Add ECDH, ECPM and ECDSA tests for QAT
Signed-off-by: Radu Nicolau <radu.nicolau@intel.com>
---
app/test/test_cryptodev_asym.c | 109 +++++++++++++++++++++++++++++++++
1 file changed, 109 insertions(+)
diff --git a/app/test/test_cryptodev_asym.c b/app/test/test_cryptodev_asym.c
index 20afb5e98b..c62329edff 100644
--- a/app/test/test_cryptodev_asym.c
+++ b/app/test/test_cryptodev_asym.c
@@ -1715,6 +1715,29 @@ test_ecdsa_sign_verify_all_curve(void)
return overall_status;
}
+static int
+test_ecdsa_sign_verify_qat_curves(void)
+{
+ int status, overall_status = TEST_SUCCESS;
+ enum curve curve_id;
+ int test_index = 0;
+ const char *msg;
+
+ for (curve_id = SECP256R1; curve_id <= SECP521R1; curve_id++) {
+
+ status = test_ecdsa_sign_verify(curve_id);
+ if (status == TEST_SUCCESS) {
+ msg = "succeeded";
+ } else {
+ msg = "failed";
+ overall_status = status;
+ }
+ printf(" %u) TestCase Sign/Veriy Curve %s %s\n",
+ test_index ++, curve[curve_id], msg);
+ }
+ return overall_status;
+}
+
static int
test_ecpm(enum curve curve_id)
{
@@ -1881,6 +1904,28 @@ test_ecpm_all_curve(void)
return overall_status;
}
+static int
+test_ecpm_qat_curves(void)
+{
+ int status, overall_status = TEST_SUCCESS;
+ enum curve curve_id;
+ int test_index = 0;
+ const char *msg;
+
+ for (curve_id = SECP256R1; curve_id <= SECP521R1; curve_id++) {
+ status = test_ecpm(curve_id);
+ if (status == TEST_SUCCESS) {
+ msg = "succeeded";
+ } else {
+ msg = "failed";
+ overall_status = status;
+ }
+ printf(" %u) TestCase EC Point Mul Curve %s %s\n",
+ test_index ++, curve[curve_id], msg);
+ }
+ return overall_status;
+}
+
static int
test_ecdh_priv_key_generate(enum curve curve_id)
{
@@ -2674,6 +2719,56 @@ test_ecdh_all_curve(void)
return overall_status;
}
+static int
+test_ecdh_qat_curves(void)
+{
+ int status, overall_status = TEST_SUCCESS;
+ enum curve curve_id;
+ int test_index = 0;
+ const char *msg;
+
+ for (curve_id = SECP256R1; curve_id <= SECP521R1; curve_id++) {
+ status = test_ecdh_pub_key_generate(curve_id);
+ if (status == TEST_SUCCESS) {
+ msg = "succeeded";
+ } else if (status == TEST_SKIPPED) {
+ msg = "skipped";
+ } else {
+ msg = "failed";
+ overall_status = status;
+ }
+ printf(" %u) TestCase ECDH public key generation for Curve %s %s\n",
+ test_index ++, curve[curve_id], msg);
+ }
+
+ for (curve_id = SECP256R1; curve_id <= SECP521R1; curve_id++) {
+ status = test_ecdh_pub_key_verify(curve_id);
+ if (status == TEST_SUCCESS) {
+ msg = "succeeded";
+ } else {
+ msg = "failed";
+ overall_status = status;
+ }
+ printf(" %u) TestCase ECDH public key verification for Curve %s %s\n",
+ test_index ++, curve[curve_id], msg);
+ }
+
+ for (curve_id = SECP256R1; curve_id <= SECP521R1; curve_id++) {
+ status = test_ecdh_shared_secret(curve_id);
+ if (status == TEST_SUCCESS) {
+ msg = "succeeded";
+ } else {
+ msg = "failed";
+ overall_status = status;
+ }
+ printf(" %u) TestCase ECDH shared secret compute for Curve %s %s\n",
+ test_index ++, curve[curve_id], msg);
+ }
+
+ return overall_status;
+}
+
+
static int
test_sm2_sign(void)
{
@@ -3987,6 +4082,7 @@ static struct unit_test_suite cryptodev_openssl_asym_testsuite = {
ut_setup_asym, ut_teardown_asym,
modular_exponentiation, &modex_group_test_cases[7]),
TEST_CASE_ST(ut_setup_asym, ut_teardown_asym, test_eddsa_sign_verify_all_curve),
+
TEST_CASES_END() /**< NULL terminate unit test array */
}
};
@@ -4023,6 +4119,19 @@ static struct unit_test_suite cryptodev_qat_asym_testsuite = {
"RSA Decryption (n=128, pt=20, e=3) CRT, Padding: NONE",
ut_setup_asym, ut_teardown_asym,
kat_rsa_decrypt_crt, &rsa_vector_128_20_3_none),
+ TEST_CASE_NAMED_ST(
+ "ECDH Eliptic Curve tests",
+ ut_setup_asym, ut_teardown_asym,
+ test_ecdh_qat_curves),
+ TEST_CASE_NAMED_ST(
+ "ECPM Eliptic Curve tests",
+ ut_setup_asym, ut_teardown_asym,
+ test_ecpm_qat_curves),
+ TEST_CASE_NAMED_ST(
+ "ECDSA Eliptic Curve tests",
+ ut_setup_asym, ut_teardown_asym,
+ test_ecdsa_sign_verify_qat_curves),
+
TEST_CASES_END() /**< NULL terminate unit test array */
}
};
--
2.50.1