From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by dpdk.org (Postfix) with ESMTP id 9455A1B8CD for ; Fri, 8 Feb 2019 12:13:52 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Feb 2019 03:13:52 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,347,1544515200"; d="scan'208";a="141749584" Received: from akusztax-mobl.ger.corp.intel.com ([10.104.14.178]) by fmsmga002.fm.intel.com with ESMTP; 08 Feb 2019 03:13:50 -0800 From: Arek Kusztal To: dev@dpdk.org Cc: akhil.goyal@nxp.com, fiona.trahe@intel.com, shally.verma@caviumnetworks.com, Arek Kusztal Date: Fri, 8 Feb 2019 12:13:38 +0100 Message-Id: <20190208111338.4544-4-arkadiuszx.kusztal@intel.com> X-Mailer: git-send-email 2.19.1.windows.1 In-Reply-To: <20190208111338.4544-1-arkadiuszx.kusztal@intel.com> References: <20190208111338.4544-1-arkadiuszx.kusztal@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: [dpdk-dev] [PATCH v2 3/3] test: add result field to mod exp and mod inv X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 Feb 2019 11:13:53 -0000 This patch adds result field to modular exponentiation and modular multiplicative inverse tests Signed-off-by: Arek Kusztal --- test/test/test_cryptodev_asym.c | 6 ++++++ test/test/test_cryptodev_asym_util.h | 8 ++++---- 2 files changed, 10 insertions(+), 4 deletions(-) diff --git a/test/test/test_cryptodev_asym.c b/test/test/test_cryptodev_asym.c index 0f6fc57..a779e8f 100644 --- a/test/test/test_cryptodev_asym.c +++ b/test/test/test_cryptodev_asym.c @@ -940,6 +940,7 @@ test_mod_inv(void) const struct rte_cryptodev_asymmetric_xform_capability *capability; uint8_t input[TEST_DATA_SIZE] = {0}; int ret = 0; + uint8_t result[sizeof(mod_p)] = { 0 }; if (rte_cryptodev_asym_get_xform_enum( &modinv_xform.xform_type, "modinv") < 0) { @@ -993,6 +994,8 @@ test_mod_inv(void) memcpy(input, base, sizeof(base)); asym_op->modinv.base.data = input; asym_op->modinv.base.length = sizeof(base); + asym_op->modinv.result.data = result; + asym_op->modinv.result.length = sizeof(result); /* attach asymmetric crypto session to crypto operations */ rte_crypto_op_attach_asym_session(op, sess); @@ -1055,6 +1058,7 @@ test_mod_exp(void) const struct rte_cryptodev_asymmetric_xform_capability *capability; uint8_t input[TEST_DATA_SIZE] = {0}; int ret = 0; + uint8_t result[sizeof(mod_p)] = { 0 }; if (rte_cryptodev_asym_get_xform_enum(&modex_xform.xform_type, "modexp") @@ -1109,6 +1113,8 @@ test_mod_exp(void) memcpy(input, base, sizeof(base)); asym_op->modex.base.data = input; asym_op->modex.base.length = sizeof(base); + asym_op->modex.result.data = result; + asym_op->modex.result.length = sizeof(result); /* attach asymmetric crypto session to crypto operations */ rte_crypto_op_attach_asym_session(op, sess); diff --git a/test/test/test_cryptodev_asym_util.h b/test/test/test_cryptodev_asym_util.h index dff0c2a..b3d9fb4 100644 --- a/test/test/test_cryptodev_asym_util.h +++ b/test/test/test_cryptodev_asym_util.h @@ -20,8 +20,8 @@ static inline int rsa_verify(struct rsa_test_data *rsa_param, static inline int verify_modinv(uint8_t *mod_inv, struct rte_crypto_op *result_op) { - if (memcmp(mod_inv, result_op->asym->modinv.base.data, - result_op->asym->modinv.base.length)) + if (memcmp(mod_inv, result_op->asym->modinv.result.data, + result_op->asym->modinv.result.length)) return -1; return 0; } @@ -29,8 +29,8 @@ static inline int verify_modinv(uint8_t *mod_inv, static inline int verify_modexp(uint8_t *mod_exp, struct rte_crypto_op *result_op) { - if (memcmp(mod_exp, result_op->asym->modex.base.data, - result_op->asym->modex.base.length)) + if (memcmp(mod_exp, result_op->asym->modex.result.data, + result_op->asym->modex.result.length)) return -1; return 0; } -- 2.1.0