test/crypto: remove some PMD specific null tests
This patch removes the OCTEON TX and OCTEON TX2 PMDs specific test cases related to null cipher. Signed-off-by: Ankur Dwivedi <adwivedi@marvell.com> Signed-off-by: Anoob Joseph <anoobj@marvell.com> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
This commit is contained in:
parent
cec2f173a9
commit
9fb409df70
@ -9758,361 +9758,10 @@ test_multi_session_random_usage(void)
|
||||
return TEST_SUCCESS;
|
||||
}
|
||||
|
||||
static int
|
||||
test_null_cipher_only_operation(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
struct crypto_unittest_params *ut_params = &unittest_params;
|
||||
|
||||
/* Verify the capabilities */
|
||||
struct rte_cryptodev_sym_capability_idx cap_idx;
|
||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
||||
cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_NULL;
|
||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
||||
&cap_idx) == NULL)
|
||||
return -ENOTSUP;
|
||||
|
||||
/* Generate test mbuf data and space for digest */
|
||||
ut_params->ibuf = setup_test_string(ts_params->mbuf_pool,
|
||||
catch_22_quote, QUOTE_512_BYTES, 0);
|
||||
|
||||
/* Setup Cipher Parameters */
|
||||
ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
||||
ut_params->cipher_xform.next = NULL;
|
||||
|
||||
ut_params->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
|
||||
ut_params->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
|
||||
|
||||
ut_params->sess = rte_cryptodev_sym_session_create(
|
||||
ts_params->session_mpool);
|
||||
|
||||
/* Create Crypto session*/
|
||||
rte_cryptodev_sym_session_init(ts_params->valid_devs[0],
|
||||
ut_params->sess,
|
||||
&ut_params->cipher_xform,
|
||||
ts_params->session_priv_mpool);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");
|
||||
|
||||
/* Generate Crypto op data structure */
|
||||
ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,
|
||||
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->op,
|
||||
"Failed to allocate symmetric crypto operation struct");
|
||||
|
||||
/* Set crypto operation data parameters */
|
||||
rte_crypto_op_attach_sym_session(ut_params->op, ut_params->sess);
|
||||
|
||||
struct rte_crypto_sym_op *sym_op = ut_params->op->sym;
|
||||
|
||||
/* set crypto operation source mbuf */
|
||||
sym_op->m_src = ut_params->ibuf;
|
||||
|
||||
sym_op->cipher.data.offset = 0;
|
||||
sym_op->cipher.data.length = QUOTE_512_BYTES;
|
||||
|
||||
/* Process crypto operation */
|
||||
ut_params->op = process_crypto_request(ts_params->valid_devs[0],
|
||||
ut_params->op);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->op, "no crypto operation returned");
|
||||
|
||||
TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,
|
||||
"crypto operation processing failed");
|
||||
|
||||
/* Validate obuf */
|
||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
||||
rte_pktmbuf_mtod(ut_params->op->sym->m_src, uint8_t *),
|
||||
catch_22_quote,
|
||||
QUOTE_512_BYTES,
|
||||
"Ciphertext data not as expected");
|
||||
|
||||
return TEST_SUCCESS;
|
||||
}
|
||||
uint8_t orig_data[] = {0xab, 0xab, 0xab, 0xab,
|
||||
0xab, 0xab, 0xab, 0xab,
|
||||
0xab, 0xab, 0xab, 0xab,
|
||||
0xab, 0xab, 0xab, 0xab};
|
||||
static int
|
||||
test_null_auth_only_operation(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
struct crypto_unittest_params *ut_params = &unittest_params;
|
||||
uint8_t *digest;
|
||||
|
||||
/* Verify the capabilities */
|
||||
struct rte_cryptodev_sym_capability_idx cap_idx;
|
||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
||||
cap_idx.algo.auth = RTE_CRYPTO_AUTH_NULL;
|
||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
||||
&cap_idx) == NULL)
|
||||
return -ENOTSUP;
|
||||
|
||||
/* Generate test mbuf data and space for digest */
|
||||
ut_params->ibuf = setup_test_string(ts_params->mbuf_pool,
|
||||
catch_22_quote, QUOTE_512_BYTES, 0);
|
||||
|
||||
/* create a pointer for digest, but don't expect anything to be written
|
||||
* here in a NULL auth algo so no mbuf append done.
|
||||
*/
|
||||
digest = rte_pktmbuf_mtod_offset(ut_params->ibuf, uint8_t *,
|
||||
QUOTE_512_BYTES);
|
||||
/* prefill the memory pointed to by digest */
|
||||
memcpy(digest, orig_data, sizeof(orig_data));
|
||||
|
||||
/* Setup HMAC Parameters */
|
||||
ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
||||
ut_params->auth_xform.next = NULL;
|
||||
|
||||
ut_params->auth_xform.auth.algo = RTE_CRYPTO_AUTH_NULL;
|
||||
ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
|
||||
|
||||
ut_params->sess = rte_cryptodev_sym_session_create(
|
||||
ts_params->session_mpool);
|
||||
|
||||
/* Create Crypto session*/
|
||||
rte_cryptodev_sym_session_init(ts_params->valid_devs[0],
|
||||
ut_params->sess, &ut_params->auth_xform,
|
||||
ts_params->session_priv_mpool);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");
|
||||
|
||||
/* Generate Crypto op data structure */
|
||||
ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,
|
||||
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->op,
|
||||
"Failed to allocate symmetric crypto operation struct");
|
||||
|
||||
/* Set crypto operation data parameters */
|
||||
rte_crypto_op_attach_sym_session(ut_params->op, ut_params->sess);
|
||||
|
||||
struct rte_crypto_sym_op *sym_op = ut_params->op->sym;
|
||||
|
||||
sym_op->m_src = ut_params->ibuf;
|
||||
|
||||
sym_op->auth.data.offset = 0;
|
||||
sym_op->auth.data.length = QUOTE_512_BYTES;
|
||||
sym_op->auth.digest.data = digest;
|
||||
sym_op->auth.digest.phys_addr = rte_pktmbuf_iova_offset(ut_params->ibuf,
|
||||
QUOTE_512_BYTES);
|
||||
|
||||
/* Process crypto operation */
|
||||
ut_params->op = process_crypto_request(ts_params->valid_devs[0],
|
||||
ut_params->op);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->op, "no crypto operation returned");
|
||||
|
||||
TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,
|
||||
"crypto operation processing failed");
|
||||
/* Make sure memory pointed to by digest hasn't been overwritten */
|
||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
||||
orig_data,
|
||||
digest,
|
||||
sizeof(orig_data),
|
||||
"Memory at digest ptr overwritten unexpectedly");
|
||||
|
||||
return TEST_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
static int
|
||||
test_null_cipher_auth_operation(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
struct crypto_unittest_params *ut_params = &unittest_params;
|
||||
uint8_t *digest;
|
||||
|
||||
/* Verify the capabilities */
|
||||
struct rte_cryptodev_sym_capability_idx cap_idx;
|
||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
||||
cap_idx.algo.auth = RTE_CRYPTO_AUTH_NULL;
|
||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
||||
&cap_idx) == NULL)
|
||||
return -ENOTSUP;
|
||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
||||
cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_NULL;
|
||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
||||
&cap_idx) == NULL)
|
||||
return -ENOTSUP;
|
||||
|
||||
/* Generate test mbuf data and space for digest */
|
||||
ut_params->ibuf = setup_test_string(ts_params->mbuf_pool,
|
||||
catch_22_quote, QUOTE_512_BYTES, 0);
|
||||
|
||||
/* create a pointer for digest, but don't expect anything to be written
|
||||
* here in a NULL auth algo so no mbuf append done.
|
||||
*/
|
||||
digest = rte_pktmbuf_mtod_offset(ut_params->ibuf, uint8_t *,
|
||||
QUOTE_512_BYTES);
|
||||
/* prefill the memory pointed to by digest */
|
||||
memcpy(digest, orig_data, sizeof(orig_data));
|
||||
|
||||
/* Setup Cipher Parameters */
|
||||
ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
||||
ut_params->cipher_xform.next = &ut_params->auth_xform;
|
||||
|
||||
ut_params->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
|
||||
ut_params->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
|
||||
|
||||
/* Setup HMAC Parameters */
|
||||
ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
||||
ut_params->auth_xform.next = NULL;
|
||||
|
||||
ut_params->auth_xform.auth.algo = RTE_CRYPTO_AUTH_NULL;
|
||||
ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
|
||||
|
||||
ut_params->sess = rte_cryptodev_sym_session_create(
|
||||
ts_params->session_mpool);
|
||||
|
||||
/* Create Crypto session*/
|
||||
rte_cryptodev_sym_session_init(ts_params->valid_devs[0],
|
||||
ut_params->sess, &ut_params->cipher_xform,
|
||||
ts_params->session_priv_mpool);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");
|
||||
|
||||
/* Generate Crypto op data structure */
|
||||
ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,
|
||||
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->op,
|
||||
"Failed to allocate symmetric crypto operation struct");
|
||||
|
||||
/* Set crypto operation data parameters */
|
||||
rte_crypto_op_attach_sym_session(ut_params->op, ut_params->sess);
|
||||
|
||||
struct rte_crypto_sym_op *sym_op = ut_params->op->sym;
|
||||
|
||||
sym_op->m_src = ut_params->ibuf;
|
||||
|
||||
sym_op->cipher.data.offset = 0;
|
||||
sym_op->cipher.data.length = QUOTE_512_BYTES;
|
||||
|
||||
sym_op->auth.data.offset = 0;
|
||||
sym_op->auth.data.length = QUOTE_512_BYTES;
|
||||
sym_op->auth.digest.data = digest;
|
||||
sym_op->auth.digest.phys_addr = rte_pktmbuf_iova_offset(ut_params->ibuf,
|
||||
QUOTE_512_BYTES);
|
||||
|
||||
/* Process crypto operation */
|
||||
ut_params->op = process_crypto_request(ts_params->valid_devs[0],
|
||||
ut_params->op);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->op, "no crypto operation returned");
|
||||
|
||||
TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,
|
||||
"crypto operation processing failed");
|
||||
|
||||
/* Validate obuf */
|
||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
||||
rte_pktmbuf_mtod(ut_params->op->sym->m_src, uint8_t *),
|
||||
catch_22_quote,
|
||||
QUOTE_512_BYTES,
|
||||
"Ciphertext data not as expected");
|
||||
/* Make sure memory pointed to by digest hasn't been overwritten */
|
||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
||||
orig_data,
|
||||
digest,
|
||||
sizeof(orig_data),
|
||||
"Memory at digest ptr overwritten unexpectedly");
|
||||
|
||||
return TEST_SUCCESS;
|
||||
}
|
||||
|
||||
static int
|
||||
test_null_auth_cipher_operation(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
struct crypto_unittest_params *ut_params = &unittest_params;
|
||||
uint8_t *digest;
|
||||
|
||||
/* Verify the capabilities */
|
||||
struct rte_cryptodev_sym_capability_idx cap_idx;
|
||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
||||
cap_idx.algo.auth = RTE_CRYPTO_AUTH_NULL;
|
||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
||||
&cap_idx) == NULL)
|
||||
return -ENOTSUP;
|
||||
cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
||||
cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_NULL;
|
||||
if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
|
||||
&cap_idx) == NULL)
|
||||
return -ENOTSUP;
|
||||
|
||||
/* Generate test mbuf data */
|
||||
ut_params->ibuf = setup_test_string(ts_params->mbuf_pool,
|
||||
catch_22_quote, QUOTE_512_BYTES, 0);
|
||||
|
||||
/* create a pointer for digest, but don't expect anything to be written
|
||||
* here in a NULL auth algo so no mbuf append done.
|
||||
*/
|
||||
digest = rte_pktmbuf_mtod_offset(ut_params->ibuf, uint8_t *,
|
||||
QUOTE_512_BYTES);
|
||||
/* prefill the memory pointed to by digest */
|
||||
memcpy(digest, orig_data, sizeof(orig_data));
|
||||
|
||||
/* Setup Cipher Parameters */
|
||||
ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
|
||||
ut_params->cipher_xform.next = NULL;
|
||||
|
||||
ut_params->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_NULL;
|
||||
ut_params->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT;
|
||||
|
||||
/* Setup HMAC Parameters */
|
||||
ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH;
|
||||
ut_params->auth_xform.next = &ut_params->cipher_xform;
|
||||
|
||||
ut_params->auth_xform.auth.algo = RTE_CRYPTO_AUTH_NULL;
|
||||
ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;
|
||||
|
||||
ut_params->sess = rte_cryptodev_sym_session_create(
|
||||
ts_params->session_mpool);
|
||||
|
||||
/* Create Crypto session*/
|
||||
rte_cryptodev_sym_session_init(ts_params->valid_devs[0],
|
||||
ut_params->sess, &ut_params->cipher_xform,
|
||||
ts_params->session_priv_mpool);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");
|
||||
|
||||
/* Generate Crypto op data structure */
|
||||
ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,
|
||||
RTE_CRYPTO_OP_TYPE_SYMMETRIC);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->op,
|
||||
"Failed to allocate symmetric crypto operation struct");
|
||||
|
||||
/* Set crypto operation data parameters */
|
||||
rte_crypto_op_attach_sym_session(ut_params->op, ut_params->sess);
|
||||
|
||||
struct rte_crypto_sym_op *sym_op = ut_params->op->sym;
|
||||
|
||||
sym_op->m_src = ut_params->ibuf;
|
||||
|
||||
sym_op->cipher.data.offset = 0;
|
||||
sym_op->cipher.data.length = QUOTE_512_BYTES;
|
||||
|
||||
sym_op->auth.data.offset = 0;
|
||||
sym_op->auth.data.length = QUOTE_512_BYTES;
|
||||
sym_op->auth.digest.data = digest;
|
||||
sym_op->auth.digest.phys_addr = rte_pktmbuf_iova_offset(ut_params->ibuf,
|
||||
QUOTE_512_BYTES);
|
||||
|
||||
/* Process crypto operation */
|
||||
ut_params->op = process_crypto_request(ts_params->valid_devs[0],
|
||||
ut_params->op);
|
||||
TEST_ASSERT_NOT_NULL(ut_params->op, "no crypto operation returned");
|
||||
|
||||
TEST_ASSERT_EQUAL(ut_params->op->status, RTE_CRYPTO_OP_STATUS_SUCCESS,
|
||||
"crypto operation processing failed");
|
||||
|
||||
/* Validate obuf */
|
||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
||||
rte_pktmbuf_mtod(ut_params->op->sym->m_src, uint8_t *),
|
||||
catch_22_quote,
|
||||
QUOTE_512_BYTES,
|
||||
"Ciphertext data not as expected");
|
||||
/* Make sure memory pointed to by digest hasn't been overwritten */
|
||||
TEST_ASSERT_BUFFERS_ARE_EQUAL(
|
||||
orig_data,
|
||||
digest,
|
||||
sizeof(orig_data),
|
||||
"Memory at digest ptr overwritten unexpectedly");
|
||||
|
||||
return TEST_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
static int
|
||||
test_null_invalid_operation(void)
|
||||
@ -13144,16 +12793,6 @@ static struct unit_test_suite cryptodev_octeontx_testsuite = {
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_kasumi_hash_verify_test_case_5),
|
||||
|
||||
/** NULL tests */
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_null_cipher_only_operation),
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_null_auth_only_operation),
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_null_cipher_auth_operation),
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_null_auth_cipher_operation),
|
||||
|
||||
/** Negative tests */
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
authentication_verify_HMAC_SHA1_fail_data_corrupt),
|
||||
@ -13367,16 +13006,6 @@ static struct unit_test_suite cryptodev_octeontx2_testsuite = {
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_kasumi_hash_verify_test_case_5),
|
||||
|
||||
/** NULL tests */
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_null_cipher_only_operation),
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_null_auth_only_operation),
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_null_cipher_auth_operation),
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_null_auth_cipher_operation),
|
||||
|
||||
/** Negative tests */
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
authentication_verify_HMAC_SHA1_fail_data_corrupt),
|
||||
|
Loading…
Reference in New Issue
Block a user