From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 928D9A0A0C; Thu, 1 Jul 2021 15:28:31 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A9B2841339; Thu, 1 Jul 2021 15:27:27 +0200 (CEST) Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2040.outbound.protection.outlook.com [40.107.236.40]) by mails.dpdk.org (Postfix) with ESMTP id D36954132C for ; Thu, 1 Jul 2021 15:27:24 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Gy8YGYiNKY/MW57TETShrz8ZIv4keitpBnnaxjfRmJfYAk8QY1jyujp2nKJc6qpb9jDkVSjiuOoZ+nCA/XTDH15U+lxRjvNzY2Ls08Pu3r5Jcotsi2w4dv+Bqek/3i4Zox92qzrLUo2O11n0twsKcEMdcnW5zuqgxPj6BWmg8VCZFo658yGo9SEN4/aGPNzHzWhptBbdEyyPyPVB/gnBdIOdITcApOCKMxaStlKhrkMhHzgqqDbGga30Av6YsosfS4zwwmYNAsVh3HK1VDZ+ISLUf9zh1AYX9uubbVIrw+S4xpMEruBG3D13ssfQAREyFhIHssLWp5+H/SwgwDqU4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=I7vSkIeD6SePoUmOZZj2jwOrC8YCW1XCuSd+iJGGhb4=; b=Hiht5Zn6ISu9d1pZ+nErkTIBlNtr6knpk+2luUwDZD5gIN89W+jHYSXarHyEQPRaUlu78hTA3DDEbmrReYtNElEq1X8I+FW+Ta0lK8uUS5dTCvc4yJzBv+q1mzG26mdS/nDwkyRXTzOzLNvzc8qVL+90T50GCLlbeHsxTT6x2ybWDXCVT1tX/EU91LmO8CY9ISzHX79DdGOXabjHQBgXWjCM0oWPoVTx4DXxgJWU+CLqgRh6Dw3ka7mzHmpHHe4dZnEgIjMECEaEHEnm8qTqlIxZV65mqsh5u/gtufcnO9lS+IF6v7EH3LaZK/2mYuM9j/eR4nAq9pJ5FmJWuyRgzg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.112.34) smtp.rcpttodomain=marvell.com smtp.mailfrom=nvidia.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=I7vSkIeD6SePoUmOZZj2jwOrC8YCW1XCuSd+iJGGhb4=; b=fpCs8UWKLeYDdyooJk5AiiDG1ES5JNDrEH0ddskse1kb9BBFFu5/5vJKvvulhzlJ2EzDQFzdXTt5mHf+tQVEC1Ap0nRaM0vkoSyo3YvrwFPsA44LZLXQoqB2sMUBYY47d1gNKKYfkUHKbGrN6F9sfqLXv4nj3IYcEZWEjLAup3AsrsOtT8dIYsGQoCx96w78eFJENgVqvulDYa59O7a/Lt3bZPHx+qBBHjU8mnJMYYE/HsbXyy2p72Wx4064aKkf7+cN1plTKsJtRZCErl9PPdWP2rDHJSuyk82vthYP9VS/Il2bkcv7FuX+837OmCvdC6J2Y7uu6pv7GAwu+owZdg== Received: from BN9PR03CA0477.namprd03.prod.outlook.com (2603:10b6:408:139::32) by CY4PR1201MB0103.namprd12.prod.outlook.com (2603:10b6:910:17::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4264.20; Thu, 1 Jul 2021 13:27:23 +0000 Received: from BN8NAM11FT055.eop-nam11.prod.protection.outlook.com (2603:10b6:408:139:cafe::84) by BN9PR03CA0477.outlook.office365.com (2603:10b6:408:139::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.21 via Frontend Transport; Thu, 1 Jul 2021 13:27:23 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.112.34) smtp.mailfrom=nvidia.com; marvell.com; dkim=none (message not signed) header.d=none;marvell.com; dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.112.34 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.112.34; helo=mail.nvidia.com; Received: from mail.nvidia.com (216.228.112.34) by BN8NAM11FT055.mail.protection.outlook.com (10.13.177.62) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.4287.22 via Frontend Transport; Thu, 1 Jul 2021 13:27:22 +0000 Received: from nvidia.com (172.20.187.6) by HQMAIL107.nvidia.com (172.20.187.13) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 1 Jul 2021 13:27:13 +0000 From: Shiri Kuzin To: CC: , , Date: Thu, 1 Jul 2021 16:26:09 +0300 Message-ID: <20210701132609.53727-16-shirik@nvidia.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20210701132609.53727-1-shirik@nvidia.com> References: <20210509160507.224644-1-matan@nvidia.com> <20210701132609.53727-1-shirik@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [172.20.187.6] X-ClientProxiedBy: HQMAIL107.nvidia.com (172.20.187.13) To HQMAIL107.nvidia.com (172.20.187.13) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: b939331b-2c17-47b2-e7b3-08d93c93f5a6 X-MS-TrafficTypeDiagnostic: CY4PR1201MB0103: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:3276; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.112.34; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:schybrid03.nvidia.com; CAT:NONE; SFS:(4636009)(39860400002)(346002)(376002)(136003)(396003)(36840700001)(46966006)(82740400003)(6666004)(2906002)(47076005)(7636003)(70206006)(83380400001)(186003)(70586007)(16526019)(26005)(7696005)(8936002)(107886003)(2616005)(36756003)(6286002)(426003)(54906003)(316002)(336012)(4326008)(478600001)(30864003)(55016002)(36860700001)(1076003)(6916009)(5660300002)(356005)(82310400003)(86362001)(8676002); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Jul 2021 13:27:22.6852 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: b939331b-2c17-47b2-e7b3-08d93c93f5a6 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.112.34]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT055.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1201MB0103 Subject: [dpdk-dev] [PATCH v5 15/15] test/crypto: add mlx5 multi segment tests X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" The crypto mlx5 driver supports multi segment encryption and decryption operations. Added mlx5 multi segment encryption function and multi segment decryption function that will both use the mlx5 vectors. The added tests will test both data integrity and correct stat values. Signed-off-by: Shiri Kuzin Acked-by: Matan Azrad --- app/test/test_cryptodev.c | 277 ++++++++++++++++++++ app/test/test_cryptodev_mlx5_test_vectors.h | 3 - 2 files changed, 277 insertions(+), 3 deletions(-) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 8dbe324b81..4d27a9444c 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -6681,6 +6681,219 @@ test_mlx5_decryption(const struct mlx5_test_data *tdata) return 0; } +static int +test_mlx5_encryption_sgl(const struct mlx5_test_data *tdata) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + struct crypto_unittest_params *ut_params = &unittest_params; + struct rte_cryptodev_sym_capability_idx cap_idx; + struct rte_cryptodev_info dev_info; + struct rte_cryptodev_stats stats; + uint8_t buffer[10000]; + const uint8_t *ciphertext; + const uint8_t *reference_ciphertext; + uint64_t feat_flags; + unsigned int plaintext_pad_len; + unsigned int plaintext_len; + int retval; + + /* Verify the capabilities */ + cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER; + cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_XTS; + if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0], + &cap_idx) == NULL) + return TEST_SKIPPED; + rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info); + feat_flags = dev_info.feature_flags; + if (!(feat_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) { + printf("Device doesn't support in-place scatter-gather. " + "Test Skipped.\n"); + return TEST_SKIPPED; + } + if ((global_api_test_type == CRYPTODEV_RAW_API_TEST) && + (!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) { + printf("Device doesn't support RAW data-path APIs.\n"); + return TEST_SKIPPED; + } + if (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO) + return TEST_SKIPPED; + /* Create mlx5 session */ + retval = create_wireless_algo_cipher_session(ts_params->valid_devs[0], + RTE_CRYPTO_CIPHER_OP_ENCRYPT, + RTE_CRYPTO_CIPHER_AES_XTS, + tdata->key.data, tdata->key.len, + tdata->cipher_iv.len, 0); + if (retval < 0) + return retval; + plaintext_len = ceil_byte_length(tdata->plaintext.len); + /* Append data which is padded to a multiple */ + /* of the algorithms block size */ + plaintext_pad_len = RTE_ALIGN_CEIL(plaintext_len, 8); + ut_params->ibuf = create_segmented_mbuf(ts_params->mbuf_pool, + plaintext_pad_len, 8, 0); + if (unlikely(ut_params->ibuf == NULL)) + return -ENOMEM; + pktmbuf_write(ut_params->ibuf, 0, plaintext_len, tdata->plaintext.data); + debug_hexdump(stdout, "plaintext:", tdata->plaintext.data, + plaintext_len); + /* Create mlx5 operation */ + retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, + tdata->cipher_iv.len, (tdata->cipher.len_bits), + (tdata->cipher.offset_bits)); + if (retval < 0) + return retval; + if (global_api_test_type == CRYPTODEV_RAW_API_TEST) + process_sym_raw_dp_op(ts_params->valid_devs[0], 0, + ut_params->op, 1, 0, 1, tdata->cipher_iv.len); + else + ut_params->op = process_crypto_request(ts_params->valid_devs[0], + ut_params->op); + TEST_ASSERT_NOT_NULL(ut_params->op, "failed to retrieve obuf"); + ut_params->obuf = ut_params->op->sym->m_dst; + if (ut_params->obuf) + ciphertext = rte_pktmbuf_read(ut_params->obuf, 0, + plaintext_len, buffer); + else + ciphertext = rte_pktmbuf_read(ut_params->ibuf, + tdata->cipher.offset_bits, + plaintext_len, buffer); + if (unlikely(ciphertext == NULL)) + return -ENOMEM; + /* Validate obuf */ + debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); + reference_ciphertext = tdata->ciphertext.data + + tdata->cipher.offset_bits; + /* Validate obuf */ + TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( + ciphertext, + reference_ciphertext, + tdata->validCipherLenInBits.len, + "MLX5 Ciphertext data not as expected"); + /* Validate stats */ + TEST_ASSERT_SUCCESS(rte_cryptodev_stats_get(ts_params->valid_devs[0], + &stats), + "rte_cryptodev_stats_get failed"); + TEST_ASSERT((stats.enqueued_count == 1), + "rte_cryptodev_stats_get returned unexpected enqueued stat"); + TEST_ASSERT((stats.dequeued_count == 1), + "rte_cryptodev_stats_get returned unexpected dequeued stat"); + TEST_ASSERT((stats.enqueue_err_count == 0), + "rte_cryptodev_stats_get returned error enqueued stat"); + TEST_ASSERT((stats.dequeue_err_count == 0), + "rte_cryptodev_stats_get returned error dequeued stat"); + return 0; +} + +static int +test_mlx5_decryption_sgl(const struct mlx5_test_data *tdata) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + struct crypto_unittest_params *ut_params = &unittest_params; + struct rte_cryptodev_sym_capability_idx cap_idx; + struct rte_cryptodev_stats stats; + struct rte_cryptodev_info dev_info; + uint8_t *ciphertext; + const uint8_t *plaintext; + const uint8_t *reference_plaintext; + uint8_t buffer[10000]; + uint64_t feat_flags; + unsigned int ciphertext_pad_len; + unsigned int ciphertext_len; + int retval; + + rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info); + feat_flags = dev_info.feature_flags; + if ((global_api_test_type == CRYPTODEV_RAW_API_TEST) && + (!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) { + printf("Device doesn't support RAW data-path APIs.\n"); + return -ENOTSUP; + } + if (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO) + return -ENOTSUP; + /* Verify the capabilities */ + cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER; + cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_XTS; + if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0], + &cap_idx) == NULL) + return -ENOTSUP; + /* Create mlx5 session */ + retval = create_wireless_algo_cipher_session(ts_params->valid_devs[0], + RTE_CRYPTO_CIPHER_OP_DECRYPT, + RTE_CRYPTO_CIPHER_AES_XTS, + tdata->key.data, tdata->key.len, + tdata->cipher_iv.len, 0); + if (retval < 0) + return retval; + ut_params->ibuf = rte_pktmbuf_alloc(ts_params->mbuf_pool); + if (unlikely(ut_params->ibuf == NULL)) + return -ENOMEM; + /* Clear mbuf payload */ + memset(rte_pktmbuf_mtod(ut_params->ibuf, uint8_t *), 0, + rte_pktmbuf_tailroom(ut_params->ibuf)); + ciphertext_len = ceil_byte_length(tdata->ciphertext.len); + /* Append data which is padded to a multiple */ + /* of the algorithms block size */ + ciphertext_pad_len = RTE_ALIGN_CEIL(ciphertext_len, 8); + ciphertext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf, + ciphertext_pad_len); + if (unlikely(ciphertext == NULL)) + return -ENOMEM; + ut_params->ibuf = create_segmented_mbuf(ts_params->mbuf_pool, + ciphertext_pad_len, 8, 0); + if (unlikely(ut_params->ibuf == NULL)) + return -ENOMEM; + pktmbuf_write(ut_params->ibuf, 0, ciphertext_len, + tdata->ciphertext.data); + memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); + if (unlikely(ciphertext == NULL)) + return -ENOMEM; + debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len); + /* Create mlx5 operation */ + retval = create_wireless_algo_cipher_operation(tdata->cipher_iv.data, + tdata->cipher_iv.len, (tdata->cipher.len_bits), + (tdata->cipher.offset_bits)); + if (retval < 0) + return retval; + if (global_api_test_type == CRYPTODEV_RAW_API_TEST) + process_sym_raw_dp_op(ts_params->valid_devs[0], 0, + ut_params->op, 1, 0, 1, 0); + else + ut_params->op = process_crypto_request(ts_params->valid_devs[0], + ut_params->op); + TEST_ASSERT_NOT_NULL(ut_params->op, "failed to retrieve obuf"); + ut_params->obuf = ut_params->op->sym->m_dst; + if (ut_params->obuf) + plaintext = rte_pktmbuf_read(ut_params->obuf, 0, + ciphertext_len, buffer); + else + plaintext = rte_pktmbuf_read(ut_params->ibuf, + tdata->cipher.offset_bits, + ciphertext_len, buffer); + debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len); + reference_plaintext = tdata->plaintext.data + + (tdata->cipher.offset_bits); + /* Validate obuf */ + TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( + plaintext, + reference_plaintext, + tdata->validCipherLenInBits.len, + "MLX5 Plaintext data not as expected"); + /* Validate stats */ + TEST_ASSERT_SUCCESS(rte_cryptodev_stats_get(ts_params->valid_devs[0], + &stats), + "rte_cryptodev_stats_get failed"); + TEST_ASSERT((stats.enqueued_count == 1), + "rte_cryptodev_stats_get returned unexpected enqueued stat"); + TEST_ASSERT((stats.dequeued_count == 1), + "rte_cryptodev_stats_get returned unexpected dequeued stat"); + TEST_ASSERT((stats.enqueue_err_count == 0), + "rte_cryptodev_stats_get returned error enqueued stat"); + TEST_ASSERT((stats.dequeue_err_count == 0), + "rte_cryptodev_stats_get returned error dequeued stat"); + return 0; +} + + static int test_kasumi_encryption_test_case_1(void) { @@ -7345,6 +7558,54 @@ test_mlx5_decryption_test_case_4(void) return test_mlx5_decryption(&mlx5_test_case_cipher_aes_xts_4); } +static int +test_mlx5_encryption_test_case_1_sgl(void) +{ + return test_mlx5_encryption_sgl(&mlx5_test_case_cipher_aes_xts_1); +} + +static int +test_mlx5_encryption_test_case_2_sgl(void) +{ + return test_mlx5_encryption_sgl(&mlx5_test_case_cipher_aes_xts_2); +} + +static int +test_mlx5_encryption_test_case_3_sgl(void) +{ + return test_mlx5_encryption_sgl(&mlx5_test_case_cipher_aes_xts_3); +} + +static int +test_mlx5_encryption_test_case_4_sgl(void) +{ + return test_mlx5_encryption_sgl(&mlx5_test_case_cipher_aes_xts_4); +} + +static int +test_mlx5_decryption_test_case_1_sgl(void) +{ + return test_mlx5_decryption_sgl(&mlx5_test_case_cipher_aes_xts_1); +} + +static int +test_mlx5_decryption_test_case_2_sgl(void) +{ + return test_mlx5_decryption_sgl(&mlx5_test_case_cipher_aes_xts_2); +} + +static int +test_mlx5_decryption_test_case_3_sgl(void) +{ + return test_mlx5_decryption_sgl(&mlx5_test_case_cipher_aes_xts_3); +} + +static int +test_mlx5_decryption_test_case_4_sgl(void) +{ + return test_mlx5_decryption_sgl(&mlx5_test_case_cipher_aes_xts_4); +} + static int test_mixed_check_if_unsupported(const struct mixed_cipher_auth_test_data *tdata) { @@ -14747,6 +15008,22 @@ static struct unit_test_suite cryptodev_mlx5_testsuite = { test_mlx5_encryption_test_case_3), TEST_CASE_ST(ut_setup, ut_teardown, test_mlx5_encryption_test_case_4), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mlx5_decryption_test_case_1_sgl), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mlx5_decryption_test_case_2_sgl), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mlx5_decryption_test_case_3_sgl), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mlx5_decryption_test_case_4_sgl), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mlx5_encryption_test_case_1_sgl), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mlx5_encryption_test_case_2_sgl), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mlx5_encryption_test_case_3_sgl), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mlx5_encryption_test_case_4_sgl), TEST_CASES_END() } }; diff --git a/app/test/test_cryptodev_mlx5_test_vectors.h b/app/test/test_cryptodev_mlx5_test_vectors.h index 2a05aa4626..db7e5fc744 100644 --- a/app/test/test_cryptodev_mlx5_test_vectors.h +++ b/app/test/test_cryptodev_mlx5_test_vectors.h @@ -2496,7 +2496,4 @@ static struct mlx5_test_data mlx5_test_case_cipher_aes_xts_4 = { .dataunit_len = 0 }; - - - #endif /*TEST_CRYPTODEV_MLX5_TEST_VECTORS_H_*/ -- 2.27.0