gpudev: add communication list
[dpdk.git] / app / test-crypto-perf / cperf_test_vectors.c
index 1af9524..dafcfc0 100644 (file)
@@ -7,6 +7,37 @@
 
 #include "cperf_test_vectors.h"
 
+/* modular operation test data */
+uint8_t perf_base[20] = {
+       0xF8, 0xBA, 0x1A, 0x55, 0xD0, 0x2F, 0x85,
+       0xAE, 0x96, 0x7B, 0xB6, 0x2F, 0xB6, 0xCD,
+       0xA8, 0xEB, 0x7E, 0x78, 0xA0, 0x50
+};
+
+uint8_t perf_mod_p[129] = {
+       0x00, 0xb3, 0xa1, 0xaf, 0xb7, 0x13, 0x08, 0x00,
+       0x0a, 0x35, 0xdc, 0x2b, 0x20, 0x8d, 0xa1, 0xb5,
+       0xce, 0x47, 0x8a, 0xc3, 0x80, 0xf4, 0x7d, 0x4a,
+       0xa2, 0x62, 0xfd, 0x61, 0x7f, 0xb5, 0xa8, 0xde,
+       0x0a, 0x17, 0x97, 0xa0, 0xbf, 0xdf, 0x56, 0x5a,
+       0x3d, 0x51, 0x56, 0x4f, 0x70, 0x70, 0x3f, 0x63,
+       0x6a, 0x44, 0x5b, 0xad, 0x84, 0x0d, 0x3f, 0x27,
+       0x6e, 0x3b, 0x34, 0x91, 0x60, 0x14, 0xb9, 0xaa,
+       0x72, 0xfd, 0xa3, 0x64, 0xd2, 0x03, 0xa7, 0x53,
+       0x87, 0x9e, 0x88, 0x0b, 0xc1, 0x14, 0x93, 0x1a,
+       0x62, 0xff, 0xb1, 0x5d, 0x74, 0xcd, 0x59, 0x63,
+       0x18, 0x11, 0x3d, 0x4f, 0xba, 0x75, 0xd4, 0x33,
+       0x4e, 0x23, 0x6b, 0x7b, 0x57, 0x44, 0xe1, 0xd3,
+       0x03, 0x13, 0xa6, 0xf0, 0x8b, 0x60, 0xb0, 0x9e,
+       0xee, 0x75, 0x08, 0x9d, 0x71, 0x63, 0x13, 0xcb,
+       0xa6, 0x81, 0x92, 0x14, 0x03, 0x22, 0x2d, 0xde,
+       0x55
+};
+
+uint8_t perf_mod_result[sizeof(perf_mod_p)];
+
+uint8_t perf_mod_e[3] = {0x01, 0x00, 0x01};
+
 uint8_t plaintext[2048] = {
        0x71, 0x75, 0x83, 0x98, 0x75, 0x42, 0x51, 0x09, 0x94, 0x02, 0x13, 0x20,
        0x15, 0x64, 0x46, 0x32, 0x08, 0x18, 0x91, 0x82, 0x86, 0x52, 0x23, 0x93,
@@ -399,6 +430,18 @@ uint8_t aead_key[] = {
 /* Digests */
 uint8_t digest[2048] = { 0x00 };
 
+uint8_t ipsec_plaintext[2048] = {
+               /* IP */
+               0x45, 0x00, 0x00, 0x28, 0xa4, 0xad, 0x40, 0x00,
+               0x40, 0x06, 0x78, 0x80, 0x0a, 0x01, 0x03, 0x8f,
+               0x0a, 0x01, 0x06, 0x12,
+
+               /* TCP */
+               0x80, 0x23, 0x06, 0xb8, 0xcb, 0x71, 0x26, 0x02,
+               0xdd, 0x6b, 0xb0, 0x3e, 0x50, 0x10, 0x16, 0xd0,
+               0x75, 0x67, 0x00, 0x01
+};
+
 struct cperf_test_vector*
 cperf_test_vector_get_dummy(struct cperf_options *options)
 {
@@ -412,9 +455,76 @@ cperf_test_vector_get_dummy(struct cperf_options *options)
        t_vec->plaintext.data = plaintext;
        t_vec->plaintext.length = options->max_buffer_size;
 
+       if (options->op_type == CPERF_ASYM_MODEX) {
+               t_vec->modex.mod = perf_mod_p;
+               t_vec->modex.exp = perf_mod_e;
+               t_vec->modex.mlen = sizeof(perf_mod_p);
+               t_vec->modex.elen = sizeof(perf_mod_e);
+       }
+
+       if (options->op_type == CPERF_PDCP ||
+                       options->op_type == CPERF_IPSEC) {
+               if (options->cipher_algo == RTE_CRYPTO_CIPHER_NULL) {
+                       t_vec->cipher_key.length = 0;
+                       t_vec->ciphertext.data = plaintext;
+                       t_vec->cipher_key.data = NULL;
+               } else {
+                       t_vec->cipher_key.length = options->cipher_key_sz;
+                       t_vec->ciphertext.data = ciphertext;
+                       t_vec->cipher_key.data = cipher_key;
+               }
+
+               if (options->op_type == CPERF_IPSEC)
+                       t_vec->plaintext.data = ipsec_plaintext;
+
+               /* Init IV data ptr */
+               t_vec->cipher_iv.data = NULL;
+
+               if (options->cipher_iv_sz != 0) {
+                       /* Set IV parameters */
+                       t_vec->cipher_iv.data = rte_malloc(NULL,
+                                       options->cipher_iv_sz, 16);
+                       if (t_vec->cipher_iv.data == NULL) {
+                               rte_free(t_vec);
+                               return NULL;
+                       }
+                       memcpy(t_vec->cipher_iv.data, iv, options->cipher_iv_sz);
+               }
+               t_vec->ciphertext.length = options->max_buffer_size;
+               t_vec->cipher_iv.length = options->cipher_iv_sz;
+               t_vec->data.cipher_offset = 0;
+               t_vec->data.cipher_length = options->max_buffer_size;
+               if (options->auth_algo == RTE_CRYPTO_AUTH_NULL) {
+                       t_vec->auth_key.length = 0;
+                       t_vec->auth_key.data = NULL;
+                       t_vec->digest.data = NULL;
+                       t_vec->digest.length = 0;
+               } else {
+                       t_vec->auth_key.length = options->auth_key_sz;
+                       t_vec->auth_key.data = auth_key;
+
+                       t_vec->digest.data = rte_malloc(NULL,
+                                       options->digest_sz,
+                                       16);
+                       if (t_vec->digest.data == NULL) {
+                               rte_free(t_vec->cipher_iv.data);
+                               rte_free(t_vec);
+                               return NULL;
+                       }
+                       t_vec->digest.phys_addr =
+                               rte_malloc_virt2iova(t_vec->digest.data);
+                       t_vec->digest.length = options->digest_sz;
+                       memcpy(t_vec->digest.data, digest,
+                                       options->digest_sz);
+               }
+               t_vec->data.auth_offset = 0;
+               t_vec->data.auth_length = options->max_buffer_size;
+       }
+
        if (options->op_type == CPERF_CIPHER_ONLY ||
                        options->op_type == CPERF_CIPHER_THEN_AUTH ||
-                       options->op_type == CPERF_AUTH_THEN_CIPHER) {
+                       options->op_type == CPERF_AUTH_THEN_CIPHER ||
+                       options->op_type == CPERF_DOCSIS) {
                if (options->cipher_algo == RTE_CRYPTO_CIPHER_NULL) {
                        t_vec->cipher_key.length = 0;
                        t_vec->ciphertext.data = plaintext;
@@ -487,7 +597,8 @@ cperf_test_vector_get_dummy(struct cperf_options *options)
                t_vec->auth_iv.length = options->auth_iv_sz;
        }
 
-       if (options->op_type == CPERF_AEAD) {
+       if (options->op_type == CPERF_AEAD ||
+                       options->op_type == CPERF_IPSEC) {
                t_vec->aead_key.length = options->aead_key_sz;
                t_vec->aead_key.data = aead_key;
 
@@ -498,6 +609,10 @@ cperf_test_vector_get_dummy(struct cperf_options *options)
                                rte_free(t_vec);
                                return NULL;
                        }
+
+                       if (options->aead_aad_sz > sizeof(aad))
+                               options->aead_aad_sz = sizeof(aad);
+
                        memcpy(t_vec->aad.data, aad, options->aead_aad_sz);
                        t_vec->aad.phys_addr = rte_malloc_virt2iova(t_vec->aad.data);
                        t_vec->aad.length = options->aead_aad_sz;