gpudev: add communication list
[dpdk.git] / app / test-crypto-perf / cperf_test_vectors.c
index 6307f25..dafcfc0 100644 (file)
@@ -1,8 +1,43 @@
+/* SPDX-License-Identifier: BSD-3-Clause
+ * Copyright(c) 2016-2017 Intel Corporation
+ */
+
 #include <rte_crypto.h>
 #include <rte_malloc.h>
 
 #include "cperf_test_vectors.h"
 
+/* modular operation test data */
+uint8_t perf_base[20] = {
+       0xF8, 0xBA, 0x1A, 0x55, 0xD0, 0x2F, 0x85,
+       0xAE, 0x96, 0x7B, 0xB6, 0x2F, 0xB6, 0xCD,
+       0xA8, 0xEB, 0x7E, 0x78, 0xA0, 0x50
+};
+
+uint8_t perf_mod_p[129] = {
+       0x00, 0xb3, 0xa1, 0xaf, 0xb7, 0x13, 0x08, 0x00,
+       0x0a, 0x35, 0xdc, 0x2b, 0x20, 0x8d, 0xa1, 0xb5,
+       0xce, 0x47, 0x8a, 0xc3, 0x80, 0xf4, 0x7d, 0x4a,
+       0xa2, 0x62, 0xfd, 0x61, 0x7f, 0xb5, 0xa8, 0xde,
+       0x0a, 0x17, 0x97, 0xa0, 0xbf, 0xdf, 0x56, 0x5a,
+       0x3d, 0x51, 0x56, 0x4f, 0x70, 0x70, 0x3f, 0x63,
+       0x6a, 0x44, 0x5b, 0xad, 0x84, 0x0d, 0x3f, 0x27,
+       0x6e, 0x3b, 0x34, 0x91, 0x60, 0x14, 0xb9, 0xaa,
+       0x72, 0xfd, 0xa3, 0x64, 0xd2, 0x03, 0xa7, 0x53,
+       0x87, 0x9e, 0x88, 0x0b, 0xc1, 0x14, 0x93, 0x1a,
+       0x62, 0xff, 0xb1, 0x5d, 0x74, 0xcd, 0x59, 0x63,
+       0x18, 0x11, 0x3d, 0x4f, 0xba, 0x75, 0xd4, 0x33,
+       0x4e, 0x23, 0x6b, 0x7b, 0x57, 0x44, 0xe1, 0xd3,
+       0x03, 0x13, 0xa6, 0xf0, 0x8b, 0x60, 0xb0, 0x9e,
+       0xee, 0x75, 0x08, 0x9d, 0x71, 0x63, 0x13, 0xcb,
+       0xa6, 0x81, 0x92, 0x14, 0x03, 0x22, 0x2d, 0xde,
+       0x55
+};
+
+uint8_t perf_mod_result[sizeof(perf_mod_p)];
+
+uint8_t perf_mod_e[3] = {0x01, 0x00, 0x01};
+
 uint8_t plaintext[2048] = {
        0x71, 0x75, 0x83, 0x98, 0x75, 0x42, 0x51, 0x09, 0x94, 0x02, 0x13, 0x20,
        0x15, 0x64, 0x46, 0x32, 0x08, 0x18, 0x91, 0x82, 0x86, 0x52, 0x23, 0x93,
@@ -385,9 +420,28 @@ uint8_t auth_key[] = {
        0x78, 0x79, 0x7A, 0x7B, 0x7C, 0x7D, 0x7E, 0x7F
 };
 
+/* AEAD key */
+uint8_t aead_key[] = {
+       0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B,
+       0x0C, 0x0D, 0x0E, 0x0F, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
+       0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
+};
+
 /* Digests */
 uint8_t digest[2048] = { 0x00 };
 
+uint8_t ipsec_plaintext[2048] = {
+               /* IP */
+               0x45, 0x00, 0x00, 0x28, 0xa4, 0xad, 0x40, 0x00,
+               0x40, 0x06, 0x78, 0x80, 0x0a, 0x01, 0x03, 0x8f,
+               0x0a, 0x01, 0x06, 0x12,
+
+               /* TCP */
+               0x80, 0x23, 0x06, 0xb8, 0xcb, 0x71, 0x26, 0x02,
+               0xdd, 0x6b, 0xb0, 0x3e, 0x50, 0x10, 0x16, 0xd0,
+               0x75, 0x67, 0x00, 0x01
+};
+
 struct cperf_test_vector*
 cperf_test_vector_get_dummy(struct cperf_options *options)
 {
@@ -399,102 +453,199 @@ cperf_test_vector_get_dummy(struct cperf_options *options)
                return t_vec;
 
        t_vec->plaintext.data = plaintext;
-       t_vec->plaintext.length = options->buffer_sz;
+       t_vec->plaintext.length = options->max_buffer_size;
+
+       if (options->op_type == CPERF_ASYM_MODEX) {
+               t_vec->modex.mod = perf_mod_p;
+               t_vec->modex.exp = perf_mod_e;
+               t_vec->modex.mlen = sizeof(perf_mod_p);
+               t_vec->modex.elen = sizeof(perf_mod_e);
+       }
+
+       if (options->op_type == CPERF_PDCP ||
+                       options->op_type == CPERF_IPSEC) {
+               if (options->cipher_algo == RTE_CRYPTO_CIPHER_NULL) {
+                       t_vec->cipher_key.length = 0;
+                       t_vec->ciphertext.data = plaintext;
+                       t_vec->cipher_key.data = NULL;
+               } else {
+                       t_vec->cipher_key.length = options->cipher_key_sz;
+                       t_vec->ciphertext.data = ciphertext;
+                       t_vec->cipher_key.data = cipher_key;
+               }
+
+               if (options->op_type == CPERF_IPSEC)
+                       t_vec->plaintext.data = ipsec_plaintext;
+
+               /* Init IV data ptr */
+               t_vec->cipher_iv.data = NULL;
+
+               if (options->cipher_iv_sz != 0) {
+                       /* Set IV parameters */
+                       t_vec->cipher_iv.data = rte_malloc(NULL,
+                                       options->cipher_iv_sz, 16);
+                       if (t_vec->cipher_iv.data == NULL) {
+                               rte_free(t_vec);
+                               return NULL;
+                       }
+                       memcpy(t_vec->cipher_iv.data, iv, options->cipher_iv_sz);
+               }
+               t_vec->ciphertext.length = options->max_buffer_size;
+               t_vec->cipher_iv.length = options->cipher_iv_sz;
+               t_vec->data.cipher_offset = 0;
+               t_vec->data.cipher_length = options->max_buffer_size;
+               if (options->auth_algo == RTE_CRYPTO_AUTH_NULL) {
+                       t_vec->auth_key.length = 0;
+                       t_vec->auth_key.data = NULL;
+                       t_vec->digest.data = NULL;
+                       t_vec->digest.length = 0;
+               } else {
+                       t_vec->auth_key.length = options->auth_key_sz;
+                       t_vec->auth_key.data = auth_key;
+
+                       t_vec->digest.data = rte_malloc(NULL,
+                                       options->digest_sz,
+                                       16);
+                       if (t_vec->digest.data == NULL) {
+                               rte_free(t_vec->cipher_iv.data);
+                               rte_free(t_vec);
+                               return NULL;
+                       }
+                       t_vec->digest.phys_addr =
+                               rte_malloc_virt2iova(t_vec->digest.data);
+                       t_vec->digest.length = options->digest_sz;
+                       memcpy(t_vec->digest.data, digest,
+                                       options->digest_sz);
+               }
+               t_vec->data.auth_offset = 0;
+               t_vec->data.auth_length = options->max_buffer_size;
+       }
 
        if (options->op_type == CPERF_CIPHER_ONLY ||
                        options->op_type == CPERF_CIPHER_THEN_AUTH ||
                        options->op_type == CPERF_AUTH_THEN_CIPHER ||
-                       options->op_type == CPERF_AEAD) {
+                       options->op_type == CPERF_DOCSIS) {
                if (options->cipher_algo == RTE_CRYPTO_CIPHER_NULL) {
-                       t_vec->cipher_key.length = -1;
+                       t_vec->cipher_key.length = 0;
                        t_vec->ciphertext.data = plaintext;
                        t_vec->cipher_key.data = NULL;
-                       t_vec->iv.data = NULL;
                } else {
                        t_vec->cipher_key.length = options->cipher_key_sz;
                        t_vec->ciphertext.data = ciphertext;
                        t_vec->cipher_key.data = cipher_key;
-                       t_vec->iv.data = rte_malloc(NULL, options->cipher_iv_sz,
-                                       16);
-                       if (t_vec->iv.data == NULL) {
+               }
+
+               /* Init IV data ptr */
+               t_vec->cipher_iv.data = NULL;
+
+               if (options->cipher_iv_sz != 0) {
+                       /* Set IV parameters */
+                       t_vec->cipher_iv.data = rte_malloc(NULL,
+                                       options->cipher_iv_sz, 16);
+                       if (t_vec->cipher_iv.data == NULL) {
                                rte_free(t_vec);
                                return NULL;
                        }
-                       memcpy(t_vec->iv.data, iv, options->cipher_iv_sz);
+                       memcpy(t_vec->cipher_iv.data, iv, options->cipher_iv_sz);
                }
-               t_vec->ciphertext.length = options->buffer_sz;
-               t_vec->iv.phys_addr = rte_malloc_virt2phy(t_vec->iv.data);
-               t_vec->iv.length = options->cipher_iv_sz;
+               t_vec->ciphertext.length = options->max_buffer_size;
+               t_vec->cipher_iv.length = options->cipher_iv_sz;
                t_vec->data.cipher_offset = 0;
-               t_vec->data.cipher_length = options->buffer_sz;
+               t_vec->data.cipher_length = options->max_buffer_size;
+
        }
 
        if (options->op_type == CPERF_AUTH_ONLY ||
                        options->op_type == CPERF_CIPHER_THEN_AUTH ||
-                       options->op_type == CPERF_AUTH_THEN_CIPHER ||
-                       options->op_type == CPERF_AEAD) {
-               uint8_t aad_alloc = 0;
-
-               t_vec->auth_key.length = options->auth_key_sz;
-
-               switch (options->auth_algo) {
-               case RTE_CRYPTO_AUTH_NULL:
+                       options->op_type == CPERF_AUTH_THEN_CIPHER) {
+               if (options->auth_algo == RTE_CRYPTO_AUTH_NULL) {
+                       t_vec->auth_key.length = 0;
                        t_vec->auth_key.data = NULL;
-                       aad_alloc = 0;
-                       break;
-               case RTE_CRYPTO_AUTH_AES_GCM:
-                       t_vec->auth_key.data = NULL;
-                       aad_alloc = 1;
-                       break;
-               case RTE_CRYPTO_AUTH_SNOW3G_UIA2:
-               case RTE_CRYPTO_AUTH_KASUMI_F9:
-               case RTE_CRYPTO_AUTH_ZUC_EIA3:
-                       t_vec->auth_key.data = auth_key;
-                       aad_alloc = 1;
-                       break;
-               case RTE_CRYPTO_AUTH_AES_GMAC:
-                       /* auth key should be the same as cipher key */
-                       t_vec->auth_key.data = cipher_key;
-                       aad_alloc = 1;
-                       break;
-               default:
+                       t_vec->digest.data = NULL;
+                       t_vec->digest.length = 0;
+               } else {
+                       t_vec->auth_key.length = options->auth_key_sz;
                        t_vec->auth_key.data = auth_key;
-                       aad_alloc = 0;
-                       break;
+
+                       t_vec->digest.data = rte_malloc(NULL,
+                                       options->digest_sz,
+                                       16);
+                       if (t_vec->digest.data == NULL) {
+                               rte_free(t_vec->cipher_iv.data);
+                               rte_free(t_vec);
+                               return NULL;
+                       }
+                       t_vec->digest.phys_addr =
+                               rte_malloc_virt2iova(t_vec->digest.data);
+                       t_vec->digest.length = options->digest_sz;
+                       memcpy(t_vec->digest.data, digest,
+                                       options->digest_sz);
+               }
+               t_vec->data.auth_offset = 0;
+               t_vec->data.auth_length = options->max_buffer_size;
+
+               /* Set IV parameters */
+               t_vec->auth_iv.data = rte_malloc(NULL, options->auth_iv_sz,
+                               16);
+               if (options->auth_iv_sz && t_vec->auth_iv.data == NULL) {
+                       if (options->op_type != CPERF_AUTH_ONLY)
+                               rte_free(t_vec->cipher_iv.data);
+                       rte_free(t_vec);
+                       return NULL;
                }
+               memcpy(t_vec->auth_iv.data, iv, options->auth_iv_sz);
+               t_vec->auth_iv.length = options->auth_iv_sz;
+       }
 
-               if (aad_alloc) {
+       if (options->op_type == CPERF_AEAD ||
+                       options->op_type == CPERF_IPSEC) {
+               t_vec->aead_key.length = options->aead_key_sz;
+               t_vec->aead_key.data = aead_key;
+
+               if (options->aead_aad_sz) {
                        t_vec->aad.data = rte_malloc(NULL,
-                                       options->auth_aad_sz, 16);
+                                       options->aead_aad_sz, 16);
                        if (t_vec->aad.data == NULL) {
-                               if (options->op_type != CPERF_AUTH_ONLY)
-                                       rte_free(t_vec->iv.data);
                                rte_free(t_vec);
                                return NULL;
                        }
-                       memcpy(t_vec->aad.data, aad, options->auth_aad_sz);
+
+                       if (options->aead_aad_sz > sizeof(aad))
+                               options->aead_aad_sz = sizeof(aad);
+
+                       memcpy(t_vec->aad.data, aad, options->aead_aad_sz);
+                       t_vec->aad.phys_addr = rte_malloc_virt2iova(t_vec->aad.data);
+                       t_vec->aad.length = options->aead_aad_sz;
                } else {
                        t_vec->aad.data = NULL;
+                       t_vec->aad.length = 0;
                }
 
-               t_vec->aad.phys_addr = rte_malloc_virt2phy(t_vec->aad.data);
-               t_vec->aad.length = options->auth_aad_sz;
-               t_vec->digest.data = rte_malloc(NULL, options->auth_digest_sz,
-                               16);
+               t_vec->digest.data = rte_malloc(NULL, options->digest_sz,
+                                               16);
                if (t_vec->digest.data == NULL) {
-                       if (options->op_type != CPERF_AUTH_ONLY)
-                               rte_free(t_vec->iv.data);
                        rte_free(t_vec->aad.data);
                        rte_free(t_vec);
                        return NULL;
                }
                t_vec->digest.phys_addr =
-                               rte_malloc_virt2phy(t_vec->digest.data);
-               t_vec->digest.length = options->auth_digest_sz;
-               memcpy(t_vec->digest.data, digest, options->auth_digest_sz);
-               t_vec->data.auth_offset = 0;
-               t_vec->data.auth_length = options->buffer_sz;
-       }
+                               rte_malloc_virt2iova(t_vec->digest.data);
+               t_vec->digest.length = options->digest_sz;
+               memcpy(t_vec->digest.data, digest, options->digest_sz);
+               t_vec->data.aead_offset = 0;
+               t_vec->data.aead_length = options->max_buffer_size;
 
+               /* Set IV parameters */
+               t_vec->aead_iv.data = rte_malloc(NULL, options->aead_iv_sz,
+                               16);
+               if (options->aead_iv_sz && t_vec->aead_iv.data == NULL) {
+                       rte_free(t_vec->aad.data);
+                       rte_free(t_vec->digest.data);
+                       rte_free(t_vec);
+                       return NULL;
+               }
+               memcpy(t_vec->aead_iv.data, iv, options->aead_iv_sz);
+               t_vec->aead_iv.length = options->aead_iv_sz;
+       }
        return t_vec;
 }