From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id EDB79A0503; Fri, 20 May 2022 09:06:14 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 4708842C02; Fri, 20 May 2022 09:04:04 +0200 (CEST) Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by mails.dpdk.org (Postfix) with ESMTP id 03F7F42BD8 for ; Fri, 20 May 2022 09:04:01 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1653030242; x=1684566242; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=BWMQDclO1xYjo/t5brVu+JLOaPGxEGjs5n+xhQwz9cQ=; b=QEnYRv0gjO8y9S54zLFhlF0SnszsXL+7uItdafv2PaPhh79RjOqnWv6V F9IgK3jyGNKWy/2irNiiqeDJiSWNB5Whn0fmS1elXURTZ2GGhYdQ/cmhE nlbnCTcn3nMmpcWF/W3N+to5PWv3ajz817ADaTzASOGitQOjS/uB6MCli VGEYnEDlZiR5yOiAappj3chmKqEJpnR1DKnRrxy/W2LcQ9NbABflMmDfv jRtjJ6mn2mjv05/UDVDoRdS157CAdLbyxZMc/bbL1S9KiSiuybUIVsvxZ i77tAf5yUF2YkjfZSMpQGAHam2XKzxiOdS9ZTZApi4FX7KWkBB+rgqLP1 Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10352"; a="333140505" X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="333140505" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 May 2022 00:04:01 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,238,1647327600"; d="scan'208";a="599058638" Received: from silpixa00399302.ir.intel.com ([10.237.214.136]) by orsmga008.jf.intel.com with ESMTP; 20 May 2022 00:04:00 -0700 From: Arek Kusztal To: dev@dpdk.org Cc: gakhil@marvell.com, anoobj@marvell.com, roy.fan.zhang@intel.com, Arek Kusztal Subject: [PATCH 36/40] test/crypto: reduce rsa struct to only necessary fields Date: Fri, 20 May 2022 06:54:41 +0100 Message-Id: <20220520055445.40063-37-arkadiuszx.kusztal@intel.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> References: <20220520055445.40063-1-arkadiuszx.kusztal@intel.com> X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org - reduced rsa struct to only necessary fields. This commit reflects changes to the asymmetric crypto API. Signed-off-by: Arek Kusztal --- app/test/test_cryptodev_asym.c | 80 +++++++++++++++++++++++------------------- 1 file changed, 43 insertions(+), 37 deletions(-) diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c index eca0612815..ed86eaf8ba 100644 --- a/app/test/test_cryptodev_asym.c +++ b/app/test/test_cryptodev_asym.c @@ -90,14 +90,14 @@ queue_ops_rsa_sign_verify(void *sess) /* Compute sign on the test vector */ asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_SIGN; - asym_op->rsa.message.data = rsaplaintext.data; - asym_op->rsa.message.length = rsaplaintext.len; - asym_op->rsa.sign.length = 0; - asym_op->rsa.sign.data = output_buf; + asym_op->rsa.input.data = rsaplaintext.data; + asym_op->rsa.input.length = rsaplaintext.len; + asym_op->rsa.output.length = 0; + asym_op->rsa.output.data = output_buf; asym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5; - debug_hexdump(stdout, "message", asym_op->rsa.message.data, - asym_op->rsa.message.length); + debug_hexdump(stdout, "message", asym_op->rsa.input.data, + asym_op->rsa.input.length); /* Attach asymmetric crypto session to crypto operations */ rte_crypto_op_attach_asym_session(op, sess); @@ -120,13 +120,17 @@ queue_ops_rsa_sign_verify(void *sess) goto error_exit; } - debug_hexdump(stdout, "signed message", asym_op->rsa.sign.data, - asym_op->rsa.sign.length); + debug_hexdump(stdout, "signed message", asym_op->rsa.output.data, + asym_op->rsa.output.length); asym_op = result_op->asym; /* Verify sign */ asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_VERIFY; asym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5; + asym_op->rsa.input.data = output_buf; + asym_op->rsa.input.length = asym_op->rsa.output.length; + asym_op->rsa.message.data = rsaplaintext.data; + asym_op->rsa.message.length = rsaplaintext.len; /* Process crypto operation */ if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) { @@ -181,14 +185,14 @@ queue_ops_rsa_enc_dec(void *sess) /* Compute encryption on the test vector */ asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_ENCRYPT; - asym_op->rsa.message.data = rsaplaintext.data; - asym_op->rsa.cipher.data = cipher_buf; - asym_op->rsa.cipher.length = 0; - asym_op->rsa.message.length = rsaplaintext.len; + asym_op->rsa.input.data = rsaplaintext.data; + asym_op->rsa.output.data = cipher_buf; + asym_op->rsa.output.length = 0; + asym_op->rsa.input.length = rsaplaintext.len; asym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5; - debug_hexdump(stdout, "message", asym_op->rsa.message.data, - asym_op->rsa.message.length); + debug_hexdump(stdout, "message", asym_op->rsa.input.data, + asym_op->rsa.input.length); /* Attach asymmetric crypto session to crypto operations */ rte_crypto_op_attach_asym_session(op, sess); @@ -210,14 +214,16 @@ queue_ops_rsa_enc_dec(void *sess) status = TEST_FAILED; goto error_exit; } - debug_hexdump(stdout, "encrypted message", asym_op->rsa.message.data, - asym_op->rsa.message.length); + debug_hexdump(stdout, "encrypted message", asym_op->rsa.output.data, + asym_op->rsa.output.length); /* Use the resulted output as decryption Input vector*/ asym_op = result_op->asym; - asym_op->rsa.message.length = 0; + asym_op->rsa.output.length = 0; asym_op->rsa.op_type = RTE_CRYPTO_ASYM_OP_DECRYPT; asym_op->rsa.padding.type = RTE_CRYPTO_RSA_PADDING_PKCS1_5; + rte_memcpy(asym_op->rsa.input.data, asym_op->rsa.output.data, + asym_op->rsa.input.length); /* Process crypto operation */ if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) != 1) { @@ -270,20 +276,20 @@ test_cryptodev_asym_ver(struct rte_crypto_op *op, case RTE_CRYPTO_ASYM_XFORM_RSA: if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) { data_size = xform_tc->rsa.n.length; - data_received = result_op->asym->rsa.cipher.data; + data_received = result_op->asym->rsa.output.data; data_expected = data_tc->rsa_data.ct.data; } else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_DECRYPT) { data_size = xform_tc->rsa.n.length; data_expected = data_tc->rsa_data.pt.data; - data_received = result_op->asym->rsa.message.data; + data_received = result_op->asym->rsa.output.data; } else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_SIGN) { data_size = xform_tc->rsa.n.length; data_expected = data_tc->rsa_data.sign.data; - data_received = result_op->asym->rsa.sign.data; + data_received = result_op->asym->rsa.output.data; } else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_VERIFY) { data_size = xform_tc->rsa.n.length; data_expected = data_tc->rsa_data.pt.data; - data_received = result_op->asym->rsa.cipher.data; + data_received = result_op->asym->rsa.output.data; } break; case RTE_CRYPTO_ASYM_XFORM_DH: @@ -415,25 +421,25 @@ test_cryptodev_asym_op(struct crypto_testsuite_params_asym *ts_params, op->asym->rsa.padding.type = data_tc->rsa_data.padding; if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_ENCRYPT) { - asym_op->rsa.message.data = data_tc->rsa_data.pt.data; - asym_op->rsa.message.length = data_tc->rsa_data.pt.len; - asym_op->rsa.cipher.data = result; - asym_op->rsa.cipher.length = data_tc->rsa_data.n.len; + asym_op->rsa.input.data = data_tc->rsa_data.pt.data; + asym_op->rsa.input.length = data_tc->rsa_data.pt.len; + asym_op->rsa.output.data = result; + asym_op->rsa.output.length = data_tc->rsa_data.n.len; } else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_DECRYPT) { - asym_op->rsa.message.data = result; - asym_op->rsa.message.length = data_tc->rsa_data.n.len; - asym_op->rsa.cipher.data = data_tc->rsa_data.ct.data; - asym_op->rsa.cipher.length = data_tc->rsa_data.ct.len; + asym_op->rsa.output.data = result; + asym_op->rsa.output.length = data_tc->rsa_data.n.len; + asym_op->rsa.input.data = data_tc->rsa_data.ct.data; + asym_op->rsa.input.length = data_tc->rsa_data.ct.len; } else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_SIGN) { - asym_op->rsa.sign.data = result; - asym_op->rsa.sign.length = data_tc->rsa_data.n.len; - asym_op->rsa.message.data = data_tc->rsa_data.pt.data; - asym_op->rsa.message.length = data_tc->rsa_data.pt.len; + asym_op->rsa.output.data = result; + asym_op->rsa.output.length = data_tc->rsa_data.n.len; + asym_op->rsa.input.data = data_tc->rsa_data.pt.data; + asym_op->rsa.input.length = data_tc->rsa_data.pt.len; } else if (op->asym->rsa.op_type == RTE_CRYPTO_ASYM_OP_VERIFY) { - asym_op->rsa.cipher.data = result; - asym_op->rsa.cipher.length = data_tc->rsa_data.n.len; - asym_op->rsa.sign.data = data_tc->rsa_data.sign.data; - asym_op->rsa.sign.length = data_tc->rsa_data.sign.len; + asym_op->rsa.message.data = result; + asym_op->rsa.message.length = data_tc->rsa_data.n.len; + asym_op->rsa.input.data = data_tc->rsa_data.sign.data; + asym_op->rsa.input.length = data_tc->rsa_data.sign.len; } break; case RTE_CRYPTO_ASYM_XFORM_DH: -- 2.13.6