get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/68076/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 68076,
    "url": "http://patches.dpdk.org/api/patches/68076/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20200409172502.1693-14-l.wojciechow@partner.samsung.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20200409172502.1693-14-l.wojciechow@partner.samsung.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20200409172502.1693-14-l.wojciechow@partner.samsung.com",
    "date": "2020-04-09T17:25:02",
    "name": "[v3,13/13] app/test: add rte security capability get tests",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "aa7359994c0a880e8b62202fcd18eafd1942a5c1",
    "submitter": {
        "id": 1628,
        "url": "http://patches.dpdk.org/api/people/1628/?format=api",
        "name": "Lukasz Wojciechowski",
        "email": "l.wojciechow@partner.samsung.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20200409172502.1693-14-l.wojciechow@partner.samsung.com/mbox/",
    "series": [
        {
            "id": 9272,
            "url": "http://patches.dpdk.org/api/series/9272/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=9272",
            "date": "2020-04-09T17:24:49",
            "name": "Fixes and unit tests for librte_security",
            "version": 3,
            "mbox": "http://patches.dpdk.org/series/9272/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/68076/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/68076/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 56299A0597;\n\tThu,  9 Apr 2020 19:27:45 +0200 (CEST)",
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id B982B1D449;\n\tThu,  9 Apr 2020 19:25:52 +0200 (CEST)",
            "from mailout1.w1.samsung.com (mailout1.w1.samsung.com\n [210.118.77.11]) by dpdk.org (Postfix) with ESMTP id CB3751D177\n for <dev@dpdk.org>; Thu,  9 Apr 2020 19:25:38 +0200 (CEST)",
            "from eucas1p1.samsung.com (unknown [182.198.249.206])\n by mailout1.w1.samsung.com (KnoxPortal) with ESMTP id\n 20200409172538euoutp01752e13adc665925f82ef8752088622a0~ENrlmc3lL0866708667euoutp01E\n for <dev@dpdk.org>; Thu,  9 Apr 2020 17:25:38 +0000 (GMT)",
            "from eusmges3new.samsung.com (unknown [203.254.199.245]) by\n eucas1p1.samsung.com (KnoxPortal) with ESMTP id\n 20200409172538eucas1p14259446a1cb38c14f73773b015694b48~ENrlZJoZ40986309863eucas1p1s\n for <dev@dpdk.org>; Thu,  9 Apr 2020 17:25:38 +0000 (GMT)",
            "from eucas1p1.samsung.com ( [182.198.249.206]) by\n eusmges3new.samsung.com (EUCPMTA) with SMTP id 66.71.60698.29A5F8E5; Thu,  9\n Apr 2020 18:25:38 +0100 (BST)",
            "from eusmtrp1.samsung.com (unknown [182.198.249.138]) by\n eucas1p1.samsung.com (KnoxPortal) with ESMTPA id\n 20200409172538eucas1p1dcd99eeedf6fca44c2e2e53e94b08d91~ENrlElAdF0986309863eucas1p1r\n for <dev@dpdk.org>; Thu,  9 Apr 2020 17:25:38 +0000 (GMT)",
            "from eusmgms1.samsung.com (unknown [182.198.249.179]) by\n eusmtrp1.samsung.com (KnoxPortal) with ESMTP id\n 20200409172538eusmtrp1a82acb22239342b7695af4278d66d647~ENrlEG5yO2463624636eusmtrp1U\n for <dev@dpdk.org>; Thu,  9 Apr 2020 17:25:38 +0000 (GMT)",
            "from eusmtip1.samsung.com ( [203.254.199.221]) by\n eusmgms1.samsung.com (EUCPMTA) with SMTP id AE.B9.08375.19A5F8E5; Thu,  9\n Apr 2020 18:25:38 +0100 (BST)",
            "from localhost.localdomain (unknown [106.210.88.70]) by\n eusmtip1.samsung.com (KnoxPortal) with ESMTPA id\n 20200409172536eusmtip10a91d71efee01c49a13349aa34c0f9f3~ENrjrfXMF1119111191eusmtip1I\n for <dev@dpdk.org>; Thu,  9 Apr 2020 17:25:36 +0000 (GMT)"
        ],
        "DKIM-Filter": "OpenDKIM Filter v2.11.0 mailout1.w1.samsung.com\n 20200409172538euoutp01752e13adc665925f82ef8752088622a0~ENrlmc3lL0866708667euoutp01E",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=samsung.com;\n s=mail20170921; t=1586453138;\n bh=e+nN2F7pjxRemqf/4p1ZpdSGaP5iAfaCW/Lw8vlpY/8=;\n h=From:To:Cc:Subject:Date:In-Reply-To:References:From;\n b=cc2QQ/XAj8wGsnJK0ruBwRryPeT7FpUZk+POvKu2GToq+MPUjyOIv1WptDBx0XcNS\n vgbJHXVQlIMFQQFOmMNbj0fSgFKoHsNzljQ/G7+JUGDLOjV2dLpEslUtGhqE7iJnRz\n yCpIaGoON1nJ+W1PdzSjvMvJxUTvnh1vkA+U1crU=",
        "X-AuditID": "cbfec7f5-a29ff7000001ed1a-90-5e8f5a922b04",
        "From": "Lukasz Wojciechowski <l.wojciechow@partner.samsung.com>",
        "To": "",
        "Cc": "dev@dpdk.org",
        "Date": "Thu,  9 Apr 2020 19:25:02 +0200",
        "Message-Id": "<20200409172502.1693-14-l.wojciechow@partner.samsung.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20200409172502.1693-1-l.wojciechow@partner.samsung.com>",
        "X-Brightmail-Tracker": [
            "\n H4sIAAAAAAAAA+NgFjrNIsWRmVeSWpSXmKPExsWy7djPc7qTovrjDDZsFbZ492k7kwOjx68F\n S1kDGKO4bFJSczLLUov07RK4Mu6s2sxcsKKVseLio1nsDYz/C7oYOTkkBEwkJh++xdLFyMUh\n JLCCUeLRnR9sEE47k8St2+vYQaqEBNqYJDY+tOti5ADruPnMGKJmOaPEu+bTrBAOUM2jnZuZ\n QBrYBGwljsz8ygpiiwiwSKz8/p0FxGYWEJB4fO8ZWFxYwFNi7sNJYAtYBFQlXs3fwwhi8wq4\n SryacYER4jx5idUbDjCD2JxA8VvHLzGDLJMQWMEmMXNfJztEkYtE/6L1zBC2sMSr41ug4jIS\n pyf3sEA0bGOUuPr7JyOEs59R4nrvCqgqa4nD/36zgfzGLKApsX6XPkTYUWLPugZmiJf5JG68\n FYR4gE9i0rbpUGFeiY42IYhqPYmnPVMZYdb+WfuEBcL2kNj15zEjJIAuM0pcfvGWeQKj/CyE\n ZQsYGVcxiqeWFuempxYb56WW6xUn5haX5qXrJefnbmIERvHpf8e/7mDc9yfpEKMAB6MSD28H\n U3+cEGtiWXFl7iFGCQ5mJRFe76beOCHelMTKqtSi/Pii0pzU4kOM0hwsSuK8xotexgoJpCeW\n pGanphakFsFkmTg4pRoYfVgMS43enYtqtdHdmPA+ScTxiZ71sdV1S05NUTvw7cCV159ftYSe\n LNWY/kVw5yPDB9fvR8lolRulZXBVWFicyJXp3Gybp79zOluiNi/nvV3/b1+7bZ12fbtbvYDz\n 4QUF07nUV3GnZ/5ffXAPf7t5gVlNuPeeaeekJyTnXfl1aMG0hIR7zhP6lViKMxINtZiLihMB\n /DiJON4CAAA=",
            "\n H4sIAAAAAAAAA+NgFlrFLMWRmVeSWpSXmKPExsVy+t/xu7qTovrjDBbUW7z7tJ3JgdHj14Kl\n rAGMUXo2RfmlJakKGfnFJbZK0YYWRnqGlhZ6RiaWeobG5rFWRqZK+nY2Kak5mWWpRfp2CXoZ\n d1ZtZi5Y0cpYcfHRLPYGxv8FXYwcHBICJhI3nxl3MXJxCAksZZS43rCBDSIuI/HhkkAXIyeQ\n KSzx51oXG0RNC5PEjl0rGUESbAK2EkdmfmUFsUUEWCRWfv/OAmIzCwhIPL73DCwuLOApMffh\n JHYQm0VAVeLV/D1gvbwCrhKvZlxghFggL7F6wwFmEJsTKH7r+CUwW0igXuJ21x/GCYx8CxgZ\n VjGKpJYW56bnFhvqFSfmFpfmpesl5+duYgSG07ZjPzfvYLy0MfgQowAHoxIPrwFDf5wQa2JZ\n cWXuIUYJDmYlEV7vpt44Id6UxMqq1KL8+KLSnNTiQ4ymQEdNZJYSTc4HhnpeSbyhqaG5haWh\n ubG5sZmFkjhvh8DBGCGB9MSS1OzU1ILUIpg+Jg5OqQbG/OdpIpzWi5bP7updNe/PRYab5hO3\n dDXP38f5/fWeado2PyJ1lP58X7r/ZvDRBEfJgv4s64e2P4W8fhanbmFQ0/puX8Bu9XNCTZLd\n 4xNXnU7mSXR/iO5+Ys5gvPnfqa9PPVgksk7UVx81jpC7tyklQu73O+3YL1NSP4fUF3UlS5Yv\n Zkln+nNFiaU4I9FQi7moOBEA0SeE/T0CAAA="
        ],
        "X-CMS-MailID": "20200409172538eucas1p1dcd99eeedf6fca44c2e2e53e94b08d91",
        "X-Msg-Generator": "CA",
        "Content-Type": "text/plain; charset=\"utf-8\"",
        "X-RootMTR": "20200409172538eucas1p1dcd99eeedf6fca44c2e2e53e94b08d91",
        "X-EPHeader": "CA",
        "CMS-TYPE": "201P",
        "X-CMS-RootMailID": "20200409172538eucas1p1dcd99eeedf6fca44c2e2e53e94b08d91",
        "References": "<20200408031351.4288-1-l.wojciechow@partner.samsung.com>\n <20200409172502.1693-1-l.wojciechow@partner.samsung.com>\n <CGME20200409172538eucas1p1dcd99eeedf6fca44c2e2e53e94b08d91@eucas1p1.samsung.com>",
        "Subject": "[dpdk-dev] [PATCH v3 13/13] app/test: add rte security capability\n\tget tests",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Add unit tests for rte_security_capability_get function.\n\nSigned-off-by: Lukasz Wojciechowski <l.wojciechow@partner.samsung.com>\n---\n app/test/test_security.c | 522 +++++++++++++++++++++++++++++++++++++++\n 1 file changed, 522 insertions(+)",
    "diff": "diff --git a/app/test/test_security.c b/app/test/test_security.c\nindex 3570da2a2..724ce56f4 100644\n--- a/app/test/test_security.c\n+++ b/app/test/test_security.c\n@@ -1785,6 +1785,497 @@ test_capabilities_get_success(void)\n }\n \n \n+/**\n+ * rte_security_capability_get tests\n+ */\n+\n+/**\n+ * Test execution of rte_security_capability_get with NULL instance\n+ */\n+static int\n+test_capability_get_inv_context(void)\n+{\n+\tstruct rte_security_capability_idx idx;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(NULL, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 0);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get with invalid\n+ * security operations structure (NULL)\n+ */\n+static int\n+test_capability_get_inv_context_ops(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx;\n+\tut_params->ctx.ops = NULL;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 0);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get with empty\n+ * security operations\n+ */\n+static int\n+test_capability_get_inv_context_ops_fun(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx;\n+\tut_params->ctx.ops = &empty_ops;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 0);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get with NULL idx parameter\n+ */\n+static int\n+test_capability_get_inv_idx(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, NULL);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 0);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities_get\n+ * security operation fails\n+ */\n+static int\n+test_capability_get_ops_failure(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx;\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = NULL;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * is empty (contains only RTE_SECURITY_ACTION_TYPE_NONE ending entry)\n+ */\n+static int\n+test_capability_get_empty_table(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx;\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching action\n+ */\n+static int\n+test_capability_get_no_matching_action(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching protocol\n+ */\n+static int\n+test_capability_get_no_matching_protocol(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_MACSEC,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when macsec protocol\n+ * is searched and capabilities table contain proper entry.\n+ * However macsec records search is not supported in rte_security.\n+ */\n+static int\n+test_capability_get_no_support_for_macsec(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_MACSEC,\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_MACSEC,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching ipsec proto field\n+ */\n+static int\n+test_capability_get_ipsec_mismatch_proto(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t\t.ipsec = {\n+\t\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_AH,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching ipsec mode field\n+ */\n+static int\n+test_capability_get_ipsec_mismatch_mode(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t\t.ipsec = {\n+\t\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching ipsec direction field\n+ */\n+static int\n+test_capability_get_ipsec_mismatch_dir(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t\t.ipsec = {\n+\t\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * contains matching ipsec entry\n+ */\n+static int\n+test_capability_get_ipsec_match(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t\t.ipsec = {\n+\t\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, &capabilities[1], \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching pdcp domain field\n+ */\n+static int\n+test_capability_get_pdcp_mismatch_domain(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t.pdcp = {\n+\t\t\t.domain = RTE_SECURITY_PDCP_MODE_CONTROL,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t\t.pdcp = {\n+\t\t\t\t.domain = RTE_SECURITY_PDCP_MODE_DATA,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * contains matching pdcp entry\n+ */\n+static int\n+test_capability_get_pdcp_match(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t.pdcp = {\n+\t\t\t.domain = RTE_SECURITY_PDCP_MODE_CONTROL,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t\t.pdcp = {\n+\t\t\t\t.domain = RTE_SECURITY_PDCP_MODE_CONTROL,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, &capabilities[1], \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n /**\n  * Declaration of testcases\n  */\n@@ -1897,6 +2388,37 @@ static struct unit_test_suite security_testsuite  = {\n \t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n \t\t\t\ttest_capabilities_get_success),\n \n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_inv_context),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_inv_context_ops),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_inv_context_ops_fun),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_inv_idx),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ops_failure),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_empty_table),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_no_matching_action),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_no_matching_protocol),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_no_support_for_macsec),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ipsec_mismatch_proto),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ipsec_mismatch_mode),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ipsec_mismatch_dir),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ipsec_match),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_pdcp_mismatch_domain),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_pdcp_match),\n+\n \t\tTEST_CASES_END() /**< NULL terminate unit test array */\n \t}\n };\n",
    "prefixes": [
        "v3",
        "13/13"
    ]
}