From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id C07C541E90; Tue, 14 Mar 2023 14:33:16 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id AFF0D4161A; Tue, 14 Mar 2023 14:33:16 +0100 (CET) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by mails.dpdk.org (Postfix) with ESMTP id 65D4E4161A for ; Tue, 14 Mar 2023 14:33:15 +0100 (CET) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 32E7pLlr009021; Tue, 14 Mar 2023 06:33:14 -0700 Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2177.outbound.protection.outlook.com [104.47.56.177]) by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3p9xxmxjdk-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 14 Mar 2023 06:33:14 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=N68QuFjKAVc08Vy7p9ARlQyqf0wIs+wfNCKHiA9fIw8pb9oAFSzM3n7wsvWHbFVqvY/hvG9uHInijhH0GP9zRhlGYdPsktNi62S4E8lw6zckWE8KORIAXjEkUmKuGb+aybEaQCEdKWvaS9S2dtd7gKsGlcjgcfDSXTpQqhtum/XaENwtgXj/DjGiMCKqxGWNox2ZC9bPehikUZ0C5kLlFQhEgMXnGYW8gbxXv61o6UGCm/qwixCiAQNL0nKSkeytBwVZqVBs/R968azHDtk+vtcc3Mr/h3HZbOAWDCrVohop4hgdTPsZ8Dp/aiGPireUSFTh5LpJ1LH/xcPk+sog2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=k4lrgIn3VBvn7ZKtZa2kD42sYn1HSZtrtJBhcVAAAKQ=; b=Me77SpKLSxcYpaZFl+RBxX5JeqIyXRZdw47AM7i8XUNtR42+970bIdpf61nXfu3Hme1dD5QcJEcp6eIqRQ2KE626Oh+5LrnN35+wd1F0x9wSJdQ/bkDnN8mEyeVrbSHLixKGHotiCjmRzMjB7LqHRHyfGlZFeYJkgdKpEWkdDrTZ54sRfJ+DEy5X6H7tpV9ryd1BZikbBSD+bjeirQrOGoP3Af2VAXwgSiYfMKeg2r+IlDk0oINmqdg/zJLV8Em/WX+uICwtaUcwhVeNflG+WY91dzg6IBBfZRfjLs0gRbv5n6bdkD4KkzSf/j7TvB9xDy7oX0oKP58Agpfofpp5uA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.onmicrosoft.com; s=selector1-marvell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=k4lrgIn3VBvn7ZKtZa2kD42sYn1HSZtrtJBhcVAAAKQ=; b=Hi0P9gGb/tGbnPL3R94KqW/fR6bnuxXjXEtwGyXN3/Dvqx5Y+I/bqzHhuXRGTjWOYhKIac4a1D8PvI1wIBCixAnjmA9xPCJYWkMIYlf5TzpLaz1ghX7647vZBNnbrEncUKNxkWPaPVaxMtc0LLIvapmuGKSQX7nwsSobtNihf38= Received: from MW2PR18MB2282.namprd18.prod.outlook.com (2603:10b6:907:f::19) by MN6PR18MB5520.namprd18.prod.outlook.com (2603:10b6:208:47b::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.24; Tue, 14 Mar 2023 13:33:11 +0000 Received: from MW2PR18MB2282.namprd18.prod.outlook.com ([fe80::e0e0:c7fe:674e:ed00]) by MW2PR18MB2282.namprd18.prod.outlook.com ([fe80::e0e0:c7fe:674e:ed00%7]) with mapi id 15.20.6178.024; Tue, 14 Mar 2023 13:33:11 +0000 From: Volodymyr Fialko To: "Power, Ciara" , "dev@dpdk.org" , Akhil Goyal , Fan Zhang CC: Jerin Jacob Kollanukkaran , Anoob Joseph , "hemant.agrawal@nxp.com" , "Ji, Kai" Subject: RE: [PATCH v2] test: add cryptodev crosscheck suite Thread-Topic: [PATCH v2] test: add cryptodev crosscheck suite Thread-Index: AQHZPILfR+y9qyqi80Wcs6z/8OrhuK7xTl0AgAkf4yA= Date: Tue, 14 Mar 2023 13:33:11 +0000 Message-ID: References: <20221221110855.3970889-1-vfialko@marvell.com> <20230209123402.1993179-1-vfialko@marvell.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW2PR18MB2282:EE_|MN6PR18MB5520:EE_ x-ms-office365-filtering-correlation-id: 16552e2d-ac83-45d0-ca2d-08db2490a804 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW2PR18MB2282.namprd18.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(4636009)(346002)(396003)(376002)(136003)(39860400002)(366004)(451199018)(86362001)(33656002)(52536014)(8936002)(41300700001)(186003)(26005)(53546011)(6506007)(4326008)(5660300002)(9686003)(71200400001)(110136005)(7696005)(66446008)(55016003)(316002)(478600001)(66946007)(76116006)(66476007)(8676002)(54906003)(64756008)(122000001)(66556008)(38100700002)(38070700005)(2906002)(83380400001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?tSo27CnDgPe4zLebCngkzNbpenMOvOg3/OFLV8K6a89f4UVfrBVwqTi4uNs7?= =?us-ascii?Q?J2RakIPi0PEnl7+/xhQ4ML8CBK/yj0g8kTJpLi0AqncECIeTodsOHKBDuGZQ?= =?us-ascii?Q?Lt0X8BL9H29CWdaXNnEPiudtnesl0bhCbfcoO+gQ9KyOXhdXU/lqzX9iQXg6?= =?us-ascii?Q?dy/H87+7aCmzr8+fVVBTeQnaUFvcTFprupJpn6PhucvgAUJxrMuXhywDLZOg?= =?us-ascii?Q?mLbSdT1fN57ei68My3Rj0muzGaEBKBG/zVeZjN5ja7kzFipSR6w1frUlXzBf?= =?us-ascii?Q?pfqAXjbjqYWSbuHJXdfGaPb7jhDe91vUZPBfx7WM4W6nLnW+5tvrfuaQn0im?= =?us-ascii?Q?py9UrAbhM+yvRRE57tE2/7c05SJnO3gVsVjB1opc3ze9Rh16CYOMyq774PLb?= =?us-ascii?Q?Mh3WpcWXQk/mq/Rf+sC1pe/76j1Suoh0l2NJ05mODIfqaCzHo7vo7Rkku68X?= =?us-ascii?Q?js2SaCkrvhDMo6la72Q45nLZnA+4ONVdn6Yck7mTQjt4CCZgYeF5TZekMZaa?= =?us-ascii?Q?jV9STstRZUONqMsAFDVMv/6+F49wHhK2wdMRaFIFvI6UlvAZ9Bibt7X81jDl?= =?us-ascii?Q?zlOO6sccIbGMKJvq+Jjsk5BS3SplkhdppmWRNrd6gJyBIKChACRysiuEHhH7?= =?us-ascii?Q?MXV60Zwv0BNDrcNniyCro40zUwQyZpDIUCLw85D7gKk3wLl10GMLeSYYRdG7?= =?us-ascii?Q?ciH42js67ai9pu4IXRVv94J+8+CNVWD+UgEWuH/7UUS+jcLhe4rbYBfdv3Ik?= =?us-ascii?Q?f/fKOQl0H3csQmsvj4nmD65N6aL/Oop+bDW3ch4c6iBzmixDeO1z5Db14Ptg?= =?us-ascii?Q?i6+qX/USALtTvT4xI5QucBApATnKm5Gjx/bcXw0khlP4QDX78zHxTucOaYgD?= =?us-ascii?Q?pBVPwcfqr0MNZLfChP4uE5DupClkWPBT1p03VDFtVUctxT/zCS0lpCSyC+Bv?= =?us-ascii?Q?DWRMzJhRnfnfiKogp4Qq3s+mv5ZdMc4BJ+H6Jsfu0zu/2w1DHtJcbwcYV/MM?= =?us-ascii?Q?tWGiLAapeCNkZAFww6S3FE1mtFMgZmPD1wewkK9n0MFe4o4RN7iL14NA3ACP?= =?us-ascii?Q?0KnyXKp+K1zxLRYJ5JeSe8EJidZJpKp9dQIvDpz7QQ++wcFhMHQBYoNwSrGp?= =?us-ascii?Q?QgeCLXZ60aD42b0ZDTCCF7p9RUiEK4WrQ0OSKIOvfehiifXrlL4dYYOMkath?= =?us-ascii?Q?kXC22NsnqI9O1RKifJuqI88kdzz6hoPung673BqXNW4d44HtKucsv1yWjw5K?= =?us-ascii?Q?iiFtfpDNGeNzzixclgD0Q/FyRVqvy2y4L3vhpPy4u3JagsAxNAcZnqhlP1kq?= =?us-ascii?Q?pISnMo6GXOtg8t79fYPSU7rw+aOCvnlJ0lrAr1Dp2bhaA7Z35c+5wbLshaJh?= =?us-ascii?Q?4/fQJVa+xSwSscaD0GT8/9xe81ZZyMBSsBf+TgzMlj3yoPgLSaw0ZW11GGua?= =?us-ascii?Q?djUllEjDT62KD0dSFnhdzB+inU5n35qOWQwlM1VG6UNN4jjQrBHbvdFXbk65?= =?us-ascii?Q?v+i11ZrakqwvEBonSJwpFPvmomWtHHKHVQiPecZf9JHJGzD74APnGb6zICIx?= =?us-ascii?Q?+QLJPwBZsrfs0lhpjo8wtWbmsHwnIibVpnNVgv23?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: marvell.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW2PR18MB2282.namprd18.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 16552e2d-ac83-45d0-ca2d-08db2490a804 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2023 13:33:11.5677 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: GrCUILhqKowtHOgiB6rIASM3syg/QByRYLGxtfoBQrZY0LeVyXTLyBubWKKDbDguc7rk7LGwCBoBu4kjlpPcjA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN6PR18MB5520 X-Proofpoint-GUID: 5vWsEgv2fgceE-iDIIPvsxMsFLhj9sjs X-Proofpoint-ORIG-GUID: 5vWsEgv2fgceE-iDIIPvsxMsFLhj9sjs X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-03-14_06,2023-03-14_02,2023-02-09_01 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Ciara, > -----Original Message----- > From: Power, Ciara > Sent: Wednesday, March 8, 2023 6:31 PM > To: Volodymyr Fialko ; dev@dpdk.org; Akhil Goyal ; Fan > Zhang > Cc: Jerin Jacob Kollanukkaran ; Anoob Joseph ; > hemant.agrawal@nxp.com; Ji, Kai > Subject: [EXT] RE: [PATCH v2] test: add cryptodev crosscheck suite >=20 > External Email >=20 > ---------------------------------------------------------------------- > Hi Volodymyr, >=20 >=20 > > -----Original Message----- > > From: Volodymyr Fialko > > Sent: Thursday 9 February 2023 12:34 > > To: dev@dpdk.org; Akhil Goyal ; Fan Zhang > > > > Cc: jerinj@marvell.com; anoobj@marvell.com; hemant.agrawal@nxp.com; > > Ji, Kai ; Power, Ciara ; > > Volodymyr Fialko > > Subject: [PATCH v2] test: add cryptodev crosscheck suite > > > > Add a validation test suite that helps in verifying that the output > > generated by two different cryptodevs match for a wide range of input > > parameter combinations. > > > > Crypto autotest performs a comprehensive testing of the cryptodev but > > since it performs verification by comparing against known vectors, the > > extend to which various parameters (like packet size) can be tested is > > limited. This test suite attempts to simulate various cases by running > > same test case on different cryptodevs and compares the output > > generated. The test suite relies on capabilities to determine the > > combinations of tests to be attempted. > > > > A typical use case would be to compare outputs generated from a > > standard driver such as openSSL PMD and a new cryptodev PMD. This test > > suite is to compliment the testing coverage that crypto autotest provid= es. > > > > Currently supported symmetric xforms(cipher, auth, aead) without chaini= ng. > > > > Example command: > > DPDK_TEST=3Dcryptodev_crosscheck ./dpdk-test \ > > -a --vdev "crypto_openssl" > > > > Signed-off-by: Volodymyr Fialko > > --- > > V2: > > - Updated commit message. > > > > > + > > +static void > > +capabilities_inspect(void) > > +{ > > + struct rte_cryptodev_sym_capability_idx > > cap_indexes[CRYPTO_ALGOS_LEN], *cap_idx; > > + struct crypto_testsuite_params *ts_params =3D &testsuite_params; > > + const struct rte_cryptodev_symmetric_capability *sym_capa; > > + struct rte_cryptodev_symmetric_capability *common_capa; > > + uint32_t algo, i, dev_id, caps_idx; > > + > > + caps_idx =3D 0; > > + /* Create capability idx for known algorithms*/ > > + for (algo =3D 1; algo <=3D CRYPTO_AUTH_MAX_IDX; algo++) { > > + cap_idx =3D &cap_indexes[caps_idx++]; > > + cap_idx->type =3D RTE_CRYPTO_SYM_XFORM_AUTH; > > + cap_idx->algo.auth =3D algo; > > + } > > + for (algo =3D 1; algo <=3D CRYPTO_CIPHER_MAX_IDX; algo++) { > > + cap_idx =3D &cap_indexes[caps_idx++]; > > + cap_idx->type =3D RTE_CRYPTO_SYM_XFORM_CIPHER; > > + cap_idx->algo.cipher =3D algo; > > + } > > + for (algo =3D 1; algo <=3D CRYPTO_AEAD_MAX_IDX; algo++) { > > + cap_idx =3D &cap_indexes[caps_idx++]; > > + cap_idx->type =3D RTE_CRYPTO_SYM_XFORM_AEAD; > > + cap_idx->algo.aead =3D algo; > > + } > > + > > + for (caps_idx =3D 0; caps_idx < CRYPTO_ALGOS_LEN; caps_idx++) { > > + /* Gather common capabilities */ > > + common_capa =3D &common_symm_capas[caps_idx]; > > + common_capa->xform_type =3D > > RTE_CRYPTO_SYM_XFORM_NOT_SPECIFIED; > > + for (i =3D 0; i < ts_params->valid_dev_count; i++) { > > + dev_id =3D ts_params->valid_devs[i]; > > + sym_capa =3D > > rte_cryptodev_sym_capability_get(dev_id, > > + &cap_indexes[caps_idx]); > > + if (sym_capa =3D=3D NULL) { > > + /* Capability not supported by one of devs, > > mark and skip */ > > + goto next_algo; > > + } > > + > > + if (common_capa->xform_type =3D=3D > > RTE_CRYPTO_SYM_XFORM_NOT_SPECIFIED) { > > + /* First time initialization, copy data, go to > > next device */ > > + *common_capa =3D *sym_capa; > > + continue; > > + } > [CP] >=20 > This function - from what I understand after review, is looping through = all algorithms in DPDK crypto, > and then checking if each is supported by each device? > Could we instead just take the capabilities list from one device as the s= tarting point - That will be the > max list of capabilities, they will only get knocked out if not supported= on the 2nd/3rd device etc. >=20 Agreed, that's a good idea. I was misled by the lack of an API like rte_cry= ptodev_sym_capability_get_all(). But after taking closer look, I found that it's possible to retrieve all c= apabilities via dev_info. Reworked in V4. >=20 > >=20 > Some trials I did with this patch showed some issues. >=20 > 1. For QAT + AESNI_MB I get all skipped tests. I would have expected some= common algs here. > + ------------------------------------------------------- + > + Test Suite Summary : Crosscheck Unit Test Suite + -------------------= ------------------------------------ + + > Algo AUTH 'null' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported = + Algo AUTH 'aes-cbc-mac' : > 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo AUTH 'aes-c= mac' : 0/0 passed, 0/0 > skipped, 0/0 failed, 0/0 unsupported + Algo AUTH 'aes-gmac' : 0/0 passe= d, 0/0 skipped, 0/0 failed, 0/0 > unsupported + Algo AUTH 'aes-xcbc-mac' : 0/0 passed, 0/0 skipped, 0/0 f= ailed, 0/0 unsupported + > Algo AUTH 'kasumi-f9' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsuppo= rted + Algo AUTH 'md5' : 0/0 > passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo AUTH 'md5-hmac'= : 0/0 passed, 0/0 skipped, > 0/0 failed, 0/0 unsupported + Algo AUTH 'sha1' : 0/0 passed, 0/0 skippe= d, 0/0 failed, 0/0 unsupported > + Algo AUTH 'sha1-hmac' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsup= ported + Algo AUTH 'sha2- > 224' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo AUTH = 'sha2-224-hmac' : 0/0 passed, > 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo AUTH 'sha2-256' : 0/0 p= assed, 0/0 skipped, 0/0 failed, > 0/0 unsupported + Algo AUTH 'sha2-256-hmac' : 0/0 passed, 0/0 skipped, = 0/0 failed, 0/0 unsupported > + Algo AUTH 'sha2-384' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupp= orted + Algo AUTH 'sha2-384- > hmac' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo AUTH= 'sha2-512' : 0/0 passed, 0/0 > skipped, 0/0 failed, 0/0 unsupported + Algo AUTH 'sha2-512-hmac' : 0/0 = passed, 0/0 skipped, 0/0 > failed, 0/0 unsupported + Algo AUTH 'snow3g-uia2' : 0/0 passed, 0/0 ski= pped, 0/0 failed, 0/0 > unsupported + Algo AUTH 'zuc-eia3' : 0/0 passed, 0/0 skipped, 0/0 faile= d, 0/0 unsupported + Algo > AUTH 'sha3-224' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported = + Algo AUTH 'sha3-224-hmac' : > 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo AUTH 'sha3-= 256' : 0/0 passed, 0/0 > skipped, 0/0 failed, 0/0 unsupported + Algo AUTH 'sha3-256-hmac' : 0/0 = passed, 0/0 skipped, 0/0 > failed, 0/0 unsupported + Algo AUTH 'sha3-384' : 0/0 passed, 0/0 skippe= d, 0/0 failed, 0/0 unsupported > + Algo AUTH 'sha3-384-hmac' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 u= nsupported + Algo AUTH > 'sha3-512' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo= AUTH 'sha3-512-hmac' : 0/0 > passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo CIPHER 'null' : = 0/0 passed, 0/0 skipped, 0/0 > failed, 0/0 unsupported + Algo CIPHER '3des-cbc' : 0/0 passed, 0/0 skipp= ed, 0/0 failed, 0/0 > unsupported + Algo CIPHER '3des-ctr' : 0/0 passed, 0/0 skipped, 0/0 fail= ed, 0/0 unsupported + Algo > CIPHER '3des-ecb' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported = + Algo CIPHER 'aes-cbc' : 0/0 > passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo CIPHER 'aes-ctr'= : 0/0 passed, 0/0 skipped, 0/0 > failed, 0/0 unsupported + Algo CIPHER 'aes-ecb' : 0/0 passed, 0/0 skippe= d, 0/0 failed, 0/0 unsupported > + Algo CIPHER 'aes-f8' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsuppo= rted + Algo CIPHER 'aes-xts' : > 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo CIPHER 'arc4= ' : 0/0 passed, 0/0 skipped, > 0/0 failed, 0/0 unsupported + Algo CIPHER 'kasumi-f8' : 0/0 passed, 0/0 = skipped, 0/0 failed, 0/0 > unsupported + Algo CIPHER 'snow3g-uea2' : 0/0 passed, 0/0 skipped, 0/0 f= ailed, 0/0 unsupported + > Algo CIPHER 'zuc-eea3' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsuppo= rted + Algo CIPHER 'des-cbc' : > 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported + Algo CIPHER 'aes-= docsisbpi' : 0/0 passed, 0/0 > skipped, 0/0 failed, 0/0 unsupported + Algo CIPHER 'des-docsisbpi' : 0/0= passed, 0/0 skipped, 0/0 > failed, 0/0 unsupported + Algo AEAD 'aes-gcm' : 0/0 passed, 0/0 skipped,= 0/0 failed, 0/0 unsupported > + Algo AEAD 'chacha20-poly1305' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/= 0 unsupported + --------------- > ---------------------------------------- + > + Sub Testsuites Total : 46 > + Sub Testsuites Skipped : 46 > + Sub Testsuites Passed : 0 > + Sub Testsuites Failed : 0 > + ------------------------------------------------------- + > + Tests Total : 0 > + Tests Skipped : 0 > + Tests Executed : 0 > + Tests Unsupported: 0 > + Tests Passed : 0 > + Tests Failed : 0 > + ------------------------------------------------------- + Test Skipped >=20 >=20 Unfortunately, I do not have access to QAT device to investigate this issue= . However, I was able to run AESNI_MB with openssl. Let me know if issue pers= ists in the next version. > 2. For 2 openssl devices I get 3 failures, which is curious as they are t= he same. Seems to be a space > issue: > USER1: Operation status 2 > USER1: No space for aad in single mbuf > EAL: Test assert crosscheck_all_devices line 776 failed: Error occurred d= uring processing > EAL: Test assert crosscheck_with_profile_run line 841 failed: Error occur= red during encryption >=20 Good catch. Instead of including everything in rte_mbuf, I separated aad/di= gest into their own memory allocations. >=20 > Thanks, > Ciara