<div dir="ltr">Recheck-request: iol-mellanox-Performance<br><br>When I enabled this test on Monday I accidentally set the delta threshold to 1.5% instead of 5%. So the accepted results window was too small and led to this false positive test fail.<br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Wed, Sep 25, 2024 at 3:30 PM Arkadiusz Kusztal <<a href="mailto:arkadiuszx.kusztal@intel.com">arkadiuszx.kusztal@intel.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">This commit introduces several changes to the cryptodev<br>
test cases that should make it easier to maintain.<br>
<br>
Changes included in this patch:<br>
- If not needed by the specific test case, the device should be<br>
started/stopped in the particular testsuite setup/teardown<br>
function.<br>
- Most of the remaining test vectors were moved from test.c file<br>
to the specific header vector files.<br>
- Part of GCM redundant functions were replaced by named test cases.<br>
- Unit tests do not need to check for the symmetric cryptography feature,<br>
if this feature were not present, the test should not even reach this stage.<br>
<br>
Signed-off-by: Arkadiusz Kusztal <<a href="mailto:arkadiuszx.kusztal@intel.com" target="_blank">arkadiuszx.kusztal@intel.com</a>><br>
---<br>
Please note that this is work in progress, what is left to be done:<br>
- Rework security test cases, these will fail with current setup.<br>
- Fix OOP issue. OOP tests do not check for the prepended data in the OOP buffer.<br>
- Remove remaining test vectors from the .c file.<br>
- Remove redundant test functions that call common function, replace with named test cases.<br>
- Refactor block cipher functions, there are only three block cipher algorithms in the cryptodev.<br>
<br>
 app/test/test_cryptodev.c                   | 1913 +++++++++++----------------<br>
 app/test/test_cryptodev.h                   |    6 +-<br>
 app/test/test_cryptodev_aead_test_vectors.h |    1 +<br>
 app/test/test_cryptodev_aes_test_vectors.h  |  106 ++<br>
 app/test/test_cryptodev_blockcipher.c       |   28 +-<br>
 app/test/test_cryptodev_hmac_test_vectors.h |   75 ++<br>
 6 files changed, 1001 insertions(+), 1128 deletions(-)<br>
<br>
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c<br>
index c846b26ed1..e9adf95c98 100644<br>
--- a/app/test/test_cryptodev.c<br>
+++ b/app/test/test_cryptodev.c<br>
@@ -85,7 +85,6 @@ struct crypto_unittest_params {<br>
 #ifdef RTE_LIB_SECURITY<br>
        struct rte_security_docsis_xform docsis_xform;<br>
 #endif<br>
-<br>
        union {<br>
                void *sess;<br>
 #ifdef RTE_LIB_SECURITY<br>
@@ -96,11 +95,9 @@ struct crypto_unittest_params {<br>
        enum rte_security_session_action_type type;<br>
 #endif<br>
        struct rte_crypto_op *op;<br>
-<br>
        struct rte_mbuf *obuf, *ibuf;<br>
-<br>
        uint8_t *digest;<br>
-};<br>
+} unittest_params, *self = &unittest_params;<br>
<br>
 #define ALIGN_POW2_ROUNDUP(num, align) \<br>
        (((num) + (align) - 1) & ~((align) - 1))<br>
@@ -121,6 +118,9 @@ struct crypto_unittest_params {<br>
 /*<br>
  * Forward declarations.<br>
  */<br>
+static inline void<br>
+ext_mbuf_memzone_free(int nb_segs);<br>
+<br>
 static int<br>
 test_AES_CBC_HMAC_SHA512_decrypt_create_session_params(<br>
                struct crypto_unittest_params *ut_params, uint8_t *cipher_key,<br>
@@ -196,9 +196,8 @@ post_process_raw_dp_op(void *user_data,     uint32_t index __rte_unused,<br>
                        RTE_CRYPTO_OP_STATUS_ERROR;<br>
 }<br>
<br>
-static struct crypto_testsuite_params testsuite_params = { NULL };<br>
-struct crypto_testsuite_params *p_testsuite_params = &testsuite_params;<br>
-static struct crypto_unittest_params unittest_params;<br>
+static struct crypto_testsuite_params testsuite_params = { .dev_id = -1 };<br>
+struct crypto_testsuite_params *p_ts_params = &testsuite_params;<br>
 static bool enq_cb_called;<br>
 static bool deq_cb_called;<br>
<br>
@@ -558,12 +557,16 @@ process_crypto_request(uint8_t dev_id, struct rte_crypto_op *op)<br>
        return op;<br>
 }<br>
<br>
+/*<br>
+ * Setup/teardown functions of the entire testsuite file<br>
+ */<br>
+<br>
 static int<br>
 testsuite_setup(void)<br>
 {<br>
        struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
        struct rte_cryptodev_info info;<br>
-       uint32_t i = 0, nb_devs, dev_id;<br>
+       uint32_t i = 0, nb_devs;<br>
        uint16_t qp_id;<br>
<br>
        memset(ts_params, 0, sizeof(*ts_params));<br>
@@ -631,22 +634,26 @@ testsuite_setup(void)<br>
        if (ts_params->valid_dev_count < 1)<br>
                return TEST_FAILED;<br>
<br>
-       /* Set up all the qps on the first of the valid devices found */<br>
-<br>
-       dev_id = ts_params->valid_devs[0];<br>
-<br>
-       rte_cryptodev_info_get(dev_id, &info);<br>
+       ts_params->dev_id = ts_params->valid_devs[0];<br>
+       rte_cryptodev_info_get(ts_params->dev_id, &ts_params->dev_info);<br>
+       /* Check if this device does not support symmetric crypto */<br>
+       if (!(ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO)) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for AES GCM "<br>
+                               "testsuite not met\n");<br>
+               return TEST_SKIPPED;<br>
+       }<br>
<br>
-       ts_params->conf.nb_queue_pairs = info.max_nb_queue_pairs;<br>
+       /* Set up all the qps on the first of the valid devices found */<br>
+       ts_params->conf.nb_queue_pairs = ts_params->dev_info.max_nb_queue_pairs;<br>
        ts_params->conf.socket_id = SOCKET_ID_ANY;<br>
        ts_params->conf.ff_disable = RTE_CRYPTODEV_FF_SECURITY;<br>
<br>
        unsigned int session_size =<br>
-               rte_cryptodev_sym_get_private_session_size(dev_id);<br>
+               rte_cryptodev_sym_get_private_session_size(ts_params->dev_id);<br>
<br>
 #ifdef RTE_LIB_SECURITY<br>
        unsigned int security_session_size = rte_security_session_get_size(<br>
-                       rte_cryptodev_get_sec_ctx(dev_id));<br>
+                       rte_cryptodev_get_sec_ctx(ts_params->dev_id));<br>
<br>
        if (session_size < security_session_size)<br>
                session_size = security_session_size;<br>
@@ -654,8 +661,8 @@ testsuite_setup(void)<br>
        /*<br>
         * Create mempool with maximum number of sessions.<br>
         */<br>
-       if (info.sym.max_nb_sessions != 0 &&<br>
-                       info.sym.max_nb_sessions < MAX_NB_SESSIONS) {<br>
+       if (ts_params->dev_info.sym.max_nb_sessions != 0 &&<br>
+                       ts_params->dev_info.sym.max_nb_sessions < MAX_NB_SESSIONS) {<br>
                RTE_LOG(ERR, USER1, "Device does not support "<br>
                                "at least %u sessions\n",<br>
                                MAX_NB_SESSIONS);<br>
@@ -668,22 +675,30 @@ testsuite_setup(void)<br>
        TEST_ASSERT_NOT_NULL(ts_params->session_mpool,<br>
                        "session mempool allocation failed");<br>
<br>
-       TEST_ASSERT_SUCCESS(rte_cryptodev_configure(dev_id,<br>
+       TEST_ASSERT_SUCCESS(rte_cryptodev_configure(ts_params->dev_id,<br>
                        &ts_params->conf),<br>
                        "Failed to configure cryptodev %u with %u qps",<br>
-                       dev_id, ts_params->conf.nb_queue_pairs);<br>
+                       ts_params->dev_id, ts_params->conf.nb_queue_pairs);<br>
<br>
        ts_params->qp_conf.nb_descriptors = MAX_NUM_OPS_INFLIGHT;<br>
        ts_params->qp_conf.mp_session = ts_params->session_mpool;<br>
<br>
-       for (qp_id = 0; qp_id < info.max_nb_queue_pairs; qp_id++) {<br>
+       for (qp_id = 0; qp_id < ts_params->dev_info.max_nb_queue_pairs; qp_id++) {<br>
                TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(<br>
-                       dev_id, qp_id, &ts_params->qp_conf,<br>
-                       rte_cryptodev_socket_id(dev_id)),<br>
+                       ts_params->dev_id, qp_id, &ts_params->qp_conf,<br>
+                       rte_cryptodev_socket_id(ts_params->dev_id)),<br>
                        "Failed to setup queue pair %u on cryptodev %u",<br>
-                       qp_id, dev_id);<br>
+                       qp_id, ts_params->dev_id);<br>
        }<br>
<br>
+       rte_cryptodev_stats_reset(ts_params->dev_id);<br>
+<br>
+       /* Start the device */<br>
+       TEST_ASSERT_SUCCESS(rte_cryptodev_start(ts_params->dev_id),<br>
+                       "Failed to start cryptodev %u",<br>
+                       ts_params->dev_id);<br>
+<br>
+<br>
        return TEST_SUCCESS;<br>
 }<br>
<br>
@@ -708,432 +723,440 @@ testsuite_teardown(void)<br>
                ts_params->session_mpool = NULL;<br>
        }<br>
<br>
+       rte_cryptodev_stop(ts_params->valid_devs[0]);<br>
        res = rte_cryptodev_close(ts_params->valid_devs[0]);<br>
        if (res)<br>
                RTE_LOG(ERR, USER1, "Crypto device close error %d\n", res);<br>
 }<br>
<br>
 static int<br>
-check_capabilities_supported(enum rte_crypto_sym_xform_type type,<br>
-               const int *algs, uint16_t num_algs)<br>
+dev_configure_and_start(uint64_t ff_disable)<br>
 {<br>
-       uint8_t dev_id = testsuite_params.valid_devs[0];<br>
-       bool some_alg_supported = FALSE;<br>
-       uint16_t i;<br>
+       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
+       struct crypto_unittest_params *ut_params = &unittest_params;<br>
<br>
-       for (i = 0; i < num_algs && !some_alg_supported; i++) {<br>
-               struct rte_cryptodev_sym_capability_idx alg = {<br>
-                       type, {algs[i]}<br>
-               };<br>
-               if (rte_cryptodev_sym_capability_get(dev_id,<br>
-                               &alg) != NULL)<br>
-                       some_alg_supported = TRUE;<br>
+       uint16_t qp_id;<br>
+<br>
+       /* Clear unit test parameters before running test */<br>
+       memset(ut_params, 0, sizeof(*ut_params));<br>
+<br>
+       /* Reconfigure device to default parameters */<br>
+       ts_params->conf.socket_id = SOCKET_ID_ANY;<br>
+       ts_params->conf.ff_disable = ff_disable;<br>
+       ts_params->qp_conf.nb_descriptors = MAX_NUM_OPS_INFLIGHT;<br>
+       ts_params->qp_conf.mp_session = ts_params->session_mpool;<br>
+<br>
+       TEST_ASSERT_SUCCESS(rte_cryptodev_configure(ts_params->valid_devs[0],<br>
+                       &ts_params->conf),<br>
+                       "Failed to configure cryptodev %u",<br>
+                       ts_params->valid_devs[0]);<br>
+<br>
+       for (qp_id = 0; qp_id < ts_params->conf.nb_queue_pairs ; qp_id++) {<br>
+               TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(<br>
+                       ts_params->valid_devs[0], qp_id,<br>
+                       &ts_params->qp_conf,<br>
+                       rte_cryptodev_socket_id(ts_params->valid_devs[0])),<br>
+                       "Failed to setup queue pair %u on cryptodev %u",<br>
+                       qp_id, ts_params->valid_devs[0]);<br>
        }<br>
-       if (!some_alg_supported)<br>
-               return TEST_SKIPPED;<br>
<br>
-       return 0;<br>
-}<br>
+       rte_cryptodev_stats_reset(ts_params->valid_devs[0]);<br>
<br>
-int<br>
-check_cipher_capabilities_supported(const enum rte_crypto_cipher_algorithm *ciphers,<br>
-               uint16_t num_ciphers)<br>
-{<br>
-       return check_capabilities_supported(RTE_CRYPTO_SYM_XFORM_CIPHER,<br>
-                       (const int *) ciphers, num_ciphers);<br>
+       /* Start the device */<br>
+       TEST_ASSERT_SUCCESS(rte_cryptodev_start(ts_params->valid_devs[0]),<br>
+                       "Failed to start cryptodev %u",<br>
+                       ts_params->valid_devs[0]);<br>
+<br>
+       /* Generate Crypto op data structure */<br>
+       ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,<br>
+                       RTE_CRYPTO_OP_TYPE_SYMMETRIC);<br>
+       TEST_ASSERT_NOT_NULL(ut_params->op,<br>
+                       "Failed to allocate symmetric crypto operation struct");<br>
+<br>
+       return TEST_SUCCESS;<br>
 }<br>
<br>
-int<br>
-check_auth_capabilities_supported(const enum rte_crypto_auth_algorithm *auths,<br>
-               uint16_t num_auths)<br>
+/*<br>
+ * Configure and start the device, configure single (first) queue pair<br>
+ */<br>
+static int<br>
+dev_start(void)<br>
 {<br>
-       return check_capabilities_supported(RTE_CRYPTO_SYM_XFORM_AUTH,<br>
-                       (const int *) auths, num_auths);<br>
+       int qp_id = 0;<br>
+       struct rte_cryptodev_config conf = {<br>
+               .socket_id = SOCKET_ID_ANY,<br>
+               .nb_queue_pairs = 1,<br>
+       };<br>
+       const struct rte_cryptodev_qp_conf qp_conf = {<br>
+               .nb_descriptors = MAX_NUM_OPS_INFLIGHT,<br>
+               .mp_session = p_ts_params->session_mpool<br>
+       };<br>
+<br>
+       TEST_ASSERT_SUCCESS(<br>
+               rte_cryptodev_configure(<br>
+                       p_ts_params->dev_id, &conf<br>
+               ),<br>
+               "Failed to configure cryptodev %u",<br>
+               p_ts_params->dev_id<br>
+       );<br>
+       TEST_ASSERT_SUCCESS(<br>
+               rte_cryptodev_queue_pair_setup(<br>
+                       p_ts_params->dev_id, qp_id, &qp_conf,<br>
+                       rte_cryptodev_socket_id(p_ts_params->dev_id)<br>
+               ),<br>
+               "Failed to setup queue pair %u on cryptodev %u",<br>
+               qp_id, p_ts_params->dev_id<br>
+       );<br>
+       rte_cryptodev_stats_reset(p_ts_params->dev_id);<br>
+       TEST_ASSERT_SUCCESS(<br>
+               rte_cryptodev_start(<br>
+                       p_ts_params->dev_id<br>
+               ),<br>
+               "Failed to start cryptodev %u",<br>
+               p_ts_params->dev_id<br>
+       );<br>
+<br>
+       return 0;<br>
 }<br>
<br>
-int<br>
-check_aead_capabilities_supported(const enum rte_crypto_aead_algorithm *aeads,<br>
-               uint16_t num_aeads)<br>
+static void<br>
+dev_stop(void)<br>
 {<br>
-       return check_capabilities_supported(RTE_CRYPTO_SYM_XFORM_AEAD,<br>
-                       (const int *) aeads, num_aeads);<br>
+       rte_cryptodev_stop(p_ts_params->dev_id);<br>
 }<br>
<br>
+/*<br>
+ * Individual testsuites setup/teardown functions below<br>
+ */<br>
+<br>
 static int<br>
-null_testsuite_setup(void)<br>
+ts_setup_aes_gcm(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
-       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
-               RTE_CRYPTO_CIPHER_NULL<br>
-       };<br>
-       const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_NULL<br>
+       const enum rte_crypto_aead_algorithm aeads[] = {<br>
+               RTE_CRYPTO_AEAD_AES_GCM<br>
        };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO)) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for NULL "<br>
-                               "testsuite not met\n");<br>
-               return TEST_SKIPPED;<br>
-       }<br>
-<br>
-       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
-                       && check_auth_capabilities_supported(auths,<br>
-                       RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for NULL "<br>
+       if (check_aead_capabilities_supported(aeads, RTE_DIM(aeads)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for AES GCM "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
 static int<br>
-crypto_gen_testsuite_setup(void)<br>
+ts_setup_aes_ccm(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
+       const enum rte_crypto_aead_algorithm aeads[] = {<br>
+               RTE_CRYPTO_AEAD_AES_CCM<br>
+       };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
+       if (!(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
+                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
+                       !(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for AES CCM "<br>
+                               "testsuite not met\n");<br>
+               return TEST_SKIPPED;<br>
+       }<br>
<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO)) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for Crypto Gen "<br>
+       if (check_aead_capabilities_supported(aeads, RTE_DIM(aeads)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for AES CCM "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
-#ifdef RTE_LIB_SECURITY<br>
 static int<br>
-sec_proto_testsuite_setup(enum rte_security_session_protocol protocol)<br>
+ts_setup_aes_gmac(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       struct crypto_unittest_params *ut_params = &unittest_params;<br>
-       struct rte_cryptodev_info dev_info;<br>
-       int ret = 0;<br>
-<br>
-       rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);<br>
+       const enum rte_crypto_auth_algorithm auths[] = {<br>
+               RTE_CRYPTO_AUTH_AES_GMAC<br>
+       };<br>
<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SECURITY)) {<br>
-               RTE_LOG(INFO, USER1,<br>
-                       "Feature flag requirements for security protocol testsuite not met\n");<br>
+       if (!(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
+                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
+                       !(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for AES GMAC "<br>
+                               "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
-       /* Reconfigure to enable security */<br>
-       ret = dev_configure_and_start(0);<br>
-       if (ret != TEST_SUCCESS)<br>
-               return ret;<br>
-<br>
-       /* Set action type */<br>
-       ut_params->type = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL;<br>
-<br>
-       if (security_proto_supported(RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL, protocol) < 0) {<br>
-               RTE_LOG(INFO, USER1,<br>
-                       "Capability requirements for security protocol test not met\n");<br>
-               ret = TEST_SKIPPED;<br>
+       if (check_auth_capabilities_supported(auths, RTE_DIM(auths)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for AES GMAC "<br>
+                               "testsuite not met\n");<br>
+               return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
-       test_sec_alg_list_populate();<br>
-       test_sec_auth_only_alg_list_populate();<br>
-<br>
-       /*<br>
-        * Stop the device. Device would be started again by individual test<br>
-        * case setup routine.<br>
-        */<br>
-       rte_cryptodev_stop(ts_params->valid_devs[0]);<br>
-<br>
-       return ret;<br>
-}<br>
-<br>
-static int<br>
-ipsec_proto_testsuite_setup(void)<br>
-{<br>
-       return sec_proto_testsuite_setup(RTE_SECURITY_PROTOCOL_IPSEC);<br>
-}<br>
-<br>
-static int<br>
-tls_record_proto_testsuite_setup(void)<br>
-{<br>
-       test_sec_proto_pattern_generate();<br>
-<br>
-       return sec_proto_testsuite_setup(RTE_SECURITY_PROTOCOL_TLS_RECORD);<br>
+       return 0;<br>
 }<br>
<br>
 static int<br>
-pdcp_proto_testsuite_setup(void)<br>
+ts_setup_snow3g(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
-               RTE_CRYPTO_CIPHER_NULL,<br>
-               RTE_CRYPTO_CIPHER_AES_CTR,<br>
-               RTE_CRYPTO_CIPHER_ZUC_EEA3,<br>
                RTE_CRYPTO_CIPHER_SNOW3G_UEA2<br>
+<br>
        };<br>
        const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_NULL,<br>
-               RTE_CRYPTO_AUTH_SNOW3G_UIA2,<br>
-               RTE_CRYPTO_AUTH_AES_CMAC,<br>
-               RTE_CRYPTO_AUTH_ZUC_EIA3<br>
+               RTE_CRYPTO_AUTH_SNOW3G_UIA2<br>
        };<br>
<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_auth_key));<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_bearer));<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_crypto_key));<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_data_in));<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_data_in_len));<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_data_out));<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_data_sn_size));<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_hfn));<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_hfn_threshold));<br>
-       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_packet_direction));<br>
-<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
-                       !(dev_info.feature_flags &<br>
-                       RTE_CRYPTODEV_FF_SECURITY)) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for PDCP Proto "<br>
-                               "testsuite not met\n");<br>
-               return TEST_SKIPPED;<br>
-       }<br>
-<br>
        if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
                        && check_auth_capabilities_supported(auths,<br>
                        RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for PDCP Proto "<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for Snow3G "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
 static int<br>
-docsis_proto_testsuite_setup(void)<br>
+ts_setup_chacha20_poly1305(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
-       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
-               RTE_CRYPTO_CIPHER_AES_DOCSISBPI<br>
+       const enum rte_crypto_aead_algorithm aeads[] = {<br>
+               RTE_CRYPTO_AEAD_CHACHA20_POLY1305<br>
        };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
-                       !(dev_info.feature_flags &<br>
-                       RTE_CRYPTODEV_FF_SECURITY)) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for DOCSIS "<br>
-                               "Proto testsuite not met\n");<br>
+       if (!(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
+                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
+                       !(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for "<br>
+                               "Chacha20-Poly1305 testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
-       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for DOCSIS Proto "<br>
-                               "testsuite not met\n");<br>
+       if (check_aead_capabilities_supported(aeads, RTE_DIM(aeads)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for "<br>
+                               "Chacha20-Poly1305 testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
-#endif<br>
<br>
 static int<br>
-aes_ccm_auth_testsuite_setup(void)<br>
+ts_setup_zuc(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
-       const enum rte_crypto_aead_algorithm aeads[] = {<br>
-               RTE_CRYPTO_AEAD_AES_CCM<br>
+       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
+               RTE_CRYPTO_CIPHER_ZUC_EEA3<br>
+       };<br>
+       const enum rte_crypto_auth_algorithm auths[] = {<br>
+               RTE_CRYPTO_AUTH_ZUC_EIA3<br>
        };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
+       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
+                       && check_auth_capabilities_supported(auths,<br>
+                       RTE_DIM(auths)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for ZUC "<br>
+                               "testsuite not met\n");<br>
+               return TEST_SKIPPED;<br>
+       }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
+       return 0;<br>
+}<br>
+<br>
+static int<br>
+ts_setup_hmac_md5(void)<br>
+{<br>
+       const enum rte_crypto_auth_algorithm auths[] = {<br>
+               RTE_CRYPTO_AUTH_MD5_HMAC<br>
+       };<br>
+<br>
+       if (!(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
                        ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
-                       !(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for AES CCM "<br>
-                               "testsuite not met\n");<br>
+                       !(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for HMAC MD5 "<br>
+                               "Auth testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
-       if (check_aead_capabilities_supported(aeads, RTE_DIM(aeads)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for AES CCM "<br>
+       if (check_auth_capabilities_supported(auths, RTE_DIM(auths)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for HMAC MD5 "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
 static int<br>
-aes_gcm_auth_testsuite_setup(void)<br>
+ts_setup_kasumi(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
-       const enum rte_crypto_aead_algorithm aeads[] = {<br>
-               RTE_CRYPTO_AEAD_AES_GCM<br>
+       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
+               RTE_CRYPTO_CIPHER_KASUMI_F8<br>
+       };<br>
+       const enum rte_crypto_auth_algorithm auths[] = {<br>
+               RTE_CRYPTO_AUTH_KASUMI_F9<br>
        };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO)) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for AES GCM "<br>
+       if (!(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
+                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
+                       !(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for Kasumi "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
-       if (check_aead_capabilities_supported(aeads, RTE_DIM(aeads)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for AES GCM "<br>
+       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
+                       && check_auth_capabilities_supported(auths,<br>
+                       RTE_DIM(auths)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for Kasumi "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
 static int<br>
-aes_gmac_auth_testsuite_setup(void)<br>
+ts_setup_esn(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
+       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
+               RTE_CRYPTO_CIPHER_AES_CBC<br>
+       };<br>
        const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_AES_GMAC<br>
+               RTE_CRYPTO_AUTH_SHA1_HMAC<br>
        };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
+       if (!(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
                        ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
-                       !(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for AES GMAC "<br>
+                       !(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for ESN "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
-       if (check_auth_capabilities_supported(auths, RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for AES GMAC "<br>
+       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
+                       && check_auth_capabilities_supported(auths,<br>
+                       RTE_DIM(auths)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for ESN "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
+<br>
 static int<br>
-chacha20_poly1305_testsuite_setup(void)<br>
+ts_setup_negative_aes_gcm(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
        const enum rte_crypto_aead_algorithm aeads[] = {<br>
-               RTE_CRYPTO_AEAD_CHACHA20_POLY1305<br>
+               RTE_CRYPTO_AEAD_AES_GCM<br>
        };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
+       if (!(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
                        ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
-                       !(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for "<br>
-                               "Chacha20-Poly1305 testsuite not met\n");<br>
+                       !(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for Negative "<br>
+                               "AES GCM testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
        if (check_aead_capabilities_supported(aeads, RTE_DIM(aeads)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for "<br>
-                               "Chacha20-Poly1305 testsuite not met\n");<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for Negative "<br>
+                               "AES GCM testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
+<br>
 static int<br>
-snow3g_testsuite_setup(void)<br>
+ts_setup_negative_aes_gmac(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
-       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
-               RTE_CRYPTO_CIPHER_SNOW3G_UEA2<br>
-<br>
-       };<br>
        const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_SNOW3G_UIA2<br>
+               RTE_CRYPTO_AUTH_AES_GMAC<br>
        };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO)) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for Snow3G "<br>
-                               "testsuite not met\n");<br>
+       if (!(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
+                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
+                       !(p_ts_params->dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for Negative "<br>
+                               "AES GMAC testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
-       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
-                       && check_auth_capabilities_supported(auths,<br>
-                       RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for Snow3G "<br>
-                               "testsuite not met\n");<br>
+       if (check_auth_capabilities_supported(auths, RTE_DIM(auths)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for Negative "<br>
+                               "AES GMAC testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
 static int<br>
-zuc_testsuite_setup(void)<br>
+ts_setup_mixed_cipher_hash(void)<br>
 {<br>
        struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
        uint8_t dev_id = ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
+       uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
-               RTE_CRYPTO_CIPHER_ZUC_EEA3<br>
+               RTE_CRYPTO_CIPHER_NULL,<br>
+               RTE_CRYPTO_CIPHER_AES_CTR,<br>
+               RTE_CRYPTO_CIPHER_ZUC_EEA3,<br>
+               RTE_CRYPTO_CIPHER_SNOW3G_UEA2<br>
        };<br>
        const enum rte_crypto_auth_algorithm auths[] = {<br>
+               RTE_CRYPTO_AUTH_NULL,<br>
+               RTE_CRYPTO_AUTH_SNOW3G_UIA2,<br>
+               RTE_CRYPTO_AUTH_AES_CMAC,<br>
                RTE_CRYPTO_AUTH_ZUC_EIA3<br>
        };<br>
<br>
        rte_cryptodev_info_get(dev_id, &dev_info);<br>
+       feat_flags = dev_info.feature_flags;<br>
<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO)) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for ZUC "<br>
-                               "testsuite not met\n");<br>
+       if (!(feat_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
+                       (global_api_test_type == CRYPTODEV_RAW_API_TEST)) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for Mixed "<br>
+                               "Cipher Hash testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
        if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
                        && check_auth_capabilities_supported(auths,<br>
                        RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for ZUC "<br>
-                               "testsuite not met\n");<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for Mixed "<br>
+                               "Cipher Hash testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
+<br>
 static int<br>
-hmac_md5_auth_testsuite_setup(void)<br>
+ts_setup_negative_hmac_sha1(void)<br>
 {<br>
        struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
        uint8_t dev_id = ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
+       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
+               RTE_CRYPTO_CIPHER_AES_CBC<br>
+       };<br>
        const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_MD5_HMAC<br>
+               RTE_CRYPTO_AUTH_SHA1_HMAC<br>
        };<br>
<br>
        rte_cryptodev_info_get(dev_id, &dev_info);<br>
@@ -1141,119 +1164,286 @@ hmac_md5_auth_testsuite_setup(void)<br>
        if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
                        ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
                        !(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for HMAC MD5 "<br>
-                               "Auth testsuite not met\n");<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for Negative "<br>
+                               "HMAC SHA1 testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
-       if (check_auth_capabilities_supported(auths, RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for HMAC MD5 "<br>
-                               "testsuite not met\n");<br>
+       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
+                       && check_auth_capabilities_supported(auths,<br>
+                       RTE_DIM(auths)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for Negative "<br>
+                               "HMAC SHA1 testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
 static int<br>
-kasumi_testsuite_setup(void)<br>
+ts_setup_crypto_gen(void)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
+       return 0;<br>
+}<br>
+<br>
+static int<br>
+ts_setup_multi_session(void)<br>
+{<br>
+       dev_stop();<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
-               RTE_CRYPTO_CIPHER_KASUMI_F8<br>
+               RTE_CRYPTO_CIPHER_AES_CBC<br>
        };<br>
        const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_KASUMI_F9<br>
+               RTE_CRYPTO_AUTH_SHA512_HMAC<br>
        };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
-                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
-                       !(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for Kasumi "<br>
-                               "testsuite not met\n");<br>
+       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
+                       && check_auth_capabilities_supported(auths,<br>
+                       RTE_DIM(auths)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for Multi "<br>
+                               "Session testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
+<br>
+       return 0;<br>
+}<br>
+<br>
+static int<br>
+ts_testsuite_null(void)<br>
+{<br>
+       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
+               RTE_CRYPTO_CIPHER_NULL<br>
+       };<br>
+       const enum rte_crypto_auth_algorithm auths[] = {<br>
+               RTE_CRYPTO_AUTH_NULL<br>
+       };<br>
<br>
        if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
                        && check_auth_capabilities_supported(auths,<br>
                        RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for Kasumi "<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for NULL "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
+       TEST_ASSERT_SUCCESS(dev_start(), "Failed to start the device");<br>
<br>
        return 0;<br>
 }<br>
<br>
-static int<br>
-negative_aes_gcm_testsuite_setup(void)<br>
+static void<br>
+ts_teardown_generic(void)<br>
+{<br>
+       dev_stop();<br>
+}<br>
+<br>
+/*<br>
+ * This functions are responsbile for construction/destruction of individual unit test context.<br>
+ */<br>
+<br>
+int<br>
+ut_setup(void)<br>
+{<br>
+       memset(self, 0, sizeof(*self));<br>
+       self->op = rte_crypto_op_alloc(testsuite_params.op_mpool,<br>
+                       RTE_CRYPTO_OP_TYPE_SYMMETRIC);<br>
+       TEST_ASSERT_NOT_NULL(self->op,<br>
+                       "Failed to allocate symmetric crypto operation struct");<br>
+       return TEST_SUCCESS;<br>
+}<br>
+<br>
+/*<br>
+ * Destruct unit test context, single op, single/multiple buffer.<br>
+ */<br>
+<br>
+static void<br>
+ut_teardown_aes_gcm(void)<br>
+{<br>
+       if (self->sess) {<br>
+               rte_cryptodev_sym_session_free(p_ts_params->valid_devs[0],<br>
+                               self->sess);<br>
+               self->sess = NULL;<br>
+       }<br>
+       rte_crypto_op_free(self->op);<br>
+       rte_pktmbuf_free(self->ibuf);<br>
+       rte_pktmbuf_free(self->obuf);<br>
+       self->ibuf = 0;<br>
+}<br>
+<br>
+void<br>
+ut_teardown(void)<br>
 {<br>
        struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
-       const enum rte_crypto_aead_algorithm aeads[] = {<br>
-               RTE_CRYPTO_AEAD_AES_GCM<br>
-       };<br>
+       struct crypto_unittest_params *ut_params = &unittest_params;<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
+       /* free crypto session structure */<br>
+#ifdef RTE_LIB_SECURITY<br>
+       if (ut_params->type == RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL) {<br>
+               if (ut_params->sec_session) {<br>
+                       rte_security_session_destroy(rte_cryptodev_get_sec_ctx<br>
+                                               (ts_params->valid_devs[0]),<br>
+                                               ut_params->sec_session);<br>
+                       ut_params->sec_session = NULL;<br>
+               }<br>
+       } else<br>
+#endif<br>
+       {<br>
+               if (ut_params->sess) {<br>
+                       rte_cryptodev_sym_session_free(ts_params->valid_devs[0],<br>
+                                       ut_params->sess);<br>
+                       ut_params->sess = NULL;<br>
+               }<br>
+       }<br>
<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
-                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
-                       !(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for Negative "<br>
-                               "AES GCM testsuite not met\n");<br>
-               return TEST_SKIPPED;<br>
+       /* free crypto operation structure */<br>
+       rte_crypto_op_free(ut_params->op);<br>
+<br>
+       /*<br>
+        * free mbuf - both obuf and ibuf are usually the same,<br>
+        * so check if they point at the same address is necessary,<br>
+        * to avoid freeing the mbuf twice.<br>
+        */<br>
+       if (ut_params->obuf) {<br>
+               rte_pktmbuf_free(ut_params->obuf);<br>
+               if (ut_params->ibuf == ut_params->obuf)<br>
+                       ut_params->ibuf = 0;<br>
+               ut_params->obuf = 0;<br>
+       }<br>
+       if (ut_params->ibuf) {<br>
+               ext_mbuf_memzone_free(1);<br>
+               rte_pktmbuf_free(ut_params->ibuf);<br>
+               ut_params->ibuf = 0;<br>
        }<br>
<br>
-       if (check_aead_capabilities_supported(aeads, RTE_DIM(aeads)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for Negative "<br>
-                               "AES GCM testsuite not met\n");<br>
-               return TEST_SKIPPED;<br>
+       if (ts_params->mbuf_pool != NULL)<br>
+               RTE_LOG(DEBUG, USER1, "CRYPTO_MBUFPOOL count %u\n",<br>
+                       rte_mempool_avail_count(ts_params->mbuf_pool));<br>
+}<br>
+<br>
+static int<br>
+ut_setup_security(void)<br>
+{<br>
+       /* Configure and start the device with no features disabled */<br>
+       return dev_configure_and_start(0);<br>
+<br>
+       memset(self, 0, sizeof(*self));<br>
+       self->op = rte_crypto_op_alloc(testsuite_params.op_mpool,<br>
+                       RTE_CRYPTO_OP_TYPE_SYMMETRIC);<br>
+       TEST_ASSERT_NOT_NULL(self->op,<br>
+                       "Failed to allocate symmetric crypto operation struct");<br>
+       return TEST_SUCCESS;<br>
+}<br>
+<br>
+static int<br>
+check_capabilities_supported(enum rte_crypto_sym_xform_type type,<br>
+               const int *algs, uint16_t num_algs)<br>
+{<br>
+       uint8_t dev_id = testsuite_params.valid_devs[0];<br>
+       bool some_alg_supported = FALSE;<br>
+       uint16_t i;<br>
+<br>
+       for (i = 0; i < num_algs && !some_alg_supported; i++) {<br>
+               struct rte_cryptodev_sym_capability_idx alg = {<br>
+                       type, {algs[i]}<br>
+               };<br>
+               if (rte_cryptodev_sym_capability_get(dev_id,<br>
+                               &alg) != NULL)<br>
+                       some_alg_supported = TRUE;<br>
        }<br>
+       if (!some_alg_supported)<br>
+               return TEST_SKIPPED;<br>
<br>
        return 0;<br>
 }<br>
<br>
+int<br>
+check_cipher_capabilities_supported(const enum rte_crypto_cipher_algorithm *ciphers,<br>
+               uint16_t num_ciphers)<br>
+{<br>
+       return check_capabilities_supported(RTE_CRYPTO_SYM_XFORM_CIPHER,<br>
+                       (const int *) ciphers, num_ciphers);<br>
+}<br>
+<br>
+int<br>
+check_auth_capabilities_supported(const enum rte_crypto_auth_algorithm *auths,<br>
+               uint16_t num_auths)<br>
+{<br>
+       return check_capabilities_supported(RTE_CRYPTO_SYM_XFORM_AUTH,<br>
+                       (const int *) auths, num_auths);<br>
+}<br>
+<br>
+int<br>
+check_aead_capabilities_supported(const enum rte_crypto_aead_algorithm *aeads,<br>
+               uint16_t num_aeads)<br>
+{<br>
+       return check_capabilities_supported(RTE_CRYPTO_SYM_XFORM_AEAD,<br>
+                       (const int *) aeads, num_aeads);<br>
+}<br>
+<br>
+#ifdef RTE_LIB_SECURITY<br>
 static int<br>
-negative_aes_gmac_testsuite_setup(void)<br>
+sec_proto_testsuite_setup(enum rte_security_session_protocol protocol)<br>
 {<br>
        struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
+       struct crypto_unittest_params *ut_params = &unittest_params;<br>
        struct rte_cryptodev_info dev_info;<br>
-       const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_AES_GMAC<br>
-       };<br>
+       int ret = 0;<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
+       rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);<br>
<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
-                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
-                       !(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for Negative "<br>
-                               "AES GMAC testsuite not met\n");<br>
+       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SECURITY)) {<br>
+               RTE_LOG(INFO, USER1,<br>
+                       "Feature flag requirements for security protocol testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
-       if (check_auth_capabilities_supported(auths, RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for Negative "<br>
-                               "AES GMAC testsuite not met\n");<br>
-               return TEST_SKIPPED;<br>
-       }<br>
+       /* Reconfigure to enable security */<br>
+       ret = dev_configure_and_start(0);<br>
+       if (ret != TEST_SUCCESS)<br>
+               return ret;<br>
+<br>
+       /* Set action type */<br>
+       ut_params->type = RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL;<br>
+<br>
+       if (security_proto_supported(RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL, protocol) < 0) {<br>
+               RTE_LOG(INFO, USER1,<br>
+                       "Capability requirements for security protocol test not met\n");<br>
+               ret = TEST_SKIPPED;<br>
+       }<br>
+<br>
+       test_sec_alg_list_populate();<br>
+       test_sec_auth_only_alg_list_populate();<br>
+<br>
+       /*<br>
+        * Stop the device. Device would be started again by individual test<br>
+        * case setup routine.<br>
+        */<br>
+       rte_cryptodev_stop(ts_params->valid_devs[0]);<br>
+<br>
+       return ret;<br>
+}<br>
<br>
-       return 0;<br>
+static int<br>
+ipsec_proto_testsuite_setup(void)<br>
+{<br>
+       return sec_proto_testsuite_setup(RTE_SECURITY_PROTOCOL_IPSEC);<br>
+}<br>
+<br>
+static int<br>
+tls_record_proto_testsuite_setup(void)<br>
+{<br>
+       test_sec_proto_pattern_generate();<br>
+<br>
+       return sec_proto_testsuite_setup(RTE_SECURITY_PROTOCOL_TLS_RECORD);<br>
 }<br>
<br>
 static int<br>
-mixed_cipher_hash_testsuite_setup(void)<br>
+pdcp_proto_testsuite_setup(void)<br>
 {<br>
        struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
        uint8_t dev_id = ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
-       uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
                RTE_CRYPTO_CIPHER_NULL,<br>
                RTE_CRYPTO_CIPHER_AES_CTR,<br>
@@ -1267,46 +1457,23 @@ mixed_cipher_hash_testsuite_setup(void)<br>
                RTE_CRYPTO_AUTH_ZUC_EIA3<br>
        };<br>
<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-       feat_flags = dev_info.feature_flags;<br>
-<br>
-       if (!(feat_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
-                       (global_api_test_type == CRYPTODEV_RAW_API_TEST)) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for Mixed "<br>
-                               "Cipher Hash testsuite not met\n");<br>
-               return TEST_SKIPPED;<br>
-       }<br>
-<br>
-       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
-                       && check_auth_capabilities_supported(auths,<br>
-                       RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for Mixed "<br>
-                               "Cipher Hash testsuite not met\n");<br>
-               return TEST_SKIPPED;<br>
-       }<br>
-<br>
-       return 0;<br>
-}<br>
-<br>
-static int<br>
-esn_testsuite_setup(void)<br>
-{<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
-       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
-               RTE_CRYPTO_CIPHER_AES_CBC<br>
-       };<br>
-       const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_SHA1_HMAC<br>
-       };<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_auth_key));<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_bearer));<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_crypto_key));<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_data_in));<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_data_in_len));<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_data_out));<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_data_sn_size));<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_hfn));<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_hfn_threshold));<br>
+       RTE_BUILD_BUG_ON(RTE_DIM(pdcp_test_params) != RTE_DIM(pdcp_test_packet_direction));<br>
<br>
        rte_cryptodev_info_get(dev_id, &dev_info);<br>
<br>
        if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
-                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
-                       !(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for ESN "<br>
+                       !(dev_info.feature_flags &<br>
+                       RTE_CRYPTODEV_FF_SECURITY)) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for PDCP Proto "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
@@ -1314,7 +1481,7 @@ esn_testsuite_setup(void)<br>
        if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
                        && check_auth_capabilities_supported(auths,<br>
                        RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for ESN "<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for PDCP Proto "<br>
                                "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
@@ -1323,126 +1490,34 @@ esn_testsuite_setup(void)<br>
 }<br>
<br>
 static int<br>
-multi_session_testsuite_setup(void)<br>
-{<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       uint8_t dev_id = ts_params->valid_devs[0];<br>
-       struct rte_cryptodev_info dev_info;<br>
-       const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
-               RTE_CRYPTO_CIPHER_AES_CBC<br>
-       };<br>
-       const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_SHA512_HMAC<br>
-       };<br>
-<br>
-       rte_cryptodev_info_get(dev_id, &dev_info);<br>
-<br>
-       if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO)) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for Multi "<br>
-                               "Session testsuite not met\n");<br>
-               return TEST_SKIPPED;<br>
-       }<br>
-<br>
-       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
-                       && check_auth_capabilities_supported(auths,<br>
-                       RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for Multi "<br>
-                               "Session testsuite not met\n");<br>
-               return TEST_SKIPPED;<br>
-       }<br>
-<br>
-       return 0;<br>
-}<br>
-<br>
-static int<br>
-negative_hmac_sha1_testsuite_setup(void)<br>
+docsis_proto_testsuite_setup(void)<br>
 {<br>
        struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
        uint8_t dev_id = ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
-               RTE_CRYPTO_CIPHER_AES_CBC<br>
-       };<br>
-       const enum rte_crypto_auth_algorithm auths[] = {<br>
-               RTE_CRYPTO_AUTH_SHA1_HMAC<br>
+               RTE_CRYPTO_CIPHER_AES_DOCSISBPI<br>
        };<br>
<br>
        rte_cryptodev_info_get(dev_id, &dev_info);<br>
<br>
        if (!(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO) ||<br>
-                       ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
-                       !(dev_info.feature_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
-               RTE_LOG(INFO, USER1, "Feature flag requirements for Negative "<br>
-                               "HMAC SHA1 testsuite not met\n");<br>
+                       !(dev_info.feature_flags &<br>
+                       RTE_CRYPTODEV_FF_SECURITY)) {<br>
+               RTE_LOG(INFO, USER1, "Feature flag requirements for DOCSIS "<br>
+                               "Proto testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
-       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0<br>
-                       && check_auth_capabilities_supported(auths,<br>
-                       RTE_DIM(auths)) != 0) {<br>
-               RTE_LOG(INFO, USER1, "Capability requirements for Negative "<br>
-                               "HMAC SHA1 testsuite not met\n");<br>
+       if (check_cipher_capabilities_supported(ciphers, RTE_DIM(ciphers)) != 0) {<br>
+               RTE_LOG(INFO, USER1, "Capability requirements for DOCSIS Proto "<br>
+                               "testsuite not met\n");<br>
                return TEST_SKIPPED;<br>
        }<br>
<br>
        return 0;<br>
 }<br>
-<br>
-static int<br>
-dev_configure_and_start(uint64_t ff_disable)<br>
-{<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       struct crypto_unittest_params *ut_params = &unittest_params;<br>
-<br>
-       uint16_t qp_id;<br>
-<br>
-       /* Clear unit test parameters before running test */<br>
-       memset(ut_params, 0, sizeof(*ut_params));<br>
-<br>
-       /* Reconfigure device to default parameters */<br>
-       ts_params->conf.socket_id = SOCKET_ID_ANY;<br>
-       ts_params->conf.ff_disable = ff_disable;<br>
-       ts_params->qp_conf.nb_descriptors = MAX_NUM_OPS_INFLIGHT;<br>
-       ts_params->qp_conf.mp_session = ts_params->session_mpool;<br>
-<br>
-       TEST_ASSERT_SUCCESS(rte_cryptodev_configure(ts_params->valid_devs[0],<br>
-                       &ts_params->conf),<br>
-                       "Failed to configure cryptodev %u",<br>
-                       ts_params->valid_devs[0]);<br>
-<br>
-       for (qp_id = 0; qp_id < ts_params->conf.nb_queue_pairs ; qp_id++) {<br>
-               TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(<br>
-                       ts_params->valid_devs[0], qp_id,<br>
-                       &ts_params->qp_conf,<br>
-                       rte_cryptodev_socket_id(ts_params->valid_devs[0])),<br>
-                       "Failed to setup queue pair %u on cryptodev %u",<br>
-                       qp_id, ts_params->valid_devs[0]);<br>
-       }<br>
-<br>
-<br>
-       rte_cryptodev_stats_reset(ts_params->valid_devs[0]);<br>
-<br>
-       /* Start the device */<br>
-       TEST_ASSERT_SUCCESS(rte_cryptodev_start(ts_params->valid_devs[0]),<br>
-                       "Failed to start cryptodev %u",<br>
-                       ts_params->valid_devs[0]);<br>
-<br>
-       return TEST_SUCCESS;<br>
-}<br>
-<br>
-int<br>
-ut_setup(void)<br>
-{<br>
-       /* Configure and start the device with security feature disabled */<br>
-       return dev_configure_and_start(RTE_CRYPTODEV_FF_SECURITY);<br>
-}<br>
-<br>
-static int<br>
-ut_setup_security(void)<br>
-{<br>
-       /* Configure and start the device with no features disabled */<br>
-       return dev_configure_and_start(0);<br>
-}<br>
+#endif<br>
<br>
 static int<br>
 ut_setup_security_rx_inject(void)<br>
@@ -1661,59 +1736,6 @@ ext_mbuf_create(struct rte_mempool *mbuf_pool, int pkt_len,<br>
        return NULL;<br>
 }<br>
<br>
-void<br>
-ut_teardown(void)<br>
-{<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       struct crypto_unittest_params *ut_params = &unittest_params;<br>
-<br>
-       /* free crypto session structure */<br>
-#ifdef RTE_LIB_SECURITY<br>
-       if (ut_params->type == RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL) {<br>
-               if (ut_params->sec_session) {<br>
-                       rte_security_session_destroy(rte_cryptodev_get_sec_ctx<br>
-                                               (ts_params->valid_devs[0]),<br>
-                                               ut_params->sec_session);<br>
-                       ut_params->sec_session = NULL;<br>
-               }<br>
-       } else<br>
-#endif<br>
-       {<br>
-               if (ut_params->sess) {<br>
-                       rte_cryptodev_sym_session_free(ts_params->valid_devs[0],<br>
-                                       ut_params->sess);<br>
-                       ut_params->sess = NULL;<br>
-               }<br>
-       }<br>
-<br>
-       /* free crypto operation structure */<br>
-       rte_crypto_op_free(ut_params->op);<br>
-<br>
-       /*<br>
-        * free mbuf - both obuf and ibuf are usually the same,<br>
-        * so check if they point at the same address is necessary,<br>
-        * to avoid freeing the mbuf twice.<br>
-        */<br>
-       if (ut_params->obuf) {<br>
-               rte_pktmbuf_free(ut_params->obuf);<br>
-               if (ut_params->ibuf == ut_params->obuf)<br>
-                       ut_params->ibuf = 0;<br>
-               ut_params->obuf = 0;<br>
-       }<br>
-       if (ut_params->ibuf) {<br>
-               ext_mbuf_memzone_free(1);<br>
-               rte_pktmbuf_free(ut_params->ibuf);<br>
-               ut_params->ibuf = 0;<br>
-       }<br>
-<br>
-       if (ts_params->mbuf_pool != NULL)<br>
-               RTE_LOG(DEBUG, USER1, "CRYPTO_MBUFPOOL count %u\n",<br>
-                       rte_mempool_avail_count(ts_params->mbuf_pool));<br>
-<br>
-       /* Stop the device */<br>
-       rte_cryptodev_stop(ts_params->valid_devs[0]);<br>
-}<br>
-<br>
 static void<br>
 ut_teardown_rx_inject(void)<br>
 {<br>
@@ -1945,155 +1967,13 @@ test_queue_pair_descriptor_setup(void)<br>
        return TEST_SUCCESS;<br>
 }<br>
<br>
-/* ***** Plaintext data for tests ***** */<br>
-<br>
-const char catch_22_quote_1[] =<br>
-               "There was only one catch and that was Catch-22, which "<br>
-               "specified that a concern for one's safety in the face of "<br>
-               "dangers that were real and immediate was the process of a "<br>
-               "rational mind. Orr was crazy and could be grounded. All he "<br>
-               "had to do was ask; and as soon as he did, he would no longer "<br>
-               "be crazy and would have to fly more missions. Orr would be "<br>
-               "crazy to fly more missions and sane if he didn't, but if he "<br>
-               "was sane he had to fly them. If he flew them he was crazy "<br>
-               "and didn't have to; but if he didn't want to he was sane and "<br>
-               "had to. Yossarian was moved very deeply by the absolute "<br>
-               "simplicity of this clause of Catch-22 and let out a "<br>
-               "respectful whistle. \"That's some catch, that Catch-22\", he "<br>
-               "observed. \"It's the best there is,\" Doc Daneeka agreed.";<br>
-<br>
-const char catch_22_quote[] =<br>
-               "What a lousy earth! He wondered how many people were "<br>
-               "destitute that same night even in his own prosperous country, "<br>
-               "how many homes were shanties, how many husbands were drunk "<br>
-               "and wives socked, and how many children were bullied, abused, "<br>
-               "or abandoned. How many families hungered for food they could "<br>
-               "not afford to buy? How many hearts were broken? How many "<br>
-               "suicides would take place that same night, how many people "<br>
-               "would go insane? How many cockroaches and landlords would "<br>
-               "triumph? How many winners were losers, successes failures, "<br>
-               "and rich men poor men? How many wise guys were stupid? How "<br>
-               "many happy endings were unhappy endings? How many honest men "<br>
-               "were liars, brave men cowards, loyal men traitors, how many "<br>
-               "sainted men were corrupt, how many people in positions of "<br>
-               "trust had sold their souls to bodyguards, how many had never "<br>
-               "had souls? How many straight-and-narrow paths were crooked "<br>
-               "paths? How many best families were worst families and how "<br>
-               "many good people were bad people? When you added them all up "<br>
-               "and then subtracted, you might be left with only the children, "<br>
-               "and perhaps with Albert Einstein and an old violinist or "<br>
-               "sculptor somewhere.";<br>
-<br>
-#define QUOTE_480_BYTES                (480)<br>
-#define QUOTE_512_BYTES                (512)<br>
-#define QUOTE_768_BYTES                (768)<br>
-#define QUOTE_1024_BYTES       (1024)<br>
-<br>
-<br>
-<br>
-/* ***** SHA1 Hash Tests ***** */<br>
-<br>
-#define HMAC_KEY_LENGTH_SHA1   (DIGEST_BYTE_LENGTH_SHA1)<br>
-<br>
-static uint8_t hmac_sha1_key[] = {<br>
-       0xF8, 0x2A, 0xC7, 0x54, 0xDB, 0x96, 0x18, 0xAA,<br>
-       0xC3, 0xA1, 0x53, 0xF6, 0x1F, 0x17, 0x60, 0xBD,<br>
-       0xDE, 0xF4, 0xDE, 0xAD };<br>
-<br>
-/* ***** SHA224 Hash Tests ***** */<br>
-<br>
-#define HMAC_KEY_LENGTH_SHA224 (DIGEST_BYTE_LENGTH_SHA224)<br>
-<br>
-<br>
-/* ***** AES-CBC Cipher Tests ***** */<br>
-<br>
-#define CIPHER_KEY_LENGTH_AES_CBC      (16)<br>
-#define CIPHER_IV_LENGTH_AES_CBC       (CIPHER_KEY_LENGTH_AES_CBC)<br>
-<br>
 static uint8_t aes_cbc_key[] = {<br>
        0xE4, 0x23, 0x33, 0x8A, 0x35, 0x64, 0x61, 0xE2,<br>
        0x49, 0x03, 0xDD, 0xC6, 0xB8, 0xCA, 0x55, 0x7A };<br>
<br>
-static uint8_t aes_cbc_iv[] = {<br>
-       0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,<br>
-       0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f };<br>
-<br>
-<br>
-/* ***** AES-CBC / HMAC-SHA1 Hash Tests ***** */<br>
-<br>
-static const uint8_t catch_22_quote_2_512_bytes_AES_CBC_ciphertext[] = {<br>
-       0x8B, 0x4D, 0xDA, 0x1B, 0xCF, 0x04, 0xA0, 0x31,<br>
-       0xB4, 0xBF, 0xBD, 0x68, 0x43, 0x20, 0x7E, 0x76,<br>
-       0xB1, 0x96, 0x8B, 0xA2, 0x7C, 0xA2, 0x83, 0x9E,<br>
-       0x39, 0x5A, 0x2F, 0x7E, 0x92, 0xB4, 0x48, 0x1A,<br>
-       0x3F, 0x6B, 0x5D, 0xDF, 0x52, 0x85, 0x5F, 0x8E,<br>
-       0x42, 0x3C, 0xFB, 0xE9, 0x1A, 0x24, 0xD6, 0x08,<br>
-       0xDD, 0xFD, 0x16, 0xFB, 0xE9, 0x55, 0xEF, 0xF0,<br>
-       0xA0, 0x8D, 0x13, 0xAB, 0x81, 0xC6, 0x90, 0x01,<br>
-       0xB5, 0x18, 0x84, 0xB3, 0xF6, 0xE6, 0x11, 0x57,<br>
-       0xD6, 0x71, 0xC6, 0x3C, 0x3F, 0x2F, 0x33, 0xEE,<br>
-       0x24, 0x42, 0x6E, 0xAC, 0x0B, 0xCA, 0xEC, 0xF9,<br>
-       0x84, 0xF8, 0x22, 0xAA, 0x60, 0xF0, 0x32, 0xA9,<br>
-       0x75, 0x75, 0x3B, 0xCB, 0x70, 0x21, 0x0A, 0x8D,<br>
-       0x0F, 0xE0, 0xC4, 0x78, 0x2B, 0xF8, 0x97, 0xE3,<br>
-       0xE4, 0x26, 0x4B, 0x29, 0xDA, 0x88, 0xCD, 0x46,<br>
-       0xEC, 0xAA, 0xF9, 0x7F, 0xF1, 0x15, 0xEA, 0xC3,<br>
-       0x87, 0xE6, 0x31, 0xF2, 0xCF, 0xDE, 0x4D, 0x80,<br>
-       0x70, 0x91, 0x7E, 0x0C, 0xF7, 0x26, 0x3A, 0x92,<br>
-       0x4F, 0x18, 0x83, 0xC0, 0x8F, 0x59, 0x01, 0xA5,<br>
-       0x88, 0xD1, 0xDB, 0x26, 0x71, 0x27, 0x16, 0xF5,<br>
-       0xEE, 0x10, 0x82, 0xAC, 0x68, 0x26, 0x9B, 0xE2,<br>
-       0x6D, 0xD8, 0x9A, 0x80, 0xDF, 0x04, 0x31, 0xD5,<br>
-       0xF1, 0x35, 0x5C, 0x3B, 0xDD, 0x9A, 0x65, 0xBA,<br>
-       0x58, 0x34, 0x85, 0x61, 0x1C, 0x42, 0x10, 0x76,<br>
-       0x73, 0x02, 0x42, 0xC9, 0x23, 0x18, 0x8E, 0xB4,<br>
-       0x6F, 0xB4, 0xA3, 0x54, 0x6E, 0x88, 0x3B, 0x62,<br>
-       0x7C, 0x02, 0x8D, 0x4C, 0x9F, 0xC8, 0x45, 0xF4,<br>
-       0xC9, 0xDE, 0x4F, 0xEB, 0x22, 0x83, 0x1B, 0xE4,<br>
-       0x49, 0x37, 0xE4, 0xAD, 0xE7, 0xCD, 0x21, 0x54,<br>
-       0xBC, 0x1C, 0xC2, 0x04, 0x97, 0xB4, 0x10, 0x61,<br>
-       0xF0, 0xE4, 0xEF, 0x27, 0x63, 0x3A, 0xDA, 0x91,<br>
-       0x41, 0x25, 0x62, 0x1C, 0x5C, 0xB6, 0x38, 0x4A,<br>
-       0x88, 0x71, 0x59, 0x5A, 0x8D, 0xA0, 0x09, 0xAF,<br>
-       0x72, 0x94, 0xD7, 0x79, 0x5C, 0x60, 0x7C, 0x8F,<br>
-       0x4C, 0xF5, 0xD9, 0xA1, 0x39, 0x6D, 0x81, 0x28,<br>
-       0xEF, 0x13, 0x28, 0xDF, 0xF5, 0x3E, 0xF7, 0x8E,<br>
-       0x09, 0x9C, 0x78, 0x18, 0x79, 0xB8, 0x68, 0xD7,<br>
-       0xA8, 0x29, 0x62, 0xAD, 0xDE, 0xE1, 0x61, 0x76,<br>
-       0x1B, 0x05, 0x16, 0xCD, 0xBF, 0x02, 0x8E, 0xA6,<br>
-       0x43, 0x6E, 0x92, 0x55, 0x4F, 0x60, 0x9C, 0x03,<br>
-       0xB8, 0x4F, 0xA3, 0x02, 0xAC, 0xA8, 0xA7, 0x0C,<br>
-       0x1E, 0xB5, 0x6B, 0xF8, 0xC8, 0x4D, 0xDE, 0xD2,<br>
-       0xB0, 0x29, 0x6E, 0x40, 0xE6, 0xD6, 0xC9, 0xE6,<br>
-       0xB9, 0x0F, 0xB6, 0x63, 0xF5, 0xAA, 0x2B, 0x96,<br>
-       0xA7, 0x16, 0xAC, 0x4E, 0x0A, 0x33, 0x1C, 0xA6,<br>
-       0xE6, 0xBD, 0x8A, 0xCF, 0x40, 0xA9, 0xB2, 0xFA,<br>
-       0x63, 0x27, 0xFD, 0x9B, 0xD9, 0xFC, 0xD5, 0x87,<br>
-       0x8D, 0x4C, 0xB6, 0xA4, 0xCB, 0xE7, 0x74, 0x55,<br>
-       0xF4, 0xFB, 0x41, 0x25, 0xB5, 0x4B, 0x0A, 0x1B,<br>
-       0xB1, 0xD6, 0xB7, 0xD9, 0x47, 0x2A, 0xC3, 0x98,<br>
-       0x6A, 0xC4, 0x03, 0x73, 0x1F, 0x93, 0x6E, 0x53,<br>
-       0x19, 0x25, 0x64, 0x15, 0x83, 0xF9, 0x73, 0x2A,<br>
-       0x74, 0xB4, 0x93, 0x69, 0xC4, 0x72, 0xFC, 0x26,<br>
-       0xA2, 0x9F, 0x43, 0x45, 0xDD, 0xB9, 0xEF, 0x36,<br>
-       0xC8, 0x3A, 0xCD, 0x99, 0x9B, 0x54, 0x1A, 0x36,<br>
-       0xC1, 0x59, 0xF8, 0x98, 0xA8, 0xCC, 0x28, 0x0D,<br>
-       0x73, 0x4C, 0xEE, 0x98, 0xCB, 0x7C, 0x58, 0x7E,<br>
-       0x20, 0x75, 0x1E, 0xB7, 0xC9, 0xF8, 0xF2, 0x0E,<br>
-       0x63, 0x9E, 0x05, 0x78, 0x1A, 0xB6, 0xA8, 0x7A,<br>
-       0xF9, 0x98, 0x6A, 0xA6, 0x46, 0x84, 0x2E, 0xF6,<br>
-       0x4B, 0xDC, 0x9B, 0x8F, 0x9B, 0x8F, 0xEE, 0xB4,<br>
-       0xAA, 0x3F, 0xEE, 0xC0, 0x37, 0x27, 0x76, 0xC7,<br>
-       0x95, 0xBB, 0x26, 0x74, 0x69, 0x12, 0x7F, 0xF1,<br>
-       0xBB, 0xFF, 0xAE, 0xB5, 0x99, 0x6E, 0xCB, 0x0C<br>
-};<br>
-<br>
-static const uint8_t catch_22_quote_2_512_bytes_AES_CBC_HMAC_SHA1_digest[] = {<br>
-       0x9a, 0x4f, 0x88, 0x1b, 0xb6, 0x8f, 0xd8, 0x60,<br>
-       0x42, 0x1a, 0x7d, 0x3d, 0xf5, 0x82, 0x80, 0xf1,<br>
-       0x18, 0x8c, 0x1d, 0x32<br>
-};<br>
-<br>
+static uint8_t aes_cbc_iv[] = {<br>
+       0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,<br>
+       0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f };<br>
<br>
 /* Multisession Vector context Test */<br>
 /*Begin Session 0 */<br>
@@ -2174,29 +2054,6 @@ static const uint8_t ms_aes_cbc_cipher0[] = {<br>
                0xFA, 0x13, 0xBB, 0x6B, 0x3F, 0x45, 0x9F, 0xBF<br>
 };<br>
<br>
-<br>
-static  uint8_t ms_hmac_key0[] = {<br>
-               0xFF, 0x1A, 0x7D, 0x3D, 0xF5, 0x82, 0x80, 0xF1,<br>
-               0xF1, 0x35, 0x5C, 0x3B, 0xDD, 0x9A, 0x65, 0xBA,<br>
-               0x58, 0x34, 0x85, 0x65, 0x1C, 0x42, 0x50, 0x76,<br>
-               0x9A, 0xAF, 0x88, 0x1B, 0xB6, 0x8F, 0xF8, 0x60,<br>
-               0xA2, 0x5A, 0x7F, 0x3F, 0xF4, 0x72, 0x70, 0xF1,<br>
-               0xF5, 0x35, 0x4C, 0x3B, 0xDD, 0x90, 0x65, 0xB0,<br>
-               0x47, 0x3A, 0x75, 0x61, 0x5C, 0xA2, 0x10, 0x76,<br>
-               0x9A, 0xAF, 0x77, 0x5B, 0xB6, 0x7F, 0xF7, 0x60<br>
-};<br>
-<br>
-static const uint8_t ms_hmac_digest0[] = {<br>
-               0x43, 0x52, 0xED, 0x34, 0xAB, 0x36, 0xB2, 0x51,<br>
-               0xFB, 0xA3, 0xA6, 0x7C, 0x38, 0xFC, 0x42, 0x8F,<br>
-               0x57, 0x64, 0xAB, 0x81, 0xA7, 0x89, 0xB7, 0x6C,<br>
-               0xA0, 0xDC, 0xB9, 0x4D, 0xC4, 0x30, 0xF9, 0xD4,<br>
-               0x10, 0x82, 0x55, 0xD0, 0xAB, 0x32, 0xFB, 0x56,<br>
-               0x0D, 0xE4, 0x68, 0x3D, 0x76, 0xD0, 0x7B, 0xE4,<br>
-               0xA6, 0x2C, 0x34, 0x9E, 0x8C, 0x41, 0xF8, 0x23,<br>
-               0x28, 0x1B, 0x3A, 0x90, 0x26, 0x34, 0x47, 0x90<br>
-               };<br>
-<br>
 /* End Session 0 */<br>
 /* Begin session 1 */<br>
<br>
@@ -2278,27 +2135,6 @@ static const uint8_t ms_aes_cbc_cipher1[] = {<br>
<br>
 };<br>
<br>
-static uint8_t ms_hmac_key1[] = {<br>
-               0xFE, 0x1A, 0x7D, 0x3D, 0xF5, 0x82, 0x80, 0xF1,<br>
-               0xF1, 0x35, 0x5C, 0x3B, 0xDD, 0x9A, 0x65, 0xBA,<br>
-               0x58, 0x34, 0x85, 0x65, 0x1C, 0x42, 0x50, 0x76,<br>
-               0x9A, 0xAF, 0x88, 0x1B, 0xB6, 0x8F, 0xF8, 0x60,<br>
-               0xA2, 0x5A, 0x7F, 0x3F, 0xF4, 0x72, 0x70, 0xF1,<br>
-               0xF5, 0x35, 0x4C, 0x3B, 0xDD, 0x90, 0x65, 0xB0,<br>
-               0x47, 0x3A, 0x75, 0x61, 0x5C, 0xA2, 0x10, 0x76,<br>
-               0x9A, 0xAF, 0x77, 0x5B, 0xB6, 0x7F, 0xF7, 0x60<br>
-};<br>
-<br>
-static const uint8_t ms_hmac_digest1[] = {<br>
-               0xCE, 0x6E, 0x5F, 0x77, 0x96, 0x9A, 0xB1, 0x69,<br>
-               0x2D, 0x5E, 0xF3, 0x2F, 0x32, 0x10, 0xCB, 0x50,<br>
-               0x0E, 0x09, 0x56, 0x25, 0x07, 0x34, 0xC9, 0x20,<br>
-               0xEC, 0x13, 0x43, 0x23, 0x5C, 0x08, 0x8B, 0xCD,<br>
-               0xDC, 0x86, 0x8C, 0xEE, 0x0A, 0x95, 0x2E, 0xB9,<br>
-               0x8C, 0x7B, 0x02, 0x7A, 0xD4, 0xE1, 0x49, 0xB4,<br>
-               0x45, 0xB5, 0x52, 0x37, 0xC6, 0xFF, 0xFE, 0xAA,<br>
-               0x0A, 0x87, 0xB8, 0x51, 0xF9, 0x2A, 0x01, 0x8F<br>
-};<br>
 /* End Session 1  */<br>
 /* Begin Session 2 */<br>
 static  uint8_t ms_aes_cbc_key2[] = {<br>
@@ -2378,28 +2214,6 @@ static const uint8_t ms_aes_cbc_cipher2[] = {<br>
                0xA9, 0x59, 0xC1, 0xD6, 0xC3, 0x57, 0x5B, 0x92<br>
 };<br>
<br>
-static  uint8_t ms_hmac_key2[] = {<br>
-               0xFC, 0x1A, 0x7D, 0x3D, 0xF5, 0x82, 0x80, 0xF1,<br>
-               0xF1, 0x35, 0x5C, 0x3B, 0xDD, 0x9A, 0x65, 0xBA,<br>
-               0x58, 0x34, 0x85, 0x65, 0x1C, 0x42, 0x50, 0x76,<br>
-               0x9A, 0xAF, 0x88, 0x1B, 0xB6, 0x8F, 0xF8, 0x60,<br>
-               0xA2, 0x5A, 0x7F, 0x3F, 0xF4, 0x72, 0x70, 0xF1,<br>
-               0xF5, 0x35, 0x4C, 0x3B, 0xDD, 0x90, 0x65, 0xB0,<br>
-               0x47, 0x3A, 0x75, 0x61, 0x5C, 0xA2, 0x10, 0x76,<br>
-               0x9A, 0xAF, 0x77, 0x5B, 0xB6, 0x7F, 0xF7, 0x60<br>
-};<br>
-<br>
-static const uint8_t ms_hmac_digest2[] = {<br>
-               0xA5, 0x0F, 0x9C, 0xFB, 0x08, 0x62, 0x59, 0xFF,<br>
-               0x80, 0x2F, 0xEB, 0x4B, 0xE1, 0x46, 0x21, 0xD6,<br>
-               0x02, 0x98, 0xF2, 0x8E, 0xF4, 0xEC, 0xD4, 0x77,<br>
-               0x86, 0x4C, 0x31, 0x28, 0xC8, 0x25, 0x80, 0x27,<br>
-               0x3A, 0x72, 0x5D, 0x6A, 0x56, 0x8A, 0xD3, 0x82,<br>
-               0xB0, 0xEC, 0x31, 0x6D, 0x8B, 0x6B, 0xB4, 0x24,<br>
-               0xE7, 0x62, 0xC1, 0x52, 0xBC, 0x14, 0x1B, 0x8E,<br>
-               0xEC, 0x9A, 0xF1, 0x47, 0x80, 0xD2, 0xB0, 0x59<br>
-};<br>
-<br>
 /* End Session 2 */<br>
<br>
 #define MAX_OPS_PROCESSED (MAX_NUM_OPS_INFLIGHT - 1)<br>
@@ -8988,218 +8802,170 @@ test_verify_auth_aes_cmac_cipher_null_test_case_1(void)<br>
<br>
 /* ***** AEAD algorithm Tests ***** */<br>
<br>
+static void<br>
+setup_aead_xform(const struct aead_test_data *data,<br>
+       struct rte_crypto_sym_xform *xform)<br>
+{<br>
+       xform->type = RTE_CRYPTO_SYM_XFORM_AEAD;<br>
+       xform->next = NULL;<br>
+       xform->aead.algo = data->algo;<br>
+       xform->aead.key.length = data->key.len;<br>
+       xform->aead.iv.offset = IV_OFFSET;<br>
+       xform->aead.iv.length = data->iv.len;<br>
+       xform->aead.digest_length = data->auth_tag.len;<br>
+       xform->aead.aad_length = data->aad.len;<br>
+}<br>
+<br>
 static int<br>
-create_aead_session(uint8_t dev_id, enum rte_crypto_aead_algorithm algo,<br>
-               enum rte_crypto_aead_operation op,<br>
-               const uint8_t *key, const uint8_t key_len,<br>
-               const uint16_t aad_len, const uint8_t auth_len,<br>
-               uint8_t iv_len)<br>
+create_aead_session(uint8_t dev_id, enum rte_crypto_aead_operation aead_op,<br>
+       const struct aead_test_data *data)<br>
 {<br>
+       const int key_len = data->key.len;<br>
+       /*<br>
+        * PMD stops to rely on the xform values as soon as the 'session create'<br>
+        * functions exits. Hence it is ok to use a local array to store a key.<br>
+        */<br>
        uint8_t aead_key[key_len];<br>
<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       struct crypto_unittest_params *ut_params = &unittest_params;<br>
-<br>
-       memcpy(aead_key, key, key_len);<br>
-<br>
-       /* Setup AEAD Parameters */<br>
-       ut_params->aead_xform.type = RTE_CRYPTO_SYM_XFORM_AEAD;<br>
-       ut_params->aead_xform.next = NULL;<br>
-       ut_params->aead_xform.aead.algo = algo;<br>
-       ut_params->aead_xform.aead.op = op;<br>
-       ut_params->aead_xform.aead.key.data = aead_key;<br>
-       ut_params->aead_xform.aead.key.length = key_len;<br>
-       ut_params->aead_xform.aead.iv.offset = IV_OFFSET;<br>
-       ut_params->aead_xform.aead.iv.length = iv_len;<br>
-       ut_params->aead_xform.aead.digest_length = auth_len;<br>
-       ut_params->aead_xform.aead.aad_length = aad_len;<br>
-<br>
-       debug_hexdump(stdout, "key:", key, key_len);<br>
-<br>
-       /* Create Crypto session*/<br>
-       ut_params->sess = rte_cryptodev_sym_session_create(dev_id,<br>
-                       &ut_params->aead_xform, ts_params->session_mpool);<br>
-       if (ut_params->sess == NULL && rte_errno == ENOTSUP)<br>
-               return TEST_SKIPPED;<br>
-       TEST_ASSERT_NOT_NULL(ut_params->sess, "Session creation failed");<br>
+       memcpy(aead_key, data->key.data, key_len);<br>
+       /* Setup AEAD xform parameters */<br>
+       self->aead_xform.aead.op = aead_op;<br>
+       self->aead_xform.aead.key.data = aead_key;<br>
+       setup_aead_xform(data, &self->aead_xform);<br>
+       /* Create cryptodev session */<br>
+       self->sess = rte_cryptodev_sym_session_create(dev_id,<br>
+                       &self->aead_xform, testsuite_params.session_mpool);<br>
+       if (self->sess == NULL && rte_errno == ENOTSUP)<br>
+               return TEST_SKIPPED;<br>
+       TEST_ASSERT_NOT_NULL(self->sess, "Session creation failed");<br>
        return 0;<br>
 }<br>
<br>
 static int<br>
 create_aead_xform(struct rte_crypto_op *op,<br>
-               enum rte_crypto_aead_algorithm algo,<br>
-               enum rte_crypto_aead_operation aead_op,<br>
-               uint8_t *key, const uint8_t key_len,<br>
-               const uint8_t aad_len, const uint8_t auth_len,<br>
-               uint8_t iv_len)<br>
+       enum rte_crypto_aead_operation aead_op,<br>
+       const struct aead_test_data *data,<br>
+       uint8_t *key)<br>
 {<br>
        TEST_ASSERT_NOT_NULL(rte_crypto_op_sym_xforms_alloc(op, 1),<br>
-                       "failed to allocate space for crypto transform");<br>
-<br>
-       struct rte_crypto_sym_op *sym_op = op->sym;<br>
-<br>
-       /* Setup AEAD Parameters */<br>
-       sym_op->xform->type = RTE_CRYPTO_SYM_XFORM_AEAD;<br>
-       sym_op->xform->next = NULL;<br>
-       sym_op->xform->aead.algo = algo;<br>
-       sym_op->xform->aead.op = aead_op;<br>
-       sym_op->xform->aead.key.data = key;<br>
-       sym_op->xform->aead.key.length = key_len;<br>
-       sym_op->xform->aead.iv.offset = IV_OFFSET;<br>
-       sym_op->xform->aead.iv.length = iv_len;<br>
-       sym_op->xform->aead.digest_length = auth_len;<br>
-       sym_op->xform->aead.aad_length = aad_len;<br>
-<br>
-       debug_hexdump(stdout, "key:", key, key_len);<br>
+               "Failed to allocate space for cryptodev xform");<br>
+       /* Setup AEAD xform parameters */<br>
+       op->sym->xform->aead.op = aead_op;<br>
+       op->sym->xform->aead.key.data = key;<br>
+       setup_aead_xform(data, op->sym->xform);<br>
<br>
        return 0;<br>
 }<br>
<br>
 static int<br>
 create_aead_operation(enum rte_crypto_aead_operation op,<br>
-               const struct aead_test_data *tdata)<br>
+               const struct aead_test_data *data)<br>
 {<br>
-       struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
-       struct crypto_unittest_params *ut_params = &unittest_params;<br>
-<br>
-       uint8_t *plaintext, *ciphertext;<br>
+       uint8_t *plaintext, *ciphertext, *iv_ptr;<br>
        unsigned int aad_pad_len, plaintext_pad_len;<br>
-<br>
-       /* Generate Crypto op data structure */<br>
-       ut_params->op = rte_crypto_op_alloc(ts_params->op_mpool,<br>
-                       RTE_CRYPTO_OP_TYPE_SYMMETRIC);<br>
-       TEST_ASSERT_NOT_NULL(ut_params->op,<br>
-                       "Failed to allocate symmetric crypto operation struct");<br>
-<br>
-       struct rte_crypto_sym_op *sym_op = ut_params->op->sym;<br>
+       struct rte_crypto_sym_op *sym_op = self->op->sym;<br>
<br>
        /* Append aad data */<br>
-       if (tdata->algo == RTE_CRYPTO_AEAD_AES_CCM) {<br>
-               aad_pad_len = RTE_ALIGN_CEIL(tdata->aad.len + 18, 16);<br>
-               sym_op->aead.aad.data = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,<br>
+       if (data->algo == RTE_CRYPTO_AEAD_AES_CCM) {<br>
+               aad_pad_len = RTE_ALIGN_CEIL(data->aad.len + 18, 16);<br>
+               sym_op->aead.aad.data = (uint8_t *)rte_pktmbuf_append(self->ibuf,<br>
                                aad_pad_len);<br>
                TEST_ASSERT_NOT_NULL(sym_op->aead.aad.data,<br>
                                "no room to append aad");<br>
-<br>
                sym_op->aead.aad.phys_addr =<br>
-                               rte_pktmbuf_iova(ut_params->ibuf);<br>
+                               rte_pktmbuf_iova(self->ibuf);<br>
                /* Copy AAD 18 bytes after the AAD pointer, according to the API */<br>
-               memcpy(sym_op->aead.aad.data + 18, tdata->aad.data, tdata->aad.len);<br>
-               debug_hexdump(stdout, "aad:", sym_op->aead.aad.data + 18,<br>
-                       tdata->aad.len);<br>
-<br>
+               memcpy(sym_op->aead.aad.data + 18, data->aad.data, data->aad.len);<br>
                /* Append IV at the end of the crypto operation*/<br>
-               uint8_t *iv_ptr = rte_crypto_op_ctod_offset(ut_params->op,<br>
+               iv_ptr = rte_crypto_op_ctod_offset(self->op,<br>
                                uint8_t *, IV_OFFSET);<br>
-<br>
                /* Copy IV 1 byte after the IV pointer, according to the API */<br>
-               rte_memcpy(iv_ptr + 1, tdata->iv.data, tdata->iv.len);<br>
-               debug_hexdump(stdout, "iv:", iv_ptr + 1,<br>
-                       tdata->iv.len);<br>
+               rte_memcpy(iv_ptr + 1, data->iv.data, data->iv.len);<br>
        } else {<br>
-               aad_pad_len = RTE_ALIGN_CEIL(tdata->aad.len, 16);<br>
-               sym_op->aead.aad.data = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,<br>
+               aad_pad_len = RTE_ALIGN_CEIL(data->aad.len, 16);<br>
+               sym_op->aead.aad.data = (uint8_t *)rte_pktmbuf_append(self->ibuf,<br>
                                aad_pad_len);<br>
                TEST_ASSERT_NOT_NULL(sym_op->aead.aad.data,<br>
                                "no room to append aad");<br>
-<br>
                sym_op->aead.aad.phys_addr =<br>
-                               rte_pktmbuf_iova(ut_params->ibuf);<br>
-               memcpy(sym_op->aead.aad.data, tdata->aad.data, tdata->aad.len);<br>
-               debug_hexdump(stdout, "aad:", sym_op->aead.aad.data,<br>
-                       tdata->aad.len);<br>
-<br>
+                               rte_pktmbuf_iova(self->ibuf);<br>
+               memcpy(sym_op->aead.aad.data, data->aad.data, data->aad.len);<br>
                /* Append IV at the end of the crypto operation*/<br>
-               uint8_t *iv_ptr = rte_crypto_op_ctod_offset(ut_params->op,<br>
+               iv_ptr = rte_crypto_op_ctod_offset(self->op,<br>
                                uint8_t *, IV_OFFSET);<br>
-<br>
-               if (tdata->iv.len == 0) {<br>
-                       rte_memcpy(iv_ptr, tdata->iv.data, AES_GCM_J0_LENGTH);<br>
-                       debug_hexdump(stdout, "iv:", iv_ptr,<br>
-                               AES_GCM_J0_LENGTH);<br>
-               } else {<br>
-                       rte_memcpy(iv_ptr, tdata->iv.data, tdata->iv.len);<br>
-                       debug_hexdump(stdout, "iv:", iv_ptr,<br>
-                               tdata->iv.len);<br>
-               }<br>
+               if (data->iv.len == 0)<br>
+                       rte_memcpy(iv_ptr, data->iv.data, AES_GCM_J0_LENGTH);<br>
+               else<br>
+                       rte_memcpy(iv_ptr, data->iv.data, data->iv.len);<br>
        }<br>
<br>
        /* Append plaintext/ciphertext */<br>
        if (op == RTE_CRYPTO_AEAD_OP_ENCRYPT) {<br>
-               plaintext_pad_len = RTE_ALIGN_CEIL(tdata->plaintext.len, 16);<br>
-               plaintext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,<br>
+               plaintext_pad_len = RTE_ALIGN_CEIL(data->plaintext.len, 16);<br>
+               plaintext = (uint8_t *)rte_pktmbuf_append(self->ibuf,<br>
                                plaintext_pad_len);<br>
                TEST_ASSERT_NOT_NULL(plaintext, "no room to append plaintext");<br>
<br>
-               memcpy(plaintext, tdata->plaintext.data, tdata->plaintext.len);<br>
-               debug_hexdump(stdout, "plaintext:", plaintext,<br>
-                               tdata->plaintext.len);<br>
-<br>
-               if (ut_params->obuf) {<br>
+               memcpy(plaintext, data->plaintext.data, data->plaintext.len);<br>
+               if (self->obuf) {<br>
                        ciphertext = (uint8_t *)rte_pktmbuf_append(<br>
-                                       ut_params->obuf,<br>
+                                       self->obuf,<br>
                                        plaintext_pad_len + aad_pad_len);<br>
                        TEST_ASSERT_NOT_NULL(ciphertext,<br>
                                        "no room to append ciphertext");<br>
-<br>
                        memset(ciphertext + aad_pad_len, 0,<br>
-                                       tdata->ciphertext.len);<br>
+                                       data->ciphertext.len);<br>
                }<br>
        } else {<br>
-               plaintext_pad_len = RTE_ALIGN_CEIL(tdata->ciphertext.len, 16);<br>
-               ciphertext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,<br>
+               plaintext_pad_len = RTE_ALIGN_CEIL(data->ciphertext.len, 16);<br>
+               ciphertext = (uint8_t *)rte_pktmbuf_append(self->ibuf,<br>
                                plaintext_pad_len);<br>
                TEST_ASSERT_NOT_NULL(ciphertext,<br>
                                "no room to append ciphertext");<br>
-<br>
-               memcpy(ciphertext, tdata->ciphertext.data,<br>
-                               tdata->ciphertext.len);<br>
-               debug_hexdump(stdout, "ciphertext:", ciphertext,<br>
-                               tdata->ciphertext.len);<br>
-<br>
-               if (ut_params->obuf) {<br>
+               memcpy(ciphertext, data->ciphertext.data,<br>
+                               data->ciphertext.len);<br>
+               if (self->obuf) {<br>
                        plaintext = (uint8_t *)rte_pktmbuf_append(<br>
-                                       ut_params->obuf,<br>
+                                       self->obuf,<br>
                                        plaintext_pad_len + aad_pad_len);<br>
                        TEST_ASSERT_NOT_NULL(plaintext,<br>
                                        "no room to append plaintext");<br>
-<br>
                        memset(plaintext + aad_pad_len, 0,<br>
-                                       tdata->plaintext.len);<br>
+                                       data->plaintext.len);<br>
                }<br>
        }<br>
<br>
        /* Append digest data */<br>
        if (op == RTE_CRYPTO_AEAD_OP_ENCRYPT) {<br>
                sym_op->aead.digest.data = (uint8_t *)rte_pktmbuf_append(<br>
-                               ut_params->obuf ? ut_params->obuf :<br>
-                                               ut_params->ibuf,<br>
-                                               tdata->auth_tag.len);<br>
+                               self->obuf ? self->obuf :<br>
+                                               self->ibuf,<br>
+                                               data->auth_tag.len);<br>
                TEST_ASSERT_NOT_NULL(sym_op->aead.digest.data,<br>
                                "no room to append digest");<br>
-               memset(sym_op->aead.digest.data, 0, tdata->auth_tag.len);<br>
+               memset(sym_op->aead.digest.data, 0, data->auth_tag.len);<br>
                sym_op->aead.digest.phys_addr = rte_pktmbuf_iova_offset(<br>
-                               ut_params->obuf ? ut_params->obuf :<br>
-                                               ut_params->ibuf,<br>
+                               self->obuf ? self->obuf :<br>
+                                               self->ibuf,<br>
                                                plaintext_pad_len +<br>
                                                aad_pad_len);<br>
        } else {<br>
                sym_op->aead.digest.data = (uint8_t *)rte_pktmbuf_append(<br>
-                               ut_params->ibuf, tdata->auth_tag.len);<br>
+                               self->ibuf, data->auth_tag.len);<br>
                TEST_ASSERT_NOT_NULL(sym_op->aead.digest.data,<br>
                                "no room to append digest");<br>
                sym_op->aead.digest.phys_addr = rte_pktmbuf_iova_offset(<br>
-                               ut_params->ibuf,<br>
+                               self->ibuf,<br>
                                plaintext_pad_len + aad_pad_len);<br>
<br>
-               rte_memcpy(sym_op->aead.digest.data, tdata->auth_tag.data,<br>
-                       tdata->auth_tag.len);<br>
+               rte_memcpy(sym_op->aead.digest.data, data->auth_tag.data,<br>
+                       data->auth_tag.len);<br>
                debug_hexdump(stdout, "digest:",<br>
                        sym_op->aead.digest.data,<br>
-                       tdata->auth_tag.len);<br>
+                       data->auth_tag.len);<br>
        }<br>
<br>
-       sym_op->aead.data.length = tdata->plaintext.len;<br>
+       sym_op->aead.data.length = data->plaintext.len;<br>
        sym_op->aead.data.offset = aad_pad_len;<br>
<br>
        return 0;<br>
@@ -9215,10 +8981,7 @@ test_authenticated_encryption_helper(const struct aead_test_data *tdata, bool us<br>
        uint8_t *ciphertext, *auth_tag;<br>
        uint16_t plaintext_pad_len;<br>
        uint32_t i;<br>
-       struct rte_cryptodev_info dev_info;<br>
-<br>
-       rte_cryptodev_info_get(ts_params->valid_devs[0], &dev_info);<br>
-       uint64_t feat_flags = dev_info.feature_flags;<br>
+       uint64_t feat_flags = ts_params->dev_info.feature_flags;<br>
<br>
        if ((global_api_test_type == CRYPTODEV_RAW_API_TEST) &&<br>
                        (!(feat_flags & RTE_CRYPTODEV_FF_SYM_RAW_DP))) {<br>
@@ -9242,11 +9005,7 @@ test_authenticated_encryption_helper(const struct aead_test_data *tdata, bool us<br>
<br>
        /* Create AEAD session */<br>
        retval = create_aead_session(ts_params->valid_devs[0],<br>
-                       tdata->algo,<br>
-                       RTE_CRYPTO_AEAD_OP_ENCRYPT,<br>
-                       tdata->key.data, tdata->key.len,<br>
-                       tdata->aad.len, tdata->auth_tag.len,<br>
-                       tdata->iv.len);<br>
+                       RTE_CRYPTO_AEAD_OP_ENCRYPT, tdata);<br>
        if (retval != TEST_SUCCESS)<br>
                return retval;<br>
<br>
@@ -9265,9 +9024,9 @@ test_authenticated_encryption_helper(const struct aead_test_data *tdata, bool us<br>
        } else {<br>
                if (use_ext_mbuf) {<br>
                        ut_params->ibuf = ext_mbuf_create(ts_params->mbuf_pool,<br>
-                                                         AEAD_TEXT_MAX_LENGTH,<br>
-                                                         1 /* nb_segs */,<br>
-                                                         NULL);<br>
+                                               AEAD_TEXT_MAX_LENGTH,<br>
+                                               1 /* nb_segs */,<br>
+                                               NULL);<br>
                } else {<br>
                        ut_params->ibuf = rte_pktmbuf_alloc(ts_params->mbuf_pool);<br>
                }<br>
@@ -9275,7 +9034,7 @@ test_authenticated_encryption_helper(const struct aead_test_data *tdata, bool us<br>
<br>
        /* clear mbuf payload */<br>
        memset(rte_pktmbuf_mtod(ut_params->ibuf, uint8_t *), 0,<br>
-                       rte_pktmbuf_tailroom(ut_params->ibuf));<br>
+               rte_pktmbuf_tailroom(ut_params->ibuf));<br>
<br>
        /* Create AEAD operation */<br>
        retval = create_aead_operation(RTE_CRYPTO_AEAD_OP_ENCRYPT, tdata);<br>
@@ -9337,7 +9096,7 @@ test_authenticated_encryption_helper(const struct aead_test_data *tdata, bool us<br>
 }<br>
<br>
 static int<br>
-test_authenticated_encryption(const struct aead_test_data *tdata)<br>
+test_authenticated_encryption(const void *tdata)<br>
 {<br>
        return test_authenticated_encryption_helper(tdata, false);<br>
 }<br>
@@ -12869,60 +12628,12 @@ test_tls_1_3_record_proto_sgl_oop(void)<br>
 #endif<br>
<br>
 static int<br>
-test_AES_GCM_authenticated_encryption_test_case_1(void)<br>
-{<br>
-       return test_authenticated_encryption(&gcm_test_case_1);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_encryption_test_case_2(void)<br>
-{<br>
-       return test_authenticated_encryption(&gcm_test_case_2);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_encryption_test_case_3(void)<br>
-{<br>
-       return test_authenticated_encryption(&gcm_test_case_3);<br>
-}<br>
-<br>
-static int<br>
 test_AES_GCM_authenticated_encryption_test_case_3_ext_mbuf(void)<br>
 {<br>
        return test_authenticated_encryption_helper(&gcm_test_case_3, true);<br>
 }<br>
<br>
 static int<br>
-test_AES_GCM_authenticated_encryption_test_case_4(void)<br>
-{<br>
-       return test_authenticated_encryption(&gcm_test_case_4);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_encryption_test_case_5(void)<br>
-{<br>
-       return test_authenticated_encryption(&gcm_test_case_5);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_encryption_test_case_6(void)<br>
-{<br>
-       return test_authenticated_encryption(&gcm_test_case_6);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_encryption_test_case_7(void)<br>
-{<br>
-       return test_authenticated_encryption(&gcm_test_case_7);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_encryption_test_case_8(void)<br>
-{<br>
-       return test_authenticated_encryption(&gcm_test_case_8);<br>
-}<br>
-<br>
-static int<br>
 test_AES_GCM_J0_authenticated_encryption_test_case_1(void)<br>
 {<br>
        return test_authenticated_encryption(&gcm_J0_test_case_1);<br>
@@ -13159,11 +12870,8 @@ test_authenticated_decryption_helper(const struct aead_test_data *tdata, bool us<br>
<br>
        /* Create AEAD session */<br>
        retval = create_aead_session(ts_params->valid_devs[0],<br>
-                       tdata->algo,<br>
                        RTE_CRYPTO_AEAD_OP_DECRYPT,<br>
-                       tdata->key.data, tdata->key.len,<br>
-                       tdata->aad.len, tdata->auth_tag.len,<br>
-                       tdata->iv.len);<br>
+                       tdata);<br>
        if (retval != TEST_SUCCESS)<br>
                return retval;<br>
<br>
@@ -13243,66 +12951,18 @@ test_authenticated_decryption_helper(const struct aead_test_data *tdata, bool us<br>
 }<br>
<br>
 static int<br>
-test_authenticated_decryption(const struct aead_test_data *tdata)<br>
+test_authenticated_decryption(const void *tdata)<br>
 {<br>
        return test_authenticated_decryption_helper(tdata, false);<br>
 }<br>
<br>
 static int<br>
-test_AES_GCM_authenticated_decryption_test_case_1(void)<br>
-{<br>
-       return test_authenticated_decryption(&gcm_test_case_1);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_decryption_test_case_2(void)<br>
-{<br>
-       return test_authenticated_decryption(&gcm_test_case_2);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_decryption_test_case_3(void)<br>
-{<br>
-       return test_authenticated_decryption(&gcm_test_case_3);<br>
-}<br>
-<br>
-static int<br>
 test_AES_GCM_authenticated_decryption_test_case_3_ext_mbuf(void)<br>
 {<br>
        return test_authenticated_decryption_helper(&gcm_test_case_3, true);<br>
 }<br>
<br>
 static int<br>
-test_AES_GCM_authenticated_decryption_test_case_4(void)<br>
-{<br>
-       return test_authenticated_decryption(&gcm_test_case_4);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_decryption_test_case_5(void)<br>
-{<br>
-       return test_authenticated_decryption(&gcm_test_case_5);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_decryption_test_case_6(void)<br>
-{<br>
-       return test_authenticated_decryption(&gcm_test_case_6);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_decryption_test_case_7(void)<br>
-{<br>
-       return test_authenticated_decryption(&gcm_test_case_7);<br>
-}<br>
-<br>
-static int<br>
-test_AES_GCM_authenticated_decryption_test_case_8(void)<br>
-{<br>
-       return test_authenticated_decryption(&gcm_test_case_8);<br>
-}<br>
-<br>
-static int<br>
 test_AES_GCM_J0_authenticated_decryption_test_case_1(void)<br>
 {<br>
        return test_authenticated_decryption(&gcm_J0_test_case_1);<br>
@@ -13547,11 +13207,8 @@ test_authenticated_encryption_oop(const struct aead_test_data *tdata)<br>
<br>
        /* Create AEAD session */<br>
        retval = create_aead_session(ts_params->valid_devs[0],<br>
-                       tdata->algo,<br>
                        RTE_CRYPTO_AEAD_OP_ENCRYPT,<br>
-                       tdata->key.data, tdata->key.len,<br>
-                       tdata->aad.len, tdata->auth_tag.len,<br>
-                       tdata->iv.len);<br>
+                       tdata);<br>
        if (retval < 0)<br>
                return retval;<br>
<br>
@@ -13659,11 +13316,8 @@ test_authenticated_decryption_oop(const struct aead_test_data *tdata)<br>
<br>
        /* Create AEAD session */<br>
        retval = create_aead_session(ts_params->valid_devs[0],<br>
-                       tdata->algo,<br>
                        RTE_CRYPTO_AEAD_OP_DECRYPT,<br>
-                       tdata->key.data, tdata->key.len,<br>
-                       tdata->aad.len, tdata->auth_tag.len,<br>
-                       tdata->iv.len);<br>
+                       tdata);<br>
        if (retval < 0)<br>
                return retval;<br>
<br>
@@ -13770,11 +13424,8 @@ test_authenticated_encryption_sessionless(<br>
        /* Create GCM xform */<br>
        memcpy(key, tdata->key.data, tdata->key.len);<br>
        retval = create_aead_xform(ut_params->op,<br>
-                       tdata->algo,<br>
                        RTE_CRYPTO_AEAD_OP_ENCRYPT,<br>
-                       key, tdata->key.len,<br>
-                       tdata->aad.len, tdata->auth_tag.len,<br>
-                       tdata->iv.len);<br>
+                       tdata, key);<br>
        if (retval < 0)<br>
                return retval;<br>
<br>
@@ -13878,11 +13529,8 @@ test_authenticated_decryption_sessionless(<br>
        /* Create AEAD xform */<br>
        memcpy(key, tdata->key.data, tdata->key.len);<br>
        retval = create_aead_xform(ut_params->op,<br>
-                       tdata->algo,<br>
                        RTE_CRYPTO_AEAD_OP_DECRYPT,<br>
-                       key, tdata->key.len,<br>
-                       tdata->aad.len, tdata->auth_tag.len,<br>
-                       tdata->iv.len);<br>
+                       tdata, key);<br>
        if (retval < 0)<br>
                return retval;<br>
<br>
@@ -14046,10 +13694,39 @@ test_stats(void)<br>
 {<br>
        struct crypto_testsuite_params *ts_params = &testsuite_params;<br>
        struct rte_cryptodev_stats stats;<br>
+       struct rte_cryptodev_qp_conf qp_conf = {<br>
+               .nb_descriptors = MAX_NUM_OPS_INFLIGHT,<br>
+               .mp_session = ts_params->session_mpool<br>
+       };<br>
+       uint16_t qp_id, dev_id;<br>
+       dev_id = ts_params->valid_devs[0];<br>
<br>
        if (gbl_action_type == RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO)<br>
                return TEST_SKIPPED;<br>
<br>
+       /* Stop the device in case it's started so it can be configured */<br>
+       rte_cryptodev_stop(dev_id);<br>
+<br>
+       TEST_ASSERT_SUCCESS(rte_cryptodev_configure(dev_id, &ts_params->conf),<br>
+                       "Failed test for rte_cryptodev_configure: "<br>
+                       "dev_num %u", dev_id);<br>
+       for (qp_id = 0; qp_id < ts_params->conf.nb_queue_pairs; qp_id++) {<br>
+               TEST_ASSERT_SUCCESS(rte_cryptodev_queue_pair_setup(<br>
+                               ts_params->valid_devs[0], qp_id, &qp_conf,<br>
+                               rte_cryptodev_socket_id(<br>
+                                               ts_params->valid_devs[0])),<br>
+                               "Failed test for "<br>
+                               "rte_cryptodev_queue_pair_setup: num_inflights "<br>
+                               "%u on qp %u on cryptodev %u",<br>
+                               qp_conf.nb_descriptors, qp_id,<br>
+                               ts_params->valid_devs[0]);<br>
+       }<br>
+<br>
+       /* Start the device */<br>
+       TEST_ASSERT_SUCCESS(rte_cryptodev_start(ts_params->valid_devs[0]),<br>
+                       "Failed to start cryptodev %u",<br>
+                       ts_params->valid_devs[0]);<br>
+<br>
        /* Verify the capabilities */<br>
        struct rte_cryptodev_sym_capability_idx cap_idx;<br>
        cap_idx.type = RTE_CRYPTO_SYM_XFORM_AUTH;<br>
@@ -14106,6 +13783,9 @@ test_stats(void)<br>
        TEST_ASSERT((stats.dequeued_count == 0),<br>
                "rte_cryptodev_stats_get returned unexpected dequeued stat after valid reset");<br>
<br>
+       /* Stop the device in case it's started so it can be configured */<br>
+       rte_cryptodev_stop(dev_id);<br>
+<br>
        return TEST_SUCCESS;<br>
 }<br>
<br>
@@ -16842,11 +16522,8 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,<br>
<br>
        /* Create AEAD session */<br>
        retval = create_aead_session(ts_params->valid_devs[0],<br>
-                       tdata->algo,<br>
                        RTE_CRYPTO_AEAD_OP_ENCRYPT,<br>
-                       tdata->key.data, tdata->key.len,<br>
-                       tdata->aad.len, tdata->auth_tag.len,<br>
-                       tdata->iv.len);<br>
+                       tdata);<br>
        if (retval < 0)<br>
                return retval;<br>
<br>
@@ -18425,9 +18102,10 @@ static struct unit_test_suite docsis_proto_testsuite  = {<br>
 };<br>
 #endif<br>
<br>
-static struct unit_test_suite cryptodev_gen_testsuite  = {<br>
+static struct unit_test_suite testsuite_gen_testsuite  = {<br>
        .suite_name = "Crypto General Unit Test Suite",<br>
-       .setup = crypto_gen_testsuite_setup,<br>
+       .setup = ts_setup_crypto_gen,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
                                test_device_reconfigure),<br>
@@ -18446,9 +18124,10 @@ static struct unit_test_suite cryptodev_gen_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_negative_hmac_sha1_testsuite = {<br>
+static struct unit_test_suite testsuite_negative_hmac_sha1 = {<br>
        .suite_name = "Negative HMAC SHA1 Unit Test Suite",<br>
-       .setup = negative_hmac_sha1_testsuite_setup,<br>
+       .setup = ts_setup_negative_hmac_sha1,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                /** Negative tests */<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
@@ -18464,9 +18143,10 @@ static struct unit_test_suite cryptodev_negative_hmac_sha1_testsuite = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_multi_session_testsuite = {<br>
+static struct unit_test_suite testsuite_multi_session = {<br>
        .suite_name = "Multi Session Unit Test Suite",<br>
-       .setup = multi_session_testsuite_setup,<br>
+       .setup = ts_setup_multi_session,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                TEST_CASE_ST(ut_setup, ut_teardown, test_multi_session),<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
@@ -18476,9 +18156,10 @@ static struct unit_test_suite cryptodev_multi_session_testsuite = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_null_testsuite  = {<br>
+static struct unit_test_suite testsuite_null  = {<br>
        .suite_name = "NULL Test Suite",<br>
-       .setup = null_testsuite_setup,<br>
+       .setup = ts_testsuite_null,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
                        test_null_invalid_operation),<br>
@@ -18487,9 +18168,10 @@ static struct unit_test_suite cryptodev_null_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_aes_ccm_auth_testsuite  = {<br>
-       .suite_name = "AES CCM Authenticated Test Suite",<br>
-       .setup = aes_ccm_auth_testsuite_setup,<br>
+static struct unit_test_suite testsuite_aes_ccm  = {<br>
+       .suite_name = "AES CCM test suite",<br>
+       .setup = ts_setup_aes_ccm,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                /** AES CCM Authenticated Encryption 128 bits key*/<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
@@ -18542,163 +18224,158 @@ static struct unit_test_suite cryptodev_aes_ccm_auth_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_aes_gcm_auth_testsuite  = {<br>
+#define ADD_GCM_ENC_TESTCASE(desc, data)                               \<br>
+       TEST_CASE_NAMED_WITH_DATA(desc, ut_setup,                       \<br>
+       ut_teardown_aes_gcm, test_authenticated_encryption,             \<br>
+       (const void *) data)<br>
+#define ADD_GCM_DEC_TESTCASE(desc, data)                               \<br>
+       TEST_CASE_NAMED_WITH_DATA(desc, ut_setup,                       \<br>
+       ut_teardown_aes_gcm, test_authenticated_decryption,             \<br>
+       (const void *) data)<br>
+<br>
+static struct unit_test_suite testsuite_aes_gcm  = {<br>
        .suite_name = "AES GCM Authenticated Test Suite",<br>
-       .setup = aes_gcm_auth_testsuite_setup,<br>
+       .setup = ts_setup_aes_gcm,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                /** AES GCM Authenticated Encryption */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encrypt_SGL_in_place_1500B),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encrypt_SGL_out_of_place_400B_400B),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encrypt_SGL_out_of_place_1500B_2000B),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encrypt_SGL_out_of_place_400B_1seg),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_encryption_test_case_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_encryption_test_case_2),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_encryption_test_case_3),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_encryption_test_case_4),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_encryption_test_case_5),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_encryption_test_case_6),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_encryption_test_case_7),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_encryption_test_case_8),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               ADD_GCM_ENC_TESTCASE("AES GCM encryption test 1", &gcm_test_case_1),<br>
+               ADD_GCM_ENC_TESTCASE("AES GCM encryption test 2", &gcm_test_case_2),<br>
+               ADD_GCM_ENC_TESTCASE("AES GCM encryption test 3", &gcm_test_case_3),<br>
+               ADD_GCM_ENC_TESTCASE("AES GCM encryption test 4", &gcm_test_case_4),<br>
+               ADD_GCM_ENC_TESTCASE("AES GCM encryption test 5", &gcm_test_case_5),<br>
+               ADD_GCM_ENC_TESTCASE("AES GCM encryption test 6", &gcm_test_case_6),<br>
+               ADD_GCM_ENC_TESTCASE("AES GCM encryption test 7", &gcm_test_case_7),<br>
+               ADD_GCM_ENC_TESTCASE("AES GCM encryption test 8", &gcm_test_case_8),<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_J0_authenticated_encryption_test_case_1),<br>
<br>
                /** AES GCM Authenticated Decryption */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_decryption_test_case_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_decryption_test_case_2),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_decryption_test_case_3),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_decryption_test_case_4),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_decryption_test_case_5),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_decryption_test_case_6),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_decryption_test_case_7),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
-                       test_AES_GCM_authenticated_decryption_test_case_8),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               ADD_GCM_DEC_TESTCASE("AES GCM decryption test 1", &gcm_test_case_1),<br>
+               ADD_GCM_DEC_TESTCASE("AES GCM decryption test 2", &gcm_test_case_2),<br>
+               ADD_GCM_DEC_TESTCASE("AES GCM decryption test 3", &gcm_test_case_3),<br>
+               ADD_GCM_DEC_TESTCASE("AES GCM decryption test 4", &gcm_test_case_4),<br>
+               ADD_GCM_DEC_TESTCASE("AES GCM decryption test 5", &gcm_test_case_5),<br>
+               ADD_GCM_DEC_TESTCASE("AES GCM decryption test 6", &gcm_test_case_6),<br>
+               ADD_GCM_DEC_TESTCASE("AES GCM decryption test 7", &gcm_test_case_7),<br>
+               ADD_GCM_DEC_TESTCASE("AES GCM decryption test 8", &gcm_test_case_8),<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_J0_authenticated_decryption_test_case_1),<br>
<br>
                /** AES GCM Authenticated Encryption 192 bits key */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_192_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_192_2),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_192_3),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_192_4),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_192_5),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_192_6),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_192_7),<br>
<br>
                /** AES GCM Authenticated Decryption 192 bits key */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_192_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_192_2),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_192_3),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_192_4),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_192_5),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_192_6),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_192_7),<br>
<br>
                /** AES GCM Authenticated Encryption 256 bits key */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_256_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_256_2),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_256_3),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_256_4),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_256_5),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_256_6),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_256_7),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_256_8),<br>
<br>
                /** AES GCM Authenticated Decryption 256 bits key */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_256_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_256_2),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_256_3),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_256_4),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_256_5),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_256_6),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_256_7),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_256_8),<br>
<br>
                /** AES GCM Authenticated Encryption big aad size */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_aad_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_encryption_test_case_aad_2),<br>
<br>
                /** AES GCM Authenticated Decryption big aad size */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_aad_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_auth_decryption_test_case_aad_2),<br>
<br>
                /** Out of place tests */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_authenticated_encryption_oop_test_case_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_authenticated_decryption_oop_test_case_1),<br>
<br>
                /** Session-less tests */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_authenticated_encryption_sessionless_test_case_1),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_authenticated_decryption_sessionless_test_case_1),<br>
<br>
                /** AES GCM external mbuf tests */<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_authenticated_encryption_test_case_3_ext_mbuf),<br>
-               TEST_CASE_ST(ut_setup, ut_teardown,<br>
+               TEST_CASE_ST(ut_setup, ut_teardown_aes_gcm,<br>
                        test_AES_GCM_authenticated_decryption_test_case_3_ext_mbuf),<br>
<br>
                TEST_CASES_END()<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_aes_gmac_auth_testsuite  = {<br>
+static struct unit_test_suite testsuite_aes_gmac  = {<br>
        .suite_name = "AES GMAC Authentication Test Suite",<br>
-       .setup = aes_gmac_auth_testsuite_setup,<br>
+       .setup = ts_setup_aes_gmac,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
                        test_AES_GMAC_authentication_test_case_1),<br>
@@ -18729,9 +18406,10 @@ static struct unit_test_suite cryptodev_aes_gmac_auth_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_chacha20_poly1305_testsuite  = {<br>
+static struct unit_test_suite testsuite_chacha20_poly1305  = {<br>
        .suite_name = "Chacha20-Poly1305 Test Suite",<br>
-       .setup = chacha20_poly1305_testsuite_setup,<br>
+       .setup = ts_setup_chacha20_poly1305,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
                        test_chacha20_poly1305_encrypt_test_case_rfc8439),<br>
@@ -18743,9 +18421,10 @@ static struct unit_test_suite cryptodev_chacha20_poly1305_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_snow3g_testsuite  = {<br>
+static struct unit_test_suite testsuite_snow3g  = {<br>
        .suite_name = "SNOW 3G Test Suite",<br>
-       .setup = snow3g_testsuite_setup,<br>
+       .setup = ts_setup_snow3g,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                /** SNOW 3G encrypt only (UEA2) */<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
@@ -18877,9 +18556,10 @@ static struct unit_test_suite cryptodev_snow3g_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_zuc_testsuite  = {<br>
+static struct unit_test_suite testsuite_zuc  = {<br>
        .suite_name = "ZUC Test Suite",<br>
-       .setup = zuc_testsuite_setup,<br>
+       .setup = ts_setup_zuc,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                /** ZUC encrypt only (EEA3) */<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
@@ -19049,9 +18729,10 @@ static struct unit_test_suite cryptodev_zuc_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_hmac_md5_auth_testsuite  = {<br>
+static struct unit_test_suite testsuite_hmac_md5_auth  = {<br>
        .suite_name = "HMAC_MD5 Authentication Test Suite",<br>
-       .setup = hmac_md5_auth_testsuite_setup,<br>
+       .setup = ts_setup_hmac_md5,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
                        test_MD5_HMAC_generate_case_1),<br>
@@ -19065,9 +18746,10 @@ static struct unit_test_suite cryptodev_hmac_md5_auth_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_kasumi_testsuite  = {<br>
+static struct unit_test_suite testsuite_kasumi  = {<br>
        .suite_name = "Kasumi Test Suite",<br>
-       .setup = kasumi_testsuite_setup,<br>
+       .setup = ts_setup_kasumi,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                /** KASUMI hash only (UIA1) */<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
@@ -19156,9 +18838,10 @@ static struct unit_test_suite cryptodev_kasumi_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_esn_testsuite  = {<br>
+static struct unit_test_suite testsuite_esn  = {<br>
        .suite_name = "ESN Test Suite",<br>
-       .setup = esn_testsuite_setup,<br>
+       .setup = ts_setup_esn,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
                        auth_encrypt_AES128CBC_HMAC_SHA1_esn_check),<br>
@@ -19168,9 +18851,10 @@ static struct unit_test_suite cryptodev_esn_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_negative_aes_gcm_testsuite  = {<br>
+static struct unit_test_suite testsuite_negative_aes_gcm  = {<br>
        .suite_name = "Negative AES GCM Test Suite",<br>
-       .setup = negative_aes_gcm_testsuite_setup,<br>
+       .setup = ts_setup_negative_aes_gcm,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
                        test_AES_GCM_auth_encryption_fail_iv_corrupt),<br>
@@ -19201,9 +18885,10 @@ static struct unit_test_suite cryptodev_negative_aes_gcm_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_negative_aes_gmac_testsuite  = {<br>
+static struct unit_test_suite testsuite_negative_aes_gmac  = {<br>
        .suite_name = "Negative AES GMAC Test Suite",<br>
-       .setup = negative_aes_gmac_testsuite_setup,<br>
+       .setup = ts_setup_negative_aes_gmac,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
                        authentication_verify_AES128_GMAC_fail_data_corrupt),<br>
@@ -19214,9 +18899,10 @@ static struct unit_test_suite cryptodev_negative_aes_gmac_testsuite  = {<br>
        }<br>
 };<br>
<br>
-static struct unit_test_suite cryptodev_mixed_cipher_hash_testsuite  = {<br>
+static struct unit_test_suite testsuite_mixed_cipher_hash  = {<br>
        .suite_name = "Mixed CIPHER + HASH algorithms Test Suite",<br>
-       .setup = mixed_cipher_hash_testsuite_setup,<br>
+       .setup = ts_setup_mixed_cipher_hash,<br>
+       .teardown = ts_teardown_generic,<br>
        .unit_test_cases = {<br>
                /** AUTH AES CMAC + CIPHER AES CTR */<br>
                TEST_CASE_ST(ut_setup, ut_teardown,<br>
@@ -19351,24 +19037,25 @@ run_cryptodev_testsuite(const char *pmd_name)<br>
                BLKCIPHER_DES_DOCSIS_TYPE,<br>
                BLKCIPHER_SM4_CHAIN_TYPE,<br>
                BLKCIPHER_SM4_CIPHERONLY_TYPE,<br>
-               BLKCIPHER_AUTHONLY_TYPE};<br>
+               BLKCIPHER_AUTHONLY_TYPE<br>
+               };<br>
        struct unit_test_suite *static_suites[] = {<br>
-               &cryptodev_multi_session_testsuite,<br>
-               &cryptodev_null_testsuite,<br>
-               &cryptodev_aes_ccm_auth_testsuite,<br>
-               &cryptodev_aes_gcm_auth_testsuite,<br>
-               &cryptodev_aes_gmac_auth_testsuite,<br>
-               &cryptodev_snow3g_testsuite,<br>
-               &cryptodev_chacha20_poly1305_testsuite,<br>
-               &cryptodev_zuc_testsuite,<br>
-               &cryptodev_hmac_md5_auth_testsuite,<br>
-               &cryptodev_kasumi_testsuite,<br>
-               &cryptodev_esn_testsuite,<br>
-               &cryptodev_negative_aes_gcm_testsuite,<br>
-               &cryptodev_negative_aes_gmac_testsuite,<br>
-               &cryptodev_mixed_cipher_hash_testsuite,<br>
-               &cryptodev_negative_hmac_sha1_testsuite,<br>
-               &cryptodev_gen_testsuite,<br>
+               &testsuite_multi_session,<br>
+               &testsuite_null,<br>
+               &testsuite_aes_ccm,<br>
+               &testsuite_aes_gcm,<br>
+               &testsuite_aes_gmac,<br>
+               &testsuite_snow3g,<br>
+               &testsuite_chacha20_poly1305,<br>
+               &testsuite_zuc,<br>
+               &testsuite_hmac_md5_auth,<br>
+               &testsuite_kasumi,<br>
+               &testsuite_esn,<br>
+               &testsuite_negative_aes_gcm,<br>
+               &testsuite_negative_aes_gmac,<br>
+               &testsuite_mixed_cipher_hash,<br>
+               &testsuite_negative_hmac_sha1,<br>
+               &testsuite_gen_testsuite,<br>
 #ifdef RTE_LIB_SECURITY<br>
                &ipsec_proto_testsuite,<br>
                &pdcp_proto_testsuite,<br>
diff --git a/app/test/test_cryptodev.h b/app/test/test_cryptodev.h<br>
index fd9ea0dd81..d884f1dea3 100644<br>
--- a/app/test/test_cryptodev.h<br>
+++ b/app/test/test_cryptodev.h<br>
@@ -86,7 +86,7 @@ enum cryptodev_api_test_type {<br>
<br>
 extern enum cryptodev_api_test_type global_api_test_type;<br>
<br>
-extern struct crypto_testsuite_params *p_testsuite_params;<br>
+extern struct crypto_testsuite_params *p_ts_params;<br>
 struct crypto_testsuite_params {<br>
        struct rte_mempool *mbuf_pool;<br>
        struct rte_mempool *large_mbuf_pool;<br>
@@ -98,6 +98,10 @@ struct crypto_testsuite_params {<br>
<br>
        uint8_t valid_devs[RTE_CRYPTO_MAX_DEVS];<br>
        uint8_t valid_dev_count;<br>
+       /* Device ID that is used in tests that require single device */<br>
+       int dev_id;<br>
+       /* Cryptodev device info that is used in tests that require single device */<br>
+       struct rte_cryptodev_info dev_info;<br>
 };<br>
<br>
 /**<br>
diff --git a/app/test/test_cryptodev_aead_test_vectors.h b/app/test/test_cryptodev_aead_test_vectors.h<br>
index e9b0590048..9c3aa328e3 100644<br>
--- a/app/test/test_cryptodev_aead_test_vectors.h<br>
+++ b/app/test/test_cryptodev_aead_test_vectors.h<br>
@@ -39,6 +39,7 @@ static uint8_t ccm_aad_test_2[22] = {<br>
 };<br>
<br>
 struct aead_test_data {<br>
+       const char *description;<br>
        enum rte_crypto_aead_algorithm algo;<br>
<br>
        struct {<br>
diff --git a/app/test/test_cryptodev_aes_test_vectors.h b/app/test/test_cryptodev_aes_test_vectors.h<br>
index 7127156cc4..09ebe4af50 100644<br>
--- a/app/test/test_cryptodev_aes_test_vectors.h<br>
+++ b/app/test/test_cryptodev_aes_test_vectors.h<br>
@@ -5,6 +5,112 @@<br>
 #ifndef TEST_CRYPTODEV_AES_TEST_VECTORS_H_<br>
 #define TEST_CRYPTODEV_AES_TEST_VECTORS_H_<br>
<br>
+static const char catch_22_quote[] =<br>
+               "What a lousy earth! He wondered how many people were "<br>
+               "destitute that same night even in his own prosperous country, "<br>
+               "how many homes were shanties, how many husbands were drunk "<br>
+               "and wives socked, and how many children were bullied, abused, "<br>
+               "or abandoned. How many families hungered for food they could "<br>
+               "not afford to buy? How many hearts were broken? How many "<br>
+               "suicides would take place that same night, how many people "<br>
+               "would go insane? How many cockroaches and landlords would "<br>
+               "triumph? How many winners were losers, successes failures, "<br>
+               "and rich men poor men? How many wise guys were stupid? How "<br>
+               "many happy endings were unhappy endings? How many honest men "<br>
+               "were liars, brave men cowards, loyal men traitors, how many "<br>
+               "sainted men were corrupt, how many people in positions of "<br>
+               "trust had sold their souls to bodyguards, how many had never "<br>
+               "had souls? How many straight-and-narrow paths were crooked "<br>
+               "paths? How many best families were worst families and how "<br>
+               "many good people were bad people? When you added them all up "<br>
+               "and then subtracted, you might be left with only the children, "<br>
+               "and perhaps with Albert Einstein and an old violinist or "<br>
+               "sculptor somewhere.";<br>
+<br>
+#define QUOTE_480_BYTES                (480)<br>
+#define QUOTE_512_BYTES                (512)<br>
+#define QUOTE_768_BYTES                (768)<br>
+#define QUOTE_1024_BYTES       (1024)<br>
+<br>
+#define CIPHER_KEY_LENGTH_AES_CBC      (16)<br>
+#define CIPHER_IV_LENGTH_AES_CBC       (CIPHER_KEY_LENGTH_AES_CBC)<br>
+<br>
+<br>
+/* ***** AES-CBC / HMAC-SHA1 Hash Tests ***** */<br>
+<br>
+static const uint8_t catch_22_quote_2_512_bytes_AES_CBC_ciphertext[] = {<br>
+       0x8B, 0x4D, 0xDA, 0x1B, 0xCF, 0x04, 0xA0, 0x31,<br>
+       0xB4, 0xBF, 0xBD, 0x68, 0x43, 0x20, 0x7E, 0x76,<br>
+       0xB1, 0x96, 0x8B, 0xA2, 0x7C, 0xA2, 0x83, 0x9E,<br>
+       0x39, 0x5A, 0x2F, 0x7E, 0x92, 0xB4, 0x48, 0x1A,<br>
+       0x3F, 0x6B, 0x5D, 0xDF, 0x52, 0x85, 0x5F, 0x8E,<br>
+       0x42, 0x3C, 0xFB, 0xE9, 0x1A, 0x24, 0xD6, 0x08,<br>
+       0xDD, 0xFD, 0x16, 0xFB, 0xE9, 0x55, 0xEF, 0xF0,<br>
+       0xA0, 0x8D, 0x13, 0xAB, 0x81, 0xC6, 0x90, 0x01,<br>
+       0xB5, 0x18, 0x84, 0xB3, 0xF6, 0xE6, 0x11, 0x57,<br>
+       0xD6, 0x71, 0xC6, 0x3C, 0x3F, 0x2F, 0x33, 0xEE,<br>
+       0x24, 0x42, 0x6E, 0xAC, 0x0B, 0xCA, 0xEC, 0xF9,<br>
+       0x84, 0xF8, 0x22, 0xAA, 0x60, 0xF0, 0x32, 0xA9,<br>
+       0x75, 0x75, 0x3B, 0xCB, 0x70, 0x21, 0x0A, 0x8D,<br>
+       0x0F, 0xE0, 0xC4, 0x78, 0x2B, 0xF8, 0x97, 0xE3,<br>
+       0xE4, 0x26, 0x4B, 0x29, 0xDA, 0x88, 0xCD, 0x46,<br>
+       0xEC, 0xAA, 0xF9, 0x7F, 0xF1, 0x15, 0xEA, 0xC3,<br>
+       0x87, 0xE6, 0x31, 0xF2, 0xCF, 0xDE, 0x4D, 0x80,<br>
+       0x70, 0x91, 0x7E, 0x0C, 0xF7, 0x26, 0x3A, 0x92,<br>
+       0x4F, 0x18, 0x83, 0xC0, 0x8F, 0x59, 0x01, 0xA5,<br>
+       0x88, 0xD1, 0xDB, 0x26, 0x71, 0x27, 0x16, 0xF5,<br>
+       0xEE, 0x10, 0x82, 0xAC, 0x68, 0x26, 0x9B, 0xE2,<br>
+       0x6D, 0xD8, 0x9A, 0x80, 0xDF, 0x04, 0x31, 0xD5,<br>
+       0xF1, 0x35, 0x5C, 0x3B, 0xDD, 0x9A, 0x65, 0xBA,<br>
+       0x58, 0x34, 0x85, 0x61, 0x1C, 0x42, 0x10, 0x76,<br>
+       0x73, 0x02, 0x42, 0xC9, 0x23, 0x18, 0x8E, 0xB4,<br>
+       0x6F, 0xB4, 0xA3, 0x54, 0x6E, 0x88, 0x3B, 0x62,<br>
+       0x7C, 0x02, 0x8D, 0x4C, 0x9F, 0xC8, 0x45, 0xF4,<br>
+       0xC9, 0xDE, 0x4F, 0xEB, 0x22, 0x83, 0x1B, 0xE4,<br>
+       0x49, 0x37, 0xE4, 0xAD, 0xE7, 0xCD, 0x21, 0x54,<br>
+       0xBC, 0x1C, 0xC2, 0x04, 0x97, 0xB4, 0x10, 0x61,<br>
+       0xF0, 0xE4, 0xEF, 0x27, 0x63, 0x3A, 0xDA, 0x91,<br>
+       0x41, 0x25, 0x62, 0x1C, 0x5C, 0xB6, 0x38, 0x4A,<br>
+       0x88, 0x71, 0x59, 0x5A, 0x8D, 0xA0, 0x09, 0xAF,<br>
+       0x72, 0x94, 0xD7, 0x79, 0x5C, 0x60, 0x7C, 0x8F,<br>
+       0x4C, 0xF5, 0xD9, 0xA1, 0x39, 0x6D, 0x81, 0x28,<br>
+       0xEF, 0x13, 0x28, 0xDF, 0xF5, 0x3E, 0xF7, 0x8E,<br>
+       0x09, 0x9C, 0x78, 0x18, 0x79, 0xB8, 0x68, 0xD7,<br>
+       0xA8, 0x29, 0x62, 0xAD, 0xDE, 0xE1, 0x61, 0x76,<br>
+       0x1B, 0x05, 0x16, 0xCD, 0xBF, 0x02, 0x8E, 0xA6,<br>
+       0x43, 0x6E, 0x92, 0x55, 0x4F, 0x60, 0x9C, 0x03,<br>
+       0xB8, 0x4F, 0xA3, 0x02, 0xAC, 0xA8, 0xA7, 0x0C,<br>
+       0x1E, 0xB5, 0x6B, 0xF8, 0xC8, 0x4D, 0xDE, 0xD2,<br>
+       0xB0, 0x29, 0x6E, 0x40, 0xE6, 0xD6, 0xC9, 0xE6,<br>
+       0xB9, 0x0F, 0xB6, 0x63, 0xF5, 0xAA, 0x2B, 0x96,<br>
+       0xA7, 0x16, 0xAC, 0x4E, 0x0A, 0x33, 0x1C, 0xA6,<br>
+       0xE6, 0xBD, 0x8A, 0xCF, 0x40, 0xA9, 0xB2, 0xFA,<br>
+       0x63, 0x27, 0xFD, 0x9B, 0xD9, 0xFC, 0xD5, 0x87,<br>
+       0x8D, 0x4C, 0xB6, 0xA4, 0xCB, 0xE7, 0x74, 0x55,<br>
+       0xF4, 0xFB, 0x41, 0x25, 0xB5, 0x4B, 0x0A, 0x1B,<br>
+       0xB1, 0xD6, 0xB7, 0xD9, 0x47, 0x2A, 0xC3, 0x98,<br>
+       0x6A, 0xC4, 0x03, 0x73, 0x1F, 0x93, 0x6E, 0x53,<br>
+       0x19, 0x25, 0x64, 0x15, 0x83, 0xF9, 0x73, 0x2A,<br>
+       0x74, 0xB4, 0x93, 0x69, 0xC4, 0x72, 0xFC, 0x26,<br>
+       0xA2, 0x9F, 0x43, 0x45, 0xDD, 0xB9, 0xEF, 0x36,<br>
+       0xC8, 0x3A, 0xCD, 0x99, 0x9B, 0x54, 0x1A, 0x36,<br>
+       0xC1, 0x59, 0xF8, 0x98, 0xA8, 0xCC, 0x28, 0x0D,<br>
+       0x73, 0x4C, 0xEE, 0x98, 0xCB, 0x7C, 0x58, 0x7E,<br>
+       0x20, 0x75, 0x1E, 0xB7, 0xC9, 0xF8, 0xF2, 0x0E,<br>
+       0x63, 0x9E, 0x05, 0x78, 0x1A, 0xB6, 0xA8, 0x7A,<br>
+       0xF9, 0x98, 0x6A, 0xA6, 0x46, 0x84, 0x2E, 0xF6,<br>
+       0x4B, 0xDC, 0x9B, 0x8F, 0x9B, 0x8F, 0xEE, 0xB4,<br>
+       0xAA, 0x3F, 0xEE, 0xC0, 0x37, 0x27, 0x76, 0xC7,<br>
+       0x95, 0xBB, 0x26, 0x74, 0x69, 0x12, 0x7F, 0xF1,<br>
+       0xBB, 0xFF, 0xAE, 0xB5, 0x99, 0x6E, 0xCB, 0x0C<br>
+};<br>
+<br>
+static const uint8_t catch_22_quote_2_512_bytes_AES_CBC_HMAC_SHA1_digest[] = {<br>
+       0x9a, 0x4f, 0x88, 0x1b, 0xb6, 0x8f, 0xd8, 0x60,<br>
+       0x42, 0x1a, 0x7d, 0x3d, 0xf5, 0x82, 0x80, 0xf1,<br>
+       0x18, 0x8c, 0x1d, 0x32<br>
+};<br>
+<br>
 /* test vectors */<br>
 static const uint8_t plaintext_aes128ctr[] = {<br>
        0x6B, 0xC1, 0xBE, 0xE2, 0x2E, 0x40, 0x9F, 0x96,<br>
diff --git a/app/test/test_cryptodev_blockcipher.c b/app/test/test_cryptodev_blockcipher.c<br>
index 87a321fac3..f7a35f59b9 100644<br>
--- a/app/test/test_cryptodev_blockcipher.c<br>
+++ b/app/test/test_cryptodev_blockcipher.c<br>
@@ -834,10 +834,10 @@ blockcipher_test_case_run(const void *data)<br>
        char test_msg[BLOCKCIPHER_TEST_MSG_LEN + 1];<br>
<br>
        status = test_blockcipher_one_case(tc_data,<br>
-                       p_testsuite_params->mbuf_pool,<br>
-                       p_testsuite_params->op_mpool,<br>
-                       p_testsuite_params->session_mpool,<br>
-                       p_testsuite_params->valid_devs[0],<br>
+                       p_ts_params->mbuf_pool,<br>
+                       p_ts_params->op_mpool,<br>
+                       p_ts_params->session_mpool,<br>
+                       p_ts_params->valid_devs[0],<br>
                        test_msg);<br>
        return status;<br>
 }<br>
@@ -845,7 +845,7 @@ blockcipher_test_case_run(const void *data)<br>
 static int<br>
 aes_chain_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
@@ -888,7 +888,7 @@ aes_chain_setup(void)<br>
 static int<br>
 aes_cipheronly_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
@@ -929,7 +929,7 @@ aes_cipheronly_setup(void)<br>
 static int<br>
 aes_docsis_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
@@ -959,7 +959,7 @@ aes_docsis_setup(void)<br>
 static int<br>
 triple_des_chain_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
@@ -996,7 +996,7 @@ triple_des_chain_setup(void)<br>
 static int<br>
 triple_des_cipheronly_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
@@ -1027,7 +1027,7 @@ triple_des_cipheronly_setup(void)<br>
 static int<br>
 des_cipheronly_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
@@ -1057,7 +1057,7 @@ des_cipheronly_setup(void)<br>
 static int<br>
 des_docsis_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
@@ -1087,7 +1087,7 @@ des_docsis_setup(void)<br>
 static int<br>
 authonly_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_auth_algorithm auths[] = {<br>
@@ -1131,7 +1131,7 @@ authonly_setup(void)<br>
 static int<br>
 sm4_chain_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
@@ -1167,7 +1167,7 @@ sm4_chain_setup(void)<br>
 static int<br>
 sm4_cipheronly_setup(void)<br>
 {<br>
-       uint8_t dev_id = p_testsuite_params->valid_devs[0];<br>
+       uint8_t dev_id = p_ts_params->valid_devs[0];<br>
        struct rte_cryptodev_info dev_info;<br>
        uint64_t feat_flags;<br>
        const enum rte_crypto_cipher_algorithm ciphers[] = {<br>
diff --git a/app/test/test_cryptodev_hmac_test_vectors.h b/app/test/test_cryptodev_hmac_test_vectors.h<br>
index 77153a5c10..891e5d71fd 100644<br>
--- a/app/test/test_cryptodev_hmac_test_vectors.h<br>
+++ b/app/test/test_cryptodev_hmac_test_vectors.h<br>
@@ -5,6 +5,81 @@<br>
 #ifndef APP_TEST_TEST_CRYPTODEV_HMAC_TEST_VECTORS_H_<br>
 #define APP_TEST_TEST_CRYPTODEV_HMAC_TEST_VECTORS_H_<br>
<br>
+#define HMAC_KEY_LENGTH_SHA1   (DIGEST_BYTE_LENGTH_SHA1)<br>
+<br>
+static uint8_t hmac_sha1_key[] = {<br>
+       0xF8, 0x2A, 0xC7, 0x54, 0xDB, 0x96, 0x18, 0xAA,<br>
+       0xC3, 0xA1, 0x53, 0xF6, 0x1F, 0x17, 0x60, 0xBD,<br>
+       0xDE, 0xF4, 0xDE, 0xAD };<br>
+<br>
+#define HMAC_KEY_LENGTH_SHA224 (DIGEST_BYTE_LENGTH_SHA224)<br>
+<br>
+static  uint8_t ms_hmac_key0[] = {<br>
+               0xFF, 0x1A, 0x7D, 0x3D, 0xF5, 0x82, 0x80, 0xF1,<br>
+               0xF1, 0x35, 0x5C, 0x3B, 0xDD, 0x9A, 0x65, 0xBA,<br>
+               0x58, 0x34, 0x85, 0x65, 0x1C, 0x42, 0x50, 0x76,<br>
+               0x9A, 0xAF, 0x88, 0x1B, 0xB6, 0x8F, 0xF8, 0x60,<br>
+               0xA2, 0x5A, 0x7F, 0x3F, 0xF4, 0x72, 0x70, 0xF1,<br>
+               0xF5, 0x35, 0x4C, 0x3B, 0xDD, 0x90, 0x65, 0xB0,<br>
+               0x47, 0x3A, 0x75, 0x61, 0x5C, 0xA2, 0x10, 0x76,<br>
+               0x9A, 0xAF, 0x77, 0x5B, 0xB6, 0x7F, 0xF7, 0x60<br>
+};<br>
+<br>
+static const uint8_t ms_hmac_digest0[] = {<br>
+               0x43, 0x52, 0xED, 0x34, 0xAB, 0x36, 0xB2, 0x51,<br>
+               0xFB, 0xA3, 0xA6, 0x7C, 0x38, 0xFC, 0x42, 0x8F,<br>
+               0x57, 0x64, 0xAB, 0x81, 0xA7, 0x89, 0xB7, 0x6C,<br>
+               0xA0, 0xDC, 0xB9, 0x4D, 0xC4, 0x30, 0xF9, 0xD4,<br>
+               0x10, 0x82, 0x55, 0xD0, 0xAB, 0x32, 0xFB, 0x56,<br>
+               0x0D, 0xE4, 0x68, 0x3D, 0x76, 0xD0, 0x7B, 0xE4,<br>
+               0xA6, 0x2C, 0x34, 0x9E, 0x8C, 0x41, 0xF8, 0x23,<br>
+               0x28, 0x1B, 0x3A, 0x90, 0x26, 0x34, 0x47, 0x90<br>
+};<br>
+<br>
+static uint8_t ms_hmac_key1[] = {<br>
+               0xFE, 0x1A, 0x7D, 0x3D, 0xF5, 0x82, 0x80, 0xF1,<br>
+               0xF1, 0x35, 0x5C, 0x3B, 0xDD, 0x9A, 0x65, 0xBA,<br>
+               0x58, 0x34, 0x85, 0x65, 0x1C, 0x42, 0x50, 0x76,<br>
+               0x9A, 0xAF, 0x88, 0x1B, 0xB6, 0x8F, 0xF8, 0x60,<br>
+               0xA2, 0x5A, 0x7F, 0x3F, 0xF4, 0x72, 0x70, 0xF1,<br>
+               0xF5, 0x35, 0x4C, 0x3B, 0xDD, 0x90, 0x65, 0xB0,<br>
+               0x47, 0x3A, 0x75, 0x61, 0x5C, 0xA2, 0x10, 0x76,<br>
+               0x9A, 0xAF, 0x77, 0x5B, 0xB6, 0x7F, 0xF7, 0x60<br>
+};<br>
+<br>
+static const uint8_t ms_hmac_digest1[] = {<br>
+               0xCE, 0x6E, 0x5F, 0x77, 0x96, 0x9A, 0xB1, 0x69,<br>
+               0x2D, 0x5E, 0xF3, 0x2F, 0x32, 0x10, 0xCB, 0x50,<br>
+               0x0E, 0x09, 0x56, 0x25, 0x07, 0x34, 0xC9, 0x20,<br>
+               0xEC, 0x13, 0x43, 0x23, 0x5C, 0x08, 0x8B, 0xCD,<br>
+               0xDC, 0x86, 0x8C, 0xEE, 0x0A, 0x95, 0x2E, 0xB9,<br>
+               0x8C, 0x7B, 0x02, 0x7A, 0xD4, 0xE1, 0x49, 0xB4,<br>
+               0x45, 0xB5, 0x52, 0x37, 0xC6, 0xFF, 0xFE, 0xAA,<br>
+               0x0A, 0x87, 0xB8, 0x51, 0xF9, 0x2A, 0x01, 0x8F<br>
+};<br>
+<br>
+static  uint8_t ms_hmac_key2[] = {<br>
+               0xFC, 0x1A, 0x7D, 0x3D, 0xF5, 0x82, 0x80, 0xF1,<br>
+               0xF1, 0x35, 0x5C, 0x3B, 0xDD, 0x9A, 0x65, 0xBA,<br>
+               0x58, 0x34, 0x85, 0x65, 0x1C, 0x42, 0x50, 0x76,<br>
+               0x9A, 0xAF, 0x88, 0x1B, 0xB6, 0x8F, 0xF8, 0x60,<br>
+               0xA2, 0x5A, 0x7F, 0x3F, 0xF4, 0x72, 0x70, 0xF1,<br>
+               0xF5, 0x35, 0x4C, 0x3B, 0xDD, 0x90, 0x65, 0xB0,<br>
+               0x47, 0x3A, 0x75, 0x61, 0x5C, 0xA2, 0x10, 0x76,<br>
+               0x9A, 0xAF, 0x77, 0x5B, 0xB6, 0x7F, 0xF7, 0x60<br>
+};<br>
+<br>
+static const uint8_t ms_hmac_digest2[] = {<br>
+               0xA5, 0x0F, 0x9C, 0xFB, 0x08, 0x62, 0x59, 0xFF,<br>
+               0x80, 0x2F, 0xEB, 0x4B, 0xE1, 0x46, 0x21, 0xD6,<br>
+               0x02, 0x98, 0xF2, 0x8E, 0xF4, 0xEC, 0xD4, 0x77,<br>
+               0x86, 0x4C, 0x31, 0x28, 0xC8, 0x25, 0x80, 0x27,<br>
+               0x3A, 0x72, 0x5D, 0x6A, 0x56, 0x8A, 0xD3, 0x82,<br>
+               0xB0, 0xEC, 0x31, 0x6D, 0x8B, 0x6B, 0xB4, 0x24,<br>
+               0xE7, 0x62, 0xC1, 0x52, 0xBC, 0x14, 0x1B, 0x8E,<br>
+               0xEC, 0x9A, 0xF1, 0x47, 0x80, 0xD2, 0xB0, 0x59<br>
+};<br>
+<br>
 /* *** MD5 test vectors *** */<br>
<br>
 #define MD5_DIGEST_LEN 16<br>
-- <br>
2.13.6<br>
<br>
</blockquote></div>