From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-bn3nam01on0071.outbound.protection.outlook.com [104.47.33.71]) by dpdk.org (Postfix) with ESMTP id 24A30D20F for ; Fri, 24 Mar 2017 22:59:17 +0100 (CET) Received: from DM5PR03CA0001.namprd03.prod.outlook.com (10.175.104.11) by BN3PR03MB2257.namprd03.prod.outlook.com (10.166.74.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.991.14; Fri, 24 Mar 2017 21:59:16 +0000 Received: from BN1AFFO11FD048.protection.gbl (2a01:111:f400:7c10::162) by DM5PR03CA0001.outlook.office365.com (2603:10b6:3:118::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.991.14 via Frontend Transport; Fri, 24 Mar 2017 21:59:16 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1AFFO11FD048.mail.protection.outlook.com (10.58.53.63) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.977.7 via Frontend Transport; Fri, 24 Mar 2017 21:59:15 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v2OLwRmq007000; Fri, 24 Mar 2017 14:59:12 -0700 From: To: CC: , , , , , , Akhil Goyal Date: Sat, 25 Mar 2017 03:27:54 +0530 Message-ID: <20170324215754.21751-14-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20170324215754.21751-1-akhil.goyal@nxp.com> References: <20170303194935.30831-1-akhil.goyal@nxp.com> <20170324215754.21751-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131348663562076197; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39410400002)(39400400002)(39850400002)(39450400003)(39840400002)(39860400002)(39380400002)(2980300002)(1110001)(1109001)(339900001)(189002)(199003)(9170700003)(189998001)(76176999)(86152003)(50986999)(2876002)(54906002)(38730400002)(2906002)(53936002)(110136004)(48376002)(47776003)(77096006)(8656002)(104016004)(4326008)(86362001)(2351001)(36756003)(50466002)(105606002)(33646002)(5660300001)(85426001)(1076002)(8936002)(106466001)(305945005)(81166006)(50226002)(6916009)(6666003)(5003940100001)(356003)(2950100002)(8676002); DIR:OUT; SFP:1101; SCL:1; SRVR:BN3PR03MB2257; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; MX:1; A:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1AFFO11FD048; 1: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 MIME-Version: 1.0 Content-Type: text/plain X-MS-Office365-Filtering-Correlation-Id: 6f8ed3f6-4631-4b52-f52d-08d4730103ba X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:BN3PR03MB2257; X-Microsoft-Exchange-Diagnostics: 1; BN3PR03MB2257; 3:PenpAlTvJHKh5XkWjywBr8rX1eEH0lP5FDb+I4oqnjQ8FxRUYSZ1vA+woWsPRuUCKz/fNzQF5PEeOUi/010FKIxtNLp39jvjURJUO07RvRc2vELdfWwxD2FmMTwkMcTHoMvZDC9opZtoVioFBpTr7r7wIoLmfk5KuwGTfr2lshN3SR1LAq6m1kVf2z766EK0+veTyLOrybUQswTprDyKQBCmiUFCIJhHgFIG1uE1RB0G/Nhk/M0/0Q6XJxD+90w3Sf/UXRpoJz3rAP+v7JoMxzpOZ2LtWnwDiYlCi30H1FeEE6ZJXwDbuz6IqVlIGylutLCTe/IVIlTpevYIZr/VeciaKT8DC7yowu9mdk5xH6qL4xOeGeZT16hF5b23lqzt; 25:0/jKHvuqEmdpb9w62tlsr4RIyh+vhyzavdk9dud+RwbUt1Hw7vUfiX8xX1InNozIB2Pqm0F+KkrQDgDdnYtGeOTnCX7ZSt98rsv/Ic6qX3DvLbtBF9rYh29uaPXRl0R5/JusVmd87APpu2gjwPYaSksvmWZZLS3HUIn3b+hGRVOMN7CD8snb7EbtUTaKZHwZnUGKMrV5oA3D/NxE5Da9TO+GYWRwYER9jEWHM7T0/qmb0mcSY5x6ra9Q29XVjF9eGNSwrT8Iqs7zfWUPjuFJjYfnS1DAsySgl+eQvf26/pKnqv3jBPwpeirrJ8RAFm8L2UpKqDWeRTZTiPX/RZFdALHcm+9fXwpxU7/0o3ELtoJ0UweZxkfxO34SxDDXju/iA3SviiafDoWC1oeBpI38hLdLpOqWgiRrdj3YrSH5nqiZY4FIwb7N38JealYPp6ZvnDD31jAXNFqCskEHn5dChg== X-Microsoft-Exchange-Diagnostics: 1; BN3PR03MB2257; 31:BJj4jQ+rh0j6vgH93EwvWu4OqMF6c31ZTyV+SG6rx+NkP5uyhLSHFIPNObGOrQzSj9h7HmdFudILvUwq+1S3qf7syb9bu8ylZan2pGWMws+4kRfKU+iSxVj5KxkaA8i7XYEmiWWtBUyrIcA/AQI3eQNqWeWi96umtmGexIhjQ6pjBwE2nU/CGwVTSPuDI/lkRppbVECxvfEq5TfmSSW06jJwceJzBRLX6j+vcM5mgXhqNDIjAl2p9PbksGPotHlEO4pl+zr22BI5lbtsYXEMPw== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095060)(601004)(2401047)(8121501046)(5005006)(13017025)(13015025)(13023025)(13018025)(13024025)(10201501046)(3002001)(6055026)(6096035)(20161123559025)(20161123561025)(20161123556025)(20161123565025)(20161123563025); SRVR:BN3PR03MB2257; BCL:0; PCL:0; RULEID:(400006); SRVR:BN3PR03MB2257; X-Microsoft-Exchange-Diagnostics: 1; BN3PR03MB2257; 4:lR2p7tw521GkRJB0nUwqHks3aCDJzcx1vTTKlE8vzPnV6NAbT+/fwHCKLq9+wPysD0HxIyjQ8QeNDvMImSJtVYgh/G8jZeHmJiBqCQDhRHCR+vp4J07qTqfvim2lflXOwsGz1J+0RiMRM7F2yEivcqqn1IOOm7rYJXOhvRnfsFqxsw6MUq0j+VGSWX/EQuUfRB7krng4TC6/hehi72ZkAF6Nn44l3+TNpRyogpY7RMgxpxAooRAi74GgLU31a28CKJ2kTl+q1NFmg6yfR1KgtFKHOMURIy/BjxRb7JNZEVQHmUUcfs66lh8KXiLP5dd9udutCTXGbCF/XzyxIXDeIp7BvKiPmkihj6qHfF3A9kShorpwMPSH3V8Fn2s8dvRrzrpLAiC/hv5zPUB7lD6riS7GZppBkMeFxZ8eoX7t+891OctFV33UKtFyDuTaNj5doGTJA++GJbwpNynvm1zmLyLIjVR7Ffh5Rxwkyxqc9SyU2DlTKazWjEFtsQVj01sU1bZ5caqEmafY0TbtpQlfkpzSalFcdUyiN5v8alJUV6PegKY7KgeRAf/hkH8zFRFlHzROAmxXcHwbu6x/1VAClMojsbjOMfRp2HSOLtAtqgCL9Rw5s9JKzRzhnuCyy07YsZQtTG6xWXvzga3IXHoYT8Eg3wZEGgL+Z2FZv5BdqabkFsXLKodig4aPl+tMckUeHx1VNRcEwrpev2EXwYTQtTSNuTYzh2hJrbhZmlO7FnTjPahWhJLIl0zztSGr1YId X-Forefront-PRVS: 0256C18696 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN3PR03MB2257; 23:PCHR2SSk5eMxbBvPOnX/H2yISMUMQmHJeXUsCKzYE?= =?us-ascii?Q?oSeotl2UXPvaojc3t1IGwDn8AddFcXcWqo9LIenWCwVrkn8gkSe7T05+RdwW?= =?us-ascii?Q?2J2ab9pwqSXoviTrZWd+VqNIND4kcR95YU3ICPbf7+DiJGZKtJuqwI86R3Lb?= =?us-ascii?Q?FSMS1fxNx5kBcPm0aIYKKB/BZC9tKnDsKyjC8qDE5qkNmjoC/o5xhEq6tLWW?= =?us-ascii?Q?syGxY5QjKAvC/sgAcPt409Fe87JkPDEJ+tTHV1zh2TtWH/xxo3db/Z+MwNIM?= =?us-ascii?Q?8xbgKqKUvdOf1notHg+uUFJQtyQK8nrF5Vqb2D/N7Lxg1GvosdMdpBps0KeK?= =?us-ascii?Q?yhGd2lrttUYCmEK1ff1+0CtzF4aUSifX5UawM6B1IMjnPoW2Le95aSN3Ekut?= =?us-ascii?Q?+7Bun6CqACbrV1XpQpsVpCf17sO93hZAGV6JbPhzTumGTI919Ddo2juV+86F?= =?us-ascii?Q?8gqjeY6E/QT2QNA498cjfcimWLrpCwThHa94MqqwS59i3gkwiOIMbivTDiGJ?= =?us-ascii?Q?ZYrPJ0Ra3TBtly+CoMQXGode14amCqDwe2MLpePElA0WcyruJQ14k811gJZe?= =?us-ascii?Q?PZO3iLyCFd4DGyO9zAv0LrHLVo6QgBjCXLtM4Uy8V5K39+52mZj7bFAi0bA1?= =?us-ascii?Q?dpDHSrm9+1WHPUOuFj42XOnmPcKRGglfL/RBKODsc/Vis6eAntyxL8y/Cp/D?= =?us-ascii?Q?UqZMxS1H2czuCYgI5R6gr/EVGDLQVHBiV1UQZmdSp/NJUn39YDBoZQ9VK9EN?= =?us-ascii?Q?n4FZbVtkM9ecd/hTKQu3T+qpOmlG4UePooBf3MfEc8fU57RJTqUCmdaCM+b3?= =?us-ascii?Q?PwFYPEnZY/5bwvGdr+OVRx5szrILPIn+DJcAnSH2LYmjrayHkew7BVuyBNjt?= =?us-ascii?Q?wxUV+gJ0cy+Y4eiawZYZ9qyN+X0L4SoPoL0rGTX7U40c0AwRKzyXE/je+wOS?= =?us-ascii?Q?ShqaVk4UpLiS1qjbpXDNTtNR+Eh4eXGUI1qqmnxnpYIgpzUHPKkDSCAId5g9?= =?us-ascii?Q?0MmDnyzubbpOqQHx/rohF6BY7Bu68bRDcaxpUFp5uUwR9cm1t4ZQJoUEgQBd?= =?us-ascii?Q?onnipsmF27J8aAJTyE+RUu3myZdkSRn6gngbxHjFeSOh7QK6eRU3YUbf3lZM?= =?us-ascii?Q?XjifDKtX1Zo48xPm/6McdVU8vSEuyuhZjYqc3VSHDawah5We7EZtUg9Edn5X?= =?us-ascii?Q?53ujDLLcHz1Yo/sec7bUKJo95dC5g874VAj30dE+23k5QzDovu3onkKsIOhY?= =?us-ascii?Q?U9fSxBSqol2t2nuaYpWLOCuIjOJ+bewt6yePkxY?= X-Microsoft-Exchange-Diagnostics: 1; BN3PR03MB2257; 6:MCpmTXEb9gSu+wEK/N8a9cdZsLdTxtRz3ON4H4ewXEvR2TC+KhLlaC1G4pvCjDdmzIBACZIJeg74+9NsFxgmBe3AF2jfHLKB7DTifgy3CH7aqxRkw8DauiEQWTxWuuQYg2b5Djbxs+Qg/ToOg6/2RRbt+oYt5zPkAEa/Z0QDxIs5j4cwT5m+/V/C6gOSs5HW13Py+w0FOdkbSuaNUsbp8fn9zZw85xdTUe0Ohfd/+wcAkTQSLz5qxkFD5NDXyhHknTNdBHFPealb5qpzUFxTK9sJFdGVWVBiPc1GB2hs0/d3angVG00A7daIQFKqRqgToQQm5SqA5mwvmGeSgPkAfwq52K6oOJYukgbVHjYJF51HuV+IuKvJqDo5DQE6VJl9PDcWgxWp7NHx+dcsHugE2sBufzR779LsNlQulB507Fc=; 5:WfNLeq5Ox96zl4gCbCOan0bjRrwJxeV9XqaY9SOJg1OTkg2rdZ3WfhfeMELnc/I/IHsFQ9w0w7FCzI5ZKrK/MYcX1YioAo8Wi7d3m44CSNvm9+0QxsGUCWQ7kttHRaJ1Hi+3AYmHhT6huCjF2haFqTb+HD4Vj2eIS167ObGgQKbry02dEBTL2O+m/ifQdyjJ; 24:XxX/zc1XEB7FbSOEqv+sb2q+sZrpcpxE/pWBPpa+UgAw6vu+W4P4Hb4FXm8R3X+JceWE1J6kGQEq1P9rWGpMnXDmJMocrRKPge5AHTDGrk0= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BN3PR03MB2257; 7:nIq34KujCjGu11sL7rom2wkxPGhivzLTChKILJsM1NNZn4jRDdwkniOP4pYFlA4qQcZynMEQxYasxbOTptoJT9D585v9lqu6aoTnYUMBmr67G1QBCKK3GUA6TRt9EmFduelZKLSVI0YYDIkXJB8wqkV67J6fhtvZj4pZb9WoK8KYF+juBvY2d5LqmyE6P5URE41IlD74S3gtIPFvF3ayirNjcpeh7/PGwEpFW9v5RD9RIoWDkSodyfWUOg1V6axfl0wC0fXWGif7KHwXCQk9NWcDBjtyCh6l+9APoA+JIipBIIHEPCKJO4J+svPV1yQsXnWBPfn78pZd1taHk9B7uA== X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2017 21:59:15.8956 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR03MB2257 Subject: [dpdk-dev] [PATCH v6 13/13] test/test: add dpaa2 sec crypto functional test X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Mar 2017 21:59:18 -0000 From: Akhil Goyal Signed-off-by: Akhil Goyal Reviewed-by: Hemant Agrawal --- test/test/test_cryptodev.c | 106 +++++++++++++++++++++++++++++++++ test/test/test_cryptodev_blockcipher.c | 3 + test/test/test_cryptodev_blockcipher.h | 1 + 3 files changed, 110 insertions(+) diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c index 357a92e..0b39c2d 100644 --- a/test/test/test_cryptodev.c +++ b/test/test/test_cryptodev.c @@ -1680,6 +1680,38 @@ test_AES_cipheronly_qat_all(void) } static int +test_AES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_AES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_authonly_openssl_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -4333,6 +4365,38 @@ test_DES_cipheronly_qat_all(void) } static int +test_3DES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_3DES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_3DES_cipheronly_qat_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -8087,6 +8151,40 @@ static struct unit_test_suite cryptodev_sw_zuc_testsuite = { } }; +static struct unit_test_suite cryptodev_dpaa2_sec_testsuite = { + .suite_name = "Crypto DPAA2_SEC Unit Test Suite", + .setup = testsuite_setup, + .teardown = testsuite_teardown, + .unit_test_cases = { + TEST_CASE_ST(ut_setup, ut_teardown, + test_device_configure_invalid_dev_id), + TEST_CASE_ST(ut_setup, ut_teardown, + test_multi_session), + + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_cipheronly_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_cipheronly_dpaa2_sec_all), + + /** HMAC_MD5 Authentication */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_2), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_2), + + TEST_CASES_END() /**< NULL terminate unit test array */ + } +}; + + static struct unit_test_suite cryptodev_null_testsuite = { .suite_name = "Crypto Device NULL Unit Test Suite", .setup = testsuite_setup, @@ -8210,6 +8308,13 @@ REGISTER_TEST_COMMAND(cryptodev_scheduler_autotest, test_cryptodev_scheduler); #endif +static int +test_cryptodev_dpaa2_sec(void /*argv __rte_unused, int argc __rte_unused*/) +{ + gbl_cryptodev_type = RTE_CRYPTODEV_DPAA2_SEC_PMD; + return unit_test_suite_runner(&cryptodev_dpaa2_sec_testsuite); +} + REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat); REGISTER_TEST_COMMAND(cryptodev_aesni_mb_autotest, test_cryptodev_aesni_mb); REGISTER_TEST_COMMAND(cryptodev_openssl_autotest, test_cryptodev_openssl); @@ -8219,3 +8324,4 @@ REGISTER_TEST_COMMAND(cryptodev_sw_snow3g_autotest, test_cryptodev_sw_snow3g); REGISTER_TEST_COMMAND(cryptodev_sw_kasumi_autotest, test_cryptodev_sw_kasumi); REGISTER_TEST_COMMAND(cryptodev_sw_zuc_autotest, test_cryptodev_sw_zuc); REGISTER_TEST_COMMAND(cryptodev_sw_armv8_autotest, test_cryptodev_armv8); +REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_autotest, test_cryptodev_dpaa2_sec); diff --git a/test/test/test_cryptodev_blockcipher.c b/test/test/test_cryptodev_blockcipher.c index da87368..e3b7765 100644 --- a/test/test/test_cryptodev_blockcipher.c +++ b/test/test/test_cryptodev_blockcipher.c @@ -653,6 +653,9 @@ test_blockcipher_all_tests(struct rte_mempool *mbuf_pool, case RTE_CRYPTODEV_SCHEDULER_PMD: target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER; break; + case RTE_CRYPTODEV_DPAA2_SEC_PMD: + target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC; + break; default: TEST_ASSERT(0, "Unrecognized cryptodev type"); break; diff --git a/test/test/test_cryptodev_blockcipher.h b/test/test/test_cryptodev_blockcipher.h index 053aaa1..921dc07 100644 --- a/test/test/test_cryptodev_blockcipher.h +++ b/test/test/test_cryptodev_blockcipher.h @@ -52,6 +52,7 @@ #define BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL 0x0004 /* SW OPENSSL flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 0x0008 /* ARMv8 flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER 0x0010 /* Scheduler */ +#define BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC 0x0020 /* DPAA2_SEC flag */ #define BLOCKCIPHER_TEST_OP_CIPHER (BLOCKCIPHER_TEST_OP_ENCRYPT | \ BLOCKCIPHER_TEST_OP_DECRYPT) -- 2.9.3