From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 5F02943C9E; Wed, 13 Mar 2024 11:02:56 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 018F540A84; Wed, 13 Mar 2024 11:02:56 +0100 (CET) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by mails.dpdk.org (Postfix) with ESMTP id 154384069D; Wed, 13 Mar 2024 11:02:53 +0100 (CET) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 42D9WgRM022023; Wed, 13 Mar 2024 03:02:53 -0700 Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2040.outbound.protection.outlook.com [104.47.66.40]) by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3wu9kvr2pt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 13 Mar 2024 03:02:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QnEVpr5oLrbpYZ2AxtFYI3nUcrl7e//oRx2Dh2KfX8UfzjybKL1WdHLwaZdWw6YeSISkqGd3CUFEL81xy0L/UZqAIZrgMau8RPUcRxlyyxahpbpDORW/NWEyhc3m9sGS+dKrqlKn1lZx3NKcZJDwd2pVS2L9j1yDHRgPJCg6CgRjFHjkiejhCUIWFN4NN+QBLQu0hOGENwsPrCjas6SO8/LNzC/VDQqvEqeQ6E7xDh5TR8ZL8tsPZTRPxnqLCUmubV53Y6SWG4PmMcBm7JlEHP+mKr2zrvv+s5G+8ZLtx3/EUckyw7l/oa4MpogsF+NpQp3pIrwS7LT7ARZXRLIUCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3L0sQhRHH36q2dzYAfz/pRpOCZjQXFfLLameYImh5P0=; b=jT7gILeAdVYCukG7Mz22i/NbKVUx4P6E4wmTZ08dOY4Eo5ZtMrEKG8/fZj6rhLiz9ZHfr90VggMxztO/jhsEdukVrbHvmFs4pAdp+47eTUUnW1tlymkHHTt+qbBGq/+XmxU7O1DIjEykH1DtPJLld0zSQoUW0wRRn0NzUJmluiDvP/00sbE348/G72BYR2/i7IJHcb+ESwRCS6wxJRICYvNY6WWK6/ECNgxYCqkc6LPYXG8eGrSpfis8LXHFeZY8Bq/VnVDUTp2nEKU2w9+JjeV0tVHpc/m5d0+TwKS4OuPCmg41LX9aZlZhKDMkcPaQdZXc9W8fUHZo3m7bEVF5LQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3L0sQhRHH36q2dzYAfz/pRpOCZjQXFfLLameYImh5P0=; b=KLDID6wS6yCVvKJlqk8KlSzwR34TQDH60NZfLNCnT0QwnLpDLilbHsqM8tBA5D0Jg7P9ewwgGy0Hg4rLi4Nq1pFFF+82Fs97C4c+LuTyK+sjDZObzQdhDuyz4YlWs1+obiKPTGk19cmN6LK3liHO8uTeiYimhZLiA7RsAPKYwCc= Received: from CO6PR18MB4484.namprd18.prod.outlook.com (2603:10b6:5:359::9) by PH7PR18MB5574.namprd18.prod.outlook.com (2603:10b6:510:2f0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.18; Wed, 13 Mar 2024 10:02:47 +0000 Received: from CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::4e74:4cf3:63b6:b149]) by CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::4e74:4cf3:63b6:b149%4]) with mapi id 15.20.7386.017; Wed, 13 Mar 2024 10:02:47 +0000 From: Akhil Goyal To: Arkadiusz Kusztal , "dev@dpdk.org" CC: "ciara.power@intel.com" , "stable@dpdk.org" Subject: RE: [EXTERNAL] [PATCH v2] app/test: fix rsa tests in qat suite Thread-Topic: [EXTERNAL] [PATCH v2] app/test: fix rsa tests in qat suite Thread-Index: AQHadSbHAi1w6/DOOU6+l+z76rmoOrE1cIrw Date: Wed, 13 Mar 2024 10:02:47 +0000 Message-ID: References: <20240308081750.5157-1-arkadiuszx.kusztal@intel.com> <20240313091347.25207-1-arkadiuszx.kusztal@intel.com> In-Reply-To: <20240313091347.25207-1-arkadiuszx.kusztal@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO6PR18MB4484:EE_|PH7PR18MB5574:EE_ x-ms-office365-filtering-correlation-id: c70ceeaa-5196-4f13-cf87-08dc4344bc6c x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: dYIU7HYCGRLyeOjbPyGHiGMl6In9IUA+K31ymbcmTUh3isPa438xYAu1HYQfT4L+HG525aEZ5qnVsyINteiiyFoXv5nwhpf8oVzk8vhAbeyImyYI43RcaNc+h0lCSJIUeDqUO/DcYMZvwSfQZ0N6H2kSfOPtaMVA5LMgSXUkCfalZOeyFxYbzikQ7NeIU2eKUWo1f5N4ISTmSik/vvCr69pnKH06DXpweWsJSTnxpxkIYqigG+dqW7SjONCCXCFWMlSCyptd51WKKzMIwpOXn7hzeZEisjU5L5IH8X3b0MTksSi3QjDSjTO0B52GuTtR2/fyMk4ZlWbk9iajA/3jjAvLp1GFaicFzRnCEVfi7EI5lebkNy7w+iLcnmrCzYdjj24oEG4Qn1RuZgEKBjOrgrBkXjwr0gHjEDs/mlvI1mzeMhFlbYpE3ezoZJ79mMPYmIKbXuG/5OKikOCJGrtjY3SukSa8ccHZy9Zpoy/r0LqlGunE7N8exHu7GdMSPsUMNNUjWIf8ogn+zmV6H19s5swMT8+kBCeWfKihUWUB9gB9t0VV8kagLWf2rNzbWf5JQmW4EYwsYsIt0+XOvnsHOWE9dVjhDFXxBKhT2hOaJShmixw2mvxLXpw7XQolsIKWZSAOJB5RZEBNehBNR2gSaUdIEOcf5ivnb7Mn12pb5NEnBS2hwiMr1pkY5FtVwTWOeusN2rYIP9EUVWLAj+3VuEXayP6KcgK7UjAkPAPoT1I= x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO6PR18MB4484.namprd18.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376005)(1800799015)(38070700009); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?IP2g/pUD2KmjKOYOLVfxKsE0gpz5kxBVhIKzpu8jFvtAS0qA7kDc/AHLgLb9?= =?us-ascii?Q?JkTt0WWFTvc9oB+4MVYPOiSF/JuQbjtOzAdwHLCRWkOIUmcdq4MkoXmCjk4i?= =?us-ascii?Q?xGKW8FfG7QcdKpEKlrOFXwiAeHIa86uX18Or7C1rx59KYP2a7ZlQI0xzaSky?= =?us-ascii?Q?6NRRGjuxYpSvl5YAAAC8vZu5oNoFO1EMX3TBAHXbBhzbsGwY2g+sEV1R/yat?= =?us-ascii?Q?bVpN/hFO6fhbvBvLA9eAXtSGDSS249FApZiyNAGpDZxR+QMV9lP2QT5ZVNwv?= =?us-ascii?Q?D7JVmAc1Rbho+Cnt8/rCt8MgVLI/C+NSJFmnC0G+eoW/zNrLcFdpQ0MDmFyK?= =?us-ascii?Q?Ns8V92sWsfSCKWwsBQ/A/ZtSUHyYC/di7YOsvTnb+Un4lKv6y2aUN6WKJbR7?= =?us-ascii?Q?aV3h6bHhHolL3NmX6AwBVIvaPVQffFgvXHXKW44saSB2lmjrqFsUMCWsEvhV?= =?us-ascii?Q?QkNsaCuBVR+CeQK/j44M+HO6QYiNqkNtaQJtIUibOi6uHZkeTcEYLqmbXO/5?= =?us-ascii?Q?L0AXO5USHsjaKTLkPbkrlfbNgwJ3wzeiftOQPcWg+XYBhTEn3SwyPqX+25qy?= =?us-ascii?Q?3rsO59FMm2hXvb10q7s5WllaZt417AwynrvIG/Yyk+lztMFA2jjVDc1DcMxP?= =?us-ascii?Q?KQL+IbMKzlcjChb19Q4CByOD69sHLBVdyVCxKQMjxEmOERaBCWJNerrJSeWI?= =?us-ascii?Q?P2UvWnKrrgBABFIiiLZ3P0GBaq1mVO9Mou+UTY3kcTfEA6Nf9VveCzbvBEfS?= =?us-ascii?Q?MXUY1tZ4awxiI8zp7mhMJ7xEm8JZ/R/wNMTL0rJXKe+rt0jT97dhimrq8KbU?= =?us-ascii?Q?Gb5FoNrT0Jzd1AWYpQ2OHHUdD6x6KrgHsNDnAE8bZlMwEPPwAj/oOIBW5jrO?= =?us-ascii?Q?mBCjbKgLc/8zeBt5DMLtfvVe0p3Y1rjLdJDA1LlYn23na9Pcydg904dlFrFO?= =?us-ascii?Q?MCv24MjODcM8F6fNB30Yrsg7HBHboK26ZRI5ztkZgHU5WQoCGyA+NhGi7/C8?= =?us-ascii?Q?fV8Uc+4TxTqWYzVDWnK2WE6wSe2k2+hR9R0S94CMtP/WOAOQwZp0kXhBDofz?= =?us-ascii?Q?9p1K5NzUQSGNrCNWZb+BXf2ZIMWTD/Yx20wh7DtvOrl0wCLwTm56Ogs2mJM4?= =?us-ascii?Q?0K0puQErBONEUE1CccebTWjNy+OFaa/MXFSsV09RHtVgcUGcnJN/36F3F3kt?= =?us-ascii?Q?znNlyBWNh/v66lc4gjD7VV33r3yVTD9n3DBLd2MqC0qR89MKHZTI6QMDjqua?= =?us-ascii?Q?OGWlcJoP/tGUSeYEaF2qmKjc8LiCmsEZSoUAzDQZMWJ0r3qIv46naOBQbXSA?= =?us-ascii?Q?qeWdh8YIfOhAh9eFeVXmTeH1IGhmdk+JURdnt2XKaA19zBWzmVvl891m9fKm?= =?us-ascii?Q?BU2Y7rnLVcOmeLXC2xNw6j4Jz/AuSdLw6nKBODXOm3U+v8p3tMiud1c2r32X?= =?us-ascii?Q?AdWBcZ76C++ZbDD2UOlDO49dAUQ24Lqs85hupK52BoUZyqO3eNjGVu87xPTC?= =?us-ascii?Q?R6hvTzi0SWwnyQU6OMt6UMsei2ZfgmE1sk6yNSjHgOMrNyx85ZOWd0njFFd+?= =?us-ascii?Q?N6qxSuOdHsCqLIENsg0=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: marvell.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO6PR18MB4484.namprd18.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: c70ceeaa-5196-4f13-cf87-08dc4344bc6c X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Mar 2024 10:02:47.7730 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: e6J9se2s4vWK1ZCvlAxxmoT0ssz18FsvW3fHgXUgdBO7K63epktITTgRrJ04JznLuVg6+UBij7LPiERT+mPiIg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR18MB5574 X-Proofpoint-GUID: ej6DgKWQyzpQFGIgjfRtltahVbSAgh1m X-Proofpoint-ORIG-GUID: ej6DgKWQyzpQFGIgjfRtltahVbSAgh1m X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-03-13_07,2024-03-12_01,2023-05-22_02 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org > This commit fixes incorrectly set keys in the > QAT testsuite for the RSA algorithm. >=20 > Fixes: 9b5465867fb8 ("test/crypto: add RSA none padding cases") > Cc: stable@dpdk.org >=20 > Signed-off-by: Arkadiusz Kusztal > --- > v2: > - removed camel case Removing camel case should be a separate patch Or update the patch title description appropriately. >=20 > app/test/test_cryptodev_asym.c | 102 ++++++++++++++---------= ------ > app/test/test_cryptodev_rsa_test_vectors.h | 2 +- > 2 files changed, 52 insertions(+), 52 deletions(-) >=20 > diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asy= m.c > index 17daf734e8..2c745a7f7c 100644 > --- a/app/test/test_cryptodev_asym.c > +++ b/app/test/test_cryptodev_asym.c > @@ -3292,11 +3292,8 @@ modular_multiplicative_inverse(const void > *test_data) > arg.qt.coef.data =3D coef; \ > arg.qt.coef.length =3D vector->coef.len >=20 > -typedef void (*rsa_key_init_t)(struct rte_crypto_asym_xform *, > - const struct rsa_test_data_2 *); > - > static int > -RSA_Encrypt(const struct rsa_test_data_2 *vector, uint8_t *cipher_buf) > +rsa_encrypt(const struct rsa_test_data_2 *vector, uint8_t *cipher_buf) > { > self->result_op =3D NULL; > /* Compute encryption on the test vector */ > @@ -3314,7 +3311,7 @@ RSA_Encrypt(const struct rsa_test_data_2 *vector, > uint8_t *cipher_buf) > } >=20 > static int > -RSA_Decrypt(const struct rsa_test_data_2 *vector, uint8_t *plaintext, > +rsa_decrypt(const struct rsa_test_data_2 *vector, uint8_t *plaintext, > const int use_op) > { > uint8_t cipher[TEST_DATA_SIZE] =3D { 0 }; > @@ -3335,41 +3332,14 @@ RSA_Decrypt(const struct rsa_test_data_2 *vector, > uint8_t *plaintext, > return 0; > } >=20 > -static void > -RSA_key_init_Exp(struct rte_crypto_asym_xform *xform, > - const struct rsa_test_data_2 *vector) > -{ > - SET_RSA_PARAM(xform->rsa, vector, n); > - SET_RSA_PARAM(xform->rsa, vector, e); > - SET_RSA_PARAM(xform->rsa, vector, d); > - xform->rsa.key_type =3D RTE_RSA_KEY_TYPE_EXP; > -} > - > -static void > -RSA_key_init_CRT(struct rte_crypto_asym_xform *xform, > - const struct rsa_test_data_2 *vector) > -{ > - SET_RSA_PARAM(xform->rsa, vector, n); > - SET_RSA_PARAM(xform->rsa, vector, e); > - SET_RSA_PARAM_QT(xform->rsa, vector, p); > - SET_RSA_PARAM_QT(xform->rsa, vector, q); > - SET_RSA_PARAM_QT(xform->rsa, vector, dP); > - SET_RSA_PARAM_QT(xform->rsa, vector, dQ); > - SET_RSA_PARAM_QT(xform->rsa, vector, qInv); > - xform->rsa.key_type =3D RTE_RSA_KEY_TYPE_QT; > -} > - > static int > -RSA_Init_Session(const struct rsa_test_data_2 *vector, > - rsa_key_init_t key_init) > +rsa_init_session(struct rte_crypto_asym_xform *xform) > { > const uint8_t dev_id =3D params->valid_devs[0]; > struct rte_cryptodev_info dev_info; > - struct rte_crypto_asym_xform xform =3D { }; > int ret =3D 0; >=20 > - key_init(&xform, vector); > - xform.xform_type =3D RTE_CRYPTO_ASYM_XFORM_RSA; > + xform->xform_type =3D RTE_CRYPTO_ASYM_XFORM_RSA; >=20 > rte_cryptodev_info_get(dev_id, &dev_info); > if (!(dev_info.feature_flags & > RTE_CRYPTODEV_FF_RSA_PRIV_OP_KEY_QT)) { > @@ -3377,7 +3347,7 @@ RSA_Init_Session(const struct rsa_test_data_2 > *vector, > "Device doesn't support decrypt op with quintuple key > type. Test skipped\n"); > return TEST_SKIPPED; > } > - ret =3D rte_cryptodev_asym_session_create(dev_id, &xform, > + ret =3D rte_cryptodev_asym_session_create(dev_id, xform, > params->session_mpool, &self->sess); > if (ret < 0) { > RTE_LOG(ERR, USER1, > @@ -3388,17 +3358,23 @@ RSA_Init_Session(const struct rsa_test_data_2 > *vector, > } >=20 > static int > -KAT_RSA_Encrypt(const void *data) > +kat_rsa_encrypt(const void *data) > { > uint8_t cipher_buf[TEST_DATA_SIZE] =3D {0}; > const struct rsa_test_data_2 *vector =3D data; > - int ret =3D RSA_Init_Session(vector, RSA_key_init_Exp); > + struct rte_crypto_asym_xform xform =3D { }; > + > + SET_RSA_PARAM(xform.rsa, vector, n); > + SET_RSA_PARAM(xform.rsa, vector, e); > + SET_RSA_PARAM(xform.rsa, vector, d); > + xform.rsa.key_type =3D RTE_RSA_KEY_TYPE_EXP; > + int ret =3D rsa_init_session(&xform); >=20 > if (ret) { > RTE_LOG(ERR, USER1, "Failed to init session for RSA\n"); > return ret; > } > - TEST_ASSERT_SUCCESS(RSA_Encrypt(vector, cipher_buf), > + TEST_ASSERT_SUCCESS(rsa_encrypt(vector, cipher_buf), > "RSA: Failed to encrypt"); > TEST_ASSERT_BUFFERS_ARE_EQUAL(vector->cipher.data, > self->result_op->asym->rsa.cipher.data, > @@ -3408,17 +3384,26 @@ KAT_RSA_Encrypt(const void *data) > } >=20 > static int > -KAT_RSA_Encrypt_CRT(const void *data) > +kat_rsa_encrypt_crt(const void *data) > { > uint8_t cipher_buf[TEST_DATA_SIZE] =3D {0}; > const struct rsa_test_data_2 *vector =3D data; > - int ret =3D RSA_Init_Session(vector, RSA_key_init_CRT); > + struct rte_crypto_asym_xform xform =3D { }; >=20 > + SET_RSA_PARAM(xform.rsa, vector, n); > + SET_RSA_PARAM(xform.rsa, vector, e); > + SET_RSA_PARAM_QT(xform.rsa, vector, p); > + SET_RSA_PARAM_QT(xform.rsa, vector, q); > + SET_RSA_PARAM_QT(xform.rsa, vector, dP); > + SET_RSA_PARAM_QT(xform.rsa, vector, dQ); > + SET_RSA_PARAM_QT(xform.rsa, vector, qInv); > + xform.rsa.key_type =3D RTE_RSA_KEY_TYPE_QT; > + int ret =3D rsa_init_session(&xform); > if (ret) { > RTE_LOG(ERR, USER1, "Failed to init session for RSA\n"); > return ret; > } > - TEST_ASSERT_SUCCESS(RSA_Encrypt(vector, cipher_buf), > + TEST_ASSERT_SUCCESS(rsa_encrypt(vector, cipher_buf), > "RSA: Failed to encrypt"); > TEST_ASSERT_BUFFERS_ARE_EQUAL(vector->cipher.data, > self->result_op->asym->rsa.cipher.data, > @@ -3428,17 +3413,23 @@ KAT_RSA_Encrypt_CRT(const void *data) > } >=20 > static int > -KAT_RSA_Decrypt(const void *data) > +kat_rsa_decrypt(const void *data) > { > uint8_t message[TEST_DATA_SIZE] =3D {0}; > const struct rsa_test_data_2 *vector =3D data; > - int ret =3D RSA_Init_Session(vector, RSA_key_init_Exp); > + struct rte_crypto_asym_xform xform =3D { }; > + > + SET_RSA_PARAM(xform.rsa, vector, n); > + SET_RSA_PARAM(xform.rsa, vector, e); > + SET_RSA_PARAM(xform.rsa, vector, d); > + xform.rsa.key_type =3D RTE_RSA_KEY_TYPE_EXP; > + int ret =3D rsa_init_session(&xform); >=20 > if (ret) { > RTE_LOG(ERR, USER1, "Failed to init session for RSA\n"); > return ret; > } > - TEST_ASSERT_SUCCESS(RSA_Decrypt(vector, message, 0), > + TEST_ASSERT_SUCCESS(rsa_decrypt(vector, message, 0), > "RSA: Failed to encrypt"); > TEST_ASSERT_BUFFERS_ARE_EQUAL(vector->message.data, > self->result_op->asym->rsa.message.data, > @@ -3448,17 +3439,26 @@ KAT_RSA_Decrypt(const void *data) > } >=20 > static int > -KAT_RSA_Decrypt_CRT(const void *data) > +kat_rsa_decrypt_crt(const void *data) > { > uint8_t message[TEST_DATA_SIZE] =3D {0}; > const struct rsa_test_data_2 *vector =3D data; > - int ret =3D RSA_Init_Session(vector, RSA_key_init_CRT); > + struct rte_crypto_asym_xform xform =3D { }; >=20 > + SET_RSA_PARAM(xform.rsa, vector, n); > + SET_RSA_PARAM(xform.rsa, vector, e); > + SET_RSA_PARAM_QT(xform.rsa, vector, p); > + SET_RSA_PARAM_QT(xform.rsa, vector, q); > + SET_RSA_PARAM_QT(xform.rsa, vector, dP); > + SET_RSA_PARAM_QT(xform.rsa, vector, dQ); > + SET_RSA_PARAM_QT(xform.rsa, vector, qInv); > + xform.rsa.key_type =3D RTE_RSA_KEY_TYPE_QT; > + int ret =3D rsa_init_session(&xform); > if (ret) { > RTE_LOG(ERR, USER1, "Failed to init session for RSA\n"); > return ret; > } > - TEST_ASSERT_SUCCESS(RSA_Decrypt(vector, message, 0), > + TEST_ASSERT_SUCCESS(rsa_decrypt(vector, message, 0), > "RSA: Failed to encrypt"); > TEST_ASSERT_BUFFERS_ARE_EQUAL(vector->message.data, > self->result_op->asym->rsa.message.data, > @@ -3535,20 +3535,20 @@ static struct unit_test_suite > cryptodev_qat_asym_testsuite =3D { > TEST_CASE_NAMED_WITH_DATA( > "RSA Encryption (n=3D128, pt=3D20, e=3D3) EXP, Padding: > NONE", > ut_setup_asym, ut_teardown_asym, > - KAT_RSA_Encrypt, &RSA_vector_128_20_3_None), > + kat_rsa_encrypt, &rsa_vector_128_20_3_none), > TEST_CASE_NAMED_WITH_DATA( > "RSA Decryption (n=3D128, pt=3D20, e=3D3) EXP, Padding: > NONE", > ut_setup_asym, ut_teardown_asym, > - KAT_RSA_Decrypt, &RSA_vector_128_20_3_None), > + kat_rsa_decrypt, &rsa_vector_128_20_3_none), > /* RSA CRT */ > TEST_CASE_NAMED_WITH_DATA( > "RSA Encryption (n=3D128, pt=3D20, e=3D3) CRT, Padding: > NONE", > ut_setup_asym, ut_teardown_asym, > - KAT_RSA_Encrypt_CRT, &RSA_vector_128_20_3_None), > + kat_rsa_encrypt_crt, &rsa_vector_128_20_3_none), > TEST_CASE_NAMED_WITH_DATA( > "RSA Decryption (n=3D128, pt=3D20, e=3D3) CRT, Padding: > NONE", > ut_setup_asym, ut_teardown_asym, > - KAT_RSA_Decrypt_CRT, &RSA_vector_128_20_3_None), > + kat_rsa_decrypt_crt, &rsa_vector_128_20_3_none), > TEST_CASES_END() /**< NULL terminate unit test array */ > } > }; > diff --git a/app/test/test_cryptodev_rsa_test_vectors.h > b/app/test/test_cryptodev_rsa_test_vectors.h > index b4982014a2..89981f13f0 100644 > --- a/app/test/test_cryptodev_rsa_test_vectors.h > +++ b/app/test/test_cryptodev_rsa_test_vectors.h > @@ -72,7 +72,7 @@ struct rsa_test_data_2 { > }; >=20 > static const struct > -rsa_test_data_2 RSA_vector_128_20_3_None =3D { > +rsa_test_data_2 rsa_vector_128_20_3_none =3D { > .description =3D > "RSA Encryption Decryption (n=3D128, pt=3D20, e=3D3) EXP, QT", > .xform_type =3D RTE_CRYPTO_ASYM_XFORM_RSA, > -- > 2.13.6