From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id D8DA6A0509; Thu, 14 Apr 2022 08:07:04 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id CEA8540687; Thu, 14 Apr 2022 08:07:04 +0200 (CEST) Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mails.dpdk.org (Postfix) with ESMTP id 325514003F for ; Thu, 14 Apr 2022 08:07:03 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1649916423; x=1681452423; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=o5lxT+FMCT3j7hb7ard/zyENhMS/rv/ssJH9xnWOyIc=; b=U0PXWb/8ISGyYbkOLevdP/NzH2Y1XHg9An2D8ljbvIfpyXKdDcU0wDne Bb+E2NqT4i9vrVgPJUd8L4bYjDqRbgdfzprmbLabvDmipfO/OyJ/Dw0sp kzHF6750XZBYrP/eDsZqIXWkGHOl+UXTyE1Xlkt2AkBjt8uR1PRO3BTaK 8jGlt6ppv0BxkzuWpRiF6mxZ5GaYyrFMqqrCt78hHH0VtZDI+H4UDq6I1 1iLSfk6tEpNF7YAQbtJFc9V8o0FkwCrTBKvqzNQyl2gL7Xr+yCkNSogvl 502flWjD4hmWKqTpnh8cjjfVVz4jdr9huDdzMg/kPg58WWQBbns16LDmV Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10316"; a="243444178" X-IronPort-AV: E=Sophos;i="5.90,259,1643702400"; d="scan'208";a="243444178" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2022 23:07:00 -0700 X-IronPort-AV: E=Sophos;i="5.90,259,1643702400"; d="scan'208";a="573625232" Received: from unknown (HELO localhost.localdomain) ([10.239.251.226]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2022 23:06:59 -0700 From: Yu Jiang To: lijuan.tu@intel.com, dts@dpdk.org Cc: Yu Jiang Subject: [dts][PATCH V1 2/3] test_plans/l2fwd_cryptodev_func&inline_ipsec: modify test plan to adapt meson build Date: Thu, 14 Apr 2022 14:05:48 +0000 Message-Id: <20220414140549.1579777-3-yux.jiang@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220414140549.1579777-1-yux.jiang@intel.com> References: <20220414140549.1579777-1-yux.jiang@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org test_plans/l2fwd_cryptodev_func&inline_ipsec: modify test plan to adapt meson build Signed-off-by: Yu Jiang --- test_plans/inline_ipsec_test_plan.rst | 20 +++++++++---------- test_plans/l2fwd_cryptodev_func_test_plan.rst | 2 +- 2 files changed, 11 insertions(+), 11 deletions(-) diff --git a/test_plans/inline_ipsec_test_plan.rst b/test_plans/inline_ipsec_test_plan.rst index f3b0a8cc..0b4e45a1 100644 --- a/test_plans/inline_ipsec_test_plan.rst +++ b/test_plans/inline_ipsec_test_plan.rst @@ -145,7 +145,7 @@ Test Case: IPSec Encryption =========================== Start ipsec-secgw with two 82599 ports and assign port 1 to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 --config="(0,0,20),(1,0,21)" -f ./enc.cfg @@ -195,7 +195,7 @@ Test Case: IPSec Encryption with Jumboframe =========================================== Start ipsec-secgw with two 82599 ports and assign port 1 to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 --config="(0,0,20),(1,0,21)" -f ./enc.cfg @@ -215,7 +215,7 @@ Check burst esp packets can't be received from unprotected port. Set jumbo frames size as 9000, start it with port 1 assigned to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 -j 9000 --config="(0,0,20),(1,0,21)" -f ./enc.cfg @@ -240,7 +240,7 @@ Create configuration file with multiple SP/SA/RT rules for different ip address. Start ipsec-secgw with two queues enabled on each port and port 1 assigned to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 --config="(0,0,20),(0,1,20),(1,0,21),(1,1,21)" -f ./enc_rss.cfg @@ -260,7 +260,7 @@ Test Case: IPSec Decryption =========================== Start ipsec-secgw with two 82599 ports and assign port 1 to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 --config="(0,0,20),(1,0,21)" -f ./dec.cfg @@ -276,7 +276,7 @@ Test Case: IPSec Decryption with wrong key ========================================== Start ipsec-secgw with two 82599 ports and assign port 1 to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 --config="(0,0,20),(1,0,21)" -f ./dec.cfg @@ -296,7 +296,7 @@ IPsec application will produce error "IPSEC_ESP: failed crypto op". Test Case: IPSec Decryption with Jumboframe =========================================== Start ipsec-secgw with two 82599 ports and assign port 1 to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 --config="(0,0,20),(1,0,21)" -f ./dec.cfg @@ -313,7 +313,7 @@ Check burst(8192) packets which have been decapsulated can't be received from pr Set jumbo frames size as 9000, start it with port 1 assigned to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 -j 9000 --config="(0,0,20),(1,0,21)" -f ./dec.cfg @@ -335,7 +335,7 @@ Create configuration file with multiple SA rule for different ip address. Start ipsec-secgw with two 82599 ports and assign port 1 to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 -config="(0,0,20),(0,1,20),(1,0,21),(1,1,21)" -f ./dec_rss.cfg @@ -352,7 +352,7 @@ Test Case: IPSec Encryption/Decryption simultaneously ===================================================== Start ipsec-secgw with two 82599 ports and assign port 1 to unprotected mode:: - sudo ./build/ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 + sudo ./x86_64-default-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -a 83:00.0 -a 83:00.1 --vdev "crypto_null" --log-level 8 --socket-mem 1024,1 -- -p 0xf -P -u 0x2 --config="(0,0,20),(1,0,21)" -f ./enc_dec.cfg diff --git a/test_plans/l2fwd_cryptodev_func_test_plan.rst b/test_plans/l2fwd_cryptodev_func_test_plan.rst index 9ace53d0..889b3fd2 100644 --- a/test_plans/l2fwd_cryptodev_func_test_plan.rst +++ b/test_plans/l2fwd_cryptodev_func_test_plan.rst @@ -279,7 +279,7 @@ To test CryptoDev API, an example l2fwd-crypto is added into DPDK. The test commands of l2fwd-crypto is below:: - ./build/l2fwd-crypto [EAL options] -- [-p PORTMASK] [-q NQ] [-s] [-T PERIOD] / + ./build/examples/dpdk-l2fwd-crypto [EAL options] -- [-p PORTMASK] [-q NQ] [-s] [-T PERIOD] / [--cdev_type HW/SW/ANY] [--chain HASH_CIPHER/CIPHER_HASH/CIPHER_ONLY/HASH_ONLY/AEAD] / [--cipher_algo ALGO] [--cipher_op ENCRYPT/DECRYPT] [--cipher_key KEY] / [--cipher_key_random_size SIZE] [--cipher_iv IV] [--cipher_iv_random_size SIZE] / -- 2.25.1