f8be1786b1
This patchset introduce new application which allows measuring performance parameters of PMDs available in crypto tree. The goal of this application is to replace existing performance tests in app/test. Parameters available are: throughput (--ptest throughput) and latency (--ptest latency). User can use multiply cores to run tests on but only one type of crypto PMD can be measured during single application execution. Cipher parameters, type of device, type of operation and chain mode have to be specified in the command line as application parameters. These parameters are checked using device capabilities structure. Couple of new library functions in librte_cryptodev are introduced for application use. To build the application a CONFIG_RTE_APP_CRYPTO_PERF flag has to be set (it is set by default). Example of usage: -c 0xc0 --vdev crypto_aesni_mb_pmd -w 0000:00:00.0 -- --ptest throughput --devtype crypto_aesni_mb --optype cipher-then-auth --cipher-algo aes-cbc --cipher-op encrypt --cipher-key-sz 16 --auth-algo sha1-hmac --auth-op generate --auth-key-sz 64 --auth-digest-sz 12 --total-ops 10000000 --burst-sz 32 --buffer-sz 64 Signed-off-by: Declan Doherty <declan.doherty@intel.com> Signed-off-by: Slawomir Mrozowicz <slawomirx.mrozowicz@intel.com> Signed-off-by: Piotr Azarewicz <piotrx.t.azarewicz@intel.com> Signed-off-by: Marcin Kerlin <marcinx.kerlin@intel.com> Signed-off-by: Michal Kobylinski <michalx.kobylinski@intel.com>
501 lines
11 KiB
C
501 lines
11 KiB
C
#include <stdio.h>
|
|
|
|
#include <rte_malloc.h>
|
|
|
|
#include "cperf_options.h"
|
|
#include "cperf_test_vectors.h"
|
|
#include "cperf_test_vector_parsing.h"
|
|
|
|
int
|
|
free_test_vector(struct cperf_test_vector *vector, struct cperf_options *opts)
|
|
{
|
|
if (vector == NULL || opts == NULL)
|
|
return -1;
|
|
|
|
rte_free(vector->iv.data);
|
|
rte_free(vector->aad.data);
|
|
rte_free(vector->digest.data);
|
|
|
|
if (opts->test_file != NULL) {
|
|
rte_free(vector->plaintext.data);
|
|
rte_free(vector->cipher_key.data);
|
|
rte_free(vector->auth_key.data);
|
|
rte_free(vector->ciphertext.data);
|
|
}
|
|
|
|
rte_free(vector);
|
|
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
show_test_vector(struct cperf_test_vector *test_vector)
|
|
{
|
|
const uint8_t wrap = 32;
|
|
uint32_t i;
|
|
|
|
if (test_vector == NULL)
|
|
return;
|
|
|
|
if (test_vector->plaintext.data) {
|
|
printf("\nplaintext =\n");
|
|
for (i = 0; i < test_vector->plaintext.length; ++i) {
|
|
if ((i % wrap == 0) && (i != 0))
|
|
printf("\n");
|
|
if (i == test_vector->plaintext.length - 1)
|
|
printf("0x%02x",
|
|
test_vector->plaintext.data[i]);
|
|
else
|
|
printf("0x%02x, ",
|
|
test_vector->plaintext.data[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
if (test_vector->cipher_key.data) {
|
|
printf("\ncipher_key =\n");
|
|
for (i = 0; i < test_vector->cipher_key.length; ++i) {
|
|
if ((i % wrap == 0) && (i != 0))
|
|
printf("\n");
|
|
if (i == (uint32_t)(test_vector->cipher_key.length - 1))
|
|
printf("0x%02x",
|
|
test_vector->cipher_key.data[i]);
|
|
else
|
|
printf("0x%02x, ",
|
|
test_vector->cipher_key.data[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
if (test_vector->auth_key.data) {
|
|
printf("\nauth_key =\n");
|
|
for (i = 0; i < test_vector->auth_key.length; ++i) {
|
|
if ((i % wrap == 0) && (i != 0))
|
|
printf("\n");
|
|
if (i == (uint32_t)(test_vector->auth_key.length - 1))
|
|
printf("0x%02x", test_vector->auth_key.data[i]);
|
|
else
|
|
printf("0x%02x, ",
|
|
test_vector->auth_key.data[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
if (test_vector->iv.data) {
|
|
printf("\niv =\n");
|
|
for (i = 0; i < test_vector->iv.length; ++i) {
|
|
if ((i % wrap == 0) && (i != 0))
|
|
printf("\n");
|
|
if (i == (uint32_t)(test_vector->iv.length - 1))
|
|
printf("0x%02x", test_vector->iv.data[i]);
|
|
else
|
|
printf("0x%02x, ", test_vector->iv.data[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
if (test_vector->ciphertext.data) {
|
|
printf("\nciphertext =\n");
|
|
for (i = 0; i < test_vector->ciphertext.length; ++i) {
|
|
if ((i % wrap == 0) && (i != 0))
|
|
printf("\n");
|
|
if (i == test_vector->ciphertext.length - 1)
|
|
printf("0x%02x",
|
|
test_vector->ciphertext.data[i]);
|
|
else
|
|
printf("0x%02x, ",
|
|
test_vector->ciphertext.data[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
if (test_vector->aad.data) {
|
|
printf("\naad =\n");
|
|
for (i = 0; i < test_vector->aad.length; ++i) {
|
|
if ((i % wrap == 0) && (i != 0))
|
|
printf("\n");
|
|
if (i == (uint32_t)(test_vector->aad.length - 1))
|
|
printf("0x%02x", test_vector->aad.data[i]);
|
|
else
|
|
printf("0x%02x, ", test_vector->aad.data[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
if (test_vector->digest.data) {
|
|
printf("\ndigest =\n");
|
|
for (i = 0; i < test_vector->digest.length; ++i) {
|
|
if ((i % wrap == 0) && (i != 0))
|
|
printf("\n");
|
|
if (i == (uint32_t)(test_vector->digest.length - 1))
|
|
printf("0x%02x", test_vector->digest.data[i]);
|
|
else
|
|
printf("0x%02x, ", test_vector->digest.data[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
}
|
|
|
|
/* trim leading and trailing spaces */
|
|
static char *
|
|
trim_space(char *str)
|
|
{
|
|
char *start, *end;
|
|
|
|
for (start = str; *start; start++) {
|
|
if (!isspace((unsigned char) start[0]))
|
|
break;
|
|
}
|
|
|
|
for (end = start + strlen(start); end > start + 1; end--) {
|
|
if (!isspace((unsigned char) end[-1]))
|
|
break;
|
|
}
|
|
|
|
*end = 0;
|
|
|
|
/* Shift from "start" to the beginning of the string */
|
|
if (start > str)
|
|
memmove(str, start, (end - start) + 1);
|
|
|
|
return str;
|
|
}
|
|
|
|
/* tokenization test values separated by a comma */
|
|
static int
|
|
parse_values(char *tokens, uint8_t **data, uint32_t *data_length)
|
|
{
|
|
uint32_t n_tokens;
|
|
uint32_t data_size = 32;
|
|
|
|
uint8_t *values, *values_resized;
|
|
char *tok, *error = NULL;
|
|
|
|
tok = strtok(tokens, CPERF_VALUE_DELIMITER);
|
|
if (tok == NULL)
|
|
return -1;
|
|
|
|
values = (uint8_t *) rte_zmalloc(NULL, sizeof(uint8_t) * data_size, 0);
|
|
if (values == NULL)
|
|
return -1;
|
|
|
|
n_tokens = 0;
|
|
while (tok != NULL) {
|
|
values_resized = NULL;
|
|
|
|
if (n_tokens >= data_size) {
|
|
data_size *= 2;
|
|
|
|
values_resized = (uint8_t *) rte_realloc(values,
|
|
sizeof(uint8_t) * data_size, 0);
|
|
if (values_resized == NULL) {
|
|
rte_free(values);
|
|
return -1;
|
|
}
|
|
values = values_resized;
|
|
}
|
|
|
|
values[n_tokens] = (uint8_t) strtoul(tok, &error, 0);
|
|
if ((error == NULL) || (*error != '\0')) {
|
|
printf("Failed with convert '%s'\n", tok);
|
|
rte_free(values);
|
|
return -1;
|
|
}
|
|
|
|
tok = strtok(NULL, CPERF_VALUE_DELIMITER);
|
|
if (tok == NULL)
|
|
break;
|
|
|
|
n_tokens++;
|
|
}
|
|
|
|
values_resized = (uint8_t *) rte_realloc(values,
|
|
sizeof(uint8_t) * (n_tokens + 1), 0);
|
|
|
|
if (values_resized == NULL) {
|
|
rte_free(values);
|
|
return -1;
|
|
}
|
|
|
|
*data = values_resized;
|
|
*data_length = n_tokens + 1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* checks the type of key and assigns data */
|
|
static int
|
|
parse_entry(char *entry, struct cperf_test_vector *vector,
|
|
struct cperf_options *opts, uint8_t tc_found)
|
|
{
|
|
int status;
|
|
uint32_t data_length;
|
|
|
|
uint8_t *data = NULL;
|
|
char *token, *key_token;
|
|
|
|
/* get key */
|
|
token = strtok(entry, CPERF_ENTRY_DELIMITER);
|
|
key_token = token;
|
|
|
|
/* get values for key */
|
|
token = strtok(NULL, CPERF_ENTRY_DELIMITER);
|
|
if (token == NULL) {
|
|
printf("Expected 'key = values' but was '%.40s'..\n",
|
|
key_token);
|
|
return -1;
|
|
}
|
|
|
|
status = parse_values(token, &data, &data_length);
|
|
if (status)
|
|
return -1;
|
|
|
|
/* compare keys */
|
|
if (strstr(key_token, "plaintext")) {
|
|
rte_free(vector->plaintext.data);
|
|
vector->plaintext.data = data;
|
|
if (tc_found)
|
|
vector->plaintext.length = data_length;
|
|
else {
|
|
if (opts->buffer_sz > data_length) {
|
|
printf("Global plaintext shorter than "
|
|
"buffer_sz\n");
|
|
return -1;
|
|
}
|
|
vector->plaintext.length = opts->buffer_sz;
|
|
}
|
|
|
|
} else if (strstr(key_token, "cipher_key")) {
|
|
rte_free(vector->cipher_key.data);
|
|
vector->cipher_key.data = data;
|
|
if (tc_found)
|
|
vector->cipher_key.length = data_length;
|
|
else {
|
|
if (opts->cipher_key_sz > data_length) {
|
|
printf("Global cipher_key shorter than "
|
|
"cipher_key_sz\n");
|
|
return -1;
|
|
}
|
|
vector->cipher_key.length = opts->cipher_key_sz;
|
|
}
|
|
|
|
} else if (strstr(key_token, "auth_key")) {
|
|
rte_free(vector->auth_key.data);
|
|
vector->auth_key.data = data;
|
|
if (tc_found)
|
|
vector->auth_key.length = data_length;
|
|
else {
|
|
if (opts->auth_key_sz > data_length) {
|
|
printf("Global auth_key shorter than "
|
|
"auth_key_sz\n");
|
|
return -1;
|
|
}
|
|
vector->auth_key.length = opts->auth_key_sz;
|
|
}
|
|
|
|
} else if (strstr(key_token, "iv")) {
|
|
rte_free(vector->iv.data);
|
|
vector->iv.data = data;
|
|
vector->iv.phys_addr = rte_malloc_virt2phy(vector->iv.data);
|
|
if (tc_found)
|
|
vector->iv.length = data_length;
|
|
else {
|
|
if (opts->cipher_iv_sz > data_length) {
|
|
printf("Global iv shorter than "
|
|
"cipher_iv_sz\n");
|
|
return -1;
|
|
}
|
|
vector->iv.length = opts->cipher_iv_sz;
|
|
}
|
|
|
|
} else if (strstr(key_token, "ciphertext")) {
|
|
rte_free(vector->ciphertext.data);
|
|
vector->ciphertext.data = data;
|
|
if (tc_found)
|
|
vector->ciphertext.length = data_length;
|
|
else {
|
|
if (opts->buffer_sz > data_length) {
|
|
printf("Global ciphertext shorter than "
|
|
"buffer_sz\n");
|
|
return -1;
|
|
}
|
|
vector->ciphertext.length = opts->buffer_sz;
|
|
}
|
|
|
|
} else if (strstr(key_token, "aad")) {
|
|
rte_free(vector->aad.data);
|
|
vector->aad.data = data;
|
|
vector->aad.phys_addr = rte_malloc_virt2phy(vector->aad.data);
|
|
if (tc_found)
|
|
vector->aad.length = data_length;
|
|
else {
|
|
if (opts->auth_aad_sz > data_length) {
|
|
printf("Global aad shorter than "
|
|
"auth_aad_sz\n");
|
|
return -1;
|
|
}
|
|
vector->aad.length = opts->auth_aad_sz;
|
|
}
|
|
|
|
} else if (strstr(key_token, "digest")) {
|
|
rte_free(vector->digest.data);
|
|
vector->digest.data = data;
|
|
vector->digest.phys_addr = rte_malloc_virt2phy(
|
|
vector->digest.data);
|
|
if (tc_found)
|
|
vector->digest.length = data_length;
|
|
else {
|
|
if (opts->auth_digest_sz > data_length) {
|
|
printf("Global digest shorter than "
|
|
"auth_digest_sz\n");
|
|
return -1;
|
|
}
|
|
vector->digest.length = opts->auth_digest_sz;
|
|
}
|
|
} else {
|
|
printf("Not valid key: '%s'\n", trim_space(key_token));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* searches in the file for test keys and values */
|
|
static int
|
|
parse_file(struct cperf_test_vector *vector, struct cperf_options *opts)
|
|
{
|
|
uint8_t tc_found = 0;
|
|
uint8_t tc_data_start = 0;
|
|
ssize_t read;
|
|
size_t len = 0;
|
|
int status = 0;
|
|
|
|
FILE *fp;
|
|
char *line = NULL;
|
|
char *entry = NULL;
|
|
|
|
fp = fopen(opts->test_file, "r");
|
|
if (fp == NULL) {
|
|
printf("File %s does not exists\n", opts->test_file);
|
|
return -1;
|
|
}
|
|
|
|
while ((read = getline(&line, &len, fp)) != -1) {
|
|
|
|
/* ignore comments and new lines */
|
|
if (line[0] == '#' || line[0] == '/' || line[0] == '\n'
|
|
|| line[0] == '\r' || line[0] == ' ')
|
|
continue;
|
|
|
|
trim_space(line);
|
|
|
|
/* next test case is started */
|
|
if (line[0] == '[' && line[strlen(line) - 1] == ']' && tc_found)
|
|
break;
|
|
/* test case section started, end of global data */
|
|
else if (line[0] == '[' && line[strlen(line) - 1] == ']')
|
|
tc_data_start = 1;
|
|
|
|
/* test name unspecified, end after global data */
|
|
if (tc_data_start && opts->test_name == NULL)
|
|
break;
|
|
/* searching for a suitable test */
|
|
else if (tc_data_start && tc_found == 0) {
|
|
if (!strcmp(line, opts->test_name)) {
|
|
tc_found = 1;
|
|
continue;
|
|
} else
|
|
continue;
|
|
}
|
|
|
|
/* buffer for multiline */
|
|
entry = (char *) rte_realloc(entry,
|
|
sizeof(char) * strlen(line) + 1, 0);
|
|
if (entry == NULL)
|
|
return -1;
|
|
|
|
memset(entry, 0, strlen(line) + 1);
|
|
strncpy(entry, line, strlen(line));
|
|
|
|
/* check if entry ends with , or = */
|
|
if (entry[strlen(entry) - 1] == ','
|
|
|| entry[strlen(entry) - 1] == '=') {
|
|
while ((read = getline(&line, &len, fp)) != -1) {
|
|
trim_space(line);
|
|
|
|
/* extend entry about length of new line */
|
|
char *entry_extended = (char *) rte_realloc(
|
|
entry, sizeof(char)
|
|
* (strlen(line) + strlen(entry))
|
|
+ 1, 0);
|
|
|
|
if (entry_extended == NULL)
|
|
goto err;
|
|
entry = entry_extended;
|
|
|
|
strncat(entry, line, strlen(line));
|
|
|
|
if (entry[strlen(entry) - 1] != ',')
|
|
break;
|
|
}
|
|
}
|
|
status = parse_entry(entry, vector, opts, tc_found);
|
|
if (status) {
|
|
printf("An error occurred while parsing!\n");
|
|
goto err;
|
|
}
|
|
}
|
|
|
|
if (tc_found == 0 && opts->test_name != NULL) {
|
|
printf("Not found '%s' case in test file\n", opts->test_name);
|
|
goto err;
|
|
}
|
|
|
|
fclose(fp);
|
|
free(line);
|
|
rte_free(entry);
|
|
|
|
return 0;
|
|
|
|
err:
|
|
if (fp)
|
|
fclose(fp);
|
|
if (line)
|
|
free(line);
|
|
if (entry)
|
|
rte_free(entry);
|
|
|
|
return -1;
|
|
}
|
|
|
|
struct cperf_test_vector*
|
|
cperf_test_vector_get_from_file(struct cperf_options *opts)
|
|
{
|
|
int status;
|
|
struct cperf_test_vector *test_vector = NULL;
|
|
|
|
if (opts == NULL || opts->test_file == NULL)
|
|
return test_vector;
|
|
|
|
test_vector = (struct cperf_test_vector *) rte_zmalloc(NULL,
|
|
sizeof(struct cperf_test_vector), 0);
|
|
if (test_vector == NULL)
|
|
return test_vector;
|
|
|
|
/* filling the vector with data from a file */
|
|
status = parse_file(test_vector, opts);
|
|
if (status) {
|
|
free_test_vector(test_vector, opts);
|
|
return NULL;
|
|
}
|
|
|
|
/* other values not included in the file */
|
|
test_vector->data.cipher_offset = 0;
|
|
test_vector->data.cipher_length = opts->buffer_sz;
|
|
|
|
test_vector->data.auth_offset = 0;
|
|
test_vector->data.auth_length = opts->buffer_sz;
|
|
|
|
return test_vector;
|
|
}
|