From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 2622FA00C2; Wed, 4 Jan 2023 16:10:11 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id C01874067B; Wed, 4 Jan 2023 16:10:10 +0100 (CET) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by mails.dpdk.org (Postfix) with ESMTP id A1D0540041 for ; Wed, 4 Jan 2023 16:10:07 +0100 (CET) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 304CfF4q008917; Wed, 4 Jan 2023 07:10:06 -0800 Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2101.outbound.protection.outlook.com [104.47.70.101]) by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3mw9p50e7g-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 04 Jan 2023 07:10:06 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=J0TqAxQBWGQqNe0BwKvuo9Wb9cNgx4ryo3RBnY9a3KbO05+2mhmeB3QW+mV/mOKqtVsNvKZf8KlgN1KUyNxCjRuhQsNtPMF7Q0Vz9H3+9ntMASD9CW76pdxd2yCTe/Vx926YTISyf7G6J5BrmtKLhJXGfH0vU6rPaJhJesFaHj/DpVMv6FR8ks+i836VbYM/z2bCVhZD8Y/KIsG6vyi5ygIYkRl0mOGqEsipNSzRsm0zBdF52lAMzAFRpyCv43w7QumpzpW8nKqeMn37XfbzcqpBIoysHnMLkGCv7HVkkL2JWj8Kz/O4S14wUOWW4TRtfFoEIQSAOIjwCBTnSYI3mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=S32sZwpjH7Y27l6wcjbByxMEiM4D7eASRorRyvsrctQ=; b=J1o848WBaQbHg07gufUhHST42q8lOVQF5c5+KDkCAIw3IbnI2jIIofIEHc0azIAheI5JL7KwRCOE/0aS1c/X/x3+bNeLGtBzYf/FYPPJK3Qbd+QweDCTl4oZkNaU/+QPL2BTF90GM8niJIQ8L+RTXzLoVXe7tHKEdbShfy/3zKYHWA0HNs7DT8jHUXqmztA9z0f0hZ6SdU8BMMPRibNb2jk/Dno/t2A427/6THdqgSD+pBYiEP0FLze6CCTYnwfaWC///x5Yb6XyA1/OhzPKVeubL59UOpvvf+waC7NCy4fzCAHiubAUxlisgbNMYNbjtpF2RyujwdmU3O7Yt28NRw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.onmicrosoft.com; s=selector1-marvell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=S32sZwpjH7Y27l6wcjbByxMEiM4D7eASRorRyvsrctQ=; b=spmyYbG54fAukWwkmn6qHSMt3MZK6bNCZUbVQyRyMlB2FILVOS6gZBUih5xlzSXulP3u6CLCaiWkbQjnHfKkCPgFEjdGdUBwAH28Wq/TEvROkNvsdjagn2LmlbXqBzrpz7wdlGUYZFZgCiSzx8O9z6HXLXoh+a3C/ygAJVgZJvU= Received: from PH0PR18MB3864.namprd18.prod.outlook.com (2603:10b6:510:26::6) by MN2PR18MB3591.namprd18.prod.outlook.com (2603:10b6:208:264::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5944.19; Wed, 4 Jan 2023 15:09:58 +0000 Received: from PH0PR18MB3864.namprd18.prod.outlook.com ([fe80::f5e5:cf50:7214:3144]) by PH0PR18MB3864.namprd18.prod.outlook.com ([fe80::f5e5:cf50:7214:3144%4]) with mapi id 15.20.5944.019; Wed, 4 Jan 2023 15:09:58 +0000 From: Tejasree Kondoj To: Ciara Power , Akhil Goyal , Fan Zhang CC: "dev@dpdk.org" , "kai.ji@intel.com" Subject: RE: [EXT] [PATCH v2] test/crypto: add further ZUC testcases Thread-Topic: [EXT] [PATCH v2] test/crypto: add further ZUC testcases Thread-Index: AQHZFUgrT/jfZ5B2fkWSf8k+3F09ea6Ochsg Date: Wed, 4 Jan 2023 15:09:58 +0000 Message-ID: References: <20221221140451.75074-1-ciara.power@intel.com> <20221221142554.129074-1-ciara.power@intel.com> In-Reply-To: <20221221142554.129074-1-ciara.power@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-dg-rorf: true x-dg-ref: =?us-ascii?Q?PG1ldGE+PGF0IG5tPSJib2R5LnR4dCIgcD0iYzpcdXNlcnNca3RlamFzcmVl?= =?us-ascii?Q?XGFwcGRhdGFccm9hbWluZ1wwOWQ4NDliNi0zMmQzLTRhNDAtODVlZS02Yjg0?= =?us-ascii?Q?YmEyOWUzNWJcbXNnc1xtc2ctZDc1NzgxMjEtOGM0MS0xMWVkLTk0YmQtNDhh?= =?us-ascii?Q?NDcyMWI2MzIxXGFtZS10ZXN0XGQ3NTc4MTIzLThjNDEtMTFlZC05NGJkLTQ4?= =?us-ascii?Q?YTQ3MjFiNjMyMWJvZHkudHh0IiBzej0iMjQxMDIiIHQ9IjEzMzE3MzE4NTk0?= =?us-ascii?Q?MjIyMjc1MCIgaD0iTlhCSTlsd2h3a1F1S3pmc3FuSW80TUdCK3V3PSIgaWQ9?= =?us-ascii?Q?IiIgYmw9IjAiIGJvPSIxIiBjaT0iY0FBQUFFUkhVMVJTUlVGTkNnVUFBTmdI?= =?us-ascii?Q?QUFDZWQ3R1pUaURaQVdLV1Facmo2T2lKWXBaQm11UG82SWtNQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUhBQUFBQm9Cd0FBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUVBQVFBQkFBQUEzVHpGQUFBQUFBQUFBQUFBQUFBQUFKNEFBQUJoQUdR?= =?us-ascii?Q?QVpBQnlBR1VBY3dCekFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBRUFBQUFBQUFBQUFnQUFBQUFBbmdBQUFHTUFkUUJ6QUhRQWJ3QnRBRjhB?= =?us-ascii?Q?Y0FCbEFISUFjd0J2QUc0QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBd0FBQUFBQUFBQUFBQUFBQVFBQUFBQUFBQUFD?= =?us-ascii?Q?QUFBQUFBQ2VBQUFBWXdCMUFITUFkQUJ2QUcwQVh3QndBR2dBYndCdUFHVUFi?= =?us-ascii?Q?Z0IxQUcwQVlnQmxBSElBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQkFBQUFBQUFBQUFBQUFBQUJBQUFBQUFBQUFBSUFBQUFBQUo0QUFBQmpB?= =?us-ascii?Q?SFVBY3dCMEFHOEFiUUJmQUhNQWN3QnVBRjhBWkFCaEFITUFhQUJmQUhZQU1B?= =?us-ascii?Q?QXlBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-refone: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFFQUFBQUFBQUFBQWdBQUFBQUFuZ0FB?= =?us-ascii?Q?QUdNQWRRQnpBSFFBYndCdEFGOEFjd0J6QUc0QVh3QnJBR1VBZVFCM0FHOEFj?= =?us-ascii?Q?Z0JrQUhNQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBUUFBQUFBQUFBQUNBQUFBQUFDZUFBQUFZd0IxQUhNQWRBQnZB?= =?us-ascii?Q?RzBBWHdCekFITUFiZ0JmQUc0QWJ3QmtBR1VBYkFCcEFHMEFhUUIwQUdVQWNn?= =?us-ascii?Q?QmZBSFlBTUFBeUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQkFBQUFB?= =?us-ascii?Q?QUFBQUFJQUFBQUFBSjRBQUFCakFIVUFjd0IwQUc4QWJRQmZBSE1BY3dCdUFG?= =?us-ascii?Q?OEFjd0J3QUdFQVl3QmxBRjhBZGdBd0FESUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUVBQUFBQUFBQUFBZ0FBQUFBQW5n?= =?us-ascii?Q?QUFBR1FBYkFCd0FGOEFjd0JyQUhrQWNBQmxBRjhBWXdCb0FHRUFkQUJmQUcw?= =?us-ascii?Q?QVpRQnpBSE1BWVFCbkFHVUFYd0IyQURBQU1nQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFRQUFBQUFBQUFBQ0FBQUFBQUNlQUFBQVpBQnNBSEFBWHdC?= =?us-ascii?Q?ekFHd0FZUUJqQUdzQVh3QmpBR2dBWVFCMEFGOEFiUUJsQUhNQWN3QmhBR2NB?= =?us-ascii?Q?WlFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-reftwo: 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 x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PH0PR18MB3864:EE_|MN2PR18MB3591:EE_ x-ms-office365-filtering-correlation-id: 0df9bdea-3a64-42da-7035-08daee65bec8 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: fDyoNu7YzlZpcqIgStj51qIqyxHXhigoH56CpChQJ3tm/iorSXY5IDETpOeTS6/fFTjXLGLjsWrcPdGnU/FV0cZV774Iiu+LsML5MUMNl4hgCYJXWgFCMTt1svtutyI4vEtgyiS9noq2LJTAgkA0jwY8L7kaMV7ON7nKZSAyCvmBG6XKhe2CpqwfuPGTewX6PzwVYj7LAvXF9+GIDcT3UADvcytvVY/mlzj/E7a5Ajux5lb8296JaU+sKwC5k26s47jpUTyo2J5xxpSUJpbKoipOCywDXepE4Hwb2UgoGqzH0NtiUg+3K8AhbOx5GdfZE9g5Fij4er1x8MU/DwYo168Xfhg1heZEngOPGD03r9nJ/VJGe1Y2LjqM6h3SAyWngPUjVjYFc6oi5WqV+b54/vEAa3yUaYl8c9Q7+EsvV027w67Fvl6tMoUDn8nKxrGUzDWT7KvLac6J3VoSzLOdEjxvRDMnAT4UynH6UMKBzmLFXm6LJrbaJxOizeKLkOZNd+Nj7BTQE4kX3ai8h8+rMbUPuwDBHDbYLFcjXK8fbvDaE5WIDSa8IPbzpB7HqAbquqhiMKu+kqKOeLErz14GIBLUsPoAryWc20Yz1Frog/VnN0kCadH9nIFF2oG21akU8xKJLTf3gszC8NG+tGf4/gcXrCkNDHIAuNh4ogEzpyJf6BkVoTMqq7Kj9SKevLhJ x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR18MB3864.namprd18.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(136003)(346002)(376002)(39860400002)(366004)(396003)(451199015)(33656002)(5660300002)(122000001)(8936002)(41300700001)(2906002)(38100700002)(52536014)(30864003)(86362001)(38070700005)(83380400001)(54906003)(110136005)(71200400001)(66946007)(66556008)(76116006)(26005)(6506007)(7696005)(478600001)(55016003)(4326008)(66446008)(64756008)(53546011)(66476007)(186003)(9686003)(316002)(8676002)(579004)(559001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?xJjG2z606hEOxv9H8k/ulnCt/YR59sxoX5vGtFwbAxS5Kxc977RT8VGNUWP5?= =?us-ascii?Q?qgte/4l4bH0IM7HOsm/bAfsRksTjH1AOxoHu0QxrWeMckVHyFp/onzSe7XyQ?= =?us-ascii?Q?F8tN2LMbMVH8hk6m6zgmAF8RKn5xVmyIrUPkpLPlPOL1lz2X+tljA8EmrxVp?= =?us-ascii?Q?7DzbC4rk7Xoffmim8S8xr+kcmC+DiVsWJbTQYj+Vwjq1qhB4BDQABiA37gUP?= =?us-ascii?Q?kTMHPB2UCa0vsl2VgZqwxMZMyhuD0DtIc33aX0bSpBP7r/fg2FE1WtP7sOz9?= =?us-ascii?Q?3ClBERVmHi1u6kHPD46kbpPgs63sLzmFWbwJ458d12R2xahKJ762sMf4LM3S?= =?us-ascii?Q?e7IUasFg4DiMHpIhEP4EdX9XVFV9HimSkukbTt08GDbvvoh6bfSF4C5D77fQ?= =?us-ascii?Q?JSEtneLw61P1Mid0hj60n+kVTl+of+MUFG18Grr5Y2ocLj1w0UVGvKBcpF5z?= =?us-ascii?Q?AUPAQsliMjonJ0qhXnGab1FDCTXZhgEftllliEYRjev+LOLDDaDL7aq+tyDf?= =?us-ascii?Q?8TcfOUq5gJ9DcKdEC5Gw9rX9nfRMhAxw5licR5x3V25sDnB2Qfpx9lkG0U+9?= =?us-ascii?Q?eP372Avui9EY6zTifMHDB5LshXwsvN0dUDHjPuFclKX1AFfl3nD/wdUcRrYY?= =?us-ascii?Q?R1Zh9we5t1wF98AFFX8kNBh+3d8Don5hzcC90F7sdR64hmVb+j4npWhwe4JB?= =?us-ascii?Q?EwCG67Gvh8+0xkSpiBzkMrSXCq/F1V3pSp+qmydoQw1H1UgL2Qqisoztcgh6?= =?us-ascii?Q?6pqjwENIW1b3qfWJs/c2y34ulBYqREET1x6+bg+5VVWCdSokTVvgF9kqXRAa?= =?us-ascii?Q?S6M+8JA6ZjKDc220khAetBSLfRgfKFrnjU/XaAOEb8IGDL1UUoq5F7fshLId?= =?us-ascii?Q?UvvgMF6A22tpfBy8cIpZJJF9WkRq2bF7XoPsyG9aaBPo81t6eyssLfjgOlLE?= =?us-ascii?Q?SXI65atwSAoJ6f7SObSqFFrsCGZ07vgoCYeAs9Nxgdcs9S3duGcTiUWdgHWD?= =?us-ascii?Q?DQp1Kigf3fN0eeaaTCvnsDbF4sajdjHfV0JS2qhdmepF3nubku/gJslV3puj?= =?us-ascii?Q?ccQHZIQA5S70P4XjONj6UUjHMSgxNaZ7x1zBhIc+RNdJjNHPZDV1ZYXmhDXN?= =?us-ascii?Q?E+qZKd/9k8lmZboXs1qVJWKgaotQXrBqP179SxpHzxXsUO0znaO2SQacsSOg?= =?us-ascii?Q?h908lza4yBC6F7YTsyo0q/oPgOBXSgJrUtM+QZ1sCLZjIBK7VRf/PWVLk5rw?= =?us-ascii?Q?mpbQYUGRgNPhi8j1DfMwL1KKmTXmO+ceMQnqzqPXb4te6YLSrxGMFliHZfhL?= =?us-ascii?Q?vGcoW/8f+MdGisCgceYnva9JGXY2lT+lUxa3E8sLZS/DUsoFkcjJ2En0T8XB?= =?us-ascii?Q?W9hRAj5QuBTN1MdzBZ9LD1KIgaeFUNW3JkiPKLzxXST3sm2yCx5O5J5v5q2i?= =?us-ascii?Q?rqXyP8bAQmJZxKOqLgXQ9qRZULWg/AuAEHDTNAp+OKQtJaW7hfTfqUlg7kz7?= =?us-ascii?Q?EQSirUsHBGDy9x0P/s7TFuYix2ZFJtVHx44eIg/4U5/sYhYKVNtEe1auVyfk?= =?us-ascii?Q?LsXOyrF9dVItzyxd8kBXAU34WiX+3ph9UnVtZZkc?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: marvell.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR18MB3864.namprd18.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 0df9bdea-3a64-42da-7035-08daee65bec8 X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jan 2023 15:09:58.6104 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: wZ14wMNZIw3z4FzySmybF1x2r5FjOP5uz+p6CrwyKb9K1ogi6w7Udtu2jy7cAGNif9k+jLHBEdkhLvas75QFdA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR18MB3591 X-Proofpoint-GUID: -ctFbOsYFDYoDigHY0gjscWAiiORD2p0 X-Proofpoint-ORIG-GUID: -ctFbOsYFDYoDigHY0gjscWAiiORD2p0 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.923,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2023-01-04_07,2023-01-04_02,2022-06-22_01 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Acked-by: Tejasree Kondoj > -----Original Message----- > From: Ciara Power > Sent: Wednesday, December 21, 2022 7:56 PM > To: Akhil Goyal ; Fan Zhang > > Cc: dev@dpdk.org; kai.ji@intel.com; Ciara Power > Subject: [EXT] [PATCH v2] test/crypto: add further ZUC testcases >=20 > External Email >=20 > ---------------------------------------------------------------------- > Previously no ZUC decryption only or hash verify testcases existed, only > encryption and authentication. > This commit adds testcases for ZUC 128 and 256 decryption, and hash verif= y. >=20 > Signed-off-by: Ciara Power >=20 > --- > v2: fixed variable initialisation. > --- > app/test/test_cryptodev.c | 446 +++++++++++++++++++++++++++++++------- > 1 file changed, 363 insertions(+), 83 deletions(-) >=20 > diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index > d6ae762df9..4af17d14f7 100644 > --- a/app/test/test_cryptodev.c > +++ b/app/test/test_cryptodev.c > @@ -5950,15 +5950,18 @@ check_auth_capability(const struct > crypto_testsuite_params *ts_params, } >=20 > static int > -test_zuc_encryption(const struct wireless_test_data *tdata) > +test_zuc_cipher(const struct wireless_test_data *tdata, > + enum rte_crypto_cipher_operation direction) > { > struct crypto_testsuite_params *ts_params =3D &testsuite_params; > struct crypto_unittest_params *ut_params =3D &unittest_params; >=20 > int retval; > - uint8_t *plaintext, *ciphertext; > - unsigned plaintext_pad_len; > - unsigned plaintext_len; > + uint8_t *plaintext =3D NULL; > + uint8_t *ciphertext =3D NULL; > + unsigned int plaintext_pad_len, ciphertext_pad_len; > + unsigned int plaintext_len =3D 0; > + unsigned int ciphertext_len =3D 0; > struct rte_cryptodev_info dev_info; >=20 > rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info); @@ - > 5980,7 +5983,7 @@ test_zuc_encryption(const struct wireless_test_data > *tdata) >=20 > /* Create ZUC session */ > retval =3D create_wireless_algo_cipher_session(ts_params- > >valid_devs[0], > - RTE_CRYPTO_CIPHER_OP_ENCRYPT, > + direction, > RTE_CRYPTO_CIPHER_ZUC_EEA3, > tdata->key.data, tdata->key.len, > tdata->cipher_iv.len); > @@ -5993,15 +5996,27 @@ test_zuc_encryption(const struct > wireless_test_data *tdata) > memset(rte_pktmbuf_mtod(ut_params->ibuf, uint8_t *), 0, > rte_pktmbuf_tailroom(ut_params->ibuf)); >=20 > - plaintext_len =3D ceil_byte_length(tdata->plaintext.len); > - /* Append data which is padded to a multiple */ > - /* of the algorithms block size */ > - plaintext_pad_len =3D RTE_ALIGN_CEIL(plaintext_len, 8); > - plaintext =3D (uint8_t *)rte_pktmbuf_append(ut_params->ibuf, > + if (direction =3D=3D RTE_CRYPTO_CIPHER_OP_ENCRYPT) { > + plaintext_len =3D ceil_byte_length(tdata->plaintext.len); > + /* Append data which is padded to a multiple */ > + /* of the algorithms block size */ > + plaintext_pad_len =3D RTE_ALIGN_CEIL(plaintext_len, 8); > + plaintext =3D (uint8_t *)rte_pktmbuf_append(ut_params->ibuf, > plaintext_pad_len); > - memcpy(plaintext, tdata->plaintext.data, plaintext_len); > + memcpy(plaintext, tdata->plaintext.data, plaintext_len); >=20 > - debug_hexdump(stdout, "plaintext:", plaintext, plaintext_len); > + debug_hexdump(stdout, "plaintext:", plaintext, > plaintext_len); > + } else { > + ciphertext_len =3D ceil_byte_length(tdata->ciphertext.len); > + /* Append data which is padded to a multiple */ > + /* of the algorithms block size */ > + ciphertext_pad_len =3D RTE_ALIGN_CEIL(ciphertext_len, 8); > + ciphertext =3D (uint8_t *)rte_pktmbuf_append(ut_params- > >ibuf, > + ciphertext_pad_len); > + memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len); > + > + debug_hexdump(stdout, "ciphertext:", ciphertext, > ciphertext_len); > + } >=20 > /* Create ZUC operation */ > retval =3D create_wireless_algo_cipher_operation(tdata- > >cipher_iv.data, > @@ -6020,34 +6035,57 @@ test_zuc_encryption(const struct > wireless_test_data *tdata) > TEST_ASSERT_NOT_NULL(ut_params->op, "failed to retrieve obuf"); >=20 > ut_params->obuf =3D ut_params->op->sym->m_dst; > - if (ut_params->obuf) > - ciphertext =3D rte_pktmbuf_mtod(ut_params->obuf, uint8_t *); > - else > - ciphertext =3D plaintext; >=20 > - debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > + if (direction =3D=3D RTE_CRYPTO_CIPHER_OP_ENCRYPT) { > + if (ut_params->obuf) > + ciphertext =3D rte_pktmbuf_mtod(ut_params->obuf, > uint8_t *); > + else > + ciphertext =3D plaintext; > + > + debug_hexdump(stdout, "ciphertext:", ciphertext, > plaintext_len); > + > + /* Validate obuf */ > + TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > + ciphertext, > + tdata->ciphertext.data, > + tdata->validCipherLenInBits.len, > + "ZUC Ciphertext data not as expected"); > + } else { > + if (ut_params->obuf) > + plaintext =3D rte_pktmbuf_mtod(ut_params->obuf, > uint8_t *); > + else > + plaintext =3D ciphertext; > + > + debug_hexdump(stdout, "plaintext:", plaintext, > ciphertext_len); > + > + const uint8_t *reference_plaintext =3D tdata->plaintext.data + > + (tdata->validCipherOffsetInBits.len); > + > + /* Validate obuf */ > + TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > + plaintext, > + reference_plaintext, > + tdata->validCipherLenInBits.len, > + "ZUC Plaintext data not as expected"); > + } >=20 > - /* Validate obuf */ > - TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > - ciphertext, > - tdata->ciphertext.data, > - tdata->validCipherLenInBits.len, > - "ZUC Ciphertext data not as expected"); > return 0; > } >=20 > static int > -test_zuc_encryption_sgl(const struct wireless_test_data *tdata) > +test_zuc_cipher_sgl(const struct wireless_test_data *tdata, > + enum rte_crypto_cipher_operation direction) > { > struct crypto_testsuite_params *ts_params =3D &testsuite_params; > struct crypto_unittest_params *ut_params =3D &unittest_params; >=20 > int retval; >=20 > - unsigned int plaintext_pad_len; > - unsigned int plaintext_len; > - const uint8_t *ciphertext; > - uint8_t ciphertext_buffer[2048]; > + unsigned int plaintext_pad_len, ciphertext_pad_len; > + unsigned int plaintext_len =3D 0; > + unsigned int ciphertext_len =3D 0; > + const uint8_t *ciphertext, *plaintext; > + uint8_t ciphertext_buffer[2048], plaintext_buffer[2048]; > struct rte_cryptodev_info dev_info; >=20 > /* Check if device supports ZUC EEA3 */ @@ -6074,21 +6112,36 @@ > test_zuc_encryption_sgl(const struct wireless_test_data *tdata) > return TEST_SKIPPED; > } >=20 > - plaintext_len =3D ceil_byte_length(tdata->plaintext.len); > + if (direction =3D=3D RTE_CRYPTO_CIPHER_OP_ENCRYPT) { > + plaintext_len =3D ceil_byte_length(tdata->plaintext.len); >=20 > - /* Append data which is padded to a multiple */ > - /* of the algorithms block size */ > - plaintext_pad_len =3D RTE_ALIGN_CEIL(plaintext_len, 8); > + /* Append data which is padded to a multiple */ > + /* of the algorithms block size */ > + plaintext_pad_len =3D RTE_ALIGN_CEIL(plaintext_len, 8); >=20 > - ut_params->ibuf =3D create_segmented_mbuf(ts_params->mbuf_pool, > - plaintext_pad_len, 10, 0); > + ut_params->ibuf =3D create_segmented_mbuf(ts_params- > >mbuf_pool, > + plaintext_pad_len, 10, 0); >=20 > - pktmbuf_write(ut_params->ibuf, 0, plaintext_len, > - tdata->plaintext.data); > + pktmbuf_write(ut_params->ibuf, 0, plaintext_len, > + tdata->plaintext.data); > + } else { > + ciphertext_len =3D ceil_byte_length(tdata->ciphertext.len); > + > + /* Append data which is padded to a multiple */ > + /* of the algorithms block size */ > + ciphertext_pad_len =3D RTE_ALIGN_CEIL(ciphertext_len, 8); > + > + ut_params->ibuf =3D create_segmented_mbuf(ts_params- > >mbuf_pool, > + ciphertext_pad_len, 10, 0); > + > + pktmbuf_write(ut_params->ibuf, 0, ciphertext_len, > + tdata->ciphertext.data); > + > + } >=20 > /* Create ZUC session */ > retval =3D create_wireless_algo_cipher_session(ts_params- > >valid_devs[0], > - RTE_CRYPTO_CIPHER_OP_ENCRYPT, > + direction, > RTE_CRYPTO_CIPHER_ZUC_EEA3, > tdata->key.data, tdata->key.len, > tdata->cipher_iv.len); > @@ -6096,8 +6149,10 @@ test_zuc_encryption_sgl(const struct > wireless_test_data *tdata) > return retval; >=20 > /* Clear mbuf payload */ > - > - pktmbuf_write(ut_params->ibuf, 0, plaintext_len, tdata- > >plaintext.data); > + if (direction =3D=3D RTE_CRYPTO_CIPHER_OP_ENCRYPT) > + pktmbuf_write(ut_params->ibuf, 0, plaintext_len, tdata- > >plaintext.data); > + else > + pktmbuf_write(ut_params->ibuf, 0, ciphertext_len, > +tdata->ciphertext.data); >=20 > /* Create ZUC operation */ > retval =3D create_wireless_algo_cipher_operation(tdata- > >cipher_iv.data, > @@ -6115,28 +6170,48 @@ test_zuc_encryption_sgl(const struct > wireless_test_data *tdata) > TEST_ASSERT_NOT_NULL(ut_params->op, "failed to retrieve obuf"); >=20 > ut_params->obuf =3D ut_params->op->sym->m_dst; > - if (ut_params->obuf) > - ciphertext =3D rte_pktmbuf_read(ut_params->obuf, > - 0, plaintext_len, ciphertext_buffer); > - else > - ciphertext =3D rte_pktmbuf_read(ut_params->ibuf, > - 0, plaintext_len, ciphertext_buffer); >=20 > - /* Validate obuf */ > - debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len); > + if (direction =3D=3D RTE_CRYPTO_CIPHER_OP_ENCRYPT) { > + if (ut_params->obuf) > + ciphertext =3D rte_pktmbuf_read(ut_params->obuf, > + 0, plaintext_len, ciphertext_buffer); > + else > + ciphertext =3D rte_pktmbuf_read(ut_params->ibuf, > + 0, plaintext_len, ciphertext_buffer); >=20 > - /* Validate obuf */ > - TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > - ciphertext, > - tdata->ciphertext.data, > - tdata->validCipherLenInBits.len, > - "ZUC Ciphertext data not as expected"); > + /* Validate obuf */ > + debug_hexdump(stdout, "ciphertext:", ciphertext, > plaintext_len); > + > + /* Validate obuf */ > + TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > + ciphertext, > + tdata->ciphertext.data, > + tdata->validCipherLenInBits.len, > + "ZUC Ciphertext data not as expected"); > + } else { > + if (ut_params->obuf) > + plaintext =3D rte_pktmbuf_read(ut_params->obuf, > + 0, ciphertext_len, plaintext_buffer); > + else > + plaintext =3D rte_pktmbuf_read(ut_params->ibuf, > + 0, ciphertext_len, plaintext_buffer); > + > + /* Validate obuf */ > + debug_hexdump(stdout, "plaintext:", plaintext, > ciphertext_len); > + > + /* Validate obuf */ > + TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT( > + plaintext, > + tdata->plaintext.data, > + tdata->validCipherLenInBits.len, > + "ZUC Plaintext data not as expected"); > + } >=20 > return 0; > } >=20 > static int > -test_zuc_authentication(const struct wireless_test_data *tdata) > +test_zuc_authentication(const struct wireless_test_data *tdata, uint8_t > +verify) > { > struct crypto_testsuite_params *ts_params =3D &testsuite_params; > struct crypto_unittest_params *ut_params =3D &unittest_params; @@ > -6176,7 +6251,8 @@ test_zuc_authentication(const struct wireless_test_dat= a > *tdata) > retval =3D create_wireless_algo_hash_session(ts_params- > >valid_devs[0], > tdata->key.data, tdata->key.len, > tdata->auth_iv.len, tdata->digest.len, > - RTE_CRYPTO_AUTH_OP_GENERATE, > + (verify ? RTE_CRYPTO_AUTH_OP_VERIFY > + : > RTE_CRYPTO_AUTH_OP_GENERATE), > RTE_CRYPTO_AUTH_ZUC_EIA3); > if (retval !=3D 0) > return retval; > @@ -6196,9 +6272,12 @@ test_zuc_authentication(const struct > wireless_test_data *tdata) > memcpy(plaintext, tdata->plaintext.data, plaintext_len); >=20 > /* Create ZUC operation */ > - retval =3D create_wireless_algo_hash_operation(NULL, tdata- > >digest.len, > + retval =3D create_wireless_algo_hash_operation(tdata->digest.data, > + tdata->digest.len, > tdata->auth_iv.data, tdata->auth_iv.len, > - plaintext_pad_len, > RTE_CRYPTO_AUTH_OP_GENERATE, > + plaintext_pad_len, > + (verify ? RTE_CRYPTO_AUTH_OP_VERIFY > + : > RTE_CRYPTO_AUTH_OP_GENERATE), > tdata->validAuthLenInBits.len, > 0); > if (retval < 0) > @@ -6215,12 +6294,21 @@ test_zuc_authentication(const struct > wireless_test_data *tdata) > ut_params->digest =3D rte_pktmbuf_mtod(ut_params->obuf, uint8_t *) > + plaintext_pad_len; >=20 > + if (!verify) { > + /* Validate obuf */ > + TEST_ASSERT_BUFFERS_ARE_EQUAL( > + ut_params->digest, > + tdata->digest.data, > + tdata->digest.len, > + "ZUC Generated auth tag not as expected"); > + return 0; > + } > + > /* Validate obuf */ > - TEST_ASSERT_BUFFERS_ARE_EQUAL( > - ut_params->digest, > - tdata->digest.data, > - tdata->digest.len, > - "ZUC Generated auth tag not as expected"); > + if (ut_params->op->status =3D=3D RTE_CRYPTO_OP_STATUS_SUCCESS) > + return 0; > + else > + return -1; >=20 > return 0; > } > @@ -7164,103 +7252,217 @@ test_kasumi_cipher_auth_test_case_1(void) > static int > test_zuc_encryption_test_case_1(void) > { > - return test_zuc_encryption(&zuc_test_case_cipher_193b); > + return test_zuc_cipher(&zuc_test_case_cipher_193b, > + RTE_CRYPTO_CIPHER_OP_ENCRYPT); > } >=20 > static int > test_zuc_encryption_test_case_2(void) > { > - return test_zuc_encryption(&zuc_test_case_cipher_800b); > + return test_zuc_cipher(&zuc_test_case_cipher_800b, > + RTE_CRYPTO_CIPHER_OP_ENCRYPT); > } >=20 > static int > test_zuc_encryption_test_case_3(void) > { > - return test_zuc_encryption(&zuc_test_case_cipher_1570b); > + return test_zuc_cipher(&zuc_test_case_cipher_1570b, > + RTE_CRYPTO_CIPHER_OP_ENCRYPT); > } >=20 > static int > test_zuc_encryption_test_case_4(void) > { > - return test_zuc_encryption(&zuc_test_case_cipher_2798b); > + return test_zuc_cipher(&zuc_test_case_cipher_2798b, > + RTE_CRYPTO_CIPHER_OP_ENCRYPT); > } >=20 > static int > test_zuc_encryption_test_case_5(void) > { > - return test_zuc_encryption(&zuc_test_case_cipher_4019b); > + return test_zuc_cipher(&zuc_test_case_cipher_4019b, > + RTE_CRYPTO_CIPHER_OP_ENCRYPT); > } >=20 > static int > test_zuc_encryption_test_case_6_sgl(void) > { > - return test_zuc_encryption_sgl(&zuc_test_case_cipher_193b); > + return test_zuc_cipher_sgl(&zuc_test_case_cipher_193b, > + RTE_CRYPTO_CIPHER_OP_ENCRYPT); > +} > + > +static int > +test_zuc_decryption_test_case_1(void) > +{ > + return test_zuc_cipher(&zuc_test_case_cipher_193b, > + RTE_CRYPTO_CIPHER_OP_DECRYPT); > +} > + > +static int > +test_zuc_decryption_test_case_2(void) > +{ > + return test_zuc_cipher(&zuc_test_case_cipher_800b, > + RTE_CRYPTO_CIPHER_OP_DECRYPT); > +} > + > +static int > +test_zuc_decryption_test_case_3(void) > +{ > + return test_zuc_cipher(&zuc_test_case_cipher_1570b, > + RTE_CRYPTO_CIPHER_OP_DECRYPT); > +} > + > +static int > +test_zuc_decryption_test_case_4(void) > +{ > + return test_zuc_cipher(&zuc_test_case_cipher_2798b, > + RTE_CRYPTO_CIPHER_OP_DECRYPT); > +} > + > +static int > +test_zuc_decryption_test_case_5(void) > +{ > + return test_zuc_cipher(&zuc_test_case_cipher_4019b, > + RTE_CRYPTO_CIPHER_OP_DECRYPT); > +} > + > +static int > +test_zuc_decryption_test_case_6_sgl(void) > +{ > + return test_zuc_cipher_sgl(&zuc_test_case_cipher_193b, > + RTE_CRYPTO_CIPHER_OP_DECRYPT); > } >=20 > static int > test_zuc_hash_generate_test_case_1(void) > { > - return test_zuc_authentication(&zuc_test_case_auth_1b); > + return test_zuc_authentication(&zuc_test_case_auth_1b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_2(void) > { > - return test_zuc_authentication(&zuc_test_case_auth_90b); > + return test_zuc_authentication(&zuc_test_case_auth_90b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_3(void) > { > - return test_zuc_authentication(&zuc_test_case_auth_577b); > + return test_zuc_authentication(&zuc_test_case_auth_577b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_4(void) > { > - return test_zuc_authentication(&zuc_test_case_auth_2079b); > + return test_zuc_authentication(&zuc_test_case_auth_2079b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_5(void) > { > - return test_zuc_authentication(&zuc_test_auth_5670b); > + return test_zuc_authentication(&zuc_test_auth_5670b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_6(void) > { > - return test_zuc_authentication(&zuc_test_case_auth_128b); > + return test_zuc_authentication(&zuc_test_case_auth_128b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_7(void) > { > - return test_zuc_authentication(&zuc_test_case_auth_2080b); > + return test_zuc_authentication(&zuc_test_case_auth_2080b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_8(void) > { > - return test_zuc_authentication(&zuc_test_case_auth_584b); > + return test_zuc_authentication(&zuc_test_case_auth_584b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_9(void) > { > - return > test_zuc_authentication(&zuc_test_case_auth_4000b_mac_32b); > + return > test_zuc_authentication(&zuc_test_case_auth_4000b_mac_32b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_10(void) > { > - return > test_zuc_authentication(&zuc_test_case_auth_4000b_mac_64b); > + return > test_zuc_authentication(&zuc_test_case_auth_4000b_mac_64b, 0); > } >=20 > static int > test_zuc_hash_generate_test_case_11(void) > { > - return > test_zuc_authentication(&zuc_test_case_auth_4000b_mac_128b); > + return > test_zuc_authentication(&zuc_test_case_auth_4000b_mac_128b, 0); > +} > + > +static int > +test_zuc_hash_verify_test_case_1(void) > +{ > + return test_zuc_authentication(&zuc_test_case_auth_1b, 1); } > + > +static int > +test_zuc_hash_verify_test_case_2(void) > +{ > + return test_zuc_authentication(&zuc_test_case_auth_90b, 1); } > + > +static int > +test_zuc_hash_verify_test_case_3(void) > +{ > + return test_zuc_authentication(&zuc_test_case_auth_577b, 1); } > + > +static int > +test_zuc_hash_verify_test_case_4(void) > +{ > + return test_zuc_authentication(&zuc_test_case_auth_2079b, 1); } > + > +static int > +test_zuc_hash_verify_test_case_5(void) > +{ > + return test_zuc_authentication(&zuc_test_auth_5670b, 1); } > + > +static int > +test_zuc_hash_verify_test_case_6(void) > +{ > + return test_zuc_authentication(&zuc_test_case_auth_128b, 1); } > + > +static int > +test_zuc_hash_verify_test_case_7(void) > +{ > + return test_zuc_authentication(&zuc_test_case_auth_2080b, 1); } > + > +static int > +test_zuc_hash_verify_test_case_8(void) > +{ > + return test_zuc_authentication(&zuc_test_case_auth_584b, 1); } > + > +static int > +test_zuc_hash_verify_test_case_9(void) > +{ > + return > test_zuc_authentication(&zuc_test_case_auth_4000b_mac_32b, 1); > +} > + > +static int > +test_zuc_hash_verify_test_case_10(void) > +{ > + return > test_zuc_authentication(&zuc_test_case_auth_4000b_mac_64b, 1); > +} > + > +static int > +test_zuc_hash_verify_test_case_11(void) > +{ > + return > test_zuc_authentication(&zuc_test_case_auth_4000b_mac_128b, 1); > } >=20 > static int > @@ -7362,25 +7564,53 @@ > test_zuc_auth_cipher_verify_test_case_2_oop(void) > static int > test_zuc256_encryption_test_case_1(void) > { > - return test_zuc_encryption(&zuc256_test_case_cipher_1); > + return test_zuc_cipher(&zuc256_test_case_cipher_1, > + RTE_CRYPTO_CIPHER_OP_ENCRYPT); > } >=20 > static int > test_zuc256_encryption_test_case_2(void) > { > - return test_zuc_encryption(&zuc256_test_case_cipher_2); > + return test_zuc_cipher(&zuc256_test_case_cipher_2, > + RTE_CRYPTO_CIPHER_OP_ENCRYPT); > +} > + > +static int > +test_zuc256_decryption_test_case_1(void) > +{ > + return test_zuc_cipher(&zuc256_test_case_cipher_1, > + RTE_CRYPTO_CIPHER_OP_DECRYPT); > +} > + > +static int > +test_zuc256_decryption_test_case_2(void) > +{ > + return test_zuc_cipher(&zuc256_test_case_cipher_2, > + RTE_CRYPTO_CIPHER_OP_DECRYPT); > } >=20 > static int > test_zuc256_authentication_test_case_1(void) > { > - return test_zuc_authentication(&zuc256_test_case_auth_1); > + return test_zuc_authentication(&zuc256_test_case_auth_1, 0); > } >=20 > static int > test_zuc256_authentication_test_case_2(void) > { > - return test_zuc_authentication(&zuc256_test_case_auth_2); > + return test_zuc_authentication(&zuc256_test_case_auth_2, 0); } > + > +static int > +test_zuc256_authentication_verify_test_case_1(void) > +{ > + return test_zuc_authentication(&zuc256_test_case_auth_1, 1); } > + > +static int > +test_zuc256_authentication_verify_test_case_2(void) > +{ > + return test_zuc_authentication(&zuc256_test_case_auth_2, 1); > } >=20 > static int > @@ -16105,6 +16335,20 @@ static struct unit_test_suite > cryptodev_zuc_testsuite =3D { > TEST_CASE_ST(ut_setup, ut_teardown, > test_zuc_encryption_test_case_6_sgl), >=20 > + /** ZUC decrypt only (EEA3) */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_decryption_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_decryption_test_case_2), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_decryption_test_case_3), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_decryption_test_case_4), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_decryption_test_case_5), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_decryption_test_case_6_sgl), > + > /** ZUC authenticate (EIA3) */ > TEST_CASE_ST(ut_setup, ut_teardown, > test_zuc_hash_generate_test_case_1), > @@ -16129,6 +16373,30 @@ static struct unit_test_suite > cryptodev_zuc_testsuite =3D { > TEST_CASE_ST(ut_setup, ut_teardown, > test_zuc_hash_generate_test_case_11), >=20 > + /** ZUC verify (EIA3) */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_2), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_3), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_4), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_5), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_6), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_7), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_8), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_9), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_10), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc_hash_verify_test_case_11), > + >=20 > /** ZUC alg-chain (EEA3/EIA3) */ > TEST_CASE_ST(ut_setup, ut_teardown, > @@ -16170,12 +16438,24 @@ static struct unit_test_suite > cryptodev_zuc_testsuite =3D { > TEST_CASE_ST(ut_setup, ut_teardown, > test_zuc256_encryption_test_case_2), >=20 > + /** ZUC-256 decrypt only **/ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc256_decryption_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc256_decryption_test_case_2), > + > /** ZUC-256 authentication only **/ > TEST_CASE_ST(ut_setup, ut_teardown, > test_zuc256_authentication_test_case_1), > TEST_CASE_ST(ut_setup, ut_teardown, > test_zuc256_authentication_test_case_2), >=20 > + /** ZUC-256 authentication verify only **/ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc256_authentication_verify_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_zuc256_authentication_verify_test_case_2), > + > TEST_CASES_END() > } > }; > -- > 2.34.1