get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/92089/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 92089,
    "url": "http://patches.dpdk.org/api/patches/92089/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20210423161820.2135053-5-ciara.power@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20210423161820.2135053-5-ciara.power@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20210423161820.2135053-5-ciara.power@intel.com",
    "date": "2021-04-23T16:18:17",
    "name": "[v3,4/7] test/crypto: replace unsupported with skipped",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "6381408e3f10e750ae6d493495ef038c3a9beff4",
    "submitter": {
        "id": 978,
        "url": "http://patches.dpdk.org/api/people/978/?format=api",
        "name": "Power, Ciara",
        "email": "ciara.power@intel.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20210423161820.2135053-5-ciara.power@intel.com/mbox/",
    "series": [
        {
            "id": 16638,
            "url": "http://patches.dpdk.org/api/series/16638/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=16638",
            "date": "2021-04-23T16:18:13",
            "name": "test: refactor crypto unit test framework",
            "version": 3,
            "mbox": "http://patches.dpdk.org/series/16638/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/92089/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/92089/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 4424BA0547;\n\tFri, 23 Apr 2021 18:19:16 +0200 (CEST)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 8C77F416FF;\n\tFri, 23 Apr 2021 18:18:59 +0200 (CEST)",
            "from mga18.intel.com (mga18.intel.com [134.134.136.126])\n by mails.dpdk.org (Postfix) with ESMTP id F2C90416FF\n for <dev@dpdk.org>; Fri, 23 Apr 2021 18:18:57 +0200 (CEST)",
            "from orsmga008.jf.intel.com ([10.7.209.65])\n by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 23 Apr 2021 09:18:57 -0700",
            "from silpixa00400355.ir.intel.com (HELO\n silpixa00400355.ger.corp.intel.com) ([10.237.223.148])\n by orsmga008.jf.intel.com with ESMTP; 23 Apr 2021 09:18:53 -0700"
        ],
        "IronPort-SDR": [
            "\n TRy8Z14GtunjBYRm0JAyZmoo1bVg6P6MNVHRUfs41r9BCY2FVMM6YPIaSU4clLL0CyK9sRhy6P\n oz2PSBQzgkOQ==",
            "\n 13N+C7QKiJhZGHqTToifJnWny0m135GAyoixlCuHRAA2BHcym6bByCuPGehEoZsyB5961Qr5j+\n 9OLI+xUKk56g=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6200,9189,9963\"; a=\"183572793\"",
            "E=Sophos;i=\"5.82,246,1613462400\"; d=\"scan'208\";a=\"183572793\"",
            "E=Sophos;i=\"5.82,246,1613462400\"; d=\"scan'208\";a=\"428442354\""
        ],
        "X-ExtLoop1": "1",
        "From": "Ciara Power <ciara.power@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "thomas@monjalon.net, declan.doherty@intel.com, gakhil@marvell.com,\n aconole@redhat.com, hemant.agrawal@nxp.com, anoobj@marvell.com,\n ruifeng.wang@arm.com, asomalap@amd.com, ajit.khaparde@broadcom.com,\n g.singh@nxp.com, Ciara Power <ciara.power@intel.com>",
        "Date": "Fri, 23 Apr 2021 16:18:17 +0000",
        "Message-Id": "<20210423161820.2135053-5-ciara.power@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20210423161820.2135053-1-ciara.power@intel.com>",
        "References": "<20210423161820.2135053-1-ciara.power@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Subject": "[dpdk-dev] [PATCH v3 4/7] test/crypto: replace unsupported with\n skipped",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Testcases were previously using -ENOTSUP and TEST_SKIPPED return\nstatuses interchangeably. Both resulted in the testcase not being run.\n\nThese return statuses are now standardised to TEST_SKIPPED.\n\nSigned-off-by: Ciara Power <ciara.power@intel.com>\n---\n app/test/test_cryptodev.c      | 464 ++++++++++++++++-----------------\n app/test/test_cryptodev_asym.c |  18 +-\n 2 files changed, 241 insertions(+), 241 deletions(-)",
    "diff": "diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c\nindex 4fe30ddb21..2c9477680e 100644\n--- a/app/test/test_cryptodev.c\n+++ b/app/test/test_cryptodev.c\n@@ -2060,12 +2060,12 @@ test_AES_CBC_HMAC_SHA1_encrypt_digest(void)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA1_HMAC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_CBC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Generate test mbuf data and space for digest */\n \tut_params->ibuf = setup_test_string(ts_params->mbuf_pool,\n@@ -2593,7 +2593,7 @@ create_wireless_algo_cipher_auth_session(uint8_t dev_id,\n \t\t\t&ut_params->cipher_xform,\n \t\t\tts_params->session_priv_mpool);\n \tif (status == -ENOTSUP)\n-\t\treturn status;\n+\t\treturn TEST_SKIPPED;\n \n \tTEST_ASSERT_EQUAL(status, 0, \"session init failed\");\n \treturn 0;\n@@ -2656,7 +2656,7 @@ create_wireless_cipher_auth_session(uint8_t dev_id,\n \t\t\t&ut_params->cipher_xform,\n \t\t\tts_params->session_priv_mpool);\n \tif (status == -ENOTSUP)\n-\t\treturn status;\n+\t\treturn TEST_SKIPPED;\n \n \tTEST_ASSERT_EQUAL(status, 0, \"session init failed\");\n \tTEST_ASSERT_NOT_NULL(ut_params->sess, \"Session creation failed\");\n@@ -2732,7 +2732,7 @@ create_wireless_algo_auth_cipher_session(uint8_t dev_id,\n \t\t\t\tts_params->session_priv_mpool);\n \n \tif (status == -ENOTSUP)\n-\t\treturn status;\n+\t\treturn TEST_SKIPPED;\n \n \tTEST_ASSERT_EQUAL(status, 0, \"session init failed\");\n \n@@ -3076,17 +3076,17 @@ test_snow3g_authentication(const struct snow3g_hash_test_data *tdata)\n \tif (!(feat_flags & RTE_CRYPTODEV_FF_NON_BYTE_ALIGNED_DATA) &&\n \t\t\t((tdata->validAuthLenInBits.len % 8) != 0)) {\n \t\tprintf(\"Device doesn't support NON-Byte Aligned Data.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -3094,7 +3094,7 @@ test_snow3g_authentication(const struct snow3g_hash_test_data *tdata)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SNOW3G_UIA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create SNOW 3G session */\n \tretval = create_wireless_algo_hash_session(ts_params->valid_devs[0],\n@@ -3167,17 +3167,17 @@ test_snow3g_authentication_verify(const struct snow3g_hash_test_data *tdata)\n \tif (!(feat_flags & RTE_CRYPTODEV_FF_NON_BYTE_ALIGNED_DATA) &&\n \t\t\t((tdata->validAuthLenInBits.len % 8) != 0)) {\n \t\tprintf(\"Device doesn't support NON-Byte Aligned Data.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -3185,7 +3185,7 @@ test_snow3g_authentication_verify(const struct snow3g_hash_test_data *tdata)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SNOW3G_UIA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create SNOW 3G session */\n \tretval = create_wireless_algo_hash_session(ts_params->valid_devs[0],\n@@ -3258,11 +3258,11 @@ test_kasumi_authentication(const struct kasumi_hash_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -3270,7 +3270,7 @@ test_kasumi_authentication(const struct kasumi_hash_test_data *tdata)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_KASUMI_F9;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create KASUMI session */\n \tretval = create_wireless_algo_hash_session(ts_params->valid_devs[0],\n@@ -3347,11 +3347,11 @@ test_kasumi_authentication_verify(const struct kasumi_hash_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -3359,7 +3359,7 @@ test_kasumi_authentication_verify(const struct kasumi_hash_test_data *tdata)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_KASUMI_F9;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create KASUMI session */\n \tretval = create_wireless_algo_hash_session(ts_params->valid_devs[0],\n@@ -3571,11 +3571,11 @@ test_kasumi_encryption(const struct kasumi_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -3583,7 +3583,7 @@ test_kasumi_encryption(const struct kasumi_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_KASUMI_F8;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create KASUMI session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -3667,7 +3667,7 @@ test_kasumi_encryption_sgl(const struct kasumi_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_KASUMI_F8;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -3676,17 +3676,17 @@ test_kasumi_encryption_sgl(const struct kasumi_test_data *tdata)\n \tif (!(feat_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) {\n \t\tprintf(\"Device doesn't support in-place scatter-gather. \"\n \t\t\t\t\"Test Skipped.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create KASUMI session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -3767,13 +3767,13 @@ test_kasumi_encryption_oop(const struct kasumi_test_data *tdata)\n \t/* Data-path service does not support OOP */\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create KASUMI session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -3854,13 +3854,13 @@ test_kasumi_encryption_oop_sgl(const struct kasumi_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_KASUMI_F8;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -3869,7 +3869,7 @@ test_kasumi_encryption_oop_sgl(const struct kasumi_test_data *tdata)\n \t\tprintf(\"Device doesn't support out-of-place scatter-gather \"\n \t\t\t\t\"in both input and output mbufs. \"\n \t\t\t\t\"Test Skipped.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Create KASUMI session */\n@@ -3945,13 +3945,13 @@ test_kasumi_decryption_oop(const struct kasumi_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_KASUMI_F8;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create KASUMI session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -4029,11 +4029,11 @@ test_kasumi_decryption(const struct kasumi_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -4041,7 +4041,7 @@ test_kasumi_decryption(const struct kasumi_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_KASUMI_F8;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create KASUMI session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -4121,11 +4121,11 @@ test_snow3g_encryption(const struct snow3g_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -4133,7 +4133,7 @@ test_snow3g_encryption(const struct snow3g_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_SNOW3G_UEA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create SNOW 3G session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -4211,13 +4211,13 @@ test_snow3g_encryption_oop(const struct snow3g_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_SNOW3G_UEA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create SNOW 3G session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -4300,13 +4300,13 @@ test_snow3g_encryption_oop_sgl(const struct snow3g_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_SNOW3G_UEA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -4316,7 +4316,7 @@ test_snow3g_encryption_oop_sgl(const struct snow3g_test_data *tdata)\n \t\tprintf(\"Device doesn't support out-of-place scatter-gather \"\n \t\t\t\t\"in both input and output mbufs. \"\n \t\t\t\t\"Test Skipped.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Create SNOW 3G session */\n@@ -4416,7 +4416,7 @@ test_snow3g_encryption_offset_oop(const struct snow3g_test_data *tdata)\n \tif (!(feat_flags & RTE_CRYPTODEV_FF_NON_BYTE_ALIGNED_DATA) &&\n \t\t\t((tdata->validDataLenInBits.len % 8) != 0)) {\n \t\tprintf(\"Device doesn't support NON-Byte Aligned Data.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -4425,13 +4425,13 @@ test_snow3g_encryption_offset_oop(const struct snow3g_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_SNOW3G_UEA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create SNOW 3G session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -4531,11 +4531,11 @@ static int test_snow3g_decryption(const struct snow3g_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -4543,7 +4543,7 @@ static int test_snow3g_decryption(const struct snow3g_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_SNOW3G_UEA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create SNOW 3G session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -4618,13 +4618,13 @@ static int test_snow3g_decryption_oop(const struct snow3g_test_data *tdata)\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_SNOW3G_UEA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create SNOW 3G session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -4710,17 +4710,17 @@ test_zuc_cipher_auth(const struct wireless_test_data *tdata)\n \t\t\t((tdata->validAuthLenInBits.len % 8 != 0) ||\n \t\t\t(tdata->validDataLenInBits.len % 8 != 0))) {\n \t\tprintf(\"Device doesn't support NON-Byte Aligned Data.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Check if device supports ZUC EEA3 */\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n@@ -4728,7 +4728,7 @@ test_zuc_cipher_auth(const struct wireless_test_data *tdata)\n \n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Check if device supports ZUC EIA3 */\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;\n@@ -4736,7 +4736,7 @@ test_zuc_cipher_auth(const struct wireless_test_data *tdata)\n \n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create ZUC session */\n \tretval = create_zuc_cipher_auth_encrypt_generate_session(\n@@ -4817,11 +4817,11 @@ test_snow3g_cipher_auth(const struct snow3g_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -4829,12 +4829,12 @@ test_snow3g_cipher_auth(const struct snow3g_test_data *tdata)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SNOW3G_UIA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_SNOW3G_UEA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create SNOW 3G session */\n \tretval = create_wireless_algo_cipher_auth_session(ts_params->valid_devs[0],\n@@ -4933,15 +4933,15 @@ test_snow3g_auth_cipher(const struct snow3g_test_data *tdata,\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SNOW3G_UIA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_SNOW3G_UEA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -4950,16 +4950,16 @@ test_snow3g_auth_cipher(const struct snow3g_test_data *tdata,\n \tif (op_mode == OUT_OF_PLACE) {\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_DIGEST_ENCRYPTED)) {\n \t\t\tprintf(\"Device doesn't support digest encrypted.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t}\n \n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Create SNOW 3G session */\n@@ -5125,15 +5125,15 @@ test_snow3g_auth_cipher_sgl(const struct snow3g_test_data *tdata,\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SNOW3G_UIA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_SNOW3G_UEA2;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -5143,24 +5143,24 @@ test_snow3g_auth_cipher_sgl(const struct snow3g_test_data *tdata,\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) {\n \t\t\tprintf(\"Device doesn't support in-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t} else {\n \t\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_OOP_SGL_IN_SGL_OUT)) {\n \t\t\tprintf(\"Device doesn't support out-of-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_DIGEST_ENCRYPTED)) {\n \t\t\tprintf(\"Device doesn't support digest encrypted.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t}\n \n@@ -5332,12 +5332,12 @@ test_kasumi_auth_cipher(const struct kasumi_test_data *tdata,\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_KASUMI_F9;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_KASUMI_F8;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -5346,18 +5346,18 @@ test_kasumi_auth_cipher(const struct kasumi_test_data *tdata,\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (op_mode == OUT_OF_PLACE) {\n \t\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_DIGEST_ENCRYPTED)) {\n \t\t\tprintf(\"Device doesn't support digest encrypted.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t}\n \n@@ -5526,15 +5526,15 @@ test_kasumi_auth_cipher_sgl(const struct kasumi_test_data *tdata,\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_KASUMI_F9;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_KASUMI_F8;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -5544,24 +5544,24 @@ test_kasumi_auth_cipher_sgl(const struct kasumi_test_data *tdata,\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) {\n \t\t\tprintf(\"Device doesn't support in-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t} else {\n \t\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_OOP_SGL_IN_SGL_OUT)) {\n \t\t\tprintf(\"Device doesn't support out-of-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_DIGEST_ENCRYPTED)) {\n \t\t\tprintf(\"Device doesn't support digest encrypted.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t}\n \n@@ -5729,11 +5729,11 @@ test_kasumi_cipher_auth(const struct kasumi_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -5741,12 +5741,12 @@ test_kasumi_cipher_auth(const struct kasumi_test_data *tdata)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_KASUMI_F9;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_KASUMI_F8;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create KASUMI session */\n \tretval = create_wireless_algo_cipher_auth_session(\n@@ -5845,11 +5845,11 @@ test_zuc_encryption(const struct wireless_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n \n@@ -5859,7 +5859,7 @@ test_zuc_encryption(const struct wireless_test_data *tdata)\n \n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create ZUC session */\n \tretval = create_wireless_algo_cipher_session(ts_params->valid_devs[0],\n@@ -5941,10 +5941,10 @@ test_zuc_encryption_sgl(const struct wireless_test_data *tdata)\n \n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -5953,13 +5953,13 @@ test_zuc_encryption_sgl(const struct wireless_test_data *tdata)\n \tif (!(feat_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) {\n \t\tprintf(\"Device doesn't support in-place scatter-gather. \"\n \t\t\t\t\"Test Skipped.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tplaintext_len = ceil_byte_length(tdata->plaintext.len);\n@@ -6043,17 +6043,17 @@ test_zuc_authentication(const struct wireless_test_data *tdata)\n \tif (!(feat_flags & RTE_CRYPTODEV_FF_NON_BYTE_ALIGNED_DATA) &&\n \t\t\t(tdata->validAuthLenInBits.len % 8 != 0)) {\n \t\tprintf(\"Device doesn't support NON-Byte Aligned Data.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Check if device supports ZUC EIA3 */\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;\n@@ -6061,7 +6061,7 @@ test_zuc_authentication(const struct wireless_test_data *tdata)\n \n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create ZUC session */\n \tretval = create_wireless_algo_hash_session(ts_params->valid_devs[0],\n@@ -6140,7 +6140,7 @@ test_zuc_auth_cipher(const struct wireless_test_data *tdata,\n \n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -6148,27 +6148,27 @@ test_zuc_auth_cipher(const struct wireless_test_data *tdata,\n \n \tif (!(feat_flags & RTE_CRYPTODEV_FF_DIGEST_ENCRYPTED)) {\n \t\tprintf(\"Device doesn't support digest encrypted.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \tif (op_mode == IN_PLACE) {\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) {\n \t\t\tprintf(\"Device doesn't support in-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \n \t\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t} else {\n \t\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_OOP_SGL_IN_SGL_OUT)) {\n \t\t\tprintf(\"Device doesn't support out-of-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t}\n \n@@ -6338,7 +6338,7 @@ test_zuc_auth_cipher_sgl(const struct wireless_test_data *tdata,\n \n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -6348,25 +6348,25 @@ test_zuc_auth_cipher_sgl(const struct wireless_test_data *tdata,\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) {\n \t\t\tprintf(\"Device doesn't support in-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \n \t\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t} else {\n \t\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_OOP_SGL_IN_SGL_OUT)) {\n \t\t\tprintf(\"Device doesn't support out-of-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_DIGEST_ENCRYPTED)) {\n \t\t\tprintf(\"Device doesn't support digest encrypted.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t}\n \n@@ -6586,7 +6586,7 @@ test_kasumi_decryption_test_case_3(void)\n {\n \t/* rte_crypto_mbuf_to_vec does not support incomplete mbuf build */\n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \treturn test_kasumi_decryption(&kasumi_test_case_3);\n }\n \n@@ -6737,7 +6737,7 @@ test_snow3g_decryption_with_digest_test_case_1(void)\n \n \tif (!(feat_flags & RTE_CRYPTODEV_FF_DIGEST_ENCRYPTED)) {\n \t\tprintf(\"Device doesn't support encrypted digest operations.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/*\n@@ -6798,7 +6798,7 @@ test_snow3g_auth_cipher_test_case_3_sgl(void)\n {\n \t/* rte_crypto_mbuf_to_vec does not support incomplete mbuf build */\n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \treturn test_snow3g_auth_cipher_sgl(\n \t\t&snow3g_auth_cipher_test_case_3, IN_PLACE, 0);\n }\n@@ -6815,7 +6815,7 @@ test_snow3g_auth_cipher_part_digest_enc_sgl(void)\n {\n \t/* rte_crypto_mbuf_to_vec does not support incomplete mbuf build */\n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \treturn test_snow3g_auth_cipher_sgl(\n \t\t&snow3g_auth_cipher_partial_digest_encryption,\n \t\t\tIN_PLACE, 0);\n@@ -7142,13 +7142,13 @@ test_mixed_check_if_unsupported(const struct mixed_cipher_auth_test_data *tdata)\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = tdata->cipher_algo;\n \tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Check if device supports particular hash algorithm */\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;\n \tcap_idx.algo.auth = tdata->auth_algo;\n \tif (rte_cryptodev_sym_capability_get(dev_id, &cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \treturn 0;\n }\n@@ -7173,9 +7173,9 @@ test_mixed_auth_cipher(const struct mixed_cipher_auth_test_data *tdata,\n \n \t/* Check if device supports particular algorithms separately */\n \tif (test_mixed_check_if_unsupported(tdata))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -7183,7 +7183,7 @@ test_mixed_auth_cipher(const struct mixed_cipher_auth_test_data *tdata,\n \n \tif (!(feat_flags & RTE_CRYPTODEV_FF_DIGEST_ENCRYPTED)) {\n \t\tprintf(\"Device doesn't support digest encrypted.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Create the session */\n@@ -7270,7 +7270,7 @@ test_mixed_auth_cipher(const struct mixed_cipher_auth_test_data *tdata,\n \t\t\tRTE_CRYPTO_OP_STATUS_INVALID_SESSION) {\n \t\tprintf(\"Device doesn't support this mixed combination. \"\n \t\t\t\t\"Test Skipped.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \tut_params->op = op;\n \n@@ -7367,9 +7367,9 @@ test_mixed_auth_cipher_sgl(const struct mixed_cipher_auth_test_data *tdata,\n \n \t/* Check if device supports particular algorithms */\n \tif (test_mixed_check_if_unsupported(tdata))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -7379,17 +7379,17 @@ test_mixed_auth_cipher_sgl(const struct mixed_cipher_auth_test_data *tdata,\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) {\n \t\t\tprintf(\"Device doesn't support in-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t} else {\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_OOP_SGL_IN_SGL_OUT)) {\n \t\t\tprintf(\"Device doesn't support out-of-place scatter-gather \"\n \t\t\t\t\t\"in both input and output mbufs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t\tif (!(feat_flags & RTE_CRYPTODEV_FF_DIGEST_ENCRYPTED)) {\n \t\t\tprintf(\"Device doesn't support digest encrypted.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t}\n \n@@ -7476,7 +7476,7 @@ test_mixed_auth_cipher_sgl(const struct mixed_cipher_auth_test_data *tdata,\n \t\t\tRTE_CRYPTO_OP_STATUS_INVALID_SESSION) {\n \t\tprintf(\"Device doesn't support this mixed combination. \"\n \t\t\t\t\"Test Skipped.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \tut_params->op = op;\n \n@@ -8028,7 +8028,7 @@ test_authenticated_encryption(const struct aead_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -8039,11 +8039,11 @@ test_authenticated_encryption(const struct aead_test_data *tdata)\n \tcapability = rte_cryptodev_sym_capability_get(\n \t\t\tts_params->valid_devs[0], &cap_idx);\n \tif (capability == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tif (rte_cryptodev_sym_capability_check_aead(\n \t\t\tcapability, tdata->key.len, tdata->auth_tag.len,\n \t\t\ttdata->aad.len, tdata->iv.len))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create AEAD session */\n \tretval = create_aead_session(ts_params->valid_devs[0],\n@@ -8188,7 +8188,7 @@ static int test_pdcp_proto(int i, int oop, enum rte_crypto_cipher_operation opc,\n \tsec_cap_idx.protocol = RTE_SECURITY_PROTOCOL_PDCP;\n \tsec_cap_idx.pdcp.domain = domain;\n \tif (rte_security_capability_get(ctx, &sec_cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Generate test mbuf data */\n \tut_params->ibuf = rte_pktmbuf_alloc(ts_params->mbuf_pool);\n@@ -8374,7 +8374,7 @@ test_pdcp_proto_SGL(int i, int oop,\n \tsec_cap_idx.protocol = RTE_SECURITY_PROTOCOL_PDCP;\n \tsec_cap_idx.pdcp.domain = pdcp_test_params[i].domain;\n \tif (rte_security_capability_get(ctx, &sec_cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (fragsz > input_vec_len)\n \t\tfragsz = input_vec_len;\n@@ -8880,7 +8880,7 @@ test_PDCP_PROTO_all(void)\n \tuint64_t feat_flags = dev_info.feature_flags;\n \n \tif (!(feat_flags & RTE_CRYPTODEV_FF_SECURITY))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Set action type */\n \tut_params->type = gbl_action_type == RTE_SECURITY_ACTION_TYPE_NONE ?\n@@ -8889,7 +8889,7 @@ test_PDCP_PROTO_all(void)\n \n \tif (security_proto_supported(ut_params->type,\n \t\t\tRTE_SECURITY_PROTOCOL_PDCP) < 0)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tstatus = test_PDCP_PROTO_cplane_encap_all();\n \tstatus += test_PDCP_PROTO_cplane_decap_all();\n@@ -8936,7 +8936,7 @@ test_docsis_proto_uplink(int i, struct docsis_test_data *d_td)\n \n \tsec_cap = rte_security_capability_get(ctx, &sec_cap_idx);\n \tif (sec_cap == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \twhile ((crypto_cap = &sec_cap->crypto_capabilities[j++])->op !=\n \t\t\tRTE_CRYPTO_OP_TYPE_UNDEFINED) {\n@@ -8954,7 +8954,7 @@ test_docsis_proto_uplink(int i, struct docsis_test_data *d_td)\n \t}\n \n \tif (crypto_cap->op == RTE_CRYPTO_OP_TYPE_UNDEFINED)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Setup source mbuf payload */\n \tut_params->ibuf = rte_pktmbuf_alloc(ts_params->mbuf_pool);\n@@ -9112,7 +9112,7 @@ test_docsis_proto_downlink(int i, struct docsis_test_data *d_td)\n \n \tsec_cap = rte_security_capability_get(ctx, &sec_cap_idx);\n \tif (sec_cap == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \twhile ((crypto_cap = &sec_cap->crypto_capabilities[j++])->op !=\n \t\t\tRTE_CRYPTO_OP_TYPE_UNDEFINED) {\n@@ -9130,7 +9130,7 @@ test_docsis_proto_downlink(int i, struct docsis_test_data *d_td)\n \t}\n \n \tif (crypto_cap->op == RTE_CRYPTO_OP_TYPE_UNDEFINED)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Setup source mbuf payload */\n \tut_params->ibuf = rte_pktmbuf_alloc(ts_params->mbuf_pool);\n@@ -9265,10 +9265,10 @@ test_docsis_proto_downlink(int i, struct docsis_test_data *d_td)\n \t\tprintf(\"\\t%2d)\", n++);\t\t\t\\\n \t\tprintf(\"+++++ PASSED:\" #func\"\\n\");\t\\\n \t\tp++;\t\t\t\t\t\\\n-\t} else if (ret == -ENOTSUP) {\t\t\t\\\n+\t} else if (ret == TEST_SKIPPED) {\t\t\\\n \t\tprintf(\"\\t%2d)\", n++);\t\t\t\\\n-\t\tprintf(\"~~~~~ UNSUPP:\" #func\"\\n\");\t\\\n-\t\tu++;\t\t\t\t\t\\\n+\t\tprintf(\"~~~~~ SKIPPED:\" #func\"\\n\");\t\\\n+\t\ts++;\t\t\t\t\t\\\n \t} else {\t\t\t\t\t\\\n \t\tprintf(\"\\t%2d)\", n++);\t\t\t\\\n \t\tprintf(\"----- FAILED:\" #func\"\\n\");\t\\\n@@ -9279,7 +9279,7 @@ test_docsis_proto_downlink(int i, struct docsis_test_data *d_td)\n static int\n test_DOCSIS_PROTO_uplink_all(void)\n {\n-\tint p = 0, u = 0, f = 0, n = 0;\n+\tint p = 0, s = 0, f = 0, n = 0;\n \n \tTEST_DOCSIS_COUNT(test_docsis_proto_uplink(1, &docsis_test_case_1));\n \tTEST_DOCSIS_COUNT(test_docsis_proto_uplink(2, &docsis_test_case_2));\n@@ -9309,8 +9309,8 @@ test_DOCSIS_PROTO_uplink_all(void)\n \tTEST_DOCSIS_COUNT(test_docsis_proto_uplink(26, &docsis_test_case_26));\n \n \tif (f)\n-\t\tprintf(\"## %s: %d passed out of %d (%d unsupported)\\n\",\n-\t\t\t__func__, p, n, u);\n+\t\tprintf(\"## %s: %d passed out of %d (%d skipped)\\n\",\n+\t\t\t__func__, p, n, s);\n \n \treturn f;\n };\n@@ -9318,7 +9318,7 @@ test_DOCSIS_PROTO_uplink_all(void)\n static int\n test_DOCSIS_PROTO_downlink_all(void)\n {\n-\tint p = 0, u = 0, f = 0, n = 0;\n+\tint p = 0, s = 0, f = 0, n = 0;\n \n \tTEST_DOCSIS_COUNT(test_docsis_proto_downlink(1, &docsis_test_case_1));\n \tTEST_DOCSIS_COUNT(test_docsis_proto_downlink(2, &docsis_test_case_2));\n@@ -9348,8 +9348,8 @@ test_DOCSIS_PROTO_downlink_all(void)\n \tTEST_DOCSIS_COUNT(test_docsis_proto_downlink(26, &docsis_test_case_26));\n \n \tif (f)\n-\t\tprintf(\"## %s: %d passed out of %d (%d unsupported)\\n\",\n-\t\t\t__func__, p, n, u);\n+\t\tprintf(\"## %s: %d passed out of %d (%d skipped)\\n\",\n+\t\t\t__func__, p, n, s);\n \n \treturn f;\n };\n@@ -9366,7 +9366,7 @@ test_DOCSIS_PROTO_all(void)\n \tuint64_t feat_flags = dev_info.feature_flags;\n \n \tif (!(feat_flags & RTE_CRYPTODEV_FF_SECURITY))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Set action type */\n \tut_params->type = gbl_action_type == RTE_SECURITY_ACTION_TYPE_NONE ?\n@@ -9375,7 +9375,7 @@ test_DOCSIS_PROTO_all(void)\n \n \tif (security_proto_supported(ut_params->type,\n \t\t\tRTE_SECURITY_PROTOCOL_DOCSIS) < 0)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tstatus = test_DOCSIS_PROTO_uplink_all();\n \tstatus += test_DOCSIS_PROTO_downlink_all();\n@@ -9547,7 +9547,7 @@ test_AES_GCM_auth_encryption_fail_iv_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.iv.data[0] += 1;\n \tres = test_authenticated_encryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"encryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9563,7 +9563,7 @@ test_AES_GCM_auth_encryption_fail_in_data_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.plaintext.data[0] += 1;\n \tres = test_authenticated_encryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"encryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9579,7 +9579,7 @@ test_AES_GCM_auth_encryption_fail_out_data_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.ciphertext.data[0] += 1;\n \tres = test_authenticated_encryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"encryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9595,7 +9595,7 @@ test_AES_GCM_auth_encryption_fail_aad_len_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.aad.len += 1;\n \tres = test_authenticated_encryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"encryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9614,7 +9614,7 @@ test_AES_GCM_auth_encryption_fail_aad_corrupt(void)\n \taad[0] += 1;\n \ttdata.aad.data = aad;\n \tres = test_authenticated_encryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"encryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9630,7 +9630,7 @@ test_AES_GCM_auth_encryption_fail_tag_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.auth_tag.data[0] += 1;\n \tres = test_authenticated_encryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"encryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9653,7 +9653,7 @@ test_authenticated_decryption(const struct aead_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -9664,11 +9664,11 @@ test_authenticated_decryption(const struct aead_test_data *tdata)\n \tcapability = rte_cryptodev_sym_capability_get(\n \t\t\tts_params->valid_devs[0], &cap_idx);\n \tif (capability == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tif (rte_cryptodev_sym_capability_check_aead(\n \t\t\tcapability, tdata->key.len, tdata->auth_tag.len,\n \t\t\ttdata->aad.len, tdata->iv.len))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create AEAD session */\n \tretval = create_aead_session(ts_params->valid_devs[0],\n@@ -9898,7 +9898,7 @@ test_AES_GCM_auth_decryption_fail_iv_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.iv.data[0] += 1;\n \tres = test_authenticated_decryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"decryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9914,7 +9914,7 @@ test_AES_GCM_auth_decryption_fail_in_data_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.plaintext.data[0] += 1;\n \tres = test_authenticated_decryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"decryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9929,7 +9929,7 @@ test_AES_GCM_auth_decryption_fail_out_data_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.ciphertext.data[0] += 1;\n \tres = test_authenticated_decryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"decryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9944,7 +9944,7 @@ test_AES_GCM_auth_decryption_fail_aad_len_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.aad.len += 1;\n \tres = test_authenticated_decryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"decryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9962,7 +9962,7 @@ test_AES_GCM_auth_decryption_fail_aad_corrupt(void)\n \taad[0] += 1;\n \ttdata.aad.data = aad;\n \tres = test_authenticated_decryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"decryption not failed\");\n \treturn TEST_SUCCESS;\n@@ -9977,7 +9977,7 @@ test_AES_GCM_auth_decryption_fail_tag_corrupt(void)\n \tmemcpy(&tdata, &gcm_test_case_7, sizeof(struct aead_test_data));\n \ttdata.auth_tag.data[0] += 1;\n \tres = test_authenticated_decryption(&tdata);\n-\tif (res == -ENOTSUP)\n+\tif (res == TEST_SKIPPED)\n \t\treturn res;\n \tTEST_ASSERT_EQUAL(res, TEST_FAILED, \"authentication not failed\");\n \treturn TEST_SUCCESS;\n@@ -9999,14 +9999,14 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)\n \tcap_idx.algo.aead = tdata->algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* not supported with CPU crypto */\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create AEAD session */\n \tretval = create_aead_session(ts_params->valid_devs[0],\n@@ -10091,12 +10091,12 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)\n \tcap_idx.algo.aead = tdata->algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* not supported with CPU crypto and raw data-path APIs*/\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO ||\n \t\t\tglobal_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create AEAD session */\n \tretval = create_aead_session(ts_params->valid_devs[0],\n@@ -10176,12 +10176,12 @@ test_authenticated_encryption_sessionless(\n \n \tif (!(feat_flags & RTE_CRYPTODEV_FF_SYM_SESSIONLESS)) {\n \t\tprintf(\"Device doesn't support Sessionless ops.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* not supported with CPU crypto */\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -10189,7 +10189,7 @@ test_authenticated_encryption_sessionless(\n \tcap_idx.algo.aead = tdata->algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tut_params->ibuf = rte_pktmbuf_alloc(ts_params->mbuf_pool);\n \n@@ -10278,18 +10278,18 @@ test_authenticated_decryption_sessionless(\n \n \tif (!(feat_flags & RTE_CRYPTODEV_FF_SYM_SESSIONLESS)) {\n \t\tprintf(\"Device doesn't support Sessionless ops.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* not supported with CPU crypto */\n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -10297,7 +10297,7 @@ test_authenticated_decryption_sessionless(\n \tcap_idx.algo.aead = tdata->algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* alloc mbuf and set payload */\n \tut_params->ibuf = rte_pktmbuf_alloc(ts_params->mbuf_pool);\n@@ -10481,7 +10481,7 @@ test_stats(void)\n \tstruct rte_cryptodev_stats stats;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Verify the capabilities */\n \tstruct rte_cryptodev_sym_capability_idx cap_idx;\n@@ -10489,16 +10489,16 @@ test_stats(void)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA1_HMAC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_CBC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (rte_cryptodev_stats_get(ts_params->valid_devs[0], &stats)\n-\t\t\t== -ENOTSUP)\n-\t\treturn -ENOTSUP;\n+\t\t\t== TEST_SKIPPED)\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_stats_reset(ts_params->valid_devs[0]);\n \tTEST_ASSERT((rte_cryptodev_stats_get(ts_params->valid_devs[0] + 600,\n@@ -10632,7 +10632,7 @@ test_MD5_HMAC_generate(const struct HMAC_MD5_vector *test_case)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -10641,7 +10641,7 @@ test_MD5_HMAC_generate(const struct HMAC_MD5_vector *test_case)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_MD5_HMAC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (MD5_HMAC_create_session(ts_params, ut_params,\n \t\t\tRTE_CRYPTO_AUTH_OP_GENERATE, test_case))\n@@ -10705,7 +10705,7 @@ test_MD5_HMAC_verify(const struct HMAC_MD5_vector *test_case)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -10714,7 +10714,7 @@ test_MD5_HMAC_verify(const struct HMAC_MD5_vector *test_case)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_MD5_HMAC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (MD5_HMAC_create_session(ts_params, ut_params,\n \t\t\tRTE_CRYPTO_AUTH_OP_VERIFY, test_case)) {\n@@ -10789,12 +10789,12 @@ test_multi_session(void)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA512_HMAC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_CBC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \ttest_AES_CBC_HMAC_SHA512_decrypt_create_session_params(ut_params,\n \t\t\taes_cbc_key, hmac_sha512_key);\n@@ -10917,12 +10917,12 @@ test_multi_session_random_usage(void)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA512_HMAC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_CBC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n \n@@ -11015,7 +11015,7 @@ test_null_invalid_operation(void)\n \t/* This test is for NULL PMD only */\n \tif (gbl_driver_id != rte_cryptodev_driver_id_get(\n \t\t\tRTE_STR(CRYPTODEV_NAME_NULL_PMD)))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Setup Cipher Parameters */\n \tut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n@@ -11072,7 +11072,7 @@ test_null_burst_operation(void)\n \t/* This test is for NULL PMD only */\n \tif (gbl_driver_id != rte_cryptodev_driver_id_get(\n \t\t\tRTE_STR(CRYPTODEV_NAME_NULL_PMD)))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Setup Cipher Parameters */\n \tut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n@@ -11536,7 +11536,7 @@ test_AES_GMAC_authentication(const struct gmac_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tint retval;\n@@ -11553,7 +11553,7 @@ test_AES_GMAC_authentication(const struct gmac_test_data *tdata)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_AES_GMAC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tretval = create_gmac_session(ts_params->valid_devs[0],\n \t\t\ttdata, RTE_CRYPTO_AUTH_OP_GENERATE);\n@@ -11670,7 +11670,7 @@ test_AES_GMAC_authentication_verify(const struct gmac_test_data *tdata)\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tTEST_ASSERT_NOT_EQUAL(tdata->gmac_tag.len, 0,\n@@ -11682,7 +11682,7 @@ test_AES_GMAC_authentication_verify(const struct gmac_test_data *tdata)\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_AES_GMAC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tretval = create_gmac_session(ts_params->valid_devs[0],\n \t\t\ttdata, RTE_CRYPTO_AUTH_OP_VERIFY);\n@@ -11795,7 +11795,7 @@ test_AES_GMAC_authentication_SGL(const struct gmac_test_data *tdata,\n \tcap_idx.algo.auth = RTE_CRYPTO_AUTH_AES_GMAC;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Check for any input SGL support */\n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n@@ -11804,7 +11804,7 @@ test_AES_GMAC_authentication_SGL(const struct gmac_test_data *tdata,\n \tif ((!(feature_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) ||\n \t\t\t(!(feature_flags & RTE_CRYPTODEV_FF_OOP_SGL_IN_LB_OUT)) ||\n \t\t\t(!(feature_flags & RTE_CRYPTODEV_FF_OOP_SGL_IN_SGL_OUT)))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tif (fragsz > tdata->plaintext.len)\n \t\tfragsz = tdata->plaintext.len;\n@@ -11884,7 +11884,7 @@ test_AES_GMAC_authentication_SGL(const struct gmac_test_data *tdata,\n \tut_params->op->sym->m_src = ut_params->ibuf;\n \n \tif (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \tTEST_ASSERT_NOT_NULL(\n \t\tprocess_crypto_request(ts_params->valid_devs[0],\n@@ -12417,7 +12417,7 @@ test_authentication_verify_fail_when_data_corruption(\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -12426,7 +12426,7 @@ test_authentication_verify_fail_when_data_corruption(\n \tcap_idx.algo.auth = reference->auth_algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \n \t/* Create session */\n@@ -12499,7 +12499,7 @@ test_authentication_verify_GMAC_fail_when_corruption(\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -12508,7 +12508,7 @@ test_authentication_verify_GMAC_fail_when_corruption(\n \tcap_idx.algo.auth = reference->auth_algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create session */\n \tretval = create_auth_cipher_session(ut_params,\n@@ -12584,7 +12584,7 @@ test_authenticated_decryption_fail_when_corruption(\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -12593,12 +12593,12 @@ test_authenticated_decryption_fail_when_corruption(\n \tcap_idx.algo.auth = reference->auth_algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = reference->crypto_algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create session */\n \tretval = create_auth_cipher_session(ut_params,\n@@ -12674,7 +12674,7 @@ test_authenticated_encryt_with_esn(\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -12683,12 +12683,12 @@ test_authenticated_encryt_with_esn(\n \tcap_idx.algo.auth = reference->auth_algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = reference->crypto_algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create session */\n \tmemcpy(cipher_key, reference->cipher_key.data,\n@@ -12807,7 +12807,7 @@ test_authenticated_decrypt_with_esn(\n \tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Verify the capabilities */\n@@ -12816,12 +12816,12 @@ test_authenticated_decrypt_with_esn(\n \tcap_idx.algo.auth = reference->auth_algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \tcap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n \tcap_idx.algo.cipher = reference->crypto_algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Create session */\n \tmemcpy(cipher_key, reference->cipher_key.data,\n@@ -13013,11 +13013,11 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,\n \tcap_idx.algo.aead = tdata->algo;\n \tif (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],\n \t\t\t&cap_idx) == NULL)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* OOP not supported with CPU crypto */\n \tif (oop && gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \t/* Detailed check for the particular SGL support flag */\n \trte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);\n@@ -13025,14 +13025,14 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,\n \t\tunsigned int sgl_in = fragsz < tdata->plaintext.len;\n \t\tif (sgl_in && (!(dev_info.feature_flags &\n \t\t\t\tRTE_CRYPTODEV_FF_IN_PLACE_SGL)))\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \n \t\tuint64_t feat_flags = dev_info.feature_flags;\n \n \t\tif ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&\n \t\t\t(!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {\n \t\t\tprintf(\"Device doesn't support RAW data-path APIs.\\n\");\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t} else {\n \t\tunsigned int sgl_in = fragsz < tdata->plaintext.len;\n@@ -13040,19 +13040,19 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,\n \t\t\t\ttdata->plaintext.len;\n \t\t/* Raw data path API does not support OOP */\n \t\tif (global_api_test_type == CRYPTODEV_RAW_API_TEST)\n-\t\t\treturn -ENOTSUP;\n+\t\t\treturn TEST_SKIPPED;\n \t\tif (sgl_in && !sgl_out) {\n \t\t\tif (!(dev_info.feature_flags &\n \t\t\t\t\tRTE_CRYPTODEV_FF_OOP_SGL_IN_LB_OUT))\n-\t\t\t\treturn -ENOTSUP;\n+\t\t\t\treturn TEST_SKIPPED;\n \t\t} else if (!sgl_in && sgl_out) {\n \t\t\tif (!(dev_info.feature_flags &\n \t\t\t\t\tRTE_CRYPTODEV_FF_OOP_LB_IN_SGL_OUT))\n-\t\t\t\treturn -ENOTSUP;\n+\t\t\t\treturn TEST_SKIPPED;\n \t\t} else if (sgl_in && sgl_out) {\n \t\t\tif (!(dev_info.feature_flags &\n \t\t\t\t\tRTE_CRYPTODEV_FF_OOP_SGL_IN_SGL_OUT))\n-\t\t\t\treturn -ENOTSUP;\n+\t\t\t\treturn TEST_SKIPPED;\n \t\t}\n \t}\n \n@@ -13323,7 +13323,7 @@ test_AES_GCM_auth_encrypt_SGL_in_place_1500B(void)\n \t/* This test is not for OPENSSL PMD */\n \tif (gbl_driver_id == rte_cryptodev_driver_id_get(\n \t\t\tRTE_STR(CRYPTODEV_NAME_OPENSSL_PMD)))\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \n \treturn test_authenticated_encryption_SGL(\n \t\t\t&gcm_test_case_SGL_1, IN_PLACE, 1500, 0);\ndiff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c\nindex 85cd076059..e935f38ca9 100644\n--- a/app/test/test_cryptodev_asym.c\n+++ b/app/test/test_cryptodev_asym.c\n@@ -327,7 +327,7 @@ test_cryptodev_asym_op(struct crypto_testsuite_params *ts_params,\n \tif (capability == NULL) {\n \t\tRTE_LOG(INFO, USER1,\n \t\t\t\"Device doesn't support MODEX. Test Skipped\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \t/* Generate crypto op data structure */\n@@ -665,7 +665,7 @@ test_rsa_sign_verify(void)\n \t\t\t\tRTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_EXP)) {\n \t\tRTE_LOG(INFO, USER1, \"Device doesn't support sign op with \"\n \t\t\t\"exponent key type. Test Skipped\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tsess = rte_cryptodev_asym_session_create(sess_mpool);\n@@ -714,7 +714,7 @@ test_rsa_enc_dec(void)\n \t\t\t\tRTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_EXP)) {\n \t\tRTE_LOG(INFO, USER1, \"Device doesn't support decrypt op with \"\n \t\t\t\"exponent key type. Test skipped\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tsess = rte_cryptodev_asym_session_create(sess_mpool);\n@@ -761,7 +761,7 @@ test_rsa_sign_verify_crt(void)\n \tif (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_QT)) {\n \t\tRTE_LOG(INFO, USER1, \"Device doesn't support sign op with \"\n \t\t\t\"quintuple key type. Test skipped\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tsess = rte_cryptodev_asym_session_create(sess_mpool);\n@@ -809,7 +809,7 @@ test_rsa_enc_dec_crt(void)\n \tif (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_QT)) {\n \t\tRTE_LOG(INFO, USER1, \"Device doesn't support decrypt op with \"\n \t\t\t\"quintuple key type. Test skipped\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tsess = rte_cryptodev_asym_session_create(sess_mpool);\n@@ -1501,7 +1501,7 @@ test_mod_inv(void)\n \tif (capability == NULL) {\n \t\tRTE_LOG(INFO, USER1,\n \t\t\t\"Device doesn't support MOD INV. Test Skipped\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (rte_cryptodev_asym_xform_capability_check_modlen(\n@@ -1509,7 +1509,7 @@ test_mod_inv(void)\n \t\tmodinv_xform.modinv.modulus.length)) {\n \t\tRTE_LOG(ERR, USER1,\n \t\t\t\t \"Invalid MODULUS length specified\\n\");\n-\t\t\t\treturn -ENOTSUP;\n+\t\t\t\treturn TEST_SKIPPED;\n \t\t}\n \n \tsess = rte_cryptodev_asym_session_create(sess_mpool);\n@@ -1626,14 +1626,14 @@ test_mod_exp(void)\n \tif (capability == NULL) {\n \t\tRTE_LOG(INFO, USER1,\n \t\t\t\"Device doesn't support MOD EXP. Test Skipped\\n\");\n-\t\treturn -ENOTSUP;\n+\t\treturn TEST_SKIPPED;\n \t}\n \n \tif (rte_cryptodev_asym_xform_capability_check_modlen(\n \t\t\tcapability, modex_xform.modex.modulus.length)) {\n \t\tRTE_LOG(ERR, USER1,\n \t\t\t\t\"Invalid MODULUS length specified\\n\");\n-\t\t\t\treturn -ENOTSUP;\n+\t\t\t\treturn TEST_SKIPPED;\n \t\t}\n \n \t/* generate crypto op data structure */\n",
    "prefixes": [
        "v3",
        "4/7"
    ]
}