* [PATCH 0/2] populate mbuf in latency test
@ 2022-04-08 10:18 Archana Muniganti
2022-04-08 10:18 ` [PATCH 1/2] app/crypto-perf: " Archana Muniganti
2022-04-08 10:18 ` [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM Archana Muniganti
0 siblings, 2 replies; 8+ messages in thread
From: Archana Muniganti @ 2022-04-08 10:18 UTC (permalink / raw)
To: ciara.power, declan.doherty, gakhil; +Cc: Archana Muniganti, anoobj, dev
For decrypt, ICV mismatch can come as data is dummy and
latency will be calculated for error path. Hence populate
mbuf with test vector data.
Archana Muniganti (2):
app/crypto-perf: populate mbuf in latency test
app/crypto-perf: add vector file for AES-GCM
app/test-crypto-perf/cperf_ops.c | 3 +-
app/test-crypto-perf/cperf_test_common.c | 36 ++++++++
app/test-crypto-perf/cperf_test_common.h | 5 ++
app/test-crypto-perf/cperf_test_latency.c | 6 ++
app/test-crypto-perf/cperf_test_verify.c | 36 --------
app/test-crypto-perf/data/aes_gcm_128.data | 97 ++++++++++++++++++++++
6 files changed, 146 insertions(+), 37 deletions(-)
create mode 100644 app/test-crypto-perf/data/aes_gcm_128.data
--
2.22.0
^ permalink raw reply [flat|nested] 8+ messages in thread
* [PATCH 1/2] app/crypto-perf: populate mbuf in latency test
2022-04-08 10:18 [PATCH 0/2] populate mbuf in latency test Archana Muniganti
@ 2022-04-08 10:18 ` Archana Muniganti
2022-04-29 5:59 ` Akhil Goyal
2022-04-08 10:18 ` [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM Archana Muniganti
1 sibling, 1 reply; 8+ messages in thread
From: Archana Muniganti @ 2022-04-08 10:18 UTC (permalink / raw)
To: ciara.power, declan.doherty, gakhil; +Cc: Archana Muniganti, anoobj, dev
For decrypt, ICV mismatch can come as data is dummy and
latency will be calculated for error path. Hence populate
mbuf with test vector data.
Signed-off-by: Archana Muniganti <marchana@marvell.com>
---
app/test-crypto-perf/cperf_ops.c | 3 +-
app/test-crypto-perf/cperf_test_common.c | 36 +++++++++++++++++++++++
app/test-crypto-perf/cperf_test_common.h | 5 ++++
app/test-crypto-perf/cperf_test_latency.c | 6 ++++
app/test-crypto-perf/cperf_test_verify.c | 36 -----------------------
5 files changed, 49 insertions(+), 37 deletions(-)
diff --git a/app/test-crypto-perf/cperf_ops.c b/app/test-crypto-perf/cperf_ops.c
index 8baee12e45..97b719e13b 100644
--- a/app/test-crypto-perf/cperf_ops.c
+++ b/app/test-crypto-perf/cperf_ops.c
@@ -620,7 +620,8 @@ cperf_set_ops_aead(struct rte_crypto_op **ops,
}
}
- if (options->test == CPERF_TEST_TYPE_VERIFY) {
+ if ((options->test == CPERF_TEST_TYPE_VERIFY) ||
+ (options->test == CPERF_TEST_TYPE_LATENCY)) {
for (i = 0; i < nb_ops; i++) {
uint8_t *iv_ptr = rte_crypto_op_ctod_offset(ops[i],
uint8_t *, iv_offset);
diff --git a/app/test-crypto-perf/cperf_test_common.c b/app/test-crypto-perf/cperf_test_common.c
index 97a1ea47ad..00aadc9a47 100644
--- a/app/test-crypto-perf/cperf_test_common.c
+++ b/app/test-crypto-perf/cperf_test_common.c
@@ -262,3 +262,39 @@ cperf_alloc_common_memory(const struct cperf_options *options,
return 0;
}
+
+void
+cperf_mbuf_set(struct rte_mbuf *mbuf,
+ const struct cperf_options *options,
+ const struct cperf_test_vector *test_vector)
+{
+ uint32_t segment_sz = options->segment_sz;
+ uint8_t *mbuf_data;
+ uint8_t *test_data;
+ uint32_t remaining_bytes = options->max_buffer_size;
+
+ if (options->op_type == CPERF_AEAD) {
+ test_data = (options->aead_op == RTE_CRYPTO_AEAD_OP_ENCRYPT) ?
+ test_vector->plaintext.data :
+ test_vector->ciphertext.data;
+ } else {
+ test_data =
+ (options->cipher_op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) ?
+ test_vector->plaintext.data :
+ test_vector->ciphertext.data;
+ }
+
+ while (remaining_bytes) {
+ mbuf_data = rte_pktmbuf_mtod(mbuf, uint8_t *);
+
+ if (remaining_bytes <= segment_sz) {
+ memcpy(mbuf_data, test_data, remaining_bytes);
+ return;
+ }
+
+ memcpy(mbuf_data, test_data, segment_sz);
+ remaining_bytes -= segment_sz;
+ test_data += segment_sz;
+ mbuf = mbuf->next;
+ }
+}
diff --git a/app/test-crypto-perf/cperf_test_common.h b/app/test-crypto-perf/cperf_test_common.h
index 3ace0d2e58..a603a607d5 100644
--- a/app/test-crypto-perf/cperf_test_common.h
+++ b/app/test-crypto-perf/cperf_test_common.h
@@ -21,4 +21,9 @@ cperf_alloc_common_memory(const struct cperf_options *options,
uint32_t *dst_buf_offset,
struct rte_mempool **pool);
+void
+cperf_mbuf_set(struct rte_mbuf *mbuf,
+ const struct cperf_options *options,
+ const struct cperf_test_vector *test_vector);
+
#endif /* _CPERF_TEST_COMMON_H_ */
diff --git a/app/test-crypto-perf/cperf_test_latency.c b/app/test-crypto-perf/cperf_test_latency.c
index 9ada431660..6f972cea49 100644
--- a/app/test-crypto-perf/cperf_test_latency.c
+++ b/app/test-crypto-perf/cperf_test_latency.c
@@ -201,6 +201,12 @@ cperf_latency_test_runner(void *arg)
ctx->test_vector, iv_offset,
&imix_idx, &tsc_start);
+ /* Populate the mbuf with the test vector */
+ for (i = 0; i < burst_size; i++)
+ cperf_mbuf_set(ops[i]->sym->m_src,
+ ctx->options,
+ ctx->test_vector);
+
tsc_start = rte_rdtsc_precise();
#ifdef CPERF_LINEARIZATION_ENABLE
diff --git a/app/test-crypto-perf/cperf_test_verify.c b/app/test-crypto-perf/cperf_test_verify.c
index c031330afc..5c0dc82290 100644
--- a/app/test-crypto-perf/cperf_test_verify.c
+++ b/app/test-crypto-perf/cperf_test_verify.c
@@ -195,42 +195,6 @@ cperf_verify_op(struct rte_crypto_op *op,
return !!res;
}
-static void
-cperf_mbuf_set(struct rte_mbuf *mbuf,
- const struct cperf_options *options,
- const struct cperf_test_vector *test_vector)
-{
- uint32_t segment_sz = options->segment_sz;
- uint8_t *mbuf_data;
- uint8_t *test_data;
- uint32_t remaining_bytes = options->max_buffer_size;
-
- if (options->op_type == CPERF_AEAD) {
- test_data = (options->aead_op == RTE_CRYPTO_AEAD_OP_ENCRYPT) ?
- test_vector->plaintext.data :
- test_vector->ciphertext.data;
- } else {
- test_data =
- (options->cipher_op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) ?
- test_vector->plaintext.data :
- test_vector->ciphertext.data;
- }
-
- while (remaining_bytes) {
- mbuf_data = rte_pktmbuf_mtod(mbuf, uint8_t *);
-
- if (remaining_bytes <= segment_sz) {
- memcpy(mbuf_data, test_data, remaining_bytes);
- return;
- }
-
- memcpy(mbuf_data, test_data, segment_sz);
- remaining_bytes -= segment_sz;
- test_data += segment_sz;
- mbuf = mbuf->next;
- }
-}
-
int
cperf_verify_test_runner(void *test_ctx)
{
--
2.22.0
^ permalink raw reply [flat|nested] 8+ messages in thread
* [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM
2022-04-08 10:18 [PATCH 0/2] populate mbuf in latency test Archana Muniganti
2022-04-08 10:18 ` [PATCH 1/2] app/crypto-perf: " Archana Muniganti
@ 2022-04-08 10:18 ` Archana Muniganti
2022-04-29 6:01 ` Akhil Goyal
1 sibling, 1 reply; 8+ messages in thread
From: Archana Muniganti @ 2022-04-08 10:18 UTC (permalink / raw)
To: ciara.power, declan.doherty, gakhil; +Cc: Archana Muniganti, anoobj, dev
Added test vector file for AES-128-GCM for
64B and 512B length buffers.
Signed-off-by: Archana Muniganti <marchana@marvell.com>
---
app/test-crypto-perf/data/aes_gcm_128.data | 97 ++++++++++++++++++++++
1 file changed, 97 insertions(+)
create mode 100644 app/test-crypto-perf/data/aes_gcm_128.data
diff --git a/app/test-crypto-perf/data/aes_gcm_128.data b/app/test-crypto-perf/data/aes_gcm_128.data
new file mode 100644
index 0000000000..197f0aa99d
--- /dev/null
+++ b/app/test-crypto-perf/data/aes_gcm_128.data
@@ -0,0 +1,97 @@
+# List of tests for AES-128 GCM:
+# 1) [aead_buff_64]
+# 2) [aead_buff_512]
+
+##########
+# GLOBAL #
+##########
+plaintext =
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
+0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa
+
+ciphertext =
+0x4c, 0x35, 0x11, 0xb6, 0x13, 0xcf, 0x34, 0x22, 0x1d, 0x33, 0xbd, 0x9b, 0x75, 0xad, 0x5e, 0x33,
+0xa5, 0x77, 0xda, 0xfb, 0x7e, 0x57, 0x20, 0x3d, 0xc5, 0xe8, 0x19, 0x3a, 0x92, 0x59, 0xfb, 0xc5,
+0xff, 0x47, 0x49, 0x8e, 0xcb, 0x4f, 0x8e, 0x6c, 0xcd, 0x9f, 0x81, 0x27, 0xa4, 0xac, 0xaa, 0xe1,
+0xd0, 0x6a, 0xb0, 0x96, 0x05, 0x68, 0x8e, 0xe8, 0x44, 0x63, 0x12, 0x2a, 0xef, 0x3d, 0xc3, 0xf9,
+0xcf, 0xd6, 0x31, 0x04, 0x88, 0xbb, 0xfb, 0xe0, 0x44, 0xcc, 0xef, 0x10, 0xb7, 0xaf, 0x5e, 0x90,
+0x07, 0x10, 0xd8, 0x85, 0x59, 0x99, 0x29, 0x2a, 0xa8, 0x83, 0x21, 0x8d, 0x5f, 0x02, 0xed, 0xa6,
+0x22, 0xa5, 0x9e, 0x09, 0xa6, 0x52, 0x84, 0x88, 0xb8, 0x1f, 0x90, 0x70, 0xab, 0x2c, 0x2c, 0x45,
+0x6f, 0xdc, 0xca, 0x38, 0x3a, 0x11, 0xd0, 0x27, 0x24, 0x09, 0xf8, 0xbf, 0xa2, 0x8f, 0xd3, 0x37,
+0xb4, 0x08, 0x0a, 0x61, 0xb9, 0x77, 0x92, 0xbd, 0x49, 0x36, 0x67, 0xe7, 0xef, 0x81, 0x50, 0x7f,
+0xbb, 0x23, 0x46, 0x4a, 0xb9, 0x34, 0x98, 0xa2, 0xb8, 0x52, 0x86, 0x0e, 0xbd, 0x6d, 0x11, 0x0a,
+0x91, 0x5c, 0x6d, 0x68, 0xea, 0x05, 0x47, 0x93, 0x33, 0x09, 0x28, 0x8a, 0xe5, 0x2f, 0x10, 0x9f,
+0xd9, 0xb8, 0x4c, 0x7c, 0x23, 0x8e, 0x08, 0x03, 0xe5, 0x8b, 0x07, 0xd9, 0x29, 0x52, 0x96, 0x98,
+0xe6, 0x40, 0x55, 0x62, 0xf0, 0x89, 0xbe, 0x97, 0xfe, 0x74, 0x38, 0xc6, 0xc0, 0xaa, 0xe6, 0xcf,
+0x3e, 0x5e, 0x01, 0x79, 0x91, 0x26, 0x99, 0xe4, 0xe0, 0x8c, 0x17, 0xb4, 0xe7, 0x87, 0x07, 0x28,
+0x1b, 0xeb, 0xa7, 0xc2, 0xa6, 0x9c, 0xe2, 0x72, 0xa4, 0x1a, 0xeb, 0x09, 0xf3, 0xdd, 0x39, 0x4c,
+0x11, 0x96, 0x21, 0xc2, 0x36, 0x1e, 0x52, 0xb4, 0x85, 0x5d, 0xf1, 0x65, 0x7e, 0xc4, 0xa7, 0xaa,
+0x0a, 0x75, 0x0f, 0xe8, 0x76, 0xcd, 0x97, 0x64, 0x42, 0x42, 0xb0, 0x1b, 0x09, 0x91, 0x37, 0x0c,
+0xcd, 0xbb, 0x58, 0x4d, 0x96, 0x77, 0xd3, 0x4c, 0x3a, 0x3b, 0x76, 0xf8, 0xe6, 0x8e, 0xdc, 0x2b,
+0x71, 0xf1, 0xdd, 0xc8, 0x1d, 0xb4, 0x0b, 0xa4, 0x0e, 0xe3, 0x6c, 0xc5, 0xef, 0x2d, 0x65, 0x49,
+0x0d, 0xad, 0x12, 0xf6, 0xe8, 0x89, 0x19, 0x04, 0xe8, 0x0d, 0x8f, 0x82, 0xca, 0x84, 0x42, 0x52,
+0xc3, 0xb2, 0x83, 0x4e, 0x65, 0x6b, 0x58, 0xc1, 0x83, 0xb5, 0x1a, 0xcd, 0xf1, 0x50, 0x50, 0x5d,
+0xe9, 0xed, 0x17, 0x61, 0xba, 0x13, 0xff, 0x27, 0xfb, 0xaa, 0xef, 0x1e, 0x7f, 0x71, 0xc3, 0xfd,
+0xc9, 0xeb, 0x94, 0x86, 0x41, 0x9d, 0x10, 0xf9, 0x3a, 0x23, 0x1a, 0x12, 0x0a, 0xc4, 0x4b, 0xec,
+0x25, 0xa4, 0xdb, 0x0c, 0x2a, 0xd2, 0xa4, 0x1e, 0x57, 0x34, 0xb1, 0x62, 0xcb, 0x78, 0x3c, 0xcf,
+0xdc, 0x4d, 0x7a, 0x85, 0x00, 0xf8, 0x2a, 0x5d, 0xb7, 0xdf, 0xdc, 0x47, 0xc9, 0x59, 0x8b, 0x5f,
+0x67, 0x0f, 0x66, 0x50, 0x90, 0x1f, 0xd5, 0xac, 0x1a, 0x05, 0xea, 0x45, 0x76, 0xaf, 0xc3, 0x44,
+0xe5, 0xc8, 0xb0, 0x22, 0x79, 0x24, 0x99, 0x5d, 0x4b, 0x02, 0x9b, 0x47, 0x26, 0xd7, 0xc3, 0x7e,
+0x4c, 0x0d, 0xf1, 0xca, 0xac, 0xaa, 0x76, 0x78, 0x65, 0x8e, 0xd1, 0xac, 0x0a, 0xf3, 0x5a, 0x52,
+0x9e, 0xd4, 0x6c, 0xd4, 0xd9, 0x94, 0x90, 0xc4, 0x63, 0x97, 0x39, 0x0b, 0xeb, 0xcd, 0xd5, 0x9d,
+0x3a, 0x69, 0x0d, 0xf4, 0x8e, 0x30, 0xc7, 0xf7, 0x87, 0x23, 0xd5, 0x9f, 0x83, 0x87, 0xce, 0xe7,
+0x07, 0xd6, 0x39, 0x67, 0xf0, 0x1f, 0xe0, 0xae, 0x78, 0x37, 0xd1, 0xea, 0x16, 0xc0, 0x4f, 0x47,
+0xd2, 0x21, 0x2c, 0xc7, 0xc3, 0X94, 0xfc, 0x88, 0x8a, 0xd5, 0xd6, 0xee, 0xf6, 0xb1, 0x0f, 0x79
+
+aead_key =
+0xd9, 0x52, 0x98, 0x40, 0x20, 0x0e, 0x1c, 0x17, 0x72, 0x5a, 0xb5, 0x2c, 0x9c, 0x92, 0x76, 0x37
+
+aead_iv =
+0x6e, 0x9a, 0x63, 0x9d, 0x4a, 0xec, 0xc2, 0x55, 0x30, 0xa8, 0xad, 0x75
+
+aad =
+0x47, 0x2a, 0x6f, 0x4e, 0x77, 0x71, 0xca, 0x39, 0x1e, 0x42, 0x06, 0x50, 0x30, 0xdb, 0x3f, 0xf4
+
+#################
+# aead_buff_64 #
+#################
+[aead_buff_64]
+digest =
+0x4b, 0x84, 0x64, 0x63, 0x82, 0x0a, 0x4a, 0xb0, 0xea, 0xee, 0x50, 0x55, 0xea, 0x94, 0x9c, 0x08
+
+#################
+# aead_buff_512 #
+#################
+[aead_buff_512]
+digest =
+0x9a, 0x09, 0x0c, 0xdd, 0x42, 0x7f, 0xe1, 0x14, 0x9f, 0x09, 0x2c, 0x87, 0xbe, 0xf5, 0x93, 0x24
--
2.22.0
^ permalink raw reply [flat|nested] 8+ messages in thread
* RE: [PATCH 1/2] app/crypto-perf: populate mbuf in latency test
2022-04-08 10:18 ` [PATCH 1/2] app/crypto-perf: " Archana Muniganti
@ 2022-04-29 5:59 ` Akhil Goyal
2022-04-29 9:35 ` Akhil Goyal
0 siblings, 1 reply; 8+ messages in thread
From: Akhil Goyal @ 2022-04-29 5:59 UTC (permalink / raw)
To: Archana Muniganti, ciara.power, declan.doherty
Cc: Archana Muniganti, Anoob Joseph, dev
> Subject: [PATCH 1/2] app/crypto-perf: populate mbuf in latency test
>
> For decrypt, ICV mismatch can come as data is dummy and
> latency will be calculated for error path. Hence populate
> mbuf with test vector data.
>
> Signed-off-by: Archana Muniganti <marchana@marvell.com>
Acked-by: Akhil Goyal <gakhil@marvell.com>
^ permalink raw reply [flat|nested] 8+ messages in thread
* RE: [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM
2022-04-08 10:18 ` [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM Archana Muniganti
@ 2022-04-29 6:01 ` Akhil Goyal
2022-04-29 9:21 ` Archana Muniganti
0 siblings, 1 reply; 8+ messages in thread
From: Akhil Goyal @ 2022-04-29 6:01 UTC (permalink / raw)
To: Archana Muniganti, ciara.power, declan.doherty
Cc: Archana Muniganti, Anoob Joseph, dev
> Subject: [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM
>
> Added test vector file for AES-128-GCM for
> 64B and 512B length buffers.
>
> Signed-off-by: Archana Muniganti <marchana@marvell.com>
From where are these vectors taken?
^ permalink raw reply [flat|nested] 8+ messages in thread
* RE: [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM
2022-04-29 6:01 ` Akhil Goyal
@ 2022-04-29 9:21 ` Archana Muniganti
2022-04-29 9:31 ` Akhil Goyal
0 siblings, 1 reply; 8+ messages in thread
From: Archana Muniganti @ 2022-04-29 9:21 UTC (permalink / raw)
To: Akhil Goyal, ciara.power, declan.doherty; +Cc: Anoob Joseph, dev
Hi Akhil,
Please see inline.
Thanks,
Archana
> -----Original Message-----
> From: Akhil Goyal <gakhil@marvell.com>
> Sent: Friday, April 29, 2022 11:31 AM
> To: Archana Muniganti <marchana@marvell.com>; ciara.power@intel.com;
> declan.doherty@intel.com
> Cc: Archana Muniganti <marchana@marvell.com>; Anoob Joseph
> <anoobj@marvell.com>; dev@dpdk.org
> Subject: RE: [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM
>
> > Subject: [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM
> >
> > Added test vector file for AES-128-GCM for 64B and 512B length
> > buffers.
> >
> > Signed-off-by: Archana Muniganti <marchana@marvell.com>
> From where are these vectors taken?
[Archana] The test vectors are self generated from a fips complaint device.
^ permalink raw reply [flat|nested] 8+ messages in thread
* RE: [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM
2022-04-29 9:21 ` Archana Muniganti
@ 2022-04-29 9:31 ` Akhil Goyal
0 siblings, 0 replies; 8+ messages in thread
From: Akhil Goyal @ 2022-04-29 9:31 UTC (permalink / raw)
To: Archana Muniganti, ciara.power, declan.doherty; +Cc: Anoob Joseph, dev
> > Subject: RE: [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM
> >
> > > Subject: [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM
> > >
> > > Added test vector file for AES-128-GCM for 64B and 512B length
> > > buffers.
> > >
> > > Signed-off-by: Archana Muniganti <marchana@marvell.com>
> > From where are these vectors taken?
> [Archana] The test vectors are self generated from a fips complaint device.
OK
Acked-by: Akhil Goyal <gakhil@marvell.com>
^ permalink raw reply [flat|nested] 8+ messages in thread
* RE: [PATCH 1/2] app/crypto-perf: populate mbuf in latency test
2022-04-29 5:59 ` Akhil Goyal
@ 2022-04-29 9:35 ` Akhil Goyal
0 siblings, 0 replies; 8+ messages in thread
From: Akhil Goyal @ 2022-04-29 9:35 UTC (permalink / raw)
To: Archana Muniganti, ciara.power, declan.doherty
Cc: Archana Muniganti, Anoob Joseph, dev
>
> > Subject: [PATCH 1/2] app/crypto-perf: populate mbuf in latency test
> >
> > For decrypt, ICV mismatch can come as data is dummy and
> > latency will be calculated for error path. Hence populate
> > mbuf with test vector data.
> >
> > Signed-off-by: Archana Muniganti <marchana@marvell.com>
> Acked-by: Akhil Goyal <gakhil@marvell.com>
Series Applied to dpdk-next-crypto
Thanks.
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2022-04-29 9:35 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-04-08 10:18 [PATCH 0/2] populate mbuf in latency test Archana Muniganti
2022-04-08 10:18 ` [PATCH 1/2] app/crypto-perf: " Archana Muniganti
2022-04-29 5:59 ` Akhil Goyal
2022-04-29 9:35 ` Akhil Goyal
2022-04-08 10:18 ` [PATCH 2/2] app/crypto-perf: add vector file for AES-GCM Archana Muniganti
2022-04-29 6:01 ` Akhil Goyal
2022-04-29 9:21 ` Archana Muniganti
2022-04-29 9:31 ` Akhil Goyal
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).