automatic DPDK test reports
 help / color / mirror / Atom feed
* |WARNING| pw121577-121579 [PATCH] [3/3] crypto/cnxk: add support for SHAKE hash
@ 2023-01-04 14:57 dpdklab
  0 siblings, 0 replies; only message in thread
From: dpdklab @ 2023-01-04 14:57 UTC (permalink / raw)
  To: test-report; +Cc: dpdk-test-reports

[-- Attachment #1: Type: text/plain, Size: 6482 bytes --]

Test-Label: iol-testing
Test-Status: WARNING
http://dpdk.org/patch/121577

_apply patch failure_

Submitter: Volodymyr Fialko <vfialko@marvell.com>
Date: Wednesday, January 04 2023 14:38:15 
Applied on: CommitID:373f4c7de8ff350548cacc3d56e788461677f2c7
Apply patch set 121577-121579 failed:

Checking patch app/test/test_cryptodev_hash_test_vectors.h...
Hunk #1 succeeded at 332 (offset -206 lines).
error: while searching for:
		.test_data = &hmac_sha3_512_test_vector,
		.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
	},
	{
		.test_descr = "CMAC Digest 12B",
		.test_data = &cmac_test_vector_12,

error: patch failed: app/test/test_cryptodev_hash_test_vectors.h:853
Applying patch app/test/test_cryptodev_hash_test_vectors.h with 1 reject...
Hunk #1 applied cleanly.
Rejected hunk #2.
diff a/app/test/test_cryptodev_hash_test_vectors.h b/app/test/test_cryptodev_hash_test_vectors.h	(rejected hunks)
@@ -853,6 +899,26 @@ static const struct blockcipher_test_case hash_test_cases[] = {
 		.test_data = &hmac_sha3_512_test_vector,
 		.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
 	},
+	{
+		.test_descr = "SHAKE_128 Digest",
+		.test_data = &shake_128_test_vector,
+		.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,
+	},
+	{
+		.test_descr = "SHAKE_128 Digest Verify",
+		.test_data = &shake_128_test_vector,
+		.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
+	},
+	{
+		.test_descr = "SHAKE_256 Digest",
+		.test_data = &shake_256_test_vector,
+		.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,
+	},
+	{
+		.test_descr = "SHAKE_256 Digest Verify",
+		.test_data = &shake_256_test_vector,
+		.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
+	},
 	{
 		.test_descr = "CMAC Digest 12B",
 		.test_data = &cmac_test_vector_12,
Checking patch doc/guides/cryptodevs/cnxk.rst...
error: while searching for:
* ``RTE_CRYPTO_AUTH_SHA3_384_HMAC``
* ``RTE_CRYPTO_AUTH_SHA3_512``
* ``RTE_CRYPTO_AUTH_SHA3_512_HMAC``
* ``RTE_CRYPTO_AUTH_SNOW3G_UIA2``
* ``RTE_CRYPTO_AUTH_ZUC_EIA3``
* ``RTE_CRYPTO_AUTH_AES_CMAC``

error: patch failed: doc/guides/cryptodevs/cnxk.rst:67
Checking patch doc/guides/cryptodevs/features/cn10k.ini...
error: while searching for:
SHA3_384 HMAC   = Y
SHA3_512        = Y
SHA3_512 HMAC   = Y

;
; Supported AEAD algorithms of 'cn10k' crypto driver.

error: patch failed: doc/guides/cryptodevs/features/cn10k.ini:71
Checking patch doc/guides/cryptodevs/features/cn9k.ini...
error: while searching for:
SHA3_384 HMAC   = Y
SHA3_512        = Y
SHA3_512 HMAC   = Y

;
; Supported AEAD algorithms of 'cn9k' crypto driver.

error: patch failed: doc/guides/cryptodevs/features/cn9k.ini:72
Checking patch drivers/common/cnxk/roc_se.h...
Checking patch drivers/crypto/cnxk/cnxk_cryptodev.h...
error: while searching for:

#include "roc_cpt.h"

#define CNXK_CPT_MAX_CAPS	 45
#define CNXK_SEC_CRYPTO_MAX_CAPS 16
#define CNXK_SEC_MAX_CAPS	 9
#define CNXK_AE_EC_ID_MAX	 8

error: patch failed: drivers/crypto/cnxk/cnxk_cryptodev.h:10
Checking patch drivers/crypto/cnxk/cnxk_cryptodev_capabilities.c...
Hunk #1 succeeded at 335 (offset -163 lines).
Checking patch drivers/crypto/cnxk/cnxk_se.h...
error: while searching for:
	case RTE_CRYPTO_AUTH_SHA3_512_HMAC:
		ret = (mac_len <= 64) ? 0 : -1;
		break;
	case RTE_CRYPTO_AUTH_NULL:
		ret = 0;
		break;

error: patch failed: drivers/crypto/cnxk/cnxk_se.h:183
error: while searching for:
		is_sha3 = 1;
		auth_type = ROC_SE_SHA3_SHA512;
		break;
	case RTE_CRYPTO_AUTH_MD5_HMAC:
	case RTE_CRYPTO_AUTH_MD5:
		auth_type = ROC_SE_MD5_TYPE;

error: patch failed: drivers/crypto/cnxk/cnxk_se.h:2204
Applying patch doc/guides/cryptodevs/cnxk.rst with 1 reject...
Rejected hunk #1.
Applying patch doc/guides/cryptodevs/features/cn10k.ini with 1 reject...
Rejected hunk #1.
Applying patch doc/guides/cryptodevs/features/cn9k.ini with 1 reject...
Rejected hunk #1.
Applied patch drivers/common/cnxk/roc_se.h cleanly.
Applying patch drivers/crypto/cnxk/cnxk_cryptodev.h with 1 reject...
Rejected hunk #1.
Applied patch drivers/crypto/cnxk/cnxk_cryptodev_capabilities.c cleanly.
Applying patch drivers/crypto/cnxk/cnxk_se.h with 2 rejects...
Rejected hunk #1.
Rejected hunk #2.
diff a/doc/guides/cryptodevs/cnxk.rst b/doc/guides/cryptodevs/cnxk.rst	(rejected hunks)
@@ -67,6 +67,8 @@ Hash algorithms:
 * ``RTE_CRYPTO_AUTH_SHA3_384_HMAC``
 * ``RTE_CRYPTO_AUTH_SHA3_512``
 * ``RTE_CRYPTO_AUTH_SHA3_512_HMAC``
+* ``RTE_CRYPTO_AUTH_SHAKE_128``
+* ``RTE_CRYPTO_AUTH_SHAKE_256``
 * ``RTE_CRYPTO_AUTH_SNOW3G_UIA2``
 * ``RTE_CRYPTO_AUTH_ZUC_EIA3``
 * ``RTE_CRYPTO_AUTH_AES_CMAC``
diff a/doc/guides/cryptodevs/features/cn10k.ini b/doc/guides/cryptodevs/features/cn10k.ini	(rejected hunks)
@@ -71,6 +71,8 @@ SHA3_384        = Y
 SHA3_384 HMAC   = Y
 SHA3_512        = Y
 SHA3_512 HMAC   = Y
+SHAKE_128       = Y
+SHAKE_256       = Y
 
 ;
 ; Supported AEAD algorithms of 'cn10k' crypto driver.
diff a/doc/guides/cryptodevs/features/cn9k.ini b/doc/guides/cryptodevs/features/cn9k.ini	(rejected hunks)
@@ -72,6 +72,8 @@ SHA3_384        = Y
 SHA3_384 HMAC   = Y
 SHA3_512        = Y
 SHA3_512 HMAC   = Y
+SHAKE_128       = Y
+SHAKE_256       = Y
 
 ;
 ; Supported AEAD algorithms of 'cn9k' crypto driver.
diff a/drivers/crypto/cnxk/cnxk_cryptodev.h b/drivers/crypto/cnxk/cnxk_cryptodev.h	(rejected hunks)
@@ -10,7 +10,7 @@
 
 #include "roc_cpt.h"
 
-#define CNXK_CPT_MAX_CAPS	 45
+#define CNXK_CPT_MAX_CAPS	 47
 #define CNXK_SEC_CRYPTO_MAX_CAPS 16
 #define CNXK_SEC_MAX_CAPS	 9
 #define CNXK_AE_EC_ID_MAX	 8
diff a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk_se.h	(rejected hunks)
@@ -183,6 +183,13 @@ cpt_mac_len_verify(struct rte_crypto_auth_xform *auth)
 	case RTE_CRYPTO_AUTH_SHA3_512_HMAC:
 		ret = (mac_len <= 64) ? 0 : -1;
 		break;
+	/* SHAKE itself doesn't have limitation of digest length,
+	 * but in microcode size of length field is limited to 8 bits
+	 */
+	case RTE_CRYPTO_AUTH_SHAKE_128:
+	case RTE_CRYPTO_AUTH_SHAKE_256:
+		ret = (mac_len <= UINT8_MAX) ? 0 : -1;
+		break;
 	case RTE_CRYPTO_AUTH_NULL:
 		ret = 0;
 		break;
@@ -2204,6 +2211,14 @@ fill_sess_auth(struct rte_crypto_sym_xform *xform, struct cnxk_se_sess *sess)
 		is_sha3 = 1;
 		auth_type = ROC_SE_SHA3_SHA512;
 		break;
+	case RTE_CRYPTO_AUTH_SHAKE_128:
+		is_sha3 = 1;
+		auth_type = ROC_SE_SHA3_SHAKE128;
+		break;
+	case RTE_CRYPTO_AUTH_SHAKE_256:
+		is_sha3 = 1;
+		auth_type = ROC_SE_SHA3_SHAKE256;
+		break;
 	case RTE_CRYPTO_AUTH_MD5_HMAC:
 	case RTE_CRYPTO_AUTH_MD5:
 		auth_type = ROC_SE_MD5_TYPE;

https://lab.dpdk.org/results/dashboard/patchsets/24884/

UNH-IOL DPDK Community Lab

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2023-01-04 14:57 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-01-04 14:57 |WARNING| pw121577-121579 [PATCH] [3/3] crypto/cnxk: add support for SHAKE hash dpdklab

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).