get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/67949/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 67949,
    "url": "https://patches.dpdk.org/api/patches/67949/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20200408031351.4288-14-l.wojciechow@partner.samsung.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20200408031351.4288-14-l.wojciechow@partner.samsung.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20200408031351.4288-14-l.wojciechow@partner.samsung.com",
    "date": "2020-04-08T03:13:51",
    "name": "[v2,13/13] app/test: add rte security capability get tests",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "aa7359994c0a880e8b62202fcd18eafd1942a5c1",
    "submitter": {
        "id": 1628,
        "url": "https://patches.dpdk.org/api/people/1628/?format=api",
        "name": "Lukasz Wojciechowski",
        "email": "l.wojciechow@partner.samsung.com"
    },
    "delegate": {
        "id": 6690,
        "url": "https://patches.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20200408031351.4288-14-l.wojciechow@partner.samsung.com/mbox/",
    "series": [
        {
            "id": 9242,
            "url": "https://patches.dpdk.org/api/series/9242/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=9242",
            "date": "2020-04-08T03:13:38",
            "name": "Fixes and unit tests for librte_security",
            "version": 2,
            "mbox": "https://patches.dpdk.org/series/9242/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/67949/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/67949/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id DD094A0597;\n\tWed,  8 Apr 2020 05:16:58 +0200 (CEST)",
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 9865E1C0D9;\n\tWed,  8 Apr 2020 05:15:09 +0200 (CEST)",
            "from mailout1.w1.samsung.com (mailout1.w1.samsung.com\n [210.118.77.11]) by dpdk.org (Postfix) with ESMTP id D31AF1C026\n for <dev@dpdk.org>; Wed,  8 Apr 2020 05:14:56 +0200 (CEST)",
            "from eucas1p1.samsung.com (unknown [182.198.249.206])\n by mailout1.w1.samsung.com (KnoxPortal) with ESMTP id\n 20200408031456euoutp0113de26ea35889258c621565b49770b7b~DubixVoWz2124521245euoutp01W\n for <dev@dpdk.org>; Wed,  8 Apr 2020 03:14:56 +0000 (GMT)",
            "from eusmges3new.samsung.com (unknown [203.254.199.245]) by\n eucas1p1.samsung.com (KnoxPortal) with ESMTP id\n 20200408031455eucas1p1ebe02820c2085919d0b3bad4ba99ab7c~Dubh92rqO1426114261eucas1p1q\n for <dev@dpdk.org>; Wed,  8 Apr 2020 03:14:55 +0000 (GMT)",
            "from eucas1p1.samsung.com ( [182.198.249.206]) by\n eusmges3new.samsung.com (EUCPMTA) with SMTP id 28.1A.60698.FA14D8E5; Wed,  8\n Apr 2020 04:14:55 +0100 (BST)",
            "from eusmtrp2.samsung.com (unknown [182.198.249.139]) by\n eucas1p2.samsung.com (KnoxPortal) with ESMTPA id\n 20200408031454eucas1p2e09e0ab0a1ffa5c657bcf35d89c40a55~Dubg5qB772966729667eucas1p2C\n for <dev@dpdk.org>; Wed,  8 Apr 2020 03:14:54 +0000 (GMT)",
            "from eusmgms1.samsung.com (unknown [182.198.249.179]) by\n eusmtrp2.samsung.com (KnoxPortal) with ESMTP id\n 20200408031454eusmtrp2db22b48a010d2628efae53a6041cee76~Dubg5IbeZ2369123691eusmtrp2D\n for <dev@dpdk.org>; Wed,  8 Apr 2020 03:14:54 +0000 (GMT)",
            "from eusmtip1.samsung.com ( [203.254.199.221]) by\n eusmgms1.samsung.com (EUCPMTA) with SMTP id C2.DA.08375.EA14D8E5; Wed,  8\n Apr 2020 04:14:54 +0100 (BST)",
            "from localhost.localdomain (unknown [106.210.88.70]) by\n eusmtip1.samsung.com (KnoxPortal) with ESMTPA id\n 20200408031454eusmtip130d412eaa01f25f8013bb105081e5ae5~Dubgc05rK2835528355eusmtip1i\n for <dev@dpdk.org>; Wed,  8 Apr 2020 03:14:54 +0000 (GMT)"
        ],
        "DKIM-Filter": "OpenDKIM Filter v2.11.0 mailout1.w1.samsung.com\n 20200408031456euoutp0113de26ea35889258c621565b49770b7b~DubixVoWz2124521245euoutp01W",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=samsung.com;\n s=mail20170921; t=1586315696;\n bh=DcvIeR6QZN9wf1EeEUt09vUdUeGmniee/KVSPZzFulc=;\n h=From:To:Cc:Subject:Date:In-Reply-To:References:From;\n b=eOx3kixiODBR9zfHDxLIIHk681pH2ItXxcr1fSCmHV+OlxT2cQmGfOaFIgaiDY1zM\n hkbZ6UvavSB/rKl+MwQZqBsCe43DEOMEPwoS7KWS68JgjBOHUIYnUayEk5caXdf7rw\n +EtDLcIxBs2QlemQ7M7wD9PQJr/NPLjvZyPb0fjA=",
        "X-AuditID": "cbfec7f5-a0fff7000001ed1a-39-5e8d41af10cd",
        "From": "Lukasz Wojciechowski <l.wojciechow@partner.samsung.com>",
        "To": "",
        "Cc": "dev@dpdk.org",
        "Date": "Wed,  8 Apr 2020 05:13:51 +0200",
        "Message-Id": "<20200408031351.4288-14-l.wojciechow@partner.samsung.com>",
        "X-Mailer": "git-send-email 2.17.1",
        "In-Reply-To": "<20200408031351.4288-1-l.wojciechow@partner.samsung.com>",
        "X-Brightmail-Tracker": [
            "\n H4sIAAAAAAAAA+NgFjrDIsWRmVeSWpSXmKPExsWy7djPc7rrHXvjDGbdUrZ492k7kwOjx68F\n S1kDGKO4bFJSczLLUov07RK4MuZ/f8tasKKVseL5j0PsDYz/C7oYOTkkBEwkHl96ztjFyMUh\n JLCCUWL3+r3MEE47k8TKiY0sEE4bk8SHJwuYYVrmb7zCDpFYziix4d5tRriqZ38vMYFUsQnY\n ShyZ+ZUVxBYRYJFY+f07C4jNLCAg8fjeM7C4sICnxPYra9hBbBYBVYnPdx6D9fIKuEpMePGf\n FWKbvMTqDQeANnNwcALFd5/lAtklIbCCTeLQrs+MEDUuEi9P9zBB2MISr45vYYewZST+75zP\n BNGwjVHi6u+fjBDOfkaJ670roKqsJQ7/+80GsoFZQFNi/S59iLCjxNT3b8EWSwjwSdx4Kwhx\n P5/EpG3TocK8Eh1tQhDVehJPe6Yywqz9s/YJC4TtIXGqdzYrJHwuM0p8enCbeQKj/CyEZQsY\n GVcxiqeWFuempxYb56WW6xUn5haX5qXrJefnbmIExvHpf8e/7mDc9yfpEKMAB6MSD++DxJ44\n IdbEsuLK3EOMEhzMSiK8Ur2dcUK8KYmVValF+fFFpTmpxYcYpTlYlMR5jRe9jBUSSE8sSc1O\n TS1ILYLJMnFwSjUwKgkoSkUezs04oPul1qdmMtPGF90VeoVme6+JHPBPnmH6uyiQM3HSyjvF\n GfmhB6T7tnydrfdo7mE2wZu6rbX8nsYvrl6SFSid93pulc9Fw/SMCEnvh7Vm9xYalcQuPp8T\n uuH01XuZp/89sF2+w07KXuKJ3Ze3l/NSuqZvE4zZ+Wpq30rz5KaFSizFGYmGWsxFxYkANRZj\n 9d8CAAA=",
            "\n H4sIAAAAAAAAA+NgFlrFLMWRmVeSWpSXmKPExsVy+t/xu7rrHHvjDG73q1i8+7SdyYHR49eC\n pawBjFF6NkX5pSWpChn5xSW2StGGFkZ6hpYWekYmlnqGxuaxVkamSvp2NimpOZllqUX6dgl6\n GfO/v2UtWNHKWPH8xyH2Bsb/BV2MnBwSAiYS8zdeYQexhQSWMkrM7QSyOYDiMhIfLglAlAhL\n /LnWxdbFyAVU0sIkceXKG1aQBJuArcSRmV/BbBEBFomV37+zgNjMAgISj+89A4sLC3hKbL+y\n Bmw+i4CqxOc7j5lAbF4BV4kJL/6zQiyQl1i94QAzyF5OoPjus1wQ59RLHL57mW0CI98CRoZV\n jCKppcW56bnFhnrFibnFpXnpesn5uZsYgeG07djPzTsYL20MPsQowMGoxMP7ILEnTog1say4\n MvcQowQHs5IIr1RvZ5wQb0piZVVqUX58UWlOavEhRlOgmyYyS4km5wNDPa8k3tDU0NzC0tDc\n 2NzYzEJJnLdD4GCMkEB6YklqdmpqQWoRTB8TB6dUAyObQJbtvGU24dN0pdZ+fjIpd/LtGznc\n E04Gd3jGulWECYgob7pj1FMe1u/t63nkVPwJoSOyey9MOZO8/9SuzLm+PvckrrPdSExSa7Wo\n Tlpp13f41r+mmfOjMs/lhGwJfST3OY/9EGuU+47/9aoTDkfFy7+s3yzxYdMVk/9vyn2O8FlH\n BYrv6FFiKc5INNRiLipOBABY4d2GPQIAAA=="
        ],
        "X-CMS-MailID": "20200408031454eucas1p2e09e0ab0a1ffa5c657bcf35d89c40a55",
        "X-Msg-Generator": "CA",
        "Content-Type": "text/plain; charset=\"utf-8\"",
        "X-RootMTR": "20200408031454eucas1p2e09e0ab0a1ffa5c657bcf35d89c40a55",
        "X-EPHeader": "CA",
        "CMS-TYPE": "201P",
        "X-CMS-RootMailID": "20200408031454eucas1p2e09e0ab0a1ffa5c657bcf35d89c40a55",
        "References": "<20200312151654.7218-1-l.wojciechow@partner.samsung.com>\n <20200408031351.4288-1-l.wojciechow@partner.samsung.com>\n <CGME20200408031454eucas1p2e09e0ab0a1ffa5c657bcf35d89c40a55@eucas1p2.samsung.com>",
        "Subject": "[dpdk-dev] [PATCH v2 13/13] app/test: add rte security capability\n\tget tests",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Add unit tests for rte_security_capability_get function.\n\nSigned-off-by: Lukasz Wojciechowski <l.wojciechow@partner.samsung.com>\n---\n app/test/test_security.c | 522 +++++++++++++++++++++++++++++++++++++++\n 1 file changed, 522 insertions(+)",
    "diff": "diff --git a/app/test/test_security.c b/app/test/test_security.c\nindex 9da81fa1d..d5b76a127 100644\n--- a/app/test/test_security.c\n+++ b/app/test/test_security.c\n@@ -1785,6 +1785,497 @@ test_capabilities_get_success(void)\n }\n \n \n+/**\n+ * rte_security_capability_get tests\n+ */\n+\n+/**\n+ * Test execution of rte_security_capability_get with NULL instance\n+ */\n+static int\n+test_capability_get_inv_context(void)\n+{\n+\tstruct rte_security_capability_idx idx;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(NULL, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 0);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get with invalid\n+ * security operations structure (NULL)\n+ */\n+static int\n+test_capability_get_inv_context_ops(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx;\n+\tut_params->ctx.ops = NULL;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 0);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get with empty\n+ * security operations\n+ */\n+static int\n+test_capability_get_inv_context_ops_fun(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx;\n+\tut_params->ctx.ops = &empty_ops;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 0);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get with NULL idx parameter\n+ */\n+static int\n+test_capability_get_inv_idx(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, NULL);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 0);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities_get\n+ * security operation fails\n+ */\n+static int\n+test_capability_get_ops_failure(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx;\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = NULL;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * is empty (contains only RTE_SECURITY_ACTION_TYPE_NONE ending entry)\n+ */\n+static int\n+test_capability_get_empty_table(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx;\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching action\n+ */\n+static int\n+test_capability_get_no_matching_action(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching protocol\n+ */\n+static int\n+test_capability_get_no_matching_protocol(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_MACSEC,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when macsec protocol\n+ * is searched and capabilities table contain proper entry.\n+ * However macsec records search is not supported in rte_security.\n+ */\n+static int\n+test_capability_get_no_support_for_macsec(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_MACSEC,\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_MACSEC,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching ipsec proto field\n+ */\n+static int\n+test_capability_get_ipsec_mismatch_proto(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t\t.ipsec = {\n+\t\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_AH,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching ipsec mode field\n+ */\n+static int\n+test_capability_get_ipsec_mismatch_mode(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t\t.ipsec = {\n+\t\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching ipsec direction field\n+ */\n+static int\n+test_capability_get_ipsec_mismatch_dir(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t\t.ipsec = {\n+\t\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * contains matching ipsec entry\n+ */\n+static int\n+test_capability_get_ipsec_match(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t.ipsec = {\n+\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_IPSEC,\n+\t\t\t.ipsec = {\n+\t\t\t\t.proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP,\n+\t\t\t\t.mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL,\n+\t\t\t\t.direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, &capabilities[1], \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * does not contain entry with matching pdcp domain field\n+ */\n+static int\n+test_capability_get_pdcp_mismatch_domain(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t.pdcp = {\n+\t\t\t.domain = RTE_SECURITY_PDCP_MODE_CONTROL,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t\t.pdcp = {\n+\t\t\t\t.domain = RTE_SECURITY_PDCP_MODE_DATA,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, NULL, \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n+/**\n+ * Test execution of rte_security_capability_get when capabilities table\n+ * contains matching pdcp entry\n+ */\n+static int\n+test_capability_get_pdcp_match(void)\n+{\n+\tstruct security_unittest_params *ut_params = &unittest_params;\n+\tstruct rte_security_capability_idx idx = {\n+\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t.pdcp = {\n+\t\t\t.domain = RTE_SECURITY_PDCP_MODE_CONTROL,\n+\t\t},\n+\t};\n+\tstruct rte_security_capability capabilities[] = {\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO,\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL,\n+\t\t\t.protocol = RTE_SECURITY_PROTOCOL_PDCP,\n+\t\t\t.pdcp = {\n+\t\t\t\t.domain = RTE_SECURITY_PDCP_MODE_CONTROL,\n+\t\t\t},\n+\t\t},\n+\t\t{\n+\t\t\t.action = RTE_SECURITY_ACTION_TYPE_NONE,\n+\t\t},\n+\t};\n+\n+\tmock_capabilities_get_exp.device = NULL;\n+\tmock_capabilities_get_exp.ret = capabilities;\n+\n+\tconst struct rte_security_capability *ret;\n+\tret = rte_security_capability_get(&ut_params->ctx, &idx);\n+\tTEST_ASSERT_MOCK_FUNCTION_CALL_RET(rte_security_capability_get,\n+\t\t\tret, &capabilities[1], \"%p\");\n+\tTEST_ASSERT_MOCK_CALLS(mock_capabilities_get_exp, 1);\n+\n+\treturn TEST_SUCCESS;\n+}\n+\n /**\n  * Declaration of testcases\n  */\n@@ -1897,6 +2388,37 @@ static struct unit_test_suite security_testsuite  = {\n \t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n \t\t\t\ttest_capabilities_get_success),\n \n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_inv_context),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_inv_context_ops),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_inv_context_ops_fun),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_inv_idx),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ops_failure),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_empty_table),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_no_matching_action),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_no_matching_protocol),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_no_support_for_macsec),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ipsec_mismatch_proto),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ipsec_mismatch_mode),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ipsec_mismatch_dir),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_ipsec_match),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_pdcp_mismatch_domain),\n+\t\tTEST_CASE_ST(ut_setup_with_session, ut_teardown,\n+\t\t\t\ttest_capability_get_pdcp_match),\n+\n \t\tTEST_CASES_END() /**< NULL terminate unit test array */\n \t}\n };\n",
    "prefixes": [
        "v2",
        "13/13"
    ]
}