From patchwork Thu Jun 29 20:49:03 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akhil Goyal X-Patchwork-Id: 26045 Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [IPv6:::1]) by dpdk.org (Postfix) with ESMTP id D69E75A3E; Thu, 29 Jun 2017 22:50:33 +0200 (CEST) Received: from NAM03-BY2-obe.outbound.protection.outlook.com (mail-by2nam03on0053.outbound.protection.outlook.com [104.47.42.53]) by dpdk.org (Postfix) with ESMTP id 85DE4377E for ; Thu, 29 Jun 2017 22:50:30 +0200 (CEST) Received: from BN6PR03CA0096.namprd03.prod.outlook.com (10.164.122.162) by CY4PR03MB3158.namprd03.prod.outlook.com (10.171.245.163) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1199.15; Thu, 29 Jun 2017 20:50:28 +0000 Received: from BY2FFO11FD020.protection.gbl (2a01:111:f400:7c0c::152) by BN6PR03CA0096.outlook.office365.com (2603:10b6:405:6f::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1220.11 via Frontend Transport; Thu, 29 Jun 2017 20:50:28 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; nxp.com; dkim=none (message not signed) header.d=none;nxp.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BY2FFO11FD020.mail.protection.outlook.com (10.1.14.137) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1199.9 via Frontend Transport; Thu, 29 Jun 2017 20:50:27 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v5TKoFPT005297; Thu, 29 Jun 2017 13:50:25 -0700 From: To: CC: , , , Akhil Goyal Date: Fri, 30 Jun 2017 02:19:03 +0530 Message-ID: <20170629204904.23684-5-akhil.goyal@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20170629204904.23684-1-akhil.goyal@nxp.com> References: <20170629204904.23684-1-akhil.goyal@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131432430279584066; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39400400002)(39850400002)(39410400002)(39840400002)(39450400003)(39380400002)(39860400002)(2980300002)(1110001)(1109001)(339900001)(199003)(189002)(9170700003)(36756003)(50986999)(104016004)(33646002)(2876002)(85426001)(4326008)(305945005)(1076002)(50226002)(2950100002)(6666003)(8936002)(105606002)(6916009)(106466001)(2906002)(189998001)(356003)(86362001)(575784001)(5003940100001)(47776003)(110136004)(53936002)(38730400002)(54906002)(5660300001)(8656002)(86152003)(498600001)(8676002)(81166006)(76176999)(48376002)(77096006)(2351001)(50466002); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR03MB3158; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; MLV:ovrnspm; A:1; MX:1; PTR:InfoDomainNonexistent; LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BY2FFO11FD020; 1:yOTIjA1snH2bCy9cdm2BSRVNsiOMODuvbCWMBmBPsl?= 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 MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 82274482-fd0a-4994-e942-08d4bf30793e X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(300000503095)(300135400095)(2017052603031)(201703131430075)(201703131517081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:CY4PR03MB3158; X-Microsoft-Exchange-Diagnostics: 1; CY4PR03MB3158; 3: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 X-MS-TrafficTypeDiagnostic: CY4PR03MB3158: X-Microsoft-Exchange-Diagnostics: 1; CY4PR03MB3158; 25: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 X-Microsoft-Exchange-Diagnostics: 1; CY4PR03MB3158; 31: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(5005006)(13016025)(13018025)(8121501046)(3002001)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(6055026)(6096035)(20161123556025)(20161123561025)(20161123563025)(20161123559100)(20161123565025)(201703131430075)(201703131433075)(201703131441075)(201703131448075)(201703161259150)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CY4PR03MB3158; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CY4PR03MB3158; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY4PR03MB3158; 4:4c+2R6yrIPQfgMgzoAo6e2mn7biur4wC+Uca2JsB0W?= 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 X-Forefront-PRVS: 0353563E2B X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY4PR03MB3158; 23:+6iFXJh0gpPtYraDy6OBkPUrjEctMjV1IzHT9K427?= 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 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY4PR03MB3158; 6:z3xxeeMqHlgg4IlEx8O6RKVfGy0JuJ6AgL2Hi2Moto?= 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 X-Microsoft-Exchange-Diagnostics: 1; CY4PR03MB3158; 5:wwN4EIqf2mewKKq+sxY33TkBxlGBpHE04CL2JTVhjS3ep/Whxm3TvWfVCoqT6JZcChlTqnFA5HR5fDGEInKDVAIwGt+uzQhvgr35qDaSYYA27S5SWWgoB+7pdGInJyAfMtoGmFkZFAfmzaSAgRSqPtJIKoFS9yT0GY758iT/IFeybo+Dyiyv+MN/Dg6ixQDGxIeQp0HzG4dTzA2Ti+kDkmzSJoxH3AHwsjWJuuojZ4tZt6MnvSabrOGLa7uhTT61/TXGHOzlKNgyF900CvmwkskJGnDHwThjfU+YNTV6DKVG1OC7BD+ZLHiEq7OO/8ab59GqjYTZXU6h9HHJAfdAHGxq4YctIqNvQ8+8XdelkpJFUBIVVFe3kqIuQxBlux240K8KIQdObbVfcfXcajtAOTYJs4El/UMue98GZU8uRm00ShHzDXE2UwRbVd/phtfH79jZwp50pOevRSsB/VeuUdovfzfS+lXJ6t4I9oklykfRuy2S9aylWdLSB4WBoF0FpDbYiH1EAFUzqYwwd/RNkg==; 24:wGrAObiK6B4nWZXc2xcuSI06kcdo1eXCuebDrROmDo+nSaUDMmI3ErMaCc7AC82CEk+TBi7Sj/s4mjk87isTO01Iq94GCs4GtAzgvFdoqXs= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CY4PR03MB3158; 7:jJ7usubnsb39dBGtMQHe88sHPRFlYIH5Ulat3swzX1YDCYW07pLwT+9iejA67mGn2vQ/mldcTgtBziSnWGP1N8BTAicMTdAdurQ8CP6H0FZqO6U4mGYSMcdombhWFHn8fQyHpGoOSvRLsTfumf/QriMlzhb+KezI5nanjvdeGkT1qF48EGIBuTb/lNNhlnXlMm6FqaKSsv9xykm+JJlwrNz4r1fXTekjOD/dkhPCs1Rk6gRFKnBiayjg3LbdjDpzdpG9mRlyjDo2gkals/VQOUKsHv0rM0zsM/y5Q67fK+EOWjJOTLR+/rE8NkOb/aYJYD1+Y31Kv3G6wmd0ro9iZ/75EEEhVeNpfy19pmJkLs4vO/Rs8Wp9xHqZUx9F5ZeZ/SRN5vpfKamjHO2tNhB6i1n7+vytIKx7hZ5GzfqV5xIp653XUsjKLOAjhWBuPU5IeZKuWI2J8GwtLzuPXa4EqJZHF9V5jUhqzNmXyf8v0h5uozRSjnKZULk/EVAGTgCdEi+BmAXtBfs2Pj3XocIF8avNagqU9T0JQoy7bOTsVg9gFbEiaVYGTD4J6WZ54LPwErs7U+kjPfEldmxsgKvaGgRT4aC/yqX5Rm6brpujSham/CWks4BVbQvqqki3+Weh1JdyoPfOTjmlj/xXaX97RLXngnjMv0ElgyWtO2UByobjv+lMtJbefcRGNcLZ7RhxMBjXNPJ/BpZzCH2I0F5zmXTiS0CPt583YcBgN5I5ErDowpG9B6wjDkhsfTr9Cp1wa7166+KQ59sy40oACc/eWwcnTx5eZ7gF/Sn9SM3/2wM= X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Jun 2017 20:50:27.7712 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3158 Subject: [dpdk-dev] [PATCH 4/5] test/test: add test cases for gcm and ctr in dpaa2_sec test suite X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Akhil Goyal dpaa2_sec test cases updated for various supported crypto alogorithms. Signed-off-by: Akhil Goyal --- test/test/test_cryptodev.c | 94 ++++++++++++++++++++++++---- test/test/test_cryptodev_aes_test_vectors.h | 78 +++++++++++++++-------- test/test/test_cryptodev_blockcipher.c | 1 + test/test/test_cryptodev_des_test_vectors.h | 24 ++++--- test/test/test_cryptodev_hash_test_vectors.h | 36 +++++++---- 5 files changed, 176 insertions(+), 57 deletions(-) diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c index db0999e..fe6c8dd 100644 --- a/test/test/test_cryptodev.c +++ b/test/test/test_cryptodev.c @@ -1738,6 +1738,22 @@ test_AES_cipheronly_dpaa2_sec_all(void) } static int +test_authonly_dpaa2_sec_all(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + int status; + + status = test_blockcipher_all_tests(ts_params->mbuf_pool, + ts_params->op_mpool, ts_params->valid_devs[0], + RTE_CRYPTODEV_DPAA2_SEC_PMD, + BLKCIPHER_AUTHONLY_TYPE); + + TEST_ASSERT_EQUAL(status, 0, "Test failed"); + + return TEST_SUCCESS; +} + +static int test_authonly_openssl_all(void) { struct crypto_testsuite_params *ts_params = &testsuite_params; @@ -8280,28 +8296,84 @@ static struct unit_test_suite cryptodev_dpaa2_sec_testsuite = { .teardown = testsuite_teardown, .unit_test_cases = { TEST_CASE_ST(ut_setup, ut_teardown, - test_device_configure_invalid_dev_id), + test_device_configure_invalid_dev_id), TEST_CASE_ST(ut_setup, ut_teardown, - test_multi_session), + test_multi_session), TEST_CASE_ST(ut_setup, ut_teardown, - test_AES_chain_dpaa2_sec_all), + test_AES_chain_dpaa2_sec_all), TEST_CASE_ST(ut_setup, ut_teardown, - test_3DES_chain_dpaa2_sec_all), + test_3DES_chain_dpaa2_sec_all), TEST_CASE_ST(ut_setup, ut_teardown, - test_AES_cipheronly_dpaa2_sec_all), + test_AES_cipheronly_dpaa2_sec_all), TEST_CASE_ST(ut_setup, ut_teardown, - test_3DES_cipheronly_dpaa2_sec_all), + test_3DES_cipheronly_dpaa2_sec_all), + TEST_CASE_ST(ut_setup, ut_teardown, + test_authonly_dpaa2_sec_all), - /** HMAC_MD5 Authentication */ + /** AES GCM Authenticated Encryption */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_2), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_3), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_4), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_5), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_6), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_test_case_7), + + /** AES GCM Authenticated Decryption */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_2), TEST_CASE_ST(ut_setup, ut_teardown, - test_MD5_HMAC_generate_case_1), + test_mb_AES_GCM_authenticated_decryption_test_case_3), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_4), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_5), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_6), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_test_case_7), + + /** AES GCM Authenticated Encryption 256 bits key */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_2), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_3), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_4), TEST_CASE_ST(ut_setup, ut_teardown, - test_MD5_HMAC_verify_case_1), + test_mb_AES_GCM_auth_encryption_test_case_256_5), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_6), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_encryption_test_case_256_7), + + /** AES GCM Authenticated Decryption 256 bits key */ TEST_CASE_ST(ut_setup, ut_teardown, - test_MD5_HMAC_generate_case_2), + test_mb_AES_GCM_auth_decryption_test_case_256_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_2), TEST_CASE_ST(ut_setup, ut_teardown, - test_MD5_HMAC_verify_case_2), + test_mb_AES_GCM_auth_decryption_test_case_256_3), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_4), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_5), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_6), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_auth_decryption_test_case_256_7), TEST_CASES_END() /**< NULL terminate unit test array */ } diff --git a/test/test/test_cryptodev_aes_test_vectors.h b/test/test/test_cryptodev_aes_test_vectors.h index 07d6eab..f692d57 100644 --- a/test/test/test_cryptodev_aes_test_vectors.h +++ b/test/test/test_cryptodev_aes_test_vectors.h @@ -1028,7 +1028,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CTR HMAC-SHA1 Decryption Digest " @@ -1038,7 +1039,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CTR XCBC Encryption Digest", @@ -1074,7 +1076,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CTR HMAC-SHA1 Decryption Digest " @@ -1084,7 +1087,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest", @@ -1094,7 +1098,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest " @@ -1124,7 +1129,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Decryption Digest " @@ -1141,7 +1147,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA256 Encryption Digest " @@ -1159,7 +1166,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA256 Decryption Digest " @@ -1175,7 +1183,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA512 Encryption Digest " @@ -1205,7 +1214,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA512 Decryption Digest " @@ -1262,7 +1272,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA224 Decryption Digest " @@ -1272,7 +1283,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA384 Encryption Digest", @@ -1281,7 +1293,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA384 Decryption Digest " @@ -1291,7 +1304,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_MB | BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Encryption Digest " @@ -1322,7 +1336,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC Decryption", @@ -1331,7 +1346,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CBC Encryption", @@ -1340,7 +1356,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CBC Encryption Scater gather", @@ -1357,7 +1374,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CBC Encryption", @@ -1366,7 +1384,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CBC Decryption", @@ -1375,7 +1394,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CBC OOP Encryption", @@ -1400,7 +1420,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CTR Decryption", @@ -1409,7 +1430,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CTR Encryption", @@ -1418,7 +1440,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-192-CTR Decryption", @@ -1427,7 +1450,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CTR Encryption", @@ -1436,7 +1460,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CTR Decryption", @@ -1445,7 +1470,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_QAT | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, }; diff --git a/test/test/test_cryptodev_blockcipher.c b/test/test/test_cryptodev_blockcipher.c index 446ab4f..85fad01 100644 --- a/test/test/test_cryptodev_blockcipher.c +++ b/test/test/test_cryptodev_blockcipher.c @@ -100,6 +100,7 @@ test_blockcipher_one_case(const struct blockcipher_test_case *t, tdata->auth_key.len); switch (cryptodev_type) { + case RTE_CRYPTODEV_DPAA2_SEC_PMD: case RTE_CRYPTODEV_QAT_SYM_PMD: case RTE_CRYPTODEV_OPENSSL_PMD: case RTE_CRYPTODEV_ARMV8_PMD: /* Fall through */ diff --git a/test/test/test_cryptodev_des_test_vectors.h b/test/test/test_cryptodev_des_test_vectors.h index b226794..0b6e0b8 100644 --- a/test/test/test_cryptodev_des_test_vectors.h +++ b/test/test/test_cryptodev_des_test_vectors.h @@ -1058,14 +1058,16 @@ static const struct blockcipher_test_case triple_des_chain_test_cases[] = { .test_data = &triple_des128cbc_hmac_sha1_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC HMAC-SHA1 Decryption Digest Verify", .test_data = &triple_des128cbc_hmac_sha1_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC SHA1 Encryption Digest", @@ -1084,14 +1086,16 @@ static const struct blockcipher_test_case triple_des_chain_test_cases[] = { .test_data = &triple_des192cbc_hmac_sha1_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-192-CBC HMAC-SHA1 Decryption Digest Verify", .test_data = &triple_des192cbc_hmac_sha1_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-192-CBC SHA1 Encryption Digest", @@ -1199,28 +1203,32 @@ static const struct blockcipher_test_case triple_des_cipheronly_test_cases[] = { .test_data = &triple_des128cbc_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC Decryption", .test_data = &triple_des128cbc_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_DECRYPT, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-192-CBC Encryption", .test_data = &triple_des192cbc_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-192-CBC Decryption", .test_data = &triple_des192cbc_test_vector, .op_mask = BLOCKCIPHER_TEST_OP_DECRYPT, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CTR Encryption", diff --git a/test/test/test_cryptodev_hash_test_vectors.h b/test/test/test_cryptodev_hash_test_vectors.h index 3214f9a..24353fc 100644 --- a/test/test/test_cryptodev_hash_test_vectors.h +++ b/test/test/test_cryptodev_hash_test_vectors.h @@ -366,7 +366,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-MD5 Digest Verify", @@ -374,7 +375,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA1 Digest", @@ -394,7 +396,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA1 Digest Verify", @@ -402,7 +405,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA224 Digest", @@ -422,7 +426,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA224 Digest Verify", @@ -430,7 +435,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA256 Digest", @@ -450,7 +456,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA256 Digest Verify", @@ -458,7 +465,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA384 Digest", @@ -478,7 +486,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA384 Digest Verify", @@ -486,7 +495,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "SHA512 Digest", @@ -506,7 +516,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_GEN, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "HMAC-SHA512 Digest Verify", @@ -514,7 +525,8 @@ static const struct blockcipher_test_case hash_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | BLOCKCIPHER_TEST_TARGET_PMD_MB | - BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER + BLOCKCIPHER_TEST_TARGET_PMD_SCHEDULER | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, };