get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/58868/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 58868,
    "url": "http://patchwork.dpdk.org/api/patches/58868/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/patch/20190906131330.40185-7-roy.fan.zhang@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20190906131330.40185-7-roy.fan.zhang@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20190906131330.40185-7-roy.fan.zhang@intel.com",
    "date": "2019-09-06T13:13:26",
    "name": "[06/10] app/test: add aesni_mb security cpu crypto autotest",
    "commit_ref": null,
    "pull_url": null,
    "state": "changes-requested",
    "archived": true,
    "hash": "6436b5ebdc528cc7beb3b5421010dafb519ab6b2",
    "submitter": {
        "id": 304,
        "url": "http://patchwork.dpdk.org/api/people/304/?format=api",
        "name": "Fan Zhang",
        "email": "roy.fan.zhang@intel.com"
    },
    "delegate": {
        "id": 6690,
        "url": "http://patchwork.dpdk.org/api/users/6690/?format=api",
        "username": "akhil",
        "first_name": "akhil",
        "last_name": "goyal",
        "email": "gakhil@marvell.com"
    },
    "mbox": "http://patchwork.dpdk.org/project/dpdk/patch/20190906131330.40185-7-roy.fan.zhang@intel.com/mbox/",
    "series": [
        {
            "id": 6303,
            "url": "http://patchwork.dpdk.org/api/series/6303/?format=api",
            "web_url": "http://patchwork.dpdk.org/project/dpdk/list/?series=6303",
            "date": "2019-09-06T13:13:20",
            "name": "security: add software synchronous crypto process",
            "version": 1,
            "mbox": "http://patchwork.dpdk.org/series/6303/mbox/"
        }
    ],
    "comments": "http://patchwork.dpdk.org/api/patches/58868/comments/",
    "check": "warning",
    "checks": "http://patchwork.dpdk.org/api/patches/58868/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 0815C1F3AD;\n\tFri,  6 Sep 2019 15:13:56 +0200 (CEST)",
            "from mga18.intel.com (mga18.intel.com [134.134.136.126])\n\tby dpdk.org (Postfix) with ESMTP id B44911F391\n\tfor <dev@dpdk.org>; Fri,  6 Sep 2019 15:13:44 +0200 (CEST)",
            "from fmsmga002.fm.intel.com ([10.253.24.26])\n\tby orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n\t06 Sep 2019 06:13:44 -0700",
            "from silpixa00398673.ir.intel.com (HELO\n\tsilpixa00398673.ger.corp.intel.com) ([10.237.223.136])\n\tby fmsmga002.fm.intel.com with ESMTP; 06 Sep 2019 06:13:42 -0700"
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.64,473,1559545200\"; d=\"scan'208\";a=\"213140763\"",
        "From": "Fan Zhang <roy.fan.zhang@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "konstantin.ananyev@intel.com, declan.doherty@intel.com,\n\takhil.goyal@nxp.com, Fan Zhang <roy.fan.zhang@intel.com>",
        "Date": "Fri,  6 Sep 2019 14:13:26 +0100",
        "Message-Id": "<20190906131330.40185-7-roy.fan.zhang@intel.com>",
        "X-Mailer": "git-send-email 2.14.5",
        "In-Reply-To": "<20190906131330.40185-1-roy.fan.zhang@intel.com>",
        "References": "<20190903154046.55992-1-roy.fan.zhang@intel.com>\n\t<20190906131330.40185-1-roy.fan.zhang@intel.com>",
        "Subject": "[dpdk-dev] [PATCH 06/10] app/test: add aesni_mb security cpu crypto\n\tautotest",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch adds cpu crypto unit test for AESNI_MB PMD.\n\nSigned-off-by: Fan Zhang <roy.fan.zhang@intel.com>\n---\n app/test/test_security_cpu_crypto.c | 367 ++++++++++++++++++++++++++++++++++++\n 1 file changed, 367 insertions(+)",
    "diff": "diff --git a/app/test/test_security_cpu_crypto.c b/app/test/test_security_cpu_crypto.c\nindex ca9a8dae6..0ea406390 100644\n--- a/app/test/test_security_cpu_crypto.c\n+++ b/app/test/test_security_cpu_crypto.c\n@@ -19,12 +19,23 @@\n \n #include \"test.h\"\n #include \"test_cryptodev.h\"\n+#include \"test_cryptodev_blockcipher.h\"\n+#include \"test_cryptodev_aes_test_vectors.h\"\n #include \"test_cryptodev_aead_test_vectors.h\"\n+#include \"test_cryptodev_des_test_vectors.h\"\n+#include \"test_cryptodev_hash_test_vectors.h\"\n \n #define CPU_CRYPTO_TEST_MAX_AAD_LENGTH\t16\n #define MAX_NB_SIGMENTS\t\t\t4\n #define CACHE_WARM_ITER\t\t\t2048\n \n+#define TOP_ENC\t\tBLOCKCIPHER_TEST_OP_ENCRYPT\n+#define TOP_DEC\t\tBLOCKCIPHER_TEST_OP_DECRYPT\n+#define TOP_AUTH_GEN\tBLOCKCIPHER_TEST_OP_AUTH_GEN\n+#define TOP_AUTH_VER\tBLOCKCIPHER_TEST_OP_AUTH_VERIFY\n+#define TOP_ENC_AUTH\tBLOCKCIPHER_TEST_OP_ENC_AUTH_GEN\n+#define TOP_AUTH_DEC\tBLOCKCIPHER_TEST_OP_AUTH_VERIFY_DEC\n+\n enum buffer_assemble_option {\n \tSGL_MAX_SEG,\n \tSGL_ONE_SEG,\n@@ -516,6 +527,11 @@ cpu_crypto_test_aead(const struct aead_test_data *tdata,\n \tTEST_EXPAND(gcm_test_case_256_6, type)\t\\\n \tTEST_EXPAND(gcm_test_case_256_7, type)\n \n+/* test-vector/sgl-option */\n+#define all_ccm_unit_test_cases \\\n+\tTEST_EXPAND(ccm_test_case_128_1, SGL_ONE_SEG) \\\n+\tTEST_EXPAND(ccm_test_case_128_2, SGL_ONE_SEG) \\\n+\tTEST_EXPAND(ccm_test_case_128_3, SGL_ONE_SEG)\n \n #define TEST_EXPAND(t, o)\t\t\t\t\t\t\\\n static int\t\t\t\t\t\t\t\t\\\n@@ -531,6 +547,7 @@ cpu_crypto_aead_dec_test_##t##_##o(void)\t\t\t\t\\\n \n all_gcm_unit_test_cases(SGL_ONE_SEG)\n all_gcm_unit_test_cases(SGL_MAX_SEG)\n+all_ccm_unit_test_cases\n #undef TEST_EXPAND\n \n static struct unit_test_suite security_cpu_crypto_aesgcm_testsuite  = {\n@@ -758,8 +775,358 @@ test_security_cpu_crypto_aesni_gcm_perf(void)\n \t\t\t&security_cpu_crypto_aesgcm_perf_testsuite);\n }\n \n+static struct rte_security_session *\n+create_blockcipher_session(struct rte_security_ctx *ctx,\n+\t\tstruct rte_mempool *sess_mp,\n+\t\tuint32_t op_mask,\n+\t\tconst struct blockcipher_test_data *test_data,\n+\t\tuint32_t is_unit_test)\n+{\n+\tstruct rte_security_session_conf sess_conf = {0};\n+\tstruct rte_crypto_sym_xform xforms[2] = { {0} };\n+\tstruct rte_crypto_sym_xform *cipher_xform = NULL;\n+\tstruct rte_crypto_sym_xform *auth_xform = NULL;\n+\tstruct rte_crypto_sym_xform *xform;\n+\n+\tif (op_mask & BLOCKCIPHER_TEST_OP_CIPHER) {\n+\t\tcipher_xform = &xforms[0];\n+\t\tcipher_xform->type = RTE_CRYPTO_SYM_XFORM_CIPHER;\n+\n+\t\tif (op_mask & TOP_ENC)\n+\t\t\tcipher_xform->cipher.op =\n+\t\t\t\tRTE_CRYPTO_CIPHER_OP_ENCRYPT;\n+\t\telse\n+\t\t\tcipher_xform->cipher.op =\n+\t\t\t\tRTE_CRYPTO_CIPHER_OP_DECRYPT;\n+\n+\t\tcipher_xform->cipher.algo = test_data->crypto_algo;\n+\t\tcipher_xform->cipher.key.data = test_data->cipher_key.data;\n+\t\tcipher_xform->cipher.key.length = test_data->cipher_key.len;\n+\t\tcipher_xform->cipher.iv.offset = 0;\n+\t\tcipher_xform->cipher.iv.length = test_data->iv.len;\n+\n+\t\tif (is_unit_test)\n+\t\t\tdebug_hexdump(stdout, \"cipher key:\",\n+\t\t\t\t\ttest_data->cipher_key.data,\n+\t\t\t\t\ttest_data->cipher_key.len);\n+\t}\n+\n+\tif (op_mask & BLOCKCIPHER_TEST_OP_AUTH) {\n+\t\tauth_xform = &xforms[1];\n+\t\tauth_xform->type = RTE_CRYPTO_SYM_XFORM_AUTH;\n+\n+\t\tif (op_mask & TOP_AUTH_GEN)\n+\t\t\tauth_xform->auth.op = RTE_CRYPTO_AUTH_OP_GENERATE;\n+\t\telse\n+\t\t\tauth_xform->auth.op = RTE_CRYPTO_AUTH_OP_VERIFY;\n+\n+\t\tauth_xform->auth.algo = test_data->auth_algo;\n+\t\tauth_xform->auth.key.length = test_data->auth_key.len;\n+\t\tauth_xform->auth.key.data = test_data->auth_key.data;\n+\t\tauth_xform->auth.digest_length = test_data->digest.len;\n+\n+\t\tif (is_unit_test)\n+\t\t\tdebug_hexdump(stdout, \"auth key:\",\n+\t\t\t\t\ttest_data->auth_key.data,\n+\t\t\t\t\ttest_data->auth_key.len);\n+\t}\n+\n+\tif (op_mask == TOP_ENC ||\n+\t\t\top_mask == TOP_DEC)\n+\t\txform = cipher_xform;\n+\telse if (op_mask == TOP_AUTH_GEN ||\n+\t\t\top_mask == TOP_AUTH_VER)\n+\t\txform = auth_xform;\n+\telse if (op_mask == TOP_ENC_AUTH) {\n+\t\txform = cipher_xform;\n+\t\txform->next = auth_xform;\n+\t} else if (op_mask == TOP_AUTH_DEC) {\n+\t\txform = auth_xform;\n+\t\txform->next = cipher_xform;\n+\t} else\n+\t\treturn NULL;\n+\n+\tif (test_data->cipher_offset < test_data->auth_offset)\n+\t\treturn NULL;\n+\n+\tsess_conf.action_type = RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO;\n+\tsess_conf.crypto_xform = xform;\n+\tsess_conf.cpucrypto.cipher_offset = test_data->cipher_offset -\n+\t\t\ttest_data->auth_offset;\n+\n+\treturn rte_security_session_create(ctx, &sess_conf, sess_mp);\n+}\n+\n+static inline int\n+assemble_blockcipher_buf(struct cpu_crypto_test_case *data,\n+\t\tstruct cpu_crypto_test_obj *obj,\n+\t\tuint32_t obj_idx,\n+\t\tuint32_t op_mask,\n+\t\tconst struct blockcipher_test_data *test_data,\n+\t\tuint32_t is_unit_test)\n+{\n+\tconst uint8_t *src;\n+\tuint32_t src_len;\n+\tuint32_t offset;\n+\n+\tif (op_mask == TOP_ENC_AUTH ||\n+\t\t\top_mask == TOP_AUTH_GEN ||\n+\t\t\top_mask == BLOCKCIPHER_TEST_OP_AUTH_VERIFY)\n+\t\toffset = test_data->auth_offset;\n+\telse\n+\t\toffset = test_data->cipher_offset;\n+\n+\tif (op_mask & TOP_ENC_AUTH) {\n+\t\tsrc = test_data->plaintext.data;\n+\t\tsrc_len = test_data->plaintext.len;\n+\t\tif (is_unit_test)\n+\t\t\tdebug_hexdump(stdout, \"plaintext:\", src, src_len);\n+\t} else {\n+\t\tsrc = test_data->ciphertext.data;\n+\t\tsrc_len = test_data->ciphertext.len;\n+\t\tmemcpy(data->digest, test_data->digest.data,\n+\t\t\t\ttest_data->digest.len);\n+\t\tif (is_unit_test) {\n+\t\t\tdebug_hexdump(stdout, \"ciphertext:\", src, src_len);\n+\t\t\tdebug_hexdump(stdout, \"digest:\", test_data->digest.data,\n+\t\t\t\t\ttest_data->digest.len);\n+\t\t}\n+\t}\n+\n+\tif (src_len > MBUF_DATAPAYLOAD_SIZE)\n+\t\treturn -ENOMEM;\n+\n+\tmemcpy(data->seg_buf[0].seg, src, src_len);\n+\tdata->seg_buf[0].seg_len = src_len;\n+\tobj->vec[obj_idx][0].iov_base =\n+\t\t\t(void *)(data->seg_buf[0].seg + offset);\n+\tobj->vec[obj_idx][0].iov_len = src_len - offset;\n+\n+\tobj->sec_buf[obj_idx].vec = obj->vec[obj_idx];\n+\tobj->sec_buf[obj_idx].num = 1;\n+\n+\tmemcpy(data->iv, test_data->iv.data, test_data->iv.len);\n+\tif (is_unit_test)\n+\t\tdebug_hexdump(stdout, \"iv:\", test_data->iv.data,\n+\t\t\t\ttest_data->iv.len);\n+\n+\tobj->iv[obj_idx] = (void *)data->iv;\n+\tobj->digest[obj_idx] = (void *)data->digest;\n+\n+\treturn 0;\n+}\n+\n+static int\n+check_blockcipher_result(struct cpu_crypto_test_case *tcase,\n+\t\tuint32_t op_mask,\n+\t\tconst struct blockcipher_test_data *test_data)\n+{\n+\tint ret;\n+\n+\tif (op_mask & BLOCKCIPHER_TEST_OP_CIPHER) {\n+\t\tconst char *err_msg1, *err_msg2;\n+\t\tconst uint8_t *src_pt_ct;\n+\t\tuint32_t src_len;\n+\n+\t\tif (op_mask & TOP_ENC) {\n+\t\t\tsrc_pt_ct = test_data->ciphertext.data;\n+\t\t\tsrc_len = test_data->ciphertext.len;\n+\t\t\terr_msg1 = CPU_CRYPTO_ERR_EXP_CT;\n+\t\t\terr_msg2 = CPU_CRYPTO_ERR_GEN_CT;\n+\t\t} else {\n+\t\t\tsrc_pt_ct = test_data->plaintext.data;\n+\t\t\tsrc_len = test_data->plaintext.len;\n+\t\t\terr_msg1 = CPU_CRYPTO_ERR_EXP_PT;\n+\t\t\terr_msg2 = CPU_CRYPTO_ERR_GEN_PT;\n+\t\t}\n+\n+\t\tret = memcmp(tcase->seg_buf[0].seg, src_pt_ct, src_len);\n+\t\tif (ret != 0) {\n+\t\t\tdebug_hexdump(stdout, err_msg1, src_pt_ct, src_len);\n+\t\t\tdebug_hexdump(stdout, err_msg2,\n+\t\t\t\t\ttcase->seg_buf[0].seg,\n+\t\t\t\t\ttest_data->ciphertext.len);\n+\t\t\treturn -1;\n+\t\t}\n+\t}\n+\n+\tif (op_mask & TOP_AUTH_GEN) {\n+\t\tret = memcmp(tcase->digest, test_data->digest.data,\n+\t\t\t\ttest_data->digest.len);\n+\t\tif (ret != 0) {\n+\t\t\tdebug_hexdump(stdout, \"expect digest:\",\n+\t\t\t\t\ttest_data->digest.data,\n+\t\t\t\t\ttest_data->digest.len);\n+\t\t\tdebug_hexdump(stdout, \"gen digest:\",\n+\t\t\t\t\ttcase->digest,\n+\t\t\t\t\ttest_data->digest.len);\n+\t\t\treturn -1;\n+\t\t}\n+\t}\n+\n+\treturn 0;\n+}\n+\n+static int\n+cpu_crypto_test_blockcipher(const struct blockcipher_test_data *tdata,\n+\t\tuint32_t op_mask)\n+{\n+\tstruct cpu_crypto_testsuite_params *ts_params = &testsuite_params;\n+\tstruct cpu_crypto_unittest_params *ut_params = &unittest_params;\n+\tstruct cpu_crypto_test_obj *obj = &ut_params->test_obj;\n+\tstruct cpu_crypto_test_case *tcase;\n+\tint ret;\n+\n+\tut_params->sess = create_blockcipher_session(ts_params->ctx,\n+\t\t\tts_params->session_priv_mpool,\n+\t\t\top_mask,\n+\t\t\ttdata,\n+\t\t\t1);\n+\tif (!ut_params->sess)\n+\t\treturn -1;\n+\n+\tret = allocate_buf(1);\n+\tif (ret)\n+\t\treturn ret;\n+\n+\ttcase = ut_params->test_datas[0];\n+\tret = assemble_blockcipher_buf(tcase, obj, 0, op_mask, tdata, 1);\n+\tif (ret < 0) {\n+\t\tprintf(\"Test is not supported by the driver\\n\");\n+\t\treturn ret;\n+\t}\n+\n+\trun_test(ts_params->ctx, ut_params->sess, obj, 1);\n+\n+\tret = check_status(obj, 1);\n+\tif (ret < 0)\n+\t\treturn ret;\n+\n+\tret = check_blockcipher_result(tcase, op_mask, tdata);\n+\tif (ret < 0)\n+\t\treturn ret;\n+\n+\treturn 0;\n+}\n+\n+/* Macro to save code for defining BlockCipher test cases */\n+/* test-vector-name/op */\n+#define all_blockcipher_test_cases \\\n+\tTEST_EXPAND(aes_test_data_1, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_1, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_1, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_1, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_2, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_2, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_2, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_2, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_3, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_3, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_3, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_3, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_4, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_4, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_4, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_4, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_5, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_5, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_5, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_5, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_6, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_6, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_6, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_6, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_7, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_7, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_7, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_7, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_8, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_8, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_8, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_8, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_9, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_9, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_9, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_9, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_10, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_10, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_11, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_11, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_12, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_12, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_12, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_12, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(aes_test_data_13, TOP_ENC) \\\n+\tTEST_EXPAND(aes_test_data_13, TOP_DEC) \\\n+\tTEST_EXPAND(aes_test_data_13, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(aes_test_data_13, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(des_test_data_1, TOP_ENC) \\\n+\tTEST_EXPAND(des_test_data_1, TOP_DEC) \\\n+\tTEST_EXPAND(des_test_data_2, TOP_ENC) \\\n+\tTEST_EXPAND(des_test_data_2, TOP_DEC) \\\n+\tTEST_EXPAND(des_test_data_3, TOP_ENC) \\\n+\tTEST_EXPAND(des_test_data_3, TOP_DEC) \\\n+\tTEST_EXPAND(triple_des128cbc_hmac_sha1_test_vector, TOP_ENC) \\\n+\tTEST_EXPAND(triple_des128cbc_hmac_sha1_test_vector, TOP_DEC) \\\n+\tTEST_EXPAND(triple_des128cbc_hmac_sha1_test_vector, TOP_ENC_AUTH) \\\n+\tTEST_EXPAND(triple_des128cbc_hmac_sha1_test_vector, TOP_AUTH_DEC) \\\n+\tTEST_EXPAND(triple_des64cbc_test_vector, TOP_ENC) \\\n+\tTEST_EXPAND(triple_des64cbc_test_vector, TOP_DEC) \\\n+\tTEST_EXPAND(triple_des128cbc_test_vector, TOP_ENC) \\\n+\tTEST_EXPAND(triple_des128cbc_test_vector, TOP_DEC) \\\n+\tTEST_EXPAND(triple_des192cbc_test_vector, TOP_ENC) \\\n+\tTEST_EXPAND(triple_des192cbc_test_vector, TOP_DEC) \\\n+\n+#define TEST_EXPAND(t, o)\t\t\t\t\t\t\\\n+static int\t\t\t\t\t\t\t\t\\\n+cpu_crypto_blockcipher_test_##t##_##o(void)\t\t\t\t\\\n+{\t\t\t\t\t\t\t\t\t\\\n+\treturn cpu_crypto_test_blockcipher(&t, o);\t\t\t\\\n+}\n+\n+all_blockcipher_test_cases\n+#undef TEST_EXPAND\n+\n+static struct unit_test_suite security_cpu_crypto_aesni_mb_testsuite  = {\n+\t.suite_name = \"Security CPU Crypto AESNI-MB Unit Test Suite\",\n+\t.setup = testsuite_setup,\n+\t.teardown = testsuite_teardown,\n+\t.unit_test_cases = {\n+#define TEST_EXPAND(t, o)\t\t\t\t\t\t\\\n+\tTEST_CASE_ST(ut_setup, ut_teardown,\t\t\t\t\\\n+\t\t\tcpu_crypto_aead_enc_test_##t##_##o),\t\t\\\n+\tTEST_CASE_ST(ut_setup, ut_teardown,\t\t\t\t\\\n+\t\t\tcpu_crypto_aead_dec_test_##t##_##o),\t\t\\\n+\n+\tall_gcm_unit_test_cases(SGL_ONE_SEG)\n+\tall_ccm_unit_test_cases\n+#undef TEST_EXPAND\n+\n+#define TEST_EXPAND(t, o)\t\t\t\t\t\t\\\n+\tTEST_CASE_ST(ut_setup, ut_teardown,\t\t\t\t\\\n+\t\t\tcpu_crypto_blockcipher_test_##t##_##o),\t\t\\\n+\n+\tall_blockcipher_test_cases\n+#undef TEST_EXPAND\n+\n+\tTEST_CASES_END() /**< NULL terminate unit test array */\n+\t},\n+};\n+\n+static int\n+test_security_cpu_crypto_aesni_mb(void)\n+{\n+\tgbl_driver_id =\trte_cryptodev_driver_id_get(\n+\t\t\tRTE_STR(CRYPTODEV_NAME_AESNI_MB_PMD));\n+\n+\treturn unit_test_suite_runner(&security_cpu_crypto_aesni_mb_testsuite);\n+}\n+\n REGISTER_TEST_COMMAND(security_aesni_gcm_autotest,\n \t\ttest_security_cpu_crypto_aesni_gcm);\n \n REGISTER_TEST_COMMAND(security_aesni_gcm_perftest,\n \t\ttest_security_cpu_crypto_aesni_gcm_perf);\n+\n+REGISTER_TEST_COMMAND(security_aesni_mb_autotest,\n+\t\ttest_security_cpu_crypto_aesni_mb);\n",
    "prefixes": [
        "06/10"
    ]
}