From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0082.outbound.protection.outlook.com [104.47.32.82]) by dpdk.org (Postfix) with ESMTP id 53E8F5587 for ; Fri, 30 Jun 2017 09:44:50 +0200 (CEST) Received: from BN6PR03CA0095.namprd03.prod.outlook.com (10.164.122.161) by BN1PR0301MB0596.namprd03.prod.outlook.com (10.160.170.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1220.11; Fri, 30 Jun 2017 07:44:48 +0000 Received: from BN1BFFO11FD004.protection.gbl (2a01:111:f400:7c10::1:125) by BN6PR03CA0095.outlook.office365.com (2603:10b6:405:6f::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1220.11 via Frontend Transport; Fri, 30 Jun 2017 07:44:48 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1BFFO11FD004.mail.protection.outlook.com (10.58.144.67) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1199.9 via Frontend Transport; Fri, 30 Jun 2017 07:44:47 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v5U7iWIY022821; Fri, 30 Jun 2017 00:44:45 -0700 From: To: CC: , , , Akhil Goyal Date: Fri, 30 Jun 2017 13:13:22 +0530 Message-ID: <20170630074322.30661-6-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20170630074322.30661-1-akhil.goyal@nxp.com> References: <20170629204904.23684-1-akhil.goyal@nxp.com> <20170630074322.30661-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131432822881039123; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39400400002)(39850400002)(39380400002)(39860400002)(39410400002)(39450400003)(39840400002)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(9170700003)(50466002)(5003940100001)(76176999)(53936002)(104016004)(50986999)(105606002)(106466001)(48376002)(575784001)(81166006)(50226002)(5660300001)(2351001)(86362001)(8676002)(498600001)(356003)(85426001)(36756003)(33646002)(4326008)(189998001)(6666003)(2950100002)(6916009)(38730400002)(47776003)(2906002)(110136004)(54906002)(8656002)(8936002)(77096006)(1076002)(2876002)(86152003)(305945005); DIR:OUT; SFP:1101; SCL:1; SRVR:BN1PR0301MB0596; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; A:1; MX:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN1BFFO11FD004; 1:gCUQ/f1tMc+dsuxdCBtpEobtFbtFwMWuiMfqiAtJt?= =?us-ascii?Q?IB+yy4yLklUiuMtk3fWDO6HJcGIjTtKDa88gtzu198M1AxyR2bALEAnkOmdp?= =?us-ascii?Q?QbLjkEHAUWqx4m8aWeaSOOgFLrcbq314etbYzVc/QVavYH0mA5DTuEAG94Li?= =?us-ascii?Q?6Lm322YXZpH8xHL8cr0FmTtIe3WhygLIRFwqAmJ5DWX5JJRrO36MmVBJXwBT?= =?us-ascii?Q?4sq1oO+NlgDXur6kiKGtvnf+64PQC37k/jiJbEb1WmPulzghEtGjTD3TpeTS?= =?us-ascii?Q?6FQFAuBYTnbRAr8iyxSnxF3oIgiKLib7LpLqDxY2FSnR+BTV+yNgr2NrHsri?= =?us-ascii?Q?H9HPwicBqZW+kgGbGOpnYWc5uRDU9jyp9Rt6dXoff+lPUJLar8SJMp66ER9a?= =?us-ascii?Q?lRE2cCkR48fAxK2gq52KBWQy9jIRzmMHlUF1dPT7hJqzDbwzyFguU5Z7hCz3?= =?us-ascii?Q?kEt9hcvo7kAWtXMxLHRO9CPq2gUx+RbVhuPkjN+qDkxMKajAH7I1DLZe8G+E?= =?us-ascii?Q?5P/izNr8guGbs8SfODTk95wlSlWOfm2dXsZE7xCxhdf3AS3P88ntXTgxBGpS?= =?us-ascii?Q?sTcdF67oNN54qkXtCzad7MMW5turq+b4t/9blNja9yWgdwt0S999814VlgzX?= =?us-ascii?Q?PUDNMPKCgaqBBgVyqjfU4DwHONkPlektvTsGJmQISrElfM6RuNmFmdarxERd?= =?us-ascii?Q?ozs57OBc+0530y8WQ6Oh4RzSqgHZ2xIT4MUJzDx/Vc8fM13iuGHu0/yJ0tm2?= =?us-ascii?Q?Iob8BdPuy9HKBRn1scCoDbclKsQqUnKqO7rylHlDqKkfnqvIffb3B6dn5/K5?= =?us-ascii?Q?K6QxCgJzRWKTU3qSxEQO3M//EeIlYy8TqEr5FmHLrMU5SgwI2BUBglmisKzf?= =?us-ascii?Q?VRhbuMDv7oW/i4a3rlVSbloIIJ+rfUfnrgnfm1j+Lkm2GA+eRLeZ9H96uFzp?= =?us-ascii?Q?W0FLj11w9qOzWTivCEqB9MF3C9/OK9FweYBezmPxkrnice3cjJ3xAv+qUxO8?= =?us-ascii?Q?lhxqFmaR+ye+ali81yN0FG7FDKmHjP+ildMjydouspUR5xNFec0CwdBJepJ5?= =?us-ascii?Q?LW6bL33SQp1G7pHi+1Pfz8UcmiGA2xwJHdWYKA6j60iLxZ5XQ=3D=3D?= MIME-Version: 1.0 Content-Type: text/plain X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 87b6760d-f70b-44af-b313-08d4bf8be21d X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603031)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BN1PR0301MB0596; X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0596; 3: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 X-MS-TrafficTypeDiagnostic: BN1PR0301MB0596: X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0596; 25: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 X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0596; 31: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(13016025)(5005006)(13018025)(8121501046)(3002001)(100000703101)(100105400095)(10201501046)(93006095)(93001095)(6055026)(6096035)(20161123559100)(20161123561025)(20161123563025)(20161123556025)(20161123565025)(201703131430075)(201703131433075)(201703131448075)(201703161259150)(201703151042153)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BN1PR0301MB0596; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BN1PR0301MB0596; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN1PR0301MB0596; 4:dqEZWkjevTgP7p1eGtynE7T2vi2Gd740BLH4wMkx?= =?us-ascii?Q?7zv1p476tGSEillPWLEMV1esWiqG9UgxeM3pBx9DSfhiRbRR9oMoZagWizij?= =?us-ascii?Q?CYhh8UWM8ox0jF99V1zTNf8OMzysUubvRr7bTo/h21PeZHjVfncLudmJPrBI?= =?us-ascii?Q?mLxVlJLAgGHFIsf+3kJiof5/q3dcUce6wNoQbRXWnRd0Jlxdvnn3gPNWJglc?= =?us-ascii?Q?vVQCW+Vbe9KU0jjzVQ8cyvaxP0DGZYV8kxVv315A9/pKjZ93Q73l1VNARW+r?= =?us-ascii?Q?XTuWT4YOP5iZnvSNgfi/r/PATbuYEFQeUBoBzhYzUwWBSrKcG/YWWm9yYtVS?= =?us-ascii?Q?yWMQZJwR17wAuCOHWZ/6lwAeTThbiYdevuyZPR8G8/Gp9/fhde9l77/ThGnU?= =?us-ascii?Q?EecxIkuoUnN/QRZLci9tj2lY2zi+qF008kVWyGjlPEkz7lLV7DC2TJ6i7mMz?= =?us-ascii?Q?lIVjhh9pGoGQr1OBUv6u+uYir7jOCKE+NWciIzoLLLGUKdoYAV+Tncxs5FwP?= =?us-ascii?Q?5vyk2qyKT76zI/3bN1jFMmxmRcIOHkfFm4RoiMzM2wY5Ktuo7X8qDvPoZ94B?= =?us-ascii?Q?08zzhFn/n7lmvk5xZRKYsKP81nCvpE1hDbNRJdjv12X5SWTK45RDVBskYTcW?= =?us-ascii?Q?eO0MDXfCjceuu62tNlDOcuhuqwkppcLL6joHYxwHs0x30KYlMqWcco7+YJa/?= =?us-ascii?Q?yxiCEDyCLIuljxeQUPDvBOKVFZzIOzHPstJK3DQOvHsef8zv69kHne+s5EX+?= =?us-ascii?Q?SN379eqPc1GAl11Tm3rY3Mu+yAn611dyXH9zIpSbqOt4b4opRtS77/PhRw+z?= =?us-ascii?Q?15FMIU5lU2GxjyHhpmBAoQLQdxCTyuQbVkLvxE21i8MejWOPQshwmT/X40Hq?= =?us-ascii?Q?lcahVpWOLp8UuTIRV7nBDEPp5pn9iAyKcguBoXr7UlHMfMl/41QZAugUm+j5?= =?us-ascii?Q?yJDuwcneF3enk4L2EhYiFPcmc9vEQlb+ZWwHnyLxSZApREPkszvGveA9D0No?= =?us-ascii?Q?MKN3+JlwsUw+IZiNjlF4CgWeRukLMGCX48y1Ntd9V7KTa5eJwdr2o5iZYD5L?= =?us-ascii?Q?/Jxlb7dTfE0z1zcz4ScYKJx5mZ2UgZgGUAItd+DjFtM1OnuhB9SJjBI1RIus?= =?us-ascii?Q?9C9tqJVHCWr63sV94s6iFfCrgpXExqa1atrrvTsptpuPU1B+A2ht5ASOEnK4?= =?us-ascii?Q?MnUg+RImBLaR3BMtCGcWY/ipBB9RDBNT0eHr332T1X4sWQZpGFcqy0ynk2tU?= =?us-ascii?Q?RCjSiYVtYeM13N51yFAKnwFZ8JOzfhJEuHC7+Fad?= X-Forefront-PRVS: 0354B4BED2 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN1PR0301MB0596; 23:kdZKD8TAJGZ/EuYEMIshaW5aEfNvuAZBnw5nLt9?= =?us-ascii?Q?k/vgCzen21Wv5G+bnTDlTLQfjB143dq3z2LVyxX+KFORGr4ZJkV9YeL5ITmg?= =?us-ascii?Q?VPqFraLyjtK0CkIYSF3EoCOQmwxyhYLlxp+dAeFweMFzcOT3MxDhlIEzRrSN?= =?us-ascii?Q?tSBlfW867T3fyd7gwCui84K54GQ4pXelrizSKNT0qPd0T2jJBBU3eCxZ7aX+?= =?us-ascii?Q?IoxWM1DE/7kg+8tuhrgDn+0VcuxoEwUklGJtSInv/lh9OOyWxdjtxbh4n5YT?= =?us-ascii?Q?QeuYiMKz4NjUCmfV9mrOrOaExWCWgLp93Y9mM4foWkxocNByySwp/ieqD5ba?= =?us-ascii?Q?PU+XRkXUVtXjpLPVszNpMDT4zncJyDRh9CiHZcX0XxUtCaAnDbKUdVeENNR9?= =?us-ascii?Q?SKB1hGHWujvTRGlmObV82h1CrEZvTs749fIc1gm6MEf9QD362tb3AVA1s8ls?= =?us-ascii?Q?ST/sBn/G0OG6pSS+ZWQU/GBsfDp5DcnwxllGYvqNYvhGzmNHpuGVRnrrNmrQ?= =?us-ascii?Q?FhV740d5jpEKiZAyWNMueE8zbwkL4Yyo3JimmMdJHardsvEGO9J2dbwfW8Tx?= =?us-ascii?Q?X6Q/1mqv2Oc2RA8vq5iAnx+6fA6RFHOMxMW1MIic9Q6/WKi2kan82vUbPpHQ?= =?us-ascii?Q?1KQ4iqTAw1BfzBcBsC4CrcZC96gRgWEetDbr33idBqOuaZ9aHvpsqFU5HEeV?= =?us-ascii?Q?ZZMLXKAZabtRDe4aIQO3w3NlAR3Tu+lEYKB8Hah9XsEXaddm4yM38i+RBz2d?= =?us-ascii?Q?Z1A04Y0ejhm/x8KGv3elE9PfMl9xowtXLr9UUpkpZ2XPJlPGo8c/gj0KU1RV?= =?us-ascii?Q?X/bOO7aUnrT18vzjF6JjjRr+3KebDrJP7NAJg8KBR/bXCduwVCHrN4IGRySP?= =?us-ascii?Q?YMKV1JL8FlnDSkjW6W1vi9plnVjvmoweXmmmZQvf6dyEwFKsworiR1B5m0jm?= =?us-ascii?Q?ae7iyhpTRlUG2Xyn6sla1Y6unfHciBzgJaHYp00WdG5SzgpCnfcZwFl2MsmI?= =?us-ascii?Q?MxX2SnUpwIrvLf99ZcHKXW3QURZJ9axAqkDkm4UE7tsfY7R2MfCyhR6O+bIZ?= =?us-ascii?Q?1aiXKPAe41NNhXqJryMl4ZdQM7CNtMQmBgSDxpDK58NGBnkfptD++p/iUP5B?= =?us-ascii?Q?8Rb3IA3g7m3G34K7aL2lLGCiiQ0yjK5h9Mq+Ef/Bj0TjoX68AkS207WVNwK/?= =?us-ascii?Q?A7f83jqnZscnIUIcL8cFM19phxHBGgQB268PpLY2DGw5XWFf8UGYy6V4EYY7?= =?us-ascii?Q?TNhnvoU5OjoNatdneG6KFLVTuwwoMmYyY247jcGgFpYBrsDjLEIy6nfmk0Wd?= =?us-ascii?Q?xofnmIc336gN4Ywvu8f8UCSU=3D?= X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN1PR0301MB0596; 6:QrdVqgxYlWa7oQokioGHJ7Wu5eI26rDS5ieE30Wg?= =?us-ascii?Q?y3NM2QzjqqLo/wTUOWLvGQZNbFkjZdt7C5OzFCaHCaqr4v1GE9TT32dykTSI?= =?us-ascii?Q?U+r6Ft/2aVf2hYDLKmEmi1OWxkUffVjDwGtIhebIu1l7vS2DeBxEhZBrtRww?= =?us-ascii?Q?OOltB4Ifw4ZNmW9g5cGlrj4zRPQnh7at1Xsa8fru9w9LQ3p63CipQeJ1Wedw?= =?us-ascii?Q?9h0UZdLAu02kgVBZ0Jg1cX9VW+s2aPGYrsOs9XAYF9e/upo0lzbw1e7ht4Oy?= =?us-ascii?Q?RTW+ZWjvIBNnZkGZsHw3VOI5MxloDXIfCG82dnmLusIB5bvjON8R3h4RVr6V?= =?us-ascii?Q?rqMSW5dplS6w9i3/Q7QiFSmsP8m1BHezoY2CsaQt0bzvXRiuhqS8lGAoc2eL?= =?us-ascii?Q?M8MSoyCFD/ZYBRsMZQmzU/FHfmoAgFGLoIvcK03YDW9CSe2j8+pzTceFrj7Y?= =?us-ascii?Q?DxLQ9XRWXAkefdHtRAK7hPUCDRLAIJVkkTT84SnQfh7SiSp0z/2rfMWBOSq1?= =?us-ascii?Q?nZ30SWLSkZGZ68pasP+JLU9byNk6SLsnvC54oW1J8mPyMEeg3s5to0ql3d1S?= =?us-ascii?Q?d/+72ZhH4MOmHNkK63q63zheD6kWG0eOTDUAF2AkKcB8BdAh7Ncg2GTNNW6G?= =?us-ascii?Q?jMQGxboZ0p5+89SnzbPHaV8TS0gKCkxWd/rKC6i6vFsvhwLWW+ScpqrfEoBS?= =?us-ascii?Q?Efo6uOTH/ZiESVfNHukWVWYZH3fpuKoKZDHy5PCQDE1Qcq/coRoqJNMiAyeA?= =?us-ascii?Q?/D7z9lYgqUug4BfeBMC/mxuj30JkZd77xhiD9h/HoXsxZYeQZGhHpIRENA3T?= =?us-ascii?Q?yefXigTjrJpZDIHhvel9ps2Pejlc49RjuNfm5X+k91cSyuG6MqWDjRSwYl5z?= =?us-ascii?Q?EcHX9mqeBBdcPNJiaTB/2p/88JWxATLkufGAtl6YiqTMMaj7lYDZExaOKSAV?= =?us-ascii?Q?xTh3LTTgNwqk8SPFsBBnv+aChNAZQct3dA6RXMO25A=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0596; 5: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; 24:wikYnChpPHswhx8s+MPIte79eQzFWMCSZ/e+NrXxJK3opOFA5casx3U7RNTs3U/S8O7bp03aNhl8fy2RC5hN7ie2T5wL9ytdhBS65T/U/sY= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BN1PR0301MB0596; 7:6s5ZlkkwbVHKbOVZXFNcKaoIicxXGMy2MtLzmBzKs9Yb08QGGerpy6ZXfgl3YBU2qVsh4pHbTQDmsJfYmtZpiE8aUBO1f1lSmwWV0hpL4sJc6MLNATBL1kXXlz80/MKeL26vN9btCfjPLmQaoj2DIzH+8Xckee73k3FXgX29/G+3joi3oqmZRY5NXcs5MBRlp/j/zIHYoYHQiumIUI1IZFZBRC0bSzb6Iaz3rha1ZtFFcJPlN1+x4eudeV1tfBcO5pm14E7NFCyYdSPx95QoQj5XwXqG6zKliE63qG/YyaBnScmIy3/NrqvsDjNBf0nlI4fjHIFD9eW9691g0VZxAOyJB/CpZwSdh4kWxqWVM4E3FckV/JDimIldzo1jGfpMR7mhfkwf3QmGbD1IxJL4CF3j90lKop+Cn0BwhlDIOFt6nnBuA28NG/LcwZli3Mqotl9h7og7QuHSKG8TTZddBuGOOg4mFeQG/3J1wCbATcSne7lry/97Wwqic6qZlHaNBa391/zXKpRrjGKOWb3n6WLCG7nbQxVIGSTKA1yZZUu7EDB0j9JbfOarueVseYn4BLz71nZupD4XXkeyt9Hn3aRB2osbA3riP8HYmDcFZv3SoPqbKl4iJfC4uZB8Ow1RO8geI+ru67tvUwDRaFu+QDK9bCQiDjitrZ+W6KvLcV4B48J+iBxbr+5Y5a+b2El1asVfo7DuVRVtgsvgdB12MORE0RTv6xjRrkGRm4yi4JJU9M62q3ndA4+VUJmKn+J3NE/StJoG6m/8Pu2XLpQLGQJE/azHf6yLHpqUzDZXWdQ= X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jun 2017 07:44:47.9323 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1PR0301MB0596 Subject: [dpdk-dev] [PATCH v2 5/5] test/test: add test cases for gcm and ctr in dpaa2_sec test suite X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Jun 2017 07:44:51 -0000 From: Akhil Goyal dpaa2_sec test cases updated for various supported crypto alogorithms. Signed-off-by: Akhil Goyal --- test/test/test_cryptodev.c | 94 ++++++++++++++++++++++++---- test/test/test_cryptodev_aes_test_vectors.h | 78 +++++++++++++++-------- test/test/test_cryptodev_blockcipher.c | 1 + test/test/test_cryptodev_des_test_vectors.h | 24 ++++--- test/test/test_cryptodev_hash_test_vectors.h | 36 +++++++---- 5 files changed, 176 insertions(+), 57 deletions(-) diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c index db0999e..fe6c8dd 100644 --- a/test/test/test_cryptodev.c +++ b/test/test/test_cryptodev.c @@ -1738,6 +1738,22 @@ test_AES_cipheronly_dpaa2_sec_all(void) } static int +test_authonly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AUTHONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_authonly_openssl_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -8280,28 +8296,84 @@ static struct unit_test_suite cryptodev_dpaa2_sec_testsuite = { .teardown = testsuite_teardown, .unit_test_cases = { TEST_CASE_ST(ut_setup, ut_teardown, - test_device_configure_invalid_dev_id), + test_device_configure_invalid_dev_id), TEST_CASE_ST(ut_setup, ut_teardown, - test_multi_session), + test_multi_session), TEST_CASE_ST(ut_setup, ut_teardown, - test_AES_chain_dpaa2_sec_all), + test_AES_chain_dpaa2_sec_all), TEST_CASE_ST(ut_setup, ut_teardown, - test_3DES_chain_dpaa2_sec_all), + test_3DES_chain_dpaa2_sec_all), TEST_CASE_ST(ut_setup, ut_teardown, - test_AES_cipheronly_dpaa2_sec_all), + test_AES_cipheronly_dpaa2_sec_all), TEST_CASE_ST(ut_setup, ut_teardown, - test_3DES_cipheronly_dpaa2_sec_all), + test_3DES_cipheronly_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_authonly_dpaa2_sec_all), - /** HMAC_MD5 Authentication */ + /** AES GCM Authenticated Encryption */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_2), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_3), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_4), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_5), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_6), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_7), + + /** AES GCM Authenticated Decryption */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_2), TEST_CASE_ST(ut_setup, ut_teardown, - test_MD5_HMAC_generate_case_1), + test_mb_AES_GCM_authenticated_decryption_test_case_3), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_4), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_5), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_6), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_7), + + /** AES GCM Authenticated Encryption 256 bits key */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_2), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_3), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_4), TEST_CASE_ST(ut_setup, ut_teardown, - test_MD5_HMAC_verify_case_1), + test_mb_AES_GCM_auth_encryption_test_case_256_5), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_6), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_7), + + /** AES GCM Authenticated Decryption 256 bits key */ TEST_CASE_ST(ut_setup, ut_teardown, - test_MD5_HMAC_generate_case_2), + test_mb_AES_GCM_auth_decryption_test_case_256_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_2), TEST_CASE_ST(ut_setup, ut_teardown, - test_MD5_HMAC_verify_case_2), + test_mb_AES_GCM_auth_decryption_test_case_256_3), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_4), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_5), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_6), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_7), TEST_CASES_END() /**< NULL terminate unit test array */ } diff --git a/test/test/test_cryptodev_aes_test_vectors.h b/test/test/test_cryptodev_aes_test_vectors.h index 07d6eab..f692d57 100644 --- a/test/test/test_cryptodev_aes_test_vectors.h +++ b/test/test/test_cryptodev_aes_test_vectors.h @@ -1028,7 +1028,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CTR HMAC-SHA1 Decryption Digest " @@ -1038,7 +1039,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CTR XCBC Encryption Digest", @@ -1074,7 +1076,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CTR HMAC-SHA1 Decryption Digest " @@ -1084,7 +1087,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest", @@ -1094,7 +1098,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest " @@ -1124,7 +1129,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Decryption Digest " @@ -1141,7 +1147,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA256 Encryption Digest " @@ -1159,7 +1166,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA256 Decryption Digest " @@ -1175,7 +1183,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA512 Encryption Digest " @@ -1205,7 +1214,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA512 Decryption Digest " @@ -1262,7 +1272,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA224 Decryption Digest " @@ -1272,7 +1283,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA384 Encryption Digest", @@ -1281,7 +1293,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA384 Decryption Digest " @@ -1291,7 +1304,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest " @@ -1322,7 +1336,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC Decryption", @@ -1331,7 +1346,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CBC Encryption", @@ -1340,7 +1356,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CBC Encryption Scater gather", @@ -1357,7 +1374,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CBC Encryption", @@ -1366,7 +1384,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CBC Decryption", @@ -1375,7 +1394,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CBC OOP Encryption", @@ -1400,7 +1420,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CTR Decryption", @@ -1409,7 +1430,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CTR Encryption", @@ -1418,7 +1440,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CTR Decryption", @@ -1427,7 +1450,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CTR Encryption", @@ -1436,7 +1460,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CTR Decryption", @@ -1445,7 +1470,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, }; diff --git a/test/test/test_cryptodev_blockcipher.c b/test/test/test_cryptodev_blockcipher.c index 446ab4f..85fad01 100644 --- a/test/test/test_cryptodev_blockcipher.c +++ b/test/test/test_cryptodev_blockcipher.c @@ -100,6 +100,7 @@ test_blockcipher_one_case(const struct blockcipher_test_case *t, tdata->auth_key.len); switch (cryptodev_type) { + case RTE_CRYPTODEV_DPAA2_SEC_PMD: case RTE_CRYPTODEV_QAT_SYM_PMD: case RTE_CRYPTODEV_OPENSSL_PMD: case RTE_CRYPTODEV_ARMV8_PMD: /* Fall through */ diff --git a/test/test/test_cryptodev_des_test_vectors.h b/test/test/test_cryptodev_des_test_vectors.h index b226794..0b6e0b8 100644 --- a/test/test/test_cryptodev_des_test_vectors.h +++ b/test/test/test_cryptodev_des_test_vectors.h @@ -1058,14 +1058,16 @@ static const struct blockcipher_test_case triple_des_chain_test_cases[] = { .test_data = &triple_des128cbc_hmac_sha1_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC HMAC-SHA1 Decryption Digest Verify", .test_data = &triple_des128cbc_hmac_sha1_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC SHA1 Encryption Digest", @@ -1084,14 +1086,16 @@ static const struct blockcipher_test_case triple_des_chain_test_cases[] = { .test_data = &triple_des192cbc_hmac_sha1_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-192-CBC HMAC-SHA1 Decryption Digest Verify", .test_data = &triple_des192cbc_hmac_sha1_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-192-CBC SHA1 Encryption Digest", @@ -1199,28 +1203,32 @@ static const struct blockcipher_test_case triple_des_cipheronly_test_cases[] = { .test_data = &triple_des128cbc_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC Decryption", .test_data = &triple_des128cbc_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_DECRYPT, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-192-CBC Encryption", .test_data = &triple_des192cbc_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-192-CBC Decryption", .test_data = &triple_des192cbc_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_DECRYPT, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CTR Encryption", diff --git a/test/test/test_cryptodev_hash_test_vectors.h b/test/test/test_cryptodev_hash_test_vectors.h index 3214f9a..24353fc 100644 --- a/test/test/test_cryptodev_hash_test_vectors.h +++ b/test/test/test_cryptodev_hash_test_vectors.h @@ -366,7 +366,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-MD5 Digest Verify", @@ -374,7 +375,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA1 Digest", @@ -394,7 +396,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA1 Digest Verify", @@ -402,7 +405,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA224 Digest", @@ -422,7 +426,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA224 Digest Verify", @@ -430,7 +435,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA256 Digest", @@ -450,7 +456,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA256 Digest Verify", @@ -458,7 +465,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA384 Digest", @@ -478,7 +486,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA384 Digest Verify", @@ -486,7 +495,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA512 Digest", @@ -506,7 +516,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA512 Digest Verify", @@ -514,7 +525,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, }; -- 2.9.3