From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 7265C42BA7; Fri, 26 May 2023 09:31:39 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 497BD40DDA; Fri, 26 May 2023 09:31:39 +0200 (CEST) Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) by mails.dpdk.org (Postfix) with ESMTP id E795E40A89 for ; Fri, 26 May 2023 09:31:37 +0200 (CEST) Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 34Q6sETY005766; Fri, 26 May 2023 00:31:37 -0700 Received: from nam02-sn1-obe.outbound.protection.outlook.com (mail-sn1nam02lp2046.outbound.protection.outlook.com [104.47.57.46]) by mx0b-0016f401.pphosted.com (PPS) with ESMTPS id 3qsspt5y7e-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 26 May 2023 00:31:36 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SUWKYMb4QayENcWka6F9h8fkCkFl08xYnz9Jq2VcuENb0XybDLOWZtGZpgxO8L3a+YUDkgg8S6LNTe3Y10fQH9BnlGNzOOBlugydRaZRKcIRo+cr77aHdzkgU2P1izF1Px14b/911yOYMQDAE5aEfAXvD47YKcYdC+6pYmT1XiCByR7uzbHLBDbv6vuf+8kM71TbypbdI5vsiltT6HbIG+tFBURhxKM1dMvvMLBHU+FsFabWyvVoLuZrBrwGqldrGgWDBwo0oF7HmgB4YX1SyeNNF9GKg6HEbRDj7fJXhR+Bjuo3rNNWvcW6SvSRaxjoTsHXwT3uJFnnEhStiy5YJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KJLbuxePZZS6Zba4+Zu/w9/royDrxdFydmmyz/k7Vv4=; b=Y6HPfdvzC7D8eOg9eSvikGxG1ptvgXQFM5NwgYffzLJYXFmFC1B57P1kpQpdOB3duEaR0oj+sGIBhEncu6Il1pn/pD3JWpOvRCUTkpCoZhSzRzMT664a5ngRN9jHliywNvgvgglMYBZqg+Z0Gk7LsXWqn916+zM863W3+mlAldIGl0GoZmc3nG6Fuof2UiNPIxR3A4X4Z7hckRHvdUtYQsPqH5ViSU4FYBWSIgBpRA67VNttrpOdL2T3i81oscsS9tDNN0kEYpvgRWBg720eu1q6K4cmUbIiuZCYN6jKScre/bEcT0Rh87P6ntfxfRXL8+e8ieyyCiEui26p+lMBqA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.onmicrosoft.com; s=selector1-marvell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KJLbuxePZZS6Zba4+Zu/w9/royDrxdFydmmyz/k7Vv4=; b=WRGm1BrQN+wE426dU813MhcuHLzvS/UJuU87dqceguPQFI7RUZQo6PSf7MTe+2qg4hiCzV6lZts8MdNgBS7pyKHUD1U5CKOyhUb2hXGxODhoqjx3XaYw600C7gEsj7DemZchCtFdmXKkCGkwc9+Tji1fl6aZGKqbaXkLMk9N040= Received: from CO1PR18MB4714.namprd18.prod.outlook.com (2603:10b6:303:e9::18) by MW4PR18MB5083.namprd18.prod.outlook.com (2603:10b6:303:1a6::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6411.29; Fri, 26 May 2023 07:31:34 +0000 Received: from CO1PR18MB4714.namprd18.prod.outlook.com ([fe80::b0e5:2f22:78cf:f524]) by CO1PR18MB4714.namprd18.prod.outlook.com ([fe80::b0e5:2f22:78cf:f524%5]) with mapi id 15.20.6433.018; Fri, 26 May 2023 07:31:34 +0000 From: Gowrishankar Muthukrishnan To: Akhil Goyal , "dev@dpdk.org" CC: Anoob Joseph , Fan Zhang , Kai Ji , "ciara.power@intel.com" Subject: RE: [v1, 2/3] test/test_cryptodev_asym: add SM2 tests Thread-Topic: [v1, 2/3] test/test_cryptodev_asym: add SM2 tests Thread-Index: AQHZebPRgzoUO+KnAkuUODAOwPos1a9c604AgA9iRkA= Date: Fri, 26 May 2023 07:31:34 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-dg-ref: =?us-ascii?Q?PG1ldGE+PGF0IG5tPSJib2R5LnR4dCIgcD0iYzpcdXNlcnNcZ211dGh1a3Jp?= =?us-ascii?Q?c2huXGFwcGRhdGFccm9hbWluZ1wwOWQ4NDliNi0zMmQzLTRhNDAtODVlZS02?= =?us-ascii?Q?Yjg0YmEyOWUzNWJcbXNnc1xtc2ctNTRkOGQwM2UtZmI5Ny0xMWVkLWEwYTEt?= =?us-ascii?Q?NTQ4ZDVhZTlkZGUxXGFtZS10ZXN0XDU0ZDhkMDQwLWZiOTctMTFlZC1hMGEx?= =?us-ascii?Q?LTU0OGQ1YWU5ZGRlMWJvZHkudHh0IiBzej0iODg0OSIgdD0iMTMzMjk1NTk4?= =?us-ascii?Q?OTEwODg5MjExIiBoPSJ4cW1iVS9VZkZ0ejNVbndjUVZsdWJxY3pNSk09IiBp?= =?us-ascii?Q?ZD0iIiBibD0iMCIgYm89IjEiIGNpPSJjQUFBQUVSSFUxUlNSVUZOQ2dVQUFO?= =?us-ascii?Q?NFBBQUQ3M0RRWHBJL1pBUzhlek1IZ0d0b21MeDdNd2VBYTJpWVpBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBSEFBQUFCdUR3QUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBRUFBUUVCQUFBQUk3cVRwQUNBQVFBQUFBQUFBQUFBQUo0QUFBQmhB?= =?us-ascii?Q?R1FBWkFCeUFHVUFjd0J6QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFFQUFBQUFBQUFBQWdBQUFBQUFuZ0FBQUdNQWRRQnpBSFFBYndCdEFG?= =?us-ascii?Q?OEFjQUJsQUhJQWN3QnZBRzRBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBUUFBQUFBQUFB?= =?us-ascii?Q?QUNBQUFBQUFDZUFBQUFZd0IxQUhNQWRBQnZBRzBBWHdCd0FHZ0Fid0J1QUdV?= =?us-ascii?Q?QWJnQjFBRzBBWWdCbEFISUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFCQUFBQUFBQUFBQUFBQUFBQkFBQUFBQUFBQUFJQUFBQUFBSjRBQUFC?= =?us-ascii?Q?akFIVUFjd0IwQUc4QWJRQmZBSE1BY3dCdUFGOEFaQUJoQUhNQWFBQmZBSFlB?= =?us-ascii?Q?TUFBeUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-refone: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUVBQUFBQUFBQUFBZ0FBQUFBQW5n?= =?us-ascii?Q?QUFBR01BZFFCekFIUUFid0J0QUY4QWN3QnpBRzRBWHdCckFHVUFlUUIzQUc4?= =?us-ascii?Q?QWNnQmtBSE1BQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFRQUFBQUFBQUFBQ0FBQUFBQUNlQUFBQVl3QjFBSE1BZEFC?= =?us-ascii?Q?dkFHMEFYd0J6QUhNQWJnQmZBRzRBYndCa0FHVUFiQUJwQUcwQWFRQjBBR1VB?= =?us-ascii?Q?Y2dCZkFIWUFNQUF5QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFCQUFB?= =?us-ascii?Q?QUFBQUFBQUlBQUFBQUFKNEFBQUJqQUhVQWN3QjBBRzhBYlFCZkFITUFjd0J1?= =?us-ascii?Q?QUY4QWN3QndBR0VBWXdCbEFGOEFkZ0F3QURJQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBRUFBQUFBQUFBQUFnQUFBQUFB?= =?us-ascii?Q?bmdBQUFHUUFiQUJ3QUY4QWN3QnJBSGtBY0FCbEFGOEFZd0JvQUdFQWRBQmZB?= =?us-ascii?Q?RzBBWlFCekFITUFZUUJuQUdVQVh3QjJBREFBTWdBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQVFBQUFBQUFBQUFDQUFBQUFBQ2VBQUFBWkFCc0FIQUFY?= =?us-ascii?Q?d0J6QUd3QVlRQmpBR3NBWHdCakFHZ0FZUUIwQUY4QWJRQmxBSE1BY3dCaEFH?= =?us-ascii?Q?Y0FaUUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-reftwo: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUJBQUFBQUFBQUFBSUFBQUFBQUo0QUFBQmtBR3dB?= =?us-ascii?Q?Y0FCZkFIUUFaUUJoQUcwQWN3QmZBRzhBYmdCbEFHUUFjZ0JwQUhZQVpRQmZB?= =?us-ascii?Q?R1lBYVFCc0FHVUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFFQUFBQUFBQUFBQWdBQUFBQUFuZ0FBQUdVQWJRQmhBR2tBYkFCZkFHRUFa?= =?us-ascii?Q?QUJrQUhJQVpRQnpBSE1BQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFRQUFBQUFBQUFBQUFBQUFBUUFBQUFBQUFBQUNB?= =?us-ascii?Q?QUFBQUFDZUFBQUFiUUJoQUhJQWRnQmxBR3dBWHdCd0FISUFid0JxQUdVQVl3?= =?us-ascii?Q?QjBBRjhBYmdCaEFHMEFaUUJ6QUY4QVl3QnZBRzRBWmdCcEFHUUFaUUJ1QUhR?= =?us-ascii?Q?QWFRQmhBR3dBWHdCaEFHd0Fid0J1QUdVQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQkFBQUFBQUFBQUFJQUFBQUFBSjRBQUFCdEFH?= =?us-ascii?Q?RUFjZ0IyQUdVQWJBQmZBSEFBY2dCdkFHb0FaUUJqQUhRQVh3QnVBR0VBYlFC?= =?us-ascii?Q?bEFITUFYd0J5QUdVQWN3QjBBSElBYVFCakFIUUFaUUJrQUY4QVlRQnNBRzhB?= =?us-ascii?Q?YmdCbEFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUVBQUFBQUFBQUFBZ0FBQUFBQW5nQUFBRzBBWVFCeUFIWUFaUUJzQUY4?= =?us-ascii?Q?QWNBQnlBRzhBYWdCbEFHTUFkQUJmQUc0QVlRQnRBR1VBY3dCZkFISUFaUUJ6?= =?us-ascii?Q?QUhRQWNnQnBBR01BZEFCbEFHUUFYd0JvQUdVQWVBQmpBRzhBWkFCbEFITUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFRQUFBQUFBQUFB?= =?us-ascii?Q?Q0FBQUFBQUNlQUFBQWJRQmhBSElBZGdCbEFHd0FiQUJmQUdFQWNnQnRBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-rorf: true x-dg-refthree: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFCQUFBQUFB?= =?us-ascii?Q?QUFBQUlBQUFBQUFKNEFBQUJ0QUdFQWNnQjJBR1VBYkFCc0FGOEFad0J2QUc4?= =?us-ascii?Q?QVp3QnNBR1VBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBRUFBQUFBQUFBQUFnQUFBQUFBbmdB?= =?us-ascii?Q?QUFHMEFZUUJ5QUhZQVpRQnNBR3dBWHdCd0FISUFid0JxQUdVQVl3QjBBRjhB?= =?us-ascii?Q?WXdCdkFHUUFaUUJ6QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQVFBQUFBQUFBQUFDQUFBQUFBQ2VBQUFBYlFCaEFISUFkZ0Js?= =?us-ascii?Q?QUd3QWJBQmZBSEFBY2dCdkFHb0FaUUJqQUhRQVh3QmpBRzhBWkFCbEFITUFY?= =?us-ascii?Q?d0JrQUdrQVl3QjBBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUJBQUFB?= =?us-ascii?Q?QUFBQUFBSUFBQUFBQUo0QUFBQnRBR0VBY2dCMkFHVUFiQUJzQUY4QWNBQnlB?= =?us-ascii?Q?RzhBYWdCbEFHTUFkQUJmQUc0QVlRQnRBR1VBY3dCZkFHTUFid0J1QUdZQWFR?= =?us-ascii?Q?QmtBR1VBYmdCMEFHa0FZUUJzQUY4QWJRQmhBSElBZGdCbEFHd0FiQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFFQUFBQUFBQUFBQWdBQUFBQUFu?= =?us-ascii?Q?Z0FBQUcwQVlRQnlBSFlBWlFCc0FHd0FYd0J3QUhJQWJ3QnFBR1VBWXdCMEFG?= =?us-ascii?Q?OEFiZ0JoQUcwQVpRQnpBRjhBWXdCdkFHNEFaZ0JwQUdRQVpRQnVBSFFBYVFC?= =?us-ascii?Q?aEFHd0FYd0J0QUdFQWNnQjJBR1VBYkFCc0FGOEFid0J5QUY4QVlRQnlBRzBB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= x-dg-reffour: =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFRQUFBQUFBQUFBQUFBQUFBUUFBQUFBQUFBQUNBQUFB?= =?us-ascii?Q?QUFDZUFBQUFiUUJoQUhJQWRnQmxBR3dBYkFCZkFIQUFjZ0J2QUdvQVpRQmpB?= =?us-ascii?Q?SFFBWHdCdUFHRUFiUUJsQUhNQVh3QmpBRzhBYmdCbUFHa0FaQUJsQUc0QWRB?= =?us-ascii?Q?QnBBR0VBYkFCZkFHMEFZUUJ5QUhZQVpRQnNBR3dBWHdCdkFISUFYd0JuQUc4?= =?us-ascii?Q?QWJ3Qm5BR3dBWlFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQkFBQUFBQUFBQUFJQUFBQUFBSjRBQUFCdEFHRUFj?= =?us-ascii?Q?Z0IyQUdVQWJBQnNBRjhBY0FCeUFHOEFhZ0JsQUdNQWRBQmZBRzRBWVFCdEFH?= =?us-ascii?Q?VUFjd0JmQUhJQVpRQnpBSFFBY2dCcEFHTUFkQUJsQUdRQVh3QnRBR0VBY2dC?= =?us-ascii?Q?MkFHVUFiQUJzQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUVBQUFBQUFBQUFBZ0FBQUFBQW5nQUFBRzBBWVFCeUFIWUFaUUJzQUd3QVh3?= =?us-ascii?Q?QndBSElBYndCcUFHVUFZd0IwQUY4QWJnQmhBRzBBWlFCekFGOEFjZ0JsQUhN?= =?us-ascii?Q?QWRBQnlBR2tBWXdCMEFHVUFaQUJmQUcwQVlRQnlBSFlBWlFCc0FHd0FYd0J2?= =?us-ascii?Q?QUhJQVh3QmhBSElBYlFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFRQUFBQUFBQUFBQ0FB?= =?us-ascii?Q?QUFBQUNlQUFBQWJRQmhBSElBZGdCbEFHd0FiQUJmQUhRQVpRQnlBRzBBYVFC?= =?us-ascii?Q?dUFIVUFjd0FBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFCQUFBQUFBQUFBQUlBQUFBQUFKNEFBQUJ0QUdF?= =?us-ascii?Q?QWNnQjJBR1VBYkFCc0FGOEFkd0J2QUhJQVpBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFB?= =?us-ascii?Q?QUFBRUFBQUFBQUFBQUFnQUFBQUFBIi8+PC9tZXRhPg=3D=3D?= x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO1PR18MB4714:EE_|MW4PR18MB5083:EE_ x-ms-office365-filtering-correlation-id: 0df3aec6-a81f-42dc-9946-08db5dbb3b91 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR18MB4714.namprd18.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(396003)(136003)(366004)(39860400002)(376002)(346002)(451199021)(7696005)(966005)(110136005)(4326008)(478600001)(316002)(71200400001)(76116006)(41300700001)(86362001)(66446008)(66476007)(64756008)(66946007)(66556008)(52536014)(38070700005)(5660300002)(8676002)(8936002)(54906003)(2906002)(6506007)(122000001)(33656002)(55016003)(9686003)(83380400001)(38100700002)(186003); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?o8ifiPg78cXIsNts6771p1ZtPjAdvquD063EcMDhSgH/BX21acgY5Nj19tk4?= =?us-ascii?Q?tUOXgergdCWRuQqL7LpbdC5eFkKWYq/sMfkhO5BecnNEOtCZxzeM9CTxQw5H?= =?us-ascii?Q?2BJ1c5HOB/viC/1ESynuspIV5jSDf7kWjdVbFfGm3z666dIm6ceKJslgxfNI?= =?us-ascii?Q?76/pgMYECXxCMDb7LNqAfPCqSLLmgyej1vUTii85ueiZIKJnZBfBFlqmn0Za?= =?us-ascii?Q?NIhA9K+PRfb9h0rUQSaFWtdBQ00z6Lp9ZGsm8so1sdGMri7CQR7D48YjK8kU?= =?us-ascii?Q?zAIlak/gzEAepFQluR72VLhLhhFK3ibqnNmApmf0DbvrxQtimaRAWoUe1R5R?= =?us-ascii?Q?8GE4GFInghSwMqtdMVwt1SE/e+Ce4ZReXY9g7gcomBIl6SnrHjcJ7i9ttRMP?= =?us-ascii?Q?XSsUCDO5Aqxyjn8S14pksvd35/CHzUBzr5VN6UGXrgCoG92XMzcceyKLrqKX?= =?us-ascii?Q?ErjsayrnigryzgLPZgYe/+zqRxHPzXy+RDEuEZvUIlR7SgN+WHtLKTqZB2WD?= =?us-ascii?Q?JL1X4lm/uDzV8SP5Jj2/JM5kT3oMBbRXGaYMCS8NIjtUa1o5DfX/Ro0/gNgs?= =?us-ascii?Q?9NB6i2E1tcZpBfCEp1jbqrf40DXSl2v8LVGcC93QAw7hTB4G7U6imPHFhqVp?= =?us-ascii?Q?ekiaJQdnbmhtuOgYsBwlYgBZPC41MAwY2rcHz4WC3qmIbXOGxpjA74Sw0rhP?= =?us-ascii?Q?rBijuyBbq691v0A7yeIcyThTxbAgdzISv/PRHOxzx2Johu1Z3ULc1rNMrF+z?= =?us-ascii?Q?Qt/u0K++ANKAxwhTHuJIs6EXG9g9Blf5bPF4DYLvKyr+JoPXqgVqkEhekH5N?= =?us-ascii?Q?TqMeWnksD83/bU+qVMgr+tv15OIwxlmCFUStVM1yyESnxPEkb7+xHNsYD3nN?= =?us-ascii?Q?XYu2OVcslnjLT0d+7+qSxWracLEqOgA1/20b8lX5eH7LIsa4FzSu1OSKubCM?= =?us-ascii?Q?779zkbrGxMS1KKYsxXNcZ0miAMwNquo8LWoDTcRBDwivmgn6egKVxyWqRHIn?= =?us-ascii?Q?y54//4uxjVvI1yzoOK1RTbkSvP+ZCg0yJ1M9tqT00l0cfJGWt7kitbtx5Svu?= =?us-ascii?Q?/b3oqggJ4GlrmjSTDaaF4eDBHYhhskG/JranBoYIPgN4TPwFdEoId24oLG9z?= =?us-ascii?Q?rjx7y2JFJgP6MZK6Qe94Ti9HDnO34MUFWvpQok0INnGyZwsKHClpEk6dRHiH?= =?us-ascii?Q?QPK7XLevJFSX2OrqbWb87+89qXPS+RDy//GR1rycTCkX7cJzt/kL8hkPbLHj?= =?us-ascii?Q?pOz1BW0zKHeU3CoGD76WVwnZs3WH5LW8n9XNYhy400DOGbPziym630NWwGau?= =?us-ascii?Q?EvDr99K3CO2F9Cb0z34HHR/tE3GGCPr8+cPusYw8kC22ABG136fa4Zj/1VIh?= =?us-ascii?Q?yXOVLZRHPWUvXNQdLphv7tYs8noJUlXKyCEECZ7TysqN0+RgsYo6QsAjiDbT?= =?us-ascii?Q?P06s9fC7lpxKxQNq4IR9fwk2yRoZF6EKKKKial1WFzgjcNLrdWW4aIltMHia?= =?us-ascii?Q?kWMrGEKWUyewbxw8c9REO/IYxEj2R794P6CCpdr8lOnsTj+Yr77y/7Z7Op7Q?= =?us-ascii?Q?ba4lZ0SrMmq4R4eaS2I=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: marvell.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO1PR18MB4714.namprd18.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 0df3aec6-a81f-42dc-9946-08db5dbb3b91 X-MS-Exchange-CrossTenant-originalarrivaltime: 26 May 2023 07:31:34.2504 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: UjyOKx0Vvvcl1jpTNEUKF2A5HBG22uuiuw/7XCGjdZbEJnPmqGSr+SDHiTOVmV6yEzsYJWHUetBFR9YUx/ylkVdaK9tu+o1jbULYugM6oxI= X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR18MB5083 X-Proofpoint-GUID: FnQGBnuI_fag41WE2t-Y6EqxJh3ftRkI X-Proofpoint-ORIG-GUID: FnQGBnuI_fag41WE2t-Y6EqxJh3ftRkI X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.573,FMLib:17.11.176.26 definitions=2023-05-26_01,2023-05-25_03,2023-05-22_02 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Akhil, >=20 > If you have the reference from where the vectors are taken it can also be > mentioned. >=20 I generated these test vectors in online. There are no reference test vecto= rs quoted In RFC except for recommended curve parameters, at the end. https://datatracker.ietf.org/doc/html/draft-shen-sm2-ecdsa-02 > > > > Signed-off-by: Gowrishankar Muthukrishnan > > --- > > app/test/test_cryptodev_asym.c | 506 +++++++++++++++++++++ > > app/test/test_cryptodev_sm2_test_vectors.h | 120 +++++ > > 2 files changed, 626 insertions(+) > > create mode 100644 app/test/test_cryptodev_sm2_test_vectors.h > > > > diff --git a/app/test/test_cryptodev_asym.c > > b/app/test/test_cryptodev_asym.c index 9236817650..bfaeedee27 100644 > > --- a/app/test/test_cryptodev_asym.c > > +++ b/app/test/test_cryptodev_asym.c > > @@ -21,6 +21,7 @@ > > #include "test_cryptodev_ecpm_test_vectors.h" > > #include "test_cryptodev_mod_test_vectors.h" > > #include "test_cryptodev_rsa_test_vectors.h" > > +#include "test_cryptodev_sm2_test_vectors.h" > > #include "test_cryptodev_asym_util.h" > > #include "test.h" > > > > @@ -2196,6 +2197,507 @@ test_ecpm_all_curve(void) > > return overall_status; > > } > > > > +static int > > +test_sm2_sign(void) > > +{ > > + struct crypto_testsuite_params_asym *ts_params =3D &testsuite_params; > > + struct crypto_testsuite_sm2_params input_params =3D > > sm2_param_fp256; > > + struct rte_mempool *sess_mpool =3D ts_params->session_mpool; > > + struct rte_mempool *op_mpool =3D ts_params->op_mpool; > > + uint8_t dev_id =3D ts_params->valid_devs[0]; > > + struct rte_crypto_op *result_op =3D NULL; > > + uint8_t output_buf_r[TEST_DATA_SIZE]; > > + uint8_t output_buf_s[TEST_DATA_SIZE]; > > + struct rte_crypto_asym_xform xform; > > + struct rte_crypto_asym_op *asym_op; > > + struct rte_cryptodev_info dev_info; > > + struct rte_crypto_op *op =3D NULL; > > + int ret, status =3D TEST_SUCCESS; > > + void *sess =3D NULL; > > + > > + rte_cryptodev_info_get(dev_id, &dev_info); >=20 > dev_info is being unused. Not checking for capabilities? It is the same case in other algorithms as well. Shall I collectively addre= ss this ? > > + > > + /* Setup crypto op data structure */ > > + op =3D rte_crypto_op_alloc(op_mpool, > > RTE_CRYPTO_OP_TYPE_ASYMMETRIC); > > + if (op =3D=3D NULL) { > > + RTE_LOG(ERR, USER1, > > + "line %u FAILED: %s", __LINE__, > > + "Failed to allocate asymmetric crypto " > > + "operation struct\n"); > > + status =3D TEST_FAILED; > > + goto exit; > > + } > > + asym_op =3D op->asym; > > + > > + /* Setup asym xform */ > > + xform.next =3D NULL; > > + xform.xform_type =3D RTE_CRYPTO_ASYM_XFORM_SM2; > > + xform.sm2.pkey.data =3D input_params.pkey.data; > > + xform.sm2.pkey.length =3D input_params.pkey.length; > > + xform.sm2.q.x.data =3D input_params.pubkey_qx.data; > > + xform.sm2.q.x.length =3D input_params.pubkey_qx.length; > > + xform.sm2.q.y.data =3D input_params.pubkey_qy.data; > > + xform.sm2.q.y.length =3D input_params.pubkey_qy.length; > > + > > + ret =3D rte_cryptodev_asym_session_create(dev_id, &xform, sess_mpool, > > &sess); > > + if (ret < 0) { > > + RTE_LOG(ERR, USER1, > > + "line %u FAILED: %s", __LINE__, > > + "Session creation failed\n"); > > + status =3D (ret =3D=3D -ENOTSUP) ? TEST_SKIPPED : TEST_FAILED; > > + goto exit; > > + } > > + > > + /* Attach asymmetric crypto session to crypto operations */ > > + rte_crypto_op_attach_asym_session(op, sess); > > + > > + /* Compute sign */ > > + > > + /* Populate op with operational details */ > > + op->asym->sm2.op_type =3D RTE_CRYPTO_ASYM_OP_SIGN; > > + op->asym->sm2.message.data =3D input_params.message.data; > > + op->asym->sm2.message.length =3D input_params.message.length; > > + op->asym->sm2.id.data =3D input_params.id.data; > > + op->asym->sm2.id.length =3D input_params.id.length; > > + > > + /* Init out buf */ > > + op->asym->sm2.r.data =3D output_buf_r; > > + op->asym->sm2.s.data =3D output_buf_s; > > + > > + RTE_LOG(DEBUG, USER1, "Process ASYM operation\n"); > > + > > + /* Process crypto operation */ > > + if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) !=3D 1) { > > + RTE_LOG(ERR, USER1, > > + "line %u FAILED: %s", __LINE__, > > + "Error sending packet for operation\n"); > > + status =3D TEST_FAILED; > > + goto exit; > > + } > > + > > + while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) =3D=3D 0= ) > > + rte_pause(); >=20 > Shouldn't this be a finite loop and mark test as failed after some retrie= s? It is the same case in other algorithms as well. Shall I collectively addre= ss this ? >=20 > > + > > + if (result_op =3D=3D NULL) { > > + RTE_LOG(ERR, USER1, > > + "line %u FAILED: %s", __LINE__, > > + "Failed to process asym crypto op\n"); > > + status =3D TEST_FAILED; > > + goto exit; > > + } > > + ... ... > > +static int > > +test_sm2_encrypt(void) > > +{ > > + struct crypto_testsuite_params_asym *ts_params =3D &testsuite_params; > > + struct crypto_testsuite_sm2_params input_params =3D > > sm2_param_fp256; > > + struct rte_mempool *sess_mpool =3D ts_params->session_mpool; > > + struct rte_mempool *op_mpool =3D ts_params->op_mpool; > > + uint8_t output_buf[TEST_DATA_SIZE], *pbuf =3D NULL; > > + uint8_t dev_id =3D ts_params->valid_devs[0]; > > + struct rte_crypto_op *result_op =3D NULL; > > + struct rte_crypto_asym_xform xform; > > + struct rte_crypto_asym_op *asym_op; > > + struct rte_cryptodev_info dev_info; > > + struct rte_crypto_op *op =3D NULL; > > + int ret, status =3D TEST_SUCCESS; > > + void *sess =3D NULL; > > + > > + rte_cryptodev_info_get(dev_id, &dev_info); > > + > > + /* Setup crypto op data structure */ > > + op =3D rte_crypto_op_alloc(op_mpool, > > RTE_CRYPTO_OP_TYPE_ASYMMETRIC); > > + if (op =3D=3D NULL) { > > + RTE_LOG(ERR, USER1, > > + "line %u FAILED: %s", __LINE__, > > + "Failed to allocate asymmetric crypto " > > + "operation struct\n"); > > + status =3D TEST_FAILED; > > + goto exit; > > + } > > + asym_op =3D op->asym; > > + > > + /* Setup asym xform */ > > + xform.next =3D NULL; > > + xform.xform_type =3D RTE_CRYPTO_ASYM_XFORM_SM2; > > + xform.sm2.pkey.data =3D input_params.pkey.data; > > + xform.sm2.pkey.length =3D input_params.pkey.length; > > + xform.sm2.q.x.data =3D input_params.pubkey_qx.data; > > + xform.sm2.q.x.length =3D input_params.pubkey_qx.length; > > + xform.sm2.q.y.data =3D input_params.pubkey_qy.data; > > + xform.sm2.q.y.length =3D input_params.pubkey_qy.length; > > + > > + ret =3D rte_cryptodev_asym_session_create(dev_id, &xform, sess_mpool, > > &sess); > > + if (ret < 0) { > > + RTE_LOG(ERR, USER1, > > + "line %u FAILED: %s", __LINE__, > > + "Session creation failed\n"); > > + status =3D (ret =3D=3D -ENOTSUP) ? TEST_SKIPPED : TEST_FAILED; > > + goto exit; > > + } > > + > > + /* Attach asymmetric crypto session to crypto operations */ > > + rte_crypto_op_attach_asym_session(op, sess); > > + > > + /* Compute encrypt */ > > + > > + /* Populate op with operational details */ > > + op->asym->sm2.op_type =3D RTE_CRYPTO_ASYM_OP_ENCRYPT; > > + op->asym->sm2.message.data =3D input_params.message.data; > > + op->asym->sm2.message.length =3D input_params.message.length; > > + > > + /* Init out buf */ > > + op->asym->sm2.cipher.data =3D output_buf; > > + > > + RTE_LOG(DEBUG, USER1, "Process ASYM operation\n"); > > + > > + /* Process crypto operation */ > > + if (rte_cryptodev_enqueue_burst(dev_id, 0, &op, 1) !=3D 1) { > > + RTE_LOG(ERR, USER1, > > + "line %u FAILED: %s", __LINE__, > > + "Error sending packet for operation\n"); > > + status =3D TEST_FAILED; > > + goto exit; > > + } > > + > > + while (rte_cryptodev_dequeue_burst(dev_id, 0, &result_op, 1) =3D=3D 0= ) > > + rte_pause(); > > + > > + if (result_op =3D=3D NULL) { > > + RTE_LOG(ERR, USER1, > > + "line %u FAILED: %s", __LINE__, > > + "Failed to process asym crypto op\n"); > > + status =3D TEST_FAILED; > > + goto exit; > > + } > > + > > + if (result_op->status !=3D RTE_CRYPTO_OP_STATUS_SUCCESS) { > > + RTE_LOG(ERR, USER1, > > + "line %u FAILED: %s", __LINE__, > > + "Failed to process asym crypto op\n"); > > + status =3D TEST_FAILED; > > + goto exit; > > + } >=20 > Shouldn't we do content comparison of the cipher text with vectors here a= s > well? > Content is matched only after round trip which will not catch the hardwar= e bug > during encryption. Due to random scalar value used (and known only to driver), we can't have e= xpected cipher string. I ll wait for review on current openssl driver implementatio= n whether to introduce this scalar value in crypto op param like in EC. Based on this= , we could=20 address this suggestion. Thanks. >=20