#
981a1ed3 |
| 04-Oct-2024 |
Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> |
app/crypto-perf: support EdDSA
Add support for EdDSA 25519 curve SIGN and VERIFY operations.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Brian Dooley <brian.doole
app/crypto-perf: support EdDSA
Add support for EdDSA 25519 curve SIGN and VERIFY operations.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Brian Dooley <brian.dooley@intel.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
195a271e |
| 26-Jun-2024 |
Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> |
app/crypto-perf: support ECDSA
Added support for ECDSA SECP256R1 curve SIGN and VERIFY operations.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Akhil Goyal <gakhil
app/crypto-perf: support ECDSA
Added support for ECDSA SECP256R1 curve SIGN and VERIFY operations.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
b82742f9 |
| 26-Jun-2024 |
Akhil Goyal <gakhil@marvell.com> |
app/crypto-perf: support SM2
Added support for SM2 asymmetric crypto performance. A new command line option is added to specify asymmetric operation type `--asym-op Type`. Type can be sign/verify/en
app/crypto-perf: support SM2
Added support for SM2 asymmetric crypto performance. A new command line option is added to specify asymmetric operation type `--asym-op Type`. Type can be sign/verify/encrypt/decrypt.
Example command:
./dpdk-test-crypto-perf --vdev crypto_openssl -c 0x30 -- \ --devtype crypto_openssl --ptest throughput --optype sm2 \ --total-ops 10000 --asym-op sign
Signed-off-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
13485ace |
| 26-Jun-2024 |
Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> |
app/crypto-perf: add modex groups test
Add perf tests for modex groups 5, 14, 15, 16, 17 and 18 based on RFC 3526.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Akh
app/crypto-perf: add modex groups test
Add perf tests for modex groups 5, 14, 15, 16, 17 and 18 based on RFC 3526.
Signed-off-by: Gowrishankar Muthukrishnan <gmuthukrishn@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
9afa7a46 |
| 24-Jan-2024 |
Akhil Goyal <gakhil@marvell.com> |
app/crypto-perf: support TLS record
Added support for latency and throughput measurement of TLS and DTLS security ops.
Signed-off-by: Akhil Goyal <gakhil@marvell.com> Acked-by: Anoob Joseph <anoobj
app/crypto-perf: support TLS record
Added support for latency and throughput measurement of TLS and DTLS security ops.
Signed-off-by: Akhil Goyal <gakhil@marvell.com> Acked-by: Anoob Joseph <anoobj@marvell.com>
show more ...
|
#
a538d1d2 |
| 29-Apr-2022 |
Kiran Kumar K <kirankumark@marvell.com> |
test/crypto-perf: extend asymmetric crypto throughput test
Extended support for asymmetric crypto perf throughput test. Added support for new modulus lengths. Added new parameter --modex-len. Suppor
test/crypto-perf: extend asymmetric crypto throughput test
Extended support for asymmetric crypto perf throughput test. Added support for new modulus lengths. Added new parameter --modex-len. Supported lengths are 60, 128, 255, 448. Default length is 128.
Signed-off-by: Kiran Kumar K <kirankumark@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
9603e432 |
| 29-Oct-2021 |
Kiran Kumar K <kirankumark@marvell.com> |
test/crypto-perf: fix memory allocation in asym case
While populating the crypto ops in case of asymmetric, result is being allocated from stack. This is causing crash in the application. And operat
test/crypto-perf: fix memory allocation in asym case
While populating the crypto ops in case of asymmetric, result is being allocated from stack. This is causing crash in the application. And operation type is also not being initialized properly. Adding a fix by allocating the result from global memory and initialized the operation memory properly.
Fixes: ba588ce3f9339 ("test/crypto-perf: test asymmetric crypto throughput")
Signed-off-by: Kiran Kumar K <kirankumark@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
28dde5da |
| 12-Oct-2021 |
Akhil Goyal <gakhil@marvell.com> |
app/crypto-perf: support lookaside IPsec
Added support for lookaside IPsec protocol offload. Supported cases: -AEAD -Cipher+auth
Command used for testing: ./dpdk-test-crypto-perf -c 0xf -- --devtyp
app/crypto-perf: support lookaside IPsec
Added support for lookaside IPsec protocol offload. Supported cases: -AEAD -Cipher+auth
Command used for testing: ./dpdk-test-crypto-perf -c 0xf -- --devtype crypto_octeontx2 --ptest throughput --optype ipsec --cipher-algo aes-cbc --pool-sz 16384 --cipher-op encrypt --cipher-key-sz 16 --cipher-iv-sz 16 --auth-algo sha1-hmac --auth-op generate --digest-sz 16 --total-ops 10000000 --burst-sz 32 --buffer-sz 64,128,256,512,1024,1280,2048
./dpdk-test-crypto-perf -c 0xf -- --devtype crypto_octeontx2 --ptest throughput --optype ipsec --aead-algo aes-gcm --pool-sz 16384 --aead-op encrypt --aead-key-sz 32 --aead-iv-sz 12 --aead-aad-sz 16 --digest-sz 16 --total-ops 10000000 --burst-sz 32 --buffer-sz 64,128,256,512,1024,1280,2048
Signed-off-by: Akhil Goyal <gakhil@marvell.com> Signed-off-by: Archana Muniganti <marchana@marvell.com>
show more ...
|
#
49c19c94 |
| 12-Oct-2021 |
Przemyslaw Zegan <przemyslawx.zegan@intel.com> |
app/crypto-perf: fix AAD template copy overrun
This patch fixes a possible buffer overrun problem in crypto perf test. Previously when user configured AAD size is over 12 bytes the copy of template
app/crypto-perf: fix AAD template copy overrun
This patch fixes a possible buffer overrun problem in crypto perf test. Previously when user configured AAD size is over 12 bytes the copy of template AAD will cause a buffer overrun. The problem is fixed by only copy up to 12 bytes of AAD template.
Fixes: 8a5b494a7f99 ("app/test-crypto-perf: add AEAD parameters") Cc: stable@dpdk.org
Signed-off-by: Przemyslaw Zegan <przemyslawx.zegan@intel.com> Acked-by: Fan Zhang <roy.fan.zhang@intel.com>
show more ...
|
#
ba588ce3 |
| 16-Sep-2021 |
Kiran Kumar K <kirankumark@marvell.com> |
test/crypto-perf: test asymmetric crypto throughput
Added support for asymmetric crypto perf throughput test. Only modex is supported for now.
One new optype has been added. --optype modex
./dpdk
test/crypto-perf: test asymmetric crypto throughput
Added support for asymmetric crypto perf throughput test. Only modex is supported for now.
One new optype has been added. --optype modex
./dpdk-test-crypto-perf -c 0x3 -- --devtype crypto_cn9k --optype modex --ptest throughput
Signed-off-by: Kiran Kumar K <kirankumark@marvell.com> Acked-by: Akhil Goyal <gakhil@marvell.com>
show more ...
|
#
d4a131a9 |
| 03-Jul-2020 |
David Coyle <david.coyle@intel.com> |
test/crypto-perf: support DOCSIS protocol
Update test-crypto-perf app to calculate DOCSIS throughput numbers.
1 new parameter is added for DOCSIS: --docsis-hdr-sz <n>
./dpdk-test-crypto-perf -l 3,
test/crypto-perf: support DOCSIS protocol
Update test-crypto-perf app to calculate DOCSIS throughput numbers.
1 new parameter is added for DOCSIS: --docsis-hdr-sz <n>
./dpdk-test-crypto-perf -l 3,4 --socket-mem 2048,0 --vdev crypto_aesni_mb_pmd_1 -n 1 -- --devtype crypto_aesni_mb --optype docsis --cipher-algo aes-docsisbpi --cipher-op encrypt --cipher-key-sz 16 --cipher-iv-sz 16 --burst-sz 32 --total-ops 20000000 --buffer-sz 1024 --silent --docsis-hdr-sz 17
Signed-off-by: David Coyle <david.coyle@intel.com> Signed-off-by: Mairtin o Loingsigh <mairtin.oloingsigh@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
show more ...
|
#
8fd2b5a6 |
| 08-Nov-2019 |
Akhil Goyal <akhil.goyal@nxp.com> |
app/crypto-perf: support PDCP
test-crypto-perf app is updated to calculate PDCP throughput numbers.
2 new params are added for PDCP --pdcp-sn-sz <5/7/12/15/18> --pdcp-domain <control/user>
./dpdk-
app/crypto-perf: support PDCP
test-crypto-perf app is updated to calculate PDCP throughput numbers.
2 new params are added for PDCP --pdcp-sn-sz <5/7/12/15/18> --pdcp-domain <control/user>
./dpdk-test-crypto-perf --master-lcore 0 -l 0,1 --log-level=8 -- --devtype crypto_dpaa2_sec --optype pdcp --cipher-algo aes-ctr --cipher-op encrypt --auth-algo null --auth-op generate --auth-key-sz 16 --ptest throughput --total-ops 100000 --burst-sz 64 --buffer-sz 64,390,1512 --pool-sz 4096 --silent --pdcp-sn-sz 12 --pdcp-domain control
Signed-off-by: Manish Tomar <manish.tomar@nxp.com> Signed-off-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Hemant Agrawal <hemant.agrawal@nxp.com>
show more ...
|
#
c61518ed |
| 10-Sep-2018 |
Anoob Joseph <anoob.joseph@caviumnetworks.com> |
app/test-crypto-perf: fix double allocation of memory
The field, 'cipher_iv.data' is allocated twice when cipher is not null. Ideally the allocation should depend only on the field 'cperf_options.ci
app/test-crypto-perf: fix double allocation of memory
The field, 'cipher_iv.data' is allocated twice when cipher is not null. Ideally the allocation should depend only on the field 'cperf_options.cipher_iv_sz'. This will make sure this code path gets valid for ciphers which doesn't require IV.
Fixes: 0fbd75a99fc9 ("cryptodev: move IV parameters to session") Cc: stable@dpdk.org
Signed-off-by: Akash Saxena <akash.saxena@caviumnetworks.com> Signed-off-by: Anoob Joseph <anoob.joseph@caviumnetworks.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
show more ...
|
#
174a1631 |
| 19-Dec-2017 |
Bruce Richardson <bruce.richardson@intel.com> |
app: use SPDX tag for Intel copyright files
Replace the BSD license header with the SPDX tag for files with only an Intel copyright on them.
Signed-off-by: Bruce Richardson <bruce.richardson@intel.
app: use SPDX tag for Intel copyright files
Replace the BSD license header with the SPDX tag for files with only an Intel copyright on them.
Signed-off-by: Bruce Richardson <bruce.richardson@intel.com>
show more ...
|
#
87cf4c6c |
| 04-Nov-2017 |
Thomas Monjalon <thomas@monjalon.net> |
malloc: rename address mapping function to IOVA
The function rte_malloc_virt2phy() is renamed to rte_malloc_virt2iova(). The deprecated name is kept as an alias to avoid breaking the API.
Signed-of
malloc: rename address mapping function to IOVA
The function rte_malloc_virt2phy() is renamed to rte_malloc_virt2iova(). The deprecated name is kept as an alias to avoid breaking the API.
Signed-off-by: Thomas Monjalon <thomas@monjalon.net> Acked-by: Santosh Shukla <santosh.shukla@caviumnetworks.com>
show more ...
|
#
8a5b494a |
| 02-Jul-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
app/test-crypto-perf: add AEAD parameters
Since there is a new operation type (AEAD), add parameters for this in the application.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked
app/test-crypto-perf: add AEAD parameters
Since there is a new operation type (AEAD), add parameters for this in the application.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Declan Doherty <declan.doherty@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Fiona Trahe <fiona.trahe@intel.com>
show more ...
|
#
e32e4fa8 |
| 02-Jul-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
cryptodev: set AES-GMAC as auth-only algo
AES-GMAC is an authentication algorithm, based on AES-GCM without encryption. To simplify its usage, now it can be used setting the authentication parameter
cryptodev: set AES-GMAC as auth-only algo
AES-GMAC is an authentication algorithm, based on AES-GCM without encryption. To simplify its usage, now it can be used setting the authentication parameters, without requiring to concatenate a ciphering transform.
Therefore, it is not required to set AAD, but authentication data length and offset, giving the user the option to have Scatter-Gather List in the input buffer, as long as the driver supports it.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Declan Doherty <declan.doherty@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Fiona Trahe <fiona.trahe@intel.com>
show more ...
|
#
681f540d |
| 02-Jul-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
cryptodev: do not use AAD in wireless algorithms
For wireless algorithms (SNOW3G, KASUMI, ZUC), the IV for the authentication algorithms (F9, UIA2 and EIA3) was taken from the AAD parameter, as ther
cryptodev: do not use AAD in wireless algorithms
For wireless algorithms (SNOW3G, KASUMI, ZUC), the IV for the authentication algorithms (F9, UIA2 and EIA3) was taken from the AAD parameter, as there was no IV parameter in the authentication structure.
Now that IV is available for all algorithms, there is need to keep doing this, so AAD is not used for these algorithms anymore.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Declan Doherty <declan.doherty@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Fiona Trahe <fiona.trahe@intel.com>
show more ...
|
#
acf86169 |
| 02-Jul-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
cryptodev: add auth IV
Authentication algorithms, such as AES-GMAC or the wireless algorithms (like SNOW3G) use IV, like cipher algorithms. So far, AES-GMAC has used the IV from the cipher structure
cryptodev: add auth IV
Authentication algorithms, such as AES-GMAC or the wireless algorithms (like SNOW3G) use IV, like cipher algorithms. So far, AES-GMAC has used the IV from the cipher structure, and the wireless algorithms have used the AAD field, which is not technically correct.
Therefore, authentication IV parameters have been added, so API is more correct. Like cipher IV, auth IV is expected to be copied after the crypto operation.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Declan Doherty <declan.doherty@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Fiona Trahe <fiona.trahe@intel.com>
show more ...
|
#
0fbd75a9 |
| 02-Jul-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
cryptodev: move IV parameters to session
Since IV parameters (offset and length) should not change for operations in the same session, these parameters are moved to the crypto transform structure, s
cryptodev: move IV parameters to session
Since IV parameters (offset and length) should not change for operations in the same session, these parameters are moved to the crypto transform structure, so they will be stored in the sessions.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Declan Doherty <declan.doherty@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Fiona Trahe <fiona.trahe@intel.com>
show more ...
|
#
f8b7fdd3 |
| 02-Jul-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
app/crypto-perf: move IV to crypto op private data
Usually, IV will change for each crypto operation. Therefore, instead of pointing at the same location, IV is copied after each crypto operation.
app/crypto-perf: move IV to crypto op private data
Usually, IV will change for each crypto operation. Therefore, instead of pointing at the same location, IV is copied after each crypto operation.
This will let the IV to be passed as an offset from the beginning of the crypto operation, instead of a pointer.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Declan Doherty <declan.doherty@intel.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com> Acked-by: Fiona Trahe <fiona.trahe@intel.com>
show more ...
|
#
ad674b4d |
| 12-Apr-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
app/crypto-perf: fix AEAD tests when AAD is zero
For AEAD algorithms, additional authenticated data (AAD) can be passed, but it is optional, so its size can be zero. Therefore, test can be run if no
app/crypto-perf: fix AEAD tests when AAD is zero
For AEAD algorithms, additional authenticated data (AAD) can be passed, but it is optional, so its size can be zero. Therefore, test can be run if no memory is allocated.
Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test application") Cc: stable@dpdk.org
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
show more ...
|
#
f6cefe25 |
| 27-Mar-2017 |
Pablo de Lara <pablo.de.lara.guarch@intel.com> |
app/crypto-perf: add range/list of sizes
So far, the crypto performance application was only able to test one buffer size and one burst size.
With this commit, multiple sizes can be passed, either
app/crypto-perf: add range/list of sizes
So far, the crypto performance application was only able to test one buffer size and one burst size.
With this commit, multiple sizes can be passed, either as a range of values or as a list of values.
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com> Acked-by: Sergio Gonzalez Monroy <sergio.gonzalez.monroy@intel.com>
show more ...
|
#
884ed3ff |
| 24-Feb-2017 |
Tomasz Kulasek <tomaszx.kulasek@intel.com> |
app/crypto-perf: fix uninitialized values for null ops
Some values are uninitialized for "cipher null" and "auth null" operations. It may cause unpredictable results for some crypto pmd drivers, or
app/crypto-perf: fix uninitialized values for null ops
Some values are uninitialized for "cipher null" and "auth null" operations. It may cause unpredictable results for some crypto pmd drivers, or even segmentation fault.
This patch sets values for null operations to zero.
Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test application")
Signed-off-by: Tomasz Kulasek <tomaszx.kulasek@intel.com> Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
show more ...
|
#
0620ebfa |
| 09-Feb-2017 |
Slawomir Mrozowicz <slawomirx.mrozowicz@intel.com> |
app/crypto-perf: fix crash for wireless algorithms
This commit fixes segmentation fault that happens when using KASUMI, SNOW3G or ZUC authentication algorithms, as they need authentication keys and
app/crypto-perf: fix crash for wireless algorithms
This commit fixes segmentation fault that happens when using KASUMI, SNOW3G or ZUC authentication algorithms, as they need authentication keys and was not being set. It also set value of authentication key to cipher key when using GMAC algorithm.
Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performance test application")
Signed-off-by: Slawomir Mrozowicz <slawomirx.mrozowicz@intel.com> Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
show more ...
|