From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0081.outbound.protection.outlook.com [104.47.34.81]) by dpdk.org (Postfix) with ESMTP id 8A4C7D090 for ; Mon, 10 Apr 2017 14:32:10 +0200 (CEST) Received: from CY1PR03CA0026.namprd03.prod.outlook.com (10.174.128.36) by BN1PR03MB281.namprd03.prod.outlook.com (10.255.200.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1019.17; Mon, 10 Apr 2017 12:32:10 +0000 Received: from BL2FFO11OLC016.protection.gbl (2a01:111:f400:7c09::134) by CY1PR03CA0026.outlook.office365.com (2603:10b6:600::36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1019.17 via Frontend Transport; Mon, 10 Apr 2017 12:32:08 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BL2FFO11OLC016.mail.protection.outlook.com (10.173.160.82) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1019.14 via Frontend Transport; Mon, 10 Apr 2017 12:32:08 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id v3ACVCIY014402; Mon, 10 Apr 2017 05:32:04 -0700 From: To: CC: , , , , , , Akhil Goyal Date: Mon, 10 Apr 2017 18:01:08 +0530 Message-ID: <20170410123108.26305-14-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20170410123108.26305-1-akhil.goyal@nxp.com> References: <20170324215754.21751-1-akhil.goyal@nxp.com> <20170410123108.26305-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131363011287800555; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39410400002)(39450400003)(39840400002)(39850400002)(39400400002)(39380400002)(39860400002)(2980300002)(1110001)(1109001)(339900001)(199003)(189002)(9170700003)(104016004)(2906002)(77096006)(5003940100001)(2876002)(47776003)(85426001)(8656002)(4326008)(86152003)(54906002)(86362001)(5660300001)(33646002)(305945005)(48376002)(356003)(50466002)(8936002)(105606002)(2351001)(6916009)(106466001)(53936002)(50226002)(69596002)(2950100002)(81156014)(81166006)(8676002)(1076002)(189998001)(76176999)(36756003)(110136004)(50986999)(38730400002); DIR:OUT; SFP:1101; SCL:1; SRVR:BN1PR03MB281; H:az84smr01.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; A:1; MX:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BL2FFO11OLC016; 1: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 MIME-Version: 1.0 Content-Type: text/plain X-MS-Office365-Filtering-Correlation-Id: 5bd3c873-e9c2-45fe-f98e-08d4800d9ae3 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(201703131430075)(201703131517081); SRVR:BN1PR03MB281; X-Microsoft-Exchange-Diagnostics: 1; BN1PR03MB281; 3:9+YShu80f87jZncSVom+RUiVmNwlyzpke1J449DxTssysvQLdAyXrHnjLVh19XthQ7rQwx6t91Cxrp5uei1ukksKtS2RTzP0tTWbXmX2L/jPmzgImCOnSBnLQfRsSRzp+RMUWH1eOo8EH07X5JzbS08054yB005FlLDYixpK3tj8WTirP9J4giMfaQWzRcOXS43c+ljaGvamG/jbZPD99V/h8eJD9h47125hYSDdb+ygTOtNBazbi0WRJ6REmndzKlpewHE25M2VCVLZWJyTICxRFZiDF3BpXZ7x9Hi6xLm5QNJwjFYqOQcBb07bmgzQ/8InEicEoc7U34rHGmP9Bwc/9kJtvHYSx9EiaO4IFAfw/JVObRjyjC8A5fTbFLzXi72Z2xmUKXCif0i+HCDFsjo0yF8rn7BiYxtL6LHGo5no3MUKre2awyZy3FXBke+K; 25:g/NleiX0ybWwfiILFBMUnu/hR7CdV+Umkvhi8jM5azStXvKMNCCaFgh7RPR9ZFbEoNLbE9s3Hhg0r15ewtVlh0MDXxoQBjx6EzQO6Xi+uNs0uFR8LEqFtXDlJv1Xp/x0TJ4ll9d6RaYQ0zj9ebVDFPr/dbBuBlksQp187C/Nyr+Yk5CQHksleNhKyms+g+6SAXix0JY/SKKwMbBBLDr/rHVyo+FJ9NiSTdNZCrKnJc/RBDX/vZcyKsdWTn6b9bicZApavWdhzG3TzLtglnow0Ncmm2xexOlsGF7qjlW4GklVk7AkAwO1xsMrxKUmvUhg7hW1d0ERGIoLAo0iRiB+aVz/vVmapdZb5RPQKV0r6e8alfU5m0PTnStUNXq+c5BesarRXpEXRrq2yVUrnHQiXsH/rOqQCSNPe4/kpeIlggIua353cELCicvsDylA7+mMR5DAK91ZjiMvkMZq25+GhQ== X-Microsoft-Exchange-Diagnostics: 1; BN1PR03MB281; 31:GbC+t/iyXQbxjRmzCMPurEenOWLXfoqbuxwqLTuWcIOn0e6WuAdwvRHgcAav2bB7nKBRcX/OEVST7uel5u3ATcsCqH3Xgpq5tG6JV1pb5Nu0Q8Omval0Ja4gxL6LfGhRP0uH6/2eY/DFZUlOJTUTL54bhpb+1Vu0SQM18lh6NLCojbsWkHwnGQH6frCvDsacU1sTa6775Tlb+zUe+lwDa5jAX21hFn1VwDxaCnfq4JanysQZhD3W5Ael3gXdsvBijxnqjvlOYH7D1xjKFecS/w== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6095135)(601004)(2401047)(13017025)(13018025)(13024025)(13023025)(8121501046)(13015025)(5005006)(3002001)(10201501046)(93006095)(93001095)(6055026)(6096035)(20161123563025)(201703131430075)(201703131448075)(201703131433075)(201703161259075)(20161123556025)(20161123565025)(20161123561025); SRVR:BN1PR03MB281; BCL:0; PCL:0; RULEID:(400006); SRVR:BN1PR03MB281; X-Microsoft-Exchange-Diagnostics: 1; BN1PR03MB281; 4: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 X-Forefront-PRVS: 027367F73D X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BN1PR03MB281; 23:ygDGy7Gb+wBTKzQGdBhph1/+z9ByF0o32TfNLBzhYa?= =?us-ascii?Q?4WCnp1hLmMn72RuMlPZuAXW6nGKyzLZmhIOYt/IIWFjn8bSfBWhTioYJpAyA?= =?us-ascii?Q?EWRsSWO+hDD4oXbMPhxFqU+n9syPR9gg4TcLm4RP97PQYEasuRnIxsDW+E66?= =?us-ascii?Q?aeHkuxb7hpqVcpsrtVSw4GGN4dw7ZJ46Lupll82dF9gIZfqTYPGRp1AzqpMS?= =?us-ascii?Q?kZtMuMukyO07h5V9FpVD0SI19OdaDPvjIoBialgm80ZJOYCWSz2NCVxbqs/o?= =?us-ascii?Q?ejp/HigIqBbDPEeiN3dxqrOghlxriEak72zdo4JLxAf1WiO4x56xRfQLajUB?= =?us-ascii?Q?S0XJxvueSP0NS3YZupn5KWzTNQs5s3kwBCDbqTgHipwB9OghekBZDqtRw1av?= =?us-ascii?Q?ai9IjztmbaAce/XO+A04TO0CyY8LtE8Wy8gWZ9UtsKZB6eei5ACkIIuay7IN?= =?us-ascii?Q?cX8buGOU4sgAu171/ifhNWhoyqITT4lVItL96gupbUlhinIG/BSm7N7cL8NF?= =?us-ascii?Q?XTkYljwIibGXvCI5zPnwXVNpeFy0k/vCFsS6R97gkgxcm9RMo6bFsrVF9Tr7?= =?us-ascii?Q?B6hJRVEu1YEJC0BH7ubP+a1PP0V1FROItbatqZ+FKCKjiA6UXSt0Q+nNkZWC?= =?us-ascii?Q?Cgihp66jlv8Vi4thgzqgWofoGoUl7fZ0pk4oFwRDsvNK+G9JeGRv1N0/U3z1?= =?us-ascii?Q?PH99T88muLA/DlgmKmcJVKVCjjnEC+Z8y/H+f2cqFcFLz8DNiTrsNAHkpc9A?= =?us-ascii?Q?qzWy+A5dSDjt9RorwMRsqwiZRxWlkjguqiBqQL/uaIkhUOQOSbdg4JAjJwNY?= =?us-ascii?Q?YUKB6TAaaDz733OcKZxufX4/vmdp38xweTkU23V7Ju32KgWcq1SMBoKuwnJJ?= =?us-ascii?Q?Sd5+7rqbkF+mXECMEiWqP3yDu8mEVBqxMA/OAgrXdqhipaNCJURH1qz0QUb5?= =?us-ascii?Q?Ee27SOgMA7gMZnAo38/sog4OeljPy75bUrNJ5vD4z//rAL0kHEeywoGeVgUS?= =?us-ascii?Q?KcwmDqE2PRIVhHeYsBgZ9mToZ9mRYnev1AojfbvFeU1gaOkNwWQKSsLfj6Yh?= =?us-ascii?Q?tOrUksG++QNxMqVAzUk24V5Oi1nXeXQ2vbiZ9Nrb3ZJVtAF7oLTjTfCN3kuY?= =?us-ascii?Q?k1FAVkV5o8bdm5kz0OMYKwbJ+iSgKEbmNXGFZFRZ/98E561xSFuKKH3tIacn?= =?us-ascii?Q?I0x2jGLhbXvlM0q9pf4d9zR4qbdC0hNJS+sXqxymyFRvecI6bAPE4iEgffoI?= =?us-ascii?Q?ll85Y8GoBdnHWSRI6fadgvWt1Rs2NHEbjMLV+Ni6kQTpSFbvvrxY+o3/pDLg?= =?us-ascii?Q?=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1; BN1PR03MB281; 6:9rsJtbELjx6k5InLKT2464DO2xuDfiQWkiWF7uS6psrmZ2xRSxVrDyMS4UExnim8Bbbh2oPgE6jAnc1lCsUOXqq1w1RwadxoMjXpPt5bTLbCeaSNesauc8GdRJ8+i7Oh/Z3QJpZc/tFYz4fjC8nrGwK6+Oh2hf9WytM0QXJ1V3mpLwFQB8QiChCjsWJfsYXK/Bn5m4NNE1hBePY8hqsOvDACCzbM4QhRg5MGIYM0NDihGxE4vSINEX2uovg17JL7BHW3RJppUND7NK42UWKYcYTFKpFd8DL0mPP0O5ocI5FKIXyZfSPGuWevjpsjlqR2GNZoSg/lopQZKs23jkgalV8L59awKDDlbPKNbjF6PC8LEWJfYNig3eunj/QM7wp/YZZS1kpng34vsy1JiaqTQqQ7kYNApwYzWF8Z65qL70e7p5bGlQj9o9bIYaYshoDPAoE+3r8YvYysKLFHxmVvZQ==; 5:xk5R6g7WnfPkfqE5btI7LiBuIIme7NEYHDXK3X0xx8zw1w7KAlAJDneVz7xqOXkimp1v9AP7Q8Vk1o5guUjMcyO03GLkQa5pezllcK0Szhn8TUHa/UPcYSb00lQatJNi2+Zlzd7o/Y+zkjRG2WwcJOFrDggPl/y89wZhmvBmyLLDHZZmi7wFDPlscIObz2ed; 24:MZF+dW/8LICQvNG4jdAizhymS7jy6MAAqL5WGOOmWYHhMS1gP5pZc+4xBBJ3Q5VqxriJvLddRTXjjIkjACSymmvd+ClokbNPRnjtOejQR6o= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BN1PR03MB281; 7:U9cy5wyusP0R5bg/YFByCanq0eDhKbR+gZnUHL4lxFAUX19P9tZLlBy0ajUlSumNLoS/6tCtnLpT4MVbU0uLzAjolxkNd0oBj5iRuaZJ9UXiYtBGR+cn11ys6FUZY9miRsTRB8pQp+BseIoPWLlRu0CcqUm7CdxNZ1sKpI6nhnu2x8oepX5O2RfHMj4yqV4qhPW0AYXRcdLYe9ySl8t+JysFPMtij73ALUVjQZXkipYOwhrUexiIE/fksIn5LYRWgeRdhcAZkQYBaCdw/HoUujHQKE9m78Tt7SvdcUMk2tl4NEMW2RSV9yixOennUYjGcvatgxNuDPlzRmwVylmiMg== X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Apr 2017 12:32:08.5304 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1PR03MB281 Subject: [dpdk-dev] [PATCH v7 13/13] test/test: add dpaa2 sec crypto functional test X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Apr 2017 12:32:11 -0000 From: Akhil Goyal Signed-off-by: Akhil Goyal Reviewed-by: Hemant Agrawal --- test/test/test_cryptodev.c | 106 +++++++++++++++++++++++++++++++++ test/test/test_cryptodev_blockcipher.c | 3 + test/test/test_cryptodev_blockcipher.h | 1 + 3 files changed, 110 insertions(+) diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c index 63d71c0..acd9889 100644 --- a/test/test/test_cryptodev.c +++ b/test/test/test_cryptodev.c @@ -1727,6 +1727,38 @@ test_AES_cipheronly_qat_all(void) } static int +test_AES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_AES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_authonly_openssl_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -4716,6 +4748,38 @@ test_DES_docsis_openssl_all(void) } static int +test_3DES_chain_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CHAIN_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int +test_3DES_cipheronly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_3DES_CIPHERONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_3DES_cipheronly_qat_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -8481,6 +8545,40 @@ static struct unit_test_suite cryptodev_sw_zuc_testsuite = { } }; +static struct unit_test_suite cryptodev_dpaa2_sec_testsuite = { + .suite_name = "Crypto DPAA2_SEC Unit Test Suite", + .setup = testsuite_setup, + .teardown = testsuite_teardown, + .unit_test_cases = { + TEST_CASE_ST(ut_setup, ut_teardown, + test_device_configure_invalid_dev_id), + TEST_CASE_ST(ut_setup, ut_teardown, + test_multi_session), + + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_chain_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_cipheronly_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_3DES_cipheronly_dpaa2_sec_all), + + /** HMAC_MD5 Authentication */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_generate_case_2), + TEST_CASE_ST(ut_setup, ut_teardown, + test_MD5_HMAC_verify_case_2), + + TEST_CASES_END() /**< NULL terminate unit test array */ + } +}; + + static struct unit_test_suite cryptodev_null_testsuite = { .suite_name = "Crypto Device NULL Unit Test Suite", .setup = testsuite_setup, @@ -8604,6 +8702,13 @@ REGISTER_TEST_COMMAND(cryptodev_scheduler_autotest, test_cryptodev_scheduler); #endif +static int +test_cryptodev_dpaa2_sec(void /*argv __rte_unused, int argc __rte_unused*/) +{ + gbl_cryptodev_type = RTE_CRYPTODEV_DPAA2_SEC_PMD; + return unit_test_suite_runner(&cryptodev_dpaa2_sec_testsuite); +} + REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat); REGISTER_TEST_COMMAND(cryptodev_aesni_mb_autotest, test_cryptodev_aesni_mb); REGISTER_TEST_COMMAND(cryptodev_openssl_autotest, test_cryptodev_openssl); @@ -8613,3 +8718,4 @@ REGISTER_TEST_COMMAND(cryptodev_sw_snow3g_autotest, test_cryptodev_sw_snow3g); REGISTER_TEST_COMMAND(cryptodev_sw_kasumi_autotest, test_cryptodev_sw_kasumi); REGISTER_TEST_COMMAND(cryptodev_sw_zuc_autotest, test_cryptodev_sw_zuc); REGISTER_TEST_COMMAND(cryptodev_sw_armv8_autotest, test_cryptodev_armv8); +REGISTER_TEST_COMMAND(cryptodev_dpaa2_sec_autotest, test_cryptodev_dpaa2_sec); diff --git a/test/test/test_cryptodev_blockcipher.c b/test/test/test_cryptodev_blockcipher.c index 9d6ebd6..603c776 100644 --- a/test/test/test_cryptodev_blockcipher.c +++ b/test/test/test_cryptodev_blockcipher.c @@ -663,6 +663,9 @@ test_blockcipher_all_tests(struct rte_mempool *mbuf_pool, case RTE_CRYPTODEV_SCHEDULER_PMD: target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER; break; + case RTE_CRYPTODEV_DPAA2_SEC_PMD: + target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC; + break; default: TEST_ASSERT(0, "Unrecognized cryptodev type"); break; diff --git a/test/test/test_cryptodev_blockcipher.h b/test/test/test_cryptodev_blockcipher.h index 389558a..004122f 100644 --- a/test/test/test_cryptodev_blockcipher.h +++ b/test/test/test_cryptodev_blockcipher.h @@ -52,6 +52,7 @@ #define BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL 0x0004 /* SW OPENSSL flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 0x0008 /* ARMv8 flag */ #define BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER 0x0010 /* Scheduler */ +#define BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC 0x0020 /* DPAA2_SEC flag */ #define BLOCKCIPHER_TEST_OP_CIPHER (BLOCKCIPHER_TEST_OP_ENCRYPT | \ BLOCKCIPHER_TEST_OP_DECRYPT) -- 2.9.3