From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 7383EA0546; Thu, 16 Jul 2020 17:54:17 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 1AA7E1BED8; Thu, 16 Jul 2020 17:54:07 +0200 (CEST) Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by dpdk.org (Postfix) with ESMTP id 68E041BEA8 for ; Thu, 16 Jul 2020 17:54:04 +0200 (CEST) IronPort-SDR: cg7uJFkVISEhAKSC4t+Kfk48bTxI03worNjYn474th1sc9quDuL+8CzjyecFG3/FcMfQvvfTm3 3WvwINKzdIBw== X-IronPort-AV: E=McAfee;i="6000,8403,9684"; a="150793869" X-IronPort-AV: E=Sophos;i="5.75,359,1589266800"; d="scan'208";a="150793869" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jul 2020 08:54:03 -0700 IronPort-SDR: kbX5wSd0746sMz2H6ERoffAn+EkNRjeW/EMOPS/GSHhE1ofxHN6J52XRoOt8CVZYNKF021b9eR uuntqjNwP8lw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,359,1589266800"; d="scan'208";a="308680203" Received: from silpixa00399912.ir.intel.com (HELO silpixa00399912.ger.corp.intel.com) ([10.237.223.64]) by fmsmga004.fm.intel.com with ESMTP; 16 Jul 2020 08:54:01 -0700 From: David Coyle To: akhil.goyal@nxp.com, declan.doherty@intel.com, pablo.de.lara.guarch@intel.com, fiona.trahe@intel.com Cc: dev@dpdk.org, brendan.ryan@intel.com, mairtin.oloingsigh@intel.com, David Coyle Date: Thu, 16 Jul 2020 16:29:52 +0100 Message-Id: <20200716152952.65107-3-david.coyle@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200716152952.65107-1-david.coyle@intel.com> References: <20200716152952.65107-1-david.coyle@intel.com> Subject: [dpdk-dev] [PATCH v1 2/2] app/crypto-perf: enable security feature for security tests X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" The RTE_CRYPTODEV_FF_SECURITY feature was disabled through the ff_disable device configuration option for all crypto performance tests, including security related tests. This patch updates the crypto performance tool to not disable RTE_CRYPTODEV_FF_SECURITY for DOCSIS and PDCP security tests. Fixes: d4a131a9498d ("test/crypto-perf: support DOCSIS protocol") Signed-off-by: David Coyle --- app/test-crypto-perf/main.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/app/test-crypto-perf/main.c b/app/test-crypto-perf/main.c index edeea9c1b..8f8e580e4 100644 --- a/app/test-crypto-perf/main.c +++ b/app/test-crypto-perf/main.c @@ -203,10 +203,13 @@ cperf_initialize_cryptodev(struct cperf_options *opts, uint8_t *enabled_cdevs) struct rte_cryptodev_config conf = { .nb_queue_pairs = opts->nb_qps, .socket_id = socket_id, - .ff_disable = RTE_CRYPTODEV_FF_SECURITY | - RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO, + .ff_disable = RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO, }; + if (opts->op_type != CPERF_PDCP && + opts->op_type != CPERF_DOCSIS) + conf.ff_disable |= RTE_CRYPTODEV_FF_SECURITY; + struct rte_cryptodev_qp_conf qp_conf = { .nb_descriptors = opts->nb_descriptors }; -- 2.17.1