From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 5C996A04F1; Mon, 9 Dec 2019 04:05:55 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 1ABBD3576; Mon, 9 Dec 2019 04:05:55 +0100 (CET) Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by dpdk.org (Postfix) with ESMTP id 3B98B2C17 for ; Mon, 9 Dec 2019 04:05:53 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Dec 2019 19:05:52 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,294,1571727600"; d="scan'208";a="219891308" Received: from unknown (HELO dpdk-wenjielx-dtspatch135.sh.intel.com) ([10.240.176.135]) by fmsmga001.fm.intel.com with ESMTP; 08 Dec 2019 19:05:50 -0800 From: Peng Yuan To: dts@dpdk.org Cc: Peng Yuan Date: Mon, 9 Dec 2019 11:10:54 +0800 Message-Id: <1575861054-55288-1-git-send-email-yuan.peng@intel.com> X-Mailer: git-send-email 1.9.3 Subject: [dts] [PATCH]test_plans: remove --tx-offload from commandline X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" remove --tx-offloads from testpmd commandline in macsec_test_plan.rst Signed-off-by: Peng Yuan diff --git a/test_plans/macsec_for_ixgbe_test_plan.rst b/test_plans/macsec_for_ixgbe_test_plan.rst index 79b7d57..997f921 100644 --- a/test_plans/macsec_for_ixgbe_test_plan.rst +++ b/test_plans/macsec_for_ixgbe_test_plan.rst @@ -151,7 +151,7 @@ Test Case 1: MACsec packets send and receive 1. Start the testpmd of tx port:: ./testpmd -c 0xf0 --socket-mem 1024,0 --file-prefix=tx -w 0000:07:00.0 \ - -- -i --port-topology=chained --tx-offloads=0x00002000 + -- -i --port-topology=chained 2. Set MACsec offload on:: @@ -352,10 +352,7 @@ Test Case 5: normal packet send and MACsec receive Test Case 6: MACsec send and receive with wrong parameters ========================================================== -1. Don't add "--tx-offloads=0x00002000" in the tx_port command line. - The MACsec offload can't work. The tx packets are normal packets. - -2. Set different pn on rx and tx port, then start the data transfer. +1. Set different pn on rx and tx port, then start the data transfer. 1. Set the parameters as test case 1, start and stop the data transfer. Check the result, rx port can receive and decrypt the packets normally. @@ -368,7 +365,7 @@ Test Case 6: MACsec send and receive with wrong parameters out_pkts_encrypted = in_pkts_late + in_pkts_ok -3. Set different keys on rx and tx port, then start the data transfer:: +2. Set different keys on rx and tx port, then start the data transfer:: the RX-packets=0, in_octets_decrypted == out_octets_encrypted, @@ -376,20 +373,23 @@ Test Case 6: MACsec send and receive with wrong parameters in_pkts_ok=0, rx_good_packets=0 -4. Set different pi on rx and tx port, then start the data transfer:: +3. Set different pi on rx and tx port, then start the data transfer:: in_octets_decrypted == out_octets_encrypted, in_pkts_ok = 0, in_pkts_nosci == out_pkts_encrypted -5. Set different an on rx and tx port, then start the data transfer:: + note: pi only support changed on rx side, if change pi on tx side, + it will be omitted. + +4. Set different an on rx and tx port, then start the data transfer:: rx_good_packets=0, in_octets_decrypted == out_octets_encrypted, in_pkts_notusingsa == out_pkts_encrypted, in_pkts_ok=0, -6. Set different index on rx and tx port, then start the data transfer:: +5. Set different index on rx and tx port, then start the data transfer:: in_octets_decrypted == out_octets_encrypted, in_pkts_ok == out_pkts_encrypted @@ -404,7 +404,7 @@ Test Case 7: performance test of MACsec offload packets MACsec offload on, set fwd mac:: ./testpmd -c 0xf --socket-mem 1024,0 -- -i \ - --port-topology=chained --tx-offloads=0x00002000 + --port-topology=chained testpmd> set macsec offload 0 on encrypt on replay-protect on testpmd> set fwd mac testpmd> start @@ -423,7 +423,7 @@ Test Case 7: performance test of MACsec offload packets Start two testpmd:: ./testpmd -c 0xf --socket-mem 1024,0 --file-prefix=rx -w 0000:07:00.1 \ - -- -i --port-topology=chained --tx-offloads=0x00002000 + -- -i --port-topology=chained testpmd> set macsec offload 0 on encrypt on replay-protect on testpmd> set macsec sc rx 0 00:00:00:00:00:01 0 @@ -433,7 +433,7 @@ Test Case 7: performance test of MACsec offload packets testpmd> set fwd rxonly ./testpmd -c 0xf0 --socket-mem 1024,0 --file-prefix=tx -b 0000:07:00.1 \ - -- -i --port-topology=chained --tx-offloads=0x00002000 + -- -i --port-topology=chained testpmd> set macsec offload 1 on encrypt on replay-protect on testpmd> set macsec sc rx 1 00:00:00:00:00:02 0 -- 2.17.1