From patchwork Thu Apr 11 08:22:32 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akhil Goyal X-Patchwork-Id: 139225 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 27EC743E42; Thu, 11 Apr 2024 10:23:12 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 76A3140697; Thu, 11 Apr 2024 10:23:07 +0200 (CEST) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by mails.dpdk.org (Postfix) with ESMTP id 1E17140684 for ; Thu, 11 Apr 2024 10:23:05 +0200 (CEST) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 43B5uIeS031859; Thu, 11 Apr 2024 01:23:00 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; h= from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding:content-type; s= pfpt0220; bh=HjS6aLRNBZHIUPx/zTZDYKXxBfb6enudJonHvj24D/s=; b=kbj tmUj6AMh+6vXlze4bDvPuLwbxFr6gveSVnA64GQzwye5N6k0eP1A2AYQrFromXCn Ubz51FTXmitP8FksuNvAwOVlIjgWneW3F0IdQlBp2VnmpSdxlNo4nbDzefnKGw3T c4of0gHYgddYdGFxEjQ/92haznio97o+m8ly/5raoCWU6M8YEoYN25EVMsGCPucD thQMwDupeyH6nrRUaaPt6lfVZox+vmI+9VjlrCpXRChrpDvnZkNNTCltk0rUIDth TR8jVJqTxl2LJ6772gfqD8kAHJyun8oUT6n3MaplCbTKY7udqcy0Xz7OZvayzCB9 JvOCVw3LWHoOxNWn23Q== Received: from dc5-exch05.marvell.com ([199.233.59.128]) by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3xea5f1g0k-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 11 Apr 2024 01:23:00 -0700 (PDT) Received: from DC5-EXCH05.marvell.com (10.69.176.209) by DC5-EXCH05.marvell.com (10.69.176.209) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Thu, 11 Apr 2024 01:22:59 -0700 Received: from maili.marvell.com (10.69.176.80) by DC5-EXCH05.marvell.com (10.69.176.209) with Microsoft SMTP Server id 15.2.1544.4 via Frontend Transport; Thu, 11 Apr 2024 01:22:59 -0700 Received: from localhost.localdomain (unknown [10.28.36.102]) by maili.marvell.com (Postfix) with ESMTP id 9F8113F706A; Thu, 11 Apr 2024 01:22:53 -0700 (PDT) From: Akhil Goyal To: CC: , , , , , , , , , , , , , , , , , , Akhil Goyal Subject: [PATCH 3/3] test/crypto: add QP depth used count case Date: Thu, 11 Apr 2024 13:52:32 +0530 Message-ID: <20240411082232.3495883-4-gakhil@marvell.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20240411082232.3495883-1-gakhil@marvell.com> References: <20240411082232.3495883-1-gakhil@marvell.com> MIME-Version: 1.0 X-Proofpoint-GUID: 8Q2rEa-XWcU7oxApQRdIKGFESoFydUl5 X-Proofpoint-ORIG-GUID: 8Q2rEa-XWcU7oxApQRdIKGFESoFydUl5 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-04-11_02,2024-04-09_01,2023-05-22_02 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Added a test case to verify the new API rte_cryptodev_qp_depth_used() to get the used depth of a crypto device queue pair. Signed-off-by: Akhil Goyal --- app/test/test_cryptodev.c | 117 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 117 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 1703ebccf1..f2d249f6b8 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -2400,6 +2400,121 @@ static const uint8_t ms_hmac_digest2[] = { /* End Session 2 */ +#define MAX_OPS_PROCESSED (MAX_NUM_OPS_INFLIGHT - 1) +static int +test_queue_pair_descriptor_count(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + struct crypto_unittest_params *ut_params = &unittest_params; + struct rte_crypto_op *ops_deq[MAX_OPS_PROCESSED] = { NULL }; + struct rte_crypto_op *ops[MAX_OPS_PROCESSED] = { NULL }; + struct rte_cryptodev_sym_capability_idx cap_idx; + int qp_depth = 0; + int i; + + RTE_VERIFY(gbl_action_type != RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO); + + /* Verify if the queue pair depth API is supported by driver */ + qp_depth = rte_cryptodev_qp_depth_used(ts_params->valid_devs[0], 0); + if (qp_depth == -ENOTSUP) + return TEST_SKIPPED; + + /* Verify the capabilities */ + cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH; + cap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA1_HMAC; + if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0], &cap_idx) == NULL) + return TEST_SKIPPED; + + cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER; + cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_CBC; + if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0], &cap_idx) == NULL) + return TEST_SKIPPED; + + /* Setup Cipher Parameters */ + ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER; + ut_params->cipher_xform.next = &ut_params->auth_xform; + ut_params->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_AES_CBC; + ut_params->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT; + ut_params->cipher_xform.cipher.key.data = aes_cbc_key; + ut_params->cipher_xform.cipher.key.length = CIPHER_KEY_LENGTH_AES_CBC; + ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET; + ut_params->cipher_xform.cipher.iv.length = CIPHER_IV_LENGTH_AES_CBC; + + /* Setup HMAC Parameters */ + ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH; + ut_params->auth_xform.next = NULL; + ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE; + ut_params->auth_xform.auth.algo = RTE_CRYPTO_AUTH_SHA1_HMAC; + ut_params->auth_xform.auth.key.length = HMAC_KEY_LENGTH_SHA1; + ut_params->auth_xform.auth.key.data = hmac_sha1_key; + ut_params->auth_xform.auth.digest_length = DIGEST_BYTE_LENGTH_SHA1; + + rte_errno = 0; + ut_params->sess = rte_cryptodev_sym_session_create(ts_params->valid_devs[0], + &ut_params->cipher_xform, ts_params->session_mpool); + if (rte_errno == ENOTSUP) + return TEST_SKIPPED; + + TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed"); + + TEST_ASSERT_EQUAL(rte_crypto_op_bulk_alloc(ts_params->op_mpool, + RTE_CRYPTO_OP_TYPE_SYMMETRIC, ops, MAX_OPS_PROCESSED), + MAX_OPS_PROCESSED, "failed to generate burst of crypto ops"); + + /* Generate crypto op data structure */ + for (i = 0; i < MAX_OPS_PROCESSED; i++) { + struct rte_mbuf *m; + uint8_t *digest; + + /* Generate test mbuf data and space for digest */ + m = setup_test_string(ts_params->mbuf_pool, catch_22_quote, QUOTE_512_BYTES, 0); + TEST_ASSERT_NOT_NULL(m, "Failed to allocate mbuf"); + + digest = (uint8_t *)rte_pktmbuf_append(m, DIGEST_BYTE_LENGTH_SHA1); + TEST_ASSERT_NOT_NULL(digest, "no room to append digest"); + + rte_crypto_op_attach_sym_session(ops[i], ut_params->sess); + + /* set crypto operation source mbuf */ + ops[i]->sym->m_src = m; + + /* Set crypto operation authentication parameters */ + ops[i]->sym->auth.digest.data = digest; + ops[i]->sym->auth.digest.phys_addr = rte_pktmbuf_iova_offset(m, QUOTE_512_BYTES); + + ops[i]->sym->auth.data.offset = 0; + ops[i]->sym->auth.data.length = QUOTE_512_BYTES; + + /* Copy IV at the end of the crypto operation */ + memcpy(rte_crypto_op_ctod_offset(ops[i], uint8_t *, IV_OFFSET), aes_cbc_iv, + CIPHER_IV_LENGTH_AES_CBC); + + /* Set crypto operation cipher parameters */ + ops[i]->sym->cipher.data.offset = 0; + ops[i]->sym->cipher.data.length = QUOTE_512_BYTES; + + TEST_ASSERT_EQUAL(rte_cryptodev_enqueue_burst(ts_params->valid_devs[0], 0, + &ops[i], 1), 1, "Error enqueuing"); + } + + for (i = 0; i < MAX_OPS_PROCESSED; i++) { + qp_depth = rte_cryptodev_qp_depth_used(ts_params->valid_devs[0], 0); + TEST_ASSERT_EQUAL(qp_depth, MAX_OPS_PROCESSED - i, + "Crypto queue pair depth used does not match with inflight ops"); + + while (rte_cryptodev_dequeue_burst(ts_params->valid_devs[0], 0, + &ops_deq[i], 1) == 0) + rte_pause(); + + TEST_ASSERT_EQUAL(ops_deq[i]->status, RTE_CRYPTO_OP_STATUS_SUCCESS, + "crypto op processing failed"); + + rte_pktmbuf_free(ops_deq[i]->sym->m_src); + rte_crypto_op_free(ops_deq[i]); + } + + return TEST_SUCCESS; +} static int test_AES_CBC_HMAC_SHA1_encrypt_digest(void) @@ -18068,6 +18183,8 @@ static struct unit_test_suite cryptodev_gen_testsuite = { test_queue_pair_descriptor_setup), TEST_CASE_ST(ut_setup, ut_teardown, test_device_configure_invalid_queue_pair_ids), + TEST_CASE_ST(ut_setup, ut_teardown, + test_queue_pair_descriptor_count), TEST_CASE_ST(ut_setup, ut_teardown, test_stats), TEST_CASE_ST(ut_setup, ut_teardown, test_enq_callback_setup), TEST_CASE_ST(ut_setup, ut_teardown, test_deq_callback_setup),