From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <dev-bounces@dpdk.org>
Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124])
	by inbox.dpdk.org (Postfix) with ESMTP id C07C541E90;
	Tue, 14 Mar 2023 14:33:16 +0100 (CET)
Received: from mails.dpdk.org (localhost [127.0.0.1])
	by mails.dpdk.org (Postfix) with ESMTP id AFF0D4161A;
	Tue, 14 Mar 2023 14:33:16 +0100 (CET)
Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com
 [67.231.148.174])
 by mails.dpdk.org (Postfix) with ESMTP id 65D4E4161A
 for <dev@dpdk.org>; Tue, 14 Mar 2023 14:33:15 +0100 (CET)
Received: from pps.filterd (m0045849.ppops.net [127.0.0.1])
 by mx0a-0016f401.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id
 32E7pLlr009021; Tue, 14 Mar 2023 06:33:14 -0700
Received: from nam11-co1-obe.outbound.protection.outlook.com
 (mail-co1nam11lp2177.outbound.protection.outlook.com [104.47.56.177])
 by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3p9xxmxjdk-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);
 Tue, 14 Mar 2023 06:33:14 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=N68QuFjKAVc08Vy7p9ARlQyqf0wIs+wfNCKHiA9fIw8pb9oAFSzM3n7wsvWHbFVqvY/hvG9uHInijhH0GP9zRhlGYdPsktNi62S4E8lw6zckWE8KORIAXjEkUmKuGb+aybEaQCEdKWvaS9S2dtd7gKsGlcjgcfDSXTpQqhtum/XaENwtgXj/DjGiMCKqxGWNox2ZC9bPehikUZ0C5kLlFQhEgMXnGYW8gbxXv61o6UGCm/qwixCiAQNL0nKSkeytBwVZqVBs/R968azHDtk+vtcc3Mr/h3HZbOAWDCrVohop4hgdTPsZ8Dp/aiGPireUSFTh5LpJ1LH/xcPk+sog2w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; 
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=k4lrgIn3VBvn7ZKtZa2kD42sYn1HSZtrtJBhcVAAAKQ=;
 b=Me77SpKLSxcYpaZFl+RBxX5JeqIyXRZdw47AM7i8XUNtR42+970bIdpf61nXfu3Hme1dD5QcJEcp6eIqRQ2KE626Oh+5LrnN35+wd1F0x9wSJdQ/bkDnN8mEyeVrbSHLixKGHotiCjmRzMjB7LqHRHyfGlZFeYJkgdKpEWkdDrTZ54sRfJ+DEy5X6H7tpV9ryd1BZikbBSD+bjeirQrOGoP3Af2VAXwgSiYfMKeg2r+IlDk0oINmqdg/zJLV8Em/WX+uICwtaUcwhVeNflG+WY91dzg6IBBfZRfjLs0gRbv5n6bdkD4KkzSf/j7TvB9xDy7oX0oKP58Agpfofpp5uA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com;
 dkim=pass header.d=marvell.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=marvell.onmicrosoft.com; s=selector1-marvell-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=k4lrgIn3VBvn7ZKtZa2kD42sYn1HSZtrtJBhcVAAAKQ=;
 b=Hi0P9gGb/tGbnPL3R94KqW/fR6bnuxXjXEtwGyXN3/Dvqx5Y+I/bqzHhuXRGTjWOYhKIac4a1D8PvI1wIBCixAnjmA9xPCJYWkMIYlf5TzpLaz1ghX7647vZBNnbrEncUKNxkWPaPVaxMtc0LLIvapmuGKSQX7nwsSobtNihf38=
Received: from MW2PR18MB2282.namprd18.prod.outlook.com (2603:10b6:907:f::19)
 by MN6PR18MB5520.namprd18.prod.outlook.com (2603:10b6:208:47b::9) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.24; Tue, 14 Mar
 2023 13:33:11 +0000
Received: from MW2PR18MB2282.namprd18.prod.outlook.com
 ([fe80::e0e0:c7fe:674e:ed00]) by MW2PR18MB2282.namprd18.prod.outlook.com
 ([fe80::e0e0:c7fe:674e:ed00%7]) with mapi id 15.20.6178.024; Tue, 14 Mar 2023
 13:33:11 +0000
From: Volodymyr Fialko <vfialko@marvell.com>
To: "Power, Ciara" <ciara.power@intel.com>, "dev@dpdk.org" <dev@dpdk.org>,
 Akhil Goyal <gakhil@marvell.com>, Fan Zhang <fanzhang.oss@gmail.com>
CC: Jerin Jacob Kollanukkaran <jerinj@marvell.com>, Anoob Joseph
 <anoobj@marvell.com>, "hemant.agrawal@nxp.com" <hemant.agrawal@nxp.com>,
 "Ji, Kai" <kai.ji@intel.com>
Subject: RE: [PATCH v2] test: add cryptodev crosscheck suite
Thread-Topic: [PATCH v2] test: add cryptodev crosscheck suite
Thread-Index: AQHZPILfR+y9qyqi80Wcs6z/8OrhuK7xTl0AgAkf4yA=
Date: Tue, 14 Mar 2023 13:33:11 +0000
Message-ID: <MW2PR18MB228216AE3D8D5F71300F01D0A8BE9@MW2PR18MB2282.namprd18.prod.outlook.com>
References: <20221221110855.3970889-1-vfialko@marvell.com>
 <20230209123402.1993179-1-vfialko@marvell.com>
 <DS0PR11MB76315C3F964CDA5B8A9E9A19E6B49@DS0PR11MB7631.namprd11.prod.outlook.com>
In-Reply-To: <DS0PR11MB76315C3F964CDA5B8A9E9A19E6B49@DS0PR11MB7631.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MW2PR18MB2282:EE_|MN6PR18MB5520:EE_
x-ms-office365-filtering-correlation-id: 16552e2d-ac83-45d0-ca2d-08db2490a804
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: jaMrYPA/SedRjznGVCnGjK8j4l2WW1PTxw44K/yhYszpIgnKg1ghV9pNfZPLBdVoHoybRqvMwUl5rghL7lzq1XJHyCpqfPO1xIG9xE8ECaAQGuBuY/s9dqfacT80jR696GKWDUHngH1Olw5TXYiz3eXhEBG8jFkZbl6cD0eRArLgwcucjEb3SRuasqlhALDyoNzGgm3YN9GxfAl6qYwyf+QOlMGRQ50TQq8uFEX1neffTPiuxF//4a32WPO8SVSP0IkswJIrKpglOlSQjIYLFwly/8KAxJO5zMXS0RF+ibnmY0ys1hHTrS4Q1zvNWro3gK4ZIs1Bz7w3L3K0xp+62mmjPufCvRywbFIbxDTvN4lcOdWzc2FX3ie1KwKI2CuJ/e19uWMlAJ4MJuS1w6Te4HWlQdZLUW69Y4QzablZdvcE85aobIJ2wEgTR8Aw8wrj7WBylT3MnrFhDDvfpi2NGpedhT0iLtXTCbnb1K9XAdzimy9Woku3A2bwdG4+XsPJGu+ZIT9W63VGP5mxX5TIBYjPpI6DR79XJQ0dPrCrIDF89ew+wQD+9mH1g/caZUjKxx0INTo8OocJBcMRc4gVoh0D+pics65GK14iBiNWX/ZkqfxIBGKPoOUf/hrE7AN1N5p9PWhoPdu6qYoZ6g5zrUYQHH1ZWrkL6tSQI3c+KYVpR//e9YvbkQMd3XOxLRKRP93t7P2oedwPFqpDB8kpNw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;
 IPV:NLI; SFV:NSPM; H:MW2PR18MB2282.namprd18.prod.outlook.com; PTR:; CAT:NONE;
 SFS:(13230025)(4636009)(346002)(396003)(376002)(136003)(39860400002)(366004)(451199018)(86362001)(33656002)(52536014)(8936002)(41300700001)(186003)(26005)(53546011)(6506007)(4326008)(5660300002)(9686003)(71200400001)(110136005)(7696005)(66446008)(55016003)(316002)(478600001)(66946007)(76116006)(66476007)(8676002)(54906003)(64756008)(122000001)(66556008)(38100700002)(38070700005)(2906002)(83380400001);
 DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?tSo27CnDgPe4zLebCngkzNbpenMOvOg3/OFLV8K6a89f4UVfrBVwqTi4uNs7?=
 =?us-ascii?Q?J2RakIPi0PEnl7+/xhQ4ML8CBK/yj0g8kTJpLi0AqncECIeTodsOHKBDuGZQ?=
 =?us-ascii?Q?Lt0X8BL9H29CWdaXNnEPiudtnesl0bhCbfcoO+gQ9KyOXhdXU/lqzX9iQXg6?=
 =?us-ascii?Q?dy/H87+7aCmzr8+fVVBTeQnaUFvcTFprupJpn6PhucvgAUJxrMuXhywDLZOg?=
 =?us-ascii?Q?mLbSdT1fN57ei68My3Rj0muzGaEBKBG/zVeZjN5ja7kzFipSR6w1frUlXzBf?=
 =?us-ascii?Q?pfqAXjbjqYWSbuHJXdfGaPb7jhDe91vUZPBfx7WM4W6nLnW+5tvrfuaQn0im?=
 =?us-ascii?Q?py9UrAbhM+yvRRE57tE2/7c05SJnO3gVsVjB1opc3ze9Rh16CYOMyq774PLb?=
 =?us-ascii?Q?Mh3WpcWXQk/mq/Rf+sC1pe/76j1Suoh0l2NJ05mODIfqaCzHo7vo7Rkku68X?=
 =?us-ascii?Q?js2SaCkrvhDMo6la72Q45nLZnA+4ONVdn6Yck7mTQjt4CCZgYeF5TZekMZaa?=
 =?us-ascii?Q?jV9STstRZUONqMsAFDVMv/6+F49wHhK2wdMRaFIFvI6UlvAZ9Bibt7X81jDl?=
 =?us-ascii?Q?zlOO6sccIbGMKJvq+Jjsk5BS3SplkhdppmWRNrd6gJyBIKChACRysiuEHhH7?=
 =?us-ascii?Q?MXV60Zwv0BNDrcNniyCro40zUwQyZpDIUCLw85D7gKk3wLl10GMLeSYYRdG7?=
 =?us-ascii?Q?ciH42js67ai9pu4IXRVv94J+8+CNVWD+UgEWuH/7UUS+jcLhe4rbYBfdv3Ik?=
 =?us-ascii?Q?f/fKOQl0H3csQmsvj4nmD65N6aL/Oop+bDW3ch4c6iBzmixDeO1z5Db14Ptg?=
 =?us-ascii?Q?i6+qX/USALtTvT4xI5QucBApATnKm5Gjx/bcXw0khlP4QDX78zHxTucOaYgD?=
 =?us-ascii?Q?pBVPwcfqr0MNZLfChP4uE5DupClkWPBT1p03VDFtVUctxT/zCS0lpCSyC+Bv?=
 =?us-ascii?Q?DWRMzJhRnfnfiKogp4Qq3s+mv5ZdMc4BJ+H6Jsfu0zu/2w1DHtJcbwcYV/MM?=
 =?us-ascii?Q?tWGiLAapeCNkZAFww6S3FE1mtFMgZmPD1wewkK9n0MFe4o4RN7iL14NA3ACP?=
 =?us-ascii?Q?0KnyXKp+K1zxLRYJ5JeSe8EJidZJpKp9dQIvDpz7QQ++wcFhMHQBYoNwSrGp?=
 =?us-ascii?Q?QgeCLXZ60aD42b0ZDTCCF7p9RUiEK4WrQ0OSKIOvfehiifXrlL4dYYOMkath?=
 =?us-ascii?Q?kXC22NsnqI9O1RKifJuqI88kdzz6hoPung673BqXNW4d44HtKucsv1yWjw5K?=
 =?us-ascii?Q?iiFtfpDNGeNzzixclgD0Q/FyRVqvy2y4L3vhpPy4u3JagsAxNAcZnqhlP1kq?=
 =?us-ascii?Q?pISnMo6GXOtg8t79fYPSU7rw+aOCvnlJ0lrAr1Dp2bhaA7Z35c+5wbLshaJh?=
 =?us-ascii?Q?4/fQJVa+xSwSscaD0GT8/9xe81ZZyMBSsBf+TgzMlj3yoPgLSaw0ZW11GGua?=
 =?us-ascii?Q?djUllEjDT62KD0dSFnhdzB+inU5n35qOWQwlM1VG6UNN4jjQrBHbvdFXbk65?=
 =?us-ascii?Q?v+i11ZrakqwvEBonSJwpFPvmomWtHHKHVQiPecZf9JHJGzD74APnGb6zICIx?=
 =?us-ascii?Q?+QLJPwBZsrfs0lhpjo8wtWbmsHwnIibVpnNVgv23?=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: marvell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW2PR18MB2282.namprd18.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 16552e2d-ac83-45d0-ca2d-08db2490a804
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2023 13:33:11.5677 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: GrCUILhqKowtHOgiB6rIASM3syg/QByRYLGxtfoBQrZY0LeVyXTLyBubWKKDbDguc7rk7LGwCBoBu4kjlpPcjA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN6PR18MB5520
X-Proofpoint-GUID: 5vWsEgv2fgceE-iDIIPvsxMsFLhj9sjs
X-Proofpoint-ORIG-GUID: 5vWsEgv2fgceE-iDIIPvsxMsFLhj9sjs
X-Proofpoint-Virus-Version: vendor=baseguard
 engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22
 definitions=2023-03-14_06,2023-03-14_02,2023-02-09_01
X-BeenThere: dev@dpdk.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: DPDK patches and discussions <dev.dpdk.org>
List-Unsubscribe: <https://mails.dpdk.org/options/dev>,
 <mailto:dev-request@dpdk.org?subject=unsubscribe>
List-Archive: <http://mails.dpdk.org/archives/dev/>
List-Post: <mailto:dev@dpdk.org>
List-Help: <mailto:dev-request@dpdk.org?subject=help>
List-Subscribe: <https://mails.dpdk.org/listinfo/dev>,
 <mailto:dev-request@dpdk.org?subject=subscribe>
Errors-To: dev-bounces@dpdk.org

Hi Ciara,

> -----Original Message-----
> From: Power, Ciara <ciara.power@intel.com>
> Sent: Wednesday, March 8, 2023 6:31 PM
> To: Volodymyr Fialko <vfialko@marvell.com>; dev@dpdk.org; Akhil Goyal <ga=
khil@marvell.com>; Fan
> Zhang <fanzhang.oss@gmail.com>
> Cc: Jerin Jacob Kollanukkaran <jerinj@marvell.com>; Anoob Joseph <anoobj@=
marvell.com>;
> hemant.agrawal@nxp.com; Ji, Kai <kai.ji@intel.com>
> Subject: [EXT] RE: [PATCH v2] test: add cryptodev crosscheck suite
>=20
> External Email
>=20
> ----------------------------------------------------------------------
> Hi Volodymyr,
>=20
>=20
> > -----Original Message-----
> > From: Volodymyr Fialko <vfialko@marvell.com>
> > Sent: Thursday 9 February 2023 12:34
> > To: dev@dpdk.org; Akhil Goyal <gakhil@marvell.com>; Fan Zhang
> > <fanzhang.oss@gmail.com>
> > Cc: jerinj@marvell.com; anoobj@marvell.com; hemant.agrawal@nxp.com;
> > Ji, Kai <kai.ji@intel.com>; Power, Ciara <ciara.power@intel.com>;
> > Volodymyr Fialko <vfialko@marvell.com>
> > Subject: [PATCH v2] test: add cryptodev crosscheck suite
> >
> > Add a validation test suite that helps in verifying that the output
> > generated by two different cryptodevs match for a wide range of input
> > parameter combinations.
> >
> > Crypto autotest performs a comprehensive testing of the cryptodev but
> > since it performs verification by comparing against known vectors, the
> > extend to which various parameters (like packet size) can be tested is
> > limited. This test suite attempts to simulate various cases by running
> > same test case on different cryptodevs and compares the output
> > generated. The test suite relies on capabilities to determine the
> > combinations of tests to be attempted.
> >
> > A typical use case would be to compare outputs generated from a
> > standard driver such as openSSL PMD and a new cryptodev PMD. This test
> > suite is to compliment the testing coverage that crypto autotest provid=
es.
> >
> > Currently supported symmetric xforms(cipher, auth, aead) without chaini=
ng.
> >
> > Example command:
> > DPDK_TEST=3Dcryptodev_crosscheck ./dpdk-test \
> > 	-a <cryptodev> --vdev "crypto_openssl"
> >
> > Signed-off-by: Volodymyr Fialko <vfialko@marvell.com>
> > ---
> > V2:
> > - Updated commit message.
> >
> <snip>
> > +
> > +static void
> > +capabilities_inspect(void)
> > +{
> > +	struct rte_cryptodev_sym_capability_idx
> > cap_indexes[CRYPTO_ALGOS_LEN], *cap_idx;
> > +	struct crypto_testsuite_params *ts_params =3D &testsuite_params;
> > +	const struct rte_cryptodev_symmetric_capability *sym_capa;
> > +	struct rte_cryptodev_symmetric_capability *common_capa;
> > +	uint32_t algo, i, dev_id, caps_idx;
> > +
> > +	caps_idx =3D 0;
> > +	/* Create capability idx for known algorithms*/
> > +	for (algo =3D 1; algo <=3D CRYPTO_AUTH_MAX_IDX; algo++) {
> > +		cap_idx =3D &cap_indexes[caps_idx++];
> > +		cap_idx->type =3D RTE_CRYPTO_SYM_XFORM_AUTH;
> > +		cap_idx->algo.auth =3D algo;
> > +	}
> > +	for (algo =3D 1; algo <=3D CRYPTO_CIPHER_MAX_IDX; algo++) {
> > +		cap_idx =3D &cap_indexes[caps_idx++];
> > +		cap_idx->type =3D RTE_CRYPTO_SYM_XFORM_CIPHER;
> > +		cap_idx->algo.cipher =3D algo;
> > +	}
> > +	for (algo =3D 1; algo <=3D CRYPTO_AEAD_MAX_IDX; algo++) {
> > +		cap_idx =3D &cap_indexes[caps_idx++];
> > +		cap_idx->type =3D RTE_CRYPTO_SYM_XFORM_AEAD;
> > +		cap_idx->algo.aead =3D algo;
> > +	}
> > +
> > +	for (caps_idx =3D 0; caps_idx < CRYPTO_ALGOS_LEN; caps_idx++) {
> > +		/* Gather common capabilities */
> > +		common_capa =3D &common_symm_capas[caps_idx];
> > +		common_capa->xform_type =3D
> > RTE_CRYPTO_SYM_XFORM_NOT_SPECIFIED;
> > +		for (i =3D 0; i < ts_params->valid_dev_count; i++) {
> > +			dev_id =3D ts_params->valid_devs[i];
> > +			sym_capa =3D
> > rte_cryptodev_sym_capability_get(dev_id,
> > +					&cap_indexes[caps_idx]);
> > +			if (sym_capa =3D=3D NULL) {
> > +				/* Capability not supported by one of devs,
> > mark and skip */
> > +				goto next_algo;
> > +			}
> > +
> > +			if (common_capa->xform_type =3D=3D
> > RTE_CRYPTO_SYM_XFORM_NOT_SPECIFIED) {
> > +				/* First time initialization, copy data, go to
> > next device  */
> > +				*common_capa =3D *sym_capa;
> > +				continue;
> > +			}
> [CP]
>=20
> This function - from what I understand after review,  is looping through =
all algorithms in DPDK crypto,
> and then checking if each is supported by each device?
> Could we instead just take the capabilities list from one device as the s=
tarting point - That will be the
> max list of capabilities, they will only get knocked out if not supported=
 on the 2nd/3rd device etc.
>=20
Agreed, that's a good idea. I was misled by the lack of an API like rte_cry=
ptodev_sym_capability_get_all().
But after taking closer look, I found  that it's possible to retrieve all c=
apabilities via dev_info. Reworked in V4.

>=20
> <snip>
>=20
> Some trials I did with this patch showed some issues.
>=20
> 1. For QAT + AESNI_MB I get all skipped tests. I would have expected some=
 common algs here.
> + ------------------------------------------------------- +
>  + Test Suite Summary : Crosscheck Unit Test Suite  + -------------------=
------------------------------------ +  +
> Algo AUTH  'null' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported =
 + Algo AUTH  'aes-cbc-mac' :
> 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'aes-c=
mac' : 0/0 passed, 0/0
> skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'aes-gmac' : 0/0 passe=
d, 0/0 skipped, 0/0 failed, 0/0
> unsupported  + Algo AUTH  'aes-xcbc-mac' : 0/0 passed, 0/0 skipped, 0/0 f=
ailed, 0/0 unsupported  +
> Algo AUTH  'kasumi-f9' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsuppo=
rted  + Algo AUTH  'md5' : 0/0
> passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'md5-hmac'=
 : 0/0 passed, 0/0 skipped,
> 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha1' : 0/0 passed, 0/0 skippe=
d, 0/0 failed, 0/0 unsupported
> + Algo AUTH  'sha1-hmac' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsup=
ported  + Algo AUTH  'sha2-
> 224' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH =
 'sha2-224-hmac' : 0/0 passed,
> 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha2-256' : 0/0 p=
assed, 0/0 skipped, 0/0 failed,
> 0/0 unsupported  + Algo AUTH  'sha2-256-hmac' : 0/0 passed, 0/0 skipped, =
0/0 failed, 0/0 unsupported
> + Algo AUTH  'sha2-384' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupp=
orted  + Algo AUTH  'sha2-384-
> hmac' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH=
  'sha2-512' : 0/0 passed, 0/0
> skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha2-512-hmac' : 0/0 =
passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo AUTH  'snow3g-uia2' : 0/0 passed, 0/0 ski=
pped, 0/0 failed, 0/0
> unsupported  + Algo AUTH  'zuc-eia3' : 0/0 passed, 0/0 skipped, 0/0 faile=
d, 0/0 unsupported  + Algo
> AUTH  'sha3-224' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  =
+ Algo AUTH  'sha3-224-hmac' :
> 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha3-=
256' : 0/0 passed, 0/0
> skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha3-256-hmac' : 0/0 =
passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo AUTH  'sha3-384' : 0/0 passed, 0/0 skippe=
d, 0/0 failed, 0/0 unsupported
> + Algo AUTH  'sha3-384-hmac' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 u=
nsupported  + Algo AUTH
> 'sha3-512' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo=
 AUTH  'sha3-512-hmac' : 0/0
> passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 'null' : =
0/0 passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo CIPHER '3des-cbc' : 0/0 passed, 0/0 skipp=
ed, 0/0 failed, 0/0
> unsupported  + Algo CIPHER '3des-ctr' : 0/0 passed, 0/0 skipped, 0/0 fail=
ed, 0/0 unsupported  + Algo
> CIPHER '3des-ecb' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported =
 + Algo CIPHER 'aes-cbc' : 0/0
> passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 'aes-ctr'=
 : 0/0 passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo CIPHER 'aes-ecb' : 0/0 passed, 0/0 skippe=
d, 0/0 failed, 0/0 unsupported
> + Algo CIPHER 'aes-f8' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsuppo=
rted  + Algo CIPHER 'aes-xts' :
> 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 'arc4=
' : 0/0 passed, 0/0 skipped,
> 0/0 failed, 0/0 unsupported  + Algo CIPHER 'kasumi-f8' : 0/0 passed, 0/0 =
skipped, 0/0 failed, 0/0
> unsupported  + Algo CIPHER 'snow3g-uea2' : 0/0 passed, 0/0 skipped, 0/0 f=
ailed, 0/0 unsupported  +
> Algo CIPHER 'zuc-eea3' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsuppo=
rted  + Algo CIPHER 'des-cbc' :
> 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 'aes-=
docsisbpi' : 0/0 passed, 0/0
> skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 'des-docsisbpi' : 0/0=
 passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo AEAD 'aes-gcm' : 0/0 passed, 0/0 skipped,=
 0/0 failed, 0/0 unsupported
> + Algo AEAD 'chacha20-poly1305' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/=
0 unsupported  + ---------------
> ---------------------------------------- +
>  + Sub Testsuites Total :     46
>  + Sub Testsuites Skipped :   46
>  + Sub Testsuites Passed :     0
>  + Sub Testsuites Failed :     0
>  + ------------------------------------------------------- +
>  + Tests Total :        0
>  + Tests Skipped :      0
>  + Tests Executed :     0
>  + Tests Unsupported:   0
>  + Tests Passed :       0
>  + Tests Failed :       0
>  + ------------------------------------------------------- + Test Skipped
>=20
>=20
Unfortunately, I do not have access to QAT device to investigate this issue=
.
However, I was able to run AESNI_MB with openssl. Let me know if issue pers=
ists in the next version.

> 2. For 2 openssl devices I get 3 failures, which is curious as they are t=
he same. Seems to be a space
> issue:
> USER1: Operation status 2
> USER1: No space for aad in single mbuf
> EAL: Test assert crosscheck_all_devices line 776 failed: Error occurred d=
uring processing
> EAL: Test assert crosscheck_with_profile_run line 841 failed: Error occur=
red during encryption
>=20
Good catch. Instead of including everything in rte_mbuf, I separated aad/di=
gest into their own memory allocations.
>=20
> Thanks,
> Ciara