> The crypto mlx5 driver supports multi segment encryption and decryption
> operations.
> 
> Added mlx5 multi segment encryption function and multi segment
> decryption function that will both use the mlx5 vectors.
> 
> The added tests will test both data integrity and correct stat values.
> 
> Signed-off-by: Shiri Kuzin <shi...@nvidia.com>
> Acked-by: Matan Azrad <ma...@nvidia.com>
> ---
>  app/test/test_cryptodev.c                   | 277 ++++++++++++++++++++
>  app/test/test_cryptodev_mlx5_test_vectors.h |   3 -
>  2 files changed, 277 insertions(+), 3 deletions(-)
> 
> diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
> index 8dbe324b81..4d27a9444c 100644
> --- a/app/test/test_cryptodev.c
> +++ b/app/test/test_cryptodev.c
> @@ -6681,6 +6681,219 @@ test_mlx5_decryption(const struct
> mlx5_test_data *tdata)
>       return 0;
>  }
> 
> +static int
> +test_mlx5_encryption_sgl(const struct mlx5_test_data *tdata)

The test cases cannot be specific to one particular device.
Hence the name test_mlx5_xxxx cannot be accepted.

Moreover is it not possible to add aes-xts in test_blockcipher_one_case()
and add only the test vectors of aes-xts?
And probably, you do not need a new file for test vectors, XTS is variant of 
AES,
Hence the vectors can be part of "test_cryptodev_aes_test_vectors.h".

I don't think there is need for a separate function for XTS right now.
The current function test_blockcipher_one_case() covers all capability checks
And feature flag checks so that the test is skipped for the devices which do not
Support a specific case.

> +{
> +     struct crypto_testsuite_params *ts_params = &testsuite_params;
> +     struct crypto_unittest_params *ut_params = &unittest_params;
> +     struct rte_cryptodev_sym_capability_idx cap_idx;
> +     struct rte_cryptodev_info dev_info;
> +     struct rte_cryptodev_stats stats;
> +     uint8_t buffer[10000];
> +     const uint8_t *ciphertext;
> +     const uint8_t *reference_ciphertext;
> +     uint64_t feat_flags;
> +     unsigned int plaintext_pad_len;
> +     unsigned int plaintext_len;
> +     int retval;
> +
> +     /* Verify the capabilities */
> +     cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
> +     cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_XTS;
> +     if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
> +                     &cap_idx) == NULL)
> +             return TEST_SKIPPED;
> +     rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);
> +     feat_flags = dev_info.feature_flags;
> +     if (!(feat_flags & RTE_CRYPTODEV_FF_IN_PLACE_SGL)) {
> +             printf("Device doesn't support in-place scatter-gather. "
> +                             "Test Skipped.\n");
> +             return TEST_SKIPPED;
> +     }
> +     if ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&
> +                     (!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP)))
> {
> +             printf("Device doesn't support RAW data-path APIs.\n");
> +             return TEST_SKIPPED;
> +     }
> +     if (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)
> +             return TEST_SKIPPED;
> +     /* Create mlx5 session */
> +     retval = create_wireless_algo_cipher_session(ts_params-
> >valid_devs[0],
> +                                     RTE_CRYPTO_CIPHER_OP_ENCRYPT,
> +                                     RTE_CRYPTO_CIPHER_AES_XTS,
> +                                     tdata->key.data, tdata->key.len,
> +                                     tdata->cipher_iv.len, 0);
> +     if (retval < 0)
> +             return retval;
> +     plaintext_len = ceil_byte_length(tdata->plaintext.len);
> +     /* Append data which is padded to a multiple */
> +     /* of the algorithms block size */
> +     plaintext_pad_len = RTE_ALIGN_CEIL(plaintext_len, 8);
> +     ut_params->ibuf = create_segmented_mbuf(ts_params->mbuf_pool,
> +                     plaintext_pad_len, 8, 0);
> +     if (unlikely(ut_params->ibuf == NULL))
> +             return -ENOMEM;
> +     pktmbuf_write(ut_params->ibuf, 0, plaintext_len, tdata-
> >plaintext.data);
> +     debug_hexdump(stdout, "plaintext:", tdata->plaintext.data,
> +                   plaintext_len);
> +     /* Create mlx5 operation */
> +     retval = create_wireless_algo_cipher_operation(tdata-
> >cipher_iv.data,
> +                             tdata->cipher_iv.len, (tdata->cipher.len_bits),
> +                             (tdata->cipher.offset_bits));
> +     if (retval < 0)
> +             return retval;
> +     if (global_api_test_type == CRYPTODEV_RAW_API_TEST)
> +             process_sym_raw_dp_op(ts_params->valid_devs[0], 0,
> +                             ut_params->op, 1, 0, 1, tdata->cipher_iv.len);
> +     else
> +             ut_params->op = process_crypto_request(ts_params-
> >valid_devs[0],
> +                                             ut_params->op);
> +     TEST_ASSERT_NOT_NULL(ut_params->op, "failed to retrieve obuf");
> +     ut_params->obuf = ut_params->op->sym->m_dst;
> +     if (ut_params->obuf)
> +             ciphertext = rte_pktmbuf_read(ut_params->obuf, 0,
> +                             plaintext_len, buffer);
> +     else
> +             ciphertext = rte_pktmbuf_read(ut_params->ibuf,
> +                             tdata->cipher.offset_bits,
> +                             plaintext_len, buffer);
> +     if (unlikely(ciphertext == NULL))
> +             return -ENOMEM;
> +     /* Validate obuf */
> +     debug_hexdump(stdout, "ciphertext:", ciphertext, plaintext_len);
> +     reference_ciphertext = tdata->ciphertext.data +
> +                             tdata->cipher.offset_bits;
> +     /* Validate obuf */
> +     TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT(
> +             ciphertext,
> +             reference_ciphertext,
> +             tdata->validCipherLenInBits.len,
> +             "MLX5 Ciphertext data not as expected");
> +     /* Validate stats */
> +     TEST_ASSERT_SUCCESS(rte_cryptodev_stats_get(ts_params-
> >valid_devs[0],
> +                     &stats),
> +             "rte_cryptodev_stats_get failed");
> +     TEST_ASSERT((stats.enqueued_count == 1),
> +             "rte_cryptodev_stats_get returned unexpected enqueued
> stat");
> +     TEST_ASSERT((stats.dequeued_count == 1),
> +                "rte_cryptodev_stats_get returned unexpected dequeued
> stat");
> +     TEST_ASSERT((stats.enqueue_err_count == 0),
> +                "rte_cryptodev_stats_get returned error enqueued stat");
> +     TEST_ASSERT((stats.dequeue_err_count == 0),
> +                "rte_cryptodev_stats_get returned error dequeued stat");
> +     return 0;
> +}
> +
> +static int
> +test_mlx5_decryption_sgl(const struct mlx5_test_data *tdata)
> +{
> +     struct crypto_testsuite_params *ts_params = &testsuite_params;
> +     struct crypto_unittest_params *ut_params = &unittest_params;
> +     struct rte_cryptodev_sym_capability_idx cap_idx;
> +     struct rte_cryptodev_stats stats;
> +     struct rte_cryptodev_info dev_info;
> +     uint8_t *ciphertext;
> +     const uint8_t *plaintext;
> +     const uint8_t *reference_plaintext;
> +     uint8_t buffer[10000];
> +     uint64_t feat_flags;
> +     unsigned int ciphertext_pad_len;
> +     unsigned int ciphertext_len;
> +     int retval;
> +
> +     rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);
> +     feat_flags = dev_info.feature_flags;
> +     if ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&
> +                     (!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP)))
> {
> +             printf("Device doesn't support RAW data-path APIs.\n");
> +             return -ENOTSUP;
> +     }
> +     if (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)
> +             return -ENOTSUP;
> +     /* Verify the capabilities */
> +     cap_idx.type = RTE_CRYPTO_SYM_XFORM_CIPHER;
> +     cap_idx.algo.cipher = RTE_CRYPTO_CIPHER_AES_XTS;
> +     if (rte_cryptodev_sym_capability_get(ts_params->valid_devs[0],
> +                     &cap_idx) == NULL)
> +             return -ENOTSUP;
> +     /* Create mlx5 session */
> +     retval = create_wireless_algo_cipher_session(ts_params-
> >valid_devs[0],
> +                                     RTE_CRYPTO_CIPHER_OP_DECRYPT,
> +                                     RTE_CRYPTO_CIPHER_AES_XTS,
> +                                     tdata->key.data, tdata->key.len,
> +                                     tdata->cipher_iv.len, 0);
> +     if (retval < 0)
> +             return retval;
> +     ut_params->ibuf = rte_pktmbuf_alloc(ts_params->mbuf_pool);
> +     if (unlikely(ut_params->ibuf == NULL))
> +             return -ENOMEM;
> +     /* Clear mbuf payload */
> +     memset(rte_pktmbuf_mtod(ut_params->ibuf, uint8_t *), 0,
> +            rte_pktmbuf_tailroom(ut_params->ibuf));
> +     ciphertext_len = ceil_byte_length(tdata->ciphertext.len);
> +     /* Append data which is padded to a multiple */
> +     /* of the algorithms block size */
> +     ciphertext_pad_len = RTE_ALIGN_CEIL(ciphertext_len, 8);
> +     ciphertext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,
> +                             ciphertext_pad_len);
> +     if (unlikely(ciphertext == NULL))
> +             return -ENOMEM;
> +     ut_params->ibuf = create_segmented_mbuf(ts_params->mbuf_pool,
> +                     ciphertext_pad_len, 8, 0);
> +     if (unlikely(ut_params->ibuf == NULL))
> +             return -ENOMEM;
> +     pktmbuf_write(ut_params->ibuf, 0, ciphertext_len,
> +                     tdata->ciphertext.data);
> +     memcpy(ciphertext, tdata->ciphertext.data, ciphertext_len);
> +     if (unlikely(ciphertext == NULL))
> +             return -ENOMEM;
> +     debug_hexdump(stdout, "ciphertext:", ciphertext, ciphertext_len);
> +     /* Create mlx5 operation */
> +     retval = create_wireless_algo_cipher_operation(tdata-
> >cipher_iv.data,
> +                             tdata->cipher_iv.len, (tdata->cipher.len_bits),
> +                             (tdata->cipher.offset_bits));
> +     if (retval < 0)
> +             return retval;
> +     if (global_api_test_type == CRYPTODEV_RAW_API_TEST)
> +             process_sym_raw_dp_op(ts_params->valid_devs[0], 0,
> +                             ut_params->op, 1, 0, 1, 0);
> +     else
> +             ut_params->op = process_crypto_request(ts_params-
> >valid_devs[0],
> +                                             ut_params->op);
> +     TEST_ASSERT_NOT_NULL(ut_params->op, "failed to retrieve obuf");
> +     ut_params->obuf = ut_params->op->sym->m_dst;
> +     if (ut_params->obuf)
> +             plaintext = rte_pktmbuf_read(ut_params->obuf, 0,
> +                             ciphertext_len, buffer);
> +     else
> +             plaintext = rte_pktmbuf_read(ut_params->ibuf,
> +                             tdata->cipher.offset_bits,
> +                             ciphertext_len, buffer);
> +     debug_hexdump(stdout, "plaintext:", plaintext, ciphertext_len);
> +     reference_plaintext = tdata->plaintext.data +
> +                             (tdata->cipher.offset_bits);
> +     /* Validate obuf */
> +     TEST_ASSERT_BUFFERS_ARE_EQUAL_BIT(
> +             plaintext,
> +             reference_plaintext,
> +             tdata->validCipherLenInBits.len,
> +             "MLX5 Plaintext data not as expected");
> +     /* Validate stats */
> +     TEST_ASSERT_SUCCESS(rte_cryptodev_stats_get(ts_params-
> >valid_devs[0],
> +                     &stats),
> +             "rte_cryptodev_stats_get failed");
> +     TEST_ASSERT((stats.enqueued_count == 1),
> +             "rte_cryptodev_stats_get returned unexpected enqueued
> stat");
> +     TEST_ASSERT((stats.dequeued_count == 1),
> +                "rte_cryptodev_stats_get returned unexpected dequeued
> stat");
> +     TEST_ASSERT((stats.enqueue_err_count == 0),
> +                "rte_cryptodev_stats_get returned error enqueued stat");
> +     TEST_ASSERT((stats.dequeue_err_count == 0),
> +                "rte_cryptodev_stats_get returned error dequeued stat");
> +     return 0;
> +}
> +
> +
>  static int
>  test_kasumi_encryption_test_case_1(void)
>  {
> @@ -7345,6 +7558,54 @@ test_mlx5_decryption_test_case_4(void)
>       return test_mlx5_decryption(&mlx5_test_case_cipher_aes_xts_4);
>  }
> 
> +static int
> +test_mlx5_encryption_test_case_1_sgl(void)
> +{
> +     return
> test_mlx5_encryption_sgl(&mlx5_test_case_cipher_aes_xts_1);
> +}
> +
> +static int
> +test_mlx5_encryption_test_case_2_sgl(void)
> +{
> +     return
> test_mlx5_encryption_sgl(&mlx5_test_case_cipher_aes_xts_2);
> +}
> +
> +static int
> +test_mlx5_encryption_test_case_3_sgl(void)
> +{
> +     return
> test_mlx5_encryption_sgl(&mlx5_test_case_cipher_aes_xts_3);
> +}
> +
> +static int
> +test_mlx5_encryption_test_case_4_sgl(void)
> +{
> +     return
> test_mlx5_encryption_sgl(&mlx5_test_case_cipher_aes_xts_4);
> +}
> +
> +static int
> +test_mlx5_decryption_test_case_1_sgl(void)
> +{
> +     return
> test_mlx5_decryption_sgl(&mlx5_test_case_cipher_aes_xts_1);
> +}
> +
> +static int
> +test_mlx5_decryption_test_case_2_sgl(void)
> +{
> +     return
> test_mlx5_decryption_sgl(&mlx5_test_case_cipher_aes_xts_2);
> +}
> +
> +static int
> +test_mlx5_decryption_test_case_3_sgl(void)
> +{
> +     return
> test_mlx5_decryption_sgl(&mlx5_test_case_cipher_aes_xts_3);
> +}
> +
> +static int
> +test_mlx5_decryption_test_case_4_sgl(void)
> +{
> +     return
> test_mlx5_decryption_sgl(&mlx5_test_case_cipher_aes_xts_4);
> +}
> +
>  static int
>  test_mixed_check_if_unsupported(const struct
> mixed_cipher_auth_test_data *tdata)
>  {
> @@ -14747,6 +15008,22 @@ static struct unit_test_suite
> cryptodev_mlx5_testsuite  = {
>                       test_mlx5_encryption_test_case_3),
>               TEST_CASE_ST(ut_setup, ut_teardown,
>                       test_mlx5_encryption_test_case_4),
> +             TEST_CASE_ST(ut_setup, ut_teardown,
> +                     test_mlx5_decryption_test_case_1_sgl),
> +             TEST_CASE_ST(ut_setup, ut_teardown,
> +                     test_mlx5_decryption_test_case_2_sgl),
> +             TEST_CASE_ST(ut_setup, ut_teardown,
> +                     test_mlx5_decryption_test_case_3_sgl),
> +             TEST_CASE_ST(ut_setup, ut_teardown,
> +                     test_mlx5_decryption_test_case_4_sgl),
> +             TEST_CASE_ST(ut_setup, ut_teardown,
> +                     test_mlx5_encryption_test_case_1_sgl),
> +             TEST_CASE_ST(ut_setup, ut_teardown,
> +                     test_mlx5_encryption_test_case_2_sgl),
> +             TEST_CASE_ST(ut_setup, ut_teardown,
> +                     test_mlx5_encryption_test_case_3_sgl),
> +             TEST_CASE_ST(ut_setup, ut_teardown,
> +                     test_mlx5_encryption_test_case_4_sgl),
>               TEST_CASES_END()
>       }
>  };
> diff --git a/app/test/test_cryptodev_mlx5_test_vectors.h
> b/app/test/test_cryptodev_mlx5_test_vectors.h
> index 2a05aa4626..db7e5fc744 100644
> --- a/app/test/test_cryptodev_mlx5_test_vectors.h
> +++ b/app/test/test_cryptodev_mlx5_test_vectors.h
> @@ -2496,7 +2496,4 @@ static struct mlx5_test_data
> mlx5_test_case_cipher_aes_xts_4 = {
>       .dataunit_len = 0
>  };
> 
> -
> -
> -
>  #endif /*TEST_CRYPTODEV_MLX5_TEST_VECTORS_H_*/
> --
> 2.27.0

Reply via email to