get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/127160/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 127160,
    "url": "http://patches.dpdk.org/api/patches/127160/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20230522115636.309-2-anoobj@marvell.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20230522115636.309-2-anoobj@marvell.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20230522115636.309-2-anoobj@marvell.com",
    "date": "2023-05-22T11:56:36",
    "name": "[2/2] test/crypto: handle returns from raw crypto APIs",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "430f29a40c8a5824a82e57dcfec4903846071e7e",
    "submitter": {
        "id": 1205,
        "url": "http://patches.dpdk.org/api/people/1205/?format=api",
        "name": "Anoob Joseph",
        "email": "anoobj@marvell.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20230522115636.309-2-anoobj@marvell.com/mbox/",
    "series": [
        {
            "id": 28109,
            "url": "http://patches.dpdk.org/api/series/28109/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=28109",
            "date": "2023-05-22T11:56:35",
            "name": "[1/2] cryptodev: update raw datapath API documentation",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/28109/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/127160/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/127160/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id D517642B6F;\n\tMon, 22 May 2023 13:56:44 +0200 (CEST)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id C98C642670;\n\tMon, 22 May 2023 13:56:44 +0200 (CEST)",
            "from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com\n [67.231.148.174])\n by mails.dpdk.org (Postfix) with ESMTP id 17760410F2\n for <dev@dpdk.org>; Mon, 22 May 2023 13:56:42 +0200 (CEST)",
            "from pps.filterd (m0045849.ppops.net [127.0.0.1])\n by mx0a-0016f401.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id\n 34MBOIk7015838; Mon, 22 May 2023 04:56:42 -0700",
            "from dc5-exch01.marvell.com ([199.233.59.181])\n by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3qpujnea54-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT);\n Mon, 22 May 2023 04:56:41 -0700",
            "from DC5-EXCH01.marvell.com (10.69.176.38) by DC5-EXCH01.marvell.com\n (10.69.176.38) with Microsoft SMTP Server (TLS) id 15.0.1497.48;\n Mon, 22 May 2023 04:56:40 -0700",
            "from maili.marvell.com (10.69.176.80) by DC5-EXCH01.marvell.com\n (10.69.176.38) with Microsoft SMTP Server id 15.0.1497.48 via Frontend\n Transport; Mon, 22 May 2023 04:56:40 -0700",
            "from BG-LT92004.corp.innovium.com (unknown [10.28.161.183])\n by maili.marvell.com (Postfix) with ESMTP id B138B3F7045;\n Mon, 22 May 2023 04:56:36 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com;\n h=from : to : cc :\n subject : date : message-id : in-reply-to : references : mime-version :\n content-transfer-encoding : content-type; s=pfpt0220;\n bh=46Y7WQqo8uU5lwzrB3C0aae+7YnlBH4cuyOV0aH/eBA=;\n b=kFTzAmv1MhL1g3vjvP/Lnd4oCr2NtWuhW9+oTM/XEORmq9E231XRFW9cA9+Qed6q9sDN\n Ikkmn+VYFyigEgElLjPrLRIXSEFw4s62y3hm9Et6ILBqsA1Prd+uHLAHCZeqsyhZHt7f\n 1vlKSIvV/p9wT9INMK3oE1Elspj0242FTxCdhdOcMcTX6f1VLv9BzlrZ63jgYLHrhAaR\n D/4NKmxvZd4vdDE7fT0pS/9DKAO1o1IsTMlTZU+BxKUxsJU34vpD4/P4WWc2fLIsoPmp\n rzS5agMwQCRuiQ/cInxuxu3qApI5FtZPEMKytgGL6B45ancrbxwGsRloAWf0VqbaIthW zg==",
        "From": "Anoob Joseph <anoobj@marvell.com>",
        "To": "Ciara Power <ciara.power@intel.com>, Akhil Goyal <gakhil@marvell.com>,\n \"Fan Zhang\" <fanzhang.oss@gmail.com>",
        "CC": "Gagandeep Singh <g.singh@nxp.com>,\n Hemant Agrawal <hemant.agrawal@nxp.com>,\n Jerin Jacob <jerinj@marvell.com>, Tejasree Kondoj <ktejasree@marvell.com>,\n Vidya Sagar Velumuri <vvelumuri@marvell.com>, <dev@dpdk.org>",
        "Subject": "[PATCH 2/2] test/crypto: handle returns from raw crypto APIs",
        "Date": "Mon, 22 May 2023 17:26:36 +0530",
        "Message-ID": "<20230522115636.309-2-anoobj@marvell.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20230522115636.309-1-anoobj@marvell.com>",
        "References": "<20230522115636.309-1-anoobj@marvell.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-Proofpoint-ORIG-GUID": "1ugGdAiPkSJwH-0i9iHkU3IbGlJ3GBLB",
        "X-Proofpoint-GUID": "1ugGdAiPkSJwH-0i9iHkU3IbGlJ3GBLB",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.573,FMLib:17.11.170.22\n definitions=2023-05-22_07,2023-05-22_03,2023-02-09_01",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Raw crypto APIs may return -ENOTSUP when the cryptodev does not support\nthe requested feature. Handle it gracefully so that tests get marked as\n\"SKIPPED\" instead of \"FAILED\".\n\nSigned-off-by: Anoob Joseph <anoobj@marvell.com>\n---\n app/test/test_cryptodev.c             | 449 +++++++++++++++-----------\n app/test/test_cryptodev.h             |   2 +-\n app/test/test_cryptodev_blockcipher.c |  12 +-\n 3 files changed, 279 insertions(+), 184 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c\nindex f48d837a50..fc82e3c305 100644\n--- a/app/test/test_cryptodev.c\n+++ b/app/test/test_cryptodev.c\n@@ -195,7 +195,7 @@ static struct crypto_testsuite_params testsuite_params = { NULL };\n struct crypto_testsuite_params *p_testsuite_params = &testsuite_params;\n static struct crypto_unittest_params unittest_params;\n \n-void\n+int\n process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n \t\tstruct rte_crypto_op *op, uint8_t is_cipher, uint8_t is_auth,\n \t\tuint8_t len_in_bits, uint8_t cipher_iv_len)\n@@ -221,26 +221,25 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n \tint enqueue_status, dequeue_status;\n \tstruct crypto_unittest_params *ut_params = &unittest_params;\n \tint is_sgl = sop->m_src->nb_segs > 1;\n-\tint is_oop = 0;\n+\tint ret = TEST_SUCCESS, is_oop = 0;\n \n \tctx_service_size = rte_cryptodev_get_raw_dp_ctx_size(dev_id);\n-\tif (ctx_service_size < 0) {\n-\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n-\t\treturn;\n-\t}\n+\tif (ctx_service_size < 0)\n+\t\treturn TEST_SKIPPED;\n \n \tctx = malloc(ctx_service_size);\n-\tif (!ctx) {\n-\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n-\t\treturn;\n-\t}\n+\tif (ctx == NULL)\n+\t\treturn TEST_FAILED;\n \n \t/* Both are enums, setting crypto_sess will suit any session type */\n \tsess.crypto_sess = op->sym->session;\n \n-\tif (rte_cryptodev_configure_raw_dp_ctx(dev_id, qp_id, ctx,\n-\t\t\top->sess_type, sess, 0) < 0) {\n-\t\top->status = RTE_CRYPTO_OP_STATUS_ERROR;\n+\tret = rte_cryptodev_configure_raw_dp_ctx(dev_id, qp_id, ctx, op->sess_type, sess, 0);\n+\tif (ret == -ENOTSUP) {\n+\t\tret = TEST_SKIPPED;\n+\t\tgoto exit;\n+\t} else if (ret) {\n+\t\tret = TEST_FAILED;\n \t\tgoto exit;\n \t}\n \n@@ -433,6 +432,7 @@ process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n \n exit:\n \tfree(ctx);\n+\treturn ret;\n }\n \n static void\n@@ -2340,6 +2340,8 @@ test_AES_CBC_HMAC_SHA512_decrypt_perform(void *sess,\n \t\tconst uint8_t *digest,\n \t\tconst uint8_t *iv)\n {\n+\tint ret;\n+\n \t/* Generate test mbuf data and digest */\n \tut_params->ibuf = setup_test_string(ts_params->mbuf_pool,\n \t\t\t(const char *)\n@@ -2385,10 +2387,11 @@ test_AES_CBC_HMAC_SHA512_decrypt_perform(void *sess,\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_crypt_auth_op(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tret = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 0, 0);\n+\t\tif (ret != TEST_SUCCESS)\n+\t\t\treturn ret;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(\n \t\t\t\tprocess_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\tut_params->op),\n@@ -3143,10 +3146,12 @@ test_snow3g_authentication(const struct snow3g_hash_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 1, 0);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 1,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\tut_params->op);\n \tut_params->obuf = ut_params->op->sym->m_src;\n@@ -3235,10 +3240,12 @@ test_snow3g_authentication_verify(const struct snow3g_hash_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 1, 0);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 1,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -3322,10 +3329,12 @@ test_kasumi_authentication(const struct kasumi_hash_test_data *tdata)\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_crypt_auth_op(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 1, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 1,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \n@@ -3409,10 +3418,12 @@ test_kasumi_authentication_verify(const struct kasumi_hash_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 1, 0);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 1,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -3633,10 +3644,12 @@ test_kasumi_encryption(const struct kasumi_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -3732,10 +3745,12 @@ test_kasumi_encryption_sgl(const struct kasumi_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -4091,10 +4106,12 @@ test_kasumi_decryption(const struct kasumi_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 0, 1, 0);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -4183,10 +4200,12 @@ test_snow3g_encryption(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -4284,10 +4303,12 @@ test_snow3g_encryption_oop(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -4403,10 +4424,12 @@ test_snow3g_encryption_oop_sgl(const struct snow3g_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -4534,10 +4557,12 @@ test_snow3g_encryption_offset_oop(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -4636,10 +4661,12 @@ static int test_snow3g_decryption(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -4736,10 +4763,12 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -4830,10 +4859,12 @@ test_zuc_cipher_auth(const struct wireless_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -4942,10 +4973,12 @@ test_snow3g_cipher_auth(const struct snow3g_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -5092,10 +5125,12 @@ test_snow3g_auth_cipher(const struct snow3g_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \n@@ -5299,10 +5334,12 @@ test_snow3g_auth_cipher_sgl(const struct snow3g_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \n@@ -5500,10 +5537,12 @@ test_kasumi_auth_cipher(const struct kasumi_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \n@@ -5704,10 +5743,12 @@ test_kasumi_auth_cipher_sgl(const struct kasumi_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \n@@ -5862,10 +5903,12 @@ test_kasumi_cipher_auth(const struct kasumi_test_data *tdata)\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -6031,10 +6074,12 @@ test_zuc_cipher(const struct wireless_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -6166,10 +6211,12 @@ test_zuc_cipher_sgl(const struct wireless_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 0, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 0, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -6284,10 +6331,12 @@ test_zuc_authentication(const struct wireless_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 1, 0);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 1,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\tut_params->op);\n \tTEST_ASSERT_NOT_NULL(ut_params->op, \"failed to retrieve obuf\");\n@@ -6439,10 +6488,12 @@ test_zuc_auth_cipher(const struct wireless_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \n@@ -6642,10 +6693,12 @@ test_zuc_auth_cipher_sgl(const struct wireless_test_data *tdata,\n \tif (retval < 0)\n \t\treturn retval;\n \n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 1, tdata->cipher_iv.len);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 1,\n+\t\t\t\t\t       tdata->cipher_iv.len);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \n@@ -8876,10 +8929,12 @@ test_authenticated_encryption(const struct aead_test_data *tdata)\n \t/* Process crypto operation */\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_aead_op(ts_params->valid_devs[0], ut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 0, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 0, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(\n \t\t\tprocess_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n@@ -9103,8 +9158,10 @@ static int test_pdcp_proto(int i, int oop, enum rte_crypto_cipher_operation opc,\n \t\t/* filling lengths */\n \t\tut_params->op->sym->cipher.data.length = ut_params->op->sym->m_src->pkt_len;\n \t\tut_params->op->sym->auth.data.length = ut_params->op->sym->m_src->pkt_len;\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\tut_params->op, 1, 1, 0, 0);\n+\n+\t\tret = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 0, 0);\n+\t\tif (ret != TEST_SUCCESS)\n+\t\t\treturn ret;\n \t} else {\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0], ut_params->op);\n \t}\n@@ -9384,8 +9441,10 @@ test_pdcp_proto_SGL(int i, int oop,\n \t\t\t\t+= temp_mbuf->pkt_len;\n \t\t\ttemp_mbuf = temp_mbuf->next;\n \t\t}\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\tut_params->op, 1, 1, 0, 0);\n+\n+\t\tret = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 0, 0);\n+\t\tif (ret != TEST_SUCCESS)\n+\t\t\treturn ret;\n \t} else {\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\t\t\t\t\tut_params->op);\n@@ -11580,10 +11639,12 @@ test_authenticated_decryption(const struct aead_test_data *tdata)\n \t/* Process crypto operation */\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_aead_op(ts_params->valid_devs[0], ut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 0, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 0, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(\n \t\t\tprocess_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n@@ -11919,10 +11980,12 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\tut_params->op, 0, 0, 0, 0);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 0, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n@@ -12023,10 +12086,12 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \tut_params->op->sym->m_dst = ut_params->obuf;\n \n \t/* Process crypto operation */\n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 0, 0, 0);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 0, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n \n@@ -12227,10 +12292,12 @@ test_authenticated_decryption_sessionless(\n \t\t\t\"crypto op session type not sessionless\");\n \n \t/* Process crypto operation */\n-\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 0, 0, 0);\n-\telse\n+\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 0, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(process_crypto_request(\n \t\t\tts_params->valid_devs[0], ut_params->op),\n \t\t\t\t\"failed to process sym crypto op\");\n@@ -12596,6 +12663,7 @@ test_MD5_HMAC_generate(const struct HMAC_MD5_vector *test_case)\n {\n \tuint16_t plaintext_pad_len;\n \tuint8_t *plaintext, *auth_tag;\n+\tint ret;\n \n \tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n \tstruct crypto_unittest_params *ut_params = &unittest_params;\n@@ -12637,10 +12705,11 @@ test_MD5_HMAC_generate(const struct HMAC_MD5_vector *test_case)\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_crypt_auth_op(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tret = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 0, 0);\n+\t\tif (ret != TEST_SUCCESS)\n+\t\t\treturn ret;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(\n \t\t\tprocess_crypto_request(ts_params->valid_devs[0],\n \t\t\t\tut_params->op),\n@@ -12669,6 +12738,7 @@ static int\n test_MD5_HMAC_verify(const struct HMAC_MD5_vector *test_case)\n {\n \tuint8_t *plaintext;\n+\tint ret;\n \n \tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n \tstruct crypto_unittest_params *ut_params = &unittest_params;\n@@ -12708,10 +12778,11 @@ test_MD5_HMAC_verify(const struct HMAC_MD5_vector *test_case)\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_crypt_auth_op(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tret = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 0, 0);\n+\t\tif (ret != TEST_SUCCESS)\n+\t\t\treturn ret;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(\n \t\t\tprocess_crypto_request(ts_params->valid_devs[0],\n \t\t\t\tut_params->op),\n@@ -13581,10 +13652,12 @@ test_AES_GMAC_authentication(const struct gmac_test_data *tdata)\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_crypt_auth_op(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(\n \t\t\tprocess_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n@@ -13713,10 +13786,12 @@ test_AES_GMAC_authentication_verify(const struct gmac_test_data *tdata)\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_crypt_auth_op(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(\n \t\t\tprocess_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\n@@ -14451,10 +14526,12 @@ test_authentication_verify_fail_when_data_corruption(\n \t\tTEST_ASSERT_NOT_EQUAL(ut_params->op->status,\n \t\t\tRTE_CRYPTO_OP_STATUS_SUCCESS,\n \t\t\t\"authentication not failed\");\n-\t} else if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 0, 0);\n-\telse {\n+\t} else if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else {\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \t}\n@@ -14538,10 +14615,12 @@ test_authentication_verify_GMAC_fail_when_corruption(\n \t\tTEST_ASSERT_NOT_EQUAL(ut_params->op->status,\n \t\t\tRTE_CRYPTO_OP_STATUS_SUCCESS,\n \t\t\t\"authentication not failed\");\n-\t} else if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 1, 0, 0);\n-\telse {\n+\t} else if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 1, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else {\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \t\tTEST_ASSERT_NULL(ut_params->op, \"authentication not failed\");\n@@ -14629,10 +14708,12 @@ test_authenticated_decryption_fail_when_corruption(\n \t\tTEST_ASSERT_NOT_EQUAL(ut_params->op->status,\n \t\t\tRTE_CRYPTO_OP_STATUS_SUCCESS,\n \t\t\t\"authentication not failed\");\n-\t} else if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 0, 0);\n-\telse {\n+\t} else if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else {\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \t\tTEST_ASSERT_NULL(ut_params->op, \"authentication not failed\");\n@@ -14734,10 +14815,12 @@ test_authenticated_encrypt_with_esn(\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_crypt_auth_op(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(\n \t\t\tts_params->valid_devs[0], ut_params->op);\n \n@@ -14864,10 +14947,12 @@ test_authenticated_decrypt_with_esn(\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_crypt_auth_op(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 1, 1, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 1, 1, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tut_params->op = process_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op);\n \n@@ -15222,10 +15307,12 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,\n \tif (oop == IN_PLACE &&\n \t\t\tgbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n \t\tprocess_cpu_aead_op(ts_params->valid_devs[0], ut_params->op);\n-\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\tprocess_sym_raw_dp_op(ts_params->valid_devs[0], 0,\n-\t\t\t\tut_params->op, 0, 0, 0, 0);\n-\telse\n+\telse if (global_api_test_type == CRYPTODEV_RAW_API_TEST) {\n+\t\tretval = process_sym_raw_dp_op(ts_params->valid_devs[0], 0, ut_params->op, 0, 0, 0,\n+\t\t\t\t\t       0);\n+\t\tif (retval != TEST_SUCCESS)\n+\t\t\treturn retval;\n+\t} else\n \t\tTEST_ASSERT_NOT_NULL(\n \t\t\tprocess_crypto_request(ts_params->valid_devs[0],\n \t\t\tut_params->op), \"failed to process sym crypto op\");\ndiff --git a/app/test/test_cryptodev.h b/app/test/test_cryptodev.h\nindex abd795f54a..f2c417a267 100644\n--- a/app/test/test_cryptodev.h\n+++ b/app/test/test_cryptodev.h\n@@ -235,7 +235,7 @@ create_segmented_mbuf(struct rte_mempool *mbuf_pool, int pkt_len,\n \treturn NULL;\n }\n \n-void\n+int\n process_sym_raw_dp_op(uint8_t dev_id, uint16_t qp_id,\n \t\tstruct rte_crypto_op *op, uint8_t is_cipher, uint8_t is_auth,\n \t\tuint8_t len_in_bits, uint8_t cipher_iv_len);\ndiff --git a/app/test/test_cryptodev_blockcipher.c b/app/test/test_cryptodev_blockcipher.c\nindex 6c9a5964ea..e6469d03b5 100644\n--- a/app/test/test_cryptodev_blockcipher.c\n+++ b/app/test/test_cryptodev_blockcipher.c\n@@ -555,8 +555,16 @@ test_blockcipher_one_case(const struct blockcipher_test_case *t,\n \t\tif (t->op_mask & BLOCKCIPHER_TEST_OP_AUTH)\n \t\t\tis_auth = 1;\n \n-\t\tprocess_sym_raw_dp_op(dev_id, 0, op, is_cipher, is_auth, 0,\n-\t\t\t\ttdata->iv.len);\n+\t\tstatus = process_sym_raw_dp_op(dev_id, 0, op, is_cipher, is_auth,\n+\t\t\t\t\t       0, tdata->iv.len);\n+\t\tif (status != TEST_SUCCESS) {\n+\t\t\tif (status == TEST_SKIPPED)\n+\t\t\t\tsnprintf(test_msg, BLOCKCIPHER_TEST_MSG_LEN, \"SKIPPED\");\n+\t\t\telse\n+\t\t\t\tsnprintf(test_msg, BLOCKCIPHER_TEST_MSG_LEN, \"FAILED\");\n+\n+\t\t\tgoto error_exit;\n+\t\t}\n \t} else {\n \t\tif (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) {\n \t\t\tsnprintf(test_msg, BLOCKCIPHER_TEST_MSG_LEN,\n",
    "prefixes": [
        "2/2"
    ]
}