This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "".
The branch, master has been updated via c164ad605422f90f3566e4c4ebed0ea3c2adb3a8 (commit) via 53dca8426775ed5bf40f2c2708915f02b2dccc74 (commit) from f69f033da3b6900acdd170668cae07ac6cd959f3 (commit)
Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below.
- Log ----------------------------------------------------------------- commit c164ad605422f90f3566e4c4ebed0ea3c2adb3a8 Author: Petri Savolainen petri.savolainen@linaro.org Date: Wed Apr 25 16:25:20 2018 +0300
test: crypto perf: add missing breaks to switch case
Breaks are needed for switch-cases. Missing breaks were breaking build for GCC 7.2.
Signed-off-by: Petri Savolainen petri.savolainen@linaro.org Reviewed-by: Dmitry Eremin-Solenikov dmitry.ereminsolenikov@linaro.org Reviewed-by: Bill Fischofer bill.fischofer@linaro.org Signed-off-by: Maxim Uvarov maxim.uvarov@linaro.org
diff --git a/test/performance/odp_crypto.c b/test/performance/odp_crypto.c index 8a5f2c5b..0404aca2 100644 --- a/test/performance/odp_crypto.c +++ b/test/performance/odp_crypto.c @@ -871,30 +871,40 @@ static int check_cipher_alg(odp_crypto_capability_t *capa, case ODP_CIPHER_ALG_NULL: if (capa->ciphers.bit.null) return 0; + break; case ODP_CIPHER_ALG_DES: if (capa->ciphers.bit.des) return 0; + break; case ODP_CIPHER_ALG_3DES_CBC: if (capa->ciphers.bit.trides_cbc) return 0; + break; case ODP_CIPHER_ALG_AES_CBC: if (capa->ciphers.bit.aes_cbc) return 0; + break; case ODP_CIPHER_ALG_AES_CTR: if (capa->ciphers.bit.aes_ctr) return 0; + break; case ODP_CIPHER_ALG_AES_GCM: if (capa->ciphers.bit.aes_gcm) return 0; + break; case ODP_CIPHER_ALG_AES_CCM: if (capa->ciphers.bit.aes_ccm) return 0; + break; case ODP_CIPHER_ALG_CHACHA20_POLY1305: if (capa->ciphers.bit.chacha20_poly1305) return 0; + break; default: - return -1; + break; } + + return -1; }
static int check_auth_alg(odp_crypto_capability_t *capa, @@ -904,36 +914,48 @@ static int check_auth_alg(odp_crypto_capability_t *capa, case ODP_AUTH_ALG_NULL: if (capa->auths.bit.null) return 0; + break; case ODP_AUTH_ALG_MD5_HMAC: if (capa->auths.bit.md5_hmac) return 0; + break; case ODP_AUTH_ALG_SHA1_HMAC: if (capa->auths.bit.sha1_hmac) return 0; + break; case ODP_AUTH_ALG_SHA256_HMAC: if (capa->auths.bit.sha256_hmac) return 0; + break; case ODP_AUTH_ALG_SHA384_HMAC: if (capa->auths.bit.sha384_hmac) return 0; + break; case ODP_AUTH_ALG_SHA512_HMAC: if (capa->auths.bit.sha512_hmac) return 0; + break; case ODP_AUTH_ALG_AES_GCM: if (capa->auths.bit.aes_gcm) return 0; + break; case ODP_AUTH_ALG_AES_GMAC: if (capa->auths.bit.aes_gmac) return 0; + break; case ODP_AUTH_ALG_AES_CCM: if (capa->auths.bit.aes_ccm) return 0; + break; case ODP_AUTH_ALG_CHACHA20_POLY1305: if (capa->auths.bit.chacha20_poly1305) return 0; + break; default: - return -1; + break; } + + return -1; }
/**
commit 53dca8426775ed5bf40f2c2708915f02b2dccc74 Author: Petri Savolainen petri.savolainen@linaro.org Date: Tue Apr 24 16:23:53 2018 +0300
validation: timer: loosen period accuracy requirement
Test passes if measured: * timeout period is within +-20% (+-4x resolution) of the requested period, and * test period is within +-10% (+- 1 timeout period) of the requested 10 periods.
Signed-off-by: Petri Savolainen petri.savolainen@linaro.org Reviewed-by: Bill Fischofer bill.fischofer@linaro.org Signed-off-by: Maxim Uvarov maxim.uvarov@linaro.org
diff --git a/test/validation/api/timer/timer.c b/test/validation/api/timer/timer.c index a34885c0..1cd49a35 100644 --- a/test/validation/api/timer/timer.c +++ b/test/validation/api/timer/timer.c @@ -256,15 +256,17 @@ static void timer_test_queue_type(odp_queue_type_t queue_type)
if (ev != ODP_EVENT_INVALID) { diff_period = odp_time_diff_ns(t2, t1); - t1 = odp_time_local(); + t1 = t2; tmo = odp_timeout_from_event(ev); tim = odp_timeout_timer(tmo); tick = odp_timeout_tick(tmo);
- CU_ASSERT(diff_period > (period_ns - (2 * res_ns))); - CU_ASSERT(diff_period < (period_ns + (2 * res_ns))); + CU_ASSERT(diff_period > (period_ns - (4 * res_ns))); + CU_ASSERT(diff_period < (period_ns + (4 * res_ns)));
- LOG_DBG("timeout tick %" PRIu64 "\n", tick); + LOG_DBG("timeout tick %" PRIu64 ", " + "timeout period %" PRIu64 "\n", + tick, diff_period);
odp_timeout_free(tmo); CU_ASSERT(odp_timer_free(tim) == ODP_EVENT_INVALID); @@ -274,9 +276,11 @@ static void timer_test_queue_type(odp_queue_type_t queue_type)
} while (diff_test < (2 * test_period) && num_tmo < num);
+ LOG_DBG("test period %" PRIu64 "\n", diff_test); + CU_ASSERT(num_tmo == num); - CU_ASSERT(diff_test > (test_period - tparam.min_tmo)); - CU_ASSERT(diff_test < (test_period + tparam.min_tmo)); + CU_ASSERT(diff_test > (test_period - period_ns)); + CU_ASSERT(diff_test < (test_period + period_ns));
/* Scalable scheduler needs this pause sequence. Otherwise, it gets * stuck on terminate. */
-----------------------------------------------------------------------
Summary of changes: test/performance/odp_crypto.c | 26 ++++++++++++++++++++++++-- test/validation/api/timer/timer.c | 16 ++++++++++------ 2 files changed, 34 insertions(+), 8 deletions(-)
hooks/post-receive