4a0JaNjNwR3c0VFVITWxZR3ozNE1GazhoeVRpWVVn?= =?utf-8?B?VWg2RTNvRFpKakgzdjNSWWZpbnNWMlQ4ajVlMlc5UndHWFhKWnFmZ1QwL3BX?= =?utf-8?B?dzYzWExLb2cxbnUyWENHWjVCNCtHUzF6cGx0Q0tHQm1LY0xZT3RNcWx6SWM2?= =?utf-8?B?d1Jvazc5dU9Ddm4xc0Z4ZGd2Q0lFQkxlY2twMXdGTjc0c1lHaHM1RmFoNDFi?= =?utf-8?B?YWVjdzJhb3psVXBYV2NNTXcyck9IckVsVzVOWHFWSlNJRGU0cEpRNVh0WVBo?= =?utf-8?B?Nk83c01mdVNua0o5KzlSTWNLdlZ5RVhyaXpyZ3RJMXM3d01Zb0UrbWNaT1l6?= =?utf-8?B?Q01pL0FQWExMWmcvbFh0SFVCT1FxZnpGMW5kVjN0OXFjNFhxOFlldW9YMW93?= =?utf-8?B?Y1VRUW9KUXpQSmg5dU1kb09wMzdabVZpZDZ3V0I2YnBNRkpkbDVQemJweDVj?= =?utf-8?B?NWdUZUZXWGJoVTlmZkovaFBic3RTa0lGQkt5eHJteWJTbElnWjRVL0pPVVd4?= =?utf-8?B?WlM4M3VFaE5oUkpKQ2s3NjkwV1hvZjhJWnQxWWErM25GbUdna0xxTUMrVyti?= =?utf-8?B?VWlJWWpoSlUyRW9HTGE2ZytsSkFySUZ4cnVRSzIwSjZPdCtDQS9HeXl6RUtp?= =?utf-8?B?bURENnNoZXpSOWJsMnFqL2wvSGJmQ0poMXQ2VW9YM25qQWt1RCttVTNwdW9n?= =?utf-8?Q?YGERWm9joGgk+v3JZfevNp8E6fDqrqat?= X-Microsoft-Exchange-Diagnostics: 1; CY4PR03MB3317; 6:8Ie6nw31MkDQ0l2RUd3mDrY2/fbqLWa3xKswKAntUsYh2YN9BPP5UE5LGeIeR1nVSdOehEfoMxqm6+3B2VJD6tgdM0GfjmrOVPV7RkIoANtxg42BIaUCMudSgC894orLsK2HVBGvqiF/i0+ePfUS5sqzCQ6ejfZj8qJ+k8rSbjI8034LHO7f0hOKwxupdnii6xVATDnl8X0Gh71nHodxO9EhzyrPQ7u/B42H09bIZp9rjFUC1XeumWJntFv6oZfS6T1Geef5V/W4aG+PQRgnqoejpjOtRPtUmRufDNKI+JkRgUj0Jx9FiotRzkhc1Wp+3VF9JQj7Rjbips+VsDlu1Q==; 5:ijSIlqX2XOu3kDWNCv7uLooPKFx8PufPupg6yGp15VGVPur+4/860xB7ziYf9mMK/R2PXCL9KY0AAzY0bYkyspmz6uU4SN+DFwH4Ck2CnCv6zgHIks4VSA+PFB2oPE32enTHoGFgb7qbq6MZiMhA/Q==; 24:kv2sR6PBHo/L3R7qvWYnhz6IJ/RO03CILMAt7Cx3WQcZKYvr7I2SjeRgtVZFQAepSRnWMuej4DNGFDw85oXVprp0GllytX7K/4XUh68KUO4=; 7:fqlqfwI7n9WTObNns5Hrh2ev4IY9oBxolAR61QnEhVAuSjeQ5tVREQ3Za5/5w+imMdkM1o4nMZg4wGiN0heg0suXJ6fdRh4n0owZ7CWma6xF6NigQ6kOKIlhFIv7YeZxtEBqzma+4Nuh1WM0fFyzITAsv0N4Yzzx8eJjuk298CvGUL+y+s+Cr9yAobazZ4ScYUeu4dhbnOcOoDK4sfAnfd5qcYRI2GhRaKS+T3fsgPk= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Aug 2017 00:08:55.7229 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3317 Subject: Re: [dpdk-dev] [PATCH 0/4] Introducing NXP dpaa_sec based cryptodev pmd X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 Aug 2017 00:08:58 -0000 On 8/24/2017 5:31 AM, Akhil Goyal wrote: > Based over the DPAA PMD driver [1], this series of patches introduces the > DPAA_SEC PMD which provides DPDK crypto driver for NXP's DPAA CAAM > Hardware accelerator. > > SEC is NXP DPAA SoC's security engine for cryptographic acceleration and > offloading. It implements block encryption, stream cipher, hashing and > public key algorithms. It also supports run-time integrity checking, and a > hardware random number generator. > > :: Patch Layout :: > > 0001 : Bus scan for dpaa sec device > 0002 : Cryptodev PMD > 0003 : Performance and Functional tests > 0004 : Documentation > > :: Future Work To Do :: > > - More functionality and algorithms are still work in progress > -- Hash followed by Cipher mode > -- session-less API > -- Chained mbufs > :: References :: [1] http://dpdk.org/ml/archives/dev/2017-August/073269.html > > > Akhil Goyal (4): > bus/dpaa: scan for DPAA Crypto devices > crypto/dpaa_sec: add crypto driver for NXP DPAA platform > test/crypto: add dpaa crypto test cases > doc: add NXP DPAA SEC > > MAINTAINERS | 7 + > config/common_base | 8 + > config/defconfig_arm64-dpaa-linuxapp-gcc | 17 + > doc/guides/cryptodevs/dpaa_sec.rst | 182 +++ > doc/guides/cryptodevs/features/dpaa_sec.ini | 40 + > doc/guides/cryptodevs/index.rst | 1 + > doc/guides/rel_notes/release_17_11.rst | 6 + > drivers/Makefile | 2 +- > drivers/bus/dpaa/dpaa_bus.c | 51 + > drivers/crypto/Makefile | 2 + > drivers/crypto/dpaa_sec/Makefile | 71 + > drivers/crypto/dpaa_sec/dpaa_sec.c | 1552 ++++++++++++++++++++ > drivers/crypto/dpaa_sec/dpaa_sec.h | 403 +++++ > drivers/crypto/dpaa_sec/dpaa_sec_log.h | 70 + > .../crypto/dpaa_sec/rte_pmd_dpaa_sec_version.map | 4 + > mk/rte.app.mk | 6 + > test/test/test_cryptodev.c | 203 ++- > test/test/test_cryptodev_aes_test_vectors.h | 78 +- > test/test/test_cryptodev_blockcipher.c | 7 + > test/test/test_cryptodev_blockcipher.h | 1 + > test/test/test_cryptodev_des_test_vectors.h | 24 +- > test/test/test_cryptodev_hash_test_vectors.h | 12 + > test/test/test_cryptodev_perf.c | 37 +- > 23 files changed, 2746 insertions(+), 38 deletions(-) > create mode 100644 doc/guides/cryptodevs/dpaa_sec.rst > create mode 100644 doc/guides/cryptodevs/features/dpaa_sec.ini > create mode 100644 drivers/crypto/dpaa_sec/Makefile > create mode 100644 drivers/crypto/dpaa_sec/dpaa_sec.c > create mode 100644 drivers/crypto/dpaa_sec/dpaa_sec.h > create mode 100644 drivers/crypto/dpaa_sec/dpaa_sec_log.h > create mode 100644 drivers/crypto/dpaa_sec/rte_pmd_dpaa_sec_version.map > Forgot to mention the Reference to DPAA PMD Regards, Akhil