From patchwork Thu Oct 12 13:07:25 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: alok.makhariya@nxp.com X-Patchwork-Id: 30291 X-Patchwork-Delegate: pablo.de.lara.guarch@intel.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 56E091B303; Thu, 12 Oct 2017 15:10:49 +0200 (CEST) Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0079.outbound.protection.outlook.com [104.47.34.79]) by dpdk.org (Postfix) with ESMTP id D79C41B2EA for ; Thu, 12 Oct 2017 15:10:46 +0200 (CEST) Received: from BN6PR03CA0057.namprd03.prod.outlook.com (10.173.137.19) by CY1PR03MB2361.namprd03.prod.outlook.com (10.166.207.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.77.7; Thu, 12 Oct 2017 13:10:44 +0000 Received: from BY2FFO11OLC011.protection.gbl (2a01:111:f400:7c0c::187) by BN6PR03CA0057.outlook.office365.com (2603:10b6:404:4c::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.77.7 via Frontend Transport; Thu, 12 Oct 2017 13:10:44 +0000 Authentication-Results: spf=fail (sender IP is 192.88.158.2) smtp.mailfrom=nxp.com; NXP1.onmicrosoft.com; dkim=none (message not signed) header.d=none;NXP1.onmicrosoft.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.158.2 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.158.2; helo=az84smr01.freescale.net; Received: from az84smr01.freescale.net (192.88.158.2) by BY2FFO11OLC011.mail.protection.outlook.com (10.1.15.22) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.77.10 via Frontend Transport; Thu, 12 Oct 2017 13:10:44 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id v9CDAKSO008029; Thu, 12 Oct 2017 06:10:40 -0700 From: To: CC: , , , Alok Makhariya Date: Thu, 12 Oct 2017 18:37:25 +0530 Message-ID: <20171012130726.4332-5-alok.makhariya@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20171012130726.4332-1-alok.makhariya@nxp.com> References: <20171012130726.4332-1-alok.makhariya@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131522874450803895; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(7966004)(336005)(376002)(346002)(39380400002)(39860400002)(2980300002)(1110001)(1109001)(339900001)(189002)(199003)(86362001)(498600001)(356003)(189998001)(8656003)(16586007)(6666003)(316002)(33646002)(2950100002)(68736007)(2876002)(48376002)(4326008)(50466002)(1076002)(106466001)(54906003)(97736004)(5003940100001)(2351001)(2906002)(69596002)(105606002)(5660300001)(8936002)(104016004)(81166006)(85426001)(53936002)(77096006)(81156014)(305945005)(86152003)(8676002)(36756003)(76176999)(50226002)(6916009)(50986999)(47776003); DIR:OUT; SFP:1101; SCL:1; SRVR:CY1PR03MB2361; H:az84smr01.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BY2FFO11OLC011; 1:+cyAG3GrSLoPiN7f7rDnA6jF6pxx+lzAeu9teN7Lh98ehkC2+KcAq4KVjanLB/kw22BrM7AYYsbGi7E3L9hl+dcvD81ijgDJyH3feoIny20XVnv1hZ3tqW+WIMddto54 MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 1cc5bc45-5d63-4ade-71cf-08d51172a5de X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017052603199)(201703131430075)(201703131517081); SRVR:CY1PR03MB2361; X-Microsoft-Exchange-Diagnostics: 1; CY1PR03MB2361; 3:mNCjFz7Z7v7HZkJrl/FzwDFwegigil62IRLx16zGVxVhfUQ5jzcIJ8hiQ89+B67QrIJ4OxYZ9Y4nUjanW2CDabktwF2s0/+9ig7FgHIjR9Uv2ZiKP/d5SnUTeAucv5HDV+QKDOZdFUyjVmNPYez63LAT71/EpDLXBJqtioh/7ARYrsmQtr99u4s3j9j7Iu+ZNVShrA70nHldt/A61YkwpyKWU13j33HdvxjW2PlCWJVR8yZKa8ofafcbRrnyNrJQ7yboHbPqvgTquw1el/d6JOQRAYKHAmwBrXQNlLwYtl2nq35Wn3Y4F9YBVyW1UHGsOBF3XLBYQaZcV+JXeaRAcu9JeMKWADqMGPSFQRdLBOk=; 25:mAF1kGHVZtPuAFbLE53kJ9diO+JmLDBYKVYmKA9ko/JcU1S3SgF86Idykh7s5C2/sOy5S4duOSeyrJB2YoLjQeiD0y4Mv7FnLJZgFo7tNFLQQss4u3gC89ZrDQTUpGtWA+3qdkIv42IDmNgznlq961RGWxF8FPC3mCFTFE+NRE9HpJyyt5rfeiQxGDrHkrjXQOm2QWJug+cQ4vj7ac4Vu5BUf/0X8MwDLyX2IP3gA+2af7N3gQInAaJta8WTwHKMJ15tGOnAAxssdl0bcUHMMV0GXspnZoJzjWNjtfhLrzLigXpAw0NH3SSBkYxM3hHpgX+f6kYxB7+LAJRHk6+5MQ== X-MS-TrafficTypeDiagnostic: CY1PR03MB2361: X-Microsoft-Exchange-Diagnostics: 1; CY1PR03MB2361; 31:FqAl078Em32OIZQGKSovrDsq3jfaZy92gEEu0KfId9U7kbnad4fxCT8B7TXpPCyrkYnQuhBo+h0au6WrruWKyFgpBBz3jqX8NA+DjhAeZZEBtlth3dwZ4rpl+sVLR9cq514DGwZmHS5fRme0A5lARD56QQMuVHuyAwI4cOyQgFxMUQLiYqkIjvFvRE0PDHEyvQepTZrtZT7qWA71cYOL5fqJxw7o1bpkJxsolDZ1qX0=; 4:mt4pdeWo6TvGd7uxhJqojz1sslaJHlvoWgAVWg8A+2mcvoMuRQWqqEl0sqCmnef5Sw1AkmzweelnemN1+yWum9KP+M35svkOKMWSboio3zbtYlJCJBmWDNc7Y8ZW92ygGeBFm1GtxPOG5TCS8XW9lsf6VhZOg9JFOcRECd3qOmrAjgOchw9pqi1TrrxDupduQyYeUKj5wJycqW8LGzFg0x3LvwSsHf2yJXy8Vbksyw1+zi1U0JEv+oYJTFloalBa3c265yt9zXFElKrMPTOL2IuRAW6HjbP25GzsRZHO5Pk= X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(2401047)(5005006)(8121501046)(3002001)(10201501046)(100000703101)(100105400095)(93006095)(93001095)(6055026)(6096035)(20161123565025)(20161123556025)(20161123559100)(20161123561025)(20161123563025)(201703131430075)(201703131441075)(201703131448075)(201703131433075)(201703161259150)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CY1PR03MB2361; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CY1PR03MB2361; X-Forefront-PRVS: 04583CED1A X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY1PR03MB2361; 23:jm6wViZmMkdu3WiPZbZy5jPJbDYwg5DJYsfGqTx8k?= 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 X-Microsoft-Exchange-Diagnostics: 1; CY1PR03MB2361; 6:1h9ZzfnM63TIWR9lRLpEiTbUOSUcclYvV+7UrwLhCU9HwbSsDZjRzamYioIKPYm7TbuIkmSPPDn5d6bzczGMiSiBJD783duItBbFmbdm3QVZyV4NNOTQuB7MtkM53kyMLZmbGGyO0ahjkaougYI8MS4eZG61CRQKLkgpUJM0FMVfUXMJVsQ1SNSOAUc+63z0JTy3T6MTSJXBVcplKciQF36hsHHDEhm/S0bMdjfMUWj1G+dJztxXkfPtMtNXkopKb2mq8LH71wrsdlxgY9JYOQMwkroNRTOaqQVtPTrlffYPYGQwgnpNv7wAd08C1aeey3ZavTu/HlrwKQNvv94oUQ==; 5:xaytWwd78LXwwhXZcb+hBx8PtO1xZzfudw+yCZUm+80oJr1UA8bKW6RmLO09I+6g18Zes/fG167nf7GSmRtfg+9z/gJM7+PM5OA1wL3tiz897LYBgjLnIVF0ww3ZTFwN+bpcDc48B0zHuy08n0yigA==; 24:QXOaJtcEwZcymJKBSBwPEwBmemIi5JR10bsxjw08uxzj5KCC4w6HR45Up28jr8GY9gfoTImCkmPSj51QcXoLpB1Ua2jjr1betF9nYT6VspE=; 7:nCH5g3Zzr7/yktzVEZpC1FlMyZgRENgyGOIIMTe79geornU9qY/cpJdRynUe8kQ4QkH8qmTb/NTmR0uv3ZfminnB9XD2yazr2rxX/DLmUi89pEa39jz4k3JDDr0+awcHTWgbWkcmSi59n7jZ0CVd5utvsSkfeeGIU6pmof1fU2PpGrAgXv1rZSO8IPjG5kbrIcTmQDrsJB87XZiXnKl0CaH5pKYqzyLGvZygwPY8l8g= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Oct 2017 13:10:44.8463 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.158.2]; Helo=[az84smr01.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR03MB2361 Subject: [dpdk-dev] [PATCH] crypto/dpaa2_sec: add support for out of place buffers X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Alok Makhariya Enable out of place buffer test cases in nxp dpaa2_sec Signed-off-by: Alok Makhariya Acked-by: Akhil Goyal --- drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 42 +++++++++++++++++++++++------ test/test/test_cryptodev.c | 6 +++++ test/test/test_cryptodev_aes_test_vectors.h | 12 ++++++--- test/test/test_cryptodev_des_test_vectors.h | 6 +++-- 4 files changed, 52 insertions(+), 14 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index 62b9203..d466979 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -90,11 +90,17 @@ build_authenc_gcm_fd(dpaa2_sec_session *sess, uint32_t auth_only_len = sess->ext_params.aead_ctxt.auth_only_len; int icv_len = sess->digest_length, retval; uint8_t *old_icv; + struct rte_mbuf *dst; uint8_t *IV_ptr = rte_crypto_op_ctod_offset(op, uint8_t *, sess->iv.offset); PMD_INIT_FUNC_TRACE(); + if (sym_op->m_dst) + dst = sym_op->m_dst; + else + dst = sym_op->m_src; + /* TODO we are using the first FLE entry to store Mbuf and session ctxt. * Currently we donot know which FLE has the mbuf stored. * So while retreiving we can go back 1 FLE from the FD -ADDR @@ -155,9 +161,9 @@ build_authenc_gcm_fd(dpaa2_sec_session *sess, DPAA2_SET_FLE_SG_EXT(fle); /* Configure Output SGE for Encap/Decap */ - DPAA2_SET_FLE_ADDR(sge, DPAA2_MBUF_VADDR_TO_IOVA(sym_op->m_src)); + DPAA2_SET_FLE_ADDR(sge, DPAA2_MBUF_VADDR_TO_IOVA(dst)); DPAA2_SET_FLE_OFFSET(sge, sym_op->aead.data.offset + - sym_op->m_src->data_off - auth_only_len); + dst->data_off - auth_only_len); sge->length = sym_op->aead.data.length + auth_only_len; if (sess->dir == DIR_ENC) { @@ -235,9 +241,15 @@ build_authenc_fd(dpaa2_sec_session *sess, uint8_t *old_icv; uint8_t *iv_ptr = rte_crypto_op_ctod_offset(op, uint8_t *, sess->iv.offset); + struct rte_mbuf *dst; PMD_INIT_FUNC_TRACE(); + if (sym_op->m_dst) + dst = sym_op->m_dst; + else + dst = sym_op->m_src; + /* we are using the first FLE entry to store Mbuf. * Currently we donot know which FLE has the mbuf stored. * So while retreiving we can go back 1 FLE from the FD -ADDR @@ -300,9 +312,9 @@ build_authenc_fd(dpaa2_sec_session *sess, DPAA2_SET_FLE_SG_EXT(fle); /* Configure Output SGE for Encap/Decap */ - DPAA2_SET_FLE_ADDR(sge, DPAA2_MBUF_VADDR_TO_IOVA(sym_op->m_src)); + DPAA2_SET_FLE_ADDR(sge, DPAA2_MBUF_VADDR_TO_IOVA(dst)); DPAA2_SET_FLE_OFFSET(sge, sym_op->cipher.data.offset + - sym_op->m_src->data_off); + dst->data_off); sge->length = sym_op->cipher.data.length; if (sess->dir == DIR_ENC) { @@ -456,9 +468,15 @@ build_cipher_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, struct ctxt_priv *priv = sess->ctxt; uint8_t *iv_ptr = rte_crypto_op_ctod_offset(op, uint8_t *, sess->iv.offset); + struct rte_mbuf *dst; PMD_INIT_FUNC_TRACE(); + if (sym_op->m_dst) + dst = sym_op->m_dst; + else + dst = sym_op->m_src; + retval = rte_mempool_get(priv->fle_pool, (void **)(&fle)); if (retval) { RTE_LOG(ERR, PMD, "Memory alloc failed for SGE\n"); @@ -503,9 +521,9 @@ build_cipher_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, sess->iv.length, sym_op->m_src->data_off); - DPAA2_SET_FLE_ADDR(fle, DPAA2_MBUF_VADDR_TO_IOVA(sym_op->m_src)); + DPAA2_SET_FLE_ADDR(fle, DPAA2_MBUF_VADDR_TO_IOVA(dst)); DPAA2_SET_FLE_OFFSET(fle, sym_op->cipher.data.offset + - sym_op->m_src->data_off); + dst->data_off); fle->length = sym_op->cipher.data.length + sess->iv.length; @@ -657,6 +675,7 @@ sec_fd_to_mbuf(const struct qbman_fd *fd) struct qbman_fle *fle; struct rte_crypto_op *op; struct ctxt_priv *priv; + struct rte_mbuf *dst, *src; fle = (struct qbman_fle *)DPAA2_IOVA_TO_VADDR(DPAA2_GET_FD_ADDR(fd)); @@ -679,10 +698,17 @@ sec_fd_to_mbuf(const struct qbman_fd *fd) DPAA2_GET_FLE_ADDR((fle - 1))); /* Prefeth op */ - rte_prefetch0(op->sym->m_src); + src = op->sym->m_src; + rte_prefetch0(src); + + if (op->sym->m_dst) { + dst = op->sym->m_dst; + rte_prefetch0(dst); + } else + dst = src; PMD_RX_LOG(DEBUG, "mbuf %p BMAN buf addr %p", - (void *)op->sym->m_src, op->sym->m_src->buf_addr); + (void *)dst, dst->buf_addr); PMD_RX_LOG(DEBUG, "fdaddr =%p bpid =%d meta =%d off =%d, len =%d", (void *)DPAA2_GET_FD_ADDR(fd), diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c index df84430..f889ecd 100644 --- a/test/test/test_cryptodev.c +++ b/test/test/test_cryptodev.c @@ -8837,6 +8837,12 @@ static struct unit_test_suite cryptodev_openssl_testsuite = { TEST_CASE_ST(ut_setup, ut_teardown, auth_decryption_AES128CBC_HMAC_SHA1_fail_tag_corrupt), + /** Out of place tests */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_encryption_oop), + TEST_CASE_ST(ut_setup, ut_teardown, + test_mb_AES_GCM_authenticated_decryption_oop), + TEST_CASES_END() /**< NULL terminate unit test array */ } }; diff --git a/test/test/test_cryptodev_aes_test_vectors.h b/test/test/test_cryptodev_aes_test_vectors.h index 0c7e48f..32c5deb 100644 --- a/test/test/test_cryptodev_aes_test_vectors.h +++ b/test/test/test_cryptodev_aes_test_vectors.h @@ -1431,7 +1431,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL + BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Decryption Digest " @@ -1441,7 +1442,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL + BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA224 Encryption Digest", @@ -1591,7 +1593,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT, .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CBC OOP Decryption", @@ -1599,7 +1602,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_DECRYPT, .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CTR Encryption", diff --git a/test/test/test_cryptodev_des_test_vectors.h b/test/test/test_cryptodev_des_test_vectors.h index ebf8869..e4efd23 100644 --- a/test/test/test_cryptodev_des_test_vectors.h +++ b/test/test/test_cryptodev_des_test_vectors.h @@ -1181,7 +1181,8 @@ static const struct blockcipher_test_case triple_des_chain_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN, .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC HMAC-SHA1 Decryption Digest" @@ -1190,7 +1191,8 @@ static const struct blockcipher_test_case triple_des_chain_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC, .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC HMAC-SHA1 Encryption Digest"