get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/44426/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 44426,
    "url": "http://patches.dpdk.org/api/patches/44426/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20180907171311.20371-2-marko.kovacevic@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20180907171311.20371-2-marko.kovacevic@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20180907171311.20371-2-marko.kovacevic@intel.com",
    "date": "2018-09-07T17:13:10",
    "name": "[v1,1/2] test/test: cryptodev application for FIPS certification",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "8901e07936d9d5029487669b7c666e93a4f99e40",
    "submitter": {
        "id": 853,
        "url": "http://patches.dpdk.org/api/people/853/?format=api",
        "name": "Kovacevic, Marko",
        "email": "marko.kovacevic@intel.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20180907171311.20371-2-marko.kovacevic@intel.com/mbox/",
    "series": [
        {
            "id": 1233,
            "url": "http://patches.dpdk.org/api/series/1233/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=1233",
            "date": "2018-09-07T17:13:09",
            "name": "FIPS validation capability",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/1233/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/44426/comments/",
    "check": "warning",
    "checks": "http://patches.dpdk.org/api/patches/44426/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id E46AA58C4;\n\tFri,  7 Sep 2018 19:15:31 +0200 (CEST)",
            "from mga05.intel.com (mga05.intel.com [192.55.52.43])\n\tby dpdk.org (Postfix) with ESMTP id E7EA94F91\n\tfor <dev@dpdk.org>; Fri,  7 Sep 2018 19:15:29 +0200 (CEST)",
            "from orsmga002.jf.intel.com ([10.7.209.21])\n\tby fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n\t07 Sep 2018 10:15:29 -0700",
            "from silpixa00399502.ir.intel.com (HELO\n\tsilpixa00399502.ger.corp.intel.com) ([10.237.223.218])\n\tby orsmga002.jf.intel.com with ESMTP; 07 Sep 2018 10:15:03 -0700"
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.53,343,1531810800\"; d=\"scan'208\";a=\"89848914\"",
        "From": "Marko Kovacevic <marko.kovacevic@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "akhil.goyal@nxp.com, roy.fan.zhang@intel.com,\n\tMarko Kovacevic <marko.kovacevic@intel.com>",
        "Date": "Fri,  7 Sep 2018 18:13:10 +0100",
        "Message-Id": "<20180907171311.20371-2-marko.kovacevic@intel.com>",
        "X-Mailer": "git-send-email 2.9.5",
        "In-Reply-To": "<20180907171311.20371-1-marko.kovacevic@intel.com>",
        "References": "<20180907171311.20371-1-marko.kovacevic@intel.com>",
        "Subject": "[dpdk-dev] [PATCH v1 1/2] test/test: cryptodev application for FIPS\n\tcertification",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Adding initial set up for the FIPS ceritifcation into DPDK,\nmore algos will be added in other versions of the code.\nAlso documentation will be added with steps on how to run.\n\nSigned-off-by: Marko Kovacevic <marko.kovacevic@intel.com>\n---\n test/test/Makefile              |   1 +\n test/test/test_cryptodev_fips.c | 771 ++++++++++++++++++++++++++++++++++++++++\n 2 files changed, 772 insertions(+)\n create mode 100644 test/test/test_cryptodev_fips.c",
    "diff": "diff --git a/test/test/Makefile b/test/test/Makefile\nindex e6967ba..ee74450 100644\n--- a/test/test/Makefile\n+++ b/test/test/Makefile\n@@ -182,6 +182,7 @@ SRCS-$(CONFIG_RTE_LIBRTE_PMD_RING) += test_pmd_ring_perf.c\n SRCS-$(CONFIG_RTE_LIBRTE_CRYPTODEV) += test_cryptodev_blockcipher.c\n SRCS-$(CONFIG_RTE_LIBRTE_CRYPTODEV) += test_cryptodev.c\n SRCS-$(CONFIG_RTE_LIBRTE_CRYPTODEV) += test_cryptodev_asym.c\n+SRCS-$(CONFIG_RTE_LIBRTE_CRYPTODEV) += test_cryptodev_fips.c\n \n ifeq ($(CONFIG_RTE_COMPRESSDEV_TEST),y)\n SRCS-$(CONFIG_RTE_LIBRTE_COMPRESSDEV) += test_compressdev.c\ndiff --git a/test/test/test_cryptodev_fips.c b/test/test/test_cryptodev_fips.c\nnew file mode 100644\nindex 0000000..4bfc24e\n--- /dev/null\n+++ b/test/test/test_cryptodev_fips.c\n@@ -0,0 +1,771 @@\n+/* SPDX-License-Identifier: BSD-3-Clause\n+ * Copyright(c) 2018 Intel Corporation\n+ */\n+#include <sys/stat.h>\n+#include <dirent.h>\n+\n+#include <rte_common.h>\n+#include <rte_hexdump.h>\n+#include <rte_mbuf.h>\n+#include <rte_malloc.h>\n+#include <rte_memcpy.h>\n+#include <rte_pause.h>\n+#include <rte_bus_vdev.h>\n+\n+#include <rte_crypto.h>\n+#include <rte_cryptodev.h>\n+#include <rte_cryptodev_pmd.h>\n+#include <rte_string_fns.h>\n+\n+#include \"test.h\"\n+#include \"test_cryptodev.h\"\n+#include \"test_cryptodev_fips_parse.h\"\n+\n+#define AES_IV_LENGTH    16\n+#define AES_BLOCK_LENGTH 16\n+#define AES_MCT_NUM_INTERNAL_ITER 1000\n+#define AES_MCT_NUM_EXTERNAL_ITER 100\n+\n+\n+\n+struct crypto_testsuite_params {\n+\tstruct rte_mempool *mbuf_pool;\n+\tstruct rte_mempool *op_mpool;\n+\tstruct rte_mempool *session_mpool;\n+\tstruct rte_cryptodev_config conf;\n+\tstruct rte_cryptodev_qp_conf qp_conf;\n+\tuint8_t enabled_devs[RTE_CRYPTO_MAX_DEVS];\n+\tuint8_t nb_enabled_devs;\n+};\n+\n+static struct crypto_testsuite_params testsuite_params = { NULL };\n+\n+static int\n+fips_testsuite_setup(void)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tuint8_t nb_devs;\n+\tuint8_t dev_id, i;\n+\tuint32_t max_session_size = 0;\n+\n+\tmemset(ts_params, 0, sizeof(*ts_params));\n+\n+\tts_params->mbuf_pool = rte_mempool_lookup(\"mbuf pool\");\n+\tif (ts_params->mbuf_pool == NULL) {\n+\t\t/* Not already created so create */\n+\t\tts_params->mbuf_pool = rte_pktmbuf_pool_create(\n+\t\t\t\t\"Mbuf pool\",\n+\t\t\t\t1, 0, 0, UINT16_MAX,\n+\t\t\t\trte_socket_id());\n+\t\tif (ts_params->mbuf_pool == NULL) {\n+\t\t\tRTE_LOG(ERR, USER1, \"Can't create CRYPTO_MBUFPOOL\\n\");\n+\t\t\treturn TEST_FAILED;\n+\t\t}\n+\t}\n+\n+\tts_params->op_mpool = rte_crypto_op_pool_create(\n+\t\t\t\"Op pool\",\n+\t\t\tRTE_CRYPTO_OP_TYPE_SYMMETRIC,\n+\t\t\t1, 0,\n+\t\t\tMAXIMUM_IV_LENGTH,\n+\t\t\trte_socket_id());\n+\tif (ts_params->op_mpool == NULL) {\n+\t\tRTE_LOG(ERR, USER1, \"Can't create CRYPTO_OP_POOL\\n\");\n+\t\treturn TEST_FAILED;\n+\t}\n+\n+\tnb_devs = rte_cryptodev_count();\n+\tif (nb_devs < 1) {\n+\t\tRTE_LOG(ERR, USER1, \"No crypto devices found?\\n\");\n+\t\treturn TEST_FAILED;\n+\t}\n+\n+\tts_params->conf.nb_queue_pairs = 1;\n+\tts_params->conf.socket_id = SOCKET_ID_ANY;\n+\n+\tstruct rte_cryptodev_sym_capability_idx cap_idx;\n+\n+\t/* Configure device capable of encrypting with AES-CBC */\n+\tfor (dev_id = 0; dev_id < nb_devs; dev_id++) {\n+\t\tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n+\t\tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_CBC;\n+\t\tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) != NULL) {\n+\t\t\tts_params->enabled_devs[ts_params->nb_enabled_devs] = dev_id;\n+\t\t\t(ts_params->nb_enabled_devs)++;\n+\t\t\tbreak;\n+\t\t}\n+\t}\n+\n+\tif (dev_id == nb_devs)\n+\t\tRTE_LOG(WARNING, USER1, \"There is no device that supports AES-CBC\\n\");\n+\n+\t/* Configure device capable of encrypting with AES-GCM */\n+\tfor (dev_id = 0; dev_id < nb_devs; dev_id++) {\n+\t\tcap_idx.type = RTE_CRYPTO_SYM_XFORM_AEAD;\n+\t\tcap_idx.algo.aead = RTE_CRYPTO_AEAD_AES_GCM;\n+\t\tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) != NULL) {\n+\t\t\tfor (i = 0; i < ts_params->nb_enabled_devs; i++)\n+\t\t\t\tif (ts_params->enabled_devs[i] == dev_id)\n+\t\t\t\t\tbreak;\n+\t\t\tif (i == ts_params->nb_enabled_devs) {\n+\t\t\t\tts_params->enabled_devs[ts_params->nb_enabled_devs] = dev_id;\n+\t\t\t\t(ts_params->nb_enabled_devs)++;\n+\t\t\t}\n+\n+\t\t\tbreak;\n+\t\t}\n+\t}\n+\n+\tif (dev_id == nb_devs)\n+\t\tRTE_LOG(WARNING, USER1, \"There is no device that supports AES-GCM\\n\");\n+\n+\t/* Configure device capable of authenticating with HMAC */\n+\tfor (dev_id = 0; dev_id < nb_devs; dev_id++) {\n+\t\tcap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;\n+\t\tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA1_HMAC;\n+\t\tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) != NULL) {\n+\t\t\t/*\n+\t\t\t * Check if device supports other HMAC algorithms,\n+\t\t\t * apart from SHA1\n+\t\t\t */\n+\t\t\tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA224_HMAC;\n+\t\t\tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) == NULL)\n+\t\t\t\tcontinue;\n+\n+\t\t\tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA256_HMAC;\n+\t\t\tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) == NULL)\n+\t\t\t\tcontinue;\n+\n+\t\t\tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA384_HMAC;\n+\t\t\tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) == NULL)\n+\t\t\t\tcontinue;\n+\n+\t\t\tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA512_HMAC;\n+\t\t\tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) == NULL)\n+\t\t\t\tcontinue;\n+\n+\t\t\tfor (i = 0; i < ts_params->nb_enabled_devs; i++)\n+\t\t\t\tif (ts_params->enabled_devs[i] == dev_id)\n+\t\t\t\t\tbreak;\n+\t\t\tif (i == ts_params->nb_enabled_devs) {\n+\t\t\t\tts_params->enabled_devs[ts_params->nb_enabled_devs] = dev_id;\n+\t\t\t\t(ts_params->nb_enabled_devs)++;\n+\t\t\t}\n+\n+\t\t\tbreak;\n+\t\t}\n+\t}\n+\n+\tif (dev_id == nb_devs)\n+\t\tRTE_LOG(WARNING, USER1, \"There is no device that supports all HMAC algorithms\\n\");\n+\n+\tif (ts_params->nb_enabled_devs == 0) {\n+\t\tRTE_LOG(ERR, USER1,\n+\t\t\t\"There are no crypto devices that support at least \"\n+\t\t\t\"one algorithm for the FIPS testing\\n\");\n+\t\treturn TEST_FAILED;\n+\t}\n+\n+\tfor (i = 0; i < ts_params->nb_enabled_devs; i++) {\n+\t\tuint32_t session_size;\n+\t\tdev_id = ts_params->enabled_devs[i];\n+\t\tTEST_ASSERT_SUCCESS(rte_cryptodev_configure(dev_id,\n+\t\t\t\t&ts_params->conf),\n+\t\t\t\t\"Failed to configure cryptodev %u with %u qps\",\n+\t\t\t\tdev_id, ts_params->conf.nb_queue_pairs);\n+\n+\t\tts_params->qp_conf.nb_descriptors = 128;\n+\n+\t\tTEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(\n+\t\t\t\tdev_id, 0, &ts_params->qp_conf,\n+\t\t\t\trte_cryptodev_socket_id(dev_id),\n+\t\t\t\tts_params->session_mpool),\n+\t\t\t\t\"Failed to setup queue pair %u on cryptodev %u\",\n+\t\t\t\t0, dev_id);\n+\n+\t\t/* Start the device */\n+\t\tTEST_ASSERT_SUCCESS(rte_cryptodev_start(dev_id),\n+\t\t\t\t\"Failed to start cryptodev %u\",\n+\t\t\t\tdev_id);\n+\t\tsession_size = rte_cryptodev_sym_get_private_session_size(dev_id);\n+\n+\t\tif (session_size > max_session_size)\n+\t\t\tmax_session_size = session_size;\n+\t}\n+\n+\t/*\n+\t * Create mempool with session header and private session data\n+\t */\n+\tts_params->session_mpool = rte_mempool_create(\n+\t\t\t\t\"Session pool\",\n+\t\t\t\t2,\n+\t\t\t\tmax_session_size,\n+\t\t\t\t0, 0, NULL, NULL, NULL,\n+\t\t\t\tNULL, SOCKET_ID_ANY,\n+\t\t\t\t0);\n+\n+\tTEST_ASSERT_NOT_NULL(ts_params->session_mpool,\n+\t\t\t\"session mempool allocation failed\");\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+static void\n+testsuite_teardown(void)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tuint16_t i;\n+\n+\tif (ts_params->mbuf_pool != NULL) {\n+\t\trte_mempool_free(ts_params->mbuf_pool);\n+\t\tts_params->mbuf_pool = NULL;\n+\t}\n+\n+\tif (ts_params->op_mpool != NULL) {\n+\t\trte_mempool_free(ts_params->op_mpool);\n+\t\tts_params->op_mpool = NULL;\n+\t}\n+\n+\t/* Free session mempools */\n+\tif (ts_params->session_mpool != NULL) {\n+\t\trte_mempool_free(ts_params->session_mpool);\n+\t\tts_params->session_mpool = NULL;\n+\t}\n+\n+\tfor (i = 0; i < ts_params->nb_enabled_devs; i++) {\n+\t\trte_cryptodev_stop(ts_params->enabled_devs[i]);\n+\t}\n+}\n+\n+static int\n+test_aes_single_case(struct fips_aes_test_data *aes_data,\n+\tuint8_t *second_last_out,\n+\tuint16_t dev_id,\n+\tuint16_t vid,\n+\tuint32_t *num_test_vectors_run,\n+\tuint16_t *num_test_vectors_skipped)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tuint8_t *pt = NULL;\n+\tuint8_t *ct = NULL;\n+\tstruct rte_cryptodev_sym_session *session = NULL;\n+\tstruct rte_crypto_op *op = NULL;\n+\tstruct rte_mbuf *mbuf = NULL;\n+\tint ret;\n+\tuint16_t i;\n+\tstruct rte_crypto_sym_xform cipher_xform = {\n+\t\t.next = NULL,\n+\t\t.type = RTE_CRYPTO_SYM_XFORM_CIPHER,\n+\t\t.cipher = {\n+\t\t\t.algo = RTE_CRYPTO_CIPHER_AES_CBC,\n+\t\t\t.op = aes_data->test_cases[vid].test_op,\n+\t\t\t.key = {\n+\t\t\t\t.length = aes_data->key_len,\n+\t\t\t\t.data = aes_data->test_cases[vid].key\n+\t\t\t},\n+\t\t\t.iv = {\n+\t\t\t\t.offset = IV_OFFSET,\n+\t\t\t\t.length = AES_IV_LENGTH\n+\t\t\t}\n+\t\t}\n+\t};\n+\n+\tstruct rte_cryptodev_sym_capability_idx cap_idx;\n+\tconst struct rte_cryptodev_symmetric_capability *capability;\n+\tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n+\tcap_idx.algo.aead = RTE_CRYPTO_CIPHER_AES_CBC;\n+\tcapability = rte_cryptodev_sym_capability_get(dev_id, &cap_idx);\n+\tif (capability == NULL) {\n+\t\tRTE_LOG(ERR, USER1, \"Could not get capability\\n\");\n+\t\treturn -1;\n+\t}\n+\tif (rte_cryptodev_sym_capability_check_cipher(capability,\n+\t\t\t\t\t\tcipher_xform.cipher.key.length,\n+\t\t\t\t\t\tcipher_xform.cipher.iv.length) != 0) {\n+\t\tRTE_LOG(DEBUG, USER1, \"Operation not supported by device\\n\");\n+\t\t(*num_test_vectors_skipped)++;\n+\t\taes_data->test_cases[vid].skip_flag = 1;\n+\t\tret = 0;\n+\t\tgoto exit;\n+\t}\n+\n+\t/* Create crypto session */\n+\tsession = rte_cryptodev_sym_session_create(ts_params->session_mpool);\n+\tif (session == NULL) {\n+\t\tRTE_LOG(ERR, USER1, \"Session creation failed\\n\");\n+\t\treturn -1;\n+\t}\n+\n+\tret = rte_cryptodev_sym_session_init(dev_id, session,\n+\t\t\t\t&cipher_xform, ts_params->session_mpool);\n+\tif (ret < 0) {\n+\t\tif (ret == -ENOTSUP) {\n+\t\t\t(*num_test_vectors_skipped)++;\n+\t\t\taes_data->test_cases[vid].skip_flag = 1;\n+\t\t\tRTE_LOG(INFO, USER1, \"Session not supported\\n\");\n+\t\t\tret = 0;\n+\t\t} else {\n+\t\t\tRTE_LOG(ERR, USER1, \"Session init failed\\n\");\n+\t\t\tret = -1;\n+\t\t}\n+\t\tgoto exit;\n+\t}\n+\n+\top = rte_crypto_op_alloc(ts_params->op_mpool,\n+\t\t\tRTE_CRYPTO_OP_TYPE_SYMMETRIC);\n+\tif (op == NULL) {\n+\t\tRTE_LOG(ERR, USER1, \"Operation allocation failed\\n\");\n+\t\tret = -1;\n+\t\tgoto exit;\n+\t}\n+\n+\tmbuf = rte_pktmbuf_alloc(ts_params->mbuf_pool);\n+\tif (mbuf == NULL) {\n+\t\tRTE_LOG(ERR, USER1, \"Mbuf allocation failed\\n\");\n+\t\tret = -1;\n+\t\tgoto exit;\n+\t}\n+\n+\tif (aes_data->test_cases[vid].test_op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {\n+\t\tpt = (uint8_t *)rte_pktmbuf_append(mbuf,\n+\t\t\t\taes_data->test_cases[vid].plaintext_len);\n+\t\tif (pt == NULL) {\n+\t\t\tRTE_LOG(ERR, USER1, \"Appending data failed\\n\");\n+\t\t\tret = -1;\n+\t\t\tgoto exit;\n+\t\t}\n+\t\tmemcpy(pt, aes_data->test_cases[vid].plaintext,\n+\t\t\taes_data->test_cases[vid].plaintext_len);\n+\t} else {\n+\t\tct = (uint8_t *)rte_pktmbuf_append(mbuf,\n+\t\t\t\taes_data->test_cases[vid].ciphertext_len);\n+\t\tif (ct == NULL) {\n+\t\t\tRTE_LOG(ERR, USER1, \"Appending data failed\\n\");\n+\t\t\tret = -1;\n+\t\t\tgoto exit;\n+\t\t}\n+\t\tmemcpy(ct, aes_data->test_cases[vid].ciphertext,\n+\t\t\taes_data->test_cases[vid].ciphertext_len);\n+\t}\n+\n+\t/* Set up crypto op */\n+\tuint8_t *iv = rte_crypto_op_ctod_offset(op, uint8_t *, IV_OFFSET);\n+\tmemcpy(iv, aes_data->test_cases[vid].iv,\n+\t\t\tAES_IV_LENGTH);\n+\top->sym->m_src = mbuf;\n+\top->sym->cipher.data.offset = 0;\n+\tif (aes_data->test_cases[vid].test_op ==\n+\t\t\tRTE_CRYPTO_CIPHER_OP_ENCRYPT)\n+\t\top->sym->cipher.data.length = aes_data->test_cases[vid].plaintext_len;\n+\telse\n+\t\top->sym->cipher.data.length = aes_data->test_cases[vid].ciphertext_len;\n+\n+\n+\t/* Attach the crypto session to the operation */\n+\trte_crypto_op_attach_sym_session(op, session);\n+\n+\tuint16_t num_enqd = rte_cryptodev_enqueue_burst(dev_id, 0,\n+\t\t\t&op, 1);\n+\tif (num_enqd < 1) {\n+\t\tRTE_LOG(ERR, USER1, \"Operation could not be enqueued\\n\");\n+\t\tret = -1;\n+\t\tgoto exit;\n+\t}\n+\n+\tuint16_t num_deqd = 0;\n+\tdo {\n+\t\tstruct rte_crypto_op *deqd_op;\n+\t\tnum_deqd = rte_cryptodev_dequeue_burst(dev_id, 0, &deqd_op, 1);\n+\n+\t\tif (num_deqd == 0)\n+\t\t\tcontinue;\n+\n+\t\tif (deqd_op->status != RTE_CRYPTO_OP_STATUS_SUCCESS) {\n+\t\t\tRTE_LOG(ERR, USER1, \"Operation status was not successful\\n\");\n+\t\t\tret = -1;\n+\t\t\tgoto exit;\n+\t\t}\n+\t} while (num_deqd == 0);\n+\n+\t/*\n+\t * If Monte Carlo test, process plaintext with following algo:\n+\t * For j = 0 to 999\n+\t *   If ( j=0 )\n+\t *     CT[j] = AES(Key[i], IV[i], PT[j])\n+\t *     PT[j+1] = IV[i]\n+\t *   Else\n+\t *      CT[j] = AES(Key[i], PT[j])\n+\t *      PT[j+1] = CT[j-1]\n+\t * Output CT[j]\n+\t */\n+\tif (aes_data->test_type == AESAVS_TYPE_MCT) {\n+\t\tuint8_t prev_out[AES_BLOCK_LENGTH];\n+\t\tuint8_t new_out[AES_BLOCK_LENGTH];\n+\t\tuint8_t prev_in[AES_BLOCK_LENGTH];\n+\t\tuint8_t *iv;\n+\n+\t\tmemcpy(prev_in, aes_data->test_cases[vid].ciphertext,\n+\t\t\taes_data->test_cases[vid].ciphertext_len);\n+\n+\t\tif (aes_data->test_cases[vid].test_op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {\n+\t\t\t/* PT[1] = IV, save CT[0] */\n+\t\t\tpt = (uint8_t *)rte_pktmbuf_mtod(mbuf, uint8_t *);\n+\t\t\tmemcpy(prev_out, pt, AES_BLOCK_LENGTH);\n+\t\t\tmemcpy(pt, aes_data->test_cases[vid].iv,\n+\t\t\t\tAES_IV_LENGTH);\n+\t\t\tiv = rte_crypto_op_ctod_offset(op, uint8_t *, IV_OFFSET);\n+\t\t\tmemcpy(iv, prev_out, AES_IV_LENGTH);\n+\t\t} else {\n+\t\t\t/* CT[1] = IV, save PT[0] */\n+\t\t\tct = (uint8_t *)rte_pktmbuf_mtod(mbuf, uint8_t *);\n+\t\t\tmemcpy(prev_out, ct, AES_BLOCK_LENGTH);\n+\t\t\tmemcpy(ct, aes_data->test_cases[vid].iv,\n+\t\t\t\tAES_IV_LENGTH);\n+\t\t\tiv = rte_crypto_op_ctod_offset(op, uint8_t *, IV_OFFSET);\n+\t\t\tmemcpy(iv, prev_in, AES_IV_LENGTH);\n+\n+\t\t}\n+\n+\t\t/* The other 999 iterations */\n+\t\tfor (i = 1; i <= (AES_MCT_NUM_INTERNAL_ITER - 1); i++) {\n+\t\t\tmemcpy(prev_in, rte_pktmbuf_mtod(mbuf, uint8_t *), AES_BLOCK_LENGTH);\n+\t\t\tuint16_t num_enqd = rte_cryptodev_enqueue_burst(dev_id, 0,\n+\t\t\t\t\t&op, 1);\n+\t\t\tif (num_enqd < 1) {\n+\t\t\t\tRTE_LOG(ERR, USER1, \"Operation could not be enqueued\\n\");\n+\t\t\t\tret = -1;\n+\t\t\t\tgoto exit;\n+\t\t\t}\n+\n+\t\t\tuint16_t num_deqd = 0;\n+\t\t\tdo {\n+\t\t\t\tstruct rte_crypto_op *deqd_op;\n+\t\t\t\tnum_deqd = rte_cryptodev_dequeue_burst(dev_id, 0, &deqd_op, 1);\n+\n+\t\t\t\tif (num_deqd == 0)\n+\t\t\t\t\tcontinue;\n+\n+\t\t\t\tif (deqd_op->status != RTE_CRYPTO_OP_STATUS_SUCCESS) {\n+\t\t\t\t\tRTE_LOG(ERR, USER1, \"Operation status was not successful\\n\");\n+\t\t\t\t\tret = -1;\n+\t\t\t\t\tgoto exit;\n+\t\t\t\t}\n+\t\t\t} while (num_deqd == 0);\n+\n+\t\t\tif (i == (AES_MCT_NUM_INTERNAL_ITER - 1)) {\n+\t\t\t\tmemcpy(second_last_out, prev_out, AES_BLOCK_LENGTH);\n+\t\t\t\tbreak;\n+\t\t\t}\n+\n+\t\t\tif (aes_data->test_cases[vid].test_op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {\n+\t\t\t\t/* PT[j+1] = CT[j-1] (CT[j-1] stored in prev_out, store CT[j]) */\n+\t\t\t\tpt = (uint8_t *)rte_pktmbuf_mtod(mbuf, uint8_t *);\n+\t\t\t\tmemcpy(new_out, pt, AES_BLOCK_LENGTH);\n+\t\t\t\tmemcpy(pt, prev_out, AES_IV_LENGTH);\n+\t\t\t\tmemcpy(prev_out, new_out, AES_IV_LENGTH);\n+\t\t\t\tiv = rte_crypto_op_ctod_offset(op, uint8_t *, IV_OFFSET);\n+\t\t\t\tmemcpy(iv, prev_out, AES_IV_LENGTH);\n+\t\t\t} else {\n+\t\t\t\t/* CT[j+1] = PT[j-1] (PT[j-1] stored in prev_out, store PT[j]) */\n+\t\t\t\tct = (uint8_t *)rte_pktmbuf_mtod(mbuf, uint8_t *);\n+\t\t\t\tmemcpy(new_out, ct, AES_BLOCK_LENGTH);\n+\t\t\t\tmemcpy(ct, prev_out, AES_IV_LENGTH);\n+\t\t\t\tmemcpy(prev_out, new_out, AES_IV_LENGTH);\n+\t\t\t\tiv = rte_crypto_op_ctod_offset(op, uint8_t *, IV_OFFSET);\n+\t\t\t\tmemcpy(iv, prev_in, AES_IV_LENGTH);\n+\t\t\t}\n+\t\t}\n+\t}\n+\n+\t/* Output result */\n+\tif (aes_data->test_cases[vid].test_op ==\n+\t\t\tRTE_CRYPTO_CIPHER_OP_ENCRYPT) {\n+\t\tct = rte_pktmbuf_mtod(op->sym->m_src, uint8_t *);\n+\t\taes_data->test_cases[vid].ciphertext_len =\n+\t\t\taes_data->test_cases[vid].plaintext_len;\n+\t\tmemcpy(aes_data->test_cases[vid].ciphertext, ct,\n+\t\t\t\taes_data->test_cases[vid].ciphertext_len);\n+\t} else {\n+\t\tpt = rte_pktmbuf_mtod(op->sym->m_src, uint8_t *);\n+\t\taes_data->test_cases[vid].plaintext_len =\n+\t\t\taes_data->test_cases[vid].ciphertext_len;\n+\t\tmemcpy(aes_data->test_cases[vid].plaintext, ct,\n+\t\t\t\taes_data->test_cases[vid].plaintext_len);\n+\t}\n+\n+\tret = 0;\n+\t(*num_test_vectors_run)++;\n+exit:\n+\t/* Clean up */\n+\tif (op != NULL) {\n+\t\trte_pktmbuf_free(op->sym->m_src);\n+\t\trte_crypto_op_free(op);\n+\t}\n+\n+\tif (session != NULL) {\n+\t\tret = rte_cryptodev_sym_session_clear(dev_id, session);\n+\t\tTEST_ASSERT(ret == 0, \"Session clear failed\");\n+\t\tret = rte_cryptodev_sym_session_free(session);\n+\t\tTEST_ASSERT(ret == 0, \"Session free failed\");\n+\t}\n+\n+\treturn ret;\n+}\n+\n+\n+\n+#define MAX_NUM_FILES 32\n+#define MAX_FILE_PATH 128\n+static int\n+test_fips_aes(void)\n+{\n+\tstruct crypto_testsuite_params *ts_params = &testsuite_params;\n+\tstruct fips_aes_test_data *aes_data = NULL;\n+\tstruct fips_aes_test_data *aes_mct_data = NULL;\n+\tuint16_t mct_vec_id = 0;\n+\tuint16_t num_test_vectors_skipped = 0;\n+\tuint32_t num_test_vectors_run = 0;\n+\tuint32_t num_total_run = 0;\n+\tuint32_t num_total_skipped = 0;\n+\tunsigned int num_files = 0;\n+\tuint16_t i, j, k, m;\n+\tchar file_paths[MAX_NUM_FILES][MAX_FILE_PATH];\n+\tchar file_names[MAX_NUM_FILES][MAX_FILE_PATH];\n+\tuint8_t dev_id;\n+\tint ret;\n+\n+\t/* Find the first device which supports AES-CBC */\n+\tfor (i = 0; i < ts_params->nb_enabled_devs; i++) {\n+\t\tstruct rte_cryptodev_sym_capability_idx cap_idx;\n+\t\tdev_id = ts_params->enabled_devs[i];\n+\t\tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n+\t\tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_CBC;\n+\t\tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) != NULL) {\n+\t\t\tbreak;\n+\t\t}\n+\t}\n+\n+\tif (i == ts_params->nb_enabled_devs) {\n+\t\tRTE_LOG(WARNING, USER1, \"Skipping AES-CBC tests\\n\");\n+\t\treturn -ENOTSUP;\n+\t}\n+\n+\tDIR *d;\n+\tstruct dirent *dir;\n+\td = opendir(\"./AES/req/\");\n+\tif (d) {\n+\t\twhile ((dir = readdir(d)) != NULL) {\n+\t\t\tif (strstr(dir->d_name, \"req\") != NULL) {\n+\t\t\t\tsnprintf(file_paths[num_files], MAX_FILE_PATH,\n+\t\t\t\t\t\"%s%s\", \"./AES/req/\", dir->d_name);\n+\t\t\t\tstrlcpy(file_names[num_files], dir->d_name,\n+\t\t\t\t\t\tstrlen(dir->d_name) - 3);\n+\t\t\t\tnum_files++;\n+\t\t\t}\n+\t\t}\n+\t\tclosedir(d);\n+\t}\n+\n+\tif (num_files == 0) {\n+\t\tRTE_LOG(INFO, USER1, \"No AES test vector files available\\n\");\n+\t\treturn TEST_SKIPPED;\n+\t}\n+\n+\taes_data = rte_malloc(NULL, sizeof(struct fips_aes_test_data), 0);\n+\tTEST_ASSERT_NOT_NULL(aes_data, \"memory could not be allocated\\n\");\n+\taes_mct_data = rte_malloc(NULL, sizeof(struct fips_aes_test_data), 0);\n+\tTEST_ASSERT_NOT_NULL(aes_mct_data, \"memory could not be allocated\\n\");\n+\n+\tfor (i = 0; i < num_files; i++) {\n+\t\tprintf(\"Testing vectors from file %s\\n\", file_paths[i]);\n+\t\t/* Vector parsing function */\n+\t\tparse_aes_vectors(aes_data, file_paths[i]);\n+\t\t/*\n+\t\t * Output data will contain more test vectors than the input data,\n+\t\t * so first thing to be done is to create the structure big enough\n+\t\t * to hold all the vectors.\n+\t\t */\n+\t\tif (aes_data->test_type == AESAVS_TYPE_MCT) {\n+\t\t\tuint8_t second_last_out[AES_BLOCK_LENGTH];\n+\n+\t\t\tmemcpy(aes_mct_data, aes_data,\n+\t\t\t\tsizeof(struct fips_aes_test_data));\n+\t\t\tmemset(aes_mct_data->test_cases, 0,\n+\t\t\t\tsizeof(struct fips_aes_test_case) * MAX_NB_TESTS);\n+\t\t\t/* Each test case has 100 iterations */\n+\t\t\taes_mct_data->nb_test_cases *= AES_MCT_NUM_EXTERNAL_ITER;\n+\n+\t\t\tmct_vec_id = 0;\n+\t\t\tfor (j = 0; j < aes_data->nb_test_cases; j++) {\n+\t\t\t\t/* Copy initial vector */\n+\t\t\t\tmemcpy(&aes_mct_data->test_cases[mct_vec_id],\n+\t\t\t\t\t&aes_data->test_cases[j],\n+\t\t\t\t\tsizeof(struct fips_aes_test_case));\n+\n+\t\t\t\tfor (k = 0; k < AES_MCT_NUM_EXTERNAL_ITER; k++) {\n+\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].count = (aes_data->test_cases[j].count * AES_MCT_NUM_EXTERNAL_ITER) + k;\n+\t\t\t\t\tint ret = test_aes_single_case(aes_mct_data,\n+\t\t\t\t\t\t\tsecond_last_out,\n+\t\t\t\t\t\t\tdev_id, mct_vec_id,\n+\t\t\t\t\t\t\t&num_test_vectors_run,\n+\t\t\t\t\t\t\t&num_test_vectors_skipped);\n+\t\t\t\t\tif (ret < 0) {\n+\t\t\t\t\t\tret = TEST_FAILED;\n+\t\t\t\t\t\tgoto exit;\n+\t\t\t\t\t}\n+\t\t\t\t\tmct_vec_id++;\n+\t\t\t\t\tif (k != AES_MCT_NUM_EXTERNAL_ITER) {\n+\t\t\t\t\t\t/* Prepare next vector */\n+\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].test_op = aes_data->test_cases[j].test_op;\n+\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].iv_len = aes_data->test_cases[j].iv_len;\n+\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].count = mct_vec_id;\n+\t\t\t\t\t\tif (aes_data->test_cases[j].test_op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) {\n+\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].plaintext_len = aes_data->test_cases[j].plaintext_len;\n+\t\t\t\t\t\t\tif (aes_data->key_len == 16) {\n+\t\t\t\t\t\t\t\tfor (m = 0; m < aes_data->key_len; m++) {\n+\t\t\t\t\t\t\t\t\t/* Key[i+1] = Key[i] xor CT[j] */\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].ciphertext[m];\n+\t\t\t\t\t\t\t\t}\n+\t\t\t\t\t\t\t} else if (aes_data->key_len == 24) {\n+\t\t\t\t\t\t\t\t/* Key[i+1] = Key[i] xor (last 64-bits of CT[j-1] || CT[j]) */\n+\t\t\t\t\t\t\t\tfor (m = 0; m < 8; m++)\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\tsecond_last_out[m + 8];\n+\t\t\t\t\t\t\t\tfor (m = 8; m < aes_data->key_len; m++)\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].ciphertext[m - 8];\n+\t\t\t\t\t\t\t} else {\n+\t\t\t\t\t\t\t\t/* Key[i+1] = Key[i] xor (CT[j-1] || CT[j]) */\n+\t\t\t\t\t\t\t\tfor (m = 0; m < 16; m++)\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\tsecond_last_out[m];\n+\t\t\t\t\t\t\t\tfor (m = 16; m < aes_data->key_len; m++)\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].ciphertext[m - 16];\n+\t\t\t\t\t\t\t}\n+\n+\t\t\t\t\t\t\t/* IV[i+1] = CT[j] */\n+\t\t\t\t\t\t\tmemcpy(aes_mct_data->test_cases[mct_vec_id].iv,\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].ciphertext,\n+\t\t\t\t\t\t\t\t\tAES_IV_LENGTH);\n+\t\t\t\t\t\t\t/* PT[0] = CT[j-1] */\n+\t\t\t\t\t\t\tmemcpy(aes_mct_data->test_cases[mct_vec_id].plaintext,\n+\t\t\t\t\t\t\t\t\tsecond_last_out, AES_BLOCK_LENGTH);\n+\t\t\t\t\t\t} else {\n+\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].ciphertext_len = aes_data->test_cases[j].ciphertext_len;\n+\t\t\t\t\t\t\tif (aes_data->key_len == 16) {\n+\t\t\t\t\t\t\t\tfor (m = 0; m < aes_data->key_len; m++) {\n+\t\t\t\t\t\t\t\t\t/* Key[i+1] = Key[i] xor PT[j] */\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].plaintext[m];\n+\t\t\t\t\t\t\t\t}\n+\t\t\t\t\t\t\t} else if (aes_data->key_len == 24) {\n+\t\t\t\t\t\t\t\t/* Key[i+1] = Key[i] xor (last 64-bits of PT[j-1] || PT[j]) */\n+\t\t\t\t\t\t\t\tfor (m = 0; m < 8; m++)\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\tsecond_last_out[m + 8];\n+\t\t\t\t\t\t\t\tfor (m = 8; m < aes_data->key_len; m++)\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].plaintext[m - 8];\n+\t\t\t\t\t\t\t} else {\n+\t\t\t\t\t\t\t\t/* Key[i+1] = Key[i] xor (PT[j-1] || PT[j]) */\n+\t\t\t\t\t\t\t\tfor (m = 0; m < 16; m++)\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\tsecond_last_out[m];\n+\t\t\t\t\t\t\t\tfor (m = 16; m < aes_data->key_len; m++)\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id].key[m] =\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].key[m] ^\n+\t\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].plaintext[m - 16];\n+\t\t\t\t\t\t\t}\n+\t\t\t\t\t\t\t/* IV[i+1] = PT[j] */\n+\t\t\t\t\t\t\tmemcpy(aes_mct_data->test_cases[mct_vec_id].iv,\n+\t\t\t\t\t\t\t\t\taes_mct_data->test_cases[mct_vec_id - 1].plaintext,\n+\t\t\t\t\t\t\t\t\tAES_IV_LENGTH);\n+\t\t\t\t\t\t\t/* CT[0] = PT[j-1] */\n+\t\t\t\t\t\t\tmemcpy(aes_mct_data->test_cases[mct_vec_id].ciphertext,\n+\t\t\t\t\t\t\t\t\tsecond_last_out, AES_BLOCK_LENGTH);\n+\t\t\t\t\t\t}\n+\n+\t\t\t\t\t}\n+\t\t\t\t}\n+\t\t\t}\n+\n+\t\t} else {\n+\t\t\tfor (j = 0; j < aes_data->nb_test_cases; j++) {\n+\t\t\t\tint ret = test_aes_single_case(aes_data, NULL,\n+\t\t\t\t\t\tdev_id, j,\n+\t\t\t\t\t\t&num_test_vectors_run,\n+\t\t\t\t\t\t&num_test_vectors_skipped);\n+\t\t\t\tif (ret < 0) {\n+\t\t\t\t\tret = TEST_FAILED;\n+\t\t\t\t\tgoto exit;\n+\t\t\t\t}\n+\t\t\t}\n+\t\t}\n+\n+\t\tprintf(\"Test vectors run: %u\\n\", num_test_vectors_run);\n+\t\tprintf(\"Test vectors skipped: %u\\n\", num_test_vectors_skipped);\n+\t\tnum_total_skipped += num_test_vectors_skipped;\n+\t\tnum_total_run += num_test_vectors_run;\n+\t\tnum_test_vectors_skipped = 0;\n+\n+\t\tchar output_path[MAX_FILE_PATH];\n+\t\tchar device_name[128];\n+\t\tstruct rte_cryptodev_info info;\n+\t\trte_cryptodev_info_get(dev_id, &info);\n+\t\tmkdir(\"./AES/resp/\", 0700);\n+\t\tsnprintf(output_path, MAX_FILE_PATH, \"%s%s%s\", \"./AES/resp/\",\n+\t\t\t\t\tfile_names[i], \".rsp\");\n+\t\tsnprintf(device_name, 128, \"%s%s%s\", \"DPDK Cryptodev \",\n+\t\t\t\tinfo.driver_name, \" PMD\");\n+\t\tif (aes_data->test_type == AESAVS_TYPE_MCT) {\n+\t\t\twrite_aes_vectors(aes_mct_data, output_path, device_name);\n+\t\t\tmemset(aes_mct_data, 0, sizeof(struct fips_aes_test_data));\n+\t\t} else {\n+\t\t\twrite_aes_vectors(aes_data, output_path, device_name);\n+\t\t}\n+\t\tmemset(aes_data, 0, sizeof(struct fips_aes_test_data));\n+\t}\n+\n+\tprintf(\"================================\\n\");\n+\tprintf(\"Total test vectors run: %u\\n\", num_total_run);\n+\tprintf(\"Total test vectors skipped: %u\\n\", num_total_skipped);\n+\tprintf(\"================================\\n\");\n+\n+\tret = TEST_SUCCESS;\n+exit:\n+\trte_free(aes_data);\n+\trte_free(aes_mct_data);\n+\n+\treturn ret;\n+}\n+\n+static struct unit_test_suite cryptodev_fips_testsuite  = {\n+\t.suite_name = \"Crypto FIPS Test Suite\",\n+\t.setup = fips_testsuite_setup,\n+\t.teardown = testsuite_teardown,\n+\t.unit_test_cases = {\n+\t\tTEST_CASE_ST(NULL, NULL,\n+\t\t\ttest_fips_aes),\n+\t\tTEST_CASES_END() /**< NULL terminate unit test array */\n+\t}\n+};\n+\n+static int\n+test_cryptodev_fips(void)\n+{\n+\treturn unit_test_suite_runner(&cryptodev_fips_testsuite);\n+}\n+\n+REGISTER_TEST_COMMAND(cryptodev_fips, test_cryptodev_fips);\n+\n",
    "prefixes": [
        "v1",
        "1/2"
    ]
}