test: add result field to mod exp and inv
This patch adds result field to modular exponentiation and modular multiplicative inverse tests Signed-off-by: Arek Kusztal <arkadiuszx.kusztal@intel.com> Acked-by: Shally Verma <shallyv@marvell.com>
This commit is contained in:
parent
aeded1117c
commit
5e4fb861f7
@ -940,6 +940,7 @@ test_mod_inv(void)
|
|||||||
const struct rte_cryptodev_asymmetric_xform_capability *capability;
|
const struct rte_cryptodev_asymmetric_xform_capability *capability;
|
||||||
uint8_t input[TEST_DATA_SIZE] = {0};
|
uint8_t input[TEST_DATA_SIZE] = {0};
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
uint8_t result[sizeof(mod_p)] = { 0 };
|
||||||
|
|
||||||
if (rte_cryptodev_asym_get_xform_enum(
|
if (rte_cryptodev_asym_get_xform_enum(
|
||||||
&modinv_xform.xform_type, "modinv") < 0) {
|
&modinv_xform.xform_type, "modinv") < 0) {
|
||||||
@ -993,6 +994,8 @@ test_mod_inv(void)
|
|||||||
memcpy(input, base, sizeof(base));
|
memcpy(input, base, sizeof(base));
|
||||||
asym_op->modinv.base.data = input;
|
asym_op->modinv.base.data = input;
|
||||||
asym_op->modinv.base.length = sizeof(base);
|
asym_op->modinv.base.length = sizeof(base);
|
||||||
|
asym_op->modinv.result.data = result;
|
||||||
|
asym_op->modinv.result.length = sizeof(result);
|
||||||
|
|
||||||
/* attach asymmetric crypto session to crypto operations */
|
/* attach asymmetric crypto session to crypto operations */
|
||||||
rte_crypto_op_attach_asym_session(op, sess);
|
rte_crypto_op_attach_asym_session(op, sess);
|
||||||
@ -1055,6 +1058,7 @@ test_mod_exp(void)
|
|||||||
const struct rte_cryptodev_asymmetric_xform_capability *capability;
|
const struct rte_cryptodev_asymmetric_xform_capability *capability;
|
||||||
uint8_t input[TEST_DATA_SIZE] = {0};
|
uint8_t input[TEST_DATA_SIZE] = {0};
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
uint8_t result[sizeof(mod_p)] = { 0 };
|
||||||
|
|
||||||
if (rte_cryptodev_asym_get_xform_enum(&modex_xform.xform_type,
|
if (rte_cryptodev_asym_get_xform_enum(&modex_xform.xform_type,
|
||||||
"modexp")
|
"modexp")
|
||||||
@ -1109,6 +1113,8 @@ test_mod_exp(void)
|
|||||||
memcpy(input, base, sizeof(base));
|
memcpy(input, base, sizeof(base));
|
||||||
asym_op->modex.base.data = input;
|
asym_op->modex.base.data = input;
|
||||||
asym_op->modex.base.length = sizeof(base);
|
asym_op->modex.base.length = sizeof(base);
|
||||||
|
asym_op->modex.result.data = result;
|
||||||
|
asym_op->modex.result.length = sizeof(result);
|
||||||
/* attach asymmetric crypto session to crypto operations */
|
/* attach asymmetric crypto session to crypto operations */
|
||||||
rte_crypto_op_attach_asym_session(op, sess);
|
rte_crypto_op_attach_asym_session(op, sess);
|
||||||
|
|
||||||
|
@ -20,8 +20,8 @@ static inline int rsa_verify(struct rsa_test_data *rsa_param,
|
|||||||
static inline int verify_modinv(uint8_t *mod_inv,
|
static inline int verify_modinv(uint8_t *mod_inv,
|
||||||
struct rte_crypto_op *result_op)
|
struct rte_crypto_op *result_op)
|
||||||
{
|
{
|
||||||
if (memcmp(mod_inv, result_op->asym->modinv.base.data,
|
if (memcmp(mod_inv, result_op->asym->modinv.result.data,
|
||||||
result_op->asym->modinv.base.length))
|
result_op->asym->modinv.result.length))
|
||||||
return -1;
|
return -1;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@ -29,8 +29,8 @@ static inline int verify_modinv(uint8_t *mod_inv,
|
|||||||
static inline int verify_modexp(uint8_t *mod_exp,
|
static inline int verify_modexp(uint8_t *mod_exp,
|
||||||
struct rte_crypto_op *result_op)
|
struct rte_crypto_op *result_op)
|
||||||
{
|
{
|
||||||
if (memcmp(mod_exp, result_op->asym->modex.base.data,
|
if (memcmp(mod_exp, result_op->asym->modex.result.data,
|
||||||
result_op->asym->modex.base.length))
|
result_op->asym->modex.result.length))
|
||||||
return -1;
|
return -1;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user