From patchwork Tue Feb 19 15:32:32 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Fan Zhang X-Patchwork-Id: 50373 Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id D4C355942; Tue, 19 Feb 2019 16:33:27 +0100 (CET) Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by dpdk.org (Postfix) with ESMTP id 7771458EC for ; Tue, 19 Feb 2019 16:33:26 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2019 07:33:24 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,388,1544515200"; d="scan'208";a="123603944" Received: from silpixa00398673.ir.intel.com (HELO silpixa00398673.ger.corp.intel.com) ([10.237.223.136]) by fmsmga007.fm.intel.com with ESMTP; 19 Feb 2019 07:33:23 -0800 From: Fan Zhang To: dev@dpdk.org Cc: akhil.goyal@nxp.com, konstantin.ananyev@intel.com, roy.fan.zhang@intel.com Date: Tue, 19 Feb 2019 15:32:32 +0000 Message-Id: <20190219153236.84537-1-roy.fan.zhang@intel.com> X-Mailer: git-send-email 2.14.5 In-Reply-To: <20190218163254.56905-1-roy.fan.zhang@intel.com> References: <20190218163254.56905-1-roy.fan.zhang@intel.com> Subject: [dpdk-dev] [PATCH v2 0/4] ipsec: add AES-CTR and 3DES-CBC support X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" This patchset adds the AES-CTR and 3DES-CBC cipher algorithms support to ipsec library. The test scripts for ipsec-secgw sample application are added too. v2: - removed unsupported tests. Fan Zhang (4): ipsec: add AES-CTR algorithm support ipsec-secgw: add test scripts for aes ctr ipsec: add 3DES-CBC algorithm support ipsec-secgw: add 3des test files examples/ipsec-secgw/test/common_defs.sh | 4 +- examples/ipsec-secgw/test/run_test.sh | 14 +- .../test/trs_3descbc_sha1_common_defs.sh | 73 +++++++++++ examples/ipsec-secgw/test/trs_3descbc_sha1_defs.sh | 67 ++++++++++ .../test/trs_3descbc_sha1_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/trs_3descbc_sha1_esn_defs.sh | 66 ++++++++++ .../ipsec-secgw/test/trs_3descbc_sha1_old_defs.sh | 5 + .../test/trs_aesctr_sha1_common_defs.sh | 69 ++++++++++ examples/ipsec-secgw/test/trs_aesctr_sha1_defs.sh | 67 ++++++++++ .../test/trs_aesctr_sha1_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/trs_aesctr_sha1_esn_defs.sh | 66 ++++++++++ .../ipsec-secgw/test/trs_aesctr_sha1_old_defs.sh | 5 + .../test/tun_3descbc_sha1_common_defs.sh | 72 +++++++++++ examples/ipsec-secgw/test/tun_3descbc_sha1_defs.sh | 70 ++++++++++ .../test/tun_3descbc_sha1_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/tun_3descbc_sha1_esn_defs.sh | 70 ++++++++++ .../ipsec-secgw/test/tun_3descbc_sha1_old_defs.sh | 5 + .../test/tun_aesctr_sha1_common_defs.sh | 68 ++++++++++ examples/ipsec-secgw/test/tun_aesctr_sha1_defs.sh | 70 ++++++++++ .../test/tun_aesctr_sha1_esn_atom_defs.sh | 5 + .../ipsec-secgw/test/tun_aesctr_sha1_esn_defs.sh | 70 ++++++++++ .../ipsec-secgw/test/tun_aesctr_sha1_old_defs.sh | 5 + lib/librte_ipsec/crypto.h | 17 +++ lib/librte_ipsec/sa.c | 143 ++++++++++++++++++--- lib/librte_ipsec/sa.h | 24 ++++ 25 files changed, 1046 insertions(+), 24 deletions(-) create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_old_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_old_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_old_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_esn_atom_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_esn_defs.sh create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_old_defs.sh