mbox series

[v5,0/5] ipsec: support AES-CTR and 3DES-CBC

Message ID 20190320153838.60419-1-roy.fan.zhang@intel.com (mailing list archive)
Headers
Series ipsec: support AES-CTR and 3DES-CBC |

Message

Fan Zhang March 20, 2019, 3:38 p.m. UTC
  This patchset adds the AES-CTR and 3DES-CBC cipher algorithms
support to ipsec library. The test scripts for ipsec-secgw
sample application are added.

v5:
- updated ipsec-secgw run_test.sh script
- updated release note

v4:
- changed patch titles.
- changed ALGO_TYPE naming for 3DES-CBC

v3:
- fixed a bug in 3DES.

v2:
- removed unsupported tests.

Fan Zhang (5):
  ipsec: support AES-CTR
  ipsec-secgw: add test scripts for aes ctr
  ipsec: support 3DES-CBC
  ipsec-secgw: add 3des test files
  doc: update release note

 doc/guides/rel_notes/release_19_05.rst             |   6 +
 examples/ipsec-secgw/test/common_defs.sh           |   4 +-
 examples/ipsec-secgw/test/run_test.sh              |  18 ++-
 .../test/trs_3descbc_sha1_common_defs.sh           |  73 +++++++++++
 examples/ipsec-secgw/test/trs_3descbc_sha1_defs.sh |  67 ++++++++++
 .../test/trs_3descbc_sha1_esn_atom_defs.sh         |   5 +
 .../ipsec-secgw/test/trs_3descbc_sha1_esn_defs.sh  |  66 ++++++++++
 .../ipsec-secgw/test/trs_3descbc_sha1_old_defs.sh  |   5 +
 .../test/trs_aesctr_sha1_common_defs.sh            |  69 +++++++++++
 examples/ipsec-secgw/test/trs_aesctr_sha1_defs.sh  |  67 ++++++++++
 .../test/trs_aesctr_sha1_esn_atom_defs.sh          |   5 +
 .../ipsec-secgw/test/trs_aesctr_sha1_esn_defs.sh   |  66 ++++++++++
 .../ipsec-secgw/test/trs_aesctr_sha1_old_defs.sh   |   5 +
 .../test/tun_3descbc_sha1_common_defs.sh           |  72 +++++++++++
 examples/ipsec-secgw/test/tun_3descbc_sha1_defs.sh |  70 +++++++++++
 .../test/tun_3descbc_sha1_esn_atom_defs.sh         |   5 +
 .../ipsec-secgw/test/tun_3descbc_sha1_esn_defs.sh  |  70 +++++++++++
 .../ipsec-secgw/test/tun_3descbc_sha1_old_defs.sh  |   5 +
 .../test/tun_aesctr_sha1_common_defs.sh            |  68 ++++++++++
 examples/ipsec-secgw/test/tun_aesctr_sha1_defs.sh  |  70 +++++++++++
 .../test/tun_aesctr_sha1_esn_atom_defs.sh          |   5 +
 .../ipsec-secgw/test/tun_aesctr_sha1_esn_defs.sh   |  70 +++++++++++
 .../ipsec-secgw/test/tun_aesctr_sha1_old_defs.sh   |   5 +
 lib/librte_ipsec/crypto.h                          |  17 +++
 lib/librte_ipsec/sa.c                              | 137 +++++++++++++++++----
 lib/librte_ipsec/sa.h                              |  24 ++++
 26 files changed, 1050 insertions(+), 24 deletions(-)
 create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh
 create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_defs.sh
 create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_esn_atom_defs.sh
 create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_esn_defs.sh
 create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_old_defs.sh
 create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh
 create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_defs.sh
 create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_esn_atom_defs.sh
 create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_esn_defs.sh
 create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_old_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_esn_atom_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_esn_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_old_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_esn_atom_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_esn_defs.sh
 create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_old_defs.sh
  

Comments

Akhil Goyal March 22, 2019, 2:59 p.m. UTC | #1
On 3/20/2019 9:08 PM, Fan Zhang wrote:
> This patchset adds the AES-CTR and 3DES-CBC cipher algorithms
> support to ipsec library. The test scripts for ipsec-secgw
> sample application are added.
>
> v5:
> - updated ipsec-secgw run_test.sh script
> - updated release note
>
> v4:
> - changed patch titles.
> - changed ALGO_TYPE naming for 3DES-CBC
>
> v3:
> - fixed a bug in 3DES.
>
> v2:
> - removed unsupported tests.
>
> Fan Zhang (5):
>    ipsec: support AES-CTR
>    ipsec-secgw: add test scripts for aes ctr
>    ipsec: support 3DES-CBC
>    ipsec-secgw: add 3des test files
>    doc: update release note
>
>   doc/guides/rel_notes/release_19_05.rst             |   6 +
>   examples/ipsec-secgw/test/common_defs.sh           |   4 +-
>   examples/ipsec-secgw/test/run_test.sh              |  18 ++-
>   .../test/trs_3descbc_sha1_common_defs.sh           |  73 +++++++++++
>   examples/ipsec-secgw/test/trs_3descbc_sha1_defs.sh |  67 ++++++++++
>   .../test/trs_3descbc_sha1_esn_atom_defs.sh         |   5 +
>   .../ipsec-secgw/test/trs_3descbc_sha1_esn_defs.sh  |  66 ++++++++++
>   .../ipsec-secgw/test/trs_3descbc_sha1_old_defs.sh  |   5 +
>   .../test/trs_aesctr_sha1_common_defs.sh            |  69 +++++++++++
>   examples/ipsec-secgw/test/trs_aesctr_sha1_defs.sh  |  67 ++++++++++
>   .../test/trs_aesctr_sha1_esn_atom_defs.sh          |   5 +
>   .../ipsec-secgw/test/trs_aesctr_sha1_esn_defs.sh   |  66 ++++++++++
>   .../ipsec-secgw/test/trs_aesctr_sha1_old_defs.sh   |   5 +
>   .../test/tun_3descbc_sha1_common_defs.sh           |  72 +++++++++++
>   examples/ipsec-secgw/test/tun_3descbc_sha1_defs.sh |  70 +++++++++++
>   .../test/tun_3descbc_sha1_esn_atom_defs.sh         |   5 +
>   .../ipsec-secgw/test/tun_3descbc_sha1_esn_defs.sh  |  70 +++++++++++
>   .../ipsec-secgw/test/tun_3descbc_sha1_old_defs.sh  |   5 +
>   .../test/tun_aesctr_sha1_common_defs.sh            |  68 ++++++++++
>   examples/ipsec-secgw/test/tun_aesctr_sha1_defs.sh  |  70 +++++++++++
>   .../test/tun_aesctr_sha1_esn_atom_defs.sh          |   5 +
>   .../ipsec-secgw/test/tun_aesctr_sha1_esn_defs.sh   |  70 +++++++++++
>   .../ipsec-secgw/test/tun_aesctr_sha1_old_defs.sh   |   5 +
>   lib/librte_ipsec/crypto.h                          |  17 +++
>   lib/librte_ipsec/sa.c                              | 137 +++++++++++++++++----
>   lib/librte_ipsec/sa.h                              |  24 ++++
>   26 files changed, 1050 insertions(+), 24 deletions(-)
>   create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_common_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_esn_atom_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_esn_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/trs_3descbc_sha1_old_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_common_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_esn_atom_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_esn_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/trs_aesctr_sha1_old_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_common_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_esn_atom_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_esn_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_3descbc_sha1_old_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_common_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_esn_atom_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_esn_defs.sh
>   create mode 100644 examples/ipsec-secgw/test/tun_aesctr_sha1_old_defs.sh
>
series applied to dpdk-next-crypto

Thanks.