From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id AC07CA0C55; Wed, 13 Oct 2021 20:33:29 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id D8C5D41226; Wed, 13 Oct 2021 20:32:21 +0200 (CEST) Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2055.outbound.protection.outlook.com [40.107.22.55]) by mails.dpdk.org (Postfix) with ESMTP id EB0E041201 for ; Wed, 13 Oct 2021 20:32:20 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=oBZrefyysBhq3G6W9Y3ujU9USqDkA8vEUmP7Rg0kQSQ7yjC/8E/yMUWn+Q8AqqdFRRrOjQXUdTt5TmIroLqubcrjABFMlipU7VpOLrmFM+6YbGFn63fHQhvc0menWAHPQCFhtTOMp4LAWMHWJrz3Y6s7i/A39kC6FTNFArLIF4T18MVI9vhLU6KqpJ/YxhViZycOlG7gBpI2RlOqLol63pQinE+33Ax2OK6QEcpfcDiWOK1KJr87rtmDCUykLIz9/hPqph2k0tYohtlcLh6fgFKhDfNuCxZQCSFHaTS3lfnpX3hdYnyEZLdvp8De1pDs7qhnfSKszlyWe/pJzTso1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KmJh6bj7qd80aDM51cp6vmmDFhxYMHIu1ZOgoVkvSmg=; b=jXS3uqr4JKhzXkUB4ziMYk4KeR8DiIRIQzHhBvgkZ+dVIKZzLdzXCUzESmRTFzg0ZBiaBJkZ9TL5x30edHD6Is3dJKrnUHNNUh/i11BYitiMq6YOlJqslzBGOz1I/ian81I8+kT/xmrdY66sI0jY6hifK0ax4PzWqvpU90uN8soGzHPqasHWNJw2Tx1DKsaPUSZuX/RTp+Awnj5tbY2qn3DWbVpbrRv5m7hyYVy0PI+PUG5fZNBrULAmINoHEH+DiRtbPTEaXKKBwv+kTgnrhXd6iIB3M3tjpJdJV81ovnTFiMEVmJcYlCGJszacBTEjp3i5PZDWD2XIwYvfaCd0GA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KmJh6bj7qd80aDM51cp6vmmDFhxYMHIu1ZOgoVkvSmg=; b=i5/Xm5uymjLIrG5aG7gPaaS211+0u2eFKcXenoAUPHDNnxiE1LS/jTG63JB5SAUK6UShZ9c7bn8SR0WD7/R8SGfBjT8IL2YKjcmiqkDUpxhNpa7k+ljj1PhzhWOSPBHNP1XSMThOQb4jzUwVYb3SxlVudXBtqsKjj/h3ArDm+Io= Authentication-Results: dpdk.org; dkim=none (message not signed) header.d=none;dpdk.org; dmarc=none action=none header.from=nxp.com; Received: from DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15) by DU2PR04MB8805.eurprd04.prod.outlook.com (2603:10a6:10:2e0::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4587.19; Wed, 13 Oct 2021 18:32:20 +0000 Received: from DU2PR04MB8630.eurprd04.prod.outlook.com ([fe80::945d:e362:712d:1b80]) by DU2PR04MB8630.eurprd04.prod.outlook.com ([fe80::945d:e362:712d:1b80%3]) with mapi id 15.20.4587.026; Wed, 13 Oct 2021 18:32:20 +0000 From: Hemant Agrawal To: dev@dpdk.org, gakhil@marvell.com Cc: roy.fan.zhang@intel.com, konstantin.ananyev@intel.com, Gagandeep Singh Date: Wed, 13 Oct 2021 23:57:19 +0530 Message-Id: <20211013182720.32486-15-hemant.agrawal@nxp.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20211013182720.32486-1-hemant.agrawal@nxp.com> References: <20211013182720.32486-1-hemant.agrawal@nxp.com> Content-Type: text/plain X-ClientProxiedBy: SG3P274CA0016.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:be::28) To DU2PR04MB8630.eurprd04.prod.outlook.com (2603:10a6:10:2dd::15) MIME-Version: 1.0 Received: from dpdk-xeon.ap.freescale.net (92.120.0.67) by SG3P274CA0016.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:be::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.15 via Frontend Transport; Wed, 13 Oct 2021 18:32:18 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 2ba07a3b-9d09-4811-0dbe-08d98e77ca79 X-MS-TrafficTypeDiagnostic: DU2PR04MB8805: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:469; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR04MB8630.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(956004)(186003)(66476007)(26005)(44832011)(66556008)(52116002)(83380400001)(66946007)(8936002)(36756003)(8676002)(2616005)(1076003)(4326008)(508600001)(38100700002)(6486002)(86362001)(6506007)(38350700002)(316002)(2906002)(5660300002)(6512007); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?3ZDF3cBZQPMlEKJyfbgS8KhFNkJ7EjgjKI+QEdkxc4HkbEUzBJ4eMZDnYKGd?= =?us-ascii?Q?saxmKc/7EAmwnX4xaXr6MjnB1N4yrYgznlns7/hyuj6Ot+227B/iLJ1uIS0C?= =?us-ascii?Q?D393aAWuPlHFcGweZTQqtmST1jsEON1KfJcGV3dyQNQuvz4SasNFdWB++OtM?= =?us-ascii?Q?RN/ucLOS0kXy0CB5Z2Nc9XHWLc8jMw1fbz+pVd93lG2JfT/IOII3WGsibJq5?= =?us-ascii?Q?kuuEbSMnipbUL7v7iD0j9Na8udeRngnqse7hn40LfHymrvQ73hPuEhIRXXgl?= =?us-ascii?Q?eUFjHjNWi8aBtsx4+OG8nwHLCbTmKOzPQJkgtgaKbnaynTabLwh6KF/C8jgi?= =?us-ascii?Q?+ppkL+MZrKhFA9l6U2y81nscGr7t5SNewxLcX3eUnnLdxdXXHs4eDa5qq2YB?= =?us-ascii?Q?scQU4fL/o2SdSLaJ9QWQfDBJVK4MeF4bqgBVbdEiUm61fXQe/WKuT/SxEX9q?= =?us-ascii?Q?4C5/RRL8xwSQ+UvvKe5ffNwRKYKxpczwtIZ/J7LF8WLWakqMZge3FriBcx+L?= =?us-ascii?Q?5Zt7uSkA+ZxjqvWRXo1bIRclhA5AQ5AVjaqdjwbFJH6GJbKm0235UAHNIi9z?= =?us-ascii?Q?ANKCtdCS+Nypb4lrZD+DwfFo33AE/mPRBjjYK5POHn9tpOsm19Naqy4sg1lH?= =?us-ascii?Q?RevmhQiqkA64DAHIqKUXPg5/oxLaFdWg2PPvcKPzAFrehVurv82XAxWPV2bf?= =?us-ascii?Q?xKeOSUAGVGfcR4hkOu9Y8Z1s9suG2vGQTZH7J8zzUerpQpDokj5DCJiZ9Di9?= =?us-ascii?Q?6UVf9cZ5jeCFixsjYjOJEgxxrWWtUnKqY1ke7oJKxrmh9Jqzst/bOIRJ4ju5?= =?us-ascii?Q?/jKPefgnQCCFOXs+CngxliqWLFNtluCRtRuQmeSP/nGg+3nRzxGpKymWW3Il?= =?us-ascii?Q?2EyYM3pkkD5Xj2AIu5LYBJUTEcvsi7CI768d8T5sYrmdn7wm2gJ4JndIFrbY?= =?us-ascii?Q?o4D4GRIZT3DynxPcygjfgnagCLHE1WF4q0o1LyVY0EmzlNP4NoUMC9mZaG4h?= =?us-ascii?Q?7uuUjw5gro0S8WdFKcLKkR/CgAsflc3LnExeC3Geks/UjxUBRQF7UDI+Zj9Z?= =?us-ascii?Q?911+mSpaO5fPYFowmM5OnBfBk723dB96K1mhjIQ77VaU1n1BHE3C2EFNSjde?= =?us-ascii?Q?C8DzdboCm5cHVhvRJSFVgoadYl57OVTuFTkd+ftn0dfuskfP8v0hRUUXJHcc?= =?us-ascii?Q?HOQSEK2Psj01VPS6y2cNZRE8HcXxAwgy1HStMOjSK3GnDrumvNOEM4HwExd9?= =?us-ascii?Q?Pn4sTIMIVUDzROuQuzpkPCutuzXnnwt4GveRNlP4B64eVpGX9s89iGmauVGi?= =?us-ascii?Q?Wo23V8oVYIDy8onHXPtOhSlk?= X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2ba07a3b-9d09-4811-0dbe-08d98e77ca79 X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8630.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Oct 2021 18:32:20.0223 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: wuVPvw7ovu4fLC3MS0gaQrQGdvq8k2Mj7GTfs9JFLdl+wiPQTDcMrfsRRE6QzxtSbNMB5GlkxK9heNuaDMfAZA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR04MB8805 Subject: [dpdk-dev] [PATCH v3 14/15] test/crypto: add raw API test for dpaax X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" This patch add support for raw API tests for dpaa_sec and dpaa2_sec platforms. Signed-off-by: Gagandeep Singh Signed-off-by: Hemant Agrawal --- app/test/test_cryptodev.c | 116 +++++++++++++++++++++++++++++++++++--- 1 file changed, 109 insertions(+), 7 deletions(-) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 1e951981c2..6a9761c3d8 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -184,11 +184,11 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id, { struct rte_crypto_sym_op *sop = op->sym; struct rte_crypto_op *ret_op = NULL; - struct rte_crypto_vec data_vec[UINT8_MAX]; + struct rte_crypto_vec data_vec[UINT8_MAX], dest_data_vec[UINT8_MAX]; struct rte_crypto_va_iova_ptr cipher_iv, digest, aad_auth_iv; union rte_crypto_sym_ofs ofs; struct rte_crypto_sym_vec vec; - struct rte_crypto_sgl sgl; + struct rte_crypto_sgl sgl, dest_sgl; uint32_t max_len; union rte_cryptodev_session_ctx sess; uint32_t count = 0; @@ -324,6 +324,19 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id, } sgl.num = n; + /* Out of place */ + if (sop->m_dst != NULL) { + dest_sgl.vec = dest_data_vec; + vec.dest_sgl = &dest_sgl; + n = rte_crypto_mbuf_to_vec(sop->m_dst, 0, max_len, + dest_data_vec, RTE_DIM(dest_data_vec)); + if (n < 0 || n > sop->m_dst->nb_segs) { + op->status = RTE_CRYPTO_OP_STATUS_ERROR; + goto exit; + } + dest_sgl.num = n; + } else + vec.dest_sgl = NULL; if (rte_cryptodev_raw_enqueue_burst(ctx, &vec, ofs, (void **)&op, &enqueue_status) < 1) { @@ -8379,10 +8392,21 @@ test_pdcp_proto_SGL(int i, int oop, int to_trn_tbl[16]; int segs = 1; unsigned int trn_data = 0; + struct rte_cryptodev_info dev_info; + uint64_t feat_flags; struct rte_security_ctx *ctx = (struct rte_security_ctx *) rte_cryptodev_get_sec_ctx( ts_params->valid_devs[0]); + struct rte_mbuf *temp_mbuf; + + rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info); + feat_flags = dev_info.feature_flags; + if ((global_api_test_type == CRYPTODEV_RAW_API_TEST) && + (!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) { + printf("Device does not support RAW data-path APIs.\n"); + return -ENOTSUP; + } /* Verify the capabilities */ struct rte_security_capability_idx sec_cap_idx; @@ -8566,8 +8590,23 @@ test_pdcp_proto_SGL(int i, int oop, ut_params->op->sym->m_dst = ut_params->obuf; /* Process crypto operation */ - if (process_crypto_request(ts_params->valid_devs[0], ut_params->op) - == NULL) { + temp_mbuf = ut_params->op->sym->m_src; + if (global_api_test_type == CRYPTODEV_RAW_API_TEST) { + /* filling lengths */ + while (temp_mbuf) { + ut_params->op->sym->cipher.data.length + += temp_mbuf->pkt_len; + ut_params->op->sym->auth.data.length + += temp_mbuf->pkt_len; + temp_mbuf = temp_mbuf->next; + } + process_sym_raw_dp_op(ts_params->valid_devs[0], 0, + ut_params->op, 1, 1, 0, 0); + } else { + ut_params->op = process_crypto_request(ts_params->valid_devs[0], + ut_params->op); + } + if (ut_params->op == NULL) { printf("TestCase %s()-%d line %d failed %s: ", __func__, i, __LINE__, "failed to process sym crypto op"); @@ -10424,6 +10463,7 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata) int retval; uint8_t *ciphertext, *auth_tag; uint16_t plaintext_pad_len; + struct rte_cryptodev_info dev_info; /* Verify the capabilities */ struct rte_cryptodev_sym_capability_idx cap_idx; @@ -10433,7 +10473,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata) &cap_idx) == NULL) return TEST_SKIPPED; - if (global_api_test_type == CRYPTODEV_RAW_API_TEST) + rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info); + uint64_t feat_flags = dev_info.feature_flags; + + if ((global_api_test_type == CRYPTODEV_RAW_API_TEST) && + (!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) return TEST_SKIPPED; /* not supported with CPU crypto */ @@ -10470,7 +10514,11 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata) ut_params->op->sym->m_dst = ut_params->obuf; /* Process crypto operation */ - TEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0], + if (global_api_test_type == CRYPTODEV_RAW_API_TEST) + process_sym_raw_dp_op(ts_params->valid_devs[0], 0, + ut_params->op, 0, 0, 0, 0); + else + TEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0], ut_params->op), "failed to process sym crypto op"); TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS, @@ -10516,6 +10564,10 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata) int retval; uint8_t *plaintext; + struct rte_cryptodev_info dev_info; + + rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info); + uint64_t feat_flags = dev_info.feature_flags; /* Verify the capabilities */ struct rte_cryptodev_sym_capability_idx cap_idx; @@ -10530,6 +10582,12 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata) global_api_test_type == CRYPTODEV_RAW_API_TEST) return TEST_SKIPPED; + if ((global_api_test_type == CRYPTODEV_RAW_API_TEST) && + (!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) { + printf("Device does not support RAW data-path APIs.\n"); + return TEST_SKIPPED; + } + /* Create AEAD session */ retval = create_aead_session(ts_params->valid_devs[0], tdata->algo, @@ -10560,7 +10618,11 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata) ut_params->op->sym->m_dst = ut_params->obuf; /* Process crypto operation */ - TEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0], + if (global_api_test_type == CRYPTODEV_RAW_API_TEST) + process_sym_raw_dp_op(ts_params->valid_devs[0], 0, + ut_params->op, 0, 0, 0, 0); + else + TEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0], ut_params->op), "failed to process sym crypto op"); TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS, @@ -15400,6 +15462,46 @@ test_cryptodev_cn10k(void) return run_cryptodev_testsuite(RTE_STR(CRYPTODEV_NAME_CN10K_PMD)); } +static int +test_cryptodev_dpaa2_sec_raw_api(void) +{ + static const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD); + int ret; + + ret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP, + "RAW API"); + if (ret) + return ret; + + global_api_test_type = CRYPTODEV_RAW_API_TEST; + ret = run_cryptodev_testsuite(pmd_name); + global_api_test_type = CRYPTODEV_API_TEST; + + return ret; +} + +static int +test_cryptodev_dpaa_sec_raw_api(void) +{ + static const char *pmd_name = RTE_STR(CRYPTODEV_NAME_DPAA2_SEC_PMD); + int ret; + + ret = require_feature_flag(pmd_name, RTE_CRYPTODEV_FF_SYM_RAW_DP, + "RAW API"); + if (ret) + return ret; + + global_api_test_type = CRYPTODEV_RAW_API_TEST; + ret = run_cryptodev_testsuite(pmd_name); + global_api_test_type = CRYPTODEV_API_TEST; + + return ret; +} + +REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_raw_api_autotest, + test_cryptodev_dpaa2_sec_raw_api); +REGISTER_TEST_COMMAND(cryptodev_dpaa_sec_raw_api_autotest, + test_cryptodev_dpaa_sec_raw_api); REGISTER_TEST_COMMAND(cryptodev_qat_raw_api_autotest, test_cryptodev_qat_raw_api); REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat); -- 2.17.1