crypto/scheduler: add unit test
Same as other cryptodev PMDs, it is necessary to carry out the unit test for scheduler PMD. Currently the test is designed to attach 2 AESNI-MB cryptodev PMDs as slaves, sets the scheduling mode as round- robin, and runs almost all AESNI-MB test items (except for sessionless tests). In the end, the slaves are detached. Signed-off-by: Fan Zhang <roy.fan.zhang@intel.com> Acked-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
This commit is contained in:
parent
dbb336407f
commit
c8e69fce70
@ -1,7 +1,7 @@
|
||||
/*-
|
||||
* BSD LICENSE
|
||||
*
|
||||
* Copyright(c) 2015-2016 Intel Corporation. All rights reserved.
|
||||
* Copyright(c) 2015-2017 Intel Corporation. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
@ -40,6 +40,11 @@
|
||||
#include <rte_cryptodev.h>
|
||||
#include <rte_cryptodev_pmd.h>
|
||||
|
||||
#ifdef RTE_LIBRTE_PMD_CRYPTO_SCHEDULER
|
||||
#include <rte_cryptodev_scheduler.h>
|
||||
#include <rte_cryptodev_scheduler_operations.h>
|
||||
#endif
|
||||
|
||||
#include "test.h"
|
||||
#include "test_cryptodev.h"
|
||||
|
||||
@ -159,7 +164,7 @@ testsuite_setup(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
struct rte_cryptodev_info info;
|
||||
unsigned i, nb_devs, dev_id;
|
||||
uint32_t i = 0, nb_devs, dev_id;
|
||||
int ret;
|
||||
uint16_t qp_id;
|
||||
|
||||
@ -370,6 +375,29 @@ testsuite_setup(void)
|
||||
}
|
||||
}
|
||||
|
||||
#ifdef RTE_LIBRTE_PMD_CRYPTO_SCHEDULER
|
||||
if (gbl_cryptodev_type == RTE_CRYPTODEV_SCHEDULER_PMD) {
|
||||
|
||||
#ifndef RTE_LIBRTE_PMD_AESNI_MB
|
||||
RTE_LOG(ERR, USER1, "CONFIG_RTE_LIBRTE_PMD_AESNI_MB must be"
|
||||
" enabled in config file to run this testsuite.\n");
|
||||
return TEST_FAILED;
|
||||
#endif
|
||||
nb_devs = rte_cryptodev_count_devtype(
|
||||
RTE_CRYPTODEV_SCHEDULER_PMD);
|
||||
if (nb_devs < 1) {
|
||||
ret = rte_eal_vdev_init(
|
||||
RTE_STR(CRYPTODEV_NAME_SCHEDULER_PMD),
|
||||
NULL);
|
||||
|
||||
TEST_ASSERT(ret == 0,
|
||||
"Failed to create instance %u of"
|
||||
" pmd : %s",
|
||||
i, RTE_STR(CRYPTODEV_NAME_SCHEDULER_PMD));
|
||||
}
|
||||
}
|
||||
#endif /* RTE_LIBRTE_PMD_CRYPTO_SCHEDULER */
|
||||
|
||||
#ifndef RTE_LIBRTE_PMD_QAT
|
||||
if (gbl_cryptodev_type == RTE_CRYPTODEV_QAT_SYM_PMD) {
|
||||
RTE_LOG(ERR, USER1, "CONFIG_RTE_LIBRTE_PMD_QAT must be enabled "
|
||||
@ -1535,6 +1563,58 @@ test_AES_chain_mb_all(void)
|
||||
return TEST_SUCCESS;
|
||||
}
|
||||
|
||||
#ifdef RTE_LIBRTE_PMD_CRYPTO_SCHEDULER
|
||||
|
||||
static int
|
||||
test_AES_cipheronly_scheduler_all(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
int status;
|
||||
|
||||
status = test_blockcipher_all_tests(ts_params->mbuf_pool,
|
||||
ts_params->op_mpool, ts_params->valid_devs[0],
|
||||
RTE_CRYPTODEV_SCHEDULER_PMD,
|
||||
BLKCIPHER_AES_CIPHERONLY_TYPE);
|
||||
|
||||
TEST_ASSERT_EQUAL(status, 0, "Test failed");
|
||||
|
||||
return TEST_SUCCESS;
|
||||
}
|
||||
|
||||
static int
|
||||
test_AES_chain_scheduler_all(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
int status;
|
||||
|
||||
status = test_blockcipher_all_tests(ts_params->mbuf_pool,
|
||||
ts_params->op_mpool, ts_params->valid_devs[0],
|
||||
RTE_CRYPTODEV_SCHEDULER_PMD,
|
||||
BLKCIPHER_AES_CHAIN_TYPE);
|
||||
|
||||
TEST_ASSERT_EQUAL(status, 0, "Test failed");
|
||||
|
||||
return TEST_SUCCESS;
|
||||
}
|
||||
|
||||
static int
|
||||
test_authonly_scheduler_all(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
int status;
|
||||
|
||||
status = test_blockcipher_all_tests(ts_params->mbuf_pool,
|
||||
ts_params->op_mpool, ts_params->valid_devs[0],
|
||||
RTE_CRYPTODEV_SCHEDULER_PMD,
|
||||
BLKCIPHER_AUTHONLY_TYPE);
|
||||
|
||||
TEST_ASSERT_EQUAL(status, 0, "Test failed");
|
||||
|
||||
return TEST_SUCCESS;
|
||||
}
|
||||
|
||||
#endif /* RTE_LIBRTE_PMD_CRYPTO_SCHEDULER */
|
||||
|
||||
static int
|
||||
test_AES_chain_openssl_all(void)
|
||||
{
|
||||
@ -7292,6 +7372,150 @@ auth_decryption_AES128CBC_HMAC_SHA1_fail_tag_corrupt(void)
|
||||
&aes128cbc_hmac_sha1_test_vector);
|
||||
}
|
||||
|
||||
#ifdef RTE_LIBRTE_PMD_CRYPTO_SCHEDULER
|
||||
|
||||
/* global AESNI slave IDs for the scheduler test */
|
||||
uint8_t aesni_ids[2];
|
||||
|
||||
static int
|
||||
test_scheduler_attach_slave_op(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
uint8_t sched_id = ts_params->valid_devs[0];
|
||||
uint32_t nb_devs, qp_id, i, nb_devs_attached = 0;
|
||||
int ret;
|
||||
struct rte_cryptodev_config config = {
|
||||
.nb_queue_pairs = 8,
|
||||
.socket_id = SOCKET_ID_ANY,
|
||||
.session_mp = {
|
||||
.nb_objs = 2048,
|
||||
.cache_size = 256
|
||||
}
|
||||
};
|
||||
struct rte_cryptodev_qp_conf qp_conf = {2048};
|
||||
|
||||
/* create 2 AESNI_MB if necessary */
|
||||
nb_devs = rte_cryptodev_count_devtype(
|
||||
RTE_CRYPTODEV_AESNI_MB_PMD);
|
||||
if (nb_devs < 2) {
|
||||
for (i = nb_devs; i < 2; i++) {
|
||||
ret = rte_eal_vdev_init(
|
||||
RTE_STR(CRYPTODEV_NAME_AESNI_MB_PMD), NULL);
|
||||
|
||||
TEST_ASSERT(ret == 0,
|
||||
"Failed to create instance %u of"
|
||||
" pmd : %s",
|
||||
i, RTE_STR(CRYPTODEV_NAME_AESNI_MB_PMD));
|
||||
}
|
||||
}
|
||||
|
||||
/* attach 2 AESNI_MB cdevs */
|
||||
for (i = 0; i < rte_cryptodev_count() && nb_devs_attached < 2;
|
||||
i++) {
|
||||
struct rte_cryptodev_info info;
|
||||
|
||||
rte_cryptodev_info_get(i, &info);
|
||||
if (info.dev_type != RTE_CRYPTODEV_AESNI_MB_PMD)
|
||||
continue;
|
||||
|
||||
ret = rte_cryptodev_configure(i, &config);
|
||||
TEST_ASSERT(ret == 0,
|
||||
"Failed to configure device %u of pmd : %s", i,
|
||||
RTE_STR(CRYPTODEV_NAME_AESNI_MB_PMD));
|
||||
|
||||
for (qp_id = 0; qp_id < info.max_nb_queue_pairs; qp_id++) {
|
||||
TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(
|
||||
i, qp_id, &qp_conf,
|
||||
rte_cryptodev_socket_id(i)),
|
||||
"Failed to setup queue pair %u on "
|
||||
"cryptodev %u", qp_id, i);
|
||||
}
|
||||
|
||||
ret = rte_cryptodev_scheduler_slave_attach(sched_id,
|
||||
(uint8_t)i);
|
||||
|
||||
TEST_ASSERT(ret == 0,
|
||||
"Failed to attach device %u of pmd : %s", i,
|
||||
RTE_STR(CRYPTODEV_NAME_AESNI_MB_PMD));
|
||||
|
||||
aesni_ids[nb_devs_attached] = (uint8_t)i;
|
||||
|
||||
nb_devs_attached++;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
test_scheduler_detach_slave_op(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
uint8_t sched_id = ts_params->valid_devs[0];
|
||||
uint32_t i;
|
||||
int ret;
|
||||
|
||||
for (i = 0; i < 2; i++) {
|
||||
ret = rte_cryptodev_scheduler_slave_detach(sched_id,
|
||||
aesni_ids[i]);
|
||||
TEST_ASSERT(ret == 0,
|
||||
"Failed to detach device %u", aesni_ids[i]);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
test_scheduler_mode_op(void)
|
||||
{
|
||||
struct crypto_testsuite_params *ts_params = &testsuite_params;
|
||||
uint8_t sched_id = ts_params->valid_devs[0];
|
||||
struct rte_cryptodev_scheduler_ops op = {0};
|
||||
struct rte_cryptodev_scheduler dummy_scheduler = {
|
||||
.description = "dummy scheduler to test mode",
|
||||
.name = "dummy scheduler",
|
||||
.mode = CDEV_SCHED_MODE_USERDEFINED,
|
||||
.ops = &op
|
||||
};
|
||||
int ret;
|
||||
|
||||
/* set user defined mode */
|
||||
ret = rte_cryptodev_scheduler_load_user_scheduler(sched_id,
|
||||
&dummy_scheduler);
|
||||
TEST_ASSERT(ret == 0,
|
||||
"Failed to set cdev %u to user defined mode", sched_id);
|
||||
|
||||
/* set round robin mode */
|
||||
ret = rte_crpytodev_scheduler_mode_set(sched_id,
|
||||
CDEV_SCHED_MODE_ROUNDROBIN);
|
||||
TEST_ASSERT(ret == 0,
|
||||
"Failed to set cdev %u to round-robin mode", sched_id);
|
||||
TEST_ASSERT(rte_crpytodev_scheduler_mode_get(sched_id) ==
|
||||
CDEV_SCHED_MODE_ROUNDROBIN, "Scheduling Mode "
|
||||
"not match");
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static struct unit_test_suite cryptodev_scheduler_testsuite = {
|
||||
.suite_name = "Crypto Device Scheduler Unit Test Suite",
|
||||
.setup = testsuite_setup,
|
||||
.teardown = testsuite_teardown,
|
||||
.unit_test_cases = {
|
||||
TEST_CASE_ST(NULL, NULL, test_scheduler_attach_slave_op),
|
||||
TEST_CASE_ST(NULL, NULL, test_scheduler_mode_op),
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_AES_chain_scheduler_all),
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_AES_cipheronly_scheduler_all),
|
||||
TEST_CASE_ST(ut_setup, ut_teardown,
|
||||
test_authonly_scheduler_all),
|
||||
TEST_CASE_ST(NULL, NULL, test_scheduler_detach_slave_op),
|
||||
TEST_CASES_END() /**< NULL terminate unit test array */
|
||||
}
|
||||
};
|
||||
|
||||
#endif /* RTE_LIBRTE_PMD_CRYPTO_SCHEDULER */
|
||||
|
||||
static struct unit_test_suite cryptodev_qat_testsuite = {
|
||||
.suite_name = "Crypto QAT Unit Test Suite",
|
||||
.setup = testsuite_setup,
|
||||
@ -7973,6 +8197,19 @@ test_cryptodev_armv8(void)
|
||||
return unit_test_suite_runner(&cryptodev_armv8_testsuite);
|
||||
}
|
||||
|
||||
#ifdef RTE_LIBRTE_PMD_CRYPTO_SCHEDULER
|
||||
|
||||
static int
|
||||
test_cryptodev_scheduler(void /*argv __rte_unused, int argc __rte_unused*/)
|
||||
{
|
||||
gbl_cryptodev_type = RTE_CRYPTODEV_SCHEDULER_PMD;
|
||||
return unit_test_suite_runner(&cryptodev_scheduler_testsuite);
|
||||
}
|
||||
|
||||
REGISTER_TEST_COMMAND(cryptodev_scheduler_autotest, test_cryptodev_scheduler);
|
||||
|
||||
#endif
|
||||
|
||||
REGISTER_TEST_COMMAND(cryptodev_qat_autotest, test_cryptodev_qat);
|
||||
REGISTER_TEST_COMMAND(cryptodev_aesni_mb_autotest, test_cryptodev_aesni_mb);
|
||||
REGISTER_TEST_COMMAND(cryptodev_openssl_autotest, test_cryptodev_openssl);
|
||||
|
@ -1,7 +1,7 @@
|
||||
/*
|
||||
* BSD LICENSE
|
||||
*
|
||||
* Copyright(c) 2016 Intel Corporation. All rights reserved.
|
||||
* Copyright(c) 2016-2017 Intel Corporation. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
@ -924,7 +924,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CTR HMAC-SHA1 Decryption Digest "
|
||||
@ -933,21 +934,24 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-192-CTR XCBC Encryption Digest",
|
||||
.test_data = &aes_test_data_2,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-192-CTR XCBC Decryption Digest Verify",
|
||||
.test_data = &aes_test_data_2,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-192-CTR XCBC Decryption Digest Verify "
|
||||
@ -957,7 +961,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.feature_mask = BLOCKCIPHER_TEST_FEATURE_SG |
|
||||
BLOCKCIPHER_TEST_FEATURE_OOP,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-256-CTR HMAC-SHA1 Encryption Digest",
|
||||
@ -965,7 +970,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-256-CTR HMAC-SHA1 Decryption Digest "
|
||||
@ -974,7 +980,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest",
|
||||
@ -983,7 +990,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest "
|
||||
@ -1001,7 +1009,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
BLOCKCIPHER_TEST_FEATURE_OOP,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA1 Decryption Digest "
|
||||
@ -1011,7 +1020,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA1 Decryption Digest "
|
||||
@ -1027,7 +1037,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA256 Encryption Digest "
|
||||
@ -1044,7 +1055,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA256 Decryption Digest "
|
||||
@ -1059,7 +1071,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA512 Encryption Digest "
|
||||
@ -1088,7 +1101,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA512 Decryption Digest "
|
||||
@ -1099,21 +1113,24 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
BLOCKCIPHER_TEST_FEATURE_OOP,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC XCBC Encryption Digest",
|
||||
.test_data = &aes_test_data_7,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC XCBC Decryption Digest Verify",
|
||||
.test_data = &aes_test_data_7,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest "
|
||||
@ -1141,7 +1158,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA224 Decryption Digest "
|
||||
@ -1150,7 +1168,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA384 Encryption Digest",
|
||||
@ -1158,7 +1177,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA384 Decryption Digest "
|
||||
@ -1167,7 +1187,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest "
|
||||
@ -1197,7 +1218,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CBC Decryption",
|
||||
@ -1205,7 +1227,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-192-CBC Encryption",
|
||||
@ -1213,7 +1236,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-192-CBC Encryption Scater gather",
|
||||
@ -1229,7 +1253,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-256-CBC Encryption",
|
||||
@ -1237,7 +1262,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-256-CBC Decryption",
|
||||
@ -1245,7 +1271,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CTR Encryption",
|
||||
@ -1253,7 +1280,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-128-CTR Decryption",
|
||||
@ -1261,7 +1289,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-192-CTR Encryption",
|
||||
@ -1269,7 +1298,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-192-CTR Decryption",
|
||||
@ -1277,7 +1307,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-256-CTR Encryption",
|
||||
@ -1285,7 +1316,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "AES-256-CTR Decryption",
|
||||
@ -1293,7 +1325,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = {
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_DECRYPT,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_QAT |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
};
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
/*-
|
||||
* BSD LICENSE
|
||||
*
|
||||
* Copyright(c) 2015-2016 Intel Corporation. All rights reserved.
|
||||
* Copyright(c) 2015-2017 Intel Corporation. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
@ -106,6 +106,7 @@ test_blockcipher_one_case(const struct blockcipher_test_case *t,
|
||||
digest_len = tdata->digest.len;
|
||||
break;
|
||||
case RTE_CRYPTODEV_AESNI_MB_PMD:
|
||||
case RTE_CRYPTODEV_SCHEDULER_PMD:
|
||||
digest_len = tdata->digest.truncated_len;
|
||||
break;
|
||||
default:
|
||||
@ -649,6 +650,9 @@ test_blockcipher_all_tests(struct rte_mempool *mbuf_pool,
|
||||
case RTE_CRYPTODEV_ARMV8_PMD:
|
||||
target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8;
|
||||
break;
|
||||
case RTE_CRYPTODEV_SCHEDULER_PMD:
|
||||
target_pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER;
|
||||
break;
|
||||
default:
|
||||
TEST_ASSERT(0, "Unrecognized cryptodev type");
|
||||
break;
|
||||
|
@ -1,7 +1,7 @@
|
||||
/*-
|
||||
* BSD LICENSE
|
||||
*
|
||||
* Copyright(c) 2016 Intel Corporation. All rights reserved.
|
||||
* Copyright(c) 2016-2017 Intel Corporation. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
@ -51,6 +51,7 @@
|
||||
#define BLOCKCIPHER_TEST_TARGET_PMD_QAT 0x0002 /* QAT flag */
|
||||
#define BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL 0x0004 /* SW OPENSSL flag */
|
||||
#define BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 0x0008 /* ARMv8 flag */
|
||||
#define BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER 0x0010 /* Scheduler */
|
||||
|
||||
#define BLOCKCIPHER_TEST_OP_CIPHER (BLOCKCIPHER_TEST_OP_ENCRYPT | \
|
||||
BLOCKCIPHER_TEST_OP_DECRYPT)
|
||||
|
@ -1,7 +1,7 @@
|
||||
/*
|
||||
* BSD LICENSE
|
||||
*
|
||||
* Copyright(c) 2016 Intel Corporation. All rights reserved.
|
||||
* Copyright(c) 2016-2017 Intel Corporation. All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
@ -365,14 +365,16 @@ static const struct blockcipher_test_case hash_test_cases[] = {
|
||||
.test_data = &hmac_md5_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "HMAC-MD5 Digest Verify",
|
||||
.test_data = &hmac_md5_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "SHA1 Digest",
|
||||
@ -391,14 +393,16 @@ static const struct blockcipher_test_case hash_test_cases[] = {
|
||||
.test_data = &hmac_sha1_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "HMAC-SHA1 Digest Verify",
|
||||
.test_data = &hmac_sha1_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "SHA224 Digest",
|
||||
@ -417,14 +421,16 @@ static const struct blockcipher_test_case hash_test_cases[] = {
|
||||
.test_data = &hmac_sha224_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "HMAC-SHA224 Digest Verify",
|
||||
.test_data = &hmac_sha224_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "SHA256 Digest",
|
||||
@ -443,14 +449,16 @@ static const struct blockcipher_test_case hash_test_cases[] = {
|
||||
.test_data = &hmac_sha256_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "HMAC-SHA256 Digest Verify",
|
||||
.test_data = &hmac_sha256_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "SHA384 Digest",
|
||||
@ -469,14 +477,16 @@ static const struct blockcipher_test_case hash_test_cases[] = {
|
||||
.test_data = &hmac_sha384_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "HMAC-SHA384 Digest Verify",
|
||||
.test_data = &hmac_sha384_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "SHA512 Digest",
|
||||
@ -495,14 +505,16 @@ static const struct blockcipher_test_case hash_test_cases[] = {
|
||||
.test_data = &hmac_sha512_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
{
|
||||
.test_descr = "HMAC-SHA512 Digest Verify",
|
||||
.test_data = &hmac_sha512_test_vector,
|
||||
.op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY,
|
||||
.pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_MB |
|
||||
BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER
|
||||
},
|
||||
};
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user