test/event_crypto: no service core when HW support available
[dpdk.git] / app / test / test_event_crypto_adapter.c
index 7365502..ed8a58d 100644 (file)
@@ -199,8 +199,9 @@ test_op_forward_mode(uint8_t session_less)
                TEST_ASSERT_NOT_NULL(sess, "Session creation failed\n");
 
                /* Create Crypto session*/
-               rte_cryptodev_sym_session_init(TEST_CDEV_ID, sess,
+               ret = rte_cryptodev_sym_session_init(TEST_CDEV_ID, sess,
                                &cipher_xform, params.session_priv_mpool);
+               TEST_ASSERT_SUCCESS(ret, "Failed to init session\n");
 
                ret = rte_event_crypto_adapter_caps_get(TEST_ADAPTER_ID,
                                                        evdev, &cap);
@@ -292,7 +293,8 @@ test_sessionless_with_op_forward_mode(void)
        ret = rte_event_crypto_adapter_caps_get(TEST_ADAPTER_ID, evdev, &cap);
        TEST_ASSERT_SUCCESS(ret, "Failed to get adapter capabilities\n");
 
-       if (!(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD))
+       if (!(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD) &&
+           !(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_NEW))
                map_adapter_service_core();
 
        TEST_ASSERT_SUCCESS(rte_event_crypto_adapter_start(TEST_ADAPTER_ID),
@@ -312,7 +314,8 @@ test_session_with_op_forward_mode(void)
        ret = rte_event_crypto_adapter_caps_get(TEST_ADAPTER_ID, evdev, &cap);
        TEST_ASSERT_SUCCESS(ret, "Failed to get adapter capabilities\n");
 
-       if (!(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD))
+       if (!(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD) &&
+           !(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_NEW))
                map_adapter_service_core();
 
        TEST_ASSERT_SUCCESS(rte_event_crypto_adapter_start(TEST_ADAPTER_ID
@@ -398,8 +401,10 @@ test_op_new_mode(uint8_t session_less)
                        rte_cryptodev_sym_session_set_user_data(sess,
                                                &m_data, sizeof(m_data));
                }
-               rte_cryptodev_sym_session_init(TEST_CDEV_ID, sess,
+               ret = rte_cryptodev_sym_session_init(TEST_CDEV_ID, sess,
                                &cipher_xform, params.session_priv_mpool);
+               TEST_ASSERT_SUCCESS(ret, "Failed to init session\n");
+
                rte_crypto_op_attach_sym_session(op, sess);
        } else {
                struct rte_crypto_sym_xform *first_xform;
@@ -438,7 +443,7 @@ test_sessionless_with_op_new_mode(void)
        ret = rte_event_crypto_adapter_caps_get(TEST_ADAPTER_ID, evdev, &cap);
        TEST_ASSERT_SUCCESS(ret, "Failed to get adapter capabilities\n");
 
-       if (!(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD) ||
+       if (!(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD) &&
            !(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_NEW))
                map_adapter_service_core();
 
@@ -460,7 +465,7 @@ test_session_with_op_new_mode(void)
        ret = rte_event_crypto_adapter_caps_get(TEST_ADAPTER_ID, evdev, &cap);
        TEST_ASSERT_SUCCESS(ret, "Failed to get adapter capabilities\n");
 
-       if (!(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD) ||
+       if (!(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD) &&
            !(cap & RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_NEW))
                map_adapter_service_core();