Hi Ciara,

> -----Original Message-----
> From: Power, Ciara <ciara.po...@intel.com>
> Sent: Wednesday, March 8, 2023 6:31 PM
> To: Volodymyr Fialko <vfia...@marvell.com>; dev@dpdk.org; Akhil Goyal 
> <gak...@marvell.com>; Fan
> Zhang <fanzhang....@gmail.com>
> Cc: Jerin Jacob Kollanukkaran <jer...@marvell.com>; Anoob Joseph 
> <ano...@marvell.com>;
> hemant.agra...@nxp.com; Ji, Kai <kai...@intel.com>
> Subject: [EXT] RE: [PATCH v2] test: add cryptodev crosscheck suite
> 
> External Email
> 
> ----------------------------------------------------------------------
> Hi Volodymyr,
> 
> 
> > -----Original Message-----
> > From: Volodymyr Fialko <vfia...@marvell.com>
> > Sent: Thursday 9 February 2023 12:34
> > To: dev@dpdk.org; Akhil Goyal <gak...@marvell.com>; Fan Zhang
> > <fanzhang....@gmail.com>
> > Cc: jer...@marvell.com; ano...@marvell.com; hemant.agra...@nxp.com;
> > Ji, Kai <kai...@intel.com>; Power, Ciara <ciara.po...@intel.com>;
> > Volodymyr Fialko <vfia...@marvell.com>
> > Subject: [PATCH v2] test: add cryptodev crosscheck suite
> >
> > Add a validation test suite that helps in verifying that the output
> > generated by two different cryptodevs match for a wide range of input
> > parameter combinations.
> >
> > Crypto autotest performs a comprehensive testing of the cryptodev but
> > since it performs verification by comparing against known vectors, the
> > extend to which various parameters (like packet size) can be tested is
> > limited. This test suite attempts to simulate various cases by running
> > same test case on different cryptodevs and compares the output
> > generated. The test suite relies on capabilities to determine the
> > combinations of tests to be attempted.
> >
> > A typical use case would be to compare outputs generated from a
> > standard driver such as openSSL PMD and a new cryptodev PMD. This test
> > suite is to compliment the testing coverage that crypto autotest provides.
> >
> > Currently supported symmetric xforms(cipher, auth, aead) without chaining.
> >
> > Example command:
> > DPDK_TEST=cryptodev_crosscheck ./dpdk-test \
> >     -a <cryptodev> --vdev "crypto_openssl"
> >
> > Signed-off-by: Volodymyr Fialko <vfia...@marvell.com>
> > ---
> > V2:
> > - Updated commit message.
> >
> <snip>
> > +
> > +static void
> > +capabilities_inspect(void)
> > +{
> > +   struct rte_cryptodev_sym_capability_idx
> > cap_indexes[CRYPTO_ALGOS_LEN], *cap_idx;
> > +   struct crypto_testsuite_params *ts_params = &testsuite_params;
> > +   const struct rte_cryptodev_symmetric_capability *sym_capa;
> > +   struct rte_cryptodev_symmetric_capability *common_capa;
> > +   uint32_t algo, i, dev_id, caps_idx;
> > +
> > +   caps_idx = 0;
> > +   /* Create capability idx for known algorithms*/
> > +   for (algo = 1; algo <= CRYPTO_AUTH_MAX_IDX; algo++) {
> > +           cap_idx = &cap_indexes[caps_idx++];
> > +           cap_idx->type = RTE_CRYPTO_SYM_XFORM_AUTH;
> > +           cap_idx->algo.auth = algo;
> > +   }
> > +   for (algo = 1; algo <= CRYPTO_CIPHER_MAX_IDX; algo++) {
> > +           cap_idx = &cap_indexes[caps_idx++];
> > +           cap_idx->type = RTE_CRYPTO_SYM_XFORM_CIPHER;
> > +           cap_idx->algo.cipher = algo;
> > +   }
> > +   for (algo = 1; algo <= CRYPTO_AEAD_MAX_IDX; algo++) {
> > +           cap_idx = &cap_indexes[caps_idx++];
> > +           cap_idx->type = RTE_CRYPTO_SYM_XFORM_AEAD;
> > +           cap_idx->algo.aead = algo;
> > +   }
> > +
> > +   for (caps_idx = 0; caps_idx < CRYPTO_ALGOS_LEN; caps_idx++) {
> > +           /* Gather common capabilities */
> > +           common_capa = &common_symm_capas[caps_idx];
> > +           common_capa->xform_type =
> > RTE_CRYPTO_SYM_XFORM_NOT_SPECIFIED;
> > +           for (i = 0; i < ts_params->valid_dev_count; i++) {
> > +                   dev_id = ts_params->valid_devs[i];
> > +                   sym_capa =
> > rte_cryptodev_sym_capability_get(dev_id,
> > +                                   &cap_indexes[caps_idx]);
> > +                   if (sym_capa == NULL) {
> > +                           /* Capability not supported by one of devs,
> > mark and skip */
> > +                           goto next_algo;
> > +                   }
> > +
> > +                   if (common_capa->xform_type ==
> > RTE_CRYPTO_SYM_XFORM_NOT_SPECIFIED) {
> > +                           /* First time initialization, copy data, go to
> > next device  */
> > +                           *common_capa = *sym_capa;
> > +                           continue;
> > +                   }
> [CP]
> 
> This function - from what I understand after review,  is looping through all 
> algorithms in DPDK crypto,
> and then checking if each is supported by each device?
> Could we instead just take the capabilities list from one device as the 
> starting point - That will be the
> max list of capabilities, they will only get knocked out if not supported on 
> the 2nd/3rd device etc.
> 
Agreed, that's a good idea. I was misled by the lack of an API like 
rte_cryptodev_sym_capability_get_all().
But after taking closer look, I found  that it's possible to retrieve all 
capabilities via dev_info. Reworked in V4.

> 
> <snip>
> 
> Some trials I did with this patch showed some issues.
> 
> 1. For QAT + AESNI_MB I get all skipped tests. I would have expected some 
> common algs here.
> + ------------------------------------------------------- +
>  + Test Suite Summary : Crosscheck Unit Test Suite  + 
> ------------------------------------------------------- +  +
> Algo AUTH  'null' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + 
> Algo AUTH  'aes-cbc-mac' :
> 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'aes-cmac' 
> : 0/0 passed, 0/0
> skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'aes-gmac' : 0/0 passed, 
> 0/0 skipped, 0/0 failed, 0/0
> unsupported  + Algo AUTH  'aes-xcbc-mac' : 0/0 passed, 0/0 skipped, 0/0 
> failed, 0/0 unsupported  +
> Algo AUTH  'kasumi-f9' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported 
>  + Algo AUTH  'md5' : 0/0
> passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'md5-hmac' : 
> 0/0 passed, 0/0 skipped,
> 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha1' : 0/0 passed, 0/0 skipped, 
> 0/0 failed, 0/0 unsupported
> + Algo AUTH  'sha1-hmac' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 
> unsupported  + Algo AUTH  'sha2-
> 224' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  
> 'sha2-224-hmac' : 0/0 passed,
> 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha2-256' : 0/0 
> passed, 0/0 skipped, 0/0 failed,
> 0/0 unsupported  + Algo AUTH  'sha2-256-hmac' : 0/0 passed, 0/0 skipped, 0/0 
> failed, 0/0 unsupported
> + Algo AUTH  'sha2-384' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 
> unsupported  + Algo AUTH  'sha2-384-
> hmac' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  
> 'sha2-512' : 0/0 passed, 0/0
> skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha2-512-hmac' : 0/0 
> passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo AUTH  'snow3g-uia2' : 0/0 passed, 0/0 
> skipped, 0/0 failed, 0/0
> unsupported  + Algo AUTH  'zuc-eia3' : 0/0 passed, 0/0 skipped, 0/0 failed, 
> 0/0 unsupported  + Algo
> AUTH  'sha3-224' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + 
> Algo AUTH  'sha3-224-hmac' :
> 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha3-256' 
> : 0/0 passed, 0/0
> skipped, 0/0 failed, 0/0 unsupported  + Algo AUTH  'sha3-256-hmac' : 0/0 
> passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo AUTH  'sha3-384' : 0/0 passed, 0/0 skipped, 
> 0/0 failed, 0/0 unsupported
> + Algo AUTH  'sha3-384-hmac' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 
> unsupported  + Algo AUTH
> 'sha3-512' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo 
> AUTH  'sha3-512-hmac' : 0/0
> passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 'null' : 0/0 
> passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo CIPHER '3des-cbc' : 0/0 passed, 0/0 skipped, 
> 0/0 failed, 0/0
> unsupported  + Algo CIPHER '3des-ctr' : 0/0 passed, 0/0 skipped, 0/0 failed, 
> 0/0 unsupported  + Algo
> CIPHER '3des-ecb' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + 
> Algo CIPHER 'aes-cbc' : 0/0
> passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 'aes-ctr' : 
> 0/0 passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo CIPHER 'aes-ecb' : 0/0 passed, 0/0 skipped, 
> 0/0 failed, 0/0 unsupported
> + Algo CIPHER 'aes-f8' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported 
>  + Algo CIPHER 'aes-xts' :
> 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 'arc4' : 
> 0/0 passed, 0/0 skipped,
> 0/0 failed, 0/0 unsupported  + Algo CIPHER 'kasumi-f8' : 0/0 passed, 0/0 
> skipped, 0/0 failed, 0/0
> unsupported  + Algo CIPHER 'snow3g-uea2' : 0/0 passed, 0/0 skipped, 0/0 
> failed, 0/0 unsupported  +
> Algo CIPHER 'zuc-eea3' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported 
>  + Algo CIPHER 'des-cbc' :
> 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 
> 'aes-docsisbpi' : 0/0 passed, 0/0
> skipped, 0/0 failed, 0/0 unsupported  + Algo CIPHER 'des-docsisbpi' : 0/0 
> passed, 0/0 skipped, 0/0
> failed, 0/0 unsupported  + Algo AEAD 'aes-gcm' : 0/0 passed, 0/0 skipped, 0/0 
> failed, 0/0 unsupported
> + Algo AEAD 'chacha20-poly1305' : 0/0 passed, 0/0 skipped, 0/0 failed, 0/0 
> unsupported  + ---------------
> ---------------------------------------- +
>  + Sub Testsuites Total :     46
>  + Sub Testsuites Skipped :   46
>  + Sub Testsuites Passed :     0
>  + Sub Testsuites Failed :     0
>  + ------------------------------------------------------- +
>  + Tests Total :        0
>  + Tests Skipped :      0
>  + Tests Executed :     0
>  + Tests Unsupported:   0
>  + Tests Passed :       0
>  + Tests Failed :       0
>  + ------------------------------------------------------- + Test Skipped
> 
> 
Unfortunately, I do not have access to QAT device to investigate this issue.
However, I was able to run AESNI_MB with openssl. Let me know if issue persists 
in the next version.

> 2. For 2 openssl devices I get 3 failures, which is curious as they are the 
> same. Seems to be a space
> issue:
> USER1: Operation status 2
> USER1: No space for aad in single mbuf
> EAL: Test assert crosscheck_all_devices line 776 failed: Error occurred 
> during processing
> EAL: Test assert crosscheck_with_profile_run line 841 failed: Error occurred 
> during encryption
> 
Good catch. Instead of including everything in rte_mbuf, I separated aad/digest 
into their own memory allocations.
> 
> Thanks,
> Ciara

Reply via email to