From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 93A7FA2F63 for ; Thu, 3 Oct 2019 18:46:45 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id BB1991C132; Thu, 3 Oct 2019 18:46:44 +0200 (CEST) Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by dpdk.org (Postfix) with ESMTP id 9E5C71C12A for ; Thu, 3 Oct 2019 18:46:43 +0200 (CEST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga107.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 Oct 2019 09:46:36 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.67,253,1566889200"; d="scan'208";a="191319326" Received: from irsmsx102.ger.corp.intel.com ([163.33.3.155]) by fmsmga008.fm.intel.com with ESMTP; 03 Oct 2019 09:46:35 -0700 Received: from irsmsx108.ger.corp.intel.com ([169.254.11.26]) by IRSMSX102.ger.corp.intel.com ([169.254.2.160]) with mapi id 14.03.0439.000; Thu, 3 Oct 2019 17:46:34 +0100 From: "Iremonger, Bernard" To: "Smoczynski, MarcinX" , "anoobj@marvell.com" , "akhil.goyal@nxp.com" , "Ananyev, Konstantin" CC: "dev@dpdk.org" , "Smoczynski, MarcinX" Thread-Topic: [dpdk-dev] [PATCH v5 4/4] examples/ipsec-secgw: add offload fallback tests Thread-Index: AQHVdUw6WLRaSh5xEUKNZJ9Zee8qtadJKC/A Date: Thu, 3 Oct 2019 16:46:34 +0000 Message-ID: <8CEF83825BEC744B83065625E567D7C260E014EF@IRSMSX108.ger.corp.intel.com> References: <20190927091028.19316-1-marcinx.smoczynski@intel.com> <20190927155446.19136-1-marcinx.smoczynski@intel.com> <20190927155446.19136-5-marcinx.smoczynski@intel.com> In-Reply-To: <20190927155446.19136-5-marcinx.smoczynski@intel.com> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiNDk3ODliYzEtMTkxZi00OWNhLWEwZWQtNzAyMWRhZWVjZDkyIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX05UIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE3LjEwLjE4MDQuNDkiLCJUcnVzdGVkTGFiZWxIYXNoIjoiRHdqUGFwRE1PWE81amRFbmdJNnBOamgra0kzeHpXbVZrU2ZtYU0yYUpqRkw5bjR4MWtuQllLTndROWhJYk9tTCJ9 x-ctpclassification: CTP_NT dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action x-originating-ip: [163.33.239.181] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dpdk-dev] [PATCH v5 4/4] examples/ipsec-secgw: add offload fallback tests X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Hi Marcin, > -----Original Message----- > From: dev [mailto:dev-bounces@dpdk.org] On Behalf Of Marcin Smoczynski > Sent: Friday, September 27, 2019 4:55 PM > To: anoobj@marvell.com; akhil.goyal@nxp.com; Ananyev, Konstantin > > Cc: dev@dpdk.org; Smoczynski, MarcinX > Subject: [dpdk-dev] [PATCH v5 4/4] examples/ipsec-secgw: add offload > fallback tests >=20 > Add tests for offload fallback feature; add inbound config modificator > SGW_CFG_XPRM_IN (offload fallback setting can be set only for inbound > SAs). Tests are using cryptodev for outbound SA. >=20 > To test fragmentation with QAT set: > MULTI_SEG_TEST=3D"--reassemble=3D4096 --cryptodev_mask=3D0x5555" The environment variable MULTI_SEG_TEST should be documented in the ipsec-s= ecgw guide, section 49.6 Test directory, along side the other environment variables. =20 > Acked-by: Konstantin Ananyev > Signed-off-by: Marcin Smoczynski Tested-by: Bernard Iremonger > --- > examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh | 4 ++-- > .../test/trs_aesgcm_inline_crypto_fallback_defs.sh | 5 +++++ > examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh | 6 ++++-- > .../test/tun_aesgcm_inline_crypto_fallback_defs.sh | 5 +++++ > 4 files changed, 16 insertions(+), 4 deletions(-) create mode 100644 > examples/ipsec-secgw/test/trs_aesgcm_inline_crypto_fallback_defs.sh > create mode 100644 examples/ipsec- > secgw/test/tun_aesgcm_inline_crypto_fallback_defs.sh >=20 > diff --git a/examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh > b/examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh > index f6c5bf5a7..17f2f86d2 100644 > --- a/examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh > +++ b/examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh > @@ -29,11 +29,11 @@ sp ipv6 out esp bypass pri 1 sport 0:65535 dport > 0:65535 #SA in rules sa in 7 aead_algo aes-128-gcm \ aead_key > de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ -mode > transport ${SGW_CFG_XPRM} > +mode transport ${SGW_CFG_XPRM} ${SGW_CFG_XPRM_IN} >=20 > sa in 9 aead_algo aes-128-gcm \ > aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ - > mode transport ${SGW_CFG_XPRM} > +mode transport ${SGW_CFG_XPRM} ${SGW_CFG_XPRM_IN} >=20 > #SA out rules > sa out 7 aead_algo aes-128-gcm \ > diff --git a/examples/ipsec- > secgw/test/trs_aesgcm_inline_crypto_fallback_defs.sh b/examples/ipsec- > secgw/test/trs_aesgcm_inline_crypto_fallback_defs.sh > new file mode 100644 > index 000000000..875a7457d > --- /dev/null > +++ b/examples/ipsec- > secgw/test/trs_aesgcm_inline_crypto_fallback_defs.s > +++ h > @@ -0,0 +1,5 @@ > +#! /bin/bash > + > +. ${DIR}/trs_aesgcm_defs.sh > + > +SGW_CFG_XPRM_IN=3D'port_id 0 type inline-crypto-offload fallback > lookaside-none' > diff --git a/examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh > b/examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh > index 278377967..7490baded 100644 > --- a/examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh > +++ b/examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh > @@ -29,11 +29,13 @@ sp ipv6 out esp bypass pri 1 sport 0:65535 dport > 0:65535 #SA in rules sa in 7 aead_algo aes-128-gcm \ aead_key > de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ -mode ipv4- > tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} ${SGW_CFG_XPRM} > +mode ipv4-tunnel src ${REMOTE_IPV4} dst ${LOCAL_IPV4} > ${SGW_CFG_XPRM} \ > +${SGW_CFG_XPRM_IN} >=20 > sa in 9 aead_algo aes-128-gcm \ > aead_key de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef:de:ad:be:ef \ - > mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} > ${SGW_CFG_XPRM} > +mode ipv6-tunnel src ${REMOTE_IPV6} dst ${LOCAL_IPV6} > ${SGW_CFG_XPRM} \ > +${SGW_CFG_XPRM_IN} >=20 > #SA out rules > sa out 7 aead_algo aes-128-gcm \ > diff --git a/examples/ipsec- > secgw/test/tun_aesgcm_inline_crypto_fallback_defs.sh b/examples/ipsec- > secgw/test/tun_aesgcm_inline_crypto_fallback_defs.sh > new file mode 100644 > index 000000000..696848432 > --- /dev/null > +++ b/examples/ipsec- > secgw/test/tun_aesgcm_inline_crypto_fallback_defs.s > +++ h > @@ -0,0 +1,5 @@ > +#! /bin/bash > + > +. ${DIR}/tun_aesgcm_defs.sh > + > +SGW_CFG_XPRM_IN=3D'port_id 0 type inline-crypto-offload fallback > lookaside-none' > -- > 2.17.1 Regards, Bernard.