#
981a1ed3 |
| 04-Oct-2024 |
Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> |
app/crypto-perf: support EdDSA
Add support for EdDSA 25519 curve SIGN and VERIFY operations.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Brian Dooley <brian.doole
app/crypto-perf: support EdDSA
Add support for EdDSA 25519 curve SIGN and VERIFY operations.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Brian Dooley <brian.dooley@intel.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
e004aaa8 |
| 24-Sep-2024 |
Akhil Goyal <gakhil@marvell.com> |
app/crypto-perf: test queue pair priority
Updated the application to test variable queue pair priority. A mask using `--low-prio-qp-mask` can be set to lower the priority of queues which are set in
app/crypto-perf: test queue pair priority
Updated the application to test variable queue pair priority. A mask using `--low-prio-qp-mask` can be set to lower the priority of queues which are set in the mask. This would result in lower performance for those queues. By default the priority is set as highest. This option is added just to verify the performance drop of queues which have lower priority set.
Signed-off-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
79daa287 |
| 19-Mar-2024 |
Suanming Mou <suanmingm@nvidia.com> |
app/crypto-perf: add throughput OOP decryption
During throughput running, re-filling the test data will impact the performance test result. So for now, to run decrypt throughput testing is not suppo
app/crypto-perf: add throughput OOP decryption
During throughput running, re-filling the test data will impact the performance test result. So for now, to run decrypt throughput testing is not supported since the test data is not filled.
But if user requires OOP(out-of-place) mode, the test data from source mbuf will never be modified, and if the test data can be prepared out of the running loop, the decryption test should be fine.
This commit adds the support of out-of-place decryption testing for throughput.
Signed-off-by: Suanming Mou <suanmingm@nvidia.com> Acked-by: Brian Dooley <brian.dooley@intel.com>
show more ...
|
#
76a48d8a |
| 18-Jun-2024 |
Jack Bond-Preston <jack.bond-preston@foss.arm.com> |
app/crypto-perf: add shared session option
Add the option to create one session for the PMD, and share it across all of the queue pairs. This may help to discover/debug concurrency issues (both corr
app/crypto-perf: add shared session option
Add the option to create one session for the PMD, and share it across all of the queue pairs. This may help to discover/debug concurrency issues (both correctness and performance) that can occur when using this configuration.
Signed-off-by: Jack Bond-Preston <jack.bond-preston@foss.arm.com> Acked-by: Brian Dooley <brian.dooley@intel.com> Reviewed-by: Wathsala Vithanage <wathsala.vithanage@arm.com> Reviewed-by: Paul Szczepanek <paul.szczepanek@arm.com>
show more ...
|
#
195a271e |
| 26-Jun-2024 |
Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> |
app/crypto-perf: support ECDSA
Added support for ECDSA SECP256R1 curve SIGN and VERIFY operations.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Akhil Goyal <gakhil
app/crypto-perf: support ECDSA
Added support for ECDSA SECP256R1 curve SIGN and VERIFY operations.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
b82742f9 |
| 26-Jun-2024 |
Akhil Goyal <gakhil@marvell.com> |
app/crypto-perf: support SM2
Added support for SM2 asymmetric crypto performance. A new command line option is added to specify asymmetric operation type `--asym-op Type`. Type can be sign/verify/en
app/crypto-perf: support SM2
Added support for SM2 asymmetric crypto performance. A new command line option is added to specify asymmetric operation type `--asym-op Type`. Type can be sign/verify/encrypt/decrypt.
Example command:
./dpdk-test-crypto-perf --vdev crypto_openssl -c 0x30 -- \ --devtype crypto_openssl --ptest throughput --optype sm2 \ --total-ops 10000 --asym-op sign
Signed-off-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
9afa7a46 |
| 24-Jan-2024 |
Akhil Goyal <gakhil@marvell.com> |
app/crypto-perf: support TLS record
Added support for latency and throughput measurement of TLS and DTLS security ops.
Signed-off-by: Akhil Goyal <gakhil@marvell.com> Acked-by: Anoob Joseph <anoobj
app/crypto-perf: support TLS record
Added support for latency and throughput measurement of TLS and DTLS security ops.
Signed-off-by: Akhil Goyal <gakhil@marvell.com> Acked-by: Anoob Joseph <anoobj@marvell.com>
show more ...
|
#
bf4728da |
| 10-Nov-2023 |
Chengwen Feng <fengchengwen@huawei.com> |
app/crypto-perf: verify strdup return
Add verify strdup return value logic.
Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test application") Cc: stable@dpdk.org
Signed-off-by: Cheng
app/crypto-perf: verify strdup return
Add verify strdup return value logic.
Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test application") Cc: stable@dpdk.org
Signed-off-by: Chengwen Feng <fengchengwen@huawei.com>
show more ...
|
#
e3d5a228 |
| 06-Apr-2023 |
Tejasree Kondoj <ktejasree@marvell.com> |
app/crypto-perf: change buffer size based on operation
Added digest size to buffer size in auth-then-cipher mode with auth_op set to generate as cipher length includes digest size also.
Signed-off-
app/crypto-perf: change buffer size based on operation
Added digest size to buffer size in auth-then-cipher mode with auth_op set to generate as cipher length includes digest size also.
Signed-off-by: Tejasree Kondoj <ktejasree@marvell.com> Acked-by: Ciara Power <ciara.power@intel.com> Acked-by: Anoob Joseph <anoobj@marvell.com>
show more ...
|
#
430c3573 |
| 10-Mar-2023 |
Ciara Power <ciara.power@intel.com> |
app/crypto-perf: fix test file memory leak
A memory leak was detected using the AddressSanitizer tool, when running the crypto-perf application with a test vector file.
The strdup function used ret
app/crypto-perf: fix test file memory leak
A memory leak was detected using the AddressSanitizer tool, when running the crypto-perf application with a test vector file.
The strdup function used returns a pointer to a null-terminated byte string, which must be freed after use. This patch frees the pointer in an error case, and also after a successful run.
Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test application") Cc: stable@dpdk.org
Signed-off-by: Ciara Power <ciara.power@intel.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
7e1e1277 |
| 04-Jan-2023 |
Akhil Goyal <gakhil@marvell.com> |
cryptodev: add algo enums to string conversion API
Symmetric/Asymmetric algorithm strings are accessed by application using arrays in cryptodev lib, which hampers new algorithms addition in the arra
cryptodev: add algo enums to string conversion API
Symmetric/Asymmetric algorithm strings are accessed by application using arrays in cryptodev lib, which hampers new algorithms addition in the array due to ABI breakage. These arrays are now deprecated and will be removed in next ABI break release. New APIs are added for getting the algorithm strings based on enum values.
Signed-off-by: Akhil Goyal <gakhil@marvell.com> Reviewed-by: Ruifeng Wang <ruifeng.wang@arm.com> Acked-by: Anoob Joseph <anoobj@marvell.com> Acked-by: Ciara Power <ciara.power@intel.com> Acked-by: Fan Zhang <fanzhang.oss@gmail.com>
show more ...
|
#
21230400 |
| 02-Jan-2023 |
Anoob Joseph <anoobj@marvell.com> |
app/crypto-perf: fix IPsec direction
The default value of options->auth_op & options->cipher_op are such that an unconditional check for the same would always return true. Hence, the direction is al
app/crypto-perf: fix IPsec direction
The default value of options->auth_op & options->cipher_op are such that an unconditional check for the same would always return true. Hence, the direction is always determined to be outbound/egress.
The field options->aead_algo should be checked prior to checking above fields. Since the same check would be required in datapath, introduce a new flag in options for the same.
Fixes: 28dde5da503e ("app/crypto-perf: support lookaside IPsec") Cc: stable@dpdk.org
Signed-off-by: Anoob Joseph <anoobj@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
72b452c5 |
| 27-Aug-2022 |
Dmitry Kozlyuk <dmitry.kozliuk@gmail.com> |
eal: remove unneeded includes from a public header
Do not include <ctype.h>, <errno.h>, and <stdlib.h> from <rte_common.h>, because they are not used by this file. Include the needed headers directl
eal: remove unneeded includes from a public header
Do not include <ctype.h>, <errno.h>, and <stdlib.h> from <rte_common.h>, because they are not used by this file. Include the needed headers directly from the files that need them.
Signed-off-by: Dmitry Kozlyuk <dmitry.kozliuk@gmail.com> Acked-by: Bruce Richardson <bruce.richardson@intel.com>
show more ...
|
#
23a95dfe |
| 06-Jun-2022 |
Gagandeep Singh <g.singh@nxp.com> |
test/crypto-perf: support SDAP for PDCP operations
Add a command line option "--enable-sdap" to enable Service Data Adaptation Protocol.
example command: ./dpdk-test-crypto-perf -c 0xc --log-level
test/crypto-perf: support SDAP for PDCP operations
Add a command line option "--enable-sdap" to enable Service Data Adaptation Protocol.
example command: ./dpdk-test-crypto-perf -c 0xc --log-level=8 -- --devtype crypto_dpaa2_sec --optype pdcp --cipher-algo aes-ctr --cipher-op encrypt --auth-algo zuc-eia3 --auth-op generate --auth-key-sz 16 --ptest throughput --total-ops 100000 --burst-sz 64 --buffer-sz 64,390,1512 --pool-sz 4096 --silent --pdcp-sn-sz 12 --pdcp-domain control --enable-sdap
Signed-off-by: Gagandeep Singh <g.singh@nxp.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
9f3677d6 |
| 10-May-2022 |
Tejasree Kondoj <ktejasree@marvell.com> |
app/crypto-perf: allow auth generate followed by encryption
Allowing auth generation followed by encryption mode. --optype auth-then-cipher can take cipher-op as encrypt and auth-op as generate now.
app/crypto-perf: allow auth generate followed by encryption
Allowing auth generation followed by encryption mode. --optype auth-then-cipher can take cipher-op as encrypt and auth-op as generate now.
Signed-off-by: Tejasree Kondoj <ktejasree@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
a538d1d2 |
| 29-Apr-2022 |
Kiran Kumar K <kirankumark@marvell.com> |
test/crypto-perf: extend asymmetric crypto throughput test
Extended support for asymmetric crypto perf throughput test. Added support for new modulus lengths. Added new parameter --modex-len. Suppor
test/crypto-perf: extend asymmetric crypto throughput test
Extended support for asymmetric crypto perf throughput test. Added support for new modulus lengths. Added new parameter --modex-len. Supported lengths are 60, 128, 255, 448. Default length is 128.
Signed-off-by: Kiran Kumar K <kirankumark@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
8e3c5538 |
| 17-Nov-2021 |
Gagandeep Singh <g.singh@nxp.com> |
app/crypto-perf: increase segment size for IPsec
Application calculates segment size based on buffer size plus digest size only, But if the operation mode is IPsec then packet length can be increase
app/crypto-perf: increase segment size for IPsec
Application calculates segment size based on buffer size plus digest size only, But if the operation mode is IPsec then packet length can be increased by some more bytes depending on the algorithm.
In this patch, increasing segment size with RTE_PKTMBUF_HEADROOM when there is no user given segment size.
Fixes: 28dde5da503e ("app/crypto-perf: support lookaside IPsec")
Signed-off-by: Gagandeep Singh <g.singh@nxp.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
28dde5da |
| 12-Oct-2021 |
Akhil Goyal <gakhil@marvell.com> |
app/crypto-perf: support lookaside IPsec
Added support for lookaside IPsec protocol offload. Supported cases: -AEAD -Cipher+auth
Command used for testing: ./dpdk-test-crypto-perf -c 0xf -- --devtyp
app/crypto-perf: support lookaside IPsec
Added support for lookaside IPsec protocol offload. Supported cases: -AEAD -Cipher+auth
Command used for testing: ./dpdk-test-crypto-perf -c 0xf -- --devtype crypto_octeontx2 --ptest throughput --optype ipsec --cipher-algo aes-cbc --pool-sz 16384 --cipher-op encrypt --cipher-key-sz 16 --cipher-iv-sz 16 --auth-algo sha1-hmac --auth-op generate --digest-sz 16 --total-ops 10000000 --burst-sz 32 --buffer-sz 64,128,256,512,1024,1280,2048
./dpdk-test-crypto-perf -c 0xf -- --devtype crypto_octeontx2 --ptest throughput --optype ipsec --aead-algo aes-gcm --pool-sz 16384 --aead-op encrypt --aead-key-sz 32 --aead-iv-sz 12 --aead-aad-sz 16 --digest-sz 16 --total-ops 10000000 --burst-sz 32 --buffer-sz 64,128,256,512,1024,1280,2048
Signed-off-by: Akhil Goyal <gakhil@marvell.com> Signed-off-by: Archana Muniganti <marchana@marvell.com>
show more ...
|
#
ba588ce3 |
| 16-Sep-2021 |
Kiran Kumar K <kirankumark@marvell.com> |
test/crypto-perf: test asymmetric crypto throughput
Added support for asymmetric crypto perf throughput test. Only modex is supported for now.
One new optype has been added. --optype modex
./dpdk
test/crypto-perf: test asymmetric crypto throughput
Added support for asymmetric crypto perf throughput test. Only modex is supported for now.
One new optype has been added. --optype modex
./dpdk-test-crypto-perf -c 0x3 -- --devtype crypto_cn9k --optype modex --ptest throughput
Signed-off-by: Kiran Kumar K <kirankumark@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
864c1a40 |
| 08-Sep-2021 |
Hemant Agrawal <hemant.agrawal@nxp.com> |
security: support PDCP short MAC-I
This patch add support to handle PDCP short MAC-I domain along with standard control and data domains as it has to be treaty as special case with PDCP protocol off
security: support PDCP short MAC-I
This patch add support to handle PDCP short MAC-I domain along with standard control and data domains as it has to be treaty as special case with PDCP protocol offload support.
ShortMAC-I is the 16 least significant bits of calculated MAC-I. Usually when a RRC message is exchanged between UE and eNodeB it is integrity & ciphered protected.
MAC-I = f(key, varShortMAC-I, count, bearer, direction). Here varShortMAC-I is prepared by using (current cellId, pci of source cell and C-RNTI of old cell). Other parameters like count, bearer and direction set to all 1.
crypto-perf app is updated to take short MAC as input mode.
Signed-off-by: Gagandeep Singh <g.singh@nxp.com> Signed-off-by: Hemant Agrawal <hemant.agrawal@nxp.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
37c0359b |
| 06-May-2021 |
Min Hu (Connor) <humin29@huawei.com> |
app/crypto-perf: check memory allocation
Return value of a function 'rte_zmalloc' is dereferenced without checking, and it may call segmentation fault.
This patch fixed it.
Fixes: f8be1786b1b8 ("a
app/crypto-perf: check memory allocation
Return value of a function 'rte_zmalloc' is dereferenced without checking, and it may call segmentation fault.
This patch fixed it.
Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test application") Cc: stable@dpdk.org
Signed-off-by: Min Hu (Connor) <humin29@huawei.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
487cfc24 |
| 05-Apr-2021 |
Thomas Monjalon <thomas@monjalon.net> |
app: fix exit messages
Some applications were printing useless messages with rte_exit() after showing the help. Using exit() is enough in this case.
Some applications were using a redundant printf
app: fix exit messages
Some applications were printing useless messages with rte_exit() after showing the help. Using exit() is enough in this case.
Some applications were using a redundant printf or fprintf() before calling rte_exit(). The messages are unified in a single rte_exit().
Some rte_exit() calls were missing a line feed or returning a wrong code.
Signed-off-by: Thomas Monjalon <thomas@monjalon.net> Acked-by: Wisam Jaddo <wisamm@nvidia.com> Acked-by: Ori Kam <orika@nvidia.com> Acked-by: Bruce Richardson <bruce.richardson@intel.com> Acked-by: Andrew Rybchenko <andrew.rybchenko@oktetlabs.ru> Acked-by: David Marchand <david.marchand@redhat.com>
show more ...
|
#
7d3046ed |
| 18-Jan-2021 |
Ciara Power <ciara.power@intel.com> |
app/crypto-perf: fix spelling in output
Fixes some spelling errors in app logs and help text.
Fixes: 7da018731c56 ("app/crypto-perf: add help option") Fixes: f8be1786b1b8 ("app/crypto-perf: introdu
app/crypto-perf: fix spelling in output
Fixes some spelling errors in app logs and help text.
Fixes: 7da018731c56 ("app/crypto-perf: add help option") Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test application") Cc: stable@dpdk.org
Signed-off-by: Ciara Power <ciara.power@intel.com> Acked-by: Declan Doherty <declan.doherty@intel.com>
show more ...
|
#
a8d0d473 |
| 15-Oct-2020 |
Bruce Richardson <bruce.richardson@intel.com> |
build: replace use of old build macros
Use the newer macros defined by meson in all DPDK source code, to ensure there are no errors when the old non-standard macros are removed.
Signed-off-by: Bruc
build: replace use of old build macros
Use the newer macros defined by meson in all DPDK source code, to ensure there are no errors when the old non-standard macros are removed.
Signed-off-by: Bruce Richardson <bruce.richardson@intel.com> Acked-by: Luca Boccassi <bluca@debian.org> Acked-by: Andrew Rybchenko <andrew.rybchenko@oktetlabs.ru> Acked-by: Rosen Xu <rosen.xu@intel.com> Signed-off-by: Thomas Monjalon <thomas@monjalon.net>
show more ...
|
#
5a61bdb9 |
| 06-Jul-2020 |
Akhil Goyal <akhil.goyal@nxp.com> |
test/crypto-perf: add option to enable session HFN
Add a new option for PDCP cases to enable use of session based fixed HFN value instead of per packet HFN which was enabled by hfn override feature.
test/crypto-perf: add option to enable session HFN
Add a new option for PDCP cases to enable use of session based fixed HFN value instead of per packet HFN which was enabled by hfn override feature. By default HFN override is enabled and if session based fixed HFN need to be tested, add "--pdcp-ses-hfn-en" in the command line.
Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Hemant Agrawal <hemant.agrawal@nxp.com>
show more ...
|