From patchwork Fri Apr 12 11:57:22 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akhil Goyal X-Patchwork-Id: 139246 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 261C443E51; Fri, 12 Apr 2024 13:58:00 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 6F50C40DCD; Fri, 12 Apr 2024 13:57:57 +0200 (CEST) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by mails.dpdk.org (Postfix) with ESMTP id 5FE2D40DCD for ; Fri, 12 Apr 2024 13:57:56 +0200 (CEST) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 43C4AwYu011459; Fri, 12 Apr 2024 04:57:50 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; h= from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding:content-type; s= pfpt0220; bh=HjS6aLRNBZHIUPx/zTZDYKXxBfb6enudJonHvj24D/s=; b=KgF 1KWdXGyp75fm/3s26M0cWYMKT5daz5741oXW1C9a0tBmzNV3rPUjOdiqoOE8rQGk ykQOcr6HN/w1fEKI+DtAB0ITrmQa7Z9wTVjkGdugdKw5r8QWaNPLuHVQPkBTEVyS tndKeX38Us7TJTQoarU1ChIYWgfj7/58IBXsAXmziRv2hzusf1r3pFuhjCy4OHl5 kGHrX9zpGLhBpQTrnTYLdvwwPVyj1JcIzaTu+C6gllzNV8U3R3G5GFmo4v0/WYHl GgAOGRyrMxbVBWPWOpWnF0AEnhRhAGo7rfQI4QUB9pfyB0whyiErc31Ua3Absuoq uwK6R42DAH6rUWOFW6Q== Received: from dc6wp-exch02.marvell.com ([4.21.29.225]) by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3xewph1c6a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 12 Apr 2024 04:57:50 -0700 (PDT) Received: from DC6WP-EXCH02.marvell.com (10.76.176.209) by DC6WP-EXCH02.marvell.com (10.76.176.209) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 12 Apr 2024 04:57:49 -0700 Received: from maili.marvell.com (10.69.176.80) by DC6WP-EXCH02.marvell.com (10.76.176.209) with Microsoft SMTP Server id 15.2.1544.4 via Frontend Transport; Fri, 12 Apr 2024 04:57:49 -0700 Received: from localhost.localdomain (unknown [10.28.36.102]) by maili.marvell.com (Postfix) with ESMTP id AB8773F7077; Fri, 12 Apr 2024 04:57:43 -0700 (PDT) From: Akhil Goyal To: CC: , , , , , , , , , , , , , , , , , , Akhil Goyal Subject: [PATCH v2 3/3] test/crypto: add QP depth used count case Date: Fri, 12 Apr 2024 17:27:22 +0530 Message-ID: <20240412115722.3709194-4-gakhil@marvell.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20240412115722.3709194-1-gakhil@marvell.com> References: <20240411082232.3495883-1-gakhil@marvell.com> <20240412115722.3709194-1-gakhil@marvell.com> MIME-Version: 1.0 X-Proofpoint-GUID: Vj37f7lw7SrEiLXSxdCeVwgHSKK-bWcs X-Proofpoint-ORIG-GUID: Vj37f7lw7SrEiLXSxdCeVwgHSKK-bWcs X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-04-12_08,2024-04-09_01,2023-05-22_02 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Added a test case to verify the new API rte_cryptodev_qp_depth_used() to get the used depth of a crypto device queue pair. Signed-off-by: Akhil Goyal --- app/test/test_cryptodev.c | 117 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 117 insertions(+) diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c index 1703ebccf1..f2d249f6b8 100644 --- a/app/test/test_cryptodev.c +++ b/app/test/test_cryptodev.c @@ -2400,6 +2400,121 @@ static const uint8_t ms_hmac_digest2[] = { /* End Session 2 */ +#define MAX_OPS_PROCESSED (MAX_NUM_OPS_INFLIGHT - 1) +static int +test_queue_pair_descriptor_count(void) +{ + struct crypto_testsuite_params *ts_params = &testsuite_params; + struct crypto_unittest_params *ut_params = &unittest_params; + struct rte_crypto_op *ops_deq[MAX_OPS_PROCESSED] = { NULL }; + struct rte_crypto_op *ops[MAX_OPS_PROCESSED] = { NULL }; + struct rte_cryptodev_sym_capability_idx cap_idx; + int qp_depth = 0; + int i; + + RTE_VERIFY(gbl_action_type != RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO); + + /* Verify if the queue pair depth API is supported by driver */ + qp_depth = rte_cryptodev_qp_depth_used(ts_params->valid_devs[0], 0); + if (qp_depth == -ENOTSUP) + return TEST_SKIPPED; + + /* Verify the capabilities */ + cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH; + cap_idx.algo.auth = RTE_CRYPTO_AUTH_SHA1_HMAC; + if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0], &cap_idx) == NULL) + return TEST_SKIPPED; + + cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER; + cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_CBC; + if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0], &cap_idx) == NULL) + return TEST_SKIPPED; + + /* Setup Cipher Parameters */ + ut_params->cipher_xform.type = RTE_CRYPTO_SYM_XFORM_CIPHER; + ut_params->cipher_xform.next = &ut_params->auth_xform; + ut_params->cipher_xform.cipher.algo = RTE_CRYPTO_CIPHER_AES_CBC; + ut_params->cipher_xform.cipher.op = RTE_CRYPTO_CIPHER_OP_ENCRYPT; + ut_params->cipher_xform.cipher.key.data = aes_cbc_key; + ut_params->cipher_xform.cipher.key.length = CIPHER_KEY_LENGTH_AES_CBC; + ut_params->cipher_xform.cipher.iv.offset = IV_OFFSET; + ut_params->cipher_xform.cipher.iv.length = CIPHER_IV_LENGTH_AES_CBC; + + /* Setup HMAC Parameters */ + ut_params->auth_xform.type = RTE_CRYPTO_SYM_XFORM_AUTH; + ut_params->auth_xform.next = NULL; + ut_params->auth_xform.auth.op = RTE_CRYPTO_AUTH_OP_GENERATE; + ut_params->auth_xform.auth.algo = RTE_CRYPTO_AUTH_SHA1_HMAC; + ut_params->auth_xform.auth.key.length = HMAC_KEY_LENGTH_SHA1; + ut_params->auth_xform.auth.key.data = hmac_sha1_key; + ut_params->auth_xform.auth.digest_length = DIGEST_BYTE_LENGTH_SHA1; + + rte_errno = 0; + ut_params->sess = rte_cryptodev_sym_session_create(ts_params->valid_devs[0], + &ut_params->cipher_xform, ts_params->session_mpool); + if (rte_errno == ENOTSUP) + return TEST_SKIPPED; + + TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed"); + + TEST_ASSERT_EQUAL(rte_crypto_op_bulk_alloc(ts_params->op_mpool, + RTE_CRYPTO_OP_TYPE_SYMMETRIC, ops, MAX_OPS_PROCESSED), + MAX_OPS_PROCESSED, "failed to generate burst of crypto ops"); + + /* Generate crypto op data structure */ + for (i = 0; i < MAX_OPS_PROCESSED; i++) { + struct rte_mbuf *m; + uint8_t *digest; + + /* Generate test mbuf data and space for digest */ + m = setup_test_string(ts_params->mbuf_pool, catch_22_quote, QUOTE_512_BYTES, 0); + TEST_ASSERT_NOT_NULL(m, "Failed to allocate mbuf"); + + digest = (uint8_t *)rte_pktmbuf_append(m, DIGEST_BYTE_LENGTH_SHA1); + TEST_ASSERT_NOT_NULL(digest, "no room to append digest"); + + rte_crypto_op_attach_sym_session(ops[i], ut_params->sess); + + /* set crypto operation source mbuf */ + ops[i]->sym->m_src = m; + + /* Set crypto operation authentication parameters */ + ops[i]->sym->auth.digest.data = digest; + ops[i]->sym->auth.digest.phys_addr = rte_pktmbuf_iova_offset(m, QUOTE_512_BYTES); + + ops[i]->sym->auth.data.offset = 0; + ops[i]->sym->auth.data.length = QUOTE_512_BYTES; + + /* Copy IV at the end of the crypto operation */ + memcpy(rte_crypto_op_ctod_offset(ops[i], uint8_t *, IV_OFFSET), aes_cbc_iv, + CIPHER_IV_LENGTH_AES_CBC); + + /* Set crypto operation cipher parameters */ + ops[i]->sym->cipher.data.offset = 0; + ops[i]->sym->cipher.data.length = QUOTE_512_BYTES; + + TEST_ASSERT_EQUAL(rte_cryptodev_enqueue_burst(ts_params->valid_devs[0], 0, + &ops[i], 1), 1, "Error enqueuing"); + } + + for (i = 0; i < MAX_OPS_PROCESSED; i++) { + qp_depth = rte_cryptodev_qp_depth_used(ts_params->valid_devs[0], 0); + TEST_ASSERT_EQUAL(qp_depth, MAX_OPS_PROCESSED - i, + "Crypto queue pair depth used does not match with inflight ops"); + + while (rte_cryptodev_dequeue_burst(ts_params->valid_devs[0], 0, + &ops_deq[i], 1) == 0) + rte_pause(); + + TEST_ASSERT_EQUAL(ops_deq[i]->status, RTE_CRYPTO_OP_STATUS_SUCCESS, + "crypto op processing failed"); + + rte_pktmbuf_free(ops_deq[i]->sym->m_src); + rte_crypto_op_free(ops_deq[i]); + } + + return TEST_SUCCESS; +} static int test_AES_CBC_HMAC_SHA1_encrypt_digest(void) @@ -18068,6 +18183,8 @@ static struct unit_test_suite cryptodev_gen_testsuite = { test_queue_pair_descriptor_setup), TEST_CASE_ST(ut_setup, ut_teardown, test_device_configure_invalid_queue_pair_ids), + TEST_CASE_ST(ut_setup, ut_teardown, + test_queue_pair_descriptor_count), TEST_CASE_ST(ut_setup, ut_teardown, test_stats), TEST_CASE_ST(ut_setup, ut_teardown, test_enq_callback_setup), TEST_CASE_ST(ut_setup, ut_teardown, test_deq_callback_setup),