index 0da955f09037952320301169b5606cd2e1a864d3..8b4fd2fbf47f848801cd4b9f6600ebf20b7874fe 100644 (file)
#include "../unittest.h"
#include "../testconn.h"
#include "../salldsim/salldcfg.h"
+#include <inttypes.h>
/* Data Mode Basic Functional test.
* This test is designed to verify the basic opertions of Data Mode
#if defined (NSS_LITE2)
/* Enable the console print post silicon */
#define ENABLE_TPUT_CONSOLE_PRINT 1
-
/*
* Throughput collection arrary
*/
#define SAU_TPUT_MAX_CHANNELS (sizeof(testDmCfg)/sizeof(sauDataModeConfig_t))
+/* Internal data strucure */
+typedef struct sauMetaData_s
+{
+ char cipherMode[80];
+ char authMode[80];
+ uint32_t encKeySize;
+ uint32_t macKeySize;
+}sauMetaDataInfo_t;
+
+/* Internal functions */
+static void sauDataModeGetMetaDataFromConnId(uint32_t connId, sauMetaDataInfo_t *metaData);
+static void sauDataModeGetMetaDataFromConnId(uint32_t connId, sauMetaDataInfo_t *metaData)
+{
+ Sa_CipherMode_e cipherMode;
+ Sa_AuthMode_e authMode;
+ cipherMode = testDmCfg[connId].cipherMode;
+ authMode = testDmCfg[connId].authMode;
+ metaData->encKeySize = testDmCfg[connId].encKeySize;
+ metaData->macKeySize = testDmCfg[connId].macKeySize;
+
+ switch (cipherMode)
+ {
+ case sa_CipherMode_AES_CTR:
+ strncpy(metaData->cipherMode, "CipherMode_AES_CTR", 40);
+ break;
+ case sa_CipherMode_AES_F8:
+ strncpy(metaData->cipherMode, "CipherMode_AES_F8", 40);
+ break;
+ case sa_CipherMode_AES_CBC:
+ strncpy(metaData->cipherMode, "CipherMode_AES_CBC", 40);
+ break;
+ case sa_CipherMode_DES_CBC:
+ strncpy(metaData->cipherMode, "CipherMode_DES_CBC", 40);
+ break;
+ case sa_CipherMode_3DES_CBC:
+ strncpy(metaData->cipherMode, "CipherMode_3DES_CBC", 40);
+ break;
+ case sa_CipherMode_CCM:
+ strncpy(metaData->cipherMode, "CipherMode_CCM", 40);
+ break;
+ case sa_CipherMode_GCM:
+ strncpy(metaData->cipherMode, "CipherMode_GCM", 40);
+ break;
+ case sa_CipherMode_GSM_A53:
+ strncpy(metaData->cipherMode, "CipherMode_GSM_A53", 40);
+ break;
+ case sa_CipherMode_ECSD_A53:
+ strncpy(metaData->cipherMode, "CipherMode_ECSD_A53", 40);
+ break;
+ case sa_CipherMode_GEA3:
+ strncpy(metaData->cipherMode, "CipherMode_GEA3", 40);
+ break;
+ case sa_CipherMode_KASUMI_F8:
+ strncpy(metaData->cipherMode, "CipherMode_KASUMI_F8", 40);
+ break;
+ case sa_CipherMode_SNOW3G_F8:
+ strncpy(metaData->cipherMode, "CipherMode_SNOW3G_F8", 40);
+ break;
+ case sa_CipherMode_ZUC_F8:
+ strncpy(metaData->cipherMode, "CipherMode_ZUC_F8", 40);
+ break;
+ case sa_CipherMode_NULL:
+ default:
+ strncpy(metaData->cipherMode, "CipherMode_NULL", 40);
+ break;
+ }
+
+ switch (authMode)
+ {
+ case sa_AuthMode_MD5:
+ strncpy(metaData->authMode, "AuthMode_MD5", 40);
+ break;
+ case sa_AuthMode_SHA1:
+ strncpy(metaData->authMode, "AuthMode_SHA1", 40);
+ break;
+ case sa_AuthMode_SHA2_224:
+ strncpy(metaData->authMode, "AuthMode_SHA2_224", 40);
+ break;
+ case sa_AuthMode_SHA2_256:
+ strncpy(metaData->authMode, "AuthMode_SHA2_256", 40);
+ break;
+ case sa_AuthMode_SHA2_384:
+ strncpy(metaData->authMode, "AuthMode_SHA2_384", 40);
+ break;
+ case sa_AuthMode_SHA2_512:
+ strncpy(metaData->authMode, "AuthMode_SHA2_512", 40);
+ break;
+ case sa_AuthMode_HMAC_MD5:
+ strncpy(metaData->authMode, "AuthMode_HMAC_MD5", 40);
+ break;
+ case sa_AuthMode_HMAC_SHA1:
+ strncpy(metaData->authMode, "AuthMode_HMAC_SHA1", 40);
+ break;
+ case sa_AuthMode_HMAC_SHA2_224:
+ strncpy(metaData->authMode, "AuthMode_HMAC_SHA2_224", 40);
+ break;
+ case sa_AuthMode_HMAC_SHA2_256:
+ strncpy(metaData->authMode, "AuthMode_HMAC_SHA2_256", 40);
+ break;
+ case sa_AuthMode_HMAC_SHA2_384:
+ strncpy(metaData->authMode, "AuthMode_HMAC_SHA2_384", 40);
+ break;
+ case sa_AuthMode_HMAC_SHA2_512:
+ strncpy(metaData->authMode, "AuthMode_HMAC_SHA2_512", 40);
+ break;
+ case sa_AuthMode_GMAC:
+ strncpy(metaData->authMode, "AuthMode_GMAC", 40);
+ break;
+ case sa_AuthMode_GMAC_AH:
+ strncpy(metaData->authMode, "AuthMode_GMAC_AH", 40);
+ break;
+ case sa_AuthMode_CMAC:
+ strncpy(metaData->authMode, "AuthMode_CMAC", 40);
+ break;
+ case sa_AuthMode_CBC_MAC:
+ strncpy(metaData->authMode, "AuthMode_CBC_MAC", 40);
+ break;
+ case sa_AuthMode_AES_XCBC:
+ strncpy(metaData->authMode, "AuthMode_AES_XCBC", 40);
+ break;
+ case sa_AuthMode_KASUMI_F9:
+ strncpy(metaData->authMode, "AuthMode_KASUMI_F9", 40);
+ break;
+ case sa_AuthMode_SNOW3G_F9:
+ strncpy(metaData->authMode, "AuthMode_SNOW3G_F9", 40);
+ break;
+ case sa_AuthMode_ZUC_F9:
+ strncpy(metaData->authMode, "AuthMode_ZUC_F9", 40);
+ break;
+ case sa_AuthMode_NULL:
+ default:
+ strncpy(metaData->authMode, "AuthMode_NULL", 40);
+ break;
+ }
+
+ return;
+}
+
/* SA Data Mode Basic Functional test */
void saDataModeTest (UArg a0, UArg a1)
{
#if ENABLE_TPUT_CONSOLE_PRINT
/* Summarize the throughput test results */
- SALog(" BenchMark Results: \n \
- ChNo PktLen NumPkts Mega Bits Per Sec \n \
- ======== ======== ======== ================ \n ");
+ SALog(" BenchMark Results: \n");
+ SALog(" ================== \n ");
System_flush();
for (i = 0; i < SAU_TPUT_NUM_PKTSIZES; i++)
{
+ sauMetaDataInfo_t mData;
for (j = 0; j < SAU_TPUT_MAX_CHANNELS; j++)
{
-
- SALog(" %d, %d, %d, %d \n", \
- gSauTputData[i][j].connId, \
+ sauDataModeGetMetaDataFromConnId(gSauTputData[i][j].connId, &mData);
+ SALog(" %s,\t\t%s,\t\t%d,\t\t%d,\t\t%d,\t\t%d,\t\t%d, \n", \
+ mData.cipherMode, \
+ mData.authMode,
gSauTputData[i][j].pktLen, \
gSauTputData[i][j].numPkts, \
- gSauTputData[i][j].MegaBps \
+ gSauTputData[i][j].cycles,\
+ gSauTputData[i][j].ringPushCycles,\
+ gSauTputData[i][j].ringPopCycles\
);
System_flush();
}