From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0045.outbound.protection.outlook.com [104.47.32.45]) by dpdk.org (Postfix) with ESMTP id AF3313238 for ; Fri, 20 Jan 2017 09:40:00 +0100 (CET) Received: from DM5PR03CA0024.namprd03.prod.outlook.com (10.175.104.34) by BN6PR03MB2467.namprd03.prod.outlook.com (10.168.223.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.860.13; Fri, 20 Jan 2017 08:39:59 +0000 Received: from BN1BFFO11FD001.protection.gbl (2a01:111:f400:7c10::1:155) by DM5PR03CA0024.outlook.office365.com (2603:10b6:3:118::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.860.13 via Frontend Transport; Fri, 20 Jan 2017 08:39:58 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com;nxp.com; dkim=none (message not signed) header.d=none; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1BFFO11FD001.mail.protection.outlook.com (10.58.144.64) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.803.8 via Frontend Transport; Fri, 20 Jan 2017 08:39:57 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v0K8dNVH021447; Fri, 20 Jan 2017 01:39:55 -0700 From: To: CC: , , , , , Akhil Goyal Date: Fri, 20 Jan 2017 19:35:09 +0530 Message-ID: <20170120140509.4495-11-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20170120140509.4495-1-akhil.goyal@nxp.com> References: <20161222201700.20020-1-akhil.goyal@nxp.com> <20170120140509.4495-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131293751978081929; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(7916002)(336005)(39840400002)(39410400002)(39400400002)(39860400002)(39380400002)(39850400002)(39450400003)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(5660300001)(85426001)(92566002)(86152003)(97736004)(50466002)(48376002)(33646002)(189998001)(305945005)(47776003)(5003940100001)(104016004)(86362001)(8656002)(575784001)(53936002)(106466001)(2351001)(54906002)(105606002)(81166006)(38730400001)(6666003)(6916009)(110136003)(81156014)(8936002)(68736007)(1076002)(2950100002)(50986999)(4326007)(356003)(8676002)(76176999)(626004)(2906002)(77096006)(2876002)(50226002)(36756003); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR03MB2467; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1BFFO11FD001; 1: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 MIME-Version: 1.0 Content-Type: text/plain X-MS-Office365-Filtering-Correlation-Id: e586f007-2bf5-4418-b3a9-08d4410fea45 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:BN6PR03MB2467; X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB2467; 3:5+GNG+OC3+vD+J+LkRlaLBQt7H1teOnZNrr1tEQuF5wyP4WEKPEco7USNv6Si00+5SFb7v6tWynfk/S1UlKSs0WZsrWUJvK9tEBff3QpqjvIHsXy/V0nawy76BIVILqoddNJYbms4Ikquh5GfzzGJUd6fvp7eG3tfcP03rdrYx38JqV2AsBS8j6cNVFb8vhzgX2hFpvjTqwxOObkWAuZIO4olzgNLkAYYhp5qtDHYZSqyazyyQiAW2Du290v4Z/moMDB4JDqSTncn+hRAYU72BFSQ/qW27jpM7Nbqeys5kAfzZwWJirJ0bhrm6zxgxYHmFZue63l5LAYu/LUWN5ZTvJ+Rzr0dk1DLkFHjbQQflTXzig9V8b8RUidI/CgGThl X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB2467; 25: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 X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB2467; 31:69xz5zkUifyqhtnoEjDXGBq2HW6fKH31Evt62n/ETghgmVrR/gQHkfki+WmpSK8ezMkDuI+Ntlaf9GiUOXL//BHhAFH0JL7Ck5wVI6jj3ZK7d0af/GZTovkRGcQknQmTamDDZ8fKwPexZhsoQMK6hsU3lSfS/JjpUuvuCaGBuK7IEu53FHe4b2kYUKi6AGNpmXpl5p0d4hiLVTuPmaAeVezceg9oVRAMXdnx4pp0HZWAu+43jVhk3A0849FLN/aun4fk/AhgP4xfNCwzUPvtAHJHczltUVwsTN80/ZzTzC2FpAnIO1U1G2CuR3q+BHTx X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095060)(601004)(2401047)(8121501046)(5005006)(13018025)(13015025)(13017025)(13023025)(13024025)(10201501046)(3002001)(6055026)(6096035)(20161123559025)(20161123561025)(20161123556025)(20161123563025)(20161123565025); SRVR:BN6PR03MB2467; BCL:0; PCL:0; RULEID:(400006); SRVR:BN6PR03MB2467; X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB2467; 4:XjRSsZQeDccCTKRezn7Hgo8EmU2MAHXMQeE48HVMYkU6CgFVk23DKK9XYPRJW9DgStv0bWiU1Ka6IlsSrGmusUczfvOSU5OdNonaoNNFrRLAsswGMcC329HNeETragpYaX8MNXJNhXmCrDpBE6Cdjp/vxnI/MhyOFRXbl2brfwKIgjkr38nKgW2K5vbOoLOz/bT4/ov3f2tNVjYh4cYofp55pzeB5OUWIyJl2GN/Mdtorm22z0sLKu9kLxoIzUuS9mjYBFnUz0Sb7Y399Iyh4Geo2lCp5hYE3mB61InShOe868DL8TrP/lDqt0IVww09XrVv3+9qRXVM5Mm0dcYiZEjfuhih6HYg7KoILCGbKYkYEyTEUdVOY9HSksXPUJw6iv8BUP6dz9EuLe62lE2ZDIEtAnPlTNLGi7y3jkxuzyqILVOqMomszNabO+f3Aw4XjnlTg3Ga34u8SZqaDboMx2OXsuhtSCmTdO3JtanbkTBxtU9UvwUipamJzjq9a7WbD8HbOl8RmMDfQZqSV0/FaXedSDjoIbfwUJRIanDSo3Y61N3g2vTyswb3ZIcQJGAY2PV/MxksvBUBzfZX77OsZBxZ+XDnG9x0438vjh3aKkqPenCJk5L+zSuKQNPl1hrT5fIq8gOkl7UNz1V0Fu3fQpE3SdsX0bECyZmugdKabIRypBuP1NECw5FfcuuT4ip76uJ6itKyive75cGpbGc9YKfGLmMDTqVBYpXAPH9V+S4+1fgJ/zhr25HFpZBV15R1 X-Forefront-PRVS: 01930B2BA8 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN6PR03MB2467; 23:R6GCYtnt2WZsIarldqB8GV4R3470miJ3sr5uHaUK/?= =?us-ascii?Q?Oo9AMyAd6Vqr8GakJPMJS3CxIOCr9Dh8eiR8DPgtqKv4rbse+jXe90aCPet+?= =?us-ascii?Q?nbqODja2mtha2dpJ7dTH2sbMF9bhJt6vMZhpBhLNhhiiJQ/O6GHrNIqjHJ8n?= =?us-ascii?Q?PPieEV5VgxPrguEw5wIaAqxHwp9fEfjvaWahdhb+2TNg0BgDv0jA3aE94vmO?= =?us-ascii?Q?656RxaMFWOKEiNydmQkBE393AOkei6jiTx5Gb2S/VcuCH3FjpKhQSi+jctxi?= =?us-ascii?Q?AslyHXYKpOTZlGe9nh/ALqIt3HNeX5fDnGu73lSnRExlAjhqbamf4bq5bNxv?= =?us-ascii?Q?tRXEYUWdjhoej9UNVsQFAllh+DLDYtfrW47GuQCcN8skh/k4OKxE6qAKorrY?= =?us-ascii?Q?GckREq4AANibEQ94xgwmhL3D/T8BtCDnfbK5j7tSqwzAIYFYEoEhe6E/Afv/?= =?us-ascii?Q?8ybKim9NMTg3CXfl2pzzNgtg6aiB+IzuQZlelJ+x9RjJewlOHF6+QIt+RDqi?= =?us-ascii?Q?Hszn3ZsVfgxiNONwob3MMFo+XWLNWIyV8FGw3tnFt3zD2BrtHJjFQkpUGJU0?= =?us-ascii?Q?85I+PlVNcL8uuAHNOT/4EFq5t4q1VgRPIzXODejJt548NX3IEkdzKICe0Z0Z?= =?us-ascii?Q?hEuV02bNdAo/RHsG/C4fSJihxkHBXTeWYdtN8/1HyAQMka0O5DAi+WWPTocb?= =?us-ascii?Q?uY1z1ihQty5OXoOUndUubLv9Rplk0/JYJsX6cQaZSMHMtevZPrORqETvc3t+?= =?us-ascii?Q?b37fwcBZInJC+2JIqVpCnq6HKMGZSVHn3VfUpoJfwIFTjr8aDO23sEvwBdy8?= =?us-ascii?Q?fygEiCt/9xeECokRsb18nU0t15j/3hRt/PGjQWiK1B5gQAirCzpIQ3y8HmLn?= =?us-ascii?Q?khj3ZPp9aHuuVRBuwVsnIRyPrlFcLhnEJStoVfOMLZeQQX2mS8AiLeFMgABZ?= =?us-ascii?Q?Tz0078EAuU/bf/ECAB2ohd0Rb6ZhG4M68iEfN7Jfh6Io+V4oKiTaPRe3VKwb?= =?us-ascii?Q?UR6uecO6J4kaI6a5VBzgwNscrnUjyRb3oKscvJoxn8S7vOaoLnRD0yAAZEPd?= =?us-ascii?Q?NV4sx4g5PO9PIoHaMJM4QknYjGXqDKVxAubAaGp/14Bf5xOa1kVr20HClH3a?= =?us-ascii?Q?UCokBhdPE7OAGhQwAB0rE+7Pr57JGG/aC6ApHu2ovi3JI25DY++RoPivUY7W?= =?us-ascii?Q?FzX6ouEHxGv69Lhq1Tr2qR3rC0QjkvbdC4g/HG05bybqpSA9cmryX7875LAm?= =?us-ascii?Q?JlGmM2FcndHZWb6iuGB5uSraSOxd1Y5VwI2saSnXXXpiDsZzc6pOmBQIkG5l?= =?us-ascii?Q?uoTIPoG4AEnm+doosW+i9RlLQttfWQhFk20OdTug7u1IjyQy77RmefT35DBC?= =?us-ascii?Q?MtH549n8exz4zNlOfdPJloYHGL+fzBDviyPjAV1DUl4J+w7?= X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB2467; 6:YqT+mQrCNILqy5MuRmCh4D+rZS7ZenMIbv0F7jjKcWJsdGfYjrxQOgie3tX61ckX0MN/9ACOjQgNnB8eOC3BuN5xbZccuVu44/ZA6V4ZR5EoVUW/hvvgOoHo4eTn7L1etS8eIgS6y4VZPH6eNMoB9RejDVFUq/ffe8wzazoyLKKrlhSMPM2Sr1aIxtv7Jg0enyUjULiuoMFkI6oknxjph5iwSdC4CXnZgFtT1KrmYd9Kto93QhKjxxt5/jcvjZvnMTKy4guCwnqJw66oZMajt6zM1/C1t7WEWTSSozK34DFLeY3chWhJYqxqcpXDW1YTmV3tXOTZHyCxGf9UhgQvEqscZ+Uy5/VZPyJhrj/zrYyeUN22vKrEyE8ZZAGljsjKnjigDtwLYS9cM7qyw9jhj/uT5zNjvNtTnnJGr1tLuRBerbc00/TPnaSWcnW0Hv73; 5:epznnS3Un6PuJOk/y+ufVpqXlVrv5tu1kG9EYHJ39GH97w5AKtUKHyTjO3k+30RFKoUqUAIJPaWugNgfTiwwdEaUnreMO6dg0W6mz/8qaUDaJchf2tvD7AkQOWgfrrxfwB9Ya+8mZD7JdgaQfbRC1BbDJD1UFvD7vrNiJ3p02T5d+fMLab39AQmvJMIh8gK3; 24:q/SuKY1GYOOm8XohL/S3bjYHxO8cmvjlQ9flK7JSQFg9T8RXEo4M1y0ucfpM+UuxMQW1uUJdvdu8tGFxGfm9edrTg7fKsMBbzij5FZUJMEE= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BN6PR03MB2467; 7:T3SnHVfRKGUmWMr3JaRXe8ETmEkqRVEGKamGMa2rGmFq0S9ecy6F4+FSrCK1R9iVOYaiALL82Rzn+FK2Wlw1RcyuFbPPtyGte33htAvHiL7TzYZvaqEzny2GljltqkLeuVguIScP/x49tMrJ/YXa/0npI22EBixOyQjZHvbz4x7242hBECIgtBygwJ8s2T4fQlUppqUsXF+8wHfhERsvW9zk8FLjfHKcSSTBvViThZzL4lRLhm0ha9LKXb92Pi8ZcWiIe/MszwgRRHgz2tyEdpAmyqf2udIBIwYOyO6g4vY+Um1PfqSLf5W/lddq15I3zjynBs90tO88CrAwpzoHxVjbZc5TfQZh+3fy7voL62lkYjLDWkg/UBwHdpcREH5w3g1+I2CQDLy3Tvo2ajM6ZlstCJ0dXimyJf8YCEHy8fhi2TyMSCtI3Dkn/3gAcghpQknV+AAizgNZcXC1V6mqFA== X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jan 2017 08:39:57.4962 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2467 Subject: [dpdk-dev] [PATCH v3 10/10] app/test: add dpaa2_sec crypto functional test X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Jan 2017 08:40:01 -0000 From: Akhil Goyal Signed-off-by: Akhil Goyal Reviewed-by: Hemant Agrawal --- app/test/test_cryptodev.c | 106 ++++++++++++++++++++++++++++++++++ app/test/test_cryptodev_blockcipher.c | 3 + app/test/test_cryptodev_blockcipher.h | 1 + 3 files changed, 110 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 0f0cf4d..753f2dc 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -1600,6 +1600,38 @@ test_AES_cipheronly_qat_all(void) } static int +test_AES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_AES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_authonly_openssl_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -4253,6 +4285,38 @@ test_DES_cipheronly_qat_all(void) } static int +test_3DES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_3DES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_3DES_cipheronly_qat_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -7863,6 +7927,40 @@ static struct unit_test_suite cryptodev_sw_zuc_testsuite = { } }; +static struct unit_test_suite cryptodev_dpaa2_sec_testsuite = { + .suite_name = "Crypto DPAA2_SEC Unit Test Suite", + .setup = testsuite_setup, + .teardown = testsuite_teardown, + .unit_test_cases = { + TEST_CASE_ST(ut_setup, ut_teardown, + test_device_configure_invalid_dev_id), + TEST_CASE_ST(ut_setup, ut_teardown, + test_multi_session), + + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_cipheronly_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_cipheronly_dpaa2_sec_all), + + /** HMAC_MD5 Authentication */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_2), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_2), + + TEST_CASES_END() /**< NULL terminate unit test array */ + } +}; + + static struct unit_test_suite cryptodev_null_testsuite = { .suite_name = "Crypto Device NULL Unit Test Suite", .setup = testsuite_setup, @@ -7973,6 +8071,13 @@ test_cryptodev_armv8(void) return unit_test_suite_runner(&cryptodev_armv8_testsuite); } +static int +test_cryptodev_dpaa2_sec(void /*argv __rte_unused, int argc __rte_unused*/) +{ + gbl_cryptodev_type = RTE_CRYPTODEV_DPAA2_SEC_PMD; + return unit_test_suite_runner(&cryptodev_dpaa2_sec_testsuite); +} + REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat); REGISTER_TEST_COMMAND(cryptodev_aesni_mb_autotest, test_cryptodev_aesni_mb); REGISTER_TEST_COMMAND(cryptodev_openssl_autotest, test_cryptodev_openssl); @@ -7982,3 +8087,4 @@ REGISTER_TEST_COMMAND(cryptodev_sw_snow3g_autotest, test_cryptodev_sw_snow3g); REGISTER_TEST_COMMAND(cryptodev_sw_kasumi_autotest, test_cryptodev_sw_kasumi); REGISTER_TEST_COMMAND(cryptodev_sw_zuc_autotest, test_cryptodev_sw_zuc); REGISTER_TEST_COMMAND(cryptodev_sw_armv8_autotest, test_cryptodev_armv8); +REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_autotest, test_cryptodev_dpaa2_sec); diff --git a/app/test/test_cryptodev_blockcipher.c b/app/test/test_cryptodev_blockcipher.c index a48540c..211c7a7 100644 --- a/app/test/test_cryptodev_blockcipher.c +++ b/app/test/test_cryptodev_blockcipher.c @@ -649,6 +649,9 @@ test_blockcipher_all_tests(struct rte_mempool *mbuf_pool, case RTE_CRYPTODEV_ARMV8_PMD: target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8; break; + case RTE_CRYPTODEV_DPAA2_SEC_PMD: + target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC; + break; default: TEST_ASSERT(0, "Unrecognized cryptodev type"); break; diff --git a/app/test/test_cryptodev_blockcipher.h b/app/test/test_cryptodev_blockcipher.h index 91e9858..7b36f8c 100644 --- a/app/test/test_cryptodev_blockcipher.h +++ b/app/test/test_cryptodev_blockcipher.h @@ -51,6 +51,7 @@ #define BLOCKCIPHER_TEST_TARGET_PMD_QAT 0x0002 /* QAT flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL 0x0004 /* SW OPENSSL flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 0x0008 /* ARMv8 flag */ +#define BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC 0x0010 /* DPAA2_SEC flag */ #define BLOCKCIPHER_TEST_OP_CIPHER (BLOCKCIPHER_TEST_OP_ENCRYPT | \ BLOCKCIPHER_TEST_OP_DECRYPT) -- 2.9.3