test suite reviews and discussions
 help / color / Atom feed
* [dts] [PATCH V1 1/4] add file to crypto_perf
@ 2019-10-21  6:10 yaobing
  2019-10-21  6:10 ` [dts] [PATCH V1 2/4] " yaobing
                   ` (4 more replies)
  0 siblings, 5 replies; 13+ messages in thread
From: yaobing @ 2019-10-21  6:10 UTC (permalink / raw)
  To: dts; +Cc: yaobing

add file to crypto_perf

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 dep/test_aes_gcm.data | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)
 create mode 100644 dep/test_aes_gcm.data

diff --git a/dep/test_aes_gcm.data b/dep/test_aes_gcm.data
new file mode 100644
index 0000000..034f4fa
--- /dev/null
+++ b/dep/test_aes_gcm.data
@@ -0,0 +1,19 @@
+# Global Section
+plaintext =
+0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11,
+0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11
+
+ciphertext =
+0x82, 0x7d, 0xb6, 0xdf, 0x77, 0x0a, 0xe6, 0x45, 0x5a, 0xc3, 0x70, 0x9b, 0x27, 0xb2, 0x61, 0x19,
+0xa2, 0x37, 0x0b, 0xf7, 0x42, 0xfc, 0xec, 0xe7, 0xf7, 0x30, 0xe0, 0x3c, 0x05, 0x55, 0xb3, 0x7d
+
+aead_key =
+0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
+aead_iv =
+0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B
+aead_aad =
+0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
+
+[aes_gcm_buff_32]
+digest =
+0x0f, 0xb2, 0x98, 0x59, 0x48, 0xbf, 0x6c, 0x37, 0x5a, 0xad, 0xcd, 0x97, 0x9f, 0xbb, 0xc8, 0x2a
-- 
2.17.2


^ permalink raw reply	[flat|nested] 13+ messages in thread

* [dts] [PATCH V1 2/4] add file to crypto_perf
  2019-10-21  6:10 [dts] [PATCH V1 1/4] add file to crypto_perf yaobing
@ 2019-10-21  6:10 ` " yaobing
  2019-10-21  7:39   ` Wan, Zhe
  2019-10-21  7:44   ` Yao, BingX Y
  2019-10-21  6:10 ` [dts] [PATCH V1 3/4] add config " yaobing
                   ` (3 subsequent siblings)
  4 siblings, 2 replies; 13+ messages in thread
From: yaobing @ 2019-10-21  6:10 UTC (permalink / raw)
  To: dts; +Cc: yaobing

add file to crypto_perf

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 dep/test_aes_cbc.data | 27 +++++++++++++++++++++++++++
 1 file changed, 27 insertions(+)
 create mode 100644 dep/test_aes_cbc.data

diff --git a/dep/test_aes_cbc.data b/dep/test_aes_cbc.data
new file mode 100644
index 0000000..c467da4
--- /dev/null
+++ b/dep/test_aes_cbc.data
@@ -0,0 +1,27 @@
+# Global Section
+plaintext =
+0xff, 0xca, 0xfb, 0xf1, 0x38, 0x20, 0x2f, 0x7b, 0x24, 0x98, 0x26, 0x7d, 0x1d, 0x9f, 0xb3, 0x93,
+0xd9, 0xef, 0xbd, 0xad, 0x4e, 0x40, 0xbd, 0x60, 0xe9, 0x48, 0x59, 0x90, 0x67, 0xd7, 0x2b, 0x7b
+ciphertext =
+0x77, 0xF9, 0xF7, 0x7A, 0xA3, 0xCB, 0x68, 0x1A, 0x11, 0x70, 0xD8, 0x7A, 0xB6, 0xE2, 0x37, 0x7E,
+0xD1, 0x57, 0x1C, 0x8E, 0x85, 0xD8, 0x08, 0xBF, 0x57, 0x1F, 0x21, 0x6C, 0xAD, 0xAD, 0x47, 0x1E
+cipher_key =
+0xE4, 0x23, 0x33, 0x8A, 0x35, 0x64, 0x61, 0xE2, 0x49, 0x03, 0xDD, 0xC6, 0xB8, 0xCA, 0x55, 0x7A,
+0xd0, 0xe7, 0x4b, 0xfb, 0x5d, 0xe5, 0x0c, 0xe7, 0x6f, 0x21, 0xb5, 0x52, 0x2a, 0xbb, 0xc7, 0xf7
+auth_key =
+0xaf, 0x96, 0x42, 0xf1, 0x8c, 0x50, 0xdc, 0x67, 0x1a, 0x43, 0x47, 0x62, 0xc7, 0x04, 0xab, 0x05,
+0xf5, 0x0c, 0xe7, 0xa2, 0xa6, 0x23, 0xd5, 0x3d, 0x95, 0xd8, 0xcd, 0x86, 0x79, 0xf5, 0x01, 0x47,
+0x4f, 0xf9, 0x1d, 0x9d, 0x36, 0xf7, 0x68, 0x1a, 0x64, 0x44, 0x58, 0x5d, 0xe5, 0x81, 0x15, 0x2a,
+0x41, 0xe4, 0x0e, 0xaa, 0x1f, 0x04, 0x21, 0xff, 0x2c, 0xf3, 0x73, 0x2b, 0x48, 0x1e, 0xd2, 0xf7
+cipher_iv =
+0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
+# Section sha 1 hmac buff 32
+[sha1_hmac_buff_32]
+digest =
+0x36, 0xCA, 0x49, 0x6A, 0xE3, 0x54, 0xD8, 0x4F, 0x0B, 0x76, 0xD8, 0xAA, 0x78, 0xEB, 0x9D, 0x65,
+0x2C, 0xCA, 0x1F, 0x97
+# Section sha 256 hmac buff 32
+[sha256_hmac_buff_32]
+digest =
+0x1C, 0xB2, 0x3D, 0xD1, 0xF9, 0xC7, 0x6C, 0x49, 0x2E, 0xDA, 0x94, 0x8B, 0xF1, 0xCF, 0x96, 0x43,
+0x67, 0x50, 0x39, 0x76, 0xB5, 0xA1, 0xCE, 0xA1, 0xD7, 0x77, 0x10, 0x07, 0x43, 0x37, 0x05, 0xB4
-- 
2.17.2


^ permalink raw reply	[flat|nested] 13+ messages in thread

* [dts] [PATCH V1 3/4] add config to crypto_perf
  2019-10-21  6:10 [dts] [PATCH V1 1/4] add file to crypto_perf yaobing
  2019-10-21  6:10 ` [dts] [PATCH V1 2/4] " yaobing
@ 2019-10-21  6:10 ` " yaobing
  2019-10-21  7:40   ` Wan, Zhe
  2019-10-21  7:45   ` Yao, BingX Y
  2019-10-21  6:10 ` [dts] [PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases yaobing
                   ` (2 subsequent siblings)
  4 siblings, 2 replies; 13+ messages in thread
From: yaobing @ 2019-10-21  6:10 UTC (permalink / raw)
  To: dts; +Cc: yaobing

add config to crypto_perf

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 conf/crypto_perf_cryptodev_perf.cfg | 149 +++++++++++++++++++++++++---
 1 file changed, 133 insertions(+), 16 deletions(-)

diff --git a/conf/crypto_perf_cryptodev_perf.cfg b/conf/crypto_perf_cryptodev_perf.cfg
index 4e57aba..90c4e4e 100644
--- a/conf/crypto_perf_cryptodev_perf.cfg
+++ b/conf/crypto_perf_cryptodev_perf.cfg
@@ -13,11 +13,142 @@ vdev="crypto_aesni_mb_pmd_1"
 
 total-ops=30000000
 buffer-sz="64,128,256,512,1024,2048"
-optype="cipher-then-auth"
 
+[test_verify_aesni_mb]
+buffer-sz=32
+ptest="verify"
+auth-key-sz=64
+cipher-key-sz=32
+devtype="crypto_aesni_mb"
+cipher-iv-sz=16
+auth-op="generate"
+digest-sz=12
+auth-algo="sha1-hmac"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+test-name="sha1_hmac_buff_32"
+test-file="/tmp/test_aes_cbc.data"
+
+[test_verify_qat]
+buffer-sz=32
+ptest="verify"
+auth-key-sz=64
+cipher-key-sz=32
+devtype="crypto_qat"
+cipher-iv-sz=16
+auth-op="generate"
+digest-sz=20
+auth-algo="sha1-hmac"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+test-name="sha1_hmac_buff_32"
+test-file="/tmp/test_aes_cbc.data"
+
+[test_verify_openssl_qat]
+l="9,10,11,12"
+vdev="crypto_openssl"
+devtype="crypto_openssl"
+aead-algo="aes-gcm"
+aead-key-sz=16
+aead-iv-sz=12
+aead-op="encrypt"
+aead-aad-sz=16
+digest-sz=16
+optype="aead"
+ptest="verify"
+buffer-sz=32
+test-name="aes_gcm_buff_32"
+test-file="/tmp/test_aes_gcm.data"
+
+[test_verify_openssl]
+l="9,10,11,12"
+vdev="crypto_openssl"
+devtype="crypto_openssl"
+aead-algo="aes-gcm"
+aead-key-sz=16
+aead-iv-sz=12
+aead-op="encrypt"
+aead-aad-sz=16
+digest-sz=16
+optype="aead"
+ptest="verify"
+buffer-sz=32
+test-name="aes_gcm_buff_32"
+test-file="/tmp/test_aes_gcm.data"
+
+[test_latency_qat]
+l="9,10,11,12"
+w="0000:1a:01.0  -w 0000:1a:01.1  -w 0000:1a:01.2"
+devtype="crypto_qat"
+cipher-algo="aes-cbc"
+cipher-key-sz=16
+cipher-iv-sz=16
+cipher-op="encrypt"
+optype="cipher-only"
+ptest="latency"
+
+[test_latency_auth_qat]
+l="9,10,11,12"
+w="0000:1a:01.0  -w 0000:1a:01.1  -w 0000:1a:01.2"
+ptest="latency"
+devtype="crypto_qat"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+cipher-key-sz=16
+auth-algo="sha1-hmac"
+auth-op="generate"
+auth-key-sz=64
+digest-sz=12
+silent=None
+
+[test_latency_aead_qat]
+aead-key-sz=16
+optype="aead"
+ptest="latency"
+aead-aad-sz=16
+devtype="crypto_qat"
+aead-op="encrypt"
+digest-sz=16
+aead-algo="aes-gcm"
+aead-iv-sz=12
+
+[test_latency_aesni_gcm]
+vdev="crypto_aesni_gcm_pmd_1"
+aead-key-sz=16
+optype="aead"
+ptest="latency"
+aead-aad-sz=16
+devtype="crypto_aesni_gcm"
+aead-op="encrypt"
+digest-sz=16
+aead-algo="aes-gcm"
+aead-iv-sz=12
+
+[test_latency_auth_aesni_mb]
+l="9,10,11,12"
+vdev="crypto_aesni_mb1 --vdev crypto_aesni_mb2"
+ptest="latency"
+devtype="crypto_aesni_mb"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+cipher-key-sz=16
+auth-algo="sha1-hmac"
+auth-op="generate"
+auth-key-sz=64
+silent=None
+digest-sz=12
+
+[test_latency_aesni_mb]
+vdev="crypto_aesni_mb1 --vdev crypto_aesni_mb2"
+devtype="crypto_aesni_mb"
+cipher-algo="aes-cbc"
+cipher-key-sz=16
+cipher-iv-sz=16
+cipher-op="encrypt"
+optype="cipher-only"
+ptest="latency"
 
 [test_qat_aes_cbc_sha1_hmac]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -29,8 +160,6 @@ auth-key-sz=64
 digest-sz=20
 
 [test_sw_aes_cbc_sha1_hmac]
-#test_skip="Y"
-total-ops=10000000
 devtype="crypto_aesni_mb"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -42,7 +171,6 @@ auth-key-sz=64
 digest-sz=12
 
 [test_qat_aes_cbc_sha2_hmac]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -54,8 +182,6 @@ auth-key-sz=64
 digest-sz=32
 
 [test_sw_aes_cbc_sha2_hmac]
-#test_skip="Y"
-total-ops=10000000
 devtype="crypto_aesni_mb"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -67,7 +193,6 @@ auth-key-sz=64
 digest-sz=16
 
 [test_qat_aes_gcm]
-#test_skip="Y"
 devtype="crypto_qat"
 optype="aead"
 aead-algo="aes-gcm"
@@ -78,9 +203,7 @@ aead-aad-sz=16
 digest-sz=16
 
 [test_sw_aes_gcm]
-#test_skip="Y"
 vdev="crypto_aesni_gcm_pmd_1"
-total-ops=10000000
 optype="aead"
 devtype="crypto_aesni_gcm"
 aead-algo="aes-gcm"
@@ -91,7 +214,6 @@ aead-aad-sz=16
 digest-sz=16
 
 [test_qat_kasumi]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="kasumi-f8"
 cipher-op="encrypt"
@@ -103,7 +225,6 @@ auth-key-sz=16
 digest-sz=4
 
 [test_sw_kasumi]
-#test_skip="Y"
 vdev="crypto_kasumi_1"
 total-ops=1000000
 devtype="crypto_kasumi"
@@ -117,7 +238,6 @@ auth-key-sz=16
 digest-sz=4
 
 [test_qat_snow3g]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="snow3g-uea2"
 cipher-op="encrypt"
@@ -130,7 +250,6 @@ auth-iv-sz=16
 digest-sz=4
 
 [test_sw_snow3g]
-#test_skip="Y"
 vdev="crypto_snow3g_1"
 total-ops=1000000
 devtype="crypto_snow3g"
@@ -145,7 +264,6 @@ auth-iv-sz=16
 digest-sz=4
 
 [test_qat_zuc]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="zuc-eea3"
 cipher-op="encrypt"
@@ -158,7 +276,6 @@ auth-iv-sz=16
 digest-sz=4
 
 [test_sw_zuc]
-#test_skip="Y"
 vdev="crypto_zuc_1"
 total-ops=1000000
 devtype="crypto_zuc"
-- 
2.17.2


^ permalink raw reply	[flat|nested] 13+ messages in thread

* [dts] [PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases
  2019-10-21  6:10 [dts] [PATCH V1 1/4] add file to crypto_perf yaobing
  2019-10-21  6:10 ` [dts] [PATCH V1 2/4] " yaobing
  2019-10-21  6:10 ` [dts] [PATCH V1 3/4] add config " yaobing
@ 2019-10-21  6:10 ` yaobing
  2019-10-21  7:40   ` Wan, Zhe
  2019-10-21  7:45   ` Yao, BingX Y
  2019-10-21  7:39 ` [dts] [PATCH V1 1/4] add file to crypto_perf Wan, Zhe
  2019-10-23  9:54 ` Tu, Lijuan
  4 siblings, 2 replies; 13+ messages in thread
From: yaobing @ 2019-10-21  6:10 UTC (permalink / raw)
  To: dts; +Cc: yaobing

add cases

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 tests/TestSuite_crypto_perf_cryptodev_perf.py | 107 ++++++++++++++++++
 1 file changed, 107 insertions(+)

diff --git a/tests/TestSuite_crypto_perf_cryptodev_perf.py b/tests/TestSuite_crypto_perf_cryptodev_perf.py
index 38b959f..6b0fffb 100644
--- a/tests/TestSuite_crypto_perf_cryptodev_perf.py
+++ b/tests/TestSuite_crypto_perf_cryptodev_perf.py
@@ -75,6 +75,10 @@ class PerfTestsCryptodev(TestCase):
             cc.build_dpdk_with_cryptodev(self)
 
         cc.bind_qat_device(self, "vfio-pci")
+        src_files = ['dep/test_aes_cbc.data', 'dep/test_aes_gcm.data']
+        self.dut_file_dir = '/tmp'
+        for file in src_files:
+            self.dut.session.copy_file_to(file, self.dut_file_dir)
 
     def tear_down_all(self):
         cc.clear_dpdk_config(self)
@@ -91,6 +95,109 @@ class PerfTestsCryptodev(TestCase):
     def tear_down(self):
         self.dut.kill_all()
 
+    def _run_func(self, eal_opt_str, crypto_func_opt_str, case_name):
+        cmd_str = cc.get_dpdk_app_cmd_str(self._app_path,
+                                          eal_opt_str,
+                                          crypto_func_opt_str)
+        self.logger.info(cmd_str)
+        try:
+            out = self.dut.send_expect(cmd_str+">%s/%s.txt" % (self.dut_file_dir, case_name), "#", 600)
+        except Exception as ex:
+            self.logger.error(ex)
+            raise ex
+        out = self.dut.send_expect("cat %s/%s.txt | grep fail" % (self.dut_file_dir, case_name), "#")
+        return out
+
+    def test_verify_aesni_mb(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_aesni_mb")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_verify_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_verify_openssl_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_openssl_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_verify_openssl(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_openssl")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_auth_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_auth_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_aead_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_aead_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_aesni_gcm(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_aesni_gcm")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_auth_aesni_mb(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str,crypto_func_opt_str,"test_latency_auth_aesni_mb")
+        self.verify(len(out) ==0 , "Test function failed")
+
+    def test_latency_aesni_mb(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str,crypto_func_opt_str,"test_latency_aesni_mb")
+        self.verify(len(out) ==0 , "Test function failed")
+
     def test_qat_aes_cbc_sha1_hmac(self):
         if cc.is_test_skip(self):
             return
-- 
2.17.2


^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [dts] [PATCH V1 1/4] add file to crypto_perf
  2019-10-21  6:10 [dts] [PATCH V1 1/4] add file to crypto_perf yaobing
                   ` (2 preceding siblings ...)
  2019-10-21  6:10 ` [dts] [PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases yaobing
@ 2019-10-21  7:39 ` Wan, Zhe
  2019-10-21  7:42   ` Yao, BingX Y
  2019-10-23  9:54 ` Tu, Lijuan
  4 siblings, 1 reply; 13+ messages in thread
From: Wan, Zhe @ 2019-10-21  7:39 UTC (permalink / raw)
  To: Yao, BingX Y, dts; +Cc: Yao, BingX Y

Acked-by: Wan, Zhe <zhe.wan@intel.com>



Thanks!
BR,
Wan,Zhe

-----Original Message-----
From: dts <dts-bounces@dpdk.org> On Behalf Of yaobing
Sent: 2019^[$BG/^[(B10^[$B7n^[(B21^[$BF|^[(B 14:10
To: dts@dpdk.org
Cc: Yao, BingX Y <bingx.y.yao@intel.com>
Subject: [dts] [PATCH V1 1/4] add file to crypto_perf

add file to crypto_perf

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 dep/test_aes_gcm.data | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)
 create mode 100644 dep/test_aes_gcm.data

diff --git a/dep/test_aes_gcm.data b/dep/test_aes_gcm.data new file mode 100644 index 0000000..034f4fa
--- /dev/null
+++ b/dep/test_aes_gcm.data
@@ -0,0 +1,19 @@
+# Global Section
+plaintext =
+0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 
+0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 
+0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11
+
+ciphertext =
+0x82, 0x7d, 0xb6, 0xdf, 0x77, 0x0a, 0xe6, 0x45, 0x5a, 0xc3, 0x70, 0x9b, 
+0x27, 0xb2, 0x61, 0x19, 0xa2, 0x37, 0x0b, 0xf7, 0x42, 0xfc, 0xec, 0xe7, 
+0xf7, 0x30, 0xe0, 0x3c, 0x05, 0x55, 0xb3, 0x7d
+
+aead_key =
+0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 
+0x0C, 0x0D, 0x0E, 0x0F aead_iv = 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 
+0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B aead_aad = 0x00, 0x01, 0x02, 0x03, 
+0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
+
+[aes_gcm_buff_32]
+digest =
+0x0f, 0xb2, 0x98, 0x59, 0x48, 0xbf, 0x6c, 0x37, 0x5a, 0xad, 0xcd, 0x97, 
+0x9f, 0xbb, 0xc8, 0x2a
--
2.17.2


^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [dts] [PATCH V1 2/4] add file to crypto_perf
  2019-10-21  6:10 ` [dts] [PATCH V1 2/4] " yaobing
@ 2019-10-21  7:39   ` Wan, Zhe
  2019-10-21  7:44   ` Yao, BingX Y
  1 sibling, 0 replies; 13+ messages in thread
From: Wan, Zhe @ 2019-10-21  7:39 UTC (permalink / raw)
  To: Yao, BingX Y, dts; +Cc: Yao, BingX Y

Acked-by: Wan, Zhe <zhe.wan@intel.com>




Thanks!
BR,
Wan,Zhe

-----Original Message-----
From: dts <dts-bounces@dpdk.org> On Behalf Of yaobing
Sent: 2019^[$BG/^[(B10^[$B7n^[(B21^[$BF|^[(B 14:10
To: dts@dpdk.org
Cc: Yao, BingX Y <bingx.y.yao@intel.com>
Subject: [dts] [PATCH V1 2/4] add file to crypto_perf

add file to crypto_perf

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 dep/test_aes_cbc.data | 27 +++++++++++++++++++++++++++
 1 file changed, 27 insertions(+)
 create mode 100644 dep/test_aes_cbc.data

diff --git a/dep/test_aes_cbc.data b/dep/test_aes_cbc.data new file mode 100644 index 0000000..c467da4
--- /dev/null
+++ b/dep/test_aes_cbc.data
@@ -0,0 +1,27 @@
+# Global Section
+plaintext =
+0xff, 0xca, 0xfb, 0xf1, 0x38, 0x20, 0x2f, 0x7b, 0x24, 0x98, 0x26, 0x7d, 
+0x1d, 0x9f, 0xb3, 0x93, 0xd9, 0xef, 0xbd, 0xad, 0x4e, 0x40, 0xbd, 0x60, 
+0xe9, 0x48, 0x59, 0x90, 0x67, 0xd7, 0x2b, 0x7b ciphertext = 0x77, 0xF9, 
+0xF7, 0x7A, 0xA3, 0xCB, 0x68, 0x1A, 0x11, 0x70, 0xD8, 0x7A, 0xB6, 0xE2, 
+0x37, 0x7E, 0xD1, 0x57, 0x1C, 0x8E, 0x85, 0xD8, 0x08, 0xBF, 0x57, 0x1F, 
+0x21, 0x6C, 0xAD, 0xAD, 0x47, 0x1E cipher_key = 0xE4, 0x23, 0x33, 0x8A, 
+0x35, 0x64, 0x61, 0xE2, 0x49, 0x03, 0xDD, 0xC6, 0xB8, 0xCA, 0x55, 0x7A, 
+0xd0, 0xe7, 0x4b, 0xfb, 0x5d, 0xe5, 0x0c, 0xe7, 0x6f, 0x21, 0xb5, 0x52, 
+0x2a, 0xbb, 0xc7, 0xf7 auth_key = 0xaf, 0x96, 0x42, 0xf1, 0x8c, 0x50, 
+0xdc, 0x67, 0x1a, 0x43, 0x47, 0x62, 0xc7, 0x04, 0xab, 0x05, 0xf5, 0x0c, 
+0xe7, 0xa2, 0xa6, 0x23, 0xd5, 0x3d, 0x95, 0xd8, 0xcd, 0x86, 0x79, 0xf5, 
+0x01, 0x47, 0x4f, 0xf9, 0x1d, 0x9d, 0x36, 0xf7, 0x68, 0x1a, 0x64, 0x44, 
+0x58, 0x5d, 0xe5, 0x81, 0x15, 0x2a, 0x41, 0xe4, 0x0e, 0xaa, 0x1f, 0x04, 
+0x21, 0xff, 0x2c, 0xf3, 0x73, 0x2b, 0x48, 0x1e, 0xd2, 0xf7 cipher_iv = 
+0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 
+0x0C, 0x0D, 0x0E, 0x0F # Section sha 1 hmac buff 32 [sha1_hmac_buff_32] 
+digest = 0x36, 0xCA, 0x49, 0x6A, 0xE3, 0x54, 0xD8, 0x4F, 0x0B, 0x76, 
+0xD8, 0xAA, 0x78, 0xEB, 0x9D, 0x65, 0x2C, 0xCA, 0x1F, 0x97 # Section 
+sha 256 hmac buff 32 [sha256_hmac_buff_32] digest = 0x1C, 0xB2, 0x3D, 
+0xD1, 0xF9, 0xC7, 0x6C, 0x49, 0x2E, 0xDA, 0x94, 0x8B, 0xF1, 0xCF, 0x96, 
+0x43, 0x67, 0x50, 0x39, 0x76, 0xB5, 0xA1, 0xCE, 0xA1, 0xD7, 0x77, 0x10, 
+0x07, 0x43, 0x37, 0x05, 0xB4
--
2.17.2


^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [dts] [PATCH V1 3/4] add config to crypto_perf
  2019-10-21  6:10 ` [dts] [PATCH V1 3/4] add config " yaobing
@ 2019-10-21  7:40   ` Wan, Zhe
  2019-10-21  7:45   ` Yao, BingX Y
  1 sibling, 0 replies; 13+ messages in thread
From: Wan, Zhe @ 2019-10-21  7:40 UTC (permalink / raw)
  To: Yao, BingX Y, dts; +Cc: Yao, BingX Y

Acked-by: Wan, Zhe <zhe.wan@intel.com>




Thanks!
BR,
Wan,Zhe

-----Original Message-----
From: dts <dts-bounces@dpdk.org> On Behalf Of yaobing
Sent: 2019^[$BG/^[(B10^[$B7n^[(B21^[$BF|^[(B 14:10
To: dts@dpdk.org
Cc: Yao, BingX Y <bingx.y.yao@intel.com>
Subject: [dts] [PATCH V1 3/4] add config to crypto_perf

add config to crypto_perf

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 conf/crypto_perf_cryptodev_perf.cfg | 149 +++++++++++++++++++++++++---
 1 file changed, 133 insertions(+), 16 deletions(-)

diff --git a/conf/crypto_perf_cryptodev_perf.cfg b/conf/crypto_perf_cryptodev_perf.cfg
index 4e57aba..90c4e4e 100644
--- a/conf/crypto_perf_cryptodev_perf.cfg
+++ b/conf/crypto_perf_cryptodev_perf.cfg
@@ -13,11 +13,142 @@ vdev="crypto_aesni_mb_pmd_1"
 
 total-ops=30000000
 buffer-sz="64,128,256,512,1024,2048"
-optype="cipher-then-auth"
 
+[test_verify_aesni_mb]
+buffer-sz=32
+ptest="verify"
+auth-key-sz=64
+cipher-key-sz=32
+devtype="crypto_aesni_mb"
+cipher-iv-sz=16
+auth-op="generate"
+digest-sz=12
+auth-algo="sha1-hmac"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+test-name="sha1_hmac_buff_32"
+test-file="/tmp/test_aes_cbc.data"
+
+[test_verify_qat]
+buffer-sz=32
+ptest="verify"
+auth-key-sz=64
+cipher-key-sz=32
+devtype="crypto_qat"
+cipher-iv-sz=16
+auth-op="generate"
+digest-sz=20
+auth-algo="sha1-hmac"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+test-name="sha1_hmac_buff_32"
+test-file="/tmp/test_aes_cbc.data"
+
+[test_verify_openssl_qat]
+l="9,10,11,12"
+vdev="crypto_openssl"
+devtype="crypto_openssl"
+aead-algo="aes-gcm"
+aead-key-sz=16
+aead-iv-sz=12
+aead-op="encrypt"
+aead-aad-sz=16
+digest-sz=16
+optype="aead"
+ptest="verify"
+buffer-sz=32
+test-name="aes_gcm_buff_32"
+test-file="/tmp/test_aes_gcm.data"
+
+[test_verify_openssl]
+l="9,10,11,12"
+vdev="crypto_openssl"
+devtype="crypto_openssl"
+aead-algo="aes-gcm"
+aead-key-sz=16
+aead-iv-sz=12
+aead-op="encrypt"
+aead-aad-sz=16
+digest-sz=16
+optype="aead"
+ptest="verify"
+buffer-sz=32
+test-name="aes_gcm_buff_32"
+test-file="/tmp/test_aes_gcm.data"
+
+[test_latency_qat]
+l="9,10,11,12"
+w="0000:1a:01.0  -w 0000:1a:01.1  -w 0000:1a:01.2"
+devtype="crypto_qat"
+cipher-algo="aes-cbc"
+cipher-key-sz=16
+cipher-iv-sz=16
+cipher-op="encrypt"
+optype="cipher-only"
+ptest="latency"
+
+[test_latency_auth_qat]
+l="9,10,11,12"
+w="0000:1a:01.0  -w 0000:1a:01.1  -w 0000:1a:01.2"
+ptest="latency"
+devtype="crypto_qat"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+cipher-key-sz=16
+auth-algo="sha1-hmac"
+auth-op="generate"
+auth-key-sz=64
+digest-sz=12
+silent=None
+
+[test_latency_aead_qat]
+aead-key-sz=16
+optype="aead"
+ptest="latency"
+aead-aad-sz=16
+devtype="crypto_qat"
+aead-op="encrypt"
+digest-sz=16
+aead-algo="aes-gcm"
+aead-iv-sz=12
+
+[test_latency_aesni_gcm]
+vdev="crypto_aesni_gcm_pmd_1"
+aead-key-sz=16
+optype="aead"
+ptest="latency"
+aead-aad-sz=16
+devtype="crypto_aesni_gcm"
+aead-op="encrypt"
+digest-sz=16
+aead-algo="aes-gcm"
+aead-iv-sz=12
+
+[test_latency_auth_aesni_mb]
+l="9,10,11,12"
+vdev="crypto_aesni_mb1 --vdev crypto_aesni_mb2"
+ptest="latency"
+devtype="crypto_aesni_mb"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+cipher-key-sz=16
+auth-algo="sha1-hmac"
+auth-op="generate"
+auth-key-sz=64
+silent=None
+digest-sz=12
+
+[test_latency_aesni_mb]
+vdev="crypto_aesni_mb1 --vdev crypto_aesni_mb2"
+devtype="crypto_aesni_mb"
+cipher-algo="aes-cbc"
+cipher-key-sz=16
+cipher-iv-sz=16
+cipher-op="encrypt"
+optype="cipher-only"
+ptest="latency"
 
 [test_qat_aes_cbc_sha1_hmac]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -29,8 +160,6 @@ auth-key-sz=64
 digest-sz=20
 
 [test_sw_aes_cbc_sha1_hmac]
-#test_skip="Y"
-total-ops=10000000
 devtype="crypto_aesni_mb"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -42,7 +171,6 @@ auth-key-sz=64
 digest-sz=12
 
 [test_qat_aes_cbc_sha2_hmac]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -54,8 +182,6 @@ auth-key-sz=64
 digest-sz=32
 
 [test_sw_aes_cbc_sha2_hmac]
-#test_skip="Y"
-total-ops=10000000
 devtype="crypto_aesni_mb"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -67,7 +193,6 @@ auth-key-sz=64
 digest-sz=16
 
 [test_qat_aes_gcm]
-#test_skip="Y"
 devtype="crypto_qat"
 optype="aead"
 aead-algo="aes-gcm"
@@ -78,9 +203,7 @@ aead-aad-sz=16
 digest-sz=16
 
 [test_sw_aes_gcm]
-#test_skip="Y"
 vdev="crypto_aesni_gcm_pmd_1"
-total-ops=10000000
 optype="aead"
 devtype="crypto_aesni_gcm"
 aead-algo="aes-gcm"
@@ -91,7 +214,6 @@ aead-aad-sz=16
 digest-sz=16
 
 [test_qat_kasumi]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="kasumi-f8"
 cipher-op="encrypt"
@@ -103,7 +225,6 @@ auth-key-sz=16
 digest-sz=4
 
 [test_sw_kasumi]
-#test_skip="Y"
 vdev="crypto_kasumi_1"
 total-ops=1000000
 devtype="crypto_kasumi"
@@ -117,7 +238,6 @@ auth-key-sz=16
 digest-sz=4
 
 [test_qat_snow3g]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="snow3g-uea2"
 cipher-op="encrypt"
@@ -130,7 +250,6 @@ auth-iv-sz=16
 digest-sz=4
 
 [test_sw_snow3g]
-#test_skip="Y"
 vdev="crypto_snow3g_1"
 total-ops=1000000
 devtype="crypto_snow3g"
@@ -145,7 +264,6 @@ auth-iv-sz=16
 digest-sz=4
 
 [test_qat_zuc]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="zuc-eea3"
 cipher-op="encrypt"
@@ -158,7 +276,6 @@ auth-iv-sz=16
 digest-sz=4
 
 [test_sw_zuc]
-#test_skip="Y"
 vdev="crypto_zuc_1"
 total-ops=1000000
 devtype="crypto_zuc"
-- 
2.17.2


^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [dts] [PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases
  2019-10-21  6:10 ` [dts] [PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases yaobing
@ 2019-10-21  7:40   ` Wan, Zhe
  2019-10-21  7:45   ` Yao, BingX Y
  1 sibling, 0 replies; 13+ messages in thread
From: Wan, Zhe @ 2019-10-21  7:40 UTC (permalink / raw)
  To: Yao, BingX Y, dts; +Cc: Yao, BingX Y

Acked-by: Wan, Zhe <zhe.wan@intel.com>




Thanks!
BR,
Wan,Zhe

-----Original Message-----
From: dts <dts-bounces@dpdk.org> On Behalf Of yaobing
Sent: 2019^[$BG/^[(B10^[$B7n^[(B21^[$BF|^[(B 14:10
To: dts@dpdk.org
Cc: Yao, BingX Y <bingx.y.yao@intel.com>
Subject: [dts] [PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases

add cases

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 tests/TestSuite_crypto_perf_cryptodev_perf.py | 107 ++++++++++++++++++
 1 file changed, 107 insertions(+)

diff --git a/tests/TestSuite_crypto_perf_cryptodev_perf.py b/tests/TestSuite_crypto_perf_cryptodev_perf.py
index 38b959f..6b0fffb 100644
--- a/tests/TestSuite_crypto_perf_cryptodev_perf.py
+++ b/tests/TestSuite_crypto_perf_cryptodev_perf.py
@@ -75,6 +75,10 @@ class PerfTestsCryptodev(TestCase):
             cc.build_dpdk_with_cryptodev(self)
 
         cc.bind_qat_device(self, "vfio-pci")
+        src_files = ['dep/test_aes_cbc.data', 'dep/test_aes_gcm.data']
+        self.dut_file_dir = '/tmp'
+        for file in src_files:
+            self.dut.session.copy_file_to(file, self.dut_file_dir)
 
     def tear_down_all(self):
         cc.clear_dpdk_config(self)
@@ -91,6 +95,109 @@ class PerfTestsCryptodev(TestCase):
     def tear_down(self):
         self.dut.kill_all()
 
+    def _run_func(self, eal_opt_str, crypto_func_opt_str, case_name):
+        cmd_str = cc.get_dpdk_app_cmd_str(self._app_path,
+                                          eal_opt_str,
+                                          crypto_func_opt_str)
+        self.logger.info(cmd_str)
+        try:
+            out = self.dut.send_expect(cmd_str+">%s/%s.txt" % (self.dut_file_dir, case_name), "#", 600)
+        except Exception as ex:
+            self.logger.error(ex)
+            raise ex
+        out = self.dut.send_expect("cat %s/%s.txt | grep fail" % (self.dut_file_dir, case_name), "#")
+        return out
+
+    def test_verify_aesni_mb(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_aesni_mb")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_verify_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_verify_openssl_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_openssl_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_verify_openssl(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_openssl")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_auth_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_auth_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_aead_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_aead_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_aesni_gcm(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_aesni_gcm")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_auth_aesni_mb(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str,crypto_func_opt_str,"test_latency_auth_aesni_mb")
+        self.verify(len(out) ==0 , "Test function failed")
+
+    def test_latency_aesni_mb(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str,crypto_func_opt_str,"test_latency_aesni_mb")
+        self.verify(len(out) ==0 , "Test function failed")
+
     def test_qat_aes_cbc_sha1_hmac(self):
         if cc.is_test_skip(self):
             return
-- 
2.17.2


^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [dts] [PATCH V1 1/4] add file to crypto_perf
  2019-10-21  7:39 ` [dts] [PATCH V1 1/4] add file to crypto_perf Wan, Zhe
@ 2019-10-21  7:42   ` Yao, BingX Y
  0 siblings, 0 replies; 13+ messages in thread
From: Yao, BingX Y @ 2019-10-21  7:42 UTC (permalink / raw)
  To: Wan, Zhe, dts

[-- Attachment #1: Type: text/plain, Size: 1893 bytes --]

Tested-by: Yao, BingX Y <bingx.y.yao@intel.com>

-----Original Message-----
From: Wan, Zhe 
Sent: Monday, October 21, 2019 3:39 PM
To: Yao, BingX Y <bingx.y.yao@intel.com>; dts@dpdk.org
Cc: Yao, BingX Y <bingx.y.yao@intel.com>
Subject: RE: [dts] [PATCH V1 1/4] add file to crypto_perf

Acked-by: Wan, Zhe <zhe.wan@intel.com>



Thanks!
BR,
Wan,Zhe

-----Original Message-----
From: dts <dts-bounces@dpdk.org> On Behalf Of yaobing
Sent: 2019^[$BG/^[(B10^[$B7n^[(B21^[$BF|^[(B 14:10
To: dts@dpdk.org
Cc: Yao, BingX Y <bingx.y.yao@intel.com>
Subject: [dts] [PATCH V1 1/4] add file to crypto_perf

add file to crypto_perf

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 dep/test_aes_gcm.data | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)
 create mode 100644 dep/test_aes_gcm.data

diff --git a/dep/test_aes_gcm.data b/dep/test_aes_gcm.data new file mode 100644 index 0000000..034f4fa
--- /dev/null
+++ b/dep/test_aes_gcm.data
@@ -0,0 +1,19 @@
+# Global Section
+plaintext =
+0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 
+0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 
+0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11
+
+ciphertext =
+0x82, 0x7d, 0xb6, 0xdf, 0x77, 0x0a, 0xe6, 0x45, 0x5a, 0xc3, 0x70, 0x9b, 
+0x27, 0xb2, 0x61, 0x19, 0xa2, 0x37, 0x0b, 0xf7, 0x42, 0xfc, 0xec, 0xe7, 
+0xf7, 0x30, 0xe0, 0x3c, 0x05, 0x55, 0xb3, 0x7d
+
+aead_key =
+0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 
+0x0C, 0x0D, 0x0E, 0x0F aead_iv = 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 
+0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B aead_aad = 0x00, 0x01, 0x02, 0x03, 
+0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
+
+[aes_gcm_buff_32]
+digest =
+0x0f, 0xb2, 0x98, 0x59, 0x48, 0xbf, 0x6c, 0x37, 0x5a, 0xad, 0xcd, 0x97, 
+0x9f, 0xbb, 0xc8, 0x2a
--
2.17.2


[-- Attachment #2: PerfTestsCryptodev.log --]
[-- Type: application/octet-stream, Size: 537595 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [dts] [PATCH V1 2/4] add file to crypto_perf
  2019-10-21  6:10 ` [dts] [PATCH V1 2/4] " yaobing
  2019-10-21  7:39   ` Wan, Zhe
@ 2019-10-21  7:44   ` Yao, BingX Y
  1 sibling, 0 replies; 13+ messages in thread
From: Yao, BingX Y @ 2019-10-21  7:44 UTC (permalink / raw)
  To: dts

[-- Attachment #1: Type: text/plain, Size: 2281 bytes --]

Tested-by: Yao, BingX Y <bingx.y.yao@intel.com>

-----Original Message-----
From: Yao, BingX Y 
Sent: Monday, October 21, 2019 2:10 PM
To: dts@dpdk.org
Cc: Yao, BingX Y <bingx.y.yao@intel.com>
Subject: [dts][PATCH V1 2/4] add file to crypto_perf

add file to crypto_perf

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 dep/test_aes_cbc.data | 27 +++++++++++++++++++++++++++
 1 file changed, 27 insertions(+)
 create mode 100644 dep/test_aes_cbc.data

diff --git a/dep/test_aes_cbc.data b/dep/test_aes_cbc.data new file mode 100644 index 0000000..c467da4
--- /dev/null
+++ b/dep/test_aes_cbc.data
@@ -0,0 +1,27 @@
+# Global Section
+plaintext =
+0xff, 0xca, 0xfb, 0xf1, 0x38, 0x20, 0x2f, 0x7b, 0x24, 0x98, 0x26, 0x7d, 
+0x1d, 0x9f, 0xb3, 0x93, 0xd9, 0xef, 0xbd, 0xad, 0x4e, 0x40, 0xbd, 0x60, 
+0xe9, 0x48, 0x59, 0x90, 0x67, 0xd7, 0x2b, 0x7b ciphertext = 0x77, 0xF9, 
+0xF7, 0x7A, 0xA3, 0xCB, 0x68, 0x1A, 0x11, 0x70, 0xD8, 0x7A, 0xB6, 0xE2, 
+0x37, 0x7E, 0xD1, 0x57, 0x1C, 0x8E, 0x85, 0xD8, 0x08, 0xBF, 0x57, 0x1F, 
+0x21, 0x6C, 0xAD, 0xAD, 0x47, 0x1E cipher_key = 0xE4, 0x23, 0x33, 0x8A, 
+0x35, 0x64, 0x61, 0xE2, 0x49, 0x03, 0xDD, 0xC6, 0xB8, 0xCA, 0x55, 0x7A, 
+0xd0, 0xe7, 0x4b, 0xfb, 0x5d, 0xe5, 0x0c, 0xe7, 0x6f, 0x21, 0xb5, 0x52, 
+0x2a, 0xbb, 0xc7, 0xf7 auth_key = 0xaf, 0x96, 0x42, 0xf1, 0x8c, 0x50, 
+0xdc, 0x67, 0x1a, 0x43, 0x47, 0x62, 0xc7, 0x04, 0xab, 0x05, 0xf5, 0x0c, 
+0xe7, 0xa2, 0xa6, 0x23, 0xd5, 0x3d, 0x95, 0xd8, 0xcd, 0x86, 0x79, 0xf5, 
+0x01, 0x47, 0x4f, 0xf9, 0x1d, 0x9d, 0x36, 0xf7, 0x68, 0x1a, 0x64, 0x44, 
+0x58, 0x5d, 0xe5, 0x81, 0x15, 0x2a, 0x41, 0xe4, 0x0e, 0xaa, 0x1f, 0x04, 
+0x21, 0xff, 0x2c, 0xf3, 0x73, 0x2b, 0x48, 0x1e, 0xd2, 0xf7 cipher_iv = 
+0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 
+0x0C, 0x0D, 0x0E, 0x0F # Section sha 1 hmac buff 32 [sha1_hmac_buff_32] 
+digest = 0x36, 0xCA, 0x49, 0x6A, 0xE3, 0x54, 0xD8, 0x4F, 0x0B, 0x76, 
+0xD8, 0xAA, 0x78, 0xEB, 0x9D, 0x65, 0x2C, 0xCA, 0x1F, 0x97 # Section 
+sha 256 hmac buff 32 [sha256_hmac_buff_32] digest = 0x1C, 0xB2, 0x3D, 
+0xD1, 0xF9, 0xC7, 0x6C, 0x49, 0x2E, 0xDA, 0x94, 0x8B, 0xF1, 0xCF, 0x96, 
+0x43, 0x67, 0x50, 0x39, 0x76, 0xB5, 0xA1, 0xCE, 0xA1, 0xD7, 0x77, 0x10, 
+0x07, 0x43, 0x37, 0x05, 0xB4
--
2.17.2


[-- Attachment #2: PerfTestsCryptodev.log --]
[-- Type: application/octet-stream, Size: 537595 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [dts] [PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases
  2019-10-21  6:10 ` [dts] [PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases yaobing
  2019-10-21  7:40   ` Wan, Zhe
@ 2019-10-21  7:45   ` Yao, BingX Y
  1 sibling, 0 replies; 13+ messages in thread
From: Yao, BingX Y @ 2019-10-21  7:45 UTC (permalink / raw)
  To: dts

[-- Attachment #1: Type: text/plain, Size: 5655 bytes --]

Tested-by: Yao, BingX Y <bingx.y.yao@intel.com>

-----Original Message-----
From: Yao, BingX Y 
Sent: Monday, October 21, 2019 2:10 PM
To: dts@dpdk.org
Cc: Yao, BingX Y <bingx.y.yao@intel.com>
Subject: [dts][PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases

add cases

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 tests/TestSuite_crypto_perf_cryptodev_perf.py | 107 ++++++++++++++++++
 1 file changed, 107 insertions(+)

diff --git a/tests/TestSuite_crypto_perf_cryptodev_perf.py b/tests/TestSuite_crypto_perf_cryptodev_perf.py
index 38b959f..6b0fffb 100644
--- a/tests/TestSuite_crypto_perf_cryptodev_perf.py
+++ b/tests/TestSuite_crypto_perf_cryptodev_perf.py
@@ -75,6 +75,10 @@ class PerfTestsCryptodev(TestCase):
             cc.build_dpdk_with_cryptodev(self)
 
         cc.bind_qat_device(self, "vfio-pci")
+        src_files = ['dep/test_aes_cbc.data', 'dep/test_aes_gcm.data']
+        self.dut_file_dir = '/tmp'
+        for file in src_files:
+            self.dut.session.copy_file_to(file, self.dut_file_dir)
 
     def tear_down_all(self):
         cc.clear_dpdk_config(self)
@@ -91,6 +95,109 @@ class PerfTestsCryptodev(TestCase):
     def tear_down(self):
         self.dut.kill_all()
 
+    def _run_func(self, eal_opt_str, crypto_func_opt_str, case_name):
+        cmd_str = cc.get_dpdk_app_cmd_str(self._app_path,
+                                          eal_opt_str,
+                                          crypto_func_opt_str)
+        self.logger.info(cmd_str)
+        try:
+            out = self.dut.send_expect(cmd_str+">%s/%s.txt" % (self.dut_file_dir, case_name), "#", 600)
+        except Exception as ex:
+            self.logger.error(ex)
+            raise ex
+        out = self.dut.send_expect("cat %s/%s.txt | grep fail" % (self.dut_file_dir, case_name), "#")
+        return out
+
+    def test_verify_aesni_mb(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_aesni_mb")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_verify_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_verify_openssl_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_openssl_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_verify_openssl(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_verify_openssl")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_auth_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_auth_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_aead_qat(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_aead_qat")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_aesni_gcm(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str, crypto_func_opt_str, "test_latency_aesni_gcm")
+        self.verify(len(out) == 0, "Test function failed")
+
+    def test_latency_auth_aesni_mb(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str,crypto_func_opt_str,"test_latency_auth_aesni_mb")
+        self.verify(len(out) ==0 , "Test function failed")
+
+    def test_latency_aesni_mb(self):
+        if cc.is_test_skip(self):
+            return
+
+        eal_opt_str = cc.get_eal_opt_str(self)
+        crypto_func_opt_str = self._get_crypto_perf_opt_str()
+        out = self._run_func(eal_opt_str,crypto_func_opt_str,"test_latency_aesni_mb")
+        self.verify(len(out) ==0 , "Test function failed")
+
     def test_qat_aes_cbc_sha1_hmac(self):
         if cc.is_test_skip(self):
             return
-- 
2.17.2


[-- Attachment #2: PerfTestsCryptodev.log --]
[-- Type: application/octet-stream, Size: 537595 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [dts] [PATCH V1 3/4] add config to crypto_perf
  2019-10-21  6:10 ` [dts] [PATCH V1 3/4] add config " yaobing
  2019-10-21  7:40   ` Wan, Zhe
@ 2019-10-21  7:45   ` Yao, BingX Y
  1 sibling, 0 replies; 13+ messages in thread
From: Yao, BingX Y @ 2019-10-21  7:45 UTC (permalink / raw)
  To: dts

[-- Attachment #1: Type: text/plain, Size: 5579 bytes --]

Tested-by: Yao, BingX Y <bingx.y.yao@intel.com>

-----Original Message-----
From: Yao, BingX Y 
Sent: Monday, October 21, 2019 2:10 PM
To: dts@dpdk.org
Cc: Yao, BingX Y <bingx.y.yao@intel.com>
Subject: [dts][PATCH V1 3/4] add config to crypto_perf

add config to crypto_perf

Signed-off-by: yaobing <bingx.y.yao@intel.com>
---
 conf/crypto_perf_cryptodev_perf.cfg | 149 +++++++++++++++++++++++++---
 1 file changed, 133 insertions(+), 16 deletions(-)

diff --git a/conf/crypto_perf_cryptodev_perf.cfg b/conf/crypto_perf_cryptodev_perf.cfg
index 4e57aba..90c4e4e 100644
--- a/conf/crypto_perf_cryptodev_perf.cfg
+++ b/conf/crypto_perf_cryptodev_perf.cfg
@@ -13,11 +13,142 @@ vdev="crypto_aesni_mb_pmd_1"
 
 total-ops=30000000
 buffer-sz="64,128,256,512,1024,2048"
-optype="cipher-then-auth"
 
+[test_verify_aesni_mb]
+buffer-sz=32
+ptest="verify"
+auth-key-sz=64
+cipher-key-sz=32
+devtype="crypto_aesni_mb"
+cipher-iv-sz=16
+auth-op="generate"
+digest-sz=12
+auth-algo="sha1-hmac"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+test-name="sha1_hmac_buff_32"
+test-file="/tmp/test_aes_cbc.data"
+
+[test_verify_qat]
+buffer-sz=32
+ptest="verify"
+auth-key-sz=64
+cipher-key-sz=32
+devtype="crypto_qat"
+cipher-iv-sz=16
+auth-op="generate"
+digest-sz=20
+auth-algo="sha1-hmac"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+test-name="sha1_hmac_buff_32"
+test-file="/tmp/test_aes_cbc.data"
+
+[test_verify_openssl_qat]
+l="9,10,11,12"
+vdev="crypto_openssl"
+devtype="crypto_openssl"
+aead-algo="aes-gcm"
+aead-key-sz=16
+aead-iv-sz=12
+aead-op="encrypt"
+aead-aad-sz=16
+digest-sz=16
+optype="aead"
+ptest="verify"
+buffer-sz=32
+test-name="aes_gcm_buff_32"
+test-file="/tmp/test_aes_gcm.data"
+
+[test_verify_openssl]
+l="9,10,11,12"
+vdev="crypto_openssl"
+devtype="crypto_openssl"
+aead-algo="aes-gcm"
+aead-key-sz=16
+aead-iv-sz=12
+aead-op="encrypt"
+aead-aad-sz=16
+digest-sz=16
+optype="aead"
+ptest="verify"
+buffer-sz=32
+test-name="aes_gcm_buff_32"
+test-file="/tmp/test_aes_gcm.data"
+
+[test_latency_qat]
+l="9,10,11,12"
+w="0000:1a:01.0  -w 0000:1a:01.1  -w 0000:1a:01.2"
+devtype="crypto_qat"
+cipher-algo="aes-cbc"
+cipher-key-sz=16
+cipher-iv-sz=16
+cipher-op="encrypt"
+optype="cipher-only"
+ptest="latency"
+
+[test_latency_auth_qat]
+l="9,10,11,12"
+w="0000:1a:01.0  -w 0000:1a:01.1  -w 0000:1a:01.2"
+ptest="latency"
+devtype="crypto_qat"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+cipher-key-sz=16
+auth-algo="sha1-hmac"
+auth-op="generate"
+auth-key-sz=64
+digest-sz=12
+silent=None
+
+[test_latency_aead_qat]
+aead-key-sz=16
+optype="aead"
+ptest="latency"
+aead-aad-sz=16
+devtype="crypto_qat"
+aead-op="encrypt"
+digest-sz=16
+aead-algo="aes-gcm"
+aead-iv-sz=12
+
+[test_latency_aesni_gcm]
+vdev="crypto_aesni_gcm_pmd_1"
+aead-key-sz=16
+optype="aead"
+ptest="latency"
+aead-aad-sz=16
+devtype="crypto_aesni_gcm"
+aead-op="encrypt"
+digest-sz=16
+aead-algo="aes-gcm"
+aead-iv-sz=12
+
+[test_latency_auth_aesni_mb]
+l="9,10,11,12"
+vdev="crypto_aesni_mb1 --vdev crypto_aesni_mb2"
+ptest="latency"
+devtype="crypto_aesni_mb"
+cipher-algo="aes-cbc"
+cipher-op="encrypt"
+cipher-key-sz=16
+auth-algo="sha1-hmac"
+auth-op="generate"
+auth-key-sz=64
+silent=None
+digest-sz=12
+
+[test_latency_aesni_mb]
+vdev="crypto_aesni_mb1 --vdev crypto_aesni_mb2"
+devtype="crypto_aesni_mb"
+cipher-algo="aes-cbc"
+cipher-key-sz=16
+cipher-iv-sz=16
+cipher-op="encrypt"
+optype="cipher-only"
+ptest="latency"
 
 [test_qat_aes_cbc_sha1_hmac]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -29,8 +160,6 @@ auth-key-sz=64
 digest-sz=20
 
 [test_sw_aes_cbc_sha1_hmac]
-#test_skip="Y"
-total-ops=10000000
 devtype="crypto_aesni_mb"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -42,7 +171,6 @@ auth-key-sz=64
 digest-sz=12
 
 [test_qat_aes_cbc_sha2_hmac]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -54,8 +182,6 @@ auth-key-sz=64
 digest-sz=32
 
 [test_sw_aes_cbc_sha2_hmac]
-#test_skip="Y"
-total-ops=10000000
 devtype="crypto_aesni_mb"
 cipher-algo="aes-cbc"
 cipher-op="encrypt"
@@ -67,7 +193,6 @@ auth-key-sz=64
 digest-sz=16
 
 [test_qat_aes_gcm]
-#test_skip="Y"
 devtype="crypto_qat"
 optype="aead"
 aead-algo="aes-gcm"
@@ -78,9 +203,7 @@ aead-aad-sz=16
 digest-sz=16
 
 [test_sw_aes_gcm]
-#test_skip="Y"
 vdev="crypto_aesni_gcm_pmd_1"
-total-ops=10000000
 optype="aead"
 devtype="crypto_aesni_gcm"
 aead-algo="aes-gcm"
@@ -91,7 +214,6 @@ aead-aad-sz=16
 digest-sz=16
 
 [test_qat_kasumi]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="kasumi-f8"
 cipher-op="encrypt"
@@ -103,7 +225,6 @@ auth-key-sz=16
 digest-sz=4
 
 [test_sw_kasumi]
-#test_skip="Y"
 vdev="crypto_kasumi_1"
 total-ops=1000000
 devtype="crypto_kasumi"
@@ -117,7 +238,6 @@ auth-key-sz=16
 digest-sz=4
 
 [test_qat_snow3g]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="snow3g-uea2"
 cipher-op="encrypt"
@@ -130,7 +250,6 @@ auth-iv-sz=16
 digest-sz=4
 
 [test_sw_snow3g]
-#test_skip="Y"
 vdev="crypto_snow3g_1"
 total-ops=1000000
 devtype="crypto_snow3g"
@@ -145,7 +264,6 @@ auth-iv-sz=16
 digest-sz=4
 
 [test_qat_zuc]
-#test_skip="Y"
 devtype="crypto_qat"
 cipher-algo="zuc-eea3"
 cipher-op="encrypt"
@@ -158,7 +276,6 @@ auth-iv-sz=16
 digest-sz=4
 
 [test_sw_zuc]
-#test_skip="Y"
 vdev="crypto_zuc_1"
 total-ops=1000000
 devtype="crypto_zuc"
-- 
2.17.2


[-- Attachment #2: PerfTestsCryptodev.log --]
[-- Type: application/octet-stream, Size: 537595 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [dts] [PATCH V1 1/4] add file to crypto_perf
  2019-10-21  6:10 [dts] [PATCH V1 1/4] add file to crypto_perf yaobing
                   ` (3 preceding siblings ...)
  2019-10-21  7:39 ` [dts] [PATCH V1 1/4] add file to crypto_perf Wan, Zhe
@ 2019-10-23  9:54 ` Tu, Lijuan
  4 siblings, 0 replies; 13+ messages in thread
From: Tu, Lijuan @ 2019-10-23  9:54 UTC (permalink / raw)
  To: Yao, BingX Y, dts; +Cc: Yao, BingX Y

Applied the series, thanks

> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of yaobing
> Sent: Monday, October 21, 2019 2:10 PM
> To: dts@dpdk.org
> Cc: Yao, BingX Y <bingx.y.yao@intel.com>
> Subject: [dts] [PATCH V1 1/4] add file to crypto_perf
> 
> add file to crypto_perf
> 
> Signed-off-by: yaobing <bingx.y.yao@intel.com>
> ---
>  dep/test_aes_gcm.data | 19 +++++++++++++++++++
>  1 file changed, 19 insertions(+)
>  create mode 100644 dep/test_aes_gcm.data
> 
> diff --git a/dep/test_aes_gcm.data b/dep/test_aes_gcm.data new file mode
> 100644 index 0000000..034f4fa
> --- /dev/null
> +++ b/dep/test_aes_gcm.data
> @@ -0,0 +1,19 @@
> +# Global Section
> +plaintext =
> +0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11,
> +0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11,
> +0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11
> +
> +ciphertext =
> +0x82, 0x7d, 0xb6, 0xdf, 0x77, 0x0a, 0xe6, 0x45, 0x5a, 0xc3, 0x70, 0x9b,
> +0x27, 0xb2, 0x61, 0x19, 0xa2, 0x37, 0x0b, 0xf7, 0x42, 0xfc, 0xec, 0xe7,
> +0xf7, 0x30, 0xe0, 0x3c, 0x05, 0x55, 0xb3, 0x7d
> +
> +aead_key =
> +0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B,
> +0x0C, 0x0D, 0x0E, 0x0F aead_iv = 0x00, 0x01, 0x02, 0x03, 0x04, 0x05,
> +0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B aead_aad = 0x00, 0x01, 0x02, 0x03,
> +0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
> +
> +[aes_gcm_buff_32]
> +digest =
> +0x0f, 0xb2, 0x98, 0x59, 0x48, 0xbf, 0x6c, 0x37, 0x5a, 0xad, 0xcd, 0x97,
> +0x9f, 0xbb, 0xc8, 0x2a
> --
> 2.17.2


^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, back to index

Thread overview: 13+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-10-21  6:10 [dts] [PATCH V1 1/4] add file to crypto_perf yaobing
2019-10-21  6:10 ` [dts] [PATCH V1 2/4] " yaobing
2019-10-21  7:39   ` Wan, Zhe
2019-10-21  7:44   ` Yao, BingX Y
2019-10-21  6:10 ` [dts] [PATCH V1 3/4] add config " yaobing
2019-10-21  7:40   ` Wan, Zhe
2019-10-21  7:45   ` Yao, BingX Y
2019-10-21  6:10 ` [dts] [PATCH V1 4/4] tests/TestSuite_crypto_perf_cryptodev_perf: add cases yaobing
2019-10-21  7:40   ` Wan, Zhe
2019-10-21  7:45   ` Yao, BingX Y
2019-10-21  7:39 ` [dts] [PATCH V1 1/4] add file to crypto_perf Wan, Zhe
2019-10-21  7:42   ` Yao, BingX Y
2019-10-23  9:54 ` Tu, Lijuan

test suite reviews and discussions

Archives are clonable:
	git clone --mirror http://inbox.dpdk.org/dts/0 dts/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 dts dts/ http://inbox.dpdk.org/dts \
		dts@dpdk.org
	public-inbox-index dts


Newsgroup available over NNTP:
	nntp://inbox.dpdk.org/inbox.dpdk.dts


AGPL code for this site: git clone https://public-inbox.org/ public-inbox