From patchwork Sun Oct 22 19:35:50 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: alok.makhariya@nxp.com X-Patchwork-Id: 30679 X-Patchwork-Delegate: pablo.de.lara.guarch@intel.com Return-Path: X-Original-To: patchwork@dpdk.org Delivered-To: patchwork@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 8EF251B34D; Sun, 22 Oct 2017 21:38:45 +0200 (CEST) Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0042.outbound.protection.outlook.com [104.47.34.42]) by dpdk.org (Postfix) with ESMTP id 293B01B33F for ; Sun, 22 Oct 2017 21:38:44 +0200 (CEST) Received: from BLUPR0301CA0038.namprd03.prod.outlook.com (10.162.113.176) by DM5PR03MB2700.namprd03.prod.outlook.com (10.168.197.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.156.4; Sun, 22 Oct 2017 19:38:42 +0000 Received: from BN1AFFO11FD031.protection.gbl (2a01:111:f400:7c10::110) by BLUPR0301CA0038.outlook.office365.com (2a01:111:e400:5259::48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.156.4 via Frontend Transport; Sun, 22 Oct 2017 19:38:42 +0000 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; NXP1.onmicrosoft.com; dkim=none (message not signed) header.d=none;NXP1.onmicrosoft.com; dmarc=fail action=none header.from=nxp.com; Received-SPF: Fail (protection.outlook.com: domain of nxp.com does not designate 192.88.168.50 as permitted sender) receiver=protection.outlook.com; client-ip=192.88.168.50; helo=tx30smr01.am.freescale.net; Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1AFFO11FD031.mail.protection.outlook.com (10.58.52.185) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.156.4 via Frontend Transport; Sun, 22 Oct 2017 19:38:41 +0000 Received: from netperf2.ap.freescale.net ([10.232.133.164]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id v9MJccO9027128; Sun, 22 Oct 2017 12:38:39 -0700 From: To: CC: , , Alok Makhariya Date: Mon, 23 Oct 2017 01:05:50 +0530 Message-ID: <20171022193551.953-1-alok.makhariya@nxp.com> X-Mailer: git-send-email 2.9.3 In-Reply-To: <20171012130726.4332-5-alok.makhariya@nxp.com> References: <20171012130726.4332-5-alok.makhariya@nxp.com> X-EOPAttributedMessage: 0 X-Matching-Connectors: 131531747221154664; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Forefront-Antispam-Report: CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(336005)(39380400002)(376002)(346002)(39860400002)(2980300002)(1110001)(1109001)(339900001)(189002)(199003)(104016004)(50226002)(498600001)(4326008)(68736007)(2950100002)(5660300001)(48376002)(86152003)(189998001)(50466002)(36756003)(5003940100001)(8656005)(8656005)(1076002)(2876002)(6916009)(6666003)(33646002)(106466001)(2351001)(53936002)(105606002)(8676002)(81156014)(81166006)(77096006)(356003)(8936002)(2906002)(97736004)(316002)(305945005)(16586007)(86362001)(54906003)(85426001)(47776003)(50986999)(76176999); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR03MB2700; H:tx30smr01.am.freescale.net; FPR:; SPF:Fail; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; BN1AFFO11FD031; 1:rUIYKfRIAsUGR1wEVE2OB3u1XgT/T2JrCt7DxQWDenmLzIhFhOjC2tImFtqerbiT+69yfuVBv2TtpyWXkKNL9m2vFjmavVapUBcxqugaQNa8ayworKiTMx8nvEeNzXjj MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 58e1e758-5a2f-482b-ab68-08d519848044 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(4534020)(4628075)(201703131517081)(2017052603199); SRVR:DM5PR03MB2700; X-Microsoft-Exchange-Diagnostics: 1; DM5PR03MB2700; 3:buqM79ooaebiXKfiW70v5CM7Le3n6+0A6ZkBafUV7ZezV1Urx1VsdXTo0MBSeV3RVKzasOmi05+EoNSDjvoMiP9zU4S30f/LgeKnKaLr8jEqc5Dq0WVI7QmX7l36cftiTmdaGm9m6h6EnY1g1NNa4gTvSL3F5mLYlZhXQ+v2aLvSHGnbKKgmPya0gqik1Zv1ohrZ+ciOTDSNmRyV6mbuhz4L2agTjqEJ0rinfLA5UUP+JF3OuWfsj0uItlslVtzwhDcDkKxdSXiYtt21sBLFRd/42KGS2GnNd9dBxQ7sJ4itdE8xB3UhEjAa/JIGuO+it9oluTzXJgvOCe0MtbQ7eQouC9wh67D2UADMAEZBcIY=; 25:J9bnahc78cfhy+oaEnBADl6Z4CgYLlCxr8pgJSUExe9+eZ1Z9/m4KGMAc1Gbvx3gDFEkxO9Tpc9UZjYUsSpJ1RGJ2M9UfgGD/YvGYe6WusU3k69pAF4PRqLBYMDZ8jITlKsShmm5Z/QqL6Ky8A4EhrwEQ6qbNdiogT6dYJz1GA+P1R5B9ejZy/enkW6IlQkhsc54CA4NgunQCZb/+UHHScEQmedkGUNt00fqoOxgX1tOlkJgfBURKWNdmIx5nAdieMJOyBIXhWsQtIpDaCR2cQ6M9T/LVocnEAsgTfAzwm13uOsvO3b5nfaRDbQIgsAihfVKQUuauQ5OFEN6Svhyhw== X-MS-TrafficTypeDiagnostic: DM5PR03MB2700: X-Microsoft-Exchange-Diagnostics: 1; DM5PR03MB2700; 31:23RgtEGh9EhAw1nYxyflMfXszT7hpyt2F77Bw4XBMMcgLpHfM8F+uDNR2CmP2SD183L5rmf3c6R5LQZUp99oYmLU4h5Y6BaKmjFKyqUaeUrkGr8VMdarmsTSXG8VEBcSO2iAVJRwdtC1aYTI3CIWTgv2CC0ripGXcWLf2WthZp2KJKIT++vfyWIu4kVb51JcFofA72Gm/Qv0rt2/b5EXx5O91atnSHhFAjQdMntDSR8=; 4:okYgNzTdXQvxOciXNQpQcwkt4AJdBpzSXnG23V+MkS/cCxxxXYIID495FjF4HAv1uXwk4yYL8FVrFMFYrY9uAcpZvp7hy3Ke8z5gaMqmi8FhWJ2/Oc7/iTFnKd4141q3G1X/DODKjWuauUXWCpVxGQ8V8cbZ/s1wwtpOQLhSpiMYWmDfatdlydzZu3u7xMdT7V1wcm6dMiguPkbpOQHwX0PWx9zHdBl9GWAhqlb2mT+2OezC4UzYbodWJyAX2rQ6qpnz6ju50vB2G5WYRGfTx0cBia+GWkF7ykN5flteGok= X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(2401047)(5005006)(8121501046)(93006095)(93001095)(100000703101)(100105400095)(3002001)(10201501046)(3231020)(6055026)(6096035)(201703131430075)(201703131433075)(201703131448075)(201703161259150)(201703151042153)(20161123559100)(20161123563025)(20161123561025)(20161123565025)(20161123556025)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM5PR03MB2700; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM5PR03MB2700; X-Forefront-PRVS: 0468FE4A2B X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DM5PR03MB2700; 23:CZUIm3IuL63zhmmBjVs2fgTWkZAv4u2YmHRb3r8QN?= aQKQnyLnNwyt1ukjvFwBC3gAgONPfZ1U3Fm0t6XfphH7yh29NyoIi48BxB/xZFOXpYkQdQNMbatkYBvdhCH4qSy6LRfkZ3o357KPRRJb7JZMPuCfoOQoCo6hbyIvBHAmukNgmCi9ewu5dNZjjdExBmI6me2tVHXktuREpQj1ne9kx/WFLFWdzlA8sjxsxra6PHaZBp29aUViFN3Rkq2QNF7QfkMxok9NrBY/Vyrem2HkKiQMp5MD0os1fHUG2IgZBMHFMgt0p1nrivjXZ5xhiF8dILjvo4fEKZFlEKX7zJCt7BhlA4cZtPI+c3a8DEjxyNa4z88xkS5dzW3EHqQZXHHYcRYikx9Censy7r2/euqjyzLYO6voOws4XUCTrfD2z1UzeDfLaxaUfntXy1fa0MYEmP1z89qpocM2gzhLtZYEgIA6vQmRgEnpog0l+S4/BQddeJfzZyxKFMnGmbNP/sQtx//mILj9CMjQjQO0ZrKLrKvt2cR7omeMvPVGgkrukIE1cLXgWeK+BwmFLRt5ueIGF6L2Pj8YMr2I7UhpOC9tJOGoc3f/7MsDReA1KlBpmcZ0sirchphKMZQCrv/CQyzCMOPWyX16S3Wum1ZYwFLUqxmMjVtbuDSWJdADEtZQSjZJtyFHB1P2s9i9R0aRrUVKvbL/e+dc1lJUyhEhfOOdyqvtmB+btP15k9Se3dO9NhUMQA4DqOQLv/2LmoPXCefER1eyqVHvAU2XsaHZrHhVUCX4SGsMGTMW5D0hkzv+B7V8Wc2f7Tj+fvIKdljPCw4lxkl6Re7dNooH5T+SiH13JJv/Y+fQF+Y9eKvETG2QHcjQzAZbM0VHpC2DCdovbI3PzNRs9vGeKUA63CpJdYhoGRejVKPLI35KaG/B2jDbhcIriQUdH5iMzcXY6qmgHY3JVpiy0VGVQcHo2WauoHR05NbYCKdjHVcRZL8NfFZ5XKmYsMu22xvYpMF8PYRsJErlswsX2einpwvp3jj7GmyQdk9ZA3igV/Xu2le8WkeCfUvsI+aQPtPKwqmVsx9EVLnnJqi0eFMD3S9kv9fmbw9dWl/q9Bk+K4cAczMSZjvCPF7I47d5IUCUcZ6pkz0kP5KhfOWBNMdJeM/Yshaez1IQEOb6DhnXCuufeimhnoF2/L0B1sj/lB0umMWGjQ5oZelaPOOnelR36rv6u0+kI/IUfkUVDIqoQQo+jGaw25jMWc= X-Microsoft-Exchange-Diagnostics: 1; DM5PR03MB2700; 6:8QfzNehPvMpSbKxZ7gpPZ1fbHf6696xIfYqIuV7Z7hfswjBpifDMs2qMwDY7k9LkbcORp4NwNSV/RQtbz5iJ0XLtnii3EWxH1yUQwhT85/qbnPpJz51bTQco/M2/67pG54TIyiq4lCl1o/XdsAfYRMlwWatnvPkThvAHLh+FnHOGm5shvqp9VsvTquAuMgCNIhgZIrZpVaTEd8tPEF+dRTNg1csbAcX5aMZTty1bbircbC2ecpT/MelrYg0ymTWswcMFwIcnolTJB085DzVxNCqCBLOeMoL6I3GR9RUKFSjJfDhEE4/syeoUE1Rl0hoo3o+R65zZf+f7hx13VG5fgw==; 5:mWcFPZ2FNrR/PzwYFDDEo7lfh2iXBNayx9Gt1U8MY5wpdxHMfg54cavO/ca0h3zUg1SGhNs3W4gZfB4JWPCqLknYM9JPwyP2nNAAr0/Fr4mIzo4/hHh5tSueGw8EoNrFFXuK8QABMs8mPo5huvl4Rw==; 24:lcimOppgPDg7EHiVAJi1m4HRUW4CKAobrXTl39x4RsO7ov+LRXZaZXoBB2kfAB9U+F/N52cMHwUpqU3oE8P/ZTlzd/yQ7HpBUi5PsYOzmYQ=; 7:pcisnVMni2iRdUAbXU9yNeiG/qzSiym2tgQMV+z2CE4vqO9qAOsm6m8dgjxUfGjmB+BSBM0ff+sI+mJynsslzKk7PVptxBL5GgVu5kaBvhjhzjZgjFWEOyaMrp+XnK7r6fMl4AQT2b7va6QoUzVE3bMuMSGidZSmHUabI/4pMuETWp2RhZ5zOTTobi6n8YPd94+3UCwmDsEgOmUy0aiM+td7SO5M47+7NWag+ZuTs2A= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Oct 2017 19:38:41.9438 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 58e1e758-5a2f-482b-ab68-08d519848044 X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2700 Subject: [dpdk-dev] [PATCH v2 1/2] crypto/dpaa2_sec: add support for out of place buffers X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" From: Alok Makhariya Enable out of place buffer test cases in nxp dpaa2_sec Signed-off-by: Alok Makhariya Acked-by: Akhil Goyal --- changes in v2: corrected compilation issues in test drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 42 +++++++++++++++++++++++------ test/test/test_cryptodev.c | 6 +++++ test/test/test_cryptodev_aes_test_vectors.h | 12 ++++++--- test/test/test_cryptodev_des_test_vectors.h | 6 +++-- 4 files changed, 52 insertions(+), 14 deletions(-) diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c index 0a466ba..c67548e 100644 --- a/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c +++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c @@ -90,11 +90,17 @@ build_authenc_gcm_fd(dpaa2_sec_session *sess, uint32_t auth_only_len = sess->ext_params.aead_ctxt.auth_only_len; int icv_len = sess->digest_length, retval; uint8_t *old_icv; + struct rte_mbuf *dst; uint8_t *IV_ptr = rte_crypto_op_ctod_offset(op, uint8_t *, sess->iv.offset); PMD_INIT_FUNC_TRACE(); + if (sym_op->m_dst) + dst = sym_op->m_dst; + else + dst = sym_op->m_src; + /* TODO we are using the first FLE entry to store Mbuf and session ctxt. * Currently we donot know which FLE has the mbuf stored. * So while retreiving we can go back 1 FLE from the FD -ADDR @@ -155,9 +161,9 @@ build_authenc_gcm_fd(dpaa2_sec_session *sess, DPAA2_SET_FLE_SG_EXT(fle); /* Configure Output SGE for Encap/Decap */ - DPAA2_SET_FLE_ADDR(sge, DPAA2_MBUF_VADDR_TO_IOVA(sym_op->m_src)); + DPAA2_SET_FLE_ADDR(sge, DPAA2_MBUF_VADDR_TO_IOVA(dst)); DPAA2_SET_FLE_OFFSET(sge, sym_op->aead.data.offset + - sym_op->m_src->data_off - auth_only_len); + dst->data_off - auth_only_len); sge->length = sym_op->aead.data.length + auth_only_len; if (sess->dir == DIR_ENC) { @@ -235,9 +241,15 @@ build_authenc_fd(dpaa2_sec_session *sess, uint8_t *old_icv; uint8_t *iv_ptr = rte_crypto_op_ctod_offset(op, uint8_t *, sess->iv.offset); + struct rte_mbuf *dst; PMD_INIT_FUNC_TRACE(); + if (sym_op->m_dst) + dst = sym_op->m_dst; + else + dst = sym_op->m_src; + /* we are using the first FLE entry to store Mbuf. * Currently we donot know which FLE has the mbuf stored. * So while retreiving we can go back 1 FLE from the FD -ADDR @@ -300,9 +312,9 @@ build_authenc_fd(dpaa2_sec_session *sess, DPAA2_SET_FLE_SG_EXT(fle); /* Configure Output SGE for Encap/Decap */ - DPAA2_SET_FLE_ADDR(sge, DPAA2_MBUF_VADDR_TO_IOVA(sym_op->m_src)); + DPAA2_SET_FLE_ADDR(sge, DPAA2_MBUF_VADDR_TO_IOVA(dst)); DPAA2_SET_FLE_OFFSET(sge, sym_op->cipher.data.offset + - sym_op->m_src->data_off); + dst->data_off); sge->length = sym_op->cipher.data.length; if (sess->dir == DIR_ENC) { @@ -456,9 +468,15 @@ build_cipher_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, struct ctxt_priv *priv = sess->ctxt; uint8_t *iv_ptr = rte_crypto_op_ctod_offset(op, uint8_t *, sess->iv.offset); + struct rte_mbuf *dst; PMD_INIT_FUNC_TRACE(); + if (sym_op->m_dst) + dst = sym_op->m_dst; + else + dst = sym_op->m_src; + retval = rte_mempool_get(priv->fle_pool, (void **)(&fle)); if (retval) { RTE_LOG(ERR, PMD, "Memory alloc failed for SGE\n"); @@ -503,9 +521,9 @@ build_cipher_fd(dpaa2_sec_session *sess, struct rte_crypto_op *op, sess->iv.length, sym_op->m_src->data_off); - DPAA2_SET_FLE_ADDR(fle, DPAA2_MBUF_VADDR_TO_IOVA(sym_op->m_src)); + DPAA2_SET_FLE_ADDR(fle, DPAA2_MBUF_VADDR_TO_IOVA(dst)); DPAA2_SET_FLE_OFFSET(fle, sym_op->cipher.data.offset + - sym_op->m_src->data_off); + dst->data_off); fle->length = sym_op->cipher.data.length + sess->iv.length; @@ -657,6 +675,7 @@ sec_fd_to_mbuf(const struct qbman_fd *fd) struct qbman_fle *fle; struct rte_crypto_op *op; struct ctxt_priv *priv; + struct rte_mbuf *dst, *src; fle = (struct qbman_fle *)DPAA2_IOVA_TO_VADDR(DPAA2_GET_FD_ADDR(fd)); @@ -679,10 +698,17 @@ sec_fd_to_mbuf(const struct qbman_fd *fd) DPAA2_GET_FLE_ADDR((fle - 1))); /* Prefeth op */ - rte_prefetch0(op->sym->m_src); + src = op->sym->m_src; + rte_prefetch0(src); + + if (op->sym->m_dst) { + dst = op->sym->m_dst; + rte_prefetch0(dst); + } else + dst = src; PMD_RX_LOG(DEBUG, "mbuf %p BMAN buf addr %p", - (void *)op->sym->m_src, op->sym->m_src->buf_addr); + (void *)dst, dst->buf_addr); PMD_RX_LOG(DEBUG, "fdaddr =%p bpid =%d meta =%d off =%d, len =%d", (void *)DPAA2_GET_FD_ADDR(fd), diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c index a926779..cb9b486 100644 --- a/test/test/test_cryptodev.c +++ b/test/test/test_cryptodev.c @@ -9491,6 +9491,12 @@ static struct unit_test_suite cryptodev_dpaa2_sec_testsuite = { TEST_CASE_ST(ut_setup, ut_teardown, test_AES_GCM_auth_decryption_test_case_256_7), + /** Out of place tests */ + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_GCM_authenticated_encryption_oop_test_case_1), + TEST_CASE_ST(ut_setup, ut_teardown, + test_AES_GCM_authenticated_decryption_oop_test_case_1), + TEST_CASES_END() /**< NULL terminate unit test array */ } }; diff --git a/test/test/test_cryptodev_aes_test_vectors.h b/test/test/test_cryptodev_aes_test_vectors.h index e9773b5..050d868 100644 --- a/test/test/test_cryptodev_aes_test_vectors.h +++ b/test/test/test_cryptodev_aes_test_vectors.h @@ -1445,7 +1445,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL + BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA1 Decryption Digest " @@ -1455,7 +1456,8 @@ static const struct blockcipher_test_case aes_chain_test_cases[] = { .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_ARMV8 | BLOCKCIPHER_TEST_TARGET_PMD_QAT | - BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL + BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CBC HMAC-SHA224 Encryption Digest", @@ -1611,7 +1613,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_ENCRYPT, .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-256-CBC OOP Decryption", @@ -1619,7 +1622,8 @@ static const struct blockcipher_test_case aes_cipheronly_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_DECRYPT, .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "AES-128-CTR Encryption", diff --git a/test/test/test_cryptodev_des_test_vectors.h b/test/test/test_cryptodev_des_test_vectors.h index 05265ae..0602df7 100644 --- a/test/test/test_cryptodev_des_test_vectors.h +++ b/test/test/test_cryptodev_des_test_vectors.h @@ -1187,7 +1187,8 @@ static const struct blockcipher_test_case triple_des_chain_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_ENC_AUTH_GEN, .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC HMAC-SHA1 Decryption Digest" @@ -1196,7 +1197,8 @@ static const struct blockcipher_test_case triple_des_chain_test_cases[] = { .op_mask = BLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC, .feature_mask = BLOCKCIPHER_TEST_FEATURE_OOP, .pmd_mask = BLOCKCIPHER_TEST_TARGET_PMD_OPENSSL | - BLOCKCIPHER_TEST_TARGET_PMD_QAT + BLOCKCIPHER_TEST_TARGET_PMD_QAT | + BLOCKCIPHER_TEST_TARGET_PMD_DPAA2_SEC }, { .test_descr = "3DES-128-CBC HMAC-SHA1 Encryption Digest"