From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-cys01nam02on0079.outbound.protection.outlook.com [104.47.37.79]) by dpdk.org (Postfix) with ESMTP id 466CA58D1 for ; Wed, 19 Apr 2017 17:38:12 +0200 (CEST) Received: from BN3PR0301CA0040.namprd03.prod.outlook.com (10.160.180.178) by SN2PR03MB2287.namprd03.prod.outlook.com (10.166.210.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1034.10; Wed, 19 Apr 2017 15:38:11 +0000 Received: from BN1BFFO11FD004.protection.gbl (2a01:111:f400:7c10::1:141) by BN3PR0301CA0040.outlook.office365.com (2a01:111:e400:4000::50) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1047.13 via Frontend Transport; Wed, 19 Apr 2017 15:38:11 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1BFFO11FD004.mail.protection.outlook.com (10.58.144.67) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1019.14 via Frontend Transport; Wed, 19 Apr 2017 15:38:11 +0000 Received: from bf-netperf1.ap.freescale.net (bf-netperf1.ap.freescale.net [10.232.134.28]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v3JFbvDS023764; Wed, 19 Apr 2017 08:38:09 -0700 From: To: CC: , , Date: Wed, 19 Apr 2017 21:07:40 +0530 Message-ID: <1492616268-6307-6-git-send-email-akhil.goyal@nxp.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1492616268-6307-1-git-send-email-akhil.goyal@nxp.com> References: <20170410123108.26305-1-akhil.goyal@nxp.com> <1492616268-6307-1-git-send-email-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131370898912713819; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39860400002)(39400400002)(39840400002)(39850400002)(39410400002)(39380400002)(39450400003)(2980300002)(1109001)(1110001)(339900001)(189002)(199003)(9170700003)(2906002)(2876002)(4326008)(6916009)(81166006)(6666003)(2950100002)(85426001)(104016004)(86362001)(8676002)(356003)(8936002)(50226002)(5003940100001)(38730400002)(110136004)(47776003)(189998001)(54906002)(36756003)(53936002)(86152003)(48376002)(105606002)(106466001)(50466002)(8656002)(305945005)(50986999)(2351001)(76176999)(5660300001)(77096006)(33646002); DIR:OUT; SFP:1101; SCL:1; SRVR:SN2PR03MB2287; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; MX:1; A:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1BFFO11FD004; 1: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 MIME-Version: 1.0 Content-Type: text/plain X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 380f949e-28ec-4f8c-bafa-08d4873a15f8 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(201703131430075)(201703131517081); SRVR:SN2PR03MB2287; X-Microsoft-Exchange-Diagnostics: 1; SN2PR03MB2287; 3:7jFgB+s/kCYACPwVIVQhwK4UlDyGi+TWcvSwW1+oeqEN1h86N6vYFPQf1DWe3CLnBtq1Hsy2f+zguK+DkK+6C4P8gEW/FDzlMaofoqzby+QI68If1Og+J1DU7W+C81Epq4ebaYiRmQvq+xX2w3uuUP8cM8IPxLuRRyBPfg2E+VOMG44e7OX5o7wCuYC4D4OSIyXO7yemA83DMnJ7HU2zGY6XMrqhqW+m1wPeZcVH905IIMNqWrO5goaHIJxKE7APcBclVr8zh7WFUfQK3gDr83dM3XlFD357XkaTHC1NxI+WO1mKGwm9jg8F+mHWyQfumpJ3QxiC5wdtOpThr5r8iyYKxNWugedOGsFke234bnlULD1sXllSgRy9uE9F3c4aRlLslQkterI5hFW2pXpTYP8xcdTMpfAEjN50fq8ZunVwk+xeQPX4Iu4hgmplq0ci; 25:+Au+CA7eENvnkpTv+h8bqjCUeJKjB5kWDrdV6JFse1qBfVgRZN7ZhLRwcdX3VINLTn2AeFb7D4Xl6PLFBN+HDI7ejD32+vveIL6pZbjVAT1P3H6gwsuR18ymZk/Kp0Uy3DcOFyibJKAXh9S25mXkdok/2byMLFCsYV1jB/dkkCdSzhLfkJ3KdQxe3MFgSgCQDQzXCWgV8G3Lrn2/+TtnkPoJGXqb1nvZEqYrDJtgbcEG7PckHcYwoN1PYbRHdjajsQoa7IFFRtcVKG/Qf3Q6OFGOFzxkQeMUxdpfQ4TUnWMcmxX9pF7DvV//fCc4wanDBTstEH1SUKCzveSHSfzFp1mGueqmZq71VNKzOwEQzvi9Ja90WWHKuyFnj/MLyGoq9z8SoSyhcLBNe3mLVnpe44READWyeixtbWsx6h1z5KDgdnunP7jnWMIQhgTjnpEpabY+irjnOlbKdIVHmyKaWA== X-Microsoft-Exchange-Diagnostics: 1; SN2PR03MB2287; 31:Bz/YFgujnBdLUjxKLkeyQ7HaU9FsvmNmqzpw1nhRuAmur0zD3wqg1Vi7UAyhqJbEL3eaptAKuBFEdmfUlrwzI0fcJm1tnxzsk/kIdHdsTb0lmIw9QnZVq3RTAx1suQ8hP8LnIWLMBMF+9Hw0mA2unmKWvlq5wF9Xb177ZQYwFctskc6e+Xb605jjCN/gYqghkj1JsQP9kcabLW+Ztr/XR1H9UMfa3pc1vk2WxDqyJ+SKKAShww1gXvZgqXczvxQbMagfpHsn9jrYWMm6yVFOPQ== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095135)(601004)(2401047)(13023025)(13018025)(13024025)(8121501046)(13017025)(13015025)(5005006)(93006095)(93001095)(3002001)(10201501046)(6055026)(6096035)(201703131430075)(201703131433075)(201703131448075)(201703161259150)(20161123565025)(20161123556025)(20161123563025)(20161123561025); SRVR:SN2PR03MB2287; BCL:0; PCL:0; RULEID:(400006); SRVR:SN2PR03MB2287; X-Microsoft-Exchange-Diagnostics: 1; SN2PR03MB2287; 4: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 X-Forefront-PRVS: 028256169F X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN2PR03MB2287; 23:wW/PGnvtGUEdFGrO713zNx/g0p7nKXRuUWZatm04A?= =?us-ascii?Q?oniKR8m8+RZ3w4SZp9Q7jpBw7dRNovJ/YnRevQlr4w3TNbyCEmLclre2/nUg?= =?us-ascii?Q?ihODUeDbQ6iRq2VhFAKY7ClsDwyloaGzls7ByS8/egdevpwhy92y2vIvf5aP?= =?us-ascii?Q?jZru3Wwbyjt3kwXx3A0FggXys+94LoZG9QGfWnKXIUx9r1P++ZkjscqlUeaR?= =?us-ascii?Q?lFUB3+8F5001qHTwHLqU6IxPGMH+STCWvcUysPAKzk7CMCxMZC4Rd7J8ZsYl?= =?us-ascii?Q?frC/0vzNCSX5Jq6GGPaEHFxf+hBBL/FSGgY6+qrsaSmOA+1kkyNOYFmfgFmL?= =?us-ascii?Q?+wjTEFEs2ai8xvaDFS+XNQfHRSVF7sYSf+zI0AicJmgws8PbSSq+uXjo94QW?= =?us-ascii?Q?hbLgUCTQO0JW8rE/SWGLiuJAX7fvX8iyEyW7LdAAFb8/rvM1RZd0MFL5eMke?= =?us-ascii?Q?/plhvQGeoqbLzuI6RoC6H8lr1BXJLBUueFKf/ZoiQJwPCSuDIb5Zxd53FsNy?= =?us-ascii?Q?e3Qv4eyfMBEDzPPz2agudWDIX7N6SPhFCQ36SUSXgvAN5gpTwiGDZ7xK3l0Z?= =?us-ascii?Q?5QPlXkV5HDmEpcuphO+XrP2ffE1PJOJVku7eXnZd5wvhp/YJXbeWL7j/cgWa?= =?us-ascii?Q?62fLWt6UstpEjOOvPHtHBAw9GysrHQR9hxV/barZqRkQPVIcOxFOlrgNnanY?= =?us-ascii?Q?5FMGRsdKRk0uSe9q5JSVfHWJoPc+GvmAxMra31TzxOieGByHZKeWF4QLpGcg?= =?us-ascii?Q?uxOvWdWHpoSYK/eVccXt9+1FYke0c5I0CpLj5o5sv2N3XkO3dnDmNIK5Gfxz?= =?us-ascii?Q?0o44QD597BJVC2YH++iVmCiWNZhhk1dNmw+k0lhMR51r1hoUKpOWL057kKJF?= =?us-ascii?Q?pRpyRbhICG2qmMIzYExOSZzaFgje7bpO6UfudLpXpZvxvZ6yk7VXqggweJy+?= =?us-ascii?Q?L5ILgcpxFE/95CoPgh7l5Lnjglsf8njh9hm/cKaN5iZ87sUeUdX4cH37JPAj?= =?us-ascii?Q?s7on8uuX0aufYHebq1rVhnmdkX/0YuL5fqFyahXqq9uFuUS2w9nbwtyLPQol?= =?us-ascii?Q?Z4q3QbVVgRexnp7OJnyA/10nQH43mKPHiohWo2GUtlwBmhgNgzU9oFTxHmN+?= =?us-ascii?Q?WQgOXl2Le20LRU/kfp3QmbvjSL5JjuGjeBMz6h+O/sTUnN3xmHLT45F4xuAK?= =?us-ascii?Q?xTpAor6XQm7ga1Ux2HBPM3oX0OSXfRYItfJrCyUbhIoXTDYQR5LVTWO/aR4P?= =?us-ascii?Q?Hqr861WBKySvOP8EEU=3D?= X-Microsoft-Exchange-Diagnostics: 1; SN2PR03MB2287; 6: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; 5:mvMNrNDNCopQduc5Cem/iCYUVQ7oO81kbI2vQzDM4pWJlWRJRKr7PoqBfAbIr5kuq2h2DvgtUfR5y8K8QsPeKb5ruCvSqrpdjwYsQk1DRxXTRfPuXNukcLE5v+N8+6zoCspYvX2koApINUoFicnKCXS1uUJddz+uhTYbtdIAk9o0g2AWjSk+T7QltYKIdNSw; 24:t4G1yH29I2nh8IbGpCO7yil/E46/hyt594ac6VmKgV9QQkJVqZgtSmRl0c6pcFaH+BpTfevTeAps4OUHtiYoktxSaUhJhVtz6l1EEg0kUJg= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; SN2PR03MB2287; 7:axdwQf9rz+HRJ4Vw1WVMcZCR9ILZh8d3A/JZGClGEK/Y7PMUmsbuAKJYDg8o0w5Dso5Z8XN1b07mbMU20zfEjDXMIpLlDVIdjqcGT+r6ZdIGJsz/xxHrN/79VHl3tTsWy4GPZOlaM/GSs9EIeajo5kYl/FIbrXoiZHmTX2HZ9zMRHro9OtHFURi3WBrtaUwWP4RSqEE0UFmlFvmdiFHperX5touumUejp/IECeQKQI1qlq2f+Oz21IP4VKXid2pLIPECGv0nPnQ7pSq4k1vLtUmYLKtstQUFqZ8QG4MItJIGqHqgPo5zUkuDqkdITldWu+9OalJfoTD1SfTJM8GJXQ== X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Apr 2017 15:38:11.0841 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN2PR03MB2287 Subject: [dpdk-dev] [PATCH v8 05/13] test/test: add dpaa2 sec crypto functional test X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Apr 2017 15:38:14 -0000 From: Akhil Goyal Signed-off-by: Akhil Goyal Reviewed-by: Hemant Agrawal --- test/test/test_cryptodev.c | 105 +++++++++++++++++++++++++++++++++ test/test/test_cryptodev_blockcipher.c | 3 + test/test/test_cryptodev_blockcipher.h | 1 + 3 files changed, 109 insertions(+) diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c index 9f13171..42a7161 100644 --- a/test/test/test_cryptodev.c +++ b/test/test/test_cryptodev.c @@ -1711,6 +1711,38 @@ struct crypto_unittest_params { } static int +test_AES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_AES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_authonly_openssl_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -4700,6 +4732,38 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata) } static int +test_3DES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_3DES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_3DES_cipheronly_qat_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -8468,6 +8532,39 @@ struct test_crypto_vector { } }; +static struct unit_test_suite cryptodev_dpaa2_sec_testsuite = { + .suite_name = "Crypto DPAA2_SEC Unit Test Suite", + .setup = testsuite_setup, + .teardown = testsuite_teardown, + .unit_test_cases = { + TEST_CASE_ST(ut_setup, ut_teardown, + test_device_configure_invalid_dev_id), + TEST_CASE_ST(ut_setup, ut_teardown, + test_multi_session), + + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_cipheronly_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_cipheronly_dpaa2_sec_all), + + /** HMAC_MD5 Authentication */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_2), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_2), + + TEST_CASES_END() /**< NULL terminate unit test array */ + } +}; + static struct unit_test_suite cryptodev_null_testsuite = { .suite_name = "Crypto Device NULL Unit Test Suite", .setup = testsuite_setup, @@ -8591,6 +8688,13 @@ struct test_crypto_vector { #endif +static int +test_cryptodev_dpaa2_sec(void /*argv __rte_unused, int argc __rte_unused*/) +{ + gbl_cryptodev_type = RTE_CRYPTODEV_DPAA2_SEC_PMD; + return unit_test_suite_runner(&cryptodev_dpaa2_sec_testsuite); +} + REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat); REGISTER_TEST_COMMAND(cryptodev_aesni_mb_autotest, test_cryptodev_aesni_mb); REGISTER_TEST_COMMAND(cryptodev_openssl_autotest, test_cryptodev_openssl); @@ -8600,3 +8704,4 @@ struct test_crypto_vector { REGISTER_TEST_COMMAND(cryptodev_sw_kasumi_autotest, test_cryptodev_sw_kasumi); REGISTER_TEST_COMMAND(cryptodev_sw_zuc_autotest, test_cryptodev_sw_zuc); REGISTER_TEST_COMMAND(cryptodev_sw_armv8_autotest, test_cryptodev_armv8); +REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_autotest, test_cryptodev_dpaa2_sec); diff --git a/test/test/test_cryptodev_blockcipher.c b/test/test/test_cryptodev_blockcipher.c index 9d6ebd6..603c776 100644 --- a/test/test/test_cryptodev_blockcipher.c +++ b/test/test/test_cryptodev_blockcipher.c @@ -663,6 +663,9 @@ case RTE_CRYPTODEV_SCHEDULER_PMD: target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER; break; + case RTE_CRYPTODEV_DPAA2_SEC_PMD: + target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC; + break; default: TEST_ASSERT(0, "Unrecognized cryptodev type"); break; diff --git a/test/test/test_cryptodev_blockcipher.h b/test/test/test_cryptodev_blockcipher.h index 389558a..004122f 100644 --- a/test/test/test_cryptodev_blockcipher.h +++ b/test/test/test_cryptodev_blockcipher.h @@ -52,6 +52,7 @@ #define BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL 0x0004 /* SW OPENSSL flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 0x0008 /* ARMv8 flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER 0x0010 /* Scheduler */ +#define BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC 0x0020 /* DPAA2_SEC flag */ #define BLOCKCIPHER_TEST_OP_CIPHER (BLOCKCIPHER_TEST_OP_ENCRYPT | \ BLOCKCIPHER_TEST_OP_DECRYPT) -- 1.9.1