From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0079.outbound.protection.outlook.com [104.47.42.79]) by dpdk.org (Postfix) with ESMTP id D6A6D7EBB for ; Thu, 20 Apr 2017 07:45:15 +0200 (CEST) Received: from DM5PR03CA0009.namprd03.prod.outlook.com (10.175.104.19) by BY1PR0301MB1192.namprd03.prod.outlook.com (10.160.195.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1034.10; Thu, 20 Apr 2017 05:45:13 +0000 Received: from BL2FFO11FD032.protection.gbl (2a01:111:f400:7c09::191) by DM5PR03CA0009.outlook.office365.com (2603:10b6:3:118::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1034.10 via Frontend Transport; Thu, 20 Apr 2017 05:45:13 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BL2FFO11FD032.mail.protection.outlook.com (10.173.160.73) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1019.14 via Frontend Transport; Thu, 20 Apr 2017 05:45:12 +0000 Received: from bf-netperf1.ap.freescale.net (bf-netperf1.ap.freescale.net [10.232.134.28]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id v3K5iavj015982; Wed, 19 Apr 2017 22:45:10 -0700 From: To: CC: , , , Date: Thu, 20 Apr 2017 11:14:27 +0530 Message-ID: <1492667067-21968-14-git-send-email-akhil.goyal@nxp.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1492667067-21968-1-git-send-email-akhil.goyal@nxp.com> References: <1492616268-6307-1-git-send-email-akhil.goyal@nxp.com> <1492667067-21968-1-git-send-email-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131371407131667962; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39450400003)(39840400002)(39410400002)(39860400002)(39850400002)(39380400002)(39400400002)(2980300002)(1110001)(1109001)(339900001)(199003)(189002)(9170700003)(5003940100001)(2351001)(8656002)(54906002)(69596002)(86152003)(110136004)(106466001)(4326008)(38730400002)(77096006)(50466002)(76176999)(50986999)(6666003)(53936002)(48376002)(6916009)(105606002)(2950100002)(36756003)(104016004)(305945005)(50226002)(356003)(189998001)(2876002)(33646002)(47776003)(8936002)(2906002)(5660300001)(81166006)(86362001)(85426001)(8676002); DIR:OUT; SFP:1101; SCL:1; SRVR:BY1PR0301MB1192; H:az84smr01.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; A:1; MX:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BL2FFO11FD032; 1:8yUAeQW5p7xOowRmdQshjKMDyElnl7dX/SIBvd+fqvBWnI2d42/gS9ubByI+eDhDjzgxLYkED4aWQdmD0jYgr4+d+ByuGdjQRHXG3Cm2XRBX4Y/s+Ycznm9cTVaMK/s3+GITcMMD3PBCQd3InfuvNiGKe4CehdAqm5pnIw+pdKzgn7PKLSqHnKOoHx753N7OXViZWCcd/gbq3iBh6cDZ5Esa1X2zdbQRXcLTvZN15kFTrQz5RKUSyZafSWQshy2NCUFbOwqClm/QCdG562nMndRnvlQbSXg6EL7QDyTBZRdOK0JLETfViXbsGdyuJoTERfBFnmn6N6lcslyVfJteg10CYChNlBFjvCHo5iRQPio2PA060qegAKOP2qZ66WoCN6hffwqxJwXsPjPbOxrW4hG2gk+5PZdldbNLR+FWv/WXwitW51cYQCm9U+cQ48dVucUutzy2bNwH5wqtfLQIiI+2JjSKfuXjPVD5TOnrXmBE5OWzVmqAzwdyKpPkhSZia9gQ6FWyxJSTi+3VNgaYOxmigT0Gr9FEML3nWQuUFxfd7UJWKLEuoSAh8KBV1h4IuKRxpDqBmvPYTQsbwDqx8XCpPde/gV+4FSYTD8VB8kaI1cG5UmvKiyN54u3YDjRWPBfdxjaHdjiOaFSa7tmj3K/LdruJkVflnra1Ns6ovvKPR9Oz/OfT7ekzQcrwQkmwtkWL2WWLc1sEBzrcR6zbI0U2qoUjlGgoLmhKZmvjD8xTukjvqqcwVkccV/ebEq73TuT67i/S5Mn1v2Cap0qKiQ== MIME-Version: 1.0 Content-Type: text/plain X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 73bf5c09-8b60-4f6d-8c99-08d487b06a2e X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(201703131430075)(201703131517081); SRVR:BY1PR0301MB1192; X-Microsoft-Exchange-Diagnostics: 1; BY1PR0301MB1192; 3:bGo29WanE2BLuaxhIYdng1hDPxHzMbk7mI5pgjP5K83DKrPghkWJJ/voOavnrCtp7nGGqvYDEns4FYAHbRSgG58rpRrMIAvFO36G/NTXLTUDu/TEmpQNuX4yS6q7395fHuL3TNLBnfcGidn+5k2HpRiSBJ43SNcDz3Q0a8yV7+MRtYIc36KDTFzip4d+q3IO8Gssc7OYKU9r1J5pMxBnj4CPyCbIkwHOS+PHe/9TMw9pQJfVflvVWvdtbU4w4giNhWCkqx3fpxfAFTsjl0kFaV9dohrrGLxMknamwwPt1DpqAJEmzNIKIR0JnrYndoVaBAD0/KQq7vuNkPVy8X//ZPDocC+4eKDr9CJViMi7ZNGKfRTI3ZKuMZZOpDCgOQccvxm6LrIbRafCZeRnITM3jDCZ9LZs2yH4Qk9XXVQVF1s2ODKkBqeIZEFR04kb7FyN; 25:+s1PMNFtZhweJ3JNOg+5XYrJny79STRRxLeTwt0Q6EWHdJK/XPM9vtFrsVZ+C0GDsMX7xxBOV1OO3+XGcfbspsZqgI2FY8Bo7aXVYPj7CLheZqUi89OSHrkhuoZCVzlWVlR03EZPfTx2H6XfQZkRtdvxAEvfIOSQEzCQQ2rE1jM1FYTEZyIVHV68LCW05rg7LxvUB4QmnhFqaCu6B2mjLjPXq2fS38lyDW0k8Ztn5t/hD4ljH52v20Y4EgKTcGNg4vYaW7PVMrwmVFyGc/Xd/5N7bcc8G4hoWWNu9GFoVERuR2h2X7gc5n/BeboCnZgXsNYl4VPetvuE75qu83CJnJhrbVTA9Z6Ar03wzfpMJosMJkz1Vaa/8ryva1Pn/SsF5ZLnR5g70M07Isls66Oe5IsvitYb7JVT8hds6aOaFCdGoHJ4XOORPWfKlVz3HnrvpDspOnsUbxSmvmXryGwalg== X-Microsoft-Exchange-Diagnostics: 1; BY1PR0301MB1192; 31:HPSEZH8A8Bq+gB8DofE0X3+6eeg0QdGQnGvE39wQoKTYDK2WTw/dmbecmIcOjiHOfPfbQsUDdnZRbNzrsPc3kYmAeCJjjjMwuQRYOr6ZVetzWwnWOhTrU+83AVUcaFDdBTqVQPlJSOQD6HqejAnRUohoiGPIA0y1IRHbIIZ+qcsX5l7GEmEVL7OMkDUDmz7+QRwRhfF8VnFkMCl6g3kg70xCZ+JPnf8COSFhYH5nttGj4ZPOqdTXvFawnP85rziKpiFmHXo49uacgOKUuZxnKw== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095135)(601004)(2401047)(13023025)(13024025)(13018025)(13015025)(13017025)(8121501046)(5005006)(10201501046)(3002001)(93006095)(93001095)(6055026)(6096035)(201703131430075)(201703131433075)(201703131448075)(201703161259150)(20161123565025)(20161123556025)(20161123563025)(20161123561025); SRVR:BY1PR0301MB1192; BCL:0; PCL:0; RULEID:(400006); SRVR:BY1PR0301MB1192; X-Microsoft-Exchange-Diagnostics: 1; BY1PR0301MB1192; 4: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 X-Forefront-PRVS: 02830F0362 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY1PR0301MB1192; 23:+JnoySCIs44GIwF6wSIr6Rad4L0SW3xRIOUq37n?= =?us-ascii?Q?Z6vPVc35HRfd9+6k1GBe7S35EF8dL3vdBTMzsn8to2m+Nax3d2eFNw3rKTmq?= =?us-ascii?Q?IPEf8VRWH0ZZI7Ihs5hN71rsn1Q9zxoGCok9XSeM2qygcxs/mrOCkWgyWfpT?= =?us-ascii?Q?3od3E8HwVX62JSry2iuOibhuDCNHKEmJB6o4VcWitX46IXeSNhsThfMGchdN?= =?us-ascii?Q?4XU++UefgwWn9P6fsjRqJO/Y5MrbMi05P5UHT9otSgqk0Cqrxs1bxlmhSZJZ?= =?us-ascii?Q?4Gevss0+HBLxr405+ZypO/0vxk9/2WXkGDJzXMx+6cI1wL+D35vdR3SrkMNw?= =?us-ascii?Q?xhRRK1wo72Oy1P+31wxcCYcqCzuO6VuX0hmIJhVTF62vdBpmS4aCqXDIly8J?= =?us-ascii?Q?QyfNla88guJ2m0Hnx+NF/AJsG5qPQlfyo6m26TRT8efJCqkkyYaTj511zAfj?= =?us-ascii?Q?E650VH8J48CSWcPNCDpwP6lnyoPzJPnvbEauWO7egI5qMFcJy1sGfirO4ELa?= =?us-ascii?Q?h1polL9v3SfbYs/ZLvzi4zJXWHqJYEZBFFoE2VivXAylNnqocjaB7l1Rl2ym?= =?us-ascii?Q?Ii67VksXuPkFOgvLpdAiX7LfLwT2OzXG3J8dSJkCdMGZlh3z50TFl3sKcLHq?= =?us-ascii?Q?VRZz6/LUKsz4ooU6igU12hk7dwMIApJZOUC2wkwZF+7FVH+Cn3FF9lHqXhty?= =?us-ascii?Q?ZFYmjCsfV/t4WojKYH9D884ncgI/Es1sSCvVk9keo7jION4H8s/ieH9W2o9q?= =?us-ascii?Q?qhsOyS+Vx0PJf7jPR+LMUQzDjr0PHTqhfHiHDl1N5p4KGE4YAqbKyizPFA11?= =?us-ascii?Q?fyo7H9U6+nVEXqWLTmGSszPjZoQFoeJASJGEoavU1WVrJ7es/u1hfAiBdtSC?= =?us-ascii?Q?k7+70DGYn26IRQxchRnVikfnmknSOCgp8ZjB9O/D+aqZ9UTumaAGCj17oreB?= =?us-ascii?Q?qhV8+xf8+97NiYRJ1xVHrfU4UTie4zC6Z4BwG2gmrZjTWZjl7jf1ct3YJXW6?= =?us-ascii?Q?Up4NCds9TGtehaJ26hMlbA5/I3rEVK//YdFfuM/oHAV+q2tfcnqbwFB1E6H1?= =?us-ascii?Q?4h3DJeGH++VmF/J7PsBM77Fxbr4fxQ37JjVaN14XDPybaKxSaSuO0Ey8i/pY?= =?us-ascii?Q?drCUGdbqZ5Zdau1UrmWEUCAiF/QAWljmou16l44tlF/lYjNnqGo0RFA+FuEd?= =?us-ascii?Q?ubw60SwLp+SW4NDLnXqO6cOzfTR5GbjFCEQDN/g44KDPPJoUQGBzNqf/y4PH?= =?us-ascii?Q?ViQbgf87TpHeNUfsoLa5Fcwqm6MX/tG3FNpkYdWU+?= X-Microsoft-Exchange-Diagnostics: 1; BY1PR0301MB1192; 6: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; 5:7mXr0jIvRPByeghPcpeE3uko3l5bNabVHQy3AsICyaOpHVmtBwlQCCQrrBoRkNWtE4ecVhoJlykwJLjgZ8GY533JPJNs1erxU6IoT1P4sGdx87kqrRW72qcYQ45DyTsf1l6kJO1tCCl/3vdjpmRaSyFl8QYMdB9MqWsTPX7DLGC/mRSSHASvCGyq4R6Ka0Dg; 24:VK0nXfqQ24BdvpPsYfCkzJbuf3z5F8H+5r8i+kiEjA8V0zfWAXtrTSJTzbFvZ1N5whG6faupa3FXw5wnpWPLAePiXZwUkj9ptcjoTUbAEhY= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BY1PR0301MB1192; 7:S0NOl1isOm3hhIjg14ON79oSFtvJC5AtprNE9Rl9Io5zhrysSc4+RliYQdJSrH2dI0tkPxdBkxFNRK9TcBrlYbsTVxQKgc4OfMXsakGVIXerQT6Y+pTTJc5vpYsrOXxO22jdkcqKYUVo/Dgei5tIH6eXoBo+BgGv+KCUOu/O5FuOpuokPS6FJ0zYabg+w3BiEjRC2BWANEa5epxgY6gh7iKrpBovEqdGX16KoY6jV1msxkazMM0/bw7Soo+JzI0y3OvrQNNJuKbdUhJlkb0H8l7hTu8AYKjSGcTYYMkeHNmsEhjTPn8s7pD8ggl0DZvS1YziTJt6Xg1VZjWuPpZnow== X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Apr 2017 05:45:12.9327 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY1PR0301MB1192 Subject: [dpdk-dev] [PATCH v9 13/13] test/test: add dpaa2 sec crypto functional test X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 20 Apr 2017 05:45:17 -0000 From: Akhil Goyal Signed-off-by: Akhil Goyal Reviewed-by: Hemant Agrawal --- test/test/test_cryptodev.c | 105 +++++++++++++++++++++++++++++++++ test/test/test_cryptodev_blockcipher.c | 3 + test/test/test_cryptodev_blockcipher.h | 1 + 3 files changed, 109 insertions(+) diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c index 9f13171..42a7161 100644 --- a/test/test/test_cryptodev.c +++ b/test/test/test_cryptodev.c @@ -1711,6 +1711,38 @@ struct crypto_unittest_params { } static int +test_AES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_AES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_authonly_openssl_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -4700,6 +4732,38 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata) } static int +test_3DES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_3DES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_3DES_cipheronly_qat_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -8468,6 +8532,39 @@ struct test_crypto_vector { } }; +static struct unit_test_suite cryptodev_dpaa2_sec_testsuite = { + .suite_name = "Crypto DPAA2_SEC Unit Test Suite", + .setup = testsuite_setup, + .teardown = testsuite_teardown, + .unit_test_cases = { + TEST_CASE_ST(ut_setup, ut_teardown, + test_device_configure_invalid_dev_id), + TEST_CASE_ST(ut_setup, ut_teardown, + test_multi_session), + + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_cipheronly_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_cipheronly_dpaa2_sec_all), + + /** HMAC_MD5 Authentication */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_2), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_2), + + TEST_CASES_END() /**< NULL terminate unit test array */ + } +}; + static struct unit_test_suite cryptodev_null_testsuite = { .suite_name = "Crypto Device NULL Unit Test Suite", .setup = testsuite_setup, @@ -8591,6 +8688,13 @@ struct test_crypto_vector { #endif +static int +test_cryptodev_dpaa2_sec(void /*argv __rte_unused, int argc __rte_unused*/) +{ + gbl_cryptodev_type = RTE_CRYPTODEV_DPAA2_SEC_PMD; + return unit_test_suite_runner(&cryptodev_dpaa2_sec_testsuite); +} + REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat); REGISTER_TEST_COMMAND(cryptodev_aesni_mb_autotest, test_cryptodev_aesni_mb); REGISTER_TEST_COMMAND(cryptodev_openssl_autotest, test_cryptodev_openssl); @@ -8600,3 +8704,4 @@ struct test_crypto_vector { REGISTER_TEST_COMMAND(cryptodev_sw_kasumi_autotest, test_cryptodev_sw_kasumi); REGISTER_TEST_COMMAND(cryptodev_sw_zuc_autotest, test_cryptodev_sw_zuc); REGISTER_TEST_COMMAND(cryptodev_sw_armv8_autotest, test_cryptodev_armv8); +REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_autotest, test_cryptodev_dpaa2_sec); diff --git a/test/test/test_cryptodev_blockcipher.c b/test/test/test_cryptodev_blockcipher.c index 9d6ebd6..603c776 100644 --- a/test/test/test_cryptodev_blockcipher.c +++ b/test/test/test_cryptodev_blockcipher.c @@ -663,6 +663,9 @@ case RTE_CRYPTODEV_SCHEDULER_PMD: target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER; break; + case RTE_CRYPTODEV_DPAA2_SEC_PMD: + target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC; + break; default: TEST_ASSERT(0, "Unrecognized cryptodev type"); break; diff --git a/test/test/test_cryptodev_blockcipher.h b/test/test/test_cryptodev_blockcipher.h index 389558a..004122f 100644 --- a/test/test/test_cryptodev_blockcipher.h +++ b/test/test/test_cryptodev_blockcipher.h @@ -52,6 +52,7 @@ #define BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL 0x0004 /* SW OPENSSL flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 0x0008 /* ARMv8 flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER 0x0010 /* Scheduler */ +#define BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC 0x0020 /* DPAA2_SEC flag */ #define BLOCKCIPHER_TEST_OP_CIPHER (BLOCKCIPHER_TEST_OP_ENCRYPT | \ BLOCKCIPHER_TEST_OP_DECRYPT) -- 1.9.1