* [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps @ 2017-12-08 13:21 Olivier Matz 2017-12-08 13:21 ` [dpdk-dev] [PATCH 2/2] test: add a testcase for dynamic logs Olivier Matz ` (2 more replies) 0 siblings, 3 replies; 4+ messages in thread From: Olivier Matz @ 2017-12-08 13:21 UTC (permalink / raw) To: dev; +Cc: Pavan Nikhilesh Bhagavatula, Declan Doherty Instead of relying on a compile-time option, use the global log-level to decide if the hexdumps should be displayed in the tests. Valitation: # build/app/test --no-huge RTE>>crc_autotest Test OK # build/app/test --no-huge --log-level=8 RTE>>crc_autotest [many hexdumps...] Test OK Signed-off-by: Olivier Matz <olivier.matz@6wind.com> --- test/test/test.h | 12 +-- test/test/test_crc.c | 2 +- test/test/test_cryptodev.c | 144 +++++++++++++++++---------------- test/test/test_cryptodev_blockcipher.c | 8 +- 4 files changed, 85 insertions(+), 81 deletions(-) diff --git a/test/test/test.h b/test/test/test.h index 08ffe949c..fcb983363 100644 --- a/test/test/test.h +++ b/test/test/test.h @@ -37,6 +37,7 @@ #include <stddef.h> #include <sys/queue.h> +#include <rte_hexdump.h> #include <rte_common.h> #include <rte_log.h> @@ -204,11 +205,12 @@ struct unit_test_case { #define TEST_CASES_END() { NULL, NULL, NULL, NULL, 0 } -#if RTE_LOG_LEVEL >= RTE_LOG_DEBUG -#define TEST_HEXDUMP(file, title, buf, len) rte_hexdump(file, title, buf, len) -#else -#define TEST_HEXDUMP(file, title, buf, len) do {} while (0) -#endif +static inline void +debug_hexdump(FILE *file, const char *title, const void *buf, size_t len) +{ + if (rte_log_get_global_level() == RTE_LOG_DEBUG) + rte_hexdump(file, title, buf, len); +} struct unit_test_suite { const char *suite_name; diff --git a/test/test/test_crc.c b/test/test/test_crc.c index 9f2a17d49..d45cd4cfb 100644 --- a/test/test/test_crc.c +++ b/test/test/test_crc.c @@ -86,7 +86,7 @@ crc_calc(const uint8_t *vec, uint32_t ret = rte_net_crc_calc(vec, vec_len, type); /* dump data on console */ - TEST_HEXDUMP(stdout, NULL, vec, vec_len); + debug_hexdump(stdout, NULL, vec, vec_len); return ret; } diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c index 1bed65dad..6662bf373 100644 --- a/test/test/test_cryptodev.c +++ b/test/test/test_cryptodev.c @@ -2052,7 +2052,7 @@ create_wireless_algo_hash_session(uint8_t dev_id, memcpy(hash_key, key, key_len); - TEST_HEXDUMP(stdout, "key:", key, key_len); + debug_hexdump(stdout, "key:", key, key_len); /* Setup Authentication Parameters */ ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH; @@ -2099,7 +2099,7 @@ create_wireless_algo_cipher_session(uint8_t dev_id, ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET; ut_params->cipher_xform.cipher.iv.length = iv_len; - TEST_HEXDUMP(stdout, "key:", key, key_len); + debug_hexdump(stdout, "key:", key, key_len); /* Create Crypto session */ ut_params->sess = rte_cryptodev_sym_session_create( @@ -2215,7 +2215,7 @@ create_wireless_algo_cipher_auth_session(uint8_t dev_id, ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET; ut_params->cipher_xform.cipher.iv.length = cipher_iv_len; - TEST_HEXDUMP(stdout, "key:", key, key_len); + debug_hexdump(stdout, "key:", key, key_len); /* Create Crypto session*/ ut_params->sess = rte_cryptodev_sym_session_create( @@ -2274,7 +2274,7 @@ create_wireless_cipher_auth_session(uint8_t dev_id, ut_params->cipher_xform.cipher.iv.length = cipher_iv_len; - TEST_HEXDUMP(stdout, "key:", key, key_len); + debug_hexdump(stdout, "key:", key, key_len); /* Create Crypto session*/ ut_params->sess = rte_cryptodev_sym_session_create( @@ -2336,7 +2336,7 @@ create_wireless_algo_auth_cipher_session(uint8_t dev_id, ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET; ut_params->cipher_xform.cipher.iv.length = cipher_iv_len; - TEST_HEXDUMP(stdout, "key:", key, key_len); + debug_hexdump(stdout, "key:", key, key_len); /* Create Crypto session*/ ut_params->sess = rte_cryptodev_sym_session_create( @@ -2393,7 +2393,7 @@ create_wireless_algo_hash_operation(const uint8_t *auth_tag, else rte_memcpy(sym_op->auth.digest.data, auth_tag, auth_tag_len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->auth.digest.data, auth_tag_len); @@ -2449,7 +2449,7 @@ create_wireless_cipher_hash_operation(const struct wireless_test_data *tdata, else rte_memcpy(sym_op->auth.digest.data, auth_tag, auth_tag_len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->auth.digest.data, auth_tag_len); @@ -2516,7 +2516,7 @@ create_wireless_algo_cipher_hash_operation(const uint8_t *auth_tag, else rte_memcpy(sym_op->auth.digest.data, auth_tag, auth_tag_len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->auth.digest.data, auth_tag_len); @@ -2572,7 +2572,7 @@ create_wireless_algo_auth_cipher_operation(unsigned int auth_tag_len, memset(sym_op->auth.digest.data, 0, auth_tag_len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->auth.digest.data, auth_tag_len); @@ -3005,7 +3005,7 @@ test_kasumi_encryption(const struct kasumi_test_data *tdata) plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create KASUMI operation */ retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, @@ -3025,7 +3025,7 @@ test_kasumi_encryption(const struct kasumi_test_data *tdata) else ciphertext = plaintext + (tdata->validCipherOffsetInBits.len >> 3); - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); const uint8_t *reference_ciphertext = tdata->ciphertext.data + (tdata->validCipherOffsetInBits.len >> 3); @@ -3105,7 +3105,7 @@ test_kasumi_encryption_sgl(const struct kasumi_test_data *tdata) plaintext_len, buffer); /* Validate obuf */ - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); const uint8_t *reference_ciphertext = tdata->ciphertext.data + (tdata->validCipherOffsetInBits.len >> 3); @@ -3154,7 +3154,7 @@ test_kasumi_encryption_oop(const struct kasumi_test_data *tdata) rte_pktmbuf_append(ut_params->obuf, plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create KASUMI operation */ retval = create_wireless_algo_cipher_operation_oop(tdata->cipher_iv.data, @@ -3174,7 +3174,7 @@ test_kasumi_encryption_oop(const struct kasumi_test_data *tdata) else ciphertext = plaintext + (tdata->validCipherOffsetInBits.len >> 3); - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); const uint8_t *reference_ciphertext = tdata->ciphertext.data + (tdata->validCipherOffsetInBits.len >> 3); @@ -3301,7 +3301,7 @@ test_kasumi_decryption_oop(const struct kasumi_test_data *tdata) rte_pktmbuf_append(ut_params->obuf, ciphertext_pad_len); memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, ciphertext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len); /* Create KASUMI operation */ retval = create_wireless_algo_cipher_operation_oop(tdata->cipher_iv.data, @@ -3321,7 +3321,7 @@ test_kasumi_decryption_oop(const struct kasumi_test_data *tdata) else plaintext = ciphertext + (tdata->validCipherOffsetInBits.len >> 3); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, ciphertext_len); + debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len); const uint8_t *reference_plaintext = tdata->plaintext.data + (tdata->validCipherOffsetInBits.len >> 3); @@ -3368,7 +3368,7 @@ test_kasumi_decryption(const struct kasumi_test_data *tdata) ciphertext_pad_len); memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, ciphertext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len); /* Create KASUMI operation */ retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, @@ -3388,7 +3388,7 @@ test_kasumi_decryption(const struct kasumi_test_data *tdata) else plaintext = ciphertext + (tdata->validCipherOffsetInBits.len >> 3); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, ciphertext_len); + debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len); const uint8_t *reference_plaintext = tdata->plaintext.data + (tdata->validCipherOffsetInBits.len >> 3); @@ -3435,7 +3435,7 @@ test_snow3g_encryption(const struct snow3g_test_data *tdata) plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create SNOW 3G operation */ retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, @@ -3455,7 +3455,7 @@ test_snow3g_encryption(const struct snow3g_test_data *tdata) else ciphertext = plaintext; - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( @@ -3508,7 +3508,7 @@ test_snow3g_encryption_oop(const struct snow3g_test_data *tdata) rte_pktmbuf_append(ut_params->obuf, plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create SNOW 3G operation */ retval = create_wireless_algo_cipher_operation_oop(tdata->cipher_iv.data, @@ -3528,7 +3528,7 @@ test_snow3g_encryption_oop(const struct snow3g_test_data *tdata) else ciphertext = plaintext; - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( @@ -3606,7 +3606,7 @@ test_snow3g_encryption_oop_sgl(const struct snow3g_test_data *tdata) ciphertext = rte_pktmbuf_read(ut_params->ibuf, 0, plaintext_len, buffer); - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( @@ -3764,7 +3764,7 @@ static int test_snow3g_decryption(const struct snow3g_test_data *tdata) ciphertext_pad_len); memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, ciphertext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len); /* Create SNOW 3G operation */ retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, @@ -3783,7 +3783,7 @@ static int test_snow3g_decryption(const struct snow3g_test_data *tdata) else plaintext = ciphertext; - TEST_HEXDUMP(stdout, "plaintext:", plaintext, ciphertext_len); + debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT(plaintext, @@ -3837,7 +3837,7 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata) rte_pktmbuf_append(ut_params->obuf, ciphertext_pad_len); memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, ciphertext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len); /* Create SNOW 3G operation */ retval = create_wireless_algo_cipher_operation_oop(tdata->cipher_iv.data, @@ -3856,7 +3856,7 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata) else plaintext = ciphertext; - TEST_HEXDUMP(stdout, "plaintext:", plaintext, ciphertext_len); + debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT(plaintext, @@ -3916,7 +3916,7 @@ test_zuc_cipher_auth(const struct wireless_test_data *tdata) plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create ZUC operation */ retval = create_zuc_cipher_hash_generate_operation(tdata); @@ -3932,7 +3932,7 @@ test_zuc_cipher_auth(const struct wireless_test_data *tdata) else ciphertext = plaintext; - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( ciphertext, @@ -3989,7 +3989,7 @@ test_snow3g_cipher_auth(const struct snow3g_test_data *tdata) plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create SNOW 3G operation */ retval = create_wireless_algo_cipher_hash_operation(tdata->digest.data, @@ -4014,7 +4014,7 @@ test_snow3g_cipher_auth(const struct snow3g_test_data *tdata) else ciphertext = plaintext; - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( ciphertext, @@ -4071,7 +4071,7 @@ test_snow3g_auth_cipher(const struct snow3g_test_data *tdata) plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create SNOW 3G operation */ retval = create_wireless_algo_auth_cipher_operation( @@ -4098,7 +4098,7 @@ test_snow3g_auth_cipher(const struct snow3g_test_data *tdata) ut_params->digest = rte_pktmbuf_mtod(ut_params->obuf, uint8_t *) + plaintext_pad_len; - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( @@ -4154,7 +4154,7 @@ test_kasumi_auth_cipher(const struct kasumi_test_data *tdata) plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create KASUMI operation */ retval = create_wireless_algo_auth_cipher_operation(tdata->digest.len, @@ -4240,7 +4240,7 @@ test_kasumi_cipher_auth(const struct kasumi_test_data *tdata) plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create KASUMI operation */ retval = create_wireless_algo_cipher_hash_operation(tdata->digest.data, @@ -4332,7 +4332,7 @@ test_zuc_encryption(const struct wireless_test_data *tdata) plaintext_pad_len); memcpy(plaintext, tdata->plaintext.data, plaintext_len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); /* Create ZUC operation */ retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, @@ -4352,7 +4352,7 @@ test_zuc_encryption(const struct wireless_test_data *tdata) else ciphertext = plaintext; - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( @@ -4439,7 +4439,7 @@ test_zuc_encryption_sgl(const struct wireless_test_data *tdata) 0, plaintext_len, ciphertext_buffer); /* Validate obuf */ - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( @@ -5083,7 +5083,7 @@ create_aead_session(uint8_t dev_id, enum rte_crypto_aead_algorithm algo, ut_params->aead_xform.aead.digest_length = auth_len; ut_params->aead_xform.aead.aad_length = aad_len; - TEST_HEXDUMP(stdout, "key:", key, key_len); + debug_hexdump(stdout, "key:", key, key_len); /* Create Crypto session*/ ut_params->sess = rte_cryptodev_sym_session_create( @@ -5122,7 +5122,7 @@ create_aead_xform(struct rte_crypto_op *op, sym_op->xform->aead.digest_length = auth_len; sym_op->xform->aead.aad_length = aad_len; - TEST_HEXDUMP(stdout, "key:", key, key_len); + debug_hexdump(stdout, "key:", key, key_len); return 0; } @@ -5157,7 +5157,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, rte_pktmbuf_iova(ut_params->ibuf); /* Copy AAD 18 bytes after the AAD pointer, according to the API */ memcpy(sym_op->aead.aad.data + 18, tdata->aad.data, tdata->aad.len); - TEST_HEXDUMP(stdout, "aad:", sym_op->aead.aad.data, + debug_hexdump(stdout, "aad:", sym_op->aead.aad.data, tdata->aad.len); /* Append IV at the end of the crypto operation*/ @@ -5166,7 +5166,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, /* Copy IV 1 byte after the IV pointer, according to the API */ rte_memcpy(iv_ptr + 1, tdata->iv.data, tdata->iv.len); - TEST_HEXDUMP(stdout, "iv:", iv_ptr, + debug_hexdump(stdout, "iv:", iv_ptr, tdata->iv.len); } else { aad_pad_len = RTE_ALIGN_CEIL(tdata->aad.len, 16); @@ -5178,7 +5178,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, sym_op->aead.aad.phys_addr = rte_pktmbuf_iova(ut_params->ibuf); memcpy(sym_op->aead.aad.data, tdata->aad.data, tdata->aad.len); - TEST_HEXDUMP(stdout, "aad:", sym_op->aead.aad.data, + debug_hexdump(stdout, "aad:", sym_op->aead.aad.data, tdata->aad.len); /* Append IV at the end of the crypto operation*/ @@ -5186,7 +5186,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, uint8_t *, IV_OFFSET); rte_memcpy(iv_ptr, tdata->iv.data, tdata->iv.len); - TEST_HEXDUMP(stdout, "iv:", iv_ptr, + debug_hexdump(stdout, "iv:", iv_ptr, tdata->iv.len); } @@ -5198,7 +5198,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, + debug_hexdump(stdout, "plaintext:", plaintext, tdata->plaintext.len); if (ut_params->obuf) { @@ -5220,7 +5220,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, memcpy(ciphertext, tdata->ciphertext.data, tdata->ciphertext.len); - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, + debug_hexdump(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); if (ut_params->obuf) { @@ -5260,7 +5260,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, rte_memcpy(sym_op->aead.digest.data, tdata->auth_tag.data, tdata->auth_tag.len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->aead.digest.data, tdata->auth_tag.len); } @@ -5334,8 +5334,8 @@ test_authenticated_encryption(const struct aead_test_data *tdata) auth_tag = ciphertext + plaintext_pad_len; } - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); - TEST_HEXDUMP(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); + debug_hexdump(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); + debug_hexdump(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL( @@ -5548,7 +5548,7 @@ test_authenticated_decryption(const struct aead_test_data *tdata) uint8_t *, ut_params->op->sym->cipher.data.offset); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, tdata->ciphertext.len); + debug_hexdump(stdout, "plaintext:", plaintext, tdata->ciphertext.len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL( @@ -5753,8 +5753,8 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata) ut_params->op->sym->cipher.data.offset); auth_tag = ciphertext + plaintext_pad_len; - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); - TEST_HEXDUMP(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); + debug_hexdump(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); + debug_hexdump(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL( @@ -5827,7 +5827,7 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata) plaintext = rte_pktmbuf_mtod_offset(ut_params->obuf, uint8_t *, ut_params->op->sym->cipher.data.offset); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, tdata->ciphertext.len); + debug_hexdump(stdout, "plaintext:", plaintext, tdata->ciphertext.len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL( @@ -5903,8 +5903,8 @@ test_authenticated_encryption_sessionless( ut_params->op->sym->cipher.data.offset); auth_tag = ciphertext + plaintext_pad_len; - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); - TEST_HEXDUMP(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); + debug_hexdump(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); + debug_hexdump(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL( @@ -5981,7 +5981,7 @@ test_authenticated_decryption_sessionless( plaintext = rte_pktmbuf_mtod_offset(ut_params->ibuf, uint8_t *, ut_params->op->sym->cipher.data.offset); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, tdata->ciphertext.len); + debug_hexdump(stdout, "plaintext:", plaintext, tdata->ciphertext.len); /* Validate obuf */ TEST_ASSERT_BUFFERS_ARE_EQUAL( @@ -6969,7 +6969,7 @@ create_gmac_operation(enum rte_crypto_auth_operation op, if (op == RTE_CRYPTO_AUTH_OP_VERIFY) { rte_memcpy(sym_op->auth.digest.data, tdata->gmac_tag.data, tdata->gmac_tag.len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->auth.digest.data, tdata->gmac_tag.len); } @@ -6979,7 +6979,7 @@ create_gmac_operation(enum rte_crypto_auth_operation op, rte_memcpy(iv_ptr, tdata->iv.data, tdata->iv.len); - TEST_HEXDUMP(stdout, "iv:", iv_ptr, tdata->iv.len); + debug_hexdump(stdout, "iv:", iv_ptr, tdata->iv.len); sym_op->cipher.data.length = 0; sym_op->cipher.data.offset = 0; @@ -7069,7 +7069,7 @@ test_AES_GMAC_authentication(const struct gmac_test_data *tdata) TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, + debug_hexdump(stdout, "plaintext:", plaintext, tdata->plaintext.len); retval = create_gmac_operation(RTE_CRYPTO_AUTH_OP_GENERATE, @@ -7095,7 +7095,7 @@ test_AES_GMAC_authentication(const struct gmac_test_data *tdata) auth_tag = plaintext + plaintext_pad_len; } - TEST_HEXDUMP(stdout, "auth tag:", auth_tag, tdata->gmac_tag.len); + debug_hexdump(stdout, "auth tag:", auth_tag, tdata->gmac_tag.len); TEST_ASSERT_BUFFERS_ARE_EQUAL( auth_tag, @@ -7173,7 +7173,7 @@ test_AES_GMAC_authentication_verify(const struct gmac_test_data *tdata) TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, + debug_hexdump(stdout, "plaintext:", plaintext, tdata->plaintext.len); retval = create_gmac_operation(RTE_CRYPTO_AUTH_OP_VERIFY, @@ -7495,7 +7495,7 @@ create_auth_operation(struct crypto_testsuite_params *ts_params, reference->digest.data, reference->digest.len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->auth.digest.data, reference->digest.len); @@ -7542,7 +7542,7 @@ create_auth_GMAC_operation(struct crypto_testsuite_params *ts_params, reference->digest.data, reference->digest.len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->auth.digest.data, reference->digest.len); @@ -7595,7 +7595,7 @@ create_cipher_auth_operation(struct crypto_testsuite_params *ts_params, reference->digest.data, reference->digest.len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->auth.digest.data, reference->digest.len); @@ -7668,7 +7668,8 @@ test_authentication_verify_fail_when_data_corruption( TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); memcpy(plaintext, reference->plaintext.data, reference->plaintext.len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, reference->plaintext.len); + debug_hexdump(stdout, "plaintext:", plaintext, + reference->plaintext.len); /* Create operation */ retval = create_auth_verify_operation(ts_params, ut_params, reference); @@ -7726,7 +7727,8 @@ test_authentication_verify_GMAC_fail_when_corruption( TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); memcpy(plaintext, reference->plaintext.data, reference->plaintext.len); - TEST_HEXDUMP(stdout, "plaintext:", plaintext, reference->plaintext.len); + debug_hexdump(stdout, "plaintext:", plaintext, + reference->plaintext.len); /* Create operation */ retval = create_auth_verify_GMAC_operation(ts_params, @@ -7845,7 +7847,7 @@ create_aead_operation_SGL(enum rte_crypto_aead_operation op, if (op == RTE_CRYPTO_AEAD_OP_DECRYPT) { rte_memcpy(sym_op->aead.digest.data, tdata->auth_tag.data, auth_tag_len); - TEST_HEXDUMP(stdout, "digest:", + debug_hexdump(stdout, "digest:", sym_op->aead.digest.data, auth_tag_len); } @@ -7871,8 +7873,8 @@ create_aead_operation_SGL(enum rte_crypto_aead_operation op, /* Copy AAD 18 bytes after the AAD pointer, according to the API */ rte_memcpy(sym_op->aead.aad.data, tdata->aad.data, aad_len); - TEST_HEXDUMP(stdout, "iv:", iv_ptr, iv_len); - TEST_HEXDUMP(stdout, "aad:", + debug_hexdump(stdout, "iv:", iv_ptr, iv_len); + debug_hexdump(stdout, "aad:", sym_op->aead.aad.data, aad_len); } else { uint8_t *iv_ptr = rte_crypto_op_ctod_offset(ut_params->op, @@ -7890,8 +7892,8 @@ create_aead_operation_SGL(enum rte_crypto_aead_operation op, memset(sym_op->aead.aad.data, 0, aad_len); rte_memcpy(sym_op->aead.aad.data, tdata->aad.data, aad_len); - TEST_HEXDUMP(stdout, "iv:", iv_ptr, iv_len); - TEST_HEXDUMP(stdout, "aad:", + debug_hexdump(stdout, "iv:", iv_ptr, iv_len); + debug_hexdump(stdout, "aad:", sym_op->aead.aad.data, aad_len); } diff --git a/test/test/test_cryptodev_blockcipher.c b/test/test/test_cryptodev_blockcipher.c index 20f3296d2..faed76ef0 100644 --- a/test/test/test_cryptodev_blockcipher.c +++ b/test/test/test_cryptodev_blockcipher.c @@ -362,12 +362,12 @@ test_blockcipher_one_case(const struct blockcipher_test_case *t, rte_crypto_op_attach_sym_session(op, sess); } - TEST_HEXDUMP(stdout, "m_src(before):", + debug_hexdump(stdout, "m_src(before):", sym_op->m_src->buf_addr, sym_op->m_src->buf_len); rte_memcpy(tmp_src_buf, sym_op->m_src->buf_addr, sym_op->m_src->buf_len); if (t->feature_mask & BLOCKCIPHER_TEST_FEATURE_OOP) { - TEST_HEXDUMP(stdout, "m_dst(before):", + debug_hexdump(stdout, "m_dst(before):", sym_op->m_dst->buf_addr, sym_op->m_dst->buf_len); rte_memcpy(tmp_dst_buf, sym_op->m_dst->buf_addr, sym_op->m_dst->buf_len); @@ -395,10 +395,10 @@ test_blockcipher_one_case(const struct blockcipher_test_case *t, goto error_exit; } - TEST_HEXDUMP(stdout, "m_src(after):", + debug_hexdump(stdout, "m_src(after):", sym_op->m_src->buf_addr, sym_op->m_src->buf_len); if (t->feature_mask & BLOCKCIPHER_TEST_FEATURE_OOP) - TEST_HEXDUMP(stdout, "m_dst(after):", + debug_hexdump(stdout, "m_dst(after):", sym_op->m_dst->buf_addr, sym_op->m_dst->buf_len); /* Verify results */ -- 2.11.0 ^ permalink raw reply [flat|nested] 4+ messages in thread
* [dpdk-dev] [PATCH 2/2] test: add a testcase for dynamic logs 2017-12-08 13:21 [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps Olivier Matz @ 2017-12-08 13:21 ` Olivier Matz 2018-01-16 15:54 ` [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps Olivier Matz 2018-01-17 11:09 ` Thomas Monjalon 2 siblings, 0 replies; 4+ messages in thread From: Olivier Matz @ 2017-12-08 13:21 UTC (permalink / raw) To: dev; +Cc: Pavan Nikhilesh Bhagavatula, Declan Doherty Update the logs test to also validate the dynamic log framework. For now, also keep the old way using the static USER type. Validated with: # build/app/test --no-huge ... RTE>>logs_autotest == dynamic log types error message critical message critical message error message == static log types TESTAPP1: error message TESTAPP1: critical message TESTAPP2: critical message TESTAPP1: error message Test OK Signed-off-by: Olivier Matz <olivier.matz@6wind.com> --- test/test/test_logs.c | 54 +++++++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 52 insertions(+), 2 deletions(-) diff --git a/test/test/test_logs.c b/test/test/test_logs.c index d6e4973a4..0c7397108 100644 --- a/test/test/test_logs.c +++ b/test/test/test_logs.c @@ -45,6 +45,7 @@ #include "test.h" +/* for legacy log test */ #define RTE_LOGTYPE_TESTAPP1 RTE_LOGTYPE_USER1 #define RTE_LOGTYPE_TESTAPP2 RTE_LOGTYPE_USER2 @@ -56,10 +57,11 @@ * - Set log level. * - Send logs with different types and levels, some should not be displayed. */ - static int -test_logs(void) +test_legacy_logs(void) { + printf("== static log types\n"); + /* set logtype level low to so we can test global level */ rte_log_set_level(RTE_LOGTYPE_TESTAPP1, RTE_LOG_DEBUG); rte_log_set_level(RTE_LOGTYPE_TESTAPP2, RTE_LOG_DEBUG); @@ -85,4 +87,52 @@ test_logs(void) return 0; } +static int +test_logs(void) +{ + int logtype1, logtype2; + int ret; + + printf("== dynamic log types\n"); + + logtype1 = rte_log_register("logtype1"); + if (logtype1 < 0) { + printf("Cannot register logtype1\n"); + return -1; + } + logtype2 = rte_log_register("logtype2"); + if (logtype2 < 0) { + printf("Cannot register logtype2\n"); + return -1; + } + + /* set logtype level low to so we can test global level */ + rte_log_set_level(logtype1, RTE_LOG_DEBUG); + rte_log_set_level(logtype2, RTE_LOG_DEBUG); + + /* log in error level */ + rte_log_set_global_level(RTE_LOG_ERR); + rte_log(RTE_LOG_ERR, logtype1, "error message\n"); + rte_log(RTE_LOG_CRIT, logtype1, "critical message\n"); + + /* log in critical level */ + rte_log_set_global_level(RTE_LOG_CRIT); + rte_log(RTE_LOG_ERR, logtype2, "error message (not displayed)\n"); + rte_log(RTE_LOG_CRIT, logtype2, "critical message\n"); + + /* bump up single log type level above global to test it */ + rte_log_set_level(logtype2, RTE_LOG_EMERG); + + /* log in error level */ + rte_log_set_global_level(RTE_LOG_ERR); + rte_log(RTE_LOG_ERR, logtype1, "error message\n"); + rte_log(RTE_LOG_ERR, logtype2, "error message (not displayed)\n"); + + ret = test_legacy_logs(); + if (ret < 0) + return ret; + + return 0; +} + REGISTER_TEST_COMMAND(logs_autotest, test_logs); -- 2.11.0 ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps 2017-12-08 13:21 [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps Olivier Matz 2017-12-08 13:21 ` [dpdk-dev] [PATCH 2/2] test: add a testcase for dynamic logs Olivier Matz @ 2018-01-16 15:54 ` Olivier Matz 2018-01-17 11:09 ` Thomas Monjalon 2 siblings, 0 replies; 4+ messages in thread From: Olivier Matz @ 2018-01-16 15:54 UTC (permalink / raw) To: dev, Declan Doherty; +Cc: Pavan Nikhilesh Bhagavatula Hi Declan, Since it mostly impacts cryptodev test, do you have any comment on this patchset? Thanks, Olivier On Fri, Dec 08, 2017 at 02:21:21PM +0100, Olivier Matz wrote: > Instead of relying on a compile-time option, use the global log-level > to decide if the hexdumps should be displayed in the tests. > > Valitation: > > # build/app/test --no-huge > RTE>>crc_autotest > Test OK > > # build/app/test --no-huge --log-level=8 > RTE>>crc_autotest > [many hexdumps...] > Test OK > > Signed-off-by: Olivier Matz <olivier.matz@6wind.com> > --- > test/test/test.h | 12 +-- > test/test/test_crc.c | 2 +- > test/test/test_cryptodev.c | 144 +++++++++++++++++---------------- > test/test/test_cryptodev_blockcipher.c | 8 +- > 4 files changed, 85 insertions(+), 81 deletions(-) > > diff --git a/test/test/test.h b/test/test/test.h > index 08ffe949c..fcb983363 100644 > --- a/test/test/test.h > +++ b/test/test/test.h > @@ -37,6 +37,7 @@ > #include <stddef.h> > #include <sys/queue.h> > > +#include <rte_hexdump.h> > #include <rte_common.h> > #include <rte_log.h> > > @@ -204,11 +205,12 @@ struct unit_test_case { > > #define TEST_CASES_END() { NULL, NULL, NULL, NULL, 0 } > > -#if RTE_LOG_LEVEL >= RTE_LOG_DEBUG > -#define TEST_HEXDUMP(file, title, buf, len) rte_hexdump(file, title, buf, len) > -#else > -#define TEST_HEXDUMP(file, title, buf, len) do {} while (0) > -#endif > +static inline void > +debug_hexdump(FILE *file, const char *title, const void *buf, size_t len) > +{ > + if (rte_log_get_global_level() == RTE_LOG_DEBUG) > + rte_hexdump(file, title, buf, len); > +} > > struct unit_test_suite { > const char *suite_name; > diff --git a/test/test/test_crc.c b/test/test/test_crc.c > index 9f2a17d49..d45cd4cfb 100644 > --- a/test/test/test_crc.c > +++ b/test/test/test_crc.c > @@ -86,7 +86,7 @@ crc_calc(const uint8_t *vec, > uint32_t ret = rte_net_crc_calc(vec, vec_len, type); > > /* dump data on console */ > - TEST_HEXDUMP(stdout, NULL, vec, vec_len); > + debug_hexdump(stdout, NULL, vec, vec_len); > > return ret; > } > diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c > index 1bed65dad..6662bf373 100644 > --- a/test/test/test_cryptodev.c > +++ b/test/test/test_cryptodev.c > @@ -2052,7 +2052,7 @@ create_wireless_algo_hash_session(uint8_t dev_id, > > memcpy(hash_key, key, key_len); > > - TEST_HEXDUMP(stdout, "key:", key, key_len); > + debug_hexdump(stdout, "key:", key, key_len); > > /* Setup Authentication Parameters */ > ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH; > @@ -2099,7 +2099,7 @@ create_wireless_algo_cipher_session(uint8_t dev_id, > ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET; > ut_params->cipher_xform.cipher.iv.length = iv_len; > > - TEST_HEXDUMP(stdout, "key:", key, key_len); > + debug_hexdump(stdout, "key:", key, key_len); > > /* Create Crypto session */ > ut_params->sess = rte_cryptodev_sym_session_create( > @@ -2215,7 +2215,7 @@ create_wireless_algo_cipher_auth_session(uint8_t dev_id, > ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET; > ut_params->cipher_xform.cipher.iv.length = cipher_iv_len; > > - TEST_HEXDUMP(stdout, "key:", key, key_len); > + debug_hexdump(stdout, "key:", key, key_len); > > /* Create Crypto session*/ > ut_params->sess = rte_cryptodev_sym_session_create( > @@ -2274,7 +2274,7 @@ create_wireless_cipher_auth_session(uint8_t dev_id, > ut_params->cipher_xform.cipher.iv.length = cipher_iv_len; > > > - TEST_HEXDUMP(stdout, "key:", key, key_len); > + debug_hexdump(stdout, "key:", key, key_len); > > /* Create Crypto session*/ > ut_params->sess = rte_cryptodev_sym_session_create( > @@ -2336,7 +2336,7 @@ create_wireless_algo_auth_cipher_session(uint8_t dev_id, > ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET; > ut_params->cipher_xform.cipher.iv.length = cipher_iv_len; > > - TEST_HEXDUMP(stdout, "key:", key, key_len); > + debug_hexdump(stdout, "key:", key, key_len); > > /* Create Crypto session*/ > ut_params->sess = rte_cryptodev_sym_session_create( > @@ -2393,7 +2393,7 @@ create_wireless_algo_hash_operation(const uint8_t *auth_tag, > else > rte_memcpy(sym_op->auth.digest.data, auth_tag, auth_tag_len); > > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->auth.digest.data, > auth_tag_len); > > @@ -2449,7 +2449,7 @@ create_wireless_cipher_hash_operation(const struct wireless_test_data *tdata, > else > rte_memcpy(sym_op->auth.digest.data, auth_tag, auth_tag_len); > > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->auth.digest.data, > auth_tag_len); > > @@ -2516,7 +2516,7 @@ create_wireless_algo_cipher_hash_operation(const uint8_t *auth_tag, > else > rte_memcpy(sym_op->auth.digest.data, auth_tag, auth_tag_len); > > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->auth.digest.data, > auth_tag_len); > > @@ -2572,7 +2572,7 @@ create_wireless_algo_auth_cipher_operation(unsigned int auth_tag_len, > > memset(sym_op->auth.digest.data, 0, auth_tag_len); > > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->auth.digest.data, > auth_tag_len); > > @@ -3005,7 +3005,7 @@ test_kasumi_encryption(const struct kasumi_test_data *tdata) > plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create KASUMI operation */ > retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, > @@ -3025,7 +3025,7 @@ test_kasumi_encryption(const struct kasumi_test_data *tdata) > else > ciphertext = plaintext + (tdata->validCipherOffsetInBits.len >> 3); > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > > const uint8_t *reference_ciphertext = tdata->ciphertext.data + > (tdata->validCipherOffsetInBits.len >> 3); > @@ -3105,7 +3105,7 @@ test_kasumi_encryption_sgl(const struct kasumi_test_data *tdata) > plaintext_len, buffer); > > /* Validate obuf */ > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > > const uint8_t *reference_ciphertext = tdata->ciphertext.data + > (tdata->validCipherOffsetInBits.len >> 3); > @@ -3154,7 +3154,7 @@ test_kasumi_encryption_oop(const struct kasumi_test_data *tdata) > rte_pktmbuf_append(ut_params->obuf, plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create KASUMI operation */ > retval = create_wireless_algo_cipher_operation_oop(tdata->cipher_iv.data, > @@ -3174,7 +3174,7 @@ test_kasumi_encryption_oop(const struct kasumi_test_data *tdata) > else > ciphertext = plaintext + (tdata->validCipherOffsetInBits.len >> 3); > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > > const uint8_t *reference_ciphertext = tdata->ciphertext.data + > (tdata->validCipherOffsetInBits.len >> 3); > @@ -3301,7 +3301,7 @@ test_kasumi_decryption_oop(const struct kasumi_test_data *tdata) > rte_pktmbuf_append(ut_params->obuf, ciphertext_pad_len); > memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, ciphertext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len); > > /* Create KASUMI operation */ > retval = create_wireless_algo_cipher_operation_oop(tdata->cipher_iv.data, > @@ -3321,7 +3321,7 @@ test_kasumi_decryption_oop(const struct kasumi_test_data *tdata) > else > plaintext = ciphertext + (tdata->validCipherOffsetInBits.len >> 3); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, ciphertext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len); > > const uint8_t *reference_plaintext = tdata->plaintext.data + > (tdata->validCipherOffsetInBits.len >> 3); > @@ -3368,7 +3368,7 @@ test_kasumi_decryption(const struct kasumi_test_data *tdata) > ciphertext_pad_len); > memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, ciphertext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len); > > /* Create KASUMI operation */ > retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, > @@ -3388,7 +3388,7 @@ test_kasumi_decryption(const struct kasumi_test_data *tdata) > else > plaintext = ciphertext + (tdata->validCipherOffsetInBits.len >> 3); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, ciphertext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len); > > const uint8_t *reference_plaintext = tdata->plaintext.data + > (tdata->validCipherOffsetInBits.len >> 3); > @@ -3435,7 +3435,7 @@ test_snow3g_encryption(const struct snow3g_test_data *tdata) > plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create SNOW 3G operation */ > retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, > @@ -3455,7 +3455,7 @@ test_snow3g_encryption(const struct snow3g_test_data *tdata) > else > ciphertext = plaintext; > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > @@ -3508,7 +3508,7 @@ test_snow3g_encryption_oop(const struct snow3g_test_data *tdata) > rte_pktmbuf_append(ut_params->obuf, plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create SNOW 3G operation */ > retval = create_wireless_algo_cipher_operation_oop(tdata->cipher_iv.data, > @@ -3528,7 +3528,7 @@ test_snow3g_encryption_oop(const struct snow3g_test_data *tdata) > else > ciphertext = plaintext; > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > @@ -3606,7 +3606,7 @@ test_snow3g_encryption_oop_sgl(const struct snow3g_test_data *tdata) > ciphertext = rte_pktmbuf_read(ut_params->ibuf, 0, > plaintext_len, buffer); > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > @@ -3764,7 +3764,7 @@ static int test_snow3g_decryption(const struct snow3g_test_data *tdata) > ciphertext_pad_len); > memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, ciphertext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len); > > /* Create SNOW 3G operation */ > retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, > @@ -3783,7 +3783,7 @@ static int test_snow3g_decryption(const struct snow3g_test_data *tdata) > else > plaintext = ciphertext; > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, ciphertext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT(plaintext, > @@ -3837,7 +3837,7 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata) > rte_pktmbuf_append(ut_params->obuf, ciphertext_pad_len); > memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, ciphertext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len); > > /* Create SNOW 3G operation */ > retval = create_wireless_algo_cipher_operation_oop(tdata->cipher_iv.data, > @@ -3856,7 +3856,7 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata) > else > plaintext = ciphertext; > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, ciphertext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT(plaintext, > @@ -3916,7 +3916,7 @@ test_zuc_cipher_auth(const struct wireless_test_data *tdata) > plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create ZUC operation */ > retval = create_zuc_cipher_hash_generate_operation(tdata); > @@ -3932,7 +3932,7 @@ test_zuc_cipher_auth(const struct wireless_test_data *tdata) > else > ciphertext = plaintext; > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > ciphertext, > @@ -3989,7 +3989,7 @@ test_snow3g_cipher_auth(const struct snow3g_test_data *tdata) > plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create SNOW 3G operation */ > retval = create_wireless_algo_cipher_hash_operation(tdata->digest.data, > @@ -4014,7 +4014,7 @@ test_snow3g_cipher_auth(const struct snow3g_test_data *tdata) > else > ciphertext = plaintext; > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > ciphertext, > @@ -4071,7 +4071,7 @@ test_snow3g_auth_cipher(const struct snow3g_test_data *tdata) > plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create SNOW 3G operation */ > retval = create_wireless_algo_auth_cipher_operation( > @@ -4098,7 +4098,7 @@ test_snow3g_auth_cipher(const struct snow3g_test_data *tdata) > > ut_params->digest = rte_pktmbuf_mtod(ut_params->obuf, uint8_t *) > + plaintext_pad_len; > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > @@ -4154,7 +4154,7 @@ test_kasumi_auth_cipher(const struct kasumi_test_data *tdata) > plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create KASUMI operation */ > retval = create_wireless_algo_auth_cipher_operation(tdata->digest.len, > @@ -4240,7 +4240,7 @@ test_kasumi_cipher_auth(const struct kasumi_test_data *tdata) > plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create KASUMI operation */ > retval = create_wireless_algo_cipher_hash_operation(tdata->digest.data, > @@ -4332,7 +4332,7 @@ test_zuc_encryption(const struct wireless_test_data *tdata) > plaintext_pad_len); > memcpy(plaintext, tdata->plaintext.data, plaintext_len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > > /* Create ZUC operation */ > retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, > @@ -4352,7 +4352,7 @@ test_zuc_encryption(const struct wireless_test_data *tdata) > else > ciphertext = plaintext; > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > @@ -4439,7 +4439,7 @@ test_zuc_encryption_sgl(const struct wireless_test_data *tdata) > 0, plaintext_len, ciphertext_buffer); > > /* Validate obuf */ > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, plaintext_len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > @@ -5083,7 +5083,7 @@ create_aead_session(uint8_t dev_id, enum rte_crypto_aead_algorithm algo, > ut_params->aead_xform.aead.digest_length = auth_len; > ut_params->aead_xform.aead.aad_length = aad_len; > > - TEST_HEXDUMP(stdout, "key:", key, key_len); > + debug_hexdump(stdout, "key:", key, key_len); > > /* Create Crypto session*/ > ut_params->sess = rte_cryptodev_sym_session_create( > @@ -5122,7 +5122,7 @@ create_aead_xform(struct rte_crypto_op *op, > sym_op->xform->aead.digest_length = auth_len; > sym_op->xform->aead.aad_length = aad_len; > > - TEST_HEXDUMP(stdout, "key:", key, key_len); > + debug_hexdump(stdout, "key:", key, key_len); > > return 0; > } > @@ -5157,7 +5157,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, > rte_pktmbuf_iova(ut_params->ibuf); > /* Copy AAD 18 bytes after the AAD pointer, according to the API */ > memcpy(sym_op->aead.aad.data + 18, tdata->aad.data, tdata->aad.len); > - TEST_HEXDUMP(stdout, "aad:", sym_op->aead.aad.data, > + debug_hexdump(stdout, "aad:", sym_op->aead.aad.data, > tdata->aad.len); > > /* Append IV at the end of the crypto operation*/ > @@ -5166,7 +5166,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, > > /* Copy IV 1 byte after the IV pointer, according to the API */ > rte_memcpy(iv_ptr + 1, tdata->iv.data, tdata->iv.len); > - TEST_HEXDUMP(stdout, "iv:", iv_ptr, > + debug_hexdump(stdout, "iv:", iv_ptr, > tdata->iv.len); > } else { > aad_pad_len = RTE_ALIGN_CEIL(tdata->aad.len, 16); > @@ -5178,7 +5178,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, > sym_op->aead.aad.phys_addr = > rte_pktmbuf_iova(ut_params->ibuf); > memcpy(sym_op->aead.aad.data, tdata->aad.data, tdata->aad.len); > - TEST_HEXDUMP(stdout, "aad:", sym_op->aead.aad.data, > + debug_hexdump(stdout, "aad:", sym_op->aead.aad.data, > tdata->aad.len); > > /* Append IV at the end of the crypto operation*/ > @@ -5186,7 +5186,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, > uint8_t *, IV_OFFSET); > > rte_memcpy(iv_ptr, tdata->iv.data, tdata->iv.len); > - TEST_HEXDUMP(stdout, "iv:", iv_ptr, > + debug_hexdump(stdout, "iv:", iv_ptr, > tdata->iv.len); > } > > @@ -5198,7 +5198,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, > TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); > > memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len); > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, > + debug_hexdump(stdout, "plaintext:", plaintext, > tdata->plaintext.len); > > if (ut_params->obuf) { > @@ -5220,7 +5220,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, > > memcpy(ciphertext, tdata->ciphertext.data, > tdata->ciphertext.len); > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, > + debug_hexdump(stdout, "ciphertext:", ciphertext, > tdata->ciphertext.len); > > if (ut_params->obuf) { > @@ -5260,7 +5260,7 @@ create_aead_operation(enum rte_crypto_aead_operation op, > > rte_memcpy(sym_op->aead.digest.data, tdata->auth_tag.data, > tdata->auth_tag.len); > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->aead.digest.data, > tdata->auth_tag.len); > } > @@ -5334,8 +5334,8 @@ test_authenticated_encryption(const struct aead_test_data *tdata) > auth_tag = ciphertext + plaintext_pad_len; > } > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); > - TEST_HEXDUMP(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); > + debug_hexdump(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL( > @@ -5548,7 +5548,7 @@ test_authenticated_decryption(const struct aead_test_data *tdata) > uint8_t *, > ut_params->op->sym->cipher.data.offset); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, tdata->ciphertext.len); > + debug_hexdump(stdout, "plaintext:", plaintext, tdata->ciphertext.len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL( > @@ -5753,8 +5753,8 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata) > ut_params->op->sym->cipher.data.offset); > auth_tag = ciphertext + plaintext_pad_len; > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); > - TEST_HEXDUMP(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); > + debug_hexdump(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL( > @@ -5827,7 +5827,7 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata) > plaintext = rte_pktmbuf_mtod_offset(ut_params->obuf, uint8_t *, > ut_params->op->sym->cipher.data.offset); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, tdata->ciphertext.len); > + debug_hexdump(stdout, "plaintext:", plaintext, tdata->ciphertext.len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL( > @@ -5903,8 +5903,8 @@ test_authenticated_encryption_sessionless( > ut_params->op->sym->cipher.data.offset); > auth_tag = ciphertext + plaintext_pad_len; > > - TEST_HEXDUMP(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); > - TEST_HEXDUMP(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); > + debug_hexdump(stdout, "ciphertext:", ciphertext, tdata->ciphertext.len); > + debug_hexdump(stdout, "auth tag:", auth_tag, tdata->auth_tag.len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL( > @@ -5981,7 +5981,7 @@ test_authenticated_decryption_sessionless( > plaintext = rte_pktmbuf_mtod_offset(ut_params->ibuf, uint8_t *, > ut_params->op->sym->cipher.data.offset); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, tdata->ciphertext.len); > + debug_hexdump(stdout, "plaintext:", plaintext, tdata->ciphertext.len); > > /* Validate obuf */ > TEST_ASSERT_BUFFERS_ARE_EQUAL( > @@ -6969,7 +6969,7 @@ create_gmac_operation(enum rte_crypto_auth_operation op, > if (op == RTE_CRYPTO_AUTH_OP_VERIFY) { > rte_memcpy(sym_op->auth.digest.data, tdata->gmac_tag.data, > tdata->gmac_tag.len); > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->auth.digest.data, > tdata->gmac_tag.len); > } > @@ -6979,7 +6979,7 @@ create_gmac_operation(enum rte_crypto_auth_operation op, > > rte_memcpy(iv_ptr, tdata->iv.data, tdata->iv.len); > > - TEST_HEXDUMP(stdout, "iv:", iv_ptr, tdata->iv.len); > + debug_hexdump(stdout, "iv:", iv_ptr, tdata->iv.len); > > sym_op->cipher.data.length = 0; > sym_op->cipher.data.offset = 0; > @@ -7069,7 +7069,7 @@ test_AES_GMAC_authentication(const struct gmac_test_data *tdata) > TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); > > memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len); > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, > + debug_hexdump(stdout, "plaintext:", plaintext, > tdata->plaintext.len); > > retval = create_gmac_operation(RTE_CRYPTO_AUTH_OP_GENERATE, > @@ -7095,7 +7095,7 @@ test_AES_GMAC_authentication(const struct gmac_test_data *tdata) > auth_tag = plaintext + plaintext_pad_len; > } > > - TEST_HEXDUMP(stdout, "auth tag:", auth_tag, tdata->gmac_tag.len); > + debug_hexdump(stdout, "auth tag:", auth_tag, tdata->gmac_tag.len); > > TEST_ASSERT_BUFFERS_ARE_EQUAL( > auth_tag, > @@ -7173,7 +7173,7 @@ test_AES_GMAC_authentication_verify(const struct gmac_test_data *tdata) > TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); > > memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len); > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, > + debug_hexdump(stdout, "plaintext:", plaintext, > tdata->plaintext.len); > > retval = create_gmac_operation(RTE_CRYPTO_AUTH_OP_VERIFY, > @@ -7495,7 +7495,7 @@ create_auth_operation(struct crypto_testsuite_params *ts_params, > reference->digest.data, > reference->digest.len); > > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->auth.digest.data, > reference->digest.len); > > @@ -7542,7 +7542,7 @@ create_auth_GMAC_operation(struct crypto_testsuite_params *ts_params, > reference->digest.data, > reference->digest.len); > > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->auth.digest.data, > reference->digest.len); > > @@ -7595,7 +7595,7 @@ create_cipher_auth_operation(struct crypto_testsuite_params *ts_params, > reference->digest.data, > reference->digest.len); > > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->auth.digest.data, > reference->digest.len); > > @@ -7668,7 +7668,8 @@ test_authentication_verify_fail_when_data_corruption( > TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); > memcpy(plaintext, reference->plaintext.data, reference->plaintext.len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, reference->plaintext.len); > + debug_hexdump(stdout, "plaintext:", plaintext, > + reference->plaintext.len); > > /* Create operation */ > retval = create_auth_verify_operation(ts_params, ut_params, reference); > @@ -7726,7 +7727,8 @@ test_authentication_verify_GMAC_fail_when_corruption( > TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext"); > memcpy(plaintext, reference->plaintext.data, reference->plaintext.len); > > - TEST_HEXDUMP(stdout, "plaintext:", plaintext, reference->plaintext.len); > + debug_hexdump(stdout, "plaintext:", plaintext, > + reference->plaintext.len); > > /* Create operation */ > retval = create_auth_verify_GMAC_operation(ts_params, > @@ -7845,7 +7847,7 @@ create_aead_operation_SGL(enum rte_crypto_aead_operation op, > if (op == RTE_CRYPTO_AEAD_OP_DECRYPT) { > rte_memcpy(sym_op->aead.digest.data, tdata->auth_tag.data, > auth_tag_len); > - TEST_HEXDUMP(stdout, "digest:", > + debug_hexdump(stdout, "digest:", > sym_op->aead.digest.data, > auth_tag_len); > } > @@ -7871,8 +7873,8 @@ create_aead_operation_SGL(enum rte_crypto_aead_operation op, > /* Copy AAD 18 bytes after the AAD pointer, according to the API */ > rte_memcpy(sym_op->aead.aad.data, tdata->aad.data, aad_len); > > - TEST_HEXDUMP(stdout, "iv:", iv_ptr, iv_len); > - TEST_HEXDUMP(stdout, "aad:", > + debug_hexdump(stdout, "iv:", iv_ptr, iv_len); > + debug_hexdump(stdout, "aad:", > sym_op->aead.aad.data, aad_len); > } else { > uint8_t *iv_ptr = rte_crypto_op_ctod_offset(ut_params->op, > @@ -7890,8 +7892,8 @@ create_aead_operation_SGL(enum rte_crypto_aead_operation op, > memset(sym_op->aead.aad.data, 0, aad_len); > rte_memcpy(sym_op->aead.aad.data, tdata->aad.data, aad_len); > > - TEST_HEXDUMP(stdout, "iv:", iv_ptr, iv_len); > - TEST_HEXDUMP(stdout, "aad:", > + debug_hexdump(stdout, "iv:", iv_ptr, iv_len); > + debug_hexdump(stdout, "aad:", > sym_op->aead.aad.data, aad_len); > } > > diff --git a/test/test/test_cryptodev_blockcipher.c b/test/test/test_cryptodev_blockcipher.c > index 20f3296d2..faed76ef0 100644 > --- a/test/test/test_cryptodev_blockcipher.c > +++ b/test/test/test_cryptodev_blockcipher.c > @@ -362,12 +362,12 @@ test_blockcipher_one_case(const struct blockcipher_test_case *t, > rte_crypto_op_attach_sym_session(op, sess); > } > > - TEST_HEXDUMP(stdout, "m_src(before):", > + debug_hexdump(stdout, "m_src(before):", > sym_op->m_src->buf_addr, sym_op->m_src->buf_len); > rte_memcpy(tmp_src_buf, sym_op->m_src->buf_addr, > sym_op->m_src->buf_len); > if (t->feature_mask & BLOCKCIPHER_TEST_FEATURE_OOP) { > - TEST_HEXDUMP(stdout, "m_dst(before):", > + debug_hexdump(stdout, "m_dst(before):", > sym_op->m_dst->buf_addr, sym_op->m_dst->buf_len); > rte_memcpy(tmp_dst_buf, sym_op->m_dst->buf_addr, > sym_op->m_dst->buf_len); > @@ -395,10 +395,10 @@ test_blockcipher_one_case(const struct blockcipher_test_case *t, > goto error_exit; > } > > - TEST_HEXDUMP(stdout, "m_src(after):", > + debug_hexdump(stdout, "m_src(after):", > sym_op->m_src->buf_addr, sym_op->m_src->buf_len); > if (t->feature_mask & BLOCKCIPHER_TEST_FEATURE_OOP) > - TEST_HEXDUMP(stdout, "m_dst(after):", > + debug_hexdump(stdout, "m_dst(after):", > sym_op->m_dst->buf_addr, sym_op->m_dst->buf_len); > > /* Verify results */ > -- > 2.11.0 > ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps 2017-12-08 13:21 [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps Olivier Matz 2017-12-08 13:21 ` [dpdk-dev] [PATCH 2/2] test: add a testcase for dynamic logs Olivier Matz 2018-01-16 15:54 ` [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps Olivier Matz @ 2018-01-17 11:09 ` Thomas Monjalon 2 siblings, 0 replies; 4+ messages in thread From: Thomas Monjalon @ 2018-01-17 11:09 UTC (permalink / raw) To: Olivier Matz; +Cc: dev, Pavan Nikhilesh Bhagavatula, Declan Doherty 08/12/2017 14:21, Olivier Matz: > Instead of relying on a compile-time option, use the global log-level > to decide if the hexdumps should be displayed in the tests. > > Valitation: > > # build/app/test --no-huge > RTE>>crc_autotest > Test OK > > # build/app/test --no-huge --log-level=8 > RTE>>crc_autotest > [many hexdumps...] > Test OK > > Signed-off-by: Olivier Matz <olivier.matz@6wind.com> Series applied, thanks ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2018-01-17 11:10 UTC | newest] Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2017-12-08 13:21 [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps Olivier Matz 2017-12-08 13:21 ` [dpdk-dev] [PATCH 2/2] test: add a testcase for dynamic logs Olivier Matz 2018-01-16 15:54 ` [dpdk-dev] [PATCH 1/2] test: rely on dynamic log level to display hexdumps Olivier Matz 2018-01-17 11:09 ` Thomas Monjalon
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).