From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id AC516A0514; Wed, 15 Jan 2020 14:50:20 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id B8BD91BFD1; Wed, 15 Jan 2020 14:50:19 +0100 (CET) Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60073.outbound.protection.outlook.com [40.107.6.73]) by dpdk.org (Postfix) with ESMTP id 469151BFCE for ; Wed, 15 Jan 2020 14:50:18 +0100 (CET) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=A+4jxu5c4gxDoCINuIslzlpqjiwG38cpQtUvX6/ppV9IK0++GPEyCXHK+OR6i1FX3uJH9BfA7Lf/37wsg25COMbqP8bRv1tBVYTGW9NIH9dfyHIokr7ABlifS54V5jozkuY3xmaDMa1QRVOxqNu+gs5A3y6/YU9pq6ZGYkB1CN71TySNcf/x+1/84kqjGTt7POr4Uu7PkR+ZG5B/YTQZx8HNELO9IQCPDvxqwQ3SeP9XA7eEOtz3BWcenK7m9Rx2JYjtH8zWudrvCS2GnOEzqDCKe9hkYz/mkc/mgWwVbKAPAnays249ICh+5k6aa2uAtFXFCYBJOr/YqrXQsCGMBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=72oDo6XAYmep2scD/W/gH0J05pEmtRcPYjRI+KPkltQ=; b=Yf2KvhWcR3Ao+JYbNNIR26sTJmyc2JICem1OMLqrGv4eFjFmhsTBqLHTwob6PBKNVANL5dFk78tn9Xd60TsINsX4z+FSws/nIWRWBBAT/qFemkcjyZodybrIomRq4laHKa8llyVtsbTb3DtG/wvg8xIxfZAelRLUaZgnUO231Q+f/PhwBN+yDEBPlnwf6wF4/3N0sJik8k8gaK5JpbNhYDu2FscSVzt6Bws9sdyV5VJpKesv8BTC0+7eOwpNWUbWlgkM5kH2IwOEIFoGCmctCoMCOXqdnoaGh0h2yUMVx55Q8RO/oQQv2v+y0SQ9Jcadt9KA1OKaWWImw7kjA5U49A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=72oDo6XAYmep2scD/W/gH0J05pEmtRcPYjRI+KPkltQ=; b=OVri+2HWa7+xUlsuR81Fw/xWfynT8UjRIFJ24eczpTY18VJU9pcqv1Bh8EVWnFtCKJPAkIM295mM2T6K67DV8tzQ3GErc6S1D8Qh1rUMPZT4kk5gT7vf+RUoQjnbMI/qsm8MtHsWe7h9luX9TyoEb8ilgbOJDHchEB+pfOLLuWI= Received: from VE1PR04MB6639.eurprd04.prod.outlook.com (10.255.118.11) by VE1PR04MB6495.eurprd04.prod.outlook.com (20.179.233.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2623.13; Wed, 15 Jan 2020 13:50:17 +0000 Received: from VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::25b0:b1ac:aed0:63e1]) by VE1PR04MB6639.eurprd04.prod.outlook.com ([fe80::25b0:b1ac:aed0:63e1%7]) with mapi id 15.20.2644.015; Wed, 15 Jan 2020 13:50:17 +0000 From: Akhil Goyal To: Adam Dybkowski , "dev@dpdk.org" , "fiona.trahe@intel.com" , "arkadiuszx.kusztal@intel.com" Thread-Topic: [PATCH v2 2/2] test/crypto: add more tests for mixed encypted-digest Thread-Index: AQHVsCylRyQ7or/9lkW5PZU19ioXWqfr8uBw Date: Wed, 15 Jan 2020 13:50:17 +0000 Message-ID: References: <20191211140935.9503-1-adamx.dybkowski@intel.com> <20191211140935.9503-3-adamx.dybkowski@intel.com> In-Reply-To: <20191211140935.9503-3-adamx.dybkowski@intel.com> Accept-Language: en-IN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; x-originating-ip: [92.120.1.66] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: e1c988f4-3993-4d01-4383-08d799c1dabb x-ms-traffictypediagnostic: VE1PR04MB6495: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:7219; x-forefront-prvs: 02830F0362 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(346002)(376002)(396003)(39860400002)(136003)(199004)(189003)(33656002)(52536014)(71200400001)(110136005)(5660300002)(66446008)(7696005)(478600001)(86362001)(55016002)(26005)(66556008)(8936002)(9686003)(6506007)(66946007)(316002)(64756008)(8676002)(76116006)(186003)(2906002)(81166006)(81156014)(44832011)(30864003)(66476007); DIR:OUT; SFP:1101; SCL:1; SRVR:VE1PR04MB6495; H:VE1PR04MB6639.eurprd04.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: /qCLdpz6nvGYAnETXKZga5vP0McQIZI2gXC0H63gSF5xpiAbiXbNIfdJJ3jUor58GC1Hqpb7s5/bLfBP4ZqaNHpj7uIGS3cjIGb3vjCQDHsHzKekti8ks8TijfMZsKWv3t5tO2HFa1XmLB4nNvRw5PSUfPEbPZU3++aVzBa2FPpV0ZOksVFFul67wJta+Ejv6Zvxddu7GBzQYiGThLYwZQyaOM7MCbpcaLqOwESdM+iDZLNblQh7gQo5njXhyfslt0XVsdEeUGZdFSXLJOoLEFJ0IW1DGA186MzfaHCR+p4gDyKVNq6OGeQ6YX1Itn8CMXZNN5X/rm/3SOC21YPYTuSE9AC/Bja/Tkk5Mr07RHdeSSsof4v7k3JDmbR+wNJRlBNnYqpuFaimELPxECAxZGAim6M8VIfEX+zI/sEs9KEAtekXr8cHU/7uKLj9PDLy x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: e1c988f4-3993-4d01-4383-08d799c1dabb X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jan 2020 13:50:17.2148 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: ypAAZ20W/JJ/kbqwthjyyWAO0rmp8rfez7qDyRj6+yOjfe+93Qp2KT1nn8qf+R7oaoHvRHJgBQHP9lYmcscjOQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR04MB6495 Subject: Re: [dpdk-dev] [PATCH v2 2/2] test/crypto: add more tests for mixed encypted-digest X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Hi Adam, >=20 > This patch adds unit tests for QAT PMD for mixed encrypted-digest > cases, involving SNOW3G UIA2, ZUC EIA3, AES CMAC and NULL auth > algorithms together with SNOW3G UEA2, ZUC EEA3, AES CTR and NULL > cipher algorithms in various combinations. >=20 > Signed-off-by: Adam Dybkowski This patch doesn't apply on current tree. Could you please rebase. > --- > app/test/test_cryptodev.c | 470 ++++++- > app/test/test_cryptodev_mixed_test_vectors.h | 1320 +++++++++++++++++- > 2 files changed, 1721 insertions(+), 69 deletions(-) >=20 //snip > /* Create the session */ > - retval =3D create_wireless_algo_auth_cipher_session( > - ts_params->valid_devs[0], > - (verify ? RTE_CRYPTO_CIPHER_OP_DECRYPT > - : RTE_CRYPTO_CIPHER_OP_ENCRYPT), > - (verify ? RTE_CRYPTO_AUTH_OP_VERIFY > - : RTE_CRYPTO_AUTH_OP_GENERATE), > - tdata->auth_algo, > - tdata->cipher_algo, > - tdata->auth_key.data, tdata->auth_key.len, > - tdata->auth_iv.len, tdata->digest_enc.len, > - tdata->cipher_iv.len); > - > + if (verify) > + retval =3D create_wireless_algo_cipher_auth_session( > + ts_params->valid_devs[0], > + RTE_CRYPTO_CIPHER_OP_DECRYPT, > + RTE_CRYPTO_AUTH_OP_VERIFY, > + tdata->auth_algo, > + tdata->cipher_algo, > + tdata->auth_key.data, tdata->auth_key.len, > + tdata->auth_iv.len, tdata->digest_enc.len, > + tdata->cipher_iv.len); > + else > + retval =3D create_wireless_algo_auth_cipher_session( > + ts_params->valid_devs[0], > + RTE_CRYPTO_CIPHER_OP_ENCRYPT, > + RTE_CRYPTO_AUTH_OP_GENERATE, > + tdata->auth_algo, > + tdata->cipher_algo, > + tdata->auth_key.data, tdata->auth_key.len, > + tdata->auth_iv.len, tdata->digest_enc.len, > + tdata->cipher_iv.len); Why are these changes done? It looked better previously. > if (retval < 0) > return retval; >=20 > @@ -6642,25 +6690,45 @@ test_mixed_auth_cipher(const struct > mixed_cipher_auth_test_data *tdata, > } >=20 > /* Create the operation */ > - retval =3D create_wireless_algo_auth_cipher_operation( > - tdata->digest_enc.len, > - tdata->cipher_iv.data, tdata->cipher_iv.len, > - tdata->auth_iv.data, tdata->auth_iv.len, > - (tdata->digest_enc.offset =3D=3D 0 ? > - (verify ? ciphertext_pad_len : plaintext_pad_len) > - : tdata->digest_enc.offset), > - tdata->validCipherLen.len_bits, > - tdata->cipher.offset_bits, > - tdata->validAuthLen.len_bits, > - tdata->auth.offset_bits, > - op_mode, 0); > - > + if (verify) > + retval =3D create_wireless_algo_cipher_hash_operation( > + tdata->digest_enc.data, tdata->digest_enc.len, > + tdata->auth_iv.data, tdata->auth_iv.len, > + plaintext_len, RTE_CRYPTO_AUTH_OP_VERIFY, > + tdata->cipher_iv.data, tdata->cipher_iv.len, > + tdata->validCipherLen.len_bits, > + tdata->cipher.offset_bits, > + tdata->validAuthLen.len_bits, > + tdata->auth.offset_bits); > + else > + retval =3D create_wireless_algo_auth_cipher_operation( > + tdata->digest_enc.len, > + tdata->cipher_iv.data, tdata->cipher_iv.len, > + tdata->auth_iv.data, tdata->auth_iv.len, > + (tdata->digest_enc.offset =3D=3D 0 ? > + plaintext_pad_len > + : tdata->digest_enc.offset), > + tdata->validCipherLen.len_bits, > + tdata->cipher.offset_bits, > + tdata->validAuthLen.len_bits, > + tdata->auth.offset_bits, > + op_mode, 0); > if (retval < 0) > return retval; >=20 > - ut_params->op =3D process_crypto_request(ts_params->valid_devs[0], > + op =3D process_crypto_request(ts_params->valid_devs[0], > ut_params->op); >=20 > + /* Check if the op failed because the device doesn't */ > + /* support this particular combination of algorithms */ > + if (op =3D=3D NULL && ut_params->op->status =3D=3D > + RTE_CRYPTO_OP_STATUS_INVALID_SESSION) { > + printf("Device doesn't support this mixed combination. " > + "Test Skipped.\n"); > + return -ENOTSUP; > + } > + ut_params->op =3D op; > + > TEST_ASSERT_NOT_NULL(ut_params->op, "failed to retrieve obuf"); >=20 > ut_params->obuf =3D (op_mode =3D=3D IN_PLACE ? > @@ -6675,12 +6743,10 @@ test_mixed_auth_cipher(const struct > mixed_cipher_auth_test_data *tdata, > (tdata->cipher.offset_bits >> 3); >=20 > debug_hexdump(stdout, "plaintext:", plaintext, > - (tdata->plaintext.len_bits >> 3) - > - tdata->digest_enc.len); > + tdata->plaintext.len_bits >> 3); > debug_hexdump(stdout, "plaintext expected:", > tdata->plaintext.data, > - (tdata->plaintext.len_bits >> 3) - > - tdata->digest_enc.len); > + tdata->plaintext.len_bits >> 3); > } else { > if (ut_params->obuf) > ciphertext =3D rte_pktmbuf_mtod(ut_params->obuf, > @@ -6725,6 +6791,10 @@ test_mixed_auth_cipher(const struct > mixed_cipher_auth_test_data *tdata, > DIGEST_BYTE_LENGTH_SNOW3G_UIA2, > "Generated auth tag not as expected"); > } > + > + TEST_ASSERT_EQUAL(ut_params->op->status, > RTE_CRYPTO_OP_STATUS_SUCCESS, > + "crypto op processing failed"); > + > return 0; > } >=20 > @@ -6748,6 +6818,7 @@ test_mixed_auth_cipher_sgl(const struct > mixed_cipher_auth_test_data *tdata, > uint8_t digest_buffer[10000]; >=20 > struct rte_cryptodev_info dev_info; > + struct rte_crypto_op *op; >=20 > /* Check if device supports particular algorithms */ > if (test_mixed_check_if_unsupported(tdata)) > @@ -6776,18 +6847,26 @@ test_mixed_auth_cipher_sgl(const struct > mixed_cipher_auth_test_data *tdata, > } >=20 > /* Create the session */ > - retval =3D create_wireless_algo_auth_cipher_session( > - ts_params->valid_devs[0], > - (verify ? RTE_CRYPTO_CIPHER_OP_DECRYPT > - : RTE_CRYPTO_CIPHER_OP_ENCRYPT), > - (verify ? RTE_CRYPTO_AUTH_OP_VERIFY > - : RTE_CRYPTO_AUTH_OP_GENERATE), > - tdata->auth_algo, > - tdata->cipher_algo, > - tdata->auth_key.data, tdata->auth_key.len, > - tdata->auth_iv.len, tdata->digest_enc.len, > - tdata->cipher_iv.len); > - > + if (verify) > + retval =3D create_wireless_algo_cipher_auth_session( > + ts_params->valid_devs[0], > + RTE_CRYPTO_CIPHER_OP_DECRYPT, > + RTE_CRYPTO_AUTH_OP_VERIFY, > + tdata->auth_algo, > + tdata->cipher_algo, > + tdata->auth_key.data, tdata->auth_key.len, > + tdata->auth_iv.len, tdata->digest_enc.len, > + tdata->cipher_iv.len); > + else > + retval =3D create_wireless_algo_auth_cipher_session( > + ts_params->valid_devs[0], > + RTE_CRYPTO_CIPHER_OP_ENCRYPT, > + RTE_CRYPTO_AUTH_OP_GENERATE, > + tdata->auth_algo, > + tdata->cipher_algo, > + tdata->auth_key.data, tdata->auth_key.len, > + tdata->auth_iv.len, tdata->digest_enc.len, > + tdata->cipher_iv.len); > if (retval < 0) > return retval; >=20 > @@ -6797,7 +6876,7 @@ test_mixed_auth_cipher_sgl(const struct > mixed_cipher_auth_test_data *tdata, > plaintext_pad_len =3D RTE_ALIGN_CEIL(plaintext_len, 16); >=20 > ut_params->ibuf =3D create_segmented_mbuf(ts_params->mbuf_pool, > - plaintext_pad_len, 15, 0); > + ciphertext_pad_len, 15, 0); > TEST_ASSERT_NOT_NULL(ut_params->ibuf, > "Failed to allocate input buffer in mempool"); >=20 > @@ -6826,25 +6905,46 @@ test_mixed_auth_cipher_sgl(const struct > mixed_cipher_auth_test_data *tdata, > memset(buffer, 0, sizeof(buffer)); >=20 > /* Create the operation */ > - retval =3D create_wireless_algo_auth_cipher_operation( > - tdata->digest_enc.len, > - tdata->cipher_iv.data, tdata->cipher_iv.len, > - tdata->auth_iv.data, tdata->auth_iv.len, > - (tdata->digest_enc.offset =3D=3D 0 ? > - (verify ? ciphertext_pad_len : plaintext_pad_len) > - : tdata->digest_enc.offset), > - tdata->validCipherLen.len_bits, > - tdata->cipher.offset_bits, > - tdata->validAuthLen.len_bits, > - tdata->auth.offset_bits, > - op_mode, 1); > - > + if (verify) > + retval =3D create_wireless_algo_cipher_hash_operation( > + tdata->digest_enc.data, tdata->digest_enc.len, > + tdata->auth_iv.data, tdata->auth_iv.len, > + plaintext_len, RTE_CRYPTO_AUTH_OP_VERIFY, > + tdata->cipher_iv.data, tdata->cipher_iv.len, > + tdata->validCipherLen.len_bits, > + tdata->cipher.offset_bits, > + tdata->validAuthLen.len_bits, > + tdata->auth.offset_bits); > + else > + retval =3D create_wireless_algo_auth_cipher_operation( > + tdata->digest_enc.len, > + tdata->cipher_iv.data, tdata->cipher_iv.len, > + tdata->auth_iv.data, tdata->auth_iv.len, > + (tdata->digest_enc.offset =3D=3D 0 ? > + plaintext_pad_len > + : tdata->digest_enc.offset), > + tdata->validCipherLen.len_bits, > + tdata->cipher.offset_bits, > + tdata->validAuthLen.len_bits, > + tdata->auth.offset_bits, > + op_mode, 1); > if (retval < 0) > return retval; >=20 > - ut_params->op =3D process_crypto_request(ts_params->valid_devs[0], > + op =3D process_crypto_request(ts_params->valid_devs[0], > ut_params->op); >=20 > + /* Check if the op failed because the device doesn't */ > + /* support this particular combination of algorithms */ > + if (op =3D=3D NULL && ut_params->op->status =3D=3D > + RTE_CRYPTO_OP_STATUS_INVALID_SESSION) { > + printf("Device doesn't support this mixed combination. " > + "Test Skipped.\n"); > + return -ENOTSUP; > + } > + > + ut_params->op =3D op; > + > TEST_ASSERT_NOT_NULL(ut_params->op, "failed to retrieve obuf"); >=20 > ut_params->obuf =3D (op_mode =3D=3D IN_PLACE ? > @@ -6917,6 +7017,10 @@ test_mixed_auth_cipher_sgl(const struct > mixed_cipher_auth_test_data *tdata, > tdata->digest_enc.len, > "Generated auth tag not as expected"); > } > + > + TEST_ASSERT_EQUAL(ut_params->op->status, > RTE_CRYPTO_OP_STATUS_SUCCESS, > + "crypto op processing failed"); > + > return 0; > } >=20 > @@ -6978,6 +7082,176 @@ > test_verify_aes_cmac_aes_ctr_digest_enc_test_case_1_oop_sgl(void) > &auth_aes_cmac_cipher_aes_ctr_test_case_1, OUT_OF_PLACE, > 1); > } >=20 Can we have a single function to execute all cases with some function argum= ents? > +/** MIXED AUTH + CIPHER */ > + > +static int > +test_auth_zuc_cipher_snow_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_zuc_cipher_snow_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_zuc_cipher_snow_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_zuc_cipher_snow_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_aes_cmac_cipher_snow_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_aes_cmac_cipher_snow_test_case_1, OUT_OF_PLACE, > 0); > +} > + > +static int > +test_verify_auth_aes_cmac_cipher_snow_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_aes_cmac_cipher_snow_test_case_1, OUT_OF_PLACE, > 1); > +} > + > +static int > +test_auth_zuc_cipher_aes_ctr_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_zuc_cipher_aes_ctr_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_zuc_cipher_aes_ctr_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_zuc_cipher_aes_ctr_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_snow_cipher_aes_ctr_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_snow_cipher_aes_ctr_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_snow_cipher_aes_ctr_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_snow_cipher_aes_ctr_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_snow_cipher_zuc_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_snow_cipher_zuc_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_snow_cipher_zuc_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_snow_cipher_zuc_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_aes_cmac_cipher_zuc_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_aes_cmac_cipher_zuc_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_aes_cmac_cipher_zuc_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_aes_cmac_cipher_zuc_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_null_cipher_snow_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_null_cipher_snow_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_null_cipher_snow_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_null_cipher_snow_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_null_cipher_zuc_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_null_cipher_zuc_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_null_cipher_zuc_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_null_cipher_zuc_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_snow_cipher_null_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_snow_cipher_null_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_snow_cipher_null_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_snow_cipher_null_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_zuc_cipher_null_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_zuc_cipher_null_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_zuc_cipher_null_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_zuc_cipher_null_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_null_cipher_aes_ctr_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_null_cipher_aes_ctr_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_null_cipher_aes_ctr_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_null_cipher_aes_ctr_test_case_1, OUT_OF_PLACE, 1); > +} > + > +static int > +test_auth_aes_cmac_cipher_null_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_aes_cmac_cipher_null_test_case_1, OUT_OF_PLACE, 0); > +} > + > +static int > +test_verify_auth_aes_cmac_cipher_null_test_case_1(void) > +{ > + return test_mixed_auth_cipher( > + &auth_aes_cmac_cipher_null_test_case_1, OUT_OF_PLACE, 1); > +} > + > static int > test_3DES_chain_qat_all(void) > { > @@ -12288,6 +12562,68 @@ static struct unit_test_suite > cryptodev_qat_testsuite =3D { > TEST_CASE_ST(ut_setup, ut_teardown, >=20 > test_verify_aes_cmac_aes_ctr_digest_enc_test_case_1_oop_sgl), >=20 > + /** AUTH ZUC + CIPHER SNOW3G */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_zuc_cipher_snow_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_zuc_cipher_snow_test_case_1), > + /** AUTH AES CMAC + CIPHER SNOW3G */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_aes_cmac_cipher_snow_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_aes_cmac_cipher_snow_test_case_1), > + /** AUTH ZUC + CIPHER AES CTR */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_zuc_cipher_aes_ctr_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_zuc_cipher_aes_ctr_test_case_1), > + /** AUTH SNOW3G + CIPHER AES CTR */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_snow_cipher_aes_ctr_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_snow_cipher_aes_ctr_test_case_1), > + /** AUTH SNOW3G + CIPHER ZUC */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_snow_cipher_zuc_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_snow_cipher_zuc_test_case_1), > + /** AUTH AES CMAC + CIPHER ZUC */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_aes_cmac_cipher_zuc_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_aes_cmac_cipher_zuc_test_case_1), > + > + /** AUTH NULL + CIPHER SNOW3G */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_null_cipher_snow_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_null_cipher_snow_test_case_1), > + /** AUTH NULL + CIPHER ZUC */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_null_cipher_zuc_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_null_cipher_zuc_test_case_1), > + /** AUTH SNOW3G + CIPHER NULL */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_snow_cipher_null_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_snow_cipher_null_test_case_1), > + /** AUTH ZUC + CIPHER NULL */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_zuc_cipher_null_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_zuc_cipher_null_test_case_1), > + /** AUTH NULL + CIPHER AES CTR */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_null_cipher_aes_ctr_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_null_cipher_aes_ctr_test_case_1), > + /** AUTH AES CMAC + CIPHER NULL */ > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_auth_aes_cmac_cipher_null_test_case_1), > + TEST_CASE_ST(ut_setup, ut_teardown, > + test_verify_auth_aes_cmac_cipher_null_test_case_1), > + > TEST_CASES_END() /**< NULL terminate unit test array */ > } > };